'.MPG' extension refers usually to what kind of file?

Options: WordPerfect Document file,    MS Office document,    Animation/movie file,    Image file


More technology Related questions:

A feasibility document should contain all of the following except:
Options: project name,    problem descriptions,    feasible alternative,    data-flow diagrams

Ans:B ,B

Yondieki who set up a new world record in 10,000 meters race, belongs to
Options: Australia,    Canada,    Kenya,    Mexico


Which of the following have computers traditionally done better than people?
Options: storing information,    responding flexibly,    computing numerically,    both (a) and (c)

Ans:D ,D

. If you want to have a blank line after the title in a worksheet, what is the best thing for you to do?
Options: a. Re-format the spreadsheet b. Insert a row c. Increase the column width d. Use the spacebar

Ans:– b,– b

How many banks were nationalized in 1969?
Options: 16,    14,    15,    20


A distributed database has which of the following advantages over a centralized database?
Options: Software cost,    Software complexity,    Slow Response,    Modular growth

Ans:D ,D

What project is currently developing X server support?
Options: XFree86 Project, Inc.,    RHAD Labs,    GNOME Project,    All of the above

Ans:A ,A

Nalwad mela belongs to which district
Options: kinnaur , lahul spiti , kullu, mandi


writer of political histry of bilaspur
Options: akshar singh, anand chand, narotam singh, rahul sankrityan

Ans:narotam singh,narotam singh

Which of the following is not used for storage purposes with main frame computers?
Options: removable disks,    fixed disks,    mass storage systems,    diskettes


. A(n) _____ is an image control that displays in the background of a page on a form or report.
Options: a. legend b. icon c. logo d. watermark

Ans:9 – d ,9 – d

The simultaneous transmission of data to a number of stations is known as
Options: broadcast,    Band width,    Aloha,    Analog transmission

Ans:A ,A

During the first crusade, crusaders reached Jerusalem and captured it in
Options: 1000 AD,    1099 AD,    1200 AD,    1515 AD


Standard TTL has a multiple emitter input transistor and a _____ output
Options: totem-pole,    bipolar,    register,    transistor

Ans:A ,A

7.Which of the following is true concerning personal computers?
Options: (A)They have been most successful in the home. (B) They are user friendly (C) No specific programming technique required (D) All the above. 6 | 4

Ans:47. (D),47. (D)

. How many types of storage loops exists in magnetic bubble memory
Options: A) 8 B) 4 C) 16 D) 2


Which of the following provides a storage mechanism for incoming mail but does not allow a user to download messages selectively?
Options: SMTP,    DHCP,    IMAP,    POP3

Ans:D ,D

In which version of DOS. CHKDSK command has been changed to SCANDISK?
Options: a. 5.0 b. 6.2 c. 6.0 d. 6.2

Ans:Correct Answer: d ,Correct Answer: d

The computer is a part of the firm's
Options: physical system,    conceptual system,    both (a) and (b),    neither (a) nor (b)

Ans:C ,C

What is the literacy rate of Maharashtra?
Options: 77.27 per cent,    66.26 per cent,    55.25 per cent,    44.24 per cent


Which of the following is not a font style?
Options:  A) Bold, B) Italics, C) Regular, D) Superscript, 


3.Comparing with secondary storage, primary storage is
Options: (A)slow and inexpensive (B) fast and inexpensive (C) fast and expensive (D) slow and expensive 12

Ans:123. (C),123. (C)

The chairman of 21st Law Commission is
Options: NA

Ans:Justice Balbir Singh Chauhan,Justice Balbir Singh Chauhan

2.In three tier client/server architecture application software match the following: AUser machine, 1-Client, B- Middle-tier, 2Application server, C- Backend server, 3 Data servers.
Options: (A)A – 1, B – 2, C – 3 (B) A – 1, B – 3, C – 2 (C) A – 2, B – 1, C – 3 (D) A – 3, B – 2, C – 1 19

Ans:192. (A),192. (A)

9.Ability of two or more systems or components to perform their required functions while sharing the same hardware or software environment
Options: (A)Compatibility (B) Compactness (C) Code (D) Communication 15

Ans:149. (A),149. (A)

Options: NA

Ans: 770. kangaaroo kis desh ka raashtreey chihn hai?, 770. kangaaroo kis desh ka raashtreey chihn hai?

If you want to execute more than one program at a time, the systems software you are using must be capable of:
Options: word processing,    virtual memory,    compiling,    multitasking

Ans:D ,D

9.A- Press DOWN ARROW or CTRL+DOWN ARROW , B- Press SHIFT+LEFT ARROW: 1Move the selected control down, 2- Reduce the width of the selected control.
Options: (A)A-1, B-2 (B) A-2, B-2 (C) A-1, B-1 (D) A-2, B-1 6

Ans:59. (A),59. (A)

who founded Nada Mahal
Options: Ashok,Kalyan Chand,jagat singh, Umed singh

Ans:D,Umed singh

The function(s) of file system is (are):
Options: to provide complete file naming freedom to the users and to permit controlled sharing of files,    to provide for long and short term storage of files with appropriate economic tradeoffs.,    to provide security against loss of information due to system failure,    all of the above

Ans:D ,D

What happens if you press Ctrl + Shift + F8?
Options:  A) It activates extended selection, B) It activates the rectangular selection, C) It selects the paragraph on which the insertion line is., D) None of above,


22 maarch 1957
Options: NA

Ans: 765. rediyam kee khoj kisane kee?, 765. rediyam kee khoj kisane kee?

. In order to email a Word document from withing MS Word
Options: a. Office button >> Send to >> Mail Recipient b. Save the file as an email attachment c. Start Outlook and attach the file while open in Word d. This is an impossible operation

Ans:– A,– A

0.Match the following pairs A. Logical address (1) An actual location in main memory B. Relative address (2) An address is expressed as a location relative to some known point. C. Physical address (3) A memory location independent of the current assignment of data to memory 68 |
Options: (A)A – 3, B – 2, C–1 (B) A – 2, B – 1, C – 3 (C) A – 3, B – 1, C – 2 (D) A – 1, B – 2, C – 3 7

Ans:70. (A),70. (A)

4.Spoofing attack is
Options: (A)an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network. (B) a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access. (C) a toolkit for hiding the fact that a computer’s security has been compromised, is a general description of a set of programs which work to subvert control of an operating system from its legitimate (in accordance with established rules) operators. (D) None of these 1

Ans:14. (C),14. (C)

The tracks on a disk which can be accessed without repositioning the R/W heads is
Options: Surface,    Cylinder,    Cluster,    All of the above


The unit of hardware an operator uses to monitor computer processing is the:
Options: Card reader,    CPU,    Line printer,    Console

Ans:D ,D

Because of the importance of making data model changes correctly, many professionals are ________ about using an automated process for database redesign.
Options: optimistic,    skeptical,    ambivalent,    None of the above is correct.

Ans:B ,B

You accidentally erased a record in the sheet. What command can be used to restore it immediately?
Options: Insert B. Copy C. Undo D. Replace

Ans:– C ,

who became the first sikh member of british parliament?
Options: NA

Ans:Preet Kaur Gill ,Preet Kaur Gill

When was punched-card equipment used for the first time to process the British census?
Options: 1910,    1907,    1911,    1914

Ans:C ,C

. Part of the POST process is to ensure that the test of essential peripheral device coincides with the hardware configuration that stored in
Options: a. ROM b. The hard drive c. CMOS d. Cache Memory

Ans:2 – c ,2 – c

5.In uni-processor scheduling, a priorities enforcement is
Options: (A)When processes are assigned priorities and scheduling policy favor higher priority processes. (B) The scheduling keeps resources of system busy. (C) Here currently running process can be interrupted and moved to ready state by the operating system. (D) None of these. 11

Ans:115. (A),115. (A)

Which of the following is an example of a standard IP access list?
Options: access-list 110 permit host,    access-list 1 deny,    access-list 1 permit,    access-list standard

Ans:B ,B

. A _____ is a collection of predefined design elements and color schemes.
Options: a. feature b. hyperlink c. palette d. theme

Ans:– D,– D

Which of the following is the fastest?
Options: CPU,    magnetic tapes and disks,    video terminal,    sensors, mechanical controllers

Ans:A ,A

8.In a large DBMS
Options: (A)each user can “see” only a small part of the entire database (B) each user can access every subschema (C) each subschema contains every field in the logical schema (D) none of the above is true 7

Ans:78. (A),78. (A)

9.The memory management, y one clock policy is applied then the page first loaded into a frame in memory its use bit is set to
Options: (A)Zero (B) One (C) Two (D) Three 11

Ans:109. (B),109. (B)

. Which is not a valid property for attribute setting?
Options: a. C,b. S,c. H,d. R

Ans:3 – a ,3 – a

. The main elements of the _____ are the insertion point, end mark, mouse pointer, rulers, scroll bars, and status bar.
Options: a. Word toolbar b. Formatting toolbar c. Word document window d. Graphics toolbar

Ans: – C , – C