Q1. A system with multiple processors sharing the same memory is called:
A. Distributed System
B. Multiprocessing System
C. Multitasking System
D. Time-Sharing System
Answer: B. Multiprocessing System
Q2. If a process is waiting for I/O operation, it is in which state?
A. Ready
B. Running
C. Waiting (Blocked)
D. Terminated
Answer: C. Waiting (Blocked)
Q3. Which encryption technique uses the same key for encryption and decryption?
A. RSA
B. AES
C. Asymmetric Encryption
D. Digital Signature
Answer: B. AES
(AES is a symmetric key encryption algorithm.)
Q4. In SQL, which constraint ensures that a column cannot have NULL values?
A. UNIQUE
B. NOT NULL
C. CHECK
D. DEFAULT
Answer: B. NOT NULL
Q5. Which IPv6 address type is equivalent to IPv4 broadcast?
A. Unicast
B. Multicast
C. Anycast
D. Loopback
Answer: B. Multicast
(IPv6 does not use broadcast; multicast replaces it.)
Q6. What happens in Deadlock?
A. Process runs continuously
B. Process waits for CPU
C. Two or more processes wait indefinitely for each other
D. System shuts down
Answer: C. Two or more processes wait indefinitely for each other
Q7. Which normalization form removes partial dependency?
A. 1NF
B. 2NF
C. 3NF
D. BCNF
Answer: B. 2NF
Q8. Which protocol works at Transport Layer?
A. IP
B. ARP
C. TCP
D. Ethernet
Answer: C. TCP
Q9. Which command in Linux is used to change file permissions?
A. chmod
B. chown
C. ls
D. mkdir
Answer: A. chmod
Q10. Which data structure is used in recursion internally?
A. Queue
B. Stack
C. Array
D. Linked List
Answer: B. Stack
Q11. In DBMS, which key uniquely identifies a record?
A. Foreign Key
B. Composite Key
C. Primary Key
D. Candidate Key
Answer: C. Primary Key
Q12. What is the purpose of Load Balancer?
A. Store data
B. Encrypt files
C. Distribute traffic across servers
D. Increase RAM
Answer: C. Distribute traffic across servers
Q13. Which layer of TCP/IP model handles routing?
A. Application Layer
B. Transport Layer
C. Internet Layer
D. Network Access Layer
Answer: C. Internet Layer
Q14. Which algorithm is used in public key encryption?
A. DES
B. AES
C. RSA
D. MD5
Answer: C. RSA
Q15. In C++, which concept allows same function name with different parameters?
A. Overriding
B. Overloading
C. Inheritance
D. Encapsulation
Answer: B. Overloading
Q16. Which storage is best for large-scale distributed data?
A. SSD
B. HDD
C. Cloud Storage
D. Cache
Answer: C. Cloud Storage
Q17. What is the main purpose of Virtual Memory?
A. Increase CPU speed
B. Increase RAM physically
C. Use disk space as RAM extension
D. Encrypt memory
Answer: C. Use disk space as RAM extension
Q18. Which attack manipulates DNS records?
A. Phishing
B. DNS Spoofing
C. Brute Force
D. Trojan
Answer: B. DNS Spoofing
Q19. Which SQL join returns only matching records?
A. LEFT JOIN
B. RIGHT JOIN
C. FULL JOIN
D. INNER JOIN
Answer: D. INNER JOIN
Q20. Which hashing algorithm is commonly used in digital signatures?
A. SHA
B. FTP
C. SMTP
D. HTTP
Answer: A. SHA