The process of writing computer instructions in a programming language is known as


Options: Coding,    Processing,    Programming,    File

Ans:A,A

More Computer Fundamental Related questions:


You are working with a network that has the network ID 192.168.10.0 and require nine subsets for your company and the maximum number of hosts. What subnet mask should you use?
Options: 255.255.255.192,    255.255.255.224,    255.255.255.240,    255.255.255.248

Ans:C ,C


Which of the following items are not necessary for client/server?
Options: Assure that tools will connect with middleware.,    Understand the requirements.,    Determine network bandwidth capabilities.,    Include the use of a file server.

Ans:D ,D


What command is not used to list the files chap01, chap02 and chap04?
Options: ls chap*,    ls chap[124],    ls - x chap0[124],    ls chap0[124]

Ans:B ,B


to edit the text within the boxes of an organization chart, you
Options: a. select the box and text, then make changes b. select the box, then make the changes c. highlight the text, them make the changes d. a and b both

Ans: – A , – A


Filename extensions help identify certain files. What filename extension identifies command files?
Options: COM,    BAT,    EXE,    SYS

Ans:A ,A


The Halifax summit was that of
Options: G-7 countries,    Leaders of the NAM,    countries in favour of a common currency for Europe,    Palestinian and Israeli leaders

Ans:A,A


An inverter is also called a _____ gate.
Options: NOT,    OR,    AND,    NAND

Ans:A ,A


8. Which type of command in DOS needs additional files for their execution?
Options: a. Internal commands b. External commands c. Batch commands d. Redirectors

Ans:Correct Answer: b,Correct Answer: b


Which computer has been designed to be as compact as possible?
Options: Mini,    Super computer,    Micro computer,    Mainframe

Ans:C,(Canswer


. Which of the following is not a system tool?
Options: a. Scandisk b. Drive space c. Disk defragmenter d. Doskey

Ans:4 – d ,4 – d


705. prthvee apanee dhuree par kitane kon par jhukee hai?
Options: NA

Ans: 23.5 digree, 23.5 digree


The startup routine runs, when machine boots up is known as
Options: a.POST b. BOOT up c. Operating Routine d. I/O operation

Ans:1  b.       ,1  b.      


It is used to calculate and restructure data for easier analysis of your data. It calculates the sum,
Options: a. Parameter b. Select c. crosstab d. Append

Ans:ndash; c,ndash; c


Which one of the following equations most directly leads to the resistance of an ordinary household light bulb, assuming that you know the power and voltage rating?
Options: R = E2/P,    P = PR,    P = E2/R,    I = P/E

Ans:A ,A


0.A data structure consisting of several fields, some or all of which are instances of the same data structure, is called
Options: (A)Field (B) Bead (C) Database (D) Data collection 12

Ans:120. (B),120. (B)


Which of the following is not a requirement of structured design?
Options: It should be made up of a hierarchy of modules,    It should use many GOTO statements,    The code should be executed in a top-to-bottom fashion within each module,    Each module should be as independent as possible of all other modules, except its parent

Ans:B ,B


14. While working with MS-DOS, which command is used to rename a file named file1.doc to file2.doc from a different directory called dir1?
Options: a. Ren2.doc dirfile1.doc b. Ren file1.doc file2.doc c. Ren .docdir.doc d. Ren dir1file1.doc file2.doc

Ans:Correct Answer: d,Correct Answer: d


The SQL keyword(s) ________ is used with wildcards.
Options: LIKE only,    IN only,    NOT IN only,    IN and NOT IN

Ans:A ,A


4.In Excel if you press ……, the cell accepts your typing as its contents.
Options: (A)Enter (B) Ctrl+Enter (C) Tab (D) Insert 8

Ans:84. (A),84. (A)


What will be the output of the program ? #include<stdio.h> struct course { int courseno; char coursename[25]; }; int main() { struct course c[] = { {102, "Java"}, {103, "PHP"}, {104, "DotNet"} }; printf("%d ", c[1].courseno); printf("%s\n", (*(c+2)).coursename); return 0; }
Options: 103 DotNet,    102 Java,    103 PHP,    104 DotNet

Ans:A ,A


A noiseless 3 KHz Channel transmits bits with binary level signals. What is the maximum data rate?
Options: 3 Kbps,    6 Kbps,    12 Kbps,    24 Kbps.

Ans:B ,B


. Which function will you use to enter current time in a woksheet cell?
Options: a. =today() b. =now() c. =time() d. =currentTime()

Ans:– b,– b


. Disk label name can be up to ….characters
Options: a. 8 b. 9 c. 11 d. 255

Ans:9 – c ,9 – c


935. sarvaadhik ojon kshayakaaree gais kaun-see hai?
Options: NA

Ans: chfch (klorophlorokaarban), chfch (klorophlorokaarban)


On a clean glass plate a drop of water spreads to form a thin layer whereas a drop of mercury remains almost spherical because
Options: mercury is a metal,    density of mercury is greater than that of water,    cohesion of mercury is greater than its adhesion with glass,    cohesion of water is greater than its adhesion with glass

Ans:C,C


470. kolakaata kis nadee ke kinaare hai?
Options: NA

Ans: hugalee, hugalee


Which of the following name does not relate to stacks?
Options: a. FIFO lists b. LIFO list c. Piles d. Push-down lists

Ans: a, a


4.An accuracy is
Options: (A)Unplanned events, which results in injury, damage to property, or to the environment (B) Quantitative measure of the magnitude of error (C) Period that starts when a system is considered and ends when the product meets its initial operational capability (D) All the above 11

Ans:114. (B),114. (B)


Writer of country life
Options: Shanta kumar, G D khosla, J huchission, Y S parmar, Nohra richards

Ans:Nohra richards,Nohra richards


A device which converts human readable data into machine language is
Options: Card reader,    Card punch,    Punched paper tape,    Character reader

Ans:D ,D


6.The compaction is the technique in memory management that is used to over come
Options: (A)Internal fragmentation (B) External fragmentation (C) Both (A)and (B) (D) None of these. 6

Ans:66. (B),66. (B)


ASCII stands for
Options: American standard code for information interchange,    All purpose scientific code for information interchange,    American security code for information interchange,    American Scientific code for information interchange

Ans:A ,A


In the following program how long will the for loop get executed? #include<stdio.h> int main() { int i=5; for(;scanf("%s", &i); printf("%d\n", i)); return 0; }
Options: The for loop would not get executed at all,    The for loop would get executed only once,    The for loop would get executed 5 times,    The for loop would get executed infinite times

Ans:D ,D


Water is a good solvent of ionic salts because
Options: it has a high boiling point,    it has a high dipole moment,    it has a high specific heat,    it has no colour

Ans:B,B


What is computer firewall ?
Options: NA

Ans:Ans;- It is software or hardware-based program to protect against threats and make the internet sec,Ans;- It is software or hardware-based program to protect against threats and make the internet sec


The memory address of the first element of an array is called
Options: a. floor address b. foundation address c. first address d. base address  

Ans:d,d


A proxy server is used for which of the following?
Options: To provide security against unauthorized users,    To process client requests for Web pages,    To process client requests for database access,    To provide TCP/IP

Ans:A ,A


The PROJECT command will create new table that has
Options: more fields than the original table,    more rows than the original table,   None of the above,    all the fields of master table

Ans:E ,C


Large computer system typically uses:
Options: Line printers,    Ink-jet printers,    Dot-matrix printers,    Daisy wheel printers

Ans:A ,A


Which of the following statements are correct about 6 used in the program? int num[6]; num[6]=21;
Options: In the first statement 6 specifies a particular element, whereas in the second statement it specifies a type.,    In the first statement 6 specifies a array size, whereas in the second statement it specifies a particular element of array.,    In the first statement 6 specifies a particular element, whereas in the second statement it specifies a array size.,    In both the statement 6 specifies array size.

Ans:B ,B


. By default Excel provides 3 worksheets. You need only two of them, how will you delete the third one?
Options: a.  Right click on Sheet Tab of third sheet and choose Delete from the context menu b.  Click on Sheet 3 and from Edit menu choose Delete c.  Both of above d.  None of above

Ans:– a,– a


What do you mean by Memory Compaction?
Options: Combine multiple equal memory holes into one big hole B. Combine multiple small memory holes into one big hole C. Divide big memory hole into small holes D. Divide memory hole by 2

Ans:– B ,


0.Lehman’s First Law (Lehman and Belady 1985) is
Options: (A)Continuing change: A program used in real-world environment must change necessarily or become progressively less useful in that environment. (B) Increase complexity: As an evolving program change, its strictures tend to become more complex. Extra resources must be devoted to preserving and simplifying the structure. (C) Large program evolution: Program evolution is a self-regulating process. (D) None of these 21

Ans:210. (A),210. (A)


Which of the following is not true about documentation?
Options: Documentation, of a system, should be as clear and direct as possible,    Documentation increases the maintenance time and cost,    Documentation gives better understanding of the problem,    All of the above

Ans:B ,B


Which is a non-standard version of a computing language?
Options: PROLOG,    APL,    Army,    PL/1

Ans:C,(Canswer


Which of the following is not an undertaking under the administrative control of Ministry of Railways?
Options: Container Corporation of India Limited,    Konkan Railway Corporation Limited,    Indian Railways Construction Company Limited,    Diesel Locomotive Works, Varanasi

Ans:C,C


Transmission of computerised data from one location to another is called
Options: data transfer,    data flow,    data communication,    data management

Ans:C ,C


Devaluation of currency leads to
Options: fall in domestic prices,    increase in domestic prices,    no impact on domestic prices,    erratic fluctuations in domestic prices

Ans:B,B


What SQL structure is used to limit column values of a table?
Options: The LIMIT constraint,    The CHECK constraint,    The VALUE constraint,    None of the above is correct.

Ans:B ,B


The two basic technologies for digital ICs are bipolar and MOS. Bipolar technology is preferred for_____ and _____ whereas MOS technology is better suited to LSI.
Options: SSI, MSI,    MSI, LSI,    SSI, LSI,    ECL, DTL

Ans:A ,A

www.000webhost.com