1. What is the name of the network topology in which there are bi-directional links between each possible node?
A) Ring
B) Star
C) Tree
D) Mesh
2. Which scheduling policy is most suitable for a time-shared operating system?
A) Shortest job first
B) Round-robin
C) Elevator
D) First-come-first-serve
3. A next-generation web content development language ……………. typically refers to a suite of technologies that allow developers to store data in a readable format.
A) HTML
B) XML
C) XSL
D) PHP
4. A(n) ………………. is a private corporate network that uses standard Internet protocols and interfaces.
A) Internet
B) Extranet
C) Local Area Network
D) Intranet
5. Integrated circuits are related to …………………….. generations of computers.
A) Second
B) Third
C) Fourth
D) Fifth
Table of Contents
Read Also: Solved MCQ for Computer Officer Exam
6. Which of the following is the most suitable scheduling scheme in a real-time operating system?
A) Round robin
B) First come, first serve
C) Preemptive scheduling
D) Random Scheduling
7. Kernel is ………
A) Considered as the critical part of the operating system
B) The software which monitors the operating system
C) The set of primitive functions upon which the rest of the operating system functions are built up
D) None of the above
8. Which of the following storage is the fastest?
A) RAM
B) ROM
C) Register
D) Blu-ray disc
9. A polymorphic virus ………
A) Modifies its program code each time it attaches itself to another program or file.
B) Is a malicious logic program that copies itself repeatedly in memory or on a disk drive until no memory or disk space remains.
C) A malicious logic program that hides within or looks like a legitimate program.
D) Infects a program file, but still reports the size and creation date of the original, uninfected program.
10. Cache Memory ……
A) Helps to store more data on hard disk
B) Placed between main memory and microprocessor
C) Stores data permanently
D) Holds last time a website was visited only
Read Also: Solved Objective Questions for IT Officer Exam Part-2
Answers:
1. What is the name of the network topology in which there are bi-directional links between each possible node?
D) Mesh
Explanation: A mesh network is a local area network (LAN) that employs one of two connection arrangements: full mesh topology or partial mesh topology. In the full mesh topology, each node (workstation or another device) is connected directly to each of the others.
2. Which scheduling policy is most suitable for the time-shared operating system?
B) Round-robin
Explanation: In round-robin scheduling, processes are dispatched in a FIFO manner but are given a limited amount of CPU time called a time slice or a quantum. If a process does not complete before its CPU time expires, the CPU is preempted and given to the next process waiting in a queue. Read More: CPU/Process Scheduling
3. A next-generation web content development language ……………. typically refers to a suite of technologies that allow developers to store data in a readable format.
B) XML
Explanation: Extensible Markup Language (XML) is a markup language that defines a set of rules for encoding documents in a format that is both human-readable and machine-readable. It is a textual data format with strong support via Unicode for the languages of the world. Although the design of XML focuses on documents, it is widely used for the representation of arbitrary data structures. Read More: Extensible Markup Language (XML)-wikipedia.org
4. A(n) ………………. is a private corporate network that uses standard Internet protocols and interfaces.
D) Intranet
Explanation: An intranet is a private computer network that uses Internet Protocol technologies to securely share any part of an organization’s information or network operating system within that organization.
5. Integrated circuits are related to …………………….. generations of computers.
B) Third
Explanation: The mass increase in the use of computers accelerated with ‘Third Generation’ computers. These generally relied on Jack Kilby’s invention of the integrated circuit (or the microchip), starting around 1965. Read More: History of computing hardware
6. Which of the following is the most suitable scheduling scheme in a real-time operating system?
C) Preemptive scheduling
Explanation: A real-time operating system (RTOS) is an operating system (OS) intended to serve real-time application requests. It must be able to process data as it comes in, typically without buffering delays.
A scheduling discipline is preemptive if, once a process has been given the CPU can be taken away. The strategy of allowing processes that are logically runnable to be temporarily suspended is called preemptive scheduling, and it is in contrast to the “run to completion” method.
7. Kernel is ………
C) The set of primitive functions upon which the rest of the operating system functions are built up
Explanation: The Operating System The kernel does a basic set of primitive operations and processes, like a function call or macro expansion, part of the calling process, critical section for the process, etc. Read more: Process Scheduling
8. Which of the following storage is the fastest?
C) Register
Explanation: Register is faster than RAM, ROM, and Blu-ray discs.
9. A polymorphic virus ………
A) Modifies its program code each time it attaches itself to another program or file.
Explanation: Polymorphic viruses create varied (though fully functional) copies of themselves as a way to avoid detection by antivirus software. Some polymorphic viruses use different encryption schemes and require different decryption routines. Read More: Polymorphic viruses
10. Cache Memory ……
B) Placed between main memory and microprocessor
Explanation: The performance of a microcomputer system can be improved significantly by introducing a small, expensive but fast memory between a microprocessor and main memory. Read more: Cache Memory
Read More: CS/IT MCQ Questions for IT Officer Exam