1) Which of the following may lead to an irrecoverable error in a database system?
a. A transaction reads a data item after it is written by an uncommitted transaction
b. A transaction reads a data item after it is written by a committed transaction
c. A transaction reads a data item after it is read by an uncommitted transaction
d. A transaction writes a data item after it is read by an uncommitted transaction
Answer
Explanation
|
ANSWER: A transaction reads a data item after it is written by an uncommitted transaction
Explanation: No explanation is available for this question!
|
|
2) Which type of clustering index is defined on the fields?
a. Non-key and non-ordering
b. Non-key and ordering
c. Key and non-ordering
d. Key and Ordering
Answer
Explanation
|
ANSWER: Non-key and ordering
Explanation: No explanation is available for this question!
|
|
3) Which is the concurrency control protocol that ensure both conflict serializability and freedom from deadlock? (Database)
a. Time stamp ordering
b. 2 - phase locking
c. Both A and B
d. Neither A nor B
Answer
Explanation
|
ANSWER: Time stamp ordering
Explanation: No explanation is available for this question!
|
|
4) What do you mean by atomicity?
a. When an update occurs to a database, either all or none of the update becomes available to anyone
b. It determines how the transaction integrity will be visible to the other users and systems
c. The transactions have been committed and will survive permanently
d. All of the above
Answer
Explanation
|
ANSWER: When an update occurs to a database, either all or none of the update becomes available to anyone
Explanation: No explanation is available for this question!
|
|
5) What type of relationship does a hierarchical schema help to establish between the items of a database?
a. top-to-bottom relationship
b. bottom-to-top relationship
c. one-to-many relationship
d. many-to-one
Answer
Explanation
|
ANSWER: top-to-bottom relationship
Explanation: No explanation is available for this question!
|
|
6) A ROLLBACK statement will also release any existing savepoints that may not be in use.
a. True
b. False
Answer
Explanation
|
ANSWER: False
Explanation: No explanation is available for this question!
|
|
7) What is truncating a table?
a. Data alone deleted, Performs an automatic commit
b. Data alone deleted, Doesn’t perform automatic commit
c. Table structure + Data are deleted
d. Table structure alone deleted, Performs an automatic commit
Answer
Explanation
|
ANSWER: Data alone deleted, Performs an automatic commit
Explanation: No explanation is available for this question!
|
|
8) Key value pair is usually seen in __________.
a. Hash Tables
b. Heaps
c. Both a and b
d. Skip list
Answer
Explanation
|
ANSWER: Hash Tables
Explanation: No explanation is available for this question!
|
|
9) Which of the following statements is true for Binary search Trees?
a. The left subtree of a node contains only nodes with keys less than the node's key.
b. The right subtree of a node contains only nodes with keys greater than the node's key.
c. Both a and b above
d. Both left and right subtree nodes contains only nodes with keys less than the node's key.
Answer
Explanation
|
ANSWER: Both a and b above
Explanation: No explanation is available for this question!
|
|
10) Where can we use Breadth First Search(BFS)?
a. Binary trees
b. Stacks
c. Graphs
d. Both a and c
Answer
Explanation
|
ANSWER: Graphs
Explanation: No explanation is available for this question!
|
|
11) In _____________, the heights of the two child subtrees of any node differ by at most one.
a. Binary Tree
b. Red Black Tree
c. Splay Tree
d. AVL Tree
Answer
Explanation
|
ANSWER: AVL Tree
Explanation: No explanation is available for this question!
|
|
12) Which Linked List have the last node of the list pointing to the first node?
a. Circular Doubly Linked List
b. Circular Linked List
c. Circular Singly Linked List
d. Doubly Linked List
Answer
Explanation
|
ANSWER: Circular Singly Linked List
Explanation: No explanation is available for this question!
|
|
13) Which of the following is the faster operation in AVL Trees?
a. Insertion
b. Deletion
c. Updation
d. Retrieval
Answer
Explanation
|
ANSWER: Retrieval
Explanation: No explanation is available for this question!
|
|
14) Which principle works on Stack?
a. FILO
b. FIFO
c. LILO
d. LIFO or FILO
Answer
Explanation
|
ANSWER: LIFO or FILO
Explanation: No explanation is available for this question!
|
|
15) In a heap the element with the greatest key is always located in which node?
a. leaf
b. root
c. first node of left sub tree
d. first node of right sub tree
Answer
Explanation
|
ANSWER: root
Explanation: No explanation is available for this question!
|
|
16) Which among the following belongs to the category of a Pre-order Traversal?
a. Root -> Left Sub Tree -> Right Sub Tree
b. Root -> Right Sub Tree -> Left Sub Tree
c. Right Sub Tree -> Left Sub Tree -> Root
d. Left Sub Tree -> Right Sub Tree -> Root
Answer
Explanation
|
ANSWER: Root -> Left Sub Tree -> Right Sub Tree
Explanation: No explanation is available for this question!
|
|
17) Which HTML element defines the title of a work and is usually displayed in italics?
a. <bold>
b. <bdo>
c. <cite>
d. <address>
Answer
Explanation
|
ANSWER: <cite>
Explanation: No explanation is available for this question!
|
|
18) What does the <kbd> tag define in an HTML page?
a. Defines keyboard input
b. Defines mathematical variable
c. Defines preformatted text
d. Defines computer output
Answer
Explanation
|
ANSWER: Defines keyboard input
Explanation: No explanation is available for this question!
|
|
19) What are the three ways by which styling can be added to the HTML elements?
a. Inter, Outer, External
b. Outline, Inline, External
c. Inline, Internal, External
d. None of the above
Answer
Explanation
|
ANSWER: Inline, Internal, External
Explanation: No explanation is available for this question!
|
|
20) Which attributes can the screen readers read? (HTML)
a. ctrl
b. alt
c. both A & B
d. None of the above
Answer
Explanation
|
ANSWER: alt
Explanation: No explanation is available for this question!
|
|
21) In OSI Model, from which layer the physical layer translates the logical communication request, where hardware specific operations are to be done?
a. Transport Layer
b. Application Layer
c. Data Link Layer
d. Network Layer
Answer
Explanation
|
ANSWER: Data Link Layer
Explanation: No explanation is available for this question!
|
|
22) What should we call a network which is located within a building or campus?
a. MAN
b. WAN
c. VAN
d. LAN
Answer
Explanation
|
ANSWER: LAN
Explanation: No explanation is available for this question!
|
|
23) Which topology has a Central Controller or a Hub?
a. Bus
b. Star
c. Mesh
d. Tree
Answer
Explanation
|
ANSWER: Star
Explanation: No explanation is available for this question!
|
|
24) Which switching methods are used to move data through a network link and switches?
a. Circuit Switching
b. Pocket Switching
c. Both A and B
d. Line Switching
Answer
Explanation
|
ANSWER: Both A and B
Explanation: No explanation is available for this question!
|
|
25) What is the size of the MAC Address?
a. 48 bits
b. 36 bits
c. 24 bits
d. 42 bits
Answer
Explanation
|
ANSWER: 48 bits
Explanation: No explanation is available for this question!
|
|
26) A system has 'm' number of resources of same type and 3 processes A, B, C. Share these resources A, B, C which have the peak demand of 3, 4 and 6 respectively. Deadlock will not occur if the value of 'm' is __________.
a. m = 15
b. m = 8
c. m = 13
d. m = 9
Answer
Explanation
|
ANSWER: m = 13
Explanation: No explanation is available for this question!
|
|
27) In the given table it shows P1, P2 and P3 are the three processes. What is the completion order of the 3 processes under the policies First Come First Serve(FCFS) and Round Robin Scheduling? (RRS with CPU quantum time of 2 units)
a. FCFS: P1, P2, P3 RR2: P1, P3, P2
b. FCFS: P1, P3, P2 RR2: P1, P2, P3
c. FCFS: P1, P3, P2 RR2: P1, P3, P2
d. FCFS: P1, P2, P3 RR2: P1, P2, P3
Answer
Explanation
|
ANSWER: FCFS: P1, P2, P3 RR2: P1, P3, P2
Explanation: No explanation is available for this question!
|
|
28) What is said to happen when the result of computation depends on the speed of the processes involved?
a. A deadlock
b. A time lock
c. Cycle stealing
d. Race condition
Answer
Explanation
|
ANSWER: Race condition
Explanation: No explanation is available for this question!
|
|
29) Consider a counting semaphore which was initialized to 10 and then 6P (wait) operations and 4v(signal) operations were completed on this semaphore. What is the resulting value of semaphore?
a. 10
b. 9
c. 8
d. 0
Answer
Explanation
|
ANSWER: 8
Explanation: No explanation is available for this question!
|
|
30) Why is the Software interrupt required by the processor?
a. Return from subroutine.
b. Obtain system services, which need execution of privileged instruction.
c. Test the interrupt system of the processor.
d. Implement co-routines.
Answer
Explanation
|
ANSWER: Obtain system services, which need execution of privileged instruction.
Explanation: No explanation is available for this question!
|
|