PGVCL-Vidyut-Sahayak-Junior-Assistant- Paper-20Jan2021-Batch1-Computer Knowledge
Sr. No | Questions with multiple options |
1. | Which of the following options are available under find options?
(A) new Rule, search, look (B) cell, Inside, look (C) search, goto, format (D) Within, search, Look in Ans: D |
2. | Which layer of OSI model also called end-to-end layer?
(A) Transport layer (B) (B) Presentation layer (C) (C) Session layer (D) (D) Network layer Ans: A |
3. | Statement A: The extension “doc” represents a word document in open xml format
Statement B: The extension “docx” represents a word document in 97-2003 format (A) Both Statements are false (B) Statement A is false and statement B is true (C) Statement A is true and statement B is false (D) Both Statements are true Ans: A |
4. | Which of the following replaced vacuum tubes during 1956?
(A) Cloud System (B) Microprocessors (C) ) Compiler Integrated Chips (D) Transistors Ans: D |
5. | ____________ is a computer program developed to protect computer from worms, spyware and botnet
(A) Debugging (B) Antivirus (C) ) Compiler (D) ) Virus Ans: B |
6. | Http response code 401 specifies
(A) Unauthorized (B) Not found (C) Bad request (D) Payment Required Ans: A |
7. | Which of the following statements are true with respect to process termination
(A) Normal exit is involuntary and error exit is involuntary (B) Normal exit is voluntary, fatal error is involuntary (C) Noraml exit is involuntary and killed by process in voluntary (D) Normal exit is voluntary and fatal error is voluntary Ans: B |
8. | __________ has an external gate array known as a bistable multivibrator that flip-flops between two states
(A) RROM (B) SRAM (C) ROM (D) Virtual Memory Ans: B |
9. | _________ displays banners and unwanted pop up and ________ includes data collection program that gathers information about end user
(A) Spyware, Adware (B) Adware, Spyware (C) Malicious Code, Adware (D) Spyware, Malicious code Ans: B |
10. | Which protocol provides reliable communication?
(A) UDP (B) IP (C) PAP (D) TCP Ans: D |
11. | Statement A : A chip is a collection of tiny transistors
Statement B: Transistors are specially designed chips used to process 4 bits of data (A) Both statements A & B are false (B) Both statements A & B are true (C) Statement A is true and Statement B is false (D) Statement A is false and Statement B is true Ans: C |
12. | The class-based addressing is also known as
(A) Classful Model (B) Heterogeneous Model (C) Classless Model (D) Modern Model Ans: A |
13. | _________ occurs when a program requests memory from the operating system and never returns the memory when it’s done.
(A) Memory leak (B) Virtual Mapping (C) Fragmentation (D) Caching Ans:A |
14. | Statement A : SJF algorithm works based on the size of job executed by CPU
Statement B: FCFS works based on the exact order of their arrival (A) Statement A is true and Statement B is false (B) Statement A is false and Statement B is true (C) Both statements A & B are false (D) Both statements A & B are true Ans: D |
15. | Statement A : Volatile memory is a computer memory that can retain the stored information even when not powered
Statement B: Non Volatile memory is a computer memory that requires power to maintain the stored information (A) Both statements A & B are false (B) Statement A is true and Statement B is false (C) Statement A is false and Statement B is true (D) Both statements A & B are true Ans: A |
Data Collected By – Sangita | |
Published on – 6th Jan 2022 | |
Leave a Reply