Академический Документы
Профессиональный Документы
Культура Документы
Q.5. Which layer of OSI determines the interface of the system with the user? A. Network D. Session Q.6. Aggregation is a special form of A. Generalization D. Object B. Specialization E. None of these C. Association B. Application E. None of these C. Data link
Q.7. Which of the following is a universal gate? A. AND D. NAND B. OR E. None of these C. EXOR
Q.8. A collection of fields is called a record with respect of DBMS, a record corresponds to A. Tuple D. Attribute Q.9. Multiplexer means B. Relation E. None of these. C. File 1
Q.10. Each node in a linked list must contain at least: A. Three fields D. One fields Q.11. OSI model consists of ____ layers A. Three D. Eight B. Five E. Seven C. Six B. Five fields E. Two fields C. Four fields
Q.12. Encryption and decryption are functions of the ____ layer. A. Transport D. Physical B. Session E. Presentation C. Application
Q.13. Which of the following is not a connecting device? A. Bridge D. Repeater Q.14. OLAP stands for A. Online Analytical project C. Online Application process E. Online Analytical processing Q.15. The term push and pop is related to the A. Array D. All of the above Q.16. Pointer is used in A. Direct Addressing (address filed contain address of operand) B. Indirect Addressing (address filed contain address of memory filed where operand is present) C. Indexed mode (EA is generated by adding an index) D. Immediate Addressing (address filed contain operand) E. None of these 2 B. Lists E. None of these C. Stacks B. Online Analytical problem D. Online Application Problem B. Trans receiver E. None of these C. Router
Q.21. Which normal form is considered adequate for relational database design? A. 2 NF D. BCNF B. 3 NF E. None of these C. 4 NF
Q.22. Which of the following SQL commands can be used modify existing data in a database table? A. MODIFY D. NEW B. UPDATE E. None of these C. CHANGE
Q.23. A special type gateway that can keep external users from accessing resources on the LAN users access the external info is called: A. Repeater D. Hub B. Firewall E. None of these C. Encryption 3
Q.24. Which command(s) is (are) used to redefine a column of the table in SQL? A. ALTER TABLE B. DEFINE TABLE C. MODIFY TABLE Engistan.com | Engineers Community
Q.25. The order of the binary search algorithm is A. n D. log(n) B. n2 E. None of these C. nlog(n)
Q.26. The break statement causes an exit. A. From the innermost loop only C. From the loops and switches E. None of these Q.27. Backup procedure helps in A. Restoring the operation whenever there is a disk failure B. Restoring both application and system software whenever there is disk corruption C. Restoring the data sites whenever there is a system crash D. All of the above E. None of these Q.28. In SQL, which of the following is not a data definition language command? A. RENAME D. UPDATE B. REVOKE E. None of these C. GRANT B. Only from the innermost switch D. From the innermost loop or switch
Q.29. In a relational schema, each tuple is divided into fields called A. Relations D. All of these Q.30. Data security threats include A. Hardware failure C. Fraudulent manipulation of data E. None of these Q.31. The language used in application programs to request data from the DBMS is referred to as the A. DML D. DCL B. DDL E. None of these Engistan.com | Engineers Community C. Query language B. Privacy invasion D. All of these B. Domains E. None of these C. Queries
Q.33. A heap allows a very efficient implementation of a A. Doubled ended queue D. Trees B. Priority queue E. None of these C. Stack
Q.34. Which of the following microprocessors is not 8bit microprocessor? A. 8085 D. 68000 B. 6502 E. None of these C. Z80
Q.35. The modify operation is likely to be done after A. Delete D. All of the above B. Insert E. None of these C. Look up
Q.36. Which two files are used during operation of the DMBS? A. Query language and utilities B. Data manipulation language and query language: C. Data dictionary and transaction log D. Data dictionary and query language E. None of these Q.37. Which of the following is useful in implementing quick sort? A. Stack D. Queue B. Set E. None of these C. List
Q.38. The drawbacks of the binary tree sort are remedied by the A. Linear sort D. Insertion Sort B. Quick Sort E. None of these C. Heap Sort
Q.39. A top to bottom relationship among the items in a database is established by a A. Hierarchical Schema C. Relational Schema B. Network Schema D. All of the above 5
Q.41. One approach to standardizing storing of data A. MIS C. CODASYL specifications E. None of the above Q.42. What software packages are commonly used for businesses that have to track extensive lists of clients and inventory? A. Special purpose packages B. Custom made programs B. Structured programming D. All of the above
C. Single function application packages D. Data management packages E. None of the above Q.43. In a _____ a parent record type can be linked to one or more "child" record types, but a child record type can have only one parent. A. Network database C. Distributed database E. None of the above Q.44. A network schema A. restricts the structure to a one-to-many relationship B. permits many-to-many relationships C. stores data in tables D. All of the above E. None of the above Q.45. A scheme describes A. data elements B. records and files 6 B. Relational database D. Hierarchical database
C. record relationships
Q.50. In SQL, the _____ command is used to recompile a view A. COMPILE VIEW D. ALTER VIEW Q.51. A list in alphabetical order A. is in descending order Engistan.com | Engineers Community B. DEFINE VIEW E. None of these C. CREATE VIEW 7
Q.59. Which is the general network standard for the data link layer in the OSI Reference Model? A. IEEE 802.1 D. IEEE 802.4 B. IEEE 802.2 E. IEEE 802.6 C. IEEE 802.3
Q.60. _________ uses a standard called IEEE 802.6. A. LAN D. Internet B. WAN E. None of these C. MAN
Q.61. Repeater operates in which layer of OSI model? A. Application Layer D. Transport Layer B. Presentation Layer E. Data link layer C. Physical Layer 9
Q.62. Where does Bridge operate in OSI model? A. Physical layer B. Data link layer C. Both 1 and 2 Engistan.com | Engineers Community
Q.63. Which of the following uses the greatest number of layers in the OSI model? A. Bridge D. Gateway B. Repeater E. None of these C. Router
Q.64. Routers operate in which layer of the OSI model? A. Physical layer D. All of these B. Data link layer E. None of these C. Network layer
Q.65. Modem is a _______ that modulates and demodulate signals. A. DCE (Data circuit terminating equipment) B. DTE(Data terminal equipment) C. DTE-DCE D. Both 1 and 2 E. None of these Q.66. A communication network which is used by large organization over regional, national or global area is called_______ A. LAN D. Internet B. WAN E. None of these C. MAN
Q.67. At _______ layer, TCP/IP defines two protocols: Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) A. Transport layer D. Application layer B. Network layer E. None of these C. Physical layer
Q.68. End to end connectivity is provided from host to host in: A. Network layer D. Transport layer B. Session layer E. None of these C. Data link layer
Q.69. Which of the following TCP/IP protocol is used for transferring electronic mail messages from one machine to another? A. SNMP D. FTP B. SMTP E. None of these C. RPC 10
Q.70. Which of the following is an example of a client server model? Engistan.com | Engineers Community
Q.71. Which IEEE standards is used for Wi/Fi system? A. 802.11 D. 802.3 B. 802.1 E. 802.10 C. 802.2
Q.72. __________ is the continuous ability to send and receive data between interconnected networks A. FTP D. Network Interoperability B. SMTP E. None of these C. TNS
Q.73. What is the default subnet mask for a class B network? A. 127.0.0.1 D. 255.255.255.0 B. 255.0.0.0 E. None of these C. 255.255.0.0
Q.74. Which of the following is not a relational database? A. dBASE IV D. Reflex B. 4th Dimension E. None of the above C. FoxPro
Q.75. Which command is used to remove a table from the database in SQL? A. DELETE TABLE D. UNATTACH TABLE Q.76. A file produced by a spreadsheet A. is generally stored on disk in an ASCII text format B. can be used as it by the DBMS C. can be used for graphic D. All of the above E. None of the above Q.77. A form defines A. where data is placed on the screen B. the width of each field C. both (a) and (b) Engistan.com | Engineers Community 11 B. DROP TABLE E. None of the above C. ERASE TABLE
Q.79. A central computer surrounded by one or more satellite computers is called a A. Bus network D. All the above B. Ring network E. None of these C. Star network
Q.80. With an IP address of 100, you currently have 80 subnets. What subnet mask should you use to maximize the number of available hosts? A. 192 D. 224 B. 240 E. 252 C. 248
Q.81. Print server uses _______ which is a buffer that holds before it is send to the printer. A. Queue D. Stack B. Spool E. None of these C. Node
Q.82. In SQL, GRANT command is used to A. allow user to access databases B. allow user to create databases C. grant system privileges, roles, and object privileges to uses and roles D. choose auditing for specific SQL commands E. None of the above Q.83. Which of the following identifies specific web page and its computer on the web page? A. Website D. Domain Name B. URL E. None of these C. Web site address
Q.84. __________ is the computer to computer exchange of routine business data between trading partners in standard data formats. A. CTS D. EDI B. DSR E. None of these Engistan.com | Engineers Community C. VDR
12
Q.86. Communication handler is basically an _______ 16 bit micro controller? A. 8085 D. 80C186 B. 8086 E. None of these C. 8086A
Q.87. The logical data structure with a one-to-many relationship is a: A. network D. relational Q.88. Updating a database means A. revising the file structure B. reorganizing the database C. modifying or adding record occurrences D. All of the above E. None of the above Q.89. Which uses a pre-shared key that is more than 7 and less than 64 characters in length? A. WPA-PSK D. All the above B. TKIP E. None of these C. AES B. tree E. None of the above C. chain
Q.90. When you have finished entering information into a form A. the template is written to the data file B. the contents of the form are written to the data file C. the contents of the form can be printed D. All of the above E. None of the above Q.91. A list consists of last names, first names, addresses, and pin codes if all people in the list have the same last and the same pin code, a useful key would be A. the pin code B. the last name Engistan.com | Engineers Community
13
Q.94. Most important advantages of an IC is its __________ A. Easy replacement in case of circuit failure B. Low power consumption C. Extremely high reliability D. Reduced cost E. None of these Q.95. An IC contains 50 gates each of which consists of 6 components/ Its belong to A. VLSI D. SSI B. LSI E. None of these C. MSI
Q.96. Which type of computers use the 8 bit code called EBCDIC? A. Mini computers D. Micro computer Q.97. An AND gate A. Implement logic addition B. Is equivalent to a series switching circuit C. Is any-or all gate D. Is equivalent to a parallel switching circuit 14 B. Mainframe computers E. None of these C. Super computers
Q.100. Which are not used in case of applet? A. Read/write D. All the above B. Internet E. None of these C. Search engine
Q.101. After you _____ a record, many data management the environments require you to issue a command to save the changes you made. A. Delete D. Index B. Update E. None of the above C. Sort key
Q.102. Data item characteristics that are important in data management include A. punctuation D. width Q.103. A locked file can be A. accessed by only one user B. modified by users with the correct password C. is used to hide sensitive information D. both (b) and (c) E. None of the above Q.104. In SQL, which command is used to make permanent changes made by statements issue since the beginning of a transaction? Engistan.com | Engineers Community 15 B. language E. None of the above C. spelling
Q.105. If the _______ bit in X.25 standard is to 1. It means that there is more than one packet. A. Q D. J B. D E. None of these C. M
Q.106. Dos and windows 3.x support file names upto______charecters in length A. Two D. Eight B. Four E. None of these C. Six
Q.107. What is the name given to the exchange of control signals which is necessary for establishing a connection between a modem and a computer at one end of a line and another modem and computer at the other end? A. Handshaking D. All of these B. Modem options E. None of these C. Protocol
Q.108. A ___ contains the smallest unit of meaningful data, so you might call it the basic building block for a data file. A. File structures D. Database B. Records E. None of these C. Fields
Q.109. A ___ means that one record in a particular record type is related to only one record of another record type. A. One to one relationship C. Many to one relationship E. None of these Q.110. In files, there is a key associated with each record which is used to differentiate among different records. For every file there is at least one set of keys that is unique. Such a Key is called A. Unique key D. Primary Key B. Prime attribute E. Null key C. Index key B. One to many relationship D. Many to many relationship
Q.111. ____ is primarily used for mapping host names and email destinations to IP address but can also be used for other purposes. A. TCP(Transfer control protocol) C. SHA (Secure Hash Algorithm) B. DNS(Domain Name System) D. Simple Network Management Protocol (SNMP) Engistan.com | Engineers Community
16
Q.116. An important application of cryptography, used in computerized commercial and financial transaction A. Data mining C. Digital signature E. None of these Q.117. An indexing operation A. Sorts a file using a single key C. Establishes an index for a file E. None of these Engistan.com | Engineers Community B. Sorts file using two keys D. Both (1) and (3) 17 B. Data warehousing D. Media convergence
Q.120. Which of the following system program forgoes the production of object code to generate absolute machine code and load it into the physical main storage location from which it will be executed immediately upon completion of the assembly? A. Two pass assembler C. Macro processor E. None of these Q.121. From what location are the 1st computer instructions available on boot up? A. ROM BIOS D. CONFIG.SYS Q.122. Abstraction is A. The act of representing the essential features of something without including much detail. B. The act of representing the features of something much detail C. A tree structure D. All of these E. None of these Q.123. Consider an operation of addition. For two numbers, the operating will generate a sum. If the operand are strings, and the same operation would produce a third string by concatenation. This feature is called ____. A. Inheritance D. Binding B. Encapsulation E. None of these C. Polymorphism 18 B. CPU E. None of these C. Boot.ini B. Load and go assembler D. Compiler
Q.124. In ER diagrams, the term cardinality is a synonym for the term Engistan.com | Engineers Community
Q.125. Which of the following is not a context free grammar components? A. Terminal symbols D. List B. Nonterminal symbol E. None of these C. Production line
Q.126. Which of the following is a phase of RAD model? A. Business modelling C. Application generation E. None of these Q.127. A combinational logic circuit which is used to send data coming from a single source to two or more separate destinations is called as A. Decoder D. Demultiplexer B. Encoder E. None of these C. Multiplexer B. Data modelling D. All of the above
Q.128. ____ is a set design steps that allows a DFD with transform flow characteristics to be mapped into a predefined template for program structure. A. Transaction flow C. Transform mapping E. None of these Q.129. The twos compliment of binary number 010111.1100 is A. 101001.1100 D. 101000.0011 B. 101000.0100 E. None of these C. 010111.0011 B. Contributor D. Design evaluation
Q.130. In 8086 the overflow flag is set when A. The sum is more than 16 bits B. Signed numbers go out their range after an arithmetic operation C. Carry and sign flags are set D. During subtraction E. None of these Q.131. What does microprocessor speed depends on? Engistan.com | Engineers Community 19
Q.135. Repeaters function in the ___ layer A. Physical D. Both (1) and (2) B. Data link E. None of these C. Network
Q.136. Which of the following types of software should we use if we often need to create, edit and print documents? A. Word processing D. UNIX B. Spread sheet E. None of these C. Object program
Q.137. In Queues, the items deleted at one end is called. A. Rear D. Base B. Front E. None of these C. Top 20
Q.138. What will be the output of a in following code? Engistan.com | Engineers Community
Q.139. Which of the following is not a property of transactions? A. Atomicity D. Durability B. Concurrency E. None of these C. Isolation
Q.140. The clause in SQL that specifies that the query result should be sorted in ascending or descending order based on the values of one or more columns is A. View D. Having B. Order by E. None of these C. Group by
Q.141. What is a disjoint less constraint? A. It requires that an entity belongs to no more than one level entity set. B. The same entity may belong to more than one level. C. The database must contain an unmatched foreign key value. D. An entity can be joined with another entity in the same level entity set. E. None of these Q.142. According to the levels of abstraction, the schema at the intermediate level is called A. Logical schema D. Super schema. B. Physical schema. E. Conceptual Schema C. Subschema. 21
Q.144. When an E-R diagram is mapped to tables, the representation is redundant for A. weak entity sets C. strong entity sets E. None of these Q.145. In SQL the word natural can be used with A. inner join D. all of the above B. full outer join E. None of these C. right outer join B. weak relationship sets D. strong relationship sets
Q.146. DROP is a ______________ statement in SQL. A. Query D. DCL Q.147. Relational Algebra is A. Data Definition Language . C. Procedural query Language B. Meta Language D. None of the above B. Embedded SQL E. None of these C. DDL
Q.148. Which of the following concurrency control schemes is not based on the serializability property? A. Two phase locking C. Time-stamp based locking B. Graph-based locking D. None of these
Q.149. If an entity can belong to only one lower level entity then the constraint is A. disjoint D. single B. partial E. None of these C. overlapping
Q.150. The normal form that is not necessarily dependency preserving is A. 2NF D. 4NF B. 3NF E. None of these 22 C. BCNF