logo

CuriousTab

CuriousTab

Discussion


Home General Knowledge Computer Comments

  • Question
  • UDP is a


  • Options
  • A. connection oriented protocol
  • B. connectionless protocol
  • C. user-defined protocol
  • D. security protocol

  • Correct Answer
  • connectionless protocol 

  • Tags: Bank Exams

    Computer problems


    Search Results


    • 1. __________ (HHDD) is a technology where the conventional disk drive is combined with non-volatile flash memory, of typically 128 MB or more to cache data during normal use.

    • Options
    • A. Hyper Hard Disk Drive
    • B. Hybrid Hard Disk Drive
    • C. Hybrid Helium Disk Drive
    • D. Hyper Helium Disk Drive
    • Discuss
    • 2. _________ software are freely available and can be edited and customized by anyone.

    • Options
    • A. Free Source
    • B. Open Source
    • C. Easy Source
    • D. Unpaid Source
    • Discuss
    • 3. In Microsoft Word, under character formatting ___________ decides the appearance of our characters.

    • Options
    • A. Size
    • B. Underline
    • C. Effects
    • D. Font
    • Discuss
    • 4. In Microsoft Word, there are basically two types of formatting - character formatting and _____________.

    • Options
    • A. Paragraph formatting
    • B. Sentence formatting
    • C. Word formatting
    • D. Font formatting
    • Discuss
    • 5. C Programming language was developed by ___________.

    • Options
    • A. Charles Babbage
    • B. Larry Wall
    • C. James Gosling
    • D. Dennis Ritchie
    • Discuss
    • 6. Which of the following is also known as the brain of the computer?

    • Options
    • A. CPU
    • B. ALU
    • C. Motherboard
    • D. Keyboard
    • Discuss
    • 7. Which of the following language is used to access data from a database?

    • Options
    • A. ASP.Net
    • B. Java
    • C. SQL
    • D. C++
    • Discuss
    • 8. The tag line "Do no Evil" is owned by

    • Options
    • A. Yahoo
    • B. Bing
    • C. Google
    • D. Start page
    • Discuss
    • 9. Vacuum Tubes were used by _________ Generation of Computers.

    • Options
    • A. First
    • B. Second
    • C. Third
    • D. Fourth
    • Discuss
    • 10. The transfer of data from one application to another in a computer system is known as

    • Options
    • A. Dynamic Data Exchange
    • B. Dodgy Data Exchange
    • C. Dogmatic Data Exchange
    • D. Dynamic Disk Exchange
    • Discuss


    Comments

    There are no comments.

Enter a new Comment