Question # 1
Printf() is a
Choose an answer
Built-in function
User-defined function
Local function
Keyword
Previous
Skip
Next
Question # 2
If we write an entire if-else construct within either the body of the if statement or the body of an else statement this is called
Choose an answer
Dangling else
Multiple statement with if-else
Nested 1-else
Switch statments
Previous
Skip
Next
Question # 3
In case of programing when you want to do something a fixed number of times then which of the following statement is used?
Choose an answer
For statement
While statement
Do-while statement
Continue statement
Previous
Skip
Next
Question # 4
To display a static picture on form or report which of the following control is used?
Choose an answer
Sub form
Sub report
Image
Label
Previous
Skip
Next
Question # 5
This LAN access method that allows multiple devices to talk at once and a protocol determines which device receives priority
Choose an answer
CSMA/CD
CSMA/CS
CSMA/CR
None of the above
Previous
Skip
Next
Question # 6
Turbo C++ can compile
Choose an answer
C++ programs only
C and C++ programs
Turbo C programs only
Turbo C++ programs only
Previous
Skip
Next
Question # 7
A,,,,,,,,,,,,,,,,is a series of declarations and statements surrounded by braces.
Choose an answer
Compound statement
If statement
If-else statement
Switch statement
Previous
Skip
Next
Question # 8
Comma operator is also called
Choose an answer
Update operator
Sequential evaluation operator
Unary operator
None
Previous
Skip
Next
Question # 9
How many are basix layouts ______of forms in Microsoft Access
Choose an answer
2
3
4
5
Previous
Skip
Next
Question # 10
Displays OLE objects such as a series of images which of the following toolbox is used
Choose an answer
Unbound object form
Found object form
Sub form
Option group
Previous
Skip
Next
Question # 11
The method of reading characters written in magnetized ink is:
Choose an answer
Bar-code reader
MICR
OMR
OCR
Previous
Skip
Next
Question # 12
,,,,,,,,,,,,,,is used to separate the three parts of the loop expression in a for loop
Choose an answer
:
;
"
|
Previous
Skip
Next
Question # 13
Accidental data loss may be prevented by using a (n):
Choose an answer
Password
Antivirus programs
UPS
All of the above
Previous
Skip
Next
Question # 14
Which of the following package is used by the application programmer in order to write a program?
Choose an answer
Low Level Language
High Level Language
Machine Language
Assembly Language
Previous
Skip
Next
Question # 15
The shortcut key ALT+ ESC is used to
Choose an answer
Switch between open item
Cycle through items in the order they were opened
Cycle through screen elements in a window
None of the above
Previous
Skip
Next
Question # 16
The information contained in this type of memory is lost power is switched off:
Choose an answer
Disk Memory
Read only memory
Random access memory
Magnetic memory
Previous
Skip
Next
Question # 17
When Word is in overtype mode
Choose an answer
OVR appears in the status bar
The pointer changes to an X shape
The title bar blinks as a warming
The insertion point becomes a dotted bar
Previous
Skip
Next
Question # 18
In relational database a table is also called is
Choose an answer
Tuple
Relation
File
Schema
Previous
Skip
Next
Question # 19
A fire pointer is a(n),,,,,,,,,,,of type File that is defined in stdio.h.
Choose an answer
String
Constant
Variable
Array
Previous
Skip
Next
Question # 20
Which of the following can be passed to a function via arguments?
Choose an answer
Constants
Variables (with values)
Expressions
Preprocessor directives
Previous
Skip
Next
Question # 21
Change case command is found in the
Choose an answer
Edit menu
Format menu
File menu
Insert menu
Previous
Skip
Next
Question # 22
If block is called
Choose an answer
The group of if and else statement
The group of statements after the if up to and not including the else
The group of statements after the else up to and not including the if
All the above
Previous
Skip
Next
Question # 23
A software used for data compression is called:
Choose an answer
Zip disk
Norton Antivirus
Winzip
Dr. Solomon Toolkit
Previous
Skip
Next
Question # 24
Which of the following operating system is a GUI operating system:
Choose an answer
Windows
Linux
Solaris
All of the above
Previous
Skip
Next
Question # 25
Conditional operators are
Choose an answer
Unary operator
Binary operator
Ternary operator
None
Previous
Skip
Next
Question # 26
Which of the following key is used to save a file?
Choose an answer
F2
F3
F4
F9
Previous
Skip
Next
Question # 27
Each attribute of an entity set has a particular value The set of possible values that a given attribute can take is called its
Choose an answer
Range
Domain
Relationship
Association
Previous
Skip
Next
Question # 28
Another name for antivirus is
Choose an answer
Vaccine
Worm
Trojan horse
DES
Previous
Skip
Next
Question # 29
When you change tab setting or indents on the ruler key they affect
Choose an answer
The entire document
The paragraph at the top of the screen
The selected paragraph
All paragraphs after the insertion point
Previous
Skip
Next
Question # 30
In Access the insertion is possible with which of the following
Choose an answer
Columns only
Rows only
Title
Columns and rows
Previous
Skip
Next
Question # 31
Which of the following keys does not hold uniqueness property?
Choose an answer
Candidate key
Foreign key
Primary key
Secondary key
Previous
Skip
Next
Question # 32
What is the most common computer crime?
Choose an answer
Illegal transfer of bank funds
Unauthorized access to personal databases
Sending junk mails
Software piracy
Previous
Skip
Next
Question # 33
A user graphical objects to perform different tasks in this operating system
Choose an answer
DOS
Unix
Linux
All of the above
Previous
Skip
Next
Question # 34
Data processing is also called
Choose an answer
Crunching
Computing
Informing
All of the above
Previous
Skip
Next
Question # 35
23 is an integer and would occupy two bytes whereas 23L is a integer and would occupy
Choose an answer
Two bytes
Three bytes
Four bytes
Six bytes
Previous
Skip
Next
Question # 36
Which of the following special symbol is used within a variable?
Choose an answer
+
@
-
%
Previous
Skip
Next
Question # 37
Information is stored with
Choose an answer
Maximum repetitions
Minimum repetitions
Repetitions
None of these
Previous
Skip
Next
Question # 38
Which of the following is correct for data in a database system?
Choose an answer
Inconsistent
Redundant
Integrated
Normal
Previous
Skip
Next
Question # 39
The method by way of which we can repeat a part of program is
Choose an answer
Using a for statement
Using a do-while statement
Using a while statement
Using a if-then-else statement
Previous
Skip
Next
Question # 40
The topology in which all nodes are connected to a central wire is called
Choose an answer
Bus topology
Ring topology
Star topology
Mesh topology
Previous
Skip
Next
Question # 41
Remak RX 32 three-axis servo robot fits machine up to
Choose an answer
100 tons
200 tons
300 tons
400 tons
Previous
Skip
Next
Question # 42
Data communication requires a
Choose an answer
Sender
Receiver
Medium
All of the above
Previous
Skip
Next
Question # 43
The software that is available free of cost is called:
Choose an answer
Shareware
Freeware
Firmware
Copyright
Previous
Skip
Next
Question # 44
Ram stands for
Choose an answer
Random Access memory
Rechargeable Access memory
Randomly Active memory
Rapid Access Memory
Previous
Skip
Next
Question # 45
A binary stream is a sequence of bytes with a.....................correspondence to those on the external devices
Choose an answer
One-to-many
Many-to-many
Many-to-one
One-to-one
Previous
Skip
Next
Question # 46
Which of the following is the most common protocol used for E-mail?
Choose an answer
FTP
POP
SMTP
Jpeg
Previous
Skip
Next
Question # 47
Which of the following data model is more flexible?
Choose an answer
Network data model
Hierarchical data model
Relational data model
Object data model
Previous
Skip
Next
Question # 48
An operating system performs:
Choose an answer
File-system management
Hardware management
User interface
All of the above
Previous
Skip
Next
Question # 49
Registers are located inside
Choose an answer
ROM
RAM
CPU
All of the above
Previous
Skip
Next
Question # 50
Which of the following is not a communication media?
Choose an answer
VSAT
Fiber-optic cable
Satellite
Terminal
Previous
Skip
Next
Question # 51
The output of printer is called
Choose an answer
Hard copy
Graphics
Multimedia
None of these
Previous
Skip
Next
Question # 52
This layer is the OSI model provides network services to user applications
Choose an answer
Physical
Transport
Application
Presentation
Previous
Skip
Next
Question # 53
Which of the following toolbox is used for attention = getting graphic effects?
Choose an answer
Line
Label
Select object
Rectangle
Previous
Skip
Next
Question # 54
Which of the following functions is used to write a string to a file?
Choose an answer
Puts()
Pute()
fputs()
fgets()
Previous
Skip
Next
Question # 55
Microsoft Access saves the database with the extension
Choose an answer
.mdb
.msdb
.madb
None of these
Previous
Skip
Next
Question # 56
The data transmission mode in which data flows in one direction only is
Choose an answer
SImplex
Half-duplex
Full-duplex
None of the above
Previous
Skip
Next
Question # 57
A multiple statement while loop is terminated with a
Choose an answer
Right brace
Right bracket
Coma
Semicolon
Previous
Skip
Next
Question # 58
Which of the following is correct?
Choose an answer
Sort unsigned int 1
Unsigned int I
Unsigned I
Previous
Skip
Next
Question # 59
A modem
Choose an answer
Converts analog signals into digital signals
Converts digital signals into analog signals
Connects a computer in a LAN
Both a and b above
Previous
Skip
Next
Question # 60
Which of the following object is used to retrieve from database and present in a formatted way?
Choose an answer
Report
Form
Table
Query
Previous
Skip
Next
Question # 61
Which of the following is not a function of the CPU in the computer system?
Choose an answer
Performing logical operation
Performing arithmetic operation
Thinking
Controlling
Previous
Skip
Next
Question # 62
Data base is a collection of
Choose an answer
Data
Information
Files
All of these
Previous
Skip
Next
Question # 63
In 3NF which form of dependency is removed?
Choose an answer
Functional
Non-functional
Associative
Transitive
Previous
Skip
Next
Question # 64
How many are the layouts of report?
Choose an answer
2
3
4
5
Previous
Skip
Next
Question # 65
When more than one attributes act as primary key then each is called
Choose an answer
Foreign key
Secondary key
Concatenated key
Composite key
Previous
Skip
Next
Question # 66
The expression in define directive
Choose an answer
Can only be changed at the end of the program
Cannot be changed
Cannot be changed but can be redefine
Previous
Skip
Next
Question # 67
In new column description field is
Choose an answer
Optional
Must
Temporary
Permanent
Previous
Skip
Next
Question # 68
Which of the following function keys is used to choose GOTO command?
Choose an answer
F3
F4
F5
F6
Previous
Skip
Next
Question # 69
C language came into existence in the year
Choose an answer
1971
1957
1972
Previous
Skip
Next
Question # 70
The data in table is entered in
Choose an answer
Design view
normal view
Datasheet view
Layout view
Previous
Skip
Next
Question # 71
The initialize expression and increment expression are contained in the loop expression in a
Choose an answer
While loop
For loop
Do-while loop
Mathematical while loop
Previous
Skip
Next
Question # 72
An input device that has a ball on its bottom that is rolled on a flat surface is called
Choose an answer
Trackball
Mouse
Touch pad
Digitizing/graphic table
Previous
Skip
Next
Question # 73
Integrity of data means data is
Choose an answer
Efficient
Redundant
Correct
Complete
Previous
Skip
Next
Question # 74
In database data exists only in the form of
Choose an answer
Files
Records
Data item
Tables
Previous
Skip
Next
Question # 75
C was designed to write programs for
Choose an answer
Windows operating system
Solaris operating system
Unix operating system
OS/2 operating system
Previous
Skip
Next
Question # 76
A computer bus is
Choose an answer
A register
Parallel metal lines
ALU and CU
A computer clock
Previous
Skip
Next
Question # 77
To open help window you will:
Choose an answer
Select help from start menu
Press F1 key anywhere on the Desktop
A or B
Previous
Skip
Next
Question # 78
The escape sequence for backslash is
Choose an answer
\
\b
\\
\ t
Previous
Skip
Next
Question # 79
The keyboard shortcut for decreasing font size is:
Choose an answer
SHIFT + <
CTRL + SHIFT +<
ALT + SHIFT + <
CTRL + ALT + <
Previous
Skip
Next
Question # 80
To execute UNDO command you should:
Choose an answer
Press CTRL + Z
Select UNDO from the Edit menu
Click UNDO icon on the standard toolbar
Any of the above
Previous
Skip
Next
Question # 81
Which of the following object of database is used to retrieve data from database?
Choose an answer
Queries
Forms
Reports
Tables
Previous
Skip
Next
Question # 82
Which of the following function allows us to enter the data from the keyboard
Choose an answer
Printf()
Scanf()
Getch()
Getche()
Previous
Skip
Next
Question # 83
All of the following are true of the simplex mode except
Choose an answer
A sender can only send signals
It is the most commonly used communication mode
Receiver can only receiver signals
Previous
Skip
Next
Question # 84
The output of a query is the form of
Choose an answer
Table
Reports
Files
Forms
Previous
Skip
Next
Question # 85
Which of the following is not a pointing device?
Choose an answer
Pointing stick
OCR
Touch screen
Light pen
Previous
Skip
Next
Question # 86
If scanf function (&) represented as
Choose an answer
Relational operator
Logical operator
Address operator
Precedence operator
Previous
Skip
Next
Question # 87
Access IDE is a (an)
Choose an answer
Program
Interface
Database
Database problems
Previous
Skip
Next
Question # 88
In a table cursor is moved to next field by
Choose an answer
Single click
Double click
Esc key
Enter key
Previous
Skip
Next
Question # 89
In b = 6.6/a+(2*a+(3*c)/a*d)/(2/n): which operation will be performed first
Choose an answer
6.6/a
2*a
3 * c
2 /n
Previous
Skip
Next
Question # 90
Database development process involves mapping of conceptual data model into:
Choose an answer
Object oriented data model
Network data model
Implementation model
Hierarchical data model
Previous
Skip
Next
Question # 91
The protocol developed by IBM for its mainframe computers is named
Choose an answer
De facto
SNA
X.25
De hure
Previous
Skip
Next
Question # 92
Word saves files with this file extension:
Choose an answer
.txt
.wp
.doc
.bak
Previous
Skip
Next
Question # 93
The virus attach itself to file which have the extension
Choose an answer
.exe
.com
.dll
Any of the above
Previous
Skip
Next
Question # 94
The keyboards shortcut to delete a selected item permanently without placing the item in the recycle bin is
Choose an answer
CTRL+DELETE
ALT+ DELETE
SHiFT + DELETE
None of the above
Previous
Skip
Next
Question # 95
MS Word and MS Excel are
Choose an answer
Operating system
Application softwares
High level languages
Low level languages
Previous
Skip
Next
Question # 96
Pointing devices include
Choose an answer
Mouse
Trackball
Pointing stick
All of the above
Previous
Skip
Next
Question # 97
A virus program is usually hidden in:
Choose an answer
The operating system
An application program
The disk drive
Any of the above
Previous
Skip
Next
Question # 98
Data and programs that are not being executed by the computer are stored in
Choose an answer
Cache memory
Main memory
Hard disk
Printer
Previous
Skip
Next
Question # 99
Which of the following represents a collection of concepts that are used to describe the structure of a database?
Choose an answer
Data warehouse
Data model
Data structure
Data type
Previous
Skip
Next
Question # 100
When queries are made over multiple tables the related tables will be
Choose an answer
Broken down automatically
Broken down manually
Joined automatically
Joined manually
Previous
Skip
Next
Question # 101
Which of the following is not a keyword?
Choose an answer
Case
Close
Char
Const
Previous
Skip
Next
Question # 102
A built-in function
Choose an answer
Cannot be redefined
Can be redefined
Cannot return a value
Should be redefined
Previous
Skip
Next
Question # 103
The break statement is used to exit from which part of a loop?
Choose an answer
Beginning
Middle
End
None of the above
Previous
Skip
Next
Question # 104
The programs that remain in the memory and run in the background are called:
Choose an answer
Memory resident programs
Memory hidden programs
Memory loaded program
Notification area programs
Previous
Skip
Next
Question # 105
Create command is used to create a
Choose an answer
Table
View
Report
Query
Previous
Skip
Next
Question # 106
To associate a group of statements with the while statement enclose them between a pair of
Choose an answer
{ .}
{}
( )
" "
Previous
Skip
Next
Question # 107
The step that performs the actions given in the instructions is called
Choose an answer
Fetch
Calculate
Decode
Execute
Previous
Skip
Next
Question # 108
DBMS must be able to accept
Choose an answer
Data definitions
Programs
Data records
Information
Previous
Skip
Next
Question # 109
Without primary key in a table data is
Choose an answer
Unique
Integrated
Redundant
Complete
Previous
Skip
Next
Question # 110
OSI reference model has
Choose an answer
1 Layer
3 layers
6 layers
7 layers
Previous
Skip
Next
Question # 111
Which of the following mode open only an existing file for both reading and writing
Choose an answer
"w"
"w+"
"r+"
"a+"
Previous
Skip
Next
Question # 112
E-commerce involves:
Choose an answer
Electronic funds transfer
Orders management
Online marketing
All of the above
Previous
Skip
Next
Question # 113
The key board shortcut used to copy selected text or object is
Choose an answer
CTRL + X
CTRL + V
CTRL + C
CTRL + Y
Previous
Skip
Next
Question # 114
---------- is used to store program and data white these are being executed
Choose an answer
ROM
RAM
Hard disk
CD
Previous
Skip
Next
Question # 115
Cursor on the screen can be moved by
Choose an answer
Mouse
Scanner
Digital camera
MICR
Previous
Skip
Next
Question # 116
All of these are application software except?
Choose an answer
MS Word
MS Excel
MS Power point
Windows
Previous
Skip
Next
Question # 117
Which of the following looks for the prototypes of functions are used in a program?
Choose an answer
Linker
Loader
Compiler
Parser
Previous
Skip
Next
Question # 118
In Access data can be sorted in
Choose an answer
Ascending order
Descending order
Normal order
Both a and b
Previous
Skip
Next
Question # 119
TCP/IP was developed for use in ARPANET in
Choose an answer
1970
1973
1983
1993
Previous
Skip
Next
Question # 120
Data item is a
Choose an answer
Files
Small unit
Information
Record
Previous
Skip
Next
Question # 121
_______retrieve data from the database and present is to the user in a formatted way
Choose an answer
Form
Macros
Reports
Query
Previous
Skip
Next
Question # 122
Which of the following is not a function of CPU in the computer system?
Choose an answer
Perform logical operation
Perform arithmetic operation
Control input/output devices
Think
Previous
Skip
Next
Question # 123
The symbol '=' represents
Choose an answer
Comparison operator
Assignment operator
Equal to operator
None of these
Previous
Skip
Next
Question # 124
When we declare the integer as unsigned int num-students then what will be the range of integers?
Choose an answer
-32768 to +32767
-65535 to 0
0 to 5535
0 to 4294967295
Previous
Skip
Next
Question # 125
Which of the following data type offers the highest precision?
Choose an answer
Float
Long int
Long double
Unsigned long int
Previous
Skip
Next
Question # 126
Computer Aided Manufacturing
Choose an answer
Brings quality improvements in manufacturing
Manufacturing is without human intervention
Changes in product design can be easily made
All of the above
Previous
Skip
Next
Question # 127
Formal arguments are also called
Choose an answer
Actual arguments
Dummy arguments
Original arguments
Referenced arguments
Previous
Skip
Next
Question # 128
Database system can be divided into______broad categories
Choose an answer
5
4
7
3
Previous
Skip
Next
Question # 129
The process of transferring a file from a local computer to a remote computer on a network is called
Choose an answer
Uploading
Downloading
FTP
Browsing
Previous
Skip
Next
Question # 130
The reason for using computers is / are that they
Choose an answer
Work much faster
Never get tired
Can do the jobs dangerous for human beings to do
All of the above
Previous
Skip
Next
Question # 131
EOF stands for
Choose an answer
Execution of file
End of file
Extermination of file
Exit of file
Previous
Skip
Next
Question # 132
The six kinds of words keywords variables constants string constants operators and punctuators are also called
Choose an answer
Group
Token
Identifiers
All the above
Previous
Skip
Next
Question # 133
The forms are the ________of our database in Microsoft Access,
Choose an answer
Back end
Front end
Both a and b
None of them
Previous
Skip
Next
Question # 134
Video graphics card determines
Choose an answer
The number of colors that can be displayed
Speed with which images appear
Display
All of the above
Previous
Skip
Next
Question # 135
Which of the following symbol is represented as unary operator?
Choose an answer
+
!
/
~
Previous
Skip
Next
Question # 136
Which of the following function is used for scanf() function preceding the variable name used as an argument?
Choose an answer
%
$
&
@
Previous
Skip
Next
Question # 137
The tool used to find a similar or alternative word in a document is called:
Choose an answer
Spell check
Dictionary
Thesaurus
Autocorrect
Previous
Skip
Next
Question # 138
The maximum width of a C variable name can be
Choose an answer
6 Characters
8 Characters
10 Characters
20 Characters
Previous
Skip
Next
Question # 139
To enter current data which of the following is key used
Choose an answer
Ctrl + t
Ctrl + w
Ctrl + :
Ctrl + :
Previous
Skip
Next
Question # 140
Which of the following is a basic network topology?
Choose an answer
Star
Bus
Ring
All of the above
Previous
Skip
Next
Question # 141
Which of the following is not a function of presentation layer in OSI model?
Choose an answer
Manage coding schemes
Check passwords
Provide services for compression of data
Provide services for encryption of data
Previous
Skip
Next
Question # 142
The unit that executes program instructions is called
Choose an answer
RAM
ROM
Control camera
Central processing unit
Previous
Skip
Next
Question # 143
A token ring network
Choose an answer
Uses ring topology
USes token passing
Can operate at 4 Mbps using UTP cable
All of the above
Previous
Skip
Next
Question # 144
In this form of memory instructions are stored at the time of manufacturing
Choose an answer
RAM
Hard disk
F fixed Dish
ROM
Previous
Skip
Next
Question # 145
Which of the following is not a protocol
Choose an answer
Ethernet
Token ring
FDDI
None of the above
Previous
Skip
Next
Question # 146
A record is a complete set of _______field
Choose an answer
Distinct
Related
Designed
All of these
Previous
Skip
Next
Question # 147
Which of the following function keys is used to choose the save as command?
Choose an answer
F2
F4
F10
F12
Previous
Skip
Next
Question # 148
A do-while loop is useful when
Choose an answer
The body of the loop will never be executed
The body of the loop will be executed at least once
The body of loop may never be execute
Previous
Skip
Next
Question # 149
%10.5d, where 15 is a
Choose an answer
Integer
Precision
Field where
Format symbol
Previous
Skip
Next
Question # 150
In MS-Word the data that is being copied or moves is:
Choose an answer
Temporarily stored in Recycle bin
Permanently stored in Recycle bin
Temporarily stored in clipboard
Permanently stored in clipboard
Previous
Skip
Next
Question # 151
Insert command is used to insert
Choose an answer
A new table
A new record
A view
Dependencies
Previous
Skip
Next
Question # 152
Which of the following is part of analysis report?
Choose an answer
How the current system works
The problems in the existing system
Requirements for the existing system
All of the above
Previous
Skip
Next
Question # 153
A spare copy of data on a secondary storage is called
Choose an answer
Store
Backup
Reference
None of the above
Previous
Skip
Next
Question # 154
External modems
Choose an answer
are expensive
Have more operational features
Offer high transmission speed
All of the above
Previous
Skip
Next
Question # 155
How many types of relationship are
Choose an answer
2
3
4
5
Previous
Skip
Next
Question # 156
In access the structure of a table is created in ______ view
Choose an answer
Design view
Datasheet View
Both A and B
None of these
Previous
Skip
Next
Question # 157
The paragraph appears uneven on both edges in:
Choose an answer
Left Alignment
Right Alignment
Justified Alignment
Center Alignment
Previous
Skip
Next
Question # 158
An external variable is variable can be referenced in a declaration
Choose an answer
In main () only
In the first function that uses it
In any function that uses it
Outside of any function
Previous
Skip
Next
Question # 159
The layer next to the application layer in OSI model is
Choose an answer
Session layer
Presentation layer
Transport layer
Previous
Skip
Next
Question # 160
The gets() functions reads the next character from the file and returns it as a(n),,,,,,,,,,,and if error occurs returns EOF
Choose an answer
Float
Integer
String
Double
Previous
Skip
Next
Question # 161
IDE is a (an)
Choose an answer
Hardware
Interface
Sofware
Administrator
Previous
Skip
Next
Question # 162
Which of the following can be used to join similar types of networks?
Choose an answer
Bridges and repeater
Bridges and routers
Repeaters and gateways
Previous
Skip
Next
Question # 163
A removable media may be a:
Choose an answer
CD or DVD
Flash memory
Floppy disk
Any of the above
Previous
Skip
Next
Question # 164
There can be a complete backup of data or a (n),,,,,,,,,,,,,,backup of data:
Choose an answer
Full
Incremental
First
Last
Previous
Skip
Next
Question # 165
C language has been developed by
Choose an answer
Ken Thompson
Dennis Ritchine
Peter Norton
Martin Richards
Previous
Skip
Next
Question # 166
This is a Command Line operating system:
Choose an answer
Windows
DOS
Solaris
Linux
Previous
Skip
Next
Question # 167
The output of a query is in the form of a
Choose an answer
Table
Form
Report
Query
Previous
Skip
Next
Question # 168
The Ionc variable is initialized
Choose an answer
Inside the loop
Outside the loop
Either inside or outside the loop
At the end of loop
Previous
Skip
Next
Question # 169
Which of the following is non-volatile?
Choose an answer
PROM
EPROM
EEPROM
All of these
Previous
Skip
Next
Question # 170
Data exists in a data base in the form of
Choose an answer
Tables
Queries
reports
Files
Previous
Skip
Next
Question # 171
Which of the following printers gives the highest printing resolution?
Choose an answer
Laser printer
Dot matrix printer
Ink jet printer
Thermal transfer printer
Previous
Skip
Next
Question # 172
Which of the following is a conditional operator
Choose an answer
? and :
: and ;
? and :
! and ?
Previous
Skip
Next
Question # 173
This communication medium is used to connect the networks and the computers in the internet
Choose an answer
Telephone lines
Fiber-optic cables
Satellites
All of the above
Previous
Skip
Next
Question # 174
In hybrid distribution which kind of fragments are stored at only one site?
Choose an answer
Critical fragments
Non-critical fragments
Critical and non-critical fragments
Only large fragments
Previous
Skip
Next
Question # 175
As compared to the CRT the flat-panel Displays
Choose an answer
Are much thinner
Are lighter
Consume less power
All of the above
Previous
Skip
Next
Question # 176
Which of the following virus deletes all Microsoft Office files and also the partition information from the disk?
Choose an answer
Trojan horse
Logic bomb
Chernobyl
Redlof
Previous
Skip
Next
Question # 177
a+=b is equivalent to
Choose an answer
b+=a
a = + b
a= a +b
b= b +a
Previous
Skip
Next
Question # 178
Candidate key is also called
Choose an answer
Non key
Combined key
Alternative key
Foreign key
Previous
Skip
Next
Question # 179
Which of the following is an output device?
Choose an answer
Scanner
Mouse
Camera
Flat panel display
Previous
Skip
Next
Question # 180
The statements following else in an if-else construction are executed when
Choose an answer
The conditional expression following if is false
The conditional expression following if is true
The conditional expression following else is false
The conditional expression following else is true
Previous
Skip
Next
Question # 181
Which of the following operators are used to express the conditions?
Choose an answer
Arithmetic operator
Relational operator
Assignment operator
Logical operator
Previous
Skip
Next
Question # 182
A database consists of various components called the
Choose an answer
Tool
Properties
Entities
Object
Previous
Skip
Next
Question # 183
Propagation of signals across a communication medium is known as
Choose an answer
Signaling
Transmission
Broadcasting
Dissemination
Previous
Skip
Next
Question # 184
Which of the following is a valid character constant?
Choose an answer
a
"b"
'6'
=
Previous
Skip
Next
Question # 185
Which of the following is not a relational operator?
Choose an answer
==
=
!=
<=
Previous
Skip
Next
Question # 186
In the do while loop the test condition is evaluated
Choose an answer
After the loop is executed
Before the loop is executed
Between the loop is executed
All the above
Previous
Skip
Next
Question # 187
LAN stands for
Choose an answer
Limited Access Network
Local Area Network
Large Area network
Light Area network
Previous
Skip
Next
Question # 188
Which of the following operators has lowest precedence?
Choose an answer
!
+
=
==
Previous
Skip
Next
Question # 189
If we dropped the pair of braces then what would happen?
Choose an answer
Only one statement to be executed in the if block
Only one statement to be executed in the else block
Only one statement to be executed in the if block and only one statement to be executed in the else block
Previous
Skip
Next
Question # 190
The fastest mode of data transmission is
Choose an answer
Simplex
Half duplex
full-duplex
None of the above
Previous
Skip
Next
Question # 191
This is not a computer virus
Choose an answer
Norton
Chernobyl
Redlof
All are computer virus
Previous
Skip
Next
Question # 192
The format specifier % is used for
Choose an answer
Integer
Unsigned short
Unsigned float
Unsigned long int
Previous
Skip
Next
Question # 193
DBA defines
Choose an answer
Errors
Security
Information
Objects
Previous
Skip
Next
Question # 194
The wildcard______sal[ei]ma,
Choose an answer
Saleema
Salima
Both a and b
None of them
Previous
Skip
Next
Question # 195
Which of the following toolbox is used to display a builder for the selected item or property?
Choose an answer
Properties
Build
Help
Code
Previous
Skip
Next
Question # 196
In ERD model the relationship between two entities is represented by a
Choose an answer
Diamond symbol
Rectangular box
Oval symbol
Line
Previous
Skip
Next
Question # 197
To enter the same data into current record
Choose an answer
Ctrl + '
Ctrl+ "
Ctrl + :
Ctrl + ;
Previous
Skip
Next
Question # 198
In C every valid string ends with
Choose an answer
Null character
0 (zero)
1 (one)
String
Previous
Skip
Next
Question # 199
The function getche () is defines in:
Choose an answer
Stdio.h
String.h
Math.h
Conio.h
Previous
Skip
Next
Question # 200
A form that contains the sub form is called______.
Choose an answer
Form
Main form
Report
None of them
Previous
Skip
Next
Question # 201
C is a
Choose an answer
High level language
Low level language
Assembly language
Previous
Skip
Next
Question # 202
Indexes on fields of the table are used
Choose an answer
To speed up the sorting process
To speed up the searching process
To speed down the sorting and searching process
Both a and b
Previous
Skip
Next
Question # 203
Which of the following operation are adopted with data in a database system?
Choose an answer
Normalize
Efficient
Complete
Unnormalize
Previous
Skip
Next
Question # 204
Global variables are created in
Choose an answer
RAM
ROM
Hard disk
Cache
Previous
Skip
Next
Question # 205
A LAN can transmit
Choose an answer
Computer data
Sounds
Pictures & videos
All of the above
Previous
Skip
Next
Question # 206
The maximum value that an integer constant can have is
Choose an answer
-32767
32767
1.7014e38
-1.7014e38
Previous
Skip
Next
Question # 207
The major reason to use a word processor like MS-Word is that you
Choose an answer
Don't have to retype the document to make changes
Can integrate pictures and text in a document
Can format text using different font faces and sizes
All of the above
Previous
Skip
Next
Question # 208
You can drag the _____to move the property sheet window around on your screen
Choose an answer
Title bar
Status bar
Scroll bar
All of them
Previous
Skip
Next
Question # 209
If an entity is connected to many other entities then the relationship is called
Choose an answer
One to one relationship
One to many relationship
Many to many relationship
Bubble Chart
Previous
Skip
Next
Question # 210
The method in which unauthorized access is prevented by providing a key,badge,token or a plastic card to authorized users is called
Choose an answer
What you have
What you know
What you do
What you are
Previous
Skip
Next
Question # 211
Primary key is used
Choose an answer
To short the data speedy
Searching is speeded up
Not allows duplicate entities
All of the above
Previous
Skip
Next
Question # 212
If an entity is related to more than join entity then the relationship is called
Choose an answer
One to one relationship
One to many relationship
Many to many relationship
Bubble Chart
Previous
Skip
Next
Question # 213
Which of the following commands opens a document?
Choose an answer
CTRL + S
CTRL + W
CTRL +O
CTRL +N
Previous
Skip
Next
Question # 214
As compared to a command line operating system a GUI operating system is:
Choose an answer
More efficient
Easier to use
More reliable
All of the above
Previous
Skip
Next
Question # 215
Which of the following separates the name and telephone number fields in each record?
Choose an answer
/
\
#
!
Previous
Skip
Next
Question # 216
Which of the following buttons of find and Replace dialog box is clicked to start the search process?
Choose an answer
Find
Find next
Search
Next
Previous
Skip
Next
Question # 217
The logical not operator denoted by ! is a
Choose an answer
Ternary operator
Uniary Operator
Binary Operator
Bitwise operator
Previous
Skip
Next
Question # 218
A system in which data can be received and sent simultaneously is called
Choose an answer
Simplex
Half duplex
Full-duplex
Multi-duplex
Previous
Skip
Next
Question # 219
Which of the following is/are part/parts of the CPU?
Choose an answer
Control unit
Arithmetic & logical unit
Registers
All of the above
Previous
Skip
Next
Question # 220
Some compilers allow variable names whose length could be up to
Choose an answer
1 to 20 Characters
1 to 40 characters
1 to 60 characters
1 to 80 characters
Previous
Skip
Next
Question # 221
An operating system is a
Choose an answer
System utility
Application software
System software
Software package
Previous
Skip
Next
Question # 222
Which of the following is not involved in e-commerce?
Choose an answer
E-mail
Video conferencing
Electronic banking
None of the above
Previous
Skip
Next
Question # 223
Which of the following is the most serious problem?
Choose an answer
Loss of hardware
Loss of data
Loss of software
None of the above
Previous
Skip
Next
Question # 224
Which of the following keyboard command takes you to the end of word document:
Choose an answer
ALT + END
CTRL +PgDn
END
CTRL + END
Previous
Skip
Next
Question # 225
An entity related to itself in an ERD model refers to
Choose an answer
Recursive relationship
One-to-many relationship
Many-to-many relationship
One-to-one relationship
Previous
Skip
Next
Question # 226
The variables commonly used in C functions are accessible
Choose an answer
To all other functions
To only one function
To specific functions
To special functions
Previous
Skip
Next
Question # 227
The condition being tested may use which of the following operations?
Choose an answer
Relational operators
Assignment operators
Logical operator
Both A and B
Previous
Skip
Next
Question # 228
Object-oriented is a
Choose an answer
Broad category of relation database model
Latest research on the relational database model
Principles of the relational database model
None of the above
Previous
Skip
Next
Question # 229
The cables that consists of tubes of glass through which data are transmitted as pulses of light is
Choose an answer
Twisted pair
Coaxial cable
Fiber optic
None of the above
Previous
Skip
Next
Question # 230
Local Area networks do not use
Choose an answer
Twisted wire pairs
Telephone
Coaxial cable
Fiber-optic cable
Previous
Skip
Next
Question # 231
A,,,,,,,,,,,,cannot be stored in a text file.
Choose an answer
Picture
Numbers
Symbols
Characters
Previous
Skip
Next
Question # 232
What keyword does the C language to implement the decision control instruction use?
Choose an answer
If
Else
If-else
Both a and c
Previous
Skip
Next
Question # 233
How many components are present in data base?
Choose an answer
Two
Three
Four
FIve
Previous
Skip
Next
Question # 234
DBMS must include a
Choose an answer
Micro processor
DML processor
Interpreted
Compiler
Previous
Skip
Next
Question # 235
The words that are made up of a sequence of characters letters and digits are called
Choose an answer
Constant
Operators
Variables
Punctiators
Previous
Skip
Next
Question # 236
The floating point argument in exponential notation is representation as
Choose an answer
%c
%g
%e
%f
Previous
Skip
Next
Question # 237
A program that takes as input a high level language and executes instructions one by one is:
Choose an answer
Interpreter
Assembler
Compiler
Both a and c
Previous
Skip
Next
Question # 238
Which of the following is not a storage device?
Choose an answer
Hard disk
Printer
Compact disk
ROM
Previous
Skip
Next
Question # 239
An opened file must be_________before terminating the program
Choose an answer
Closed
Saved
Compiled
Retrieved
Previous
Skip
Next
Question # 240
A computer cannot get a virus:
Choose an answer
Through the internet
Through a virus infected person
Through an infected floppy
Through a pirated software CD
Previous
Skip
Next
Question # 241
Which of the following type of file requires largest processing time?
Choose an answer
Sequential file
Random file
Indexed sequential file
Direct access file
Previous
Skip
Next
Question # 242
Variables are created in
Choose an answer
RAM
ROM
Hard disk
Cache
Previous
Skip
Next
Question # 243
Making illegal copies of copyrighted software is called:
Choose an answer
Copyleft
Theft
Piracy
Either b or c
Previous
Skip
Next
Question # 244
This key on the keyboard is used to delete a character to the right of the cursor:
Choose an answer
TAB
DEL
BACKSPACE
Either b or c
Previous
Skip
Next
Question # 245
Function prototypes for built-in function are specified in
Choose an answer
Source files
Header files
Object files
Image files
Previous
Skip
Next
Question # 246
This device connects different types of networks to form an inter-network
Choose an answer
Gateway
Bridge
Router
None of the above
Previous
Skip
Next
Question # 247
According to the design proposed by,,,,,,,,,and his team instructions are stored in the memory of the computer.
Choose an answer
Von Neumann
Alen Mathison Turing
Al-Khuwarizmi
Intel Moor
Previous
Skip
Next
Question # 248
In a relational database a single piece of information is called
Choose an answer
Field
Record
Entity
Attribute
Previous
Skip
Next
Question # 249
How many tables are present in a database?
Choose an answer
1
10
100
As required
Previous
Skip
Next
Question # 250
Auto format
Choose an answer
Opens or closes toolbox
Applies predefined formats to a report
Applies predefined to a form
Both b and c
Previous
Skip
Next
Question # 251
If an entity is connected directly to another object/entity then the relationship is called
Choose an answer
One to one relationship
One to many relationship
Many to many relationship
Bubble chart
Previous
Skip
Next
Question # 252
Now a days computers are being used in education for
Choose an answer
Computer aided education
Tutorials and drill & practice
Testing understanding of students
All of the above
Previous
Skip
Next
Question # 253
A combination of four binary digits is called:
Choose an answer
Bit
Nibble
Byte
None of the above
Previous
Skip
Next
Question # 254
A file is stored in
Choose an answer
RAM
Hard disk
ROM
Cache
Previous
Skip
Next
Question # 255
The storage area for temporarily storing deleted items on the hard disk is called
Choose an answer
My computer
My Documents
Recycle BIn
Desktop
Previous
Skip
Next
Question # 256
Forms are designed for
Choose an answer
Input data
Manipulate data
Accepting change
All of these
Previous
Skip
Next
Question # 257
The computer network in which all computers are equal and no one computer is in control is called
Choose an answer
Client/server network
Dedicated server network
Peer-to-peer network
None
Previous
Skip
Next
Question # 258
An,,,,,,,,,,,is a thing is the real world that is distinguishable from all other objects.
Choose an answer
Object
Entity
Data
Class
Previous
Skip
Next
Question # 259
Which of the following is the name of an antivirus?
Choose an answer
Trojan horse
Dr. Solomon's Toolkit
Logic bomb
Redlof
Previous
Skip
Next
Question # 260
_______can be previewed on the screen before printing
Choose an answer
Report
Form
Subform
justified
Previous
Skip
Next
Question # 261
Which of the following statements is correct?
Choose an answer
A virus may destroy hardware
A virus cannot read Pin code or Credit card number
A virus may make resources unavailable to the users
None of the above
Previous
Skip
Next
Question # 262
Data can be in the form of
Choose an answer
Numbers
Images
Characters
All of the above
Previous
Skip
Next
Question # 263
The degree of a table is the total number of
Choose an answer
Tuple
Attribute
Records
Fields
Previous
Skip
Next
Question # 264
In data communication the sender is also called
Choose an answer
Object
Source
Sink
Medium
Previous
Skip
Next
Question # 265
From database data is accessed through
Choose an answer
Queries
Function
Reports
Information
Previous
Skip
Next
Question # 266
With shielded twisted pair cables a token ring network can operate up to a speed of
Choose an answer
4 Mbps
8 Mbps
12 Mbps
16 Mbps
Previous
Skip
Next
Question # 267
What mechanism is used to execute a set of operations repeatedly?
Choose an answer
Goto statement
Switch statement
Loops
Functions
Previous
Skip
Next
Question # 268
MS-Word and MS-Excel are:
Choose an answer
Operating systems
Application software
High level languages
Low level languages
Previous
Skip
Next
Question # 269
An attribute corresponds to a
Choose an answer
Record
Cardinality
Row
Column
Previous
Skip
Next
Question # 270
C language has been developed at
Choose an answer
Microsoft Corp.USA
AT and T Bell Labs USA
Borland international USA
IMB. USA
Previous
Skip
Next
Question # 271
With database data is in
Choose an answer
Standard form
Unnormalize form
Complete
Integrated
Previous
Skip
Next
Question # 272
Shortcut menu is also called
Choose an answer
Instant menu
Drop down menu
Pop-up menu
Scroll menu
Previous
Skip
Next
Question # 273
The fopen () function returns the,,,,,,,,,pointer if it fails to open the file for some reason.
Choose an answer
0 (zero)
NULL
1 (one)
File
Previous
Skip
Next
Question # 274
The for loop contains the
Choose an answer
Initialize expression
Test expression
Increment expression
All the above
Previous
Skip
Next
Question # 275
A control that displays description text is called
Choose an answer
Control wizard
Label
Text box
Option group
Previous
Skip
Next
Question # 276
Cellular (mobile) phones systems are often
Choose an answer
LANs
MANs
WANs
None of the above
Previous
Skip
Next
Question # 277
A relational database system is a system in which
Choose an answer
The user views all the data as being stored in the form of tables
The operations are operate on tables only
The operations are produced as their output data in form of tables
All of the above
Previous
Skip
Next
Question # 278
A table may have attributes as primary key
Choose an answer
Two
Only one
Foreign key
All the above
Previous
Skip
Next
Question # 279
Which of the following is true about a function call?
Choose an answer
Stops the execution of the program
Transfers control to the called functions
Transfers control to the main function
Previous
Skip
Next
Question # 280
MICR stands for
Choose an answer
Magic Ink Character Reader
Magic Ink Character Recorder
Magnetic Ink Character Reader
Magnetic Ink character Reader
Magnetic Ink Character Recorder
Previous
Skip
Next
Question # 281
When you copy a block of text in a word document it is temporarily stored in the:
Choose an answer
Buffer
Register
Clipboard
Cache
Previous
Skip
Next
Question # 282
Mobile-SIM is an example of ---------card.
Choose an answer
Smart
Credit
Bank
Debit
Previous
Skip
Next
Question # 283
Which of the following layers in OSI model routes data from sender to receiver?
Choose an answer
Transport layer
Application layer
Physical layer
Network layer
Previous
Skip
Next
Question # 284
Which of the following is an example of a package software?
Choose an answer
Microsoft Word
Microsoft Excel
Micro Power Point
All of the above
Previous
Skip
Next
Question # 285
The statement associated with the while statement can be a ...........
Choose an answer
Unary statement
Compound statement
Binary statement
Ternary statement
Previous
Skip
Next
Question # 286
Which of the following is not a component of an application window?
Choose an answer
Title bar
Drop down menus
Desktop
Scroll bars
Previous
Skip
Next
Question # 287
A decision-making operator is called
Choose an answer
Arithmetic operator
Assignment operator
Conditional operator
Logical operator
Previous
Skip
Next
Question # 288
The real constant in C can be expressed in which of the following forms?
Choose an answer
Fractional form only
Exporential form only
ASCII form only
Both a and b
Previous
Skip
Next
Question # 289
The character "{" is a
Choose an answer
Keyword
Constant
Punctuators
Previous
Skip
Next
Question # 290
You can double space text be press
Choose an answer
CTRL + S
SHIFT +S
CTRL+ 2
CTRL +1
Previous
Skip
Next
Question # 291
There are,,,,,,,,,,,,,,main components of the CPU,
Choose an answer
4
3
2
20 to 80
Previous
Skip
Next
Question # 292
The word document as it would be printed on the printer is displayed in
Choose an answer
Normal layout
Outline layout
Web layout
Print layout
Previous
Skip
Next
Question # 293
CTRL + ALT +Del is
Choose an answer
An invalid key combination
Recognized by windows
Used to close the active window
Both b and c
Previous
Skip
Next
Question # 294
To relationship between countries and their capitals is an example of .............relationships
Choose an answer
One-to-one
One to many
Many to many
None of them
Previous
Skip
Next
Question # 295
Which of the following does not support the data in data base management system
Choose an answer
Standard
Redundant
Complete
Integrated
Previous
Skip
Next
Question # 296
There are types of network topologies
Choose an answer
2
3
4
5
Previous
Skip
Next
Question # 297
The maximum number of primary partitions that can be created on a disk is:
Choose an answer
Two
Three
Four
None of the above
Previous
Skip
Next
Question # 298
In first normal form
Choose an answer
Tables are break down
Tables are re-joined
Tables are maked
None of the above
Previous
Skip
Next
Question # 299
An external variable is defined in a declaration
Choose an answer
In main () only
In the first function that uses it
In any function that mean it
Outside of any function
Previous
Skip
Next
Question # 300
A text file has ,,,,,,,,,,,,,,,,,,,,,size
Choose an answer
20 bits
20 bytes
fixed
No fixed
Previous
Skip
Next
Question # 301
Void occupy how many bytes in memory?
Choose an answer
Zero
One
Two
Four
Previous
Skip
Next
Question # 302
To view or change table structure go into
Choose an answer
Data sheet veiw
Print view
Design view
Report view
Previous
Skip
Next
Question # 303
A relation corresponds to the concept of a
Choose an answer
Table
Data structure
Procedure
View
Previous
Skip
Next
Question # 304
Expression 1? Expression 2: Expression 3; If the expression! is true then which of the following is correct?
Choose an answer
The value returned will be expression!
The value returned will be expression 2
The value returned will be expression 3
No value return
Previous
Skip
Next
Question # 305
How many types of functions are present in C-language?
Choose an answer
One
Two
Three
Four
Previous
Skip
Next
Question # 306
The function is used to open a file
Choose an answer
Fopen
Popes
fgets
pgets
Previous
Skip
Next
Question # 307
In business computers are used in
Choose an answer
Marketing
Stock exchanges
Banks
All of the above
Previous
Skip
Next
Question # 308
The keyboard shortcut used to undo the last action is
Choose an answer
CTRL + Y
CTRL + Z
CTRL + V
CTRL +X
Previous
Skip
Next
Question # 309
The US Department of Defense started the------- in 1969
Choose an answer
LAN
WAN
DARPA
Internet
Previous
Skip
Next
Question # 310
CPU is an example of
Choose an answer
Software
Hardware
A program
An output
Previous
Skip
Next
Question # 311
The storage capacity of a hard disk is
Choose an answer
Larger than that of a floppy disk
Larger than that of a CD ROM
Larger than that of main memory
All of the above
Previous
Skip
Next
Question # 312
DBA is a
Choose an answer
Programmar
Database user
Database manager
Client
Previous
Skip
Next
Question # 313
If you write a comment in C program then which of the following character is used?
Choose an answer
//and//
/*and /*
/* and */
** and **
Previous
Skip
Next
Question # 314
Retrieval of information with database is
Choose an answer
Slow
Normal
Faster
Both a and b
Previous
Skip
Next
Back