Description : Which type of commands in DOS needs additional files for their execution? 1) Internal Commands 2) External Commands 3) Batch Commands 4) Redirector
Last Answer : 2) External Commands
Description : Which file in MS-DOS contains internal commands that are loaded during Booting process? 1) IO.SYS 2) MSDOS.SYS 3) COMMAND.COM 4) CONFIG.SYS
Last Answer : 4) CONFIG.SYS
Description : Which file in MS-DOS contains internal commands that are loaded during Booting process? 1 IO.SYS 2 MSDOS.SYS 3 COMMAND.COM 4 CONFIG.SYS
Last Answer : 4 CONFIG.SYS
Description : Define internal and external commands.
Last Answer : Internal Commands: Commands which are built into the shell. For all the shell built-in commands, execution of the same is fast in the sense that the shell doesn't have to search the given path for them in ... usually is at /usr/bin, the executable /usr/bin/cat gets executed. Examples: ls, cat etc.
Description : The ‘IBM-DOS’ is a (1) Single user operating system (2) Multiuser operating system (3) Batch operating system (4) Time-sharing operating system
Last Answer : Single user operating system
Description : What do you understand by the term DOS: a) Downloading the system program from the Internet b) Downloading operating system c) The master control program of the computer which helps the computer to ... d) The programs which helps computer to check the various peripheral devices e) None of The Above
Last Answer : e) None of The Above
Description : DOS batch file that prints out contents of a folder in notepad?
Last Answer : You must not have looked very hard :) First result on Google when searching for: contents of a folder into a notepad text file.
Description : Which of the following commands displays names of files in sorted order? 1) DIR/N 2) DIR/SO 3) DIR/AN 4) DIR/AH
Last Answer : 3) DIR/AN
Description : Which of the following commands displays names of files in sorted order? 1 DIR/N 2 DIR/SO 3 DIR/AN 4 DIR/AH
Last Answer : 3 DIR/AN
Description : Which one of the following is an MS-DOS external command ? (1) DIR (2) COPY (3) FORMAT (4) PROMPT
Last Answer : FORMAT
Description : The ALU of a computer responds to the commands coming from A) Primary memory B) Control section C) External memory D) Cache memory
Last Answer : Answer : B
Description : The computer needs additional components called _______ to accomplish its input, output and storage functions: a) mice b) specifications c) architecture d) peripheral e) None of these
Last Answer : d) peripheral
Description : What are the keyboard commands for saving database files ?
Last Answer : The keyboard command for saving database files is Ctrl + S
Description : Which of the following statement is not correct with reference to cron daemon in UNIX O.S? (A) The cron daemon is the standard tool for running commands on a predetermined schedule. (B) It starts ... command lines and the times at which they invoked. (D) Crontab for individual users are not stored.
Last Answer : (D) Crontab for individual users are not stored.
Description : The ALU of a computer responds to the commands coming from a. Primary memory b. Control section c. External memory d. Cache memory
Last Answer : Control section
Last Answer : b. Control section
Description : An outgoing batch of students wants to gift a PA system worth Rs 4,200 to their school. If the teachers, offer to pay 50% more than the students and an external benefactor gives three times the teacher's contribution, then ... the teachers donate? A) Rs 600 B) Rs 840 C) Rs 900 D) Rs 1,200 E) NONE
Last Answer : Answer: C The ratio of the share students : teacher: benefactor=1:1.5 : 4.5 So the proportion to teacher's share = 1.5/7 Hence, the teachers would donate 1.5/7×4200=Rs 900
Description : Match the following mechanisms for interrupting the execution of a process and their uses. i) Interrupt a) Call to an operating system function ii) Trap b) Reaction to an asynchronous external event iii) Supervisor Call c) Handling of a error ... -a, iii-b C) i-b, ii-c, iii-a D) i-a, ii-c, iii-b
Last Answer : C) i-b, ii-c, iii-a
Description : What's a good tool for batch renaming a whole folder of files on a Windows 7 PC?
Last Answer : metamorphose 2 http://file-folder-ren.sourceforge.net/index.php?page=Download
Description : Is there a way to use batch files to enable and disable automatic updates service?
Last Answer : answer:They can be on Manual and still able to use the Windows Update site, but they need to be Started (running) before you browse to it. (I've done it) I think your problem may be ... starts BITS before enabling, then starting Windows Update. Of course the stop script should be in reverse order)
Description : There arecertain packages that allow people to define data items, place these items in particular records, combine therecords into designated files and then manipulate and retrieve the storeddata. What arethey ... (DBMS) C. Batch processingsystem D. Data communication package E. None of the above
Last Answer : Database management system (DBMS)
Description : Complete the following statement. As the project progresses into the execution phase: Select one: a. risks need to be checked off on activities that have been performed. b. the total risk on ... risk breakdown structure needs to be examined to be sure all the risk events have been avoided.
Last Answer : a. risks need to be checked off on activities that have been performed.
Description : The CPU of a system having 1 MIPS execution rate needs 4 machine cycles on an average for executing an instruction. The fifty percent of the cycles use memory bus. A memory read/write employs one machine cycle. For ... (A) 500 Kbytes/sec (B) 2.2 Mbytes/sec (C) 125 Kbytes/sec (D) 250 Kbytes/sec
Last Answer : (D) 250 Kbytes/sec
Description : Denial - of - service attack includes: a) a type of attack on a network that is designed to bring the network to its knees by flooding it with useless traffic b) DoS attacks are included in it. c) Both of Above d) None of These
Last Answer : c) Both of Above
Description : What type of ethical hack tests access to the physical infrastructure? A. Internal network B. Remote network C. External network D. Physical access
Last Answer : D. Physical access
Description : what type of ethical hack test access to the physical infra structure (a) internal network (b) remote network (c) external network (d) physical network
Last Answer : (d) physical network
Last Answer : Answer. Option D.
Description : What type of ethical hack tests access to the physical infrastructure? ∙ A. Internal network ∙ B. Remote network ∙ C. External network ∙ D. Physical access
Description : Common channel signalling______________ (A) Uses the speech or data path for signaling. (B) Does not use the speech or data path for signaling. (C) Needs no additional transmission facilities. (D) Finds it difficult to handle signaling during speech.
Last Answer : (C) Needs no additional transmission facilities.
Description : DOS, Windows XP, Windows Vista, Unix, Linux, MAC/OS X etc. are examples of: a) Operating System Software b) Package Software c) Utility Software d) None of These
Last Answer : a) Operating System Software
Description : Which of the following is not related to the Internet and Web Development: a) HTML b) DOS c) Internet Explorer d) CSS e) None of These
Last Answer : b) DOS
Description : Which of the following is not an operating system: a) DOS b) Google c) Windows 2000 d) None of These
Last Answer : b) Google
Description : Which Operating System does not support long file names? a) Window NT b) MS - DOS c) Windows 95 d) None of These
Last Answer : b) MS - DOS
Description : DOS file names are restricted to: a) 5 Characters b) 6 Characters c) 8 Characters d) None of These
Last Answer : c) 8 Characters
Description : Full form of DOS: a) Disk Operating System b) Disk Operating Software c) Digital Output System d) None of These
Last Answer : a) Disk Operating System
Description : What does DOS stands for: a) Disk Originating System b) Dynamic Operating System c) Disk Operating System d) Default Operating System e) None of The Above
Last Answer : c) Disk Operating System
Description : MS-DOS is the name of a/an 1) Application software 2) Hardware 3) System software 4) None of these
Last Answer : 3) System software
Description : Which of the following Operatings does not implement multitaskings truly 1) Windows 98 2) Windows NT 3) Windows XP 4) MS DOS
Last Answer : 4) MS DOS
Description : Which of the following Operating Systems do you choose to implement a client Server Network 1) MS DOS 2) Windows 7 3) Windows XP 4) Windows 2003
Last Answer : 4) Windows 2003
Description : Who was the programmer of Ms-Dos operating system 1) R Jhon 2) Bill Gates 3) Dennis Ritchi 4) none
Last Answer : 2) Bill Gates
Description : Which was the last version of MS-DOS that was released separately? 1) 5.0 2) 6.0 3) 6.11 4) 6.22
Last Answer : 4) 6.22
Description : Which of the following Operatings does not implement multitaskings truly 1 Windows 98 2 Windows NT 3 Windows XP 4 MS DOS
Last Answer : 4 MS DOS
Description : Which of the following Operating Systems do you choose to implement a client Server Network 1 MS DOS 2 Windows 7 3 Windows XP 4 Windows 2003
Last Answer : 4 Windows 2003
Description : Who was the programmer of Ms-Dos operating system 1 R Jhon 2 Bill Gates 3 Dennis Ritchi 4 none
Last Answer : 2 Bill Gates
Description : Which was the last version of MS-DOS that was released separately? 1 5.0 2 6.0 3 6.11 4 6.22
Last Answer : 4 6.22
Description : Select the most appropriate option for the below two statements. I. A Dos attack can take down your internet connection II. A Dos attack can take down your entire system a. Both I and II are true b. I is true II is false c. I is false II is True d. Both I and II are false
Last Answer : a. Both I and II are true