CS MCQ 2024 Final
CS MCQ 2024 Final
13. Pentium-I, Pentium-II and Pentium – MMX processors used in ............. type of
motherboards
a. AT b. ATX
c. XT d. Baby AT
14. Pentium -III Processors are used in................... type of motherboards
a. ET b. ATX
c. XT d. Baby AT
15. Both Pentium III and Pentium IV processors are supported by .................. motherboards
a. XT b. AT
c. Baby AT d. ATX
16. Processors supported by ATX mother board are……….
a. Only Pentium-IV, Dual Core
b. Only Dual Core and Core 2 Duo
c. Quad Core, i3, i5 and i7
d. All the above
17. Which among the following motherboards have slot type and PGA type processor
sockets?
a. ATX motherboard
b. Baby AT motherboard
c. XT motherboard
d. AT motherboard
18. Choose the component not present in Baby AT motherboard
a. Slot type processor sockets and PGA processor sockets
b. SDRAM slots and DDRRAM slots
c. PCI slots and ISA slots
d. AGP slots
19. Which one of the following has 24-pin Power connector?
a.AT motherboard
b. Baby AT motherboard
c. XT motherboard
d. ATX motherboard
20. XT motherboard has............. power pin connectors
a. 24 b. 12 c. 20 d. 20 and 24
21. MPGA processor sockets are found in type of motherboards
a. Baby AT b. ATX c. AT c. XT
22. Choose the very old motherboard model from the following
a.ATX b. XT c. Baby AT d. AT
23. Which of the following motherboard types consists of SATA connectors?
a.AT motherboard
b. Baby AT motherboard
c. ATX motherboard
d. XT motherboard
24. One of the following is the main component of the motherboard
a. BUS b. BIOS c. CMOS d. Processor
25...............is the frequency with which a processor executes instructions.
a. Bus speed b. Clock speed
c. MHz d. GHz
26. The computer’s operating speed is linked to the speed of -------------
a. BUS b. Memory access
c. System Clock d. North Bridge
27. CPU’s performance is measured by the per second
a. Number of instructions de-coded
b. Number of instructions loaded
c. Number of instructions executed
d. Number of programs executed
28. CPU is fabricated on a single IC chip is known as--------------
a. Multiprocessor c. graphic processor
b. Microprocessor d. microcomputer
29. establishes a communication path for movement of data betweenprocessor
and memory
a. Cache b. Bus c. motherboard d. North Bridge
30. Which one of the following is the alternative name for North Bridge
a. Host Bridge b. south chipset
c. North Chipset d. Both (a) and (c) are correct
31. ............... is responsible for control of high speed components like CPU, RAM and
video card
a. South chipset b. south bridge
c. North Chipset d. Both (a) and (b)
32. ............... is responsible for control of slower components.
a. South chipset b. north bridge
c. North Chipset d. Both (a) and (c)
33. The most common motherboard standard for desktop computers
a. AT b. ATX c. XT d. Baby ATX
34. Identify the devices which are not managed by North Bridge
a. RAM b. CPU
c. Video cards d. CD ROM drive
35. chipset manages data communication between low speed components
a. North Bridge b. South Bridge
c. IDE c. SATA
Data Structures
Chapter 7
Classes and Objects
1. Programming languages that support OOP concept is
(a) C++ and C# (b) java (c) python (d) All
2. Programming languages that does not support oop concept is
(a) C and PASCAL (b) COBOL (c) FORTRAN (d) All
3. The keyword used to create class is
(a) classname (b) class (c) private (d) protected
4. A class declaration specifies the representation of of the class.
(a) Variables (b) objects (c) functions (d) array
5. In a class, member function means
(a) Just a function (b) function which is member of class
(c) Both a and b (d) All the above
6. The data elements of a class are called as
(a) Member Data (b) data (c) private members (d) All the above
7. The data member of a class describes
(a) Just data variables (b) variables
(c) characteristics of class (d) behavior of the class
8. Member functions are the set of operations that are performed on the of the
class.
(a) Variables (b) objects (c) members (d) array
9. The member function of the class defines
(a) Functions of class (b) data functions
(c) characteristics (d) behavior of the class
10. A class combines ............. into single unit.
(a) Data members and member function
(b) Only data members of the class
(c) Only member function of the class
(d) All the above
11. A class definition is the process of
(a) naming the class only
(b) writing interface operations only
(c) Naming the class and defining methods and data members
(d) naming the data variables only
12. A class can contain member functions.
(a) Many
(b) Zero or one
(c) Zero or more
(d) Both b and c
13. In class definition, body ends with the symbol
(a) ; (b) : (c) :: (d) .
14. The body of the class is enclosed in a pair of
(a) ( ) (b) [ ] (c) { } (d) All the above
15. Declaration of the object is
(a) Instance of a class (b) copy of the class
(b) Both a and b (d) None of the above
16. The access specifiers in the class define
(a) Keywords (b) Data members
(c) member functions (d) Scope of the members
17. In a class definition, private access means
(a) members can be accessed only with in the class
(b) members can be accessed only outside the class
(c) members can be accessed both inside and outside the class
(d) all the above
18. The symbol used to define member function outside the class is
a. @ (b) & (c) * (d) : :
19. The default access specifier is
(a) Private (b) protected (c) public (d) All the above
20. The members are accessible only inside the class.
(a) Private (b) protected (c) public (d) both a and b
21. The feature of public access specifier is
(a) Members are accessible only outside the class
(b) Members are accessible both inside and outside the class
(c) Members are accessible only inside the class
(d) All the above
22. One special feature of protected access specifier is
(a) Cannot be inherited from one to another
(b) Can be inherited from one class to another
(c) Can be used outside the class
(d) Can be accessed using . (dot) operator
23. The difference between private and protected is
(a) Private cannot be inherited and protected can be inherited
(b) Protected cannot be inherited and private can be inherited
(c) No difference between both
(d) Both can be accessed outside the class
24. Which operator is member access operator?
(a) . (dot) (b) & (address) (c) || operator (d) ! (not operator)
25. The member can be accessed outside the class using dot(.) operator.
(a) Public (b) protected (c) private (d) friend
26. The class members can be accessed using operator.
(a) :: (scope) (b) . (dot) (c) & (address) (d) * (pointer)
27. Defining a member function inside the class means
(a) Both Declaration and Definition of member function inside the class
(b) Declaration of member function inside the class
(c) definition of member function inside the class
(d) None of these
28. Syntax for member function inside the class definition is …..
(a) return_type_specifier functionname(argument_list)
{
Statements;
…………
}
(b) void classname::function_name()
{
Statements;
…..}
(c) return_type_specifier classname::functionname()
(d) void function_name()
29. An example for member function inside the class definition is …….
(a) Returntype functionname()
(b) void input()
{
cout<<”Enter regno and name”<endl;
cin>regno>>name;
}
(c) both a and b
(d) only a is correct
30. syntax for member function outside class definition is
(a) return_type_specifier classname::functionname(arg_list)
{
statements ;
………….
}
(b) void student::input();
(c) void input()
(d) returntype functionname(arglist);
31. How many types are there to define the member function?
(a) Two (b) One (c) Three (d) a and b
32. How are member functions defined in a class?
(a) outside the class only
(b) inside the class only
(c) Both inside and outside the class
(d) All the above
33. The members of the class can be
(a) Only private
(b) Only protected
(c) Only public
(d) Private , protected or public
34. Syntax for creating objects is
(a) Classname objectname1,objectname2,…;
(b) Student obj1,obj2;
(c) Class classname objectname1, objectname2;
(d) Both a and c
35. The array of object is
(a) An array having classtype elements
(b) Array as a member of the class
(c) Array stores many values of same type
(d) All the above
36. The is an example for creating the objects
(a) Student obj1,obj2;
(b) Class student obj1,obj2;
(c) Both a and b
(d) Only b
37. How many methods are there to pass objects as argument to member function?
a. 2 (b) 3 (c) 1 (d) 4
38. A class is of an object
(a) Blueprint or prototype
(b) Defined using classname
(c) A group of students
(d) Member
39. A class is collection of objects having
(a) Similar characteristics and behavior
(b) Only character
(c) Only behavior
(d) All of the above
40. Is it possible to access the data outside the class?
(a) Yes , if it is under public
(b) No , if it is under private
(c) Both a and b
(d) Not possible
41. Set of interface operations that are performed on objects are called
(a) Member variable (b) class function
(b) Member function (d) class variable
42. The protected members of the class can be accessed by
(a) Member function of class but only inside the class
(b) Member function of the derived class
(c) Friend functions of the class
(d) All the above
43. What is the use of scope resolution operator?
(a) Link between class and member function
(b) To write member function definition outside the class
(c) Both a and b
(d) Only a
44. An Example for array of object is …………
(a) Student obj[10];
(b) Class student stu_obj[50];
(c) Employee emp[];
(d) All the above
45. Example to pass object as function argument can be
(a) void total(Exam puc, Exam cet)
{
P=puc.p+cet.p; C=puc.c+cet.c; M=puc.m+cet.m;
}
(b) Returntype functionname(classname obj, classnae obj)
(c) Both and b
(d) All the above
46. The other names for member functions of a class are
(a) Methods and Interfaces
(b) Only methods
(c) Only set of interface operations
(d) All of the above
47. The member functions can be defined .................... of a class
(a) Inside or outside
(b) Only outside
(c) Only inside
(d) All of the above
48. Identify the errors in the following program segment Class Employee
{
int code; public:
void input();
};
i) In keyword Class
ii) In class name Employee
iii) No access specifier defined for data member
iv) No errors in the program segment
(a) (i) (b) (ii) (c) (iii) (d) (iv)
49. Identify the errors in the following program segment class marks
{
int marks; public;
void input();
};
v) In keyword Class
vi) In class name marks
vii) In public;
viii) No errors in the program segment
(a) (i) (b) (ii) (c) (iii) (d) (iv)
1. (c) The number of parameters and data types are the same
2. (d) All the above
3. (c) Both a and b
4. (c) Function overloading and operator overloading
5. (d) All the above
6. (c) Both a and b
7. (b) Compilation
8. (a) The compiler replaces function call with function code
9. (b) Very short function
10. (c) Both a and b
11. (b) Inline function
12. (a) Function overloading
13. (d) All the above
14. (d) inline
15. (c) Can access private and protected members outside the class.
16. (a) Objectname.membername
17. (b) friend or ::
18. (b) Friend function
19. (d) Any of the above
20. (a) Nonmember function
21. (c) Normal external functions
22. (c) Number and data types of arguments are the same
23. (c) Both a and b
24. (d) Both a and b
25. (a) Outside the class
26. (a) Both A and C are correct, B is incorrect.
27. (b) Only B is correct, A and C are incorrect.
28. (a) Both A and B are correct, C is incorrect.
29. (d) A, B, and C are correct.
30. (d) Function types
31. (b) Compile time polymorphism
32. (a) Size of object code increases
33. (c) friend
34. (c) Before
35. (b) Outside
1. (a) constructors
2. (b) object is created
3. (b) constructors
4. (a) class
5. (c) public section
6. (c) return-type
7. (c) constructors
8. (a) zero parameterized constructor
9. (d) destructors
10. (b) default constructors
11. (c) address
12. (b) default constructors
13. (d) return
14. (a) default
15. (a) objects
16. (c) parameterized
17. (b) parameterized
18. (d) parameterized
19. (a) parameterized
20. (c) parameterized
21. (a) explicit call
22. (a) classx obj =classx(arguments);
23. (a) explicit call
24. (a) explicit call
25. (c) initialization at the time of declaration with =operator
26. (d) another similar object
27. (a) copy
28. (c) object
29. (a) object
30. (a) assigns
31. (a) destructors
32. (c) ~
33. (c) destructors
34. (c) default constructors
35. (b) copy constructors
INHERITANCE
18. In public inheritance the public members of base class become .............. members of
derived class.
a) protected b)private c)public d)not inherited
19. In public inheritance the protected members of base class become …… members of
derived class.
a) protected b)private c)public d)not inherited
20. In public inheritance the private members of base class become .............. members of
derived class.
a) protected b)private c)public d)not inherited
21. If a class is derived from single base class it is ..............inheritance
a) single level b)multilevel c)multiple d)hybrid
22. If a class is derived from an already derived class then it is............... inheritance
a) single level b)multilevel c)multiple d)hybrid
23. If class is derived from more than one base class then it is ................inheritance
a) single level b)multilevel c)multiple d)hybrid
24. If more than one class is derived from a single base class is called ……inheritance
a) single level b)multilevel c)multiple d)hierarchical
25. ............... inheritance is a combination of hierarchical and multilevel inheritance
a) single level b)multilevel c)multiple d)hybrid
26. We can prevent multiple copies of base class being present in an object, from those
objects by declaring the base class as ……….
a) virtual b) abstract c) derived d)private
27. .................. class is one that is not used to create an object.
a) virtual b) abstract c) derived d)sub
28. When it is mandatory to have constructors in derived class?
a) no base class constructors take any arguments
b) base class having constructors with one are more arguments
c) if there are default constructors in base class
d) if there are no constructors in base class
29. ................... takes the responsibility of supplying initial values to its base class
a) super class b) virtual class c)derived class d)abstract class
Here are the answers to the questions
1. (b) inheritance
2. (a) inheritance
3. (d) inheritance
4. (b) base class
5. (c) derived class
6. (d) super class
7. (d) sub class
8. (d) all of these
9. (c) public
10. (a) private
11. (a) ::
12. (a) visibility mode
13. (b) visibility mode
14. (a) private
15. (b) private
16. (b) protected
17. (a) protected
18. (c) public
19. (a) protected
20. (d) not inherited
21. (a) single level
22. (b) multilevel
23. (c) multiple
24. (d) hierarchical
25. (d) hybrid
26. (a) virtual
27. (b) abstract
28. (b) base class having constructors with one or more arguments
29. (c) derived class
POINTERS
1. Which of the following is the correct way to declare a pointer?
a) int *ptr b) int ptr
c) int &ptr d)all of the above
2. Allocating sufficient memory for data and instructions during compilation is called …..
a) dynamic memory b) static memory
c) heap memory d) stack memory
3. Which of the following is the pointer operator?
a) * b) & c) % d) all the above
4. Which of the following is the pointer address operator?
a) * b) & c) ^ d) all the above
5.....................operator returns the value located at the memory address specified by its
operand.
a) * b) & c) ^ d) new
6. Static memory allocation is done at ..............................
a) compile time b) dynamic time
c) run time d) execution time
7. How do you declare a pointer?
a ) datatatype *pointer_variable; b) pointer_variable=&variable_name;
c) datatype &pointer_variable; d) datatype variable_name;
8....................operator is used to allocate memory for objects during run time
a) new b) & c) delete d) *
9. Which of the following is not possible in the pointers?
a) adding an integer value to pointers
b) subtracting an integer value from pointer
c) addition of two pointers
d) incrementing and decrementing of pointer
10. Which operator returns the value located at the address specified by its operand
a) pointer operand b) delete operand
c) new operand c) address operand
11. A pointer is a variable which stores...................... of another variable.
a) name b) value
c) address d) all of the above
12. Which of the following is not an advantage of pointer?
a) Accessing array elements is faster
b) support dynamically allocated memory
c) it reduces program complexity
d) it decreases program execution speed
13. Pointer initialization is the process of assigning address of a variable to a pointer variable
a) true b) false c) may be d) can’t say
14. Which of the following is dereferencing operator?
a) & b) # c) * d) ^
15. Which of the following operators also known as value at address operator?
a) * b) ^ c) & d) ::
16. & and * are two pointer operators which are
a) binary b) ternary
c) unary d) logical
17. The size of pointer variable is same for all types of pointers but the memory that will be
accessed while dereferencing is different.
a) true b) false c) may be d) all the above
18. Pointer arithmetic is somewhat different from ordinary arithmetic
a) true b) false c) may be d) all of the above
19. Which of the following types of address stored in pointer variable?
a) character b) float c) integer d) none of
these
20................. operator can be applied to pointer variable.
a) divisionb) multiplication c) logical d) casting
21. Which of the following is initialization of pointers (or) assignment of pointers
a) datatatype *pointer_variable;
b) datatype &pointer_variable;
c) pointer_variable = &variable_name;
d) pointer_variable=*variable_name;
22. A string is a............... array
a) float b) integer c) character d) none of these
23. pointer is used to store ...................
a) memory address b) valuec) data d) information
24. Which of the following is used to initialize pointer?
a) * b) & c) = d) ~
25. Memory allocated during runtime is ..................... memory allocation.
a) compile time b) dynamic c) static d) none of the above
26. New operator is used to create memory during ……….
a) compile time b) runtime
c) static time d) none of the above
27. ...............operator is used to delete memory created during runtime.
a) new b) delete c) NOT d) AND
28 .................... is the collection of addresses.
a) array of objects b) array of pointers
c) array of elements d) array of variables
29 ................. is the built in pointer that holds the address of the object defined for a class.
a) this pointer b) new
c) delete d) AND
30. Pointers pointing to object of a class is called ……….
a) array of pointers b) class pointers
c) object pointer d) this pointer
31................. is the structure that includes an element that points to another structure of
same type.
a) memory heap b) self-referential structure c) structure d) memory pool
32. Dynamically allocated memory which is not deleted remains occupied called ……….
a) orphaned memory b) memory leak c) stream d) structure
33. pool of unallocated memory used for dynamic memory allocation is ……….
a) orphaned memory b) free store
c) allocated memory d) none of the above
34. Which of the following is not possible in pointers?
a) adding an integer to pointer
b) adding two pointers
c) comparing two pointers of same type
d) subtracting an integer from the pointer
35. An example for array of pointer declaration is ……….
a) int a[10] b) int *a[10] c) both a and b d) none of the above
36. The following operation that cannot be performed over pointer:
a) Addition of two pointers
b) Multiplication of two pointers
c) Division of two pointers
d) All the above
37. Every object in C++ has access to its own address through an important pointer
called.............
a) this pointer
b) free pointer
c) object pointer
d) all the above
Here are the answers to the 11. (c) address 23. (a) memory address
questions on pointers: 12. (d) it decreases 24. (c) =
program execution 25. (b) dynamic
1. *(a) int ptr speed 26. (b) runtime
2. (b) static memory 13. (a) true 27. (b) delete
3. **(a) *** 14. **(c) *** 28. (b) array of pointers
4. (b) & 15. **(a) *** 29. (a) this pointer
5. **(a) *** 16. (c) unary 30. (c) object pointer
6. (a) compile time 17. (a) true 31. (b) self-referential
7. *(a) datatype 18. (a) true structure
pointer_variable; 19. (d) none of these 32. (b) memory leak
8. (a) new 20. (b) multiplication 33. (b) free store
9. (c) addition of two 21. (c) pointer_variable = 34. (b) adding two
pointers &variable_name; pointers
10. (a) pointer operand 22. (c) character 35. *(b) int a[10]
36. (d) All the above 37. (a) this pointer
DATABASE CONCEPTS
1. Which of the following is collection of facts, figures, statistics which can be processed
to produce meaningful information?
a) Data b) Information
c) Database d) DBMS
2. Which of the following is processed data with some definite meaning?
a) Data b) Information
c) Database d) DBMS
3. Which of the following represents facts, figures, or statistics, which have proper
meaning?
a) Data b) Information
c) Database d) DBMS
4. Which of the following is a series of actions or operations from the input data to
generate outputs?
a) Data input b) Data output
c) Data processing d) Memory
5. Which of the following is a collection of logically related data organized in a way that
data can be easily accessed, managed and updated?
a) Data b) Information
c) Database d) DBMS
6. Which of the following is a collection of data elements organized in terms of rows and
columns?
a) Data b) Information
c) Table d) Database
7. A single entry in a table is:
a) Record b) Column
c) Entity d) Field
8. A single entry in a table is:
a) Tuple b) Column
c) Entity d) Field
9. A single entry in a table is:
a) Row b) Column
c) Entity d) Field
10. Records are also called:
a) Row b) Column a Bharathi
c) Entity d) Field
11. Records are also called:
a) Tuple b) Column
c) Entity d) Field
12. Each Column is identified by a distinct header:
a) Tuple b) Field
c) Entity d) Name
13. Each Column is identified by a distinct header:
a) Tuple b) Attribute
c) Entity d) Name
14. Set of values for an attribute in that column:
a) Tuple b) Attribute
c) Entity d) Domain
15. Which of the following is a set of an object such as a table or form an entity
relationship is how each table link to each other is:
a) Tuple b) Attribute
c) Entity d) Domain
16. Which of the following is used to store relevant information along with the
documents?
a) Index field b) Memo data type
c) Text field d) Logical data type
17. Which of the following is Store data that has only two values true or false?
a) Index field b) Memo data type
c) Text field d) Logical data type
18. Which of the following is allows creation, definition and manipulation of database?
a) Data b) Information
c) Database d) DBMS
19. Following is an example for the DBMS software:
a) MySq1 b) MS Word
c) MS Excel d) MS-PowerPoint
20. The following is an example for the DBMS software:
a) Mysql b) Oracle
c) Microsoft Access d) All of the above
21. DBMS is a:
a) Centralized data management b) Single data management
c) Single user data management d) None of the above
22. Which of the following eliminates replicating(duplication)the data item indifferent
files?
a) Controlled data redundancy b) Data integrity
c) Data sharing d) All of the above
23. The following is the features of database system:
a) Controlled data redundancy b) Data integrity
c) Data sharing d) All of the above
24. Which of the following refers to validity of data and it can be compromised in several
ways?
a) Controlled data redundancy b) Data integrity
c) Data sharing d) All of the above
25. Which of the following describes how data in the database is viewed by the users?
a) DBMS architecture b) ER diagram
c) Database d) SQL
26. Which of the following data abstractions that deal with the physical representation of
the database on the computer?
a) Physical level (Internal level) b) Logical level (Conceptual level)
c) View level (External level) d) All of the above
27. Which of the following data abstractions that deal with how the data is physically
stored and organized on the storage medium?
a) Internal level b) Logical level
c) External level d) All of the above
28. Which of the following deals with the logical structure of the entire database?
a) Physical level (Internal level) b) Logical level (Conceptual level)
c) View level (External level) d) All of the above
29. Which of the following views is the overall view of the database and it includes all the
information that is going to be represented in the database?
a) Physical view (Internal view) b) Logical view(Conceptual view)
c) View level (External view) d) All of the above
30. Which of the following is describes what data is stored in the database, the relationships
among the data and complete view of the user's requirements without any concern for
the physical implementation?
a) Physical level (Internal level) b) Logical level (Conceptual level)
c) View level (External level) d) All of the above
31. Which of the following is the highest level of abstraction that deals with the user's view
of the database?
a) Physical level (Internal level) b) Logical level (Conceptual level)
c) View level (External level) d) All of the above
32. Which of the following is a DBMS user?
a) Application programmer b) End user
c) Database Administrator (DBA) d) All of the above
33. Which of the following DBMS users determines the requirement of end users,
a) Application programmers and system analysts b) End user
c) Database Administrator (DBA) d) Database designers
34. Which of the following is responsible for authorization of access to the database for
coordinating and monitoring its use?
a) Application programmers and system analysts
b) End user
c) Database Administrator (DBA)
d) Database designers
35. ................... is responsible for identifying the data to be stored in the database for
choosing appropriate structures to represent and store the data?
a) Application programmers and system analysts
b) End user
c) Database Administrator (DBA)
d) Database designers
36. An ability of a database to modify a schema definition at one level without affecting a
schema in the next higher level?
a) Data abstraction b) Data Independence
c) Data manipulation d) Data modification
37. An ability to change the conceptual schema without affecting the external schemas or
application programs?
a) Data abstraction b) Data Independence
c) Data manipulation d) Data modification
38. In which file organization, records are arranged one after another and in no particular
order?
a) Serial File Organization
b) Sequential File organization
c) Random/Direct Access File Organization
d) Indexed Sequential Access Method(ISAM)
39. In which file organization, records are arranged in chronological order?
a) Serial File Organization
b) Sequential File organization
c) Random/Direct Access File Organization
d) Indexed Sequential Access Method(ISAM)
40. In which file organization records are stored one after another in an ascending or
descending order determined by the key field of the records?
a) Serial File Organization
b) Sequential File organization
c) Random/Direct Access File Organization
d) Indexed Sequential Access Method(ISAM)
41. In which file organization, records are stored and retrieved using a relative record
number, which gives the position of the record in the file?
a) Serial File Organization
b) Sequential File organization
c) Random/Direct Access File Organization
d) Indexed Sequential Access Method(ISAM)
42. Which file organization allows immediate direct access to individual records on the
file?
a) Serial File Organization
b) Sequential File organization
c) Random Access File Organization
d) Indexed Sequential Access Method(ISAM)
43. In which file organization, records are stored on disk by using a hashing algorithm?
a) Serial File Organization
b) Sequential File organization
c) Random/Direct Access File Organization (Random access method)
d) Indexed Sequential Access Method(ISAM)
44. Which of the following is the hybrid between sequential and direct access file
organization?
a) Serial File Organization
b) Sequential File organization
c) Random/Direct Access File Organization
d) Indexed Sequential Access Method(ISAM)
45. Which architecture is used for user interface programs and application programs that
run on client side?
a) One-tier architecture b) Two-tier architecture
c) Three-tier architecture d) Four-tier architecture
46. Which architecture is commonly used architecture for web applications?
a) One-tier architecture b) Two-tier architecture
c) Three-tier architecture d) Four-tier architecture
47. Which of the following is describe show the data is represented and used?
a) Database architecture b) Data model
c) Normalization d) Key
48. Which of the following defines the logical design of data?
a) Database architecture b) Data model
c) Normalization d) Key
49. The process of applying a data model theory to create a data model instance is:
a) Database architecture b) Data modelling
c) Normalization d) Key
50. Which of the following is the database model?
a)Hierarchical Model b) Network Model
c) Relational Model d) All of the above
51. database model is the oldest type of data model, developed by IBM?
a) Hierarchical Model b) Network Model
c) Relational Model d) All of the above
52. Which of the following database model is presented by Conference on Data Systems
Languages (CODASYL)?
a) Hierarchical Model b) Network Model
c) Relational Model d) All of the above
56. Which of the following database model is developed by E. F. Codd?
a) Hierarchical Model b) Network Model
c) Relational Model d) All of the above
57. In which data model, data is organized in tree-like structure?
a) Hierarchical Model b) Network Model
c) Relational Model d) All of the above
58. In which data model, is the data organized in the form of graphs?
a) Hierarchical Model b) Network Model
c) Relational Model d) All of the above
59. In which data model, is the data organized in the form of table?
a) Hierarchical Model b) Network Model
c) Relational Model d) All of the above
60. In which data model, there are no physical links between the data?
a) Hierarchical Model b) Network Model
c) Relational Model d) All of the above
61. Which of the following is the process of organizing data in a database?
a) Database architecture b) Data model
c) Normalization d) Key
62. Which of the following is based on the concept of a determinant?
a) First Normal Form b) Second Normal Form
c) Third Normal Form d) BCNF
63. Which of the following is visual representation of data that describes how data is
related to each other?
a) Database architecture b) Data model
c) Normalization d) ER-Diagram
64. The following is the component of ER-diagram.
a) Entity b) Attribute
c) Relationship d) All of the above
65. The following is not a component of ER-diagram.
a) Entity b) Attribute
c) Relationship d) Row
66. represented using rectangle in ER-diagram?
a) Entity b) Attribute
c) Relationship d) Row
67. Which of the following is represented using double rectangle in ER-diagram?
a) Weak entity b) Attribute
c) Relationship d) Row
68. Which of the following is represented using eclipse in ER-diagram?
a) Weak entity b) Attribute
c) Relationship d) Row
69. Which of the following is represented using eclipse with underlying lines in ER
diagram?
a) Weak entity b) Key Attribute
c) Relationship d) Row
70. Which of the following is represented using diamond symbol in ER-diagram?
a) Weak entity b) Key Attribute
c) Relationship d) Row
71. Which of the following is an entity that depends on another entity?
a) Weak entity b) Attribute
c) Relationship d) Row
72. Which of the following describes a property or characteristic of an entity?
a) Weak entity b) Attribute
c) Relationship d) Row
73. Which of the following is an attribute can also have their own attributes?
a) Weak entity b) Key Attribute
c) Composite attribute d) Relationship
74. Which of the following describes relations between entities?
a) Weak entity b) Key Attribute
c) Composite attribute d) Relationship
75. Which of the following is the relation between two entities?
a) Binary relationship b) Recursive relationship
c) Ternary relationship d) Relative relationship
76. In which of the following, entity is related with itself
a) Binary relationship b) Recursive relationship
c) Ternary relationship d) Relative relationship
77. Which of the following is a set of one or more columns whose combined values are
unique among all occurrences in a given table?
a) Table b)Entity
c) Tuple d) Key
78. uniquely identify each record in a table.
a) Primary key b)Foreign key
c) Alternate key d) Super Key
79. Which of the following is a field in a relational table that matches the primary key
column of another table?
a) Candidate key b)Foreign key
c) Alternate key d) Super Key
80. Which of the following is any set of one or more columns whose combined values are
unique among all occurrences?
a) Candidate key b)Foreign key
c) Alternate key d) Super Key
81. Which of the following is not currently selected as the primary key?
a) Candidate key b)Foreign key
c) Alternate key(Secondary key) d) Super Key
82. Which of the following is all sets of columns for which no two rows share the same
values for those sets?
a) Candidate key b)Foreign key
c) Alternate key(Secondary key) d) Super Key
83. Which of the following is consists of two or more attributes that uniquely identify an
entity occurrence?
a) Primary key b)Foreign key
c) Candidate key d) Composite key
84. Which of the following specifies how many instances of an entity related to one
instance of another entity?
a) Normalization b) Cardinality
c) Ordinality d) Aggregation
85. Which of the following describes the relationship as either mandatory or optional?
a) Normalization b) Cardinality
c) Ordinality d) Aggregation
86. Which of the following is a bottom-up approach in which two lower level entities
combine to form a higher level entity?
a) Normalization b)Generalization
c) Specialization d) Aggregation
87. Which of the following is a top-down approach in which one higher level entity can be
broken down into two lower-level entities?
a) Normalization b) Generalization
c) Specialization d) Aggregation
88. .............. a process when relation between two entities is treated as a single entity?
a) Normalization b) Generalization
c) Specialization d) Aggregation
89. Which of the following is the formal description of how a relational database operates?
a) Normalization b) Generalization
c) Specialization d) Relational Algebra
90. Which of the following is a repository of an organization's electronically stored data?
a) Normalization b) Generalization
c) Data warehouse d) Data Mining
91. Which of the following is an analysis and picking out relevant information?
a) Normalization b) Generalization
c) Data warehouse d) Data Mining
92. Which of the following is data about data?
a) Metadata b) Generalization
c) Data warehouse d) Data Mining
93. Which of the following is several fundamental stages evolved in data warehouse?
a) Offline operational database b) Offline data warehouse
c) Real Time data warehouse d) All of the above
94. Which of the following is component of data warehouse?
a) Data Source b)Data transformation
c) Metadata d) All of the above
95. Which of the following is an operator which works on two sets?
a) Cartesian product b)Re1ationa1 SELECT
c) Relational PROJECT d) Set operation
96. Which of the following combines the tuples of one relation with all the tuples of the
other relation?
a) Cartesian product b)Re1ationa1 SELECT
c) Relational PROJECT d) Set operation
97. Which of the following is used to combine related tuples from two relations?
a) Cartesian product b)Re1ationa1 SELECT
c) Relational PROJECT d) Join operation
102. DBMS stands for:
a) Data Base Management System b) Dual Base Management System
c) Double Base Management System d) Data Basement Management System
103. RDBMS stands for:
a) Relational Data Base Management System
b)Relational Dual Base Management System
c) Relational Double Base Management System
d) Relational Data Basement Management System
104. ISAM stands for:
a) Indexed Sequential Access Method
b) Indexed Serial Access Method
c) Indexed Sequential Access Management
d) Indexed Serial Access Management
105. BCNF stands for:
a) Boyce and Codd Normal Form b)Boyce and Code Normal Form
c) Basic and Codd Normal Form d) Basic and Code Normal Form
106. CODASYL stands for:
a) Conference on Data Systems Languages
b) Computer on Data Systems Languages
c) Code on Languages
Data
Systems 107. ODBC stands for:
Languages a) Open Database Connectivity b)Open
d) Computer Database Computer
on Double c) Open Data Connectivity d) Open Data
Systems Computer
Here are the answers to the questions: 42. c) Random Access File Organization
43. c) Random/Direct Access File
1. a) Data Organization (Random access
2. b) Information method)
3. b) Information 44. d) Indexed Sequential Access
4. c) Data processing Method(ISAM)
5. c) Database 45. b) Two-tier architecture
6. c) Table 46. c) Three-tier architecture
7. a) Record 47. b) Data model
8. a) Tuple 48. b) Data model
9. a) Row 49. b) Data modelling
10. a) Row 50. d) All of the above
11. a) Tuple 51. a) Hierarchical Model
12. d) Name 52. b) Network Model
13. b) Attribute 53. c) Relational Model
14. d) Domain 54. a) Hierarchical Model
15. c) Entity 55. b) Network Model
16. a) Index field 56. c) Relational Model
17. d) Logical data type 57. c) Relational Model
18. d) DBMS 58. c) Normalization
19. a) MySQL 59. b) Second Normal Form
20. d) All of the above 60. d) ER-Diagram
21. a) Centralized data management 61. d) All of the above
22. a) Controlled data redundancy 62. d) Row
23. d) All of the above 63. a) Entity
24. b) Data integrity 64. a) Weak entity
25. a) DBMS architecture 65. b) Attribute
26. a) Physical level (Internal level) 66. b) Key Attribute
27. a) Internal level 67. c) Relationship
28. b) Logical level (Conceptual level) 68. a) Weak entity
29. b) Logical view (Conceptual view) 69. b) Attribute
30. b) Logical level (Conceptual level) 70. c) Composite attribute
31. c) View level (External level) 71. d) Relationship
32. d) All of the above 72. a) Binary relationship
33. a) Application programmers and 73. b) Recursive relationship
system analysts 74. d) Key
34. c) Database Administrator (DBA) 75. a) Primary key
35. d) Database designers 76. b) Foreign key
36. b) Data Independence 77. a) Candidate key
37. b) Data Independence 78. c) Alternate key(Secondary key)
38. a) Serial File Organization 79. a) Candidate key
39. b) Sequential File organization 80. d) Composite key
40. b) Sequential File organization 81. b) Cardinality
41. c) Random/Direct Access File 82. c) Ordinality
Organization 83. b) Generalization
84. c) Specialization 94. d) Join operation
85. d) Aggregation 95. a) Data Base Management System
86. d) Relational Algebra 96. a) Relational Data Base Management
87. c) Data warehouse System
88. d) Data Mining 97. a) Indexed Sequential Access Method
89. a) Metadata 98. a) Boyce and Codd Normal Form
90. d) All of the above 99. a) Conference on Data Systems
91. d) All of the above Languages
92. d) Set operation 100. a) Open Database
93. a) Cartesian product Connectivity
22. Which of the following command is used to fetch the data from a database table in SQL?
a) Insert b) Select
c) Grant d) Revoke
23. Which is a fixed length non-Unicode character in SQL?
a) Char b) Varchar
c) String d) Number
24. Which of the following is a variable length non-Unicode data in SQL?
a) Char b) Varchar
c) String d) Number
25. The following is a logical operator in SQL:
a) Any b) Between
c) Exists d) All of the above
26.Following is not a logical operator in SQL:
a) Any b) Between
c) Exists d) Exit
27. Which of the following operators is used to compare a value to all values in another
value set in SQL?
a) All b) Any
c) Between d)And
28. Which of the following operators allows the existence of multiple conditions in an SQL
statement WHERE clause?
a) All b) Any
c) AND d)0R
29. Which of the following operator is used to combine multiple conditions in an SQL
statement WHERE clause.? a) All b) Any
c) AND d) OR
30. Which of the following operators is used to search for values that are within a set of
values, given the minimum value and the maximum value?
a) All b) Any
c) Between d)And
31. Which of the following operator is used to search for the presence of a row in a specified
table that meets certain criteria?
a) All b) Any
c) Between d) Exists
32. Which of the following operator is used to compare a value to a list of literal values that
have been specified?
a) All b) Any
c) Between d) Exists
33. Which of the following operators is used to compare values to similar values using
wildcard operators?
a) All b) In
c) Between d)Like
34. Which of the following is used to fetch the data based on matching single value in SQL?
a) Boolean expression b) Numeric expression
c) Date expression d) Relational expression
35. Which of the following is used to perform any mathematical operation in any Query?
a) Boolean expression b) Numeric expression
c) Date expression d) Relational expression
36. Which of the following is used to return current system date and time value in SQL?
a) Boolean expression b) Numeric expression
c) Date expression d) Relational expression
37. Which of the following are the rules enforced on data columns on table in SQL?
a) Expressions b) Operators c) Functions d) Constraints
38. Which of the following defines a column or combination of columns which uniquely
identifies each row in the table in SQL?
a) Primary key b) Foreign Key
c) Not Null d) Unique
39. Which of the following identifies any column referencing the primary key in another
table in SQL?
a) Primary key b) Foreign Key
c) Not Null d) Unique
40. Which of the following is referential integrity in SQL?
a) Primary key b) Foreign Key
c) Not Null d) Unique
41. Which of the following ensures that a column or a group of columns in each row have a
distinct value in SQL?
a) Primary key b) Foreign Key
c) Not Null d) Unique
42. Which of the following defines a business rule on a column in SQL?
a) Primary key b) Foreign Key
c) Check d) Unique
43. Which of the following is used to sort the data in ascending or descending order, based
on one or more columns in SQL?
a) Order by b) Group by
c) Where d) Arrange
44. Which is used to use in collaboration with the select statement to arrange identical data
into groups?
a) Order by b) Group by
c) Where d) Arrange
45. Which of the following is group function in SQL?
a) Count( ) b) Max( )
c) Min( ) d) All of the above
46. Which of the following eliminates all the duplicate records and fetching only unique
records in SQL?
a) Primary key b) Foreign Key
c) Distinct d) Unique
47. Which of the following is used to represent a missing value in SQL?
a) Primary key b) Null
c) Distinct d) Unique
48. Which of the following command is the transactional command used to save changes
invoked by a transaction to the database?
a) Create b) Insert
c) Revoke d) Commit
49. Which of the following is used to enforce database security in a multiple user database
environment?
a) DDL b) DML
c) DCL d) DQL
50. Which of the following defines the access rights provided to a user on a database Object
in SQL?
a) Privilege b) Insert
c) Revoke d) Commit
51. Following is a scalar function in SQL.
a) Single row function b) Single column function
c) Single table function d)Group function
52. Which of the following functions that accept character input and can return both
character and number values?
a) Numeric function b) Character or Text function
c) Conversion function d) Date function
53. Which of the following is a single row and single column dummy table provided by
oracle?
a) Single table b) Dual Table
c) Complete table d) All of the above
54. Which of the following is used to perform mathematical calculations without using a
table
a) Single table b) Dual Table
c) Complete table d)All of the above
1. c) Structured Language
2. a) Data Definition Language (DDL)
3. a) Data Definition Language (DDL)
4. a) Data Definition Language (DDL)
5. b) Data Manipulation Language (DML)
6. d) All of the above
7. d) Delete
8. d) All of the above
9. d) Create
10. c) Both a and b
11. d) Insert
12. d) Select
13. a) Create
14. d) Alter
15. c) Drop
16. a) Insert
17. a) Update
18. b) Delete
19. c) Grant
20. d) Revoke
21. b) Select
22. b) Select
23. a) Char
24. b) Varchar
25. d) All of the above
26. d) Exit
27. a) All
28. c) AND
29. c) AND
30. c) Between
31. d) Exists
32. b) Any
33. d) Like
34. d) Relational expression
35. b) Numeric expression
36. c) Date expression
37. d) Constraints
38. a) Primary key
39. b) Foreign Key
40. b) Foreign Key
41. a) Primary key
42. c) Check
43. a) Order by
44. b) Group by
45. d) All of the above
46. c) Distinct
47. b) Null
48. d) Commit
49. c) DCL
50. a) Privilege
51. a) Single row function
52. b) Character or Text function
53. b) Dual Table
54. b) Dual Table
OMPUTER NETWORKS
1) The full form of OSI is…………
a. Operating System interface
b. Optical System interconnection
c. Operating System Internet
d. Open system interconnection
2) What is a HUB?
a. Software
b. Computing device
c. Network device
d. Calculating device
3) What do a set of rules define?
a. SMTP
b. FTP
c. IMAP
d. Protocol
4) Identify among the following which is mainly used to host web site.
a. Mail server
b. Webserver
c. Database server
d. None
5) Identify the full form of HTTP?
a. Hypertext Transfer Protocol
b. Hypertext Transfer Package
c. Hyper Transfer Text Package
d. Hyper Transfer Text Practice
6) Identify the protocol primarily used for browsing data.
a. FTP
b. TCP
c. TFTP
d. HTTP
7) Identify the first network which was based on TCP/IP protocol.
a. ARPANET
b. HUB
c. Ethernet Card
d. Router
8) What does TCP/IP stand for?
a. Telephone control protocol / Internet Protocol
b. Transmission control protocol/Internet protocol
c. Transmission control protocol/International protocol d. None
9) The collection of hyperlinked documents on the internet known as?
a. HTML
b. Email
c. WWW
d. Internet
10) The location of a resource on the internet given by
a. Email
b. IP
c. Protocol
d. URL
11) Identify the incorrect network topology,
a. Bus
b. Star
c. P2P
d. Ring
12) What is the protocol used when the main server sends mail to another mail server?
a. FTP
b. SMTP
c. TCP/IP
d. MIME
13) Identify among the following network device used to connect two dis-similar types of
networks.
a. Switch
b. Hub
c. Bridge
d. Gateway
14) Identify the device used to boost up a weak signal.
a. Modem
b. Repeater
c. Switch
d. Router
15) The arrangement where all data pass through a central computer is known as
a. Ring topology
b. Mesh topology
c. Star topology
d. Bus topology
16) The device used in the network layer?
a. Application gateway
b. Switch
c. Router
d. Repeaters
17) Which of the following topology arrangements is a point-to-point line configuration?
a. Ring
b. Mesh
c. Star
d. All the above
18) Identify the device which links two homogeneous packed broadcast local networks.
a. Hub
b. Router
c. Bridge
d. Gateway
19) What does LAN stand for?
a. Local Array Network
b. Local Area Network
c. Local Area Net
d. None
20) Identify the switching method in which the message is divided into small packets.
a. Virtual switching
b. Packet switching
c. Message switching
d. None
21) Identify among the following servers which allow LAN users to share data.
a. Communication server
b. Point server
c. Data server
d. File server
22) The location of a resource on the internet is given by its ………….
a. Protocol
b. URL
c. E-mail address
d. ICQ