Академический Документы
Профессиональный Документы
Культура Документы
Computer Fundamentals:
A pivot table is a data summarization tool that is used in the context of data processing. Pivot
tables are used to summarize, sort, reorganize, group, count, total or average data stored in a
database. It allows its users to transform columns into rows and rows into columns. It allows
grouping by any data field. Pivot tables are the perfect solution when you need to summarize and
analyze large amounts of data. In just a few clicks, you have access to a whole new set of
information. As already said, spreadsheets are one solution to create pivot tables, but the best
tools don’t require to write complicated formulas or to start all over again every time you want to
organize the data differently. A drag and drop option to move your fields around is the easiest way
to go.
Answer: a Answer: d
Explanation: The word COMPUTER is an Explanation: The above diagram is a simple
abbreviation for the terms “Commonly Operated explanation which describes how the instruction is
Machines Used in Technical and Educational given to the CPU, how it is processed, and then
Research”. The word COMPUTER also relates to how the result is obtained.
the word COMPUTE which means to calculate. So here, the input unit is used to give instructions
So, initially it was thought that a computer is a to the central processing unit and the output unit is
device which is used to perform calculations. responsible for giving the result to the user.
4
d) DDR 1. The ‘heart’ of the processor which performs
View Answer many different operations _____________
a) Arithmetic and logic unit
Answer: b b) Motherboard
Explanation: DRAM stands for dynamic random c) Control Unit
access memory. It is denser than SDRAM (Static) d) Memory
and therefore it is used in the main memory. They View Answer
are in the form of semiconductor RAMs.
Answer: a
7. Which of the following are types of ROMs? Explanation: The Arithmetic and logic unit
a) SROM & DROM performs all the basic operations of the computer
b) PROM & EPROM system. It performs all the arithmetic(+,-,*,/,etc) as
c) Only one type there is no further classification well as the logical operations( AND, OR, NOT,
d) PROM & EROM etc.).
View Answer
2. ALU is the place where the actual executions of
8. RAID stands for __________ instructions take place during the processing
a) Redundant array of independent disks operation.
b) Redundant array of individual disks a) True
c) Reusable Array of independent disks b) False
d) Reusable array of individual disks View Answer
View Answer
Answer: a
Answer: a Explanation: ALU is a combinational electronic
Explanation: RAID is a multiple-disk database circuit which basically performs all the logical or
design which is viewed as a single logical disk by the bitwise operations and the arithmetic
the operating system. Data are distributed across operations. Therefore, it is the place where the
the physical drives of the array. It guarantees the actual executions of instructions take place.
recovery of data in case of data failure.
3. Which of the following is not a bitwise
9. A non-erasable disk that stores digitized audio operator?
information is _____ a) |
a) CD b) ^
b) CD-ROM c) .
c) DVD-R d) <<
d) DVD-RW View Answer
View Answer
Answer: c
Answer: a Explanation: All except the dot(.) operator are
Explanation: A compact disk stores digitized audio bitwise operators.
information. The standard system uses 12 cm disks | : Bitwise OR
and can record more than 60 minutes of ^ : Bitwise XOR
uninterrupted playing game. << : Shift Left
10. The first practical form of Random Access 4. The sign magnitude representation of -1 is
Memory was the __________ __________
a) SSEM a) 0001
b) Cathode Ray Tube b) 1110
c) William’s Tube c) 1000
d) Thomas’s Tube d) 1001
View Answer View Answer
Answer: c Answer: d
Explanation: The first practical form of RAM was Explanation: The first leftmost bit i.e. the most
William’s Tube made in 1947. It stored data as significant bit in the sign magnitude represents if
electrically charged spots on the face of a Cathode the number is positive or negative. If the MSB is 1,
Ray Tube. the number is negative else if it is 0, the number is
positive. Here, +1=0001 and for -1=1001.
5
5. IEEE stands for ___________ b) Parity
a) Instantaneous Electrical Engineering c) Auxiliary
b) Institute of Emerging Electrical Engineers d) Carry
c) Institute of Emerging Electronic Engineers View Answer
d) Institute of Electrical and electronics engineers
View Answer Answer: b
Explanation: The parity flag indicates the number
Answer: d of 1 bit in any operation. The resultant bit is called
Explanation: The IEEE is an organization of the parity bit. The main aim of the parity bit is to
professionals in the field of electronics and check for errors.
electrical engineering. IEEE has given certain
standards of its own which are followed in the field 10. The bitwise complement of 0 is ___________
of computer science and electrical engineering. a) 00000001
b) 10000000
6. The ALU gives the output of the operations and c) 11111111
the output is stored in the ________ d) 11111110
a) Memory Devices View Answer
b) Registers
c) Flags Answer: c
d) Output Unit Explanation: Bitwise complement is basically used
View Answer to convert all the 0 digits to 1 and the 1s to 0s.
So, for 0 = 00000000(in 8-bits) ::: 11111111(1s
Answer: b complement). The bitwise complement is often
Explanation: Any output generated by the ALU referred to as the 1s complement.
gets stored in the registers. The registers are the
temporary memory locations within the processor
that are connected by signal paths to the CPU. 1. ____________ is the raw material used as input
and __________ is the processed data obtained as
7. The process of division on memory spaces is output of data processing.
called ______________ a) Data, Instructions
a) Paging b) Instructions, Program
b) Segmentation c) Data, Program
c) Bifurcation d) Program, Code
d) Dynamic Division View Answer
View Answer
Answer: a
Answer: b Explanation: Data can be assumed as a raw
Explanation: The memory space is divided into material which, in turns after processing gives the
segments of dynamic size. The programmer is desired output in the form of instructions. Further,
aware of the segmentation and can reallocate the a set of ordered and meaningful instructions is
segments accordingly. known as a program.
Answer: d
a) Input Unit Explanation: The main task of a control unit is to
b) Memory Unit generate control signals. There are two main types
c) Control Unit of control units:
d) I/O Unit A hardwired control unit generates control signals
View Answer by using combinational logic circuits and the
Micro programmed control unit generates control
signals by using some softwares.
Answer: c
Explanation: The control unit manages and
coordinates the operations of a computer system. 7. Which is the simplest method of implementing
The ALU is responsible for performing all the hardwired control unit?
arithmetic and bitwise operations . Therefore, both a) State Table Method
these units combine to form the brain of the b) Delay Element Method
computer ,which is the central processing unit. c) Sequence Counter Method
d) Using Circuits
View Answer
4. The part of a processor which contains
hardware necessary to perform all the operations
required by a computer: Answer: a
a) Data path Explanation: There are 3 ways of implementing
b) Controller hardwired control unit:
c) Registers A state table is the simplest method in which a
d) Cache number of circuits are designed based on the cells
View Answer in the table.
A delay element method consists of a flowchart
drawn for the circuit. A D-flip flop is used as a
Answer: a
delay element.
Explanation: A processor is a part of the computer
A sequence counter method used k-modulo counter
which does all the data manipulation and decision
as a replacement for k delay elements.
making. A processor comprises of:
A data path which contains the hardware necessary
to perform all the operations. A controller tells the 8. A set of microinstructions for a single machine
data path what needs to be done. instruction is called ___________
The registers act as intermediate storage for the a) Program
data. b) Command
c) Micro program
d) Micro command
5. What does MAR stand for?
View Answer
a) Main Address Register
b) Memory Access Register
c) Main Accessible Register Answer: c
d) Memory Address Register Explanation: For every micro-operation, a set of
View Answer microinstructions are written which indicate the
control signals to be activated. A set of
microinstructions is a micro program. The address
7
of the next microinstruction is given by a Micro- Answer: a
program counter. Explanation: In a non-positional number system, 1
is represented as I, 2 as II, 3 as III, 4 as IIII and
9. Micro-program consists of a set of therefore, 5 is represented as IIIII. This number
microinstructions which are strings of 0s and 1s. system uses symbols for the representation of
a) True digits.
b) False
View Answer 3. The base is the total number of digits in a
number system.
Answer: a a) True
Explanation: The computer understands only b) False
binary language. So, the micro-program should View Answer
have instructions which are in the form of 0s and
1s. Each output line of the micro-program Answer: a
corresponds to one control signal. Explanation: The statement is true. In a positional
number system, base is the number of digits the
10. A decoder is required in case of a system comprises. For example, a binary number
______________ system comprises of only 2 digits, 0 and 1,
a) Vertical Microinstruction therefore its base is 2. Similarly, the decimal
b) Horizontal Microinstruction system comprises 10 digits 0 to 9, therefore its
c) Multilevel Microinstruction base is 10.
d) All types of microinstructions
View Answer 4. The LSB and MSB of 1243247 are ____ and
____
Answer: a a) 1, 7
Explanation: There are two types of b) 4, 7
microinstructions: Horizontal and Vertical. c) 7, 1
In a horizontal microinstruction, each bit represents d) 4, 1
a signal to be activated whereas, in case of vertical View Answer
microinstruction bits are decoded and, the decoder
then produces signals. Answer: c
Explanation: The LSB or the least significant bit is
1. Which of the following is not a type of number the rightmost digit at the zeros position. The MSB
system? or the most significant bit is the leftmost digit.
a) Positional
b) Non-Positional 5. A device that uses positional notation to
c) Octal represent a decimal number.
d) Fractional a) Abacus
View Answer b) Calculator
c) Pascaline
Answer: d d) Computer
Explanation: There are two main types of number View Answer
systems : Positional & Non-positional.
Positional System uses digits for the representation Answer: a
whereas, non-positional number systems use Explanation: Abacus was used to doing arithmetic
certain symbols for the representation of numbers. calculations around 2500 years ago. Pascaline was
Octal is a type of positional number systems with the pascal’s calculator by Blaise Pascal invented
base 8. for doing laborious calculations.
Answer: b Answer: c
Explanation: BCD is the binary coded decimal Explanation: A decimal number system consists of
form of representation of numbers in 4 bits.E.g. 10 digits from 0 to 9.
The BCD representation of 5 is 0101. BCD The definition of base describes it as a quantity to
representation of 22 is 00100010. represent the number of digits present in that
particular number system.
8. 1 zettabyte = ______________ Therefore, here, the base is 10.
a) 1024 TB
b) 1024 EB 2. Convert : (110)2 = ( __ )10.
c) 1024 ZB a) 4
d) 1024 PB b) 5
View Answer c) 6
d) 9
Answer: b View Answer
Explanation: 1 ZB=1024 EB(exabyte)
1 EB=1024PB(petabyte) Answer: c
1 YB(yottabyte)=1024ZB. Explanation: The base 2 represents that the number
is binary ,whereas, the base 10 represents that it is
9. Perfrom BCD addition: 2+3= to be converted to the decimal format.
_______________ Conversion: 22 * 1 + 21 * 1 + 20 *0 = 6.
a) 0010
b) 0011 3. The 2’s complement of 15 is ____________
c) 0101 a) 0000
d) 1010 b) 0001
View Answer c) 0010
d) 0100
Answer: c View Answer
Explanation: BCD of 2 =0010
BCD of 3=0011 Answer: b
0010+0011=0101 Explanation: 2’s complement is obtained by adding
Therefore, 2+3=0101(5). 1 to the 1’s complement of the number.
Here, Binary of 15 = 1111
10. ASCII stands for _____________________ 1’s complement of 15= 0000
a) American standard code for information 2’s complement of 15= 0000+1=0001.
interchange
b) American scientific code for information 4. Another name for base is __________
interchange a) root
c) American scientific code for international b) radix
interchange c) entity
d) American standard code of international d) median
interchange View Answer
View Answer
Answer: b
Answer: a Explanation: Another name for base is radix. Base
Explanation: ASCII is an encoding standard which refers to the number of digits that a particular
is used for communications worldwide. ASCII number system consists of.
9
The base of decimal number system is 10, binary is 10 : A
2 and so on. 11 : B
12 : C
5. The decimal equivalent of (0.101)2 will be 13 : D
____________ 14 : E
a) 0.5 15 : F.
b) 0.625
c) 0.25 9. Which of the following is not a decimal
d) 0.875 number?
View Answer a) 114
b) 43.47
Answer: b c) 99.9A
Explanation: Since the base is 2 , it could be easily d) 10101
guessed that the number is binary. Conversion: 2-1 View Answer
* 1 + 2-2 * 0 + 2-3 * 1 = 0.625.
Answer: c
6. The signed magnitude for -3 will be Explanation: All the numbers except 99.9A are
___________ decimal numbers.
a) 00000011 This number has a hexadecimal component A in it,
b) 10000011 therefore , it is not a valid decimal number.
c) 11111101 The decimal equivalent of A is 10.
d) 11111100
View Answer 10. Select the incorrect option:
a) (101)10 = (1100101)2
Answer: b b) G is valid in hexadecimal system.
Explanation: Signed Magnitude of a number is a c) C represents 12
representation to determine if the number is d) The base of a decimal number system is 10.
positive or negative. View Answer
If the MSB of a number is 0, the number is
positive, else if it is 1 the number is negative. Answer: b
Here, +3 = 00000011 Explanation: G is not a valid hexadecimal number.
-3= 100000011. In this system, only representations from A to E
are used to represent the numbers from 10 to 15.
7. A number with both integer and a fractional The base of the hexadecimal number system is 16.
part has digits raised to both positive and negative
powers of 2 in a decimal number system. 1. Which of the following is not a positional
a) True number system?
b) False a) Roman Number System
View Answer b) Octal Number System
c) Binary Number System
Answer: b d) Hexadecimal Number System
Explanation: In a decimal number system, a View Answer
number with both integer and a fractional part has
digits raised to both positive and negative powers Answer: a
of 10 and not 2. Explanation: The Roman number system isn’t a
e.g. 22.34 = 2 * 101 + 2 * 100 + 3 * 10-1 + 4 * 10-2. positional number system since it uses symbols to
represent numbers.
8. The hexadecimal representation of 14 is The octal number system uses digits from 0-7, the
_______________ binary number system uses digits from 0-1
a) A whereas, the hexadecimal number system uses
b) F digits from 0-15.
c) D
d) E 2. The value of radix in binary number system is
View Answer _____________
a) 2
Answer: d b) 8
Explanation: The hexadecimal representations are c) 10
as follows:
10
d) 1 before decimal and from right to left after the
View Answer decimal place.
Here,
Answer: a
Explanation: In a binary number system, the value
of base or radix is 2. The binary system uses only
two digits for the representation of numbers,
therefore its base id has chosen to be 2.
Answer: b
Explanation: In hexadecimal number system, 1110
= 15, which is represented by the alphabet E.
Some representations are:
A 10
B 11
We then write the remainders in the reverse order
C 12
as 1010 .
D 13
E 14
4. A computer language that is written in binary F 15.
codes only is _____
a) machine language
7. A bit in a computer terminology means either 0
b) C
or 1.
c) C#
a) True
d) pascal
b) False
View Answer
View Answer
Answer: a
Answer: a
Explanation: Machine Language is written in
Explanation: A bit stands for a binary digit. A
binary codes only. It can be easily understood by
binary digit can have only two digits i.e. 0 or 1. A
the computer and is very difficult for us to
binary number consisting of n-bits is called an n-
understand. A machine language, unlike other
bit number.
languages, requires no translators or interpreters.
8. Convert the binary equivalent 10101 to its
5. The octal equivalent of 1100101.001010 is
decimal equivalent.
______
a) 21
a) 624.12
b) 12
b) 145.12
c) 22
c) 154.12
d) 31
d) 145.21
View Answer
View Answer
Answer: a
Answer: b
Explanation: To convert a binary number to its
Explanation: The octal equivalent is obtained by
decimal equivalent follow these steps :
grouping the numbers into three, from right to left
11
24 * 1 + 23 * 0 + 22 *1 + 21 * 0 + 20 * 1 = 21. represented as :
Therefore, the answer is 21. 82 * 1 + 81 * 1 + 80 *3.
9. Which of the following is not a binary number? 3. The maximum number of bits sufficient to
a) 1111 represent an octal number in binary is _______
b) 101 a) 4
c) 11E b) 3
d) 000 c) 7
View Answer d) 8
View Answer
Answer: c
Explanation: A binary number can have only two Answer: b
possible digits, 0 and 1. In the third option, there is Explanation: The octal number system comprises
an alphabet E present which makes it an invalid of only 8 digits. Hence, three bits (23 = 8) are
binary number. Alphabets are only allowed in the sufficient to represent any octal number in the
hexadecimal number system. binary format.
10. Which of the following is the correct 4. The binary number 111 in octal format is
representation of a binary number? ________________
a) (124)2 a) 6
b) 1110 b) 7
c) (110)2 c) 8
d) (000)2 d) 5
View Answer View Answer
Answer: d Answer: b
Explanation: The binary numbers should comprise Explanation: Certain binary to octal representations
only two digits 0 and 1. are :
Also, for the base, the value should be 2 and it 000=0
should be written as a subscript enclosing the 001=1
entire number. Here, the fourth option gives the 010=2
correct representation. 011=3
100=4
1. What could be the maximum value of a single 101=5
digit in an octal number system? 110=6
a) 8 111=7.
b) 7
c) 6 5. Convert (22)8 into its corresponding decimal
d) 5 number.
View Answer a) 28
b) 18
Answer: b c) 81
Explanation: The maximum value in any number d) 82
system is one less than the value of the base. The View Answer
base in an octal number system is 8, therefore, the
maximum value of the single digit is 7. It takes Answer: b
digits from 0 to 7. Explanation: To convert an octal number to
decimal number:
2. In a number system, each position of a digit 81 * 2 + 80 * 2 = 16 + 2 = 18.
represents a specific power of the base. Hence, the decimal equivalent is 18.
a) True
b) False 6. The octal equivalent of the binary number
View Answer (0010010100)2 is ______________
a) 422
Answer: a b) 242
Explanation: In a number system, every digit is c) 224
denoted by a specific power of base. Like in an d) 226
octal system, consider the number 113, it will be View Answer
12
Answer: c 1011 0000 0001 (
Explanation: To obtain the octal equivalent, we groups of 4)
take numbers in groups of 3, from right to left as : B 0 1 (
000 010 010 100 hexadecimal equivalent)
advertisement
14
10. What do we call the point(decimal) in any a) Constants
hexadecimal number of the form 111.A3? b) Variables
a) radix c) Modules
b) hexadecimal point d) Tokens
c) decimal View Answer
d) octal point
View Answer Answer: b
Explanation: Variables are the data entities whose
Answer: b values can be changed. Constants have a fixed
Explanation: The decimal is often referred to as the value. Tokens are the words which are easily
hexadecimal point in hexadecimal representation identified by the compiler.
of numbers.
It is referred to as the octal point in octal numbers. 5. Which of the following is not a basic data type
in C language?
1. Which of the following is not a data type? a) float
a) Symbolic Data b) int
b) Alphanumeric Data c) real
c) Numeric Data d) char
d) Alphabetic Data View Answer
View Answer
Answer: c
Answer: a Explanation: There are 5 basic data types in C
Explanation: Data types are of three basic types: language: int, char, float, double, void.
Numeric, Alphabetic and Alphanumeric. Numeric Int is for the representation of integers, char is for
Data consists of only numbers. strings and characters, float and double are for
Alphabetic Data consists of only letters and a blank floating point numbers whereas void is a valueless
character and alphanumeric data consists of special data type.
symbols.
6. BOOLEAN is a type of data type which
2. *@Ac# is a type of ________________ data. basically gives a tautology or fallacy.
a) Symbolic a) True
b) Alphanumeric b) False
c) Alphabetic View Answer
d) Numeric
View Answer Answer: a
Explanation: A Boolean representation is for
Answer: b giving logical values. It returns either true or false.
Explanation: Alphanumeric data consists of If a result gives a truth value, it is called tautology
symbols. Alphanumeric data may be a letter, either whereas if it returns a false term, it is referred to as
in uppercase or lowercase or some special symbols fallacy.
like #,^,*,(, etc.
7. What does FORTRAN stands for?
3. Which of the following is not a valid a) Formula Transfer
representation in bits? b) Formula Transformation
a) 8-bit c) Formula Translation
b) 24-bit d) Format Transformation
c) 32-bit View Answer
d) 64-bit
View Answer Answer: c
Explanation: FORTRAN is a type of computer
Answer: b language. It was developed for solving
Explanation: There are no criteria like the 24-bit mathematical and scientific problems. It is very
representation of numbers. Numbers can be written commonly used among the scientific community.
in 8-bit, 16-bit, 32-bit and 64-bit as per the IEEE
format. 8. The program written by the programmer in high
level language is called _____________
4. What are the entities whose values can be a) Object Program
changed called? b) Source Program
15
c) Assembled Program Answer: a
d) Compiled Program Explanation: In a Binary Coded Decimal format,
View Answer 64 characters i.e. 26 different characters can be
represented. It is one of the early computer codes.
Answer: b
Explanation: The program written by the 3. Which of the following is not a type of
programmer is called a source program. The computer code?
program generated by the compiler after a) EBCDIC
compilation is called an object program. The object b) BCD
program is in machine language. c) ASCII
d) EDIC
9. A standardized language used for commercial View Answer
applications.
a) C Answer: d
b) Java Explanation: There is no coding scheme like
c) COBOL EDIC. EBCDIC stands for Extended Binary Coded
d) FORTRAN Decimal Interchange Code. BCD stands for Binary
View Answer Coded Decimal. ASCII stands for American
Standard Code for information interchange.
Answer: c
Explanation: COBOL is a language used in 4. The BCD representation of (34)10 is
business and commercial applications. It stands for _______________
Common Business Oriented Language. It is a) 6
imperative, procedural as well as object oriented b) 7
language. c) 8
d) 5
10. ______________ define how the locations can View Answer
be used.
a) Data types Answer: b
b) Attributes Explanation: BCD numbers are represented as:
c) Links 34 = (0011 0100)BCD.
d) Data Objects Each digit is individually taken and an equivalent
View Answer standard 4 bit term is written for the respective
digit.
Answer: b
Explanation: Attributes can determine how any 5. Perform BCD addition of (23)BCD + (20)BCD .
location can be used. Attributes can be type, name, a) 00110100
component, etc. Data objects are the variables and b) 01000011
constants in a program. c) 10011
d) 11100
1. A group of bits used to represent a symbol is View Answer
called a ____________
a) byte Answer: b
b) memory Explanation: To add any two BCD numbers :
c) nibble Simply perform the addition : 23+20=43.
d) code Then, write the equivalent BCD number = (0100
View Answer 0011)BCD.
8. The characters from 0 to 9 have their common 2. The decimal representation for the character ‘!’
digit as ___________ in ASCII is ____________
a) 1111 a) 31
b) 0000 b) 32
c) 0001 c) 33
d) 1000 d) 34
View Answer View Answer
Answer: a Answer: c
Explanation: The digits are 1111 in case of Explanation: The decimal representation of a few
basic characters are:
18
33 : ! 7. The zone of alphabetic characters from A to O
34 : ” in ASCII is _____________
35: # a) 1000
36 :$. b) 0100
c) 0010
3. The two types of ASCII are _____________ d) 0001
and ____________ View Answer
a) ASCII-4 and ASCII-8
b) ASCII-8 and ASCII-16 Answer: b
c) ASCII-7 and ASCII-8 Explanation: The zone used by ASCII for
d) ASCII-4 and ASCII-16 alphabets is 0100. For e.g. A is represented as
View Answer 0100(zone)0001(digit). The hex equivalent is 41
for A. The zone used by numbers is 0011.
Answer: c
Explanation: The two types of ASCII are ASCII-7 8. The representation of the number 8 in binary in
and ASCII-8. ASCII-7 uses 7 bits for the ASCII-8 format _________
representation of numbers and ASCII-8 uses 8-bits. a) 00111000
b) 01001000
4. Any set of digits or alphabets are generally c) 1000
referred as ______________ d) 00011000
a) Characters View Answer
b) Symbols
c) Bits Answer: a
d) Bytes Explanation: The ASCII-8 format will have 8 bits.
View Answer The zone for the character 8 is 0011 and the digit is
1000. Therefore, its representation is 00111000.
Answer: a
Explanation: We refer to the digits and alphabets 9. Binary Coding for the letter X is
generally as characters. A character is generally a ______________
unit of information in computers. a) 01011000
b) 00111000
5. The first 128 characters are the same in both the c) 10001000
types of ASCII i.e. ASCII-7 and ASCII-8. d) 00010100
a) True View Answer
b) False
View Answer Answer: a
Explanation: The binary coding for the letter X is
Answer: a 01011000. Here, 0101 is the zone whereas 1000 is
Explanation: There are two types of ASCII codes: the digit. The alphabets from P to Z have the zone
ASCII-7 and ASCII-8. ASCII-7 uses 7 bits to 0101.
represent a number whereas ASCII-8 uses 8-bits to
represent a number. 10. Express the ASCII equivalent of the signed
binary number (00110010)2.
6. The number of characters that can be a) 2
represented in ASCII-8 are ______________ b) 1
a) 128 c) A
b) 256 d) ,
c) 32 View Answer
d) 64
View Answer Answer: a
Explanation: The ASCII characters for the
Answer: b remaining options are:
Explanation: ASCII-8 can represent 256 different 1 : 00110001
characters. ASCII-8 uses 8-bits for the A : 01000001
representation of numbers i.e. it can represent 28 = , : 00101100.
256 different characters.
1. The numbers used to represent numeric values
in EBCDIC are _______
19
a) zoned d) F3F4D5
b) unsigned View Answer
c) packed
d) eb Answer: a
View Answer Explanation: F is used for the representation of
unsigned numbers therefore, F3F4F5 represents
Answer: a 345. F3F4C5 represents +345 . F3F4D5 represents
Explanation: Zoned numbers represent the numeric -345.
values under EBCDIC (Extended Binary Coded
Decimal Interchange Code). In zoned format, there 6. Which of the following is a valid encoding
is only one digit per byte. format?
a) UTF-1
2. Unicode provides a consistent way of encoding b) UTF-8
multilingual plain text. c) UTF-A
a) True d) UTF-4
b) False View Answer
View Answer
Answer: b
Answer: a Explanation: The various encoding formats are
Explanation: Unicode defines codes for characters UTF-8, UTF-16 and UTF-32. UTF stands for
used in all major languages of the world. Unicode Transformation Format. It is basically an
It is a coding system which supports almost all the encoding system that supports all languages.
languages. It defines special codes for different
characters, symbols, diacritics, etc. 7. _________________ defines the assigned
ordering among the characters used by the
3. Which of the following is not a type of numeric computer.
value in zoned format? a) Unicode
a) Positive b) Collating Sequence
b) Negative c) Accumulation
c) Double d) Sorting
d) Unsigned View Answer
View Answer
Answer: b
Answer: c Explanation: Collating sequence is the term used
Explanation: The zoned format can represent for ordering among characters. It may vary
numeric values of type Positive, negative and depending upon the type of code used by a
unsigned numbers. A sign indicator is used in the computer.
zone position of the rightmost digit.
8. The sorting sequence of the strings A1,23,1A
4. The sign indicator of unsigned numbers is will be ______________
____________ a) 23 > A1 > 1A
a) C b) 23 < 1A > A1
b) D c) A1 > 1A > 23
c) F d) A1 < 1A < 23
d) X View Answer
View Answer
Answer: d
Answer: c Explanation: The sorting order is A1, 1A, 23.
Explanation: A sign indicator is used in the zone Numeric characters are given a greater preference
position of the rightmost digit. A sign indicator C in EBCDIC as compared to the alphabets.
is used for positive, D for negative and F is used
for negative numbers. 9. The default character coding in HTML-5 is
_____________
5. The EBCDIC value of the number 345 in zoned a) UTF-8
format is __________ b) UTF-16
a) F3F4F5 c) UTF-4
b) E3E4E5 d) UTF-32
c) F3F4C5 View Answer
20
Answer: a Answer: d
Explanation: HTML5 which is the hypertext Explanation: 1’s complement is obtained by
markup language generally uses the UTF-8 format reversing the bits from 0 to 1 and vice-versa.
as its default encoding. Unicode covers all the Binary of 1 is : 0001 and 1’s complement is : 1110.
characters and symbols in all the different
languages. 4. The binary number 111 in its 2’s complement
form is ____________
10. Numbers used in packed decimal format can a) 010
be used for _____________ operations. b) 001
a) logical c) 000
b) relational d) 111
c) arithmetic View Answer
d) bitwise
View Answer Answer: b
Explanation: 2’s complement is obtained by adding
Answer: c 1 to the 1’s complement. 1’s complement of 111:
Explanation: The packed numbers can be used for 000 and 2’s complement:001.
arithmetic operations. The packed numbers also
require the lesser number of bytes as compared to 5. The sign magnitude representation of -9 is
zoned numbers. ___________
a) 00001001
1. __________________ is a straightforward b) 11111001
method of representing positive and negative c) 10001001
numbers. d) 11001
a) Radix View Answer
b) Complement
c) Sign Magnitude Answer: c
d) Encode Explanation: In case of a negative number, the
View Answer leftmost digit is 1 if the number is negative.
Therefore, +9=00001001 and -9=10001001.
Answer: c Similarly for all other negative numbers.
Explanation: Sign Magnitude is used for the
representation of positive and negative numbers. If 6. If you are given a word of size n bits, the range
the leftmost digit is 0, the number is positive. If the of 2’s complement of binary numbers is ________
leftmost digit is 1, the number is negative. a) -2n+1 to +2n+1
b) -2n-1 to +2n-1
2. The additive inverse of a number is the number c) -2n-1 to +2n+1
which when added to the original number gives 1 d) -2n-1 to +2n-1-1
as a result. View Answer
a) True
b) False Answer: d
View Answer Explanation: 2’s complement is obtained by adding
1 to the 1’s complement. For e.g. 5 :0101 and 1’s
Answer: b complement=1010 and 2’s complement=1011.
Explanation: Additive Inverse of a number is the
number which gives 0 and not 1 when added to the 7. In both signed magnitude and 2’s complement ,
original number. e.g. number=45, additive inverse positive and negative numbers are separated using
=-45, after addition they give 0. ______________
a) LSB
3. The 1’s complement of 1 in 4 bits is b) MSB
__________ c) 0
a) 0001 d) 1
b) 0 View Answer
c) 1001
d) 1110 Answer: b
View Answer Explanation: The positive and negative numbers
are separated using the MSB. MSB is the Most
Significant Bit. MSB is the leftmost bit. e.g. If
21
1000 is the number then 1 is the most significant 2. One extra bit is added on the left of a binary
bit. number, in case of Binary Multiplication using
Booth’s Algorithm.
8. Single Precision format comprises of a) True
_________ bits. b) False
a) 4 View Answer
b) 8
c) 16 Answer: a
d) 32 Explanation: The statement is true as an extra bit is
View Answer added when we multiply 2 binary numbers by
using Booth’s.
Answer: d Let us take an example if we multiply 2 * – 3.
Explanation: The single precision format The first step is to obtain the binary equivalents.
comprises of 32-bits. It has 1 sign bit, 8 bits for Hence, 2=10 and -3=01.
exponent and 23 for the mantissa. Now after adding the extra bit 2=010 and -3=101.
We add 0 in case of positive numbers whereas 1 in
9. If m is the 2’s complement and n is the binary negative numbers.
number, then ______________
a) m=n’ 3. The binary number obtained after applying
b) m=n’+1 RSC on 11010 will be ___________
c) m=n’-1 a) 11101
d) m=n b) 10100
View Answer c) 01101
d) 01000
Answer: b View Answer
Explanation: 2’s complement is simply obtained by
addition of 1. So if n is the number and we take the Answer: c
2’s complement, add 1 to it, we get the 2’s Explanation: RSC stands for Right-Shift Circulant.
complement. Therefore, m=n’+1. So, whenever the numbers are shifted to the right
an extra 0 bit is added to the left. Here, after the
10. The possible number of bit patterns with 8 bits right shift of 11010, the number obtained will be
________________ 01101.
a) 128
b) 8 4. The result of >> of 11001 by 3-bits will be
c) 24 ______________
d) 256 a) 01000
View Answer b) 01111
c) 00011
Answer: d d) 11111
Explanation: The total number of patterns that can View Answer
be formed using n-bits are 2n. Here, possible
patterns are: 28=256. Answer: a
Explanation: >> is the bitwise left shift operator in
1. Which of the following is used for binary binary arithmetic.
multiplication? Applying >>(left-shift) by 3-bits on the number
a) Restoring Multiplication 11001 will result in 3 zeroes on the right, i.e.,
b) Booth’s Algorithm 01000.
c) Pascal’s Rule
d) Digit-by-digit multiplication 5. Booth’s Algorithm is applied on
View Answer _____________
a) decimal numbers
Answer: b b) binary numbers
Explanation: The Booth’s Algorithm is used for the c) hexadecimal numbers
multiplication of binary numbers. It is basically d) octal Numbers
used for the multiplication of 2 signed numbers. View Answer
This is a very important algorithm in binary
arithmetic. Answer: b
Explanation: Booth’s Algorithm is applied only on
22
signed and unsigned binary numbers. c) -2
Although, the values of other number systems can d) -3
be converted to binary, and then the multiplication View Answer
could be performed.
Answer: a
6. If Booth’s Multiplication is performed on the Explanation: After applying the procedure of
numbers 22*3, then what is 3 referred to as Booth’s Algorithm, the value obtained will be 6.
__________ Even though the result is obtained in its 2’s
a) accumulator complement for but then it is reconverted to its
b) multiplicand normalized form. Also, the value obtained after
c) quotient decimal multiplication is the same as the value
d) multiplier obtained after binary multiplication.
View Answer
10. What does the data transfer instruction STA
Answer: d stand for?
Explanation: It is referred to as the multiplier. a) Store Accumulator
Multiplier is denoted by Q in booth’s algorithm. 22 b) Send Accumulator
is called the multiplicand. These numbers are first c) Send Action
converted to their binary equivalents and further d) Store Action
the multiplication is performed. View Answer
Answer: b Answer: a
Explanation: The two main IEEE formats are 16- Explanation: The 64-bit format is referred to as the
bit and 32-bit. No format of 4-bit exists. Further, 8- double precision format. It has 1 sign bit, 8
bit format also exists. exponent bits and 23 bits for the mantissa.
In IEEE format, there are certain bits allotted to
sign, exponent and mantissa. 7. What is NaN in IEEE standards?
a) Not arithmetic
3. The result of 0 – 1 in binary is b) Not a negation
______________ c) Not a number
a) 0 d) Not a Node
b) 1 View Answer
c) 11
d) 10 Answer: c
View Answer Explanation: It stands for not a number in IEEE
standards. A NaN is obtained whenever a result id
Answer: b indeterminate like whenever anything is divided by
Explanation: The binary subtraction 0 – 1 gives the 0.
result 1. A borrow of 1 is although generated and is
removed from the next higher column. 8. The result that is smaller than the smallest
number obtained is referred to as ___________
4. The complement of any number can be given a) NaN
by a general term _______________ b) Underflow
a) Bn – 1 – N c) Smallest
b) Bn -1 + N d) Mantissa
c) Bn +1 – N View Answer
d) Bn +1 + N
View Answer Answer: b
Explanation: It is referred to as underflow. Nan
Answer: a stands for not a number. The mantissa is the part
Explanation: Complement of a number can be after the decimal.
given by the term :
C= Bn – 1 – N. 9. The number of sign bits in a 32-bit IEEE format
Here, _________
B= base a) 1
n= number of digits b) 11
N= the number. c) 9
d) 23
5. The IEEE standard followed by almost all the View Answer
computers for floating point arithmetic _____
a) IEEE 260 Answer: a
b) IEEE 488 Explanation: There is only 1 sign bit in all the
c) IEEE 754 standards. In a 32-bit format, there is 1 sign bit, 8
d) IEEE 610 bits for the exponent and 23 bits for the mantissa.
View Answer
25
10. Express the decimal format of the signed c) Multiplicand
binary number (101010)2 . d) Multiplier
a) 10 View Answer
b) 12
c) -12 Answer: d
d) -10 Explanation: 111 is called the multiplier.
View Answer Whenever a multiplication is performed the second
term is called the multiplier whereas the first term
Answer: d is called the multiplicand.
Explanation: The first bit is the sign bit whereas
the rest of the bits are magnitude bits. So the 5. The result obtained on binary multiplication of
number is: 01010 =23 * 1 + 21 * 1 =8+2 =10. 1010 * 1100 is _____________
But, the sign bit is 1 , a) 0001111
Therefore the answer is : (-2)10. b) 0011111
c) 1111100
1. Perform binary addition of 1101 + 0010 is d) 1111000
________ View Answer
a) 1110
b) 1111 Answer: d
c) 0111 Explanation: The solution is as follows :
d) 1,1101 1010
View Answer * 1100
________
Answer: b 0000
Explanation: The addition is performed as : 0000
1101 1010
+ 0010 1010
_______ _______
1111 1111000
Therefore, the result is 1111.
6. Which of the following is often called the
2. The addition 1+1 gives 0 as a result. double precision format?
a) True a) 64-bit
b) False b) 8-bit
View Answer c) 32-bit
d) 128-bit
Answer: a View Answer
Explanation: The two result obtained is 0 with a
carry of 1. This carry is transferred to the next Answer: a
higher column. Explanation: The 64-bit format is referred to as the
double precision format. It has 1 sign bit, 8
3. The result of 0*1 in binary is ____________ exponent bits and 23 bits for the mantissa.
a) 0
b) 1 7. What do you call the intermediate terms in
c) invalid binary multiplication?
d) 10 a) Multipliers
View Answer b) Mid terms
c) Partial Products
Answer: a d) Multiplicands
Explanation: The binary multiplication of any View Answer
number with 0 will give the result 0 itself. Any
binary number when multiplied by 0 gives 0 only. Answer: c
e.g. 1101 * 0000 = 0000. Explanation: The intermediate terms are called
partial terms. The mid terms obtained in the binary
4. The multiplication of 110 * 111 is performed. multiplications are the partial ones whereas the
What is a general term used for 111? answer obtained is called the final product.
a) Dividend
b) Quotient
26
8. The result that is smaller than the smallest 2. Boolean Algebra can deal with any number
number obtained is referred to as ___________ system.
a) NaN a) True
b) Underflow b) False
c) Smallest View Answer
d) Mantissa
View Answer Answer: b
Explanation: Boolean Algebra can only be used
Answer: b with the binary number system. Boolean deals with
Explanation: It is referred to as underflow. Nan only two values 0 and 1. In Boolean System, if the
stands for not a number. Mantissa is the part after result is tautology it returns 1 otherwise 0.
the decimal.
3. The symbol + in Boolean is also known as the
9. The number of sign bits in a 32-bit IEEE format ____________ operator.
is _______ a) AND
a) 1 b) OR
b) 11 c) ADD
c) 9 d) SUMMATION
d) 23 View Answer
View Answer
Answer: b
Answer: a Explanation: The symbol + is also called as the OR
Explanation: There is only 1 sign bit in all the operator. It is used for logical addition. It follows
standards. In a 32-bit format, there is 1 sign bit, 8 the law of binary addition.
bits for the exponent and 23 bits for the mantissa.
advertisement 4. Which operator has the highest precedence?
a) +
10. Express the decimal format of the signed b) .
binary number (101010)2 . c) !
a) 10 d) *
b) 12 View Answer
c) -12
d) -10 Answer: c
View Answer Explanation: The NOT operator has the highest
precedence. It is denoted by ! or – sign. Further,
Answer: d AND (.) operations are performed and then the OR
Explanation: The first bit is the sign bit whereas terms are evaluated.
the rest of the bits are magnitude bits. So the
number is: 01010 =23 * 1 + 21 * 1 =8+2 =10. 5. In the expression Y + X’.Y, which operator will
But , the sign bit is 1, be evaluated first?
Therefore the answer is : (-2)10. a) ‘
b) +
c) .
1. The number of values applicable in Boolean d) ,
Algebra. View Answer
a) 1
b) 2 Answer: a
c) 3 Explanation: In Boolean Algebra, complement of a
d) 4 number is given the highest precedence. Therefore,
View Answer complement which is denoted by the ‘ (apostrophe)
symbol is evaluated first.
Answer: b
Explanation: Boolean algebra is based on binary 6. Which of the following is false?
number system. It therefore comprises only 2 bits : a) x+y=y+x
0 and 1. Hence, only two values are applicable to b) x.y=y.x
Boolean algebra. c) x.x’=1
d) x+x’=1
View Answer
27
Answer: c Answer: a
Explanation: The first and second option describes Explanation: The Boolean functions are
the commutative law. The fourth option holds true represented using the truth tables. Truth tables
since if x=1, then x’=0, and x+x’=1. Third option represent the tautology and fallacy for terms.
is incorrect because on multiplication of a boolean
value with its complement the result will always be 1. Boolean Function is of the form of ________
0. a) Truth values
b) K=f(X,Y,X)
7. As per idempotent law, X + X will always be c) Algebraic Expression
equal to ________ d) Truth Table
a) 0 View Answer
b) 1
c) X Answer: a
d) 2X Explanation: The boolean function is of the form
View Answer of algebraic expressions or truth table. A boolean
function is of the form as that of option 2. The
Answer: c result obtained from a boolean function can be a
Explanation: It will always return the same value truth value or a fallacy.
X. Since, boolean deals with only two numbers 0
and 1, if we add 0+0, the answer is 0. Similarly, if 2. The result of X+X.Y is X.
we add 1+1 the answer is 1. a) True
b) False
8. The expression for involution law is _________ View Answer
a) x+y=y+x
b) x+1=1 Answer: a
c) (x’)’=x Explanation: This is a boolean expression. It can be
d) x.x=x evaluated as :
View Answer X+X.Y = X(1+Y) = X.
Since 1+Y=1 by boolean laws.
Answer: c
Explanation: The involution law states that the 3. In the boolean function w=f(X,Y,Z), what is the
complement of complement of a number is the RHS referred to as ________
number itself. The third option justifies the a) right hand side
statement. Thus, (x’)’=x. b) expression
c) literals
9. Who proposed the use of Boolean algebra in d) boolean
the design of relay switching circuits? View Answer
a) George Boole
b) Claude E. Shannon Answer: b
c) Claude E. Boole Explanation: The RHS is commonly referred to as
d) George Shannon the expression. The symbols X, Y and Z are
View Answer commonly referred to as the literals of the function.
4. The corresponding min term when x=0, y=0 8. The number of cells in a K-map with n-
and z=1. variables.
a) x.y.z’ a) 2n
b) X’+Y’+Z b) n2
c) X+Y+Z’ c) 2n
d) x’.y’.z d) n
View Answer View Answer
Answer: d Answer: c
Explanation: The min term is obtained by taking Explanation: K-map is nothing but Karnaugh map.
the complement of the zero values and taking the SOP and POS expressions can be simplified using
term with value 1 as it is. the K-map.
Here, x=0,y=0 and z=1, then the min term is x’y’z. The number of cells in case of n-variables=2n.
5. LSI stands for ___________ 9. The output of AND gates in the SOP
a) Large Scale Integration expression is connected using the ________ gate.
b) Large System Integration a) XOR
c) Large Symbolic Instruction b) NOR
d) Large Symbolic Integration c) AND
View Answer d) OR
View Answer
Answer: a
Explanation: It stands for large scale integration. Answer: d
This is the abstraction level of the integrated Explanation: Since the product terms or the min
circuits. terms are added in an SOP expression.
It can also be small scale, medium, large or very Therefore, the OR gate is used to connect the AND
large scale integration. gates.
6. Which operation is shown in the following 10. The expression A+BC is the reduced form of
expression: (X+Y’).(X+Z).(Z’+Y’) ______________
a) NOR a) AB+BC
b) ExOR b) (A+B)(A+C)
c) SOP c) (A+C)B
d) POS d) (A+B)C
View Answer View Answer
Answer: c Answer: b
Explanation: The expression comprises of max Explanation: The second option is correct.
terms. It can simplified as follows: (A+B)(A+C)
Also, the terms are ANDed together, therefore it is =AA+AC+AB+BC
a POS term. =A+AC+AB+BC
=A(1+C)+AB+BC
7. The number of min terms for an expression =A+AB+BC
comprising of 3 variables? =A(1+B)+BC
a) 8 =A+BC.
b) 3
c) 0 1. Electronic circuits that operate on one or more
d) 1 input signals to produce standard output _______
View Answer a) Series circuits
b) Parallel Circuits
Answer: a c) Logic Signals
Explanation: If any expression comprises of n d) Logic Gates
variables, its corresponding min terms are given by View Answer
2n.
30
Answer: d output from 0 to 1 and vice-versa.
Explanation: The logic gates operate on one or The Boolean expression for NOT gate is Y=A’.
more input signals to produce a standard output. Therefore, it gives the complement of the result
Logic gates give the output in the form of 0 and 1. obtained.
The Boolean algebra can be applied to the logic
gates. 6. Which of the following gate will give a 0 when
both of its inputs are 1?
2. Logic Gates are the building blocks of all a) AND
circuits in a computer. b) OR
a) True c) NAND
b) False d) EXOR
View Answer View Answer
Answer: a Answer: c
Explanation: The statement is true. Explanation: The NAND gate gives 0 as the output
Logic gates are idealized to implement a boolean when both of its inputs are 1 or any one of the
function in all circuits of a computer. input is 1.
The signals are directed as per the outputs of the It returns a 1 only if both the inputs are 0.
logic gates in the form of 0 and 1.
7. When logic gates are connected to form a
3. A __________ gate gives the output as 1 only if gating/logic network it is called as a
all the inputs signals are 1. ______________ logic circuit.
a) AND a) combinational
b) OR b) sequential
c) EXOR c) systematic
d) NOR d) hardwired
View Answer View Answer
Answer: a Answer: a
Explanation: The AND gate gives a 1 only if all Explanation: It is referred to as a combinational
the input signals are 1. circuit as it comprises a number of gates.
The Boolean expression for evaluating an AND It is connected to evaluate a result of a Boolean
signal is: Y=A.B. expression.
4. The boolean expression of an OR gate is 8. The universal gate that can be used to
_______ implement any Boolean expression is __________
a) A.B a) NAND
b) A’B+AB’ b) EXOR
c) A+B c) OR
d) A’B’ d) AND
View Answer View Answer
Answer: c Answer: a
Explanation: An OR gate gives the result as 1 if Explanation: NAND gate can be used to implement
any one of the inputs is one. any Boolean expression.
Its expression is A+B. It is a universal gate. A universal gate can be used
An OR gate gives a 0 only if both the inputs are 0. to implement any other Boolean function without
using any other logic gate.
5. The gate which is used to reverse the output
obtained is _____ 9. The gate which is called an inverter is called
a) NOR _________
b) NAND a) NOR
c) EXOR b) NAND
d) NOT c) EXOR
View Answer d) NOT
View Answer
Answer: d
Explanation: NOT gate is used to reverse the
31
Answer: d It gives a HIGH output only in one case when all
Explanation: Inverter is used to reverse the output. the inputs given to it are LOW.
A NOT gate is used to invert or change the output
from 0 to 1 and vice-versa. 4. The following figure shows a ___________
gate.
10. The expression of an EXOR gate is
____________
a) A’B+AB’
b) AB+A’B’
c) A+A.B
d) A’+B’
a) NOR
View Answer
b) NAND
c) EXOR
Answer: a d) OR
Explanation: The expression for an EXOR gate is View Answer
A’B+AB’.
An EXOR gate is nothing but an exclusive OR
Answer: a
gate.
Explanation: The figure is that of a NOR gate.
The bubble signifies that it is a NOR gate.
1. A ____________ is a circuit with only one It is a type of universal gate and can be used to
output but can have multiple inputs. implement all the boolean expressions.
a) Logic gate
b) Truth table
5. The complement of the input given is obtained
c) Binary circuit
in case of:
d) Boolean circuit
a) NOR
View Answer
b) AND+NOR
c) NOT
Answer: a d) EX-OR
Explanation: A logic gate is used to evaluate a View Answer
Boolean expression.
It can have multiple inputs but can have only one
Answer: c
output.
Explanation: The NOT gate, also called as the
The different types of logic gates are AND, OR,
inverter gate is used to reverse the input which is
NOT etc.
given.
It gives an inverted output, thus gives the
2. There are 5 universal gates. complement.
a) True Expression for NOT gate: Y=A’, where A is the
b) False input.
View Answer
6. How many AND gates are required to realize
Answer: b the following expression Y=AB+BC?
Explanation: There are only 2 main universal a) 4
gates: NAND and NOR. b) 8
A NAND gate as well as the NOR gate can be used c) 1
to implement any other Boolean expression thus it d) 2
is called as a universal gate. View Answer
3. The Output is LOW if any one of the inputs is Answer: d
HIGH in case of a _________ gate. Explanation: 2 AND gates are required to realize
a) NOR the expression.
b) NAND 1 AND gate will be used to connect the inputs A
c) OR and B whereas the other will be used to connect the
d) AND inputs B and C.
View Answer
7. Number of outputs in a half adder
Answer: b _____________
Explanation: In case of a NAND gate the output is a) 1
LOW if any one of the inputs is HIGH (i.e. 1).
32
b) 2 c) Central Processing Unit
c) 3 d) Memory
d) 0 View Answer
View Answer
Answer: c
Answer: b Explanation: The CPU is referred to as the brain of
Explanation: A half adder gives two outputs. a computer.
One is called the sum and the other is carry. It consists of a control unit and the arithmetic and
Half adder can be implemented using an EXOR logic unit. It is responsible for performing all the
gate and an AND gate. processes and operations.
8. The ________ gate is an OR gate followed by a 2. Control Unit acts as the central nervous system
NOT gate. of the computer.
a) NAND a) True
b) EXOR b) False
c) NOR View Answer
d) EXNOR
View Answer Answer: a
Explanation: The control unit is referred to as the
Answer: c central nervous system because it selects and
Explanation: A NOR gate is a universal gate which interprets the instructions and coordinates
is an OR gate followed by a NOT gate. execution.
It therefore reverses the output obtained by an OR
gate. 3. What does MBR stand for?
It can be used to implement any Boolean a) Main Buffer Register
expression. b) Memory Buffer Routine
c) Main Buffer Routine
9. The expression of a NAND gate is_______ d) Memory Buffer Register
a) A.B View Answer
b) A’B+AB’
c) (A.B)’ Answer: d
d) (A+B)’ Explanation: The binary subtraction 0 – 1 gives the
View Answer result 1.
A borrow of 1 is although generated and is
Answer: c removed from the next higher column.
Explanation: A NAND gate is an AND gate
followed by a NOT gate. 4. In the instruction ADD A, B, the answer gets
It therefore inverts the output of an AND gate. stored in ___________
NAND gate is also a universal gate. a) B
b) A
10. Which of the following correctly describes the c) Buffer
distributive law. d) C
a)( A+B)(C+D)=AB+CD View Answer
b) (A+B).C=AC+BC
c) (AB)(A+B)=AB Answer: b
d) (A.B)C=AC.AB Explanation: In any instruction of the form ADD
View Answer A, B; the answer gets stored in the A register. The
format is: ADD Destination, Source.
Answer: b
Explanation: The second option correctly describes 5. What does PC stand for?
the distributive law. a) Program Changer
(A+B).C =AC+BC. b) Program Counter
Boolean Laws are used to implementing and c) Performance Counter
simplifying Boolean expression. d) Performance Changer
View Answer
1. Brain of computer is ____________
a) Control unit Answer: b
b) Arithmetic and Logic unit Explanation: The Program counter contains the
33
address of the next instruction which is to be Sequencing is traversing each and every operation
fetched by the control unit. whereas execution causes the performance of each
All other options are invalid. operation.
6. Which of the following holds the last 10. What does D in the D-flip flop stand for?
instruction fetched? a) Digital
a) PC b) Direct
b) MAR c) Delay
c) MBR d) Durable
d) IR View Answer
View Answer
Answer: c
Answer: d Explanation: In the hardwired control unit, the
Explanation: The IR which stands for the delay element method uses D-flip flop which
instruction register contains the last instruction causes a delay. Since, in the delay element method,
fetched. there must be a finite time gap between the 2 steps.
All the others options are registers which are used
for the fetch operation. 1. CPU has built-in ability to execute a particular
set of machine instructions, called as __________
7. The portion of the processor which contains the a) Instruction Set
hardware required to fetch the operations is b) Registers
_______ c) Sequence Set
a) Datapath d) User instructions
b) Processor View Answer
c) Control
d) Output unit Answer: a
View Answer Explanation: An instruction is any task which is to
be performed by the processor. Instructions are
Answer: a stored in the register. Instruction set is the set of
Explanation: The datapath contains the hardware machine instructions.
required to fetch the operations. The control tells
the data path what needs to be done. 2. Opcode indicates the operations to be
performed.
8. Causing the CPU to step through a series of a) True
micro operations is called _________ b) False
a) Execution View Answer
b) Runtime
c) Sequencing Answer: a
d) Pipelining Explanation: Every instruction has an opcode.
View Answer Additionally, it may have one or more operands
and the op code indicates the operation to be
Answer: c performed.
Explanation: Sequencing is the process of causing
the CPU to step through a series of micro 3. The length of a register is called _______
operations. Execution causes the performance of a) word limit
each micro operation. b) word size
c) register limit
9. The functions of execution and sequencing are d) register size
performed by using ______________ View Answer
a) Input Signals
b) Output Signals Answer: b
c) Control Signals Explanation: The length of a register is called word
d) CPU size. It tells the number of bits a register can store.
View Answer Registers are a part of the CPU.
35
3. Whenever the data is found in the cache c) Write within
memory it is called as _________ d) Buffered write
a) HIT View Answer
b) MISS
c) FOUND Answer: a
d) ERROR Explanation: Snoopy writes is the efficient method
View Answer for updating the cache. In this case, the cache
controller snoops or monitors the operations of
Answer: a other bus masters.
Explanation: Whenever the data is found in the
cache memory, it is called as Cache HIT. CPU first 8. In ____________ mapping, the data can be
checks in the cache memory since it is closest to mapped anywhere in the Cache Memory.
the CPU. a) Associative
b) Direct
4. LRU stands for ___________ c) Set Associative
a) Low Rate Usage d) Indirect
b) Least Rate Usage View Answer
c) Least Recently Used
d) Low Required Usage Answer: a
View Answer Explanation: This happens in the associative
mapping. In this case, a block of data from the
Answer: c main memory can be mapped anywhere in the
Explanation: LRU stands for Least Recently Used. cache memory.
LRU is a type of replacement policy used by the
cache memory. 9. The number of sign bits in a 32-bit IEEE format
is ____
5. When the data at a location in cache is different a) 1
from the data located in the main memory, the b) 11
cache is called _____________ c) 9
a) Unique d) 23
b) Inconsistent View Answer
c) Variable
d) Fault Answer: a
View Answer Explanation: There is only 1 sign bit in all the
standards. In a 32-bit format, there is 1 sign bit, 8
Answer: b bits for the exponent and 23 bits for the mantissa.
Explanation: The cache is said to be inconsistent.
Inconsistency must be avoided as it leads to serious 10. The transfer between CPU and Cache is
data bugs. ______________
a) Block transfer
6. Which of the following is not a write policy to b) Word transfer
avoid Cache Coherence? c) Set transfer
a) Write through d) Associative transfer
b) Write within View Answer
c) Write back
d) Buffered write Answer: b
View Answer Explanation: The transfer is a word transfer. In the
memory subsystem, word is transferred over the
Answer: b memory data bus and it typically has a width of a
Explanation: There is no policy which is called as word or half-word.
the write within policy. The other three options are
the write policies which are used to avoid cache 1. Computer has a built-in system clock that emits
coherence. millions of regularly spaced electric pulses per
_____ called clock cycles.
7. Which of the following is an efficient method a) second
of cache updating? b) millisecond
a) Snoopy writes c) microsecond
b) Write through
36
d) minute Answer: b
View Answer Explanation: CISC is a large instruction set
computer. It has variable length instructions. It also
Answer: a has variety of addressing modes.
Explanation: The regularly spaced electric pulses
per second are referred to as the clock cycles. All 6. Which of the following processor has a fixed
the jobs performed by the processor are on the length of instructions?
basis of clock cycles. a) CISC
b) RISC
2. It takes one clock cycle to perform a basic c) EPIC
operation. d) Multi-core
a) True View Answer
b) False
View Answer Answer: b
Explanation: The RISC which stands for Reduced
Answer: a Instruction set computer has a fixed length of
Explanation: It takes exactly one clock cycle to instructions. It has a small instruction set. Also has
perform a basic operation, such as moving a byte reduced references to memory to retrieve operands.
of memory from a location to another location in
the computer. 7. Processor which is complex and expensive to
produce is ________
3. The operation that does not involves clock a) RISC
cycles is _________ b) EPIC
a) Installation of a device c) CISC
b) Execute d) Multi-core
c) Fetch View Answer
d) Decode
View Answer Answer: c
Explanation: CISC stands for complex instruction
Answer: a set computer. It is mostly used in personal
Explanation: Normally, several clock cycles are computers. It has a large instruction set and a
required to fetch, execute and decode a particular variable length of instructions.
program.
Installation of a device is done by the system on its 8. The architecture that uses a tighter coupling
own. between the compiler and the processor is
____________
4. The number of clock cycles per second is a) EPIC
referred as ________ b) Multi-core
a) Clock speed c) RISC
b) Clock frequency d) CISC
c) Clock rate View Answer
d) Clock timing
View Answer Answer: a
Explanation: EPIC stands for Explicitly parallel
Answer: a instruction computing. It has a tighter coupling
Explanation: The number of clock cycles per between the compiler and the processor. It enables
second is the clock speed. It is generally measured the compiler to extract maximum parallelism in the
in gigahertz(109 cycles/sec) or megahertz (106 original code.
cycles/sec).
9. MAR stands for ___________
5. CISC stands for ____________ a) Memory address register
a) Complex Information Sensed CPU b) Main address register
b) Complex Instruction Set Computer c) Main accessible register
c) Complex Intelligence Sensed CPU d) Memory accessible register
d) Complex Instruction Set CPU View Answer
View Answer
Answer: a
Explanation: The MAR stands for memory address
37
register. It holds the address of the active memory a) Cache
location. b) Main
c) Secondary
10. A circuitry that processes that responds to and d) Registers
processes the basic instructions that are required to View Answer
drive a computer system is ________
a) Memory Answer: b
b) ALU Explanation: The main memory is implemented
c) CU using semiconductor chips. Main memory is
d) Processor located on the motherboard. It mainly consists of
View Answer RAM and small amount of ROM.
8. What is the location of the internal registers of 2. It takes one clock cycle to perform a basic
CPU? operation.
a) Internal a) True
b) On-chip b) False
c) External View Answer
d) Motherboard
View Answer Answer: a
Explanation: It takes exactly one clock cycle to
Answer: b perform a basic operation, such as moving a byte
Explanation: The internal registers are present on- of memory from a location to another location in
chip. They are therefore present inside the CPU. the computer.
L1 cache is also present on-chip inside the CPU.
3. The operation that does not involves clock
9. MAR stands for ___________ cycles is ____________
a) Memory address register a) Installation of a device
b) Main address register b) Execute
c) Main accessible register c) Fetch
d) Memory accessible register d) Decode
View Answer View Answer
Answer: a Answer: a
Explanation: The MAR stands for memory address Explanation: Normally, several clock cycles are
register. It holds the address of the active memory required to fetch, execute and decode a particular
location. program. Installation of a device is done by the
system on its own.
10. If M denotes the number of memory locations
and N denotes the word size, then an expression 4. The number of clock cycles per second is
that denotes the storage capacity is referred as ______
______________ a) Clock speed
a) M*N b) Clock frequency
b) M+N c) Clock rate
c) 2M+N d) Clock timing
d) 2M-N View Answer
View Answer
Answer: a
Answer: a Explanation: The number of clock cycles per
Explanation: Storage capacity is the product of a second is the clock speed. It is generally measured
number of memory locations that is the number of in gigahertz(109 cycles/sec) or megahertz (106
words and the word size or the number of bits cycles/sec).
stored per location. Storage capacity should be as
large as possible. 5. CISC stands for ___________
a) Complex Information Sensed CPU
1. Computer has a built-in system clock that emits b) Complex Instruction Set Computer
millions of regularly spaced electric pulses per c) Complex Intelligence Sensed CPU
_____ called clock cycles. d) Complex Instruction Set CPU
a) second View Answer
b) millisecond
c) microsecond Answer: b
d) minute Explanation: CISC is a large instruction set
View Answer computer. It has variable length instructions. It also
has a variety of addressing modes.
Answer: a
Explanation: The regularly spaced electric pulses 6. Which of the following processor has a fixed
per second are referred to as the clock cycles. All length of instructions?
a) CISC
39
b) RISC c) 8 bits
c) EPIC d) 32 bits
d) Multi-core View Answer
View Answer
Answer: c
Answer: b Explanation: The word length which is the size of a
Explanation: The RISC which stands for Reduced word is generally 8 bits in a personal computer.
Instruction set computer has a fixed length of Word Size is generally the number of bits that can
instructions. It has a small instruction set. Also has be processed in one go by the CPU.
reduced references to memory to retrieve operands.
1. ________________ is also called auxiliary
7. Processor which is complex and expensive to storage.
produce _________ a) secondary memory
a) RISC b) tertiary memory
b) EPIC c) primary memory
c) CISC d) cache memory
d) multi-core View Answer
View Answer
Answer: a
Answer: c Explanation: The secondary memory which allows
Explanation: CISC stands for complex instruction us to store a large amount of data is often referred
set computer. It is mostly used in personal to as the auxiliary memory. It generally stores large
computers. It has a large instruction set and a amount of data on a permanent basis.
variable length of instructions.
2. Secondary storage virtually has an unlimited
8. The architecture that uses a tighter coupling capacity because the cost per bit is very low.
between the compiler and the processor. a) True
a) EPIC b) False
b) Multi-core View Answer
c) RISC
d) CISC Answer: a
View Answer Explanation: The statement is true as secondary
storage devices can store large amounts of data
Answer: a temporarily. It is used to overcome the limitations
Explanation: EPIC stands for Explicitly parallel of primary storage.
instruction computing. It has a tighter coupling
between the compiler and the processor. It enables 3. Magnetic tape is a type of _________ access
the compiler to extract maximum parallelism in the device.
original code. a) Sequential
b) Direct access
9. HLDA stands for _______ c) Step
a) High level data d) Indirect
b) High level data acknowledgment View Answer
c) Hold Acknowledgement
d) Hold Data Answer: a
View Answer Explanation: Magnetic tapes are sequential access
devices. They are the secondary storage devices
Answer: c and are used to store large amounts of data. In
Explanation: The HOLD signal is given to the sequential access, data can be retrieved in the same
CPU whenever an interrupt is to be served. If the sequence in which it is stored.
CPU is ready to give the control of the bus, it gives
the HLDA command which is Hold 4. The magnetic tape is generally a plastic ribbon
Acknowledgement. coated with ______
a) Magnesium oxide
10. Word length of a personal computer b) Chromium dioxide
___________ c) Zinc oxide
a) 64bits d) Copper oxide
b) 16 bits View Answer
40
Answer: b d) Data mode
Explanation: Plastic ribbon is coated with a View Answer
magnetizable recording material. Iron oxide and
chromium dioxide is generally used in magnetic Answer: a
tapes. Data are recorded on the tape in the form of Explanation: Transfer rate measurement unit is
tiny invisible dots. bytes/second(bps). Value depends on the data
recording density and the speed with which the
5. The dots on the magnetic tape represent tape travels under the read/write head.
________
a) Binary digits 9. The typical value of data transfer rate is
b) Decimal digits __________
c) Hex digits a) 7.7 MB/s
d) Oct digits b) 6.6 MB/s
View Answer c) 5.5 MB/s
d) 10 MB/s
Answer: a View Answer
Explanation: The data recorded on the tape is the
form of tiny invisible magnetized and non- Answer: a
magnetized spots (representing 1s and 0s) on its Explanation: Data transfer rate is defined as the
coated surface. number of characters per second that can be
transmitted to the memory from tape. The typical
6. Which of the following is the correct value is 7.7 megabytes per second.
representation for a storage capacity of a tape?
a) Data recording density = Storage capacity 10. Tape drive is connected to and controlled by
b) Length = Storage capacity _______
c) Storage capacity= Length * data recording a) Interpreter
density b) Tape controller
d) Storage capacity= Length + data recording c) CPU
density d) Processor
View Answer View Answer
Answer: c Answer: b
Explanation: Storage capacity is nothing but the Explanation: The tape drive is connected to and
product of length and the data recording density. controlled by a tape controller that interprets the
Magnetic tape is commonly used sequential-access commands for operating the tape drive. Certain
secondary device. Data recording density is commonly used commands are read, write, erase
measured in bytes per inch. tape, etc.
Answer: c Answer: b
Explanation: Data recording density is the amount Explanation: The magnetic tape ribbon is used for
of data that can be stored on a given length of the the same. It has read/write heads for
tape. It is measured in bytes per inch. Bytes per reading/writing of data on the tape. When
inch=bpi. processing is complete, the tape is removed from
the tape drive for off-line storage.
8. The number of characters/second that can be
transmitted to the memory from the tape is denoted 2. Magnetic disk is a sequential access device.
by the term. a) True
a) Data transfer rate b) False
b) Transmission mode View Answer
c) Transmission rate
41
Answer: b Answer: a
Explanation: It is a direct access secondary storage Explanation: Disk address represents the physical
device. In case of direct access devices, the storage location of the record on the disk. It is comprised
location may be selected and accessed at random. of the sector number, track number, and surface
number (when double-sided disks are used).
3. The disk’s surface is divided into a number of
invisible concentric circles called: 7. What does CHS stand for?
a) Drives a) Cylinder-high-sector
b) Tracks b) Concentric-head-sector
c) Slits c) Cylinder-head-sector
d) References d) Concentric-high-sector
View Answer View Answer
Answer: b Answer: c
Explanation: The concentric circles are called as Explanation: CHS stands for cylinder-head-sector.
tracks. The tracks are numbered consecutively The scheme is called CHS addressing. The same is
from outermost to innermost starting from zero. also referred to as disk geometry.
The number of tracks on a disk may be as few as
40 on small-capacity disks to several thousand on 8. The interval between the instant a computer
large capacity disks. makes a request for the transfer of data from a disk
system to the primary storage and the instance this
4. The number of sectors per track on a magnetic operation is completed is called _________
disk ________ a) Disk arrival time
a) less than 5 b) Disk access time
b) 10 or more c) Drive utilization time
c) 8 or more d) Disk utilization time
d) less than 7 View Answer
View Answer
Answer: b
Answer: c Explanation: The interval is referred to as the disk
Explanation: Each track of a disk is subdivided arrival time. It depends on several parameters.
into sectors. There are 8 or more sectors per track. Generally, a computer makes a request and the
Disk drives are designed to read/write only whole operation is served.
sectors at a time.
9. Disk access time does not depends on which of
5. Generally there are __________bytes in a the following factors __________
sector. a) Seek time
a) 64 b) Latency
b) 128 c) Transfer rate
c) 256 d) Arrival rate
d) 512 View Answer
View Answer
Answer: d
Answer: d Explanation: The disk access time depends on the
Explanation: Each track of a disc is divided into seek time, latency and transfer rate. Wherein, seek
sectors. A sector typically contains 512 bytes. Disk time is the time required to position the read/write
drives are designed to read/write only whole head over the desired track.
sectors at a time.
10. The time required to spin the desired sector
6. Which of the following is not a part of disk under the read/write head, once the read/write head
address? is positioned on the desired track.
a) Sector size a) Seek time
b) Sector number b) Arrival rate
c) Track number c) Latency
d) Surface number d) Transfer rate
View Answer View Answer
42
Answer: c Answer: a
Explanation: It is called latency. It is one of the Explanation: The storage capacity is given by the
factors on which the disk access time depends. formula in option a. The most popular disk uses a
Disk access time is the interval between the instant disk of 5.25 inch diameter with a storage capacity
a request is made and the instance operation is of around 650 megabytes.
completed.
5. Rotation of the disk must vary __________
1. A ____________ disk consists of a circular with the radius of the disk.
disk, which is coated with a thin metal or some a) directly
other material that is highly reflective. b) inversely
a) magnetic c) concurrently
b) optical d) accordingly
c) compact View Answer
d) hard
View Answer Answer: b
Explanation: The rotation speed is inversely
Answer: b proportional to the radius of the disk.
Explanation: Optical disks are highly reflective. Optical drives use a constant linear velocity
They can be used to store extremely large amounts encoding scheme often referred to as the CLV
of data in a limited space. scheme.
2. Optical disks are proved to be a promising 6. Which of the following correctly represents the
random access medium for high capacity track pattern of an optical disk ?
secondary storage.
a) True
b) False
View Answer
Answer: a
Explanation: Optical disks can store large amounts a)
of data. The storage capacity depends on the
sectors and the number of bytes.
Answer: c
Explanation: Laser beam technology is used in
optical disks for recording or reading of data on the c)
disk.
It is sometimes called the laser disk/optical laser
disk due to the use of laser beam technology.
43
7. The tracks are divided into sectors whose size 1. Winchester disks are a type of _______
_______ a) optical disks
a) remains the same b) magnetic disks
b) keeps increasing c) compact disks
c) keeps decreasing d) magnetic drives
d) remains uneven View Answer
View Answer
Answer: b
Answer: a Explanation: The regularly spaced electric pulses
Explanation: The tracks in an optical disk are per second are referred to as the clock cycles. All
divided into equal size sectors. Optical disk has the jobs performed by the processor are on the
one long spiral track, which starts at the outer edge basis of clock cycles.
and spirals inward to the center. Each sector is of
the same length regardless of whether it is located 2. Bernoulli disks are a type of magnetic floppy
near or away from the disk’s center. disks.
a) True
8. CLV stands for, in terms of rotation of the b) False
optical disk ___ View Answer
a) Concurrent lines value
b) Constant Linear velocity Answer: b
c) constant linear value Explanation: Bernoulli disks are a type of magnetic
d) concurrent linear velocity hard disks and not floppy disks. They are also
View Answer called as zip disks. It uses a single hard disk platter
encased in a plastic cartidge.
Answer: a
Explanation: It stands for constant linear velocity. 3. A plug and play storage device that simply
The optical disk uses the CLV encoding scheme. plugs in the port of a computer is __________
Rotation speed depends on the radius of the disk. a) Flash drive
b) Compact disk
9. The range of access times of optical disks is c) Hard disk
generally ______ d) CD
a) 100 to 300 milliseconds View Answer
b) 10 to 30 milliseconds
c) 200 to 400 milliseconds Answer: a
d) 20 to 40 milliseconds Explanation: A flash drive often called as a pen
View Answer drive enables easy transport of data from one
computer to another. It comes in various shapes
Answer: a and sizes and may have different added features.
Explanation: The access times of optical disks are
typically in the range of 100 to 300 milliseconds 4. What does USB stand for?
and that of hard disks are in the range of 10 to 30 a) Universal Signal Board
milliseconds. b) Universal Signal Bus
c) Universal Serial Bus
10. Which of the following is not a type of optical d) Universal Serial Board
disk? View Answer
a) DVD
b) CD Answer: c
c) WORM Explanation: USB stands for universal serial bus.
d) Winchester A flash drive simply plugs in the USB port of a
View Answer computer.
Answer: b Answer: d
Explanation: RAID is Redundant array of Explanation: Flash drives are a type of memory
inexpensive disks. It is an array of disks which can storage devices. It is a relatively newer type of
store data bits. secondary storage device which enables easy
transfer of data from one computer to another.
7. A set of hard disk drives with a controller
mounted in a single box, forming a single large 1. These devices provide a means of
storage unit is ____________ communication between a computer and outer
a) Disk array world.
b) Drives a) I/O
c) Compact drives b) Storage
d) Multi-cores c) Compact
View Answer d) Drivers
View Answer
Answer: a
Explanation: The answer is disk array. It is Answer: a
commonly known as RAID. As a secondary Explanation: The I/O i.e. the input/output devices
storage device, provides enhanced performance, provide a means of communication between the
enhanced storage capacity and reliability. computer and the outer world. They are often
referred to as the peripheral devices sometimes.
8. The process in which a file is partitioned into
smaller parts and different parts are stored in 2. The I/O devices are sometimes called the
different disks is ____________ peripheral devices because they surround the CPU
a) RAID and memory of the computer system.
b) Mirroring a) True
c) Stripping b) False
d) RAID classification View Answer
View Answer
Answer: a
Answer: c Explanation: The statement is true. The input
Explanation: Enhanced reliability is achieved by devices are used to enter data from the outside
using techniques like mirroring and stripping in world into primary storage. The output devices
case of disk arrays. Stripping is the division of a supply results of processing from primary storage
large file into smaller parts and then storing them to users.
on different disks.
3. Identify the blank space in the diagram.
9. Which of the following uses multiple hard disk
platters mounted on a single central shift?
a) Disk drives
b) Hard disks
c) Disk packs a) Processor
d) Compact disks b) Memory
View Answer c) CPU
45
d) Storage d) Kiaks
View Answer View Answer
Answer: c Answer: a
Explanation: Firstly, the input is given to the input Explanation: The term information kiosks are used
device, then the data in coded in internal form and for the same. Touch screens are used the most
is sent to the CPU. Further, the processed data is preferred human-computer interface used in
sent to the output device and the result is obtained. information kiosks.
4. What does GUI stand for? 8. Which are the input devices that enable direct
a) Graphical User Instruction data entry into a computer system from source
b) Ground User Interface documents?
c) General User Instruction a) Data Scanning devices
d) Graphical User Interface b) Data retrieving devices
View Answer c) Data acquiring devices
d) System Access devices
Answer: d View Answer
Explanation: GUI stands for a graphical user
interface. Graphical user interface basically Answer: a
provides a set of graphical elements on the screen Explanation: They are referred to as data scanning
to the users. Commonly used for point-and-draw devices. They eliminate the need to key in text data
devices. into the computer. It demands the high quality of
input documents.
5. Which of the following is not a point-and-draw
device? 9. Which of the following is a type of image
a) Keypad scanner?
b) Trackball a) Flat-held
c) Touch screen b) Hand-led
d) Mouse c) Flat-bed
View Answer d) Compact
View Answer
Answer: a
Explanation: All except the keypad are point-and- Answer: c
draw devices. They are used to rapidly point to and Explanation: Image scanners are the input devices
select a graphic icon or menu item from multiple that translate the paper documents into an
options displayed on the GUI of a screen. electronic format for storage in a computer. Stored
image can be altered or manipulated with image-
6. A device used for video games, flight processing software.
simulators, training simulators and for controlling
industrial robots. 10. Which of the following is capable of
a) Mouse recognizing a pre-specified type of mark by pencil
b) Light pen or pen?
c) Joystick a) OMR
d) Keyboard b) Winchester
View Answer c) Bar code reader
d) Image Scanner
Answer: c View Answer
Explanation: Joystick is the device used for the
same. It is a point-and-draw device. It has a click Answer: a
button, a stick, a ball, a socket as well as a light Explanation: OMR stands for optical mark reader.
indicator. These are very useful for grading tests with
objective type questions or for any input data that
7. The unattended interactive information systems is of choice or selection nature.
such as automatic teller machine or ATM is called
as _________ 1. Input Devices that use a special ink that
a) Kiosks contains magnetizable particles of iron oxide are
b) Sioks ____
c) Cianto a) Optical disks
46
b) Magnetic disks d) Voice systems
c) MICR View Answer
d) Magnetic drives
View Answer Answer: c
Explanation: A speech synthesizer converts text
Answer: c information into spoken sentences. It is used for
Explanation: MICR reads data on cheques and reading out text information to blind people.
sorts them for distribution to other banks or for Allowing people to communicate effectively.
further processing. MICR stands for Magnetic-Ink-
Character Recognition. 6. Which of the following is not a part of a
digitizer?
2. MICR character set consists of only 2 digits 0 a) Digitizing tablet
and 1. b) Cursor
a) True c) Stick
b) False d) Stylus
View Answer View Answer
Answer: b Answer: c
Explanation: The statement is false. It consists of Explanation: A digitizer consists of a digitizing
numerals from 0 to 9 and 4 special characters. It tablet, a stylus in the form of a cross-hair cursor. A
supports only 14 symbols. digitizer is used in the areas of GIS.
3. A printer that prints one line at a time and has a 7. Which is the device used for converting maps,
predefined set of characters is called _______ pictures and drawings into digital form for storage
a) Laser in computers?
b) Drum a) Digitizer
c) Inkjet b) Scanner
d) Impact c) Image Scanner
View Answer d) MICR
View Answer
Answer: b
Explanation: The drum printers print one line at a Answer: a
time. They have a cylindrical drum with characters Explanation: A digitizer serves the purpose given
embossed on its surface in the form of circular in the question. Digitizers are generally used in the
bands. area of Computer Aided Design by architects and
engineers to design cars, buildings, etc.
4. Which of the following is a name of plotter as
well as a printer? 8. The process in which a file is partitioned into
a) Flatbed smaller parts and different parts are stored in
b) Laser different disks is called _________
c) Drum a) RAID
d) Impact b) Mirroring
View Answer c) Stripping
d) RAID classification
Answer: c View Answer
Explanation: Drum is the name of a plotter as well
as a printer. Drum printers have a predefined set of Answer: c
characters and print one line at a time. Drum Explanation: Enhanced reliability is achieved by
plotters is an ideal device for architects and others using techniques like mirroring and stripping in
who need to generate high-precision hard copy case of disk arrays. Stripping is the division of a
graphics output of widely varying sizes. large file into smaller parts and then storing them
on different disks.
5. Name the device that converts text information
into spoken sentences. 9. Which of the following Printers have a speed in
a) Speech Sensors the range of 40-300 characters per second?
b) Compact convertors a) Inkjet
c) Speech Synthesizers b) Laser
c) Dot matrix
47
d) Drum Answer: c
View Answer Explanation: A digitizer converts analog signals to
digital images. Due to this, it is compatible with
Answer: a both scanners and mice.
Explanation: The inkjet printers are non-impact
printers. Hence, they cannot produce multiple 4. Which of the following term is used when
copies of a document in a single printing. Can be different forms of information like text, sound is
both monochrome and color. converted to a binary code?
a) Digitalization
10. Which of the following is a temporary output? b) Digitization
a) Hard copy c) Binarization
b) Soft copy d) Digization
c) Duplicate copy View Answer
d) On paper
View Answer Answer: b
Explanation: Digitization is the term that is used. It
Answer: b converts the input which is in the form of an
Explanation: There are only two types of outputs: image, sound or text into a binary format and
hard copy and soft copy. Soft copy output is further makes it easier for the computer to
temporary and vanishes after use. Hard copy understand and process.
output is permanent in nature and can be kept in
paper files, etc. 5. Which of the following isn’t a phase of
digitization?
1. Input Devices that use a special ink that is used a) Discretization
for converting pictures, maps and drawings into b) Quantization
digital format. c) Discretization + Quantization
a) Digitizers d) Analog conversion
b) Digital pens View Answer
c) Light Pens
d) MICR Answer: d
View Answer Explanation: There is no phase called analog
conversion. Discretization means the reading of an
Answer: a analog signal. Quantization is the rounding of
Explanation: The digitizer is used for digitizing samples to numbers.
pictures, maps and drawings into digital form for
storage in computers. It is used in CAD by 6. Which of the following is not a part of a
architects and engineers. digitizer?
a) Digitizing tablet
2. GIS stands for Graphical Information System. b) Cursor
a) True c) Stick
b) False d) Stylus
View Answer View Answer
Answer: b Answer: c
Explanation: The statement is false. GIS stands for Explanation: A digitizer consists of a digitizing
Geographical Information System. Digitizers are tablet, a stylus in the form of a cross-hair cursor. A
used in the area of GIS for digitizing maps digitizer is used in the areas of Geographical
available in paper form. Information Systems.
3. A digitizer converts __________ input into 7. The process of making digital information work
digital input. for you is called ___________
a) Laser a) Digitization
b) Digital b) Digital Transformation
c) Analog c) Digitalization
d) Complex d) Analogization
View Answer View Answer
48
Answer: c Answer: c
Explanation: The process of making digitized data Explanation: TTS stands for Text to speech. It is a
or information work for you is called digitalization. commonly used term with Speech Synthesis. Often
The conversion of analog signal to digital signal is called as text to speech synthesis.
called digitization. Digital signals are in the form
of 0s and 1s. 2. Text analysis is all about converting the input
text into a ‘speakable’ form.
8. What is the full form of FSM? a) True
a) Field Service Management b) False
b) Frequent Service Management View Answer
c) Final Service Management
d) Field Service Master Answer: a
View Answer Explanation: The statement is true. This process
has two phases: firstly the text goes through
Answer: a analysis and then the result is used to generate a
Explanation: FSM is Field Service Management. speech signal.
FSM soft wares are used for making proper use of
the digitized information. Therefore, they are 3. A concept that contains rhythm of speech,
basically responsible for digitalization. stress patterns and intonation is ________
a) Text synthesis
9. Which of the following Techniques are used to b) Prosody
optimize field services? c) Speech Synthesis
a) AI d) Formant Synthesis
b) ML View Answer
c) CC
d) Reality tools Answer: b
View Answer Explanation: Prosody is the correct term. It
contains three main parts: the rhythm of speech,
Answer: a the stress patterns and the intonation. Intonation is
Explanation: AI or Artificial Intelligence is a term used for the rise and fall when a person
optimizing the field services. It ensures that the speaks.
fastest service is performed by the person in
charge. Artificial intelligence is nothing but 4. Which of the following does not come under
machine intelligence. text analysis?
a) Document Structure Detection
10. Obtaining services from a rapidly evolving b) Speech Synthesis
group of internet users __________ c) Prosonic Analysis
a) Outsourcing d) Prosodic Analysis
b) Crowd Sourcing View Answer
c) Human collaboration
d) Human Computation Answer: c
View Answer Explanation: For TTS, the main concepts involved
are :
Answer: b 01) Text Analysis
Explanation: Crowd sourcing is the appropriate 02) Phonetic Analysis
term which is to be used. Though human 03) Prosodic Analysis
collaboration, outsourcing and computation mean 04) Speech Synthesis.
the same. Crowd Sourcing means collaboration of
a group of internet users for the same purpose. 5. What is the medium to convert text information
into spoken sentences?
1. What is the full form of TTS? a) Speech Sensors
a) Typically Typed Speech b) Compact convertors
b) Typographic Text Speech c) Speech Synthesizers
c) Text to Speech d) Voice systems
d) Typography to speech View Answer
View Answer
Answer: c
Explanation: A speech synthesizer converts text
49
information into spoken sentences. It is used for Answer: a
reading out text information to blind people. This Explanation: IPA(International phonetic
allows people to communicate effectively. association) contains some symbols that are
complicated and cannot be found in typewriters.
6. Pitch and duration attachment comes under SAMPA is an example of alphabets which are
_____ compatible with computers and based on ASCII
a) Prosody characters.
b) Phonetic Analysis
c) Speech Synthesis 10. A speech synthesis model which tries to
d) Text Analysis model the human speech production mechanisms is
View Answer _________
a) Articulatory Synthesis
Answer: a b) Formant Synthesis
Explanation: Pitch and duration attachment comes c) Summative Synthesis
under Prosodic analysis. Other three terms are also d) Concatenative Synthesis
used when we consider the text to speech View Answer
conversion.
Answer: a
7. Which of the following is not a speech Explanation: Articulative Synthesis tries to model
synthesis method? the human speech production mechanisms. It is by
a) Formant far the most complicated speech synthesis method.
b) Summative Its implementation is difficult and therefore is not
c) Articulator widely used.
d) Concatenative
View Answer 1. The physical devices of a computer :
a) Software
Answer: b b) Package
Explanation: Summative isn’t a Speech Synthesis c) Hardware
method. Formant Synthesis is the oldest method. d) System Software
Concatenative is the cut-and-paste method. View Answer
Whereas, Articulative tries to model the human
speech production mechanisms. Answer: c
Explanation: Hardware refers to the physical
8. Speech Synthesis method based on the devices of a computer system. Software refers to a
generation of periodic and non-periodic signals is collection of programs. A program is a sequence of
____________ instructions.
a) Formant
b) Summative 2. Software Package is a group of programs that
c) Conactenative solve multiple problems.
d) Articulative a) True
View Answer b) False
View Answer
Answer: a
Explanation: Formant synthesis is based on the Answer: b
same. It is based on the well known source-filter Explanation: The statement is false. The software
model whose idea is to generate periodic and non- package is a group of programs that solve a
periodic signals. specific problem or perform a specific type of job.
50
Answer: d solving a specific problem. System software is
Explanation: Upgrades is the right term to be used. designed for controlling the operations of a
Upgrades are installed to renew or implement a computer system.
new feature. Except for upgrades, hardware is
normally one-time expense. 8. Assembler is used as a translator for?
a) Low level language
4. Which of the following is designed to control b) High Level Language
the operations of a computer? c) COBOL
a) Application Software d) C
b) System Software View Answer
c) Utility Software
d) User Answer: a
View Answer Explanation: Assembler is used in case of low
level languages. It is generally used to make the
Answer: b binary code into an understandable format.
Explanation: Software is basically classified into Interpreter is used with the high level languages
two: System and application. System Software is similarly.
designed to control the operations and extend the
processing capability of a computer system. 9. What do you call a program in execution?
a) Command
5. Which of the following is not an example of b) Process
system software? c) Task
a) Language Translator d) Instruction
b) Utility Software View Answer
c) Communication Software
d) Word Processors Answer: b
View Answer Explanation: Option Process is correct. A program
is a set of instructions. A program in execution is
Answer: d called a process.
Explanation: A system software is responsible for
controlling the operations of a computer system. 10. Which of the following is not a process state?
Word Processor is an application software since it a) Terminated
is specific to its purpose. b) Running
c) Blocked
6. A person who designs the programs in a d) Execution
software package is called : View Answer
a) User
b) Software Manager Answer: c
c) System Developer Explanation: There is no blocked state in a process
d) System Programmer model. The different states are ready, running,
View Answer executing, waiting and terminated.
52
software. An application software is a set of b) RAM
instructions designed to serve a particular purpose. c) External
d) ROM
1. The software substituted for hardware and View Answer
stored in ROM.
a) Synchronous Software Answer: d
b) Package Software Explanation: Firmware is stored in ROM which is
c) Firmware the read only memory. Firmware basically acts as a
d) Middleware link between the hardware and the system.
View Answer
6. DNS stands for?
Answer: c a) Domain Name System
Explanation: Software refers to a collection of b) Direct Name System
programs. Firm wares act as a link between the c) Direct Network System
hardware and the system. It is stored in read only d) Domain Network System
memory. View Answer
56
5. Which of the following is incorrect? Answer: a
Algorithms can be represented: Explanation: Linear arrays are the 1-Dimensional
a) as pseudo codes arrays wherein only one row is present and the
b) as syntax items are inserted.
c) as programs
d) as flowcharts 10. A data structure that follows the FIFO
View Answer principle.
a) Queue
Answer: b b) LL
Explanation: Representation of algorithms: c) Stack
-As programs d) Union
-As flowcharts View Answer
-As pseudo codes.
Answer: c
6. When an algorithm is written in the form of a Explanation: The answer is Stack. A stack follows
programming language, it becomes a _________ the FIFO principle. FIFO stands for First In First
a) Flowchart Out.
b) Program
c) Pseudo code 1. The symbol denotes _______
d) Syntax
View Answer
Answer: b a) I/O
Explanation: An algorithm becomes a program b) Flow
when it is written in the form of a programming c) Terminal
language. Thus, any program is an algorithm. d) Decision
View Answer
7. Any algorithm is a program.
a) True Answer: c
b) False Explanation: The symbol denotes a terminal. It is
View Answer used for indication of start and stop nodes of a
program.
Answer: b
Explanation: The statement is false. An algorithm 2. In computer science, algorithm refers to a
is represented in the form of a programming pictorial representation of a flowchart.
language is called a program. Any program is an a) True
algorithm but the reverse is not true. b) False
View Answer
8. A system wherein items are added from one
and removed from the other end. Answer: b
a) Stack Explanation: The statement is false. The correct
b) Queue statement would be: In computer science,
c) Linked List flowchart refers to a pictorial representation of an
d) Array algorithm.
View Answer
3. The process of drawing a flowchart for an
Answer: b algorithm is called __________
Explanation: In a queue, the items are inserted a) Performance
from the rear end and deleted from the front end. b) Evaluation
c) Algorithmic Representation
d) Flowcharting
9. Another name for 1-D arrays.
View Answer
a) Linear arrays
b) Lists
c) Horizontal array Answer: d
d) Vertical array Explanation: It is called as flowcharting. A
View Answer flowchart is nothing but a pictorial representation
of an algorithm.
57
4. Actual instructions in flowcharting are c) Micro
represented in __________ d) Union
a) Circles View Answer
b) Boxes
c) Arrows Answer: c
d) Lines Explanation: A detailed flowchart or a flowchart
View Answer with more details is called as micro flowchart. It
represents all the components of the algorithm that
Answer: b is followed.
Explanation: The actual instructions are written in
boxes. Boxes are connected by using arrows to 9. Which of the following is not an advantage of a
indicate the exact flow of a flowchart and the order flowchart?
in which they are to be executed. a) Better communication
b) Efficient coding
5. The following box denotes? c) Systematic testing
d) Improper documentation
View Answer
Answer: d
a) Decision Explanation: Flowcharts provide a proper
b) Initiation documentation. It also provides systematic
c) Initialization debugging.
d) I/O
View Answer 10. A flowchart that outlines the main segments of
a program.
Answer: a a) Queue
Explanation: A diamond shape box denotes the b) Macro
decision making statements. It jumps to a truth c) Micro
value or a false value. d) Union
View Answer
6. A box that can represent two different
conditions. Answer: b
a) Rectangle Explanation: The answer is Macro Flowchart. A
b) Diamond macro flowchart outlines the important
c) Circle components of a program. It therefore shows fewer
d) Parallelogram details.
View Answer
1. A ______________ is diagram that depicts the
Answer: b flow of a program.
Explanation: A diamond shape box denotes either a a) Algorithm
truth value or a false value. It jumps onto two b) Hash Table
different statements following it via flow lines. c) Graph
d) Flowchart
7. There should be certain set standards on the View Answer
amount of details that should be provided in a
flowchart. Answer: d
a) True Explanation: A flowchart is a diagram that helps us
b) False determine the flow of the program. Other options
View Answer are irrelevant.
Answer: a
Explanation: The input/output operations are
represented by parallelograms. They generally are a) sequence
used to display messages during input and output b) case
part of a program. c) repetition
d) process
4. Which of the following is not a flowchart View Answer
structure?
a) Process Answer: c
b) Sequence Explanation: This is a repetition structure. The
c) Repetition action performed by a repetition structure must
d) Case eventually cause the loop to terminate. Otherwise,
View Answer an infinite loop is created.
Answer: c Answer: b
Explanation: The action performed by a repetition Explanation: This is a case structure. Certain cases
structure must eventually cause the loop to are given along with a default case in the case
terminate. Otherwise, an infinite loop is created. structure.
Answer: a
Explanation: Each design structure uses a
particular indentation pattern.
a) Decision
Indentation should be considered in the following
b) Input/Output
cases:
c) Process
Sequence
d) Module
Selection
View Answer
Loop.
Answer: a
5. The statement that tells the computer to get a
Explanation: The answer is decision. Conditions
value from an input device and store it in a
are given in this box and then the result is checked
memory location.
accordingly if the condition is true or false.
a) read
b) write
1. Keep the statement language ______________ c) READ
while writing a pseudo code. d) WRITE
a) Dependent View Answer
b) Independent
c) Case sensitive
Answer: c
d) Capitalized
Explanation: The READ statement is used to take
View Answer
the input. READ being a keyword should be in
capital letters.
Answer: b
Explanation: The statement’s language should be
6. _____________ are identified by their
independent. Other rules are to write only one
addresses, we give them names (field names /
statement per line and end multiline structures.
variable names) using words.
a) Memory variables
2. Capitalize initial keyword – This is a rule while b) Memory Locations
writing a pseudo code. c) Memory Addresses
a) True d) Data variables
b) False View Answer
View Answer
Answer: b
Answer: a Explanation: Memory locations are identified by
Explanation: The statement is true. It is an their addresses, we give them names (field
important rule to capitalize the initial keyword names/variable names) using words descriptive to
while writing a pseudo code. us such as ctr as opposed to a location addresses
such as 19087.
3. Which of the following is not a keyword?
a) Read 7. ____________ begins with lower case letters.
b) Write a) Keywords
c) start b) Variables
d) endif c) Tokens
View Answer d) Functions
View Answer
Answer: c
Explanation: Start is not a Keyword. Other words Answer: b
like read, write, if, else, etc are keywords and Explanation: Variables begin with a lowercase.
convey a special meaning. They contain no spaces. They also involve the
consistent use of names.
4. ______________ is used to show hierarchy in a
pseudo code. 8. Another notation for exponentiation.
a) Indentation a) *
b) Curly Braces b) **
c) Round Brackets c) ***
60
d) *^ 3. A ________ is a directed graph that describes
View Answer the flow of execution control of the program.
a) Flowchart
Answer: b b) Flow graph
Explanation: Double asterisk sign is also used for c) Complexity curve
exponentiation. The general notation is ^ sign. d) Algorithm
View Answer
9. A symbol used for grouping.
a) () Answer: a
b) {} Explanation: A flowchart is a directed graph. It
c) []. simply describes the flow of execution control of
d) ” ” the program.
View Answer
4. A program should be ________
Answer: a a) Secure
Explanation: Parenthesis is used for grouping b) Sequential
while working with fields. There are other symbols c) Ordered
like *, +, -, **, etc. d) Simple
View Answer
10. A statement used to close the IF block.
a) ELSE Answer: b
b) ELSEIF Explanation: It is natural to write a program as a
c) END sequence of program structures such as sequences,
d) ENDIF choices and loops.
View Answer
5. The following is the syntax for:
Answer: d
Explanation: The answer is ENDIF. It is used to ____(condition)
close the IF block. ENDIF statement should be in action
line with the IF statement.
a) Else
1. Programming based on stepwise refinement b) Elif
process. c) If
a) Structural d) Switch
b) C programming View Answer
c) Procedural
d) Fine Answer: c
View Answer Explanation: The if statement follows that syntax.
If is a choice statement. Else is also a choice
Answer: a statement.
Explanation: Structured programming is based on
the stepwise refinement process-a method of 6. Which of the following is a loop statement?
problem decomposition common to all engineering a) IF
disciplines and the physical, chemical, and b) ELSE
biological sciences. c) WHILE
d) DO
2. Top-down approach is followed in structural View Answer
programming.
a) True Answer: c
b) False Explanation: WHILE is a loop statement.
View Answer Syntax : while(condition)
action.
Answer: a
Explanation: The statement is true. Structural 7. What is the correct syntax of for statement?
programming follows the top – down approach. a) for(initialization;condition;update)
Each module is further divided into sub modules. b) for(initialization,condition,update)
c) for(condition;initialization;update)
61
d) for(initialization;condition;) particular computer and used directly by the
View Answer computer is machine language.
Answer: a Answer: a
Explanation: Data coverage is an approach that Explanation: The processor supports the following
designs test cases by looking at the allowable data data sizes:
values. Code coverage is an approach that designs • Word: a 2-byte data item
test cases by looking at the code. • Double word: a 4-byte (32 bit) data item, etc.
10. The rules that give meaning to the 4. A direct reference of specific location.
instructions. a) Segment Address
a) Semantics b) Absolute Address
b) Syntax c) Offset
c) Code d) Memory Address
d) Cases View Answer
View Answer
63
Answer: b Answer: d
Explanation: There are two kinds of memory Explanation: The processor has some internal
addresses: memory storage locations, known as registers. The
• An absolute address – a direct reference of registers stores data elements for processing
specific location. without having to access memory.
• The segment address (or offset) – starting address
of a memory segment with the offset value. 9. To locate the exact location of data in memory,
we need the starting address of the segment, which
5. A Borland Turbo Assembler. is found in the DS register and an offset value. This
a) nasm offset value is also called?
b) tasm a) Effective Address
c) gas b) Direct offset address
d) asm c) Memory address
View Answer d) General Address
View Answer
Answer: b
Explanation: Tasm is the borland turbo assembler. Answer: a
Nasm is used with linux generally. Gas is the GNU Explanation: When operands are specified in
assembler. memory addressing mode, direct access to main
memory, usually to the data segment, is required.
6. The instructions that tell the assembler what to This way of addressing results in slower processing
do. of data. To get the exact location of data in
a) Executable instructions memory, we need segment start address, which is
b) Pseudo-ops found in the DS register and an offset value. This
c) Logical instructions offset value is called an effective address.
d) Macros
View Answer 10. Each byte of character is stored as its ASCII
value in _______
Answer: a a) Hexadecimal
Explanation: The executable instructions or simple b) Binary
instructions tell the processor what to do. Each c) Octal
instruction consists of an operation code (opcode). d) Decimal
Each executable instruction generates one machine View Answer
language instruction.
Answer: a
7. The segment containing data values passed to Explanation: Assembly language deals with
functions and procedures within the program. hexadecimal values only. Each decimal value is
a) Code automatically converted to its 16-bit binary
b) Data equivalent and stored as a hexadecimal number.
c) Stack
d) System 1. Prolog comes under ___________
View Answer a) Logic Programming
b) Procedural Programming
Answer: c c) OOP
Explanation: The stack segment contains data d) Functional
values passed to functions and procedures within View Answer
the program. The code segment defines an area in
memory that stores the instruction codes. Answer: a
Explanation: Prolog stands for Programming in
8. To speed up the processor operations, the Logic. The options mentioned are the four
processor includes some internal memory storage categories of programming. Prolog is a type of
locations, called ___________ logic programming.
a) Drives
b) Memory 2. Java is procedural programming.
c) Units a) True
d) Registers b) False
View Answer View Answer
64
Answer: b 7. JIT stands for?
Explanation: The statement is false. Java is a type a) Just in time
of object oriented programming language. It b) Jump in time
involves solving real-life problems as well. c) Jump in text
d) Jump in terms
3. A program that can execute high-level language View Answer
programs.
a) Compiler Answer: a
b) Interpreter Explanation: JIT stands for Just in time. JVMs
c) Sensor actually compile each bytecode instruction to
d) Circuitry native code the first time it is used.
View Answer
8. JVM stands for?
Answer: b a) Java virtual machine
Explanation: Interpreter is a program that can b) Java visual machine
execute high-level language programs “directly,” c) JRE virtual machine
without first being translated into machine d) JRE visual machine
language. View Answer
67
d) Alphanumeric sign 4. Which of the following is a common testing
View Answer conducted by the developers?
a) Unit testing
Answer: b b) Entry testing
Explanation: It denotes a sign in a picture clause. c) Phrase testing
Picture clause values usually use 9, X, V, S, A. d) Code testing
View Answer
10. _____________ denotes the format in which
data is stored in memory. Answer: a
a) kind Explanation: Unit testing is commonly performed
b) attach by the developers. It is difficult to perform testing
c) select at any time during its cycle. An early start
d) usage decreases the time and cost.
View Answer
5. SDLC stands for ________
Answer: d a) Software development life cycle
Explanation: Usage denotes the format in which b) System development life cycle
data is stored in the memory. Normally the phrase c) Software design life cycle
usage is omitted in COBOL. d) System design life cycle
View Answer
1. Another name for white-box testing is
___________ Answer: a
a) Control testing Explanation: It stands for Software development
b) Graybox life cycle. In SDLC, the testing can be started from
c) Glassbox the software gathering requirement phase. And can
d) Black box be carried over till the deployment phase.
View Answer
6. Which of the following is a myth in testing?
Answer: c a) Tester can find bugs
Explanation: Sometimes it is called the glass box b) Any user can test software
testing. It is a type of testing in which the internal c) Missed defects are not due to testers
structure of any application is tested and examined. d) Complete testing is not possible
View Answer
2. Test cases ensure that all the statements are
executed atleast once. Answer: b
a) True Explanation: Any user can test software is a myth.
b) False Anyone cannot test the software. A person who has
View Answer no knowledge cannot test the software.
7. Which of the following should describe the 1. Maintenance and review add to the useful life
technical terms used in the document? of the system but can consume large amounts of
a) glossary __________
b) index a) Documents
c) user requirements b) Soft wares
d) system architecture c) Devices
View Answer d) Resources
View Answer
Answer: a
Explanation: Glossary should describe the Answer: d
technical terms used in the document. In this, the Explanation: They consume a large amount of
writer shouldn’t make assumptions about the resources. They can benefit from the methods and
experience and expertise of the reader. project management techniques though which are
applied to the systems development.
8. The services provided for the user are described
in which section? 2. File and database contains the frequency
a) System requirements component.
b) User requirements a) True
c) System models b) False
d) Appendices View Answer
View Answer
Answer: b
Answer: b Explanation: The statement is false. Frequency is a
Explanation: The services provided by the software part of output design. File design contains
for the user are described in this section. The non- capabilities and organization.
functional requirements should also be described in
this section. 3. This is not a part of the signing on the
procedure.
9. ______________ architecture provides a high- a) Identification
level overview of the anticipated system b) Verification
architecture. c) Execution
a) System d) Authorization
b) User View Answer
c) Test
d) Software Answer: c
View Answer Explanation: Signing on is a part of special system
design considerations. It does not involve a step of
Answer: a execution. It involves identification, verification
Explanation: System architecture shows the and authorization.
description and distribution functions across
system modules. Architectural components that are 4. A __________ is a noted set of activities that
reused should be highlighted. are executed on the software in order to confirm its
behavior to certain set of inputs.
10. The graphical models showing the a) Process
relationships between the system and its b) Document
71
c) Use case d) V(G) = E + N – 2
d) Test case View Answer
View Answer
Answer: a
Answer: d Explanation: The option V(G) = E – N + 2 denotes
Explanation: A test case is basically a documented the correct expression. Here, E is the number of
set of activities that are carried out on the software flow graph edges. N is the number of flow graph
in order to confirm its functionality to certain given nodes.
inputs. Each test case would in turn have steps to
address how we can check a particular test 9. The probability of failure-free operation of a
condition is satisfied or not. software application in a specified environment for
a specified time.
5. A type of testing that is conducted at the a) Software Reliability
software interface. b) Software Quality
a) gray box c) Software availability
b) black box d) Software Safety
c) red box View Answer
d) white box
View Answer Answer: a
Explanation: The answer is software reliability. It
Answer: b is estimated using historical and development data.
Explanation: Black box testing is conducted at the
software interface. White box testing is predicted 10. SCM stands for __________
on close examination of procedural details. a) Software configuration monitoring
b) System configuration management
6. A simple notation for the representation of c) Software configuration management
control flow. d) System configuration monitoring
a) System flow View Answer
b) Flow graph
c) Flow program Answer: a
d) System program Explanation: Software configuration management
View Answer (SCM), also called change management, is a set of
activities designed to manage change by
Answer: b identifying the work products that are likely to
Explanation: The flow graph depicts logical change.
control flow. Each circle in a flow graph is called a
flow graph node, represents one or more 1. ______________ is done in the development
procedural statements. phase by the developers.
a) Deployment
7. A software metric that provides a quantitative b) Debugging
measure of the logical complexity of a program. c) Verification
a) Cyclomatic complexity d) Validation
b) Index matrix View Answer
c) Quantitative complexity
d) System complexity Answer: b
View Answer Explanation: Debugging is done in the
development phase by the developer. In
Answer: a development phase developer fixes the bug (i.e)
Explanation: The number of regions of the flow called debugging.
graph corresponds to the cyclomatic complexity.
All other options are invalid. 2. Testing is conducted by the developers in
testing phase.
8. An expression for the calculation of cyclomatic a) True
complexity. b) False
a) V(G) = E – N + 2 View Answer
b) V(G) = E + N + 2
c) V(G) = E – N – 2 Answer: b
Explanation: The statement is false. Testing is
72
conducted by the testers in testing phase. Testing is in an existing system to enhance, update, or
a process of finding the defects from a user upgrade its features is called system maintenance.
perspective(Black Box Testing). On an average, maintenance cost of a computerized
system is two to four times more than the initial
3. Process of evaluating a system to verify development cost.
whether or not it is meeting its objectives.
a) System Maintenance 7. _____________ Conducted at developer’s site.
b) System Evaluation a) Alpha Testing
c) System validation b) Beta Testing
d) System authorization c) Unit testing
View Answer d) System testing
View Answer
Answer: b
Explanation: Process of evaluating a system (after Answer: a
it is put in operation) to verify whether or not it is Explanation: Alpha testing is conducted at the
meeting its objectives is called as system developer’s site. It is conducted by a customer (end
evaluation. users) in developer’s presence before software
delivery.
4. A point not considered in system evaluation.
a) Process control 8. ___________ Conducted at customers’ site.
b) Performance evaluation a) Alpha Testing
c) User Satisfaction b) Beta Testing
d) Failure Rate c) Unit testing
View Answer d) System testing
View Answer
Answer: a
Explanation: Points considered for evaluating a Answer: b
system are: Explanation: Beta testing is conducted at the
-> Performance evaluation customer’s site. Generally, developer is not
-> Cost analysis present. Customer records all problems (defects)
-> Time analysis and reports it to developer.
-> User satisfaction
-> Ease of modification 9. The probability of failure-free operation of a
-> Failure rate. software application in a specified environment for
a specified time.
5. A type of testing that is conducted at the a) Software Reliability
software interface. b) Software Quality
a) gray box c) Software availability
b) black box d) Software Safety
c) red box View Answer
d) white box
View Answer Answer: a
Explanation: The answer is software reliability. It
Answer: b is estimated using historical and development data.
Explanation: Black box testing is conducted at the
software interface. White box testing is predicated 10. The probability that a software application is
on close examination of procedural details. operating according to requirements at a given
point in time.
6. Incorporating changes in an existing system to a) Software Reliability
enhance, update, or upgrade its features. b) Software Quality
a) Maintenance c) Software availability
b) Evaluation d) Software Safety
c) Deployment View Answer
d) Validation
View Answer Answer: c
Explanation: Software availability marks the
Answer: a proper functioning of the software at a given point
Explanation: The Process of incorporating changes
73
of time. Reliability, availability and safety are three c) Q
important factors. d) &
View Answer
1. A __________is a set of instructions which is
prepared to perform a specific assignment if Answer: a
executed by a computer. Explanation: Wait fraction of a processor is
a) Browser represented by w. It is also known as the processor
b) Internet wait ratio.
c) Program
d) Code 6. Processor wait ratio is given by ________
View Answer a) w=b/e+b
b) w=b/e-b
Answer: c c) #=b/e-b
Explanation: A set of meaningful instructions is d) #=b/e+b
called a program. A program is basically designed View Answer
to perform any function assigned to it.
Answer: b
2. A program is an active entity. Explanation: Processor wait ratio is represented by
a) True w. It is given by :
b) False w=b/b+e.
View Answer
7. What does ‘b’ represent in a processor wait
Answer: b ratio?
Explanation: The statement is false. A program is a) input ratio
not an active entity. It is completely passive. b) output ratio
c) average time
3. What is responsible for creating a process from d) average I/O time
a program? View Answer
a) OS
b) Web Answer: d
c) Internet Explanation: It represents the average I/O time.
d) Firewall Average execution time with single programming
View Answer is given by e.
75
9. A method used to temporarily release time for d) Simple
other threads. View Answer
a) yield()
b) set() Answer: a
c) release() Explanation: The secondary memory is the long
d) start() term store for programs and data while main
View Answer memory holds program and data currently in use.
This is a physical organization.
Answer: a
Explanation: We can use the yield() method to 4. Memory organization in which users write
temporarily release time for other threads. It is programs in modules with different characteristics.
static by default. a) Physical
b) Logical
10. A method used to force one thread to wait for c) Structural
another thread to finish. d) Simple
a) join() View Answer
b) connect()
c) combine() Answer: b
d) concat() Explanation: The answer is Logical. To handle
View Answer user programs properly, the operating system and
the hardware should support a basic form of
Answer: a module to provide protection and sharing.
Explanation: The answer is join(). We can use the
join() method to force one thread to wait for 5. An executing process must be loaded entirely in
another thread to finish. main memory. What kind of a memory
organization is this?
1. A task carried out by the OS and hardware to a) Physical
accommodate multiple processes in main memory. b) Logical
a) Memory control c) Structural
b) Memory management d) Simple
c) Memory sharing View Answer
d) Memory usage
View Answer Answer: d
Explanation: This is simple memory organisation.
Answer: b An executing process must be loaded entirely in
Explanation: Memory management is carried out main memory (if overlays are not used).
by the OS and hardware to accommodate multiple
processes in main memory. 6. FTP stands for?
a) File Text Protocol
2. An HTML file is a text file containing small b) File Transfer Protocol
markup tags. c) Firm Transfer Protocol
a) True d) File Transplant Protocol
b) False View Answer
View Answer
Answer: b
Answer: a Explanation: FTP stands for File Transfer Protocol.
Explanation: The statement is true. HTML stands It is a type of internet service use for the
for Hyper Text Markup Language. It is a text file transmission of files.
containing small markup tags.
7. A set of overlapping divisions in the main
3. Secondary memory is the long term store for memory are called _______
programs and data while main memory holds a) Partitions
program and data currently in use. What kind of an b) Divisions
organization is this? c) Blocks
a) Physical d) Modules
b) Logical View Answer
c) Structural
76
Answer: a 2. Logical Address space can be larger than
Explanation: Partition main memory into a set of physical address space.
non overlapping regions called partitions. a) True
Partitions can be of equal or unequal sizes. b) False
View Answer
8. Any program, no matter how small, occupies an
entire partition. This is called ____________ Answer: a
a) fragmentation Explanation: The statement is true. Since, a part of
b) prior fragmentation the program needs to be in memory for the process
c) internal fragmentation of execution, the logical space can therefore be
d) external fragmentation much larger than the physical address space.
View Answer
3. Virtual Memory can be implemented via
Answer: c __________
Explanation: It is called as internal fragmentation. a) Demand Paging
Main memory use is inefficient. Any program, no b) Logical paging
matter how small, occupies an entire partition. This c) Structural way
is called internal fragmentation. d) Simple division
View Answer
9. __________ is used to shift processes so they
are contiguous and all free memory is in one block. Answer: a
a) Fragmentation Explanation: Demand paging can implement
b) Compaction virtual memory. Another way is demand
c) External Fragmentation segmentation.
d) Division
View Answer 4. COW stands for?
a) Copy over write
Answer: b b) Convert over write
Explanation: Use compaction to shift processes so c) Count over write
they are contiguous and all free memory is in one d) Copy over write
block. View Answer
86
Answer: d 2. Transmission mode controls the direction of
Explanation: The answer is Instance. Instance is signal flow.
the actual content of the database at a particular a) True
point of time. b) False
View Answer
8. Which of the following is not an object-based
logical model? Answer: a
a) ER Explanation: The statement is true. The term
b) Network transmission mode defines the direction of flow of
c) Semantic information between two communication devices.
d) Functional It tells the direction of signal flow between two
View Answer devices.
92
d) Open Site Interdependence computer and could share its information
View Answer processing resources.
94
Answer: d d) Browsers
Explanation: Any computer that has access to the View Answer
web server is called the web client. Web server is
any computer that uses the HTTP protocol. Answer: d
Explanation: Browser is the answer. Browser is a
9. Allows the user to create and maintain a type of client and it is not a server. File, web and
personal list of favorite URL addresses. name are the types of servers.
a) Software
b) Web Servers 4. This determines the type of protocol to be used.
c) Web Browsers a) <scheme>
d) WWW b) <pathname>
View Answer c) <server name>
d) <server domain name>
Answer: c View Answer
Explanation: Web Browsers help the user to
maintain a personal favorite list of URLs. Also, Answer: a
allows the user to download information on various Explanation: The answer is <scheme>. In general,
formats. http is used. Others like file and ftp can also be
used.
10. URL stands for?
a) Uniform Resource Locator 5. The location of file is determined by ________
b) Uniform Research Locator a) <scheme>
c) Uniform Resource Link b) <pathname>
d) Uniform Research Link c) <server name>
View Answer d) <server domain name>
View Answer
Answer: a
Explanation: WWW specifies the URL of a Answer: b
website and allows the user to access information. Explanation: <pathname> tells the server where to
URL stands for Uniform Resource Locator. find the file name. It is an important part of the
URL format.
1. The web works on this model.
a) Intranet 6. Apache is a type of ________
b) Internet a) Transmission control program
c) Client-Server b) Web Server
d) Server c) Web Browser
View Answer d) DBMS
View Answer
Answer: c
Explanation: Web works on the client server Answer: b
model. Client and server operate on machines Explanation: Apache is a type of web server. It is
which are able to communicate through a network. an application which waits for client requests,
fetches requested documents from disk and
2. In the Client-server model, the client receives a transmits them to the client.
request from the server.
a) True 7. A small data file in the browser.
b) False a) Cookie
View Answer b) Web Server
c) FTP
Answer: b d) Database
Explanation: The statement is false. The server View Answer
receives a request from the client. It then performs
the requested work. Answer: a
Explanation: Cookie is a small data file in the
3. Which of the following is not a type of server? browser. Most browsers nowadays allow the user
a) File to decide if they want the cookies or not.
b) Web
c) Name
95
8. Any computer that can access the server is Answer: a
called? Explanation: The statement is true. HTML stands
a) Web Server for Hyper Text Markup Language. It is a text file
b) Web Browser containing small markup tags.
c) User
d) Web Client 3. Which of the following is not a type of
View Answer browser?
a) Netscape
Answer: d b) Web
Explanation: Any computer that has access to the c) IE
web server is called the web client. Web server is d) Mozilla
any computer that uses the HTTP protocol. View Answer
Answer: b Answer: a
Explanation: Animation is basically a form of Explanation: In 1843, William Horner, a British
pictorial presentation. It has become the most mathematician invented the zoetrope. A zoetrope
prominent feature of technology-based learning produces an illusion of movement from a rapid
environments. succession of static pictures.
7. In this type of cloud, the cloud is composed of 1. Which of the following is not a type of
multiple internal or external cloud. computer on the basis of operation?
107
a) Remote Answer: a
b) Hybrid Explanation: Super computers are used with
c) Analog complex applications like Global Weather
d) Digital Forecasting, Creating graphic images, engineering
View Answer design and testing, space exploration, etc.
109
9. PDAs are also called? identification was a prerequisite for Internet of
a) PCs Things.
b) Laptops
c) Tablets 4. Which of the following is not involved in
d) Handheld working of IoT?
View Answer a) RFID
b) Sensor
Answer: d c) Nano tech
Explanation: PDAs are also called as Personal d) Server
Digital Assistants. They are small and can be View Answer
carried anywhere.
Answer: d
10. ______computers are lower to mainframe Explanation: IoT works from RFID to Sensor, to
computers in terms of speed and storage capacity. Smart tech and then to Nano tech.
a) Mini
b) Super 5. Making the smaller and smaller things have the
c) Mainframes ability to connect and interact.
d) Hybrid a) Micro Tech
View Answer b) Smart tech
c) Nano tech
Answer: a d) RFID
Explanation: The answer is a. Mini computers are View Answer
compared to mainframe computers in terms of:
1. speed and, 2. storage capacity. Answer: c
Explanation: Nano Tech is the term used when
1. A network of physical objects or things smaller things are made to interact and
embedded with electronics or softwares. communicate. It is involved in the working of Iot
a) AI also.
b) ML
c) IOT 6. Wi-Fi stands for?
d) Internet a) Wireless fidelity
View Answer b) Wireless Flexibility
c) Wide Fidelity
Answer: c d) WAN Flexibility
Explanation: IoT is a network of physical objects View Answer
or things embedded with electronics or softwares.
Iot allows objects to be controlled remotely across Answer: a
existing network. Explanation: Wi-Fi stands for Wireless Fidelity. It
is widely used in both outdoor and indoor
2. RFID is a part of IoT. environments.
a) True
b) False 7. Diagnostics service for Cars.
View Answer a) MIPS
b) AutoBot
Answer: a c) IoT Assistant
Explanation: The statement is true. RFID is Radio d) IoT
frequency identification. Radio frequency View Answer
identification is a part of IoT.
Answer: b
3. RFID stands for? Explanation: Autobot is a diagnostics service for
a) Random frequency identification cars. This service is integrated with several web
b) Radio frequency identification services.
c) Random frequency information
d) Radio frequency information 8. The father of ioT.
View Answer a) Kevin Atrun
b) Kevin Atrhur
Answer: b c) Kevin Ashton
Explanation: Earlier, RFID or Radio frequency
110
d) Kevin Thomas 3. The first neural network computer.
View Answer a) RFD
b) SNARC
Answer: c c) AM
Explanation: Kevin Ashton is the father of IoT. He d) AN
believed IoT could turn the world into data. View Answer
9. Collect->Communicate->__________->Act Answer: b
a) Acknowledge Explanation: SNARC was the first neural network
b) Analyze computer. it was built by Minsky and Edmonds in
c) Examine 1956.
d) Rectify
View Answer 4. A hardware based system that has autonomy,
social ability and reactivity.
Answer: a a) AI
Explanation: The correct option is analyze. This b) Autonomous Agent
shows the lifecycle of IoT. c) Agency
Collect->Communicate->Analyze->Act. d) Behavior Engineering
View Answer
10. Several instructions execution simultaneously
in? Answer: b
a) processing Explanation: The answer is Autonomous Agent.
b) parallel processing Autonomous agent has autonomy i.e. ability to
c) serial processing operate without the direct intervention of humans
d) multitasking or others.
View Answer
5. A particular system that contains intelligent
Answer: b agents.
Explanation: In parallel processing, the several a) AI systems
instructions are executed simultaneously. Parallel b) Agency
processing system provides the concurrent data c) Autonomous systems
processing to increase the execution time. d) Company
View Answer
1. The technology that has the ability to interact
with the world. Answer: b
a) AI Explanation: It is called an agency. A particular
b) ML system consisting of intelligent agents like
c) IOT computers or robots that cooperate to find the
d) IT solution to a problem.
View Answer
6. A methodology used to develop behavior-based
Answer: a autonomous agents.
Explanation: AI which is artificial intelligence is a) Descriptors
the ability to interact with the world. It is the b) Behavior engineering
ability to model the world and to learn and adapt. c) Behavior modeling
d) Auto engineering
2. The goal of AI is to build systems that exhibit View Answer
intelligent behavior.
a) True Answer: b
b) False Explanation: The answer is behavior engineering.
View Answer Autonomous agent implements autonomy, social
ability and reactivity.
Answer: a
Explanation: The statement is true. There are 2 7. An international research effort to promote
main goals in AI: to exhibit intelligent behavior autonomous robots.
and understand intelligence in order to model it. a) Fresh Kitty
b) RoboCup
c) AICup
111
d) SPOT Everyday jobs like conducting transactions and
View Answer communications among business and government
agencies etc.
Answer: b
Explanation: RoboCup is designed to promote 2. Network Security provides authentication and
autonomous robots. It is based on multi agent access control for resources.
collaboration. a) True
b) False
8. A type of non-monotonic reasoning. View Answer
a) Ordinary
b) Special Answer: a
c) Duplicate Explanation: The statement is true. AFS is an
d) Default example. It helps us protect vital information.
View Answer
3. Which is not an objective of network security?
Answer: d a) Identification
Explanation: Default reasoning is a type of non- b) Authentication
monotonic reasoning. Default logic is a non- c) Access control
monotonic logic proposed by Raymond Reiter to d) Lock
formalize reasoning with default assumptions. View Answer
113
Answer: b 10. An attack in which the site is not capable of
Explanation: WEP stands for Wired Equivalent answering valid request.
Privacy. WEP has been broken already in 2001. a) Smurfing
WEP protocol designed to make the security of b) Denial of service
wireless LAN as good as that of wired LAN. c) E-mail bombing
d) Ping storm
6. A person who enjoys learning details about View Answer
computers and how to enhance their capabilities.
a) Cracker Answer: b
b) Hacker Explanation: The answer is Denial of service. In
c) App controller case of denial of service attacks, a computer site is
d) Site controller bombarded with a lot of messages.
View Answer
1. A cipher in which the order is not preserved.
Answer: b a) Polyalphabetic substitution based
Explanation: The person is called hacker. A person b) Transposition-based
who enjoys learning the details of computer c) Substitution based
systems and how to stretch their capabilities is d) Public key based
called hacker. View Answer
116
Answer: a Answer: c
Explanation: The statement is true. Augmented Explanation: Smart glasses are also called as
Reality is the field of computer research that deals optical head mounted displays. (OHMD), it has the
with the combination of real-world and computer capability of reflecting projected images as well as
generated data. allowing users to see through it.
117
1. A model that is the demo implementation of the c) editing
system. d) implementation
a) waterfall View Answer
b) prototype
c) incremental Answer: d
d) agile Explanation: The requirements are broken down
View Answer for ease of implementation. Hardware and software
requirements are identified and designed
Answer: b accordingly.
Explanation: Prototype is the demo implementation
so that the customer gets a brief idea of his 6. What do you call a technical person who is
product. It is generally used when the customer capable of understanding the basic requirements?
requirements are not clear. a) team leader
b) analyst
2. Maintenance is the final phase in waterfall c) engineer
model. d) stakeholder
a) True View Answer
b) False
View Answer Answer: b
Explanation: The person is called an analyst. An
Answer: a analyst is a software engineering who is
Explanation: The statement is true. This is the responsible for requirements gathering.
phase in which the completed software product is
handed over to the client. 7. A step in waterfall model that involves a
meeting with the customer to understand the
3. A stage in which individual components are requirements.
integrated and ensured that they are error-free to a) Requirement Gathering
meet customer requirements. b) SRS
a) Coding c) Implementation
b) Testing d) Customer review
c) Design View Answer
d) Implementation
View Answer Answer: a
Explanation: A waterfall model involves
Answer: b requirement gathering as its first step. This is the
Explanation: Hardware and software components most important phase. It is important to understand
are tested individually. Testing stage in which the customer requirements.
individual components are integrated and ensured
that they are error-free to meet customer 8. Methodology in which project management
requirements. processes were step-by step.
a) Incremental
4. ___________ is a step in which design is b) Waterfall
translated into machine-readable form. c) Spiral
a) Design d) Prototyping
b) Conversion View Answer
c) Debugging
d) Coding Answer: b
View Answer Explanation: Waterfall model is based on step-by
step completion of the project. Every step is done
Answer: d individually.
Explanation: Coding is the step in which design in
translated into machine-readable form. If design is 9. An individual who plans and directs the work.
efficient, coding can be done effectively. a) Stakeholder
b) Project manager
5. The customer requirements are broken down c) Team leader
into logical modules for ease of _______________ d) Programmer
a) inheritance View Answer
b) design
118
Answer: b 4. Locating or identifying the bugs is known as
Explanation: Project planner is the one who plans ___________
and designs the project. Team leader is the one a) Design
who provides guidance, instruction, direction and b) Testing
leadership to a group of individuals. c) Debugging
d) Coding
10. A planned program if work that requires a View Answer
definitive amount of time, effort and planning to
complete. Answer: b
a) Problem Explanation: Testing is conducted by the testers.
b) Project They locate or identify the bugs. In debugging
c) Process developer fixes the bug. Coding is done by the
d) Program developers.
View Answer
5. Which defines the role of software?
Answer: b a) System design
Explanation: The answer is Project. A project is a b) Design
program which is something which is planned and c) System engineering
needs effort and time to complete. d) Implementation
View Answer
1. A set of activities that ensure that software
correctly implements a specific function. Answer: c
a) verification Explanation: The answer is system engineering.
b) testing System engineering defines the role of software.
c) implementation
d) validation 6. What do you call testing individual
View Answer components?
a) system testing
Answer: a b) unit testing
Explanation: Verification ensures that software c) validation testing
correctly implements a specific function. It is a d) black box testing
static practice of verifying documents. View Answer
119
d) Gray box abstraction involves hiding the details and giving
View Answer only the necessary information to the user.
10. A programming technique in which the focus 3 Missing slot covers on a computer can cause?
is on doing things. . A
over heat
a) object oriented .
b) procedural B
power surges
c) logical .
d) structural C
EMI.
View Answer .
D
incomplete path for ESD
Answer: b .
Explanation: In procedural programming, the focus E
None of the above
is on doing things(functions). It follows top-down .
approach.
Answer: Option A
Computer Hardware:
Explanation:
1 From what location are the 1st computer
. instructions available on boot up? No answer description available for this
A question. Let us discuss.
ROM BIOS
. View Answer Discuss in Forum Workspace
B Report
CPU
.
C 4 When installing PCI NICS you can check the
boot.ini
. . IRQ availability by looking at
121
A A
dip switches clusters
. .
B B
CONFIG.SYS sectors
. .
C C
jumper settings vectors
. .
D D
motherboard BIOS heads
. .
E E
None of the above None of the above
. .
Explanation: Explanation:
No answer description available for this No answer description available for this
question. Let us discuss. question. Let us discuss.
View Answer Discuss in Forum Workspace View Answer Discuss in Forum Workspace
Report Report
5 With respect to a network interface card, the 8 A wrist grounding strap contains which of the
. term 10/100 refers to . following:
A A
protocol speed Surge protector
. .
B B
a fiber speed Capacitor
. .
C C
megabits per seconds Voltmeter
. .
D D
minimum and maximum server speed Resistor
. .
E E
None of the above None of the above
. .
No answer description available for this No answer description available for this
question. Let us discuss. question. Let us discuss.
View Answer Discuss in Forum Workspace View Answer Discuss in Forum Workspace
Report Report
10 In laser printer technology, what happens 13 To view any currently running Terminate Stay
. during the conditioning stage? . Resident (TSR's) programs you could type:
AThe corona wire places a uniform positive A
Memory
. charge on the paper .
BA uniform negative charge is placed on the B
MEM
. photosensitive drum .
CA uniform negative charge is placed on the C
SYS /M
. toner .
D D
All of the above Memmaker
. .
E E
None of the above None of the above
. .
Explanation: Explanation:
No answer description available for this No answer description available for this
question. Let us discuss. question. Let us discuss.
View Answer Discuss in Forum Workspace View Answer Discuss in Forum Workspace
Report Report
34 What tool is used to test serial and parallel 37 What voltage does a Pentium system use?
. ports? . A
+12 volts
A .
high volt probe
. B
+ 5 volts
B .
cable scanner
. C
+ 8 volts
C .
loop backs (wrap plugs)
. D
+3.3 volts
D .
sniffer
. E
None of the above
E .
None of the above
.
Answer: Option D
Answer: Option C
Explanation:
Explanation:
No answer description available for this
No answer description available for this question. Let us discuss.
question. Let us discuss. View Answer Discuss in Forum Workspace
View Answer Discuss in Forum Workspace Report
Report
38 A numeric error code check: A 17xx indicates a
35 ESD would cause the most damage to which . problem with:
. component? A
CMOS
A .
Power supply
. B
ROM BIOS
B .
Expansion board
. C
DMA controller
C .
Monitor
. D
hard drive or controller
D .
Keyboard
. E
power supply
E .
None of the above
.
Answer: Option D
Answer: Option B
36 What is the highest binary number that can be Explanation:
. referred to on a three position jumper block?
A No answer description available for this
4
. question. Let us discuss.
B View Answer Discuss in Forum Workspace
6
. Report
C
F
. 39 Which provides the fastest access to large
D1 . video files?
127
A .
Optical drives
. B
press alt + Ctrl + delete, and end task
B .
IDE hard drives
. C
press the reset button on the computer
C .
SCSI hard drives
. D
turn off computer and boot from a floppy disk
D .
EIDE hard drives
. E
None of the above
E .
None of the above
.
Answer: Option D
Answer: Option C
Explanation:
Explanation:
No answer description available for this
No answer description available for this question. Let us discuss.
question. Let us discuss. View Answer Discuss in Forum Workspace
View Answer Discuss in Forum Workspace Report
Report
43 RS-232 is a standard that applies to:
40 A 25-pin female connector on the back of your . A
serial ports
. computer will typically be: .
A B
Serial port 1 parallel ports
. .
B C
A parallel port game ports
. .
C D
Docking networks
. .
D E
COM2 port digital frequencies
. .
E
None of the above
. Answer: Option A
Explanation: Explanation:
No answer description available for this No answer description available for this
question. Let us discuss. question. Let us discuss.
View Answer Discuss in Forum Workspace View Answer Discuss in Forum Workspace
Report Report
4 Match the device driver HIMEM.SYS to its 7 An anti static strap uses a small _____ to make
. operation. . sure you do not become the least path of
A resistance to the ground?
Supports (ANSI) terminal emulation
. A
capacitor
B .
Manages the use of extended memory
. Bdiode
130
. question. Let us discuss.
C View Answer Discuss in Forum Workspace
transistor
. Report
D
resistor
. 10 Which values are held in CMOS for the hard
E . drive
None of the above
. A
size (heads, cylinders, sectors)
.
Answer: Option D B
IRQ
.
Explanation: C
Free space
.
No answer description available for this D
Virus alert
question. Let us discuss. .
View Answer Discuss in Forum Workspace E
None of the above
Report .
8 If the memory slots have 30 pins then the chip is Answer: Option A
. a? 11 Which of the following would be a logical first
A . step in troubleshooting a PC?
DIMM A
. Check the computer CMOS
B .
SIMM B
. Define the circumstances of the problem
C .
SDRAM C
. Call the vendor
D .
All of the above D
. Define what applications are being used
E .
None of the above E
. None of the above
.
Answer: Option B
Answer: Option B
Explanation:
Explanation:
No answer description available for this
question. Let us discuss. No answer description available for this
View Answer Discuss in Forum Workspace question. Let us discuss.
Report View Answer Discuss in Forum Workspace
Report
9 Laser Jet printer speeds are measured in pages
. per minute (ppm) what do we use to measure dot- 12 Which DOS driver is used to emulate expanded
matrix printers? . memory?
A A
lines per inch Himem.sys
. .
B B
lines per sheet EMM386.exe
. .
C C
characters per inch Mem386.sys
. .
D D
characters per second Ramdrive.sys
. .
E E
None of the above None of the above
. .
Explanation: Explanation:
No answer description available for this No answer description available for this
131
question. Let us discuss. E
None of the above
View Answer Discuss in Forum Workspace .
Report
Answer: Option C
13 For a Macintosh to print successfully, the 16 When is the risk for electrostatic discharge the
. System Folder must contain: . greatest?
A A
File sharing software Day time
. .
B B
A printer enabler High humidity
. .
C C
The apple Garamond font set Low humidity
. .
D D
A printer driver Night time
. .
E E
None of the above None of the above
. .
Explanation: Explanation:
No answer description available for this No answer description available for this
question. Let us discuss. question. Let us discuss.
View Answer Discuss in Forum Workspace View Answer Discuss in Forum Workspace
Report Report
Explanation: Explanation:
No answer description available for this No answer description available for this
question. Let us discuss. question. Let us discuss.
View Answer Discuss in Forum Workspace View Answer Discuss in Forum Workspace
Report Report
20 In a computer with an eide adapter, where 23 During boot-up, the memory test:
. should you connect an ATA CD-ROM drive? . A
Is a superfluous step that should be ignored
A .
on the floppy bus
. BChecks and verifies that contiguous memory
B . is installed
on the primary IDE
. C
Is an operational error
C .
on the secondary IDE
. DDisplays what memory is installed, but
D . nothing else
on the SCSI bus
. E
None of the above
E .
All of the above
.
Answer: Option B
Answer: Option C
21 What's the best way to prevent damaging your Explanation:
. PC with static electricity?
A No answer description available for this
place your PC on a rubber mat
. question. Let us discuss.
B View Answer Discuss in Forum Workspace
wear leather soled shoes
. Report
Cperiodically touch a safe ground point on the
. PC to discharge yourself 24 IRQ6 is typically reserved for:
D . A
static electricity doesn't really hurt a PC The floppy
. .
E B
wear an ESD wrist strap The keyboard controller
. .
133
C CThe map statement is not in the autoexec.bat
LPT2
. . file
D D
The modem The last drive was not set correctly
. .
E E
None of the above None of the above
. .
Explanation: Explanation:
No answer description available for this No answer description available for this
question. Let us discuss. question. Let us discuss.
View Answer Discuss in Forum Workspace View Answer Discuss in Forum Workspace
Report Report
25 Which would you do first when 28 What do you need to check serial and parallel
. troubleshooting a faulty monitor? . port?
ACheck its connections to the computer and A
Port adapter
. power source .
BUse a meter to check the CRT and internal B
Logic probe
. circuitry for continuity .
CPower down the monitor, then turn it on again C
Loopback plug
. to see if that corrects the problem .
DPower down the computer, then turn it on D
All of the above
. again to see if that corrects the problem .
E E
None of the above None of the above
. .
Explanation:
136
No answer description available for this .
question. Let us discuss. E
None of the above
View Answer Discuss in Forum Workspace .
Report
Answer: Option B
42 A COM port is a _____ port.
. A Explanation:
parallel
.
B No answer description available for this
serial
. question. Let us discuss.
C View Answer Discuss in Forum Workspace
static
. Report
D
multi
. 45 What is the most significant difference between
E . the USB and IEEE1394 standards?
SCSI
. A
IEEE 1394 is faster
.
Answer: Option B B
USB does not support USB
.
Explanation: C
USB is plug and play
.
No answer description available for this D
IEEE 1394 is hot swappable
question. Let us discuss. .
View Answer Discuss in Forum Workspace E
None of the above
Report .
139
No answer description available for this No answer description available for this
question. Let us discuss. question. Let us discuss.
View Answer Discuss in Forum Workspace View Answer Discuss in Forum Workspace
Report Report
Explanation: Explanation:
No answer description available for this No answer description available for this
question. Let us discuss. question. Let us discuss.
View Answer Discuss in Forum Workspace View Answer Discuss in Forum Workspace
Report Report
24 What is the paper feeding technology most 27 A capacitor is measured in which of the
. commonly associated with dot-matrix printers? . following units?
A A
sheet feed Volts
. .
B B
tractor feed Ohms
. .
C C
friction feed Farads
. .
D D
manual feed Resistance
. .
E E
None of the above None of the above
. .
Explanation: Explanation:
No answer description available for this No answer description available for this
question. Let us discuss. question. Let us discuss.
View Answer Discuss in Forum Workspace View Answer Discuss in Forum Workspace
Report Report
25 COM1 is typically represented by which of the 28 UART is a type of serial chip. Its letters stand
. following? . for:
A A
15 pin port unidirectional access regarding transmission
. .
B B
9 pin male port universal asynchronous receiver/ transmitter
. .
C C
9 pin female port upper advanced real transfer
. .
D D
25 pin male port unable all restore t-bits
. .
E E
None of the above use all ROM types
. .
143
.
Answer: Option B
Answer: Option B
Explanation:
Explanation:
No answer description available for this
question. Let us discuss. No answer description available for this
View Answer Discuss in Forum Workspace question. Let us discuss.
Report View Answer Discuss in Forum Workspace
Report
29 A system has two IDE hard drives that are each
. divided into primary and extended partitions, 32 In the Binary numbering system, a (1)
which drive letter is assigned to the primary . represents a jumper being shorted and a (0)
partition of the second drive? represents a jumper being open. On a three-bit
A jumper block on a SCSI drive, how would an ID
C
. of logical 3 be set?
B A
D 100
. .
C B
E 010
. .
D C
F 011
. .
E D
None of the above . 101
. .
E
None of the above
Answer: Option B .
35 What are the most likely conditions for ESD? 38 In the DOS memory model, the HIGH Memory
. A . Area (HMA). is the _____ memory.
Hot and dry
. A
Last 64k of conventional
B .
Hot and wet
. B
Last 64k of extended
C .
Cold and dry
. C
First 64k above conventional
D .
Cold and wet
. D
First 64k of extended
E .
None of the above
. E
None of the above
.
Answer: Option B
36 What is the i/o address for com3? Answer: Option D
. A
3e8
. Explanation:
B
345
. No answer description available for this
C question. Let us discuss.
ff8
. View Answer Discuss in Forum Workspace
D Report
5e8
.
E 39 In addition to I/O port addresses, SCSI adapters
be8
. . also use a range of ROM addresses for their
onboard BIOS.
Answer: Option A A
True
.
Explanation: B
False
.
No answer description available for this
question. Let us discuss. Answer: Option A
View Answer Discuss in Forum Workspace
Report Explanation:
37 The following process determines the amount No answer description available for this
. of memory present, the date/ time, and which question. Let us discuss.
communications ports and display adapters are View Answer Discuss in Forum Workspace
installed in a microcomputer? Report
A
Start-up utility test
. 40 COM1 is typically represented by which of the
B . following?
Power on Self Test
. A
C 15 pin port
Power up boot process .
. B
D 9 pin male port
Power on start up process .
. C
E 9 pin female port
None of the above .
. D
25 pin male port
.
Answer: Option B E
None of the above
.
Explanation:
Answer: Option B
No answer description available for this 41 A PC with a 486DX2 processor runs internally
question. Let us discuss. . at 50Mhz. What speed would its external logic
154
be running? Explanation:
A
l0Mhz
. No answer description available for this
B question. Let us discuss.
25Mhz
. View Answer Discuss in Forum Workspace
C Report
50Mhz
.
D 44 Which REQUIRES an anti-static bag for
100 Mhz
. . transport?
E A
None of the above Monitor
. .
B
Floppy disks
Answer: Option B .
C
Power supply
Explanation: .
D
I/O controller
No answer description available for this .
question. Let us discuss. E
None of the above
View Answer Discuss in Forum Workspace .
Report
Answer: Option D
42 A capacitor is measured in which of the
. following units? Explanation:
A
Volts
. No answer description available for this
B question. Let us discuss.
Ohms
. View Answer Discuss in Forum Workspace
C Report
Farads
.
D 45 Static electricity thrives is which type of
Resistance
. . environment?
E A
None of the above cold and humid
. .
B
warm and humid
Answer: Option C .
C
warm and dry
Explanation: .
D
cold and warm
No answer description available for this .
question. Let us discuss. E
cold and dry
View Answer Discuss in Forum Workspace .
Report
Answer: Option E
43 Which device uses a DMA channel? 46 ESD potential decreases with the use of:
. A . A
Modem De-ionizing fans
. .
B B
Network Card A wrist strap
. .
C C
Sound Card Rubber gloves with matching cap
. .
D D
All of the above A static meter
. .
E E
None of the above None of the above
. .
155
Explanation: .
D
Resistor
No answer description available for this .
question. Let us discuss. E
None of the above
View Answer Discuss in Forum Workspace .
Report
Answer: Option D
47 With a dot matrix printer, light then dark print
. is most commonly caused by: Explanation:
A
Erratic paper advancement
. No answer description available for this
B question. Let us discuss.
Erratic ribbon advancement
. View Answer Discuss in Forum Workspace
C Report
Misalligned print head
.
D 50 Every video card must have?
Overheating print head
. . A
E CMOS
None of the above .
. B
RAM
.
Answer: Option B C
CPU
.
Explanation: D
All of the above
.
No answer description available for this E
None of the above
question. Let us discuss. .
View Answer Discuss in Forum Workspace
Report Answer: Option B
1. What is the jumper setting on a SCSI device to
48 How many DMA channels are there in an AT configure it to use the fourth SCSI id?
. class PC? Remember, SCSI ids start with zero.
A A
3 010
. .
B B
4 110
. .
C C
7 011
. .
D D
8 101
. .
E E
None of the above 001
. .
Explanation: Explanation:
No answer description available for this No answer description available for this
question. Let us discuss. question. Let us discuss.
View Answer Discuss in Forum Workspace View Answer Discuss in Forum Workspace
Report Report
49 A wrist grounding strap contains which of the 2 What tool is used to test serial and parallel
. following: . ports?
A A
Surge protector high volt probe
. .
B B
Capacitor cable scanner
. .
CVoltmeter Cloop backs (wrap plugs)
156
. 5 If a computer's BIOS allows it, you can boot
D . from a CD-ROM.
sniffer
. A
True
E .
None of the above
. B
False
.
Answer: Option C
Answer: Option A
Explanation: 6 ISDN stands for:
. A
internal select data nulls
No answer description available for this .
question. Let us discuss. B
integrated services digital network
View Answer Discuss in Forum Workspace .
Report C
interval set down next
.
3 Which best describes a fragmented hard drive: D
interior sector direct none
. A .
The platters are bad E
. inferior sector data net
B .
Data files are corrupted
.
C Answer: Option B
Clusters of data are damaged
.
D Explanation:
Files are not stored in consecutive clusters
.
E No answer description available for this
None of the above
. question. Let us discuss.
View Answer Discuss in Forum Workspace
Answer: Option D Report
15 Which device should not be plugged into a 18 What Does EISA stand for?
. standard ups? . A
Extended Industry Standard Architecture
A .
monitor
. B
Expanded Industry Standard Architecture
B .
laser printer
. C
Enhanced Industry Standard Architecture
C .
ink-jet printer
. D
Electronics Industry Standard Architecture
D .
an external modem
. E
All of the above
E .
None of the above
.
Answer: Option A
Answer: Option B
16 What is the main communication method from Explanation:
. one PDA to another PDA?
A No answer description available for this
IR
. question. Let us discuss.
B View Answer Discuss in Forum Workspace
USB
. Report
C
RS-232
. 19 A static jolt of as little of _____ volts can fry
D . most any PC integrated circuit.
IEEE 1394
. A
E 200
None of the above .
. B
30
.
Answer: Option A C
1000
.
Explanation: D
200
.
No answer description available for this E
500
question. Let us discuss. .
View Answer Discuss in Forum Workspace
Report Answer: Option B
Explanation: Explanation:
No answer description available for this No answer description available for this
question. Let us discuss. question. Let us discuss.
View Answer Discuss in Forum Workspace View Answer Discuss in Forum Workspace
160
Report
Answer: Option D
27 A human cannot feel a static discharge as high
. as _____ volts. Explanation:
A
200
. No answer description available for this
B question. Let us discuss.
2000
. View Answer Discuss in Forum Workspace
C Report
10000
.
D 30 What does the acronym RTS represent?
50000
. . A
E Required to save
50 .
. B
Ready to start
.
Answer: Option A C
Request to send
.
Explanation: D
Right to separate
.
No answer description available for this E
None of the above
question. Let us discuss. .
View Answer Discuss in Forum Workspace
Report Answer: Option C
31 Which is the easiest component to
28 What can you use to ensure power is not . environmentally recycle?
. interrupted, resulting in corrupted data? A
A Motherboards
UPS .
. B
B CMOS batteries
Proper grounding .
. C
C Toner cartridges
Surge protector .
. D
D Cathode ray tubes
Sag protector .
. E
E None of the above
None of the above .
.
Answer: Option C
Answer: Option A
Explanation:
Explanation:
No answer description available for this
No answer description available for this question. Let us discuss.
question. Let us discuss. View Answer Discuss in Forum Workspace
View Answer Discuss in Forum Workspace Report
Report
32 What problem can occur if a printer cable is to
29 Which step should you perform first before . close to a power cable?
. discharging a CRT? A
A ESD Electrostatic Discharge
Remove the CRT from its housing .
. B
B EMI Electromagnetic Interference
Disconnect the CRT from the computer .
. C
C parity error
Remove the video assembly .
. D
DTurn power off before removing power no affect
.
. source E
E None of the above
None of the above .
.
161
.
Answer: Option B C
parity error
.
Explanation: D
no affect
.
No answer description available for this E
None of the above
question. Let us discuss. .
View Answer Discuss in Forum Workspace
Report Answer: Option B
36 How can you totally protect a PC from damage
33 ESD damage can be caused by: . during an electrical storm?
. A A
Placing an IC in a non-conductive plastic bag Disconnect the AC power cable
. .
B BDisconnect all external cables and power
Placing an IC on a grounded mat . cords
.
C C
Repeated sags in current supplied from outlets Use a surge protector
. .
D D
Touching metal on the chasis Turn off the AC power
. .
E E
None of the above None of the above
. .
Explanation: Explanation:
No answer description available for this No answer description available for this
question. Let us discuss. question. Let us discuss.
View Answer Discuss in Forum Workspace View Answer Discuss in Forum Workspace
Report Report
34 The standard VGA display has _____ pixels in 37 The ESD wrist strap is designed to protect PC
. its native graphics mode? . Components or Service Technicians ?
A A
648 x 320 PC Components
. .
B B
640 x 480 Service Technicians
. .
C C
680 x 440 All of the above
. .
D D
1024 x 786 None of the above
. .
E
None of the above Answer: Option C
.
Explanation: Explanation:
No answer description available for this No answer description available for this
question. Let us discuss. question. Let us discuss.
View Answer Discuss in Forum Workspace View Answer Discuss in Forum Workspace
Report Report
14 Which hardware component controls serial port 17 The 34-pin connection on an I/O card is for?
. communications? . A
floppy drive
A .
ROM BIOS BSCSI drive
.
167
. Explanation:
C
IDE drive
. No answer description available for this
D question. Let us discuss.
zip drive
. View Answer Discuss in Forum Workspace
E Report
None of the above
.
20 Which of the following is a type of
Answer: Option A . preventative maintenance used on a hard drive?
A
Disk check diagnostics
Explanation: .
B
Head alignment diagnostics
No answer description available for this .
question. Let us discuss. C
Initializing
View Answer Discuss in Forum Workspace .
Report D
Uninstalling programs
.
18 You run a super wing-ding diagnostic program E
None of the above
. on your PC, and it reports that your hard drive, .
microprocessor, RAM, and video card have seen
better days. To resolve this problem you should: Answer: Option A
Areplace each part one at a time, rerunning the 21 ESD damage can be caused by:
. diagnostic before replacing the next part. . A
Placing an IC in a non-conductive plastic bag
B .
check to see if you have a software problem B
. Placing an IC on a grounded mat
Creplace everything at once and rerun the .
. diagnostic C
Repeated sags in current supplied from outlets
D .
get another copy of the diagnostic program D
. Touching metal on the chassis
E .
run an exhaustive memory check E
. None of the above
.
Answer: Option B
Answer: Option A
Explanation:
Explanation:
No answer description available for this
question. Let us discuss. No answer description available for this
View Answer Discuss in Forum Workspace question. Let us discuss.
Report View Answer Discuss in Forum Workspace
Report
19 On a leased line installation a known good
. external modem shows no carrier detect light. 22 How can you totally protect a PC from damage
Where is the problem most likely to be? . during an electrical storm?
A A
In the modem Disconnect the AC power cable
. .
B BDisconnect all external cables and power
In the phone line . cords
.
C C
In the computer Use a surge protector
. .
D D
In the DTC equipment Turn off the AC power
. .
E E
None of the above None of the above
. .
168
Explanation: .
D
second adapter card
No answer description available for this .
question. Let us discuss. E
CMOS battery
View Answer Discuss in Forum Workspace .
Report
Answer: Option A
23 When you boot a PC and don't hear any beep, 26 What are the IRQ's for sound card?
. this could suggest which of the following? . A
IRQ8
A .
The monitor is turned off
. B
IRQ4
B .
Keyboard not plugged in
. C
IRQ5
C .
Normal PC boot
. D
IRQ7
D .
Bad or disconnected speaker
. E
None of the above
E .
None of the above
.
Answer: Option C
Answer: Option D
Explanation:
Explanation:
No answer description available for this
No answer description available for this question. Let us discuss.
question. Let us discuss. View Answer Discuss in Forum Workspace
View Answer Discuss in Forum Workspace Report
Report
27 Your IDE hard drive is not spinning up when
24 What is the file extension used by WIN95 to . you turn on the PC. What is the most likely
. back up registry file when windows starts? problem.
A A
.dat bad data cable
. .
B B
.dao incorrect jumper setting on drive
. .
C C
.bak loose molex connector
. .
D D
.tmp virus
. .
E E
None of the above tfad system board
. .
Explanation: Explanation:
No answer description available for this No answer description available for this
question. Let us discuss. question. Let us discuss.
View Answer Discuss in Forum Workspace View Answer Discuss in Forum Workspace
Report Report
25 A 2xx POST error code indicates a problem 28 You can place an ISA device in an EISA slot.
. with: . A
True
A .
RAM or ROM
. B
False
B .
hard drive
.
Csystem board
169
Answer: Option A Answer: Option D
Explanation: Explanation:
No answer description available for this No answer description available for this
question. Let us discuss. question. Let us discuss.
View Answer Discuss in Forum Workspace View Answer Discuss in Forum Workspace
Report Report
29 Which provides the fastest access to large 32 What resistance in ohms should be displayed
. video files? . when testing a speaker in a computer?
A A
Optical drives Q Ohms
. .
B B
IDE hard drives 16 Ohms
. .
C C
SCSI hard drives -200 Ohms
. .
D D
EIDE hard drives Unlimited Ohms
. .
E E
None of the above None of the above
. .
Explanation: Explanation:
No answer description available for this No answer description available for this
question. Let us discuss. question. Let us discuss.
View Answer Discuss in Forum Workspace View Answer Discuss in Forum Workspace
Report Report
30 An anti static strap uses a small _____ to make 33 After displaying the directory of a floppy disk,
. sure you do not become the least path of . a different floppy is inserted into the drive. The
resistance to the ground? contents of the original floppy continue to
A display regardless of the director requests on the
capacitor
. other floppies placed in the drive. You remove
B the drive in question and install it into your test
diode
. system, and it does not exhibit the problem. You
C should next replace the:
transistor
. A
System's floppy drive device driver
D .
resistor
. B
Original IDE controller
E .
None of the above
. C
Floppy drive ribbon cable
.
Answer: Option D D
System's power supply
31 Which best describes a fragmented hard drive: .
. A E
The platters are bad None of the above
. .
B
Data files are corrupted
. Answer: Option C
C
Clusters of data are damaged
. Explanation:
D
Files are not stored in consecutive clusters
. No answer description available for this
E question. Let us discuss.
None of the above
. View Answer Discuss in Forum Workspace
170
Report
37 A customer has just installed a new cd-rw. the
34 What is the best ground for a conductive work . system was working fine before the installation,
. bench? but now the cdrom does not work, what should
A you suggest that the customer do?
AC outlet
. A
flash or upgrade the BIOS
B .
Ground to bench
. B
check the CONFIG.SYS
C .
To the motherboard
. C
add cdrw in the device manager
D .
To the PC's Chassis
. D
check the jumper setting on the cd-rw
E .
None of the above
. E
None of the above
.
Answer: Option A
Answer: Option D
Explanation:
Explanation:
No answer description available for this
question. Let us discuss. No answer description available for this
View Answer Discuss in Forum Workspace question. Let us discuss.
Report View Answer Discuss in Forum Workspace
Report
35 When you are testing a fuse, you should set the
. Volt-OHM meter to what scale? 38 Which is the most difficult environmentally to
A . dispose of?
AC
. A
floppy drives
B .
DC
. B
hard drives
C .
AMPS
. C
power supplies
D .
OHMS
. D
CRTs
E .
None of the above
. E
system boards
.
Answer: Option D
36 During boot-up, the memory test: Answer: Option D
. A
Is a superfluous step that should be ignored
. Explanation:
BChecks and verifies that contiguous memory
. is installed No answer description available for this
C question. Let us discuss.
Is an operational error
. View Answer Discuss in Forum Workspace
DDisplays what memory is installed, but Report
. nothing else
E 39 Resistance is measured:
None of the above
. . A
in parallel
.
Answer: Option A B
in series
.
Explanation: C
after breaking the circuit
.
No answer description available for this D
after checking voltage
question. Let us discuss. .
View Answer Discuss in Forum Workspace E
after checking current
Report .
171
No answer description available for this
Answer: Option C question. Let us discuss.
View Answer Discuss in Forum Workspace
Explanation: Report
Explanation: Explanation:
No answer description available for this No answer description available for this
question. Let us discuss. question. Let us discuss.
View Answer Discuss in Forum Workspace View Answer Discuss in Forum Workspace
Report Report
9 On PC power supplies, the wire attached to pin 12 What is the size of a sector?
. one is usually: . A
512 bytes
A .
blue or red B
. 256 bytes
B .
blue or white C
. 512 Kb
C .
red or black D
. 1024 bytes
D .
red or white E
. None of the above
E .
white or orange
.
Answer: Option A
Answer: Option E
Explanation:
Explanation:
No answer description available for this
175
question. Let us discuss. .
View Answer Discuss in Forum Workspace
Report Answer: Option D
16 A brownout is defined as:
13 During the normal PC boot process, which of . Aa slightly elevated voltage lasting from
. the following is active first? . seconds to minutes or more
A Ba slightly decreased voltage lasting from
RAM BIOS
. . seconds to minutes or more
B C
CMOS complete power out lasting a few minutes
. .
C Dalternating power out, power on lasting a few
ROM BIOS
. . minutes
D E
Hard disk information has nothing to do with electricity
. .
E
None of the above
. Answer: Option B
Explanation: Explanation:
No answer description available for this No answer description available for this
question. Let us discuss. question. Let us discuss.
View Answer Discuss in Forum Workspace View Answer Discuss in Forum Workspace
Report Report
15 In which mode can 2 or more applications be 18 Which component stores an electrical charge?
. stored in memory at the same time? . A
A diode
Segmented Mode .
. B
B rectifier
Unprotected Mode .
. C
C capacitor
Real Mode .
. D
D resistor
Protected Mode .
. E
ENone of the above transistor
.
176
.
Answer: Option C D
Beer or Jack Daniels
.
Explanation: E
None of the above
.
No answer description available for this
question. Let us discuss. Answer: Option B
View Answer Discuss in Forum Workspace
Report Explanation:
19 You are installing an IDE hard drive that will No answer description available for this
. be your boot drive. Which is the correct order of question. Let us discuss.
steps that need to be followed? View Answer Discuss in Forum Workspace
jumper properly, auto-detect(or configure Report
A
manually) in CMOS, low level format, high
.
level format, partition 22 Which controller would support an external
jumper properly, auto-detect(or configure . CD-ROM drive?
B
manually) in CMOS, partition, high level A
. ESDI
format with / s switch .
jumper properly, partition, auto-detect(or B
C ARLL
configure manually in CMOS, high level .
.
format with /s switch C
MFM
Djumper properly, auto-detect in CMOS, .
. regular format D
SCSI
Ejumper properly, partition, low level format, .
. high level format E
None of the above
.
Answer: Option B
Answer: Option D
Explanation:
Explanation:
No answer description available for this
question. Let us discuss. No answer description available for this
View Answer Discuss in Forum Workspace question. Let us discuss.
Report View Answer Discuss in Forum Workspace
Report
20 Which type of cable is most likely in use with
. rj-45 connectors? 23 What would you ask to determine if the display
A . is working?
10base2
. AIs there a video cursor or action on the
B . screen?
10base5
. B
Did the computer beep or chime?
C .
10baseT
. C
Is there high voltage static on the screen
D .
10baseFL
. DIs the brightness or contrast turned up or
E . down?
None of the above
. E
All of the above
.
Answer: Option C
21 To prevent toner from sticking to a laser Answer: Option E
. printer's heat rollers, apply which of the
following: Explanation:
A
Alcohol
. No answer description available for this
B question. Let us discuss.
Oil
. View Answer Discuss in Forum Workspace
CAmmonia Report
177
Report
24 You should never put floppy drives, hard
. drives, or even VCR tapes or cassette tapes on 27 RS-232 is a standard that applies to?
top of speakers (or near any other source of . A
Parallel port
magnetism) because of: .
A B
RFI Serial port
. .
B C
EMI Game port
. .
C D
EXE All of the above
. .
D E
FYI None of the above
. .
E
IOU
. Answer: Option B
Explanation: Explanation:
No answer description available for this No answer description available for this
question. Let us discuss. question. Let us discuss.
View Answer Discuss in Forum Workspace View Answer Discuss in Forum Workspace
Report Report
30 How would you allow device drivers and TSR's 33 In inkjet technology the droplets of ink are
. to be loaded into Upper Memory Blocks ? . deflected by?
A A
DOS=High Electrically Charge Plate
. .
B B
devicehigh= Multi directional nozzle
. .
C C
loadhigh= High pressure jets
. .
D D
DOS=UMB All of the above
. .
E E
None of the above None of the above
. .
42 The standard IRQ for the floppy drive is? Answer: Option A
. A
9 Explanation:
.
B
6
. No answer description available for this
C question. Let us discuss.
10
. View Answer Discuss in Forum Workspace
D Report
All of the above
.
E 45 To find out how much memory is available,
None of the above
. . you could type _____
A
EMM
Answer: Option B .
B
MEM
Explanation: .
C
CHKDSK
No answer description available for this .
question. Let us discuss. D
MEMMAKER
View Answer Discuss in Forum Workspace .
Report E
None of the above
.
43 A keyboard locks up intermittently even when
. replaced with a new keyboard. What is the Answer: Option B
LEAST likely cause of the problem? 46 IBM's Micro Channel Architecture (MCA)
A . specifies which type of the following bit access
A second bad keyboard widths?
.
B A
The keyboard controller chip 8 bit & 16 bit
. .
C B
The keyboard connector 16 bit & 24 bit
. .
D C
The motherboard 16 bit & 32 bit
. .
E D
None of the above 32 bit & 64 bit
. .
E
None of the above
Answer: Option A .
Explanation: Explanation:
No answer description available for this No answer description available for this
question. Let us discuss. question. Let us discuss.
View Answer Discuss in Forum Workspace View Answer Discuss in Forum Workspace
Report Report
49 A PC with a 486DX2 processor runs internally 52 The output voltages of a PC power supply are
. at 50Mhz. What speed would its external logic . in the form of _____ current.
be running? A
A AC
l0Mhz .
. B
B DC
25Mhz .
. C
C amperage
50Mhz .
. D
D100 Mhz resistive
.
182
E 55 In laser printing, there are six steps the printer
trickle
. . follows. What comes between the conditioning
phase and the developing phase?
Answer: Option B A
transfer phase
.
Explanation: B
writing phase
.
No answer description available for this C
fusing phase
question. Let us discuss. .
View Answer Discuss in Forum Workspace D
cleaning phase
Report .
E
All of the above
53 After doing a low-level format, what would be .
. the next step in configuring the hard drive in a
system? Answer: Option B
A 56 During the laser printer's conditioning phase a
Format DOS partition . uniform charge of _____ is placed on the
.
B photosensitive drum.
Install operating system A
. +1000 volt
CConfigure DMA channel and back-up .
. interrupt B
+600 volts
D .
Partition hard disk C
. -600 volts
E .
None of the above D
. -1000 volts
.
Answer: Option D E
+ 12 volts
.
Explanation:
Answer: Option C
No answer description available for this
question. Let us discuss. Explanation:
View Answer Discuss in Forum Workspace
Report No answer description available for this
question. Let us discuss.
54 After trying to unload a TSR, you get an error View Answer Discuss in Forum Workspace
. message saying that other TSRs were loaded Report
after the one you tried to remove. Which of the
following commands could you use to see the 57 A dialog box with a bomb appears oh a
current load order? . Macintosh screen. What type of problem has
A occurred?
MEM /P A
. A RAM problem
B .
MEMMAKER B
. A software problem
C .
MEM /C (A SYS: C
. A ROM problem
D .
None of the above D
. An ADB problem
.
Answer: Option C E
None of the above
.
Explanation:
Answer: Option B
No answer description available for this
question. Let us discuss. Computer Architecture:
View Answer Discuss in Forum Workspace
Report 1. The ______ format is usually used to store data.
a) BCD
183
b) Decimal are compared to RAM because they optimize the
c) Hexadecimal performance of the system and they only keep files
d) Octal which are required by the current process in them
View Answer
6. The ALU makes use of _______ to store the
Answer: a intermediate results.
Explanation: The data usually used by computers a) Accumulators
have to be stored and represented in a particular b) Registers
format for ease of use. c) Heap
d) Stack
2. The 8-bit encoding format used to store data in View Answer
a computer is ______
a) ASCII Answer: a
b) EBCDIC Explanation: The ALU is the computational center
c) ANCI of the CPU. It performs all the mathematical and
d) USCII logical operations. In order to perform better, it
View Answer uses some internal memory spaces to store
immediate results.
Answer: b
Explanation: The data to be stored in the 7. The control unit controls other units by
computers have to be encoded in a particular way generating ____
so as to provide secure processing of the data. a) Control signals
b) Timing signals
3. A source program is usually in _______ c) Transfer signals
a) Assembly language d) Command Signals
b) Machine level language View Answer
c) High-level language
d) Natural language Answer: b
View Answer Explanation: This unit is used to control and
coordinate between the various parts and
Answer: c components of the CPU.
Explanation: The program written and before being
compiled or assembled is called as a source 8. ______ are numbers and encoded characters,
program. generally used as operands.
a) Input
4. Which memory device is generally made of b) Data
semiconductors? c) Information
a) RAM d) Stored Values
b) Hard-disk View Answer
c) Floppy disk
d) Cd disk Answer: b
View Answer Explanation: None.
186
d) Multiple bus b) Register file
View Answer c) Register Block
d) Map registers
Answer: a View Answer
Explanation: PCI BUS is used to connect other
peripheral devices which require a direct Answer: b
connection with the processor. Explanation: None.
4. IBM developed a bus standard for their line of 9. The main advantage of multiple bus
computers ‘PC AT’ called _____ organisation over a single bus is _____
a) IB bus a) Reduction in the number of cycles for execution
b) M-bus b) Increase in size of the registers
c) ISA c) Better Connectivity
d) None of the mentioned d) None of the mentioned
View Answer View Answer
Answer: c Answer: a
Explanation: None. Explanation: None.
5. The bus used to connect the monitor to the CPU 10. The ISA standard Buses are used to connect
is ______ ___________
a) PCI bus a) RAM and processor
b) SCSI bus b) GPU and processor
c) Memory bus c) Harddisk and Processor
d) Rambus d) CD/DVD drives and Processor
View Answer View Answer
Answer: b Answer: c
Explanation: SCSI BUS is usually used to connect Explanation: None.
the video devices to the processor.
1. During the execution of the instructions, a copy
6. ANSI stands for __________ of the instructions is placed in the ______
a) American National Standards Institute a) Register
b) American National Standard Interface b) RAM
c) American Network Standard Interfacing c) System heap
d) American Network Security Interrupt d) Cache
View Answer View Answer
Answer: a Answer: d
Explanation: None. Explanation: None.
7. _____ register Connected to the Processor bus 2. Two processors A and B have clock
is a single-way transfer capable. frequencies of 700 Mhz and 900 Mhz respectively.
a) PC Suppose A can execute an instruction with an
b) IR average of 3 steps and B can execute with an
c) Temp average of 5 steps. For the execution of the same
d) Z instruction which processor is faster?
View Answer a) A
b) B
Answer: d c) Both take the same time
Explanation: The Z register is a special register d) Insufficient information
which can interact with the processor BUS only. View Answer
advertisement
Answer: a
8. In multiple Bus organisation, the registers are Explanation: The performance of a system can be
collectively placed and referred as ______ found out using the Basic performance formula.
a) Set registers
187
3. A processor performing fetch or decoding of operation speed of the processor by reducing the
different instruction during the execution of time taken to compile the program instructions.
another instruction is called ______
a) Super-scaling 7. The ultimate goal of a compiler is to ________
b) Pipe-lining a) Reduce the clock cycles for a programming task
c) Parallel Computation b) Reduce the size of the object code
d) None of the mentioned c) Be versatile
View Answer d) Be able to detect even the smallest of errors
View Answer
Answer: b
Explanation: Pipe-lining is the process of Answer: a
improving the performance of the system by Explanation: None.
processing different instructions at the same time,
with only one instruction performing one specific 8. SPEC stands for _______
operation. a) Standard Performance Evaluation Code
b) System Processing Enhancing Code
4. For a given FINITE number of instructions to c) System Performance Evaluation Corporation
be executed, which architecture of the processor d) Standard Processing Enhancement Corporation
provides for a faster execution? View Answer
a) ISA
b) ANSA Answer: c
c) Super-scalar Explanation: SPEC is a corporation started to
d) All of the mentioned standardize the evaluation method of a system’s
View Answer performance.
191
13. In a normal n-bit adder, to find out if an 3. An 24 bit address generates an address space of
overflow as occurred we make use of ________ ______ locations.
a) And gate a) 1024
b) Nand gate b) 4096
c) Nor gate c) 248
d) Xor gate d) 16,777,216
View Answer View Answer
Answer: d Answer: d
Explanation: None. Explanation: The number of addressable locations
in the system is called as address space.
14. In the implementation of a Multiplier circuit in
the system we make use of _______ 4. If a system is 64 bit machine, then the length of
a) Counter each word will be _______
b) Flip flop a) 4 bytes
c) Shift register b) 8 bytes
d) Push down stack c) 16 bytes
View Answer d) 12 bytes
View Answer
Answer: c
Explanation: The shift registers are used to store Answer: b
the multiplied answer. Explanation: A 64 bit system means, that at a time
64 bit instruction can be executed.
15. When 1101 is used to divide 100010010 the
remainder is ______ 5. The type of memory assignment used in Intel
a) 101 processors is _____
b) 11 a) Little Endian
c) 0 b) Big Endian
d) 1 c) Medium Endian
View Answer d) None of the mentioned
View Answer
Answer: d
Explanation: None. Answer: a
Explanation: The method of address allocation to
1. The smallest entity of memory is called data to be stored is called as memory assignment.
_______
a) Cell 6. When using the Big Endian assignment to store
b) Block a number, the sign bit of the number is stored in
c) Instance _____
d) Unit a) The higher order byte of the word
View Answer b) The lower order byte of the word
c) Can’t say
Answer: a d) None of the mentioned
Explanation: Each data is made up of a number of View Answer
units.
Answer: a
2. The collection of the above mentioned entities Explanation: None.
where data is stored is called ______
a) Block 7. To get the physical address from the logical
b) Set address generated by CPU we use ____
c) Word a) MAR
d) Byte b) MMU
View Answer c) Overlays
d) TLB
Answer: c View Answer
Explanation: Each readable part of data is called as
blocks. Answer: b
Explanation: Memory Management Unit, is used to
192
add the offset to the logical address generated by b) !
the CPU to get the physical address. c) $
advertisement d) *
View Answer
8. _____ method is used to map logical addresses
of variable length onto physical memory. Answer: c
a) Paging Explanation: None.
b) Overlays
c) Segmentation 3. When generating physical addresses from a
d) Paging with segmentation logical address the offset is stored in _____
View Answer a) Translation look-aside buffer
b) Relocation register
Answer: c c) Page table
Explanation: Segmentation is a process in which d) Shift register
memory is divided into groups of variable length View Answer
called segments.
Answer: b
9. During the transfer of data between the Explanation: In the MMU the relocation register
processor and memory we use ______ stores the offset address.
a) Cache
b) TLB 4. The technique used to store programs larger
c) Buffers than the memory is ______
d) Registers a) Overlays
View Answer b) Extension registers
c) Buffers
Answer: d d) Both Extension registers and Buffers
Explanation: None. View Answer
197
Answer: a 3. ______ pointer is used to point to parameters
Explanation: By using general purpose registers for passed or local parameters of the subroutine.
the parameter passing we make the process more a) Stack pointer
efficient. b) Frame pointer
c) Parameter register
9. The most Flexible way of logging the return d) Log register
addresses of the subroutines is by using _______ View Answer
a) Registers
b) Stacks Answer: b
c) Memory locations Explanation: This pointer is used to track the
d) None of the mentioned current position of the stack being used.
View Answer
4. The reserved memory or private space of the
Answer: b subroutine gets deallocated when _______
Explanation: The stacks are used as Logs for return a) The stop instruction is executed by the routine
addresses of the subroutines. b) The pointer reaches the end of the space
c) When the routine’s return statement is executed
10. The wrong statement/s regarding interrupts d) None of the mentioned
and subroutines among the following is/are ______ View Answer
i) The sub-routine and interrupts have a return
statement Answer: c
ii) Both of them alter the content of the PC Explanation: The work space allocated to a
iii) Both are software oriented subroutine gets deallocated when the routine is
iv) Both can be initiated by the user completed.
a) i, ii and iv
b) ii and iii 5. The private space gets allocated to each
c) iv subroutine when _________
d) iii and iv a) The first statement of the routine is executed
View Answer b) When the context switch takes place
c) When the routine gets called
Answer: d d) When the Allocate instruction is executed
Explanation: None. View Answer
201
Answer: c Answer: b
Explanation: The trap is a non-maskable interrupt Explanation: None.
as it deals with the ongoing process in the
processor. The trap is initiated by the process being 3. In vectored interrupts, how does the device
executed due to lack of data required for its identify itself to the processor?
completion. Hence trap is unmaskable. a) By sending its device id
b) By sending the machine code for the interrupt
14. From amongst the following given scenarios service routine
determine the right one to justify interrupt mode of c) By sending the starting address of the service
data transfer routine
i) Bulk transfer of several kilo-byte d) None of the mentioned
ii) Moderately large data transfer of more than 1kb View Answer
iii) Short events like mouse action
iv) Keyboard inputs Answer: c
a) i and ii Explanation: By sending the starting address of the
b) ii routine the device ids the routine required and
c) i,ii and iv thereby identifying itself.
d) iv
View Answer 4. The code sent by the device in vectored
interrupt is _____ long.
Answer: d a) upto 16 bits
Explanation: None. b) upto 32 bits
c) upto 24 bits
15. How can the processor ignore other interrupts d) 4-8 bits
when it is servicing one View Answer
a) By turning off the interrupt request line
b) By disabling the devices from sending the Answer: d
interrupts Explanation: None.
c) BY using edge-triggered request lines
d) All of the mentioned 5. The starting address sent by the device in
View Answer vectored interrupt is called as __________
a) Location id
Answer: d b) Interrupt vector
Explanation: None. c) Service location
d) Service id
1. When dealing with multiple devices interrupts, View Answer
which mechanism is easy to implement?
a) Polling method Answer: b
b) Vectored interrupts Explanation: None.
c) Interrupt nesting
d) None of the mentioned 6. The processor indicates to the devices that it is
View Answer ready to receive interrupts ________
a) By enabling the interrupt request line
Answer: a b) By enabling the IRQ bits
Explanation: In this method, the processor checks c) By activating the interrupt acknowledge line
the IRQ bits of all the devices, whichever is d) None of the mentioned
enabled first that device is serviced. View Answer
205
Answer: a d) 1024 X 1
Explanation: None. View Answer
206
1. The Reason for the disregarding of the SRAM’s Answer: a
is ________ Explanation: The sense amplifier detects if the
a) Low Efficiency value is above or below the threshold and then
b) High power consumption restores it.
c) High Cost
d) All of the mentioned 6. To reduce the number of external connections
View Answer required, we make use of ______
a) De-multiplexer
Answer: c b) Multiplexer
Explanation: The reason for the high cost of the c) Encoder
SRAM is because of the usage of more number of d) Decoder
transistors. View Answer
Answer: a
Explanation: None.
209
10. The memory devices which are similar to Answer: b
EEPROM but differ in the cost effectiveness is Explanation: The flash drives have been developed
______ to provide faster operation but with lesser space.
a) Memory sticks
b) Blue-ray devices 15. The reason for the fast operating speeds of the
c) Flash memory flash drives is
d) CMOS a) The absence of any movable parts
View Answer b) The integrated electronic hardware
c) The improved bandwidth connection
Answer: c d) All of the mentioned
Explanation: The flash memory functions similar View Answer
to the EEPROM but is much cheaper.
Answer: a
11. The only difference between the EEPROM Explanation: Since the flash drives have no
and flash memory is that the latter doesn’t allow movable parts their access and seek times are
bulk data to be written. reasonably reduced.
a) True
b) False 1. The standard SRAM chips are costly as
View Answer _________
a) They use highly advanced micro-electronic
Answer: a devices
Explanation: This is not permitted as the previous b) They house 6 transistor per chip
contents of the cells will be overwritten. c) They require specially designed PCB’s
d) None of the mentioned
12. The flash memories find application in View Answer
______
a) Super computers Answer: b
b) Mainframe systems Explanation: As they require a large number of
c) Distributed systems transistors, their cost per bit increases.
d) Portable devices
View Answer 2. The drawback of building a large memory with
DRAM is ______________
Answer: d a) The large cost factor
Explanation: The flash memories low power b) The inefficient memory organisation
requirement enables them to be used in a wide c) The Slow speed of operation
range of hand held devices. d) All of the mentioned
advertisement View Answer
Answer: b Answer: b
Explanation: This is basically used to provide Explanation: This difference in the speeds of
effective memory mapping. operation of the system caused it to be inefficient.
7. The next level of memory hierarchy after the 2. The effectiveness of the cache memory is based
L2 cache is _______ on the property of ________
a) Secondary storage a) Locality of reference
b) TLB b) Memory localisation
c) Main memory c) Memory size
d) Register d) None of the mentioned
View Answer View Answer
Answer: d Answer: a
Explanation: None. Explanation: This means that the cache depends on
advertisement the location in the memory that is referenced often.
8. The last on the hierarchy scale of memory 3. The temporal aspect of the locality of reference
devices is ______ means ________
a) Main memory a) That the recently executed instruction won’t be
b) Secondary memory executed soon
c) TLB b) That the recently executed instruction is
d) Flash drives temporarily not referenced
View Answer c) That the recently executed instruction will be
executed soon again
Answer: b d) None of the mentioned
Explanation: The secondary memory is the slowest View Answer
memory device.
211
Answer: c 8. The bit used to signify that the cache location is
Explanation: None. updated is ________
a) Dirty bit
4. The spatial aspect of the locality of reference b) Update bit
means ________ c) Reference bit
a) That the recently executed instruction is d) Flag bit
executed again next View Answer
b) That the recently executed won’t be executed
again Answer: a
c) That the instruction executed will be executed at Explanation: When the cache location is updated in
a later time order to signal to the processor this bit is used.
d) That the instruction in close proximity of the
instruction executed will be executed in future 9. The copy-back protocol is used ________
View Answer a) To copy the contents of the memory onto the
cache
Answer: d b) To update the contents of the memory from the
Explanation: The spatial aspect of locality of cache
reference tells that the nearby instruction is more c) To remove the contents of the cache and push it
likely to be executed in future. on to the memory
d) None of the mentioned
5. The correspondence between the main memory View Answer
blocks and those in the cache is given by
_________ Answer: b
a) Hash function Explanation: This is another way of performing the
b) Mapping function write operation, wherein the cache is updated first
c) Locale function and then the memory.
d) Assign function
View Answer 10. The approach where the memory contents are
transferred directly to the processor from the
Answer: b memory is called ______
Explanation: The mapping function is used to map a) Read-later
the contents of the memory to the cache. b) Read-through
c) Early-start
6. The algorithm to remove and place new d) None of the mentioned
contents into the cache is called _______ View Answer
a) Replacement algorithm
b) Renewal algorithm Answer: c
c) Updation Explanation: None.
d) None of the mentioned
View Answer
1. The memory blocks are mapped on to the cache
Answer: a with the help of ______
Explanation: As the cache gets full, older contents a) Hash functions
of the cache are swapped out with newer contents. b) Vectors
This decision is taken by the algorithm. c) Mapping functions
d) None of the mentioned
7. The write-through procedure is used ________ View Answer
a) To write onto the memory directly
b) To write and read from memory simultaneously Answer: c
c) To write directly on the memory and the cache Explanation: The mapping functions are used to
simultaneously map the memory blocks on to their corresponding
d) None of the mentioned cache block.
View Answer
2. During a write operation if the required block is
Answer: c not present in the cache then ______ occurs.
Explanation: When write operation is issued then a) Write latency
the corresponding operation is performed. b) Write hit
advertisement c) Write delay
212
d) Write miss 7. In direct mapping the presence of the block in
View Answer memory is checked with the help of block field.
a) True
Answer: d b) False
Explanation: This indicates that the operation has View Answer
missed and it brings the required block into the
cache. Answer: b
Explanation: The tag field is used to check the
3. In ________ protocol the information is presence of a mem block.
directly written into the main memory.
a) Write through 8. In associative mapping, in a 16 bit system the
b) Write back tag field has ______ bits.
c) Write first a) 12
d) None of the mentioned b) 8
View Answer c) 9
d) 10
Answer: a View Answer
Explanation: In case of the miss, then the data gets
written directly in main memory. Answer: a
Explanation: The Tag field is used as an id for the
4. The only draw back of using the early start different memory blocks mapped to the cache.
protocol is _______
a) Time delay 9. The associative mapping is costlier than direct
b) Complexity of circuit mapping.
c) Latency a) True
d) High miss rate b) False
View Answer View Answer
Answer: b Answer: a
Explanation: In this protocol, the required block is Explanation: In associative mapping, all the tags
read and directly sent to the processor. have to be searched to find the block.
5. The method of mapping the consecutive 10. The technique of searching for a block by
memory blocks to consecutive cache blocks is going through all the tags is ______
called ______ a) Linear search
a) Set associative b) Binary search
b) Associative c) Associative search
c) Direct d) None of the mentioned
d) Indirect View Answer
View Answer
Answer: c
Answer: c Explanation: None.
Explanation: This method is most simple to
implement as it involves direct mapping of 11. The set-associative map technique is a
memory blocks. combination of the direct and associative
technique.
6. While using the direct mapping technique, in a a) True
16 bit system the higher order 5 bits are used for b) False
________ View Answer
a) Tag
b) Block Answer: a
c) Word Explanation: The combination of the efficiency of
d) Id the associative method and the cheapness of the
View Answer direct mapping, we get the set-associative
mapping.
Answer: a
Explanation: The tag is used to identify the block
mapped onto one particular cache block.
213
12. In set-associative technique, the blocks are Answer: c
grouped into ______ sets. Explanation: The mapping functions are used to
a) 4 map the memory blocks on to their corresponding
b) 8 cache block.
c) 12
d) 6 2. During a write operation if the required block is
View Answer not present in the cache then ______ occurs.
a) Write latency
Answer: d b) Write hit
Explanation: The set-associative technique groups c) Write delay
the blocks into different sets. d) Write miss
advertisement View Answer
216
b) False 5. __________is used to implement virtual
View Answer memory organisation.
a) Page table
Answer: a b) Frame table
Explanation: The extra time needed to bring the c) MMU
data into memory in case of a miss is called as miss d) None of the mentioned
penalty. View Answer
Answer: c
1. The physical memory is not as large as the Explanation: The MMU stands for Memory
address space spanned by the processor. Management Unit.
a) True
b) False 6. ______ translates the logical address into a
View Answer physical address.
a) MMU
Answer: a b) Translator
Explanation: This is one of the main reasons for c) Compiler
the usage of virtual memories. d) Linker
View Answer
2. The program is divided into operable parts
called as _________ Answer: a
a) Frames Explanation: The MMU translates the logical
b) Segments address into a physical address by adding an offset.
c) Pages
d) Sheets 7. The main aim of virtual memory organisation is
View Answer ________
a) To provide effective memory access
Answer: b b) To provide better memory transfer
Explanation: The program is divided into parts c) To improve the execution of the program
called as segments for ease of execution. d) All of the mentioned
View Answer
3. The techniques which move the program blocks
to or from the physical memory is called as ______ Answer: d
a) Paging Explanation: None.
b) Virtual memory organisation advertisement
c) Overlays
d) Framing 8. The DMA doesn’t make use of the MMU for
View Answer bulk data transfers.
a) True
Answer: b b) False
Explanation: By using this technique the program View Answer
execution is accomplished with a usage of less
space. Answer: b
Explanation: The DMA stands for Direct Memory
4. The binary address issued to data or Access, in which a block of data gets directly
instructions are called as ______ transferred from the memory.
a) Physical address
b) Location 9. The virtual memory basically stores the next
c) Relocatable address segment of data to be executed on the _________
d) Logical address a) Secondary storage
View Answer b) Disks
c) RAM
Answer: d d) ROM
Explanation: The logical address is the random View Answer
address generated by the processor.
Answer: a
Explanation: None.
217
10. The associatively mapped virtual memory 5. The iconic feature of the RISC machine among
makes use of _______ the following is _______
a) TLB a) Reduced number of addressing modes
b) Page table b) Increased memory size
c) Frame table c) Having a branch delay slot
d) None of the mentioned d) All of the mentioned
View Answer View Answer
Answer: a Answer: c
Explanation: TLB stands for Translation Look- Explanation: A branch delay slot is an instruction
aside Buffer. space immediately following a jump or branch.
1. The CISC stands for ___________ 6. Both the CISC and RISC architectures have
a) Computer Instruction Set Compliment been developed to reduce the ______
b) Complete Instruction Set Compliment a) Cost
c) Computer Indexed Set Components b) Time delay
d) Complex Instruction set computer c) Semantic gap
View Answer d) All of the mentioned
View Answer
Answer: d
Explanation: CISC is a computer architecture Answer: c
where in the processor performs more complex Explanation: The semantic gap is the gap between
operations in one step. the high level language and the low level language.
2. The computer architecture aimed at reducing 7. Out of the following which is not a CISC
the time of execution of instructions is ________ machine.
a) CISC a) IBM 370/168
b) RISC b) VAX 11/780
c) ISA c) Intel 80486
d) ANNA d) Motorola A567
View Answer View Answer
Answer: b Answer: d
Explanation: The RISC stands for Reduced Explanation: None.
Instruction Set Computer. advertisement
3. The Sun micro systems processors usually 8. Pipe-lining is a unique feature of _______
follow _____ architecture. a) RISC
a) CISC b) CISC
b) ISA c) ISA
c) ULTRA SPARC d) IANA
d) RISC View Answer
View Answer
Answer: a
Answer: d Explanation: The RISC machine architecture was
Explanation: The Risc machine aims at reducing the first to implement pipe-lining.
the instruction set of the computer.
9. In CISC architecture most of the complex
4. The RISC processor has a more complicated instructions are stored in _____
design than CISC. a) Register
a) True b) Diodes
b) False c) CMOS
View Answer d) Transistors
View Answer
Answer: b
Explanation: The RISC processor design is more Answer: d
simpler than CISC and it consists of fewer Explanation: In CISC architecture more emphasis
transistors.
218
is given on the instruction set and the instructions Answer: a
take over a cycle to complete. Explanation: The stages in the pipelining should
get completed within one cycle to increase the
10. Which of the architecture is power efficient? speed of performance.
a) CISC
b) RISC 5. In pipelining the task which requires the least
c) ISA time is performed first.
d) IANA a) True
View Answer b) False
View Answer
Answer: b
Explanation: Hence the RISC architecture is Answer: b
followed in the design of mobile devices. Explanation: This is done to avoid starvation of the
longer task.
1. ______ have been developed specifically for
pipelined systems. 6. If a unit completes its task before the allotted
a) Utility software time period, then _______
b) Speed up utilities a) It’ll perform some other task in the remaining
c) Optimizing compilers time
d) None of the mentioned b) Its time gets reallocated to a different task
View Answer c) It’ll remain idle for the remaining time
d) None of the mentioned
Answer: c View Answer
Explanation: The compilers which are designed to
remove redundant parts of the code are called as Answer: c
optimizing compilers. Explanation: None.
2. The pipelining process is also called as ______ 7. To increase the speed of memory access in
a) Superscalar operation pipelining, we make use of _______
b) Assembly line operation a) Special memory locations
c) Von Neumann cycle b) Special purpose registers
d) None of the mentioned c) Cache
View Answer d) Buffers
View Answer
Answer: b
Explanation: It is called so because it performs its Answer: c
operation at the assembly level. Explanation: By using the cache we can reduce the
speed of memory access by a factor of 10.
3. The fetch and execution cycles are interleaved advertisement
with the help of ________
a) Modification in processor architecture 8. The periods of time when the unit is idle is
b) Clock called as _____
c) Special unit a) Stalls
d) Control unit b) Bubbles
View Answer c) Hazards
d) Both Stalls and Bubbles
Answer: b View Answer
Explanation: The time cycle of the clock is
adjusted to perform the interleaving. Answer: d
Explanation: The stalls are a type of hazards that
4. Each stage in pipelining should be completed affect a pipelined system.
within ____ cycle.
a) 1 9. The contention for the usage of a hardware
b) 2 device is called ______
c) 3 a) Structural hazard
d) 4 b) Stalk
View Answer c) Deadlock
219
d) None of the mentioned 4. Communication between a computer and a
View Answer keyboard involves ______________ transmission
a) Automatic
Answer: a b) Half-duplex
Explanation: None. c) Full-duplex
d) Simplex
10. The situation wherein the data of operands are View Answer
not available is called ______
a) Data hazard Answer: d
b) Stock Explanation: Data flows in single direction.
c) Deadlock
d) Structural hazard 5. The first Network
View Answer a) CNNET
b) NSFNET
Answer: a c) ASAPNET
Explanation: Data hazards are generally caused d) ARPANET
when the data is not ready on the destination side. View Answer
Answer: d
Computer Network and Database Explanation: ARPANET – Advanced Research
Projects Agency Networks was the first network
Management System: to be implemented which used the TCP/IP
protocol.
1. The IETF standards documents are called
a) RFC 6. The _______ is the physical path over which a
b) RCF message travels
c) ID a) Path
d) None of the mentioned b) Medium
View Answer c) Protocol
d) Route
Answer: a View Answer
Explanation: Request For Comments.
7. Which organization has authority over
2. In the layer hierarchy as the data packet moves interstate and international commerce in the
from the upper to the lower layers, headers are communications field?
a) Added a) ITU-T
b) Removed b) IEEE
c) Rearranged c) FCC
d) Modified d) ISOC
View Answer View Answer
Answer: a Answer: c
Explanation: Every layer adds its own header to Explanation: FCC is the abbreviation for Federal
the packet from the previous layer. Communications Commission. FCC is
responsible for regulating all interstate
3. The structure or format of data is called communications originating or terminating in
a) Syntax USA.
b) Semantics
c) Struct 8. Which of this is not a network edge device?
d) None of the mentioned a) PC
View Answer b) Smartphones
c) Servers
Answer: a d) Switch
Explanation: The structure and format of data are View Answer
defined using syntax. Semantics defines how a
particular pattern to be interpreted, and what Answer: d
action is to be taken based on that interpretation. Explanation: Network egde devices refer to host
220
systems, which can host applications like web Answer: a
browser. Explanation: A computer network, or data
network, is a digital telecommunications network
9. A set of rules that governs data communication which allows nodes to share resources. In
a) Protocols computer networks, computing devices exchange
b) Standards data with each other using connections between
c) RFCs nodes.
d) None of the mentioned
View Answer 3. Which one of the following computer network
is built on the top of another network?
Answer: a a) prior network
Explanation: In communications, a protocol refers b) chief network
to a set of rules and regulations that allow a c) prime network
network of nodes to transmit and receive d) overlay network
information. View Answer
223
b) NIC d) Session layer
c) Ethernet View Answer
d) None of the mentioned
View Answer Answer: a
Explanation: None.
Answer: a
Explanation: None. 10. In the OSI model, as a data packet moves
from the lower to the upper layers, headers are
5. Transport layer is implemented in _______
a) End system a) Added
b) NIC b) Removed
c) Ethernet c) Rearranged
d) None of the mentioned d) None of the mentioned
View Answer View Answer
Answer: a Answer: b
Explanation: None. Explanation: None.
advertisement
6. The functionalities of presentation layer
includes 11. Identify the statement which cannot be
a) Data compression associated with OSI model
b) Data encryption a) A structured way to discuss and easier update
c) Data description syatem components
d) All of the mentioned b) One layer may duplicate lower layer
View Answer functionality
c) Functionality at one layer no way requires
Answer: d information from another layer
Explanation: None. d) None of the mentioned
View Answer
7. Delimiting and synchronization of data
exchange is provided by Answer: c
a) Application layer Explanation: One layer may use the information
b) Session layer from another layer Ex: time stamp value.
c) Transport layer
d) Link layer 1. OSI stands for
View Answer a) open system interconnection
b) operating system interface
Answer: b c) optical service implementation
Explanation: None. d) none of the mentioned
View Answer
8. In OSI model, when data is sent from device A
to device B, the 5th layer to recieve data at B is Answer: a
a) Application layer Explanation: OSI is the abbreviation for Open
b) Transport layer System Interconnection. OSI model provides a
c) Link layer structured plan on how applications communicate
d) Session layer over a network, which also helps us to have a
View Answer structured plan for troubleshooting.
224
layers namely Application, Presentation, Session, 1978 and 1983, whereas OSI reference model was
Transport, Network, Data Link and Physical layer. developed in the year 1984.
3. TCP/IP model does not have ______ layer but 7. Which layer is responsible for process to
OSI model have this layer. process delivery?
a) session layer a) network layer
b) transport layer b) transport layer
c) application layer c) session layer
d) None of the mentioned d) data link layer
View Answer View Answer
4. The portion of physical layer that interfaces 8. The physical layer translates logical
with the media access control sublayer is called communication requests from the ______ into
a) physical signalling sublayer hardware specific operations.
b) physical data sublayer a) data link layer
c) physical address sublayer b) network layer
d) none of the mentioned c) trasnport layer
View Answer d) application layer
View Answer
Answer: a
Explanation: The portion of physcial layer that Answer: a
interfaces with the medium access control Explanation: Physical layer accepts data or
sublayer is Physical Signaling Sublayer. The main information from the data link layer and converts
function of this layer is character encoding, it into hardware specific operations so as to
reception, decoding and performs optional transfer the message through physical cables.
isolation functions.
9. A single channel is shared by multiple signals
5. physical layer provides by
a) mechanical specifications of electrical a) analog modulation
connectors and cables b) digital modulation
b) electrical specification of transmission line c) multiplexing
signal level d) none of the mentioned
c) specification for IR over optical fiber View Answer
226
Answer: c 4. Header of a frame generally contains
Explanation: In communication and computer a) synchronization bytes
networks, the main goal is to share a scarce b) addresses
resource. This is done by multiplexing, where c) frame identifier
multiple analog or digital signals are combined d) all of the mentioned
into one signal over a shared medium. View Answer
227
b) CSMA/CA Answer: c
c) Both CSMA/CD & CSMA/CA Explanation: An ip address which is 32 bits long,
d) None of the mentioned that means it is of 4 bytes and is composed of a
View Answer network and host portion and it depends on
address class.
Answer: c
Explanation: None. 4. In virtual circuit network each packet contains
a) full source and destination address
10. The technique of temporarily delaying b) a short VC number
outgoing outgoing acknowledgements so that they c) only source address
can be hooked onto the next outgoing data frame d) only destination address
is called View Answer
a) piggybacking
b) cyclic redundancy check Answer: b
c) fletcher’s checksum Explanation: A short VC number also called as
d) none of the mentioned VCID (virtual circuit identifier) is a type of
View Answer identifier which is used to distinguish between
several virtual circuits in a connection oriented
Answer: a circuit switched network.
Explanation: None.
5. Which one of the following routing algorithm
1. The network layer concerns with can be used for network layer design?
a) bits a) shortest path algorithm
b) frames b) distance vector routing
c) packets c) link state routing
d) none of the mentioned d) all of the mentioned
View Answer View Answer
Answer: c Answer: d
Explanation: In computer networks, the data from Explanation: The routing algorithm is what
the application layer is sent to the transport layer decides where a packet should go next. There are
and is converted to segments. These segments are several routing techniques like shortest path
then transferred to the network layer and these are algorithm, static and dynamic routing,
called packets. These packets are then sent to data decentralized routing, distance vector routing, link
link layer where they are encapsulated into state routing, Hierarchical routing etc.
frames. These frames are then transferred to
physical layer where the frames are converted to 6. Multidestination routing
bits. a) is same as broadcast routing
b) contains the list of all destinations
2. Which one of the following is not a function of c) data is not sent by packets
network layer? d) none of the mentioned
a) routing View Answer
b) inter-networking
c) congestion control Answer: c
d) none of the mentioned Explanation: None.
View Answer
7. A subset of a network that includes all the
Answer: d routers but contains no loops is called
Explanation: In the OSI model, network layer is a) spanning tree
the third layer and it provides data routing paths b) spider structure
for network communications. c) spider tree
d) none of the mentioned
3. The 4 byte IP address consists of View Answer
a) network address
b) host address Answer: a
c) both network address & host address Explanation: Spanning tree protocol (STP) is a
d) none of the mentioned network protocol that creates a loop free logical
View Answer topology for ethernet networks. It is a layer 2
228
protocol that runs on bridges and switches. The 2. Which one of the following is a transport layer
main purpose of STP is to ensure that you do not protocol used in networking?
create loops when you have redundant paths in a) TCP
your network. b) UDP
c) Both TCP and UDP
8. Which one of the following algorithm is not d) None of the mentioned
used for congestion control? View Answer
a) traffic aware routing
b) admission control Answer: c
c) load shedding Explanation: Both TCP and UDP are transport
d) none of the mentioned layer protocol in networking. TCP is an
View Answer abbreviation for Transmission Control Protocol
and UDP is an abbreviation for User Datagram
Answer: d Protocol. TCP is connection oriented whereas
Explanation: None. UDP is connectionless.
9. The network layer protocol of internet is 3. User datagram protocol is called connectionless
a) ethernet because
b) internet protocol a) all UDP packets are treated independently by
c) hypertext transfer protocol transport layer
d) none of the mentioned b) it sends data as a stream of related packets
View Answer c) it is received in the same order as sent order
d) none of the mentioned
Answer: b View Answer
Explanation: There are several protocols used in
Network layer. Some of them are IP, ICMP, Answer: a
CLNP, ARP, IPX, HRSP etc. Hypertext transfer Explanation: UDP is an alternative for TCP and it
protocol is for application layer and ethernet is used for those purposes where speed matters
protocol is for data link layer. most whereas loss of data is not a problem. UDP
is connectionless whereas TCP is connection
10. ICMP is primarily used for oriented.
a) error and diagnostic functions
b) addressing 4. Transmission control protocol is
c) forwarding a) connection oriented protocol
d) none of the mentioned b) uses a three way handshake to establish a
View Answer connection
c) recievs data from application as a single stream
Answer: a d) all of the mentioned
Explanation: ICMP abbreviation for Internet View Answer
Control Message Protocol is used by networking
devices to send error messages and operational Answer: d
information indicating a host or router cannot be Explanation: Major internet applications like
reached. www, email, file transfer etc rely on tcp. TCP is
connection oriented and it is optimized for
1. Transport layer aggregates data from different accurate delivery rather than timely delivery.
applications into a single stream before passing it It can incur long delays.
to
a) network layer 5. An endpoint of an inter-process communication
b) data link layer flow across a computer network is called
c) application layer a) socket
d) physical layer b) pipe
View Answer c) port
d) none of the mentioned
Answer: a View Answer
Explanation: The flow of data in the OSI model
flows in following manner Application -> Answer: a
Presentation -> Session -> Transport -> Network - Explanation: Socket is one end point in a two way
> Data Link -> Physical. communication link in the network. TCP layer
229
can identify the application that data is destined to responsible for delivering a message between
be sent by using the port number that is bound to network host.
socket.
10. Which one of the following is a transport layer
6. Socket-style API for windows is called protocol?
a) wsock a) stream control transmission protocol
b) winsock b) internet control message protocol
c) wins c) neighbor discovery protocol
d) none of the mentioned d) dynamic host configuration protocol
View Answer View Answer
Answer: b Answer: a
Explanation: Winsock is a programming interface Explanation: There are many protocols in
which deals with input output requests for internet transport layer. The most prominent are TCP and
applications in windows OS. It defines how UDP. Some of the other protocols are RDP,
windows network software should access network RUDP, SCTP, DCCP etc.
services.
1. Physical or logical arrangement of network is
7. Which one of the following is a version of UDP a) Topology
with congestion control? b) Routing
a) datagram congestion control protocol c) Networking
b) stream control transmission protocol d) None of the mentioned
c) structured stream transport View Answer
d) none of the mentioned
View Answer Answer: a
Explanation: None.
Answer: a
Explanation: The datagram congestion control is a 2. In this topology there is a central controller or
transport layer protocol which deals with reliable hub
connection setup, teardown, congestion control, a) Star
explicit congestion notification, feature b) Mesh
negotiation. c) Ring
d) Bus
8. A _____ is a TCP name for a transport service View Answer
access point.
a) port Answer: a
b) pipe Explanation: None.
c) node
d) none of the mentioned 3. This topology requires multipoint connection
View Answer a) Star
b) Mesh
Answer: a c) Ring
Explanation: Just as the IP address identifies the d) Bus
computer, the network port identifies the View Answer
application or service running on the computer. A
port number is 16 bits. Answer: d
Explanation: None.
9. Transport layer protocols deals with
a) application to application communication 4. Data communication system spanning states,
b) process to process communication countries, or the whole world is
c) node to node communication a) LAN
d) none of the mentioned b) WAN
View Answer c) MAN
d) None of the mentioned
Answer: b View Answer
Explanation: Transport layer is 4th layer in
TCP/IP model and OSI reference model. It deals
with logical communication between process. It is
230
Answer: b Answer: b
Explanation: Wide area network(WAN) covers Explanation: None.
the whole of the world network.
2. Multiplexing is used in _______
5. Data communication system within a building a) Packet switching
or campus is b) Circuit switching
a) LAN c) Data switching
b) WAN d) None of the mentioned
c) MAN View Answer
d) None of the mentioned
View Answer Answer: b
Explanation: None.
Answer: a
Explanation: None. 3. Which multiplexing technique transmits digital
signals ?
6. Expand WAN a) FDM
a) World area network b) TDM
b) Wide area network c) WDM
c) Web area network d) None of the mentioned
d) None of the mentioned View Answer
View Answer
Answer: b
Answer: b Explanation: FDM and WDM are used in analog
Explanation: None. signals.
7. In TDM, slots are further divided into 4. If there are n signal sources of same data rate
a) Seconds than TDM link has _______ slots
b) Frames a) n
c) Packets b) n/2
d) None of the mentioned c) n*2
View Answer d) 2n
View Answer
Answer: b
Explanation: None. Answer: a
advertisement Explanation: Each slot is dedicated to one of the
source.
8. Multiplexing technique that shifts each signal
to a different carrier frequency 5. If link transmits 4000frames per second, and
a) FDM each slot has 8 bits,the transmission rate of circuit
b) TDM this TDM is
c) Both FDM & TDM a) 32kbps
d) None of the mentioned b) 500bps
View Answer c) 500kbps
d) None of the mentioned
Answer: a View Answer
Explanation: FDM stands for Frequency division
multiplexing. Answer: a
Explanation: Transmission rate= frame rate *
1. The sharing of a medium and its link by two or number os bits in a slot.
more devices is called _________
a) Fully duplexing 6. The state when dedicated signals are idle are
b) Multiplexing called
c) Both Fully duplexing and Multiplexing a) Death period
d) None of the mentioned b) Poison period
View Answer c) Silent period
d) None of the mentioned
View Answer
231
Answer: c Answer: a
Explanation: None. Explanation: Transmission rate = length /
transmission rate = 32/10 = 3.2milli seconds.
7. Multiplexing can provide
a) Efficiency 3. The time required to examine the packet’s
b) Privacy header and determine where to direct the packet is
c) Anti jamming part of
d) Both Efficiency & Privacy a) Processing delay
View Answer b) Queuing delay
c) Transmission delay
Answer: d d) All of the mentioned
Explanation: None. View Answer
advertisement
Answer: a
8. In TDM, the transmission rate of the Explanation: None.
multiplexed path is usually _______ the sum of
the transmission rates of the signal sources. 4. Traffic intensity is given by, where L = number
a) Greater than of bits in the packet a = average rate R =
b) Lesser than transmission rate
c) Equal to a) La/R
d) Equal to or greater than b) LR/a
View Answer c) R/La
d) None of the mentioned
Answer: a View Answer
Explanation: None.
Answer: a
9. In TDM, slots are further divided into Explanation: None.
a) Seconds
b) Frames 5. In the transfer of file between server and client,
c) Packets if the transmission rates along the path is 10Mbps,
d) None of the mentioned 20Mbps, 30Mbps, 40Mbps. The throughput is
View Answer usually
a) 20Mbps
Answer: b b) 10Mbps
Explanation: None. c) 40Mbps
d) 50Mbps
1. Which of the following delay is faced by the View Answer
packet in travelling from one end system to
another ? Answer: b
a) Propagation delay Explanation: The throughput is generally the
b) Queuing delay transmission rate of bottleneck link.
c) Transmission delay
d) All of the mentioned 6. If end to end delay is given by dend-end =
View Answer N(dproc + dtrans + dprop) is a non congested
network. The number of routers between source
Answer: d and destination is
Explanation: None. a) N/2
b) N
2. For a 10Mbps Ethernet link, if the length of the c) N-1
packet is 32bits, the transmission delay is(in d) 2N
milliseconds) View Answer
a) 3.2
b) 32 Answer: c
c) 0.32 Explanation: None.
d) None of the mentioned
View Answer 7. The total nodal delay is given by
a) dnodal = dproc – dqueue + dtrans + dprop
b) dnodal = dproc + dtrans – dqueue
232
c) dnodal = dproc + dqueue + dtrans + dprop d) All of the mentioned
d) dnodal = dproc + dqueue – dtrans – dprop View Answer
View Answer
Answer: d
Answer: c Explanation: None.
Explanation: None.
3. The DoS attack is which the attacker
8. In a network, If P is the only packet being establishes a large number of half-open or fully
transmitted and there was no earlier transmission, open TCP connections at the target host
which of the following delays could be zero a) Vulnerability attack
a) Propogation delay b) Bandwidth flooding
b) Queuing delay c) Connection flooding
c) Transmission delay d) All of the mentioned
d) Processing delay View Answer
View Answer
Answer: c
Answer: b Explanation: None.
Explanation: None.
4. The DoS attack is which the attacker sends
9. Transmission delay does not depend on deluge of packets to the targeted host
a) Packet length a) Vulnerability attack
b) Distance between the routers b) Bandwidth flooding
c) Transmission rate c) Connection flooding
d) None of the mentioned d) All of the mentioned
View Answer View Answer
Answer: b Answer: b
Explanation: Transmission delay = packet length / Explanation: None.
transmission rate
5. Packet sniffers involve
10. Propagation delay depends on a) Active receiver
a) Packet length b) Passive receiver
b) Transmission rate c) Both Active receiver and Passive receiver
c) Distance between the routers d) None of the mentioned
d) None of the mentioned View Answer
View Answer
Answer: b
Answer: c Explanation: They donot inject packets into the
Explanation: Propagation delay is the time it takes channel.
a bit to propagate from one router to the next.
6. Sniffers can be deployed in
1. The attackers a network of compromised a) Wired environment
devices known as b) WiFi
a) Internet c) Ethernet LAN
b) Botnet d) All of the mentioned
c) Telnet View Answer
d) D-net
View Answer Answer: d
Explanation: None.
Answer: b
Explanation: None. 7. Firewalls are often configured to block
a) UDP traffic
2. Which of the following is a form of DoS attack b) TCP traffic
? c) Both of the mentioned
a) Vulnerability attack d) None of the mentioned
b) Bandwidth flooding View Answer
c) Connection flooding
233
Answer: a 5. If an Optical Carrier is represented as OC-n,
Explanation: None. generally the link speed equals(in Mbps),
advertisement a) n*39.8
b) n*51.8
8. In a network, If P is the only packet being c) 2n*51.8
transmitted and there was no earlier transmission, d) None of the mentioned
which of the following delays could be zero View Answer
a) Propogation delay
b) Queuing delay Answer: b
c) Transmission delay Explanation: None.
d) Processing delay
View Answer 6. Terrestrial radio channels are broadly classifed
into _____ groups.
Answer: b a) 2
Explanation: None. b) 3
c) 4
1. Which of this is not a guided media ? d) 1
a) Fiber optical cable View Answer
b) Coaxial cable
c) Wireless LAN Answer: b
d) Copper wire Explanation: The three types are those that
View Answer operate over very short distance, those that
operate in local areas, those that operate in the
Answer: c wide area.
Explanation: Wireless LAN is unguided media.
7. Radio channels are attractive medium because
2. UTP is commonly used in a) Can penetrate walls
a) DSL b) Connectivity can be given to mobile user
b) FTTP c) Can carry signals for long distance
c) HTTP d) All of the mentioned
d) None of the mentioned View Answer
View Answer
Answer: d
Answer: a Explanation: None.
Explanation: Unshielded twisted pair(UTP) is advertisement
commonly used in home access.
8. Geostationary satellites
3. Coaxial cable consists of _______ concentric a) Are placed at a fixed point above the earth
copper conductors. b) Rotate the earth about a fixed axis
a) 1 c) Rotate the earth about a varying axis
b) 2 d) All of the mentioned
c) 3 View Answer
d) 4
View Answer Answer: a
Explanation: They are placed in orbit at 36,000km
Answer: b above Earth’s surface.
Explanation: None.
1. A local telephone network is an example of a
4. Fiber optics posses following properties _______ network
a) Immune electromagnetic interference a) Packet switched
b) Very less signal attenuation b) Circuit switched
c) Very hard to tap c) Both Packet switched and Circuit switched
d) All of the mentioned d) None of the mentioned
View Answer View Answer
Answer: d Answer: a
Explanation: None. Explanation: None.
234
2. Most packet switches use this principle Answer: b
a) Stop and wait Explanation: None.
b) Store and forward
c) Both Stop and wait and Store and forward 7. In _________ resources are allocated on
d) None of the mentioned demand.
View Answer a) packet switching
b) circuit switching
Answer: b c) line switching
Explanation: The packet switch will not transmit d) frequency switching
the first bit to outbound link until it recieves the View Answer
entire packet.
Answer: a
3. If there are N routers from source to Explanation: In packet switching there is no
destination, total end to end delay in sending reservation.
packet P(L->number of bits in the packet R-> advertisement
transmission rate)
a) N 8. Which of the following is an application layer
b) (N*L)/R service ?
c) (2N*L)/R a) Network virtual terminal
d) L/R b) File transfer, access, and management
View Answer c) Mail service
d) All of the mentioned
Answer: b View Answer
Explanation: None.
Answer: d
4. Method(s) to move data through a network of Explanation: None.
links and switches
a) Packet switching 1. This is not a application layer protocol
b) Circuit switching a) HTTP
c) Line switching b) SMTP
d) Both Packet switching and Circuit switching c) FTP
View Answer d) TCP
View Answer
Answer: d
Explanation: None. Answer: d
Explanation: TCP is transport layer protocol
5. The resources needed for communication
between end systems are reserved for the duration 2. The packet of information at the application
of session between end systems in ________ layer is called
a) Packet switching a) Packet
b) Circuit switching b) Message
c) Line switching c) Segment
d) Frequency switching d) Frame
View Answer View Answer
Answer: b Answer: b
Explanation: None. Explanation: None.
6. As the resouces are reserved between two 3. This is one of the architecture paradigm
communicating end systems in circuit switching, a) Peer to peer
this is achieved b) Client-server
a) authentication c) HTTP
b) guaranteed constant rate d) Both Peer-to-Peer & Client-Server
c) reliability View Answer
d) store and forward
View Answer Answer: d
Explanation: HTTP is a protocol.
235
4. Application developer has permission to decide must be consulted
the following on transport layer side a) IP
a) Transport layer protocol b) MAC
b) Maximum buffer size c) Port
c) Both Transport layer protocol and Maximum d) None of the mentioned
buffer size View Answer
d) None of the mentioned
View Answer Answer: c
Explanation: None.
Answer: c
Explanation: None. 10. This is a time-sensitive service
a) File transfer
5. Application layer offers _______ service b) File download
a) End to end c) E-mail
b) Process to process d) Internet telephony
c) Both End to end and Process to process View Answer
d) None of the mentioned
View Answer Answer: d
Explanation: Internet telephony is Loss-tolerant
Answer: a other applications are not.
Explanation: None.
1. The ____________ translates internet domain
6. E-mail is and host names to IP address.
a) Loss-tolerant application a) domain name system
b) Bandwidth-sensitive application b) routing information protocol
c) Elastic application c) network time protocol
d) None of the mentioned d) internet relay chat
View Answer View Answer
Answer: c Answer: a
Explanation: Because it can work with available Explanation: None.
throughput.
2. Which one of the following allows a user at one
7. Pick the odd one out site to establish a connection to another site and
a) File transfer then pass keystrokes from local host to remote
b) File download host?
c) E-mail a) HTTP
d) Interactive games b) FTP
View Answer c) Telnet
d) None of the mentioned
Answer: d View Answer
Explanation: Internet telephony is Loss-tolerant
other applications are not. Answer: c
Explanation: None.
8. Which of the following is an application layer
service ? 3. Application layer protocol defines
a) Network virtual terminal a) types of messages exchanged
b) File transfer, access, and management b) message format, syntax and semantics
c) Mail service c) rules for when and how processes send and
d) All of the mentioned respond to messages
View Answer d) all of the mentioned
View Answer
Answer: d
Explanation: None. Answer: d
Explanation: None.
9. To deliver a message to the correct application
program running on a host, the _______ address
236
4. Which one of the following protocol 9. Which one of the following is not correct?
delivers/stores mail to reciever server? a) application layer protocols are used by both
a) simple mail transfer protocol source and destination devices during a
b) post office protocol communication session
c) internet mail access protocol b) HTTP is a session layer protocol
d) hypertext transfer protocol c) TCP is an application layer protocol
View Answer d) All of the mentioned
View Answer
Answer: a
Explanation: None. Answer: d
Explanation: None.
5. The ASCII encoding of binary data is called
a) base 64 encoding 10. When displaying a web page, the application
b) base 32 encoding layer uses the
c) base 16 encoding a) HTTP protocol
d) base 8 encoding b) FTP protocol
View Answer c) SMTP protocol
d) None of the mentioned
Answer: a View Answer
Explanation: None.
Answer: a
6. Which one of the following is an internet Explanation: None.
standard protocol for managing devices on IP
network? 1. The number of objects in a Web page which
a) dynamic host configuration protocol consists of 4 jpeg images and HTML text is
b) simple newtwork management protocol ________
c) internet message access protocol a) 4
d) media gateway protocol b) 1
View Answer c) 5
d) None of the mentioned
Answer: b View Answer
Explanation: None.
Answer: c
7. Which one of the following is not an Explanation: 4 jpeg images + 1 base HTML file.
application layer protocol?
a) media gateway protocol 2. The default connection type used by HTTP is
b) dynamic host configuration protocol _________
c) resource reservation protocol a) Persistent
d) session initiation protocol b) Non-persistent
View Answer c) Can be either persistent or non-persistent
depending on connection request
Answer: c d) None of the mentioned
Explanation: None. View Answer
Answer: b
Explanation: RTT stands for round-trip time.
237
4. The HTTP request message is sent in 9. The HTTP response message leaves out the
_________ part of three-way handshake. requested object when ____________ method is
a) First used
b) Second a) GET
c) Third b) POST
d) None of the mentioned c) HEAD
View Answer d) PUT
View Answer
Answer: c
Explanation: None. Answer: c
Explanation: None.
5. In the process of fetching a web page from a
server the HTTP request/response takes 10. Find the oddly matched HTTP status codes
__________ RTTs. a) 200 OK
a) 2 b) 400 Bad Request
b) 1 c) 301 Moved permanently
c) 4 d) 304 Not Found
d) 3 View Answer
View Answer
Answer: d
Answer: b Explanation: 404 Not Found.
Explanation: None.
1. Multiple object can be sent over a TCP
6. The first line of HTTP request message is connection between client and server in
called _____________ a) persistent HTTP
a) Request line b) nonpersistent HTTP
b) Header line c) both persistent HTTP and nonpersistent HTTP
c) Status line d) none of the mentioned
d) Entity line View Answer
View Answer
Answer: a
Answer: a Explanation: None.
Explanation: The line followed by request line are
called header lines and status line is the initial part 2. HTTP is ________ protocol.
of response message. a) application layer
b) transport layer
7. The values GET, POST, HEAD etc are c) network layer
specified in ____________ of HTTP message d) none of the mentioned
a) Request line View Answer
b) Header line
c) Status line Answer: a
d) Entity body Explanation: None.
View Answer
3. In the network HTTP resources are located by
Answer: a a) uniform resource identifier
Explanation: It is specified in the method field of b) unique resource locator
request line in the HTTP request message. c) unique resource identifier
d) none of the mentioned
8. The __________ method when used in the View Answer
method field, leaves entity body empty.
a) POST Answer: a
b) SEND Explanation: None.
c) GET
d) None of the mentioned 4. HTTP client requests by establishing a
View Answer __________ connection to a particular port on the
server.
Answer: c a) user datagram protocol
Explanation: None.
238
b) transmission control protocol b) service oriented architecture
c) broader gateway protocol c) client server architecture
d) none of the mentioned d) none of the mentioned
View Answer View Answer
Answer: b Answer: c
Explanation: None. Explanation: None.
239
connection c) Compressed mode
View Answer d) None of the mentioned
View Answer
Answer: c
Explanation: FTP is out-of-band as it has separate Answer: a
control connection. Explanation: None.
5. If 5 files are transfered from server A to client 10. The password is sent to the server using
B in the same session. The number of TCP ________ command
connection between A and B is a) PASSWD
a) 5 b) PASS
b) 10 c) PASSWORD
c) 2 d) None of the mentioned
d) 6 View Answer
View Answer
Answer: b
Answer: d Explanation: None.
Explanation: 1 control connection and other 5 for
five file transfers. 1. When the mail server sends mail to other mail
servers it becomes ____________
6. FTP server a) SMTP server
a) Mantains state b) SMTP client
b) Is stateless c) Peer
c) Has single TCP connection for a file transfer d) None of the mentioned
d) None of the mentioned View Answer
View Answer
Answer: b
Answer: a Explanation: None.
Explanation: None.
2. If you have to send multimedia data over
7. The commands, from client to server, and SMTP it has to be encoded into
replies, from server to client, are sent across the a) Binary
control connection in ________ bit ASCII format b) Signal
a) 8 c) ASCII
b) 7 d) None of the mentioned
c) 3 View Answer
d) 5
View Answer Answer: c
Explanation: None.
Answer: b
Explanation: None. 3. Expansion of SMTP is
a) Simple Mail Transfer Protocol
8. Find the FTP reply whose message is wrongly b) Simple Message Transfer Protocol
matched c) Simple Mail Transmission Protocol
a) 331 – Username OK, password required d) Simple Message Transmission Protocol
b) 425 – Can’t open data connection View Answer
c) 452 – Error writing file
d) 452 – Can’t open data connection Answer: a
View Answer Explanation: None.
240
Answer: b Answer: a
Explanation: None. Explanation: None.
5. The underlying Transport layer protocol used 10. Example of user agents for e-mail
by SMTP is a) Microsoft Outlook
a) TCP b) Apple Mail
b) UDP c) None of the above
c) Either TCP or UDP d) All of the mentioned
d) None of the mentioned View Answer
View Answer
Answer: a
Answer: a Explanation: None.
Explanation: None. advertisement
6. Choose the statement which is wrong incase of 11. When the sender and the receiver of an email
SMTP are on different systems, we need only _________
a) It requires message to be in 7bit ASCII format a) One MTA
b) It is a pull protocol b) Two UAs
c) It transfers files from one mail server to another c) Two UAs and one pair of MTAs
mail server d) Two UAs and two pairs of MTAs
d) None of the mentioned View Answer
View Answer
Answer: d
Answer: b Explanation: None.
Explanation: The sending mail server pushes the
mail to receiving mail server hence it is push 12. User agent does not support this
protocol. a) Composing messages
b) Reading messages
7. Internet mail places each object in c) Replying messages
a) Separate messages for each object d) All of the mentioned
b) One message View Answer
c) Varies with number of objects
d) None of the mentioned Answer: d
View Answer Explanation: None.
241
3. SMTP uses the TCP port d) none of the mentioned
a) 22 View Answer
b) 23
c) 24 Answer:a
d) 25 Explanation:None.
View Answer
9. Which one of the following is an SMTP server
Answer:d configured in such a way that anyone on the
Explanation:None. internet can send e-mail through it?
a) open mail relay
4. Which one of the following protocol is used to b) wide mail reception
receive mail messages? c) open mail reception
a) smtp d) none of the mentioned
b) post office protocol View Answer
c) internet message access protocol
d) all of the mentioned Answer:a
View Answer Explanation:None.
242
4. DNS database contains b) a single server
a) name server records c) a single computer
b) hostname-to-address records d) none of the mentioned
c) hostname aliases View Answer
d) all of the mentioned
View Answer Answer:a
Explanation: None.
Answer:d
Explanation: None. 10. Which one of the following is not true?
a) multiple hostnames may correspond to a single
5. If a server has no clue about where to find the IP address
address for a hostname then b) a single hostname may correspond to many IP
a) server asks to the root server addresses
b) server asks to its adjcent server c) a single hostname may correspond to a single
c) request is not processed IP address
d) none of the mentioned d) none of the mentioned
View Answer View Answer
Answer:a Answer:c
Explanation: None. Explanation: None.
6. Which one of the following allows client to 1. Secure shell (SSH) network protocol is used for
update their DNS entry as their IP address a) secure data communication
change? b) remote command-line login
a) dynamic DNS c) remote command execution
b) mail transfer agent d) all of the mentioned
c) authoritative name server View Answer
d) none of the mentioned
View Answer Answer:d
Explanation: None.
Answer:a
Explanation: None. 2. SSH can be used in only
a) unix-like operating systems
7. Wildcard domain names start with label b) windows
a) @ c) both unix-like and windows systems
b) * d) none of the mentioned
c) & View Answer
d) #
View Answer Answer:c
Explanation: None.
Answer:b
Explanation: None. 3. SSH uses ___________ to authenticate the
remote computer.
8. The right to use a domain name is delegated by a) public-key cryptography
domain name registers which are accredited by b) private-key cryptography
a) internet architecture board c) any of public-key or private-key
b) internet society d) none of the mentioned
c) internet research task force View Answer
d) internet corporation for assigned names and
numbers Answer:a
View Answer Explanation: None.
243
d) port 24 d) none of the mentioned
View Answer View Answer
Answer:b Answer:a
Explanation: None. Explanation: None.
5. Which one of the following protocol can be 10. Which one of the following authentication
used for login to a shell on a remote host except method is used by SSH?
SSH? a) public-key
a) telnet b) host based
b) rlogin c) password
c) both telnet and rlogin d) all of the mentioned
d) none of the mentioned View Answer
View Answer
Answer:d
Answer:c Explanation: None.
Explanation: SSH is more secured then telnet and
rlogin. 1. DHCP (dynamic host configuration protocol)
provides __________ to the client.
6. Which one of the following is a file transfer a) IP address
protocol using SSH? b) MAC address
a) SCP c) Url
b) SFTP d) None of the mentioned
c) Rsync View Answer
d) All of the mentioned
View Answer Answer: a
Explanation: None.
Answer:d
Explanation: None. 2. DHCP is used for
a) IPv6
7. SSH-2 does not contain b) IPv4
a) transport layer c) Both IPv6 and IPv4
b) user authentication layer d) None of the mentioned
c) physical layer View Answer
d) connection layer
View Answer Answer: c
Explanation: None.
Answer:c
Explanation: None. 3. The DHCP server
a) maintains a database of available IP addresses
8. Which one of the following feature was present b) maintains the information about client
in SSH protocol, version 1? configuration parameters
a) password changing c) grants a IP address when receives a request
b) periodic replacement of session keys from a client
c) support for public-key certificates d) all of the mentioned
d) none of the mentioned View Answer
View Answer
Answer: d
Answer:d Explanation: None.
Explanation: None.
4. IP assigned for a client by DHCP server is
9. SCP protocol is evolved from __________ over a) for a limited period
SSH. b) for unlimited period
a) RCP protocol c) not time dependent
b) DHCP protocol d) none of the mentioned
c) MGCP protocol View Answer
244
Answer: a 10. If DHCP snooping is configured on a LAN
Explanation: None. switch, then clients having specific ______ can
access the network.
5. DHCP uses UDP port _________ for sending a) MAC address
data to the server. b) IP address
a) 66 c) Both MAC address and IP address
b) 67 d) None of the mentioned
c) 68 View Answer
d) 69
View Answer Answer: c
Explanation: None.
Answer: b
Explanation: None. 1. IPsec is designed to provide the security at the
a) Transport layer
6. The DHCP server can provide the _______ of b) Network layer
the IP addresses. c) Application layer
a) dynamic allocation d) Session layer
b) automatic allocation View Answer
c) static allocation
d) all of the mentioned Answer: b
View Answer Explanation: Network layer is used for
transferring the data from transport layer to
Answer: d another layers.
Explanation: None.
2. In tunnel mode IPsec protects the
7. DHCP client and servers on the same subnet a) Entire IP packet
communicate via b) IP header
a) UDP broadcast c) IP payload
b) UDP unicast d) None of the mentioned
c) TCP broadcast View Answer
d) TCP unicast
View Answer Answer: a
Explanation: It is nothing but adding control bits
Answer: a to the packets.
Explanation: None.
3. Which component is included in IP security?
8. After obtaining the IP address, to prevent the IP a) Authentication Header (AH)
conflict the client may use b) Encapsulating Security Payload (ESP)
a) internet relay chat c) Internet key Exchange (IKE)
b) broader gateway protocol d) All of the mentioned
c) address resolution protocol View Answer
d) none of the mentioned
View Answer Answer: d
Explanation: AH, ESP, IKE.
Answer: c
Explanation: None. 4. WPA2 is used for security in
a) Ethernet
9. What is DHCP snooping? b) Bluetooth
a) techniques applied to ensure the security of an c) Wi-Fi
existing DHCP infrastructure d) None of the mentioned
b) encryption of the DHCP server requests View Answer
c) algorithm for DHCP
d) none of the mentioned Answer: c
View Answer Explanation: WPA2 is best with Wi-Fi
connection.
Answer: a
Explanation: None.
245
5. An attempt to make a computer resource Answer: c
unavailable to its intended users is called Explanation: DNS spoofing is the phenomenon
a) Denial-of-service attack for the above mentioned transaction.
b) Virus attack
c) Worms attack 1. A ___________ is an extension of an
d) Botnet process enterprise’s private intranet across a public
View Answer network such as the internet, creating a secure
private connection.
Answer: a a) VNP
Explanation: Denial of service attack. b) VPN
c) VSN
6. Extensible authentication protocol is d) VSPN
authentication framework frequently used in View Answer
a) Wired personal area network
b) Wireless networks Answer: b
c) Wired local area network Explanation: VIRTUAL PRIVATE NETWORK.
d) None of the mentioned
View Answer 2. When were VPNs introduced into the
commercial world?
Answer:b a) Early 80’s
Explanation:Most data transfer is with wireless b) Late 80’s
networks. c) Early 90’s
d) Late 90’s
7. Pretty good privacy (PGP) is used in View Answer
a) Browser security
b) Email security Answer: d
c) FTP security Explanation: LATE 90’S.
d) None of the mentioned
View Answer 3. What protocol is NOT used in the operation of
a VPN?
Answer: b a) PPTP
Explanation: PGP is at email security. b) IPsec
advertisement c) YMUM
d) L2TP
8. PGP encrypts data by using a block cipher View Answer
called
a) International data encryption algorithm Answer: c
b) Private data encryption algorithm Explanation: YNUM.
c) Internet data encryption algorithm
d) None of the mentioned 4. Which of the following statements is NOT true
View Answer concerning VPNs?
a) Financially rewarding compared to leased lines
Answer: a b) Allows remote workers to access corporate data
Explanation: PGP encrypts data by using a block c) Allows LAN-to-LAN connectivity over public
cipher called international data encryption networks
algorithm. d) Is the backbone of the Internet
View Answer
9. When a DNS server accepts and uses incorrect
information from a host that has no authority Answer: d
giving that information, then it is called Explanation: virtual packet network is not a
a) DNS lookup backbone of the internet.
b) DNS hijacking
c) DNS spoofing 5. Traffic in a VPN is NOT ____________
d) None of the mentioned a) Invisible from public networks
View Answer b) Logically separated from other traffic
c) Accessible from unauthorized public networks
d) Restricted to a single protocol in IPsec
View Answer
246
Answer: c advertisement
Explanation: Because it is secured with the IP
address. 11. Which layer of the OSI reference model does
IPsec work at?
6. VPNs are financially speaking __________ a) Layer 1
a) Always more expensive than leased lines b) Layer 2
b) Always cheaper than leased lines c) Layer 3
c) Usually cheaper than leased lines d) Layer 4
d) Usually more expensive than leased lines View Answer
View Answer
Answer: c
Answer: c Explanation: Session layer.
Explanation: It is very cheap.
1. Storage management comprises of
7. Which layer 3 protocols can be transmitted over a) SAN Management
a L2TP VPN? b) Data protection
a) IP c) Disk operation
b) IPX d) All of the mentioned
c) Neither IP or IPX View Answer
d) Both IP or IPX
View Answer Answer: d
Explanation: SAN, Data protection and Disk
Answer: d operation are the main things of storage
Explanation: Data roming layer. management.
9. L2F was developed by which company? 3. Which protocols are used for Storage
a) Microsoft management?
b) Cisco a) SNMP
c) Blizzard Entertainment b) LDAP
d) IETF c) POP3
View Answer d) MIB
View Answer
Answer: b
Explanation: Cisco is the second best company to Answer: a
design and make the computer networks. Explanation: Simple Network Management
Protocol is for storage management.
10. Which layer of the OSI reference model does
PPTP work at? 4. Identify the difficulties the SAN administrator
a) Layer 1 incur while dealing with diverse vendors
b) Layer 2 a) Proprietary management interfaces
c) Layer 3 b) Multiple applications to manage storage in the
d) Layer 4 data center
View Answer c) No single view
d) All of the mentioned
Answer: b View Answer
Explanation: Presentation layer.
247
Answer: d 9. Task of Distributed Management Task Force is
Explanation: Proprietary management interfaces, to
multiple applications management and no single a) To promote interoperability among the
view are main difficulties. management solution providers
b Acts as an interface between the various
5. How do Storage administrators ensure secure budding technologies and provide solution to
access to storage devices: manage various environments
a) By using Zoning c) Only To promote interoperability among the
b) By putting a physical lock on the storage management solution providers
device d) Both To promote interoperability among the
c) By keeping devices shutdown when not in use management solution providers and Acts as an
d) By keeping devices when used interface between the various budding
View Answer technologies and provide solution to manage
various environments
Answer: a View Answer
Explanation: By using Zoning, Storage
administrators ensure secure access to storage Answer: d
devices. Explanation: Promote interoperability and
interface between various buildings.
6. Effective Storage management includes
a) Securities 10. SMI-S Standard uses
b) Backups a) Java RMI
c) Reporting b) CIM-XML/HTTP
d) All of the mentioned c) CORBA
View Answer d) .NET
View Answer
Answer: d
Explanation: In storage management all Answer: b
necessities like security, backups and reporting Explanation: CIM-XML/HTTP is a SMI-S
facilities are included. standard.
7. Identify the tasks involved in Storage Capacity 1. An application-level protocol in which a few
management manager stations control a set of agents is called
a) Identifying storage systems are approaching a) HTML
full capacity b) TCP
b) Monitoring trends for each resource c) SNMP
c) Tracking Total capacity, total used, total d) SNMP/IP
available View Answer
d) All of the mentioned
View Answer Answer: c
Explanation: An application-level protocol in
Answer: d which a few manager stations control a set of
Explanation: Identifying, Monitoring and agents is called SNMP.
Tracking are main tasks involved in SCM.
2. Full duplex mode increases capacity of each
8. Effect of open standards like SMI(s) domain from
a) Standardization drives software interoperability a) 10 to 20 mbps
and interchange ability b) 20 to 30 mbps
b) Breaks the old-style dependence on proprietary c) 30 to 40 mbps
methods, trade secrets, and single providers d) 40 to 50 mbps
c) Builds a strong foundation on which others can View Answer
quickly build and innovate
d) All of the mentioned Answer: a
View Answer Explanation: 10 to 20 mbps capacity increased on
each domain in full duplex mode.
Answer: d
Explanation: Driver software, old style 3. Configuration management can be divided into
dependence and strong foundation. two subsystems those are
248
a) Reconfiguration and documentation 8. Control of users’ access to network resources
b) Management and configuration through charges are main responsibilities of
c) Documentation and dialing up a) Reactive Fault Management
d) Both Reconfiguration and documentation and b) Reconfigured Fault Management
Management and configuration c) Accounting Management
View Answer d) Security Management
View Answer
Answer: a
Explanation: Reconfiguration and documentation Answer: c
are two subsystems of configuration management. Explanation: Control of users’ access to network
resources through charges are main
4. To use Simple Network Management System responsibilities of accounting management.
(SNMP), we need
a) Servers 9. SNMP is a framework for managing devices in
b) IP an internet using the
c) Protocols a) TCP/IP protocol
d) Rules b) UDP
View Answer c) SMTP
d) None
Answer: d View Answer
Explanation: To use Simple Network
Management System (SNMP), we need rules. Answer: a
Explanation: SNMP is a framework for managing
5. Main difference between SNMPv3 and devices in an internet using the TCP/IP protocol.
SNMPv2 is the
a) Management 10. Structure of Management Information (SMI),
b) Integration is guideline of
c) Classification a) HTTP
d) Enhanced security b) SNMP
View Answer c) URL
d) MIB
Answer: d View Answer
Explanation: Enhanced security is the main
difference between SNMPv3 and SNMPv2. Answer: b
Explanation: SMI is guidelines of SNMP.
6. In Network Management System, a term that
responsible for controlling access to network 1. The protocol used by Telnet application is
based on predefined policy is called a) Telnet
a) Fault Management b) FTP
b) Secured Management c) HTTP
c) Active Management d) None of the mentioned
d) Security Management View Answer
View Answer
Answer: a
Answer: d Explanation: None.
Explanation: A term that responsible for
controlling access to network based on predefined 2. In “character at a time” mode
policy is called security management. a) Character processing is done on the local
system under the control of the remote system
7. BER stands for b) Most text typed is immediately sent to the
a) Basic Encoding Rules remote host for processing
b) Basic Encoding Resolver c) All text is echoed locally, only completed lines
c) Basic Encoding Rotator are sent to the remote host
d) Basic Encoding Router d) None of the mentioned
View Answer View Answer
Answer: a Answer: b
Explanation: Basic encoding rules. Explanation: None.
249
3. _______ allows you to connect and login to a a) escape character has to be used
remote computer b) control functions has to be disabled
a) Telnet c) it is not possible
b) FTP d) none of the mentioned
c) HTTP View Answer
d) None of the mentioned
View Answer Answer: a
Explanation: None.
Answer: a
Explanation: None. 1. Telnet protocol is used to establish a connection
to
4. The correct syntax to be written in the web a) TCP port number 21
browser to Telnet to www.sanfoundry.com is b) TCP port number 22
a) telnet//www.sanfoundry.com c) TCP port number 23
b) telnet:www.sanfoundry.com d) TCP port number 24
c) telnet://www.sanfoundry.com View Answer
d) telnet www.sanfoundry.com
View Answer Answer: c
Explanation: None.
Answer: c
Explanation: None. 2. Which one of the following is not true?
a) telnet defines a network virtual terminal (NVT)
5. Telnet is a standard
a) Television on net b) client programs interact with NVT
b) Network of Telephones c) server translates NVT operations
c) Remote Login d) none of the mentioned
d) Teleshopping site View Answer
View Answer
Answer: d
Answer: c Explanation: None.
Explanation: None.
3. All telnet operations are sent as
6. Which one of the following is not correct? a) 4 bytes
a) telnet is a general purpose client-server b) 8 bytes
program c) 16 bytes
b) telnet lets user access an application on a d) 32 bytes
remote computer View Answer
c) telnet can also be used for file transfer
d) none of the mentioned Answer: b
View Answer Explanation: None.
250
d) 255 2. In TCP, sending and receiving data is done as
View Answer a) Stream of bytes
b) Sequence of characters
Answer: d c) Lines of data
Explanation: None. d) Packets
View Answer
6. In character mode operation of telnet
implementation Answer: a
a) each character typed is sent by the client to the Explanation: In TCP, data is sent and received in
server terms of Stream of bytes.
b) each character typed is discarded by the server
c) each character typed is aggregated into a word 3. TCP process may not write and read data at the
and then send to the server same speed. So we need __________ for storage.
d) none of the mentioned a) Packets
View Answer b) Buffers
c) Segments
Answer: a d) Stacks
Explanation: None. View Answer
251
Answer: d 1. The receiver of the data controls the amount of
Explanation: Acknowledgment mechanism is data that are to be sent by the sender is referred as
used to check the safe and sound arrival of data. a) Flow control
b) Error control
7. In segment header, sequence number and c) Congestion control
acknowledgement number field refers to d) Error detection
a) Byte number View Answer
b) Buffer number
c) Segment number Answer: a
d) Acknowledgment Explanation: Flow control is done to prevent the
View Answer receiver from being overwhelmed with data.
252
Answer: a 10. Connection establishment in TCP is done by
Explanation: This is the second step in the Three- which mechanism?
Way Handshaking process and is done by the a) Flow control
client once it finds the open server. b) Three-Way Handshaking
c) Forwarding
6. In Three-Way Handshaking process, the d) Synchronisation
situation where both the TCP’s issue an active View Answer
open is
a) Mutual open Answer: b
b) Mutual Close Explanation: Three-Way Handshaking is used to
c) Simultaneous open terminate the connection between client and
d) Simultaneous close server.
View Answer
1. Which of the following is false with respect to
Answer: c UDP
Explanation: Here, both TCP’s transmit a a) Connection-oriented
SYNC+ACK segment to each other and one b) Unreliable
single connection is established between them. c) Transport layer protocol
d) All of the mentioned
7. The situation when a malicious attacker sends a View Answer
large number of SYNC segments to a server,
pretending that each of them is coming from a Answer: a
different client by faking the source IP address in Explanation: UDP is an unreliable, connectionless
the datagrams transport layer protocol.
a) SYNC flooding attack
b) Active attack 2. Return value of the UDP port “Chargen” is
c) Passive attack a) String of characters
d) Denial-of-service attack b) String of integers
View Answer c) Array of characters with integers
d) Array of zero’s and one’s
Answer: a View Answer
Explanation: This is the serious security problem
during the connection establishment. Answer: a
Explanation: Chargen with port number 19 returns
8. SYNC flooding attack belongs to a type of string of characters.
security attack known as
a) SYNC flooding attack 3. Beyond IP, TCP provides additional services
b) Active attack such as
c) Passive attack a) Routing and switching
d) Denial-of-service attack b) Sending and receiving of packets
View Answer c) Multiplexing and demultiplexing
d) Demultiplexing and error checking
Answer: d View Answer
Explanation: During SYNC flooding the system
collapses and denies service to every request. Answer: d
Explanation: UDP is a simple protocol which
9. Size of source and destination port address of provides demultiplexing and error checking.
TCP header respectively are
a) 16-bits and 32-bits 4. The main advantage of UDP is
b) 16-bits and 16-bits a) More overload
c) 32-bits and 16-bits b) Reliable
d) 32-bits and 32-bits c) Less overload
View Answer d) Fast
View Answer
Answer: b
Explanation: Size of source and destination ports Answer: c
must be 32-bits. Explanation: UDP is an unreliable, connectionless
253
transport layer protocol and uses minimum length
overload. View Answer
Answer: d Answer: d
Explanation: Total length is the 16 bit field which Explanation: SHA or MD5 can be used. Kerberos
contains the length of UDP header and the data. V5 is an authentication protocol, not an
encryption protocol; therefore, answer A is
9. Correct expression for UDP user datagram incorrect. Certificates are a type of authentication
length is that can be used with IPsec, not an encryption
a) UDP length = IP length – IP header’s length protocol; therefore, answer B is incorrect.
b) UDP length = UDP length – UDP header’s
length 3. Which two types of IPsec can be used to secure
c) UDP length = IP length + IP header’s length communications between two LANs?
d) UDP length = UDP length + UDP header’s a) AH tunnel mode
254
b) ESP tunnel mode 8. In computer security… means that computer
c) Both AH tunnel mode and ESP tunnel mode system assets can be modified only by authorized
d) ESP transport mode parities.
View Answer a) Confidentiality
b) Integrity
Answer: c c) Availability
Explanation: A tunnel mode IPsec should be used. d) Authenticity
Option c is for data transfer purpose, option d is View Answer
for integrity & confidentiality purpose.
Answer: b
4. ______ provides authentication at the IP level. Explanation: Integrity means that computer
a) AH system assets can be modified only by authorized
b) ESP parities.
c) PGP
d) SSL 9. In computer security… means that the
View Answer information in a computer system only be
accessible for reading by authorized parities.
Answer: a a) Confidentiality
Explanation: It provides integrity checking and b) Integrity
anti-reply security. c) Availability
d) Authenticity
5. IPsec defines two protocols: _______ and View Answer
________
a) AH; SSL Answer: a
b) PGP; ESP Explanation: Confidentiality means that the
c) AH; ESP information in a computer system only be
d) All of the mentioned accessible for reading by authorized parities.
View Answer
10. Which of the following organizations is
Answer: c primarily concerned with military encryption
Explanation: Authentication header and systems?
Encryption security payload. a) NSA
b) NIST
6. IP Security operates in which layer of the OSI c) IEEE
model? d) ITU
a) Network View Answer
b) Transport
c) Application Answer: a
d) Physical Explanation: The NSA is primarily responsible
View Answer for military encryption systems. The NSA
designs, evaluates, and implements encryption
Answer: a systems for the military and government agencies
Explanation: Network layer is mainly used for with high security needs.
security purpose, so IPsec in mainly operates in
network layer. 1. Two broad categories of congestion control are
a) Open-loop and Closed-loop
7. ESP provides b) Open-control and Closed-control
a) source authentication c) Active control and Passive control
b) data integrity d) None of the mentioned
c) privacy View Answer
d) all of the mentioned
View Answer Answer: a
Explanation: These are two types of congestion
Answer: d control.
Explanation: Encrypted security payload provides
source, data integrity and privacy. 2. In open-loop control, policies are applied to
__________
a) Remove after congestion occurs
255
b) Remove after sometime 7. The technique in which a congested node stops
c) Prevent before congestion occurs receiving data from the immediate upstream node
d) Prevent before sending packets or nodes is called as
View Answer a) Admission policy
b) Backpressure
Answer: c c) Forward signalling
Explanation: Policies are applied to prevent d) Backward signalling
congestion before it occurs. View Answer
Answer: a Answer: c
Explanation: Delay time for setup and teardown is Explanation: None.
one each.
5. An ATM cell has the payload field of
10. In data transfer phase, the table contains how a) 32 bytes
many columns? b) 48 bytes
a) 1 c) 64 bytes
b) 2 d) 128 bytes
c) 3 View Answer
d) 4
View Answer Answer: b
Explanation: None.
Answer: d
Explanation: Table has 4 columns. Port and VCI 6. Frame relay has error detection at the
for both incoming and outgoing data. a) physical layer
b) data link layer
c) network layer
1. ATM and frame relay are d) transport layer
a) virtual circuit networks View Answer
b) datagram networks
c) virtual private networks Answer: b
d) none of the mentioned Explanation: None.
View Answer
7. Virtual circuit identifier in frame relay is called
Answer: a a) data link connection identifier
Explanation: ATM stands for asynchronous b) frame relay identifier
transfer mode. c) cell relay identifier
d) none of the mentioned
2. ATM uses the View Answer
a) asynchronous frequency division multiplexing
b) asynchronous time division multiplexing Answer: a
c) asynchronous space division multiplexing Explanation: None.
d) none of the mentioned
View Answer 8. Frame relay has
a) only physical layer
Answer: b b) only data link layer
Explanation: None. c) only network layer
d) both physical and data link layer
3. ATM standard defines _______ layers. View Answer
a) 2
b) 3 Answer: d
c) 4 Explanation: None.
d) 5
View Answer 9. In frame relay networks, extended address is
used
Answer: b a) to increase the range of data link connection
Explanation: Three layers are physical layer, identifiers
ATM layer and application adoption layer. b) for error detection
c) for encryption
4. ATM can be used for d) for error recovery
a) local area network View Answer
b) wide area network
c) any of local or wide area network Answer: a
Explanation: None.
258
10. What is FRAD in frame relay network? or error control, they must be provided by
a) FRAD assembles and disassembles the frames theUpper Level Protocol.
coming from other protocols
b) FRAD is used for modulation and 5. Frame Relay deploys physical layer carriers
demodulation such as
c) FRAD is used for error detection a) ADMs
d) None of the mentioned b) UPSR
View Answer c) BLSR
d) SONET
Answer: a View Answer
Explanation: FRAD stands for frame relay
assembler/disassembler. Answer: d
Explanation: Frame Relay deploys physical layer
1. Frame Relay is very cheap than other carriers such asSONET.
a) LANs
b) WANs 6. Frame relay has error detection at the
c) MANs a) physical layer
d) Multipoint Networks b) data link layer
View Answer c) network layer
d) transport layer
Answer: b View Answer
Explanation: Frame Relay is very cheap than
other WANs. Answer: b
Explanation: In data link layer error control
2. Frame Relay networks offer an option called header is the main thing for any packet transfer,
a) Voice Over For Relay so we use this layer frame relay has error
b) Voice Over Fine Relay detection.
c) Voice On Frame Relay
d) Voice Over Frame Relay 7. Virtual circuit identifier in frame relay is called
View Answer a) data link connection identifier
b) frame relay identifier
Answer: d c) cell relay identifier
Explanation: Frame Relay networks offer an d) none of the mentioned
option calledVoice Over Frame Relay View Answer
1. A piece of icon or image on a web page 6. A web cookie is a small piece of data
associated with another webpage is called a) sent from a website and stored in user’s web
a) url browser while a user is browsing a website
b) hyperlink b) sent from user and stored in the server while a
c) plugin user is browsing a website
d) none of the mentioned c) sent from root server to all servers
View Answer d) none of the mentioned
View Answer
Answer: b
Explanation: None. Answer: a
Explanation: None.
2. Dynamic web page
a) is same every time whenever it displays 7. Which one of the following is not used to
b) generates on demand by a program or a request generate dynamic web pages?
from browser a) PHP
c) both is same every time whenever it displays b) ASP.NET
and generates on demand by a program or a c) JSP
request from browser d) None of the mentioned
d) none of the mentioned View Answer
View Answer
Answer: d
Answer: b Explanation: None.
Explanation: None.
8. An alternative of javascript on windows
3. What is a web browser? platform is
a) a program that can display a web page a) VBScript
b) a program used to view html documents b) ASP.NET
c) it enables user to access the resources of c) JSP
internet d) None of the mentioned
d) all of the mentioned View Answer
View Answer
Answer: a
Answer: d Explanation: None.
Explanation: None.
9. What is document object model (DOM)?
a) convention for representing and interacting
260
with objects in html documents c) Either of the mentioned
b) application programming interface d) None of the mentioned
c) hierarchy of objects in ASP.NET View Answer
d) none of the mentioned
View Answer Answer: b
Explanation: For TCP it is 6.
Answer: a
Explanation: None. 5. The data field can carry which of the
following?
10. AJAX stands for a) TCP segemnt
a) asynchronous javascript and xml b) UDP segment
b) advanced JSP and xml c) ICMP messages
c) asynchronous JSP and xml d) None of the mentioned
d) advanced javascript and xml View Answer
View Answer
Answer: c
Answer: a Explanation: Data field usually has tranaport layer
Explanation: None. segment, but it can also carry ICMP messages.
1. Which of the following is not applicable for IP? 6. What should be the flag value to indicate the
a) Error reporting last fragment?
b) Handle addressing conventions a) 0
c) Datagram format b) 1
d) Packet handling conventions c) TTl value
View Answer d) None of the mentioned
View Answer
Answer: a
Explanation: Error reporting is handled by ICMP. Answer: a
Explanation: flag=0 indicates that it is the last
2. Which of the following field in IPv4 datagram fragment.
is not related to fragmentation?
a) Flags 7. Which of these is not applicable for IP
b) Offset protocol?
c) TOS a) is connectionless
d) Identifier b) offer reliable service
View Answer c) offer unreliable service
d) none of the mentioned
Answer: c View Answer
Explanation: TOS-type of service identifies the
type of packets. Answer: b
Explanation: Ip offers unreliable service.
3. The TTL field has value 10. How many routers advertisement
(max) can process this datagram?
a) 11 8. Fragmentation has following demerits
b) 5 a) complicates routers
c) 10 b) open to DOS attack
d) 1 c) overlapping of fragments.
View Answer d) all of the mentioned
View Answer
Answer: c
Explanation: TTL field is decremented by one Answer: d
each time the datagram is processed by a router. Explanation: Fragmentation makes the
implementation complex and also can create DOS
4. If the value in protocol field is 17, the transport attack.
layer protocol used is _____________
a) TCP 9. Which field helps to check rearrangement of
b) UDP the fragments?
261
a) offset 5. In IPv4 Addresses, classful addressing is
b) flag replaced with
c) ttl a) Classless Addressing
d) identifer b) Classful Addressing
View Answer c) Classful Advertising
d) Classless Advertising
Answer: a View Answer
Explanation: Offset field specifies where the
fragment fits in the original datagram. Answer: a
Explanation: Classful addressing is replaced with
1. Which of these is not applicable for IP classless addressing.
protocol?
a) Connectionless 6. First address in a block is used as network
b) Offer reliable service address that represents the
c) Offer unreliable service a) Class Network
d) None of the mentioned b) Entity
View Answer c) Organization
d) Codes
Answer: b View Answer
Explanation: IP offers unreliable service.
Answer: c
2. Fragmentation has following demerits Explanation: First address in a block is used as
a) Complicates routers network address that represents the organization.
b) Open to DOS attack
c) Overlapping of fragments 7. In classful addressing, a large part of available
d) All of the mentioned addresses are
View Answer a) Organized
b) Blocked
Answer: d c) Wasted
Explanation: Fragmentation makes the d) Communicated
implementation complex and also can create DOS View Answer
attack.
Answer: c
3. Which field helps to check rearrangement of Explanation: In classful addressing, a large part of
the fragments? available addresses are wasted.
a) Offset advertisement
b) Flag
c) TTL 8. Network addresses are very important concepts
d) Identifier of
View Answer a) Routing
b) Mask
Answer: a c) IP Addressing
Explanation: offset field specifies where the d) Classless Addressing
fragment fits in the original datagram. View Answer
262
Answer: d Answer: d
Explanation: Class F is not a class of IP Explanation: All the features are only present in
addressing. IPv4 and not IPv6.
1. The size of IP address in IPv6 is 6. The _________ field determines the lifetime of
a) 4bytes IPv6 datagram
b) 128bits a) Hop limit
c) 8bytes b) TTL
d) 100bits c) Next header
View Answer d) None of the mentioned
View Answer
Answer: b
Explanation: An IPv6 address is 128 bits long. Answer: a
Explanation: The Hop limit value is decremented
2. The header length of an IPv6 datagram is by one by a router when the datagram is forwaded
___________ by the router. When the value becomes zero the
a) 10bytes datagram is discarded.
b) 25bytes
c) 30bytes 7. Dual-stack approach refers to
d) 40bytes a) Implementing Ipv4 with 2 stacks
View Answer b) Implementing Ipv6 with 2 stacks
c) Node has both IPv4 and IPv6 support
Answer: d d) None of the mentioned
Explanation: IPv6 datagram has fixed header View Answer
length of 40bytes, which results is faster
processing of the datagram. Answer: c
Explanation: Dual-stack is one of the approach
3. In the IPv6 header,the traffic class field is used to support IPv6 in already existing systems.
similar to which field in the IPv4 header? advertisement
a) Fragmentation field
b) Fast-switching 8. Suppose two IPv6 nodes want to interoperate
c) ToS field using IPv6 datagrams but are connected to each
d) Option field other by intervening IPv4 routers. The best
View Answer solution here is
a) Use dual-stack approach
Answer: c b) Tunneling
Explanation: This field enables to have different c) No solution
types of IP datagram. d) Replace the system
View Answer
4. IPv6 doesnot use _________ type of address
a) Broadcast Answer: b
b) Multicast Explanation: The IPv4 routers can form a tuunel.
c) Anycast
d) None of the mentioned 9. Teredo is an automatic tunneling technique. In
View Answer each client the obfuscated IPv4 address is
represented by bits
Answer: a a) 96 to 127
Explanation: Broadcast has been eliminated in b) 0 to 63
IPv6. c) 80 to 95
d) 64 to 79
5. These are the features present in IPv4 but not in View Answer
IPv6.
a) Fragmentation Answer: a
b) Header checksum Explanation: Bits 96 to 127 in the datagram
c) Options represents obfuscated 1Pv4 address.
d) All of the mentioned
View Answer 1. Dual-stack approach refers to
a) Implementing Ipv4 with 2 stacks
263
b) Implementing Ipv6 with 2 stacks Answer: b
c) Node has both IPv4 and IPv6 support Explanation: In subcategories of reserved address
d) None of the mentioned in IPv6, address that is used by a host to test itself
View Answer without going into network is called loop back
address.
Answer: c
Explanation: Dual-stack is one of the approach 6. A few leftmost bits in each address of IPv6
used to support IPv6 in already existing systems. address define its category is called
a) Prefix type
2. Suppose two IPv6 nodes want to interoperate b) Postfix type
using IPv6 datagrams but are connected to each c) Reserved type
other by intervening IPv4 routers. The best d) Local type
solution here is View Answer
a) Use dual-stack approach
b) Tunneling Answer: a
c) No solution Explanation: Prefix means bits in the IP address
d) Replace the system are placed in leftmost position.
View Answer
7. In IPv6 addresses, addresses start with eight 0s
Answer: b are called
Explanation: The IPv4 routers can form a tunnel. a) Unicast addresses
b) Multicast addresses
3. Teredo is an automatic tunneling technique. In c) Any cast addresses
each client the obfuscated IPv4 address is d) Reserved addresses
represented by bits View Answer
a) 96 to 127
b) 0 to 63 Answer: d
c) 80 to 95 Explanation: In IPv6 address format the starting
d) 64 to 79 bits are specified with eight 0s called reserved
View Answer address.
advertisement
Answer: a
Explanation: Bits 96 to 127 in the datagram 8. Which statement(s) about IPv6 addresses are
represents obfuscated 1Pv4 address. true?
a) Leading zeros are required
4. A link local address of local addresses is used b) Two colons (::) are used to represent successive
in an hexadecimal fields of zeros
a) Isolated router c) Two colons (::) are used to separate fields
b) Isolated mask d) A single interface cannot have multiple IPv6
c) Isolated subnet addresses of different types
d) Isolated net View Answer
View Answer
Answer: b
Answer: c Explanation: In order to shorten the written length
Explanation: Isolated subnet is very huge sharing of an IPv6 address, successive fields of zeros may
network area in this link local address of local be replaced by double colons. In trying to shorten
addresses is used. the address further, leading zeros may also be
removed. Just as with IPv4, a single device’s
5. In subcategories of reserved address in IPv6, interface can have more than one address; with
address that is used by a host to test itself without IPv6 there are more types of addresses and the
going into network is called same rule applies. There can be link-local, global
a) Unspecified address unicast, and multicast addresses all assigned to the
b) Loopback address same interface.
c) Compatible address
d) Mapped address 9. When IPV6 launched
View Answer a) June 2, 2012
b) June 4, 2012
c) June 5, 2012
264
d) June 6, 2012 a) Well-known ports
View Answer b) Registered ports
c) Dynamic ports
Answer: d d) Static ports
Explanation: None View Answer
8. Which of the following is not the step in 5. Which field helps to check rearrangement of
Header translation procedure? the fragments?
a) The IPv6 mapped address is changed to an IPv4 a) offset
address by extracting the rightmost 32bits b) flag
b) The value of the IPv6 priority field is discarded c) ttl
c) The type of service field in IPv4 is set to zero d) identifier
d) The IPv6 flow label is considered View Answer
View Answer
Answer: a
Answer: d Explanation: Offset field specifies where the
Explanation: In header translation procedure, IPv6 fragment fits in the original datagram.
flow label is ignored.
6. The size of IP address in IPv6 is
1. Which of the following is not applicable for IP? a) 4bytes
a) Error reporting b) 128bits
b) Handle addressing conventions
268
c) 8bytes subnetmask?
d) 100bits a) 172.16.10.255
View Answer b) 255.255.255.255
c) 172.16.255.255
Answer: b d) 172.255.255.255
Explanation: An IPv6 address is 128 bits long. View Answer
5. _________ implies that all subnets obtained 9. _________ is a collective term for a number of
from the same subnet mask. Ethernet Standards that carry traffic at the
a) Static subnetting nominal rate of 1000 Mbit/s against the original
b) Dynamic subnetting Ethernet speed of 10 Mbit/s.
c) Variable length subnetting a) Ethernet
d) Both Dynamic subnetting and Variable length b) Fast Ethernet
subnetting c) Gigabit Ethernet
View Answer d) All of the mentioned
View Answer
Answer: a
Explanation: Static sub network. Answer: b
Explanation: Fast Ethernet
6. State whether true or false.
i) A connection oriented protocol can only use 10. _________ is another kind of fiber optic
unicast addresses. network with an active star for switching.
ii) The any cast service is included in IPV6. a) S/NET
a) True, True b) SW/NET
b) True, False c) NET/SW
c) False, True d) FS/NET
d) False, False View Answer
View Answer
Answer: a
Answer: a Explanation: A 50-MBd active star fiber optical
Explanation: A connection oriented protocol can Local area network (LAN) and its optical
only use unicast addresses. combiner and mixing rod splitter are presented.
The any cast service is included in IPV6. The limited power budget and relatively large
tapping losses of light wave technology, which
7. __________ is a high performance fiber optic limit the use of fiber optics in tapped bus LAN
token ring LAN running at 100 Mbps over topologies, are examined and proven tolerable in
distances upto 1000 stations connected. optical star topologies.
a) FDDI
b) FDDT 1.A network administrator is connecting hosts A
c) FDDR and B directly through their Ethernet interfaces, as
d) FOTR shown in the illustration. Ping attempts between
View Answer the hosts are unsuccessful. What can be done to
provide connectivity between the hosts?
Answer: a
Explanation: FIBER DISTRIBUTED DATA
INTERFACE
Answer: d Answer: d
Explanation: The “debug IP IGRP events” is used Explanation: The following commands setup the
to only display a summary of IGRP routing sub interfaces to allow for two types of
information. You can append an IP address onto encapsulation:interface Ethernet 0.1 IPX
either command to see only the IGRP encapsulation Novell-ether IPX network 9e
updates from a neighbor. interface Ethernet0.2 IPX encapsulation sap IPX
network 6c.
7. What does the following series of commands
accomplish? RouterIGRP 71 network 10. What does the “IPX maximum-paths 2”
10.0.0.0 router IGRP 109 network 172.68.7.0 command accomplish?
a) It isolates networks 10.0.0.0 and 172.68.7.0 a) It enables load sharing on 2 paths if the paths
b) It loads IGRP for networks 109 and 71 are equal metric paths
c) It disables RIP b) It sets up routing to go to network 2
d) It disables all routing protocols c) It is the default for Cisco IPX load sharing
View Answer d) It enables load sharing on 2 paths if the paths
273
are unequal metric paths c) Every 90 seconds
View Answer d) RIPv1 does not broadcast periodically
View Answer
Answer: a
Explanation: It enables load sharing on 2 paths if Answer: a
the paths are equal metric paths. The default is 1 Explanation: Every 30 seconds RIPv1 router
pathand the maximum is 512 paths. broadcast its routing table by default.
11. You want to enable both arpa and snap 3. Which command displays RIP routing updates?
encapsulation on one router interface. a) Show IP route
How do you do this? b) Debug IP rip
a) The interface can handle multiple encapsulation c) Show protocols
types with no extra configuration d) Debug IP route
b) Assign two network numbers, one for each View Answer
encapsulation type
c) Enable Novell-ether to run multiple Answer: b
encapsulation types Explanation: The debug IP rip command is used
d) Both arpa and snap are enabled by default so to show the Internet Protocol (IP) Routing
you don’t have to configure anything Information Protocol (RIP) updates being sent and
View Answer received on the router.
277
d) None of the mentioned 8. In which mode FTP, the client initiates both the
View Answer control and data connections.
a) Active mode
Answer: a b) Passive mode
Explanation: HTTP resources are located by c) Both Active mode and Passive mode
uniform resource identifier. d) None of the mentioned
View Answer
4. HTTP client requests by establishing a
__________ connection to a particular port on the Answer: b
server. Explanation: In passive mode the client initiates
a) User datagram protocol both the control and data connections.
b) Transmission control protocol
c) Broader gateway protocol 9. The file transfer protocol is built on
d) None of the mentioned a) Data centric architecture
View Answer b) Service oriented architecture
c) Client server architecture
Answer: b d) None of the mentioned
Explanation:HTTP client requests by establishing View Answer
TCP connection to a particular port on the server.
Answer: c
5. In HTTP pipelining Explanation: FTP is built on client server
a) Multiple HTTP requests are sent on a single architecture.
TCP connection without waiting for the
corresponding responses 10. In file transfer protocol, data transfer can be
b) Multiple HTTP requests cannot be sent on a done in
single TCP connection a) Stream mode
c) Multiple HTTP requests are sent in a queue on b) Block mode
a single TCP connection c) Compressed mode
d) None of the mentioned d) All of the mentioned
View Answer View Answer
Answer: a Answer: d
Explanation: Multiple HTTP requests are sent on Explanation: Data transfer can be done in stream,
a single TCP connection without waiting for the block and compressed modes.
corresponding responses in HTTP pipelining.
1. Which methods are commonly used in Server
6. FTP server listens for connection on port Socket class?
number a) Public Output Stream get Output Stream ()
a) 20 b) Public Socket accept ()
b) 21 c) Public synchronized void close ()
c) 22 d) None of the mentioned
d) 23 View Answer
View Answer
Answer: b
Answer: b Explanation: Public Socket accept () used in
Explanation: 21 is the port number of FTP. Server Socket class.
7. In FTP protocol, client contacts server using 2. Which constructor of Datagram Socket class is
_________ as the transport protocol. used to create a datagram socket and binds it with
a) Transmission control protocol the given Port Number?
b) User datagram protocol a) Datagram Socket(int port)
c) Datagram congestion control protocol b) Datagram Socket(int port, Int Address address)
d) Stream control transmission protocol c) Datagram Socket()
View Answer d) None of the mentioned
View Answer
Answer: a
Explanation: Client contacts server using TCP as Answer: b
the transport protocol. Explanation: Datagram Socket (int port, Int
278
Address address) is use data create a datagram Answer: b
socket. Explanation: The java.net.InetAddress class
represent IP Address.
3. The client in socket programming must know
which information? 8. The flush () method of Print Stream class
a) IP address of Server flushes any un cleared buffers in memory
b) Port number a) True
c) Both IP address of Server & Port number b) False
d) None of the mentioned View Answer
View Answer
Answer: a
Answer: c Explanation: The flush () method of Print Stream
Explanation: The client in socket programming class flushes any un cleared buffers in memory.
must know IP address of Server.
9. Which classes are used for connection-less
4. The URL Connection class can be used to read socket programming?
and write data to the specified resource referred a) Datagram Socket
by the URL b) Datagram Packet
a) True c) Both Datagram Socket & Datagram Packet
b) False d) None of the mentioned
View Answer View Answer
Answer: a Answer: c
Explanation: The URL Connection class can be Explanation: Datagram Socket, Datagram Packet
used to read and write data to the specified are used for connection-less socket programming.
resource referred by the URL.
10. In Int Address class which method returns the
5. Datagram is basically an information but there host name of the IP Address?
is no guarantee of its content, arrival or arrival a) Public String get Hostname()
time. b) Public String getHostAddress()
a) True c) Public static IntAddress get Localhost()
b) False d) None of the mentioned
View Answer View Answer
Answer: a Answer: a
Explanation: Datagram is basically an information Explanation: In Int Address class public String get
but there is no guarantee of its content, arrival or Hostname() method returns the host name of the
arrival time. IP Address.
6. TCP, FTP, Telnet, SMTP, POP etc. are 1. Cookies were originally designed for
examples of? a) Client side programming
a) Socket b) Server side programming
b) IP Address c) Both Client side programming and Server side
c) Protocol programming
d) MAC Address d) None of the mentioned
View Answer View Answer
Answer: c Answer: b
Explanation: TCP, FTP, Telnet, SMTP, POP etc. Explanation: Cookies were originally designed for
are examples of Protocol. server side programming, and at the lowest level,
they are implemented as an extension to the
7. What does the java.net.InetAddress class HTTP protocol.
represent?
a) Socket 2. The Cookie manipulation is done using which
b) IP Address property?
c) Protocol a) cookie
d) MAC Address b) cookies
View Answer c) manipulate
279
d) none of the mentioned d) None of the mentioned
View Answer View Answer
Answer: a Answer: d
Explanation: There are no methods involved: Explanation: The Cookie visibility scope is
cookies are queried, set, and deleted by reading configurable through cookie attributes path and
and Writing the cookie property of the Document domain.
object using specially formatted strings.
7. How can you set a Cookie visibility scope to
3. Which of the following explains Cookies local Storage?
nature? a) /
a) Non Volatile b) %
b) Volatile c) *
c) Intransient d) All of the mentioned
d) Transient View Answer
View Answer
Answer: a
Answer: d Explanation: Setting the path of a cookie to “/”
Explanation: Cookies are transient by default; the gives scoping like that of localStorage and also
values they store last for the duration of the web specifies that the browser must transmit the
browser session but are lost when the user exits cookie name and value to the server whenever it
the browser. requests any web page on the site.
4. Which attribute is used to extend the lifetime of 8. Which of the following is a Boolean cookie
a cookie? attribute?
a) Higherage a) Bool
b) Increaseage b) Secure
c) Maxage c) Lookup
d) Lifetime d) Domain
View Answer View Answer
Answer: c Answer: b
Explanation: If you want a cookie to last beyond a Explanation: The final cookie attribute is a
single browsing session, you must tell the browser boolean attribute named secure that specifies how
how long (in seconds) you would like it to retain cookie values are transmitted over the network.
the cookie by specifying a manage By default, cookies are insecure, which means
attribute. If you specify a lifetime, the browser that they are transmitted over a normal, insecure
will store cookies in a file and delete them only HTTP connection. If a cookie is marked secure,
once they expire. however, it is transmitted only when the browser
and server are connected via HTTPS or another
5. Which of the following defines the Cookie secure protocol.
visibility?
a) Document Path 9. Which of the following function is used as a
b) LocalStorage consequence of not including semicolons,
c) SessionStorage Commas or whitespace in the Cookie value?
d) All of the mentioned a) EncodeURIComponent()
View Answer b) EncodeURI()
c) EncodeComponent()
Answer: d d) None of the mentioned
Explanation: Cookie visibility is scoped by View Answer
document origin as local Storage and session
Storage are, and also by document path. Answer: a
Explanation: Cookie values cannot include
6. Which of the following can be used to semicolons, commas, or whitespace. For this
configure the scope of the Cookie visibility? reason, you may want to use the core JavaScript
a) Path global function encodeURIComponent() to
b) Domain encode the value before storing it in the cookie.
c) Both Path and Domain
280
10. What is the constraint on the data per cookie? Answer: b
a) 2 KB Explanation: DELETE operations should be
b) 1 KB idempotent, means their result will always same
c) 4 KB no matter how many times these operations are
d) 3 KB invoked.
View Answer
5. Which of the following directive of Cache
Answer: c Control Header of HTTP response indicates that
Explanation: Each cookie can hold upto only 4 resource is cachable by only client and server?
KB. In practice, browsers allow many more than a) Public
300 cookies total, but the 4 KB size limit may still b) Private
be enforced by some. c) Nocache/nostore
d) Maxage
1. What REST stands for? View Answer
a) Represent State Transfer
b) Representational State Transfer Answer: b
c) Represent State Transfer Explanation: Private directive indicates that
d) None of the mentioned resource is cachable by only client and server, no
View Answer intermediary can cache the resource.
283
Answer: a 4. In OSPF, which protocol is used to discover
Explanation: None. neighbour routers automatically?
a) Link state protocol
10. When a DNS server accepts and uses incorrect b) Error-correction protocol
information from a host that has no authority c) Routing information protocol
giving that information, then it is called d) Hello protocol
a) DNS lookup View Answer
b) DNS hijacking
c) DNS spoofing Answer: d
d) None of the mentioned Explanation: Hello protocol is used to discover
View Answer neighbour routers automatically.
3. Which of the following is false with respect to 7. In OSPF header, which field is used to detect
the features of OSPF errors in the packet?
a) Support for fixed-length sunbathing by a) Type
including the subnet mask in the routing message b) Area ID
b) More flexible link cost than can range from 1 c) Authentication type
to 65535 d) Checksum
c) Use of designated router View Answer
d) Distribution of traffic over multiple paths that
have equal cost to the destination Answer: c
View Answer Explanation: Checksum field is used to detect
errors.
Answer: a
Explanation: Support for variable-length 8. In OSPF database descriptor packet, if more
sunbathing by including the subnet mask in the database descriptor packet flows, ‘M’ field is set
routing message. to
a) 1
b) 0
284
c) more d) Floods the LSA to the other routers
d) none View Answer
View Answer
Answer: b
Answer: a Explanation: An OSPF router receives an LSA.
Explanation: M bit is set to 1. The router checks its sequence number and finds
that this number is higher than the sequence
9. In OSPF database descriptor packet, which number Adds it to the database, Floods the LSA
field is used to indicate that the router is master to the other routers.
a) M
b) MS 3. An OSPF router receives an LSA. The router
c) I checks its sequence number and finds that
d) Options this number is lower than the sequence number it
View Answer already has. What does the router do
with the LSA?
Answer: b a) ignores the LSA
Explanation: MS bit is set if the router is master, b) adds it to the database
otherwise slave. c) sends newer LSU update to source router
advertisement d) floods the LSA to the other routers
View Answer
10. In OSPF database descriptor packet, which
field is used to detect a missing packet Answer: c
a) LSA header Explanation: An OSPF router receives an LSA.
b) MS The router checks its sequence number and finds
c) Database descriptor sequence number that this number is lower than the sequence
d) Options number sends newer LSU update to source router.
View Answer
4. Each LSA has its own age timer. By default,
Answer: c how long does an LSA wait before requiring an
Explanation: Sequence number field is used to update?
detect a missing packet. a) 30 seconds
b) 1 minute
1. An OSPF router receives an LSA, the router c) 30 minutes
checks its sequence number, and this d) 1 hour
number matches the sequence number of the LSA View Answer
that the receiving router already has.
What does the receiving router do with the LSA? Answer: c
a) Ignores the LSA Explanation: Each LSA has its own age timer. By
b) Adds it to the database default, 30 minutes does an LSA wait before
c) Sends newer LSU update to source router requiring an update.
d) Floods the LSA to the other routers
View Answer 5. Distance vector protocols use the concept of
split horizon, but link-state routing protocols, such
Answer: a as OSPF, do not.
Explanation: An OSPF router receives an LSA, a) True
the router checks its sequence number, and this b) False
number matches the sequence number of the LSA View Answer
that the receiving router already has Ignores the
LSA. Answer: b
Explanation: Distance vector protocols use the
2. An OSPF router receives an LSA. The router concept of split horizon, but link-state routing
checks its sequence number and finds that protocols, such as OSPF, do not use this.
this number is higher than the sequence number it
already has. Which two tasks does 6. The outcome of Dijkstra’s calculation is used to
the router perform with the LSA? populate the __________
a) Ignores the LSA a) Topology table
b) Adds it to the database b) Routing table
c) Sends newer LSU update to source router c) Neighbor table
285
d) Adjacency table b) Loading
View Answer c) Exchange
d) Two-way
Answer: b View Answer
Explanation: The outcome of Dijkstra’s
calculation is used to populate the Routing table. Answer: a
Explanation: DBD packets are involved during
7. What is the IP protocol number for OSPF which two states Exstart, Exchange.
packets?
a) 89 12. At which interval does OSPF refresh LSAs?
b) 86 a) 10 seconds
c) 20 b) 30 seconds
d) 76 c) 30 minutes
View Answer d) 1 hour
View Answer
Answer: a
Explanation: 89 is the IP protocol number for Answer: d
OSPF packets. Explanation: None.
advertisement
8. Which packet is NOT an OSPF packet type?
a) LSU 13. Which field is NOT a field within an OSPF
b) LSR packet header?
c) DBD a) Packet length
d) Query b) Router ID
View Answer c) Authentication type
d) Maxage time
Answer: d View Answer
Explanation: Query packet is NOT an OSPF
packet type. Answer: d
Explanation: Maxage timeis NOT a field within
9. Which multicast address does the OSPF Hello an OSPF packet header.
protocol use?
a) 224.0.0.5 14. Which two commands are required for basic
b) 224.0.0.6 OSPF configuration?
c) 224.0.0.7 a) Network ip-address mask area area-id
d) 224.0.0.8 b) Network ip-address wildcard-mask area area-id
View Answer c) Router ospf process-id
d) both Network ip-address wildcard-mask area
Answer: a area-id and Router ospf process-id
Explanation: 224.0.0.5 is the multicast address View Answer
does the OSPF Hello protocol use.
Answer: d
10. The Hello protocol sends periodic updates to Explanation: Network ip-address wildcard-mask
ensure that a neighbor relationship is maintained area area-id, Router ospf process-id are required
between adjacent routers. for basic OSPF configuration.
a) True
b) False 15. Which OSPF show command describes a list
View Answer of OSPF adjacencies?
a) Show ipospf interface
Answer: a b) Show ipospf
Explanation: The Hello protocol sends periodic c) Show ip route
updates to ensure that a neighbor relationship is d) Show ipospf neighbor
maintained between adjacent routers. View Answer
286
1. Datagram switching is done at which layer of address and output port to route the packets to
OSI model? their destinations.
a) Network layer
b) Physical layer 6. Which of the following remains same in the
c) Application layer header of the packet in a datagram network during
d) Transport layer the entire journey of the packet?
View Answer a) Destination address
b) Source address
Answer: a c) Checksum
Explanation: Datagram switching is normally d) Padding
done at network layer. View Answer
Answer: d Answer: d
Explanation: None. Explanation: None.
Answer: a Answer: a
Explanation: None. Explanation: None.
advertisement
5. Ethernet in metropolitan area network (MAN)
8. Choose the wrong statement can be used as
a) Nslookup is used to query a DNS server for a) pure ethernet
DNS data b) ethernet over SDH
b) Ping is used to check connectivity c) ethernet over MPLS
c) Pathping combines the functionality of ping d) all of the mentioned
with that of route View Answer
d) Ifconfig can configure TCP/IP network
interface parameters Answer: d
View Answer Explanation: None.
291
Answer: a 2. In wireless ad-hoc network
Explanation: None. a) access point is not required
b) access point is must
7. High speed ethernet works on c) nodes are not required
a) coaxial cable d) none of the mentioned
b) twisted pair cable View Answer
c) optical fiber
d) none of the mentioned Answer: a
View Answer Explanation: None.
1. What is the access point (AP) in wireless LAN? 6. In wireless network an extended service set is a
a) device that allows wireless devices to connect set of
to a wired network a) connected basic service sets
b) wireless devices itself b) all stations
c) both device that allows wireless devices to c) all access points
connect to a wired network and wireless devices d) none of the mentioned
itself View Answer
d) none of the mentioned
View Answer Answer: a
Explanation: None.
Answer: a
Explanation: None.
292
7. Mostly ________ is used in wireless LAN. d) none of the mentioned
a) time division multiplexing View Answer
b) orthogonal frequency division multiplexing
c) space division multiplexing Answer: c
d) none of the mentioned Explanation: None.
View Answer
3. Internet access by transmitting digital data over
Answer: b the wires of a local telephone network is provided
Explanation: None. by
a) leased line
8. Which one of the following event is not b) digital subscriber line
possible in wireless LAN. c) digital signal line
a) collision detection d) none of the mentioned
b) acknowledgement of data frames View Answer
c) multi-mode data transmission
d) none of the mentioned Answer: b
View Answer Explanation: None.
293
Answer: a Answer: c
Explanation: None. Explanation: None.
8. Which one of the following is not an 3. Bluetooth is the wireless technology for
application layer protocol used in internet? a) local area network
a) remote procedure call b) personal area network
b) internet relay chat c) both local area network and personal area
c) resource reservation protocol network
d) none of the mentioned d) none of the mentioned
View Answer View Answer
Answer: c Answer: b
Explanation: None. Explanation: None.
Answer: d Answer: b
Explanation: None. Explanation: None.
Answer: a Answer: a
Explanation: Piconet is the basic unit of bluetooth Explanation: None.
system having a master node and upto seven
active slave nodes. 7. In the piconet of bluetooth one master device
a) can not be slave
2. In a piconet, there can be up to ________ b) can be slave in another piconet
parked nodes in the net. c) can be slave in the same piconet
a) 63 d) none of the mentioned
b) 127 View Answer
c) 255
d) 511 Answer: b
View Answer Explanation: None.
294
8. Bluetooth transceiver devices operate in c) space division multiplexing
______ band. d) all of the mentioned
a) 2.4 GHz ISM View Answer
b) 2.5 GHz ISM
c) 2.6 GHz ISM Answer: a
d) 2.7 GHz ISM Explanation: None.
View Answer
4. Which one of the following modulation scheme
Answer: a is supported by WiMAX?
Explanation: None. a) binary phase shift keying modulation
b) quadrature phase shift keying modulation
9. The bluetooth supports c) quadrature amplitude modulation
a) point-to-point connections d) all of the mentioned
b) point-to-multipoint connection View Answer
c) both point-to-point connections and point-to-
multipoint connection Answer: d
d) none of the mentioned Explanation: None.
View Answer
5. WiMAX MAC layer provides an interface
Answer: c between
Explanation: None. a) higher transport layers and physical layer
b) application layer and network layer
10. A scatternet can have maximum c) data link layer and network layer
a) 10 piconets d) none of the mentioned
b) 20 piconets View Answer
c) 30 piconets
d) 40 piconets Answer: a
View Answer Explanation: None.
295
Answer: a 4. The photonic layer of the SONET is similar to
Explanation: None. the __________ of OSI model.
a) network layer
9. WiMAX is mostly used for b) data link layer
a) local area network c) physical layer
b) metropolitan area network d) none of the mentioned
c) personal area network View Answer
d) none of the mentioned
View Answer Answer: c
Explanation: None.
Answer: b
Explanation: None. 5. In SONET, each synchronous transfer signal
STS-n is composed of
10. Which one of the following frequency is not a) 2000 frames
used in WiMAX for communication? b) 4000 frames
a) 2.3 GHz c) 8000 frames
b) 2.4 GHz d) 16000 frames
c) 2.5 GHz View Answer
d) 3.5 GHz
View Answer Answer: c
Explanation: None.
Answer: b
Explanation: None. 6. Which one of the following is not true about
SONET?
1. SONET stands for a) frames of lower rate can be synchronously
a) synchronous optical network time-division multiplexed into a higher-rate frame
b) synchronous operational network b) multiplexing is synchronous TDM
c) stream optical network c) all clocks in the network are locked to a master
d) shell operational network clock
View Answer d) none of the mentioned
View Answer
Answer: a
Explanation: None. Answer: d
Explanation: None.
2. In SONET, STS-1 level of electrical signalling
has the data rate of 7. A linear SONET network can be
a) 51.84 Mbps a) point-to-point
b) 155.52 Mbps b) multi-point
c) 466.56 Mbps c) both point-to-point and multi-point
d) none of the mentioned d) none of the mentioned
View Answer View Answer
Answer: a Answer: c
Explanation: None. Explanation: None.
3. The path layer of SONET is responsible for the 8. Automatic protection switching in linear
movement of a signal network is defined at the
a) from its optical source to its optical destination a) line layer
b) across a physical line b) section layer
c) across a physical section c) photonic layer
d) none of the mentioned d) path layer
View Answer View Answer
Answer: b Answer: a
Explanation: None. Explanation: None.
296
9. A unidirectional path switching ring is a 4. Which protocol provides the synchronization
network with between media streams?
a) one ring a) RTP
b) two rings b) RTCP
c) three rings c) RPC
d) four rings d) None of the mentioned
View Answer View Answer
Answer: b Answer: b
Explanation: One ring is used as the working ring Explanation: None.
and other as the protection ring.
5. An RTP session is established for
10. What is SDH? a) each media stream
a) sdh is similar standard to SONET developed by b) all media streams
ITU-T c) some predefined number of media streams
b) synchronous digital hierarchy d) none of the mentioned
c) both sdh is similar standard to SONET View Answer
developed by ITU-T and synchronous digital
hierarchy Answer: a
d) none of the mentioned Explanation: None.
View Answer
6. RTP can use
Answer: c a) unprevileleged UDP ports
Explanation: None. b) stream control transmission protocol
c) datagram congestion control protocol
1. Real-time transport protocol (RTP) is mostly d) all of the mentioned
used in View Answer
a) streaming media
b) video teleconference Answer: d
c) television services Explanation: None.
d) all of the mentioned
View Answer 7. Which one of the following multimedia formats
can not be supported by RTP?
Answer: d a) MPEG-4
Explanation: None. b) MJPEG
c) MPEG
2. RTP is used to d) None of the mentioned
a) carry the media stream View Answer
b) monitor transmission statistics of streams
c) monitor quality of service of streams Answer: d
d) none of the mentioned Explanation: None.
View Answer
8. An RTP header has a minimum size of
Answer: a a) 12 bytes
Explanation: None. b) 16 bytes
c) 24 bytes
3. RTP provides the facility of jitter d) 32 bytes
____________ View Answer
a) media stream
b) expansion Answer: a
c) both media stream and expansion Explanation: None.
d) none of the mentioned
View Answer 9. Which one of the following is not correct?
a) RTCP provides canonical end-point identifiers
Answer: a to all session participants
Explanation: None. b) RTCP reports are expected to be sent by all
participants
297
c) RTCP itself does not provide any flow c) both its own address space and another address
encryption or authentication methods space
d) None of the mentioned d) none of the mentioned
View Answer View Answer
Answer: d Answer: b
Explanation: None. Explanation: None.
10. Which protocol defines a profile of RTP that 5. RPC works between two processes. These
provides cryptographic services for the transfer of processes must be
payload data? a) on the same computer
a) SRTP b) on different computers connected with a
b) RTCP network
c) RCP c) both on the same computer and on different
d) None of the mentioned computers connected with a network
View Answer d) none of the mentioned
View Answer
Answer: a
Explanation: None. Answer: c
Explanation: None.
1. An RPC (remote procedure call) is initiated by
the 6. A remote procedure is uniquely identified by
a) server a) program number
b) client b) version number
c) both server and client c) procedure number
d) none of the mentioned d) all of the mentioned
View Answer View Answer
Answer: b Answer: d
Explanation: None. Explanation: None.
298
b) asynchronous operation relation to the firewall is the most productive
c) time independent operation placement?
d) none of the mentioned a) Inside the firewall
View Answer b) Outside the firewall
c) Both inside and outside the firewall
Answer: a d) Neither inside the firewall nor outside the
Explanation: None. firewall.
View Answer
10. The local operating system on the server
machine passes the incoming packets to the Answer: a
a) server stub Explanation: There are legitimate political,
b) client stub budgetary and research reasons to want to see all
c) client operating system the “attacks” against your connection, but given
d) none of the mentioned the care and feeding any IDS requires, do yourself
View Answer a favor and keep your NIDS sensors on the inside
of the firewall.
Answer: a
Explanation: None. 4. What is the purpose of a shadow honeypot?
a) To flag attacks against known vulnerabilities
1. Which of the following is an advantage of b) To help reduce false positives in a signature-
anomaly detection? based IDS
a) Rules are easy to define c) To randomly check suspicious traffic identified
b) Custom protocols can be easily analyzed by an anomaly detection system
c) The engine can scale as the rule set grows d) To enhance the accuracy of a traditional
d) Malicious activity that falls within normal honeypot
usage patterns is detected View Answer
View Answer
Answer: c
Answer: c Explanation: “Shadow honeypots,” as researchers
Explanation: Once a protocol has been built and a call them, share all the same characteristics of
behavior defined, the engine can scale more protected applications running on both the server
quickly and easily than the signature-based model and client side of a network and operate in
because a new signature does not have to be conjunction with an ADS.
created for every attack and potential variant.
5. At which two traffic layers do most commercial
2. A false positive can be defined as… IDSes generate signatures?
a) An alert that indicates nefarious activity on a a) Application layer
system that, upon further inspection, turns out to b) Network layer
represent legitimate network traffic or behavior c) Transport layer
b) An alert that indicates nefarious activity on a d) both Transport layer and Network layer
system that is not running on the network View Answer
c) The lack of an alert for nefarious activity
d) Both An alert that indicates nefarious activity Answer: d
on a system that, upon further inspection, turns Explanation: Most commercial IDSes generate
out to represent legitimate network traffic or signatures at the network and transport layers.
behavior and An alert that indicates nefarious
activity on a system that is not running on the 6. An IDS follows a two-step process consisting
network of a passive component and an active component.
View Answer Which of the following is part of the active
component?
Answer: d a) Inspection of password files to detect
Explanation: A false positive is any alert that inadvisable passwords
indicates nefarious activity on a system that, upon b) Mechanisms put in place to reenact known
further inspection, turns out to represent methods of attack and record system responses
legitimate network traffic or behavior. c) Inspection of system to detect policy violations
d) Inspection of configuration files to detect
3. One of the most obvious places to put an IDS inadvisable settings
sensor is near the firewall. Where exactly in View Answer
299
Answer: b Answer: d
Explanation: Second component of mechanisms Explanation: They are constantly updated with
are set in place to reenact known methods of attack-definition files (signatures) that describe
attack and to record system responses. each type of known malicious activity. They then
scan network traffic for packets that match the
7. When discussing IDS/IPS, what is a signature? signatures, and then raise alerts to security
a) An electronic signature used to authenticate the administrators.
identity of a user on the network
b) Attack-definition file 1. Both HDLC and PPP both are Data link layer
c) It refers to “normal,” baseline network behavior protocols.
d) None of the above a) True
View Answer b) False
View Answer
Answer: b
Explanation: IDSes work in a manner similar to Answer: a
modern antivirus technology. They are constantly Explanation: Both HDLC and PPP both are Data
updated with attack-definition files (signatures) link layer protocol.
that describe each type of known malicious
activity. 2. Which protocol does the PPP protocol provide
for handling the capabilities of the connection/link
8. “Semantics-aware” signatures automatically on the network?
generated by Nemean are based on traffic at a) LCP
which two layers? b) NCP
a) Application layer c) Both LCP and NCP
b) Network layer d) TCP
c) Session layer View Answer
d) both Application layer and Session layer
View Answer Answer: c
Explanation: LCP and NCP are the PPP protocol
Answer: d provide for handling the capabilities of the
Explanation: Nemean automatically generates connection/link on the network.
“semantics-aware” signatures based on traffic at
the session and application layers. 3. The PPP protocol
a) Is designed for simple links which transport
9. Which of the following is used to provide a packets between two peers
baseline measure for comparison of IDSes? b) Is one of the protocols for making an Internet
a) Crossover error rate connection over a phone line
b) False negative rate c) Both Is designed for simple links which
c) False positive rate transport packets between two peers & Is one of
d) Bit error rate the protocols for making an Internet connection
View Answer over a phone line
d) None of the mentioned
Answer: a View Answer
Explanation: As the sensitivity of systems may
cause the false positive/negative rates to vary, it’s Answer: c
critical to have some common measure that may Explanation: The PPP protocolis designed for
be applied across the board. simple links which transport packets between two
peers and one of the protocols for making an
10. Which of the following is true of signature- Internet connection over a phone line.
based IDSes?
a) They alert administrators to deviations from 4. PPP provides the _______ layer in the TCP/IP
“normal” traffic behavior suite.
b) They identify previously unknown attacks a) Link
c) The technology is mature and reliable enough b) Network
to use on production networks c) Transport
d) They scan network traffic or packets to identify d) Application
matches with attack-definition files View Answer
View Answer
300
Answer: a Answer: b
Explanation: PPP provides thelinklayer in the Explanation: A family of network control
TCP/IP suite. protocols (NCPs)are a series of independently-
defined protocols that encapsulate.
5. PPP consists of ________components
a) Three (encapsulating, the Domain Name 9. Choose one from the following
system) a) PPP can terminate the link at any time
b) Three ( encapsulating, a link control protocol, b) PPP can terminate the link only during the link
NCP ) establishment phase
c) Two ( a link control protocol, Simple Network c) PPP can terminate the link during the
Control protocol) authentication phase
d) None of the mentioned d) None of the mentioned
View Answer View Answer
Answer: b Answer: a
Explanation: PPP consists of three (encapsulating, Explanation: PPP can terminate the link at any
a link control protocol, NCP) time because it works on the data link layer
Components. protocol.
6. The PPP encapsulation 10. The link necessarily begins and ends with this
a) Provides for multiplexing of different network- phase. During this phase, the LCP automata will
layer protocols be in INITIAL or STARTING states
b) Requires framing to indicate the beginning and a) Link-termination phase
end of the encapsulation b) Link establishment phase
c) Establishing, configuring and testing the data- c) Authentication phase
link connection d) Link dead phase
d) None of the mentioned View Answer
View Answer
Answer: d
Answer: a Explanation: The link necessarily begins and ends
Explanation: The PPP encapsulationprovides for with this phase. During this phase, the LCP
multiplexing of different network-layer protocols. automata will be in INITIAL or STARTING
states link dead phase.
7. A Link Control Protocol (LCP) is used for
a) Establishing, configuring and testing the data- 1. EIGRP is a routing Protocol design by Cisco.
link connection (Yes/No)?
b) Establishing and configuring different network- a) Yes
layer protocols b) No
c) Testing the different network-layer protocols View Answer
d) None of the mentioned
View Answer Answer: a
Explanation: EIGRP is a routing Protocol design
Answer: a by Cisco.
Explanation: A Link Control Protocol (LCP) is
used for establishing, configuring and testing the 2. EIGRP metric is ________
data-link connection. a) K-values
b) Bandwidth only
8. A family of network control protocols (NCPs) c) Hop Count
a) Are a series of independently defined protocols d) Delay only
that provide a dynamic View Answer
b) Are a series of independently-defined protocols
that encapsulate Answer: a
c) Are a series of independently defined protocols Explanation: EIGRP metric is K-values.
that provide transparent
d) The same as NFS 3. EIGRP can support ____________
View Answer a) VLSM/subnetting
b) Auto summary
c) Unequal cast load balancing
301
d) All od the above b) 170
View Answer c) 110
d) 100
Answer: d View Answer
Explanation: VLSM/subnetting, Auto summary,
Unequal cast load balancing. Answer: b
Explanation: Administrative distance for external
4. EIGRP send the hello message after every EIGRP route is 170.
___________ seconds
a) 5 seconds (LAN), 60 seconds (WAN) 9. EIGRP uses the ____________ algorithm for
b) 5 seconds (LAN), 5 seconds (WAN) finding shortest path.
c) 15s a) SPF
d) 180s b) DUAL
View Answer c) Linkstat
d) Dikstraalgo
Answer: a View Answer
Explanation: EIGRP send the hello message after
every5 seconds (LAN), 60 seconds (WAN). Answer: b
Explanation: EIGRP uses the DUAL algorithm
5. Administrative distance for internal EIGRP is for finding shortest path.
______
a) 90 10. In EIGRP best path is known as the successor,
b) 170 where as backup path is known as __________
c) 110 a) Feasible successor
d) 91 b) Back-up route
View Answer c) Default route
d) There is no backup route in EIGRP
Answer: a View Answer
Explanation: Administrative distance for internal
EIGRP is 90. Answer: a
Explanation: Feasible successor is the backup
6. The EIGRP metric values include: path.
a) Delay
b) Bandwidth 1. _____________ allows LAN users to share
c) MTU computer programs and data.
d) All of the above a) Communication server
View Answer b) Print server
c) File server
Answer: d d) Network
Explanation: The EIGRP metric values are Delay, View Answer
Bandwidth, and MTU.
Answer: c
7. For default gateway you will use which of Explanation: File server allows LAN users to
following command on Cisco router? share computer programs and data.
a) IP default network
b) IP default gateway 2. STP stands for
c) IP default route a) Shielded twisted pair cable
d) Default network b) Spanning tree protocol
View Answer c) Static transport protocol
d) None of the mentioned
Answer: a View Answer
Explanation: IP default network command used in
default gateway in Cisco router. Answer: a
Explanation: STP stands for Shielded twisted pair
8. Administrative distance for external EIGRP cable.
route is _______
a) 90
302
3. A standalone program that has been modified to Answer: c
work on a LAN by including concurrency controls Explanation: RJ-45 is used for STP cable.
such as file and record locking is an example of
___________ 8. What is the central device in star topology?
a) LAN intrinsic software a) STP server
b) LAN aware software b) Hub/switch
c) Groupware c) PDC
d) LAN ignorant software d) Router
View Answer View Answer
Answer: a Answer: b
Explanation: A standalone program that has been Explanation: Hub/switch is the central device in
modified to work on a LAN by including star topology.
concurrency controls such as file and record
locking is an example of LAN intrinsic software. 9. What is max data capacity for optical fiber
cable?
4. The __________ portion of LAN management a) 10 mbps
software restricts access, records user activities b) 100 mbps
and audit data etc. c) 1000 mbps
a) Configuration management d) 10000 mbps
b) Security management View Answer
c) Performance management
d) None of the mentioned Answer: c
View Answer Explanation: 1000 mbps is max data capacity for
optical fiber cable.
Answer: b
Explanation: The Security management portion of 10. Which of the following architecture uses
LAN management software restricts access, CSMA/CD access method?
records user activities and audit data etc. a) ARC net
b) Ethernet
5. What is the max cable length of STP? c) Router
a) 100 ft d) STP server
b) 200 ft View Answer
c) 100 m
d) 200 m Answer: b
View Answer Explanation: Ethernet uses CSMA/CD access
method.
Answer: d
Explanation: 200m is the max cable length of
STP.
Answer: a Answer: b
Explanation: The values of the attribute should be Explanation: None.
present in the domain. Domain is a set of values
permitted. 10. The tuples of the relations can be of ________
order.
6. Database __________ which is the logical a) Any
design of the database, and the database _______ b) Same
which is a snapshot of the data in the database at a c) Sorted
given instant in time. d) Constant
a) Instance, Schema View Answer
b) Relation, Schema
c) Relation, Domain Answer: a
d) Schema, Instance Explanation: The values only count. The order of
View Answer the tuples does not matter.
304
1. Which one of the following is a set of one or d) Department
more attributes taken collectively to uniquely View Answer
identify a record?
a) Candidate key Answer: c
b) Sub key Explanation: The attributes name, street and
c) Super key department can repeat for some tuples. But the id
d) Foreign key attribute has to be unique. So it forms a primary
View Answer key.
309
10. In the given query which of the keyword has Which one of the following has to be added into
to be inserted? the blank to select the dept_name which has
Computer Science as its ending string?
INSERT INTO employee _____ a) %
(1002,Joey,2000); b) _
c) ||
a) Table d) $
b) Values View Answer
c) Relation
d) Field Answer: a
View Answer Explanation: The % character matches any
substring.
Answer: b
Explanation: Value keyword has to be used to 4. ’_ _ _ ’ matches any string of ______ three
insert the values into the table. characters. ’_ _ _ %’ matches any string of at
______ three characters.
1. a) Atleast, Exactly
b) Exactly, Atleast
SELECT name ____ instructor name, course id c) Atleast, All
FROM instructor, teaches d) All, Exactly
WHERE instructor.ID= teaches.ID; View Answer
Answer: c SELECT *
Explanation: For any string operations single FROM instructor
quoted(‘) must be used to enclose. ORDER BY salary ____, name ___;
310
d) Descending, Ascending selected
View Answer b) All attributes of instructor are selected on the
given condition
Answer: c c) All attributes of teaches are selected on given
Explanation: None. condition
d) Only the some attributes from instructed and
7. teaches are selected
View Answer
advertisement
Answer: b
SELECT name Explanation: The asterisk symbol “ * ” can be
FROM instructor usedin the select clause to denote “all attributes.”
WHERE salary <= 100000 AND salary >=
90000; 9. In SQL the spaces at the end of the string are
removed by _______ function.
This query can be replaced by which of the a) Upper
following ? b) String
a) c) Trim
d) Lower
SELECT name View Answer
FROM instructor
WHERE salary BETWEEN 90000 AND 100000; Answer: c
Explanation: The syntax of trim is Trim(s); where
b) s-string.
312
b) New value c) Unique
c) Null value d) Distinct
d) Old value View Answer
View Answer
Answer: b
Answer: c Explanation: Not null constraint removes the
Explanation: None. tuples of null values.
2. If the attribute phone number is included in the 6. Using the ______ clause retains only one copy
relation all the values need not be entered into the of such identical tuples.
phone number column. This type of entry is given a) Null
as b) Unique
a) 0 c) Not null
b) – d) Distinct
c) Null View Answer
d) Empty space
View Answer Answer: d
Explanation: Unique is a constraint.
Answer: c
Explanation: Null is used to represent the absence 7.
of a value.
CREATE TABLE employee (id INTEGER,name
3. The predicate in a where clause can involve VARCHAR(20),salary NOT NULL);
Boolean operations such as and. The result of true INSERT INTO employee VALUES
and unknown is_______ false and unknown is (1005,Rach,0);
_____ while unknown and unknown is _____ INSERT INTO employee VALUES (1007,Ross,
a) Unknown, unknown, false );
b) True, false, unknown INSERT INTO employee VALUES
c) True, unknown, unknown (1002,Joey,335);
d) Unknown, false, unknown
View Answer Some of these insert statements will produce an
error. Identify the statement.
Answer: d a) Insert into employee values (1005,Rach,0);
Explanation: None. b) Insert into employee values (1002,Joey,335);
c) Insert into employee values (1007,Ross, );
4. d) None of the mentioned
View Answer
SELECT name
FROM instructor Answer: c
WHERE salary IS NOT NULL; Explanation: Not null constraint is specified
Selects which means sone value (can include 0 also)
should be given.
a) Tuples with null value
b) Tuples with no null values 8. The primary key must be
c) Tuples with any salary a) Unique
d) All of the mentioned b) Not null
View Answer c) Both Unique and Not null
d) Either Unique or Not null
Answer: b View Answer
Explanation: Not null constraint removes the
tpules of null values. Answer: c
Explanation: Primary key must satisfy unique and
5. In an employee table to include the attributes not null condition for sure.
whose value always have some value which of the advertisement
following constraint must be used?
a) Null 9. You attempt to query the database with this
b) Not null command:
313
SELECT nvl (100 / quantity, NONE) Answer: b
FROM inventory; Explanation: Avg() is used to find the mean of the
values.
Why does this statement cause an error when
QUANTITY values are null? 3.
a) The expression attempts to divide by a null
value SELECT COUNT (____ ID)
b) The data types in the conversion function are FROM teaches
incompatible WHERE semester = ’Spring’ AND YEAR =
c) The character string none should be enclosed in 2010;
single quotes (‘ ‘)
d) A null value used in an expression cannot be If we do want to eliminate duplicates, we use the
converted to an actual value keyword ______in the aggregate expression.
View Answer a) Distinct
b) Count
Answer: a c) Avg
Explanation: The expression attempts to divide by d) Primary key
a null value is erroneous in sql. View Answer
Which of the following should be used to find the 6. The ____ connective tests for set membership,
mean of the salary ? where the set is a collection of values produced by
a) Mean(salary) a select clause. The ____ connective tests for the
b) Avg(salary) absence of set membership.
c) Sum(salary) a) Or, in
d) Count(salary) b) Not in, in
View Answer c) In, not in
d) In, or
View Answer
314
Answer: c 9. Which of the following is used to find all
Explanation: In checks, if the query has the value courses taught in both the Fall 2009 semester and
but not in checks if it does not have the value. in the Spring 2010 semester .
a)
7. Which of the following should be used to find
all the courses taught in the Fall 2009 semester SELECT course id
but not in the Spring 2010 semester . FROM SECTION AS S
a) WHERE semester = ’Fall’ AND YEAR= 2009
AND
SELECT DISTINCT course id EXISTS (SELECT *
FROM SECTION FROM SECTION AS T
WHERE semester = ’Fall’ AND YEAR= 2009 WHERE semester = ’Spring’ AND YEAR= 2010
AND AND
course id NOT IN (SELECT course id S.course id= T.course id);
FROM SECTION
WHERE semester = ’Spring’ AND YEAR= b)
2010);
SELECT name
b) FROM instructor
WHERE salary > SOME (SELECT salary
SELECT DISTINCT course_id FROM instructor
FROM instructor WHERE dept name = ’Biology’);
WHERE name NOT IN (’Fall’, ’Spring’);
c)
c)
SELECT COUNT (DISTINCT ID)
(SELECT course id FROM takes
FROM SECTION WHERE (course id, sec id, semester, YEAR) IN
WHERE semester = ’Spring’ AND YEAR= 2010) (SELECT course id, sec id, semester, YEAR
FROM teaches
d) WHERE teaches.ID= 10101);
advertisement d)
315
SELECT dept_name, ID, avg (salary) Eg : SELECT name, salary, avg salary
FROM instructor FROM instructor I1, lateral (SELECT
GROUP BY dept_name; avg(salary) AS avg salary
This statement IS erroneous because FROM instructor I2
WHERE I2.dept name= I1.dept name);
a) Avg(salary) should not be selected
b) Dept_id should not be used in group by clause Without the lateral clause, the subquery cannot
c) Misplaced group by clause access the correlation variable
d) Group by clause is not valid in this query I1 from the outer query.
View Answer
5. Which of the following creates a temporary
Answer: b relation for the query on which it is defined?
Explanation: Any attribute that is not present in a) With
the group by clause must appear only inside an b) From
aggregate function if it appears in the select c) Where
clause, otherwise the query is treated as d) Select
erroneous. View Answer
Answer: b Answer: c
Explanation: Explanation: None.
316
8. Which of the following is not an aggregate Answer: a
function? Explanation: Here P gives the condition for
a) Avg deleting specific rows.
b) Sum
c) With 3. Which one of the following deletes all the
d) Min entries but keeps the structure of the relation.
View Answer a) Delete from r where P;
b) Delete from instructor where dept name=
Answer: c ’Finance’;
Explanation: With is used to create temporary c) Delete from instructor where salary between
relation and its not an aggregate function. 13000 and 15000;
d) Delete from instructor;
9. The EXISTS keyword will be true if: View Answer
a) Any row in the subquery meets the condition
only Answer: d
b) All rows in the subquery fail the condition only Explanation: Absence of condition deletes all
c) Both of these two conditions are met rows.
d) Neither of these two conditions is met
View Answer 4. Which of the following is used to insert a tuple
from another relation?
Answer: a a)
Explanation: EXISTS keyword checks for
existance of a condition. INSERT INTO course (course id, title, dept
name, credits)
10. How can you find rows that do not match VALUES (’CS-437’, ’DATABASE Systems’,
some specified condition? ’Comp. Sci.’, 4);
a) EXISTS
b) Double use of NOT EXISTS b)
c) NOT EXISTS
d) None of the mentioned INSERT INTO instructor
View Answer SELECT ID, name, dept name, 18000
FROM student
Answer: b WHERE dept name = ’Music’ AND tot cred >
Explanation: None. 144;
Answer: a Answer: b
Explanation: Delete can delete from only one Explanation: Using select statement in insert will
table at a time. include rows which are the result of the selection.
6. CASE
WHEN pred1 THEN result1
UPDATE instructor WHEN pred2 THEN result2
_____ salary= salary * 1.05; ...
WHEN predn THEN resultn
Fill in with correct keyword to update the ELSE result0
instructor relation. END
a) Where
b) Set c)
c) In
d) Select CASE
View Answer WHEN pred1 THEN result1
WHEN pred2 THEN result2
Answer: b ...
Explanation: Set is used to update the particular WHEN predn THEN resultn
value. ELSE result0
UPDATE instructor
318
SET salary = salary * 1.05 SELECT *
WHERE salary < (SELECT avg (salary) FROM student INNER JOIN takes USING
FROM instructor); (ID);
c) b)
319
7. How many join types in join condition: the logical model, but is made visible to a user as
a) 2 a virtual relation, is called a view.
b) 3
c) 4 2. Which of the following is the syntax for views
d) 5 where v is view name?
View Answer a) Create view v as “query name”;
b) Create “query expression” as view;
Answer: d c) Create view v as “query expression”;
Explanation: Types are inner join, left outer join, d) Create view “query expression”;
right outer join, full join, cross join. View Answer
320
view) if which of the following conditions are WHERE instructor.dept name= department.dept
satisfied by the query defining the view? name;
a) The from clause has only one database relation
b) The query does not have a group by or having b)
clause
c) The select clause contains only attribute names CREATE VIEW instructor_info
of the relation and does not have any expressions, SELECT ID, name, building
aggregates, or distinct specification FROM instructor, department;
d) All of the mentioned
View Answer c)
321
Find the error in this query. b) Clears all transactions
a) Instructor c) Redoes the transactions before commit
b) Select d) No action
c) View …as View Answer
d) None of the mentioned
View Answer Answer: d
Explanation: Once a transaction has executed
Answer: d commit work, its effects can no longer be undone
Explanation: Syntax is – create view v as <query by rollback work.
expression>;.
5. In case of any shut down during transaction
1. A _________ consists of a sequence of query before commit which of the following statement is
and/or update statements. done automatically?
a) Transaction a) View
b) Commit b) Commit
c) Rollback c) Rollback
d) Flashback d) Flashback
View Answer View Answer
Answer: a Answer: c
Explanation: Transaction is a set of operation until Explanation: Once a transaction has executed
commit. commit work, its effects can no longer be undone
by rollback work.
2. Which of the following makes the transaction
permanent in the database? 6. In order to maintain the consistency during
a) View transactions, database provides
b) Commit a) Commit
c) Rollback b) Atomic
d) Flashback c) Flashback
View Answer d) Retain
View Answer
Answer: b
Explanation: Commit work commits the current Answer: b
transaction. Explanation: By atomic, either all the effects of
the transaction are reflected in the database, or
3. In order to undo the work of transaction after none are (after rollback).
last commit which one should be used?
a) View 7. Transaction processing is associated with
b) Commit everything below except
c) Rollback a) Conforming an action or triggering a response
d) Flashback b) Producing detail summary or exception report
View Answer c) Recording a business activity
d) Maintaining a data
Answer: c View Answer
Explanation: Rollback work causes the current
transaction to be rolled back; that is, it undoes all Answer: a
the updates performed by the SQL statements in Explanation: None.
the transaction.
8. A transaction completes its execution is said to
4. Consider the following action: be
a) Committed
TRANSACTION..... b) Aborted
Commit; c) Rolled back
ROLLBACK; d) Failed
View Answer
What does Rollback do?
a) Undoes the transactions before commit
322
Answer: a VARCHAR(20), Salary NUMERIC
Explanation: A complete transaction always UNIQUE(Emp_id,Name));
commits. INSERT INTO Employee VALUES(1002, Ross,
advertisement CSE, 10000)
INSERT INTO Employee
9. Which of the following is used to get back all VALUES(1006,Ted,Finance, );
the transactions back after rollback? INSERT INTO Employee
a) Commit VALUES(1002,Rita,Sales,20000);
b) Rollback
c) Flashback What will be the result of the query?
d) Redo a) All statements executed
View Answer b) Error in create statement
c) Error in insert into Employee
Answer: c values(1006,Ted,Finance, );
Explanation: None. d) Error in insert into Employee
values(1008,Ross,Sales,20000);
10. ______ will undo all statements up to View Answer
commit?
a) Transaction Answer: d
b) Flashback Explanation: The not null specification prohibits
c) Rollback the insertion of a null value for the attribute.
d) Abort The unique specification says that no two tuples
View Answer in the relation can be equal on all the listed
attributes.
Answer: c
Explanation: Flashback will undo all the 4.
statements and Abort will terminate the operation.
CREATE TABLE Manager(ID NUMERIC,Name
1. To include integrity constraint in an existing VARCHAR(20),budget NUMERIC,Details
relation use : VARCHAR(30));
a) Create table
b) Modify table Inorder to ensure that the value of budget is non-
c) Alter table negative which of the following should be used?
d) Drop table a) Check(budget>0)
View Answer b) Check(budget<0)
c) Alter(budget>0)
Answer: c d) Alter(budget<0)
Explanation: SYNTAX – alter table table-name View Answer
add constraint, where constraint can be any
constraint on the relation. Answer: a
Explanation: A common use of the check clause is
2. Which of the following is not an integrity to ensure that attribute values satisfy specified
constraint? conditions, in effect creating a powerful type
a) Not null system.
b) Positive
c) Unique 5. Foreign key is the one in which the ________
d) Check ‘predicate’ of one relation is referenced in another relation.
View Answer a) Foreign key
b) Primary key
Answer: b c) References
Explanation: Positive is a value and not a d) Check constraint
constraint. View Answer
3. Answer: b
Explanation: The foreign-key declaration
CREATE TABLE Employee(Emp_id NUMERIC specifies that for each course tuple, the
NOT NULL, Name VARCHAR(20) , dept_name department name specified in the tuple must exist
in the department relation.
323
6. in the table
View Answer
CREATE TABLE course
(... Answer: c
FOREIGN KEY (dept name) REFERENCES Explanation: None.
department
. . . ); 10. Which of the following can be addressed by
enforcing a referential integrity constraint?
Which of the following is used to delete the a) All phone numbers must include the area code
entries in the referenced table when the tuple is b) Certain fields are required (such as the email
deleted in course table? address, or phone number) before the record is
a) Delete accepted
b) Delete cascade c) Information on the customer must be known
c) Set null before anything can be sold to that customer
d) All of the mentioned d) When entering an order quantity, the user must
View Answer input a number and not some text (i.e., 12 rather
than ‘a dozen’)
Answer: b View Answer
Explanation: The delete “cascades” to the course
relation, deletes the tuple that refers to the Answer: c
department that was deleted. Explanation: The information can be referred to
advertisement and obtained.
7. Domain constraints, functional dependency and 1. Dates must be specified in the format
referential integrity are special forms of a) mm/dd/yy
_________ b) yyyy/mm/dd
a) Foreign key c) dd/mm/yy
b) Primary key d) yy/dd/mm
c) Assertion View Answer
d) Referential constraint
View Answer Answer: b
Explanation: yyyy/mm/dd is the default format in
Answer: c sql.
Explanation: An assertion is a predicate
expressing a condition we wish the database to 2. A ________ on an attribute of a relation is a
always satisfy. data structure that allows the database system to
find those tuples in the relation that have a
8. Which of the following is the right syntax for specified value for that attribute efficiently,
the assertion? without scanning through all the tuples of the
a) Create assertion ‘assertion-name’ check relation.
‘predicate’; a) Index
b) Create assertion check ‘predicate’ ‘assertion- b) Reference
name’; c) Assertion
c) Create assertions ‘predicates’; d) Timestamp
d) All of the mentioned View Answer
View Answer
Answer: a
Answer: a Explanation: Index is the reference to the tuples in
Explanation: None. a relation.
324
b) ID In order to ensure that an instructor’s salary
c) StudentID domain allows only values greater than a specified
d) Student value use:
View Answer a) Value>=30000.00
b) Not null;
Answer: d c) Check(value >= 29000.00);
Explanation: The statement creates an index d) Check(value)
named studentID index on the attribute ID of the View Answer
relation student.
Answer: c
4. Which of the following is used to store movie Explanation: Check(value ‘condition’) is the
and image files? syntax.
a) Clob
b) Blob 8. Which of the following closely resembles
c) Binary Create view?
d) Image a) Create table . . .like
View Answer b) Create table . . . as
c) With data
Answer: b d) Create view as
Explanation: SQL therefore provides large-object View Answer
data types for character data (clob) and binary
data (blob). The letters “lob” in these data types Answer: b
stand for “Large OBject”. Explanation: The ‘create table . . . as’ statement
closely resembles the create view statement and
5. The user defined data type can be created using both are defined by using queries. The main
a) Create datatype difference is that the contents of the table are set
b) Create data when the table is created, whereas the contents of
c) Create definetype a view always reflect the current query result.
d) Create type advertisement
View Answer
9. In contemporary databases, the top level of the
Answer: d hierarchy consists of ______ each of which can
Explanation: The create type clause can be used to contain _____
define new types.Syntax : create type Dollars as a) Catalogs, schemas
numeric(12,2) final; . b) Schemas, catalogs
c) Environment, schemas
6. Values of one type can be converted to another d) Schemas, Environment
domain using which of the following? View Answer
a) Cast
b) Drop type Answer: a
c) Alter type Explanation: None.
d) Convert
View Answer 10. Which of the following statements creates a
new table temp instructor that has the same
Answer: a schema as an instructor.
Explanation: Example of cast :cast a) create table temp_instructor;
(department.budget to numeric(12,2)). SQL b) Create table temp_instructor like instructor;
provides drop type and alter type clauses to drop c) Create Table as temp_instructor;
or modify types that have been created earlier. d) Create table like temp_instructor;
View Answer
7.
Answer: b
CREATE DOMAIN YearlySalary Explanation: None.
NUMERIC(8,2)
CONSTRAINT salary VALUE test __________; 1. The database administrator who authorizes all
the new users, modifies the database and takes
grants privilege is
a) Super user
325
b) Administrator b) Revoke update on employee from Amir
c) Operator of operating system c) Delete select on department from Raj
d) All of the mentioned d) Grant update on employee from Amir
View Answer View Answer
Answer: d Answer: b
Explanation: The authorizations provided by the Explanation: revoke on from ;
administrator to the user is a privilege.
5. Which of the following is used to provide
2. Which of the following is a basic form of grant delete authorization to instructor?
statement? a)
a)
advertisement
GRANT 'privilege list'
ON 'relation name or view name' CREATE ROLE instructor ;
TO 'user/role list'; GRANT DELETE TO instructor;
b) b)
c) c)
326
7. If we wish to grant a privilege and to allow the Answer: a
recipient to pass the privilege on to other users, Explanation: The current role associated with a
we append the __________ clause to the session can be set by executing set role name. The
appropriate grant command. specified role must have been granted to the user,
a) With grant else the set role statement fails.
b) Grant user
c) Grant pass privelege 1. Which of the following is used to access the
d) With grant option database server at the time of executing the
View Answer program and get the data from the server
accordingly?
Answer: d a) Embedded SQL
Explanation: None. b) Dynamic SQL
c) SQL declarations
8. In authorization graph, if DBA provides d) SQL data analysis
authorization to u1 which inturn gives to u2 which View Answer
of the following is correct?
a) If DBA revokes authorization from u1 then u2 Answer: b
authorization is also revoked Explanation: Embedded SQL, the SQL statements
b) If u1 revokes authorization from u2 then u2 are identified at compile time using a
authorization is revoked preprocessor. The preprocessor submits the SQL
c) If DBA & u1 revokes authorization from u1 statements to the database system for
then u2 authorization is also revoked precompilation and optimization; then it replaces
d) If u2 revokes authorization then u1 the SQL statements in the application program
authorization is revoked with appropriate code and function calls before
View Answer invoking the programming-language compiler.
327
4. Which of the following invokes functions in 8. Which of the following is used to distinguish
sql? the variables in SQL from the host language
a) Prepared Statements variables?
b) Connection statement a) .
c) Callable statements b) –
d) All of the mentioned c) :
View Answer d) ,
View Answer
Answer: c
Explanation: JDBC provides a Callable Statement Answer: b
interface that allows invocation of SQL stored Explanation:
procedures and functions. EXEC SQL
DECLARE c cursor FOR
5. Which of the following function is used to find SELECT ID, name
the column count of the particular resultset? FROM student
a) getMetaData() WHERE tot cred > :credit amount;
b) Metadata()
c) getColumn() .
d) get Count()
View Answer advertisement
328
from instructor Answer: d
where instructor.dept_name= dept_name Explanation: Create procedure dept count proc(in
return d count; dept name varchar(20), out d count integer). Here
end in and out refers to input and result of procedure.
d) Declare d_count;
call dept_count proc(’Physics’, d_count);
SELECT dept name, budget View Answer
FROM instructor Answer: b
WHERE dept COUNT(budget) > 12; Explanation: Here the ‘Physics’ is in variable and
View Answer d_count is out variable.
Answer: b
Explanation: The count of the dept_name must be
checked for the displaying from instructor
relation. 5. The format for compound statement is
a) Begin ……. end
b) Begin atomic……. end
c) Begin ……. repeat
3. Which of the following is used to input the d) Both Begin ……. end and Begin atomic…….
entry and give the result in a variable in a end
procedure? View Answer
a) Put and get
b) Get and put Answer: d
c) Out and In Explanation: A compound statement is of the
d) In and out form begin . . . end, and it may contain multiple
View Answer SQL statements between the begin and the end.A
compound statement of the form begin atomic . . .
329
end ensures that all the statements contained end if
within it are executed as a single transaction. View Answer
advertisement Answer: a
Explanation: The conditional statements
6. supported by SQL include if-then-else statements
by using this syntax. elif and elsif are not allowed.
Repeat
sequence of statements;
__________________
end repeat 8. A stored procedure in SQL is a___________
a) Block of functions
Fill in the correct option : b) Group of Transact-SQL statements compiled
a) While Condition into a single execution plan.
b) Until variable c) Group of distinct SQL statements.
c) Until boolean expression d) None of the mentioned
d) Until 0 View Answer
View Answer
Answer: b
Answer: c Explanation: If it an atomic statement then the
Explanation: None. statements are in single transaction.
7. Which of the following is the correct format for 9. Temporary stored procedures are stored in
if statement? _________ database.
a) a) Master
b) Model
If boolean expression c) User specific
then statement or compound statement d) Tempdb
elseif boolean expression View Answer
then statement or compound statement
else statement or compound statement Answer: d
end if Explanation: None.
Answer: b Answer: a
Explanation: AFTER TRIGGERS can be Explanation: Triggers can be manipulated.
classified further into three types as: AFTER
INSERT Trigger, AFTER UPDATE Trigger, 10. Which prefixes are available to Oracle
AFTER DELETE Trigger. triggers?
a) : new only
5. The variables in the triggers are declared using b) : old only
a) – c) Both :new and : old
b) @ d) Neither :new nor : old
c) / View Answer
d) /@
View Answer
331
Answer: c SELECT ID, GPA
Explanation: None. FROM student grades
ORDER BY GPA
1. Any recursive view must be defined as the ____________;
union of two subqueries: a _______ query that is
nonrecursive and a __________ query. Inorder to give only 10 rank on the whole we
a) Base, recursive should use
b) Recursive, Base a) Limit 10
c) Base, Redundant b) Upto 10
d) View, Base c) Only 10
View Answer d) Max 10
View Answer
Answer: a
Explanation: First compute the base query and Answer: a
add all the resultant tuples to the recursively Explanation: However, the limit clause does not
defined view relation. support partitioning, so we cannot get the top n
within each partition without performing ranking;
2. Ranking of queries is done by which of the further, if more than one student gets the same
following? GPA, it is possible that one is included in the top
a) Group by 10, while another is excluded.
b) Order by
c) Having 6. If there are n tuples in the partition and the rank
d) Both Group by and Order by of the tuple is r, then its ________ is defined as (r
View Answer −1)/(n−1).
a) Ntil()
Answer: b b) Cum_rank
Explanation: Order by clause arranges the values c) Percent_rank
in ascending or descending order where a default d) rank()
is ascending order. View Answer
333
moving fromcoarser-granularity data to finer- Answer: b
granularity data—is called a drill down. Explanation: { (item name, color, clothes size),
(item name, color), (item name), () }.
6. In SQL the cross-tabs are created using
a) Slice 10. Which one of the following is the right syntax
b) Dice for DECODE?
c) Pivot a) DECODE (search, expression, result [, search,
d) All of the mentioned result]… [, default])
View Answer b) DECODE (expression, result [, search,
result]… [, default], search)
Answer: a c) DECODE (search, result [, search, result]… [,
Explanation: Pivot (sum(quantity) for color in default], expression)
(’dark’,’pastel’,’white’)). d) DECODE (expression, search, result [, search,
result]… [, default])
7. View Answer
334
4. For select operation the ________ appear in the Answer: b
subscript and the ___________ argument appears Explanation: The expression is evaluated from left
in the paranthesis after the sigma. to right according to the precedence.
a) Predicates, relation
b) Relation, Predicates 9. Which of the following is not outer join?
c) Operation, Predicates a) Left outer join
d) Relation, Operation b) Right outer join
View Answer c) Full outer join
d) All of the mentioned
Answer: a View Answer
Explanation: None.
Answer: d
5. The ___________ operation, denoted by −, Explanation: The FULL OUTER JOIN keyword
allows us to find tuples that are in one relation but combines the result of both LEFT and RIGHT
are not in another. joins.
a) Union
b) Set-difference 10. The assignment operator is denoted by
c) Difference a) ->
d) Intersection b) <-
View Answer c) =
d) ==
Answer: b View Answer
Explanation: The expression r − s produces a
relation containing those tuples in r but not in s. Answer: b
Explanation: The result of the expression to the
6. Which is a unary operation: right of the ← is assigned to the relation variable
a) Selection operation on the left of the ←.
b) Primitive operation
c) Projection operation 1. Find the ID, name, dept name, salary for
d) Generalized selection instructors whose salary is greater than $80,000 .
View Answer a) {t | t ε instructor ∧ t[salary] > 80000}
b) Э t ∈ r (Q(t))
Answer: d c) {t | Э s ε instructor (t[ID] = s[ID]∧ s[salary] >
Explanation: Generalization Selection takes only 80000)}
one argument for operation. d) None of the mentioned
View Answer
7. Which is a join condition contains an equality
operator: Answer: a
a) Equijoins Explanation: This expression is in tuple relational
b) Cartesian format.
c) Natural
d) Left 2. A query in the tuple relational calculus is
View Answer expressed as:
a) {t | P() | t}
Answer: a b) {P(t) | t }
Explanation: None. c) {t | P(t)}
advertisement d) All of the mentioned
View Answer
8. In precedence of set operators, the expression is
evaluated from Answer: c
a) Left to left Explanation: The tuple relational calculus, is a
b) Left to right nonprocedural query language. It describes the
c) Right to left desired information without giving a specific
d) From user specification procedure for obtaining that information.
View Answer
3.
335
{t | Э s ε instructor (t[name] = s[name] a) {P(x1, x2, . . . , xn) | < x1, x2, . . . , xn > }
∧ Э u ε department (u[dept name] = s[dept name] b) {x1, x2, . . . , xn | < x1, x2, . . . , xn > }
∧ u[building] = “Watson”))} c) { x1, x2, . . . , xn | x1, x2, . . . , xn}
d) {< x1, x2, . . . , xn > | P(x1, x2, . . . , xn)}
Which of the following best describes the query? View Answer
a) Finds the names of all instructors whose
department is in the Watson building Answer: d
b) Finds the names of all department is in the Explanation: Here x1, x2, . . . , xn represent
Watson building domain variables. P represents a formula
c) Finds the name of the dapartment whose composed of atoms, as was the case in the tuple
instructor and building is Watson relational calculus.
d) Returns the building name of all the
departments 8. Find the names of all instructors in the Physics
View Answer department together with the course id of all
courses they teach:
Answer: a a)
Explanation: This query has two “there exists”
clauses in our tuple-relational-calculus expression, {< c > | Э s (< c, a, s, y, b, r, t >ε section
connected by and (∧). ∧s = “Fall” ∧ y = “2009”
∨Эu (< c, a, s, y, b, r, t >ε section
4. Which of the following symbol is used in the ∧s = “Spring” ∧ y = “2010”
place of except?
a) ^ b)
b) V
c) ¬ {< n, c > | Э i, a (< i, c, a, s, y > ε teaches
d) ~ ∧ Э d, s (< i, n, d, s > ε instructor ∧ d =
View Answer “Physics”))}
Answer: c c)
Explanation: The query ¬P negates the value of P.
{< n > | Э i, d, s (< i, n, d, s > ε instructor ∧ s >
5. “Find all students who have taken all courses 80000)}
offered in the Biology department.” The
expressions that matches this sentence is : d)
a) Э t ε r (Q(t))
b) ∀ t ε r (Q(t))
{< i, n, d, s > | < i, n, d, s > ε instructor ∧ s >
c) ¬ t ε r (Q(t))
80000}
d) ~ t ε r (Q(t))
View Answer
View Answer
Answer: b
Explanation: None.
Answer: b
Explanation: ∀ is used denote “for all” in SQL.
6. Which of the following is the comparison 9. In domain relaional calculus “there exist” can
operator in tuple relational calculus be expressed as
a) ⇒ a) (P1(x))
b) = b) (P1(x)) Э x
c) ε c) V x (P1(x))
d) All of the mentioned d) Э x (P1(x))
View Answer View Answer
Answer: b Answer: d
Explanation: The comparison operators are (<, ≤, Explanation:Э is used to denote “some” values in
=, =, >, ≥). relational calculus.
advertisement
7. An expression in the domain relational calculus
is of the form
336
10. A set of possible data values is called 5. The attribute name could be structured as an
a) Attribute attribute consisting of first name, middle initial,
b) Degree and last name. This type of attribute is called
c) Tuple a) Simple attribute
d) Domain b) Composite attribute
View Answer c) Multivalued attribute
d) Derived attribute
Answer: d View Answer
Explanation: None.
Answer: b
1. An ________ is a set of entities of the same Explanation: Composite attributes can be divided
type that share the same properties, or attributes. into subparts (that is, other attributes).
a) Entity set
b) Attribute set 6. The attribute AGE is calculated from
c) Relation set DATE_OF_BIRTH. The attribute AGE is
d) Entity model a) Single valued
View Answer b) Multi valued
c) Composite
Answer: a d) Derived
Explanation: An entity is a “thing” or “object” in View Answer
the real world that is distinguishable from all
other objects. Answer: d
Explanation: The value for this type of attribute
2. Entity is a _________ can be derived from the values of other related
a) Object of relation attributes or entities.
b) Present working model
c) Thing in real world 7. Not applicable condition can be represented in
d) Model of relation relation entry as
View Answer a) NA
b) 0
Answer: c c) NULL
Explanation: For example, each person in a d) Blank Space
university is an entity. View Answer
337
Answer: a 4. Data integrity constraints are used to:
Explanation: None. a) Control who is allowed access to the data
b) Ensure that duplicate records are not entered
10. In a relation between the entities the type and into the table
condition of the relation should be specified. That c) Improve the quality of data entered for a
is called as______attribute. specific property
a) Desciptive d) Prevent users from changing the values stored
b) Derived in the table
c) Recursive View Answer
d) Relative
View Answer Answer: c
Explanation: The data entered will be in a
Answer: a particular cell (i.e., table column).
Explanation: Consider the entity sets student and
section, which participate in a relationship set 5. Establishing limits on allowable property
takes. We may wish to store a descriptive attribute values, and specifying a set of acceptable,
grade with the relationship to record the grade that predefined options that can be assigned to a
a student got in the class. property are examples of:
a) Attributes
1. _____________ express the number of entities b) Data integrity constraints
to which another entity can be associated via a c) Method constraints
relationship set. d) Referential integrity constraints
a) Mapping Cardinality View Answer
b) Relational Cardinality
c) Participation Constraints Answer: b
d) None of the mentioned Explanation: Only particular value satisfying the
View Answer constraints are entered in the column.
Answer: b Answer: c
Explanation: Here one entity in one set is related Explanation: None.
to one one entity in other set.
7. ______ is a special type of integrity constraint
3. An entity in A is associated with at most one that relates two relations & maintains consistency
entity in B. An entity in B, however, can be across the relations.
associated with any number (zero or more) of a) Entity Integrity Constraints
entities in A. b) Referential Integrity Constraints
a) One-to-many c) Domain Integrity Constraints
b) One-to-one d) Domain Constraints
c) Many-to-many View Answer
d) Many-to-one
View Answer Answer: b
Explanation: None.
Answer: d advertisement
Explanation: Here more than one entity in one set
is related to one one entity in other set.
338
8. Which one of the following uniquely identifies Answer: d
the elements in the relation? Explanation: Dashed lines link attributes of a
a) Secondary Key relationship set to the relationship set.
b) Primary key
c) Foreign key 3. The Rectangles divided into two parts
d) Composite key represents
View Answer a) Entity set
b) Relationship set
Answer: b c) Attributes of a relationship set
Explanation: Primary key checks for not null and d) Primary key
uniqueness constraint. View Answer
Answer: a Answer: a
Explanation: Every weak entity must be Explanation: Here Id is the only attribute that has
associated with an identifying entity; that is, the to have a unique entry.
weak entity set is said to be existence dependent
on the identifying entity set. The identifying entity 2. The primary key in the section relation is
set is said to own the weak entity set that it a) Course_id
identifies. It is also called as owner entity set. b) Sec_id
advertisement c) Both Course_id and Sec_id
d) All the attributes
8. Weak entity set is represented as View Answer
a) Underline
b) Double line Answer: c
c) Double diamond Explanation: Both the entries has unique entry.
d) Double rectangle
View Answer 3.
340
a) Select Course_id from section where Building b) Delete from teaches;
= ‘Richard’; c) Purge table teaches;
b) Select Course_id from section where Year = d) Delete from teaches where Id =’Null’;
‘2009’; View Answer
c) Select Course_id from teaches where Building
= ‘Packyard’; Answer: b
d) Select Course_id from section where Sec_id = Explanation: Delete table cleans the entry from
‘3’; the table.
View Answer
9. In the above teaches relation ” Select * from
Answer: b teaches where Year = ‘2010’” displays how many
Explanation: The year ‘2009’ should be selected rows?
from the section relation. a) 2
b) 4
6. c) 5
d) 1
advertisement View Answer
343
Answer: b d) Have all non key fields depend on the whole
Explanation: Partial generalization or primary key
specialization – Some higher-level entities may View Answer
not belong to any lower-level entity set.
Answer: a
9. Functional dependencies are a generalization of Explanation: The relation in second normal form
a) Key dependencies is also in first normal form and no partial
b) Relation dependencies dependencies on any column in primary key.
c) Database dependencies
d) None of the mentioned 4. Which-one ofthe following statements about
View Answer normal forms is FALSE?
a) BCNF is stricter than 3 NF
Answer: a b) Lossless, dependency -preserving
Explanation: The subclasses are combined to form decomposition into 3 NF is always possible
the superclass. c) Loss less, dependency – preserving
decomposition into BCNF is always possible
10. Which of the following is another name for a d) Any relation with two attributes is BCNF
weak entity? View Answer
a) Child
b) Owner Answer: c
c) Dominant Explanation: We say that the decomposition is a
d) All of the mentioned lossless decomposition if there is no loss of
View Answer information by replacing r (R) with two relation
schemas r1(R1) andr2(R2).
Answer: a
Explanation: A parent may be called as a strong 5. Functional Dependencies are the types of
entity. constraints that are based on______
a) Key
1. In the __________ normal form, a composite b) Key revisited
attribute is converted to individual attributes. c) Superset key
a) First d) None of the mentioned
b) Second View Answer
c) Third
d) Fourth Answer: a
View Answer Explanation: Key is the basic element needed for
the constraints.
Answer: a
Explanation: The first normal form is used to 6. Which is a bottom-up approach to database
eliminate the duplicate information. design that design by examining the relationship
between attributes:
2. A table on the many side of a one to many or a) Functional dependency
many to many relationship must: b) Database modeling
a) Be in Second Normal Form (2NF) c) Normalization
b) Be in Third Normal Form (3NF) d) Decomposition
c) Have a single attribute key View Answer
d) Have a composite key
View Answer Answer: c
Explanation: Normalisation is the process of
Answer: d removing redundancy and unwanted data.
Explanation: The relation in second normal form
is also in first normal form and no partial 7. Which forms simplifies and ensures that there
dependencies on any column in primary key. are minimal data aggregates and repetitive groups:
a) 1NF
3. Tables in second normal form (2NF): b) 2NF
a) Eliminate all hidden dependencies c) 3NF
b) Eliminate the possibility of a insertion d) All of the mentioned
anomalies View Answer
c) Have a composite key
344
Answer: c c) BCNF
Explanation: The first normal form is used to d) 1NF
eliminate the duplicate information. View Answer
5. The algorithm that takes a set of dependencies 9. A table has fields F1, F2, F3, F4, and F5, with
and adds one schema at a time, instead of the following functional dependencies:
decomposing the initial schema repeatedly is
a) BCNF algorithm F1->F3
b) 2NF algorithm F2->F4
c) 3NF synthesis algorithm (F1,F2)->F5
d) 1NF algorithm
View Answer in terms of normalization, this table is in
a) 1NF
Answer: c b) 2NF
Explanation: The result is not uniquely defined, c) 3NF
since a set of functional dependencies can have d) None of the mentioned
more than one canonical cover, and, further, in View Answer
some cases, the result of the algorithm depends on
the order in which it considers the dependencies Answer: a
in Fc. Explanation: Since the primary key is not given
we have to derive the primary key of the table.
6. The functional dependency can be tested easily Using the closure set of attributes we get the
on the materialized view, using the constraints primary key as (F1, F2). From functional
____________. dependencies, “F1->F3, F2->F4”, we can see that
a) Primary key there is partial functional dependency therefore it
b) Null is not in 1NF. Hence the table is in 1NF.
c) Unique advertisement
d) Both Null and Unique
View Answer 10. Let R(A,B,C,D,E,P,G) be a relational schema
in which the following FDs are known to hold:
Answer: d
Explanation: Primary key contains both unique AB->CD
and not null constraints. DE->P
C->E
7. Which normal form is considered adequate for P->C
normal relational database design? B->G
a) 2NF
b) 5NF The relation schema R is
c) 4NF a) in BCNF
d) 3NF b) in 3NF, but not in BCNF
View Answer c) in 2NF, but not in 3NF
d) not in 2NF
Answer: d View Answer
Explanation: A relational database table is often
described as “normalized” if it is in the Third Answer: d
Normal Form because most of the 3NF tables are Explanation: From the closure set of attributes we
free of insertion, update, and deletion anomalies. can see that the key for the relation is AB. The FD
B->G is a partial dependency, hence it is not in
8. Relation R with an associated set of functional 2NF.
dependencies, F, is decomposed into BCNF. The
redundancy (arising out of functional 1. The normal form which satisfies multivalued
dependencies) in the resulting set of relations is dependencies and which is in BCNF is
a) Zero a) 4 NF
b) More than zero but less than that of an b) 3 NF
equivalent 3NF decomposition c) 2 NF
c) Proportional to the size of F+ d) All of the mentioned
d) Indeterminate View Answer
View Answer
346
Answer: a superkey—that is, X is either a candidate key or a
Explanation: Fourth normal form is more superset thereof.
restrictive than BCNF.
6. If a multivalued dependency holds and is not
2. Which of the following is a tuple-generating implied by the corresponding functional
dependencies? dependency, it usually arises from one of the
a) Functional dependency following sources.
b) Equality-generating dependencies a) A many-to-many relationship set
c) Multivalued dependencies b) A multivalued attribute of an entity set
d) Non-functional dependency c) A one-to-many relationship set
View Answer d) Both A many-to-many relationship set and A
multivalued attribute of an entity set
Answer: c View Answer
Explanation: Multivalued dependencies, do not
rule out the existence of certain tuples. Instead, Answer: d
they require that other tuples of a certain form be Explanation: For a many-to-many relationship set
present in the relation. each related entity set has its own schema and
there is an additional schema for the relationship
3. The main task carried out in the __________ is set. For a multivalued attribute, a separate schema
to remove repeating attributes to separate tables. is created consisting of that attribute and the
a) First Normal Form primary key of the entity set.
b) Second Normal Form
c) Third Normal Form 7. Which of the following has each related entity
d) Fourth Normal Form set has its own schema and there is an additional
View Answer schema for the relationship set?
a) A many-to-many relationship set
Answer: a b) A multivalued attribute of an entity set
Explanation: Multivalued dependencies, do not c) A one-to-many relationship set
rule out the existence of certain tuples. Instead, d) None of the mentioned
they require that other tuples of a certain form be View Answer
present in the relation.
Answer: a
4. Which of the normal form is based on Explanation: If a multivalued dependency holds
multivalued dependencies? and is not implied by the corresponding functional
a) First dependency, it usually arises from this source.
b) Second advertisement
c) Third
d) Fourth 8. In which of the following, a separate schema is
View Answer created consisting of that attribute and the primary
key of the entity set.
Answer: d a) A many-to-many relationship set
Explanation: Multivalued dependencies, do not b) A multivalued attribute of an entity set
rule out the existence of certain tuples. Instead, c) A one-to-many relationship set
they require that other tuples of a certain form be d) None of the mentioned
present in the relation. View Answer
Answer: d Answer: b
Explanation: For a many-to-many relationship set Explanation: Example inst sec and student sec.
each related entity set has its own schema and
there is an additional schema for the relationship 7. Designers use which of the following to tune
set. For a multivalued attribute, a separate schema the performance of systems to support time-
is created consisting of that attribute and the critical operations?
primary key of the entity set. a) Denormalization
b) Redundant optimization
3. Which of the following has each related entity c) Optimization
set has its own schema and there is an additional d) Realization
schema for the relationship set. View Answer
a) A many-to-many relationship set
b) A multivalued attribute of an entity set Answer: a
c) A one-to-many relationship set Explanation: The process of taking a normalized
d) All of the mentioned schema and making it nonnormalized is called
View Answer denormalization.
348
8. In the schema (dept name, size) we have 1. An approach to website design with the
relations total inst 2007, total inst 2008. Which emphasis on converting visitors to outcomes
dependency have lead to this relation ? required by the owner is referred to as:
a) Dept name, year->size a) Web usability
b) Year->size b) Persuasion
c) Dept name->size c) Web accessibility
d) Size->year d) None of the mentioned
View Answer View Answer
Answer: a Answer: b
Explanation: The process of taking a normalized Explanation: In computing, graphical user
schema and making it nonnormalized is called interface is a type of user interface that allows
denormalization. users to interact with electronic devices.
9. Relation dept year(dept name, total inst 2007, 2. A method of modelling and describing user
total inst 2008, total inst 2009). Here the only tasks for an interactive application is referred to
functional dependencies are from dept name to the as:
other attributes. This relation is in a) Customer journey
a) Fourth NF b) Primary persona
b) BCNF c) Use case
c) Third NF d) Web design persona
d) Second NF View Answer
View Answer
Answer: c
Answer: b Explanation: The actions in GUI are usually
Explanation: BCNF has only one normal form. performed through direct manipulation of the
graphical elements.
10. Thus a _______ of course data gives the
values of all attributes, such as title and 3. Information architecture influences:
department, of all courses at a particular point in a) Answer choice
time. b) Site structure
a) Instance c) Labeling
b) Snapshot d) Navigation design
c) Both Instance and Snapshot View Answer
d) All of the mentioned
View Answer Answer: b
Explanation: The actions in GUI are usually
Answer: b performed through direct manipulation of the
Explanation: We use the term snapshot of data to graphical elements.
mean the value of the data at a particular point in
time. 4. Also known as schematics, a way of illustrating
advertisement the layout of an individual webpage is a:
a) Wireframe
11. Representations such as the in the dept year b) Sitemap
relation, with one column for each value of an c) Card sorting
attribute, are called _______ they are widely used d) Blueprint
in spreadsheets and reports and in data analysis View Answer
tools.
a) Cross-tabs Answer: a
b) Snapshot Explanation: An application programming
c) Both Cross-tabs and Snapshot interface specifies how some software
d) All of the mentioned components should interact with each other.
View Answer
5. A graphical or text depiction of the relationship
Answer: a between different groups of content on a website
Explanation: SQL includes features to convert is referred to as a:
data from a normal relational representation to a a) Wireframe
crosstab. b) Blueprint
349
c) Sitemap 9. A graphical or text depiction of the relationship
d) Card sorting between different groups of content on a website
View Answer is a:
a) Page template
Answer: c b) Wireframe
Explanation: An application programming c) Site map
interface specifies how some software d) Cascading style sheet (CSS)
components should interact with each other. View Answer
350
3. HTTP defines two ways in which values Answer: a
entered by a user at the browser can be sent to the Explanation: A cookie is simply a small piece of
Web server. The _____ method encodes the text containing identifying information and with
values as part of the URL. an associated name.
a) Post
b) Get 7. Which of the following is not true about HTML
c) Read ?
d) Argument a) <meta>…</meta>
View Answer b) <meta…./>
c) <metadata>…</metadata>
Answer: b d) <metadata name=”” />
Explanation: For example, if the Google search View Answer
page used a form with an input parameter
named q with the get method, and the user typed Answer: b
in the string “silberschatz” and submitted the Explanation: Meta data is the data about data
form, the browser would request the following which is included in the meta data tag.
URL from the Web server: advertisement
http://www.google.com/search?q=silberschatz.
8. Html code contains:
4. A __________ is a program running on the a) Tags
server machine, which accepts requests from a b) Attributes
Web browser and sends back results in the form c) Elements
of HTML documents. d) All of the mentioned
a) HTML View Answer
b) HTTP
c) Web Server Answer: d
d) Web browser Explanation: <> are tags,size is a attribute.
View Answer
9. Html document must always be saved with:
Answer: c a) .html
Explanation: The browser and Web server b) .htm
communicate via HTTP. Web servers provide c) .doc
powerful features, beyond the simple transfer of d) Both .html & .htm
documents. View Answer
6. This extra information is usually maintained in 1. The Java __________ specification defines an
the form of a _________ at the client. application programming interface for
a) Cookie communication between the Web server and the
b) History application program.
c) Remainder a) Servlet
d) None of the mentioned b) Server
View Answer c) Program
351
d) Randomize Answer: c
View Answer Explanation: A surrogate key in a database is a
unique identifier for either an entity in the
Answer: a modeled world or an object in the database.
Explanation: Servlets are commonly used to
generate dynamic responses to HTTP requests. 6. A JSP is transformed into a(n):
a) Java applet
2. The doGet() method in the example extracts b) Java servlet
values of the parameter’s type and number by c) Either 1 or 2 above
using __________ d) Neither 1 nor 2 above
a) request.getParameter() View Answer
b) request.setParameter()
c) responce.getParameter() Answer: b
d) responce.getAttribute() Explanation: Servlets are commonly used to
View Answer generate dynamic responses to HTTP requests.
352
10. Where is metadata stored in MySQL? Answer: b
a) In the MySQL database metadata Explanation: The single application may have
b) In the MySQL database metasql several different versions of this layer,
c) In the MySQL database mysql corresponding to distinct kinds of interfaces such
d) None of the mentioned as Web browsers, and user interfaces of mobile
View Answer phones, which have much smaller screens.
4. Which layer deals which deals with user 8. Which among the following are the functions
interaction is called _____________ layer. that any system with a user interface must
a) Business logic provide?
b) Presentation a) Presentation
c) User interaction b) Dialogue
d) Data access c) All of the mentioned
View Answer
353
d) None of the mentioned 3. Which of the following object types below
View Answer cannot be replicated?
a) Data
Answer: a b) Trigger
Explanation: Presentation and Application are the c) View
functions that any system with a user interface d) Sequence
must provide. View Answer
354
7. Which of the following rule below are 1. ___________ is widely used today for
categories of an index? protecting data in transit in a variety of
a) Column and Functional applications such as data transfer on the Internet,
b) Multiple Column and functional and on cellular phone networks.
c) Column, Multiple Column and functional a) Encryption
d) None of the mentioned b) Data mining
View Answer c) Internet Security
d) Architectural security
Answer: a View Answer
Explanation: The CREATE INDEX statement is
used to create indexes in tables. Answer: a
Explanation: Encryption is also used to carry out
8. What is the purpose of SMON background other tasks, such as authentication.
process?
a) Performs crash recovery when a failed instance 2. In a database where the encryption is applied
starts up again the data is cannot be handled by the unauthorised
b) Performs recovery when a user process fails user without
c) Writes redo log entries to disk a) Encryption key
d) None of the mentioned b) Decryption key
View Answer c) Primary key
d) Authorised key
Answer: a View Answer
Explanation: SMON (System MONitor) is an
Oracle background process created when you start Answer: b
a database instance. Explanation: Even if the message is intercepted by
advertisement an enemy, the enemy, not knowing the key, will
not be able to decrypt and understand the
9. Which of the following queries are legal? message.
a) SELECT deptno, count(deptno) FROM emp
GROUP BY ename; 3. Which of the following is not a property of
b) SELECT deptno, count(deptno), job FROM good encryption technique?
emp GROUP BY deptno; a) Relatively simple for authorized users to
c) SELECT deptno, avg(sal) FROM emp; encrypt and decrypt data
d) SELECT deptno, avg(sal) FROM emp GROUP b) Decryption key is extremely difficult for an
BY deptno; intruder to determine
View Answer c) Encryption depends on a parameter of the
algorithm called the encryption key
Answer: d d) None of the mentioned
Explanation: For aggregate functions group by View Answer
clause is necessary.
Answer: d
10. Which of the following queries displays the Explanation: Here a, b and c are the properties
sum of all employee salaries for those employees have to be present in a good design of an
not making commission, for each job, including encryption technique.
only those sums greater than 2500?
a) select job, sum(sal) from emp where sum(sal) > 4. In which of the following encryption key is
2500 and comm is null; used to encrypt and decrypt the data?
b) select job, sum(sal) from emp where comm is a) Public key
null group by job having sum(sal) > 2500; b) Private key
c) select job, sum(sal) from emp where sum(sal) > c) Symmetric key
2500 and comm is null group by job; d) Asymmetric key
d) select job, sum(sal) from emp group by job View Answer
having sum(sal) > 2500 and comm is not null;
View Answer Answer: c
Explanation: In public-key (also known as
Answer: b asymmetric-key) encryption techniques, there are
Explanation: For aggregate functions group by two different keys, the public key and the private
clause is necessary. key, used to encrypt and decrypt the data.
355
5. Encryption of small values, such as identifiers for decryption which identifies the Private Key
or names, is made complicated by the possibility View Answer
of __________
a) Dictionary attacks Answer: b
b) Database attacks Explanation: An one-way function is a function
c) Minor attacks which a computer can calculate quickly, but
d) Random attacks whose reversal would last months or years. An
View Answer one-way function with back door can be reversed
with the help of a couple of additional information
Answer: a (the back door), but scarcely without this
Explanation: This happens when particularly if information. The information for the back door is
the encryption key is publicly available. contained in the private Key.
6. Which one of the following uses a 128bit round 9. Which is the largest disadvantage of symmetric
key to encrypt the data using XOR and use it in Encryption?
reverse to decrypt it? a) More complex and therefore more time-
a) Round key algorithm consuming calculations
b) Public key algorithm b) Problem of the secure transmission of the
c) Advanced Encryption Standard Secret Key
d) Asymmetric key algorithm c) Less secure encryption function
View Answer d) Isn’t used any more
View Answer
Answer: c
Explanation: The standard is based on the Answer: b
Rijndael algorithm. Explanation: As there is only one key in the
symmetrical encryption, this must be known by
7. Which of the following requires no password both sender and recipient and this key is sufficient
travel across the internet? to decrypt the secret message. Therefore it must
a) Readable system be exchanged between sender and receiver in such
b) Manipulation system a manner that an unauthorized person can in no
c) Challenge–response system case take possession of it.
d) Response system
View Answer 10. Which is the principle of the encryption using
a key?
Answer: c a) The key indicates which function is used for
Explanation: The database system sends a encryption. Thereby it is more difficult to decrypt
challenge string to the user. The user encrypts the an intercepted message as the function is
challenge string using a secret password as unknown
encryption key and then returns the result. The b) The key contains the secret function for
database system can verify the authenticity of the encryption including parameters. Only a password
user by decrypting the string with the same secret can activate the key
password and checking the result with the original c) All functions are public, only the key is secret.
challenge string. It contains the parameters used for the encryption
advertisement resp. decryption
d) The key prevents the user of having to reinstall
8. Assymmetric Encryption: Why can a message the software at each change in technology or in
encrypted with the Public Key only be decrypted the functions for encryption
with the receiver’s appropriate Private Key? View Answer
a) Not true, the message can also be decrypted
with the Public Key Answer: b
b) A so called “one way function with back door” Explanation: The encoding of a message is
is applied for the encryption calculated by an algorithm. If always the same
c) The Public Key contains a special function algorithm would be used, it would be easy to
which is used to encrypt the message and which crack intercepted messages. However, it isn’t
can only be reversed by the appropriate Private possible to invent a new algorithm whenever the
Key old one was cracked, therefore the possibility to
d) The encrypted message contains the function parameterize algorithms is needed and this is the
assignment of the key.
356
1. Which of the following is a physical storage a) Flash memory
media? b) Disk
a) Tape Storage c) Main memory
b) Optical Storage d) Secondary memory
c) Flash memory View Answer
d) All of the mentioned
View Answer Answer: a
Explanation: Flash memory is of two types –
Answer: d NAND and NOR.
Explanation: The storage media are classified by
the speed with which data can be accessed, by the 6. Which is the cheapest memory device in terms
cost per unit of data to buy the medium, and by of costs/ bit?
the medium’s reliability. a) Semiconductor memory
b) Magnetic disks
2. The _________ is the fastest and most costly c) Compact disks
form of storage, which is relatively small; its use d) Magnetic tapes
is managed by the computer system hardware. View Answer
a) Cache
b) Disk Answer: c
c) Main memory Explanation: Compact disk is used for easy
d) Flash memory storage at lower cost.
View Answer
7. The primary medium for the long-term online
Answer: a storage of data is the __________ where the entire
Explanation: Cache storage is easy to access database is stored on magnetic disk.
because it is closer to the processor. a) Semiconductor memory
b) Magnetic disks
3. Which of the following stores several gigabytes c) Compact disks
of data but usually lost when power failure? d) Magnetic tapes
a) Flash memory View Answer
b) Disk
c) Main memory Answer: b
d) Secondary memory Explanation: The system must move the data from
View Answer disk to main memory so that they can be accessed.
advertisement
Answer: c
Explanation: The contents of main memory are 8. Optical disk _______ systems contain a few
usually lost if a power failure or system crash drives and numerous disks that can be loaded into
occurs. one of the drives automatically (by a robot arm)
on demand.
4. The flash memory storage used are a) Tape Storage
a) NOR Flash b) Jukebox
b) OR Flash c) Flash memory
c) AND Flash d) All of the mentioned
d) All of the mentioned View Answer
View Answer
Answer: b
Answer: a Explanation: The most popular form of optical
Explanation: NAND flash has a much higher disks are CD and DVD.
storage capacity for a given cost, and is widely
used for data storage in devices such as cameras, 9. There are “record-once” versions of the
music players, and cell phones. compact disk and digital video disk, which can be
written only once; such disks are also called
5. __________ is increasingly being used in __________ disks.
server systems to improve performance by a) Write-once, read-many (WORM)
caching frequently used data, since it provides b) CD-R
faster access than disk, with larger storage c) DVD-W
capacity than main memory.
357
d) CD-ROM Answer: b
View Answer Explanation: Each side of a platter of a disk has a
read–write head that moves across the platter to
Answer: a access different tracks.
Explanation: There are also “multiple-write”
versions of compact disk (called CD-RW) and 4. The disk controller uses ________ at each
digital video disk (DVD-RW, DVD+RW, and sector to ensure that the data is not corrupted on
DVD-RAM), which can be written multiple times. data retrieval.
a) Checksum
10. Tape storage is referred to as __________ b) Unit drive
storage. c) Read disk
a) Direct-access d) Readsum
b) Random-access View Answer
c) Sequential-access
d) All of the mentioned Answer: a
View Answer Explanation: A disk controller interfaces between
the computer system and the actual hardware of
Answer: c the disk drive.
Explanation: Tape storage is used primarily for
backup and archival data. 5. _________ is the time from when a read or
write request is issued to when data transfer
1. In magnetic disk ________ stores information begins.
on a sector magnetically as reversals of the a) Access time
direction of magnetization of the magnetic b) Average seek time
material. c) Seek time
a) Read–write head d) Rotational latency time
b) Read-assemble head View Answer
c) Head–disk assemblies
d) Disk arm Answer: a
View Answer Explanation: To access (that is, to read or write)
data on a given sector of a disk, the arm first must
Answer: d move so that it is positioned over the correct
Explanation: Each side of a platter of a disk has a track, and then must wait for the sector to appear
read–write head that moves across the platter to under it as the disk rotates.
access different tracks.
6. The time for repositioning the arm is called the
2. A __________ is the smallest unit of ________ and it increases with the distance that
information that can be read from or written to the the arm must move.
disk. a) Access time
a) Track b) Average seek time
b) Spindle c) Seek time
c) Sector d) Rotational latency time
d) Platter View Answer
View Answer
Answer: c
Answer: c Explanation: Typical seek times range from 2 to
Explanation: The disk surface is logically divided 30 milliseconds, depending on how far the track is
into tracks, which are subdivided into sectors. from the initial arm position.
3. The disk platters mounted on a spindle and the 7. _________ is around one-half of the maximum
heads mounted on a disk arm are together known seek time.
as ___________ a) Access time
a) Read-disk assemblies b) Average seek time
b) Head–disk assemblies c) Seek time
c) Head-write assemblies d) Rotational latency time
d) Read-read assemblies View Answer
View Answer
358
Answer: b b) RAID level 2
Explanation: Average seek times currently range c) RAID level 0
between 4 and 10 milliseconds, depending on the d) RAID level 3
disk model. View Answer
advertisement
Answer: a
8. Once the head has reached the desired track, the Explanation: RAID level 1 refers to disk
time spent waiting for the sector to be accessed to mirroring with block striping.
appear under the head is called the
_______________ 2. Optical disk technology uses
a) Access time a) Helical scanning
b) Average seek time b) DAT
c) Seek time c) A laser beam
d) Rotational latency time d) RAID
View Answer View Answer
Answer: d Answer: d
Explanation: Rotational speeds of disks today Explanation: Redundant Array of Inexpensive
range from 5400 rotations per minute (90 Disks.
rotations per second) up to 15,000 rotations per
minute (250 rotations per second), or, 3. With multiple disks, we can improve the
equivalently, 4 milliseconds to 11.1 milliseconds transfer rate as well by ___________ data across
per rotation. multiple disks.
a) Striping
9. In Flash memory, the erase operation can be b) Dividing
performed on a number of pages, called an c) Mirroring
_______ at once, and takes about 1 to 2 d) Dividing
milliseconds. View Answer
a) Delete block
b) Erase block Answer: a
c) Flash block Explanation: Data striping consists of splitting the
d) Read block bits of each byte across multiple disks; such
View Answer striping is called bitlevel striping.
Answer: c Answer: a
Explanation: Hot Explanation: A unit of storage that can store one
swapping reduces the mean time to repair since or more records in a hash file organization is
replacement of a disk does not have to wait until a denoted as buckets.
time when the system can be shut down.
3. The file organization which allows us to read
9. ___________ is popular for applications such records that would satisfy the join condition by
as storage of log files in a database system since it using one block read is
offers the best write performance. a) Heap file organization
a) RAID level 1 b) Sequential file organization
b) RAID level 2 c) Clustering file organization
c) RAID level 0 d) Hash file organization
d) RAID level 3 View Answer
View Answer
360
Answer: c representing information using parent/child
Explanation: All systems in the cluster share a relationships.
common file structure via NFS, but not all disks advertisement
are mounted on all other systems.
8. Choose the RDBMS which supports full
4. What are the correct features of a distributed fledged client server application development
database? a) dBase V
a) Is always connected to the internet b) Oracle 7.1
b) Always requires more than three machines c) FoxPro 2.1
c) Users see the data in one global schema. d) Ingress
d) Have to specify the physical location of the View Answer
data when an update is done
View Answer Answer: b
Explanation: RDBMS is Relational Database
Answer: c Management System.
Explanation: Users see the data in one global
schema. 9. One approach to standardization storing of
data?
5. Each tablespace in an Oracle database consists a) MIS
of one or more files called b) Structured programming
a) Files c) CODASYL specification
b) name space d) None of the mentioned
c) datafiles View Answer
d) PFILE
View Answer Answer: c
Explanation: CODASYL is an acronym for
Answer: c “Conference on Data Systems Languages”.
Explanation: A data file is a computer file which
stores data to use by a computer application or 10. The highest level in the hierarchy of data
system. organization is called
a) Data bank
6. The management information system (MIS) b) Data base
structure with one main computer system is called c) Data file
a d) Data record
a) Hierarchical MIS structure View Answer
b) Distributed MIS structure
c) Centralized MIS structure Answer: b
d) Decentralized MIS structure Explanation: Database is a collection of all tables
View Answer which contains the data in form of fields.
Answer: c Answer: a
Explanation: Segment names are used in create Explanation: The wait–die scheme is a non-
table and create index commands to place tables preemptive technique.
or indexes on specific database devices. An extent
is a set of contiguous blocks allocated in a 5. When transaction Ti requests a data item
database. currently held by Tj, Ti is allowed to wait only if
it has a timestamp larger than that of Tj (that is, Ti
1. A system is in a ______ state if there exists a is younger than Tj ). Otherwise, Tj is rolled back
set of transactions such that every transaction in (Tj is wounded by Ti). This is
the set is waiting for another transaction in the set. a) Wait-die
a) Idle b) Wait-wound
b) Waiting c) Wound-wait
c) Deadlock d) Wait
d) Ready View Answer
View Answer
Answer: c
Answer: c Explanation: The wound–wait scheme is a
Explanation: When one data item is waiting for preemptive technique. It is a counterpart to the
another data item in a transaction then system is in wait–die scheme.
deadlock.
6. The situation where the lock waits only for a
2. The deadlock state can be changed back to specified amount of time for another lock to be
stable state by using _____________ statement. released is
a) Commit a) Lock timeout
b) Rollback b) Wait-wound
c) Savepoint c) Timeout
d) Deadlock d) Wait
View Answer View Answer
Answer: b Answer: a
Explanation: Rollback is used to rollback to the Explanation: The timeout scheme is particularly
point before lock is obtained. easy to implement, and works well if transactions
are short and if longwaits are likely to be due to
3. What are the ways of dealing with deadlock? deadlocks.
a) Deadlock prevention
b) Deadlock recovery 7. The deadlock in a set of a transaction can be
c) Deadlock detection determined by
d) All of the mentioned a) Read-only graph
View Answer b) Wait graph
c) Wait-for graph
Answer: d d) All of the mentioned
Explanation: Deadlock prevention is also called as View Answer
deadlock recovery. Prevention is commonly used
if the probability that the system would enter a Answer: a
deadlock state is relatively high; otherwise, Explanation: Each transaction involved in the
detection and recovery are more efficient. cycle is said to be deadlocked.
advertisement
4. When transaction Ti requests a data item
currently held by Tj, Ti is allowed to wait only if 8. A deadlock exists in the system if and only if
it has a timestamp smaller than that of Tj (that is, the wait-for graph contains a ___________
Ti is older than Tj). Otherwise, Ti is rolled back a) Cycle
(dies). This is b) Direction
364
c) Bi-direction
d) Rotation
View Answer
Answer: a
Explanation: Each transaction involved in the
cycle is said to be deadlocked.
Answer: d
Explanation: We should roll back those
transactions that will incur the minimum cost.
Answer: b
Explanation: In total rollback abort the transaction
and then restart it.
365