Академический Документы
Профессиональный Документы
Культура Документы
1)DBMS
2)ORACLE
3)COMPUTER NETWORKS
4)DATA STRUCTURE
5)SOFTWARE ENGINEERING
6)C/C++
7)OPERATING SYSTEM
8)WEB TECHNOLOGY
9)COMPUTER FUNDAMENTAL
10)MIXED QUESTIONS
studyregular.blogspot.in
Study Regular IT Officer Question Bank Ebook
DBMS SET-1
1. Rows of a relation are called ______________
(A) Entity
(B) Degree
(C) tuples
(D) None of the above
13. Dr. E.F Codd represented…… rules that a database must obey if
it has to be considered truly relational.
(A) 10
(B) 15
(C) 14
(D) 12
17. ……is a bottom –up approach in which two lower level entities
combine to form a higher level entity.
(A) Aggregation
(B) Specialization
(C) Generalization
(D) None of the above
18. An entity set that does not have sufficient attributes to form a
primary key, is a …..
(A) Primary entity set
(B) Weak Entity set
(C)Strong Entity set
(D) None of the above
23. Which of the following constraint is used to limit the value range
that can be placed in a column?
(A) Check
(B) Default
(C) Unique
(D) None of the above
50. For which two constraints are indexes created when the constraint is
added?
(A) Primary key
(B) Unique
(C) Not null
(D) Both (A) & (B)
55. The users who use easy to use menu are called
(A) Sophisticated end users
(B) Naïve users
(C) Stand-alone-users
(D) Casual end users
57. What is the type of Oracle backup in which all uncommitted changes
have been removed from the Data files?
(A) Full backup
(B) Consistent backup
(C) Inconsistent backup
(D) Differential backup
61. The language which has recently become the de-facto standard for
interfacing application programs with relational database system is
(A) Oracle.
(B) SQL.
(C) Dbase.
(D) None
69. Which of the following field type is the best to store serial numbers?
(A) Number
(B) Auto Number
(C) Text
(D) Memo
DBMS SET-2
1. _____ is the process of using graph theory to analyse he node and connection
structure of a Web site.
(A)Web structure mining
(B)Web content mining
(C)Web usage mining
(D)None of the above
5.The process of grouping a set of objects into classes of similar objects is called
_________
(A)Clustering
(B)Classification
(C) Association
(D) All of the above
6. Which parameter is used to discover patterns in data can lead to reasonable predictio
about the future?
(A)Clustering
(B)Classification
(C)Association
(D) Forecasting
8.Which of the following is the process for detecting and correcting the wrong data?
(A)Data Selection
(B)Data Cleaning
(C)Data Integration
(D)None of the Above
9. An important purpose of the shared pool is to cache the executive version of _______
statements.
(A)SQL
(B)PL/SQL
Copyright By Study Regular studyregular.blogspot.in Page 17
Study Regular IT Officer Question Bank Ebook
(C)Both (A) and (B)
(D)None of the above
11.Which of the following is the process of combining data from different resources?
(A)Data Selection
(B)Data Cleaning
(C)Data Integration
(D)None of the Above
14.Oracle Database segregates a small amount of the shared pool for large objects(over
5kb).The segregated area of the shared pool is called _______
(A)Fixed Pool
(B)Reserved Pool
(C)Allocated Pool
(D)None of the Above
15.When a query is submitted to oracle server for execution, oracle checks if same quer
has been executed previously. If found the same then this event is known as _______
(A)Library cache hit
(B)Soft parsing
(C)Both (A) and (B)
Copyright By Study Regular studyregular.blogspot.in Page 18
Study Regular IT Officer Question Bank Ebook
(D)None of the above
17.If the parsed form of the statement is not found in the shared pool hen new statement
is parsed and its parsed version is stored is Shared SQL area.This is known as ________
(A)Library cache hit
(B)Soft parsing
(C)Hard parsing
(D)None of the above
18.Reuse of shared SQL for multiple users running the same applications avoids
________
(A)Library cache hit
(B)Soft parsing
(C)Hard parsing
(D)None of the above
20.The shared pool is also able to support _________ in data warehousing applications.
(A)Shared SQL
(B)Stored SQL
(C)Unsorted SQL
(D)Unshared SQL
25.__________ is a tool for entering and running ad-hoc based database statements.
(A)mySQL
(B)PL/SQL
(C)SQL*PLUS
(D)None of the above
28.__________ is a tool for entering and running ad-hoc based database statements.
(A)mySQL
(B)PL/SQL
(C)SQL*PLUS
(D)None of the above
29. The __________ performs process recovery when a user process fails.
(A)Log Writer(LGWR)
(B)Checkpoint(CKPT)
(C)System Monitor(SMON)
(D)Process Monitor(PMON)
30.What type of failure occurs when Oracle fails due to an operating system or compute
hardware failure?
(A)Application Failure
(B)Instance Failure
(C)Media Failure
(D)Roll back Failure
32. Which Oracle backup and recovery file contains user and system data?
(A)Control file
(B)Data File
(C)Offline Redo file
(D)None of the above
33.When is the System Global Area (SGA) created in Oracle database environment?
(A)When the database is created
(B)When a user process is started
(C)When the database is mounted
(D)When the instance is started
35.Which password management feature ensure a user cannot reuse a password for a
specified time interval?
(A)Account Locking
(B)Password History
(C)Password verification
(D)None of the above
36.What is the type of Oracle backup is which all uncommitted changes have been
removed from the data files?
(A)Full backup
(B)Consistent backup
(C)Inconsistent backup
(D)Differential backup
43.Which of the following data type holds a string with maximum length of 255
characters?
(A)Text
(B)Medium Text
(C)Long Text
(D)Tiny Text
51.Which of the following datatype holds a string with maximum length of 255
characters?
(A)Text
(B)Medium Text
(C) Long Text
(D)Tiny Text
53. Which of the following clauses is an additional filter that is applied to the result?
(A)Having
(B)Group-by
(C)Select
(D)Order by
57. An operator is basically a join followed by a project on the attributes of first relation
is know as ______________________
(A) Join
(B) Inner Join
(C)Full join
(D)Semi-join
Copyright By Study Regular studyregular.blogspot.in Page 25
Study Regular IT Officer Question Bank Ebook
58.Which of the following is a special type of integrity constraint that relates two
relations and maintains consistency across the relations?
(A)Entity Integrity Constraints
(B)Referential Integrity Constraints
(C)Domain Integrity Constraints
(D)None of the above
59. The candidate key is that you choose to identify each row uniquely is
called___________
(A)Primary Key
(B)Foreign key
(C)Alternate key
(D)One of the above
60. Which of the following is preferred method for enforcing data integrity?
(A)Cursors
(B)Constraints
(C)Triggers
(D)None of the above
61.Which allows to make copies of the database periodically to help in the cases of
crashes and disasters?
(A)Recovery utility
(B)Data loading utility
(C)Monitoring utility
(D)Backup utility
62. Each modification done in database transaction are first recorder into
the____________
(A)Hard Driver
(B)Disk
(C)Log file
(D)Data Mart
68. In SQL, which of the following wildcard character is used as a substitute for
Zero or more characters?
(A) *
(B) _
(C) ^
(D) %
71. Which allows to make copies of the database periodically to help in the cases
Of crashes and disasters?
(A)Recovery Utility
(B)Data loading utility
(C)Monitoring utility
(D)Backup utility
72. which of the following is standard interactive and programming language for getting
information from and updating a database .
(A) SQL
(B) PHP
( C) ASP
(D)None of the above
74. _____________ is suitable for data warehouses that have a large number of similar
data times.
(A) Relational database Management system (RDBMS)
(B) Columnar Database Management system (CDBMS
(C) In –Memory database Management System (IMDBMS)
(D). None of the above
79.Which method of online Analytical Processing stores data in both a relational and a
multi dimensional database.
(A) Hybrid OLAP
(B) Relation OLAP
(C) OLAP
(D)None of the above
85.Which of the following DBMS provides faster response time and better performance
(A) Relational Database Management System(RDBMS)
(B) No SQL DBMS
(C) In-Memory Database Management System(IMBDMS)
(D) None of the above
86.In SQL the spaces at the end of the string are removed by___________function ?
(A) Lower
(B) string
(C) Trim
(D)None the above
89. Which of the following operator used for appending two strings?
(A) %
(B) &
(C) +
(D) II
90. A unit of storage that can store one or more records in a hash file organization is
denoted as_____________?
(A) Bucket
(b) Disk pages
(C) Blocks
(D) Nodes.
ORACLE
1. LGWR process writes information into
a. Database files
b. Control files
c. Redolog files
d All the above.
16. What is the difference between a LIST BOX and a COMBO BOX ?
a. In the list box, the user is restricted to selecting a value from a list but combo
box the user can type in value which is not in the list
b. A list box is a data entry area while a combo box can be used only for control
purposes
c. In a combo box, the user is restricted to selecting a value from a list but in a
list box the
user can type in a value which is not in the list
d. None of the above
18. Which of the following is not an reason for the fact that most of the processing
is done at the server ?
a. To reduce network traffic.
b. For application sharing
c. To implement business rules centrally,
d. None of the above
22. The system variable that records the select statement that SQL * FORMS most
recently used to populate a block is
a. SYSTEM.LAST_RECORD
b.SYSTEM.CURSOR_RECORD
c. SYSTEM.CURSOR_FIELD
d. SYSTEM.LAST_QUERY
24. The packaged procedure that makes data in form permanent in the Database is
a. Post
b. Post form
c. Commit form
d. None of the above
29. Which of the following is TRUE for the SYSTEM VARIABLE $$date$$
a. Can be assigned to a global variable
b. Can be assigned to any field only during design time
c. Can be assigned to any variable or field during run time
Copyright By Study Regular studyregular.blogspot.in Page 36
Study Regular IT Officer Question Bank Ebook
d. None of the above
38. Name the two files that are created when you generate a form using Forms 3.0
a. FMB & FMX
b. FMR & FDX
c. INP & FRM
d. None of the above
40. All datafiles related to a Tablespace are removed when the Tablespace is
dropped
a. TRUE
b. FALSE
41. Can an Integrity Constraint be enforced on a table if some existing table data
does not satisfy the constraint
a. Yes
b. No
45. A database trigger doesnot apply to data loaded before the definition of the
trigger
a.TRUE
b. FALSE
47. Declare
fvar number := null;
svar number := 5;
Begin
goto <<>>
fvar is null then
<<>>
svar:=svar+ 5;
end if;
End;
52. Which of the following does not affect the size of the SGA
a. Database buffer
b. Redolog buffer
c. Stored procedure
d. Shared pool
a In compiled form
b. As source code
c. Both A & B
d. Not store
62. Which of the following is not correct about the |TABLE| datatype ?
a. Can contain any no of columns
b. Simulates a One-dimensional array of unlimited size
c. Column datatype of any Scalar type
d. None of the above
67. Declare
a number := 5; b number := null; c number := 10;
Begin
if a > b AND a ( Select count(*) from Emp E2 where E1.SAL > E2.SAL ) will
retrieve
a. 3500,5000,2500
b. 5000,2850
c. 2850,5750
d. 5000,5750
68. Is it possible to modify a Data type of a column when column contains data ?
a. Yes
b. No
82. What type of file is used for porting Forms 4.5 applications to various platforms
?
a . FMB file
b . FMX file
c . FMT file
d . EXE file
89. When a form is invoked with CALL_FORM does Oracle forms issues
SAVEPOINT ?
a.Yes
b. No
90. Can we attach the same LOV to different fields in Design time ?
a. Yes
b. No
94. How do you pass values from one form to another form ?
a. LOV
b. Parameters
c. Local variables
d. None of the above
101. If the maximum records retrieved property of a query is set to 10, then a
summary value will be calculated
a. Only for 10 records
b. For all the records retrieved
c. For all the records in the referenced table
d. None of the above
104. What are the different file extensions that are created by Oracle Reports?
a).RDF file & .RPX file
b).RDX file & .RDF file
c).REP file & .RDF file
d)None of the above
COMPUTER NETWORKS
1. A protocol that provides configuration information from a table is called…..
A. BGP
B. BOOTP
C. FTP
D. None of the above
6. In PPP, A three- way handshaking protocol used for authentication is known as…...
A. CHAP
B. BOOTP
C. FTP
D. None of the above
8. You are in the process of analyzing a problem that requires you to collect and store
TCP/ IP Packets.Which of the following utilities is best suited for this purpose?
A. Performance Moniter
B. Network Moniter
C. NETSTAT
D. NBTSTAT
9. A protocol in which the sender sends one frame and stops until it receives confirmat
from the receiver?
A. Stop and Wait ARQ
B. Store and forward switch
C. Stop and Wait protocol
D. None of the above
10. An addressing method in which the IP address space is not divided into classes?
A. Classful addressing
B. Classless addressing
C. Classless IDR
D.None of the above
11. The number of differences between the corresponding bits in a two data words is
known as…….distance
A. Hanning
B. Hamming
C. Huffman
D. None of the above
15. The loss of signal‘s energy due to the resistance of medium is called………
A. Fragmentation
B. Attenuation
C. Synchronization
D. None of the above
16. The splitting of a message into multiple packets at transport layer is known
as__________
A. Fragmentation
B. Segmentation
C. Synchronization
D. None of the above
17.An array of switches that are used to reduce the number of cross points is called……
A. Single stage switch
B. Dual stage switch
C.Multistage switch
D.None of the above
18. An application protocol of TCP/IP that allows remote login is known as……….
A. NCP
B. NVT
C. NAV
D. None of the above
24. What is the main function of transport layer in the OSI model?
A. Peer to peer message delivery
B. Node to node message delivery
C. Process to process message delivery
D. None of the above
26. In OSI model, as the data packet moves from the upper to the lower layers, headers
are _____
A. Added
B. Removed
C. Deleted
D. Edited
30. IEEE 802.3 standard used what method as the media access method?
A. CSMA/CD
B. CSMA/CA
C. CDMA
D. FDMA
35. What is the minimum & maximum frame length for 10 Mbps Ethernet?
A. 32 bytes,64 bytes
B. 64 bytes,128 bytes
C. 64 bytes,1518 bytes
D. 32 bytes, 1518 bytes
38. Which of the following is a security protocol designed to provide a wireless LAN
with better security and privacy?
A. WEP
B. SNMP
C. WAP
D. LDAP
39. Which of the following is a timer used for Collision Avoidance (CA)?
A. PCF
B. MAC
C. NAV
D. None of the above
40. Which of the following refers to a groups of standards that are still being developed
as a part of overall IEEE 802.11 WLAN support?
A. 802.11
B. 802.11x
C. Both (A) & (B)
D. None of the above
41. Ethernet, token ring and token bus are types of……..
A. MAN
B. WAN
C. LAN
D. None
42. What is the name of network topology in which there are bidirectional links betwee
each possible node?
A. Star
B. Mesh
C. Ring
D. None
44. Which TCP/IP protocol is used for file transfer with minimal capability and minim
overhead?
A. SGMP
B. TFTP
C. SUMP
D. None
54. A device which devices the incoming signal into low frequencies to sec to voice
device, and high frequencies for data to the computer.
A. Multicast router
B. Interface
C. Splitter
D. None
56. Which layer establishes, maintains & Synchronizes the interaction between
communicating devices?
A. Physical
B. Datalink
C. Application
D. Session
62. At which layer TCP/IP defines two protocols: Transmission control Protocol(TCP)
and Use Datagram Protocol(UDP)?
A. Transport layer
B. Application layer
C. Network layer
D. Datalink layer
63. Which of the following uses the greatest number of layers in the OSI model?
A. Bridge
B. Repeater
C. Router
D. Gateway
70. Which protocol working at the Transport layer provides a connectionless service
between hosts?
A. UDP
B. ARP
C. TCP/IP
D. None
71. With respect to a network interface card, the term 10/100 refers to
A. Protocol Speed
B. A fiber speed
C. Megabits per second
D. None
72. If you Want to locate the hardware address of a local device, which protocol
Would you use
A. UDP
B. ARP
C. NCP
D. None
74. Which of the following TCP/IP protocol is used for transferring electronic mail
messages from one machine to another?
A. TCP
B. SMTP
C. NCP
D. None
75. ________is the continuous abilty to send and receive data between interconnected
networks.
A. FTP
B. SMTP
C. TNS
D. Network interoperability
76. ______ is primarily used for mapping host names and email destinations to IP
address
A. TCP
B. DNS
C. NCP
D. None
86. Which OSI layer divides a file into segments that are anefficient size for routing?
A. Transport Layer
B. NetworK Layer
C. Datalink Layer
D. None
88. A networking device that forwards data packets along networks and acts as a centra
point of network is called
A. Repeater
B. Router
C. Bridge
D. Hub
92. Which of the following are the types of internal Network Cards?
A. Peripheral Component Interconnect (PCI), Wireless Network Card
B. Industry Standard Architecture (ISA), Wireless Network Card
C. Peripheral Component Interconnect (PCI),Industry Standard Architecture (ISA)
D. None of the above
93. Which of the following IEEE Standard is used for Wi-fi system?
A. 802.11
B. 802. 1
C. 802.2
D. 802.10
94. __________ refers to a family of IEEE standards dealing with local area network a
metropolitan area network.
A. 802
B. 800
C. 801
D. 803
95. Which is the general network standard for the data link layer in the OSI Reference
Model?
A. IEEE 802.1
B. IEEE 802.2
C. IEEE 802.3
D. IEEE 802.4
96. A communication network which is used is used by large organization over regiona
national or global area is called______
A. LAN
B. WAN
C. MAN
D. PAN
DATA STRUCTURE
1. In linked list , an element can be inserted at_______
(A)Beginning of the list
(B)End of the list
(C)Middle of the list
(D)Both (A) & (B)
4.A characteristic of the data that binary search uses but linear search ignores
is______
(A)Order of the list
(B)Length of the list
(C)Both (A) & (B)
(D)None of the above
6. A sort which iteratively passes through a list to exchange the first element with
any element less than it and then repeats with a new first element is called____
(A)Heap Sort
(B)Quick Sort
(C) Selection sort
(D) None of the above
7.In an extended _ binary tree, the nodes with two children are called…..
(A)Interior node
(B)Domestic node
(C)Internal node
(D)Inner node
8.Which of the following is / are real time application (S) of Circular linked list?
(A)Printer
(B)Multi player games
(C)Interrupts handling in real _ time system
(D)All of the above
11.To insert a node in a circular list at rear position, it should be inserted at _____ of
the Queue.
(A)Front _1 position
(B)Rear position
(C)Front position
(D)None of the above
12. Which of the following begins the search with the element that is located in the
middle of the Array?
(A)Random Search
(B)Parallel Search
(C)Binary Search
(D)Serial Search
14. In a Circular Linked list, insertion of a record involves the modification of ___
(A)1 Pointer
(B)2 Pointer
(C)3 Pointer
(D)None of the above
18. What is the worst case run-time complexity of binary search algorithm?
(A)Ο(n2)
(B)Ο(nlog n)
(C)Ο(n3)
(D)Ο(n)
20.In Binary Tree Traversal , the node is visited before its left and right sub trees is
called……
(A)Pre Order
(B)In order
(C)Post order
(D)None of the above
24.The common way of keeping subsequent items within the table and computing
possible positions is termed as ………
(A)Direct Chaining
(B)Open Addressing
(C)Both (A) & (B)
(D)None of the above
26.Which of the following is used to find the location of an element with a given
value ?
(A)Search
(B)Iteration
(C)Traversal
(D)None of the above
27.The space required to store the values of all the constants and variables is
called________
(A)Instruction space
(B)Data space
(C)Enviornment space
(D)None of the above
29.In Heap data structure, if the parent nodes are greater than their children
Nodes then it is called________
(A)Max Heap
(B)Min Heap
(C)Both (A) & (B)
(D)None of the above
39.An algorithm that calls that calls itself directly or indirectly is called………
(A)Iteration
(B)Recursion
(C)Traversal
(D)None of the above
41. The Quick sort algorithm divides the list into_______Main parts
(A)Four
(B)Six
(C)Five
(D)Three
43.……is a header list in which the last node contains the null pointer.
(A)Circular Header list
(B)Grounded Header list
(C)Both (A) & (B)
(D)None of the above
53.Which of the following search start at the beginning of the list and each
elements in the list ?
(A)Linear Search
(B)Binary Tree search
(C)Hash search
(D)None of the above
54. Stack is also called a……….
(A)Last In First Out
(B)First In First Out
(C)LIFO & FIFO
(D)None of the above
55.Which data structure is required to check balanced parenthesis In an
expression ?
(A)Linked list
(B)Queue
(C)Tree
(D)Stack
56.The memory address of the first elements of an array is called………
(A)First address
(B)Floor address
(C)Base address
(D)None of the above
64.Which data structure is needed to convert infix notation to post fix notation ?
(A)Branch
(B)Queue
(C)Tree
(D)Stack
73.Which of the following is the best sorting algorithm when the list is already
sorted ?
(A)Bubble Sort
(B)Insertion sort
(C)Recursive
(D)File structure
SOFTWARE ENGINEERING
1) What is Software ?
a. Set of computer programs, procedures and possibly associated document
concerned with the operation of data processing.
b. A set of compiler instructions
c. A mathematical formula
d. None of above
a. People
b. Product
c. Process
d. All of above
a. Bev Littlewood
b. Berry Bohem
c. Roger Pressman
d. Victor Bisili
a. Person - Months
b. Persons
c. Rupees
d. Months
a. People
b. Process
c. Product
d. Project
a. Productivity
b. Functionality
c. Quality
d. Efficiency
a. Functions
b. Procedures
c. Sub programs
d. All of the above
a. Waterfall Model
b. Spiral Model
c. Quick and Fix model
d. Prototyping Model
a. Generic Products
b. Customised Products
c. Generic and Customised Products
d. None of the above
a. Reliable Software
b. Cost Effective Software
c. Reliable and cost effective Software
d. None Of Above
a. Unambiguous
b. Distinctly Specific
c. Functional
d. All of Above
a. 3 Phases
b. 1 Phases
c. 2 Phases
d. 4 Phases
a. Abstraction
b. Refinement
c. Information Hiding
d. All of Above
a. Debugging
b. To uncover errors
c. To gain modularity
d. To analyze system
a. Basic path
b. Graph Testing
c. Dataflow
d. Glass box testing
a. Readability
b. Productivity
c. To use as small memory space as possible
d. Brevity
a. Sequencing
b. Alteration
c. Iteration
d. Multiple exit from loops
e. Only a, b and c
a. 0.9
b. 0.1
c. 1
d. 0
a. data design
b. architectural design
c. procedural design
d. interface design
a. Software
b. Hardware
c. Traning
d. All of above
a. CSPEC
b. PSPEC
c. MINI SPEC
d. Code SPEC
a. Hewlett - Packard
b. Rambaugh
c. Booch
d. Jacobson
48) Once object oriented programming has been accomplished, unit testing
is applied for each class. Class tests includes ?
a. Measure
b. Measurement
c. Metric
d. None of these
a. Flow chart
b. Pictogram
c. Data flow diagram
d. Histogram
e. None of above
52) In risk analysis of spiral model, which of the following risk includes ?
a. Technical
b. Management
c. Both A and B
d. None of these
53) Which of the following is done in order a data in phase 1 of the system
development life cycle ?
a. Waterfall
b. Incremental
c. Spiral
d. None of these
55) To avoid errors in transcription and transposition, during data entry the
system analyst should ?
a. Provide for a check digit
b. Provide for a hash totals
c. Provide batch totals
d. All of above
C/ C++ Programming
1. Value of ix+j, if i,j are integer type and ix long type would be
a. integer
b. float
c. long integer
d. double precision
2. If the class name is X, what is the type of its “this” pointer (in a non-static,
non-
const member function)?
a. const X* const
b. X* const
c. X*
d. X&
7. Vtables
a. creates a static table per class
b. creates a static table per object
c. creates a dynamic table per class
d. creates a dynamic table per object
10. Which of the following is the most preferred way of throwing and
handling exceptions?
a. Throw by value and catch by reference.
b. Throw by reference and catch by reference.
c. Throw by value and catch by value
d. Throw the pointer value and provide catch for teh pointer type.
14. Which of the STL containers store the elements contiguously (in adjecent
memory locations)?
a. std::vector
b. std::list
c. std::map
d. std::set
19. Which one of the following is not a valid reserved keyword in C++
a. Explicit
b. Public
c. Implicit
d. Private
20. Which of the following functions below can be used Allocate space for
array in memory?
a. calloc()
b. malloc()
c. Realloc()
d. both a and b
21. Each pass through a loop is called a/an
a. enumeration
b. iteration
c. culmination
d. pass through
38. The two types of file structure existing in VSAM file are
a. Key sequenced structure, entry sequenced structure
b. Key sequence structure, exit sequenced structure
c. Entry sequence structure, exit sequenced structure
d. None of above
39. An inverted file
a. Locates information about data in small files that are maintained apart from
actual data record
b. A file which stores opposite records
c. A file which stores information about records of a system
d. None of above
55. If a member needs to have unique value for all the objects of that same
class, declare the member as
a. Global variable outside class
b. Local variable inside constructor
c. Static variable inside class
d. Dynamic variable inside class
56. Which of the following below can perform conversions between pointers
to related classes?
a. A. cast_static
b. B.dynamic_cast
c. C.static_cast
d. D.cast_dynamic
58. Which of the following is the most general exception handler that catches
exception of any type?
a. catch(std::exception)
b. catch(std::any_exception)
c. catch(…)
d. catch()
59. class derived: public base1, public base2 { } is an example of
a. Polymorphic inheritance
b. Multilevel inheritance
c. Hierarchical inheritance
d. Multiple inheritance
60. Which of the following is/are pointer-member declared?
a. ->*
b. .*
c. ::*
d. both a and b
62. In a group of nested loops, which loop is executed the most number of
times?
a. the outermost loop
b. the innermost loop
c. all loops are executed the same number of times
d. cannot be determined without knowing the size of the loops
69. What defines a general set of operations that will be applied to various
types of data?
a. Template class
b. Function template
c. Class template
d. Both a and c above
71. Which of the following functions below can be used Allocate space for
array in memory?
a. calloc()
b. malloc()
c. Realloc()
d. both a and b
72. Statement scanf(“%d”,80);
a. Assign an integer to variable i
b. Give an error message
c. Print the value of i
d. Assign an float to variable i
74. If there is more than one statement in the block of a for loop, which of
the following must be placed at the beginning and the ending of the loop
block?
75. Which of the following members do get inherited (in case of private
inheritance) but become private members in child class
a. Public
b. Private
c. Protected
d. All the above
76. Which of the following is not a valid conditional inclusions in
preprocessor directives
a. #ifdef
b. #ifundef
c. #endif
d. #elif
77. Which looping process is best used when the number of iterations is
known?
a. for
b. while
c. do-while
d. all looping processes require that the iterations be known
80. Which of the following is the most common way of implementing C++?
a. C++ programs are directly compiled into native code by a compiler
b. C++ programs are first compiled to intermediate code by a compiler and
then executed by a virtual machine
c. C++ programs are interpreted by an interpreter
d. A C++ editor directly compiles and executes the program
86. Which of the following operators below allow to define the member
functions of a class outside the class?
a. ::
b. ?
c. :?
d. %
87. Which header file should we include for using std::auto_ptr?
a. <memory>
b. <alloc>
c. <autoptr>
d. <smartptr>
88. Which of the following is not a standard exception built in C++.
a. std::bad_creat
b. std::bad_alloc
c. std::bad_cast
d. std::bad_typeid
96. When class B is inherited from class A, what is the order in which the
constructers of those classes are called
a. Class A first Class B next
b. Class B first Class A next
c. Class B's only as it is the child class
d. Class A's only as it is the parent class
OPERATING SYSTEM
1. If there are multiple recycle bin for a hard disk
a. you can set different size for each recycle bin
b. you can choose which recycle bin to use to store your deleted files
c. You can make any one of them default recycle bin
d. None of above
10. If the displayed system time and date is wrong, you can reset it using
a. Write
b. Calendar
c. Write file
d. Control panel
11. Identify false statement
a. You can find deleted files in recycle bin
b. You can restore any files in recycle bin if you ever need
c. You can increase free space of disk by sending files in recycle bin
12. A co-processor
a. Is relatively easy to support in software
b. Causes all processor to function equally
c. Works with any application
d. Is quite common in modern computer
19. What program runs first after computer is booted and loading GUI?
a. Desktop Manager
b. File Manager
c. Windows Explorer
d. Authentication
21. Which of the following does not support more than one program at a
time?
a. DOS
b. Linux
c. Windows
d. Unix
24. Which operating system can you give smallest file name?
a. Ps/2
b. Dos
c. Windows
d. Windows NT
31. The .... displays the name of every computer user on the computer
a. Wish list screen
b. Command screen
c. Welcome screen
d. None of the above
32. The memory which allocates space for DOS and application is called
a. Expanded memory
b. Cache memory
c. Virtual memory
d. Conventional memory
36. Which mode loads minimal set of drivers when starting Windows?
a. Safe Mode
b. Normal Mode
c. VGA Mode
d. Network Support Mode
37. A ....is a flash memory storage device that plugins into a USB port
a. USB snap drive
b. USB flash drive
c. USB memory maker drive
d. None of above
43. Which menu bar selection would you access to open file?
a. Option
b. Help
c. View
d. None of above
46. Once text has been cut to the clipboard, you can .....that text into
another document
a. Paste
b. Copy
c. Transfer
d. None of the above
Copyright By Study Regular studyregular.blogspot.in Page 119
Study Regular IT Officer Question Bank Ebook
47. The ... operating system was initially created in the early 1970s at
AT and T's Bell Labs
a. Linux
b. DOS
c. Unix
d. GNU
53. ………..is the process of switching of CPU from one thread to another.
(A) Process handling
(B) interrupt handling
(C) Context switching
(D) None of the above
56. Which of the following is true for the algorithms for memory allocation?
(A) First Fit
(B) Best Fit
(C) Worst Fit
(D) All of the above
60. ….. is mainly responsible for allocating the resources as per process
requirement?
(A) RAM
(B) Compiler
(C) Operating Systems
(D) Software
73. ……..commands are automatically loaded into main memory when the
booting process gets completed.
(A) External
(B) Internal
(C) Both (A) & (B)
(D) None
80. In UNIX, cached disk blocks are managed by the kernel and reffered to
as….
(A) Cache
(B) Disk Cache
(C) Buffer Cache
(D) None of the above
81. ….. is the program which interprets commands given by the user ?
(A) Kernel
(B) Shell
(C) Fork
(D) None
82…..is the smallest unit for processing that consists of a program counter, a
stack & a set of registers.
(A) Compiler
(B) Thread
(C) Heap
(D) None of the above
94. …….. provides an Interface between the process and the Operating
System.
(A) Synchronization
(B) System Call
(C) Segmentation
(D) None of the above
96.An Operating System that can predict the exact time duration for
operation is called
(A) Hard RTOS
(B) Soft RTOS
(C) Both (A) and (B)
(D) None of the above
WEB TECHNOLOGY
1. What method is used to specify a container‟s layout in JSP?
A. Setlayout ( )
B. Layout ( )
C. setContainerLayout ( )
D. SetConLayout ( )
6. Which one of the following objects is passed to a JavaBean when one of its
properties is set via a JSP action?
A. servlet Request
B. HTTPServletRequest
C. ServletResponse
D. HTTP Servlet Response
9. Which method of the component class is used to set the position and size
of a component in JSP?
A. setsize ( )
10. What are the events generated by the Node objects called?
A. generators
B. highevents
C. emitters
D. None of the Above
13. Which of the following are used by servlet containers to set JavaBean
properties?
A. Cookies
B. form fields
C. memory
D. Disk
14. ___________ header gives the MIME type of the response document?
A. content Encoding
B. content Languages
24. IN JS, the ________ method returns the index of the last occurrence of a
specified text in a string.
A. Slice
B. Substr
29. Any part of the graphic that is not include in another hot zone is
considered to be part of __________
31. Which of the following was designed to store and transport data?
A. Java Script
B. HTML
C. XML
D. None of the Above
35. Which of the following is used to define the content of Web pages?
A. HTML
B.CSS
C. Java Script
D. None of the Above
36. JavaScript can change all the ____________ in the Web page.
A. HTML elements
B . CSS styles
C. HTML attributes
D. All of the Above
38. _________ message denotes the request has been fulfilled and a new
source is created
A. 202 Accepted
B.201 Created
C. 403 Forbidden
D. 404 Not Found
40. Which property is very useful for getting or replace the content of
HTML elements?
A. Inner HTML
B. outer HTML
C. Both A and B
D. None of the Above
42. In JS, The ________ method searches a string for a specified value and
returns the position of match.
A. Slice( )
B. Substr ( )
C. index ( )
D. search ( )
43. In Java Script, the _______ method returns the new array length.
A. Shift ( )
B. substr ( )
C. index ( )
D. unshift ()
46. In Java Script, which statement lets you to handle the error?
A. Try
B. Catch
C. Both A and B
D. None of the above
48. _________ message denotes the requested page could not be found and it
may be available in future?
A. 202 Accepted
B. 201 Created
C. 403. Forbidden
D. 404 Not Found
50. Which can reduce the number of server requests and save bandwidth?
A. Image Gallery
B. Image Opacity
C. Image Sprites
D. None of the Above
51. Which of the following property sets or returns the CORS setting of the
audio/video?
A. controls
B. crossOrigin
C. CurrentSrc
D. None of the Above
57. Which method returns the HTTP methods that the server supports?
A. HEAD
B. PUT
C. DELETE
D. OPTIONS
62. Which is the following message denotes the request page has moved
temporarily to a new URL?
A. 202 Accepted
B .201 created
C. 301 Moved Permanetly
D. 302 Found
63. Which of the following message denotes the requested page has moved to
a new URL?
(A ) 202 Accepted
(B) 201 created
(C) 302 Found
(D) 301Moved Permanently
68. Which is the following property returns the length of the current
audio/video?
(A) erros
(B)loop
(C) ended
(D) duration
111. What is the correct syntax in HTML for creating a link on a webpage?
a. <LINK SRC= ―studyregulars.html‖>
b. <BODY LINK = ―studyregulars.html‖>
c. <A SRC = ―studyregulars.html‖ >
d. < A HREF = ―studyregulars.html‖>
113. Choose the correct HTML tag to make the text bold?
a. <B>
b. <BOLD>
c. <STRONG>
d. Both (a) and (c)
115. Which HTML tag would be used to display power in expression (A+B)2
?
a. <SUP>
b. <SUB>
c. <B>
d. <P>
117. Choose the correct HTML tag for the largest heading?
a. <H1>
b. <H6>
c. <H10>
d. <HEAD>
COMPUTER FUNDAMENTALS:
1. Who is the inventor of ―Difference Engine‖?
a. Allen Turing
b. Charles Babbage
c. Simur Cray
d. Augusta Adaming
5. A CPU contains
a. a card reader and a printing device
b. an analytical engine and a control unit
c. a control unit and an arithmetic logic unit
9. Which of the following controls the process of interaction between the user
and the operating system?
a. User interface
b. Language translator
c. Platform
d. Screen saver
12. Coded entries which are used to gain access to a computer system are
called
a. Entry codes
b. Passwords
c. Security commands
d. Code words
13. Which device is required for the Internet connection?
a. Joystick
b. Modem
c. CD Drive
d. NIC Card
17. ALU is
a. Arithmetic Logic Unit
b. Array Logic Unit
c. Application Logic Unit
d. None of above
Copyright By Study Regular studyregular.blogspot.in Page 153
Study Regular IT Officer Question Bank Ebook
19. UNIVAC is
a. Universal Automatic Computer
b. Universal Array Computer
c. Unique Automatic Computer
d. Unvalued Automatic Computer
21. VGA is
a. Video Graphics Array
b. Visual Graphics Array
c. Volatile Graphics Array
d. Video Graphics Adapter
28. What type of computers are client computers (most of the time) in a
Client-server system?
a. Mainframe
b. Mini-computer
c. Microcomputer
d. PDA
31. Hackers
a. all have the same motive
b. break into other people's computers
c. may legally break into computers as long as they do not do any
damage
d. are people who are allergic to computers
32 . FORTRAN is
a. File Translation
b. Format Translation
c. Formula Translation
d. Floppy Translation
46. When did arch rivals IBM and Apple Computers Inc. decide to join
hands?
a. 1978
b. 1984
c. 1990
d. 1991
47. What is the name of the display feature that highlights are of the screen
which Requires operator attention?
a. Pixel
Copyright By Study Regular studyregular.blogspot.in Page 158
Study Regular IT Officer Question Bank Ebook
b. Reverse video
c. Touch screen
d. Cursor
49. In most IBM PCs, the CPU, the device drives, memory expansion slots
and active components are mounted on a single board. What is the name
of this board?
a. Motherboard
b. Breadboard
c. Daughter board
d. Grandmother board
50. Modern Computer are very reliable but they are not
a. Fast
b. Powerful
c. Infallible
d. Cheap
55. The system unit of a personal computer typically contains all of the
following except:
a. Microprocessor
b. Disk controller
c. Serial interface
d. Modem
59. A self replicating program, similar to a virus which was taken from a
1970 science fiction novel by John Bruner entitled the Shockwave Rider is
a. Bug
b. Vice
c. Lice
d. Worm
63. The primary function of the .......... is to set up the hardware and load
and start an operating system
a. System Programs
b. BIOS
c. CP
d. Memory
64. The ......... is the amount of data that a storage device can move from the
Storage medium to the Computer per second
a. data migration rate
b. data digitizing rate
c. data transfer rate
d. data access rate
71. ............. is the ability of a device to "jump" directly to the requested data
a. Sequential access
b. Random access
c. Quick access
d. All of the above
74. ......... provides process and memory management services that allow two
or more tasks, jobs, or programs to run simultaneously
a. Multitasking
b. Multithreading
c. Multiprocessing
Copyright By Study Regular studyregular.blogspot.in Page 163
Study Regular IT Officer Question Bank Ebook
d. Multicomputing
75. The task of performing operations like arithmetic and logical operations
is called......
a. Processing
b. Storing
c. Editing
d. Sorting
76. You use a(n) ....., such as a keyboard or mouse, to input information
a. output device
b. input device
c. storage device
d. processing device
85. All of the following are examples of real security and privacy risks
EXCEPT
a. hackers
b. Spam
c. Viruses
d. identity theft
87. Which of the following is NOT one of the four major data processing
functions of a computer?
a. gathering data
b. processing data into information
c. analyzing the data or information
d. storing the data or information
88. When creating a computer program, the ......... designs the structure of the
program
a. End user
b. System Analyst
c. Programmer
Copyright By Study Regular studyregular.blogspot.in Page 166
Study Regular IT Officer Question Bank Ebook
d. All of the above
89. ............... is the science that attempts to produce machines that display the
same type of intelligence that humans do
a. Nanoscience
b. Nanotechnology
c. Simulation
d. Artificial intelligence (Al)
93. Which of the following contains permanent data and gets updated during
the processing of transactions?
a. Operating System File
b. Transaction file
c. Software File
d. Master file
95. Which of the following helps to protect floppy disks from data getting
accidentally erased?
a. Access notch
b. Write-protect notch
c. Entry notch
d. Input notch
MIXED QUESTIONS
15. Which of the Following method can be used to add more tables in a
Database?
(A) Design View
(B) Table wizard
(C) Both (A)&(B)
(D) None of the above
16. Which of the following field type is the best to store serial
numbers?
(A)Number
Copyright By Study Regular studyregular.blogspot.in Page 171
Study Regular IT Officer Question Bank Ebook
(B) Auto number
(C) Memo
(D) None of the above
19. A method which transfers the entire block of data from its own
buffer to main memory takes place without intervention by CPU.
A. programmed input \Output
B. Input driven Input \Output
C. Direct Memory Access
D. None of the above
35. A set of resources ‗ allocations such that the system can allocate
resources to each process in some order,and still avoid a deadlock is called.
A. Unsafe State
B. Safe State
C. Starvation
D. Greedy allocation
36. Which of following does not allow multiple users or devices to share
one communications line ?
A Doubleplexer
B. Multiplexer
C. concentrator
D. Controller
55. The language used in application programs to request data from the
DBMS is Referred to as the
A.DML
B.DDL
C.VDL
Copyright By Study Regular studyregular.blogspot.in Page 178
Study Regular IT Officer Question Bank Ebook
D.SDL
58.In a relation
A.Ordering of rows is immaterial
B.No tow rows are identical
C.Both(a) And(B)
D. None of These.