Question 691 :
What is output ?
- What the processor takes from the user
- What the user gives to the processor
- What the processor gets from the user
- What the processor gives to the user
Question 692 :
What happens when a worksheet is not protected?
- It cannot be opened.
- It cannot be saved.
- It cannot be edited.
- It can be edited.
Question 693 :
Which was the first computer to use transisters instead of vacuum tubes?
- Intel?650
- Burroughs E?101
- Datametric?1000
- IBM 1401
Question 694 :
_________ is a computational model based on the structure of biological neural networks?
- Artificial Neural Network (ANN)
- Biological Network
- Both(A) - (B)
- None of the Above
Question 695 :
Which of the following terms is the most closely related to main memory?
- Non Volatile
- Permanent
- Temporary
- None of the Above
Question 696 :
IEEE _______ standard is used for wirless LAN.
- 802.12
- 802.13
- 802.15
- 802.11
Question 697 :
_______ provides electronic data interchange facility.
- ISDN
- LAN
- VAN
- CAN
Question 698 :
A _______ terminal can display images as well as text
- text
- dumb
- graphical
- None of the Above
Question 699 :
What is a back up ?
- Restoring the information backup
- An exact copy of a system's information
- The ability to get a system u and runnign in the event of a system crash or failure
- All of these
Question 700 :
A unit for measuring data trasmission speed is called
- cache
- broadbank channel
- byte
- baud
Question 701 :
Laser printers and Ink-jet printers are an example of _______
- Impact
- Non Impact
- Both (A) and (B)
- None of the Above
Question 702 :
What menu is selected to cut, copy and paste?
- File
- Tools
- Special
- Edit
Question 703 :
What is meant by a dedicated computer ?
- Which is used by one person only
- Which is assigned one and only one task
- Which uses one kind of software
- Which is meant for application software
Question 704 :
All of the following are examples of real security and privacy risks except
- Hackers
- Spam
- Viruses
- Identity theft
Question 705 :
The operating system called UNIX is typically used for
- desktop computers
- laptop computers
- super computers
- All the above
Question 706 :
Any data or instructions sent to the computer is termed as
- storage
- output
- input
- information
Question 707 :
Which input device is used to read information on a credit card?
- Graphic Tablet
- Numeric Keyboard
- Bar Code reader
- Magnetic Stripe reader
Question 708 :
The Internet is an example of __________ network.
- star
- bus
- hybrid
- mesh
Question 709 :
Which term identifies a specific computer on the web and the main page of the entire site?
- URL
- Web site address
- Hyperlink
- Domain name
Question 710 :
Unwanted repetitious messages, such as unsolicited bulk - e-mail is known as
- Spam
- Trash
- Calibri
- Courier
Question 711 :
What is the number of bit pattern provided by a 7?bit code?
- 256
- 128
- 64
- 512
Question 712 :
A CPU contains
- a card reader and a printing device
- an analytical engine and a control unit
- a control unit and an arithmetic logic unit
- an arithmetic logic unit and a card reader
Question 713 :
By default, your documents print in ..... mode
- Landscape
- Portrait
- Page setup
- Print preview
Question 714 :
A field is a related group of
- records
- files
- characters
- cables
Question 715 :
Which of the following storage media provides sequential access only ?
- Floppy disk
- Magnetic disk
- Magnetic tape
- Optical disk
Question 716 :
As compared to diskettes, the hard disks are
- More expensive
- More portable
- Less rigid
- Slowly accessed
Question 717 :
_________ are distinct items that don't have much meaning to you in a given countext.
- Fields
- Data
- Queries
- Properties
Question 718 :
Which of the following refers to the fastest, biggest and most expensive computers?
- Personal Computers
- Supercomputers
- Laptops
- Notebooks
Question 719 :
The first step in the transaction processing cycle is ________.
- database operations
- audit
- data entry
- user inquiry
Question 720 :
Two or more computers connected to each other of sharing information form a _____
- Network
- Router
- Server
- Tunnel