Type Here to Get Search Results !

1500 Computer Awareness Questions for IBPS & Banking Exams – Part 1 (Q.1–500)

Computer Awareness Questions for IBPS & Banking Exams – Part 1 (Q.1–500)

This is Part 1 of the 1500 Computer Awareness One-Liners designed for IBPS, SBI, RBI, RRB, Insurance and SSC exams. Here are Questions 1–100 with answers in simple one-line format for quick revision.

Part 1 – Computer Awareness Questions (Q.1–500)

  1. The code for a Web page is written using Hypertext Markup language.
  2. The first computers were programmed using Machine language.
  3. A filename is a unique name that you give to a file of information.
  4. This can be another word for program software.
  5. Any data or instruction entered into the memory of a computer is considered as storage.
  6. Which part of the computer displays the work done monitor.
  7. A series of instructions that tells a computer what to do and how to do it is called a program.
  8. Hardware is the part of a computer that one can touch and feel .
  9. The role of a computer sales representative generally is to determine a buyer’s needs and match it to the correct hardware and software.
  10. Supercomputers re fers to the fastest, biggest and most expensive computers.
  11. Executing is the process of carrying out commands.
  12. The rectangular area of the screen that displays a program, data, and or information is a window.
  13. The process of a computer receiving inf ormation from a server on the internet is known as downloading.
  14. Disk drive is the part of the computer helps to store information.
  15. Arithmetic operations include addition, subtraction, multiplication, and division.
  16. A keyboard is the king of input d evice.
  17. An error is known as bug.
  18. A collection of related information sorted and dealt with as a unit is a file.
  19. Sending an e -mail is similar to writing a letter.
  20. IT stands for information technology.
  21. A menu contains commands that can be sele cted.
  22. Plotter, printer, monitor are the group consists of output devices.
  23. Edit menu is selected to cut, copy and paste.
  24. The most important or powerful computer in a typical network is network server.
  25. The primary purpose of software is to turn data into information.
  26. The ability to find an individual item in a file immediately direct access is used.
  27. To make a notebook act as a desktop model, the notebook can be connected to a docking station which is connected to a monitor and other device s.
  28. You can use the tab key to move a cursor across the screen, indent a paragraph.
  29. A collection of related files is called record.
  30. Storage that retains its data after the power is turned off is referred to as non -volatile storage.
  31. Internet i s an example of connectivity.
  32. Testing is the process of finding errors in software code.
  33. A syntax contains specific rules and words that express the logical steps of an algorithm.
  34. Changing an existing document is called the editing documentatio n.
  35. Virtual memory is memory on the hard disk that the CPU uses as an extended RAM.
  36. Computers use the binary number system to store data and perform calculations.
  37. The windows key will launch the start buttons.
  38. To move to the beginning of a li ne of text, press the home key.
  39. When sending an e -mail, the subject lines describe the contents of the message.
  40. Tables, paragraphs and indexes work with when formatting text in word.
  41. TB is the largest unit of storage.
  42. The operating system t ells the computer how to use its components.
  43. When cutting and pasting, the item cut is temporarily stored in clipboard.
  44. The blinking symbol on the computer screen is called the cursor.
  45. Magnetic tape is not practical for applications where data must be quickly recalled because tape is a sequential because tape is a sequential access medium.
  46. Rows and columns are used to organize data in a spread sheet.
  47. When you are working on documentation on PC, the document temporarily stored in flash me mory.
  48. One megabyte equals approximately 1 million bytes.
  49. Information travels between components on the motherboard through buses.
  50. RAM refers to the memory in your computer.
  51. Computer connected to a LAN can share information and or share peri pheral equipment.
  52. Microsoft office is an application suite.
  53. Utilities can handle most system functions that aren’t handled directly by the operating system.
  54. If you receive an e -mail from someone you don’t know then you should delete it without opening it.
  55. A set of instructions telling the computer what to do is called program.
  56. LAN refers to a small single site network.
  57. A collection of programs that controls how your computer system runs and processes information is called operating syst em.
  58. Device drivers are small, special -purpose programs.
  59. Transformation of input into output is performed by the CPU.
  60. Data going into the computer is called input.
  61. Binary choice offer only two options.
  62. To indent the first paragraph of your report, you should use tab key.
  63. Fields are distinct item that don’t have much meaning to you in a given context.
  64. A website address is a unique name that identifies a specific web site on the web.
  65. Modem is an example of a telecommunications device.
  66. A set of computer programs used for a certain function such as word processing is the best definition of a software package.
  67. You can start Microsoft word by using start button.
  68. A blinking symbol on the screen that shows where the next character w ill appear is a cursor.
  69. Highlight and delete is used to remove a paragraph from a report you had written.
  70. Data and time are available on the desktop at taskbar.
  71. A directory within a directory is called sub directory.
  72. Testing is the process of f inding errors in software code.
  73. In Excel, charts are created using chart wizard option.
  74. Microcomputer hardware consists of three basic categories of physical equipment system unit, input/output, memory.
  75. Windows is not a common feature of software applications.
  76. A tool bar contains buttons and menus that provide quick access to commonly used commands.
  77. For creating a document, you use new command at file menu.
  78. Input device is equipment used to capture information and commands.
  79. A programmin g language contains specific rules and words that express the logical steps of an algorithm.
  80. One advantage of dial -up internet access is it utilizes existing telephone security.
  81. Protecting data by copying it from the original source is backup.
  82. Network components are connected to the same cable in the star topology.
  83. Two or more computers connected to each other for sharing information form a network.
  84. A compute checks the database of user name and passwords for a match before granting access.
  85. Computers that are portable and convenient for users who travel are known as laptops.
  86. Spam is the term for unsolicited e -mail.
  87. Utility software type of program controls the various computer parts and allows the user to interact with the computer.
  88. Each cell in a Microsoft office excel document is referred to by its cell address, which is the cell’s row and column labels.
  89. Eight digit binary number is called a byte.
  90. Office LANs that are spread geographically apart on a large scale can be co nnected using a corporate WAN.
  91. Storage is the process of copying software programs from secondary storage media to the hard disk.
  92. The code for a web page is written using Hyper Text Markup Language.
  93. Small application programs that run on a Web pag e and may ensure a form is completed properly or provide animation are known as flash.
  94. In a relational database, table is a data structure that organizes the information about a single topic into rows and columns.
  95. The first computers were programmed using assembly language.
  96. When the pointer is positioned on a hyperlink it is shaped like a hand.
  97. Booting process checks to ensure the components of the computer are operating and connected properly.
  98. Checking the existing files saved on the disk th e user determine what programs are available on a computer.
  99. Special effect used to introduce slides in a presentation are called animation.
  100. Computers send and receive data in the form of digital signals.
  101. Most World Wide Web pages contain HTML co mmands in the language.
  102. Icons are graphical objects used to represent commonly used application.
  103. UNIX is not owned and licensed by a company.
  104. In any window, the maximize button, the minimize button and the close buttons appear on the title bar.
  105. Dial -up Service is the slowest internet connection service.
  106. Every component of your computer is either hardware or software.
  107. Checking that a pin code number is valid before it is entered into the system is an example of data validation.
  108. A compiler translates higher level programs into a machine language program, which is called object code.
  109. The ability to find an individual item in a file immediately direct access.
  110. Computers connected to a LAN can share information and/or share peripheral equipment.
  111. A CD -RW disk can be erased and rewritten.
  112. The two major categories of software include system and application.
  113. Windows 95, Windows 98 and Windows NT are known as operating systems.
  114. Information on a computer is stored a s analog data.
  115. A spread sheet that works like a calculator for keeping track of money and making budgets.
  116. To take information from one source and bring it to your computer is referred to as download.
  117. Each box in a spread sheet is called a cell.
  118. Network components are connected to the same cable in the bus topology.
  119. Two or more computers connected to each other for sharing information form a network.
  120. A computer checks the database of user names and passwords for a match before grantin g access.
  121. Spam is the other name for unsolicited e -mail.
  122. Operating system controls the various computer parts and allows the user to interact with the computer.
  123. Each cell in a Microsoft Office Excel document is referred to by its cell address, which is the cell’s row and column labels.
  124. Download is the process of copying software programs from secondary storage media to the hard disk.
  125. The code for a web page is written using Hypertext Markup Language.
  126. Small application programs that run on a web page and may ensure a form is completed properly or provide animation are known as Flash.
  127. A file is a unique name that you give to a file of information.
  128. For seeing the output, you use monitor.
  129. CDs are of round in shape.
  130. Contro l key is used in combination with another key to perform a specific task.
  131. Scanner will translate images of text, drawings and photos into digital form.
  132. CPU is the brain of the computer.
  133. Something which has easily understood instructions is said to be user friendly.
  134. Information on a computer is stored as digital data.
  135. For creating a document, you use new command at file menu.
  136. The programs and data kept in main memory while the processor is using them.
  137. Ctrl + A command is used to select the whole document.
  138. Sending an e -mail is same as writing a letter.
  139. A Website address is a unique name that identifies a specific website on the web.
  140. Answer sheets in bank PO’s/Clerk’s examinations are checked by using Optical Ma rk Reader.
  141. Electronic data exchange provides strategic and operational business opportunity.
  142. Digital signals used in ISDN have whole number values.
  143. Assembler is language translation software.
  144. Manual data can be put into computer by scanner.
  145. In a bank, after computerization cheques are taken care of by MICR.
  146. The banks use MICR device to minimize conversion process.
  147. Image can be sent over telephone lines by using scanner.
  148. Microchip elements are unique to a smart card.
  149. MS -DOS is a single user operating system.
  150. Basic can be used for scientific and commercial purpose.
  151. All computers can execute machine language programs.
  152. Programs stored in ROM can’t be erased.
  153. Ethernet is used for high speed telecommunications.
  154. IP address can change even if the domain name remains same.
  155. Each directory entry can be of 32 bytes.
  156. With the help of Control + Del a letter can be erased in a word.
  157. Disk can keep maximum data.
  158. FORTRAN is a scientific computer language.
  159. Computer language COBOL is useful for commercial work.
  160. COBOL is a high standard language like English.
  161. In computer the length of a word can be measured by byte.
  162. Byte is the unit of storage medium.
  163. ROM is not a computer language.
  164. Ora cle is a database software.
  165. Sequential circuit is full aid.
  166. Processor is must for computer.
  167. ROM keeps permanent memory.
  168. Screen display is called by windows in lotus.
  169. Pascal is a computer language.
  170. Expanded form of IBM is International business machine.
  171. IC chips are made of silicon.
  172. India’s Silicon Valley situated at Bangalore.
  173. RAM and ROM are the storage devices of computer.
  174. DOS is to create relation between hardware and software.
  175. LOTUS 1 -2-3 is softwar e.
  176. Voice mail is a personal security code for GSM subscribers.
  177. Tables holds actual data in the database.
  178. Trojan is a virus.
  179. Static keys make WEB insecure.
  180. Video signal needs highest bandwidth.
  181. Connectivity means communication betwee n systems.
  182. Controlling is not required for high level language programs before it is executed.
  183. 3 out of three rollers are responsible for the movement of cursor on screen.
  184. Hardware that adds two numbers is arithmetic logical unit.
  185. Data accu racy is not done by modem.
  186. LAN is used for networks setup within a building.
  187. A data communication system requires terminal device, communication channel, protocols.
  188. Most common channel used by networks today is satellite.
  189. Run Time is not a type of error.
  190. A five -digit card attribute used for postal ZIP codes it will be restored as a numeric data.
  191. Computer viruses can be attached to an executable program.
  192. MS -DOS was the first operating system.
  193. The smallest space where information on a hard disk is kept in a cluster.
  194. An information is processed data.
  195. Intelligence is not a characteristic of a computer.
  196. Private key is used to spend a digital signature.
  197. Negative numbers can be represent ed in binary.
  198. VDU is not an essential part of a computer.
  199. The printers are line printer, laser, dot matrix.
  200. Speed of clock of CPU is measured in megahertz.
  201. Cache is not a secondary storage device.
  202. Disk can be used to store sequential fi les and random files.
  203. Windows is not an application.
  204. When taking the output information is produced in hardcopy and/or softcopy form.
  205. Control unit’s function is to decode program instructions.
  206. The most powerful type of computer amongst the following is supercomputer.
  207. GO TO statement is used in C, C++, basic language.
  208. File menu is selected to print.
  209. The name a user assigns to a document is called a filename.
  210. A processor is an electronic device that processes data, converting i t into information.
  211. Control words are words that a programming language has set aside for its own use.
  212. Monitor and printer are the two types of output devices.
  213. To access properties of an object, the mouse technique to use is right -clicking.
  214. An operating system is a program that makes the computer easier to use.
  215. Connections to the internet using a phone line and a modem are called dial -up connections.
  216. To access a mainframe or supercomputer, users often use a terminal.
  217. A flaw in a program that causes it to produce incorrect or inappropriate results is called a bug.
  218. A web site address is a unique name that identifies a specific web site on the web.
  219. Every component of your computer is either hardware or software.
  220. To make t he number pad act as directional arrows, you press the num lock key.
  221. When creating a word -processed document, formatting text involves the user changing how words on the page appear, both on the screen and in printed form.
  222. The ALU performs simple mathematics for the CPU.
  223. A computer program is a set of keywords, symbols, and a system of rules for constructing statements by which humans can communicate the instructions to be executed by a computer.
  224. The another word for program is software.
  225. The name of the computer’s brain is CPU.
  226. A computer is a device that electronically processes data, converting it to information.
  227. Laptops are computers that can be carried around easily.
  228. The secret code that restricts entry to some programs i s password.
  229. The basic goal of computer process is to convert data into information.
  230. The disk is placed in the CPU in a computer.
  231. A hard copy of a document is printed on the printer.
  232. The name that the user gives to a document is referred to as file name.
  233. Restarting a computer that is already on is referred to as warm booting.
  234. E -mail is the transmission of messages and files via a computer network.
  235. The person who writes and tests computer programs is called a programmer.
  236. The in formation you put into the computer is called data.
  237. The output devices make it possible to view or print data.
  238. A chat is a typed conversation that takes place on a computer.
  239. Hardware includes the computer and all the devices connected to it tha t are used to input and output data.
  240. The most common method of entering text and numerical data into a computer system is through the use of a keyboard.
  241. Mouse, keyboard, plotter are the group consist of only input devices.
  242. 256 values can be rep resented by a single byte.
  243. Transformation of input into output is performed by the CPU.
  244. Vertical -market applications can handle most system functions that aren’t handled directly by the operating system.
  245. Device drivers are small, special -purpos e programs.
  246. LAN refers to a small, single -site network.
  247. A set of instructions telling the computer what to do is called program.
  248. Data going into the computer is called input.
  249. If you receive an e -mail from someone you don’t know, then delete it without opening it.
  250. Two options does a binary choice offer.
  251. A collection of programs that controls how you computer system runs and processes information is called operating system.
  252. Rows and columns are data organized in a spreadsheet.
  253. When cutting and pasting, the item cut is temporarily stored in clipboard.
  254. When you are working on a document on a PC, the document is temporarily stored in flash memory.
  255. One megabyte e quals approximately 1 million bytes.
  256. A cluster represents a group of sectors.
  257. Digital signals used in ISDN have discrete values.
  258. Assembler is language translation software.
  259. Manual data can be put into computer by scanner.
  260. Bandwidth mean s channel capacity amount of data following via cables and measure of speed.
  261. Chip can keep maximum data.
  262. Debugging is the process of finding errors in software code.
  263. Time Bomb are viruses that are triggered by the passage of time or on a certai n data.
  264. Linux is an open source operating system.
  265. Boot sector viruses are often transmitted by a floppy disk left in the floppy drive.
  266. Operating system controls the way in which the computer system functions and provides a medium by which users can interact with the computer.
  267. Servers are computers that provide resources to other computers connected to a network.
  268. Field names describe what a data field is.
  269. You must install router on a network if you want to share a broadband internet connection.
  270. A goal of normalization is to minimize the number of redundancy.
  271. Programs from the same developer, sold, bundled, together, that are provide better integration and share common features, tool box and menus are known as software suits.
  272. A data ware house is one that organizes important subject areas.
  273. URL term identifies a specific computer on the web and the main page of the entire site.
  274. A proxy server is used to process client request for web pages.
  275. When data changes in mul tiple list and list are not updated, this causes data inconsistency.
  276. Granting an outside organization access to internet web pages is often implemented using a extranet.
  277. The code that relational database management systems use to perform their database task is refer to as SQL.
  278. URL stands for Uniform resource locator.
  279. A data base management system is a software system used to create, maintain and provide controlled acc ess to a database.
  280. The two broad categories of software are system and application.
  281. The metal or plastic case that holds all the physical parts of the computer is known as system unit.
  282. Data integrity means that the data contained in the databas e is accurate and reliable.
  283. A local area network is a private corporate network used exclusively by company categories.
  284. Eight bits equal to one byte.
  285. A byte can hold one character data.
  286. A characteristic of a file server is manages files ope rations and is shared on a network.
  287. The development process of computer started in 1617.
  288. The role of Blaze Pascal in the development of computer is addition and subtraction of numbers.
  289. The inventor of computer is Charles Babbage.
  290. The IBM ma de the first electronic computer in 1953.
  291. The silicon based transistor started to made by Gordon Tin in 1954.
  292. IBM is a company.
  293. The personal computer invented in 1981.
  294. 1 Kilobyte is equal to 1024 bytes.
  295. LCD means liquid crystal display.
  296. UPS converts DC voltage into AC voltage.
  297. The word ZIP means Zicxac Inline Pin.
  298. With the help of Pal switch we can increase or decrease the speed of computer’s processing.
  299. The full form of MICR is magnetic ink character reader.
  300. Swift ne tworks are used between banks.
  301. Panda is a virus.
  302. Boot sector is hardware.
  303. Debug searches the fault of any software.
  304. OCR means optical character recognition.
  305. The total printout of a program is called listing.
  306. With the help of ZIP we can decrease the size of any programs.
  307. We can format the hard disk with the help of Booting.
  308. CANNED is called as readymade software.
  309. The process of creating third file by mixing two files is called as mail merging.
  310. The f igures and lines etc. made by computer is called as graphics.
  311. Each line represents 65 letters in a WordStar.
  312. Nokia - 7500 is not the example of Micro Processor.
  313. The first name of the digital computer is Unvake.
  314. The modern computer was invent ed in 1946.
  315. The full form of DOS is disk operating system.
  316. The expanded form of FORTRAN is formula translation.
  317. The great revolution came in computer sector in 1960.
  318. Magnetic tape is called as Input device of computer.
  319. The first mechani cal computer of Charles Babbage is known as punch card machine.
  320. The IC chip used in computer is generally made in silicon.
  321. Telephone broadcast is the example of simplex transmission.
  322. Optical, Mechanical are the kinds of mouse.
  323. Control panel is used for increasing and decreasing the speed of the cursor of mouse.
  324. The capacity of modern main frame digital computer is 10(to the power of -12) mbps.
  325. With the help of my computer we can know about the usage and availability of space in compu ter.
  326. We use both MS -Word and page maker for making resume.
  327. Earliest computers that would work with FORTRAN was second generation.
  328. Back Ups in database are maintained for to restore the lost data.
  329. IDEA is a encryption technique.
  330. DBRM tak es care of storage of data in a database.
  331. The job of DBMS is to decrease redundancy.
  332. Digital signatures use encryption for authenticating.
  333. OS acts as intermediary agency between user and hardware.
  334. Plotters gives the highest quality output.
  335. ROM is built in memory in computer.
  336. FLASH is a RAM.
  337. PRAM is not a RAM.
  338. FLASH device is used in cell phones.
  339. Internal storage is same as the primary storage.
  340. IMAC is name of a machine.
  341. First generation computers could do batch p rocessing.
  342. The analytic engine was created by Charles Babbage.
  343. Voicemail of GSM service provider has the personal security code for its subscribers.
  344. Senior manager decided about the division of work with respect to IT security.
  345. Encrypting f ile system of window XP professional operating system protects the data of a user, even if the computer is shared between users.
  346. The .mpeg is the format of a movie file.
  347. Controlling is NOT required for high level language program before it is execu ted.
  348. A plotter is output device.
  349. 80286 is a hardware part of microprocessor.
  350. Top -bottom approach can not be the measure of network traffic.
  351. A switching mode power supply is used for converting raw input power to stabilize DC power.
  352. Spoo ler can manage the whole printing process.
  353. Validity routines control procedures can be used to ensure completeness of data.
  354. Less expensive than leased line networks is not a characteristic of virtual private networks (PVN).
  355. Program policy frame work provides strategic direction to an organization.
  356. Cross bar switches have common control.
  357. Row -level security is the most basic part for database security.
  358. Voice recognition software can not be used for converting text into voice.
  359. The us er account can only be created by the network administrator.
  360. IBM -700 belongs to second generation.
  361. Allocating adequate bandwidth would help her in speeding up the data transfer over net.
  362. BCD means binary coded decimal.
  363. Extended system configuration data is same as BIOS.
  364. Digitizer is an input device.
  365. Caramel is the latest platform of Intel Centrio microprocessor.
  366. RISC is known as storage device.
  367. NORTON is an anti -virus.
  368. The system file of an operating system is COM.
  369. ATMs of bank have real currency.
  370. A program that converts high level language to machine language is assembler.
  371. ‘.txt’ files can be made in notepad, MS word, DOS editor.
  372. .Zip is a compressed file.
  373. Internet is a WAN.
  374. MP3 technology com presses a sound sequence to one -twelfth of its original size.
  375. At a time only one operating system can be at work on a computer.
  376. If multiple programs can be executed at the same time, it is distributed operating system.
  377. If the operating system p rovides quick attention, it is real time operating system.
  378. Distributed operating system uses network facility.
  379. FORMAT command in MS -DOS is used for recreating disk information.
  380. COPY command in MS -DOS is used to copy one or more files in disk dr ive to another, copy from one directory to another directory.
  381. REN command is Internal command.
  382. Tom Burners -Li propounded the concept of “World wide web”.
  383. The memory address sent from the CPU to the main memory over a set of wires is called addr ess bus.
  384. MODEM is an electronic device required the computer to connect to the INTERNET.
  385. A source program is a program which is to be Tran scripted in machine language.
  386. Virus in computer relates to program.
  387. Floppy is not a storage medium in the computer related hardware.
  388. DOS floppy disk does not have a boot record.
  389. The CPU in a computer comprises of Store, arithmetic and logical unit and control unit.
  390. In computer parlor a mouse is a screen saver.
  391. UNIVA is the name of the computer which was first used for programming and playing of music.
  392. The IC chips for computer is prepared from silicon.
  393. Database management systems are comprised of tables that made up of rows called records and columns called fields.
  394. Nano is e qual to 10(to the power of -9).
  395. In computers RAM is a non -volatile memory.
  396. Disk and tape drives are commonly used as hard copy.
  397. When computer is connected to LAN and data is sent across it for storage/processing is online processing.
  398. The pr imary storage unit is also referred to as internal storage.
  399. Oracle is not an operating system.
  400. Data are raw facts and figures.
  401. Holding of all data and instructions to be processed is one of the functions of storage unit.
  402. To select the entir e row in Excel, click mouse at row heading.
  403. Database is known as structured data.
  404. Normal view and outline view notes pane appears in power point.
  405. The user protection feature of an operating system is required in multi -user system only.
  406. In w ord, Ctrl + Del combination of keys press to delete an entire word.
  407. In MS -Word double clicking a word selects the word.
  408. Word document can be navigated in web layout view.
  409. In Excel, addressing mode(s) that can be used in a formula is/are only ab solute and relative.
  410. Note page views can you use to show just the slide and its contents.
  411. Hardware that adds two numbers is arithmetic logical unit.
  412. The computer as a machine and all other physical equipment associated with it are termed as har dware.
  413. Plotters are very useful in applications such as computer aided design.
  414. Corel DRAW is a graphic package.
  415. The print to file option creates .prn file.
  416. The enhanced keyboard contains 101 keys.
  417. Data processing cycle consists of input cycle, output cycle and processing cycle.
  418. Page Setup is not an option of Edit menu.
  419. Radar chart is used to show a correlation between two data series.
  420. A computerized business information system includes hardware, software and data facts.
  421. P urchase order file is a transaction file.
  422. A typical computerized business application system will have both master and transaction file.
  423. Problem identification is taken first in designing a program.
  424. The purpose of the EXIT command is to get out of a condition loop.
  425. Employees details is a master file for the pay roll system.
  426. A slow memory can be connected to 8085 by using READY.
  427. A processor needs software interrupt to obtain system services which need execution of privileged instructi ons.
  428. A CPU has two modes - privileged and non -privileged. In order to change the mode from the privileged to the non -privileged, a software interrupt is needed.
  429. Swap space resides at disk.
  430. The process of assigning load addressed to the various p arts of the program and adjusting the code and data in the program to reflect the assigned address is called relocation.
  431. 1 Sector= 4096 bytes.
  432. Two stacks of size required to implement a queue of size n.
  433. 1 Floppy = 6, 30,784 bytes or 308 KB.
  434. Consider a machine with 64 MB physical memory and a 32 -bit virtual address space. If the page size is 4 KB, then size of the page table is 2 MB.
  435. Consider a virtual memory system with FIFO page replacement policy. For an arbitrary page access pattern, i ncreasing the number of page frames in main memory will always decrease the number of page faults.
  436. Consider a scheme R(A, B, C, D) and functional dependencies A ->B and C -> D. Then the decomposition of R into R1 (AB) and R2 (CD) is dependency preserving and lossless join.
  437. Main memory requires a device driver.
  438. RAM can be divided into 2 types.
  439. Two friends suitably arrange 4 blocks of different colors to exchange coded information between them. 4 bits of information is one exchanging each time.
  440. Cache memory is a part of main memory.
  441. The number 43 in 2’s complement representation is 01010101.
  442. The 8085 microprocessor responds to the presence of an interrupt by checking the TRAP pin for ‘high’ status at the end of each instruction fetch.
  443. All machinery and apparatus of computer is called hardware.
  444. The number 1024 bytes is the complement representation of 1 Kilo byte.
  445. System design specifications do not include blueprint showing the layout of hardware.
  446. Web pages are uniquely identified using URL.
  447. The results of arithmetic and logical operations are stored in an accumulator.
  448. The input device that is closely related to touch screen is the light pen.
  449. F2 keys of control center specified below displays data, toggles br owse/edit.
  450. A compiler breaks the source code into a uniform stream of tokens by lexical analysis.
  451. The number of processes that may running at the same time in a large system can be thousands.
  452. LET.BAS files are related to Microsoft word utility.
  453. A command in UNIX can have one or more arguments.
  454. A hard disk is logically organized according to cylinders and sectors.
  455. A frame can include text & graphics, tables & graphics, graphics.
  456. All the formatting data for the paragraph is stored in the paragraph mark.
  457. The abbreviation CAD stands for computer aided design.
  458. We can define hypertext definition in notebooks using Macsyma 2.0.
  459. The addressing mode(s) that can be used in a formula is/are - absolute, relative and mixed.
  460. WIND OWS can work in enhanced and standard modes.
  461. The part of a machine level instruction which tells the central processor what has to be done is an operation code.
  462. O -Matrix software packages do not have animation capabilities.
  463. In order to paste te xt form the clipboard in the document being edited, press the Ctrl -A key.
  464. A program that converts a high level language program to a set of instructions that can run on a computer is called a compiler.
  465. Faster execution of programs is not an advanta ge of a subroutine.
  466. First generation of computer period is 1945 -1950.
  467. IBM built first PC in the year 1981.
  468. A small computer program embedded within an HTML document when a user retrieves the web page from a web server is called an applet.
  469. A nother name for systems implementation is transformation.
  470. The central host computer or file server in a star network maintains control with its connecting devices through polling.
  471. C++ does not check whether the index value is within scope.
  472. The browser uses uniform resource locator to connect to the location or address of internet resources.
  473. In the centralized computing architecture, the entire file is downloaded from the host computer to the user’s computer in response to a request for data.
  474. An expert system enables one or more users to move and react to what their senses perceive in a computer simulated environment.
  475. Popping or removing an element from an empty stack is called underflow.
  476. The ability to combine data and operations on that data in a single unit is known as polymorphism.
  477. A router is a device that sites between your internal network and the internet and limits access into and out of your network based on your organization’s access policy.
  478. In C++, private, prote cted, and public are reserved words and are called member access specifiers.
  479. The integration of all kinds of media such as audio, video, voice, graphics and text into one coherent presentation combined is called multimedia.
  480. The derived class can re define the public member functions of the base class.
  481. A technique for searching special databases, called data warehouses, looking for related information and patterns is called data mining.
  482. Like the quick sort the merge sort uses the divide and co nquer technique to sort a list.
  483. The use of expert systems technology can greatly reduce the number of calls routed to a customer service department.
  484. Building a list in the backward manner, a new node is always inserted at the beginning of the list.
  485. Creating a web site is also called web authoring.
  486. Using the optimization analysis approach, the expert system starts with a conclusion and tries to verify that the rules, facts, and conclusion all match. If not, the expert system chooses another c onclusion.
  487. Both the application program and operating system program only describes the software.
  488. Root is one of the items given below is not an item of the menu bar.
  489. BACKUP is not an internal command.
  490. In a disk, each block of data is writt en into one sector.
  491. Hard copy is a printed copy of machine output.
  492. A boot strap is a small utilization computer program to start up in inactive computer.
  493. CAD is oriented towards software.
  494. Icons are picture commands.
  495. IBM company for the first time launched pocket computers.
  496. PROM is a computer part.
  497. Algorithms can handle most system functions that aren’t handled directly by the operating system.
  498. Device drivers are small, special -purpose programs.
  499. LAN refers to a small, sing le site network.
  500. A collection of programs that controls how your computer system runs and processes information is called operating system.

Post a Comment

0 Comments