1. Virtual memory is a memory ___________________ technique that allows all memory, including main memory and mass storage devices, to be addressed as part of one large logical address space.
    (a) Overlapping
    (b) Extension
    (c) Management
    (d) Interface
    (e) None of these
  2. Hyper threading technologies deliver two processing threads per physical core for a total of ______________ massive computational throughout.
    (a) 2
    (b) 8
    (c) 16
    (d) 32
    (e) None of these
  3. _________________ unit is capable of mimicking the processor and taking over control of the system bus just like microprocessor.
    (a) Control
    (b) DMA
    (c) I/O
    (d) PPI
    (e) None of these
  4. The ascending order of a data Hierarchy is:
    (a) Bit-byte-field-record-file-database
    (b) Bit-byte-record-field-file-database
    (c) Byte-bit-field-record-file-database
    (d) Byte-bit-record-field-file-database
    (e) None of these
  5. ___________________ interrupts are initiated by an I/O drive.
    (a) Internal
    (b) External
    (c) Software
    (d) Basic
    (e) None of these
  6. Software testing is a critical element of software quality assurance and represents the ultimate view of ___________, ____________and _____________ in that order.
    (a) Code, design, specification
    (b) Specification, design and code generation
    (c) Design, specification, code
    (d) Code generation, specification, design
    (e) None of these
  7. _______________is an integration testing approach that is commonly used when shrinking wrapped software products are being developed.
    (a) Testing
    (b) Smoke testing
    (c) Portability testing
    (d) Both (b) and (c)
    (e) None of these
  8. Determine the result of attempting to compile and run the following code:
    public class Tester {
    public static void main(String[] args){ System.out.println(4 + ‘ ‘ +2); }
    (a) 42
    (b) 2
    (c) 6
    (d) 4
    (e) None of these
  9. The class relationship called generalization is the same as:
    (a) Inheritance
    (b) Aggregation
    (c) Association
    (d) Abstraction
    (e) None of these
  10. A static partitioned memory management system has a total of six partitions. If one is allocated to the operating system, this will allow a total of:
    (a) Five user jobs
    (b) Six user jobs
    (c) Thirty-two user jobs
    (d) Thirty-six user jobs
    (e) Sixty-four user jobs
  11. A transaction required to be ACID means it should be:
    (a) Access, Control, Integration and Dependency
    (b) Atomic, Consistency, Isolation and Durability
    (c) Acquire, consistency, Inter-linked and Dependency
    (d) Both (a) and (b)
    (e) None of these
  12. If we reprocess the transaction then the database can be made to come to a state where the database is consistent and so reprocessing the log can ______________ the database.
    (a) Recover
    (b) Rollback
    (c) Lock
    (d) Append
    (e) None of these
  13. What is the major role of the DDCMP?
    (a) DDCMP does not need special hardware to find the beginning of a message
    (b) DDCMP has a message header
    (c) DDCMP has an IP Address
    (d) DDCMP does not use CRC
    (e) None of these
  14. In a synchronous modem, the receiving equalizer is known as ___________equalizer.
    (a) Adaptive
    (b) Impairment
    (c) Statistical
    (d) Compromise
    (e) None of these
  15. The maximum transfer speed of 10 Base 5 is:
    (a) 100 Mbps
    (b) 2 Mbps
    (c) 1 Gbps
    (d) 10 Mbps
    (e) None of these
  16. Which of the following is a layer 2 device?
    (a) Bridge
    (b) Router
    (c) Repeater
    (d) Hub
    (e) None of these
  17. Identify the type of routing protocol that maintains a topological database of the network?
    (a) Topological State
    (b) Shortest Path First
    (c) Link State
    (d) Distance Vector
    (e) None of these
  18. The data portion of an information unit at a given OSI layer potentially can contain headers, trailers and data from all the higher layers, known as:
    (a) Compression
    (b) Buffer
    (c) Encapsulation
    (d) Spooling
    (e) None of these
  19. Identify the type of routing protocol that exchanges entire routing tables at regular intervals.
    (a) Link State
    (b) Interior Gateway Protocols
    (c) Apple Talk Routing
    (d) Distance Vector
    (e) None of these
  20. Which environment considers memory, process and device and file management from a global viewpoint?
    (a) Distributed Operating System
    (b) Network Operating System
    (c) Multiprogramming Operating System
    (d) All of these
    (e) None of these

Leave a Reply

Your email address will not be published. Required fields are marked *