Documente Academic
Documente Profesional
Documente Cultură
Table of Contents
Computer Networks Questions 2
Data Structures Questions 32
Mixed Questions 1 63
Compiler Questions 79
DBMS Questions: Part - I 88
Mixed Questions:2 115
DBMS Questions: Part - 2 120
1|Page
Computer Networks Questions
1. The building block of a Wireless LAN as defined by IEEE 802.11 standard?
(A) BSS
(B) ESS
(C) Both (A) & (B)
(D) None of the above
Answer- (A) BSS
7. A protocol in which the sender sends one frame and stops until it receives confirmation from
the receiver?
2|Page
(A) Stop and Wait ARQ
(B) Store and forward switch
(C) Stop and Wait Protocol
(D) None of the above
Answer- (C) Stop and Wait Protocol
9. You are in the process of analyzing a problem that requires you to collect and store TCP/IP
Packets.Which of the following utilities is best suited for thispurpose?
(A) Performance Monitor
(B) Network Monitor
(C) NETSTAT
(D) NBTSTAT
Answer- (B) Network Monitor
10. Which of the following protocol provides confidentiality and authentication for an e-mail?
(A) BGP
(B) BOOTP
(C) PGP
(D) None of the above
Answer- (C) PGP
11. An addressing method in which the IP address space is not divided into classes?
(A) Classful addressing
(B) Classless addressing
(C) Classless IDR
(D) None of the above
Answer- (B) Classless addressing
12. The number of differences between the corresponding bits in a two data words is known as……
distance
(A) Hanning
(B) Hamming
(C) Huffman
(D) None of the above
Answer- (B) Hamming
3|Page
(D) None of the above
Answer- (C) broadcast
14. The splitting of a message into multiple packets at transport layer is known as
(A) Fragmentation
(B) Segmentation
(C) Synchronization
(D) None of the above Answer-
(B) Segmentation
16. The loss of signal’s energy due to the resistance of medium is called……
(A) Fragmentation
(B) Attenuation
(C) Synchronization
(D) None of the above
Answer- (B) Attenuation
17. In Wireless LAN’s, a time interval between two frames to control access to the channel is called…..
(A) Interframe space
(B) Interleaving
(C) Interior routing
(D) None of the above
Answer- (A) Interframe space
18. An array of switches that are used to reduce the number of cross points is called…..
(A) single stage switch
(B) dual stage switch
(C) multistage switch
(D) None of the above
Answer- (C) multistage switch
19. An application protocol of TCP/IP that allows remote login is known as…….
(A) NCP
(B) NVT
(C) NAV
(D) None of the above
Answer- (B) NVT
4|Page
20. TFTP stands for……
(A) Trivial File Transfer Protocol
(B) Temporary File Transfer Protocol
(C) Trunk File Transfer Protocol
(D) Transparent File Transfer Protocol Answer-
(A) Trivial File Transfer Protocol
24. Encryption and decryption of data are the responsibility of ……. layer
(A) Physical
(B) Datalink
(C) Transport
(D) Presentation
Answer-(D) Presentation
25. What is the main function of transport layer in the OSI model?
(A) peer to peer message delivery
(B) node to node message delivery
(C) process to process message delivery
(D) None of the above
Answer- (C) process to process message delivery
5|Page
27. In OSI model, as the data packet moves from the upper to the lower layers, headers are .
(A) added
(B) removed
(C) deleted
(D) edited
Answer- (A) added
31. IEEE 802.3 standard used what method as the media access method?
(A) CSMA/CD
(B) CSMA/CA
(C) CDMA
(D) FDMA
Answer- (A) CSMA/CD
6|Page
(D) All of the above
Answer- (D) All of the above
36. What is the minimum & maximum frame length for 10 Mbps Ethernet?
(A) 32 bytes, 64 bytes
(B) 64 bytes, 128 bytes
(C) 64 bytes, 1518 bytes
(D) 32 bytes, 1518 bytes
Answer- (C) 64 bytes, 1518 bytes
38. Which of the following refers to a group of standards that are still being developed as a part
of overall IEEE 802.11 WLAN support?
(A) 802.11i
(B) 802.11x
(C) Both (A) & (B)
(D) None of the above Answer-
(C) Both (A) & (B)
39. Which of the following is a security protocol designed to provide a wireless LAN with better security
and privacy?
(A) WEP
(B) SNMP
(C) WAP
(D) LDAP
Answer- (C) WAP
40. Which of the following is a timer used for Collision Avoidance (CA)?
7|Page
(A) PCF
(B) MAC
(C) NAV
(D) None of the above
Answer- (C) NAV
42. Ethernet, token ring and token bus are types of………
(A) MAN
(B) WAN
(C) LAN
(D) None
Answer- (C) LAN
43. What is the name of network topology in which there are bidirectional links between each
possible node?
(A) Star
(B) Mesh
(C) Ring
(D) None
Answer- (B) Mesh
45. Which TCP/IP protocol is used for file transfer with minimal capability and minimal overhead?
(A) SGMP
(B) TFTP
(C) SUMP
(D) None
Answer- (B) TFTP
8|Page
Answer- (B) 128
9|Page
(D) None
Answer- (B) Class B
55. A device which divides the incoming signal into low frequencies to send to voice devices, and high
frequencies for data to the computer.
(A) multicast router
(B) interface
(C) splitter
(D) None
Answer- (C) splitter
57. Which layer establishes, maintains & synchronizes the interaction between communicating
devices?
(A) Physical
(B) Datalink
(C) Application
(D) Session
Answer- (D) Session
10 | P a g
e
(A) CSMA/CD
(B) CSMA/CA
(C) Polling
(D) None
Answer- (C) Polling
64. Which layer of OSI determines the interface of the system with the user?
(A) Session layer
(B) Application layer
(C) Network layer
(D) Datalink layer
Answer- (B) Application layer
66. At which layer TCP/IP defines two protocols: Transmission Control Protocol(TCP)
and User Datagram Protocol(UDP)?
(A) Transport layer
(B) Application layer
(C) Network layer
(D) Datalink layer
Answer- (A) Transport layer
11 | P a g
e
67. which of the following uses the greatest number of layers in the OSI model?
(A) Bridge
(B) Repeater
(C) Router
(D) Gateway
Answer- (D) Gateway
71. Which protocol working at the Transport layer provides a connectionless service between hosts?
(A) UDP
(B) ARP
(C) TCP/IP
(D) None
Answer- (A) UDP
12 | P a g
e
(D) None
Answer- (A) User Datagram Protocol
74. What protocol does PPP use to identify the Network Layer Protocol?
(A) UDP
(B) ICMP
(C) NCP
(D) None
Answer- (C) NCP
75. With respect to a network interface card, the term 10/100 refers to
(A) protocol speed
(B) a fiber speed
(C) megabits per seconds
(D) None
Answer- (C) megabits per seconds
76. If you want to locate the hardware address of a local device, which protocol would you use
(A) UDP
(B) ARP
(C) NCP
(D) None
Answer- (B) ARP
77. is primarily used for mapping host names and email destinations to IP address
(A) TCP
(B) DNS
(C) NCP
(D) None
Answer- (B) DNS
78. Which of the following TCP/IP protocol is used for transferring electronic mail messages from one
machine to another?
(A) TCP
(B) SMTP
(C) NCP
(D) None
Answer- (B) SMTP
79. is the continuous ability to send and receive data between interconnected
networks.
(A) FTP
(B) SMTP
(C) TNS
(D) Network Interoperability
Answer- (D) Network Interoperability
13 | P a g
e
80. What is the default subnet mask for a class C network?
(A) 127.0.0.1
(B) 2550.0.0
(C) 255.255.0.0
(D) 255.255.255.0
Answer- (D) 255.255.255.0
14 | P a g
e
(C) Uniformly Twisted Pair
(D) None
Answer- (A) Unshielded Twisted Pair
89. Which OSI layer divides a file into segments that are an efficient size for routing?
(A) Transport Layer
(B) Network Layer
(C) Data link Layer
(D) None
Answer- (A) Transport Layer
91. Which of the following are the types of Internal Network Cards?
(A) Peripheral Component Interconnect (PCI), Wireless Network Card
(B) Industry Standard Architecture (ISA),Wireless Network Card
(C) Peripheral Component Interconnect (PCI), Industry Standard Architecture(ISA)
(D) None of the Above
Answer- (C) Peripheral Component Interconnect (PCI), Industry Standard Architecture(ISA)
92. A networking device that forwards data packets along networks and acts as a central point of
network is called
(A) Repeater
(B) Router
(C) Bridge
(D) Hub
Answer- (B) Router
15 | P a g
e
93. Repeater operates in which layer of OSI model?
(A) Application layer
(B) Presentation layer
(C) Physical layer
(D) Transport layer
Answer- (C) Physical layer
96. Which is the general network standard for the data link layer in the OSI Reference Model?
(A) IEEE 802.1
(B) IEEE 802.2
(C) IEEE 802.3
(D) IEEE 802.4
Answer- (B) IEEE 802.2
97. Which of the following IEEE Standard is used for Wi-Fi systems?
(A) 802.11
(B) 802.1
(C) 802.2
(D) 802.10
Answer- (A) 802.11
98. refers to a family of IEEE standards dealing with local area network and metropolitan area
network.
(A) 802
(B) 800
(C) 801
(D) 803
Answer- (A) 802
16 | P a g
e
(C) Network Layer
(D) All of these
Answer- (C) Network Layer
100. A communication network which is used by large organizations over regional, national or global
area is called
(A) LAN
(B) WAN
(C) MAN
(D) PAN
Answer- (B) WAN
102. Which of the following command is used to print current working directory in Unix?
(A) mkdir
(B) pwd
(C) rm
(D) None of the above
Answer- (B) pwd
103. ……. is a classic synchronization problem that involves the allocation of limited resources amongst a
group of processes in a deadlock free and starvation free manner.
(A) Bounded Buffer Problem
(B) Dining Philosophers Problem
(C) Readers Writers Problem
(D) None of the above
Answer- (B) Dining Philosophers Problem
104. ……. is a system call that returns the process ID of the parent of the current process.
(A) getpid
(B) wait
(C) getppid
(D) None of the above
Answer- (C) getppid
17 | P a g
e
(A) ncftp
(B) grep
(C) ls
(D) lpr
Answer- (D) lpr
108. Which of the following is a System call that can be used to send signal to a process?
(A) kill
(B) wait
(C) exec
(D) None of the above
Answer- (A) kill
109. …….. allows a thread to terminate the execution of other threads in the process.
(A) Thread Scheduling
(B) Thread Safety
(C) Thread Cancellation
(D) None of the above
Answer- (C) Thread Cancellation
111. …… provides an Interface between the process and the Operating System
(A) Synchronization
(B) System call
(C) Segmentation
18 | P a g
e
(D) None of the above
Answer- (B) System call
114. …… is a system call that runs an executable file into an existing process.
(A) fork
(B) wait
(C) exec
(D) None of the above
Answer- (C) exec
115. Which of the following technique is used to convert a blocking system call into a non blocking
system call?
(A) Segmentation
(B) Jacketing
(C) Fragmentation
(D) None of the above
Answer- (B) Jacketing
116. One user-level thread is mapped to many kernel level thread is known as….
(A) One to Many model
(B) One to One model
(C) Many to One model
(D) None of the above
Answer- (A) One to Many model
118. ……. is a system call that returns the process ID of current process.
(A) getpid
19 | P a g
e
(B) wait
(C) getppid
(D) None of the above
Answer- (A) getpid
120. Which of the following command is used to create terminal connection to another host in
Unix?
(A) ssh
(B) scp
(C) telnet
(D) None of the above
Answer- (C) telnet
121. ………. is an user interface that uses only keyboard for input.
(A) Graphical User Interface
(B) Command Line Interface
(C) Both (A) & (B)
(D) None of the above
Answer- (B) Command Line Interface
123. An Operating System that can predict the exact time duration for operations is called
(A) Hard RTOS
(B) Soft RTOS
(C) Both (A) & (B)
(D) None of the above
Answer- (A) Hard RTOS
124. The use of software to allow system hardware to run multiple applications on different OS is
termed as
(A) OS Virtualization
(B) OS level Virtualization
(C) Both (A) & (B)
(D) None of the above
20 | P a g
e
Answer- (A) OS Virtualization
126. Which is a hardware register that contains status information of the Processor?
(A) Stack pointer
(B) Program Counter
(C) Accumulator
(D) Status register
Answer- (D) Status register
127. Physical memory can be divided into a number of equal sized blocks called…..
(A) Page
(B) Frame
(C) Block
(D) None of the above
Answer- (B) Frame
129. A table that contains the base address of each page in physical memory is called…..
(A) Page table
(B) Frame table
(C) Memory table
(D) None of the above
Answer- (A) Page table
21 | P a g
e
(B) fence register
(C) memory buffer register
(D) index register
Answer- (B) fence register
132. …… occurs in a dynamic memory allocation system when most of the free blocks are too
small to satisfy any request?
(A) Paging
(B) Segmentation
(C) Fragmentation
(D) None of the above Answer-
(C) Fragmentation
133. Which of the following holds the data currently being worked on?
(A) Stack pointer
(B) Program Counter
(C) Accumulator
(D) None of the above
Answer- (C) Accumulator
134. The total number of processes completed per unit time is termed as
(A) throughput
(B) response time
(C) waiting time
(D) None of the above
Answer- (A) throughput
22 | P a g
e
138. An interrupt that is reserved for unrecoverable memory errors is called……
(A) maskable interrupt
(B) non maskable interrupt
(C) Both (A) & (B)
(D) None of the above
Answer- (B) non maskable interrupt
23 | P a g
e
145. Interrupt latency should be…… for Real Time Operating Systems (RTOS)?
(A) minimal
(B) maximum
(C) zero
(D) None of the above
Answer- (A) minimal
147. Which of the following is the delay that occur during the playback of a stream is called?
(A) jitter
(B) playback delay
(c) stream delay
(D) None of the above
Answer- (A) jitter
151. Which of the following scheduling algorithms provide minimum average waiting time?
(A) Round Robin (RR)
(B) First come First Serve (FCFS)
24 | P a g
e
(C) Shortest Job First Scheduling
(D) None of the above
Answer- (C) Shortest Job First Scheduling
153. A computer is restarted by restart button or by pressing the Combination of (Ctrl+Alt+Del). This
type of booting is called
(A) Cold Booting
(B) Warm Booting
(C) Both (A) and (B)
(D) None of the above Answer-
(B) Warm Booting
155. ……. are required to complete a critical task within a guaranteed amount of time.
(A) Real Time Operating Systems
(B) Multi Tasking Operating Systems
(C) Distributed Operating Systems
(D) None of the above
Answer- (A) Real Time Operating Systems
25 | P a g
e
158. Which of the following is true for the algorithms for memory allocation?
(A) First Fit
(B) Best Fit
(C) Worst Fit
(D) All of the above
Answer- (D) All of the above
26 | P a g
e
165. …… is the process of switching of CPU from one thread to another.
(A) Process handling
(B) interrupt handling
(C) Context switching
(D) None of the above
Answer- (C) Context switching
27 | P a g
e
(D) Time Sharing Operating Systems
Answer- (D) Time Sharing Operating Systems
172. …… is a special system software that is used to handle process scheduling in different ways.
(A) Fork
(B) Scheduler
(C) Spawn
(D) None of the above
Answer- (B) Scheduler
175. Which of the following is a scheduling algorithm that allows a process to move up and down
between queues?
(A) Round Robin(RR) scheduling
(B) First Come First Served (FCFS) scheduling
(C) Multilevel feedback queue scheduling
(D) Shortest Job First (SJF) scheduling
Answer- (C) Multilevel feedback queue scheduling
176. ….. commands are automatically loaded into main memory when the booting process gets
completed.
(A) External
(B) Internal
(C) Both (A) & (B)
(D) None
Answer- (B) Internal
28 | P a g
e
178. Which of the following is an example of Batch Processing OperatingSystems?
(A) Lynx OS
(B) Mac OS
(C) UNIX
(D) None of the above
Answer- (C) UNIX
180. ….. process checks to ensure the components of the computer are operating and connected
properly.
(A) Editing
(B) Saving
(C) Booting
(D) None of the above
Answer- (C) Booting
183. In UNIX, cached disk blocks are managed by the Kernel and referred to as…..
(A) Cache
(B) Disk Cache
(C) Buffer Cache
(D) None of the above
Answer- (C) Buffer Cache
184. …… is the smallest unit for processing that consists of a program counter, a stack & a set of
registers.
(A) Compiler
(B) Thread
29 | P a g
e
(C) Heap
(D) None of the above
Answer- (B) Thread
191. …… is mainly responsible for allocating the resources as per process requirement?
30 | P a g
e
(A) RAM
(B) Compiler
(C) Operating Systems
(D) Software
Answer- (C) Operating Systems
192. Which of the following plays an important role in modern Operating Systems(OS)?
(A) Kernel
(B) Shell
(C) Fork
(D) None
Answer- (A) Kernel
195. ….. occur commonly in multi-tasking when two or more threads waiting for each other.
(A) Kernel
(B) Shell
(C) Fork
(D) Deadlock
Answer- (D) Deadlock
31 | P a g
e
Answer- (B) Shell
202. Which of the following begins the search with the element that is located in the middle of the
Array?
(A) Random Search
(B) Parallel Search
(C) Binary Search
(D) Serial Search
Answer- (D) Serial Search
32 | P a g
e
204. Which of the following is useful in traversing a given graph by breadth first search?
(A) Stack
(B) List
(C) Queue
(D) None of the above
Answer- (C) Queue
205. A characteristic of the data that binary search uses but linear search ignores is
(A) Order of the list
(B) length of the list
(C) Both (A) & (B)
(D) None of the above
Answer- (A) Order of the list
206. A sort which iteratively passes through a list to exchange the first element with any element
less than it and then repeats with a new first element is called
(A) Heap Sort
(B) Quick Sort
(C) Selection Sort
(D) None of the above Answer-
(C) Selection Sort
208. In an extended-binary tree, the nodes with two children are called ……..
(A) Interior node
(B) Domestic node
(C) Internal node
(D) Inner node
Answer- (C) Internal node
33 | P a g
e
210. Sequential representation of binary tree uses
(A) Three dimensional arrays
(B) Array with pointers
(C) Two dimensional arrays
(D) None of the above
Answer- (B) Array with pointers
212. Which of the following is/are real time application(s) of Circular linkedlist?
(A) Printer
(B) Multi player games
(C) Interrupts handling in real-time systems
(D) All of the above
Answer- (B) Multi player games
216. is an algorithm that builds a solution by repeated selecting the cheapest among
all options at each stage.
(A) Greedy algorithm
(B) Backtracking algorithm
(C) Divide and Conquer method
(D) None of the above
34 | P a g
e
Answer- (A) Greedy algorithm
219. A mathematical-model of user defined type along with the collection of all operations defined
on that model is known as
(A) Data Structure
(B) Primitive Data Type
(C) Algorithm
(D) Abstract Data Type
Answer- (D) Abstract Data Type
220. In traversal we can convert a binary tree into its mirror image.
(A) In order
(B) Pre order
(C) Post order
(D) None of the above
Answer- (C) Post order
222. A set of functions that grow slower than or at the same rate as expression is represented by
(A) Big Omega notation
(B) Theta notation
(C) Big O notation
(D) None of the above Answer-
(C) Big O notation
35 | P a g
e
(B) O (n log n)
(C) O (n)
(D) None of the above
Answer- (A) O (n^2)
225. The space required to store the values of all the constants and variables is called
(A) Instruction space
(B) Data Space
(C) Environment Space
(D) None of the above
Answer- (B) Data Space
226. In Heap data structure, If the parent nodes are greater than their children nodes then it is
called
(A) Max-Heap
(B) Min-Heap
(C) Both (A) & (B)
(D) None of the above
Answer- (A) Max-Heap
227. The Quick sort algorithm divides the list into main parts
(A) Four
(B) Six
(C) Five
(D) Three
Answer- (D) Three
36 | P a g
e
230. Linked Lists are used to implement
(A) Stacks
(B) Graphs
(C) Queues
(D) All of the above
Answer- (D) All of the above
232. The Array as an Abstract Data Type (ADT) supports ….. operations.
(A) Store
(B) Retrieve
(C) Both (A) & (B)
(D) None of the above Answer-
(C) Both (A) & (B)
234. The common way of keeping subsequent items within the table and computing possible positions is
termed as …………
(A) Direct Chaining
(B) Open Addressing
(C) Both (A) & (B)
(D) None of the above
Answer- (B) Open Addressing
236. In Binary Tree Traversal, the node is visited after both trees is called…….
(A) pre order
(B) In order
(C) post order
37 | P a g
e
(D) None of the above
Answer- (C) post order
239. …… is a header list in which the last node points back to the header node.
(A) Circular Header linked list
(B) Grounded Header linked list
(C) Both (A) & (B)
(D) None of the above
Answer- (A) Circular Header linked list
240. A pointer that contains the address of a heap-dynamic variable is called …..
(A) Dangling pointer
(B) Null pointer
(C) Void pointer
(D) None of the above
Answer- (A) Dangling pointer
242. Which of the following data structure stores heterogeneous data elements?
(A) Record
(B) Pointer
(C) Linear Array
(D) None of the above
Answer- (A) Record
243. ……. is required for languages that support dynamic data structure.
(A) Stack allocation
(B) Static allocation
38 | P a g
e
(C) Heap allocation
(D) None of the above
Answer- (C) Heap allocation
244. In Binary Tree Traversal, the node is visited before its left and right sub trees is called…….
(A) pre order
(B) In order
(C) post order
(D) None of the above
Answer- (A) pre order
246. Which algorithm solves the all pairs shortest path problem ?
(A) Floyd’s algorithm
(B) Prim’s algorithm
(C) Both (A) & (B)
(D) None of the above
Answer- (A) Floyd’s algorithm
249. …… is a header list in which the last node contains the null pointer.
(A) Circular Header list
(B) Grounded Header list
(C) Both (A) & (B)
(D) None of the above
Answer- (B) Grounded Header list
39 | P a g
e
(A) Partition exchange sort
(B) Diminishing increment sort
(C) Both (A) & (B)
(D) None of the above
Answer- (A) Partition exchange sort
251. Print Server uses ….. which is a buffer that holds data before it is send to the printer
(A) Queue
(B) Stack
(C) Spool
(D) None of the above
Answer- (C) Spool
252. …… is a balanced binary search tree in which the difference between the height of any node’s
left and right subtree is at most one.
(A) AVL Tree
(B) Red-Black Tree
(C) 2-3-4 Tree
(D) None of the above
Answer- (A) AVL Tree
253. Enqueue means to insert an item into the ……. of the Queue
(A) front
(B) rear
(C) middle
(D) None of the above
Answer- (B) rear
254. The process of deleting an element from the top of stack is called ….. operation
(A) POP
(B) PUSH
(C) Both (A) & (B)
(D) None of the above
Answer- (A) POP
40 | P a g
e
Answer- (B) end order
258. Which of the following data structure stores homogeneous data elements?
(A) Record
(B) Pointer
(C) Linear Array
(D) None of the above
Answer- (C) Linear Array
260. Which of the following is used to find the location of an element with a given value?
(A) Search
(B) Iteration
(C) Traversal
(D) None of the above
Answer- (A) Search
262. The condition “FRONT = NULL” represents that the queue is…..
(A) Overflow
(B) Empty
(C) Full
(D) None of the above
Answer- (B) Empty
41 | P a g
e
(C) Single way list
(D) None of the above
Answer- (A) One way list
264. Which data structure represents hierarchical relationship between various elements?
(A) Linked List
(B) Tree
(C) Array
(D) None of the above
Answer- (B) Tree
265. The process of accessing data stored in a tape is similar to handle data on…….
(A) Linked List
(B) Tree
(C) Array
(D) Queue
Answer- (D) Queue
266. Which of the following search start at the beginning of the list and each element in the list?
(A) Linear Search
(B) Binary Tree Search
(C) Hash Search
(D) None of the above Answer-
(A) Linear Search
267. In Binary Tree Traversal, the node is visited between the sub trees is called……
(A) Pre-order traversal
(B) In-order traversal
(C) Post-order traversal
(D) None of the above
Answer- (B) In-order traversal
269. …….. is a data structure in which each node has at most two children.
(A) Red-Black Tree
(B) Binary Tree
(C) AVL Tree
(D) None of the above
Answer- (B) Binary Tree
42 | P a g
e
270. Which of the following sorting algorithm is not an internal sort?
(A) Bubble Sort
(B) Insertion Sort
(C) Merge Sort
(D) Heap Sort
Answer- (C) Merge Sort
43 | P a g
e
277. Which of the following is a linear data structure?
(A) Array
(B) Graph
(C) Tree
(D) None of the above
Answer- (A) Array
278. ….. is a technique to convert a range of key values into a range of Indices of an Array?
(A) Thrashing
(B) Hashing
(C) Interpolation
(D) None of the above
Answer- (B) Hashing
283. A sort that compares each element with its adjacent element in a list is called…..
(A) Bubble Sort
(B) Insertion Sort
44 | P a g
e
(C) Quick Sort
(D) Heap Sort
Answer- (A) Bubble Sort
284. Which of the following data structure is required to evaluate a post fix expression?
(A) Stack
(B) linked list
(C) Array
(D) None of the above
Answer- (A) Stack
287. A matrix in which number of zero elements are much higher than the number of non zero elements
is called
(A) Scalar Matrix
(B) Identity Matrix
(C) Sparse Matrix
(D) None of the above Answer-
(C) Sparse Matrix
45 | P a g
e
290. Which data structure is required to check balanced parenthesis in an expression?
(A) Linked List
(B) Queue
(C) Tree
(D) Stack
Answer- (D) Stack
291. A linear list in which elements can be added/removed at either end but not in the middle is called
(A) Deque
(B) Stack
(C) List
(D) Queue
Answer- (A) Deque
292. Which of the following is the best sorting algorithm when the list is already sorted?
(A) Bubble Sort
(B) Insertion Sort
(C) Quick Sort
(D) Heap Sort
Answer- (B) Insertion Sort
296. Which data structure is needed to convert infix notation to post fixnotation?
(A) Branch
(B) Queue
46 | P a g
e
(C) Tree
(D) Stack
Answer- (D) Stack
Technology Questions:
301. In CSS, you can override precedence rules by adding the property to a
style declaration.
A. !override
B. !main
C. !important
D. !priority
Answer- C. !important
302. Which of the following class in JSP provides the capability to implement a growable array of
objects?
A. Array class
B. GrowAbleArray class
C. Container class
D. Vector class
47 | P a g
e
Answer- D. Vector class
303. Which XML extension is a standard way to describe how to transform the structure of an XML
document into an XML document with a differentstructure?
A. tree structure
B. XSLT
C. Both (A) & (B)
D. None of the Above
Answer- B. XSLT
304. In JSP, the classes that allow primitive types to be accessed as objects are known as
A. Primitive classes
B. Object classes
C. Boxing classes
D. Wrapper classes.
Answer- D. Wrapper classes.
305. Which XML-based registry is intended as on online Internet registry for businesses
worldwide?
A. Universal Plug and Play(UPnP)
B. UDF
C. Uniform Resource Locator(URL)
D. Universal Description Discovery and Integration(UDDI)
Answer- D. Universal Description Discovery and Integration(UDDI)
306. Which language is considered to be extensible because of its unlimited and self-defining
markup symbols?
A. HTML
B. XHTML
C. XML
D. None of the Above.
Answer- C. XML
307. In JSP, a Canvas object provides access to a Graphics object via one of its method called
A. getCanvas()
B. getGraphics()
C. accessGraphics().
D. paint()
Answer- D. paint()
48 | P a g
e
309. Which method of the Component class is used to set the position and size of a component in JSP?
A. setSize()
B. setPositionSize()
C. setPosition()
D. setBounds()
Answer- D. setBounds()
312. In CSS, which cursor indicates that an edge of a box is to be moved down?
A. se-resize
B. sw-resize
C. w-resize
D. s-resize
Answer- D. s-resize
49 | P a g
e
D. Asynchronous JavaScript and XML
Answer- D. Asynchronous JavaScript and XML
319. What are the events generated by the Node objects called?
A. generators
B. highevents
C. emitters
D. None of the Above
Answer- C. emitters
321. Which one of the following objects is passed to a JavaBean when one of its properties is set
via a JSP action?
A. ServletRequest
B. HTTPServletRequest
C. ServletResponse
D. HTTPServletResponse
Answer- B. HTTPServletRequest
322. Which of the following are used by servlet containers to set JavaBean properties?
50 | P a g
e
A. cookies
B. form fields
C. memory
D. disk
Answer- B. form fields
51 | P a g
e
329. Any part of the graphic that is not included in another hot zone is considered to be part of
A. rect
B. point
C. default
D. polygon
Answer- C. default
52 | P a g
e
Answer- (A) valueOf()
336. Which method is used to replace an element to the HTML DOM(Document Object Model)?
(A) removeChild()
(B) replaceChild()
(C) Both(A) & (B)
(D) None of the above Answer-
(B) replaceChild()
338. Which of the following message denotes the server is currently unavailable?
(A) 500 Internal server Error
(B) 501 Not Implemented
(C) 503 Service Unavailable
(D) 504 Gateway Time out
Answer- (C) 503 Service Unavailable
339. Which of the following is used to define the content of web pages?
(A) HTML
(B) CSS
(C) Java Script
(D) None of the above
Answer- (A) HTML
341. Which of the following was designed to store and transport data?
(A) Java Script
(B) HTML
(C) XML
(D) None of the above
Answer- (C) XML
53 | P a g
e
(C) Both (A) and (B)
(D) None of the above
Answer- (A) XML
343. message denotes the request has been fulfilled and a new source is created.
(A) 202 Accepted
(B) 201 created
(C) 403 Forbidden
(D) 404 Not Found Answer-
(B) 201 created
346. In JS, the method returns the index of the last occurrence of a specified text
in a string.
(A) slice()
(B) substr()
(C) lastIndex()
(D) search()
Answer- (C) lastIndex()
347. message denotes the request can not be fulfilled due to the wrong syntax.
(A) 202 Accepted
(B) 400 Bad Request
(C) 403 Forbidden
(D) 404 Not Found
Answer- (B) 400 Bad Request
54 | P a g
e
349. Which properties are used to generate space around content?
(A) CSS Borders
(B) CSS Margins
(C) CSS Padding
(D) None of the above
Answer- (C) CSS Padding
351. Which of the following is used to specify the layout of web pages?
(A) HTML
(B) CSS
(C) Java Script
(D) None of the above
Answer- (B) CSS
353. In JS, The method searches a string for a specified value and returns the position of
match.
(A) slice()
(B) substr()
(C) index()
(D) search()
Answer- (D) search()
354. In Java Script, the method returns the new array length.
(A) shift()
(B) substr()
(C) index()
(D) unshift()
Answer- (D) unshift()
355. In Java Script, which statement lets you to handle the error?
(A) try
(B) catch
(C) Both (A) & (B)
55 | P a g
e
(D) None of the above
Answer- Both (A) & (B)
356. Which property is very useful for getting or replacing the content of HTML elements?
(A) innerHTML
(B) outerHTML
(C) Both(A) & (B)
(D) None of the above
Answer- (A) innerHTML
358. message denotes the requested page could not be found and it may be available in
future?
(A) 202 Accepted
(B) 201 created
(C) 403 Forbidden
(D) 404 Not Found
Answer- (D) 404 Not Found
360. Which can reduce the number of server requests and save bandwidth?
(A) Image Gallery
(B) Image Opacity
(C) Image Sprites
(D) None of the above Answer-
(C) Image Sprites
361. Which of the following property sets or returns the CORS settings of the audio/video?
(A) controls
(B) crossOrigin
(C) currentSrc
(D) None of the above
Answer- (B) crossOrigin
56 | P a g
e
362. The Javascript allows
(A) single line comment
(B) multi line comment
(C) Both(A) & (B)
(D) None of the above Answer-
(C) Both(A) & (B)
364. Which of the following message denotes the requested page has moved temporarily to a
new URL?
(A) 202 Accepted
(B) 201 created
(C) 301 Moved Permanently
(D) 302 Found
Answer- (D) 302 Found
366. Which method returns the HTTP methods that the server supports?
(A) HEAD
(B) PUT
(C) DELETE
(D) OPTIONS
Answer- (D) OPTIONS
57 | P a g
e
(D) None of the above
Answer- (A) cookies
374. Which of the following message denotes the requested page has moved to a new URL?
(A) 202 Accepted
(B) 201 created
(C) 302 Found
(D) 301 Moved Permanently
Answer- (D) 301 Moved Permanently
375. Which of the following method uploads a representation of the specified URI?
(A) HEAD
58 | P a g
e
(B) PUT
(C) DELETE
(D) OPTIONS
Answer- (B) PUT
376. Which is a uniform naming scheme for locating resources on the web?
(A) Uniform Resource Identifier(URI)
(B) HTTP
(C) Resource Name
(D) None of the above
Answer- (A) Uniform Resource Identifier(URI)
378. Which of the following property returns the length of the current audio/video?
(A) error
(B) loop
(C) ended
(D) duration
Answer- (D) duration
59 | P a g
e
382. Which of the following specifies a short cut key to activate or focus an element?
(A) class
(B) hidden
(C) draggable
(D) access key
Answer- (D) access key
386. converts character into a format which can be transmitted over the Internet?
(A) URL Encoding
(B) URL Decoding
(C) Both (A) & (B)
(D) None of the above Answer-
(A) URL Encoding
60 | P a g
e
(D) None of the above
Answer- (C) 200 OK
390. sets or returns whether the audio/video should start playing as soon as it is loaded.
(A) audioTracks
(B) autoplay
(C) Controller
(D) None of the above
Answer- (B) autoplay
394. Which of the following method converts the request connection to a transparent
TCP/IP tunnel?
(A) HEAD
(B) PUT
(C) OPTIONS
(D) CONNECT
Answer- (D) CONNECT
61 | P a g
e
(A) SGMT
(B) SGML
(C) SGMD
(D) None of the above
Answer- (B) SGML
62 | P a g
e
Mixed Questions 1
401. Concept of developing a compiler for a language by using subsets of the same language?
A. Bootstrap
B. Lex
C. Yacc
D. None of the Above
Answer- A. Bootstrap
A. Inheritance
B. Polymorphism
C. Abstraction
D. None of the Above
Answer- C. Abstraction
63 | P a g
e
407. Which of the following is/are part(S) of EDI?
A. Trading partners
B. Data segment
C. Encryption
D. All of the above
Answer- D. All of the Above
412. You need to configure a switch from a remote subnet.Which of the following must be configured
on the switch?
A. IP
B. Console part
C. SNMP
D. Default gateway
Answer- D. Default gateway
413. “Each packet contains the full source and destination address”.This statement indicates which of
the following?
A. FDDI
B. Data link
C. Data gram
64 | P a g
e
D. Virtual Circuit Answer-
C. Data gram
415. Creating a eliminate the need to qualify the object name with the schema and
provides you with an alternative name for a table, view, sequence, procedure or other objects.
A. synonym
B. Antonym
C. Column
D. Alias
Answer-A. synonym
65 | P a g
e
A. Specifying the syntax of a language
B. Specifying a context free language
C. Both (A) and (B)
D. None of the Above
Answer- C. Both (A) and (B)
424. When the maximum clock rate is quoted for a logic family it applies to
A. Shift register
B. Flip-Flop
C. Counter
D. None of the Above
Answer- A. Shift register
425. Which of the following UNIX command is used to create empty files?
A. cat
B. Vi
C. Pico
D. Touch
Answer- D. Touch
66 | P a g
e
D. arithmetic operator
Answer- D. arithmetic operator
427. The mechanism that brings a page into memory only when it is needed is called
A. Segmentation
B. Fragmentation
C. Demand paging
D. None of the Above Answer-
C. Demand paging
428. Which of the following addressing modes permits relocation without any change?
A. Indirect addressing
B. Indexed addressing
C. Base register addressing
D. PC relative addressing
Answer- C. Base register addressing
429. A is a software that manages the time of a microprocessor to ensure that all
time critical events are processed as efficiently as possible. This software allows the system
activities to be divided into multiple independent elements called tasks.
A. Kernel
B. Shell
C. Processor
D. Device Driver
Answer- A. Kernel
432. An assembler that runs on one machine but produces machine code for another machine
is called
A. Simulator
67 | P a g
e
B. Cross Assembler
C. Boot-strap loader
D. None of the above
Answer- B. Cross Assembler
437. If a denormalization situation exists with a one to one binary relationship then all fields are stored in
A. four relations
B. one relation
C. three relations
D. two relations
Answer- B. one relation
438. Which of the following is/are advantages of using VLAN Trunking Protocol (VTP) in a
switching environment?
A. It allows switches to read tags
B. It enables VLANs to span multiple switches.
C. It simplifies the scalability of the switched work
D. All of the above
Answer- C. It simplifies the scalability of the switched work
68 | P a g
e
439. When a network has multiple bridges and is using Spanning Tree Protocol, how is the root bridge
determined?
A. The bridge with the lowest ID number assumes the root bridge role.
B. The bridge with the highest ID number assumes the root bridge role.
C. The bridge with the lowest MAC address is always the root bridge.
D. All of the above
Answer- A. The bridge with the lowest ID number assumes the root bridge role.
441. Which of the following is the preferred way to recover a database after a transaction in
progress terminates abnormally?
A. Rollforward
B. Rollback
C. Reprocess transactions
D. None of the above
Answer- B. Rollback
443. is a versatile instruction that is finding its way into an increasing number of
computer systems, especially microprocessors.
A. Procedure Call
B. Supervisor Call
C. Software Interrupt (SWI)
D. None of the above
Answer- C. Software Interrupt (SWI)
69 | P a g
e
445. Locking may cause which of the following problems?
A. Deadlock
B. Rollback
C. Reprocess
D. None of the above
Answer- A. Deadlock
451. means that each logical object is placed in a set of memory locations with
strictly consecutive addresses.
A. External Fragmentation
70 | P a g
e
B. Internal Fragmentation
C. Contiguous Allocation
D. None of the above
Answer- C. Contiguous Allocation
453. Wasting of memory between partitions, due to scattering of the free space into a number of
dis-contiguous areas, is called
A. External Fragmentation
B. Internal Fragmentation
C. Contiguous Allocation
D. None of the above
Answer- A. External Fragmentation
454. A is a hardware complex that contains most of the logic address translation in
microprocessor systems.
A. Memory Management Unit (MMU)
B. Translation Lookaside Buffer (TLB)
C. Page Map Table (PMT)
D. None of the above
Answer- A. Memory Management Unit (MMU)
455. Which of the following is a memory cache that stores recent translations of virtual memory to
physical addresses for faster retrieval.
A. Memory Management Unit (MMU)
B. Translation Lookaside Buffer (TLB)
C. Page Map Table (PMT)
D. None of the above
Answer- B. Translation Lookaside Buffer (TLB)
456. Which of the following requires that all channels in a message transmission path be of the same
speed?
A. Packet-switched networks
B. Circuit-switched networks
C. Message-switched networks
D. None of the above
Answer- B. Circuit-switched networks
457. Which protocol works at the Internet layer and provides a connection service between hosts?
A. Internet Protocol(IP)
B. Packet Internet Gopher(PING)
71 | P a g
e
C. Reverse Address Resolution Protocol (RARP)
D. Address Resolution Protocol (ARP)
Answer- A. Internet Protocol(IP)
458. If a host broadcasts a frame that includes a source and destination hardware address, and its
purpose is to assign IP addresses to itself, Which protocol at the Network Layer does the host use?
A. Internet Control Message Protocol(ICMP)
B. Packet Internet Gopher(PING)
C. Reverse Address Resolution Protocol (RARP)
D. Address Resolution Protocol (ARP)
Answer- C. Reverse Address Resolution Protocol (RARP)
459. When you connect to an online information service you are asked to provide some kind of
identification such as your name, an account number and a password. What is the name given to this brief
dialogue between you and the information system?
A. Security Procedure
B. Safeguard Procedure
C. Identification Procedure
D. Log-on procedure
Answer- D. Log-on procedure
462. Which of the following services is used to translate host names into IP addresses?
A. SNMP
B. SMTP
C. UDP
D. DNS
Answer- D. DNS
72 | P a g
e
C. Sequencing
D. Subnetting
Answer- D. Subnetting
464. Which of the following table helps in representing the previous and next state of the sequential
circuit prior to and the clock pulse respectively?
A. Truth Table
B. Characteristic Table
C. Excitation Table
D. None of the above
Answer- C. Excitation Table
465. One method of programming a computer to exhibit human intelligence is called modeling or
A. Simulation
B. Cognitization
C. Duplication
D. None of the above
Answer- A. Simulation
467. Which of the following tools will identify the address intermediate hops between two
stations?
A. TCP
B. Telnet
C. Ping
D. Traceroute or Tracert
Answer- D. Traceroute or Tracert
469. The relative position of the file marker can be changed via the
A. Marker call
B. EXEC Command
C. Fence Register
D. LSEEK Call
Answer- D. LSEEK Call
73 | P a g
e
470. In a Third Normal Form relation, every attribute is non-transitively and
fully dependent on the every candidate Keys.
A. Prime
B. Unique
C. Non-Prime
D. None of the Above
Answer- C. Non-Prime
471. Which of the following methods provides the greatest frame throughput?
A. Frame-tag switching
B. ISL Switching
C. Store-and-forward switching
D. Cut-through switching
Answer- D. Cut-through switching
472. What must you do to allow a Virtual LAN(VLAN) to span two or more switches?
A. Configure port security on the switch.
B. Set up a VTP domain
C. Configure the duplex setting on the ports
D. Set up a trunk location.
Answer- D. Set up a trunk location.
475. If you wanted to locate the hardware address of a local device, which protocol would you use?
A. Internet Control Message Protocol(ICMP)
B. Packet Internet Gopher(PING)
C. Reverse Address Resolution Protocol (RARP)
D. Address Resolution Protocol (ARP)
Answer- D. Address Resolution Protocol (ARP)
476. To which pin on the RAM chip does the address decoder connect in order to signal which
memory chip is being accessed?
A. The address input
74 | P a g
e
B. The output enable
C. The chip enable
D. The data input
Answer- C. The chip enable
477. The altering of data so that it is not usable unless the changes are undone is
A. Compression
B. Encryption
C. Ergonomics
D. None of the above
Answer- B. Encryption
478. Which of the following scheduler is in charge of handling the swapped out process?
A. Medium term
B. Long term
C. Short term
D. None of the above
Answer- A. Medium term
481. Which component is used by the data analyst to create the queries that access the database?
A. Data extraction
B. End-user query tool
C. End-user presentation tool
D. None of the Above
Answer- B. End-user query tool
482. allows wireless mobile devices to access the Internet and its services.
A. WAP
B. Ethernet
C. TCP/IP
75 | P a g
e
D. None of the Above
Answer- Wireless Application Protocol (WAP)
484. Binding the same name to multiple operations whose signature differ in number or types of
arguments?
A. Overloading
B. Object model
C. Package
D. None of the above
Answer- A. Overloading
485. Implementation of an inverted list to maintain the record list for each value for a given attribute can
be done by
A. Sequential file
B. Direct file
C. Indexed file
D. None of the above Answer-
A. Sequential file
487. In Operating Systems, protection in a paging system is achieved mainly by the PMLTR. PMLTR
stands for
A. Page Map Table Limit Record
B. Page Memory Table Limit Register
C. Page Memory Table Limit Register
D. Page Map Table Limit Register
Answer- D. Page Map Table Limit Register. Paging is a memory-management scheme that removes the
requirement of contiguous allocation of physical memory.
76 | P a g
e
489. Wasting of memory within a partition, due to a reference in size of a partition and of the object
resident within it, is called
A. External Fragmentation
B. Internal Fragmentation
C. Both (A) and (B)
D. None of the above
Answer- B. Internal Fragmentation
492. A network administrator wants to pass traffic between two Virtual LANS(VLANs) on
the same switch. What will he need to accomplish this?
A. bridge
B. switch
C. router
D. None of the Above
Answer- C. router
494. Which of the following tools can be utilized to test IP connectivity between two devices?
A. Ping
B. Telnet
C. Traceroute
D. All of the Above
Answer- D. All of the Above
77 | P a g
e
B. Min heap
C. Priority heap
D. None of the Above
Answer- A. Max heap
497. Tracking and recording of page modifications is usually performed in hardware by adding a
written-into bit to each entry of the page map table. This bit is sometimes called
A. Protection bits
B. Dirty bits
C. Priority bits
D. None of the Above
Answer- B. Dirty bits
78 | P a g
e
Compiler Questions
501. translates high level language(source code) into low level language(object
code)
A. Compiler
B. Interpreter
C. Assembler
D. None of the Above
Answer- A. Compiler
502. System program such as Compiler are designed so that they are
A. Recursive
B. Non-reusable
C. Serially usable
D. Re-enterable
Answer- D. Re-enterable
504. A system program that combines separately compiled modules of a program into a form suitable
for execution is
A. Assembler
B. Linking loader
C. Linker
D. None of the Above Answer-
B. Linking loader
79 | P a g
e
507. Which of the following is used for grouping of characters into tokens?
A. Parser
B. Code generator
C. Loader
D. Lexical Analyser
Answer- D. Lexical Analyser
508. A compiler that runs on a particular platform and is capable of generating executable code for
another platform is called a
A. Assembler
B. Linking loader
C. Loader
D. Cross-Compiler
Answer- D. Cross-Compiler
509. A system program that set up an executable program in main memory ready for execution is ?
A. Assembler
B. Linker
C. Loader
D. Text editor
Answer- C. Loader
510. A compiler which allows only the modified section of the source code to be recompiled is
called as
A. Incremental Compiler
B. Dynamic Compiler
C. Subjective Compiler
D. None of the Above
Answer- A. Incremental Compiler
80 | P a g
e
B. left-most derivation
C. right-most derivation in reverse
D. left-most derivation in reverse
Answer- B. left-most derivation
514. A form of recursive-descent parsing that does not require any back-tracking is known as
A. Predictive parsing
B. Recursive-descent parsing
C. Both (A) and (B)
D. None of the above
Answer- A. Predictive parsing
515. checks whether the parse tree constructed follows the rules of a language.
A. Syntax Analysis
B. Semantic Analysis
C. Lexical Analysis
D. None of the above
Answer- B. Semantic Analysis
518. The graph that shows the basic blocks and their successor relationship is called
A. Control graph
B. Hamiltonian graph
C. Flow Chart
D. None of the above
Answer- C. Flow Chart
81 | P a g
e
Answer- D. All of the Above
522. or scanning is the process where the stream of characters making up the source
program is read from left to right and grouped into tokens.
A. Lexical analysis
B. Diversion
C. Modeling
D. None of the above
Answer- A. Lexical analysis
523. Load address for the first word of the program is called
A. Linker address origin
B. load address origin
C. Phase library
D. None of the above
Answer- B. load address origin
525. Which of the following is permanent database in the general model of compiler?
A. Identifier table
B. Literal table
C. Terminal table
D. None of the above Answer-
C. Terminal table
82 | P a g
e
526. Which of the following module does not incorporate initialization of values changed by the
module?
A. reusable module
B. Serially usable module
C. re-enterable module
D. non reusable module
Answer- D. non reusable module
527. Analysis that determines the meaning of a statement once its grammatical structure becomes
known is termed as
A. Semantic analysis
B. Syntax analysis
C. Regular analysis
D. General analysis
Answer- A. Semantic analysis
528. Which of the following system software resides in main memory always?
A. Linker
B. Loader
C. Assembler
D. None of the above
Answer- B. Loader
Engineering Questions:
83 | P a g
e
532. Which of the following software engineering concept does Ada language support?
A. abstraction
B. generic
C. information hiding
D. All of the Above
Answer- D. All of the Above
533. A module that is supplied along with the programming language translator to make the language
easier is called a/an
A. intrinsic function
B. benchmark program
C. data structure
D. None of the Above
Answer- A. intrinsic function
535. The model which estimates the total effort in terms of person, months of the technical project
staff, is
A. waterfall model
B. spiral
C. COCOMO Model
D. prototyping
Answer- C. COCOMO Model
A. requirement analysis
84 | P a g
e
B. testing
C. coding
D. None of the Above
Answer- B. testing
541. Which of the following is/are included in the Software Requirement Specification(SRS)
document?
A. Functional requirements
B. Non-Functional requirements
C. Goals of Implementation
D. All of the Above
Answer- D. All of the Above
85 | P a g
e
545. is a popular version of the Systems Development Life Cycle (SDLC) model for
Software Engineering.
A. Waterfall Model
B. Iterative Model
C. Spiral Model
D. V Model
Answer- A. Waterfall Model
547. The traditional methodology used to develop, maintain, and replace information
systems is
A. SDLC
B. RAD
C. OOAD
D. prototyping
Answer- A. SDLC
549. Which of the following is the Central component of any CASE tool?
A. CASE concentrator
B. CASE origin
C. CASE repository
D. None of the above
Answer- C. CASE repository
550. The phase of the SDLC in which an information system is systematically repaired and
improved is referred to as
A. analysis
B. implementation
C. maintenance
D. None of the above
Answer- C. maintenance
551. Which of the following model is a combination of Iterative model and Waterfall model?
A. linear-sequential Model
86 | P a g
e
B. Spiral Model
C. V Model
D. None of the Above
Answer- B. Spiral Model
553. Which of the following model is also referred to as a linear-sequential life cycle model?
A. Waterfall Model
B. Iterative Model
C. Spiral Model
D. V Model
Answer- A. Waterfall Model
555. According to Lehman’s laws of software evolution, the software can be divided into
types.
A. Two
B. Four
C. Three
D. Six
Answer- C. Three
556. What is the final result of the requirements analysis and specifications phase ?
A. data flow diagram
B. SRS Document
C. Coding the project
D. User Manual
Answer- B. SRS Document
87 | P a g
e
558. The 4GT Model is a package of .
A. CASE Tools
B. Software tools
C. Both (A) and (B)
D. None of the Above Answer-
B. Software tools
560. Which of the following is the most important phase of Software Development Life Cycle (SDLC)?
A. Requirements analysis
B. Coding
C. Testing
D. Designing
Answer- A. Requirements analysis
563. ACID is a concept that defines four transaction properties of a database.ACID stands for
A. Accuracy, Characteristics, Interface, Data mart
B. Atomicity, Consistency, Interface, Data mart
C. Accuracy, Characteristics, Isolation, Data mart
D. Atomicity, Consistency, Isolation, Durability
88 | P a g
e
Answer- D. Atomicity, Consistency, Isolation, Durability
564. Which of the following is middle ware designed to support rapid high volume on-line transactions?
A. Oracle
B. Customer Information Control System(CICS)
C. Both (A) and (B)
D. None of the Above
Answer- B. Customer Information Control System(CICS)
565. Which of the following middle ware technology might need the Interface Definition Language
(IDL)?
A. COBOL
B. RAI
C. CORBA
D. None of the Above
Answer- C. CORBA
569. Which term is used to describe the process of forecasting or discovering pattern in data?
A. Data Modeling
B. Data Warehousing
C. Data Mining
D. Normalization
Answer- C. Data Mining
89 | P a g
e
570. Which of the following technology was Microsoft’s first attempt at an object- oriented database
interface?
A. Data Access Objects (DAO)
B. ActiveX Data Objects (ADO)
C. Universal Data Access (UDA)
D. None of the Above
Answer- A. Data Access Objects (DAO)
571. is a centralized repository that stores data from multiple sources and transforms
them into a common, multi dimensional model for efficient querying and analysis.
A. Data Selection
B. Data Cleaning
C. Data Integration
D. Data Warehouse
Answer- D. Data Warehouse
90 | P a g
e
576. Which performs multidimensional analysis of business data and provides the capability for complex
calculations, trend analysis and sophisticated datamodeling?
A. OLAP
B. OLTP
C. Both (A) and (B)
D. None of the Above
Answer- A. OLAP
577. Which of the following is the simplest and less technical type of data warehouse?
A. Real Time Data Warehouse
B. Integrated Data Warehouse
C. Offline Data Warehouse
D. Offline operational Data Warehouse
Answer- D. Offline operational Data Warehouse
578. Which of the following Data Warehouse is updated from data in the operational systems on a regular
basis?
A. Real Time Data Warehouse
B. Integrated Data Warehouse
C. Offline Data Warehouse
D. Offline operational Data Warehouse
Answer- C. Offline Data Warehouse
579. is a data warehouse that can assemble data from different areas of business.
A. Real Time Data Warehouse
B. Integrated Data Warehouse
C. Offline Data Warehouse
D. Offline operational Data Warehouse Answer-
B. Integrated Data Warehouse
91 | P a g
e
582. is a type of data mining used in Customer Relationship
Management(CRM)
A. Clustering
B. Web mining
C. Both (A) and (B)
D. None of the Above
Answer- B. Web mining
583. is the process of using graph theory to analyse the node and connection
structure of a web site.
A. Web structure mining
B. Web content mining
C. Web usage mining
D. None of the Above
Answer- A. Web structure mining
585. Which of the following is used to examine data collected by search engines and web spiders?
A. Web structure mining
B. Web content mining
C. Web usage mining
D. None of the Above
Answer- B. Web content mining
586. a special type of computational cluster that is specifically designed for storing and
analysing large amount of unstructured data.
A. Hadoop Cluster
B. Failover Cluster
C. Both (A) and (B)
D. None of the Above Answer-
A. Hadoop Cluster
587. The process of grouping a set of objects into classes of similar objects is called
A. clustering
B. classification
C. Association
D. All of the Above
Answer- A. clustering
92 | P a g
e
588. Which parameter is used to discover patterns in data that can lead to reasonable
predictions about the future?
A. clustering
B. classification
C. Association
D. Forecasting
Answer- D. Forecasting
589. Which of the following is the process of detecting and correcting the wrong data?
A. Data Selection
B. Data Cleaning
C. Data Integration
D. None of the Above Answer-
B. Data Cleaning
590. Which of the following is the process of combining data from different resources?
A. Data Selection
B. Data Cleaning
C. Data Integration
D. None of the Above
Answer- C. Data Integration
591. An important purpose of the shared pool is to cache the executable versions of
statements.
A. SQL
B. PL/SQL
C. Both (A) and (B)
D. None of the above
Answer- C. Both (A) and (B)
592. Which of the following is/are main component(s) of the shared pool?
A. library Cache
B. dictionary Cache
C. Both (A) and (B)
D. None of the above
Answer- C. Both (A) and (B)
593. Oracle Database segregates a small amount of the shared pool for large objects(Over
5KB).The segregated area of the shared pool is called
A. Fixed Pool
B. Reserved Pool
C. Allocated Pool
D. None of the above Answer-
B. Reserved Pool
93 | P a g
e
594. Which stores the executable(parsed) form of SQL cursors and PL/SQL programs?
A. library Cache
B. dictionary Cache
C. Both (A) and (B)
D. None of the above
Answer- A. library Cache
596. When a query is submitted to oracle server for execution, oracle checks if same query has
been executed previously. If found the same then this event is known as
A. Library cache hit
B. soft parsing
C. Both (A) and (B)
D. None of the above
Answer- C. Both (A) and (B)
597. If the parsed form of the statement is not found in the shared pool then new statement is parsed
and its parsed version is stored in Shared SQL area. This is known as
A. Library cache hit
B. Soft parsing
C. Hard parsing
D. None of the above
Answer- C. Hard parsing
94 | P a g
e
600. Reuse of shared SQL for multiple users running the same application avoids
603. is a tool for entering and running ad-hoc based database statements.
A. MySQL
B. PL/SQL
C. SQL*PLUS
D. None of the above
Answer- C. SQL*PLUS
605. Oracle 9i can scale tens of thousands of concurrent users support upto
petabytes data.
A. 124
B. 256
C. 512
D. 624
Answer- C. 512
95 | P a g
e
B. three
C. four
D. five
Answer- A. two
608. The process is used for inter-instance locking in Real Application Clusters.
A. Front Manager Server
B. Back Manager Server
C. Lock Manager Server
D. None of the above
Answer- C. Lock Manager Server
611. What type of failure occurs when Oracle fails due to an operating system or computer hardware
failure?
A. Application failure
B. Instance Failure
C. Media Failure
D. Roll back failure
Answer- B. Instance Failure
612. Which Oracle backup and recovery file contains user and system data?
A. Control file
B. Data file
C. Offline Redo file
D. None of the Above
Answer- B. Data file
96 | P a g
e
613. When is the System Global Area (SGA) created in an Oracle database environment?
A. When the database is created
B. When a user process is started
C. When the database is mounted
D. When the instance is started
Answer- D. When the instance is started
614. What is the type of Oracle backup in which all uncommitted changes have been removed from the
data files?
A. Full backup
B. Consistent backup
C. Inconsistent backup
D. Differential backup
Answer- B. Consistent backup
616. Which password management feature ensures a user cannot reuse a password for a specified time
interval?
A. Account Locking
B. Password History
C. Password Verification
D. None of the Above
Answer- B. Password History
97 | P a g
e
B. External
C. Conceptual
D. None of the Above
Answer- B. External
620. Which Normal Form(NF) is considered adequate for normal relational database design?
A. 2NF
B. 5NF
C. 4NF
D. 3NF
Answer- D. 3NF
623. Which of the following operator combines two or more SELECT statements?
(A) In
(B) Like
(C) Union
(D) None of the above
Answer- (C) Union
625. Which of the following datatype holds a string with maximum length of 255 characters?
(A) Text
(B) Medium Text
(C) Long Text
(D) Tiny Text
Answer- (D) Tiny Text
98 | P a g
e
626. In E-R Diagram, the total participation by entities is represented as
(A) Dashed line
(B) Rectangle
(C) Double rectangle
(D) Double line
Answer- (D) Double line
630. are used to specify the rules for the data in a table.
(A) Constraints
(B) Aliases
(C) Wildcards
(D) None of the above
Answer- (A) Constraints
99 | P a g
e
Answer- (A) Memo
623. Which of the following operator combines two or more SELECT statements?
(A) In
(B) Like
(C) Union
(D) None of the above
Answer- (C) Union
625. Which of the following datatype holds a string with maximum length of 255 characters?
(A) Text
(B) Medium Text
(C) Long Text
(D) Tiny Text
Answer- (D) Tiny Text
100 | P a g
e
(C) MS Excel
(D) None of the above
Answer- (B) MS Access
630. are used to specify the rules for the data in a table.
(A) Constraints
(B) Aliases
(C) Wildcards
(D) None of the above
Answer- (A) Constraints
632. Which of the following clause is an additional filter that is applied to the result?
(A) Having
(B) Group-by
(C) Select
(D) Order by
Answer- (A) Having
634. Which of the following is used to determine whether of a table contains duplicate rows?
(A) Unique predicate
(B) Like Predicate
(C) Null predicate
(D) In predicate
Answer-(A) Unique predicate
635. The candidate key is that you choose to identify each row uniquely is called
(A) Primary Key
(B) Foreign Key
(C) Alternate Key
(D) None of the above
Answer- (A) Primary Key
101 | P a g
e
636. An operator is basically a join followed by a project on the attributes of first relation is known as
(A) Join
(B) Inner Join
(C) Full Join
(D) Semi-Join
Answer- (D) Semi-Join
637. Which of the following is a special type of integrity constraint that relates two relations and
maintains consistency across the relations?
(A) Entity Integrity Constraints
(B) Referential Integrity Constraints
(C) Domain Integrity Constraints
(D) None of the above
Answer- (B) Referential Integrity Constraints
638. Each modification done in database transaction are first recorded into the
(A) Hard Drive
(B) Disk
(C) Log File
(D) Data Mart Answer-
(C) Log File
639. Which of the following is preferred method for enforcing data integrity?
(A) Cursors
(B) Constraints
(C) Triggers
(D) None of the above
Answer- (B) Constraints
640. Which allows to make copies of the database periodically to help in the cases of crashes and
disasters?
(A) Recovery utility
(B) Data loading utility
(C) Monitoring utility
(D) Backup Utility
Answer- (D) Backup Utility
102 | P a g
e
642. Which of the following is the most common type of Join?
(A) INNER JOIN
(B) INSIDE JOIN
(C) JOINED
(D) None of the above
Answer- (A) INNER JOIN
647. In SQL,which of the following wildcard character is used as a substitute for Zero or more
characters?
(A) *
(B) _
(C) ^
(D) %
Answer- (D) %
103 | P a g
e
Answer- (A) block
649. Which of the following is a special type of stored procedure that is automatically
invoked whenever the data in the table is modified?
(A) Curser
(B) Trigger
(C) Both (A) & (B)
(D) None of the above
Answer- (B) Trigger
652. Which of the following keyword can be used to return different values?
(A) SELECT
(B) GET
(C) OPEN
(D) DISTINCT
Answer- (D) DISTINCT
653. operator is used to display a record if either the first condition or the second condition is
true.
(A) AND
(B) OR
(C) Both (A) & (B)
(D) None of the above
Answer- (B) OR
654. Which of the following DBMS provides faster response time and better performance?
(A) Relational Database Management System (RDBMS)
(B) NoSQL DBMS
(C) In-Memory Database Management System (IMDBMS)
(D) None of the above
Answer- (C) In-Memory Database Management System (IMDBMS)
104 | P a g
e
655. is suitable for data warehouses that have a large number of similar data items.
(A) Relational Database Management System (RDBMS)
(B) Columnar Database Management system (CDBMS)
(C) In-Memory Database Management System (IMDBMS)
(D) None of the above
Answer- (B) Columnar Database Management system (CDBMS)
656. Which of the following is standard interactive and programming language for getting information
from and updating a database.
(A) SQL
(B) PHP
(C) ASP
(D) None of the above
Answer- (A) SQL
658. Which of the following is an open standard Application Programming Interface (API) for accessing a
database?
(A) Universal Data Access
(B) Open Database Connectivity
(C) Command Line Interface
(D) Open Data-Link Interface
Answer- (B) Open Database Connectivity
660. Which method of Online Analytical Processing stores data in both a relational and a multi
dimensional database.
(A) Hybrid OLAP
(B) Relational OLAP
(C) OLAP
(D) None of the above
Answer- (A) Hybrid OLAP
105 | P a g
e
(B) Online Analysis Processing
(C) Online Analytical Processing
(D) None of the above
Answer- (C) Online Analytical Processing
662. The operation allows the combining of two relations by merging pairs of tuples, one from
each relation, into a single tuple.
(A) Join
(B) Intersection
(C) Union
(D) None of the above
Answer- (A) Join
665. In SQL, the spaces at the end of the string are removed by function .
(A) Lower
(B) String
(C) Trim
(D) None of the above
Answer- (C) Trim
667. A unit of storage that can store one or more records in a hash file organization is denoted as
(A) Bucket
(B) Disk pages
(C) Blocks
(D) Nodes
Answer- (A) Bucket
106 | P a g
e
668. Which of the following operator used for appending two strings?
(A) %
(B) &
(C) +
(D) ||
Answer- (D) ||
669. The management information system (MIS) structure with one main computer system is called a
674. Which TCL command is used to permanently save any transaction into database?
(A) rollback
107 | P a g
e
(B) savepoint
(C) commit
(D) None of the above
Answer- (C) commit
675. Which TCL command restores the database to last committed state?
(A) rollback
(B) savepoint
(C) commit
(D) None of the above
Answer- (A) rollback
678. In oracle, which tablespace is the minimum required when creating a database?
(A) System tablespace
(B) Undo tablespace
(C) temporary tablespace
(D) None of the above
Answer- (A) System tablespace
108 | P a g
e
681. The language used in application programs to request data from the DBMS is referred to as the
(A) DML
(B) DDL
(C) DCL
(D) None of the above
Answer- (A) DML
684. A contains the smallest unit of meaningful data, so you might call it the basic building
block for a data file.
(A) Record
(B) Field
(C) Table
(D) None of the above
Answer- (B) Field
109 | P a g
e
(B) column (or) field
(C) entity
(D) None of the above
Answer- (B) column (or) field
688. Which of the following categories of the data integrity RDBMS will enforce specific business
rules?
(A) Entity Integrity
(B) Domain Integrity
(C) User-Defined Integrity
(D) None of the above
Answer- (C) User-Defined Integrity
110 | P a g
e
694. ….. is a top-down approach in which one higher level entity can be divided into two lower level
entities.
(A) Aggregation
(B) Specialization
(C) Generalization
(D) None of the above Answer-
(B) Specialization
111 | P a g
e
(D) None of the above
Answer- (C) Data Mining
701. A collection of conceptual tools for describing data, relationships, semantics and constraints is
referred to as ……….
(A) Data Model
(B) E-R Model
(C) DBMS
(D) All of the above Answer-
(A) Data Model
702. Dr.E.F. Codd represented ……. rules that a database must obey if it has to be considered truly
relational.
(A) 10
(B) 15
(C) 14
(D) 12
Answer- (D) 12
705. ……. is a bottom-up approach in which two lower level entities combine to form a higher level
entity.
(A) Aggregation
(B) Specialization
(C) Generalization
(D) None of the above Answer-
(C) Generalization
706. An entity set that does not have sufficient attributes to form a primary key, is a
……
(A) Primary entity set
(B) Weak entity set
(C) Strong entity set
(D) None of the above
Answer- (B) Weak entity set
112 | P a g
e
707. Which SQL command delete all the records and does not remove the structure?
(A) Drop
(B) Insert
(C) Truncate
(D) None of the above
Answer- (C) Truncate
709. In …….. database, data is organized in the form of trees with nodes.
(A) Hierarchical
(B) Relational
(C) Network
(D) None of the above
Answer- (A) Hierarchical
710. Which command is used to retrieve records from one or more table?
(A) Delete
(B) Insert
(C) Drop
(D) Select
Answer- (D) Select
711. allows a unique number to be generated when a new record is inserted into a
table.
(A) Insert Into Select
(B) Insert Into
(C) Select Into
(D) Auto Increment
Answer- (D) Auto Increment
712. Which of the following constraint is used to limit the value range that can be placed in a column?
(A) Check
(B) Default
(C) Unique
(D) None of the above
Answer- (A) Check
113 | P a g
e
(C) Primary
(D) None of the above
Answer- (C) Primary
714. Domain constraints, functional dependency and referential integrity are special forms of
(A) Foreign key
(B) Primary key
(C) Referential constraint
(D) Assertion
Answer- (D) Assertion
716. Which of the following field type is used to store photograph of employees?
(A) Memo
(B) Picture
(C) OLE
(D) Photo Answer-
(C) OLE
717. statement is used in conjunction with the aggregate functions to group the
result-set by one or more columns.
(A) Select
(B) Group By
(C) Distinct
(D) None of the above
Answer- (B) Group By
718. Which of the following method can be used to add more tables in a database?
(A) Design View
(B) Table Wizard
(C) Both (A) & (B)
(D) None of the above Answer-
(C) Both (A) & (B)
719. Which of the following field type is the best to store serial numbers?
(A) Number
(B) Auto Number
(C) Text
(D) Memo
Answer- (B) Auto Number
114 | P a g
e
720. The feature that database allows to access only certain records in database is
(A) Queries
(B) Reports
(C) Forms
(D) Tables
Answer- (A) Queries
Mixed Questions:2
721. The process by which the structure of the database is modified to eliminate hidden
dependencies and replacing groups is
A. Normalization
B. Indexing
C. Enforcing referential integrity
D. Enforcing data integrity
Answer- A. Normalization
722. Which kind of lock includes a keypad that can be used to control access into areas?
A. Cipher
B. Warded
C. Device
D. Tumber
Answer- A. Cipher
723. Programs that automatically submit your search request to several search engines
simultaneously are called-
A. WebCrawler
B. Meta search engines
C. Spiders
D. Hits
Answer- B. Meta search engines
724. This tier processes HTTP protocol, scripting tasks, performs calculations,
and
provides access to data.
A. Applications/Web server
B. Client
C. Enterprise server
D. DBA
Answer- B. Client
725. A communication processor that connects dissimilar networks by providing the translation from one
set of protocol to another is
A. Bridge
115 | P a g
e
B. Router
C. Gateway
D. Modem
Answer- C. Gateway
726. Which the result of a computation depends on the speed of the processes involved there is
said to be ?
A. Cycle stealing
B. Race condition
C. A time look
D. A dead lock
Answer- B. Race condition
727. A method which transfers the entire block of data from its own buffer to main memory takes place
without intervention by CPU.
A. Programmed Input/Output
B. Input driven Input/output
C. Direct Memory Access
D. None of the above
Answer- C. Direct Memory Access
731. Which of the following systems implementation approaches should be used if you want to run the
old system and the new system at the same time for a specified period?
A. direct
B. pilot
C. phased
116 | P a g
e
D. parallel
Answer- D. parallel
733. A generalization of the Boyce Codd Normal Form to relation schemes which includes the
multivalued dependencies is called
A. Second Normal Form
B. Third Normal Form
C. Fourth Normal Form
D. Fifth Normal Form
Answer- C. Fourth Normal Form
736. If communication software can be called the "traffic cop" of a micro communication
system, then what should the modem be called?
A. Park
B. Bridge
C. Interface
D. Link
Answer- B. Bridge
117 | P a g
e
738. Which of the following communications service provides message preparation and transmission
facilities?
A. Teletex
B. Teletext
C. x400
D. Fax
Answer- A. Teletex
739. An assembler that runs on one machine but produces machine code for another machine
is called
A. Simulator
B. Emulator
C. Boot-Strap loader
D. Cross Assembler
Answer- D. Cross Assembler
741. A transition between two memory resident process in a multiprogramming system is called
A. Process Switch
B. Mode Switch
C. Transition Switch
D. All of the above
Answer-A. Process Switch
743. A set of resources' allocations such that the system can allocate resources to each process in
some order, and still avoid a deadlock is called
A. Unsafe state
B. Safe state
C. Starvation
D. Greedy allocation
Answer- B. Safe state
744. Which of the following does not allow multiple users or devices to share one communications
line?
118 | P a g
e
A. doubleplexer
B. multiplexer
C. concentrator
D. controller
Answer- A. doubleplexer
745. Consider an operation of addition. For two numbers the operation will generate a sum. If the
operands are strings, and the same operation would produce a third string by concatenation. This feature is
called
A. Inheritance
B. Encapsulation
C. Polymorphism
D. Binding
Answer- C. Polymorphism
749. Programming in a language that actually controls the path of signals or data within the computer
is controlled
A. micro-programming
B. instruction set
C. assembly language programming
D. machine language programming.
Answer- A. micro-programming
750. A utility programme that takes a procedure and searches a library to locate copies of any
procedures called but not defined in the first procedure, is called
119 | P a g
e
A. linker
B. re-locator
C. loader
D. text editor
Answer- A. linker
751. This is a type of program that lets one or more computer users create, manage, and
access data in a database.
A. B2B
B. DBMS
C. multidimensional database
D. None Answer-
DBMS
752. In a relational database, this is a data structure that organizes the information about a single topic
into rows and columns.
A. block
B. record
C. tuple
D. table
Answer- table
753. This is a family of relational database management system products from IBM that serve a number
of different operating system platforms.
A. Cognos
B. DB2
C. ADO
D. Universal Data Access
Answer- DB2
754. This is a central repository for all or significant parts of the data that an enterprise's various
business systems collect.
A. data warehouse
B. business information warehouse
C. knowledge warehouse
D. None
Answer- data warehouse
755. This is the job title of someone who directs or performs all activities related to maintaining a
successful database environment.
A. DBA
B. MOLAP
120 | P a g
e
C. PHP
D. RFC
Answer- DBA
756. This is a common standard language used to update and get information from a database.
A. VB
B. TMQL
C. PHP
D. SQL
Answer- SQL
757. This is a file format that contains the values in a table in which column values are separated by a
comma and each row starts a new line.
A. ASCII
B. CSV file
C. virtual organization
D. None
Answer- CSV file
758. In a relational database, this is the data structure that holds a single piece of data, such as first
name or phone number.
A. catalog
B. field
C. entity
D. object
Answer- field
759. This is an organized selection of data from a database that allows you to look at it from a
particular perspective.
A. Venn diagram
B. Gantt chart
C. view
D. splay tree
Answer- view
760. This a program tool allows you to reorganize and summarize selected columns and rows of data in
a spreadsheet or database table to obtain a desired report.
A. pivot table
B. PERT chart
C. quad tree
D. ODBC
Answer- pivot table
761. At this level of normalization, each column in a table that is not a determiner of the contents of
another column, must itself be a function of the other columns in the table.
A. 1NF
121 | P a g
e
B. 2NF
C. 3NF
D. DKNF
Answer- 2NF
762. This method of online analytical processing stores data in both a relational and a multi dimensional
database.
A. HOLAP
B. ROLAP
C. OLAP
D. DIMM Answer-
HOLAP
763. Which technology was Microsoft's first attempt at an object-oriented database interface?
A. MQSeries
B. ADO
C. DAO
D. UDA
Answer- DAO
765. Which of the following tree structures is unique in that the tree organization varies depending on
which nodes are most frequently accessed?
A. B-tree
B. binary tree
C. quad tree
D. splay tree Answer-
splay tree
122 | P a g
e
Answer- transactions
768. A Database Management System (DBMS) may be used by, or combined with, this type of
transaction manager.
A. DB2
B. CICS
C. Oracle
D. Cognos
Answer- CICS
769. Encapsulation, types, classes, inheritance, overriding combined with late binding, and
extensibility are all features of this type of database.
A. multidimensional database
B. relational database
C. object-oriented
D. open source
Answer- object-oriented
770. A programmer using this type of middleware might need the Interface Definition
Language (IDL).
A. RPC
B. ORB
C. MUD
D. EAI Answer-
ORB
771. This is a collection of data items organized as a set of formally-described tables from which
data can be accessed or reassembled in many different ways without having to reorganize the
database tables.
A. relational database
B. array
C. file allocation table
D. splay tree
Answer- relational database
772. This is a standard interactive and programming language for getting information from
and updating a database.
A. dynamic data exchange
B. Structured Query Language
C. ASCII
D. Erlang programming language Answer-
Structured Query Language
773. In creating a database, this is the process of organizing it into tables insuch a way that the results
of using the database are always unambiguous.
A. probability
B. normalization
C. data modeling
123 | P a g
e
D. query by example
Answer- normalization
775. This is an open standard application programming interface (API) for accessing a
database.
A. Universal Data Access
B. Open Database Connectivity
C. Topic Map Query Language
D. Open Data-Link Interface
Answer- Open Database Connectivity
776. This term, used to describe a database that occupies magnetic storage in the terabyte range,
describes a database that contains billions of table rows.
A. Very Large Database
B. holographic storage
C. Cold Fusion
D. giant
Answer- Very Large Database
777. This is a collection of descriptions about data objects that is created for the benefit of
programmers and others who might need to refer to them.
A. data dictionary
B. stored procedure
C. Virtual File Allocation table
D. catalog
Answer- data dictionary
778. This term is used to describe the process of forecasting, or simply discovering patterns in data that
can lead to predictions about the future.
A. customer relationship management
B. PERT chart
C. data mining
D. enterprise risk management
Answer- data mining
124 | P a g
e
Answer- Number of tuples.
784. For which two constraints are indexes created when the constraint is added?
A. Primary key
B. Unique
C. Not null
D. Both (A) & (B) Answer-
Both (A) & (B)
785. What type of failure occurs when Oracle fails due to an operating system or computer hardware
failure?
A. Application failure
B. Instance Failure
C. Media Failure
D. Rollback failure
Answer- Instance Failure
125 | P a g
e
C. When the database is mounted
D. When the instance is started
Answer- When the database is created
787. Which password management feature ensures a user cannot reuse a password for a specified time
interval?
A. Account Locking
B. Password History
C. Password Verification
D. Password Expiration and Aging
Answer- Password History
789. What is the type of Oracle backup in which all uncommitted changes have been removed from the
Data files?
A. Full backup
B. Consistent backup
C. Inconsistent backup
D. Differential backup Answer-
Consistent backup
790. Which are the physical structures that constitute the Oracle database?
A. control file
B. Data file
C. Log file
D. All of the above Answer-
All of the above
126 | P a g
e
793. ODBC stands for
A. Object Database Connectivity.
B. Oral Database Connectivity.
C. Oracle Database Connectivity.
D. Open Database Connectivity.
Answer- Open Database Connectivity.
795. The database environment has all of the following components except:
A. Users.
B. Separate files.
C. Database.
D. Database administrator
Answer- Users.
796. The language which has recently become the de-facto standard for interfacing application
programs with relational database system is
A. Oracle.
B. SQL.
C. DBase.
D. None
Answer- SQL.
127 | P a g
e
Answer- A tuple.
800. The method in which records are physically stored in a specified order according to a key
field in each record is
A. Hash.
B. Direct.
C. Sequential.
D. All of the above.
Answer- Hash.
805. The statement in SQL which allows to change the definition of a table is
A. Alter.
B. Update.
C. Create.
D. Select.
Answer- Alter.
128 | P a g
e
C. Procedural query Language
D. None of the above
Answer- Procedural query Language
129 | P a g
e
B. Degree.
C. Tuple.
D. Domain. Answer-
Domain.
815. Which of the following database object does not physically exist?
A. Base table
B. Index
C. View
D. None of the above
Answer- View
816. Which two files are used during operation of the DBMS?
A. Query languages and utilities
B. DML and query language
C. Data dictionary and transaction log
D. Data dictionary and query language
Answer- Data dictionary and transaction log
130 | P a g
e
A. not Null
B. Null
C. both Null & not Null.
D. any value.
Answer- not Null
821. The language used in application programs to request data from the DBMS is referred to as the
A. DML
B. DDL
C. VDL
D. SDL
Answer- DML
823. E-R model uses this symbol to represent weak entity set?
A. Dotted rectangle.
B. Diamond
C. Doubly outlined rectangle
D. None of these
Answer-Doubly outlined rectangle
826. In a relation
A. Ordering of rows is immaterial
B. No two rows are identical
C. Both (A) and (B)
D. None of these.
Answer- Both (A) and (B)
131 | P a g
e
827. The conceptual model is
A. dependent on hardware.
B. dependent on software.
C. dependent on both hardware and software.
D. independent of both hardware and software.
Answer- independent of both hardware and software.
828. Which of the following operation is used if we are interested in only certain columns of a table?
A. PROJECTION
B. SELECTION
C. UNION
D. JOIN
Answer- PROJECTION
830. Which are the two ways in which entities can participate in a relationship?
A. Passive and active
B. Total and partial
C. Simple and Complex
D. All of the above
Answer- Total and partial
833. A file manipulation command that extracts some of the records from a file is called
A. SELECT
B. PROJECT
132 | P a g
e
C. JOIN
D. PRODUCT
Answer- SELECT
834. The physical location of a record is determined by a mathematical formula that transforms a file key
into a record location is :
A. B-Tree File
B. Hashed File
C. Indexed File
D. Sequential file.
Answer- Hashed File
839. The operator is used to compare a value to a list of literals values that have been
specified.
A. BETWEEN
B. ANY
C. IN
D. ALL
Answer-BETWEEN
133 | P a g
e
840. function divides one numeric expression by another and returns the
remainder.
A. POWER
B. MOD
C. ROUND
D. REMAINDER
Answer- MOD
842. is a virtual table that draws its data from the result of an SQL SELECT
statement.
A. View
B. Synonym
C. Sequence
D. Transaction
Answer- View
134 | P a g
e
D. VDL and DML
Answer- DDL and DML.
848. Which of the operations constitute a basic set of operations for manipulating relational data?
A. Predicate calculus
B. Relational calculus
C. Relational algebra
D. None of the above Answer-
Relational algebra
135 | P a g
e
136 | P a g
e