Explore topic-wise MCQs in Aricent.

This section includes 53 Mcqs, each offering curated multiple-choice questions to sharpen your Aricent knowledge and support exam preparation. Choose a topic below to get started.

1.

Which of the following is used to interpret Java Applet classes ?

A. Appletviewer
B. Watchapplet
C. Appletscreen
D. None of these
Answer» B. Watchapplet
2.

What is the significance of swap space in the disk?

A. Saving all URLs
B. Storing the super-block
C. Saving process data
D. Storing device drivers
Answer» D. Storing device drivers
3.

Which of the following is not linked list in DSA ?

A. Insertion
B. Deletion
C. Searching
D. Comparing
Answer» E.
4.

Ritu asked Rashmi not to meddle in her affairs.

A. intercede
B. impose
C. cross
D. Interfere
Answer» E.
5.

What command is used to remove the directory?

A. rdir
B. remove
C. rd
D. rmdir
Answer» E.
6.

What command is used to remove files?

A. dm
B. rm
C. delete
D. erase
Answer» C. delete
7.

What command is used to count the total number of lines, words, and characters contained in a file?

A. countw
B. wcount
C. wc
D. count p
Answer» D. count p
8.

Only filenames and extensions are to be displayed in wide format, which command you'll use?

A. Dir/w
B. Dir a:
C. Dir/s
D. Dir/b
Answer» B. Dir a:
9.

Which command lists the contents of current directory of a disk

A. Copy
B. Tree
C. Cd
D. Dir
Answer» E.
10.

Which of the following extensions suggest that the file is a backup copy.

A. Bak
B. Bas
C. Com
D. Txt
Answer» B. Bas
11.

If you need to duplicate the entire disk, which command will you use?

A. Copy
B. Diskcopy
C. Chkdsk
D. Format
Answer» C. Chkdsk
12.

Each time you turn on your computer, it will check on the control file

A. Command.com, io.sys
B. Command.com, date.com, dir.com
C. Command.com, io.sys, msdos.sys
D. Chkdsk.exe
Answer» D. Chkdsk.exe
13.

Which command divides the surface of the blank disk into sectors and assign a unique address to each one

A. Ver
B. Format
C. Fat
D. Chkdsk
Answer» C. Fat
14.

If you don't know the current time, which command will you use to display

A. Copy
B. Ver
C. Time
D. Format
Answer» D. Format
15.

While working with Ms-Dos which command transfers a specific file from one disk to another?

A. Copy
B. Diskcopy
C. Time
D. Rename
Answer» B. Diskcopy
16.

In MS-Dos what command you will use to display system date?

A. Date command
B. Ver command
C. Disk command
D. Format command
Answer» B. Ver command
17.

In MS-Dos 6.22, which part identifies the product uniquely

A. MS
B. DOS
C. MS-DOS
D. 6.22
Answer» E.
18.

A systems theory of organization sees the firm as a

A. network of resource flows
B. system transforming inputs into outputs
C. physical system managed by a manager using a conceptual system
D. All of the above
Answer» E.
19.

The computer can potentially be used to monitor most of our actions, thus robbing us of _____

A. tapping
B. privacy
C. back log
D. security
Answer» C. back log
20.

The _____ is a business-oriented data-processing association which publishes a monthly journal, Data Management.

A. DPMA
B. CDP
C. CISA
D. ACM
Answer» B. CDP
21.

_____ are knowledge based system to which present rules are applied to solve a particular problem.

A. ES
B. AI
C. KBS
D. Base rule 0
Answer» B. AI
22.

An EOQ formula is an example of a(n)

A. optimizing model
B. static model
C. deterministic model
D. All of the above
Answer» E.
23.

Inventory is also referred to as:

A. stock
B. warehouse capacity
C. materials
D. materials in hand
Answer» B. warehouse capacity
24.

Critical path of the PERT chart is:

A. path which takes the longest time to complete the project
B. the shortest path
C. both of the above
D. path which takes the shortest time to complete the project
Answer» B. the shortest path
25.

A lockbox service is used for

A. depositing cash when bank is closed
B. paying bank customer bills automatically
C. storing papers in a bank vault
D. depositing payments to bank customers
Answer» E.
26.

Controls of data communication deal with

A. the communication channel
B. the computer
C. terminals
D. All of the above
Answer» E.
27.

Which of the following is(are) true of the EDP auditors?

A. they should have computer expertise
B. they will be replaced by traditional auditors in the near future
C. two of the above
D. currently, there is a very high demand for them, particularly from firms that use personal computers
Answer» B. they will be replaced by traditional auditors in the near future
28.

Assume, you are the administrator of the TUNA domain. You need to allow Lisa from the BASS domain to administrate the TUNA domain while you are on vacation. A one-way trust relationship has been set up so that TUNA trusts BASS. Which group assignments would accomplish your needs?

A. Create a global group in the TUNA domain called Tuna-Admins that contains the BASSWLisa user account. Add the Tuna-Admins group to the local Administrators group in TUNA
B. Create a local group in TUNA called Tuna-Admins that contains the BASSWLisa user account. Add the Tuna-Admins group to the global Domain Admins group in TUNA
C. Create a global group in BASS called Gbl-Admins that contains the Lisa user account. Add the BASSGbl-Admins group to the local Administrators group in TUNA
D. Create a local group in BASS called Loc-Admins that contains the Lisa user account. Create a global group in TUNA called Tuna-Admins that contains the BASSWLoc-Admins group. Add the Tuna-Admins group
Answer» D. Create a local group in BASS called Loc-Admins that contains the Lisa user account. Create a global group in TUNA called Tuna-Admins that contains the BASSWLoc-Admins group. Add the Tuna-Admins group
29.

What must you do to create a printer pool containing four shared printers on your Windows NT Server computer?

A. Set up all the printers to share the same parallel port
B. Set individual printer properties for each printer
C. Set up all printers as network-interface printer devices
D. Specify the same printer driver and settings for all printers
Answer» E.
30.

Windows Naming Service (WINS)

A. dynamically allocates IP addresses to client computers
B. runs on Windows NT W/S
C. resolves computer names to IP addresses
D. Increases broadcast traffic
Answer» D. Increases broadcast traffic
31.

Most routers can also act as bridges

A. True
B. FALSE
C. resolves computer names to IP addresses
D. Increases broadcast traffic
Answer» B. FALSE
32.

From your client computer, you are able to access several servers on your 10Base2 Ethernet network. However, you are NOT able to access a server names RED. Other client computers are able to access RED. What is the most likely cause of the problem?

A. There is an incorrect IRQ setting on the network adapter in your client computer
B. There is a break in the cable
C. There is a protocol mismatch between your client computer and RED.
D. An excessive number of collisions are occurring on the media
Answer» D. An excessive number of collisions are occurring on the media
33.

In your company, 2 Ethernet Networks are connected with a router. All network connections run TCP/IP. Your new client computer can access only the computers on your side of the router. All other computers are able to access one another. What is the most likely cause of the problem?

A. incorrect termination of the destination network
B. defective network adapter in the router
C. incorrect subnet mask on your client computer
D. incorrect subnet mask on your client computer
Answer» D. incorrect subnet mask on your client computer
34.

You install Windows NT Server on a computer, making the computer a backup domain controller in an existing domain. After installation, you discover that you used the wrong domain name. What should you do?

A. Change the domain name by using Control Panel
B. Modify the domain name in the Registry
C. Reinstall Windows NT Server
D. Change the domain name by using the Emergency Repair disk
Answer» D. Change the domain name by using the Emergency Repair disk
35.

You want to connect 2 networks that are both lOBaseT Ethernet networks. The 2 networks are located in separate buildings so that they are approximately 1,000 meters apart. Which media should you use?

A. Type 1 STP Cable
B. RG-58 A/U Coaxial Cable
C. fiber-optic cable
D. wireless infrared
Answer» D. wireless infrared
36.

In heavily overloaded networks, cross-bar switching offers better performance than cell-backplane switching

A. True
B. FALSE
C. fiber-optic cable
D. wireless infrared
Answer» C. fiber-optic cable
37.

How do you configure a printing pool?

A. Associate one print device with multiple printers
B. Associate multiple print devices with one printer
C. Associate multiple print devices with multiple printers
D. Associate one physical print gear port with multiple printers
Answer» C. Associate multiple print devices with multiple printers
38.

Which command is used to remove the read permission of the file 'note' from both the group and others?

A. chmod go+r note
B. chmod go+rw note
C. chmod go-x note
D. chmod go-r note
Answer» E.
39.

Which command sends the word count of the file infile to the newfile.

A. wc infile >newfile
B. wc newfile
C. wc infile - newfile
D. wc infile | newfile
Answer» B. wc newfile
40.

Which command is used to extract specific columns from the file?

A. cat
B. cut
C. grep
D. paste
Answer» C. grep
41.

Which of the following keys is used to replace a single character with new text?

A. S
B. s
C. r
D. C
Answer» C. r
42.

Which command is used to remove a directory?

A. rd
B. rmdir
C. dldir
D. rdir
Answer» C. dldir
43.

Which command is used to change protection mode of files starting with the string emp and ending with 1,2, or 3?

A. chmod u+x emp[1-3]
B. chmod 777 emp*
C. chmod u+r ??? emp
D. chmod 222 emp?
Answer» B. chmod 777 emp*
44.

Which command is used to copy all files having the string chap and any two characters after that to the progs directory?

A. cp chap?? progs
B. cp chap* progs
C. cp chap[12] /progs/*.*
D. cp chap?? /progs/*
Answer» B. cp chap* progs
45.

Which command is used to display the top of the file?

A. cat
B. head
C. more
D. grep
Answer» C. more
46.

Which command is used to sort the lines of data in a file in reverse order

A. sort
B. sh
C. st
D. sort -r
Answer» E.
47.

Which symbol will be used with grep command to match the pattern pat at the beginning of a line?

A. ^pat
B. $pat
C. pat$
D. pat^
Answer» B. $pat
48.

Which of the following is used to interpret Java Applet classes ?

A. Appletviewer
B. Watchapplet
C. Appletscreen
D. None of these
Answer» B. Watchapplet
49.

Evaluate following expression: a=3, b=6,c=4,d=2 a=b>c && b-c= a+c

A. 0
B. 1
C. Error
D. None of these
Answer» C. Error
50.

What is the significance of swap space in the disk?

A. Saving all URLs
B. Storing the super-block
C. Saving process data
D. Storing device drivers
Answer» D. Storing device drivers