Which statement is valid about computer program?
a. It is understood by a computer
b. It is understood by programmer
c. It is understood user
d. Both of above

1 Answer

Answer :

Both of above

Related questions

Description : Which statement is valid about computer program? A) It is understood by a computer B) It is understood by programmer C) It is understood user D) Both a & b

Last Answer : Answer : D

Description : Which statement is valid about computer program? a. It is understood by a computer b. It is understood by programmer c. It is understood user d. Both of above

Last Answer : d. Both of above

Description : Which language is directly understood by the computer without translation program? a. Machine language b. Assembly language c. High level language d. None of above

Last Answer : Machine language

Description : Personnel who design, program, operate and maintain computer equipment refers to a. Console-operator b. Programmer c. Peopleware d. System Analyst

Last Answer : Peopleware

Description : Which of the following statement is valid? A) Lady Augusta is the first programmer B) Ada is the daughter of Lord Byron, a famous English poet C) ADA is a programming language developed by US Defense D) All of above

Last Answer : Answer : D

Description : Which of the following is not a function of the Output Unit? a) It produces results that can be easily understood by the user b) It accepts the results produced by the computer c) It ... instructions to the outside world d) It supplies the data and instructions to the computer for further processing

Last Answer : Answer: d Explanation: The output unit is responsible for giving the results to the user in the form of printed report or visual display. It is not responsible for giving the instructions back to the CPU for processing

Description : Out of the following, whom do you think is the most probable user of a Light Pen? (a) Computer Programmer (b) Graphic Designer (c) Journalist -Technology

Last Answer : (b) Light pen is useful for graphic designer as it is useful for identifying a particular location on the screen.

Description : Which statement is valid about magnetic tape? a. It is a plastic ribbon b. It is coated on both sides with iron oxide c. It can be erased and reused d. All of above

Last Answer : It is a plastic ribbon

Description : A person who used his orher expertiseto gain access to other people's computers to get information illegally ordo damage is a– (A) hacker (B) analyst (C) instant messenger (D) programmer (E) spammer

Last Answer : hacker

Description : Which statement is true regarding the user exec and privileged exec mode? A. They both require the enable password B. User exec is a subset of the privileged exec C. The '?' only works in Privileged exec D. They are identica

Last Answer : User exec is a subset of the privileged exec

Description : Which statement is valid about interpreter? a. It translates one instruction at a time b. Object code is saved for future use c. Repeated interpretation is not necessary d. All of above

Last Answer : It translates one instruction at a time

Description : Which statement is valid? a. 1KB = 1024 bytes b. 1 MB=2048 bytes c. 1 MB = 1000 kilobytes d. 1 KB = 1000 bytes

Last Answer : 1KB = 1024 bytes

Description : A person who designs the programs in a software package is called : a) User b) Software Manager c) System Developer d) System Programmer

Last Answer : Answer: d Explanation: The programs included in a system software package are called system programs. The programmers who design them and prepare them are called system programmers

Description : Which language is directly understood by the computer without translation program? A) Machine language B) Assembly language C) High level language D) None of above

Last Answer : Answer : A

Description : Which language is directly understood by the computer without translation program? (A) BASIC (B) Assembly language (C) Machine language (D) C language

Last Answer : (C) Machine language

Description : Which language is directly understood by the computer without translation program? a. Machine language b. Assembly language c. High level language d. None of above

Last Answer : a. Machine language

Description : Personnel who design, program, operates and maintains computer equipment refers to A) Console-operator B) Programmer C) Peopleware D) System Analyst

Last Answer : Answer : C

Description : Which among the following is incorrect: a) Computer - Machine that will carry out the process described by program b) Person - Programmer who serves as the source of the communication c) Process - The ... - Actual System or environment where the problem arises e) None of These f) All of the above

Last Answer : e) None of These

Description : Personnel who design, program, operate and maintain computer equipment refers to a. Console-operator b. Programmer c. Peopleware d. System Analyst

Last Answer : c. Peopleware

Description : Personnel who design, program, operate and maintain computer equipment refers to a. Console-operator b. Programmer c. Peopleware d. System Analyst

Last Answer : c. Peopleware

Description : State weather the following statement is true or false for ISDN - Integrated Services Digital Network ISDN is an effort to standardize subscriber services, provide user/network interfaces 2). the goal of ISDN is to form a Local ... C. 1. false, 2. false, 3. false D. 1. true, 2. true, 3. false

Last Answer : A. 1. True, 2. false, 3. true

Description : Which statement is valid about computer program? A) High level languages must be converted into machine language to execute B) High level language programs are more efficient and faster to execute C) It ... to identify errors in high level language program than in low level programs D) All of above

Last Answer : Answer : A

Description : Which of the following is valid statement? A) Data in itself is useless unless it is processed B) The data that is processed is called a program C) The data which is not yet processed is information D) Information is processed by computer to generate data.

Last Answer : Answer : A

Description : A front-end processor is A. a user computer system B. a processor in a large-scale computer that executes operatingsystem instructions C. a minicomputer that relieves main-frame computersat a ... centre of communications control functions D. preliminary processor ofbatch jobs. E. None of the above

Last Answer : a minicomputer that relieves main-frame computersat a computer centre of communications control functions

Description : Report generatorsare usedto A. store data input bya user B. retrieve information from files C. answer queries D. both (b)and (c) E. None of the above

Last Answer : both (b)and (c)

Description : In a linear block code, the_______ ofany two valid codewords creates another valid codeword. A) XORing B) ORing C) ANDing D) none of the above

Last Answer : XORing

Description : Which of the following isnot a valid version of MS Office? A. Office 4 B. Office97 C. Office 98 D. Office2000

Last Answer : Office 98

Description : Consider the given network implementation scenario. For the given classful NID 199.10.20.0/24, the requirement is to create 13 subnets. With given details, find the range of first and last valid IP in 15th subnet. a. ... .20.225 to 199.10.20.238 c. 199.10.20.193 to 199.10.20.206 d. Not of these

Last Answer : a. A Only

Description : What does the disk drive of a computer do? a. Rotate the disk b. Read the disk c. Load a program from the disk into the memory d. Both b and c

Last Answer : Both b and c

Description : Is this program statement valid? INT = 10.50;

Last Answer : Assuming that INT is a variable of type float, this statement is valid. One may think that INT is a reserved word and must not be used for other purposes. Define, However, recall that reserved words are express in lowercase, so the C compiler will not interpret this as a reserved word.

Description : Which post-installations activities are recommended by SAP after the installation of an SAP ECC 6.06 system? Note: there are 2 correct answered to this question A. Restart your SAP system ... of users involved in the implementation project D. Confirm the installation in an SAP Support ticket

Last Answer : A. Restart your SAP system and check logs for errors B. Install a valid license key

Description : Which of these statements highlights a valid privacy concern when working with large data sets? I. Data from multiple sources could be linked together to discover someone's identity. II. For access to location-based services, a ... . I and II only B. I only C. I and III only D. I, II and III

Last Answer : B. I only

Description : What is it called when a hacker pretends to be a valid user on the system? A. Impersonation B. Third-person authorization C. Help desk D. Valid user

Last Answer : A. Impersonation

Description : The best understood intracellular messenger is cyclic AMP (cAMP). Which of the following statement(s) concerning this intracellular messenger is/are correct? a. Intracellular cyclic AMP is constantly ... of adenylate cyclase d. cAMP is the only cyclic nucleotide active as an intracellular messenger

Last Answer : Answer: a, b The prototypic intracellular messenger is cAMP. To function as a mediator, the concentration of cAMP must change rapidly. In resting cells, cAMP is continuously being degraded by ... produce cGMP. Intracellular calcium ions also serve as second messengers in a large number of cells

Description : According to the private property defense of the classical model of corporate social responsibility, managers who use corporate funds for projects that are not directly devoted to maximizing ... . Stockholders in publicly traded corporations are better understood as investors rather than owners.

Last Answer : C. Investors buy their stocks with the hope of maximizing return on their investment. D. Stockholders in publicly traded corporations are better understood as investors rather than owners.

Description : Information hiding is to hide from user, details ? that are relevant to him that are not relevant to him that may be maliciously handled by him that are confidential

Last Answer : that may be maliciously handled by him

Description : Milestones are used to ? Know the cost of the project Know the status of the project Know the user expectations None of the above

Last Answer : Know the cost of the project

Description : User programmable terminals that combine VDT hardware with built-in microprocessor is a. Kips b. PC c. Mainframe d. Intelligent terminals

Last Answer : Intelligent terminals

Description : An unauthorized user is a network _______ issue. A) Performance B) Reliability C) Security D) All the above

Last Answer : Security

Description : A machine that connects to two or more electronic mail systems and transfers mail messagesamong them is known as A. Gateways B. mail gateway C. bridges D. User Agent E. None of the above

Last Answer : mail gateway

Description : Which of the following layer protocols are responsible for user and theapplicationprogrammesupport such aspasswords, resource sharing, file transfer and network management? A. Layer 7 protocols B. Layer 6 protocols C. Layer 5 protocols D. Layer 4 protocols E. None of the above

Last Answer : Layer 7 protocols

Description : Which layers of the OSI determines the interface often system with the user? A) Network B) Application C) Data link D) Session

Last Answer : B) Application

Description : Which of the following applications allows a user to access and change remote files without actual transfer? A) DNS B) FTP C) NFS D) Telnet

Last Answer : C) NFS

Description : Which one of the following statements is NOT correct about HTTP cookies? a. A cookies is a piece of code that has the potential to compromise the security of an Internet user b. A cookie gains entry ... and time d. Cookies can be used to track the browsing pattern of a user at a particular site

Last Answer : a. A cookies is a piece of code that has the potential to compromise the security of an Internet user

Description : Which one of the following allows a user at one site to establish a connection to another site and then pass keystrokes from local host to remote host? a.HTTP b.FTP c.Telnet d.TCP

Last Answer : c.Telnet

Description : Which layer provides the services to user? a.application layer b.session layer c.presentation layer d.physical layer

Last Answer : a.application layer

Description : Which of the following layers of the OSI model is responsible for user interaction? a.Layer 4 b.Layer 5 c.Layer 6 d.Layer 7

Last Answer : d.Layer 7

Description : Which phase/s of POP3 allow/s an user agent to retrieve the messages as well as to mark the messages for deletion purpose? a. Authorization Phase b. Transaction Phase c. Update Phase d. All of the above

Last Answer : b. Transaction Phase

Description : Which among the below specified illustrations belongs to the category of GUI based user agents? a. mail b. pine c. Outlook & Netscape d. All of the above

Last Answer : c. Outlook & Netscape