A hard disk is divided into tracks which are further subdivided into:


Options: clusters,    sectors,    vectors,    heads

Ans:B ,B

More Computer Hardware Related questions:


What device protects against line deficiencies?
Options: Surge protector,    UPS,    Logic probe,    Capacitor

Ans:B ,B


6.If in a software system, the operation is incorrect if results are not produced according to the specified timing requirements then the software system is referred as
Options: (A)Soft real time system (B) Hard real time system (C) Real time system (D) None of these 10

Ans:106. (A),106. (A)


A microcomputer is a computer that uses a _____ for its CPU.
Options: chips,    registers,    microprocessor,    vacuum tube

Ans:C ,C


8.Right clicking something in Excel
Options: (A)Deletes the object (B) Nothing the right mouse button is there for left handed people (C) Opens a shortcut menu listing everything you can do to the object (D) Selects the object 3

Ans:38. (C),38. (C)


who was last rular of handoor riyasat
Options: rajender singh, surender singh, dalip singh, ajit singh

Ans:surender singh,surender singh


Which of the following cups/trophies is associated with football?
Options: Davis Cup,    Champions trophy,    Santosh Trophy,    Deodhar Trophy

Ans:C,C


Kiol Bandh
Options:

Ans:Bilaspur,Bilaspur


.   Which of the following includes special effects that can be applied to drawing objects?
Options: a. Gradient fills b. Line color and style c. Rotating d. All of above

Ans:1 – D ,1 – D


Who is the author of the book 'Naked Triangle'?
Options: R.K.Narayan,    Amrita Pritam,    Balwant Gargi,    Khushwant Singh

Ans:C,C


6.A remote batch-processing operation where data is solely input to a central computer would require
Options: (A)telegraph line (B) simplex lines (C) mixed-band channel (D) none of these Answer Sheet

Ans:176. (B),176. (B)


In which mode can two or more applications be stored in memory at the same time?
Options: Segmented Mode,    Unprotected Mode,    Real Mode,    Protected Mode

Ans:D ,D


1.A fixed number of adjacent bits that represent a particular character or symbol are referred as
Options: (A)Byte (B) Octal (C) Bubble (D) None of these 15

Ans:151. (A),151. (A)


253. kshetraphal ke anusaar vishv ka sabase chhota desh kaunasa hai?
Options: NA

Ans: vaitikan sitee, vaitikan sitee


To run the old system and the new system at the same time for a specified period, the system implementation approach used is
Options: pilot,    phased,    parallel,    direct

Ans:C ,C


where is kamaksha devi mandir
Options: kinnaur , lahul, kullu, mandi

Ans:mandi,mandi


2.The following method you can use to add a new table to your database
Options: (A)Use Design View to create a table (B) Enter data directly by using a datasheet (C) Both of above (D) All of the above 8

Ans:82. (C),82. (C)


‘INS Tarmugli’ is the first
Options: NA

Ans:Follow-on Water Jet Fast Attack Craft,Follow-on Water Jet Fast Attack Craft


A COM port is a _____ port.
Options: parallel,    serial,    static,    multi

Ans:B ,B


A full-adder adds _____ bits, and producing a SUM and a _____
Options: 8, SUBTRACTION,    3, CARRY,    16, DIVIDE,    All of the above

Ans:B ,B


What will happen if in a C program you assign a value to an array element whose subscript exceeds the size of array?
Options: The element will be set to 0.,    The compiler would report an error.,    The program may crash if some important data gets overwritten.,    The array size would appropriately grow.

Ans:C ,C


Kolleru Pelicanary situated at Elluru, Andhra Pradesh has reserves of
Options: elephant, tiger, panther, sambar,    pelicans, painted stroke,    chital, sambar, chinkara, wild birds,    elephant, leopard, tiger, garu, nilgai

Ans:B,B


786. pensil kee leed kisakee banee hotee hai?
Options: NA

Ans: grephait, grephait


Suicidal bag of cell is
Options: Iysomer,Iysosome,Polymer,Iysoprene

Ans:Iysosome,Iysosome


.   When an image is selected, it displays which of the following?
Options: a. Two corner handles b. Six middle handles c. Eight sizing handles d. Six boxes

Ans:0 – C ,0 – C


Which part of the laser printer should NOT be exposed to sunlight?
Options: Transfer corona assembly,    PC drum,    Primary corona wire,    Toner cartridge

Ans:B ,B


What will be the output of the program (sample.c) given below if it is executed from the command line? cmd> sample monday tuesday wednesday thursday /* sample.c */ #include<stdio.h> int main(int argc, char *argv[]) { while(--argc>0) printf("%s", *++argv); return 0; }
Options: sample monday tuesday wednesday thursday,    monday tuesday wednesday thursday,    monday tuesday thursday,    tuesday

Ans:B ,B


MLMenu, a natural language interface for the TI Explorer, is similar to:
Options: Ethernet,    NaturalLink,    PROLOG,    the Personal Consultant

Ans:B ,B


. The __________ performs document tracking.
Options: a. distributed application b. enterprise software c. Oracle software d. EDM software

Ans:2 – d ,2 – d


. The information stored in storage devices can be accessed in _________
Options: RAM access & ROM access B. Memory access & Disk access C. Random access & shift access D. Sequential access & Direct access

Ans:– D ,


1st battle of pannipat was fought in
Options:

Ans:1526,1526


The parliament works through committees which
Options: help the government in the formulation of policy,    exercise effective control over government on a regular and continuing basis,    ensure that the parliament strictly adheres to the provision of the constitution and the prescribed parliamentary procedure,    both (a) and (b)

Ans:B,B


Which of the following is correct?
Options: =AVERAGE(4, 5, 6, 7) B. =AVERAGE(A1, B1, C1)               C. =AVERAGE(A1:A9, B1:B9) D. =All of the above

Ans:– D ,


Bassi JVP
Options:

Ans:Mandi,Mandi


The three different application logic components are which of the following?
Options: Presentation, Client, and Storage,    Presentation, Client, and Processing,    Presentation, Processing, and Storage,    Presentation, Processing, and Network

Ans:C ,C


What is the shortcut key to display field codes?
Options: a. Alt + F9 b. Ctrl + F9 c. Shift + F9 d. Space + F9

Ans:–  A,–  A


Which of the following statements is false?
Options: Secondary storage is nonvolatile,    Primary storage is volatile,    Secondary storage contains data for immediate processing,    When the computer is turned off, data and instructions stored in primary storage are erased

Ans:C ,C


ILLIAC is a
Options: Super computer,    Mini computer,    Mainframe computer,    Micro computer

Ans:A ,A


747. bhaarat ka sabase ooncha jalaprapaat kaunasa hai?
Options: NA

Ans: jog ya garasoppa jo sharaavatee nadee par karnaatak mein hai, jog ya garasoppa jo sharaavatee nadee par karnaatak mein hai


A step-up transformer has a turns ratio of 1:4. If the line voltage is 115 V rms, what is the peak secondary voltage?
Options: 700 V,    707 V,    651 V,    208 V

Ans:C ,C


A front-end processor is
Options: a user computer system,    a processor in a large-scale computer that executes operating system instructions,    a minicomputer that relieves main-frame computers at a computer centre of communications control functions,    preliminary processor of batch jobs.

Ans:C ,C


Vadhya Surat Ram Prakash belongs to which district
Options:

Ans:Sirmour,Sirmour


WRAM is used on a
Options: modem,    video card,    motherboard,    ata connector

Ans:B ,B


To preview a motion path effect using the custom animation task pane, you should
Options: a. click the play button b. click the show effect button c. double click the motion path d. all of above

Ans: – A , – A


2. Hacktivism is
Options: (A)someone who subverts computer security without authorization or who uses technology (usually a computer or the Internet) for terrorism, vandalism (malicious destruction), credit card fraud, identity theft, intellectual property theft, or many other types of crime. (B) a person, usually not an expert in computer security, who breaks into computer systems by using prepackaged automated tools written by others. (C) hacker who utilizes technology to announce a political message. (D) None of these 2

Ans:22. (C),22. (C)


Which command is used to display a file contents in octal form?
Options: cd,    od,    of,    oct

Ans:B ,B


Chandra Dhar Sharma Guleri belongs to which district
Options:

Ans:Rajasthan,Rajasthan


Doubling the number of turns of wire in an inductor:
Options: reduces the value of inductance by one-half,    multiplies the value of inductance by two,    multiplies the value of inductance by four,    reduces the value of inductance by one-fourth

Ans:C ,C


7.In bit table used for Free space management in secondary storage
Options: (A)Bit zero corresponds to free block (B) Bit one corresponds to free block (C) Bit zero corresponds to block in use (D) None of these 18

Ans:187. (A),187. (A)


Robert Koch worked on
Options: tuberculosis,    cholera,    malaria,    diabetes

Ans:A,A


The linking of PCs with a communi¬cations system is referred to as:
Options: workstations,    streaming,    turnkey systems,    networking

Ans:D ,D

www.000webhost.com