CTEVT, Asst. Computer Operator 2081/08/17

 

Multi-Question Quiz with Styled Radio Buttons

Quiz

15:00

1. In word processing, the task of changing the appearance of a document is called:

2. Computer virus is:

3. Which of the following is the first line of an HTTP request message?

4. Which layer of the OSI model does DNS belong to?

5. Which of the following protocols is used by VPN?

6. Which of the following is false with respect to TCP?

7. Attempting to acquire sensitive information by redirecting the user to a fake website is usually called:

8. Which of the following multiple access techniques is used by IEEE 802.11 standard for wireless LAN?

9. Which layer does Port Addressing belong to?

10. Which of the following devices assign IP addresses to devices connected to a network that uses TCP/IP?

11. Which of the following layers is responsible for process-to-process deliver in the TCP/IP model?

12. Which of the following traversal techniques is equivalent to depth-first search?

13. In which of the following categories does Dijkstra's algorithm belong to?

14. Recursion is achievable using:

15. The goal of hashing is to produce a search that takes ____ time:

16. Infix to postfix conversion is possible using:

17. Shortest path between source and destination can be calculated effectively with:

18. Which of the following binary search tree traversal techniques displays information in ascending order?

19. Which data structure is one-ended?

20. Which of the following SQL commands is used for removing(or deleting) a relation from the database?

21. Which of the following queries is correct for using comparison operation in SQL?

22. Relation R1 has 10 tuples and 5 attributes. Relation R2 has 0 tuples and 7 attributes. When a cross JOIN is achieved between R1 and R2, how many tuples would the resultant set have?

23. Which of the following dependencies is used by 5NF?

24. A file manipulation command that extracts some of the records from a file is called:

25. What is the difference between restoring and recovering a database?

26. Which of the following is an attribute that can uniquely identify a row in a table?

27. Which of the following levels in ANSI/SPARC architecture is related to how data are actually stored in the database?

28. What is a program in execution called?

29. Which mode loads a minimal set of drivers when starting windows?

30. Which of the following algorithms chooses the page that had not been used for the longest period of time whenever the page required to be replaced?

31. Using CHMOD, if we want to give ALL permission to a user, which mode is used?

32. An increase in a computer RAM leads to a typical improvement in performance because___

33. Which memory management does not provide the user's program with a linear and contiguous address space?

34. CPU scheduling is the basis of which of the following system?

35. Which of the following principles of object-oriented programming is demonstrated when a single function name can be used for different types of actions?

36. The keyword used to define non-access modifier in JAVA programming is____

37. How are strings represented in memory in C?

38. Automatic initialization of object is carried out using a special member function called___

39. A hard disk is divided into tracks, which are further subdivided into___

40. The only command-oriented OS is___

41. A batch file is a script file that stores commands to be executed in _____ order.

42. Which of the following is the high-speed memory between main memory and CPU?

43. In computer, all calculations are performed in____

44. What is valid statement?

45. Which of the following is a capacitor based storage unit?

46. Which of the following entities does not belong to word processing?

47. A PowerPoint design template is stored in any file with extension.

48. Which of the following networks is accessible to only authorized users outside the organization?

49. Superscript, subscript, outline, emboss, engrave are known as part of___

50. What is the short cut for inserting a page break in MS Word?

Post a Comment

Previous Post Next Post