Documente Academic
Documente Profesional
Documente Cultură
1)DBMS
2)ORACLE
3)COMPUTER NETWORKS
4)DATA STRUCTURE
5)SOFTWARE ENGINEERING
6)C/C++
7)OPERATING SYSTEM
8)WEB TECHNOLOGY
9)COMPUTER FUNDAMENTAL
10)MIXED QUESTIONS
studyregular.blogspot.in
DBMS SET-1
1. Rows of a relation are called ______________
(A) Entity
(B) Degree
(C) tuples
(D) None of the above
2. In SQL, Which of the following is a Data Manipulation Language
(DML) Command?
(A) Create
(B) Alter
(C) Merge
(D) Drop
3. Which of the following categories of the data integrity RDBMS
will enforce specific business rules?
(A)Entity Integrity
(B)Domain Integrity
(C)User-Defined Integrity
(D)None of the above
4. The number of tuples in a relation is termed as_____________
(A) Cardinality
(B) Entity
(C) Column
(D) None of the above
Page 2
Page 3
Page 4
Page 5
Page 6
Page 7
Page 8
Page 9
Page 10
Page 11
Page 12
Page 13
Page 14
Page 15
DBMS SET-2
1. _____ is the process of using graph theory to analyse he node and connection
structure of a Web site.
(A)Web structure mining
(B)Web content mining
(C)Web usage mining
(D)None of the above
2. The information gathered through web mining is evaluated by using ________
(A)Clustering
(B)Classification
(C)Association
(D)All of the above
Page 16
5.The process of grouping a set of objects into classes of similar objects is called
_________
(A)Clustering
(B)Classification
(C) Association
(D) All of the above
6. Which parameter is used to discover patterns in data can lead to reasonable predictio
about the future?
(A)Clustering
(B)Classification
(C)Association
(D) Forecasting
7. _________ a special type of computational cluster that is specifically designed for
storing and analyzing large amount of unstructured data
(A)Hadoop Cluster
(B)Failover Cluster
(C)Both (A) and (B)
(D)None of the Above
8.Which of the following is the process for detecting and correcting the wrong data?
(A)Data Selection
(B)Data Cleaning
(C)Data Integration
(D)None of the Above
9. An important purpose of the shared pool is to cache the executive version of _______
statements.
(A)SQL
(B)PL/SQL
Copyright By Study Regular studyregular.blogspot.in
Page 17
Page 18
17.If the parsed form of the statement is not found in the shared pool hen new statement
is parsed and its parsed version is stored is Shared SQL area.This is known as ________
(A)Library cache hit
(B)Soft parsing
(C)Hard parsing
(D)None of the above
18.Reuse of shared SQL for multiple users running the same applications avoids
________
(A)Library cache hit
(B)Soft parsing
(C)Hard parsing
(D)None of the above
19.Which of the following is/are feature(s) of Oracle 9i?
(A)Scalability
(B)Reliability
(C)One Development model
(D)All of the above
20.The shared pool is also able to support _________ in data warehousing applications.
(A)Shared SQL
(B)Stored SQL
(C)Unsorted SQL
(D)Unshared SQL
21.Which of the following is an example for Embedded SQL Statement?
(A)ROLLBACK
(B)SETROLE
(C)ALTER SYSTEM
(D)RETCH
Copyright By Study Regular studyregular.blogspot.in
Page 19
Page 20
30.What type of failure occurs when Oracle fails due to an operating system or compute
hardware failure?
(A)Application Failure
(B)Instance Failure
(C)Media Failure
(D)Roll back Failure
31.The ____________ performs recovery when a failed instance starts up again.
(A)Log Writer(LGWR)
(B)Checkpoint(CKPT)
(C)System Monitor(SMON)
(D)Process Monitor(PMON)
32. Which Oracle backup and recovery file contains user and system data?
(A)Control file
(B)Data File
(C)Offline Redo file
(D)None of the above
33.When is the System Global Area (SGA) created in Oracle database environment?
(A)When the database is created
(B)When a user process is started
(C)When the database is mounted
(D)When the instance is started
Page 21
Page 22
45.In E-R Diagram, the total participation by entities is represented as--------------------(A)Dashed Line
(B)Rectangle
(C)Double rectangle
(D)Double line
Page 23
Page 24
53. Which of the following clauses is an additional filter that is applied to the result?
(A)Having
(B)Group-by
(C)Select
(D)Order by
54. ___________ is the process of organizing data into related tables.
(A)Generalization
(B)Normalization
(C)Specialization
(D)None of the above
55. __________is the complex search criteria in the where clause.
(A)Substring
(B)Drop Table
(C)Predicate
(D)None of the above
56.Which of the following is used to determine whether of a table contains duplicate
rows?
(A)Unique Predicate
(B)Like Predicate
(C)Null Predicate
(D)In Predicate
57. An operator is basically a join followed by a project on the attributes of first relation
is know as ______________________
(A) Join
(B) Inner Join
(C)Full join
(D)Semi-join
Copyright By Study Regular studyregular.blogspot.in
Page 25
Page 26
Page 27
72. which of the following is standard interactive and programming language for getting
information from and updating a database .
(A) SQL
(B) PHP
( C) ASP
(D)None of the above
73.__________keyword sorts the record in ascending order by default.
(A) ORDER BY
(B) SORT BY
(C) SORT
(D)None of the above
74. _____________ is suitable for data warehouses that have a large number of similar
data times.
(A) Relational database Management system (RDBMS)
(B) Columnar Database Management system (CDBMS
(C) In Memory database Management System (IMDBMS)
(D). None of the above
Copyright By Study Regular studyregular.blogspot.in
Page 28
Page 29
85.Which of the following DBMS provides faster response time and better performance
(A) Relational Database Management System(RDBMS)
(B) No SQL DBMS
(C) In-Memory Database Management System(IMBDMS)
(D) None of the above
86.In SQL the spaces at the end of the string are removed by___________function ?
(A) Lower
(B) string
(C) Trim
(D)None the above
Page 30
Page 31
ORACLE
1. LGWR process writes information into
a. Database files
b. Control files
c. Redolog files
d All the above.
2. Constraints cannot be exported through EXPORT command
a. True
b False
3. We can create SNAPSHOTLOG for[DBA]
a. Simple snapshots
b. Complex snapshots
c. Both A & B,
d Neither A nor B
4 . What is the difference between a MESSAGEBOX and an ALERT
a. A messagebox can be used only by the system and cannot be
used in user application while an alert can be used in user application also.
b. A alert can be used only by the system and cannot be use din user
application while an messagebox can be used in user application also.
c. An alert requires an response from the userwhile a messagebox just
flashes a message and only requires an acknowledment from the user
d. An message box requires an response from the userwhile a alert just
flashes a message an only requires an acknowledment from the user
5. SNAPSHOT is used for [DBA]
a. Synonym
b. Table space,
c. System serve
d. Dynamic data replication
Page 32
Page 33
16. What is the difference between a LIST BOX and a COMBO BOX ?
a. In the list box, the user is restricted to selecting a value from a list but combo
box the user can type in value which is not in the list
b. A list box is a data entry area while a combo box can be used only for control
purposes
c. In a combo box, the user is restricted to selecting a value from a list but in a
list box the
user can type in a value which is not in the list
d. None of the above
17. Why is it better to use an INTEGRITY CONSTRAINT to validate data in a
table than to use a STORED PROCEDURE ?
a. Because an integrity constraint is automatically checked while data is inserted
into or updated in a table while a stored procedure has to be specifically invoked
b. Because the stored procedure occupies more space in the database than a
integrity constraint definition
c. Because a stored procedure creates more network traffic than a integrity
Copyright By Study Regular studyregular.blogspot.in
Page 34
18. Which of the following is not an reason for the fact that most of the processing
is done at the server ?
a. To reduce network traffic.
b. For application sharing
c. To implement business rules centrally,
d. None of the above
19. Which of the following is not an advantage of a client/server model ?
a. A client/server model allows centralised control of data and centralised
implementation of business rules.
b. A client/server model increases developer;s productivity
c. A client/server model is suitable for all applications
d. None of the above.
20. What does DLL stands for ?
a. Dynamic Language Library
b. Dynamic Link Library
c. Dynamic Load Library
d. None of the above
21. POST-BLOCK trigger is a
a. Navigational trigger
b. Key trigger
c .Transactional trigger
d. None of the above
22. The system variable that records the select statement that SQL * FORMS most
recently used to populate a block is
a. SYSTEM.LAST_RECORD
b.SYSTEM.CURSOR_RECORD
c. SYSTEM.CURSOR_FIELD
d. SYSTEM.LAST_QUERY
Page 35
Page 36
Page 37
Page 38
Page 39
Page 40
Page 41
Page 42
67. Declare
a number := 5; b number := null; c number := 10;
Begin
if a > b AND a ( Select count(*) from Emp E2 where E1.SAL > E2.SAL ) will
retrieve
a. 3500,5000,2500
b. 5000,2850
c. 2850,5750
d. 5000,5750
68. Is it possible to modify a Data type of a column when column contains data ?
a. Yes
b. No
69. Which of the following is not correct about a View ?
a. To protect some of the columns of a table from other users
b. Ocupies data storage space
c. To hide complexity of a query
d. To hide complexity of a calculations
70. Which of the following is NOT VALID in PL/SQL ?
a. Select into
b. Update
c. Create
d. Delete
71. The Data Manipulation Language statements are
a. INSERT
b. UPDATE
c. SELECT
d. All of the above
Page 43
Page 44
Page 45
89. When a form is invoked with CALL_FORM does Oracle forms issues
SAVEPOINT ?
a.Yes
b. No
90. Can we attach the same LOV to different fields in Design time ?
a. Yes
b. No
91. Identify the Odd one of the following statements ?
a. Poplist
b. Tlist
c. List of values
d. Combo box
Page 46
Page 47
Page 48
COMPUTER NETWORKS
1. A protocol that provides configuration information from a table is called..
A. BGP
B. BOOTP
C. FTP
D. None of the above
2. CIDR stands for
A. Code Inter Domain Routing
B. Code Inter Division Routing
C. Classless Inter Domain Routing
D.Classful Inter Domain Routing
3. The Building block of a Wireless LAN as defined by IEEE 802.11 standard ?
A.BSS
B.ESS
C.Both(A) & (B)
D.None of the above
4. A Technique in which a protocol used for address resolution is called..
A. Dynamic routing
B. Dynamic mapping
C. Exterior routing
D. None of the above
5. Which of the following converts user friendly names to IP addresses ?
A. Domain Name Space
B. Domain Name System
C. DHCP
D.None of the above
6. In PPP, A three- way handshaking protocol used for authentication is known as...
A. CHAP
B. BOOTP
C. FTP
D. None of the above
Copyright By Study Regular studyregular.blogspot.in
Page 49
7. Which of the following is an application service for the retrieving a web document ?
A. HTML
B. HTTP
C. FTP
D. None of the above
8. You are in the process of analyzing a problem that requires you to collect and store
TCP/ IP Packets.Which of the following utilities is best suited for this purpose?
A. Performance Moniter
B. Network Moniter
C. NETSTAT
D. NBTSTAT
9. A protocol in which the sender sends one frame and stops until it receives confirmat
from the receiver?
A. Stop and Wait ARQ
B. Store and forward switch
C. Stop and Wait protocol
D. None of the above
10. An addressing method in which the IP address space is not divided into classes?
A. Classful addressing
B. Classless addressing
C. Classless IDR
D.None of the above
11. The number of differences between the corresponding bits in a two data words is
known as.distance
A. Hanning
B. Hamming
C. Huffman
D. None of the above
12. An Address Resolution Protocol (ARP) request is__________
A. Unicast
B. Anycast
C. Broadcast
D. None of the above
Copyright By Study Regular studyregular.blogspot.in
Page 50
17.An array of switches that are used to reduce the number of cross points is called
A. Single stage switch
B. Dual stage switch
C.Multistage switch
D.None of the above
18. An application protocol of TCP/IP that allows remote login is known as.
A. NCP
B. NVT
C. NAV
D. None of the above
Page 51
Page 52
26. In OSI model, as the data packet moves from the upper to the lower layers, headers
are _____
A. Added
B. Removed
C. Deleted
D. Edited
27. Which of the following layer is the User Support layer?
A. Session layer
B. Presentation layer
C. Application layer
D. All of the above
28. OSI stands for
A. Open Systems Interconnection
B. Original Systems Interconnection
C. Original Security Interconnection
D. Open Software Interconnection
29. Port address in TCP/IP is..bits long
A. 16
B. 32
C. 64
D. 128
30. IEEE 802.3 standard used what method as the media access method?
A. CSMA/CD
B. CSMA/CA
C. CDMA
D. FDMA
Page 53
Page 54
40. Which of the following refers to a groups of standards that are still being developed
as a part of overall IEEE 802.11 WLAN support?
A. 802.11
B. 802.11x
C. Both (A) & (B)
D. None of the above
41. Ethernet, token ring and token bus are types of..
A. MAN
B. WAN
C. LAN
D. None
42. What is the name of network topology in which there are bidirectional links betwee
each possible node?
A. Star
B. Mesh
C. Ring
D. None
Copyright By Study Regular studyregular.blogspot.in
Page 55
44. Which TCP/IP protocol is used for file transfer with minimal capability and minim
overhead?
A. SGMP
B. TFTP
C. SUMP
D. None
45. An IPV6 address is. Bits long
A. 64
B. 128
C. 256
D. 512
46. Fiber Distributed Data interface (FDDI) is an example of which topology?
A. Star
B. Mesh
C. Ring
D. None
47. An IPV4 address is. Bits long
A. 64
B. 128
C. 256
D. 32
48. How many classes are there in IPV4 addresses?
A. 7
B. 4
C. 5
D. 6
Page 56
Page 57
Page 58
62. At which layer TCP/IP defines two protocols: Transmission control Protocol(TCP)
and Use Datagram Protocol(UDP)?
A. Transport layer
B. Application layer
C. Network layer
D. Datalink layer
63. Which of the following uses the greatest number of layers in the OSI model?
A. Bridge
B. Repeater
C. Router
D. Gateway
64. Which of the following is an example of client-server model?
A. FTP
B. DNS
C. TELNET
D. All of the above
Page 59
Page 60
76. ______ is primarily used for mapping host names and email destinations to IP
address
A. TCP
B. DNS
C. NCP
D. None
77. What is the default subnet mask for a class B network?
A. 127.0.0.1
B. 2550.0.0
C. 255.255.0.0
D. 255.255.255.0
78. What is loopback address?
A. 127.0.0.1
B. 255.0.0.0
C. 255.255.0.0
D. 127.0.0.0
Copyright By Study Regular studyregular.blogspot.in
Page 61
Page 62
88. A networking device that forwards data packets along networks and acts as a centra
point of network is called
A. Repeater
B. Router
C. Bridge
D. Hub
89. Repeater operates in which layer of OSI model?
A. application layer
B. Presentation layer
C. Physical layer
D . Transport layer
90. Where dose Bridge operate in OSI model?
A. Physical layer
B. Data link layer
C. Both (1) and (2)
D. Application layer
Page 63
94. __________ refers to a family of IEEE standards dealing with local area network a
metropolitan area network.
A. 802
B. 800
C. 801
D. 803
95. Which is the general network standard for the data link layer in the OSI Reference
Model?
A. IEEE 802.1
B. IEEE 802.2
C. IEEE 802.3
D. IEEE 802.4
96. A communication network which is used is used by large organization over region
national or global area is called______
A. LAN
B. WAN
C. MAN
D. PAN
Copyright By Study Regular studyregular.blogspot.in
Page 64
Page 65
Page 66
DATA STRUCTURE
1. In linked list , an element can be inserted at_______
(A)Beginning of the list
(B)End of the list
(C)Middle of the list
(D)Both (A) & (B)
2. The Array as an Abstract Data Type (ADT) supports .. operations.
(A)Store
(B)Retrieve
(C)Both (A) & (B)
(D)None of the above
3.Stack is also called_______
(A)Pop up array
(B)Pop down list
(C)Push down list
(D)None of the list above
4.A characteristic of the data that binary search uses but linear search ignores
is______
(A)Order of the list
(B)Length of the list
(C)Both (A) & (B)
(D)None of the above
5.Sequential representation of binary tree uses ________
(A)Three dimensional arrays
(B)Array with pointers
(C)Two dimensional arrays
(D)None of the above
Copyright By Study Regular studyregular.blogspot.in
Page 67
Page 68
Page 69
Page 70
Page 71
Page 72
Page 73
Page 74
Page 75
Page 76
Page 77
Page 78
Page 79
Page 80
Page 81
Page 82
SOFTWARE ENGINEERING
1) What is Software ?
a. Set of computer programs, procedures and possibly associated document
concerned with the operation of data processing.
b. A set of compiler instructions
c. A mathematical formula
d. None of above
2) Management of software development is dependent upon ?
a.
b.
c.
d.
People
Product
Process
All of above
Size
Reliability
Productivity
Functionality
Bev Littlewood
Berry Bohem
Roger Pressman
Victor Bisili
Person - Months
Persons
Rupees
Months
Page 83
People
Process
Product
Project
Productivity
Functionality
Quality
Efficiency
Functions
Procedures
Sub programs
All of the above
Waterfall Model
Spiral Model
Quick and Fix model
Prototyping Model
Page 84
Generic Products
Customised Products
Generic and Customised Products
None of the above
Spiral Model
Waterfall Model
Prototyping Model
Capability maturity Model
Reliable Software
Cost Effective Software
Reliable and cost effective Software
None Of Above
Small Projects
Complex Projects
Accommodating change
None of Above
Page 85
Spiral Model
Waterfall Model
Prototyping Model
Iterative enhancement Model
IBM
Motorola
Microsoft
Lucent Technologies
Unambiguous
Distinctly Specific
Functional
All of Above
3 Phases
1 Phases
2 Phases
4 Phases
Abstraction
Refinement
Information Hiding
All of Above
Page 86
Debugging
To uncover errors
To gain modularity
To analyze system
Basic path
Graph Testing
Dataflow
Glass box testing
Readability
Productivity
To use as small memory space as possible
Brevity
Page 87
Recovery Testing
Security Testing
Stress Testing
All of above
Page 88
0.9
0.1
1
0
data design
architectural design
procedural design
interface design
Software
Hardware
Traning
All of above
Page 89
CSPEC
PSPEC
MINI SPEC
Code SPEC
Hewlett - Packard
Rambaugh
Booch
Jacobson
John
Gaffney
Albrecht
Basili
Page 90
is ignored
is partitioned according to the closeness of the datagram and storage items
is partitioned according to the logical closeness of the actigram
Both A and C
None of above
Measure
Measurement
Metric
None of these
Page 91
Flow chart
Pictogram
Data flow diagram
Histogram
None of above
52) In risk analysis of spiral model, which of the following risk includes ?
a.
b.
c.
d.
Technical
Management
Both A and B
None of these
53) Which of the following is done in order a data in phase 1 of the system
development life cycle ?
a.
b.
c.
d.
e.
Waterfall
Incremental
Spiral
None of these
55) To avoid errors in transcription and transposition, during data entry the
system analyst should ?
a. Provide for a check digit
b. Provide for a hash totals
c. Provide batch totals
d. All of above
Page 92
Page 93
C/ C++ Programming
1. Value of ix+j, if i,j are integer type and ix long type would be
a. integer
b. float
c. long integer
d. double precision
2. If the class name is X, what is the type of its this pointer (in a non-static,
nonconst member function)?
a. const X* const
b. X* const
c. X*
d. X&
3. What's wrong? (x = 4 && y = 5) ? (a = 5) ; (b = 6);
a. the question mark should be an equal sign
b. the first semicolon should be a colon
c. there are too many variables in the statement
d. the conditional operator is only used with apstrings
4. Which classes allow primitive types to be accessed as objects?
a. Storage
b. Virtual
c. Friend
d. Wrapper
5. Which one of the following is not a fundamental data type in C++
a. float
b. string
c. int
d. wchar_t
Page 94
Page 95
Page 96
Page 97
Page 98
Page 99
Page 100
Page 101
Page 102
Page 103
Page 104
Page 105
69. What defines a general set of operations that will be applied to various
types of
data?
a. Template class
b. Function template
c. Class template
d. Both a and c above
Page 106
Page 107
Page 108
83. What is the implicit pointer that is passed as the first argument for
nonstatic member functions?
a. self pointer
b. ptr pointer
c. Myself pointer
d. this pointer
84. STL is based on which of the following programming paradigms?
a. Structured Programming
b. Object Oriented Programming (OOP)
c. Functional Programming
d. Aspect Oriented Programming (AOP)
85. Which of the following operators can be overloaded?
a. . (dot or member access operator)
b. & (address-of operator)
c. sizeof operator
d. ?: (conditional operator)
86. Which of the following operators below allow to define the member
functions of a class outside the class?
a. ::
b. ?
c. :?
d. %
87. Which header file should we include for using std::auto_ptr?
a. <memory>
b. <alloc>
c. <autoptr>
Copyright By Study Regular studyregular.blogspot.in
Page 109
90. Which of the following is not a valid conditional inclusions in preprocessor directives
a. #ifdef
b. #ifundef
c. #endif
d. #elif
91. Value of a in a = (b = 5, b + 5); is
a. Junk value
b. Syntax error
c. 5
d. 10
92. There is nothing like a virtual constructor of a class.
a. False
b. True
93. The output of this program is
int
main () { cout << "Hello World!" return 0; }
a. Hello World
b. Syntax error
c. 0
d. Hello World!
Copyright By Study Regular studyregular.blogspot.in
Page 110
Page 111
Page 112
OPERATING SYSTEM
1. If there are multiple recycle bin for a hard disk
a. you can set different size for each recycle bin
b. you can choose which recycle bin to use to store your deleted files
c. You can make any one of them default recycle bin
d. None of above
2. Which of the following is program group?
a. Accessories
b. Paint
c. Word
d. All of above
3. World Wide Web is being standard by
a. Worldwide corporation
b. W3C
c. World Wide Consortium
d. World Wide Web Standard
4. A Microsoft Windows is ..... a(n)
a. Operating system
b. Graphic program
c. Word Processing
d. Database program
5. The ..... program compresses large files into a smaller file
a. WinZip
b. WinShrink
c. WinStyle
d. None of above
6. Which of the following windows version support 64 bit processor?
a. Windows 98
b. Windows 2000
c. Windows XP
Copyright By Study Regular studyregular.blogspot.in
Page 113
Page 114
Page 115
19. What program runs first after computer is booted and loading GUI?
a. Desktop Manager
b. File Manager
c. Windows Explorer
d. Authentication
20. Which of the following Operating systems is better for implementing
a Client-Server network
a. MS DOS
b. Windows 95
c. Windows 98
d. Windows 2000
21. Which of the following does not support more than one program at a
time?
a. DOS
b. Linux
c. Windows
d. Unix
22. My Computer was introduced from
a. Windows 3.1
b. Windows 3.11
c. Windows 95
d. Windows 98
23. Linux is a(n) ... operating system
a. Open source
b. Microsoft
c. Windows
d. Mac
24. Which operating system can you give smallest file name?
a. Ps/2
b. Dos
Copyright By Study Regular studyregular.blogspot.in
Page 116
Page 117
Page 118
37. A ....is a flash memory storage device that plugins into a USB port
a. USB snap drive
b. USB flash drive
c. USB memory maker drive
d. None of above
38. Which of the following are loaded in safe mode?
a. Keyboard driver
b. Mouse driver
c. VGA drive
d. All of above
39. The ....is the drive containing the files to be copied
a. Source drive
b. Destination drive
c. USB drive
d. None of the above
40. Which command is used to see the version of operating system?
a.Vol
b.Version
c.Ver
d. None of the above
41. The operating system creates ... from the physical computer
a. Virtual space
b. Virtual computer
c. Virtual device
d. None
42. Which of the following is system software?
a. Operating system
b. Compiler
c. Utilities
d. All of the above
Copyright By Study Regular studyregular.blogspot.in
Page 119
43. Which menu bar selection would you access to open file?
a. Option
b. Help
c. View
d. None of above
44. A user-interface that is easy to use is considered to be
a. User-happy
b. User-simple
c. User-friendly
d. None of the above
45. Which one of the following is not a multitasking operating system?
a. DOS
b. Windows
c. Unix
d. Linux
46. Once text has been cut to the clipboard, you can .....that text into
another document
a. Paste
b. Copy
c. Transfer
d. None of the above
47. The ... operating system was initially created in the early 1970s at
AT and T's Bell Labs
a. Linux
b. DOS
c. Unix
d. GNU
48. Windows displays various options to shutdown. Which is suitable
a. Shut Down
b. Restart
c. Sleep
Copyright By Study Regular studyregular.blogspot.in
Page 120
Page 121
Page 122
Page 123
Page 124
Page 125
Page 126
Page 127
Page 128
WEB TECHNOLOGY
1. What method is used to specify a containers layout in JSP?
A. Setlayout ( )
B. Layout ( )
C. setContainerLayout ( )
D. SetConLayout ( )
2. ________ method returns the character at a specified at a specified index
in a string?
A. CharCodeAt ( )
B. substring ( )
C. char At ( )
D. None of the Above( )
3. Which of the following is not an advantage of CSS?
A. Easy Maintenance
B. Offline Browsing
C. Multiple Device Compatibilty
D. Platform Dependent
4. In CSS, which cursor indicates that an edge of a box is to be moved down?
A. se-resize
B. sw-resize
C. w-resize
D. s-resize
5. Which of the following is a front-end framework for web development?
A. Ruby
B. Bootstrap
C. PHP
D. Python
Page 129
Page 130
Page 131
Page 132
Page 133
Page 134
Page 135
Page 136
Page 137
Page 138
Page 139
Page 140
Page 141
Page 142
Page 143
Page 144
Page 145
Page 146
Page 147
Page 148
Page 149
Page 150
Page 151
COMPUTER FUNDAMENTALS:
1. Who is the inventor of Difference Engine?
a. Allen Turing
b. Charles Babbage
c. Simur Cray
d. Augusta Adaming
2. Who is the father of Computer?
a. Allen Turing
b. Charles Babbage
c. Simmer Cray
d. Augusta Adoring
3. The term Computer is derived from..........
a. Latin
b. German
c. French
d. Arabic
4. Who is the father of personal computer?
a. Edward Robert
b. Allen Turing
c. Charles Babbage
d. None of these
5. A CPU contains
a. a card reader and a printing device
b. an analytical engine and a control unit
c. a control unit and an arithmetic logic unit
d. an arithmetic logic unit and a card reader
6. Who is the father of Computer science?
a. Allen Turing
b. Charles Babbage
c. Simur Cray
d. Augusta Adaming
Page 152
Page 153
Page 154
Page 155
Page 156
Page 157
Page 158
Page 159
Page 160
Page 161
Page 162
64. The ......... is the amount of data that a storage device can move from the
Storage medium to the Computer per second
a. data migration rate
b. data digitizing rate
c. data transfer rate
d. data access rate
65. To move a copy of file from one computer to another over a
communication channel Is called?
a. File transfer
b. File encryption
c. File modification
d. File copying
66. What kind of memory is both static and non -volatile?
a. RAM
b. ROM
c. BIOS
d. CACHE
67. Which of the following are the functions of a operating system
a. Allocates resources
b. Monitors Activities
c. Manages disks and files
d. All of the above
Page 163
Page 164
Page 165
Page 166
Page 167
Page 168
Page 169
MIXED QUESTIONS
1.This_______tier processes HTTP protocol scripting tasks, performs
calculations, and provides access to data.
A. Applications / web server
B. Client
C.Enterprise server
D. DBA
2. Programs that automatically submit your search request to several
search engines simultaneously are calledA.Wedcrawler
B. Meta search engines
C.Spiders
D. Hits
3. Which kind of lock includes a keypad that can be used to control
Access into areas?
A. Cipher
B. Warded
C. Device
D. Tumber
4. The process by which the structure of the database is modified to
eliminate hidden dependencies and replacing groups is ________
A. Normalization
B. Indexing
C. Enforcing referential integrity
D. Enforcing data integrity
5. The usual method of ____________mapping is by some arithmetical
manipulation of the key value, in direct file organization.
A.Random
B.Serial
C.Direct
D. one to many
Page 170
Page 171
Page 172
Page 173
Page 174
Page 175
Page 176
Page 177
Page 178
Page 179
Page 180
Page 181