Documente Academic
Documente Profesional
Documente Cultură
IT Questions
y
1. DOS floppy disk does not have ________
1) a boot record 2) a file allocation table 3) a root directory
4) virtual memory 5) None of the above
em
2. The ________ component is used by the data analyst to create queries that access the database.
1) data store 2) query and reporting 3) ETL tools
4) data visualisation 5) None of these
3. The altering of data so that it is not usable unless the changes are undone is ________
1) Ergonomics 2) Biometrics 3) Compression 4) Encryption 5) None of these
4. Which of the following is a general-purpose programming language designed by Sun Microsystems and well suited for
use on the web?
1) Java 2) Java Script 3) CSS 4) VBS Script 5) None of these
5. ________ are used to identify a user who returns to a website.
ad
1) ASPs 2) Scripts 3) Cookies 4) Plug-ins 5) None of These
6. Programs that automatically submit your search request to several search engines simultaneously are called ________
1) Hits 2) Webcrawlers 3) Spiders 4) Metasearch engines 5) None of these
7. If you wanted to locate the hardware address of a local device, which protocol would you use?
1) PING 2) ICMP 3) ARP 4) RARP 5) PONG
8. In Oracle, which is more appropriate to store a small list of values in a single column in each row in your address table?
1) Index 2) Nested table 3) Oracarray 4) Varray 5) Index
Ac
9. OLAP applications are widely used by ________ and it uses ________ scheme.
1) RDBMS, Bus 2) Java, Bus
3) Operating System, Star 4) Data mining techniques, star or multidimensional
5) None of these
10. ODBC is based on ________
1) C++ language 2) RDBMS 3) Structured Query Language
4) .net language 5) C language
11. To discard all pending data changes use the ________ command.
1) LOCK 2) SAVEPOINT 3) ROLLBACK 4) COMMIT 5) None of these
12. Round robin scheduling is essentially the preemptive version of ________
C
y
18. Which of the following is a phase(s) of RAD (Rapid Application Development) model?
1) Business modelling 2) Data modelling 3) Application generation
4) All of these 5) None of these
19. ________ allows a DFD (Data Flow Diagram) with transform flow characteristics to be mapped into a predefined
em
template for program structure.
1) Transaction flow 2) Contributor 3) Transform mapping 4) Design evaluation 5) None of these
20. A combinational logic circuit which is used to send data coming from a single source to two or more separate destinations
is called
1) Decoder 2) Encoder 3) Multiplexer 4) Demultiplexer 5) None of these
21. Which of the following is a Universal Gate?
1) AND 2) OR 3) EX OR 4) NAND 5) None of these
22. Twos complement of binary number 010111.1100 is
1) 101001.1100 2) 101000.0100 3) 010111.0011 4) 101000.0011 5) None of these
ad
23. In 8086, the overflow flag is set when
1) The sum is more than 16 bits
2) Signed numbers go out of their range after an arithmetic operation
3) Carry and sign flags are set
4) During subtraction
5) None of these
24. What does microprocessor speed depend on?
Ac
1) Clock 2) Data bus width 3) Address bus width 4) All of these 5) None of these
25. RSA algorithm
1) supports encryption and digital signature 2) supports source authentication
3) encrypts the checksum 4) All the above
5) None of these
26. A special type gateway that can keep external users from accessing resources on the LAN users access the external info
is called
1) Repeater 2) Firewall 3) Encryption 4) Hub 5) None of these
27. What is the name given to the exchange of control signals which is necessary for establishing a connection between a
modem and a computer at one end of a line and another modem and computer at the other end?
C
30. Which command(s) is (are) used to redefine a column of the table in SQL ?
1) ALTER TABLE 2) DEFINE TABLE 3) MODIFY TABLE 4) All of these 5) None of these
31. In a relational schema, each tuple is divided into fields called
1) Relations 2) Domains 3) Queries 4) All of the these 5) None of these
32. An indexing operation
1) Sorts a file using a single key 2) Sorts a file using two keys 3) Establishes an index for a file
4) Both 1 and 3 5) None of these
33. Data security threats include
1) Hardware failure 2) Privacy invasion 3) Fraudulent manipulation of data
4) All of these 5) None of these
2 / IT Quesetions
BSC Academy
34. The language used in application programs to request data from the DBMS is referred to as the
1) DML 2) DDL 3) Query Language 4) DCL 5) None of these
35. A________ contains the smallest unit of meaningful data, so you might call it the basic building block for a data file.
y
1) File Structures 2) Records 3) Fields 4) Data base 5) None of these
36. A ________ means that one record in a particular record type is related to only one record of another record type.
1) One-to-one relationship 2) One-to-many relationship 3) Many-to-one relationship
4) Many-to-many relationship 5) None of these
em
37. Through linked list one can implement
1) Stack 2) Graph 3) Queue 4) All of these 5) None of these
38. A heap allows a very efficient implementation of a
1) Double-ended queue 2) Priority queue 3) Stack
4) Trees 5) None of these
39. Most database management systems allow you to have more than one key so that you can sort records in different ways.
One of the keys is designated the ________ and must hold a unique value for each record.
1) Unique Key 2) Prime attribute 3) Index key 4) Primary Key 5) Null key
ad
40. ________ is primarily used for mapping host names and email destinations to IP address but can also be used for other
purposes
1) TCP (Transfer Control Protocol) 2) DNS (Domain Name System)
3) SHA (Secure Hash Algorithm) 4) Simple Network Management Protocol (SNMP)
5) None of these
41. Override is a method
1) For an operation that replaces an inherited method for the same operation
2) For a data that replaces an inherited method for the same operation
Ac
3) For an operation that takes arguments from library function
4) All of these
5) None of these
42. Local variables
1) Are created outside a block 2) Are known only to that block
3) Continue to exist when their block ends 4) Are illegal in C++
5) None of these
43. ________ is a virus that inserts itself into a systems memory. Then it takes a number of actions when an
infected file is executed.
1) Web scripting virus 2) Polymorphic Virus 3) Macro virus
C
46. Data mining evolved as a mechanism to cater to the limitations of ________ systems to deal massive data sets with high
dimensionality, new data type, multiple heterogeneous data resource etc.
1) OLTP 2) OLAP 3) DSS 4) DWH 5) None of these
47. An important application of cryptography used in computerized commercial and financial transactions:
1) Data mining 2) Data warehousing 3) Digital signature 4) Media convergence 5) None of these
48. Rows of a relation are called
1) Relation 2) Tuples 3) Data structure 4) An entity 5) None of these
49. The drawbacks of the binary tree sort are remedied by the
1) Linear sort 2) Quick sort 3) Heap Sort 4) Insertion sort 5) None of these
IT Quesetions / 3
BSC Academy
50. Which layer of OSI determines the interface of the system with the user?
1) Network 2) Application 3) Data link 4) Session 5) None of these
51. Information is
y
1) Data 2) Processed data 3) Manipulated input 4) Computer output 5) All of These
52. Data by itself is not useful unless
1) It is massive 2) It is processed to obtain information
3) It is collected from diverse sources 4) It is properly stated
em
5) None of These
53. For taking decisions data must be
1) Very accurate 2) Massive 3) Processed correctly
4) Collected from diverse sources 5) All of These
54. Strategic information is needed for
1) Day-to-day operations 2) Meeting government requirements 3) Long-range planning
4) Short-range planning 5) Only 2 and 3
55. Strategic information is required by
1) Middle managers 2) Line managers 3) Top managers 4) All workers 5) Only 1 and 2
ad
56. A ROLLBACK command in a transaction
1) Makes sure that all changes to the database are in effect.
2) Undoes all changes to the database resulting from the execution of the transaction
3) Does nothing
4) Undoes the effects of the last UPDATE command
5) Restores the current of the database to its state at the end of the previous day
57. ________ refers to the contracting of a specific business task to a third party service provider.
Ac
1) Insourcing 2) Outsourcing 3) Offshore Outsourcing
4) Cross-Functioning 5) Business Process Outsourcing
58. Operational information is needed for
1) Day-to-day operations 2) Meeting government requirements 3) Long-range planning
4) Short-range planning 5) All of these
59. In motorcar manufacturing the following type of information is strategic:
1) Decision on introducing a new model 2) Scheduling production
3) Assessing competitor car 4) Computing sales tax collected
5) Only 1 and 2
60. A computer-based information system is needed because
C
(A) The size of organisations has become large and data is massive
(B) Timely decisions are to be taken based on available data
(C) Computers are available
(D) It is difficult to get clerks to process data
1) Only A and C 2) Only A and B 3) Only A and D 4) Only C and D 5) Only B and D
BS
4 / IT Quesetions
BSC Academy
65. The primary storage medium for storing archival data is
1) floppy disk 2) magnetic disk 3) magnetic tape 4) CD- ROM 5) None Of These
66. Edit program is required to
y
1) authenticate data entered by an operator 2) format correctly input data
3) detect errors in input data 4) expedite retrieving input data
5) All of the above
67. Data rejected by edit program are
em
1) corrected and re-entered 2) removed from processing 3) collected for later use
4) ignored during processing 5) Only 1 and 3
68. Online transaction processing is used because
1) it is efficient 2) disk is used for storing files 3) it can handle random queries
4) transactions occur in batches 5) None of the above
69. Off-line data entry is preferable when
(A) data should be entered without error
(B) the volume of data to be entered is large
(C) the volume of data to be entered is small
ad
(D) data is to be processed periodically
1) Only A and B 2) Only B and C 3) Only B and D 4) Only C and D 5) Only A and D
70. Batch processing is used when
(A) response time should be short
(B) data processing is to be carried out at periodic intervals
(C) transactions are in batches
(D) transactions do not occur periodically
1) Only A and B 2) Only A, C and D 3) Only B and C 4) Only A, B and C 5) Only A and D
Ac
71. A management information system is one which
1) is required by all managers of an organisation
2) processes data to yield information of value in tactical management
3) provides operational information
4) allows better management of organisations
5) Only 1 and 2
72. Data mining is used to aid in
1) operational management 2) analysing past decision made by managers
3) detecting patterns in operational data 4) retrieving archival data
5) Only 2 and 3
C
5) All of these
74. Data mining cannot be done if
1) operational data has not been archived 2) earlier management decisions are not available
3) the organization is large 4) all processing had been only batch processing
5) All the above
75. Decision support systems are essential for
1) Day-to-day operations of an organisation 2) Providing statutory information
3) Top-level strategic decision making 4) Ensuring that organisations are profitable
5) Only 3 and 4
IT Quesetions / 5
BSC Academy
76. Which of the following IEEE standards deal(s) with LAN and MAN (metropolitan area network)?
1) 801 2) 803 3) 802 4) 800 5) Only 1 and 2
77. Firewalls protect against
y
1) unauthorised attacks 2) fire attacks 3) virus attacks
4) data-driven attacks 5) Only 1 and 2
78. Which of the following is not related to computer?
1) mouse 2) screen 3) bit 4) pen 5) Only 1 and 2
em
79. During cutting and pasting, the item cut is temporarily stored in
1) Hard drive 2) Clipboard 3) ROM 4) Diskette 5) Only 1 and 2
80. Two binary digits can be added using the logical circuit
1) Half adder 2) Full adder 3) Serial adder 4) Parallel adder 5) None of the Above
81. Full form of BIOS:
1) Better input output services 2) basic inner outer services 3) basic input output services
4) basic input/output system 5) None of The Above
82. The device that connects inputs to outputs:
ad
1) RAM 2) crossbar 3) crossword 4) modem 5) Only 1 and 2
83. Data entered into the computer is called
1) Input 2) Algorithm 3) Flowchart 4) Output 5) All of These
84. The process of connecting to the internet account is called
1) SIGN IN 2) LOG IN 3) LOG OUT 4) SIGN OUT 5) None of the above
85. How many values can be represented by a single byte?
1) 4 2) 16 3) 64 4) 256 5) None of the above
Ac
86. Most data communications involving telegraph lines use
1) simplex lines 2) wideband channel 3) narrowband channel 4) dialled service 5) None of these
87. Which scheme is used for mapping host names and email destinations to IP addresses?
1) DNS 2) TCP/IP 3) TELENET 4) RARP 5) None of These
88. Broad band ISDN consists of
1) Physical layer 2) Asynchronous Transfer Mode (ATM) layer
3) ATM adaptation layer 4) Only 1 and 2
5) All of the above
89. The ________ component is not present in every router.
1) POST 2) DRAM 3) Mini-IOS 4) Bootstrap 5) None of these
C
90. The linker produces a ________ which contains binary codes for all compound modules.
1) Bit file 2) Load file 3) Link file 4) Object Program 5) None of These
91. In C++ we can use the same function name to create functions that perform a variety of different tasks.This is known
as
1) Inheritance 2) Global function 3) Function overloading
BS
6 / IT Quesetions
BSC Academy
95. The action of parsing the source program into proper syntactic classes is known as
1) Lexical analysis 2) Syntax Analysis 3) General Syntax Analysis
4) Interpretation Analysis 5) None of the above
y
96. Resolution of externally defined symbols is performed by
1) Loader 2) Linker 3) Compiler 4) Assembler 5) None of These
97. Which language is best used for real time system?
1) Java 2) C 3) Assembly 4) C++ 5) None of these
em
98. In the UNIX systems the user can change the access rights of the file to different users by using
1) Tail 2) PID 3) Chmod 4) Head 5) None of These
99. Which of the following Unix commands is used to create empty files?
1) Vi 2) Cat 3) Touch 4) Pico 5) None of these
100. Both Go-Back-N and Selective-Repeat Protocols use a
1) sliding frame 2) sliding window 3) sliding data 4) sliding packet 5) None of these
101. Which of the memories has the shortest access time?
1) Cache Memory 2) RAM 3) Magnetic Bubble Memory
ad
4) Magnetic Core Memory 5) All the above have equal access time.
102. The IEEE 802.6 standard describes a ________ standard called Distributed Queue Dual Bus (DQDB).
1) WAN 2) MAN 3) LAN 4) Internet 5) None of the above
103. The list with no nodes on it is called
1) Null List 2) Empty List 3) Blank List 4) Both 1 and 2 5) None of the above
104. ________ uses thin coaxial cable.
1) 10Base2 2) 10Base5 3) 10Base-T 4) 10Base-F 5) None of these
Ac
105. The input of Lex is
1) Statement 2) Numeric Data 3) Set of regular expressions
4) ASCII Code 5) None of these
106. Which of the following is not a logical database structure?
1) Relational 2) Network 3) Chain 4) Tree 5) None Of These
107. CIDR (Classless Inter Domain Routing) is most often used in
1) class C Networks 2) class A Networks 3) class B Networks 4) Only 1 and 2 5) None of the above
108. Which of the following operators in C does not associate from the right?
1) , 2) = 3) + 4) ++ 5) None of the above
109. Which language has recently become the de facto standard for interfacing application programs with relational database
C
system?
1) SQL 2) Oracle 3) 4 GL 4) Database 5) None of the above
110. Sockets are used in
1) Data link Layer 2) Physical Layer 3) Transport Layer 4) Network Layer 5) None of the above
111. Lexical Analyzer transforms an input stream into
BS
IT Quesetions / 7
BSC Academy
115. Which of the following communication modes supports two-way traffic but in only one direction at a time?
1) Duplex 2) Simplex 3) Three- Quarters Duplex
4) Half-Duplex 5) All of the above
y
116. In a PC-to-telephone hookup for long-distance communication, modem is connected between the telephone line and
1) Synchronous Port 2) PC 3) Cross-Over Cable
4) Asynchronous Port 5) None of These
117. In compilers, syntax analysis is done by
em
1) Scanner 2) Parser 3) Code generator 4) Lexical analyser 5) None of these
118. RAD (Rapid Application Development) is not appropriate when
1) Technical risks are high 2) Findings are already done 3) Testing is not needed
4) Only 1 and 2 5) None of These
119. In queues, the items are deleted at one end called
1) Front 2) Top 3) Base 4) Rear 5) None of These
120. If a memory page containing a heavily used variable that was initialised very early and is in constant use is removed, then
the page replacement algorithm used is
1) FIFO 2) LFU 3) LRU 4) All of These 5) None of These
ad
121. When you connect to an online information service you are asked to provide some kind of identification such as your
name, an account number and a password. What is the name given to this brief dialogue between you and information
system?
1) Security Procedure 2) Log-on Procedure 3) Safeguard Procedure
4) Identification Procedure 5) None of These
122. Which of these determines authorised sign in an EDI (Electronic Data Interchange) transaction?
1) Masking 2) Spoofing 3) Digital Signature
Ac
4) Privacy Key Cryptosystems 5) None of these
123. C is a ________- generation language.
1) 3rd 2) 4th 3) 5th 4) 2nd 5) None of These
124. Which of the following usually creates bad sector on hard disk?
1) Trojan 2) Worm 3) Stealth Virus 4) All of these 5) None of these
125. When an organisation gives contract for development of software, it has to give data to the service provider. In such
cases, the ownership of data should be
1) Shared by both parties 2) Transferred to the service provider
3) With the client organisation that outsources service 4) Not transferred
5) None of These
C
8 / IT Quesetions
BSC Academy
130. Which segment identifies the kind of business documents in an EDI transmission?
1) ISA 2) GS 3) ST 4) SE 5) All of these
131. Disk Scanners are
y
1) Anti-virus protection systems 2) 8086s supplementary IC 3) Aftereffects of virus
4) All of these 5) None of the above
132. Array is a set of ________ objects.
1) Different types of 2) Unique 3) Unwanted 4) Same type of 5) None of These
em
133. The operating system is also
1) Control System 2) Special System 3) Administrator Division
4) Boot Sector 5) None of These
134. Which of the following identification techniques provides the best means of user authentication?
1) What the user knows 2) What the user is
3) What the user has 4) What is user has and what the user knows
5) None of These
135. The earliest approach that was used for software development was
1) Incremental development model 2) Waterfall model 3) Spiral development model
ad
4) Rapid prototyping model 5) None of These
136. To make a program safe we should take care of
1) Strong authentication and access controls 2) Doing risk analysis
3) Error-checking controls 4) All of these
5) None of these
137. If the network of the company is to be protected from remote access that may damage companys reputation due to
misuse of information, then security policy should include
Ac
1) Only the employer 2) All the employees 3) Contractors
4) All the above 5) None of these
138. TCP/IP protocol stack is
1) A family of protocols that connect to PCs 2) Part of Internet
3) A combination of TCP and IP protocols 4) Only 1 and 2
5) All of these
139. What is a non-dedicated server?
1) A workstation that can double up as a server 2) A computer reserved for a special task
3) A computer reserved for special task 4) Only 1 and 2
5) None of the above
C
140. The process of organising the memory into two banks to allow 8- and 16-bit data operation is called?
1) Indexed mapping 2) Bank switching 3) Two-way memory interleaving
4) Memory segmentation 5) None of these
141. Which of the following is a layer of object-oriented design pyramid?
1) Message Layer 2) Subsystem layer 3) Class and Object Layer
BS
IT Quesetions / 9
BSC Academy
145. The main advantages of CMOS as compared to TTL:
1) Lower power consumption with low fan-out 2) Lower power consumption and better noise margins
3) Higher speed operation with low power consumption 4) Higher power consumption with high fan-out
5) None of these
y
146. RISC processor has
1) All operations done within the register and CPU 2) Relatively few instructions and addressing modes
3) Single-cycle instruction execution 4) Only 1 and 2
em
5) All of these
147. A loading scheme in which loading and linking of external references are postponed until execution time:
1) Dynamic loading 2) Direct linking loader 3) Relocating loader
4) Dynamic linking 5) None of These
148. Backtracking problem is seen in
1) LR Parser 2) Predictive Parser 3) Recursive Descent Parser
4) None of these 5) All of the above
149. Which of the following filename extension suggests that the file is a backup copy of another file?
1) BAK 2) TXT 3) BAS 4) COM 5) None of These
ad
150. Connected graphs without circuits is called a
1) Hamiltonian graph 2) Euler graph 3) Path
4) Tree 5) All of these are types of graph
151. What replacement policy is used by Windows NT?
1) LRU 2) NFU 3) FIFO 4) Clock replacement 5) None of the above
152. The graph K (3, 4), a complete bipartite graph, has
1) 4 edges 2) 8 edges 3) 10 edges 4) 12 edges 5) 3 edges
Ac
153. The database schema is written in
1) DML 2) HLL 3) DDL 4) DCL 5) None of these
154. What is the average waiting time (in minutes) in FCFS of a given process p1, p2, p3, p4 if the execution time are 5, 10, 8,
3 minutes and turnaround time are 5, 15, 23, 26 minutes?
1) 10 2) 10.75 3) 12.75 4) 12 5) 13
155. In an architecture of a database system external level is the
1) logical level 2) physical level 3) conceptual level 4) view level 5) None of these
156. In a circular linked list
1) Components are all linked together in some sequential manner
2) There is no beginning and no end
C
10 / IT Quesetions
BSC Academy
162. The way a card game player arranges his cards as he picks them up one by one, is an example of
1) Selection Sort 2) Bubble Sort 3) Insertion sort 4) Merge sort 5) None of these
163. Which phase is not available in software life cycle?
y
1) Design 2) Testing 3) Coding 4) Abstraction 5) Maintenance
164. Which type of error detection uses binary division?
1) Parity check 2) Longitudinal Redundancy checking (LRC)
3) Checksum Checking 4) Cyclic Redundancy Checking (CRC)
em
5) None of these
165. Basis path testing is
1) Both black and white box testing method 2) White box testing method
3) Unique testing method 4) Black box testing method
5) None of these
166. If you want to tell the database management system that a specific attribute contained numbers only, what will you need
to set?
1) Data type 2) Data category 3) Data dictionary 4) Data definition 5) Data Integrity
167. When you link one database table to another database table, what are you creating?
ad
1) Connectivity 2) Primary Link 3) Relationships 4) Referential integrity 5) Foreign key
168. The process known as ________ is used by large retailers to study trends.
1) POS 2) Data selection 3) Data mining 4) Data conversion 5) None of these
169. Accessing records from a file directly without searching from the beginning of the file is called
1) Time sharing 2) Random 3) Direct access 4) Access time 5) None of these
170. Bankers algorithm for resource allocation deals with
1) deadlock preventation 2) deadlock avoidance 3) deadlock recovery
Ac
4) mutual exclusion 5) None of these
171. Which of the following performs modulation and demodulation?
1) Modem 2) Satellite 3) Coaxial Cable 4) Optical fiber 5) Router
172. In TCP/IP protocol, checksum field contains ________-bit value which is used for ________.
1) 32, deadlock avoidance 2) 48, error detection 3) 16, error detection
4) 16, deadlock avoidance 5) None of these
173. Granting an outside organisation access to Internet web pages is often implemented using a(n)
1) Extranet 2) Intranet 3) Internet 4) Hacker 5) None of these
174. What is the advantage of packet switching over message switching?
C
1) The first packet of multipacket message can be forwarded before the second one has fully arrived.
2) reduces delay and improves throughput
3) advance setup not required
4) All the above
5) None of these
175. The third-generation computers were based on
BS
IT Quesetions / 11
BSC Academy
178. A flip-flop can store
1) Two bits of data 2) One bit of data 3) Three bits of data
4) Any number of bits of data 5) All the above
y
179. ________ command lists directory content of files and directories.
1) cat 2) cp 3) ls 4) mkdir 5) None of these
180. Which of the following is true about the data warehouse environment architecture?
1) It contains a data warehouse methodology, analysis design, construction and administration.
em
2) It increases processing power and sophistication of analytical tools and techniques that have resulted in the
development of data warehouses.
3) It provides storage, functionality, and responsiveness to queries beyond the capabilities of transaction-oriented
databases.
4) All the above
5) None of these
181. Altering of data so that it is not usable unless the changes are undone is called
1) Encryption 2) Compression 3) Biometrics 4) Ergonomics 5) None of these
182. A ________ main purpose is to prohibit unauthorised access to your computer via the Internet.
ad
1) popup blockers 2) firewalls 3) spyware blockers
4) spam assassins 5) None of these
183. When one computer provides services to another computer, the environment is a(n) ________ infrastructure.
1) client/server 2) dependent 3) independent 4) reliant 5) None of these
184. Object oriented programming relies on three basic concepts. These are
1) data abstraction, inheritance and array 2) data abstraction, inheritance and polymorphism
3) encapsulation, inheritance and polymorphism 4) inheritance, I/O, class
Ac
5) None of these
185. A ________ can check the MAC addresses contained in the frame.
1) bridge 2) repeater 3) passive hub 4) router 5) All the above
186. Each station on an Ethernet network has a unique ________ address imprinted on its network interface card (NIC).
1) 5-byte 2) 32-bit 3) 64-bit 4) 48-bit 5) None of these
187. Decryption and encryption of data are the responsibilities of the ________ layer.
1) Physical 2) Data link 3) Presentation 4) Session 5) Application
188. The communication mode that supports data in both the directions at the same time is called
1) Half duplex 2) Simplex 3) Full duplex 4) Multiplex 5) None of these
189. The functions AVG, COUNT, MAX and MIN are
C
1) supported only by SQL 2) supported only by QBE 3) supported by both SQL and QBE
4) supported by ORACLE 5) supported by none
190. Multivalued dependency among attributes is checked at which level?
1) 2NF 2) 3NF 3) 4NF 4) 5NF 5) None of these
191. A full binary tree with n leaves contains
BS
12 / IT Quesetions
BSC Academy
194. What type of technology allows you to use your finger, eye, or voice print to secure your information resources?
1) RFID 2) Caves 3) Biometrics 4) Haptics 5) None of these
195. A ________ can be used as a connecting device between two internetworks that use different models.
y
1) repeater 2) router 3) bridge 4) gateway 5) hub
196. IP address has been classified into five classes A, B, C, D and E. What is address range of class B?
1) 0.0.0.0 to 126.255.255.255 2) 128.1.0.1 to 191.255.255.255 3) 244.0.0.0 to 239.255.255.255
4) 192.0.1.1 to 223.255.255.255 5) None of these
em
197. Relation in the relational database model is defined as the set of ________ that have the same attributes.
1) objects 2) relations 3) tuples 4) attributes 5) None of these
198. Ifalphaisasetofattributesandbetaisasubsetofalpha,thenalphaholdsbeta.InArmstrongsAxioms,thisisknown
as
1) augmentation rule 2) reflexivity rule 3) transitivity rule 4) passivity rule 5) None of these
199. In an E-R diagram, total participation is represented by
1) circle 2) single line 3) double lines 4) concentric circles 5) None of these
200. If a key attribute of a relation is referred in another relation, it is called
ad
1) domain key 2) referential key 3) relation key 4) foreign key 5) None of these
Answers
1. 4 2. 2 3. 4 4. 1 5. 3 106. 3 107. 1 108. 1 109. 1
6. 4 110. 5; Session Layer
7. 3; Address Resolution Protocol 111. 4 112. 2 113. 3 114. 1 115. 4
Ac
8. 4 9. 4 10. 3 116. 4 117. 2 118. 1 119. 1 120. 1
11. 3 12. 4 13. 4 14. 3 15. 2 121. 2 122. 3 123. 1 124. 5 125. 3
16. 3 17. 4 18. 4 19. 3 20. 4 126. 4 127. 2 128. 2 129. 4 130. 2
21. 4 22. 2 23. 2 24. 2 25. 4 131. 1 132. 4 133. 3 134. 2 135. 2
26. 2 27. 1 28. 1 29. 4 30. 1 136. 1 137. 4 138. 1 139. 1 140. 3
31. 2 32. 3 33. 2 34. 1 35. 3 141. 4
36. 1 37. 4 38. 2 39. 4 40. 2 142. 4; Routing Information protocol
41. 1 42. 2 43. 5 44. 1 45. 3 143. 3 144. 1 145. 2
46. 1 47. 3 48. 2 49. 3 50. 2 146. 5 147. 4 148. 3 149. 1 150. 4
51. 2 52. 2 53. 3 54. 3 55. 3 151. 3 152. 4 153. 1 154. 4 155. 2
C
56. 2 57. 5 58. 1 59. 1 60. 2 156. 2 157. 3 158. 2 159. 3 160. 5
61. 1 62. 2 63. 2 64. 2 65. 3 161. 1 162. 3 163. 4 164. 4 165. 2
66. 3 67. 1 68. 3 69. 3 70. 3 166. 1 167. 1 168. 3 169. 3 170. 4
71. 2 72. 3 73. 1 74. 1 75. 3 171. 1 172. 3 173. 1 174. 2 175. 3
76. 3 77. 1 78. 4 79. 2 80. 1 176. 2 177. 3 178. 2 179. 3 180. 4
81. 4 82. 2 83. 1 84. 2 85. 4 181. 1 182. 2 183. 1 184. 3 185. 1
BS
86. 3 87. 1 88. 5 89. 2 90. 3 186. 4 187. 3 188. 3 189. 3 190. 2
91. 3 92. 2 93. 1 94. 2 95. 1 191. 3 192. 4 193. 4 194. 3 195. 4
96. 2 97. 1 98. 3 99. 3 100. 2 196. 2 197. 3 198. 2 199. 3 200. 4
101. 1 102. 2 103. 4 104. 1 105. 3
IT Quesetions / 13
OBJECTIVE TYPE QUESTIONS
Computer Architecture
PART I
Q.1 In a virtual memory system, the addresses used by the programmer belongs to
(A) memory space. (B) physical addresses.
(C) address space. (D) main memory address.
Ans: C
An address used by programmers in a system supporting virtual memory concept is
called virtual address and the set of such addresses are called address space.
Q.2 The method for updating the main memory as soon as a word is removed from the
Cache is called
(A) Write-through (B) write-back
(C) protected write (D) cache-write
Ans: B
In this method only cache location is updated during write operation.
Q.3 A control character is sent at the beginning as well as at the end of each block in the
synchronous-transmission in order to
(A) Synchronize the clock of transmitter and receiver.
(B) Supply information needed to separate the incoming bits into individual
character.
(C) Detect the error in transmission and received system.
(D) Both (A) and (C).
Ans B
As the data are sent continuously as a block of data at the rate dictated by the clock
frequency, so the receiver should be supplied with the same function about the same
bit length in order to interrupt the information.
Q.4 In a non-vectored interrupt, the address of interrupt service routine is
(A) Obtained from interrupt address table.
(B) Supplied by the interrupting I/O device.
(C) Obtained through Vector address generator device.
(D) Assigned to a fixed memory location.
Ans: D
The source device that interrupted the processor supply the vector address which
helps processor to find out the actual memory location where ISR is stored for the
device.
Q.5 Divide overflow is generated when
(A) Sign of the dividend is different from that of divisor.
(B) Sign of the dividend is same as that of divisor.
(C) The first part of the dividend is smaller than the divisor.
Ans: B
If the first part of the dividend is greater than the deviser, then the result should be
of greater length, then that can be hold in a register of the system. The registers are
of fixed length in
any processor.
Q.6 Which method is used for resolving data dependency conflict by the compiler
itself?
(A) Delayed load. (B) operand forwarding.
(C) Pre fetch target instruction. (D) loop buffer.
Ans: A
In case of delayed load technique the complier detects the data conflict and reorder
the instruction as necessary to delay the loading of the conflicting data by inserting
no operation instructions.
Q.7 Stack overflow causes
(A) Hardware interrupt.
(B) External interrupt.
(C) Internal interrupt.
(D) Software interrupt.
Ans: C
Stack overflow occurs while execution of a program due to logical faults. So it is a
program dependent, hence interrupt activated.
Q.8 Arithmetic shift left operation
(A) Produces the same result as obtained with logical shift left operation.
(B) Causes the sign bit to remain always unchanged.
(C) Needs additional hardware to preserve the sign bit.
(D) Is not applicable for signed 2's complement representation.
Ans: A
If the register hold minus five in twos compliment form than in arithmetic shift left
the contents of the register shall be
It is found that the register contents multiplied by two after logical shift left
operation. Hence arithmetic shift left operation is same as logical shift operation.
(A) Address bus only (B) Address bus & control bus
(C) Control bus & data bus (D) Data bus & address bus
Ans. (D)
Q.73 If the clock input applied to a cascaded Mod-6 & Mod-4 counter is 48KHz. Than
the output of the cascaded arrangement shall be of
(A) 4.8 KHz (B) 12 KHz
(C) 2 KHz (D) 8 KHz
Ans.(C)
Q.74 If the stack pointer is initialised with (4FEB)H, then after execution of Push
operation in 8085 microprocessor, the Stack Pointer shall be
(A) 4FEA (B) 4FEC
(C) 4FE9 (D) 4FED
Ans. (D)
Q.75 A more efficient way to organise a Page Table is by means of an associative
memory having
(A) Number of words equal to number of pages
(B) Number of words more than the number of pages
(C) Number of words less than the number of pages
(D) Any of the above
Ans. (A)
Q.76 If there are four ROM ICs of 8K and two RAM ICs of 4K words, than the address
range of Ist RAM is (Assume initial addresses correspond to ROMs)
(A) (8000)H to (9FFF)H (B) (6000)H to (7FFF)H
(C) (8000)H to (8FFF)H (D) (9000)H to (9FFF)H
Ans. (C)
Q.77 ABC is equal to A B C for
(A) A=0, B=1, C=0 (B) A=1, B=0, C=1
(C) A=1, B=1, C=1 (D) All of the above
Ans. (D)
Q.78 Gray code equivalent of (1000)2 is
(A) (1111)G (B) (1100)G
(C) (1000)G (D) None of these
Ans. (A)
79. How are data and instructions stored in the Von Neumann architecture?
A. In separate memories B. Dual ported memory
C. Unified read-write memory D. None of the above
Ans: C
82. The Memory Address register stores the address of the word stored in which part of the
architecture?
A. I/O B. Program Counter
C. Memory Buffer Register D. None of the above
Ans: C
86. What are the interconnection wires not in the bus structure?
A. Data lines B. Instruction lines
C. Address lines D. Control lines
Ans: B
97. This technique for data transfer does not involve the processor
A. Direct Memory access B. Programmed I/O
C. Memory-mapped I/O D. All the above
Ans:A
100. Name the type of interconnection structure in which all nodes are connected one central node.
A. Linear B. Mesh
C. Star D. Ring
COMPUTER ORGANIZATION AND ARCHITECTURE
BCA
Multiple choice questions
Answers:
3
188.Fragmentation is -
(1) dividing the secondary memory into equal sized f ragments
(2) dividing the main memory into equal size f ragments
(3) f ragments of memory words used in a page
(4) f ragments of memory words unused in a page
(5) None of these
Answers:: 2
189.Which memory unit has lowest access time?
(1) Cache (2) Registers
(3) Magnetic Disk (4) Main Memory
(5) Pen drive
Answer :2
190.Cache memory-
(1) has greater capacity than RAM
(2) is f aster to access than CPU Registers
(3) is permanent storage
(4) f aster to access than RAM
(5) None of these
Answer 4
191.When more than one processes are running concurrently on a system-
(1) batched system
(2) real-time system
(3) multi programming system
(4) multiprocessing system
(5) None of these
Answers:
3
192.Which of the following memories must be refreshed many times per second?
a. Static RAM b. Dynamic RAM c. EPROM
d. ROM e. None of these
ans Static RAM
193.RAM stands for
a. Random origin money b. Random only memory
c. Read only memory d. Random access memory
e. None of these
ans Random access memory
Answer:a.
195.A memory buffer used to accommodate a speed differential is called
a) stack pointer
b) cache
c) accumulator
d) disk buffer
Answer:b.
196.Which one of the following is the address generated by CPU?
a) physical address
b) absolute address
c) logical address
d) none of the mentioned
Answer:c.
197.Run time mapping from virtual to physical address is done by
a) memory management unit
b) CPU
c) PCI
d) none of the mentioned
Answer:a.
198.Memory management technique in which system stores and retrieves
data from secondary storage for use in main memory is called
a) fragmentation
b) paging
c) mapping
d) none of the mentioned
Answer:b
Answer:a
1. Which processor structure is pipelined?
a) all x80 processors b) all x85 processors c) all x86 processors
3. The ________ ensures that only one IC is active at a time to avoid a bus conflict caused by
two ICs writing different data to the same bus.
A. control bus
B. control instructions
C. address decoder
D. CPU
4. In an 8085 microprocessor, the instruction CMP B has been executed while the contents of
accumulator is less than that of register B. As a result carry flag and zero flag will be
respectively
(A) set, reset (B) reset, set (C) reset, reset (D) set, set
6. Registers, which are partially visible to users and used to hold conditional, are known as
a. PC
b. Memory address registers
c. General purpose register
d. Flags
7. The microprocessor 8085 has _____ basic instructions and _____ opcodes.
a) 80, 246 b) 70, 346 c) 80, 346 d) 70, 246
12. The necessary steps carried out to perform the operation of accessing either memory or I/O
Device, constitute a ___________________
a) fetch operation b) execute operation c) machine cycle d) instruction
cycle
13. The contents of accumulator before CMA instruction is A5H. Its content after instruction
execution is
a) A5H b) 5AH c) AAH d) 55H
14. In an 8085 based system, the maximum number of input output devices can be connected
using I/0 mapped I/O method is
a) 64 b) 512 c) 256 d) 65536
a.) Pentium
15. Intel Itanium processors are designed for
a. Servers and personal computers
b. Servers only
c. Personal computers only
d. Calculators
16. The TRAP is one of the interrupts available its INTEL 8085. Which one of the following
statements is true of TRAP?
(a) It is level triggered
(b) It is negative edge triggered
(c) It is positive edge triggered
(d) It is both positive edge triggered and level triggered