Professional Documents
Culture Documents
For the 8-bit word 00111001, the check bits stored with it would be 0111.
Suppose when the word is read from memory, the check bits are calculated to be
1101.What is the data word that was read from memory?
A.
10011001
B.
00011001
C.
00111000
D.
11000110
View/Hide
Ans
Correct Answer is B
Explanation
2.
A.
B.
C.
D.
View/Hide
Ans
Correct Answer is B
Explanation
3.
A.
CALL 0010 H
B.
CALL 0034 H
C.
CALL 0038 H
D.
CALL 003C H
View/Hide
Correct Answer is C
Ans
Explanation
4.
A.
FADED
B.
AEOBE
C.
ADOBE
D.
ACABE
View/Hide
Ans
Correct Answer is C
Explanation
5.
The CPU of a system having 1 MIPS execution rate needs 4 machine cycles on
an average for executing an instruction. The fifty percent of the cycles use
memory bus. A memory read/write employs one machine cycle. For execution of
the programs, the system utilizes 90 percent of the CPU time. For block data
transfer, an IO device is attached to the system while CPU executes the
background programs continuously. What is the maximum IO data transfer rate
if programmed IO data transfer technique is used?
A.
500 Kbytes/sec
B.
2.2 Mbytes/sec
C.
125 Kbytes/sec
D.
250 Kbytes/sec
View/Hide
Ans
Correct Answer is D
Explanation
6.
A.
B.
C.
27
D.
11
View/Hide
Ans
Correct Answer is B
Explanation
7.
Let E1 and E2 be two entities in E-R diagram with simple single valued
attributes. R1 and R2 are two relationships between E1 and E2 where R1 is onemany and R2 is many - many. R1 and R2 donot have any attributes of their own.
How many minimum number of tables are required to represent this situation in
the relational model ?
A.
B.
C.
D.
View/Hide
Ans
Correct Answer is A
Explanation
8.
A.
the average marks of male students is more than the average marks of the
students in the same department
B.
The average marks of male students is more than the average marks of the
students in the university
C.
The average marks of male students is more than the average marks of male
students in the university
D.
The average marks of students is more than the average marks of male students
in the university
View/Hide
Correct Answer is D
Ans
Explanation
9.
A.
B.
C.
D.
View/Hide
Ans
Correct Answer is B
Explanation
10.
A.
Non key attribute V_name is dependent on V_no which is part of composite key
B.
C.
D.
View/Hide
Ans
Correct Answer is A
Explanation
A.
R1R2-->(R1-R2)
B.
R1-->R2
C.
R1R2-->(R2-R1)
D.
R2-->R1R2
View/Hide
Ans
Correct Answer is C
Explanation
12.
In the index allocation scheme of blocks to a file, the maximum possible size of
the file depends on
A.
The number of blocks used for the index, and the size of the index
B.
C.
D.
View/Hide
Ans
Correct Answer is A
Explanation
13.
Give the number of principal vanishing point (s) along with their direction for the
standard perspective transformation :
A.
B.
C.
D.
View/Hide
Ans
Correct Answer is A
Explanation
14.
Consider a triangle represented by A(0, 0), B(1, 1), C(5, 2). The triangle is
rotated by 45 degrees about a point P( -1, -1). The co-ordinates of the new
triangle obtained after rotation shall be
A.
B.
C.
D.
View/Hide
Ans
Correct Answer is A
Explanation
15.
The process of dividing an analog signal into a string of discrete outputs, each of
constant amplitude is called
A.
Strobing
B.
Amplification
C.
Conditioning
D.
Quantization
View/Hide
Ans
Correct Answer is D
Explanation
16.
A.
POLYLINE
B.
POLYDRAW
C.
FILL AREA
D.
POLYMARKER
View/Hide
Ans
Correct Answer is B
Explanation
17.
A.
Mapping the co-ordinates of the points and lines that form the picture into
appropriate co-ordinates on the device or workstation is known as viewing
transformation.
B.
C.
The co-ordinate system that corresponds to the device or workstation where the
image is to be displayed is known as physical device co-ordinate system.
D.
Left-handed co-ordinate system in which the display area of the virtual display
device corresponds to the unit(|x|) square whose lower left handed corner is at
origin of the co-ordinate system, is known as normalized device co-ordinate
system.
View/Hide
Ans
Correct Answer is D
Explanation
Match the following
List-I
18.
List-II
Flood Gun
Collector
Ground
Phosphorus
Grains
Writing Gun
System
B.
C.
D.
View/Hide
Ans
Correct Answer is A
Explanation
19.
A.
B.
C.
D.
View/Hide
Ans
Correct Answer is D
Explanation
20.
A.
(1 + 01)*(10 + 01)
B.
(1 + 01)*01
C.
(1 + 01)*(1 + 01)
D.
(10 + 01)* 01
View/Hide
Ans
Correct Answer is C
Explanation
The transition function for the language L = {w|na(w) and nb(w) are both odd} is
given by:
(q0, a) = q1
(q0, b) = q2
(q1, a) = q0
(q1, b) = q3
(q2, a) = q3
(q2, b) = q0
(q3, a) = q2
(q3, b) = q1
21.
q0 and q0 respectively
B.
q0 and q1 respectively
C.
q0 and q2 respectively
D.
q0 and q3 respectively
View/Hide
Ans
Correct Answer is D
Explanation
22.
A.
ABC D
B.
A B C D true
C.
A B C D true
D.
A B C D false
View/Hide
Ans
Correct Answer is A
Explanation
23.
A.
B.
C.
D.
View/Hide
Ans
Correct Answer is B
Explanation
24.
A.
B.
C.
if we resolve a negated goal G against a fact or rule A to get Clause C then C has
positive literal and non null goal.
D.
if we resolve a negated goal G against a fact or rule A to get clause C then C has
positive literal or null goal.
View/Hide
Ans
Correct Answer is B
Explanation
25.
A.
Broadcasting
B.
Unicasting
C.
Packet Switching
D.
Circuit Switching
View/Hide
Ans
Correct Answer is D
Explanation
26.
Which of the following control fields in TCP header is used to specify the sender
has no more data to transmit ?
A.
FIN
B.
RST
C.
SYN
D.
PSH
View/Hide
Ans
Correct Answer is A
Explanation
27.
A.
B.
C.
D.
View/Hide
Ans
Correct Answer is B
Explanation
28.
A.
CTTOEWMROPNRUEK
B.
MROUEKCTTPNROEW
C.
OEWPNRCTTUEKMRO
D.
UEKPNRMROOEWCTT
View/Hide
Ans
Correct Answer is C
Explanation
29.
samples per hertz). what is the bit rate required, if it is assumed that each sample
requires 8 bits ?
A.
32 kbps
B.
64 kbps
C.
128 kbps
D.
256 kbps
View/Hide
Ans
Correct Answer is C
Explanation
30.
A.
65535
B.
65515
C.
65495
D.
65475
View/Hide
Ans
Correct Answer is C
Explanation
A.
Dijkstra' algorithm
B.
Bellman-Ford algorithm
C.
Kruskal Algorithm
D.
Floyd-Warshall algorithm
View/Hide
Ans
Correct Answer is D
Explanation
32.
A.
B.
C.
D.
View/Hide
Ans
Correct Answer is C
Explanation
33.
A.
lg(lg*n)
B.
lg*(lg n)
C.
lg(n!)
D.
lg*(n!)
View/Hide
Ans
Correct Answer is A
Explanation
34.
Consider a hash table of size m=100 and the hash function h(k) = floor(m(kA
mod 1)) for A = (5 1)/2 = 0.618033. Compute the location to which the key k
= 123456 is placed in hash table.
A.
77
B.
82
C.
88
D.
89
View/Hide
Ans
Correct Answer is C
Explanation
35.
A.
B.
C.
D.
View/Hide
Ans
Correct Answer is D
Explanation
36.
A.
B.
zh
C.
ceil(n/zh)
D.
ceil(n/zh + 1)
View/Hide
Ans
Correct Answer is D
Explanation
37.
A.
Private
B.
Protected
C.
Public
D.
Friend
View/Hide
Ans
Correct Answer is C
Explanation
38.
A.
B.
Void destroy()
C.
int getServerPort()
D.
View/Hide
Ans
Correct Answer is D
Explanation
39.
A.
B.
C.
D.
View/Hide
Ans
Correct Answer is D
Explanation
40.
A.
+*!
B.
#*!
C.
+*?
D.
-*?
View/Hide
Ans
Correct Answer is C
Explanation
A.
B.
C.
D.
View/Hide
Ans
Correct Answer is A
Explanation
42.
A.
Inheritance
B.
Polymorphism
C.
Encapsulation
D.
Abstraction
View/Hide
Ans
Correct Answer is C
Explanation
43.
Verification :
A.
refers to the set of activities that ensure that software correctly implements a
specific function.
B.
C.
D.
both 1 and 2
View/Hide
Ans
Correct Answer is D
Explanation
44.
Which design matric is used to measure the compactness of the program in terms
of lines of code ?
A.
Consistency
B.
Conciseness
C.
Efficiency
D.
Accuracy
View/Hide
Ans
Correct Answer is B
Explanation
45.
A.
Requirements validation
B.
Requirements elicitation
C.
Feasibility Study
D.
Requirement reviews
View/Hide
Ans
Correct Answer is B
Explanation
46.
A.
B.
C.
D.
View/Hide
Ans
Correct Answer is B
Explanation
47.
A.
Top-down Approach
B.
C.
Process of elaboration
D.
View/Hide
Ans
Correct Answer is D
Explanation
48.
A.
B.
C.
D.
View/Hide
Ans
Correct Answer is A
Explanation
Match the following for operating system techniques with the most appropriate
advantage :
List-I
49.
List-II
(a) Spooling
(b) Mult
iprogramming
Distributed
Computing
B.
C.
D.
View/Hide
Ans
Correct Answer is B
Explanation
50.
Which of the following statements is not true for Multi Level Feedback Queue
processor scheduling algorithm ?
A.
B.
C.
D.
View/Hide
Ans
Correct Answer is C
Explanation
51.What is the most appropriate function of Memory Management Unit (MMU) ?A.It is an
associative memory to store TLBB.It is a technique of supporting multi programming by
creating dynamic partitionsC.It is a chip to map virtual address to physical addressD.It is an
algorithm to allocate and deallocate main memory to a processView/Hide Ans
Correct Answer is B
Explanation52.Dining Philosopher's problem is aA.Producer Consumer problemB.Classical
IPC problemC.Starvation ProblemD.Synchronization PrimitiveView/Hide Ans
Correct Answer is B
Explanation53.In ______ allocation method for disk block allocation in a file system,
insertion and deletion of blocks in a file is easy.A.IndexB.LinkedC.ContiguousD.Bit
MapView/Hide Ans
Correct Answer is A
Explanation54.A unix file may be of type :A.Regular fileB.Directory FileC.Device
FileD.Any one of the aboveView/Hide Ans
Correct Answer is D
Explanation55.Match the following :
List-I
List-II
codes : (a) (b) (c) (d)A.(iii) (ii) (iv) (i)B.(iii) (i) (iv) (ii)C.(i) (ii) (iii) (iv)D.(i) (iii) (iv)
(ii)View/Hide Ans
Correct Answer is B
Explanation74.WOW32 is aA.Win 32 API library for creating processes and
threads.B.Special kind of file system to the NT name space.C.Kernel - mode objects
accessible through Win32 APID.Special execution environment used to run 16 bit windows
applications on 32 - bit machines.View/Hide Ans
Correct Answer is D
Explanation75.The Unix command :
$ vi file1 file2A.Edits file1 and stores the contents of file1 in file2B.Both files i.e File1 and
file2 can be edited using "ex" command to travel between filesC.Both files can be edited
using the "mv" command to move between the filesD.Edits file1 first, saves it and the edits
file2View/Hide Ans
Correct Answer is B
Explanation
Operating System
1.
If the disk head is located initially at 32, find the number of disk moves
required with FCFS if the disk queue of I/O blocks requests are 98, 37, 14,
124, 65, 67.
A.
239
B.
310
C.
321
D.
325
View/Hide
Ans
Correct Answer is c
Explanation
2.
A.
Segmentation
B.
C.
Swapping
D.
Paging
View/Hide
Ans
Correct Answer is a
Explanation
3.
A.
B.
C.
10
D.
13
View/Hide
Ans
Correct Answer is d
Explanation
4.
A.
B.
C.
D.
to avoid collision
View/Hide
Ans
Correct Answer is a
Explanation
5.
A.
mutual exclusion
B.
C.
no pre-emption
D.
circular wait
View/Hide
Ans
Correct Answer is a
Explanation
6.
A.
increases
B.
decreases
C.
remains constant
D.
varies irregularly
View/Hide
Ans
Correct Answer is d
Explanation
7.
A.
Preemption
B.
Swapping
C.
Spooling
D.
Scheduling
View/Hide
Ans
Correct Answer is b
Explanation
8.
A.
Print server
B.
Virtual machine
C.
Virtual memory
D.
View/Hide
Ans
Correct Answer is d
Explanation
9.
A.
It is event driven
B.
It is object oriented
C.
D.
View/Hide
Ans
Correct Answer is a
Explanation
10.
A.
Extensible
B.
Portable
C.
Reliable
D.
View/Hide
Ans
Correct Answer is d
Explanation
11.
Blocking and Caching are the terms associated with which Operating system
functions respectively
A.
B.
C.
D.
View/Hide
Ans
Correct Answer is b
Explanation
12.
A.
Monitor
B.
Kernel
C.
Supervisor
D.
Server
View/Hide
Ans
Correct Answer is d
Explanation
13.
A.
Batch Processing
B.
Real time
C.
Distributed
D.
Time sharing
View/Hide
Ans
Correct Answer is c
Explanation
14.
A.
Batch Processing
B.
Multiprogramming
C.
Distributed
D.
Time sharing
View/Hide
Ans
Correct Answer is d
Explanation
15.
A.
Batch Processing
B.
Real time
C.
multiprogramming
D.
Time sharing
View/Hide
Ans
Correct Answer is c
Explanation
16.
A.
Batch Processing
B.
Multiprogramming
C.
Distributed
D.
Time sharing
View/Hide
Ans
Correct Answer is c
Explanation
17.
A.
Batch Processing
B.
Real time
C.
multiprogramming
D.
Time sharing
View/Hide
Ans
Correct Answer is b
Explanation
18.
A.
B.
Privileged mode
C.
Memory Protection
D.
Both 2 and 3
View/Hide
Ans
Correct Answer is d
Explanation
19.
A.
Scheduling
B.
Memory Management
C.
I/O management
D.
All of above
View/Hide
Ans
Correct Answer is d
Explanation
20.
A.
Real Time
B.
C.
D.
View/Hide
Ans
Correct Answer is c
21.
A.
Computation speed up
B.
Resource sharing
C.
Reliability
D.
Communication
View/Hide
Ans
Correct Answer is a
Explanation
22.
A.
Batch Processing
B.
Real time
C.
Distributed
D.
Time sharing
View/Hide
Ans
Correct Answer is b
Explanation
23.
A.
Preemption
B.
Swapping
C.
Spooling
D.
Scheduling
View/Hide
Ans
Correct Answer is b
Explanation
24.
A.
Print server
B.
Virtual machine
C.
Virtual memory
D.
View/Hide
Ans
Correct Answer is d
Explanation
25.
A.
It is event driven
B.
It is object oriented
C.
D.
View/Hide
Ans
Correct Answer is a
Explanation
26.
A.
Extensible
B.
Portable
C.
Reliable
D.
View/Hide
Ans
Correct Answer is d
Explanation
27.
Blocking and Caching are the terms associated with which Operating system
functions respectively
A.
B.
C.
D.
View/Hide
Ans
Correct Answer is b
Explanation
28.
A.
Monitor
B.
Kernel
C.
Supervisor
D.
Server
View/Hide
Ans
Correct Answer is d
Explanation
29.
A.
Batch Processing
B.
Real time
C.
Distributed
D.
Time sharing
View/Hide
Ans
Correct Answer is c
Explanation
30.
A.
Batch Processing
B.
Multiprogramming
C.
Distributed
D.
Time sharing
View/Hide
Ans
Correct Answer is d
31.
A.
Batch Processing
B.
Real time
C.
multiprogramming
D.
Time sharing
View/Hide
Ans
Correct Answer is c
Explanation
32.
A.
Batch Processing
B.
Multiprogramming
C.
Distributed
D.
Time sharing
View/Hide
Ans
Correct Answer is c
Explanation
33.
A.
Batch Processing
B.
Real time
C.
multiprogramming
D.
Time sharing
View/Hide
Ans
Correct Answer is b
Explanation
34.
A.
B.
Privileged mode
C.
Memory Protection
D.
Both 2 and 3
View/Hide
Ans
Correct Answer is d
Explanation
35.
A.
Scheduling
B.
Memory Management
C.
I/O management
D.
All of above
View/Hide
Ans
Correct Answer is d
Explanation
36.
A.
Real Time
B.
C.
D.
View/Hide
Ans
Correct Answer is c
Explanation
37.
A.
Computation speed up
B.
Resource sharing
C.
Reliability
D.
Communication
View/Hide
Ans
Correct Answer is a
Explanation
38.
A.
Batch Processing
B.
Real time
C.
Distributed
D.
Time sharing
View/Hide
Ans
Correct Answer is b
Explanation
39.
If ttra and tcam are the time taken to transfer a block from memory to
cache and access time of cache memory respectively, then what will be the
effective memory access time if h is the hit ratio
A.
B.
C.
h +(1-h) *(ttra+tcam)
D.
View/Hide
Ans
Correct Answer is b
Explanation
40.
A.
spatial locality
B.
temporal locality
C.
reference locality
D.
access locality
View/Hide
Ans
Correct Answer is a
Explanation
41.
A.
spatial locality
B.
temporal locality
C.
reference locality
D.
access locality
View/Hide
Ans
Correct Answer is b
Explanation
42.
A.
B.
C.
D.
View/Hide
Ans
Correct Answer is b
Explanation
43.
An Intel processor uses a cache block size of 128 bytes and a memory
transfer to cache is about 10 times the access time of cache memory. with
cache hit ratio of 0.97 what percent will be the effective memory access to
that of access time of memory
A.
20 percent
B.
30 percent
C.
40 percent
D.
50 percent
View/Hide
Ans
Correct Answer is c
Explanation
44.
A.
B.
C.
D.
View/Hide
Ans
Correct Answer is d
Explanation
45.
A.
B.
C.
D.
View/Hide
Ans
Correct Answer is d
Explanation
46.
A.
(tf-t0)/n
B.
tf*n/t0
C.
n/(tf-t0)
D.
n*tf*t0
View/Hide
Ans
Correct Answer is c
Explanation
47.
Which of these are the reasons for CPU-bound programs having higher
priority than the I/O bound programs
A.
B.
C.
D.
View/Hide
Ans
Explanation
48.
A.
B.
C.
D.
View/Hide
Ans
Correct Answer is c
Explanation
49.
A.
Fairness
B.
balance
C.
maximize throughput
D.
Policy enforcement
View/Hide
Ans
Correct Answer is c
Explanation
50.
A.
Convoy Effect
B.
C.
Simplicity
D.
non-preemptive
View/Hide
Ans
Correct Answer is a
51.
A.
10-100 millisec
B.
10-100 nanosec
C.
100-1000 millisec
D.
100-1000 nanosec
View/Hide
Ans
Correct Answer is a
Explanation
52.
A.
80%
B.
70%
C.
60%
D.
50%
View/Hide
Ans
Correct Answer is a
Explanation
53.
Interval between the time since submission of the job to the time its results
become available, is called
A.
Response Time
B.
Throughput
C.
Waiting time
D.
Turnaround Time
View/Hide
Ans
Correct Answer is a
Explanation
54.
A.
B.
C.
D.
Job Scheduler
View/Hide
Ans
Correct Answer is c
Explanation
55.
The scheduling in which CPU is allocated to the process with least CPUburst time is called
A.
Priority Scheduling
B.
C.
D.
View/Hide
Ans
Correct Answer is d
Explanation
56.
A.
blocked
B.
executing
C.
Waiting
D.
swapped
View/Hide
Ans
Correct Answer is b
Explanation
57.
A.
deadlock detection.
B.
deadlock prevention.
C.
deadlock avoidance.
D.
View/Hide
Ans
Correct Answer is d
Explanation
58.
A.
Shortest-job First.
B.
Round-Robin.
C.
Priority Based
D.
First-Come-First-Serve.
View/Hide
Ans
Correct Answer is d
Explanation
59.
A.
B.
C.
D.
View/Hide
Ans
Correct Answer is b
Explanation
60.
A.
B.
C.
only a
D.
both a and b
View/Hide
Ans
Correct Answer is b
61.
A.
Shortest-Seek-time-first scheduling
B.
simple-seek-time-first
C.
smallest seek-time-first.
D.
View/Hide
Ans
Correct Answer is a
Explanation
62.
Before proceeding with its execution, each process must acquire all the
resources it needs is called
A.
pre-emption.
B.
circular wait.
C.
D.
deadlock.
View/Hide
Ans
Correct Answer is c
Explanation
63.
The total time to prepare a disk drive mechanism for a block of data to be
read from is its
A.
Access Time
B.
Seek time
C.
D.
View/Hide
Ans
Correct Answer is c
Explanation
64.
A.
Starvation
B.
Relocation
C.
Promotion
D.
Ageing
View/Hide
Ans
Correct Answer is d
Explanation
65.
A.
B.
B, C and D
C.
A and B.
D.
Only A
View/Hide
Ans
Correct Answer is b
Explanation
66.
A.
B.
C.
D.
View/Hide
Ans
Correct Answer is c
Explanation
67.
A.
DMA
B.
Virtual Memory
C.
Processor Scheduler
D.
Disk manager
View/Hide
Ans
Correct Answer is a
Computer Fundamentals
1.
A.
CPU
B.
Memory
C.
Secondary storage
D.
Mass Storage
View/Hide
Ans
Correct Answer is D
Explanation
2.
Which of the following does not affect the resolution of a video display
image?
A.
Bandwidth
B.
C.
D.
Screen Size
View/Hide
Ans
Correct Answer is a
Explanation
3.
Latency time is
A.
B.
C.
D.
All of these
View/Hide
Ans
Correct Answer is a
Explanation
4.
A.
B.
C.
D.
View/Hide
Ans
Correct Answer is b
Explanation
5.
A.
B.
C.
D.
View/Hide
Ans
Correct Answer is c
Explanation
6.
A.
B.
C.
D.
View/Hide
Ans
Correct Answer is d
Explanation
7.
A.
Seek Time
B.
Latency Time
C.
Access Time
D.
None
View/Hide
Ans
Correct Answer is b
Explanation
8.
A.
Starvation
B.
Ageing
C.
Revocation
D.
Relocation
View/Hide
Ans
Correct Answer is b
Explanation
9.
A.
Syntax
B.
Semantics
C.
Structure
D.
Code
View/Hide
Ans
Correct Answer is c
Explanation
10.
A.
Swapping
B.
Spooling
C.
Semaphore
D.
Scheduler
View/Hide
Ans
Correct Answer is a
1.
A.
segmentation
B.
swapping
C.
D.
View/Hide
Ans
Correct Answer is a
Explanation
12.
Virtual memory is
A.
simple to implement
B.
C.
D.
View/Hide
Ans
Correct Answer is b
Explanation
13.
Before proceeding with its execution, each process must acquire all the
resources it needs is called
A.
B.
No pre-emption
C.
circular wait
D.
starvation
View/Hide
Ans
Correct Answer is a
Explanation
14.
A.
B.
C.
D.
View/Hide
Ans
Correct Answer is b
Explanation
15.
A.
B.
C.
D.
View/Hide
Correct Answer is c
Ans
Explanation
16.
A.
ready
B.
terminated
C.
executing
D.
blocked
View/Hide
Ans
Correct Answer is d
Explanation
17.
A.
B.
C.
D.
View/Hide
Ans
Correct Answer is d
Explanation
18.
A.
B.
C.
D.
View/Hide
Ans
Correct Answer is c
Explanation
19.
A.
between peers
B.
between an interface
C.
between modems
D.
across an interface
View/Hide
Ans
Correct Answer is a
Explanation
20.
A.
detector
B.
modulator
C.
stations
D.
transponders
View/Hide
Ans
Correct Answer is d
21.
A.
communications software
B.
protocol
C.
communication hardware
D.
View/Hide
Ans
Correct Answer is d
Explanation
22.
A.
B.
C.
D.
All of these
View/Hide
Ans
Correct Answer is d
Explanation
23.
A.
telephone lines
B.
coaxial cables
C.
modem
D.
microwave systems
View/Hide
Ans
Correct Answer is c
Explanation
24.
A.
Binary Search
B.
Linear Search
C.
Tree Search
D.
Hashing
View/Hide
Ans
Correct Answer is d
Explanation
25.
A.
B.
C.
D.
View/Hide
Ans
Correct Answer is c
Explanation
26.
A.
B.
C.
D.
View/Hide
Ans
Correct Answer is a
Explanation
27.
A.
floor address
B.
foundation address
C.
first address
D.
base address
View/Hide
Ans
Correct Answer is d
Explanation
28.
A.
array
B.
lists
C.
stacks
D.
all of these
View/Hide
Ans
Correct Answer is c
Explanation
29.
A.
B.
C.
D.
View/Hide
Ans
Correct Answer is c
Explanation
30.
A.
Physical layer
B.
C.
Network layer
D.
Transport layer
View/Hide
Ans
Correct Answer is a
31.
A.
128
B.
256
C.
512
D.
1024
View/Hide
Ans
Correct Answer is b
Explanation
32.
website visited
A.
Cookies
B.
Servelet
C.
History
D.
Resident Page
View/Hide
Ans
Correct Answer is a
Explanation
33.
A.
Applets
B.
Java Bean
C.
Sockets
D.
Java Component
View/Hide
Ans
Correct Answer is a
Explanation
34.
A.
Clear Text
B.
Encrypted Text
C.
Cipher Text
D.
Coded Text
View/Hide
Ans
Correct Answer is c
Explanation
35.
The method for storing data temporarily such that the input-output
of the same job is overlapped with its own processing, is known as
A.
Spooling
B.
Contention
C.
I/O wait
D.
Buffering
View/Hide
Ans
Correct Answer is d
Explanation
36.
A.
B.
C.
D.
View/Hide
Ans
Correct Answer is c
Explanation
37.
A.
BASIC
B.
FORTRAN
C.
Machine Language
D.
COBOL
View/Hide
Ans
Correct Answer is c
Explanation
38.
A.
user interface
B.
utility interface
C.
processing interface
D.
analytical interface
View/Hide
Ans
Correct Answer is a
Explanation
39.
A.
menu bar
B.
browser
C.
Office Assistant
D.
feature presentation
View/Hide
Ans
Correct Answer is a
Explanation
40.
A.
hardware
B.
monitor
C.
Status Bar
D.
user interface
View/Hide
Ans
Correct Answer is d
41.
Which of the following is the term for a request for specific data
contained in a database?
A.
question
B.
query
C.
inquiry
D.
quiz
View/Hide
Ans
Correct Answer is b
Explanation
42.
A.
application software
B.
browser
C.
Operating system
D.
shareware
View/Hide
Ans
Correct Answer is c
Explanation
43.
A.
mainframe computers
B.
microcomputers
C.
minicomputers
D.
supercomputers
View/Hide
Ans
Correct Answer is d
Explanation
44.
A.
keyboard
B.
microprocessor
C.
monitor
D.
mouse
View/Hide
Correct Answer is b
Ans
Explanation
45.
A.
Android
B.
Symbian
C.
iOS
D.
View/Hide
Ans
Correct Answer is d
Explanation
46.
A.
worksheet
B.
document
C.
database
D.
presentation
View/Hide
Ans
Correct Answer is b
Explanation
47.
A.
graphics
B.
input
C.
memory
D.
wireless
View/Hide
Ans
Correct Answer is d
Explanation
48.
The Internet was launched in 1969 when the United States funded a
project that developed a national computer network called
A.
Web
B.
ISP
C.
CERN
D.
ARPANET
View/Hide
Ans
Correct Answer is d
Explanation
49.
A.
Web
B.
ISP
C.
browser
D.
URL
View/Hide
Ans
Correct Answer is c
Explanation
50.
A.
programs
B.
procedures
C.
protocols
D.
hyperlinks
View/Hide
Ans
Correct Answer is c
51.
The last part of the domain name following the dot(.) is the
top........domain
A.
Level
B.
link
C.
locator
D.
language
View/Hide
Ans
Correct Answer is a
Explanation
52.
51.Many individuals create their own personal sites called Web logs,
or......
A.
social networks
B.
blogs
C.
wikis
D.
search engines
View/Hide
Ans
Correct Answer is b
Explanation
53.
A.
metasearch engines
B.
C.
spiders
D.
hits
View/Hide
Ans
Correct Answer is a
Explanation
54.
A.
Universal
B.
Web
C.
Premium
D.
Digital
View/Hide
Ans
Correct Answer is d
Explanation
55.
A.
plug-ins
B.
filters
C.
FTP
D.
DSL
View/Hide
Ans
Explanation
56.
A.
Basic applications
B.
Business suites
C.
Specialized applications
D.
Utility programs
View/Hide
Ans
Correct Answer is c
DBMS
1.
A.
B.
Deadlock situation
C.
Data manipulation
D.
File preemption
View/Hide
Ans
Correct Answer is B
Explanation
2.
Views are useful for _____ unwanted information, and for collecting together
information from more than one relation into a single view.
A.
Hiding
B.
Deleting
C.
Highlighting
D.
View/Hide
Ans
Correct Answer is A
Explanation
3.
A.
Classification
B.
Association
C.
Partition
D.
Clustering
View/Hide
Ans
Correct Answer is A
Explanation
4.
A.
1 dimension
B.
2 dimensions
C.
3 dimensions
D.
Multidimensions
View/Hide
Ans
Correct Answer is B
Explanation
5.
A.
B.
C.
D.
View/Hide
Ans
Correct Answer is B
Explanation
6.
Value that appears in one relation for a given set of attributes also appears
for a certain set of attributes in another relation.
A.
Logical Integrity
B.
Referential Integrity
C.
Domain Integrity
D.
Data Integrity
View/Hide
Ans
Correct Answer is B
Explanation
7.
A.
All branches that have greater assets than some branch located in Mumbai.
B.
All branches that have greater assets than all branches in Mumbai.
C.
D.
Any branch that has greater assets than any branch in Mumbai.
View/Hide
Ans
Correct Answer is A
Explanation
8.
A.
B.
C.
D.
View/Hide
Ans
Correct Answer is C
Explanation
9.
A.
B.
C.
D.
View/Hide
Ans
Correct Answer is A
Explanation
10.
A.
B.
C.
D.
View/Hide
Ans
Correct Answer is A
11.
A.
B.
C.
D.
View/Hide
Ans
Correct Answer is C
Explanation
12.
A.
(R1 R2) R1 or R1 R2 R2
B.
R1 R2 R1
C.
R1 R2 R2
D.
R1 R2 R1 and R1 R2 R2
View/Hide
Ans
Correct Answer is A
Explanation
13.
Which level of Abstraction describes how data are stored in the data
base ?
A.
Physical level
B.
View level
C.
Abstraction level
D.
Logical level
View/Hide
Ans
Correct Answer is A
Explanation
14.
A.
Closure Dependency
B.
Transitive Dependency
C.
Normal Dependency
D.
Functional Dependency
View/Hide
Ans
Correct Answer is B
Explanation
15.
A.
Relation key
B.
Foreign key
C.
Primary key
D.
Candidate key
View/Hide
Ans
Correct Answer is B
Explanation
16.
A.
Jamming
B.
Password
C.
Documentation
D.
Record lock
View/Hide
Ans
Correct Answer is D
Explanation
17.
A.
B.
C.
Disk data transfer rates are much less than memory data transfer
rate
D.
View/Hide
Ans
Correct Answer is B
Explanation
18.
A.
B.
C.
D.
View/Hide
Ans
Correct Answer is D
Explanation
19.
What is Granularity ?
A.
B.
C.
D.
View/Hide
Ans
Correct Answer is B
Explanation
20.
A.
Physical level
B.
View level
C.
Abstraction level
D.
Logical level
View/Hide
Ans
Correct Answer is D
21.
A.
B.
C.
D.
None
View/Hide
Ans
Correct Answer is C
Explanation
22.
A.
B.
C.
D.
Lossless Join
View/Hide
Ans
Correct Answer is A
Explanation
23.
D1+D2+... +Dn
B.
D1D2 ... Dn
C.
D1D2... Dn
D.
D1D2...Dn
View/Hide
Ans
Correct Answer is B
Explanation
24.
A.
Hierarchical
B.
Network
C.
Relational
D.
Sequential
View/Hide
Ans
Correct Answer is D
Explanation
25.
A.
B.
C.
D.
View/Hide
Ans
Correct Answer is C
Explanation
26.
A Network Schema
A.
B.
C.
D.
View/Hide
Ans
Correct Answer is B
Explanation
27.
A.
B.
C.
Symmetric only
D.
Transitive only
View/Hide
Ans
Correct Answer is B
Explanation
28.
A.
B.
C.
D.
View/Hide
Ans
Correct Answer is C
Explanation
29.
A.
B.
C.
D.
View/Hide
Ans
Correct Answer is D
Explanation
30.
A.
B.
C.
In 3NF
D.
In 1NF
View/Hide
Ans
Correct Answer is B
31.
A.
a b c d iii ii i iv
B.
a b c d ii i iv iii
C.
a b c d iii iv i ii
D.
a b c d i ii iii iv
View/Hide
Ans
Correct Answer is b
Explanation
32.
A.
Alter table
B.
Drop table
C.
Delete table
D.
Delete column
View/Hide
Ans
Correct Answer is a
Explanation
33.
With QBE, inserting records from one or more source tables into a
single target table can be achieved by:
A.
B.
C.
D.
View/Hide
Ans
Correct Answer is a
Explanation
34.
A.
Row
B.
Column
C.
Table
D.
Relation
View/Hide
Ans
Correct Answer is a
Explanation
35.
A.
Super Key
B.
Candidate key
C.
Primary key
D.
Foreign key
View/Hide
Ans
Correct Answer is d
Explanation
36.
A.
Meta Data
B.
Archive data
C.
Data Marts
D.
View/Hide
Ans
Correct Answer is c
Explanation
37.
A.
B.
C.
D.
View/Hide
Ans
Correct Answer is a
Explanation
38.
A.
B.
To prevent fragmentation
C.
Avoid redundancy
D.
To prevent replication
View/Hide
Ans
Correct Answer is c
Explanation
39.
A.
2 NF
B.
3 NF
C.
1 NF
D.
1 NF and 2 NF
View/Hide
Ans
Correct Answer is c
Explanation
40.
A file is:
A.
B.
C.
D.
volatile
View/Hide
Ans
Correct Answer is c
41.
A.
Tree structure
B.
C.
D.
Length
View/Hide
Ans
Correct Answer is a
Explanation
42.
A.
Tree structure
B.
Top-down method
C.
Bottom-up method
D.
Right-left approach
View/Hide
Ans
Correct Answer is b
Explanation
43.
A.
Record
B.
List
C.
Strings
D.
Title list
View/Hide
Ans
Correct Answer is a
Explanation
44.
A.
DBMS
B.
RDBMS
C.
DDBMS
D.
DML
View/Hide
Ans
Correct Answer is c
Explanation
45.
A.
1NF
B.
2NF
C.
3NF
D.
4NF
View/Hide
Ans
Correct Answer is c
Explanation
46.
A.
Network Model
B.
Object-oriented model
C.
Relational Model
D.
View/Hide
Ans
Explanation
47.
A.
Entity sets
B.
C.
attributes
D.
View/Hide
Ans
Correct Answer is c
Explanation
48.
A.
Attribute set
B.
attribute range
C.
domain
D.
group
View/Hide
Ans
Correct Answer is c
Explanation
49.
A.
1NF
B.
2NF
C.
3NF
D.
4NF
View/Hide
Ans
Correct Answer is c
Explanation
50.
A.
Top-down approach
B.
Bottom-up approach
C.
Left-right approach
D.
none of above
View/Hide
Ans
Correct Answer is a
51.
A.
Integrity
B.
Consistency
C.
Sufficiency
D.
None
View/Hide
Ans
Explanation
52.
A.
DBA
B.
C.
D.
Client
View/Hide
Ans
Correct Answer is a
Explanation
53.
A.
Foreign key
B.
Secondary key
C.
Candidate key
D.
Composite
View/Hide
Ans
Correct Answer is a
Explanation
54.
A.
1NF
B.
2NF
C.
3NF
D.
all of above
View/Hide
Ans
Correct Answer is c
Explanation
55.
The way a particular application views the data from the database
that the application uses is a
A.
Module
B.
Relational Model
C.
Schema
D.
Sub Schema
View/Hide
Ans
Correct Answer is d
Explanation
56.
A.
Deadlock
B.
Lost Update
C.
Uncommitted dependency
D.
Inconsistent data
View/Hide
Ans
Explanation
57.
A.
Tuple
B.
Entity
C.
Degree
D.
Attribute
View/Hide
Ans
Correct Answer is d
Explanation
58.
A.
B.
C.
D.
All of above
View/Hide
Ans
Correct Answer is c
Explanation
59.
A.
Updating
B.
Upgrading
C.
Restructuring
D.
Renewing
View/Hide
Ans
Correct Answer is d
Explanation
60.
A.
4th Dimensions
B.
FoxPro
C.
dbase-IV
D.
View/Hide
Ans
Correct Answer is a
61.
A.
A list of keys
B.
C.
D.
None of above
View/Hide
Ans
Correct Answer is d
Explanation
62.
A.
B.
C.
Answer queries
D.
View/Hide
Ans
Correct Answer is c
Explanation
63.
A.
Relations
B.
Domains
C.
Queries
D.
None of above
View/Hide
Ans
Correct Answer is d
Explanation
64.
A.
Attribute set
B.
Attribute range
C.
Domain
D.
Group
View/Hide
Ans
Correct Answer is b
Explanation
65.
A.
FORTRAN
B.
AUTOFLOW
C.
BPL
D.
TOTAL
View/Hide
Ans
Correct Answer is c
Explanation
66.
A.
B.
C.
D.
None
View/Hide
Ans
Correct Answer is c
Explanation
67.
A.
B.
Immediately Granted
C.
Immediately rejected
D.
Granted as is released by X
View/Hide
Ans
Correct Answer is b
Explanation
68.
command used to select only one copy of each set of duplicable rows
:
A.
Select Distant
B.
Select Unique
C.
Select Different
D.
None
View/Hide
Ans
Correct Answer is a
Explanation
69.
A.
Tables
B.
Treelike Structure
C.
D.
records
View/Hide
Ans
Explanation
70.
A.
Delete
B.
Remove
C.
Truncate
D.
View/Hide
Ans
Correct Answer is d
71.
A.
Delete Table
B.
Drop table
C.
Erase Table
D.
None of above
View/Hide
Ans
Correct Answer is b
Explanation
72.
A.
Update files
B.
C.
Data Entry
D.
None
View/Hide
Ans
Correct Answer is b
Explanation
73.
A.
Delete
B.
Look-up
C.
Insert
D.
None of above
View/Hide
Ans
Correct Answer is b
Explanation
74.
A.
Users
B.
Separate files
C.
Database
D.
DBA
View/Hide
Ans
Correct Answer is b
Explanation
75.
A.
1NF
B.
2NF
C.
3NF
D.
4NF
View/Hide
Ans
Correct Answer is c
Explanation
76.
A.
B.
C.
D.
None of above
View/Hide
Ans
Correct Answer is c
Explanation
77.
A.
Network Model
B.
C.
Relational Model
D.
E-R Model
View/Hide
Ans
Correct Answer is ac
Explanation
78.
A.
Data
B.
files
C.
fields
D.
All of above
View/Hide
Ans
Correct Answer is c
Explanation
79.
A.
An inverted index
B.
C.
D.
all of above
View/Hide
Ans
Correct Answer is b
Explanation
80.
Which database handles full text data, image, audio and video?
A.
Transaction database
B.
Graphics database
C.
D.
Multimedia database
View/Hide
Ans
Correct Answer is d
81.
A.
B.
who owns it
C.
D.
View/Hide
Ans
Correct Answer is c
Explanation
82.
A.
Width
B.
language
C.
spelling
D.
all of above
View/Hide
Ans
Correct Answer is a
Explanation
83.
A schema describes
A.
B.
data elements
C.
record relationships
D.
View/Hide
Ans
Correct Answer is d
Explanation
84.
A.
Privacy invasion
B.
hardware failure
C.
D.
all of above
View/Hide
Ans
Correct Answer is a
Explanation
85.
A.
4GL
B.
SQL
C.
Query languages
D.
HLL
View/Hide
Ans
Correct Answer is c
Explanation
86.
A.
Data Record
B.
data File
C.
Database
D.
Data Bank
View/Hide
Ans
Correct Answer is c
Explanation
87.
A.
Network
B.
Tree
C.
Chain
D.
All of above
View/Hide
Ans
Correct Answer is d
Explanation
88.
A.
Database
B.
File
C.
Record
D.
Field
View/Hide
Ans
Correct Answer is c
http://www.brightways.org/ugc-net-gate-mcq-dbms.php?
page=9#!