1. The simple object model that is frequently used for database applications and which is easier to understand and use than OLE DB is:
(a) ADO
(b) ASP
(c) XML
(d) ODBC
(b) ASP
(c) XML
(d) ODBC
Answer: (a)
2. Which one of the following CPU scheduling algorithms suffers from starvation?
(a) Round Robin
(b) FCFS (First Come First Serve)
(c) SJF (Shortest Job First)
(d) Multilevel Queues
(b) FCFS (First Come First Serve)
(c) SJF (Shortest Job First)
(d) Multilevel Queues
Answer: (c)
3. An operating system uses swapping. A running process encounters the need to wait for an event. The correct sequence of states for the process to re-enter its running stage is:
(a) Blocked → Blocked - Ready → Blocked - suspended → Ready → Running
(b) Blocked - suspended → Blocked - Ready → Blocked → Ready → Running
(c) Ready → Running → Blocked → Ready→ Running
(d) Blocked→ Blocked-suspended → Blocked-Ready → Ready → Running
(b) Blocked - suspended → Blocked - Ready → Blocked → Ready → Running
(c) Ready → Running → Blocked → Ready→ Running
(d) Blocked→ Blocked-suspended → Blocked-Ready → Ready → Running
Answer: (d)
4. What is the maximum possible disk space for a cluster size of 2 kbytes for a MS-DOS disk system?
(a) 128 Mbytes
(b) 512 Mbytes
(c) 512 bytes
(d) 128 bytes
(c) 512 bytes
(d) 128 bytes
Answer: (a)
5. Consider the following consistency semantics:
1. Writes to an open file by a user are visible immediately to other users that have this file open.
2. Once a file is closed, the changes made to it are visible only in sessions starting later. Already open instances of the file do not reflect these changes.
3. A file has a single image that interleaves all accesses regardless of their origin.
1. Writes to an open file by a user are visible immediately to other users that have this file open.
2. Once a file is closed, the changes made to it are visible only in sessions starting later. Already open instances of the file do not reflect these changes.
3. A file has a single image that interleaves all accesses regardless of their origin.
Which of the above are used in UNIX file system?
(a) 1, 2 and 3
(b) 1 and 2 only
(c) 1 and 3 only
(d) 2 and 3 only
(a) 1, 2 and 3
(b) 1 and 2 only
(c) 1 and 3 only
(d) 2 and 3 only
Answer: (c)
6. If a host broadcasts a frame that includes a source and destination hardware address, and its purpose is to assign IP addresses to itself, which protocol at the Network layer does the host use?
(a) RARP
(b) ARPA
(c) ICMP
(d) TCP
(b) ARPA
(c) ICMP
(d) TCP
Answer: (a)
7. What range of addresses can be used in the first octet of a class 𝐵 network address?
(a) 1 – 126
(b) 1 – 127
(c) 128 – 190
(d) 128 – 191
(b) 1 – 127
(c) 128 – 190
(d) 128 – 191
Answer: (d)
8. The transport layer protocols used for real time multimedia, file transfer, 𝐷 𝐷𝐷𝐷 and 𝐸 -mail respectively are
(a) TCP, UDP, UDP and TCP
(b) TCP, UDP, TCP and UDP
(c) UDP, TCP, UDP and TCP
(d) UDP, TCP, TCP and UDP
(b) TCP, UDP, TCP and UDP
(c) UDP, TCP, UDP and TCP
(d) UDP, TCP, TCP and UDP
Answer: (c)
9. In a LAN network every system is identified by
(a) Name
(b) MAC Address
(c) IP Address
(d) Serial number given by manufacturer
(b) MAC Address
(c) IP Address
(d) Serial number given by manufacturer
Answer: (c)
10. Maximum data rate of a channel for a noiseless 3-kHz binary channel is
(a) 3000 bps
(b) 6000 bps
(c) 9000 bps
(d) 15000 bps
(b) 6000 bps
(c) 9000 bps
(d) 15000 bps
Answer: (b)
0 Comments
Post a Comment