Computer Awareness Questions for IBPS & Banking Exams – Part 1 (Q.1–500)
This is Part 1 of the 1500 Computer Awareness One-Liners designed for IBPS, SBI, RBI, RRB, Insurance and SSC exams. Here are Questions 1–100 with answers in simple one-line format for quick revision.
Part 1 – Computer Awareness Questions (Q.1–500)
- The code for a Web page is written using Hypertext Markup language.
- The first computers were programmed using Machine language.
- A filename is a unique name that you give to a file of information.
- This can be another word for program software.
- Any data or instruction entered into the memory of a computer is considered as storage.
- Which part of the computer displays the work done monitor.
- A series of instructions that tells a computer what to do and how to do it is called a program.
- Hardware is the part of a computer that one can touch and feel .
- The role of a computer sales representative generally is to determine a buyer’s needs and match it to the correct hardware and software.
- Supercomputers re fers to the fastest, biggest and most expensive computers.
- Executing is the process of carrying out commands.
- The rectangular area of the screen that displays a program, data, and or information is a window.
- The process of a computer receiving inf ormation from a server on the internet is known as downloading.
- Disk drive is the part of the computer helps to store information.
- Arithmetic operations include addition, subtraction, multiplication, and division.
- A keyboard is the king of input d evice.
- An error is known as bug.
- A collection of related information sorted and dealt with as a unit is a file.
- Sending an e -mail is similar to writing a letter.
- IT stands for information technology.
- A menu contains commands that can be sele cted.
- Plotter, printer, monitor are the group consists of output devices.
- Edit menu is selected to cut, copy and paste.
- The most important or powerful computer in a typical network is network server.
- The primary purpose of software is to turn data into information.
- The ability to find an individual item in a file immediately direct access is used.
- To make a notebook act as a desktop model, the notebook can be connected to a docking station which is connected to a monitor and other device s.
- You can use the tab key to move a cursor across the screen, indent a paragraph.
- A collection of related files is called record.
- Storage that retains its data after the power is turned off is referred to as non -volatile storage.
- Internet i s an example of connectivity.
- Testing is the process of finding errors in software code.
- A syntax contains specific rules and words that express the logical steps of an algorithm.
- Changing an existing document is called the editing documentatio n.
- Virtual memory is memory on the hard disk that the CPU uses as an extended RAM.
- Computers use the binary number system to store data and perform calculations.
- The windows key will launch the start buttons.
- To move to the beginning of a li ne of text, press the home key.
- When sending an e -mail, the subject lines describe the contents of the message.
- Tables, paragraphs and indexes work with when formatting text in word.
- TB is the largest unit of storage.
- The operating system t ells the computer how to use its components.
- When cutting and pasting, the item cut is temporarily stored in clipboard.
- The blinking symbol on the computer screen is called the cursor.
- Magnetic tape is not practical for applications where data must be quickly recalled because tape is a sequential because tape is a sequential access medium.
- Rows and columns are used to organize data in a spread sheet.
- When you are working on documentation on PC, the document temporarily stored in flash me mory.
- One megabyte equals approximately 1 million bytes.
- Information travels between components on the motherboard through buses.
- RAM refers to the memory in your computer.
- Computer connected to a LAN can share information and or share peri pheral equipment.
- Microsoft office is an application suite.
- Utilities can handle most system functions that aren’t handled directly by the operating system.
- If you receive an e -mail from someone you don’t know then you should delete it without opening it.
- A set of instructions telling the computer what to do is called program.
- LAN refers to a small single site network.
- A collection of programs that controls how your computer system runs and processes information is called operating syst em.
- Device drivers are small, special -purpose programs.
- Transformation of input into output is performed by the CPU.
- Data going into the computer is called input.
- Binary choice offer only two options.
- To indent the first paragraph of your report, you should use tab key.
- Fields are distinct item that don’t have much meaning to you in a given context.
- A website address is a unique name that identifies a specific web site on the web.
- Modem is an example of a telecommunications device.
- A set of computer programs used for a certain function such as word processing is the best definition of a software package.
- You can start Microsoft word by using start button.
- A blinking symbol on the screen that shows where the next character w ill appear is a cursor.
- Highlight and delete is used to remove a paragraph from a report you had written.
- Data and time are available on the desktop at taskbar.
- A directory within a directory is called sub directory.
- Testing is the process of f inding errors in software code.
- In Excel, charts are created using chart wizard option.
- Microcomputer hardware consists of three basic categories of physical equipment system unit, input/output, memory.
- Windows is not a common feature of software applications.
- A tool bar contains buttons and menus that provide quick access to commonly used commands.
- For creating a document, you use new command at file menu.
- Input device is equipment used to capture information and commands.
- A programmin g language contains specific rules and words that express the logical steps of an algorithm.
- One advantage of dial -up internet access is it utilizes existing telephone security.
- Protecting data by copying it from the original source is backup.
- Network components are connected to the same cable in the star topology.
- Two or more computers connected to each other for sharing information form a network.
- A compute checks the database of user name and passwords for a match before granting access.
- Computers that are portable and convenient for users who travel are known as laptops.
- Spam is the term for unsolicited e -mail.
- Utility software type of program controls the various computer parts and allows the user to interact with the computer.
- Each cell in a Microsoft office excel document is referred to by its cell address, which is the cell’s row and column labels.
- Eight digit binary number is called a byte.
- Office LANs that are spread geographically apart on a large scale can be co nnected using a corporate WAN.
- Storage is the process of copying software programs from secondary storage media to the hard disk.
- The code for a web page is written using Hyper Text Markup Language.
- Small application programs that run on a Web pag e and may ensure a form is completed properly or provide animation are known as flash.
- In a relational database, table is a data structure that organizes the information about a single topic into rows and columns.
- The first computers were programmed using assembly language.
- When the pointer is positioned on a hyperlink it is shaped like a hand.
- Booting process checks to ensure the components of the computer are operating and connected properly.
- Checking the existing files saved on the disk th e user determine what programs are available on a computer.
- Special effect used to introduce slides in a presentation are called animation.
- Computers send and receive data in the form of digital signals.
- Most World Wide Web pages contain HTML co mmands in the language.
- Icons are graphical objects used to represent commonly used application.
- UNIX is not owned and licensed by a company.
- In any window, the maximize button, the minimize button and the close buttons appear on the title bar.
- Dial -up Service is the slowest internet connection service.
- Every component of your computer is either hardware or software.
- Checking that a pin code number is valid before it is entered into the system is an example of data validation.
- A compiler translates higher level programs into a machine language program, which is called object code.
- The ability to find an individual item in a file immediately direct access.
- Computers connected to a LAN can share information and/or share peripheral equipment.
- A CD -RW disk can be erased and rewritten.
- The two major categories of software include system and application.
- Windows 95, Windows 98 and Windows NT are known as operating systems.
- Information on a computer is stored a s analog data.
- A spread sheet that works like a calculator for keeping track of money and making budgets.
- To take information from one source and bring it to your computer is referred to as download.
- Each box in a spread sheet is called a cell.
- Network components are connected to the same cable in the bus topology.
- Two or more computers connected to each other for sharing information form a network.
- A computer checks the database of user names and passwords for a match before grantin g access.
- Spam is the other name for unsolicited e -mail.
- Operating system controls the various computer parts and allows the user to interact with the computer.
- Each cell in a Microsoft Office Excel document is referred to by its cell address, which is the cell’s row and column labels.
- Download is the process of copying software programs from secondary storage media to the hard disk.
- The code for a web page is written using Hypertext Markup Language.
- Small application programs that run on a web page and may ensure a form is completed properly or provide animation are known as Flash.
- A file is a unique name that you give to a file of information.
- For seeing the output, you use monitor.
- CDs are of round in shape.
- Contro l key is used in combination with another key to perform a specific task.
- Scanner will translate images of text, drawings and photos into digital form.
- CPU is the brain of the computer.
- Something which has easily understood instructions is said to be user friendly.
- Information on a computer is stored as digital data.
- For creating a document, you use new command at file menu.
- The programs and data kept in main memory while the processor is using them.
- Ctrl + A command is used to select the whole document.
- Sending an e -mail is same as writing a letter.
- A Website address is a unique name that identifies a specific website on the web.
- Answer sheets in bank PO’s/Clerk’s examinations are checked by using Optical Ma rk Reader.
- Electronic data exchange provides strategic and operational business opportunity.
- Digital signals used in ISDN have whole number values.
- Assembler is language translation software.
- Manual data can be put into computer by scanner.
- In a bank, after computerization cheques are taken care of by MICR.
- The banks use MICR device to minimize conversion process.
- Image can be sent over telephone lines by using scanner.
- Microchip elements are unique to a smart card.
- MS -DOS is a single user operating system.
- Basic can be used for scientific and commercial purpose.
- All computers can execute machine language programs.
- Programs stored in ROM can’t be erased.
- Ethernet is used for high speed telecommunications.
- IP address can change even if the domain name remains same.
- Each directory entry can be of 32 bytes.
- With the help of Control + Del a letter can be erased in a word.
- Disk can keep maximum data.
- FORTRAN is a scientific computer language.
- Computer language COBOL is useful for commercial work.
- COBOL is a high standard language like English.
- In computer the length of a word can be measured by byte.
- Byte is the unit of storage medium.
- ROM is not a computer language.
- Ora cle is a database software.
- Sequential circuit is full aid.
- Processor is must for computer.
- ROM keeps permanent memory.
- Screen display is called by windows in lotus.
- Pascal is a computer language.
- Expanded form of IBM is International business machine.
- IC chips are made of silicon.
- India’s Silicon Valley situated at Bangalore.
- RAM and ROM are the storage devices of computer.
- DOS is to create relation between hardware and software.
- LOTUS 1 -2-3 is softwar e.
- Voice mail is a personal security code for GSM subscribers.
- Tables holds actual data in the database.
- Trojan is a virus.
- Static keys make WEB insecure.
- Video signal needs highest bandwidth.
- Connectivity means communication betwee n systems.
- Controlling is not required for high level language programs before it is executed.
- 3 out of three rollers are responsible for the movement of cursor on screen.
- Hardware that adds two numbers is arithmetic logical unit.
- Data accu racy is not done by modem.
- LAN is used for networks setup within a building.
- A data communication system requires terminal device, communication channel, protocols.
- Most common channel used by networks today is satellite.
- Run Time is not a type of error.
- A five -digit card attribute used for postal ZIP codes it will be restored as a numeric data.
- Computer viruses can be attached to an executable program.
- MS -DOS was the first operating system.
- The smallest space where information on a hard disk is kept in a cluster.
- An information is processed data.
- Intelligence is not a characteristic of a computer.
- Private key is used to spend a digital signature.
- Negative numbers can be represent ed in binary.
- VDU is not an essential part of a computer.
- The printers are line printer, laser, dot matrix.
- Speed of clock of CPU is measured in megahertz.
- Cache is not a secondary storage device.
- Disk can be used to store sequential fi les and random files.
- Windows is not an application.
- When taking the output information is produced in hardcopy and/or softcopy form.
- Control unit’s function is to decode program instructions.
- The most powerful type of computer amongst the following is supercomputer.
- GO TO statement is used in C, C++, basic language.
- File menu is selected to print.
- The name a user assigns to a document is called a filename.
- A processor is an electronic device that processes data, converting i t into information.
- Control words are words that a programming language has set aside for its own use.
- Monitor and printer are the two types of output devices.
- To access properties of an object, the mouse technique to use is right -clicking.
- An operating system is a program that makes the computer easier to use.
- Connections to the internet using a phone line and a modem are called dial -up connections.
- To access a mainframe or supercomputer, users often use a terminal.
- A flaw in a program that causes it to produce incorrect or inappropriate results is called a bug.
- A web site address is a unique name that identifies a specific web site on the web.
- Every component of your computer is either hardware or software.
- To make t he number pad act as directional arrows, you press the num lock key.
- When creating a word -processed document, formatting text involves the user changing how words on the page appear, both on the screen and in printed form.
- The ALU performs simple mathematics for the CPU.
- A computer program is a set of keywords, symbols, and a system of rules for constructing statements by which humans can communicate the instructions to be executed by a computer.
- The another word for program is software.
- The name of the computer’s brain is CPU.
- A computer is a device that electronically processes data, converting it to information.
- Laptops are computers that can be carried around easily.
- The secret code that restricts entry to some programs i s password.
- The basic goal of computer process is to convert data into information.
- The disk is placed in the CPU in a computer.
- A hard copy of a document is printed on the printer.
- The name that the user gives to a document is referred to as file name.
- Restarting a computer that is already on is referred to as warm booting.
- E -mail is the transmission of messages and files via a computer network.
- The person who writes and tests computer programs is called a programmer.
- The in formation you put into the computer is called data.
- The output devices make it possible to view or print data.
- A chat is a typed conversation that takes place on a computer.
- Hardware includes the computer and all the devices connected to it tha t are used to input and output data.
- The most common method of entering text and numerical data into a computer system is through the use of a keyboard.
- Mouse, keyboard, plotter are the group consist of only input devices.
- 256 values can be rep resented by a single byte.
- Transformation of input into output is performed by the CPU.
- Vertical -market applications can handle most system functions that aren’t handled directly by the operating system.
- Device drivers are small, special -purpos e programs.
- LAN refers to a small, single -site network.
- A set of instructions telling the computer what to do is called program.
- Data going into the computer is called input.
- If you receive an e -mail from someone you don’t know, then delete it without opening it.
- Two options does a binary choice offer.
- A collection of programs that controls how you computer system runs and processes information is called operating system.
- Rows and columns are data organized in a spreadsheet.
- When cutting and pasting, the item cut is temporarily stored in clipboard.
- When you are working on a document on a PC, the document is temporarily stored in flash memory.
- One megabyte e quals approximately 1 million bytes.
- A cluster represents a group of sectors.
- Digital signals used in ISDN have discrete values.
- Assembler is language translation software.
- Manual data can be put into computer by scanner.
- Bandwidth mean s channel capacity amount of data following via cables and measure of speed.
- Chip can keep maximum data.
- Debugging is the process of finding errors in software code.
- Time Bomb are viruses that are triggered by the passage of time or on a certai n data.
- Linux is an open source operating system.
- Boot sector viruses are often transmitted by a floppy disk left in the floppy drive.
- Operating system controls the way in which the computer system functions and provides a medium by which users can interact with the computer.
- Servers are computers that provide resources to other computers connected to a network.
- Field names describe what a data field is.
- You must install router on a network if you want to share a broadband internet connection.
- A goal of normalization is to minimize the number of redundancy.
- Programs from the same developer, sold, bundled, together, that are provide better integration and share common features, tool box and menus are known as software suits.
- A data ware house is one that organizes important subject areas.
- URL term identifies a specific computer on the web and the main page of the entire site.
- A proxy server is used to process client request for web pages.
- When data changes in mul tiple list and list are not updated, this causes data inconsistency.
- Granting an outside organization access to internet web pages is often implemented using a extranet.
- The code that relational database management systems use to perform their database task is refer to as SQL.
- URL stands for Uniform resource locator.
- A data base management system is a software system used to create, maintain and provide controlled acc ess to a database.
- The two broad categories of software are system and application.
- The metal or plastic case that holds all the physical parts of the computer is known as system unit.
- Data integrity means that the data contained in the databas e is accurate and reliable.
- A local area network is a private corporate network used exclusively by company categories.
- Eight bits equal to one byte.
- A byte can hold one character data.
- A characteristic of a file server is manages files ope rations and is shared on a network.
- The development process of computer started in 1617.
- The role of Blaze Pascal in the development of computer is addition and subtraction of numbers.
- The inventor of computer is Charles Babbage.
- The IBM ma de the first electronic computer in 1953.
- The silicon based transistor started to made by Gordon Tin in 1954.
- IBM is a company.
- The personal computer invented in 1981.
- 1 Kilobyte is equal to 1024 bytes.
- LCD means liquid crystal display.
- UPS converts DC voltage into AC voltage.
- The word ZIP means Zicxac Inline Pin.
- With the help of Pal switch we can increase or decrease the speed of computer’s processing.
- The full form of MICR is magnetic ink character reader.
- Swift ne tworks are used between banks.
- Panda is a virus.
- Boot sector is hardware.
- Debug searches the fault of any software.
- OCR means optical character recognition.
- The total printout of a program is called listing.
- With the help of ZIP we can decrease the size of any programs.
- We can format the hard disk with the help of Booting.
- CANNED is called as readymade software.
- The process of creating third file by mixing two files is called as mail merging.
- The f igures and lines etc. made by computer is called as graphics.
- Each line represents 65 letters in a WordStar.
- Nokia - 7500 is not the example of Micro Processor.
- The first name of the digital computer is Unvake.
- The modern computer was invent ed in 1946.
- The full form of DOS is disk operating system.
- The expanded form of FORTRAN is formula translation.
- The great revolution came in computer sector in 1960.
- Magnetic tape is called as Input device of computer.
- The first mechani cal computer of Charles Babbage is known as punch card machine.
- The IC chip used in computer is generally made in silicon.
- Telephone broadcast is the example of simplex transmission.
- Optical, Mechanical are the kinds of mouse.
- Control panel is used for increasing and decreasing the speed of the cursor of mouse.
- The capacity of modern main frame digital computer is 10(to the power of -12) mbps.
- With the help of my computer we can know about the usage and availability of space in compu ter.
- We use both MS -Word and page maker for making resume.
- Earliest computers that would work with FORTRAN was second generation.
- Back Ups in database are maintained for to restore the lost data.
- IDEA is a encryption technique.
- DBRM tak es care of storage of data in a database.
- The job of DBMS is to decrease redundancy.
- Digital signatures use encryption for authenticating.
- OS acts as intermediary agency between user and hardware.
- Plotters gives the highest quality output.
- ROM is built in memory in computer.
- FLASH is a RAM.
- PRAM is not a RAM.
- FLASH device is used in cell phones.
- Internal storage is same as the primary storage.
- IMAC is name of a machine.
- First generation computers could do batch p rocessing.
- The analytic engine was created by Charles Babbage.
- Voicemail of GSM service provider has the personal security code for its subscribers.
- Senior manager decided about the division of work with respect to IT security.
- Encrypting f ile system of window XP professional operating system protects the data of a user, even if the computer is shared between users.
- The .mpeg is the format of a movie file.
- Controlling is NOT required for high level language program before it is execu ted.
- A plotter is output device.
- 80286 is a hardware part of microprocessor.
- Top -bottom approach can not be the measure of network traffic.
- A switching mode power supply is used for converting raw input power to stabilize DC power.
- Spoo ler can manage the whole printing process.
- Validity routines control procedures can be used to ensure completeness of data.
- Less expensive than leased line networks is not a characteristic of virtual private networks (PVN).
- Program policy frame work provides strategic direction to an organization.
- Cross bar switches have common control.
- Row -level security is the most basic part for database security.
- Voice recognition software can not be used for converting text into voice.
- The us er account can only be created by the network administrator.
- IBM -700 belongs to second generation.
- Allocating adequate bandwidth would help her in speeding up the data transfer over net.
- BCD means binary coded decimal.
- Extended system configuration data is same as BIOS.
- Digitizer is an input device.
- Caramel is the latest platform of Intel Centrio microprocessor.
- RISC is known as storage device.
- NORTON is an anti -virus.
- The system file of an operating system is COM.
- ATMs of bank have real currency.
- A program that converts high level language to machine language is assembler.
- ‘.txt’ files can be made in notepad, MS word, DOS editor.
- .Zip is a compressed file.
- Internet is a WAN.
- MP3 technology com presses a sound sequence to one -twelfth of its original size.
- At a time only one operating system can be at work on a computer.
- If multiple programs can be executed at the same time, it is distributed operating system.
- If the operating system p rovides quick attention, it is real time operating system.
- Distributed operating system uses network facility.
- FORMAT command in MS -DOS is used for recreating disk information.
- COPY command in MS -DOS is used to copy one or more files in disk dr ive to another, copy from one directory to another directory.
- REN command is Internal command.
- Tom Burners -Li propounded the concept of “World wide web”.
- The memory address sent from the CPU to the main memory over a set of wires is called addr ess bus.
- MODEM is an electronic device required the computer to connect to the INTERNET.
- A source program is a program which is to be Tran scripted in machine language.
- Virus in computer relates to program.
- Floppy is not a storage medium in the computer related hardware.
- DOS floppy disk does not have a boot record.
- The CPU in a computer comprises of Store, arithmetic and logical unit and control unit.
- In computer parlor a mouse is a screen saver.
- UNIVA is the name of the computer which was first used for programming and playing of music.
- The IC chips for computer is prepared from silicon.
- Database management systems are comprised of tables that made up of rows called records and columns called fields.
- Nano is e qual to 10(to the power of -9).
- In computers RAM is a non -volatile memory.
- Disk and tape drives are commonly used as hard copy.
- When computer is connected to LAN and data is sent across it for storage/processing is online processing.
- The pr imary storage unit is also referred to as internal storage.
- Oracle is not an operating system.
- Data are raw facts and figures.
- Holding of all data and instructions to be processed is one of the functions of storage unit.
- To select the entir e row in Excel, click mouse at row heading.
- Database is known as structured data.
- Normal view and outline view notes pane appears in power point.
- The user protection feature of an operating system is required in multi -user system only.
- In w ord, Ctrl + Del combination of keys press to delete an entire word.
- In MS -Word double clicking a word selects the word.
- Word document can be navigated in web layout view.
- In Excel, addressing mode(s) that can be used in a formula is/are only ab solute and relative.
- Note page views can you use to show just the slide and its contents.
- Hardware that adds two numbers is arithmetic logical unit.
- The computer as a machine and all other physical equipment associated with it are termed as har dware.
- Plotters are very useful in applications such as computer aided design.
- Corel DRAW is a graphic package.
- The print to file option creates .prn file.
- The enhanced keyboard contains 101 keys.
- Data processing cycle consists of input cycle, output cycle and processing cycle.
- Page Setup is not an option of Edit menu.
- Radar chart is used to show a correlation between two data series.
- A computerized business information system includes hardware, software and data facts.
- P urchase order file is a transaction file.
- A typical computerized business application system will have both master and transaction file.
- Problem identification is taken first in designing a program.
- The purpose of the EXIT command is to get out of a condition loop.
- Employees details is a master file for the pay roll system.
- A slow memory can be connected to 8085 by using READY.
- A processor needs software interrupt to obtain system services which need execution of privileged instructi ons.
- A CPU has two modes - privileged and non -privileged. In order to change the mode from the privileged to the non -privileged, a software interrupt is needed.
- Swap space resides at disk.
- The process of assigning load addressed to the various p arts of the program and adjusting the code and data in the program to reflect the assigned address is called relocation.
- 1 Sector= 4096 bytes.
- Two stacks of size required to implement a queue of size n.
- 1 Floppy = 6, 30,784 bytes or 308 KB.
- Consider a machine with 64 MB physical memory and a 32 -bit virtual address space. If the page size is 4 KB, then size of the page table is 2 MB.
- Consider a virtual memory system with FIFO page replacement policy. For an arbitrary page access pattern, i ncreasing the number of page frames in main memory will always decrease the number of page faults.
- Consider a scheme R(A, B, C, D) and functional dependencies A ->B and C -> D. Then the decomposition of R into R1 (AB) and R2 (CD) is dependency preserving and lossless join.
- Main memory requires a device driver.
- RAM can be divided into 2 types.
- Two friends suitably arrange 4 blocks of different colors to exchange coded information between them. 4 bits of information is one exchanging each time.
- Cache memory is a part of main memory.
- The number 43 in 2’s complement representation is 01010101.
- The 8085 microprocessor responds to the presence of an interrupt by checking the TRAP pin for ‘high’ status at the end of each instruction fetch.
- All machinery and apparatus of computer is called hardware.
- The number 1024 bytes is the complement representation of 1 Kilo byte.
- System design specifications do not include blueprint showing the layout of hardware.
- Web pages are uniquely identified using URL.
- The results of arithmetic and logical operations are stored in an accumulator.
- The input device that is closely related to touch screen is the light pen.
- F2 keys of control center specified below displays data, toggles br owse/edit.
- A compiler breaks the source code into a uniform stream of tokens by lexical analysis.
- The number of processes that may running at the same time in a large system can be thousands.
- LET.BAS files are related to Microsoft word utility.
- A command in UNIX can have one or more arguments.
- A hard disk is logically organized according to cylinders and sectors.
- A frame can include text & graphics, tables & graphics, graphics.
- All the formatting data for the paragraph is stored in the paragraph mark.
- The abbreviation CAD stands for computer aided design.
- We can define hypertext definition in notebooks using Macsyma 2.0.
- The addressing mode(s) that can be used in a formula is/are - absolute, relative and mixed.
- WIND OWS can work in enhanced and standard modes.
- The part of a machine level instruction which tells the central processor what has to be done is an operation code.
- O -Matrix software packages do not have animation capabilities.
- In order to paste te xt form the clipboard in the document being edited, press the Ctrl -A key.
- A program that converts a high level language program to a set of instructions that can run on a computer is called a compiler.
- Faster execution of programs is not an advanta ge of a subroutine.
- First generation of computer period is 1945 -1950.
- IBM built first PC in the year 1981.
- A small computer program embedded within an HTML document when a user retrieves the web page from a web server is called an applet.
- A nother name for systems implementation is transformation.
- The central host computer or file server in a star network maintains control with its connecting devices through polling.
- C++ does not check whether the index value is within scope.
- The browser uses uniform resource locator to connect to the location or address of internet resources.
- In the centralized computing architecture, the entire file is downloaded from the host computer to the user’s computer in response to a request for data.
- An expert system enables one or more users to move and react to what their senses perceive in a computer simulated environment.
- Popping or removing an element from an empty stack is called underflow.
- The ability to combine data and operations on that data in a single unit is known as polymorphism.
- A router is a device that sites between your internal network and the internet and limits access into and out of your network based on your organization’s access policy.
- In C++, private, prote cted, and public are reserved words and are called member access specifiers.
- The integration of all kinds of media such as audio, video, voice, graphics and text into one coherent presentation combined is called multimedia.
- The derived class can re define the public member functions of the base class.
- A technique for searching special databases, called data warehouses, looking for related information and patterns is called data mining.
- Like the quick sort the merge sort uses the divide and co nquer technique to sort a list.
- The use of expert systems technology can greatly reduce the number of calls routed to a customer service department.
- Building a list in the backward manner, a new node is always inserted at the beginning of the list.
- Creating a web site is also called web authoring.
- Using the optimization analysis approach, the expert system starts with a conclusion and tries to verify that the rules, facts, and conclusion all match. If not, the expert system chooses another c onclusion.
- Both the application program and operating system program only describes the software.
- Root is one of the items given below is not an item of the menu bar.
- BACKUP is not an internal command.
- In a disk, each block of data is writt en into one sector.
- Hard copy is a printed copy of machine output.
- A boot strap is a small utilization computer program to start up in inactive computer.
- CAD is oriented towards software.
- Icons are picture commands.
- IBM company for the first time launched pocket computers.
- PROM is a computer part.
- Algorithms can handle most system functions that aren’t handled directly by the operating system.
- Device drivers are small, special -purpose programs.
- LAN refers to a small, sing le site network.
- A collection of programs that controls how your computer system runs and processes information is called operating system.