PGVCL Vidyut Sahayak Computer Knowledge Paper

PGVCL-Vidyut-Sahayak-Junior-Assistant- Paper-20Jan2021-Batch1-Computer Knowledge

Sr. No Questions with multiple options
1. Which of the following options are available under find options?

(A) new Rule, search, look

(B)  cell, Inside, look

(C)  search, goto, format

(D) Within, search, Look in

Ans: D

2. Which layer of OSI model also called end-to-end layer?

(A) Transport layer

(B)  (B) Presentation layer

(C)  (C) Session layer

(D) (D) Network layer

Ans: A

3. Statement A: The extension “doc” represents a word document in open xml format

Statement B: The extension “docx” represents a word document in 97-2003 format

(A) Both Statements are false

(B)  Statement A is false and statement B is true

(C)  Statement A is true and statement B is false

(D) Both Statements are true

Ans: A

4. Which of the following replaced vacuum tubes during 1956?

(A) Cloud System

(B)  Microprocessors

(C)  ) Compiler Integrated Chips

(D) Transistors

Ans: D

5. ____________ is a computer program developed to protect computer from worms, spyware and botnet

(A) Debugging

(B)   Antivirus

(C)  ) Compiler

(D) ) Virus

Ans: B

6. Http response code 401 specifies

(A) Unauthorized

(B)  Not found

(C)  Bad request

(D) Payment Required

Ans: A

7. Which of the following statements are true with respect to process termination

(A) Normal exit is involuntary and error exit is involuntary

(B)  Normal exit is voluntary, fatal error is involuntary

(C)  Noraml exit is involuntary and killed by process in voluntary

(D) Normal exit is voluntary and fatal error is voluntary

Ans: B

8. __________ has an external gate array known as a bistable multivibrator that flip-flops between two states

(A) RROM

(B)  SRAM

(C)  ROM

(D) Virtual Memory

Ans: B

9. _________ displays banners and unwanted pop up and ________ includes data collection program that gathers information about end user

(A) Spyware, Adware

(B)  Adware, Spyware

(C)  Malicious Code, Adware

(D) Spyware, Malicious code

Ans: B

10. Which protocol provides reliable communication?

(A) UDP

(B)  IP

(C)  PAP

(D) TCP

Ans: D

11. Statement A : A chip is a collection of tiny transistors

Statement B: Transistors are specially designed chips used to process 4 bits of data

(A) Both statements A & B are false

(B)  Both statements A & B are true

(C)  Statement A is true and Statement B is false

(D) Statement A is false and Statement B is true

Ans: C

12. The class-based addressing is also known as

(A) Classful Model

(B)  Heterogeneous Model

(C)   Classless Model

(D) Modern Model

Ans: A

13. _________ occurs when a program requests memory from the operating system and never returns the memory when it’s done.

(A) Memory leak

(B)  Virtual Mapping

(C)  Fragmentation

(D) Caching

Ans:A

14. Statement A : SJF algorithm works based on the size of job executed by CPU

Statement B: FCFS works based on the exact order of their arrival

(A) Statement A is true and Statement B is false

(B)  Statement A is false and Statement B is true

(C)  Both statements A & B are false

(D) Both statements A & B are true

Ans: D

15. Statement A : Volatile memory is a computer memory that can retain the stored information even when not powered

Statement B: Non Volatile memory is a computer memory that requires power to maintain the stored information

(A) Both statements A & B are false

(B)  Statement A is true and Statement B is false

(C)  Statement A is false and Statement B is true

(D) Both statements A & B are true

Ans: A

Data Collected By – Sangita
Published on – 6th Jan 2022

 

 


Posted

in

by

Tags:

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *