DB/OS/DS/Networking/HTML - 6

1)   What type of database object represents a result set and is used to manipulate data row by row?

a. Trigger
b. Procedure
c. Cursor
d. Monitor
Answer  Explanation 

ANSWER: Cursor

Explanation:
No explanation is available for this question!


2)   What relationships does Referential integrity control?

a. Attributes in a table
b. Operations of an object
c. Instances of a class
d. Tables in a database
Answer  Explanation 

ANSWER: Attributes in a table

Explanation:
No explanation is available for this question!


3)   What are the following types of?

SERIALIZABLE
REPEATABLE READ
READ COMMITTED


a. Locks
b. Logs
c. Isolation level
d. Latch types
Answer  Explanation 

ANSWER: Isolation level

Explanation:
No explanation is available for this question!


4)   State the main difference between a latch and a lock.

a. Locks are more restrictive than Latches in that they are always exclusive.
b. Latches are more restrictive than locks in that they are always exclusive.
c. Latch is used to protect data while lock is not.
d. Lock is used to protect data while latch is not.
Answer  Explanation 

ANSWER: Latches are more restrictive than locks in that they are always exclusive.

Explanation:
No explanation is available for this question!


5)   Which of the following command executes faster?

a. Copy File < FILE 1>< FILE 2 >
b. Copy Structure to < NEW FILE >
c. Copy to M FILE - DAT DELIMITED.
d. Copy to < New file >
Answer  Explanation 

ANSWER: Copy Structure to < NEW FILE >

Explanation:
No explanation is available for this question!


6)   Which command allows the user to change multiple fields?

a. Modify
b. Lookup
c. Update
d. Change
Answer  Explanation 

ANSWER: Update

Explanation:
No explanation is available for this question!


7)   What is a report generator used for?

a. Update Files
b. Print Files
c. Alter files
d. All the above
Answer  Explanation 

ANSWER: Print Files

Explanation:
No explanation is available for this question!


8)   Which graph consists of an unordered pair of vertices representing the similar edge? (Data Structure)

a. Directed Graph
b. Undirected Graph
c. Both a & b
d. None of the above
Answer  Explanation 

ANSWER: Undirected Graph

Explanation:
No explanation is available for this question!


9)   A path in which all the vertices are distinct excluding the initial and final vertices is known as _________. (Data Structure)

a. Simple
b. Compound
c. Complex
d. Distinct
Answer  Explanation 

ANSWER: Simple

Explanation:
No explanation is available for this question!


10)   Which graphs are distinctively known by the existence of a path between every pair of its vertices?

a. Weighted graphs
b. Connected graphs
c. Subgraphs
d. Multigraphs
Answer  Explanation 

ANSWER: Connected graphs

Explanation:
No explanation is available for this question!


11)   What is the timing complexity of Prim's Algorithm for a graph comprising ' n ' vertices?

a. O(n)
b. O(n2)
c. O(n3)
d. O(n-1)2
Answer  Explanation 

ANSWER: O(n2)

Explanation:
No explanation is available for this question!


12)   Which algorithm specifies the addition of edges to the Spanning Tree in an increasing order of cost?

a. Prim's Algorithm
b. Kruskal's Algorithm
c. Both a & b
d. None of the above
Answer  Explanation 

ANSWER: Kruskal's Algorithm

Explanation:
No explanation is available for this question!


13)   How many nested loops are present in Prim's Algorithm?

a. Two
b. Three
c. Four
d. Infinite
Answer  Explanation 

ANSWER: Two

Explanation:
No explanation is available for this question!


14)   Which among the below mentioned graph elements represents a simple path that begins and terminates at the same vertex?

a. Path
b. Cycle
c. Node
d. Edge
Answer  Explanation 

ANSWER: Cycle

Explanation:
No explanation is available for this question!


15)   Which value of degree is specified / defined for an Isolated Vertex?

a. Zero
b. One
c. Infinity
d. Unpredictable
Answer  Explanation 

ANSWER: Zero

Explanation:
No explanation is available for this question!


16)   Which Vertex exhibits its In - degree and Out - degree to be ' 1 ' & ' 0 ' respectively?

a. Pendant Vertex
b. Isolated Vertex
c. Cut-Vertex
d. Labeled Vertex
Answer  Explanation 

ANSWER: Pendant Vertex

Explanation:
No explanation is available for this question!


17)   What are the two method attributes that are used while submitting the forms?

a. GET
b. POST
c. SUBMIT
d. Both A & B
Answer  Explanation 

ANSWER: Both A & B

Explanation:
No explanation is available for this question!


18)   What is the inline style used for?

a. To apply style to all the pages
b. To applying a unique style to a single HTML element
c. To define a common style for all HTML elements on a page
d. All of the above
Answer  Explanation 

ANSWER: To applying a unique style to a single HTML element

Explanation:
No explanation is available for this question!


19)   The tag <link> is used to _______.

a. give a page description
b. define style information
c. define a link between a document and an external resource
d. both A & B
Answer  Explanation 

ANSWER: define a link between a document and an external resource

Explanation:
No explanation is available for this question!


20)   If the browser does not know the size of the image, the page will not flicker while the images load.

a. True
b. False


Answer  Explanation 

ANSWER: False

Explanation:
No explanation is available for this question!


21)   Which command allows to set a Telnet password on a Cisco router?

a. line con 0 4
b. line vty 0 4
c. line telnet 0 4
d. line aux 0 4
Answer  Explanation 

ANSWER: line vty 0 4

Explanation:
No explanation is available for this question!


22)   Which of the following is / are the advantages of connectionless networking?

a. Reliability
b. It cannot lose connection state.
c. Dynamically rerouted
d. All of the above.
Answer  Explanation 

ANSWER: All of the above.

Explanation:
No explanation is available for this question!


23)   In Transport Layer which protocol does DHCP used?

a. UDP
b. ARP
c. IP
d. Both B and C
Answer  Explanation 

ANSWER: UDP

Explanation:
No explanation is available for this question!


24)   What command is used to take backup on IOS?

a. copy flash tftp
b. copy ios tftp
c. backup IOS disk
d. copy tftp flash
Answer  Explanation 

ANSWER: copy flash tftp

Explanation:
No explanation is available for this question!


25)   In OSI model where is a hub located?

a. Transport Layer
b. Network Layer
c. Physical Layer
d. Data Link Layer
Answer  Explanation 

ANSWER: Physical Layer

Explanation:
No explanation is available for this question!


26)   We have a CPU that generates virtual addresses of 32 bits and the page size is of 4 kbyte. Transition Lookaside Buffer ( TLB ) of the processor can hold a total of 128 page table entries and 4 - way set associative. What is the minimum size of the TLB tag?

a. 16 bit
b. 20 bit
c. 11 bit
d. 15 bit
Answer  Explanation 

ANSWER: 15 bit

Explanation:
No explanation is available for this question!


27)   Consider a virtual memory system that uses First In First Out (FIFO) page replacement policy and it allocates a fixed number of frames to a process. Consider the following two statements,

1: Sometimes the page fault rate is increased if the number of page frames allocated is increased.
2: Some programs do not exhibit Locality of reference.

Which of the following is true?


a. 1 is false and 2 is true
b. both 1 and 2 are false
c. both 1 and 2 are true but 2 is not the reason for 1
d. both 1 and 2 are true and 2 is the reason for 1
Answer  Explanation 

ANSWER: both 1 and 2 are true but 2 is not the reason for 1

Explanation:
No explanation is available for this question!


28)   Why do we translate a virtual address to physical address where a multilevel page table is preferred in comparison to a single level page table?

a. It is required by the translation look-aside buffer
b. It helps to reduce the memory access time to read or write a memory location
c. It helps to reduce the number of page faults in page replacement algorithm
d. It helps to reduce the size of a page table needed to implement the virtual address space of a process
Answer  Explanation 

ANSWER: It helps to reduce the size of a page table needed to implement the virtual address space of a process

Explanation:
No explanation is available for this question!


29)   An application loads 100 libraries at startup and loading each library exactly one disk access is required. 10ms is the seek time of the disk to a random location and 6000rpm is the rotational speed of the disk. Neglect the time to transfer data from the disk block once the head has been positioned at the start of the block. What will be the time taken by the application to load all the libraries, if all 100 libraries are loaded from random location on the disk?

a. 1.50s
b. 1.00s
c. 1.87s
d. 0.74s
Answer  Explanation 

ANSWER: 1.50s

Explanation:
No explanation is available for this question!


30)   The program given below consists of three concurrent processes P0, P1, P2 and three binary semaphores with the values S0 = 1, S1 = 0, S2 = 0.
How many times the process P0 will print ‘0’ ?


computer-science-24.png
a. At least thrice
b. Exactly thrice
c. At least twice
d. Exactly twice
Answer  Explanation 

ANSWER: At least twice

Explanation:
No explanation is available for this question!