1500 Important Computer Awareness
1500 Important Computer Awareness
1) The code for a Web page is written using Hypertext Markup language
2) The first computers were programmed using Machine language
3) A filename is a unique name that you give to a file of information
4) This can be another word for program software
5) Any data or instruction entered into the memory of a computer is considered as storage
6) Which part of the computer displays the work done monitor
7) A series of instructions that tells a computer what to do and how to do it is called a
program
8) Hardware is the part of a computer that one can touch and feel .
9) The role of a computer sales representative generally is to determine a buyers needs
and match it to the correct hardware and software.
10) Supercomputers refers to the fastest, biggest and most expensive computers
11) Executing is the process of carrying out commands
12) The rectangular area of the screen that displays a program, data, and or information is a
window
13) The process of a computer receiving information from a server on the internet is known
as downloading
14) Disk drive is the part of the computer helps to store information
15) Arithmetic operations include addition, subtraction, multiplication, and division
16) A keyboard is the king of input device
17) An error is known as bug
18) A collection of related information sorted and dealt with as a unit is a file
19) Sending an e-mail is similar to writing a letter
20) IT stands for information technology
21) A menu contains commands that can be selected
22) Plotter, printer, monitor are the group consists of output devices
23) Edit menu is selected to cut, copy and paste
24) The most important or powerful computer in a typical network is network server
25) The primary purpose of software is to turn data into information
26) The ability to find an individual item in a file immediately direct access is used.
27) To make a notebook act as a desktop model, the notebook can be connected to a
docking station which is connected to a monitor and other devices
28) You can use the tab key to move a cursor across the screen, indent a paragraph.
29) A collection of related files is called record.
30) Storage that retains its data after the power is turned off is referred to as non-volatile
storage.
31) Internet is an example of connectivity.
32) Testing is the process of finding errors in software code.
33) A syntax contains specific rules and words that express the logical steps of an
algorithm.
34) Changing an existing document is called the editing documentation
35) Virtual memory is memory on the hard disk that the CPU uses as an extended RAM.
36) Computers use the binary number system to store data and perform calculations.
37) The windows key will launch the start buttons.
38) To move to the beginning of a line of text, press the home key.
39) When sending an e-mail, the subject lines describe the contents of the message.
40) Tables, paragraphs and indexes work with when formatting text in word.
41) TB is the largest unit of storage.
42) The operating system tells the computer how to use its components.
43) When cutting and pasting, the item cut is temporarily stored in clipboard.
44) The blinking symbol on the computer screen is called the cursor.
45) Magnetic tape is not practical for applications where data must be quickly recalled
because tape is a sequential because tape is a sequential access medium.
46) Rows and columns are used to organize data in a spread sheet.
47) When you are working on documentation on PC, the document temporarily stored in
flash memory.
48) One megabyte equals approximately 1 million bytes.
49) Information travels between components on the motherboard through buses.
50) RAM refers to the memory in your computer.
51) Computer connected to a LAN can share information and or share peripheral equipment
77) For creating a document, you use new command at file menu
78) Input device is equipment used to capture information and commands
79) A programming language contains specific rules and words that express the logical
steps of an algorithm
80) One advantage of dial-up internet access is it utilizes existing telephone security
81) Protecting data by copying it from the original source is backup
82) Network components are connected to the same cable in the star topology
83) Two or more computers connected to each other for sharing information form a network
84) A compute checks the database of user name and passwords for a match before
granting access
85) Computers that are portable and convenient for users who travel are known as laptops
86) Spam is the term for unsolicited e-mail
87) Utility software type of program controls the various computer parts and allows the user
to interact with the computer
88) Each cell in a Microsoft office excel document is referred to by its cell address, which is
the cells row and column labels
89) Eight digit binary number is called a byte
90) Office LANs that are spread geographically apart on a large scale can be connected
using a corporate WAN
91) Storage is the process of copying software programs from secondary storage media to
the hard disk
92) The code for a web page is written using Hyper Text Markup Language
93) Small application programs that run on a Web page and may ensure a form is
completed properly or provide animation are known as flash
94) In a relational database, table is a data structure that organizes the information about a
single topic into rows and columns
95) The first computers were programmed using assembly language
96) When the pointer is positioned on a hyperlink it is shaped like a hand
97) Booting process checks to ensure the components of the computer are operating and
connected properly
98) Checking the existing files saved on the disk the user determine what programs are
available on a computer
99) Special effect used to introduce slides in a presentation are called animation
100) Computers send and receive data in the form of digital signals
101) Most World Wide Web pages contain HTML commands in the language
102) Icons are graphical objects used to represent commonly used application
103) UNIX is not owned and licensed by a company
104) In any window, the maximize button, the minimize button and the close buttons appear
on the title bar
105) Dial-up Service is the slowest internet connection service
106) Every component of your computer is either hardware or software
107) Checking that a pin code number is valid before it is entered into the system is an
example of data validation
108) A compiler translates higher level programs into a machine language program, which is
called object code
109) The ability to find an individual item in a file immediately direct access
110) Computers connected to a LAN can share information and/or share peripheral
equipment
111) A CD-RW disk can be erased and rewritten
112) The two major categories of software include system and application
113) Windows 95, Windows 98 and Windows NT are known as operating systems
114) Information on a computer is stored as analog data
115) A spread sheet that works like a calculator for keeping track of money and making
budgets
116) To take information from one source and bring it to your computer is referred to as
download
117) Each box in a spread sheet is called a cell
118) Network components are connected to the same cable in the bus topology
119) Two or more computers connected to each other for sharing information form a
network
120) A computer checks the database of user names and passwords for a match before
granting access.
121) Spam is the other name for unsolicited e-mail
122) Operating system controls the various computer parts and allows the user to interact
with the computer
123) Each cell in a Microsoft Office Excel document is referred to by its cell address, which
is the cells row and column labels
124) Download is the process of copying software programs from secondary storage media
to the hard disk
125) The code for a web page is written using Hypertext Markup Language
126) Small application programs that run on a web page and may ensure a form is
completed properly or provide animation are known as Flash
127) A file is a unique name that you give to a file of information
128) For seeing the output, you use monitor
129) CDs are of round in shape
130) Control key is used in combination with another key to perform a specific task
131) Scanner will translate images of text, drawings and photos into digital form
132) CPU is the brain of the computer
133) Something which has easily understood instructions is said to be user friendly
134) Information on a computer is stored as digital data
135) For creating a document, you use new command at file menu
136) The programs and data kept in main memory while the processor is using them
137) Ctrl + A command is used to select the whole document
138) Sending an e-mail is same as writing a letter
139) A Website address is a unique name that identifies a specific website on the web
140) Answer sheets in bank POs/Clerks examinations are checked by using Optical Mark
Reader
141) Electronic data exchange provides strategic and operational business opportunity
142) Digital signals used in ISDN have whole number values
143) Assembler is language translation software
144) Manual data can be put into computer by scanner
145) In a bank, after computerization cheques are taken care of by MICR
146) The banks use MICR device to minimize conversion process
147) Image can be sent over telephone lines by using scanner
148) Microchip elements are unique to a smart card
149) MS-DOS is a single user operating system
234) E-mail is the transmission of messages and files via a computer network
235) The person who writes and tests computer programs is called a programmer
236) The information you put into the computer is called data
237) The output devices make it possible to view or print data
238) A chat is a typed conversation that takes place on a computer
239) Hardware includes the computer and all the devices connected to it that are used to
input and output data
240) The most common method of entering text and numerical data into a computer system
is through the use of a keyboard
241) Mouse, keyboard, plotter are the group consist of only input devices
242) 256 values can be represented by a single byte
243) Transformation of input into output is performed by the CPU
244) Vertical-market applications can handle most system functions that arent handled
directly by the operating system
245) Device drivers are small, special-purpose programs
246) LAN refers to a small, single-site network
247) A set of instructions telling the computer what to do is called program
248) Data going into the computer is called input
249) If you receive an e-mail from someone you dont know, then delete it without opening it
250) Two options does a binary choice offer
251) A collection of programs that controls how you computer system runs and processes
information is called operating system
252) Rows and columns are data organized in a spreadsheet
253) When cutting and pasting, the item cut is temporarily stored in clipboard
254) When you are working on a document on a PC, the document is temporarily stored in
flash memory
255) One megabyte equals approximately 1 million bytes
266) A cluster represents a group of sectors
267) Digital signals used in ISDN have discrete values
268) Assembler is language translation software
269) Manual data can be put into computer by scanner
270) Bandwidth means channel capacity amount of data following via cables and measure
of speed
271) Chip can keep maximum data
272) Debugging is the process of finding errors in software code
273) Time Bomb are viruses that are triggered by the passage of time or on a certain data
274) Linux is an open source operating system
275) Boot sector viruses are often transmitted by a floppy disk left in the floppy drive
276) Operating system controls the way in which the computer system functions and
provides a medium by which users can interact with the computer
277) Servers are computers that provide resources to other computers connected to a
network
278) Field names describe what a data field is
279) You must install router on a network if you want to share a broadband internet
connection
280) A goal of normalization is to minimize the number of redundancy
281) Programs from the same developer, sold, bundled, together, that are provide better
integration and share common features, tool box and menus are known as software suits
282) A data ware house is one that organizes important subject areas
283) URL term identifies a specific computer on the web and the main page of the entire
site
284) A proxy server is used to process client request for web pages
285) When data changes in multiple list and list are not updated, this causes data
inconsistency
286) Granting an outside organization access to internet web pages is often implemented
using a extranet
287) The code that relational database management systems use to perform their database
task is refer to as SQL
288) URL stands for Uniform resource locator
289) A data base management system is a software system used to create, maintain and
provide controlled access to a database
290) The two broad categories of software are system and application
291) The metal or plastic case that holds all the physical parts of the computer is known as
system unit
292) Data integrity means that the data contained in the database is accurate and reliable
293) A local area network is a private corporate network used exclusively by company
categories
294) Eight bits equal to one byte
295) A byte can hold one character data
296) A characteristic of a file server is manages files operations and is shared on a network
298) The development process of computer started in 1617
299) The role of Blaze Pascal in the development of computer is addition and subtraction of
numbers
300) The inventor of computer is Charles Babbage
301) The IBM made the first electronic computer in 1953
302) The silicon based transistor started to made by Gordon Tin in 1954
303) IBM is a company
304) The personal computer invented in 1981
305) 1 Kilobyte is equal to 1024 bytes
306) LCD means liquid crystal display
307) UPS converts DC voltage into AC voltage
308) The word ZIP means Zicxac Inline Pin
309) With the help of Pal switch we can increase or decrease the speed of computers
processing
310) The full form of MICR is magnetic ink character reader
311) Swift networks are used between banks
312) Panda is a virus
313) Boot sector is hardware
314) Debug searches the fault of any software
315) OCR means optical character recognition
316) The total printout of a program is called listing
317) With the help of ZIP we can decrease the size of any programs
318) We can format the hard disk with the help of Booting
319) CANNED is called as readymade software
320) The process of creating third file by mixing two files is called as mail merging
321) The figures and lines etc. made by computer is called as graphics
322) Each line represents 65 letters in a WordStar
323) Nokia- 7500 is not the example of Micro Processor
324) The first name of the digital computer is Unvake
325) The modern computer was invented in 1946
326) The full form of DOS is disk operating system
327) The expanded form of FORTRAN is formula translation
328) The great revolution came in computer sector in 1960
329) Magnetic tape is called as Input device of computer
330) The first mechanical computer of Charles Babbage is known as punch card machine
331) The IC chip used in computer is generally made in silicon
332) Telephone broadcast is the example of simplex transmission
333) Optical, Mechanical are the kinds of mouse
334) Control panel is used for increasing and decreasing the speed of the cursor of mouse
335) The capacity of modern main frame digital computer is 10(to the power of -12) mbps
336) With the help of my computer we can know about the usage and availability of space
in computer
337) We use both MS-Word and page maker for making resume
338) Earliest computers that would work with FORTRAN was second generation
339) Back Ups in database are maintained for to restore the lost data
340) IDEA is a encryption technique
341) DBRM takes care of storage of data in a database
342) The job of DBMS is to decrease redundancy
343) Digital signatures use encryption for authenticating
344) OS acts as intermediary agency between user and hardware
345) Plotters gives the highest quality output
346) ROM is built in memory in computer
347) FLASH is a RAM
348) PRAM is not a RAM
349) FLASH device is used in cell phones
404) Database management systems are comprised of tables that made up of rows called
records and columns called fields
405) Nano is equal to 10(to the power of -9)
406) In computers RAM is a non-volatile memory
407) Disk and tape drives are commonly used as hard copy
408) When computer is connected to LAN and data is sent across it for storage/processing
is online processing
409) The primary storage unit is also referred to as internal storage
410) Oracle is not an operating system
411) Data are raw facts and figures
412) Holding of all data and instructions to be processed is one of the functions of storage
unit
413) To select the entire row in Excel, click mouse at row heading
414) Database is known as structured data
415) Normal view and outline view notes pane appears in power point
416) The user protection feature of an operating system is required in multi-user system
only
417) In word, Ctrl + Del combination of keys press to delete an entire word
418) In MS-Word double clicking a word selects the word
419) Word document can be navigated in web layout view
420) In Excel, addressing mode(s) that can be used in a formula is/are only absolute and
relative
421) Note page views can you use to show just the slide and its contents
422) Hardware that adds two numbers is arithmetic logical unit
423) The computer as a machine and all other physical equipment associated with it are
termed as hardware
424) Plotters are very useful in applications such as computer aided design
425) Corel DRAW is a graphic package
426) The print to file option creates .prn file
427) The enhanced keyboard contains 101 keys
428) Data processing cycle consists of input cycle, output cycle and processing cycle
429) Page Setup is not an option of Edit menu
430) Radar chart is used to show a correlation between two data series
431) A computerized business information system includes hardware, software and data
facts
432) Purchase order file is a transaction file
433) A typical computerized business application system will have both master and
transaction file
434) Problem identification is taken first in designing a program
435) The purpose of the EXIT command is to get out of a condition loop
436) Employees details is a master file for the pay roll system
437) A slow memory can be connected to 8085 by using READY
438) A processor needs software interrupt to obtain system services which need execution
of privileged instructions
439) A CPU has two modes- privileged and non-privileged. In order to change the mode
from the privileged to the non-privileged, a software interrupt is needed
440) Swap space resides at disk
441) The process of assigning load addressed to the various parts of the program and
adjusting the code and data in the program to reflect the assigned address is called
relocation
442)1 Sector= 4096 bytes
443) Two stacks of size required to implement a queue of size n
444) 1 Floppy = 6, 30,784 bytes or 308 KB
445) Consider a machine with 64 MB physical memory and a 32-bit virtual address space. If
the page size is 4 KB, then size of the page table is 2 MB
446) Consider a virtual memory system with FIFO page replacement policy. For an arbitrary
page access pattern, increasing the number of page frames in main memory will always
decrease the number of page faults
447) Consider a scheme R(A, B, C, D) and functional dependencies A->B and C-> D. Then
the decomposition of R into R1 (AB) and R2 (CD) is dependency preserving and lossless
join
448) Main memory requires a device driver
449) RAM can be divided into 2 types
450) Two friends suitably arrange 4 blocks of different colors to exchange coded information
between them. 4 bits of information is one exchanging each time
451) Cache memory is a part of main memory
538) Both the application program and operating system program only describes the
software
539) Root is one of the items given below is not an item of the menu bar
540) BACKUP is not an internal command
541) In a disk, each block of data is written into one sector
542) Hard copy is a printed copy of machine output
543) A boot strap is a small utilization computer program to start up in inactive computer
544) CAD is oriented towards software
545) Icons are picture commands
546) IBM company for the first time launched pocket computers
547) PROM is a computer part
548) Algorithms can handle most system functions that arent handled directly by the
operating system
549) Device drivers are small, special-purpose programs
550) LAN refers to a small, single site network
551) A collection of programs that controls how your computer system runs and processes
information is called operating system
552) When we are working on a document on a PC the document is temporarily stored in
RAM
553) Information travels between components on the motherboard through buses
554) Microsoft is a vertical market application
555) RAM refers to the memory in your computer
556) Computers connected to a LAN can share information and / or share equipment
557) Magnetic tape is not practical for applications where data must be quickly recalled
because tape is a sequential access medium
558) In Late 1988 computer viruses land in India for the first time
559) ALU is a part of the CPU
560) In computer technology a compiler means a program, which translates source program
into object program
561) American computer company IBM is called big blue
562) The first IBM PC did not have any ROM
563) The digital computer was developed primarily in UK
564) Programs which protect a disk from catching an infection are called antidotes
565) The first movie with terrific computer animation and graphics was released in 1982 is
Tron
566) An integrated circuit is fabricated on a tiny silicon chip
567) The word size of a microprocessor refers to the amount of information that can be
stored in the byte
568) Daisy-wheel printer cannot print graphics
569) In the IBM PC-AT, the word AT stands for advanced terminology
570) Dedicated computer means which is assigned one and only one task
571) Real time programming type of computers programming is used for aero plane ticket
reservation system
572) RAM means memory which can be both read and written to
573) Laser printer uses light beam and electro statically sensitive black powder
574) The Santa Clara Valley, California is popularly known a Silicon Valley of America
because many silicon chip manufacturing firms are located there
575) A program written in machine language is called assembler
576) International business machine was the first company in the world to build computer
for sale
577) PARAM is a parallel computer
578) For communications, wide area networks use special purpose telephone wires and
fiber optic cables and microwaves
579) Data transfer rate in modems is measured in bits per second
580) A compiler cannot detect logical errors in source programs
581) Throughput, turnaround time, response time are measures of system performance
582) OLTP architecture can handle a limited number of dimensions whereas OLAP
architecture does not have any limit on the number of dimensions
583) The binary equivalent of (40.125) suffix 10 is 101000.001
584) Kernel is the only art of an operating system that a user cannot replace or modify
585)
Symbol signifies a magnetic disk
586) COBOL programming language was initially developed for consumer electronics goods
587) Running, blocked, ready, terminated are different states of a process
613) Variables that are created during program execution are called dynamic variables
614) When destroying a list, we need a delete pointer to deallocate the memory
615) The first character in the ASCII character set is the null character, which is
nonprintable
616) A variable for which memory is allocated at block entry and deallocated at block exit is
called a static variable
617) Signal to noise ratio compares signal strength to noise level
618) The ability to create new objects from existing objects is known as inheritance
619) Software tools that provide automated support for the systems development process
are OLAP tools
620) Applications/Web server tier processes HTTP protocol, scripting tasks, performs
calculations, and provides access to data
621) A language used to describe the syntax rules is known as meta language
622) In a preorder traversal, the binary tree is traversed as follows
623) The general syntax of the function prototype of a value returning function is function
name (parameter list)
624) Competitive intelligence is the process of gathering enough of the right information in a
timely manner and usable form and analyzing it so that it can have a positive impact
625) Tracing values through a sequence is called a play out
626) In a binary tree, each comparison is drawn as a circle, called a node
627) The term used as a measurement of a communication channels data capacity is
bandwidth
628) In addition to the nature of the problem, the other key factor in determining the best
solution method is function
629) An E-R data model solves the problem of presenting huge information system data
models is to users and developers
630) In C++, predefined functions are organized into separate libraries
631) The standard protocol (communication rules for exchange of data) of the internet is
TCP/IP
632) For efficiency purposes, wherever possible, you should overload operators as member
functions
633) Modifying algorithms that change the order of the elements, not their values, are also
called modifying algorithms
634) As long as the tables in a relational database share at least one common data
attribute, the tables in a relational database can be normalized to provide useful information
and reports
635) DBMS is a simple, fourth generation language used for data retrieval
636) An occurrence of an undesirable situation that can be detected during program
execution is known a exception
637) A photo of the company headquarters would be an example of the use of a static web
page
638) The Pentium processor contains thousands of transistors
639) SOI technology has been successful with reference to SRAM
640) Secondary storage device is needed to print output results
641) Static random access memory does not fall under the category of secondary storage
devices
642) Floppy disk is universal, portable and inexpensive but has its own limitation in terms of
storage capacity and speed
643) Some physical property of the microscopic area of the disk surface is changed for
recording in common for all types of disks
644) In a disk, each block of data is written into two or more sectors
645) A floppy disk rotates at 100rpm
646) A hard disk has 500 to 1000 tracks or more
647) The storage capacity of a cartridge tape is 400 MB
648) Single density recording is also known as frequency modulation
649) Printer is not an input device
650) The input device that is most closely related to a touch screen is the light pen
651) Laser printer generates characters from a grid of pins
652) The liquid crystal display works on the basis of the relation between polaristion and
electric field
653) A COBOL program in source code is not considered to be system software
654) Firmware stored in a hard disk
655) A compiler breaks the source code into a uniform stream of tokens by lexical analysis
656) Sorting of a file tasks is not performed by a file utility program
657) Floppy disk does not generate a hardware interrupt
737) Most of the commonly used personal computers/laptops do not have a command key
known as turnover
738) Full form of USB is known as Universal serial bus
739) The quickest and easiest way in Word to locate a particular word or phrase in a
document is to use the find command
740) Computer sends and receives data in the form of digital signals
741) Icons are graphical objects used to represent commonly used application
742) Most World Wide Web pages contain HTML commands in the language
743) In any window, the maximize button, the minimize button and the close buttons appear
on the title bar
744) Checking that a pin code number is valid before it is entered into the system in an
example of data validation
745) Windows 95 and windows 98 and Windows NT are known as operating systems
746) Information on a computer is stored as analog data
747) A program that works like a calculator for keeping track of money and making budgets
is spreadsheet
748) To take information from one source and bring it to your computer is referred to as
download
749) Windows is not a common feature of software applications
750) A toolbar contains buttons and menus that provide quick access to commonly used
commands
751) Input device is an equipment used to capture information and commands
752) Most of the commonly available personal computers/laptops have a keyboard
popularly known as QWERTY
753) Editing a document consists of reading through the document youve created then
correcting your errors
754) Virtual Box is not a famous operating system
755) Junk e-mail is also called spam
756) DOC is the default file extension for all word documents
757) .bas, .doc and .htm are examples of extensions
758) Codes consisting of bars or lines of varying widths or lengths that are computer
readable are known as a bar code
759) Convenience, speed of delivery, generally and reliability are all considered as the
advantages of e-mail
812) B2B type of commerce is characterized by low volume and high value transactions in
banking
813) Advanced is not a standard MS Office edition
814) Workstation is single user computer with many features and good processing power
815) History list is the name of list that stores the URLs of web pages and links visited in
past few days
816) FDDI access mechanism is similar to that of IEEE 802.5
817) MS Office 2000 included a full-fledged web designing software are called FrontPage
2000
818) Macintosh is IBMs microcomputer
819) X.21 is physical level standard for X.25
820) Enter key should be pressed to start a new paragraph in MS Word
821) Main frame is most reliable, robust and has a very high processing power.
822) Formatting of these toolbars allows changing of Fonts and their sizes
823) The ZZ command is used to quit editor after saving
824) The program supplied by VSNL when you ask for internet connection for the e-mail
access is pine
825) The convenient place to store contact information for quick, retrieval is address book
826) Digital cash is not a component of an e-wanet
827) For electronic banking, we should ensure the existence and procedures with regard to
identification of customers who become members electronically
828) Jon Von Neumann developed stored-program concept
829) Hardware and software are mandatory parts of complete PC system
830) Firewall is used in PC for security
831) Two rollers are actually responsible for movement of the cursor in mouse
832) In case of a virus getting into computer NORTON will help
833) Tour the server room is to be done by the auditor while internet banking services audit
834) Documentation while developing a software for a Bank is required for auditing
835) Water supply has not become computerized
836) Concurrency control in distributed database supports multi-user access
837) Fifth generation computers are knowledge processors
862) When an organization gives contract for development of a software, it has to give data
to the service provider. In such cases, the ownership of data should be with the
client/organization that outsource services
863) Under a centralized organization Intranet be an effective networking tools
864) For optical fiber used in point to point transmission, the repeater spacing is 10-100 km
865) Favorites are accessible from the start menu
866) Task pre-emption, task priority and semaphores are not needed by server program
from an operation system
867) The objective of multiprogramming operating system is to maximize CPU utilization
868) The environment provided to ASP is based on Client/server
869) HUB is layer1 device, central device, dumb device
870) The UNIX, echi command is used to display the message or value of any variable on
the screen
871) QAM is used in high speed modem
872) Frame Relay technique uses connection oriented
873) Bipolar always has a non-zero average amplitude
874) In a SONET system, an add/drop multipliers can remove signals from a path
875) The server on the internet is also known as Host
876) For multiple branching in C we use switch statement
877) Web site is a collection of HTML documents, graphic files, audio and video files
878) The first network that initiated the internet was ARPANET
879) In MODEMS a digital signal changes some characteristic of a carrier wave
880) The binary values are represented by two different frequencies in frequency shift
keying
881) Messenger mailbox is present in Netscape communicator
882) Switching is a method in which multiple communication devices are connected to one
another efficiently
883) A bridge recognizes addresses of layer 3
884) EPROM is permanent storage device
885) .TIF extension name stands for tagged image format
886) The overhead using BRI is 10 percent of the total data rate
887) In programming languages the key word Void means it does not return any value
when finished
888) The keyboard shortcut to restart your computer is Ctrl + Alt + Del
889) FORTRAN is not a programming language
890) The instruction LOAD A is a one address instruction
891) MS-Excel is also known as spread sheet
892) Manchester encoding is used in Ethernet technology
893) The instruction of a program which is currently being executed are stored in main
memory
894) In DOS environment, the command used to save the file is ^Z
895) All high level language uses compiler and interpreter
896) In html coding <p> </p> tag is used to display a paragraph
897) In HTML coding, the following attributes color, size, face used in font tag
898) DHTML stands for dynamic hyper text markup language
899) Fiber optics cable supports data rate up to 100 mbps to 2 gbps
900) In Photoshop software we can modify, delete, and edit the image
901) Most common channel used by networks today is telephone lines
902) Sybase SQL server and Microsoft SQL server 7.0 is not an example of RDBMS
903) In programming language, Null point is used to tell end of linked list
904) A technique which collects all deleted space onto free storage list is called garbage
collection
905) Node to node delivery of the data unit is the responsibility of the data link layer
906) Insulating material is the major factor that makes co axial cable less susceptible to
noise than twisted pair cable
907) A data communication system covering an area the size of a town or city is MAN
908) Virtual memory system allows the employment of the full address space
909) The basic circuit of ECL supports the OR-NOR logic
910) Micro instructions are kept in control store
911) In HTML coding no shade attribute of HR tag suppresses the shading effect and fields
a solid line
912) Internet domains are classified by their functions. In that regard .com represents
commercial
938) In HTML coding, <UL> (Unordered list) is used to give bullets in your document
939) Transmission media are usually categorized as guided or unguided
940) A virtual circuit is the physical connection between an end point and a switch or
between two switches
941) Passing of the frame to next station can happen at a token ring station
942) R-C coupling method is suitable for voltage amplification
943) Normal is not a type of HTML pages
944) In HTML coding <LI> tag is used for denoting items in a list of type <UL>
945) In MS-Word the keyboard shortcut F7 used for spelling and grammar check
946) DBMS is not an operating system
947) HTML is basically used to design web-site
948) In HTML coding, Dynamic web-pages are created in advance of the users request
949) In Dos, primary name of a file can have a maximum of 10 characters
950) du command is used to show file system disk usage in UNIX
951) Maximum length of a text file is 255 characters
952) Frame format of CSMA/CD and Ethernet protocol differ in the block error control
953) On an Ethernet LAN implementation with 10 base 5 the maximum number of
segments can be five
954) Overflow condition in linked list may occur when attempting to create a node when
linked list is empty
955) Code segment register is where the microprocessor looks for instruction
956) Web-site is collection of web-pages and Home-page is the very first page that we see
on opening of a web-site
957) The subsystem of the kernel and hardware that cooperates to translate virtual to
physical addresses comprises memory management subsystem
958) A device operating at the physical layer is called a repeater
959) FORTRAN is a mathematically oriented languages used for scientific problems
960) If we want to convert the text which is in small letters to capital letters then select the
required text and press Shift +F3
961) Datagram packet switching uses the entire capacity of a dedicated link
962) In the datagram approach to packet switching, each packet of a message follows the
same path from sender to receiver
1039) Network that uses two OSI protocol layers as against three used in X.25 is a frame
relay
1040) Microsoft excel is versatile application and spread sheet program
1041) System flowcharts show relationship that link the input processing and output of the
system
1042) To identifying the system to be tested the penetration testing is done
1043) Platform in computer world means computer hardware and operating systems
1044) A character that retains its value during program execution is constants
1045) Data accuracy is not done by modem
1046) OMR is used to read choice filled up by a student in common entrance tests
1047) The term remote with respect to network means machine located far off
1048) In two-tier client server architecture the client is usually fat client
1049) The senior management provides the go-ahead approval for the development of
projects
1050) Manual data can be put into computer by Scanner
1051) E-mail address is made up of two parts
1052) The normal way to undo a command by pressing the following key combinations
together CTRL-Z
1053) The owner of a process is user that invokes the process
1054) In datagram packet switching all the datagrams of a message follow the same
channel of a path
1055) X.25 LAPP uses a specific subset of HDLC protocol
1056) Presentation layer of the OSI reference model is concerned with the syntax of data
exchanged between application entities
1057) Edge-triggered D flip flop memory elements uses an PC circuit at its input
1058) Programs that extend the capabilities of a server are C41 scripts
1059) The primary goal of ISDN is the integration of voice services and non-voice services
1060) Flow control in OSI model is done by transport layer
1061) The optical links between any two SONET devices is called a section
1062) A user can get files from another compute on the internet by using FTP
1063) The key fields which are tested by a packet filtering firewall are source IP address ,
TCP/UDP source port, destination IP address
1090) Possible problems with java scrip can be security or limited graphics and multimedia
capabilities
1091) For locating any document on the WWW. There is a unique address known as URL
1092) Design view would use to define a table and specify fields
1093) Traversal process is faster for threaded trees compared with their unthreaded
counterparts
1094) The command used to display help on any particular command is man
1095) In C++ programming, the extension of program is .cpp
1096) A generic team that refers to the combination of all commercial transactions executed
over electronic media for the exchange of product and services
1097) In DOS, the command used to create a new file is called copy con
1098) Backup helps you to create a copy of the information on your hard disk and saves
original data in case data on your computer got damaged or corrupted due to
malfunctioning of hard-disk
1099) LAN is usually privately owned and links the devices in a single office, building or
campus
1100) In justified type of alignment, text gets aligned along both left and right margins
1101) The internal programming language for a particular chip is called machine language
1102) The inner core of an optical fiber is glass and plastic in composition
1103) When a small amount of trivalent impurity is added to a pure-semiconductor it is
called P-type semiconductor
1104) In MS-Access, a table can have one primary key/keys
1105) In DOS, Deltree command is used to delete all the files as well as sub-directories of a
directory
1106) Netscape navigator is a web-browser
1107) Multiplexing involves one path and one channel
1108) Table, form, queries, reports, macros, modules are objects in an access database
1109) The clown command in UNIX changes home directory of a user
1110) BCD stands for binary coded decimal
1111) When we run a program in HTML coding, notepad is used as backend and internetexplorer works as front end
1112) If the M bit in X.25 standard is set to 1, it means that thee is more than one packet
1113) The modem is a device that connects n input stream outputs
1217) Data lines which provide path for moving data between system modules are known
as data bus
1218) Bubble sort technique does not use divide and conquer methodology
1219) The OSI model shows how the network functions of computer to be organized
1220) A 8 bit microprocessor must have 8 data lines
1221) A protocol that permits the transfer of files between computer on the network is FIP
1222) A data structure, in which an element is added and removed only from one end is
known as stack
1223) In linked list, the successive elements must occupy contiguous space in memory
1224) In OSI model reference, layer 2 lies in between the physical layer and the network
layer
1225) In synchronous TDM, for n signal sources, each frame contains at least n slots
1226) Mouse and joystick are graphic input devices
1227) In linked list, a node contains at least node number, data field
1228) Gopher is not a web browser
1229) Device drivers controls the interaction between the hardware devices and operating
systems
1230) The shortest path in routing can refer to the least expensive path
1231) An ordinary pen which is used to indicate locations on the computer screen by
sensing the ray of light being emitted by the screen, is called light pen
1232) Netiquettes are some rules and regulations that have to be followed by users
1233) Gateway uses the greatest number of layers in the OSI model
1234) A set of standards by which servers communicate with external programs is called
common gateway interface
1235) UNIVAC is a computer belonging to third generation
1236) API allows a client/server relationship to be developed between an existing host
application and a PC client
1237) Semi-insulator is a substance which has resistivity in between conductors and
insulators
1238) Multi vibrator is a two stage amplifier with output of one feedback to the input of the
other
1239) Macro is used to automate a particular task or a series of tasks
1240) Internet is network of networks
1241) A set of devices or combination of hardware and software that protects the systems
on one side from system on the other side is firewall
1242) Simple, transparent, multi post are bridge types
1243) When bandwidth of medium exceeds the required bandwidth of signals to be
transmitted we use frequency division multiplexing
1244) Direct or random access of element is not possible in linked list
1245) In Dos, the Label command is used to display the label of disk
1246) At the lower end of electromagnetic spectrum we have radio wave
1247) In Word, Ctrl + Del combination of keys is pressed to delete an entire word
1248) Plotters are very useful in applications such as computer aided design
1249) Web browser is a type of network application software
1250) 65535 characters can be typed in a single cell in Excel
1251) Overtime analysis is useful for formulating personnel policies and derived form the
payroll system
1252) Multiple worksheets can be created and used at a time
1253) UNIX is both time sharing and multiprogramming system
1254) Floppy Disk is universal portable and inexpensive but has its own limitation in terms
of storage capacity and speed
1255) Personal computers currently sold in India have main memories at an entry level in
the range of megabytes
1256) UNIX has better security for files relative to MS-DOS
1257) The UNIX operating system has been written in C language
1258) Syntax errors is flagged by compilers
1259) PARAM is an example of super computer
1260) Mother board holds the ROM, CPU, RAM and expansion cards
1261) CD-ROM is as a magnetic memory
1262) The binary number system has a base 2
1263) GUI is used as an interface between software and user
1264) E-mail is transaction of letters, messages and memos over communications network
1265) Device drivers are small , special purpose programs
1266) LAN refers to a small, single site network
1312) Acknowledgement from a computer that a packet of data has been received and
verified is known as ACK
1313) Acoustic coupler is a communications device which allows an ordinary telephone to
be used with a computer device for data transmission
1314) ALGOL is a high-level language
1315) A high level programming language named after Ada Augusta, coworker with Charles
Babbage is Ada
1316) Adder is a logic circuit capable of forming the sum of two or more quantities
1317) To identify particular location in storage area one have a address
1318) A local storage register in the CPU which contains the address of the next instruction
to be executed is referred as address register
1319) A sequence of precise and unambiguous instructions for solving a problem in a finite
number of operations is referred as algorithm
1320) PC/AT is an example of Bi-directional keyboard interface
1321) DIMM is not an I/O bus
1322) PCI bus is often called as mezzanine bus
1323) 8088 is an original IBM PC inter CPU chip
1324) 80386 is a 32-bit processor
1325) A Pentium or Pentium pro board should run at 60 or 66 MHZ
1326) The maximum bandwidth of EISA bus is 33 M/sec
1327) A computer system runs millions of cycles per second so that speed is measured in
MHz
1328) Heat sink is the metal device that draws heat away from an electronic device
1329) Pentium chip has 64 bit & 32 bit registers
1330) A mother board should contain at least 4 memory sockets
1331) The 1.2 MB drive spin at 360 rpm
1332) Intensity of sound is called amplitude
1333) A single zero bit is called starting bit
1334) PnP stands for plug and play
1335) A computers systems clock speed is measured as frequency
1336) Maximum RAM of XT type is 1 M
1337) The data in 8 bit bus is sent along 8 wires simultaneously in parallel
1338) The bus is simple series of connection that carry common signals
1339) Mainly memories are divided into two types they are logical memories and physical
memories
1340) System based on the new Pentium II processor have the extended memory limit of
4G
1341) Full form of EMS memory is excluded memory specification
1342) The 286 & 386 CPU have 24 address lines
1343) Bus has both the common meaning and computer meaning
1344) Data on a floppy disk is recorded in rings called tracks
1345) A group of characters that have a predefined meaning database
1346) In a spreadsheet a cell is defined as the intersection of a row and column
1347) Document file is created by word processing programs
1348) Real time is not a type of error
1349) The mouse device drivers, if loaded in the config.sys file, its typically called
mouse.sys
1350) Peer to peer means computer to computer
1351) RLL refers to run length limits
1352) The most important aspect of job scheduling is the ability to multiprogramming
1353) Modem is a modulator-demodulator system
1354) A data communication system requires terminal device, communication channel,
protocols
1355) The start button appears at the lower left of the screen
1356) Windows is GUI
1357) TIF stands for tagged image format
1358) The first network that initiated the internet is ARPANET
1359) In modems a digital signal changes some characteristic of a carrier wave
1360) Favorites are accessible from the start menu
1361) The virus is a software program
1362) BANKS is not memory chip
1363) We use RAM code to operate EGA
1364) A scanner is attached to LPT or SCSI host adapter port
1418) The first implementation of UNIX was developed at Bell Telephone Laboratories in the
early 1970
1419) A connection less protocol is more dynamic
1420) The throughput is a measure of work for processor
1421) COBOL stands for common business oriented language
1422) Reset button is used to do cool booting
1423) In MS-EXCEL the no of rows, no of columns are 16384,256
1424) FOXPRO is a package and programming language
1425) Mostly used date format in computer is MM-DD-YY
1426) Reservation of train ticket uses real time mode of processing
1427) A floppy disk is a thin plastic disc coated with magnetic oxide
1428) In binary addition 1+1 = 1
1429) Universal building blocks of a computer system are NAND & NOR
1430) In COBOL programming characters length per line is 64
1431) In FOXPRO, the maximum fields in a record are 128
1432) QUIT command is used to come out of FOXPRO
1433) Count command is used to count the specified records in a file with or without
condition
1434) F1 key is pressed for help in FOXPRO
1435) One Giga byte = 1024 mega bytes
1436) Small scale integration chip contains less than 12 gates
1437) The most common monitor sizes are 14, 15, 17
1438) IBM PC and DOS has BIOS support for 3 LPT ports
1439) EDO stands for external data organizer
1440) The number of wires in IDE Hard Disk cable are 16
1441) If the data transfer rate is 150 k/sec then it is called single speed
1442) A typical buffer for a CD-ROM drives 156 K
1443) The 2.88 M floppy drives have 36 no of sectors
1444) 1 MB is equal to 2 (to the power of 10 KB)
1445) ROM is a primary storage device
1491) Digital computer: A device that manipulates discrete data and performs arithmetic and
logic operations on these data
1492) Data transmission: The movement of data from one location of storage to another. If
the locations are geographically far away, generally done via satellites.
1493) Disk Mirroring: The data is written on two or more hard disks simultaneously over the
same channel
1494) Disk Duple Xing: The data is written on two or more hard disks simultaneously over
the different channel
1495) Dumb Terminals: Hardware configuration consisting of a keyboard and monitor that is
capable of sending and receiving information but has no memory or processing capabilities.
1496) Download: Process of transferring a file system from one system to another
1497) E-commerce: Business transactions conducted over extranets or the internet
1498) Enterprise, resource planning: An integrated system of operation application
combining logistics, production, contract and order management, sales forecasting and
financial and HR management
1499) Electronic data interchange (EDI) : Electronic transmission or documents through
point to point connections using a set of standard forms, message and data elements, this
can be via leased lines private networks or the internet
1500) Data processing: It is a method concerning with the systematic recording, arranging,
filing, processing and dissemination of facts of business