IT Question for SO Exams

BSC Academy
1.
em
y
IT Questions
DOS floppy disk does not have ________
1) a boot record
2) a file allocation table
4) virtual memory
5) None of the above
3) a root directory
2.
The ________ component is used by the data analyst to create queries that access the database.
1) data store
2) query and reporting
3) ETL tools
4) data visualisation
5) None of these
3.
The altering of data so that it is not usable unless the changes are undone is ________
1) Ergonomics
2) Biometrics
3) Compression
4) Encryption
5) None of these
Which of the following is a general-purpose programming language designed by Sun Microsystems and well suited for
use on the web?
1) Java
2) Java Script
3) CSS
4) VBS Script
5) None of these
5.
________ are used to identify a user who returns to a website.
1) ASPs
2) Scripts
3) Cookies
ad
4.
4) Plug-ins
5) None of These
Programs that automatically submit your search request to several search engines simultaneously are called ________
1) Hits
2) Webcrawlers
3) Spiders
4) Metasearch engines 5) None of these
7.
If you wanted to locate the hardware address of a local device, which protocol would you use?
1) PING
2) ICMP
3) ARP
4) RARP
5) PONG
8.
In Oracle, which is more appropriate to store a small list of values in a single column in each row in your address table?
1) Index
2) Nested table
3) Oracarray
4) Varray
5) Index
9.
OLAP applications are widely used by ________ and it uses ________ scheme.
1) RDBMS, Bus
2) Java, Bus
3) Operating System, Star
4) Data mining techniques, star or multidimensional
5) None of these
10.
ODBC is based on ________
1) C++ language
4) .net language
11.
Ac
6.
2) RDBMS
5) C language
To discard all pending data changes use the ________ command.
1) LOCK
2) SAVEPOINT
3) ROLLBACK
3) Structured Query Language
4) COMMIT
5) None of these
Round robin scheduling is essentially the preemptive version of ________
1) Shortest job first
2) Shortest remaining
3) Longest time first
4) FIFO
5) None of these
13.
The mechanism by which the data and functions are bound together within an object definition is called ________
1) Abstraction
2) Polymorphism
3) Inheritance
4) Encaspsulation
5) None of these
14.
The TRAP is one of the interrupts available in INTEL 8085.Which of the following statements is true of TRAP?
1) It is negative edge-triggered.
2) It is positive edge-triggered.
3) It is both edge-triggered and level-triggered.
4) It is level-triggered.
5) None of these
15.
The ________ data mining technique derives rules from real-world case examples.
1) Waterfall Model
2) Spiral Model
3) Prototyping Model 4) Incremental Model
BS
C
12.
16.
An oracle server index
1) Is a schema object
2) Is used to speed up the retrieval of rows by using a pointer
3) Is independent of the table it indexes
4) All of these
5) None of these
IT Quesetions
/
1
5) None of these
BSC Academy
Which of the following is not a context-free grammar component?
1) Terminal symbols
2) Non-terminal symbol
4) List
5) None of these
3) Productions
em
y
17.
Which of the following is a phase(s) of RAD (Rapid Application Development) model?
1) Business modelling
2) Data modelling
3) Application generation
4) All of these
5) None of these
19.
________ allows a DFD (Data Flow Diagram) with transform flow characteristics to be mapped into a predefined
template for program structure.
1) Transaction flow 2) Contributor
3) Transform mapping 4) Design evaluation 5) None of these
20.
A combinational logic circuit which is used to send data coming from a single source to two or more separate destinations
is called
1) Decoder
2) Encoder
3) Multiplexer
4) Demultiplexer
5) None of these
21.
Which of the following is a Universal Gate?
1) AND
2) OR
22.
4) NAND
5) None of these
ad
18.
3) EX – OR
4) 101000.0011
5) None of these
4) All of these
5) None of these
Two’s complement of binary number 010111.1100 is
1) 101001.1100
2) 101000.0100
3) 010111.0011
In 8086, the overflow flag is set when
1) The sum is more than 16 bits
2) Signed numbers go out of their range after an arithmetic operation
3) Carry and sign flags are set
4) During subtraction
5) None of these
24.
What does microprocessor speed depend on?
1) Clock
2) Data bus width
3) Address bus width
25.
Ac
23.
RSA algorithm
1) supports encryption and digital signature
3) encrypts the checksum
5) None of these
2) supports source authentication
4) All the above
A special type gateway that can keep external users from accessing resources on the LAN users access the external info
is called
1) Repeater
2) Firewall
3) Encryption
4) Hub
5) None of these
27.
What is the name given to the exchange of control signals which is necessary for establishing a connection between a
modem and a computer at one end of a line and another modem and computer at the other end?
1) Handshaking
2) Modem Options
3) Protocol
4) All of these
5) None of these
28.
In SQL, which command is used to change data in a data table?
1) UPDATE
2) INSERT
3) BROWSE
4) APPEND
5) None of these
In SQL, which of the following is not a data definition language command?
1) RENAME
2) REVOKE
3) GRANT
4) UPDATE
5) None of these
Which command(s) is (are) used to redefine a column of the table in SQL ?
1) ALTER TABLE
2) DEFINE TABLE
3) MODIFY TABLE
4) All of these
5) None of these
In a relational schema, each tuple is divided into fields called
1) Relations
2) Domains
3) Queries
5) None of these
BS
29.
C
26.
30.
31.
32.
33.
4) All of the these
An indexing operation
1) Sorts a file using a single key
4) Both 1 and 3
2) Sorts a file using two keys
5) None of these
3) Establishes an index for a file
Data security threats include
1) Hardware failure
4) All of these
2) Privacy invasion
5) None of these
3) Fraudulent manipulation of data
2
/
IT Quesetions
BSC Academy
The language used in application programs to request data from the DBMS is referred to as the
1) DML
2) DDL
3) Query Language
4) DCL
5) None of these
35.
A________ contains the smallest unit of meaningful data, so you might call it the basic building block for a data file.
1) File Structures
2) Records
3) Fields
4) Data base
5) None of these
36.
A ________ means that one record in a particular record type is related to only one record of another record type.
1) One-to-one relationship
2) One-to-many relationship
3) Many-to-one relationship
4) Many-to-many relationship
5) None of these
37.
Through linked list one can implement
1) Stack
2) Graph
38.
em
y
34.
3) Queue
4) All of these
A heap allows a very efficient implementation of a
1) Double-ended queue
2) Priority queue
4) Trees
5) None of these
5) None of these
3) Stack
Most database management systems allow you to have more than one key so that you can sort records in different ways.
One of the keys is designated the ________ and must hold a unique value for each record.
1) Unique Key
2) Prime attribute
3) Index key
4) Primary Key
5) Null key
40.
________ is primarily used for mapping host names and email destinations to IP address but can also be used for other
purposes
1) TCP (Transfer Control Protocol)
2) DNS (Domain Name System)
3) SHA (Secure Hash Algorithm)
4) Simple Network Management Protocol (SNMP)
5) None of these
41.
Override is a method
1) For an operation that replaces an inherited method for the same operation
2) For a data that replaces an inherited method for the same operation
3) For an operation that takes arguments from library function
4) All of these
5) None of these
42.
Local variables
1) Are created outside a block
3) Continue to exist when their block ends
5) None of these
44.
Ac
________ is a virus that inserts itself into a system’s memory.
infected file is executed.
1) Web scripting virus
2) Polymorphic Virus
4) Boot sector virus
5) Resident virus
Then it takes a number of actions when an
3) Macro virus
Which of the following TCP/IP protocol is used for remote terminal connection service?
1) Telnet
2) RARP
3) FTP
4) All the above
5) None of these
The ________ model remains operative until the software is retired.
1) Waterfall model
2) Incremental model 3) Spiral model
5) Incremental model
BS
45.
2) Are known only to that block
4) Are illegal in C++
C
43.
ad
39.
4) Prototyping model
46.
Data mining evolved as a mechanism to cater to the limitations of ________ systems to deal massive data sets with high
dimensionality, new data type, multiple heterogeneous data resource etc.
1) OLTP
2) OLAP
3) DSS
4) DWH
5) None of these
47.
An important application of cryptography used in computerized commercial and financial transactions:
1) Data mining
2) Data warehousing 3) Digital signature
4) Media convergence 5) None of these
48.
Rows of a relation are called
1) Relation
2) Tuples
49.
3) Data structure
The drawbacks of the binary tree sort are remedied by the
1) Linear sort
2) Quick sort
3) Heap Sort
IT Quesetions
/
3
4) An entity
5) None of these
4) Insertion sort
5) None of these
BSC Academy
52.
53.
54.
55.
5) None of these
Information is
1) Data
5) All of These
2) Processed data
em
y
51.
Which layer of OSI determines the interface of the system with the user?
1) Network
2) Application
3) Data link
4) Session
3) Manipulated input
Data by itself is not useful unless
1) It is massive
3) It is collected from diverse sources
5) None of These
4) Computer output
2) It is processed to obtain information
4) It is properly stated
For taking decisions data must be
1) Very accurate
4) Collected from diverse sources
2) Massive
5) All of These
Strategic information is needed for
1) Day-to-day operations
4) Short-range planning
2) Meeting government requirements 3) Long-range planning
5) Only 2 and 3
Strategic information is required by
1) Middle managers 2) Line managers
3) Top managers
3) Processed correctly
4) All workers
ad
50.
5) Only 1 and 2
A ROLLBACK command in a transaction
1) Makes sure that all changes to the database are in effect.
2) Undoes all changes to the database resulting from the execution of the transaction
3) Does nothing
4) Undoes the effects of the last UPDATE command
5) Restores the current of the database to its state at the end of the previous day
57.
________ refers to the contracting of a specific business task to a third party service provider.
1) Insourcing
2) Outsourcing
3) Offshore Outsourcing
4) Cross-Functioning
5) Business Process Outsourcing
58.
Operational information is needed for
1) Day-to-day operations
2) Meeting government requirements 3) Long-range planning
4) Short-range planning
5) All of these
59.
In motorcar manufacturing the following type of information is strategic:
1) Decision on introducing a new model
2) Scheduling production
3) Assessing competitor car
4) Computing sales tax collected
5) Only 1 and 2
60.
A computer-based information system is needed because
(A) The size of organisations has become large and data is massive
(B) Timely decisions are to be taken based on available data
(C) Computers are available
(D) It is difficult to get clerks to process data
1) Only A and C
2) Only A and B
3) Only A and D
BS
C
Ac
56.
61.
62.
63.
64.
4) Only C and D
5) Only B and D
Volume of strategic information is
1) Condensed
2) Detailed
3) Summarised
4) Irrelevant
5) Only 1 and 2
Operational information is
1) Haphazard
2) Well organized
3) Unstructured
4) Partly structured
5) Only 1 and 2
The quality of information which does not hide any unpleasant information is known as
1) Complete
2) Trustworthy
3) Relevant
4) None of the above
5) All of the above
Every record stored in a Master file has a key field because
1) it is the most important field
2) it acts as a unique identification of record 3) it is the key to the database
4) it is a very concise field
5) None of These
4
/
IT Quesetions
BSC Academy
68.
69.
70.
71.
Data rejected by edit program are
1) corrected and re-entered
4) ignored during processing
75.
3) Only B and D
Batch processing is used when
(A) response time should be short
(B) data processing is to be carried out at periodic intervals
(C) transactions are in batches
(D) transactions do not occur periodically
1) Only A and B
2) Only A, C and D
3) Only B and C
3) it can handle random queries
4) Only C and D
5) Only A and D
4) Only A, B and C
5) Only A and D
A management information system is one which
1) is required by all managers of an organisation
2) processes data to yield information of value in tactical management
3) provides operational information
4) allows better management of organisations
5) Only 1 and 2
C
2) analysing past decision made by managers
4) retrieving archival data
Data mining requires
1) large quantities of operational data stored over a period of time
2) lots of tactical data
3) several tape drives to store archival data
4) large mainframe computers
5) All of these
BS
74.
3) collected for later use
Online transaction processing is used because
1) it is efficient
2) disk is used for storing files
4) transactions occur in batches
5) None of the above
72. Data mining is used to aid in
1) operational management
3) detecting patterns in operational data
5) Only 2 and 3
73.
2) format correctly input data
4) expedite retrieving input data
2) removed from processing
5) Only 1 and 3
Off-line data entry is preferable when
(A) data should be entered without error
(B) the volume of data to be entered is large
(C) the volume of data to be entered is small
(D) data is to be processed periodically
1) Only A and B
2) Only B and C
5) None Of These
em
y
67.
Edit program is required to
1) authenticate data entered by an operator
3) detect errors in input data
5) All of the above
4) CD- ROM
ad
66.
The primary storage medium for storing archival data is
1) floppy disk
2) magnetic disk
3) magnetic tape
Ac
65.
Data mining cannot be done if
1) operational data has not been archived
3) the organization is large
5) All the above
2) earlier management decisions are not available
4) all processing had been only batch processing
Decision support systems are essential for
1) Day-to-day operations of an organisation
3) Top-level strategic decision making
5) Only 3 and 4
2) Providing statutory information
4) Ensuring that organisations are profitable
IT Quesetions
/
5
BSC Academy
Which of the following IEEE standards deal(s) with LAN and MAN (metropolitan area network)?
1) 801
2) 803
3) 802
4) 800
5) Only 1 and 2
77.
Firewalls protect against
1) unauthorised attacks
4) data-driven attacks
81.
82.
83.
84.
85.
86.
87.
88.
89.
90.
Two binary digits can be added using the logical circuit
1) Half adder
2) Full adder
3) Serial adder
Full form of BIOS:
1) Better input output services
4) basic input/output system
2) basic inner outer services
5) None of The Above
5) Only 1 and 2
4) Diskette
5) Only 1 and 2
4) Parallel adder
5) None of the Above
3) basic input output services
The device that connects inputs to outputs:
1) RAM
2) crossbar
3) crossword
4) modem
5) Only 1 and 2
Data entered into the computer is called
1) Input
2) Algorithm
3) Flowchart
4) Output
5) All of These
The process of connecting to the internet account is called
1) SIGN IN
2) LOG IN
3) LOG OUT
4) SIGN OUT
5) None of the above
How many values can be represented by a single byte?
1) 4
2) 16
3) 64
4) 256
5) None of the above
Most data communications involving telegraph lines use
1) simplex lines
2) wideband channel 3) narrowband channel 4) dialled service
5) None of these
Which scheme is used for mapping host names and email destinations to IP addresses?
1) DNS
2) TCP/IP
3) TELENET
4) RARP
5) None of These
Broad band ISDN consists of
1) Physical layer
3) ATM adaptation layer
5) All of the above
2) Asynchronous Transfer Mode (ATM) layer
4) Only 1 and 2
The ________ component is not present in every router.
1) POST
2) DRAM
3) Mini-IOS
4) Bootstrap
The linker produces a ________ which contains binary codes for all compound modules.
1) Bit file
2) Load file
3) Link file
4) Object Program
92.
Which of the following is the easiest software development process model?
1) Prototyping
2) Waterfall model
3) Spiral model
4) Interactive enhancement
5) None of the above
93.
C++ was developed by
1) Bjarne Stroustrup 2) Dennis Ritchie
94.
5) None of these
5) None of These
In C++ we can use the same function name to create functions that perform a variety of different tasks.This is known
as
1) Inheritance
2) Global function
3) Function overloading
4) Only 1 and 2
5) All of the above
BS
91.
During cutting and pasting, the item cut is temporarily stored in
1) Hard drive
2) Clipboard
3) ROM
4) pen
ad
80.
Which of the following is not related to computer?
1) mouse
2) screen
3) bit
Ac
79.
3) virus attacks
C
78.
2) fire attacks
5) Only 1 and 2
em
y
76.
3) Tannenbaum
4) Milan Melkovinec
5) None of These
If the disk head is located initially at 32, find the number of disk moves required with FCFS if the disk queue of I/O blocks
requests are 98, 37, 14, 124, 65, 67.
1) 324
2) 321
3) 310
4) 315
5) 320
6
/
IT Quesetions
BSC Academy
The action of parsing the source program into proper syntactic classes is known as
1) Lexical analysis
2) Syntax Analysis
3) General Syntax Analysis
4) Interpretation Analysis
5) None of the above
96.
Resolution of externally defined symbols is performed by
1) Loader
2) Linker
3) Compiler
97.
em
y
95.
Which language is best used for real time system?
1) Java
2) C
3) Assembly
4) Assembler
5) None of These
4) C++
5) None of these
98.
In the UNIX systems the user can change the access rights of the file to different users by using
1) Tail
2) PID
3) Chmod
4) Head
5) None of These
99.
Which of the following Unix commands is used to create empty files?
1) Vi
2) Cat
3) Touch
4) Pico
100. Both Go-Back-N and Selective-Repeat Protocols use a
1) sliding frame
2) sliding window
3) sliding data
4) sliding packet
5) None of these
5) None of these
ad
101. Which of the memories has the shortest access time?
1) Cache Memory
2) RAM
3) Magnetic Bubble Memory
4) Magnetic Core Memory
5) All the above have equal access time.
102. The IEEE 802.6 standard describes a ________ standard called Distributed Queue Dual Bus (DQDB).
1) WAN
2) MAN
3) LAN
4) Internet
5) None of the above
3) Blank List
4) Both 1 and 2
5) None of the above
104. ________ uses thin coaxial cable.
1) 10Base2
2) 10Base5
3) 10Base-T
4) 10Base-F
5) None of these
105. The input of Lex is
1) Statement
4) ASCII Code
Ac
103. The list with no nodes on it is called
1) Null List
2) Empty List
2) Numeric Data
5) None of these
3) Set of regular expressions
106. Which of the following is not a logical database structure?
1) Relational
2) Network
3) Chain
4) Tree
5) None Of These
107. CIDR (Classless Inter Domain Routing) is most often used in
1) class C Networks 2) class A Networks
3) class B Networks
4) Only 1 and 2
5) None of the above
108. Which of the following operators in ‘C’ does not associate from the right?
1) ,
2) =
3) +
4) ++
5) None of the above
C
109. Which language has recently become the de facto standard for interfacing application programs with relational database
system?
1) SQL
2) Oracle
3) 4 GL
4) Database
5) None of the above
110. Sockets are used in
1) Data link Layer
2) Physical Layer
3) Transport Layer
4) Network Layer
BS
111. Lexical Analyzer transforms an input stream into
1) Regular expression 2) Binary
3) Symbols
5) None of the above
4) Sequence of tokens 5) None of these
112. In which manner should we traverse a binary search tree so that elements are visited in ascending order?
1) Preorder
2) Inorder
3) Postorder
4) Graph
5) None of These
113. 253.45.67.9 is a class ________ address.
1) D
2) A
114. Semantic errors can be detected
1) At compile time only
3) At run time only
5) None of these
3) E
4) C
5) None of These
2) Both at compile time and at run time
4) All of the above
IT Quesetions
/
7
BSC Academy
em
y
115. Which of the following communication modes supports two-way traffic but in only one direction at a time?
1) Duplex
2) Simplex
3) Three- Quarters Duplex
4) Half-Duplex
5) All of the above
116. In a PC-to-telephone hookup for long-distance communication, modem is connected between the telephone line and
1) Synchronous Port
2) PC
3) Cross-Over Cable
4) Asynchronous Port
5) None of These
117. In compilers, syntax analysis is done by
1) Scanner
2) Parser
3) Code generator
4) Lexical analyser
118. RAD (Rapid Application Development) is not appropriate when
1) Technical risks are high
2) Findings are already done
4) Only 1 and 2
5) None of These
119. In queues, the items are deleted at one end called
1) Front
2) Top
3) Base
5) None of these
3) Testing is not needed
4) Rear
5) None of These
ad
120. If a memory page containing a heavily used variable that was initialised very early and is in constant use is removed, then
the page replacement algorithm used is
1) FIFO
2) LFU
3) LRU
4) All of These
5) None of These
121. When you connect to an online information service you are asked to provide some kind of identification such as your
name, an account number and a password.
What is the name given to this brief dialogue between you and information
system?
1) Security Procedure
2) Log-on Procedure
3) Safeguard Procedure
4) Identification Procedure
5) None of These
Ac
122. Which of these determines authorised sign in an EDI (Electronic Data Interchange) transaction?
1) Masking
2) Spoofing
3) Digital Signature
4) Privacy Key Cryptosystems
5) None of these
123. ‘C’ is a ________- generation language.
1) 3rd
2) 4th
3) 5th
124. Which of the following usually creates bad sector on hard disk?
1) Trojan
2) Worm
3) Stealth Virus
4) 2nd
5) None of These
4) All of these
5) None of these
C
125. When an organisation gives contract for development of software, it has to give data to the service provider. In such
cases, the ownership of data should be
1) Shared by both parties
2) Transferred to the service provider
3) With the client organisation that outsources service
4) Not transferred
5) None of These
126. ________ can’t be used for source of data automation.
1) OCR
2) UPC
3) POS Terminal
4) Keyboard
5) None of these
BS
127. Switched mode power supply
1) Converts DC to AC
2) Converts raw input power to controlled voltage and current
3) Enhances output of a circuit
4) Switches to and fro between high and low power fluctuations
5) None of these
128. Which of the following is false about OS?
1) Acts as command processor
2) Acts as compiler
4) All are true
5) None of these
129. Which of the following is incorrect?
1) LAN is faster than MAN.
3) Clients can store information.
5) None of these
3) Acts as manager
2) Servers are powerful PCs.
4) Peer-to-peer networks have high security.
8
/
IT Quesetions
BSC Academy
131. Disk Scanners are
1) Anti-virus protection systems
4) All of these
2) 8086’s supplementary IC
5) None of the above
132. Array is a set of ________ objects.
1) Different types of 2) Unique
133. The operating system is also
1) Control System
4) Boot Sector
3) Unwanted
3) Aftereffects of virus
4) Same type of
2) Special System
5) None of These
5) All of these
em
y
130. Which segment identifies the kind of business documents in an EDI transmission?
1) ISA
2) GS
3) ST
4) SE
5) None of These
3) Administrator Division
134. Which of the following identification techniques provides the best means of user authentication?
1) What the user knows
2) What the user is
3) What the user has
4) What is user has and what the user knows
5) None of These
135. The earliest approach that was used for software development was
1) Incremental development model 2) Waterfall model
4) Rapid prototyping model
5) None of These
ad
136. To make a program safe we should take care of
1) Strong authentication and access controls
3) Error-checking controls
5) None of these
3) Spiral development model
2) Doing risk analysis
4) All of these
Ac
137. If the network of the company is to be protected from remote access that may damage company’s reputation due to
misuse of information, then security policy should include
1) Only the employer
2) All the employees
3) Contractors
4) All the above
5) None of these
2) Part of Internet
4) Only 1 and 2
139. What is a non-dedicated server?
1) A workstation that can double up as a server
3) A computer reserved for special task
5) None of the above
2) A computer reserved for a special task
4) Only 1 and 2
C
138. TCP/IP protocol stack is
1) A family of protocols that connect to PCs
3) A combination of TCP and IP protocols
5) All of these
140. The process of organising the memory into two banks to allow 8- and 16-bit data operation is called?
1) Indexed mapping
2) Bank switching
3) Two-way memory interleaving
4) Memory segmentation
5) None of these
BS
141. Which of the following is a layer of object-oriented design pyramid?
1) Message Layer
2) Subsystem layer
4) All of the above
5) None of the above
3) Class and Object Layer
142. The OSPF was created to overcome the drawbacks that ________ faced.
1) VLSM
2) IGRP
3) EIRP
4) RIP
143. FDDI is
1) Star Network
4) Bus-Based Network
2) Mesh Network
5) All of the above
3) Ring Network
144. Fragment Free Switches check ________ bytes of data.
1) 64
2) 24
3) 16
IT Quesetions
5) None of These
4) 4
/
9
5) 9
BSC Academy
2) Lower power consumption and better noise margins
4) Higher power consumption with high fan-out
146. RISC processor has
1) All operations done within the register and CPU
3) Single-cycle instruction execution
5) All of these
2) Relatively few instructions and addressing modes
4) Only 1 and 2
em
y
145. The main advantages of CMOS as compared to TTL:
1) Lower power consumption with low fan-out
3) Higher speed operation with low power consumption
5) None of these
147. A loading scheme in which loading and linking of external references are postponed until execution time:
1) Dynamic loading
2) Direct linking loader
3) Relocating loader
4) Dynamic linking
5) None of These
148. Backtracking problem is seen in
1) LR Parser
4) None of these
2) Predictive Parser
5) All of the above
3) Recursive Descent Parser
ad
149. Which of the following filename extension suggests that the file is a backup copy of another file?
1) BAK
2) TXT
3) BAS
4) COM
5) None of These
150. Connected graphs without circuits is called a
1) Hamiltonian graph
2) Euler graph
4) Tree
5) All of these are types of graph
3) Path
4) Clock replacement
5) None of the above
152. The graph K (3, 4), a complete bipartite graph, has
1) 4 edges
2) 8 edges
3) 10 edges
4) 12 edges
5) 3 edges
153. The database schema is written in
1) DML
2) HLL
4) DCL
5) None of these
Ac
151. What replacement policy is used by Windows NT?
1) LRU
2) NFU
3) FIFO
3) DDL
154. What is the average waiting time (in minutes) in FCFS of a given process p1, p2, p3, p4 if the execution time are 5, 10, 8,
3 minutes and turnaround time are 5, 15, 23, 26 minutes?
1) 10
2) 10.75
3) 12.75
4) 12
5) 13
155. In an architecture of a database system external level is the
1) logical level
2) physical level
3) conceptual level
4) view level
5) None of these
C
156. In a circular linked list
1) Components are all linked together in some sequential manner
2) There is no beginning and no end
3) Components are arranged hierarchically
4) Forward and backward transversal within the list is permitted
5) None of these
5) None of these
158. A technique for direct searching is
1) binary search
2) hashing
5) None of these
BS
157. The statement in SQL which allows to change the definition of a table is
1) Alter
2) Create
3) Update
4) Select
3) tree search
4) linear Search
159. Maximum number of nodes in B-tree at depth h and order t (root of depth 0) is given by
1) t(h + 1)
2) 2t(h – 1)
3) t(h – 1)
4) 2t(h + 1)
5) None of these
160. Which of the following can be a sequence of nodes examined in a binary search tree while searching for key 98?
1) 100, 50, 75, 60, 98
2) 100, 120, 90, 95, 98
3) 200, 70, 100, 95, 98
4) 75, 150, 90, 80, 98
5) None of these
161. What protocol is used between e-mail servers?
1) SMTP
2) FTP
3) SNMP
10
/
IT Quesetions
4) TCP
5) None of these
BSC Academy
162. The way a card game player arranges his cards as he picks them up one by one, is an example of
1) Selection Sort
2) Bubble Sort
3) Insertion sort
4) Merge sort
5) None of these
em
y
163. Which phase is not available in software life cycle?
1) Design
2) Testing
3) Coding
4) Abstraction
5) Maintenance
164. Which type of error detection uses binary division?
1) Parity check
3) Checksum Checking
5) None of these
2) Longitudinal Redundancy checking (LRC)
4) Cyclic Redundancy Checking (CRC)
165. Basis path testing is
1) Both black and white box testing method
3) Unique testing method
5) None of these
2) White box testing method
4) Black box testing method
166. If you want to tell the database management system that a specific attribute contained numbers only, what will you need
to set?
1) Data type
2) Data category
3) Data dictionary
4) Data definition
5) Data Integrity
ad
167. When you link one database table to another database table, what are you creating?
1) Connectivity
2) Primary Link
3) Relationships
4) Referential integrity 5) Foreign key
168. The process known as ________ is used by large retailers to study trends.
1) POS
2) Data selection
3) Data mining
4) Data conversion
5) None of these
169. Accessing records from a file directly without searching from the beginning of the file is called
1) Time sharing
2) Random
3) Direct access
4) Access time
5) None of these
Ac
170. Banker’s algorithm for resource allocation deals with
1) deadlock preventation
2) deadlock avoidance
4) mutual exclusion
5) None of these
171. Which of the following performs modulation and demodulation?
1) Modem
2) Satellite
3) Coaxial Cable
3) deadlock recovery
4) Optical fiber
5) Router
172. In TCP/IP protocol, checksum field contains ________-bit value which is used for ________.
1) 32, deadlock avoidance
2) 48, error detection
3) 16, error detection
4) 16, deadlock avoidance
5) None of these
173. Granting an outside organisation access to Internet web pages is often implemented using a(n)
1) Extranet
2) Intranet
3) Internet
4) Hacker
5) None of these
C
174. What is the advantage of packet switching over message switching?
1) The first packet of multipacket message can be forwarded before the second one has fully arrived.
2) reduces delay and improves throughput
3) advance setup not required
4) All the above
5) None of these
4) vacuum tubes
5) None of these
176. Generalisation is a ________ process.
1) top-down
2) bottom-up
4) vertical
5) None of these
BS
175. The third-generation computers were based on
1) transistors
2) valves
3) ICs
3) Both 1 and 2
177. Spooling is most beneficial in a multiprogramming environment where
1) most jobs are I/O-bound
2) most jobs are CPU-bound
3) jobs are evenly divided as I/O-bound and CPU-bound
4) there is limited primary memory and there is a need for secondary memory
5) None of these
IT Quesetions
/
11
BSC Academy
178. A flip-flop can store
1) Two bits of data
4) Any number of bits of data
3) Three bits of data
em
y
2) One bit of data
5) All the above
179. ________ command lists directory content of files and directories.
1) cat
2) cp
3) ls
4) mkdir
5) None of these
180. Which of the following is true about the data warehouse environment architecture?
1) It contains a data warehouse methodology, analysis design, construction and administration.
2) It increases processing power and sophistication of analytical tools and techniques that have resulted in the
development of data warehouses.
3) It provides storage, functionality, and responsiveness to queries beyond the capabilities of transaction-oriented
databases.
4) All the above
5) None of these
181. Altering of data so that it is not usable unless the changes are undone is called
1) Encryption
2) Compression
3) Biometrics
4) Ergonomics
5) None of these
ad
182. A ________ main purpose is to prohibit unauthorised access to your computer via the Internet.
1) popup blocker’s
2) firewall’s
3) spyware blocker’s
4) spam assassin’s
5) None of these
183. When one computer provides services to another computer, the environment is a(n) ________ infrastructure.
1) client/server
2) dependent
3) independent
4) reliant
5) None of these
Ac
184. Object oriented programming relies on three basic concepts. These are
1) data abstraction, inheritance and array
2) data abstraction, inheritance and polymorphism
3) encapsulation, inheritance and polymorphism
4) inheritance, I/O, class
5) None of these
185. A ________ can check the MAC addresses contained in the frame.
1) bridge
2) repeater
3) passive hub
4) router
5) All the above
186. Each station on an Ethernet network has a unique ________ address imprinted on its network interface card (NIC).
1) 5-byte
2) 32-bit
3) 64-bit
4) 48-bit
5) None of these
187. Decryption and encryption of data are the responsibilities of the ________ layer.
1) Physical
2) Data link
3) Presentation
4) Session
5) Application
188. The communication mode that supports data in both the directions at the same time is called
1) Half duplex
2) Simplex
3) Full duplex
4) Multiplex
5) None of these
C
189. The functions AVG, COUNT, MAX and MIN are
1) supported only by SQL
2) supported only by QBE
4) supported by ORACLE
5) supported by none
3) supported by both SQL and QBE
5) None of these
191. A full binary tree with n leaves contains
1) 2n nodes
2) log2n nodes
5) None of these
BS
190. Multivalued dependency among attributes is checked at which level?
1) 2NF
2) 3NF
3) 4NF
4) 5NF
3) 2n – 1 nodes
192. The postfix form of an expression (A+B)*(C*D-E)*F/G is
1) AB+CD*E-FG/**
2) AB+CD*E-F**G/
4) AB+CDE*-*F*G/
5) None of these
193. Slotted ALOHA
1) Divides time into discrete intervals
3) Is used for data transfer
5) None of these
4) n nodes
3) AB+CD*E-*F*G/
2) Requires global time synchronisation
4) All the above
12
/
IT Quesetions
BSC Academy
194. What type of technology allows you to use your finger, eye, or voice print to secure your information resources?
1) RFID
2) Caves
3) Biometrics
4) Haptics
5) None of these
em
y
195. A ________ can be used as a connecting device between two internetworks that use different models.
1) repeater
2) router
3) bridge
4) gateway
5) hub
196. IP address has been classified into five classes A, B, C, D and E.
1) 0.0.0.0 to 126.255.255.255
2) 128.1.0.1 to 191.255.255.255
4) 192.0.1.1 to 223.255.255.255
5) None of these
What is address range of class B?
3) 244.0.0.0 to 239.255.255.255
197. Relation in the relational database model is defined as the set of ________ that have the same attributes.
1) objects
2) relations
3) tuples
4) attributes
5) None of these
198. If alpha is a set of attributes and beta is a subset of alpha, then alpha holds beta. In Armstrong’s Axioms, this is known
as
1) augmentation rule 2) reflexivity rule
3) transitivity rule
4) passivity rule
5) None of these
199. In an E-R diagram, total participation is represented by
1) circle
2) single line
3) double lines
4) concentric circles
ad
200. If a key attribute of a relation is referred in another relation, it is called
1) domain key
2) referential key
3) relation key
4) foreign key
5) None of these
5) None of these
Answers
5. 3
106. 3
107. 1
108. 1
109. 1
110. 5; Session Layer
111. 4
112. 2
113. 3
114. 1
116. 4
117. 2
118. 1
119. 1
121. 2
122. 3
123. 1
124. 5
126. 4
127. 2
128. 2
129. 4
131. 1
132. 4
133. 3
134. 2
136. 1
137. 4
138. 1
139. 1
141. 4
142. 4; Routing Information protocol
143. 3
144. 1
145. 2
146. 5
147. 4
148. 3
149. 1
151. 3
152. 4
153. 1
154. 4
156. 2
157. 3
158. 2
159. 3
161. 1
162. 3
163. 4
164. 4
166. 1
167. 1
168. 3
169. 3
171. 1
172. 3
173. 1
174. 2
176. 2
177. 3
178. 2
179. 3
181. 1
182. 2
183. 1
184. 3
186. 4
187. 3
188. 3
189. 3
191. 3
192. 4
193. 4
194. 3
196. 2
197. 3
198. 2
199. 3
BS
C
Ac
1. 4
2. 2
3. 4
4. 1
6. 4
7. 3; Address Resolution Protocol
8. 4
9. 4
10. 3
11. 3
12. 4
13. 4
14. 3
16. 3
17. 4
18. 4
19. 3
21. 4
22. 2
23. 2
24. 2
26. 2
27. 1
28. 1
29. 4
31. 2
32. 3
33. 2
34. 1
36. 1
37. 4
38. 2
39. 4
41. 1
42. 2
43. 5
44. 1
46. 1
47. 3
48. 2
49. 3
51. 2
52. 2
53. 3
54. 3
56. 2
57. 5
58. 1
59. 1
61. 1
62. 2
63. 2
64. 2
66. 3
67. 1
68. 3
69. 3
71. 2
72. 3
73. 1
74. 1
76. 3
77. 1
78. 4
79. 2
81. 4
82. 2
83. 1
84. 2
86. 3
87. 1
88. 5
89. 2
91. 3
92. 2
93. 1
94. 2
96. 2
97. 1
98. 3
99. 3
101. 1
102. 2
103. 4
104. 1
15. 2
20. 4
25. 4
30. 1
35. 3
40. 2
45. 3
50. 2
55. 3
60. 2
65. 3
70. 3
75. 3
80. 1
85. 4
90. 3
95. 1
100. 2
105. 3
IT Quesetions
/
13
115. 4
120. 1
125. 3
130. 2
135. 2
140. 3
150. 4
155. 2
160. 5
165. 2
170. 4
175. 3
180. 4
185. 1
190. 2
195. 4
200. 4