My Twitter Favorites


Don’t wait. The time will never be just right...

Friday, September 9, 2016

1500 Computer Awareness Bits For IBPS - Part - 3

601) A watch point is associated with debugger
602) A multithreaded program uses multiple processes
603) Time sharing is a mechanism to provide spontaneous interactive use of a computer system by many users in such a way that each user is given the impression that he/she has his/her own computer
604) The typical scheme of memory management used in IBMOS/360 mainframe system was that of multiprogramming with variable number of memory partitions
605) The concepts used for realization of virtual memory are swapping, demand paging and In-line secondary storage
606) Oracle 8i is an example of OORDBMS
607) ALPHA, RIOS, SPARC are examples of RISC Processors
608) The scope of an identifier refers to where in the program an identifier is accessible
609) Hierarchy is not a component of relational database
610) A two-way selection in C++ is the if…else
611) A recursive function executes more efficiently than its iterative counterpart
612) The body of the recursive function contains a statement that causes the same function to execute before completing the last call
613) Variables that are created during program execution are called dynamic variables
614) When destroying a list, we need a delete pointer to deallocate the memory
615) The first character in the ASCII character set is the null character, which is nonprintable
616) A variable for which memory is allocated at block entry and deallocated at block exit is called a static variable
617) Signal to noise ratio compares signal strength to noise level
618) The ability to create new objects from existing objects is known as inheritance
619) Software tools that provide automated support for the systems development process are OLAP tools
620) Applications/Web server tier processes HTTP protocol, scripting tasks, performs calculations, and provides access to data
621) A language used to describe the syntax rules is known as meta language
622) In a preorder traversal, the binary tree is traversed as follows
623) The general syntax of the function prototype of a value returning function is function name (parameter list)
624) Competitive intelligence is the process of gathering enough of the right information in a timely manner and usable form and analyzing it so that it can have a positive impact
625) Tracing values through a sequence is called a play out
626) In a binary tree, each comparison is drawn as a circle, called a node
627) The term used as a measurement of a communication channel’s data capacity is bandwidth
628) In addition to the nature of the problem, the other key factor in determining the best solution method is function
629) An E-R data model solves the problem of presenting huge information system data models is to users and developers
630) In C++, predefined functions are organized into separate libraries
631) The standard protocol (communication rules for exchange of data) of the internet is TCP/IP
632) For efficiency purposes, wherever possible, you should overload operators as member functions
633) Modifying algorithms that change the order of the elements, not their values, are also called modifying algorithms
634) As long as the tables in a relational database share at least one common data attribute, the tables in a relational database can be normalized to provide useful information and reports
635) DBMS is a simple, fourth generation language used for data retrieval
636) An occurrence of an undesirable situation that can be detected during program execution is known a exception
637) A photo of the company headquarters would be an example of the use of a static web page
638) The Pentium processor contains thousands of transistors
639) SOI technology has been successful with reference to SRAM
640) Secondary storage device is needed to print output results
641) Static random access memory does not fall under the category of secondary storage devices
642) Floppy disk is universal, portable and inexpensive but has its own limitation in terms of storage capacity and speed
643) Some physical property of the microscopic area of the disk surface is changed for recording in common for all types of disks
644) In a disk, each block of data is written into two or more sectors
645) A floppy disk rotates at 100rpm
646) A hard disk has 500 to 1000 tracks or more
647) The storage capacity of a cartridge tape is 400 MB
648) Single density recording is also known as frequency modulation
649) Printer is not an input device
650) The input device that is most closely related to a touch screen is the light pen
651) Laser printer generates characters from a grid of pins
652) The liquid crystal display works on the basis of the relation between polaristion and electric field
653) A COBOL program in source code is not considered to be system software
654) Firmware stored in a hard disk
655) A compiler breaks the source code into a uniform stream of tokens by lexical analysis
656) Sorting of a file tasks is not performed by a file utility program
657) Floppy disk does not generate a hardware interrupt
658) Ada language is associated with real time processing
659) MS DOS is usually supplied on a cartridge tape
660) BREAK is not an internal DOS command
661) Kernel of MS-DOS software resides in ROM
662) The UNIX operating system (available commercially) has been written in C language
663) MS-DOS has better file security system as compared to UNIX
664) UNIX is only a multiprogramming system
665) The UNIX operating system uses three files to do the task mentioned
666) In UNIX, end-of-file is indicated by typing CTRL D
667) Abacus is said to be invented by Chinese
668) An operating system is necessary to work on a computer
669) The first UNIX operating system, as it was in the development stage, was written in the assembly language
670) FAST drivers scientific software packages was developed under contract with NASA
671) LEFT () is not a date function
672) FIF editor is a windows based application
673) Graphics is inserted in frame
674) A language translator is best described as a system software
675) The specification of a floppy is identified by TPI
676) DISC () is not a database function
677) In opening menu of word star C OPTION should be selected for protecting a file
678) The most advanced form of ROM is electronically erasable programmable ROM
679) Secondary storage device is needed to store large volumes of data and programs that exceed the capacity of the main memory
680) MORE sends contents of the screen to an output device
681) NFS stands for N/W file system
682) Main protocol used in internet is TCP/IP
683) We can create a simple web page by using front page express
684) The first line/bar on the word window where the name of the document is displayed is called title bar
685) The clock frequency of a Pentium processor is 50 MHz
686) The input device that is most likely to be used to play computer games is the joystick
687) Linking the program library with main program is not performed by a file utility program
688) The UNIX operating system has been written in C language
689) BIOS of MS-DOS resides in ROM
690) The sector size of a floppy disk varies from 128 bytes to 1024 bytes
691) A program type of errors is flagged by compilers
692) A floppy diskette is organized according to tracks and sectors
693) In word star, the maximum permissible length of search string is 65
694) C is a third generation high level language
695) A CPU has a 16-bit program counter. This means that the CPU can address 64 K memory locations
696) STR () is used for converting a numeric into a character string
697) BASIC language is normally used along with an interpreter
698) In UNIX, open files are shared between the parent and the child
699) In spite of the extra power needed for refreshing. DRAMs are widely used in computers because of its lower cost relatives to SRAMs
700) PIF editor belongs to Main group
701) SUM () is not a financial function
702) 98/04/12 cannot be used to enter a date
703) Windows is popular because of its being expensive
704) Personal computers currently sold in India have main memories at an entry level in the range of megabytes
705) The unit in CPU or processor, which performs arithmetic and logical operations is ALU
706) RAM is volatile
707) The result of arithmetic and logical operations is stored in an accumulator
708) A small amount of memory included in the processor for high speed access is called cache
709) A bus is an electronic track system
710) A co-processor is used to improve the speed of mathematical calculations
711) Intel 80286 belongs to third generation microprocessors
712) A hexadigit can be represented by eight binary bits
713) The number of processes that may running at the same time in a large system can be thousands
714) FORTRAN is a 3GL
715) Root is not an item of the Menu bar
716) Difficult to do what it projects is not considered to be a feature of the spreadsheet
717) While starting the Lotus 1-2-3, the current cell reference is shown at top left hand corner of the screen
718) Bill gates is the chief of Microsoft
719) Excel office assistant can be made to appear by using F1 key and help menu
720) 9 per page is the max no of showing positioning of per page handouts
721) Alignment buttons are available on formatting toolbar
722) Pico second is 10(to the power of-9)
723) Logo refers to a computer language
724) The most appropriate command to permanently remove all records from the current table is Zap
725) The efficient and well designed computerized payroll system would be on-line real time system
726) The scripts which are designed to receive value from Web users is CGI script
727) WAIS stands for – wide assumed information section
728) Modem is used for connecting PC using telephone lines
729) Token bus is the most popular LAN protocol for bus topology
730) Manipulating data to create information is known as analysis
731) A separate document form another program sent along with an E-mail message is known as E-mail attachment
732) When you boot up a PC — portions of the operating system are copied from disk into memory
733) Correcting errors in a program is called debugging
734) A word processor would most likely be used to type a biography
735) A database is an organized collection of data about a single entity
736) Fire fox is a web browser
737) Most of the commonly used personal computers/laptops do not have a command key known as turnover
738) Full form of USB is known as Universal serial bus
739) The quickest and easiest way in Word to locate a particular word or phrase in a document is to use the find command
740) Computer sends and receives data in the form of digital signals
741) Icons are graphical objects used to represent commonly used application
742) Most World Wide Web pages contain HTML commands in the language
743) In any window, the maximize button, the minimize button and the close buttons appear on the title bar
744) Checking that a pin code number is valid before it is entered into the system in an example of data validation
745) Windows 95 and windows 98 and Windows NT are known as operating systems
746) Information on a computer is stored as analog data
747) A program that works like a calculator for keeping track of money and making budgets is spreadsheet
748) To take information from one source and bring it to your computer is referred to as download
749) Windows is not a common feature of software applications
750) A toolbar contains buttons and menus that provide quick access to commonly used commands
751) Input device is an equipment used to capture information and commands
752) Most of the commonly available personal computers/laptops have a keyboard popularly known as QWERTY
753) Editing a document consists of reading through the document you’ve created then—correcting your errors
754) Virtual Box is not a famous operating system
755) Junk e-mail is also called spam
756) DOC is the default file extension for all word documents
757) .bas, .doc and .htm are examples of extensions
758) Codes consisting of bars or lines of varying widths or lengths that are computer readable are known as a bar code
759) Convenience, speed of delivery, generally and reliability are all considered as the advantages of e-mail
760) E-commerce allows companies to conduct business over the internet
761) The most important or powerful computer in a typical network is network server
762) To make a notebook act as a desktop model, the notebook can be connected to a docking station which is connected to a monitor and other devices
763) Storage that retains its data after the power is turned off is referred to as non-volatile storage
764) Virtual memory is memory on the hard disk that the CPU uses as an extended RAM
765) To move to the beginning of a line of text, press the home key
766) When sending and e-mail, the subject line describes the contents of the message
767) Microsoft is an application suite
768) Information travels between components on the motherboard through bays
769) One advantage of dial-up internet access is it utilizes existing telephone security
770) Network components are connected to the same cable in the star topology
771) Booting checks to ensure the components of the computer are operating and connected properly
772) Control key is used in combination with another key to perform a specific task
773) Scanner will translate images of text, drawings, and photos into digital form
774) Information on a computer is stored as digital data
775) The programs and data kept in main memory while the processor is using them
776) Storage unit provide storage for information and instruction
777) Help menu button exist at start
778) Microsoft company developed MS Office 2000
779) Charles Babbage is called the father of modern computing
780) Data link layer of OSI reference model provides the service of error detection and control to the highest layer
781) Optical fiber is not a network
782) OMR is used to read choice filled up by the student in common entrance test
783) A network that spreads over cities is WAN
784) File Manager is not a part of a standard office suite
785) A topology of computer network means cabling between PCs
786) In UNIX command “Ctrl + Z” is used to suspend current process or command
787) Word is the word processor in MS Office
788) Network layer of an ISO-OSI reference model is for networking support
789) Telnet helps in remote login
790) MS Word allows creation of .DOC type of documents by default
791) In case of MS-access, the rows of a table correspond to records
792) Record maintenance in database is not a characteristic of E-mail
793) In a SONET system, an add/drop multipliers removes noise from a signal and can also add/remove headers
794) The WWW standard allows grammars on many different computer platforms to show the information on a server. Such programmers are called Web Browsers
795) One of the oldest calculating device was abacus
796) Paint art is not a special program in MS Office
797) Outlook Express is a e-mail client, scheduler, address book
798) The first generation computers had vacuum tubes and magnetic drum
799) Office Assistant is an animated character that gives help in MSOffice
800) Alta Vista has been created by research facility of Digital Electronic corporation of USA
801) We are shifting towards computerization because technologies help in meeting the business objectives
802) Spiders search engines continuously send out that starts on a homepage of a server and pursue all links stepwise
803) Static keys make a network insecure
804) Joy Stick is an input device that cannot be used to work in MS Office
805) Artificial intelligence can be used in every sphere of life because of its ability to think like human beings
806) To avoid the wastage of memory, the instruction length should be of word size which is multiple of character size
807) Electronic fund transfer is the exchange of money from one account to another
808) Format menu in MS Word can be use to change page size and typeface
809) Assembly language programs are written using Mnemonics
810) DMA module can communicate with CPU through cycle stealing
811) A stored link to a web page, in order to have a quick and easy access to it later, is called bookmark
812) B2B type of commerce is characterized by low volume and high value transactions in banking
813) Advanced is not a standard MS Office edition
814) Workstation is single user computer with many features and good processing power
815) History list is the name of list that stores the URL’s of web pages and links visited in past few days
816) FDDI access mechanism is similar to that of IEEE 802.5
817) MS Office 2000 included a full-fledged web designing software are called FrontPage 2000
818) Macintosh is IBM’s microcomputer
819) X.21 is physical level standard for X.25
820) Enter key should be pressed to start a new paragraph in MS Word
821) Main frame is most reliable, robust and has a very high processing power.
822) Formatting of these toolbars allows changing of Fonts and their sizes
823) The ZZ command is used to quit editor after saving
824) The program supplied by VSNL when you ask for internet connection for the e-mail access is pine
825) The convenient place to store contact information for quick, retrieval is address book
826) Digital cash is not a component of an e-wanet
827) For electronic banking, we should ensure the existence and procedures with regard to identification of customers who become members electronically
828) Jon Von Neumann developed stored-program concept
829) Hardware and software are mandatory parts of complete PC system
830) Firewall is used in PC for security
831) Two rollers are actually responsible for movement of the cursor in mouse
832) In case of a virus getting into computer NORTON will help
833) Tour the server room is to be done by the auditor while internet banking services audit
834) Documentation while developing a software for a Bank is required for auditing
835) Water supply has not become computerized
836) Concurrency control in distributed database supports multi-user access
837) Fifth generation computers are knowledge processors
838) Transistors were first used in 2nd generation computers
839) Intelligence is not a characteristic of a computer
840) A camera is an processing machine
841) To protect organization from virus or attacks all mails sent and received should be monitored, all messages should be encrypted, E- mails should be used only for official purpose
842) Internet collects millions of people all over the world
843) A computer based information system is a system in which a computer is used to process data to get information
844) The time between program input and outputs is called execution time
845) Third generations of computers have On-line real time systems
846) MIME is a compressor that packages different formats into SMTP compatible type
847) The earliest software was developed using the waterfall model
848) EDI e- commerce system can handle non monetary documents
849) Collection to tracks on a disk forms spindle
850) A disk where number of sectors are fixed is called hard sectored
851) Half duplex transmission techniques let computer to alternatively send and receive data
852) Multiplexing combines signals from different sources into one and sends on a faster channel
853) Message switcher chooses correct data path for an incoming message and forwards it to relevant line
854) Speech recognition use thermal sensors along with infrared rays for identification
855) Trojan horse are self replicating malicious code independent of the action of the user, but slow down the processor on entering a network
856) Generation of PIN in bank ATM would require PIN entered is encrypted
857) Availability, integrity, confidentiality is most necessary for data to be useful
858) Grid is a supercomputer created by networking many small computers
859) A character that changes its value throughout the program is called variables
860) A program coded in programming is done by assembling
861) In write mode of file existing text is replaced by new one
862) When an organization gives contract for development of a software, it has to give data to the service provider. In such cases, the ownership of data should be with the client/organization that outsource services
863) Under a centralized organization Intranet be an effective networking tools
864) For optical fiber used in point to point transmission, the repeater spacing is 10-100 km
865) Favorites are accessible from the start menu
866) Task pre-emption, task priority and semaphores are not needed by server program from an operation system
867) The objective of multiprogramming operating system is to maximize CPU utilization
868) The environment provided to ASP is based on Client/server
869) HUB is layer1 device, central device, dumb device
870) The UNIX, echi command is used to display the message or value of any variable on the screen
871) QAM is used in high speed modem
872) Frame Relay technique uses connection oriented
873) Bipolar always has a non-zero average amplitude
874) In a SONET system, an add/drop multipliers can remove signals from a path
875) The server on the internet is also known as Host
876) For multiple branching in ‘C’ we use switch statement
877) Web site is a collection of HTML documents, graphic files, audio and video files
878) The first network that initiated the internet was ARPANET
879) In MODEMS a digital signal changes some characteristic of a carrier wave
880) The binary values are represented by two different frequencies in frequency shift keying
881) Messenger mailbox is present in Netscape communicator
882) Switching is a method in which multiple communication devices are connected to one another efficiently
883) A bridge recognizes addresses of layer 3
884) EPROM is permanent storage device
885) “.TIF” extension name stands for tagged image format
886) The overhead using BRI is 10 percent of the total data rate
887) In programming languages the key word “Void” means it does not return any value when finished
888) The keyboard shortcut to restart your computer is Ctrl + Alt + Del
889) FORTRAN is not a programming language
890) The instruction LOAD A is a one address instruction
891) MS-Excel is also known as spread sheet
892) Manchester encoding is used in Ethernet technology
893) The instruction of a program which is currently being executed are stored in main memory
894) In DOS environment, the command used to save the file is ^Z
895) All high level language uses compiler and interpreter
896) In html coding <p> …… </p> tag is used to display a paragraph
897) In HTML coding, the following attributes color, size, face used in font tag
898) DHTML stands for dynamic hyper text markup language
899) Fiber optics cable supports data rate up to 100 mbps to 2 gbps

900) In Photoshop software we can modify, delete, and edit the image

No comments:

Post a Comment

Please suggest your valuable comments here....