Loading more MCQs...

JKSSB Computer Awareness MCQs

Please Login to view more and Get a subscription to view all 1010 questions. You can view 30 questions without a subscription.
Question 1 of 1010

In the context of cloud computing in an IaaS (Infrastructure as a Service) model, what is managed by the service provider?

Explanation

Infrastructure as a Service (IaaS)

IaaS provides the fundamental building blocks of computing, such as virtual servers, storage, and networking, rented on a pay-as-you-go basis.

It gives you maximum control over your IT infrastructure without the physical overhead of maintaining your own hardware data centers.

Real-world examples: Amazon Web Services (AWS) EC2, Google Compute Engine, and Microsoft Azure Virtual Machines.

Platform as a Service (PaaS)

PaaS offers a complete development and deployment environment in the cloud, removing the need to configure or manage the underlying server infrastructure.

It allows developers to focus entirely on writing code and building applications rather than worrying about software updates, storage, or operating systems.

Real-world examples: Heroku, Google App Engine, and AWS Elastic Beanstalk.

Software as a Service (SaaS)

SaaS delivers fully functional, ready-to-use software applications over the internet directly to end-users via a web browser or app interface.

The service provider handles all maintenance, updates, security, and underlying infrastructure, requiring zero complex installation from the user.

Real-world examples: Google Workspace (Gmail, Docs), Microsoft 365, Salesforce, and Netflix.

Function as a Service (FaaS / Serverless) — The "etc."

FaaS allows developers to write and deploy individual snippets of code (functions) that execute only when triggered by specific user actions or system events.

You pay strictly for the exact compute time your code uses down to the millisecond, with the cloud provider handling all scaling automatically behind the scenes.

Real-world examples: AWS Lambda, Google Cloud Functions, and Microsoft Azure Functions.

Report an error

Describe the issue with this question. Our team will review it.

Question ID: 11290

Question 2 of 1010

Which of the following statements about Internet routing and protocols is correct?

Explanation

C) IPv6 and NAT (Correct): Network Address Translation (NAT) was originally created as a "patch" for the shortage of IPv4 addresses, allowing multiple devices in a private network to share a single public IP. Because IPv6 uses 128-bit addresses (providing $2^{128}$ unique addresses), every device on earth can have its own unique global IP address. This restores "end-to-end" connectivity and makes NAT technically unnecessary.

Report an error

Describe the issue with this question. Our team will review it.

Question ID: 11289

Question 3 of 1010

Consider the following statements about TCP/IP and Internet communication:

Explanation

A) TCP Reliability (Correct): Transmission Control Protocol (TCP) is a "connection-oriented" protocol. It uses a sequence numbering system to ensure that packets arriving out of order are rearranged correctly and uses acknowledgments to re-send any packets lost during transit. However, it cannot guarantee timing (latency), as network congestion or re-transmissions can cause delays.

Report an error

Describe the issue with this question. Our team will review it.

Question ID: 11288

Question 4 of 1010

In Microsoft PowerPoint, which of the following existing slide contents cannot be directly converted into SmartArt without re-entering the data?

Explanation

The existing slide content that CANNOT be directly converted into SmartArt is B) A table of data.

Technical Explanation

  • A, C, and D (Convert to SmartArt): PowerPoint has a built-in feature specifically for text. If you have a bulleted list, descriptive text, or indented text in a text box, you can simply right-click the text and select "Convert to SmartArt." PowerPoint automatically maps your text and indentation levels to the shapes and hierarchy of the chosen SmartArt graphic.

  • B) A Table of Data: There is no "Convert to SmartArt" option for tables. A table is a distinct structural object in PowerPoint. If you want to put table data into SmartArt, you must manually copy and paste the content from individual cells into the SmartArt text pane or re-type the information.

Report an error

Describe the issue with this question. Our team will review it.

Question ID: 11287

Question 5 of 1010

Which of the following statements is correct about email functionality?

Explanation

  • C) POP3 Protocol (Correct): POP3 (Post Office Protocol version 3) is designed to "fetch" emails. Traditionally, it downloads the emails from the mail server to your local device (like Outlook or a phone) and then deletes them from the server. This is why POP3 is often used when you only access email from one primary device.

Report an error

Describe the issue with this question. Our team will review it.

Question ID: 11286

Question 6 of 1010

In Microsoft Excel, student scores are listed in column B (Math) and column C (Science). Which formula correctly counts the number of students who scored ≥ 80 in Math and ≥ 90 in Science? ( > means greater than or equal to)

Explanation

Option A: The COUNTIFS Function (Correct)

The COUNTIFS function is specifically designed to count cells that meet multiple criteria across different ranges.

  • Range 1: B2:B10 (Math scores)

  • Criteria 1: ">=80"

  • Range 2: C2:C10 (Science scores)

  • Criteria 2: ">=90" The function checks each row; if both conditions are true for a single student, they are added to the count.

Report an error

Describe the issue with this question. Our team will review it.

Question ID: 11285

Question 7 of 1010

A company keeps sales data in column B, and wants to categorise sales into three levels:

"High" if sales ≥ 1000

"Medium" if sales > 500 but < 1000 "

Low" if sales < 500

A student writes the formula in cell C2 as: =IF(B2>=1000,"High",IF(B2>=500,"Medium","Low")).

Which of the following statements is/are correct?

Explanation

The given formula is:

=IF(B2>=1000,"High",IF(B2>=500,"Medium","Low"))

Evaluation:

  • If B2 ≥ 1000 → "High" ✔

  • If B2 ≥ 500 and < 1000 → "Medium" ✔

  • If B2 < 500 → "Low" ✔

The condition B2 ≥ 500 in the second IF automatically ensures values between 500 and 999 (since ≥1000 is already handled).

Conclusion:

The formula is correct and categorizes all values as intended.

Report an error

Describe the issue with this question. Our team will review it.

Question ID: 11284

Question 8 of 1010

Which of the following statements is true about MS Word?

Explanation

The true statement about MS Word is A) Using Section Breaks allows different headers and footers in the same document.

Logical Explanation

  • Section Breaks vs. Page Breaks: A Page Break merely pushes text to the next page while keeping the formatting the same. A Section Break, however, creates a separate "department" within your document. This allows you to have different page orientations (portrait vs. landscape), different margins, and most importantly, different Headers and Footers.

  • The "Link to Previous" Feature: By default, a new section will try to copy the header of the previous one. To make them different, you must go into the header of the new section and deselect "Link to Previous" in the Header & Footer tab.

Report an error

Describe the issue with this question. Our team will review it.

Question ID: 11283

Question 9 of 1010

Which of the following statements is NOT correct about MS Word?

Explanation

  • A) ❌ Incorrect statement → In MS Word, content controls (like dropdowns, date pickers, etc.) can enforce data validation by restricting input to predefined options.

Why others are correct:

  • B) ✔ You can override indent settings even within the same style

  • C) ✔ Navigation Pane shows headings/pages/results, not comments

  • D) ✔ Accepting changes removes revision tracking (including author info for that change)

Report an error

Describe the issue with this question. Our team will review it.

Question ID: 11282

Question 10 of 1010

Consider a system using preemptive priority scheduling with multiple real-time and user-level processes. Priority inheritance protocol is implemented.

I.. Priority inversion can occur when a low-priority process holds a resource that a high-priority process needs.

II. Under priority inheritance, the low-priority process temporarily inherits the higher priority to avoid blocking.

III. Priority inversion can be completely avoided if all processes are scheduled in a round-robin fashion.

IV. Starvation may still occur for low-priority processes even with priority inheritance.

Which of the statements are correct?

Explanation

  • I. Correct: Priority Inversion occurs exactly when a high-priority process is forced to wait for a low-priority process to release a resource (like a mutex or semaphore). The situation becomes a "problem" when a medium-priority process preempts the low-priority one, further delaying the high-priority process indefinitely.

  • II. Correct: Priority Inheritance Protocol (PIP) is a solution where the low-priority process currently holding the resource "inherits" the priority of the highest-priority process waiting for that same resource. This prevents medium-priority processes from preempting the lock-holder, allowing it to finish and release the resource sooner.

  • III. Incorrect: Round-robin scheduling is designed for fairness in time-sharing, not for managing resource-based dependencies. While it ensures every process gets a turn, it does not solve the logic of a high-priority task being blocked by a resource held by a lower-priority one; it simply ignores the concept of priority altogether, which is unsuitable for real-time systems.

  • IV. Correct: Priority inheritance only solves the inversion problem. It does not guarantee that low-priority processes will ever get enough CPU time if the system is constantly saturated with high-priority tasks. Therefore, Starvation remains a fundamental risk in any priority-based preemptive system.

Report an error

Describe the issue with this question. Our team will review it.

Question ID: 11281

Question 11 of 1010

In a system with multiple processes and resource types, which of the following is a valid method to recover from a deadlock?

Explanation

The correct answer is B) Preempt resources from one process and allocate to another.

Deadlock Recovery Methods

Once a deadlock is detected, the system must break the "Circular Wait" to resume operations. There are two primary approaches to recovery:

1. Resource Preemption

This method involves taking resources away from one or more deadlocked processes and giving them to others until the deadlock cycle is broken.

  • Selecting a Victim: The system must decide which process and which resources to preempt based on "cost" (e.g., how long the process has been running).

  • Rollback: The process from which resources are taken must be rolled back to a previous safe state so it can be restarted later.

  • Starvation: The system must ensure the same process isn't always picked as the victim.

2. Process Termination

This involves killing processes to free up their resources.

  • Abort all deadlocked processes: Simple but expensive, as all work done by these processes is lost.

  • Abort one at a time: The system kills one process and checks if the deadlock still exists; it repeats this until the cycle is broken.

Report an error

Describe the issue with this question. Our team will review it.

Question ID: 11280

Question 12 of 1010

Match the following devices with their corresponding descriptions. Devices --- Statements

1. Haptic Gloves --- i. Generates tactile sensations and may sense user interaction.

2. Tactile Display --- ii. Captures fine hand/finger movements for computer input.

3. Voice Response Unit (VRU) --- iii. Detect user gestures and provide force feedback.

4. Data Glove --- iv. Generates synthesised audio output for interaction with users.

Choose the correct match:

Explanation

  • Haptic Glovesiii. Detect user gestures and provide force feedback

  • Tactile Displayi. Generates tactile sensations and may sense user interaction

  • Voice Response Unit (VRU)iv. Generates synthesised audio output for interaction with users

  • Data Gloveii. Captures fine hand/finger movements for computer input

Report an error

Describe the issue with this question. Our team will review it.

Question ID: 11279

Question 13 of 1010

Categorize the following devices as Input (I) and Output (O)

i) Light Pen

ii) Punch Card Reader

iii) Plotter

iv) Sound Card

v) Digitizer Tablet

vi) Drum Printer

vii) Scanner

Explanation

Categorization:

  • i) Light PenInput (I)

  • ii) Punch Card ReaderInput (I)

  • iii) PlotterOutput (O)

  • iv) Sound CardOutput (O)

  • v) Digitizer TabletInput (I)

  • vi) Drum PrinterOutput (O)

  • vii) ScannerInput (I)

Final Answer:

I, I, O, O, I, O, I

Report an error

Describe the issue with this question. Our team will review it.

Question ID: 11278

Question 14 of 1010

A computer has a quad-core CPU with a 2.4 GHz frequency, 16 GB RAM, and a ITB SSD.A program that uses many threads and performs frequent disk operations is running very slowly and sometimes crashes. What is the most likely cause?

Explanation

The most likely cause is A) Inefficient multithreading and high memory usage.

Technical Breakdown

  • Inefficient Multithreading: Since the program uses "many threads," it can lead to a phenomenon called thread contention or context switching overhead. If the threads are not managed properly (e.g., fighting for the same resources or causing "race conditions"), the CPU spends more time switching between threads than actually executing them, leading to slow performance and potential crashes (deadlocks).

  • High Memory Usage: While 16 GB is substantial, programs that are poorly optimized or handle massive datasets can exhaust this. When RAM is full, the OS uses Virtual Memory (swapping data to the SSD). Even with a fast SSD, this is significantly slower than RAM and often leads to system instability or "Out of Memory" crashes.

  • Disk Operations: Frequent disk I/O combined with high thread counts can create a bottleneck. If many threads try to read/write to the SSD simultaneously without an efficient queuing system, the I/O wait time increases dramatically.

Report an error

Describe the issue with this question. Our team will review it.

Question ID: 11277

Question 15 of 1010

Which of the following correctly classifies hardware and system software?

Explanation

The correct option is: C) CPU - Hardware; Operating System - System Software

Classification Logic

To classify these correctly, we must distinguish between the physical components and the programs that manage them:

  • Hardware: These are the physical, tangible parts of a computer system that you can touch.

    • Examples: CPU (the brain), RAM (memory), Keyboard, Monitor, and Hard Drives.

  • System Software: These are programs designed to run a computer's hardware and application programs. They act as the interface between the hardware and the user.

    • Examples: Operating Systems (Windows, Linux, macOS), Device Drivers, and Compilers.

Report an error

Describe the issue with this question. Our team will review it.

Question ID: 11276

Question 16 of 1010

Which of the following statements is/are correct?

I. Overflow in two's complement addition can be detected by examining only the carry out of the most significant bit.

II. When converting an unsigned integer to a larger type, zero extension is used to preserve its value.

III. In Binary-Coded Decimal (BCD) representation, each decimal digit is encoded separately using four binary bits.

IV. In a byte-addressable system, the effective address calculation is dependent on instruction length.

Explanation

I. Overflow in Two's Complement (Incorrect)

Examining only the carry out ($C_{out}$) of the most significant bit (MSB) is not enough to detect overflow in signed (two's complement) arithmetic.

  • The Rule: Overflow occurs if the carry into the MSB is different from the carry out of the MSB.

  • Alternatively, if you add two positive numbers and get a negative result (or vice versa), overflow has occurred. Simply looking at $C_{out}$ only detects overflow in unsigned addition.

II. Unsigned Integer Conversion (Correct)

When moving an unsigned integer to a larger bit-width (e.g., from an 8-bit byte to a 16-bit word), you must fill the new, higher-order bits with zeros. This is called Zero Extension.

  • For example, the 8-bit unsigned value 11110000 (240) becomes 00000000 11110000 in 16-bit, preserving the value 240.

  • (Contrast this with signed integers, which use Sign Extension to preserve the negative/positive property).

III. Binary-Coded Decimal (Correct)

BCD is a system where each digit of a decimal number is treated as a separate entity and converted into its 4-bit binary equivalent (nibble).

  • Example: The decimal number 25 in BCD is 0010 (2) and 0101 (5), resulting in 0010 0101.

  • This is different from pure binary, where 25 would be 00011001.

IV. Effective Address Calculation (Incorrect)

In a byte-addressable system, the Effective Address (EA) is the actual location in memory that the CPU needs to access for data. While the Instruction Length determines how much the Program Counter (PC) increments to reach the next instruction, the calculation of the EA for a specific operand depends on the Addressing Mode (e.g., indexed, indirect, or displacement), not the length of the instruction itself.

Report an error

Describe the issue with this question. Our team will review it.

Question ID: 11275

Question 17 of 1010

Which statement is correct regarding CPU operation and instruction execution?

Explanation

The correct statement is: C) The instruction register stores the current instruction being decoded or executed.

Logical Explanation of CPU Registers

In the von Neumann architecture, the CPU uses specific registers to manage the "Fetch-Decode-Execute" cycle:

  • Instruction Register (IR): Once an instruction is fetched from memory, it is placed into the IR. Here, the Control Unit decodes the binary bits to determine what operation (like ADD or LOAD) needs to be performed.

  • Program Counter (PC): Statement A is incorrect because the PC does not store the address of the current instruction; it stores the address of the next instruction to be fetched.

Report an error

Describe the issue with this question. Our team will review it.

Question ID: 11274

Question 18 of 1010

Which statement is correct concerning computer memory and data storage fundamentals?

Explanation

The correct statement is: Cache memory is faster than the Main memory and stores frequently accessed data.

Core Memory Fundamentals

  • Speed and Hierarchy: In the memory hierarchy, Cache is positioned between the CPU and the Main Memory (RAM). It is made of Static RAM (SRAM), which is significantly faster than the Dynamic RAM (DRAM) used for main memory.

  • Purpose: Cache stores copies of the data from frequently used main memory locations. When the CPU needs data, it checks the cache first (a "cache hit"); if found, it can process the instruction much faster than if it had to wait for the slower main memory.

Report an error

Describe the issue with this question. Our team will review it.

Question ID: 11273

Question 19 of 1010

Which of the following statements is correct regarding the relationship between instruction execution, memory hierarchy, and addressing modes in a typical von Neumann architecture computer system?

Explanation

The correct statement is: Data hazards can occur in pipelined CPUs even with only register addressing.

Logical Analysis

  • Data Hazards in Pipelining: A data hazard occurs when the pipeline must stall because the data required to execute an instruction is not yet available. Even if you only use register addressing (e.g., ADD R1, R2, R3), a hazard occurs if a subsequent instruction needs the result of R1 before the first instruction has finished writing back to that register. This is known as a Read-After-Write (RAW) hazard.

Report an error

Describe the issue with this question. Our team will review it.

Question ID: 11272

Question 20 of 1010

Which of the following is the fundamental operation performed by computers to carry out arithmetic computations in the ALU?

Explanation

The fundamental operation performed by computers to carry out arithmetic computations is Processing binary data through logic gate operations.

Logical Explanation

  • Binary and Logic Gates: Computers represent all data as binary (0s and 1s). The Arithmetic Logic Unit (ALU) uses various combinations of logic gates (such as AND, OR, NOT, XOR) to perform calculations.

  • The Adder Circuit: For example, basic addition is achieved through "Half Adders" and "Full Adders." These circuits use XOR and AND gates to calculate the sum and the "carry" bit of binary numbers.

  • The ALU’s Role: The ALU is a digital circuit within the processor that acts as the "calculator." It receives binary inputs, passes them through a network of gates determined by the instruction, and produces a binary output.

Report an error

Describe the issue with this question. Our team will review it.

Question ID: 11271

Question 21 of 1010

In an e-Office system, a confidential file is sent digitally from a section officer to a higher authority. The department wants to ensure that only the intended officer can read the file during transmission. Which of the following ensures confidentiality during transmission?

Explanation

The correct answer is B) Encrypting the file using the recipient's public key.

In the context of Public Key Infrastructure (PKI) and digital security, different tools serve different purposes. To ensure confidentiality (making sure only the intended recipient can read it), encryption is required.

Report an error

Describe the issue with this question. Our team will review it.

Question ID: 11067

Question 22 of 1010

Which of the following is incorrect regarding the use of modern computer applications in field operations of a Forest Department?

Explanation

The incorrect statement is C) Forest apps replace the need for physical field inspections completely.

Modern computer applications significantly enhance the efficiency of Forest Department operations, but they do not eliminate the necessity for on-ground presence.

Analysis of the Statements:

  • A) Mobile apps for photographs (Correct): Field staff use specialized apps to document tree health, illegal felling, or wildlife sightings. These photos often serve as legal evidence in "damage cases."

  • B) GIS-enabled apps (Correct): Geographic Information Systems (GIS) allow officers to overlay GPS coordinates of their current location with satellite imagery to monitor forest cover changes, boundary encroachments, and fire hotspots in real-time.

  • C) Replacing physical inspections (Incorrect): While apps streamline data collection, physical inspections are still mandatory for verifying ground realities, interacting with local communities, and performing tasks that sensors or cameras cannot (like manual soil testing or marking trees for silvicultural operations).

  • D) Working without network (Correct): Many professional field apps (like QField or ArcGIS Field Maps) are designed for offline use. Since forests often have poor connectivity, data is stored locally on the device and synchronized with the central server once the staff returns to a network zone.

Report an error

Describe the issue with this question. Our team will review it.

Question ID: 11066

Question 23 of 1010

Which of the following statements is correct regarding computer viruses and modern antivirus systems?

Explanation

The correct answer is B) Signature-based antivirus detects only previously identified malware patterns.

Here is a detailed look at why this statement is true and why the others are misconceptions:

  • Signature-based Detection (True): This traditional method works like a "Most Wanted" list. The antivirus compares the code of files on your computer against a database of known malware "signatures" (unique strings of bits). If it hasn't seen that specific pattern before, it won't flag it.

  • A) Execution (False): By definition, a computer virus usually requires a host program to be executed or some form of user action (like opening an attachment or running an infected .exe) to begin its spread. In contrast, a Worm is the type of malware that can self-replicate and spread across networks automatically without user intervention.

  • C) Zero-day Attacks (False): A Zero-day attack exploits a vulnerability that is unknown to the software vendor or antivirus company. Since there is no "patch" or "signature" yet, online registration or standard antivirus updates cannot guarantee protection against them. Only advanced Heuristic/Behavioral analysis can help mitigate these.

  • D) Firewall vs. Antivirus (False): They are distinct layers of security. A Firewall acts as a barrier for network traffic (checking "who" is coming in and out of your internet connection), while an Antivirus scans and monitors the "files" and "programs" already on or entering your system to find malicious code.

Report an error

Describe the issue with this question. Our team will review it.

Question ID: 11065

Question 24 of 1010

Which of the following statements is true regarding KMZ files and geo-tagged photos?

Explanation

The correct answer is B) Geo-tagging embeds latitude and longitude inside image metadata.

Here is the technical breakdown of how these technologies work:

  • Geo-tagging (True): When you take a photo with a GPS-enabled device, the coordinates (latitude, longitude, and often altitude) are written into the EXIF (Exchangeable Image File Format) metadata of the image. This data travels with the file, allowing mapping software to pin the photo to a specific location.

  • KMZ Files (A & C are False): A KMZ file is a compressed (zipped) version of a KML (Keyhole Markup Language) file. It is specifically designed to store geographic data, including coordinates, 3D models, and images. Because it is a zip file, it can "bundle" images together with their corresponding location data so they can be viewed in applications like Google Earth.

  • Automatic Creation (D is False): Simply uploading a geo-tagged photo does not automatically generate a KMZ file. A KMZ must be specifically created or "saved as" using GIS (Geographic Information System) software or mapping tools to package the image and its coordinates into that specific format.

Report an error

Describe the issue with this question. Our team will review it.

Question ID: 11064

Question 25 of 1010

A student uploads a PDF file to an online PDF-to-JPG converter website. After conversion, he downloads the JPG files but later notices:

  1. The images are blurred

  2. File size is much larger than expected

  3. Text cannot be copied anymore

Which of the following is the most accurate reason?

Explanation

The correct answer is A) The PDF was converted into raster images.

This scenario highlights the fundamental difference between Vector and Raster formats:

  • Rasterization: A PDF often contains vector data (like text and shapes) which is mathematically defined and infinitely scalable. When you convert it to a JPG, the website "rasterizes" the content, turning it into a fixed grid of pixels.

  • Blurriness: Because JPGs are raster images, if the conversion resolution (DPI) is low, the images will appear blurred or pixelated when viewed at full size.

  • Larger File Size: Unlike text in a PDF, which takes up very little space, a JPG must store color information for every single pixel in the image. This often leads to a larger file size than the original text-based PDF.

  • Text Selection: Since the JPG is now just a "picture" of the text, the computer no longer recognizes individual characters. You cannot highlight or copy text unless you use OCR (Optical Character Recognition) software.

Report an error

Describe the issue with this question. Our team will review it.

Question ID: 11063

Question 26 of 1010

A government launches a system where:

  • Citizens apply for documents online

  • Applications are automatically verified using databases

  • SMS/email updates are sent automatically

  • Officials approve requests digitally

  • Data is stored centrally and accessed across departments

Which of the following best explains the real contribution of Information Technology (IT) in this system

Explanation

The correct answer is C) IT integrates communication, data processing, storage, and automation.

This scenario perfectly illustrates a comprehensive E-governance framework. Information Technology is not just a single tool here; it acts as an integrated system that transforms the entire workflow:

  • Communication: Automated SMS/email updates keep the citizen informed without manual intervention.

  • Data Processing: Automatic verification against databases ensures accuracy and speed that a human could not match manually.

  • Storage: Centralized data storage allows different departments to access the same information, eliminating the need for a citizen to submit the same document multiple times (the "Once-Only" principle).

  • Automation: The system handles routine tasks (routing applications, checking records), allowing officials to focus only on the final digital approval.

Report an error

Describe the issue with this question. Our team will review it.

Question ID: 11062

Question 27 of 1010

A student is using a computer with 8 GB RAM. He opens:

  • A web browser with 25 tabs

  • A video editing software

  • A music player

  • A code editor

After some time, the system becomes slow, but it does NOT crash. The hard disk activity light keeps blinking continuously even though he is not saving or opening files. Which of the following is the most accurate explanation?

Explanation

The correct answer is C) The operating system is using virtual memory and swapping data between RAM and disk.

This scenario describes a classic case of Thrashing. Here is why:

  • Memory Overload: The student has opened several heavy applications (video editing, many browser tabs) that collectively require more than the available 8 GB of RAM.

  • Virtual Memory & Swapping: When RAM is full, the Operating System uses a portion of the hard disk (the Page File or Swap Space) as "Virtual Memory." It moves (swaps) data currently not in use from the RAM to the disk to make room for active tasks.

  • The "Slow" Effect: Hard disks (even SSDs) are significantly slower than RAM. The continuous blinking of the disk light indicates that the OS is frantically moving data back and forth between the RAM and the disk. This process is called Swapping.

  • Why it doesn't crash: The system remains functional because Virtual Memory allows it to handle more data than the physical RAM permits, though performance drops drastically.

Report an error

Describe the issue with this question. Our team will review it.

Question ID: 11061

Question 28 of 1010

Match the following:

Column -I --- Column - II

i. Firmware --- a. Translates high-level language into machine code

ii. Utility Software --- b. Controls communication between the operating system and the hardware device

iii. Device Driver --- c. Stored permanently in ROM to initialize hardware

iv. Compiler --- d. Performs system maintenance tasks like disk cleanup

Choose the correct option:

Explanation

  • i. Firmware (i - c): This is a specific type of software "baked" into the hardware. It is stored permanently in ROM (Read-Only Memory) and provides the necessary instructions on how a device communicates with other computer hardware.

  • ii. Utility Software (ii - d): This software is designed to help analyze, configure, optimize, or maintain a computer. Examples include disk cleanup, antivirus, and file compression tools.

  • iii. Device Driver (iii - b): A specialized program that allows the operating system to communicate with a specific hardware device (like a printer or graphics card). Without the driver, the OS wouldn't know how to "talk" to the hardware.

  • iv. Compiler (iv - a): A language processor that translates an entire program written in high-level language (like C++ or Java) into machine code (binary) at once before execution.

Report an error

Describe the issue with this question. Our team will review it.

Question ID: 11060

Question 29 of 1010

Which of the following statements is true regarding applications of Information Technology?

Explanation

  • A) E-governance (False): While E-governance makes services more efficient and accessible online, it does not entirely eliminate the need for physical offices. Many administrative tasks, legal verifications, and physical infrastructure management still require on-site government presence.

  • B) E-commerce (False): E-commerce is not limited to physical goods. It also includes the sale of digital products (e-books, software) and services (streaming subscriptions, travel bookings, and online consultations).

  • C) Telemedicine (True): This is a core application of IT in healthcare. It enables healthcare professionals to evaluate, diagnose, and treat patients at a distance using telecommunications technology like video calls and remote monitoring.

  • D) Online education (False): The primary benefit of online education is that students do not need to be physically present. They can access lectures and materials from any location with an internet connection.

Report an error

Describe the issue with this question. Our team will review it.

Question ID: 11059

Question 30 of 1010

A computer uses 8-bit 2's complement representation. Which of the following operations will cause overflow?

Explanation

Note: Options A,B, C cause overflow but As per the Provisional Answer Key Option C is Correct

In 8-bit 2's complement representation, the range of representable integers is -128 to +127. An overflow occurs when the result of an addition falls outside this range. This happens if:

  1. Two positive numbers are added and the result is negative (MSB is 1).

  2. Two negative numbers are added and the result is positive (MSB is 0).

Based on the calculations, Options A, B, and C all cause an overflow.

Detailed Analysis:

  • Option A: $01010101 + 00110011$

    • Decimal: $85 + 51 = 136$.

    • $136$ is greater than the maximum limit of $127$.

    • Binary result: $10001000$ (The MSB is 1, interpreting two positive numbers as a negative result).

    • Result: Overflow.

  • Option B: $10011001 + 10101010$

    • Decimal: $-103 + (-86) = -189$.

    • $-189$ is less than the minimum limit of $-128$.

    • Binary result: $01000011$ (The MSB is 0, interpreting two negative numbers as a positive result).

    • Result: Overflow.

  • Option C: $01111111 + 00000001$

    • Decimal: $127 + 1 = 128$.

    • $128$ is greater than the maximum limit of $127$.

    • Binary result: $10000000$ (The largest positive number plus one yields the smallest negative number).

    • Result: Overflow.

  • Option D: $11110000 + 00010000$

    • Decimal: $-16 + 16 = 0$.

    • $0$ is within the range $[-128, 127]$.

    • Binary result: $00000000$.

    • Result: No Overflow.

Report an error

Describe the issue with this question. Our team will review it.

Question ID: 11058

Login to view more questions

Login to Continue
Please Login to view more and Get a subscription to view all 1010 questions. You can view 30 questions without a subscription.