10 Mar 2020

Computer Question- Answers

Computer Question- Answers for Junior System Engineer Exam

Q 1. BIOS stands for ______. 
A. Bit-initiated Operating System 
B. Basic Input / Output System 
C. Basic Initial Operating System 
D. Bandwidth Initiated Output System 
Ans. B. Basic Input / Output System 

Q 2. Which of the following activities is NOT a part of Process management of the Operating System? 
A. Scheduling processes and threads on the CPUs. 
B. Assigning memory to processes. 
C. Creating and deleting both user and system processes. 
D. Providing mechanisms for process synchronization. 
Ans. B. Assigning memory to processes. 

Q 3. Which of the following statements is NOT TRUE about video cards? 
A. Video card is attached to the motherboard. 
B. Video card controls and calculates an image's appearance on the screen. 
C. Video card enhances the output of images but does not accelerate the video throughput.
D. Video card is also known as Graphics Card.
Ans. C. Video card enhances the output of images but does not accelerate the video throughput.

Q 4. ________ is a standard Internet protocol for transmitting files between computers on the Internet over TCP/IP connections. 
A. Hyper Text transfer Protocol (HTTP) 
B. Internet Protocol Security (IPSec) 
C. Fiber to Home (FTTH) 
D. File Transfer Protocol (FTP)
Ans. D. File Transfer Protocol (FTP)

Q 5. What does 'DAC' stand for in system security? 
A. Direct Access Control 
B. Discretionary Access Control 
C. Digital and Analog Control 
D. Digital to Analog Convertor
Ans. B. Discretionary Access Control 

Q 6. A ______ is a classical access enforcement mechanism in operating system architecture. 
A. Reference Monitor 
B. Authorization Module 
C. Policy Store 
D. Kernel
Ans. A. Reference Monitor

Q 7. In _____ system, a unique password is required every time a user tries to login into the system. 
A. Authorisation 
B. Authentication 
C. One Time Password 
D. Password 
Ans. C. One Time Password

Q 8. In Unix/Linux _____ is the command and system call which is used to change the access permissions of file/directory. 
A. chmod 
B. chown 
C. chgrp 
D. chattr
Ans. A. chmod

Q 9. What do you call the unsolicited Emails received from false address? 
A. Bulk Emails 
B. Spam Emails 
C. False Emails 
D. Threat Emails 
Ans. B. Spam Emails 

Q 10. _____ is a program designed to infiltrate and damage computers without owner's approval. 
A. Software 
B. Hardware 
C. Firmware 
D. Malware 
Ans. D. Malware 

Q 11. Which of the below options is not a computer virus? 
A. Capripox Virus 
B. Resident Virus 
C. Polymorphic Virus 
D. Direct Action Virus 
Ans. A. Capripox Virus

Q 12. There is a visual indication of ____ ribbon in the documents with invisible digital signatures. 
A. Blue 
B. Red 
C. Black 
D. Brown 
Ans. A. Blue

Q 13. _____ is a character encoding standard also referred to as ASCII. 
A. African Standard Code for Internet Interchange 
B. American Standard Code for Internet Interchange 
C. American Standard Code for Information Interchange 
D. African Standard Code for Information Interchange
Ans. C. American Standard Code for Information Interchange

Q 14. Which of the below is not a Logical Operator? 
A. AND 
B. OR 
C. XDRD 
D. XOR
Ans. C. XDRD

Q 15. Which of the below is an input peripheral device? 
A. Printer 
B. Scanner 
C. Projector 
D. Speakers 
Ans. B. Scanner 

Q 16. 'Modem' , a very popular computer peripheral is categorized as '_______' device. 
A. Input 
B. Output 
C. Input/output 
D. Storage 
Ans. C. Input/output

Q 17. The install is a self compressed executable file that when you run will extract itself and contains all of the files needed to run your installation. Which type of software installation can BEST fit the above statement? 
A. Media based software installation 
B. Web based software installation 
C. Single exe installation 
D. Windows Installer installation
Ans. C. Single exe installation

Q 18. In ________, the 'ghost' is created with the complete contents of the computer which are then reinstalled in case of data loss or corruption. 
A. Imaged Installation 
B. Software-assisted installation 
C. Scripted installation 
D. Manual software installations 
Ans. A. Imaged Installation

Q 19. What is the popular path where system engineer creates a home folder for the new software before starting software installation on windows operating systems? 
A. D:/Program Files 
B. C:\Program Files 
C. E:\Program Files 
D. F:/Program Files
Ans. B. C:\Program Files 

Q 20. Where does the user prefers to place the shortcuts of the newly installed software in windows operating system? 
A. Desktop 
B. C Drive 
C. Documents 
D. Favorites
Ans. A. Desktop

Q 21. In software engineering, the process of locating and fixing a bug in the programme is called _______ . 
A. Testing 
B. Processing 
C. Running 
D. Debugging
Ans. D. Debugging

Q 22. The _______ sets up an encrypted link for secure data communication with the help of Secure Software Layer or Transport Layer security. 
A. Hypertext Transfer Protocol Secure 
B. Secure Shell 
C. IPsec 
D. File Transfer Protocol 
Ans. A. Hypertext Transfer Protocol Secure

Q 23. During debugging software if a user wants to halt at a particular line of code, what should he do? 
A. Halt manually 
B. Add a watch 
C. Put a breakpoint 
D. Exit the debugger
Ans. C. Put a breakpoint

Q 24. Which of the below options is not a debugging tool? 
A. Eclipse 
B. Valgrind 
C. WinDbg 
D. Geany 
Ans. D. Geany 

Q 25. Antivirus does not protect computers from _______. 
A. power failure 
B. computer Worms 
C. spyware 
D. keyloggers 
Ans. A. power failure

Q 26. If your computer is attacked by a virus then it can do all the below damages except _____. 
A. damage or delete files 
B. data loss 
C. slow down the computer 
D. damage the input or output devices
Ans. D. damage the input or output devices

Q 27. A network security device that monitors the traffic and filter network traffic based on security rules is _______ . 
A. Firewall 
B. Threat 
C. Vulnerability 
D. Attack 
Ans. A. Firewall

Q 28. Out of the below mentioned scans, which takes the maximum time to scan? 
A. Full Scan 
B. Half Scan 
C. Custom Scan 
D. Quick Scan 
Ans. A. Full Scan

Q 29. Which among the following, the user should not do to avoid the virus entering via Email? 
A. Take caution when opening graphics and media attachments. 
B. Disable message preview in your email client. 
C. Make sure your computer has updated antivirus software running 
D. Downloading executable or documents from the internet 
Ans. D. Downloading executable or documents from the internet

Q 30. Windows Operating system is an example of _____ software. 
A. application software 
B. system software 
C. package software 
D. custom software 
Ans. B. system software

Q 31. Why is System software called Low-level software? 
A. System software runs on a system with low power. 
B. System software is written in high level languages to interact with machine software and runs in the computer at advanced level. 
C. System software is written in low level languages to interact with hardware and runs in the background at basic level. 
D. System software takes lower time to load.
Ans. C. System software is written in low level languages to interact with hardware and runs in the background at basic level.

Q 32. Which of the following software acts as an interface between end users and hardware? 
A. System Software 
B. Custom Software 
C. Programming software 
D. Communication software 
Ans. A. System Software

Q 33. Which of the following is NOT true for System software? 
A. System software can run independently 
B. Device drivers are example of System software 
C. System software are provided by computer manufacturers 
D. System software is specific purpose software 
Ans. D. System software is specific purpose software 

Q 34. Robotics is an example of ______application. 
A. Simulation software 
B. Information worker software 
C. Multimedia software 
D. Enterprise software 
Ans. A. Simulation software

Q 35. Word processing software does not include ______ . 
A. Notepad 
B. Lotus word pro 
C. Wordpad 
D. Keynotes 
Ans. D. Keynotes 

Q 36. Which type of application software is used to display information using text, pictures in the form of slides? 
A. Multimedia software 
B. Content Access software 
C. Presentation software 
D. Information Worker Software 
Ans.  C. Presentation software

Q 37. The application software which is managed remotely by an organization via a cloud by subscribing is known as ________ . 
A. Hosted application software 
B. Premise application software 
C. Content Access software 
D. Enterprise software 
Ans.  A. Hosted application software

Q 38. Which of the following is not a feature of the Operating system? 
A. Handling I/O operations 
B. Allocation of resources 
C. Prevent authorized access 
D. Error handling
Ans.  C. Prevent authorized access 

Q 39. Which of the following is not a type of Operation system? 
A. Batch Operating system 
B. Distributed Operating system 
C. Time-sharing Operating system 
D. Real down time Operating system 
Ans.  D. Real down time Operating system

Q 40. Which one of the following does NOT belong to the Real time operating system? 
A. Air traffic control system 
B. Missile systems 
C. Space software systems 
D. LOCUS system 
Ans.  D. LOCUS system 

Q 41. Which one of the following is NOT an operating system? 
A. Ubuntu 
B. Windows 
C. Oxygen OS 
D. Trojan Horse 
Ans.  D. Trojan Horse

Q 42. Which of the following cannot be termed as software redundancy? 
A. Program redundancy 
B. Modular redundancy 
C. Functional redundancy 
D. Temporal redundancy 
Ans.  D. Temporal redundancy 

Q 43. Which of the following is true for the Recovery block scheme? 
A. It consists of 3 elements for a given task namely - primary module, acceptance tests, and alternate modules 
B. It consists of 4 elements for a given task namely - primary module, secondary module, acceptance tests and acceptance failure 
C. It consists of only 2 elements for a given task namely - primary module and acceptance tests 
D. It consists of many elements for a given task depending on module available and test condition 
Ans.  A. It consists of 3 elements for a given task namely - primary module, acceptance tests, and alternate modules 

Q 44. RAR is a compressed file that holds one or more other files and folders in compressed form. What does RAR stand for? 
A. Roshal Account Compressed file 
B. Roshal Archive Compressed file 
C. Roshal Archive Crammed file 
D. Roshal Account Crammed file
Ans. B. Roshal Archive Compressed file 

Share this

Tag :