1. The security features of application should be the time of…………..
A. Programming phaseB. Conceptual phaseC. TestingD. All the above
2. Which form of job scheduling uses triggers?
A. Manual schedulingB. Distributed schedulingC. Mainframe schedulingD. Automated scheduling
3. Which type of attack do some firewalls try to limit by enforcing rules on how long a GET or POST request can be?
A. SmurfB. LANDC. Buffer overflowD. Denial of service
4. This is a document that states in writing how a company plans to protect the company’s physical and IT assets?
A. Data Encryption StandardB. Security PolicyC. Public key CertificateD. Access control list
5. Dirty bit for a page in a page table
A. Helps to avoid unnecessary writers on a paging deviceB. Helps maintain LRU informationC. Allows only read on as pageD. None
6. Parsing is also known as……..
A. Lexical AnalysisB. Syntax analysisC. Semantic analysisD. Code generation
7. Who provide the leased line?
A. wwwB. TCP/IPC. ISPD. ISDN
8. Master slave flip flop is also known as
A. Pulse triggered flip-flopB. Level triggered flip-flopC. Edge triggered flip-flopD. All the above
9. CIDR (Classless Inter Domain Routing) used in
A. Class BB. Class CC. Class AD. None
10. In binary system the highest value of an 8 bit number is…………….
A. 255B. 256C. 257D. 253
11. Lexical analyzer transforms an input stream into
A. Regular ExpressionB. Sequence of tokensC. SymbolsD. None
12. If we traverse a binary search tree, in which manner that we get in ascending order?
A. GraphB. In orderC. Pre orderD. Post order
13. Which of the following is Parser Generator?
A. LexB. EmacsC. YAACD. All the above
14.If each node in a tree has value greater than every value in its left sub tree and has value less than every value in its right subtree, the tree is known as……….
A. Binary search treeB. Complete binary treeC. Full binary treeD. None
15. To overcome the difficulties of race around condition which flip -flop used?
A. JK flip- flopB. D flip flopC. Master slave flip flopD. SR flip-flop
16. All the process executing the critical section is allowed access to the shared variable,all other process should prevented from doing so until the completion of the critical section. This is referred to as…….
A. SemaphoreB. DeadlockC. Mutual exclusionD. IPC
17. Piggy backing is technique for………
A. Flow controlB. AcknowledgementC. SequencingD. None
18. In which of the following categories falls round robin scheduling algorithm
A. Pre-emptiveB. Non preemptiveC. Sometimes preemptive sometimes non preemptiveD. None
19. In digital signature private key used for……..and public key used for………
A. Encryption , DecryptionB. Decryption, EncryptionC. Cipher, PlainD. Plain, Cipher
20. How many rollers are actually responsible for movement of cursor in the mouse……..?
A. Depends from mouse to mouseB. 1C. 2D. 3
READ PREVIOUS EXPECTED QUESTIONS (SOLVED)
- IT SPECIALIST OFFICER | EXPECTED QUESTIONS (SOLVED...
- IT SPECIALIST OFFICER | EXPECTED QUESTIONS (SOLVED...
- IT SPECIALIST OFFICER EXPECTED QUESTIONS | SET 5 S...
- CRACK IT SPECIALIST OFFICER EXAMINATION | EXPECTED...
- CRACK IT SPECIALIST OFFICER EXAMINATION | EXPECTED...
- IT OFFICER MODEL QUESTIONS | SET 2
- IT OFFICER MODEL QUESTIONS | SET 1
Social Plugin