Computer/Operating System MCQ Set 10 Sample Test,Sample questions

Question:
 A scheduling algorithm can use either ___________ priority or ________ priority.

1.static, still

2.static, dynamic

3. live, dead

4. none of the mentioned


Question:
 Delay and Jitter ________

1.mean the same thing

2.are two completely different things

3.all of the mentioned

4.none of the mentioned


Question:
 From the following, which is not a common file permission?

1.Write

2.Execute

3. Stop

4.Read access geo redundant storage


Question:
 In the TEARDOWN state ______

1. the server breaks down the connection and releases the resources allocated for the session

2.the client breaks down the connection and releases the resources allocated for the session

3. the system crashes

4. none of the mentioned


Question:
 Lossy and lossless are classifications of _______

1.multimedia storage systems

2. files

3.compression algorithms

4.All of the Mentioned


Question:
 Lossy techniques provide ___________ when compared to lossless techniques.

1. lower compression ratios

2.much higher compression ratios

3. similar compression ratios

4.None of the mentioned


Question:
 RTP stands for ______

1.real time protocol

2.real time transmission control protocol

3.real time transmission protocol

4.real time transport protocol


Question:
 The hybrid algorithm that combines EDF with SCAN algorithm is known as _______

1.EDS

2.SDF

3.SCAN-EDF

4.None of the mentioned


Question:
 Which of the following is a strong password?

1.19thAugust88

2. Delhi88

3. P@assw0rd

4. !augustdelhi


Question:
An admission control scheme assigns a __________ to each type of resource.

1.processor

2.memory location

3.resource manager

4.All of the Mentioned


Question:
As disks have relatively low transfer rates and relatively high latency rates, disk schedulers must reduce latency times to ______

1.ensure high bandwidth

2.ensure low bandwidth

3.make sure data is transferred

4.reduce data transfer speeds


Question:
Broadcasting delivers the content to _____

1.a single client

2.all clients, regardless whether they want the content or not

3.a group of receivers who indicate they wish to receive the content

4.None of the mentioned


Question:
Compression ratio is the ratio of ______

1.the original file size to the size of the compressed file

2. the number of pixels in a frame of the original size to those in a frame of the compressed file

3.compressed file size to the original file size

4.None of the mentioned


Question:
HTTP is ______

1. a stateful protocol

2.a stateless protocol

3. a protocol that maintains the status of its connection with the client

4.a stateless protocol that does not maintain the status of its connection with the client


Question:
If several requests have different deadlines that are relatively close together, then using the SCAN – EDF algorithm ______

1.the SCAN ordering will service the requests in that batch

2. the EDF ordering will service the requests in that batch

3.the FCFS ordering will service the requests in that batch

4.None of the mentioned


Question:
In SCAN – EDF, requests with the same deadlines are ordered according to _______

1.SCAN policy

2. EDF policy

3.FCFS policy

4.FIFO policy


Question:
In the SETUP state ______

1.the server is setup

2. the client is setup

3.the server allocates resources for the client session

4. the client sends requests to the server


Question:
Multicasting delivers the content to _______

1. a single client

2. all clients, regardless whether they want the content or not

3.a group of receivers who indicate they wish to receive the content

4.None of the mentioned


Question:
Multimedia systems require _________ scheduling to ensure critical tasks will be serviced within timing deadlines.

1. soft real time

2. hard real time

3. normal

4.None of the mentioned


Question:
RTSP includes which of the following states?

1.SETUP

2.PLAY

3.PAUSE

4.All of the Mentioned


Question:
RTSP stands for ______

1.Real Time Streaming Policy

2.Real Time Streaming Protocol

3.Real Time Systems Protocol

4.Read Time Streaming Policy


Question:
Servicing requests strictly according to deadline using EDF may result in ____

1. lower seek times

2. lower bandwidth

3.higher seek time

4.higher bandwidth


Question:
The difficulty with multicasting from a practical point of view is ________

1.memory allocation is difficult

2.server must establish a separate unicast session for each client

3.the routers must support multicasting

4.None of the mentioned


Question:
The EDF scheduler uses ________ to order requests according to their deadlines.

1. stack

2. disks

3.queue

4.None of the mentioned


Question:
The level that treats different types of traffics in different ways, giving certain traffic streams higher priority than other streams and with best efforts, but no guarantees are made ______

1. Best effort service

2. Soft QoS

3.Worst effort service

4.Hard QoS


Question:
The problem with unicast delivery is that the ____

1.memory allocation is difficult

2.server must establish a separate unicast session for each client

3. the routers must support unicasting

4.the clients must be close to the server


Question:
The quality of service requirements are guaranteed in _______

1.Best effort service

2.Soft QoS

3.Worst effort service

4.Hard QoS


Question:
The three general methods for delivering content from a server to a client across a network are _______

1.unicasting

2.unicasting

3. broadcasting

4.All of the Mentioned


Question:
To let a client have random access to a media stream with ____

1.the protocol used must not be stateless

2.the server must support download

3.the stream should give access rights to the client

4.All of the Mentioned


Question:
Unicasting delivers the content to _____

1.a single client

2. all clients, regardless whether they want the content or not

3. a group of receivers who indicate they wish to receive the content

4.None of the mentioned


Question:
What are the characteristics of Authorization?

1.RADIUS and RSA

2.3 way handshaking with syn and fin

3.Multilayered protection for securing resources

4.Deals with privileges and rights


Question:
What are the common security threats?

1.File Shredding

2.File sharing and permission

3.File corrupting

4.File integrity


Question:
What are the factors that define QoS?

1.Throughput

2.Jitter

3.Delay

4.All of the Mentioned


Question:
What are the levels in QoS?

1.Best effort service

2.Soft QoS

3.Hard QoS

4.All of the Mentioned


Question:
What does Light Directory Access Protocol (LDAP) doesn’t store?

1.Users

2.Address

3.Passwords

4.Security Keys


Question:
What forces the user to change password at first login?

1.Default behavior of OS

2.Part of AES encryption practice

3. Devices being accessed forces the user

4. Account administrator


Question:
What is Admission control?

1.the delay that occurs during playback of the stream

2.the practice of admitting a request for service only if the server has sufficient resources to satisfy the request

3. how the errors are handled during the transmission and processing of continuous media

4.None of the mentioned


Question:
What is breach of confidentiality?

1.This type of violation involves unauthorized reading of data

2.This violation involves unauthorized modification of data

3.This violation involves unauthorized destruction of data

4.This violation involves unauthorized use of resources


Question:
What is characteristic of RADIUS system?

1.It is essential for centralized encryption and authentication

2. It works on Network layer to deny access to unauthorized people

3.It provides centralized authentication mechanism via network devices

4.It’s a strong File access system


Question:
What is MPEG compression?

1.stores the compression values of each frame

2.stores the differences between successive frames

3.stores multiple frames’ values together

4.None of the mentioned


Question:
What is not a best practice for password policy?

1.Deciding maximum age of password

2.Restriction on password reuse and history

3.Password encryption

4.Having change password every 2 years


Question:
What is not a good practice for user administration?

1. Isolating a system after a compromise

2.Perform random auditing procedures

3.Granting privileges on a per host basis

4.Using telnet and FTP for remote access


Question:
What is the breach of integrity?

1. This type of violation involves unauthorized reading of data

2.This violation involves unauthorized modification of data

3.This violation involves unauthorized destruction of data

4.This violation involves unauthorized use of resources


Question:
What is the Delay?

1. the time from when a request is first submitted to when the desired result is produced

2.the delay that occurs during playback of the stream

3.how the errors are handled during the transmission and processing of continuous media

4.None of the mentioned


Question:
What is the full form of MPEG?

1.Motion Pictures Engineering Group

2.Motion Picture Engineers Group

3.Motion Picture Experts Group

4.None of the mentioned


Question:
Which happens first authorization or authentication?

1. Authorization

2. Authentication

3.Authorization & Authentication are same

4.None of the mentioned


Question:
Which of the following are forms of malicious attack?

1.Theft of information

2.Modification of data

3.Wiping of information

4. All of the mentioned


Question:
Which of the following is a good practice?

1.Give full permission for remote transferring

2.Grant read only permission

3.Grant limited permission to specified account

4.Give both read and write permission but not execute


Question:
Which of the following is the least secure method of authentication?

1. Key card

2. fingerprint

3. retina pattern

4.Password


Question:
Why is one time password safe?

1. It is easy to generated

2.It cannot be shared

3. It is different for every access

4.It is a complex encrypted password


More MCQS

  1. Computer fundamentals
  2. Computer Basic MCQS
  3. CCC MCQ Sample Paper 1
  4. CCC Exams MCQS Sample Paper Test 2
  5. Computer Basics MCQS Paper 1
  6. Computer Basics MCQS Paper 2
  7. FUNDAMENTALS OF COMPUTERS MCQs PART 2
  8. FUNDAMENTALS OF COMPUTERS MCQs PART 1
  9. FUNDAMENTALS OF COMPUTERS MCQs PART 3
  10. Computer mcqs smaple paper 1
  11. Computer mcqs smaple paper 2
  12. Computer mcqs smaple paper 3
  13. Fundamentals of Computers
  14. Fundamentals of Computers (New) Part 1
  15. Fundamentals of Computers (New) Part 2
  16. Computer Networks MCQ Questions
  17. Computer Networks Transition from IPV4 to IPV6
  18. Computer Fundamentals (New) Part 1
  19. Computer Fundamentals (New) Part 2
  20. Computer Fundamentals (New) Part 3
  21. Computer Fundamentals (New) Part 4
  22. Computer Fundamentals (New) Part 5
  23. Computer Fundamentals (New) Part 6
  24. Computer Fundamentals (New) Part 7
  25. Computer Fundamentals (New) Part 8
  26. Operating Systems MCQs Part 1
  27. Operating Systems MCQs Part 2
  28. OS(Computer Operating Systems) Part 1
  29. OS(Computer Operating Systems) Part 2
  30. OS(Computer Operating Systems) Part 3
  31. OS(Computer Operating Systems) Part 4
  32. OS - Computer Operating Systems Part 5
  33. OS - Computer Operating Systems Part 6
  34. OS - Computer Operating Systems Part 7
  35. MS Word MCQ Questions Part 1
  36. MS Word MCQ Questions Part 2
  37. MS Word MCQ Questions Part 3
  38. MS Word MCQ Questions Part 4
  39. MS Word MCQ Questions Part 5
  40. MS Word MCQ Questions Part 7
  41. MS Word MCQ Questions Part 6
  42. Microsoft Excel MCQ Questions Part 1
  43. Microsoft Excel MCQ Questions Part 2
  44. Microsoft Excel MCQ Questions Part 3
  45. Microsoft Excel MCQ Questions Part 4
  46. Microsoft Excel MCQ Questions Part 5
  47. Microsoft Excel MCQ Questions Part 6
  48. Microsoft Excel MCQ Questions Part 7
  49. MS PowerPoint MCQ Questions PART 1
  50. MS PowerPoint MCQ Questions PART 2
  51. MS PowerPoint MCQ Questions PART 3
  52. MS PowerPoint MCQ Questions PART 4
  53. MS PowerPoint MCQ Questions PART 5
  54. MS PowerPoint MCQ Questions PART 6
  55. MS PowerPoint MCQ Questions PART 7
  56. MS Access MCQ Questions Part 1
  57. MS Access MCQ Questions Part 2
  58. MS Access MCQ Questions Part 3
  59. MS Access MCQ Questions Part 4
  60. MS Access MCQ Questions Part 5
  61. MS Access MCQ Questions Part 6
  62. MS Access MCQ Questions Part 7
  63. MS Access MCQ Questions Part 8
  64. Query of MS Access MCQS Part 1
  65. Query of MS Access MCQS Part 2
  66. Computer Communication and Networking Quiz
  67. Computer Graphics MCQ Quiz Questions and Answers
  68. Computer Basics Quiz Questions
  69. Computer Quiz Questions with Answers
  70. Computer Hardware MCQS Quiz
  71. MCQ Computer Organization & Architecture
  72. MCQ Computer Organisation - Input & output Organisation SET1
  73. MCQ Computer Organisation - Input & output Organisation SET2
  74. MCQ Computer Organisation - Input & output Organisation SET3
  75. MCQS on addressing modes SET 1
  76. MCQS on addressing modes SET 2
  77. Software Engineering MCQs SET 1
  78. Software Engineering MCQs SET 2
  79. Software Engineering MCQs Set 3
  80. Software Engineering MCQs Set 4
  81. Software Engineering MCQs Set 5
  82. Software Engineering MCQs Set 6
  83. Software Engineering MCQs Set 7
  84. mcqs data structures
  85. CCC Exam Sample MCQ Paper
  86. Computer MCQ Questions set-1
  87. Computer MCQ Questions set-2
  88. Computer MCQ Questions set-3
  89. Current affairs mcq Database management
  90. Programming arcitecture
  91. Computer Graphics MCQ Questions part 1
  92. Computer Graphics MCQ Questions part 2
  93. Computer Awareness MCQs and Quiz for Banking, IBPS, RRB, RBI, SBI Exams pART 1
  94. Computer Awareness MCQs and Quiz for Banking, IBPS, RRB, RBI, SBI Exams pART 2
  95. Computer Science MCQs
  96. Computer Mcq Question
  97. MCQs based on Fundamentals of Computer 1 set
  98. Computer Mcq Question set 2
  99. MCQ Encoding Schemes
  100. Data Entry and Keyboarding Skills MCQ
  101. Computer Science Number System
  102. Computer Network MCQ
  103. MCQ Questions on Tally
  104. MCQ Questions on Tally Set 2
  105. MCQ Questions on Tally Set 3
  106. MCQ Questions on Tally Set 4
  107. Internet Technology MCQ Questions for Competitive Exams
  108. Computer Software MCQ GK Questions
  109. Computer Organization and Architecture MCQs
  110. Basic Computer GK Questions
  111. Computer Graphics MCQ Set 1
  112. Operating System MCQ Set 1
  113. Operating System MCQ Set 2
  114. Operating System MCQ Set 3
  115. Operating System MCQ Set 4
  116. Operating System MCQ Set 5
  117. Operating System MCQ Set 6
  118. Operating System MCQ Set 7
  119. Operating System MCQ Set 8
  120. Operating System MCQ Set 9
  121. Operating System MCQ Set 10
  122. Operating System MCQ Set 11
  123. Operating System MCQ Set 12
  124. Operating System MCQ Set 13
  125. Operating System MCQ Set 14
  126. Operating System MCQ Set 15
  127. Operating System MCQ Set 16
  128. Operating System MCQ Set 17
  129. Operating System MCQ Set 18
  130. Operating System MCQ Set 19
  131. Operating System MCQ Set 20
  132. Operating System MCQ Set 21
  133. Computer Graphics MCQ Question Set 1
  134. Computer Networks MCQs
  135. Computer Networks MCQs Set-2
  136. Computer Networks MCQs Set-3
  137. Computer Networks MCQs Set-4
  138. Bachelor of Computer Applications MCQs set-1
  139. Bachelor of Computer Applications MCQs set-2
  140. NET Programming MCQ
  141. Artificial Intelligence and Robotics (AIR) Set 1
  142. Artificial Intelligence and Robotics (AIR) Set 2
Search
R4R Team
R4Rin Top Tutorials are Core Java,Hibernate ,Spring,Sturts.The content on R4R.in website is done by expert team not only with the help of books but along with the strong professional knowledge in all context like coding,designing, marketing,etc!