0% found this document useful (0 votes)
144 views17 pages

Fundamental of Computer MCQ: 1. A. 2. A. 3. A. 4. A. 5. A. 6. A

The document contains 20 multiple choice questions about fundamentals of computer and operating systems. It tests knowledge of topics like the origin of the word "computer", pioneers in computer science like Charles Babbage and Alan Turing, basic computer components like the CPU and ALU, types of operating system kernels like monolithic and microkernels, and operating system functions like scheduling, memory management and I/O.

Uploaded by

acerc
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
144 views17 pages

Fundamental of Computer MCQ: 1. A. 2. A. 3. A. 4. A. 5. A. 6. A

The document contains 20 multiple choice questions about fundamentals of computer and operating systems. It tests knowledge of topics like the origin of the word "computer", pioneers in computer science like Charles Babbage and Alan Turing, basic computer components like the CPU and ALU, types of operating system kernels like monolithic and microkernels, and operating system functions like scheduling, memory management and I/O.

Uploaded by

acerc
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 17

FUNDAMENTAL OF COMPUTER MCQ

1. The term ‘Computer’ is derived from..........


a. Latin b. German c. French d. Arabic
2. Who is the inventor of “Difference Engine”?
a. Allen Turing b. Charles Babbage c. Simur Cray d.
Augusta Adaming
3. Who is the father of Computer?
a. Allen Turing b. Charles Babbage c. Simur Cray d.
Augusta Adaming
4. Who is the father of Computer science?
a. Allen Turing b. Charles Babbage c. Simur Cray d.
Augusta Adaming
5. Who is the father of personal computer?
a. Edward Robert b. Allen Turing c. Charles
Babbage d. None of these
6. A CPU contains
a. a card reader and a printing device b. an analytical engine and a
control unit
c. a control unit and an arithmetic logic unit d. an arithmetic logic
unit and a card reader
7. Which of the following controls the process of interaction between
the user and the operating system?
a. User interface b. Language translator
c. Platform d. Screen saver
8. The first computers were programmed using
a. assembly language b. machine language
c. source code d. object code

1
9.is
a combination of hardware and software that facilitates the sharing
of information between computing devices.
a. network b. peripheral c. expansion board d. digital
device
10. Coded entries which are used to gain access to a computer system are
called
a. Entry codes b. Passwords c. Security commands d. Code words
11. Which of the following statements is true?
a. Minicomputer works faster than Microcomputer
b. Microcomputer works faster than Minicomputer
c. Speed of both the computers is the same
d. The speeds of both these computers cannot be compared with the
speed of advanced
12. You organize files by storing them in
a. archives b. folders c. indexes d. lists
13. What type of resource is most likely to be a shared common
resource in a computer Network?
a. Printers b. Speakers c. Floppy disk drives d. Keyboards
14. Which device is required for the Internet connection?
a. Joystick b. Modem c. CD Drive d. NIC Card
15. What is a light pen?
a. A Mechanical Input device b. Optical input device
c. Electronic input device d. Optical output device
16. UNIVAC is
a. Universal Automatic Computer b. Universal Array Computer
c. Unique Automatic Computer d. Unvalued Automatic Computer
17. CD-ROM stands for
a. Compactable Read Only Memory b. Compact Data Read Only
Memory
c. Compactable Disk Read Only Memory d. Compact Disk Read
Only Memory
2
18. ALU is
a. Arithmetic Logic Unit b. Array Logic Unit
c. Application Logic Unit d. None of above
19. VGA is
a. Video Graphics Array b. Visual Graphics Array
c. Volatile Graphics Array d. Video Graphics Adapter
20. IBM 1401 is
a. First Generation Computer b. Second Generation Computer
c. Third Generation Computer d . Fourth Generation Computer

3
NETWORK SECURITY MCQ

1. Message ________ means that the sender and the receiver expect
privacy
A. confidentiality 
B. integrity 
C. authentication 
D. none of the above
2. Message_____ means that the data must arrive at the receiver exactly
as sent
A. confidentiality 
B. integrity 
C. authentication 
D. none of the above
3. Message _______ means that the receiver is ensured that the message
is coming from the intended sender, not an imposter
A. confidentiality
B. integrity
C. authentication
D. none of the above
4. ________ means that at a sender must not be able to deny sending a
message that he sent.
A. Confidentiality
B. Integrity
C. Authentication
D. Non repudiation
5. _______ means to prove the identity of the entity that tries to access
the system's resources.
A. Message authentication
B. Entity authentication
C. Message confidentiality
D. none of the above
6. A(n) _________ can be used to preserve the integrity of a
document or a message.
A. message digest
4
B. message summary
C. encrypted messaged message
D. none of the above
7. A(n) ________functions creates a message digest out of a message.
A. encryption
B. decryption
C. hash
D. none of the above
8. A hash function must trust meet ________ criteria.
A. two
B. three
C. four
D. none of the above
9. A _______ message digest is used as an MDC.
A. keyless
B. keyed
C. either (a) or (b)
D. neither (a) nor (b))
10. To authenticate the data origin, one needs a(n) ____________.
A. MDC
B. MAC
C. either (a) or (b)
D. neither (a) nor (b))
11. A ________ signature nature is included in the document; a _______
signature is a separate entity.
A. conventional; digital 
B. digital; digital 
C. either (a) or (b) 
D. neither (a) nor (b))
12. Digital signature provides ________
A. authentication 
B. non repudiation 
C. both (a) and (b) 
D. neither (a) nor (b))
13. Digital signature cannot provide ________ for the messages
A. integrity 
B. confidentiality 
C. non repudiation 
D. authentication
5
14. If _________ is needed, a cryptosystem must be appllied over the
scheme
A. integrity 
B. confidentiality
 C. non repudiation
D. authentication
15. A digital signature needs a(n)_________ system
A. symmetric-key
B. asymmetric-key
C. either (a) or (b)
D. neither (a) nor (b))
16. A witness used in entity authentication is _______________
A. something known
B. something possessed
C. something inherent
D. all of the above

17. In _______, a claim an proves her identity to the verifier by using


one of the three kinds of witnesses
A. message authentication
B. entity authentication
C. message confidentiality
D. message integrity
18. Password-based authentication can be divided into two broad
categories: _______ and _______
A. fixed; variable
B. time-stamped; fixed
C. fixed; one-time
D. none of the above
19. In ________ authentication, the claimant proves that she knows a
secret without actually sending it
A. password-based
B. challenge-response
C. either (a) or (b)
D. neither (a) nor (b)
20. Challenge-response authentication can be done using ________
A. symmetric-key ciphers 
B. asymmetric-key ciphers
6
C. keyed-hash functions
D. all of the above 

OPERATING SYSTEM MCQS

1. Which of the following is/ are the part of operating system?

A) Kernel services

B) Library services

C) Application level services

D) All of the above

2. The system of generally ran one job at a time. These were called
single stream batch Processing.

A) 40's

B) 50's

C) 60's

D) 70's

3. In generation of operating system, operating system designers develop


the concept of multiprogramming in which several jobs are in main
memory at once.

7
A) First

B) Second

C) Third

D) Fourth

4. State True or False.

i) In spooling high speed device like a disk is interposed between


running program and low-speed device in Input/output.

ii) By using spooling for example instead of writing directly to a printer,


outputs are written to the disk.

A) i-True, ii-False

B) i-True, ii-True

C) i-False, ii-True

D) i-False, ii-False

5. Which of the following is/are the functions of operating system?

i) Sharing hardware among users. ii) Allowing users to share data


among themselves.

iii) Recovering from errors. iv) Preventing users from interfering


with one another.

v) Scheduling resources among users.

A) i, ii, iii and iv only


8
B) ii, iii, iv and v only

C) i, iii, iv and v only

D) All i, ii, iii, iv and v

6. Executes must frequently and makes the fine grained decision of


which process to Execute the next.

A) Long-term scheduling

B) Medium-term scheduling

C) Short-term scheduling

D) None of the above

7. With a page is brought into main memory only when the reference
is made to a location On that page.

A) Demand paging

B) Main paging

C) Pre paging

D) Post paging

8. Provides a larger sized of virtual memory but require virtual memory


which provides multidimensional memory.

A) Paging method

9
B) Segmentation method

C) Paging and segmentation method

D) None of these

9. Is a large kernel, containing virtually the complete operating system,


including, scheduling, file system, device drivers and memory
management.

A) Multilithic kernel

B) Monolithic kernel

C) Micro kernel

D) Macro kernel

10. is a large operating system core provides a wide range of services.

A) Multilithic kernel

B) Monolithic kernel

C) Micro kernel

D) Macro kernel

11. Which of the following is not the function of Microkernel?

A) File management

10
B) Low-level memory management

C) Inter-process communication

D) I/O interrupts management

12. Match the following.

i) Mutual exclusiona) A process may hold allocated resources while


waiting assignment.

ii) Hold and wait b) No resource can be forcibly removed from a


process holding it.

iii) No preemption c) Only one process may use a resource at a time.

A) i-a, ii-b, iii-c

B) i-a, ii-c, iii-b

C) i-b, ii-c, iii-a

D) i-c, ii-a, iii-b

13. A direct method of deadlock prevention is to prevent the occurrences


of...................

A) Mutual exclusion

B) Hold and wait

C) Circular waits

D) No preemption
11
14. The methods or algorithms which are used to increase the
performance of disk storage sub-system are called.............

A) Disk performing

B) Disk scheduling

C) Disk storing

D) Disk extending

15. Is the time required to move the disk arm to the required track.

A) Seek time

B) Rotational delay

C) Latency time

D) Access time

16. The policy restricts scanning to one direction only.

A) SCAN

B) C-SCAN

C) N-Step SCAN

D) Both A and B

17. Policy selects the disk I/O request that requires the least movement of
the disk arm from its current position.
12
A) FSCAN

B) SSTF

C) SCAN

D) C-SCAN

18. Refers to the ability of an operating system to support multiple


threads of execution with a single process.

A) Multithreading

B) Multiprocessing

C) Multi executing

D) Bi-threading

19. State whether the following statement is true.

i) It takes less time to terminate a thread than a process.

ii) Threads enhance efficiency in communication between different


executing programs.

A) i-True, ii-False

B) i-True, ii-True

C) i-False, ii-True

D) i-False, ii-False
13
20. Is a special type of programming language used to provide
instructions to the monitor simple batch processing schema.

A) Job control language (JCL)

B) Processing control language (PCL)

C) Batch control language (BCL)

D) Monitor control language (MCL)

SQL MCQS
1. What is SQL Server?
a) SQL Server is a relational database management system
b) SQL Server is software whose main purpose is to store and retrieve
data
c) SQL Server is a highly secure server and does not allow any database
file manipulation during execution
d) All of the mentioned
2. When was the first version of Microsoft SQL Server released?
a) 1991
b) 1990
c) 1988
d) 1983
3. Which of the following is a free database software running free SQL
Server technology?
a) SQL Server Web
b) SQL Server Enterprise
c) SQL Server Workgroup
14
d) SQL Server Express
4. Which of the following companies originally worked together to create
and market the first version of SQL Server?
a) Sybase
b) Ashton-Tate
c) Microsoft
d) All of the Mentioned
5. What is the Codename for SQL Server 2012?
a) Katmai
b) Denali
c) Hekaton
d) Kilimanjaro
6. Which was the first version of SQL Server to introduce in-memory
capability?
a) SQL Server 2005
b) SQL Server 2008
c) SQL Server 2012
d) SQL Server 2014
7. Which of the following data type is not present in SQL Server?
a) geography
b) hierarchyid
c) boolean
d) bit
8. Which database is used by SQL Server Agent for scheduling alerts and
jobs, and recording operators?
a) temp
b) model
c) msdb
d) master
9. SQL Server has mainly how many types of views?
a) four
b) three
c) one
d) two
10. Which of the following is not a SQL Server
INFORMATION_SCHEMA view?
a) sys.dm_exec_connections
15
b) INFORMATION_SCHEMA.KEY_COLUMN_USAGE
c) INFORMATION_SCHEMA.DOMAIN_CONSTRAINTS
d) INFORMATION_SCHEMA.CONSTRAINT_TABLE_USAGE
11. Which of the following joins are SQL server default?
a) Inner
b) Equi
c) Outer
d) None of the Mentioned
12. Which of the following is not a class of constraint in SQL Server?
a) UNIQUE
b) NOT NULL
c) CHECK
d) NULL
13. Which of the reasons will force you to use the XML data model in
SQL Server?
a) Order is inherent in your data
b) Your data is sparse or you do not know the structure of the data
c) Your data represents containment hierarchy
d) All of the Mentioned
14. What is the hybrid model in SQL Server?
a) Using XML with views
b) Using XML with triggers
c) Combination of relational and XML data type columns
d) Combination of relational and non relational data type columns
15. Which of the following feature of SQL Server was used before XML
technology for semi structured data?
a) In memory database
b) Stored Procedure
c) Dynamic management views
d) None of the mentioned
16. Which of the following language is used for procedural flow in SQL
Server?
a) Control-of-flow language
b) Flow language
c) Control language
d) None of the mentioned
17. Exception handling is possible in SQL Server using _____________
a) FINAL
b) FINALLY
16
c) THROW
d) All of the mentioned
18. Which of the following stored procedure is already defined in SQL
Server?
a) System defined Procedure
b) CLR Stored Procedure
c) Extended Procedure
d) User Defined Stored Procedure
19. DML triggers in SQL Server is applicable to _____________
a) Update
b) Delete
c) Insert
d) All of the mentioned
20. User defined function in SQL Server can return ____________
a) Result set
b) Scalar value
c) Set of values
d) All of the mentioned

17

You might also like