601) A watch point is associated with debugger
602) A multithreaded program uses multiple processes
603) Time sharing is a mechanism to provide spontaneous interactive
use of a computer system by many users in such a way that each user is given
the impression that he/she has his/her own computer
604) The typical scheme of memory management used in IBMOS/360
mainframe system was that of multiprogramming with variable number of memory
partitions
605) The concepts used for realization of virtual memory are
swapping, demand paging and In-line secondary storage
606) Oracle 8i is an example of OORDBMS
607) ALPHA, RIOS, SPARC are examples of RISC Processors
608) The scope of an identifier refers to where in the program
an identifier is accessible
609) Hierarchy is not a component of relational database
610) A two-way selection in C++ is the if…else
611) A recursive function executes more efficiently than its
iterative counterpart
612) The body of the recursive function contains a statement
that causes the same function to execute before completing the last call
613) Variables that are created during program execution are
called dynamic variables
614) When destroying a list, we need a delete pointer to
deallocate the memory
615) The first character in the ASCII character set is the null
character, which is nonprintable
616) A variable for which memory is allocated at block entry and
deallocated at block exit is called a static variable
617) Signal to noise ratio compares signal strength to noise
level
618) The ability to create new objects from existing objects is
known as inheritance
619) Software tools that provide automated support for the
systems development process are OLAP tools
620) Applications/Web server tier processes HTTP protocol,
scripting tasks, performs calculations, and provides access to data
621) A language used to describe the syntax rules is known as
meta language
622) In a preorder traversal, the binary tree is traversed as
follows
623) The general syntax of the function prototype of a value
returning function is function name (parameter list)
624) Competitive intelligence is the process of gathering enough
of the right information in a timely manner and usable form and analyzing it so
that it can have a positive impact
625) Tracing values through a sequence is called a play out
626) In a binary tree, each comparison is drawn as a circle,
called a node
627) The term used as a measurement of a communication channel’s
data capacity is bandwidth
628) In addition to the nature of the problem, the other key
factor in determining the best solution method is function
629) An E-R data model solves the problem of presenting huge
information system data models is to users and developers
630) In C++, predefined functions are organized into separate
libraries
631) The standard protocol (communication rules for exchange of
data) of the internet is TCP/IP
632) For efficiency purposes, wherever possible, you should
overload operators as member functions
633) Modifying algorithms that change the order of the elements,
not their values, are also called modifying algorithms
634) As long as the tables in a relational database share at
least one common data attribute, the tables in a relational database can be
normalized to provide useful information and reports
635) DBMS is a simple, fourth generation language used for data
retrieval
636) An occurrence of an undesirable situation that can be
detected during program execution is known a exception
637) A photo of the company headquarters would be an example of
the use of a static web page
638) The Pentium processor contains thousands of transistors
639) SOI technology has been successful with reference to SRAM
640) Secondary storage device is needed to print output results
641) Static random access memory does not fall under the
category of secondary storage devices
642) Floppy disk is universal, portable and inexpensive but has
its own limitation in terms of storage capacity and speed
643) Some physical property of the microscopic area of the disk
surface is changed for recording in common for all types of disks
644) In a disk, each block of data is written into two or more
sectors
645) A floppy disk rotates at 100rpm
646) A hard disk has 500 to 1000 tracks or more
647) The storage capacity of a cartridge tape is 400 MB
648) Single density recording is also known as frequency
modulation
649) Printer is not an input device
650) The input device that is most closely related to a touch screen
is the light pen
651) Laser printer generates characters from a grid of pins
652) The liquid crystal display works on the basis of the
relation between polaristion and electric field
653) A COBOL program in source code is not considered to be
system software
654) Firmware stored in a hard disk
655) A compiler breaks the source code into a uniform stream of
tokens by lexical analysis
656) Sorting of a file tasks is not performed by a file utility
program
657) Floppy disk does not generate a hardware interrupt
658) Ada language is associated with real time processing
659) MS DOS is usually supplied on a cartridge tape
660) BREAK is not an internal DOS command
661) Kernel of MS-DOS software resides in ROM
662) The UNIX operating system (available commercially) has been
written in C language
663) MS-DOS has better file security system as compared to UNIX
664) UNIX is only a multiprogramming system
665) The UNIX operating system uses three files to do the task
mentioned
666) In UNIX, end-of-file is indicated by typing CTRL D
667) Abacus is said to be invented by Chinese
668) An operating system is necessary to work on a computer
669) The first UNIX operating system, as it was in the
development stage, was written in the assembly language
670) FAST drivers scientific software packages was developed
under contract with NASA
671) LEFT () is not a date function
672) FIF editor is a windows based application
673) Graphics is inserted in frame
674) A language translator is best described as a system
software
675) The specification of a floppy is identified by TPI
676) DISC () is not a database function
677) In opening menu of word star C OPTION should be selected
for protecting a file
678) The most advanced form of ROM is electronically erasable
programmable ROM
679) Secondary storage device is needed to store large volumes
of data and programs that exceed the capacity of the main memory
680) MORE sends contents of the screen to an output device
681) NFS stands for N/W file system
682) Main protocol used in internet is TCP/IP
683) We can create a simple web page by using front page express
684) The first line/bar on the word window where the name of the
document is displayed is called title bar
685) The clock frequency of a Pentium processor is 50 MHz
686) The input device that is most likely to be used to play
computer games is the joystick
687) Linking the program library with main program is not
performed by a file utility program
688) The UNIX operating system has been written in C language
689) BIOS of MS-DOS resides in ROM
690) The sector size of a floppy disk varies from 128 bytes to
1024 bytes
691) A program type of errors is flagged by compilers
692) A floppy diskette is organized according to tracks and
sectors
693) In word star, the maximum permissible length of search
string is 65
694) C is a third generation high level language
695) A CPU has a 16-bit program counter. This means that the CPU
can address 64 K memory locations
696) STR () is used for converting a numeric into a character
string
697) BASIC language is normally used along with an interpreter
698) In UNIX, open files are shared between the parent and the
child
699) In spite of the extra power needed for refreshing. DRAMs
are widely used in computers because of its lower cost relatives to SRAMs
700) PIF editor belongs to Main group
701) SUM () is not a financial function
702) 98/04/12 cannot be used to enter a date
703) Windows is popular because of its being expensive
704) Personal computers currently sold in India have main
memories at an entry level in the range of megabytes
705) The unit in CPU or processor, which performs arithmetic and
logical operations is ALU
706) RAM is volatile
707) The result of arithmetic and logical operations is stored
in an accumulator
708) A small amount of memory included in the processor for high
speed access is called cache
709) A bus is an electronic track system
710) A co-processor is used to improve the speed of mathematical
calculations
711) Intel 80286 belongs to third generation microprocessors
712) A hexadigit can be represented by eight binary bits
713) The number of processes that may running at the same time
in a large system can be thousands
714) FORTRAN is a 3GL
715) Root is not an item of the Menu bar
716) Difficult to do what it projects is not considered to be a
feature of the spreadsheet
717) While starting the Lotus 1-2-3, the current cell reference
is shown at top left hand corner of the screen
718) Bill gates is the chief of Microsoft
719) Excel office assistant can be made to appear by using F1
key and help menu
720) 9 per page is the max no of showing positioning of per page
handouts
721) Alignment buttons are available on formatting toolbar
722) Pico second is 10(to the power of-9)
723) Logo refers to a computer language
724) The most appropriate command to permanently remove all
records from the current table is Zap
725) The efficient and well designed computerized payroll system
would be on-line real time system
726) The scripts which are designed to receive value from Web
users is CGI script
727) WAIS stands for – wide assumed information section
728) Modem is used for connecting PC using telephone lines
729) Token bus is the most popular LAN protocol for bus topology
730) Manipulating data to create information is known as
analysis
731) A separate document form another program sent along with an
E-mail message is known as E-mail attachment
732) When you boot up a PC — portions of the operating system
are copied from disk into memory
733) Correcting errors in a program is called debugging
734) A word processor would most likely be used to type a
biography
735) A database is an organized collection of data about a
single entity
736) Fire fox is a web browser
737) Most of the commonly used personal computers/laptops do not
have a command key known as turnover
738) Full form of USB is known as Universal serial bus
739) The quickest and easiest way in Word to locate a particular
word or phrase in a document is to use the find command
740) Computer sends and receives data in the form of digital
signals
741) Icons are graphical objects used to represent commonly used
application
742) Most World Wide Web pages contain HTML commands in the
language
743) In any window, the maximize button, the minimize button and
the close buttons appear on the title bar
744) Checking that a pin code number is valid before it is
entered into the system in an example of data validation
745) Windows 95 and windows 98 and Windows NT are known as
operating systems
746) Information on a computer is stored as analog data
747) A program that works like a calculator for keeping track of
money and making budgets is spreadsheet
748) To take information from one source and bring it to your
computer is referred to as download
749) Windows is not a common feature of software applications
750) A toolbar contains buttons and menus that provide quick
access to commonly used commands
751) Input device is an equipment used to capture information
and commands
752) Most of the commonly available personal computers/laptops
have a keyboard popularly known as QWERTY
753) Editing a document consists of reading through the document
you’ve created then—correcting your errors
754) Virtual Box is not a famous operating system
755) Junk e-mail is also called spam
756) DOC is the default file extension for all word documents
757) .bas, .doc and .htm are examples of extensions
758) Codes consisting of bars or lines of varying widths or
lengths that are computer readable are known as a bar code
759) Convenience, speed of delivery, generally and reliability
are all considered as the advantages of e-mail
760) E-commerce allows companies to conduct business over the
internet
761) The most important or powerful computer in a typical
network is network server
762) To make a notebook act as a desktop model, the notebook can
be connected to a docking station which is connected to a monitor and other
devices
763) Storage that retains its data after the power is turned off
is referred to as non-volatile storage
764) Virtual memory is memory on the hard disk that the CPU uses
as an extended RAM
765) To move to the beginning of a line of text, press the home
key
766) When sending and e-mail, the subject line describes the
contents of the message
767) Microsoft is an application suite
768) Information travels between components on the motherboard
through bays
769) One advantage of dial-up internet access is it utilizes
existing telephone security
770) Network components are connected to the same cable in the
star topology
771) Booting checks to ensure the components of the computer are
operating and connected properly
772) Control key is used in combination with another key to
perform a specific task
773) Scanner will translate images of text, drawings, and photos
into digital form
774) Information on a computer is stored as digital data
775) The programs and data kept in main memory while the
processor is using them
776) Storage unit provide storage for information and
instruction
777) Help menu button exist at start
778) Microsoft company developed MS Office 2000
779) Charles Babbage is called the father of modern computing
780) Data link layer of OSI reference model provides the service
of error detection and control to the highest layer
781) Optical fiber is not a network
782) OMR is used to read choice filled up by the student in
common entrance test
783) A network that spreads over cities is WAN
784) File Manager is not a part of a standard office suite
785) A topology of computer network means cabling between PCs
786) In UNIX command “Ctrl + Z” is used to suspend current process
or command
787) Word is the word processor in MS Office
788) Network layer of an ISO-OSI reference model is for
networking support
789) Telnet helps in remote login
790) MS Word allows creation of .DOC type of documents by
default
791) In case of MS-access, the rows of a table correspond to
records
792) Record maintenance in database is not a characteristic of
E-mail
793) In a SONET system, an add/drop multipliers removes noise
from a signal and can also add/remove headers
794) The WWW standard allows grammars on many different computer
platforms to show the information on a server. Such programmers are called Web
Browsers
795) One of the oldest calculating device was abacus
796) Paint art is not a special program in MS Office
797) Outlook Express is a e-mail client, scheduler, address book
798) The first generation computers had vacuum tubes and
magnetic drum
799) Office Assistant is an animated character that gives help
in MSOffice
800) Alta Vista has been created by research facility of Digital
Electronic corporation of USA
801) We are shifting towards computerization because
technologies help in meeting the business objectives
802) Spiders search engines continuously send out that starts on
a homepage of a server and pursue all links stepwise
803) Static keys make a network insecure
804) Joy Stick is an input device that cannot be used to work in
MS Office
805) Artificial intelligence can be used in every sphere of life
because of its ability to think like human beings
806) To avoid the wastage of memory, the instruction length
should be of word size which is multiple of character size
807) Electronic fund transfer is the exchange of money from one
account to another
808) Format menu in MS Word can be use to change page size and
typeface
809) Assembly language programs are written using Mnemonics
810) DMA module can communicate with CPU through cycle stealing
811) A stored link to a web page, in order to have a quick and
easy access to it later, is called bookmark
812) B2B type of commerce is characterized by low volume and
high value transactions in banking
813) Advanced is not a standard MS Office edition
814) Workstation is single user computer with many features and
good processing power
815) History list is the name of list that stores the URL’s of
web pages and links visited in past few days
816) FDDI access mechanism is similar to that of IEEE 802.5
817) MS Office 2000 included a full-fledged web designing
software are called FrontPage 2000
818) Macintosh is IBM’s microcomputer
819) X.21 is physical level standard for X.25
820) Enter key should be pressed to start a new paragraph in MS
Word
821) Main frame is most reliable, robust and has a very high
processing power.
822) Formatting of these toolbars allows changing of Fonts and
their sizes
823) The ZZ command is used to quit editor after saving
824) The program supplied by VSNL when you ask for internet
connection for the e-mail access is pine
825) The convenient place to store contact information for
quick, retrieval is address book
826) Digital cash is not a component of an e-wanet
827) For electronic banking, we should ensure the existence and
procedures with regard to identification of customers who become members
electronically
828) Jon Von Neumann developed stored-program concept
829) Hardware and software are mandatory parts of complete PC
system
830) Firewall is used in PC for security
831) Two rollers are actually responsible for movement of the
cursor in mouse
832) In case of a virus getting into computer NORTON will help
833) Tour the server room is to be done by the auditor while
internet banking services audit
834) Documentation while developing a software for a Bank is
required for auditing
835) Water supply has not become computerized
836) Concurrency control in distributed database supports
multi-user access
837) Fifth generation computers are knowledge processors
838) Transistors were first used in 2nd generation computers
839) Intelligence is not a characteristic of a computer
840) A camera is an processing machine
841) To protect organization from virus or attacks all mails
sent and received should be monitored, all messages should be encrypted, E-
mails should be used only for official purpose
842) Internet collects millions of people all over the world
843) A computer based information system is a system in which a
computer is used to process data to get information
844) The time between program input and outputs is called
execution time
845) Third generations of computers have On-line real time
systems
846) MIME is a compressor that packages different formats into
SMTP compatible type
847) The earliest software was developed using the waterfall
model
848) EDI e- commerce system can handle non monetary documents
849) Collection to tracks on a disk forms spindle
850) A disk where number of sectors are fixed is called hard
sectored
851) Half duplex transmission techniques let computer to
alternatively send and receive data
852) Multiplexing combines signals from different sources into
one and sends on a faster channel
853) Message switcher chooses correct data path for an incoming
message and forwards it to relevant line
854) Speech recognition use thermal sensors along with infrared
rays for identification
855) Trojan horse are self replicating malicious code
independent of the action of the user, but slow down the processor on entering
a network
856) Generation of PIN in bank ATM would require PIN entered is
encrypted
857) Availability, integrity, confidentiality is most necessary
for data to be useful
858) Grid is a supercomputer created by networking many small
computers
859) A character that changes its value throughout the program
is called variables
860) A program coded in programming is done by assembling
861) In write mode of file existing text is replaced by new one
862) When an organization gives contract for development of a
software, it has to give data to the service provider. In such cases, the
ownership of data should be with the client/organization that outsource
services
863) Under a centralized organization Intranet be an effective
networking tools
864) For optical fiber used in point to point transmission, the
repeater spacing is 10-100 km
865) Favorites are accessible from the start menu
866) Task pre-emption, task priority and semaphores are not
needed by server program from an operation system
867) The objective of multiprogramming operating system is to
maximize CPU utilization
868) The environment provided to ASP is based on Client/server
869) HUB is layer1 device, central device, dumb device
870) The UNIX, echi command is used to display the message or
value of any variable on the screen
871) QAM is used in high speed modem
872) Frame Relay technique uses connection oriented
873) Bipolar always has a non-zero average amplitude
874) In a SONET system, an add/drop multipliers can remove
signals from a path
875) The server on the internet is also known as Host
876) For multiple branching in ‘C’ we use switch statement
877) Web site is a collection of HTML documents, graphic files,
audio and video files
878) The first network that initiated the internet was ARPANET
879) In MODEMS a digital signal changes some characteristic of a
carrier wave
880) The binary values are represented by two different
frequencies in frequency shift keying
881) Messenger mailbox is present in Netscape communicator
882) Switching is a method in which multiple communication
devices are connected to one another efficiently
883) A bridge recognizes addresses of layer 3
884) EPROM is permanent storage device
885) “.TIF” extension name stands for tagged image format
886) The overhead using BRI is 10 percent of the total data rate
887) In programming languages the key word “Void” means it does
not return any value when finished
888) The keyboard shortcut to restart your computer is Ctrl +
Alt + Del
889) FORTRAN is not a programming language
890) The instruction LOAD A is a one address instruction
891) MS-Excel is also known as spread sheet
892) Manchester encoding is used in Ethernet technology
893) The instruction of a program which is currently being
executed are stored in main memory
894) In DOS environment, the command used to save the file is ^Z
895) All high level language uses compiler and interpreter
896) In html coding <p> …… </p> tag is used to
display a paragraph
897) In HTML coding, the following attributes color, size, face
used in font tag
898) DHTML stands for dynamic hyper text markup language
899) Fiber optics cable supports data rate up to 100 mbps to 2
gbps
900) In Photoshop software we can modify, delete, and edit the
image
Tweet
No comments:
Post a Comment
Please suggest your valuable comments here....