Question Bank For Practice-1
Question Bank For Practice-1
Question Bank For Practice-1
A) Users
C) Data
A) A row
B) A column
C) A table
D) A primary key
A) To store metadata
A) Inner join
A) REMOVE
B) DELETE
C) ERASE
D) DROP
A) One-to-many
B) Many-to-one
C) One-to-one
D) Many-to-many
A) GET
B) FETCH
C) SELECT
D) EXTRACT
What is a primary key in a relational database?
Which type of database model represents data as objects, similar to object-oriented programming?
A) Hierarchical
B) Relational
C) Network
D) Object-oriented
A) ADD
B) INSERT
C) CREATE
D) UPDATE
A) External schema
B) Conceptual schema
C) Logical schema
D) Physical schema
Which SQL clause is used to filter the results of a query based on specified conditions?
A) WHERE
B) HAVING
C) FILTER
D) CONDITION
Which SQL function is used to count the number of rows in a result set?
A) COUNT()
B) SUM()
C) AVG()
D) MAX()
Which normal form ensures that every non-prime attribute is fully functionally dependent on the
primary key?
void solve() {
int sum = 0;
if(i % 2 == 0) {
sum += a[i];
a. 1 b. 4 c. 9 d. None
void solve() {
int a[] = {1, 2, 3, 4, 5};
int sum = 0;
if(i % 2 == 0) {
else {
a. 3 b. 4 c. 5 d. None
9. Kruskal’s Algorithm for finding the Minimum Spanning Tree of a graph is a kind of a?
10. Maps in C++ are implemented using which of the following data structures?
11. What is the best case time complexity of the binary search algorithm?
12. What is the time complexity to insert an element to the front of a LinkedList(head pointer
given)?
13. What is the time complexity to insert an element to the rear of a LinkedList(head pointer given)?
a. O(n) b. O(1) c. O( Logn) d. O ( Logn*n)
#include <stdio.h>
int main()
float q = ‘a’;
printf(“%f”, q);
return 0;
19. Out of the following operations, which one is not possible in the case of a register variable?
a. These always obey the scope rules b. We can make use of a pointer to #define
23. Out of the following function definition, which one will run correctly?
return (x + y);
{return (x + y);}
c.int sum(x, y)
return (x + y);
int (*p)[5];
#include<stdio.h>
int main()
int p = 1, q = 2, r = 3, s = 4, x;
e = r + s = q * p;
a. Syntax error b. 5, 2 c. 7, 2 d. 7, 4
a. These always obey the scope rules b. We can make use of a pointer to #define
31. Which of these is the correct initialization method for the following:
a. More than a single space shouldn’t be given when we are using typedef
b. *string p = ‘A’;
c. string p = “Hello”;
d. *string *p = “Hello”;
a. shuffle(list1) b. list1.shuffle()
c. random.shuffleList(list1) d. random.shuffle(list1)
byte b = 50;
b = b * 50;
d. * operator has converted b * 50 into int, which can not be converted to byte without casting
System.out.print(Integer);
System.out.print(String);
a. 24 I b. I c. 24 d. Compiler Error
38. Find the output of the following program.
short x = 10;
x = x * 5;
System.out.print(x);
40. 1. Which of these components are used in a Java program for compilation, debugging, and
execution?
2. The time complexity used for inserting a node in a priority queue on the basis of key is:
4. The members of two of the sets are relatively more common when the Jaccard Index is:
a. Closer to 0 b. Closer to 1 c. Farther to 1 d. Closer to -1
5. Which one is the most desirable out of these traits of a hash function?
7. Consider a computer system that supports 32-bit physical as well as virtual addresses. Now since
the space of the physical address is the same size as the virtual address, the OS designers would
decide to entirely get rid of its virtual memory. Which one of these is true in this case?
c. There would no longer be a requirement for hardware support for memory management
d. It would be possible to make the processor cache organisation more efficient now
a. The processes on the system access pages and not memory frequently
a. The requested page isn’t in the memory b. The requested page is in the memory
c. Both page frame number and virtual page number d. Accessing the right information
11. What will be the output of the following C code?
#include<stdio.h>
int main()
int p = 1, q = 2, r = 3, s = 4, x;
e = r + s = q * p;
a. Syntax error b. 5, 2 c. 7, 2 d. 7, 4
a. These always obey the scope rules b. We can make use of a pointer to #define
15. Which of these is the correct initialization method for the following:
a. More than a single space shouldn’t be given when we are using typedef
b. *string p = ‘A’;
c. string p = “Hello”;
d. *string *p = “Hello”;
a. shuffle(list1) b. list1.shuffle()
c. random.shuffleList(list1) d. random.shuffle(list1)
18. Which function removes a set’s first and the last element from a list?
print(type(y))
find(‘letters’,X=’1′,Y=’2′)
c. String d. Tuple
b. The memory space taken by the recursive functions is more than that of non-recursive function
22. In the context of data warehousing, data map or ‘data about data’ is known as …………….
23. Which of the following normal form deals with the anomaly of multi-value dependency?
25. Which of the following is not the state of a transaction in the database?
26.The …………… file saves the recovery scenario in Quick Test Professional (QTP) environment
28.How should we traverse an oracle database to retrieve a row in the quickest possible time?
a. Full table scan b. Unique index c. Primary key d. Table access by row id
30.Which of the following statements are used to create indexes in the database?
c. satellite communications
d. radio broadcasting
36.This is the ability to increase system performance gradually as the workload grows just by adding
processors.
b. Network to host
c. Application to presentation
d. None
40.The term used to describe the way in which computers are connected to the network.
a. Logic b. Technology
a. the total number of blocks that have been used for the index, size of all the blocks
b. the actual size of all blocks, the size of the blocks’ address
c. the of the blocks’ size, the blocks’ address size, and the total number of blocks that have been
used for the index
3. Out of these page replacement algorithms, which one suffers from Belady’s anomaly?
5. Consider a computer system that supports 32-bit physical as well as virtual addresses. Now since
the space of the physical address is the same size as the virtual address, the OS designers would
decide to entirely get rid of its virtual memory. Which one of these is true in this case?
a. There would no longer be a requirement for hardware support for memory management
d. It would be possible to make the processor cache organisation more efficient now
8. In which of the following formats data is stored in the database management system?
10. _____________ is a hardware component that is most important for the operation of a database
management system.
a. Microphone b. Printer
c. High-resolution video display d. High speed, large capacity disk to store data
11. What is the best case time complexity of the binary search algorithm?
12. What is the time complexity to insert an element to the front of a LinkedList(head pointer
given)?
13. What is the time complexity to insert an element to the rear of a LinkedList(head pointer given)?
#include <stdio.h>
int main()
float q = ‘a’;
printf(“%f”, q);
return 0;
19. Out of the following operations, which one is not possible in the case of a register variable?
a. These always obey the scope rules b. We can make use of a pointer to #define
24. Out of the following, which one is a superclass of all the exception type classes?
25. What happens when we call two threads that have the same priority to process simultaneously?
c. Itdepends on the OS
26. Out of these classes, which one is used for reading strings and characters in Java from the
console?
27. Out of these operators, which one can be used to get the run time info about an object?
28. Out of these classes, which one allows a user to define their own formatting pattern for time and
dates?
a. the start index of the previous match b. the start index of the current match
c. the start index of the input string d. None of the above
31. Which one is a superclass of the ContainerEvent class out of the following?
34. Which class produces objects with respect to their geographical locations?
35. Which method is used for notifying the observer about the change in the observed object?
c. The generics add stability to a code. They do so by making more bugs detectable at the runtime
d. The generics add stability to a code. They do so by making more bugs detectable at the compile
time
38. Which mechanism helps in the process of naming as well as visibility control of the classes and
their content?
b. reads the files that are at the path specified as the String
c. counts the total number of lines for the files at the specified path
Which of the following layers of the OSI model is responsible for physical addressing and
transmission of data over the network?
b) Network Layer
c) Transport Layer
d) Physical Layer
What is the maximum data rate defined by the IEEE 802.11n standard?
a) 54 Mbps
b) 150 Mbps
c) 300 Mbps
d) 600 Mbps
Which of the following protocols is used for securely transmitting data over the Internet?
a) TCP
b) IP
c) HTTPS
d) FTP
Which networking device operates at the Data Link Layer of the OSI model?
a) Router
b) Hub
c) Switch
d) Repeater
Which type of network topology is characterized by a central node with point-to-point connections
to other nodes?
a) Star
b) Ring
c) Mesh
d) Bus
a) 255.0.0.0
b) 255.255.0.0
c) 255.255.255.0
d) 255.255.255.255
Which of the following protocols is used for transferring files between a client and a server over a
network?
a) SMTP
b) SSH
c) FTP
d) SNMP
a) Unicast
b) Multicast
c) Anycast
d) Broadcast
d) To manage IP addresses
a) DHCP
b) DNS
c) FTP
d) HTTP
Which OSI layer is responsible for ensuring the reliable delivery of data between two nodes on a
network?
a) Transport Layer
b) Network Layer
d) Session Layer
What is the purpose of ICMP (Internet Control Message Protocol)?
a) 802.11ac
b) Bluetooth
c) 3G
d) Ethernet
What is the maximum transmission unit (MTU) size for Ethernet networks?
a) 1500 bytes
b) 576 bytes
c) 64 kilobytes
d) 512 bytes
Which type of cable is commonly used to connect a computer to a switch or router in a local area
network (LAN)?
a) Coaxial cable
c) Ethernet cable
d) HDMI cable
a) Star
b) Ring
c) Mesh
d) Bus