You are on page 1of 87

1.

For the 8-bit word 00111001, the check bits stored with it would be 0111.
Suppose when the word is read from memory, the check bits are calculated to be
1101.What is the data word that was read from memory?

A.

10011001

B.

00011001

C.

00111000

D.

11000110

View/Hide
Ans

Correct Answer is B

Explanation

2.

Consider a 32 - bit microprocessor, with a 16 - bit external data bus, driven by an


8 MHz input clock. Assume that the microprocessor has a bus cycle whose
minimum duration equals four input clock cycles. What is maximum data
transfer rate for this microprocessor ?

A.

8 x 106 bytes / sec

B.

4 x 106 bytes / sec

C.

16 x 106 bytes / sec

D.

4 x 109 bytes / sec

View/Hide
Ans

Correct Answer is B

Explanation
3.

The RST 7 instruction in 8085 microprocessor is equivalent to

A.

CALL 0010 H

B.

CALL 0034 H

C.

CALL 0038 H

D.

CALL 003C H

View/Hide

Correct Answer is C

Ans
Explanation
4.

The equivalent hexadecimal notation for octal number 2550276 is:

A.

FADED

B.

AEOBE

C.

ADOBE

D.

ACABE

View/Hide
Ans

Correct Answer is C

Explanation

5.

The CPU of a system having 1 MIPS execution rate needs 4 machine cycles on
an average for executing an instruction. The fifty percent of the cycles use
memory bus. A memory read/write employs one machine cycle. For execution of
the programs, the system utilizes 90 percent of the CPU time. For block data
transfer, an IO device is attached to the system while CPU executes the
background programs continuously. What is the maximum IO data transfer rate
if programmed IO data transfer technique is used?

A.

500 Kbytes/sec

B.

2.2 Mbytes/sec

C.

125 Kbytes/sec

D.

250 Kbytes/sec

View/Hide
Ans

Correct Answer is D

Explanation
6.

The number of Flip-Flops required to design a modulo - 272 counter is

A.

B.

C.

27

D.

11

View/Hide
Ans

Correct Answer is B

Explanation

7.

Let E1 and E2 be two entities in E-R diagram with simple single valued
attributes. R1 and R2 are two relationships between E1 and E2 where R1 is onemany and R2 is many - many. R1 and R2 donot have any attributes of their own.
How many minimum number of tables are required to represent this situation in
the relational model ?

A.

B.

C.

D.

View/Hide
Ans

Correct Answer is A

Explanation

8.

The student information in a university is stored in the relation STUDENT


(name, sex, marks, dept_Name) Consider the following SQL query select
deptName from STUDENT where sex = 'M' group by dept_Name having avg
(marks) > (select avg (marks) from STUDENT) It returns the names of the
department in which

A.

the average marks of male students is more than the average marks of the
students in the same department

B.

The average marks of male students is more than the average marks of the
students in the university

C.

The average marks of male students is more than the average marks of male
students in the university

D.

The average marks of students is more than the average marks of male students
in the university

View/Hide

Correct Answer is D

Ans
Explanation
9.

Which one of the following statements about normal forms is FALSE?

A.

Lossless, preserving decomposition into 3NF is always possible

B.

Lossless, preserving decomposition into BCNF is always possible

C.

Any relation with two attributes is in BCNF

D.

BCNF is stronger than 3NF

View/Hide
Ans

Correct Answer is B

Explanation
10.

The relation vendor order (v_no, v_ord_no, v_name, qty_sup, unit_price) is in


2NF because :

A.

Non key attribute V_name is dependent on V_no which is part of composite key

B.

Non key attribute V_name is dependent on qty_sup

C.

key attribute qty_sup is dependent on primary_key unit price

D.

key attribute v_ord_no is dependent on primary_key unit price

View/Hide
Ans

Correct Answer is A

Explanation

Answer Key and Solved Questions


Paper-3 UGC-NET Computer Science
June 2015
11.

the relational schemas R1 and R2 form a loseless join decomposition of R if and


only if

A.

R1R2-->(R1-R2)

B.

R1-->R2

C.

R1R2-->(R2-R1)

D.

R2-->R1R2

View/Hide
Ans

Correct Answer is C

Explanation
12.

In the index allocation scheme of blocks to a file, the maximum possible size of
the file depends on

A.

The number of blocks used for the index, and the size of the index

B.

The size of the blocks, and the size of the address

C.

size of the index

D.

size of the blocks

View/Hide
Ans

Correct Answer is A

Explanation
13.

Give the number of principal vanishing point (s) along with their direction for the
standard perspective transformation :

A.

only one in the direction K

B.

Two in the directions I and J

C.

Three in the directions I, J and K

D.

Only two in the directions J and K

View/Hide
Ans

Correct Answer is A

Explanation

14.

Consider a triangle represented by A(0, 0), B(1, 1), C(5, 2). The triangle is
rotated by 45 degrees about a point P( -1, -1). The co-ordinates of the new
triangle obtained after rotation shall be

A.

A'(-1, 2 -1), B'(-1, 22 - 1), C'((3/2)2 - 1, (9/2)2 - 1)

B.

A'(2 -1,- 1), B'( 22 - 1, -1), C'((3/2)2 - 1, (9/2)2 - 1)

C.

A'(-1, 2 -1), B'(22 - 1, -1), C'((3/2)2 - 1, (9/2)2 - 1)

D.

A'(-1, 2 -1), B'( 22 - 1, -1), C'((9/2)2 - 1, (3/2)2 - 1)

View/Hide
Ans

Correct Answer is A

Explanation
15.

The process of dividing an analog signal into a string of discrete outputs, each of
constant amplitude is called

A.

Strobing

B.

Amplification

C.

Conditioning

D.

Quantization

View/Hide
Ans

Correct Answer is D

Explanation
16.

which of the following is not a basic primitive of the graphics kernel


system(GKS) ?

A.

POLYLINE

B.

POLYDRAW

C.

FILL AREA

D.

POLYMARKER

View/Hide
Ans

Correct Answer is B

Explanation
17.

Which of the following statements is/are incorrect ?

A.

Mapping the co-ordinates of the points and lines that form the picture into
appropriate co-ordinates on the device or workstation is known as viewing
transformation.

B.

The right handed cartesian co-ordinate system in whose coordinates we describe


the picture is known as world coordinate system.

C.

The co-ordinate system that corresponds to the device or workstation where the
image is to be displayed is known as physical device co-ordinate system.

D.

Left-handed co-ordinate system in which the display area of the virtual display
device corresponds to the unit(|x|) square whose lower left handed corner is at
origin of the co-ordinate system, is known as normalized device co-ordinate
system.

View/Hide
Ans

Correct Answer is D

Explanation
Match the following
List-I

18.

List-II

Flood Gun

An electron gun designed to flood the entire screen


with electrons.

Collector

Partly energised by flooding gun, stores the charge


generated by the writing gun

Ground

used to discharge the collector

Phosphorus
Grains

used in memory -tube display and similar to those used


in standard CRT

Writing Gun
System

used in memory -tube display and basically the same


as the electron gun used in a conventional CRT.

Codes : (a) (b) (c) (d) (e)


A.

(i) (ii) (iii) (iv) (v)

B.

(ii) (iii) (i) (iv) (v)

C.

(iii) (i) (ii) (v) (iv)

D.

(iv) (v) (i) (ii) (iii)

View/Hide
Ans

Correct Answer is A

Explanation
19.

Minimal Deterministic finite automaton for the language L = { 0n | n > 0, n 4 }


will have

A.

1 final state among 5 states

B.

4 final states among 5 states

C.

1 final state among 6 states

D.

5 final states among 6 states

View/Hide
Ans

Correct Answer is D

Explanation
20.

The regular expression corresponding to the language L where L = { x {0,1}* |


x ends with 1 and does not contain substring 00 } is

A.

(1 + 01)*(10 + 01)

B.

(1 + 01)*01

C.

(1 + 01)*(1 + 01)

D.

(10 + 01)* 01

View/Hide
Ans

Correct Answer is C

Explanation

Answer Key and Solved Questions


Paper-3 UGC-NET Computer Science
June 2015

The transition function for the language L = {w|na(w) and nb(w) are both odd} is
given by:
(q0, a) = q1

(q0, b) = q2

(q1, a) = q0

(q1, b) = q3

(q2, a) = q3

(q2, b) = q0

(q3, a) = q2

(q3, b) = q1

21.

the initial and final states of automata are


A.

q0 and q0 respectively

B.

q0 and q1 respectively

C.

q0 and q2 respectively

D.

q0 and q3 respectively

View/Hide
Ans

Correct Answer is D

Explanation
22.

The clausal form of the disjunctive normal form A B C D is

A.

ABC D

B.

A B C D true

C.

A B C D true

D.

A B C D false

View/Hide
Ans

Correct Answer is A

Explanation
23.

Which of the following is false for the programming language PROLOG ?

A.

A PROLOG variable can only be assigned to a value once

B.

PROLOG is a Strongly Typed Language.

C.

The scope of a variable in PROLOG is a single clause or rule.

D.

the scope of a variable in PROLOG is a Single Query

View/Hide
Ans

Correct Answer is B

Explanation
24.

Which one of the following is true ?

A.

The resolvent of two horn clauses is not a horn clause.

B.

The resolvent of two horn clauses is a Horn Clause.

C.

if we resolve a negated goal G against a fact or rule A to get Clause C then C has
positive literal and non null goal.

D.

if we resolve a negated goal G against a fact or rule A to get clause C then C has
positive literal or null goal.

View/Hide
Ans

Correct Answer is B

Explanation
25.

Which transmission technique guarantees that data packets will be received by


the receiver in the same order in which they were sent by the sender ?

A.

Broadcasting

B.

Unicasting

C.

Packet Switching

D.

Circuit Switching

View/Hide
Ans

Correct Answer is D

Explanation
26.

Which of the following control fields in TCP header is used to specify the sender
has no more data to transmit ?

A.

FIN

B.

RST

C.

SYN

D.

PSH

View/Hide
Ans

Correct Answer is A

Explanation
27.

Which are the two modes of IP security ?

A.

Transport and Certificate

B.

Transport and Tunnel

C.

Certificate and Tunnel

D.

Preshared and Transport

View/Hide
Ans

Correct Answer is B

Explanation
28.

A message "COMPUTERNETWORK" encrypted(ignore quotes)using columnar


transposition cipher with a key "LAYER". the encrypted message is :

A.

CTTOEWMROPNRUEK

B.

MROUEKCTTPNROEW

C.

OEWPNRCTTUEKMRO

D.

UEKPNRMROOEWCTT

View/Hide
Ans

Correct Answer is C

Explanation
29.

Suppose a digitized voice channel is made by digitizing 8 kHz bandwidth analog


voice signal. It is required to sample the signal at twice the highest frequency(two

samples per hertz). what is the bit rate required, if it is assumed that each sample
requires 8 bits ?
A.

32 kbps

B.

64 kbps

C.

128 kbps

D.

256 kbps

View/Hide
Ans

Correct Answer is C

Explanation
30.

The Maximum payload of a TCP segment is

A.

65535

B.

65515

C.

65495

D.

65475

View/Hide
Ans

Correct Answer is C

Explanation

Answer Key and Solved Questions


Paper-3 UGC-NET Computer Science
June 2015
31.

All pair Shortest paths problem is efficiently solved using :

A.

Dijkstra' algorithm

B.

Bellman-Ford algorithm

C.

Kruskal Algorithm

D.

Floyd-Warshall algorithm

View/Hide
Ans

Correct Answer is D

Explanation
32.

The travelling salesman problem can be solved in :

A.

Polynomial time using dynamic programming algortihm

B.

Polynomial time using branch and bound algortihm

C.

Exponential time using dynamic programming algorithm or branch and bound


algorithm.

D.

Polynomial time using backtracking algorithm.

View/Hide
Ans

Correct Answer is C

Explanation
33.

Which of the following is asymptotically smaller ?

A.

lg(lg*n)

B.

lg*(lg n)

C.

lg(n!)

D.

lg*(n!)

View/Hide
Ans

Correct Answer is A

Explanation

34.

Consider a hash table of size m=100 and the hash function h(k) = floor(m(kA
mod 1)) for A = (5 1)/2 = 0.618033. Compute the location to which the key k
= 123456 is placed in hash table.

A.

77

B.

82

C.

88

D.

89

View/Hide
Ans

Correct Answer is C

Explanation
35.

Let f(n) and g(n) be asymptotically non-negative functions. which of the


following is correct ?

A.

(f(n) * g(n)) = min(f(n), g(n))

B.

(f(n) * g(n)) = max(f(n), g(n))

C.

(f(n) + g(n)) = min(f(n), g(n))

D.

(f(n) + g(n)) = max(f(n), g(n))

View/Hide
Ans

Correct Answer is D

Explanation
36.

The number of nodes of height h in any n - element heap is _____

A.

B.

zh

C.

ceil(n/zh)

D.

ceil(n/zh + 1)

View/Hide
Ans

Correct Answer is D

Explanation
37.

In Java, when we implement an interface method, it must be declared as :

A.

Private

B.

Protected

C.

Public

D.

Friend

View/Hide
Ans

Correct Answer is C

Explanation
38.

The Servlet Response interface enables a servlet to formulate a response for a


client using the method ______

A.

void log(Exception e, String s)

B.

Void destroy()

C.

int getServerPort()

D.

void setContextType(String Type)

View/Hide
Ans

Correct Answer is D

Explanation
39.

Which one of the following is correct ?

A.

Java Applets cannot be written is many programming languages.

B.

An applet is not a small program.

C.

An applet can be run on its own.

D.

Applets are embedded in another applications.

View/Hide
Ans

Correct Answer is D

Explanation
40.

In XML we can specify the frequency of an element by using the symbols :

A.

+*!

B.

#*!

C.

+*?

D.

-*?

View/Hide
Ans

Correct Answer is C

Explanation

Answer Key and Solved Questions


Paper-3 UGC-NET Computer Science
June 2015
41.

In XML, Doctype declaration specifies to include a reference to ____ file

A.

Document Type Definition

B.

Document Type Declaration

C.

Document Transfer Definition

D.

Document Type language

View/Hide
Ans

Correct Answer is A

Explanation
42.

Module design is used to maximize cohesion and minimize coupling. Which of


the following is the key to implement this rule ?

A.

Inheritance

B.

Polymorphism

C.

Encapsulation

D.

Abstraction

View/Hide
Ans

Correct Answer is C

Explanation
43.

Verification :

A.

refers to the set of activities that ensure that software correctly implements a
specific function.

B.

gives answer to the question - are we building the product right ?

C.

requires execution of software

D.

both 1 and 2

View/Hide
Ans

Correct Answer is D

Explanation
44.

Which design matric is used to measure the compactness of the program in terms
of lines of code ?

A.

Consistency

B.

Conciseness

C.

Efficiency

D.

Accuracy

View/Hide
Ans

Correct Answer is B

Explanation
45.

Requirements prioritization and negotiation belongs to :

A.

Requirements validation

B.

Requirements elicitation

C.

Feasibility Study

D.

Requirement reviews

View/Hide
Ans

Correct Answer is B

Explanation
46.

Adaptive maintenance is a maintenance which ______

A.

Correct errors that were not discovered till testing phase.

B.

is carried out to port the existing software to a new environment.

C.

improves the system performance.

D.

both (2) and (3)

View/Hide
Ans

Correct Answer is B

Explanation
47.

A design concept refinement is a

A.

Top-down Approach

B.

Complementary of Abstraction concept

C.

Process of elaboration

D.

All of the above

View/Hide
Ans

Correct Answer is D

Explanation
48.

A software design is highly modular if :

A.

cohesion is functional and coupling is data type.

B.

cohesion is coincidental and coupling is data type.

C.

cohesion is sequential and coupling is content type.

D.

cohesion is functional and coupling is stamp type.

View/Hide
Ans

Correct Answer is A

Explanation

Match the following for operating system techniques with the most appropriate
advantage :
List-I

49.

List-II

(a) Spooling

(i) Allows several jobs in memory to improve CPU


utilization

(b) Mult
iprogramming

{ii) Access to shared resources among


geographically dispersed computers in a transparent
way

(c) Time sharing

overlapping I/O and computations

Distributed
Computing

Allows many users to share a computer


simultaneously by switching processor frequently

codes : (a) (b) (c) (d)


A.

(iii) (i) (ii) (iv)

B.

(iii) (i) (iv) (ii)

C.

(iv) (iii) (ii) (i)

D.

(ii) (iii) (iv) (i)

View/Hide
Ans

Correct Answer is B

Explanation
50.

Which of the following statements is not true for Multi Level Feedback Queue
processor scheduling algorithm ?

A.

Queues have different priorities.

B.

Each queue may have different scheduling algorithm

C.

Processes are permanently assigned to a queue

D.

This algorithm can be configured to match a specific system under design

View/Hide
Ans

Correct Answer is C

Explanation

51.What is the most appropriate function of Memory Management Unit (MMU) ?A.It is an
associative memory to store TLBB.It is a technique of supporting multi programming by
creating dynamic partitionsC.It is a chip to map virtual address to physical addressD.It is an
algorithm to allocate and deallocate main memory to a processView/Hide Ans
Correct Answer is B
Explanation52.Dining Philosopher's problem is aA.Producer Consumer problemB.Classical
IPC problemC.Starvation ProblemD.Synchronization PrimitiveView/Hide Ans
Correct Answer is B
Explanation53.In ______ allocation method for disk block allocation in a file system,
insertion and deletion of blocks in a file is easy.A.IndexB.LinkedC.ContiguousD.Bit
MapView/Hide Ans
Correct Answer is A
Explanation54.A unix file may be of type :A.Regular fileB.Directory FileC.Device
FileD.Any one of the aboveView/Hide Ans
Correct Answer is D
Explanation55.Match the following :
List-I

List-II

(a) Intelligence (i) Contextual, tacit, transfer needs learning


(b) Knowledge

(ii) Scattered facts, easily transferrable

(c) Information (iii) Judgemental


(d) Data

(iv) Codifiable, endorsed with relevance and purpose

codes : (a) (b) (c) (d)A.(iii) (ii) (iv) (i)B.(iii) (i) (iv) (ii)C.(i) (ii) (iii) (iv)D.(i) (iii) (iv)
(ii)View/Hide Ans
Correct Answer is B
Explanation74.WOW32 is aA.Win 32 API library for creating processes and
threads.B.Special kind of file system to the NT name space.C.Kernel - mode objects
accessible through Win32 APID.Special execution environment used to run 16 bit windows
applications on 32 - bit machines.View/Hide Ans
Correct Answer is D
Explanation75.The Unix command :
$ vi file1 file2A.Edits file1 and stores the contents of file1 in file2B.Both files i.e File1 and
file2 can be edited using "ex" command to travel between filesC.Both files can be edited
using the "mv" command to move between the filesD.Edits file1 first, saves it and the edits
file2View/Hide Ans
Correct Answer is B
Explanation

Operating System

1.

If the disk head is located initially at 32, find the number of disk moves
required with FCFS if the disk queue of I/O blocks requests are 98, 37, 14,
124, 65, 67.

A.

239

B.

310

C.

321

D.

325

View/Hide
Ans

Correct Answer is c

Explanation
2.

Which of the following memory allocation scheme suffers from external


fragmentation ?

A.

Segmentation

B.

Pure demand paging

C.

Swapping

D.

Paging

View/Hide
Ans

Correct Answer is a

Explanation

3.

Consider a system having m resources of the same type. These resources


are shared by 3 processes A, B and C which have peak demands of 3, 4 and
6 respectively. For what value of m deadlock will not occur ?

A.

B.

C.

10

D.

13

View/Hide
Ans

Correct Answer is d

Explanation
4.

Pre-emptive scheduling is the strategy of temporarily suspending a running


process

A.

before the CPU time slice expires

B.

to allow starving processes to run

C.

when it requests I/O

D.

to avoid collision

View/Hide
Ans

Correct Answer is a

Explanation
5.

Resources are allocated to the process on non-sharable basis is

A.

mutual exclusion

B.

hold and wait

C.

no pre-emption

D.

circular wait

View/Hide
Ans

Correct Answer is a

Explanation
6.

In round robin CPU scheduling as time quantum is increased the average


turn around time

A.

increases

B.

decreases

C.

remains constant

D.

varies irregularly

View/Hide
Ans

Correct Answer is d

Explanation

7.

Pool based allocation of memory achieves better usage. Memory can be


preempted from inactive programs and used to accommodate active
programs. This is called

A.

Preemption

B.

Swapping

C.

Spooling

D.

Scheduling

View/Hide
Ans

Correct Answer is b

Explanation
8.

Which of these is an example of a virtual resource?

A.

Print server

B.

Virtual machine

C.

Virtual memory

D.

All of the above

View/Hide
Ans

Correct Answer is d

Explanation
9.

Which concept explains the working of an Operating System?

A.

It is event driven

B.

It is object oriented

C.

It is procedure based system software

D.

It is a collection of procedures that interact with each other

View/Hide
Ans

Correct Answer is a

Explanation
10.

Which of these is/are the desirable features of an Operating system

A.

Extensible

B.

Portable

C.

Reliable

D.

All of the above

View/Hide
Ans

Correct Answer is d

Explanation

11.

Blocking and Caching are the terms associated with which Operating system
functions respectively

A.

Memory management and Disk Scheduling

B.

IOCS and Disk Scheduling

C.

IOCS and Memory management

D.

Process management and IOCS

View/Hide
Ans

Correct Answer is b

Explanation
12.

Which of these is not a term describing the collection of Operating Programs

A.

Monitor

B.

Kernel

C.

Supervisor

D.

Server

View/Hide
Ans

Correct Answer is d

Explanation
13.

Transparency is a desirable feature of which type of Operating system-

A.

Batch Processing

B.

Real time

C.

Distributed

D.

Time sharing

View/Hide
Ans

Correct Answer is c

Explanation
14.

Which operating system implementation has to focus on the issue of Good


response time

A.

Batch Processing

B.

Multiprogramming

C.

Distributed

D.

Time sharing

View/Hide
Ans

Correct Answer is d

Explanation
15.

Program Priorities, Preemption are the key concepts of

A.

Batch Processing

B.

Real time

C.

multiprogramming

D.

Time sharing

View/Hide
Ans

Correct Answer is c

Explanation
16.

Which operating system implementation has to focus on the issue of


resource sharing?

A.

Batch Processing

B.

Multiprogramming

C.

Distributed

D.

Time sharing

View/Hide
Ans

Correct Answer is c

Explanation
17.

This OS interleaves execution of processes in an application program to


meet its deadline

A.

Batch Processing

B.

Real time

C.

multiprogramming

D.

Time sharing

View/Hide
Ans

Correct Answer is b

Explanation
18.

What in multiprogramming OS provides a foolproof method of implementing


memory protection to avoid program interference?

A.

Direct Memory Access

B.

Privileged mode

C.

Memory Protection

D.

Both 2 and 3

View/Hide
Ans

Correct Answer is d

Explanation
19.

What are the functions of multiprogramming OS?

A.

Scheduling

B.

Memory Management

C.

I/O management

D.

All of above

View/Hide
Ans

Correct Answer is d

Explanation
20.

Applications like Banking and reservations require which type of OS?

A.

Real Time

B.

Hard Real Time

C.

Soft Real Time

D.

None of the above

View/Hide
Ans

Correct Answer is c

21.

What feature of RTOS is supported by executing parts of a computation in


different computer systems?

A.

Computation speed up

B.

Resource sharing

C.

Reliability

D.

Communication

View/Hide
Ans

Correct Answer is a

Explanation
22.

Which OS employs the techniques of fault tolerance and graceful


degradation to ensure continuity of operation?

A.

Batch Processing

B.

Real time

C.

Distributed

D.

Time sharing

View/Hide
Ans

Correct Answer is b

Explanation

23.

Pool based allocation of memory achieves better usage. Memory can be


preempted from inactive programs and used to accommodate active
programs. This is called

A.

Preemption

B.

Swapping

C.

Spooling

D.

Scheduling

View/Hide
Ans

Correct Answer is b

Explanation
24.

Which of these is an example of a virtual resource?

A.

Print server

B.

Virtual machine

C.

Virtual memory

D.

All of the above

View/Hide
Ans

Correct Answer is d

Explanation
25.

Which concept explains the working of an Operating System?

A.

It is event driven

B.

It is object oriented

C.

It is procedure based system software

D.

It is a collection of procedures that interact with each other

View/Hide
Ans

Correct Answer is a

Explanation
26.

Which of these is/are the desirable features of an Operating system

A.

Extensible

B.

Portable

C.

Reliable

D.

All of the above

View/Hide
Ans

Correct Answer is d

Explanation
27.

Blocking and Caching are the terms associated with which Operating system
functions respectively

A.

Memory management and Disk Scheduling

B.

IOCS and Disk Scheduling

C.

IOCS and Memory management

D.

Process management and IOCS

View/Hide
Ans

Correct Answer is b

Explanation
28.

Which of these is not a term describing the collection of Operating Programs

A.

Monitor

B.

Kernel

C.

Supervisor

D.

Server

View/Hide
Ans

Correct Answer is d

Explanation
29.

Transparency is a desirable feature of which type of Operating system-

A.

Batch Processing

B.

Real time

C.

Distributed

D.

Time sharing

View/Hide
Ans

Correct Answer is c

Explanation
30.

Which operating system implementation has to focus on the issue of Good


response time

A.

Batch Processing

B.

Multiprogramming

C.

Distributed

D.

Time sharing

View/Hide
Ans

Correct Answer is d

31.

Program Priorities, Preemption are the key concepts of

A.

Batch Processing

B.

Real time

C.

multiprogramming

D.

Time sharing

View/Hide
Ans

Correct Answer is c

Explanation
32.

Which operating system implementation has to focus on the issue of


resource sharing?

A.

Batch Processing

B.

Multiprogramming

C.

Distributed

D.

Time sharing

View/Hide
Ans

Correct Answer is c

Explanation
33.

This OS interleaves execution of processes in an application program to


meet its deadline

A.

Batch Processing

B.

Real time

C.

multiprogramming

D.

Time sharing

View/Hide
Ans

Correct Answer is b

Explanation
34.

What in multiprogramming OS provides a foolproof method of implementing


memory protection to avoid program interference?

A.

Direct Memory Access

B.

Privileged mode

C.

Memory Protection

D.

Both 2 and 3

View/Hide
Ans

Correct Answer is d

Explanation
35.

What are the functions of multiprogramming OS?

A.

Scheduling

B.

Memory Management

C.

I/O management

D.

All of above

View/Hide
Ans

Correct Answer is d

Explanation
36.

Applications like Banking and reservations require which type of OS?

A.

Real Time

B.

Hard Real Time

C.

Soft Real Time

D.

None of the above

View/Hide
Ans

Correct Answer is c

Explanation
37.

What feature of RTOS is supported by executing parts of a computation in


different computer systems?

A.

Computation speed up

B.

Resource sharing

C.

Reliability

D.

Communication

View/Hide
Ans

Correct Answer is a

Explanation
38.

Which OS employs the techniques of fault tolerance and graceful


degradation to ensure continuity of operation?

A.

Batch Processing

B.

Real time

C.

Distributed

D.

Time sharing

View/Hide
Ans

Correct Answer is b

Explanation

39.

If ttra and tcam are the time taken to transfer a block from memory to
cache and access time of cache memory respectively, then what will be the
effective memory access time if h is the hit ratio

A.

h+ ttra *(1+ tcam)

B.

h*tcam +(1-h) *(ttra+tcam)

C.

h +(1-h) *(ttra+tcam)

D.

(h+1)*tcam +(1-h) *(ttra+tcam)

View/Hide
Ans

Correct Answer is b

Explanation
40.

Programs tend to make memory accesses that are in proximity of previous


access this is called

A.

spatial locality

B.

temporal locality

C.

reference locality

D.

access locality

View/Hide
Ans

Correct Answer is a

Explanation

41.

Which term means to access some data and instructions repeatedly?

A.

spatial locality

B.

temporal locality

C.

reference locality

D.

access locality

View/Hide
Ans

Correct Answer is b

Explanation

42.

Processor architectures use several levels of cache memories to reduce the


effective memory access time. which is the correct match i)L1 Cache a) part
of memory chip ii)L2 Cache b) Cache on CPU Chip ii)L3 Cache c) Cache
external to CPU

A.

i)-a ii)-b iii)-c

B.

i)-b ii)-c iii)-a

C.

i)-c ii)-b iii)-a

D.

i)-c ii)-a iii)-b

View/Hide
Ans

Correct Answer is b

Explanation

43.

An Intel processor uses a cache block size of 128 bytes and a memory
transfer to cache is about 10 times the access time of cache memory. with
cache hit ratio of 0.97 what percent will be the effective memory access to
that of access time of memory

A.

20 percent

B.

30 percent

C.

40 percent

D.

50 percent

View/Hide
Ans

Correct Answer is c

Explanation
44.

Contents of which fields of Program Status Word (PSW) define the


subsequent actions of the CPU

A.

Condition code, Privileged mode, Program Counter

B.

Condition code, Privileged mode, interrupt mask

C.

Privileged mode, interrupt mask, interrupt code

D.

Privileged mode, interrupt mask, Program Counter

View/Hide
Ans

Correct Answer is d

Explanation
45.

Which of the following should be a privileged instruction-

A.

Load Bound registers

B.

Load a value in a CPU Register

C.

Forcibly terminate a process

D.

All of the above

View/Hide
Ans

Correct Answer is d

Explanation
46.

Throughput of a multiprogramming OS that processes n programs over th


eperiod of time that starts t0 and ends at tf is

A.

(tf-t0)/n

B.

tf*n/t0

C.

n/(tf-t0)

D.

n*tf*t0

View/Hide
Ans

Correct Answer is c

Explanation
47.

Which of these are the reasons for CPU-bound programs having higher
priority than the I/O bound programs

A.

CPU utilization is better in CPU-bound programs

B.

I/O bound programs do not get an opportunity to be executed

C.

Period of concurrent CPU and I/O bound activities is rare.

D.

All of the above

View/Hide
Ans
Explanation
48.

Which of these is incorrect in context of Real Time Operating System?

A.

Permits creation of multiple processes within an application.

B.

Permits priorities to be assigned to the processes.

C.

Doesn't allow programmer to define interrupts and interrupt processing


routines

D.

Provides fault tolerance and graceful degradation capabilities.

View/Hide
Ans

Correct Answer is c

Explanation
49.

Which of these is not a goal of Scheduling Algorithm for Different Operating


Systems

A.

Fairness

B.

balance

C.

maximize throughput

D.

Policy enforcement

View/Hide
Ans

Correct Answer is c

Explanation
50.

Which of these is a disadvantage of first Come First Serve?

A.

Convoy Effect

B.

Small average and worst-case waiting times

C.

Simplicity

D.

non-preemptive

View/Hide
Ans

Correct Answer is a

51.

What is the duration of a time quantum in Round-Robin Scheduling?

A.

10-100 millisec

B.

10-100 nanosec

C.

100-1000 millisec

D.

100-1000 nanosec

View/Hide
Ans

Correct Answer is a

Explanation
52.

As a rule of thumb what percentage of the CPU bursts should be shorter


than the time quantum?

A.

80%

B.

70%

C.

60%

D.

50%

View/Hide
Ans

Correct Answer is a

Explanation
53.

Interval between the time since submission of the job to the time its results
become available, is called

A.

Response Time

B.

Throughput

C.

Waiting time

D.

Turnaround Time

View/Hide
Ans

Correct Answer is a

Explanation
54.

A scheduler which selects processes from Primary memory is called

A.

Long Term Scheduler

B.

Medium Term Scheduler

C.

Short Term Scheduler

D.

Job Scheduler

View/Hide
Ans

Correct Answer is c

Explanation
55.

The scheduling in which CPU is allocated to the process with least CPUburst time is called

A.

Priority Scheduling

B.

Round Robin Scheduling

C.

Multilevel Queue Scheduling

D.

Shortest job first Scheduling

View/Hide
Ans

Correct Answer is d

Explanation
56.

Which of the following is a fundamental process state

A.

blocked

B.

executing

C.

Waiting

D.

swapped

View/Hide
Ans

Correct Answer is b

Explanation
57.

Which of the following approaches require knowledge of the system state?

A.

deadlock detection.

B.

deadlock prevention.

C.

deadlock avoidance.

D.

all of the above.

View/Hide
Ans

Correct Answer is d

Explanation
58.

Which scheduling policy is used for a batch processing operating system

A.

Shortest-job First.

B.

Round-Robin.

C.

Priority Based

D.

First-Come-First-Serve.

View/Hide
Ans

Correct Answer is d

Explanation
59.

A critical section is a program segment

A.

which is having a higher priority.

B.

where shared resources are accessed.

C.

which forces deadlocks.

D.

where code is shared by programs.

View/Hide
Ans

Correct Answer is b

Explanation
60.

Which amongst the following is a valid page replacement policy?

A.

RU policy (Recurrently used)

B.

LRU policy (Least Recently Used)

C.

only a

D.

both a and b

View/Hide
Ans

Correct Answer is b

61.

SSTF stands for

A.

Shortest-Seek-time-first scheduling

B.

simple-seek-time-first

C.

smallest seek-time-first.

D.

None of the above

View/Hide
Ans

Correct Answer is a

Explanation
62.

Before proceeding with its execution, each process must acquire all the
resources it needs is called

A.

pre-emption.

B.

circular wait.

C.

hold and wait

D.

deadlock.

View/Hide
Ans

Correct Answer is c

Explanation
63.

The total time to prepare a disk drive mechanism for a block of data to be
read from is its

A.

Access Time

B.

Seek time

C.

latency plus seek time

D.

Access time plus seek time plus transmission time

View/Hide
Ans

Correct Answer is c

Explanation
64.

Which of these is a technique of improving the priority of process waiting in


Queue for CPU allocation

A.

Starvation

B.

Relocation

C.

Promotion

D.

Ageing

View/Hide
Ans

Correct Answer is d

Explanation
65.

In which of the following page replacement policies Baladys anomaly does


not occurs? (A) FIFO (B) LRU (C) LFU (D) NRU

A.

All of the above

B.

B, C and D

C.

A and B.

D.

Only A

View/Hide
Ans

Correct Answer is b

Explanation
66.

Page fault frequency in an operating system is reduced when the

A.

processes tend to be of an equal ratio of the I/O-bound and CPU-bound

B.

size of pages is increased

C.

locality of reference is applicable to the process

D.

processes tend to be CPU-bound

View/Hide
Ans

Correct Answer is c

Explanation
67.

Cycle stealing is a term closely associated with-

A.

DMA

B.

Virtual Memory

C.

Processor Scheduler

D.

Disk manager

View/Hide
Ans

Correct Answer is a

Computer Fundamentals
1.

An online backing storage system capable of storing larger quantities of


data is

A.

CPU

B.

Memory

C.

Secondary storage

D.

Mass Storage

View/Hide
Ans

Correct Answer is D

Explanation
2.

Which of the following does not affect the resolution of a video display
image?

A.

Bandwidth

B.

Raster scan rage

C.

Vertical and horizontal lines of resolution

D.

Screen Size

View/Hide
Ans

Correct Answer is a

Explanation
3.

Latency time is

A.

Time to spin the needed data under head

B.

Time to spin the needed data under track

C.

Time to spin data under sector

D.

All of these

View/Hide
Ans

Correct Answer is a

Explanation
4.

DPI stands for

A.

Desktop projection Ink

B.

Dot per inch

C.

Dot-matrix printer ink

D.

Desktop pixel Inch

View/Hide
Ans

Correct Answer is b

Explanation
5.

Databases software may be divided into

A.

five distinct categories

B.

four distinct categories

C.

three distinct categories

D.

two distinct categories

View/Hide
Ans

Correct Answer is c

Explanation

6.

File record length

A.

Should always be fixed

B.

Should always be variable

C.

Depends upon the size of file

D.

Should be chosen to match the data characteristics.

View/Hide
Ans

Correct Answer is d

Explanation
7.

......is the time required by a sector to reach below read/write heat

A.

Seek Time

B.

Latency Time

C.

Access Time

D.

None

View/Hide
Ans

Correct Answer is b

Explanation
8.

.......is a technique of improving the priority of process waiting in Queue for


CPU allocation

A.

Starvation

B.

Ageing

C.

Revocation

D.

Relocation

View/Hide
Ans

Correct Answer is b

Explanation
9.

A grammar for a programming language is a formal description of

A.

Syntax

B.

Semantics

C.

Structure

D.

Code

View/Hide
Ans

Correct Answer is c

Explanation
10.

........is a technique of temporarily removing inactive programs from the


memory of computer system

A.

Swapping

B.

Spooling

C.

Semaphore

D.

Scheduler

View/Hide
Ans

Correct Answer is a

1.

The memory allocation scheme subject to "external" fragmentation is

A.

segmentation

B.

swapping

C.

pure demand paging

D.

multiple fixed contiguous partitions

View/Hide
Ans

Correct Answer is a

Explanation
12.

Virtual memory is

A.

simple to implement

B.

used in all major commercial operating systems

C.

less efficient in utilization of memory

D.

useful when fast I/O devices are not available

View/Hide
Ans

Correct Answer is b

Explanation
13.

Before proceeding with its execution, each process must acquire all the
resources it needs is called

A.

hold and wait

B.

No pre-emption

C.

circular wait

D.

starvation

View/Hide
Ans

Correct Answer is a

Explanation
14.

The main reason to encrypt a file is to .......

A.

Reduce its size

B.

Secure it for transmission

C.

Prepare it for backup

D.

Include it in the start-up sequence

View/Hide
Ans

Correct Answer is b

Explanation
15.

"LRU" page replacement policy is

A.

Last Replaced Unit

B.

Last Restored Unit

C.

Least Recently Used

D.

Least Required Unit

View/Hide

Correct Answer is c

Ans
Explanation
16.

Which of the following is not a fundamental process state

A.

ready

B.

terminated

C.

executing

D.

blocked

View/Hide
Ans

Correct Answer is d

Explanation
17.

ODBC stands for

A.

Object Database Connectivity

B.

Oral Database Connectivity

C.

Oracle Database Connectivity

D.

Open Database Connectivity

View/Hide
Ans

Correct Answer is d

Explanation
18.

Which two files are used during operations of the DBMS

A.

Query languages and utilities

B.

DML and query language

C.

Data dictionary and transaction log

D.

Data dictionary and query language

View/Hide
Ans

Correct Answer is c

Explanation

19.

A protocol is a set of rules governing a time sequence of events that must


take place

A.

between peers

B.

between an interface

C.

between modems

D.

across an interface

View/Hide
Ans

Correct Answer is a

Explanation
20.

In communication satellite, multiple repeaters are known as

A.

detector

B.

modulator

C.

stations

D.

transponders

View/Hide
Ans

Correct Answer is d

21.

Which of the following is required to communicate between two computers?

A.

communications software

B.

protocol

C.

communication hardware

D.

all of above including access to transmission medium

View/Hide
Ans

Correct Answer is d

Explanation
22.

Which of the following is an advantage to using fiber optics data


transmission?

A.

resistance to data theft

B.

fast data transmission rate

C.

low noise level

D.

All of these

View/Hide
Ans

Correct Answer is d

Explanation
23.

Which of the following is not a transmission medium?

A.

telephone lines

B.

coaxial cables

C.

modem

D.

microwave systems

View/Hide
Ans

Correct Answer is c

Explanation
24.

A technique for direct search is

A.

Binary Search

B.

Linear Search

C.

Tree Search

D.

Hashing

View/Hide
Ans

Correct Answer is d

Explanation
25.

Two main measures for the efficiency of an algorithm are

A.

Processor and memory

B.

Complexity and capacity

C.

Time and Space

D.

Data and Space

View/Hide
Ans

Correct Answer is c

Explanation
26.

The space factor when determining the efficiency of algorithm is measured


by

A.

Counting the maximum memory needed by the algorithm

B.

Counting the minimum memory needed by the algorithm

C.

Counting the average memory needed by the algorithm

D.

Counting the maximum disk space needed by the algorithm

View/Hide
Ans

Correct Answer is a

Explanation
27.

The memory address of the first element of an array is called

A.

floor address

B.

foundation address

C.

first address

D.

base address

View/Hide
Ans

Correct Answer is d

Explanation
28.

The term "push" and "pop" is related to the

A.

array

B.

lists

C.

stacks

D.

all of these

View/Hide
Ans

Correct Answer is c

Explanation
29.

What does Router do in a network?

A.

Forwards a packet to all outgoing links

B.

Forwards a packet to the next free outgoing link

C.

Determines on which outing link a packet is to be forwarded

D.

Forwards a packet to all outgoing links except the original link

View/Hide
Ans

Correct Answer is c

Explanation
30.

Repeater operates in which layer of the OSI model?

A.

Physical layer

B.

Data link layer

C.

Network layer

D.

Transport layer

View/Hide
Ans

Correct Answer is a

31.

GIF images can have only upto...... colors

A.

128

B.

256

C.

512

D.

1024

View/Hide
Ans

Correct Answer is b

Explanation
32.

......is stored on a client and contains state information of the

website visited
A.

Cookies

B.

Servelet

C.

History

D.

Resident Page

View/Hide
Ans

Correct Answer is a

Explanation

33.

.....are small applications that are accessed on an internet server,


transported over the internet, automatically installed and run as
part of a web document.

A.

Applets

B.

Java Bean

C.

Sockets

D.

Java Component

View/Hide
Ans

Correct Answer is a

Explanation

34.

Encryption is the conversion of data in some intelligible format into


an unintelligible format called.....to prevent the data from being
understood if read by an unauthorized party.

A.

Clear Text

B.

Encrypted Text

C.

Cipher Text

D.

Coded Text

View/Hide
Ans

Correct Answer is c

Explanation

35.

The method for storing data temporarily such that the input-output
of the same job is overlapped with its own processing, is known as

A.

Spooling

B.

Contention

C.

I/O wait

D.

Buffering

View/Hide
Ans

Correct Answer is d

Explanation
36.

Each cell in Microsoft Office Excel documents is referred to by its cell


address, which is the......

A.

cells column label

B.

cells column label and worksheet tab name

C.

cells row and column labels

D.

cells row label

View/Hide
Ans

Correct Answer is c

Explanation
37.

The lowest form of computer language is called

A.

BASIC

B.

FORTRAN

C.

Machine Language

D.

COBOL

View/Hide
Ans

Correct Answer is c

Explanation
38.

The portion of the application that you work with in an application


software package is the

A.

user interface

B.

utility interface

C.

processing interface

D.

analytical interface

View/Hide
Ans

Correct Answer is a

Explanation
39.

A.....provides access to features of the program.

A.

menu bar

B.

browser

C.

Office Assistant

D.

feature presentation

View/Hide
Ans

Correct Answer is a

Explanation
40.

Menus are a part of the

A.

hardware

B.

monitor

C.

Status Bar

D.

user interface

View/Hide
Ans

Correct Answer is d

41.

Which of the following is the term for a request for specific data
contained in a database?

A.

question

B.

query

C.

inquiry

D.

quiz

View/Hide
Ans

Correct Answer is b

Explanation
42.

Windows 7 is an example of a(n)

A.

application software

B.

browser

C.

Operating system

D.

shareware

View/Hide
Ans

Correct Answer is c

Explanation
43.

The most powerful type of computer.

A.

mainframe computers

B.

microcomputers

C.

minicomputers

D.

supercomputers

View/Hide
Ans

Correct Answer is d

Explanation
44.

The system component that controls and manipulates data in order


to produce information is called the

A.

keyboard

B.

microprocessor

C.

monitor

D.

mouse

View/Hide

Correct Answer is b

Ans
Explanation
45.

Which of the following is not an operating system for mobile


phones?

A.

Android

B.

Symbian

C.

iOS

D.

All of these are OS for mobile phones

View/Hide
Ans

Correct Answer is d

Explanation
46.

This type of file is created by word processors.

A.

worksheet

B.

document

C.

database

D.

presentation

View/Hide
Ans

Correct Answer is b

Explanation

47.

Many experts are predicting that this revolution is expected to


dramatically affect the way we communicate and use computer
technology.

A.

graphics

B.

input

C.

memory

D.

wireless

View/Hide
Ans

Correct Answer is d

Explanation
48.

The Internet was launched in 1969 when the United States funded a
project that developed a national computer network called

A.

Web

B.

ISP

C.

CERN

D.

ARPANET

View/Hide
Ans

Correct Answer is d

Explanation
49.

A(n)......program provides access to Web resources.

A.

Web

B.

ISP

C.

browser

D.

URL

View/Hide
Ans

Correct Answer is c

Explanation
50.

Rules for exchanging data between computers are called

A.

programs

B.

procedures

C.

protocols

D.

hyperlinks

View/Hide
Ans

Correct Answer is c

51.

The last part of the domain name following the dot(.) is the
top........domain

A.

Level

B.

link

C.

locator

D.

language

View/Hide
Ans

Correct Answer is a

Explanation
52.

51.Many individuals create their own personal sites called Web logs,
or......

A.

social networks

B.

blogs

C.

wikis

D.

search engines

View/Hide
Ans

Correct Answer is b

Explanation
53.

Programs that automatically submit your search request to several


search engines simultaneously are called ......

A.

metasearch engines

B.

inclusive search engines

C.

spiders

D.

hits

View/Hide
Ans

Correct Answer is a

Explanation
54.

.......cash is the Internets equivalent to traditional cash.

A.

Universal

B.

Web

C.

Premium

D.

Digital

View/Hide
Ans

Correct Answer is d

Explanation
55.

These programs allow parents as well as organizations to block out


selected sites and set time limits on Internet access.

A.

plug-ins

B.

filters

C.

FTP

D.

DSL

View/Hide
Ans
Explanation
56.

....are narrowly focused on specific disciplines and occupations.

A.

Basic applications

B.

Business suites

C.

Specialized applications

D.

Utility programs

View/Hide
Ans

Correct Answer is c

DBMS
1.

Usage of Preemption and Transaction Rollback prevents ______.

A.

Unauthorised usage of data file

B.

Deadlock situation

C.

Data manipulation

D.

File preemption

View/Hide
Ans

Correct Answer is B

Explanation
2.

Views are useful for _____ unwanted information, and for collecting together
information from more than one relation into a single view.

A.

Hiding

B.

Deleting

C.

Highlighting

D.

All of the above

View/Hide
Ans

Correct Answer is A

Explanation
3.

The decision tree classifier is a widely used technique for ______.

A.

Classification

B.

Association

C.

Partition

D.

Clustering

View/Hide
Ans

Correct Answer is A

Explanation
4.

Cross_tab displays permit users to view ______ of multidimensional data at


a time.

A.

1 dimension

B.

2 dimensions

C.

3 dimensions

D.

Multidimensions

View/Hide
Ans

Correct Answer is B

Explanation
5.

Thomas-write rule is ______.

A.

Two phase locking protocol

B.

Timestamp ordering protocol

C.

One phase locking protocol

D.

Sliding window protocol

View/Hide
Ans

Correct Answer is B

Explanation
6.

Value that appears in one relation for a given set of attributes also appears
for a certain set of attributes in another relation.

A.

Logical Integrity

B.

Referential Integrity

C.

Domain Integrity

D.

Data Integrity

View/Hide
Ans

Correct Answer is B

Explanation
7.

The SQL expression Select distinct T, branch_name from branch T, branch S


where T.assets S.assets and S.branch_city= Mumbai finds the names of

A.

All branches that have greater assets than some branch located in Mumbai.

B.

All branches that have greater assets than all branches in Mumbai.

C.

The branch that has greatest asset in Mumbai.

D.

Any branch that has greater assets than any branch in Mumbai.

View/Hide
Ans

Correct Answer is A

Explanation

8.

Consider the following schemas : Branch_Schema = (branch_name, assets,


city) Customer_Schema = (cutstomer_name, street, city) Deposit_Schema =
(branch_name, account_number, customer_name, balance) Borrow_Schema
= (branch_name, loan_number, customer_name, amount) Which of the
following tuple relational calculus finds all customers who have loan amount
more than ` 12,000 ?

A.

t(customer_name) | tborrow[?] t[amount]12000}

B.

{t |t(customer_name) | tborrow[?] t[amount]12000}

C.

{t |[?] borrow (t(customer_name=s(customer_ name))[?]


[amount]12000}

D.

{t |[?] borrow (t(customer_name)[?] s[amount] 12000}

View/Hide
Ans

Correct Answer is C

Explanation

9.

Match the following :


(a) Create
(i) The E-R Model
(b) Select
(ii) Relationship Model
(c) Rectangle
(iii) DDL
(d) Record
(iv) DML
Codes :
(a) (b) (c) (d)

A.

(iii) (iv) (i) (ii)

B.

(iv) (iii) (ii) (i)

C.

(iv) (iii) (i) (ii)

D.

(iii) (iv) (ii) (i)

View/Hide
Ans

Correct Answer is A

Explanation
10.

Which of the following is true ?

A.

A relation in BCNF is always in 3NF

B.

A relation in 3NF is always in BCNF

C.

BCNF and 3NF are same

D.

A relation in BCNF is not in 3NF

View/Hide
Ans

Correct Answer is A

11.

The User Work Area (UWA) is a set of Program variables declared in


the host program to communicate the contents of individual records
between

A.

DBMS & the Host record

B.

Host program and Host record

C.

Host program and DBMS

D.

Host program and Host language

View/Hide
Ans

Correct Answer is C

Explanation

12.

If a relation with a Schema R is decomposed into two relations R1


and R2 such that (R1 R2) = R1 then which one of the following is
to be satisfied for a lossless joint decomposition ( indicates
functional dependency)

A.

(R1 R2) R1 or R1 R2 R2

B.

R1 R2 R1

C.

R1 R2 R2

D.

R1 R2 R1 and R1 R2 R2

View/Hide
Ans

Correct Answer is A

Explanation
13.

Which level of Abstraction describes how data are stored in the data
base ?

A.

Physical level

B.

View level

C.

Abstraction level

D.

Logical level

View/Hide
Ans

Correct Answer is A

Explanation
14.

Third normal form is based on the concept of ______.

A.

Closure Dependency

B.

Transitive Dependency

C.

Normal Dependency

D.

Functional Dependency

View/Hide
Ans

Correct Answer is B

Explanation
15.

Referential integrity is directly related to

A.

Relation key

B.

Foreign key

C.

Primary key

D.

Candidate key

View/Hide
Ans

Correct Answer is B

Explanation
16.

In multiuser database if two users wish to update the same record at


the same time, they are prevented from doing so by

A.

Jamming

B.

Password

C.

Documentation

D.

Record lock

View/Hide
Ans

Correct Answer is D

Explanation
17.

B+ tree are preferred to binary tree in Database because

A.

Disk capacity are greater than memory capacities

B.

Disk access is much slower than memory access

C.

Disk data transfer rates are much less than memory data transfer
rate

D.

Disks are more reliable than Memory

View/Hide
Ans

Correct Answer is B

Explanation
18.

A Transaction Manager is which of the following ?

A.

Maintains a log of transactions

B.

Maintains before and after database images

C.

Maintains appropriate concurrency control

D.

All of the above

View/Hide
Ans

Correct Answer is D

Explanation
19.

What is Granularity ?

A.

The size of database

B.

The size of data item

C.

The size of record

D.

The size of file

View/Hide
Ans

Correct Answer is B

Explanation
20.

Which level of Abstraction describes what data are stored in the


Database ?

A.

Physical level

B.

View level

C.

Abstraction level

D.

Logical level

View/Hide
Ans

Correct Answer is D

21.

The problem that occurs when one transaction updates a database


item and then the transaction fails for some reason is ________.

A.

Temporary Select Problem

B.

Temporary Modify Problem

C.

Dirty Read Problem

D.

None

View/Hide
Ans

Correct Answer is C

Explanation
22.

Consider a schema R(A, B, C, D) and functional dependencies A B


and C D. Then the decomposition R1(A, B) and R2(C, D) is

A.

Dependency preserving but not lossless join

B.

Dependency preserving and lossless join

C.

Lossless Join but not dependency preserving

D.

Lossless Join

View/Hide
Ans

Correct Answer is A

Explanation
23.

If D1,D2, ....Dn are domains in a relational model, then the relation is

a table, which is a subset of


A.

D1+D2+... +Dn

B.

D1D2 ... Dn

C.

D1D2... Dn

D.

D1D2...Dn

View/Hide
Ans

Correct Answer is B

Explanation
24.

Which of the following is not a type of Database Management System


?

A.

Hierarchical

B.

Network

C.

Relational

D.

Sequential

View/Hide
Ans

Correct Answer is D

Explanation
25.

Manager&rsquos salary details are to be hidden from Employee


Table. This Technique is called as

A.

Conceptual level Datahiding

B.

Physical level Datahiding

C.

External level Datahiding

D.

Logical level Datahiding

View/Hide
Ans

Correct Answer is C

Explanation
26.

A Network Schema

A.

restricts to one to many relationship

B.

permits many to many relationship

C.

stores Data in a Database

D.

stores Data in a Relation

View/Hide
Ans

Correct Answer is B

Explanation
27.

The relation divides on a set of positive integers is ________.

A.

Symmetric and transitive

B.

Anti symmetric and transitive

C.

Symmetric only

D.

Transitive only

View/Hide
Ans

Correct Answer is B

Explanation
28.

The PROJECT operator of a relational algebra creates a new table


that has always

A.

More columns than columns in original table

B.

More rows than original table

C.

Same number of rows as the original table

D.

Same number of columns as the original table

View/Hide
Ans

Correct Answer is C

Explanation

29.

The employee information of an Organization is stored in the relation


: Employee (name, sex, salary, deptname) Consider the following
SQL query Select deptname from Employee Where sex = M group by
deptname having avg (salary) > {select avg (salary) from
Employee} Output of the given query corresponds to

A.

Average salary of employee more than average salary of the


organization.

B.

Average salary less than average salary of the organization.

C.

Average salary of employee equal to average salary of the


organization

D.

Average salary of male employees in a department is more than


average salary of the organization

View/Hide
Ans

Correct Answer is D

Explanation

30.

For a database relation R(a, b, c, d) where the domains of a, b, c, d


include only the atomic values. The functional dependency a c, b
d holds in the following relation

A.

In 1NF not in 2NF

B.

In 2NF not in 3NF

C.

In 3NF

D.

In 1NF

View/Hide
Ans

Correct Answer is B

31.

Match the following : a.Foreign keys i.Domain constraint b.Private


key ii.Referential integrity c.Event control action model iii.Encryption
d.Data security iv. Trigger

A.

a b c d iii ii i iv

B.

a b c d ii i iv iii

C.

a b c d iii iv i ii

D.

a b c d i ii iii iv

View/Hide
Ans

Correct Answer is b

Explanation
32.

SQL command to delete a column from an existing table:

A.

Alter table

B.

Drop table

C.

Delete table

D.

Delete column

View/Hide
Ans

Correct Answer is a

Explanation
33.

With QBE, inserting records from one or more source tables into a
single target table can be achieved by:

A.

Append action query

B.

Update action query

C.

Insert action query

D.

Make table action query

View/Hide
Ans

Correct Answer is a

Explanation
34.

Tuple in relational algebra refers to:

A.

Row

B.

Column

C.

Table

D.

Relation

View/Hide
Ans

Correct Answer is a

Explanation
35.

An attribute or set of attributes within one relation that matches the


candidate key of some(possibly the same) relation:

A.

Super Key

B.

Candidate key

C.

Primary key

D.

Foreign key

View/Hide
Ans

Correct Answer is d

Explanation
36.

A subset of data in a data warehouse in the form of summary data,


related to a particular department or business function:

A.

Meta Data

B.

Archive data

C.

Data Marts

D.

Operational Data Store

View/Hide
Ans

Correct Answer is c

Explanation
37.

The normalization of 1NF relations to 2NF involves:

A.

Removal of partial dependencies

B.

Removal of full dependencies

C.

Removal of transitive dependencies

D.

Removal of multi-valued dependencies

View/Hide
Ans

Correct Answer is a

Explanation
38.

Why do we go for Normalization of Data Bases?

A.

To avoid the repetitions

B.

To prevent fragmentation

C.

Avoid redundancy

D.

To prevent replication

View/Hide
Ans

Correct Answer is c

Explanation
39.

if a relation is in BCNF then it is in:

A.

2 NF

B.

3 NF

C.

1 NF

D.

1 NF and 2 NF

View/Hide
Ans

Correct Answer is c

Explanation
40.

A file is:

A.

an abstract data type

B.

logical storage unit

C.

usually non volatile

D.

volatile

View/Hide
Ans

Correct Answer is c

41.

What property of the files prevents sharing of files and directories?

A.

Tree structure

B.

One level structure

C.

Two level structure

D.

Length

View/Hide
Ans

Correct Answer is a

Explanation

42.

E-R modeling technique is:

A.

Tree structure

B.

Top-down method

C.

Bottom-up method

D.

Right-left approach

View/Hide
Ans

Correct Answer is b

Explanation
43.

Data items stored as grouped items is:

A.

Record

B.

List

C.

Strings

D.

Title list

View/Hide
Ans

Correct Answer is a

Explanation
44.

Data items are fragmented, replicated and propagated in:

A.

DBMS

B.

RDBMS

C.

DDBMS

D.

DML

View/Hide
Ans

Correct Answer is c

Explanation
45.

If every non-key attribute is functionally dependent on the primary


key, then the relation will be in

A.

1NF

B.

2NF

C.

3NF

D.

4NF

View/Hide
Ans

Correct Answer is c

Explanation
46.

which of the following is record based logical model(s)?

A.

Network Model

B.

Object-oriented model

C.

Relational Model

D.

Entity Relationship Model

View/Hide
Ans

Correct Answer is a,c

Explanation
47.

In an E-R diagram ellipses represents

A.

Entity sets

B.

relationship among entity sets

C.

attributes

D.

link in attributes & entity sets

View/Hide
Ans

Correct Answer is c

Explanation
48.

The set of permitted values for each attribute is called its

A.

Attribute set

B.

attribute range

C.

domain

D.

group

View/Hide
Ans

Correct Answer is c

Explanation
49.

Relations produced from an E-R model will always be in

A.

1NF

B.

2NF

C.

3NF

D.

4NF

View/Hide
Ans

Correct Answer is c

Explanation
50.

E-R modeling technique is a

A.

Top-down approach

B.

Bottom-up approach

C.

Left-right approach

D.

none of above

View/Hide
Ans

Correct Answer is a

51.

Redundancy is dangerous as it is a potential threat to data

A.

Integrity

B.

Consistency

C.

Sufficiency

D.

None

View/Hide
Ans

Correct Answer is a,b

Explanation

52.

Who is more concerned about the conceptual level of the DBMS

A.

DBA

B.

The end user

C.

The Systems programmer

D.

Client

View/Hide
Ans

Correct Answer is a

Explanation
53.

An Attribute of one table matching the primary key of another table


is called as

A.

Foreign key

B.

Secondary key

C.

Candidate key

D.

Composite

View/Hide
Ans

Correct Answer is a

Explanation
54.

If a relation is in BCNF, then it is also in

A.

1NF

B.

2NF

C.

3NF

D.

all of above

View/Hide
Ans

Correct Answer is c

Explanation
55.

The way a particular application views the data from the database
that the application uses is a

A.

Module

B.

Relational Model

C.

Schema

D.

Sub Schema

View/Hide
Ans

Correct Answer is d

Explanation
56.

Locking can be used for:

A.

Deadlock

B.

Lost Update

C.

Uncommitted dependency

D.

Inconsistent data

View/Hide
Ans

Correct Answer is bcd

Explanation
57.

In relation Model Column is referred to as :

A.

Tuple

B.

Entity

C.

Degree

D.

Attribute

View/Hide
Ans

Correct Answer is d

Explanation
58.

ER Model Comes under

A.

Physical data Model

B.

Record based logical Model

C.

Object based logical Model

D.

All of above

View/Hide
Ans

Correct Answer is c

Explanation

59.

Which of the following is the problem of file management system?


(a) Lack of data independence(b) Data redundancy(c) Update (d) all
Periodically adding, changing, & Deleting file records is called file

A.

Updating

B.

Upgrading

C.

Restructuring

D.

Renewing

View/Hide
Ans

Correct Answer is d

Explanation
60.

Which of the following is a relational database

A.

4th Dimensions

B.

FoxPro

C.

dbase-IV

D.

All of the above

View/Hide
Ans

Correct Answer is a

61.

The Index consists of :

A.

A list of keys

B.

Pointers to the master list

C.

Both (a) & (b)

D.

None of above

View/Hide
Ans

Correct Answer is d

Explanation
62.

Report generators are used to

A.

Store data input by a user

B.

retrieve information from files

C.

Answer queries

D.

Both (b) & (c)

View/Hide
Ans

Correct Answer is c

Explanation
63.

In a relational schema, each tuple is divided into fields called :

A.

Relations

B.

Domains

C.

Queries

D.

None of above

View/Hide
Ans

Correct Answer is d

Explanation
64.

The set of permitted values for each attribute is called its :

A.

Attribute set

B.

Attribute range

C.

Domain

D.

Group

View/Hide
Ans

Correct Answer is b

Explanation

65.

A DBMS consists of application programs called :

A.

FORTRAN

B.

AUTOFLOW

C.

BPL

D.

TOTAL

View/Hide
Ans

Correct Answer is c

Explanation
66.

A locked file can be :

A.

Accessed by only one user

B.

modified by user with correct password

C.

is used to hide sensitive information

D.

None

View/Hide
Ans

Correct Answer is c

Explanation
67.

Transaction X holds a shared lock R. if transaction Y requests for a


shared lock on R :

A.

result in deadlock situation

B.

Immediately Granted

C.

Immediately rejected

D.

Granted as is released by X

View/Hide
Ans

Correct Answer is b

Explanation
68.

command used to select only one copy of each set of duplicable rows
:

A.

Select Distant

B.

Select Unique

C.

Select Different

D.

None

View/Hide
Ans

Correct Answer is a

Explanation
69.

Which of following is the characteristics of a relational database


model?

A.

Tables

B.

Treelike Structure

C.

Complex logical relationship

D.

records

View/Hide
Ans

Correct Answer is acd

Explanation
70.

Which command is used to remove rows from a table?

A.

Delete

B.

Remove

C.

Truncate

D.

Both (a) & (b)

View/Hide
Ans

Correct Answer is d

71.

Which command is used to remove a table or index from the


database in SQL?

A.

Delete Table

B.

Drop table

C.

Erase Table

D.

None of above

View/Hide
Ans

Correct Answer is b

Explanation
72.

A report generator is used to :

A.

Update files

B.

Print files on paper

C.

Data Entry

D.

None

View/Hide
Ans

Correct Answer is b

Explanation
73.

The modify operation is likely to be done after :

A.

Delete

B.

Look-up

C.

Insert

D.

None of above

View/Hide
Ans

Correct Answer is b

Explanation
74.

The database environment has all of the following components


except :

A.

Users

B.

Separate files

C.

Database

D.

DBA

View/Hide
Ans

Correct Answer is b

Explanation
75.

If every non key attribute is functionally dependent on the primary


key, then the relation will be in :

A.

1NF

B.

2NF

C.

3NF

D.

4NF

View/Hide
Ans

Correct Answer is c

Explanation
76.

Directors Salary details are hidden from the employee, that is :

A.

Conceptual level Hiding

B.

Physical level data Hiding

C.

External level data hiding

D.

None of above

View/Hide
Ans

Correct Answer is c

Explanation
77.

Which of the following is record based logical model(s)?

A.

Network Model

B.

object oriented model

C.

Relational Model

D.

E-R Model

View/Hide
Ans

Correct Answer is ac

Explanation
78.

The distinguishable parts of a record are called

A.

Data

B.

files

C.

fields

D.

All of above

View/Hide
Ans

Correct Answer is c

Explanation
79.

Embedded pointers provide

A.

An inverted index

B.

a secondary access path

C.

a physical record key

D.

all of above

View/Hide
Ans

Correct Answer is b

Explanation
80.

Which database handles full text data, image, audio and video?

A.

Transaction database

B.

Graphics database

C.

Video on demand database

D.

Multimedia database

View/Hide
Ans

Correct Answer is d

81.

A data dictionary does not provide information about

A.

Where data is located

B.

who owns it

C.

size of disk storage device

D.

How the data is used

View/Hide
Ans

Correct Answer is c

Explanation
82.

Data item characteristics that are important in data management


include

A.

Width

B.

language

C.

spelling

D.

all of above

View/Hide
Ans

Correct Answer is a

Explanation
83.

A schema describes

A.

Record & files

B.

data elements

C.

record relationships

D.

all of the above

View/Hide
Ans

Correct Answer is d

Explanation
84.

Data security threat include

A.

Privacy invasion

B.

hardware failure

C.

Fraudulent manipulation of data

D.

all of above

View/Hide
Ans

Correct Answer is a

Explanation
85.

Which language is used by most of dbmss for helping their users to


access data?

A.

4GL

B.

SQL

C.

Query languages

D.

HLL

View/Hide
Ans

Correct Answer is c

Explanation
86.

Which of the following is at highest level in the hierarchy of data


organization?

A.

Data Record

B.

data File

C.

Database

D.

Data Bank

View/Hide
Ans

Correct Answer is c

Explanation
87.

The logical data structure with one to many relationship is a

A.

Network

B.

Tree

C.

Chain

D.

All of above

View/Hide
Ans

Correct Answer is d

Explanation
88.

An entry in a telephone book can be compared to a

A.

Database

B.

File

C.

Record

D.

Field

View/Hide
Ans

Correct Answer is c

http://www.brightways.org/ugc-net-gate-mcq-dbms.php?
page=9#!

You might also like