New
ixamBee Expert Talk Session by ex-GM, NABARD
Login
Register
More Topics
Home
Questions
Computer
Important Computer Questions
Practice Important Computer Questions Questions and Answers
Question Listing
It is device that optically scans images, printed text, handwriting or an object and converts it to a digital image called
An automated process of negotiation that dynamically sets parameters of a communications channel established between two entities before normal communicati...
The translation of data into a secret code is known as _______
____ is a situation where large amounts of computer resources are used to do a minimal amount of work
Graphical bodies used to represent a person in a virtual meeting place are known as
Who is recognised as the Father's of the Internet?
Who is called the "father of modern information theory"
Who is recognised as the Father's of the Internet?
What is the shortcut key for Slide Show in Powerpoint?
What does DMA stand for?
What type of virus uses computer hosts to reproduce itself?
Restart of computer is called ...... when computer is already ON.
Which one of the following DOS commands sends contents of the screen to an output device?
VGA is
Switches work on which OSI layer?
A computer program that converts an entire program into machine language is called a/an
What are the three type groups of vector data?
What kind of memory is both static and non -volatile?
CAD stands for
Which of the following is not a positional number system?
Which of the following are the types of Path names?
The transfer between CPU and Cache is ______________
A printer that prints one line at a time and has a predefined set of characters is called _______
Components that provide internal storage to the CPU are ______
Who provides the interface to access the services of the operating system?
What type of scheduling is round-robin scheduling?
Which network topology requires a central controller or hub?
Which of the following algorithms is used to avoid deadlock?
Magnetic disk is an example of
Which type of commands in MS-DOS needs external files to perform their action?
Which of the following is the least secure method of authentication?
ASCII stands for
Bluetooth is an example of __________
What is the name of the batch file that is automatically run when MS-DOS is booted?
Interpolation is made possible by a principle called
The use of combination of 1’s and 0’s is feature of which of the following type of computer language?
In programming, repeating some statements is usually called
A logical schema
GIS captures and analyses ______ data.
P2P is a ......... application architecture.
Page 1 of 6
Previous
1
2
3
4
5
6
Next
Last ››
More Topics
×
Browser
Computer Architecture
Computer Awarenes
Computer Book
Computer Language
Computer Memory
Computer Miscellaneous
Computer paper
Database Management System
Email
MS Office
Network
Software System
Today's Class
There is no live class for today.
×
I Pledged to:
callback wala button
×
Please Enter Details
Please enter Name
We'll never share your email with anyone else.
Please enter Correct Mobile Number
We'll never share your email with anyone else.
Request a Call Back
Thank You
Update Address
Please enter complete address
Please enter pincode
Please enter State
Select State
Please enter City
Add Address
X