CTEVT, Technical and Training, Engineering, Computer, Assistant Level I, Computer Operator Assistant Instructor Open Competitive Examination 2081/08/17
KEY (B)
Paper: Second
Time: 45 Minutes
Subject: Service-related
Multiple Choice 50x2=100 Marks
1. In word processing, the task of changing the appearance of a
document is called:
a. Editing
b. Proofing
c. Inserting
d. Formatting
2. Computer
virus is:
a. Computer disease
b. A set of instructions/program code
c. A bacteria
d. A system software
3. Which of
the following is the first line of an HTTP request message?
a. Request line
b. Header line
c. Status line
d. Entity line
4. Which
layer of the OSI model does DNS belong to?
a. Network layer protocol
b. Transport layer protocol
c. Session layer protocol
d. Application layer protocol
5. Which of
the following protocols is used by VPN?
a. Tunneling protocols
b. Application-level protocols
c. Network protocols
d. Mailing protocols
6. Which of
the following is false with respect to TCP?
a. Connection-oriented
b. Process to process
c. Transport layer protocol
d. Unreliable
7.
Attempting to acquire sensitive information by redirecting the user to a fake
website is usually called:
a. Spoofing
b. Phishing
c. URL redirection
d. URL hijacking
8. Which
of the following multiple access techniques is used by IEEE 802.11 standard for
wireless LAN?
a. CDMA
b. CSMA/CA
c. CSMA/CD
d. ALOHA
9. Which
layer does Port Addressing belong to?
a. Application layer
b. Network layer
c. Transport layer
d. Datalink layer
10. Which
of the following devices assign IP addresses to devices connected to a network
that uses TCP/IP?
a. DHCP Server
b. NIC
c. Gateway
d. DNS Server
11.
Which of the following layers is responsible for process-to-process delivery in
the TCP/IP model?
a. Application layer
b. Internet layer
c. Transport layer
d. Network access
12.
Which of the following traversal techniques is equivalent to depth-first search?
a. Pre-order
b. post-order
c. Level-order
d. In-order
13. In
which of the following categories does Dijkstra's algorithm belong to?
a. Dynamic programming
b. Branch and bound
c. Backtracking
d. Greedy
14.
Recursion is achievable using:
a. Array
b. Tree
c. Queue
d. Stack
15. The
goal of hashing is to produce a search that takes ____ time:
a. O(1)
b. O(n²)
c. O(log n)
d. O(n log n)
16.
Infix to postfix conversion is possible using:
a. Stack
b. Queue
c. Array
d. Tree
17.
Shortest path between source and destination can be calculated effectively with:
a. DFS
b. BFS
c. Dijkstra's algorithm
d. Print's algorithm
18.
Which of the following binary search tree traversal techniques displays
information in ascending order?
a. In-order
b. Pre-order
c. post-order
d. No-order
19.
Which data structure is one-ended?
a. Queue
b. Stack
c. Tree
d. Graph
20.
Which of the following SQL commands is used for removing (or deleting) a
relation from the database?
a. Drop
b. Delete
c. Rollback
d. Remove
21.
Which of the following queries is correct for using comparison operation in SQL?
a. select * from student where age > 50 and < 80
b. select * from student where age > 50 and age < 80
c. select * from student where age > 50 and where age < 80
d. select * from student where 50 < age < 80
22.
Relation R1 has 10 tuples and 5 attributes. Relation R2 has 0 tuples and 7
attributes. When a cross JOIN is achieved between R1 and R2, how many tuples
would the resultant set have?
a. 0
b. 10
c. 35
d. 50
23.
Which of the following dependencies is used by 5NF?
a. Functional dependency
b. Join dependency
c. Multivalued dependency
d. Partial dependency
24. A
file manipulation command that extracts some of the records from a file is
called:
a. Select
b. Project
c. Join
d. Product
25. What
is the difference between restoring and recovering a database?
a. Both are same
b. Restoring is the process of copying backup files from backup media to disk.
Recovery is the process of applying redo logs to the database to roll it
forward.
c. Restoring is the process of rolling back the database to a previous time.
Recovery is the process of copying backup files from backup media to disk.
d. Restoring is the process of rolling back the database to a previous time.
Recovery is the process of recovering the database from a critical system
failure.
26. Which of the following is an attribute that can uniquely
identify a row in a table?
a. Secondary key
b. Candidate key
c. foreign key
d. Alternate key
27. Which of
the following levels in ANSI/SPARC architecture is related to how data are
actually stored in the database?
a. Physical level
b. Logical level
c. View level
d. External level
28. What is
a program in execution called?
a. Paging
b. Process
c. Virtual memory
d. Demand page
29. Which
mode loads a minimal set of drivers when starting Windows?
a. Safe mode
b. Normal mode
c. VGA mode
d. Network support mode
30. Which
of the following algorithms chooses the page that had not been used for the
longest period of time whenever the page required to be replaced?
a. First in first out algorithm
b. Additional reference bit algorithm
c. Least recently used algorithm
d. Counting based page replacement algorithm
31.
Using CHMOD, if we want to give ALL permission to a user, which mode is used?
a. 666
b. 667
c. 776
d. 777
32. An
increase in a computer RAM leads to a typical improvement in performance
because___
a. Fewer page faults occur
b. Virtual memory increases
c. Fewer segmentation faults occur
d. A larger RAM is faster
33.
Which memory management does not provide the user's program with a linear and
contiguous address space?
a. Page memory management
b. Single contiguous
c. Partitioned allocation
d. Segmented memory management
34. CPU
scheduling is the basis of which of the following systems?
a. Multiprogramming operating system
b. larger memory sized system
c. Multiprocessor system
d. Multiuser system
35.
Which of the following principles of object-oriented programming is
demonstrated when a single function name can be used for different types of
actions?
a. Encapsulation
b. Polymorphism
c. Inheritance
d. Abstraction
36. The
keyword used to define non-access modifier in JAVA programming is____
a. Static
b. Final
c. Const
d. Public
37. How
are strings represented in memory in C?
a. Same as other primitive data types
b. The object of same class
c. An array of characters
d. Linked list of characters
38.
Automatic initialization of object is carried out using a special member
function called___
a. Friend
b. Casting
c. Reference parameter
d. Constructor
39. A
hard disk is divided into tracks, which are further subdivided into___
a. Clusters
b. Sectors
c. Vectors
d. Blocks
40. The
only command-oriented OS is___
a. Ubuntu
b. Windows
c. MAC
d. DOS
41. A
batch file is a script file that stores commands to be executed in _____ order.
a. Serial
b. Parallel
c. LIFO
d. Alphabetical
42.
Which of the following is the high-speed memory between main memory and CPU?
a. Register memory
b. Cache memory
c. Virtual memory
d. RAM
43. In
computer, all calculations are performed in____
a. Control unit
b. Memory unit
c. Arithmetic and Logic unit
d. Register
44. What
is valid statement?
a. 1 KB = 1024 Bytes
b. 1 MB = 1024 Bytes
c. 1 KB = 1000 Bytes
d. 1 MB = 1000 Bytes
45.
Which of the following is a capacitor-based storage unit?
a. SRAM
b. ERAM
c. DRAM
d. EERAM
46.
Which of the following entities does not belong to word processing?
a. Paragraphs
b. Cells
c. Words
d. Characters
47. A
PowerPoint design template is stored in any file with extension.
a. pot
b. dtp
c. ptt
d. ppt
48.
Which of the following networks is accessible to only authorized users outside
the organization?
a. Internet
b. Intranet
c. Extranet
d. LAN
49.
Superscript, subscript, outline, emboss, engrave are known as part of___
a. Text Effects
b. Font Styles
c. Font Effects
d. Word Art
50. What
is the shortcut for inserting a page break in MS Word?
a. Ctrl + Break
b. Ctrl + Tab
c. Ctrl + Space
d. Ctrl + Enter
-The End-
Also Read
