1) What is 5NF?
a. The database should be in 3NF and all tables can have only one primary key.
b. There should be no cyclic dependencies in a composite key.
c. All attributes within the entity should depend solely on the entity's unique identifier.
d. Tables cannot have multi - valued dependencies on a Primary Key.
Answer
Explanation
|
ANSWER: There should be no cyclic dependencies in a composite key.
Explanation: No explanation is available for this question!
|
|
2) Which among the following comprises of a complete record of all activities responsible in affecting the database contents for a specific duration?
a. Transaction log
b. Data manipulation language
c. Query language
d. Report writer
Answer
Explanation
|
ANSWER: Transaction log
Explanation: No explanation is available for this question!
|
|
3) What type of form says “ Each column type is unique ” ?
a. 1NF
b. 2NF
c. 4NF
d. BCNF
Answer
Explanation
|
ANSWER: 1NF
Explanation: No explanation is available for this question!
|
|
4) Which of the following has a relationship between / among themselves as a functional dependency?
a. Rows
b. Relations
c. Attributes
d. Tables
Answer
Explanation
|
ANSWER: Attributes
Explanation: No explanation is available for this question!
|
|
5) Which of the following is used to define the schema of each database hosted in the DBMS?
a. ER diagram
b. UML
c. Database model
d. Both b and c above
Answer
Explanation
|
ANSWER: Database model
Explanation: No explanation is available for this question!
|
|
6) What is the highest level in a hierarchy of data organization?
a. Data Record
b. Data File
c. Database
d. None of the above
Answer
Explanation
|
ANSWER: Database
Explanation: No explanation is available for this question!
|
|
7) Primary key should always be auto increment.
a. True
b. False
Answer
Explanation
|
ANSWER: True
Explanation: No explanation is available for this question!
|
|
8) Which of the following is an example of Spooled Device?
a. A graphic display device
b. A line printer used to print the output of a number of jobs
c. A terminal used to enter input data to a running program
d. A secondary storage device in a virtual memory system
Answer
Explanation
|
ANSWER: A line printer used to print the output of a number of jobs
Explanation: No explanation is available for this question!
|
|
9) What is the most suitable scheduling policy for a time - shared operating systems?
a. Shortest Job First
b. Elevator
c. First Come First Served
d. Round Robin
Answer
Explanation
|
ANSWER: Round Robin
Explanation: No explanation is available for this question!
|
|
10) Consider a uniprocessor computer system that has 2 processes and both of them alternate 10ms CPU bursts with 90ms I / O bursts. Both the processes were created at nearly the same time and can proceed in parallel. What is the scheduling strategy for this system that will result in the least CPU utilization (over a long period of time)?
a. Round Robin scheduling with a time quantum of 5ms
b. First Come First Served scheduling
c. Shortest remaining time first
d. Static priority scheduling with different priorities for the two processes
Answer
Explanation
|
ANSWER: Round Robin scheduling with a time quantum of 5ms
Explanation: No explanation is available for this question!
|
|
11) The average time of service a page fault is 10ms and the time taken to access the memory is 1µs. A 99.99% hit ratio results in average memory their access time is __________.
a. 1.9999µs
b. 1.9999ms
c. 1ms
d. 9.99µs
Answer
Explanation
|
ANSWER: 1.9999µs
Explanation: No explanation is available for this question!
|
|
12) Which of the following statements is not valid for deadlock prevention scheme?
a. Number the resources uniquely and never request a lower numbered resource than the last one requested.
b. Request and all required resources be allocated before execution.
c. Release all resources before requesting a new resource.
d. Never request a resource after releasing any resource.
Answer
Explanation
|
ANSWER: Never request a resource after releasing any resource.
Explanation: No explanation is available for this question!
|
|
13) Which of the following is the correct syntax to add an iframe?
a. <iframe src = " demo_iframe.htm " style = " border:none " > < / iframe >
b. <iframe src = " demo_iframe.htm " style = " border:5px dotted red " > < / iframe >
c. <iframe src = " demo_iframe.htm " width = " 200 " height = " 200 " > < / iframe >
d. <iframe src = " URL " >< / iframe>
Answer
Explanation
|
ANSWER: <iframe src = " URL " >< / iframe>
Explanation: No explanation is available for this question!
|
|
14) How many HTML colors are supported by all the browsers?
a. 100
b. 140
c. 50
d. 90
Answer
Explanation
|
ANSWER: 140
Explanation: No explanation is available for this question!
|
|
15) What are the methods used to specify colors in HTML?
a. RGB colors
b. Color names
c. Hexadecimal colors
d. All of the above
Answer
Explanation
|
ANSWER: All of the above
Explanation: No explanation is available for this question!
|
|
16) Which HTML tag is used to define a client - side script such as the Javascript?
a. <script>
b. <unscript>
c. Both A & B
d. None of the above
Answer
Explanation
|
ANSWER: <script>
Explanation: No explanation is available for this question!
|
|
17) Which of the following is the fastest ways to store and retrieve data?
a. Sorting
b. Hashing
c. Indexing
d. both A and C
Answer
Explanation
|
ANSWER: Hashing
Explanation: No explanation is available for this question!
|
|
18) If every node ' u ' in ' G ' is adjacent to every other node ' v ' in ' G ', A graph is said to be ___________.
a. isolated
b. complete
c. finite
d. strongly connected
Answer
Explanation
|
ANSWER: complete
Explanation: No explanation is available for this question!
|
|
19) What should we call a binary tree whose every node has either zero or two children?
a. Complete Binary Tree
b. Binary Search Tree
c. Extended Binary Tree
d. None of Above
Answer
Explanation
|
ANSWER: Extended Binary Tree
Explanation: No explanation is available for this question!
|
|
20) Why the elements of an Array are stored successively in Memory Cells?
a. by this way computer can keep track only the address of the first element and the addresses of the other elements can calculated
b. the architecture of computer memory does not allow arrays to store other than serially
c. Both of above
d. None of above
Answer
Explanation
|
ANSWER: by this way computer can keep track only the address of the first element and the addresses of the other elements can calculated
Explanation: No explanation is available for this question!
|
|
21) What is the difference between Linear Array and a Record?
a. An array is suitable for homogeneous data but the data items in a record may have different data type.
b. In a record, there may not be a natural ordering in opposed to linear array.
c. A record form a hierarchical structure but a linear array does not
d. All of above
Answer
Explanation
|
ANSWER: All of above
Explanation: No explanation is available for this question!
|
|
22) You have to sort a list L consisting of a sorted list, followed by a few “ random ” elements. Which of the following sorting methods would be especially suitable for such a task?
a. Bubble sort
b. Selection sort
c. Quick sort
d. Insertion sort
Answer
Explanation
|
ANSWER: Insertion sort
Explanation: No explanation is available for this question!
|
|
23) The operation of processing each element in the list is known as, _________.
a. Sorting
b. Merging
c. Inserting
d. Traversal
Answer
Explanation
|
ANSWER: Traversal
Explanation: No explanation is available for this question!
|
|
24) When the time factor determining the efficiency of the algorithm is measured?
a. Counting microseconds
b. Counting the number of key operations
c. Counting the number of statements
d. Counting the kilobytes of algorithm
Answer
Explanation
|
ANSWER: Counting the number of key operations
Explanation: No explanation is available for this question!
|
|
25) Which of the following data structure is not a Linear Data Structure?
a. Arrays
b. Linked lists
c. Both of these
d. None of these
Answer
Explanation
|
ANSWER: None of these
Explanation: No explanation is available for this question!
|
|
26) HTTP Protocol is used in ________.
a. Application Layer
b. Data Link Layer
c. Transport Layer
d. Network Layer
Answer
Explanation
|
ANSWER: Application Layer
Explanation: No explanation is available for this question!
|
|
27) What does the Standard x.25 specify?
a. DTE / DCE Interface
b. Data bit rate
c. Start - Stop Data
d. Dial Access
Answer
Explanation
|
ANSWER: DTE / DCE Interface
Explanation: No explanation is available for this question!
|
|
28) What is the size of the Ipv6 address?
a. 64 bits
b. 128 bits
c. 32 bits
d. 128 bytes
Answer
Explanation
|
ANSWER: 128 bits
Explanation: No explanation is available for this question!
|
|
29) Which of the following is / are the disadvantages of fragmentation? (Networking)
a. Overlapping of Fragments
b. Complicates Routers
c. Open to DoS Attack
d. All of the Above
Answer
Explanation
|
ANSWER: All of the Above
Explanation: No explanation is available for this question!
|
|
30) Why does the Client get blocked while the call is being processed in RPC by a Server?
a. Completing the duration of the Connection.
b. Client sends an Asynchronous Request to the Server.
c. Call Processing is Complete.
d. It discovers the process path.
Answer
Explanation
|
ANSWER: Client sends an Asynchronous Request to the Server.
Explanation: No explanation is available for this question!
|
|