Computer GK Quiz-15

Computer GK Quiz-15

Computer Multiple Choice Questions (MCQs) Quiz for State and UPSC Civil Services Examinations. Objective Questions on Computer for competitive examinations.

    281. Find the “odd one out”.

    (1) Linux 
    (2) Windows 98
    (3) C++ 
    (4) Windows 7
    281. (3) Linux, Windows 98 and Windows 7 are examples of operating system, the system software that manages computer hardware and software resources and provides common services for computer programs. C++ is a middle-level programming language developed by Bjarne Stroustrup starting in 1979 at Bell Labs.

    282. Which scheduling service is used to handle traffic with different priorities?

    (1) Traffic management
    (2) QoS traffic scheduling
    (3) QoS Scheduler
    (4) Qos Manager
    282. (2) In the field of computer networking and other packet-switched telecommunication networks, Quality of Service (QoS) traffic scheduling refers to traffic prioritization and resource reservation control mechanisms that provides different priority to different applications, users, or data flows, and guarantees a certain level of performance to a data flow. It is particularly important for the transport of traffic with special requirements.

    283. Which country has the largest internet users?

    (1) USA 
    (2) China
    (3) India 
    (4) Russia
    283. (2) As per the latest data of International Telecommunications Union, China had the largest number of internet users in the world (721,434,547) as of 30 June, 2016. India comes second with 462,124,989 internet users.

    284. ______ involves traversing the entire file system, marking everything that can be accessed.

    (1) Index pointer
    (2) Garbage collection
    (3) File system
    (4) Stack pointer
    284. (2) Garbage collection involves traversing the entire file system, marking everything that can be accessed. Then, a second pass collects everything that is not marked onto a list of free space. Garbage collection for a disk-based file system, however, is extremely time-consuming and is thus seldom attempted. Garbage collection is necessary only because of possible cycles in the graph.

    285. Programs that duplicate the functionality of one system on another system is known as

    (1) Emulators 
    (2) Simulators
    (3) Evaluators 
    (4) PCB
    285. (1) In computing, an emulator is hardware or software that enables one computer system (called the host) to behave like another computer system (called the guest). An emulator typically enables the host system to run software or use peripheral devices designed for the guest system.

    286. Money transfer through mobile is called __________.

    (1) IFSC 
    (2) ATM
    (3) IMPS 
    (4) IFS
    286. (3) Immediate Payment Service (IMPS) is an instant interbank electronic fund transfer service through mobile phones. The customer should have sufficient account balance to initiate a fund transfer through this method. Unlike NEFT and RTGS, the service is available 24×7 throughout the year including bank holidays.

    287. Cache memory works on the principle of __________ .

    (1) Locality of data
    (2) Locality of reference
    (3) Locality of Memory
    (4) Locality of Memory & reference
    287. (2) A cache memory works on the principle of locality of reference, a term for the phenomenon in which the same values, or related storage locations, are frequently accessed, depending on the memory access pattern. Caching improves access time and reduces data traffic to data sources that have limited throughput.

    288. Which circuit is used to store one bit of data ?

    (1) Register 
    (2) Flip Flop
    (3) Vector 
    (4) Encoder
    288. (2) In electronics, a flip-flop or latch is a circuit that has two stable states and can be used to store state information.A flip-flop stores a single bit (binary digit) of data; one of its two states represents a “one” and the other represents a “zero”. Such data storage can be used for storage of state, and such a circuit is described as sequential logic. When used in a finitestate machine, the output and next state depend not only on its current input, but also on its current state.

    289. C. P. U. consists of

    (1) Arithmetic and Logical unit and Register
    (2) Arithmetic and Logical unit, Register and Control unit
    (3) System unit and Memory
    (4) Hard disk and Control unit
    289. (2) Principal components of a central processing unit (CPU)include the arithmetic logic unit (ALU) that performs arithmetic and logic operations, processor registers that supply operands to the ALU and store the results of ALU operations, and a control unit that orchestrates the fetching (from memory) and execution of instructions by directing the coordinated operations of the ALU, registers and other components.

    290. Constantly running system program processes are known as

    (1) Daemons 
    (2) Processes
    (3) Process Block
    (4) Process Control Block
    290. (1) In multitasking computer operating systems, a daemon is a computer program that runs as a background process, rather than being under the direct control of an interactive user. Systems often start
    daemons at boot time and serve the function of responding to network requests, hardware activity, or
    other programs by performing some task.

    291. In IT, the technique of delaying outgoing acknowledgements temporarily is known as

    (1) AR Acknowledgement
    (2) AR request
    (3) Piggybacking
    (4) Piggyframing
    291. (3) The technique of temporarily delaying outgoing acknowledgements so that they can be hooked onto the next outgoing data frame is known as piggybacking. The principal advantage of using piggybacking over having distinct acknowledgement frames is a better use of the available channel bandwidth.

    292. UDP is a

    (1) connection oriented protocol
    (2) connectionless protocol
    (3) userdefined protocol
    (4) security protocol
    292. (2) User Datagram Protocol (UDP) uses a simple connectionless transmission model with a minimum of protocol mechanism. It provides checksums for data integrity, and port numbers for addressing different functions at the source and destination of the datagram.It is an alternative communications protocol to Transmission Control Protocol (TCP) used primarily for establishing low-latency and loss tolerating connections between applications on the Internet.

    293. Which of the following is the operation executed on data stored in registers?

    (1) Bitoperation
    (2) Macrooperation
    (3) Microoperation
    (4) Byteoperation
    293. (3) The operations executed on data stored in registers are called Microoperations. Microoperation is an elementary operation performed (during one clock pulse), on the information stored in one or more registers. Examples of microoperation include: shift, load, clear, increment, count, etc.

    294. CPU Scheduler is also known as _____ .

    (1) Job Scheduler
    (2) Resource Scheduler
    (3) Short-term Scheduler
    (4) Process Scheduler
    294. (3) The short-term scheduler is also known as the CPU scheduler. Its main objective is to increase system performance in accordance with the chosen set of criteria. It decides which of the ready, in-memory processes is to be executed after a clock interrupt, an I/O interrupt, an operating system call or another form of signal. Thus, the short-term scheduler makes scheduling decisions much more frequently than the long-term or mid-term schedulers.

    295. Which of the following statement is true?

    (1) A Primary key is also a candidate key
    (2) Each relation has at least one foreign key
    (3) Foreign keys can’t have null values
    (4) A Primary key is also an alternate key
    295. (1) Primary Key is a column or a combination of columns that uniquely identify a record. Only one Candidate Key can be Primary Key. For a Candidate Key to qualify as a Primary Key, it should be unique and non-null. So, basically a primary key is just one of the candidate keys, which is a just a minimal super key.

    296. In IT the technique that is used to increase the bandwidth is

    (1) Memory Management
    (2) Memory Interleaving
    (3) Memory Intraleaving
    (4) Memory Leaving
    296. (2) Interleaving is commonly used in pipelined processors to increase the memory bandwidth beyond the bandwidth of a single memory module (or bank). The performance of interleaved memory systems depends on the number of banks, the bank cycle time, the number of processors and the pattern of requests generated. The design of such systems involves a number of trade-offs which are dominated by the nature of interrelationships between these factors.

    297. When does a Page fault occur?

    (1) There is an error in a specific page
    (2) A program accesses a page not currently in main memory
    (3) A program accesses a page of main memory
    (4) A program accesses a page belonging to another program
    297. (2) When the page (data) requested by a program is not available in the memory, it is called as a page fault. It occurs when a program accesses a page that has been mapped in address space, but has not been loaded in its main memory (RAM).This usually results in the application being shut down.

    298. Cache memory acts between

    (1) CPU and RAM
    (2) CPU and ROM
    (3) RAM and ROM
    (4) CPU and Hard disk
    298. (1) Cache memory is a very high speed semiconductor memory which can speed up the processor or CPU. It acts as a buffer between the CPU and main memory (RAM). It is used to hold those parts of data and program which are most frequently used by CPU. The parts of data and programs are transferred from disk to cache memory by operating system, from where CPU can access them.

    299. _______ is a type of computing that performs computation, storage and even applications as a service across a network.

    (1) Cloud Computing
    (2) Distributed Computing
    (3) Parallel Computing
    (4) Virtual Computing
    299. (1) Cloud computing is a type of Internet-based computing that provides shared computer processing resources and data to computers and other devices on demand. It enables convenient, on-demand network access to a shared pool of networks, servers, storage, applications, and services that can be rapidly provisioned with minimal effort or service provider interaction.

    300. WIMAX stands for

    (1) Wireless Interoperability for Microwave Access
    (2) Wired Interoperability for Microwave Access
    (3) Worldwide Interoperability for Microwave Access
    (4) Worldwide Infrastructure for Microwave Access
    300. (3) WIMAX stands for Worldwide Interoperability for Microwave Access. It is a family of wireless communication standards based on the IEEE 802.16 set of standards, which provide multiple physical layer (PHY) and Media Access Control (MAC) options.WiMAX is sometimes referred to as “Wi-Fi on steroids” and can be used for broadband connections, hotspots, etc.

    Post a Comment