Sunteți pe pagina 1din 7

SBI SO Eve-Shift Q&A; (based on memory)

1.which two files are used during operation of the DBMS?Ans:data dictionary and
transaction log

2.Fragmentation is -Ans: fragments of memory words unused in a page

3.Virtual memory is -Ans: an illusion of an extremely large memory

4.Access time of symbol table will be logarithmic if it is implemented using Ans: Search
Trees

5.Manager's salary details are to be hidden from Employee Table. This Technique is
called as(UGC NET)Ans: External level Datahiding or Conceptual level hiding(?)

6.Which of the following addresses is used to deliver a message to the correct


application program running on a host?(UGC NET)Ans: Port

7.In classful addressing, the IP address 190.255.254.254 belongs to(UGC NET)Ans:


Class B

8.While estimating the cost of software, Lines of Code (LOC) and Function Points (FP)
are used to measure which one of the following?(UGC NET)Ans: Size of software

9.Page stealing is_____Ans: Taking page frame from another working set

10.XOR Gate is ideal for testing parity because even parity produce____ and odd parity
produce____ output?Ans: Low,High(as in Indiabix site)

11.Question related to Data link layer error detectionAns: Cyclic Redundancy check

12.Virus __Ans:Vital Information Resource under siege

13. Eclipse in ER diagram represents___Ans: Attributes

14. Similar term for related recordsAns: File

15. Railway track best suits___Ans: Half-Duplex

16. students and course enrolled relationship ofAns: Many to Many (Doubtful whether
the question was Student to course relation?)

17.Tuple is a Ans: Row level attribute

18.A table is synonym for___Ans: Relation

19. Thrasing is most significantly affected by___Ans: Program structure(?)

20.End to end and Host to Host delivery is a reposibility of ___ LayerAns: Transport
Layer

21. Device which Compiles the code in system which wil be used in another systemAns:
Cross compiler

22.First operator used in microprocessor is__(Question is wrong it seems. Operating


system should be in place of operator )Ans: CP/M

23. What is multiprogrmming operating system?Ans: Single user can run mulpile
programs

24. three types of authorities of user category can be updated using which command
chuser,chgrp,cat.Ans:?

25. What uses 7 bits to represent each characterAns: Ascii

26. Data integrity conrol is__Ans: has the data dictionary keep the date and time of last
access last
back-up, and most recent modification for all files

27.There are certain packages that allow people to define data items, place these items
in particular records, combine the records into designated files and then manipulate and
retrieve the stored data. What are they called?Ans: DBMS

28.Which of the following derivations does a bottom-up parser use while parsing an
input string ? The input is scanned from left to right.

29.Compiler is preferred over intrepretter because


A. It can generate stand-alone programs that often take less time for execution.
B. It is much helpful in the initial stages of program development.
C. Debugging can be faster and easier.
D. If one changes a statement, only that statement needsrecompilation.
Ans: (B)It can generate stand-alone programs that often take less timefor execution.(?)

30.What utility do you use to transfer files and exchange messages?Ans : EMAIL

31.The main difference between a DFSA and an NDFSA isAns: in DFSA, from any
given state, there can't be any alphabet leading to two diferent states

32.190.255.254.254 is of which classAns Class B

33.The number of instructions needed to add 'n' numbers and store the result in
memory usingonly one address instruction isA)N+1 B)N-1 c)independent of nAns : A or
C (?)

34.From a given tautology, another tautology can be derived by interchanging.A). 0 and


1B) And and ORC) 0 and 1; ANd and ORD) Impossible to deriveAns: C

35.Number of symbols necessary to simulate a TM with m symbols and n states isANs:


4mn +m

1. DNS - SNMP
2. FUNCTIONAL DEPENDENCIES - Attributes
3. two tables can link thorugh - Foreign key
4. foreign key obtained from - Candidate key
5. Distributed system - resource sharing
6. Sql - structured query language
7. correct order -Select from where
8. to eliminate duplicates -Distinct
9. belady's anomaly -Fifo
10. bubble sort -400
11. binary tree with n nodes ,how many nodes will have degree 2 : N-1
12. 2*1 MUX 2POWER10 *1 - 1023
13. HUB- PHYSICAL LAYER
14. TRANSPORT- INTERACTS USER AND NETWORK LAYER

15. TRANSPORT -HOST TO HOST LAYER


16. RELATIONAL ALGEBRA AND CALUCLUS- PROCEDURAL AND NON
PROCEDURAL
17. ISP- INTERNET SERVICE PROVIDER
18. HUMAN INTERVENTION T TOPLOGY
19. QUARTER ADDER- ?
20. HALF ADDER- ?
21. OS doesnt do COMPILATION
22. DEGREE - COLUMN
23. which desnt require memory for operands -IMMEDIATE ADDRESSING
24. PAGING - SEGMENTATION
25. APPLICATION SOFTWARE- WORD,EXCEL
26. OR GATE USING NAND GATE - 3
27. Flip flops divide frequency by - N
28 Good for real time systems - PREEMPTIVE scheduling
29 ADD X,Y - INDEX addressing
30 CANONICAL COVER,A-BC,B-C,AB-C,A-B - ?
31 DIRTY BIT - last memory changes
32 LOGN- ?
33 CLASS C - highest no. of network
34 SUBNET ADDRESS - ?
35 LOW MODULE COUPLING , HIGH MODULE COHESION
36. Stack pointer,self pointer - ?
37. NAND,NOR,XOR,XNOR-4- ?

S-ar putea să vă placă și