BSC Academy 1. em y IT Questions DOS floppy disk does not have ________ 1) a boot record 2) a file allocation table 4) virtual memory 5) None of the above 3) a root directory 2. The ________ component is used by the data analyst to create queries that access the database. 1) data store 2) query and reporting 3) ETL tools 4) data visualisation 5) None of these 3. The altering of data so that it is not usable unless the changes are undone is ________ 1) Ergonomics 2) Biometrics 3) Compression 4) Encryption 5) None of these Which of the following is a general-purpose programming language designed by Sun Microsystems and well suited for use on the web? 1) Java 2) Java Script 3) CSS 4) VBS Script 5) None of these 5. ________ are used to identify a user who returns to a website. 1) ASPs 2) Scripts 3) Cookies ad 4. 4) Plug-ins 5) None of These Programs that automatically submit your search request to several search engines simultaneously are called ________ 1) Hits 2) Webcrawlers 3) Spiders 4) Metasearch engines 5) None of these 7. If you wanted to locate the hardware address of a local device, which protocol would you use? 1) PING 2) ICMP 3) ARP 4) RARP 5) PONG 8. In Oracle, which is more appropriate to store a small list of values in a single column in each row in your address table? 1) Index 2) Nested table 3) Oracarray 4) Varray 5) Index 9. OLAP applications are widely used by ________ and it uses ________ scheme. 1) RDBMS, Bus 2) Java, Bus 3) Operating System, Star 4) Data mining techniques, star or multidimensional 5) None of these 10. ODBC is based on ________ 1) C++ language 4) .net language 11. Ac 6. 2) RDBMS 5) C language To discard all pending data changes use the ________ command. 1) LOCK 2) SAVEPOINT 3) ROLLBACK 3) Structured Query Language 4) COMMIT 5) None of these Round robin scheduling is essentially the preemptive version of ________ 1) Shortest job first 2) Shortest remaining 3) Longest time first 4) FIFO 5) None of these 13. The mechanism by which the data and functions are bound together within an object definition is called ________ 1) Abstraction 2) Polymorphism 3) Inheritance 4) Encaspsulation 5) None of these 14. The TRAP is one of the interrupts available in INTEL 8085.Which of the following statements is true of TRAP? 1) It is negative edge-triggered. 2) It is positive edge-triggered. 3) It is both edge-triggered and level-triggered. 4) It is level-triggered. 5) None of these 15. The ________ data mining technique derives rules from real-world case examples. 1) Waterfall Model 2) Spiral Model 3) Prototyping Model 4) Incremental Model BS C 12. 16. An oracle server index 1) Is a schema object 2) Is used to speed up the retrieval of rows by using a pointer 3) Is independent of the table it indexes 4) All of these 5) None of these IT Quesetions / 1 5) None of these BSC Academy Which of the following is not a context-free grammar component? 1) Terminal symbols 2) Non-terminal symbol 4) List 5) None of these 3) Productions em y 17. Which of the following is a phase(s) of RAD (Rapid Application Development) model? 1) Business modelling 2) Data modelling 3) Application generation 4) All of these 5) None of these 19. ________ allows a DFD (Data Flow Diagram) with transform flow characteristics to be mapped into a predefined template for program structure. 1) Transaction flow 2) Contributor 3) Transform mapping 4) Design evaluation 5) None of these 20. A combinational logic circuit which is used to send data coming from a single source to two or more separate destinations is called 1) Decoder 2) Encoder 3) Multiplexer 4) Demultiplexer 5) None of these 21. Which of the following is a Universal Gate? 1) AND 2) OR 22. 4) NAND 5) None of these ad 18. 3) EX – OR 4) 101000.0011 5) None of these 4) All of these 5) None of these Two’s complement of binary number 010111.1100 is 1) 101001.1100 2) 101000.0100 3) 010111.0011 In 8086, the overflow flag is set when 1) The sum is more than 16 bits 2) Signed numbers go out of their range after an arithmetic operation 3) Carry and sign flags are set 4) During subtraction 5) None of these 24. What does microprocessor speed depend on? 1) Clock 2) Data bus width 3) Address bus width 25. Ac 23. RSA algorithm 1) supports encryption and digital signature 3) encrypts the checksum 5) None of these 2) supports source authentication 4) All the above A special type gateway that can keep external users from accessing resources on the LAN users access the external info is called 1) Repeater 2) Firewall 3) Encryption 4) Hub 5) None of these 27. What is the name given to the exchange of control signals which is necessary for establishing a connection between a modem and a computer at one end of a line and another modem and computer at the other end? 1) Handshaking 2) Modem Options 3) Protocol 4) All of these 5) None of these 28. In SQL, which command is used to change data in a data table? 1) UPDATE 2) INSERT 3) BROWSE 4) APPEND 5) None of these In SQL, which of the following is not a data definition language command? 1) RENAME 2) REVOKE 3) GRANT 4) UPDATE 5) None of these Which command(s) is (are) used to redefine a column of the table in SQL ? 1) ALTER TABLE 2) DEFINE TABLE 3) MODIFY TABLE 4) All of these 5) None of these In a relational schema, each tuple is divided into fields called 1) Relations 2) Domains 3) Queries 5) None of these BS 29. C 26. 30. 31. 32. 33. 4) All of the these An indexing operation 1) Sorts a file using a single key 4) Both 1 and 3 2) Sorts a file using two keys 5) None of these 3) Establishes an index for a file Data security threats include 1) Hardware failure 4) All of these 2) Privacy invasion 5) None of these 3) Fraudulent manipulation of data 2 / IT Quesetions BSC Academy The language used in application programs to request data from the DBMS is referred to as the 1) DML 2) DDL 3) Query Language 4) DCL 5) None of these 35. A________ contains the smallest unit of meaningful data, so you might call it the basic building block for a data file. 1) File Structures 2) Records 3) Fields 4) Data base 5) None of these 36. A ________ means that one record in a particular record type is related to only one record of another record type. 1) One-to-one relationship 2) One-to-many relationship 3) Many-to-one relationship 4) Many-to-many relationship 5) None of these 37. Through linked list one can implement 1) Stack 2) Graph 38. em y 34. 3) Queue 4) All of these A heap allows a very efficient implementation of a 1) Double-ended queue 2) Priority queue 4) Trees 5) None of these 5) None of these 3) Stack Most database management systems allow you to have more than one key so that you can sort records in different ways. One of the keys is designated the ________ and must hold a unique value for each record. 1) Unique Key 2) Prime attribute 3) Index key 4) Primary Key 5) Null key 40. ________ is primarily used for mapping host names and email destinations to IP address but can also be used for other purposes 1) TCP (Transfer Control Protocol) 2) DNS (Domain Name System) 3) SHA (Secure Hash Algorithm) 4) Simple Network Management Protocol (SNMP) 5) None of these 41. Override is a method 1) For an operation that replaces an inherited method for the same operation 2) For a data that replaces an inherited method for the same operation 3) For an operation that takes arguments from library function 4) All of these 5) None of these 42. Local variables 1) Are created outside a block 3) Continue to exist when their block ends 5) None of these 44. Ac ________ is a virus that inserts itself into a system’s memory. infected file is executed. 1) Web scripting virus 2) Polymorphic Virus 4) Boot sector virus 5) Resident virus Then it takes a number of actions when an 3) Macro virus Which of the following TCP/IP protocol is used for remote terminal connection service? 1) Telnet 2) RARP 3) FTP 4) All the above 5) None of these The ________ model remains operative until the software is retired. 1) Waterfall model 2) Incremental model 3) Spiral model 5) Incremental model BS 45. 2) Are known only to that block 4) Are illegal in C++ C 43. ad 39. 4) Prototyping model 46. Data mining evolved as a mechanism to cater to the limitations of ________ systems to deal massive data sets with high dimensionality, new data type, multiple heterogeneous data resource etc. 1) OLTP 2) OLAP 3) DSS 4) DWH 5) None of these 47. An important application of cryptography used in computerized commercial and financial transactions: 1) Data mining 2) Data warehousing 3) Digital signature 4) Media convergence 5) None of these 48. Rows of a relation are called 1) Relation 2) Tuples 49. 3) Data structure The drawbacks of the binary tree sort are remedied by the 1) Linear sort 2) Quick sort 3) Heap Sort IT Quesetions / 3 4) An entity 5) None of these 4) Insertion sort 5) None of these BSC Academy 52. 53. 54. 55. 5) None of these Information is 1) Data 5) All of These 2) Processed data em y 51. Which layer of OSI determines the interface of the system with the user? 1) Network 2) Application 3) Data link 4) Session 3) Manipulated input Data by itself is not useful unless 1) It is massive 3) It is collected from diverse sources 5) None of These 4) Computer output 2) It is processed to obtain information 4) It is properly stated For taking decisions data must be 1) Very accurate 4) Collected from diverse sources 2) Massive 5) All of These Strategic information is needed for 1) Day-to-day operations 4) Short-range planning 2) Meeting government requirements 3) Long-range planning 5) Only 2 and 3 Strategic information is required by 1) Middle managers 2) Line managers 3) Top managers 3) Processed correctly 4) All workers ad 50. 5) Only 1 and 2 A ROLLBACK command in a transaction 1) Makes sure that all changes to the database are in effect. 2) Undoes all changes to the database resulting from the execution of the transaction 3) Does nothing 4) Undoes the effects of the last UPDATE command 5) Restores the current of the database to its state at the end of the previous day 57. ________ refers to the contracting of a specific business task to a third party service provider. 1) Insourcing 2) Outsourcing 3) Offshore Outsourcing 4) Cross-Functioning 5) Business Process Outsourcing 58. Operational information is needed for 1) Day-to-day operations 2) Meeting government requirements 3) Long-range planning 4) Short-range planning 5) All of these 59. In motorcar manufacturing the following type of information is strategic: 1) Decision on introducing a new model 2) Scheduling production 3) Assessing competitor car 4) Computing sales tax collected 5) Only 1 and 2 60. A computer-based information system is needed because (A) The size of organisations has become large and data is massive (B) Timely decisions are to be taken based on available data (C) Computers are available (D) It is difficult to get clerks to process data 1) Only A and C 2) Only A and B 3) Only A and D BS C Ac 56. 61. 62. 63. 64. 4) Only C and D 5) Only B and D Volume of strategic information is 1) Condensed 2) Detailed 3) Summarised 4) Irrelevant 5) Only 1 and 2 Operational information is 1) Haphazard 2) Well organized 3) Unstructured 4) Partly structured 5) Only 1 and 2 The quality of information which does not hide any unpleasant information is known as 1) Complete 2) Trustworthy 3) Relevant 4) None of the above 5) All of the above Every record stored in a Master file has a key field because 1) it is the most important field 2) it acts as a unique identification of record 3) it is the key to the database 4) it is a very concise field 5) None of These 4 / IT Quesetions BSC Academy 68. 69. 70. 71. Data rejected by edit program are 1) corrected and re-entered 4) ignored during processing 75. 3) Only B and D Batch processing is used when (A) response time should be short (B) data processing is to be carried out at periodic intervals (C) transactions are in batches (D) transactions do not occur periodically 1) Only A and B 2) Only A, C and D 3) Only B and C 3) it can handle random queries 4) Only C and D 5) Only A and D 4) Only A, B and C 5) Only A and D A management information system is one which 1) is required by all managers of an organisation 2) processes data to yield information of value in tactical management 3) provides operational information 4) allows better management of organisations 5) Only 1 and 2 C 2) analysing past decision made by managers 4) retrieving archival data Data mining requires 1) large quantities of operational data stored over a period of time 2) lots of tactical data 3) several tape drives to store archival data 4) large mainframe computers 5) All of these BS 74. 3) collected for later use Online transaction processing is used because 1) it is efficient 2) disk is used for storing files 4) transactions occur in batches 5) None of the above 72. Data mining is used to aid in 1) operational management 3) detecting patterns in operational data 5) Only 2 and 3 73. 2) format correctly input data 4) expedite retrieving input data 2) removed from processing 5) Only 1 and 3 Off-line data entry is preferable when (A) data should be entered without error (B) the volume of data to be entered is large (C) the volume of data to be entered is small (D) data is to be processed periodically 1) Only A and B 2) Only B and C 5) None Of These em y 67. Edit program is required to 1) authenticate data entered by an operator 3) detect errors in input data 5) All of the above 4) CD- ROM ad 66. The primary storage medium for storing archival data is 1) floppy disk 2) magnetic disk 3) magnetic tape Ac 65. Data mining cannot be done if 1) operational data has not been archived 3) the organization is large 5) All the above 2) earlier management decisions are not available 4) all processing had been only batch processing Decision support systems are essential for 1) Day-to-day operations of an organisation 3) Top-level strategic decision making 5) Only 3 and 4 2) Providing statutory information 4) Ensuring that organisations are profitable IT Quesetions / 5 BSC Academy Which of the following IEEE standards deal(s) with LAN and MAN (metropolitan area network)? 1) 801 2) 803 3) 802 4) 800 5) Only 1 and 2 77. Firewalls protect against 1) unauthorised attacks 4) data-driven attacks 81. 82. 83. 84. 85. 86. 87. 88. 89. 90. Two binary digits can be added using the logical circuit 1) Half adder 2) Full adder 3) Serial adder Full form of BIOS: 1) Better input output services 4) basic input/output system 2) basic inner outer services 5) None of The Above 5) Only 1 and 2 4) Diskette 5) Only 1 and 2 4) Parallel adder 5) None of the Above 3) basic input output services The device that connects inputs to outputs: 1) RAM 2) crossbar 3) crossword 4) modem 5) Only 1 and 2 Data entered into the computer is called 1) Input 2) Algorithm 3) Flowchart 4) Output 5) All of These The process of connecting to the internet account is called 1) SIGN IN 2) LOG IN 3) LOG OUT 4) SIGN OUT 5) None of the above How many values can be represented by a single byte? 1) 4 2) 16 3) 64 4) 256 5) None of the above Most data communications involving telegraph lines use 1) simplex lines 2) wideband channel 3) narrowband channel 4) dialled service 5) None of these Which scheme is used for mapping host names and email destinations to IP addresses? 1) DNS 2) TCP/IP 3) TELENET 4) RARP 5) None of These Broad band ISDN consists of 1) Physical layer 3) ATM adaptation layer 5) All of the above 2) Asynchronous Transfer Mode (ATM) layer 4) Only 1 and 2 The ________ component is not present in every router. 1) POST 2) DRAM 3) Mini-IOS 4) Bootstrap The linker produces a ________ which contains binary codes for all compound modules. 1) Bit file 2) Load file 3) Link file 4) Object Program 92. Which of the following is the easiest software development process model? 1) Prototyping 2) Waterfall model 3) Spiral model 4) Interactive enhancement 5) None of the above 93. C++ was developed by 1) Bjarne Stroustrup 2) Dennis Ritchie 94. 5) None of these 5) None of These In C++ we can use the same function name to create functions that perform a variety of different tasks.This is known as 1) Inheritance 2) Global function 3) Function overloading 4) Only 1 and 2 5) All of the above BS 91. During cutting and pasting, the item cut is temporarily stored in 1) Hard drive 2) Clipboard 3) ROM 4) pen ad 80. Which of the following is not related to computer? 1) mouse 2) screen 3) bit Ac 79. 3) virus attacks C 78. 2) fire attacks 5) Only 1 and 2 em y 76. 3) Tannenbaum 4) Milan Melkovinec 5) None of These If the disk head is located initially at 32, find the number of disk moves required with FCFS if the disk queue of I/O blocks requests are 98, 37, 14, 124, 65, 67. 1) 324 2) 321 3) 310 4) 315 5) 320 6 / IT Quesetions BSC Academy The action of parsing the source program into proper syntactic classes is known as 1) Lexical analysis 2) Syntax Analysis 3) General Syntax Analysis 4) Interpretation Analysis 5) None of the above 96. Resolution of externally defined symbols is performed by 1) Loader 2) Linker 3) Compiler 97. em y 95. Which language is best used for real time system? 1) Java 2) C 3) Assembly 4) Assembler 5) None of These 4) C++ 5) None of these 98. In the UNIX systems the user can change the access rights of the file to different users by using 1) Tail 2) PID 3) Chmod 4) Head 5) None of These 99. Which of the following Unix commands is used to create empty files? 1) Vi 2) Cat 3) Touch 4) Pico 100. Both Go-Back-N and Selective-Repeat Protocols use a 1) sliding frame 2) sliding window 3) sliding data 4) sliding packet 5) None of these 5) None of these ad 101. Which of the memories has the shortest access time? 1) Cache Memory 2) RAM 3) Magnetic Bubble Memory 4) Magnetic Core Memory 5) All the above have equal access time. 102. The IEEE 802.6 standard describes a ________ standard called Distributed Queue Dual Bus (DQDB). 1) WAN 2) MAN 3) LAN 4) Internet 5) None of the above 3) Blank List 4) Both 1 and 2 5) None of the above 104. ________ uses thin coaxial cable. 1) 10Base2 2) 10Base5 3) 10Base-T 4) 10Base-F 5) None of these 105. The input of Lex is 1) Statement 4) ASCII Code Ac 103. The list with no nodes on it is called 1) Null List 2) Empty List 2) Numeric Data 5) None of these 3) Set of regular expressions 106. Which of the following is not a logical database structure? 1) Relational 2) Network 3) Chain 4) Tree 5) None Of These 107. CIDR (Classless Inter Domain Routing) is most often used in 1) class C Networks 2) class A Networks 3) class B Networks 4) Only 1 and 2 5) None of the above 108. Which of the following operators in ‘C’ does not associate from the right? 1) , 2) = 3) + 4) ++ 5) None of the above C 109. Which language has recently become the de facto standard for interfacing application programs with relational database system? 1) SQL 2) Oracle 3) 4 GL 4) Database 5) None of the above 110. Sockets are used in 1) Data link Layer 2) Physical Layer 3) Transport Layer 4) Network Layer BS 111. Lexical Analyzer transforms an input stream into 1) Regular expression 2) Binary 3) Symbols 5) None of the above 4) Sequence of tokens 5) None of these 112. In which manner should we traverse a binary search tree so that elements are visited in ascending order? 1) Preorder 2) Inorder 3) Postorder 4) Graph 5) None of These 113. 253.45.67.9 is a class ________ address. 1) D 2) A 114. Semantic errors can be detected 1) At compile time only 3) At run time only 5) None of these 3) E 4) C 5) None of These 2) Both at compile time and at run time 4) All of the above IT Quesetions / 7 BSC Academy em y 115. Which of the following communication modes supports two-way traffic but in only one direction at a time? 1) Duplex 2) Simplex 3) Three- Quarters Duplex 4) Half-Duplex 5) All of the above 116. In a PC-to-telephone hookup for long-distance communication, modem is connected between the telephone line and 1) Synchronous Port 2) PC 3) Cross-Over Cable 4) Asynchronous Port 5) None of These 117. In compilers, syntax analysis is done by 1) Scanner 2) Parser 3) Code generator 4) Lexical analyser 118. RAD (Rapid Application Development) is not appropriate when 1) Technical risks are high 2) Findings are already done 4) Only 1 and 2 5) None of These 119. In queues, the items are deleted at one end called 1) Front 2) Top 3) Base 5) None of these 3) Testing is not needed 4) Rear 5) None of These ad 120. If a memory page containing a heavily used variable that was initialised very early and is in constant use is removed, then the page replacement algorithm used is 1) FIFO 2) LFU 3) LRU 4) All of These 5) None of These 121. When you connect to an online information service you are asked to provide some kind of identification such as your name, an account number and a password. What is the name given to this brief dialogue between you and information system? 1) Security Procedure 2) Log-on Procedure 3) Safeguard Procedure 4) Identification Procedure 5) None of These Ac 122. Which of these determines authorised sign in an EDI (Electronic Data Interchange) transaction? 1) Masking 2) Spoofing 3) Digital Signature 4) Privacy Key Cryptosystems 5) None of these 123. ‘C’ is a ________- generation language. 1) 3rd 2) 4th 3) 5th 124. Which of the following usually creates bad sector on hard disk? 1) Trojan 2) Worm 3) Stealth Virus 4) 2nd 5) None of These 4) All of these 5) None of these C 125. When an organisation gives contract for development of software, it has to give data to the service provider. In such cases, the ownership of data should be 1) Shared by both parties 2) Transferred to the service provider 3) With the client organisation that outsources service 4) Not transferred 5) None of These 126. ________ can’t be used for source of data automation. 1) OCR 2) UPC 3) POS Terminal 4) Keyboard 5) None of these BS 127. Switched mode power supply 1) Converts DC to AC 2) Converts raw input power to controlled voltage and current 3) Enhances output of a circuit 4) Switches to and fro between high and low power fluctuations 5) None of these 128. Which of the following is false about OS? 1) Acts as command processor 2) Acts as compiler 4) All are true 5) None of these 129. Which of the following is incorrect? 1) LAN is faster than MAN. 3) Clients can store information. 5) None of these 3) Acts as manager 2) Servers are powerful PCs. 4) Peer-to-peer networks have high security. 8 / IT Quesetions BSC Academy 131. Disk Scanners are 1) Anti-virus protection systems 4) All of these 2) 8086’s supplementary IC 5) None of the above 132. Array is a set of ________ objects. 1) Different types of 2) Unique 133. The operating system is also 1) Control System 4) Boot Sector 3) Unwanted 3) Aftereffects of virus 4) Same type of 2) Special System 5) None of These 5) All of these em y 130. Which segment identifies the kind of business documents in an EDI transmission? 1) ISA 2) GS 3) ST 4) SE 5) None of These 3) Administrator Division 134. Which of the following identification techniques provides the best means of user authentication? 1) What the user knows 2) What the user is 3) What the user has 4) What is user has and what the user knows 5) None of These 135. The earliest approach that was used for software development was 1) Incremental development model 2) Waterfall model 4) Rapid prototyping model 5) None of These ad 136. To make a program safe we should take care of 1) Strong authentication and access controls 3) Error-checking controls 5) None of these 3) Spiral development model 2) Doing risk analysis 4) All of these Ac 137. If the network of the company is to be protected from remote access that may damage company’s reputation due to misuse of information, then security policy should include 1) Only the employer 2) All the employees 3) Contractors 4) All the above 5) None of these 2) Part of Internet 4) Only 1 and 2 139. What is a non-dedicated server? 1) A workstation that can double up as a server 3) A computer reserved for special task 5) None of the above 2) A computer reserved for a special task 4) Only 1 and 2 C 138. TCP/IP protocol stack is 1) A family of protocols that connect to PCs 3) A combination of TCP and IP protocols 5) All of these 140. The process of organising the memory into two banks to allow 8- and 16-bit data operation is called? 1) Indexed mapping 2) Bank switching 3) Two-way memory interleaving 4) Memory segmentation 5) None of these BS 141. Which of the following is a layer of object-oriented design pyramid? 1) Message Layer 2) Subsystem layer 4) All of the above 5) None of the above 3) Class and Object Layer 142. The OSPF was created to overcome the drawbacks that ________ faced. 1) VLSM 2) IGRP 3) EIRP 4) RIP 143. FDDI is 1) Star Network 4) Bus-Based Network 2) Mesh Network 5) All of the above 3) Ring Network 144. Fragment Free Switches check ________ bytes of data. 1) 64 2) 24 3) 16 IT Quesetions 5) None of These 4) 4 / 9 5) 9 BSC Academy 2) Lower power consumption and better noise margins 4) Higher power consumption with high fan-out 146. RISC processor has 1) All operations done within the register and CPU 3) Single-cycle instruction execution 5) All of these 2) Relatively few instructions and addressing modes 4) Only 1 and 2 em y 145. The main advantages of CMOS as compared to TTL: 1) Lower power consumption with low fan-out 3) Higher speed operation with low power consumption 5) None of these 147. A loading scheme in which loading and linking of external references are postponed until execution time: 1) Dynamic loading 2) Direct linking loader 3) Relocating loader 4) Dynamic linking 5) None of These 148. Backtracking problem is seen in 1) LR Parser 4) None of these 2) Predictive Parser 5) All of the above 3) Recursive Descent Parser ad 149. Which of the following filename extension suggests that the file is a backup copy of another file? 1) BAK 2) TXT 3) BAS 4) COM 5) None of These 150. Connected graphs without circuits is called a 1) Hamiltonian graph 2) Euler graph 4) Tree 5) All of these are types of graph 3) Path 4) Clock replacement 5) None of the above 152. The graph K (3, 4), a complete bipartite graph, has 1) 4 edges 2) 8 edges 3) 10 edges 4) 12 edges 5) 3 edges 153. The database schema is written in 1) DML 2) HLL 4) DCL 5) None of these Ac 151. What replacement policy is used by Windows NT? 1) LRU 2) NFU 3) FIFO 3) DDL 154. What is the average waiting time (in minutes) in FCFS of a given process p1, p2, p3, p4 if the execution time are 5, 10, 8, 3 minutes and turnaround time are 5, 15, 23, 26 minutes? 1) 10 2) 10.75 3) 12.75 4) 12 5) 13 155. In an architecture of a database system external level is the 1) logical level 2) physical level 3) conceptual level 4) view level 5) None of these C 156. In a circular linked list 1) Components are all linked together in some sequential manner 2) There is no beginning and no end 3) Components are arranged hierarchically 4) Forward and backward transversal within the list is permitted 5) None of these 5) None of these 158. A technique for direct searching is 1) binary search 2) hashing 5) None of these BS 157. The statement in SQL which allows to change the definition of a table is 1) Alter 2) Create 3) Update 4) Select 3) tree search 4) linear Search 159. Maximum number of nodes in B-tree at depth h and order t (root of depth 0) is given by 1) t(h + 1) 2) 2t(h – 1) 3) t(h – 1) 4) 2t(h + 1) 5) None of these 160. Which of the following can be a sequence of nodes examined in a binary search tree while searching for key 98? 1) 100, 50, 75, 60, 98 2) 100, 120, 90, 95, 98 3) 200, 70, 100, 95, 98 4) 75, 150, 90, 80, 98 5) None of these 161. What protocol is used between e-mail servers? 1) SMTP 2) FTP 3) SNMP 10 / IT Quesetions 4) TCP 5) None of these BSC Academy 162. The way a card game player arranges his cards as he picks them up one by one, is an example of 1) Selection Sort 2) Bubble Sort 3) Insertion sort 4) Merge sort 5) None of these em y 163. Which phase is not available in software life cycle? 1) Design 2) Testing 3) Coding 4) Abstraction 5) Maintenance 164. Which type of error detection uses binary division? 1) Parity check 3) Checksum Checking 5) None of these 2) Longitudinal Redundancy checking (LRC) 4) Cyclic Redundancy Checking (CRC) 165. Basis path testing is 1) Both black and white box testing method 3) Unique testing method 5) None of these 2) White box testing method 4) Black box testing method 166. If you want to tell the database management system that a specific attribute contained numbers only, what will you need to set? 1) Data type 2) Data category 3) Data dictionary 4) Data definition 5) Data Integrity ad 167. When you link one database table to another database table, what are you creating? 1) Connectivity 2) Primary Link 3) Relationships 4) Referential integrity 5) Foreign key 168. The process known as ________ is used by large retailers to study trends. 1) POS 2) Data selection 3) Data mining 4) Data conversion 5) None of these 169. Accessing records from a file directly without searching from the beginning of the file is called 1) Time sharing 2) Random 3) Direct access 4) Access time 5) None of these Ac 170. Banker’s algorithm for resource allocation deals with 1) deadlock preventation 2) deadlock avoidance 4) mutual exclusion 5) None of these 171. Which of the following performs modulation and demodulation? 1) Modem 2) Satellite 3) Coaxial Cable 3) deadlock recovery 4) Optical fiber 5) Router 172. In TCP/IP protocol, checksum field contains ________-bit value which is used for ________. 1) 32, deadlock avoidance 2) 48, error detection 3) 16, error detection 4) 16, deadlock avoidance 5) None of these 173. Granting an outside organisation access to Internet web pages is often implemented using a(n) 1) Extranet 2) Intranet 3) Internet 4) Hacker 5) None of these C 174. What is the advantage of packet switching over message switching? 1) The first packet of multipacket message can be forwarded before the second one has fully arrived. 2) reduces delay and improves throughput 3) advance setup not required 4) All the above 5) None of these 4) vacuum tubes 5) None of these 176. Generalisation is a ________ process. 1) top-down 2) bottom-up 4) vertical 5) None of these BS 175. The third-generation computers were based on 1) transistors 2) valves 3) ICs 3) Both 1 and 2 177. Spooling is most beneficial in a multiprogramming environment where 1) most jobs are I/O-bound 2) most jobs are CPU-bound 3) jobs are evenly divided as I/O-bound and CPU-bound 4) there is limited primary memory and there is a need for secondary memory 5) None of these IT Quesetions / 11 BSC Academy 178. A flip-flop can store 1) Two bits of data 4) Any number of bits of data 3) Three bits of data em y 2) One bit of data 5) All the above 179. ________ command lists directory content of files and directories. 1) cat 2) cp 3) ls 4) mkdir 5) None of these 180. Which of the following is true about the data warehouse environment architecture? 1) It contains a data warehouse methodology, analysis design, construction and administration. 2) It increases processing power and sophistication of analytical tools and techniques that have resulted in the development of data warehouses. 3) It provides storage, functionality, and responsiveness to queries beyond the capabilities of transaction-oriented databases. 4) All the above 5) None of these 181. Altering of data so that it is not usable unless the changes are undone is called 1) Encryption 2) Compression 3) Biometrics 4) Ergonomics 5) None of these ad 182. A ________ main purpose is to prohibit unauthorised access to your computer via the Internet. 1) popup blocker’s 2) firewall’s 3) spyware blocker’s 4) spam assassin’s 5) None of these 183. When one computer provides services to another computer, the environment is a(n) ________ infrastructure. 1) client/server 2) dependent 3) independent 4) reliant 5) None of these Ac 184. Object oriented programming relies on three basic concepts. These are 1) data abstraction, inheritance and array 2) data abstraction, inheritance and polymorphism 3) encapsulation, inheritance and polymorphism 4) inheritance, I/O, class 5) None of these 185. A ________ can check the MAC addresses contained in the frame. 1) bridge 2) repeater 3) passive hub 4) router 5) All the above 186. Each station on an Ethernet network has a unique ________ address imprinted on its network interface card (NIC). 1) 5-byte 2) 32-bit 3) 64-bit 4) 48-bit 5) None of these 187. Decryption and encryption of data are the responsibilities of the ________ layer. 1) Physical 2) Data link 3) Presentation 4) Session 5) Application 188. The communication mode that supports data in both the directions at the same time is called 1) Half duplex 2) Simplex 3) Full duplex 4) Multiplex 5) None of these C 189. The functions AVG, COUNT, MAX and MIN are 1) supported only by SQL 2) supported only by QBE 4) supported by ORACLE 5) supported by none 3) supported by both SQL and QBE 5) None of these 191. A full binary tree with n leaves contains 1) 2n nodes 2) log2n nodes 5) None of these BS 190. Multivalued dependency among attributes is checked at which level? 1) 2NF 2) 3NF 3) 4NF 4) 5NF 3) 2n – 1 nodes 192. The postfix form of an expression (A+B)*(C*D-E)*F/G is 1) AB+CD*E-FG/** 2) AB+CD*E-F**G/ 4) AB+CDE*-*F*G/ 5) None of these 193. Slotted ALOHA 1) Divides time into discrete intervals 3) Is used for data transfer 5) None of these 4) n nodes 3) AB+CD*E-*F*G/ 2) Requires global time synchronisation 4) All the above 12 / IT Quesetions BSC Academy 194. What type of technology allows you to use your finger, eye, or voice print to secure your information resources? 1) RFID 2) Caves 3) Biometrics 4) Haptics 5) None of these em y 195. A ________ can be used as a connecting device between two internetworks that use different models. 1) repeater 2) router 3) bridge 4) gateway 5) hub 196. IP address has been classified into five classes A, B, C, D and E. 1) 0.0.0.0 to 126.255.255.255 2) 128.1.0.1 to 191.255.255.255 4) 192.0.1.1 to 223.255.255.255 5) None of these What is address range of class B? 3) 244.0.0.0 to 239.255.255.255 197. Relation in the relational database model is defined as the set of ________ that have the same attributes. 1) objects 2) relations 3) tuples 4) attributes 5) None of these 198. If alpha is a set of attributes and beta is a subset of alpha, then alpha holds beta. In Armstrong’s Axioms, this is known as 1) augmentation rule 2) reflexivity rule 3) transitivity rule 4) passivity rule 5) None of these 199. In an E-R diagram, total participation is represented by 1) circle 2) single line 3) double lines 4) concentric circles ad 200. If a key attribute of a relation is referred in another relation, it is called 1) domain key 2) referential key 3) relation key 4) foreign key 5) None of these 5) None of these Answers 5. 3 106. 3 107. 1 108. 1 109. 1 110. 5; Session Layer 111. 4 112. 2 113. 3 114. 1 116. 4 117. 2 118. 1 119. 1 121. 2 122. 3 123. 1 124. 5 126. 4 127. 2 128. 2 129. 4 131. 1 132. 4 133. 3 134. 2 136. 1 137. 4 138. 1 139. 1 141. 4 142. 4; Routing Information protocol 143. 3 144. 1 145. 2 146. 5 147. 4 148. 3 149. 1 151. 3 152. 4 153. 1 154. 4 156. 2 157. 3 158. 2 159. 3 161. 1 162. 3 163. 4 164. 4 166. 1 167. 1 168. 3 169. 3 171. 1 172. 3 173. 1 174. 2 176. 2 177. 3 178. 2 179. 3 181. 1 182. 2 183. 1 184. 3 186. 4 187. 3 188. 3 189. 3 191. 3 192. 4 193. 4 194. 3 196. 2 197. 3 198. 2 199. 3 BS C Ac 1. 4 2. 2 3. 4 4. 1 6. 4 7. 3; Address Resolution Protocol 8. 4 9. 4 10. 3 11. 3 12. 4 13. 4 14. 3 16. 3 17. 4 18. 4 19. 3 21. 4 22. 2 23. 2 24. 2 26. 2 27. 1 28. 1 29. 4 31. 2 32. 3 33. 2 34. 1 36. 1 37. 4 38. 2 39. 4 41. 1 42. 2 43. 5 44. 1 46. 1 47. 3 48. 2 49. 3 51. 2 52. 2 53. 3 54. 3 56. 2 57. 5 58. 1 59. 1 61. 1 62. 2 63. 2 64. 2 66. 3 67. 1 68. 3 69. 3 71. 2 72. 3 73. 1 74. 1 76. 3 77. 1 78. 4 79. 2 81. 4 82. 2 83. 1 84. 2 86. 3 87. 1 88. 5 89. 2 91. 3 92. 2 93. 1 94. 2 96. 2 97. 1 98. 3 99. 3 101. 1 102. 2 103. 4 104. 1 15. 2 20. 4 25. 4 30. 1 35. 3 40. 2 45. 3 50. 2 55. 3 60. 2 65. 3 70. 3 75. 3 80. 1 85. 4 90. 3 95. 1 100. 2 105. 3 IT Quesetions / 13 115. 4 120. 1 125. 3 130. 2 135. 2 140. 3 150. 4 155. 2 160. 5 165. 2 170. 4 175. 3 180. 4 185. 1 190. 2 195. 4 200. 4
© Copyright 2024