Solve of Final Test- C,OOPQ1. Which is valid C expression?
1. int my_num = 100,000;2. int my_num = 100000;
3. int my num = 1000;
4. int $my_num = 10000;
Ans.: 2Q2. Which of the following cannot be a variable name in C?
1. true
2. friend
3. export
4. volatile
Ans.: 4Q3. What is the result of logical or relational expression in C?
1. True or False
2. 0 or 1
3. 0 if an expression is false and any positive number if an expression is tru
4. None
Ans.: 2Q4. User-defined data type can be derived by____
1. struct
2. enum
3. typedef
4. all of the mentioned
Ans.: 4Q5. %lf access specifier is used for __
1. Strings
2. Integral types
3. Long float
4. char
Ans.: 3Q6. output? for(i=1;i<=10;i++);
1. 9
2. 1->10
3. 11
4. 12
Ans.: 3Q7. The pragma __________ is used to remove an identifier completely from a program.
1. GNU piston
2. GCC poison
3. GNU poison
4. GCC piston View Answer
Ans.: 2Q8. How many private member functions are allowed in a class?
1. Only 1
2. Only 7
3. Only 255
4. As many as required
Ans.: 4Q9. If data members are private, what can we do to access them from the class object?
1. Create public member functions to access those data members
2. Create private member functions to access those data members
3. Create protected member functions to access those data members
4. Private data members can never be accessed from outside the class
Ans.: 1Q10. Which feature can be implemented using encapsulation?
1. Inheritance
2. Abstraction
3. Polymorphism
4. Overloading
Ans.: 2Q11. Encapsulation helps in writing ___________ classes in java.
1. Mutable
2. Abstract
3. Wrapper
4. Immutable
Ans.: 4Q12. Using encapsulation data security is ___
1. Not ensured
2. Ensured to some extent
3. Purely ensured
4. Very low
Ans.: 2Q13. Which constructor is called while assigning some object with another?
1. Default
2. Parameterized
3. Copy
4. Direct assignment is used
Ans.: 3Q14. Which specifier applies only to the constructors?
1. Public
2. Protected
3. Implicit
4. Explicit
Ans.: 4Q15. Which specifier applies only to the constructors?
1. Public
2. Protected
3. Implicit
4. Explicit
Ans.: 4Q16. Which among the following function can be called without arguments?
1. void add(int x, int y=0)
2. void add(int=0)
3. void add(int x=0, int y=0)
4. void add(char c)
Ans.: 3
-----------------------------------------------------------------------------------------------------------------
Solve of security and dbms-1 |
Q1. ____ is a popular tool used for discovering networks as well as in security auditing. 1. Ettercap 2. Metasploit 3. Nmap 4. Burp Suit Ans.: 3 |
Q2. Which of the below-mentioned tool is used for Wi-Fi hacking? 1. Wireshark 2. Nessus 3. Aircrack-ng 4. Snort Ans.: 3 |
Q3. The full form of Malware is ___ 1. Malfunctioned Software 2. Multipurpose Software 3. Malicious Software 4. Malfunctioning of Security Ans.: 3 |
Q4. This attack can be deployed by infusing a malicious code in a website’s comment section. What is “this” attack referred to here? 1. SQL injection 2. HTML Injection 3. Cross Site Scripting (XSS) 4. Cross Site Request Forgery (XSRF) Ans.: 3 |
Q5. Which method of hacking will record all your keystrokes? 1. Keyhijacking 2. Keyjacking 3. Keylogging 4. Keyboard monitoring Ans.: 3 |
Q6. When you use the word _____ it means you are protecting your data from getting disclosed. 1. Confidentiality 2. Integrity 3. Authentication 4. Availability Ans.: 1 |
Q7. __ ensures the integrity and security of data that are passing over a network. 1. Firewall 2. Antivirus 3. Pentesting Tools 4. Network-security protocols Ans.: 4 |
Q8. Which of the following is not a strong security protocol? 1. HTTPS 2. SSL 3. SMTP 4. SFTP Ans.: 3 |
Q9. Which of the join operations do not preserve non matched tuples? 1. Left outer join 2. Right outer join 3. Inner join 4. Natural join Ans.: 3 |
Q10. How many join types in join condition: 1. 2 2. 5 3. 3 4. 4 Ans.: 2 |
Q11. A _________ consists of a sequence of query and/or update statements. 1. Transaction 2. Commit 3. Rollback 4. Flashback Ans.: 1 |
Q12. To include integrity constraint in an existing relation use : 1. Create table 2. Modify table 3. Alter table 4. Drop table Ans.: 3 |
----------------------------------------------------------
Solve of Final Test-3 |
Q1. In UNIX. the login prompt can be changed by changing the content of the file - 1. getydefs 2. contrab 3. initab 4. init Ans.: 2 |
Q2. Which O/S is recommended for real time system? 1. Windows 2. Unix 3. Oracle 4. C/OS Ans.: 1 |
Q3. In operating system, each process has its own ___ 1. address space and global variables 2. open files 3. pending alarms, signals and signal handlers 4. all of the mentioned Ans.: 4 |
Q4. Which one of the following is not a real time operating system? 1. VxWorks 2. Windows CE 3. RTLinux 4. Palm OS Ans.: 4 |
Q5. In UNIX, processes that have finished execution but have not yet had their status collected are known as- 1. Sleeping processes 2. Stopped processes 3. Zombie processes 4. Orphan processes Ans.: 3 |
Q6. The maximum number of processes that can be in ready state in computer system with n CPU’s is 1. n 2. n2 3. 2n 4. indepent of n Ans.: 4 |
Q7. The systems which allow only one process execution at a time, are called __ 1. uniprogramming systems 2. uniprocessing systems 3. unitasking systems 4. none of the mentioned Ans.: 2 |
Q8. The number of processes completed per unit time is known as ___ 1. Output 2. Throughput 3. Efficiency 4. Capacity Ans.: 2 |
Q9. Which of the following is not the state of a process? 1. New 2. Old 3. Waiting 4. Running Ans.: 2 |
Q10. What is a Process Control Block? 1. Process type variable 2. Data Structure 3. A secondary storage section 4. A Block in memory Ans.: 2 |
Q11. What is the objective of multiprogramming? 1. Have some process running at all times 2. Have multiple programs waiting in a queue ready to run 3. To minimize CPU utilization 4. None of the mentioned Ans.: 1 |
Q12. Which of the following does not interrupt a running process? 1. A device 2. Timer 3. Scheduler process 4. Power failure Ans.: 3 |
--------------------------------------------------------------------------
Solve of Final Test-DS |
Q1. How do you initialize an array in C? 1. int arr[3] = (1,2,3); 2. int arr(3) = {1,2,3}; 3. int arr[3] = {1,2,3}; 4. int arr(3) = (1,2,3); Ans.: 3 |
Q2. What are the advantages of arrays? 1. Objects of mixed data types can be stored 2. Elements in an array cannot be sorted 3. Index of first element of an array is 1 4. Easier to store elements of same data type Ans.: 4 |
Q3. The data structure required to check whether an expression contains balanced parenthesis is? 1. Stack 2. Queue 3. Array 4. Tree Ans.: 1 |
Q4. The postfix form of A*B+C/D is? 1. *AB/CD+ 2. AB*CD/+ 3. A*BC+/D 4. ABCD+/* Ans.: 2 |
Q5. In linked list each node contain minimum of two fields. One field is data field to store the data second field is? 1. Pointer to character 2. Pointer to integer 3. Pointer to node 4. Node Ans.: 3 |
Q6. The number of edges from the node to the deepest leaf is called _________ of the tree. 1. Height 2. Depth 3. Length 4. Width Ans.: 1 |
Q7. Which is true for binary search ? 1. Divide and conquer algorithm 2. Traversal scheme 3. Greedy algorithm 4. None Ans.: 3 |
Q8. Which of the following properties is associated with a queue? 1. First In Last Out 2. First In First Out 3. Last In First Out 4. Last In Last Out Ans.: 2 |
Q9. What is the time complexity of enqueue operation? 1. O(logn) 2. O(nlogn) 3. O(n) 4. O(1) Ans.: 4 |
Q10. In a max-heap, element with the greatest key is always in the which node? 1. Leaf node 2. First node of left sub tree 3. root node 4. First node of right sub tree Ans.: 3 |
Q11. Which of the following statements for a simple graph is correct? 1. Every path is a trail 2. Every trail is a path 3. Every trail is a path as well as every path is a trail 4. Path and trail have no relation Ans.: 1 |
Q12. Time complexity of binary search? 1. O(1) 2. O(logn) 3. O((logn) 2 ) 4. O(n) Ans.: 2 |
Q13. Graph is the data structure of ---- type 1. Linear 2. Non linear 3. Both 4. None Ans.: 2 |
Q14. Linked lists are not suitable to for the implementation of? 1. Insertion sort 2. Radix sort 3. Polynomial manipulation 4. Binary search Ans.: 4 |
Q15. In Linked List implementation, a node carries information regarding ____ 1. Data 2. Link 3. Data and Link 4. Node Ans.: 2 |
------------------------------------------------------------------------------------
Solve of Final DBMS |
Q1. A relational database consists of a collection of 1. Tables 2. Fields 3. Records 4. Keys Ans.: 1 |
Q2. The term _______ is used to refer to a row. 1. Attribute 2. Tuple 3. Field 4. Instance Ans.: 2 |
Q3. A domain is atomic if elements of the domain are considered to be ______ units. 1. Different 2. Indivisbile 3. Constant 4. Divisible Ans.: 2 |
Q4. Which one of the following is a procedural language? 1. Domain relational calculus 2. Tuple relational calculus 3. Relational algebra 4. Query language Ans.: 3 |
Q5. A _ is a pictorial depiction of the schema of a database that shows the relations in the database, their attributes, and primary keys and foreign keys 1. Schema diagram 2. Relational algebra 3. Database diagram 4. Schema flow Ans.: 1 |
Q6. Create table employee (name varchar,id integer). What type of statement is this? 1. DML 2. DDL 3. View 4. Integrity constraint Ans.: 2 |
Q7. Which one is design language? 1. DDL 2. DML 3. Both a & b 4. None Ans.: 1 |
Q8. Repeated data exist at-- 1. unnormalized 2. 1NF 3. 2NF 4. 3NF Ans.: 1 |
Q9. Which forms are based on the concept of functional dependency: 1. 1NF 2. 2NF 3. 3NF 4. 4NF Ans.: 3 |
Q10. The “all-or-none” property is commonly referred to as ______ 1. Isolation 2. Durability 3. Atomicity 4. None of the mentioned Ans.: 3 |
Q11. The result of a SQL SELECT statement is a ________ 1. file 2. report 3. table 4. form Ans.: 3 |
Q12. All of the following logical connectives are included in SQL except-- 1. And 2. or 3. nor 4. not Ans.: 3 |
Q13. Which of the following group functions ignore NULL values? 1. MAX 2. COUNT 3. SUM 4. All of the above Ans.: 4 |
Q14. A command that lets you change one or more fields in a record is 1. Insert 2. Modify 3. Look-up 4. All of the above Ans.: 2 |
Q15. The total participation by entities is represented in E-R diagram as 1. Dashed line 2. Double line 3. Double rectangle 4. Circle Ans.: 2 |
-----------------------------------------------------------------------
Solve of Final Test-2 |
Q1. Class is pass by __ 1. Value 2. Reference 3. Value or Reference, depending on program 4. Copy Ans.: 2 |
Q2. Which is known as a generic class? 1. Abstract class 2. Final class 3. Template class 4. Efficient Code Ans.: 3 |
Q3. When an object is returned by a function, a ___ is automatically created to hold the return value. 1. Temporary object 2. Virtual object 3. New object 4. Data member Ans.: 1 |
Q4. How many objects can be returned at once? 1. Only 1 2. Only 2 3. Only 16 4. As many as required Ans.: 1 |
Q5. How many basic types of inheritance are provided as OOP feature? 1. 1 2. 2 3. 3 4. 4 Ans.: 4 |
Q6. Which programming language doesn’t support multiple inheritance? 1. C++ and Java 2. C and C++ 3. Java and SmallTalk 4. Java Ans.: 4 |
Q7. What is the value of the postfix expression 6 3 2 4 + – *: 1. -18 2. 6 3. 7 4. 8 Ans.: 1 |
Q8. A queue follows _____ 1. FIFO (First In First Out) principle 2. LIFO (Last In First Out) principle 3. Ordered array 4. Linear tree Ans.: 1 |
Q9. Viruses which executes when computer starts is 1. macro 2. file infector 3. boot sector 4. salami shaving Ans.: 3 |
Q10. Which of the following is not a type of virus? 1. Boot sector 2. Polymorphic 3. Multipartite 4. Trojans Ans.: 4 |
Q11. ___ has many of the characteristics of what is now being called cloud computing. 1. Internet 2. Softwares 3. Web Service 4. All of the mentioned Ans.: 1 |
Q12. Which of the following is Cloud Platform by Amazon? 1. Azure 2. AWS 3. Cloudera 4. All of the mentioned Ans.: 2 |
Q13. The subset of a super key is a candidate key under what condition? 1. No proper subset is a super key 2. All subsets are super keys 3. Subset is a super key 4. Each subset is a super key Ans.: 1 |
Q14. Which one of the following cannot be taken as a primary key? 1. Id 2. Register number 3. Dept_id 4. Street Ans.: 4 |
Q15. Storage which stores or retains data after power off is called- 1. Volatile storage 2. Non-volatile storage 3. Sequential storage 4. Direct storage Ans.: 2 |
----------------------------------------------------------------
Solve of Final Test-1 |
Q1. A distributed database has which of the following advantages over a centralized database? 1. Software cost 2. Software complexity 3. Slow Response 4. Modular growth Ans.: 4 |
Q2. Storing a separate copy of the database at multiple locations is which of the following? 1. Data Replication 2. Horizontal Partitioning 3. Vertical Partitioning 4. Horizontal and Vertical Partitioning Ans.: 1 |
Q3. The field that covers a variety of computer networks, both public and private, that are used in everyday jobs. 1. Artificial Intelligence 2. ML 3. Network Security 4. IT Ans.: 3 |
Q4. Which is not an objective of network security? 1. Identification 2. Authentication 3. Access control 4. Lock Ans.: 4 |
Q5. Which of these is a part of network identification? 1. UserID 2. Password 3. OTP 4. fingerprint Ans.: 1 |
Q6. The process of verifying the identity of a user. 1. Authentication 2. Identification 3. Validation 4. Verification Ans.: 1 |
Q7. An algorithm in encryption is called ____ 1. Algorithm 2. Procedure 3. Cipher 4. Module Ans.: 3 |
Q8. The information that gets transformed in encryption is _____ 1. Plain text 2. Parallel text 3. Encrypted text 4. Decrypted text Ans.: 1 |
Q9. A small program that changes the way a computer operates. 1. Worm 2. Trojan 3. Bomb 4. Virus Ans.: 4 |
Q10. A program that copies itself. 1. Worm 2. Virus 3. Trojan 4. Bomb Ans.: 1 |
Q11. An attack in which the site is not capable of answering valid request. 1. Smurfing 2. Denial of service 3. E-mail bombing 4. Ping storm Ans.: 2 |
Q12. Which keyword must be used here to rename the field name? 1. From 2. Rename 3. As 4. Join Ans.: 3 |
Q13. ’_ _ _ ’ matches any string of ______ three characters. ’_ _ _ %’ matches any string of at ______ three characters. 1. Atleast, Exactly 2. Exactly, Atleast 3. Atleast, All 4. All, Exactly Ans.: 2 |
Q14. In the __________ normal form, a composite attribute is converted to individual attributes. 1. First 2. Second 3. Third 4. Fourth Ans.: 1 |
Q15. Tables in second normal form (2NF): 1. Eliminate all hidden dependencies 2. Eliminate the possibility of a insertion anomalies 3. Have a composite key 4. Have all non key fields depend on the whole primary key Ans.: 1 |
--------------------------------------------------------
Solve of All Topics-1 |
Q1. The Name box on to the left of formula bar 1. Shows the name of workbook currently working on 2. Shows the name of worksheet currently working on 3. Shows the name of cell or range currently working on 4. None of above Ans.: 3 |
Q2. The Second Generation Computer was based on ________ ? 1. Vacuum tube 2. Silicon chips 3. Transistor 4. Bio chips Ans.: 3 |
Q3. Which of the following programming language started from second generation ? 1. Cobol 2. BASIC 3. C 4. LISP Ans.: 3 |
Q4. Which of the following is not a valid variable name declaration? 1. int _a3; 2. int a_3; 3. int 3_a; 4. int _3a Ans.: 3 |
Q5. Which keyword is used to prevent any changes in the variable within a C program? 1. immutable 2. const 3. volatile 4. mutable Ans.: 2 |
Q6. Which of the following is not a pointer declaration? 1. char a[10]; 2. char a[] = {‘1’, ‘2’, ‘3’, ‘4’}; 3. char *str; 4. char a; Ans.: 4 |
Q7. Which of the following indicates the maximum number of entities that can be involved in a relationship? 1. Minimum cardinality 2. Maximum cardinality 3. ERD 4. Greater Entity Count (GEC) Ans.: 2 |
Q8. x has a certain average for 9 innings. In the tenth innings, he scores 100 runs thereby increasing his average by 8 runs. His new average is: 1. 21 2. 22 3. 32 4. 28 Ans.: 4 |
Q9. Protocols are 1. Agreements on how communication components and DTE 2. Logical communication channels used for transferri 3. Physical communication channels used for transferr 4. None of the above Ans.: 1 |
Q10. The topology with highest reliability is: 1. Bus topology 2. Star topology 3. Ring topology 4. Mesh topology Ans.: 4 |
Q11. A data communications system has: 1. 4 components 2. 5 components 3. 6 components 4. 7 components Ans.: 2 |
Q12. Which operator performs pattern matching? 1. BETWEEN operator 2. LIKE operator 3. EXISTS operator 4. None of these Ans.: 2 |
Q13. The class at the top of exception class hierarchy is ........... 1. ArithmeticException 2. Throwable 3. Object 4. Exception Ans.: 2 |
Q14. Choose the correct tag for largest heading in HTML. 1. h6 2. heading 3. h1 4. head Ans.: 3 |
Q15. The earth is at the largest distance from the sun (Apehelion) on _ 1. June 21st 2. January 3rd 3. July 4th 4. September 23rd Ans.: 3 |
------------------------------------------------------------
Solve of Data Structure 3 |
Q1. How do you initialize an array in C? 1. int arr[3] = (1,2,3); 2. int arr(3) = {1,2,3}; 3. int arr[3] = {1,2,3}; 4. int arr(3) = (1,2,3); Ans.: 3 |
Q2. What are the advantages of arrays? 1. Objects of mixed data types can be stored 2. Elements in an array cannot be sorted 3. Index of first element of an array is 1 4. Easier to store elements of same data type Ans.: 4 |
Q3. Process of inserting an element in stack is called _____ 1. Create 2. Push 3. Evaluation 4. Pop Ans.: 2 |
Q4. What is the worst case time complexity of linear search algorithm? 1. O(1) 2. O(log n) 3. O(n) 4. O(n2) Ans.: 4 |
Q5. Which of the following asymptotic notation is the worst among all? 1. O(n+2) 2. O(n!) 3. O(n2) 4. O(n+2456) Ans.: 2 |
Q6. Identify the infix expression from the list of options given below. 1. a/b+(c-d) 2. abc*+d+ab+cd+*ce-f- 3. ab-c- 4. +ab Ans.: 1 |
Q7. a/b+c*d where a=4, b=2, c=2, d=1. 1. 1 2. 3 3. 4 4. 5 Ans.: 3 |
Q8. Which of the following is not possible with an array in C programming langauge − 1. Declaration 2. Definition 3. Dynamic Allocation 4. Array of strings Ans.: 3 |
Q9. Which of the following data structure is non-linear type? 1. Strings 2. Lists 3. Stacks 4. None of these Ans.: 4 |
Q10. The complexity of merge sort algorithm is 1. O(n) 2. O(log n) 3. O(n2) 4. O(n log n) Ans.: 4 |
Q11. What does ‘stack underflow’ refer to? 1. accessing item from an undefined stack 2. adding items to a full stack 3. removing items from an empty stack 4. index out of bounds exception Ans.: 3 |
Q12. Which of the following is not the type of queue? 1. Ordinary queue 2. Single ended queue 3. Circular queue 4. Priority queue Ans.: 2 |
Q13. push(1), push(2), pop, push(1), push(2), pop, pop, pop, push(2) 1. 2 2 1 1 2 2. 2 2 1 2 1 3. 2 2 2 2 1 4. 2 2 2 1 2 Ans.: 1 |
Q14. What is the value of the postfix expression 6 3 2 4 + – * 1. Something between -5 and -15 2. Something between 5 and -5 3. Something between 5 and 15 4. Something between 15 and 100 Ans.: 4 |
Q15. … is not the component of data structure. 1. Operations 2. Storage Structures 3. Algorithms 4. None of above Ans.: 4 |
-------------------------------------------------------------
Solve of Basic Fundamental-2 |
Q1. Which protocol provides e-mail facility among different hosts? 1. FTP 2. SMTP 3. TELNET 4. SNMP Ans.: 2 |
Q2. The basic architecture of computer was developed by 1. John Von Neumann 2. Charles Babbage 3. Blaise Pascal 4. Garden Moore Ans.: 1 |
Q3. In how many generations a computer can be classified? 1. 3 2. 4 3. 5 4. 6 Ans.: 3 |
Q4. Graphical pictures that represent an object like file, folder etc are: 1. Task bar 2. Windows 3. Icons 4. Desktop Ans.: 3 |
Q5. The binary number 1110 in hexadecimal format is ____ 1. 6 2. E 3. 14 4. 15 Ans.: 2 |
Q6. What is the correct association between a hardware component and a computer function? 1. Monitor > input 2. Mouse > input 3. CPU > storage 4. Hard disk > processing Ans.: 2 |
Q7. Which of the following is not a data type? 1. Symbolic Data 2. Alphanumeric Data 3. Numeric Data 4. Alphabetic Data Ans.: 1 |
Q8. What does FORTRAN stands for? 1. Formula Transfer 2. Formula Transformation 3. Formula Translation 4. Format Transformation Ans.: 3 |
Q9. A standardized language used for commercial applications. 1. C 2. JAVA 3. Fortan 4. Cobol Ans.: 4 |
Q10. Who invented QWERTY keyboard? 1. Christopher Latham 2. Anderson Palimar 3. Brian saim 4. Ada Biron Ans.: 1 |
Q11. which is only output devices 1. Monitor 2. Touch Screan 3. Speaker 4. Mouse Ans.: 3 |
Q12. ___ define how the locations can be used. 1. Data types 2. Attributes 3. Links 4. Data Objects Ans.: 2 |
Q13. which memory is never erased? 1. Bios 2. SRAM 3. DRAM 4. ROM Ans.: 4 |
Q14. which of the following can be implemented using NAND gate? 1. Half adder 2. OR gate 3. AND gate 4. ALL Ans.: 4 |
Q15. Which type of ROM used in pen drive? 1. Mask ROM 2. EPROM 3. EEPROM 4. PROM Ans.: 3 |
---------------------------------------------
Solve of Basic Fundamental-2 |
Q1. Which protocol provides e-mail facility among different hosts? 1. FTP 2. SMTP 3. TELNET 4. SNMP Ans.: 2 |
Q2. The basic architecture of computer was developed by 1. John Von Neumann 2. Charles Babbage 3. Blaise Pascal 4. Garden Moore Ans.: 1 |
Q3. In how many generations a computer can be classified? 1. 3 2. 4 3. 5 4. 6 Ans.: 3 |
Q4. Graphical pictures that represent an object like file, folder etc are: 1. Task bar 2. Windows 3. Icons 4. Desktop Ans.: 3 |
Q5. The binary number 1110 in hexadecimal format is ____ 1. 6 2. E 3. 14 4. 15 Ans.: 2 |
Q6. What is the correct association between a hardware component and a computer function? 1. Monitor > input 2. Mouse > input 3. CPU > storage 4. Hard disk > processing Ans.: 2 |
Q7. Which of the following is not a data type? 1. Symbolic Data 2. Alphanumeric Data 3. Numeric Data 4. Alphabetic Data Ans.: 1 |
Q8. What does FORTRAN stands for? 1. Formula Transfer 2. Formula Transformation 3. Formula Translation 4. Format Transformation Ans.: 3 |
Q9. A standardized language used for commercial applications. 1. C 2. JAVA 3. Fortan 4. Cobol Ans.: 4 |
Q10. Who invented QWERTY keyboard? 1. Christopher Latham 2. Anderson Palimar 3. Brian saim 4. Ada Biron Ans.: 1 |
Q11. which is only output devices 1. Monitor 2. Touch Screan 3. Speaker 4. Mouse Ans.: 3 |
Q12. ___ define how the locations can be used. 1. Data types 2. Attributes 3. Links 4. Data Objects Ans.: 2 |
Q13. which memory is never erased? 1. Bios 2. SRAM 3. DRAM 4. ROM Ans.: 4 |
Q14. which of the following can be implemented using NAND gate? 1. Half adder 2. OR gate 3. AND gate 4. ALL Ans.: 4 |
Q15. Which type of ROM used in pen drive? 1. Mask ROM 2. EPROM 3. EEPROM 4. PROM Ans.: 3 |
-----------------------------------------------------------
Solve of DBMS-2Q1. The __ clause allows us to select only those rows in the result relation of the __ clause that satisfy a specified predicate.
1. Where, from
2. From, select
3. Select, from
4. From, where
Ans.: 1Q2. The ___ clause is used to list the attributes desired in the result of a query.
1. Where
2. Select
3. From
4. Distinct
Ans.: 2Q3. Using which language can a user request information from a database?
1. Query
2. Relational DBMS
3. Structural
4. Compiler
Ans.: 1Q4. In which state one gathers and list all the necessary fields for the database design project.
1. Data Definition
2. Data Refinement
3. Establishing Relationship
4. None Of The Above
Ans.: 1Q5. Which database object is ideal to view, change, andanalyze datain different ways ?
1. Table
2. Form
3. Query
4. Report
Ans.: 3Q6. It is used to establish an association between related tables.
1. Line
2. Relationship
3. Primary Key
4. Records
Ans.: 2Q7. Which name must be unique within a database ?
1. Table
2. Field
3. Record
4. Character
Ans.: 1Q8. The third stage of designing a database is when we create___ between tables
1. Relationship
2. Join
3. Query
4. None of These
Ans.: 1Q9. Two tables can be linked with relationship to ___
1. Ensure Foreign Key
2. Ensure data integrity
3. Create Primary Key
4. Ensure data entry
Ans.: 4Q10. Which of the following fields has a width of 8 bytes?
1. Memo
2. Date/time
3. Number
4. Hyperlink
Ans.: 2Q11. which of the following is not a database object?
1. Tables
2. Queries
3. Relationships
4. Reports
Ans.: 3Q12. Which of the following is not a database model
1. Network Database Model
2. Relational Database Model
3. Object Oriented Database Model
4. None
Ans.: 4Q13. A data dictionary is a repository that manages __
1. Memory
2. Metadata
3. Spell Checker
4. Data Validator
Ans.: 2Q14. The ___operation performs a set union of two similarly structured tables
1. Union
2. Join
3. Product
4. Intersect
Ans.: 1Q15. The intersection operator is used to get the _____ tuples
1. Different
2. Common
3. All
4. Repeating
Ans.: 2
1. Where, from
2. From, select
3. Select, from
4. From, where
Ans.: 1Q2. The ___ clause is used to list the attributes desired in the result of a query.
1. Where
2. Select
3. From
4. Distinct
Ans.: 2Q3. Using which language can a user request information from a database?
1. Query
2. Relational DBMS
3. Structural
4. Compiler
Ans.: 1Q4. In which state one gathers and list all the necessary fields for the database design project.
1. Data Definition
2. Data Refinement
3. Establishing Relationship
4. None Of The Above
Ans.: 1Q5. Which database object is ideal to view, change, andanalyze datain different ways ?
1. Table
2. Form
3. Query
4. Report
Ans.: 3Q6. It is used to establish an association between related tables.
1. Line
2. Relationship
3. Primary Key
4. Records
Ans.: 2Q7. Which name must be unique within a database ?
1. Table
2. Field
3. Record
4. Character
Ans.: 1Q8. The third stage of designing a database is when we create___ between tables
1. Relationship
2. Join
3. Query
4. None of These
Ans.: 1Q9. Two tables can be linked with relationship to ___
1. Ensure Foreign Key
2. Ensure data integrity
3. Create Primary Key
4. Ensure data entry
Ans.: 4Q10. Which of the following fields has a width of 8 bytes?
1. Memo
2. Date/time
3. Number
4. Hyperlink
Ans.: 2Q11. which of the following is not a database object?
1. Tables
2. Queries
3. Relationships
4. Reports
Ans.: 3Q12. Which of the following is not a database model
1. Network Database Model
2. Relational Database Model
3. Object Oriented Database Model
4. None
Ans.: 4Q13. A data dictionary is a repository that manages __
1. Memory
2. Metadata
3. Spell Checker
4. Data Validator
Ans.: 2Q14. The ___operation performs a set union of two similarly structured tables
1. Union
2. Join
3. Product
4. Intersect
Ans.: 1Q15. The intersection operator is used to get the _____ tuples
1. Different
2. Common
3. All
4. Repeating
Ans.: 2
-------------------------------------------------------------------------
Solve of MP and Com. A, DE
Q1. An n-bit microprocessor has
1. n-bit program counter
2. n-bit address registers
3. n-bit ALU
4. n-bit instruction registers
Ans.: 4Q2. Cache memory works on the principle of
1. Locality of data
2. Locality of memory
3. Locality of reference
4. Locality of reference & memory
Ans.: 3Q3. Status bit is also called
1. Binary bit
2. Flag bit
3. Signed bit
4. Unsigned bit
Ans.: 2Q4. An address in main memory is called
1. Physical address
2. Logical address
3. Memory address
4. Word address
Ans.: 1Q5. According to Boolean algebra the value of (A+AB).(B+AB) is
1. A
2. B
3. AB
4. 1
Ans.: 3Q6. Boolean algebra can be used ____
1. For designing of the digital computers
2. In building logic symbols
3. Circuit theory
4. Building algebraic functions
Ans.: 1Q7. The instruction, MOV AX, 0005H belongs to the address mode
1. register
2. direct
3. immediate
4. register relative
Ans.: 3Q8. The instruction, MOV AX, [2500H] is an example of
1. immediate addressing mode
2. direct addressing mode
3. indirect addressing mode
4. register addressing mode
Ans.: 2Q9. 8085 has how many bit address line?
1. 8
2. 16
3. 32
4. 10
Ans.: 2Q10. 8086 how many bit processor?
1. 8
2. 16
3. 32
4. 64
Ans.: 2Q11. The instruction, MOV AX,[BX] is an example of
1. direct addressing mode
2. register addressing mode
3. register relative addressing mode
4. register indirect addressing mode
Ans.: 4Q12. Which component count the next instruction?
1. Register
2. PC
3. RAM
4. None
Ans.: 2Q13. Which of following is the hazard?
1. Data hazard
2. Structure Hazard
3. Control hazard
4. All
Ans.: 4Q14. Register which is store value for operation is called
1. Arithmetic register
2. Accumulator
3. logical register
4. Controller
Ans.: 2Q15. how many bit address bus of 8086?
1. 8
2. 32
3. 16
4. 20
Ans.: 4
1. n-bit program counter
2. n-bit address registers
3. n-bit ALU
4. n-bit instruction registers
Ans.: 4Q2. Cache memory works on the principle of
1. Locality of data
2. Locality of memory
3. Locality of reference
4. Locality of reference & memory
Ans.: 3Q3. Status bit is also called
1. Binary bit
2. Flag bit
3. Signed bit
4. Unsigned bit
Ans.: 2Q4. An address in main memory is called
1. Physical address
2. Logical address
3. Memory address
4. Word address
Ans.: 1Q5. According to Boolean algebra the value of (A+AB).(B+AB) is
1. A
2. B
3. AB
4. 1
Ans.: 3Q6. Boolean algebra can be used ____
1. For designing of the digital computers
2. In building logic symbols
3. Circuit theory
4. Building algebraic functions
Ans.: 1Q7. The instruction, MOV AX, 0005H belongs to the address mode
1. register
2. direct
3. immediate
4. register relative
Ans.: 3Q8. The instruction, MOV AX, [2500H] is an example of
1. immediate addressing mode
2. direct addressing mode
3. indirect addressing mode
4. register addressing mode
Ans.: 2Q9. 8085 has how many bit address line?
1. 8
2. 16
3. 32
4. 10
Ans.: 2Q10. 8086 how many bit processor?
1. 8
2. 16
3. 32
4. 64
Ans.: 2Q11. The instruction, MOV AX,[BX] is an example of
1. direct addressing mode
2. register addressing mode
3. register relative addressing mode
4. register indirect addressing mode
Ans.: 4Q12. Which component count the next instruction?
1. Register
2. PC
3. RAM
4. None
Ans.: 2Q13. Which of following is the hazard?
1. Data hazard
2. Structure Hazard
3. Control hazard
4. All
Ans.: 4Q14. Register which is store value for operation is called
1. Arithmetic register
2. Accumulator
3. logical register
4. Controller
Ans.: 2Q15. how many bit address bus of 8086?
1. 8
2. 32
3. 16
4. 20
Ans.: 4
-------------------------------------------------------------------------------------
No comments:
Post a Comment