Está en la página 1de 27

1500 COMPUTER 17) An error is known as bug 36) Computers use the binary number

system to store data and perform

AWARERNESS QUESTION 18) A collection of related information calculations.
sorted and dealt with as a unit is a file
By. Deepak Kumar 37) The windows key will launch the
Admin. Bankers Ka Adda 19) Sending an e-mail is similar to start buttons.
I WORK FOR HUMANITY writing a letter
38) To move to the beginning of a line
20) IT stands for information of text, press the home key.
1) Father of Computer Charles technology
Babbage. 39) When sending an e-mail, the
21) A menu contains commands that subject lines describe the contents of
2) The first computers were can be selected the message.
programmed using Machine language
22) Plotter, printer, monitor are the 40) Tables, paragraphs and indexes
3) A filename is a unique name that group consists of output devices work with when formatting text in
you give to a file of information word.
23) Edit menu is selected to cut, copy
4) This can be another word for and paste 41) TB is the largest unit of storage.
program software
24) The most important or powerful 42) The operating system tells the
5) Any data or instruction entered into computer in a typical network is computer how to use its components.
the memory of a computer is network server
considered as storage 43) When cutting and pasting, the
25) The primary purpose of software item cut is temporarily stored in
6) Which part of the computer is to turn data into information clipboard.
displays the work done monitor
26) The ability to find an individual 44) The blinking symbol on the
7) A series of instructions that tells a item in a file immediately direct access computer screen is called the cursor.
computer what to do and how to do it is used.
is called a program 45) Magnetic tape is not practical for
27) To make a notebook act as a applications where data must be
8) Hardware is the part of a computer desktop model, the notebook can be quickly recalled because tape is a
that one can touch and feel . connected to a docking station which sequential because tape is a sequential
is connected to a monitor and other access medium.
9) The role of a computer sales devices
representative generally is to 46) Rows and columns are used to
determine a buyer‘s needs and match 28) You can use the tab key to move a organize data in a spread sheet.
it to the correct hardware and cursor across the screen, indent a
software. paragraph. 47) When you are working on
documentation on PC, the document
10) Supercomputers refers to the 29) A collection of related files is temporarily stored in flash memory.
fastest, biggest and most expensive called record.
computers 48) One megabyte equals
30) Storage that retains its data after approximately 1 million bytes.
11) Executing is the process of the power is turned off is referred to
carrying out commands as non-volatile storage. 49) Information travels between
components on the motherboard
12) The rectangular area of the screen 31) Internet is an example of through buses.
that displays a program, data, and or connectivity.
information is a window 50) RAM refers to the memory in your
32) Testing is the process of finding computer.
13) The process of a computer errors in software code.
receiving information from a server 51) Computer connected to a LAN can
on the internet is known as 33) A syntax contains specific rules share information and or share
downloading and words that express the logical peripheral equipment
steps of an algorithm.
14) Disk drive is the part of the 52) Microsoft office is an application
computer helps to store information 34) Changing an existing document is suite
called the editing documentation
15) Arithmetic operations include 53) Utilities can handle most system
addition, subtraction, multiplication, 35) Virtual memory is memory on the functions that aren‘t handled directly
and division hard disk that the CPU uses as an by the operating system
extended RAM.
16) A keyboard is the king of input
54) If you receive an e-mail from 90) Office LANs that are spread
someone you don‘t know then you 73) In Excel, charts are created using geographically apart on a large scale
should delete it without opening it chart wizard option can be connected using a corporate
55) A set of instructions telling the 74) Microcomputer hardware consists
computer what to do is called of three basic categories of physical 91) Storage is the process of copying
program equipment system unit, input/output, software programs from secondary
memory storage media to the hard disk
56) LAN refers to a small single site
network 75) Windows is not a common feature 92) The code for a web page is written
of software applications using Hyper Text Markup Language
57) A collection of programs that
controls how your computer system 76) A tool bar contains buttons and 93) Small application programs that
runs and processes information is menus that provide quick access to run on a Web page and may ensure a
called operating system. commonly used commands form is completed properly or provide
animation are known as flash
58) Device drivers are small, special- 77) For creating a document, you use
purpose programs new command at file menu 94) In a relational database, table is a
data structure that organizes the
59) Transformation of input into 78) Input device is equipment used to information about a single topic into
output is performed by the CPU capture information and commands rows and columns

60) Data going into the computer is 79) A programming language 95) The first computers were
called input. contains specific rules and words that programmed using assembly language
express the logical steps of an
61) Binary choice offer only two algorithm 96) When the pointer is positioned on
options a hyperlink it is shaped like a hand
80) One advantage of dial-up internet
62) To indent the first paragraph of access is it utilizes existing telephone 97) Booting process checks to ensure
your report, you should use tab key security the components of the computer are
operating and connected properly
63) Fields are distinct item that don‘t 81) Protecting data by copying it from
have much meaning to you in a given the original source is backup 98) Checking the existing files saved
context on the disk the user determine what
82) Network components are programs are available on a computer
64) A website address is a unique connected to the same cable in the star
name that identifies a specific web site topology 99) Special effect used to introduce
on the web slides in a presentation are called
83) Two or more computers animation
65) Modem is an example of a connected to each other for sharing
telecommunications device information form a network 100) Computers send and receive data
in the form of digital signals
66) A set of computer programs used 84) A compute checks the database of
for a certain function such as word user name and passwords for a match 101) Most World Wide Web pages
processing is the best definition of a before granting access contain HTML commands in the
software package language
85) Computers that are portable and
67) You can start Microsoft word by convenient for users who travel are 102) Icons are graphical objects used
using start button known as laptops to represent commonly used
68) A blinking symbol on the screen 86) Spam is the term for unsolicited e-
that shows where the next character mail 103) UNIX is not owned and licensed
will appear is a cursor by a company
87) Utility software type of program
69) Highlight and delete is used to controls the various computer parts 104) In any window, the maximize
remove a paragraph from a report you and allows the user to interact with button, the minimize button and the
had written the computer close buttons appear on the title bar

70) Data and time are available on the 88) Each cell in a Microsoft office 105) Dial-up Service is the slowest
desktop at taskbar excel document is referred to by its internet connection service
cell address, which is the cell‘s row
71) A directory within a directory is and column labels 106) Every component of your
called sub directory computer is either hardware or
89) Eight digit binary number is called software
72) Testing is the process of finding a byte
errors in software code
107) Checking that a pin code 124) Download is the process of
number is valid before it is entered copying software programs from 143) Assembler is language
into the system is an example of data secondary storage media to the hard translation software
validation disk
144) Manual data can be put into
108) A compiler translates higher 125) The code for a web page is computer by scanner
level programs into a machine written using Hypertext Markup
language program, which is called Language 145) In a bank, after computerization
object code cheques are taken care of by MICR
126) Small application programs that
109) The ability to find an individual run on a web page and may ensure a 146) The banks use MICR device to
item in a file immediately direct access form is completed properly or provide minimize conversion process
animation are known as Flash
110) Computers connected to a LAN 147) Image can be sent over telephone
can share information and/or share 127) A file is a unique name that you lines by using scanner
peripheral equipment give to a file of information
148) Microchip elements are unique
111) A CD-RW disk can be erased and 128) For seeing the output, you use to a smart card
rewritten monitor
149) MS-DOS is a single user
112) The two major categories of 129) CDs are of round in shape operating system
software include system and
application 130) Control key is used in 150) Basic can be used for scientific
combination with another key to and commercial purpose
113) Windows 95, Windows 98 and perform a specific task
Windows NT are known as operating 151) All computers can execute
systems 131) Scanner will translate images of machine language programs
text, drawings and photos into digital
114) Information on a computer is form 152) Programs stored in ROM can‘t be
stored as analog data erased
132) CPU is the brain of the computer
115) A spread sheet that works like a 153) Ethernet is used for high speed
calculator for keeping track of money 133) Something which has easily telecommunications
and making budgets understood instructions is said to be
user friendly 154) IP address can change even if the
116) To take information from one domain name remains same
source and bring it to your computer 134) Information on a computer is
is referred to as download stored as digital data 155) Each directory entry can be of 32
117) Each box in a spread sheet is 135) For creating a document, you use
called a cell new command at file menu 156) With the help of Control + Del a
letter can be erased in a word
118) Network components are 136) The programs and data kept in
connected to the same cable in the bus main memory while the processor is 157) Disk can keep maximum data
topology using them
158) FORTRAN is a scientific
119) Two or more computers 137) Ctrl + A command is used to computer language
connected to each other for sharing select the whole document
information form a network 159) Computer language COBOL is
138) Sending an e-mail is same as useful for commercial work
120) A computer checks the database writing a letter
of user names and passwords for a 160) COBOL is a high standard
match before granting access. 139) A Website address is a unique language like English
name that identifies a specific website
121) Spam is the other name for on the web 161) In computer the length of a word
unsolicited e-mail can be measured by byte
140) Answer sheets in bank
122) Operating system controls the PO‘s/Clerk‘s examinations are 162) Byte is the unit of storage
various computer parts and allows the checked by using Optical Mark Reader medium
user to interact with the computer
141) Electronic data exchange 163) ROM is not a computer language
123) Each cell in a Microsoft Office provides strategic and operational
Excel document is referred to by its business opportunity 164) Oracle is a database software
cell address, which is the cell‘s row
and column labels 142) Digital signals used in ISDN have 165) Sequential circuit is full aid
whole number values
166) Processor is must for computer 211) Control words are words that a
190) A five-digit card attribute used programming language has set aside
167) ROM keeps permanent memory for postal ZIP codes it will be restored for its own use
as a numeric data
168) Screen display is called by 212) Monitor and printer are the two
windows in lotus 191) Computer viruses can be types of output devices
attached to an executable program
169) Pascal is a computer language 213) To access properties of an object,
192) MS-DOS was the first operating the mouse technique to use is right-
170) Expanded form of IBM is system clicking
International business machine
193) The smallest space where 214) An operating system is a
171) IC chips are made of silicon information on a hard disk is kept in a program that makes the computer
cluster easier to use
172) India‘s Silicon Valley situated at
Bangalore 194) An information is processed data 215) Connections to the internet using
a phone line and a modem are called
173) RAM and ROM are the storage 195) Intelligence is not a dial-up connections
devices of computer characteristic of a computer
216) To access a mainframe or
174) DOS is to create relation between 196) Private key is used to spend a supercomputer, users often use a
hardware and software digital signature terminal

175) LOTUS 1-2-3 is software 197) Negative numbers can be 217) A flaw in a program that causes
represented in binary it to produce incorrect or
176) Voice mail is a personal security inappropriate results is called a bug
code for GSM subscribers 198) VDU is not an essential part of a
computer 218) A web site address is a unique
177) Tables holds actual data in the name that identifies a specific web site
database 199) The printers are line printer, on the web
laser, dot matrix
178) Trojan is a virus 219) Every component of your
200) Speed of clock of CPU is computer is either hardware or
179) Static keys make WEB insecure measured in megahertz software

180) Video signal needs highest 201) Cache is not a secondary storage 220) To make the number pad act as
bandwidth device directional arrows, you press the num
lock key
181) Connectivity means 202) Disk can be used to store
communication between systems sequential files and random files 221) When creating a word-processed
document, formatting text involves the
182) Controlling is not required for 203) Windows is not an application user changing how words on the page
high level language programs before it appear, both on the screen and in
is executed 204) When taking the output printed form
information is produced in hardcopy
183) 3 out of three rollers are and/or softcopy form 222) The ALU performs simple
responsible for the movement of mathematics for the CPU
cursor on screen 205) Control unit‘s function is to
decode program instructions 223) A computer program is a set of
184) Hardware that adds two keywords, symbols, and a system of
numbers is arithmetic logical unit 206) The most powerful type of rules for constructing statements by
computer amongst the following is which humans can communicate the
185) Data accuracy is not done by supercomputer instructions to be executed by a
modem computer
207) GO TO statement is used in C,
186) LAN is used for networks setup C++, basic language 224) The another word for program is
within a building software
208) File menu is selected to print
187) A data communication system 225) The name of the computer‘s
requires terminal device, 209) The name a user assigns to a brain is CPU
communication channel, protocols document is called a filename
226) A computer is a device that
188) Most common channel used by 210) A processor is an electronic electronically processes data,
networks today is satellite device that processes data, converting converting it to information
it into information
189) Run Time is not a type of error
227) Laptops are computers that can 246) LAN refers to a small, single-site 275) Boot sector viruses are often
be carried around easily network transmitted by a floppy disk left in the
floppy drive
228) The secret code that restricts 247) A set of instructions telling the
entry to some programs is password computer what to do is called 276) Operating system controls the
program way in which the computer system
229) The basic goal of computer functions and provides a medium by
process is to convert data into 248) Data going into the computer is which users can interact with the
information called input computer

230) The disk is placed in the CPU in a 249) If you receive an e-mail from 277) Servers are computers that
computer someone you don‘t know, then delete provide resources to other computers
it without opening it connected to a network
231) A hard copy of a document is
printed on the printer 250) Two options does a binary choice 278) Field names describe what a data
offer field is
232) The name that the user gives to a
document is referred to as file name 251) A collection of programs that 279) You must install router on a
controls how you computer system network if you want to share a
233) Restarting a computer that is runs and processes information is broadband internet connection
already on is referred to as warm called operating system
booting 280) A goal of normalization is to
252) Rows and columns are data minimize the number of redundancy
234) E-mail is the transmission of organized in a spreadsheet
messages and files via a computer 281) Programs from the same
network 253) When cutting and pasting, the developer, sold, bundled, together,
item cut is temporarily stored in that are provide better integration and
235) The person who writes and tests clipboard share common features, tool box and
computer programs is called a menus are known as software suits
programmer 254) When you are working on a
document on a PC, the document is 282) A data ware house is one that
236) The information you put into the temporarily stored in flash memory organizes important subject areas
computer is called data
255) One megabyte equals 283) URL term identifies a specific
237) The output devices make it approximately 1 million bytes computer on the web and the main
possible to view or print data page of the entire site
266) A cluster represents a group of
238) A chat is a typed conversation sectors 284) A proxy server is used to process
that takes place on a computer client request for web pages
267) Digital signals used in ISDN have
239) Hardware includes the computer discrete values 285) When data changes in multiple
and all the devices connected to it that list and list are not updated, this
are used to input and output data 268) Assembler is language causes data inconsistency
translation software
240) The most common method of 286) Granting an outside organization
entering text and numerical data into 269) Manual data can be put into access to internet web pages is often
a computer system is through the use computer by scanner implemented using a extranet
of a keyboard
270) Bandwidth means channel 287) The code that relational database
241) Mouse, keyboard, plotter are the capacity amount of data following via management systems use to perform
group consist of only input devices cables and measure of speed their database task is refer to as SQL

242) 256 values can be represented 271) Chip can keep maximum data 288) URL stands for Uniform resource
by a single byte locator
272) Debugging is the process of
243) Transformation of input into finding errors in software code 289) A data base management system
output is performed by the CPU is a software system used to create,
273) Time Bomb are viruses that are maintain and provide controlled
244) Vertical-market applications can triggered by the passage of time or on access to a database
handle most system functions that a certain data
aren‘t handled directly by the 290) The two broad categories of
operating system 274) Linux is an open source software are system and application
operating system
245) Device drivers are small, special- 291) The metal or plastic case that
purpose programs holds all the physical parts of the
computer is known as system unit
335) The capacity of modern main
292) Data integrity means that the 315) OCR means optical character frame digital computer is 10(to the
data contained in the database is recognition power of -12) mbps
accurate and reliable
316) The total printout of a program 336) With the help of my computer
293) A local area network is a private is called listing we can know about the usage and
corporate network used exclusively by availability of space in computer
company categories 317) With the help of ZIP we can
decrease the size of any programs 337) We use both MS-Word and page
294) Eight bits equal to one byte maker for making resume
318) We can format the hard disk
295) A byte can hold one character with the help of Booting 338) Earliest computers that would
data work with FORTRAN was second
319) CANNED is called as readymade generation
296) A characteristic of a file server is software
manages files operations and is shared 339) Back Ups in database are
on a network 320) The process of creating third file maintained for to restore the lost data
by mixing two files is called as mail
298) The development process of merging 340) IDEA is a encryption technique
computer started in 1617
321) The figures and lines etc. made 341) DBRM takes care of storage of
299) The role of Blaze Pascal in the by computer is called as graphics data in a database
development of computer is addition
and subtraction of numbers 322) Each line represents 65 letters in 342) The job of DBMS is to decrease
a WordStar redundancy
300) The inventor of computer is
Charles Babbage 323) Nokia- 7500 is not the example 343) Digital signatures use encryption
of Micro Processor for authenticating
301) The IBM made the first
electronic computer in 1953 324) The first name of the digital 344) OS acts as intermediary agency
computer is Unvake between user and hardware
302) The silicon based transistor
started to made by Gordon Tin in 325) The modern computer was 345) Plotters gives the highest quality
1954 invented in 1946 output

303) IBM is a company 326) The full form of DOS is disk 346) ROM is built in memory in
operating system computer
304) The personal computer invented
in 1981 327) The expanded form of FORTRAN 347) FLASH is a RAM
is formula translation
305) 1 Kilobyte is equal to 1024 bytes 348) PRAM is not a RAM
328) The great revolution came in
306) LCD means liquid crystal display computer sector in 1960 349) FLASH device is used in cell
307) UPS converts DC voltage into AC 329) Magnetic tape is called as Input
voltage device of computer 350) Internal storage is same as the
primary storage
308) The word ZIP means Zicxac 330) The first mechanical computer of
Inline Pin Charles Babbage is known as punch 351) IMAC is name of a machine
card machine
309) With the help of Pal switch we 352) First generation computers could
can increase or decrease the speed of 331) The IC chip used in computer is do batch processing
computer‘s processing generally made in silicon
353) The analytic engine was created
310) The full form of MICR is 332) Telephone broadcast is the by Charles Babbage
magnetic ink character reader example of simplex transmission
354) Voicemail of GSM service
311) Swift networks are used between 333) Optical, Mechanical are the provider has the personal security
banks kinds of mouse code for its subscribers

312) Panda is a virus 334) Control panel is used for 355) Senior manager decided about
increasing and decreasing the speed of the division of work with respect to IT
313) Boot sector is hardware the cursor of mouse security

314) Debug searches the fault of any 356) Encrypting file system of window
software XP professional operating system
protects the data of a user, even if the 376) Caramel is the latest platform of 396) A source program is a program
computer is shared between users Intel Centrio microprocessor which is to be Tran scripted in
machine language
357) The .mpeg is the format of a 377) RISC is known as storage device
movie file 397) Virus in computer relates to
378) NORTON is an anti-virus program
358) Controlling is NOT required for
high level language program before it 379) The system file of an operating 398) Floppy is not a storage medium
is executed system is COM in the computer related hardware

359) A plotter is output device 380) ATMs of bank have real 399) DOS floppy disk does not have a
currency boot record
360) 80286 is a hardware part of
microprocessor 381) A program that converts high 400) The CPU in a computer
level language to machine language is comprises of Store, arithmetic and
361) Top-bottom approach can not be assembler logical unit and control unit
the measure of network traffic
382) ‗.txt‘ files can be made in 401) In computer parlor a mouse is a
362) A switching mode power supply notepad, MS word, DOS editor screen saver
is used for converting raw input
power to stabilize DC power 383) .Zip is a compressed file 402) UNIVA is the name of the
computer which was first used for
363) Spooler can manage the whole 384) Internet is a WAN programming and playing of music
printing process
385) MP3 technology compresses a 403) The IC chips for computer is
364) Validity routines control sound sequence to one-twelfth of its prepared from silicon
procedures can be used to ensure original size
completeness of data 404) Database management systems
386) At a time only one operating are comprised of tables that made up
365) Less expensive than leased line system can be at work on a computer of rows called records and columns
networks is not a characteristic of called fields
virtual private networks (PVN) 387) If multiple programs can be
executed at the same time, it is 405) Nano is equal to 10(to the power
366) Program policy framework distributed operating system of -9)
provides strategic direction to an
organization 388) If the operating system provides 406) In computers RAM is a non-
quick attention, it is real time volatile memory
367) Cross bar switches have common operating system
control 407) Disk and tape drives are
389) Distributed operating system commonly used as hard copy
368) Row-level security is the most uses network facility
basic part for database security 408) When computer is connected to
390) FORMAT command in MS-DOS LAN and data is sent across it for
369) Voice recognition software can is used for recreating disk information storage/processing is online
not be used for converting text into processing
voice 391) COPY command in MS-DOS is
used to copy one or more files in disk 409) The primary storage unit is also
370) The user account can only be drive to another, copy from one referred to as internal storage
created by the network administrator directory to another directory
410) Oracle is not an operating system
371) IBM-700 belongs to second 392) REN command is Internal
generation command 411) Data are raw facts and figures

372) Allocating adequate bandwidth 393) Tom Burners-Li propounded the 412) Holding of all data and
would help her in speeding up the concept of ―World wide web‖ instructions to be processed is one of
data transfer over net the functions of storage unit
394) The memory address sent from
373) BCD means binary coded the CPU to the main memory over a 413) To select the entire row in Excel,
decimal set of wires is called address bus click mouse at row heading

374) Extended system configuration 395) MODEM is an electronic device 414) Database is known as structured
data is same as BIOS required the computer to connect to data
375) Digitizer is an input device 415) Normal view and outline view
notes pane appears in power point
416) The user protection feature of an 435) The purpose of the EXIT bits of information is one exchanging
operating system is required in multi- command is to get out of a condition each time
user system only loop
451) Cache memory is a part of main
417) In word, Ctrl + Del combination 436) Employees details is a master file memory
of keys press to delete an entire word for the pay roll system
452) The number 43 in 2‘s
418) In MS-Word double clicking a 437) A slow memory can be complement representation is
word selects the word connected to 8085 by using READY 01010101

419) Word document can be 438) A processor needs software 453) The 8085 microprocessor
navigated in web layout view interrupt to obtain system services responds to the presence of an
which need execution of privileged interrupt by checking the TRAP pin for
420) In Excel, addressing mode(s) that instructions ‗high‘ status at the end of each
can be used in a formula is/are only instruction fetch
absolute and relative 439) A CPU has two modes-
privileged and non-privileged. In 454) All machinery and apparatus of
421) Note page views can you use to order to change the mode from the computer is called hardware
show just the slide and its contents privileged to the non-privileged, a
software interrupt is needed 455) The number 1024 bytes is the
422) Hardware that adds two complement representation of 1 Kilo
numbers is arithmetic logical unit 440) Swap space resides at disk byte

423) The computer as a machine and 441) The process of assigning load 456) System design specifications do
all other physical equipment addressed to the various parts of the not include blueprint showing the
associated with it are termed as program and adjusting the code and layout of hardware
hardware data in the program to reflect the
assigned address is called relocation 457) Web pages are uniquely
424) Plotters are very useful in identified using URL
applications such as computer aided 442)1 Sector= 4096 bytes
design 458) The results of arithmetic and
443) Two stacks of size required to logical operations are stored in an
425) Corel DRAW is a graphic implement a queue of size n accumulator
444) 1 Floppy = 6, 30,784 bytes or 459) The input device that is closely
426) The print to file option creates 308 KB related to touch screen is the light pen
.prn file
445) Consider a machine with 64 MB 500) F2 keys of control center
427) The enhanced keyboard contains physical memory and a 32-bit virtual specified below displays data, toggles
101 keys address space. If the page size is 4 KB, browse/edit
then size of the page table is 2 MB
428) Data processing cycle consists of 501) A compiler breaks the source
input cycle, output cycle and 446) Consider a virtual memory code into a uniform stream of tokens
processing cycle system with FIFO page replacement by lexical analysis
policy. For an arbitrary page access
429) Page Setup is not an option of pattern, increasing the number of 502) The number of processes that
Edit menu page frames in main memory will may running at the same time in a
always decrease the number of page large system can be thousands
430) Radar chart is used to show a faults
correlation between two data series 503) LET.BAS files are related to
447) Consider a scheme R(A, B, C, D) Microsoft word utility
431) A computerized business and functional dependencies A->B
information system includes and C-> D. Then the decomposition of 504) A command in UNIX can have
hardware, software and data facts R into R1 (AB) and R2 (CD) is one or more arguments
dependency preserving and lossless
432) Purchase order file is a join 505) A hard disk is logically organized
transaction file according to cylinders and sectors
448) Main memory requires a device
433) A typical computerized business driver 506) A frame can include text &
application system will have both graphics, tables & graphics, graphics
master and transaction file 449) RAM can be divided into 2 types
507) All the formatting data for the
434) Problem identification is taken 450) Two friends suitably arrange 4 paragraph is stored in the paragraph
first in designing a program blocks of different colors to exchange mark
coded information between them. 4
508) The abbreviation CAD stands for 539) Root is one of the items given
computer aided design 525) An expert system enables one or below is not an item of the menu bar
more users to move and react to what
509) We can define hypertext their senses perceive in a computer 540) BACKUP is not an internal
definition in notebooks using simulated environment command
Macsyma 2.0
526) Popping or removing an element 541) In a disk, each block of data is
510) The addressing mode(s) that can from an empty stack is called written into one sector
be used in a formula is/are- absolute, underflow
relative and mixed 542) Hard copy is a printed copy of
527) The ability to combine data and machine output
511) WINDOWS can work in operations on that data in a single unit
enhanced and standard modes is known as polymorphism 543) A boot strap is a small utilization
computer program to start up in
512) The part of a machine level 528) A router is a device that sites inactive computer
instruction which tells the central between your internal network and
processor what has to be done is an the internet and limits access into and 544) CAD is oriented towards
operation code out of your network based on your software
organization‘s access policy
513) O-Matrix software packages do 545) Icons are picture commands
not have animation capabilities 529) In C++, private, protected, and
public are reserved words and are 546) IBM company for the first time
514) In order to paste text form the called member access specifiers launched pocket computers
clipboard in the document being
edited, press the Ctrl-A key 530) The integration of all kinds of 547) PROM is a computer part
media such as audio, video, voice,
515) A program that converts a high graphics and text into one coherent 548) Algorithms can handle most
level language program to a set of presentation combined is called system functions that aren‘t handled
instructions that can run on a multimedia directly by the operating system
computer is called a compiler
531) The derived class can redefine 549) Device drivers are small, special-
516) Faster execution of programs is the public member functions of the purpose programs
not an advantage of a subroutine base class
550) LAN refers to a small, single site
517) First generation of computer 532) A technique for searching special network
period is 1945-1950 databases, called data warehouses,
looking for related information and 551) A collection of programs that
518) IBM built first PC in the year patterns is called data mining controls how your computer system
1981 runs and processes information is
533) Like the quick sort the merge called operating system
519) A small computer program sort uses the divide and conquer
embedded within an HTML document technique to sort a list 552) When we are working on a
when a user retrieves the web page document on a PC the document is
from a web server is called an applet 534) The use of expert systems temporarily stored in RAM
technology can greatly reduce the
520) Another name for systems number of calls routed to a customer 553) Information travels between
implementation is transformation service department components on the motherboard
through buses
521) The central host computer or file 535) Building a list in the backward
server in a star network maintains manner, a new node is always inserted 554) Microsoft is a vertical market
control with its connecting devices at the beginning of the list application
through polling
536) Creating a web site is also called 555) RAM refers to the memory in
522) C++ does not check whether the web authoring your computer
index value is within scope
537) Using the optimization analysis 556) Computers connected to a LAN
523) The browser uses uniform approach, the expert system starts can share information and / or share
resource locator to connect to the with a conclusion and tries to verify equipment
location or address of internet that the rules, facts, and conclusion all
resources match. If not, the expert system 557) Magnetic tape is not practical for
chooses another conclusion applications where data must be
524) In the centralized computing quickly recalled because tape is a
architecture, the entire file is 538) Both the application program sequential access medium
downloaded from the host computer and operating system program only
to the user‘s computer in response to a describes the software 558) In Late 1988 computer viruses
request for data land in India for the first time
surfaces and number of sectors per
559) ALU is a part of the CPU 577) PARAM is a parallel computer track

560) In computer technology a 578) For communications, wide area 597) Abstraction is associated with
compiler means a program, which networks use special purpose object oriented technology and
translates source program into object telephone wires and fiber optic cables database technology
program and microwaves
598) The terms opcode and operand
561) American computer company 579) Data transfer rate in modems is are associated with any high level
IBM is called big blue measured in bits per second language

562) The first IBM PC did not have 580) A compiler cannot detect logical 599) Dynamic binding is associated
any ROM errors in source programs with object oriented programming

563) The digital computer was 581) Throughput, turnaround time, 600) The term CHIP, JEWELLARY
developed primarily in UK response time are measures of system means a processor with high capacity
564) Programs which protect a disk 601) A watch point is associated with
from catching an infection are called 582) OLTP architecture can handle a debugger
antidotes limited number of dimensions
whereas OLAP architecture does not 602) A multithreaded program uses
565) The first movie with terrific have any limit on the number of multiple processes
computer animation and graphics was dimensions
released in 1982 is Tron 603) Time sharing is a mechanism to
583) The binary equivalent of provide spontaneous interactive use of
566) An integrated circuit is (40.125) suffix 10 is 101000.001 a computer system by many users in
fabricated on a tiny silicon chip such a way that each user is given the
584) Kernel is the only art of an impression that he/she has his/her
567) The word size of a operating system that a user cannot own computer
microprocessor refers to the amount replace or modify
of information that can be stored in 604) The typical scheme of memory
the byte 585) management used in IBMOS/360
Symbol signifies a magnetic disk mainframe system was that of
568) Daisy-wheel printer cannot print multiprogramming with variable
graphics 586) COBOL programming language number of memory partitions
was initially developed for consumer
569) In the IBM PC-AT, the word AT electronics goods 605) The concepts used for realization
stands for advanced terminology of virtual memory are swapping,
587) Running, blocked, ready, demand paging and In-line secondary
570) Dedicated computer means terminated are different states of a storage
which is assigned one and only one process
task 606) Oracle 8i is an example of
588) Rational rose is an example of a OORDBMS
571) Real time programming type of modeling language
computers programming is used for 607) ALPHA, RIOS, SPARC are
aero plane ticket reservation system 589) A disk worm is an example of examples of RISC Processors
optical devices
572) RAM means memory which can 608) The scope of an identifier refers
be both read and written to 590) A RAID is a disk array to where in the program an identifier
is accessible
573) Laser printer uses light beam and 591) The first private internet service
electro statically sensitive black provider in India was Satyam infoway 609) Hierarchy is not a component of
powder relational database
592) The maximum and minimum
574) The Santa Clara Valley, unsigned number which can be stored 610) A two-way selection in C++ is
California is popularly known a in a 8 bit word is 0 and 255 the if…else
Silicon Valley of America because
many silicon chip manufacturing 593) Stack is a part of memory 611) A recursive function executes
firms are located there more efficiently than its iterative
594) HIT RATIO is associated with counterpart
575) A program written in machine cache performance
language is called assembler 612) The body of the recursive
595) Laser printer is a page printer function contains a statement that
576) International business machine causes the same function to execute
was the first company in the world to 596) Storage capacity of a disk system before completing the last call
build computer for sale depends upon number of recording
613) Variables that are created during 644) In a disk, each block of data is
program execution are called dynamic 629) An E-R data model solves the written into two or more sectors
variables problem of presenting huge
information system data models is to 645) A floppy disk rotates at 100rpm
614) When destroying a list, we need users and developers
a delete pointer to deallocate the 646) A hard disk has 500 to 1000
memory 630) In C++, predefined functions are tracks or more
organized into separate libraries
615) The first character in the ASCII 647) The storage capacity of a
character set is the null character, 631) The standard protocol cartridge tape is 400 MB
which is nonprintable (communication rules for exchange of
data) of the internet is TCP/IP 648) Single density recording is also
616) A variable for which memory is known as frequency modulation
allocated at block entry and 632) For efficiency purposes,
deallocated at block exit is called a wherever possible, you should 649) Printer is not an input device
static variable overload operators as member
functions 650) The input device that is most
617) Signal to noise ratio compares closely related to a touch screen is the
signal strength to noise level 633) Modifying algorithms that light pen
change the order of the elements, not
618) The ability to create new objects their values, are also called modifying 651) Laser printer generates
from existing objects is known as algorithms characters from a grid of pins
634) As long as the tables in a 652) The liquid crystal display works
619) Software tools that provide relational database share at least one on the basis of the relation between
automated support for the systems common data attribute, the tables in a polaristion and electric field
development process are OLAP tools relational database can be normalized
to provide useful information and 653) A COBOL program in source
620) Applications/Web server tier reports code is not considered to be system
processes HTTP protocol, scripting software
tasks, performs calculations, and 635) DBMS is a simple, fourth
provides access to data generation language used for data 654) Firmware stored in a hard disk
621) A language used to describe the 655) A compiler breaks the source
syntax rules is known as meta 636) An occurrence of an undesirable code into a uniform stream of tokens
language situation that can be detected during by lexical analysis
program execution is known a
622) In a preorder traversal, the exception 656) Sorting of a file tasks is not
binary tree is traversed as follows performed by a file utility program
637) A photo of the company
623) The general syntax of the headquarters would be an example of 657) Floppy disk does not generate a
function prototype of a value the use of a static web page hardware interrupt
returning function is function name
(parameter list) 638) The Pentium processor contains 658) Ada language is associated with
thousands of transistors real time processing
624) Competitive intelligence is the
process of gathering enough of the 639) SOI technology has been 659) MS DOS is usually supplied on a
right information in a timely manner successful with reference to SRAM cartridge tape
and usable form and analyzing it so
that it can have a positive impact 640) Secondary storage device is 660) BREAK is not an internal DOS
needed to print output results command
625) Tracing values through a
sequence is called a play out 641) Static random access memory 661) Kernel of MS-DOS software
does not fall under the category of resides in ROM
626) In a binary tree, each secondary storage devices
comparison is drawn as a circle, called 662) The UNIX operating system
a node 642) Floppy disk is universal, portable (available commercially) has been
and inexpensive but has its own written in C language
627) The term used as a measurement limitation in terms of storage capacity
of a communication channel‘s data and speed 663) MS-DOS has better file security
capacity is bandwidth system as compared to UNIX
643) Some physical property of the
628) In addition to the nature of the microscopic area of the disk surface is 664) UNIX is only a
problem, the other key factor in changed for recording in common for multiprogramming system
determining the best solution method all types of disks
is function
665) The UNIX operating system uses 685) The clock frequency of a 705) The unit in CPU or processor,
three files to do the task mentioned Pentium processor is 50 MHz which performs arithmetic and logical
operations is ALU
666) In UNIX, end-of-file is indicated 686) The input device that is most
by typing CTRL D likely to be used to play computer 706) RAM is volatile
games is the joystick
667) Abacus is said to be invented by 707) The result of arithmetic and
Chinese 687) Linking the program library with logical operations is stored in an
main program is not performed by a accumulator
668) An operating system is necessary file utility program
to work on a computer 708) A small amount of memory
688) The UNIX operating system has included in the processor for high
669) The first UNIX operating system, been written in C language speed access is called cache
as it was in the development stage,
was written in the assembly language 689) BIOS of MS-DOS resides in ROM 709) A bus is an electronic track
670) FAST drivers scientific software 690) The sector size of a floppy disk
packages was developed under varies from 128 bytes to 1024 bytes 710) A co-processor is used to
contract with NASA improve the speed of mathematical
691) A program type of errors is calculations
671) LEFT () is not a date function flagged by compilers
711) Intel 80286 belongs to third
672) FIF editor is a windows based 692) A floppy diskette is organized generation microprocessors
application according to tracks and sectors
712) A hexadigit can be represented
673) Graphics is inserted in frame 693) In word star, the maximum by eight binary bits
permissible length of search string is
674) A language translator is best 65 713) The number of processes that
described as a system software may running at the same time in a
694) C is a third generation high level large system can be thousands
675) The specification of a floppy is language
identified by TPI 714) FORTRAN is a 3GL
695) A CPU has a 16-bit program
676) DISC () is not a database counter. This means that the CPU can 715) Root is not an item of the Menu
function address 64 K memory locations bar

677) In opening menu of word star C 696) STR () is used for converting a 716) Difficult to do what it projects is
OPTION should be selected for numeric into a character string not considered to be a feature of the
protecting a file spreadsheet
697) BASIC language is normally used
678) The most advanced form of ROM along with an interpreter 717) While starting the Lotus 1-2-3,
is electronically erasable the current cell reference is shown at
programmable ROM 698) In UNIX, open files are shared top left hand corner of the screen
between the parent and the child
679) Secondary storage device is 718) Bill gates is the chief of Microsoft
needed to store large volumes of data 699) In spite of the extra power
and programs that exceed the capacity needed for refreshing. DRAMs are 719) Excel office assistant can be
of the main memory widely used in computers because of made to appear by using F1 key and
its lower cost relatives to SRAMs help menu
680) MORE sends contents of the
screen to an output device 700) PIF editor belongs to Main group 720) 9 per page is the max no of
showing positioning of per page
681) NFS stands for N/W file system 701) SUM () is not a financial handouts
682) Main protocol used in internet is 721) Alignment buttons are available
TCP/IP 702) 98/04/12 cannot be used to on formatting toolbar
enter a date
683) We can create a simple web page 722) Pico second is 10(to the power
by using front page express 703) Windows is popular because of of-9)
its being expensive
684) The first line/bar on the word 723) Logo refers to a computer
window where the name of the 704) Personal computers currently language
document is displayed is called title sold in India have main memories at
bar an entry level in the range of 724) The most appropriate command
megabytes to permanently remove all records
from the current table is Zap
743) In any window, the maximize
725) The efficient and well designed button, the minimize button and the 761) The most important or powerful
computerized payroll system would be close buttons appear on the title bar computer in a typical network is
on-line real time system network server
744) Checking that a pin code
726) The scripts which are designed number is valid before it is entered 762) To make a notebook act as a
to receive value from Web users is CGI into the system in an example of data desktop model, the notebook can be
script validation connected to a docking station which
is connected to a monitor and other
727) WAIS stands for – wide assumed 745) Windows 95 and windows 98 devices
information section and Windows NT are known as
operating systems 763) Storage that retains its data after
728) Modem is used for connecting the power is turned off is referred to
PC using telephone lines 746) Information on a computer is as non-volatile storage
stored as analog data
729) Token bus is the most popular 764) Virtual memory is memory on
LAN protocol for bus topology 747) A program that works like a the hard disk that the CPU uses as an
calculator for keeping track of money extended RAM
730) Manipulating data to create and making budgets is spreadsheet
information is known as analysis 765) To move to the beginning of a
748) To take information from one line of text, press the home key
731) A separate document form source and bring it to your computer
another program sent along with an is referred to as download 766) When sending and e-mail, the
E-mail message is known as E-mail subject line describes the contents of
attachment 749) Windows is not a common the message
feature of software applications
732) When you boot up a PC — 767) Microsoft is an application suite
portions of the operating system are 750) A toolbar contains buttons and
copied from disk into memory menus that provide quick access to 768) Information travels between
commonly used commands components on the motherboard
733) Correcting errors in a program is through bays
called debugging 751) Input device is an equipment
used to capture information and 769) One advantage of dial-up
734) A word processor would most commands internet access is it utilizes existing
likely be used to type a biography telephone security
752) Most of the commonly available
735) A database is an organized personal computers/laptops have a 770) Network components are
collection of data about a single entity keyboard popularly known as connected to the same cable in the star
QWERTY topology
736) Fire fox is a web browser
753) Editing a document consists of 771) Booting checks to ensure the
737) Most of the commonly used reading through the document you‘ve components of the computer are
personal computers/laptops do not created then—correcting your errors operating and connected properly
have a command key known as
turnover 754) Virtual Box is not a famous 772) Control key is used in
operating system combination with another key to
738) Full form of USB is known as perform a specific task
Universal serial bus 755) Junk e-mail is also called spam
773) Scanner will translate images of
739) The quickest and easiest way in 756) DOC is the default file extension text, drawings, and photos into digital
Word to locate a particular word or for all word documents form
phrase in a document is to use the find
command 757) .bas, .doc and .htm are examples 774) Information on a computer is
of extensions stored as digital data
740) Computer sends and receives
data in the form of digital signals 758) Codes consisting of bars or lines 775) The programs and data kept in
of varying widths or lengths that are main memory while the processor is
741) Icons are graphical objects used computer readable are known as a bar using them
to represent commonly used code
application 776) Storage unit provide storage for
759) Convenience, speed of delivery, information and instruction
742) Most World Wide Web pages generally and reliability are all
contain HTML commands in the considered as the advantages of e-mail 777) Help menu button exist at start
760) E-commerce allows companies to 778) Microsoft company developed
conduct business over the internet MS Office 2000
815) History list is the name of list
779) Charles Babbage is called the 798) The first generation computers that stores the URL‘s of web pages and
father of modern computing had vacuum tubes and magnetic drum links visited in past few days

780) Data link layer of OSI reference 799) Office Assistant is an animated 816) FDDI access mechanism is
model provides the service of error character that gives help in MSOffice similar to that of IEEE 802.5
detection and control to the highest
layer 800) Alta Vista has been created by 817) MS Office 2000 included a full-
research facility of Digital Electronic fledged web designing software are
781) Optical fiber is not a network corporation of USA called FrontPage 2000

782) OMR is used to read choice filled 801) We are shifting towards 818) Macintosh is IBM‘s
up by the student in common entrance computerization because technologies microcomputer
test help in meeting the business objectives
819) X.21 is physical level standard
783) A network that spreads over 802) Spiders search engines for X.25
cities is WAN continuously send out that starts on a
homepage of a server and pursue all 820) Enter key should be pressed to
784) File Manager is not a part of a links stepwise start a new paragraph in MS Word
standard office suite
803) Static keys make a network 821) Main frame is most reliable,
785) A topology of computer network insecure robust and has a very high processing
means cabling between PCs power.
804) Joy Stick is an input device that
786) In UNIX command ―Ctrl + Z‖ is cannot be used to work in MS Office 822) Formatting of these toolbars
used to suspend current process or allows changing of Fonts and their
command 805) Artificial intelligence can be used sizes
in every sphere of life because of its
787) Word is the word processor in ability to think like human beings 823) The ZZ command is used to quit
MS Office editor after saving
806) To avoid the wastage of memory,
788) Network layer of an ISO-OSI the instruction length should be of 824) The program supplied by VSNL
reference model is for networking word size which is multiple of when you ask for internet connection
support character size for the e-mail access is pine

789) Telnet helps in remote login 807) Electronic fund transfer is the 825) The convenient place to store
exchange of money from one account contact information for quick,
790) MS Word allows creation of to another retrieval is address book
.DOC type of documents by default
808) Format menu in MS Word can 826) Digital cash is not a component
791) In case of MS-access, the rows of be use to change page size and of an e-wanet
a table correspond to records typeface
827) For electronic banking, we
792) Record maintenance in database 809) Assembly language programs are should ensure the existence and
is not a characteristic of E-mail written using Mnemonics procedures with regard to
identification of customers who
793) In a SONET system, an add/drop 810) DMA module can communicate become members electronically
multipliers removes noise from a with CPU through cycle stealing
signal and can also add/remove 828) Jon Von Neumann developed
headers 811) A stored link to a web page, in stored-program concept
order to have a quick and easy access
794) The WWW standard allows to it later, is called bookmark 829) Hardware and software are
grammars on many different mandatory parts of complete PC
computer platforms to show the 812) B2B type of commerce is system
information on a server. Such characterized by low volume and high
programmers are called Web value transactions in banking 830) Firewall is used in PC for security
813) Advanced is not a standard MS 831) Two rollers are actually
795) One of the oldest calculating Office edition responsible for movement of the
device was abacus cursor in mouse
814) Workstation is single user
796) Paint art is not a special program computer with many features and 832) In case of a virus getting into
in MS Office good processing power computer NORTON will help

797) Outlook Express is a e-mail

client, scheduler, address book
833) Tour the server room is to be 851) Half duplex transmission
done by the auditor while internet techniques let computer to 867) The objective of
banking services audit alternatively send and receive data multiprogramming operating system
is to maximize CPU utilization
834) Documentation while developing 852) Multiplexing combines signals
a software for a Bank is required for from different sources into one and 868) The environment provided to
auditing sends on a faster channel ASP is based on Client/server

835) Water supply has not become 853) Message switcher chooses 869) HUB is layer1 device, central
computerized correct data path for an incoming device, dumb device
message and forwards it to relevant
836) Concurrency control in line 870) The UNIX, echi command is used
distributed database supports multi- to display the message or value of any
user access 854) Speech recognition use thermal variable on the screen
sensors along with infrared rays for
837) Fifth generation computers are identification 871) QAM is used in high speed
knowledge processors modem
855) Trojan horse are self replicating
838) Transistors were first used in malicious code independent of the 872) Frame Relay technique uses
2nd generation computers action of the user, but slow down the connection oriented
processor on entering a network
839) Intelligence is not a 873) Bipolar always has a non-zero
characteristic of a computer 856) Generation of PIN in bank ATM average amplitude
would require PIN entered is
840) A camera is an processing encrypted 874) In a SONET system, an add/drop
machine multipliers can remove signals from a
857) Availability, integrity, path
841) To protect organization from confidentiality is most necessary for
virus or attacks all mails sent and data to be useful 875) The server on the internet is also
received should be monitored, all known as Host
messages should be encrypted, E- 858) Grid is a supercomputer created
mails should be used only for official by networking many small computers 876) For multiple branching in ‗C‘ we
purpose use switch statement
859) A character that changes its
842) Internet collects millions of value throughout the program is 877) Web site is a collection of HTML
people all over the world called variables documents, graphic files, audio and
video files
843) A computer based information 860) A program coded in
system is a system in which a programming is done by assembling 878) The first network that initiated
computer is used to process data to get the internet was ARPANET
information 861) In write mode of file existing text
is replaced by new one 879) In MODEMS a digital signal
844) The time between program input changes some characteristic of a
and outputs is called execution time 862) When an organization gives carrier wave
contract for development of a
845) Third generations of computers software, it has to give data to the 880) The binary values are
have On-line real time systems service provider. In such cases, the represented by two different
ownership of data should be with the frequencies in frequency shift keying
846) MIME is a compressor that client/organization that outsource
packages different formats into SMTP services 881) Messenger mailbox is present in
compatible type Netscape communicator
863) Under a centralized organization
847) The earliest software was Intranet be an effective networking 882) Switching is a method in which
developed using the waterfall model tools multiple communication devices are
connected to one another efficiently
848) EDI e- commerce system can 864) For optical fiber used in point to
handle non monetary documents point transmission, the repeater 883) A bridge recognizes addresses of
spacing is 10-100 km layer 3
849) Collection to tracks on a disk
forms spindle 865) Favorites are accessible from the 884) EPROM is permanent storage
start menu device
850) A disk where number of sectors
are fixed is called hard sectored 866) Task pre-emption, task priority 885) ―.TIF‖ extension name stands for
and semaphores are not needed by tagged image format
server program from an operation
886) The overhead using BRI is 10 906) Insulating material is the major 924) In this processing, a number of
percent of the total data rate factor that makes co axial cable less jobs are put together and executed as
susceptible to noise than twisted pair a group batch processing
887) In programming languages the cable
key word ―Void‖ means it does not 925) The process of finding and
return any value when finished 907) A data communication system correcting errors in a program is a
covering an area the size of a town or process called debugging
888) The keyboard shortcut to restart city is MAN
your computer is Ctrl + Alt + Del 926) cn pass command is used to
908) Virtual memory system allows change your password in UNIX system
889) FORTRAN is not a programming the employment of the full address
language space 927) HTML code is always starts with
<html> </html>
890) The instruction LOAD A is a one 909) The basic circuit of ECL supports
address instruction the OR-NOR logic 928) If there are 5 routers and b
networks in an internet work using
891) MS-Excel is also known as 910) Micro instructions are kept in link state routing, there will be 5
spread sheet control store routing tables

892) Manchester encoding is used in 911) In HTML coding no shade 929) A scripting language similar to
Ethernet technology attribute of HR tag suppresses the HTML and which runs only on a
shading effect and fields a solid line browser is java script
893) The instruction of a program
which is currently being executed are 912) Internet domains are classified 930) By RAID technique, data is stored
stored in main memory by their functions. In that regard in several disk units by breaking them
―.com‖ represents commercial into smaller pieces and storing each
894) In DOS environment, the piece in separate disk
command used to save the file is ^Z 913) HTTP in URL stands for hyper
text transfer protocol 931) The most popular network
895) All high level language uses protocol whose routing capabilities
compiler and interpreter 914) The ―Nyquist theorem‖ specifies provide maximum flexibility in an
the minimum sampling rate to be enterprise wide network is known as
896) In html coding <p> …… </p> twice the bandwidth of a signal TCP/IP
tag is used to display a paragraph
915) Memory allocation at the routine 932) New group that enable you to
897) In HTML coding, the following is known as dynamic memory communicate with other Microsoft
attributes color, size, face used in font allocation windows user about issues and
tag concerns with your computer
916) In HTML loading, <BR> tag is
898) DHTML stands for dynamic used for displaying a new line 933) Analog-digital conversion type
hyper text markup language needs sampling of a signal
917) HTTP protocols are used by
899) Fiber optics cable supports data internet mail 934) In an optical fiber, the inner core
rate up to 100 mbps to 2 gbps is less dense than the cladding
918) A policy on firewalls needs not
900) In Photoshop software we can ensure that it is logically secured 935) Six types of heading are available
modify, delete, and edit the image in HTML
919) The script which is designed to
901) Most common channel used by receive value from the web users is 936) RDBMS is an acronym for
networks today is telephone lines java script relational database management
902) Sybase SQL server and Microsoft 920) GET method and HEAD method
SQL server 7.0 is not an example of is the C91 method of involving a C91 937) In MS-Word, page layout view is
RDBMS program also known as true WYS/WYG

903) In programming language, Null 921) Analog switched line telephone 938) In HTML coding, <UL>
point is used to tell end of linked list service is least expensive (Unordered list) is used to give bullets
in your document
904) A technique which collects all 922) A toll used to find a synonym or
deleted space onto free storage list is antonym for a particular word is 939) Transmission media are usually
called garbage collection thesaurus categorized as guided or unguided

905) Node to node delivery of the data 923) In C++ coding, Cout<<‖tent‖; is 940) A virtual circuit is the physical
unit is the responsibility of the data used to display character or strings or connection between an end point and
link layer numeric screen a switch or between two switches
941) Passing of the frame to next 959) FORTRAN is a mathematically
station can happen at a token ring oriented languages used for scientific 977) The sharing of a medium and its
station problems path by two or more devices is called
942) R-C coupling method is suitable 960) If we want to convert the text
for voltage amplification which is in small letters to capital 978) Sending messages, voice, and
letters then select the required text video and graphics files over digital
943) Normal is not a type of HTML and press Shift +F3 communication link is done by the
pages method e-mail
961) Datagram packet switching uses
944) In HTML coding <LI> tag is used the entire capacity of a dedicated link 979) In a computer network, a
for denoting items in a list of type computer that can control a group of
<UL> 962) In the datagram approach to other computers for sharing
packet switching, each packet of a information as well as hardware
945) In MS-Word the keyboard message follows the same path from utilities is known as server
shortcut F7 used for spelling and sender to receiver
grammar check 980) Telephone number, zip code is
963) FDM technique transmits analog defined as a numeric field
946) DBMS is not an operating system signals
981) In shell programming, tr
947) HTML is basically used to design 964) X.21 protocol consists of only command is used for character
web-site physical level translation

948) In HTML coding, Dynamic web- 965) In a dedicated link, the only 982) Cat text>>output would append
pages are created in advance of the traffic is between the two connected a file called test to the end of a file
user‘s request devices called output

949) In Dos, primary name of a file 966) In a start topology, if there are n 983) In a network with 25 computers,
can have a maximum of 10 characters devices in network, each device has n- mesh topology would require the
1 more extensive cabling
950) du command is used to show file
system disk usage in UNIX 967) A unique number assigned to a 984) Dialog control is a function of
process when the process first starts the presentation layer
951) Maximum length of a text file is running PID
255 characters 985) The program which takes user
968) Modems is necessary for input, interprets it and takes necessary
952) Frame format of CSMA/CD and multiplexing action is shell
Ethernet protocol differ in the block
error control 969) In MS-Word WYSIWYG stands 986) Most appropriate data structure
for what you see is where you get in C to represent linked list is array
953) On an Ethernet LAN
implementation with 10 base 5 the 970) The primary purpose of 987) Menu bar is usually located
maximum number of segments can be shutdown procedure in UNIX system below that title bar that provides
five is that all active process may be categorized options
properly closed
954) Overflow condition in linked list 988) Latest version of Microsoft Word
may occur when attempting to create 971) In time- division circuit is Word XP
a node when linked list is empty switching, delivery of data is delayed
because data must be stored and 989) You save your computer files on
955) Code segment register is where retrieved from RAM disc and in folders
the microprocessor looks for
instruction 972) Subnet usually comprises layers 990) when the text automatically goes
1 & 2, layer 1 through 3 of OSI model onto the next line this is called word
956) Web-site is collection of web- wrap
pages and Home-page is the very first 973) An image in a web-page can be
page that we see on opening of a web- aligned left and right using HTML 991) WYSIWYG is short for what you
site coding see is what you get

957) The subsystem of the kernel and 974) RFC stands for request for 992) Left justify is the same as align
hardware that cooperates to translate comment left
virtual to physical addresses comprises
memory management subsystem 975) Packet filtering firewall and 993) To put text on the right of the
proxy firewall is not a type of firewall page use the align right button
958) A device operating at the
physical layer is called a repeater 976) Most news reader‘s presents 994) Lotus 1-2-3 is a popular DOS
news groups articles in threads based spreadsheet package
1013) Extended located above the first 1033) EDI means electronic data
995) 65,535 characters can be typed 1024K of memory interface
in a single cell in excel
1014) WRAM type of RAM is 1034) Mainframes network where a
996) Comments put in cells are called normally the fastest huge compute does all computing and
cell tip front end PCs are dumb terminals
1015) RAM component is used for
997) Getting data from a cell located short-term data storage 1035) A modem that cannot be moved
in a different sheet is called from its position is called fixed modem
referencing 1016) A SIMM has 40 pins
1036) A device that receives data from
998) A numeric value can be treated 1017) RAM provides quickest access slow speed devices, and transmits it to
as a label value if it precedes with to data different locations is called remote
apostrophe concentrator
1018) Narrowcast linking is not a
999) Data can be arranged in a transmission technology 1037) Organization would prefer in
worksheet in an easy to understand house development of software to
manner using auto formatting, 1019) The data flow diagram is for ensure that the development adhere to
applying styles, changing fonts analyzing requirements of user defined quality

1000) An excel workbook is a 1020) The elements of computer 1038) Actual intelligence is not a
collection of worksheets and charts processing system are hardware, data, feature of PC
users and procedures
1001) Most manufacturers setup their 1039) Network that uses two OSI
BIOS to load into upper memory 1021) On August 23, 2005 an protocol layers as against three used in
during the boot process accounting clerk prepared an invoice X.25 is a ―frame relay‖
dated August 31, 2005. Range check
1002) Device drivers loaded in the control can check this 1040) Microsoft excel is versatile
config.sys file is loaded into the application and spread sheet program
following memory area: Conventional 1022) Library management software
memory is for documenting the changes that 1041) System flowcharts show
are made to program and controlling relationship that link the input
1003) 40ns memory speeds is the the version numbers of the programs processing and output of the system
1023) Steganography is hiding the 1042) To identifying the system to be
1004) System software often uses the data but not necessarily making it tested the penetration testing is done
ROM BIOS invisible and not easily detectable
1043) Platform in computer world
1005) In CMOS setup, if you enable 1024) A computer is an electronic means computer hardware and
shadowing ROM is copied to RAM device operating systems

1006) Static variables are local to the 1025) An online transaction is 1044) A character that retains its
block in which they are declared. transaction done via internet value during program execution is
1007) During the normal PC boot 1026) Using anti-virus software is
process, ROM BIOS is active first preventive measure 1045) Data accuracy is not done by
1008) During boot-up, the memory 1027) For security we should consider
test checks and verifies that local data reduction, event correction 1046) OMR is used to read choice
contiguous memory is installed low resource utilization filled up by a student in common
entrance tests
1009) 601 error code identifies a 1028) OS is not a peripheral of PC
floppy drive problem 1047) The term remote with respect to
1029) The most common input device network means machine located far
1010) If you get frequent general used today is keyboard off
protection faults, this could indicate
poor quality of memory chips 1030) The third generation of the 1048) In two-tier client server
computer were in 1965-1971 architecture the client is usually fat
1011) You are looking at a memory client
module thought to be a DIMM 1031) Gateways to allow a network to
module. 168 pins would be on a use the resources of another main 1049) The senior management
DIMM module frame is a component of internet provides the go-ahead approval for
the development of projects
1012) The system BIOS and ROM 1032) Mouse cannot be shared
chips are called firmware 1050) Manual data can be put into
computer by Scanner
1088) CPU is not an input device of a
1051) E-mail address is made up of 1069) Commercial TV is an example computer
two parts of distributive services with user
control 1089) Program of a computer
1052) The normal way to undo a presented as a sequence of instructions
command by pressing the following 1070) The exact format of frame in in the form of binary numbers is
key combinations together CTRL-Z case of synchronous transmission called machine language
depends on whether transmission
1053) The owner of a process is user scheme is either character oriented or 1090) Possible problems with java
that invokes the process bit oriented scrip can be security or limited
graphics and multimedia capabilities
1054) In datagram packet switching 1071) RING topology is least affected
all the datagram‘s of a message follow by addition/remove of a node 1091) For locating any document on
the same channel of a path the WWW. There is a unique address
1072) EX-OR gates recognizes only known as URL
1055) X.25 LAPP uses a specific subset words that have an odd number of 1
of HDLC protocol 1092) Design view would use to
1073) To interconnect two define a table and specify fields
1056) Presentation layer of the OSI homogenous WAN‘s we need a router
reference model is concerned with the 1093) Traversal process is faster for
syntax of data exchanged between 1074) Co-axial cables provides data threaded trees compared with their
application entities rates over 50 mbps unthreaded counterparts

1057) Edge-triggered D flip –flop 1075) The outermost orbit of an atom 1094) The command used to display
memory elements uses an PC circuit at can have a maximum of 8 electrons help on any particular command is
its input man
1076) The protocol for sharing
1058) Programs that extend the hypertext information on the world 1095) In C++ programming, the
capabilities of a server are C41 scripts wide web is HTTP extension of program is .cpp

1059) The primary goal of ISDN is the 1077) ISDN‘s basic rate interface (BRI) 1096) A generic team that refers to
integration of voice services and non- is also known as 2 D + B the combination of all commercial
voice services transactions executed over electronic
1078) The mode of data transmission media for the exchange of product
1060) Flow control in OSI model is of unshielded twisted pair cable is full and services
done by transport layer duplex
1097) In DOS, the command used to
1061) The optical links between any 1079) Data accuracy is not done by create a new file is called copy con
two SONET devices is called a section modem
1098) Backup helps you to create a
1062) A user can get files from 1080) Query is used to answer a copy of the information on your hard
another compute on the internet by question about a database disk and saves original data in case
using FTP data on your computer got damaged
1081) AM and FM are examples of or corrupted due to malfunctioning of
1063) The key fields which are tested analog to analog modulation hard-disk
by a packet filtering firewall are
source IP address , TCP/UDP source 1082) Redundancy is the concept of 1099) LAN is usually privately owned
port, destination IP address sending extra bits for use in error and links the devices in a single office,
detection building or campus
1064) The server on the internet is
also known as gateway 1083) The physical layer is concerned 1100) In justified type of alignment,
with transmission of bits over the text gets aligned along both left and
1065) VBScript can perform physical medium right margins
calculation of data
1084) The number of input lines 1101) The internal programming
1066) In MS-Word, ‗mail merge‘ can required for a 8 to 1 multiplexes is 8 language for a particular chip is called
be defined writing a letter once and machine language
dispatching it to a number of 1085) The bar-code (rectangular
recipients pattern of lines of varying width and 1102) The inner core of an optical
spaces) used for automatic product fiber is glass and plastic in
1067) Coaxial cables are good for identification by computer composition
digital transmission and long distance
transmission 1086) FSK is most affected by noise 1103) When a small amount of
trivalent impurity is added to a pure-
1068) LRU is a page replacement 1087) Stack is a LIFO structure semiconductor it is called P-type
policy used for memory management semiconductor
1122) Attair, the world‘s first personal 1139) When SHADOWING is enabled
1104) In MS-Access, a table can have computer, was introduced in the year in computers BIOS Instructions stored
one primary key/keys 1979 in various ROM chips are copied into

1105) In DOS, Deltree command is 1123) Half duplex data flows in both 1140) POST stands for power on self
used to delete all the files as well as directions, but any one direction at the test
sub-directories of a directory time
1141) Checking the hard disk while
1106) Netscape navigator is a web- 1124) Ring requires a central running Windows 3.1, you discover a
browser controller or hub very large file called 396SPART.PAR.
That file is windows permanent swap
1107) Multiplexing involves one path 1125) The OSI model consists of seven file
and one channel layers
1142) CMOS contains the computer
1108) Table, form, queries, reports, 1126) The main job of one of the BIOS and maintains its data with the
macros, modules are objects in an following is to allocate CPU to use of a battery for periods when the
access database processes scheduler system is powered down

1109) The clown command in UNIX 1127) 10,500 valid Min & Max zoom 1143) TSR stands for terminate and
changes home directory of a user sizes in MS office stay

1110) BCD stands for binary coded 1128) Before printing a document you 1144) LAN is not an inter network
decimal should always use print preview
1145) Memory is temporary and
1111) When we run a program in 1129) Excel XP is the latest version of storage is permanent
HTML coding, notepad is used as excel
backend and internet-explorer works 1146) Echo checking cannot assure
as front end 1130) A worksheet can have a data accuracy in an application
maximum of 256 number of rows
1112) If the M bit in X.25 standard is 1147) Focus on manual records is not
set to 1, it means that thee is more 1131) Character is not a valid data necessary for computerization system
than one packet type in Excel in a bank

1113) The modem is a device that 1132) Formula bar in an Excel 1148) Permanent establishment,
connects n input stream outputs window allows entering values and residence-based, Income based
formulas classification are the approaches used
1114) Array is linear data structure to tax online transactions
1133) Direct memory access is a
1115) A T.V. broadcast is an example technique for transferring data from 1149) Computer of computer
of simplex transmission main memory to a device without communication for business
passing it through the CPU transactions is called EDI
1116) Search engine will search its
database to find items whose tent 1134) 5 30-bit SIMMS are required to 1150) Client-server computing is used
contains all or at least one of the populate a bank on a 486 system that in Network multi-media
words given to it has a 32-bit data bus
1151) Back up of files is taken for
1117) In UNIX, command ―! $‖ is 1135) SRAM uses a clock to security
used to repeat entire less command synchronize a memory chip‘s input
line and output signal 1152) Operating system is not a
software category
1118) PCM is an example of analog to 1136) Cycle-stealing type of DMA
digital transfer will operate when a CPU is 1153) Computer program looking
operating ―normal‖ but containing harmful code
1119) A simple protocol used for is infected by Trojan horse
fetching an e-mail from a mailbox is 1137) A series 100 POST error code
POP 3 indicates a problem with the system 1154) Private key is used to append a
board digital signature
1120) For a small web site, one needs
to buy space from the ISP 1138) You have an old PC that you 1155) Most dangerous risk in leaking
decide to upgrade with a 1 gig IDE of information is ignorance about the
1121) An operating system that acts as hard drive. You find that you can‘t existence of risk
an intermediary between user and configure CMOS to see the entire hard
computer hardware drive. The best you can do is 540 meg. 1156) IMAP (Internet message access
Then use a device driver that makes protocol) takes care of E-mail at client
the bios see the drive as side
1157) The CPU has control unit, 1178) CASE tool cannot help with
arithmetic-logic unit and primary understanding requirements 1196) The Vi program available under
storage UNIX can be created to open a virtual
1179) UPC cannot be used for source terminal
1158) 1st generation computer is the of data automation
bulkiest PC 1197) A 4-bit ring counter is initially
1180) The banks are MICR device to loaded with 1001
1159) E-R diagram represents minimize conversion process
relationship between entities of system 1198) The standard defined for fiber
1181) MP3 files cannot be navigated optics is 802.8
1160) User is technically least sound using ClipArt browser
1199) Digitizers can be converted
1161) Minicomputers is not there 1182) Close option in File pull-down from ―dumb‖ to ―smart‖ through the
during fourth generation computer menu is used to close a file in addition of a microprocessor
1162) Microchip is unique to a 1200) The extension of database file is
smartcard 1183) 3 ½ is the size of a standard given by dbf
floppy disc
1163) Internet was started as network 1201) VRML code is based on Unicode
for defences forces of America 1184) When entering in a lot of text
in capitals you should use the caps 1202) Use net discussion groups have
1164) A program permanently stored lock key their own system of organization to
in hardware is called firmware help you find things just as internet
1185) Files created with Lotus 1-2-3 excel
1165) Taking back-up of a file against have an extension 123
crash is a curative measure 1203) Http protocol is used for WWW
1186) Contents, objects, Scenarios of a
1166) Simplex transmission technique worksheet can be protected from 1204) Protocol conversion can be
permits data flow in only one accidental modification handled by gateway
1187) Device drivers that are loaded 1205) In ISDN teleservices, the
1167) Front end processor relieves the in windows 3.X are loaded into the network can change or process the
host computer from tedious jobs and sytem.ini file contents of data
does them itself
1188) 30 pin SIMM‘s, 72 pin SIMM‘s, 1206) A longer instruction length may
1168) Software can‘t be touched 168 pin DIMM‘s types of RAM sockets be -1024 to 1023
can be seen on mother boards
1169) Physical access to a database 1207) A microprocessor is a processor
can be altered by hiring procedure 1189) The Power on self test with a reduced instruction set and
determines the amount of memory power requirement
1170) The sound signal carried by present, the date/time, and which
telephone line is analog communications ports and display 1208) The term server refers to any
adapters are installed in a device that offers a service to network
1171) All decisions for LAN are taken microcomputer users
by the IT steering committee
1190) Virtual memory refers to using 1209) Using HTML, Front page,
1172) An input device gives data to a a file on the hard disk to simulate DHTML we can make web-site
computer RAM
1210) Usually security in a network is
1173) Correction of program is done 1191) BIOS (ROM) is considered achieved by cryptography
by debugging firmware
1211) PSTN stands for public switched
1174) File transfer is the function of 1192) A population application of telephone network
the application layer computer networking is the WWW of
newsgroup called Netnews 1212) A thyratron cannot be used as a
1175) A policy on firewalls need not amplifier
ensure that is logically secured 1193) a = 10; export a is a valid
command sequence in UNIX 1213) An input device conceptually
1176) A modem performs modulation, similar to mouse is joystick
demodulation, data compression 1194) Set date will you give in UNIX
to display system time 1214) Netscape navigator and other
1177) Personnel security does not fall browsers such as the internet explorer
under the category of operations to be 1195) Circuit switched network are available free on the internet
performed during development of networks requires that all channels in
software a message transmission path be of the 1215) In MS-logo Bye command is
same speed used to come out from that screen
1251) Overtime analysis is useful for
1216) In C++ programming, the 1234) A set of standards by which formulating personnel policies and
command to save the program file is servers communicate with external derived form the payroll system
F3 programs is called common gateway
interface 1252) Multiple worksheets can be
1217) Data lines which provide path created and used at a time
for moving data between system 1235) UNIVAC is a computer
modules are known as data bus belonging to third generation 1253) UNIX is both time sharing and
multiprogramming system
1218) Bubble sort technique does not 1236) API allows a client/server
use divide and conquer methodology relationship to be developed between 1254) Floppy Disk is universal
an existing host application and a PC portable and inexpensive but has its
1219) The OSI model shows how the client own limitation in terms of storage
network functions of computer to be capacity and speed
organized 1237) Semi-insulator is a substance
which has resistivity in between 1255) Personal computers currently
1220) A 8 bit microprocessor must conductors and insulators sold in India have main memories at
have 8 data lines an entry level in the range of
1238) Multi vibrator is a two stage megabytes
1221) A protocol that permits the amplifier with output of one feedback
transfer of files between computer on to the input of the other 1256) UNIX has better security for
the network is FIP files relative to MS-DOS
1239) Macro is used to automate a
1222) A data structure, in which an particular task or a series of tasks 1257) The UNIX operating system has
element is added and removed only been written in C language
from one end is known as stack 1240) Internet is network of networks
1258) Syntax errors is flagged by
1223) In linked list, the successive 1241) A set of devices or combination compilers
elements must occupy contiguous of hardware and software that
space in memory protects the systems on one side from 1259) PARAM is an example of super
system on the other side is firewall computer
1224) In OSI model reference, layer 2
lies in between the physical layer and 1242) Simple, transparent, multi post 1260) Mother board holds the ROM,
the network layer are bridge types CPU, RAM and expansion cards

1225) In synchronous TDM, for n 1243) When bandwidth of medium 1261) CD-ROM is as a magnetic
signal sources, each frame contains at exceeds the required bandwidth of memory
least n slots signals to be transmitted we use
frequency division multiplexing 1262) The binary number system has
1226) Mouse and joystick are graphic a base 2
input devices 1244) Direct or random access of
element is not possible in linked list 1263) GUI is used as an interface
1227) In linked list, a node contains at between software and user
least node number, data field 1245) In Dos, the ―Label‖ command is
used to display the label of disk 1264) E-mail is transaction of letters,
1228) Gopher is not a web browser messages and memos over
1246) At the lower end of communications network
1229) Device drivers controls the electromagnetic spectrum we have
interaction between the hardware radio wave 1265) Device drivers are small ,
devices and operating systems special purpose programs
1247) In Word, Ctrl + Del
1230) The shortest path in routing combination of keys is pressed to 1266) LAN refers to a small, single site
can refer to the least expensive path delete an entire word network

1231) An ordinary pen which is used 1248) Plotters are very useful in 1267) One megabyte equals
to indicate locations on the computer applications such as computer aided approximately 1 million bytes
screen by sensing the ray of light design
being emitted by the screen, is called 1268) Magnetic tape is not practical
light pen 1249) Web browser is a type of for applications where data must be
network application software quickly recalled because tape is a
1232) Netiquettes are some rules and sequential access medium
regulations that have to be followed by 1250) 65535 characters can be typed
users in a single cell in Excel 1269) User id, URI and time stamp is
not used by organization when a user
1233) Gateway uses the greatest visits its site
number of layers in the OSI model
1270) DBRM takes care of storage of memory was introduced in third
data in a data base 1287) The electronic circuits / devices generation computers
used in building the computer that
1271) Plotters give the highest quality executes the software is known as 1302) In third generation computers,
output hardware users interacted through keyboards
and monitors
1272) Encrypting file system features 1288) Assembler is a translator which
of windows XP professional operating translates assembly language program 1303) The fourth generation
system protects the data of a user, into a machine language program computers saw the development of
even if the computer is shared GUIs, the mouse and handheld devices
between users 1289) Interpreter is a translator
which translates high level language 1304) First computers that stored
1273) Loading is not required for high program into a machine language instructions in memory are second
level language program before it is program generation computers
1290) Machine language programs 1305) In second generation
1274) Top – bottom approach cannot are machine dependent computers transistors replaced
be the measure of network traffic vacuum tubes
1291) The programs written in
1275) Devices such as magnetic disks, assembly language are machine 1306) The micro processor was
hard disks, and compact disks, which independent introduced in fourth generation
are used to store information, are computer
secondary storage devices 1292) High level languages are
developed to allow application 1307) Integrated Circuits (IC) are
1276) Various input and output programs, which are machine introduced and the replacement of
devices have a standard way of independent transistors started in third generation
connecting to the CPU and Memory. computers
These are called interface standards 1293) The Vacuum tubes are related
to first generation computers 1308) Fifth generation computing is
1277) The place where the standard based on artificial intelligence
interfaces are provided to connect to 1294) Mark I was the first computer
the CPU and Memory is known as Port that used mechanical switches 1309) Assembly language is low-level
1278) Binary numbers are positional 1295) First generation computers
numbers relied on machine language to 1310) In assembly language
perform operations, and they only mnemonics are used to code
1279) The base of the hexadecimal solve one problem at a time operations, alphanumeric symbols are
system is sixteen used for address, language lies
1296) In first generation computers between high-level language and
1280) Display capabilities of monitor input was based on punched cards machine language
are determined by adapter card
1297) In second generation 1311) The computer‘s secondary
1281) Mouse has a use in graphical computers input was based on print memory is characterized by low cost
user interface and applications as outs per bit stored
input device
1298) Vacuum tube generates more 1312) Acknowledgement from a
1282) Drum plotter, flat bed plotter, energy and consumes more electricity computer that a packet of data has
graphic display device is an output been received and verified is known as
device 1299) Second generation computers ACK
moved from cryptic binary machine
1283) The time taken to write a word language to symbolic, or assembly 1313) Acoustic coupler is a
in a memory is known as write name languages which allowed communications device which allows
programmers to specify instructions in an ordinary telephone to be used with
1284) 1 MB is equivalent to 2 (to the words a computer device for data
power of 20 bytes) transmission
1300) Most electronic devices today
1285) A memory cell, which does not use some form of integrated circuits 1314) ALGOL is a high-level language
loose the bit stored in it when no placed on printed circuit boards thin
power is supplied to the cell, is known pieces of bakelite or fiberglass that 1315) A high level programming
as non-volatile cell have electrical connections etched language named after Ada Augusta,
onto them is called mother board coworker with Charles Babbage is Ada
1286) Magnetic surface recoding
devices used in computers such as 1301) The operating system, which 1316) Adder is a logic circuit capable
hard disks, floppy disks, CD-ROMs are allowed the device to run many of forming the sum of two or more
called secondary / auxiliary storage different applications at one time with quantities
devices a central program that monitored the
1317) To identify particular location
in storage area one have a address 1338) The bus is simple series of 1359) In modems a digital signal
connection that carry common signals changes some characteristic of a
1318) A local storage register in the carrier wave
CPU which contains the address of the 1339) Mainly memories are divided
next instruction to be executed is into two types they are logical 1360) Favorites are accessible from
referred as address register memories and physical memories the start menu

1319) A sequence of precise and 1340) System based on the new 1361) The virus is a software program
unambiguous instructions for solving Pentium II processor have the
a problem in a finite number of extended memory limit of 4G 1362) BANK‘S is not memory chip
operations is referred as algorithm
1341) Full form of EMS memory is 1363) We use RAM code to operate
1320) PC/AT is an example of Bi- excluded memory specification EGA
directional keyboard interface
1342) The 286 & 386 CPU have 24 1364) A scanner is attached to LPT or
1321) DIMM is not an I/O bus address lines SCSI host adapter port

1322) PCI bus is often called as 1343) Bus has both the common 1365) RAM bus is not a bus
mezzanine bus meaning and computer meaning
1366) Processor bus is the fastest
1323) 8088 is an original IBM PC 1344) Data on a floppy disk is speed bus in system
inter CPU chip recorded in rings called tracks
1367) Resolution is the amount of
1324) 80386 is a 32-bit processor 1345) A group of characters that have detail that a monitor can render
a predefined meaning database
1325) A Pentium or Pentium pro 1368) Sound blaster is a family of
board should run at 60 or 66 MHZ 1346) In a spreadsheet a cell is sound cards sold by creative labs
defined as the intersection of a row
1326) The maximum bandwidth of and column 1369) MIDI is a family of sound cards
EISA bus is 33 M/sec sold by creative labs
1347) Document file is created by
1327) A computer system runs word processing programs 1370) MIDI is a standard for
millions of cycles per second so that connecting musical instruments to
speed is measured in MHz 1348) Real time is not a type of error PC‘s

1328) Heat sink is the metal device 1349) The mouse device drivers, if 1371) By connecting a MIDI cable to
that draws heat away from an loaded in the config.sys file, its the joystick port you can connect your
electronic device typically called mouse.sys PC to a MIDI device

1329) Pentium chip has 64 bit & 32 1350) Peer to peer means computer to 1372) MPC stands for multimedia
bit registers computer personal computer

1330) A mother board should contain 1351) RLL refers to run length limits 1373) Video cards, video and graphics
at least 4 memory sockets card are example of video & audio
1352) The most important aspect of
1331) The 1.2 MB drive spin at 360 job scheduling is the ability to 1374) The display technology used by
rpm multiprogramming monitor is CRT

1332) Intensity of sound is called 1353) Modem is a modulator- 1375) On a LAN each personal
amplitude demodulator system computer is called workstations

1333) A single zero bit is called 1354) A data communication system 1376) The CPU is the next most
starting bit requires terminal device, important file server after the hard
communication channel, protocols disk
1334) PnP stands for plug and play
1355) The start button appears at the 1377) It is best to use the game
1335) A computers system‘s clock lower left of the screen adaptor interface on the sound card
speed is measured as frequency and disable any other on system
1356) Windows is GUI
1336) Maximum RAM of XT type is 1 1378) Mouse port uses keyboard
M 1357) TIF stands for tagged image controller
1337) The data in 8 bit bus is sent 1379) The number of sectors per track
along 8 wires simultaneously in 1358) The first network that initiated in 1.44 MB floppy disk is 18
parallel the internet is ARPANET
1380) Pentium II system can address
62 G memory 1401) The routing of data elements 1420) The throughput is a measure of
are called bits work for processor
1381) The mouse was invented by
Englebart 1402) Operating system often called 1421) COBOL stands for common
as kernel business oriented language
1382) The server‘s network adapter
card is its link to all the work stations 1403) IPC stands for inter process 1422) Reset button is used to do cool
on LAN communication booting

1383) Magnetic drives such as floppy 1404) Many programming errors are 1423) In MS-EXCEL the no of rows,
and hard disk drives operate by electro detected by the hardware no of columns are 16384,256
1405) When a process exists, he 1424) FOXPRO is a package and
1384) Clock timing is used to operating system must free the disk programming language
determine that start and end of each space used by its memory image
bit cell 1425) Mostly used date format in
1406) Buffering attempts to keep both computer is MM-DD-YY
1385) Head designs are of 4 types CPU and I/O device busy all the time
1426) Reservation of train ticket uses
1386) Latency is the average time that 1407) Software is not an example of real time mode of processing
it takes for a sector to be a available file mapping
after the heads 1427) A floppy disk is a thin plastic
1408) The most important aspect of disc coated with magnetic oxide
1387) Each sector is having 512 bytes job scheduling is the ability to
multiprogramming 1428) In binary addition 1+1 = 1
1388) DDD means digital diagnostic
disk 1409) There are two types of floppy 1429) Universal building blocks of a
disks computer system are NAND & NOR
1389) PC Technical is written in
assembly language and has direct 1410) System calls can be grouped 1430) In COBOL programming
access to the system‘s hardware for into three major categories characters length per line is 64
1411) ―FIFO‖ stands for first in first 1431) In FOXPRO, the maximum
1390) Check it pro deluxe gives out fields in a record are 128
detailed information about the system
hardware 1412) In the two-level directory 1432) QUIT command is used to come
structure, each user has its own user out of FOXPRO
1391) The last 128k of reserved file directory
memory is used by mother board 1433) Count command is used to
1413) The number of bytes in a page count the specified records in a file
1392) There are 80 cylinders are is always a power of 2 with or without condition
there for an 1.44 m floppy
1414) A process that does not 1434) F1 key is pressed for help in
1393) IBM changed ROM on the determinate while the operating FOXPRO
system to support key boards system is functionary is called
dynamic 1435) One Giga byte = 1024 mega
1394) +12 V signal for disk drive is bytes
used for power supply 1415) The three main types of
computer programming languages are 1436) Small scale integration chip
1395) CD ROM‘s are single sided machine language, assembly contains less than 12 gates
language, high level language
1396) The storage capacity of a 1437) The most common monitor
CDROM is 650 MB 1416) There are 2 types of processor sizes are 14, 15, 17
1397) XGB has 2048 K graphic 1438) IBM PC and DOS has BIOS
memory 1417) An input device is an support for 3 LPT ports
electromechanical device that
1398) Most sound boards generate generates data for a computer to read 1439) EDO stands for external data
sounds by using fm synthesis organizer
1418) The first implementation of
1399) Microscope helps you trouble UNIX was developed at Bell Telephone 1440) The number of wires in IDE
shoot PS/2 system Laboratories in the early 1970 Hard Disk cable are 16

1400) General purpose of diagnostic 1419) A connection less protocol is 1441) If the data transfer rate is 150
program run in batch mode more dynamic k/sec then it is called single speed
1462) The processor bus is the throughout the Internet on behalf of
1442) A typical buffer for a CD-ROM communications path way between the browser user.
drives 156 K CPU and immediate support chip
1476) CIO (Chief information officer)
1443) The 2.88 M floppy drives have 1463) VL-bus can move data 32 bit at : The senior executive in a company
36 no of sectors a time responsible for information
management and for delivering IT
1444) 1 MB is equal to 2 (to the 1464) A modem attached to system on services
power of 10 KB) COM ports
1477) Client/server architecture: A
1445) ROM is a primary storage 1465) Horizontal scan refers to the type of network in which computer
device speed at which the electron beam processing is distributed among many
across the screen individual PCs and a more powerful,
1446) The process of loading and central computer clients can share
starting up DOS is called booting 1466) RGB monitor display 80 files and retrieve data stored on the
column text server
1447) The Dos Prompt is mainly C:\>
1467) When transition changes from 1478) Collaborative software:
1448) C:\>ver is used for displaying negative to positive the head would Groupware, such as Lotus Notes or
current version name detect positive voltage spike Microsoft Exchange

1449) Intel 440x ―Natoma‖ is an 1468) Animation means to make still 1479) Computer-Aided design: Refers
example for mother board chipset picture, move and talk like in cartoon to any computer-enabled method of
pictures design also called computer-assisted
1450) Direct memory access channels design.
are used by medium speed 1469) Analogues: The use of a system
communication devices in which the data is of a continuously 1480) Commuter: A group of
variable physical quantity such as electronic device used for performing
1451) The 486 Sx chip is twice as fast voltage or angular person multipurpose tasks
as a 386 Dx with same clock speed
1470) Animation: A simulation of 1481) Channel: It consists of
1452) On a 286 or 386 sx system, the movement created by displaying a controller card, interface cable and
extended memory limits 16M series of pictures or frames power supply

1453) The 385 Dx, 386 CPU have 32 1471) Application means a piece of 1482) CORBA: CORBA is the acronym
address lines software designed to meet a specific for Common Object Request Broker
purpose Architecture
1454) Shared memory does require
16 K of VMA space 1472) Active X is a model for writing 1483) CBT: Computer based training
programs. Active X technology is used
1455) DIMM‘s are 168 pin modules to make interactive Web pages that 1484) Certification: Skills and
look and behave like computer knowledge assessment process
1456) The function of +12V power programs, rather than static pages.
supple is to run disk drive motors and With Active X, users can ask or 1485) Computer Crime: The act of
also cooling fans answer questions, use push buttons, stealing, cheating or otherwise
and interact in other ways with the defrauding an organization with the
1457) SPS generally referred as web page use of a computer
rechargeable batteries
1473) Batch processing is a technique 1486) Cyber café: Café offering
1458) Parallel interface is not the in which a number of similar items or internet browsing facility
interfaces that can be used to connect transactions are processed in groups
the mouse to the computer or batches during a machine run 1487) Cryptography: Method used to
protect privacy and security on the
1459) The mouse interrupts usually 1474) BIS: Bureau of Indian internet
occurs if the system uses a mouse port Standards. It is a national organization
of India to define standards 1488) DBMS: An acronym for the
1460) The video adapter BIOS handles database management system. A
communication between the Video 1475) Browser is a link between the program that maintains and controls
Chipset & Video Ram computer and the internet. It‘s the access to collection of related
actually a program that provides a information in electronic files
1461) Pentium pro CPU‘s have full of way to look in the hand interact with
323, they can track of 44 G of all information on the internet. A 1489) Data: Facts coded and
memory in address lines browser is a client program that uses structured for subsequent processing,
the Hypertext Transfer Protocol (http) generally using a computer system
to make requests of Web servers
1490) Digital signature: Encrypted
signature used for providing security
for the messages/data transferred
through the internet

1491) Digital computer: A device that

manipulates discrete data and
performs arithmetic and logic
operations on these data

1492) Data transmission: The

movement of data from one location of
storage to another. If the locations are
geographically far away, generally
done via satellites.

1493) Disk Mirroring: The data is

written on two or more hard disks
simultaneously over the same channel

1494) Disk Duple Xing: The data is

written on two or more hard disks
simultaneously over the different

1495) Dumb Terminals: Hardware

configuration consisting of a keyboard
and monitor that is capable of sending
and receiving information but has no
memory or processing capabilities.

1496) Download: Process of

transferring a file system from one
system to another

1497) E-commerce: Business

transactions conducted over extranets
or the internet

1498) Enterprise, resource planning:

An integrated system of operation
application combining logistics,
production, contract and order
management, sales forecasting and
financial and HR management

1499) Electronic data interchange

(EDI) : Electronic transmission or
documents through point to point
connections using a set of standard
forms, message and data elements, this
can be via leased lines private
networks or the internet

1500) Data processing: It is a method

concerning with the systematic
recording, arranging, filing,
processing and dissemination of facts
of business