Tuesday, September 15, 2020

IT Question Solve 2020

 Solve of Final Test- C,OOPQ1. Which is valid C expression?

1. int my_num = 100,000;
2. int my_num = 100000;
3. int my num = 1000;
4. int $my_num = 10000;
Ans.: 2Q2. Which of the following cannot be a variable name in C?
1. true
2. friend
3. export
4. volatile
Ans.: 4Q3. What is the result of logical or relational expression in C?
1. True or False
2. 0 or 1
3. 0 if an expression is false and any positive number if an expression is tru
4. None
Ans.: 2Q4. User-defined data type can be derived by____
1. struct
2. enum
3. typedef
4. all of the mentioned
Ans.: 4Q5. %lf access specifier is used for __
1. Strings
2. Integral types
3. Long float
4. char
Ans.: 3Q6. output? for(i=1;i<=10;i++);
1. 9
2. 1->10
3. 11
4. 12
Ans.: 3Q7. The pragma __________ is used to remove an identifier completely from a program.
1. GNU piston
2. GCC poison
3. GNU poison
4. GCC piston View Answer
Ans.: 2Q8. How many private member functions are allowed in a class?
1. Only 1
2. Only 7
3. Only 255
4. As many as required
Ans.: 4Q9. If data members are private, what can we do to access them from the class object?
1. Create public member functions to access those data members
2. Create private member functions to access those data members
3. Create protected member functions to access those data members
4. Private data members can never be accessed from outside the class
Ans.: 1Q10. Which feature can be implemented using encapsulation?
1. Inheritance
2. Abstraction
3. Polymorphism
4. Overloading
Ans.: 2Q11. Encapsulation helps in writing ___________ classes in java.
1. Mutable
2. Abstract
3. Wrapper
4. Immutable
Ans.: 4Q12. Using encapsulation data security is ___
1. Not ensured
2. Ensured to some extent
3. Purely ensured
4. Very low
Ans.: 2Q13. Which constructor is called while assigning some object with another?
1. Default
2. Parameterized
3. Copy
4. Direct assignment is used
Ans.: 3Q14. Which specifier applies only to the constructors?
1. Public
2. Protected
3. Implicit
4. Explicit
Ans.: 4Q15. Which specifier applies only to the constructors?
1. Public
2. Protected
3. Implicit
4. Explicit
Ans.: 4Q16. Which among the following function can be called without arguments?
1. void add(int x, int y=0)
2. void add(int=0)
3. void add(int x=0, int y=0)
4. void add(char c)
Ans.: 3
-----------------------------------------------------------------------------------------------------------------

Solve of security and dbms-1
Q1. ____ is a popular tool used for discovering networks as well as in security auditing.
1. Ettercap
2. Metasploit
3. Nmap
4. Burp Suit
Ans.: 3
Q2. Which of the below-mentioned tool is used for Wi-Fi hacking?
1. Wireshark
2. Nessus
3. Aircrack-ng
4. Snort
Ans.: 3
Q3. The full form of Malware is ___
1. Malfunctioned Software
2. Multipurpose Software
3. Malicious Software
4. Malfunctioning of Security
Ans.: 3
Q4. This attack can be deployed by infusing a malicious code in a website’s comment section. What is “this” attack referred to here?
1. SQL injection
2. HTML Injection
3. Cross Site Scripting (XSS)
4. Cross Site Request Forgery (XSRF)
Ans.: 3
Q5. Which method of hacking will record all your keystrokes?
1. Keyhijacking
2. Keyjacking
3. Keylogging
4. Keyboard monitoring
Ans.: 3
Q6. When you use the word _____ it means you are protecting your data from getting disclosed.
1. Confidentiality
2. Integrity
3. Authentication
4. Availability
Ans.: 1
Q7. __ ensures the integrity and security of data that are passing over a network.
1. Firewall
2. Antivirus
3. Pentesting Tools
4. Network-security protocols
Ans.: 4
Q8. Which of the following is not a strong security protocol?
1. HTTPS
2. SSL
3. SMTP
4. SFTP
Ans.: 3
Q9. Which of the join operations do not preserve non matched tuples?
1. Left outer join
2. Right outer join
3. Inner join
4. Natural join
Ans.: 3
Q10. How many join types in join condition:
1. 2
2. 5
3. 3
4. 4
Ans.: 2
Q11. A _________ consists of a sequence of query and/or update statements.
1. Transaction
2. Commit
3. Rollback
4. Flashback
Ans.: 1
Q12. To include integrity constraint in an existing relation use :
1. Create table
2. Modify table
3. Alter table
4. Drop table
Ans.: 3

----------------------------------------------------------

Solve of Final Test-3
Q1. In UNIX. the login prompt can be changed by changing the content of the file -
1. getydefs
2. contrab
3. initab
4. init
Ans.: 2
Q2. Which O/S is recommended for real time system?
1. Windows
2. Unix
3. Oracle
4. C/OS
Ans.: 1
Q3. In operating system, each process has its own ___
1. address space and global variables
2. open files
3. pending alarms, signals and signal handlers
4. all of the mentioned
Ans.: 4
Q4. Which one of the following is not a real time operating system?
1. VxWorks
2. Windows CE
3. RTLinux
4. Palm OS
Ans.: 4
Q5. In UNIX, processes that have finished execution but have not yet had their status collected are known as-
1. Sleeping processes
2. Stopped processes
3. Zombie processes
4. Orphan processes
Ans.: 3
Q6. The maximum number of processes that can be in ready state in computer system with n CPU’s is
1. n
2. n2
3. 2n
4. indepent of n
Ans.: 4
Q7. The systems which allow only one process execution at a time, are called __
1. uniprogramming systems
2. uniprocessing systems
3. unitasking systems
4. none of the mentioned
Ans.: 2
Q8. The number of processes completed per unit time is known as ___
1. Output
2. Throughput
3. Efficiency
4. Capacity
Ans.: 2
Q9. Which of the following is not the state of a process?
1. New
2. Old
3. Waiting
4. Running
Ans.: 2
Q10. What is a Process Control Block?
1. Process type variable
2. Data Structure
3. A secondary storage section
4. A Block in memory
Ans.: 2
Q11. What is the objective of multiprogramming?
1. Have some process running at all times
2. Have multiple programs waiting in a queue ready to run
3. To minimize CPU utilization
4. None of the mentioned
Ans.: 1
Q12. Which of the following does not interrupt a running process?
1. A device
2. Timer
3. Scheduler process
4. Power failure
Ans.: 3


--------------------------------------------------------------------------


Solve of Final Test-DS
Q1. How do you initialize an array in C?
1. int arr[3] = (1,2,3);
2. int arr(3) = {1,2,3};
3. int arr[3] = {1,2,3};
4. int arr(3) = (1,2,3);
Ans.: 3
Q2. What are the advantages of arrays?
1. Objects of mixed data types can be stored
2. Elements in an array cannot be sorted
3. Index of first element of an array is 1
4. Easier to store elements of same data type
Ans.: 4
Q3. The data structure required to check whether an expression contains balanced parenthesis is?
1. Stack
2. Queue
3. Array
4. Tree
Ans.: 1
Q4. The postfix form of A*B+C/D is?
1. *AB/CD+
2. AB*CD/+
3. A*BC+/D
4. ABCD+/*
Ans.: 2
Q5. In linked list each node contain minimum of two fields. One field is data field to store the data second field is?
1. Pointer to character
2. Pointer to integer
3. Pointer to node
4. Node
Ans.: 3
Q6. The number of edges from the node to the deepest leaf is called _________ of the tree.
1. Height
2. Depth
3. Length
4. Width
Ans.: 1
Q7. Which is true for binary search ?
1. Divide and conquer algorithm
2. Traversal scheme
3. Greedy algorithm
4. None
Ans.: 3
Q8. Which of the following properties is associated with a queue?
1. First In Last Out
2. First In First Out
3. Last In First Out
4. Last In Last Out
Ans.: 2
Q9. What is the time complexity of enqueue operation?
1. O(logn)
2. O(nlogn)
3. O(n)
4. O(1)
Ans.: 4
Q10. In a max-heap, element with the greatest key is always in the which node?
1. Leaf node
2. First node of left sub tree
3. root node
4. First node of right sub tree
Ans.: 3
Q11. Which of the following statements for a simple graph is correct?
1. Every path is a trail
2. Every trail is a path
3. Every trail is a path as well as every path is a trail
4. Path and trail have no relation
Ans.: 1
Q12. Time complexity of binary search?
1. O(1)
2. O(logn)
3. O((logn) 2 )
4. O(n)
Ans.: 2
Q13. Graph is the data structure of ---- type
1. Linear
2. Non linear
3. Both
4. None
Ans.: 2
Q14. Linked lists are not suitable to for the implementation of?
1. Insertion sort
2. Radix sort
3. Polynomial manipulation
4. Binary search
Ans.: 4
Q15. In Linked List implementation, a node carries information regarding ____
1. Data
2. Link
3. Data and Link
4. Node
Ans.: 2


------------------------------------------------------------------------------------

Solve of Final DBMS
Q1. A relational database consists of a collection of
1. Tables
2. Fields
3. Records
4. Keys
Ans.: 1
Q2. The term _______ is used to refer to a row.
1. Attribute
2. Tuple
3. Field
4. Instance
Ans.: 2
Q3. A domain is atomic if elements of the domain are considered to be ______ units.
1. Different
2. Indivisbile
3. Constant
4. Divisible
Ans.: 2
Q4. Which one of the following is a procedural language?
1. Domain relational calculus
2. Tuple relational calculus
3. Relational algebra
4. Query language
Ans.: 3
Q5. A _ is a pictorial depiction of the schema of a database that shows the relations in the database, their attributes, and primary keys and foreign keys
1. Schema diagram
2. Relational algebra
3. Database diagram
4. Schema flow
Ans.: 1
Q6. Create table employee (name varchar,id integer). What type of statement is this?
1. DML
2. DDL
3. View
4. Integrity constraint
Ans.: 2
Q7. Which one is design language?
1. DDL
2. DML
3. Both a & b
4. None
Ans.: 1
Q8. Repeated data exist at--
1. unnormalized
2. 1NF
3. 2NF
4. 3NF
Ans.: 1
Q9. Which forms are based on the concept of functional dependency:
1. 1NF
2. 2NF
3. 3NF
4. 4NF
Ans.: 3
Q10. The “all-or-none” property is commonly referred to as ______
1. Isolation
2. Durability
3. Atomicity
4. None of the mentioned
Ans.: 3
Q11. The result of a SQL SELECT statement is a ________
1. file
2. report
3. table
4. form
Ans.: 3
Q12. All of the following logical connectives are included in SQL except--
1. And
2. or
3. nor
4. not
Ans.: 3
Q13. Which of the following group functions ignore NULL values?
1. MAX
2. COUNT
3. SUM
4. All of the above
Ans.: 4
Q14. A command that lets you change one or more fields in a record is
1. Insert
2. Modify
3. Look-up
4. All of the above
Ans.: 2
Q15. The total participation by entities is represented in E-R diagram as
1. Dashed line
2. Double line
3. Double rectangle
4. Circle
Ans.: 2

-----------------------------------------------------------------------

Solve of Final Test-2
Q1. Class is pass by __
1. Value
2. Reference
3. Value or Reference, depending on program
4. Copy
Ans.: 2
Q2. Which is known as a generic class?
1. Abstract class
2. Final class
3. Template class
4. Efficient Code
Ans.: 3
Q3. When an object is returned by a function, a ___ is automatically created to hold the return value.
1. Temporary object
2. Virtual object
3. New object
4. Data member
Ans.: 1
Q4. How many objects can be returned at once?
1. Only 1
2. Only 2
3. Only 16
4. As many as required
Ans.: 1
Q5. How many basic types of inheritance are provided as OOP feature?
1. 1
2. 2
3. 3
4. 4
Ans.: 4
Q6. Which programming language doesn’t support multiple inheritance?
1. C++ and Java
2. C and C++
3. Java and SmallTalk
4. Java
Ans.: 4
Q7. What is the value of the postfix expression 6 3 2 4 + – *:
1. -18
2. 6
3. 7
4. 8
Ans.: 1
Q8. A queue follows _____
1. FIFO (First In First Out) principle
2. LIFO (Last In First Out) principle
3. Ordered array
4. Linear tree
Ans.: 1
Q9. Viruses which executes when computer starts is
1. macro
2. file infector
3. boot sector
4. salami shaving
Ans.: 3
Q10. Which of the following is not a type of virus?
1. Boot sector
2. Polymorphic
3. Multipartite
4. Trojans
Ans.: 4
Q11. ___ has many of the characteristics of what is now being called cloud computing.
1. Internet
2. Softwares
3. Web Service
4. All of the mentioned
Ans.: 1
Q12. Which of the following is Cloud Platform by Amazon?
1. Azure
2. AWS
3. Cloudera
4. All of the mentioned
Ans.: 2
Q13. The subset of a super key is a candidate key under what condition?
1. No proper subset is a super key
2. All subsets are super keys
3. Subset is a super key
4. Each subset is a super key
Ans.: 1
Q14. Which one of the following cannot be taken as a primary key?
1. Id
2. Register number
3. Dept_id
4. Street
Ans.: 4
Q15. Storage which stores or retains data after power off is called-
1. Volatile storage
2. Non-volatile storage
3. Sequential storage
4. Direct storage
Ans.: 2

----------------------------------------------------------------

Solve of Final Test-1
Q1. A distributed database has which of the following advantages over a centralized database?
1. Software cost
2. Software complexity
3. Slow Response
4. Modular growth
Ans.: 4
Q2. Storing a separate copy of the database at multiple locations is which of the following?
1. Data Replication
2. Horizontal Partitioning
3. Vertical Partitioning
4. Horizontal and Vertical Partitioning
Ans.: 1
Q3. The field that covers a variety of computer networks, both public and private, that are used in everyday jobs.
1. Artificial Intelligence
2. ML
3. Network Security
4. IT
Ans.: 3
Q4. Which is not an objective of network security?
1. Identification
2. Authentication
3. Access control
4. Lock
Ans.: 4
Q5. Which of these is a part of network identification?
1. UserID
2. Password
3. OTP
4. fingerprint
Ans.: 1
Q6. The process of verifying the identity of a user.
1. Authentication
2. Identification
3. Validation
4. Verification
Ans.: 1
Q7. An algorithm in encryption is called ____
1. Algorithm
2. Procedure
3. Cipher
4. Module
Ans.: 3
Q8. The information that gets transformed in encryption is _____
1. Plain text
2. Parallel text
3. Encrypted text
4. Decrypted text
Ans.: 1
Q9. A small program that changes the way a computer operates.
1. Worm
2. Trojan
3. Bomb
4. Virus
Ans.: 4
Q10. A program that copies itself.
1. Worm
2. Virus
3. Trojan
4. Bomb
Ans.: 1
Q11. An attack in which the site is not capable of answering valid request.
1. Smurfing
2. Denial of service
3. E-mail bombing
4. Ping storm
Ans.: 2
Q12. Which keyword must be used here to rename the field name?
1. From
2. Rename
3. As
4. Join
Ans.: 3
Q13. ’_ _ _ ’ matches any string of ______ three characters. ’_ _ _ %’ matches any string of at ______ three characters.
1. Atleast, Exactly
2. Exactly, Atleast
3. Atleast, All
4. All, Exactly
Ans.: 2
Q14. In the __________ normal form, a composite attribute is converted to individual attributes.
1. First
2. Second
3. Third
4. Fourth
Ans.: 1
Q15. Tables in second normal form (2NF):
1. Eliminate all hidden dependencies
2. Eliminate the possibility of a insertion anomalies
3. Have a composite key
4. Have all non key fields depend on the whole primary key
Ans.: 1

--------------------------------------------------------


Solve of All Topics-1
Q1. The Name box on to the left of formula bar
1. Shows the name of workbook currently working on
2. Shows the name of worksheet currently working on
3. Shows the name of cell or range currently working on
4. None of above
Ans.: 3
Q2. The Second Generation Computer was based on ________ ?
1. Vacuum tube
2. Silicon chips
3. Transistor
4. Bio chips
Ans.: 3
Q3. Which of the following programming language started from second generation ?
1. Cobol
2. BASIC
3. C
4. LISP
Ans.: 3
Q4. Which of the following is not a valid variable name declaration?
1. int _a3;
2. int a_3;
3. int 3_a;
4. int _3a
Ans.: 3
Q5. Which keyword is used to prevent any changes in the variable within a C program?
1. immutable
2. const
3. volatile
4. mutable
Ans.: 2
Q6. Which of the following is not a pointer declaration?
1. char a[10];
2. char a[] = {‘1’, ‘2’, ‘3’, ‘4’};
3. char *str;
4. char a;
Ans.: 4
Q7. Which of the following indicates the maximum number of entities that can be involved in a relationship?
1. Minimum cardinality
2. Maximum cardinality
3. ERD
4. Greater Entity Count (GEC)
Ans.: 2
Q8. x has a certain average for 9 innings. In the tenth innings, he scores 100 runs thereby increasing his average by 8 runs. His new average is:
1. 21
2. 22
3. 32
4. 28
Ans.: 4
Q9. Protocols are
1. Agreements on how communication components and DTE
2. Logical communication channels used for transferri
3. Physical communication channels used for transferr
4. None of the above
Ans.: 1
Q10. The topology with highest reliability is:
1. Bus topology
2. Star topology
3. Ring topology
4. Mesh topology
Ans.: 4
Q11. A data communications system has:
1. 4 components
2. 5 components
3. 6 components
4. 7 components
Ans.: 2
Q12. Which operator performs pattern matching?
1. BETWEEN operator
2. LIKE operator
3. EXISTS operator
4. None of these
Ans.: 2
Q13. The class at the top of exception class hierarchy is ...........
1. ArithmeticException
2. Throwable
3. Object
4. Exception
Ans.: 2
Q14. Choose the correct tag for largest heading in HTML.
1. h6
2. heading
3. h1
4. head
Ans.: 3
Q15. The earth is at the largest distance from the sun (Apehelion) on _
1. June 21st
2. January 3rd
3. July 4th
4. September 23rd
Ans.: 3

------------------------------------------------------------

Solve of Data Structure 3
Q1. How do you initialize an array in C?
1. int arr[3] = (1,2,3);
2. int arr(3) = {1,2,3};
3. int arr[3] = {1,2,3};
4. int arr(3) = (1,2,3);
Ans.: 3
Q2. What are the advantages of arrays?
1. Objects of mixed data types can be stored
2. Elements in an array cannot be sorted
3. Index of first element of an array is 1
4. Easier to store elements of same data type
Ans.: 4
Q3. Process of inserting an element in stack is called _____
1. Create
2. Push
3. Evaluation
4. Pop
Ans.: 2
Q4. What is the worst case time complexity of linear search algorithm?
1. O(1)
2. O(log n)
3. O(n)
4. O(n2)
Ans.: 4
Q5. Which of the following asymptotic notation is the worst among all?
1. O(n+2)
2. O(n!)
3. O(n2)
4. O(n+2456)
Ans.: 2
Q6. Identify the infix expression from the list of options given below.
1. a/b+(c-d)
2. abc*+d+ab+cd+*ce-f-
3. ab-c-
4. +ab
Ans.: 1
Q7. a/b+c*d where a=4, b=2, c=2, d=1.
1. 1
2. 3
3. 4
4. 5
Ans.: 3
Q8. Which of the following is not possible with an array in C programming langauge −
1. Declaration
2. Definition
3. Dynamic Allocation
4. Array of strings
Ans.: 3
Q9. Which of the following data structure is non-linear type?
1. Strings
2. Lists
3. Stacks
4. None of these
Ans.: 4
Q10. The complexity of merge sort algorithm is
1. O(n)
2. O(log n)
3. O(n2)
4. O(n log n)
Ans.: 4
Q11. What does ‘stack underflow’ refer to?
1. accessing item from an undefined stack
2. adding items to a full stack
3. removing items from an empty stack
4. index out of bounds exception
Ans.: 3
Q12. Which of the following is not the type of queue?
1. Ordinary queue
2. Single ended queue
3. Circular queue
4. Priority queue
Ans.: 2
Q13. push(1), push(2), pop, push(1), push(2), pop, pop, pop, push(2)
1. 2 2 1 1 2
2. 2 2 1 2 1
3. 2 2 2 2 1
4. 2 2 2 1 2
Ans.: 1
Q14. What is the value of the postfix expression 6 3 2 4 + – *
1. Something between -5 and -15
2. Something between 5 and -5
3. Something between 5 and 15
4. Something between 15 and 100
Ans.: 4
Q15. … is not the component of data structure.
1. Operations
2. Storage Structures
3. Algorithms
4. None of above
Ans.: 4

-------------------------------------------------------------
Solve of Basic Fundamental-2
Q1. Which protocol provides e-mail facility among different hosts?
1. FTP
2. SMTP
3. TELNET
4. SNMP
Ans.: 2
Q2. The basic architecture of computer was developed by
1. John Von Neumann
2. Charles Babbage
3. Blaise Pascal
4. Garden Moore
Ans.: 1
Q3. In how many generations a computer can be classified?
1. 3
2. 4
3. 5
4. 6
Ans.: 3
Q4. Graphical pictures that represent an object like file, folder etc are:
1. Task bar
2. Windows
3. Icons
4. Desktop
Ans.: 3
Q5. The binary number 1110 in hexadecimal format is ____
1. 6
2. E
3. 14
4. 15
Ans.: 2
Q6. What is the correct association between a hardware component and a computer function?
1. Monitor > input
2. Mouse > input
3. CPU > storage
4. Hard disk > processing
Ans.: 2
Q7. Which of the following is not a data type?
1. Symbolic Data
2. Alphanumeric Data
3. Numeric Data
4. Alphabetic Data
Ans.: 1
Q8. What does FORTRAN stands for?
1. Formula Transfer
2. Formula Transformation
3. Formula Translation
4. Format Transformation
Ans.: 3
Q9. A standardized language used for commercial applications.
1. C
2. JAVA
3. Fortan
4. Cobol
Ans.: 4
Q10. Who invented QWERTY keyboard?
1. Christopher Latham
2. Anderson Palimar
3. Brian saim
4. Ada Biron
Ans.: 1
Q11. which is only output devices
1. Monitor
2. Touch Screan
3. Speaker
4. Mouse
Ans.: 3
Q12. ___ define how the locations can be used.
1. Data types
2. Attributes
3. Links
4. Data Objects
Ans.: 2
Q13. which memory is never erased?
1. Bios
2. SRAM
3. DRAM
4. ROM
Ans.: 4
Q14. which of the following can be implemented using NAND gate?
1. Half adder
2. OR gate
3. AND gate
4. ALL
Ans.: 4
Q15. Which type of ROM used in pen drive?
1. Mask ROM
2. EPROM
3. EEPROM
4. PROM
Ans.: 3

---------------------------------------------

Solve of Basic Fundamental-2
Q1. Which protocol provides e-mail facility among different hosts?
1. FTP
2. SMTP
3. TELNET
4. SNMP
Ans.: 2
Q2. The basic architecture of computer was developed by
1. John Von Neumann
2. Charles Babbage
3. Blaise Pascal
4. Garden Moore
Ans.: 1
Q3. In how many generations a computer can be classified?
1. 3
2. 4
3. 5
4. 6
Ans.: 3
Q4. Graphical pictures that represent an object like file, folder etc are:
1. Task bar
2. Windows
3. Icons
4. Desktop
Ans.: 3
Q5. The binary number 1110 in hexadecimal format is ____
1. 6
2. E
3. 14
4. 15
Ans.: 2
Q6. What is the correct association between a hardware component and a computer function?
1. Monitor > input
2. Mouse > input
3. CPU > storage
4. Hard disk > processing
Ans.: 2
Q7. Which of the following is not a data type?
1. Symbolic Data
2. Alphanumeric Data
3. Numeric Data
4. Alphabetic Data
Ans.: 1
Q8. What does FORTRAN stands for?
1. Formula Transfer
2. Formula Transformation
3. Formula Translation
4. Format Transformation
Ans.: 3
Q9. A standardized language used for commercial applications.
1. C
2. JAVA
3. Fortan
4. Cobol
Ans.: 4
Q10. Who invented QWERTY keyboard?
1. Christopher Latham
2. Anderson Palimar
3. Brian saim
4. Ada Biron
Ans.: 1
Q11. which is only output devices
1. Monitor
2. Touch Screan
3. Speaker
4. Mouse
Ans.: 3
Q12. ___ define how the locations can be used.
1. Data types
2. Attributes
3. Links
4. Data Objects
Ans.: 2
Q13. which memory is never erased?
1. Bios
2. SRAM
3. DRAM
4. ROM
Ans.: 4
Q14. which of the following can be implemented using NAND gate?
1. Half adder
2. OR gate
3. AND gate
4. ALL
Ans.: 4
Q15. Which type of ROM used in pen drive?
1. Mask ROM
2. EPROM
3. EEPROM
4. PROM
Ans.: 3

-----------------------------------------------------------

Solve of DBMS-2Q1. The __ clause allows us to select only those rows in the result relation of the __ clause that satisfy a specified predicate.
1. Where, from
2. From, select
3. Select, from
4. From, where
Ans.: 1Q2. The ___ clause is used to list the attributes desired in the result of a query.
1. Where
2. Select
3. From
4. Distinct
Ans.: 2Q3. Using which language can a user request information from a database?
1. Query
2. Relational DBMS
3. Structural
4. Compiler
Ans.: 1Q4. In which state one gathers and list all the necessary fields for the database design project.
1. Data Definition
2. Data Refinement
3. Establishing Relationship
4. None Of The Above
Ans.: 1Q5. Which database object is ideal to view, change, andanalyze datain different ways ?
1. Table
2. Form
3. Query
4. Report
Ans.: 3Q6. It is used to establish an association between related tables.
1. Line
2. Relationship
3. Primary Key
4. Records
Ans.: 2Q7. Which name must be unique within a database ?
1. Table
2. Field
3. Record
4. Character
Ans.: 1Q8. The third stage of designing a database is when we create___ between tables
1. Relationship
2. Join
3. Query
4. None of These
Ans.: 1Q9. Two tables can be linked with relationship to ___
1. Ensure Foreign Key
2. Ensure data integrity
3. Create Primary Key
4. Ensure data entry
Ans.: 4Q10. Which of the following fields has a width of 8 bytes?
1. Memo
2. Date/time
3. Number
4. Hyperlink
Ans.: 2Q11. which of the following is not a database object?
1. Tables
2. Queries
3. Relationships
4. Reports
Ans.: 3Q12. Which of the following is not a database model
1. Network Database Model
2. Relational Database Model
3. Object Oriented Database Model
4. None
Ans.: 4Q13. A data dictionary is a repository that manages __
1. Memory
2. Metadata
3. Spell Checker
4. Data Validator
Ans.: 2Q14. The ___operation performs a set union of two similarly structured tables
1. Union
2. Join
3. Product
4. Intersect
Ans.: 1Q15. The intersection operator is used to get the _____ tuples
1. Different
2. Common
3. All
4. Repeating
Ans.: 2

-------------------------------------------------------------------------

Solve of MP and Com. A, DE

Q1. An n-bit microprocessor has
1. n-bit program counter
2. n-bit address registers
3. n-bit ALU
4. n-bit instruction registers
Ans.: 4Q2. Cache memory works on the principle of
1. Locality of data
2. Locality of memory
3. Locality of reference
4. Locality of reference & memory
Ans.: 3Q3. Status bit is also called
1. Binary bit
2. Flag bit
3. Signed bit
4. Unsigned bit
Ans.: 2Q4. An address in main memory is called
1. Physical address
2. Logical address
3. Memory address
4. Word address
Ans.: 1Q5. According to Boolean algebra the value of (A+AB).(B+AB) is
1. A
2. B
3. AB
4. 1
Ans.: 3Q6. Boolean algebra can be used ____
1. For designing of the digital computers
2. In building logic symbols
3. Circuit theory
4. Building algebraic functions
Ans.: 1Q7. The instruction, MOV AX, 0005H belongs to the address mode
1. register
2. direct
3. immediate
4. register relative
Ans.: 3Q8. The instruction, MOV AX, [2500H] is an example of
1. immediate addressing mode
2. direct addressing mode
3. indirect addressing mode
4. register addressing mode
Ans.: 2Q9. 8085 has how many bit address line?
1. 8
2. 16
3. 32
4. 10
Ans.: 2Q10. 8086 how many bit processor?
1. 8
2. 16
3. 32
4. 64
Ans.: 2Q11. The instruction, MOV AX,[BX] is an example of
1. direct addressing mode
2. register addressing mode
3. register relative addressing mode
4. register indirect addressing mode
Ans.: 4Q12. Which component count the next instruction?
1. Register
2. PC
3. RAM
4. None
Ans.: 2Q13. Which of following is the hazard?
1. Data hazard
2. Structure Hazard
3. Control hazard
4. All
Ans.: 4Q14. Register which is store value for operation is called
1. Arithmetic register
2. Accumulator
3. logical register
4. Controller
Ans.: 2Q15. how many bit address bus of 8086?
1. 8
2. 32
3. 16
4. 20
Ans.: 4

-------------------------------------------------------------------------------------










No comments:

Post a Comment