Computer One Liner
1500 Computer Awareness Question
1500 Computer Awareness Question
- The code for a Web page is written using Hypertext Markup language
- The first computers were programmed using Machine language
- A filename is a unique name that you give to a file of information
- This can be another word for program software
- Any data or instruction entered into the memory of a computer is considered as storage
- Which part of the computer displays the work done monitor
- A series of instructions that tells a computer what to do and how to do it is called a program
- Hardware is the part of a computer that one can touch and feel .)
- The role of a computer sales representative generally is to determine a buyer’s needs and match it to the correct hardware and software.
- Supercomputers refers to the fastest, biggest and most expensive computers
- Executing is the process of carrying out commands
12) The rectangular area of the
screen that displays a program, data, and or information is a window
13) The process of a computer
receiving information from a server on the internet is known as downloading
14) Disk drive is the part of the
computer helps to store information
15) Arithmetic operations include
addition, subtraction, multiplication, and division
16) A keyboard is the king of
input device
17) An error is known as bug
18) A collection of related
information sorted and dealt with as a unit is a file
19) Sending an e-mail is similar
to writing a letter
20) IT stands for information
technology
21) A menu contains commands that
can be selected
22) Plotter, printer, monitor are
the group consists of output devices
23) Edit menu is selected to cut,
copy and paste
24) The most important or powerful
computer in a typical network is network server
25) The primary purpose of software
is to turn data into information Downloaded from
26) The ability to find an
individual item in a file immediately direct access is used.
27) To make a notebook act as a
desktop model, the notebook can be connected to a docking station which is
connected to a monitor and other devices
28) You can use the tab key to
move a cursor across the screen, indent a paragraph.
29) A collection of related files
is called record.
30) Storage that retains its data
after the power is turned off is referred to as non-volatile storage.
31) Internet is an example of
connectivity.
32) Testing is the process of
finding errors in software code.
33) A syntax contains specific
rules and words that express the logical steps of an algorithm.
34) Changing an existing document
is called the editing documentation
35) Virtual memory is memory on
the hard disk that the CPU uses as an extended RAM.
36) Computers use the binary
number system to store data and perform calculations.
37) The windows key will launch
the start buttons.
38) To move to the beginning of a
line of text, press the home key.
39) When sending an e-mail, the
subject lines describe the contents of the message.
40) Tables, paragraphs and indexes
work with when formatting text in word.
41) TB is the largest unit of
storage.
42) The operating system tells the
computer how to use its components.
43) When cutting and pasting, the
item cut is temporarily stored in clipboard.
44) The blinking symbol on the
computer screen is called the cursor.
45) Magnetic tape is not practical
for applications where data must be quickly recalled because tape is a
sequential because tape is a sequential access medium.
46) Rows and columns are used to
organize data in a spread sheet.
47) When you are working on
documentation on PC, the document temporarily stored in flash memory.
48) One megabyte equals
approximately 1 million bytes.
49) Information travels between
components on the motherboard through buses.
50) RAM refers to the memory in
your computer.
51) Computer connected to a LAN
can share information and or share peripheral equipment
52) Microsoft office is an
application suite
53) Utilities can handle most
system functions that aren’t handled directly by the operating system
54) If you receive an e-mail from
someone you don’t know then you should delete it without opening it
55) A set of instructions telling
the computer what to do is called program
56) LAN refers to a small single
site network
57) A collection of programs that
controls how your computer system runs and processes information is called
operating system.
58) Device drivers are small,
special-purpose programs
59) Transformation of input into
output is performed by the CPU
60) Data going into the computer
is called input.
61) Binary choice offer only two
options
62) To indent the first paragraph
of your report, you should use tab key
63) Fields are distinct item that
don’t have much meaning to you in a given context
64) A website address is a unique
name that identifies a specific web site on the web
65) Modem is an example of a
telecommunications device
66) A set of computer programs
used for a certain function such as word processing is the best definition of a
software package
67) You can start Microsoft word
by using start button
68) A blinking symbol on the
screen that shows where the next character will appear is a cursor
69) Highlight and delete is used
to remove a paragraph from a report you had written
70) Data and time are available on
the desktop at taskbar
71) A directory within a directory
is called sub directory
72) Testing is the process of
finding errors in software code
73) In Excel, charts are created
using chart wizard option
74) Microcomputer hardware
consists of three basic categories of physical equipment system unit,
input/output, memory
75) Windows is not a common
feature of software applications
76) A tool bar contains buttons
and menus that provide quick access to commonly used commands
77) For creating a document, you
use new command at file menu
78) Input device is equipment used
to capture information and commands
79) A programming language
contains specific rules and words that express the logical steps of an
algorithm
80) One advantage of dial-up
internet access is it utilizes existing telephone security
81) Protecting data by copying it
from the original source is backup
82) Network components are
connected to the same cable in the star topology
83) Two or more computers
connected to each other for sharing information form a network
84) A compute checks the database
of user name and passwords for a match before granting access
85) Computers that are portable
and convenient for users who travel are known as laptops
86) Spam is the term for
unsolicited e-mail
87) Utility software type of
program controls the various computer parts and allows the user to interact
with the computer
88) Each cell in a Microsoft
office excel document is referred to by its cell address, which is the cell’s
row and column labels
89) Eight digit binary number is
called a byte
90) Office LANs that are spread
geographically apart on a large scale can be connected using a corporate WAN
91) Storage is the process of
copying software programs from secondary storage media to the hard disk
92) The code for a web page is
written using Hyper Text Markup Language
93) Small application programs
that run on a Web page and may ensure a form is completed properly or provide
animation are known as flash
94) In a relational database,
table is a data structure that organizes the information about a single topic
into rows and columns
95) The first computers were
programmed using assembly language
96) When the pointer is positioned
on a hyperlink it is shaped like a hand
97) Booting process checks to
ensure the components of the computer are operating and connected properly
98) Checking the existing files
saved on the disk the user determine what programs are available on a computer
99) Special effect used to
introduce slides in a presentation are called animation Downloaded from
100) Computers send and receive
data in the form of digital signals
101) Most World Wide Web pages
contain HTML commands in the language
102) Icons are graphical objects
used to represent commonly used application
103) UNIX is not owned and
licensed by a company
104) In any window, the maximize
button, the minimize button and the close buttons appear on the title bar
105) Dial-up Service is the
slowest internet connection service
106) Every component of your
computer is either hardware or software
107) Checking that a pin code
number is valid before it is entered into the system is an example of data
validation
108) A compiler translates higher
level programs into a machine language program, which is called object code
109) The ability to find an
individual item in a file immediately direct access
110) Computers connected to a LAN
can share information and/or share peripheral equipment
111) A CD-RW disk can be erased
and rewritten
112) The two major categories of
software include system and application
113) Windows 95, Windows 98 and
Windows NT are known as operating systems
114) Information on a computer is
stored as analog data
115) A spread sheet that works
like a calculator for keeping track of money and making budgets
116) To take information from one
source and bring it to your computer is referred to as download
117) Each box in a spread sheet is
called a cell
118) Network components are
connected to the same cable in the bus topology
119) Two or more computers
connected to each other for sharing information form a network
120) A computer checks the
database of user names and passwords for a match before granting access.
121) Spam is the other name for
unsolicited e-mail
122) Operating system controls the
various computer parts and allows the user to interact with the computer
123) Each cell in a Microsoft
Office Excel document is referred to by its cell address, which is the cell’s
row and column labels
124) Download is the process of
copying software programs from secondary storage media to the hard disk
125) The code for a web page is
written using Hypertext Markup Language
126) Small application programs
that run on a web page and may ensure a form is completed properly or provide
animation are known as Flash
127) A file is a unique name that
you give to a file of information
128) For seeing the output, you
use monitor
129) CDs are of round in shape
130) Control key is used in
combination with another key to perform a specific task
131) Scanner will translate images
of text, drawings and photos into digital form
132) CPU is the brain of the
computer
133) Something which has easily
understood instructions is said to be user friendly
134) Information on a computer is
stored as digital data
135) For creating a document, you
use new command at file menu
136) The programs and data kept in
main memory while the processor is using them
137) Ctrl + A command is used to
select the whole document
138) Sending an e-mail is same as
writing a letter
139) A Website address is a unique
name that identifies a specific website on the web
140) Answer sheets in bank
PO’s/Clerk’s examinations are checked by using Optical Mark Reader
141) Electronic data exchange
provides strategic and operational business opportunity
142) Digital signals used in ISDN
have whole number values
143) Assembler is language
translation software
144) Manual data can be put into
computer by scanner
145) In a bank, after
computerization cheques are taken care of by MICR
146) The banks use MICR device to
minimize conversion process
147) Image can be sent over
telephone lines by using scanner
148) Microchip elements are unique
to a smart card
149) MS-DOS is a single user
operating system
150) Basic can be used for
scientific and commercial purpose
151) All computers can execute
machine language programs
152) Programs stored in ROM can’t
be erased
153) Ethernet is used for high
speed telecommunications
154) IP address can change even if
the domain name remains same
155) Each directory entry can be
of 32 bytes
156) With the help of Control +
Del a letter can be erased in a word
157) Disk can keep maximum data
158) FORTRAN is a scientific
computer language
159) Computer language COBOL is
useful for commercial work
160) COBOL is a high standard
language like English
161) In computer the length of a
word can be measured by byte
162) Byte is the unit of storage
medium
163) ROM is not a computer
language
164) Oracle is a database software
165) Sequential circuit is full
aid
166) Processor is must for
computer
167) ROM keeps permanent memory
168) Screen display is called by
windows in lotus
169) Pascal is a computer language
170) Expanded form of IBM is
International business machine
171) IC chips are made of silicon
172) India’s Silicon Valley
situated at Bangalore
173) RAM and ROM are the storage
devices of computer
174) DOS is to create relation
between hardware and software
175) LOTUS 1-2-3 is software
176) Voice mail is a personal
security code for GSM subscribers
177) Tables holds actual data in
the database
178) Trojan is a virus
179) Static keys make WEB insecure
180) Video signal needs highest
bandwidth
181) Connectivity means
communication between systems
182) Controlling is not required
for high level language programs before it is executed
183) 3 out of three rollers are
responsible for the movement of cursor on screen
184) Hardware that adds two
numbers is arithmetic logical unit
185) Data accuracy is not done by
modem
186) LAN is used for networks
setup within a building
187) A data communication system
requires terminal device, communication channel, protocols
188) Most common channel used by
networks today is satellite
189) Run Time is not a type of
error
190) A five-digit card attribute
used for postal ZIP codes it will be restored as a numeric data
191) Computer viruses can be
attached to an executable program
192) MS-DOS was the first
operating system
193) The smallest space where
information on a hard disk is kept in a cluster
194) An information is processed
data
195) Intelligence is not a
characteristic of a computer
196) Private key is used to spend
a digital signature
197) Negative numbers can be
represented in binary
198) VDU is not an essential part
of a computer
199) The printers are line
printer, laser, dot matrix
200) Speed of clock of CPU is
measured in megahertz
201) Cache is not a secondary
storage device
202) Disk can be used to store
sequential files and random files
203) Windows is not an application
204) When taking the output
information is produced in hardcopy and/or softcopy form
205) Control unit’s function is to
decode program instructions
206) The most powerful type of
computer amongst the following is supercomputer
207) GO TO statement is used in C,
C++, basic language
208) File menu is selected to
print
209) The name a user assigns to a
document is called a filename
210) A processor is an electronic
device that processes data, converting it into information
211) Control words are words that
a programming language has set aside for its own use
212) Monitor and printer are the
two types of output devices
213) To access properties of an
object, the mouse technique to use is right-clicking
214) An operating system is a
program that makes the computer easier to use
215) Connections to the internet
using a phone line and a modem are called dial-up connections
216) To access a mainframe or
supercomputer, users often use a terminal
217) A flaw in a program that
causes it to produce incorrect or inappropriate results is called a bug
218) A web site address is a
unique name that identifies a specific web site on the web
219) Every component of your
computer is either hardware or software
220) To make the number pad act as
directional arrows, you press the num lock key
221) When creating a
word-processed document, formatting text involves the user changing how words
on the page appear, both on the screen and in printed form
222) The ALU performs simple
mathematics for the CPU
223) A computer program is a set
of keywords, symbols, and a system of rules for constructing statements by
which humans can communicate the instructions to be executed by a computer
224) The another word for program
is software
225) The name of the computer’s
brain is CPU
226) A computer is a device that
electronically processes data, converting it to information
227) Laptops are computers that
can be carried around easily
228) The secret code that
restricts entry to some programs is password
229) The basic goal of computer
process is to convert data into information
230) The disk is placed in the CPU
in a computer
231) A hard copy of a document is
printed on the printer
232) The name that the user gives
to a document is referred to as file name
233) Restarting a computer that is
already on is referred to as warm booting
234) E-mail is the transmission of
messages and files via a computer network
235) The person who writes and
tests computer programs is called a programmer
236) The information you put into
the computer is called data
237) The output devices make it
possible to view or print data
238) A chat is a typed
conversation that takes place on a computer
239) Hardware includes the
computer and all the devices connected to it that are used to input and output
data
240) The most common method of
entering text and numerical data into a computer system is through the use of a
keyboard
241) Mouse, keyboard, plotter are
the group consist of only input devices
242) 256 values can be represented
by a single byte
243) Transformation of input into
output is performed by the CPU
244) Vertical-market applications
can handle most system functions that aren’t handled directly by the operating
system
245) Device drivers are small,
special-purpose programs
246) LAN refers to a small,
single-site network
247) A set of instructions telling
the computer what to do is called program
248) Data going into the computer
is called input
249) If you receive an e-mail from
someone you don’t know, then delete it without opening it
250) Two options does a binary
choice offer
251) A collection of programs that
controls how you computer system runs and processes information is called
operating system
252) Rows and columns are data
organized in a spreadsheet
253) When cutting and pasting, the
item cut is temporarily stored in clipboard
254) When you are working on a
document on a PC, the document is temporarily stored in flash memory
255) One megabyte equals
approximately 1 million bytes
266) A cluster represents a group
of sectors
267) Digital signals used in ISDN
have discrete values
268) Assembler is language
translation software
269) Manual data can be put into
computer by scanner
270) Bandwidth means channel
capacity amount of data following via cables and measure of speed
271) Chip can keep maximum data
272) Debugging is the process of
finding errors in software code
273) Time Bomb are viruses that
are triggered by the passage of time or on a certain data
274) Linux is an open source
operating system
275) Boot sector viruses are often
transmitted by a floppy disk left in the floppy drive
276) Operating system controls the
way in which the computer system functions and provides a medium by which users
can interact with the computer
277) Servers are computers that
provide resources to other computers connected to a network
278) Field names describe what a
data field is
279) You must install router on a
network if you want to share a broadband internet connection
280) A goal of normalization is to
minimize the number of redundancy
281) Programs from the same
developer, sold, bundled, together, that are provide better integration and
share common features, tool box and menus are known as software suits
282) A data ware house is one that
organizes important subject areas
283) URL term identifies a
specific computer on the web and the main page of the entire site
284) A proxy server is used to
process client request for web pages
285) When data changes in multiple
list and list are not updated, this causes data inconsistency
286) Granting an outside
organization access to internet web pages is often implemented using a extranet
287) The code that relational
database management systems use to perform their database task is refer to as
SQL
288) URL stands for Uniform
resource locator
289) A data base management system
is a software system used to create, maintain and provide controlled access to
a database
290) The two broad categories of
software are system and application
291) The metal or plastic case
that holds all the physical parts of the computer is known as system unit
292) Data integrity means that the
data contained in the database is accurate and reliable
293) A local area network is a
private corporate network used exclusively by company categories
294) Eight bits equal to one byte
295) A byte can hold one character
data
296) A characteristic of a file
server is manages files operations and is shared on a network
298) The development process of
computer started in 1617
299) The role of Blaze Pascal in
the development of computer is addition and subtraction of numbers
300) The inventor of computer is
Charles Babbage.
301) The IBM made the first
electronic computer in 1953
302) The silicon based transistor
started to made by Gordon Tin in 1954
303) IBM is a company
304) The personal computer
invented in 1981
305) 1 Kilobyte is equal to 1024
bytes
306) LCD means liquid crystal
display
307) UPS converts DC voltage into
AC voltage
308) The word ZIP means Zicxac
Inline Pin
309) With the help of Pal switch
we can increase or decrease the speed of computer’s processing
310) The full form of MICR is
magnetic ink character reader
311) Swift networks are used
between banks
312) Panda is a virus
313) Boot sector is hardware
314) Debug searches the fault of
any software
315) OCR means optical character
recognition
316) The total printout of a
program is called listing
317) With the help of ZIP we can
decrease the size of any programs
318) We can format the hard disk
with the help of Booting
319) CANNED is called as readymade
software
320) The process of creating third
file by mixing two files is called as mail merging
321) The figures and lines etc.
made by computer is called as graphics
322) Each line represents 65
letters in a WordStar
323) Nokia- 7500 is not the
example of Micro Processor
324) The first name of the digital
computer is Unvake
325) The modern computer was
invented in 1946
326) The full form of DOS is disk
operating system
327) The expanded form of FORTRAN
is formula translation
328) The great revolution came in
computer sector in 1960
329) Magnetic tape is called as
Input device of computer
330) The first mechanical computer
of Charles Babbage is known as punch card machine
331) The IC chip used in computer
is generally made in silicon
332) Telephone broadcast is the
example of simplex transmission
333) Optical, Mechanical are the
kinds of mouse
334) Control panel is used for
increasing and decreasing the speed of the cursor of mouse
335) The capacity of modern main
frame digital computer is 10(to the power of -12) mbps
336) With the help of my computer
we can know about the usage and availability of space in computer
337) We use both MS-Word and page
maker for making resume
338) Earliest computers that would
work with FORTRAN was second generation
339) Back Ups in database are
maintained for to restore the lost data
340) IDEA is a encryption
technique
341) DBRM takes care of storage of
data in a database
342) The job of DBMS is to
decrease redundancy
343) Digital signatures use
encryption for authenticating
344) OS acts as intermediary
agency between user and hardware
345) Plotters gives the highest
quality output
346) ROM is built in memory in
computer
347) FLASH is a RAM
348) PRAM is not a RAM
349) FLASH device is used in cell
phones
350) Internal storage is same as
the primary storage
351) IMAC is name of a machine
352) First generation computers
could do batch processing
353) The analytic engine was
created by Charles Babbage
354) Voicemail of GSM service
provider has the personal security code for its subscribers
355) Senior manager decided about
the division of work with respect to IT security
356) Encrypting file system of
window XP professional operating system protects the data of a user, even if
the computer is shared between users
357) The .mpeg is the format of a
movie file
358) Controlling is NOT required
for high level language program before it is executed
359) A plotter is output device
360) 80286 is a hardware part of
microprocessor
361) Top-bottom approach can not
be the measure of network traffic
362) A switching mode power supply
is used for converting raw input power to stabilize DC power
363) Spooler can manage the whole
printing process
364) Validity routines control
procedures can be used to ensure completeness of data
365) Less expensive than leased
line networks is not a characteristic of virtual private networks (PVN)
366) Program policy framework
provides strategic direction to an organization
367) Cross bar switches have
common control
368) Row-level security is the
most basic part for database security
369) Voice recognition software
can not be used for converting text into voice
370) The user account can only be
created by the network administrator
371) IBM-700 belongs to second
generation
372) Allocating adequate bandwidth
would help her in speeding up the data transfer over net
373) BCD means binary coded
decimal
374) Extended system configuration
data is same as BIOS
375) Digitizer is an input device
376) Caramel is the latest
platform of Intel Centrio microprocessor
377) RISC is known as storage device
378) NORTON is an anti-virus
379) The system file of an
operating system is COM
380) ATMs of bank have real
currency
381) A program that converts high
level language to machine language is assembler
382) ‘.txt’ files can be made in
notepad, MS word, DOS editor
383) .Zip is a compressed file
384) Internet is a WAN
385) MP3 technology compresses a
sound sequence to one-twelfth of its original size
386) At a time only one operating
system can be at work on a computer
387) If multiple programs can be
executed at the same time, it is distributed operating system
388) If the operating system
provides quick attention, it is real time operating system
389) Distributed operating system
uses network facility
390) FORMAT command in MS-DOS is
used for recreating disk information
391) COPY command in MS-DOS is
used to copy one or more files in disk drive to another, copy from one
directory to another directory
392) REN command is Internal
command
393) Tom Burners-Li propounded the
concept of “World wide web”
394) The memory address sent from
the CPU to the main memory over a set of wires is called address bus
395) MODEM is an electronic device
required the computer to connect to the INTERNET
396) A source program is a program
which is to be Tran scripted in machine language
397) Virus in computer relates to
program
398) Floppy is not a storage
medium in the computer related hardware
399) DOS floppy disk does not have
a boot record
400) The CPU in a computer
comprises of Store, arithmetic and logical unit and control unit
401) In computer parlor a mouse is
a screen saver
402) UNIVA is the name of the
computer which was first used for programming and playing of music
403) The IC chips for computer is
prepared from silicon
404) Database management systems
are comprised of tables that made up of rows called records and columns called
fields
405) Nano is equal to 10(to the
power of -9)
406) In computers RAM is a
non-volatile memory
407) Disk and tape drives are
commonly used as hard copy
408) When computer is connected to
LAN and data is sent across it for storage/processing is online processing
409) The primary storage unit is
also referred to as internal storage
410) Oracle is not an operating
system
411) Data are raw facts and
figures
412) Holding of all data and
instructions to be processed is one of the functions of storage unit
413) To select the entire row in
Excel, click mouse at row heading
414) Database is known as
structured data
415) Normal view and outline view
notes pane appears in power point
416) The user protection feature
of an operating system is required in multi-user system only
417) In word, Ctrl + Del
combination of keys press to delete an entire word
418) In MS-Word double clicking a
word selects the word
419) Word document can be
navigated in web layout view
420) In Excel, addressing mode(s)
that can be used in a formula is/are only absolute and relative
421) Note page views can you use
to show just the slide and its contents
422) Hardware that adds two
numbers is arithmetic logical unit
423) The computer as a machine and
all other physical equipment associated with it are termed as hardware
424) Plotters are very useful in
applications such as computer aided design
425) Corel DRAW is a graphic
package
426) The print to file option
creates .prn file
427) The enhanced keyboard
contains 101 keys
428) Data processing cycle
consists of input cycle, output cycle and processing cycle
429) Page Setup is not an option
of Edit menu
430) Radar chart is used to show a
correlation between two data series
431) A computerized business
information system includes hardware, software and data facts
432) Purchase order file is a
transaction file
433) A typical computerized
business application system will have both master and transaction file
434) Problem identification is taken
first in designing a program
435) The purpose of the EXIT
command is to get out of a condition loop
436) Employees details is a master
file for the pay roll system
437) A slow memory can be
connected to 8085 by using READY
438) A processor needs software
interrupt to obtain system services which need execution of privileged
instructions
439) A CPU has two modes-
privileged and non-privileged. In order to change the mode from the privileged
to the non-privileged, a software interrupt is needed
440) Swap space resides at disk
441) The process of assigning load
addressed to the various parts of the program and adjusting the code and data
in the program to reflect the assigned address is called relocation
442)1 Sector= 4096 bytes
443) Two stacks of size required
to implement a queue of size n
444) 1 Floppy = 6, 30,784 bytes or
308 KB
445) Consider a machine with 64 MB
physical memory and a 32-bit virtual address space. If the page size is 4 KB,
then size of the page table is 2 MB
446) Consider a virtual memory
system with FIFO page replacement policy. For an arbitrary page access pattern,
increasing the number of page frames in main memory will always decrease the
number of page faults
447) Consider a scheme R(A, B, C,
D) and functional dependencies A->B and C-> D. Then the decomposition of
R into R1 (AB) and R2 (CD) is dependency preserving and lossless join
448) Main memory requires a device
driver
449) RAM can be divided into 2
types
450) Two friends suitably arrange
4 blocks of different colors to exchange coded information between them. 4 bits
of information is one exchanging each time
451) Cache memory is a part of
main memory
452) The number 43 in 2’s
complement representation is 01010101
453) The 8085 microprocessor
responds to the presence of an interrupt by checking the TRAP pin for ‘high’
status at the end of each instruction fetch
454) All machinery and apparatus
of computer is called hardware
455) The number 1024 bytes is the
complement representation of 1 Kilo byte
456) System design specifications
do not include blueprint showing the layout of hardware
457) Web pages are uniquely
identified using URL
458) The results of arithmetic and
logical operations are stored in an accumulator
459) The input device that is
closely related to touch screen is the light pen
500) F2 keys of control center
specified below displays data, toggles browse/edit
501) A compiler breaks the source
code into a uniform stream of tokens by lexical analysis
502) The number of processes that
may running at the same time in a large system can be thousands
503) LET.BAS files are related to
Microsoft word utility
504) A command in UNIX can have
one or more arguments
505) A hard disk is logically
organized according to cylinders and sectors
506) A frame can include text
& graphics, tables & graphics, graphics
507) All the formatting data for
the paragraph is stored in the paragraph mark
508) The abbreviation CAD stands
for computer aided design
509) We can define hypertext
definition in notebooks using Macsyma 2.0
510) The addressing mode(s) that
can be used in a formula is/are- absolute, relative and mixed
511) WINDOWS can work in enhanced
and standard modes
512) The part of a machine level
instruction which tells the central processor what has to be done is an
operation code
513) O-Matrix software packages do
not have animation capabilities
514) In order to paste text form
the clipboard in the document being edited, press the Ctrl-A key
515) A program that converts a
high level language program to a set of instructions that can run on a computer
is called a compiler
516) Faster execution of programs
is not an advantage of a subroutine
517) First generation of computer
period is 1945-1950
518) IBM built first PC in the
year 1981
519) A small computer program
embedded within an HTML document when a user retrieves the web page from a web
server is called an applet
520) Another name for systems
implementation is transformation
521) The central host computer or
file server in a star network maintains control with its connecting devices through
polling
522) C++ does not check whether
the index value is within scope
523) The browser uses uniform
resource locator to connect to the location or address of internet resources
524) In the centralized computing
architecture, the entire file is downloaded from the host computer to the
user’s computer in response to a request for data
525) An expert system enables one
or more users to move and react to what their senses perceive in a computer
simulated environment
526) Popping or removing an
element from an empty stack is called underflow
527) The ability to combine data
and operations on that data in a single unit is known as polymorphism
528) A router is a device that
sites between your internal network and the internet and limits access into and
out of your network based on your organization’s access policy
529) In C++, private, protected,
and public are reserved words and are called member access specifiers
530) The integration of all kinds
of media such as audio, video, voice, graphics and text into one coherent
presentation combined is called multimedia
531) The derived class can
redefine the public member functions of the base class
532) A technique for searching
special databases, called data warehouses, looking for related information and
patterns is called data mining
533) Like the quick sort the merge
sort uses the divide and conquer technique to sort a list
534) The use of expert systems
technology can greatly reduce the number of calls routed to a customer service
department
535) Building a list in the
backward manner, a new node is always inserted at the beginning of the list
536) Creating a web site is also
called web authoring
537) Using the optimization
analysis approach, the expert system starts with a conclusion and tries to
verify that the rules, facts, and conclusion all match. If not, the expert
system chooses another conclusion
538) Both the application program
and operating system program only describes the software
539) Root is one of the items
given below is not an item of the menu bar
540) BACKUP is not an internal
command
541) In a disk, each block of data
is written into one sector
542) Hard copy is a printed copy
of machine output
543) A boot strap is a small
utilization computer program to start up in inactive computer
544) CAD is oriented towards
software
545) Icons are picture commands
546) IBM company for the first
time launched pocket computers
547) PROM is a computer part
548) Algorithms can handle most
system functions that aren’t handled directly by the operating system
549) Device drivers are small,
special-purpose programs
550) LAN refers to a small, single
site network
551) A collection of programs that
controls how your computer system runs and processes information is called
operating system
552) When we are working on a
document on a PC the document is temporarily stored in RAM
553) Information travels between
components on the motherboard through buses
554) Microsoft is a vertical
market application
555) RAM refers to the memory in
your computer
556) Computers connected to a LAN
can share information and / or share equipment
557) Magnetic tape is not
practical for applications where data must be quickly recalled because tape is
a sequential access medium
558) In Late 1988 computer viruses
land in India for the first time
559) ALU is a part of the CPU
560) In computer technology a
compiler means a program, which translates source program into object program
561) American computer company IBM
is called big blue
562) The first IBM PC did not have
any ROM
563) The digital computer was
developed primarily in UK
564) Programs which protect a disk
from catching an infection are called antidotes
565) The first movie with terrific
computer animation and graphics was released in 1982 is Tron
566) An integrated circuit is
fabricated on a tiny silicon chip
567) The word size of a
microprocessor refers to the amount of information that can be stored in the
byte
568) Daisy-wheel printer cannot
print graphics
569) In the IBM PC-AT, the word AT
stands for advanced terminology
570) Dedicated computer means
which is assigned one and only one task
571) Real time programming type of
computers programming is used for aero plane ticket reservation system
572) RAM means memory which can be
both read and written to
573) Laser printer uses light beam
and electro statically sensitive black powder
574) The Santa Clara Valley,
California is popularly known a Silicon Valley of America because many silicon
chip manufacturing firms are located there
575) A program written in machine
language is called assembler
576) International business
machine was the first company in the world to build computer for sale
577) PARAM is a parallel computer
578) For communications, wide area
networks use special purpose telephone wires and fiber optic cables and microwaves
579) Data transfer rate in modems
is measured in bits per second
580) A compiler cannot detect
logical errors in source programs
581) Throughput, turnaround time,
response time are measures of system performance
582) OLTP architecture can handle
a limited number of dimensions whereas OLAP architecture does not have any
limit on the number of dimensions
583) The binary equivalent of
(40.125) suffix 10 is 101000.001
584) Kernel is the only art of an
operating system that a user cannot replace or modify
585) Symbol signifies a magnetic
disk
586) COBOL programming language
was initially developed for consumer electronics goods
587) Running, blocked, ready,
terminated are different states of a process
588) Rational rose is an example
of a modeling language
589) A disk worm is an example of
optical devices
590) A RAID is a disk array
591) The first private internet
service provider in India was Satyam infoway
592) The maximum and minimum
unsigned number which can be stored in a 8 bit word is 0 and 255
593) Stack is a part of memory
594) HIT RATIO is associated with
cache performance
595) Laser printer is a page
printer
596) Storage capacity of a disk
system depends upon number of recording surfaces and number of sectors per
track
597) Abstraction is associated
with object oriented technology and database technology
598) The terms opcode and operand
are associated with any high level language
599) Dynamic binding is associated
with object oriented programming
600) The term CHIP, JEWELLARY
means a processor with high capacity
601) A watch point is associated
with debugger
602) A multithreaded program uses
multiple processes
603) Time sharing is a mechanism
to provide spontaneous interactive use of a computer system by many users in
such a way that each user is given the impression that he/she has his/her own
computer
604) The typical scheme of memory
management used in IBMOS/360 mainframe system was that of multiprogramming with
variable number of memory partitions
605) The concepts used for
realization of virtual memory are swapping, demand paging and In-line secondary
storage
606) Oracle 8i is an example of
OORDBMS
607) ALPHA, RIOS, SPARC are
examples of RISC Processors
608) The scope of an identifier
refers to where in the program an identifier is accessible
609) Hierarchy is not a component
of relational database
610) A two-way selection in C++ is
the if…else
611) A recursive function executes
more efficiently than its iterative counterpart
612) The body of the recursive
function contains a statement that causes the same function to execute before
completing the last call
613) Variables that are created
during program execution are called dynamic variables
614) When destroying a list, we
need a delete pointer to deallocate the memory
615) The first character in the
ASCII character set is the null character, which is nonprintable
616) A variable for which memory
is allocated at block entry and deallocated at block exit is called a static
variable
617) Signal to noise ratio
compares signal strength to noise level
618) The ability to create new
objects from existing objects is known as inheritance
619) Software tools that provide
automated support for the systems development process are OLAP tools
620) Applications/Web server tier
processes HTTP protocol, scripting tasks, performs calculations, and provides
access to data
621) A language used to describe
the syntax rules is known as meta language
622) In a preorder traversal, the
binary tree is traversed as follows
623) The general syntax of the
function prototype of a value returning function is function name (parameter
list)
624) Competitive intelligence is
the process of gathering enough of the right information in a timely manner and
usable form and analyzing it so that it can have a positive impact
625) Tracing values through a
sequence is called a play out
626) In a binary tree, each
comparison is drawn as a circle, called a node
627) The term used as a
measurement of a communication channel’s data capacity is bandwidth
628) In addition to the nature of
the problem, the other key factor in determining the best solution method is
function
629) An E-R data model solves the
problem of presenting huge information system data models is to users and
developers
630) In C++, predefined functions
are organized into separate libraries
631) The standard protocol
(communication rules for exchange of data) of the internet is TCP/IP
632) For efficiency purposes,
wherever possible, you should overload operators as member functions
633) Modifying algorithms that
change the order of the elements, not their values, are also called modifying
algorithms
634) As long as the tables in a
relational database share at least one common data attribute, the tables in a
relational database can be normalized to provide useful information and reports
635) DBMS is a simple, fourth
generation language used for data retrieval
636) An occurrence of an
undesirable situation that can be detected during program execution is known a
exception
637) A photo of the company
headquarters would be an example of the use of a static web page
638) The Pentium processor
contains thousands of transistors
639) SOI technology has been
successful with reference to SRAM
640) Secondary storage device is
needed to print output results
641) Static random access memory
does not fall under the category of secondary storage devices
642) Floppy disk is universal,
portable and inexpensive but has its own limitation in terms of storage
capacity and speed
643) Some physical property of the
microscopic area of the disk surface is changed for recording in common for all
types of disks
644) In a disk, each block of data
is written into two or more sectors
645) A floppy disk rotates at
100rpm
646) A hard disk has 500 to 1000
tracks or more
647) The storage capacity of a
cartridge tape is 400 MB
648) Single density recording is
also known as frequency modulation
649) Printer is not an input
device
650) The input device that is most
closely related to a touch screen is the light pen
651) Laser printer generates
characters from a grid of pins
652) The liquid crystal display
works on the basis of the relation between polaristion and electric field
653) A COBOL program in source
code is not considered to be system software
654) Firmware stored in a hard
disk
655) A compiler breaks the source
code into a uniform stream of tokens by lexical analysis
656) Sorting of a file tasks is
not performed by a file utility program
657) Floppy disk does not generate
a hardware interrupt
658) Ada language is associated
with real time processing
659) MS DOS is usually supplied on
a cartridge tape
660) BREAK is not an internal DOS
command
661) Kernel of MS-DOS software
resides in ROM
662) The UNIX operating system
(available commercially) has been written in C language
663) MS-DOS has better file
security system as compared to UNIX
664) UNIX is only a
multiprogramming system
665) The UNIX operating system
uses three files to do the task mentioned
666) In UNIX, end-of-file is
indicated by typing CTRL D
667) Abacus is said to be invented
by Chinese
668) An operating system is
necessary to work on a computer
669) The first UNIX operating
system, as it was in the development stage, was written in the assembly
language
670) FAST drivers scientific
software packages was developed under contract with NASA
671) LEFT () is not a date
function
672) FIF editor is a windows based
application
673) Graphics is inserted in frame
674) A language translator is best
described as a system software
675) The specification of a floppy
is identified by TPI
676) DISC () is not a database function
677) In opening menu of word star
C OPTION should be selected for protecting a file
678) The most advanced form of ROM
is electronically erasable programmable ROM
679) Secondary storage device is
needed to store large volumes of data and programs that exceed the capacity of
the main memory
680) MORE sends contents of the
screen to an output device
681) NFS stands for N/W file
system
682) Main protocol used in
internet is TCP/IP
683) We can create a simple web
page by using front page express
684) The first line/bar on the
word window where the name of the document is displayed is called title bar
685) The clock frequency of a
Pentium processor is 50 MHz
686) The input device that is most
likely to be used to play computer games is the joystick
687) Linking the program library
with main program is not performed by a file utility program
688) The UNIX operating system has
been written in C language
689) BIOS of MS-DOS resides in ROM
690) The sector size of a floppy
disk varies from 128 bytes to 1024 bytes
691) A program type of errors is
flagged by compilers
692) A floppy diskette is
organized according to tracks and sectors
693) In word star, the maximum
permissible length of search string is 65
694) C is a third generation high
level language
695) A CPU has a 16-bit program
counter. This means that the CPU can address 64 K memory locations
696) STR () is used for converting
a numeric into a character string
697) BASIC language is normally
used along with an interpreter
698) In UNIX, open files are shared
between the parent and the child
699) In spite of the extra power
needed for refreshing. DRAMs are widely used in computers because of its lower
cost relatives to SRAMs
700) PIF editor belongs to Main
group.
701) SUM () is not a financial
function
702) 98/04/12 cannot be used to
enter a date
703) Windows is popular because of
its being expensive
704) Personal computers currently
sold in India have main memories at an entry level in the range of megabytes
705) The unit in CPU or processor,
which performs arithmetic and logical operations is ALU
706) RAM is volatile
707) The result of arithmetic and
logical operations is stored in an accumulator
708) A small amount of memory
included in the processor for high speed access is called cache
709) A bus is an electronic track
system
710) A co-processor is used to
improve the speed of mathematical calculations
711) Intel 80286 belongs to third
generation microprocessors
712) A hexadigit can be
represented by eight binary bits
713) The number of processes that
may running at the same time in a large system can be thousands
714) FORTRAN is a 3GL
715) Root is not an item of the
Menu bar
716) Difficult to do what it
projects is not considered to be a feature of the spreadsheet
717) While starting the Lotus
1-2-3, the current cell reference is shown at top left hand corner of the
screen
718) Bill gates is the chief of
Microsoft
719) Excel office assistant can be
made to appear by using F1 key and help menu
720) 9 per page is the max no of
showing positioning of per page handouts
721) Alignment buttons are
available on formatting toolbar
722) Pico second is 10(to the
power of-9)
723) Logo refers to a computer
language
724) The most appropriate command
to permanently remove all records from the current table is Zap
725) The efficient and well
designed computerized payroll system would be on-line real time system
726) The scripts which are
designed to receive value from Web users is CGI script
727) WAIS stands for – wide
assumed information section
728) Modem is used for connecting
PC using telephone lines
729) Token bus is the most popular
LAN protocol for bus topology
730) Manipulating data to create
information is known as analysis
731) A separate document form
another program sent along with an E-mail message is known as E-mail attachment
732) When you boot up a PC —
portions of the operating system are copied from disk into memory
733) Correcting errors in a
program is called debugging
734) A word processor would most
likely be used to type a biography
735) A database is an organized
collection of data about a single entity
736) Fire fox is a web browser
737) Most of the commonly used
personal computers/laptops do not have a command key known as turnover
738) Full form of USB is known as
Universal serial bus
739) The quickest and easiest way
in Word to locate a particular word or phrase in a document is to use the find
command
740) Computer sends and receives
data in the form of digital signals
741) Icons are graphical objects
used to represent commonly used application
742) Most World Wide Web pages
contain HTML commands in the language
743) In any window, the maximize
button, the minimize button and the close buttons appear on the title bar
744) Checking that a pin code
number is valid before it is entered into the system in an example of data
validation
745) Windows 95 and windows 98 and
Windows NT are known as operating systems
746) Information on a computer is
stored as analog data
747) A program that works like a
calculator for keeping track of money and making budgets is spreadsheet
748) To take information from one
source and bring it to your computer is referred to as download
749) Windows is not a common
feature of software applications
750) A toolbar contains buttons
and menus that provide quick access to commonly used commands
751) Input device is an equipment
used to capture information and commands
752) Most of the commonly
available personal computers/laptops have a keyboard popularly known as QWERTY
753) Editing a document consists
of reading through the document you’ve created then—correcting your errors
754) Virtual Box is not a famous
operating system
755) Junk e-mail is also called
spam
756) DOC is the default file
extension for all word documents
757) .bas, .doc and .htm are
examples of extensions
758) Codes consisting of bars or
lines of varying widths or lengths that are computer readable are known as a
bar code
759) Convenience, speed of
delivery, generally and reliability are all considered as the advantages of
e-mail
760) E-commerce allows companies
to conduct business over the internet
761) The most important or
powerful computer in a typical network is network server
762) To make a notebook act as a
desktop model, the notebook can be connected to a docking station which is
connected to a monitor and other devices
763) Storage that retains its data
after the power is turned off is referred to as non-volatile storage
764) Virtual memory is memory on
the hard disk that the CPU uses as an extended RAM
765) To move to the beginning of a
line of text, press the home key
766) When sending and e-mail, the
subject line describes the contents of the message
767) Microsoft is an application
suite
768) Information travels between
components on the motherboard through bays
769) One advantage of dial-up
internet access is it utilizes existing telephone security
770) Network components are
connected to the same cable in the star topology
771) Booting checks to ensure the
components of the computer are operating and connected properly
772) Control key is used in
combination with another key to perform a specific task
773) Scanner will translate images
of text, drawings, and photos into digital form
774) Information on a computer is
stored as digital data
775) The programs and data kept in
main memory while the processor is using them
776) Storage unit provide storage
for information and instruction
777) Help menu button exist at
start
778) Microsoft company developed
MS Office 2000
779) Charles Babbage is called the
father of modern computing
780) Data link layer of OSI reference
model provides the service of error detection and control to the highest layer
781) Optical fiber is not a
network
782) OMR is used to read choice
filled up by the student in common entrance test
783) A network that spreads over
cities is WAN
784) File Manager is not a part of
a standard office suite
785) A topology of computer
network means cabling between PCs
786) In UNIX command “Ctrl + Z” is
used to suspend current process or command
787) Word is the word processor in
MS Office
788) Network layer of an ISO-OSI
reference model is for networking support
789) Telnet helps in remote login
790) MS Word allows creation of
.DOC type of documents by default
791) In case of MS-access, the
rows of a table correspond to records
792) Record maintenance in database
is not a characteristic of E-mail
793) In a SONET system, an
add/drop multipliers removes noise from a signal and can also add/remove
headers
794) The WWW standard allows
grammars on many different computer platforms to show the information on a server.
Such programmers are called Web Browsers
795) One of the oldest calculating
device was abacus
796) Paint art is not a special
program in MS Office
797) Outlook Express is a e-mail
client, scheduler, address book
798) The first generation
computers had vacuum tubes and magnetic drum
799) Office Assistant is an
animated character that gives help in MSOffice
800) Alta Vista has been created
by research facility of Digital Electronic corporation of USA
801) We are shifting towards
computerization because technologies help in meeting the business objectives
802) Spiders search engines
continuously send out that starts on a homepage of a server and pursue all
links stepwise
803) Static keys make a network
insecure
804) Joy Stick is an input device
that cannot be used to work in MS Office
805) Artificial intelligence can
be used in every sphere of life because of its ability to think like human
beings
806) To avoid the wastage of
memory, the instruction length should be of word size which is multiple of
character size
807) Electronic fund transfer is
the exchange of money from one account to another
808) Format menu in MS Word can be
use to change page size and typeface
809) Assembly language programs
are written using Mnemonics
810) DMA module can communicate
with CPU through cycle stealing
811) A stored link to a web page,
in order to have a quick and easy access to it later, is called bookmark
812) B2B type of commerce is
characterized by low volume and high value transactions in banking
813) Advanced is not a standard MS
Office edition
814) Workstation is single user
computer with many features and good processing power
815) History list is the name of
list that stores the URL’s of web pages and links visited in past few days
816) FDDI access mechanism is similar
to that of IEEE 802.5
817) MS Office 2000 included a
full-fledged web designing software are called FrontPage 2000
818) Macintosh is IBM’s
microcomputer
819) X.21 is physical level
standard for X.25
820) Enter key should be pressed
to start a new paragraph in MS Word
821) Main frame is most reliable,
robust and has a very high processing power.
822) Formatting of these toolbars
allows changing of Fonts and their sizes
823) The ZZ command is used to
quit editor after saving
824) The program supplied by VSNL
when you ask for internet connection for the e-mail access is pine
825) The convenient place to store
contact information for quick, retrieval is address book
826) Digital cash is not a
component of an e-wanet
827) For electronic banking, we
should ensure the existence and procedures with regard to identification of
customers who become members electronically
828) Jon Von Neumann developed
stored-program concept
829) Hardware and software are
mandatory parts of complete PC system
830) Firewall is used in PC for
security
831) Two rollers are actually
responsible for movement of the cursor in mouse
832) In case of a virus getting
into computer NORTON will help
833) Tour the server room is to be
done by the auditor while internet banking services audit
834) Documentation while
developing a software for a Bank is required for auditing
835) Water supply has not become
computerized
836) Concurrency control in
distributed database supports multi-user access
837) Fifth generation computers
are knowledge processors
838) Transistors were first used
in 2nd generation computers
839) Intelligence is not a
characteristic of a computer
840) A camera is an processing
machine
841) To protect organization from
virus or attacks all mails sent and received should be monitored, all messages
should be encrypted, E- mails should be used only for official purpose
842) Internet collects millions of
people all over the world
843) A computer based information
system is a system in which a computer is used to process data to get information
844) The time between program
input and outputs is called execution time
845) Third generations of
computers have On-line real time systems
846) MIME is a compressor that
packages different formats into SMTP compatible type
847) The earliest software was
developed using the waterfall model
848) EDI e- commerce system can
handle non monetary documents
849) Collection to tracks on a
disk forms spindle
850) A disk where number of
sectors are fixed is called hard sectored
851) Half duplex transmission
techniques let computer to alternatively send and receive data
852) Multiplexing combines signals
from different sources into one and sends on a faster channel
853) Message switcher chooses
correct data path for an incoming message and forwards it to relevant line
854) Speech recognition use
thermal sensors along with infrared rays for identification
855) Trojan horse are self
replicating malicious code independent of the action of the user, but slow down
the processor on entering a network
856) Generation of PIN in bank ATM
would require PIN entered is encrypted
857) Availability, integrity,
confidentiality is most necessary for data to be useful
858) Grid is a supercomputer
created by networking many small computers
859) A character that changes its
value throughout the program is called variables
860) A program coded in
programming is done by assembling
861) In write mode of file
existing text is replaced by new one
862) When an organization gives
contract for development of a software, it has to give data to the service
provider. In such cases, the ownership of data should be with the
client/organization that outsource services
863) Under a centralized
organization Intranet be an effective networking tools
864) For optical fiber used in
point to point transmission, the repeater spacing is 10-100 km
865) Favorites are accessible from
the start menu
866) Task pre-emption, task
priority and semaphores are not needed by server program from an operation
system
867) The objective of
multiprogramming operating system is to maximize CPU utilization
868) The environment provided to
ASP is based on Client/server
869) HUB is layer1 device, central
device, dumb device
870) The UNIX, echi command is
used to display the message or value of any variable on the screen
871) QAM is used in high speed
modem
872) Frame Relay technique uses
connection oriented
873) Bipolar always has a non-zero
average amplitude
874) In a SONET system, an
add/drop multipliers can remove signals from a path
875) The server on the internet is
also known as Host
876) For multiple branching in ‘C’
we use switch statement
877) Web site is a collection of
HTML documents, graphic files, audio and video files
878) The first network that
initiated the internet was ARPANET
879) In MODEMS a digital signal
changes some characteristic of a carrier wave
880) The binary values are
represented by two different frequencies in frequency shift keying
881) Messenger mailbox is present
in Netscape communicator
882) Switching is a method in
which multiple communication devices are connected to one another efficiently
883) A bridge recognizes addresses
of layer 3
884) EPROM is permanent storage
device
885) “.TIF” extension name stands
for tagged image format
886) The overhead using BRI is 10
percent of the total data rate
887) In programming languages the
key word “Void” means it does not return any value when finished
888) The keyboard shortcut to
restart your computer is Ctrl + Alt + Del
889) FORTRAN is not a programming
language
890) The instruction LOAD A is a
one address instruction
891) MS-Excel is also known as
spread sheet
892) Manchester encoding is used
in Ethernet technology
893) The instruction of a program
which is currently being executed are stored in main memory
894) In DOS environment, the
command used to save the file is ^Z
895) All high level language uses
compiler and interpreter
896) In html coding <p> ……
</p> tag is used to display a paragraph
897) In HTML coding, the following
attributes color, size, face used in font tag
898) DHTML stands for dynamic
hyper text markup language
899) Fiber optics cable supports
data rate up to 100 mbps to 2 gbps
900) In Photoshop software we can
modify, delete, and edit the image
901) Most common channel used by
networks today is telephone lines
902) Sybase SQL server and
Microsoft SQL server 7.0 is not an example of RDBMS
903) In programming language, Null
point is used to tell end of linked list
904) A technique which collects
all deleted space onto free storage list is called garbage collection
905) Node to node delivery of the
data unit is the responsibility of the data link layer
906) Insulating material is the
major factor that makes co axial cable less susceptible to noise than twisted
pair cable
907) A data communication system
covering an area the size of a town or city is MAN
908) Virtual memory system allows
the employment of the full address space
909) The basic circuit of ECL
supports the OR-NOR logic
910) Micro instructions are kept
in control store
911) In HTML coding no shade
attribute of HR tag suppresses the shading effect and fields a solid line
912) Internet domains are
classified by their functions. In that regard “.com” represents commercial
913) HTTP in URL stands for hyper
text transfer protocol
914) The “Nyquist theorem”
specifies the minimum sampling rate to be twice the bandwidth of a signal
915) Memory allocation at the
routine is known as dynamic memory allocation
916) In HTML loading, <BR>
tag is used for displaying a new line
917) HTTP protocols are used by
internet mail
918) A policy on firewalls needs
not ensure that it is logically secured
919) The script which is designed
to receive value from the web users is java script
920) GET method and HEAD method is
the C91 method of involving a C91 program
921) Analog switched line
telephone service is least expensive
922) A toll used to find a synonym
or antonym for a particular word is thesaurus
923) In C++ coding,
Cout<<”tent”; is used to display character or strings or numeric screen
924) In this processing, a number
of jobs are put together and executed as a group batch processing
925) The process of finding and
correcting errors in a program is a process called debugging
926) cn pass command is used to
change your password in UNIX system
927) HTML code is always starts
with <html> </html>
928) If there are 5 routers and b
networks in an internet work using link state routing, there will be 5 routing
tables
929) A scripting language similar
to HTML and which runs only on a browser is java script
930) By RAID technique, data is
stored in several disk units by breaking them into smaller pieces and storing
each piece in separate disk
931) The most popular network
protocol whose routing capabilities provide maximum flexibility in an
enterprise wide network is known as TCP/IP
932) New group that enable you to
communicate with other Microsoft windows user about issues and concerns with
your computer
933) Analog-digital conversion
type needs sampling of a signal
934) In an optical fiber, the
inner core is less dense than the cladding
935) Six types of heading are
available in HTML
936) RDBMS is an acronym for
relational database management system
937) In MS-Word, page layout view
is also known as true WYS/WYG
938) In HTML coding, <UL>
(Unordered list) is used to give bullets in your document
939) Transmission media are
usually categorized as guided or unguided
940) A virtual circuit is the
physical connection between an end point and a switch or between two switches
941) Passing of the frame to next
station can happen at a token ring station
942) R-C coupling method is
suitable for voltage amplification
943) Normal is not a type of HTML
pages
944) In HTML coding <LI> tag
is used for denoting items in a list of type <UL>
945) In MS-Word the keyboard
shortcut F7 used for spelling and grammar check
946) DBMS is not an operating
system
947) HTML is basically used to
design web-site
948) In HTML coding, Dynamic
web-pages are created in advance of the user’s request
949) In Dos, primary name of a
file can have a maximum of 10 characters
950) du command is used to show
file system disk usage in UNIX
951) Maximum length of a text file
is 255 characters
952) Frame format of CSMA/CD and
Ethernet protocol differ in the block error control
953) On an Ethernet LAN
implementation with 10 base 5 the maximum number of segments can be five
954) Overflow condition in linked
list may occur when attempting to create a node when linked list is empty
955) Code segment register is
where the microprocessor looks for instruction
956) Web-site is collection of
web-pages and Home-page is the very first page that we see on opening of a
web-site
957) The subsystem of the kernel
and hardware that cooperates to translate virtual to physical addresses
comprises memory management subsystem
958) A device operating at the
physical layer is called a repeater
959) FORTRAN is a mathematically
oriented languages used for scientific problems
960) If we want to convert the
text which is in small letters to capital letters then select the required text
and press Shift +F3
961) Datagram packet switching
uses the entire capacity of a dedicated link
962) In the datagram approach to
packet switching, each packet of a message follows the same path from sender to
receiver
963) FDM technique transmits
analog signals
964) X.21 protocol consists of
only physical level
965) In a dedicated link, the only
traffic is between the two connected devices
966) In a start topology, if there
are n devices in network, each device has n-1
967) A unique number assigned to a
process when the process first starts running PID
968) Modems is necessary for
multiplexing
969) In MS-Word WYSIWYG stands for
what you see is where you get
970) The primary purpose of
shutdown procedure in UNIX system is that all active process may be properly
closed
971) In time- division circuit
switching, delivery of data is delayed because data must be stored and
retrieved from RAM
972) Subnet usually comprises
layers 1 & 2, layer 1 through 3 of OSI model
973) An image in a web-page can be
aligned left and right using HTML coding
974) RFC stands for request for
comment
975) Packet filtering firewall and
proxy firewall is not a type of firewall
976) Most news reader’s presents
news groups articles in threads
977) The sharing of a medium and
its path by two or more devices is called multiplexing
978) Sending messages, voice, and
video and graphics files over digital communication link is done by the method
e-mail
979) In a computer network, a
computer that can control a group of other computers for sharing information as
well as hardware utilities is known as server
980) Telephone number, zip code is
defined as a numeric field
981) In shell programming, tr
command is used for character translation
982) Cat text>>output would
append a file called test to the end of a file called output
983) In a network with 25
computers, mesh topology would require the more extensive cabling
984) Dialog control is a function
of the presentation layer
985) The program which takes user
input, interprets it and takes necessary action is shell
986) Most appropriate data structure
in C to represent linked list is array
987) Menu bar is usually located
below that title bar that provides categorized options
988) Latest version of Microsoft
Word is Word XP
989) You save your computer files
on disc and in folders
990) when the text automatically
goes onto the next line this is called word wrap
991) WYSIWYG is short for what you
see is what you get
992) Left justify is the same as
align left
993) To put text on the right of
the page use the align right button
994) Lotus 1-2-3 is a popular DOS
based spreadsheet package
995) 65,535 characters can be
typed in a single cell in excel
996) Comments put in cells are
called cell tip
997) Getting data from a cell
located in a different sheet is called referencing
998) A numeric value can be treated
as a label value if it precedes with apostrophe
999) Data can be arranged in a
worksheet in an easy to understand manner using auto formatting, applying
styles, changing fonts
1000) An excel workbook is a
collection of worksheets and charts.
1001) Most manufacturers setup
their BIOS to load into upper memory during the boot process
1002) Device drivers loaded in the
config.sys file is loaded into the following memory area: Conventional memory
1003) 40ns memory speeds is the
fastest
1004) System software often uses
the ROM BIOS
1005) In CMOS setup, if you enable
shadowing ROM is copied to RAM
1006) Static variables are local
to the block in which they are declared.
1007) During the normal PC boot
process, ROM BIOS is active first
1008) During boot-up, the memory
test checks and verifies that contiguous memory is installed
1009) 601 error code identifies a
floppy drive problem
1010) If you get frequent general
protection faults, this could indicate poor quality of memory chips
1011) You are looking at a memory
module thought to be a DIMM module. 168 pins would be on a DIMM module
1012) The system BIOS and ROM
chips are called firmware
1013) Extended located above the
first 1024K of memory
1014) WRAM type of RAM is normally
the fastest
1015) RAM component is used for
short-term data storage
1016) A SIMM has 40 pins
1017) RAM provides quickest access
to data
1018) Narrowcast linking is not a
transmission technology
1019) The data flow diagram is for
analyzing requirements of user
1020) The elements of computer processing
system are hardware, data, users and procedures
1021) On August 23, 2005 an
accounting clerk prepared an invoice dated August 31, 2005. Range check control
can check this
1022) Library management software
is for documenting the changes that are made to program and controlling the
version numbers of the programs
1023) Steganography is hiding the
data but not necessarily making it invisible and not easily detectable
1024) A computer is an electronic
device
1025) An online transaction is
transaction done via internet
1026) Using anti-virus software is
preventive measure
1027) For security we should
consider local data reduction, event correction low resource utilization
1028) OS is not a peripheral of PC
1029) The most common input device
used today is keyboard
1030) The third generation of the
computer were in 1965-1971
1031) Gateways to allow a network
to use the resources of another main frame is a component of internet
1032) Mouse cannot be shared
1033) EDI means electronic data
interface
1034) Mainframes network where a
huge compute does all computing and front end PCs are dumb terminals
1035) A modem that cannot be moved
from its position is called fixed modem
1036) A device that receives data
from slow speed devices, and transmits it to different locations is called
remote concentrator
1037) Organization would prefer in
house development of software to ensure that the development adhere to defined
quality
1038) Actual intelligence is not a
feature of PC
1039) Network that uses two OSI
protocol layers as against three used in X.25 is a “frame relay”
1040) Microsoft excel is versatile
application and spread sheet program
1041) System flowcharts show
relationship that link the input processing and output of the system
1042) To identifying the system to
be tested the penetration testing is done
1043) Platform in computer world
means computer hardware and operating systems
1044) A character that retains its
value during program execution is constants
1045) Data accuracy is not done by
modem
1046) OMR is used to read choice
filled up by a student in common entrance tests
1047) The term remote with respect
to network means machine located far off
1048) In two-tier client server
architecture the client is usually fat client
1049) The senior management provides
the go-ahead approval for the development of projects
1050) Manual data can be put into
computer by Scanner
1051) E-mail address is made up of
two parts
1052) The normal way to undo a
command by pressing the following key combinations together CTRL-Z
1053) The owner of a process is
user that invokes the process
1054) In datagram packet switching
all the datagram’s of a message follow the same channel of a path
1055) X.25 LAPP uses a specific
subset of HDLC protocol
1056) Presentation layer of the
OSI reference model is concerned with the syntax of data exchanged between
application entities
1057) Edge-triggered D flip –flop
memory elements uses an PC circuit at its input
1058) Programs that extend the
capabilities of a server are C41 scripts
1059) The primary goal of ISDN is
the integration of voice services and non-voice services
1060) Flow control in OSI model is
done by transport layer
1061) The optical links between
any two SONET devices is called a section
1062) A user can get files from
another compute on the internet by using FTP
1063) The key fields which are
tested by a packet filtering firewall are source IP address , TCP/UDP source
port, destination IP address
1064) The server on the internet
is also known as gateway
1065) VBScript can perform
calculation of data
1066) In MS-Word, ‘mail merge’ can
be defined writing a letter once and dispatching it to a number of recipients
1067) Coaxial cables are good for
digital transmission and long distance transmission
1068) LRU is a page replacement
policy used for memory management
1069) Commercial TV is an example
of distributive services with user control
1070) The exact format of frame in
case of synchronous transmission depends on whether transmission scheme is
either character oriented or bit oriented
1071) RING topology is least
affected by addition/remove of a node
1072) EX-OR gates recognizes only
words that have an odd number of 1
1073) To interconnect two
homogenous WAN’s we need a router
1074) Co-axial cables provides
data rates over 50 mbps
1075) The outermost orbit of an
atom can have a maximum of 8 electrons
1076) The protocol for sharing
hypertext information on the world wide web is HTTP
1077) ISDN’s basic rate interface
(BRI) is also known as 2 D + B
1078) The mode of data
transmission of unshielded twisted pair cable is full duplex
1079) Data accuracy is not done by
modem
1080) Query is used to answer a
question about a database
1081) AM and FM are examples of
analog to analog modulation
1082) Redundancy is the concept of
sending extra bits for use in error detection
1083) The physical layer is
concerned with transmission of bits over the physical medium
1084) The number of input lines
required for a 8 to 1 multiplexes is 8
1085) The bar-code (rectangular
pattern of lines of varying width and spaces) used for automatic product
identification by computer
1086) FSK is most affected by
noise
1087) Stack is a LIFO structure
1088) CPU is not an input device
of a computer
1089) Program of a computer
presented as a sequence of instructions in the form of binary numbers is called
machine language
1090) Possible problems with java
scrip can be security or limited graphics and multimedia capabilities
1091) For locating any document on
the WWW. There is a unique address known as URL
1092) Design view would use to
define a table and specify fields
1093) Traversal process is faster
for threaded trees compared with their unthreaded counterparts
1094) The command used to display
help on any particular command is man
1095) In C++ programming, the
extension of program is .cpp
1096) A generic team that refers
to the combination of all commercial transactions executed over electronic
media for the exchange of product and services
1097) In DOS, the command used to
create a new file is called copy con
1098) Backup helps you to create a
copy of the information on your hard disk and saves original data in case data
on your computer got damaged or corrupted due to malfunctioning of hard-disk
1099) LAN is usually privately
owned and links the devices in a single office, building or campus
1100) In justified type of
alignment, text gets aligned along both left and right margins
1101) The internal programming
language for a particular chip is called machine language
1102) The inner core of an optical
fiber is glass and plastic in composition
1103) When a small amount of
trivalent impurity is added to a pure-semiconductor it is called P-type
semiconductor
1104) In MS-Access, a table can
have one primary key/keys
1105) In DOS, Deltree command is
used to delete all the files as well as sub-directories of a directory
1106) Netscape navigator is a
web-browser
1107) Multiplexing involves one
path and one channel
1108) Table, form, queries,
reports, macros, modules are objects in an access database
1109) The clown command in UNIX
changes home directory of a user
1110) BCD stands for binary coded
decimal
1111) When we run a program in
HTML coding, notepad is used as backend and internet-explorer works as front
end
1112) If the M bit in X.25
standard is set to 1, it means that thee is more than one packet
1113) The modem is a device that
connects n input stream outputs
1114) Array is linear data
structure
1115) A T.V. broadcast is an
example of simplex transmission
1116) Search engine will search
its database to find items whose tent contains all or at least one of the words
given to it
1117) In UNIX, command “! $” is
used to repeat entire less command line
1118) PCM is an example of analog
to digital
1119) A simple protocol used for
fetching an e-mail from a mailbox is POP 3
1120) For a small web site, one
needs to buy space from the ISP
1121) An operating system that
acts as an intermediary between user and computer hardware
1122) Attair, the world’s first
personal computer, was introduced in the year 1979
1123) Half duplex data flows in
both directions, but any one direction at the time
1124) Ring requires a central
controller or hub
1125) The OSI model consists of
seven layers
1126) The main job of one of the
following is to allocate CPU to processes scheduler
1127) 10,500 valid Min & Max
zoom sizes in MS office
1128) Before printing a document
you should always use print preview
1129) Excel XP is the latest
version of excel
1130) A worksheet can have a
maximum of 256 number of rows
1131) Character is not a valid
data type in Excel
1132) Formula bar in an Excel
window allows entering values and formulas
1133) Direct memory access is a
technique for transferring data from main memory to a device without passing it
through the CPU
1134) 5 30-bit SIMMS are required
to populate a bank on a 486 system that has a 32-bit data bus
1135) SRAM uses a clock to
synchronize a memory chip’s input and output signal
1136) Cycle-stealing type of DMA
transfer will operate when a CPU is operating
1137) A series 100 POST error code
indicates a problem with the system board
1138) You have an old PC that you
decide to upgrade with a 1 gig IDE hard drive. You find that you can’t
configure CMOS to see the entire hard drive. The best you can do is 540 meg.
Then use a device driver that makes the bios see the drive as
1139) When SHADOWING is enabled in
computers BIOS Instructions stored in various ROM chips are copied into
1140) POST stands for power on
self test
1141) Checking the hard disk while
running Windows 3.1, you discover a very large file called 396SPART.PAR. That
file is windows permanent swap file
1142) CMOS contains the computer
BIOS and maintains its data with the use of a battery for periods when the
system is powered down
1143) TSR stands for terminate and
stay
1144) LAN is not an inter network
1145) Memory is temporary and
storage is permanent
1146) Echo checking cannot assure
data accuracy in an application
1147) Focus on manual records is
not necessary for computerization system in a bank
1148) Permanent establishment,
residence-based, Income based classification are the approaches used to tax
online transactions
1149) Computer of computer
communication for business transactions is called EDI
1150) Client-server computing is
used in Network multi-media
1151) Back up of files is taken
for security
1152) Operating system is not a
software category
1153) Computer program looking
“normal” but containing harmful code is infected by Trojan horse
1154) Private key is used to
append a digital signature
1155) Most dangerous risk in
leaking of information is ignorance about the existence of risk
1156) IMAP (Internet message
access protocol) takes care of E-mail at client side
1157) The CPU has control unit,
arithmetic-logic unit and primary storage
1158) 1st generation computer is
the bulkiest PC
1159) E-R diagram represents
relationship between entities of system
1160) User is technically least
sound
1161) Minicomputers is not there
during fourth generation computer
1162) Microchip is unique to a
smartcard
1163) Internet was started as
network for defences forces of America
1164) A program permanently stored
in hardware is called firmware
1165) Taking back-up of a file
against crash is a curative measure
1166) Simplex transmission
technique permits data flow in only one direction
1167) Front end processor relieves
the host computer from tedious jobs and does them itself
1168) Software can’t be touched
1169) Physical access to a
database can be altered by hiring procedure
1170) The sound signal carried by
telephone line is analog
1171) All decisions for LAN are
taken by the IT steering committee
1172) An input device gives data
to a computer
1173) Correction of program is
done by debugging
1174) File transfer is the
function of the application layer
1175) A policy on firewalls need
not ensure that is logically secured
1176) A modem performs modulation,
demodulation, data compression
1177) Personnel security does not
fall under the category of operations to be performed during development of
software
1178) CASE tool cannot help with
understanding requirements
1179) UPC cannot be used for
source of data automation
1180) The banks are MICR device to
minimize conversion process
1181) MP3 files cannot be
navigated using ClipArt browser
1182) Close option in File
pull-down menu is used to close a file in MSWord
1183) 3 ½ is the size of a
standard floppy disc
1184) When entering in a lot of
text in capitals you should use the caps lock key
1185) Files created with Lotus
1-2-3 have an extension 123
1186) Contents, objects, Scenarios
of a worksheet can be protected from accidental modification
1187) Device drivers that are
loaded in windows 3.X are loaded into the sytem.ini file
1188) 30 pin SIMM’s, 72 pin
SIMM’s, 168 pin DIMM’s types of RAM sockets can be seen on mother boards
1189) The Power on self test
determines the amount of memory present, the date/time, and which
communications ports and display adapters are installed in a microcomputer
1190) Virtual memory refers to
using a file on the hard disk to simulate RAM
1191) BIOS (ROM) is considered
firmware
1192) A population application of
computer networking is the WWW of newsgroup called Netnews
1193) a = 10; export a is a valid
command sequence in UNIX
1194) Set date will you give in
UNIX to display system time
1195) Circuit switched network
networks requires that all channels in a message transmission path be of the
same speed
1196) The Vi program available
under UNIX can be created to open a virtual terminal
1197) A 4-bit ring counter is
initially loaded with 1001
1198) The standard defined for
fiber optics is 802.8
1199) Digitizers can be converted
from “dumb” to “smart” through the addition of a microprocessor
1200) The extension of database
file is given by dbf
1201) VRML code is based on
Unicode
1202) Use net discussion groups
have their own system of organization to help you find things just as internet
excel
1203) Http protocol is used for
WWW
1204) Protocol conversion can be
handled by gateway
1205) In ISDN teleservices, the
network can change or process the contents of data
1206) A longer instruction length
may be -1024 to 1023
1207) A microprocessor is a
processor with a reduced instruction set and power requirement
1208) The term server refers to
any device that offers a service to network users
1209) Using HTML, Front page,
DHTML we can make web-site
1210) Usually security in a
network is achieved by cryptography
1211) PSTN stands for public
switched telephone network
1212) A thyratron cannot be used
as a amplifier
1213) An input device conceptually
similar to mouse is joystick
1214) Netscape navigator and other
browsers such as the internet explorer are available free on the internet
1215) In MS-logo Bye command is
used to come out from that screen
1216) In C++ programming, the
command to save the program file is F3
1217) Data lines which provide
path for moving data between system modules are known as data bus
1218) Bubble sort technique does
not use divide and conquer methodology
1219) The OSI model shows how the
network functions of computer to be organized
1220) A 8 bit microprocessor must
have 8 data lines
1221) A protocol that permits the
transfer of files between computer on the network is FIP
1222) A data structure, in which
an element is added and removed only from one end is known as stack
1223) In linked list, the
successive elements must occupy contiguous space in memory
1224) In OSI model reference,
layer 2 lies in between the physical layer and the network layer
1225) In synchronous TDM, for n
signal sources, each frame contains at least n slots
1226) Mouse and joystick are
graphic input devices
1227) In linked list, a node
contains at least node number, data field
1228) Gopher is not a web browser
1229) Device drivers controls the
interaction between the hardware devices and operating systems
1230) The shortest path in routing
can refer to the least expensive path
1231) An ordinary pen which is
used to indicate locations on the computer screen by sensing the ray of light
being emitted by the screen, is called light pen
1232) Netiquettes are some rules
and regulations that have to be followed by users
1233) Gateway uses the greatest
number of layers in the OSI model
1234) A set of standards by which
servers communicate with external programs is called common gateway interface
1235) UNIVAC is a computer
belonging to third generation
1236) API allows a client/server
relationship to be developed between an existing host application and a PC
client
1237) Semi-insulator is a
substance which has resistivity in between conductors and insulators
1238) Multi vibrator is a two
stage amplifier with output of one feedback to the input of the other
1239) Macro is used to automate a
particular task or a series of tasks
1240) Internet is network of
networks
1241) A set of devices or
combination of hardware and software that protects the systems on one side from
system on the other side is firewall
1242) Simple, transparent, multi
post are bridge types
1243) When bandwidth of medium
exceeds the required bandwidth of signals to be transmitted we use frequency
division multiplexing
1244) Direct or random access of
element is not possible in linked list
1245) In Dos, the “Label” command
is used to display the label of disk
1246) At the lower end of
electromagnetic spectrum we have radio wave
1247) In Word, Ctrl + Del
combination of keys is pressed to delete an entire word
1248) Plotters are very useful in
applications such as computer aided design
1249) Web browser is a type of
network application software
1250) 65535 characters can be
typed in a single cell in Excel
1251) Overtime analysis is useful
for formulating personnel policies and derived form the payroll system
1252) Multiple worksheets can be
created and used at a time
1253) UNIX is both time sharing
and multiprogramming system
1254) Floppy Disk is universal
portable and inexpensive but has its own limitation in terms of storage
capacity and speed
1255) Personal computers currently
sold in India have main memories at an entry level in the range of megabytes
1256) UNIX has better security for
files relative to MS-DOS
1257) The UNIX operating system
has been written in C language
1258) Syntax errors is flagged by
compilers
1259) PARAM is an example of super
computer
1260) Mother board holds the ROM,
CPU, RAM and expansion cards
1261) CD-ROM is as a magnetic
memory
1262) The binary number system has
a base 2
1263) GUI is used as an interface
between software and user
1264) E-mail is transaction of
letters, messages and memos over communications network
1265) Device drivers are small ,
special purpose programs
1266) LAN refers to a small,
single site network
1267) One megabyte equals
approximately 1 million bytes
1268) Magnetic tape is not
practical for applications where data must be quickly recalled because tape is
a sequential access medium
1269) User id, URI and time stamp
is not used by organization when a user visits its site
1270) DBRM takes care of storage
of data in a data base
1271) Plotters give the highest
quality output
1272) Encrypting file system
features of windows XP professional operating system protects the data of a
user, even if the computer is shared between users
1273) Loading is not required for
high level language program before it is executed
1274) Top – bottom approach cannot
be the measure of network traffic
1275) Devices such as magnetic
disks, hard disks, and compact disks, which are used to store information, are
secondary storage devices
1276) Various input and output
devices have a standard way of connecting to the CPU and Memory. These are
called interface standards
1277) The place where the standard
interfaces are provided to connect to the CPU and Memory is known as Port
1278) Binary numbers are
positional numbers
1279) The base of the hexadecimal
system is sixteen
1280) Display capabilities of
monitor are determined by adapter card
1281) Mouse has a use in graphical
user interface and applications as input device
1282) Drum plotter, flat bed
plotter, graphic display device is an output device
1283) The time taken to write a
word in a memory is known as write name
1284) 1 MB is equivalent to 2 (to
the power of 20 bytes)
1285) A memory cell, which does
not loose the bit stored in it when no power is supplied to the cell, is known
as non-volatile cell
1286) Magnetic surface recoding
devices used in computers such as hard disks, floppy disks, CD-ROMs are called
secondary / auxiliary storage devices
1287) The electronic circuits /
devices used in building the computer that executes the software is known as
hardware
1288) Assembler is a translator
which translates assembly language program into a machine language program
1289) Interpreter is a translator
which translates high level language program into a machine language program
1290) Machine language programs
are machine dependent
1291) The programs written in
assembly language are machine independent
1292) High level languages are
developed to allow application programs, which are machine independent
1293) The Vacuum tubes are related
to first generation computers
1294) Mark I was the first
computer that used mechanical switches
1295) First generation computers
relied on machine language to perform operations, and they only solve one
problem at a time
1296) In first generation
computers input was based on punched cards
1297) In second generation
computers input was based on print outs
1298) Vacuum tube generates more
energy and consumes more electricity
1299) Second generation computers
moved from cryptic binary machine language to symbolic, or assembly languages
which allowed programmers to specify instructions in words
1300) Most electronic devices
today use some form of integrated circuits placed on printed circuit boards
thin pieces of bakelite or fiberglass that have electrical connections etched
onto them is called mother board.
1301) The operating system, which
allowed the device to run many different applications at one time with a
central program that monitored the memory was introduced in third generation
computers
1302) In third generation
computers, users interacted through keyboards and monitors
1303) The fourth generation
computers saw the development of GUIs, the mouse and handheld devices
1304) First computers that stored
instructions in memory are second generation computers
1305) In second generation
computers transistors replaced vacuum tubes
1306) The micro processor was
introduced in fourth generation computer
1307) Integrated Circuits (IC) are
introduced and the replacement of transistors started in third generation
computers
1308) Fifth generation computing
is based on artificial intelligence
1309) Assembly language is
low-level language
1310) In assembly language
mnemonics are used to code operations, alphanumeric symbols are used for
address, language lies between high-level language and machine language
1311) The computer’s secondary
memory is characterized by low cost per bit stored
1312) Acknowledgement from a
computer that a packet of data has been received and verified is known as ACK
1313) Acoustic coupler is a
communications device which allows an ordinary telephone to be used with a
computer device for data transmission
1314) ALGOL is a high-level
language
1315) A high level programming
language named after Ada Augusta, coworker with Charles Babbage is Ada
1316) Adder is a logic circuit
capable of forming the sum of two or more quantities
1317) To identify particular
location in storage area one have a address
1318) A local storage register in
the CPU which contains the address of the next instruction to be executed is
referred as address register
1319) A sequence of precise and
unambiguous instructions for solving a problem in a finite number of operations
is referred as algorithm
1320) PC/AT is an example of
Bi-directional keyboard interface
1321) DIMM is not an I/O bus
1322) PCI bus is often called as
mezzanine bus
1323) 8088 is an original IBM PC
inter CPU chip
1324) 80386 is a 32-bit processor
1325) A Pentium or Pentium pro
board should run at 60 or 66 MHZ
1326) The maximum bandwidth of
EISA bus is 33 M/sec
1327) A computer system runs
millions of cycles per second so that speed is measured in MHz
1328) Heat sink is the metal
device that draws heat away from an electronic device
1329) Pentium chip has 64 bit
& 32 bit registers
1330) A mother board should
contain at least 4 memory sockets
1331) The 1.2 MB drive spin at 360
rpm
1332) Intensity of sound is called
amplitude
1333) A single zero bit is called
starting bit
1334) PnP stands for plug and play
1335) A computers system’s clock
speed is measured as frequency
1336) Maximum RAM of XT type is 1
M
1337) The data in 8 bit bus is
sent along 8 wires simultaneously in parallel
1338) The bus is simple series of
connection that carry common signals
1339) Mainly memories are divided
into two types they are logical memories and physical memories
1340) System based on the new
Pentium II processor have the extended memory limit of 4G
1341) Full form of EMS memory is
excluded memory specification
1342) The 286 & 386 CPU have
24 address lines
1343) Bus has both the common
meaning and computer meaning
1344) Data on a floppy disk is
recorded in rings called tracks
1345) A group of characters that
have a predefined meaning database
1346) In a spreadsheet a cell is
defined as the intersection of a row and column
1347) Document file is created by
word processing programs
1348) Real time is not a type of
error
1349) The mouse device drivers, if
loaded in the config.sys file, its typically called mouse.sys
1350) Peer to peer means computer
to computer
1351) RLL refers to run length
limits
1352) The most important aspect of
job scheduling is the ability to multiprogramming
1353) Modem is a
modulator-demodulator system
1354) A data communication system
requires terminal device, communication channel, protocols
1355) The start button appears at
the lower left of the screen
1356) Windows is GUI
1357) TIF stands for tagged image
format
1358) The first network that
initiated the internet is ARPANET
1359) In modems a digital signal
changes some characteristic of a carrier wave
1360) Favorites are accessible
from the start menu
1361) The virus is a software
program
1362) BANK’S is not memory chip
1363) We use RAM code to operate
EGA
1364) A scanner is attached to LPT
or SCSI host adapter port
1365) RAM bus is not a bus
1366) Processor bus is the fastest
speed bus in system
1367) Resolution is the amount of
detail that a monitor can render
1368) Sound blaster is a family of
sound cards sold by creative labs
1369) MIDI is a family of sound
cards sold by creative labs
1370) MIDI is a standard for
connecting musical instruments to PC’s
1371) By connecting a MIDI cable
to the joystick port you can connect your PC to a MIDI device
1372) MPC stands for multimedia
personal computer
1373) Video cards, video and
graphics card are example of video & audio
1374) The display technology used
by monitor is CRT
1375) On a LAN each personal
computer is called workstations
1376) The CPU is the next most
important file server after the hard disk
1377) It is best to use the game
adaptor interface on the sound card and disable any other on system
1378) Mouse port uses keyboard
controller
1379) The number of sectors per
track in 1.44 MB floppy disk is 18
1380) Pentium II system can
address 62 G memory
1381) The mouse was invented by
Englebart
1382) The server’s network adapter
card is its link to all the work stations on LAN
1383) Magnetic drives such as
floppy and hard disk drives operate by electro magnetism
1384) Clock timing is used to
determine that start and end of each bit cell
1385) Head designs are of 4 types
1386) Latency is the average time
that it takes for a sector to be a available after the heads
1387) Each sector is having 512
bytes
1388) DDD means digital diagnostic
disk
1389) PC Technical is written in
assembly language and has direct access to the system’s hardware for testing
1390) Check it pro deluxe gives
detailed information about the system hardware
1391) The last 128k of reserved
memory is used by mother board
1392) There are 80 cylinders are
there for an 1.44 m floppy
1393) IBM changed ROM on the
system to support key boards
1394) +12 V signal for disk drive
is used for power supply
1395) CD ROM’s are single sided
1396) The storage capacity of a
CDROM is 650 MB
1397) XGB has 2048 K graphic
memory
1398) Most sound boards generate
sounds by using fm synthesis
1399) Microscope helps you trouble
shoot PS/2 system
1400) General purpose of
diagnostic program run in batch mode
1401) The routing of data elements
are called bits
1402) Operating system often
called as kernel
1403) IPC stands for inter process
communication
1404) Many programming errors are
detected by the hardware
1405) When a process exists, he
operating system must free the disk space used by its memory image
1406) Buffering attempts to keep
both CPU and I/O device busy all the time
1407) Software is not an example
of file mapping
1408) The most important aspect of
job scheduling is the ability to multiprogramming
1409) There are two types of
floppy disks
1410) System calls can be grouped
into three major categories
1411) “FIFO” stands for first in
first out
1412) In the two-level directory
structure, each user has its own user file directory
1413) The number of bytes in a
page is always a power of 2
1414) A process that does not
determinate while the operating system is functionary is called dynamic
1415) The three main types of
computer programming languages are machine language, assembly language, high
level language
1416) There are 2 types of processor
modes
1417) An input device is an
electromechanical device that generates data for a computer to read
1418) The first implementation of
UNIX was developed at Bell Telephone Laboratories in the early 1970
1419) A connection less protocol
is more dynamic
1420) The throughput is a measure
of work for processor
1421) COBOL stands for common
business oriented language
1422) Reset button is used to do
cool booting
1423) In MS-EXCEL the no of rows,
no of columns are 16384,256
1424) FOXPRO is a package and programming
language
1425) Mostly used date format in
computer is MM-DD-YY
1426) Reservation of train ticket
uses real time mode of processing
1427) A floppy disk is a thin
plastic disc coated with magnetic oxide
1428) In binary addition 1+1 = 1
1429) Universal building blocks of
a computer system are NAND & NOR
1430) In COBOL programming
characters length per line is 64
1431) In FOXPRO, the maximum
fields in a record are 128
1432) QUIT command is used to come
out of FOXPRO
1433) Count command is used to
count the specified records in a file with or without condition
1434) F1 key is pressed for help
in FOXPRO
1435) One Giga byte = 1024 mega
bytes
1436) Small scale integration chip
contains less than 12 gates
1437) The most common monitor
sizes are 14, 15, 17
1438) IBM PC and DOS has BIOS
support for 3 LPT ports
1439) EDO stands for external data
organizer
1440) The number of wires in IDE
Hard Disk cable are 16
1441) If the data transfer rate is
150 k/sec then it is called single speed
1442) A typical buffer for a
CD-ROM drives 156 K
1443) The 2.88 M floppy drives
have 36 no of sectors
1444) 1 MB is equal to 2 (to the
power of 10 KB)
1445) ROM is a primary storage
device
1446) The process of loading and
starting up DOS is called booting
1447) The Dos Prompt is mainly
C:\>
1448) C:\>ver is used for
displaying current version name
1449) Intel 440x “Natoma” is an
example for mother board chipset
1450) Direct memory access
channels are used by medium speed communication devices
1451) The 486 Sx chip is twice as
fast as a 386 Dx with same clock speed
1452) On a 286 or 386 sx system,
the extended memory limits 16M
1453) The 385 Dx, 386 CPU have 32
address lines
1454) Shared memory does require
16 K of VMA space
1455) DIMM’s are 168 pin modules
1456) The function of +12V power
supple is to run disk drive motors and also cooling fans
1457) SPS generally referred as
rechargeable batteries
1458) Parallel interface is not
the interfaces that can be used to connect the mouse to the computer
1459) The mouse interrupts usually
occurs if the system uses a mouse port
1460) The video adapter BIOS
handles communication between the Video Chipset & Video Ram
1461) Pentium pro CPU’s have full
of 323, they can track of 44 G of memory in address lines
1462) The processor bus is the
communications path way between CPU and immediate support chip
1463) VL-bus can move data 32 bit
at a time
1464) A modem attached to system
on COM ports
1465) Horizontal scan refers to
the speed at which the electron beam across the screen
1466) RGB monitor display 80
column text
1467) When transition changes from
negative to positive the head would detect positive voltage spike
1468) Animation means to make
still picture, move and talk like in cartoon pictures
1469) Analogues: The use of a
system in which the data is of a continuously variable physical quantity such
as voltage or angular person
1470) Animation: A simulation of
movement created by displaying a series of pictures or frames
1471) Application means a piece of
software designed to meet a specific purpose
1472) Active X is a model for
writing programs. Active X technology is used to make interactive Web pages
that look and behave like computer programs, rather than static pages. With
Active X, users can ask or answer questions, use push buttons, and interact in
other ways with the web page
1473) Batch processing is a
technique in which a number of similar items or transactions are processed in
groups or batches during a machine run
1474) BIS: Bureau of Indian
Standards. It is a national organization of India to define standards
1475) Browser is a link between
the computer and the internet. It’s actually a program that provides a way to
look in the hand interact with all information on the internet. A browser is a
client program that uses the Hypertext Transfer Protocol (http) to make
requests of Web servers throughout the Internet on behalf of the browser user.
1476) CIO (Chief information
officer) : The senior executive in a company responsible for information
management and for delivering IT services
1477) Client/server architecture:
A type of network in which computer processing is distributed among many
individual PCs and a more powerful, central computer clients can share files
and retrieve data stored on the server
1478) Collaborative software:
Groupware, such as Lotus Notes or Microsoft Exchange
1479) Computer-Aided design:
Refers to any computer-enabled method of design also called computer-assisted
design.
1480) Commuter: A group of
electronic device used for performing multipurpose tasks
1481) Channel: It consists of
controller card, interface cable and power supply
1482) CORBA: CORBA is the acronym
for Common Object Request Broker Architecture
1483) CBT: Computer based training
1484) Certification: Skills and
knowledge assessment process
1485) Computer Crime: The act of
stealing, cheating or otherwise defrauding an organization with the use of a
computer
1486) Cyber café: Café offering
internet browsing facility
1487) Cryptography: Method used to
protect privacy and security on the internet
1488) DBMS: An acronym for the
database management system. A program that maintains and controls the access to
collection of related information in electronic files
1489) Data: Facts coded and
structured for subsequent processing, generally using a computer system
1490) Digital signature: Encrypted
signature used for providing security for the messages/data transferred through
the internet
1491) Digital computer: A device
that manipulates discrete data and performs arithmetic and logic operations on
these data
1492) Data transmission: The
movement of data from one location of storage to another. If the locations are
geographically far away, generally done via satellites.
1493) Disk Mirroring: The data is
written on two or more hard disks simultaneously over the same channel
1494) Disk Duple Xing: The data is
written on two or more hard disks simultaneously over the different channel
1495) Dumb Terminals: Hardware
configuration consisting of a keyboard and monitor that is capable of sending
and receiving information but has no memory or processing capabilities.
1496) Download: Process of
transferring a file system from one system to another
1497) E-commerce: Business
transactions conducted over extranets or the internet
1498) Enterprise, resource
planning: An integrated system of operation application combining logistics,
production, contract and order management, sales forecasting and financial and
HR management
1499) Electronic data interchange
(EDI) : Electronic transmission or documents through point to point connections
using a set of standard forms, message and data elements, this can be via
leased lines private networks or the internet
1500) Data processing: It is a
method concerning with the systematic recording, arranging, filing, processing
and dissemination of facts of business
*ALL
THE BEST*