Q1. Which CPU scheduling algorithm is preemptive in nature?
A. FCFS
B. Non-preemptive SJF
C. Preemptive Priority
D. FIFO
Answer: C. Preemptive Priority
Q2. What is the maximum number of usable hosts in a subnet with mask /26?
A. 62
B. 64
C. 126
D. 30
Answer: A. 62
(/26 → 64 total addresses, 2 reserved)
Q3. Which ACID property ensures that committed data will remain permanent even after system crash?
A. Atomicity
B. Consistency
C. Isolation
D. Durability
Answer: D. Durability
Q4. Which sorting algorithm is stable by default?
A. Quick Sort
B. Heap Sort
C. Merge Sort
D. Selection Sort
Answer: C. Merge Sort
Q5. Which protocol is used to automatically assign IP addresses in IPv6?
A. ARP
B. DHCPv6
C. ICMP
D. SNMP
Answer: B. DHCPv6
Q6. In Operating System, which technique allows multiple processes to share CPU time?
A. Paging
B. Multitasking
C. Deadlock
D. Spooling
Answer: B. Multitasking
Q7. Which SQL command is used to remove a specific column from a table?
A. DELETE
B. DROP COLUMN
C. REMOVE
D. ALTER TABLE DROP COLUMN
Answer: D. ALTER TABLE DROP COLUMN
Q8. Which encryption algorithm is asymmetric?
A. AES
B. DES
C. RSA
D. RC4
Answer: C. RSA
Q9. Which Linux command shows real-time system processes?
A. ps
B. top
C. df
D. ls
Answer: B. top
Q10. Which OSI layer is responsible for routing packets?
A. Data Link Layer
B. Network Layer
C. Transport Layer
D. Application Layer
Answer: B. Network Layer
Q11. Which RAID level offers disk mirroring?
A. RAID 0
B. RAID 1
C. RAID 5
D. RAID 6
Answer: B. RAID 1
Q12. What is the primary purpose of a Load Balancer?
A. Store data
B. Increase bandwidth
C. Distribute network traffic
D. Encrypt communication
Answer: C. Distribute network traffic
Q13. Which memory is non-volatile and programmable?
A. RAM
B. EEPROM
C. Cache
D. Register
Answer: B. EEPROM
Q14. Which scheduling algorithm gives minimum average waiting time?
A. FCFS
B. Round Robin
C. SJF
D. Priority
Answer: C. SJF
Q15. Which SQL join returns all records when there is a match in either table?
A. INNER JOIN
B. LEFT JOIN
C. RIGHT JOIN
D. FULL OUTER JOIN
Answer: D. FULL OUTER JOIN
Q16. Which protocol is used for network monitoring?
A. FTP
B. SNMP
C. SMTP
D. POP3
Answer: B. SNMP
Q17. Which type of attack floods a server with excessive requests?
A. Phishing
B. Trojan
C. DoS Attack
D. Spoofing
Answer: C. DoS Attack
Q18. Which cloud service model provides complete infrastructure resources?
A. SaaS
B. PaaS
C. IaaS
D. DaaS
Answer: C. IaaS
Q19. In C++, which concept allows redefining a parent class method in child class?
A. Overloading
B. Inheritance
C. Overriding
D. Encapsulation
Answer: C. Overriding
Q20. Which hashing algorithm produces 128-bit output?
A. SHA-256
B. MD5
C. SHA-512
D. RSA
Answer: B. MD5