76. The ability to find an individual item in a file immediately ____ is used.
Answer : Option D |
Explanation : |
Direct (Out of sequence or random) access by a computer (CPU) to any memory address of a data storage device, without starting from the first address every time the data needs to be read. A random access data file enables you to read or write information anywhere in the file. |
77. Which of the following is not true ?
Answer : Option C |
Explanation : |
Chat refers to real-time communication between two or more users via Computer & Internet. For eg. when talking to someone in chat, any typed text is received by other participants immediately. This is different from other text-based communication such as email where it could be couple of hours, days or weeks to receive a response. |
78. A(n) _____ is text that you want to be printed at the bottom of the pages.
Answer : Option C |
Explanation : |
A footer refers to an area at the bottom of a document page; seperated from the main body of text; that holds data common to several pages. user can edit the footer to change one or all off the footer on each of the pages in a document. The footer may contain the page numbers, data created, copyrights or other information. |
79. An error is also known as
Answer : Option D |
Explanation : |
A software bug is an error, flaw, failure or fault in a computer program or system that produces an incorrect or unexpected result or causes it to behave in unintended ways. |
80. Which of the following is used to access a file from the computer store?
Answer : Option B |
Explanation : |
Find is command line tool that every Windows user should use to locate documents, files, folders and you can copy them into any folder on your computer. A user can access the files or even content inside a file by using the keyboard shortcut of Ctrl F. |
81. When a file is saved for the first time ______.
Answer : Option A |
Explanation : |
When you save a document (or file) for the first time, you will need to mention a name for that document. To do that go to file> Save As. A file name is used to unequally identify a computer file stored in a file system. |
82. Which one of the following would not be considered as a form of secondary storage?
Answer : Option E |
Explanation : |
RAM (Random Access Memory) is considered as primary storage. It is also known as main memory since it is the memory where the operating system, application programs, and data in current use are kept so that they can be quickly reached by the computer's processor. RAM is much faster to read from and write to than the forms of secondary storage. |
83. OSI reference model has ____ layers.
Answer : Option A |
Explanation : |
The Open System Interconnection (OSI) model defines a networking framework to implement protocols in seven layers. It is a conceptual model that characterizes and standardizes the communication functions of a telecommunication or computing system without regard of their underlying internal structure and technology. |
84. In a database, _____ fields store numbers used to perform calculations.
Answer : Option A |
Explanation : |
In a database, you data types to specify the type of data each field can capture. You can enter numbers into the number (numeric) field and then average, sum or perform other calculations with the numbers, eg. you can assign a Test score field a data type of number. |
85. What is the function of Recycle Bin?
Answer : Option C |
Explanation : |
In computing, the trash (also known as the recycle bin) is temporary storage for files that have been deleted in a file manager by the user, but not yet permanently erased from the file system. Typically, a recycle bin is presented as a special file directory to the user. |
86. To avoid the wastage of memory, the instruction length should be
Answer : Option A |
Explanation : |
Character size is one of the influence on a choice of word size. Before the mid 1960s, characters were most often stored in 6 bits; this allowed no more than 64 characters 80 alphabets were limited to upper case. Since it is efficient in time and space to have the word size be multiple of the character size, word sizes in this period were usually of 6 bits (in binary machines). A common choice then was the 36-bit word. |
87. ________ is a step by step procedure for calculations, data processing and automated reasoning.
Answer : Option D |
Explanation : |
An algorithm is an effctive method expressed as a finite list of well-defined instructions for calculating a function, Starting from an initial state and intial input (perhaps empty), the instructions describe a computation that, when executed, proceeds through a finite number of well-defined successive states, eventually producing output and terminating at a final ending state. |
88. MICR technology is mainly used by banking industry. MICR denotes _______.
Answer : Option A |
Explanation : |
MICR stands for Magnetic Ink Character Recognition. MICR Code is a character-recognition technology used mainly by the banking industry to ease the processing and clearance of cheques and other documents. Unlike barcodes and similar technologies, MICR characters can be read easily by humans. |
89. If the _____ bit in X.25 standard is set to 1, it means that there is more than one packet.
Answer : Option D |
Explanation : |
M (or more) data bit, contained within the X.25 data packet, which is sent by layers higher than layer 3 to inform the destination DTE that more data will follow in the next packet. Using the M bit, packets can be logically grouped together to convey a large block of related information. |
90. ________ is a process of dividing the disk into tracks and sector.
Answer : Option D |
Explanation : |
Disk formatting is a process of dividing a disk into tracks and sectors so that the operating system can store and locate data and information on the disk. It is basically a process of preparing a disk for digital data storage by organizing. |