Upload
others
View
1
Download
0
Embed Size (px)
Citation preview
1
2
POCKET QUESTIONS AND ANSWERS FOR
COMPUTER ANALYSTS, BANKERS AND
COMPUTER OPERATORS
1. Which is Computer Memory that does not forget ?
Ans: ROM
2. The computer memory holds data and ?
Ans: program
3. What is means by term RAM ?
Ans: Memory which can be both read and written to
4. Which computer memory is essentially empty ?
Ans: RAM
5. The bubbles in a bubble memory pack are created
with the help of ?
Ans: magnetic field
6. Virtual memory is -
Ans: an illusion of an extremely large memory
3
7. Special locality refers to the problem that once a
location is referenced
Ans: a nearby location will be referenced soon
8. An example of a SPOOLED device
Ans: A line printer used to print the output of a number
of jobs
9. Page faults occurs when
Ans: one tries to divide a number by 0
10. Overlay is
Ans: a single contiguous memory that was used in the
olden days for running large programs by swapping
Operating System Question Answer
11. Concurrent processes are processes that -
Ans: Overlap in time
12. The page replacement policy that sometimes leads to
more page faults when the size of the memory is
4
increased is -
Ans: FIFO
13. The only state transition that is initiated by the user
process itself is -
Ans: Block
14. Fragmentation is -
Ans: fragments of memory words unused in a page
15. Give Example of real time systems
Ans: Aircraft control system, A process control system
16. Dijkstra‟s banking algorithm in an operating system
solves the problem of -
Ans: Deadlock Avoidance
17. In a paged memory system, if the page size is
increased, then the internal fragmentation generally -
Ans: Becomes more
18. An operating system contains 3 user processes each
requiring 2 units of resources R. The minimum number
5
of units of R such that no deadlock will ever occur is -
Ans: 4
19. Critical region is -
Ans: A set of instructions that access common shared
resources which exclude one another in time
20. Kernel is -
Ans: The set of primitive functions upon which the rest
of operating system functions are built up
21. Necessary conditions for deadlock are -
Ans: Non-preemption and circular wait, Mutual
exclusion and partial allocation
22. In a time sharing operating system, when the time
slot given to a process is completed, the process goes
from the RUNNING state to the -
Ans: READY state
23. Supervisor call -
Ans: Are privileged calls that are used to perform
6
resource management functions, which are controlled by
the operating system
24. Semaphores are used to solve the problem of -
Ans: Mutual exclusion, Process synchronization
25. If the property of locality of reference is well
pronounced in a program-
Ans: The number of page faults will be less
Operating System Question
26. Pre-emptive scheduling, is the strategy of
temporarily suspending a running process-
Ans: before the CPU time slice expires
27. Mutual exclusion problem occurs -
Ans: among processes that share resources
27. Sector interleaving in disks is done by -
Ans: the operating system
7
28. Disk scheduling involves deciding-
Ans: the order in which disk access requests must be
serviced
29. Dirty bit is used to show the -
Ans: page that is modified after being loaded into cache
memory
30. Fence register is used for-
Ans: memory protection.
31. The first-fit, best-fit and worst-fit algorithm can be
used for-
Ans: contiguous allocation of memory
32. Give example of single-user operating systems-
Ans: MS-DOS, XENIX
33. In Round Robin CPU Scheduling, as the time
quantum is increased, the average turn around time-
Ans: varies irregulary
8
34. In a multiprogramming environment-
Ans: more than one process resides in the memory
35. The size of the virtual memory depends on the size
of the -
Ans: Address Bus
36. Give example of Scheduling Policies in which
context switching never take place-
Ans: Shortest Job First, First-cum-first-served
37. Suppose that a process is in „BLOCKED‟ state
waiting for some I/O service. When the service is
completed, it goes to the-
Ans: READY State
SECTION B
1.Which among the following is not a security / privacy
risk?
(A)Spam
(B)Hacking
(C)Virus
9
(D)Phishing
(E)Vishing
Ans. Spam
2.Now a days Vishing has become a criminal practice of
using social engineering over which of the following?
(A)Social networking sites
(B)Mobile Phones
(C)E-mails
(D)Cyber cafés
(E)All of the above
Ans. Mobile Phones
3.When some unidentified / unknown person / firm
sends you mail in a trustworthy /lucrative way asking for
sensitive banks and online payment information, this is a
case of __?
(A)spam
(B)hacking
(C)Phishing
10
(D)Vishing
(E)Simulation
Ans. Phishing
4.Which among the following is a correct definition of
“Digital Divide”?
(A) gap between people having access to mobile and
internet access
(B) gap between people having access to internet /IT and
no internet/IT
(C) gap between people having access to broadband and
narrowband internet
(D) gap between people having access to internet
banking and normal banking
(E)Gap between the people having an email account and
no email account
Ans. (B) gap between people having access
to internet /IT and no internet/IT
5.Which among the following is the most common
11
source of Viruses to the hard disk of your computer?
(A)Incoming Email
(B)Outgoing Email
(C)CD Roms
(D)Websites
(E)Mobile
Ans. (A) Incoming Email
6.What is the fullform of W3C?
(A)World Wide Web Consortium
(B)World Wide Web Company
(C)World Wide Web Center
(D)World Wide Web Command
(E)None of them
Ans. (A) World Wide Web Consortium
7.Which among the following is used for removing a
software bug / defect which is available for free of cost
from the software provider?
(A)Version
12
(B)Update
(C)Help
(D)Patch
(E)Syntax
Ans. (D) Patch
8.What is the name of the proposed software application
that would allow users of automated teller machines
(ATMs) to alert the police of a forced cash withdrawal
by entering their personal identification number (PIN) in
reverse order?
(A)ATM SafetyPIN
(B)ATM SafetyPro
(C)ATM SafetyCode
(D)ATM SafetySign
(E)ATM SafetyDigit
Ans. (A) ATM SafetyPIN
9.In the MICR Code Line Structure what do represent
the first three digits of Sort field number consisting of
13
nine digits?
(A)City
(B)Bank
(C)Branch
(D)Account Type
(E)None of the above
Ans. first three digits represent the city, the
next three indicate the bank and the last
three digits signify the branch
10.Most of the internet banking sites provide which of
the following feature to reduce the risk of keystroke
logging for the password entry?
(A)Virtual keyboard
(B)Finger Touching
(C)Touchscreen
(D)ShapeWriter
(E)Dasher
Ans. (A) Virtual Keyboard
14
11.ADSL data communications technology uses which
of the following for faster data transmission ?
(A)Voiceband modem
(B)Wireless Modem
(C)Copper telephone Lines
(D)Sockets
(E)None of the above
Ans. (C) Copper telephone Lines
12.While working on Microsoft World , which among
the following is the command for “Undo”?
(A)Cntrl +A
(B)Cntrl +Z
(C)Cntrl +Y
(D)Cntrl +C
(E)Cntrl +V
Ans. (B) Cntrl + Z
13.While browsing the internet , which of the following
key is used for full screen view?
15
(A)F3
(B)F5
(C)F11
(D)F9
(E)F10
Ans. (C) F11
14.Which of the following is a suitable term for any
programmable content of a hardware device
configurations and data for application-specific
integrated circuits (ASICs), programmable logic devices,
etc.?
(A)Hardware
(B)Software
(C)Firmware
(D)Malware
(E)Liveware
Ans. (C) Firmware
15.Most of the internet sites now a days use CSS
16
primarily to enable the separation of document content
(written in HTML or a similar markup language) from
document presentation, including elements such as the
layout, colors, and fonts. What is full form?
(A)Cascading Style Software
(B)Clear Style Sheet
(C)Cascading Style Sheet
(D)Common Style Sheet
(E)Conditional Style Sheet
Ans. (C) Cascading Style Sheet
16.What is the purpose of keeping electronic devices
such as computers, televisions, and remote controlled
devices on Sleep mode?
(A)Reduce Power consumption
(B)Back Up
(C)To write contents of RAM to hard disc
(D)To improve download speed
(E)None of the above
17
Ans. (A) Deduce Power Consumption
17.Which of the following device is a volatile storage?
(A)RAM
(B)Hard Disc
(C)Magnetic Tape
(D)Floppy Disc
(E)ROM
Ans. (A) RAM
18.Which of the following company owns/ uses the
Virtual Hard Disk (.vhd) format for Virtual PC?
(A)IBM
(B)Microsoft
(C)Intel
(D)Google
(E)Apple
Ans. (B) Microsoft
19.What is Office Open XML?
18
(A)A file format
(B)A software
(C)A electronic device
(D)An international standard
(E)None of the above
Ans. (A) A file format
20.What is the ultimate purpose of Defragmentation?
(A)Make the PC faster
(B)Create More Free Space
(C)Delete temporary files
(D)Reduce Power consumption
(E)All of the above
Ans. (B) Create More Free Space is the main
purpose however performance is also
improved in most cases.