MCQOPTIONS
Saved Bookmarks
This section includes 18 Mcqs, each offering curated multiple-choice questions to sharpen your IBPS SO knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
This page replacement algorithm gives the lowest possible page-fault rate for a fixed number of frames – |
| A. | FIFO page replacement |
| B. | Optimal page replacement |
| C. | LRU page replacement |
| D. | LFU page replacement |
| E. | MFU page replacement |
| Answer» C. LRU page replacement | |
| 2. |
With reference to multiprogramming OS, pick the option which is not true. |
| A. | Increased CPU utilization |
| B. | Several jobs are kept in memory simultaneously |
| C. | It has well-defined, fixed time constraints. |
| D. | If the current job needs I/O, the OS picks another job. |
| E. | Multiprogrammed systems provide an environment in which system resources are utilized effectively. |
| Answer» D. If the current job needs I/O, the OS picks another job. | |
| 3. |
The complete graph Kn has ____ different spanning trees. |
| A. | Nn – 2 |
| B. | n x n |
| C. | nn |
| D. | n2 |
| E. | None of these |
| Answer» B. n x n | |
| 4. |
Consider the following encryption algorithms? Data Encryption Standard (DES) Advanced Encryption Standard (AES) Rivest Shamir Adleman (RSA) Choose the option that correctly matches the given algorithms with the type of cryptography (public-key of private-key) utilised by them. |
| A. | DES & AES: private-key; RSA: public-key |
| B. | AES & RSA: private-key; DES: public-key |
| C. | DES & RSA: private-key; AES: public-key |
| D. | RSA: private-key; DES & AES: public-key |
| E. | AES: private-key; DES & RSA: public-key |
| Answer» B. AES & RSA: private-key; DES: public-key | |
| 5. |
What are the two main types of indexes in SQL Indexing? |
| A. | Main, devoid |
| B. | Syntax, Non-Syntax |
| C. | Server, Non-server |
| D. | Clustered, Non-clustered |
| E. | No such types of indexes |
| Answer» E. No such types of indexes | |
| 6. |
Data are followed to be transmitted in only one direction in a _________. |
| A. | Simplex channel |
| B. | Dumb Channel |
| C. | Half duplex |
| D. | Full Duplex |
| E. | None |
| Answer» B. Dumb Channel | |
| 7. |
Belady’s anomaly states that _________ |
| A. | More time is spent on CPU work than I/O. |
| B. | More time is spent on I/O than CPU work. |
| C. | Page-fault rate may increase as the number of allocated frames increases. |
| D. | Page-fault rate may decrease as the number of allocated frames increases. |
| E. | Desired page is not found in memory. |
| Answer» D. Page-fault rate may decrease as the number of allocated frames increases. | |
| 8. |
Which is a quality management technique that translates the needs of the customer into technical requirements for software? |
| A. | System Requirement Specification |
| B. | Validation criteria |
| C. | Quality function deployment |
| D. | Prototyping |
| E. | Validating |
| Answer» D. Prototyping | |
| 9. |
Which of these measures are used to analyze the central tendency of data? |
| A. | Mean and Normal Distribution |
| B. | Mean, Median and Mode |
| C. | Mode, Alpha & Range |
| D. | Standard Deviation, Range and Mean |
| E. | Median, Range and Normal Distribution |
| Answer» C. Mode, Alpha & Range | |
| 10. |
Communication between a computer and a keyboard involves __________ transmission. |
| A. | Automatic |
| B. | Half-duplex |
| C. | Full-duplex |
| D. | Simplex |
| E. | Transitive |
| Answer» E. Transitive | |
| 11. |
A software program stored in a ROM that cannot be changed easily is known as |
| A. | hardware |
| B. | linker |
| C. | editor |
| D. | firmware |
| E. | None of these |
| Answer» E. None of these | |
| 12. |
The Last address of IP address represent is: |
| A. | Unicast Address |
| B. | Multicast Address |
| C. | Broadcast Address |
| D. | Network Address |
| E. | None of these |
| Answer» D. Network Address | |
| 13. |
Compaction is a solution to the problem of |
| A. | Deadlock |
| B. | Internal fragmentation |
| C. | Critical section |
| D. | External fragmentation |
| E. | Unauthorized access |
| Answer» E. Unauthorized access | |
| 14. |
Which of the following is correctly matched with respect to Android OS? i. Android 6 – 6.0.1 → Marshmallow ii. Android 4.1 – 4.3 → KitKat iii. Android 4.4 – 4.4.4 → Jelly Bean |
| A. | Only I |
| B. | Only II |
| C. | Only III |
| D. | Both II and III |
| E. | All I, II and III |
| Answer» B. Only II | |
| 15. |
From the below given option select a statement which is not the valid form of horn clause? |
| A. | q ᴧ p |
| B. | p Ø q |
| C. | ᴧ q p |
| D. | p Ø q |
| E. | Both b and c |
| Answer» E. Both b and c | |
| 16. |
In UNIX, what is the function of grep command? |
| A. | to search for generalized regular expressions occurring in UNIX files. |
| B. | to evaluate an expression |
| C. | to execute a command |
| D. | to print the command history of the shell |
| E. | to edit the input stream |
| Answer» B. to evaluate an expression | |
| 17. |
Which among the following special characters cannot be used as a folder name? |
| A. | ! |
| B. | * |
| C. | [ |
| D. | ] |
| E. | + |
| Answer» C. [ | |
| 18. |
Which of the following strategies allocates to a process the smallest hole that is big enough? |
| A. | First fit |
| B. | Best fit |
| C. | Worst fit |
| D. | Both A and C |
| E. | Both B and C |
| Answer» C. Worst fit | |