COMPUTER KNOWLEDGE FOR IBPS SBI RBI UII NIA NICL OICL LICI - TopicsExpress



          

COMPUTER KNOWLEDGE FOR IBPS SBI RBI UII NIA NICL OICL LICI GICI 1) The code for a Web page is written using Hypertext Markup language 2) The first computers were programmed using Machine language 3) A filename is a unique name that you give to a file of information 4) This can be another word for program software 5) Any data or instruction entered into the memory of a computer is considered as storage 6) Which part of the computer displays the work done monitor 7) A series of instructions that tells a computer what to do and how to do it is called a program 8) Hardware is the part of a computer that one can touch and feel . 9) The role of a computer sales representative generally is to determine a buyer’s needs and match it to the correct hardware and software. 10) Supercomputers refers to the fastest, biggest and most expensive computers 11) Executing is the process of carrying out commands 12) The rectangular area of the screen that displays a program, data, and or information is a window 13) The process of a computer receiving information from a server on the internet is known as downloading 14) Disk drive is the part of the computer helps to store information 15) Arithmetic operations include addition, subtraction, multiplication, and division 16) A keyboard is the king of input device 17) An error is known as bug 18) A collection of related information sorted and dealt with as a unit is a file 19) Sending an e-mail is similar to writing a letter 20) IT stands for information technology 21) A menu contains commands that can be selected 22) Plotter, printer, monitor are the group consists of output devices 23) Edit menu is selected to cut, copy and paste 24) The most important or powerful computer in a typical network is network server 25) The primary purpose of software is to turn data into information 26) The ability to find an individual item in a file immediately direct access is used. 27) To make a notebook act as a desktop model, the notebook can be connected to a docking station which is connected to a monitor and other devices 28) You can use the tab key to move a cursor across the screen, indent a paragraph. 29) A collection of related files is called record. 30) Storage that retains its data after the power is turned off is referred to as non-volatile storage. 31) Internet is an example of connectivity. 32) Testing is the process of finding errors in software code. 33) A syntax contains specific rules and words that express the logical steps of an algorithm. 34) Changing an existing document is called the editing documentation 35) Virtual memory is memory on the hard disk that the CPU uses as an extended RAM. 36) Computers use the binary number system to store data and perform calculations. 37) The windows key will launch the start buttons. 38) To move to the beginning of a line of text, press the home key. 39) When sending an e-mail, the subject lines describe the contents of the message. 40) Tables, paragraphs and indexes work with when formatting text in word. 41) TB is the largest unit of storage. 42) The operating system tells the computer how to use its components. 43) When cutting and pasting, the item cut is temporarily stored in clipboard. 44) The blinking symbol on the computer screen is called the cursor. 45) Magnetic tape is not practical for applications where data must be quickly recalled because tape is a sequential because tape is a sequential access medium. 46) Rows and columns are used to organize data in a spread sheet. 47) When you are working on documentation on PC, the document temporarily stored in flash memory. 48) One megabyte equals approximately 1 million bytes. 49) Information travels between components on the motherboard through buses. 50) RAM refers to the memory in your computer. 51) Computer connected to a LAN can share information and or share peripheral equipment 52) Microsoft office is an application suite 53) Utilities can handle most system functions that aren’t handled directly by the operating system 54) If you receive an e-mail from someone you don’t know then you should delete it without opening it 55) A set of instructions telling the computer what to do is called program 56) LAN refers to a small single site network 57) A collection of programs that controls how your computer system runs and processes information is called operating system. 58) Device drivers are small, special-purpose programs 59) Transformation of input into output is performed by the CPU 60) Data going into the computer is called input. 61) Binary choice offer only two options 62) To indent the first paragraph of your report, you should use tab key 63) Fields are distinct item that don’t have much meaning to you in a given context 64) A website address is a unique name that identifies a specific web site on the web 65) Modem is an example of a telecommunications device 66) A set of computer programs used for a certain function such as word processing is the best definition of a software package 67) You can start Microsoft word by using start button 68) A blinking symbol on the screen that shows where the next character will appear is a cursor 69) Highlight and delete is used to remove a paragraph from a report you had written 70) Data and time are available on the desktop at taskbar 71) A directory within a directory is called sub directory 72) Testing is the process of finding errors in software code 73) In Excel, charts are created using chart wizard option 74) Microcomputer hardware consists of three basic categories of physical equipment system unit, input/output, memory 75) Windows is not a common feature of software applications 76) A tool bar contains buttons and menus that provide quick access to commonly used commands 77) For creating a document, you use new command at file menu 78) Input device is equipment used to capture information and commands 79) A programming language contains specific rules and words that express the logical steps of an algorithm 80) One advantage of dial-up internet access is it utilizes existing telephone security 81) Protecting data by copying it from the original source is backup 82) Network components are connected to the same cable in the star topology 83) Two or more computers connected to each other for sharing information form a network 84) A compute checks the database of user name and passwords for a match before granting access 85) Computers that are portable and convenient for users who travel are known as laptops 86) Spam is the term for unsolicited e-mail 87) Utility software type of program controls the various computer parts and allows the user to interact with the computer 88) Each cell in a Microsoft office excel document is referred to by its cell address, which is the cell’s row and column labels 89) Eight digit binary number is called a byte 90) Office LANs that are spread geographically apart on a large scale can be connected using a corporate WAN 91) Storage is the process of copying software programs from secondary storage media to the hard disk 92) The code for a web page is written using Hyper Text Markup Language 93) Small application programs that run on a Web page and may ensure a form is completed properly or provide animation are known as flash 94) In a relational database, table is a data structure that organizes the information about a single topic into rows and columns 95) The first computers were programmed using assembly language 96) When the pointer is positioned on a hyperlink it is shaped like a hand 97) Booting process checks to ensure the components of the computer are operating and connected properly 98) Checking the existing files saved on the disk the user determine what programs are available on a computer 99) Special effect used to introduce slides in a presentation are called animation 100) Computers send and receive data in the form of digital signals 101) Most World Wide Web pages contain HTML commands in the language 102) Icons are graphical objects used to represent commonly used application 103) UNIX is not owned and licensed by a company 104) In any window, the maximize button, the minimize button and the close buttons appear on the title bar 105) Dial-up Service is the slowest internet connection service 106) Every component of your computer is either hardware or software 107) Checking that a pin code number is valid before it is entered into the system is an example of data validation 108) A compiler translates higher level programs into a machine language program, which is called object code 109) The ability to find an individual item in a file immediately direct access 110) Computers connected to a LAN can share information and/or share peripheral equipment 111) A CD-RW disk can be erased and rewritten 112) The two major categories of software include system and application 113) Windows 95, Windows 98 and Windows NT are known as operating systems 114) Information on a computer is stored as analog data 115) A spread sheet that works like a calculator for keeping track of money and making budgets 116) To take information from one source and bring it to your computer is referred to as download 117) Each box in a spread sheet is called a cell 118) Network components are connected to the same cable in the bus topology 119) Two or more computers connected to each other for sharing information form a network 120) A computer checks the database of user names and passwords for a match before granting access. 121) Spam is the other name for unsolicited e-mail 122) Operating system controls the various computer parts and allows the user to interact with the computer 123) Each cell in a Microsoft Office Excel document is referred to by its cell address, which is the cell’s row and column labels 124) Download is the process of copying software programs from secondary storage media to the hard disk 125) The code for a web page is written using Hypertext Markup Language 126) Small application programs that run on a web page and may ensure a form is completed properly or provide animation are known as Flash 127) A file is a unique name that you give to a file of information 128) For seeing the output, you use monitor 129) CDs are of round in shape 130) Control key is used in combination with another key to perform a specific task 131) Scanner will translate images of text, drawings and photos into digital form 132) CPU is the brain of the computer 133) Something which has easily understood instructions is said to be user friendly 134) Information on a computer is stored as digital data 135) For creating a document, you use new command at file menu 136) The programs and data kept in main memory while the processor is using them 137) Ctrl + A command is used to select the whole document 138) Sending an e-mail is same as writing a letter 139) A Website address is a unique name that identifies a specific website on the web 140) Answer sheets in bank PO’s/Clerk’s examinations are checked by using Optical Mark Reader 141) Electronic data exchange provides strategic and operational business opportunity 142) Digital signals used in ISDN have whole number values 143) Assembler is language translation software 144) Manual data can be put into computer by scanner 145) In a bank, after computerization cheques are taken care of by MICR 146) The banks use MICR device to minimize conversion process 147) Image can be sent over telephone lines by using scanner 148) Microchip elements are unique to a smart card 149) MS-DOS is a single user operating system 150) Basic can be used for scientific and commercial purpose 151) All computers can execute machine language programs 152) Programs stored in ROM can’t be erased 153) Ethernet is used for high speed telecommunications 154) IP address can change even if the domain name remains same 155) Each directory entry can be of 32 bytes 156) With the help of Control + Del a letter can be erased in a word 157) Disk can keep maximum data 158) FORTRAN is a scientific computer language 159) Computer language COBOL is useful for commercial work 160) COBOL is a high standard language like English 161) In computer the length of a word can be measured by byte 162) Byte is the unit of storage medium 163) ROM is not a computer language 164) Oracle is a database software 165) Sequential circuit is full aid 166) Processor is must for computer 167) ROM keeps permanent memory 168) Screen display is called by windows in lotus 169) Pascal is a computer language 170) Expanded form of IBM is International business machine 171) IC chips are made of silicon 172) India’s Silicon Valley situated at Bangalore 173) RAM and ROM are the storage devices of computer 174) DOS is to create relation between hardware and software 175) LOTUS 1-2-3 is software 176) Voice mail is a personal security code for GSM subscribers 177) Tables holds actual data in the database 178) Trojan is a virus 179) Static keys make WEB insecure 180) Video signal needs highest bandwidth 181) Connectivity means communication between systems 182) Controlling is not required for high level language programs before it is executed 183) 3 out of three rollers are responsible for the movement of cursor on screen 184) Hardware that adds two numbers is arithmetic logical unit 185) Data accuracy is not done by modem 186) LAN is used for networks setup within a building 187) A data communication system requires terminal device, communication channel, protocols 188) Most common channel used by networks today is satellite 189) Run Time is not a type of error 190) A five-digit card attribute used for postal ZIP codes it will be restored as a numeric data 191) Computer viruses can be attached to an executable program 192) MS-DOS was the first operating system 193) The smallest space where information on a hard disk is kept in a cluster 194) An information is processed data 195) Intelligence is not a characteristic of a computer 196) Private key is used to spend a digital signature 197) Negative numbers can be represented in binary 198) VDU is not an essential part of a computer 199) The printers are line printer, laser, dot matrix 200) Speed of clock of CPU is measured in megahertz 201) Cache is not a secondary storage device 202) Disk can be used to store sequential files and random files 203) Windows is not an application 204) When taking the output information is produced in hardcopy and/or softcopy form 205) Control unit’s function is to decode program instructions 206) The most powerful type of computer amongst the following is supercomputer 207) GO TO statement is used in C, C++, basic language 208) File menu is selected to print 209) The name a user assigns to a document is called a filename 210) A processor is an electronic device that processes data, converting it into information 211) Control words are words that a programming language has set aside for its own use 212) Monitor and printer are the two types of output devices 213) To access properties of an object, the mouse technique to use is right-clicking 214) An operating system is a program that makes the computer easier to use 215) Connections to the internet using a phone line and a modem are called dial-up connections 216) To access a mainframe or supercomputer, users often use a terminal 217) A flaw in a program that causes it to produce incorrect or inappropriate results is called a bug 218) A web site address is a unique name that identifies a specific web site on the web 219) Every component of your computer is either hardware or software 220) To make the number pad act as directional arrows, you press the num lock key 221) When creating a word-processed document, formatting text involves the user changing how words on the page appear, both on the screen and in printed form 222) The ALU performs simple mathematics for the CPU 223) A computer program is a set of keywords, symbols, and a system of rules for constructing statements by which humans can communicate the instructions to be executed by a computer 224) The another word for program is software 225) The name of the computer’s brain is CPU 226) A computer is a device that electronically processes data, converting it to information 227) Laptops are computers that can be carried around easily 228) The secret code that restricts entry to some programs is password 229) The basic goal of computer process is to convert data into information 230) The disk is placed in the CPU in a computer 231) A hard copy of a document is printed on the printer 232) The name that the user gives to a document is referred to as file name 233) Restarting a computer that is already on is referred to as warm booting 234) E-mail is the transmission of messages and files via a computer network 235) The person who writes and tests computer programs is called a programmer 236) The information you put into the computer is called data 237) The output devices make it possible to view or print data 238) A chat is a typed conversation that takes place on a computer 239) Hardware includes the computer and all the devices connected to it that are used to input and output data 240) The most common method of entering text and numerical data into a computer system is through the use of a keyboard 241) Mouse, keyboard, plotter are the group consist of only input devices 242) 256 values can be represented by a single byte 243) Transformation of input into output is performed by the CPU 244) Vertical-market applications can handle most system functions that aren’t handled directly by the operating system 245) Device drivers are small, special-purpose programs 246) LAN refers to a small, single-site network 247) A set of instructions telling the computer what to do is called program 248) Data going into the computer is called input 249) If you receive an e-mail from someone you don’t know, then delete it without opening it 250) Two options does a binary choice offer 251) A collection of programs that controls how you computer system runs and processes information is called operating system 252) Rows and columns are data organized in a spreadsheet 253) When cutting and pasting, the item cut is temporarily stored in clipboard 254) When you are working on a document on a PC, the document is temporarily stored in flash memory 255) One megabyte equals approximately 1 million bytes 266) A cluster represents a group of sectors 267) Digital signals used in ISDN have discrete values 268) Assembler is language translation software 269) Manual data can be put into computer by scanner 270) Bandwidth means channel capacity amount of data following via cables and measure of speed 271) Chip can keep maximum data 272) Debugging is the process of finding errors in software code 273) Time Bomb are viruses that are triggered by the passage of time or on a certain data 274) Linux is an open source operating system 275) Boot sector viruses are often transmitted by a floppy disk left in the floppy drive 276) Operating system controls the way in which the computer system functions and provides a medium by which users can interact with the computer 277) Servers are computers that provide resources to other computers connected to a network 278) Field names describe what a data field is 279) You must install router on a network if you want to share a broadband internet connection 280) A goal of normalization is to minimize the number of redundancy 281) Programs from the same developer, sold, bundled, together, that are provide better integration and share common features, tool box and menus are known as software suits 282) A data ware house is one that organizes important subject areas 283) URL term identifies a specific computer on the web and the main page of the entire site 284) A proxy server is used to process client request for web pages 285) When data changes in multiple list and list are not updated, this causes data inconsistency 286) Granting an outside organization access to internet web pages is often implemented using a extranet 287) The code that relational database management systems use to perform their database task is refer to as SQL 288) URL stands for Uniform resource locator 289) A data base management system is a software system used to create, maintain and provide controlled access to a database 290) The two broad categories of software are system and application 291) The metal or plastic case that holds all the physical parts of the computer is known as system unit 292) Data integrity means that the data contained in the database is accurate and reliable 293) A local area network is a private corporate network used exclusively by company categories 294) Eight bits equal to one byte 295) A byte can hold one character data 296) A characteristic of a file server is manages files operations and is shared on a network 298) The development process of computer started in 1617 299) The role of Blaze Pascal in the development of computer is addition and subtraction of numbers 300) The inventor of computer is Charles Babbage 301) The IBM made the first electronic computer in 1953 302) The silicon based transistor started to made by Gordon Tin in 1954 303) IBM is a company 304) The personal computer invented in 1981 305) 1 Kilobyte is equal to 1024 bytes 306) LCD means liquid crystal display 307) UPS converts DC voltage into AC voltage 308) The word ZIP means Zicxac Inline Pin 309) With the help of Pal switch we can increase or decrease the speed of computer’s processing 310) The full form of MICR is magnetic ink character reader 311) Swift networks are used between banks 312) Panda is a virus 313) Boot sector is hardware 314) Debug searches the fault of any software 315) OCR means optical character recognition 316) The total printout of a program is called listing 317) With the help of ZIP we can decrease the size of any programs 318) We can format the hard disk with the help of Booting 319) CANNED is called as readymade software 320) The process of creating third file by mixing two files is called as mail merging 321) The figures and lines etc. made by computer is called as graphics 322) Each line represents 65 letters in a WordStar 323) Nokia- 7500 is not the example of Micro Processor 324) The first name of the digital computer is Unvake 325) The modern computer was invented in 1946 326) The full form of DOS is disk operating system 327) The expanded form of FORTRAN is formula translation 328) The great revolution came in computer sector in 1960 329) Magnetic tape is called as Input device of computer 330) The first mechanical computer of Charles Babbage is known as punch card machine 331) The IC chip used in computer is generally made in silicon 332) Telephone broadcast is the example of simplex transmission 333) Optical, Mechanical are the kinds of mouse 334) Control panel is used for increasing and decreasing the speed of the cursor of mouse 335) The capacity of modern main frame digital computer is 10(to the power of -12) mbps 336) With the help of my computer we can know about the usage and availability of space in computer 337) We use both MS-Word and page maker for making resume 338) Earliest computers that would work with FORTRAN was second generation 339) Back Ups in database are maintained for to restore the lost data 340) IDEA is a encryption technique 341) DBRM takes care of storage of data in a database 342) The job of DBMS is to decrease redundancy 343) Digital signatures use encryption for authenticating 344) OS acts as intermediary agency between user and hardware 345) Plotters gives the highest quality output 346) ROM is built in memory in computer 347) FLASH is a RAM 348) PRAM is not a RAM 349) FLASH device is used in cell phones 350) Internal storage is same as the primary storage 351) IMAC is name of a machine 352) First generation computers could do batch processing 353) The analytic engine was created by Charles Babbage 354) Voicemail of GSM service provider has the personal security code for its subscribers 355) Senior manager decided about the division of work with respect to IT security 356) Encrypting file system of window XP professional operating system protects the data of a user, even if the computer is shared between users 357) The .mpeg is the format of a movie file 358) Controlling is NOT required for high level language program before it is executed 359) A plotter is output device 360) 80286 is a hardware part of microprocessor 361) Top-bottom approach can not be the measure of network traffic 362) A switching mode power supply is used for converting raw input power to stabilize DC power 363) Spooler can manage the whole printing process 364) Validity routines control procedures can be used to ensure completeness of data 365) Less expensive than leased line networks is not a characteristic of virtual private networks (PVN) 366) Program policy framework provides strategic direction to an organization 367) Cross bar switches have common control 368) Row-level security is the most basic part for database security 369) Voice recognition software can not be used for converting text into voice 370) The user account can only be created by the network administrator 371) IBM-700 belongs to second generation 372) Allocating adequate bandwidth would help her in speeding up the data transfer over net 373) BCD means binary coded decimal 374) Extended system configuration data is same as BIOS 375) Digitizer is an input device 376) Caramel is the latest platform of Intel Centrio microprocessor 377) RISC is known as storage device 378) NORTON is an anti-virus 379) The system file of an operating system is COM 380) ATMs of bank have real currency 381) A program that converts high level language to machine language is assembler 382) ‘.txt’ files can be made in notepad, MS word, DOS editor 383) .Zip is a compressed file 384) Internet is a WAN 385) MP3 technology compresses a sound sequence to one-twelfth of its original size 386) At a time only one operating system can be at work on a computer 387) If multiple programs can be executed at the same time, it is distributed operating system 388) If the operating system provides quick attention, it is real time operating system 389) Distributed operating system uses network facility 390) FORMAT command in MS-DOS is used for recreating disk information 391) COPY command in MS-DOS is used to copy one or more files in disk drive to another, copy from one directory to another directory 392) REN command is Internal command 393) Tom Burners-Li propounded the concept of “World wide web” 394) The memory address sent from the CPU to the main memory over a set of wires is called address bus 395) MODEM is an electronic device required the computer to connect to the INTERNET 396) A source program is a program which is to be Tran scripted in machine language 397) Virus in computer relates to program 398) Floppy is not a storage medium in the computer related hardware 399) DOS floppy disk does not have a boot record 400) The CPU in a computer comprises of Store, arithmetic and logical unit and control unit 401) In computer parlor a mouse is a screen saver 402) UNIVA is the name of the computer which was first used for programming and playing of music 403) The IC chips for computer is prepared from silicon 404) Database management systems are comprised of tables that made up of rows called records and columns called fields 405) Nano is equal to 10(to the power of -9) 406) In computers RAM is a non-volatile memory 407) Disk and tape drives are commonly used as hard copy 408) When computer is connected to LAN and data is sent across it for storage/processing is online processing 409) The primary storage unit is also referred to as internal storage 410) Oracle is not an operating system 411) Data are raw facts and figures 412) Holding of all data and instructions to be processed is one of the functions of storage unit 413) To select the entire row in Excel, click mouse at row heading 414) Database is known as structured data 415) Normal view and outline view notes pane appears in power point 416) The user protection feature of an operating system is required in multi-user system only 417) In word, Ctrl + Del combination of keys press to delete an entire word 418) In MS-Word double clicking a word selects the word 419) Word document can be navigated in web layout view 420) In Excel, addressing mode(s) that can be used in a formula is/are only absolute and relative 421) Note page views can you use to show just the slide and its contents 422) Hardware that adds two numbers is arithmetic logical unit 423) The computer as a machine and all other physical equipment associated with it are termed as hardware 424) Plotters are very useful in applications such as computer aided design 425) Corel DRAW is a graphic package 426) The print to file option creates .prn file 427) The enhanced keyboard contains 101 keys 428) Data processing cycle consists of input cycle, output cycle and processing cycle 429) Page Setup is not an option of Edit menu 430) Radar chart is used to show a correlation between two data series 431) A computerized business information system includes hardware, software and data facts 432) Purchase order file is a transaction file 433) A typical computerized business application system will have both master and transaction file 434) Problem identification is taken first in designing a program 435) The purpose of the EXIT command is to get out of a condition loop 436) Employees details is a master file for the pay roll system 437) A slow memory can be connected to 8085 by using READY 438) A processor needs software interrupt to obtain system services which need execution of privileged instructions 439) A CPU has two modes- privileged and non-privileged. In order to change the mode from the privileged to the non-privileged, a software interrupt is needed 440) Swap space resides at disk 441) The process of assigning load addressed to the various parts of the program and adjusting the code and data in the program to reflect the assigned address is called relocation 442)1 Sector= 4096 bytes 443) Two stacks of size required to implement a queue of size n 444) 1 Floppy = 6, 30,784 bytes or 308 KB 445) Consider a machine with 64 MB physical memory and a 32-bit virtual address space. If the page size is 4 KB, then size of the page table is 2 MB 446) Consider a virtual memory system with FIFO page replacement policy. For an arbitrary page access pattern, increasing the number of page frames in main memory will always decrease the number of page faults 447) Consider a scheme R(A, B, C, D) and functional dependencies A->B and C-> D. Then the decomposition of R into R1 (AB) and R2 (CD) is dependency preserving and lossless join 448) Main memory requires a device driver 449) RAM can be divided into 2 types 450) Two friends suitably arrange 4 blocks of different colors to exchange coded information between them. 4 bits of information is one exchanging each time 451) Cache memory is a part of main memory 452) The number 43 in 2’s complement representation is 01010101 453) The 8085 microprocessor responds to the presence of an interrupt by checking the TRAP pin for ‘high’ status at the end of each instruction fetch 454) All machinery and apparatus of computer is called hardware 455) The number 1024 bytes is the complement representation of 1 Kilo byte 456) System design specifications do not include blueprint showing the layout of hardware 457) Web pages are uniquely identified using URL 458) The results of arithmetic and logical operations are stored in an accumulator 459) The input device that is closely related to touch screen is the light pen 500) F2 keys of control center specified below displays data, toggles browse/edit 501) A compiler breaks the source code into a uniform stream of tokens by lexical analysis 502) The number of processes that may running at the same time in a large system can be thousands 503) LET.BAS files are related to Microsoft word utility 504) A command in UNIX can have one or more arguments 505) A hard disk is logically organized according to cylinders and sectors 506) A frame can include text & graphics, tables & graphics, graphics 507) All the formatting data for the paragraph is stored in the paragraph mark 508) The abbreviation CAD stands for computer aided design 509) We can define hypertext definition in notebooks using Macsyma 2.0 510) The addressing mode(s) that can be used in a formula is/are- absolute, relative and mixed 511) WINDOWS can work in enhanced and standard modes 512) The part of a machine level instruction which tells the central processor what has to be done is an operation code 513) O-Matrix software packages do not have animation capabilities 514) In order to paste text form the clipboard in the document being edited, press the Ctrl-A key 515) A program that converts a high level language program to a set of instructions that can run on a computer is called a compiler 516) Faster execution of programs is not an advantage of a subroutine 517) First generation of computer period is 1945-1950 518) IBM built first PC in the year 1981 519) A small computer program embedded within an HTML document when a user retrieves the web page from a web server is called an applet 520) Another name for systems implementation is transformation 521) The central host computer or file server in a star network maintains control with its connecting devices through polling 522) C++ does not check whether the index value is within scope 523) The browser uses uniform resource locator to connect to the location or address of internet resources 524) In the centralized computing architecture, the entire file is downloaded from the host computer to the user’s computer in response to a request for data 525) An expert system enables one or more users to move and react to what their senses perceive in a computer simulated environment 526) Popping or removing an element from an empty stack is called underflow 527) The ability to combine data and operations on that data in a single unit is known as polymorphism 528) A router is a device that sites between your internal network and the internet and limits access into and out of your network based on your organization’s access policy 529) In C++, private, protected, and public are reserved words and are called member access specifiers 530) The integration of all kinds of media such as audio, video, voice, graphics and text into one coherent presentation combined is called multimedia 531) The derived class can redefine the public member functions of the base class 532) A technique for searching special databases, called data warehouses, looking for related information and patterns is called data mining 533) Like the quick sort the merge sort uses the divide and conquer technique to sort a list 534) The use of expert systems technology can greatly reduce the number of calls routed to a customer service department 535) Building a list in the backward manner, a new node is always inserted at the beginning of the list 536) Creating a web site is also called web authoring 537) Using the optimization analysis approach, the expert system starts with a conclusion and tries to verify that the rules, facts, and conclusion all match. If not, the expert system chooses another conclusion 538) Both the application program and operating system program only describes the software 539) Root is one of the items given below is not an item of the menu bar 540) BACKUP is not an internal command 541) In a disk, each block of data is written into one sector 542) Hard copy is a printed copy of machine output 543) A boot strap is a small utilization computer program to start up in inactive computer 544) CAD is oriented towards software 545) Icons are picture commands 546) IBM company for the first time launched pocket computers 547) PROM is a computer part 548) Algorithms can handle most system functions that aren’t handled directly by the operating system 549) Device drivers are small, special-purpose programs 550) LAN refers to a small, single site network 551) A collection of programs that controls how your computer system runs and processes information is called operating system 552) When we are working on a document on a PC the document is temporarily stored in RAM 553) Information travels between components on the motherboard through buses 554) Microsoft is a vertical market application 555) RAM refers to the memory in your computer 556) Computers connected to a LAN can share information and / or share equipment 557) Magnetic tape is not practical for applications where data must be quickly recalled because tape is a sequential access medium 558) In Late 1988 computer viruses land in India for the first time 559) ALU is a part of the CPU 560) In computer technology a compiler means a program, which translates source program into object program 561) American computer company IBM is called big blue 562) The first IBM PC did not have any ROM 563) The digital computer was developed primarily in UK 564) Programs which protect a disk from catching an infection are called antidotes 565) The first movie with terrific computer animation and graphics was released in 1982 is Tron 566) An integrated circuit is fabricated on a tiny silicon chip 567) The word size of a microprocessor refers to the amount of information that can be stored in the byte 568) Daisy-wheel printer cannot print graphics 569) In the IBM PC-AT, the word AT stands for advanced terminology 570) Dedicated computer means which is assigned one and only one task 571) Real time programming type of computers programming is used for aero plane ticket reservation system 572) RAM means memory which can be both read and written to 573) Laser printer uses light beam and electro statically sensitive black powder 574) The Santa Clara Valley, California is popularly known a Silicon Valley of America because many silicon chip manufacturing firms are located there 575) A program written in machine language is called assembler 576) International business machine was the first company in the world to build computer for sale 577) PARAM is a parallel computer 578) For communications, wide area networks use special purpose telephone wires and fiber optic cables and microwaves 579) Data transfer rate in modems is measured in bits per second 580) A compiler cannot detect logical errors in source programs 581) Throughput, turnaround time, response time are measures of system performance 582) OLTP architecture can handle a limited number of dimensions whereas OLAP architecture does not have any limit on the number of dimensions 583) The binary equivalent of (40.125) suffix 10 is 101000.001 584) Kernel is the only art of an operating system that a user cannot replace or modify 585) Symbol signifies a magnetic disk 586) COBOL programming language was initially developed for consumer electronics goods 587) Running, blocked, ready, terminated are different states of a process 588) Rational rose is an example of a modeling language 589) A disk worm is an example of optical devices 590) A RAID is a disk array 591) The first private internet service provider in India was Satyam infoway 592) The maximum and minimum unsigned number which can be stored in a 8 bit word is 0 and 255 593) Stack is a part of memory 594) HIT RATIO is associated with cache performance 595) Laser printer is a page printer 596) Storage capacity of a disk system depends upon number of recording surfaces and number of sectors per track 597) Abstraction is associated with object oriented technology and database technology 598) The terms opcode and operand are associated with any high level language 599) Dynamic binding is associated with object oriented programming 600) The term CHIP, JEWELLARY means a processor with high capacity 601) A watch point is associated with debugger 602) A multithreaded program uses multiple processes 603) Time sharing is a mechanism to provide spontaneous interactive use of a computer system by many users in such a way that each user is given the impression that he/she has his/her own computer 604) The typical scheme of memory management used in IBMOS/360 mainframe system was that of multiprogramming with variable number of memory partitions 605) The concepts used for realization of virtual memory are swapping, demand paging and In-line secondary storage 606) Oracle 8i is an example of OORDBMS 607) ALPHA, RIOS, SPARC are examples of RISC Processors 608) The scope of an identifier refers to where in the program an identifier is accessible 609) Hierarchy is not a component of relational database 610) A two-way selection in C++ is the if…else 611) A recursive function executes more efficiently than its iterative counterpart 612) The body of the recursive function contains a statement that causes the same function to execute before completing the last call 613) Variables that are created during program execution are called dynamic variables 614) When destroying a list, we need a delete pointer to deallocate the memory 615) The first character in the ASCII character set is the null character, which is nonprintable 616) A variable for which memory is allocated at block entry and deallocated at block exit is called a static variable 617) Signal to noise ratio compares signal strength to noise level 618) The ability to create new objects from existing objects is known as inheritance 619) Software tools that provide automated support for the systems development process are OLAP tools 620) Applications/Web server tier processes HTTP protocol, scripting tasks, performs calculations, and provides access to data 621) A language used to describe the syntax rules is known as meta language 622) In a preorder traversal, the binary tree is traversed as follows 623) The general syntax of the function prototype of a value returning function is function name (parameter list) 624) Competitive intelligence is the process of gathering enough of the right information in a timely manner and usable form and analyzing it so that it can have a positive impact 625) Tracing values through a sequence is called a play out 626) In a binary tree, each comparison is drawn as a circle, called a node 627) The term used as a measurement of a communication channel’s data capacity is bandwidth 628) In addition to the nature of the problem, the other key factor in determining the best solution method is function 629) An E-R data model solves the problem of presenting huge information system data models is to users and developers 630) In C++, predefined functions are organized into separate libraries 631) The standard protocol (communication rules for exchange of data) of the internet is TCP/IP 632) For efficiency purposes, wherever possible, you should overload operators as member functions 633) Modifying algorithms that change the order of the elements, not their values, are also called modifying algorithms 634) As long as the tables in a relational database share at least one common data attribute, the tables in a relational database can be normalized to provide useful information and reports 635) DBMS is a simple, fourth generation language used for data retrieval 636) An occurrence of an undesirable situation that can be detected during program execution is known a exception 637) A photo of the company headquarters would be an example of the use of a static web page 638) The Pentium processor contains thousands of transistors 639) SOI technology has been successful with reference to SRAM 640) Secondary storage device is needed to print output results 641) Static random access memory does not fall under the category of secondary storage devices 642) Floppy disk is universal, portable and inexpensive but has its own limitation in terms of storage capacity and speed 643) Some physical property of the microscopic area of the disk surface is changed for recording in common for all types of disks 644) In a disk, each block of data is written into two or more sectors 645) A floppy disk rotates at 100rpm 646) A hard disk has 500 to 1000 tracks or more 647) The storage capacity of a cartridge tape is 400 MB 648) Single density recording is also known as frequency modulation 649) Printer is not an input device 650) The input device that is most closely related to a touch screen is the light pen 651) Laser printer generates characters from a grid of pins 652) The liquid crystal display works on the basis of the relation between polaristion and electric field 653) A COBOL program in source code is not considered to be system software 654) Firmware stored in a hard disk 655) A compiler breaks the source code into a uniform stream of tokens by lexical analysis 656) Sorting of a file tasks is not performed by a file utility program 657) Floppy disk does not generate a hardware interrupt 658) Ada language is associated with real time processing 659) MS DOS is usually supplied on a cartridge tape 660) BREAK is not an internal DOS command 661) Kernel of MS-DOS software resides in ROM 662) The UNIX operating system (available commercially) has been written in C language 663) MS-DOS has better file security system as compared to UNIX 664) UNIX is only a multiprogramming system 665) The UNIX operating system uses three files to do the task mentioned 666) In UNIX, end-of-file is indicated by typing CTRL D 667) Abacus is said to be invented by Chinese 668) An operating system is necessary to work on a computer 669) The first UNIX operating system, as it was in the development stage, was written in the assembly language 670) FAST drivers scientific software packages was developed under contract with NASA 671) LEFT () is not a date function 672) FIF editor is a windows based application 673) Graphics is inserted in frame 674) A language translator is best described as a system software 675) The specification of a floppy is identified by TPI 676) DISC () is not a database function 677) In opening menu of word star C OPTION should be selected for protecting a file 678) The most advanced form of ROM is electronically erasable programmable ROM 679) Secondary storage device is needed to store large volumes of data and programs that exceed the capacity of the main memory 680) MORE sends contents of the screen to an output device 681) NFS stands for N/W file system 682) Main protocol used in internet is TCP/IP 683) We can create a simple web page by using front page express 684) The first line/bar on the word window where the name of the document is displayed is called title bar 685) The clock frequency of a Pentium processor is 50 MHz 686) The input device that is most likely to be used to play computer games is the joystick 687) Linking the program library with main program is not performed by a file utility program 688) The UNIX operating system has been written in C language 689) BIOS of MS-DOS resides in ROM 690) The sector size of a floppy disk varies from 128 bytes to 1024 bytes 691) A program type of errors is flagged by compilers 692) A floppy diskette is organized according to tracks and sectors 693) In word star, the maximum permissible length of search string is 65 694) C is a third generation high level language 695) A CPU has a 16-bit program counter. This means that the CPU can address 64 K memory locations 696) STR () is used for converting a numeric into a character string 697) BASIC language is normally used along with an interpreter 698) In UNIX, open files are shared between the parent and the child 699) In spite of the extra power needed for refreshing. DRAMs are widely used in computers because of its lower cost relatives to SRAMs 700) PIF editor belongs to Main group 701) SUM () is not a financial function 702) 98/04/12 cannot be used to enter a date 703) Windows is popular because of its being expensive 704) Personal computers currently sold in India have main memories at an entry level in the range of megabytes 705) The unit in CPU or processor, which performs arithmetic and logical operations is ALU 706) RAM is volatile 707) The result of arithmetic and logical operations is stored in an accumulator 708) A small amount of memory included in the processor for high speed access is called cache 709) A bus is an electronic track system 710) A co-processor is used to improve the speed of mathematical calculations 711) Intel 80286 belongs to third generation microprocessors 712) A hexadigit can be represented by eight binary bits 713) The number of processes that may running at the same time in a large system can be thousands 714) FORTRAN is a 3GL 715) Root is not an item of the Menu bar 716) Difficult to do what it projects is not considered to be a feature of the spreadsheet 717) While starting the Lotus 1-2-3, the current cell reference is shown at top left hand corner of the screen 718) Bill gates is the chief of Microsoft 719) Excel office assistant can be made to appear by using F1 key and help menu 720) 9 per page is the max no of showing positioning of per page handouts 721) Alignment buttons are available on formatting toolbar 722) Pico second is 10(to the power of-9) 723) Logo refers to a computer language 724) The most appropriate command to permanently remove all records from the current table is Zap 725) The efficient and well designed computerized payroll system would be on-line real time system 726) The scripts which are designed to receive value from Web users is CGI script 727) WAIS stands for – wide assumed information section 728) Modem is used for connecting PC using telephone lines 729) Token bus is the most popular LAN protocol for bus topology 730) Manipulating data to create information is known as analysis 731) A separate document form another program sent along with an E-mail message is known as E-mail attachment 732) When you boot up a PC — portions of the operating system are copied from disk into memory 733) Correcting errors in a program is called debugging 734) A word processor would most likely be used to type a biography 735) A database is an organized collection of data about a single entity 736) Fire fox is a web browser 737) Most of the commonly used personal computers/laptops do not have a command key known as turnover 738) Full form of USB is known as Universal serial bus 739) The quickest and easiest way in Word to locate a particular word or phrase in a document is to use the find command 740) Computer sends and receives data in the form of digital signals 741) Icons are graphical objects used to represent commonly used application 742) Most World Wide Web pages contain HTML commands in the language 743) In any window, the maximize button, the minimize button and the close buttons appear on the title bar 744) Checking that a pin code number is valid before it is entered into the system in an example of data validation 745) Windows 95 and windows 98 and Windows NT are known as operating systems 746) Information on a computer is stored as analog data 747) A program that works like a calculator for keeping track of money and making budgets is spreadsheet 748) To take information from one source and bring it to your computer is referred to as download 749) Windows is not a common feature of software applications 750) A toolbar contains buttons and menus that provide quick access to commonly used commands.
Posted on: Mon, 15 Dec 2014 11:07:06 +0000

Trending Topics



Recently Viewed Topics




© 2015