1. ………….is a
technique of improving the priority of process waiting in Queue for CPU
allocation
a)
Starvation
b)
Ageing
c)
Revocation
d)
Relocation
e)
None of these
Ans : (b)
2. A grammar for a
programming language is a formal description of
a)
Syntax
b)
Semantics
c)
Structure
d)
Code
e)
None of these
Ans : (c)
3. …………is a
technique of temporarily removing inactive programs from the memory of
computer system
a)
Swapping
b)
Spooling
c)
Semaphore
d)
Scheduler
e)
None of these
Ans : (a)
4. The memory
allocation scheme subject to “external” fragmentation is
a)
segmentation
b)
swapping
c)
pure
demand paging
d)
multiple fixed
contiguous partitions
e)
None
of these
Ans : (a)
5.Virtual memory is
a)
simple
to implement
b)
used in all major commercial operating
systems
c)
less efficient in
utilization of memory
d)
useful when fast I/O devices are not
available
e)
None
of these
Ans : (b)
6. Before proceeding with its execution, each
process must acquire all the resources it needs is called
a)
hold
and wait
b)
No pre-emption
c)
circular wait
d)
starvation
e)
None
of these
Ans : (a)
7. The main reason to encrypt a
file is to.................
a)
Reduce
its size
b)
Secure it
for transmission
c)
Prepare it
for backup
d)
Include it in the
start-up sequence
e)
None
of these
Ans : (b)
8. ‘LRU’ page replacement
policy is
a)
Last
Replaced Unit
b)
Last
Restored Unit
c)
Least
Recently Used
d)
Least
Required Unit
e)
None
of these
Ans : (c)
9. Which of
the following is not
a fundamental process state
a)
ready
b)
terminated
c)
executing
d)
blocked
e)
None
of these
Ans :
(d)
10. ODBC stands for
a)
Object
Database Connectivity
b)
Oral
Database Connectivity
c)
Oracle
Database Connectivity
d)
Open
Database Connectivity
e)
None
of these
Ans : (d)
11. Which two files are used
during operations of the DBMS
a)
Query languages
and utilities
b)
DML and
query language
c)
Data dictionary
and transaction log
d)
Data dictionary
and query language
e)
None
of these
Ans : (c)
12. A protocol is a set of rules
governing a time sequence of events that must take place
a)
between peers
b)
between
an interface
c)
between modems
d)
across
an interface
e)
None
of these
Ans : (a)
13. In communication satellite,
multiple repeaters are known as
a)
detector
b)
modulator
c)
stations
d)
transponders
e)
None of these
Ans : (d)
14. Which of the following is
required to communicate between two computers?
a)
communications software
b)
protocol
c)
communication hardware
d)
(d) all
of above
including
access to transmission medium
e)
None
of these
Ans : (d)
15. Which of the following is an
advantage to using fiber optics data transmission?
a)
resistance to
data theft
b)
fast data
transmission rate
c)
low
noise level
d)
All of these
e)
None
of these
Ans : (d)
16. Which of the following is
not a transmission medium?
a)
Telephone lines
b)
Coaxial cables
c)
modem
d)
microwave systems
e)
None of these
Ans : (c)
17. A technique for direct search is
a)
Binary Search
b)
Linear Search
c)
Tree Search
d)
Hashing
e)
None
of these
Ans : (d)
18. Two main measures for the
efficiency of an algorithm are
a)
Processor and memory
b)
Complexity
and capacity
c)
Time
and Space
d)
Data and Space
e)
None
of these
Ans : (c)
19. The space factor when
determining the efficiency of algorithm is measured by
a)
Counting the maximum memory needed by
the algorithm
b)
Counting the
minimum memory needed by the algorithm
c)
Counting the average memory needed by
the algorithm
d)
Counting the
maximum disk space needed by the algorithm
e)
None
of these
Ans : (a)
20. Which of the following does not affect
the resolution of a video display image?
a) Bandwidth
b) Raster scan rage
c) Vertical and horizontal lines of resolution
d) Screen Size
e) None of these
Ans : (a)
21. Latency time is
a) Time to spin the needed data under head
b) Time to spin the needed data under track
c) Time to spin data under sector
d) All of these
e) None of these
Ans : (a)
22. DPI stands for
a) Desktop projection Ink
b) Dot per inch
c) Dot-matrix printer ink
d) Desktop pixel Inch
e) None of these
Ans : (b)
23. Databases software may be divided into
a) five distinct categories
b) four distinct categories
c) three distinct categories
d) two distinct categories
e) None of these
Ans : (c)
24. File record length
a) Should always be fixed
b) Should always be variable
c) Depends upon the size of file
d) Should be chosen to match the data characteristics.
e) None of these
Ans : (d)
25. ………….is the time required by a sector to reach
below read/write heat
a) Seek Time
b) Latency Time
c) Access Time
d) None
e) None of these
Ans : (b)
No comments:
Post a Comment