IMPORTANT COMPUTER BITS 3


1.A watch point is associated with debugger
2.A multithreaded program uses multiple processes
3.Time sharing is a mechanism to provide spontaneous interactive use of a computer system by many users in such a way that each user is given the impression that he/she has his/her own computer
4.The typical scheme of memory management used in IBMOS/360 mainframe system was that of multiprogramming with variable number of memory partitions
5.The concepts used for realization of virtual memory are swapping, demand paging and In-line secondary storage
6.Oracle 8i is an example of OORDBMS
7.ALPHA, RIOS, SPARC are examples of RISC Processors
8.The scope of an identifier refers to where in the program an identifier is accessible
9.Hierarchy is not a component of relational database
10.A two-way selection in C++ is the if…else
11.A recursive function executes more efficiently than its iterative counterpart
12.The body of the recursive function contains a statement that causes the same function to execute before completing the last call
13.Variables that are created during program execution are called dynamic variables
14.When destroying a list, we need a delete pointer to deallocate the memory
15.The first character in the ASCII character set is the null character, which is nonprintable
16.A variable for which memory is allocated at block entry and deallocated at block exit is called a static variable
17.Signal to noise ratio compares signal strength to noise level
18.The ability to create new objects from existing objects is known as inheritance
19.Software tools that provide automated support for the systems development process are OLAP tools
20.Applications/Web server tier processes HTTP protocol, scripting tasks, performs calculations, and provides access to data
21.A language used to describe the syntax rules is known as meta language
22.In a preorder traversal, the binary tree is traversed as follows
23.The general syntax of the function prototype of a value returning function is function name (parameter list)
24.Competitive intelligence is the process of gathering enough of the right information in a timely manner and usable form and analyzing it so that it can have a positive impact
25.Tracing values through a sequence is called a play out
26.In a binary tree, each comparison is drawn as a circle, called a node
27.The term used as a measurement of a communication channel’s data capacity is bandwidth
28.In addition to the nature of the problem, the other key factor in determining the best solution method is function
29.An E-R data model solves the problem of presenting huge information system data models is to users and developers
30.In C++, predefined functions are organized into separate libraries
31.The standard protocol (communication rules for exchange of data) of the internet is TCP/IP
32.For efficiency purposes, wherever possible, you should overload operators as member functions
33.Modifying algorithms that change the order of the elements, not their values, are also called modifying algorithms
34.As long as the tables in a relational database share at least one common data attribute, the tables in a relational database can be normalized to provide useful information and reports
35.DBMS is a simple, fourth generation language used for data retrieval
36.An occurrence of an undesirable situation that can be detected during program execution is known a exception
37.A photo of the company headquarters would be an example of the use of a static web page
38.The Pentium processor contains thousands of transistors
39.SOI technology has been successful with reference to SRAM
40.Secondary storage device is needed to print output results
41.Static random access memory does not fall under the category of secondary storage devices
42.Floppy disk is universal, portable and inexpensive but has its own limitation in terms of storage capacity and speed
43.Some physical property of the microscopic area of the disk surface is changed for Recording in common for all types of disks
44.in a disk, each block of data is written into two or more sectors
45.A floppy disk rotates at 100rpm
46.A hard disk has 500 to 1000 tracks or more
47.The storage capacity of a cartridge tape is 400 MB
48.Single density recording is also known as frequency modulation
49.Printer is not an input device
50.The input device that is most closely related to a touch screen is the light pen
51.Laser printer generates characters from a grid of pins
52.The liquid crystal display works on the basis of the relation between polaristion and electric field
53.A COBOL program in source code is not considered to be system software
54.Firmware stored in a hard disk
55.A compiler breaks the source code into a uniform stream of tokens by lexical analysis
56.Sorting of a file tasks is not performed by a file utility program
57.Floppy disk does not generate a hardware interrupt
58.Ada language is associated with real time processing
59.MS DOS is usually supplied on a cartridge tape
60.BREAK is not an internal DOS command
61.Kernel of MS-DOS software resides in ROM
62.The UNIX operating system (available commercially) has been written in C language
63.MS-DOS has better file security system as compared to UNIX
64.UNIX is only a multiprogramming system
65.The UNIX operating system uses three files to do the task mentioned
66.In UNIX, end-of-file is indicated by typing CTRL D
67.Abacus is said to be invented by Chinese
68.An operating system is necessary to work on a computer
69.The first UNIX operating system, as it was in the development stage, was written in the assembly language
70.FAST drivers scientific software packages was developed under contract with NASA
71.LEFT () is not a date function
72.FIF editor is a windows based application
73.Graphics is inserted in frame
74.A language translator is best described as a system software
75.The specification of a floppy is identified by TPI
76.DISC () is not a database function
77.In opening menu of word star C OPTION should be selected for protecting a file
78.The most advanced form of ROM is electronically erasable programmable ROM
79.Secondary storage device is needed to store large volumes of data and programs that exceed the capacity of the main memory
80.MORE sends contents of the screen to an output device
81.NFS stands for N/W file system
82.Main protocol used in internet is TCP/IP
83.We can create a simple web page by using front page express
84.The first line/bar on the word window where the name of the document is displayed is called title bar
85.The clock frequency of a Pentium processor is 50 MHz
86.The input device that is most likely to be used to play computer games is the joystick
87.Linking the program library with main program is not performed by a file utility program
88.The UNIX operating system has been written in C language
89.BIOS of MS-DOS resides in ROM
90.The sector size of a floppy disk varies from 128 bytes to 1024 bytes
91.A program type of errors is flagged by compilers
92.A floppy diskette is organized according to tracks and sectors
93.In word star, the maximum permissible length of search string is 65
94.C is a third generation high level language
95.A CPU has a 16-bit program counter. This means that the CPU can address 64 K memory locations
96.STR () is used for converting a numeric into a character string
97.BASIC language is normally used along with an interpreter
98.In UNIX, open files are shared between the parent and the child
99.In spite of the extra power needed for refreshing. DRAMs are widely used in computers because of its lower cost relatives to SRAMs
100.PIF editor belongs to Main group
101.UM () is not a financial function
102.98/04/12 cannot be used to enter a date
103.Windows is popular because of its being expensive
104.P.ersonal computers currently sold in India have main memories at an entry level in the range of megabytes
105.The unit in CPU or processor, which performs arithmetic and logical operations is ALU
106.RAM is volatile
107.The result of arithmetic and logical operations is stored in an accumulator
108.A small amount of memory included in the processor for high speed access is called cache
109.A bus is an electronic track system
110.co-processor is used to improve the speed of mathematical calculations
111.Intel 80286 belongs to third generation microprocessors
112.A hexadigit can be represented by eight binary bits
113.The number of processes that may running at the same time in a large system can be thousands
114.FORTRAN is a 3GL
115.Root is not an item of the Menu bar
116.Difficult to do what it projects is not considered to be a feature of the spreadsheet
117.While starting the Lotus 1-2-3, the current cell reference is shown at top left hand corner of the screen
118.Bill gates is the chief of Microsoft
119.Excel office assistant can be made to appear by using F1 key and help menu
120.9 per page is the max no of showing positioning of per page handouts
121.Alignment buttons are available on formatting toolbar
122.Pico second is 10(to the power of-9)
123.Logo refers to a computer language
124.The most appropriate command to permanently remove all records from the current table is Zap
125.The efficient and well designed computerized payroll system would be on-line real time system
126.The scripts which are designed to receive value from Web users is CGI script
127.WAIS stands for – wide assumed information section
128.Modem is used for connecting PC using telephone lines
129.Token bus is the most popular LAN protocol for bus topology
130.Manipulating data to create information is known as analysis
131.A separate document form another program sent along with an E-mail message is known as E-mail attachment
132.When you boot up a PC — portions of the operating system are copied from disk into memory
133.Correcting errors in a program is called debugging
134.A word processor would most likely be used to type a biography
135.A database is an organized collection of data about a single entity
136.Fire fox is a web browser
137.Most of the commonly used personal computers/laptops do not have a command key known as turnover
138.Full form of USB is known as Universal serial bus
139.The quickest and easiest way in Word to locate a particular word or phrase in a document is to use the find command
140.Computer sends and receives data in the form of digital signals
141.Icons are graphical objects used to represent commonly used application
142.Most World Wide Web pages contain HTML commands in the language
143.In any window, the maximize button, the minimize button and the close buttons appear on the title bar
144.Checking that a pin code number is valid before it is entered into the system in an example of data validation
145.Windows 95 and windows 98 and Windows NT are known as operating systems
146.Information on a computer is stored as analog data
147.A program that works like a calculator for keeping track of money and making budgets is spreadsheet
148.To take information from one source and bring it to your computer is referred to as download
149.Windows is not a common feature of software applications
150.A toolbar contains buttons and menus that provide quick access to commonly used commands
151.Input device is an equipment used to capture information and commands
152.Most of the commonly available personal computers/laptops have a keyboard popularly known as QWERTY
153.Editing a document consists of reading through the document you’ve created then—correcting your errors
154.Virtual Box is not a famous operating system
155.Junk e-mail is also called spam
156.DOC is the default file extension for all word documents
157..bas, .doc and .htm are examples of extensions
158.Codes consisting of bars or lines of varying widths or lengths that are computer readable are known as a bar code
159.Convenience, speed of delivery, generally and reliability are all considered as the advantages of e-mail
160.E-commerce allows companies to conduct business over the internet
161.The most important or powerful computer in a typical network is network server
162.To make a notebook act as a desktop model, the notebook can be connected to a docking station which is connected to a monitor and other devices
163.Storage that retains its data after the power is turned off is referred to as non-volatile storage
164.Virtual memory is memory on the hard disk that the CPU uses as an extended RAM
165.To move to the beginning of a line of text, press the home key
166.When sending and e-mail, the subject line describes the contents of the message
167.Microsoft is an application suite
168.Information travels between components on the motherboard through bays
169.One advantage of dial-up internet access is it utilizes existing telephone security
170.Network components are connected to the same cable in the star topology
171.Booting checks to ensure the components of the computer are operating and connected properly
172.Control key is used in combination with another key to perform a specific task
173.Scanner will translate images of text, drawings, and photos into digital form
174.Information on a computer is stored as digital data
175.The programs and data kept in main memory while the processor is using them
176.Storage unit provide storage for information and instruction
177.Help menu button exist at start
178.Microsoft company developed MS Office 2000
179.Charles Babbage is called the father of modern computing
180.Data link layer of OSI reference model provides the service of error detection and control to thehighest layer
181.Optical fiber is not a network
182.OMR is used to read choice filled up by the student in common entrance test
183.A network that spreads over cities is WAN
184.File Manager is not a part of a standard office suite
185.A topology of computer network means cabling between PCs
186.In UNIX command “Ctrl + Z” is used to suspend current process or command
187.Word is the word processor in MS Office
188.Network layer of an ISO-OSI reference model is for networking support
189.Telnet helps in remote login
190.MS Word allows creation of .DOC type of documents by default
191.In case of MS-access, the rows of a table correspond to records
192.Record maintenance in database is not a characteristic of E-mail
193.In a SONET system, an add/drop multipliers removes noise from a signal and can also add/remove headers
194.The WWW standard allows grammars on many different computer platforms to show the information on a server. Such programmers are called Web Browsers
195.One of the oldest calculating device was abacus
196.Paint art is not a special program in MS Office
197.Outlook Express is a e-mail client, scheduler, address book
198.The first generation computers had vacuum tubes and magnetic drum
199.Office Assistant is an animated character that gives help in MSOffice
200.Alta Vista has been created by research facility of Digital Electronic corporation of USA
201.We are shifting towards computerization because technologies help in meeting the business objectives
202.Spiders search engines continuously send out that starts on a homepage of a server and pursue all links stepwise
203.Static keys make a network insecure
204.Joy Stick is an input device that cannot be used to work in MS Office
205.Artificial intelligence can be used in every sphere of life because of its ability to think like human beings
206.To avoid the wastage of memory, the instruction length should be of word size which is multiple of character size
207.Electronic fund transfer is the exchange of money from one account to another
208.Format menu in MS Word can be use to change page size and typeface
209.Assembly language programs are written using Mnemonics
210.DMA module can communicate with CPU through cycle stealing
211.A stored link to a web page, in order to have a quick and easy access to it later, is called bookmark
212.B2B type of commerce is characterized by low volume and high value transactions in banking
213.Advanced is not a standard MS Office edition
214.Workstation is single user computer with many features and good processing power
215.History list is the name of list that stores the URL’s of web pages and links visited in past few days
216.FDDI access mechanism is similar to that of IEEE 802.5
217.MS Office 2000 included a full-fledged web designing software are called FrontPage 2000
218.Macintosh is IBM’s microcomputer
219.X.21 is physical level standard for X.25
220.Enter key should be pressed to start a new paragraph in MS Word
221.Main frame is most reliable, robust and has a very high processing power.
222.Formatting of these toolbars allows changing of Fonts and their sizes
223.The ZZ command is used to quit editor after saving
224.The program supplied by VSNL when you ask for internet connection for the e-mail access is pine
225.The convenient place to store contact information for quick, retrieval is address book
226.Digital cash is not a component of an e-wanet
227.For electronic banking, we should ensure the existence and procedures with regard to identification of customers who become members electronically
228.Jon Von Neumann developed stored-program concept
229.Hardware and software are mandatory parts of complete PC system
230.Firewall is used in PC for security
231.Two rollers are actually responsible for movement of the cursor in mouse
232.In case of a virus getting into computer NORTON will help
233.Tour the server room is to be done by the auditor while internet banking services audit
234.Documentation while developing a software for a Bank is required for auditing
235.Water supply has not become computerized
236.Concurrency control in distributed database supports multi-user access
237.Fifth generation computers are knowledge processors
238.Transistors were first used in 2nd generation computers
239.Intelligence is not a characteristic of a computer
240.A camera is an processing machine
241.o protect organization from virus or attacks all mails sent and received should be monitored, all messages should be encrypted, E- mails should be used only for official purpose
242.Internet collects millions of people all over the world
243.A computer based information system is a system in which a computer is used to process data to get information
244.The time between program input and outputs is called execution time
245.Third generations of computers have On-line real time systems
246.MIME is a compressor that packages different formats into SMTP compatible type
247.The earliest software was developed using the waterfall model
248.EDI e- commerce system can handle non monetary documents
249.Collection to tracks on a disk forms spindle
250.A disk where number of sectors are fixed is called hard sectored
251.Half duplex transmission techniques let computer to alternatively send and receive data
252.Multiplexing combines signals from different sources into one and sends on a faster channel
253.Message switcher chooses correct data path for an incoming message and forwards it to relevant line
254.Speech recognition use thermal sensors along with infrared rays for identification
255.Trojan horse are self replicating malicious code independent of the action of the user, but slow down the processor on entering a network
256.Generation of PIN in bank ATM would require PIN entered is encrypted
257.Availability, integrity, confidentiality is most necessary for data to be useful
258.Grid is a supercomputer created by networking many small computers
259.A character that changes its value throughout the program is called variables
260.A program coded in programming is done by assembling
261.In write mode of file existing text is replaced by new one
262.When an organization gives contract for development of a software, it has to give data to the service provider. In such cases, the ownership of data should be with the client/organization that outsource services
263.Under a centralized organization Intranet be an effective networking tools
264.For optical fiber used in point to point transmission, the repeater spacing is 10-100 km
265.Favorites are accessible from the start menu
266.Task pre-emption, task priority and semaphores are not needed by server program from an operation system
267.The objective of multiprogramming operating system is to maximize CPU utilization
268.The environment provided to ASP is based on Client/server
269.HUB is layer1 device, central device, dumb device
270.The UNIX, echi command is used to display the message or value of any variable on the screen
271.QAM is used in high speed modem
272.Frame Relay technique uses connection oriented
273.Bipolar always has a non-zero average amplitude
274.In a SONET system, an add/drop multipliers can remove signals from a path
275.The server on the internet is also known as Host
276.For multiple branching in ‘C’ we use switch statement
277.Web site is a collection of HTML documents, graphic files, audio and video files
278.The first network that initiated the internet was ARPANET
279.In MODEMS a digital signal changes some characteristic of a carrier wave
280.The binary values are represented by two different frequencies in frequency shift keying
281.Messenger mailbox is present in Netscape communicator
282.Switching is a method in which multiple communication devices are connected to one anotherefficiently
283. bridge recognizes addresses of layer 3
284.EPROM is permanent storage device
285.“.TIF” extension name stands for tagged image format
286.The overhead using BRI is 10 percent of the total data rate
287.In programming languages the key word “Void” means it does not return any value when finished
288.The keyboard shortcut to restart your computer is Ctrl + Alt + Del
289.FORTRAN is not a programming language
290.The instruction LOAD A is a one address instruction
291.MS-Excel is also known as spread sheet
292.Manchester encoding is used in Ethernet technology
293.The instruction of a program which is currently being executed are stored in main memory
294.In DOS environment, the command used to save the file is ^Z
295.All high level language uses compiler and interpreter
296.In html coding <p> …… </p> tag is used to display a paragraph
297.In HTML coding, the following attributes color, size, face used in font tag
298.DHTML stands for dynamic hyper text markup language
299.Fiber optics cable supports data rate up to 100 mbps to 2 gbps
300.In Photoshop software we can modify, delete, and edit the image