Home
Current Affairs January 2024

What is the correct answer?

4

Access time is

A. seek time + latency time

B. seek time

C. seek time ? latency time

D. latency time

Correct Answer :

A. seek time + latency time


Related Questions

What is the correct answer?

4

The act of retrieving existing data from memory is called

A. Read-out

B. Read from

C. Read

D. All of above

What is the correct answer?

4

A dumb terminal has

A. an embedded microprocessor

B. extensive memory

C. independent processing capability

D. a keyboard and screen

What is the correct answer?

4

________ are high-end printers

A. Inkjet

B. Laser

C. Thermal

D. Dot matrix

What is the correct answer?

4

Which of the following programming language started from second generation?

A. Cobol

B. BASIC

C. C

D. LISP

What is the correct answer?

4

ASCII stands for

A. American standard code for information interchange

B. All purpose scientific code for information interchange

C. American security code for information interchange

D. American Scientific code for information interchange

What is the correct answer?

4

A language which is close to that used within the computer is

A. High-level language

B. Assembly language

C. Low-level language

D. All of the above

What is the correct answer?

4

Integrated Circuits (ICs) are related to which generation of computers?

A. First generation

B. Second generation

C. Third generation

D. Fourth generation

What is the correct answer?

4

Which of the following are the best units of data on an external storage device?

A. Bits

B. Bytes

C. Hertz

D. Clock cycles

What is the correct answer?

4

A computer consists of

A. A central processing unit

B. A memory

C. Input and output unit

D. All of the above

What is the correct answer?

4

The two kinds of main memory are:

A. Primary and secondary

B. Random and sequential

C. ROM and RAM

D. All of above

What is the correct answer?

4

Which statement is valid about computer program?

A. High level languages must be converted into machine language to execute

B. High level language programs are more efficient and faster to execute

C. It is more difficult to identify errors in high level language program than in low level programs

D. All of above

What is the correct answer?

4

Before a disk drive can access any sector record, a computer program has to provide the records disk address. What information does this address specify?

A. Track number

B. All of above

C. Sector number

D. Surface number

What is the correct answer?

4

Which of the following file organization is most efficient for a file with a high degree of file activity?

A. Sequential

B. ISAM

C. VSAM

D. B-Tree Index

What is the correct answer?

4

The system unit of a personal computer typically contains all of the following except:

A. Microprocessor

B. Disk controller

C. Serial interface

D. Modem

What is the correct answer?

4

Which of the following is not an electronic computer?

A. ENIAC

B. ABC

C. UNIVAC

D. EDVAC

What is the correct answer?

4

The task of performing operations like arithmetic and logical operations is called

A. Processing

B. Storing

C. Editing

D. Sorting

What is the correct answer?

4

The Second Generation Computer was based on .

A. Vacuum Tube

B. Silicon Chips

C. Transistor

D. Bio Chips

What is the correct answer?

4

The first computer introduced in Nepal was

A. IBM 1400

B. IBM 1401

C. IBM 1402

D. IBM1402

What is the correct answer?

4

What does DMA stand for?

A. Distinct Memory Access

B. Direct Memory Access

C. Direct Module Access

D. Direct Memory Allocation

What is the correct answer?

4

ASCII and EBCDIC are the popular character coding systems. What does EBCDIC stand for?

A. Extended Binary Coded Decimal Interchange Code

B. Extended Bit Code Decimal Interchange Code

C. Extended Bit Case Decimal Interchange Code

D. Extended Binary Case Decimal Interchange Code

What is the correct answer?

4

Which of the following have low failure rate?

A. Mechanical devices

B. electronic devices

C. electro-mechanical devices

D. None of above

What is the correct answer?

4

Which of the following is not anti-viruses software?

A. NAV

B. F-Prot

C. Oracle

D. McAfee

What is the correct answer?

4

The ________ data mining technique derives rules from real-world case examples.

A. Rule discover

B. Signal processing

C. Neural nets

D. Case-based reasoning

What is the correct answer?

4

The complete picture of data stored in database is known as

A. Record

B. Schema

C. System flowchart

D. DBMS

What is the correct answer?

4

Chief component of first generation computer was

A. Transistors

B. Vacuum Tubes and Valves

C. Integrated Circuits

D. None of above

What is the correct answer?

4

A memory that holds micro programs is

A. Core memory

B. ROM

C. RAM

D. Control memory

What is the correct answer?

4

Which of the following is the largest unit?

A. data

B. field

C. record

D. database file

What is the correct answer?

4

A byte consists of

A. One bit

B. Four bits

C. Eight bits

D. Sixteen bits

What is the correct answer?

4

What is an interpreter?

A. An interpreter does the conversion line by line as the program is run

B. An interpreter is the representation of the system being designed

C. An interpreter is a general purpose language providing very efficient execution

D. None of the above

What is the correct answer?

4

________is defined as any crime completed through the use of computer technology.

A. Computer forensics

B. Computer crime

C. Hacking

D. Cracking