COMPUTER PART - TopicsExpress



          

COMPUTER PART VII =========================================== 601) A watch point is associated with debugger 602) A multithreaded program uses multiple processes 603) Time sharing is a mechanism to provide spontaneous interactive use of a computer system by many users in such a way that each user is given the impression that he/she has his/her own computer 604) The typical scheme of memory management used in IBMOS/360 mainframe system was that of multiprogramming with variable number of memory partitions 605) The concepts used for realization of virtual memory are swapping, demand paging and In-line secondary storage 606) Oracle 8i is an example of OORDBMS 607) ALPHA, RIOS, SPARC are examples of RISC Processors 608) The scope of an identifier refers to where in the program an identifier is accessible 609) Hierarchy is not a component of relational database 610) A two-way selection in C++ is the if…else 611) A recursive function executes more efficiently than its iterative counterpart 612) The body of the recursive function contains a statement that causes the same function to execute before completing the last call 613) Variables that are created during program execution are called dynamic variables 614) When destroying a list, we need a delete pointer to deallocate the memory 615) The first character in the ASCII character set is the null character, which is nonprintable 616) A variable for which memory is allocated at block entry and deallocated at block exit is called a static variable 617) Signal to noise ratio compares signal strength to noise level 618) The ability to create new objects from existing objects is known as inheritance 619) Software tools that provide automated support for the systems development process are OLAP tools 620) Applications/Web server tier processes HTTP protocol, scripting tasks, performs calculations, and provides access to data 621) A language used to describe the syntax rules is known as meta language 622) In a preorder traversal, the binary tree is traversed as follows 623) The general syntax of the function prototype of a value returning function is function name (parameter list) 624) Competitive intelligence is the process of gathering enough of the right information in a timely manner and usable form and analyzing it so that it can have a positive impact 625) Tracing values through a sequence is called a play out 626) In a binary tree, each comparison is drawn as a circle, called a node 627) The term used as a measurement of a communication channel’s data capacity is bandwidth 628) In addition to the nature of the problem, the other key factor in determining the best solution method is function 629) An E-R data model solves the problem of presenting huge information system data models is to users and developers 630) In C++, predefined functions are organized into separate libraries 631) The standard protocol (communication rules for exchange of data) of the internet is TCP/IP 632) For efficiency purposes, wherever possible, you should overload operators as member functions 633) Modifying algorithms that change the order of the elements, not their values, are also called modifying algorithms 634) As long as the tables in a relational database share at least one common data attribute, the tables in a relational database can be normalized to provide useful information and reports 635) DBMS is a simple, fourth generation language used for data retrieval 636) An occurrence of an undesirable situation that can be detected during program execution is known a exception 637) A photo of the company headquarters would be an example of the use of a static web page 638) The Pentium processor contains thousands of transistors 639) SOI technology has been successful with reference to SRAM 640) Secondary storage device is needed to print output results 641) Static random access memory does not fall under the category of secondary storage devices 642) Floppy disk is universal, portable and inexpensive but has its own limitation in terms of storage capacity and speed 643) Some physical property of the microscopic area of the disk surface is changed for recording in common for all types of disks 644) In a disk, each block of data is written into two or more sectors 645) A floppy disk rotates at 100rpm 646) A hard disk has 500 to 1000 tracks or more 647) The storage capacity of a cartridge tape is 400 MB 648) Single density recording is also known as frequency modulation 649) Printer is not an input device 650) The input device that is most closely related to a touch screen is the light pen 651) Laser printer generates characters from a grid of pins 652) The liquid crystal display works on the basis of the relation between polaristion and electric field 653) A COBOL program in source code is not considered to be system software 654) Firmware stored in a hard disk 655) A compiler breaks the source code into a uniform stream of tokens by lexical analysis 656) Sorting of a file tasks is not performed by a file utility program 657) Floppy disk does not generate a hardware interrupt 658) Ada language is associated with real time processing 659) MS DOS is usually supplied on a cartridge tape 660) BREAK is not an internal DOS command 661) Kernel of MS-DOS software resides in ROM 662) The UNIX operating system (available commercially) has been written in C language 663) MS-DOS has better file security system as compared to UNIX 664) UNIX is only a multiprogramming system 665) The UNIX operating system uses three files to do the task mentioned 666) In UNIX, end-of-file is indicated by typing CTRL D 667) Abacus is said to be invented by Chinese 668) An operating system is necessary to work on a computer 669) The first UNIX operating system, as it was in the development stage, was written in the assembly language 670) FAST drivers scientific software packages was developed under contract with NASA 671) LEFT () is not a date function 672) FIF editor is a windows based application 673) Graphics is inserted in frame 674) A language translator is best described as a system software 675) The specification of a floppy is identified by TPI 676) DISC () is not a database function 677) In opening menu of word star C OPTION should be selected for protecting a file 678) The most advanced form of ROM is electronically erasable programmable ROM 679) Secondary storage device is needed to store large volumes of data and programs that exceed the capacity of the main memory 680) MORE sends contents of the screen to an output device 681) NFS stands for N/W file system 682) Main protocol used in internet is TCP/IP 683) We can create a simple web page by using front page express 684) The first line/bar on the word window where the name of the document is displayed is called title bar 685) The clock frequency of a Pentium processor is 50 MHz 686) The input device that is most likely to be used to play computer games is the joystick 687) Linking the program library with main program is not performed by a file utility program 688) The UNIX operating system has been written in C language 689) BIOS of MS-DOS resides in ROM 690) The sector size of a floppy disk varies from 128 bytes to 1024 bytes 691) A program type of errors is flagged by compilers 692) A floppy diskette is organized according to tracks and sectors 693) In word star, the maximum permissible length of search string is 65 694) C is a third generation high level language 695) A CPU has a 16-bit program counter. This means that the CPU can address 64 K memory locations 696) STR () is used for converting a numeric into a character string 697) BASIC language is normally used along with an interpreter 698) In UNIX, open files are shared between the parent and the child 699) In spite of the extra power needed for refreshing. DRAMs are widely used in computers because of its lower cost relatives to SRAMs 700) PIF editor belongs to Main group 701) SUM () is not a financial function 702) 98/04/12 cannot be used to enter a date 703) Windows is popular because of its being expensive 704) Personal computers currently sold in India have main memories at an entry level in the range of megabytes 705) The unit in CPU or processor, which performs arithmetic and logical operations is ALU 706) RAM is volatile 707) The result of arithmetic and logical operations is stored in an accumulator 708) A small amount of memory included in the processor for high speed access is called cache 709) A bus is an electronic track system 710) A co-processor is used to improve the speed of mathematical calculations 711) Intel 80286 belongs to third generation microprocessors 712) A hexadigit can be represented by eight binary bits 713) The number of processes that may running at the same time in a large system can be thousands 714) FORTRAN is a 3GL 715) Root is not an item of the Menu bar 716) Difficult to do what it projects is not considered to be a feature of the spreadsheet 717) While starting the Lotus 1-2-3, the current cell reference is shown at top left hand corner of the screen 718) Bill gates is the chief of Microsoft 719) Excel office assistant can be made to appear by using F1 key and help menu 720) 9 per page is the max no of showing positioning of per page handouts 721) Alignment buttons are available on formatting toolbar 722) Pico second is 10(to the power of-9) 723) Logo refers to a computer language 724) The most appropriate command to permanently remove all records from the current table is Zap 725) The efficient and well designed computerized payroll system would be on-line real time system 726) The scripts which are designed to receive value from Web users is CGI script 727) WAIS stands for – wide assumed information section 728) Modem is used for connecting PC using telephone lines 729) Token bus is the most popular LAN protocol for bus topology 730) Manipulating data to create information is known as analysis 731) A separate document form another program sent along with an E-mail message is known as E-mail attachment 732) When you boot up a PC — portions of the operating system are copied from disk into memory 733) Correcting errors in a program is called debugging 734) A word processor would most likely be used to type a biography 735) A database is an organized collection of data about a single entity 736) Fire fox is a web browser 737) Most of the commonly used personal computers/laptops do not have a command key known as turnover 738) Full form of USB is known as Universal serial bus 739) The quickest and easiest way in Word to locate a particular word or phrase in a document is to use the find command 740) Computer sends and receives data in the form of digital signals 741) Icons are graphical objects used to represent commonly used application 742) Most World Wide Web pages contain HTML commands in the language 743) In any window, the maximize button, the minimize button and the close buttons appear on the title bar 744) Checking that a pin code number is valid before it is entered into the system in an example of data validation 745) Windows 95 and windows 98 and Windows NT are known as operating systems 746) Information on a computer is stored as analog data 747) A program that works like a calculator for keeping track of money and making budgets is spreadsheet 748) To take information from one source and bring it to your computer is referred to as download 749) Windows is not a common feature of software applications 750) A toolbar contains buttons and menus that provide quick access to commonly used commands 751) Input device is an equipment used to capture information and commands 752) Most of the commonly available personal computers/laptops have a keyboard popularly known as QWERTY 753) Editing a document consists of reading through the document you’ve created then—correcting your errors 754) Virtual Box is not a famous operating system 755) Junk e-mail is also called spam 756) DOC is the default file extension for all word documents 757) .bas, .doc and .htm are examples of extensions 758) Codes consisting of bars or lines of varying widths or lengths that are computer readable are known as a bar code 759) Convenience, speed of delivery, generally and reliability are all considered as the advantages of e-mail 760) E-commerce allows companies to conduct business over the internet 761) The most important or powerful computer in a typical network is network server 762) To make a notebook act as a desktop model, the notebook can be connected to a docking stationwhich is connected to a monitor and other devices 763) Storage that retains its data after the power is turned off is referred to as non-volatile storage 764) Virtual memory is memory on the hard disk that the CPU uses as an extended RAM 765) To move to the beginning of a line of text, press the home key 766) When sending and e-mail, the subject line describes the contents of the message 767) Microsoft is an application suite 768) Information travels between components on the motherboard through bays 769) One advantage of dial-up internet access is it utilizes existing telephone security 770) Network components are connected to the same cable in the star topology 771) Booting checks to ensure the components of the computer are operating and connected properly 772) Control key is used in combination with another key to perform a specific task 773) Scanner will translate images of text, drawings, and photos into digital form 774) Information on a computer is stored as digital data 775) The programs and data kept in main memory while the processor is using them 776) Storage unit provide storage for information and instruction 777) Help menu button exist at start 778) Microsoft company developed MS Office 2000 779) Charles Babbage is called the father of modern computing 780) Data link layer of OSI reference model provides the service of error detection and control to the highest layer 781) Optical fiber is not a network 782) OMR is used to read choice filled up by the student in common entrance test 783) A network that spreads over cities is WAN 784) File Manager is not a part of a standard office suite 785) A topology of computer network means cabling between PCs 786) In UNIX command “Ctrl + Z” is used to suspend current process or command 787) Word is the word processor in MS Office 788) Network layer of an ISO-OSI reference model is for networking support 789) Telnet helps in remote login 790) MS Word allows creation of .DOC type of documents by default 791) In case of MS-access, the rows of a table correspond to records 792) Record maintenance in database is not a characteristic of E-mail 793) In a SONET system, an add/drop multipliers removes noise from a signal and can also add/remove headers 794) The WWW standard allows grammars on many different computer platforms to show the information on a server. Such programmers are called Web Browsers 795) One of the oldest calculating device was abacus 796) Paint art is not a special program in MS Office 797) Outlook Express is a e-mail client, scheduler, address book 798) The first generation computers had vacuum tubes and magnetic drum 799) Office Assistant is an animated character that gives help in MSOffice 800) Alta Vista has been created by research facility of Digital Electronic corporation of USA 801) We are shifting towards computerization because technologies help in meeting the business objectives 802) Spiders search engines continuously send out that starts on a homepage of a server and pursue all links stepwise 803) Static keys make a network insecure 804) Joy Stick is an input device that cannot be used to work in MS Office 805) Artificial intelligence can be used in every sphere of life because of its ability to think like human beings 806) To avoid the wastage of memory, the instruction length should be of word size which is multiple of character size 807) Electronic fund transfer is the exchange of money from one account to another 808) Format menu in MS Word can be use to change page size and typeface 809) Assembly language programs are written using Mnemonics 810) DMA module can communicate with CPU through cycle stealing 811) A stored link to a web page, in order to have a quick and easy access to it later, is called bookmark 812) B2B type of commerce is characterized by low volume and high value transactions in banking 813) Advanced is not a standard MS Office edition 814) Workstation is single user computer with many features and good processing power 815) History list is the name of list that stores the URL’s of web pages and links visited in past few days 816) FDDI access mechanism is similar to that of IEEE 802.5 817) MS Office 2000 included a full-fledged web designing software are called FrontPage 2000 818) Macintosh is IBM’s microcomputer 819) X.21 is physical level standard for X.25 820) Enter key should be pressed to start a new paragraph in MS Word 821) Main frame is most reliable, robust and has a very high processing power. 822) Formatting of these toolbars allows changing of Fonts and their sizes 823) The ZZ command is used to quit editor after saving 824) The program supplied by VSNL when you ask for internet connection for the e-mail access is pine 825) The convenient place to store contact information for quick, retrieval is address book 826) Digital cash is not a component of an e-wanet 827) For electronic banking, we should ensure the existence and procedures with regard to identification of customers who become members electronically 828) Jon Von Neumann developed stored-program concept 829) Hardware and software are mandatory parts of complete PC system 830) Firewall is used in PC for security 831) Two rollers are actually responsible for movement of the cursor in mouse 832) In case of a virus getting into computer NORTON will help 833) Tour the server room is to be done by the auditor while internet banking services audit 834) Documentation while developing a software for a Bank is required for auditing 835) Water supply has not become computerized 836) Concurrency control in distributed database supports multi-user access 837) Fifth generation computers are knowledge processors 838) Transistors were first used in 2nd generation computers 839) Intelligence is not a characteristic of a computer 840) A camera is an processing machine 841) To protect organization from virus or attacks all mails sent and received should be monitored, all messages should be encrypted, E- mails should be used only for official purpose 842) Internet collects millions of people all over the world 843) A computer based information system is a system in which a computer is used to process data to get information 844) The time between program input and outputs is called execution time 845) Third generations of computers have On-line real time systems 846) MIME is a compressor that packages different formats into SMTP compatible type 847) The earliest software was developed using the waterfall model 848) EDI e- commerce system can handle non monetary documents 849) Collection to tracks on a disk forms spindle 850) A disk where number of sectors are fixed is called hard sectored 851) Half duplex transmission techniques let computer to alternatively send and receive data 852) Multiplexing combines signals from different sources into one and sends on a faster channel 853) Message switcher chooses correct data path for an incoming message and forwards it to relevant line 854) Speech recognition use thermal sensors along with infrared rays for identification 855) Trojan horse are self replicating malicious code independent of the action of the user, but slow down the processor on entering a network 856) Generation of PIN in bank ATM would require PIN entered is encrypted 857) Availability, integrity, confidentiality is most necessary for data to be useful 858) Grid is a supercomputer created by networking many small computers 859) A character that changes its value throughout the program is called variables 860) A program coded in programming is done by assembling 861) In write mode of file existing text is replaced by new one 862) When an organization gives contract for development of a software, it has to give data to the service provider. In such cases, the ownership of data should be with the client/organization that outsource services 863) Under a centralized organization Intranet be an effective networking tools 864) For optical fiber used in point to point transmission, the repeater spacing is 10-100 km 865) Favorites are accessible from the start menu 866) Task pre-emption, task priority and semaphores are not needed by server program from an operation system 867) The objective of multiprogramming operating system is to maximize CPU utilization 868) The environment provided to ASP is based on Client/server 869) HUB is layer1 device, central device, dumb device 870) The UNIX, echi command is used to display the message or value of any variable on the screen 871) QAM is used in high speed modem 872) Frame Relay technique uses connection oriented 873) Bipolar always has a non-zero average amplitude 874) In a SONET system, an add/drop multipliers can remove signals from a path 875) The server on the internet is also known as Host 876) For multiple branching in ‘C’ we use switch statement 877) Web site is a collection of HTML documents, graphic files, audio and video files 878) The first network that initiated the internet was ARPANET 879) In MODEMS a digital signal changes some characteristic of a carrier wave 880) The binary values are represented by two different frequencies in frequency shift keying 881) Messenger mailbox is present in Netscape communicator 882) Switching is a method in which multiple communication devices are connected to one another efficiently 883) A bridge recognizes addresses of layer 3 884) EPROM is permanent storage device 885) “.TIF” extension name stands for tagged image format 886) The overhead using BRI is 10 percent of the total data rate 887) In programming languages the key word “Void” means it does not return any value when finished 888) The keyboard shortcut to restart your computer is Ctrl + Alt + Del 889) FORTRAN is not a programming language 890) The instruction LOAD A is a one address instruction 891) MS-Excel is also known as spread sheet 892) Manchester encoding is used in Ethernet technology 893) The instruction of a program which is currently being executed are stored in main memory 894) In DOS environment, the command used to save the file is ^Z 895) All high level language uses compiler and interpreter 896) In html coding …… tag is used to display a paragraph 897) In HTML coding, the following attributes color, size, face used in font tag 898) DHTML stands for dynamic hyper text markup language 899) Fiber optics cable supports data rate up to 100 mbps to 2 gbps 900) In Photoshop software we can modify, delete, and edit the image 901) Most common channel used by networks today is telephone lines 902) Sybase SQL server and Microsoft SQL server 7.0 is not an example of RDBMS 903) In programming language, Null point is used to tell end of linked list 904) A technique which collects all deleted space onto free storage list is called garbage collection 905) Node to node delivery of the data unit is the responsibility of the data link layer 906) Insulating material is the major factor that makes co axial cable less susceptible to noise than twisted pair cable 907) A data communication system covering an area the size of a town or city is MAN 908) Virtual memory system allows the employment of the full address space 909) The basic circuit of ECL supports the OR-NOR logic 910) Micro instructions are kept in control store 911) In HTML coding no shade attribute of HR tag suppresses the shading effect and fields a solid line 912) Internet domains are classified by their functions. In that regard “” represents commercial 913) HTTP in URL stands for hyper text transfer protocol 914) The “Nyquist theorem” specifies the minimum sampling rate to be twice the bandwidth of a signal 915) Memory allocation at the routine is known as dynamic memory allocation 916) In HTML loading, tag is used for displaying a new line 917) HTTP protocols are used by internet mail 918) A policy on firewalls needs not ensure that it is logically secured 919) The script which is designed to receive value from the web users is java script 920) GET method and HEAD method is the C91 method of involving a C91 program 921) Analog switched line telephone service is least expensive 922) A toll used to find a synonym or antonym for a particular word is thesaurus 923) In C++ coding, Coutoutput would append a file called test to the end of a file called output 983) In a network with 25 computers, mesh topology would require the more extensive cabling 984) Dialog control is a function of the presentation layer 985) The program which takes user input, interprets it and takes necessary action is shell 986) Most appropriate data structure in C to represent linked list is array 987) Menu bar is usually located below that title bar that provides categorized options 988) Latest version of Microsoft Word is Word XP 989) You save your computer files on disc and in folders 990) when the text automatically goes onto the next line this is called word wrap 991) WYSIWYG is short for what you see is what you get 992) Left justify is the same as align left 993) To put text on the right of the page use the align right button 994) Lotus 1-2-3 is a popular DOS based spreadsheet package 995) 65,535 characters can be typed in a single cell in excel 996) Comments put in cells are called cell tip 997) Getting data from a cell located in a different sheet is called referencing 998) A numeric value can be treated as a label value if it precedes with apostrophe 999) Data can be arranged in a worksheet in an easy to understand manner using auto formatting, applying styles, changing fonts
Posted on: Thu, 25 Dec 2014 16:55:35 +0000

Trending Topics



Recently Viewed Topics




© 2015