Set No -22: COMPUTER GENERAL KNOWLEDGE QUIZ

Q1. Which of the following is a characteristic of a real-time operating system (RTOS)?

A. High throughput
B. Time-bound response
C. Multi-user access
D. Batch processing

Answer: B. Time-bound response


Q2. Which addressing method is used by ARP protocol?

A. Logical to Logical
B. Logical to Physical
C. Physical to Logical
D. Physical to Physical

Answer: B. Logical to Physical
(ARP maps IP address to MAC address.)


Q3. In DBMS, which isolation level prevents dirty reads?

A. Read Uncommitted
B. Read Committed
C. Repeatable Read
D. Serializable

Answer: B. Read Committed


Q4. Which algorithm is used in Quick Sort for partitioning?

A. Greedy Method
B. Divide and Conquer
C. Dynamic Programming
D. Backtracking

Answer: B. Divide and Conquer


Q5. What is the maximum number of hosts possible in a Class C IPv4 network?

A. 126
B. 254
C. 255
D. 256

Answer: B. 254
(2^8 – 2 reserved addresses)


Q6. Which of the following is a symmetric key encryption algorithm?

A. RSA
B. ECC
C. AES
D. DSA

Answer: C. AES


Q7. Which normal form eliminates transitive dependency?

A. 1NF
B. 2NF
C. 3NF
D. 4NF

Answer: C. 3NF


Q8. Which Linux command displays currently running processes?

A. ls
B. ps
C. pwd
D. cat

Answer: B. ps


Q9. What is the time complexity of Merge Sort in worst case?

A. O(n)
B. O(log n)
C. O(n log n)
D. O(n²)

Answer: C. O(n log n)


Q10. Which OSI layer handles data encryption and compression?

A. Session Layer
B. Presentation Layer
C. Transport Layer
D. Application Layer

Answer: B. Presentation Layer


Q11. Which type of cloud service provides a runtime environment for applications?

A. IaaS
B. PaaS
C. SaaS
D. DaaS

Answer: B. PaaS


Q12. In C programming, what does a pointer store?

A. Value of variable
B. Address of variable
C. Data type
D. Instruction code

Answer: B. Address of variable


Q13. Which protocol ensures reliable data transmission?

A. UDP
B. TCP
C. IP
D. ARP

Answer: B. TCP


Q14. What is the size of IPv6 address?

A. 32 bits
B. 64 bits
C. 128 bits
D. 256 bits

Answer: C. 128 bits


Q15. Which scheduling algorithm uses time quantum?

A. FCFS
B. Round Robin
C. SJF
D. Priority

Answer: B. Round Robin


Q16. Which database language is used to define database structure?

A. DML
B. DCL
C. DDL
D. TCL

Answer: C. DDL


Q17. Which attack attempts to guess passwords using repeated trials?

A. Phishing
B. DoS
C. Brute Force
D. Spoofing

Answer: C. Brute Force


Q18. Which memory management technique divides memory into fixed-size blocks?

A. Paging
B. Segmentation
C. Fragmentation
D. Swapping

Answer: A. Paging


Q19. Which command is used to change directory in Linux?

A. dir
B. move
C. cd
D. pwd

Answer: C. cd


Q20. Which hashing algorithm produces a 256-bit output?

A. MD5
B. SHA-1
C. SHA-256
D. DES

Answer: C. SHA-256

Leave a Reply

Your email address will not be published. Required fields are marked *