advertisements

76.  The ability to find an individual item in a file immediately ____ is used.

a

  file allocation table

b

 None of these

c

 sequential access

d

 direct access

e

 directory

Answer & Explanation
Answer : Option D
Explanation :
Direct (Out of sequence or random) access by a computer (CPU) to any memory address of a data storage device, without starting from the first address every time the data needs to be read. A random access data file enables you to read or write information anywhere in the file.

77.  Which of the following is not true ?

a

  Chatting can only be done with a single person

b

 None of these

c

 Chatting is like e-mail

d

 Chatting is an electronic dialogue

e

 Chatting can involve multiple persons

Answer & Explanation
Answer : Option C
Explanation :
Chat refers to real-time communication between two or more users via Computer & Internet. For eg. when talking to someone in chat, any typed text is received by other participants immediately. This is different from other text-based communication such as email where it could be couple of hours, days or weeks to receive a response.

78.  A(n) _____ is text that you want to be printed at the bottom of the pages.

a

  header

b

 endnote

c

 footer

d

 None of these

e

 footnote

Answer & Explanation
Answer : Option C
Explanation :
A footer refers to an area at the bottom of a document page; seperated from the main body of text; that holds data common to several pages. user can edit the footer to change one or all off the footer on each of the pages in a document. The footer may contain the page numbers, data created, copyrights or other information.

79.  An error is also known as

a

  Cursor

b

 Debug

c

 None of these

d

 Bug

e

 Icon

Answer & Explanation
Answer : Option D
Explanation :
A software bug is an error, flaw, failure or fault in a computer program or system that produces an incorrect or unexpected result or causes it to behave in unintended ways.

80.  Which of the following is used to access a file from the computer store?

a

  retrieve

b

 find

c

 file

d

 insert

e

 print

Answer & Explanation
Answer : Option B
Explanation :
Find is command line tool that every Windows user should use to locate documents, files, folders and you can copy them into any folder on your computer. A user can access the files or even content inside a file by using the keyboard shortcut of Ctrl F.

81.  When a file is saved for the first time ______.

a

  it must be given a name to identify it

b

 file name and folder name must be the same

c

 it only needs a name if it is not going to be printed

d

 a copy is automatically printed

e

 it does not need a name

Answer & Explanation
Answer : Option A
Explanation :
When you save a document (or file) for the first time, you will need to mention a name for that document. To do that go to file> Save As. A file name is used to unequally identify a computer file stored in a file system.

82.  Which one of the following would not be considered as a form of secondary storage?

a

  hard disk

b

 floppy disk

c

 flash drive

d

 optical disk

e

 RAM

Answer & Explanation
Answer : Option E
Explanation :
RAM (Random Access Memory) is considered as primary storage. It is also known as main memory since it is the memory where the operating system, application programs, and data in current use are kept so that they can be quickly reached by the computer's processor. RAM is much faster to read from and write to than the forms of secondary storage.

83.  OSI reference model has ____ layers.

a

  7

b

 4

c

 5

d

 8

e

 6

Answer & Explanation
Answer : Option A
Explanation :
The Open System Interconnection (OSI) model defines a networking framework to implement protocols in seven layers. It is a conceptual model that characterizes and standardizes the communication functions of a telecommunication or computing system without regard of their underlying internal structure and technology.

84.  In a database, _____ fields store numbers used to perform calculations.

a

  numeric

b

 None of these

c

 key

d

 alphanumeric

e

 next

Answer & Explanation
Answer : Option A
Explanation :
In a database, you data types to specify the type of data each field can capture. You can enter numbers into the number (numeric) field and then average, sum or perform other calculations with the numbers, eg. you can assign a Test score field a data type of number.

85.  What is the function of Recycle Bin?

a

  Stores Document file

b

 Stores temporary file

c

 Stores deleted file

d

 None of these

e

 Stores corrupted file

Answer & Explanation
Answer : Option C
Explanation :
In computing, the trash (also known as the recycle bin) is temporary storage for files that have been deleted in a file manager by the user, but not yet permanently erased from the file system. Typically, a recycle bin is presented as a special file directory to the user.

86.  To avoid the wastage of memory, the instruction length should be

a

  Of word size which is multiple of character size

b

 Of file size only

c

 Of word size only

d

 None of these

e

 Multiple of character size only

Answer & Explanation
Answer : Option A
Explanation :
Character size is one of the influence on a choice of word size. Before the mid 1960s, characters were most often stored in 6 bits; this allowed no more than 64 characters 80 alphabets were limited to upper case. Since it is efficient in time and space to have the word size be multiple of the character size, word sizes in this period were usually of 6 bits (in binary machines). A common choice then was the 36-bit word.

87.  ________ is a step by step procedure for calculations, data processing and automated reasoning.

a

  None of these

b

 Flow Chart

c

 Program

d

 Algorithm

e

 Mathematical

Answer & Explanation
Answer : Option D
Explanation :
An algorithm is an effctive method expressed as a finite list of well-defined instructions for calculating a function, Starting from an initial state and intial input (perhaps empty), the instructions describe a computation that, when executed, proceeds through a finite number of well-defined successive states, eventually producing output and terminating at a final ending state.

88.  MICR technology is mainly used by banking industry. MICR denotes _______.

a

  Magnetic Ink Character Recognition

b

 Magnetic Ink Computer Reading

c

 Management Ink Check Reading

d

 Magnetic Ink Code Recognition

e

 Magnetic Ink Code Recognition

Answer & Explanation
Answer : Option A
Explanation :
MICR stands for Magnetic Ink Character Recognition. MICR Code is a character-recognition technology used mainly by the banking industry to ease the processing and clearance of cheques and other documents. Unlike barcodes and similar technologies, MICR characters can be read easily by humans.

89.  If the _____ bit in X.25 standard is set to 1, it means that there is more than one packet.

a

  D

b

 Q

c

 None of these

d

 M

e

 P

Answer & Explanation
Answer : Option D
Explanation :
M (or more) data bit, contained within the X.25 data packet, which is sent by layers higher than layer 3 to inform the destination DTE that more data will follow in the next packet. Using the M bit, packets can be logically grouped together to convey a large block of related information.

90.  ________ is a process of dividing the disk into tracks and sector.

a

  Tracking

b

 Crashing

c

 Alloting

d

 Formatting

e

 Naming

Answer & Explanation
Answer : Option D
Explanation :
Disk formatting is a process of dividing a disk into tracks and sectors so that the operating system can store and locate data and information on the disk. It is basically a process of preparing a disk for digital data storage by organizing.
Sponsored Links



Sponsored Links