Computer Awareness Quiz-4 |
1.The very first process created by the kernal that runs till the kernal process is halts is init getty both (a) and (b) none of these 2.In the process table entry for the kernel process, the process id value is 1 0 255 2 3.Piggy backing is a technique for Flow control Acknowledgement Sequence retransmition 4.Which function is the entry point for a DLL in MS Windows 3.1 Main Libmain Dllmain Winmain 5.Which program construct must return a value? Package Anonymous block Function Stored Procedure 6.What was the first name given to Java Programming Language. Oak - Java Small Talk Oak None 7.Programs that automatically submit your search request to several search engines simultaneously are called— Webcrawlers Metasearch engines Spiders Hits 8.Graphical diagrams used to represent different multiple perspectives of a system include— use-case,class and state diagrams state, interaction, derivative diagrams interaction, relationship, and class diagrams deployment, relationship, and use-case diagrams 9.Verification of a login name and password is known as: configuration accessibility authentication logging in 10.____________ are lists of commands that appear on the screen. GUIs Icons Menus Windows |
Online Quizzes,MCQs and Articles on .NET Technologies,SQL Server and Computer Awareness Section...
Tuesday, 19 March 2013
Computer Awareness Quiz-4
Computer Awareness Quiz-3
Computer Awareness Quiz-3 |
1. While searching a website, you have been unable to find information that was on the
site several months ago. What might you do to attempt to locate that information?
Visit Google's cached page to view the older copy Visit a partner site of the organization to see if it is there Forget about it, as there is no way to find this information Use the wayback machine 2. Conditional results after execution of an instruction in a micro processor is stored in register accumulator flag register part of PSW flag register 3. Word allignment is alligning the address to the next word boundary of the machine. alligning to even boundary. alligning to word boundary none of the above. 4. Which kind of lock includes a keypad that can be used to control access into areas? Cipher Warded Tumbler Typelock 5. Windows 95 supports Multiuser n tasks Both None 6. ……………are used to identify a user who returns to a Website. Cookies Plug-ins Scripts ASPs 7. The………….data mining technique derives rules from real-world case examples. Rule discover Signal processing Neural networks Case-based reasoning 8.For 1 MB memory, the number of address lines required, 11 16 22 24 9.In OST, terminal emulation is done in sessions layer presentation layer application layer transport layer 10.Which of the following involves context switch priviliged instruction floating point exception mutual exclusion system call |
Subscribe to:
Posts (Atom)