Question 1261 :
To find and load a file that has been saved
- select the Close command
- select the New command
- select the Save command
- select the Open command
Question 1262 :
.............. proessing is used when a large mail-order company accumulates orders and processes them together in one large set
- Batch
- Online
- Real-time
- Group
Question 1263 :
A byte is made up of
- Eight bytes
- Eight binary digits
- Two binary digits
- Two decimal points
Question 1264 :
The power of a spreadsheet lies in its
- cells
- formulas
- labels
- worksheets
Question 1265 :
A repair for a known software bug, usually available at no charge on the Internet, is called a(n)
- version
- patch
- tutorial
- FAQ
Question 1266 :
The most famous Recurrent Neural Network is _______
- Perceptrons
- Radial Basis Networks
- Hopfield net
- None of the Above
Question 1267 :
A group of 8 bits is known as
- byte
- kilobyte
- binary digit
- megabit
Question 1268 :
The following are all mobile computing devices, except
- notebook computers
- Cellular phone
- digital scanners
- Personal Digital Assistant
Question 1269 :
Which of the following is the largest unit of storage?
- GB
- KB
- MB
- TB
Question 1270 :
Repeater works in _________ layer of the OSI model.
- application
- transport
- physical
- data link
Question 1271 :
The process of changing a written work already done is called
- filing
- editing
- cutting
- closing
Question 1272 :
MICR technology used for clearance of cheques by banks refers to
- Magnetic Ink Character Recognition
- Magnetic Intelligence Character Recognition
- Magnetic Information Cable Recognition
- Magnetic Insurance Cases Recognition
Question 1273 :
Sending an email is similar to
- writing a letter
- drawing a picture
- talking on the phone
- sending a package
Question 1274 :
Chip is a common nickname for a(n)?
- transistor
- resistor
- integrated circuit
- semiconductor
Question 1275 :
A(n) ___________ is a small, wirless handheld computer that scans items, tags and pulls up the current price (and any special offer) as you shop.
- PSS
- PoS
- Inventary
- Data mining
Question 1276 :
How many types of storage loops exst in magnetic bubble memory?
- 8
- 4
- 16
- 2
Question 1277 :
Technique of using disk space to make programs believe that the system contains more Random Access Memory(RAM) than is actually available is called ______
- Random Access Memory
- Primary Memory
- Secondary Memory
- Virtual Memory
Question 1278 :
The string of eight 0s and 1s is called a
- megabyte
- kilobyte
- byte
- gigabyte
Question 1279 :
RAS stands for
- Random Access Security
- Random Access Service
- Remote Access Security
- Remote Access Service
Question 1280 :
Which function calculates the largest value in a set of numbers?
- Average
- Count
- Minimum
- Maximum
Question 1281 :
Which of the following is NOT a function of the control unit?
- Read instructions
- Execute instructions
- Interpret instructions
- Direct operations
Question 1282 :
Computer Virus is a
- hardware
- Windows tool
- computer program
- Both 2) and 3)
Question 1283 :
Which input device resembles an upside-down mouse?
- Trackball
- Pointing stick
- Track pad
- Touch pad
Question 1284 :
Computers process data into information working exclusively with
- multimedia
- words
- characters
- numbers
Question 1285 :
To select an entire row in the Excelsheet, the shortcut key that is used is
- ctrl+space
- ctrl+arrow key
- shift+arrow key
- shift+space
Question 1286 :
The ______ can be programmed one time either the manufacturer or the computer user
- PROM
- EPROM
- RAM
- ROM
Question 1287 :
Which command allows you to reduce fragments of file and optimize the performance of disk ?
- Scandisk
- Diskcomp
- Chkdsak
- Defrag
Question 1288 :
Memories in which any location can be reached in a fixed amount of time after specifying its address is called ________
- Sequential Access Memory
- Random Access Memory
- Quick Access Memory
- Mass storage
Question 1289 :
_________ is approximately one thousand bytes.
- 1 MB
- 1 GB
- 1 KB
- 1 TB
Question 1290 :
It is the set of programs that enables your computers hardware device and application software to work together
- Operating system
- Helper software
- System software
- Application software