18
1

POCKET QUESTIONS AND ANSWERS FOR COMPUTER ANALYSTS ... · Ans: a nearby location will be referenced soon 8. An example of a SPOOLED device Ans: A line printer used to print the output

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

  • 1

  • 2

    POCKET QUESTIONS AND ANSWERS FOR

    COMPUTER ANALYSTS, BANKERS AND

    COMPUTER OPERATORS

    1. Which is Computer Memory that does not forget ?

    Ans: ROM

    2. The computer memory holds data and ?

    Ans: program

    3. What is means by term RAM ?

    Ans: Memory which can be both read and written to

    4. Which computer memory is essentially empty ?

    Ans: RAM

    5. The bubbles in a bubble memory pack are created

    with the help of ?

    Ans: magnetic field

    6. Virtual memory is -

    Ans: an illusion of an extremely large memory

  • 3

    7. Special locality refers to the problem that once a

    location is referenced

    Ans: a nearby location will be referenced soon

    8. An example of a SPOOLED device

    Ans: A line printer used to print the output of a number

    of jobs

    9. Page faults occurs when

    Ans: one tries to divide a number by 0

    10. Overlay is

    Ans: a single contiguous memory that was used in the

    olden days for running large programs by swapping

    Operating System Question Answer

    11. Concurrent processes are processes that -

    Ans: Overlap in time

    12. The page replacement policy that sometimes leads to

    more page faults when the size of the memory is

  • 4

    increased is -

    Ans: FIFO

    13. The only state transition that is initiated by the user

    process itself is -

    Ans: Block

    14. Fragmentation is -

    Ans: fragments of memory words unused in a page

    15. Give Example of real time systems

    Ans: Aircraft control system, A process control system

    16. Dijkstra‟s banking algorithm in an operating system

    solves the problem of -

    Ans: Deadlock Avoidance

    17. In a paged memory system, if the page size is

    increased, then the internal fragmentation generally -

    Ans: Becomes more

    18. An operating system contains 3 user processes each

    requiring 2 units of resources R. The minimum number

  • 5

    of units of R such that no deadlock will ever occur is -

    Ans: 4

    19. Critical region is -

    Ans: A set of instructions that access common shared

    resources which exclude one another in time

    20. Kernel is -

    Ans: The set of primitive functions upon which the rest

    of operating system functions are built up

    21. Necessary conditions for deadlock are -

    Ans: Non-preemption and circular wait, Mutual

    exclusion and partial allocation

    22. In a time sharing operating system, when the time

    slot given to a process is completed, the process goes

    from the RUNNING state to the -

    Ans: READY state

    23. Supervisor call -

    Ans: Are privileged calls that are used to perform

  • 6

    resource management functions, which are controlled by

    the operating system

    24. Semaphores are used to solve the problem of -

    Ans: Mutual exclusion, Process synchronization

    25. If the property of locality of reference is well

    pronounced in a program-

    Ans: The number of page faults will be less

    Operating System Question

    26. Pre-emptive scheduling, is the strategy of

    temporarily suspending a running process-

    Ans: before the CPU time slice expires

    27. Mutual exclusion problem occurs -

    Ans: among processes that share resources

    27. Sector interleaving in disks is done by -

    Ans: the operating system

  • 7

    28. Disk scheduling involves deciding-

    Ans: the order in which disk access requests must be

    serviced

    29. Dirty bit is used to show the -

    Ans: page that is modified after being loaded into cache

    memory

    30. Fence register is used for-

    Ans: memory protection.

    31. The first-fit, best-fit and worst-fit algorithm can be

    used for-

    Ans: contiguous allocation of memory

    32. Give example of single-user operating systems-

    Ans: MS-DOS, XENIX

    33. In Round Robin CPU Scheduling, as the time

    quantum is increased, the average turn around time-

    Ans: varies irregulary

  • 8

    34. In a multiprogramming environment-

    Ans: more than one process resides in the memory

    35. The size of the virtual memory depends on the size

    of the -

    Ans: Address Bus

    36. Give example of Scheduling Policies in which

    context switching never take place-

    Ans: Shortest Job First, First-cum-first-served

    37. Suppose that a process is in „BLOCKED‟ state

    waiting for some I/O service. When the service is

    completed, it goes to the-

    Ans: READY State

    SECTION B

    1.Which among the following is not a security / privacy

    risk?

    (A)Spam

    (B)Hacking

    (C)Virus

  • 9

    (D)Phishing

    (E)Vishing

    Ans. Spam

    2.Now a days Vishing has become a criminal practice of

    using social engineering over which of the following?

    (A)Social networking sites

    (B)Mobile Phones

    (C)E-mails

    (D)Cyber cafés

    (E)All of the above

    Ans. Mobile Phones

    3.When some unidentified / unknown person / firm

    sends you mail in a trustworthy /lucrative way asking for

    sensitive banks and online payment information, this is a

    case of __?

    (A)spam

    (B)hacking

    (C)Phishing

  • 10

    (D)Vishing

    (E)Simulation

    Ans. Phishing

    4.Which among the following is a correct definition of

    “Digital Divide”?

    (A) gap between people having access to mobile and

    internet access

    (B) gap between people having access to internet /IT and

    no internet/IT

    (C) gap between people having access to broadband and

    narrowband internet

    (D) gap between people having access to internet

    banking and normal banking

    (E)Gap between the people having an email account and

    no email account

    Ans. (B) gap between people having access

    to internet /IT and no internet/IT

    5.Which among the following is the most common

  • 11

    source of Viruses to the hard disk of your computer?

    (A)Incoming Email

    (B)Outgoing Email

    (C)CD Roms

    (D)Websites

    (E)Mobile

    Ans. (A) Incoming Email

    6.What is the fullform of W3C?

    (A)World Wide Web Consortium

    (B)World Wide Web Company

    (C)World Wide Web Center

    (D)World Wide Web Command

    (E)None of them

    Ans. (A) World Wide Web Consortium

    7.Which among the following is used for removing a

    software bug / defect which is available for free of cost

    from the software provider?

    (A)Version

  • 12

    (B)Update

    (C)Help

    (D)Patch

    (E)Syntax

    Ans. (D) Patch

    8.What is the name of the proposed software application

    that would allow users of automated teller machines

    (ATMs) to alert the police of a forced cash withdrawal

    by entering their personal identification number (PIN) in

    reverse order?

    (A)ATM SafetyPIN

    (B)ATM SafetyPro

    (C)ATM SafetyCode

    (D)ATM SafetySign

    (E)ATM SafetyDigit

    Ans. (A) ATM SafetyPIN

    9.In the MICR Code Line Structure what do represent

    the first three digits of Sort field number consisting of

  • 13

    nine digits?

    (A)City

    (B)Bank

    (C)Branch

    (D)Account Type

    (E)None of the above

    Ans. first three digits represent the city, the

    next three indicate the bank and the last

    three digits signify the branch

    10.Most of the internet banking sites provide which of

    the following feature to reduce the risk of keystroke

    logging for the password entry?

    (A)Virtual keyboard

    (B)Finger Touching

    (C)Touchscreen

    (D)ShapeWriter

    (E)Dasher

    Ans. (A) Virtual Keyboard

  • 14

    11.ADSL data communications technology uses which

    of the following for faster data transmission ?

    (A)Voiceband modem

    (B)Wireless Modem

    (C)Copper telephone Lines

    (D)Sockets

    (E)None of the above

    Ans. (C) Copper telephone Lines

    12.While working on Microsoft World , which among

    the following is the command for “Undo”?

    (A)Cntrl +A

    (B)Cntrl +Z

    (C)Cntrl +Y

    (D)Cntrl +C

    (E)Cntrl +V

    Ans. (B) Cntrl + Z

    13.While browsing the internet , which of the following

    key is used for full screen view?

  • 15

    (A)F3

    (B)F5

    (C)F11

    (D)F9

    (E)F10

    Ans. (C) F11

    14.Which of the following is a suitable term for any

    programmable content of a hardware device

    configurations and data for application-specific

    integrated circuits (ASICs), programmable logic devices,

    etc.?

    (A)Hardware

    (B)Software

    (C)Firmware

    (D)Malware

    (E)Liveware

    Ans. (C) Firmware

    15.Most of the internet sites now a days use CSS

  • 16

    primarily to enable the separation of document content

    (written in HTML or a similar markup language) from

    document presentation, including elements such as the

    layout, colors, and fonts. What is full form?

    (A)Cascading Style Software

    (B)Clear Style Sheet

    (C)Cascading Style Sheet

    (D)Common Style Sheet

    (E)Conditional Style Sheet

    Ans. (C) Cascading Style Sheet

    16.What is the purpose of keeping electronic devices

    such as computers, televisions, and remote controlled

    devices on Sleep mode?

    (A)Reduce Power consumption

    (B)Back Up

    (C)To write contents of RAM to hard disc

    (D)To improve download speed

    (E)None of the above

  • 17

    Ans. (A) Deduce Power Consumption

    17.Which of the following device is a volatile storage?

    (A)RAM

    (B)Hard Disc

    (C)Magnetic Tape

    (D)Floppy Disc

    (E)ROM

    Ans. (A) RAM

    18.Which of the following company owns/ uses the

    Virtual Hard Disk (.vhd) format for Virtual PC?

    (A)IBM

    (B)Microsoft

    (C)Intel

    (D)Google

    (E)Apple

    Ans. (B) Microsoft

    19.What is Office Open XML?

  • 18

    (A)A file format

    (B)A software

    (C)A electronic device

    (D)An international standard

    (E)None of the above

    Ans. (A) A file format

    20.What is the ultimate purpose of Defragmentation?

    (A)Make the PC faster

    (B)Create More Free Space

    (C)Delete temporary files

    (D)Reduce Power consumption

    (E)All of the above

    Ans. (B) Create More Free Space is the main

    purpose however performance is also

    improved in most cases.