Tuesday, March 12, 2013

IT OFFICER QUIZ

1.       An encoder has 2n input lines and _________output lines.
(a) 2                                       (b) n                      (c)2 *n
(d) n*n                                   (e) None of these

2.       Race around condition can be eliminated using_____
(a)    False triggering
(b)   Master-slave flip-flop
(c)    Two clock pulses
(d)   All of the above
(e)   None of these
3.       In J-K flip-flop the function K=J is used to realize______
(a)D-flip-flop                      (b) S-R flip-flop
(c) T-flip flop                      (d) Master-slave flip-flop
(e) None of these
4.       Which of the following is not used as a data structure?
(a)Array                                               (b)Linked list
(c)Graph                                              (d)Directory
(e)None of these
5.       Which of the following is an operating system call?
(a)CREATE                                           (b) LINK
(c)SYSTEM                                           (d) All of these
(e)None of these
6.       In C++ by default the members of a class are________
(a)Public                              `               (b)Private
(c)Both public and private            (d)Only public
(e)None of these
7.       Which of the following statement is not true in context of strings in C language?
(a)    It is array of characters
(b)   Last character of character array is always ‘/0’
(c)    C inserts the null character automatically
(d)   Any string in C can be read by the function get char()
(e)   None of these
8.       In core banking systems:
(a)    Store and forward of transaction is done
(b)   Branch server is not required
(c)    Local Database is not required
(d)   Transaction cannot happen from a non-home branch
(e)   None of these
9.       MV command in UNIX changes
(a)    Only the directory entry
(b)   Only the directory entry and i-node
(c)    Only the i-node number
(d)   All of the above
(e)   None of these
10.   Graphs can be implementing using
               i.       Arrays  ii. Linked list        iii. Stack                iv. Queue
(a)    i, ii, and iv
(b)   i, ii and iii
(c)    ii and iii
(d)   i, and iv
(e)   None of these     
11.   A file organization component of VSAM file is
(a)    Relative record data set
(b)   Entry sequential data set
(c)    Entry sequential data set
(d)   All of above
(e)   None of these
12.   When the result of a computation depends on the speed of the processes involved there is said to be
(a) Cycle stealing                              (b) Race condition
(c) A time lock                                  (d)A deadlock
(e) None of these
13.   Thrashing
(a)    Always occur on large computers
(b)   Is a natural consequence of virtual memory systems
(c)    Can always be avoided by swapping
(d)   Can be caused by poor paging algorithm
(e)   None of these
14.   The process of converting analog signals into digital signals so they can be processed by a receiving computer is referred to as:
(a)Modulation                   (b) Demodulation
(c)Synchronizing               (d) Digitizing
(e) None of these
15.   The relational database environment has all of the following components except
(a)Users                             (b) Separates files
(c) Database                       (d) Database administrator
(e)None of these
16.   Which of the following feature is true regarding concatenated virtual circuits?
(a)    A sequence of virtual circuits is set up from source through one or more gateways to the destination
(b)   Each gateway maintains table telling which virtual circuit pass through it
(c)    The scheme works best when all the networks have roughly the same properties
(d)   All of the above
(e)   None of these
17.   RSVP (Resource reservation protocol) used in
(a)    Congestion control
(b)   It allows multiple senders to transmit to multiple groups of receivers
(c)    It permit individuals receiver to switch channels freely and optimizes band width use while at the same time eliminating congestion
(d)   All of the above
(e)   None of these
18.   Primary key
(a)    Denote a candidate key that is chosen by the database designer as the principal means of identifying entities with in  an entity set
(b)   Attributes names of all primary key are unique
(c)    Primary key specification is optional and good idea to specify primary key for each relation
(d)   All of the above
(e)   None of these
19.   A compiler which runs on one machine and generates a code for another machine.
(a)Bootstrap                      (b) Cross-compiler
(c)Lexical analyzer             (d) All of the above
(e)None of these
20.   IPV6
(a)    It is used in real time stream protocol
(b)   They are 16 bytes long with 32 bits header
(c)    It is used in security
(d)   All of the above
(e)   None of these

ANSWER:
1.
(b)
11.
(d)
2.
(b)
12.
(b)
3.
(c)
13.
(d)
4.
(d)
14.
(d)
5.
(d)
15.
(b)
6.
(b)
16.
(d)
7.
(d)
17.
(d)
8.
(a)
18.
(d)
9.
(a)
19.
(b)
10.
(d)
20.
(d)


No comments:

Post a Comment