header1.html

Tuesday 19 March 2013

Computer Awareness Quiz-4


Computer Awareness Quiz-4
1.The very first process created by the kernal that runs till the kernal process is halts is
init
getty
both (a) and (b)
none of these


2.In the process table entry for the kernel process, the process id value is
1
0
255
2


3.Piggy backing is a technique for
Flow control
Acknowledgement
Sequence
retransmition


4.Which function is the entry point for a DLL in MS Windows 3.1
Main
Libmain
Dllmain
Winmain


5.Which program construct must return a value?
Package
Anonymous block
Function
Stored Procedure


6.What was the first name given to Java Programming Language.
Oak - Java
Small Talk
Oak
None


7.Programs that automatically submit your search request to several search engines simultaneously are called—
Webcrawlers
Metasearch engines
Spiders
Hits


8.Graphical diagrams used to represent different multiple perspectives of a system include—
use-case,class and state diagrams
state, interaction, derivative diagrams
interaction, relationship, and class diagrams
deployment, relationship, and use-case diagrams


9.Verification of a login name and password is known as:
configuration
accessibility
authentication
logging in


10.____________ are lists of commands that appear on the screen.
GUIs
Icons
Menus
Windows

Computer Awareness Quiz-3


Computer Awareness Quiz-3
1. While searching a website, you have been unable to find information that was on the site several months ago. What might you do to attempt to locate that information?
Visit Google's cached page to view the older copy
Visit a partner site of the organization to see if it is there
Forget about it, as there is no way to find this information
Use the wayback machine


2. Conditional results after execution of an instruction in a micro processor is stored in
register
accumulator
flag register part of PSW
flag register


3. Word allignment is
alligning the address to the next word boundary of the machine.
alligning to even boundary.
alligning to word boundary
none of the above.


4. Which kind of lock includes a keypad that can be used to control access into areas?
Cipher
Warded
Tumbler
Typelock


5. Windows 95 supports
Multiuser
n tasks
Both
None


6. ……………are used to identify a user who returns to a Website.
Cookies
Plug-ins
Scripts
ASPs


7. The………….data mining technique derives rules from real-world case examples.
Rule discover
Signal processing
Neural networks
Case-based reasoning


8.For 1 MB memory, the number of address lines required,
11
16
22
24


9.In OST, terminal emulation is done in
sessions layer
presentation layer
application layer
transport layer


10.Which of the following involves context switch
priviliged instruction
floating point exception
mutual exclusion
system call