','1120','question','manage_question','manageQuestion.php')">
	
		
			| 11. How many characters can a VDU display on one line | 
		
			|   | 
		
			|   | 
		
			|   | 
	
                    24 | 40 | 64 | 80 | 4 | Active |    | 
                  | 26 | Course on Computer Concepts (CCC) Semester 1
 | 10. The Resolution of CGA is 
 | 640* 200 | 720 *350 | 640*340 | None of the Above | 4 | Active |    | 
                 
                  | 27 | Course on Computer Concepts (CCC) Semester 1
 | 9.  For all the computing needs, windows 2000 provides 
 | Industrial Stength Reliability | Highest Level Of Security | Powerful Performance | All | 4 | Active |    | 
                 
                  | 28 | Course on Computer Concepts (CCC) Semester 1
 | 8.  Program to convert high level programe to low level is 
 | Assembler | Compliler | Interpretor | All | 2 | Active |    | 
                 
                  | 29 | Course on Computer Concepts (CCC) Semester 1
 | 7.  WWW Stands for 
 | World Wide Web | Wide Word Website | Wide World Website | All of the above | 1 | Active |    | 
                 
                  | 30 | Course on Computer Concepts (CCC) Semester 1
 | 6. The internal command execute immediately 
 | True | False | Both | None | 1 | Active |    | 
                 
                  | 31 | Course on Computer Concepts (CCC) Semester 1
 | 5. SVGA Stands for 
 | System Vertical Graphics Adaptor | Super Video Graphics Array | Super Vertical Graphics Array | None of the Above | 2 | Active |    | 
                 
                  | 32 | Course on Computer Concepts (CCC) Semester 1
 | 4. Multimedia can be used for 
 | Webpages | Games | Main Stream Business | All | 4 | Active |    | 
                 
                  | 33 | Course on Computer Concepts (CCC) Semester 1
 | 3. 1 KB is equal to 
 | 1024 Bytes | 1024 Bites | 1024 GB | 1024 MB | 1 | Active |    | 
                 
                  | 34 | Course on Computer Concepts (CCC) Semester 1
 | 2. A Micro Processor is  
 | A solid State Device | Tiny as a pen | Capable of performing arithmetic calculation | Capable of performing logical calculation | 3 | Active |    | 
                 
                  | 35 | Course on Computer Concepts (CCC) Semester 1
 | 1. RUN command is used for rename the file 
 | True | False | Both | None | 2 | Active |    | 
                 
                  | 36 | 
 | 
 |  |  |  |  |  | Disable |    | 
                 
                  | 37 | PC ARCHITECTURE 
 | The Width of a processor?s data path is measured in bits. Which of the following are common data paths? 
 | . 32 bits | . 8 bits | 12 bits | 16 bits | 2 | Active |    | 
                 
                  | 38 | ADVANCE NETWORKS AND NETWORKIN 
 | WAN stands for ..................... . 
 | Wap Area Network | Wide Array Net | . Wide Area Network | Wireless Area Network | 3 | Active |    | 
                 
                  | 39 | PC HARDWARE & COMPONENTS 
 | Q. What is the first step in diagnosing a completely dead computer at the client site that was working the day before. 
 | check the AC outlet | Test the power supply | replace the CMOS battery | reseat the hard drive controller cable | 1 | Active |    | 
                 
                  | 40 | PC HARDWARE & COMPONENTS 
 | Q. Which of the items listed below is an output device? 
 | Scanner | Printer | Mouse | Keyboard | 2 | Active |    | 
                 
                  | 41 | PC HARDWARE & COMPONENTS 
 | What?s a USB hub? 
 | Networking equipment which allows several computers to share one Internet connection | The ports on the back of your computer where you plug in USB devices | A device that turns one USB connection into two or more connections | A place to store all of your USB devices | 3 | Active |    | 
                 
                  | 42 | PC HARDWARE & COMPONENTS 
 | Q. Missing slot covers on a computer can cause? 
 | incomplete path for ESD | EMI. | power surges | over heat | 4 | Active |    | 
                 
                  | 43 | OPERATING SYSTEM, SOFTWARE &TO 
 | Q. To start the Services Configuration Tool from the desktop 
 | b. Main Menu Button (on the Panel) >System Settings>Services Settings> Services | a. Main Menu Button (on the Panel) >System Settings>Server Settings>Services and Type the command re | c. Type the command redhatconfigure servers at a shell prompt | . None of these | 2 | Active |    | 
                 
                  | 44 | PC ARCHITECTURE 
 | Q. The brain of the computer. This part does the calculation, moving and processing of information 
 | Motherboard | RAM | Processor | Hard Drive | 3 | Active |    | 
                 
                  | 45 | ADVANCE NETWORKS AND NETWORKIN 
 | Q. Which of the following is correct in VLSM? 
 | Subnets must be in same size | No required of subnet | Can have subnets of different sizes | None of these | 3 | Active |    | 
                 
                  | 46 | PERSONALITY DEVELOPMENT 
 | All levels of management between the supervisory level& the top of the organization are termed ------------. 
 | First line managers | Forman | Middle managers | Supervisors | 3 | Active |    | 
                 
                  | 47 | PC ARCHITECTURE 
 | CDROMstands for .............. 
 | Compactable Read Only Memory | Compact Disk Read Only Memory | Compactable Disk Read Only Memory | Compact Data Read Only Memory | 2 | Active |    | 
                 
                  | 48 | PC HARDWARE & COMPONENTS 
 | Q. From the following, what could cause a display that is wiggly,pulsing,blurred, too large or small and causes the screen to flicker or shrink? 
 | video adapter interference from nearby pc cards | unstable power supply in the monitor | monitor interference from nearby equipment | All of these | 4 | Active |    | 
                 
                  | 49 | OPERATING SYSTEM, SOFTWARE &TO 
 | The proper definition of a modern digital computer is 
 | Any machine that can perform mathematical operations | . A more sophistic and modified electronic pocket calculator | A machine that works on binary code | An electronic automated machine that can solve problems involving words and numbers | 3 | Active |    | 
                 
                  | 50 | PC HARDWARE & COMPONENTS 
 | Q. In Inkjet technology the droplets of ink are deflected by? 
 | electro static absorbtion | multi directional nozzles | electronically charged plates | high pressure plates | 2 | Active |    | 
                 
                  | 51 | OPERATING SYSTEM, SOFTWARE &TO 
 | Which of the following is an Operating System 
 | Firefox | None of these | Microsoft Word | Windows | 4 | Active |    | 
                 
                  | 52 | PC ARCHITECTURE 
 | Q. The first electronic general purpose digital computer built by Motley and Accrete called ENIAC did not work on the stored program concept. How many number s could it storein its internal memory? 
 | 100 | 40 | 80 | 20 | 4 | Active |    | 
                 
                  | 53 | PC ARCHITECTURE 
 | Q. Resistance is measured in ? 
 | Watts | Ohms | Amps | Volts | 2 | Active |    | 
                 
                  | 54 | PC ARCHITECTURE 
 | What program can you use to keep your system patched and uptodate? 
 | Windows Dispatcher | Windows Update 5 | Windows Upgrade | Windows Patcher | 2 | Active |    | 
                 
                  | 55 | OPERATING SYSTEM, SOFTWARE &TO 
 | A high Quality CAD system uses the following for printing drawing and graphs 
 | All of these | Line printer | . Digital plotter | Dot matrix printer | 3 | Active |    | 
                 
                  | 56 | PC ARCHITECTURE 
 | Q. The first electronic computer in the world was 
 | ENIAC | UNIVAC | EDVAC | All of these | 1 | Active |    | 
                 
                  | 57 | OPERATING SYSTEM, SOFTWARE &TO 
 | . What is modified when changing the system startupboot sequence? 
 | . BIOS/CMOS | COMMAND.COM | . CONFIG.SYS | autoexec.bat | 1 | Active |    | 
                 
                  | 58 | PC HARDWARE & COMPONENTS 
 | A user complains that they can not hear any sound on their computer. What are some simple things you should consider concerning this problem? 
 | volume not up on the monitor | none of these | power cable to speaker not connected and bad cable connection | defective graphics card | 3 | Active |    | 
                 
                  | 59 | PERSONALITY DEVELOPMENT 
 | Analytical CRM tools can sliceanddicecustomer information to create madetoorderviews 
 | Customer value | All of these | Customer spending | Customer product affinities | 2 | Active |    | 
                 
                  | 60 | PERSONALITY DEVELOPMENT 
 | The personnel who deals with the computer and its management put together are called 
 | Software | Firmware | Human ware | Hardware | 3 | Active |    | 
                 
                  | 61 | ADVANCE NETWORKS AND NETWORKIN 
 | Q. You are on a tablet and can't connect to the network. What is the first thing you should do 
 | None of these | . Press and hold the power button | Restart the computer | Check that the wireless switch is in the on position | 4 | Active |    | 
                 
                  | 62 | OPERATING SYSTEM, SOFTWARE &TO 
 | Q. ISDN uses _____ technology. 
 | neither digital nor analog | only digital | only analog | digital and analog | 2 | Active |    | 
                 
                  | 63 | PERSONALITY DEVELOPMENT 
 | Q. Relationships that result in strategic partnerships go through four stages including: 
 | Suggestion, response, communication, concurrence | Awareness, exploration, expansion, and commitment | . Exploration, change, dynamics, restoration | cd. Beginning, adjustment, middle, end | 2 | Active |    | 
                 
                  | 64 | PERSONALITY DEVELOPMENT 
 | In successful organizations, ---------------- 
 | Low efficiency & high effectiveness go hand in hand | High efficiency & low effectiveness go hand in hand | High efficiency & high equity go hand in hand | High efficiency &high effectiveness go hand in hand | 4 | Active |    | 
                 
                  | 65 | PERSONALITY DEVELOPMENT 
 | Q. The marketing messages committed to customers wishes is a part of ................... . 
 | Permission marketing | Activity marketing | Supplier marketing | None of these | 1 | Active |    | 
                 
                  | 66 | OPERATING SYSTEM, SOFTWARE &TO 
 | Q. What command should you run to check and fix corrupt system files, DLLs, and other critical files? 
 | CHKDSK /R | SFC /SCANNOW | CMDCONS /FIXBOOT | DEFRAGA | 2 | Active |    | 
                 
                  | 67 | PERSONALITY DEVELOPMENT 
 | Which is not a task of a Configuration Management? 
 | Version control | Reporting | Change management | Quality control | 4 | Active |    | 
                 
                  | 68 | PERSONALITY DEVELOPMENT 
 | Q. What supports backofficeoperations and strategic analysis and includes all systems that do not deal directly with the customers? 
 | Operational CRM | Analytical CRM | Personalization | All of these | 2 | Active |    | 
                 
                  | 69 | PC ARCHITECTURE 
 | Q. How many address lines are needed to address each memory location in a 2048 x 4 memory chip? 
 | 11 | 8 | 10 | 12 | 1 | Active |    | 
                 
                  | 70 | PERSONALITY DEVELOPMENT 
 | _________ is the person who offers informal advice or information about a specific product or product category. 
 | A marketing leader | An opinion leader | A customer | None of these | 2 | Active |    | 
                 
                  | 71 | PC HARDWARE & COMPONENTS 
 | When plugging the P8 and P9 power connectors into the system board, which of the following is true? 
 | it doesn't matter which way you plug them in, the voltages are the same | P8 and P9 don't plug into the system board | the black wires of both connectors should be next to each other | the black wires of both connectors should NOT be next to each other | 3 | Active |    | 
                 
                  | 72 | PC HARDWARE & COMPONENTS 
 | . A capacitor is measured in which of the following units? 
 | Volts | . Ohms | Resistance | . Farads | 4 | Active |    | 
                 
                  | 73 | PC HARDWARE & COMPONENTS 
 | . A capacitor is measured in which of the following units? 
 | Volts | . Ohms | Resistance | . Farads | 4 | Active |    | 
                 
                  | 74 | ADVANCE NETWORKS AND NETWORKIN 
 | What would the value of protocol field in an IP header in which the data is a HTTP? 
 | . 80 | 8080 | . 6 | 413 | 3 | Active |    | 
                 
                  | 75 | PC HARDWARE & COMPONENTS 
 | Q. You must service the laser printer in your office. Which part of the printer shoud you avoid touching because it is hot? 
 | primary corona | fuser | printer head | highvoltage power supply | 2 | Active |    | 
                 
                  | 76 | C Language 
 | Which operator has the highest priority ? 
 | + + | % | + | !! | 1 | Active |    | 
                 
                  | 77 | C Language 
 | Which operator has the lowest priority ? 
 | + + | % | + | !! | 4 | Active |    | 
                 
                  | 78 | C Language 
 | The equality operator is represented by 
 | := | .EQ. | = | = = | 4 | Active |    | 
                 
                  | 79 | C Language 
 | The operator && is an example for ___ operator 
 | Assignment | Logical | Increment | Rational | 2 | Active |    | 
                 
                  | 80 | C Language 
 | Which of the following is an example of compounded assignment statement ? 
 | a = 5 | a + = 5 | a = b = c | a = b | 2 | Active |    | 
                 
                  | 81 | C Language 
 | The maximum length of a variable in C is ___ 
 | 8 | 16 | 32 | 64 | 1 | Active |    | 
                 
                  | 82 | C Language 
 | Which of the following is invalid ? 
 | ?? | ? ? | ?a? | ?abc? | 4 | Active |    | 
                 
                  | 83 | C Language 
 | Which escape character can be used to beep from speaker in C ? 
 | \a | \b | \c | \d | 1 | Active |    | 
                 
                  | 84 | C Language 
 | Which of the following is a Scalar Data type 
 | FLOAT | UNION | ARRAY | POINTER | 1 | Active |    | 
                 
                  | 85 | C Language 
 | Which of the following language is predecessor to C Programming Language ? 
 | A | B | BCPL | C++ | 3 | Active |    | 
                 
                  | 86 | C Language 
 | What will be the maximum size of a float variable 
 | 4 | 8 | 2 | 6 | 2 | Active |    | 
                 
                  | 87 | C Language 
 | String constants should be enclosed between ___ 
 | Single quotes | Double quotes | Both a and b | None of These | 2 | Active |    | 
                 
                  | 88 | C Language 
 | Character constants should be enclosed between ___ 
 | Single quotes | Double quotes | Both a and b | None of These | 1 | Active |    | 
                 
                  | 89 | C Language 
 | Which escape character can be used to begin a new line in C ? 
 | \a | \b | \n | \d | 3 | Active |    | 
                 
                  | 90 | C Language 
 | Which symbol is used as a statement terminator in C ? 
 | ; | ~ | # | @ | 1 | Active |    | 
                 
                  | 91 | C Language 
 | What is the valid range of numbers for int type of data ? 
 | 0 to 256 | -32768 to +32767 | -65536 to +65536 | No specific range | 2 | Active |    | 
                 
                  | 92 | C Language 
 | Which of the following are tokens in C? 
 | KEYWORDS | VARIABLES | CONSONANTS | ALL OF ABOVE | 4 | Active |    | 
                 
                  | 93 | C Language 
 | Which of the following symbol is used to denote a pre-processor statement? 
 | ! | @ | $ | # | 4 | Active |    | 
                 
                  | 94 | C Language 
 | C language is available for which of the following Operating Systems? 
 | DOS | WINDOWS | UNIX | ALL OF THESE | 2 | Active |    | 
                 
                  | 95 | C Language 
 | C is a ___ language 
 | High Level | Low Level | Machine Level | All of these | 2 | Active |    | 
                 
                  | 96 | C Language 
 | C was developed in the year 
 | 1970 | 1972 | 1980 | 2000 | 2 | Active |    | 
                 
                  | 97 | C Language 
 | C programming language was developed by 
 | Dennis Ritchie | Ken Thompson | Bill Gates | Peter Norton | 1 | Active |    | 
                 
                  | 98 | C Language 
 | What are demerits of array in c? 
 | Wastage of memory space. We cannot change size of array at the run time. | It can store only similar type of data | Only (i) and (ii) is correct | All of These | 4 | Active |    | 
                 
                  | 99 | C Language 
 | What are merits and  of array in c? 
 | We can easily access each element of array | Not necessity to declare too many variables | Array elements are stored in continuous memory location. | All of These | 4 | Active |    | 
                 
                  | 100 | C Language 
 | What is wild pointer in c? 
 | A pointer in c which has not been initialized is known as wild pointer. | A pointer in c which has been initialized is known as wild pointer. | Both | All of These | 1 | Active |    | 
                 
                  | 101 | C Language 
 | Consider on following declaration in c:    (i)short const register i=10;  (ii)static volatile const int i=10;  (iii)unsigned auto long register i=10;  (iv)signed extern float i=10.0; 
 | Only (iv)is correct | Only (ii) and (iv) is correct | Only (i) and (ii) is correct | Only (iii) correct | 3 | Active |    | 
                 
                  | 102 | C Language 
 | Which of the following is not derived data type in c? 
 | Function | Pointer | Enumeration | Array | 3 | Active |    | 
                 
                  | 103 | C Language 
 | Consider on order of modifiers in following declaration:  (i)char volatile register unsigned c;  (ii)volatile register unsigned char c; 
 | All are correct and same | All are correct but they are different | All are incorrect | Only (ii) is correct declaration | 1 | Active |    | 
                 
                  | 104 | C Language 
 | What is the range of signed int data type in that compiler in which size of int is two byte? 
 | -255 to 255 | -32767 to 32767 | -32768 to 32767 | -32767 to 32768 | 3 | Active |    | 
                 
                  | 105 | C Language 
 | Which of the following is integral data type? 
 | void | char | float | double | 2 | Active |    | 
                 
                  | 106 | C Language 
 | Which of the following is not modifier of data type in c? 
 | extern | interrupt | huge | All of these are modifiers of data type | 4 | Active |    | 
                 
                  | 107 | C Language 
 | The library function used to find the last occurrence of a character in a string is 
 | strnstr() | laststr() | strrchr() | strstr() | 3 | Active |    | 
                 
                  | 108 | Introduction Of Java 
 | What will be the result of the expression  a % b  when a and b are of type int and their values are a = 10 and b = 6? 
 | 1.66 | 4 | 1 | 2 | 2 | Active |    | 
                 
                  | 109 | Introduction Of Java 
 | (JAVA) What will be the result of the expression  a % b when a and b are of type int and their values are a = -17 and b = -6? 
 | 5 | 23 | -5 | -23 | 1 | Active |    | 
                 
                  | 110 | Introduction Of Java 
 | Which of the following is not a hexadecimal number?  (A) 999  (B) (hex)23  (C) 0x556  (D) 0x1F2 
 | c | a | a & b | a,b & c | 3 | Active |    | 
                 
                  | 111 | Introduction Of Java 
 | The type long can be used to store values in the following range:(JAVA) 
 | -231 to 231 - 1 | -263 to 263 - 1 | -232 to 232 - 1 | -264 to 264 | 2 | Active |    | 
                 
                  | 112 | Introduction Of Java 
 | What is garbage collection in the context of Java? 
 | vThe operating system periodically deletes all of the java files available on the | Any package imported in a program and not used is automatically deleted. | When all references to an object are gone, the memory used by the object is | The JVM checks the output of any Java program and deletes anything that | 3 | Active |    | 
                 
                  | 113 | Introduction Of Java 
 | What is byte code in the context of Java? 
 | The type of code generated by a Java compiler | The type of code generated by a Java Virtual Machine | It is another name for a Java source file | It is the code written within the instance methods of a class. | 1 | Active |    | 
                 
                  | 114 | Introduction Of Java 
 | What is different between a Java applet and a Java application? 
 | An application can in general be trusted whereas an applet can't. | An applet must be executed in a browser environment. | An applet is not able to access the files of the computer it runs on | all of the above | 4 | Active |    | 
                 
                  | 115 | Introduction Of Java 
 | A constructor(JAVA) 
 | must have the same name as the class it is declared within | is used to create objects. | may be declared private | ALL OF THE ABOVE | 4 | Active |    | 
                 
                  | 116 | Introduction Of Java 
 | Which of the following is TRUE?(JAVA) 
 | In java, an instance field declared public generates a compilation error | int is the name of a class available in the package java.lang | Instance variable names may only contain letters and digits. | A class has always a constructor (possibly automatically supplied by the java | 4 | Active |    | 
                 
                  | 117 | Introduction Of Java 
 | What is the value stored in result after executing the following  line in a program? result = 6/2*3; 
 | 1.2 | 9 | 1 | 0 | 2 | Active |    | 
                 
                  | 118 | Introduction Of Java 
 | The method setLabel can be used with what type of Object?(JAVA) 
 | DoubleField | int | TextField | String | 1 | Active |    | 
                 
                  | 119 | Introduction Of Java 
 | Trying determine the shape of a cylindrical can made from  1000 cm2 of tin that has the largest possible volume is an  example of:(JAVA) 
 | Array calculation | Text manipulation | Optimization problem | Object oriented programming | 3 | Active |    | 
                 
                  | 120 | Introduction Of Java 
 | A function is:(JAVA) 
 | An entity that receives inputs and outputs | A way of storing values | A sequence of characters enclosed by quotes | A kind of computer | 1 | Active |    | 
                 
                  | 121 | Introduction Of Java 
 | The data type for numbers such as 3.14159 is:(JAVA) 
 | double | int | real | string | 1 | Active |    | 
                 
                  | 122 | Introduction Of Java 
 | If result = 2 + 3 * 5, what is the value of result?(JAVA) 
 | 25 | 14 | 10 | 17 | 4 | Active |    | 
                 
                  | 123 | Introduction Of Java 
 | The following a legal Java statement 
 | m1 = new TextField("sixty"); | 1a = 6; | add(m1); | m1.setText("Hello world); | 3 | Active |    | 
                 
                  | 124 | Introduction Of Java 
 | The following is an example of a bool-expression?(JAVA) 
 | x = 6 | m1.setText("Hello.") | cause == bYes | 70 | 3 | Active |    | 
                 
                  | 125 | Introduction Of Java 
 | The following is NOT an example of a data type(JAVA) 
 | int | public | Button | void | 2 | Active |    | 
                 
                  | 126 | Introduction Of Java 
 | table is a variable that refers to an array(JAVA) 
 | A collection of one or more statements enclosed in braces | A statement involving if and else | A way of declaring variables | a way of setting the value of a variable | 1 | Active |    | 
                 
                  | 127 | Introduction Of Java 
 | What does the following line of code mean? (JAVA)  double table[]; 
 | table is a variable to refers to a real number | table is a variable that refers to two numbers | It is not legal Java code | table is a variable that refers to an array | 4 | Active |    | 
                 
                  | 128 | Introduction Of Java 
 | The sequence \n does what?(JAVA) 
 | Makes a link | Prints a backslash followed by a n | Adds 5 spaces | Starts a new line | 4 | Active |    | 
                 
                  | 129 | Introduction Of Java 
 | If s = "text", what is the value returned by s.length()?(JAVA) 
 | A TextArea can handle multiple lines of text | A textarea can be used for output | TextArea is not a class | TextAreas are used for displaying graphics | 1 | Active |    | 
                 
                  | 130 | Introduction Of Java 
 | What is an infinite loop?(JAVA) 
 | A loop that functions infinitely well | A loop that runs forever | A loop that never starts | A loop that will never function | 2 | Active |    | 
                 
                  | 131 | Introduction Of Java 
 | What are the two parts of a value of type double?(JAVA) 
 | length | significant digits & exponent | mode | numerator | 2 | Active |    | 
                 
                  | 132 | Introduction Of Java 
 | Which is a valid declaration within an interface?(JAVA) 
 | public static short stop = 23; | protected short stop = 23; | transient short stop = 23; | final void madness(short stop); | 1 | Active |    | 
                 
                  | 133 | Introduction Of Java 
 | Which of the following class level (nonlocal) variable declarations will not compile?(JAVA) 
 | protected int a; | transient int b = 3; | private synchronized int e; | volatile int d; | 3 | Active |    | 
                 
                  | 134 | Introduction Of Java 
 | Which of the following are legal declarations for nonnested classes and interfaces?(JAVA) 
 | final abstract class Test {} | public static interface Test {} | final public class Test {} | protected abstract class Test {} | 3 | Active |    | 
                 
                  | 135 | Introduction Of Java 
 | You want a class to have access to members of another class in the same package. Which is the most restrictive access that accomplishes this objective?(jAVA) 
 | public | private | protected | default access | 4 | Active |    | 
                 
                  | 136 | Introduction Of Java 
 | Which cause a compiler error?(JAVA) 
 | int[ ] scores = {3, 5, 7}; | int [ ][ ] scores = {2,7,6}, {9,3,45}; | String cats[ ] = {"Fluffy", "Spot", "Zeus"}; | boolean results[ ] = new boolean [] {true, false, true}; | 2 | Active |    | 
                 
                  | 137 | Introduction Of Java 
 | public class Test { }, What is the prototype of the default constructor?(JAVA) 
 | Test( ) | Test(void) | public Test( ) | public Test(void) | 3 | Active |    | 
                 
                  | 138 | Introduction Of Java 
 | What is the numerical range of a char?(JAVA) 
 | -128 to 127 | -(215) to (215) - 1 | 0 to 32767 | 0 to 65535 | 4 | Active |    | 
                 
                  | 139 | Introduction Of Java 
 | Which is a valid declarations of a String?(JAVA) 
 | String s1 = null; | String s2 = 'null'; | String s3 = (String) 'abc'; | String s4 = (String) '\ufeed'; | 1 | Active |    | 
                 
                  | 140 | Introduction Of Java 
 | Which three are valid declarations of a float?(JAVA) 
 | float f1 = -343; | float f2 = 3.14; | float f4 = 42e7; | float f5 = 2001.0D; | 1 | Active |    | 
                 
                  | 141 | Introduction Of Java 
 | Which one is a valid declaration of a boolean?(JAVA) 
 | boolean b1 = 0; | boolean b2 = 'false'; | boolean b3 = false; | boolean b4 = Boolean.false(); | 3 | Active |    | 
                 
                  | 142 | Introduction Of Java 
 | Which is the valid declarations within an interface definition?(JAVA) 
 | public double methoda(); | public final double methoda(); | static void methoda(double d1); | protected void methoda(double d1); | 1 | Active |    | 
                 
                  | 143 | Introduction Of Java 
 | Which one of the following will declare an array and initialize it with five numbers?(JAVA) 
 | Array a = new Array(5); | int [] a = {23,22,21,20,19}; | int a [] = new int[5]; | int [5] array; | 2 | Active |    | 
                 
                  | 144 | Introduction Of Java 
 | Which is a valid keyword in java? 
 | interface | string | Float | unsigned | 1 | Active |    | 
                 
                  | 145 | Introduction Of Java 
 | Which is a reserved word in the Java programming language? 
 | method | native | subclasses | array | 2 | Active |    | 
                 
                  | 146 | Introduction Of Java 
 | Which will legally declare, construct, and initialize an array?(JAVA) 
 | int [] myList = {"1", "2", "3"}; | int [] myList = (5, 8, 2); | int myList [] [] = {4,9,7,0}; | int myList [] = {4, 3, 7}; | 4 | Active |    | 
                 
                  | 147 | Introduction Of Java 
 | Which one of these lists contains only Java programming language keywords?(JAVA) 
 | class, if, void, long, Int, continue | goto, instanceof, native, finally, default, throws | try, virtual, throw, final, volatile, transient | strictfp, constant, super, implements, do | 2 | Active |    | 
                 
                  | 148 | Concept Of RDBMS 
 | Information can be transferred between the DBMS and a 
 | spreadsheet program | word processor program | graphics program | all of the above | 4 | Active |    | 
                 
                  | 149 | Concept Of RDBMS 
 | In a large DBMS 
 | each user can "see" only a small part of the entire database | each subschema contains every field in the logical schema | each user can access every subschema | none of the above | 1 | Active |    | 
                 
                  | 150 | Concept Of RDBMS 
 | Primitive operations common to all record management system include 
 | print | sort | look-up | all of above | 3 | Active |    | 
                 
                  | 151 | Concept Of RDBMS 
 | The model for a record management system might be 
 | handwritten list | a Rolodex card file | a business form | all of above | 4 | Active |    | 
                 
                  | 152 | Concept Of RDBMS 
 | What is the language used by most of the DBMSs for helping their users to access data? 
 | High level language | SQL | Query Language | 4GL | 3 | Active |    | 
                 
                  | 153 | Concept Of RDBMS 
 | The function of a database is ... 
 | to check all input data | to check all spelling | to collect and organize input data | to output data | 3 | Active |    | 
                 
                  | 154 | Concept Of RDBMS 
 | One data dictionery software package is called 
 | DB/DC dictionary | TOTAL | ACCESS | Datapac | 1 | Active |    | 
                 
                  | 155 | Concept Of RDBMS 
 | Which of the following is a problem of file management system? 
 | difficult to update | lack of data independence | data redundancy | all of above | 4 | Active |    | 
                 
                  | 156 | Concept Of RDBMS 
 | Which of the following is true of a network structure? 
 | It is a physical representation of the data | It allows a many-to-many relationship | It is conceptually simple | It will be dominant data base of the future | 2 | Active |    | 
                 
                  | 157 | Concept Of RDBMS 
 | The ascending order of a data hirerchy is 
 | bit-byte-record-field-file-database | byte-bit-field-record-file-database | bit-byte-field-record-file-database | bit-byte-file-record-field-database | 3 | Active |    | 
                 
                  | 158 | Concept Of RDBMS 
 | A file produced by a spreadsheet 
 | is generally stored on disk in an ASCII text fromat | can be used as is by the DBMS | both a and b | none of the above | 1 | Active |    | 
                 
                  | 159 | Concept Of RDBMS 
 | A transparent DBMS 
 | can not hide sensitive information from users | keeps its logical structure hidden from users | keeps its physical structure hidden from users | both b and c | 3 | Active |    | 
                 
                  | 160 | Concept Of RDBMS 
 | A command that lets you change one or more fields in a record is 
 | insert | modify | lookup | none of above | 2 | Active |    | 
                 
                  | 161 | Concept Of RDBMS 
 | A record management system 
 | can handle many files of information at a time | can be used to extract information stored in a computer file | always uses a list as its model | both a and b | 2 | Active |    | 
                 
                  | 162 | Concept Of RDBMS 
 | Which is the make given to the database management system which is able to handle full text data, image data, audio and video? 
 | full media | graphics media | multimedia | hypertext | 3 | Active |    | 
                 
                  | 163 | Concept Of RDBMS 
 | A set of programs that handle a firm's database responsibilities is called 
 | database management system (DBMS) | database processing system (DBPS) | data management system (DMS) | all of above | 4 | Active |    | 
                 
                  | 164 | Concept Of RDBMS 
 | In the DBMS approach, application programs perform the 
 | storage function | processing functions | access control | all of the above | 2 | Active |    | 
                 
                  | 165 | Concept Of RDBMS 
 | Which of the following contains a complete record of all activity that affected the contents of a database during a certain period of time? 
 | report writer | query language | data manipulation language | transaction log | 4 | Active |    | 
                 
                  | 166 | Concept Of RDBMS 
 | Which of the following is not an advantage of the database approach 
 | Elimination of data redundancy | Ability of associate deleted data | increased security | all of the above | 4 | Active |    | 
                 
                  | 167 | Concept Of RDBMS 
 | Which of the following fields in a student file can be used as a primary key? 
 | class | Social Security Number | GPA | Major | 2 | Active |    | 
                 
                  | 168 | Concept Of RDBMS 
 | An audit trail 
 | is used to make backup copies | is the recorded history of operations performed on a file | can be used to restore lost information | none of the aobve | 2 | Active |    | 
                 
                  | 169 | Concept Of RDBMS 
 | If a piece of data is stored in two places in the database, then 
 | changing the data in one spot will cause data inconsistency | storage space is wasted | in can be more easily accessed | both a and b | 4 | Active |    | 
                 
                  | 170 | Concept Of RDBMS 
 | Sort/Report generators 
 | are faster than index/report generators | require more disk space than indexed/report generators | do not need to sort before generating report | both a and b | 2 | Active |    | 
                 
                  | 171 | Concept Of RDBMS 
 | In order to use a record management system 
 | you need to understand the low level details of how information is stored | you need to understand the model the record management system uses | bother a and b | none of the above | 2 | Active |    | 
                 
                  | 172 | Concept Of RDBMS 
 | Which of the following is not a relational database? 
 | dBase IV | 4th Dimension | FoxPro | Reflex | 4 | Active |    | 
                 
                  | 173 | Concept Of RDBMS 
 | Large collection of files are called 
 | fields | records | database | sectors | 3 | Active |    | 
                 
                  | 174 | Concept Of RDBMS 
 | Batch processing is appropriate if 
 | large computer system is available | only a small computer system is avilbale | only a few transactions are involved | none of the above | 4 | Active |    | 
                 
                  | 175 | Concept Of RDBMS 
 | Generalized database management system do not retrieve data to meet routine request 
 | TRUE | FALSE | none of these | both a & b | 2 | Active |    | 
                 
                  | 176 | Concept Of RDBMS 
 | Which of the following hardware component is the most important to the operation of database management system? 
 | high resolution video display | printer | high speed, large capacity disk | plotter | 3 | Active |    | 
                 
                  | 177 | Concept Of RDBMS 
 | Which of the following is not true of the traditional approach to information processing 
 | there is common sharing of data among the various applications | it is file oriented | programs are dependent on the file | it is inflexible | 1 | Active |    | 
                 
                  | 178 | Concept Of RDBMS 
 | The management information system (MIS) structure with one main computer system is called a 
 | hierarchical MIS structure | distributed MIS structure | centralized MIS structure | decentralized MIS structure | 3 | Active |    | 
                 
                  | 179 | Concept Of RDBMS 
 | A top-to-bottom relationship among the items in a database is established by a 
 | hierarchical schema | network schema | relational schema | all of the above | 1 | Active |    | 
                 
                  | 180 | Concept Of RDBMS 
 | A form defined 
 | where data is placed on the screen | the width of each field | both a and b | none of the above | 1 | Active |    | 
                 
                  | 181 | Concept Of RDBMS 
 | Report generators are used to 
 | store data input by a user | retrieve information from files | answer queries | both b and c | 4 | Active |    | 
                 
                  | 182 | Concept Of RDBMS 
 | Choose the RDBMS which supports full fledged client server application development 
 | dBase V | Oracle 7.1 | FoxPro 2.1 | Ingress | 2 | Active |    | 
                 
                  | 183 | Concept Of RDBMS 
 | The highest  level in the hierarchy of data organization is called 
 | data bank | data base | data file | data record | 2 | Active |    | 
                 
                  | 184 | Concept Of RDBMS 
 | The language used application programs to request data from the DBMS is   referred to as the 
 | DML | DDL | query language | none of the above | 1 | Active |    | 
                 
                  | 185 | Concept Of RDBMS 
 | One approach to standardization storing of data? 
 | MIS | structured programming | CODASYL specification | none of the above | 3 | Active |    | 
                 
                  | 186 | Concept Of RDBMS 
 | Database management systems are intended to 
 | eliminate data redundancy | establish relationship among records in different files | maintain data integrity | all of the above | 4 | Active |    | 
                 
                  | 187 | Concept Of RDBMS 
 | The relational database environment has all of the following components except 
 | users | separate files | database | query languages | 2 | Active |    | 
                 
                  | 188 | Concept Of Lan And Working Wit 
 | It is a program that can search the web on a specific topic for you? 
 | Search engine | Web Browser | WWW | None of these | 1 | Active |    | 
                 
                  | 189 | Concept Of Lan And Working Wit 
 | In sent mail box there is only voice messages? 
 | TRUE | False | may be | always false | 2 | Active |    | 
                 
                  | 190 | Concept Of Lan And Working Wit 
 | The Domain name of commercial organization? 
 | .Mil | .Com | .Edu | All of these | 2 | Active |    | 
                 
                  | 191 | Concept Of Lan And Working Wit 
 | It is piece of programming code that causes some undesired event search as the deletion of file. 
 | Virus | Hacking | Anti-Virus | Windows Security | 1 | Active |    | 
                 
                  | 192 | Concept Of Lan And Working Wit 
 | Format of URL? 
 | Protocol:// host name/ other Information | Protocol://IP Address//WebsiteSiteName/ | www://rssaindia.org.in/user.aspx | None of the above | 1 | Active |    | 
                 
                  | 193 | Concept Of Lan And Working Wit 
 | A company which provides access to the internet? 
 | MTNL Online | BSNL Broadband | Internet Access Providers | All of the above | 4 | Active |    | 
                 
                  | 194 | Concept Of Lan And Working Wit 
 | Machines under internet can be categories as two types 
 | Server and client | Router and protocol | ISP and Network | Bridge and repeater | 1 | Active |    | 
                 
                  | 195 | Concept Of Lan And Working Wit 
 | The connection allow user to exchange data pool and share resources including 
 | Printer | Data | Computing Power | All of The Above | 4 | Active |    | 
                 
                  | 196 | Concept Of Lan And Working Wit 
 | It is define to be an interconnected collection of autonomous computer. 
 | A computer network | Local Area Network | NIC | Intranet | 1 | Active |    | 
                 
                  | 197 | Concept Of Lan And Working Wit 
 | What is the full form of DNS_______________? 
 | Defense Name System | Directory Name System | Defense Number System | Domain Name System | 4 | Active |    | 
                 
                  | 198 | Concept Of Lan And Working Wit 
 | Function of router? 
 | It ensures that information doesn?t go where it?s no needed. | It determines where to send information from one computer to another. | It makes sure that information does make it to the intended destination. | All of the above | 4 | Active |    | 
                 
                  | 199 | Concept Of Lan And Working Wit 
 | A protocol is: 
 | A set of tools for communicating across the internet. | A piece of software that acts as an interface between the user and the inner workings of the interne | The screen saver that appears on the monitor while the PC is on. | An electronic mail that establishes person-to-person connectivity. | 1 | Active |    | 
                 
                  | 200 | Concept Of Lan And Working Wit 
 | It is the most common form of security violation? 
 | Hacking | Virus | Anti-Virus | Windows Security | 1 | Active |    |