HomeModel CTEVT, Asst. Computer Operator 2081/08/17 E-Learn December 02, 2024 0 Multi-Question Quiz with Styled Radio Buttons Quiz 15:00 1. In word processing, the task of changing the appearance of a document is called: a. Editing b. Proofing c. Inserting d. Formatting 2. Computer virus is: a. Computer disease b. A set of instructions/program code c. A bacteria d. A system software 3. Which of the following is the first line of an HTTP request message? a. Request line b. Header line c. Status line d. Entity line 4. Which layer of the OSI model does DNS belong to? a. Network layer protocol b. Transport layer protocol c. Session layer protocol d. Application layer protocol 5. Which of the following protocols is used by VPN? a. Tunneling protocols b. Application level protocols c. Network protocols d. Mailing protocols 6. Which of the following is false with respect to TCP? a. Connection-oriented b. Process to process c. Transport layer protocol d. Unreliable 7. Attempting to acquire sensitive information by redirecting the user to a fake website is usually called: a. Spoofing b. Phishing c. URL redirection d. URL hijacking 8. Which of the following multiple access techniques is used by IEEE 802.11 standard for wireless LAN? a. CDMA b. CSMA/CA c. CSMA/CD d. ALOHA 9. Which layer does Port Addressing belong to? a. Application layer b. Network layer c. Transport layer d. Datalink layer 10. Which of the following devices assign IP addresses to devices connected to a network that uses TCP/IP? a. DHCP Server b. NIC c. Gateway d. DNS Server 11. Which of the following layers is responsible for process-to-process deliver in the TCP/IP model? a. Application layer b. Internet layer c. Transport layer d. Network access 12. Which of the following traversal techniques is equivalent to depth-first search? a. Pre-order b. Post-order c. Level-order d. In-order 13. In which of the following categories does Dijkstra's algorithm belong to? a. Dynamic programming b. Branch and bound c. Backtracking d. Greedy 14. Recursion is achievable using: a. Array b. Tree c. Queue d. Stack 15. The goal of hashing is to produce a search that takes ____ time: a. O(1) b. O(n2) c. O(log n) d. O(n log n) 16. Infix to postfix conversion is possible using: a. Stack b. Queue c. Array d. Tree 17. Shortest path between source and destination can be calculated effectively with: a. DFS b. BFS c. Dijkstra's algorithm d. Print's algorithm 18. Which of the following binary search tree traversal techniques displays information in ascending order? a. In-order b. Pre-order c. Post-order d. No-order 19. Which data structure is one-ended? a. Queue b. Stack c. Tree d. Graph 20. Which of the following SQL commands is used for removing(or deleting) a relation from the database? a. Drop b. Delete c. Rollback d. Remove 21. Which of the following queries is correct for using comparison operation in SQL? a. select * from student where age > 50 and < 80 b. select * from student where age > 50 and age < 80 c. select * from student where age > 50 and where age < 80 d. select * from student where 50 < age < 80 22. Relation R1 has 10 tuples and 5 attributes. Relation R2 has 0 tuples and 7 attributes. When a cross JOIN is achieved between R1 and R2, how many tuples would the resultant set have? a. 0 b. 10 c. 35 d. 50 23. Which of the following dependencies is used by 5NF? a. Functional dependency b. Join dependency c. Multivalued dependency d. Partial dependency 24. A file manipulation command that extracts some of the records from a file is called: a. Select b. Project c. Join d. Product 25. What is the difference between restoring and recovering a database? a. Both are same b. Restoring is the process of copying backup files from backup media to disk Recovery is the process of applying redo logs to the database to roll it forward c. Restoring is the process of rolling back the database to a previous time. Recovery is the process of copying backup files from backup media to disk d. Restoring is the process of rolling back the database to a previous time. Recovery is the process of recovering the database from a critical system failure. 26. Which of the following is an attribute that can uniquely identify a row in a table? a. Secondary key b. Candidate key c. Foreign key d. Alternate key 27. Which of the following levels in ANSI/SPARC architecture is related to how data are actually stored in the database? a. Physical level b. Logical level c. View level d. External level 28. What is a program in execution called? a. Paging b. Process c. Virtual memory d. Demand page 29. Which mode loads a minimal set of drivers when starting windows? a. Safe mode b. Normal mode c. VGA mode d. Network support mode 30. Which of the following algorithms chooses the page that had not been used for the longest period of time whenever the page required to be replaced? a. First in first out algorithm b. Additional reference bit algorithm c. Least recently used algorithm d. Counting based page replacement algorithm 31. Using CHMOD, if we want to give ALL permission to a user, which mode is used? a. 666 b. 667 c. 776 d. 777 32. An increase in a computer RAM leads to a typical improvement in performance because___ a. fewer page faults occurs b. virtual memory increases c. fewer segmentation faults occurs d. a larger RAM is faster 33. Which memory management does not provide the user's program with a linear and contiguous address space? a. Page memory management b. Single contiguous c. Partitioned allocation d. Segmented memory management 34. CPU scheduling is the basis of which of the following system? a. Multiprogramming operating system b. Larger memory sized system c. Multiprocessor system d. Multiuser system 35. Which of the following principles of object-oriented programming is demonstrated when a single function name can be used for different types of actions? a. Encapsulation b. Polymorphism c. Inheritance d. Abstraction 36. The keyword used to define non-access modifier in JAVA programming is____ a. Static b. Final c. Const d. Public 37. How are strings represented in memory in C? a. Same as other primitive data types b. The object of same class c. An array of characters d. Linked list of characters 38. Automatic initialization of object is carried out using a special member function called___ a. Friend b. Casting c. Reference Parameter d. Constructor 39. A hard disk is divided into tracks, which are further subdivided into___ a. Clusters b. Sectors c. Vectors d. Blocks 40. The only command-oriented OS is___ a. Ubuntu b. Windows c. MAC d. DOS 41. A batch file is a script file that stores commands to be executed in _____ order. a. Serial b. Parallel c. LIFO d. Alphabetical 42. Which of the following is the high-speed memory between main memory and CPU? a. Register memory b. Cache memory c. Virtual memory d. RAM 43. In computer, all calculations are performed in____ a. Control unit b. Memory unit c. Arithmetic and Logic unit d. Register 44. What is valid statement? a. 1 KB 1024 Bytes b. 1 MB 1024 Bytes c. 1 KB 1000 Bytes d. 1 MB 1000 Bytes 45. Which of the following is a capacitor based storage unit? a. SRAM b. ERAM c. DRAM d. EERAM 46. Which of the following entities does not belong to word processing? a. Paragraphs b. Cells c. Words d. Characters 47. A PowerPoint design template is stored in any file with extension. a. pot b. dtp c. ptt d. ppt 48. Which of the following networks is accessible to only authorized users outside the organization? a. Internet b. Intranet c. Extranet d. LAN 49. Superscript, subscript, outline, emboss, engrave are known as part of___ a. Text Effects b. Font Styles c. Font Effects d. Word Art 50. What is the short cut for inserting a page break in MS Word? a. Ctrl + break b. Ctrl + tab c. Ctrl + space d. Ctrl + enter Submit Quiz You Might Like View all
Post a Comment