1000 Computer Science MCQs PDF
1000 Computer Science MCQs PDF
Page 2
5. ……. is a top- down approach in which one higher level entity can
be divided into two lower level entities
(A) Aggregation
(B) Specialization
(C) Generalization
(D) None of the above
13. Dr. E.F Codd represented…… rules that a database must obey if
it has to be considered truly relational.
(A) 10
(B) 15
(C) 14
(D) 12
Page 4
(C) DBMS
(D) All of the above
17. ……is a bottom –up approach in which two lower level entities
combine to form a higher level entity.
(A) Aggregation
(B) Specialization
(C) Generalization
(D) None of the above
18. An entity set that does not have sufficient attri butes to form a
primary key, is a …..
(A) Primary entity set
(B) Weak Entity set
(C)Strong Entity set
(D) None of the above
23. Which of the following constraint is used to limit the value range
that can be placed in a column?
(A) Check
(B) Default
(C) Unique
(D) None of the above
Page 6
(C) Drop
(D) None of these
Page 10
(B) Number of attributes.
(C) Number of tables.
(D) Number of constraints
Page 11
48. Which statements are use to UNLOCK the user?
(A) Alter use Scott account lock
(B) Modified user Scott account unlock;
(C) Alter user Scott account unlock;
(D) Alter user Scott unlock
50. For which two constraints are indexes created when the constraint is
added? (A) Primary key
(B) Unique
(C) Not null
(D) Both (A) & (B)
55. The users who use easy to use menu are called
(A) Sophisticated end users
(B) Naïve users
(C) Stand-alone-users
(D) Casual end users
57. What is the type of Oracle backup in which all uncommitted changes
have been removed from the Data files?
(A) Full backup
(B) Consistent backup
(C) Inconsistent backup
(D) Differential backup
58. AS clause is used in SQL for
(A) Selection operation.
(B) Rename operation.
(C) Join operation.
(D) Projection operation
Page 13
59. ODBC stands for
(A) Object Database Connectivity.
(B) Oral Database Connectivity.
(C) Oracle Database Connectivity.
(D) Open Database Connectivity.
61. The language which has recently become the de-facto standard for
interfacing application programs with relational database system is
Page 15
(C) Distinct
(D) None of the above
68. Which of the following method can be used to add more tables in a
database?
(A) Design View
(B) Table Wizard
(C) Both A and B
(D) None of the above
69. Which of the following field type is the best to store serial numbers?
(A) Number
(B) Auto Number
(C) Text
(D) Memo
DBMS SET-2
1. _____ is the process of using graph theory to analyse he node and connection
structure of a Web site.
(A)Web structure mining
(B)Web content mining
(C)Web usage mining
(D)None of the above
5.The process of grouping a set of objects into classes of similar objects is called
_________
(A)Clustering
(B)Classification
(C) Association
(D) All of the above
8.Which of the following is the process for detecting and correcting the wrong data?
(A)Data Selection
(B)Data Cleaning
(C)Data Integration
Page 17
(D)None of the Above
9. An important purpose of the shared pool is to cache the executive version of _______
statements.
(A)SQL
(B)PL/SQL
(C)Both (A) and (B)
(D)None of the above
10.Which of the following is/are main component(s) of the shared pool? (A)Library
Cache
(B)Dictionary Cache
(C)Both (A) and (B)
(D)None of the above
11.Which of the following is the process of combining data from different resources?
(A)Data Selection
(B)Data Cleaning
(C)Data Integration
(D)None of the Above
12.Which stores the executives(parsed) forms of SQL cursors and PL/SQL (A)Library
Cache
(B)Dictionary Cache
(C)Both (A) and (B)
(D)None of the above
14.Oracle Database segregates a small amount of the shared pool for large objects(over
5kb).The segregated area of the shared pool is called _______
(A)Fixed Pool
(B)Reserved Pool
(C)Allocated Pool
(D)None of the Above
15.When a query is submitted to oracle server for execution, oracle checks if same que
has been executed previously. If found the same then this event is known as _______
(A)Library cache hit
(B)Soft parsing
(C)Both (A) and (B)
(D)None of the above
17.If the parsed form of the statement is not found in the shared pool hen new statement
is parsed and its parsed version is stored is Shared SQL area.This is known as ________
(A)Library cache hit
(B)Soft parsing
(C)Hard parsing
(D)None of the above
18.Reuse of shared SQL for multiple users running the same applications avoids
________
(A)Library cache hit
(B)Soft parsing
(C)Hard parsing
(D)None of the above
Page 19
(A)Scalability
(B)Reliability
(C)One Development model
(D)All of the above
25.__________ is a tool for entering and running ad-hoc based database statements.
(A)mySQL
(B)PL/SQL
(C)SQL*PLUS
(D)None of the above
Page 21
27.The ____________ process is used for inter-instance locking in Real Application
Clusters.
(A)Front Manager Server
(B)Back Manager Server
(C)Lock Manager Server
(D)None of the above
28.__________ is a tool for entering and running ad-hoc based database statements.
(A)mySQL
(B)PL/SQL
(C)SQL*PLUS
(D)None of the above
29. The __________ performs process recovery when a user process fails.
(A)Log Writer(LGWR)
(B)Checkpoint(CKPT)
(C)System Monitor(SMON)
(D)Process Monitor(PMON)
30.What type of failure occurs when Oracle fails due to an operating system or compute
hardware failure? (A)Application Failure
(B)Instance Failure
(C)Media Failure
(D)Roll back Failure
32. Which Oracle backup and recovery file contains user and system data?
(A)Control file
(B)Data File
(C)Offline Redo file
(D)None of the above
33.When is the System Global Area (SGA) created in Oracle database environment?
(A)When the database is created
(B)When a user process is started
(C)When the database is mounted
(D)When the instance is started
35.Which password management feature ensure a user cannot reuse a password for a
Page 23
specified time interval?
(A)Account Locking
(B)Password History
(C)Password verification
(D)None of the above
36.What is the type of Oracle backup is which all uncommitted changes have been
removed from the data files?
(A)Full backup
(B)Consistent backup
(C)Inconsistent backup
(D)Differential backup
(A)Oracle
(B)Microsoft access
(C)MySQL
(D)None of the above
43.Which of the following data type holds a string with maximum length of 255
characters?
(A)Text
(B)Medium Text
(C)Long Text
(D)Tiny Text
Page 25
(A)Insert
(B)Update
(C)Directory
(D)None of the above
51.Which of the following datatype holds a string with maximum length of 255
characters?
(A)Text
(B)Medium Text
(C) Long Text
(D)Tiny Text
52.Long data type allows whole numbers between__________________ (A)0
to 255
(B) -32,768 to 32,767
(C)-2, 147, 483, 648 to 2, 147, 483, 647
(D)None of the above
53. Which of the following clauses is an additional filter that is applied to the result?
(A)Having
(B)Group-by
(C)Select
(D)Order by
Page 27
57. An operator is basically a join followed by a project on the attributes of first relation
is know as ______________________
(A) Join
(B) Inner Join
(C)Full join
(D)Semi-join
58.Which of the following is a special type of integrity constraint that relates two
relations and maintains consistency across the relations?
(A)Entity Integrity Constraints
(B)Referential Integrity Constraints
(C)Domain Integrity Constraints
(D)None of the above
59. The candidate key is that you choose to identify each row uniquely is
called___________ (A)Primary Key
(B)Foreign key
(C)Alternate key
(D)One of the above
60. Which of the following is preferred method for enforcing data integrity?
(A)Cursors
(B)Constraints
(C)Triggers
(D)None of the above
61.Which allows to make copies of the database periodically to help in the cases of
crashes and disasters? (A)Recovery utility
(B)Data loading utility
(C)Monitoring utility
(D)Backup utility
62. Each modification done in database transaction are first recorder into
the____________
(A)Hard Driver
(B)Disk
(C)Log file
(D)Data Mart
Page 29
64.DBMS may be combined with or used by_________type of transaction manager.
(C) BETWEEN
(D) None of the above
68. In SQL, which of the following wildcard character is used as a substitute for
Zero or more characters?
(A) *
(B) _
(A)DB2
(C)Oracle
(A) LIKE
(B) IN
(C) ^
(D) %
(C) table
Page 31
(B) cell
71. Which allows to make copies of the database periodically to help in the cases
Of crashes and disasters?
(A)Recovery Utility
(B)Data loading utility
(C)Monitoring utility
(D)Backup utility
72. which of the following is standard interactive and programming language for getting
information from and updating a database .
(A) SQL
(B) PHP
( C) ASP
(D)None of the above
Page 33
76. OLAP stands for____________
(A) Online Arithmetic processing
(B) Online Analysis Processing
(C) Online Analytical Processing
(D)None of the above
79.Which method of online Analytical Processing stores data in both a rel ational and a
multi dimensional database.
(A) Hybrid OLAP
(B) Relation OLAP
(C) OLAP
(D)None of the above
80.Which of the following keyword can be used to return different value?
(A) SELECT
(B) GET
(C) OPEN
(D) DISTINCT
81. __________ operator is used to display a record if either the first condition or the
second condition is true?
(A) AND
(B) OR
(C) Both(A) & (B)
(D) None of the above
84. ______________is the multiplication of all the values in the attributes? (A)
set difference
(B) Cartesian product
(C) intersection
(D) None the above
Page 35
85.Which of the following DBMS provides faster response time and better
performance (A) Relational Database Management System(RDBMS)
(B) No SQL DBMS
(C) In-Memory Database Management System(IMBDMS)
(D) None of the above
86.In SQL the spaces at the end of the string are removed by___________function ?
(A) Lower
(B) string
(C) Trim
(D)None the above
87. __________is used to save permanently any transaction into database? (A)
commit
(B) rollback
(C) savepoint
(D) None of the above
88.Which command is used to remove a relation from an SQL Database? (A)
(B) Remove
89. Which of the following operator used for appending two strings?
90. A unit of storage that can store one or more records in a hash file organization is
denoted as_____________?
Delete
(C) Drop
(A) %
(B) &
Page 37
(C) +
(D) II
(A) Bucket
(b) Disk pages
(C) Blocks (D)
Nodes.
ORACLE
1. LGWR process writes information into
a. Database files
b. Control files
c. Redolog files d All the above.
Page 39
d. All of the above.
10. It is very difficult to grant and manage common privileges needed by different
groups of database user using the roles a. True
b. False
14
a. Yes
b. No
Page 41
b. Because the stored procedure occupies more space in the database than a
integrity constraint definition
c. Because a stored procedure creates more network traffic than a integrity
constraint definition
18. Which of the following is not an reason for the fact that most of the processing
is done at the server ?
a. To reduce network traffic.
b. For application sharing
c. To implement business rules centrally,
d. None of the above
22. The system variable that records the select statement that SQL * FORMS most
recently used to populate a block is
a. SYSTEM.LAST_RECORD
b.SYSTEM.CURSOR_RECORD
c. SYSTEM.CURSOR_FIELD
d. SYSTEM.LAST_QUERY
23. Which of the following is TRUE for the ENFORCE KEY field
a. ENFORCE KEY field characterstic indicates the source of the value that
SQL*FORMS uses to populate the field
b. A field with the ENFORCE KEY characterstic should have the INPUT
ALLOWED
charaterstic turned off
a .Only 1 is TRUE
b. Only 2 is TRUE
c. Both 1 and 2 are TRUE
d. Both 1 and 2 are FALSE
24 . The packaged procedure that makes data in form permanent in the Database is
a. Post
b. Post form
c. Commit form
d. None of the above
. Identify the RESTRICTED packaged procedure from the following
25
a. USER_EXIT
b. MESSAGE
c. BREAK
d. EXIT_FORM
. Which of the following packaged procedure is UNRESTRICTED ?
27
a. CALL_INPUT
b. CLEAR_BLOCK
c. EXECUTE_QUERY
. A FORM is made up of which of the following
d. USER_EXIT
objects
28
a. block, fields only,
b. blocks, fields, pages only,
Page 43
c. blocks, fields, pages, triggers and form level procedures,
d. Only blocks.
29. Which of the following is TRUE for the SYSTEM VARIABLE $$date$$
a. Can be assigned to a global variable
b. Can be assigned to any field only during design time
c. Can be assigned to any variable or field during run time
d. None of the above
Page 45
38. Name th
a. FMB
b. FMR
c. INP & e two files that are created when you generate a form using Forms 3.0
& FMX
d. None of
& FDX
FRM
39. Data dict the above
a. TRUE
b. FALSE ionary can span across multiple Tablespaces
40
dropped
. All datafiles related to a Tablespace are removed when the Tablespace is
a. TRUE
b. FALSE
b. No
42. A column defined as PRIMARY KEY can have NULL?
a. TRUE
b. FALSE
43. Size of Tablespace can be increased by
a. Increasing the size of one of the Data files
b. Adding one or more Data files
c. Cannot be increased
d. None of the above
46
. Which of the following is not correct about User_Defined Exceptions ?
a. Must be declared
b. Must be raised explicitly
c. Raised automatically in response to an Oracle error
d. None of the above
47. Declare
End;
Page 47
d. None of the above
49. A Stored Procedure is a
a. Sequence of SQL or PL/SQL statements to perform specific function
b. Stored in compiled form in the database
c. Can be called from all client environmets
d. All of the above
51
a.Open the Cursor
b.Fetch the Cursor
c.Close the Cursor
53
d. A Procedure or Sequence of stat
. Which of the following is not correct about an
c. Stored procedure
d. Shared pool Exception ?
a. Raised automatically / Explicitly in
response to an ORACLE_ERROR
b. An exception will be raised when an
error occurs in that block
c. Process terminates after completion of error sequ
ements may be processed.
Page 49
56. Which of the following is not correct about Cursor ?
a. Cursor is a named Private SQL area
b. Cursor holds temporary results
c. Cursor is used for retrieving multiple rows
d. SQL uses implicit Cursors to retrieve rows
60
a In compiled form
b. As source code
d. Not store c. Both A & B
c. INSERT
d. FETCH
Page 51
67. Declare a number := 5; b number := null; c
number := 10; Begin
if a > b AND a ( Select count(*) from Emp E2 where E1.SAL > E2.SAL ) will
retrieve
a. 3500,5000,2500
b. 5000,2850
c. 2850,5750
d. 5000,5750
modify a Data type of a column when column contains data ?
68. Is it possible to
a. Yes
b. No owing is not correct about a View ? of
the columns of a table from other users
69 . Which of the foll
a. To protect some
b. Ocupies data storage space
c. To hide complexity of a query
d. To hide complexity of a calculations
Page 53
c. Run_Product built_in
d. Call_Product built_in
b. No. What type of file is used for porting Forms 4.5 applications to various platfor
82 a . FMB file
? b . FMX file
c . FMT file
d . EXE file
b. No
86. A CONTROL BLOCK can sometimes refer to a BASE TABLE ?
a. TRUE
b. FALSE
Page 55
. When a form is invoked with CALL_FORM does Oracle forms issues
89
SAVEPOINT ?
a.Yes
b. No
90
a. Yes
b. No
. Can we attach the same LOV to different fields in
91 Design time ?
92. Can you copy the PROGRAM UNIT into an Object group ?
a. Yes
b. No
93. What is an ALERT ?
a. Modeless window
b. Modal window
c. Both are TRUE
d. None of the above
94. How do you pass values from one form to another form ?
a. LOV
b. Parameters
c. Local variables
d. None of the above
Page 57
b. No
99. Can an Alert message be changed at runtime ?
a. Yes
b. No
101 . If the maximum records retrieved property of a query is set to 10, then a
summary value will be calculated
a. Only for 10 records
b. For all the records retrieved
10 . EXP command is c.
used
For all the records in the referenced table
2 a)To take Backup of the Oracle database
b)To import data
c)To create Rollback segments
d)None of the above
form the exported dump file
10
3 c)Proce . What are the types of Calculated columns available?
a)Summary, Place holder and Procedure column
b)Summary, Procedure and Formula columns
dure, Formula and Place holder columns
a).RDF file & .RPX d)Summary,
file Formula and Place holder columns
b).RDX file & .RDF file
10c).REP file & .RDF file
. What are the different file extensions that are created by
4 None of the above Oracle Reports?
d)
COMPUTER NETWORKS
1. A protocol that provides configuration information from a table is called…..
Page 59
A. BGP
B. BOOTP
C. FTP
D. None of the above
6. In PPP, A three- way handshaking protocol used for authentication is known as…...
A. CHAP
B. BOOTP
C. FTP
D. None of the above
7. Which of the following is an application service for the retrieving a web document
A. HTML
B. HTTP
C. FTP
D. None of the above
8. You are in the process of analyzing a problem that requires you to collect and
store TCP/ IP Packets.Which of the following utilities is best suited for this
purpose?
A. Performance Moniter
B. Network Moniter
C. NETSTAT
D. NBTSTAT
9. A protocol in which the sender sends one frame and stops until it receives
confirma from the receiver?
A. Stop and Wait ARQ
B. Store and forward switch
C. Stop and Wait protocol
D. None of the above
10. An addressing method in which the IP address space is not divided into classes?
A. Classful addressing
B. Classless addressing
C. Classless IDR
D.None of the above
11. The number of differences between the corresponding bits in a two data words is
known as…….distance
A. Hanning
B. Hamming
C. Huffman
D. None of the above
Page 61
D. None of the above
C. Broadcast
13. Which of the following protocol provides confidentiality and authentication for
an e-mail? A. BGP
B. BOOTP
C. PGP
D. None of the above
15. The loss of signal‘s energy due to the resistance of medium is called……… A.
Fragmentation
B. Attenuation
C. Synchronization
D. None of the above
16. The splitting of a message into multiple packets at transport layer is known
as__________ A. Fragmentation
B. Segmentation
C. Synchronization
D. None of the above
17.An array of switches that are used to reduce the number of cross points is
called…… A. Single stage switch
B. Dual stage switch
C.Multistage switch
D.None of the above
18. An application protocol of TCP/IP that allows remote login is known as……….
A. NCP
B. NVT
C. NAV
D. None of the above
19. In Wireless LAN‘s, a time interval between two frames to control access to the
channel is called………
A. Interframe space
B. Interleaving
C. Interior routing
D. None of the above
Page 63
C. Transport
D. Presentation
24. What is the main function of transport layer in the OSI model?
A. Peer to peer message delivery
B. Node to node message delivery
C. Process to process message delivery
D. None of the above
25. ADSL stands for
A. Asynchronous Digital Subscriber Line
B. Asymmetric Digital Subscriber Line
C. Advanceed Digital Subscriber Line
D. Asynchronous Digital Security Line
26. In OSI model, as the data packet moves from the upper to the lower layers, header
are _____
A. Added
B. Removed
C. Deleted
D. Edited
27
A. Session
. Which of the following layer is the User Support layer?
layer
B. Presentation layer
28 C. Application layer
D. All of the above
. OSI stands for……
A. Open Systems Interconnection
29 B. Original Systems Inte rconnection
C. Original Security Interconnection
D. Open Software Interconnection
A. 16
B.. Port
32 address in TCP/IP is…..bits long
30 C. 64
D. 128
Page 65
D. Synchronization
35. What is the minimum & maximum frame length for 10 Mbps Ethernet?
A. 32 bytes,64 bytes
B. 64 bytes,128 bytes
C. 64 bytes,1518 bytes
D. 32 bytes, 1518 bytes
39. Which of the following is a timer used for Collision Avoidance (CA)?
A. PCF
B. MAC
C. NAV
D. None of the above
40. Which of the following refers to a groups of standards that are still being develope
as a part of overall IEEE 802.11 WLAN support?
A. 802.11
B. 802.11x
C. Both (A) & (B)
D. None of the above
41. Ethernet, token ring and token bus are types of……..
A. MAN
B. WAN
C. LAN
D. None
B. Mesh
C. Ring
D. None
Page 67
43. Peer-to-peer (P2P) is a ……….communications model
A. Centralized
B. Decentralized
C. Client/server
D. None
44. Which TCP/IP protocol is used for file transfer with minimal capability and minim
overhead?
A. SGMP
B. TFTP
C. SUMP
D. None
54. A device which devices the incoming signal into low frequencies to sec to voice
device, and high frequencies for data to the computer.
A. Multicast router
B. Interface
Page 69
D. None
C. Splitter
56. Which layer establishes, maintains & Synchronizes the interaction between
communicating devices?
A. Physical
B. Datalink
C. Application
D. Session
Page 71
D. Datalink layer
62. At which layer TCP/IP defines two protocols: Transmission control Protocol(TCP
and Use Datagram Protocol(UDP)?
A. Transport layer
B. Application layer
C. Network layer
D. Datalink layer
63. Which of the following uses the greatest number of layers in the OSI model?
A. Bridge
B. Repeater
C. Router
D. Gateway
Page 73
68. Which protocol does Ping use?
A. UDP
B. ICMP
C. TCP/IP
D. None
70. Which protocol working at the Transport layer provides a connectionless service
between hosts?
A. UDP
B. ARP
C. TCP/IP
D. None
71. With respect to a network interface card, the term 10/100 refers to
A. Protocol Speed
B. A fiber speed
C. Megabits per second
D. None
72. If you Want to locate the hardware address of a local device, which protocol
Would you use
A. UDP
B. ARP
C. NCP
D. None
73. What protocol does PPP use to identify the Network Layer Protocol? A.
UDP
B. ICMP
C. NCP
D. None
74. Which of the following TCP/IP protocol is used for transferring electronic
mail
A. TCP
B. SMTP
C. NCP
D. None
75. ________is the continuous abilty to send and receive data between interconnected
networks.
A. FTP
B. SMTP
C. TNS
D. Network interoperability
76. ______ is primarily used for mapping host names and email destinations to IP
address
A. TCP
B. DNS
C. NCP
D. None
A. 127.0.0.1
B. 255.0.0.0
C. 255.255.0.0
Page 75
D. 127.0.0.0
86. Which OSI layer divides a file into segments that are anefficient size for routing?
A. Transport Layer
B. NetworK Layer
C. Datalink Layer
D. None
8
7. FDDI stands for
A. Fiber Data Distribution interface
B. Fiber Distributed Data interface
C. Fixed Data Distribution Interface
8 D. None
8
. A net point of network is device
working called that forwards data packets along networks and acts a
A. Repeater
B. Router
C. Bridge
D. Hub
8 . Repeater
A. application laye operates in which layer of OSI model?
9 r
B. Presentation layer
C. Physical layer
D . Transport layer
Page 77
9
0
A. Physical layer
B. Data link layer
C. Both (1) and (2)
D. Application layer
92. Which of the following are the types of internal Network Cards?
A. Peripheral Component Interconnect (PCI), Wireless Network Card
B. Industry Standard Architecture (ISA), Wireless Network Card
C. Peripheral Component Interconnect (PCI),Industry Standard Architecture (ISA
D. None of the above
93. Which of the following IEEE Standard is used for Wi-fi system? A. 802.11
B. 802. 1
C. 802.2
D. 802.10
94. __________ refers to a family of IEEE standards dealing with local area
network a metropolitan area network.
A. 802
B. 800
C. 801
D. 803
95. Which is the general network standard for the data link layer in the OSI
Reference Model?
A. IEEE 802.1
B. IEEE 802.2
C. IEEE 802.3
D. IEEE 802.4
Page 79
C. Network Layer
D. All of these
98. The access method used in PCF MAC sub-layer is
A. CSMA/CD
B. CSMA/CA
C. Polling
D. None of the above
Page 81
DATA STRUCTURE
1. In linked list , an element can be inserted at_______
(A)Beginning of the list
(B)End of the list
(C)Middle of the list
(D)Both (A) & (B)
4.A characteristic of the data that binary search uses but linear search ignores
is______
(A)Order of the list
(B)Length of the list
(C)Both (A) & (B)
(D)None of the above
7.In an extended _ binary tree, the nodes with two children are called…..
(A)Interior node
(B)Domestic node
(C)Internal node
(D)Inner node
8.Which of the following is / are real time application (S) of Circular link ed list?
(A)Printer
(B)Multi player games
(C)Interrupts handling in real _ time system
(D)All of the above
Page 83
(C)Branch
(D)None of the above
11.To insert a node in a circular list at rear position, it should be inserted at _____ of
the Queue.
(A)Front _1 position
(B)Rear position
(C)Front position
12. Which of the following begins the search with the element that is located in the
middle of the Array?
(A)Random Search
(B)Parallel Search
(C)Binary Search
(D)Serial Search
14. In a Circular Linked list, insertion of a record involves the modification of ___
(A)1 Pointer
(B)2 Pointer
(C)3 Pointer
(D)None of the above
Page 85
(C)Both (A) & (B)
(D)None of the above
18. What is the worst case run-time complexity of binary search algorithm?
2
(A)Ο(nlog) n
(B)Ο(n )
(C)Ο(n3)
(D)Ο(n)
20.In Binary Tree Traversal , the node is visited before its left and right sub trees is
called……
(A)Pre Order
(B)In order
(C)Post order
(D)None of the above
Page 87
(B)Entry
(C)Traversal
(D)None of the above
(C)Cell
(D)Slot
24.The common way of keeping subsequent items within the table and computing
possible positions is termed as ………
(A)Direct Chaining
(B)Open Addressing
(C)Both (A) & (B)
(D)None of the above
26.Which of the following is used to find the location of an element with a given
value ?
(A)Search
(B)Iteration
27.The space required to store the values of all the constants and variables is
called________ (A)Instruction space
(B)Data space
(C)Enviornment space
28.Which algorithm solves the all pairs shortest path problem?
(A)Floyd‘s algorithm
(B)Prim‘s algorithm
(C)Both (A) & (B)
(D)None of the above
29.In Heap data structure, if the parent nodes are greater than their children
Nodes then it is called________
(A)Max Heap
(B)Min Heap
(C)Both (A) & (B)
(D)None of the above
Page 89
(C)Circular queue
(D)None of the above
(B)Quick sort
(C)Radix sort
(D)None of the above
(A)Recursion
Page 91
37. The largest elements of an Array Index is called………….
(A)Range
(B)Upper bound
(C)Lower bound
(D)None of the above
39.An algorithm that calls that calls itself directly or indirectly is called………
(A)Iteration
(B)Recursion
(C)Traversal
(D)None of the above
41. The Quick sort algorithm divides the list into_______Main parts
(A)Four
(B)Six
(C)Five
(D)Three
42.The term ― PUSH‖ is used to………… an element into a stack
(A)Update
(B)Edit
(C)Insert
(D)None of the above
43.……is a header list in which the last node contains the null pointer.
(A)Circular Header list
(B)Grounded Header list
(C)Both (A) & (B)
(D)None of the above
Page 93
47.The process of accessing data stored in a tape is similar to handle data
on………………….
(A)Linked list
(B)Tree
(C)Array
(D)Queue
48.In Binary Tree Traversal , The node is visited between the sub trees is
called………..
(A)Pre-order traversal
(B)In- order traversal
(C)Post –order traversal
(D)None of the above
Page 95
53.Which of the following search start at the beginning of the list and each
elements in the list ?
(A)Linear Search
(B)Binary Tree search
(C)Hash search
(D)None of the above
54. Stack is also called a……….
(A)Last In First Out
(B)First In First Out
(C)LIFO & FIFO
(D)None of the above
55.Which data structure is required to check balanced parenthesis In an
expression ?
(A)Linked list
(B)Queue
(C)Tree
(D)Stack
56.The memory address of the first elements of an array is called………
(A)First address
(B)Floor address
(C)Base address
(D)None of the above
Page 97
(A)Dope Vector
(B)Record
(C)Table
(D)None of the above
64.Which data structure is needed to convert infix notation to post fix notation ?
(A)Branch
(B)Queue
(C)Tree
(D)Stack
Page 99
(A)Pre order
(B)Symmetric order
(C)End order
(D)None of the above
69.A matrix in which number of zero elements are much higher than the number
of non zero elements is called
(A)Scalar Matrix
(B)Identity Matrix
(C)Sparse Matrix
(D)None of the above
70.A sort that compares each element with its adjacent elements in a list is
called……..
(A)Bubble Sort
(B)Insertion Sort
(C)Quick Sort
(D)Heap Sort
(B)Insertion sort
(C)Quick sort
(D)Bubble sort
(A)Heap sort
72.……….. is a data structure in which each node has at most two children.
(A)Red-Black Tree
(B)Binary Tree
(C)AVL Tree
(D)None of the above
73.Which of the following is the best sorting algorithm when the list is already
sorted ?
(A)Bubble Sort
(B)Insertion sort
(C)Recursive
(D)File structure
76.A linear list in which elements can be added/ removed at either end but not in
the middle is called
(A)Deque
(B)Stack
Page 101
(C)List
(D)Queue
Page 103
b. A set of compiler instructions
c. A mathematical formula
d. None of above
a. People
b. Product
c. Process
d. All of above
a. Size
b. Reliability
c. Productivity
d. Functionality
a. Bev Littlewood
b. Berry Bohem
c. Roger Pressman
d. Victor Bisili
a. Person - Months
b. Persons
c. Rupees
d. Months
a. People
b. Process
c. Product
d. Project
a. Productivity
b. Functionality
c. Quality
d. Efficiency
a. Functions
b. Procedures
c. Sub programs
d. All of the above
a. Waterfall Model
b. Spiral Model
c. Quick and Fix model
d. Prototyping Model
a. Generic Products
Page 105
b. Customised Products
c. Generic and Customised Products
d. None of the above
a. Small Projects
b. Complex Projects
c. Accommodating change
d. None of Above
20) RAD stands for ?
b. Waterfall Model
c. Prototyping Model
d. Iterative enhancement Model
a. IBM
b. Motorola
c. Microsoft
d. Lucent Technologies
a. Unambiguous
b. Distinctly Specific
c. Functional
d. All of Above
a. 3 Phases
b. 1 Phases
c. 2 Phases
d. 4 Phases a. Spiral
Model
25) Which of the following is a tool in design phase ?
a. Abstraction
b. Refinement
Page 107
c. Information Hiding
d. All of Above
a. Debugging
b. To uncover errors
c. To gain modularity
d. To analyze system
a. Basic path
b. Graph Testing
c. Dataflow
d. Glass box testing
a. Readability
b. Productivity
c. To use as small memory space as possible
d. Brevity
31) Black box testing sometimes called ?
a. Sequencing
b. Alteration
c. Iteration
d. Multiple exit from loops
Page 109
e. Only a, b and c
a. data design
b. architectural design
c. procedural design
d. interface design
a. Software
b. Hardware
c. Traning
d. All of above
43) ............ Developed a set of software quality factors that has been given the
acronym FURPS - Functinality, Usability, Reliability, performance,
Supportability ?
a. Hewlett - Packard
b. Rambaugh
c. Booch
d. Jacobson
Page 111
45) Function oriented metrics were first proposed by ?
a. John
b. Gaffney
c. Albrecht
d. Basili
46) The document listing all procedures and regulations that generally govern an
organization is the ?
48) Once object oriented programming has been accomplished, unit testing is
applied for each class. Class tests includes ?
a. is ignored
b. is partitioned according to the closeness of the datagram and storage items
c. is partitioned according to the logical closeness of the actigram
d. Both A and C
e. None of above
a. Measure
b. Measurement
c. Metric
d. None of these
b. Pictogram
c. Data flow diagram
d. Histogram
e. None of above
52) In risk analysis of spiral model, which of the following risk includes ? a.
Technical
b. Management
c. Both A and B
d. None of these
53) Which of the following is done in order a data in phase 1 of the system
development life cycle ?
Page 113
54) The model remains operative until the software is retired ? a. Waterfall
b. Incremental
c. Spiral
d. None of these
55) To avoid errors in transcription and transposition, during data entry the
system analyst should ?
a. Provide for a check digit
b. Provide for a hash totals
c. Provide batch totals
d. All of above
Page 115
C/ C++ Programming
1. Value of ix+j, if i,j are integer type and ix long type would be a. integer
b. float
c. long integer
d. double precision
2. If the class name is X, what is the type of its “this” pointer (in a non-static,
non- const member function)? a. const X* const
b. X* const
c. X*
d. X&
5. Which one of the following is not a fundamental data type in C++ a. float
b. string
c. int
d. wchar_t
7. Vtables
a. creates a static table per class
b. creates a static table per object
c. creates a dynamic table per class
d. creates a dynamic table per object
10. Which of the following is the most preferred way of throwing and handling
exceptions?
a. Throw by value and catch by reference.
b. Throw by reference and catch by reference.
c. Throw by value and catch by value
d. Throw the pointer value and provide catch for teh pointer type.
Page 117
d. the next iteration of the loop
14. Which of the STL containers store the elements contiguously (in adjecent
memory locations)? a. std::vector
b. std::list
c. std::map
d. std::set
19. Which one of the following is not a valid reserved keyword in C++ a.
Explicit
b. Public
c. Implicit
d. Private
20. Which of the following functions below can be used Allocate space for array
in memory?
a. calloc()
b. malloc()
c. Realloc()
d. both a and b
21. Each pass through a loop is called a/an
a. enumeration
b. iteration
c. culmination
Page 119
d. pass through
Page 121
a. Access method
b. Auxiliary storage management
c. Free integrity mechanism
d. None of the above
38. The two types of file structure existing in VSAM file are
a. Key sequenced structure, entry sequenced structure
b. Key sequence structure, exit sequenced structure
c. Entry sequence structure, exit sequenced structure
d. None of above
39. An inverted file
a. Locates information about data in small files that are maintained apart
from actual data record
Page 123
b. A file which stores opposite records
c. A file which stores information about records of a system
d. None of above
Page 124
d. None of above
45. Which of the following language is not supported by C++?
a. Exception Handling
b. Reflection
c. Operator Overloading
d. Namespaces
Page 125
b. By declaring at least one method abstract using the keyword ‗abstract‘ in
a class
c. By declaring the class abstract with the keyword ‗abstract‘
d. It is not possible to create abstract classes in C++
Page 126
55. If a member needs to have unique value for all the objects of that same
class, declare the member as
a. Global variable outside class
b. Local variable inside constructor
c. Static variable inside class
d. Dynamic variable inside class
56. Which of the following below can perform conversions between pointers
to related classes?
a. A. cast_static
b. B.dynamic_cast
c. C.static_cast
d. D.cast_dynamic
58. Which of the following is the most general exception handler that catches
exception of any type? a. catch(std::exception)
b. catch(std::any_exception)
c. catch(…)
d. catch()
59. class derived: public base1, public base2 { } is an example of
a. Polymorphic inheritance
b. Multilevel inheritance
c. Hierarchical inheritance
d. Multiple inheritance
60. Which of the following is/are pointer-member declared? a. ->*
b. .*
c. ::*
Page 127
d. both a and b
62. In a group of nested loops, which loop is executed the most number of
times?
a. the outermost loop
b. the innermost loop
c. all loops are executed the same number of times
d. cannot be determined without knowing the size of the loops
Page 128
66. What is deep copy?
a. A deep copy creates a copy of the dynamically allocated objects too.
b. A deep copy just copies the values of the data as they are.
c. A deep copy creates a copy of the statically allocated objects too d.
Both b and c above
67. Which of the following library function below by default aborts the
program?
a. Terminate()
b. end()
c. Abort()
d. exit()
68. Which of the following below is /are a valid iterator type? a. Input
Iterator
b. Backward Iterator
c. Forward Iterator
d. Both a and c above
69. What defines a general set of operations that will be applied to various
types of data?
a. Template class
b. Function template
c. Class template
d. Both a and c above
71. Which of the following functions below can be used Allocate space for
array in memory?
Page 129
a. calloc()
b. malloc()
c. Realloc()
d. both a and b
74. If there is more than one statement in the block of a for loop, which of
the following must be placed at the beginning and the ending of the loop
block?
a. parentheses ( )
b. braces { }
c. brackets [ ].
d. arrows < >
75. Which of the following members do get inherited (in case of private
inheritance) but become private members in child class
Page 130
a. Public
b. Private
c. Protected
d. All the above
76. Which of the following is not a valid conditional inclusions in
preprocessor directives
a. #ifdef
b. #ifundef
c. #endif
d. #elif
77. Which looping process is best used when the number of iterations is
known?
a. for
b. while
c. do-while
d. all looping processes require that the iterations be known
Page 131
80. Which of the following is the most common way of implementing C++?
a. C++ programs are directly compiled into native code by a compiler
b. C++ programs are first compiled to intermediate code by a compiler
and then executed by a virtual machine
c. C++ programs are interpreted by an interpreter
d. A C++ editor directly compiles and executes the program
86. Which of the following operators below allow to define the member
functions of a class outside the class?
a. ::
b. ?
c. :?
d. %
87. Which header file should we include for using std::auto_ptr? a.
<memory>
b. <alloc>
c. <autoptr>
d. <smartptr>
88. Which of the following is not a standard exception built in C++. a.
std::bad_creat
b. std::bad_alloc
c. std::bad_cast
d. std::bad_typeid
Page 133
c. call by pointer
d. none of these
int a = 5;
int b = 10;
cout << (a>b?a:b);
c. Syntax error
d. None of above
95. The output of this program is
int a = 10;
void main()
{
a. False
b. True int
Page 134
{
}
a. 5
b. 10 int a = 20; cout << a << ::a;
}
a. Syntax error
b. 10 20
c. 20 10
d. 20 20
Page 135
Example(int a,int b,int c){ a = a; b = b; c = c;}
//Constructor 4
}
In the above example of constructor overloading, the following statement will
call
which constructor
Example obj = new Example (1,2,3);
a. Constructor 2
b. Constructor 4
c. Constrcutor 1
d. Type mismatch error
OPERATING SYSTEM
1. If there are multiple recycle bin for a hard disk
a. you can set different size for each recycle bin
b. you can choose which recycle bin to use to store your deleted files
c. You can make any one of them default recycle bin
d. None of above
Page 136
3. World Wide Web is being standard by
a. Worldwide corporation
b. W3C
c. World Wide Consortium
d. World Wide Web Standard
5. The ..... program compresses large files into a smaller file a. WinZip
b. WinShrink
c. WinStyle
d. None of above
Page 137
7. Which of the following Windows do not have Start button
a. Windows Vista
b. Windows 7
c. Windows 8
d. None of above
10. If the displayed system time and date is wrong, you can reset it using
b. Calendar
c. Write file
d. Control panel
d. Windows 95
Page 138
a. Write
12. A co-processor
a. Is relatively easy to support in software
b. Causes all processor to function equally
c. Works with any application
d. Is quite common in modern computer
Page 139
13. Which is not application software?
a. Windows NT
b. Page Maker
c. WinWord XP
d. Photoshop
b. Windows 8.1
c. Windows 2008
a. Windows 2007
Page 140
d. Windows 7
17. Which one is not operating system?
a. P11
b. OS/2
c. Windows
d. Unix
19. What program runs first after computer is booted and loading GUI?
a. Desktop Manager
b. File Manager
c. Windows Explorer
d. Authentication
21. Which of the following does not support more than one program at a
time?
a. DOS
b. Linux
c. Windows
d. Unix
24. Which operating system can you give smallest file name? a. Ps/2
b. Dos
c. Windows
d. Windows NT
Page 142
d. You finish working and going to bed
Page 143
30. Which one is not a system tool?
a. Backup
b. Disk defragment
c. Virus scanning
d. All of the above
31. The .... displays the name of every computer user on the computer
a. Wish list screen
b. Command screen
c. Welcome screen
d. None of the above
32. The memory which allocates space for DOS and application is called
a. Expanded memory
b. Cache memory
c. Virtual memory
d. Conventional memory
34. The operating system creates _____ from the physical computer
a. Virtual space
b. Virtual computers
c. Virtual device
d. None
37. A ....is a flash memory storage device that plugins into a USB port
a. USB snap drive
b. USB flash drive
c. USB memory maker drive
d. None of above
41. The operating system creates ... from the physical computer a.
Virtual space
b. Virtual computer
c. Virtual device
Page 145
d. None
b. Compiler a.
c. Utilities
d. All of the above
43. Which menu bar selection would you access to open file?
a. Option
b. Help
c. View
d. None of above
Page 146
46. Once text has been cut to the clipboard, you can .....that text into
another document
a. Paste
b. Copy
c. Transfer
d. None of the above
47. The ... operating system was initially created in the early 1970s at
AT and T's Bell Labs a. Linux
b. DOS
c. Unix
d. GNU
53. ………..is the process of switching of CPU from one thread to another.
(A) Process handling
(B) interrupt handling
(C) Context switching
(D) None of the above
Page 148
54. ……….is a way of processing data serially.
(A) spooling
(B) caching
(C) Paging
(D) All of the above
56. Which of the following is true for the algorithms for memory allocation?
(A) First Fit
(B) Best Fit
(C) Worst Fit
(D) All of the above
58. ……is a system call that causes the caller to block. (A) Await
(B) Sleep
(C) Wakeup
(D)None of the above
Page 149
60. ….. is mainly responsible for allocating the resources as per process
requirement?
(A) RAM
(B) Compiler
(C) Operating Systems
(D) Software
Page 151
72. Which of the following is a scheduling alogorithm that allows a process
to move up and down between queues?
(A) Round Robin (RR) scheduling
(B) First Come First Served (FCFS) scheduling
(C) Multilevel feedback queue scheduling
(D) Shortest job first (SJF) scheduling
73. ……..commands are automatically loaded into main memory when the
booting process gets completed.
(A) External
(B) Internal
(C) Both (A) & (B)
(D) None
Page 152
(D) None
80. In UNIX, cached disk blocks are managed by the kernel and reffered to
as….
(A) Cache
(B) Disk Cache
(C) Buffer Cache
(D) None of the above
81. ….. is the program which interprets commands given by the user ?
(A) Kernel
(B) Shell
(C) Fork
(D) None
82…..is the smallest unit for processing that consists of a program counter, a
stack & a set of registers.
(A) Compiler
(B) Thread
(C) Heap
(D) None of the above
Page 153
(A) I/O Operation
(B) Protection
(C) Compilation
(D) None of the above
Page 154
89. The performance of Round Robin (RR) scheduling depends on…..
(A) quantum
(B) priority
(C) preemption
(D) None of the above
Page 155
(C) Fork
94. …….. provides an Interface between the process and the Operating
System.
Page 156
(A) Synchronization
96.An Operating System that can predict the exact time duration for
operation is called
Page 157
(A) Hard RTOS
(B) Soft RTOS
(C) Both (A) and (B)
WEB TECHNOLOGY
1. What method is used to specify a container‟s layout in JSP?
A. Setlayout ( )
B. Layout ( )
C. setContainerLayout ( )
D. SetConLayout ( )
Page 158
3. Which of the following is not an advantage of CSS?
A. Easy Maintenance
B. Offline Browsing
C. Multiple Device Compatibilty
D. Platform Dependent
Page 159
A. Ruby
B. Bootstrap
C. PHP
D. Python
6. Which one of the following objects is passed to a JavaBean when one of its
properties is set via a JSP action?
A. servlet Request
B. HTTPServletRequest
C. ServletResponse
D. HTTP Servlet Response
Page 160
9. Which method of the component class is used to set the position
and size of a component in JSP?
A. setsize ( )
B. SetpositionSize( )
C. SetPosition ( )
D. SetBounds( )
10. What are the events generated by the Node objects called? A.
generators
Page 161
B. highevents
C. emitters
D. None of the Above
13. Which of the following are used by servlet containers to set JavaBean
B. form fields
C. memory
D. Disk
properties?
Page 162
A. Cookies
14. ___________ header gives the MIME type of the response document?
A. content Encoding
B. content Languages
C. Content Length
D. Content Type
Page 163
B. Lookup
C. secure
D. None of the Above
Page 164
B. Comment Refernc
C . Both (A) and (B)
D. All of the Above
24. IN JS, the ________ method returns the index of the last occurrence of
a specified text in a string.
A. Slice
B. Substr
C. lastIndex
D. search
Page 165
25. _________ method replaces a specified value with another value in a
string?
A. CharCodeAt ( )
B. CharAt ( )
C. Concat ( )
D.
Page 166
D. 504 Gateway Timeout
29. Any part of the graphic that is not include in another hot zone is
considered to be part of __________
A. Rect
B. Point
C. default
D. polygon
Page 167
argument.
A. parseFloat ( )
B. toPrecision ( )
C. ToExponetial ( )
D. number ( )
31. Which of the following was designed to store and transport data?
A. Java Script
B. HTML
C. XML
D. None of the Above
Page 168
35. Which of the following is used to define the content of Web pages?
A. HTML
B.CSS
C. Java Script
D. None of the Above
36. JavaScript can change all the ____________ in the Web page.
A. HTML elements
B . CSS styles
C. HTML attributes
D. All of the Above
38. _________ message denotes the request has been fulfilled and a new
B.201 Created
C. 403 Forbidden
D. 404 Not Found
source is created
A. 202 Accepted
Page 169
A. CSS Borders
B. CSS Margins
C. CSS Padding
D. None of the Above
40. Which property is very useful for getting or replace the content of
HTML elements?
A. Inner HTML
B. outer HTML
C. Both A and B
42. In JS, The ________ method searches a string for a specified value and
returns the position of match.
A. Slice( )
B. Substr ( )
C. index ( )
D. search ( )
43. In Java Script, the _______ method returns the new array length.
B. substr ( )
C. index ( )
D. unshift ()
D. None of the Above
Page 170
A. Shift ( )
Page 171
46. In Java Script, which statement lets you to handle the error?
C. Both A and B
D. None of the above
48. _________ message denotes the requested page could not be found and it
B. 201 Created
C. 403. Forbidden
D. 404 Not Found
(C) Standard Generalized Markup Language
(D) Standard Generalized Mark Language
A. Try
B. Catch
Page 172
may be available in future?
A. 202 Accepted
50. Which can reduce the number of server requests and save bandwidth?
A. Image Gallery
Page 173
B. Image Opacity
C. Image Sprites
D. None of the Above
51. Which of the following property sets or returns the CORS setting of the
audio/video?
A. controls
B. crossOrigin
C. CurrentSrc
D. None of the Above
Page 174
C. Expensive Hyper Text Markup Language
D. Extension Hyper Text Marked Language
Page 175
A. float
B. clear
C. Both A and B.
D. None of the above
57. Which method returns the HTTP methods that the server supports?
A. HEAD
B. PUT
C. DELETE
D. OPTIONS
Page 176
B. Block
C. A or B
D. None of the above
62. Which is the following message denotes the request page has moved
temporarily to a new URL?
A. 202 Accepted
B .201 created
C. 301 Moved Permanetly
D. 302 Found
63. Which of the following message denotes the requested page has moved to
a new URL?
(A ) 202 Accepted
(B) 201 created
(C) 302 Found
(D) 301Moved Permanently
68. Which is the following property returns the length of the current
(C) ended
(D) duration
audio/video?
(A) erros
(B)loop
Page 178
(A) HTML
(B) XML
(C) HTTP
(D) None of the above
Page 179
74.___________converts character into a format which can be transmitted
over the Internet? (A) URL Encoding
(B) URL Decoding
(C) Both (A) &(B)
(D) None of the above
Page 180
79. Which is the standard response for successful HTTP requests?
(A) 202Accepted
(B) 201 created
(C) 200 OK
(D) None of the above
Page 181
81. Symbol used at the beginning of the HERF text is________
(A) #
(B)$
(C) &
(D)^
Page 182
84. The _________method requests data from a specified source. (A)
GET
(B) POST
(C) Both (A) & (B)
(D) None of the above
Page 183
86. HTML tags are surrounded by____________
(A) Square Brackets
(B) Angle Brackets
(C) Curly Brackets
(D) None of the above
Page 184
Page 185
91. What is Internet Explorer?
a. An Icon
b. A File Manager
c. A Browser
d. The Internet
92. Text within <EM> … </EM> tag is displayed as ________
a. bold
b. italic
c. list
d. indented
b. italic
c. list
d. indented
a. bold
Page 186
d. <FONT></FONT>
Page 187
102. With regards to e-mail addresses:
a. hey must always contain an @ symbol
b. hey can never contain spaces
c. they are case-insensitive
d. all of the above
Page 188
104. Which of the following is used to explore the Internet?
a. Browser
b. Spreadsheet
c. Clipboard
d. Draw
b. 192.168.321.10
c. 1.888.234.3456
d. 192.168.56.115
d. <LI></LI>
Page 189
a. 984.12.787.76
109. What is the correct way of describing XML data? a. XML uses a
DTD to describe data
b. XML uses a description node to describe data
c. XML uses XSL to describe the data
d. XML uses a validator to describe the data
111. What is the correct syntax in HTML for creating a link on a webpage?
a. <LINK SRC= ―studyregulars.html‖>
b. <BODY LINK = ―studyregulars.html‖>
c. <A SRC = ―studyregulars.html‖ >
Page 190
d. < A HREF = ―studyregulars.html‖>
113. Choose the correct HTML tag to make the text bold? a. <B>
b. <BOLD>
c. <STRONG>
d. Both (a) and (c)
115. Which HTML tag would be used to display power in expression (A+B)2
?
a. <SUP>
b. <SUB>
c. <B>
d. <P>
117. Choose the correct HTML tag for the largest heading? a. <H1>
b. <H6>
Page 191
c. <H10>
d. <HEAD>
Page 192
COMPUTER FUNDAMENTALS:
1. Who is the inventor of ―Difference Engine‖?
a. Allen Turing
b. Charles Babbage
c. Simur Cray
d. Augusta Adaming
5. A CPU contains
a. a card reader and a printing device
b. an analytical engine and a control unit
c. a control unit and an arithmetic logic unit
d. an arithmetic logic unit and a card reader
9. Which of the following controls the process of interaction between the user
and the operating system? a. User interface
b. Language translator
c. Platform
d. Screen saver
Page 194
a. Entry codes
b. Passwords
c. Security commands
d. Code words
13. Which device is required for the Internet connection?
a. Joystick
b. Modem
c. CD Drive
d. NIC Card
17. ALU is
a. Arithmetic Logic Unit
b. Array Logic Unit
c. Application Logic Unit
d. None of above
Page 195
18. IBM 1401 is
a. First Generation Computer
b. Second Generation Computer
c. Third Generation Computer d . Fourth Generation
Computer
19. UNIVAC is
a. Universal Automatic Computer
b. Universal Array Computer
c. Unique Automatic Computer
d. Unvalued Automatic Computer
21. VGA is
a. Video Graphics Array
b. Visual Graphics Array
c. Volatile Graphics Array
d. Video Graphics Adapter
Page 196
c. 1.40 GB
d. 1.44 MB
28. What type of computers are client computers (most of the time) in a
Client-server system?
a. Mainframe
b. Mini-computer
c. Microcomputer
Page 197
d. PDA
31. Hackers
a. all have the same motive
b. break into other people's computers
c. may legally break into computers as long as they do not do any
damage
d. are people who are allergic to computers
32 . FORTRAN is
a. File Translation
b. Format Translation
c. Formula Translation
d. Floppy Translation
Page 198
34. Second Generation computers were developed during
a. 1949 to 1955
b. 1956 to 1965
c. 1965 to 1970
d. 1970 to 1990
Page 199
c. Both sequentially and parallel
d. All of above
Page 200
d. Donald Kunth
46. When did arch rivals IBM and Apple Computers Inc. decide to join
hands?
a. 1978
b. 1984
c. 1990
d. 1991
47. What is the name of the display feature that highlights are of the screen
which Requires operator attention?
a. Pixel
b. Reverse video
c. Touch screen
d. Cursor
Page 201
49. In most IBM PCs, the CPU, the device drives, memory expansion slots
and active components are mounted on a single board. What is the name
of this board?
a. Motherboard
b. Breadboard
c. Daughter board
d. Grandmother board
50. Modern Computer are very reliable but they are not
a. Fast
b. Powerful
c. Infallible
d. Cheap
Page 202
b. Mother board
c. Father board
d. Bread board
55. The system unit of a personal computer typically contains all of the
following except:
a. Microprocessor
b. Disk controller
c. Serial interface
d. Modem
Page 203
58. Unwanted repetitious messages, such as unsolicited bulk e-mail is known
a. Spam
b. Trash
c. Calibri
d. Courier
59. A self replicating program, similar to a virus which was taken from a
1970 science fiction novel by John Bruner entitled the Shockwave Rider is
a. Bug
b. Vice
c. Lice
d. Worm
as
Page 204
62. DOS stands for
a. Disk Operating System
b. Disk operating session
c. Digital Operating System
d. Digital Open system
63. The primary function of the .......... is to set up the hardware and load and
start an operating system
a. System Programs
b. BIOS
c. CP
d. Memory
64. The ......... is the amount of data that a storage device can move from the
Storage medium to the Computer per second
a. data migration rate
b. data digitizing rate
c. data transfer rate
d. data access rate
Page 205
65. To move a copy of file from one computer to another over a
communication channel Is called?
a. File transfer
b. File encryption
c. File modification
d. File copying
Page 206
70. ........ is computer software designed to operate the computer hardware
and to provide platform for running application software a. Application
software
b. System software
c. Software
d. Operating system
71. ............. is the ability of a device to "jump" directly to the requested data
a. Sequential access
b. Random access
c. Quick access
d. All of the above
74. ......... provides process and memory management services that allow
two or more tasks, jobs, or programs to run simultaneously a.
Multitasking
b. Multithreading
c. Multiprocessing
d. Multicomputing
75. The task of performing operations like arithmetic and logical operations
is called......
a. Processing
b. Storing
c. Editing
Page 207
76. You use a(n) ....., such as a keyboard or mouse, to input information
a. output device
b. input device
c. storage device
d. processing device
Page 208
80. Magnetic disk is an example of
a. Secondary memory
b. Primary memory
c. Main memory
d. Both (a) and (b)
Page 209
82. RAM is an example of
a. Secondary memory
b. Primary memory
c. Main memory
d. Both (a) and (b)
85. All of the following are examples of real security and privacy risks
EXCEPT
a. hackers
b. Spam
c. Viruses
d. identity theft
87. Which of the following is NOT one of the four major data
processing functions of a computer? a. gathering data
b. processing data into information
Page 210
c. analyzing the data or information
d. storing the data or information
85. All of the following are examples of storage devices EXCEPT : a. hard
disk drives
b. printers
c. floppy disk drives
d. CD drives
88. When creating a computer program, the ......... designs the structure of the
program
a. End user
b. System Analyst
c. Programmer
d. All of the above
Page 211
89. ............... is the science that attempts to produce machines that display the
same type of intelligence that humans do a. Nanoscience
b. Nanotechnology
c. Simulation
d. Artificial intelligence (Al)
93. Which of the following contains permanent data and gets updated during
the processing of transactions?
a. Operating System File
b. Transaction file
c. Software File
d. Master file
Page 212
95. Which of the following helps to protect floppy disks from
data getting accidentally erased? a. Access notch
b. Write-protect notch
c. Entry notch
Page 213
100. The computer abbreviation KB usually means
a. Key Block
b. Kernel Boot
c. Kilo Byte
d. Kit Bit
Page 214
MIXED QUESTIONS
Page 215
C.Direct
D. one to many
Page 216
D. None of the above
B.UNIX A.
C. MINIX DOS
D. None of these
15. Which of the Following method can be used to add more tables in a
19. A method which transfers the entire block of data from its own
buffer to main memory takes place without intervention by CPU.
A. programmed input \Output
B. Input driven Input \Output
C. Direct Memory Access
D. None of the above
Page 218
A. Member Function
B. A class Function
C. An operator
D. None of above
Page 219
26. Transaction processing is associated with everything below except
A. producing detail‘ summary or exception reports.
B. recording a business activity.
C. confirming an action or triggering a response.
D.maintaining data
Page 220
code for another machine is called _________
A. Simulator
B. Emulator
C. Boot _strap Loader
D. Cross assembler
35. A set of resources ‗ allocations such that the system can allocate
resources to each process in some order,and still avoid a deadlock is called.
A. Unsafe State
B. Safe State
C. Starvation
D. Greedy allocation
Page 221
36. Which of following does not allow multiple users or devices to share
one communications line ?
A. Doubleplexer
B. Multiplexer
C. concentrator
D. Controller
37. Consider an operation of addition . for two numbers the operation will
generate a sum . if the operands are strings , and same operation would
produce a third string by concatenation.This Feature is called.
A. Inheritance
B. Encapsulation
C. Polymorphism
D. Binding
Page 222
B. Top _ down parser
C. Back Tracing parser
D. None of above
Page 223
45.Which of the following is a valid SQL type?
A.Character
B.NumerIc
C.Float
D.All of the above
Page 224
51.An advantage of the database management approach is
A.Data is dependent on Programs.
B.Data redundancy increses.
C.Data is integrated and can be multiple programs.
D.None of The above.
55. The language used in application programs to request data from the
DBMS is Referred to as the
A.DML
B.DDL
C.VDL
D.SDL
Page 225
56.SET concept is used in:
A.Network mobel
B.Hierarchical Mobel
C.Relational Model
D. None of These
58.In a relation
A.Ordering of rows is immaterial
B.No tow rows are identical
C.Both(a) And(B)
D. None of These.
Page 226
62. Which of the operations constitute a basic set of
operations for manipulating relational data ?
A. Predicate calculus
B. Relational calculus
C. Relational algebra
D. None of the Above.
Page 227