Set No -24: COMPUTER GENERAL KNOWLEDGE QUIZ

Q1. Which CPU scheduling algorithm is preemptive in nature?

A. FCFS
B. Non-preemptive SJF
C. Preemptive Priority
D. FIFO

Answer: C. Preemptive Priority


Q2. What is the maximum number of usable hosts in a subnet with mask /26?

A. 62
B. 64
C. 126
D. 30

Answer: A. 62
(/26 → 64 total addresses, 2 reserved)


Q3. Which ACID property ensures that committed data will remain permanent even after system crash?

A. Atomicity
B. Consistency
C. Isolation
D. Durability

Answer: D. Durability


Q4. Which sorting algorithm is stable by default?

A. Quick Sort
B. Heap Sort
C. Merge Sort
D. Selection Sort

Answer: C. Merge Sort


Q5. Which protocol is used to automatically assign IP addresses in IPv6?

A. ARP
B. DHCPv6
C. ICMP
D. SNMP

Answer: B. DHCPv6


Q6. In Operating System, which technique allows multiple processes to share CPU time?

A. Paging
B. Multitasking
C. Deadlock
D. Spooling

Answer: B. Multitasking


Q7. Which SQL command is used to remove a specific column from a table?

A. DELETE
B. DROP COLUMN
C. REMOVE
D. ALTER TABLE DROP COLUMN

Answer: D. ALTER TABLE DROP COLUMN


Q8. Which encryption algorithm is asymmetric?

A. AES
B. DES
C. RSA
D. RC4

Answer: C. RSA


Q9. Which Linux command shows real-time system processes?

A. ps
B. top
C. df
D. ls

Answer: B. top


Q10. Which OSI layer is responsible for routing packets?

A. Data Link Layer
B. Network Layer
C. Transport Layer
D. Application Layer

Answer: B. Network Layer


Q11. Which RAID level offers disk mirroring?

A. RAID 0
B. RAID 1
C. RAID 5
D. RAID 6

Answer: B. RAID 1


Q12. What is the primary purpose of a Load Balancer?

A. Store data
B. Increase bandwidth
C. Distribute network traffic
D. Encrypt communication

Answer: C. Distribute network traffic


Q13. Which memory is non-volatile and programmable?

A. RAM
B. EEPROM
C. Cache
D. Register

Answer: B. EEPROM


Q14. Which scheduling algorithm gives minimum average waiting time?

A. FCFS
B. Round Robin
C. SJF
D. Priority

Answer: C. SJF


Q15. Which SQL join returns all records when there is a match in either table?

A. INNER JOIN
B. LEFT JOIN
C. RIGHT JOIN
D. FULL OUTER JOIN

Answer: D. FULL OUTER JOIN


Q16. Which protocol is used for network monitoring?

A. FTP
B. SNMP
C. SMTP
D. POP3

Answer: B. SNMP


Q17. Which type of attack floods a server with excessive requests?

A. Phishing
B. Trojan
C. DoS Attack
D. Spoofing

Answer: C. DoS Attack


Q18. Which cloud service model provides complete infrastructure resources?

A. SaaS
B. PaaS
C. IaaS
D. DaaS

Answer: C. IaaS


Q19. In C++, which concept allows redefining a parent class method in child class?

A. Overloading
B. Inheritance
C. Overriding
D. Encapsulation

Answer: C. Overriding


Q20. Which hashing algorithm produces 128-bit output?

A. SHA-256
B. MD5
C. SHA-512
D. RSA

Answer: B. MD5

Leave a Reply

Your email address will not be published. Required fields are marked *