Friday 18 October 2013

Computer Awareness-64

    1.     The term ‘remote’ in  network means
a.       A device that cannot control network functions
b.      Machine located far off
c.       Any peripheral or application located far off
d.      FEP
    2.     Which access control mechanism does security label fit into?
a.       Logical access control 
b.      Discretionary access control
c.       Physical access control 
d.      None of these
    3.     A character that retains its value during program execution is______
a.        Constant 
b.      Variables
c.       Type definitions 
d.      Function

Computer Awareness-65

     1.     When an organization gives contract for development of software; it has to give data to the service provider. In Such cases, the ownership of data should be____
a.       Transferred to the service provider
b.      With the client/organization that outsource services
c.       Shared by both parties
d.      Not transferred
     2.     A modem performs_________
a.       Modulation
b.      Demodulation
c.       Data compression
d.      All of these
     3.     Which of the following is NOT done by modem?
a.       Transmission Speed
b.      Data Accuracy
c.       Error detection and Correction
d.      Data Compression

Friday 11 October 2013

Computer Awareness-63

     1.     The format for the formal presentation of the algorithm Consists of how many parts?
a.       2
b.      3
c.       4
d.      5
     2.     The comments begin with _____and explain the purpose of the instruction.
a.       Single slashes
b.      Double slash
c.        * Sign
d.      None of these
     3.     The assignments statement will use the notation as_________
a.       Set A ¹2
b.       Max¹ai
c.       Set A=3
d.      Int ¹c’

Computer Awareness-62

    1.     Which amongst the following ways can be traversed on linear linked list?
a.        In-order traversal
b.      Reverse-order traversal
c.       Both a & b
d.      None of these
    2.     Traverse the list from the beginning and compare each element of the list with the given element, to be searched is called:
a.       Sorted list
b.      Linear list
c.       Linked list
d.      unsorted list
    3.     In ……………..we need the location of the element & the location of the preceding element.
a.       Auxiliary search
b.      Unsorted search
c.       Sorted search
d.      None of these

Computer Awareness-61

     1.     The command is Append. Which is the correct definition in the following?
a.       Formats screen and printer displays
b.      Allows us to add new data to our data base
c.       A condition is not true
d.      none of the above
     2.     Computer can only perform
a.       several basic operations
b.      two basic operations
c.       three basic operations
d.      none of the above
     3.     Assembly languages also referred to as
a.       low level languages
b.       machine language
c.       high language program
d.      none of the above

Computer Awareness-60

    1.     The default time separator is________
a.       
b.       $
c.      
d.      *
    2.     How many printer can be install at a time?
a.       One 
b.      Two
c.       Three 
d.      None
    3.     A value or set of values is called_______.
a.       File 
b.      Entity 
c.       Data 
d.      Key

Computer Awareness-59

     1.     In Unix, mv command is used to :
a.        View the contents of a file
b.       Change the name of a file
c.       Delete a file
d.      None of these
     2.     Windows XP supports:
a.       Plug & Play
b.       Creating Web pages
c.       Multitasking
d.      All of these
     3.     Memory Management is performed by_____________.
a.       Operating System
b.      Application
c.       Software
d.      None