DOS file names are restricted to:
a) 5 Characters
b) 6 Characters
c) 8 Characters
d) None of These

1 Answer

Answer :

c) 8 Characters

Related questions

Description : Which Operating System does not support long file names? a) Window NT b) MS - DOS c) Windows 95 d) None of These

Last Answer : b) MS - DOS

Description : Which file in MS-DOS contains internal commands that are loaded during Booting process? 1) IO.SYS 2) MSDOS.SYS 3) COMMAND.COM 4) CONFIG.SYS

Last Answer : 4) CONFIG.SYS

Description : Which file in MS-DOS contains internal commands that are loaded during Booting process? 1 IO.SYS 2 MSDOS.SYS 3 COMMAND.COM 4 CONFIG.SYS

Last Answer : 4 CONFIG.SYS

Description : Names of some of the Operating Systems are given below: (a) MS-DOS (b) XENIX (c) OS/2 In the above list, following operating systems didn’t provide multiuser facility. (1) (a) only (2) (a) and (b) only (3) (b) and (C) only (4) (a), (b) and (c) 

Last Answer : Answer: Marks to all

Description : Which was the last version of MS-DOS that was released separately? 1) 5.0 2) 6.0 3) 6.11 4) 6.22

Last Answer : 4) 6.22

Description : Which was the last version of MS-DOS that was released separately? 1 5.0 2 6.0 3 6.11 4 6.22

Last Answer : 4 6.22

Description : DOS batch file that prints out contents of a folder in notepad?

Last Answer : You must not have looked very hard :) First result on Google when searching for: contents of a folder into a notepad text file.

Description : Two taps P and Q can fill a cistern in 24 min and 32 min respectively. Both the taps are opened together for a certain time but due to some obstruction the flow of water was restricted to 7/4 of full flow in tap P and ... How long was it before the full flow. A) 8 min B) 3 min C) 5.6 min D) 4.5 min

Last Answer : D Let the obstruction remain for X min.  Hence, Part of cistern filled in X min + part of cistern filled in 6 min = full cistern [(7X/4*24)+(5X/3*32)]+[(6/24)+(6/32)] = 1 (12X/96)+(7/16) = 1 12x/96=9/16 Thus, X = 4.5 min.

Description : HOSTS file entries are limited to how many characters? A. 8 B. 255 C. 500 D. Unlimited E. None of the above

Last Answer : 255

Description : Denial - of - service attack includes: a) a type of attack on a network that is designed to bring the network to its knees by flooding it with useless traffic b) DoS attacks are included in it. c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : DOS, Windows XP, Windows Vista, Unix, Linux, MAC/OS X etc. are examples of: a) Operating System Software b) Package Software c) Utility Software d) None of These

Last Answer : a) Operating System Software

Description : Which of the following is not related to the Internet and Web Development: a) HTML b) DOS c) Internet Explorer d) CSS e) None of These

Last Answer : b) DOS

Description : Which of the following is not an operating system: a) DOS b) Google c) Windows 2000 d) None of These

Last Answer : b) Google

Description : Full form of DOS: a) Disk Operating System b) Disk Operating Software c) Digital Output System d) None of These

Last Answer : a) Disk Operating System

Description : Denial - of - service attack includes: a) a type of attack on a network that is designed to bring the network to its knees by flooding it with useless traffic b) DoS attacks are included in it. c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : What do you understand by the term DOS: a) Downloading the system program from the Internet b) Downloading operating system c) The master control program of the computer which helps the computer to ... d) The programs which helps computer to check the various peripheral devices e) None of The Above

Last Answer : e) None of The Above

Description : What does DOS stands for: a) Disk Originating System b) Dynamic Operating System c) Disk Operating System d) Default Operating System e) None of The Above

Last Answer : c) Disk Operating System

Description : MS-DOS is the name of a/an 1) Application software 2) Hardware 3) System software 4) None of these

Last Answer : 3) System software

Description : Which of the following Operatings does not implement multitaskings truly 1) Windows 98 2) Windows NT 3) Windows XP 4) MS DOS

Last Answer : 4) MS DOS

Description : Which of the following Operating Systems do you choose to implement a client Server Network 1) MS DOS 2) Windows 7 3) Windows XP 4) Windows 2003

Last Answer : 4) Windows 2003

Description : Who was the programmer of Ms-Dos operating system 1) R Jhon 2) Bill Gates 3) Dennis Ritchi 4) none

Last Answer : 2) Bill Gates

Description : Which type of commands in DOS needs additional files for their execution? 1) Internal Commands 2) External Commands 3) Batch Commands 4) Redirector

Last Answer : 2) External Commands

Description : Which of the following Operatings does not implement multitaskings truly 1 Windows 98 2 Windows NT 3 Windows XP 4 MS DOS

Last Answer : 4 MS DOS

Description : Which of the following Operating Systems do you choose to implement a client Server Network 1 MS DOS 2 Windows 7 3 Windows XP 4 Windows 2003

Last Answer : 4 Windows 2003

Description : Who was the programmer of Ms-Dos operating system 1 R Jhon 2 Bill Gates 3 Dennis Ritchi 4 none

Last Answer : 2 Bill Gates

Description : Which type of commands in DOS needs additional files for their execution? 1 Internal Commands 2 External Commands 3 Batch Commands 4 Redirectors

Last Answer : 2 External Commands

Description : Select the most appropriate option for the below two statements. I. A Dos attack can take down your internet connection II. A Dos attack can take down your entire system a. Both I and II are true b. I is true II is false c. I is false II is True d. Both I and II are false

Last Answer : a. Both I and II are true

Description : What is MS DOS? (1) Multipurpose System Digital Offline Sign (2) Microsoft Disk Operating System (3) Multi System Disk Operating System (4) Microchip Sign Digital System 

Last Answer : Microsoft Disk Operating System

Description : The ‘IBM-DOS’ is a (1) Single user operating system (2) Multiuser operating system (3) Batch operating system (4) Time-sharing operating system

Last Answer : Single user operating system

Description : Which of the following is an Disk Operating System (DOS) command ? (1) LIST (2) CHANGE (3) DUPLICATE (4) FORMAT

Last Answer : FORMAT

Description : What MS-DOS command is used to create a subdirectory ? (1) DIR/MK (2) MKDIR (3) CHDIR (4) RMDIR

Last Answer : MKDIR

Description : Which one of the following is an MS-DOS external command ? (1) DIR (2) COPY (3) FORMAT (4) PROMPT 

Last Answer : FORMAT

Description : DOS is a (1) Direct Operating System (2) Dual Operating System (3) Disk Operating System (4) Dial-up Operating System

Last Answer : Disk Operating System

Description : A computer checks the _____ of user names and passwords for 9 a match before granting access. 1) Website 2) Network 3) Backup file 4) Data base 5) None of these

Last Answer : Answer :4

Description : Payment banks can accept a restricted deposit which is currently limited to _______ per customer account. A. Rs.1 lakh B. Rs.3 lakh C. Rs.2 lakh D. Rs.5 lakh E. None of the Above

Last Answer : A. Rs.1 lakh Explanation: Payment banks can accept a restricted deposit which is currently limited to Rs. 1 lakh per customer account.

Description : Which of the following statements is false concerning file names? a) Files may share the same name or the same extension but not both b) Every file in the same folder must have a unique name c) File extension is another name for file type d) None of these

Last Answer : d) None of these

Description : . Which attack is an HTTP attack which allows attackers to access restricted directories and execute commands outside the web servers root directory? a. XSS attack b. Path Traversal attack c. MITM attack d. SQL Injection attack

Last Answer : d. SQL Injection attack

Description : Q.8 When was MS-DOS invented? -Discoveries and Inventions

Last Answer : Ans. in 1981 by Microsoft Corporation.

Description : Payment of incentive to Dos(PLI) a) Up to Rs 4 crores of sum assured Nil b) Above Rs 4 crores and up to Rs 6 crores of sum assured Rs 25/- per 10000/- c) Above Rs 6 crores of sum assured Rs 20/- per 10000/- d) All the above

Last Answer : d) All the above

Description : Do you remember the names of the characters in the primers/readers when you first learned to read?

Last Answer : I think it was Dick and Jane but I’m not positive. This was in the early 70’s.

Description : Do anyone here come up with new names for the characters in the game "Happy Wheels"?

Last Answer : What kind of game is it? I’ve already got Holy Roller, Cad Dad, Martha Stewart, Harley Wannabe, Turf Slasher, Lewis and Clark, Jolly Perv, and Hairy Pogo Stick.

Description : I need help with first and last names for my characters?

Last Answer : Suzy Surprize and Rod Dangerman.

Description : What are two good names for two (evil) characters in my story?

Last Answer : answer:Jenifer and Marilyn. (Names of my ex-wife and my ex-mother-in-law.)

Description : Could you make a living being the guy who comes up with video game characters' names?

Last Answer : It’s a part of the video game creation pipeline, yes, but no there is not one guy who sits thinking up names all day. There was likely a guy who sat and wrote a program that would generate random names, then he moved on to a different part of working on the game.

Description : What are the names of all Harry Potter characters?

Last Answer : Harry PotterHermione Grangerron weasleyfred weasleygeorge weasleyginny weasleybill weasleypercy weasleycharlie weasleymolly weasleyarther weasleyvoldermortjames potterlily potteralbus dumbledoreseverous ... Malfoylusius malfoynarcissa malfoycrabgoyleneville longbottomhagridto name a few

Description : What are the names of all Harry Potter characters?

Last Answer : Harry PotterHermione Grangerron weasleyfred weasleygeorge weasleyginny weasleybill weasleypercy weasleycharlie weasleymolly weasleyarther weasleyvoldermortjames potterlily potteralbus dumbledoreseverous ... Malfoylusius malfoynarcissa malfoycrabgoyleneville longbottomhagridto name a few

Description : Which of the following is true for variable names in Python? a) unlimited length b) all private members must have leading and trailing underscores c) underscore and ampersand are the only two special characters allowed d) none of the mentioned

Last Answer : Answer: a Explanation: Variable names can be of any length.

Description : Is it possible in C++ to declare a vector of characters as a private variable in a class header file? If so, why isn't it working for me?

Last Answer : Just throwing this in. Have you cleaned, before you execute?

Description : A device is sending out data at the rate of 2000 bps. How long does it take to send a file of 1,00,000 characters ? a. 50 b. 200 c. 400 d. 800

Last Answer : c. 400

Description : Which command is used to count just the number of characters in a file? A. wc - 1 B. wc -c C. wc -w D. wc -r E. None of the above

Last Answer : B. wc -c