Q1. Which CPU scheduling algorithm may cause convoy effect?
A. Round Robin
B. FCFS
C. SJF
D. Priority
Answer: B. FCFS
Q2. What is the default subnet mask of Class B IPv4 address?
A. 255.0.0.0
B. 255.255.0.0
C. 255.255.255.0
D. 255.255.255.255
Answer: B. 255.255.0.0
Q3. In DBMS, which property of transaction ensures that either all operations occur or none?
A. Consistency
B. Isolation
C. Durability
D. Atomicity
Answer: D. Atomicity
Q4. Which algorithm is used in RSA for key generation?
A. Prime factorization
B. Symmetric encryption
C. Hash mapping
D. XOR operation
Answer: A. Prime factorization
Q5. Which OS component manages memory allocation and deallocation?
A. File System
B. Process Scheduler
C. Memory Manager
D. Device Driver
Answer: C. Memory Manager
Q6. Which TCP flag is used to initiate a connection?
A. ACK
B. FIN
C. SYN
D. RST
Answer: C. SYN
Q7. Which normal form removes multi-valued dependency?
A. 2NF
B. 3NF
C. BCNF
D. 4NF
Answer: D. 4NF
Q8. What is the worst-case time complexity of Quick Sort?
A. O(n)
B. O(log n)
C. O(n log n)
D. O(n²)
Answer: D. O(n²)
Q9. Which Linux command is used to display disk usage?
A. df
B. ps
C. top
D. chmod
Answer: A. df
Q10. Which protocol is connectionless?
A. TCP
B. UDP
C. FTP
D. HTTP
Answer: B. UDP
Q11. Which RAID level provides fault tolerance using parity?
A. RAID 0
B. RAID 1
C. RAID 5
D. RAID 10
Answer: C. RAID 5
Q12. Which OSI layer is responsible for segmentation and reassembly?
A. Network Layer
B. Data Link Layer
C. Transport Layer
D. Application Layer
Answer: C. Transport Layer
Q13. Which cloud deployment model combines public and private cloud?
A. Community Cloud
B. Hybrid Cloud
C. SaaS
D. PaaS
Answer: B. Hybrid Cloud
Q14. In C language, which keyword is used to define a constant?
A. var
B. static
C. const
D. final
Answer: C. const
Q15. Which command is used in SQL to grant permissions?
A. GIVE
B. PERMIT
C. GRANT
D. ALLOW
Answer: C. GRANT
Q16. Which protocol translates MAC address to IP address?
A. ARP
B. RARP
C. DNS
D. DHCP
Answer: B. RARP
Q17. Which scheduling algorithm always selects the process with smallest execution time?
A. FCFS
B. Round Robin
C. SJF
D. Priority
Answer: C. SJF
Q18. Which memory technique reduces external fragmentation?
A. Segmentation
B. Paging
C. Swapping
D. Compaction
Answer: B. Paging
Q19. Which hashing algorithm is considered more secure than SHA-1?
A. MD5
B. SHA-256
C. DES
D. RC4
Answer: B. SHA-256
Q20. Which protocol is used to securely browse websites?
A. HTTP
B. FTP
C. HTTPS
D. Telnet
Answer: C. HTTPS