Ques. IBM’s Token -Ring network uses
(a) adaptive routing
(b) source routing
(c) alternative routing
(d) spanned tree routing
Ques. The main purpose of a data link content monitor is to
(a) detect problems in protocols
(b) determine the type of transmission used in data link
(c) determine the type of switching used in data link
(d) determine the flow of data
Question: A compiler translates a program written in a high-level language into .
(a) Machine language
(b) an algorithm
(c) a debugged program
(d) Java
Ques. Which of the following program is used to copy files to or from another using time sharing system over a single link ?
(a) VMTP
(b) TFTP
(c) UUCP
(d) UART
Ques. Non-polling system is
(a) TDMA
(b) stop and wait
(c) continuous ARQ
(d) none of these
Related: UK King of Queens trivia
Ques. Television channels are 6 MHz. How many bits can be sent if four level digital signals are used ?
(a) 24 Mbps
(b) 12 Mbps
(c) 6 Mbps
(d) 36Mbps
Ques. When a protocol specifies that address of the sender means the most recent sender and not the original source,
what does this mean ?
(a) Syntax
(b) Semantics
(c) Timing
(d) None of these
Ques. Protection of data from a natural disaster such as a tornado belongs to which of the following network issue ?
(a) Performance
(b) Reliability
(c) Security
(d) Management
Ques. Simple network management protocol (SNMP) is implemented with a daughter board in
(a) the nodes
(b) the server
(c) the hubs
(d) a separate PC that manages the network
Ques. Network operating system that does not support symmetric multiprocesing (SMP) is
(a) Banyan (VINES)
(b) Microsoft NT Advanced server
(c) SCO unix
(d) Novell network 3 . X
Related: Data Interpretation Sample Paper
Ques. A certain moving arm disk storage with one head has following specifications :
Number of tracks / recording surface = 100
Disk rotation speed = 2400 rpm
Track storage capacity = 62500 bits
The transfer rate will be
(a) 2.5 Mbits/s
(b) 4.25 Mbits/s
(c) 1.5 Mbits/s
(d) 3.75 Mbits/s
Ques. For a sliding window of size n-1 there can be maximum of how many frames sent but unacknowledged ?
(a) 0
(b) n -1
(c) n
(d) n + 1
Ques. Some computer systems support dual mode operation – the user mode and the supervisor or monitor mode. These refer to the modes
(a) by which user programs handle their data
(b) by which the operating system executes user programs
(c) in which the processor and the associated hardware operate
(d) of memory access
Ques. At a particular time of computation, the value of a counting semaphore is 7. Then 20 P operations and ‘x’ V operations were completed on this semaphore. If the final value of the semaphore is 5, x will be
(a) 22
(b) 18
(c) 15
(d) 13
Question: What is output?
(a) What the processor takes from the user
(b) What the user gives to the processor
(c) What the processor gets from the user
(d) What the processor gives to the user
Related: pictures of science tools
Ques. Which of the following does not affect the resolution of a video display image ?
(a) Band width
(b) Raster scan rate
(c) Vertical and horizontal lines of resolution
(d) Screen size
Ques. ‘m’ processes share ‘n’ resources of the same type. The maximum need of each process doesn’t exceed ‘n’and the sum all the their maximum needs is always less than m + n. In this set up
(a) deadlock can never occur
(b) deadlock may occur
(c) deadlock has to occur
(d) none of these
Question: Something which has easily understood instructions is said to be______.
(a) user friendly
(b) information
(c) word processing
(d) icon
Ques. Consider a computer with 8 Mbytes of main memory and a 128 K cache. The cache block size is 4 K. It uses a direct mapping scheme for cache management. How many different main memory blocks can map onto a given physical cache block ?
(a) 2048
(b) 256
(c) 64
(d) None of these
Question: What is the name for the process that is used to convert a series of instructions, or program, written in a high-level language into instructions (or a program) that can be run on a computer ?
(a) Assembling
(b) Compiling
(c) Translating
(d) Uploading
Related: complex numbers test
Ques. Which of the following statements is false ?
(a) Segmentation suffers from external fragmentation
(b) Paging suffers from internal fragmentation
(c) Segmented memory can be paged
(d) Virtual memory is used only in multi-user systems
Ques. Of the following, the safe sequence is
(a) P0, P1, P2, P3
(b) P1, P0, P3, P2
(c) P2, P0, P1, P3
(d) None of these
Ques. If there are 32 segments, each of size 1 K byte, then the logical address should have
(a) 13 bits
(b) 14 bits
(c) 15 bits
(d) 16 bits
Ques. Which of the following does not affect the resolution of a video display image ?
(a) Bandwidth
(b) Screen size
(c) Raster scan rate
(d) Vertical and horizontal lines of resolution
Ques. Which of the following types of terminals is entirely dependent for all its capabilities on the computer system to which it is connected ?
(a) Smart terminal
(b) Dumb terminal
(c) Micro computer
(d) None of these
Ques. Whe used with I/O devices, the term intelligent imples
(a) a colour output capability
(b) speech processing capability
(c) high speed printing capability
(d) features to support off-line and online tesks
Ques. Bit-map terminal
(a) supports displays containing multiple windows
(b) requires considerable amout of video RAM
(c) requires tremendous amout of copying and hence low performance
(d) all of these
Related: Pictures of US presidents
Ques. Disk requests come to a disk driver for cylinders 10, 22, 20, 2, 40, 6 and 38, in that order at a time when the disk drive is reading from cylinder 20. The seek time is 6 ms per cylinder. If the scheduling algorithm is the closest cylinder next, then the total seek time will be
(a) 360 ms
(b) 876 ms
(c) 850 ms
(d) 900 ms
Ques. A file sometimes called a
(a) collection of input data
(b) data set
(c) temporary place to store data
(d) program
Ques. A long – term monitor
(a) should show any immediate performance problems
(b) should show I/O, paging, and processor activity
(c) need show only the I/O and processor activity
(d) usually reports only on terminal displays
Ques. The simplest directory structure is
(a) single level directory
(b) two level directory
(c) tree structure directory
(d) none of these
Ques. Domains are represented by
(a) rows
(b) columns
(c) tables
(d) all of these
Ques. Contents of the access matrix entries requires
(a) copy
(b) columns
(c) control
(d) all of these
Ques. Main motto of CAP system is
(a) use of software capability has allowed them to relative considerable economics in formulating and implementing protection policies
(b) system provides him with no library of procedures to be used
(c) both (a) and (b)
(d) none of these
Ques. Physical level
(a) computer systems must be physically secured against armed or surreptitious entry by intruders
(b) users must be screened carefully so that the chance of authorizing a user who then gives access to an intruder
(c) both (a) and (b)
(d) none of these
Ques. Software engineering primarily aims on
(a) reliable software
(b) cost effective software
(c) reliable and cost effective software
(d) none of these
Related: Common Business and Office English Abbreviations
Ques. Considering a program graph (PG) with statement as vertices and control as edges. Then, for any program graph
(a) PG is always acyclic
(b) PG is always directed graph
(c) There won’t be any self loops
(d) PG is always a connected graph
Ques. Drill – and – practice programs
(a) can adjust to the pace or the skill level of the student
(b) emphasize the learning of facts through repetition
(c) both (a) and (b)
(d) none of these
Ques. Use to recursion
(a) enhances logical clarity and reduces code size
(b) makes debugging easier
(c) reduces execution time
(d )makes software bug-free
Ques. A single integrated program may contain
(a) programs that take care of all the basic accounting systems used by a business
(b) word processing, spread sheet processing, graphics, and data management
(c) an operating system and an application program
(d) both (a) and (b)
Ques. The data flow model of an application mainly shows
(a) the underlying data and the relationship among them
(b) processing requirements and the flow of data
(c) decision and control information
(d) communication network structure
Ques. Booting the computer means
(a) logging in
(b) loding the resident part of the operating system into memory
(c) turning the computer on
(d) both (a) and (b)
Ques. A free from window can be
(a) opened
(b) moved
(c) resized
(d) all of these
Ques. In testing phase, the effort distribution is
(a) 10 %
(b) 20 %
(c) 40 %
(d) 50 %
Related: Germany General Knowledge multiple choice quiz
Ques. The file manager is responsible for
(a) naming files
(b) saving files
(c) deleting files
(d) all of these
Ques. Which of the following is not true for the traditional approach to information processing ?
(a) There is common sharing of data among the various applications
(b) It is file oriented
(c) Programs are dependent on the files
(d) It is inflexible
Ques. A data dictionary is a special file that contains
(a) name sof all fields in all files
(b) data types of all fields in all files
(c) width of all fields in all files
(d) all of these
Ques. A primary key, if combined with a foreign key creates
(a) parent child relationship between the tables that connect them
(b) many-to-many relationship between the tables that connect them
(c) network model between the tables connect them
(d) none of these
Ques. Manchester code is a
(a) non-return to zero code
(b) polar code
(c) both (a) and (b)
(d) none of these
Ques. Method of communication in which transmission takes place in both directions, but only in one direction at a time, is called
(a) simplex
(b) four wire circuit
(c) full duplex
(d) half duplex
Ques. MICR has made possible to
(a) cashless society
(b) checkless society
(c) creditless society
(d) none of these
Related: common symbols in English
Ques. Number of minimal set of required file operations are
(a) two
(b) four
(c) five
(d) six
Ques. Primary key of the weak entity is
(a) account number
(b) {account number, transaction number}
(c) {account number, date}
(d) {transaction number, date}
Ques. The on line soft copy displays a customer’s charge account to respond to an inquiry is an example of
(a) forecasting report
(b) exception report
(c) regularly scheduled report
(d) on demand report
Ques. One data dictionary software package is called
(a) DB/DC dictionary
(b) TOTAL
(c) ACCESS
(d) all of these
Ques. A data is often entered in a format such as 81/12/30 because
(a) 4military prefers this format
(b) reader can find the year faster
(c) it allow the user to sort by year
(d) none of these
Ques. Working of the WAH generally involves
(a) telephone lines
(b) micro waves
(c) satellites
(d) all of these
Ques. The monitor station in what standard ensures that one and only one token is circulating ?
(a) 802.3
(b) 802.5
(c) FDDI
(d) All of these
Ques. In a modem using dibit phase, encoding has the bit rate
(a) same as the baud rate
(b) higher than its baud rate
(c) lower than its baud rate
(d) independent of its baud rate
Ques. In MULTICS
(a) has segmented address space
(b) each segment is file
(c) segment is associated with the rings
(d) all of these
Related: market research and consumer behavior quiz
Ques. A packet switching network (highly loaded) has the following characteristics
Propagation delay = 2sec/hp
Data transmission rate = 1
Packet size = r bit = 512 bits
Number of hops = 10
At what time the last bit of the last packet will reach the receiver ?
(a) 1024.5 sec
(b) 1038 sec
(c) 2048 sec
(d) 512 sec
Ques. Maximum throughput for window sizes of 1 will be
( a) 5785 bps
(b) 7585 bps
(c) 8755bps
(d) none of these
Related: general sports questions
Ques. Maximum data rate of a channel for a noiseless 3-kHz binary channel is
(a) 3000 bps
(b) 6000 bps
(c) 1500 bps
(d) none of these
Ques. In which communication, poll/select method is used to determine control of the line ?
(a) peer-to-peer
(b) peer-to-primary
(c) primary-to-peer
(d) primary-to-secondary
Ques. How many crosspoints are needed in a single-stage switch with 40 inputs and 50 outputs ?
(a) 40
(b) 50
(c) 90
(d) 2000
Ques. If ax = b, by = c, cz = a, then value of xyz is
(a) 0
(b) 1
(c) 1/abc
(d) abc
Related: verbs exercises questions and answers
Ques. Mutual exclusion problem occurs between
(a) two disjoint processes that do not interact
(b) processes that share resources
(c) processes that do not use the same resource
(d) none of these
Ques. Assertions are conditions which are true at the point of execution
(a) always
(b) sometimes
(c) many times
(d) no times
Ques. The maximum amount of information that is available with one position of the disk access arm for a removal disk pack (without further movement of the arm with multiple heads) is
(a) a plate of data
(b) a cylinder of data
(c) a track of data
(d) a block of data
Ques. The first-fit, best-fit and the worst-fit algorithm can be used for
(a) contiguous allocation of memory
(b) linked allocation of memory
(c) indexed allocation of memory
(d) all of these
Ques. Two basic types of record-access methods are
(a) sequential and random
(b) direct and immediate
(c) sequential and indexed
(d) on line and real time
Ques. Consider a logical address space of 8 pages of 1024 words mapped into memory of 32 frames
How many bits are there in the logical address ?
(a) 9 bits
(b) 11 bits
(c) 13 bits
(d) 15 bits
Ques. Information hiding is to hide from user, details that
(a) are relevant to him
(b) are not relevant to him
(c) may be maliciously handled by him
(d) are confidential
Ques. A stock and bond analysis program that focuses on technical analysis will
(a) allow you to establish a database
(b) analyze each security’s market price and volume statistics
(c) both (a) and (b)
(d) none of these
Ques. In object oriented design of software
(a) objects inherit the properties of the class
(b) classes are defined based on the attributes of objects
(c) classes are always different
(d) all of these
Ques. Mnemonic codes and variable names are used in
(a) a machine language
(b) an assembly language
(c) a high-level language
(d) all of these
Ques. Which of the following is not true ?
(a) Content coupling in a module is desirable
(b) Logical cohesion in a module is desirable
(c) Stamp coupling is preferred over functional coupling
(d) All of these