๐Ÿ“Œ IMPORTANT
Loading announcements...

Sunday, February 1, 2026

SUPER ADVANCED COMPUTER MCQs

 

SUPER ADVANCED COMPUTER MCQs (101–150)

101. Which scheduling algorithm may cause starvation?

a) FCFS
b) Round Robin
c) Priority Scheduling
d) SJF (non-preemptive)
✔ Answer: c) Priority Scheduling


102. Which of the following is NOT a real-time operating system?

a) VxWorks
b) QNX
c) Windows 10
d) RTLinux
✔ Answer: c) Windows 10


103. What is the default subnet mask for Class C IP address?

a) 255.0.0.0
b) 255.255.0.0
c) 255.255.255.0
d) 255.255.255.255
✔ Answer: c) 255.255.255.0


104. Which layer of OSI model is responsible for encryption and compression?

a) Application
b) Session
c) Presentation
d) Transport
✔ Answer: c) Presentation


105. Which normal form eliminates transitive dependency?

a) 1NF
b) 2NF
c) 3NF
d) BCNF
✔ Answer: c) 3NF


106. Which command shows current IP configuration in Windows?

a) ping
b) tracert
c) ipconfig
d) netstat
✔ Answer: c) ipconfig


107. Which memory management technique suffers from external fragmentation?

a) Paging
b) Segmentation
c) Virtual memory
d) Cache mapping
✔ Answer: b) Segmentation


108. Which key is also known as the “context switch” key?

a) Alt
b) Shift
c) Ctrl
d) Tab
✔ Answer: a) Alt


109. Which protocol provides secure communication over a computer network?

a) FTP
b) HTTP
c) HTTPS
d) SMTP
✔ Answer: c) HTTPS


110. What is the size of IPv4 address?

a) 16 bits
b) 32 bits
c) 64 bits
d) 128 bits
✔ Answer: b) 32 bits


111. Which database language is used to define database structure?

a) DML
b) DCL
c) DDL
d) TCL
✔ Answer: c) DDL


112. Which type of malware hides itself inside legitimate software?

a) Worm
b) Virus
c) Trojan Horse
d) Spyware
✔ Answer: c) Trojan Horse


113. Which process state is not valid?

a) Ready
b) Waiting
c) Running
d) Executing
✔ Answer: d) Executing


114. Which addressing mode is used in IPv6?

a) Classful
b) Classless
c) Both
d) None
✔ Answer: b) Classless


115. Which SQL command removes all records but keeps table structure?

a) DROP
b) DELETE
c) TRUNCATE
d) REMOVE
✔ Answer: c) TRUNCATE


116. Which device operates at the Data Link layer?

a) Router
b) Gateway
c) Switch
d) Repeater
✔ Answer: c) Switch


117. Which type of attack uses multiple systems to attack one target?

a) Phishing
b) DoS
c) DDoS
d) Spoofing
✔ Answer: c) DDoS


118. Which file system supports large files and encryption in Windows?

a) FAT16
b) FAT32
c) NTFS
d) EXT4
✔ Answer: c) NTFS


119. Which cache mapping technique is fastest?

a) Direct mapping
b) Fully associative
c) Set associative
d) Virtual mapping
✔ Answer: b) Fully associative


120. Which SQL clause is used with aggregate functions?

a) WHERE
b) GROUP BY
c) ORDER BY
d) HAVING
✔ Answer: d) HAVING


121. Which OS concept prevents deadlock by avoiding circular wait?

a) Mutual exclusion
b) Hold and wait
c) Preemption
d) Circular wait
✔ Answer: c) Preemption


122. Which IP address is used for loopback testing?

a) 192.168.1.1
b) 0.0.0.0
c) 127.0.0.1
d) 255.255.255.0
✔ Answer: c) 127.0.0.1


123. Which type of key is used in symmetric encryption?

a) Public key
b) Private key
c) Same key for encryption and decryption
d) Hash key
✔ Answer: c) Same key for encryption and decryption


124. Which memory uses tags to identify data blocks?

a) RAM
b) Cache
c) ROM
d) Register
✔ Answer: b) Cache


125. Which SQL command is used to remove a table permanently?

a) DELETE
b) DROP
c) TRUNCATE
d) REMOVE
✔ Answer: b) DROP


126. Which OSI layer ensures end-to-end delivery?

a) Network
b) Transport
c) Session
d) Application
✔ Answer: b) Transport


127. Which scheduling algorithm gives minimum average waiting time?

a) FCFS
b) Priority
c) Round Robin
d) SJF
✔ Answer: d) SJF


128. Which device amplifies signals in a network?

a) Router
b) Switch
c) Repeater
d) Bridge
✔ Answer: c) Repeater


129. Which key combination locks a Windows computer?

a) Ctrl + L
b) Alt + L
c) Windows + L
d) Ctrl + Alt + L
✔ Answer: c) Windows + L


130. Which type of join returns only matching records?

a) LEFT JOIN
b) RIGHT JOIN
c) FULL JOIN
d) INNER JOIN
✔ Answer: d) INNER JOIN


131. Which malware records keystrokes secretly?

a) Adware
b) Keylogger
c) Ransomware
d) Worm
✔ Answer: b) Keylogger


132. Which addressing method maps multiple IPs to one MAC?

a) ARP
b) RARP
c) Proxy ARP
d) DNS
✔ Answer: c) Proxy ARP


133. Which SQL constraint ensures unique values?

a) NOT NULL
b) PRIMARY KEY
c) UNIQUE
d) CHECK
✔ Answer: c) UNIQUE


134. Which layer converts data into signals?

a) Physical
b) Data Link
c) Network
d) Transport
✔ Answer: a) Physical


135. Which OS provides services to both user and hardware?

a) Shell
b) Kernel
c) BIOS
d) Compiler
✔ Answer: b) Kernel


136. Which addressing is used by switches?

a) IP address
b) MAC address
c) Port address
d) Logical address
✔ Answer: b) MAC address


137. Which memory technique allows execution of programs larger than RAM?

a) Cache
b) Segmentation
c) Paging
d) Virtual Memory
✔ Answer: d) Virtual Memory


138. Which attack redirects traffic to a fake website?

a) Spoofing
b) Sniffing
c) Spamming
d) DoS
✔ Answer: a) Spoofing


139. Which normal form removes multivalued dependency?

a) 3NF
b) BCNF
c) 4NF
d) 5NF
✔ Answer: c) 4NF


140. Which port number is used by HTTPS?

a) 21
b) 25
c) 80
d) 443
✔ Answer: d) 443


141. Which SQL keyword is used to sort result set?

a) SORT
b) GROUP BY
c) ORDER BY
d) FILTER
✔ Answer: c) ORDER BY


142. Which OSI layer manages dialog control?

a) Presentation
b) Session
c) Transport
d) Network
✔ Answer: b) Session


143. Which scheduling is used in time-sharing systems?

a) FCFS
b) SJF
c) Priority
d) Round Robin
✔ Answer: d) Round Robin


144. Which device converts digital to digital signals?

a) Modem
b) Repeater
c) Codec
d) Multiplexer
✔ Answer: b) Repeater


145. Which type of backup copies only changed files since last backup?

a) Full
b) Differential
c) Incremental
d) Mirror
✔ Answer: c) Incremental


146. Which IP version uses 128-bit addressing?

a) IPv2
b) IPv4
c) IPv6
d) IPv8
✔ Answer: c) IPv6


147. Which malware demands ransom for data recovery?

a) Worm
b) Trojan
c) Ransomware
d) Spyware
✔ Answer: c) Ransomware


148. Which protocol resolves IP address to MAC address?

a) DNS
b) ARP
c) RARP
d) DHCP
✔ Answer: b) ARP


149. Which SQL command is used to change table structure?

a) UPDATE
b) MODIFY
c) ALTER
d) CHANGE
✔ Answer: c) ALTER


150. Which computer architecture uses a single memory for data and instructions?

a) Harvard
b) Modified Harvard
c) Von Neumann
d) Parallel
✔ Answer: c) Von Neumann

No comments:

Post a Comment