Вы находитесь на странице: 1из 13

BSC Academy

1.

em
y

IT Questions
DOS floppy disk does not have ________
1) a boot record
2) a file allocation table
4) virtual memory
5) None of the above

3) a root directory

2.

The ________ component is used by the data analyst to create queries that access the database.
1) data store
2) query and reporting
3) ETL tools
4) data visualisation
5) None of these

3.

The altering of data so that it is not usable unless the changes are undone is ________
1) Ergonomics
2) Biometrics
3) Compression
4) Encryption

5) None of these

Which of the following is a general-purpose programming language designed by Sun Microsystems and well suited for
use on the web?
1) Java
2) Java Script
3) CSS
4) VBS Script
5) None of these

5.

________ are used to identify a user who returns to a website.


1) ASPs
2) Scripts
3) Cookies

ad

4.

4) Plug-ins

5) None of These

Programs that automatically submit your search request to several search engines simultaneously are called ________
1) Hits
2) Webcrawlers
3) Spiders
4) Metasearch engines 5) None of these

7.

If you wanted to locate the hardware address of a local device, which protocol would you use?
1) PING
2) ICMP
3) ARP
4) RARP
5) PONG

8.

In Oracle, which is more appropriate to store a small list of values in a single column in each row in your address table?
1) Index
2) Nested table
3) Oracarray
4) Varray
5) Index

9.

OLAP applications are widely used by ________ and it uses ________ scheme.
1) RDBMS, Bus
2) Java, Bus
3) Operating System, Star
4) Data mining techniques, star or multidimensional
5) None of these

10.

ODBC is based on ________


1) C++ language
4) .net language

11.

Ac

6.

2) RDBMS
5) C language

To discard all pending data changes use the ________ command.


1) LOCK
2) SAVEPOINT
3) ROLLBACK

3) Structured Query Language

4) COMMIT

5) None of these

Round robin scheduling is essentially the preemptive version of ________


1) Shortest job first
2) Shortest remaining
3) Longest time first
4) FIFO
5) None of these

13.

The mechanism by which the data and functions are bound together within an object definition is called ________
1) Abstraction
2) Polymorphism
3) Inheritance
4) Encaspsulation
5) None of these

14.

The TRAP is one of the interrupts available in INTEL 8085.Which of the following statements is true of TRAP?
1) It is negative edge-triggered.
2) It is positive edge-triggered.
3) It is both edge-triggered and level-triggered.
4) It is level-triggered.
5) None of these

15.

The ________ data mining technique derives rules from real-world case examples.
1) Waterfall Model
2) Spiral Model
3) Prototyping Model 4) Incremental Model

BS

12.

16.

An oracle server index


1) Is a schema object
2) Is used to speed up the retrieval of rows by using a pointer
3) Is independent of the table it indexes
4) All of these
5) None of these

IT Quesetions

5) None of these

BSC Academy
Which of the following is not a context-free grammar component?
1) Terminal symbols
2) Non-terminal symbol
4) List
5) None of these

3) Productions

em
y

17.

Which of the following is a phase(s) of RAD (Rapid Application Development) model?


1) Business modelling
2) Data modelling
3) Application generation
4) All of these
5) None of these

19.

________ allows a DFD (Data Flow Diagram) with transform flow characteristics to be mapped into a predefined
template for program structure.
1) Transaction flow 2) Contributor
3) Transform mapping 4) Design evaluation 5) None of these

20.

A combinational logic circuit which is used to send data coming from a single source to two or more separate destinations
is called
1) Decoder
2) Encoder
3) Multiplexer
4) Demultiplexer
5) None of these

21.

Which of the following is a Universal Gate?


1) AND
2) OR

22.

4) NAND

5) None of these

ad

18.

3) EX OR

4) 101000.0011

5) None of these

4) All of these

5) None of these

Twos complement of binary number 010111.1100 is


1) 101001.1100
2) 101000.0100
3) 010111.0011

In 8086, the overflow flag is set when


1) The sum is more than 16 bits
2) Signed numbers go out of their range after an arithmetic operation
3) Carry and sign flags are set
4) During subtraction
5) None of these

24.

What does microprocessor speed depend on?


1) Clock
2) Data bus width
3) Address bus width

25.

Ac

23.

RSA algorithm
1) supports encryption and digital signature
3) encrypts the checksum
5) None of these

2) supports source authentication


4) All the above

A special type gateway that can keep external users from accessing resources on the LAN users access the external info
is called
1) Repeater
2) Firewall
3) Encryption
4) Hub
5) None of these

27.

What is the name given to the exchange of control signals which is necessary for establishing a connection between a
modem and a computer at one end of a line and another modem and computer at the other end?
1) Handshaking
2) Modem Options
3) Protocol
4) All of these
5) None of these

28.

In SQL, which command is used to change data in a data table?


1) UPDATE
2) INSERT
3) BROWSE

4) APPEND

5) None of these

In SQL, which of the following is not a data definition language command?


1) RENAME
2) REVOKE
3) GRANT
4) UPDATE

5) None of these

Which command(s) is (are) used to redefine a column of the table in SQL ?


1) ALTER TABLE
2) DEFINE TABLE
3) MODIFY TABLE
4) All of these

5) None of these

In a relational schema, each tuple is divided into fields called


1) Relations
2) Domains
3) Queries

5) None of these

BS

29.

26.

30.
31.
32.

33.

4) All of the these

An indexing operation
1) Sorts a file using a single key
4) Both 1 and 3

2) Sorts a file using two keys


5) None of these

3) Establishes an index for a file

Data security threats include


1) Hardware failure
4) All of these

2) Privacy invasion
5) None of these

3) Fraudulent manipulation of data

IT Quesetions

BSC Academy
The language used in application programs to request data from the DBMS is referred to as the
1) DML
2) DDL
3) Query Language
4) DCL
5) None of these

35.

A________ contains the smallest unit of meaningful data, so you might call it the basic building block for a data file.
1) File Structures
2) Records
3) Fields
4) Data base
5) None of these

36.

A ________ means that one record in a particular record type is related to only one record of another record type.
1) One-to-one relationship
2) One-to-many relationship
3) Many-to-one relationship
4) Many-to-many relationship
5) None of these

37.

Through linked list one can implement


1) Stack
2) Graph

38.

em
y

34.

3) Queue

4) All of these

A heap allows a very efficient implementation of a


1) Double-ended queue
2) Priority queue
4) Trees
5) None of these

5) None of these

3) Stack

Most database management systems allow you to have more than one key so that you can sort records in different ways.
One of the keys is designated the ________ and must hold a unique value for each record.
1) Unique Key
2) Prime attribute
3) Index key
4) Primary Key
5) Null key

40.

________ is primarily used for mapping host names and email destinations to IP address but can also be used for other
purposes
1) TCP (Transfer Control Protocol)
2) DNS (Domain Name System)
3) SHA (Secure Hash Algorithm)
4) Simple Network Management Protocol (SNMP)
5) None of these

41.

Override is a method
1) For an operation that replaces an inherited method for the same operation
2) For a data that replaces an inherited method for the same operation
3) For an operation that takes arguments from library function
4) All of these
5) None of these

42.

Local variables
1) Are created outside a block
3) Continue to exist when their block ends
5) None of these

44.

Ac

________ is a virus that inserts itself into a systems memory.


infected file is executed.
1) Web scripting virus
2) Polymorphic Virus
4) Boot sector virus
5) Resident virus

Then it takes a number of actions when an


3) Macro virus

Which of the following TCP/IP protocol is used for remote terminal connection service?
1) Telnet
2) RARP
3) FTP
4) All the above

5) None of these

The ________ model remains operative until the software is retired.


1) Waterfall model
2) Incremental model 3) Spiral model

5) Incremental model

BS

45.

2) Are known only to that block


4) Are illegal in C++

43.

ad

39.

4) Prototyping model

46.

Data mining evolved as a mechanism to cater to the limitations of ________ systems to deal massive data sets with high
dimensionality, new data type, multiple heterogeneous data resource etc.
1) OLTP
2) OLAP
3) DSS
4) DWH
5) None of these

47.

An important application of cryptography used in computerized commercial and financial transactions:


1) Data mining
2) Data warehousing 3) Digital signature
4) Media convergence 5) None of these

48.

Rows of a relation are called


1) Relation
2) Tuples

49.

3) Data structure

The drawbacks of the binary tree sort are remedied by the


1) Linear sort
2) Quick sort
3) Heap Sort

IT Quesetions

4) An entity

5) None of these

4) Insertion sort

5) None of these

BSC Academy

52.

53.

54.

55.

5) None of these

Information is
1) Data

5) All of These

2) Processed data

em
y

51.

Which layer of OSI determines the interface of the system with the user?
1) Network
2) Application
3) Data link
4) Session
3) Manipulated input

Data by itself is not useful unless


1) It is massive
3) It is collected from diverse sources
5) None of These

4) Computer output

2) It is processed to obtain information


4) It is properly stated

For taking decisions data must be


1) Very accurate
4) Collected from diverse sources

2) Massive
5) All of These

Strategic information is needed for


1) Day-to-day operations
4) Short-range planning

2) Meeting government requirements 3) Long-range planning


5) Only 2 and 3

Strategic information is required by


1) Middle managers 2) Line managers

3) Top managers

3) Processed correctly

4) All workers

ad

50.

5) Only 1 and 2

A ROLLBACK command in a transaction


1) Makes sure that all changes to the database are in effect.
2) Undoes all changes to the database resulting from the execution of the transaction
3) Does nothing
4) Undoes the effects of the last UPDATE command
5) Restores the current of the database to its state at the end of the previous day

57.

________ refers to the contracting of a specific business task to a third party service provider.
1) Insourcing
2) Outsourcing
3) Offshore Outsourcing
4) Cross-Functioning
5) Business Process Outsourcing

58.

Operational information is needed for


1) Day-to-day operations
2) Meeting government requirements 3) Long-range planning
4) Short-range planning
5) All of these

59.

In motorcar manufacturing the following type of information is strategic:


1) Decision on introducing a new model
2) Scheduling production
3) Assessing competitor car
4) Computing sales tax collected
5) Only 1 and 2

60.

A computer-based information system is needed because


(A) The size of organisations has become large and data is massive
(B) Timely decisions are to be taken based on available data
(C) Computers are available
(D) It is difficult to get clerks to process data
1) Only A and C
2) Only A and B
3) Only A and D

BS

Ac

56.

61.
62.
63.
64.

4) Only C and D

5) Only B and D

Volume of strategic information is


1) Condensed
2) Detailed

3) Summarised

4) Irrelevant

5) Only 1 and 2

Operational information is
1) Haphazard
2) Well organized

3) Unstructured

4) Partly structured

5) Only 1 and 2

The quality of information which does not hide any unpleasant information is known as
1) Complete
2) Trustworthy
3) Relevant
4) None of the above

5) All of the above

Every record stored in a Master file has a key field because


1) it is the most important field
2) it acts as a unique identification of record
3) it is the key to the database
4) it is a very concise field
5) None of These

IT Quesetions

BSC Academy

68.

69.

70.

71.

Data rejected by edit program are


1) corrected and re-entered
4) ignored during processing

75.

3) Only B and D

Batch processing is used when


(A) response time should be short
(B) data processing is to be carried out at periodic intervals
(C) transactions are in batches
(D) transactions do not occur periodically
1) Only A and B
2) Only A, C and D
3) Only B and C

3) it can handle random queries

4) Only C and D

5) Only A and D

4) Only A, B and C

5) Only A and D

A management information system is one which


1) is required by all managers of an organisation
2) processes data to yield information of value in tactical management
3) provides operational information
4) allows better management of organisations
5) Only 1 and 2

2) analysing past decision made by managers


4) retrieving archival data

Data mining requires


1) large quantities of operational data stored over a period of time
2) lots of tactical data
3) several tape drives to store archival data
4) large mainframe computers
5) All of these

BS
74.

3) collected for later use

Online transaction processing is used because


1) it is efficient
2) disk is used for storing files
4) transactions occur in batches
5) None of the above

72. Data mining is used to aid in


1) operational management
3) detecting patterns in operational data
5) Only 2 and 3
73.

2) format correctly input data


4) expedite retrieving input data

2) removed from processing


5) Only 1 and 3

Off-line data entry is preferable when


(A) data should be entered without error
(B) the volume of data to be entered is large
(C) the volume of data to be entered is small
(D) data is to be processed periodically
1) Only A and B
2) Only B and C

5) None Of These

em
y

67.

Edit program is required to


1) authenticate data entered by an operator
3) detect errors in input data
5) All of the above

4) CD- ROM

ad

66.

The primary storage medium for storing archival data is


1) floppy disk
2) magnetic disk
3) magnetic tape

Ac

65.

Data mining cannot be done if


1) operational data has not been archived
3) the organization is large
5) All the above

2) earlier management decisions are not available


4) all processing had been only batch processing

Decision support systems are essential for


1) Day-to-day operations of an organisation
3) Top-level strategic decision making
5) Only 3 and 4

2) Providing statutory information


4) Ensuring that organisations are profitable

IT Quesetions

BSC Academy
Which of the following IEEE standards deal(s) with LAN and MAN (metropolitan area network)?
1) 801
2) 803
3) 802
4) 800
5) Only 1 and 2

77.

Firewalls protect against


1) unauthorised attacks
4) data-driven attacks

81.

82.
83.
84.
85.
86.
87.
88.

89.
90.

Two binary digits can be added using the logical circuit


1) Half adder
2) Full adder
3) Serial adder
Full form of BIOS:
1) Better input output services
4) basic input/output system

2) basic inner outer services


5) None of The Above

5) Only 1 and 2

4) Diskette

5) Only 1 and 2

4) Parallel adder

5) None of the Above

3) basic input output services

The device that connects inputs to outputs:


1) RAM
2) crossbar

3) crossword

4) modem

5) Only 1 and 2

Data entered into the computer is called


1) Input
2) Algorithm

3) Flowchart

4) Output

5) All of These

The process of connecting to the internet account is called


1) SIGN IN
2) LOG IN
3) LOG OUT

4) SIGN OUT

5) None of the above

How many values can be represented by a single byte?


1) 4
2) 16
3) 64

4) 256

5) None of the above

Most data communications involving telegraph lines use


1) simplex lines
2) wideband channel 3) narrowband channel 4) dialled service

5) None of these

Which scheme is used for mapping host names and email destinations to IP addresses?
1) DNS
2) TCP/IP
3) TELENET
4) RARP

5) None of These

Broad band ISDN consists of


1) Physical layer
3) ATM adaptation layer
5) All of the above

2) Asynchronous Transfer Mode (ATM) layer


4) Only 1 and 2

The ________ component is not present in every router.


1) POST
2) DRAM
3) Mini-IOS

4) Bootstrap

The linker produces a ________ which contains binary codes for all compound modules.
1) Bit file
2) Load file
3) Link file
4) Object Program

92.

Which of the following is the easiest software development process model?


1) Prototyping
2) Waterfall model
3) Spiral model
4) Interactive enhancement
5) None of the above

93.

C++ was developed by


1) Bjarne Stroustrup 2) Dennis Ritchie

94.

5) None of these
5) None of These

In C++ we can use the same function name to create functions that perform a variety of different tasks.This is known
as
1) Inheritance
2) Global function
3) Function overloading
4) Only 1 and 2
5) All of the above

BS

91.

During cutting and pasting, the item cut is temporarily stored in


1) Hard drive
2) Clipboard
3) ROM

4) pen

ad

80.

Which of the following is not related to computer?


1) mouse
2) screen
3) bit

Ac

79.

3) virus attacks

78.

2) fire attacks
5) Only 1 and 2

em
y

76.

3) Tannenbaum

4) Milan Melkovinec

5) None of These

If the disk head is located initially at 32, find the number of disk moves required with FCFS if the disk queue of I/O blocks
requests are 98, 37, 14, 124, 65, 67.
1) 324
2) 321
3) 310
4) 315
5) 320

IT Quesetions

BSC Academy
The action of parsing the source program into proper syntactic classes is known as
1) Lexical analysis
2) Syntax Analysis
3) General Syntax Analysis
4) Interpretation Analysis
5) None of the above

96.

Resolution of externally defined symbols is performed by


1) Loader
2) Linker
3) Compiler

97.

em
y

95.

Which language is best used for real time system?


1) Java
2) C
3) Assembly

4) Assembler

5) None of These

4) C++

5) None of these

98.

In the UNIX systems the user can change the access rights of the file to different users by using
1) Tail
2) PID
3) Chmod
4) Head
5) None of These

99.

Which of the following Unix commands is used to create empty files?


1) Vi
2) Cat
3) Touch
4) Pico

100. Both Go-Back-N and Selective-Repeat Protocols use a


1) sliding frame
2) sliding window
3) sliding data

4) sliding packet

5) None of these
5) None of these

ad

101. Which of the memories has the shortest access time?


1) Cache Memory
2) RAM
3) Magnetic Bubble Memory
4) Magnetic Core Memory
5) All the above have equal access time.

102. The IEEE 802.6 standard describes a ________ standard called Distributed Queue Dual Bus (DQDB).
1) WAN
2) MAN
3) LAN
4) Internet
5) None of the above
3) Blank List

4) Both 1 and 2

5) None of the above

104. ________ uses thin coaxial cable.


1) 10Base2
2) 10Base5

3) 10Base-T

4) 10Base-F

5) None of these

105. The input of Lex is


1) Statement
4) ASCII Code

Ac

103. The list with no nodes on it is called


1) Null List
2) Empty List

2) Numeric Data
5) None of these

3) Set of regular expressions

106. Which of the following is not a logical database structure?


1) Relational
2) Network
3) Chain

4) Tree

5) None Of These

107. CIDR (Classless Inter Domain Routing) is most often used in


1) class C Networks 2) class A Networks
3) class B Networks

4) Only 1 and 2

5) None of the above

108. Which of the following operators in C does not associate from the right?
1) ,
2) =
3) +
4) ++

5) None of the above

109. Which language has recently become the de facto standard for interfacing application programs with relational database
system?
1) SQL
2) Oracle
3) 4 GL
4) Database
5) None of the above
110. Sockets are used in
1) Data link Layer

2) Physical Layer

3) Transport Layer

4) Network Layer

BS

111. Lexical Analyzer transforms an input stream into


1) Regular expression 2) Binary
3) Symbols

5) None of the above

4) Sequence of tokens 5) None of these

112. In which manner should we traverse a binary search tree so that elements are visited in ascending order?
1) Preorder
2) Inorder
3) Postorder
4) Graph
5) None of These
113. 253.45.67.9 is a class ________ address.
1) D
2) A
114. Semantic errors can be detected
1) At compile time only
3) At run time only
5) None of these

3) E

4) C

5) None of These

2) Both at compile time and at run time


4) All of the above

IT Quesetions

BSC Academy

em
y

115. Which of the following communication modes supports two-way traffic but in only one direction at a time?
1) Duplex
2) Simplex
3) Three- Quarters Duplex
4) Half-Duplex
5) All of the above
116. In a PC-to-telephone hookup for long-distance communication, modem is connected between the telephone line and
1) Synchronous Port
2) PC
3) Cross-Over Cable
4) Asynchronous Port
5) None of These
117. In compilers, syntax analysis is done by
1) Scanner
2) Parser

3) Code generator

4) Lexical analyser

118. RAD (Rapid Application Development) is not appropriate when


1) Technical risks are high
2) Findings are already done
4) Only 1 and 2
5) None of These
119. In queues, the items are deleted at one end called
1) Front
2) Top
3) Base

5) None of these

3) Testing is not needed

4) Rear

5) None of These

ad

120. If a memory page containing a heavily used variable that was initialised very early and is in constant use is removed, then
the page replacement algorithm used is
1) FIFO
2) LFU
3) LRU
4) All of These
5) None of These
121. When you connect to an online information service you are asked to provide some kind of identification such as your
name, an account number and a password.
What is the name given to this brief dialogue between you and information
system?
1) Security Procedure
2) Log-on Procedure
3) Safeguard Procedure
4) Identification Procedure
5) None of These

Ac

122. Which of these determines authorised sign in an EDI (Electronic Data Interchange) transaction?
1) Masking
2) Spoofing
3) Digital Signature
4) Privacy Key Cryptosystems
5) None of these
123. C is a ________- generation language.
1) 3rd
2) 4th

3) 5th

124. Which of the following usually creates bad sector on hard disk?
1) Trojan
2) Worm
3) Stealth Virus

4) 2nd

5) None of These

4) All of these

5) None of these

125. When an organisation gives contract for development of software, it has to give data to the service provider. In such
cases, the ownership of data should be
1) Shared by both parties
2) Transferred to the service provider
3) With the client organisation that outsources service
4) Not transferred
5) None of These
126. ________ cant be used for source of data automation.
1) OCR
2) UPC
3) POS Terminal

4) Keyboard

5) None of these

BS

127. Switched mode power supply


1) Converts DC to AC
2) Converts raw input power to controlled voltage and current
3) Enhances output of a circuit
4) Switches to and fro between high and low power fluctuations
5) None of these
128. Which of the following is false about OS?
1) Acts as command processor
2) Acts as compiler
4) All are true
5) None of these
129. Which of the following is incorrect?
1) LAN is faster than MAN.
3) Clients can store information.
5) None of these

3) Acts as manager

2) Servers are powerful PCs.


4) Peer-to-peer networks have high security.

IT Quesetions

BSC Academy

131. Disk Scanners are


1) Anti-virus protection systems
4) All of these

2) 8086s supplementary IC
5) None of the above

132. Array is a set of ________ objects.


1) Different types of 2) Unique
133. The operating system is also
1) Control System
4) Boot Sector

3) Unwanted

3) Aftereffects of virus

4) Same type of

2) Special System
5) None of These

5) All of these

em
y

130. Which segment identifies the kind of business documents in an EDI transmission?
1) ISA
2) GS
3) ST
4) SE

5) None of These

3) Administrator Division

134. Which of the following identification techniques provides the best means of user authentication?
1) What the user knows
2) What the user is
3) What the user has
4) What is user has and what the user knows
5) None of These
135. The earliest approach that was used for software development was
1) Incremental development model 2) Waterfall model
4) Rapid prototyping model
5) None of These

ad

136. To make a program safe we should take care of


1) Strong authentication and access controls
3) Error-checking controls
5) None of these

3) Spiral development model

2) Doing risk analysis


4) All of these

Ac

137. If the network of the company is to be protected from remote access that may damage companys reputation due to
misuse of information, then security policy should include
1) Only the employer
2) All the employees
3) Contractors
4) All the above
5) None of these
2) Part of Internet
4) Only 1 and 2

139. What is a non-dedicated server?


1) A workstation that can double up as a server
3) A computer reserved for special task
5) None of the above

2) A computer reserved for a special task


4) Only 1 and 2

138. TCP/IP protocol stack is


1) A family of protocols that connect to PCs
3) A combination of TCP and IP protocols
5) All of these

140. The process of organising the memory into two banks to allow 8- and 16-bit data operation is called?
1) Indexed mapping
2) Bank switching
3) Two-way memory interleaving
4) Memory segmentation
5) None of these

BS

141. Which of the following is a layer of object-oriented design pyramid?


1) Message Layer
2) Subsystem layer
4) All of the above
5) None of the above

3) Class and Object Layer

142. The OSPF was created to overcome the drawbacks that ________ faced.
1) VLSM
2) IGRP
3) EIRP
4) RIP
143. FDDI is
1) Star Network
4) Bus-Based Network

2) Mesh Network
5) All of the above

3) Ring Network

144. Fragment Free Switches check ________ bytes of data.


1) 64
2) 24
3) 16

IT Quesetions

5) None of These

4) 4

5) 9

BSC Academy
2) Lower power consumption and better noise margins
4) Higher power consumption with high fan-out

146. RISC processor has


1) All operations done within the register and CPU
3) Single-cycle instruction execution
5) All of these

2) Relatively few instructions and addressing modes


4) Only 1 and 2

em
y

145. The main advantages of CMOS as compared to TTL:


1) Lower power consumption with low fan-out
3) Higher speed operation with low power consumption
5) None of these

147. A loading scheme in which loading and linking of external references are postponed until execution time:
1) Dynamic loading
2) Direct linking loader
3) Relocating loader
4) Dynamic linking
5) None of These
148. Backtracking problem is seen in
1) LR Parser
4) None of these

2) Predictive Parser
5) All of the above

3) Recursive Descent Parser

ad

149. Which of the following filename extension suggests that the file is a backup copy of another file?
1) BAK
2) TXT
3) BAS
4) COM
5) None of These
150. Connected graphs without circuits is called a
1) Hamiltonian graph
2) Euler graph
4) Tree
5) All of these are types of graph

3) Path

4) Clock replacement

5) None of the above

152. The graph K (3, 4), a complete bipartite graph, has


1) 4 edges
2) 8 edges
3) 10 edges

4) 12 edges

5) 3 edges

153. The database schema is written in


1) DML
2) HLL

4) DCL

5) None of these

Ac

151. What replacement policy is used by Windows NT?


1) LRU
2) NFU
3) FIFO

3) DDL

154. What is the average waiting time (in minutes) in FCFS of a given process p1, p2, p3, p4 if the execution time are 5, 10, 8,
3 minutes and turnaround time are 5, 15, 23, 26 minutes?
1) 10
2) 10.75
3) 12.75
4) 12
5) 13
155. In an architecture of a database system external level is the
1) logical level
2) physical level
3) conceptual level

4) view level

5) None of these

156. In a circular linked list


1) Components are all linked together in some sequential manner
2) There is no beginning and no end
3) Components are arranged hierarchically
4) Forward and backward transversal within the list is permitted
5) None of these

5) None of these

158. A technique for direct searching is


1) binary search
2) hashing

5) None of these

BS

157. The statement in SQL which allows to change the definition of a table is
1) Alter
2) Create
3) Update
4) Select
3) tree search

4) linear Search

159. Maximum number of nodes in B-tree at depth h and order t (root of depth 0) is given by
1) t(h + 1)
2) 2t(h 1)
3) t(h 1)
4) 2t(h + 1)

5) None of these

160. Which of the following can be a sequence of nodes examined in a binary search tree while searching for key 98?
1) 100, 50, 75, 60, 98
2) 100, 120, 90, 95, 98
3) 200, 70, 100, 95, 98
4) 75, 150, 90, 80, 98
5) None of these
161. What protocol is used between e-mail servers?
1) SMTP
2) FTP
3) SNMP

10

IT Quesetions

4) TCP

5) None of these

BSC Academy
162. The way a card game player arranges his cards as he picks them up one by one, is an example of
1) Selection Sort
2) Bubble Sort
3) Insertion sort
4) Merge sort
5) None of these

em
y

163. Which phase is not available in software life cycle?


1) Design
2) Testing
3) Coding

4) Abstraction

5) Maintenance

164. Which type of error detection uses binary division?


1) Parity check
3) Checksum Checking
5) None of these

2) Longitudinal Redundancy checking (LRC)


4) Cyclic Redundancy Checking (CRC)

165. Basis path testing is


1) Both black and white box testing method
3) Unique testing method
5) None of these

2) White box testing method


4) Black box testing method

166. If you want to tell the database management system that a specific attribute contained numbers only, what will you need
to set?
1) Data type
2) Data category
3) Data dictionary
4) Data definition
5) Data Integrity

ad

167. When you link one database table to another database table, what are you creating?
1) Connectivity
2) Primary Link
3) Relationships
4) Referential integrity 5) Foreign key
168. The process known as ________ is used by large retailers to study trends.
1) POS
2) Data selection
3) Data mining
4) Data conversion

5) None of these

169. Accessing records from a file directly without searching from the beginning of the file is called
1) Time sharing
2) Random
3) Direct access
4) Access time
5) None of these

Ac

170. Bankers algorithm for resource allocation deals with


1) deadlock preventation
2) deadlock avoidance
4) mutual exclusion
5) None of these

171. Which of the following performs modulation and demodulation?


1) Modem
2) Satellite
3) Coaxial Cable

3) deadlock recovery

4) Optical fiber

5) Router

172. In TCP/IP protocol, checksum field contains ________-bit value which is used for ________.
1) 32, deadlock avoidance
2) 48, error detection
3) 16, error detection
4) 16, deadlock avoidance
5) None of these
173. Granting an outside organisation access to Internet web pages is often implemented using a(n)
1) Extranet
2) Intranet
3) Internet
4) Hacker
5) None of these

174. What is the advantage of packet switching over message switching?


1) The first packet of multipacket message can be forwarded before the second one has fully arrived.
2) reduces delay and improves throughput
3) advance setup not required
4) All the above
5) None of these
4) vacuum tubes

5) None of these

176. Generalisation is a ________ process.


1) top-down
2) bottom-up

4) vertical

5) None of these

BS

175. The third-generation computers were based on


1) transistors
2) valves
3) ICs
3) Both 1 and 2

177. Spooling is most beneficial in a multiprogramming environment where


1) most jobs are I/O-bound
2) most jobs are CPU-bound
3) jobs are evenly divided as I/O-bound and CPU-bound
4) there is limited primary memory and there is a need for secondary memory
5) None of these

IT Quesetions

11

BSC Academy
178. A flip-flop can store
1) Two bits of data
4) Any number of bits of data

3) Three bits of data

em
y

2) One bit of data


5) All the above

179. ________ command lists directory content of files and directories.


1) cat
2) cp
3) ls

4) mkdir

5) None of these

180. Which of the following is true about the data warehouse environment architecture?
1) It contains a data warehouse methodology, analysis design, construction and administration.
2) It increases processing power and sophistication of analytical tools and techniques that have resulted in the
development of data warehouses.
3) It provides storage, functionality, and responsiveness to queries beyond the capabilities of transaction-oriented
databases.
4) All the above
5) None of these
181. Altering of data so that it is not usable unless the changes are undone is called
1) Encryption
2) Compression
3) Biometrics
4) Ergonomics

5) None of these

ad

182. A ________ main purpose is to prohibit unauthorised access to your computer via the Internet.
1) popup blockers
2) firewalls
3) spyware blockers
4) spam assassins
5) None of these

183. When one computer provides services to another computer, the environment is a(n) ________ infrastructure.
1) client/server
2) dependent
3) independent
4) reliant
5) None of these

Ac

184. Object oriented programming relies on three basic concepts. These are
1) data abstraction, inheritance and array
2) data abstraction, inheritance and polymorphism
3) encapsulation, inheritance and polymorphism
4) inheritance, I/O, class
5) None of these
185. A ________ can check the MAC addresses contained in the frame.
1) bridge
2) repeater
3) passive hub

4) router

5) All the above

186. Each station on an Ethernet network has a unique ________ address imprinted on its network interface card (NIC).
1) 5-byte
2) 32-bit
3) 64-bit
4) 48-bit
5) None of these
187. Decryption and encryption of data are the responsibilities of the ________ layer.
1) Physical
2) Data link
3) Presentation
4) Session

5) Application

188. The communication mode that supports data in both the directions at the same time is called
1) Half duplex
2) Simplex
3) Full duplex
4) Multiplex

5) None of these

189. The functions AVG, COUNT, MAX and MIN are


1) supported only by SQL
2) supported only by QBE
4) supported by ORACLE
5) supported by none

3) supported by both SQL and QBE

5) None of these

191. A full binary tree with n leaves contains


1) 2n nodes
2) log2n nodes

5) None of these

BS

190. Multivalued dependency among attributes is checked at which level?


1) 2NF
2) 3NF
3) 4NF
4) 5NF
3) 2n 1 nodes

192. The postfix form of an expression (A+B)*(C*D-E)*F/G is


1) AB+CD*E-FG/**
2) AB+CD*E-F**G/
4) AB+CDE*-*F*G/
5) None of these
193. Slotted ALOHA
1) Divides time into discrete intervals
3) Is used for data transfer
5) None of these

4) n nodes

3) AB+CD*E-*F*G/

2) Requires global time synchronisation


4) All the above

12

IT Quesetions

BSC Academy
194. What type of technology allows you to use your finger, eye, or voice print to secure your information resources?
1) RFID
2) Caves
3) Biometrics
4) Haptics
5) None of these

em
y

195. A ________ can be used as a connecting device between two internetworks that use different models.
1) repeater
2) router
3) bridge
4) gateway
5) hub
196. IP address has been classified into five classes A, B, C, D and E.
1) 0.0.0.0 to 126.255.255.255
2) 128.1.0.1 to 191.255.255.255
4) 192.0.1.1 to 223.255.255.255
5) None of these

What is address range of class B?


3) 244.0.0.0 to 239.255.255.255

197. Relation in the relational database model is defined as the set of ________ that have the same attributes.
1) objects
2) relations
3) tuples
4) attributes
5) None of these

198. Ifalphaisasetofattributesandbetaisasubsetofalpha,thenalphaholdsbeta.InArmstrongsAxioms,thisisknown
as
1) augmentation rule 2) reflexivity rule
3) transitivity rule
4) passivity rule
5) None of these
199. In an E-R diagram, total participation is represented by
1) circle
2) single line
3) double lines

4) concentric circles

ad

200. If a key attribute of a relation is referred in another relation, it is called


1) domain key
2) referential key
3) relation key
4) foreign key

5) None of these
5) None of these

Answers
5. 3

106. 3
107. 1
108. 1
109. 1
110. 5; Session Layer
111. 4
112. 2
113. 3
114. 1
116. 4
117. 2
118. 1
119. 1
121. 2
122. 3
123. 1
124. 5
126. 4
127. 2
128. 2
129. 4
131. 1
132. 4
133. 3
134. 2
136. 1
137. 4
138. 1
139. 1
141. 4
142. 4; Routing Information protocol
143. 3
144. 1
145. 2
146. 5
147. 4
148. 3
149. 1
151. 3
152. 4
153. 1
154. 4
156. 2
157. 3
158. 2
159. 3
161. 1
162. 3
163. 4
164. 4
166. 1
167. 1
168. 3
169. 3
171. 1
172. 3
173. 1
174. 2
176. 2
177. 3
178. 2
179. 3
181. 1
182. 2
183. 1
184. 3
186. 4
187. 3
188. 3
189. 3
191. 3
192. 4
193. 4
194. 3
196. 2
197. 3
198. 2
199. 3

BS

Ac

1. 4
2. 2
3. 4
4. 1
6. 4
7. 3; Address Resolution Protocol
8. 4
9. 4
10. 3
11. 3
12. 4
13. 4
14. 3
16. 3
17. 4
18. 4
19. 3
21. 4
22. 2
23. 2
24. 2
26. 2
27. 1
28. 1
29. 4
31. 2
32. 3
33. 2
34. 1
36. 1
37. 4
38. 2
39. 4
41. 1
42. 2
43. 5
44. 1
46. 1
47. 3
48. 2
49. 3
51. 2
52. 2
53. 3
54. 3
56. 2
57. 5
58. 1
59. 1
61. 1
62. 2
63. 2
64. 2
66. 3
67. 1
68. 3
69. 3
71. 2
72. 3
73. 1
74. 1
76. 3
77. 1
78. 4
79. 2
81. 4
82. 2
83. 1
84. 2
86. 3
87. 1
88. 5
89. 2
91. 3
92. 2
93. 1
94. 2
96. 2
97. 1
98. 3
99. 3
101. 1
102. 2
103. 4
104. 1

15. 2
20. 4
25. 4
30. 1
35. 3
40. 2
45. 3
50. 2
55. 3
60. 2
65. 3
70. 3
75. 3
80. 1
85. 4
90. 3
95. 1
100. 2
105. 3

IT Quesetions

13

115. 4
120. 1
125. 3
130. 2
135. 2
140. 3

150. 4
155. 2
160. 5
165. 2
170. 4
175. 3
180. 4
185. 1
190. 2
195. 4
200. 4

Вам также может понравиться