MCQOPTIONS
Saved Bookmarks
This section includes 53 Mcqs, each offering curated multiple-choice questions to sharpen your Aricent knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
Which of the following is used to interpret Java Applet classes ? |
| A. | Appletviewer |
| B. | Watchapplet |
| C. | Appletscreen |
| D. | None of these |
| Answer» B. Watchapplet | |
| 2. |
What is the significance of swap space in the disk? |
| A. | Saving all URLs |
| B. | Storing the super-block |
| C. | Saving process data |
| D. | Storing device drivers |
| Answer» D. Storing device drivers | |
| 3. |
Which of the following is not linked list in DSA ? |
| A. | Insertion |
| B. | Deletion |
| C. | Searching |
| D. | Comparing |
| Answer» E. | |
| 4. |
Ritu asked Rashmi not to meddle in her affairs. |
| A. | intercede |
| B. | impose |
| C. | cross |
| D. | Interfere |
| Answer» E. | |
| 5. |
What command is used to remove the directory? |
| A. | rdir |
| B. | remove |
| C. | rd |
| D. | rmdir |
| Answer» E. | |
| 6. |
What command is used to remove files? |
| A. | dm |
| B. | rm |
| C. | delete |
| D. | erase |
| Answer» C. delete | |
| 7. |
What command is used to count the total number of lines, words, and characters contained in a file? |
| A. | countw |
| B. | wcount |
| C. | wc |
| D. | count p |
| Answer» D. count p | |
| 8. |
Only filenames and extensions are to be displayed in wide format, which command you'll use? |
| A. | Dir/w |
| B. | Dir a: |
| C. | Dir/s |
| D. | Dir/b |
| Answer» B. Dir a: | |
| 9. |
Which command lists the contents of current directory of a disk |
| A. | Copy |
| B. | Tree |
| C. | Cd |
| D. | Dir |
| Answer» E. | |
| 10. |
Which of the following extensions suggest that the file is a backup copy. |
| A. | Bak |
| B. | Bas |
| C. | Com |
| D. | Txt |
| Answer» B. Bas | |
| 11. |
If you need to duplicate the entire disk, which command will you use? |
| A. | Copy |
| B. | Diskcopy |
| C. | Chkdsk |
| D. | Format |
| Answer» C. Chkdsk | |
| 12. |
Each time you turn on your computer, it will check on the control file |
| A. | Command.com, io.sys |
| B. | Command.com, date.com, dir.com |
| C. | Command.com, io.sys, msdos.sys |
| D. | Chkdsk.exe |
| Answer» D. Chkdsk.exe | |
| 13. |
Which command divides the surface of the blank disk into sectors and assign a unique address to each one |
| A. | Ver |
| B. | Format |
| C. | Fat |
| D. | Chkdsk |
| Answer» C. Fat | |
| 14. |
If you don't know the current time, which command will you use to display |
| A. | Copy |
| B. | Ver |
| C. | Time |
| D. | Format |
| Answer» D. Format | |
| 15. |
While working with Ms-Dos which command transfers a specific file from one disk to another? |
| A. | Copy |
| B. | Diskcopy |
| C. | Time |
| D. | Rename |
| Answer» B. Diskcopy | |
| 16. |
In MS-Dos what command you will use to display system date? |
| A. | Date command |
| B. | Ver command |
| C. | Disk command |
| D. | Format command |
| Answer» B. Ver command | |
| 17. |
In MS-Dos 6.22, which part identifies the product uniquely |
| A. | MS |
| B. | DOS |
| C. | MS-DOS |
| D. | 6.22 |
| Answer» E. | |
| 18. |
A systems theory of organization sees the firm as a |
| A. | network of resource flows |
| B. | system transforming inputs into outputs |
| C. | physical system managed by a manager using a conceptual system |
| D. | All of the above |
| Answer» E. | |
| 19. |
The computer can potentially be used to monitor most of our actions, thus robbing us of _____ |
| A. | tapping |
| B. | privacy |
| C. | back log |
| D. | security |
| Answer» C. back log | |
| 20. |
The _____ is a business-oriented data-processing association which publishes a monthly journal, Data Management. |
| A. | DPMA |
| B. | CDP |
| C. | CISA |
| D. | ACM |
| Answer» B. CDP | |
| 21. |
_____ are knowledge based system to which present rules are applied to solve a particular problem. |
| A. | ES |
| B. | AI |
| C. | KBS |
| D. | Base rule 0 |
| Answer» B. AI | |
| 22. |
An EOQ formula is an example of a(n) |
| A. | optimizing model |
| B. | static model |
| C. | deterministic model |
| D. | All of the above |
| Answer» E. | |
| 23. |
Inventory is also referred to as: |
| A. | stock |
| B. | warehouse capacity |
| C. | materials |
| D. | materials in hand |
| Answer» B. warehouse capacity | |
| 24. |
Critical path of the PERT chart is: |
| A. | path which takes the longest time to complete the project |
| B. | the shortest path |
| C. | both of the above |
| D. | path which takes the shortest time to complete the project |
| Answer» B. the shortest path | |
| 25. |
A lockbox service is used for |
| A. | depositing cash when bank is closed |
| B. | paying bank customer bills automatically |
| C. | storing papers in a bank vault |
| D. | depositing payments to bank customers |
| Answer» E. | |
| 26. |
Controls of data communication deal with |
| A. | the communication channel |
| B. | the computer |
| C. | terminals |
| D. | All of the above |
| Answer» E. | |
| 27. |
Which of the following is(are) true of the EDP auditors? |
| A. | they should have computer expertise |
| B. | they will be replaced by traditional auditors in the near future |
| C. | two of the above |
| D. | currently, there is a very high demand for them, particularly from firms that use personal computers |
| Answer» B. they will be replaced by traditional auditors in the near future | |
| 28. |
Assume, you are the administrator of the TUNA domain. You need to allow Lisa from the BASS domain to administrate the TUNA domain while you are on vacation. A one-way trust relationship has been set up so that TUNA trusts BASS. Which group assignments would accomplish your needs? |
| A. | Create a global group in the TUNA domain called Tuna-Admins that contains the BASSWLisa user account. Add the Tuna-Admins group to the local Administrators group in TUNA |
| B. | Create a local group in TUNA called Tuna-Admins that contains the BASSWLisa user account. Add the Tuna-Admins group to the global Domain Admins group in TUNA |
| C. | Create a global group in BASS called Gbl-Admins that contains the Lisa user account. Add the BASSGbl-Admins group to the local Administrators group in TUNA |
| D. | Create a local group in BASS called Loc-Admins that contains the Lisa user account. Create a global group in TUNA called Tuna-Admins that contains the BASSWLoc-Admins group. Add the Tuna-Admins group |
| Answer» D. Create a local group in BASS called Loc-Admins that contains the Lisa user account. Create a global group in TUNA called Tuna-Admins that contains the BASSWLoc-Admins group. Add the Tuna-Admins group | |
| 29. |
What must you do to create a printer pool containing four shared printers on your Windows NT Server computer? |
| A. | Set up all the printers to share the same parallel port |
| B. | Set individual printer properties for each printer |
| C. | Set up all printers as network-interface printer devices |
| D. | Specify the same printer driver and settings for all printers |
| Answer» E. | |
| 30. |
Windows Naming Service (WINS) |
| A. | dynamically allocates IP addresses to client computers |
| B. | runs on Windows NT W/S |
| C. | resolves computer names to IP addresses |
| D. | Increases broadcast traffic |
| Answer» D. Increases broadcast traffic | |
| 31. |
Most routers can also act as bridges |
| A. | True |
| B. | FALSE |
| C. | resolves computer names to IP addresses |
| D. | Increases broadcast traffic |
| Answer» B. FALSE | |
| 32. |
From your client computer, you are able to access several servers on your 10Base2 Ethernet network. However, you are NOT able to access a server names RED. Other client computers are able to access RED. What is the most likely cause of the problem? |
| A. | There is an incorrect IRQ setting on the network adapter in your client computer |
| B. | There is a break in the cable |
| C. | There is a protocol mismatch between your client computer and RED. |
| D. | An excessive number of collisions are occurring on the media |
| Answer» D. An excessive number of collisions are occurring on the media | |
| 33. |
In your company, 2 Ethernet Networks are connected with a router. All network connections run TCP/IP. Your new client computer can access only the computers on your side of the router. All other computers are able to access one another. What is the most likely cause of the problem? |
| A. | incorrect termination of the destination network |
| B. | defective network adapter in the router |
| C. | incorrect subnet mask on your client computer |
| D. | incorrect subnet mask on your client computer |
| Answer» D. incorrect subnet mask on your client computer | |
| 34. |
You install Windows NT Server on a computer, making the computer a backup domain controller in an existing domain. After installation, you discover that you used the wrong domain name. What should you do? |
| A. | Change the domain name by using Control Panel |
| B. | Modify the domain name in the Registry |
| C. | Reinstall Windows NT Server |
| D. | Change the domain name by using the Emergency Repair disk |
| Answer» D. Change the domain name by using the Emergency Repair disk | |
| 35. |
You want to connect 2 networks that are both lOBaseT Ethernet networks. The 2 networks are located in separate buildings so that they are approximately 1,000 meters apart. Which media should you use? |
| A. | Type 1 STP Cable |
| B. | RG-58 A/U Coaxial Cable |
| C. | fiber-optic cable |
| D. | wireless infrared |
| Answer» D. wireless infrared | |
| 36. |
In heavily overloaded networks, cross-bar switching offers better performance than cell-backplane switching |
| A. | True |
| B. | FALSE |
| C. | fiber-optic cable |
| D. | wireless infrared |
| Answer» C. fiber-optic cable | |
| 37. |
How do you configure a printing pool? |
| A. | Associate one print device with multiple printers |
| B. | Associate multiple print devices with one printer |
| C. | Associate multiple print devices with multiple printers |
| D. | Associate one physical print gear port with multiple printers |
| Answer» C. Associate multiple print devices with multiple printers | |
| 38. |
Which command is used to remove the read permission of the file 'note' from both the group and others? |
| A. | chmod go+r note |
| B. | chmod go+rw note |
| C. | chmod go-x note |
| D. | chmod go-r note |
| Answer» E. | |
| 39. |
Which command sends the word count of the file infile to the newfile. |
| A. | wc infile >newfile |
| B. | wc newfile |
| C. | wc infile - newfile |
| D. | wc infile | newfile |
| Answer» B. wc newfile | |
| 40. |
Which command is used to extract specific columns from the file? |
| A. | cat |
| B. | cut |
| C. | grep |
| D. | paste |
| Answer» C. grep | |
| 41. |
Which of the following keys is used to replace a single character with new text? |
| A. | S |
| B. | s |
| C. | r |
| D. | C |
| Answer» C. r | |
| 42. |
Which command is used to remove a directory? |
| A. | rd |
| B. | rmdir |
| C. | dldir |
| D. | rdir |
| Answer» C. dldir | |
| 43. |
Which command is used to change protection mode of files starting with the string emp and ending with 1,2, or 3? |
| A. | chmod u+x emp[1-3] |
| B. | chmod 777 emp* |
| C. | chmod u+r ??? emp |
| D. | chmod 222 emp? |
| Answer» B. chmod 777 emp* | |
| 44. |
Which command is used to copy all files having the string chap and any two characters after that to the progs directory? |
| A. | cp chap?? progs |
| B. | cp chap* progs |
| C. | cp chap[12] /progs/*.* |
| D. | cp chap?? /progs/* |
| Answer» B. cp chap* progs | |
| 45. |
Which command is used to display the top of the file? |
| A. | cat |
| B. | head |
| C. | more |
| D. | grep |
| Answer» C. more | |
| 46. |
Which command is used to sort the lines of data in a file in reverse order |
| A. | sort |
| B. | sh |
| C. | st |
| D. | sort -r |
| Answer» E. | |
| 47. |
Which symbol will be used with grep command to match the pattern pat at the beginning of a line? |
| A. | ^pat |
| B. | $pat |
| C. | pat$ |
| D. | pat^ |
| Answer» B. $pat | |
| 48. |
Which of the following is used to interpret Java Applet classes ? |
| A. | Appletviewer |
| B. | Watchapplet |
| C. | Appletscreen |
| D. | None of these |
| Answer» B. Watchapplet | |
| 49. |
Evaluate following expression: a=3, b=6,c=4,d=2 a=b>c && b-c= a+c |
| A. | 0 |
| B. | 1 |
| C. | Error |
| D. | None of these |
| Answer» C. Error | |
| 50. |
What is the significance of swap space in the disk? |
| A. | Saving all URLs |
| B. | Storing the super-block |
| C. | Saving process data |
| D. | Storing device drivers |
| Answer» D. Storing device drivers | |