Computer Awareness Quiz for IT Officer

Computer Awareness Quiz for IT Officer

Computer Awareness Quiz for IT Officer

Q.1) FIFO scheduling is _____
(a) preemptive scheduling 
(b) non-preemptive scheduling
(c) deadline scheduling 
(d) fair share scheduling
(e) None of these

Q.2) In digital computer, _____ is used to represent negative numbers
(a) 1’s complement 
(b) 2’s complement
(c) both (a) and (b) 
(d) all of these
(e) None of these

Q.3) The black testing box concept;
(a) is invoked by describing a system in terms of inputs and outputs leaving the transformation process a black box.
(b) assumes that inputs and outputs will remain stable
(c) assumes that the black box is independent
(d) all of the above are true
(e) None of these

Q.4) At the Hyderabad office of the ABC bank the network administrator, Robert has bought a new switch. Which command will he use to display its configuration?
(a) run default config
(b) show running
(c) Display default switch config
(d) run default switch config
(e) None of these

Q.5) At the Hyderabad office of the XYZ bank the network administrator, Robert has bought a new switch. He needs to configure the switch so that the MAC address table, even the table is cleared. Which command will he use?
(a) mac-address-table permanent
(b) mac-address-table restricted static
(c) mac-address-table restricted static
(d) mac-address-table
(e) None of these

Q.6) The technique, for sharing the time of a computer among several jobs, which switches jobs so rapidly such that each job appears to have the computer to itself:
(a) time sharing 
(b) time out
(c) time domain 
(d) FIFO
(e) None of these

Q.7) What is the name given to the exchange of control signals which is necessary for establishing a connection between a modem and a computer at one end of a line and another modem and computer at the other end?
(a) Handshaking 
(b) modem options
(c) protocol 
(d) duplexing
(e) None of these

Q.8) Which of the following belongs to the deterministic finite automata?
(a) input tape 
(b) finite control
(c) reading head 
(d) all of these
(e) None of these

Q.9) Transaction
(a) collections of operations that form a single logical unit of work are called transactions
(b) is a unit of program execution that accesses and possibly updates various data items.
(c) transactions consists of all operations executed between the begin and end of the transaction
(d) all of the above
(e) None of these

Q.10) A list of a finite number of homogeneous data elements is called
(a) stack 
(b) queue
(c) array 
(d) linked list
(e) None of these

Q.11) Indicate which is preemptive scheduling algorithm
(a) round-robin 
(b) shortest-job-first
(c) priority-based 
(d) all of the above
(e) None of these

Q.12) Which logical operation is performed by ALU of 8085 complement a number?
(a) AND 
(b) NOT
(c) OR
(d) EXCLUSIVE OR
(e) None of these

Q.13) ER model is used in _____ phase
(a) Conceptual database
(b) schema refinement
(c) physical refinement
(d) applications and security
(e) None of these.

Q.14) The messages are formatted strings composed of –
(a) a receiver object
(b) a message selector
(c) a sequence of zero of more arguments
(d) all of the above
(e) None of these

Q.15) Which of the following is functionally complete set?
(a) AND, OR 
(b) AND, XOR
(c) NOT, OR 
(d) AND, OR, NOT
(e) None of these

Q.16) Tunnelling are used
(a) for source and destination hosts are on the same hope of network
(b) There are different network in between them
(c) WAN are different network two LAN
(d) all of the above
(e) None of these

Q.17) Encryption is related to cryptography in which layer
(a) application layer 
(b) presentation layer
(c) network layer 
(d) transport layer
(e) None of these

Q.18. SQL * plus ignores blank spaces before and after the
(a) arithmetic operator 
(b) relations operator
(c) logical operator 
(d) binary operator
(e) None of these

Q.19) A soft ware development strategy that organizes software as a collection of objects that contain both data structure and behaviour
(a) software engineering
(b) object oriented
(c) data structure 
(d) program development
(e) None of these

Q.20) The real “brain” of an artificial intelligence system is referred to as:
(a) bubble memory 
(b) the expert system
(c) natural language interfaces 
(d) recursive technology
(e) None of these


Answer Key
  • Q.1) b
  • Q.2) c
  • Q.3) d
  • Q.4) b
  • Q.5) a
  • Q.6) a
  • Q.7) a
  • Q.8) d
  • Q.9) d
  • Q.10) c
  • Q.11) a
  • Q.12) d
  • Q.13) a
  • Q.14) d
  • Q.15) d
  • Q.16) d
  • Q.17) a
  • Q.18) a
  • Q.19) b
  • Q.20) b

Post a Comment

0 Comments

Top Post Ad

Below Post Ad