CS/IT MCQ Collections

Objective Questions for IT Officer Exam Part-3

Pinterest LinkedIn Tumblr

Here are the collection of objective questions for IT officer exam which includes most probable multiple choice questions for your exam preparation. It includes objective questions on the computer fundamental, network topology, scheduling, internet and HTML and the operating system fundamentals required for IT officer exam preparation.

1. What is the name of the network topology in which there are bi-directional links between each possible node?
A) Ring
B) Star
C) Tree
D) Mesh

2. Which scheduling policy is most suitable for a time-shared operating system?
A) Shortest job first
B) Round-robin
C) Elevator
D) First-come-first-serve

3. A next-generation web content development language, ……………. typically refers to a suite of technologies that allow developers to store data in a readable format.
A) HTML
B) XML
C) XSL
D) PHP

4. A(n) ………………. is a private corporate network that uses standard Internet protocols and interfaces.
A) Internet
B) Extranet
C) Local Area Network
D) Intranet

5. Integrated Circuit is related to …………………….. generations computers.
A) Second
B) Third
C) Fourth
D) Fifth

Read Also: Solved MCQ for Computer Officer Exam

6. Which of the following is the most suitable scheduling scheme in a real time operating system?
A) Round robin
B) First come first serve
C) Preemptive scheduling
D) Random Scheduling

7. Kernel is ………
A) Considered as the critical part of the operating system
B) The software which monitors the operating system
C) The set of primitive functions upon which the rest of operating system functions are build up
D) None of the above

8. Which of the following storage is fastest?
A) RAM
B) ROM
C) Register
D) Blu-ray disc

9. A polymorphic virus ………
A) Modifies its program code each time it attaches itself to another program or file.
B) Is a malicious-logic program that copies itself repeatedly in memory or on a disk drive until no memory or disk space remains.
C) A malicious-logic program that hides within or looks like a legitimate program.
D) Infects a program file, but still reports the size and creation date of the original, uninfected program.

10. Cache Memory ……
A) Helps to store more data in hard disk
B) Placed between main memory and microprocessor
C) Stores data permanently
D) Holds last time visited web site only

Read Also: Solved Objective Questions for IT Officer Exam Part-2

Answers:

1. What is the name of the network topology in which there are bi-directional links between each possible node?

D) Mesh

Explanation: A mesh network is a local area network (LAN) that employs one of two connection arrangements, full mesh topology or partial mesh topology. In the full mesh topology, each node (workstation or another device) is connected directly to each of the others. Read More: mesh network -whatis.techtarget.com and Network Topology – wikipedia.org

2. Which scheduling policy is most suitable for time-shared operating system?

B) Round-robin

Explanation: In the round-robin scheduling, processes are dispatched in a FIFO manner but are given a limited amount of CPU time called a time-slice of a quantum. If a process does not complete before its CPU-time expires, the CPU is preempted and given to the next process waiting in a queue. Read More: CPU/Process Scheduling -personal.kent.edu

3. A next-generation web content development language, ……………. typically refers to a suite of technologies that allow developers to store data in a readable format.

B) XML

Explanation: Extensible Markup Language (XML) is a markup language that defines a set of rules for encoding documents in a format that is both human-readable and machine-readable. It is a textual data format with strong support via Unicode for the languages of the world. Although the design of XML focuses on documents, it is widely used for the representation of arbitrary data structures. Read More: Extensible Markup Language (XML) -wikipedia.org

4. A(n) ………………. is a private corporate network that uses standard Internet protocols and interfaces.

D) Intranet

Explanation: An intranet is a private computer network that uses Internet Protocol technologies to securely share any part of an organization’s information or network operating system within that organization.

5. Integrated Circuit is related to …………………….. generations computers.

B) Third

Explanation: The mass increase in the use of computers accelerated with ‘Third Generation’ computers. These generally relied on Jack Kilby’s invention of the integrated circuit (or the microchip), starting around 1965. Read More: History of computing hardware – wikipedia.org

6. Which of the following is the most suitable scheduling scheme in a real-time operating system?

C) Preemptive scheduling

Explanation: A real-time operating system (RTOS) is an operating system (OS) intended to serve real-time application requests. It must be able to process data as it comes in, typically without buffering delays.

A scheduling decipline is preemptive if, once a process has been given the CPU can taken away. The strategy of allowing processes that are logically runable to be temporarily suspended is called Preemptive Scheduling and it is contrast to the “run to completion” method.

7. Kernel is ………

C) The set of primitive functions upon which the rest of operating system functions are build up

Explanation: The Operating System Kernel does Basic set of primitive operations and processes Like a function call or macro expansion, Part of the calling process, Critical section for the process etc. Read more: Process Scheduling -cs.umsl.edu

8. Which of the following storage is fastest?

C) Register

Explanation: Register is faster than RAM, ROM and Blu-ray disc.

9. A polymorphic virus ………

A) Modifies its program code each time it attaches itself to another program or file.

Explanation: Polymorphic viruses create varied (though fully functional) copies of themselves as a way to avoid detection by anti-virus software. Some polymorphic virus uses different encryption schemes and requires different decryption routines. Read More: Polymorphic viruses

10. Cache Memory ……

B) Placed between main memory and microprocessor

Explanation: The Performance of a microcomputer system can be improved significantly by introducing a small expensive but fast memory between a microprocessor and main memory. Read more: Cache Memory

Read More: CS/IT MCQ Questions for IT Officer Exam

Author

Shuseel Baral is a web programmer and the founder of InfoTechSite has over 8 years of experience in software development, internet, SEO, blogging and marketing digital products and services is passionate about exceeding your expectations.

Comments are closed.