1. AX register is also known as:
(a) Accumulator
(b) Collector
(c) Distributor
(d) Counter
(e) None of these

2. In the Base + Offset addressing, Offset address is also known as:
(a) Physical Address
(b) Logical Address
(c) Actual Address
(d) Instruction Address
(e) None of these

3. The technique for allowing a unit to check the status of another independently function unit is known as?
(a) Interrupt
(b) System call
(c) Polling
(d) Trape
(e) None of these

4. The method for storing data temporarily such that the input-output of the same job is overlapped with its own processing is known as:
(a) Spooling
(b) Contention
(c) I/O wait
(d) Buffering
(e) None of these

5. The DMA that uses Busses when CPU is not using them is termed as:
(a) Shared DMA
(b) Cycle Stealing
(c) Channel
(d) Transparent DMA
(e) None of these

6. _____________ Scheduler deals with the decision as to whether to admit another new job to the system.
(a) High Level ( Also known as Long term Scheduler / Job Scheduler)
(b) Medium Level
(c) Low Level / Short term scheduler / dispatcher
(d) Short term
(e) None of these

7. When the process is in the states of Blocked Suspended or Ready Suspended, its relevant data is stored in:
(a) Main Memory
(b) Hard Disk
(c) Magnetic Tape
(d) Buffer
(e) None of these

8. Priority, P = (Time Waiting + Run Time) / Run Time is used to calculate priority in __ scheduling algorithm:
(a) Shortest Job First
(b) Priority Scheduling
(c) Longest Wait First
(d) Highest Response Ratio Next
(e) None of these

9. HDLC Protocol stands for:
(a) High-Level Data Link Control
(b) High Level Development Protocol
(c) Huge Level Data Link Control
(d) High Development Level Control
(e) None of these

10.___________ is the generic name for a set of standards issued by the International CommunicationsStandards Body CCITT, designed to support Message Handling Systems; i.e. Electronic Mail.
(a) TCP/IP
(b) ISDN
(c) X.400
(d) X.25
(e) None of these

11. ____________ layer is responsible for the transfer of a packet of data along one link in the network. It organizes data into frames and detects errors in transmission.
(a) Physical Layer
(b) Data Link Layer
(c) Network Layer
(d) Transport Layer
(e) None of these

12. Encryption is the conversion of data in some intelligible format into an unintelligible format called _ to prevent the data from being understood if read by an unauthorized party.
(a) Clear Text
(b) Encrypted Text
(c) Cipher Text
(d) Coded Text
(e) None of these

13. Binary search requires about __ comparisons with an initial list of 1,000,000 elements.
(a) 10
(b) 20 (Rounded)
(c) 35
(d) 100
(e) None of these (exect)

14. A_____________ header list is a header list where the last node contains the null pointer.
(a) Grounded
(b) Circular
(c) One way
(d) Rooted
(e) None of these

15. ________ are small applications that are accessed on an internet server, transported over the internet, automatically installed and run as part of a web document.
(a) Applets
(b) Java Bean
(c) Sockets
(d) Java Component
(e) None of these

16.____________AWT stands for:
(a) Abstract Window Technique
(b) Abstract Window Toolkit
(c) Actual Window Technique
(d) Added Window Toolkit
(e) None of these

17._______________GIF images can have only upto _ colors.
(a) 128
(b) 256
(c) 512
(d) 1024
(e) None of these

18._____________ is stored on a client and contains state information of the website visited.
(a) Cookies
(b) Servelet
(c) History
(d) Resident Page
(e) None of these

19.In software Engineering KPA denotes.
(a) Key Process Audit
(b) Key Process Area
(c) Key Process Analysis
(d) Key Problem Area
(e) None of these

20. The ________Process Model defines a series of events that will trigger transitions from state to state for each of software engineering activities.
(a) Spiral
(b) Operational
(c) RAD
(d) Concurrent Development
(e) None of these

Leave a Reply

Your email address will not be published. Required fields are marked *