IBPS SO IT Officer Live Quiz

IBPS SO IT Officer Live Quiz

Hello dear aspirants,

He we are conducting Live IT Officer Quiz for upcoming exams. Live quizzes are also important as they check your knowledge, speed and accuracy with other aspirants. So do attend live quizzes and boost your preparation.

Live IT Officer Quiz in Comment Section

Google Drive Special

Bank Exams Study Material

All the important study material links for bank and other competitive exams.

  • jini-In Pursuit Of Excellence!

    eG

  • Rafael Nadal

    ???

  • Rafael Nadal

    Physical memory is broken into fixed-sized blocks called ________.

    a) frames

    b) pages

    c) backing store

    d) None of these

    • jini-In Pursuit Of Excellence!

      Aa

    • प्यारी रूही

      aa?

    • Rafael Nadal

      aa

    • MAGNUS_CARLSEN

      aa

  • Rafael Nadal

    Logical memory is broken into blocks of the same size called _________.

    a) frames

    b) pages

    c) backing store

    d) None of these

    • jini-In Pursuit Of Excellence!

      Bb 😛

    • प्यारी रूही

      bb?

    • Rafael Nadal

      bb

  • Rafael Nadal

    Every address generated by the CPU is divided into two parts : (choose two)

    a) frame bit

    b) page number

    c) page offset

    d) frame offset

    • MAGNUS_CARLSEN

      cc bb

      • प्यारी रूही

        aa dd

        • MAGNUS_CARLSEN

          hahah

    • प्यारी रूही

      aa

    • Rafael Nadal

      b and c

  • Rafael Nadal

    The __________ is used as an index into the page table.

    a) frame bit

    b) page number

    c) page offset

    d) frame offset

    • jini-In Pursuit Of Excellence!

      Cc

    • MAGNUS_CARLSEN

      cc

    • Rafael Nadal

      bb

  • प्यारी रूही

    mujhe kuch ni ata 😐

    • jini-In Pursuit Of Excellence!

      Chhame here

      • प्यारी रूही

        noii u ko ata h

        • jini-In Pursuit Of Excellence!

          Arey mai IT ki ni hu : D

          • प्यारी रूही

            m b noiii hu 😐

          • jini-In Pursuit Of Excellence!

            Fir don’t be sad.. enjoy learning.. mene to fill b ni kai so

          • प्यारी रूही

            uhhu otey

  • Rafael Nadal

    The _____ table contains the base address of each page in physical memory.

    a) process

    b) memory

    c) page

    d) frame

    • MAGNUS_CARLSEN

      cc.

    • jini-In Pursuit Of Excellence!

      Ccc

    • Rafael Nadal

      cc

  • Rafael Nadal

    The size of a page is typically :

    a) varied

    b) power of 2

    c) power of 4

    d) None of these

    • MAGNUS_CARLSEN

      aa

    • jini-In Pursuit Of Excellence!

      2.

    • Rafael Nadal

      bb

  • Rafael Nadal

    With paging there is no ________ fragmentation.

    a) internal

    b) external

    c) either type of

    d) None of these

    • MAGNUS_CARLSEN

      bb

    • Rafael Nadal

      bb

  • HuNtErRr =NiTeSh

    hii alllzzz

  • Rafael Nadal

    The operating system maintains a ______ table that keeps track of how many frames have been allocated, how many are there, and how many are available.

    a) page

    b) mapping

    c) frame

    d) memory

    • MAGNUS_CARLSEN

      bbb

    • Rafael Nadal

      cc

  • Rafael Nadal

    Paging increases the ______ time.

    a) waiting

    b) execution

    c) context – switch

    d) All of these

    • jini-In Pursuit Of Excellence!

      All

    • MAGNUS_CARLSEN

      dd

    • Rafael Nadal

      cc

  • Rafael Nadal

    Smaller page tables are implemented as a set of _______.

    a) queues

    b) stacks

    c) counters

    d) registers

    • MAGNUS_CARLSEN

      bb

    • jini-In Pursuit Of Excellence!

      Bb

    • Rafael Nadal

      dd

  • Rafael Nadal

    The page table registers should be built with _______.

    a) very low speed logic

    b) very high speed logic

    c) a large memory space

    d) None of these

    • प्यारी रूही

      c?

    • Rafael Nadal

      bb

  • Rafael Nadal

    For larger page tables, they are kept in main memory and a __________ points to the page table.

    a) page table base register

    b) page table base pointer

    c) page table register pointer

    d) page table base

    • MAGNUS_CARLSEN

      aa

    • Rafael Nadal

      aa

  • Rafael Nadal

    For every process there is a __________.

    a) page table

    b) copy of page table

    c) pointer to page table

    d) All of these

    • R!nku GupTA” fUtUrE B@nker”!!

      dd

    • MAGNUS_CARLSEN

      dd

    • Rafael Nadal

      aa

  • Rafael Nadal

    What is breach of integrity ?

    a) This type of violation involves unauthorized reading of data

    b) This violation involves unauthorized modification of data.

    c) This violation involves unauthorized destruction of data

    d) This violation involves unauthorized use of resources

    • MAGNUS_CARLSEN

      bb

    • Rafael Nadal

      bb

  • Rafael Nadal

    What is breach of confidentiality ?

    a) This type of violation involves unauthorized reading of data

    b) This violation involves unauthorized modification of data.

    c) This violation involves unauthorized destruction of data

    d) This violation involves unauthorized use of resources

    • MAGNUS_CARLSEN

      aa

    • R!nku GupTA” fUtUrE B@nker”!!

      aaa??

    • Rafael Nadal

      aa

  • Rafael Nadal

    What is theft of service ?

    a) This type of violation involves unauthorized reading of data

    b) This violation involves unauthorized modification of data.

    c) This violation involves unauthorized destruction of data

    d) This violation involves unauthorized use of resources

    • MAGNUS_CARLSEN

      dd

    • प्यारी रूही

      dd

    • R!nku GupTA” fUtUrE B@nker”!!

      ddd

    • Rafael Nadal

      dd

  • Rafael Nadal

    What is breach of availability ?

    a) This type of violation involves unauthorized reading of data

    b) This violation involves unauthorized modification of data.

    c) This violation involves unauthorized destruction of data

    d) This violation involves unauthorized use of resources

    • प्यारी रूही

      aa

    • R!nku GupTA” fUtUrE B@nker”!!

      bbb??

    • Rafael Nadal

      cc

    • MAGNUS_CARLSEN

      ccc

  • Rafael Nadal

    What is Trojan horse ?

    a) It is a useful way to encrypt password

    b) It is a user which steals valuable information

    c) It is a rogue program which tricks users

    d) It’s a brute force attack algorithm.

    • MAGNUS_CARLSEN

      ddd

    • Rafael Nadal

      ccc

    • R!nku GupTA” fUtUrE B@nker”!!

      ccccccccc

    • Jellyfish

      Cc

  • Rafael Nadal

    What is trap door ?

    a) IT is trap door in WarGames

    b) It is a hole in software left by designer.

    c) It is a Trojan horse

    d) It is a virus which traps and locks user terminal

    • MAGNUS_CARLSEN

      bb

    • R!nku GupTA” fUtUrE B@nker”!!

      dd

    • jini-In Pursuit Of Excellence!

      Dd

    • Rafael Nadal

      bb

    • प्यारी रूही

      dd

    • Jellyfish

      Bb

  • Rafael Nadal

    Which mechanism is used by worm process ?

    a) Trap door

    b) Fake process

    c) Spawn Process

    d) VAX process

    • MAGNUS_CARLSEN

      cc

    • R!nku GupTA” fUtUrE B@nker”!!

      aa

    • Rafael Nadal

      cc

  • Rafael Nadal

    Which of the following is not a characteristic of virus ?

    a) Virus destroy and modify user data

    b) Virus is a standalone program

    c) Virus is a code embedded in a legitimate program

    d) Virus cannot be detected.

    • Jellyfish

      Dd

    • MAGNUS_CARLSEN

      dd

    • R!nku GupTA” fUtUrE B@nker”!!

      ddd

    • Rafael Nadal

      dd

    • jini-In Pursuit Of Excellence!

      She?

      • Rafael Nadal

        ??

        • jini-In Pursuit Of Excellence!

          C? 😛

          • Rafael Nadal

            ok :p no 😐

          • jini-In Pursuit Of Excellence!

            Hmm ;p

  • Rafael Nadal

    What is known as masquerading ?

    a) When one participant in communication pretends to be someone else.

    b) When attacker modifies data in communication

    c) When attack is of fraudulent repeat of a valid data

    d) When attack gains access to remote systems.

    • MAGNUS_CARLSEN

      aa

    • R!nku GupTA” fUtUrE B@nker”!!

      ??

    • Rafael Nadal

      aa

  • Rafael Nadal

    Who unleashed famous worm attack in 1988 which effected UNIX systems and caused losses in millions ?

    a) Robert Morris

    b) Bob Milano

    c) Mark zuckerberg

    d) Bill Gates

    • MAGNUS_CARLSEN

      bb

    • jini-In Pursuit Of Excellence!

      Aa bb

    • R!nku GupTA” fUtUrE B@nker”!!

      dnt knw.

    • Rafael Nadal

      aa

  • Rafael Nadal

    What is port scanning ?

    a) It is a software used to scan system for attack

    b) It is a software application designed to probe a server or host for open ports

    c) It is software used to scan system for introducing attacks by brute force

    d) None of the mentioned

    • MAGNUS_CARLSEN

      bb.

    • Rafael Nadal

      bb

  • R!nku GupTA” fUtUrE B@nker”!!

    @rafanadalishere:disqus bhai source??

    • Rafael Nadal

      sanfoundry

    • jini-In Pursuit Of Excellence!

      Ab cheating ni karna :p

      • kohli

        magic jini

        • jini-In Pursuit Of Excellence!

          Hihi.. padhayi karo.. mai jadu krdungi fir

      • R!nku GupTA” fUtUrE B@nker”!!

        noi bhai

  • Rafael Nadal

    Which is not a port scan type ?

    a) TCP scanning

    b) SYN scanning

    c) UDP scanning

    d) SYSTEM Scanning

    • MAGNUS_CARLSEN

      bb

    • jini-In Pursuit Of Excellence!

      Syn

      • MAGNUS_CARLSEN

        u hv sbi so xam ?

        • jini-In Pursuit Of Excellence!

          Noi.. tym passing

          • MAGNUS_CARLSEN

            ok

    • प्यारी रूही

      bb

    • Rafael Nadal

      cc

    • Jellyfish

      Cc

  • Jellyfish

    Next

    • Rafael Nadal

      refresh

  • Rafael Nadal

    What are zombie systems ?

    a) Are specific system which are designed to attack by manufacturer

    b) They are network of known hacking group

    c) These systems are previously compromised, independent systems

    d) None of the mentioned

    • MAGNUS_CARLSEN

      aa?

    • jini-In Pursuit Of Excellence!

      Cc aa

    • Rafael Nadal

      cc

    • Jellyfish

      Aaa

  • Rafael Nadal

    What is known as DOS attack ?

    a) It is attack to block traffic of network

    b) It is attack to harm contents stored in HDD by worm spawn processes

    c) It is an attempt to make a machine or network resource unavailable.

    d) None of the mentioned

    • Jellyfish

      Bbb

    • MAGNUS_CARLSEN

      cc

    • प्यारी रूही

      bbb

    • Rafael Nadal

      cc

  • Rafael Nadal

    With regard to DOS attack what is not true from below options ?

    a) We can stop DOS attack completely

    b) By upgrading OS vulnerability we can stop DOS attack to some extent

    c) DOS attack has to be stopped at network level

    d) Such attack can last for hours

    • MAGNUS_CARLSEN

      aa

    • प्यारी रूही

      aa?

    • Rafael Nadal

      aa

    • Jellyfish

      Bbbb

  • Rafael Nadal

    What is correct regarding ‘relocation’ w.r.t protecting memory ? (Choose 2)

    a) It is a process of taking a program as if it began at address 0

    b) It is a process of taking a program as if it began at address 0A

    c) It changes all address to reflect the actual address at which program is located in memory

    d) Fence cannot be used within relocation process

    • jini-In Pursuit Of Excellence!

      Bbb

      • Rafael Nadal

        2 choose kro

        • jini-In Pursuit Of Excellence!

          Aa :p

    • Rafael Nadal

      ac

  • Rafael Nadal

    What is not true regarding ‘Fence’ ?

    a) It is implemented via hardware register

    b) It doesn’t protect users from each other

    c) It good to protect OS from abusive users

    d) Its implementation is unrestricted and can take any amount of space in Operating system.

    • jini-In Pursuit Of Excellence!

      Dunno

    • Rafael Nadal

      dd

  • Rafael Nadal

    How can fence and relocation be used together ?

    a) To each program address, the contents of fence register are added

    b) To contents of fence register is subtracted from actual address of program

    c) Both a and b

    d) none of the mentioned

    • jini-In Pursuit Of Excellence!

      Both

    • Rafael Nadal

      aa
      This both relocates the address and guarantees that no one can access a location lower than a fence address

  • Rafael Nadal

    What is basic need in protecting memory in multi-user environment ?

    a) We need two registers one ‘start’ and other ‘end’

    b) We need a variable register

    c) A fence register has to be used known as base register.

    d) none of the mentioned

    • Jellyfish

      Ccc

    • jini-In Pursuit Of Excellence!

      Cc buii

      • Rafael Nadal

        bye tc 🙂

    • Rafael Nadal

      cc

  • Rafael Nadal

    What is role of base/bound registers ?

    a) They give starting address to a program

    b) Program’s addresses are neatly confined to space between the base and the bound registers

    c) They provide encrypted environment

    d) This technique doesn’t protects a program’s address from modification by another user

    • Jellyfish

      Ddd

    • Rafael Nadal

      bb

  • Rafael Nadal

    What is all-or-nothing situation for sharing in memory ? (Choose 2)

    a) Program makes all its data available to be accessed

    b) It prohibits access to all

    c) It creates rules who can access program memory

    d) It separates program memory and data memory

    • Jellyfish

      ??

    • Rafael Nadal

      A and B

  • Jellyfish

    @rafeal ji ye que khase milenge?

    • Rafael Nadal

      sanfoundry ..rafael*

      • Jellyfish

        Rafeal mean link hai kya

        • Rafael Nadal

          mene link to di thi sab

          • Jellyfish

            Ha but usme ye questions nahi dikh rahe

        • Rafael Nadal

          sanfoundry.com

  • Rafael Nadal

    How is disadvantage of all-or-nothing approach overcome ?

    a) Base/Bound

    b) Relocation technique

    c) Fence method

    d) Tagged architecture

    • MAGNUS_CARLSEN

      dd

      • Rafael Nadal

        kaha gayab :p

        • MAGNUS_CARLSEN

          network issue 🙁

    • Rafael Nadal

      dd

    • Jellyfish

      Ccc

  • Rafael Nadal

    ) What is best solution to have effect of unbounded number if base/bound registers?

    a) Tagged architecture

    b) Segmentation

    c) Fence method

    d) none of the mentioned

    • Rafael Nadal

      bb

    • MAGNUS_CARLSEN

      bb

  • Rafael Nadal

    What is major feature of segmentation ?

    a) Program is divided in data memory and program memory

    b) Program is executed in segments

    c) Program is divided into pieces having different access rights

    d) It has effect of an unbounded architecture

    • Jellyfish

      Ccc

    • प्यारी रूही

      aa

    • MAGNUS_CARLSEN

      bbb

    • Rafael Nadal

      cc

  • Rafael Nadal

    What is correct way the segmentation program address is stored ?

    a) name, offset

    b) start, stop

    c) access, rights

    d) offset, rights

    • MAGNUS_CARLSEN

      dd

    • Rafael Nadal

      aa

  • Rafael Nadal

    What is main objective of protection ?

    a) Ensure all objects are protected individually

    b) Objects have different priority and thus different levels of protection

    c) Ensure that each object is accessed correctly and only by allowed processes

    d) None of the mentioned

    • MAGNUS_CARLSEN

      cc.

    • प्यारी रूही

      cc

    • Rafael Nadal

      ccc

  • Rafael Nadal

    What is principle of least privilege ?

    a) Less privileges provide difficulty in executing admin tasks.

    b) Users can get temporary high privilege access

    c) Users should be given just enough privileges to perform their tasks.

    d) None of the mentioned

    • MAGNUS_CARLSEN

      cc

    • Jellyfish

      Cccc

    • Rafael Nadal

      cc

  • Rafael Nadal

    Which of the following are forms of malicious attack ?

    a) Theft of information

    b) Modification of data

    c) Wiping of information

    d) All of the mentioned

    • MAGNUS_CARLSEN

      dd

    • Jellyfish

      Dddd

    • प्यारी रूही

      all

    • Rafael Nadal

      dd

  • Rafael Nadal

    What are common security threats ?

    a) File Shredding

    b) File sharing and permission

    c) File corrupting

    d) File integrity

    • प्यारी रूही

      cc

    • MAGNUS_CARLSEN

      aa

    • Rafael Nadal

      bb

    • Jellyfish

      Bbb

  • Rafael Nadal

    From the following, which is not a common file permission ?

    a) Write

    b) Execute

    c) Stop

    d) Read

    • Jellyfish

      Ccc

    • MAGNUS_CARLSEN

      cc

    • प्यारी रूही

      cc.

    • Rafael Nadal

      cc

  • Rafael Nadal

    Which of the following is a good practice ?

    a) Give full permission for remote transferring

    b) Grant read only permission

    c) Grant limited permission to specified account

    d) Give both read and write permission but not execute

    • Jellyfish

      Cc33

    • MAGNUS_CARLSEN

      ccc

    • Rafael Nadal

      cc

  • Rafael Nadal

    What is not a good practice for user administration ?

    a) Isolating a system after a compromise

    b) Perform random auditing procedures

    c) Granting privileges on a per host basis

    d) Using telnet and FTP for remote access.

    • Jellyfish

      Bbbb

    • Rafael Nadal

      dd

    • MAGNUS_CARLSEN

      dd

  • Rafael Nadal

    Which of the following is least secure method of authentication ?

    a) Key card

    b) fingerprint

    c) retina pattern

    d) Password

    • Jellyfish

      Aa?

    • MAGNUS_CARLSEN

      aa

    • Rafael Nadal

      Passwords can be be compromised more easily than to replicate a physical thing like key card, fingerprint or retina.

  • Rafael Nadal

    Which of the following is a strong password ?

    a) 19thAugust88

    b) Delhi88

    c) P@assw0rd

    d) !augustdelhi

    • MAGNUS_CARLSEN

      cc

    • Rafael Nadal

      cc
      It has a combination of Alphabet both capital and small along with number and special character. Thus always use complex password with combination of all these

    • Jellyfish

      Did alpha numeric password is strong password

  • Rafael Nadal

    Why is one time password safe ?

    a) It is easy to generated

    b) It cannot be shared

    c) It is different for every access

    d) It is a complex enctypted password

    • MAGNUS_CARLSEN

      cc,

    • प्यारी रूही

      cccccccc

    • Rafael Nadal

      cc

    • Jellyfish

      Cccc3

  • Rafael Nadal

    What does Light Directory Access Protocol (LDAP) doesn’t store ?

    a) Users

    b) Address

    c) Passwords

    d) Security Keys

    • MAGNUS_CARLSEN

      dd??

    • Rafael Nadal

      bb

  • Rafael Nadal

    Which happens first authorization or authentication ?

    a) Authorization

    b) Authentication

    c) Both are same

    d) None of the mentioned

    • MAGNUS_CARLSEN

      bb

    • Jellyfish

      Bbb

    • Rafael Nadal

      aa

    • Muskaan:)

      cc?

  • Rafael Nadal

    What is characteristic of RADIUS system ?

    a) It is essential for centralized encryption and authentication

    b) It works on Network layer to deny access to unauthorized people

    c) It provides centralized authentication mechanism via network devices

    d) It’s a strong File access system.

    • MAGNUS_CARLSEN

      bb?

    • Rafael Nadal

      cc

  • Rafael Nadal

    What forces the user to change password at first logon ?

    a) Default behavior of OS

    b) Part of AES encryption practice

    c) Devices being accessed forces the user

    d) Account administrator

    • MAGNUS_CARLSEN

      dd

    • Rafael Nadal

      dd
      Its administrator’s job to ensure that password of the user remains private and is known only to user. But while making a new user account he assigns a random general password to give it to user. Thus even administrator cannot access a particular users account.

  • Rafael Nadal

    What is not a best practice for password policy ?

    a) Deciding maximum age of password

    b) Restriction on password reuse and history

    c) Password encryption

    d) Having change password every 2 years.

    • MAGNUS_CARLSEN

      aa

    • Rafael Nadal

      dd

  • Rafael Nadal

    Because of virtual memory, the memory can be shared among

    a) processes

    b) threads

    c) instructions

    d) none of the mentioned

    • MAGNUS_CARLSEN

      aa.

    • Rafael Nadal

      aa

  • Rafael Nadal

    _____ is the concept in which a process is copied into main memory from the secondary memory according to the requirement.

    a) Paging

    b) Demand paging

    c) Segmentation

    d) Swapping

    • MAGNUS_CARLSEN

      bb

    • Rafael Nadal

      bb

  • Rafael Nadal

    If one or more devices use a common set of wires to communicate with the computer system, the connection is called ______.

    a) CPU

    b) Monitor

    c) wirefull

    d) bus

    • MAGNUS_CARLSEN

      dd

    • Rafael Nadal

      dd

    • Jellyfish

      Bus

  • Rafael Nadal

    A ____ a set of wires and a rigidly defined protocol that specifies a set of messages that can be sent on the wires.

    a) port

    b) node

    c) bus

    d) None of these

    • MAGNUS_CARLSEN

      cc

    • Jellyfish

      Node

    • Rafael Nadal

      cc

  • Rafael Nadal

    When device A has a cable that plugs into device B, and device B has a cable that plugs into device C and device C plugs into a port on the computer, this arrangement is called a _________.

    a) port

    b) daisy chain

    c) bus

    d) cable

    • MAGNUS_CARLSEN

      bb

    • Rafael Nadal

      bb

  • Rafael Nadal

    The _________ present a uniform device-access interface to the I/O subsystem, much as system calls provide a standard interface between the application and the operating system.

    a) devices

    b) buses

    c) device drivers

    d) I/O systems

    • MAGNUS_CARLSEN

      cc

    • Rafael Nadal

      cc

    • प्यारी रूही

      cc

  • Rafael Nadal

    A ________ is a collection of electronics that can operate a port, a bus, or a device.

    a) controller

    b) driver

    c) host

    d) bus

    • MAGNUS_CARLSEN

      aa

    • Rafael Nadal

      aa

  • Rafael Nadal

    An I/O port typically consists of four registers status, control, ________ and ________ registers.

    a) system in, system out

    b) data in, data out

    c) flow in, flow out

    d) input, output

    • MAGNUS_CARLSEN

      dd

    • Rafael Nadal

      bb

    • प्यारी रूही

      dd

  • Rafael Nadal

    The ______ register is read by the host to get input.

    a) flow in

    b) flow out

    c) data in

    d) data out

    • Jellyfish

      Ccc

    • प्यारी रूही

      ccccc

    • MAGNUS_CARLSEN

      cc

    • Rafael Nadal

      cc

  • Rafael Nadal

    The ______ register is written by the host to send output.

    a) status

    b) control

    c) data in

    d) data out

    • MAGNUS_CARLSEN

      dd

    • Rafael Nadal

      dd

    • प्यारी रूही

      dddddddd

  • Rafael Nadal

    The hardware mechanism that allows a device to notify the CPU is called _______.

    a) polling

    b) interrupt

    c) driver

    d) controlling

    • प्यारी रूही

      bbbb

    • MAGNUS_CARLSEN

      bb

    • Rafael Nadal

      bb

  • Rafael Nadal

    The CPU hardware has a wire called __________ that the CPU senses after executing every instruction.

    a) interrupt request line

    b) interrupt bus

    c) interrupt receive line

    d) interrupt sense line

    • प्यारी रूही

      aaaaaaaa

    • MAGNUS_CARLSEN

      dd

    • Rafael Nadal

      aa

  • Rafael Nadal

    The _________ determines the cause of the interrupt, performs the necessary processing and executes a return from the interrupt instruction to return the CPU to the execution state prior to the interrupt.

    a) interrupt request line

    b) device driver

    c) interrupt handler

    d) All of these

    • MAGNUS_CARLSEN

      cc

    • Rafael Nadal

      ccc

    • प्यारी रूही

      ccccccccc

  • Rafael Nadal

    The _________ are reserved for events such as unrecoverable memory errors.

    a) nonmaskable interrupts

    b) blocked interrupts

    c) maskable interrupts

    d) None of these

    • MAGNUS_CARLSEN

      aa

    • प्यारी रूही

      aaaaaaaa

    • Jellyfish

      Ccv

    • Rafael Nadal

      aa

  • Rafael Nadal

    What is the advantage of caching in remote file access ?

    a) Reduced network traffic by retaining recently accessed disk blocks

    b) Faster network access.

    c) Copies of data creates backup automatically

    d) None of these

    • MAGNUS_CARLSEN

      aa

    • Rafael Nadal

      aa

  • Rafael Nadal

    What is networked virtual memory ?

    a) Caching

    b) Segmentation

    c) RAM disk

    d) None of these

    • MAGNUS_CARLSEN

      aa

    • प्यारी रूही

      aa

    • Jellyfish

      Aaa

    • Rafael Nadal

      aa

  • Rafael Nadal

    The directory can be viewed as a _________, that translates file names into their directory entries.

    a) symbol table

    b) partition

    c) swap space

    d) cache

    • MAGNUS_CARLSEN

      aa,

    • प्यारी रूही

      aaa

    • Rafael Nadal

      aa

    • Jellyfish

      Aaa1

  • Rafael Nadal

    In the single level directory :

    a) All files are contained in different directories all at the same level

    b) All files are contained in the same directory

    c) Depends on the operating system

    d) None of these

    • प्यारी रूही

      bbb

    • MAGNUS_CARLSEN

      aaa

    • Jellyfish

      Bb2

    • Rafael Nadal

      bbb

  • Rafael Nadal

    In the single level directory :

    a) all directories must have unique names

    b) all files must have unique names

    c) all files must have unique owners

    d) All of these

    • MAGNUS_CARLSEN

      dd

    • प्यारी रूही

      bbbbbbbbbbbbb

    • Jellyfish

      Aaa

    • Rafael Nadal

      bb

  • Rafael Nadal

    In the two level directory structure :

    a) each user has his/her own user file directory

    b) the system has its own master file directory

    c) both a and b

    d) None of these

    • MAGNUS_CARLSEN

      ccc

    • Jellyfish

      Bb

    • Rafael Nadal

      ccc

  • Rafael Nadal

    In the tree structured directories,

    a) the tree has the stem directory

    b) the tree has the leaf directory

    c) the tree has the root directory

    d) All of these

    • MAGNUS_CARLSEN

      cc

    • Rafael Nadal

      cc

    • प्यारी रूही

      cccccc

  • Rafael Nadal

    The current directory contains, most of the files that are :

    a) of current interest to the user

    b) stored currently in the system

    c) not used in the system

    d) not of current interest to the system

    • Jellyfish

      Aa

    • प्यारी रूही

      bb

    • MAGNUS_CARLSEN

      aa

    • Rafael Nadal

      aa

  • Rafael Nadal

    Path names can be of two types : (choose two)

    a) absolute

    b) local

    c) global

    d) relative

    • प्यारी रूही

      b c

    • MAGNUS_CARLSEN

      aa dd

    • Rafael Nadal

      ad

  • Rafael Nadal

    In internal fragmentation, memory is internal to a partition and :

    a) is being used

    b) is not being used

    c) is always used

    d) None of these

    • MAGNUS_CARLSEN

      bb

    • Jellyfish

      Bbbb

    • Rafael Nadal

      bb

  • Rafael Nadal

    A solution to the problem of external fragmentation is :

    a) compaction

    b) larger memory space

    c) smaller memory space

    d) None of these

    • MAGNUS_CARLSEN

      aa

    • Rafael Nadal

      aaa

  • Rafael Nadal

    If relocation is static and is done at assembly or load time, compaction _________.

    a) cannot be done

    b) must be done

    c) must not be done

    d) can be done

    • Jellyfish

      Must be done

    • MAGNUS_CARLSEN

      cc?

  • “aruna”

    Sry fr disturbance
    SO ki quiz ho rhi h?

    • Jellyfish

      Hmm

      • “aruna”

        Ok

    • MAGNUS_CARLSEN

      computer 😛

      • “aruna”

        ;p

        • MAGNUS_CARLSEN

          kal ke xam mein maths n enlish ka level kaise tha

          • “aruna”

            Maths bakwas
            Eng manageable tha

          • MAGNUS_CARLSEN

            english old pattern or new one ?

  • Rafael Nadal

    Pc turnoff ho gya..wait 5 min

    • MAGNUS_CARLSEN

      ok 😛

    • Sunshine ✨

      Need help in cmptr

      • Rafael Nadal

        Kya?

        • Sunshine ✨

          Aaj kal jaise ques aate kaha se prepare karun… I mean kli book hai kya ques sab yaad karu ya phir

  • Aquarius Richa :)

    gud evngggggggggg :)))

    • Sunshine ✨

      🙂

      • Aquarius Richa :)

        hows u dear ?

        • Sunshine ✨

          Tension ssc ka syllabus itna sara kuch samajh nai aa raha 🙁

          • MAGNUS_CARLSEN

            SSC CGL Rexam ?

          • Sunshine ✨

            Nai chsl

          • MAGNUS_CARLSEN

            ok
            ATB

          • Sunshine ✨

            Thnk 🙂

          • Aquarius Richa :)

            tnsn mat lo,,ho jaega sb,,srf gk pe dyan do bs 🙂

          • Sunshine ✨

            Ok :)maine mensuration padhna strt kita tha

          • Aquarius Richa :)

            hmm ho jaega easy hi aa rha,,, sbhi value dkh lena,,,cosec vgera ki

          • Sunshine ✨

            Hmm abhi se rata marti hu 🙂 thnk u so much dearu 🙂

          • Aquarius Richa :)

            any tym dearuu 🙂
            ssc adda se daily dkhoo quiz

          • Sunshine ✨

            Ok…. 🙂

    • MAGNUS_CARLSEN

      gud evngggggggggg :)))

      • Aquarius Richa :)

        🙂

    • Jellyfish

      Gg kitne hai :p

      • Aquarius Richa :)

        count ni kiye 😛

  • Aquarius Richa :)

    kya ho rha h 😀

    • MAGNUS_CARLSEN

      dangal start hone wala hai 😀

      • Aquarius Richa :)

        hihi 😛
        u new here?

        • MAGNUS_CARLSEN

          No
          I m 3 days old over here 😛
          i used to come @5PM to attend IT quiz that’s it

          • Aquarius Richa :)

            ohkkk i m on leave these days tht why dont knw u 😛

          • MAGNUS_CARLSEN

            ohh
            busy with prep ?

          • Aquarius Richa :)

            nopes aftr ippb spend some quality tym with family 😛

          • MAGNUS_CARLSEN

            ohh
            Great
            enjoyyy 🙂

          • Aquarius Richa :)

            yup

  • Rafael Nadal

    __________ is generally faster than _________ and _________.

    a) first fit, best fit, worst fit

    b) best fit, first fit, worst fit

    c) worst fit, best fit, first fit

    d) None of these

    • Aquarius Richa :)

      hiiiiii 🙂

      • Rafael Nadal

        hi 🙂

        • Aquarius Richa :)

          hows u ??

          • Rafael Nadal

            fine 🙂 u

          • Aquarius Richa :)

            mje me 🙂

    • Rafael Nadal

      aa

      • Aquarius Richa :)

        hmm

    • Aquarius Richa :)

      aaa

    • MAGNUS_CARLSEN

      aa

  • Rafael Nadal

    External fragmentation exists when :

    a) enough total memory exists to satisfy a request but it is not contiguous

    b) the total memory is insufficient to satisfy a request

    c) a request cannot be satisfied even when the total memory is free

    d) None of these

    • Rafael Nadal

      aaa

    • MAGNUS_CARLSEN

      aaaa

  • Kevin

    Thank You Rafa :))

  • Rafael Nadal

    External fragmentation will not occur when :

    a) first fit is used

    b) best fit is used

    c) worst fit is used

    d) no matter which algorithm is used, it will always occur

    • MAGNUS_CARLSEN

      bb

    • Sunshine ✨

      Cc

    • Rafael Nadal

      dd

  • Rafael Nadal

    Sometimes the overhead of keeping track of a hole might be :

    a) larger than the memory

    b) larger than the hole itself

    c) very small

    d) All of these

    • Sunshine ✨

      Dd

    • MAGNUS_CARLSEN

      bbb

    • Rafael Nadal

      bb

  • Rafael Nadal

    When the memory allocated to a process is slightly larger than the process, then :

    a) internal fragmentation occurs

    b) external fragmentation occurs

    c) both a and b

    d) neither a nor b

    • Rafael Nadal

      aa

  • Muskaan:)

    time ho gya 😛

    • Aquarius Richa :)

      muskuuuu :*

      • Muskaan:)

        richu:*

        • Aquarius Richa :)

          kaisi h,,, tu bhi IT ki h?

          • Muskaan:)

            mai theek tu bta…noi yar ;p

          • Aquarius Richa :)

            mast ek dam,,,

          • Muskaan:)

            🙂

          • Aquarius Richa :)

            nxt exam kon sa h

  • Aquarius Richa :)

    achaaa ye IT quiz h kbhi socho meko kuch aa kyu ni rha 😛

    • MAGNUS_CARLSEN

      hahaha

      • Aquarius Richa :)

        hihi

  • NAAM MEIN KYA RAKHA HAI!!!

    Good eveng sabko..:)

    • Muskaan:)

      ge 🙂

      • BAKLOL

        Jai laxman ji ki

        • Muskaan:)

          jai hanuman ji ki

          • BAKLOL

            Jai jatayu ji ki

          • Muskaan:)

            haha

    • Aquarius Richa :)

      gud evng apko 🙂

      • BAKLOL

        Hello kumbh

        • Aquarius Richa :)

          hii mr kumbh

          • BAKLOL

            Kaisi ho??

          • Aquarius Richa :)

            mje me,,, ap btaoooo

          • BAKLOL

            Main mast as always

          • Aquarius Richa :)

            yoii mast hi rehna chahiye 🙂

    • Gud evng bhaiya

  • Rafael Nadal

    What is the characteristics of atomicity ?

    a) All operations associated are executed to completion or none are performed

    b) One processor as coordinator which handles all requests

    c) When responses are received from all processes, then process can enter its Critical Section

    d) Use communication links

    • MAGNUS_CARLSEN

      aa

    • Rafael Nadal

      aa

  • Muskaan:)

    ruhu

  • Rafael Nadal

    RAID level 3 supports a lower number of I/Os per second, because _______________.

    a) every disk has to participate in every I/O request

    b) only one disk participates per I/O request

    c) I/O cycle consumes a lot of CPU time

    d) All of these

    • MAGNUS_CARLSEN

      dd

    • Sunshine ✨

      Bb

    • Rafael Nadal

      aa

  • Rafael Nadal

    RAID level _____ is also known as block interleaved parity organisation and uses block level striping and keeps a parity block on a seperate disk.

    a) 1

    b) 2

    c) 3

    d) 4

    • Sunshine ✨

      Aa

    • MAGNUS_CARLSEN

      aa

    • Rafael Nadal

      dd

  • Rafael Nadal

    A performance problem with _________ is the expense of computing and writing parity.

    a) non-parity based RAID levels

    b) parity based RAID levels

    c) all RAID levels

    d) None of these

    • MAGNUS_CARLSEN

      ??

    • Rafael Nadal

      bb

    • Sunshine ✨

      Bbbbbbb

  • Rafael Nadal

    In RAID level 4, one block read, accesses __________.

    a) only one disk

    b) all disks simultaneously

    c) all disks sequentially

    d) None of these

    • MAGNUS_CARLSEN

      bb

    • Sunshine ✨

      Bb

    • Rafael Nadal

      bb

  • BAKLOL

    Hello to all the engineers

  • Muskaan:)

    lagta h relay hogi it k turant baad ga ki :p

  • Rafael Nadal

    The potential overuse of a single parity disk is avoided in RAID level ____.

    a) 3

    b) 4

    c) 5

    d) All of these

    • Sunshine ✨

      Aa

    • Rafael Nadal

      ccc

  • Rafael Nadal

    RAID level 0+1 is used because, RAID level 0 provides ______ whereas RAID level 1 provides ________.

    a) performance, redundancy

    b) performance, reliability

    c) redundancy, performance

    d) None of these

    • MAGNUS_CARLSEN

      bb

    • Rafael Nadal

      bb

    • Sunshine ✨

      Aaaaaa

  • Rafael Nadal

    If a disk fails in RAID level ___ rebuilding lost data is easiest.

    a) 1

    b) 2

    c) 3

    d) 4

    • MAGNUS_CARLSEN

      cc

    • Rafael Nadal

      aa

  • Vidhi Agarwal :)

    Hahaha

  • BAKLOL

    Koi bui post ho 😛 ye common hao har post mein rehtA hai

    • Muskaan:)

      ho gya? 😛

  • Muskaan:)

    haan jisse sabko mazak hi lage 😛

  • Rafael Nadal

    Where performance and reliability are both important, RAID level ____ is used.

    a) 0

    b) 1

    c) 2

    d) 0+1

    • MAGNUS_CARLSEN

      dd

    • Rafael Nadal

      dd

  • Vidhi Agarwal :)

    Ye
    😛 😀 Maine yaha aake dekha h
    Ab to darr lagta h formal letter me bhi na likh du

    • Kevin

      :E:F

      • Vidhi Agarwal :)

        XY

        • Kevin

          :H:A:H:A

    • BAKLOL

      Naam kya hai prakash :p

      • Vidhi Agarwal :)

        ;D

    • MAGNUS_CARLSEN

      hahaha

    • Aquarius Richa :)

      hihi 😛

  • Rafael Nadal

    Earliest deadline first algorithm assigns priorities according to :

    a) periods

    b) deadlines

    c) burst times

    d) None of these

    • MAGNUS_CARLSEN

      ccc

    • Rafael Nadal

      bb

  • Muskaan:)

    bas bas mai bht kam deti hoon gaali

    • Kevin

      Ise dede ek achhi wali..Aadat hai isse sunne ki 😀

      • Muskaan:)

        hahaha

  • Rafael Nadal

    over..bye

    • Sunshine ✨

      Wait

    • MAGNUS_CARLSEN

      Thankyou
      kal ka topic ?

      • Rafael Nadal

        SE

        • MAGNUS_CARLSEN

          ok

    • Sunshine ✨

      Mere ques ka ans plz

      • Rafael Nadal

        hmm wait

        • Sunshine ✨

          Ok…

    • Muskaan:)

      thanq bye

    • Aquarius Richa :)

      thnkuuuu 🙂

    • appyy

      ty bhai 🙂
      good evening :))

      • Rafael Nadal

        ge 🙂

    • ty bhaiya

    • प्यारी रूही

      tysm rafa :))

  • BAKLOL

    Interviewer-naam kya hai??
    Me-Prakash colon P

    Muskaan effect

    • Aquarius Richa :)

      hihi 😛

    • Muskaan:)

      hadd h mtlb 😀

    • Kevin

      :H:A:H:A:H:A:H:A

      • Muskaan:)

        haha

  • Vidhi Agarwal :)

    Muskaan interview me bhi
    My Name is muskann fir bolegi 😀

    Muskaan don’t get angry :P:A

    • Muskaan:)

      hahaha

      • Vidhi Agarwal :)

        😛 lagao

        • Muskaan:)

          😛

  • Aquarius Richa :)
    • Muskaan:)

      kyon aau

    • Aquarius Richa :)

      yoi:)))))))))))))))))))))))))

  • Muskaan:)

    padhne wale log gye

  • Muskaan:)

    hum toh yanhi rahenge haanji

    • Aquarius Richa :)

      ajaoooo:P

      • Muskaan:)

        noi ;p

        • Aquarius Richa :)

          hihi 😛

          • Muskaan:)

            tu q noi gyi ? :p

          • Aquarius Richa :)

            page load ni ho rha ache se 😛

          • Muskaan:)

            😀

          • Aquarius Richa :)

            aja ab 😛

          • Muskaan:)

            noi mai ja rhi ab bye 😛

          • Aquarius Richa :)

            masoom bula rha h u ko:P

  • Muskaan:)

    yanhi se jayenge apne ghar koon