SUPER ADVANCED COMPUTER MCQs (101–150)
101. Which scheduling algorithm may cause starvation?
a) FCFS
b) Round Robin
c) Priority Scheduling
d) SJF (non-preemptive)
✔ Answer: c) Priority Scheduling
102. Which of the following is NOT a real-time operating system?
a) VxWorks
b) QNX
c) Windows 10
d) RTLinux
✔ Answer: c) Windows 10
103. What is the default subnet mask for Class C IP address?
a) 255.0.0.0
b) 255.255.0.0
c) 255.255.255.0
d) 255.255.255.255
✔ Answer: c) 255.255.255.0
104. Which layer of OSI model is responsible for encryption and compression?
a) Application
b) Session
c) Presentation
d) Transport
✔ Answer: c) Presentation
105. Which normal form eliminates transitive dependency?
a) 1NF
b) 2NF
c) 3NF
d) BCNF
✔ Answer: c) 3NF
106. Which command shows current IP configuration in Windows?
a) ping
b) tracert
c) ipconfig
d) netstat
✔ Answer: c) ipconfig
107. Which memory management technique suffers from external fragmentation?
a) Paging
b) Segmentation
c) Virtual memory
d) Cache mapping
✔ Answer: b) Segmentation
108. Which key is also known as the “context switch” key?
a) Alt
b) Shift
c) Ctrl
d) Tab
✔ Answer: a) Alt
109. Which protocol provides secure communication over a computer network?
a) FTP
b) HTTP
c) HTTPS
d) SMTP
✔ Answer: c) HTTPS
110. What is the size of IPv4 address?
a) 16 bits
b) 32 bits
c) 64 bits
d) 128 bits
✔ Answer: b) 32 bits
111. Which database language is used to define database structure?
a) DML
b) DCL
c) DDL
d) TCL
✔ Answer: c) DDL
112. Which type of malware hides itself inside legitimate software?
a) Worm
b) Virus
c) Trojan Horse
d) Spyware
✔ Answer: c) Trojan Horse
113. Which process state is not valid?
a) Ready
b) Waiting
c) Running
d) Executing
✔ Answer: d) Executing
114. Which addressing mode is used in IPv6?
a) Classful
b) Classless
c) Both
d) None
✔ Answer: b) Classless
115. Which SQL command removes all records but keeps table structure?
a) DROP
b) DELETE
c) TRUNCATE
d) REMOVE
✔ Answer: c) TRUNCATE
116. Which device operates at the Data Link layer?
a) Router
b) Gateway
c) Switch
d) Repeater
✔ Answer: c) Switch
117. Which type of attack uses multiple systems to attack one target?
a) Phishing
b) DoS
c) DDoS
d) Spoofing
✔ Answer: c) DDoS
118. Which file system supports large files and encryption in Windows?
a) FAT16
b) FAT32
c) NTFS
d) EXT4
✔ Answer: c) NTFS
119. Which cache mapping technique is fastest?
a) Direct mapping
b) Fully associative
c) Set associative
d) Virtual mapping
✔ Answer: b) Fully associative
120. Which SQL clause is used with aggregate functions?
a) WHERE
b) GROUP BY
c) ORDER BY
d) HAVING
✔ Answer: d) HAVING
121. Which OS concept prevents deadlock by avoiding circular wait?
a) Mutual exclusion
b) Hold and wait
c) Preemption
d) Circular wait
✔ Answer: c) Preemption
122. Which IP address is used for loopback testing?
a) 192.168.1.1
b) 0.0.0.0
c) 127.0.0.1
d) 255.255.255.0
✔ Answer: c) 127.0.0.1
123. Which type of key is used in symmetric encryption?
a) Public key
b) Private key
c) Same key for encryption and decryption
d) Hash key
✔ Answer: c) Same key for encryption and decryption
124. Which memory uses tags to identify data blocks?
a) RAM
b) Cache
c) ROM
d) Register
✔ Answer: b) Cache
125. Which SQL command is used to remove a table permanently?
a) DELETE
b) DROP
c) TRUNCATE
d) REMOVE
✔ Answer: b) DROP
126. Which OSI layer ensures end-to-end delivery?
a) Network
b) Transport
c) Session
d) Application
✔ Answer: b) Transport
127. Which scheduling algorithm gives minimum average waiting time?
a) FCFS
b) Priority
c) Round Robin
d) SJF
✔ Answer: d) SJF
128. Which device amplifies signals in a network?
a) Router
b) Switch
c) Repeater
d) Bridge
✔ Answer: c) Repeater
129. Which key combination locks a Windows computer?
a) Ctrl + L
b) Alt + L
c) Windows + L
d) Ctrl + Alt + L
✔ Answer: c) Windows + L
130. Which type of join returns only matching records?
a) LEFT JOIN
b) RIGHT JOIN
c) FULL JOIN
d) INNER JOIN
✔ Answer: d) INNER JOIN
131. Which malware records keystrokes secretly?
a) Adware
b) Keylogger
c) Ransomware
d) Worm
✔ Answer: b) Keylogger
132. Which addressing method maps multiple IPs to one MAC?
a) ARP
b) RARP
c) Proxy ARP
d) DNS
✔ Answer: c) Proxy ARP
133. Which SQL constraint ensures unique values?
a) NOT NULL
b) PRIMARY KEY
c) UNIQUE
d) CHECK
✔ Answer: c) UNIQUE
134. Which layer converts data into signals?
a) Physical
b) Data Link
c) Network
d) Transport
✔ Answer: a) Physical
135. Which OS provides services to both user and hardware?
a) Shell
b) Kernel
c) BIOS
d) Compiler
✔ Answer: b) Kernel
136. Which addressing is used by switches?
a) IP address
b) MAC address
c) Port address
d) Logical address
✔ Answer: b) MAC address
137. Which memory technique allows execution of programs larger than RAM?
a) Cache
b) Segmentation
c) Paging
d) Virtual Memory
✔ Answer: d) Virtual Memory
138. Which attack redirects traffic to a fake website?
a) Spoofing
b) Sniffing
c) Spamming
d) DoS
✔ Answer: a) Spoofing
139. Which normal form removes multivalued dependency?
a) 3NF
b) BCNF
c) 4NF
d) 5NF
✔ Answer: c) 4NF
140. Which port number is used by HTTPS?
a) 21
b) 25
c) 80
d) 443
✔ Answer: d) 443
141. Which SQL keyword is used to sort result set?
a) SORT
b) GROUP BY
c) ORDER BY
d) FILTER
✔ Answer: c) ORDER BY
142. Which OSI layer manages dialog control?
a) Presentation
b) Session
c) Transport
d) Network
✔ Answer: b) Session
143. Which scheduling is used in time-sharing systems?
a) FCFS
b) SJF
c) Priority
d) Round Robin
✔ Answer: d) Round Robin
144. Which device converts digital to digital signals?
a) Modem
b) Repeater
c) Codec
d) Multiplexer
✔ Answer: b) Repeater
145. Which type of backup copies only changed files since last backup?
a) Full
b) Differential
c) Incremental
d) Mirror
✔ Answer: c) Incremental
146. Which IP version uses 128-bit addressing?
a) IPv2
b) IPv4
c) IPv6
d) IPv8
✔ Answer: c) IPv6
147. Which malware demands ransom for data recovery?
a) Worm
b) Trojan
c) Ransomware
d) Spyware
✔ Answer: c) Ransomware
148. Which protocol resolves IP address to MAC address?
a) DNS
b) ARP
c) RARP
d) DHCP
✔ Answer: b) ARP
149. Which SQL command is used to change table structure?
a) UPDATE
b) MODIFY
c) ALTER
d) CHANGE
✔ Answer: c) ALTER
150. Which computer architecture uses a single memory for data and instructions?
a) Harvard
b) Modified Harvard
c) Von Neumann
d) Parallel
✔ Answer: c) Von Neumann
No comments:
Post a Comment