Q1. Which memory management technique allows non-contiguous memory allocation?
A. Segmentation
B. Paging
C. Swapping
D. Partitioning
Answer: B. Paging
Q2. What is the total number of IP addresses in a /29 subnet?
A. 4
B. 6
C. 8
D. 16
Answer: C. 8
(/29 → 2³ = 8 total addresses)
Q3. Which ACID property ensures that a transaction moves the database from one valid state to another?
A. Atomicity
B. Consistency
C. Isolation
D. Durability
Answer: B. Consistency
Q4. Which scheduling algorithm is also known as Shortest Remaining Time First (SRTF)?
A. Preemptive SJF
B. FCFS
C. Round Robin
D. Priority Scheduling
Answer: A. Preemptive SJF
Q5. Which protocol is used to securely transfer emails?
A. SMTP
B. POP3
C. IMAPS
D. FTP
Answer: C. IMAPS
Q6. Which Linux command is used to change file ownership?
A. chmod
B. chown
C. chgrp
D. mv
Answer: B. chown
Q7. Which RAID level provides double parity?
A. RAID 1
B. RAID 5
C. RAID 6
D. RAID 10
Answer: C. RAID 6
Q8. Which encryption technique uses two different keys?
A. Symmetric Encryption
B. Hashing
C. Asymmetric Encryption
D. Block Cipher
Answer: C. Asymmetric Encryption
Q9. Which OSI layer is responsible for framing?
A. Physical Layer
B. Data Link Layer
C. Network Layer
D. Transport Layer
Answer: B. Data Link Layer
Q10. Which command in SQL is used to revoke user permissions?
A. REMOVE
B. DELETE
C. REVOKE
D. DENY
Answer: C. REVOKE
Q11. Which type of attack involves injecting malicious SQL queries?
A. Phishing
B. SQL Injection
C. DoS
D. Brute Force
Answer: B. SQL Injection
Q12. What is the default port number for FTP?
A. 21
B. 22
C. 23
D. 25
Answer: A. 21
Q13. Which cloud model is shared by several organizations with common concerns?
A. Public Cloud
B. Private Cloud
C. Hybrid Cloud
D. Community Cloud
Answer: D. Community Cloud
Q14. Which memory is used to temporarily store instructions for quick access?
A. Cache
B. ROM
C. Hard Disk
D. DVD
Answer: A. Cache
Q15. Which TCP flag is used to terminate a connection?
A. SYN
B. ACK
C. FIN
D. PSH
Answer: C. FIN
Q16. Which sorting algorithm does not use comparison?
A. Merge Sort
B. Quick Sort
C. Counting Sort
D. Heap Sort
Answer: C. Counting Sort
Q17. Which file system is commonly used in Linux?
A. NTFS
B. FAT32
C. ext4
D. HFS+
Answer: C. ext4
Q18. Which technique allows a process to access more memory than physically available?
A. Paging
B. Virtual Memory
C. Swapping
D. Segmentation
Answer: B. Virtual Memory
Q19. Which protocol is used to send email from client to server?
A. SMTP
B. POP3
C. IMAP
D. SNMP
Answer: A. SMTP
Q20. Which hashing algorithm produces a 512-bit output?
A. MD5
B. SHA-1
C. SHA-256
D. SHA-512
Answer: D. SHA-512