1. _______ is a Windows utility program that locates and eliminates unnecessary fragments and rearranges files and unused disk space to optimize operations
A. Backup
B. Disk cleanup
C. Disk defragmenter
D. Restore
E. Disk restorer
2. Which of the following file name extension suggests that the file is Backup copy of another file?
A. TXT
B. COM
C. BAS
D. BAK
E. None of these
3. SAP is an identifying label for network endpoints used in Open Systems Interconnection (OSI) networking. what is the meaning of ‘SAP’?
A. Smart Access Point
B. Service Access Point
C. Service At Point
D. Service Access Permission
E. None of these
4. What is the name of the chip which has more than one processor on it?
A. Parallel chip
B. Multi -processor chip
C. Transputer
D. Parallel processor
E. None of these
5. What kind of lock includes a keypad that can be used to control access into areas?
A. Cipher
B. Warded
C. Device
D. Tumbler
E. None of these
Answers and Explanations
1. Answer - Option C
Explanation -
Disk Defragmenter is a utility in Microsoft Windows designed to increase access speed by rearranging files stored on a disk to occupy contiguous storage locations, a technique called defragmentation.
Note: From Windows 8, the program was renamed to Defragment and Optimize Drives.
2. Answer - Option D
Explanation -
'.BAK' is a file name extension used to signify a backup copy of a file. This common ‘.bak’ the naming scheme makes it possible to retrieve the original contents of the file.
3. Answer - Option B
Explanation -
SAP is one of the largest vendors of enterprise resource planning (ERP) software and related enterprise applications. The company's ERP system enables its customers to run their business processes, including accounting, sales, production, human resources and finance, in an integrated environment.
4. Answer - Option B
Explanation -
Multi- processor chip involves more than one processor placed on a single chip. CMP as compared to uni-processor fills up processor die with multiple relatively simpler processor cores in steal of just huge core.
Note: The transputer was a pioneering microprocessor architecture of the 1980s, featuring integrated memory and serial communication links, intended for parallel computing.
5. Answer - Option A
Explanation -
Cipher locks are used to control access to areas of a facility that are sensitive. e.g airport research and development laboratories areas within financial institutions etc.
A cipher lock may have four of five push buttons depending on the manufacture.