901) Most common channel used by networks today is telephone lines
STUDY FOR CIVIL SERVICES
902) Sybase SQL server and Microsoft SQL server 7.0 is not an example of RDBMS
903) In programming language, Null point is used to tell end of linked list
904) A technique which collects all deleted space onto free storage list is called garbage
collection
905) Node to node delivery of the data unit is the responsibility of the data link layer
906) Insulating material is the major factor that makes co axial cable less susceptible to
noise than twisted pair cable
907) A data communication system covering an area the size of a town or city is MAN
908) Virtual memory system allows the employment of the full address space
909) The basic circuit of ECL supports the OR-NOR logic
910) Micro instructions are kept in control store
STUDY FOR CIVIL SERVICES
911) In HTML coding no shade attribute of HR tag suppresses the shading effect and fields
a solid line
912) Internet domains are classified by their functions. In that regard “.com” represents
commercial
913) HTTP in URL stands for hyper text transfer protocol
914) The “Nyquist theorem” specifies the minimum sampling rate to be twice the bandwidth
of a signal
915) Memory allocation at the routine is known as dynamic memory allocation
916) In HTML loading, <BR> tag is used for displaying a new line
917) HTTP protocols are used by internet mail
918) A policy on firewalls needs not ensure that it is logically secured
919) The script which is designed to receive value from the web users is java script
STUDY FOR CIVIL SERVICES
920) GET method and HEAD method is the C91 method of involving a C91 program
921) Analog switched line telephone service is least expensive
922) A toll used to find a synonym or antonym for a particular word is thesaurus
923) In C++ coding, Cout<<”tent”; is used to display character or strings or numeric screen
924) In this processing, a number of jobs are put together and executed as a group batch
processing
925) The process of finding and correcting errors in a program is a process called
debugging
926) cn pass command is used to change your password in UNIX system
927) HTML code is always starts with <html> </html>
928) If there are 5 routers and b networks in an internet work using link state routing, there
STUDY FOR CIVIL SERVICES
will be 5 routing tables
929) A scripting language similar to HTML and which runs only on a browser is java script
930) By RAID technique, data is stored in several disk units by breaking them into smaller
pieces and storing each piece in separate disk
931) The most popular network protocol whose routing capabilities provide maximum
flexibility in an enterprise wide network is known as TCP/IP
932) New group that enable you to communicate with other Microsoft windows user about
issues and concerns with your computer
933) Analog-digital conversion type needs sampling of a signal
934) In an optical fiber, the inner core is less dense than the cladding
935) Six types of heading are available in HTML
STUDY FOR CIVIL SERVICES
936) RDBMS is an acronym for relational database management system
937) In MS-Word, page layout view is also known as true WYS/WYG
938) In HTML coding, <UL> (Unordered list) is used to give bullets in your document
939) Transmission media are usually categorized as guided or unguided
940) A virtual circuit is the physical connection between an end point and a switch or
between two switches
941) Passing of the frame to next station can happen at a token ring station
942) R-C coupling method is suitable for voltage amplification
943) Normal is not a type of HTML pages
944) In HTML coding <LI> tag is used for denoting items in a list of type <UL>
STUDY FOR CIVIL SERVICES
945) In MS-Word the keyboard shortcut F7 used for spelling and grammar check
946) DBMS is not an operating system
947) HTML is basically used to design web-site
948) In HTML coding, Dynamic web-pages are created in advance of the user’s request
949) In Dos, primary name of a file can have a maximum of 10 characters
950) du command is used to show file system disk usage in UNIX
951) Maximum length of a text file is 255 characters
952) Frame format of CSMA/CD and Ethernet protocol differ in the block error control
953) On an Ethernet LAN implementation with 10 base 5 the maximum number of
segments can be five
954) Overflow condition in linked list may occur when attempting to create a node when
linked list is empty
STUDY FOR CIVIL SERVICES
955) Code segment register is where the microprocessor looks for instruction
956) Web-site is collection of web-pages and Home-page is the very first page that we see
on opening of a web-site
957) The subsystem of the kernel and hardware that cooperates to translate virtual to
physical addresses comprises memory management subsystem
958) A device operating at the physical layer is called a repeater
959) FORTRAN is a mathematically oriented languages used for scientific problems
960) If we want to convert the text which is in small letters to capital letters then select the
required text and press Shift +F3
961) Datagram packet switching uses the entire capacity of a dedicated link
STUDY FOR CIVIL SERVICES
962) In the datagram approach to packet switching, each packet of a message follows the
same path from sender to receiver
963) FDM technique transmits analog signals
964) X.21 protocol consists of only physical level
965) In a dedicated link, the only traffic is between the two connected devices
966) In a start topology, if there are n devices in network, each device has n-1
967) A unique number assigned to a process when the process first starts running PID
968) Modems is necessary for multiplexing
969) In MS-Word WYSIWYG stands for what you see is where you get
970) The primary purpose of shutdown procedure in UNIX system is that all active process
may be properly closed
971) In time- division circuit switching, delivery of data is delayed because data must be
STUDY FOR CIVIL SERVICES
stored and retrieved from RAM
972) Subnet usually comprises layers 1 & 2, layer 1 through 3 of OSI model
973) An image in a web-page can be aligned left and right using HTML coding
974) RFC stands for request for comment
975) Packet filtering firewall and proxy firewall is not a type of firewall
976) Most news reader’s presents news groups articles in threads
977) The sharing of a medium and its path by two or more devices is called multiplexing
978) Sending messages, voice, and video and graphics files over digital communication link
is done by the method e-mail
979) In a computer network, a computer that can control a group of other computers for
sharing information as well as hardware utilities is known as server
STUDY FOR CIVIL SERVICES
980) Telephone number, zip code is defined as a numeric field
981) In shell programming, tr command is used for character translation
982) Cat text>>output would append a file called test to the end of a file called output
983) In a network with 25 computers, mesh topology would require the more extensive
cabling
984) Dialog control is a function of the presentation layer
985) The program which takes user input, interprets it and takes necessary action is shell
986) Most appropriate data structure in C to represent linked list is array
987) Menu bar is usually located below that title bar that provides categorized options
988) Latest version of Microsoft Word is Word XP
989) You save your computer files on disc and in folders
STUDY FOR CIVIL SERVICES
990) when the text automatically goes onto the next line this is called word wrap
991) WYSIWYG is short for what you see is what you get
992) Left justify is the same as align left
993) To put text on the right of the page use the align right button
994) Lotus 1-2-3 is a popular DOS based spreadsheet package
995) 65,535 characters can be typed in a single cell in excel
996) Comments put in cells are called cell tip
997) Getting data from a cell located in a different sheet is called referencing
998) A numeric value can be treated as a label value if it precedes with apostrophe
999) Data can be arranged in a worksheet in an easy to understand manner using auto
formatting, applying styles, changing fonts
STUDY FOR CIVIL SERVICES
1000) An excel workbook is a collection of worksheets and charts
1001) Most manufacturers setup their BIOS to load into upper memory during the boot
process
1002) Device drivers loaded in the config.sys file is loaded into the following memory area:
Conventional memory
1003) 40ns memory speeds is the fastest
1004) System software often uses the ROM BIOS
1005) In CMOS setup, if you enable shadowing ROM is copied to RAM
1006) Static variables are local to the block in which they are declared.
1007) During the normal PC boot process, ROM BIOS is active first
1008) During boot-up, the memory test checks and verifies that contiguous memory is
installed
STUDY FOR CIVIL SERVICES
1009) 601 error code identifies a floppy drive problem
1010) If you get frequent general protection faults, this could indicate poor quality of
memory chips
1011) You are looking at a memory module thought to be a DIMM module. 168 pins would
be on a DIMM module
1012) The system BIOS and ROM chips are called firmware
1013) Extended located above the first 1024K of memory
1014) WRAM type of RAM is normally the fastest
1015) RAM component is used for short-term data storage
1016) A SIMM has 40 pins
1017) RAM provides quickest access to data
1018) Narrowcast linking is not a transmission technology
STUDY FOR CIVIL SERVICES
1019) The data flow diagram is for analyzing requirements of user
1020) The elements of computer processing system are hardware, data, users and
procedures
1021) On August 23, 2005 an accounting clerk prepared an invoice dated August 31, 2005.
Range check control can check this
1022) Library management software is for documenting the changes that are made to
program and controlling the version numbers of the programs
1023) Steganography is hiding the data but not necessarily making it invisible and not easily
detectable
1024) A computer is an electronic device
1025) An online transaction is transaction done via internet
1026) Using anti-virus software is preventive measure
STUDY FOR CIVIL SERVICES
1027) For security we should consider local data reduction, event correction low resource
utilization
1028) OS is not a peripheral of PC
1029) The most common input device used today is keyboard
1030) The third generation of the computer were in 1965-1971
1031) Gateways to allow a network to use the resources of another main frame is a
component of internet
1032) Mouse cannot be shared
1033) EDI means electronic data interface
1034) Mainframes network where a huge compute does all computing and front end PCs
are dumb terminals
1035) A modem that cannot be moved from its position is called fixed modem
STUDY FOR CIVIL SERVICES
1036) A device that receives data from slow speed devices, and transmits it to different
locations is called remote concentrator
1037) Organization would prefer in house development of software to ensure that the
development adhere to defined quality
1038) Actual intelligence is not a feature of PC
1039) Network that uses two OSI protocol layers as against three used in X.25 is a “frame
relay”
1040) Microsoft excel is versatile application and spread sheet program
1041) System flowcharts show relationship that link the input processing and output of the
system
1042) To identifying the system to be tested the penetration testing is done
1043) Platform in computer world means computer hardware and operating systems
STUDY FOR CIVIL SERVICES
1044) A character that retains its value during program execution is constants
1045) Data accuracy is not done by modem
1046) OMR is used to read choice filled up by a student in common entrance tests
1047) The term remote with respect to network means machine located far off
1048) In two-tier client server architecture the client is usually fat client
1049) The senior management provides the go-ahead approval for the development of
projects
1050) Manual data can be put into computer by Scanner