Explore topic-wise MCQs in Automata Theory.

This section includes 1702 Mcqs, each offering curated multiple-choice questions to sharpen your Automata Theory knowledge and support exam preparation. Choose a topic below to get started.

1201.

Though several programmers can be opened simultaneously yet only…………programmed can be active.

A. four
B. three
C. two
D. one
Answer» C. two
1202.

P1 cloning vector allow cloning of DNA of the length of

A. 50 kbp
B. 100 kbp
C. 10 kbp
D. 20 kbp
Answer» C. 10 kbp
1203.

वेब पेज में वह कौन-सा शब्द है जिसे क्लिक किया जाये तो दूसरा डाक्यूमेंट खुलता हैं ?

A. हाइपरलिंक
B. एंकर
C. रेफरेंस
D. URL
Answer» B. एंकर
1204.

The systematic way of determining the worth of all the jobs within any organization is called

A. compensable evaluation
B. job evaluation
C. benchmark job
D. job promotion structure
Answer» C. benchmark job
1205.

सेल फोनों में किस प्रकार के स्टोरेज डिवाइसों का उपयोग किया जाता है ?

A. flash
B. rom
C. cache
D. इनमें से कोई नहीं
Answer» B. rom
1206.

Dendron is also called as

A. nerve fiber
B. nerve tissue
C. neuron
D. nerve impulse
Answer» B. nerve tissue
1207.

The innermost layer of the eyeball is

A. retina
B. iris
C. XX
D. ciliary body
Answer» B. iris
1208.

माउस का कौन-सा बटन सामान्यतया ok के लिए उपयोग में लाया जाया हैं ?

A. बीच वाला
B. दायॉं
C. बायॉं
D. व्हील
Answer» D. व्हील
1209.

What is backup ?

A. Adding more components to your network
B. Protecting data by copying it from the original source to a different destination
C. Filtering old data from the new data
D. Accessing data on tape
Answer» C. Filtering old data from the new data
1210.

The idea of instituting HR policies to support and encourage senior workers is part of

A. promotions
B. transfers
C. reality shock
D. managing retirements
Answer» E.
1211.

The key issues related to internal equity are

A. distributive justice
B. procedural justice
C. primacy justice
D. both a and b
Answer» E.
1212.

Ensuring that the essential peripheral devices are attached and operational is the ____________ process.

A. configuration
B. CMOS
C. POST
D. ROM
Answer» D. ROM
1213.

The marketing attack in which the attacker matches its product, price and distribution is classified as

A. flank attack
B. frontal attack
C. bypass attack
D. guerilla attack
Answer» C. bypass attack
1214.

Video processors consist of ……… and ……, which store and process images.

A. CPU and VGA
B. CPU and memory
C. VGA and memory
D. VGI and DVI
E. VGA and VGI
Answer» D. VGI and DVI
1215.

The low share-penetration index includes

A. low brand awareness
B. low availability
C. high price
D. all of above
Answer» E.
1216.

The Work streams talent management system includes

A. industry leading compensation
B. performance applications
C. knowledge management applications
D. All of the above
Answer» E.
1217.

____________ bits equal one byte.

A. Eight
B. Two
C. One thousand
D. One million
Answer» B. Two
1218.

The copy made of the market leader's product but differentiates its pricing and distribution strategies is classified as

A. counterfeiter
B. cloner
C. imitator
D. adapter
Answer» D. adapter
1219.

वर्कशीट के .....वर्टिकली एपीयर होते हैं और वर्कशीट विंडो के ऊपर अक्षर द्वारा आइडेंटिफाई होते हैं |

A. कालम
B. रो
C. हेडिंग
D. सेल
Answer» B. रो
1220.

What menu is selected to print ?

A. Edit
B. Special
C. File
D. Tools
Answer» D. Tools
1221.

डाक्यूमेंट की हार्ड कॉपी ......की जाती हैं |

A. CD पर स्टोर
B. फ्लापी पर स्टोर
C. प्रिन्टर पर प्रिंट
D. हार्ड डिक्स में स्टोर
Answer» D. हार्ड डिक्स में स्टोर
1222.

A set of instructions telling the computer what to do is called………

A. mentor
B. instructor
C. compiler
D. program
E. None of these
Answer» E. None of these
1223.

The people who are of artistic personality often chose careers of

A. advertising executives
B. school administrators
C. investment managers
D. credit managers
Answer» B. school administrators
1224.

In career development, providing training and development workshops is part of

A. individual role
B. manager role
C. employer role
D. line manager
Answer» D. line manager
1225.

Networks are monitored by security personnel and supervised by ………who set(s) up accounts and passwords for authorized network users.

A. IT managers
B. the government
C. network administrators
D. password administrators
E. None of these
Answer» D. password administrators
1226.

सॉफ्टवेयर कोड में त्रुटिया ढ़ूंढने की एक प्रक्रिया कौनसी हैं ?

A. टेस्टिंग
B. कम्पाइलिंग
C. डीबगिंग
D. रनिंग
Answer» D. रनिंग
1227.

A(n)……is composed of several computers connected together to share resources and data.

A. Internet
B. network
C. backbone
D. hyperlink
E. protocol
Answer» C. backbone
1228.

A(n) ____________ system is a small, wireless handheld computer that scans an item’s tag and pulls up the current price (and any special offers) as you shop.

A. PSS
B. POS
C. inventory
D. data mining
Answer» B. POS
1229.

निम्न मे से दो प्रकार के आउटपुट डिवाइस कौनसे है ?

A. की बोर्ड और माउस
B. विंडोज 2000 विंडोज NT
C. मानीटर और प्रिन्टर
D. इनमें से कोई नहीं
Answer» D. इनमें से कोई नहीं
1230.

कम्प्यूटर प्रोसेस का मूल लक्ष्य है डाटा को ..... में परिवर्तित करना |

A. इनफॉर्मेशन
B. टेबल्स
C. ग्राफ
D. फाइल्स
Answer» B. टेबल्स
1231.

In career development, assessing your own skills is included in

A. individual role
B. manager role
C. employer role
D. line manager
Answer» B. manager role
1232.

In a certain language, MADRAS is coded as NBESBT, how is BOMBAY coded in that code ?

A. CPNCBZ
B. CPNCBX
C. DPNCBZ
D. DPNCBX
Answer» B. CPNCBX
1233.

Storage and memory differ with respect to which of the following characteristics ?

A. Price
B. Reliability
C. Speed
D. All of these
E. None of these
Answer» E. None of these
1234.

IRM के घटक है -

A. Tetecommunication
B. data processing
C. office information
D. उपरोक्त सभी
Answer» E.
1235.

रेज्यूम बनाने के लिए किस सॉफ्टवेयर का उपयोग किया जाता हैं ?

A. Pagemaker
B. Ms-Word
C. उपरोक्त दोनों
D. java
Answer» D. java
1236.

CDs are of which shape ?

A. Square
B. Rectangular
C. Round
D. Hexagonal
E. None of these
Answer» D. Hexagonal
1237.

……….are 'attempts by individuals to obtain confidential information from you by falsifying their identity.

A. Phishing
B. Computer viruses
C. Spyware scams
D. Viruses
E. None of the above
Answer» B. Computer viruses
1238.

A byte can hold one ____________ of data.

A. bit
B. binary digit
C. character
D. kilobyte
Answer» D. kilobyte
1239.

In the talent management end to end process, the workforce compensation management leads to

A. succession planning
B. performance management
C. learning management systems
D. e-recruiting
Answer» C. learning management systems
1240.

In Word you can force a page break–

A. By positioning your cursor at the appropriate place and pressing the F1 key
B. By positioning your cursor at the appropriate place and pressing Ctrl+Enter
C. By using the Insert/Section Break
D. By changing the font size of your document
E. None of these
Answer» C. By using the Insert/Section Break
1241.

इन्टीग्रेटेड सर्किट चिप पर किसकी परत होती है ?

A. कॉपर
B. निकिल
C. सिलिकॉन
D. आयरन
Answer» D. आयरन
1242.

The eye is nourished through

A. choroid coat
B. sclerotic coat
C. pupil
D. iris
Answer» B. sclerotic coat
1243.

In table in excel, there are typical labels alongwith……

A. Letters
B. Numbers
C. Names
D. Formulae
Answer» C. Names
1244.

Seeking guidance from experienced people for advising and counseling is called

A. mentoring
B. employee's performance
C. career interests
D. developmental needs
Answer» B. employee's performance
1245.

बोले हुए शब्दों को टाइप में लिखने का यंत्र क्या कहलाता है ?

A. आडियोफोन
B. ग्रामोफोन
C. डिक्टाफोन
D. माइक्रोफोन
Answer» D. माइक्रोफोन
1246.

इंटरनेट एक्सप्लोर जैसे प्रौग्रामों को क्या कहते हैं जो वेब में नेविगेबल विंडो का काम देते हैं ?

A. हाइपरटेक्स्ट
B. नेटवर्क
C. वेब ब्राउजर
D. इंटरनेट
Answer» D. इंटरनेट
1247.

सेलेक्ट या हाईलाइट करने के लिए अक्सर ...... का प्रयोग किया जाता है ?

A. की-बोर्ड
B. माउस
C. आइकन
D. इनमें से कोई नहीं
Answer» C. आइकन
1248.

एम. एस. डॉस आधारित पर्सनल कम्प्यूटरों पर निम्न में से कौनसा पैकेज डाटाबेस के रूप में अधिक पाया गया हैं ?

A. डोबेस-3
B. आटोकैड
C. कोरल
D. वर्ड -स्टार
Answer» B. आटोकैड
1249.

To access properties of an object, the mouse technique to use is–

A. dragging
B. dropping
C. right-clicking
D. shift-clicking
E. None of these
Answer» D. shift-clicking
1250.

The comparison of potential and current levels of market demand is called

A. market penetration index
B. target market index
C. potential market index
D. available market index
Answer» B. target market index