Computer GK Quiz-14

Computer GK Quiz-14

Computer Multiple Choice Questions (MCQs) Quiz for State and UPSC Civil Services Examinations. Objective Questions on Computer for competitive examinations.

    . In IT terminology failure in the kernel is called as

    (1) Crash 
    (2) C r a s h dump
    (3) Dump 
    (4) Kernel error
    261. (1) The kernel (also called nucleus) is a computer program that constitutes the central core of a computer’s operating system. It is the first program loaded on startup, and then manages the remainder of the startup, as well as input/output requests from software, translating them into data processing instructions for the central processing unit. Its failure is called crash.

    262. A __________ is an agreement between the communicating parties on how communication is to proceed.

    (1) Path 
    (2) SLA
    (3) Bond 
    (4) Protocol
    262. (4) In information technology, a protocol is an agreement between the communicating parties on how communication is to proceed. Violating the protocol makes communication more difficult, if not impossible. A protocol is the specialist set of rules that end points in a telecommunication connection.

    263. The complete form of ‘IC’ in electronics is

    (1) Internal circuit
    (2) Independent circuit
    (3) Integrated circuit
    (4) Inbuilt circuit
    263. (3) IC stands for Integrated Circuit. It is a set of electronic circuits on one small plate (“chip”) of semiconductor material, normally silicon. Also known as chip or microchip, ICs are the heart and brains of most circuits and are are a keystone of modern electronics.

    264. In computer processing, ______ selects processes from the pool and loads them into memory for execution.

    (1) Job Scheduler
    (2) Resource Scheduler
    (3) CPU Scheduler
    (4) Process Scheduler
    264. (1) A job scheduler, also known as long term scheduler, determines which programs are admitted to the system for processing. It selects processes from the queue and loads them into memory for execution. Process loads into the memory for CPU scheduling.

    265. The UNIX operating system is suitable for

    (1) Multi user
    (2) Real-Time Processing
    (3) Distributed Processing
    (4) Single user
    265. (1) Unix is a family of multitasking, multiuser computer operating systems that derive from the original AT&T Unix, developed in the 1970s at the Bell Labs. It provides separate logins for each user and separate storage space. Most importantly it supports separate security for users and groups.

    266. In IT networking, which of the following device is used in physical layer?

    (1) Repeater 
    (2) Router
    (3) Transport Gateway
    (4) Bridge
    266. (1) In the seven-layer OSI model of computer networking, the physical layer or layer 1 is the first and lowest layer. Devices that operate at the physical layer include repeaters, hubs, network interface cards (NICs), cables and connectors. Repeaters are used to regenerate electrical signals that have attenuated (i.e., weakened) as a result of distance.

    267. In IT, associative memory is called as

    (1) Virtual memory
    (2) Cache memory
    (3) Content addressable memory
    (4) Main memory
    267. (3) Associative memory in computer organization is when memory is accessed through content rather thanthrough a specific address. Associative memory is also known as associative storage, associative array or content-addressable memory, or CAM. Associative memory is found on a computer hard drive and used only in specific high-speed searching applications.

    268. In networks, a small message used to pass between one station to another is known as

    (1) Token 
    (2) Byte
    (3) Word 
    (4) Ring
    268. (1) Token is an efficient form of message passing frequently used in ring networks. It consists of a very short message that circulates around the ring in a logical direction when devices are idle. To transmit, the device must seize the token. Token provides fair access for all stations, and eliminates the collisions of contention-based access methods.

    269. In the following list of devices which device is used in network layer?

    (1) Repeaters
    (2) Router
    (3) Application Gateway
    (4) Switch
    269. (2) The third-lowest layer of the OSI Reference Model is the network layer. It is responsible for packet forwarding including routing through intermediate routers.Routers forward data packets between computer networks. A data packet is forwarded from one router to another through the networks that constitute the internetwork until it reaches its destination node.

    270. Which of the following is not a weighted code?

    (1) Excess 3-Code
    (2) Binary Number System
    (3) Decimal Number System
    (4) BCD Number System
    270. (1) The weighted codes are those that obey the position weighting principle, which states that the position of each number represent a specific weight. In weighted codes, each digit is assigned a specific weight according to its position. Non-weighted or un-weighted codes are those codes in which the digit value does not depend upon their position i.e., each digit position within the number is not assigned fixed value. Examples of non-weighted codes are: Un-weighted BCD code, Excess-3 code and gray code.

    271. Related to computers, what is ‘Wetware’ ?

    (1) Computer programs
    (2) Circuitory
    (3) Human brain
    (4) Chemical storage devices
    271. (3) Wetware is a term drawn from the computer-related idea of hardware or software, but applied to biological life forms. Here the prefix “wet” is a reference to the water found in living creatures. Wetware is used to describe the elements equivalent to hardware and software found in a person, namely the central nervous system (CNS) and the human brain.

    272. In IT, the method for updating the main memory as soon as a word is removed from the cache is called

    (1) Write – through
    (2) Write – back
    (3) Protected – write
    (4) Cache – write
    272. (2) The write-back method involves updating only the cache location and to mark it as updated with an associated flag bit, often called the dirty or modified bit. The main memory location of the word is updated later, when the block containing this marked word is to be removed from the cache to make room for a new block. The reason for the write back method is that during the time a word resides in the cache, it may be updated several times.

    273. The Network is overloaded with enormous data sent by many computers within the network. The inability of the network to deliver the data is termed as__________ .

    (1) Access control
    (2) Congestion
    (3) Error propagation
    (4) Deadlock
    273. (2) Network congestion in data networking and queueing theory is the reduced quality of service that occurs when a network node is carrying more data than it can handle. Typical effects include queueing delay, packet loss or the blocking of new connections. Congestion occurs when bandwidth is insufficient and network data traffic exceeds capacity.

    274. What is ‘net neutrality’?

    (1) Internet Service Providers and governments should treat all data on the internet equally
    (2) Piracy in internet must be curbed
    (3) Internet users must give out balanced opinions in social media sites
    (4) Internet should be kept free from malware and virus
    274. (1) Net neutrality is the principle that Internet service providers and governments should treat all data on the Internet the same, not discriminating or charging differentially by user, content, website, platform, application, type of attached equipment, or mode of communication. The term was coined by Columbia University media law professor Tim Wu in 2003.

    275. In which mode can the computers that are associated send frames directly to each other?

    (1) Adhoc mode
    (2) Infrastructure mode
    (3) Structured mode
    (4) Anonymous mode
    275. (1) Adhoc mode is a framework in which devices or stations communicate directly with each other, without the use of an Access Point (AP). Ad-hoc mode is also referred to as peer-to-peer mode or an Independent Basic Service Set (IBSS). Ad-hoc mode is useful for establishing a network where wireless infrastructure does not exist or where services are not required.

    276. _____changes each time it is installed to avoid detection by antivirus software.

    (1) Polymorphic virus
    (2) worm
    (3) logic bomb
    (4) trojan horse
    276. (1) Polymorphic virus changes each time it is installed to avoid detection by antivirus software. The changes do not affect the virus’ functionality but rather change the virus’ signature. A virus signature is a pattern that can be used to identify a virus, typically a series of bytes that make up the virus code.

    277. In the following list of devices, which device is used in data link layer?

    (1) Repeaters
    (2) Routers
    (3) Application gateway
    (4) Bridge
    277. (4) The Data Link layer is the second layer of the seven-layer Open Systems Interconnection (OSI) model of computer networking at which meaning is assigned to the bits that are transmitted over the network.Two types of Data Link layer devices are commonly used on networks: bridges and switches. A bridge is an intelligent repeater that is aware of the MAC addresses of the nodes on either side of the bridge and can forward packets accordingly. A switch is an intelligent hub that examines the MAC address of arriving packets in order to determine which port to forward the packet to.

    278. Which algorithm is used to decide the path to transfer the packets from source to destination?

    (1) Routing 
    (2) Pathing
    (3) Selecting 
    (4) Directing
    278. (1) In order to transfer packets from a sending host to the destination host, the network layer must determine the path that the packets are to follow. Routing is the process by which systems decide where to send a packet. It directs network packets from their source toward their destination through intermediate network nodes by specific packet forwarding mechanisms.

    279. Which mechanism is used by the computer virus ‘worm’ to duplicate itself?

    (1) Swap 
    (2) Increment
    (3) Spawn 
    (4) Swarm
    279. (3) After a virus worm enters computer system, the operating system (OS) creates single thread for the worm’s execution. Next, the worm spawns or creates another process that is an exact duplicate of the original process. In other words, the worm makes an exact duplicate of itself within the computer’s memory. The worm continues to duplicate itself each time the OS manages the worm’s process till it paralyzes the OS completely and forces it to shut down.

    280. Which of the following uses the spawn mechanism to duplicate itself ?

    (1) Trojan horse
    (2) Worm
    (3) Keystroke logger
    (4) Logic bomb
    280. (2) A worm is a process that uses the spawn mechanism to clobber system performance. The worm
    spawns copies of itself, using up system resources and perhaps locking out system use by all other processes. On computer networks, worms are particularly potent, since they may reproduce themselves
    among systems and thus shut down the entire network. Such an event occurred in 1988 to UNIX systems on the internet.

    Post a Comment