Explore topic-wise InterviewSolutions in Current Affairs.

This section includes 7 InterviewSolutions, each offering curated multiple-choice questions to sharpen your Current Affairs knowledge and support exam preparation. Choose a topic below to get started.

1.

The solution to the problem of reliability is the introduction of __________(a) aging(b) scheduling(c) redundancy(d) disks

Answer» Correct choice is (c) redundancy

Easy explanation - None.
2.

What is the disk bandwidth?(a) the total number of bytes transferred(b) total time between the first request for service and the completion on the last transfer(c) the total number of bytes transferred divided by the total time between the first request for service and the completion on the last transfer(d) none of the mentioned

Answer» The correct option is (c) the total number of bytes transferred divided by the total time between the first request for service and the completion on the last transfer

The explanation is: None.
3.

____________ writes occur in the order in which the disk subsystem receives them, and the writes are not buffered.(a) Asynchronous(b) Regular(c) Synchronous(d) Irregular

Answer» Right option is (c) Synchronous

The explanation: None.
4.

The operating system keeps a small table containing information about all open files called ____________(a) system table(b) open-file table(c) file table(d) directory table

Answer» The correct choice is (b) open-file table

The explanation: None.
5.

The _______ program initializes all aspects of the system, from CPU registers to device controllers and the contents of main memory, and then starts the operating system.(a) main(b) bootloader(c) bootstrap(d) rom

Answer» Right choice is (c) bootstrap

The best I can explain: None.
6.

The phase change disk is coated with a material that can freeze into either _______ or ________ state.(a) crystalline, solid(b) ice, amorphous(c) crystalline, liquid(d) crystalline, amorphous

Answer» The correct choice is (d) crystalline, amorphous

Explanation: None.
7.

Increasing the RAM of a computer typically improves performance because ____________(a) Virtual memory increases(b) Larger RAMs are faster(c) Fewer page faults occur(d) None of the mentioned

Answer» Correct answer is (c) Fewer page faults occur

Explanation: None.
8.

Random access to tape is _______ a disk seek.(a) much slower than(b) much faster than(c) comparable to(d) none of the mentioned

Answer» Correct option is (a) much slower than

Explanation: None.
9.

A typical tape drive is ________ a typical disk drive.(a) more expensive than(b) cheaper than(c) of the same cost as(d) none of the mentioned

Answer» Correct option is (a) more expensive than

Explanation: None.
10.

The noise temperature at a resistor depends upon a. Resistance value b. Noise power c. Both a and b d. None of the above

Answer»

b. Noise power 

11.

What is the host controller?(a) controller built at the end of each disk(b) controller at the computer end of the bus(c) all of the mentioned(d) none of the mentioned

Answer» Right answer is (b) controller at the computer end of the bus

Best explanation: None.
12.

Noise factor for a system is defined as the ratio of a. Input noise power (Pni) to output noise power (Pno) b. Output noise power (Pno) to input noise power (Pni) c. Output noise power (Pno) to input signal power (Psi) d. Output signal power (Pso) to input noise power (Pni)

Answer»

b. Output noise power (Pno) to input noise power (Pni

13.

Which direction access cannot happen using DMZ zone by default?(a) Company computer to DMZ(b) Internet to DMZ(c) Internet to  company computer(d) Company computer to internet

Answer» The correct answer is (c) Internet to  company computer

The explanation is: Connection from internet is never allowed to directly access internal PCs but is routed through DMZ zone to prevent attacks.
14.

Noise Factor(F) and Noise Figure(NF) are related as a. NF = 10 log10(F) b. F = 10 log10(NF) c. NF = 10 (F) d. F = 10 (NF)

Answer»

a. NF = 10 log10(F) 

15.

What are the two features of a tripwire file system?(a) It is a tool to monitor file systems(b) It is used to automatically take corrective action(c) It is used to secure UNIX system(d) None of the mentioned

Answer» Correct option is (a) It is a tool to monitor file systems

To explain: None.
16.

When hardware is accessed by reading and writing to the specific memory locations, then it is called ____________(a) port-mapped I/O(b) controller-mapped I/O(c) bus-mapped I/O(d) none of the mentioned

Answer» The correct choice is (d) none of the mentioned

The explanation is: It is called memory-mapped I/O.
17.

The data-in register of I/O port is ____________(a) Read by host to get input(b) Read by controller to get input(c) Written by host to send output(d) Written by host to start a command

Answer» Correct answer is (a) Read by host to get input

Explanation: None.
18.

The magneto-optic head flies ___________ the disk surface than a magnetic disk head does.(a) much farther from(b) much closer to(c) at the same distance as(d) none of the mentioned

Answer» The correct option is (a) much farther from

The explanation: None.
19.

Random access in magnetic tapes is _________ compared to magnetic disks.(a) fast(b) very fast(c) slow(d) very slow

Answer» The correct choice is (d) very slow

Best explanation: None.
20.

On media that use constant linear velocity (CLV), the _____________ is uniform.(a) density of bits on the disk(b) density of bits per sector(c) the density of bits per track(d) none of the mentioned

Answer» Right choice is (c) the density of bits per track

The explanation: The farther a track is from the center of the disk.
21.

How do viruses avoid basic pattern match of antivirus?(a) They are encrypted(b) They act with special permissions(c) They modify themselves(d) None of the mentioned

Answer» Right option is (c) They modify themselves

The best I can explain: None.
22.

How does an antivirus of today identify viruses?(a) Previously known patterns(b) It can detect unknown patterns(c) It can take high priority to increase scanning speed(d) None of the mentioned

Answer» The correct option is (a) Previously known patterns

Best explanation: None.
23.

What are the drawbacks of the host based IDS?(a) Unselective logging of messages may increase the audit burdens(b) Selective logging runs the risk of missed attacks(c) They are very fast to detect(d) They have to be programmed for new patterns

Answer» Right answer is (a) Unselective logging of messages may increase the audit burdens

Explanation: None.
24.

What are characteristics of stack based IDS?(a) They are integrated closely with the TCP/IP stack and watch packets(b) The host operating system logs in the audit information(c) It is programmed to interpret a certain series of packets(d) It models the normal usage of network as a noise characterization

Answer» Right choice is (a) They are integrated closely with the TCP/IP stack and watch packets

The explanation is: None.
25.

What are strengths of Network based IDS?(a) Cost of ownership reduced(b) Malicious intent detection(c) Real time detection and response(d) All of the mentioned

Answer» Correct choice is (d) All of the mentioned

To explain I would say: None.
26.

What is known as a sandbox?(a) It is a program which can be molded to do the desired task(b) It is a program that is controlled or emulated section of OS(c) It is a special mode of antivirus(d) None of the mentioned

Answer» Correct option is (b) It is a program that is controlled or emulated section of OS

The explanation is: None.
27.

Noise is added to a signal in a communication system a. At the receiving end b. At transmitting antenna c. In the channel d. During regeneration of the information

Answer»

c. In the channel 

28.

Noise power at the resistor is affected by the value of the resistor as a. Directly proportional to the value of the resistor b. Inversely proportional to the value of the resistor c. Unaffected by the value of the resistor d. Becomes half as the resistance value isdoubled

Answer»

C will be the correct answer because

 The Noise power is given by

Pn = KTB

Where

K = 1.381 × 10-23 J/K, joules per Kelvin, the Boltzmann constant

B is the bandwidth at which the power Pn is delivered.

T noise temperature,

which is unaffected by change in the value of the resistor.

c. Unaffected by the value of the resistor 

29.

What is are two safe computing practices?(a) Not to open software from unknown vendors(b) Open and execute programs in admin level/root(c) Open and execute programs in presence of antivirus(d) None of the mentioned

Answer» Right choice is (a) Not to open software from unknown vendors

The best I can explain: Disgruntled employees have in past infected the master copies of software programs to do economic harm to the company.
30.

What are the drawbacks of signature based IDS?(a) They are unable to detect novel attacks(b) They suffer from false alarms(c) They have to be programmed again for every new pattern to be detected(d) All of the mentioned

Answer» Correct choice is (d) All of the mentioned

The best explanation: None.
31.

What are the different ways to intrude?(a) Buffer overflows(b) Unexpected combinations and unhandled input(c) Race conditions(d) All of the mentioned

Answer» Right option is (d) All of the mentioned

The best explanation: None.
32.

What are the major components of the intrusion detection system?(a) Analysis Engine(b) Event provider(c) Alert Database(d) All of the mentioned

Answer» Right answer is (d) All of the mentioned

Explanation: None.
33.

Notch filter is a a. Band pass filter b. Band stop filter c. Low pass filter d. High pass filter

Answer»

b. Band stop filter 

34.

Error handler codes, to handle unusual errors are ____________(a) almost never executed(b) executed very often(c) executed periodically(d) none of the mentioned

Answer» The correct answer is (a) almost never executed

Best explanation: None.
35.

The VFS (virtual file system) activates file system specific operations to handle local requests according to their _______(a) size(b) commands(c) timings(d) file system types

Answer» The correct choice is (d) file system types

The best I can explain: None.
36.

In virtual memory. the programmer __________ of overlays.(a) has to take care(b) does not have to take care(c) all of the mentioned(d) none of the mentioned

Answer» Correct answer is (b) does not have to take care

The explanation is: None.
37.

What are the different ways to classify an IDS?(a) anomaly detection(b) signature based misuse(c) stack based(d) all of the mentioned

Answer» The correct option is (d) all of the mentioned

To explain: None.
38.

What is the major drawback of anomaly detection IDS?(a) These are very slow at detection(b) It generates many false alarms(c) It doesn’t detect novel attacks(d) None of the mentioned

Answer» Correct option is (b) It generates many false alarms

Best explanation: None.
39.

What are the different ways to classify an IDS?(a) Zone based(b) Host & Network based(c) Network & Zone based(d) Level based

Answer» The correct option is (b) Host & Network based

Best explanation: None.
40.

Virtual memory is normally implemented by ________(a) demand paging(b) buses(c) virtualization(d) all of the mentioned

Answer» Correct choice is (a) demand paging

The explanation is: None.
41.

Working set model for page replacement is based on the assumption of ____________(a) modularity(b) locality(c) globalization(d) random access

Answer» Correct option is (b) locality

The explanation is: None.
42.

An unrecoverable error is known as _________(a) hard error(b) tough error(c) soft error(d) none of the mentioned

Answer» Correct choice is (a) hard error

Explanation: None.
43.

Using swap space significantly _________ system performance.(a) increases(b) decreases(c) maintains(d) does not affect

Answer» Correct answer is (b) decreases

Explanation: Disk access is much slower than memory access.
44.

What are the examples of state information?(a) opened files and their clients(b) file descriptors and file handles(c) current file position pointers(d) all of the mentioned

Answer» The correct choice is (d) all of the mentioned

Explanation: None.
45.

What is the advantage of caching in remote file access?(a) Reduced network traffic by retaining recently accessed disk blocks(b) Faster network access(c) Copies of data creates backup automatically(d) None of the mentioned

Answer» Right choice is (a) Reduced network traffic by retaining recently accessed disk blocks

Best explanation: None.
46.

What is the idea behind thread pools?(a) a number of threads are created at process startup and placed in a pool where they sit and wait for work(b) when a process begins, a pool of threads is chosen from the many existing and each thread is allotted equal amount of work(c) all threads in a pool distribute the task equally among themselves(d) none of the mentioned

Answer» Right answer is (a) a number of threads are created at process startup and placed in a pool where they sit and wait for work

For explanation: None.
47.

Thread pools help in ____________(a) servicing multiple requests using one thread(b) servicing a single request using multiple threads from the pool(c) faster servicing of requests with an existing thread rather than waiting to create a new thread(d) none of the mentioned

Answer» The correct option is (c) faster servicing of requests with an existing thread rather than waiting to create a new thread

Best explanation: None.
48.

Which of the following is FALSE?(a) Context switch time is longer for kernel level threads than for user level threads(b) User level threads do not need any hardware support(c) Related kernel level threads can be scheduled on different processors in a multiprocessor system(d) Blocking one kernel level thread blocks all other related threads

Answer» Right option is (d) Blocking one kernel level thread blocks all other related threads

Easiest explanation - None.
49.

In the Many to One model, if a thread makes a blocking system call ___________(a) the entire process will be blocked(b) a part of the process will stay blocked, with the rest running(c) the entire process will run(d) none of the mentioned

Answer» Right answer is (a) the entire process will be blocked

To explain: None.
50.

In the Many to One model, multiple threads are unable to run in parallel on multiprocessors because of ___________(a) only one thread can access the kernel at a time(b) many user threads have access to just one kernel thread(c) there is only one kernel thread(d) none of the mentioned

Answer» The correct answer is (a) only one thread can access the kernel at a time

To explain: None.