SSC Scientific Assistant (IMD) Exam : Held on 24-Nov-2017 Shift-2 (Computer Science)

SSC Scientific Assistant (IMD) Exam : Held on 24 Nov 2017 Shift-2

(Computer Science)

QID : 901 - The basic operations performed by a computer are___.

Options:
1) Arithmetic operation
2) Logical operation
3) Storage and relative
4) All options are correct
Correct Answer: All options are correct

QID : 902 - Which type of computers uses the 8-bit code called EBCDIC?

Options:
1) Minicomputers
2) Microcomputers
3) Mainframe computers
4) Supercomputer
Correct Answer: Mainframe computers

QID : 903 - Which electronic component was made out of semiconductor material?

Options:
1) Vacuum tubes
2) Transistors
3) ICs
4) All options are correct
Correct Answer: ICs

 QID : 904 - The amount of time required to read a block of data from a disk into memory is composed of seek time, rotational latency, and transfer time. Rotational latency refers to

Options:
1) the time its takes for the platter to make a full rotation
2) the time it takes for the read-write head to move into position over the appropriate track
3) the time it takes for the platter to rotate the correct sector under the head
4) None of these
Correct Answer: the time its takes for the platter to make a full rotation

Study Kit for SSC Scientific Assistant (IMD) Examination

QID : 905 - The idea of cache memory is based on___.

Options:
1) on the property of locality of reference
2) on the heuristic 90-10 rule
3) on the fact that references generally tend to cluster
4) All options are correct
Correct Answer: on the property of locality of reference

QID : 906 - Write Through technique is used in which memory for updating the data?

Options:
1) Virtual memory
2) Main memory
3) Auxiliary memory
4) Cache memory
Correct Answer: Cache memory

QID : 907 - When CPU is executing a Program that is part of the Operating System, it is said to be in

Options:
1) Interrupt mode
2) System mode
3) Half mode
4) Simplex mode
Correct Answer: System mode

QID : 908 - A floating point number that has a O in the MSB of mantissa is said to have

Options:
1) Overflow
2) Underflow
3) Important number
4) Undefined
Correct Answer: Underflow

QID : 909 - The load instruction is mostly used to designate a transfer from memory to a processor register known as

Options:
1) Accumulator
2) Instruction Register
3) Program counter
4) Memory address Register
Correct Answer: Accumulator
 
QID : 910
- Microinstructions are stored in control memory groups, with each group specifying a

Options:
1) Routine
2) Subroutine
3) Vector
4) Address
Correct Answer: Routine
 
QID : 911 - What is the content of Stack Pointer (SP)?

Options:
1) Address of the current instruction
2) Address of the next instruction
3) Address of the top element of the stack
4) Size of the stack.
Correct Answer: Address of the top element of the stack

QID : 912 - What type of work as computers are client computers (most of the time) in a client-server system?

Options:
1) Mainframe
2) Mini-computer
3) Microcomputer
4) PDA
Correct Answer: Microcomputer

QID : 913 - What characteristic of read-only memory (ROM) makes it useful?

Options:
1) ROM information can be easily updated.
2) Data in ROM is non-volatile, that is, it remains there even without electrical power.
3) ROM provides very large amounts of inexpensive data storage.
4) ROM chips are easily swapped between different brands of computers.
Correct Answer: Data in ROM is non-volatile, that is, it remains there even without electrical power.

QID : 914 - In analog computer

Options:
1) Input is first converted to digital form
2) Input is never converted to digital form
3) Output is displayed in digital form
4) All options are correct
Correct Answer: Input is never converted to digital form

QID : 915 - ___________ is an OOP principle.

Options:
1) Structured programming
2) Procedural programming
3) Inheritance
4) Linking
Correct Answer: Inheritance

QID : 916 - What is the subnetwork number of a host with an IP address of 172.16.66.0/21?

Options:
1) 172.16.36.0

2) 172.16.48.0

3) 172.16.64.0

4) 172.16.0.0
Correct Answer: 172.16.64.0

QID : 917 - Controlling access to a network by analyzing the incoming and outgoing packets is called

Options:
1) IP Filtering
2) Data Filtering
3) Packet Filtering
4) Firewall Filtering
Correct Answer: Packet Filtering

QID : 918 - DNS is the abbreviation of

Options:
1) Dynamic Name System
2) Dynamic Network System
3) Domain Name System
4) Domain Network Service
Correct Answer: Domain Name System

QID : 919 - What does Router do in a network?

Options:
1) Forwards a packet to all outgoing links
2) Forwards a packet to the next free outgoing link
3) Determines on which outing link a packet is to be forwarded
4) Forwards a packet to all outgoing links except the originated link
Correct Answer: Determines on which outing link a packet is to be forwarded

QID : 920 - Routing tables of a router keeps track of

Options:
1) MAC Address Assignments
2) Port Assignments to network devices
3) Distribute IP address to network devices
4) Routes to use for forwarding data to its destination
Correct Answer: Routes to use for forwarding data to its destination

QID : 921 - What does the port number in a TCP connection specify?

Options:
1) It specifies the communication process on the two end systems
2) It specifies the quality of the data & connection
3) It specifies the size of data
4) All options are correct
Correct Answer: It specifies the communication process on the two end systems

QID : 922 - Which is true to change the text color to red?

Options:
1) <BODY BGCOLOR=RED>
2) <BODY TEXT=RED>
3) <BODY COLOR=RED>
4) None of these
Correct Answer: <BODY TEXT=RED>

QID : 923 - Choose the correct HTML code to create an email link?

Options:
1) <A HREF = “user1@business.com”></A>
2) <A HREF = “mailto:“user1@business.com”></A>
3) <MAIL>“user1@business.com </MAIL>
4) <A MAILHREF = “user1@business.com”></A>
Correct Answer: <A HREF = “mailto:“user1@business.com”></A>

QID : 924 - Which topology is used in Ethernet?

Options:
1) Bus Topology
2) Ring Topology
3) Tree Topology
4) Mesh Topology
Correct Answer: Bus Topology

QID : 925 - Ethernet is a standard for

Options:
1) LAN
2) MAN
3) WAN
4) All options are correct
Correct Answer: LAN

QID : 926 - What is a compiler?

Options:
1) A compiler does a conversion line by line as the program is run
2) A compiler converts the whole of a high-level program code into machine code in one step
3) A compiler is a general-purpose language providing very efficient execution
4) None of these
Correct Answer: A compiler converts the whole of a high-level program code into machine code in one step

QID : 927 - What is a web browser?

Options:
1) a program that can display a web page
2) a program used to view html documents
3) it enables user to access the resources of internet
4) All options are correct
Correct Answer: All options are correct

QID : 928 - What is the latest version of CSS available?

Options:
1) CSS2

2) CSS3

3) CSS3.1

4) CSS4
Correct Answer: CSS4

QID : 929 - How many layers are present in the TCP/IP Reference model?

Options:
1) 6

2) 7

3) 5

4) 4
Correct Answer: 4

QID : 930 - A top-to-bottom relationship among the items in a database is established by a

Options:
1) Hierarchical schema
2) Network schema
3) Relational schema
4) All options are correct
Correct Answer: Hierarchical schema

QID : 931 - Which of these is not a database object?

Options:
1) Index
2) Sequence
3) Cursor
4) Trigger
Correct Answer: Cursor

QID : 932 - Data items grouped together for storage purposes are called a:

Options:
1) Record
2) Title
3) List
4) String
Correct Answer: Record
 
QID : 933 - A set of objects that share a common structure and a common behaviour is called:

Options:
1) Object
2) Class
3) Entity
4) None of these
Correct Answer: Class

QID : 934 - Which of the following is an example of network database?

Options:
1) IDBS

2) Ingress

3) Oracle

4) DBMS
Correct Answer IDBS

QID : 935 - What is used for database security?

Options:
1) data encryption
2) a view
3) finger print
4) All options are correct
Correct Answer: All options are correct

QID : 936 - Which of the following is not a proper state of transaction?

Options:
1) Partially aborted
2) Partially committed
3) Aborted
4) Committed
Correct Answer: Partially aborted

QID : 937 - Assume transaction A holds a share lock R. If a transaction B also requests for a shared lock on R.

Options:
1) it will result in a deadlock situation.
2) it will immediately be granted.
3) it will immediately be rejected.
4) it will be granted as soon as it is released by A.
Correct Answer: it will immediately be granted.
 

QID : 938 - Which command is used to remove all rows from a table?

Options:
1) Delete
2) Remove
3) Truncate
4) Both 'Delete' and 'Remove'
Correct Answer: Truncate
 
QID : 939 - Which command is used to add a column to an existing table?

Options:
1) Create
2) Update
3) Alter
4) None of these
Correct Answer: Alter

QID : 940 - In a relational database, a referential integrity constraint can be specified with the help of:

Options:
1) primary key
2) foreign key
3) secondary key
4) None of these
Correct Answer: foreign key

QID : 941 - Key to represent the relationship between tables is called

Options:
1) Primary Key

2) Secondary Key

3) Foreign Key

4) None of these

Correct Answer: Foreign Key

QID : 942 - A DBMS that combines a DBMS and an application generator is ________.

Options:
1) Microsoft's SQL Server

2) Microsoft's Access

3) IBM's DB2

4) Oracle Corporation's Oracle
Correct Answer: Microsoft's Access

QID : 943 - Find the SQL statement below that is equal to the following: SELECT NAME FROM CUSTOMER WHERE STATE = 'VA';

Options:
1) SELECT NAME IN CUSTOMER WHERE STATE IN ('VA');

2) SELECT NAME IN CUSTOMER WHERE STATE = 'VA';

3) SELECT NAME IN CUSTOMER WHERE STATE = 'V';

4) SELECT NAME FROM CUSTOMER WHERE STATE IN ('VA');
Correct Answer: SELECT NAME FROM CUSTOMER WHERE STATE IN ('VA');

QID : 944 - Which of the following is true concerning an Object-Oriented Databases (ODBMS)?

Options:
1) They have the ability to store complex data types on the Web
2) They are overtaking RDBMS for all applications
3) They are most useful for traditional, two-dimensional database table applications
4) All options are correct
Correct Answer: They have the ability to store complex data types on the Web

QID : 945 - Which of these is not applicable for IP protocol?

Options:
1) is connectionless
2) offer reliable service
3) offer unreliable service
4) None of these
Correct Answer: offer reliable service

QID : 946 - In contiguous allocation :

Options:
1) each file must occupy a set of contiguous blocks on the disk
2) each file is a linked list of disk blocks
3) all the pointers to scattered blocks are placed together in one location
4) None of these
Correct Answer: each file must occupy a set of contiguous blocks on the disk
 
QID : 947 - One difficulty of contiguous allocation is:

Options:
1) finding space for a new file
2) inefficient
3) costly
4) time taking
Correct Answer: finding space for a new file

QID : 948 - ___________ mounts, is when a file system can be mounted over another file system, that is remotely mounted, not local.

Options:
1) recursive
2) cascading
3) trivial
4) None of these
Correct Answer: cascading

QID : 949 - Smallest piece of data that could be dealt separately is classified as

Options:
1) file record
2) item
3) data column
4) data rows
Correct Answer: item

QID : 950 - Arrangement of data into a specific order is classified as

Options:
1) sorting
2) ordering
3) learning
4) enquiring
Correct Answer: sorting

QID : 951 - System programs such as compiler are designed as that they are

Options:
1) re-enterable
2) non-reusable
3) serially usable
4) recursive
Correct Answer: re-enterable

QID : 952 - An assembler converts

Options:
1) Machine code to mnemonics
2) High level language to assembly level
3) Assembly language to machine language
4) All options are correct
Correct Answer: Assembly language to machine language

QID : 953 - An example of intermediate language is

Options:
1) SNOBOL 

2) Pascal 

3) COBOL

4) UNCOL
Correct Answer: UNCOL

QID : 954 - A section of disk at the beginning of each partition is set aside to contain the table in :

Options:
1) FAT
2) linked allocation
3) Hashed allocation
4) indexed allocation
Correct Answer: FAT

QID : 955 - Information about a process is maintained in a _________.

Options:
1) Stack
2) Translation Lookaside Buffer
3) Process Control Block
4) Program Control Block
Correct Answer: Process Control Block

QID : 956 - Identify the odd thing in the services of operating system.

Options:
1) Accounting
2) Protection
3) Error detection and correction
4) Deadlock handling
Correct Answer: Error detection and correction

QID : 957 - Which technique was introduced because a single job could not keep both the CPU and the I/O devices busy?

Options:
1) Time-sharing
2) Spooling
3) Preemptive scheduling
4) Multiprogramming
Correct Answer: Multiprogramming

QID : 958 - The primary job of the operating system of a computer is to ________.

Options:
1) Command Resources
2) Manage Resources
3) Provide Utilities
4) Be user friendly
Correct Answer: Manage Resources

QID : 959 - ______________ is defined as the science of selecting and interconnecting hardware components to create computers that meets functional, performance and cost goals.

Options:
1) Computer
2) Calculator
3) Calculating machine
4) Computer architecture
Correct Answer:  Computer architecture

QID : 960 - The memory management system must therefore allow controlled access to ___________areas of memory without compromising essential protection.

Options:
1) relocated
2) protected
3) shared
4) organized
Correct Answer: shared

QID : 961 - Among all memory management techniques________ is simple to implement little operating system overhead.

Options:
1) Fixed partitioning
2) Simple Paging
3) Virtual memory paging
4) Simple segmentation
Correct Answer: Fixed partitioning

QID : 962 - What is the name of the program that controls the overall functions of the computer?

Options:
1) The operating system
2) An application program
3) A Browser
4) The file manager
Correct Answer: The operating system

QID : 963  - Which of the following is a service not supported by the operating system?

Options:
1) Protection
2) Managing resources
3) Compilation
4) I / O
Candidate Answer: I / O
 
QID : 964 - A thread shares its resources (like data section, code, section, open, files, signals) with

Options:
1) other process similar to the one that the thread belongs to
2) other threads that belong to similar processes
3) other threads that belong to the same process
4) All options are correct
Correct Answer: other threads that belong to the same process

QID : 965 - The operating system determines the manner in which all of the following occurs except

Options:
1) user creation of a document
2) user interaction with the processor
3) printer output
4) data displayed on the monitor
Correct Answer: user interaction with the processor

QID : 966 - Which of the following is not part of operating system?

Options:
1) Kernel
2) Devices Drivers
3) User Interface
4) None of these
Correct Answer: None of these

QID : 967 - The process of starting or restarting a computer system by loading instruction from a secondary storage device into the computer memory, is called

Options:
1) duping
2) booting
3) padding
4) All options are correct
Correct Answer: booting

QID : 968 - _______ is when the computer is turned ON and the operating system is loaded.

Options:
1) Booting
2) Flashing
3) Tracking
4) Taping
Correct Answer: Booting

QID : 969 - Which of the following is / are characteristics of an operating system?

Options:
1) Resource management
2) Error recovery
3) Memory management
4) All options are correct
Correct Answer: All options are correct

QID : 970 - While running DOS on a PC, which command would be used to duplicate the entire diskette?

Options:
1) COPY
2) DISKCOPY
3) CHKDSK
4) TYPE
Correct Answer: DISKCOPY

QID : 971 - A _______ in C language is also known as record.


Options:
1) array
2) structure
3) pointer
4) enum
Correct Answer: structure

QID : 972 - A function can______.

Options:
1) return a value
2) change value of actual arguments in call by reference
3) perform a task
4) All options are correct
Correct Answer: All options are correct

QID : 973 - When you omit parameters from a function call, values can be provided by

Options:
1) formal parameters
2) reference parameters
3) overloaded parameters
4) default parameters
Correct Answer: default parameters
 
QID : 974 - You can place function templates

Options:
1) at the end of main ()
2) at the start of a program above main ()
3) in two files-one for the definition and one for the function
4) All options are correct
Correct Answer: at the start of a program above main ()

QID : 975 - The use of macros in place of functions
A. reduces execution times
B. reduces code size
C. increases execution time

Options:
1) Only A
2) Only B
3) Both A and B
4) Only C
Correct Answer: Both A and B

QID : 976 - ________ are the basic run-time entities in an object system.

Options:
1) Objects
2) Classes
3) Abstraction
4) Inheritance
Correct Answer: Objects

QID : 977 - Paying attention to the important properties while ignoring inessential details is known as _______ .

Options:
1) selectiveness
2) polymorphism
3) abstraction
4) summarizing
Correct Answer: abstraction

QID : 978 - If an expression contains double, int, float, long, then whole expression will promoted into which of these data types?

Options:
1) long
2) int
3) double
4) float
Correct Answer: double

QID : 979 - 

 

Options:
1) 1

2) 12

3) 2

4) 4
Correct Answer: 1

QID : 980 - 

Options:
1) 5

2) 25

3) 7

4) Compilation Error
Correct Answer: 5

QID : 981 - A process refers to 5 pages, A, B, C, D, E in the order : A, B, C, D, A, B, E, A, B, C, D, E. If the page replacement algorithm is FIFO, the number of page transfers with an empty internal store of 3 frames is 7. If the number of page frames is increased to 4, then the number of page transfers :

Options:
1) decreases
2) increases
3) remains the same
4) None of these
Correct Answer: increases

QID : 982 - A FIFO replacement algorithm associates with each page the _______.

Options:
1) time it was brought into memory
2) size of the page in memory
3) page after and before it
4) All options are correct
Correct Answer: time it was brought into memory

QID : 983 - The aim of creating page replacement algorithms is to :

Options:
1) replace pages faster
2) increase the page fault rate
3) decrease the page fault rate
4) to allocate multiple pages to processes
Correct Answer: decrease the page fault rate

QID : 984 - The essential content(s) in each entry of a page table is / are :

Options:
1) Virtual page number
2) Page frame number
3) Both virtual page number and page frame number
4) Access right information
Correct Answer: Page frame number

QID : 985 - When a page fault occurs before an executing instruction is complete :

Options:
1) the instruction must be restarted
2) the instruction must be ignored
3) the instruction must be completed ignoring the page fault
4) None of these
Correct Answer: the instruction must be restarted

QID : 986 - What is breach of availability?

Options:
1) This type of violation involves unauthorized reading of data
2) This violation involves unauthorized modification of data
3) This violation involves unauthorized destruction of data
4) This violation involves unauthorized use of resources
Correct Answer: This violation involves unauthorized destruction of data

QID : 987 - Who unleashed famous worm attack in 1988 which effected UNIX systems and caused losses in millions?

Options:
1) Robert Morris
2) Bob Milano
3) Mark Zuckerberg
4) Bill Gates
Correct Answer: Robert Morris

QID : 988 - The disadvantage of machine level programming is

Options:
1) time consuming
2) chances of error are more
3) debugging is difficult
4) All options are correct
Correct Answer: All options are correct

QID : 989 - The extension file that is must for a file to be accepted by the LINK as a valid object file is.

Options:
1) .OBJ file
2) .EXE file
3) .MASM file
4) DEBUG file
Correct Answer: .OBJ file

QID : 990 - Which of the following statements is true?

Options:
1) The input frequency of the programmable interval timer (PIT) is fixed.
2) The input frequency of the programmable interval timer (PIT) depends on processor clock.
3) The input frequency of the programmable interval timer (PIT) is variable.
4) The input frequency of the programmable interval timer (PIT) depends on hardware attached.
Correct Answer: The input frequency of the programmable interval timer (PIT) is fixed.

QID : 991 - A swap space can reside in

Options:
1) Separate disk partition
2) RAM
3) Cache
4) None of these
Correct Answer: Separate disk partition

QID : 992 - What is meaning of right-set?

Options:
1) It is a subset consist of read and write
2) It is a subset of all valid operations that can be performed on the object
3) It is a subset consist of read, write and execute
4) None of these
Correct Answer: It is a subset of all valid operations that can be performed on the object

QID : 993 - Which two rights allow a process to change the entries in a column?

Options:
1) copy and transfer

2) copy and owner

3) owner and transfer

4) deny and copy

Correct Answer: copy and transfer

QID : 994 - Which of the following objects require protection?

Options:
1) Monitor
2) Memory
3) Power supply unit
4) All options are correct
Correct Answer: Monitor

QID : 995 - Which hardware triggers some operation after certain programmed count?

Options: 
1) programmable interval timer
2) interrupt timer
3) programmable timer
4) None of these
Correct Answer: programmable interval timer

QID : 996 - By definition a GIS must include:
A. A subsystem for data reporting and product generation
B. A method for data storage, retrieval, and representation
C. Data analysis functions
D. A means for the input of spatial and non-spatial data

Options:
1) Only A and B
2) Only B and C
3) Only A, B and D
4) All A, B, C and D
Correct Answer: All A, B, C and D

QID : 997 - On which of the following operation of an image, the topology of the region changes?

Options:
1) Stretching
2) Rotation
3) Folding
4) Change in distance measure
Correct Answer: Folding

QID : 998 - Which of the following can be a problem in manual digitizing?
A. Inaccuracies in document registration.
B. Availability of suitable hardware and software.
C. Hand-eye coordination.
D. Dimensional stability of source documents.

Options:
1) Only A
2) Only B and C
3) Only C and D
4) Only A, C and D
Correct Answer: Only A, C and D

QID : 999 - Which of the following might be considered as the fourth dimension in GIS?

Options:
1) Time 
2) Location 
3) Scale
4) Space
Correct Answer: Time 

QID : 1000 - What can GIS NOT be used to visualize?

Options:
1) Patterns
2) Tables
3) Trends
4) Relationships
Correct Answer: Tables

Study Kit for SSC Scientific Assistant (IMD) Examination

<< Go Back To Main Page


IMP! GET SSC EXAM ALERTS on EMAIL