mcqs for ppsc, nts , pcs, ajkpcs related to computer science g.k
post no. 6
>> A primary key that consists of more than one
attribute is called a Composite key.
>> An attribute in database is also known as Field.
>> C language was developed by Dennis Ritchie.
>> A space in computer’s memory set aside for
some data that can be changed is calle
>> Queries are the database object allows
extracting specific information from tables.
>> The instructions that are given to the compiler
before the beginning of actual program are
>> Ctrl+F9 key combination is used to run C
>> Different attributes in two different tables
having same name are referred to as
>> SQL is a structured language.
>> The loop which never ends is called Infinite
>> Ternary is another term for a conditional
>> The total numbers of keywords in C language
>> CIM stand for Computer Integrated
>> Access time for most of memories is measured
>> A database consists of various components
>> Referential integrity term is related to the
features of cascading deletion.
>> ATM stands for Automatic Teller Machine.
>> Charles Babbage is known as “Father of
>> One of the first recognized calculating device
>> Pentium II is a Fourth generation computer.
>> The first computer that used vacuum tubes was
>> The numbers of read/write heads for a hard
disk of four platters are 8.
>> Unicode is a 16-bit.
>> Boolean algebra is also known as switching
>> First generation language uses Binary code.
>> In BASIC LOG function refers to natural
logarithm have Base ‘e’.
>> An 8-bit address bus can address a memory of
>> The programs which are permanent and stored
in ROM are known as Firmware.
>> UNIVAC stands for Universal Automatic
>> All of the following are examples of real security
and privacy risks EXCEPT Spam.
>> A process known as data mining is used by large
retailers to study trends.
>> Point-of-sale (POS) terminals (formerly known
as cash registers) are often connecte to
complex inventory and sales computer systems.
>> Surgeons can perform delicate operations by
manipulating devices through computers
instead of manually. This technology is known