Computer MCQ
Computer MCQ
Officers examination in PDF format. Professional knowledge questions for morning and
afternoon sessions are attached. Questions are asked mainly from areas like
Basic Concept of Computer
Computer Architecture and Origination
Data Structure
Data Communication and Networking
Networking Security
Operating systems
Digital Circuits and System
Systems security
Both are memory based question papers ..
4) Microphone
5) Network
A proxy server is used for which of the following?
1) To provide security against unauthorized users
2) To process client requests for web pages.*
3) To process client requests for database access
4) To provide TCP/IP
5) None of these
A proxy server is computer that functions as an intermediary between a
web browser (such as Internet Explorer) and the Internet. Proxy servers
help improve web performance by storing a copy of frequently used
webpages. When a browser requests a webpage stored in the proxy
server's collection (its cache), it is provided by the proxy server, which is
faster than going to the web. Proxy servers also help improve security by
filtering out some web content and malicious software.
Proxy servers are used mostly by networks in organizations and
companies. Typically, people connecting to the Internet from home will not
use a proxy server.
A(n) ___________ is a small, wirless handheld computer that scans items, tags and pulls up
the current price (and any special offer) as you shop.
1) PSS
2) PoS
3) Inventory
4) Data mining
5) None of these
Personal Shopping System (PSS)
1. Which of the following services use TCP?
a. DHCP
b. SMTP
c. HTTP
d. TFTP
e. FTP
A. a and b
B. b, c and e
C. a, b and d
D. a, c and d
11. 1) ________is hardware and/or software that is used to protect a computer or private
network resources from intruders or hackers.
12. 2)Some Oracle 9i buffer question
13. 3) Firewall decision making Always deny or deny by delay & Accept by
exception???
14. 4) Encapsulating data inside data link layer with header and trailer
15. 5) Project estimation techniques uses the standards of prior proj experience-???
(options function point,cocomo)
16. 6) RSA Asymmetric protocol
17. 7) VPN also called as Tunnel [other options Pipeline,packet switched]
18. 8) One question about compliance validation and compliance monitoring
19. 9) OLTP real time reporting tool Dashboard
20. 10) Cryptogrphy is not concerned about Availability [other options
Integrity,privacy,confidentiality]
21. 11) Cryptanalysis refers to the study of ciphers, ciphertext, or cryptosystems (that
is, to secret code systems) with a view to finding weaknesses in them that will permit
retrieval of the plaintext from the ciphertext
22. 12) How public keys are shared via email or digital signature???
23. 13) Oracle procedure does not contain RETURN [other options BEGIN END INTO]
24. 14) Shutdown method in oracle for a consistent backup Normal
[ABORT,Inconsistent..]
25. 15) encrypt using receivers public key decrypt using receiver private key public
key and asymmetric key encryption
26. 16) Providing application access via third party Software as a service(saas)
27. 17) Notify all stations before transmitting data CSMA/CD or CSMA/CA
28. 18) Removing redundancy in DB Normalization
29. 19) Which of the following provide network redundancy in a local network
environment?Dual backbone
30. 20) best technologies for in indoors are IEEE 802.11 a/ IEEE 802.11 b/IEEE 802.11
n/???
31. 21) In the relationship between course and faculty, the course entity would be Child
22) When overriding a method method inheritance/method signature/method name
???
32. 23) In java Objects can communicate with each other using methods and can call
methods in other classes
33. 24) Security threat associated with java applet when downloaded and run at
client.
34. 25) Connecoin oriented protocol TCP
35. 26) Bridge operated in data link layer
36. 27) Forcing client package without users knowledge/permission PUSH
37. 28) Which one is NOT a phase of the systems development life cycle? Post
Implementation review
38. 29) Which is not a information analysis system DBMS?
39. 30) DBMS not doing programming data
40. 31) A hacker that changes or forges information altering raw data just before a
computer processes it and then changing it back after the processing is completed,
is engaging in Data didling
41. 32) Not a part of disaster recovery Proximity of alternate site near primary site???
42. 33) Most important thing in disaster recovery?personnel safety???
43. 34) Disaster recovery risk assessment and business impact analysis (BIA) are
crucial steps in the development of a disaster recovery plan.
44. 35) Strong password/authentication mechanism Hybrid/static/dynamic/brutal???
45. 36) Which of the following statements is not true about two-tier client-server
database architecture? SQL stmnts may be processed on some of the clients
1.
2.
Delete
b.
Select
c.
Update
d.
Create
e.
The value for an attribute or a column are drawn from a set of values known
as
a.
Tuples
b.
Attributes
c.
Domain
d.
Column
e.
None of these
3.
Primary Key
b.
Strong entities
c.
Weak entities
d.
Primary Key
e.
None Of these
4.
b.
c.
d.
e.
None of these
5.
INSERT
b.
UPDATE
c.
DELETE
d.
CREATE
e.
None of these
6.
DML statement
b.
DDL statement
c.
DCL statement
d.
DSL statement
e.
None of these
7.
COMMIT
b.
ROLLBACK
c.
SAVEPOINT
d.
LOCK
e.
8.
None of these
Which of the following term is related to the stack?
a.
TOP
b.
PUSH
c.
POP
d.
Rear
e.
A, B and C.
9.
Rear
b.
Front
c.
Top
d.
Base
e.
None of these
10.
TCP
b.
FITFP
c.
FTP
d.
TFTP
e.
None of these
11.
Netscape Navigator
b.
Mosaic
c.
Mozilla Firefox
d.
Google chrome
e.
All of these
12.
b.
Loop testing
c.
Behavioral testing
d.
e.
None of these
13.
Debugging
b.
To uncover errors
c.
To gain modularity
d.
To analyze system
e.
None of these
14.
Choose the right sequence of SDLC (Software development life cycle) steps
a.
b.
c.
d.
e.
15.
Linear Sort
b.
Quick Sort
c.
Heap Sort
d.
Insertion Sort
e.
All of these
16.
17.
18.
None of these
FIFO
b.
c.
Shortest remaining
d.
e.
None of these
Deadlock
b.
Starvation
c.
Dormant
d.
All of these
e.
None of these
Assembly language is a _____
a.
b.
c.
d.
User Language
e.
None of these
19.
Assembler
b.
Compiler
c.
Interpreter
d.
e.
None of these
20.
b.
c.
d.
e.
None of these
21.
The mechanism by which the data and functions are bound together with an
a.
Inheritance
b.
Encapsulation
c.
Abstraction
d.
Polymorphism
e.
None of these
22.
Nine
b.
Eight
c.
Seven
d.
Five
e.
Eleven
23.
24.
Decryption & Encryption of data are the responsibility of the ___ layer.
a.
Physical
b.
Data link
c.
Presentation
d.
Session
e.
Application
LANs can be connected by devices called ____ which operate in the data link
layer?
a.
Hub
b.
Bridges
c.
HDLC
d.
Tunnel
e.
None of these
25.
In a ____ topology, if there are n devices in a network, each device has n-1
ports for cable.
a.
Mesh
b.
Star
c.
Bus
d.
Ring
e.
None of these
Question 26 to 50
1 OLAP applications are widely used by ____ and it uses ____ Schema.
a.
RDBMS , Bus
b.
c.
Java , Bus
d.
e.
None of these
Database<File<Record<Field<Byte<Bit
b.
Bit<Byte<Field<Record<File<Database
c.
Bit>Byte>Record>Field>File>Database
d.
Bit>Byte>File>Record>Field>Database
C language
b.
.net programming
c.
RDBMS
d.
C++ Language
e.
b.
C language
c.
C++ language
d.
.net
e.
None of these
Increased security
b.
c.
d.
Programming/data independence
e.
Tuple; Attribute
b.
Attribute; Tuple
c.
Tupple;Domain
d.
Attribute; Domain
e.
None of these
DELETE
b.
UPDATE
c.
DROP
d.
ALTER
e.
None of these
b.
c.
d.
e.
Network Model
b.
c.
E-R Model
d.
All of these
e.
None of these
b.
c.
d.
e.
All of these
1 Which of the following virus overtake computer system when it boots and
destroy in-formation?
a.
Trojan
b.
System infectors
c.
Boot infectors
d.
Stealth virus
e.
None of these
1 The relational model includes two general integrity rules. Integrity rule 1 is
concerned with ____ and integrity rule 2 is concerned with ____
a.
b.
c.
d.
e.
None of these
1 ____ is person who has the central control over both data and application
programs.
a.
System engineer
b.
Database administrator
c.
Database manager
d.
Technical analyst
e.
None of these
Foreign Key
b.
Unique Key
c.
Parent key
d.
Child key
e.
Index key
1 An entity set that does not have sufficient attributes to form a primary key is a
a.
b.
c.
d.
e.
None of these
Three tiered
b.
Multithread
c.
d.
All of these
e.
None of these
Block
b.
Record
c.
Tuple
d.
Table
e.
None of these
b.
c.
d.
Java is related to
e.
b.
c.
d.
e.
Unique Index
b.
Composite Index
c.
Single Index
d.
Primary index
e.
None of these
Delete
b.
Remove
c.
Truncate
d.
Both
e.
and (3)
f.
b.
c.
To redefine a column
d.
e.
1 What is the abbreviation is used for a software package that permits the user to
create , retrieve and maintain records in a database?
a.
DASD
b.
CRMD
c.
DBMS
d.
All of these
e.
b.
c.
d.
e.
Alter Table
b.
Add row
c.
Insert
d.
Append
e.
To create a copy files in the event of system failure, you create a ___
a.
Firewall
b.
Redundancy
c.
Backup
2.
3.
4.
d.
Restore file
e.
None of these
Print server uses___ which is a buffler that holds before it is send to the
printer.
a.
Queue
b.
Spool
c.
Node
d.
Stack
e.
None of these
Which of the following identifies specific web page and its computer on the
web page?
a.
Web site
b.
URL
c.
d.
Domain Name
e.
None of these
CTS
b.
DSR
c.
VDR
d.
e.
None of these
5.
6.
8085
b.
8086
c.
8086A
d.
80C186
e.
None of these
Which uses a Pre-Shared Key that is more than 7 and less than 64 characters
in length?
a.
WPA-PSK
b.
TKIP
c.
AES
d.
All of these
e.
None of these
7.
b.
c.
d.
e.
None of these
8.
Bridges
b.
Satellite
c.
Gateway
d.
Routers
e.
None of these
9.
2 bit addition
b.
3 bit addition
c.
4 bit addition
d.
6 bit addition
e.
None of these
10.
b.
c.
d.
Reduced cost
e.
None of these
11.
VLSI
b.
LSI
c.
MS1
d.
SSI
e.
None of these
12.
Minicomputers
b.
Mainframe computers
c.
Super computer
d.
Microcomputer
e.
None of these
13.
An AND gate
a.
b.
c.
d.
e.
None of these
14.
1806
b.
1807
c.
2806
d.
All of these
e.
None of these
15.
RAM
b.
ROM
c.
Cache Memory
d.
Virtual Memory
e.
None of these
16.
b.
c.
d.
e.
None of these
17.
Read /write
b.
Internet
c.
Search engine
d.
All of these
e.
None of these
18.
Hierarchical
b.
Relational
c.
Network
d.
Transition
e.
None of these
19.
b.
c.
d.
e.
None of these
20.
Rear
b.
Front
c.
Top
d.
Base
e.
None of these
21.
Linear sort
b.
Heap Sort
c.
Insertion sort
d.
Quick Sort
e.
None of these
22.
Graph testing
b.
Basis path
c.
d.
e.
Loop testing
23.
EDI
b.
Credit card
c.
ATM
d.
Payment gateway
e.
Data mining
24.
Stealing
b.
Intrusion
c.
Virus
d.
Worm
e.
None of these
25.
ALTER
b.
MODIFY
c.
UPDATE
d.
COMMIT
e.
DELETE
Q26 to 50
1 ____ refers to a family of IEEE standards dealing with local area network and
metropolitan area network.
a.
802
b.
800
c.
801
d.
803
e.
None of these
1 Which is the general network standard for the data link layer in the OSI
Reference Model?
a.
IEEE 802.1
b.
IEEE 802.2
c.
IEEE 802.3
d.
IEEE 802.4
e.
IEEE 802.6
LAN
b.
WAN
c.
MAN
d.
Internet
e.
None of these
a.
Application layer
b.
Presentation layer
c.
Physical layer
d.
Transport layer
e.
Physical layer
b.
c.
d.
Application layer
e.
None of these
1 Which of the following uses the greatest number of layers in the OSI model?
a.
Bridge
b.
Repeater
c.
Router
d.
Gateway
e.
None of these
Physical layer
b.
c.
Network Layer
d.
All of these
e.
None of these
b.
c.
DTE-DCE
d.
e.
None of these
LAN
b.
WAN
c.
MAN
d.
Internet
e.
None of these
1 At ___ layer, TCP/IP defines two protocols :Transmission Control Protocol (TCP)
and User Datagram Protocol(UDP).
a.
Transport layer
b.
Network layer
c.
Physical layer
d.
Application layer
e.
None of these
Transport
b.
Network
c.
Data link
d.
Physical
e.
Network layer
b.
Session layer
c.
d.
Transport layer
e.
None of these
1 Which of the following TCP/ IP protocol is used for transferring electronic mail
messages from one machine to another?
a.
SNMP
b.
SMTP
c.
RPC
d.
FTP
e.
None of these
FTP
b.
DNS
c.
TELNET
d.
All of these
e.
None of these
802.11
b.
802.1
c.
802.2
d.
802.3
e.
802.10
1 _____ is the continuous ability to send and receive data between interconnected
networks.
a.
FTP
b.
SMTP
c.
TNS
d.
Network Interoperability
e.
None of these
127.0.0.1
b.
2550.0.0
c.
255.255.0.0
d.
255.255.255.0
e.
None of these
127.0.0.1
b.
255.0.0.0
c.
255.255.0.0
d.
127.0.0.0
e.
None of these
Intranets
b.
Switching alternating
c.
d.
Extranets
e.
None of these
Bus network
b.
Ring network
c.
Star network
d.
e.
None of these
192
b.
240
c.
248
d.
224
e.
252
Privacy
b.
Authenticity
c.
Integrity
d.
Non-reputation
e.
None of these
b.
c.
Plaintext, ciphertext
d.
Ciphertext, plaintext
e.
None of these
1 In digital signature the private key is used for ___ and the public key for ____
a.
Encryption, decryption
b.
Decryption, encryption
c.
Plaintext, ciphertext
d.
Ciphertext, plaintext
e.
None of these
Popup blocker
b.
Firewall
c.
Spyware
d.
Spam assassin
e.
None of these
Question 1 to 25
1.
2.
A special type gateway that can keep external users from accessing
resources on the LAN users access the external info is called:
A.
Repeater
B.
Firewall
C.
Encryption
D.
Hub
E.
None of these
What is the name given to the exchange of control signals which is necessary
for establishing a connection between a modem and a computer at one end of
a line and another modem and computer at the other end?
A.
Handshaking
B.
Modem options
C.
Protocol
D.
All of these
E.
3.
None of these
In SQL, which command is used to changes data in a data table?
A.
UPDATE
B.
INSERT
C.
BROWSE
D.
APPEND
E.
None of these
4.
RENAME
B.
REVOKE
C.
GRANT
D.
UPDATE
E.
None of these
5.
ALTER TABLE
B.
DEFINE TABLE
C.
MODIFY TABLE
D.
E.
None of these
6.
Relations
B.
Domains
C.
Queries
D.
E.
None of these
7.
An indexing operation
A.
B.
C.
D.
E.
None of these
8.
9.
Hardware failure
B.
Privacy invasion
C.
D.
All of these
E.
None of these
The language used in application programs to request data from the DBMS is
referred to as the
A.
DML
B.
DDL
C.
Query language
D.
DCL
E.
10.
11.
A ___ contains the smallest unit of meaningful data, so you might call it the
basic building block for a data file.
A.
File structures
B.
Records
C.
Fields
D.
Database
E.
None of these
A ___ means that one record in a particular record type is related to only one
record of another record type.
A.
B.
C.
D.
E.
None of these
12.
13.
None of these
Stack
B.
Graph
C.
Queue
D.
All of these
E.
None of these
A heap allows a very efficient implementation of a
14.
15.
A.
B.
Priority queue
C.
Stack
D.
Trees
E.
None of these
Unique key
B.
Prime attribute
C.
Index key
D.
Primary Key
E.
Null key
____ is primarily used for mapping host names and email destinations to IP
address but can also be used for other purposes.
A.
B.
C.
D.
E.
None of these
16.
Override is a method
A.
B.
For a data that replaces an inherited method for the same operation
C.
D.
All of these
E.
None of these
17.
18.
Local variables
A.
B.
C.
D.
E.
None of these
____ is virus that inserts itself into a systems memory. Then it take number of
actions when an infected file is executed.
A.
B.
Polymorphic virus
C.
Macro virus
D.
E.
Resident virus
19.
This ___ data mining technique derives rules from real world case examples.
A.
Waterfall model
B.
RAD
C.
White Box
D.
Spiral model
E.
20.
A.
Waterfall model
B.
Incremental model
C.
Spiral model
D.
Prototyping model
E.
Incremental model
OLTP
B.
OLAP
C.
DSS
D.
DWH
E.
None of these
Data mining
B.
Data warehousing
C.
Digital signature
D.
Media convergence
E.
None of these
A.
Relation
B.
Tuples
C.
Data structure
D.
An entity
E.
None of these
Linear sort
B.
Quick Sort
C.
Heap Sort
D.
Insertion Sort
E.
None of these
E. Which layer of OSI determines the interface of the system with the user?
A.
Network
B.
Application
C.
Data link
D.
Session
E.
None of these
Question 26-50
1 The tracks on a disk which can be accused without repositioning the R/W heads
is
A.
Surface
B.
Cylinder
C.
Cluster
D.
All of these
E.
None of these
B.
They use icons and menus that users can select with a mouse
C.
D.
E.
None of these
1 A computer system consisting of its processor, memory and I/O devices accepts
data, processes it and produces the output results .Can you tell in which
component is the raw data fed?
A.
Mass Memory
B.
Main Memory
C.
Logic Unit
D.
Arithmetic unit
E.
None of these
1 The mechanical diskette drive in which you insert your diskette is connected to
the computersbus
A.
Data
B.
Communication
C.
Address
D.
Parallel
E.
None of these
B.
C.
D.
All of these
E.
None of these
1 You are in the process of analyzing a problem that requires you to collect and
store TCP/ IP Packets. Which of the following utilities is best suited for this
purpose?
A.
NBTSTAT
B.
Performance Monitor
C.
NETSTAT
D.
Network Monitor
E.
Hierarchical Schema
B.
Network Schema
C.
Relational Schema
D.
E.
None of these
1 The process of transferring data intended for a peripheral device into a disk (or
intermediate store) so that it can be transferred to peripheral at a more
convenient time or in bulk is known as
A.
Multiprogramming
B.
Spooling
C.
Caching
D.
Virtual programming
E.
None of these
1 Which of the following system program forgoes the production of object code to
generate absolute machine code and load it into the physical main storage
location from which it will be executed immediately upon completion of the
assembly?
A.
B.
C.
Macro processor
D.
Compiler
E.
None of these
B.
Linker
C.
Assembler or translator
D.
Macro processor
E.
None of these
1 From what location are the 1st computer instructions available on boot up ?
A.
ROM BIOS
B.
CPU
C.
Boot.ini
D.
CONFIG.SYS
E.
None of these
1 Abstraction is
A.
B.
C.
A tree structure
D.
All of these
E.
None of these
Generalization
B.
Specialization
C.
Association
D.
Object
E.
None of these
1 Consider an operation of addition. For two numbers, the operating will generate
a sum. If the operand are strings, and the same operation would produce a
third string by concatenation. This features is called ____.
A.
Inheritance
B.
Encapsulation
C.
Polymorphism
D.
Binding
E.
None of these
Attribute
B.
Degree
C.
Entities
D.
Cartesian
E.
None of these
Is a schema object
B.
C.
D.
All of these
E.
None of these
Terminal symbols
B.
Nonterminal symbol
C.
Production line
D.
List
E.
None of these
Business modeling
B.
Data modeling
C.
Application generation
D.
E.
None of these
1 ____ is a set design steps that allows a DFD with transform flow characteristics to
be mapped into a predefined template for program structure.
A.
Transaction flow
B.
Contributor
C.
Transform mapping
D.
Design evaluation
E.
None of these
1 A combinational logic circuit which is used to send data coming from a single
source to two or more separate destinations is called as
A.
Decoder
B.
Encoder
C.
Multiplexer
D.
Demultiplexer
E.
None of these
AND
B.
OR
C.
EXOR
D.
NAND
E.
None of these
101001.1100
B.
101000.0100
C.
010111.0011
D.
101000.0011
E.
None of these
B.
C.
D.
During subtraction
E.
None of these
Clock
B.
C.
D.
All of these
E.
None of these
1 The TRAP is one of the interrupts available its INTEL 8085. Which one statement
is true of TRAP?
A.
It is level triggered
B.
C.
D.
E.
None of these
2.
8085
2.
6502
3.
Z80
4.
68000
5.
None of these
6800
2.
8080
3.
6800A
4.
8000
5.
3.
RST 5.5
2.
RST 7.5
3.
TRAP
4.
INTR
5.
None of these
4.
5.
All of these
2.
3.
4.
5.
None of these
Tuple
2.
Relation
3.
File
4.
Attribute
5.
None of these.
6.
Multiplexer means
1.
2.
3.
4.
All of these
5.
None of these
7.
NOT gate
2.
NAND gate
3.
AND gate
4.
XOR gate
5.
8.
9.
TCL
2.
T1L
3.
DTL
4.
MOS
5.
RTL
1.
Hierarchical schema
2.
Network Schema
3.
Relational Schema
4.
5.
10.
Relations
2.
Domains
3.
Queries
4.
5.
11.
12.
Delete
2.
Insert
3.
Look up
4.
5.
None of these
The way a particular application views the data from the database that the
application uses is a :
1.
Module
2.
Relational model
3.
Schema
4.
Subschema
5.
None of these
13.
2.
3.
4.
5.
None of these
14.
2 NF
2.
3 NF
3.
4 NF
4.
BCNF
5.
None of these
15.
16.
Foreign key
2.
Secondary key
3.
Candidate key
4.
Composite key
5.
None of these
Which of the following SQL commands can be used modify existing data in a
database table?
1.
MODIFY
2.
UPDATE
3.
CHANGE
4.
NEW
5.
17.
18.
None of these
Each node in a linked list must contain at least:
1.
Three fields
2.
Five fields
3.
Four fields
4.
One fields
5.
Two fields
Log n
2.
(n-1)/2
3.
n/2
4.
(n+1)/2
5.
None of these
19.
2.
n2
3.
nlog(n)
4.
log(n)
5.
None of these
20.
Stack
2.
Set
3.
List
4.
Queue
5.
None of these
21.
22.
Three
2.
Five
3.
Six
4.
Eight
5.
Seven
Which data communication method is used to transmit the data over a serial
communication link.
1.
Simplex
2.
Full duplex
3.
Half duplex
4.
5.
23.
Transport
2.
Session
3.
Application
4.
Physical
5.
24.
Presentation
Which of the following is not a connecting device?
1.
Bridge
2.
Trans receiver
3.
Router
4.
Repeater
5.
None of these
25.
Physical
2.
Data link
3.
Network
4.
5.
None of these
Question 26-50
1 How many hosts are attached to each of the local area network at your site?
1.
128
2.
256
3.
254
4.
64
5.
None of these
Word processing
2.
Spread sheet
3.
Object program
4.
UNIX
5.
None of these
1 Thrashing
1.
2.
3.
4.
None of these
Code generator
2.
Risk analysis
3.
Code optimizer
4.
Reengineering
5.
None of these
2.
To identify a top level function and then create hierarchy of lower level
modules and components
3.
4.
All of these
5.
None of these
Respond to customer
2.
3.
4.
5.
None of these
2.
3.
4.
5.
1 Data mining is
1.
2.
3.
4.
All of these
5.
None of these
2.
Data mining
3.
OLAP
4.
5.
None of these
Array
2.
Lists
3.
Stacks
4.
5.
None of these
2.
3.
4.
5.
None of these
2.
3.
4.
5.
None of these
1 Software testing is
1.
2.
3.
4.
5.
None of these
Functional testing
2.
3.
Development testing
4.
Maintenance testing
5.
None of these
Waterfall Model
2.
Prototyping
3.
Interactive enhancement
4.
Spiral model
5.
All of these
Deadlock prevention
2.
Deadlock avoidance
3.
Deadlock recovery
4.
Mutual exclusion
5.
All of these
Rear
2.
Front
3.
Top
4.
Base
5.
None of these
1 Pointer is used in
1.
Direct Addressing
2.
Indirect Addressing
3.
Indexed mode
4.
Immediate Addressing
5.
None of these
1.
2.
3.
4.
Call by preference
5.
None of these
1 HTTP refers to
1.
2.
3.
4.
5.
None of these
Attachment
2.
Hyperlink
3.
Mailbox
4.
Ip address
5.
None of these
1 A(n) ____ is a collection of information that determines which files you can
access and which setting you use.
1.
Network
2.
User account
3.
Operating system
4.
File system
5.
None of these
1 To print a document
1.
2.
3.
4.
5.
None of these
ROM memory
2.
Processor
3.
Hard drive
4.
Mother board
5.
RAM memory
printf(%d,a);
printf(%d,a); return 0;
}
answer choices
1.
20 20
2.
10 20
3.
20 10
4.
10 10
5.
Compilation Error