Q1. Which of the following is a characteristic of a real-time operating system (RTOS)?
A. High throughput
B. Time-bound response
C. Multi-user access
D. Batch processing
Answer: B. Time-bound response
Q2. Which addressing method is used by ARP protocol?
A. Logical to Logical
B. Logical to Physical
C. Physical to Logical
D. Physical to Physical
Answer: B. Logical to Physical
(ARP maps IP address to MAC address.)
Q3. In DBMS, which isolation level prevents dirty reads?
A. Read Uncommitted
B. Read Committed
C. Repeatable Read
D. Serializable
Answer: B. Read Committed
Q4. Which algorithm is used in Quick Sort for partitioning?
A. Greedy Method
B. Divide and Conquer
C. Dynamic Programming
D. Backtracking
Answer: B. Divide and Conquer
Q5. What is the maximum number of hosts possible in a Class C IPv4 network?
A. 126
B. 254
C. 255
D. 256
Answer: B. 254
(2^8 – 2 reserved addresses)
Q6. Which of the following is a symmetric key encryption algorithm?
A. RSA
B. ECC
C. AES
D. DSA
Answer: C. AES
Q7. Which normal form eliminates transitive dependency?
A. 1NF
B. 2NF
C. 3NF
D. 4NF
Answer: C. 3NF
Q8. Which Linux command displays currently running processes?
A. ls
B. ps
C. pwd
D. cat
Answer: B. ps
Q9. What is the time complexity of Merge Sort in worst case?
A. O(n)
B. O(log n)
C. O(n log n)
D. O(n²)
Answer: C. O(n log n)
Q10. Which OSI layer handles data encryption and compression?
A. Session Layer
B. Presentation Layer
C. Transport Layer
D. Application Layer
Answer: B. Presentation Layer
Q11. Which type of cloud service provides a runtime environment for applications?
A. IaaS
B. PaaS
C. SaaS
D. DaaS
Answer: B. PaaS
Q12. In C programming, what does a pointer store?
A. Value of variable
B. Address of variable
C. Data type
D. Instruction code
Answer: B. Address of variable
Q13. Which protocol ensures reliable data transmission?
A. UDP
B. TCP
C. IP
D. ARP
Answer: B. TCP
Q14. What is the size of IPv6 address?
A. 32 bits
B. 64 bits
C. 128 bits
D. 256 bits
Answer: C. 128 bits
Q15. Which scheduling algorithm uses time quantum?
A. FCFS
B. Round Robin
C. SJF
D. Priority
Answer: B. Round Robin
Q16. Which database language is used to define database structure?
A. DML
B. DCL
C. DDL
D. TCL
Answer: C. DDL
Q17. Which attack attempts to guess passwords using repeated trials?
A. Phishing
B. DoS
C. Brute Force
D. Spoofing
Answer: C. Brute Force
Q18. Which memory management technique divides memory into fixed-size blocks?
A. Paging
B. Segmentation
C. Fragmentation
D. Swapping
Answer: A. Paging
Q19. Which command is used to change directory in Linux?
A. dir
B. move
C. cd
D. pwd
Answer: C. cd
Q20. Which hashing algorithm produces a 256-bit output?
A. MD5
B. SHA-1
C. SHA-256
D. DES
Answer: C. SHA-256