Rajasthan Staff Selection Board RSSB Basic and Senior Computer Instructor Study Material & Question Bank Chief Editor Anand Kumar Mahajan Written by Shrikant Vishwakarma, Vikash Maurya, Nitesh Mishra, Pramod Yadav, Shashikant Yadav, Meena Kanaujia Computer Graphics by Balkrishna, Charan Singh Editorial Office Youth Competition Times 12, Church Lane Prayagraj-211002 Mob. : 9415650134 Email : yctap12@gmail.com website : www.yctbooks.com Publisher Declaration Edited and Published by A.K. Mahajan for YCT Publication Pvt. Ltd. and printed by R.A. Security Printers, Prayagraj. In order to publish the book, full care has been taken by the editor and the publisher, still your suggestions and queries are welcomed. In the event of any dispute, the Judicial area will be Prayagraj. Rs. : 250/- Content Syllabus of RSSB ............................................................................................................................... 3-3 Fundamentals of Computer ............................................................................................................ 4-19 Introduction of Computer Computer Hardware and Devices Input Device Output Device Memory/Storage Device Representation of Data, Number system Conversion of Numbers Introduction to Data Processing Data Processing Files and Types Important Facts Important Questions Asked in Previous Years Examinations with Answer Key Data Processing.............................................................................................................................. 20-52 Word Processing Microsoft Office Word (MS Word) Microsoft Excel PowerPoint M.S. Office (Access) Important Facts Important Questions Asked in Previous Years Examinations with Answer Key Programming Fundamentals...................................................................................................... 53-110 Introduction to C Introduction to C++ Java .Net Artificial Intelligence Machine Learning Pytho Blockchain, Principles and programming techniques Introduction of object oriented programming (OOPs) Integrated Development Environment Important facts Important Questions Asked in Previous Years Examinations with Answer Key Data structures and Algorithms ............................................................................................... 111-125 Algorithms for Problem Solving Abstract Data Types (ADT) Arrays as Data Structure Linked list V/S Array for Storage Stack & Stack Operation Queue Basic Operations General Tree Graph and their representation Sorting & Searching Symbol Table Data Structure Using C & C++ Important Points Important Questions Asked in Previous Years Examinations with Answer Key Computer Organization and Operation System ..................................................................... 126-149 Basic Structure of Computer Computer Arithmetic Operations Central Processing Unit and Instructions Memory Organization I/O Organization Operating Systems Overview Process Management Finding & Processing File Important Facts Important Questions Asked in Previous Years Examinations with Answer Key Communication and Network Concepts ................................................................................. 150-173 Introduction to Computer Network Networks Layers/Models Networking Devices Fundamentals of Mobile Communication Important Facts Important Questions Asked in Previous Years Examinations with Answer Key Network Security ....................................................................................................................... 174-184 Network Security Protecting computer systems from viruses and malicious Attacks Firewall Network attack Ethical Hacking Important Facts Important Questions Asked in Previous Years Examinations with Answer Key Database Management System................................................................................................. 185-209 An Overview of the Database Management Architecture of DBMS Relational Database Management System (RDBMS) Database Design Manipulating Data NoSql database SQL Important Facts Important Questions Asked in Previous Years Examinations with Answer Key System Analysis and Design ..................................................................................................... 210-241 Introduction Requirement Gathering & Feasibility Analysis Structured Analysis Structured Design Object-oriented Modeling using UML Testing Software Implementation and Maintenance Software Implementation: Other Software Development Approaches Important Facts Important Questions Asked in Previous Years Examinations with Answer Key Internet of things and its application ....................................................................................... 242-258 Introduction to IoT What is data What is Cloud Virtual Reality Internet Technology Protocol Search Engines Introduction to online & offline messaging World Wide Web Browsers Web Publishing Basic Knowledge HTML, XML and Scripts Creation & Maintenance of websites HTML Tools Multimedia and Graphics Voice Mail and Video Conferencing Introduction to e-commerce Important Facts Important Questions Asked in Previous Years Examination with Answer Key Major Developments in IT........................................................................................................ 259-261 Introduction Important Questions Asked in Previous Years Examinations with Answer Key Pedagogy..................................................................................................................................... 262-272 Aims and Objectives of Teaching Computer Sciences Hardware and Software of Computers Micro Teaching Instructional Methods Instructional Aids Latest Trends in Information Technology Evaluation in Computer Science Important Questions Asked in Previous Years Examinations with Answer Key 2 Syllabus of RSSB 12. Pedagogy: UNIT-I: Aims and Objectives of Teaching computer Sciences 1.1 Introduction 1.2 Objectives 1.3 Purpose of Teaching Computer Science 1.4 Aims and Objectives of Teaching Computer Science 1.5 Need for Teaching Computer Science 1.6 Bloom's Taxonomy of Educational Objectives 1.7 Computer Science Teaching at Different Levels in Schools 1.8 The Place of Computer Science in School Curriculum 1.9 Computer Science Teaching in Relation to Other School Subjects UNIT-II: Hardware and Software of Computers 2.1 Introduction 2.2 Objectives 2.3 Definitions Computers 2.4 History of Computers 2.5 Types of Computers 2.6 Computer Network 2.7 Computer Virus 2.8 The Various Uses of Computers 2.9 Uses of Computers in Schools UNIT-III: Micro Teaching 3.1 Introduction 3.2 Objectives 3.3 Micro Teaching 3.4 Principles of Micro Teaching 3.5 Phases of Micro-Teaching 3.6 Teaching Skills UNIT-VI: Instructional Methods 4.1 Introduction 4.2 Objectives 4.3 Unit Plan 4.4 Lesson Plan Writing in Computer Science 4.5 Methods of Teaching Computer Science UNIT V: Instructional Aids 5.1 Instructional Aids in the Teaching of Computer Science 5.2 Characteristics of Instructional Aids or Audio-Visual Aids 5.3 Instructional Aids Used in Teaching 5.4 Interactive Whiteboard 5.5 PowerPoint Presentation UNIT VI: Latest Trends In Information Technology 6.1 Multimedia 6.2 Desktop Publishing 6.3 Internet 6.4 E-Learning 6.5 Virtual Learning 6.6 Web-based Learning 6.7 Tele-Conferencing 6.8 Audio Conferencing 6.9 Video Conferencing UNIT VII: Evaluation In Computer Science 7.1 Introduction 7.2 Purposes of Evaluation 7.3 Types of Evaluation 7.4 New Scheme of Evaluation 7.5 Techniques and Tools of Evaluation 7.6 Achievement Test 7.7 Online Examination 1. Fundamentals of Computer: Overview of the Computer System including input-Output devices, pointing devices and scanner, Representation of Data (Digital versus Analog, Number System- Decimal, Binary & Hexadecimal), Introduction to Data Processing, Concepts of files and its types. 2. Data Processing: Word Processing (MS-Word), Spread Sheet Software (MS Excel), Presentation Software (MS Power Point), DBMS software (MS Access). 3. Programming Fundamentals: Introduction to C, C++, Java, .NET, Artificial Intelligence (AI), Machine learning, Python and Block Chain, Principles and Programming Techniques, Introduction of Object Oriented Programming (OOPs) concepts, Introduction to "Integrated Development Environment" and its advantages. 4. Data structures and Algorithms: Algorithms for Problem Solving, Abstract data types, Arrays as data structures, linked list v/s array for storage, stack and stack operations, queues, binary tress, binary search trees, graphs and their representations sorting and searching, symbol table. Data Structure using c & C++. 5. Computer Organization and Operation System: Basic Structure of Computers, Computer Arithmetic Operations, Central Processing Unit and Instructions, Memory Organization, I/O organization, Operating Systems Overview, Process Management, Finding and processing files. 6. Communication and Network Concepts: Introduction to Computer Networks, Introduction: Networks layers/ Models, Networking Devices, Fundamentals of Mobile Communication. 7. Network Security: Protecting Computer Systems from viruses & malicious attacks, Introduction to Firewalls and its utility, Backup & Restoring data, Networking (LAN & WAN), Security, Ethical Hacking. 8. Database Management System: An Overview of the Database Management, Architecture of Database System, Relational Database Management System (RDBMS), Database Design, Manipulating Data, NoSQL Database Technologies, Selecting Right Database. 9. System Analysis and Design: Introduction, Requirement, Gathering and Feasibility Analysis, Structured Analysis, Structured Design, Object-Oriented Modeling Using UML, Testing, System Implementation and Maintenance, Other Software Development Approaches. 10. Internet of things and its application: Introduction of Internet Technology and Protocol, LAN, MAN, WAN, Search Services/Engines, Introduction to online & offline messaging, World Wide View Browsers, Web Publishing, Basic knowledge HTML, XML and Scripts Creation Y maintenance of Websites, HTML interactivity Tools, Multimedia and Graphics, Voice Mail and Video Conferencing, Introduction to e-Commerce. 11. Major developments in the field of Information Technology. 3 01. FUNDAMENTALS OF COMPUTER 2. Input Unit– Input is a unit with the help of which data or instructions are entered into the computer. It is a link between the computer and the user. 3. Output Unit– An output unit is a device through which type processor or CPU displays the result of a written task in the form of output. These output can be in the form of softcopy or hardcopy. Introduction of Computer The word computer is derived from the Latin Word 'Compute' which means 'to calculate'. Therefore, the literal meaning of computer is calculator. A computer is an electronic device that receives data control through input and displays it as an output by working on it according to the instructions given. 1.1 Structure of Computer– All types of computers follow the same basic logical structure. Computers are made of three basic units. 1. CPU (Central Processing Unit) 2. Input Unit 3. Output Unit Types of Computer (i) Analog Computer– Analog computers are computers that measure physical units (pressure, temperature etc.) and convert them into numbers. These computers measures any quantity on the basis of comparison. For example- Thermometer, Voltmeter. Data is used continuously in analog computers. (ii) Digital Computer– In this category come those computer, which calculate the marks. Most of the computers fall under the category of digital computers. Digital computers convert data and programs into binary (0's and 1's) and carry them in electronic form. (iii) Hybrid Computer– Hybrid computers are made up of a mixture of analog and digital computers, hybrid computers are capable of performing the functions of both computers. Computer Hardware and Devices 1. CPU (Central Processing Unit)– Processes the data or instructions entered by the input unit acts according to the user assigns the result to the output unit or stores the given data or instruction in memory. CPU also known as Microprocessor. CPU has three main parts. (a) ALU (Arithmetic Logic Unit) (b) Control Unit (c) Memory Unit (a) ALU (Arithmetic Logic Unit)– The execution of the command given to the computer mathematical and logical operations are done by this unit. Mathematical operations means addition, subtraction, multiplication, division and comparing selecting, matching data etc. (b) Control Unit– The control unit is called the nervous system of the computer. The control unit controls the operation of all the parts of the computer. It is responsible for controlling and managing all the units of the computer and controlling the transfer of data or instructions between the ALU and the memory. (c) Memory Unit– Memory unit is a component of the computer system. It is used to store data, instructions and information. It is actually a work area of computer where the CPU stores data and instructions. This is known as main internal memory. Fundamental of Computer Components that can be physically seen or touched are called Hardware. Personal Computer– Personal computer is a multipurpose computer. It is a type of microcomputer. In 1981 the IBM processor International Business Machines launched its first personal computer under the name of IBM PC. Which was the most popular PC at that time. Components of personal Computers • System Unit • Input Device • Output Device • Memory/Storage Device System Unit– The system unit also known as a 'tower’ or a 'chassis'. It consists of the main components or internal components of a desktop or personal computer. It includes the motherboard, processor (CPU), 4 YCT (vi) VGA Port– Video output using the video RAM and other components. A system unit is a set of electronic components of a computer. Inside which there graphics port monitor, projector or TV is used to are many hardware components memory, Hard disk, connect. power supply, motherboard etc. (vii) Expansion Slots– These are additional slots for adding new cards such as video cards, audio card, graphics cards to the motherboard. (viii) Bays– This is a space inside the computer case, where a hard drive, floppy drive or CD-ROM drive is kept. (ix) Parallel Port– Parallel port consists of two rows of 25 pins which are surrounded by metal casing. It (i) Processor– Processor is a hardware component. is also known as printer port. Which is responsible for all the operations performed in (x) Ethernet LAN Port– This is a port through a computer system, most computer users refer to it as the which the computer is connected to the internet/network brain of the computer and it is placed on the motherboard by cable. by slots. Its two main components– Input Device 1. Control Unit The devices through which data in inputted, that is 2. Arithmetic Logic Unit the devices from which words, data or instructions are Process speed is measured in MHz or Gigahertz. put in memory, are called input devices. (ii) Motherboard– Motherboard is the main circuit Following are some of the major input devices. board that connects all the hardware components of the Mouse– It is an input device, it is used in the computer. It is the main circuit board of the computer to give instructions to the computer with the microcomputer. Motherboard consists of special chips help of graphics. It was invented by Douglas Engelbart. and integrated circuit (IC) processor, RAM etc. It usually has two or three buttons. It has left button, right button and scroll wheel in the middle. Keyboard– Keyboard is the most important device of any computer. You can enter text or numerical data in the computer from the keyboard itself. In a keyboard, all the letters are arranged in the same order as in a typewriter but it has more buttons than a typewriter. Trackball– A trackball is a pointing device similar to a mouse, but if consists of a ball that is controlled by (iii) Power Supply (SMPS)– SMPS means rotating the fingers to control the movement of the Switched Mode Power Supply. It is the power supply of pointer. It neither needs a flat surface nor does it need to the computer, which gives electricity to the electronics be moved around like a mouse. Scanner– The scanner is used to convert the image components of the computer according to them. written or printed on the paper into digital form and store it in the memory/disc of the computer and for editing. There are three types of scanners available : 1. Flat Bed Scanner 2. Hand Held Scanner 3. Drum Scanner Joystick– Joystick is an input device. It is a pointing 1. SMPS converts a higher AC power into a lower device. It moves in all directions. It is used in flight voltage DC power. simulators, computer gaming systems. It consists of a 2. Different electronic components present inside the computer require different amount of electric power. stick, which rotates on a base and reports its angle and SMPS provides electricity to each part according to direction to the CPU. Light Pen– Light pen is an electro-optical pointing its requirement. input device. Uses a photosensitive detector to select (iv) Power Connector– Connects the power cable objects on the display screen. to the computer. Web Camera– This is a digital camera, which is (v) USB Port– It allows to connect pen drive, mouse connected with the computer. Web camera are used for or keyboard or other external hardware device to the online videos conferencing and chatting. computer. Fundamental of Computer 5 YCT Digitizer– Digitizer is an input device that converts analog information into digital form. Digitizer is also known as graphics tablet. It is specially used for designing images, animations and graphics. It consists of a pen and a pad. Microphone– It is an input device that inputs sound, which is then stored in digital form. Magnetic Ink Character Recognition (MICR)– Examines MICR information in the form of a matrix. It is used in banks to identify the code number and the check number printed on the check with a magnetic ink. Bar Code Reader (BCR)– A bar code reader is an input device used to read bar codes (data in the form of light and drak lines) printed on a paper product. Optical Character Reader (OCR)– OCR is an input device. Its use converts the image of hand written and typed or printed text into digital form. Optical Mark Reader (OMR)– OMR is an input device which is used for recognize (select one among some options) symbols made by pen or pencil. Memory/Storage Device The function of computer memory/storage device is to store any instruction, information or result. Computer memory are two types. 1. Primary or Main Memory 2. Secondary Memory 1. Primary or Main Memory– Primary memory is the memory that is directly accessed by the CPU. In this the data can't be stored for a long time as desired by the user, it is also known as internal memory. It contains the currently running data or instructions. There are two types of primary memory. 1. RAM (Random Access Memory) 2. ROM (Read Only Memory) 1. RAM (Random Access Memory)– RAM is a temporary memory, which means the memory that holds only those data or instructions for some time on which the computer is currently working. Types of RAM Memory (a) SRAM (Static RAM) (b) DRAM (Dynamic RAM) 2. ROM (Read Only Memory)– The full name of ROM is Read Only Memory. Which means that memory can only be read but no data store. Data in this memory is only a single store. Again it can not delete or store it. Types of ROM Memory : (a) PROM (Programmable Read Only Memory) (c) EPROM (Erasable Programmable Read Only Memory) (a) EEPROM (Electrically Erasable Programmable Read Only Memory) 2. Secondary Memory– The secondary memory is also known as external memory or Auxiliary storage. We can keep the data from the secondary memory to keep it for a long time. Before closing the computer the data can be placed permanently in secondary memory. Magnetic Tape– Magnetic tape is made up of a thin and long plastic strip. The magnetic layer which is climbed and the data is saved on that layer. This is a gradual access memory. Whose data can be read only by order. In this the data can be stored more than once upon the data store the old data ends itself. Magnetic Disk– Magnetic Disk is a secondary storage device, which is used to store data, Access data. This is a permanent (non-volatile) and assistant. Secondary storage device, which stores data and program longer. Hard Disk Drive (HDD)– Hard disk this magnetic disk is a main component of the personal computer. It is known as hand drive or hand disk drive. It is a permanent (non-volatile) and auxiliary, secondary storage device, which store data and programs for a long time. Floppy Disk– Floppy disk is a magnetic storage used to read and write data in Floppy disk. Earlier it was used to store the operating system. Output Device An output device is a device through which the result of the work done by the CPU (processor) is obtained in the form of output such as monitor, printer etc. Monitor– Monitor is an output device which displays the result of the input as output on the screen. (i) CRT Monitor (Cathode Ray Tube) (ii) Flat Panel Screen Monitor LCD (Liquid Crystal Display), LED (Light Emitting Diode) & TFT (Thin Film Transistor) Printer– Printer is an output device, it uses the results received from the computer as a output by printing on a paper. (i) Impact Printer– This printer paper, ribbon and character prints data together on all three. (ii) Non-Impact Printer– This printer is a noise free printer, it does not hit paper, but leaves the splash of the ink on paper. They use electrostatic chemicals. Plotter– This is an output device, which is used in large drawing or pictures such as construction plant Auto CAD. To make drawing, the pen, pencil, marker etc. Is the use of writing tool. It provides output such as graphs and sketches. Speakers– This is an output device that is connected to the computer and tells the sound as the output through the speaker. Projector– A projector is an output device that enables the user to project output into a large surface such as a large screen or a wall. It is connected to the computer and uses light and lens to show text, pictures, videos. It is used for presentation. Speech Synthesizer– Speech Synthesizer is a output device, by which text message is converted into voice massage and received as output. Fundamental of Computer 6 YCT Optical Disc– Optical disc is a type of direct access secondary memory. Optical disc are made of polycarbonate plastic and they used laser beams to store or read data. It is usually flat and rounded. Some example in below. (i) CD (Compact Disc) (ii) DVD (Digital Versatile Disc) (iii) Blue-Ray Disc Pen Drive– Pen drive is also called thumb drive, flash drive or USB drive. Pen drive is an example of EEPROM (Electrically Erasable Programmable Read Only Memory) Memory Card– Memory card is a device that provides a fast and easy way to store and transfer digital files. It is small card like- electronic memory device of a thin size, which is used to another modern devices such as mobile phones digital cameras, PDA, Palmtops, Smartphone's etc. It is also called multimedia card. Its use is becoming popular as Removable Storage Device. Solid State Drive (SSD)– SSD is a type of secondary storage. It is faster and more expensive than HDD. Flash Memory has been used in this. With its use, the speed of the computer increases slightly. Like HDD, you can also store data in if for a long time as desired. Memory Units or Measure– 1 Byte = 8 bit = 2 Nibble 1 KB = 1024 Byte = 8192 Bits 1 MB = 1024 KB 1 GB = 1024 MB 1 TB = 1024 GB 1 PB = 1024 TB 1 EB = 1024 PB 1 ZB = 1024 EB 1 YB = 1024 ZB (TB = Terrabyte, PB = Petabyte, EB = Exabyte, ZB = Zettabyte, YB = Yottabyte) Different between Analog and Digital Signal– Analog Signal Digital Signal 1. Analog signals are Digital signals are not continuous they are continuous signals. discrete signals. 2. We can represent We can represent analog signals in the digital signals in the form of sign waves. form of waves. 3. The values of voltage The values of voltage will be in a continuous will be discontinuous. range. 4. These signals are used Digital electronic devices like computers, in analog devices. Smartphone, smart watches etc. use these signals. 5. Any natural sound, Electronic signals, human voice, data read computer signals, data by analog devices. read by digital devices. Number system Introduction- Every number system has a set of unique characters or literals. The count of these literals is called the radix or base of the number system. Number systems are also called positional number system because the value of each symbol (digit and alphabet) in a number depends upon its position within the number. Number may also have a fractional part similar to decimal numbers used by us. A computer is a digital system that stores and processes different types of data in the form of 0s and 1s. The different types of data handled by a computer system include numbers, alphabets and some special characters. Therefore, there is a need to change the data entered by the users into a form that the computer system can understand and process. different types of codes have been developed and used to represent the data entered by the users in the binary format. The binary system represents each type of data in terms of binary digits, 0s and 1s. Since these code convert the data into the binary form, the computer codes are also referred as binary codes. The different number systems, which come under. The category of positional number system are as follows. 1. Decimal system 2. Binary system 3. Octal system 4. Hexadecimal system. 1. Decimal System– The decimal system is the most common number system used by human beings. It is a positional number system that uses 10 as a base to represent different values. Therefore, this number system is also known as base 10 number system. In this system, 10 symbols are available for representing the value. These symbols include the digits from 0 to 9. The common operations performed in the decimal system are addition (+), subtraction (-), multiplication (x), and division (/) Representation of Data Data representation refers to the form in which data is stored, processed and transmitted. Information, such as text, numbers, photo or music into digital data that can be manipulated by electronic devices. Digital Signal– A digital signal represents the original time varying quantity as a sampled sequence of quantized values. This imposes some bandwidth and dynamic range constraints on the representation but, unlike the analog signal, can avoid further electronic noise and distortion. Analog Signal– An analog signal is any continuous signal for which the time varying feature of the signal represents some other time varying quantity i.e. analogous to another time varying signal. For examplein an analog audio signal the instantaneous voltage of the signal varies continuously with the pressure of the sound waves. Fundamental of Computer 7 YCT The decimal system can be used to represent both the integer as well as floating point values. The floating point values are generally represented in this system by using a period called decimal point. The decimal point is used to separate the integer part and the fraction part of the given floating point number. In the following example, the value 237 which comes before the decimal point, is called integer value and the value 25, which comes after the decimal point, is called fraction value. Terrabyte 1024 GB (TB) Petabyte (PB) 1024 TB Exabyte (EB) 1024 PB Zettabyte (ZB) 1024 EB Yottabyte 1024 ZB (YB) 3. Octal system– The octal system is the positional number system that used base-8 to represent different values. Therefore, this number system is also known as base-8 system. As this system uses base-8, eight symbols are a available for representing the value in this system. These symbols are the digits 0 to 7. In octal system, the point used to separate the integer and the fraction part of 2. Binary System– Among all the positional number a number is known as octal point. In the following system, the binary system is the most dominant number example, The octal number 215.43 represents the system that is employed by almost all the modern digital decimal value 141.5469. computer system. The binary system uses base-2 to represent different value. Therefore, the binary system is also known as base-2 system. As this system used base2, only two symbols are available for representing the different values in this system. These symbols are 0 and The following lists the octal representation of decimal 1, which are also known as bits in computer terminology. numbers 0 through 15. Using binary system, the computer systems can store and Decimal number Octal representation process each type of data in terms of 0s and 1s only. 0 0 In binary system, the point use to separate the 1 1 integer and the fraction part of a number is known as 2 2 binary point. In the following example, the binary 3 3 number 11001.101 represents the decimal value 25. 625. 4 4 5 5 6 6 7 7 ⇒ The following are some of the technical terms used in 8 10 binary system. 9 11 Technical Used in Binary System. 10 12 terms 11 13 It is the smallest unit of information Bit 12 14 used in a computer system. 13 15 It can either have the value 0 or 1. 14 16 Derived from the words 'Binary 15 17 digit'. 4. Hexadecimal system– The hexadecimal system is a Nibble It is a combination of 4 bits. positional number system that uses base-16 to represent Byte It is combination of 8 bits. different values. Therefore, this number system is known Derived from words 'by eight'. as base-16 system. As this system uses base-16, 16 Word It is a combination of 16 bits. symbols are available for representing the value in this system. These symbols are the digits 0-9 and the letters Double word. It is a combination of 32 bits. Kilobyte (KB) It is used to represent the 1024 bytes A, B, C, D, E and F. The digits 0-9 are used to represent the decimal value 0 through 9 and The letters A, B, C, D, of information. E and F are used to represent the decimal value 10 Megabyte 1024 KB through 15. In hexadecimal system, the point used to (MB) separate the integer and the fraction part of a number is Gigabyte (GB) 1024 MB known as hexadecimal point. In the following example, Fundamental of Computer 8 YCT the hexadecimal number 4A9.2B represents the decimal the decimal number by 2 till the decimal number becomes zero and then reading the remainders from last value 1193.1679. to first to obtain the binary equivalent of the given decimal number. Let us now convert a decimal value to its binary representation and verify that the binary equivalent of The following Lists shows decimal and binary equivalent (65)10 is (1000001)2. of 16 alphanumeric symbols used in hexadecimal number system. Decimal Hexadecimal 4-bit Binary Number Symbol Number 0 0 0000 1 1 0001 2 2 0010 3 3 0011 4 4 0100 5 5 0101 6 6 0110 7 7 0111 (ii) Decimal to Octal Conversion– The decimal to octal conversion is performed by repeatedly dividing 8 8 1000 the decimal number by 8 till the decimal number 9 9 1001 becomes zero and reading the remainders. from last to 10 A 1010 first to obtain the octal equivalent of the given decimal 11 B 1011 number. The following example illustrate the method of 12 C 1100 converting decimal number 98 into its equivalent octal number. 13 D 1101 14 15 E F 1110 1111 Conversion of Numbers The computer systems accept the data in decimal form, whereas they store and process the data in binary form. Therefore, it becomes necessary to convert the number represented in one system into the numbers represented in another system. The different types of number system conversions can be divided into the following major categories. 1. Decimal to Non-decimal 2. Non-decimal to Decimal 3. Binary to Octal 4. Binary to Hexadecimal 5. Octal to Hexadecimal 1. Decimal to Non-decimal– The decimal to nondecimal (binary, octal or hexadecimal), conversions use the step given below. Step 1: Divide the given number by the base value of the number system in which it is to be converted. Step 2 : Note the remainder. Step 3: Keep on dividing the quotient by the base value and note the remainder till the quotient is Zero. Step 4 : Write the noted remainders in the reverse order (from bottom to top). (i) Decimal to Binary conversion– The decimal to binary conversion is performed by repeatedly dividing Fundamental of Computer (iii) Decimal to Hexadecimal Conversion– The decimal to hexadecimal conversion is performed by repeatedly dividing the decimal number by 16 till the decimal number becomes zero and reading the remainders from last to first to obtain the hexadecimal equivalent of the given decimal number. The following example illustrate the method of converting decimal number to its hexadecimal equivalent. 2. Non-decimal to Decimal– The non-decimal to decimal conversions can be implemented by taking the concept of place values not consideration we can use the following steps to convert the given number with base 9 YCT value to its decimal equivalent, where base value can be 2, 8 and 16 for binary, octal and hexadecimal number system, respectively. Step 1 : Write the position number for each alphanumeric symbol in the given number. Step 2 : Get positional value for each symbol by raising its position number to the base value symbol in the given number. Step 3 : Multiply each digit with the respective positional value to get a decimal value. Step 4 : Add all these decimal values to get the equivalent decimal number. (i) Binary Number to Decimal Number Conversion– A binary number can be converted to equivalent decimal number by calculating the sum of the products of each bit multiplied by its corresponding place value. The following example illustrate the method of converting binary number (1101)2 to decimal number. Digit→ 1 1 0 1 22 21 2º Positional value→ 23 Decimal Number→ 1× 23 + 1×22 + 0×21 + 1× 2º 8 + 4 + 0 + 1 = (13)10 Therefore, (1101)2 = (13)10 (ii) Octal Number to Decimal Number Conversion– An octal number can be converted into its equivalent number in decimal system by calculating the sum of the products of each digit multiplied by its corresponding place value. The following example shows how to compute the decimal equivalent of an octal number (257)8. Digit→ 2 5 7 Positional value→ 82 81 80 Decimal Number→ 2× 82 + 5×81 + 7×80 128 + 40 + 7 = (175)10 Therefore, (257)8 = (175)10 (iii) Hexadecimal Number to Decimal Number Conversion– A hexadecimal number can be converted into its equivalent number in decimal system by calculating the sum of the products of each symbol multiplied by its corresponding place value. The following example shows how to compute the decimal equivalent of an Hexadecimal (3A5)16. Digit→ 3 A 5 Positional value→ 162 161 16º 2 1 +10×16 + 5×160 Decimal Number→ 3× 16 768 + 160 + 5 = (933)10 Therefore, (3A5)16 = (933)10 3. Conversion from Binary Number to Octal Number and Vice-versa– (i) Binary Number to Octal Number- Given a binary number, an equivalent octal number representation by 3 bits is computed by grouping 3 bits from right to left and replacing each 3-bit group by the corresponding octal digit. In case number of bits in a binary number is not multiple of 3, then add required, Fundamental of Computer number of 0s on most significant position of the binary number Example – Convert (10101100)2 to octal number. Make group of 3-bits of the given binary number (Right to Left) 010 101 100 Write octal number for each 3- bit group. 2 5 4 Therefore, (10101100)2 = (254)8 (ii) Octal Number to Binary Number– Each octal digit is an encoding for a 3-digit binary number. Octal number is converted to binary by replacing each octal digit by a group of three binary digits. Example– Convert (705)8 to binary number. Octal digit → 7 0 5 Write 3-bits binary value for each digit → 111 000 101 Therefore, (705)8 = (111000101)2 4 Conversion from Binary Number to Hexadecimal Number and Vice-versa– (i) Binary Number to Hexadecimal Number– Given a binary number, its equivalent hexadecimal number is computed by making a group of 4 binary digits from right to left and substituting each 4-bit group by its corresponding computed by making a group of 4 binary digits from right to left and substituting each 4-bit group by its corresponding hexadecimal alphanumeric symbol. If required, add 0 bit on to have number of bit in a binary number as multiple of 4. Example– Convert (0110101100)2 to hexadecimal number. Make group of 4-bits of the given binary number (Right to left) → 0001 1010 1100 Write hexadecimal symbol for each group → 1 A C Therefore, (0110101100)2 = (1AC)16 (ii) Hexadecimal Number to Binary Number– Each hexadecimal symbol is an encoding for a 4-digit binary number. Hence, the binary equivalent of a hexadecimal number is obtained by substituting 4-bit binary equivalent of each hexadecimal digit and combining them together. Example. Convert (23D)16 to binary number. Hexadecimal digits→ 2 3 D Write 4-bit binary for each digit→ 0010 0011 1101 Therefore, (23D)16 = (001000111101)2 5. Conversion from Octal Number to Hexadecimal Number– The given octal number can be converted into its equivalent hexadecimal number in two different steps. Firstly, We need to convert the given octal number into its binary equivalent. After obtaining the binary equivalent, we need to making a group of 4 binary digits from right to left and substituting each 4-bit group by its corresponding hexadecimal alphanumeric 10 YCT symbol. In this type of conversion, we need to represent each digit in the octal number to its equivalent 3-bit binary number. Example– Convert the octal number (365)8 into its hexadecimal number. Octal digits→ 3 6 5 Write 3-bits binary value for each digit→ 011 110 101 Regrouping into 4-bits of the binary number (Right to Left) → 0000 1111 0101 Write hexadecimal symbol for each group→ 0 F 5 Therefore, (365)8 = (F5)16 (ii) Fractional Part of Decimal Number to Octal Number. Since the fractional part is 0, the multiplication is stopped, write the integer part from top to bottom to get octal number for the fractional part . Therefore, (0.625)10 = (0.50)8 (iii) Fractional Part of Decimal Number to Hexadecimal Number. Example– Convert (0.675)10 to hexadecimal form. Conversion of a Number with Fractional Part. Since the fractional part (.800) is repeating, the multiplication is stopped, Write the integer part from top to bottom to get hexadecimal equivalent for the fractional part. Therefore, (0.675)10 = (0.AC)16 Non-decimal Number with Fractional Part to Decimal Number System– Computer positional value of each digit in the given number using its base value, Add the product for positional value and the digit to get the equivalent decimal number with fractional part. (i) Fractional Part of Binary Number to Decimal Number. Convert (0.111)2 into decimal number. Digit→ 0 1 1 1 –1 Fractional value→ 0 2 2–2 2–3 –1 –2 –3 + 1×2 Decimal value→ 1×2 + 1× 0.25×2 = 0.50 0.5 + 0.25 + 0.125 = 0.875 0.50×2 = 1.00 Therefore, (0.111)2 = (0.875)10 Since the fractional part is 0, the multiplication is (ii) Fractional Part of Octal Number to Decimal stopped. Write the integer part from top to bottom to get Number. binary number for the fractional part. Convert (0.12)8 into decimal number. Therefore, (0.25)10 = (0.01)2 Digit→ 0. 1 2 Example– Convert (0.675)10 to binary. Fractional value→ 0. 8–1 8–2 –1 –2 Decimal value→ 1×8 + 2×8 0.125 + 0.03125 = 0.15625 Therefore, (0.12)8 = (0.15625)10 (iii) Fractional Part of Hexadecimal Number to Decimal Number Convert (0.58)16 into decimal number. Digit→ 0. 5 8 Since the fractional part (400) is the repeating value Fractional value→ 16–1 16–2 in the calculation, the multiplication is stepped, write the Decimal value→ 5×16–1 + 8×16–2 integer part from top to bottom to get binary number for 0.3125 + 0.03125 =0.34375 the fractional part. Therefore, (0.58) = (0.34375) 16 10 Therefore, (0.675) = (0.1010110)2 Decimal Number with Fractional Part to Another– Number system– To convert the fractional part of a decimal number to another number system with base value, repeatedly multiply the fractional part by the base value till the fractional part becomes 0. Use integer part from top to bottom to get equivalent number in that number system. The fractional part does not become 0 in successive multiplication, then stop after, 10 multiplications. In some cases, fractional part may start repeating then stop further calculation. (i) Fractional Part of Decimal Number to Binary Number. Example. Convert decimal number (0.25)10 to binary. Fundamental of Computer 11 YCT Fractional Binary Number to Octal or Hexadecimal Number- To convert the fractional binary number into octal or hexadecimal value, substitute groups of 3-bit or 4-bit for integer part by the corresponding digit, similarly, make groups of 3-bit or 4bit for fractional part starting from left to right, and substitute each group by its equivalent digit or symbol in octal or hexadecimal number system, Add 0s at the end of the fractional part to make a perfect group of 3 or 4 bits. Example– Convert (10101100.01011)2 to octal number. Make perfect group of 3-bits→ 010 101 100 . 010 110 Write octal symbol for each group → 2 5 4 . 2 6 Therefore, (10101100.01011)2 = (254.26)8 Note– Make 3-bit groups from right to left for the integer part and left to right for the fractional part. to Example– Convert (10101100.010111)2 hexadecimal number. make perfect group of 4-bits→ 1010 1100 . 0101 1100 Write hexadecimal symbol for each group→ A C. 5 C Therefore, (10101100.010111)2 = (AC.5C)16 Binary Coded Decimal (BCD) Systems– The BCD system is employed by computer systems to encode the decimal number into its equivalent binary number. This is generally accomplished by encoding each digit of the decimal number into its equivalent binary sequence. The 4-bit BCD system is usually employed by the computer systems to represent and process numerical data only. In the 4-bit BCD system each digit of the decimal number is encoded to its corresponding 4-bit binary sequence. The two most popular 4-bit BCD systems are• Weighted 4-bit BCD code • Excess -3 (XS - 3 BCD) code Weighted 4-bit BCD Code– The weighted 4-bit BCD code is more commonly known as 8421 weighted code. It is called weighted code because it encodes the decimal system into binary system by using the concept of positional weighting into consideration. In this code, each decimal digit is encoded into its 4-bit binary number in which the bits from left to right have the weights 8, 4, 2 and 1 respectively. Example– Convert the decimal number (87.34)10 to weighted BCD code. The given decimal number is 87.34 The corresponding 4-bit 8421 BCD representation of decimal digit Fundamental of Computer Therefore, The 8421 BCD representation of decimal number (87.34)10 is (1000 0111.0011 0100)2. Excess-3 BCD Code– The Excess-3 (XS-3) BCD code does not use the principle of positional weights into consideration while converting the decimal numbers to 4-bit BCD system. Therefore, we can say that this code is a non-weighted BCD code. The function of XS-3 code is to transform the decimal numbers into their corresponding 4-bit BCD code, In this code, the decimal number is transformed to the 4-bit BCD code by first adding 3 to all the digits of the number and then converting the excess digits, so obtained, into their corresponding 8421 BCD code. Therefore, we can say that the XS-3 code is strongly related with 8421 BCD code in its functioning. Example– Convert the decimal number 85 to XS-3 BCD code. ⇒ The given decimal number is 85. Now, add 3 to each digit of the given decimal number as– 8 + 3 = 11 5+3=8 The corresponding 4-bit 8421 BCD representation of the decimal digit– Therefore, the XS-3 BCD representation of the decimal number 85 is 1011 1000. ASCII Code– ASCII, abbreviated form American Standard Code for Information Interchange, is a character encoding standard for electronic communication. The ASCII codes represent text in computers, telecommunications equipment, and other devices. The ASCII code is pronounced as ASKEE and is used for the same purpose for which the EBCDIC code is used. Initially, this code was declared as a 7-bit BCD code to handle 128 characters but later it was modified to an 8-bit code we can check the value of any ASCII code by just holding down the Alt key and Typing the ASCII code. For example, when we hold down the alt key and type 66 form the keyboard, then the character B appears on the screen. This shows that the ASCII decimal code 66 represents the character B. Characters Decimal Hexadecimal representation representation NUL 0 0 SOH 1 1 STX 2 2 ETX 3 3 EOT 4 4 ENQ 5 5 ACK 6 6 BEL 7 7 BS 8 8 12 YCT HT CAN SUB ESC RS US ! # $ % & * + / 0-9 < = > ? A-I J-O P-Z a-i j-o p-z 9 24 26 27 30 31 33 35 36 37 38 42 43 47 48 - 57 60 61 62 63 65 - 73 74 - 79 80 - 90 97 - 105 106 -111 112 - 122 2. Scientific Data Processing– Data processing in scientific and engineering problems is termed as scientific data processing. Basically, it is the application of computer simulation and other forms of computation to problems in various scientific disciplines. It is characterized by relatively little input and output but extensive internal computation. It emphasize on high speed internal processing but may have limited input and output capabilities. Real Time Data Processing– There are many types of large applications that may require the real time data processing. In this the result is presented at the same time when the data enter. We can easily analyze this type of data processing in the stock market and currency trends. The technology which mostly used in real time data processing is stream processing. Advantages of Data Processing– • Highly efficient • Time saving • High speed • Reduces errors Disadvantages of Data Processing– • Large Power Consumption • Occupies Large Memory • The Cost of Installations is High • Wastage of Memory 9 18 1A 1B 1E 1F 21 23 24 25 26 2A 2B 2F 30 - 39 3C 3D 3E 3F 41 - 49 4A - 4F 50 - 5A 61 - 69 6A - 6F 70 - 7A Data Processing Files and Types Introduction to Data Processing Data processing means to process the data i.e. to convert its format. As we all know data is the very useful and when it is well presented and it becomes informative useful. Data processing system is also referred as information system. It is also right to say that data processing becomes the process of converting information into data and also vice-versa. Data → Process → Information In simple words, data processing can be expressed as. • Process of conversion of data in the computer understandable format. • The sorting or processing of data by a computer. Types of Data Processing– Data processing is broadly divides into two categories, Business, Scientific and Real time data processing. These are explained as following below. 1. Business Data Processing– The process of data in the accounting or business management referred as business or administrative data processing. In this type of data processing, data is usually in the numeric form. It refers to the all the computing functions that occur in an enterprise. The computer that is oriented towards business data processing will demand for high speed input and output so that conversion of stored data into report format can occur easily. Fundamental of Computer A data file is a computer file which stores data to be used by a computer application or system, including input and output data. A data file usually does not contain instructions or code to be executed (that is, a computer program) There are numerous types of files used for storing data needed for processing reference or back up. The main common types of processing files include. 1. Master Files 2. Transaction File 3. Reference 4. Back-up 5. Report 6. Sort File 1. Master Files– A master file is the main that contains relatively permanent record about particular items or entries. For example a customer file will contain details of a customer such as customer id, name and contact address. 2. Transaction Files– A transaction file is used to hold data during transaction processing the file is later used to update the master file and audit daily, weekly or monthly transactions. For example in a busy supermarket, daily sales are recorded on a transaction file and later used to update the stock file. 13 YCT 3. Reference File– A reference file is mainly use for reference or look-up purposes. Look-up information is the information that is stored in a separate file but is required during processing. For example in a point of sale terminal, the item code entered either manually or using a barcode reader looks up the item description and price from a reference file stored on a storage device. 4. Backup Files– A backup files is used to hold copies of data or information from the computers fixed storage (Hard disk).Since a file held on the Hard disk may be corrupted lost or changed accidentally, it is necessary to keep copies of the recently updated files. In case of the Hard disk failure, a backup file can be used to reconstruct the original file. 5. Report Files– Used to store relatively permanent records extracted from the master file or generated after processing. For example you may obtain a stock levels report generated from an inventory system while a copy of the report will be stored in the report file. 6. Sort File– It stores data which is arranged in a particular order, used mainly where data is to be processed sequentially. In sequential processing data or records are first sorted and held on a magnetic tape before updating the master file. Important Facts • • • • • • • • • • • • • • • • The first computer installed in India is, Indian Statistical Institute Kolkata. The first Mini Computer was PDP-8. Cache memory has the shortest access time. Technology used to provide internet by transmitting data over wires of telephone network is digital subscriber line. Scanner convert a physical image into digital image. ASCII is a sort form of American Standard Code for Information Interchange. Characteristic of the modern digital computer is High speed, Large storage capacity, Greater accuracy. Sequential access storage device is magnetic tape. Computer understandable language is Binary (0 & 1). Computer language written in binary code machine language. The speech signal is obtained after analog/digital converter. Telegram signal is digital signal. DTFT is the representation of Aperiodic Discrete Time Signals. Characteristic of the power signal is infinite energy. Computer speed is measured in Gigahertz (GHz). The ALU of a computer responds to the commands coming from control section. Fundamental of Computer • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • 14 To produce high quality graphics in color you would use plotter. A dumb terminal has a keyboard and screen. The output quality of a printer is measured by dot per inch. Bit manipulation is changing of single bits or small groups of his within word. Tracks and sectors organized by Floppy disk. Secondary storage media, input media, output media is serve as magnetic tape. Name of pointing device are Mouse, Touchpad, Trackball, Pointing sticks, Light pen, Graphics Tablet and Joystick. The first super computer is Param 8000 in India. ROM is permanent memory in computer. Characteristic of RAM is Faster, Expensive, High Power Consumption. Part of the CPU is ALU, CU and Memory Unit. The console monitors computer processing. ALU is responsible for performing mathematical operations in CPU. Joy stick primarily used for computer gaming. BCD is sort form of Binary Coded Decimal. Name of the father of computer Mouse is Douglas Engelbart. CPU and memory located in Motherboard. Megabyte is approximately a million bytes. A normal CD-ROM usually can store up to 680 MB data. The common name for the crime stealing password is spoofing. Hardware is the part of a computer that one can touch and feel. Executing is the process of carrying out commands. Mini computers are also called midrange computer. Analog computer works on the supply of continuous electrical pulses. Minicomputer was first released in 1960. Light pen is containing sensors send signals to computer whenever light changes are detected. 35300 is the 8th complement of an octal number 42500. The first electronic digital computer was built in university of Pennsylvania USA. The ASCII code for CR (Carriage Return) in octal is 15. With respect to the first digital electronic computer full form of ABC is Atanasoff-Berry computer. The ASCII code for the LF (Line Feed) in hexadecimal is 0A. YCT Important Questions Asked in Previous Years Examinations 1. The main parts of computer are (a) 6 (b) 7 (c) 8 (d) 9 (UPSSSC JE-2016) 2. The main purpose of software is to convert data into (a) Website (b) Information (c) Program (d) Object UPSSSC JE-2015 3. Which of the following control memory, input and output devices? (a) C.P.U. (b) A.L.U. (c) C.U. (d) Memory (UPSSSC JE-2016) 4. High power micro processors are (a) Pantium, Pantium pro (b) Pantium II and III (c) Pantium II (d) all of these (UPSSSC JE-2016) 5. Where was the first computer in India installed? (a) Tata Institute of Fundamental Research, Mumbai (b) Indian Statistical Institute, Kolkata (c) Compunational Research Laboratory (CRL), Pune (d) Indian Railway, New Delhi (UPSSSC Sugarcane Sup.-2016) 6. First mini computer was (a) PDP-8 (b) ENIAC (c) UNISAC (d) EDVAC (UPSSSC JE-2016) 7. What name has been given to the first super computer made in India? (a) Akash (b) Param (c) Arjun (d) Siddharh UPSSSC JE-2015 8. Name of super computer is (a) CRAY-2 (b) CRAY XMP-24 (c) Tianhe-2 (d) All of above (UPSSSC JE-2016) 9. Example of input devices is (a) Mouse (b) Joystick (c) Trackball (d) all of these (UPSSSC JE-2016) 10. Type of keyboard is (a) Serial keyboard (b) Parallel keyboard (c) Both (a) and (b) (d) None of these (UPSSSC JE-2016) 11. How many keys are there on keyboard for alphabet? (a) 24 (b) 25 (d) 27 (c) 26 UPSSSC JE-2015 12. Computer Mouse is this kind of Device? (a) Input (b) Output (c) Software (d) Storage (UPSSSC JE 2015) Fundamental of Computer 13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 15 Which of the following devices is used to recognize a pre-specified type of mark by pencil or pen? (a) Bar-Code Reader (b) OCR (c) Scanner (d) OMR (UPSSSC JE-2016) Screen or Monitor Devices is (a) Hard copy (b) Soft copy (c) Input devices (d) Display devices (UPSSSC JE-2016) Permanent Memory of a computer is known as(a) RAM (b) CD-ROM (c) ROM (d) CPU (UPSSSC VDO-2016) Full name of EPROM is (a) Erasable Programmable Read Only Memory (b) Electronic Programmable Read Only Memory (c) Both (a) and (b) (d) All of these (UPSSSC JE-2016) Which of the following memories has the shortest access time? (a) Cache Memory (b) Magnetic Bubble Memory (c) Magnetic Core Memory (d) Random Access Memory UPSSSC JE-2015 Technology used to provide internet by transmitting data over wires of telephone network is? (a) Transmitter (b) Diodes (c) Uniform Resource Locator (d) Digital Subscriber Line (UPSSSC Revenue Ins. 2016) ISDN is a telecommunication technology where (a) Voice, video and data all are transmitted simultaneously (b) Only sound is transmitted (c) Only video is transmitted (d) Only data is transmitted (UPSSSC Sugarcane Sup.-2016) The device that converts a physical image into a digital one is called: (a) Scanner (b) Image Converter (c) Printer (d) Recorder UPPCL Stenographer Exam-18.02.2018 Which of the following is an input device? (a) Mouse (b) Keyboard (c) Scanner (d) All of these UPPCL TG-2 26.06.2016 Which among the following input devices consists of a stick which pivots on a base and reports its angle or direction of the CPU? (a) Microphone (b) Light pen (c) Keyboard (d) Joystick UPPCL JE 2019 (Batch-02) YCT 23. 24. 25. 26. 27. 28. 29. 30. 31. 32. Touchpad is a good alternative to the mouse, it is an example of ______ (a) Software device (b) Printing device (c) Pointing device (d) Temporary device UPPCL TG2 11-11-2016 The technology of scanning that recognized handwritten text and printed text is. (a) MICR (b) OMR (c) OCR (d) BCR UPPCL-JE 31-01-2019 (Batch -01) The technology of scanning that reads the check boxes contained inside a predefined space is (a) BCR (b) OCR (c) OMR (d) MICR UPPCL JE 2019 (Batch-02) Which of the following input devices utilizes a light sensitive detector to select an object on a display screen? (a) OMR (b) Light pen (c) Scanner (d) Printer UPPCL JE 2019 (Batch-01) Which input device converts analog information into digital form and can be used for doing fine works of drawing and image manipulation? (a) Microphone (b) Bar Code Reader (c) Digitizer (d) Graphic Plotter UPPCL JE 2019 (Batch-02) Full form of ASCII is (a) American Scientific code for Interchange of Information (b) American Scientific code for Information Interchange (c) American Standard code for Information Interchange (d) Altruistic Scientific Code For information Interchange UPPCL Accountant 10-02-2018 Which among the following describes ROM? (a) Read Only Memory (b) Read Once Memory (c) Read On Memory (d) Read Other Memory UPPCL ARO-18.02.2018 Which of the following is a volatile memory? (a) RAM (b) CD-ROM (c) ROM (d) EPROM UPPCL APS 27-09-2018 (Evening) Which of the following is NOT a characteristic of RAM? (a) Faster (b) Expensive (c) High power consumption (d) Smaller UPPCL ARO-18.02.2018 Which of the following is a characteristic of the modern digital computer? (a) High speed (b) Large storage capacity (c) Greater accuracy (d) All of the above Fundamental of Computer 33. 34. 35. 36. 37. 38. 39. 40. 41. 42. 43. 44. 45. 16 Which of the following was the first pure electronic programmable computer developed in the year 1944/1945? (a) MARK1 (b) ENIAC (c) Colossus (d) EDVAC Which of the following unit is a part of the CPU? (a) ALU (b) CU (c) Memory Unit (d) All of the above What is the full form of RAM? (a) Dynamic Remote Access Memory (b) Random Access Memory (c) Remote Access Memory (d) Remote Access Memory Which of the following is not considered hardware? (a) Operating system (b) CPU (c) Keyboard (d) Hard disk Which of the following is exclusively a sequential access storage device? (a) Hard disk (b) Floppy disk (c) Magnetic tape (d) DVD What is the full form of SRAM? (a) Static Random Access Memory (b) Static Remote Access Memory (c) Setup Random Access Memory (d) Setup Remote Access Memory Which of the following is not a form data storage media? (a) A database (b) Magnetic tape (c) Magnetic disk (d) Optical disc Which of the following language does the computer understand? (a) Computer understands only C language (b) Computer understands only Assembly language (c) Computer understands only Binary language (d) Computer understands only BASIC Which of the following computer language is written in binary codes only? (a) Pascal (b) Machine language (c) C (d) C# Which of the following unit is responsible for converting the data received from the user into a computer understandable format? (a) Output Unit (b) Input Unit (c) Memory Unit (d) Arithmetic & Logic Unit Convert 89 into binary notation. (a) 1100110 (b) 101110 (c) 1011011 (d) 1011001 Addition of binary number 10011 and 11101 are. (a) 11000 (b) 10000 (c) 10001 (d) 110000 The binary representation of 99.25 is. (a) (1100011.10)2 (b) (1100011.01)2 (c) (1101011.10)2 (d) (1000011.11)2 YCT 46. 47. 48. 49. 50. 51. 52. 53. 54. 55. 56. 57. 58. 59. Convert 101110 into decimal notation. (a) 44 (b) 56 (c) 72 (d) 46 The decimal representation of the binary number (101010.011)2 is (a) 42.25 (b) 24.25 (c) 24.375 (d) 42.375 The 2's complement of the binary number (11001001)2 is (a) (000110110)2 (b) (00111111)2 (c) (00110111)2 (d) (10110111)2 Considering 2's complement representation for negative numbers –128 will be stored into an 8bit memory space as: (a) 11111111 (b) 10000000 (c) 11111110 (d) 10000001 In octal number system the different symbol are used is. (a) 8 (b) 2 (c) 16 (d) 4 The octal representation of 195.25 is (a) (303.20)8 (b) (303.02)8 (c) (313.120)8 (d) (323.20)8 The 15's complement of the hexadecimal number (B0210)16 is. (a) (4FDEF)16 (b) (4FDF0)16 (c) (50EF0)16 (d) (40DE0)16 How many Gigabyte is equal to 1 Petabyte. (a) 256 (b) 512 (c) 1024 (d) 1024×1024 The interface between an analog signal and a digital processor is. (a) D/A converter (b) A/D converter (c) Modulator (d) Remodulator The speech signal is obtained after. (a) Analog to digital conversion (b) Digital to analog conversion (c) Modulation (d) Quantization Telegraph signals are example of (a) Digital signals (b) Analog signals (c) Impulse signals (d) Pulse train As compared to the analog systems, the digital processing of signals allow. 1. Programmable operations 2. Flexibility in the system design 3. Cheaper systems 4. More reliability (a) 1, 2 and 3 are correct (b) 1 and 2 are correct (c) 1, 2 and 4 are correct (d) All the four are correct DTFT is the representation of. (a) Periodic Discrete Time Signals (b) Aperiodic Discrete Time Signals (c) Aperiodic Continuous Signals (d) Periodic Continuous Signals Which of the following is the characteristic of the power signal? (a) Power signal is infinite (b) Power signals are time-limited Fundamental of Computer 60. 61. 62. 63. 64. 65. 66. 67. 68. 69. 70. 71. 72. 17 (c) Aperiodic signals are power signals (d) None of the above The hardware unit which is used to monitor computer processing is? (a) ROM (b) Mouse (c) Dot Matrix printer (d) Console Which of the following data is put into a formula to produce commonly accepted results? (a) Raw (b) Processed (c) Synchronized (d) All of the mentioned Which of the following is equal to a gigabyte? (a) 1024 bytes (b) 512 GB (c) 1024 megabytes (d) 1024 bits Which type of program acts as an intermediary between a user of a computer and the computer hardware? (a) Operating system (b) User thread (c) Super user thread (d) Application program Which of the following values is the correct value of the binary code 1011 and 1111? (a) 11 and 14 (b) 12 and 15 (c) 11 and 15 (d) 12 and 14 Which of the following is not one of the internal components of a CPU? (a) Control sequencer (b) M-D-R (c) M-A-R (d) Floppy disk What is the speed of computer measured in? (a) Nanoseconds (b) Kilo-seconds (c) Gigahertz (d) Megabytes Pentium is related with which part of the computer. (a) DVD (b) Hard disk (c) Microprocessor (d) Mouse What difference does the 5th generation computer have from other generation computer? (a) Technological Advancement (b) Object oriented programming (c) Scientific Code (d) All of the above When a key is pressed an keyboard, which standard is used for converting the keystroke into the corresponding bits. (a) ANSI (b) ASCII (c) EBCDIC (d) ISO Which device used as the standard pointing device in a graphical user environment? (a) keyboard (b) mouse (c) joystick (d) trackball The section of the CPU that is responsible for performing mathematical operations. (a) Memory (b) Register Unit (c) Control Unit (d) ALU A half byte is called a (a) Byte (b) Nibble (c) Bit (d) Word size YCT 73. 74. 75. 76. 77. 78. 79. 80. 81. 82. 83. 84. 85. Analytical engine the first fully automatic calculating machine was developed by (a) Charles Babbage (b) Blaise Pascal (c) Leibniz (d) John ron Neuman Analytical engine invented during the first generation of computer used which memory unit. (a) RAM (b) Counter wheels (c) Floppies (d) Cards Storage capacity of magnetic disk depends on (a) Tracks per inch of surface (b) Bit per inch of tracks (c) Disc pack in disc surface (d) All of above A storage area used to store data to a compensate for the difference in speed at which the different units can handle data is. (a) Memory (b) Buffer (c) Accumulater (d) Address CD-ROM is a (a) Semiconductor memory (b) Memory register (c) Magnetic memory (d) None of the above The ALU of a computer responds to the commands coming from. (a) Primary memory (b) Control section (c) External memory (d) Cache memory To produce high quality graphics (hard copy) in color you would want to use a/n. (a) RGB monitor (b) Plotter (c) Inkjet Printer (d) Laser printer A dumb terminal has (a) an embedded microprocessor (b) extensive memory (c) independent processing capability (d) a keyboard and screen The output quality of a printer is measured by (a) Dot per square inch (b) Dot per inch (c) Dots printed per unit time (d) All of the above Any type of storage that is used for holding information between steps in its processing is (a) CPU (b) Primary storage (c) Intermediate storage (d) None of the above The examination and changing of single bits or small groups of his within a word is called. (a) Bit (b) Bit manipulation (c) Byte (d) Bit Slice Which device of computer operation dispenses with the user of the keyboard? (a) Joystick (b) Light pen (c) None of the above (d) Mouse What is the binary number for decimal number 9? (a) 1100 (b) 0111 (c) 1001 (d) 1011 Fundamental of Computer 86. 87. 88. 89. 90. 91. 92. 93. 94. 95. 96. 97. 98. 18 The binary equivalent of the decimal number 10 is. (a) 0010 (b) 10 (c) 1010 (d) 010 Which of the following is the correct definition of computer? (a) Computer is a machine or device that can be programmed to perform arithmetical or logic operation sequences automatically (b) Computer understands only binary language which is written in the form of 0 & 1. (c) Computer is a programmable electronic device that stores, retrieves and processes the data. (d) All of the mentioned CPU reads the information from secondary memory. (a) Directly (b) First information is transferred to the main memory and from there the CPU reads it. (c) Through registers (d) None of these A Laser printer uses. (a) Photo sensitive drum (b) Camera lens (c) Heat sensitive paper (d) None of these In a Hard disk, the 0 track is (a) The outermost (b) The innermost (c) Totally machine (d) None of these Which of the following is not a mouse technique commonly used in windows? (a) Lifting (b) Dragging (c) Double-clicking (d) Clicking A Floppy disk is organized as (a) Tracks (b) Sectors (c) Tracks and Sectors (d) Heads and Sectors Laser printer resolution is specified in terms of. (a) CPI (b) API (c) DPI (d) LSI Which of the following holds the ROM, CPU, RAM and expansion cards? (a) Hard disk (b) Floppy disk (c) Motherboard (d) None of the above Magnetic tape can serve as (a) Secondary storage media (b) Input media (c) Output media (d) All of these Which of the following is not an appropriate criterion for file organisation? (a) Larger access time (b) Ease of update (c) Simple maintenance (d) Economy of storage The user can load and execute a program but can't copy it. This process is. (a) Execution (b) Appending (c) Reading (d) Updating In the Gray code, successive numeric values differ only by bit. (a) 1 (b) 3 (c) 2 (d) 4 YCT 99. 100. 101. 102. 103. 104. 105. 106. 107. 108. 109. 110. In a binary number, the leftmost bit is called (a) Most significant bit (b) Least significant bit (c) Carry bit (d) Extra bit Which of the following in not a valid Binary numbers? (a) 1010 (b) 1002 (c) 0000 (d) 1111 Gray Code of decimal number 2 is (a) 0010 (b) 1000 (c) 0011 (d) 0101 The hexadecimal representation of (407)8 is (a) (107)16 (b) (701)16 (c) (017)16 (d) (710)16 15th complement of hexadecimal number (A01)16 is (a) (5F0)16 (b) (6EE)16 (c) (6E0)16 (d) (5FE)16 Which of the given options is the minimum amount of memory? (a) Gigabyte (b) Terabyte (c) Megabyte (d) Petabyte How many KB is equal to GB? (a) 1024 (b) 256×1024 (c) 1024×1024 (d) 1024×1024×128 The excess-3 code of decimal 2 is. (a) 1010 (b) 1100 (c) 0101 (d) 0011 The ASCII code for the LF (Line feed) in hexadecimal is (a) 0D (b) 0A (c) 0C (d) 0B What would be the 8th complement of an octal number 42500? (a) 35200 (b) 35301 (c) 35300 (d) 35100 Based on their data persistence property, identify the odd one out from the following options. (a) SRAM (b) EEPROM (c) EPROM (d) PROM Equal 1 Gigabyte. (a) 216 byte (b) 1030 byte 30 (c) 8 byte (d) 230 byte 111. Which of the following is a valid number in all systems taking into account binary, octal, decimal and hexadecimal. (a) 8090 (b) A100 (c) 3030 (d) 1010 112. What is the octal (base-8) equivalent of the binary number 1010101000101? (a) 50521 (b) 51205 (c) 12505 (d) 5AB1 113. To represent a 31 digit binary number we need a maximum of digits in the decimal number system. (a) 7 (b) 10 (c) 11 (d) 15 114. Which of the following is a toggle key on a keyboard? (a) Alt (b) Shift (c) Scroll lock (d) Ctrl 115. The first electronic digital computer was built in (a) Cambridge University, UK (b) Bern University, Switzerland (c) University of Pennsylvania, USA (d) MIT, USA 116. The ASCII code for CR (Carriage Return) in Octal is. (a) 10 (b) 12 (c) 11 (d) 15 117. BIOS is a type of system software which is stored in _____ located on the motherboard. (a) Cache memory (b) SRAM (c) ROM (d) DRAM 118. With respect to the first digital electronic computer, what is the full form of ABC? (a) Atanasoff Binary Computer (b) Analog Berry Computer (c) Atanasoff Berry Computer (d) Analog Binary Computer ANSWER KEY 1. (a) 11. (c) 2. (b) 12. (a) 3. (a) 13. (d) 4. (d) 14. (d) 5. (b) 15. (c) 6. (a) 16. (a) 7. (b) 17. (a) 8. (d) 18. (d) 9. (d) 19. (a) 10. (c) 20. (a) 21. (d) 22. (d) 23. (c) 24. (c) 25. (c) 26. (b) 27. (c) 28. (c) 29. (a) 30. (a) 31. (d) 41. (b) 51. (a) 61. (b) 71. (d) 81. (b) 91. (a) 101. (c) 111. (d) 32. (d) 42. (b) 52. (a) 62. (c) 72. (b) 82. (c) 92. (c) 102. (a) 112. (c) 33. (b) 43. (d) 53. (d) 63. (a) 73. (a) 83. (b) 93. (c) 103. (d) 113. (b) 34. (d) 44. (d) 54. (b) 64. (c) 74. (b) 84. (d) 94. (c) 104. (c) 114. (c) 35. (b) 45. (b) 55. (b) 65. (d) 75. (d) 85. (c) 95. (d) 105. (c) 115. (c) 36. (a) 46. (d) 56. (a) 66. (c) 76. (b) 86. (c) 96. (a) 106. (c) 116. (d) 37. (c) 47. (d) 57. (d) 67. (c) 77. (d) 87. (d) 97. (a) 107. (b) 117. (c) 38. (a) 48. (c) 58. (b) 68. (a) 78. (b) 88. (b) 98. (d) 108. (c) 118. (c) 39. (a) 49. (b) 59. (a) 69. (b) 79. (b) 89. (a) 99. (a) 109. (a) 40. (c) 50. (a) 60. (d) 70. (b) 80. (d) 90. (a) 100. (b) 110. (d) Fundamental of Computer 19 YCT 02. DATA PROCESSING Word Processing Word processing is a process of creating, editing, saving and printing document or text using word processing software such as MS Word, Word Pad, Notepad, Open office writer. A word processor is computer program or device that provides for input, editing, formatting and output of text, printing document etc. 1.1 Microsoft Office Word (MS Word): MS Word is an application software that install with the Microsoft office package, MS word is also known as word processor software. It is used to create various document like writing a letter, preparing a resume and exam paper etc. MS Word software was added to the first version of Microsoft office package in the year 1990. Creating a documents, editing, saving, printing, moving documents, deleting, creating and editing tables, all these are done in Microsoft Word. 1.3 1.2 Start a MS Word Application: To start MS Word application, we need to install MS Office in a computer system. After installing Microsoft Office software, we can start or open MS Word. There are two ways to open MS Office– 1. Using the start menu. 2. Using run command. 1. Using the start menu: Following these step, we can start MS Word: Start → All program → Microsoft office → Microsoft word Step-1: click the start menu. Step-2: Click the all program option from the menu Step-3: Search for Microsoft Office from the submenu and click it. Step-4: Select Microsoft Word 2010 from the submenu of Microsoft office and click it. After clicking Microsoft Word 2010, you will see the following GUI window2. Using Run Command: Step-1: Press windows key+R. Step-2: Type “winword” inside the run box image Step-3: Click on the OK option or press the Enter key. Elements & Interface of MS Word 2019 After starting MS word application , this type of window interface will appear - Data Processing 20 YCT Dialog Box launcher- Dialog Box launchers are small icons that appear in groups. Clicking on it opens a related task pen or dialog box with several options related to that group. There is a diagonal arrow on the right edge of some groups, it appears on the ribbon as a very small arrow in the lower-right corner of several groups Quick Access Toolbar- The Quick Access tool bar is a customizable toolbar that contains a set of commands that are independent of the tab on the ribbon that is currently display. It gives you quick access to commonly used commands such as save undo, Redo etc. Title bar- The top most bar of the opened window is called the title bar. It displays the title or name of the currently open document Status bar- This is a thin bar at the bottom of the window in the MS Word program and just above the task bar that displays the number of pages, number of word, proofing errors, language in the active document. View toolbar- View toolbar is a group of five buttons located to the right of status bar and to left of the zoom control that adjust the view of the document. (i) Print layout view- It displays the pages exactly as they would appear when printed. (ii) Full screen Reading view- Clicking on it makes the document visible in full screen. (iii) Web layout view- Clicking on it shows how to a document appears when viewed by the web. (iv) Outline view- This allows you to work with established outlines using word's standard heading styles. (v) Draft view- When using this view certain aspects of the document are not visible, for example headers or footers. Zoom Control- It is located on the right side of the view toolbar, where you can slide left or right to zoom in or zoom out. You can also click on “+” sign button to zoom-in and “-” sign button to zoom out. Zoom-in or Zoom-out can be done from 10% to 500% in MS-Word. Short cut keyCtrl + mouse scroll up → zoom in Ctrl + mouse scroll down → zoom out Control button- It is in the form of a group of three buttons to the right of the title bar or at top-right hand corner of SMS word window:(i) Minimize button- It hides the window of MS word from the screen and pin it to the task bar, that means after minimizing the window appears in the task bar. (ii) Maximize button- It keeps the window in full screen mode. (iii) Close button- It closes the window of MS word. Work Area- This is the area where user types the text in word document ,it is a blank area of a word processor. Ruler- Ruler is used to change the format of the document such as alignment of text, tables, graphics etc. It is located below the Ribbon around the edge of the document. In the word, there are two ruler. (i) Horizontal Ruler (ii) Vertical Ruler Menu Bar It is located just below the title bar. In this, it contains some Tabs such as Home, Insert, Design, layout, References, Mailings, Review, View, Help, tell me, share. 1. File Tab→In word 2010, the file tab replaces word 2007's office button. The file tab contains some commands like Home,New, Open, Save, Save As, Print etc. 2. Home Tab: It is used to changing document setting like font size, font color, adding bullets, adjusting styles. Data Processing 21 YCT 3. Insert Tab→ It is used to insert pictures icons, shapes, tables etc into the word document. . 4. Draw Tab→ It is used to draw different colored inks with pen, pencil and highlighter with different effects. 5. Design Tab→ It is the fourth tab from the left between the insert and the layout tabs. It is includes document formatting, page background like watermark, page color, page border etc. 6.Layout→ It is use to set margin, control of page orientation and size, add or remove column, line breaks and set paragraph indentation and lines. 7. References Tab→ It is used to enter document sources citations, bibliography commands etc. in word document. It is used to create a table of contents and insert caption etc. Data Processing 22 YCT 8. Mailings Tab→ This tab is often used to create commands related to mass mailing. It consists of create, start mail merge, write & insert fields, preview results, etc commands. 9. Review→ It consist of spelling & grammar, Thesaurus, speech-Read Aloud, Accessibility Track changes etc commands. It provides icons for document review-related commands, such as spelling check, translation track changes, apply changes and toggles the display of the research task pane defaulting the research service to the thesaurus. 10. View→ This tab contains the commands of all the methods of viewing the documents, such asViews: read mode, Print layout, Web Layout, Outline, draft. Page movement: Vertical, side to side. Show: ruler, Gridlines, navigation pane, zoom split windows macros etc. 1.4 Create A New Document: goto File tab→ New → blank document or Press Ctrl + N keys Data Processing 23 YCT 1.5 Add and Format Text: 1. Place the cursor and type some text. 2. To format, select the text and then select an option: Bold, Italic, Bullets, Numbering, and more. 1.6 Add Pictures,Shapes,SmartArt and more: Step-1: Select the Insert tab. Step-2: Select what you want to add: o Tables - select Table, hover over the size you want, and select it. o Pictures - select Pictures, browse for pictures from your computer, select a stock image, or even search Bing. Note: Older versions of Word may have Online Pictures on the ribbon next to Pictures. o Shapes - select Shapes, and choose a shape from the drop-down. o Icons - select Icons, pick the one you want, and select Insert. o 3D Models - select 3D Models, choose from a file or online source, go to the image you want, and select Insert. o SmartArt - select SmartArt, choose a SmartArt Graphic, and select OK. o Chart - select Chart, select the chart you want, and select OK. o Screenshot - select Screenshot and select one from the drop-down 1.7 Open an existing word document: Goto File tab → Open → Browse → select your document → Click open. Step 1: Click on file tab Step 2: Click on open and browse or navigate to where the document is store and double click it or select it. Short Cut key- Press Ctrl + O keys. Data Processing 24 YCT 1.8 Save The document: The document should not be closed until we have saved file because the unsaved document remains in the main memory (RAM) and if the power is turned off, the documents are destroyed(data loss). Save→ To save the changes in the original document. It just update current file. Save As→ To save a different copy of the document along with the changes made Save As mean don't update current file and create new file with different name. 1. Save your document to Hard driveClick on File Tab > save, pick or browse to a folder, type a name for your document in the file name box, and click save. 2. Save your document to OneDrive- Save your document to one drive so you can get to it from anywhere- at work, at home or on the go. One Drive is the Microsoft cloud storage service that connects to all your files. Go the File tab> Save As (or save a copy) ,Select one Drive, enter a name and select save. Note→ When your document is stored in one drive ,word will save your changes automatically. Shortcut Keys→ Ctrl + S → Save F12 → Save As Note→ When you save for the first time "save" and "Save As" command are same. 1.9 Print a document: Before you print, you can preview your document and specify which pages you want to print. Step-1: Click File > Print. or Press Ctrl + P shortcut keys from keyboard . Step-2: To preview each page, select the forward and backward arrows at the bottom of the page. If the text is too small to read, use the zoom slider at the bottom of the page to enlarge it. Data Processing 25 YCT Step-3: Choose the number of copies and any other option you want such as print all pages, print current page orientation and choose printer etc. 1.10 Close a document: go to file > close Or click on the 'X' button provided in the Top-right corner of the file window. Or Press the 'CTRL + F4' key (shortcut keys). If the file is not saved, then a pop-up will arise to either save, don't save cancel. Data Processing 26 YCT 1.11 Cut ,Copy ,Paste: 1-Copying a text one place to another place: Copy and Paste: Copy command makes a copy of only selected text or file and using paste command, the copied text can be placed anywhere you want. Step-1: Select a file or text Step-2: Copy the file or text using some options likeusing right click on mouse using copy button from ribbon using crtl+C shortcut keys Step-3: Paste the copied text or file with the help of paste command. there are some method for paste command: - using right click on mouse - using paste button from ribbon - using Ctrl+V (shortcut keys). 2-Moving a text one place to another place: cut and paste: Step-1: Select the text you want to move. Step-2: go to the "clipboard section" in the home tab and click on 'cut' option. or press ctrl + X keys from keyboard. Step-3: Click on "Paste" option from clipboard in the "Home" tab where you want to move text. or Press Ctrl + V Key form keyboard Shortcut key→ Ctrl + X and Ctrl + V Data Processing 27 YCT 1.12 Selection Of Text: The text or item have to be selected to perform some kind of formatting on the text in the document such as to move format or delete the picture, text or any other items. Text can be selected either by mouse or keyboardTo select text with mouse, place the cursor at the beginning of the word or line, hold down the left mouse button and then drag the pointer over the text that you want to select to select text with keyboard, place the cursor at the beginning of the word or line using arrow keys and press shift + right arrow. Select all text: Click anywhere within the document and press Ctrl + A on your keyboard Select a single word: to select a single word, quickly double-click that word Select a line of text: Place your cursor at the start of the line and press shift + down arrow key. Select a paragraph of document : Place your cursor at the anywhere of the paragraph and quickly 3 times click on that paragraph. Place your cursor at the beginning of the paragraph text and press Ctrl + Shift + down arrow. Data Processing 1.13 Undo and Redu: Undo: The undo command is used to reverse a immediate changes in document. You can undo changes, even after you have saved and then save again as long as you are within the undo limits. Note- By default office saves the last 100 undoable actions. To undo an action press Ctrl + Z or click undo on quick access toolbar. Redo: Redo is the opposite of undo action. To Redo an action press Ctrl + Y or click on redo from quick access toolbar. 28 YCT Press Ctrl + J or click on justify tool for distribute your text evenly between the margins. Note→ Justified text can be difficult to read for people who have a reading disability, such as dyslexia to make your document as accessible as possible, choose a different alignment style. 1.14 Find and Replace: Find and replace allows you to search a document for a specific work or phrase, text and replace it with another word or text. Step-1: Go to Home tab → Editing group →Replace Important Facts or press Ctrl + H keys. Step-2. Enter the text you want to locate in the 'find what' box. Step-3. Enter you new text in the 'Replace' with box. Step-4. Select 'find next' until you come to the word you want to update Step-5. Choose replace to update all instances at once, choose replace all. Note→ If you want to find not replace then press ctrl + F or go to Home → editing group → find. 1.15 Text Alignment: We can align text in 4 typesi. Align left ii. Align right iii. Align center iv. Justify Step-1 Select word or paragraph text or line that you want to align. or Place the insertion point anywhere in the paragraph. Step-2: Press Ctrl + L or click on Align Left tool for align your context with the left margin. Press Ctrl+ R or Click on Align Right tool for Align your content with the right margin. press Ctrl + E or click on center tool for align your content. Center of the page. Data Processing • Microsoft Word is an example of application software. • Arial is a Sans Serif Font. • Microsoft word software used for creating documents such as letters, brochures, learning activities, tests, quizzes etc. • The default zoom level in word is set at 100%. • Ctrl + R– To right align a text. • Auto fill is the feature of MS Word that fills up forms etc automatically with pre-set values. • Page orientations are portrait and landscape in MS Word 2010. • Ctrl + Z– Short key to undo the last action in a document in MS-Word. • Smallest font size that can be applied to text in a Microsoft word document is 1 and maximum is 1638. • Default font size in MS Word is 8. • Office programs have a default undo/Redo maximum of 100 actions. MS Word Shortcut Keys Press keys To do this one Ctrl + A Select all contents of the page. Ctrl + B Bold selected text. Ctrl + C Copy selected text. Ctrl + D Open Font dialog box Ctrl + X Cut selected text. Ctrl + P Open the print window. Ctrl + E Aligns the line or selected text to the center of the screen Ctrl + F Open find box. Ctrl + G Go to Ctrl + H Replace Ctrl + I Italic selected text. Ctrl + J Justify the text Ctrl + K Open insert hyperlink window Ctrl + U Underline selected text Ctrl + V Paste Ctrl + Y Redo the last action performed Ctrl + Z Undo last action Ctrl + L Aligns the line or selected text to the left of the screen. Ctrl + R Align Selected text to the right of the screen. Ctrl + M Indents the paragraph Ctrl + N Create a new document. Ctrl + Shift + F Change the font. 29 YCT Ctrl + Shift + > Ctrl + O Ctrl + F12 End key Home key Ctrl + ] Ctrl + Shift + < Ctrl + [ Ctrl + Shift + * Ctrl + left arrow key Ctrl + right arrow key Ctrl + up arrow key Ctrl + down arrow Ctrl + Del Ctrl + Backspace Ctrl + End Ctrl + Home Ctrl + Spacebar Ctrl + 1 Ctrl + 2 Ctrl + 5 Ctrl + Alt + 1 Ctrl + Alt + 2 Ctrl + Alt + 3 Ctrl + F1 F1 Alt + Ctrl + F2 Ctrl + F2 Alt + P, SP Shift + F3 Shift + insert F4 F5 Ctrl + Shift + F6 Data Processing Increase selected font with 1pts up to 12pt and then increase font +with 2pts. Open a file launch the open dialog box Move the cursor to the end of line Move the cursor to the start of line Increase selected font with 1pts. Decrease selected font with 1pts, if above 12pts then decreases font by 2pt. Decrease selected font with 1pts. View or hide non printing characters. Moves cursor one word to the left. Moves cursor one word to the right. Moves cursor to the beginning of the paragraph. Moves cursor to the end of the paragraph. Deletes word to right of cursor Deletes word to left of cursor Moves the cursor to the end of the document Moves the cursor to the home of the document Reset selected text to the default font. Single space lines Double space lines 1.5-line spacing Changes text to heading 1. Changes text to heading 2. Changes text to heading 3. Toggles the display of the Ribbon. Open help Open new document Display the print preview. To open page setup dialog box change case Paste the copying text Repeat the last action performed (Word 2000+) Go To Opens to another open Microsoft Word document. F7 Shift + F7 F12 Shift + F12 Ctrl + Shift + F12 Alt + Shift + D Alt + Shift + T Mouse Action Click, hold and drag Double-click Triple-click Ctrl + Mouse wheel Spell and grammar Runs a Thesaurus check on the word highlighted. Save As. Save Prints the document Insert the current date Insert the current time To do this one Selects text from where you want. To select a word. To Select the paragraph. Zooms in and out Microsoft Excel . General information of Microsoft Excel– MS Excel is a spreadsheet program which is used to save and analyse numerical data. It comes under Microsoft Office package. In spreadsheet program, data is stored in the form of tables. So it is easy to open, create, edit, formatting. Calculating, share and print data in MS Excel spreadsheet. Each spreadsheet is a set of cells that are organized in to row and columns. Elements of electronic spreadsheet– Some important terminology are following 1. Workbook– Workbook is collection of one or more spreadsheets. Opening a workbook three worksheets open by default and we can add maximum 255 worksheet within workbook. 2. Worksheet– Worksheet is a collection of cells where you keep and manipulate the data. It is use to create statistical documents. 3. Row– A row runs horizontally in the grid layout of a worksheet. Maximum number of row can be 1048576 in an MS Excel worksheet. 4. Column– It is a vertical block of cell that runs from top to bottom along the length of worksheet. In this, the alphabet is displayed from left to right. A worksheet has a maximum 16384 columns. Columns. column start with A, B, C and end with XFD. 5. Cells– A cells is the intersection of a row and a column. Columns are identified by letters (A, B, C) while rows are identified by numbers (1, 2, 3) each cell has its own name or cell address. Cell Address-C2 30 YCT Formula– In MS Excel, a formula is an expression that operates on values in a range of cells. A formula always start with equal (=) signSUM, COUNT, AVERAGE are example of formula. 7. Function– A function is a predefined formula that performs calculation using specific values in a particular order. In order to use functions correctly, you will need to understand the different parts of a function. Saving a workbook– There are two command to save a workbook in MS Excel. The save command is used to save a workbook and the save as command is used to save the workbook under a new name. First time save workbook– File → Save or Ctrl + S MS Excel 2010 worksheet is saved using XML based file format with .xlsx extension. Auto sum Feature– Using the auto sum feature in MS Excel, you can quickly add data in a row or column. It is located standard tool bar in form of special command. It makes the calculation of row and columns easy. To use Auto sum in Excel– • Select the cell in which you want to sum Home tab → Editing group → Auto sum or, Formulas tab → Function Library group → Auto sum button. To click on the Auto sum drop down arrow, select the option as shown in the picture below. or Press Shortcut keys Alt + = 6. num2 – [optional] the second value to sum For example– =sum (A2:A5) 2. AVERAGE()– AVERAGE function calculate the average value in the range of cells syntax– = AVERAGE (num1, [num2], .....) num1 – A number or cell reference that refers to numeric value [required] num2 – A number or cell reference that refers to numeric values. Example- AVERAGE (A1: A5) 3. Count()– The count function, counts the numbers of cells in a range of cells. Empty cells and text values are ignored. Syntax– = COUNT (value1, [value2], ....) value1 – An item, cell reference, or range. value2 – An item, cell reference, or range [optional] Example– =COUNT(1, 2, 3, 4)//Returns 4 =COUNT(1, "a")// Returns 1 Selecting sum in the formulas tab • Excel automatically receives the column data range you click and displays a dashed line along the border line. One pressing the enter button, it displays the sum of the selected cell range. Some important function used in MS Excel which are following– 1. SUM– The sum function adds values you can add individual values, cell references or ranges or a mix all three. Syntax– sum (num1, [num2], ......) num1 – The first value to sum [required] Data Processing 4. COUNTA()– COUNTA function returns the count of cells that contain numbers, text, logical value, error values and empty text (" "). COUNTA does not count empty cells. Syntax– = COUNTA (value1, [value2], .....) Example– = COUNTA (1, 3, 8)//returns 3 = COUNTA (2, 5, "b", 1%)//returns 4 31 YCT 8. TODAY()– In MS Excel TODAY() functions returns current date. Syntax– =TODAY() Example– TODAY()// Current date TODAY() + 90// 90 days from today 5. ROUND()– The ROUND function rounds a number to a specific number of digits. Syntax– 9. NOW()– In MS Excel NOW() functions returns = ROUND (number, num_digits) current date and time. number-(required) Syntax– The number that you want to round. NOW() num-digits (Required) The number of digits to which you want to round the number argument. Example– = ROUND (B, B1, 1)// ROUND to 1 decimal place 10. DAY()– The DAY() function returns the day value in a given date as a number between 1 to 31 from a given date. Syntax– = DAY(date) 6. MAX()– The Excel MAX function returns the largest numeric value in the data provided. Syntax– = MAX (number1, [number2], .....) Example– = MAX (15, 16, 19)// returns 19 11. MONTH()– This function returns the month of date represented by a serial number. The month is given as an integer from 1(January) to 12 (December). Syntax– MONTH (Serial_Number) Example– MONTH ("12_NOV")//Returns11 7. MIN()– This function returns the smallest value out of a set of values. Syntax– = MIN (num1, [num2], ....) Example– MIN (18, 20, 13)//returns13 12. YEAR()– This function returns the year corresponding to the date, given as an argument. Syntax– YEAR (Serial_Number) Serial_Number is the date of the year you want to find it. Example– Year ("11/8/2022") = 2022 Data Processing 32 YCT Printing a worksheet– To print a worksheet, select the print option from backstage view or click the print preview and buttons from the quick access toolbar. 13. CONCATENATE()– CONCATENATE() use to join two or more text string • In Excel 2010, the user can prints the entire worksheet or part of it. into one string. • Open the worksheet which you want to print Syntax– CONCATENATE (text1, [text2], .....) • File → Print Example- CONCATENATE("TOTAL", " VALUE") or Press Ctrl + Shift + F12 or Ctrl + P = TOTAL VALUE • Print back stage view → Print 14. CEILING()– The CEILING function rounds a number up to its nearest multiple of significance. Syntax– =CEILING (Number, significance) The nearest highest multiple of 3 for 10 is 12. 15. FLOOR()– In MS Excel the FLOOR rounds a number down to the nearest multiple of significance. Syntax– =FLOOR(number, significance) The nearest lowest multiple of 3 for 10 is 9. 16. DATEDIF()– In MS Excel the DATEDIF function returns the difference between two date values in years, month or days. Syntax– =DATEDIF(start_dat, end_date,unit) 17. POWER()– The POWER() returns the result of a number raised to a given number. This function is alternative of exponent operator. Syntax– =POWER(number, power) Data Processing 33 Microsoft Excel Shortcuts Keys Press Keys F2 F5 F11 Ctrl + Shift + ; Ctrl + : Alt+Shift + F1 Shift + F3 Shift + F5 Ctrl + A Ctrl + B Ctrl + I Ctrl + K Ctrl + U Ctrl + 5 Ctrl + P Ctrl + Z Ctrl + F9 Ctrl + F10 To do this one Edit the selected cell. Go to a specific cell. For example A5. Create chart. Enter the current time. Enter the current date. Insert New Worksheet. Open the Excel formula window. Bring up search box. Select all contents of the worksheet. Bold selected text. Italic selected text. Insert link. Underline selected text. Strikethrough selected text. Printing dialog box open. Undo last action. Minimize current window. Maximize currently selected window. YCT Ctrl + F6 Ctrl + Page up Ctrl + Page down Ctrl + Tab Alt + = Ctrl + ' Ctrl + Shift + ! Ctrl+Shift + $ Switch between open workbooks/ windows. Move between Excel worksheets in the same Excel document. Move between Excel worksheets in the same Excel document. Move between two or more open Excel files. Create a formula to sum all of the above cells. Insert the value of the above cell into cell currently selected. PowerPoint MS PowerPoint is an electronic presentation program that helps people to present a speech using a collection of slides. A PowerPoint presentation is a collection of slides. The presentation may include slides, handouts, notes, outline, graphics and animation. In PowerPoint we can create any presentation of particular topic and topic may be education, company business etc. The default file format in PowerPoint version 2007 or newer is presentation1.pptx. Format number in comma format. Format number in currency format. Ctrl+Shift + # Ctrl+Shift + % Ctrl + shift + ^ Format number in date format Format number in percentage format Format number in scientific format. Ctrl+Shift + @ Format number in time format. Ctrl+Arrow Key Move cursor to next section to text. Ctrl + Space Select entire column. Shift + Space Select entire row. Important Facts • MS Excel is components of MS Office and it is mainly used for accounting purpose. • A file created in Microsoft Excel is called a workbook. • Spreadsheet program are used to create amount based document. • In MS Excel By default, the text data is left aligned and numeric data is right aligned in cell. • What if analysis command is available under data section of menu bar in MS Excel 2007. • Making heading visible even while scrolling in excel can be done by using freeze pane. • In an absolute cell address, row number and column levels are preceded by symbol. • .xls is extension of MS Excel. • In MS Excel by default all cell reference are relative references. • Line chart is useful for showing trends or changes over time. • Pie chart is useful for showing trends or changes over time. • Filtering features displays only the data in columns according to specified criteria. • Ctrl+Shift+L use to enable filtering of the selected cell. • Data sorting is the process of arranging data in some logical order. MS Excel allows us to sort data either in ascending or descending order. Key Description Home Mouse active cell to the first column of the current row. Page Up Move active cell to row 1 column 1 Page UP Move active cell up to one screen. Data Processing Basic Element of a slide (i) Title Bar– This shows the name title current presentation. (ii) Office Button– MS Office button is located on the upper-left corner of the PowerPoint Window. (iii) Menu Bar– Contains menu items like Insert, Design, View etc. (iv) Formatting Toolbar–It contain tool like Bold, Italic, Underline, Font shape and Size etc. (v) Zoom Slider– To zoom in or zoom out your presentation. Maximum and minimum zoom limit in slide is 10% to 400% by default PowerPoint zoom size is 69%. (vi) Slide Sorter Pane– It allows us to choose which slides will be shown in which sequence during the slide show. (vii) Notes Pane– It allows us to type notes that we may require later when preparing for the presentation, but they will not be displayed during the slide show. Tab Home– The home tab holds the cut and paste features, Font and Paragraph option and what you need to add organize slides. 34 YCT Insert– Click Insert tab to add something to a slide. This View– Views allow you to look at your presentation in includes Pictures, Shapes, Charts, Links, Text boxes, different ways depending on where you are in the creation or delivery process. Video and more. File– the file tab is used to opening, saving, sharing, Design– On the design tab, you can add a theme or exporting, printing and managing your presentation. colour scheme or format the slide background. Transitions– A slide transition is the visual effect that occur when you move from one slide to the next during a presentation. You can control the speed, add sound, and customize the look of the transition effect. Set up how your slides change from one to the next on the transition tab. Find a gallery of the possible transitions to this slide group. Click More at the side of the gallery to see all of them. Animation– Use the animations tab to apply animation to a slides and the effect based on animation type. Quick Access Toolbar– It is located beside the MS Office button. The quick Access Toolbar is a Slides Show– On the slide show tab, set up the way that customizable toolbar that contains a set of commands that are independent of the tab on the ribbon that is you want to show your presentation to others. currently display. Create a Presentation– 1. Open PowerPoint 2. In the left pane, select New. 3. Select an option. • To create a presentation from scratch, select blank presentation. Review– The review tab lets you add comments, run • To use a prepared design, select one of the template. spell check. Add a slide– 1. In the thumbnails on the left pane, select the slide you want new slide to follow. 2. In the Home tab, in the slides section, select new slide. 3. In the slides section, select layout and then select the layout you want from the menu. Data Processing 35 YCT Slide Show– This view is used to show the final presentation with the all effect and colour schemes. Placeholder– In PowerPoint, the dotted areas in an empty slides are called placeholder. A placeholder is a pre-formatted container on a slide for content (text, graphics or video). The pre-set formatting makes it easier to format slides consistently. To resize a placeholder, drag one of its corner borders. Add and Format text 1. Place the cursor inside a text box and then type. 2. Select the text and then select one or more option from the font section of the Home tab such as Font, Increase Font Size, decrease Font Size, Bold, Italic, Underline etc. 3. To create bulleted or numbered lists, select the text Add, edit or remove a placeholder on a slide and then select Bullets or Numbering. layout– You format a placeholder in slide master view. Then you use the placeholder add content to it in normal view. The picture slide has two rectangular placeholder. 1. The upper title placeholder prompts the user for text and formats it in the default Heading, Font, Size and Colour. 2. The (lower) content placeholder accepts text or a table chart smart Art graphic, picture or video as indicated by the clickable icons at its center. Add a picture, shape and more 1. Go to the Insert tab 2. To add a picture • In the Images section, select the pictures. • In the insert picture from menu, select the source you want. • Browse for the picture you want select it and then select insert. Type of View used in MS PowerPoint You can find the different PowerPoint view options on the view tab. Normal View– In any presentation by default layout is normal layout, and normal layout can be divide in three parts. Outline view– In this view we can see only the text of the slides in the presentation. Slide Sorter View– In this view, slides appear of thumbnails size and they can be moved or sorted according to slides can be moved by first clicking then and dragging them to their desired location. Data Processing PowerPoint template– A PowerPoint template is a pattern or blueprint of a slide or group of slide that you save as a .potx file extension. Templates can contain layouts, colours, set, effects background styles and even content. PowerPoint theme– A theme is a predefined set of colours, Fonts and visual effect that you apply to your slides for a unified, professional look. 36 YCT Animation Painter– In PowerPoint you can copy Add, rearrange, duplicate and delete slides in animation from one object to another object by using the PowerPoint animation painter. Copy an animation– 1. Select the object that has the animation that you want to copy. 2. On the animations tab of the toolbar ribbon, in the advance animation group, click animation painter. Delete Slides 3. On the slides, click the object to which you want to 1. For a single slide– Right click the slide in the copy the animation. thumbnail plane on the left, and select delete slide. Format Painter– Copy formatting form one place 2. For multiple Slides– Press and hold ctrl and in and apply it to another. Double-click this button to apply the thumbnail plane on the left, select the slides. Release the same formatting to multiple places in the document. the ctrl key. Then right click selection and choose the delete slide. Important Facts 3. For a sequence of slides– Press and hold shift • In a slide show menu of MS PowerPoint 2007, and thumbnail pane on the left select the first and last 640×480 'resolution option is fastest and 1440×900 slide in the sequence. Release the shift key. Then right resolution option is slowest. click the selection and choose delete slide. • In MS PowerPoint a black slide indicates the end of Duplicate a slide– In the thumbnail pane on the left presentation. right-click the slide the slides thumbnail that you want to • By default MS PowerPoint presentation name is duplicate and then click duplicate slide. The duplicate is presentation1.pptx. inserted immediately after the original. Rearrange the order of slides– In the pane on the • Slide sorter view gives you a view of your slides in thumbnail form. left, click the thumbnail of the slide that you want to • In PowerPoint, the dotted are in an empty slide are move and then drag it to the new location. called place holders. Page orientation in PowerPoint– PowerPoint slides are automatically set up in landscape (Horizontal) • Text can not be inserted anywhere on the slide. layout. But you can change the slide orientation to • A text box can be place anywhere on the slide. portrait (vertical layout). • In a PowerPoint show, .jpg, .giv, .wav file format can Slide master– When you want all image your slides be added. to contain the same fonts and images (such as logos). • To select one hyperlink after another during a slide You can make those changes in one place the slide presentation press tab key. master and they all be applied to all your slides. To open • Auto content wizard PowerPoint feature allow any slide master view on the view tab, select slide master. user to create presentation quickly. MS PowerPoint Short Cut Keys Ctrl + N Create new presentation Ctrl + M Add a new slide Ctrl + B Make selected text bold Ctrl + X Cut selected text, object or slide Ctrl + C Copy selected text, object or slide Ctrl + V Paste cut or copied text, object or slide Ctrl + Z Undo the last action Ctrl + S Save the presentation Alt + H Go to the Home tab Alt + N Go to the Insert tab The master slide is top slide in the thumbnail pane F5 Start the slide show on the left side of the window. Esc End the slide show PowerPoint handouts– Handouts are paper copies Ctrl + Shift +Tab Switch between the thumbnail of your power point presentation. When you can use the pane and the outline view pane. Handout Master tab to edit the appearance of Ctrl + A Select all object on a slide presentation handouts, including layout headers and Ctrl + Shift + C Copy Formatting only footers and background. The maximum number of 9 slides can be printed in Ctrl + K Insert a hyperlink one handout. Ctrl + Shift + V Paste formatting To see the handout options, select the view tab and Ctrl + Spacebar Remove formatting then select handout master views group. Add slides– 1. Select the slide you want your new slide to follow. 2. Select Home > New Slide 3. Select a layout. 4. Select the text box and type. Data Processing 37 YCT 3. Click the Blank database icon under the New section to display File New Database dialog box, as shown in Fig. M.S. Office (Access) 4. Microsoft Access system Microsoft Access (MS Access) is a Relational Database Management system (RDBMS) that allows the users to create a database and store the data in the form of rows and columns i.e. in the form of tables. MS Access comprises of a database engine known as Microsoft Jet Database engine and a GUI. It also supports various tools that help the users in creating and managing database. MS Access is used by business organizations and programmers for creating an organized database system. It can combine data from various files through creating relationships, and can make data entry more efficient and accurate. 1. Basic operations performed in MS Access MS Access is a database management system that can be used for creating database. We can perform various operations in MS Access for storing the data in an efficient manner. The following are some of the key operations that can be performed in MS Access. (i) Creating a database (ii) Creating a database table (iii) Defining relationships (iv) Creating a database query. 1.1 Creating a database- we can create a database in MS Access by performing the following steps1. Open the Microsoft Access window. 2. Select file→ New to display the New file task pane on the right side of the Microsoft Access window, as shown in fig. 5. Select the location from the save in list for saving the database. Enter the name of the database such as Database1 in the File name text box and click the created button to create the Database1. Figure shows the database1: Database (Access 2007) window. Ctrl + O Ctrl + P Ctrl + Q Ctrl + W Shift + F5 Backspace Ctrl + Backspace Delete Ctrl + Delete Ctrl + F F10 Ctrl + H Shift + F4 Shift + F3 Data Processing Open a presentation Print a presentation Exit PowerPoint Close a presentation Resume slide show Delete one character to the left Delete one word to the left Delete one character to the right. Delete one word to the right. Open find dialog box. Active the menu bar end. Open the replace dialog box Repeat the last find action. Switch between sentence case. 1.2 Creating a database table- We can create a table in MS Access using any of the following three options available in the Database1: Database (Access 2007) window. • Create table in Design view→ this option allows us to first create the design of the table, i.e. the fields of the table along with its data type and then enter data into it. • Create table by using wizard→ This option provides some sample tables to the user. These sample tables are divided into two categories, business and personal. After selecting a sample table and its fields, the users can enter data into the newly created table. • Create table by entering data→ This option allows the user to design the table and enter data in the table simultaneously. There is no need to specify the data type for the fields. • To create a table in design view→ The most commonly used method the created a table in MS Access is the create table in design table in MS Access using the create table in design view option, we need to perform the following the steps- 38 YCT 1. 2. Double-click the create table in Design view option In above fig. we can either select the yes or no option is Datebase1: Database (Access 2007) window to depending upon our requirement of defining a primary key is a single field or a combination of multiple fields that are display the table 1: Table page, as shown in fig. used to uniquely identify a record in the database table. 6. Click the No button to display the Microsoft Access - [Database1: Database (Access 2007)] window. 1.3 Defining Relationships→ In MS Access, relationship between two or more tables of a database help to create a link between the two tables. It links the two tables with the help of the columns of same types present in both the tables. The linking of same columns helps in reducing the duplicacy and inconsistency of data. These types of relationships can be defined for databases• One-to-one- One-to-one relationship maps one record of a table to a single record of another table in the same database. Enter the name of the fields in the field Name • One-to-many- One-to-many relationship maps one column and the data types is the data type column, record of a table in a database to multiple records of as shown in fig. another table in the same database. • Many-to-many- Many-to-many relationship maps multiple records of a table to multiple records of another table in the same database. • To create a relationship between two tables of a database, we need to perform the following steps1. Select tools → Relationships to display show table dialog box containing the names of all the tables contained in the database, as shown in fig. 3. Close the Table 1: Table page, Before closing the table 1: Table page, a message prompt appears, as shown in fig. 4. Click the Yes button to display the save As dialog box, as shown in Fig. 2. 3. 5. Select a table name and click the Add bottom to add a relationship to it. Click the close button to close the show table dialog box and display the relationship window, as shown in fig. Enter the name of the table, say Database1_Details, in the Table Name text box and click ok. A message prompt again appears, as shown in fig. Data Processing 39 YCT 4. Drag the Employee_id field, which is present in the tablet to the Employee_id field in the table2 to display the Edit Relationships dialog box, as shown fig. 2. 3. 4. 5. Double-click the Create query in Design view option to display the Show Table window. Click the Add button to add the tables from which data is to extracted. Click the Close button to close the Show Table window. The Microsoft Access – [Query1: select Query] window appears, as shown in fig. Click the Create button to establish a relationship between the two table. The following figure shows the relationships window displaying a relation created between the two tables. 5. 6. Close the relationships window. A message prompt appears asking whether to save the changes or not. 7. Click the Yes button to save the relationship. 1.4 Creating a database query Query is a request through which a record or a set of records can be accessed conditionally form a database. On the basis of the query, only the records fulfilling the specified condition are displayed in the result. There exists two ways of creating a query, which are as follows• Create a query in Design view. • Create a query using wizard. 7. The most commonly used method for creating a query in MS Access is by using the create query in Design view option. For creating a query in MS Access using the create query in Design view option, we need to perform the following the steps. 1. Click the Queries button in left pane of the Microsoft Access – [Database1: Database (Access 2007)] window to display the various query options, as shown in fig. Select the field name to be displayed from the Field list and the table name from the Table list. Specify the condition on the basis of which data is to be extracted in the Criteria field, as shown in fig. 6. Data Processing 40 Window with field names and specified criteria. Close the Microsoft Access - [Query 1 : select Query] window. A message prompt appears asking whether to save the changes pertaining to the query or not. YCT 8. Click the Yes button to save the query. Figure shows the save as dialog box. Alt Esc Ctrl + Tab Shift + Tab Alt + Down Arrow Esc Enter the name of the query, say query - roll in the Query Name text box. 10. Click OK to save the query. The Microsoft access Database1: Database (Access 2007) window appears containing the name of the query. Microsoft Access : Shortcuts Keys 1. Shortcuts keys for database files. Ctrl + N Open a new database. Ctrl + O Open an existing database. Shift + F10 Display a shortcut menu for a selected item. Alt + I Open the look in list. Ctrl + S Save a database object. F12 Open the save as dialog box. Ctrl + P Print the current or selected object. Esc Cancel print preview. 2. Shortcuts keys for the ribbon Alt + F Open the file Menu. Alt + H Open the Home tab. Alt + C Open the create tab. Alt + T Open the table tab. Alt + X Open the external data tab. Alt + Y Open the database tools tab. Alt + J Open the fields tab. F10 Select the active tab of the ribbon. Shift + Tab Move the focus to commands on the ribbon. Ctrl + F1 Expand or collapse the ribbon. F6 Move the focus to a different pane of the window. F11 Show or hide the Navigation Pane. Ctrl + F Go to search box in the Navigation Pane. Ctrl + F6 Switch to the next or previous database window. Ctrl + W Close the active database window. Alt + F11 Switch between the visual basic editor and the previous active window. Ctrl + F10 Maximize or restore a selected window 3. Shortcuts keys for menus, dialog boxers, wizards, property sheets, text boxes, combo boxes and list boxes. Home Select the first or last command on the menu. Spacebar Open the selected menu. Shift + F10 Open a shortcut menu. Ctrl + Home Move to the top or bottom of the selected gallery list. 9. Data Processing 41 Alt + N Alt + B Alt + F F4 Alt + Enter Ctrl + Tab Ctrl + Shift + Tab Shift + Home Ctrl + Shift + Left Arrow Ctrl + Shift + Right Arrow F4 F2 Ctrl + G Close the visible menu and submenu at the same time. Close the visible menu. Switch to the next or previous tab in a dialog box. Move to the next or previous option or option group. Open the selected drop-down list box Cancel the command and close the dialog box. Move to the next page of the wizard. Move to the previous page of the wizard. Complete the wizard. Show or hide the property sheet. Display a property sheet in design view. Toggle forward between tabs when a property is selected. Toggle backward between tabs when a property is selected. Select from the insertion point to the beginning of the text entry. Change the selection by one word to the left. Change the selection by one word to the right. Open a combo box. Rename a selected object. Display the immediate window in the Visual Basic Editor. 4. Shortcuts keys for Design, Layout, Datasheet view. F2 Switch between edit mode and Navigation mode in a datasheet. Esc Exit Navigation mode. F5 Switch to the form view from the form design view. F6 Switch between the upper and lower portions of a window. F7 Open the Visual Basic Editor from a selected property in the property sheet for a form. Alt + F11 Switch from the visual basic editor back to the form or report design view. Alt + F8 Show or hide the field list pane. Ctrl + C Copy the selected control to the Clipboard. Ctrl + X Cut the selected control to the clipboard. Ctrl + V Paste the contents of the clipboard in the upper-left corner of the selected section. Ctrl + A Select all records. F9 Recalculated the fields in the window. F1 Open the help window. F7 Check spelling. YCT Important Questions Asked in Previous Years Examinations 1. Which of the following applications belongs to MS Office? (a) Word (b) Photoshop (c) Gmail (d) Chrome UPPCL JE 2019 (Batch-02) 2. MS Word is basically used for (a) creating databases (b) analyzing the data (c) preparing the various documents (d) preparing slides (UPPCL RO/ARO-2014) 3. Which among the following is a sans serif font? (a) All of these (b) Arial (c) Courier (d) Times UPPCL ARO-18.02.2018 4. Microsoft Word is an example of a/an: (a) application software (b) system software (c) database (d) operating system UPPCL APS 27-09-2018 (Evening) Which is a popular software used primarily for 5. creating documents such as letters, brochures, learning activities, tests, quizzes and students' homework assignments? (a) Paint (b) MS Word (c) MS Access (d) Calculator UPPCL JE 31-01-2019 (Batch-02) 6. The default Zoom level in Word is set at (a) 0% (b) 125% (c) 100% (d) 1% UPPCL ARO-18.02.2018 7. Which of the following is not in–built feature of MS Word? (a) Live Stream (b) Spell Check (c) Thesaurus (d) Translate UPPCL Stenographer Exam-18.02.2018 8. Which of the following is NOT a Section Break type? (a) Odd Page (b) Next page (c) Column (d) Even Page UPPCL Office Assistant III 24-10-2018 (Evening) 9. Which of the following is NOT a basic text formatting feature? (a) Italic (b) Underline (c) Capitalize (d) Bold UPPCL Stenographer Exam-18.02.2018 10. Which among the following method can be used to right align a text? (a) Ctrl + I (b) Ctrl + Z (c) Ctrl + J (d) Ctrl + R UPPCL ARO-18.02.2018 Data Processing 11. 12. 13. 14. 15. 16. The feature that fills up forms etc automatically with pre-set values is called:(a) AutoFill (b) Instant Fill (c) Filler (d) FillUp UPPCL Asst. Accountant Eaxm-09.02.2018 The two types of Page Orientations are Portrait and _____ (a) Landscape (b) Paper Size (c) Print (d) Paper source While editing a text document in MS Word, the combination keys used for copying and pasting text are respectively : (a) Ctrl + c, Ctrl + z (b) Ctrl + c, Ctrl + v (c) Ctrl + x, Ctrl + v (d) Ctrl + v, Ctrl + c RRB NTPC, (Shift -2) Online, 19.03.2016 The shortcut for opening a file is (a) Ctrl + Alt (b) Shift + O (c) Alt + O (d) Ctrl + O UPPCL Accountant 10-02-2018 What is the shortcut key to "Center Align" the selected text? (a) Ctrl + C (b) Ctrl + E (c) Ctrl + F (d) Ctrl + H (UPPCL TG-2 26.06.2016) In MS word, You can display the "Find and Replace" Dialog box by pressing which of the following Function Keys ? (a) F5 (b) CTRL + F5 (c) CTRL + F4 (d) F4 UPP Computer Operator 21-12-2018 (Batch-01) 17. In Microsoft Word 2013, What is the shortcut key for print preview? (a) Ctrl + F4 (b) Ctrl + F2 (c) Ctrl + Alt + F3 (d) Ctrl + F12 18. An application on desktop can be opened through shortcut by (a) Double clicking on its shortcut (b) Right clicking and choosing "open" option (c) Selecting the icon and pressing enter (d) All of these (UPPCL TG-2 26.06.2016) In Microsoft Word, what will be the effect of CTRL + SPACEBAR on a selected portion of text? (a) Moves the cursor to the end of the document (b) Moves the corsor to the beginning of the document (c) Changes case (upper to lower/lower to upper) (d) Clears all formatting on the selected text UPPCL ARO 13-09-2018 UPPCL (Office Assistant III) 23-09-2018 19. 42 YCT 20. 21. 22. 23. 24. 25. 26. 27. 28. 29. In MS-Word 2007, the shortcut key used to italicize a text is _______. (a) Shift + Alt + I (b) Shift + I (c) Alt + I (d) Ctrl + I UPPCL APS Exam-18.02.2018 Which shortcut key will undo an action? (a) Ctrl + L (b) Ctrl + Z (c) Ctrl + Y (d) Ctrl + J UPPCL (Office Assistant III) 23-09-2018 In MS Excel 2016, what is the shortcut key launch the Open dialog box? (a) Alt + F12 (b) Ctrl + F12 (c) Shift + F12 (d) F12 UPPCL JE 2019 (Batch-02) Which of the following options is used as a short cut for adding a hyperlink in a MS-Word application? (a) Ctrl + S (b) Ctrl + K (c) Ctrl + H (d) Ctrl + O UPP Computer Operator 21-12-2018 (Batch-02) Using the end key in Microsoft Word, processor moves the cursor to the end of the.......... (a) page (b) file (c) document (d) line (SSC J.E. 02.03.17, 10:00 am) In Microsoft Word 2013, which menu includes 'Table row height' to change the height of the row? (a) Page layout (b) Design (c) Layout (d) Insert UPPCL (Office Assistant III) 23-09-2018 Which of the following is included in Paragraph Formatting in a word processor? (a) subscript (b) font (c) underline colour (d) line spacing (SSC J.E. 04.03.17, 10:00 am) Using the 'Home Key' in Microsoft word, processor moves the cursor to the beginning of the ............ (a) Page (b) file (c) document (d) line (SSC J.E. 01.03.17, 10:00 am) To change selected text to All Capital Letters, you have to click the change case button and then click (a) Uppercase (b) Upper all (c) Caps lock/ (d) Lock upper (UPPCL TG-2 26.06.2016) In MS Word, which of the following options under "Change Case" is used to convert the selected text from upper case to lower case and vice versa? Data Processing (a) Lower case (c) Toggle case 30. 31. 32. 33. 34. 35. 36. 37. 43 (b) Sentence case (d) Upper case UPPCL-JE 31-01-2019 (Batch -01) Which of the following features are available in Microsoft Word. I. Check the document for spelling and grammar errors II. Add header, footer and page number III. Protect the Word document with password (a) I and III only (b) II and III only (c) I and II only (d) I, II and III UPPCL-JE 31-01-2019 (Batch -01) What is Macro? (a) Small add-on programs that are installed afterwards if you need them (b) A type of high level programming language (c) A type of low level programming language (d) Small programs created in MS–Word to automate repetitive tasks by using VBA (UPPCL TG2 Re-exam 16-10-2016) Which of the following fonts is used as default font in MS Word 2016? (a) Arial (b) Calibri (c) Times New Roman (d) Verdana UPPCL JE 31-01-2019 (Batch-02) Which of the following would you choose to move selected text from one place to another? (a) Move and Paste (b) Copy and Paste (c) Cut and Paste (d) Delete and Paste (UPPCL TG2 Re-exam 16-10-2016) In MS Word, by pressing which of the following key combination a page break can be inserted? (a) Ctrl + F1 (b) Shift + Enter (c) Shift + F1 (d) Ctrl + Enter UPPCL JE 31-01-2019 (Batch-02) Saving your current file as a new one without overwriting the original file can be done via: (a) New (b) Save (c) Save As (d) Open UPPCL Stenographer Exam-18.02.2018 Which of the following would you choose to save a document with a new name ? (a) Press Ctrl +S (b) Click File,Save (c) Click Tools, Option, Save (d) Click File, Save as (UPPCL TG2 Re-exam 16-10-2016) Which of the following saves the changes of a document into a new file? (a) Print Preview (b) Print (c) Save (d) Save As (AHC RO-2016) YCT 38. You need to save an existing word document in 48. another name. Which of the following options will you use ? (a) Insert (b) Save As 49. (c) Save (d) Edit 39. In MS Word 2016, which of the following groups has page formatting options like margins, size and orientation? (a) Page (b) Document (c) Section (d) Page Setup UPPCL-JE 31-01-2019 (Batch -01) The keyboard shortcut to "cut" something is: (a) Shift + X (b) Shift + Alt (c) Ctrl + C (d) Ctrl + X UPPCL Stenographer Exam-18.02.2018 What is the short key for GO–TO menu in MS–Word ? (a) Ctrl + Del (b) Ctrl + G + T (c) Ctrl + C (d) Ctrl + G (UPPCL TG2 Re-exam 16-10-2016) Which Shortcut key is used in MS Word to change the font? (a) Ctrl + F (b) Ctrl + Shift + F (c) Shift + Alt + F (d) Ctrl + Alt + F (UPPCL TG2 11-11-2016) Shortcut Key "Shift + Tab" is used for ............. (a) Move forward through the Tabs (b) Move backward through the Tabs (c) Move forward through the options (d) Move backward through the options (UPPCL TG2 11-11-2016) What is the function of Thesaurus in MS-Word? (a) Change word to its synonyms (b) Alignment of word (c) Change in graphics of word (d) Used in Mail Merge (UPPCL TG2 11-11-2016) In MS-Word, _____ allows the user to type the text directly inside it. (a) Cable (b) Print (c) Callouts (d) Numbers only UPPCL Office Assistant III 24-10-2018 (Evening) What is the shortcut key for making the selected text subscript in MS-Word? (a) Ctrl+ = (b) Ctrl+(c) Ctrl+Shift+ = (d) Ctrl+Shift+(UPPCL TG-2 26.06.2016) In word, you can create bullets with (a) Numbers (b) Roman numerals (c) All of these (d) Letters UPPCL ARO-18.02.2018 UPP Computer Operator 21-12-2018 (Batch-01) 40. 41. 42. 43. 44. 45. 46. 47. Data Processing 50. 51. 52. 53. 54. 55. 44 We can emphasize text in Word using: (a) Word Warp (b) Indentation (c) Highlight (d) All of these UPPCL Stenographer Exam-18.02.2018 Which of the following statements is FALSE about MS Word software? (a) MS Word software can create, edit, save and print documents (b) MS Word software can insert elements from other software, such as illustrations or photographs (c) MS Word Software cannot correct spelling and grammar (d) MS Word software can format text, such as font type, make the text bold, underline the text and italicize the text UPPCL JE 2019 (Batch-01) In Microsoft Word 2013, which of the following are INCORRECT steps for creating a table? (a) Click on insert-> Click on Table-> Select table (b) Click on Insert-> Click on Table -> Draw table (c) Click on Insert -> Click on Table -> Insert table (d) Click on Insert -> Click on Table -> Move the cursor over the grid to select required number of rows and columns UPPCL (Office Assistant III) 23-09-2018 In MS Word 2016, under which of the following ribbon items is "Header and Footer" option available? (a) Insert (b) Tools (c) View (d) Format UPPCL JE 2019 (Batch-02) In Microsoft Word 2013, Which group menu of the Home tab includes the Format Painter? (a) Editing (b) Styles (c) Clipboard (d) Paragraph UPPCL (Office Assistant III) 23-09-2018 What menu is selected to print? (a) File (b) Tools (c) Special (d) Edit UPSSSC JE-2015 In Microsoft Word 2013 which of the following menus includes the split cells option? (a) Layout (b) Design (c) Page Layout (d) Insert UPPCL (Office Assistant III) 23-09-2018 With the ruler bar in MS Word, you can adjust: (a) Background Color (b) Font (c) Text Size (d) Indentation UPPCL Stenographer Exam-18.02.2018 YCT 56. 57. 58. 59. 60. 61. 62. To delete backwards in the case of mistakes, the ____key is used. (a) Shift (b) Backspace (c) Delete (d) Tab UPPCL Office Assistant III 24-10-2018 (Evening) Which shortcut key is used to move directly to the bottom of the word document in MS-Word? (a) Alt+End (b) End (c) Shift+End (d) Ctrl+End (UPPCL TG2 11-11-2016) Word includes a series of predefined graphics called _____ that can be inserted into the Word Document. (a) Captions (b) Clip Art (c) Bookmarks (d) Hyperlinks UPPCL APS 27-09-2018 (Evening) What is the use of Drop caps feature in a MS Word document? (a) To drop all the capital letters (b) To begin a paragraph with a large dropped initial capital letter (c) To automatically begin each paragraph with capital letter (d) To automatically begin each paragraph with small letter UPPCL JE 2019 (Batch-01) Why are Drop Caps used in a document? 64. 65. 66. 67. 68. (a) To begin a paragraph with a large dropped initial capital letter. (b) To begin with a small letter. (c) To automatically begin each paragraph with a 69. capital letter. (d) To drop all the capital letters. UPPCL APS 27-09-2018 (Evening) …...…..clicking on mouse selects the entire paragraph by default, while working with text document is MS Word. 70. (a) Alt + Single (b) Triple (c) Double (d) Single RRB NTPC, (Shift -1) Online, 18.03.2016 The selected portion of a text is called _______. (a) formula (c) block 63. (b) function 71. (d) method UPPCL APS 27-09-2018 (Evening) In MS Word, the Shortcut key Ctrl + I is used for/to (a) Inserting a line break (b) make the selected text bold (c) Apply italic format to selected text (d) Increase font size UPPCL JE 31-01-2019 (Batch-02) Data Processing 45 In Microsoft Word, the 'hyphenation' option is available under______. (a) View (b) Insert (c) Margins (under Page Layout) (d) Page Layout UPPCL ARO 13-09-2018 Which of the following options is an image and graphics solution available in MS Word 2016? (a) Drop Cap (b) Hard disk (c) Clipart (d) WordArt UPPCL JE 31-01-2019 (Batch-02) In MS Word, what is the function of Ctrl + Right Arrow Key? (a) Moves to next character (b) Moves to next page (c) Moves to next word (d) Moves to next paragraph UPPCL Stenographer Exam-18.02.2018 What is the second largest font size that can be selected using the 'font size' drop down list in MS-word 2016? (a) 96 (b) 48 (c) 72 (d) 36 UPPCL Stenographer Exam-18.02.2018 The maximum number of columns, that can be inserted in MS-word 2019 through 'Insert Table' operation is _______ . (a) 32 (b) 63 (c) 64 (d) 60 UPPCL Assistant Accountant 24/02/2022 Select the appropriate tool for data analysis from the following option: (a) MS Word (b) MS Access (c) MS Excel (d) MS PowerPoint UPPCL (Ste.) 28-08-2018 (Morning) Which of the following tabs is activated by default when Microsoft Excel 2016 is launched? (a) Data (b) Formula (c) Home (d) View UPPCL (TG-II) 24-01-2019 (EVENING) If you enter the formula "=SUM(A1:A4)" in cell A5, it would: A B 1 50 2 100 3 150 4 200 5 Total YCT 72. 73. 74. 75. 76. 77. 78. 79. (a) Throw an error message because text values cannot be added. Note that the numbers are left justified instead of right justified (b) Display the result, but will be of junk value as it adds the ASCII value instead of the numerical value (c) Display the average of all numbers from A1 to A4 (d) Display the correct sum of all numbers from A1 to A4 UPP Computer Operator 21-12-2018 (Batch-02) In Microsoft Excel, the basic function of _____ is to join two or more text strings together. (a) CONCATENATE (b) VLOOKUP (c) SUMIF (d) DSUM H.C. Ald. (ARO) Exam-2016 The file extension of Excel workbooks is: (a) .txt (b) .jpg (c) .zip (d) .xls UPPCL APS 27-09-2018 (Evening) An Excel workbook is a collection of: (a) worksheets (b) charts (c) workbooks (d) worksheets and charts UPPCL APS 27-09-2018 (Evening) What is the shortcut key to enable filtering of selected cells in MS-Excel? (a) Ctrl + Shift + L (b) Ctrl + F (c) Alt + Click + L (d) Shift + F UPPCL ARO-18.02.2018 CalC, Lotus 1-2-3, QuattroPro etc. are popular examples of ________. (a) Backup Utility (b) Spreadsheet Packages (c) Word Processing Software (d) DBMS UPPCL APS Exam-18.02.2018 The basic unit of excel spreadsheet where data entry is done is called: (a) Tab (b) Box (c) Cell (d) None of above MPPSC (Pre) G.S. Ist Paper, 2016 Microsoft Excel is part of the ______ suite of applications. (a) Microsoft Window (b) Open Office (c) Microsoft Office (d) Visual Basic UPPCL (TG-II) 24-01-2019 (EVENING) The column of a Microsoft Access table is known as a/an: (a) Inverted row (b) vertical cell (c) record (d) field UPPCL ARO 13-09-2018 Data Processing 80. 81. 82. 83. 84. 85. 86. 87. 88. 89. 46 Which of the following is a spreadsheet application program? (a) MS Word (b) MS Excel (c) MS Access (d) MS PowerPoint UPPCL RO/ARO-2014 The best application to express a large amount of detailed data would be: (a) Outlook (b) Excel (c) Word (d) PowerPoint UPPCL Asst. Accountant Exam-09.02.2018 Which of the following components of MSOffice is mainly used for accounting purpose? (a) MS-Word (b) MS-Visio (c) MS- Excel (d) MS- Access AHC RO-2016 Which of the following is not an archive format? (a) Tar (b) Zip (c) .xlsx (d) rar UPPCL ARO-18.02.2018 “.xlsx” is an extension for (a) Access (b) Excel (c) Word (d) PowerPoint UPPCL Asst. Accountant Exam-09.02.2018 Workbook, in a computer application, is basically related to (a) MS Excel (b) Adobe Reader (c) MS PowerPoint (d) MS Word RRB NTPC, (Shift -2) Online, 19.03.2016 A file created in Microsoft Excel is called a ____. (a) Grid (b) Database (c) Worksheet (d) Workbook UPPCL TG-II 25-01-2019 (Morning) Which programs are used to create amount based documents? (a) Word processing (b) Presentation (c) Spread sheet (d) Graphics SSC CHSL (10+2) 2012 Which of the following is invalid statement? (a) The width of a row and be specified manually or fit automatically (b) Sheet tabs can be colored (c) some picture can be applied as a background of a sheet (d) You can set the column width automatically fit the amount of text. RBI (Office Assi-2012) A Doughnut chart in Excel is similar to: (a) Bubble chart (b) Bar chart (c) Scatter chart (d) Pie chart UPPCL ARO-18.02.2018 YCT 90. 91. 92. 93. 94. 95. 96. 97. 98. Each spreadsheet file is called a workbook because _____ (a) It consists charts and graphs (b) It contains text and data (c) It can be modified (d) It consists of several sheets containing worksheet and charts sheets includes AHC RO/ARO-2014 What is the maximum number of worksheets available in Microsoft Excel? (a) No limit (restricted by the memory capacity) (b) 8 (c) 28 (d) 48 UPPCL ARO 13-09-2018 In a spreadsheet ____ columns are available. (a) 257 (b) 254 (c) 256 (d) 255 UPPCL Office Assistant III 24-10-2018 (Evening) Which types of software is like an accountant's worksheets (a) Word processing (b) Database (c) Spreadsheets (d) Graphics Ald. Bank (Clerk) 2009 In which of the following area is spreadsheet software more useful? (a) Psychology (b) Publication (c) Statistics (d) Message transmission S.S.C. CHSL (Tier-I) Exam 2011 Which of the following is a spreadsheet application program? (a) MS Word (b) MS Excel (c) MS Access (d) MS PowerPoint UPPCL TG2 Re-exam 16-10-2016 Microsoft Excel is a windows based _____ package. (a) spreadsheets (b) Paint (c) Style sheet (d) Presentation UPPCL Office Assistant III 24-10-2018 (Evening) In MS Excel, which of the following function is used to find the highest value within in a list? (a) Count (b) Proper (c) Max (d) Sum S.S.C. Combined Higher Secondary Level Exam (10+2), 2013 99. 100. 101. 102. 103. 104. 105. 106. 107. In MS Excel 2016, what is the result of the following formula? 108. =AVERAGE(10, 20, 30, 40, 50) (a) 30 (b) 150 (c) 50 (d) 10 UPPCL JE 2019 (Batch-01) Data Processing 47 When the following Microsoft excel function is entered in a cell, what will be the result? = AVERAGE (3, 12 > 16, 9) (a) 4 (b) 9 (c) 6 (d) 4.5 UPPCL TG-II 25-01-2019 (Evening) Which of the following can be created in Excel? (a) Line graphs and pie charts (b) Only line graphs (c) Bar charts, line graphs and pie charts (d) Bar charts and line graphs UPPCL TG-2 26.06.2016 What is the intersection of a row and a column in MS Excel called? (a) a filed (b) data (c) an equation (d) a cell UPP Computer Operator 21-12-2018 (Batch-02) An active cell has a thick border in Microsoft excel (Thicker than normal grid lines). It has a small solid box in the lower right corner. What is this box called? (a) Fill handle (b) Edit handle (c) Copy handle (d) File handle UPPCL (Ste.) 28-08-2018 (Morning) By default, how is text horizontally aligned inside a cell in Excel? (a) Left aligned (b) Center aligned (c) Right aligned (d) None of these UPPCL TG-2 26.06.2016 In Microsoft Excel 2013, a cell can contain a total number of _____ characters. (a) 32,767 (b) 16,384 (c) 409 (d) 255 UPPCL (Office Assistant III) 23-09-2018 "What-if Analysis" command is available under _______ section of menu bar in MSExcel 2007. (a) Review (b) View (c) Formulas (d) Data UPPCL APS Exam-18.02.2018 The best application to express a large amount of detailed data would be (a) Outlook (b) Excel (c) Word (d) PowerPoint UPPCL Accountant 10-02-2018 Making headings visible even while scrolling in Excel can be done by using (a) Freeze Pane (b) Paradox (c) Fixed Pane (d) Carousel UPPCL Accountant 10-02-2018 By default, numeric data is aligned to Microsoft. (a) Top (b) Left (c) Centre (d) Right UPPCL TG-II 25-01-2019 (Evening) YCT 109. In an absolute cell address, row numbers and column labels are preceded by……….symbol. (a) # (b) $ (c) % (d) & (AHC RO-2016) 110. Which of the following is used to move an active cell to the first column on the current row? (a) Home (b) Page down (c) Ctrl + Home (d) Page up RRB SSE (Shift-III), 03.09.2015 111. Which of the following statement about Microsoft Excel is incorrect? (a) Any worksheet can be renamed (b) The worksheet cannot contain both text and numbers (c) By default the number is right-aligned (d) By default, text data is aligned to the left. UPPCL (TG-II) 24-01-2019 (EVENING) 112. In Excel, you can select the entire row by pressing (a) Ctrl + Spacebar (b) F8 + arrow key (c) Shift + arrow key (d) Shift + Spacebar UPPCL TG2 Re-exam 16-10-2016 113. When a Microsoft application is opened, the default screen that appears is called (b) Document (a) Database (c) Table (d) Worksheet UPPCL TG-II 25-01-2019 (Evening) 114. What is the keyboard shortcut for creating a chart from the selected cell range in Excel? (a) F2 (b) F4 (c) F8 (d) F11 UPPCL TG-2 26.06.2016 115. To edit any text or formula in Microsoft Excel you have to select that cell and press ______. (a) F2 (b) F4 (c) F1 (d) Shift + F3 UPPCL (Ste.) 28-08-2018 (Morning) 116. What will be the effect of pressing the F2 key after selecting a cell in Microsoft Excel? (a) The contents of the cell will become bold. (b) The cell will switch to edit mode. (c) The background color of the cell will be changed. (d) The contents of the cell will be deleted. UPPCL (TG-II) 24-01-2019 (EVENING) 117. Microsoft PowerPoint is used to create _____ (a) Spread Sheet (b) Presentation (c) Web Pages (d) Browser (UPPCL TG2 11-11-2016) Data Processing 118. In PowerPoint, the dotted areas in an empty slide are called (a) Template (b) Placards (c) Placeholders (d) Themes UPPCL ARO-18.02.2018 119. State whether the following statements pertaining to PowerPoint 2013 are true or false. i) Translate option which translates selected text into different languages is NOT available in PowerPoint 2013. ii) Research option in 'proofing' group menu gives alternative word to selected word. iii) The Comments pane has three default buttons: Insert comment. Previous and Next (a) i) True, ii) True, iii) True (b) i) False, ii) True, iii) True (c) i) True, ii) True, iii) False (d) i) True, ii) False, iii) True UPPCL (Office Assistant III) 23-09-2018 120. What is the maximum number of slides that can be printed in one hand out? (a) 2 (b) 4 (c) 8 (d) 9 UPPCL (Ste.) 28-08-2018 (Morning) 121. To present slides in a presentation is called (a) Effect (b) Custom animation (c) Transition (d) Animation (Ald. Bank (Clerk)2011) 122. In Microsoft PowerPoint _____ view is useful in arranging the slides of the presentation. (a) Slide Sorter (b) Reading (c) Normal (d) Outline UPPCL (TG-II) 24-01-2019 (EVENING) 123. You can set to include _______ in every slide. (a) Date and time (b) All of these (c) Footer (d) Slide number UPPCL Accountant 10-02-2018 124. MS PowerPoint view that displays only text (headings and bullets). (a) Slide Sorter View (b) Slide Show (c) Notes Page View (d) Outline View UPPCL Office Assistant III 24-10-2018 (Mor.) 125. Which of the following view is good to use when you want to delete, copy, paste or move your slides? (a) Slide sorter (b) Notes page (c) Slide show (d) Normal (AHC RO-2016) 48 YCT 126. In order to check spelling of a text in MS– Power point, we press _________. (a) F7 (b) Alt + Shift + L (c) Alt + Click (d) Shift + F7 UPPCL ARO-18.02.2018 127. The shortcut to add new slide in Power point is (a) Ctrl + N (b) Ctrl + Z (c) Alt + N (d) Ctrl + M UPPCL ARO-18.02.2018 128. In PowerPoint 2013, which of the following menus contains the 'Record Slide Show' option? (a) Review (b) Slide show (c) Animation (d) Transition UPPCL (Office Assistant III) 23-09-2018 129. In 'Slide Show' menu of MS PowerPoint 2007, which 'Resolution' option is said to be the fastest? (a) 640 × 480 (b) 800 × 600 (c) 1366 × 768 (d) 1024 × 768 UPPCL-JE 31-01-2019 (Batch -01) 130. To start a slide show from the beginning one should press ____ and to start a slideshow from the current slide one should press _____. (a) F5; Shift + F5 (b) Shift + F4; F4 (c) F4; Shfit + F4 (d) Shift + F5; F5 UPPCL TG-II 25-01-2019 (Morning) 131. In power point, Themes could be found under– (a) Transitions tab (b) Design tab (c) Insert tab (d) Animation tab UPPCL ARO-18.02.2018 132. A Black Slide indicates: (a) User-action required (b) End of presentation (c) Error in slide (d) Slide to be loaded UPPCL Stenographer Exam-18.02.2018 133. Which of the following statement is wrong? 134. The special effects used to present a slides in a presentation are called? (a) layouts (b) custom animations (c) transitions (d) present animations 135. In PowerPoint, you can copy animation from one object to another by using the ______ (a) animation repeater (b) animation copier (c) animation selector (d) animation painter UPPCL Office Assistant III 24-10-2018 (Mor.) Which shortcut key is used to duplicate a slide? (a) Shift + D (b) Ctrl + D (c) Ctrl + N (d) Ctrl + S UPPCL Office Assistant III 24-10-2018 (Mor.) The extension of a PowerPoint template is: (a) potx (b) temp (c) pot (d) pptx UPPCL Stenographer Exam-18.02.2018 By default MS PowerPoint 2016 saves files with _____ extension. (a) .pptp (b) .pptx (c) .xppt (d) .ppt UPPCL (TG-II) 24-01-2019 (Morning) What is the default orientation of slides in a MS PowerPoint presentation? (a) Portrait (b) Vertical (c) Diagonal (d) Landscape UPPCL TG-II 25-01-2019 (Evening) To choose the screen resolution for slide show, command is available under ________ section of menu bar in MS-PowerPoint. (a) Animations (b) Insert (c) Design (d) Slide Show UPPCL APS Exam-18.02.2018 In Microsoft PowerPoint which of the following does not appear in the 'Clipboard' group of the 'Home' tab? (a) New slide (b) Format Painter (c) Paste (d) Copy UPPCL TG-II 25-01-2019 (Morning) Which PowerPoint feature allows the user to create a simple presentation without having to spend too much time on it ? (a) Auto Content Wizard (b) Animation (c) Colour schemes (d) Chart Wizard UPPCL TG2 Re-exam 16-10-2016 Orientation NOT supported by PowerPoint is:– (a) Landscape (b) Portrait (c) Canvas (d) None of these UPPCL Asst. Accountant Exam-09.02.2018 UPPCL Office Assistant III 24-10-2018 (Evening) 136. 137. 138. 139. 140. 141. (i) In Microsoft PowerPoint 2016, the slide 142. sorter option is placed under the 'Review Tab' (ii) In Microsoft PowerPoint 2016, to add music to your presentation, click the (a) (b) (c) (d) Insert tab → Media group → Audio Both (i) and (ii) Neither (i) and nor (ii) 143. Only (i) Only (ii) UPPCL (TG-II) 24-01-2019 (Morning) Data Processing 49 YCT 144. A PowerPoint presentation is a collection of _____ that can be used to create oral presentations. (a) documents (b) slides (c) worksheets (d) graphics (AHC RO-2016) 145. In MS PowerPoint, which of the following effect would you use for 'dotted appearance' of new slide through old slide in slide show? (a) Cover Left (b) Box Out (c) Dissolve (d) Cover Right UPPCL Office Assistant III 24-10-2018 (Evening) 146. The _____ in Microsoft PowerPoint 2016 lets you play a slide show in a PowerPoint windows without having to switch to full screen. (a) Reading View (b) Notes Page (c) Slide Master (d) Outline View UPPCL Office Assistant III 17-10-2018 (Morning) 147. In MS PowerPoint 2016, which of the following is not a valid slide layout. (a) Title and Content (b) Picture with caption (c) Blank with Title (d) Comparison UPPCL Office Assistant III 17-10-2018 (Morning) 148. What will happen if you press ESC key during PowerPoint slides how ? (a) End of slide show (b) Minimizes PowerPoint window (c) Displays first slide (d) Displays last slide UPP Computer Operator 21-12-2018 (Batch-01) 149. To automatically place the logo in the same position on each slide, enter it in the ______. (a) Presentation Master (b) Handout Master (c) Slide Master (d) Notes Master UPPCL Office Assistant III 24-10-2018 (Mor.) 150. ______ stores information about the current topic for a presentation the layout of placeholders bullet characters and other formats that affect all slides in a presentation. (a) Slide Painter (b) Slide Layer (c) Slide Bank (d) Slide Master UPPCL Office Assistant III 24-10-2018 (Mor.) 151. The object on the slide holding the text is called. (a) Object holder (b) Placeholder (c) Text holder (d) Image holder UPPCL Office Assistant III 24-10-2018 (Mor.) Data Processing 152. 153. 154. 155. 156. 157. 158. 159. 160. 161. 50 The PowerPoint status bar has a slide bar to increase/decrease the size of the slide. What is the range available in the Slide bar, in percentage? (a) 10 to 400 (b) 0 to 1000 (c) -100 to ±100 (d) 0 to 300 UPPCL ARO-15.09.2018 In MS PowerPoint what does motion path represent? (a) How is an object moving in a slide (b) How the slide is selected (c) How will the slide move (d) Animation between slides. UPPCL (Ste.) 28-08-2018 (Morning) In Microsoft PowerPoint, for the logo of an organisation to appear automatically in the same position in all the slides, you must insert it in the. (a) Slide Master (b) Notes Master (c) Chart Master (d) Handout Master UPPCL (Ste.) 28-08-2018 (Morning) Under which tab page setup appears? (a) Insert (b) Review (c) Design (d) None of above Which of the following view is not one of PowerPoint view? (a) Sorter view (b) Slide shown view (c) Slide view (d) Slide shorter view The save as dialog box can be used for? (a) saving the file for the first time (b) save the file by some alternative name (c) saving the file in a format other than word (d) All of the above What is the keyboard shortcut to go to the 'Home' tab in MS PowerPoint 2016? (a) Alt + H (b) Ctrl + M (c) Alt + M (d) Ctrl + H Which of the following gives you various options for saving, opening, printing and sharing your presentations in MS PowerPoint 2016? (a) Normal View (b) Slide Sorter View (c) Backstage View (d) Reading View In MS PowerPoint slides show, which of the following is NOT a valid option? (a) From the current slide (b) From the beginning (c) Reverse from the rear (d) Custom built Which option is not available to print presentation slides? (a) Handout Orientation (b) Slide Size (c) Slide Master (d) slide Per page YCT 162. Which of the following statements regarding 171. How many characters you can type in maximum while writing the field name? insertion of text in a slide is incorrect? (a) 60 (a) text can be inserted through the keyboard (b) 64 inside the text box (c) 68 (b) shapes such as squares, circles collect (d) Any number of character balloons and block arrows can contain text 172. In MS Access, how can we create relationship (c) The font size of the text in the text box can be between two tables in the GUI? changed (a) Drag the foreign key of a table into primary (d) A text box can contain text with only one key of another table. font size and font type. (b) Drag any field from parent table and drop on 163. By default, in which view does MS PowerPoint child table. (c) Drag the primary key of a table into foreign open a presentation slide? key of another table. (a) Slide Sorter (b) Slide Master (d) Any of these can be done to create (c) Notes Page (d) Normal relationship. 164. Which of the following statements are correct? 173. What is the shortcut key to switch between the I. the format painter feature is not supported field names and properties panels in table II. to apply a motion effect between exiting a design view? slide and entering another slide, the slide (a) F3 key (b) F4 transition feature can be used (c) F5 (d) F6 (a) I and II both (d) Only I 174. How can we remove a relationship defined between two tables? (c) Only II (d) Neither I nor II (a) From edit menu (by choosing delete 165. Which one of the following slide views can be relationship) used to view all slide in a single screen in MS (b) Select the relationship line and press delete PowerPoint? (c) Choose deletes option from relationship menu (a) Slide sorter view (b) Slide master view (d) Choose remove option from relationship (c) Normal view (d) Outline view menu. 166. Which option can be used set custom timings 175. Which of the following database object hold for slides in a presentation? data? (a) Forms (b) Reports (a) Slide show setup (b) Slider Timing (c) Queries (d) Tables (c) Rehearsal (d) Slider Timer 167. Which tab is not available on left panel when 176. Which option allows us to build a new table by entering data directly into a tabular grid? your open a presentation? (a) Datasheet view (b) Design view (a) Slides (b) Outline (c) Linked table (d) Grid view (c) Notes (d) All of the above 177. How can we create a query in Microsoft 168. What happens if you select first and second Access? slide and then click on new slide button on (a) Drag and drop fields toolbar? (b) Type the SWL (a) A new slide is inserted as second slide in (c) Use query wizard presentation (d) All of above (b) A new slide is inserted as first slide in 178. Which of the following is not a type of relationship that can be applied in Access presentation database? (c) A new slide is inserted as third slide in (a) One to one (b) One to many presentation (c) Many to many (d) All of above (d) None of above 179. The columns in a Microsoft Access table are 169. Microsoft Access is a? also called ............ ? (a) OODBMS (b) RDBMS (a) Rows (b) Records (c) ORDBMS (d) None of the above (c) Fields (d) Columns 170. The default format for newly created database 180. The upper part of the query design window in files in Microsoft Access-2010 is? MS Access has two parts shows .............? (a) .accdb (b) .odcbd (a) Fields name with relationships (c) .sq1db (d) All of the above (b) Fields name with field size Data Processing 51 YCT 181. 182. 183. 184. (c) Fields and Criteria (d) Sorting options. In the context of Microsoft Access, which of the following statement is true? (a) Reports are used to retrieve and calculate data from tables. (b) Queries can be printed and presented as the information. (c) Queries can include calculated fields that do not exist in table. (d) Reports and forms are similar but forms are use to print but reports to display on screen only. What does the show cheek box in query design window indicate? (a) It indicates whether the field is to be used or not. (b) It indicates whether the field is to be displayed in query result or not. (c) It indicates whether the field names to be displayed in query result or not. (d) It indicates whether the field is to be used for grouping result or not. Which field type will you select of you need to enter long text in that field? (a) Memo (b) Text (c) Currency (d) Hyperlink In which method we don't need to specify the field type and size while creating a new table? 185. 186. 187. 188. 189. (a) Design view (b) While using wizard (c) Create table by entering date (d) All of above Which of the following is not a type of MS Access database object? (a) Table (b) Form (c) Worksheets (d) Modules The complete information about an entity in a database is called(a) Field (b) Record (c) Information (d) All of the above In one-to-many relationship the table in 'one' side is called ................ and an 'many' side is called ............. (a) Parent, child (b) Child, parent (c) Row, column (d) None of the above In MS Access "Lookup Wizard" is used to? (a) to select value from another table (b) to select value from excel sheet (c) to select from previous values (d) none of the above The ............. is a wild card that represents one or more character. (a) Question mark (?) (b) Asterisk (*) (c) Exclamation mark (!) (d) Dollar sign ($) ANSWER KEY 1. (a) 2. (c) 3. (b) 4. (a) 5. (b) 6. (c) 7. (a) 8. (c) 9. (c) 10. (d) 11. (a) 12. (a) 13. (b) 14. (d) 15. (b) 16. (a) 17. (b) 18. (d) 19. (d) 20. (d) 21. (b) 22. (b) 23. (b) 24. (d) 25. (c) 26. (d) 27. (d) 28. (a) 29. (c) 30. (d) 31. (d) 32. (b) 33. (c) 34. (d) 35. (c) 36. (d) 37. (d) 38. (b) 39. (d) 40. (d) 41. (d) 42. (b) 43. (d) 44. (a) 45. (c) 46. (a) 47. (c) 48. (c) 49. (c) 50. (a) 51. (a) 52. (c) 53. (a) 54. (a) 55. (d) 56. (b) 57. (d) 58. (b) 59. (b) 60. (a) 61. (b) 62. (c) 63. (c) 64. (d) 65. (c) 66. (c) 67. (b) 68. (b) 69. (c) 70. (c) 71. (d) 72. (a) 73. (d) 74. (d) 75. (a) 76. (b) 77. (c) 78. (c) 79. (d) 80. (b) 81. (b) 82. (c) 83. (c) 84. (b) 85. (a) 86. (d) 87. (c) 88. (a) 89. (d) 90. (d) 91. (a) 92. (c) 93. (c) 94. (c) 95. (b) 96. (a) 97. (c) 98. (a) 99. (a) 100. (c) 101. (d) 102. (a) 103. (a) 104. (a) 105. (d) 106. (b) 107. (a) 108. (d) 109. (b) 110. (a) 111. (b) 112. (d) 113. (d) 114. (d) 115. (a) 116. (b) 117. (b) 118. (c) 119. (b) 120. (d) 121. (c) 122. (a) 123. (b) 124. (d) 125. (a) 126. (a) 127. (d) 128. (b) 129. (a) 130. (a) 131. (b) 132. (b) 133. (c) 134. (c) 135. (d) 136. (b) 137. (a) 138. (b) 139. (d) 140. (d) 141. (a) 151. (b) 142. (a) 152. (a) 143. (c) 153. (a) 144. (b) 154. (a) 145. (c) 155. (c) 146. (a) 156. (d) 147. (c) 157. (d) 148. (a) 158. (a) 149. (c) 159. (c) 150. (d) 160. (c) 161. (c) 162. (d) 163. (d) 164. (c) 165. (a) 166. (c) 167. (c) 168. (c) 169.(b) 170. (a) 171. (b) 172. (c) 173. (d) 174. (b) 175. (d) 176. (a) 177. (d) 178. (d) 179. (c) 180. (a) 181. (c) 182. (b) 183. (a) 184. (c) 185. (c) 186. (b) 187. (a) 188. (a) 189. (b) Data Processing 52 YCT 03. PROGRAMMING FUNDAMENTALS Introduction to C . (ii) Global Variable– It is defined outside the function or block. Following example illustrates the declaration of global variable. int value = 5; // global variable void fun() { int a = 10; // local variable } 1.4 Data type in C It specifies the type of data that a variable may have to store. For example → the type of data can be integer, float, double, char etc. • C is a computer programming language and it is easy to learn and also called as compiled language. • It is a procedural programming language which was initially developed by Dennis Ritchie in the year 1972. • It is considered to be the base for other programming languages therefore, it is also called as mother of all programming language. • The knowledge of C language helps a lot in learning other programming languages such as C++, OOPs Java, Python etc. • Most of the compilers such as JVMs, Kernels etc are written in C language and programming languages such as C++, Java, C# etc follow the syntax of C language. • It provides core concepts of array, functions, strings, (i) Basic: It is based on integer or floating point and the file handing as well. memory size of basic data types can be changed 32 to 64 bit as per operating system. 1.1 Features of CIt consists of int, char, floar, double etc. (ii) Derived: Data types that are derived from fundamental data types is called as derived types. For example- arrays, pointers, structures, functions union etc. (iii) Enumeration: It is a user defined data type in C that is mainly used to assign names to integral constants; the names make a program easy to read and maintain. For example- enum weak day; (iv) Void data type: Void is an empty data type that has 1. 2 Variable declaration in C no value. It is a name of memory location and used to store data. • We use void data type in functions when we do not syntaxwant to return any value to the calling function. For Type variable_ list; exampleFor example– void sum (int x, int y); int x; , double a; • The above function will not return any value to the here x, a are variables and int, double are data type. calling function. Note– we can also provide value during the declaration • If we use int in place of void, then the function will of variables. return value to the calling function. For example int sum (int x, int y); For example– int x = 5; 1.5 Printf() function double a = 3.8; It is used for output and prints the given statement to the char b = 'T'; console. 1.3 Types of variables: There are various types of Syntax– variable in C. printf("format string", arg_list); (i) Local variable: It is declared inside the function or Note:- format string can be block. %d → integer Syntax– %c → character void fun(){ %s → string int a = 10; //local variable declaration %f → float } Programming Fundamentals 53 YCT 1.6 Scanf() function- It is used for input and reads the #include<stdio.h> input data from the console. int main() syntax– { scanf("format string", arg_list); /*Data for print 1.7 Keywords in C language MLC*/ • Keywords are predefined, reserved words used in printf("welcome to Yct"); programming which have special meanings to the return(0); compiler. } • These are part of syntax and they can not be used as Output– an identifier. There are total 32 reserved keywords welcome to yct which are1.10 Operators in C language auto continue case char In programming language, an operator is a symbol which is used to perform operations. const break default extern There are many types of operators in Cdouble else enum do (i) Arithmetic operatorfloat for goto if It performs mathematical operations such as addition, int long register return subtraction, multiplication, division etc. short signed sizeof static Operator Meaning struct unsigned switch void typedef volatile union while 1.8 C Identifiers: • Identifier refers to name given to entities such as variables, functions, structures etc. • They must be unique and are created to provide a unique name to an entity to indentify it during the execution of the program. Example– int yct; Here, yct refers to identifier. Note:- Identifier name must be different from keywords. 1.9 Types of comments in C languageThere are two types of comments(i) Single-line commentIt starts with double slash (//) and ends in the same line. For example #include<stdio.h> int main() { // define integer var int age = 10; // print the age var printf("Age: % d", age); return(0); } Output: Age: 10 (ii) Multi-line comments: • They are shown by slash asterisk such as /*.................*/ • In this type of comment, the C compiler ignores everything from /* to */. for example Programming Fundamentals + additon / unary plus − subtraction / unary minus * / multiplication division remainder after division % (ii) Relational operators • These are the operators used to create a relationship and compare the values of two operands. • It checks the relationship between two operands. If the relation is true, it returns 1, If the relation is false, it returns value 0. • These are used in decision making and loops statements. (iii) Equal to (= = ) • It is used to compare both operands and return 1 if both are equal or same. If both are not equal or same, then it return 0. Syntax– operand 1 = operand 2; 5 = = 4 → returns 0 because they are not equal or same. 3 = = 3 → return 1 because they are same or equal. (iv)Not equal to (!=) It compares both operands and returns 1 if both operands are not the same, otherwise it will return 0. Syntax– operand 1! = operand 2; For example– 5! = 3 Here, both operands 5 & 3 are not equal, therefore it returns 1. (v) Greater than (>) • It checks the value of the left operand is greater than the right operand. • If the condition is true, then it said to be greater than operator. 54 YCT (iii) NOT (!)- It is used to reverse the logical state of its operand if a condition is true, then logical NOT operate will make it false. Example– For example– 5 > 3 → It returns 1 as the condition is true. !(a & b) → true. 4 > 5 → It returns 0 as the condition is false. 1. 13 Bitwise operator– (vi) Less than (<)– • It is used to perform bit-level operations. It checks whether the value of the left operand is less • It consists of two digits either 0 or 1 and it is mainly than the right operand. used in numerical computations to make the Syntax– calculations faster. a < b; Operators Meaning Example– Bitwise AND & 3 < 4; → it returns 1 as the condition is true. Bitwise OR | 5 < 3; → it returns 0 as the condition is false. Bitwise exclusive OR ∧ (vii)Greater than or equal to (> =) Bitwise complement • It checks whether the left operand's value is greater ~ than or equal to the right operand. Shift + left << Syntax– Shift + right >> x > = y; 1.14 Header file in C: Example– • It contains the set of predefined standard library 5 > = 3; It returns 1 because the condition is true. functions. (viii)Less than equal to• The "#include" preprocessing directive is used to include the header files with '.h' extension in the It checks whether the value of left operand is less than or program. equal to the right operand. There are some header files in C language which areSyntax– stdio.h → used for input/output functions. x < = y; conio.h → used for console I/O functions. Example – stdlib.h → it is used for general utility functions. 4 < = 5; math.h → used for mathematics functions. 1.11 Assignment operator It is used to assign a value to a variable. The most float.h → it limits the float types. 1.15 Flowchart in C language– common assignment operator is (=). • A Flowchart is a diagrammatic representation of an Operator Example Meaning algorithm. x=y x=y = • It helps in writing programs and explaining the x+ = y x =x+y program to others as well. += Symbols used in flowchartx− = y x =x−y −= Flow line- It indicates the flow of logic by connecting x* = y x = x*y *= symbols. x/ = y x = x/y /= Symbol– x% = y x = x%y %= Terminal (stop/start) 1.12 Logical operators in C language It shows the start and the end of a Flow chart. • It is commonly used in decision making. Symbol• It allows the usage of three logical operators, namely, 'AND' (&&), 'OR'(||), 'NOT' (!). (i) AND (&&)- In logical AND, if both the operands are non-zero, then condition becomes true. Input/output- It is used for input and output operation. For example– Symbol(a&&b) → false (ii) OR(||)- In logical OR, if any of the two operands is non-zero, then the condition becomes true. For example– Processing- It is used for arithmetic operations and data(a||b) true. manipulations. Syntax– a > b; Programming Fundamentals 55 YCT Symbol- Decision– It is used for decision making between two or more alternatives. Symbol– Following example illustrates programming language. the flowchart in 1.16 Literal in C– Literals are data which is used for representing fixed values and they can be used directly in the code. For example- 2, 6.3, 'd' etc. It can be of many typesInteger- it can be a numeric literal (integer only). For example'2', '4' etc. Floating-point literals- It is also a numeric literal that has either a fractional form or a exponent form. For example'6.3' Characters- It is written by enclosing a single character inside single quotation marks. For example– 'A', 't' etc. 1.17 Tokens in C• In C programming, each word and punctuation is called as token. • They are the smallest building block or smallest unit of C program. They can be classified as• Keywords, identifiers, constants, string special symbols and operators etc. Programming Fundamentals 1.18 File Handling in C A file is a container in computer storage devices which is used for storing output or information permanently in the form of a sequence of bytes on the disk. There are various functions in the C libraryfopen() → used for opening new or existing file fprint() → Iterates data from the file fscanf() → It reads data from the file fputc() → It reads character from file fclose() → choose the file. fgetc() → It reads a character from file. fseek() → It sets the file pointer to given position. fputs() → It is a function declared in stdio.h header file and used for writing the contents of file. fgets() → It terminates at the newline character but appends it at the end of string. str. The function can also append the terminating null character at the end of the passed string. 1.19 Control statement in C It is called as sequential control flow, there are many types of central statements in CIf statement • If statement enables the programmer to choose a set of instructions based on a condition. • When the condition is evaluated as a true, then a set of instructions are executed and a different set of instructions get executed if the condition is false. Syntax– if (statement) { code ≡ } If-else statement - If the condition is true then the first expression will execute if the condition is false then else part of statement will be executed. Syntax– if (exp) { code } else { code } Switch statement: A switch case statement is used when we have multiple options and we need to perform a different task for each option. syntax– switch (exp) { case constant: // statement; case constant: // statements; default: // statements; } 56 YCT Break statement in C– • It is used to bring the program control out of the loop. • It can be used either inside loops or switch statement. syntax– break; Working of break statement While (Test exp) { // codes if (condition to break){ break; } //codes } 1.20 Looping statement in C It executes the sequence of statement many times until the given condition becomes false. A loop in C statement consists of two partsbody of loop and control statement Types of loops It can be classified into two categories(a) Entry controlled loop→ Here the condition is checked before executing the body of a loop. It is also known as pre-checking loop. (b) Exit controlled loop→ Here,the condition is checked after executing the body of a loop. It is also called as a post-checking loop. Infinite loop- The loop that does not stop executing and processes the statements number of times is called as an infinite loop. It is also called as an "Endlessloop". There are three types of loops in C programmingFor loop • It is used in the case where we need to execute some part of the code until the given condition is satisfied. • It is also known as pre-tested loop. Syntax– for (initialization; condition test; increment or decrement) { //codes to be executed } While loop • It is also called as pre-tested loop. • It allows a part of the code to be executed multiple times depending upon the given condition. • It is basically used in case where the number of iterations is not clear in advance. Syntax– While (Condition) { // codes } Programming Fundamentals Do while loop • It is a post tested loop. • It is mainly used in case where we need to execute the loop at least once. • It is also similar to while loop with one exception that it executes the statements inside the body of do-while before checking the condition. Syntax– do { // codes } while (condition); 1.21 Type casting in C It refers to changing a variable of one data type into another. There are two types of type casting. i) implicit type conversion ii) explicit type conversion Implicit type conversionWhen the type conversion is done automatically by the compiler without programmers intervention then it is called as implicit type conversion or type promotion. For exampleint a = 5; float x = 15.5, y; y = x/a; Explicit type castingIt is performed by the programmer by posing the data type of the expression of specific type which is called as explicit type conversion. Syntax– (data type) exp; Here, expression can be any constant or variable etc. while data type will be any valid C data type. for example int a = 10, b = 3; float c; C = (float)a/(float)b; /* here the value of z would be 3.33% */ 1. 22 Function in C • A function is a block of code that performs a specific task. • We can pass data that is called as parameters, into a function. • Functions are used to perform some actions and they are important for reusing code. • We can define code once and use it many times. There are three aspects of C function. (i) Function declaration A function is declared globally in a C program to tell the compiler about function name, function parameters and return type. 57 YCT Syntax– return _ type fun _ name(arg list); (ii) Function call• It can be called from anywhere in the program. • The argument list should not be different in function calling and function declaration. • We have to pass the same number of functions as it is declared in the function declaration. Syntax– func _ Name (argument _ list) (iii) Function definition• Function definition contains the actual statements which are to be executed. • It is the most important aspect to which control comes when the function is called. Syntax– return _ typef _ name (argument _ list) { function body ≡ } A function can be invoked in two ways. • call by value or • call by reference Call by value– In call by value, values of actual parameters are copied to function's formal parameters while the parameters received by function are called parameters. For example /*C program to illustrate call by value */ #include<stdio.h> #include<conio.h> void swap (int x, int y) { int temp; temp = x; x = y; y= temp; } void main(){ int x = 50, y 100; clrscr(); swap (x, y); /*passing value to function */ printf ("\n value of x is: %d", x); printf ("\n value of y is: %d", y); getch(); } O/P → value of x is :100 value of y is : 50 Programming Fundamentals Call by reference Here, original value is changed or modified because we pass address (reference). Address of value is passed in the function, therefore actual and formal arguments shares the same address space. Hence, any value changed inside the function is get reflected in both places inside and outside the function. //C program to illustrate call by reference #include<stdio.h> #include<conio.h> void swap (int*p, int*q) { int temp; temp = *p; *p = *q; *q = temp; } void main(){ int p = 500, q = 200; clrscr(); // passing value to function swap (& p, & q); printf ("\n value of p: %d, p); printf ("\n value of q: %d, q); getch(); } O/P value of p = 200 value of q = 500 1.23 Recursion in C Recursion is the process in which a function calls itself up to n-number of times. A recursive function call itself directly or indirectly in the same program. Syntaxvoid rec() { rec(); /* Recursive function calls } itself inside the same function */ int main() { rec(); //function calling } In the above syntax, the main function calls the recursion function only once. But, thereafter recursion function calls itself till the defined condition and it calls the same function n-number of time-and so on. 1.24 Array in C • An array is a variable that can store multiple values. • It is a collection of similar data items stored at contiguous memory location. Elements can be accessed randomly using indices of an array. 58 YCT syntax– Data type array _ Name[size of array]; following is the memory representation of a string isLet the word be yct. examplefloat mark [5]; Initialization of an array in C I) It is initialized at declaration time such asint age [4] = {15, 14, 20, 21}; II) Pictorial representation of array- Note– '\0' shows null character used to indicate the termination of string which differs strings from normal character arrays. C string functions There are many string functions defined in "string.h" library. 1D Array- It contains single row and multiple columns. Strlen() → It returns the length of string name. It is a simple collection of elements. 2D Array- It contains multiple row and multiple Strcpy()→ It copies the contents of source string to destination string. columns and it is collection of 1D array. Strcmp() → It is used for comparing the first string with Syntax- datatype array name [x][y]; second string. If both strings are same then it returns. Multidimensional array It is an array of arrays and data in multidimensional Strrev() → It reverse strings. Strupr() → It returns string characters in uppercase. arrays are stored in tabular form. Strwr() → It returns string characters in lowercase. Syntax– data type arr_name [size 1 ][size 2] ---[size N]; Introduction to C++ . Note:- the total number of elements that can be stored in a multidimensional array is calculated by multiplying the • C++ is an object-oriented programming language and it is an extension of C programming language. size of all the dimensions. • It is case-sensitive, general purpose programming For examplelanguage that supports object-oriented, procedural and The arraygeneric programming. int a[10][30] can store total 10×30 = 300 elements. • It encapsulates both high and low level language Similarly, array a[5][5][10] can store total [5×5×10] = features as well. 250 elements. History of C++ 1.25 Pointer in C • C++ was developed by Bjarne Stroustrup at Bell • They are special variables that are used to store Laboratories over a period starting in 1979. addresses rather than values. • Pointers variable can be to type int, char array, • Since C++ is an attempt to add object-oriented features to C, therefore, earlier it was called as "C function etc. with objects." And in 1983, Bjarne stroustrup named • It is declared by using * (asterisk symbol). it as C++. For example int*p; • C++ was made available outside Bell Laboratories in Null Pointer the year 1985. It is pointer that does not point to any memory location. • The first commercial C++ compiler, C front was It stores the base address of the segment. The null pointer released in 1985. stores the null value while void is the type of a pointer. Features of C++ For exampleint * ptr = (int*)0; OR int * ptr = NULL; Void Pointer It is a generic pointer that points to any data type. for example→ void*pointer_name; Note-Malloc() and Calloc() function return the void pointer therefore, these functions are used to allocate the memory of any data type. String in C They are defined as an array of characters and it is Advantages of C++ terminated with a special character '\0'. • It has compiler support and debuggers Syntax– • C++ has a large selection of literature. Char string_name [size]; Programming Fundamentals 59 YCT • In C++, one class can have more than one base class, that is referred to as polymorphism. • Encapsulation, polymorphism, abstraction are the important properties of C++ language. • It is easy to maintain and modify existing code as new objects with small difference to existing ones. Disadvantages of C++ • Use of pointers • Security issues • Absence of garbage collector • Absence of Built-in threads • Efficiency of program in decreased • Code redundancy • When C++ is used for web applications then it is difficult to debug Difference between C & C++ C C++ structured programming object oriented language programming language it does not support an it supports inline function inline function middle level language high level language it uses scanf() and printf() it uses cin>> and cout<< function for standard for standard input & input & output output. it is saved with .c it is saved with .cpp extensions extension Variable in C++ It is a name of memory location and used for storing data. Syntaxtype variable_list; For exampleint a; float b; char c; Here a, b, c are variables and int, float and char shows data type. Data types in C++ Data type in C++ in nothing but the type of data that a variable stores such as integer, float and character etc. There are four types of data types in C++ Basic Data type– It contains int, char, float double etc. the memory size of data types can be changed as per 32 or 64 bit operating system. Derived Data type- It contains array, pointer etc. Enumeration Data type- It contains enum data type. User defined Data type- It contains structure data type. Keywords in C++ It is reserved word and cannot be used as a variable name or constant name etc. Programming Fundamentals 32 Keywords in C++ auto break case char const double else enum extern float int long register return short struct switch typedef union unsigned continue default do for go to if signed size of static void while volatile Identifier in C++ • Identifiers are the basic requirement of any language and they are used to refer the name of variables, functions, arrays or other user-defined data types. • Identifiers must start with letter or underscore (_) symbol. The rest of the characters should be letters, digits or underscores. For exampleX, X1, X_1, _ abc, are valid identifiers. • Name cannot start with digit, uppercase & lowercase letters are distinct. • Keywords cannot be used as a variable name. Functions in C++ A function provides modularity and code reusability and it is also called as procedure or sub routine and it can be called number of times in a program. Advantages of function Code reusability- After creating functions, we can call it many times and don't need to write the same code again. & again. Code optimizationWe don't require to write much code and it makes the code optimized. Types of functionThere are two types of functionsLibrary function- they are defined in C++ header files for exampleceil(x), cos(x), exp(x) etc. User defined function– These functions are written by any programmer therefore they can use it multiple times. It minimizes the complexity of a big program and optimizes the code. Syntax of function return-type fun_name (data_type parameter------) { code ≡ } Recursion in C++ Calling function within the same function is called as recursion in C++ and the function that calls the same function is called as recursive function. Syntax- 60 recursion fun() { recursion fun (); /*function call* / } YCT string FN = "Ankur"; Pointer in C++ string LN = "Mahazan"; • It refers to a variable that holds the address of another variable. string Full_Name = FN + LN; • In C++, it provides the & (reference) operator that cout << "Full Name; returns the address that a variable occupies. return0; For example- If a is variable then & a returns the address } of a variable. Output– SyntaxAnkur Mahazan Datatype * variable _ Name; Note- we can also concatenate string with the append() function. For exampleint * a; Note- & (reference operator) returns the variable's For example– address while * (deference operator) gets the value that int main() has been stored in a memory location. { Advantages of pointer– string FN = "Ankur"; • Reduce codes and improves the performance string LN = "Mahazan"; • Used for retrieving strings, trees string Full_Name = FN.append (LN); • Used with function, structures and array cout<< Full_Name; • Helps in accessing any memory location return0; • Searching or sorting large size data is much easier. } Disadvantage of Pointers– string length() • If a pointer goes wrong then it becomes very difficult It is used to get the length of a string for that length() to find the bug in the program. function is used. • If it contains a wrong value then it can lead to the For example– disaster of great magnitude when used. int main(){ Strings in C++ string text = "iamstudentofMSCITin Strings are used for storing text and it contains the universityofMumbai"; collection of characters surrounded by double quotes. cout<< "The length of the text is:" << text. For examplelength(); string greet = "wc to yct"; return0; Note- for using string, an additional header file in the } source code is required in <string> library. Output– For exampleThe length of the text is: 37. #include<iostream> Structure in C++ #include<string> • It is a collection of different data types and similar to using name space std; the class that holds different types of data. int main() • They are used to create the instance of a class. { string greeting = "wc to yct"; Syntaxcout << greet; struct structure_Name return0; { } // code Output– } wc to YCT Linker– It is a computer utility program that takes one String concatenation– or more object files generated by a compiler and it (+) operator is used between strings to add them together combines multiple object code and links them with to make a new string and this process is known as libraries. concatenation. Loader– It is a part of operating system which is For exampleresponsible for loading programs to memory. It prepares #include<iostream> executable file for running. #include<string> Compiler– It is software that transforms computer code using namespace std, written in one programming language into another int main() programming language. It transforms the source code { into object code. Programming Fundamentals 61 YCT Assembler– It is a language processor that converts an assembly language program into a machine language program. Low-level language– It is a programming language that deals with a computer's hardware components and constraints. It is also called as computer's native language. The languages that come under this category are machine level language and assembly language. High level language– A high level language is a programming language such as C, FORTRAN, or Pascal that enables a programmer to write programs that are more or less independent. They are considered to be high level because of closeness to human language and further more machine language. examples of high-level-language are python, C, Fortran, Java etc. Java Simple– Java is very easy to learn, and its syntax is simple, and easy to understand. Object-oriented– Java is an object-oriented programming language and everything in Java is an object. Platform Independent: ● Java is platform independent and it is a write once, run anywhere language. ● It has two components:(i) Runtime Environment and (ii) API(Application Programming Interface). Java code can be executed on multiple platforms, for example, Windows, Linux etc. Following diagram illustrates Java being a platform independent language clearly. . • Java is a high level, robust, object-oriented and secure programming language. • It is a programming language and a platform. What is a platform? Any hardware or software environment in which a program runs, is called as a platform. Since Java has a runtime environment (JRE) and API that is why it is called a platform. History of JAVA • Java was developed in the year 1995 by James Gosling, who is called as the father of Java. James Gosling and his team members started the project in the early '90s. • Oak was the initial name of Java given by James Gosling and his team. • JDK 1.0 was released on January 23, 1996 and in 1995, Time magazine called Java one of the Ten Best Products of 1995. • It is owned by Oracle, and more than 3 billion devices run Java. • The latest version of Java (Java SE 18 ) is going to be released by March 2022. Features of Java Followings are the features of Java and its features are also called as java buzzwords: Programming Fundamentals Secured– Java is secured because it has no explicit pointer and Java Programs run inside a virtual machine sandbox. Java is best known for its security. Robust– • Java is robust as it is capable of handling run-time errors, supports automatic garbage collection and exception handling, and avoids explicit pointer concept. • It helps in eliminating errors as it checks the code during both compile and runtime. Architectural Neutral– • It is based on the ‘Write-once-run-anywhere’ (WORA) or ‘Write-once-run-everywhere’ (WORE) approach. • Byte-code is not dependent on any machine architecture and Java Virtual Machine (JVM) can easily translate bytecode into a machine-specific code. Portable– Java is “portable” and it refers to the SE (Standard Edition) version. The portability actually comes from architecture-neutrality. High-performance– Java provides high performance with the use of “JIT– Just In Time compiler”, in which the compiler compiles the code on demand basis, that is, it compiles only that method which is being called and this saves time and makes it more efficient. 62 YCT Distributed– This feature in Java provides the advantage of distributed programming, which is very helpful when we develop large projects. Java helps us to achieve this by providing the concept of RMI (Remote Method Invocation) and EJB (Enterprise JavaBeans). Multi-threaded– • Multithreaded means handling multiple tasks simultaneously or executing multiple portions (functions) of the same program in parallel. • The code of java is divided into smaller parts and Java executes them in a sequential and timely manner. Dynamic– ● Java provides the facility of dynamically linking new class libraries, methods, and objects. It is highly dynamic as it can adapt to its evolving environment. ● Java even supports functions written in other languages such as C and C++ to be written in Java programs. These functions are called “native methods” and these methods are dynamically linked at runtime. Disadvantages of Java– Java language has also some drawbacks which are as follows: 1. Java is slow and has a poor performance. 2. Java provides not so attractive look and feel of the GUI. 3. Java provides no backup facility. 4. Java requires significant memory space. 5. Verbose and Complex codes. Java Variables– In Java,variables are containers for storing data values. Syntax– Type variable_Name = value; For example– int data= 100; Yere, data is a variable name. There are three types of variables in Java™ 1. Local Variable– A variable declared inside the body of the method is known as local variable. 2. Instance Variable– A variable declared inside the class but outside the body of the method, is called an instance variable. 3. Static variable– A variable that is declared as static is called a static variable. Data types in Java– Data types define the different sizes and values which can be stored in the variable. There are two types of data types in Java programming language: Primitive data types– The primitive data types include Boolean, char, byte, short, int, long, float and double. Non-primitive data types– The non-primitive data types include Classes, Interfaces, and Arrays. Programming Fundamentals Following diagram shows the data types in java: Keywords in Java– Java has a set of keywords that are reserved words that cannot be used as variables, methods, classes, or any other identifiers. Following are some keywords given below. Abstract– it is used to declare an abstract class. Boolean– it is used to declare a variable as a Boolean type and It can hold true and false values only. For example– public class Boolean { public static void main(String[] args) { int n1=10; int n2=20; boolean t1=true; boolean t2=false; if(n1<n2) { System.out.println(t1); } else { System.out.println(t2); } } } Output– true Break– it is used to break the loop or switch statement. It breaks the current flow of the program at specified conditions. For examplepublic class Break { 63 YCT public static void main(String[] args) { for(int i=1;i<=10;i++){ if(i==7){ break; } System.out.println(i); } } } Catch– Java catch keyword is used to catch the exceptions generated by try statements. It must be used after the try block only. Class– it is used to declare a class. For examplepublic class Class { public static void main(String[] args) { System.out.println("welcome to yct"); } } Default– It is used to specify the default block of code in a switch statement. Extends– It is used to indicate that a class is derived from another class or interface. Import– Java import keyword makes classes and interfaces available and accessible to the current source code. Package– Java package keyword is used to declare a Java package that includes the classes. Static– it is used to indicate that a variable or method is a class method. The static keyword in Java is mainly used for memory management. This– this keyword can be used to refer the current object in a method or constructor. Throw– it is used to explicitly throw an exception. The throw keyword is mainly used to throw custom exceptions. It is followed by an instance. Throws– The Java throws keyword is used to declare an exception. Checked exceptions can be propagated with throws. Volatile– it is used to indicate that a variable may change asynchronously. Some parameters used in Java program: Class– It is used to declare a class in Java. Public– It is an access modifier that represents visibility. It is used for classes, attributes, methods and constructors, making them accessible by any other class. Static– It is used in memory management and static are applied with variables, methods, blocks and nested class. Void– it is return type of method and void doesn't return value. Main– it shows the starting point of the program. String[] args or String args[]– It is used for command line arguments. System.out.println()– it is used to print an argument that is passed to it. Programming Fundamentals Packages in Java– Package in Java is a method to encapsulate a group of classes, sub packages and interfaces. These packages help to reserve the class namespace and create a maintainable code. The keyword package is used to create a package in java. Packages in Java are of two types: Built-in Packages and User-defined packages Built-in Packages– Built-in packages(or predefined packages) consist of a large number of classes and they are existing java packages that come along with the JDK. For example, java.lang, java.util, java.io, etc. There are some core packages in Java are: Java.lang– Java.lang is a package which contains the classes like System, String, String Buffer etc. This package does not have to be explicitly imported as they are imported by default. Java.io– It provides a set of Input/Output streams that are used to read and write data to files. A stream represents a flow of data from one place to another place. Java util– Here, util stands for utility and It contains a collection of useful utility classes and related interfaces that implement data structures such as LinkedList, Dictionary, HashTable, stack, vector, Calender, data utility, etc. Java.net– In java.net, net stands for network and It contains networking classes and interfaces for networking operations. The programming related to client-server is done by using this package. Java.applet– It is used for creating applets and they are programs that are executed from the server into the client machine on a network. Java.awt– awt stands for abstract window toolkit and these packages contain the GUI elements such as buttons, lists, menus, and text areas. Java.sql– This package is used in a Java program to connect databases such as Oracle or Sybase and retrieve the data from them. User-defined Package– They are defined by the users therefore, it is called as user- defined packages and It contains user-defined classes and following is the general form to create userdefined packages. package package_ name; Here, package_name is the name of package and the package statement must be the first line in a java source code file followed by one or more classes. For examplepackage myPackage; public class A { ……… ……… ……... } 64 YCT The following diagram explains the CLR: Advantage of using packages in Java– Name conflict– Packages help to resolve the naming conflict between the two classes with the same name. Reusability– We can place the common code in a common folder so that everybody can check that folder and use it whenever needed. Access Protection– A package provides access protection and it can be used to provide visibility control. Organized– It also helps in organizing the files within our project. Maintenance– Java packages are used for proper maintenance. .Net . .Net framework • .Net is a framework which was designed and developed by Microsoft and it is a framework to develop software applications. • It is a software development framework for building and running applications on Windows. • The software programs written in .NET are executed in CLR (Common Language Runtime). • The .Net Framework supports programming languages such as C#, F#, VB.NET, J#, VC++, JScript.NET, APL, COBOL, Perl, Oberon, ML, Pascal, Eiffel, Smalltalk, Python, etc. Components of .Net framework– 1. Common Language Runtime (CLR) • .Net Framework provides a runtime environment called Common Language Runtime (CLR). • It provides an environment to run all the .Net Programs. The code which runs under the CLR is called as Managed Code. Programmers need not to worry on managing the memory if the programs are running under the CLR because it provides memory management and thread management as well. ● Programmatically, when our program needs memory, CLR allocates the memory for scope and de-allocates the memory if the scope is completed. ● Programmatically, when our program requires memory then CLR allocates the memory for scope and de-allocates the memory if the scope is completed. ● Language Compilers ( for example C#, VB.Net, J#) will convert the Code to Microsoft Intermediate Language (MSIL) intern this will be converted to Native Code by CLR. Programming Fundamentals 2. .Net Framework Class Library (FCL) • It is a standard library that is a collection of thousands of classes and used to build an application. The BCL (Base Class Library) is the core of the FCL and provides basic functionalities. • In short, developers just need to import the BCL in their language code and use its predefined methods and properties to implement common and complex functions like reading and writing to file, graphic rendering, database interaction, and XML document manipulation. 3. Common Type System (CTS)– • The Common Type System (CTS) is a standard for defining and using data types in the .NETframework. • CTS defines a collection of data types, which are used and managed by the run time to facilitate cross-language integration. 4. Common Language Specification (CLS) • The Common Language Specification (CLS) is a fundamental set of language features supported by the Common Language Runtime (CLR) of the .NET Framework. • It is a part of the specifications of the .NET Framework and was designed to support language constructs commonly used by developers and to produce verifiable code, which allows all CLScompliant languages to ensure the type safety of code. • CLS includes features common to many objectoriented programming languages. It forms a subset of the functionality of common type system (CTS) and has more rules than defined in CTS. C# – C# is pronounced as "C-Sharp". It is an object-oriented programming language provided by Microsoft that runs on .Net Framework. History of C# • The development of the dot net Framework began about two decades ago in the mid-90s with the premise being very different from what it is now. 65 YCT • The idea was built around the concept of a code that is named “managed code.” It was supposed to be the kind of code that developers would be able to execute while it is under a runtime environment. • This was essential because of how previous coding processes and platforms were inefficient in providing more flexible and secure experiences. • By building the .NET Framework, those issues are addressed, along with active memory management. It also dealt with more minor problems involved when working with C and C++. • C# was developed in the year 2002 and was introduced with .Net framework 1.0 • Anders Hejlsberg is known as the founder of C# language. Features of C# Simple • In C# pointers are missing in C#. • Unsafe operations such as direct memory manipulation are not allowed. • In C# there is no usage of "::" or "->" operators. • Since it's on .NET, it inherits the features of automatic memory management and garbage collection. • Varying ranges of the primitive types like Integer, Floats, etc. • Integer values of 0 and 1 are no longer accepted as Boolean values. Boolean values are pure true or false values in C# so no more errors of "="operator and "=="operator. • "==" is used for comparison operation and "=" is used for assignment operation. Modern– C# programming is based upon the current trend and it is very powerful and simple for building scalable, interoperable and robust applications. Object-oriented– C# is object oriented programming language and it is a simple, modern, object oriented language derived from C++ and Java.C# supports Data Encapsulation, inheritance, polymorphism, interfaces. Type safe– • In C# we cannot perform unsafe casts like convert double to a Boolean. • Value types (primitive types) are initialized to zeros and reference types (objects and classes) are initialized to null by the compiler automatically. • Arrays are zero base indexed and are bound checked. • Overflow of types can be checked. Interoperability– It enables the C# programs to do almost anything that a native C++ application can do. Scalable and Updateable– • C# is automatic scalable and updateable programming language. • For updating our application we delete the old files and update them with new ones. Programming Fundamentals Advantages of Dotnet– Object Oriented: • .NET is based on an Object-Oriented Programming Module. • And it is a development model that involves breaking down software into easily manageable smaller pieces. • It compartmentalizes data into data fields and describes objects behavior through the declaration of classes. • It eliminates necessary programming and hence less coding for developers. In addition to this, .NET makes it possible to reuse components and code, thereby saving time and cost of development. Visual Studio IDE– Visual Studio is an Integrated Development Environment by Microsoft which is used for building, debugging and publishing applications across various platforms, including Android and iOS. The key features of the Visual Studio IDE: It is a single IDE for all .NET applications • The IDE comprises debugging and integrated compilation features • The solution can be used for applications that are based on code written in different languages. • It also customizes the environment to match user preference. Flexible Deployment and Easy Maintenance– • One of the crucial and most advantageous features of .NET Core is flexible deployment. • It can be installed as a part of the application . • The modular design allows including all the dependencies that we need. Moreover, the deployment with .NET is as easy as copying a folder. • Another benefit is that we can have more than one .NET Core version running side by side on the same machine. • Therefore, making it easy to cover different projects and seamlessly perform a deployment task. Great Caching System– • The simplicity of the caching system of .NET makes it reliable and easy to temporarily store data. • Moreover, it allows for the cache implementation to be customized, so developers can improve performance and scale as needed. Large Community:• When a framework is used by many businesses and developers, it means it has such features that attract them. • It also proves its stability and high level of trust from the community, making everyone try the framework. • Moreover, a large community means that almost any issue can be solved with the aid of community members. 66 YCT • According to the recent survey by Stack Overflow, ASP.NET took fourth place among the most popular frameworks, while dotNET and .NET core has ranked second and third. Cost-Effective– • Visual Code Studio by Microsoft has been preferred by a large number of front-end developers as it is good, small, extensible and updated. • When choosing the appropriate technology, one of the first things that we check is the IDEs and tools that are mandatory or add to productivity. • A lot of them are free, but the best ones come with licensing costs per developer, per, which can sum up to thousands of dollars. • No matter whether we are a Startup trying to find our way into the market or a big company, the money could be spent in a better way. Disadvantages of .NET Limited Object-Relational Support • As we know, .NET works on the Object-Oriented Programming approach, which is based on objects rather than actions and data rather than logic. • The support of data-oriented software application development in .NET Framework is provided by the Entity Framework. • The entity acts as the bridge between the objectoriented .NET Framework and SQL databases. • However, some developers believe The Entity Framework doesn’t offer the required flexibility and doesn’t support all the available database designs. Stability Issues for New Releases– • Finally, whenever the company decides to launch new features or make new updates, documents and support can be lacking. • This can jeopardize the stability of development projects. Memory Leaks • .NET is one of those platforms that are frequently criticized for memory-related and memory leak issues. • Although .NET possesses a garbage collector for this problem. Difficulty in the Transition to .NET core– • The transition to .NET core can be long and difficult. The applications built with older .NET versions are far more than that built with .NET core. • Transiting these applications to the latest versions of .NET can be a little bumpy. Licensing Cost– • Many aspects of the .NET family will cost money in terms of licensing fees and they can stack up. • The more demanding the project, the more expensive it can get. For example, Visual Studio can cost a whopping $539.00 for one year. VB.Net– • VB.NET stands for Visual Basic.NET and it is a computer programming language developed by Microsoft. Programming Fundamentals • It was first released in 2002 to replace Visual Basic 6. VB.NET is an object-oriented programming language. • This means that it supports the features of objectoriented programming which include encapsulation, polymorphism, abstraction, and inheritance. • Visual Basic .ASP NET runs on the .NET framework that means that it has full access to the .NET libraries. • It is a very productive tool for rapid creation of a wide range of Web, Windows, Office, and Mobile applications. Control Statement in C# C# IF Statement– It checks the condition first and if the condition is true then the statement is executed. Syntax– if(expression) { ……… ……… } C# IF-else Statement– In C#, if-else statement also tests the condition. It executes the if block, if the condition is true otherwise the else block is executed. Syntax– if(expression) { ……… …….. } else { …… …… } For loop in C# Syntax– for(initialization; condition; incr/decr) { ……… ……... } While Loop in C# Syntax– while(condition) { ,........ …….. } Do-While Loop in C# Syntax– do { …….. …….. }while(condition); 67 YCT Arrays in C# • Artificial intelligence is the ability of machines that perform certain tasks which require the intelligence • Array in C# is a group of similar types of elements showcased by humans and animals. that have contiguous memory locations. • The above definition was proposed by Marvin Minsky • In C#, array is an object of base type System.Array. and John McCarthy from 1950s who were also known Array index starts from 0 in C#. as the father of the Artificial intelligence. Array declaration in C# Types of AI Following is single array declaration: There are two ways in which artificial intelligence is generally classifiedint[ ] array = new int [4 ]; (i) Based on capabilities and (ii) Based on functionality of AI this keyword in C# Following diagram depicts the types of AI this is a keyword which is used to refer the current meaningfully: instance of the class. Artificial Intelligence . • Artificial intelligence is the field of computer science that is associated with the concept of machines "thinking like humans" to perform tasks such as learning, problem-solving, planning, reasoning and identifying patterns. • Artificial intelligence is a combination of two words artificial and intelligence where artificial means 'manmade', and intelligence means 'thinking power', therefore AI means "a man-made thinking power". History of Artificial Intelligence Based on Capabilities Narrow AI– It is also called as weak AI. It performs a dedicated task with intelligence. It is the most common available AI in the world of artificial intelligence. Examples of Narrow AI are Google search, image recognition software, Siri, Alexa etc. General AI– It performs any intellectual task with efficiency like a human. The worldwide researchers are now focused on developing machines with General AI. Strong AI– Strong artificial intelligence is an artificial intelligence construct that has mental capabilities and functions that mimic the human brain. Based on functionality Reactive machine– Reactive machine are the most basic type of AI system. This means that they cannot form memories or use past experiences to influence presentmade decisions. A famous example of reactive machine is Deep Blue, a chess-playing super computer produced by IBM in the mid-1980s. Limited memory– It is comprised of machine learning models that derive knowledge from previously-learned information, stored data or event. An example of limited memory can be an autonomous vehicles (self-driving car). There are three major machine learning models that utilize limited memory AI. (i) Reinforcement learning learns to make better predictions through repeated trial-and-error. (ii) Long short term memory (LSTM) utilizes past data to help in predicting the next item in sequence. (iii) Evolutionary generative adversial networks (EGAN) E-GAN which evolves over time, growing to explore slightly modified paths based off of previous experiences with every new decision. It is used to predict outcomes throughout its evolutionary mutation cycle. Programming Fundamentals 68 YCT Theory of Mind– • This type of artificial machine are still not invented but researchers are making lots of efforts and improvement for developing such AI machines. • Theory of mind AI must understand the human emotions, people, beliefs and must be able to interact like humans. Self Awareness– Self Awareness AI does not exist in reality so far and it is kind of hypothetical concept. These types of machine will be smarter than human mind. Application of AI– Now-a-days, AI has many applications and it is making our daily life more comfortable and fast. The application of AI is widely used in many fields such as- Advantage of AI– • Rational decision maker • Application in medical industry • Accurate decision making • Availability • Reducing human risk • New invention • Reduction in human error • Predictive Maintenance Disadvantages of AI– • Lack of qualified professionals • Loss of jobs • Privacy concern • Serious threat to humanity • Incurs high cost • Lacks in creativity • Dependency on Machines • Potential for misuse Machine Learning– Machine learning is an application of artificial intelligence that provides systems the ability to automatically learn and improve from experience without being explicitly programmed. Deep Learning– It is a subfield of machine learning concerned with algorithms inspired by the structure and function of the brain called artificial neural networks. Natural Language Processing (NLP)– It is a branch of AI that enables machines to understand the human language. The goal of NLP is to build system that can Programming Fundamentals make sense of text and automatically perform tasks such as translation, spellcheck or tropic classification. Reinforcement Learning– It is defined as machine learning method which is concerned with how software agents should take actions in an environment. It is part of deep learning method that helps in maximize some portion of the cumulative reward. • There are three approaches to implement a reinforcement learning algorithm• Value based • Policy based • Model based Intelligent Agent in AI– • Intelligent agents can be any entity or object such as human beings, software and machines etc. that enables artificial intelligence to be put into action. • It uses actuators to initiate action in that environment. • The two main functions of intelligent agents include perception and action. Perception is done with the help of sensors while actions are initiated with the help of actuators. There are three forms of intelligent agentHuman Agent– Human agent uses eyes, nose, tongue and other sensory organs as sensors to percept information from the environment and uses limbs and vocal-tract as actuators to perform an action based on the information. Robotic Agent– It uses cameras and infrared radars as sensors to record information from the environment; and uses reflex motors as actuators to deliver output back to the environment. Software Agent– They use keypad strokes, audio commands as input sensors and shows screens as actuators. Examples of Intelligent agents are Alexa and Siri. Condition Action Rule– A condition-action rule is a rule that maps a state, condition to an action. If the condition is true, then the action is taken otherwise not. Utility Based Agent– A utility-based agent is an agent that acts based on only on what the goal is, but the best way to reach that goal. In other words, it is the usefulness of the agent that makes itself distinct from its counter parts. Pattern Matching– It is a method that is used by an AI entity to understand a certain string of data to find sequence of patterns from it. It is a foundational concept when working with any kind of classification or recognition operation. Inference Rules– These are templates for generating valid arguments. Inference rules are applied to derive proofs in AI, and the proof is a sequence of the conclusion that leads to the desired goal. 69 YCT sophistication of Machine Learning, which enables the Inference Engine– In the field of Artificial intelligence, it is a component of the system that applies logical rules analysis of large chunks of Big Data. to the knowledge base to deduce new information. • Resurging interest in machine learning is due to the Knowledge-Based Agents– They are the agents who same factors that have made data mining and Bayesian have capability of maintaining an internal state of analysis more popular than ever. knowledge, reason over that knowledge, update their • Things like growing volumes and varieties of knowledge after observations and take actions. available data, computational processing that is Heuristic Approach– they are used in machine learning cheaper and more powerful, and affordable data and artificial intelligence when it is impractical to solve a storage. particular problem with a step by step algorithm. • Machine Learning has also changed the way data extraction and interpretation are done by automating Machine Learning . generic methods or algorithms, thereby replacing • Machine learning is a branch of artificial intelligence traditional statistical techniques. (AI) and computer science which focuses on the use Features of Machine Learning– of data and algorithms to imitate the way that humans Machine learning is unique within the field of artificial learn, gradually improving its accuracy. intelligence because it has triggered the largest real-life • It is an application of artificial intelligence (AI) that impacts for business. Followings are the features of provides systems the ability to automatically learn and machine learning. improve from experience without being explicitly • It uses data to detect various patterns in a given programmed. dataset. • Machine learning makes computers more intelligent • Accurate data analysis. without explicitly teaching them how to behave. • Business intelligence at its best. • Machine learning is an important component of the • The ability to perform automated data visualization. growing field of data science. • Automation at its best. • Through the use of statistical methods, algorithms are trained to make classifications or predictions, • Customer engagement like never before. uncovering key insights within data mining projects. • The ability to take efficiency to the next level when merged with IoT. • Machine learning algorithms build a model based on sample data, which is known as training data. • Machine learning is a data-driven technology. History of Machine Learning– • It is much similar to data mining as it also deals with • Machine learning is one way to use AI. It was defined the huge amount of the data. in the 1950s by AI pioneer Arthur Samuel as “the • Machine learning learns from past data and improves field of study that gives computers the ability to learn automatically. without explicitly being programmed.” Advantages of Machine Learning • Arthur Samuel, a pioneer in machine learning, created • Continuous improvement a program for playing championship-level computer • Easily identifies trends and pattern checkers. • No human Interventions needed (automation) • The game used alpha-beta pruning instead of researching each and every possible path that • Wide range of applications • Handling multidimensional and multi-variety data measured the chances of winning. • Apart from it, he used a minimax algorithm (which is Disadvantages of Machine Learning still widely used for games today) of finding the • Data Acquisition optimal move, assuming that the opponent is also • Time and Resources playing optimally. • Interpretation of Results • And he also designed methods for his program to • High Error Susceptibilities continuously improve, for example, by remembering Difference Between Artificial Intelligence and previous checker moves and comparing them with Machine Learning chances of winning. Artificial Intelligence Machine Learning • The father of machine learning is Geoffrey Everest The aim of AI is to Machine learning 1. Hinton. increase success and works to increase Why machine learning ? accuracy but is not not accuracy. • The rapid evolution in Machine Learning has caused a concerned with success. subsequent rise in the use cases, demands, and the It works as a computer It is a concept machine 2. sheer importance of ML in modern life. program which works which has the ability • Big Data has also become a well-used buzzword in the smartly. to learn from data. last few years and this is, in part, due to the increased Programming Fundamentals 70 YCT 3. The goal is for AI to stimulate natural intelligence required to solve complex problems. 4. AI involves decision making. 5. AI involves decision making. 6. AI leads to intelligence or wisdom which can be gained. containing data points that are neither classified nor labeled. • In other words, unsupervised learning allows the system to identify patterns within data sets on its own. • The goal of unsupervised learning is to find the underlying structure of dataset, group that data according to similarities, and represent that dataset in a compressed format. It is categorised into two types of problems: The goal is for a machine to learn from data on how a task must be performed to maximize the performance of the machine in the particular task. ML involves the creation of selflearning algorithms. ML will only work to find the solution regardless of whether it is optimal or not. ML only leads to knowledge which can be gained. Types of Learning Supervised Learning– • Supervised learning, also known as supervised machine learning, is a subcategory of machine learning and artificial intelligence. • It is defined by its use of labeled datasets to train algorithms that to classify data or predict outcomes accurately. • In the real-world, supervised learning can be used for Risk Assessment, Image classification, Fraud Detection, spam filtering, etc. Supervised learning is further divided into two types of problems: Advantages of Supervised Learning– • It allows to collect data and produces data output from previous experiences. • It helps to optimize performance criteria with the help of experience. • It helps to solve various types of real-world computation problems. Disadvantages of Supervised Learning– • Classifying big data can be challenging. • Computation time is vast for supervised learning. • Unwanted data downs efficiency. • Always in need of updates. • Anyone can over fit supervised algorithms easily. Unsupervised Learning • Unsupervised learning refers to the use of artificial intelligence algorithms to identify patterns in data sets Programming Fundamentals Advantages of Unsupervised Learning– • Labeling of data demands a lot of manual work and expenses. • It solves the problem by learning the data and classifying it without any labels. • This is the perfect tool for data scientists, as unsupervised learning can help to understand raw data. • It is similar to human intelligence in some way as the model learns slowly and then calculates the result. Disadvantages of Unsupervised Learning– • The more the features, the more the complexity increases. • It does not consider spatial relationships in the data. • It can take time to interpret the spectral classes. • It is costlier as it might require human intervention to understand the patterns and correlate them with the domain knowledge. • It is not always certain that the obtained results will be useful since there is no label or output measure to confirm its usefulness. Semi Supervised Learning– • It is a type of machine learning algorithm that lies between supervised and unsupervised machine learning. • To overcome the drawbacks of supervised learning and unsupervised learning algorithms, the concept of Semi-supervised learning is introduced. Advantages of Semi Supervised Learning– • Simple and easy to understand highly efficient. • Used to solve drawbacks of Supervised and Unsupervised Learning algorithms. • It reduces the amount of annotated data used. Disadvantages of Semi Supervised Learning– • Iteration results are not stable. • It is not applicable to network-level data. • It has low accuracy. 71 YCT Reinforcement Learning– • Reinforcement Learning (RL) is the science of decision making. It is about learning the optimal behavior in an environment to obtain maximum reward. • In general, a reinforcement learning agent is able to perceive and interpret its environment, take actions and learn through trial and error. • Examples of Reinforcement Learning are Robotics, AlphaGo and Autonomous Driving,etc. Note– • RL is a separate paradigm of machine learning. • RL does not require a supervisor or a pre-labelled dataset; instead, it acquires training data in the form of experience by interacting with the environment and observing its response. Advantages of Reinforcement Learning– • It focuses on the problem as a whole. • RL does not need a separate data collection step. • It works in dynamic and uncertain environments. Disadvantages of Reinforcement Learning– • Reinforcement learning agent needs extensive experience. • Lack of interpretability. • Delayed rewards. Algorithms of Machine Learning– Following are some popular machine learning algorithms. Linear Regression– • Linear Regression Algorithm is a machine learning algorithm based on supervised learning. • It is used to estimate real values based on continuous variable(s). Here, we establish relationship between independent and dependent variables by fitting a best line. This best fit line is known as regression line and represented by a linear equation Y= a *X + b. In this equation ,here Y – Dependent Variable a – Slope X – Independent variable b – Intercept Logistic Regression– It predicts the probability of occurrence of an event by fitting data to a logit function. Hence, it is also known as logit regression. Since, it predicts the probability and its output values lies between 0 and 1. Decision Tree– • It is a type of supervised learning algorithm that is mostly used for classification problems. • It works for both categorical and continuous dependent variables. • In this algorithm, we split the population into two or more homogeneous sets and this is done based on most significant attributes or independent variables to make as distinct groups as possible. Programming Fundamentals Support Vector Machine– • Support Vector Machine is one of the most popular Supervised Learning algorithms, which is used for Classification as well as Regression problems. However, primarily, it is used for Classification problems in Machine Learning. • In this algorithm, we plot each data item as a point in n-dimensional space (where n is number of features we have) with the value of each feature being the value of a particular coordinate. kNN (k- Nearest Neighbors)– • K-nearest neighbor, also known as the KNN algorithm, is a non-parametric algorithm that classifies data points based on their proximity and association to other available data. • This algorithm assumes that similar data points can be found near each other. • As a result, it seeks to calculate the distance between data points, usually through Euclidean distance, and then it assigns a category based on the most frequent category or average. K-Means– • It is a type of unsupervised algorithm which solves the clustering problem. • Its procedure follows a simple and easy way to classify a given data set through a certain number of clusters . • Data points inside a cluster are homogeneous and heterogeneous to peer groups. Random Forest– • Random Forest is a classifier that contains a number of decision trees on various subsets of the given dataset and takes the average to improve the predictive accuracy of that dataset. • It belongs to the supervised learning technique and It can be used for both classification and regression problems in machine learning. • The "forest" refers to a collection of uncorrelated decision trees, which are then merged together to reduce variance and create more accurate data predictions. • It is a widely used and effective machine learning algorithm based on the idea of bagging. Anomaly Detection– Anomaly detection is one of the most common use cases of machine learning. Finding and identifying outliers helps to prevent fraud, adversary attacks, and network intrusions that can compromise your company’s future. Pattern Recognition– • Pattern recognition is the use of computer algorithms to recognize data regularities and patterns in machine learning. • And this type of recognition can be done on various input types, such as biometric recognition, colors, image recognition, and facial recognition. 72 YCT Find-S Algorithms– • It is a basic concept learning algorithm in machine learning. • The find-S algorithm finds the most specific hypothesis that fits all the positive examples. Backpropagation Algorithm– • Backpropagation algorithm is probably the most fundamental building block in a neural network. • It is used to effectively train a neural network through a method called chain rule. • The general tasks that are performed with backpropagation algorithm is pattern mapping, prediction and function approximation etc. Bayes Rule– • Bayes theorem helps to contribute more accurate results. • Bayes Theorem is used to estimate the precision of values and provides a method for calculating the conditional probability. MDL– The minimum description length (MDL) principle is a powerful method of inductive inference, the basis of statistical modeling, pattern recognition, and machine learning. PAC– In computational learning theory, probably approximately correct (PAC) learning is a framework for mathematical analysis of machine learning. It was proposed in 1984 by Leslie Valiant. Inductive Logic Programming– Inductive logic programming is the subfield of machine learning that uses first-order logic to represent hypotheses and data. CBR– Case-based reasoning (CBR) is an experience-based approach to solve new problems by adapting previously successful solutions to similar problems. Python . • Python is a general purpose, dynamic, high-level, and interpreted programming language. • It supports an Object Oriented programming approach to develop applications and • It is used in web development, data science, creating software prototypes, and so on. • Fortunately for beginners, Python has simple easy-touse syntax and this makes Python an excellent language to learn to program for beginners. Why Python? • Python is commonly used for developing websites , software, task automation, data analysis, and data visualization. • Since it is relatively easy to learn, Python has been adopted by many non-programmers such as accountants and scientists, for a variety of everyday tasks, like organizing finances. Programming Fundamentals Python is a great choice for– • Web and Internet Development • Scientific and Numeric Computing • Education • Software Development • GUI Development • Games • Business Applications History of Python– • Python was created by Guido van Rossum, and first released on February 20, 1991. • The name of the Python programming language comes from an old BBC television comedy sketch series called Monty Python’s Flying Circus. Advantages of Python Easy to Read, Learn and Write– • Python is a high-level programming language that has English-like syntax. • And that makes it easier to read and understand the code therefore, a lot of people recommend Python to beginners. • Here, we need fewer lines of code to perform the same task as compared to other major languages like C/C++ and Java. Interpreted Language– • Python being an interpreted language it directly executes the code line by line. In case of any error, it stops further execution and reports back the error which has occurred. • And it shows only one error even if the program has multiple errors. This makes the debugging process easier. Improved Productivity– • Python is a very productive language. Due to the simplicity of Python, developers can focus on solving the problem. • They don’t need to spend too much time in understanding the syntax or behavior of the programming language. Dynamically Typed– • Python doesn’t know the type of variable until we run the code. It automatically assigns the data type during the execution. • The programmer doesn’t need to worry about declaring variables and their data types. Free and Open-Source– • Python comes under the OSI approved open-source license and this makes it free to use and distribute. • We can download the source code, modify it and even distribute your version of Python. • This is useful for organizations that want to modify some specific behavior and use their version for development. 73 YCT Portability– • In many languages such as C/C++, we need to change your code to run the program on different platforms. • That is not the same with Python. We only write once and run it anywhere. Disadvantages of Python– Not Memory Efficient• For providing simplicity to the developer, Python has to do a little tradeoff. And the Python programming language uses a large amount of memory. • This can be a disadvantage while building applications when we prefer memory optimization. Weak in Mobile Computing– • Python is generally used in server-side programming. And we don’t get to see Python on the client-side or mobile applications because of the following reasons. • Python is not memory efficient and it has slow processing power as compared to other languages. Database Access– • Programming in Python is easy and stress-free. But when we are interacting with the database, it lacks behind. • The Python’s database access layer is primitive and underdeveloped in comparison to the popular technologies such as JDBC and ODBC. Runtime Errors– • Python is a dynamically typed language therefore, the data type of a variable can be changed anytime. • A variable containing integer number may hold a string in the future, which can lead to runtime errors. • Therefore, Python programmers require testing of the applications. Slow Speed– • In python programming, the line by line execution of code often leads to slow execution. • The dynamic nature of Python is also responsible for the slow speed of Python because it has to do the extra work while executing code. • Therefore, Python is not used for purposes where speed is an important aspect of the project. Keywords in Python programming– • In Python, keywords are case sensitive and they are reserved words. That means we cannot use keywords as a variable or function. • Keywords are used to define the syntax and structure of the Python language. Following are some keywords available in Python programming language. False await else import pass None break except in raise True class finally is return and continue for lambda as def from nonlocal while assert del global not with async elif if or yield try Note:- All the keywords except True, False and None are in lowercase and they must be written as they are. Programming Fundamentals Python Identifiers • An identifier is a name given to entities such as class, functions, variables, etc. • It helps to differentiate one entity from another. Rules for Defining Identifiers– 1. An identifier cannot start with a digit. For examplea1( valid declaration) But 1a is not a valid declaration. 2. Keywords cannot be used as identifiers. For exampleassert = 1 3. Special symbols such as !, @, #, $, % etc. cannot be used as an identifier. For exampleb$ = 3 Variables in Python– Defining variables• In Python, variables are containers for storing data values. • Variable is a name that is used to refer to memory location. Variables in python are also known as an identifier and used to hold value. For examplea = 10 x = "welcome to yct" print(a) print(x) Output– 10 welcome to yct Casting in Python– We can specify the data type of a variable by using casting. For examplex = str (4) y = float (4) Output- 4 4.0 Get the Type– We can also get the data type of a variable by declaring type() function. For examplex=4 y = "welcome to yct" print(type(x)) print(type(y)) Output– <class 'int'> <class 'str'> Single or Double Quotes– In python programming language, a string variable can be declared either by using single or double quotes and it doesn't make any sense ,both are the same. 74 YCT For example– x = "youth competition times" print(x) x = 'youth competition times' print(x) Output– youth competition times youth competition times Data Type in Python– • Every value in Python has a datatype. • Since everything is an object in Python programming, data types are actually classes and variables are instances (object) of these classes. • Following diagram demonstrates the various types of data types in python programming language. Comments in Python– • Comments in python is an essential tool and generally used to explain the code. • They describe what is going on inside a program, so that a person looking at the source code does not have a hard time figuring it out. • We use the hash (#) symbol to start writing a comment in python. For example#Proof of comments here is given . print(" Hello, welcome to yct!") Output– Hello, welcome to yct! Multi Line Comments in Python– • Python does not really have a syntax for multi line comments. • To add a multiline comment we can insert a # for each line: For example– # youths competition times # is one of the best publication # for competitive exams print("Hello, welcome to yct!") Type Conversion in Python– The process of converting the value of one data type such as (integer, string, float, etc.) to another data type is known as type conversion. There are two types of type conversion. Implicit Type Conversion– In Implicit type conversion, Python automatically converts one data type to another data type. Programming Fundamentals For example– Converting integer to floatN_int = 5 N_float = 5.5 N_new = N_int + N_float print("datatype of N_int:",type(N_int)) print("datatype of N_float:",type(N_float)) print("Value of N_new:",N_new) print("datatype of N_new:",type(N_new)) After running the above code we get output as :datatype of N_int: <class 'int'> datatype of N_float: <class 'float'> Value of N_new: 10.5 datatype of N_new: <class 'float'> Explicit Type Conversion– In explicit type conversion, users convert the data type of an object to required data type and for that we use the predefined functions such as int(), float(), str(), etc to perform explicit type conversion. Syntax– <required_datatype>(expression) For example– To add string and integer data types using explicit type conversion. a = 50 b = “100” result1 = a + b b = int(b) result2 = a + b print(result2) Output– Traceback (most recent call last): File “”, line 1, in TypeError: unsupported operand type(s) for +: ‘int’ and ‘str’ 150 In the above example, variable a is of the number data type and variable b is of the string data type. When we try to add these two integers and store the value in a variable named result1, a TypeError occurs as displayed in the output. So, in order to perform this operation, we have to use explicit type casting. As we can see in the above code block, we have converted the variable b into int type and then added variables a and b. The sum is stored in the variable named result2, and when printed it displays 150 as output, as we can see in the output block. Python Namespace– A namespace is a collection of names and python implements namespaces as dictionaries. A namespace allows us to have unique names for each object If we don’t know, this is just a quick reminder to tell us that strings, lists, functions, etc. everything in python is an object. 75 YCT In other words, we can say that the role of a namespace is like a surname. Namespaces are of basically three types:1. Built-in Namespace– It includes functions and exception names that are built-in in Python. 2. Global Namespace– It includes names from the modules that are imported in the project. It is created when we include the module and it lasts until the script ends. 3. Local Namespace– It is created when the function is called and the scope ends when the value is returned. if...else Statement in python– If statement Syntax– if test exp: statement(s) if...else Statement Syntax– if test exp: Body of if else: Body of else if...elif...else Syntax– if test exp: Body of if elif test exp: Body of elif else: Body of else Loop in Python Programming– For loop– A for loop is used for iterating over a sequence (that is either a list, a tuple, a dictionary, , or a string). Syntax– for val in sequence: loop body Output– 1 2 3 4 Break Statement in Python– With the help of break statement we can stop the loop even if the while condition is true. For example- Exit the loop when i is 4. i=1 while i < 8: print(i) if (i == 4): break i += 1 Output– 1 2 3 4 Pass Statement in Python– In Python programming, the pass statement is a null statement. It is generally used as placeholder. Syntax– pass Errors and Exceptions in Python– Syntax Errors– when error caused by not following the proper syntax of the language is called syntax error or parsing error. Exceptions– when errors occurring at runtime (after passing the syntax test) are called exceptions or logical errors. Exception Handling in Python– • When exceptions occur, the Python interpreter stops the current process and passes it to the calling process until it is handled. If not handled, the program will crash. • These exceptions can be handled using the try statement. For example– RegEx in Python– fruits = ["mango", "banana", "orange"] A regular expression is a sequence of characters that for x in fruits: defines a search pattern. A pattern defined using RegEx print(x) can be used to match against a string. Output– mango Iterators in Python– banana An iterator is an object that implements the iterator orange While Loop– With the help of while loop we can protocol. In other words, an iterator is an object that execute a set of statements as long as a condition is true. implements the following methods: • __iter__ - It returns the iterator object itself. Syntax– while test_expression: • __next__ - It returns the next element. body of while Generators in Python– For example– • Python generators are a simple way of creating i=1 iterators. while i < 5: • A generator is a special type of function which does print(i) not return a single value, instead, it returns an iterator i += 1 object with a sequence of values. Programming Fundamentals 76 YCT • In a generator function, a yield statement is used rather than a return statement. File Handling in python– Python has a number of functions for creating, reading, updating, and deleting files. The key function for working with files in Python is the open() function. The open() function takes two parameters; filename, and mode. f = open(filename, mode) There are four different modes for opening a file:"r" - Read - Opens a file for reading "a" - Append - Opens a file for appending "w" - Write - Opens a file for writing "x" - Create - Creates the specified file Blockchain . • A blockchain is a distributed database that is shared among the nodes of a computer network. • As a database, a blockchain stores information electronically in digital format. • It is a digital decentralized (no financial institutions involved) and distributed ledger. • In layperson’s terms, it is a database that stores records and transactions on multiple computers without one controlling party and according to an agreed policy. • The data that is stored is a block, and the blocks are linked (chained) together to form a blockchain. • The blockchain is distributed across a peer-to-peer (P2P) network and It is made up of data blocks that are linked together to form a continuous chain of immutable records. • The concept of proof-of-work (PoW) was introduced to verify computational effort and deter cyber attacks. • To prevent bad actors from validating bad transactions or double spends, blockchains are secured by a consensus mechanism such as proof of work (PoW) or proof of stake (PoS). And these methods allow for agreement even when no single node is in charge. How the Blockchain Technology Works– • The goal of blockchain is to allow digital information to be recorded and distributed, but not edited. • Therefore, a blockchain is the foundation for immutable ledgers, or records of transactions that cannot be altered, deleted, or destroyed. • That is why blockchains are also known as a distributed ledger technology (DLT). Followings are the steps in which a Blockchain technology works: • Firstly, the users requests for a transaction and then. • A block representing the transaction is created. • Thereafter, the block is broadcasted to all the nodes in the network. Programming Fundamentals • Then all the nodes validate the information on the block. • After validation, it gets added to the chain. • And thus , finally the transaction gets verified and executed. History of Blockchain • Blockchain technology was first outlined in 1991 by Stuart Haber and W. Scott Stornetta, two researchers who wanted to implement a system where document time stamps could not be tampered with. • Satoshi Nakamoto conceptualized the first blockchain in 2008 from where the technology has evolved and found its way into many applications beyond cryptocurrencies. • Satoshi Nakamoto released the first whitepaper about the technology in 2009. In the whitepaper, he gave the details of how the technology was well equipped to enhance digital trust given the decentralization aspect that means nobody would ever be in control of anything. • But Nakamoto's white paper was just the beginning and In 2009, bitcoin went from concept to reality. Benefits of Blockchain Technology– Better Transparency– Blockchain is a type of distributed ledger and all nodes in the network share a copy of documentation. The data on the blockchain ledger is easily accessible for everyone to see. If a transaction history changes, everyone in the network can see the change and the updated records. That is why, all the information about currency exchange is available to everyone. Enhanced Security– The shared documentation of transactions can only be updated or modified with the consensus on a blockchain network. The information is edited only if everyone or majority of nodes agree to update a record. Moreover, when a transaction is approved then it is encrypted and connected with the previous transaction. Therefore, nobody or any third party has the potential to change a record. Reduced Costs– As blockchain eliminates the need for third parties and middlemen and it saves big costs in business as we can trust the trading partner. We don't need anyone else to establish the rules and policies of exchange. The cost and effort spent on the documentation and its revisions are also saved because everyone gets to view a single immutable version of the ledger. Improved Speed and Efficiency– With traditional paperwork processes , completing a transaction is exhausting as it requires third party meditation and is prone to human errors. Blockchain can streamline and discipline these legacy methods and remove the risk of errors and it makes trading more efficient and faster and leads to much less clutter. True traceability– In complex supply chains, it is difficult to trace products back to their origins. But , with 77 YCT the help of blockchain, the exchanges of goods are recorded. Therefore, we get an audit trial to learn from where a particular asset came and we also get to know every stop the product made on its journey. This traceability of products can help in verifying the authenticity and prevent frauds. Drawback of Blockchain Technology– Scalability– Blockchain's application Bitcoin is massively popular , however, it can only handle 7 transactions per second whereas Hyperledger can handle 10k and Visa 56k transactions per second. The practical use of blockchain gets a bit hard to believe with the issue of scalability in view. Storage– Since Blockchain databases are stored indefinitely on all network nodes and the issue of storage surfaces. With the increasing number of transactions, the size of the database will expand and there is no way personal computers can store unlimited data and it only gets appended. To put this in perspective, the Ethereum blockchain is expanding at the speed of 55 GB per year as of 2017. It is at 180 GB per year. Privacy– Data on a public blockchain is encrypted and anonymous but it lies in the hands of all nodes in the network. Therefore, everyone in the network has a right to access this data and there is a possibility that someone can track down the identity of a person in the network through transactional data. Regulation– Regulatory regimes in the financial field are a challenge for blockchain' s implementation. Blockchain applications will have to lay down the process of pinpointing a culprit in case of a fraud happens and that is a bit of a challenge.Other regulatory aspects of a blockchain technology will need to be laid down first for facilitating its wide adoption. Security– Satoshi Nakamoto highlighted the 51% attack when he launched Bitcoin. The attack can simply be put such as - if 51 % of the nodes in a network lie and it will have to be accepted as truth. So everyone in the network will have to constantly have a watch on to perceive any unwanted influence. Layers of Blockchain Technology– • Blockchain technology is an amalgamation of various technologies coming together under one roof to help the system run smoothly. • Mathematical computation, cryptography, game theory, peer-to-peer systems, and validation protocols essentially join forces to power blockchain operations. • Blockchains have a layered architecture to facilitate this unique way of authenticating transactions. Primarily there are five layers of blockchain technology: 1. Application layer 2. Services layer 3. Semantic layer Programming Fundamentals 4. Network layer 5. Infrastructure layer Web3 the New Internet Artificial Intelligence– it understands information like humans with natural language processing. Ubiquity– All the devices would be connected to the network. Enhanced Connectivity– it uses semantic metadata for better connectivity. Semantic Web– it focuses on web content rather than keywords. 3D Graphics– it utilizes virtual reality therefore, it offers more realistic and natural looking graphics. Peer to peer network:- it is a decentralized network that gets rid of centralized authority. Example of Popular Blockchain Platforms– Hyperledger– • It is one of the best blockchain platforms that is used in almost any kind of sector. • It offers some of the most lucrative features on the market – 1. Data availability based on the need to know the concept. 2. Safety protocols that will safeguard our information. 3. Permissioned network that can be used to add privacy in our network. Ethereum Enterprise– • Ethereum is also great for all kinds of industry. However, as it is public, it might not be suitable for blockchain technology in banking. • But its commercial version Ethereum Enterprises offers a private channel in the architecture. Therefore, that version is most suitable for blockchain technology in banking. R3 Corda– Corda comes with two different versions – enterprise Corda and Corda. In reality, the enterprise Corda is most suited for any kind of enterprise use cases. It provides some of the lucrative features such as – • The monitoring system that allows any user to locate any disasters and recover them. • Blockchain application firewall that safeguards the whole network from any kind of cyber-attack. Quorum– • It came when the enterprises were looking for a good solution that can ensure their full confidentiality. • Instead of depending on typical power-consuming ones, it offers a faster and better algorithm. • It provides private transactions, permissioned network, node management, high scalability for better experience and faster settlement to save time. 78 YCT Types of Blockchain– There are four types of blockchain structures: Public Blockchains– • They are permissionless in nature and allow anyone to join, and are completely decentralized. • Public blockchains allow all nodes of the blockchain to have equal rights to access the blockchain, create new blocks of data, and validate blocks of data. • Public blockchains are primarily used for exchanging and mining cryptocurrency. Private Blockchains– • Private blockchains, which is also referred to as managed blockchains, are permissioned blockchains controlled by a single organization. • In a private blockchain, the central authority determines who can be a node. • The central authority also does not necessarily grant each node with equal rights to perform functions. • Private blockchains are only partially decentralized because public access to these blockchains is restricted. Consortium Blockchains– • Consortium blockchains are permissioned blockchains governed by a group of organizations, rather than one entity. • Consortium blockchains, therefore, enjoy more decentralization than private blockchains, resulting in higher levels of security. Hybrid blockchains– • Hybrid blockchains are blockchains that are controlled by a single organization, but with a level of oversight performed by the public blockchain that is required to perform certain transaction validations. • An example of a hybrid blockchain is IBM Food Trust, which was developed to improve efficiency throughout the entire food supply chain. Blockchain Technology for Government Services– A blockchain-based government has the potential to solve legacy pain points and it helps in the following fields: Legal enforcement– The Government can use public blockchain data to monitor transactions to facilitate legal transactions and stop money laundering. Welfare distribution– Blockchain technology can help to cut off the system losses which will pave the way for better welfare distribution. Healthcare services– Government can improve healthcare services by using distributed ledgers. Cyber protection– Government can use blockchain technology to protect vital government infrastructure against hacks and cyber attacks. Security and safety– Government can provide better social security against online frauds with the help of blockchain technology. Programming Fundamentals Taxation– with the help of a decentralized ledger , the Government can bring up better transparency in solving tax issues. UTXO- The term UTXO refers to the amount of digital currency someone has left remaining after executing a cryptocurrency transaction such as bitcoin. It stands for unspent transaction output. Principles and Programming Techniques • Programming principles help an individual to become a good programmer. • After learning these coding principles a programmer or developer becomes more efficient and able to produce code which is easier to maintain. • It also helps in saving development and maintenance time as well. Programming principles– • Programming is the process of coding, testing, troubleshooting, debugging and maintaining a system. • Programming principles help us to write excellent quality of code and maintain a good coding practice. Following are certain programming principles that can help to be a better coder. KISS(keep it simple, stupid)– This programming principle is one of the most important principles. Writing simple code is a good sign of a programmer. Writing a thick block of advanced and complicated code does not make any sense. Therefore, this principle suggests making coding as simple as possible. Therefore, when you write code your solution or logic should not be complicated that takes a lot of time and effort to understand. That is why, always try to simplify your code using different approaches such as breaking a complex problem into smaller chunks or taking out some unnecessary code you have written. For example:function addNumbers(n1,n2) { return n1 + n2; } In the above simple function , it is very easy to know and understand what is going on. Write DRY Code– • DRY stands for don't repeat yourself. DRY is a programming principle which focuses on mainly not repeating the code. • It avoids duplication of data or logic while writing code. • It states that a piece of code should be implemented in just one place in the source code. 79 YCT For example– Suppose you want to print 15 lines in a • This means that a class will do only one job, which program then you write 15 blocks of code. But a good leads us to conclude it should have only one reason to programmer will try to use a loop or some logic instead change. of writing the duplicate lines. Following diagram illustrates the single responsibility Open/ Closed Principle(OCP)– principle very well. A module should be open for extension but closed for modification. This is an important principle when releasing a library or framework that others will use. Following diagram demonstrates the open/ closed principle very well. Separation of Concerns– • Separation of concerns is a principle used in programming to separate an application into units, with minimal overlapping between the functions of the individual units. • The separation of concerns is achieved using modularization, encapsulation and arrangement in Composition Over Inheritance– software layers. • The Composition Over Inheritance principle is very useful while writing code by using object- oriented Following diagram demonstrates the separation of concerns. programming . • It states that objects with complex behaviors should contain instances of objects with individual behaviors and they should not inherit a class and add new behaviors. • Only relying on inheritance causes two major problems. First, the inheritance hierarchy can get messy in a hurry and we also have less flexibility for defining special-case behaviors. Following diagram illustrates composition over inheritance. You Aren't Going to Need It (YAGNI)– • YAGNI originally is an acronym that stands for "You Aren't Going to Need It". It is a mantra from extreme programming that is often used in agile software teams. • "YAGNI" is a principle which arose from extreme programming that states a programmer should not add functionality until deemed necessary. • XP co-founder Ron Jeffries has written: "Always implement things when you actually need them, never Single Responsibility when you just foresee that you need them." • As the name suggests, this principle states that each class should have one responsibility, one single Following diagram illustrates YAGNI principle in beautiful waypurpose. Programming Fundamentals 80 YCT Introduction of Object Oriented Programming (OOPs) Refactoring– • Refactoring is a systematic process of improving code without creating new functionality. • Refactoring transforms a mess into clean code and simple design. • It is the process of changing a software system in such a way that it doesn't change the external behavior of code and yet improves its internal structure. Interface Segregation Principle– • It segregates interfaces as per requirements of the program, rather than one general purpose implementation. • The Interface Segregation Principle was defined by Robert C. Martin while consulting for Xerox to help them build the software for their new printer systems. • He defined it as “Clients should not be forced to depend upon interfaces that they do not use.” Following diagram demonstrates the interface segregation principle- • The concept of object-oriented programming (OOP) was coined by Alan Kay at grad school. • OPP first came into picture in 1970's by Alan and his team and later it was used by some programming languages and was implemented successfully. Smalltalk was first language to use pure OOP concepts and followed all the rules strictly. • The concept of object-oriented programming was brought to remove the flaws encountered in the procedural approach. • Object-oriented programming treats data as a critical element in the program development and it does not allow it to flow freely around the system. • OOP ties data more closely to the functions that operate on it and protects it from accidental modification from outside functions. • OOP gives permission for the decomposition of a problem into a number of entities which is called as objects and then create data and functions around these objects. • Or in other words we can say that the main goal of OOP is to make complex code simpler and for this the program is divided into independent blocks which are known as objects. • The data of an object can be accessed only by the function associated with that object, therefore, function of one object can access the function of other objects. following is the diagram that illustrates the organization of data and function in object oriented programming. Dependency inversion Principle • The Dependency Inversion Principle (DIP) states that high level modules should not depend on low level modules; both should depend on abstractions. • Abstractions should not depend on details but details should depend upon abstractions. Following diagram illustrates the dependency inversion principle– Basic Concepts of OOPs– OOPs refers to languages that aims to implement real world entities such as inheritance, polymorphism, dynamic binding and message passing etc. OOPs includes– Object– • Objects are the basic-run time entities and they can be a person, a place, a bank account or a table of data etc • It may also represent user-defined data like vectors, time and lists as well. Programming Fundamentals 81 YCT • An objects is an instance of a class and when a class is defined then no memory is allocated but when it is created then memory allocation is done. • An object has an identity, state and behavior. For example. "Dog" is a real-life object that has certain characteristics such as color, bark, eats etc. Class– • Objects are variables of the type class and once a class is defined then we can create any number of objects belonging to that class. • A class is therefore, a collection of objects of similar type and it represents the set of properties or methods that are common to all objects of one type. • A class is like a blue print for an object. For example– Mango, apple and orange are members of a class fruit. fruit mango; ↓ ↓ (class) (object) Data abstraction– Data abstraction refers to the act of providing essential features without including the background details or explanations. For example- A man who knows to drive a car but does not know the inner mechanism of car how it runs. Note– • Attributes are sometime called as data members because they hold information. • The functions which operate on these data are sometime is called as method or member functions. Encapsulation– • In general, encapsulation is a process of wrapping similar code in one place. • It involves the bundling of data members and functions inside a single class. • Bundling similar data members and functions inside a class together helps in data hiding as well. For example class Rect { public: int leng; int brdth; int getArea() { return long * brdth; } }; Inheritance– • Inheritance is the process by which objects of one class acquire the properties of objects of another class. • It supports the concept of hierarchical classification. • It allows to create new class (derived class) from an existing class (base class). For example OR Class Animal { // eat () → function // shout () → function }; class Dog: public Animal{ // bark () → function }; Note– In OOP the concept of inheritance provides the idea of reusability that means we can add additional features to an existing class without modifying it. There are many forms of inheritanceSingle inheritance– This is a form of inheritance in which a class inherits only one parent class. for example In the above diagram, class y extends only class x and class x is a super class and class y is a sub-class. Multiple Inheritance– Here, one class extends more than one class. Note-: Java does not support multiple inheritance. Multilevel Inheritance– Here, one class can inherit from a derived class; therefore, the derived class becomes the base class for the new class. in the above code leng and brdth are data members and the function get Area () are kept together in Rect class. Programming Fundamentals 82 YCT Hierarchical Inheritance– Here, one class is For example inherited by many sub classes. Class Text { public: void display () { It is clear from the above diagram that class b, class cout << "Text class"; c and class d inherit the same class. } Hybrid Inheritance– }; It is also known as multipath inheritance due to the Class Derived: public Text subclass deriving its properties from super class { following the various paths. public: void display () { cout << "Derived class"; } } Polymorphism– Polymorphism, a Greek term, Now, it is clear from the above example that function which means the ability to take more than one form. It is display () is overridden in the derived class. the same entity (function or operator) that behaves Dynamic binding– differently in different scenarios. • Dynamic binding means that a block of code executed For example– (+) operator in C++ programming is with reference to a procedure (method) call is used in two waysdetermined at run time. First as arithmetic operation as addition and second • Dynamic binding is also called as late binding or runas string concatenation or in layman words we can say, a time binding lady can perform as a teacher in school and mother at Message passing– home. • Objects communicate with one another by sending Polymorphism is mainly divided into two parts– and receiving information to each other. A message • Compile time polymorphism for an object is a request for execution of a procedure (method) and that is why it invokes function in the • Runtime polymorphism receiving object that generates the desired results. • Compile time polymorphism– • Message passing involves specifying the name of It is achieved by function overloading or operator over object, the name of the function and the information to loading. be sent. Function overloading– Constructors– Function overloading refers to the use of the same • A constructor is a 'special' member function whose task thing for different purposes that means we can use the is to initialize the objects of its class. same function name to create functions that perform a variety of different tasks. This is also called as function • It is special because its name is the same as the class name. polymorphism in OOP. Functions can be overloaded by change in number of arguments or change in type of • It is invoked whenever an object of its associated class is created. argument. • It is called constructor because it constructs the values Operator overloading– of data members of the class Overloading means assigning different meanings to an operation, depending on the context. For example, '+' Syntax– Class integer //class with a constructor operator is performed as addition in arithmetic operation { and it is also used for concatenate two strings. int x, y; • Runtime polymorphism– public: Runtime polymorphism is achieved by function integer(void) // constructor declared overriding. .......... Function overriding– It is a feature that allows to .......... use a function in the child class that is already present in }; its parent class. The child class inherits all the data integer :: integer(void) members and the member functions present in the parent { class. x = 0; y = 0; Function overriding means creating a newer version } of the parent class function in the child class. Programming Fundamentals 83 YCT Destructors– It is used to destroy the object that is created by a constructor. Same as constructor, the destructor is a member function whose name is the same as the class name but it is preceded by a tidle (~). for example, the destructor for the class text can be defined as~ class () { } For example # include<iostream> using namespace std; int count = 0, class birth { public: birth() { count ++; cout<<"\n number of objects created"<< count; } ~birth (){ cout<<"\n number of objects destroyed" << count; count --; } }; int main (){ cout<< "\n\ n Enter Main \ n"; birth B1,B2, B3, B4 { cout<< "\n\n Enter Block 1\n"; birth B5; } { cout<< "\n\ n Enter Block 2 \n"; birth B6; } cout<< "\n\n Re-enter main \n"; return 0; } The output of the program isEnter main Number of objects created 1 Number of objects created 2 Number of objects created 3 Number of objects created 4 Enter Block 1 Number of objects created 5 Number of objects destroyed 5 Enter Block 2 Programming Fundamentals Number of objects created 5 Number of objects destroyed 5 Re-enter main Number of objects destroyed 4 Number of objects destroyed 3 Number of objects destroyed 2 Number of objects destroyed 1 Note– 1. A constructors has the same name as that of a class. 2. Constructors are normally used to initialize variables and to allocate memory. Features of OOPs– • Emphasis in on doing things (algorithms) • Large programs are divided into smaller programs which is known as functions. • Data is hidden and cannot be accessed by external functions. • Data move openly around the system from function to function. • Employs top-down approach in program design. Benefits of OOP's– • With the help of inheritance, we can eliminate redundant code and extend the use of existing classes. • The principle of data hiding helps the programmer to build secure programs that can not be invaded by code in other parts of the program. • Software complexity can be easily managed. • The data centered design approach enables to capture more details of a model in implementation form. • Message passing techniques for communication between objects make the interface descriptions with external systems much simpler. • Flexibility through polymorphism. • Security→ because of concept of data abstraction, only limited amount of data is shown to user. It allows the maintenance of security. Integrated Development Environment • Integrated development environments (IDE) are applications that facilitates the development of other applications. • It provides a central interface with any tools which appears convenient for developer to use. • It is a build application that combines common developer tools into a single graphical user interface (GUI). An IDE typically may have source code editor, local build automation and debugger etc. History of IDE • Before the development of IDE, programmer used to write their program in text editor. • And this involved writing and saving an application in the text editor before running run the compiler, taking note of any error messages, and then going back to the text editor to revise their code. 84 YCT • During 1983, Borland Ltd. acquired a Pascal compiler and published it as Turbo Pascal which had for the first time integrated editor and compiler. Benefits of Using IDEs– It improve developers productivity. Boost the speed of development activities. • Keeps developers up to date with the latest practices and threats. • It saves times and a programmer doesn't need to type out full character sequences. • Help developers to organize their workflow and solve problems. • Syntax highlighting is also common in most IDEs, which uses visual cues to distinguish grammar in the text editor. Multi-Language IDE– • The multi-language IDE such as Eclipse, Aptana, Komodo, NetBeans, and Geany support multiple programming languages. • Eclipse- It supports C++, Perl, Python, Ruby, PHP, Java and others. It is managed and directed by the Eclipse.org Consortium.It is a free and open source editor for many development frameworks. • Aptana- It supports HTML, JavaScript, CSS, AJAX and others through plugins. It is a popular choice for programmers who do web app development. • Komodo- It supports Perl, PHP, Python, Tcl, JavaScript, Ruby etc. • NetBeans- It supports Java, PHP, JavaScript, C, C++, Python, Ruby etc. It is also free and open source. • Geany- It supports C, PHP, Java, HTML, Perl, Python, Pascal etc. Visual Studio– It supports VB.NET, Visual C++, C#, F# and more. Visual Studio is Microsoft's IDE, designed to create apps for the Microsoft platform. MonoDevelop– It supports Visual Basic, C/C++, C#, and additional .NET languages. Coda– Supports PHP, CSS, HTML, JavaScript, AppleScript, and Cocoa API. This IDE is highlighted as "one-window development" for Mac users. Espresso: it supports XML, HTML, CSS, PHP, and JavaScript. Espresso is a tool specifically for Mac web programmers. Why IDE Should be used– The functionality of IDE saves time and makes coding easier . Followings are certain points that specify why to go for IDE. Debugging– It is a tool for monitoring and analyzing the programs and generates the output as specified. The Komodo IDE contains debugging features such as breakpoint control, remote debugging, watching variables, viewing the call stack, etc. Programming Fundamentals Unit Testing– It’s necessary to conduct proper testing for checking the quality of code in the software. We can do the testing with different types of testing software such as PHPUnit, Perl TAP, Python unit test, and Ruby’s rake test to support frameworks for our language. Code Refactoring & Profiling– It allows to change the code globally, which saves time instead of changing the code manually. Code profiling quickly recognizes the congestion by analyzing the code performance based on a function-by-function basis. Source Code Integration– An IDE contains necessary commands such as push, pull/update, commit, history, etc…, that keeps the application up to date with the team and vice versa without using another tool. For example, Komodo IDE supports for Subversion, Mercurial, Git, Perforce, Bazaar, and CVS. Development and Release Tool Integration– The IDE software can easily integrate tools or other systems and allows accessing them easily. Some features include spell-checking, track changes and database integrations with the database explorer. Important facts • A static variable retains its value throughout the file of the program • A continue statement in a while loop shall transfer control to test condition of while loop. • Semantic errors can be detected at both compile time and run-time only. • C was primarily developed as a system programming language. • One of the disadvantages of pass by reference is that the called function may inadvertently corrupt the caller's data and this can be avoided by declaring the formal parameters constant. • Register, Extern and Type def are storage class specifies in C programming language. • The value range for "short" data type in Java is -215 to +215–1. • In java, the "DataInputastream" class is defined in java.io package. • Earlier name of Java programming language was OAK. • Object oriented inheritance models "is a kind of" relationship. • Prepared statement can execute parameterized queries. • The keyword used to transfer control from a function back to the calling function is return. • Java is a platform free language. • Bug means a logical error in a program. • Polymorphism, Data encapsulation and operator over loading is the property of object oriented programming. 85 YCT • The header file iostream.h is included in C++ program to use input/output functions. • Member function of a class in C++ can be called by an object of that class using dot operator. • Relational operator can be overloaded in C++. Virtual class cannot be instantiated. • Reusability of code in C++ program is justified with the inheritance. • Inheriting the attributes of two or more existing classes at same level for defining new class is called as multiple inheritances. • In C++ '?' is a Ternary operator. • New keyword is used for memory allocation in C++. • Destructor destroy the objects when no longer requires. • In C++ virtual function is defined and declared in base class. • Member function with the same name in two different classes in allowed. • Variable, Arrays and class objects can be passed to a function in C++ • "Run time binding" is the term used in C++, its synonym is polymorphism. • Object occupies space in memory during C++ program execution. • C++, Java and small talk are object-oriented programming language. • In C++ information hiding is achieved through data encapsulation. • During program execution in C++, "divide by zero" error can be handled by exception handling. • In C++, the operator overloading is an example of polymorphism. • In (c) language, system level programming can be done easily because it facilitates bit wise operators. • 'Union' in 'c' is used to store different members at same memory location. • fread(), fseek() and ftell() are common functions that are used for direct/random access file in 'c'. • In 'c' language '#' notation is used as preprocessor directive. • 'call by reference' method uses pointers when parameters are passed in functions. • A function of a 'C' program cannot return more than one value. • String is 'C' is a set of 'characters'. • "Continue" keywords in 'C' is used to transfer the control to the beginning of loop. • The execution of a 'C' program starts from main() function. • In 'C' programming language, dynamic memory is allocated using pointers. • A problem whose language is recursion is called decidable. Programming Fundamentals • Throw able is a super class of all errors and exceptions in the Java language • Malloc and Calloc is used for dynamic memory allocation. • Four types of class members in Java script are instance fields, instance, methods, class fields and class methods. • Java provides a monitor like concurrency control for threads synchronization • An exception is caused by a runtime error. • Bit fields can only be declared as a part of structure. • Unsigned int data type is accepted while declaring bitfields. • Runtime polymorphism is achieved by virtual function. • In java the throw keyword is used to generate exception programmatically. • In a multi file program, the default storage class for a function is External. • The purpose of abstract class is to provide an appropriate base class from which other classes can inherit. • Mechanism of deriving a class from another derived class is called as inheritance. • The derive class constructor is responsible for passing the entire test of arguments needed by base class constructors. • Collection of Java is a group of objects. • Java allows programmers to develop the applets, applications and servlets. • Smalltalk is the pure object-oriented language. • Array is a structured data type in C programming language and it may be defined as a finite ordered collection of data items of the same data type. • In C++, a container is a holder object that stores and manipulates a collection of objects. • During a recursive call, all static variables retained form the last execution. • The first and second arguments of open are a character string containing the name of the file and the second agreement is the mode. • The order in which recursive functions are executed is last in first out order. • If only one memory location is to be reserved for a class variable, no matter how many objects are instantiated, then the variable should be declared as static. • LISP programming language provides garbage collection automatically. • Exception handling is a type of forward error recovery mechanism. • Short in 'C' is the qualifier and int is the basic data type. 86 YCT • Function overloading is also similar to constructor overloading. • The concept of OOps that allows compiler to insert arguments in a function call if it is not specified is default arguments. • Pure object oriented languages are Java, Simula, Small talk and Eiffel. • Friend keyword does not appear in the private section of a class. • Function overloading in C++ is a group of function with the same name. • In C++, the default storage class of local variable is auto. • In object-oriented programming using C++ static variable is also called as class variable. • The classes such as anonymous class, nested class and base class are used to create objects. • A class which can inherit the attributes of two or more classes is called multiple inheritance. • The types of constructors are copy constructor, default constructor and parameterized constructor. • Bottom-up approach is generally adopted by C++ programming. • Serialization process takes place automatically by JAVA run time system. • The 'new' operator in JAVA obtains memory for a new variable. • 'This' keyword in JAVA is used to refer to current class object. • Primary constant in 'C' are integer, float and character etc. • scanf() function receives value from the key board. • ?: is a ternary operator. • 'go to' keyword should be avoided as for as possible. • (!) has the highest priority. • Basic run time entities in an object-oriented system are objects. • Examples of OOP language are Ruby, C++ and small talk etc. • <stdio.h> may be written as (in C++) <cstdio>. • In the Java statement import Java. • Lang.Math; math is class. 'Private' fields enjoy highest degree of protection in Java. • A package is a collection of classes and interfaces. • Basic Java language functions are stored in Java.lang package. Math is a member of the Java language package. • Output stream has a method name flush (). • A class that allows only one object of it to be created, is called singleton class. • The concept of Dynamic binding determines method to invoke at runtime. • "Cout" in C++ is an object. Programming Fundamentals • The concept of composition facilitates to use the objects of one class inside another class. • A constructor class member function automatically initializes the data members. • finalize() function is used to perform some action when the object is to be destroyed. • The characteristic of a computer system that is capable of reasoning, learning and problem solving is termed as artificial intelligence. • John McCarthy coined the term "artificial intelligence" and he invented the LISP (list processing) programming language for artificial intelligence. • LISP is expression-based and provides high-level debugging and a convenient macro system. prolog language is related to artificial language. • (.pl) is the extension of prolog source files. SWIprolog is a free implementation of the prolog programming language. • In artificial intelligence, utility-based agents describes high quality behaviors (degree of happiness). • Another name for lazy learning algorithm is k-Nearest Neighbor. • In NLP, the conference resolution is defined as the task of finding all expression that refer to the same entity in a text. • In terms of machine learning the correct full form of ROC curve is receiver operating characteristic curve. • Clustering is an unsupervised machine learning algorithm. • Prediction is the purpose of regression technique in machine learning. • For a given current state and an input symbol, if an automation can only jump to one and only one state then it is a deterministic automaton. • A finite-state machine with no output function at all is known as a semi automation. • Omega geometric does not have probabilistic acceptance while geometric, quantum finite and metric automation do have probabilistic acceptance. • The field that investigates the mechanics of human intelligence is cognitive science. • AI computing focus on knowledge and conventional computing focus on knowledge and conventional computing focus on data and information. The intelligent agents senses through sensors and take actions through actuators. • AO* algorithm is also called as And-or algorithm. • Wumpus world problem is example of reasoning with knowledge. • The process of defining a problem is terms of few steps and then exploring each of the steps further is known as step-wise refinement. • In AI, the problem solving using judgmental or common-sense part is generally known as Heuristic approach. 87 YCT Important Questions Asked in Previous Years Examinations 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12 13. In which year C language was developed? (a) 1972 (b) 1973 (c) 1970 (d) 1971 The person who developed C language is:(a) Dennis Henry (b) Dennis Rossum (c) Dennis Ritchie (d) Bjarne Stroustrup The very first JVM compiler was written in(a) Java language (b) C language (c) C++ language (d) C# language Which of the following is/are feature of c language? (a) Memory management (b) Mid- level (c) Simple (d) All of the above Which of the following is not a correct declaration of variable in C programming language? (a) int X= 2 (b) int X; (c) double = 2.5; (d) char a = 'yct'; The variable declared outside the function or block is known as (a) Local variable (b) Static variable (c) Dynamic variable (d) Global variable An empty data type which has no value is called (a) Basic (b) Derived (c) Void (d) Enumeration Which of the following is used for output and prints the given statement to the console? (a) scanf() (b) printed() (c) printf() (d) clrscr() Which of the following is used for input and reads the input data from the console? (a) scanf() (b) printf() (c) stringf() (d) getch() Which of the following is not a c language keyword? (a) auto (b) case (c) union (d) structured Which of the following header file is used for console input/output functions? (a) studio.h (b) conio.h (c) stdlib.h (d) iostream.h A loop in C statement consists of (a) two parts (b) three parts (c) one parts (d) four parts Which loop in C programming language is called as an " Endlessloop"? (a) while loop (b) do- while loop (c) infinite loop (d) for loop Programming Fundamentals 14. 15. 16. 17. 18. 19. 20. 21. 22. 23. 88 Which of the following statement is true about for loop? (i) It is used in the case where we need to execute some part of the code until the given condition is satisfied. (ii) It is also known as pre-tested loop. (iii) It is also a post- tested loop. (a) (i) & (ii) (b) (ii) & (iii) (c) (iii) only (d) All of the above Which loop does execute the statements inside the body before checking the condition? (a) While loop (b) Do- while loop (c) For loop (d) None of these Which of the following string function is used to reverse the string in C language? (a) Strrev() (b) Strupr() (c) Strrev() (d) strngrv() Which of the following string function is used to return the length of string name in C language? (a) Strreturn() (b) Strlen() (c) Strcmp() (d) Strwr() C++ is an extension of ? (a) C language (b) Jaava language (c) OOPs (d) ADA Which is not a valid access specifier among the following ? (a) protected (b) public (c) derived (d) private RPSC VPITI 2018 (CS) In which year C++ was made available outside Bell Laboratories? (a) 1986 (b) 1981 (c) 1982 (d) 1985 Which of the following is disadvantages of C++? (a) Use of pointers (b) Security issues (c) Code redundancy (d) All of the above Which of the following is not a disadvantage of C++ programming language? (a) Code redundancy (b) Security issues (c) Absence of built-in threads (d) Presence of garbage collector With reference to C ++ programming language, which of the following statement is/are correct? (i) It is object-oriented programming language. (ii) It supports inline function. YCT 24. 25. 26. 27. 28. 29. 30. 31. 32. 33. 34. (iii) It is a high level language. (iv) It is saved with .cpp extension. (a) (i) & (ii) (b) (i) ,(ii)& (iii) (c) (i) & (iii) only (d) All of the above Which of the following is not a keyword in C++ programming language? (a) signed (b) static (c) return (d) constant Which of the following is used for storing text and it contains the collection of characters surrounded by double quotes in C++ ? (a) strings (b) pointers (c) Array (d) None of these Which of the following is collection of different datatypes and similar to the class that holds different types of data in C++? (a) String (b) Structure (c) Pointers (d) Array ………. is a computer utility program that takes one or more object files generated by a compiler and it combines multiple object code and links them with libraries? (a) Loader (b) Linker (c) Compiler (d) Assember Who is known as the father of Java? (a) James Arthur (b) James Gosling (c) Dennis M. Ritchie (d) Bjarne Stroustrup In which year was java language developed? (a) 1995 (b) 1996 (c) 1994 (d) 1990 Java is a (a) Platform- oriented (b) Platform dependent (c) Platform independent (d) None of these Which of the following is a feature of java language? (a) Object- oriented (b) Simple (c) Portable (d) All of the above What is full form of JVM? (a) Java virtual Machine (b) Java volt machine (c) Java vehicle machine (d) Java volatile machine A variable declared inside the class but outside the body of the method, is known as (a) Instance variable (b) Static variable (c) Local variable (d) Global variable The data type that includes Boolean, char , byte, short , int, long float and double is called as (a) Static (b) Non primitive (c) Global (d) Primitive Programming Fundamentals 35. 36. 37. 38. 39. 40. 41. 42. 43. 44. 45. 89 Which of the following is non- primitive data type? (a) String (b) Boolean (c) Char (d) Byte Which of the following does represent floating point data type? (a) Long (b) Double (c) Byte (d) Integer In java programming language the keyword which is used to catch the exceptions generated by try statements? (a) Default (b) Import (c) Catch (d) Package Which of the following keyword is used to indicate that a class is derived from another class or interface? (a) Default (b) Extends (c) Import (d) this The keyword which is used to explicitly throw an exception in java is(a) throw- out (b) throw in (c) throw (d) throw for What is the full form of awt in java? (a) Allow windows toolkit (b) Abstract window toolkit (c) Application window toolkit (d) None of the these Which of the following package is used in Java program to connect databases such as Oracle or Sysbase and retrieving the data from them? (a) Java.awt (b) Java.sql (c) Java.net (d) Java.io Which of the following package does contain the classes such as System, String or String Buffer? (a) Java.lang (b) Java.io (c) Java.util (d) Java.net Which of the following parameters are used to print an argument that is passed to it? (a) String.out.println() (b) System.out.println() (c) Strings.out.printf() (d) Systems.out.println() Which of the following is not a advantages of using packages in Java? (a) Name conflict (b) Reusability (c) Access protection (d) Package destroyer Which of the following components of the .NET framework provide an extensible set of classes which can be used by any .NET compliant programming language? (a) .Net class libraries YCT 46. 47. 48. 49. 50. 51. 52. 53. 54. 55. (b) Common Language Runtime (c) Common Language Infrastructure (d) Common Type System Which of the following constitutes the .NET Framework? 1. ASP.NET Applications 2. CLR 3. Framework Class Library 4. WinForm Applications (a) 1 & 2 (b) 2 & 3 (c) 3 & 4 (d) 2 & 4 Which of the following does execute the actual .Net code? (a) CLS (b) MSIL (c) CTS (d) CLR Common language specification(CLS) (a) is an execution engine for all .Net application (b) is similar to JVM as in Java (c) It defines standard rules for defining .Net compliant languages (d) It is a compiler What is CTS in .NET? (a) defines rules concerning data types (b) defines a set of rules for all compilers to generate manage code for .NET (c) describes a set of features that different languages have in common (d) none of the above Which of the following is not a .NET compatible language? (a) C# (b) J# (c) V(b)NET (d) Java C# is a …… (a) Object-oriented programming language (b) Procedural language (c) It is similar to java programming (d) It doesn't run on .Net framework Who is the founder of C# language? (a) Anders Hejlsberg (b) Mark jukerberq (c) Charles Hawkins (d) Andrew Thomson Which of the following is not feature of C#? (a) Simple (b) Modern (c) Type safe (d) Repetition Which of the following does enable the C# programs to do almost anything that a native C++ application can do? (a) Object-oriented (b) Interoperability (c) Type safe (d) Modern VB.Net stands for (a) Visual Basic.Net (b) Visualisation Basic.Net Programming Fundamentals 56. 57. 58. 59. 60. 61. 62. 63. 64. 65. 90 (c) Volume.Net framework (d) Versatile Basic .Net Which of the following is a very productive tool for rapid creation of a wide range of Web, Windows, Office, and Mobile applications? (a) C++ (b) Java (c) ADA (d) VB.Net What is the full form of CLS? (a) common language specification (b) common language special (c) common language specific (d) common level sense Which of the following is the field of computer science that is associated with the concept of machine "thinking like human" to perform tasks such as learning, problem solving, planning, reasoning and identifying patterns? (a) Human learning (b) Deep learning (c) Machine learning (d) Artificial intelligence Who is known as the father of artificial intelligence? (a) Marvin Minsky (b) John McCarthy (c) Charles Hawkins (d) a & b How many types are artificial intelligence based on capabilities? (a) 3 (b) 5 (c) 7 (d) 6 Which of the following artificial intelligence is based on capabilities? (a) Narrow AI (b) General AI (c) Strong AI (d) All of the above How many types are artificial intelligence based on functionality? (a) 3 (b) 4 (c) 6 (d) 8 Which of the following artificial intelligence is based on functionality? (a) Reactive machine (b) Limited memory (c) Theory of mind & self awareness (d) All of the above Which of the following artificial intelligence is called as weak artificial intelligence? (a) Narrow AI (b) General AI (c) Strong AI (d) None of these ............. artificial intelligence is an artificial intelligence construct that has mental capabilities and functions that mimic the human brain. (a) Theory of mind (b) Strong (c) General (d) Narrow YCT 66. 67. 68. 69. 70. 71. 72. 73. 74. What is the full form of EGAN? (a) Evolution general advisory network (b) Evolutionary genetics advance network (c) Evolutionary generative adversial networks (d) Evolution generated advisory networks Which of the following learns to make better predictions through repeated trial- and- error? (a) Reinforcement learning (b) Deep learning (c) Machine learning (d) NLP Which agent does use cameras and infrared radars as sensors to record information from environment and use reflex motors as actuators to deliver output back to the environment? (a) Human agent (b) Robotic agent (c) Software agent (d) Utility based agent Which one of the following is used in machine learning and artificial intelligence when it is impractical to solve a particular problem with a step by step algorithm? (a) Heuristic approach (b) Knowledge based agent (c) Pattern recognition (d) Condition action rule ……….is a method that is used by an AI entity to understand a certain string of data to find sequence of pattern from it. (a) Inference rule (b) Pattern matching (c) Heuristic algorithm (d) Natural learning process Which of the following programming languages is related to AI (Artificial Intelligence) development? (a) C language (b) C++ language (c) Java language (d) Prolog language RPSC Lect. 2011 Another name for lazy learning algorithm is: (a) K-Nearest Neighbor (b) Regression (c) Classification (d) Neural Networks APPSC Poly. Lect. 13.03.2020 Which is the correct full form of LISP from below? (a) Language Processing (b) List Processing (c) Language Inspection (d) Linguistics Programming APPSC Poly. Lect. 13.03.2020 Which among the following options is NOT true with regard to NLP? (a) NLP is predictable Programming Fundamentals 75. 76. 77. 78. 79. 80. 81. 91 (b) NLP may require more keystrokes (c) It is very time-efficient (d) NLP helps computers to communicate with humans in their languages APPSC Poly. Lect. 13.03.2020 The characteristic of a computer system that is capable of reasoning, learning and problem solving is termed as : (a) artificial intelligence (b) human intelligence (c) virtual intelligence (d) common intelligence APPSC Poly. Lect. 13.03.2020 In artificial intelligence, which among the following agents describes high quality behaviour (degree of happiness) (a) goal-based agents (b) simple reflex agents (c) utility-based agents (d) agents that keep track of the world APPSC Poly. Lect. 13.03.2020 Who among the following is known as the inventor of LISP? (a) John McCarthy (b) Alan Turing (c) John Backus (d) Marvin Minsky APPSC Poly. Lect. 13.03.2020 What will be the correct output of the below line when executed in LISP? (write-line "Welcome to \ "Park\"") (a) "Welcome to "Park" (b) Welcome to "Park" (c) "Welcome to Park" (d) Welcome to \"Park\" APPSC Poly. Lect. 13.03.2020 Which of the following statements is NOT true about LISP? (a) It is machine-dependent (b) It is expression-based (c) It provides a convenient macro system (d) It provides high-level debugging APPSC Poly. Lect. 13.03.2020 What is the extension of Prolog source files? (a) .pl (b) .lg (c) .lsp (d) .pg APPSC Poly. Lect. 13.03.2020 Which of the following is a free implementation of the programming language Prolog? (a) CLISP (b) LNU-Prolog (c) SWING-Prolog (d) SWI-Prolog APPSC Poly. Lect. 13.03.2020 YCT 82. 83. 84. 85. 86. 87. 88. In NLP, the Co-reference resolution is defined as the: (a) task anaphora resolution (b) task of determining a computer's logic (c) task of machine translation (d) task of finding all expression that refer to the same entity in a text APPSC Poly. Lect. 13.03.2020 In terms of machine learning, the correct full form of ROC curve is: (a) Receiver Operating Characteristic curve (b) Revised Operating Characteristic curve (c) Recall Operation Characteristic curve (d) Represent Operating Characteristic curve APPSC Poly. Lect. 13.03.2020 Which of the following is an unsupervised machine learning algorithm? (a) Clustering (b) Decision Trees (c) K-Nearest Neighbour (d) Naive Bayes APPSC Poly. Lect. 13.03.2020 What is the purpose of regression technique in machine learning? (a) Prediction (b) Classification (c) Clustering (d) Reinforcement APPSC Poly. Lect. 13.03.2020 For a given current state and an input symbol, if an automaton can only jump to one and only one state then it is a (a) Nondeterministic automaton (b) Deterministic automaton (c) Alternation (d) Semi automaton UPPCL AE 2014 A finite-state machine with no output function at all is known as (a) a null automation (b) A full automation (c) a dummy automation (d) a semi automation UPPCL AE 2014 Which of the following does not have probabilistic acceptance? (a) omega automation (b) geometric automation (c) quantum finite automation (d) metric automation UPPCL AE 2014 Programming Fundamentals 89. 90. 91. 92. 93. 94. 95. 96. 92 The field that investigates the mechanics of human intelligence is (a) Artificial science (b) Cognitive science (c) Psychology (d) Sociology APPSC Lect. Degree College 07.06.2017 (CS) AI computing focus on --------and conventional computing focus on --------- and (a) data, information, knowledge (b) information, data, knowledge (c) knowledge, data, information (d) None of the given options APPSC Lect. Degree College 07.06.2017 (CS) The intelligent agents senses through ............ and take actions through (a) sensors, actuators (b) remote, signals (c) sensors, actuators and remote, signals (d) None of the given options APPSC Lect. Degree College 07.06.2017 (CS) A* Algorithm uses --------- heuristic function to search any goal node (a) admissible function (b) fitness number (c) evaluation function (d) None of the given options APPSC Lect. Degree College 07.06.2017 (CS) An algorithm, if it is guaranteed to return an optimal solution if it exists, is known as (a) admissible (b) heuristic (c) optimistic (d) cognitive APPSC Lect. Degree College 07.06.2017 (CS) AO* Algorithm is also known as (a) Admissible optimal algorithm (b) Accurate optimistic algorithm (c) And-or algorithm (d) None of the given options APPSC Lect. Degree College 07.06.2017 (CS) Wumpus World problem is example of: (a) single player game (b) two player game (c) reasoning with knowledge (d) knowledge based game (e) natural language processing CGPSC Asstt. Prof. 2014 (IT) Most commonly used language for Artificial Intelligence programming is: (a) C (b) C++ (c) LISP (d) PASCAL UPSC Poly Lect. 10.03.2019 YCT 97. The process of defining a problem is terms of few steps and then exploring each of the steps further is known as (a) step- wise refinement (b) modularization (c) Integration (d) Divide and Conquer TSPSC Manager 2015 98. In AI, the problem solving using judgmental or common-sense part is generally known as ____ approach. (a) Depth-first-search (b) Random (c) Heuristic (d) Breadth-first-search APPSC Lect. Degree College 16.09.2020 99. Who coined the term "artificial intelligence"? (a) Alan Turing (b) John McCarthy (c) Bill Gates (d) Tim Berners Lee APPSC Lect. Degree College 16.09.2020 100. Who invented the LISP programming language for artificial intelligence? (a) Tim Berners Lee (b) Dennis Ritchie (c) Alan Turing (d) John McCarthy APPSC Lect. Degree College 16.09.2020 101. Which of the following option is not a type of learning? (a) supervised learning (b) unsupervised learning (c) reinforcement learning (d) semi unsupervised learning 102. Which of the following is a widely used and effective machine learning algorithm based on the idea of bagging? (a) Regression (b) Classification (c) Decision Tree (d) Random Forest 103. Machine learning algorithms build a model based on sample data, which is known as (a) Training Data (b) Transfer Data (c) Data Training (d) All of the above 104. Machine learning is a subset of (a) Artificial intelligence (b) Non machine learning (c) deep learning (d) data bundling 105. A Machine Learning technique which helps in detecting the outliers in data. (a) Clustering (b) Classification (c) Anamoly Detection (d) All of the above 106. Who is the father of Machine Learning? (a) John McCarthy (b) Brown Chaucer (c) Geoffrey Everest Hinton (d) None of the above Programming Fundamentals 107. In language understanding, the levels of knowledge that does not include? (a) Empirical (b) Logical (c) Phonological (d) Syntactic 108. What kind of learning algorithm is for “Facial identities or facial expressions”? (a) Prediction (b) Recognition Patterns (c) Recognition trend (d) Mind reading 109. FIND-S algorithm ignores (a) Negative (b) Positive (c) Both Negative & Positive (d) None of the above 110. The general tasks that are performed with back propagation algorithm is(a) Pattern mapping (b) Prediction (c) Function approximation (d) All of the above 111. Bayes rule can be used for:(a) Solving queries (b) Increasing complexity (c) Answering probabilistic query (d) Decreasing complexity 112. What is the full form of MDL? (a) Minimum Description Length (b) Maximum Description Length (c) Minimum Domain Length (d) None of the above 113. PAC stand for (a) Probably Approximate Correct (b) Probably Approx Coding (c) Probably Approximate Computation (d) Probably Approx Computation 114. Application of CBR is (a) Design (b) Planning (c) Diagnosis (d) All of these 115. The full form of ILP is(a) Intriguing Logical programming (b) Inductive Logic Programming (c) Introductory Logical Program (d) Inductive Logic Program 116. For what artificial neural network is used ? (a) Pattern Recognition (b) Classification (c) Clustering (d) All Answer 93 YCT 117. What is required to make probabilistic systems feasible in the world? (a) Reliability (b) Crucial robustness (c) Feasibility (d) None of these 118. Learning symbolic representations of concepts is called as: (a) Artificial Intelligence (b) Machine Learning (c) Both a & b (d) None of the above 119. The autonomous acquisition of knowledge through the use of computer programs is called(a) Artificial Intelligence (b) Machine Learning (c) Deep learning (d) NLP 120. The field of study that gives computers the capability to learn without being explicitly programmed(a) Machine Learning (b) Artificial Intelligence (c) Deep Learning (d) Both a & b 121. What are the types of learning used in machine? (a) Supervised (b) Unsupervised (c) Reinforcement (d) All of the above 122. A model can learn based on the rewards it received for its previous action is called as: (a) Supervised learning (b) Unsupervised learning (c) Reinforcement learning (d) Concept learning 123. Which of the following statement is correct regarding python programming language? (a) It is a general purpose, dynamic, high-level and interpreted language. (b) It supports an object- oriented programming approach. (c) It is used in web development and data science and so on. (d) All of the above 124. Who developed python programming language? (a) Guido van Rossum (b) Guido tan Rossum (c) Guido san Rossum (d) Guido Henry Rossum Programming Fundamentals 125. When for the first time python was released on? (a) February 24,1991 (b) February 25,1991 (c) February 28,1991 (d) February 27,1991 126. Which of the following is not a disadvantage of Python? (a) Not memory efficient (b) Weak in mobile computing (c) Database Access (d) Free and open- source 127. Which of the following is keyword in python programming language? (a) False (b) Await (c) Pass (d) all of the above 128. Which of the following is not a keyword in python programming language? (a) While (b) As (c) Short (d) From 129. In python programming language, a string variable can be declared either by using (a) Single quote (b) Double quotes (c) Both (d) None of these 130. In which conversion, python automatically converts one data type to another datatype? (a) Implicit (b) Explicit (c) Both (d) None of these 131. How many types are namespaces in java programming language? (a) 4 (b) 5 (c) 3 (d) 2 132. Which of the following namespace does include functions and exception names that are built-in in python programming? (a) Global namespace (b) Built-in namespace (c) Local namespace (d) User defined namespaces 133. Which of the following statements is/are correct in the context of generators in python? (a) Python generators are a simple way of creating iterators. (b) It is a special type of function which does not return a single value, instead,it returns an iterator object with a sequence of values. (c) In a generator function, a yield statement is used rather than a return statement. (d) All of the above 134. The blockchain technology was first outlined in……… (a) 1990 (b) 1991 (c) 1992 (d) 1994 94 YCT 135. Who for the first time outlined the blockchain technology? (a) Stuart Haber (b) W.Scott (c) Both (d) None of these 136. Blockchain technology is also known as (a) Distributed ledger technology (b) Destroyed ledger technology (c) Distributed longer technology (d) Doorstep ledger technology 137. Which concept was introduced to verify computational effort and deter cyberattacks? (a) Proof -of -work (b) Proof of woe (c) Proof of worth (d) Proof of waste 138. Which of the following mechanism is used to prevent bad actors from validating bad transactions? (a) Proof-of- work (b) Proof- of- stake (c) Both (d) None of these 139. Which of the following is not a drawback of blockchain technology? (a) Scalability (b) Storage (c) Privacy (d) Traceability 140. Which of the following is not a benefit of blockchain technology? (a) Enhanced security (b) Regulation (c) Reduced cost (d) True traceability 141. Which of the following is the best blockchain platforms that is used in almost any kind of sector? (a) Ethereum (b) Hyperledger (c) R3 Corda (d) Quoram 142. Which type of blockchains are only partially decentralized because public access to these blockchains is restricted? (a) Hybrid (b) Public (c) Private (d) Consortium 143. Which blockchain are permissionless in nature and allow anyone to join and are completely decentralized? (a) Public (b) Private (c) Hybrid (d) Consortium 144. Which of the following is correct option regarding Blockchain? (a) A blockchain is a centralized digital ledger consisting of records called blocks. b) A blockchain is a decentralized, distributed, digital ledger consisting of records called blocks. (c) A blockchain is a digital database consisting of records called class. (d) None of the above Programming Fundamentals 145. Proof of Stake is __________. (a) A transaction and block verification protocol (b) A certificate required to use the blockchain (c) Both A and B (d) None of the above 146. Which of the following is the part of asymmetric encryption? (a) Public key (b) Private Key (c) Passphrase (d) All of the above 147. The full form of UTXO is(a) Unspent Transaction Office (b) United Transaction Office (c) United Transaction Output (d) Unspent Transaction Output 148. The process of creating new bitcoins is called as(a) Financing (b) Sourcing (c) Mining (d) None of the above 149. The type of ledger present in Blockchain is. (a) Distributed Ledger (b) Decentralized Ledger (c) Both A and B (d) None of the above 150. How many pillars do a Blockchain technology have ? (a) 3 (b) 5 (c) 10 (d) 21 151. Blockchain was invented in (a) 2010 (b) 2007 (c) 2008 (d) 2009 152. The research paper that brought Bitcoin to the world is called as(a) Black Paper (b) Green Paper (c) Blue Paper (d) White Paper 153. Who created Bitcoin ? (a) John Mcafee (b) Satoshi Nakamoto (c) Elon musk (c) Mc Garth 154. Blockchain is a type of .,...... (a) View (b) Table (c) Entity (d) Database 155. A hybrid blockchain is a combination of which features? (a) Centralized (b) Decentralized (c) Both Centralized & Decentralized (d) None of above 95 YCT 156. What are the four types of Blockchain networks? A) Public blockchains B) Private blockchains (c) Consortium & Hybrid blockchains (c) All of the Above 157. Who developed the concept of OOP? (a) Andrea Ferro (b) Ellon Musk (c) Alan Kay (d) Dennis Ritchie 158. Which of the following is not a feature of OOP in general definitions? (a) Efficient Code (b) Code reusability (c) Modularity (d) Duplicate data 159. Which was the first purely object oriented programming language developed? (a) Python (b) SmallTalk (c) Java (d) C++ 160. When did the concept of OPP first came into picture? (a) 1980’s (b) 1995 (c) 1970’s (d) 1990 161. The feature of OOP that indicates code reusability? (a) Data hiding (b) Polymorphism (c) Encapsulation (d) Inheritance 162. Which among the following doesn’t come under OOP concept? (a) Data hiding (b) Message passing (c) Platform independent (d) Polymorphism 163. The feature by which one object can interact with another object is: (a) Data encryption (b) Message Passing (c) Data transmission (d) Data binding 164. In multilevel inheritance, which of the following is the most significant feature of OOP that is used? (a) Code modularity (b) Code readability (c) Flexibility (d) Code reusability 165. What is an abstraction in object-oriented programming? (a) to hide the implementation and showing only the features (b) hiding the external data (c) hiding the implementation (d) Showing the raw data Programming Fundamentals 166. Which among the following shows the correct constructor? (a) –yctname() (b) yctname() (c) ()yctname (d) ~yctname() 167. Which of the following is not a property of an object? (a) Properties (b) identify (c) Identity (d) Attributes 168. Which of the following does support the single level inheritance? (a) Redundant data (b) Multiple inheritance (c) Compile time (d) Runtime 169. Which of the following keyword is used to declare virtual functions? (a) ~virtual (b) virtua.text (c) virtual (d) virtual_(); 170. Where does the memory allocate for the objects? (a) Cache (b) ROM (c) RAM (d) Hard Disk 171. Which feature of object oriented programming is exhibited by the function overriding? (a) Message passing (b) Polymorphism (c) Abstraction (d) Inheritance 172. Which keyword is used to declare static variables? (a) const (b) struct (c) static (d) enum 173. Which among the following is not a required condition for constructors? (a) Its name must be same as that of class (b) It must not have any return type (c) It must contain a definition body (d) It can contain arguments 174. Instance of which type of class can’t be created? (a) Parent class (b) Abstract class (c) Anonymous class (d) Nested class 175. Which feature of OOP can be implemented using encapsulation? (a) Polymorphism (b) Overriding (c) Inheritance (d) Abstraction 176. Which programming language does restrict the use of multiple inheritance? (a) C++ (b) PHP (c) COBOL (d) Java 96 YCT 177. Which of the following principles states that high level modules should not depend on low level modules; both should depend on abstractions? (a) Dependency Inversion Principle (b) Interface segregation principle (c) Refactoring principle (d) Separation of concerns principle 178. Which one of the following principles arises from extreme programming that states a programmer should not add functionality until deemed necessary? (a) Open/Closed (b) Single responsibility (c) Write DRY code (d) YAGNI 179. What is the full form of KISS? (a) Keep it solid, stupid (b) Keep it simple, stupid (c) Keep it simple with stupidity (d) Keep it simple or stupid 180. In write DRY code , what is the meaning of DRY? (a) Don't repeat yourself (b) Do respect yourself (c) Do repeat yourself (d) Don't reveal yourself 181. The principle which state that a module should be open for extension but closed for modification is (a) Interoperability (b) Open/ Closed (c) Single immutable (d) Refactoring 182. Which principle is a systematic process of improving code without creating new functionality? (a) Single responsibility (b) Refactoring (c) Composition over inheritance (d) KISS 183. It is the process of changing a software system in such a way that it doesn't change the external behavior of code and yet improves its internal structure. Which principle the above statement demonstrates ? (a) Refactoring (b) Keep it simple, stupid (c) Write DRY code (d) Separation of concerns Programming Fundamentals 184. XP co-founder Ron Jeffries has written: "Always implement things when you actually need them, never when you just foresee that you need them." Which programming principle does it indicate? (a) Write DRY code (b) YAGNI (c) KISS (d) Interface segregation 185. Which of the following statements are correct in the context of integrated development environment? (i) Integrated development environment are applications that facilitates the development of other applications. (ii) It provides a central interface with any tools which appears convenient for developer to use. (iii) An IDE typically may not have source code editor, local build automation and debugger. (a) (i) & ( ii) (b) (i) , ( ii) & (iii) (c) (i) & ( iii) (d) None of the above 186. Which of the following is not a type of integrated development environment? (a) Multi-language (b) Visual Studio (c) Mono develop (d) All of the above 187. The example of multi-language IDE are (a) Aptana(b) Komodo (c) NetBeans (d) All of the above 188. Which of the following language does Espresso not support? (a) XML (b) HTML (c) CSS (d) C++ 189. An integrated development environment that contains necessary commands such as push, pull/update, commit, history is known as (a) Release tool integration (b) Code refactoring (c) Defining errors (d) Source code integration 190. Which of the following is necessary to conduct proper testing for checking the quality of code in the software? (a) Code refactoring (b) Debugging (c) Unit testing (d) Code testing 97 YCT 191. With reference to benefits of using IDEs , hich of the following is not correct? (a) It improve developers productivity (b) It keeps developers up to date with the latest practices and threats (c) It helps developers to organize their workflow and solve problems. (d) Syntax highlighting is not common in most IDEs. 192. A continue statement in a while loop shall (a) transfer control to statement just before while loop (b) transfer control to first statement of while loop (c) transfer control to last statement of while loop (d) transfer control to test condition of while loop RPSC Lect. 2011 193. Consider following statement int a, b, c; b = ∼ a; c = b ++; (a) c is 1's complement of a (b) c is always 0 (c) c is 2's complement of a (d) c is always 1 RPSC Lect. 2011 194. A static variable (a) can not be initialized (b) is initialized once at the commencement of execution and can not be changed at run time (c) retains its value throughout the file of the program (d) is same as an automatic variable but is placed at the end of a program RPSC Lect. 2011 195. Semantic errors can be detected at (a) compile time only (b) run-time only (c) both compile time and run-time only (d) none of these RPSC Lect. 2011 196. Object oriented programmers primarily focus on (a) procedure to be performed (b) the step by step statements needed to solve a problem (c) the physical orientation of objects within a program (d) objects and the tasks that must be performed with those objects RPSC Lect. 2011 Programming Fundamentals 197. One of the disadvantages of pass by reference is that the called function may inadvertently corrupt the caller’s data. This can be avoided by (a) passing pointers (b) declaring the formal parameters constant (c) declaring the actual parameters constant/ (d) All of the above UPPSC LT GRADE 29.07.2018 198. C was primarily devolved as a (a) system programming language (b) general purpose language (c) data processing language (d) None of the above UPPSC LT GRADE 29.07.2018 199. Which of the following is not a storage class specifier in C programming language? (a) Register (b) Volatile (c) Extern (d) Typedef UPPSC LT GRADE 29.07.2018 200. What does the following C statement mean? scanf(“%4s”, str); (a) Read exactly 4 characters from console (b) Read maximum 4 characters from console (c) Read a string in multiples of 4 (d) None of the above UPPSC LT GRADE 29.07.2018 201. What is the meaning of the following declaration in C programming language? Int(*p)[5]; (a) It will result in compile error because there should not be any parenthesis, i.e., “int *p[5]” is valid (b) p is a pointer to 5 integers (c) p is a pointer to integer array (d) p is a pointer to an array of 5 integers UPPSC LT GRADE 29.07.2018 202. Which of the following is NOT true about the 'THIS' keyword in Java? (a) It can be used to refer instance variable of current class (b) It can be passed as argument in the constructor call (c) It can be passed as an argument in the method call (d) It cannot be used to invoke or initiate current class constructor APPSC Lect. Degree College 16.09.2020 203. What is the value range for "short" data type in Java? (b) –216 to +216 (a) –215 to +215 16 16 (c) –2 to +2 –1 (d) –216 –1 to +216–1 (e) –215 to +215–1 CGPSC Asstt. Prof. 2014 (IT) 98 YCT 204. In Java, which of the following method of a user-defined "Matrix" class can be overridden to print the matrix in a proper format (rowcolumn format) after passing an object of the "matrix" to system.out.print1n( ) method? (a) string() (b) toString() (c) toPrint() (d) Constructor method (e) Copy constructor CGPSC Asstt. Prof. 2014 (IT) 205. In Java, the "DataInputStream" class is defined in .......... package. (a) java.lang (b) java.util (c) java.in (d) java.io (e) java.out CGPSC Asstt. Prof. 2014 (IT) 206. Earlier name of Java programming language was: (a) OAK (b) D (c) Netbean (d) Eclipse NIELIT Scientists-B 04.12.2016 (CS) 207. Give the Output #include >iostream> using namespace std; class Base1 { public: ∼Base1() { cout << “ Base1’s destructor” << endl;} }; class Base2 { public: ∼Base2() { cout << “ Base1’s destructor” << endl;} }; Class Derived: public Base 1, public Base2{ public; ∼Derived() {cout << “Derived’s destructor” <<endl;} }; int main() { Derived d; return 0; } (a) Base1’s destructor Base2’s destructor Derived’s destructor (b) Derived’s destructor Base2’s destructor Base1’s destructor (c) Derived’s destructor (d) Compiler Dependent NIELIT Scientists-B 22.07.2017 (IT) Programming Fundamentals 208. Which of the following is/are true about packages in Java? 1. Every class is part of some package. 2. All classes in a file are part of the same package. 3. If no package is specified, the classes in the file go into a special unnamed package. 4. If no package is specified, a new package is created with folder name of class and the class is put in this package. (a) Only 1, 2 and 3 (b) Only 1, 2 and 4 (c) Only 4 (d) Only 1 and 3 NIELIT Scientists-B 22.07.2017 (IT) 209. Which of the following is FALSE about abstract classes in Java? (a) If we derive an abstract class and do not implement all the abstract methods, then the derived class should also be marked as abstract using ‘abstract’ keyword. (b) Abstract classes can have constructors. (c) A class can be made abstract without any abstract without any abstract method. (d) A class can inherit from multiple abstract classes. NIELIT Scientists-B 22.07.2017 (IT) 210. Object oriented inheritance models: (a) "is a kind of" relationship (b) "has a" relationship (c) "want to be" relationship (d) "contains" of relationship NIELIT Scientists-B 04.12.2016 (CS) 211. Which type of Statement can execute Parameterized queries? (a) PreparedStatement (b) ParameterizedStatement (c) ParameterizeStatement and CallableStatement (d) All kind of Statements NIELIT Scientists-B 04.12.2016 (CS) 212. An operation can be described as: (a) Object behavior (b) Functions (c) Class behavior (d) (A),(B) NIELIT Scientists-B 04.12.2016 (CS) 213. The keyword used to transfer control from a function back to the calling function is: (a) switch (b) go to (c) go back (d) return NIELIT Scientists-B 04.12.2016 (CS) 214. What is the meaning of following declaration? int(*p[7])(); (a) p is pointer to function. (b) p is pointer to such function which return type is array. (c) p is array of pointer to function. 99 YCT 215. 216. 217. 218. 219. 220. 221. (d) p is pointer to array of function. i = 0; NIELIT Scientists-B 04.12.2016 (CS) for (j = –3; J <= 3; j++) Which of the following is a platform free { language? if ((j >= 0) && (i++)) (a) JAVA (b) C count = count + j; (c) Assembly (d) Fortran } NIELIT Scientists-B 04.12.2016 (CS) count = count + i; An object can have which of the following printf("%d", count); multiplicities? return 0; (a) Zero (b) More than one } (c) One (d) All of the above Which one of the following options is correct? NIELIT Scientists-B 04.12.2016 (CS) (a) The program will not compile successfully. Given a class named student, which of the (b) The program will compile successfully and following is a valid constructor declaration for output 10 when executed. the class? (c) The program will compile successfully and (a) Student student ( ){ } output 8 when executed. (b) Private final student ( ){ } (d) The program will compile successfully and (c) Student (student s) { } output 13 when executed. (d) Void student ( ){ } GATE 2021 (Shift-I) NIELIT Scientists-B 04.12.2016 (CS) 222. Consider the following C functions. Bug means int fun1(int n) { int fun2(int n) { (a) A logical error in a program static int i = 0; static int i = 0; (b) A difficult syntax error in a program if (n > 0) { if (n > 0) { (c) Documenting programs using an efficient ++i; i = i + fun1(n); documentation tool fun1(n–1); fun2(n–1); (d) All of the above } } NIELIT Scientists-B 22.07.2017 (CS) return(i); return(i); What will be output if you will compile and } } execute the following c code? The return value of fun2(5) is ________. void main ( ){ printf("%d",sizeof(5.2)); (a) 55 to 35 (b) 50 to 55 } (c) 55 to 55 (d) 55 to 56 (a) 4 (b) 8 (c) 2 (d) 16 GATE 2020 223. Consider the following C program. NIELIT Scientists-B 04.12.2016 (IT) #include < stdio.h> What will be output if you will compile and execute the following c code? int main ( ) { void main ( ) { int m = 10 ; char c=125; int n, n1 ; c=c+10; n = ++m; printf("%d",c); n1 = m++; } n––; (a) 135 (b) 115 – – n1 ; (c) –121 (d) –8 n – = n1; NIELIT Scientists-B 04.12.2016 (IT) printf ("%d" , n) ; Consider the following ANSI C program. return 0 ; #include <stdio.h> } int main() The output of the program is_______. { GATE 2017 (Shift-II) int i, j, count; (a) 0 (b) 45.03 count = 0; (c) 52.40 (d) 81.15 Programming Fundamentals 100 YCT 224. Consider the following C program. #include<stdio.h> #include<string.h> int main ( ) { char* c = "GATECSIT2017" char* p = c ; printf ("%d" , (int) strlen (c+2 [p] –6 [p] – 1)) ; return 0 ; The output of the program is_________. GATE 2017 (Shift-II) (a) 0 (b) 45.23 (c) 2.04 (d) 2.0 to 2.0 225. Which of the following is the property of object oriented programming? (a) Polymorphism (b) Data encapsulation (c) Operator overloading (d) All options are correct MPPSC State Forest Service Examination 2014 226. The header file iostream.h is included in C++ program to use (a) return() (b) Input/output functions (c) main() (d) Run operation MPPSC State Forest Service Examination 2014 227. In C++, size of character array should be _____ the number of characters in the string (a) One larger than (b) One less than (c) Two larger than (d) Two less than MPPSC State Forest Service Examination 2014 228. Member function of a class in C++ can be called by an object of that class using (a) Dot operator (b) Ternary operator (c) Relational operator (d) Scope resolution operator MPPSC State Forest Service Examination 2014 229. Which of the following is an insertion operator in C++? (a) >> (b) & (c) << (d) ! MPPSC State Forest Service Examination 2014 230. What value is displayed in the following C++ example? Float fees [5] = {32.15, 45.23, 52.43, 82.15, 97.05}; Cout << fees [2]; (a) 0 (b) 45.23 (c) 52.43 (d) 82.15 MPPSC State Forest Service Examination 2014 Programming Fundamentals 231. Which of the following operators can be overloaded in C++ (a) Relational operator (b) Dot operator (c) Scope resolution operator (d) Point to member operator MPPSC State Forest Service Examination 2014 232. ‘In-line’ function may not work when (a) Function contains static variable (b) Function is recursive (c) Function not returning value, if a return exists (d) All options are correct MPPSC State Forest Service Examination 2014 233. Inheriting the attributes of two or more existing classes at same level for defining new class is known as (a) Multilevel inheritance (b) Multiple inheritance (c) Hybrid inheritance (d) All options are correct MPPSC State Forest Service Examination 2014 234. Reusability of code in C++ programs is justified with the following feature (a) Information binding (b) Data abstraction (c) Data encapsulation (d) Inheritance MPPSC State Forest Service Examination 2014 235. Which class cannot be instantiated? (a) Inherited class (b) Public class (c) Private class (d) Virtual class MPPSC State Forest Service Examination 2014 236. In C++, “?” is a: (a) Unary operator (b) Binary operator (c) Ternary operator (d) None of these MPPSC State Forest Service Examination 2014 237. Which one of the following keywords is used for memory allocation in C++? (a) Malloc (b) Calloc (c) New (d) Free MPPSC State Forest Service Examination 2014 238. Which statement is true about destructor in C++? (a) Destroy the objects when no longer requires (b) Create and use constant objects (c) Used in classes to display the class contents (d) All options correct MPPSC State Forest Service Examination 2014 239. In C++, virtual function is defined and declared in (a) Derived class (b) Base class (c) Derived object (d) Destructor MPPSC State Forest Service Examination 2014 101 YCT 240. In C++, member function with the same name in two different classes is (a) Not allowed (b) Allowed (c) Only if the two classes have same name (d) Both (Not allowed) and (Only if the two classes have same name) MPPSC State Forest Service Examination 2014 241. Which of the following cannot be passed to a function is C++? (a) Variable (b) Arrays (c) Class objects (d) Header files MPPSC State Forest Service Examination 2014 242. “Run time binding” is the term used in C++, its synonym is (a) Virtual function (b) Instantiation (c) Polymorphism (d) None of these MPPSC State Forest Service Examination 2014 243. Which entity occupies space in memory during C++ program execution? (a) Class (b) Virtual class (c) Public class (d) Object MPPSC State Forest Service Examination 2014 244. Which language is not an object oriented programming language? (a) C++ (b) Java (c) Small talk (d) C MPPSC State Forest Service Examination 2014 245. In C++, information hiding is achieved through (a) Polymorphism (b) Type Conversion (c) Data encapsulation (d) None of these MPPSC State Forest Service Examination 2014 246. During Program execution in C++, “divide by Zero” error can be handled by (a) Polymorphism (b) Data encapsulation (c) Exception handling (d) None of these MPPSC State Forest Service Examination 2014 247. The feature supported by inheritance in C++ is (a) Characteristics of super class are inherited to subclass (b) Member functions are inherited at subclass (c) Member functions can be redefining at subclass (d) All options are correct MPPSC State Forest Service Examination 2014 Programming Fundamentals 248. In C++, the operator overloading is an example of (a) Polymorphism (b) Inheritance (c) Encapsulation (d) Data hiding MPPSC State Forest Service Examination 2014 249. Which of the following is object oriented programming language? (a) C (b) Pascal (c) COBOL (d) C++ MPPSC State Forest Service Examination 2014 250. In ‘C’ language, System level programming can be done easily because it facilitates (a) Binary operators (b) Bit wise operators (c) Logical operators (d) None of these MPPSC State Forest Service Examination 2014 251. union in ‘C’ is (a) Used to store different members at same memory location (b) A primitive data type (c) A text file (d) A variable of long integer type MPPSC State Forest Service Examination 2014 252. Commonly used function for direct/random access file in ‘C’ is (a) fread() (b) fseek() (c) ftell() (d) All options are correct MPPSC State Forest Service Examination 2014 253. In ‘C’ which notation used as preprocessor directive? (a) % (b) || (c) # (d) ! MPPSC State Forest Service Examination 2014 254. When parameters are passed in functions of a ‘C’ program, which method uses pointers? (a) Call by value (b) Call by reference (c) Call by return (d) None of these MPPSC State Forest Service Examination 2014 255. A function of a ‘C’ program cannot return more than (a) One value (b) Two values (c) Three values (d) Four values MPPSC State Forest Service Examination 2014 256. Which of the following C statement is used to print the values of a, b and c? int a = 27 float b = 5.14; double c = 5.24; (a) printf(“%d%f%f ”, a, b, c); (b) printf(“%d%f%lf ”, a, b, c); (c) printf(“%d%f% d ”, a, b, c); (d) printf(“%lf%f%f ”, a, b, c); MPPSC State Forest Service Examination 2014 102 YCT 257. String in ‘C’ is a set of_____ (a) Numbers (b) Characters (c) Floating point numbers (d) None of these MPPSC State Forest Service Examination 2014 258. “Continue” keywords in ‘C’ is used to transfer the control to the beginning of (a) loop (b) program (c) if statement (d) main() function MPPSC State Forest Service Examination 2014 259. Which of the following is the default return type of a function in ‘C’? (a) float (b) int (c) char (d) void MPPSC State Forest Service Examination 2014 260. The execution of a ‘C’ program starts from (a) scanf() function (b) main() function (c) library function (d) do-while loop MPPSC State Forest Service Examination 2014 261. In ‘C’ Programming language, dynamic memory is allocated using (a) Structures (b) Arrays (c) Pointers (d) Queues MPPSC State Forest Service Examination 2014 262. Which one of the following is correct about the statements given below? I. All function calls are resolved at compiletime is C language. II. All function calls are resolved at compiletime in C++. (a) Only II is correct (b) Both I and II are correct (c) Only I is correct (d) Both I and II are incorrect ISRO Scientist/Engineer 2016 (July) 263. What will be output of following program? Assume that you are running this program in little- endian processor. #include<stdio.h> int main ( ) { short a= 320; char * ptr; ptr = (char *)&a; printf ("%d",*ptr); return 0; } (a) 1 (b) 320 (c) 64 (d) Compilation Error ISRO Scientist/Engineer 2016 (July) Programming Fundamentals 264. A problem whose language is recursion is called? (a) Unified problem (b) Boolean function (c) Recursive problem (d) Decidable ISRO Scientist/Engineer 2011 265. The feature in object- oriented programming that allows the same operation to be carried out differently, depending on the object is (a) Inheritance (b) Polymorphism (c) Over functioning (d) Overriding ISRO Scientist/Engineer 2009 266. Which of these is a super class of all errors and exceptions in the Java language? (a) Run Time Exceptions (b) Throwable (c) Catchable (d) None of the above ISRO Scientist/Engineer 2017 (May) 267. We use malloc and calloc for (a) Dynamic memory allocation (b) Static memory allocation (c) Both dynamic and static memory allocation (d) None of the above ISRO Scientist/Engineer 2017 (May) 268. Which of the following is associated with objects? (a) State (b) Behavior (c) Identity (d) All of the above ISRO Scientist/Engineer 2017 (May) 269. The four kinds of class members in Java Script are (a) Instance methods, Instance fields, Static method, Dynamic method (b) instance fields, Instance methods, Class fields, Class methods (c) Instance field, Non-instance fields, Dynamic methods, Global methods (d) Global methods, Local methods, Dynamic methods, Static methods. RPSC VPITI 2014 (IT) 270. What will be output of the program given below sum =0; for ( I =-10; i<0: i++) sum = sum + abs (i); printf ("%d", sum); (a) 500 (b) -505 (c) 55 (d) -22 RPSC Lect. 2014 103 YCT 271. Java provides a monitor like concurrency control for ______ synchronization. (a) Process (b) TLB (c) Program (d) Threads RPSC VPITI 2018 (IT) 272. Consider the following program in C language : # include < stdio.h> Main() { int i; int * p = & i; scanf (“%d”, p); printf (“%d\n”, i + 7); } Which one of the following statement is true? (a) Compilation fails. (b) Execution results in a run-time error. (c) On execution, the value printed is 7 more than the integer value entered. (d) On execution, the value printed is 7 more than the address of variable i. RPSC VPITI 2018 (IT) 273. An exception is caused by: (a) A hardware problem (b) A problem in the operating system (c) A syntax error (d) A runtime error TNPSC 2016 (Degree) P-II 274. Match the following: (1) Compile time (A) Function overloading polymorphism (2) Runtime (B) Operator overloading polymorphism (C) Virtual function (D) Late binding (a) 1–A, B 2–C, D (b) 1–A, d 2–B, C (c) 1–A, C 2–B, D (d) 1–B, C 2–A, D TNPSC 2016 (Degree) P-II 275. Bit fields can only be declared as a part of : (a) Structure (b) Array (c) Files (d) Pointers TNPSC 2016 (Degree) P-II 276. Which of the following data types are accepted while declaring bit-fields? (a) char (b) float (c) double (d) unsigned int TNPSC 2016 (Degree) P-II 277. Runtime polymorphism is achieved by: (a) Friend function (b) Virtual function (c) Operator overloading (d) Function overloading TNPSC 2016 (Degree) P-II Programming Fundamentals 278. How we can access data members using objects? (a) object @ datamember (b) object → datamember (c) object * datamember (d) object . datamember TNPSC 2016 (Degree) P-II 279. Which of the following statements is correct when a class is inherited publicly? (a) Public members of the base class become protected members of derived class (b) Public members of the base class become private members of derived class (c) Private members of the base class become protected members of derived class (d) Public members of base class become public members of derived class TNPSC 2016 (Degree) P-II 280. In java, the throw keyword is used: (a) to generate exception programmatically (b) to throw exception object (c) to catch exception object (d) to remove the errors from the block TNPSC 2016 (Degree) P-II 281. Choose the correct answer : (I) A function can return only one value to the calling function (II) A function can return multiple value to the calling function (III) A function can include multiple return statements (IV) A function should not include multiple return statement (a) Only I is correct (b) Only IV is correct (c) Both I and III is correct (d) Both II and III is correct TNPSC 2016 (Degree) P-II 282. In a multi file program, the default storage class for a function is: (a) Static (b) Automatic (c) External (d) Register TNPSC 2016 (Degree) P-II 283. What is the output of the following code? int a = 128, b = 122; printf ("%d", a+b); (a) 250 (b) 128 (c) 256 (d) 000 TNPSC 2016 (Degree) P-II 284. What is the purpose of abstract class? (a) to provide help with database connectivity (b) to provide data input to other class 104 YCT 285. 286. 287. 288. 289. 290. 291. (c) to provide security to other classes (d) to provide an appropriate base class from which other classes can inherit TNPSC 2016 (Degree) P-II Mechanism of deriving a class from another derived class is known as: (a) Polymorphism (b) Encapsulation (c) Inheritance (d) Message passing TNPSC 2016 (Degree) P-II Which class is a base class for all exceptions in Java? (a) String (b) Error (c) Throwable (d) Runtime Exception TNPSC 2016 (Degree) P-II The derived class constructor: (a) never passes any values to base class constructor (b) can pass arguments only to one base class constructor function (c) is responsible for passing the entire test of arguments needed by base class constructors (d) none of the above TNPSC 2016 (Degree) P-II Collection in java is: (a) a group of objects (b) a group of classes (c) a group of interfaces (d) a group of packages TNPSC 2016 (Degree) P-II Identify the pure object oriented language given below: (a) Small talk (b) C++ (c) Objective C (d) Java TNPSC 2016 (Degree) P-II Which operators can not be overloaded? (a) Binary operator (b) Ternary operator (c) Unary operator (d) All can be overloaded TNPSC 2016 (Degree) P-II What allows the Java programmer to destroy an object A? (a) a. delete ( ) (b) a. finalize ( ) (c) Runtime. GetRuntime ( ) . gc ( ) (d) Only the garbage collection system can destroy an object (a) Collection of data items, not necessarily ordered, but of the same data type (b) Collection of data items, not necessarily ordered, but of different data type (c) Ordered collection of data items of different data type (d) Ordered collection of data items of the same data type UPSC Senior Scientific Officer Grade-II 16.07.2017 293. In C + +, a container is (a) A data structure composed of objects (b) A holder object that stores and manipulates a collection of objects (c) An objects that contains housekeeping information (d) An interface for binary search tree implemented as a class UPSC Senior Scientific Officer Grade-II 16.07.2017 294. During a recursive call, all static variables (a) maintained in a stack (b) maintained in a queue (c) initialized during each execution of the function (d) retained from the last execution UPPCL AE 2014 295. Methods are specified in the language by: (a) Syntax (b) Semantics (c) Inference (d) None RPSC ACF & FRO 23.02.2021 (CS) 296. A destructor can be (a) virtual (b) volatile (c) static (d) None of these RPSC ACF & FRO 23.02.2021 (CS) 297. Can operator overloading change the operation performed by an operator? (a) No (b) Yes (c) Conditionally (d) With restrictions RPSC ACF & FRO 23.02.2021 (CS) 298. A variable P is called pointer if: (a) P contains the address of first element in DATA (b) P can store only DATA value (c) P contains the address of an element in DATA (d) P contains the Data and the address of DATA Karnataka PSC Comp. Sci. Teacher 16.10.2017 299. The first and second arguments of open are : (a) A character string containing the name of the file and the second argument is the mode 292. Array is a structured data type in C (b) A character string containing the name of the programming language. It may be defined as, a finite : user and the second argument is the mode UPSC Senior Scientific Officer Grade-II 16.07.2017 Programming Fundamentals 105 YCT (c) A character string containing the pointer and the second argument is the mode (d) None of the above Karnataka PSC Comp. Sci. Teacher 16.10.2017 300. What is meant by 'a' in the following operation? fp = fopen ("Random.txt","a"); (a) Attach (b) Append (c) Apprehend (d) Add Karnataka PSC Comp. Sci. Teacher 16.10.2017 301. C-character set includes : (A) Alphabets (B) Digits (C) Special Symbols (D) Constants, variables and key words Select the code for the correct answer from the options given below : (a) A and B only (b) A, B and C only (c) D only (d) A only Karnataka PSC Comp. Sci. Teacher 16.10.2017 302. Which statements are true with respect to LINKER? (A) A program that links separately compiled modules into one program. (B) Combines the functions in the standard Clibrary with the code that you wrote. (C) The output of linker is an executable program. (D) Object code is the input to the linker. Select the code for the correct answer from the options given below : (a) A, B and C only (b) B and C only (c) A and D only (d) All of the above Karnataka PSC Comp. Sci. Teacher 16.10.2017 303. The order in which recursive functions are executed is: (a) Parallel order (b) Last in first out order (c) First in last out order (d) Iterative order Karnataka PSC Comp. Sci. Teacher 16.10.2017 304. If only one memory location is to be reserved for a class variable, no matter how many objects are instantiated, then the variable should be declared as ______. (a) extern (b) static (c) volatile (d) const ISRO Scientist/Engineer 2014 305. Java allows programmers to develop the following: (a) applets, applications and servlets (b) applets and applications Programming Fundamentals 306. 307. 308. 309. 310. 311. 106 (c) applets, applications, servlets, Java beans and distributed objects (d) none of the above TNPSC 2016 (Degree) P-II Which of the following programming language (s) provides garbage collection automatically (a) Lisp (b) C++ (c) Fortran (d) C ISRO Scientist/Engineer 2007 Exception handling is a type of (a) forward error recovery mechanism (b) backward error recovery mechanism (c) All of the above (d) None of the above GPSC Asstt. Prof. 30.06.2016 What is short int in C programming? (a) The basic data type of C (b) Qualifier (c) Short is the qualifier and int is the basic data type (d) All of the above GPSC Asstt. Prof. 30.06.2016 How structures and classes in C++ differ? (a) In Structures, members are public by default whereas, in Classes, they are private by default (b) In Structures, members are private by default whereas, in Classes, they are public by default (c) Structures by default hide every member whereas classes do not (d) Structures cannot have private members whereas classes can have GPSC Asstt. Prof. 30.06.2016 How access specifies in Class helps in Abstraction? (a) They does not help in any way (b) They allow us to show only required things to outer world (c) They help in keeping things together (d) Abstraction concept is not used in classes GPSC Asstt. Prof. 30.06.2016 Which of the following is the correct difference between cin and scanf()? (a) Both are the same (b) cin is a stream object whereas scanf() is function (c) scanf() is a stream object whereas cin is a function (d) cin is used for printing whereas scanf() is used for reading input GPSC Asstt. Prof. 30.06.2016 YCT 312. The number of instance of an abstract class that can be created is: (a) 1 (b) 5 (c) 13 (d) 0 (e) 10 CGPSC Asstt. Prof. 2014 (CS) 313. The concept of OOPs that allows compiler to insert arguments in a function call if it is not specified is: (a) Call by value (b) call by reference (c) Default arguments (d) call by pointer (e) Call by input CGPSC Asstt. Prof. 2014 (CS) 314. What will be the outputs of the following C program segment? printf(''%d'' ,printf("Examination)): (a) Examination,11 (b) 11, Examination (c) Examination,12 (d) 12, Examination (e) Examination,0 CGPSC Asstt. Prof. 2014 (CS) 315. Which of the following is not a pure objectoriented language? (a) Java (b) Simula (c) Smalltalk (d) Ada (e) Eiffel CGPSC Asstt. Prof. 2014 (CS) 316. Which of the following is not a valid property of C++? (a) Encapsulation (b) Garbage collection (c) Multiple inheritance (d) Polymorphism (e) Early and late binding CGPSC Asstt. Prof. 2014 (CS) 317. The operator that cannot be overloaded is (a) ++ (b) :: (c) 0 (d) ~ APPSC Lect. Degree College 07.06.2017 (CS) 318. The keyword friend does not appear in (a) the class allowing access to another class (b) the class desiring access to another class (c) the private section of a class (d) the public section of a class APPSC Lect. Degree College 07.06.2017 (CS) 319. Function overloading in C++ is (a) A group function with the same name (b) all have the same numbers and type of arguments (c) functions with same name and same numbers and same type of arguments (d) None of the given options APPSC Lect. Degree College 07.06.2017 (CS) Programming Fundamentals 320. In C++, the default storage class of local variables is: (a) auto (b) extern (c) both auto and register (d) static (e) register CGPSC Asstt. Prof. 2014 (IT) 321. The effective and well established technique to catch inconsistency in programs is called: (a) Type checking (b) Error checking (c) Type casting (d) Bounds checking UPSC Poly Lect. 10.03.2019 322. The category of software maintenance which fixes errors in the original system design and implementation is: (a) Perfective maintenance (b) Adaptive maintenance (c) Corrective maintenance (d) Software maintenance UPSC Poly Lect. 10.03.2019 323. In Object-Oriented Programming using C++, static variable is also known as: (a) Object variable (b) Class variable (c) Stored variable (d) Global variable UPSC Poly Lect. 10.03.2019 324. Which one of the following types of class is not used to create objects? (a) Anonymous class (b) Nested class (c) Base class (d) Abstract class UPSC Poly Lect. 10.03.2019 325. A class which can inherit the attributes of two or more classes is called: (a) Hierarchical Inheritance (b) Multilevel Inheritance (c) Multiple Inheritance (d) Hybrid Inheritance UPSC Poly Lect. 10.03.2019 326. Which of the following is NOT a type of constructor (a) Copy constructor (b) Friend constructor (c) Default constructor (d) Parameterized constructor APPSC Lect. 2017 (Degree College) (CS) 327. Which of the following approach is generally adopted by C++ programming. (a) top-down (b) Bottom-up (c) Right-left (d) left-right APPSC Lect. 2017 (Degree College) (CS) 328. Which among the following is the correct way of declaring object of a class (a) classname objectname; (b) class classname objectname; 107 YCT 329. 330. 331. 332. 333. 334. 335. 336. 337. (c) class classname obj objectname; (d) classname obj objectname APPSC Lect. 2017 (Degree College) (CS) How many objects can be created in a single class? (a) 1 (b) 2 (c) 3 (d) as many as required APPSC Lect. 2017 (Degree College) (CS) Which of this process occur automatically by JAVA run time system? (a) Serialization (b) Garbage collection (c) File Filtering (d) All the given options APPSC Lect. 2017 (Degree College) (CS) The 'new' operator in JAVA (a) returns a pointer to a variable (b) creates a variable called new (c) obtains memory for a new variable (d) tells how much memory is available APPSC Lect. 2017 (Degree College) (CS) 'this' keyword in JAVA is used to (a) refer to current class object (b) refer to static method of the class (c) refer to parent class object (d) refer to static variable of the class APPSC Lect. 2017 (Degree College) (CS) Which is not a primary constant in C ? (a) Integer (b) Float (c) Union (d) Character RPSC ACF FRO 23.02.2021 (Comp. App./Sci.) Which is not a keyword in C ? (a) auto (b) Stop (c) break (d) static RPSC ACF FRO 23.02.2021 (Comp. App./Sci.) Which function receives value from the key board ? (a) getf ( ) (b) scanf ( ) (c) printf ( ) (d) send ( ) RPSC ACF FRO 23.02.2021 (Comp. App./Sci.) Which of the following is a ternary operator ? (a) & (b) && (c) ! (d) ? : RPSC ACF FRO 23.02.2021 (Comp. App./Sci.) The control statement that allows us to make a decision from the number of choices, is called a/an (a) integer (b) function (c) switch (d) variable RPSC ACF FRO 23.02.2021 (Comp. App./Sci.) Programming Fundamentals 338. Which keyword should be avoided as far as possible ? (a) switch (b) case (c) break (d) goto RPSC ACF FRO 23.02.2021 (Comp. App./Sci.) 339. If a C program contains only one function, it must be (a) getch ( ) (b) main ( ) (c) exit ( ) (d) void ( ) RPSC ACF FRO 23.02.2021 (Comp. App./Sci.) 340. Among the operators, which has highest priority ? (a) && (b) + (c) = (d) ! RPSC ACF FRO 23.02.2021 (Comp. App./Sci.) 341. Basic run-time entities in an object-oriented system are (a) classes (b) functions (c) objects (d) methods RPSC ACF FRO 23.02.2021 (Comp. App./Sci.) 342. The wrapping up of data and functions into a single unit is called (a) polymorphism (b) Inheritance (c) Deviation (d) Encapsulation RPSC ACF FRO 23.02.2021 (Comp. App./Sci.) 343. Which of the following is not an object oriented language ? (a) Ruby (b) PASCAL (c) Smalltalk (d) C++ RPSC ACF FRO 23.02.2021 (Comp. App./Sci.) 344. The process by which object of one class acquire properties of objects of another class is known as (a) inheritance (b) polymorphism (c) encapsulation (d) abstraction RPSC ACF FRO 23.02.2021 (Comp. App./Sci.) 345. C + + was developed by (a) Ken Thompson (b) Denis Richie (c) Bjarne Stroustrup (d) Donald Knuth RPSC ACF FRO 23.02.2021 (Comp. App./Sci.) 346. Which is the field width operator in C + + ? (a) endl (b) set w (c) new (d) delete RPSC ACF FRO 23.02.2021 (Comp. App./Sci.) 347. In the Java statement import java. Lang. Math; math is (a) Object (b) Package (c) Class (d) Method RPSC ACF FRO 23.02.2021 (Comp. App./Sci.) 348. java does not support (a) Hierarchical inheritance (b) Single inheritance 108 YCT (c) Multi-level inheritance 356. A class that allows only one object of it to be created, is called: (d) Multiple inheritance (a) Virtual class (b) Abstract class RPSC ACF FRO 23.02.2021 (Comp. App./Sci.) (c) Singleton class (d) Friend class 349. Which fields enjoy highest degree of protection (e) Absolute class in java ? CGPSC Asstt. Prof. 2014 (Comp. App.) (a) public (b) Secure 357. Which of the following is not a type of (c) Private (d) Ultra constructor? RPSC ACF FRO 23.02.2021 (Comp. App./Sci.) (a) Copy constructor 350. Which of the following is not a valid storage (b) Friend constructor class in C++? (c) Default constructor (a) auto (b) register (d) Parameterized constructor (c) dynamic (d) static (e) Paste constructor (e) extern CGPSC Asstt. Prof. 2014 (Comp. App.) CGPSC Asstt. Prof. 2014 (Comp. App.) 358. Identify the function which is not the member 351. The inheritance represented by the following of class. figure is a category of: (a) Static function (b) Friend function (c) Const function (d) Virtual function (e) Dynamic function CGPSC Asstt. Prof. 2014 (Comp. App.) (a) Multiple inheritance 359. Which of the following concepts determines (b) Multilevel inheritance method to invoke at runtime? (c) Single inheritance (a) Data hiding (d) Hierarchical inheritance (b) Dynamic Typing (e) Hybrid inheritance (c) Dynamic binding CGPSC Asstt. Prof. 2014 (Comp. App.) (d) Dynamic loading 352. A package is a collection of: (e) Data encrypting (a) Classes CGPSC Asstt. Prof. 2014 (Comp. App.) (b) Interfaces 360. In C++, "cout" is a/an _______. (c) Editing tools (a) operator (b) function (d) Classes and interfaces (c) object (d) macro (e) Editing tools and interfaces (e) arithmetic function CGPSC Asstt. Prof. 2014 (Comp. App.) CGPSC Asstt. Prof. 2014 (Comp. App.) 353. Basic Java language functions are stored in 361. Which of the following concepts facilitates to which of the following java package? use the objects of one class inside another (a) java.lang (b) java.io class? (c) java.net (d) java.util (a) Encapsulation (b) Abstraction (e) java.awt (c) Composition (d) Inheritance CGPSC Asstt. Prof. 2014 (Comp. App.) (e) Decapsulation 354. Which of the following is a member of the Java CGPSC Asstt. Prof. 2014 (Comp. App.) language package? 362. What is the number of polymorphism (a) List (b) Queue categories supported by C++? (c) Math (d) Stack (a) 1 (b) 2 (e) Process (c) 3 (d) 4 CGPSC Asstt. Prof. 2014 (Comp. App.) (e) 5 355. Which of the following has a method name CGPSC Asstt. Prof. 2014 (Comp. App.) flush()? 363. Which of the following class member function (a) Input stream (b) Output stream automatically initializes the data members ? (c) Reader stream (d) Input reader stream (a) An operator (b) A constructor (e) Input output stream (c) A cast (d) The init function CGPSC Asstt. Prof. 2014 (Comp. App.) RPSC VPITI 2018 (CS) Programming Fundamentals 109 YCT (c) main ( ) 364. Which is not a defining characteristic feature of Object Oriented Languages ? (a) Reusability 366. Which among the (b) Inheritance polymorphism ? (c) Polymorphism (a) Overloading (d) Recursion (b) Overloading + = RPSC VPITI 2018 (CS) (c) Overloading < < 365. Which function is used to perform some action (d) Overloading & & when the object is to be destroyed ? (a) finalize ( ) (b) delete ( ) (d) destroy ( ) RPSC VPITI 2018 (CS) followings can show RPSC VPITI 2018 (CS) ANSWER KEY 1. (a) 11. (b) 21. (d) 31. (d) 41. (b) 51. (a) 61. (d) 71. (d) 81. (d) 91. (a) 101. (d) 111. (c) 121. (d) 131. (c) 141. (b) 151. (c) 161. (d) 171. (b) 181. (b) 191. (d) 201. (d) 211. (a) 221. (b) 231. (a) 241. (d) 251. (a) 261. (c) 271. (d) 281. (c) 291. (d) 301. (b) 311. (b) 321. (a) 331. (c) 341. (c) 351. (d) 361. (c) 2. (c) 12. (a) 22. (d) 32. (a) 42. (a) 52. (a) 62. (b) 72. (a) 82. (d) 92. (a) 102. (d) 112. (a) 122. (c) 132. (b) 142. (c) 152. (d) 162. (c) 172. (c) 182. (b) 192. (d) 202. (d) 212. (d) 222. (c) 232. (d) 242. (c) 252. (d) 262. (d) 272. (c) 282. (c) 292. (d) 302. (d) 312. (d) 322. (c) 332. (a) 342. (d) 352. (d) 362. (b) 3. (b) 13. (c) 23. (d) 33. (a) 43. (b) 53. (d) 63. (d) 73. (b) 83. (a) 93. (a) 103. (a) 113. (a) 123. (d) 133. (d) 143. (a) 153. (b) 163. (b) 173. (c) 183. (a) 193. (a) 203. (e) 213. (d) 223. (a) 233. (b) 243. (d) 253. (c) 263. (c) 273. (d) 283. (a) 293. (b) 303. (b) 313. (c) 323. (b) 333. (c) 343. (b) 353. (a) 363. (b) Programming Fundamentals 4. (d) 14. (a) 24. (d) 34. (d) 44. (d) 54. (b) 64. (a) 74. (a) 84. (a) 94. (c) 104. (a) 114. (a) 124. (a) 134. (b) 144. (b) 154. (d) 164. (d) 174. (b) 184. (b) 194. (c) 204. (b) 214. (c) 224. (d) 234. (d) 244. (d) 254. (b) 264. (d) 274. (a) 284. (d) 294. (d) 304. (b) 314. (a) 324. (d) 334. (b) 344. (a) 354. (c) 364. (d) 5. (a) 15. (b) 25. (a) 35. (a) 45. (a) 55. (a) 65. (b) 75. (a) 85. (a) 95. (c) 105. (c) 115. (b) 125. (a) 135. (c) 145. (a) 155. (c) 165. (a) 175. (d) 185. (a) 195. (c) 205. (d) 215. (a) 225. (d) 235. (d) 245. (c) 255. (a) 265. (a) 275. (a) 285. (c) 295. (c) 305. (a) 315. (d) 325. (c) 335. (b) 345. (c) 355. (b) 365. (a) 110 6. (d) 16. (a) 26. (b) 36. (b) 46. (b) 56. (d) 66. (c) 76. (c) 86. (b) 96. (c) 106. (c) 116. (d) 126. (d) 136. (a) 146. (d) 156. (d) 166. (b) 176. (d) 186. (d) 196. (d) 206. (a) 216. (d) 226. (b) 236. (c) 246. (c) 256. (b) 266. (b) 276. (d) 286. (c) 296. (a) 306. (a) 316. (b) 326. (b) 336. (d) 346. (b) 356. (c) 366. (c) 7. (c) 17. (b) 27. (b) 37. (c) 47. (d) 57. (a) 67. (a) 77. (a) 87. (d) 97. (a) 107. (a) 117. (b) 127. (d) 137. (a) 147. (d) 157. (c) 167. (b) 177. (a) 187. (d) 197. (b) 207. (b) 217. (c) 227. (a) 237.(c) 247. (d) 257. (b) 267. (a) 277. (b) 287. (c) 297. (b) 307. (a) 317. (b) 327. (b) 337. (c) 347. (c) 357. (b) 8. (c) 18. (a) 28. (b) 38. (b) 48. (c) 58. (d) 68. (b) 78. (b) 88. (a) 98. (c) 108. (b) 118. (a) 128. (c) 138. (c) 148. (c) 158. (d) 168. (d) 178. (d) 188. (d) 198. (a) 208. (a) 218. (a) 228. (a) 238. (a) 248. (a) 258. (a) 268. (d) 278. (d) 288. (a) 298. (c) 308. (c) 318. (c) 328. (a) 338. (d) 348. (d) 358. (b) 9. (a) 19. (c) 29. (a) 39. (c) 49. (a) 59. (d) 69. (a) 79. (a) 89. (b) 99. (b) 109. (a) 119. (b) 129. (c) 139. (d) 149. (b) 159. (b) 169. (c) 179. (b) 189. (d) 199. (b) 209. (d) 219. (b) 229. (c) 239. (b) 249. (d) 259. (d) 269. (b) 279. (d) 289. (a) 299. (a) 309. (a) 319. (a) 329. (d) 339. (b) 349.(c) 359. (c) 10. (d) 20. (d) 30. (c) 40. (b) 50. (d) 60. (a) 70. (b) 80. (a) 90. (c) 100. (d) 110. (d) 120. (a) 130. (a) 140. (b) 150. (a) 160. (c) 170. (c) 180. (a) 190. (c) 200. (b) 210. (a) 220. (c) 230. (c) 240. (b) 250. (b) 260. (b) 270. (c) 280. (a) 290. (b) 300. (b) 310. (b) 320. (a) 330. (a) 340. (d) 350. (c) 360. (c) YCT 04. DATA STRUCTURES AND ALGORITHM Algorithms for Problem Solving– An algorithm is a process or set of rules which must be followed to complete a particular task. This is basically the step-by-step procedure to complete any task. All the tasks are followed a particular algorithm, from making. A cup of tea to make high scalable software. This is the way to divide a task into several parts. The algorithm is used for • To develop a frame-work for instructing computer • Introduce notation of basic function to perform basic tasks. • For defining & describing a big problem into small parts, so it is to execute. The basic steps to make on algorithm. 1. Start 2. Input 3. Condition 4. Output 5. End Abstract Data Types (ADT)– An ADT is a mathematical model of a data structure that specifies the type of data stored, operation supported on them and types of parameters of the operation. An ADT specifies what each operation does but not how it does it. In C++ no object (instance) of ADT is created rather it describe a foundation of another class. Arrays as Data Structure– An array is a data structure for storing more than one data item that has a similar data type. The items are organized in adjacent memory locations. Those memory location are called elements of that array. Total number of element in an array is called length. The array elements are accessed through index. Index start from 0, 1, 2 _ _ n-1 of length n. Three parts will common in all the initialization i.e., array name, element and the data types of elements. In C++, array is defined as followsint account [4] = {100, 300, 500, 120} ↓ ↓ ↑ data type Array name elements There are some reason for using arrays in data structure: • Arrays are best for storing multiple values in a single variable. • Arrays are better at processing many values easily and quickly • Sorting and searching the values is easier in arrays. DATA Structures and Algorithm In Brief • An array is a data structure for storing multiple data type that have a similar data type. • Identifier, data types, array length, elements and index are major parts of an array. • Use the index for processing the values of array element • Arrays are best for processing large number of values and efficient for sorting and searching. • All dictionary operation like insert, delete search, update and traverse. Linked list V/S Array for Storage– Array and linked list are two ways of organizing the data in the memory. An array is collection of elements of similar data type. A linked list is a collection of object known as node where nodes consist of two parts i.e. data and address. Array elements store in a contiguous memory location. Linked list elements can be stored anywhere in the memory or randomly stored. Linked list are less rigid in their storage structure and elements are usually not stored in contiguous locations, hence they need to be stored with additional tags giving in a reference to next element. Arrays store elements in contiguous memory locations, resulting in easily calculable addresses of next elements stored and this permit quicker access to element of specific subscript. Array length = 6 First index = 0 Last index = 5 Data storage scheme of an array So linked list provides the following two advantages over arrays 1. Dynamic-size 2. Easiness of insertion/deletion Linked lists have the following short coming : 1. In linked list each elements is traversed sequentially from first node. so here we cannot perform binary search with linked lists 2. Extra memory space for a pointer is required with each element of the list 111 YCT 3. Arrays have better cache locality that can make a pretty big difference in performance Stack & Stack Operation– Stack is a data structure in which insertion and deletion is done from one end only, usually referred to as TOP. Stock fallows the LIFO Principle using which an element inserted last will be first one to be out. PUSH & PoP are two basic operation performed on a stack for insertion & deletion of elements respectively. Stack is commonly use data structure to convert an infix expression into equivalent prefix/postfix notation. While conversion of infix Notation to its equivalent Prefix/postfix notation, only operator are pushed onto the stack when evaluating an expression. Operation 1. PUSH()→ To insert or add, item in stack Step 1 → First we check the stack is full or not. Step 2 → If stack is full then error message will be displayed Step 3 → If stack is not full then we add the top element and TOP is incremented by one. 2. POP() – To delete on item-from stack. 3. Isempty() – To cheek whether stack is empty. 4. Isfull() – To check whether stack is full. 5. Peep() – It acquire the Top element without deleting. Queue– Queue is a abstract data structure similar to stack. Queue is open at both end one end is always used to insert data. (enqueue) and other is used to remove data (dequeue). Queue follows first-in-first out methodology. A real world example is ticket window where first person in waiting Queue is served first in ticket counter and last person in queue is served at last in queue. Basic Operations– We shall try to understand the basic operations associated with queues. enqueue() – add (Store) an item to the queue. dequeue() – remove (access) an item from the queue. • Few more functions are required to make the above mentioned queue operation efficient. following are some function as follows. Peek() – Gets the element at the front of the queue without removing it. Isfull() – Cheeks of the queue is full. It throw overflow condition. Isempty() – Checks if Queue is empty. If queue is empty, it throws underflow condition. • Queue is used for disk scheduling & CPU scheduling queue is used for buffer in number of application. Types of queue 1. Linear Queue– In this Queue, item is inserted from rear end & deleted from front end. DATA Structures and Algorithm Circular Queue– In this queue the last element is linked to first element. Dequeue– It's full form is double ended queue. A dequeue is also a special type of queue. In this queue the enqueue & dequeue operation take place at both front rear. That means we can insert an Item at both the ends and can remove on item from both the ends. • All the dictionary operation can be performed in 0(n) time. Priority Queue – A priority queue is a special kind of queue in which each item has a predefined priority of service. In this queue the enqueue operation takes place at rear in the order of arrival of items, while the dequeue operation takes place at the front based on priority of item. An item with a high priority will be dequeued before an item with a low priority. Tree data structure Tree is a hierarchical data structure. A tree whose elements have at most 2 children is called a binary tree. Since each element in a binary tree can have only 2 children, we typically Name them the left & right child. 2. A binary tree has following parts 1. Data 2. Pointer to left child 3. Pointer to right child A node which has one child node is called internal node. we can do searching & traversing In easy way a node which has no child node is called leaf node or terminal node. Types of tree 1. General Tree– A node which has zero children & more child team we call it general tree. 2. Binary Tree– A node of tree has almost two children. Left child is counted as 0 and right child as 1. 3. 112 Binary Search Tree– Binary search tree is a nodebased binary tree data structure which has the following feature. YCT • Left sub tree of a node contains only nodes with keys Example– lesser than the node's key. • Right sub tree of a node contains only nodes with keys greater than the node's key. • The left and right sub tree each must also be a binary search tree. • Strictly Binary Tree– If every non leaf node in a binary tree has non-empty left and right sub trees. All of the nodes in a strictly binary tree are of degree zero or two, never degree one. In order: 42513 Pre order: 12453 Post order: 45231 AVl Tree– AVL tree can be defined as height balanced binary search tree in which each node is associated with a balance factor which is calculated by subtracting the height of its right sub tree from that of its left sub tree. If there are N nodes then height of tree is log 2(N+1). When a tree is balanced then difference of height between left sub tree and right sub tree is not more than 1. Graph and their representation– Graph is linear or data type, to represent a graph, we just need the set of vertices and each vertex the neighbors of vertex. If it is weighted graph, then the weight will be associated with each edge, there are different ways to optimally represent a graph, depending on the density of its edges, type of operations to be performed and ease of use. Adjacency Matrix– • Adjacency matrix is sequential representation • It is used to represent which nodes are adjacent to each other. • In this representation we have to construct nxn matrix of there is any edge from a vertex i to vertex J then the corresponding element of A i.e. aiJ = 1 otherwise aiJ = 0. Undirected graph representation– A strictly binary tree with n leaves always 2n-1 nodes. Complete Binary Tree– A Complete binary tree is a binary tree in which all the levels are completely filled except possibly the lowest one which is filled from left. Tree Traversal Pre-order Traversal First visit the root then traverse the left sub tree after that traverse the right sub tree. Note- Preorder traversal is used to create a copy of the tree. Pre order traversal is also used to get prefix expression on an expression tree. In Order Traversal- Traverse the left sub tree. Visit the root & then traverse the right sub tree. Directed graph representation Note- In the case of binary search tree in order traversal gives nodes in non-diseasing order. Post-order Traversal First traverse the left sub tree then traverse the right sub tree after that visit root. Note- Post order traversal is used to delete the tree. Post order traversal is also useful to get the post fix expression of an expression tree. DATA Structures and Algorithm 113 YCT In the above figure I represents an edge from row Example– vertex to column vertex and o represent no edge from row vertex to column vertex. Undirected weighted graph representation– Matrix re presentation takes a lot of time to visit all the neighbors of a vertex, we have to traverse all the vertices in the graph, which takes some time. Incidence Matrix– In this representation the size of matrix is total number of vertices by total number of edges. In this representation column represent edges and row represent vertices. Matrix is filled 0 or 1 or – 1 where• 0 is used to represent row edge which is not connected to column vertex. • 1 is used to represent row edge which is connected as outgoing edge to column vertex. • –1 is used to represent row edge which is connected as incoming edge to column vertex. Example– consider the following directed graph representation Adjacency List– • Adjacency list is linked list representation of every vertex. • In this representation, for each vertex in the graph, we maintain a list of neighbours. DATA Structures and Algorithm • Adjacency list saves a lot of space • We can easily insert or delete as we use linked list • It clearly shows the adjacent nodes of a node. Sorting & Searching– Searching-Searching means locating a particular element in a collection of elements. Search result determines whether that particular element is present in the collection or not. If it is present, we can also find out the position of the element in the given collection. Searching in an important technique in computer science. In order to design algorithms programmers need to understand the different ways in which a collection of data can be searched for retrieval. There are three types of searching 1. Linear search 2. Binary search 3. Hash based search Linear Search– In this search check the elements of a list, one at a time, without skipping any element. It is useful when we need to search for an item in a small unsorted list, but it is slow and time consuming. It there are n element in the list then time complexity of linear search is θ (n). Algorithm– Linear search (Array A, Key x) 1. i ← 1 2. If i > n then GoTo step 7 3. For i = 1 to n 4. If A[i] = key then Goto step 6 5. i ← i + 1 6. Print element found at index i and Goto step 8. 7. Print element not found. 8. Exit Time complexity of Linear Search Best Case → O(1) Average Case & Worst Case – n comparisons are required so its complexity is O(n). 114 YCT Binary Search– It takes a sorted/ordered list and divides it in the middle. It then compares the middle element with the key to be searched. If the middle element matches the key the search is declared successful and program end. If middle element is greater than key, the search repeats only in first half of the list. If middle element is lesser than the key, the search repeats only in the second half of the list. Binary search follow the divide & conquer approach. In best case, complexity is θ(1) and worst case time complexity is θ(log n). Algorithm– Binarysearch (arr, key, low, high) 1. If low > high 2. return false 3. else low + high 2 5. If key = arr [mid] 6. return mid 7. else key < arr[mid] 8. return Binarysearch (arr, key low mid) 9. else 10. return Binarysearch (arr, key, mid + 1, high) Complexity– Best case → O(1) Worst Case → recurrence relation is 4. mid = n T (n) = T +1 2 Complexity T(n) = O(log n) Hash Based Search– Hash based search requires only one key comparison to discover the presence or absence of a key. Provided every elements is present at its designated position decided by a hash function. Sorting– is process of arranging the element in increasing or decreasing order. Sorting is an important area of study in computer science and many sorting algorithms have been developed and analysed from their performance point of view. Common sorting algorithms are 1. Bubble sort 2. Insertion sort 3. Selection sort 4. Quick sort 5. Merge sort 6. Heap sort Merge sort and quick sort follow the divide & conquer approach. The time complexity of quick sort in worst case is θ (n2). The time complexity of quick sort in best & average case in θ (n log n). Complexity of merge DATA Structures and Algorithm sort is θ (n log n). Insertion sort follows the incremental approach of designing. Its complexity is θ (n2). Bubble sort there are two loops. A loop within a loop will have the complexity as θ (n2). Heap sort uses heap data structure. Its complexity is θ (n log n). Merge sort– AlgorithmMergesort(arr, low, high) 1. If (low < high) low + high 2. mid = 2 3. Mergesort(arr, low, mid–1) 4. merge(arr, mid+1, high) 5. merge(arr, low, mid, high) Divide step stakes time O(1) & merge procedure takes O(n) time so combine effort of divide + combine = O(1) + O(n) = O(n) so recurrence relation is. n T(n) = 2T + O ( n ) 2 It is solution by master method is O(n log n). Quick sort– Quick sort follows divide & Conquer approach. Its partition procedure is complex but combine step is simple total effort is θ(n) + θ(1) = θ(n). Algorithm– Quicksort(arr[], low, high) { If (low < high) { P = partition(arr, low, high) quicksort (arr, low, P-1) quicksort (arr, P+1, high) } } Choose the pivot as last element of the queue these which are less than pivot element they put into left subproblem and those element which are greater than pivot they are put into right sub-problem. Complexity– Here divide step is little bit complex and it is θ(n) time & combine step will not take anytime, since nature array elements are reshuffled within the array. Pivot is such that left sub-problem contain. One element & right sub-problem contain n-1 element. so worst case complexity is 115 T(n) = T (1) + T ( n − 1) + θ ( n ) = T(n – 1 + n – 2 + n – 3 ......+ 2 + 1) + θ(n) ( n − 1) .n = T∑ + θ(n) 2 = θ(n2) YCT Average & Best Case– T (n) = θ(n log n) So average & best case complexity is same as merge sort. Merge sort take the help of other array so. It is not sort inplace so merge procedure is tough in merge sort and in quick sort partition is complex and merge procedure is simple. Bubble sort– 1. For every element of array 2. If array[i] > arr[i+1] 3. then swap[arr[i], arr[i+1]] 4. end if 5. end For In first pass largest element reaches to the end of array. In second pass second largest element reaches to second position from last element. Its complexity is θ(n2). Since one is outer loop and second one is inner loop. So total time is θ(n2). Insertion sort–Insertion sort follows the incremental approach of designing. Void insertionsort (int arr[], int n]) { int i, key, J for (i =1; i<n; i++) { key = arr[i] J = i–1 while (J > = 0 && arr [J]> key) { arr[J+1] = arr [J] J=J–1 } arr[J+1] =Key; } } Complexity of insertion sort– (i) Best case– Best case occur when element is sorted order and int his case complexity of insertion sort is θ(n). (ii) Average & Worst Case– Average & worst case occur when array element is reverse sorted order. In this case complexity is θ(n2). Stable Sort– Counting sort is stable sort. Stable means if two or more than two elements are equal then they will appear in output array in the same order as they appear in input array. Single source shortest problem, which is based on Greedy Algorithm uses the adjacency list representation of graph whereas all pair shortest path problem based on dynamic programming technique uses the matrix representation of graph. DATA Structures and Algorithm Symbol Table– Symbol table is an important data structure created and maintained by compilers in order to store information about the occurrence of various entities such as variable name, function names, objects and classes, interfaces etc. symbol Table is used by both the analysis and the synthesis parts of a compiler. A symbol table may serve the following purposes depending upon the language in hand. • To store the name all entities in structured from at one place. • To verify a variable has been declared. • To implement type checking, by verifying assignments and expressions in the source code are semantically correct. • To determine the scope of a name. A symbol table is simply a Table which can be either linear or a hash table. It maintains an entry for each name in the following format. <symbol name, type, attribute> For example, if a symbol table has to store information about the following declaration. Register int increment, then it should store entry such as: <increment, in, register> Implementation of symbol Table– If a compiler is to handle a small amount of data then the symbol table can be implemented as an unordered list, which is easy to code, but it is only suitable for small tables only. A symbol table can be implemented in one of the following ways: • Linear (sorted or unsorted) list • Binary Search Tree • Hash table Symbol Tables are mostly implemented as hash tables Operations– A symbol is implemented as linear or hash should provide the following operations. Insert– This operation is used in analysis phase with the help of insert operation add information is used. In source code, the unique name occurring will be added in symbol Table. The insert () function takes the symbol and its attributes as argument & store the information in the symbol table. For example– int salary; should be processed by compiler as: insert (salary int), 116 YCT Lookup– lookup operation is used to search a name in the symbol table to determine • If symbol present in the table. • If it is declared before it is being used • If the name is used in the scope • If the symbol is initialized • If the symbol declared multiple times The basic format of lookup () is as follows lookup (symbol) Data Structure Using C & C++ Data structure is a particular way of organizing data in a computer so that it can be used effectively. For example, we can store a list of items using the array data structure. Main data structure in C & C++ are Array, Linked list, Stack, Queue, Binary Tree, Binary search tree, Heap, Hashing, Graph, Advance data structure, description of above data structure is given in previous pages. Important Points– • Binary search is applicable in array and AVL tree. • Minimum & maximum height of a binary search tree of n nodes is log2n, n. • Maximum number of edges in a n-node undirected graph without self-loops is n(n − 1) 2. • Pointer head points to first node of a linked list each node has link to next node then time complexity to swap values of pth and qth nodes shall be then O(max(p, q)). • The best data structure to check whether an arithmetic expression has balanced parenthesis is a stack. • Level order traversal of a rooted tree can be done by starting from the root and performing breadth first search. • N-queen problem and M-coloring problem are back tracking algorithm and back tracking is a general algorithm for finding solutions to same computational problems that uses a brute force approach for finding the desired output. Queue is useful in traversing a given graph by breadth-first search (BFS). • Boolean, byte and double are primitive data type. • At the time of implementing a stack on a register stack, the stack pointer register is incremented first during push operation. • Zero address instructions are implemented with the help of stack. • Two labeled trees are isomorphic if graphs of the two trees are isomorphic and the two trees have same label. • A circular list can be used to represent queue. DATA Structures and Algorithm • A simple path in a graph G that passes through every vertex exactly one is called a Hamillon path, and a simple circuit in a graph G that passes through every vertex exactly once is called a Hamilton circuit. • Stack is used for depth first traversal of a graph. • A dequeue is a linear list in which insertions and deletions are made to and from either end of the structure stack data structure is used in recursion. • Linked lists are best suited for the dynamic allocation of data. Static queue is implemented using arrays. • The access of queue element is sequential from front end of the queue element are deleted. • A full binary tree with n leaves contains 2n-1 nodes. • Strings, Arrays, Queue are linear type data structure. Stack linear data structure allow both insertion and deletion at only one end. • A graph in which all nodes are of equal degree is called as circuit. • The best data structure to check whether an arithmetic expression has balanced parenthesis is a stack. • Selection sort require the minimum number of swap. • Queue data structure is useful in traversing a given graph by breadth first search. • The number of leaf nodes in a complete binary tree of depth d is 2d. • Link list is preferably suitable for implementation of insertion sort, radix sort and polynomial manipulation. • Stack and array are examples of linear data structure. • Quick sort algorithm is based on divide and conquer. • As the process enters the system, it is placed in the job queue. • Examples of binary tree are heap, AVL-tree and search tree etc. • The largest element of in array index is called upper bound • Depth-first search is similar to minimax search. • Insertion sort is used by shell sort. • Linear array data structure uses the index to refer to its individual items. • A graph is a collection of nodes called vertices and line segments called edges that connect pairs of nodes. • In linked list representation, graph is stored in adjacency list. • Heap sort and merge sort perform in least time in the worst case. • Feedback queues dispatch tasks according to execution characteristics. • Selection sort algorithm design techniques is an example of greedy methods. • Heap can be used as priority queue. 117 YCT • An internal sorting algorithm is an algorithm that uses main memory during the sort. • The process of accessing data stored in a serial access memory is similar to manipulating data on a stack. • Spatial locality concepts make extensive use of array. • The physical size in a dynamic array shows the size of the underlying array at the back-end. • FIFO (first in first out) property is associated with a queue. • Effective usage of memory is the need for a circular queue. An important application of binary tree is huffan coding. • The operation of processing each element in the list is known as traversal. • The data structure required for breadth first traversal on a graph is queue. • The data type created by data abstraction process is called abstract data type. • Insertion sorting methods is the best suitable for sorting a list. A sort which compare adjacent elements in a list. A sort which compare adjacent elements in a list and switches where necessary is insertion sort. • Program counter is updated during instruction execution to point to the next instruction byte to be fetched. • A model which is used to understand the design of a data structure to indicate an implementation independent view of the data structure is abstract data type. • In priority queue an element can be added arbitrarily and from which only either the smallest or largest element can be removed. • Postfix notation is also called as reverse polish notation. • A sorting technique is called stable if relative order of occurrence of non-district elements is maintained. • Heap sorting algorithms does in-place sorting with minimized space overhead. ChiMerge discretisation is a supervised method which employs the bottom-up approach. • Cyclomatic complexity provides a quantitative measure of logical complexity of a program. The formula to find out cyalomatic complexity (m) is M = E – N + 2P where E represents number of edges in graph, N represents number of nodes and P the number of connected component. • Spanning tree of a graph with V vertices has (V-1) edges. • The running time of Quick sort depends on whether the partitioning is balanced or unbalanced. DATA Structures and Algorithm • Graphs are represented by using adjacency linked list. • Pre order is nothing but depth-first order. • Stack is one ended data structure. • A list which displays the relationship of adjacency between elements is said to be linear. • Complexity analysis is performed to explain how algorithm will perform when the input grow larger. • Array is linear data structure of same data types on the basis of data type these array is called integer array, float array, character array etc. • Linked list is stored in non-contiguous location. In linear linked list we can traverse in forward direction but in doubly linked we can traverse in both direction i.e. forward & backward. In circular linked list we can delete any node in 0(1) time. • Stack is data structure in which insertion & deletion is done from one end only, usually referred at to as Top. • Stack follows LIFO principle. • PUSH & POP are two basic operations performed on a stock. • Stack is commonly used data structure for converting an infix expression into equivalent prefix/postfix notation. • While conversion of an infix notation to its equivalent prefix/Postfix notation, only operators are pushed into the stack. • Queue is on ordered linear data structure, follow FIFO strategy. • Front & rear are used to indicate beginning and end of queue. • Insertion in a queue happens at the rear end. Deletion happens at the front. • Dequeue is version of queue, which allows insertion & deletion at both ends. • Binary tree is non-linear data structure. • All operation performed corresponding to height of the tree AVL (Adelson-Velsky and Landis) tree is balanced tree. Complete binary tree is binary tree filled from Top to bottom and left to right. If there are n leaves then total number of leaves is 2n – 1. If complete binary tree has 2n leaves then total number of nodes in tree is (2n–1)2.2n –1=2n+1 – 1 nodes. • Graph is a data structure represented by vertices and edges (set of adjacent vertex) minimum spanning tree is based on greedy algorithm. Single source shortest path problem is also based on Greedy algorithm. All pair shortest path problem is based on Dynamic programming. 118 YCT Important Questions Asked in Previous Years Examinations 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. A binary search tree whose left subtree & right subtree differ in height by at most 1 unit is called_____ (a) AVL Tree (b) Red Black Tree (c) Lemma Tree (d) None of the above Stack is also called as (a) Last in first out (b) First in last out (c) Last in last out (d) First in first out ______ is not the component of data structure (a) Operators (b) Storage structure (c) Algorithms (d) None of above Inserting an item into the stack when stack is not full is called ______ operation and is not empty is called ____ operation. (a) PUSH, POP (b) POP, PUSH (c) Insert, delete (d) Delete, Insert ______ is a file in which items are added at one end & remove from other (a) Stack (b) Queue (c) List (d) Link List _______ is very useful in situation when data have to stored and then retrieved in reverse order (a) Stack (b) Queue (c) List (d) Link List Which of the following data structure can not store the non-homogeneous data element? (a) Arrays (b) Records (c) Pointers (d) Stacks Which of the following is non-linear data structure? (a) Stack (b) List (c) Strings (d) Trees Which data structure is used in breath first search of a graph to hold nodes? (a) Stack (b) Queue (c) Tree (d) Array Which of following data structure is non-linear type? (a) Strings (b) Lists (c) Stacks (d) Graph Which of the following data structure is linear type? (a) Graph (b) Trees (c) Binary tree (d) Stack To represent hierarchical relationship between elements, which data structure is suitable? (a) Dequeue (b) Priority (c) Tree (d) Graph Which of the following is a divide and conquer algorithm? (a) Bubble sort (b) Selection sort (c) Heap sort (d) Merge sort DATA Structures and Algorithm 14. 15. 16. 17. 18. 19. 20. 21. 22. 23. 24. 25. 119 What is maximum number of swaps that can be performed in selection sort algorithm? (a) n–1 (b) n (c) 1 (d) n–2 What is time complexity of binary search algorithm? (a) O(n) (b) O(1) (c) O(log2n) (d) O(n2) Kruskal algorithm for finding the minimum spanning tree of a graph is a kind of a? (a) DP Problem (b) Greedy Algorithm (c) Ad hoc Problem (d) None of above Maps in C++ are implemented using which of the following data structure? (a) Red Black Tree (b) Binary Search Tree (c) Avl Trees (d) Hash Table What is best case time complexity of the binary search algorithm? (a) O(1) (b) O(n) (c) O(log2n) (d) O(n2) What is time complexity to insert an element to the front of a linked list (head pointer green)? (a) O(n) (b) O(1) (c) O(log n) (d) O(n log n) What is time complexity to insert an element to the rear of a linked list (a) O(n) (b) O(1) (c) O(log n) (d) O(n log n) Which of following can be done with linked list (a) implementation of stacks and queues (b) implementation of binary trees (c) implementation of data structure that can simulate dynamics arrays (d) All of the above What is the information, which a linked list node must store? (a) the address of the next node of it exists (b) the value of the current node (c) both (a) & (b) (d) none of the above Worst case time complexity to access an element in a BFS can be? (a) O(n) (b) O(n log n) (c) O(1) (d) O(log n) Which of following represents the post order traversal to binary tree? (a) Left-Right Root (b) Left-Root Right (c) Right-Left Root (d) Right-Root Left In what time complexity can we find the diameter of binary tree optimally (a) O(V+E) (b) O(V) (c) O(E) (d) O(V log E) YCT 26. 27. 28. 29. 30. 31. 32. 33. 34. 35. Which of the following statement is true about AVL trees (a) the difference between the height of left and right nodes can not be more than 1 (b) the height of a AVL tree always remains of the order of O(log n) (c) AVL trees are a type of self balancing binary search trees (d) All of the above In a graph of n nodes and n edges how many edges will be present? (a) Exactly 1 (b) At must 1 (c) At must 2 (d) Depends on the graph Which of the following algorithms are used to find the shortest path from a source node to all other nodes in a weighted graph (a) BFS (b) Dijkstra Algorithm (c) Prim's Algorithm (d) Kruskal's Algorithm Which data structure is mainly used for implementing the recursive algorithm? (a) Queue (b) Stack (c) Array (d) List In circular queue the value of r will be (a) r = r + 1 (b) r = (r + 1)% [queue size-1] (c) r = (r + 1)% queue_size (d) r = (r – 1)% queue_size Which of the following statement is true? I. Using singly linked list & circular list, it is not possible to traverse the list backwards. II. To find the predecessor, it is required to transverse the list from the first node in case of singly list. (a) I only (b) II only (c) Both I and II (d) None of both The advantage of _______ is that they solve the problem of sequential storage representation but disadvantage in that is they are sequential lists. (a) Lists (b) Linked Lists (c) Trees (d) Queues What will be the value of top, if there is a size of stack STACK-SIZE is 5 (a) 5 (b) 6 (c) 4 (d) None _____ is not the operation that can be performed on a queue. (a) Insertion (b) Deletion (c) Retrieval (d) Traversal Which of the following is not the type of queue? (a) Ordinary queue (b) Single ended queue (c) Circular queue (d) Priority queue DATA Structures and Algorithm 36. 37. 38. 39. 40. 41. Linear search is highly in efficient compared to binary search when dealing with: (a) Small, unsorted arrays (b) Small, sorted arrays (c) Large, unsorted arrays (d) Large, sorted arrays Which of the following operation is performed more efficiently by double linked list than by single linked list? (a) Deleting a node whose location is given (b) Searching of an unsorted list for a given item (c) Inserting a new node after node whose location is given (d) Traversing the list to process each node One can determine whether a binary tree is a binary search tree by traversing it in _____ (a) Pre-order (b) In-order (c) Post-order (d) Any of these Spanning tree of connected graph with 10 vertices contains (a) 9 edges (b) 11 edges (c) 10 edges (d) 9 vertices A sorted file contains 16 items. Using binary search, the maximum number of comparisons to search for an item in this file is _____ (a) 15 (b) 8 (c) 1 (d) 4 A complete binary tree with n leaf nodes has _____. (a) n + 1 nodes (b) 2n – 1 nodes (c) 42. 43. 44. 45. 46. 120 2n + 1 nodes (d) n ( n − 1) nodes 2 Time required to delete a node x from a doubly linked list having n node is (a) O(n) (b) O(log n) (c) O(1) (d) O(n log n) One can convert on infix expression to postfix expression using a _____ (a) stack (b) queue (c) deque (d) None of these Which one of below mentioned is linear data structure? (a) queue (b) stack (c) arrays (d) all of these Linked list are not suitable data structure for which one of the following problems? (a) insertion sort (b) binary search (c) radix sort (d) polynomial manipulation What value does function my function return when called with a value of 4? int my_function(int number) { if(number <=1) return 1; else YCT 47. 48. 49. 50. 51. 52. 53. 54. 55. 56. 57. return number* my_function(number1) } (a) 1 (b) 4 (c) 12 (d) 24 For an undirected graph G with n vertices and e edges, the sum of degrees of each vertices is ____ (a) (n + 1)e (b) 2e (c) 2n (d) (e + 1)n If locality is a concern you can use ___ to traverse the graph (a) Breadth First Search (b) Depth First Search (c) Either BFS or DFS (d) None of these A sorting technique which uses the binary tree concept such that label of any node is larger than all the labels in the sub tree is called _____ (a) selection sort (b) insertion sort (c) heap sort (d) quick sort A full binary tree with n non-leaf nodes contains _____ (a) log 2n nodes (b) n + 1 nodes (c) 2n nodes (d) 2n + 1 nodes Recursive procedure are implemented by using ____ data structure. (a) queue (b) stacks (c) linked lists (d) strings Quick sort is an example of (a) divide & conquer (b) greedy approach (c) improved binary search (d) dynamic programming In C programming, when we remove an item from bottom of the stack, then: (a) stack will fall down (b) stack will rearrange items (c) it will convert to LIFO (d) This operation is not allowed The worst case of quick sort has order _____ (a) O(n2) (b) O(n) (c) O(n log2 n) (d) O(log2 n) Which one of the following is not an example of computer language? (a) ALGORITHM (b) FORTRAN (c) PASCAL (d) COBOL You have to sort a list L consisting of a sorted list followed by a few "random" elements. Which of the following sorting methods would be especially suitable for such a task? (a) Bubble sort (b) Selection sort (c) Quick sort (d) Insertion sort Linked List Search complexity is (a) O(1) (b) O(n) (c) O(log n) (d) O(log(log n)) DATA Structures and Algorithm 58. 59. 60. 61. 62. 63. 64. 65. 66. 67. 121 A technique for direct search is ______ (a) binary search (b) linear search (c) tree search (d) hashing In a min heap (a) minimum value of stored (b) child nodes have less value than parent nodes (c) parent nodes have less value than child nodes (d) maximum value is contained by the root node Minimum number of queues required for priority queue implementation? (a) 5 (b) 4 (c) 3 (d) 2 Which of the following sorting methods is not suited for an already sequence? (a) merge sort (b) selection sort (c) bubble sort (d) insertion sort RPSC Lect. 2011 Minimum and maximum height of a binary search tree of n nodes is (a) 1, log2n (b) log2n, log2n (c) log2n, n (d) n, n2 RPSC Lect. 2011 Binary search is applicable in (a) Array and AVL tree (b) Array and Heap tree (c) Queue and AVL tree (d) Queue and Heap tree RPSC Lect. 2011 Pointer head points to first node of a linked list Each node has link to next node. Time complexity to swap values of pth and qth nodes shall be (a) O(p2+q2) (b) O(max (p,q)) (c) O(1) (d) O((p+q)2) RPSC Lect. 2011 Every node of a tree has exactly 3 children. If root is at height 1, number of nodes in a full tree (every level is full except last level that consists of leaf nodes only) of height h is given by (a) (3h–1)/2 (b) (3h+1–1)/2 h–1 (c) (3 –1)/2 (d) (3h–1) RPSC Lect. 2011 The best data structure to check whether an arithmetic expression has balanced parentheses is a/an (a) stack (b) priority queue (c) array (d) linked list RPSC Lect. 2011 Maximum number of edges in a n-node undirected graph without self-loops is (a) n2 (b) n(n – 1)/2 (c) n(n – 1) (d) n(n+1)/2 RPSC Lect. 2011 YCT 68. 69. 70. 71. 72. 73. 74. 75. 76. 77. Level order traversal of a rooted tree can be done by starting from the root and performing (a) preorder traversal (b) in-order traversal (c) depth first search (d) breadth first search RPSC Lect. 2011 Which of the following is not a backtracking algorithm? (a) Knight tour problem (b) N-queen problem (c) Towers of Hanoi (d) M-coloring problem UPPSC LT GRADE 29.07.2018 Which of the following is useful in traversing a given graph by breadth-first search (BFS)? (a) Stack (b) Set (c) List (d) Queue UPPSC LT GRADE 29.07.2018 Which of the following is not a primitive data type? (a) Boolean (b) Byte (c) String (d) Double UPPSC LT GRADE 29.07.2018 Zero address instructions are implemented with the help of (a) queue (b) stack (c) register (d) None of the above UPPSC LT GRADE 29.07.2018 Two labeled trees are isomorphic if ______ (a) graphs of the two trees are isomorphic (b) the two trees have same label (c) Both (a) and (b) (d) graphs of the two trees are cyclic GPSC Asstt. Prof. 30.06.2016 A path in graph G, which contains every vertex of G once and only once? (a) Eular Circuit (b) Hamiltonian Path (c) Eular Path (d) Hamiltonian Circuit NIELIT Scientists-B 22.07.2017 (IT) What data structure is used for depth first traversal of a graph? (a) Queue (b) Stack (c) List (d) None of above NIELIT Scientists-B 04.12.2016 (CS) A ________ is a linear list in which insertions and deletions are made to from either end of the structure (a) Circular queue (b) Priority queue (c) Stack (d) Dequeue NIELIT Scientists-B 04.12.2016 (CS) Linked lists are best suited (a) For relatively permanent collection of data (b) For the dynamic allocation of data (c) For the insertion of data at one end (d) When data accesses is done at one end MPPSC State Forest Service Examination 2014 DATA Structures and Algorithm 78. 79. 80. 81. 82. 83. 84. 85. 86. 87. 122 A Dequeue allows (a) Insertion at only one end but deletion at both ends (b) Insertion at both ends but deletion at one end (c) Both (insertion at only one end but deletion at both ends) and (insertion both ends but etion at one end) (d) Insertion and deletion in middle but not at either ends MPPSC State Forest Service Examination 2014 Static queue is implemented using (a) Pointers (b) Nodes (c) Arrays (d) None of these MPPSC State Forest Service Examination 2014 From which end of the Queue elements are deleted? (a) Rear (b) Front (c) Middle (d) Any Position MPPSC State Forest Service Examination 2014 The access of queue element is (a) Sequential (b) Random (c) Direct (d) Indexed MPPSC State Forest Service Examination 2014 Liner type data structure is (a) Strings (b) Arrays (c) Queue (d) All options are correct MPPSC State Forest Service Examination 2014 The best data structure to check whether an arithmetic expression has balanced parenthesis is a (a) Queue (b) Stack (c) Tree (d) List ISRO Scientist/Engineer 2017 (May) When two n-bit binary numbers are added the sum will contain at the most (a) n bits (b) (n+3) bits (c) (n+2) bits (d) (n+1) bits ISRO Scientist/Engineer 2017 (May) Which one of the following in-place sorting algorithms needs the minimum number of swaps ? (a) Insertion Sort (b) Quick Sort (c) Heap Sort (d) Selection Sort ISRO Scientist/Engineer 2017 (May) Which of the following data structure is useful in traversing a given graph by breadth first search ? (a) Stack (b) Queue (c) List (d) None of the above ISRO Scientist/Engineer 2017 (May) The number of leaf nodes in a complete binary tree of depth d is (a) 2d (b) 2d-1+1 d-1 (c) 2 +1 (d) 2d +1 RPSC VPITI 2014 (IT) YCT 88. 89. 90. 91. 92. 93. 94. 95. 96. 97. Link list is preferably not suitable for implementation of? (a) Insertion sort (b) Binary search (c) Radix sort (d) Polynomial manipulation RPSC Lect. 2014 The linear data structures are (i) Stack (ii) Array (iii) Tree (iv) Graph (a) (i) only (b) (i) & (ii) only (c) (iii) (d) (iv) RPSC VPITI 2018 (IT) Quick sort algorithm is based on (a) Divide and Conquer (b) Dynamic Programming (c) Greedy Method (d) None RPSC VPITI 2018 (IT) .......... contains metadata: (a) Table (b) Data dictionary (c) Data directory (d) Database TNPSC 2016 (Degree) P-II The term OSPF is a short form for: (a) Optimal Shortest Path First (b) Open Shortest Path First (c) Open Short Packet First (d) Optimum Start Path First APPSC Poly. Lect. 13.03.2020 As the process enters the system, it is placed in which type of the queue? (a) Block queue (b) Ready queue (c) Job queue (d) Waiting queue APPSC Poly. Lect. 13.03.2020 Which of the following is not to a binary tree? (a) Heap (b) AVL-Tree (c) B-Tree (d) Search tree UPPCL AE 2014 Link lists are not suitable for (a) Polynomial manipulation (b) Binary search (c) Radix sort (d) Insertion sort UPPCL AE 2014 Which search is similar to minimax search? (a) Hill- climbing search (b) Depth- first search (c) Breadth - first search (d) All of these RPSC ACF & FRO 23.02.2021 (CS) Which one is informed search? (a) Depth First Search (b) Breadth First Search (c) Bi- Directional Search (d) Heuristic Search RPSC ACF & FRO 23.02.2021 (CS) DATA Structures and Algorithm 98. 99. 100. 101. 102. 103. 104. 105. 123 Shell sort uses: (a) Insertion sort (c) Quick sort (b) Merge sort (d) Selection sort Punjab PSC Lect. 2016 (IT) If all the edge weights of an undirected graph are positive, then any subset of edges that connects all the vertices and has minimum total weight is a: (a) Hamiltonian cycle (b) Grid (c) Hypercube (d) Tree Punjab PSC Lect. 2016 (IT) A graph is a collection of nodes called .......... and line segments called .......... that connect pairs of nodes. (a) Vertices, Paths (b) Paths, Edges (c) Vertices, Edges (d) Vertices, Vertices Karnataka PSC Comp. Sci. Teacher 16.10.2017 In a linear search : (a) Search starts at the middle and goes to left or right depending on the case (b) Search starts at the beginning of the list and checks every element in the list until either the search is successful or the list ends (c) Computes a hash value and compares (d) Search is randomly carried out Karnataka PSC Comp. Sci. Teacher 16.10.2017 In Tower of Hanoi problem, with n disks, the number of moves from source to destination is: (a) 2n – 1 (b) 2n–1 n (c) 2 + 1 (d) 2n+1 Karnataka PSC Comp. Sci. Teacher 16.10.2017 In linked list representation, graph is stored in: (a) Edge list (b) Vertex list (c) Adjacency list (d) None of the above Karnataka PSC Comp. Sci. Teacher 16.10.2017 Consider the following sorting algorithms. I. Quicksort II. Heapsort III. Mergesort Which of them perform in least time in the worst case? (a) I and II only (b) II and III only (c) III only (d) I,II and III ISRO Scientist/Engineer 2014 Feedback queues (a) are very simple to implement (b) dispatch tasks according to execution characteristics (c) are used to favour real time tasks (d) require manual intervention to implement properly ISRO Scientist/Engineer 2007 YCT 106. Selection sort algorithm design techniques is an example of (a) Greedy method (b) Divide-and -conquer (c) Dynamic Programming (d) Backtracking ISRO Scientist/Engineer 2007 107. A graph with "n" vertices and n-1 edges that is not a tree, is (a) Connected (b) disconnected (c) Euler (d) A circuit ISRO Scientist/Engineer 2007 108. Heap can be used as _____ (a) Priority queue (b) Stack (c) A decreasing order array (d) Normal Array GPSC Asstt. Prof. 30.06.2016 109. A graph with all vertices having equal degree is known as a ______ (a) Multi Graph (b) Regular Graph (c) Simple Graph (d) Complete Grah GPSC Asstt. Prof. 30.06.2016 110. What is an internal sorting algorithm? (a) Algorithm that uses tape or disk during the sort (b) Algorithm that uses main memory during the sort (c) Algorithm that involves swapping (d) Algorithm that are considered 'in place' GPSC Asstt. Prof. 30.06.2016 111. The process of accessing data stored in a serial access memory is similar to manipulating data on a _______ (a) Heap (b) Binary Tree (c) Array (d) Stack GPSC Asstt. Prof. 30.06.2016 112. What is meant by physical size in a dynamic array? (a) The size allocated to elements (b) The size extended to add new elements (c) The size of the underlying array at the backend (d) The size visible to users GPSC Asstt. Prof. 30.06.2016 113. Which of the following properties is associated with a queue? (a) First In Last Out (b) First In First Out (c) Last In First Out (d) Last In Last Out GPSC Asstt. Prof. 30.06.2016 114. What is the need for a circular queue? (a) effective usage of memory (b) easier computations (c) to delete elements based on priority DATA Structures and Algorithm 115. 116. 117. 118. 119. 120. 121. 122. 123. 124 (d) implement LIFO principle in queues GPSC Asstt. Prof. 30.06.2016 An important application of binary tree is ____ (a) Huffman coding (b) Stack implementation (c) queue implementation (d) traverse a cyclic graph GPSC Asstt. Prof. 30.06.2016 The operation of processing each element in the list is known as (a) sorting (b) merging (c) inserting (d) traversal APPSC Lect. Degree College 07.06.2017 (CS) A full binary tree with n leaves contains (a) n nodes (b) log2 n nodes (c) 2n–1 nodes (d) 2n nodes APPSC Lect. Degree College 07.06.2017 (CS) The data structure required for breadth first traversal on a graph is (a) queue (b) stack (c) array (d) tree APPSC Lect. Degree College 07.06.2017 (CS) The data type created by data abstraction process is called (a) class (b) structure (c) abstract data type (d) user defined data type APPSC Lect. Degree College 07.06.2017 (CS) Which one of the following register is updated during instruction execution to point to the next instruction byte to be fetched? (a) Stack pointer (b) Frame pointer (c) Program counter (d) Argument pointer UPSC Poly Lect. 10.03.2019 A model which is used to understand the design of a data structure to indicate an implementation-independent view of the data structure is: (a) Linear data type (b) Non-linear data type (c) Abstract data type (d) Primitive data type UPSC Poly Lect. 10.03.2019 In a queue an element can be added arbitrarily and from which only either the smallest or largest element can be removed, the type of the queue is: (a) Circular queue (b) Priority queue (c) Deques (d) Ordinary queue UPSC Poly Lect. 10.03.2019 Postfix notation is also known as: (a) Reverse polish notation (b) Polish notation (c) Infix notation (d) Reverse notation UPSC Poly Lect. 10.03.2019 YCT 124. A sorting technique is called stable if (a) If it takes O (n log n) time (b) It uses divides and conquer technique (c) Relative order of occurrence of non-district elements is maintained (d) It takes O (n) space ISRO Scientist/Engineer 17.12.2017 125. Which of the following sorting algorithms does in-place sorting with minimal space overhead? (a) Merge sort (b) Radix sort (c) Heap sort (d) Address Calculation sort APPSC Lect. 2017 (Degree College) (CS) 126. What is the cyclomatic complexity of a module which has seventeen edges and thirteen nodes? (a) 4 (b) 5 (c) 6 (d) 7 ISRO Scientist/Engineer 2013 127. ChiMerge discretisation is a_____method, which employs the _____ approach. (a) Supervised, top-down (b) Unsupervised, top-down (c) Supervised, bottom-up (d) Unsupervised, bottom-up APPSC Lect. Degree College 16.09.2020 128. Which metric provides a quantitative measure of logical complexity of a program? (a) Loop complexity (b) Data complexity (c) Behaviour complexity (d) Cyclomatic complexity RPSC ACF FRO 23.02.2021 (Comp. App./Sci.) 129. Which type of behavior a stack exhibits ? (a) First in, first out (b) Last in , last out (c) Last in, first out (d) None of these RPSC ACF FRO 23.02.2021 (Comp. App./Sci.) 130. Spanning tree of a graph with V vertices has (a) v - 1 edges (b) v edges (c) v + 1 edges (d) v + 2 edges RPSC ACF FRO 23.02.2021 (Comp. App./Sci.) 131. Graphs are represented using: (a) Adjacency tree (b) Adjacency linked list (c) Adjacency graph (d) Adjacency queue (e) Adjacency output CGPSC Asstt. Prof. 2014 (Comp. App.) 132. The running time of ________ depends on whether the partitioning is balanced or unbalanced. (a) Insertion sort (b) Selection sort (c) Quick sort (d) Merge sort (e) Bubble sort CGPSC Asstt. Prof. 2014 (Comp. App.) 133. Preorder is nothing but: (a) Depth-first order (b) Breadth-first order (c) Topological order (d) Linear order (e) Reverse order CGPSC Asstt. Prof. 2014 (Comp. App.) 134. A queue in which items are inserted and removed from any position based on same property : (a) deque (b) property queue (c) priority queue (d) preference queue RPSC VPITI 2018 (CS) ANSWER KEY 1. (a) 2. (a) 3. (d) 4. (a) 5. (b) 6. (a) 7. (a) 8. (d) 9. (b) 10. (d) 11. (d) 12. (c) 13. (d) 14. (a) 15. (c) 16. (b) 17. (a) 18. (a) 19. (b) 20. (b) 21. (d) 22. (c) 23. (a) 24. (a) 25. (a) 26. (d) 27. (a) 28. (b) 29. (b) 30. (c) 31. (c) 32. (b) 33. (c) 34. (d) 35. (b) 36. (d) 37. (a) 38. (b) 39. (a) 40. (d) 41. (b) 42. (c) 43. (a) 44. (d) 45. (b) 46. (d) 47. (b) 48. (b) 49. (c) 50. (d) 51. (b) 52. (a) 53. (b) 54. (a) 55. (a) 56. (d) 57. (b) 58. (d) 59. (c) 60. (d) 61. (b) 62. (c) 63. (a) 64. (b) 65. (a) 66. (a) 67. (b) 68. (d) 69. (c) 70. (d) 71. (c) 72. (b) 73. (c) 74. (b) 75. (b) 76. (d) 77. (b) 78. (c) 79. (c) 80. (b) 81. (a) 82. (d) 83. (b) 84. (d) 85. (d) 86. (b) 87. (a) 88. (b) 89. (b) 90. (a) 91. (b) 92. (b) 93. (c) 94. (c) 95. (b) 96. (b) 97. (d) 98. (a) 99. (d) 100. (c) 101. (b) 102. (a) 103. (c) 104. (b) 105. (b) 106. (a) 107. (b) 108. (a) 109. (b) 110. (b) 111. (d) 112. (c) 113. (b) 114. (a) 115. (a) 116. (d) 117. (c) 118. (a) 119. (c) 120. (c) 121. (c) 122. (b) 123. (a) 124. (c) 125. (c) 126. (c) 127. (c) 128. (d) 129. (c) 130. (a) 131. (b) 132. (c) 133. (a) 134. (c) DATA Structures and Algorithm 125 YCT 05. COMPUTER ORGANIZATION AND OPERATING SYSTEM Basic Structure of Computer A Computer is an electronic device which takes some input, do some arithmetic & logical operation and produce the desired result. It has following components a. Input unit (For accepting data & Instruction) b. Storing Data (Primary& Secondary memory) c. Processing Data (CPU) d. Output unit (displaying result & Printer) e. Controlling and coordinating all operation inside computer (Control unit) Computer is a system, so all the subsystem interact with each other to achieve the goal of computer (a) Input– Input device is the main component of Computer. Through this device data & instruction are inserted inside the Computer. Main input device is Keyboard, Mouse, Scanner & Trackball & Light Pen etc. (b) Storage– Storage is the properties of computer where data & instructions are stored in computer. Some storage are volatile and some non-volatile. There are two types of Storage I. Primary storage II. Secondary storage Primary storage– Primary memory is key fast memory. It is an electronic device so all content of memory takes equal time Main memory is also called Random access memory (RAM). The Program and data are loaded into the primary memory before processing. CPU directly interact With the RAM. It is volatile in nature. Primary memory is very expensive & therefore Limited in capacity. Computer Organization and Operating System Secondary Storage– Secondary memory is made up of magnetic material. Memory all the instruction & Data which is not going to be executed is stored in secondary memory Secondary memory is slower and cheaper than main memory so Its capacity is large. It is characterized by low cost, large access time & large storage Capacity. (c) Processing– Program is made of instruction & data. The process of performing operation on data as per the instruction specified by Program is called Processing. Data Processing is an activity where data is manipulated so that meaningful information can be achieved. Data and instruction is taken from main memory & transferred to ALU (Arithmetic Logic unit), a part of CPU, which perform every type of calculation. When all the processing completes, the final result is transferred to main memory (d) Output– In output unit result is displayed. result is given through output devices like monitor, Printer etc computer process the data in binary format & result of Processing is also in the binary form. the result can not be directly given to the user, The output device therefore convert the result in available in binary form into human readable language. before displaying it to the user. (e) Controlling– The function of managing the controlling of all the component i.e Coordinating all the operation is done by control unit. Control unit fetch the instruction, decode the instruction and execute the instruction. Computer Arithmetic Operations– ALU is mathematical Brain of computer, ALU is digital circuit that provides arithmetic & logic operations, It is the fundamental building block of the central processing unit of a computer most of the operations are performed by one or more ALU which load data from input register Registers are small amount of storage available to the CPU 126 YCT Central Processing Unit and Instructions CPU Consist of arithmetic logic unit (ALU) control unit (CU) and Register the Brain of computer is known as Central Processing Unit. It carries out the actual Processing, it is known as processor of computer. It is placed on the circuit Known as integrated circuit, Integrated circuits are made up of semiconductor material. Program consist of data & instruction. These are given to CPU for execution of Program. CPU fetches the program and data from memory and perform arithmetic and logic operation as per given instruction and stores the result back to memory. CPU has its own memory called Register. Register are part of CPU chip and they are limited in size and number. These Register are used for storing data, instruction and intermediate result. CPU has two main component– Arithmetic Logic Unit (ALU) and Control Unit (CU), ALU perform all kind of calculations such as arithmetic (Add, subtract, multiply divide), comparison (Less than, Greater than or Equal to) and other operation Control unit's main function is to direct and coordinate the computer operations. It interpret the instruction and initiates action to execute them. Control Unit, Control the flow of data through the computer system & direct the ALU, input-output (I/O) devices and other units. It is also called central nervous system of the computer system In addition the CU is responsible for fetching decoding, executing instructions and storing result. Memory Organization A computer system require to store the data & instruction for processing, Whenever we talk about the memory of computer system we usually Talk about the main or primary memory. Secondary memory is used to store data, instructions and result permanently for future use. Memory Hierarchy– Memory usually refers to random access memory typically DRAM (Dynamic RAM) and memory can also refer to other forms of data storage. Term storage refers to storage Devices that are not directly accessible by the CPU (Secondary Storage) Example of secondary storage device are hard disk, optical disk Drives and other devices that are slower than RAM but are used to store data permanently. CPU Register– Register are directly accessible by CPU. Registers are the fastest of all forms of computer data storage. Cache Memory– Cache memory is located between Register and main memory. It is used to store instruction & data that are repeatedly require to execute Program. CPU first checks within the data & instruction is available in cache memory. When the same piece of data and instruction is needed, the CPU read it from cache memory instead of main memory . Primary Memory – Primary memory (main memory or Internal memory can be directly accessed by the CPU. CPU continuously reads instruction stored in the primary memory and execute them any data that has to be operated by CPU is also store there, There are two types of primary memory RAM & ROM. RAM is usually referred to as main memory & It is faster than the secondary memory. ROM is non-volatile, which means Its contents are not lost even when the power is turned off. It is a small but faster permanent storage for the contents which are rarely changed. For Example boot loader that loads the operating system into primary memory, is stored in ROM. Secondary Memory– Primary memory has limited storage capacity and is either volatile (RAM) or readonly (ROM) This memory is not directly accessible by the CPU. Secondary Storage devices hold data even when the computer is switch off. An example of such a device is hard-disk. Computer usually uses its input/output channel to access the data from secondary storage device to transfer the data in the main memory. While the CPU can read the data stored in main memory in nanoseconds, the data from these days there are secondary storage devices like SDD which support very fast data Transfer speed as compared to earlier HDD (Hard disk Drive). Data transfer between commutes have become easier and simple due to availability of small-sized and portable flash or pen drive. I/O Organization I/O Subsystem of computer provides an efficient communication between the central system and outside environment. It handles all the input output operations of the computer system. Computer Organization and Operating System 127 YCT Peripheral Devices– Input or output devices that are connected to computer are called Peripheral devices. For example Keyboard display units and Printers are common peripheral devices. There are three types of Peripherals Input Peripherals– Allows user input, from the outside world to the computer. Example : keyboard, mouse etc Output-Peripherals– Allows information output from computer to the outside world example: Printer, Monitor etc. Input-output Peripherals– Allows both input as well as, output, Example-Touch screen etc Interfaces– Interface is a shared boundary between two separated components to the system for communication purposes. There are Two types of interface: a. CPU Interface b. I/O Interface Input-Output Interface– In computer system, there are special hardware components between the CPU and peripherals to control or manage the input-output transfers. These components are called input-output interface units because they provide communication links between processor bus and peripherals. They provide a method for transferring information between internal system and input-output devices. Modes of I/O Data Transfer- Data transfer between the central unit and I/O devices can be handled in generally there types of modes which are given below. a. Programmed I/O b. Interrupt initiated I/O c. Direct memory access Programmed I/O→ Programmed I/O instruction are result of I/O instruction written in computer program. Each data item transfer is initiated by the instruction in the Program. Usually the program control data transfer to and from CPU & peripheral. Transferring data under Programmed I/O requires constant monitoring of the peripherals by the CPU. Interrupt Initiated I/O – In the programmed I/O method the CPU stays in the program loop until the I/O unit indicates that it is ready for data transfer. This is time Consuming process because it keeps the processor busy needlessly. This problem can be overcome by interrupt initiated I/O In this when interface determines that the peripheral is ready for data transfer, it generates an interrupt. After receiving the interrupt signal, the CPU stops the task which it is processing and service the I/O transfer and there return back to its previous processing task. Direct Memory Access– Removing the CPU from the path & letting the peripheral device manage the Computer Organization and Operating System memory buses directly would improve the speed of transfer. This technique is known as DMA. In this, the interface transfer data to and from the memory through memory bus. A DMA controller manages to transfer data between peripherals & memory unit. Many hardware systems use DMA such as disk drive controller, graphic cards, network cards. It is also used for intra chip data transfer in multicore processor. In DMA, CPU would initiate the transfer, do other operations while the transfer is in progress and receive an interrupt from DMA controller when the transfer has been completed. Operating Systems Overview Operating system is software that make the computer hardware to work. operating system is a system software that must be loaded before starting any task. Operating system is an Interface for users to communicate with the computer. We can say that operating system is control program of a computer main function of the operating system include: • Operates CPU of the computer • Control input/output devices that provides the interface between user and the Computer Handles the working of application programs with the hardware and other software systems • Manages the storage and retrieval of information For hardware functions such as input and output and memory allocations, the operating system acts as an intermediary between programs and computer Hardware. Although the application code is usually executed by the hardware and frequently makes system calls to on operating function. Dominant general purpose personal computer operating system is Microsoft windows with market share of around 76.45% mac OS by Apple inc is in second place (17.72%) and the varieties of Linux are collectively in third place (1.73%) In the mobile sector (including Smartphone and Tablet), Android share is up to 72% in the year 2020. Linux distribution are dominant in the server and Super computing sectors. Types of operating system a. Batch processing b. Single user single tasking 128 YCT c. Single user multi tasking 3.1 (a) Advantages of Batch Operating System : d. Multi Processing It is very difficult to guess or know the time required for any job to complete. Processes of the batch system 5. Real time operating system know how long the job would be when it is in queue. 01. Operating System Multiple users can share the batch systems. Operating System acts as an interface between computer hardware and user. It manages and controls all The idle time for the batch system is very less. the hardware and flow of data, instructions and It is easy to manage large work repeatedly. information to and within the system. The Operating 3.1 (b) Disadvantages of Batch Operating System : System takes instructions from the user and directs it to Lack of interaction between the user and the job. CPU, which further passes the instructions to the Batch systems are hard to debug. hardware. The other jobs will have to wait for an unknown time if any job fails. 3.1 (c) Example of Batch Based Operating System : Payroll system, Bank statements, etc. 3.2 Time Sharing Operating System : The user directly gives instructions to an OS, and the OS executes multiple tasks at a time. The computer memory stores these programs and they share a single processor. The tasks switch rapidly from one to another giving immediate response to the user. These system are also known as multitasking systems. The task can be Operating System is one of the core software from a single user or different users also. It uses the programs that run on hardware and makes is usable. The concept of CPU scheduling and multiprogramming so user can interact with hardware so that they can send that the time of the CPU is divided equally among the commands and receive output. An Operating System tasks. This allows all the tasks to work smoothly. As the provides an interface between user and machine. This interactive I/O is slower as compared to the CPU, this interface can be graphical user interface (GUI) in which OS also increases CPU utilization as there is always a users. Click on screen elements to interact with spare job to execute. This OS focuses on decreasing the Operating System or a command line interface (CLI) to response time of a task. The time taken to execute a tell the Operating System to do things, it also manages the single task is called quantum. Once this time interval is computer's resource such as CPU, memory, disk drives and over the OS switches to the next task. printers. It provides services for application software. 3 Types of Operating System : An Operating System performs all the basic tasks like managing files. Some widely used Operating System are as follows : 3.1 Batch Operating System : This type of Operating System does not interact with the computer directly. There is an operator which takes 3.2 (a) Advantages of Time Sharing Operating System : similar jobs having the same requirement and group Each task receives equal time to use the CPU. them into batches. It is the responsibility of the operator Reduces CPU idle time. to sort jobs with similar needs. The main characteristics of the batch Operating System is the CPU executes the Fewer chances of duplication of software. jobs in the same sequence that they are sent to it by the 3.2 (b) Disadvantages of Time Sharing Operating operator, which implies. That the task sent to the CPU System : first will be executed first, It’s also known as the ‘First Due to multiple sharing, it is unreliable. come, First serve’. One must have to take care of the security and integrity of user programs and data. Data communication is difficult. 3. 2 (c) Example of Time Sharing Operating System : Multics, Unix, Linux, Windows 2000 server, Windows NT server, etc. Computer Organization and Operating System 129 YCT 3.3 Distributed Operating System : In this type of Operating System, multiple CPUs are used to serve multiple processes and users. All the computers have their own memory unit and CPU are interconnected and communicate with each other over a shared communication network. The processors differ in size and function and remote access is enabled within the devices connected to network. The job of data processing is distributed among various processors which makes the job more efficient. The major benefit of working with these types of the Operating System is that it is always possible that one user can access the files or software which are not actually present on his system but some other system connected within this network i.e., remote access is enabled within the devices connected in that network. 3.3 (a) Advantages of Distributed Operating System Failure of one will not affect the other network communication as all systems are independent from each other. Increased data exchange speed and reduced load on the host computer. Since resource are being shared computation is highly fast and durable. These systems are easily scalable as many system can be easily added to the network. 3.3 (b) Disadvantages of Distributed Operating System : A single system failure might not affect the entire communication but the failure of the main network can crash it. Languages used to establish distributed Operating Systems are not well established. It is not readily available as it is very expensive and complex. 3.3 (c) Example of Distributed Operating System : LOCUS, MICROS, IRIX, DYNIX, AIX, Solaris, Mach, OSF/1 etc. 3.4 Network Operating System : These systems run on a server and provide the capability to manage data, users, groups, security, applications and other networking functions. These types Computer Organization and Operating System of Operating Systems allow shared access of files, printers, security, applications and other networking functions, over a small private network. One more important aspect of users are well aware of the underlying configuration of all other users within the network, their individual connections etc. and that’s why these computers are popularly known as tightly coupled systems. 3.4 (a) Advantages of Network Operating System : It has stable and centralized servers that can handle security concerns well. Integration of new technologies and hardware upgradation is easier. Server access is possible remotely from different locations and types of systems. 3.4 (b) Disadvantages of Network Operating System : Most operations could only be performed through a central location. It repairs regular maintenance and updating. In this type of Operating System, the failure of any node in a system affects the whole system. 3.4 (c) Example of Network Operating System : Microsoft Windows Server 2003, Microsoft Windows Server 2008, UNIX, Linux, Mac OS X, Novell Netware and BSD, etc. 3.5 Real time Operating System : A real time Operating System is defined as a data processing system in which the time interval required to process and respond to inputs is so small that it controls the environment. The time taken by the system to respond to an input and display of required updated information is termed as the response time. Real time systems are used when there are time requirements on the operation of processor or the flow of data and real time Operating System can be used as a control device in a dedicated application. There are two types of Real-time Operating System – (i) Hard Real-time System : These Operating Systems are meant for applications where time constraints are very strict and even the shortest possible delay is not acceptable. These systems are built for saving life like automatic parachutes or airbags which are required to be readily available in case of any accident. Virtual memory is rarely found in these systems. 130 YCT (ii) Soft Real-time System : They have a less strict time constraint and critical tasks are given priority above others until they are completed and have limited utility. 3.5 (a) Advantages of Real-time Operating System : It provides more output from all the resources as there is maximum utilization of systems. These Operating Systems focus more on running applications than those in the queue. It provides the best management of memory allocation. Due to the small size of programs, they can be used in embedded systems. 3.5 (b) Disadvantages of Real-time Operating System Very few tasks run at the same time in order to avoid errors. It needs specific interrupts signals and device drivers to respond earliest to interrupts. In such systems we cannot set thread priority as these systems cannot switch tasks easily. 3.5 (c) Example of Real-time Operating System : Scientific experiments, medical imaging system, industrial control systems, weapon systems, Robots, air traffic control systems, MTOS, Lynx, RTX, etc. 4. Popular Operating System : To date, many Operating System have been developed that suit different requirements of the users. Some of these Operating Systems became quite popular while others did not do well. The following are some of the popular Operating System. 4.1 MS-DOS : MS-DOS was developed and introduced by Microsoft in 1981. It is a single user and single tasking Operating System developed for personal computers. MS-DOS was specifically designed for the family of Intel 8086 Microprocessors. This Operating System provides a command line user interface, which means that a user needs type a command at the command line for performing a specific task. The CLI (Command Line Interface) of MS-DOS is more commonly known as DOS prompt. The user interface of MS-DOS is very simple to use but not very user friendly because of its. Non-graphical nature, The command prompt, of MSDOS only allowed the execution of the files with the extensions .com (Command files), BAT (Batch files) and .exe (Executable files). The structure of MS-DOS comprises the following programs : IO.SYS : It is an important hidden and read only system file of MS-DOS that is used to start the computer system. It is also responsible for the efficient management and allocation of the hardware resources through the use of appropriate device drivers. Computer Organization and Operating System MS-DOS.SYS : It is another hidden and read only system file that is executed immediately after the execution of IO.SYS file is finished. MS-DOS.SYS acts as the kernel of MS-DOS. It is responsible for managing the memory, processors and the input/output devices of the computer system. CONFIG.SYS : It is a system file that is used to configure various hardware components of the computer system so that they can be used by the various applications. COMMAND.COM : It is the command interpreter that is used to read and interpret the various command issued by the users. AUTOEXEC.BAT : It is a batch file consisting of a list of commands that is executed automatically as the computer system starts up. 4.1.1 Commands of MS-DOS : The various commands of MS-DOS can be categories as : (i) Internal Commands : Internal commands are those commands that are stored in the command interpreter of MS-DOS. These commands get automatically loaded into the memory when a computer system is started. DIR : The DIR command is used to display the names of files and subdirectories present in a directory along with their size in bytes and the date and time of last modification performed. COPY : The COPY command is used to a file from one location to another on the computer system. TYPE : The TYPE command is used to view the contents of an existing file. MD : The MD command is used to create a new directory at the specified location in the computer system. MD stands for make directory and it is also known as the MKDIR command. CD : The CD command is used to move from one directory to another specified directory on the computer system. CD stands for change directory and it is also known as CHDIR command. RD : The RD command is used to remove an empty directory from the computer system. RD stands for remove directory and it is also known as RMDIR command. DEL : The DEL command is used to delete one or more files from the computer system. DEL stands for delete and it is similar to ERASE command. DATE : The DATE command is used to display the current date stored in the computer system. TIME : The TIME command is used to display the current time. CLS : The CLS command is used to clear the screen of the command prompt Windows. 131 YCT (ii) External Commands : External commands are those commands, which are stored an a disk and are not in the command interpreter. These commands have an extension of .Com, .Exe or .Bat and are less frequently used as compared to the internal commands. ATTRIB : ATTRIB is used to display the attributes of a file and change these attributes, if required. A file can have any of the four attributes, i.e. read-only, system, archive or hidden. CACLS : The CACLS command is used to display the Access Control List (ACLs) of the specified file. An ACL is a list that provides information to a computer system about the user access rights pertaining to a file. EDIT : The EDIT command is used to create, open or edit a particular file. It helps in creating a new file in the specified directory and also enables us to open and edit the contents of an existing file. TREE : The TREE command is used to view the files and subdirectories of the current directory in the form of a tree. It helps view the structure of the current directory in an easier way. DELTREE : The DELTREE command is used to delete a directory and all the files present in that directory permanently from the computer system. It remove a directory from the computer system along with its files and subdirectories. CHKDSK : The CHKDSK command is used to check the status of hard disk drives on the computer system for errors. If there are any errors on the disk then it helps in correcting those errors. We should run this command frequently in order to detect any errors on the disk. COMP : The COMP command is used to compare two existing files. FIND : The FIND command is used to search and display a string of characters in the specified file. The string to be searched is placed inside double quotes. HELP : The HELP command is used to display information related to various commands in MS-DOS. (iii) Batch Commands : Batch commands are used to execute a sequence of commands in MS-DOS. The sequence of commands, which could be internal or external are store in a file called batch file. A batch file is stored with .Bat extension. @ : The @ command is used to hide the display of a batch command on the screen and display only the output produced by the batch command. % DIGIT : The % DIGIT command is used to specify the batch parameters, which can be instantiated by the user at the time of execution of the batch command. These parameters are in the form of digits ranging from 0 to 9 where %0 represents the batch command itself. Computer Organization and Operating System CALL : The CALL command is used to call a batch program at the command prompt. It is also used to call or execute one batch program from another in such a manner that the first batch program is not interrupted. ECHO : The ECHO command is used to display or print a message on the command prompt. It is also used to turn on or off the display of the batch file commands on the command prompt. 4.2 UNIX : UNIX is an Operating System that allows several users to perform a number of tasks simultaneously. The first version of UNIX was introduced during the 1970’s. however, since then, it is in constant development phase for further improving it functionality. UNIX Operating System provides a GUI that enables its users to work in a more convenient environment. UNIX is most suitable for the computers that are connected to a Local Area Network (LAN) for perfuming scientific and business related operations. It can also be implemented on personal computers. The following are the core components of the UNIX Operating System. Kernel : It is the central part of the UNIX Operating System that manages and controls the communication between the various hardware and software components of the computer system. The other major functions performed by the kernel and are process management, memory management and device management. Shell : It is the user interface of the UNIX Operating System that acts as an intermediary between the user and the kernel of the Operating System. Shell is the only program in UNIX Operating System that takes the commands issued by the users and interprets them in an efficient manner to produce the desired result. Files and Processes : The UNIX Operating System arranges everything in terms of files and process. The directory in this Operating System is also considered as a file that is used to house other files within it. The process is usually a program executed under the UNIX Operating System. Several processes can be executed simultaneously in this Operating System and are identified by a unique Process Identifier (PID) assigned to them. 132 YCT The following are some of the significant features of UNIX Operating System. It allows multiple users to work simultaneously. It allows the execution of several program and processes at the same time to ensure efficient utilization of the processor. It implements the concept of virtual memory in an efficient manner. This feature enables the UNIX Operating System to execute a program whose size is larger than the main memory of the computer system. 4.3 LINUX : Linux is an open-source Operating System like other Operating Systems such as Microsoft Windows. Apple, Mac OS, iOS, Google Android etc. An Operating System is software that enables the communication between computer hardware and software. The Linux Operating System was developed by Linux Torvalds in 1991, which sprouted as an idea to improve the UNIX Operating System. He suggested improvements but was rejected by UNIX designers. Therefore, he thought of launching an Operating System, designed in a way that could be modified by its users. Linux is a freeware and has many different versions each with different look and feel e.g Ubuntu, Mint, Fedora, Debian etc. 4.4 Windows : Microsoft has provided many Operating Systems to cater the needs of different users. Microsoft is a well known name in the development of Operating System as well as various software applications. Initially, Microsoft introduced Windows1.x, Windows2.x and Windows386 Operating Systems. However, these Operating Systems locked certain desirable features, such as networking and interactive users interface. Microsoft continued to work towards developing an Operating System that met the desirable features of users and come up with a new Operating System in the year 1993. Which was known as Windows NT 3.1. This Operating System was specially designed for the advanced users performing various business and scientific operations. After the release of Windows NT 3.1, several other Operating Systems user introduced by Microsoft in the successive years with their own unique features. Computer Organization and Operating System Name of Operating System Windows 95 Date of Release August, 1995 Windows 98 June, 1998 Windows 2000 February, 2000 Windows ME September, 2000 Windows XP October, 2001 Windows Server 2003 April, 2003 133 Significant Features 32 Bit File System. Multitasking. Object Linking and Embedding (OLE). Plug and Play. Optimized memory management. 32 Bit data link control (DLC) protocol. Improved GUI. Improved online communication through various tools. Such as outlook express, personal web server and web publishing wizard. Multiple display support. Windows update. More reliable against application failure. Improved Windows explorer. Secure file system using encryption. Microsoft management console (MMC). Improved maintenance operations. System restoration against failure. Universal plug and play. Automatic updates. Image preview. Attractive desktop and user interface. System restore. Windows firewall. Files and settings transfer wizard. Enhanced Internet Information Service (ITS). Enhanced Microsoft Message Queuing (MSMQ). Enhanced active directory support. Watchdog timer. YCT Windows Vista November, 2006 Windows 7 October, 2009 Windows 8 October, 2012 Windows 8.1 October, 2013 Windows 10 July, 2015 Multilingual User interface. Enhanced search engine. Enhanced internet explorer. Enhanced Windows media player. Enhanced Windows update. Windows system assessment tool. Libraries to improve file access and organization. Action center for system maintenance backups, and troubles hooting. Improved networking via home group. Device stage for recognizing USB devices faster. Quick Desktop view button. Simplified Desktop for increased speed. Start menu has been replaced. Improved security. Enhanced search bar. Ribbon and Quick access toolbar in office 2007. Windows Reader is a native PDF reader. Add start Button to the desktop. Boot directly to the Desktop. Allows Snap start screen apps. Enhanced automatically Windows update. Enhanced New start menu. Voice-controlled digital assistant Cortana integration. Microsoft edge web browser. Multiple desktops and Computer Organization and Operating System task view. Tablet mode. Enhanced Action Center. Universal Apps. Windows October, 5G supported. 11 2021 Enhanced Cortana. Microsoft edge with IE mode replaces the internet explorer 1.1. S mode available. Wallet is removed. Android Apps supported. Improved Touch keyboard. 2. Functions of an Operating System : Some typical Operating System functions may include managing memory, files, processes, I/O system and devices, security etc. Following are the main functions of Operating System. 2.1 Memory Management : Memory management refer to management of primary memory or Main Memory. Main Memory is a large array of words or bytes where each word or byte has its own address. An Operating System does the following activities for memory management – Keeps tracks of primary memory, what part of it is in use and by which program. Deciding which process will get how much memory and when especially in a multiprogramming environment. Allocating the memory when a process request it to do so. de-allocates the memory when a process no longer needs it or has been terminated. 2.2 Process Management Process is the execution of a program that performs the actions specified in that program It can be defined as an execution unit where a program runs. The operating system helps you to create, schedule and terminates the processes which is used by CPU. A process created by main process is called child process. 134 YCT Process operations can be easily controlled with the help of PCB (Process Control Block). You can consider it as the brain of process which contains all the crucial information related to processing like Process id, priority, state, CPU register etc. Process Architecture– Stack Here, is an architecture of the process Heap Data Text Process Stack– Stack stores temporary data like function parameters, return addresses and local variables. Heap– Allocates memory, which may be processed during its run time. Data– It contains the variable Text– Text section includes the current activity which is represented by the value of the program counter. Process Control blocks– (PCB) It is a data structure that is maintained by the operating system for every process. PCB should be identified by integer Process ID (PID). It helps you to store all the information required to keep track of all the running processes. It is also accountable for storing the content of processor registers, they are saved when the process moves from the running state and then returns back to it. The information is quickly updated in the PCB by the OS as soon as process make the state transitions. Process States– 2.3 File Management : A file system is made up into directories form for improving its efficiency and better usage. These types of directories may contain another sub directories and files. It monitors all activates related to where all information is saved, user access setting, all status of each file, and more. So this type of process is known as ‘file system’. The Operating System keeps records of the status and locations of files. 2.4 Device Management : An Operating System manages devices communication via their respective drivers. It does the following activities for device management. Computer Organization and Operating System • Keeps tracks of all devices. Program responsible for this task is known as the I/O controller. • Decides which process gets the device when and for how much time. • Allocates and De-allocates the devices. 2.5 Input/Output Management : What output will come from the input given by the user, the Operating System runs this program. This management involves coordinating various input and output devices. It assigns the functions of those devices where one or more applications are executed. 2.6 Secondary Storage Management : System have several levels of storage which includes primary storage, secondary storage, and cache storage. Instructions and data must be stored in primary storage or cache so that a running program can reference it. 2.7 Security : The Operating System used password protection to protect user data and similar other techniques. It also prevents unauthorized access to programs and user data. Computer security is a very important aspect of any Operating System. The reliability of an Operating System is determined by how much better security it provides us. Modem Operating System use a firewall for security. A firewall is a security system that monitors every activity happening in the computer and blocks that activity in case of any threat. 2.8 Command Interpretation : Command interpreter is one of the part of Operating System which reads the commands that use users types in at a terminal, interprets, them and translate them into a detailed sets of instructions that the computer hardware can understands. It varies widely from one OS to other OS. Every OS must provide command interpreter for its operation. 2.9 Networking : A distributed system is a group of processors which do not share memory hardware devices or a clock. The processors communicate with one another through the network. 2.10 Communication Management : Coordination and assignment of compilers, interpreters and another software resources of the various users of the computer systems. 2.11 Job Accounting : Operating System keeps track of time and resources used by various tasks and users, this information can be used to track resource usage for a particular user or group of users. 135 YCT Process Management Process Schedulers–Operating system uses following schedulers for process scheduling. Long Term Scheduler– This scheduler is known as job scheduler. It select the process from pool which is located in secondary memory and keeps them in ready queue in primary memory. It controls the degree of multi-programming. The purpose of long scheduler is to select the mix of CPU bound & Input/Output bound processes among the job present in the pool. Short Term Scheduler– Short term schedulers is also known as CPU scheduler. It chooses one job from ready queue and dispatch it to CPU for execution. If selected job require long CPU burst time then other job in ready queue have to wait for a long time this problem is known as starvation. Medium Term Scheduler– Some process needs Input/Output operation. So they are put into suspended state or swapped out queue medium term scheduler take care of swapped out processes. It removes the process from running state to make room for the other processes. Such processes are swapped out processes and this procedure is called swapping. Medium term scheduler is responsible for suspending & resuming the processes. Various Time Related to Process– A program in execution is called a process. In order to accomplish its task process needs the computer resources. There may exist more than one process in the system which may require the same resource at the same time. Therefore operating system has to manage all the processes and the resource in a convenient and efficient way. Some resources may need to executed by one process at one time to maintain the consistency otherwise the system can become inconsistent and deadlock may occur. Operating system has to perform the following function regarding the process management: 1. Scheduling processes and threads on the CPU 2. Creating and deleting both user and system processes 3. Suspending & Resuming process 4. Providing mechanism for process synchronization 5. Providing mechanism for process communication Attribute of Process– To create the PCB of process following attribute of process is required. 1. Process ID 2. Program counter (PC) 3. Process state 4. Priority 5. General purpose registers 6. List of open files 7. List of open devices 8. Accounting information When execution switch from one process to another process, this event is known as content switching. All the information of a process which is stored in PCB will be Completion time – Arrival time = Waiting time + Burst saved. It is depicted in following figure. time Process1 Turnaround time = Completion time – Arrival time Waiting time = Turnaround time – Burst time Scheduling and Performance Criteria– There are various algorithm which are used by operating system to schedule the processes on the processor in an efficient way. Purpose of scheduling algorithm is as follows. I. Maximum CPU Utilization II. Fare Allocation of CPU III. Maximum Troughput IV. Minimum Turnaround Time V. Minimum Waiting Time VI. Minimum Response Time Scheduling Algorithm– Scheduling algorithm can be divided into two parts: 1. Preemptive Scheduling 2. Non-preemptive Scheduling In Preemptive scheduling algorithm CPU can be Process can be categorized as follow– taken away, when a priority jobs come in the queue then 1. CPU bound CPU can be taken away. Basically this type of algorithm 2. Input/Output bound is related to real time operating system. 3. Interactive Computer Organization and Operating System 136 YCT In non-preemptive algorithm, CUP cannot be taken away. There are following algorithms which can be used to schedule the jobs. 1. First Come First Serve– It is non-preemptive scheduling algorithm. Process with minimum arrival time will get the CPU first. Here component utilization is low and system throughput is also low. Here shorter jobs may suffer considerable turnaround delays and waiting time when CPU has been allocated to longer burst time. 2. Round Robin– There a quantum of 10-100 millisecond is allocated to process. As the time slice get exhausted, process goes to end of ready queue to await the next allocation. It is preemptive scheduling. 3. Shortest Job First (SJF)– SJF may be implemented in non-preemptive or preemptive manner. When this algorithm works then it searches the shortest CPU burst time. STF scheduling is an optimal scheduling algorithm is terms of minimizing average waiting time of given set of processes. Consider a situation where shorter jobs comes in system continuously and system is implementing STF scheduling algorithm then larger job not getting the CPU and its waiting time will increase. This situation is known as starvation. Priority Bases Scheduling– Here priority of job will be consider in allocating the processor. Here priority is assigned to each process and scheduler always picks the highest priority process from ready queue. Equal priority process will be treated as FCFS basis. Here low priority process is blocked by higher priority process this blockage problem is solved by aging priority in this the priority of a process is gradually increases that wait in the system for a long time finally process will get the CPU for execution. Multilevel Queue Scheduling– Here processes are grouped according to their characteristic. For example interactive process are placed in foreground & batch processes are placed in background could be considered as two types of processes, because their response time requirement is different. Multiqueue scheduling algorithm partition the queue into separate queues. Each queue has its separate scheduling algorithm. Interactive queue might be scheduling by round robin and batch queue will fallow FCFS. Interprocess Communication– Concurrent process executing in the operating system may be independent process or cooperating process. A process is independent if it cannot effect or affected by another process executing in the system. Any process that does not share any data with any other process is independent. A Computer Organization and Operating System process is cooperating if it can affect or be affected by process is a cooperative process. Advantage of cooperating process is as fallows: 1. Information Sharing– Several users may be interested in same piece of information 2. Computation Speed-up– If we want that any task run faster. We break this task into subtask, each of which will be executing in parallel with others. 3. Modularity– Dividing the system function into separate process or threads. 4. Convenience– Even an individual user may have many task on which to work at one time. Processes can communicate by passing information to each other via shared memory or message passing. In shared memory model they do so by entering & retrieving data from a single block of physical memory that designated as shared by all of them each process has direct access to this block of memory. In message passing processes communicated by sending & receiving packets of information called messages. These messages may be communicated indirectly or directly. Indirect message passing is done via a mail box and direct message passing is done via a link between the two communicating processes. Message passing is useful for exchanging smaller amount of data. Process Synchronization– In order to cooperate several processes must communicate and synchronize. If several processes accessing some piece of data and outcome depends on particular order of execution of processes. This is known as race condition. Consider n processes executing in a system and each process have some piece of code known as critical section. These code can be accessed by only one process at any time. If one process in executing in its critical section, no other process can enter the critical section. repeat entry section critical section exit section remainder section Until false Semaphore– A semaphore is an integer variable that is accessed only through two standard atomic operation wait and signal. Operations were originally termed P (For wait) and V (For signal). Classical definition of wait is wait (s) { while (s < = 0) { 137 YCT /* do nothing } s = s–1; } signal (s) { s = s+1; } Example– Critical section for n process shared variables, semaphore mutex mutex = 1 process P2 do { wait (mutex) critical section signal (mutex) remainder section } while (True) Deadlock– Two or more processes are waiting indefinitely for an event that can because one of the waiting processes. Example– Let two processes P0 & P1 each accessing two s and q set to value 1: Suppose that P0 execute wait (s) and then P1 execute wait (q). It must wait until P1 execute signal (q). Similarly when P1 execute wait (s). It must wait until P0 execute signal (s) since these signal operation cannot be executed P0 and P1 are deadlocked. Types of Algorithm– 1. Divide and Conquer Algorithm 2. Dynamic Programming Algorithm 3. Greedy Algorithm 4. Backtracking Algorithm 5. Randomized Algorithm 6. Brute Force Algorithm letter as legal file names. Many operating system support two part file names with the two-port file name with the two ports separated by a period the first post is called primary file name and second part is called secondary or extension file name. File Structure– File can be structured in any of several ways. three common possibilities are depicted • Is an unstructured sequence of bytes • Record sequence • Tree structure First file organization system is implemented by UNIX operating system. In record sequence model, file is sequence of fixed length record. It is implemented by cp/m operating system. In tree structure a file, consist of tree of records not necessarily all the some length, each containing a key field in a fixed position in the record. Directories– Operating system keep the track of files, file systems normally have directories or folders which in many system are themselves are files. Directory Structure– Single Level Directory System– Simplest form of directory system is having are directory contain all the files which is called the root directory. It is used on personal computer which is used by only one user. But the problem arises when multiple users create their directories, where the name of directory may coincide resulting to problem. Important aspects of single level directory. • All files are contained in same directory • Easy to support and understand • Have significant limitations in terms of • Large number of files • Ability of support different users Disk Space Management– The space of disk which is not used by files are known as free disk space. When a new file is created, free disk space is searched & allocated the new file. Deletion of file causes its disk space is added to free space list. There are two methods to manage the free disk blacks. Linked list Finding & Processing File File– File are an abstract mechanism exact rules for the file naming vary from system to system, but all current operating system allows string of one to eight Computer Organization and Operating System 138 YCT Linked list of free blocks. In this method, link list is used to denote free block the figure block number IV, VI, XI, X, XII, XIV, XVI, XXII are free blocks. Bitmap– Bot map is used to assign the status of blocks. 0 denotes the free disk space & 1 denote the Allocated block. Let us take the above example, in the above figure record IV, VI, IX, X, XII, XV, XVI, XXVIII denote the free block by bit map vector. It is denoted as 1110101100101010111111011. It is bit map of free block. (A) Two Level Directory– Each user has its own user file directory. (UFD). The UFD have similar structure but each list only the files. Created by the single user when user searches the target file. System master file directory is searched. Here searching is most efficient since only one user's directory is searched. It allows sharing of directories and files several times on the tree structure. Example Unix. Disk Allocation Method– There are three method of disk allocation 1. contiguous 2. linked 3. indexed each method has some advantages and disadvantages: Contiguous Allocation– Contiguous allocation means file will be stored in contiguous location of secondary storage. As the file size is fit in adjacent location of free space. File is allocated we have two strategies for allocation of file. First Fit– Here we search the free holes. So they are fit size of file then search steps. Best Fit– There we search the smallest hole which satisfy the file request. Here first fit is faster compare to best fit. Tree Structured Directory– These allocation technique suffer from external fragmentation, when file is allocated to a empty whole some empty space remain. These empty space are collect and they form a large space. These techniques-are known as compaction. • The directory structure is a • True with arbitrary height • Users may create their own subdirectories • Issues Acydic Graph Directory Linked Allocation– Here file is linked allocation of disk blocks. Disk blocks are scattered the whole disc. Some memory space is required to point to next location of block main disadvantage of this technique is that of one pointer is damaged then file cannot be recovered. Directory entry contains a pointer to starting and ending file block. In linked allocation, better utilization of memory. It does not suffer from external fragmentation, here free block can be utilized for file block request. Disadvantage of this method is that it does not support direct access. Memory is required to store pointers over heads. It is slower than contiguous allocation. In tree model one file cannot appear in more than one directory. This is possible by making directory an acyclic graph. Two or more directory entries can point to some sub-directory of file. In the following figure there is no cycle in structure. Indexed Allocation– In this scheme, a special block known as index block contains the pointer to all the blocks occupied by a file indexed allocation sales the direct access problem. Here pointers are brought into one location called as index block. • Efficient searching, grouping • Current directory notion/change directory (absolute) • Directory semantics Computer Organization and Operating System 139 YCT disadvantage of this method in terms of memory utilization. Pointer overhead are greater than linked allocation. For every small file the indexed allocation would keep one entire block for pointer. Operations of File– The context of files are defined by its content who is creating the file. The various operation which can be implemented on file such as read, write, open and close etc are called file operation. These operation are performed by the user by using the command provided by the operating system. Common operation are as below1. Create() 2. Open() 3. Write() 4. Read() 5. Seek() 6. Delete() 7. Truncate() 8. Close() 9. Append() 10. Copy() 11. Move() Important Facts • An abacus was also known as counting frame and become popular among the people in Asia minor around 5000 years back. • Napier bones was developed by John Napier in year 1617. This device was specially designed for the multiplication and quotient of number. • The idea of using bones to carry out the multiplication of number was modified by Edmond Gunter in 1620 to produce a device known as Slide Rule. • Pascal lines was a calculator developed by Blaise Pascal in 1642. It was also known as a numerical wheel calculator. Computer Organization and Operating System • Charles Babbage, a processor of mathematics of the Cambridge university made some worthwhile efforts towards Automatic computing. He is also considered to be the father of modern computer. In 1922 he presented a working model of his concept with the help of an automatic mechanical computing machine. He named the Automatic mechanical computing machine as difference engine. • In 1923, Babbage made it more automatic by providing the feature of printing the Tabulated result. Babbage did not stop here and Started working on developing the analytical engine. The analytical engine was considered as completely automatic general Purpose programmable digital computer. • In 1937, An American mathematician, Howard Aiken desined MARK1 and completed it in the year 1944. • The Electronic numerical integrator and calculator (ENIAC) was another general purpose electronic digital computer developed at Moore school of engineering of university at Pennsylvania by John Ecker, John Mauchly and their Team in year 1946. In 1949, another electronic computer that used the • binary number system for representing and processing values was introduced. This computer was known as Electronic Discrete variable Automatic computer (EDVAC). EDVAC was the first computer that worked on the Principle of stored program. It was invented by John Eckert and John Mauchly and considered as successor of ENIAC. • Electronic Delay storage automatic calculator (EDSAC) was another early British electronic computer developed by maurice wilkes and his team at the university of combridge mathematical laboratory in 1949. Generation of Computers– The history of computer development is often discussed in terms of different generation of computer. First Generation Computer– First generation computers were employed during the period 1940-1956 These computer is used the Vacuum tubes technology for Calculation as well as for storage & control purposes. • Some Examples of first generation computers are ENIAC, EDVAC, EDSAC and UNIVAC. • The functioning of these computers depend an the Machine Language. A Machine Language is a language in which all values are represented in the form of 0'S and 1'S. Therefore these computer were not easy to Program. • They were generally designed as special purpose computers. Therefore these computers were not very Flexible in running different types of application. 140 YCT Second Generation Computer– • Second Generation computer were employed during the period 1956-1963 The main characteristic of these computer was the use of transistors in place of vacuum tubes in building the basic logic circuits. • Some example of second generation computers are PDP-8, IBM 1401 & BM 7090. • They were easy to program because of assembly language. • They are more reliable as compared to first Corporation computers and hence did not require maintenance at regular intervals of time. Third Generation Computers– • The third Generation computer were employed during the period 1964-1975. the major characteristic feature of third generation computer system was the use of Integrated circuit (ICs), The IC Technology was also known as micro electronics Technology. The first IC was developed by Jock kilby and Robert Noyee in the year 1958. • Some examples of third Generation Computer are NCR 365, B 6500, IBM 370, PDPII and CDC 7600. • They used high-level languages, A high-level language is a computer programming language that is independent of machine details. • They were able to execute any type of application such as business and scientific applications. Hence the third Generation computer were also considered as general purpose computers. Fourth Generation– Fourth Generation computer were employed during 1975-1989. The invention of large scale integration (LSI) Technology and very large scale integration (VLSI) Technology led to development of fourth generation computer. In LSI & VLSI Technologies led to development of microprocessor which become the major characteristic feature of the fourth generation computer. A microprocessor incorporate various component of a computer-such as CPU memory and input/output (I/O) controls on to single chip. Fifth Generation Computer– Fifth Generation computer are based on ultra large scale integration (ULSI) Technology that allows almost ten million electronic components to be fabricated on one small chip. This technology enhances the power and speed of the microprocessor the chips & capacity of primary and secondary storage Device. Fifth generation computer are faster, cheaper and more efficient Compared to fourth Computer Organization and Operating System Generation Computer. Some of improvement made during this generation of computers are as follows: • Development of parallel processor • Development of optical disk Technology • Invention of Internet & Its different services • The User of these computer find it very comfortable to use them because of several additional multimedia features. • They are versatile for Communications & Resource sharing. In these Generation Artificial intelligence clove lap new Concepts due to sophisticated. • MS-DOS is an operating system that uses Command Line Interface (CLI) for interacting with the end users. It was developed in 1980 by Microsoft (MS) Corporation for IBM personal computers. • Command can be defined as an instruction provided by a user in order to perform some specific task on the computer system. • Linux is a community of open-source Unix like operating systems that are based on the Linux Kernel. • Linux was initially released by Linus Torvalds on September 17, 1991. It is a free and open-source operating system and the source code can be modified and distributed to anyone commercially or noncommercially under the GNU General Public License. • Some of the popular Linux distributions are: MX Linux, Manjaro, Linux Mint, elementary, Ubuntu, Debian, Solus, Fedora, Open SusE, Deepin, Red Hat Enterpirse, Linux. • The file systems supported by Linux are as follows: xfs, ramfs, vfat, cranfsm, ext3, ext4, ext2, ext1, ufs, autofs, devpts, ntfs. • MS-DOS was a single-user and single tasking operating system, which meant that only one program could be run at a time by a single user. • Kernel is the central part of the UNIX operating system that manages and controls the communication between the various hardware and software components. • Shell is the user interface of the UNIX operating system that acts as an intermediary between the user and the Kernel of the operating system. • Unix is an operating system that is truly the base of all operating systems like Ubuntu, Solaris etc. It was developed in the 1970s by Ken Thompson, Dennis Ritchie and others in the AT & T Laboratories. • Different version of Unix are AIS, HP-UX, BSD, Iris etc. • The file systems supported by UNIX are as follows: zfs, js, hfx, gps, xfs, vxfs. 141 YCT Important Questions Asked in Previous Years Examinations 1. 2. 3. 4. 5. 6. 7. 8. Cache memory is used to transfer the data between? (a) Main memory and secondary memory (b) Processor and input device (c) Processor and output device (d) Main memory and Processor Combination of 16 bits is called? (a) Word (b) nibble (c) Memory Block (d) byte The first instructor of bootstrap loader program of an operating system is stored in? (a) RAM (b) Hard disk (c) BIOS (d) None –––––– is the fastest to read from and write to than the other kind of storage in a computer? (a) Floppy disk (b) Hard disk (c) CD-Rom (d) RAM Which of the following is not true about cache memory? (a) Faster memory than RAM (b) Volatile memory (c) Smaller in size than RAM (d) Sequential access memory A––––––Stores such instructions that are required to start a computer? (a) ROM (b) RAM (c) Motherboard (d) PROM A Small test file created by a website that is stored in the user's computer temporarily for the session is called? (a) Malware (b) Bug (c) Cookie (d) Cache The communication between the component in a microcomputer. Tokes place via the address and ––––– ? (a) I/O Bus (b) Data Bus (c) Address Bus (d) Control lines Computer Organization and Operating System 9. 10. 11. 12. 13. 14. 15. 16. 17. 142 Which of the following memories must be refreshed many times per second? (a) Static RAM (b) Dynamic RAM (c) EPROM (d) ROM An 8085 microprocessor based system uses a 4k×8 bit RAM whose Starting address is AAooH. The Address of last Byte in the is RAM is? (a) 0FFFH (b) 1000H (c) B9FFH (d) BA00H M + N×0 In X = , how many one-address P×Q instruction are required to evaluate it? (a) 4 (b) 6 (c) 8 (d) 10 The errors that can be pointed out by compiler are? (a) Syntax errors (b) Internal errors (c) Semantic error (d) Logical error Principle of locality is used in? (a) Registers (b) DMA (c) Cache memory (d) Interrupt The size of display of monitor is measured (a) Square (b) Spherical (c) Diagonally (d) Virtically Which of the following is not a variety of monitor (a) CRT (b) LED (c) HDML (d) LCD Resolution is a characteristic of? (a) Input device (b) Joystick (c) Display device (d) Storage Device Full form of PDP is? (a) Power on play (b) Power Digital Paint (c) Plasma Display panel (d) Plasma display panel YCT 18. 19. 20. 21. 22. 23. 24. 25. 26. Which of the following are not weighted codes? (a) Roman Number System (b) Decimal Number System (c) Binary Number System (d) All of the above Minimum time delay between the initiations of two independent dent memory operations is called (a) Access time (b) Cycle time (c) Transfer rote (d) Latency time Which one is First virus to appear in India? (a) C-Brain (b) Mical Anjelo Virus (c) Columbus (d) Mac Bug Famous computer Pakman is made for which particular Area (a) Sport (b) Constriction Area (c) Banking (d) Weather forecasting Which one brought the first laptop computer in world market? (a) Hewlett-Packard (b) Infosys (c) Lucent (d) Epson. In which city first AI based computer was installed? (a) Bombay (b) Pune (c) Jodhpur (d) Delhi Which country has Largest number of computer? (a) Japan (b) Russia (c) U.S.A (d) India Which are is first bilingual computer developed in India (a) PARAM (b) Budh (c) Siddhartha (d) Mahaveer In which India city first computerized Railway Reservation system started (a) Chennai (b) Calcutta (c) Mumbai (d) New Delhi Computer Organization and Operating System 27. 28. 29. 30. 31. 32. 33. 34. 35. 143 What is meaning of cycle IPO in computer system (a) Input Process output (b) Input Point output (c) Inline process output (d) In process out Which part of CPU coordinate the Task? (a) control unit (b) Memory (c) Arithmetic Logic Unit (d) None of these Who which is associated with the development of Pentium chip (a) Nandan Nilekani (b) C. Kumer Patel (c) Sabeer Bhatia (d) Vinod Dham Which of following is page fault? (a) Page fault occurs when a program accesses a page of another program (b) Page fault occur when a program accesses a page in main memory (c) Page fault occurs when there is an error in particular page (d) Page fault occurs when a program accesses page which is not present in main memory Any instruction should have at least? (a) 2 Operand (b) 1 Operand (c) 3 Operand (d) None of above Which of the following is an essential data transfer technique? (a) MMA (b) DMA (c) CAD (d) CAM RISC Stand for (a) Reduce instruction set computer (b) Risk instruction sequential compilation (c) Risk instruction source compiler (d) None of above In which of following term the performance of cache memory is measured? (a) Chat Ratio (b) Hit Ratio (c) Copy Ratio (d) Data Ratio Which of the following is the function of control unit in the CPU (a) It stores program instruction (b) It decode program instruction (c) It performs logic operations (d) None of Above YCT 36. 37. 38. 39. 40. 41. 42. 43. 44. CISC stands for (a) Complex instruction set computer (b) Complex instruction sequential compilation (c) Complex instruction sequential compiler (d) None of the Above Which of the following computer Register collects the result of computation (a) Accumulator (b) Instruction pointer (c) Storage Revision (d) None of Above Which of following is circuit board on which chips and processor are placed (a) Master circuit (b) Motherboard (c) Big board (d) Non of Above Which of following is a combinational logic circuit that has 2n input line and a single output line (a) Multiplexer (b) Demultiplexer (c) Encoder (d) Decoder SIMD represent on organization that–––––? (a) Refer to computer system capable of Processing several Programs of the some time (b) Represent organization of single computer containing a control unit, processor unit and memory (c) Includes many processing units under the supervision of common control unit (d) None of the Above In computer, subtraction is generally carried out by? (a) 1's complement (b) 10'S complement (c) 2's Complement (d) 9's complement Assembly language (a) Uses alphabetic code in place of binary number used in machine Language (b) Is the easiest language to write program (c) Need not be translated into machine language (d) None of there Floating point representation is used to store (a) Boolean Valens (b) Whole numbers (c) Real integers (d) Integers Circuit used to store one bit of data is known as (a) Register (b) Encoder (c) Decoder (d) Flip-flop Computer Organization and Operating System 45. 46. 47. 48. 49. 50. 51. 52. 53. 144 The average time required to reach a storage location in memory & optain its contents is called the (a) Seek time (b) Turn around time (c) Access time (d) Transfer time The idea of cache memory is based (a) On the property of locality of reference (b) On the heuristic 90 to 10 rule (c) On the fact that references generally Tend to cluster (d) All of the Above Which of the following is lowest in memory hierarchy (a) Cache memory (b) Secondary memory (c) Register (d) RAM Von Neumann architecture is (a) SISD (b) SIMD (c) MIMD (d) MISD Cache memory acts between (a) CPU & RAM (b) RAM & ROM (c) CPU & Hard disk (d) None & these Program always deal with (a) Logical address (b) Absolute address (c) Physical address (d) Relative address Memory management technique in which system stores & retrieves data from secondary storage for the use in main memory is called (a) Fragmentation (b) Paging (c) Mapping (d) None of the mentioned Run time mapping from virtual to physical address is done by (a) Memory management unit (b) CPU (c) PCI (d) None of mentioned Which one of the following is the address generated by the CPU? (a) Physical address (b) Absolute adders (c) Logical address (d) None of the mentioned YCT 54. 55. 56. 57. 58. 59. 60. 61. A memory buffer used to accommodate a speed differential is called (a) Stack pointer (b) Cache (c) Accumulator (d) disk buffer When more than one processes are running concurrently on a system (a) Batch system (b) Real time system (c) Multiprogramming system (d) Multiprocessing system. Which memory unit has lowest access time? (a) Cache (b) Register (c) Magnetic Disk (d) Main memory Fragmentation is (a) Dividing the secondary memory into equal sized fragments (b) Dividing the main memory into equal size fragment (c) Fragment of memory words used in page (d) Fragments of memory words unused in a page Virtual memory is (a) An extremely large main memory (b) An extremely large secondary memory (c) An illusion of an extremely large memory (d) A type of memory used in super computer A time sharing system imply (a) More than one processor in the system (b) More than one program in memory (c) More than one memory in the system (d) None of Above What are the peripheral devices? (a) Those that connect computer to the internet (b) Those that help in calculation (c) These devices help in storing and analysing data (d) These are internal or external device that connect directly to a computer but do not contribute to the computer's primary functions RRB NTPC 23.02.2021 (Shift-I) Stage Ist Which one of the following statements is correct about a computer? (a) A computer is composed of only software (b) A computer can organize all information on its own (c) A computer is composed of only hardware (d) An electronic device that stores, retrieves and processes data RRB NTPC 18.01.2021 (Shift-I) Stage Ist Computer Organization and Operating System 62. 63. 64. 65. 66. 67. 68. 69. 70. 71. 145 Modern computers follow a set of instructions to perform any task. These instructions can be better known as. (a) Commands (b) Programs (c) Language (d) Guidelines RRB NTPC 25.01.2021 (Shift-II) Stage Ist Which of the following not known as peripheral of computer? (a) Mouse (b) Keyboard (c) Printer (d) Hard drive RRB NTPC 04.04.2016 (Shift-2) stage 1st Operating system of any computer work as a software interface between system user and which of the following? (a) Hardware (b) Peripheral (c) Memory (d) Screen RRB J.E.(14.12.2014,GREEN PAPER) Computer follow a simple principal (GIGO), which mean is(a) Garbage in Garbage out (b) Garbage input great output (c) Great input Great output (d) Great instruction Great output RRB SSE (21.12.2014) Who was one of the founders of American computer Sun Microsystems later acquired by Oracle ? (a) Satya Nadella (b) Sabeer Bhatia (c) Vinod Khosla (d) Sunder Pichai RRB NTPC 20.01.12021 (Shift-II) Stage Ist 'Pen Drive' was invented by IBM in the year..... (a) 1990 (b) 1988 (c) 2003 (d) 1998 RRB NTPC 23.07.2021 (Shift-II) Stage Ist Who among the following is known as the 'father of Indian Supercomputers'? (a) Jayant Narlikar (b) RA Mashelkar (c) Nandan Nilkeni (d) Vijay Bhatkar RRB NTPC 22.02.2021 (Shift-I) Stage Ist Who is remembered for giving the theory of programmable computer? (a) Charles Babbage (b) JohnTucker (c) Bill Gates (d) Steve Jobs RRB NTPC 04.04.2016 (Shift-II) Stage-Ist Who was the designer of macintosh computer? (a) McDonalds (b) Microsoft (c) Apple (d) IBM RRB NTPC 04.04.2016 (Shift-II) Stage-Ist What is the context of word “Digitalization”? (a) For changing analog signal into digital signal (b) For changing digital signal into analog signal (c) Uses of analog form of electricity (d) A form of physical quantities RRB SSE 21.12.2014 (Set-09) Yellow Paper YCT 72. 73. 74. 75. 76. 77. 78. 79. 80. 81. 82. Full form of ICR is(a) Intelligent character recognition (b) Information and communication (c) Integrated computer research (d) Institute for cyber research RRB NTPC 19.01.2017(Shift-I) Stage-Ist Which of the following device work as an input as well as output device? (a) Joystick (b) Mouse (c) Modem (d) Printer RRB SSE 21.12.2014 (Set-08, Green Paper) What is the name of the device used to connect computer for communication through telephone lines? (a) Hub (b) Switch (c) Repeater (d) Modem RRB NTPC 27.04.2016 (Shift-III) Stage-Ist The term 'byte' was coined by: (a) Larry Page (b) Werner Buchholz (c) Vint Cerf (d) Steve Jobs RRB NTPC 15.03.2021 (Shift-II) Stage Ist Which type of storage device is a Hard Disc? (a) Off-line storage (b) Tertiary storage (c) Primary storage (d) Secondary storage RRB NTPC 19.01.2021 (Shift-I) Stage Ist Google Drive, Sky Drive and Dropbox are perfect examples of: (a) Internet computing (b) Virtual drives (c) Virtual reality (d) Cloud storage services RRB NTPC 22.02.2021 (Shift-II) Stage Ist 1 Peta Byte is equal to: (a) 1024 MB (b) 1024 TB (c) 1024 GB (d) 1024 KB RRB NTPC 02.03.2021 (Shift-I) Stage Ist The process of taking out stored results out of physical memory of computers is known as: (a) output process (b) programming (c) processing (d) input process RRB NTPC 28.12.2020 (Shift-II) Stage Ist ROM is composed of: (a) Photoelectric cells (b) Magnetic tapes (c) Semiconductors (d) Integrated circuits RRB NTPC 07.04.2021 (Shift-II) Stage Ist Which of the following is NOT a part of auxiliary memories in a Computer system? (a) Magnetic tapes (b) PROM (c) CD-ROM (d) Floppy RRB NTPC 28.12.2020 (Shift-II) Stage Ist What does WORM stand for? (a) World open, receive many (b) Wireless once, receive many (c) Write others, read me Computer Organization and Operating System 83. 84. 85. 86. 87. 88. 89. 90. 91. 92. 146 (d) Write once, read many RRB NTPC 08.04.2021 (Shift-I) Stage Ist 10 nibbles are equal to _________ bits. (a) 60 (b) 80 (c) 20 (d) 40 RRB NTPC 15.03.2021 (Shift-I) Stage Ist 1 EB is equal to (a) 1024 TB (b) 1024 GB (c) 1024 MB (d) 1024 PB RRB NTPC 03.03.2021 (Shift-II) Stage Ist Which of the following is an example of non volatile memory? (a) VLSI (b) ROM (c) RAM (d) LSI RRB NTPC 21.01.2021 (Shift-I) Stage Ist Full form of MMU is(a) Machine memory unit (b) Memory management unit (c) Main memory unit (d) Machine management unit RRB NTPC 16.04.2016 (Shift-II) Stage-Ist High speed memory which is used in supercomputer Known as(a) Cache (b) RAM (c) BIOS (d) Hard disc Use of cache memory in computer system increases(a) Available memory space for program (b) Available memory speed for data (c) Available speed for increasing memory access (d) Addressing range of CPU RRB SSE 21.12.2014 (Set-09, Yellow Paper) Which technology is used in compact disc(a) Electric (b) Laser (c) Electromagnetic (d) Aeronautics RRB NTPC 29.03.2016 (Shift-I) Stage-Ist RAM is used as short term memory because(a) It is variable (b) It is more expensive (c) It has low capacity (d) It is programmable RRB J.E. (Set-02, 14.12.2014,Red Paper) Which one of the written option is not a second storage device? (a) RAM (b) Magnetic App (c) USB Drives (d) Floppy Disk RRB NTPC 18.04.2016 (Shift-III) Stage-Ist What is the full form of RAM related to storage in computer? (a) Random Access Memory (b) Real Access to Memory (c) Randomly Available Memory (d) Random Access Memory RRB NTPC 04.04.2016 (Shift-I) Stage-Ist YCT 93. The part of computer where data and instructions are Stored is known as(a) Register unit (b) Restrainer (c) Memory unit (d) CPU RRB SSE (21.12.2014. Set-09) Yellow Paper 94. A semiconductor has read only memory is(a) A set of flip flop memory element (b) A connected logic circuit (c) A sequential circuit with gates and flip flop (d) None of the above RRB J.E. (14.12.2014, Yellow Paper) 95. By the use of ASCII coding ,the English alphabet and symbol binary code has been fixed which determines the code for almost all languages of the world and also determines one million symbols what is this new standard called(a) CCS (b) Unicode (c) Standard CCS code (d) Universal CCS code RRB J.E. (14.12.2014, Green Paper) 96. Which of the following is not a word shape in computer manufacturing? (a) 64 bits (b) 8 bits (c) 16 bits (d) 28 bits DMRC J.E. 18.02.2017 97. To change the command prompt in UNIX, One can use (a) grep (b) Is (c) ps1 (d) pwd UPPSC LT GRADE 29.07.2018 98. The data blocks of a very large file in UNIX file system are system are allocated using (a) contiguous allocation (b) linked allocation (c) indexed allocation (d) an extension of indexed allocation UPPSC LT GRADE 29.07.2018 99. In memory management, fragmentation problem is caused by creation of (a) large number of processes (b) large number of small free holes (c) large number of free holes (d) large number of waiting processes BPSC Asstt. Prof. 21.09.2021 100. Suppose two jobs, each of which needs 10 min of CPU time, start simultaneously. Assume 50% I/O wait time. How long will it take for both to complete if they run sequentially? (a) 10 (b) 20 (c) 30 (d) 40 ISRO Scientist/Engineer 2015 Computer Organization and Operating System 101. The degree of Multiprogramming is controlled by: (a) CPU Scheduler (b) Long-term Scheduler (c) Context Switching (d) Medium term Scheduler NIELIT Scientists-B 04.12.2016 (CS) 102. The maximum combined length of the command-line arguments including the spaces between adjacent arguments is: (a) 128 characters (b) 256 characters (c) 67 characters (d) It may vary from one operating system to another NIELIT Scientists-B 04.12.2016 (CS) 103. How many wires are threaded through the cores in a coincident-current core memory ? (a) 2 (b) 3 (c) 4 (d) 6 NIELIT Scientists-B 22.07.2017 (CS) 104. Which of the following standard C library functions will always invoke a system call when executed from a single-threaded process in a UNIX/Linux operating system? (a) exit (b) malloc (c) sleep (d) strlen GATE 2021 (Shift-I) 105. For the real- time operating system, which of the following is the most suitable scheduling scheme? (a) Round robin (b) First come first serve (c) Pre- emptive (d) Random scheduling ISRO Scientist/Engineer 2016 (July) 106. Which of the following UNIX command allows scheduling a program to be executed at the specified time? (a) cron (b) nice (c) date and time (d) schedule ISRO Scientist/Engineer 2011 107. If the page size in a 32-bit machine is 4K bytes then the size of page table is (a) 1 M bytes (b) 2 M bytes (c) 4 M bytes (d) 4 K bytes ISRO Scientist/Engineer 2011 108. Which is the correct definition of a valid process transition in an operating system? (a) Wake up: ready → running (b) Dispatch: ready → running (c) Block: ready → running (d) Timer runout: → ready → running ISRO Scientist/Engineer 2009 147 YCT 109. The primary purpose of an operating system is (a) To make most efficient use of the computer hardware (b) To allow people to use the computer (c) To keep systems programmers employed (d) To make computers easier to use ISRO Scientist/Engineer 2009 110. The Linux command "mknod myfifo b 4 16" (a) will create a character device if the user is root (b) Will create a named pipe FIFO if the user is root (c) Will create a block device if the user is root (d) None of the above ISRO Scientist/Engineer 2017 (May) 111. Which of the following concurrency control protocol ensures both conflict serializability and free from deadlock? (a) Time stamp ordering (b) 2 Phase locking (c) Both (a) and (b) (d) None of the above ISRO Scientist/Engineer 2017 (May) 112. Identify the correct order in which a server process must invoke the function calls accept, bind, listen, and recv according to UNIX socket API. (a) listen, accept, bind, recv (b) bind, listen, accept, recv (c) bind, accept, listen, recv (d) accept, listen, bind, recv GATE 2015 (Shift-II) 113. Which of the following statement is False in operating system? (a) The shortest job first (SJF) scheduling algorithm minimizes the average turn around time (b) Thrashing leads to under utilized the performance of CPU (c) Internal fragmentation can be eliminated by segmentation and paging (d) Semaphore value depends on number of resources to be shared RPSC Lect. 2014 114. Linux makes use of .......... page table structure. (a) Single level (b) Two level (c) Three level (d) Hashed TNPSC 2016 (Degree) P-II 115. Deep kernel modification is required in ........... virtualization. (a) Full (b) Para (c) Host-based (d) ISA based TNPSC 2016 (Degree) P-II 116. The purpose of a TLB is: (a) To cache page translation information (b) To cache frequently used data Computer Organization and Operating System (c) To hold register values while a process is waiting to be run (d) To hold the start and length of page table TNPSC 2016 (Degree) P-II 117. Which of these is incorrect in context of real time operating system? (a) Permits creation of multiple process within application (b) Permits principles to be assigned to the processes (c) Doesn't allow programmer to define interrupts in interrupt processing routines (d) Provides fault tolerance and graceful degradation capabilities TNPSC 2016 (Degree) P-II 118. Which of the following operating systems has fork () and exec () system calls? (a) Unix (b) Windows (c) Mac-OS (d) Solaris APPSC Poly. Lect. 13.03.2020 119. In UNIX operating system chmod 654 stands for (a) rw---r(b) r-r-r-(c) r-rw-r-(d) rw-rw-r-Punjab State Civil Supplies Corp. Ltd. 13.11.2011 120. The following operating system is used as a control device in dedicated applications : (a) Real-time system (b) Time-sharing system (c) Multiprogramming system (d) Handheld system Karnataka PSC Comp. Sci. Teacher 16.10.2017 121. Which of the following is a virtual machine technology now owned by Oracle that can run various operating systems? (a) Vmachines (b) VirtualBox (c) ThoughtPolice (d) None of the above GPSC Asstt. Prof. 30.06.2016 122. Network operating system runs on ______ (a) server (b) every system in the network (c) Both (a) and (b) (d) none of the above GPSC Asstt. Prof. 30.06.2016 123. The technique used for protecting a critical section in Linux is (a) Lock Step (b) Program lock (c) Spinlock (d) Setlock GPSC Asstt. Manager 13.12.2020 (IT) 124. In Unix. which of the following symbols is used in command line to run a process in background? (a) & (b) (c) * (d) # (e) @ CGPSC Asstt. Prof. 2014 (CS) 148 YCT 125. Which of the following is not a valid Unix system call for files manipulation? (a) exit ( ) (b) open ( ) (c) read ( ) (d) write ( ) (e) close ( ) CGPSC Asstt. Prof. 2014 (CS) 126. An example of a memory management system call in UNIX is (a) fork (b) mmap (c) sigaction (d) execve APPSC Lect. Degree College 07.06.2017 (CS) 127. The OS of a computer may periodically collect all free memory space to form contiguous blocks of free space. This is called as : (a) Concatenation (b) Garbage collection (c) Collision (d) Dynamic Memory Allocation (e) Platform independence CGPSC Asstt. Prof. 2014 (IT) 128. Which of the following strategy is adopted to deal with deadlocks that have occurred in operating system? (a) Prevention (b) avoidance (c) detection and recovery (d) ignore the problem APPSC Lect. 2017 (Degree College) (CS) 129. The effect of executing the UNIX command 'sort -t\I +1 file1' is..... (a) sorts the lines of the file1 in ascending order and place I as delimiter (b) sorts the lines of the file1 in descending order and place I as delimiter 130. 131. 132. 133. (c) sorts the lines of the file1 in ascending order after skipping content upto I in each line (d) sorts the lines of the file1 in descending order after skipping content upto I in each line APPSC Lect. 2017 (Degree College) (CS) In Unix, chmod command is used to_____. (a) List files (b) List processes (c) Change file permissions (d) Change system password APPSC Lect. Degree College 16.09.2020 Usually which of the following is not done by an OS ? (a) Power on Self Test (POST) (b) Resource management (c) Error handling (d) Encryption RPSC ACF FRO 23.02.2021 (Comp. App./Sci.) Which is not a system call in Unix ? (a) Sleep( ) (b) Fork( ) (c) Set Timer( ) (d) Chmod( ) RPSC ACF FRO 23.02.2021 (Comp. App./Sci.) Match the following Operating System entry ? A. Threads 1. Processor B. Virtual Address space 2. Interrupt C. File System 3. Hard Disk Drive D. Signal 4. Main Memory A B C D (a) 1 4 3 2 (b) 4 3 1 2 (c) 2 3 4 1 (d) 1 3 4 2 RPSC ACF FRO 23.02.2021 (Comp. App./Sci.) ANSWER KEY 1. (d) 2. (a) 3. (c) 4. (d) 5. (d) 6. (a) 7. (c) 8. (b) 9. (b) 10. (c) 11. (c) 12. (a) 13. (c) 14. (c) 15. (c) 16. (c) 17. (c) 18. (a) 19. (b) 20. (a) 21. (a) 22. (d) 23. (c) 24. (c) 25. (c) 26. (d) 27. (a) 28. (a) 29. (d) 30. (d) 31. (b) 32. (b) 33. (a) 34. (b) 35. (b) 36. (a) 37. (a) 38. (b) 39. (a) 40. (c) 41. (c) 42. (a) 43. (c) 44. (d) 45. (c) 46. (a) 47. (d) 48. (a) 49. (a) 50. (a) 51. (b) 52. (a) 53. (c) 54. (b) 55. (c) 56. (b) 57. (b) 58. (c) 59. (b) 60. (d) 61. (d) 62. (b) 63. (d) 64. (a) 65. (a) 66. (c) 67. (d) 68. (d) 69. (a) 70. (c) 71. (a) 72. (a) 73. (c) 74. (d) 75. (b) 76. (d) 77. (d) 78. (b) 79. (a) 80. (d) 81. (b) 82. (d) 83. (d) 84. (d) 85. (b) 86. (b) 87. (a) 88. (c) 89. (b) 90. (a) 91. (a) 92. (a) 93. (c) 94. (b) 95. (b) 96. (d) 97. (c) 98. (d) 99. (c) 100. (d) 101. (b) 102. (d) 103. (a) 104. (a, c) 105. (c) 106. (a) 107. (c) 108. (b) 109. (a) 110. (c) 111. (a) 112. (b) 113. (c) 114. (c) 115. (b) 116. (a) 117. (c) 118. (a) 119. (d) 120. (a) 121. (b) 122. (a) 123. (c) 124. (a) 125. (a) 126. (b) 127. (b) 128. (c) 130. (c) 131. (d) 132. (c) 133. (a) Computer Organization and Operating System 149 129. (c) YCT 06. COMMUNICATION & NETWORK CONCEPT Switches : It is a networking device that groups all the devices on the network to transfer the data to another device. It sends the message to the device to which it belongs. Cables and Connectors : Cable is a transmission media that transmits the communication signals. There are three types of cable as – Twisted pair cable, Coaxial cable, Fiber optic cable. Router : Router is used to connect the LAN to the internet and connect multiple computers to the internet. Modem : Modem connects the computer to the internet over the existing telephone line. Introduction to Computer Network Computer network is a group of computers connected with each other through wires, optical fibers or optical links so that various devices can interact with other through a network. The purpose of having computer network is to send and receive data, stored in other devices over the network. These devices are often referred as nodes. There are five basic components of computer network. Features of Computer network : Communication Speed : Network provides us communication over the network at a fast speed, where we can do video conferencing, email, messaging etc. File Sharing : Computer Network a file sharing is a major advantage. It is used to share files from one device to another device through the network. Backup and Roll-back is Easy : Since the files are stored in the main server which is centrally located. Therefore it’s easy to take the backup from the main server. Software and Hardware Sharing : We can install the applications on the main server and access any where through the network. So we do not need to install the software on every machine. Security : Network allows the security by ensuring that the user has the right to access the certain files and application. Message : This is data that is transferred from one device to another on a computer network. Sender : Sender is a device that sends data to another device connected to a network. Receiver : Receiver is a device that expects data from other devices on the network. Transmission Media : To transfer data from one device to another we need a medium like wire, cable radio waves etc. Protocol : A protocol is a set of rules that govern data communication without a protocol. Component of Computer Network : Computer Network Architecture : NIC (Network Interface Card) Network interface card is device that helps computer to communicate with another device. The NIC contains the hardware addresses, the data-link layer protocol use this address to indentify the system over the network so that it transfers the data to correct device address. Hub : Hub is a central device that divides a network connection into multiple devices. When a computer sends a request to the Hub, then hub distributes the request to all interconnected computers. Communication & Network Concept 150 Network architecture generally refers to design of computer network or communications all of computers in network. It is basically defined and described as physical and logical design of software, hardware, protocols, and media of data transmission. The two type of network architectures are used : Peer-to-Peer Network : Peer-to-Peer network in all the computer are linked together with equal privilege and responsibilities for processing the data. This type of network is useful for small environments usually up to 10 computers. Special permissions are assigned to each computer for sharing the resources, but this can lead to a problem if the computer with the resource is down. YCT Here if one computer stop working but other computer will not stop working because all computer connected each other. Client/Server Network : It is consists of two computers. Client computer and server computer. The client computer simply sends request to the server computer, server execute the request and send response to client computer. It is also known as the client server architecture. This architecture is a two tier architecture, which is divided into two layers. The first layers located on the clients desktop and second layer is data base management layer located on the server machine. A client/server network has a dedicated server that improve the overall performance of the whole system and also increase the speed of the sharing resources. It requires a dedicated network administrator to manage all the resources. Computer Network Types : A computer network is mainly four types : Local Area Network (LAN) Local area network is used in small area such as building, Office, which is connected to each other. LAN is used for connecting two or more personal computers through a communication medium such as twisted pair, coaxial cable etc. and the data is transferred at an extremely faster rate in local area network. Each hosts in a LAN has an identifier, an address that uniquely defines the hosts in the LAN. A packet sent by a host to another host carries both the source host and the destination host address. In the past, LAN network were connected through a common cable, which meant that a packet sent from one host to another was received by all host. But today, most LAN use a smart connecting switch, which is able to recognize the destination address of the packet and guide the packet to its destination without sending it to all other hosts. Communication & Network Concept 151 Personal Area Network (PAN) Personal area network is a network arranged within an individual person, typically within a range of 10 meters. This kind of network is used for connecting the computer devices of personal use is know as personal area network. Thomas Zimmerman was the first research scientist to bring the idea of the personal area network. Personal computer devices that are used to develop the personal area network are the laptop, mobile phone, media player and play stations. There are two type of personal area network – (i) Wireless personal area network which is used to wireless connection, low range network example – wi-fi, Bluetooth. (ii) Wired personal area network is created by using the USB. Metropolitan Area Network (MAN) A metropolitan area network is a network that covers a larger geographic area by interconnecting a different LAN to form a larger network. The geographical area covered by MAN is comparatively larger than LAN but smaller than WAN. MAN is generally owned by private organizations and connected with the help of optical fibers, copper wires etc. Government agencies use MAN to connect the citizens and private industries. MAN is used in communication between the bank in a city, Air Line Reservation, and also used for communication in the military. The most common example of MAN is cable TV network within a city as show in Figure. YCT • Wide Area Network (WAN): WAN is a group of computers that are connected in a large area such as entire country etc., WAN is generally used for connecting two or more LANs through some medium such as leased telephone lines, microwaves, etc. A wide area network provides a large geographical area. Suppose if the branch of our office is in a different city then we can connect with them through WAN. Which we can connect with another branch. WAN is not limited to single location, but it spans over a large geographical area through a telephone line, fiber optic cable or satellite links. WAN network has more security issues as compared to LAN and MAN network and WAN network needs firewall & antivirus for protect from virus. Network Topology : Network topology refers to the arrangement of computers connected in a network through some physical medium such as cable, optical fiber etc. Topology defines the structure of the network of how all the component are interconnected to each other. The various types of network topology. Hierarchical Topology : The hierarchical topology is also knows as tree topology. Which is divided into different levels connected with the help of twisted pair, coaxial cable, or fiber optics. This type of topology is arranged in form of a tree structure in which top level contains parent node (root node). Which is connected with the child nodes in the second level of hierarchy with the point to point link. The second level nodes are connected to the third level nodes. Which in turn are connected to the fourth level nodes and so on. Except the top-level node each level node has a parent node. The number of point-to-point links in the hierarchical type of topology is generally one less than the total number of nodes in structure. The hierarchical topology is symmetrical, having a fixed branching factor associated with each node. Tree topology is mainly used to provide broadband transmission, we can add new device to the existing network and easily managed and maintained. But Communication & Network Concept 152 some disadvantages of hierarchical topology difficult to troubleshoot the problem, devices required for broadband transmission are very costly and failure in main bus cable damage the overall network. Bus Topology : Bus topology is all the nodes connected to the single cable know as a backbone cable. When a node communicates with the other nodes in the network, it simply sends a message to the common bus. It transmits the data from one end to another in a single direction. Therefore the initial cost of installation is low because bus topology nodes are directly connected to the cable without passing through a hub. Coaxial or twisted pair cables are mainly used in bus-based networks that support up to 10 mbps and configuration of a bus topology is quite simpler as compared to other topology. Star Topology : In the star topology all nodes are connected to a common device known as hub. Nodes are connected with the help of twisted pair, coaxial cable or optical fiber. Star topology is an arrangement of the network in which every node is connected to the central hub, or a central computer. The central computer is known as a server and the peripheral devices attached to the server know as clients. When a node wants to send the messages to the intended node. Each node in the network is connected with a point-to-point link to the centralized hub. Star topology is most popular topology in network implementation and easy error deletion and correction, if the failure of one computer does not affect the other computers in the network. It supports a bandwidth of approx 100 mbps. YCT Some disadvantages of start topology like – if the central hub or switch goes down. Then all the connected node will not be able to communicate with each other, some time cable routing becomes difficult, when a significant amount of routing is required. Mesh topology is divided into two categories : (i) Fully connected mesh topology. (ii) Partially connected mesh topology. In a fully connected mesh topology each computer is connected to all the available computer in the network and partially connected mesh topology, but certain computers are connected to those. Computers with which they communicate frequently. It is very expensive to implement and difficult to configure and install. Hybrid Topology : The hybrid topology is the combination of the multiple topology. The hybrid topology is created two different network topology are inter connected. If two ring topology are connected the resultant topology is not the hybrid topology but two or more different-different topology are connected (ring topology connected to the bus topology) then result topology is called the hybrid topology. The hybrid topology is more effective as it uses multiple topology and contains the best and efficient features of the combined topology from constructed. Ring Topology : In the ring topology the node are connected in the form of a ring with help of twisted pair. Each node is connected directly to the other two nodes in the network. Ring topology is like a bus topology. The node which wants to send a message first, passes the message to its consecutive node in the network. Data is transmitted in the clockwise direction from one node to another. Each node has an equal to access other nodes in the network. Addition of new nodes does note degrade the performance of the network and easy to configure and install, but it is relatively expensive to construct the ring topology. It failure of one node in the ring topology affects the other nodes in the ring. Mesh Topology : In mesh topology each computer is connected to every other computer in point-to-point mode. There are multiple paths from one computer to another computer. It does not contain the switch, hub or any central computer, which acts as a central point of communication. Mesh topology is mainly used for ‘WAN’ implementations where communication failures are a critical concern. Mesh topology can be formed by using the formula Number of cables = (n *(n – 1))/2, when n is the number of node that represent the network. Communication & Network Concept Network Transmission Modes : 153 Which data is transmitted from one device to another device is known as transmission or communication mode, each communication channel has a direction associated with it, and transmission media provide the direction. It is defined in the physical layer. There are three types of transmission mode : (i) Simplex mode (ii) Half-duplex mode (iii) Full-duplex mode (i) Simplex Mode : In simplex mode, the communication is unidirectional, the data flow in YCT one direction. A device can only send the data but cannot receive it or it can receive the data but cannot send the data. Keyboards and traditional monitors are example of simplex device the keyboard can only introduce input; the monitor can only accept output. Simplex mode can use the entire capacity of the channel to send data in one direction. The simplex mode is used in the business filed as sales that do not require any corresponding reply. (ii) Half-duplex Mode : In half-duplex mode, each station can both transmit and receive but not at the same time when one device is sending data then other device only can receive a walkie-talkie is an example of the half-duplex mode in Walkie-talkie if one party speaks and another party can listeners. After a pause the other speaks and first party listen in half-duplex mode. When one device is sending the data. Then another has to wait, this cause the delay in sending the data at the right time. (iii) Full-duplex Mode : In full-duplex mode (also called duplex) both stations can transmit and receive simultaneously. In this mode data flow in both directions. Full-duplex mode has two simplex channels one channel has traffic moving in one direction and another channel has traffic flowing in the opposite direction. The most common example of full-duplex mode is telephone network, where to people are communicating with each other by telephone line, both can talk and listen at the same time. Networks Layers/Models The networking model describes the architecture, components, and design used to establish communication between the source and destination system. Aliases for network models include protocol stacks. Protocol suites, network stacks, and network protocols. There are 2 predominant models available. (i) Open systems interconnection (OSI) model (ii) Transmission control protocol/internet protocol (TCP/IP) model. Communication & Network Concept 154 OSI Model : OSI stands for open system interconnection. It is an open standard for establishing communication between systems. OSI is a reference model that describes how information from a software application in one computer moves through a physical medium to the software application in another computer. OSI model was developed by the international Organization for standardization (ISO) in 1984, and it is now considered as an architectural model for the inter-computer communications. This model consists of seven layers and each layer performs a particular network function and each layer is self-contained. So that task assigned to each layer can be performed independently. The model upper layers mainly deals with the application related issues and they are implemented only in the software an upper layer refers to the layer just above another layer and the lower layer of the OSI model deals with the data transport issues, data link layer and the physical layer are implemented in hardware and software. Application Layer : The application layer provides an interface. Through, which user can communicate and transfer data on the network. Presentation Layers : They presentation layer ensures the translation of characters from the original format in the host system to the format of the receiving system. It also adds encryption and decryption features. Data compression is handled at this layer. Session Layer : The session layer manages the communication between the computers on the network. This layer is responsible for notifying the errors. Which may have occurred in the above layers. Inclusion of this layer enables maintaining sessions during browsing and helps with implementing Authentication. Authorization Synchronization and Dialog control. Transport Layer : The transport layer is responsible for the delivery of packets in a proper sequence, it also provides proper rectification of error and manages the flow of packets over the YCT in the OSI model, that is application layer, network. Transport layer enables the following presentation layer, and the session layer. services Reliability, Flow-control, Congestion control, Multiplexing and De-multiplexing. It also The application layer is responsible for managing all ensures that data is properly delivered at the the user interface requirements. Many of the destination or not. protocols such as Telnet, FTP, SMTP, DNS, NFS, Network Layer : The network layer is responsible LPD and DHCP work on this layers. for identifying the ways. Which is data transmitted Transport Layer : This layer is the same as the over the network from one device to another device. one mentioned in the OSI model. Transmission The network layer directs the packets to the control protocol (TCP) is used in this model. TCP destination device based on the IP address of device. ensures reliability and helps avoids congestion in It detects the errors, which occur during the networks. The transport layer is responsible for the transmission of packets. delivery of packets or data grams, and it also hides This layer is also responsible for breaking the large the packet routing details from the upper layer. size packets into smaller packets when the device is The transport layer allows detection and unable to accepts the packets due to their large size. correction of errors and helps to achieve end-to-end communication between devices. The transport layer Data Link Layer : Data link layer main connects the application layer to the network layer responsibility of the ensuring flow the reading of through two protocols TCP and UDP. physical addresses. This layer specifies the action. Which must be performed to maintain the network Network Layer : The network layer is also known communication. It collects the packets to form as internetworking layer or IP layer. It contains three frames, which are transmitted over the network it protocols that perform different function. also finds out and then corrects the errors. Which (i) Internet Protocol (IP) occur during the transmission of packets. (ii) Internet Control Message Protocol (ICMP) Physical Layer : The physical layer describe all the (iii) Address Resolution Protocol (ARP) physical requirements for the transmission of data, (i) Internet Protocol (IP): IP is a connectionless between devices on a network. Physical layer can protocols that is responsible for the delivery of specify the layout of pins, hub and cable. Network packets. topology comes under this layer. This layer defines (ii) Internet Control Message Protocol (ICMP) The the relation between a single device and the ICMP protocol is responsible for reporting errors, transmission medium. sending, errors messages and controlling the flow of TCP/IP : TCP/IP stands for transmission control packets. protocol/internet protocol model. The TCP/IP model (iii) Address Resolution Protocol (ARP) It is was initially developed by “US” Defence Advanced responsible for determining the Media Access Research Projects Agency (DARPA). This model is Control (MAC) address corresponding to an IP also known as the internet reference model or DoD address. (Department of Defence) model. It consists of four Physical Layer : The physical layer is responsible layers. for collecting packets so that the frames, which are transmitted on the network, can be formed. It The protocol is define in the IETF (Request for performs all the functions required to transmit the comments) EFC 791 and 793 many of the layers that data on the network and determines the ways for we see in the OSI model are not available in the accessing the medium through which data will be TCP/IP model. transmitted. TCP/IP model uses TCP in the transport layer and IP used in the network layer. Networking Devices Application Layer : In the TCP/IP model the application layer encompasses the first three layers Communication & Network Concept 155 This hardware devices which are employed for establishing a connection of Fax Machines, Computers, Printers and other electronic equipment with that of the network are termed as network devices. These devices can be either intra or interconnected type. Few of the devices are connected on the devices such as RJ45 connector and NIC cards, while few devices are installed on the devices like switches, gateway, router and others. Lets discuss all the networking devices in briefly. YCT Switch : A switch is multiport bridge with buffer Repeater : A repeater Operates at the physical layer. Its job is to regenerate the signal over the same and a design that can boost its efficiency (a large network before the signal becomes too weak or number of ports implyless traffic) and performance. corrupted so as to extend the length to which the A switch is a data link layer device, that can perform signal can be transmitted over the same network. error checking before forwarding data in other Important point to be noted about repeaters is that words, the switch divides the collision domain of they do not amplify the signal. When the signal hosts, but broadcast domain remains the same. becomes weak, they copy the signal bit-by-bit and Routers : Data can be forwarded and filtered based regenerate it at the original strength. on a logical address by using a connective device Hub : Hub is basically a multiport repeater, which called a router. A router is a device like a IP connects multiple wires coming from different addresses. The router is mainly a network layer branches, for example– the connector in start device, normally connect LAN’s and WAN’s topology which connects different stations. together and have a dynamically updating routing Hubs cannot filter data, so data packets are sent to table based on which they make decisions on routing all connected devices. Also, they do not have the the data packets. intelligence to find out the best path for data packets Gateway : A gateway, as the name suggests, is a which leads to inefficiencies and wastage. passage to connect two network together that may Type of Hub : work upon different networking models. They (i) Active Hub : These are the hubs that have their basically work as the messenger agents it, that take own power supply and can clean, boosts, and relay data from one system, interpret it, and transfer it to the signal along with the network. It serves both as a another system. Gateway are also called protocol repeater as well as a wiring center. These are used to converters and can operate at any network layer. extend the maximum distance between nodes. Gateways are generally more complex switches or (ii) Intelligent Hub : It works like active hubs and routers. Gateway is also called a protocol converter. includes remote management capabilities. They also Brouter : It also known as the bridging router, it is provide flexible data rates to network devices. It also a device that combines features of both bridge and enables an administrator to monitor the traffic router. It can work either at the data link layer or a passing through the hub and to configure each port network layer. in the hub. • NIC: NIC stands for network interface card is a (iii) Passive Hub : These are the hubs that collect network adapter that is used to connect the computer wiring from nodes and power supply from the active to the network. It is installed in the computer to hub. These hubs relay signals on to the network establish a LAN. without cleaning and boosting them and can't be Fundamentals of Mobile used to extend the distance between nodes. Bridge : A bridge, operates at the data link layer. A Communication bridge is a repeater with add on functionality of Mobile communication is the use of technology that filtering content by reading the MAC addresses of allow us to communicate with others in different sources and destination. It is also used for locations without use of any physical connection interconnecting two LANS working on the same connections (wires or cables). Mobile protocol. communication makes our life easier, and it saves Types of Bridges : time and effort. (i) Transparent Bridges : These are the bridges in A mobile phone (also called mobile cellular which the stations are completely unaware of the network, cell phone) is an example of mobile bridge’s existence i.e. whether or not a bridges is communication (wireless communication). It is an added or deleted from the network, reconfiguration electric device used for full duplex two ways radio of the stations is unnecessary. telecommunication over a cellular network of base These bridges make use of two process i.e. bridge stations know as cells site. forwarding and bridge learning. Generations of Wireless communication : (ii) Source Routing Bridges : In these bridges routing A. 1G : This is first generation of wireless telephone operation is performed by the source station and the technology, mobile telecommunications, which was frame specifies which route to follow. The host can launched in Japan by NTT in 1979. The first cellular discover the frame by sending a special frame called systems used analog signals. It used FDD scheme the discovery frame. Which spreads through the and typically allocated bandwidth of 25 mhz and it’s entire network using all possible paths to the speed is 24kbps. 1G low sound quality with small destination. Communication & Network Concept 156 YCT B. C. D. E. coverage area an no roaming support between various operator. 2G : This is the second generation of mobile telecommunication was launched in Finland 1991. It is analog to digital, the second generation supported voice and SMS both communication. It supported all 4 sectors of wireless industry namely digital cellular, mobile data, PCS (Personal Communication Service), WLAN. The later versions of this generation which were called 2.5G using GPRS (General Packet Radio Service) and 2.75G using EDGE (Enhanced data rates for GSM Evolution) network. It provides better quality and capacity. 3G : This is the third generation of mobile telecommunication was introduced in early 2000s. The transmission of data was increased up to 2 Mbps which allows you to sending or receiving large email messages. The main difference between 2G and 3G is the used of packet switching rather than circuit switching for data transmission. It allow faster communication, video conferencing and 3D gaming. But it was costly and high bandwidth and also need expensive 3G phones. 4G : 4G is the fourth generation of mobile telecommunication which was appeared in 2010. It was based on LTE (Long Term Evolution) and LTE advanced standards. This communication services like video calling, real time language translation and video voice mail. It was capable of providing 100 Mbps to 1 Gbps internet speed. The basic term used to describe 4G technology is MAGIC where – M - Mobile Multimedia A - Anytime anywhere G - global mobility support I - Integrated wireless solution C - customized personal services But it use more battery. Implementation and expensive equipment are required. 5G: 5G is the fifth generation wireless connection which will be probably implemented by 2020 or even some years earlier. Machine to machine communication can be possible in 5G. 5G will be able to performs internet of things (IoT) for smart home and smart city, connected cars etc. This generation will be based on lower cost, low battery consumption and lower latency than 4G equipment. There will be much faster transmission rate of data to the previous versions. The speed of 5G will be 1 Gbps. Communication & Network Concept Features of Mobile Communication : High Capacity Load Balancing : Each wired or wireless infrastructure must incorporate high capacity load balancing means, when one access point is overloaded the system will actively shift users from one access point to another depending on the capacity which is available. Scalability : The wireless networks have the ability to start small if necessary but expand in terms of coverage and capacity as needed. Without having to overhaul or build an entirely new network. Network Management System : Hundreds or even thousands of access points. Firewall, switches, managed power and various other components. The wireless networks have a smarter way of managing the entire network from a centralized point. Advantages of Mobile Communication : There are following advantage of mobile communication. Flexibility : Wireless communication enables the people to communicate with each other regardless of location. Speed : improvements can also be seen in speed, the network connectivity or the accessibility was much improved in accuracy and speed. Cost Effectiveness : In wireless communication there is no need of any physical infrastructure (wires or cables) or maintenance practice. Hence the cost is reduced. Global Positioning System (GPS) 157 Global positioning system widely known as GPS have a great importance since the days of world War II. A GPS system consists of a network of 24 orbiting satellites called NAVSTAR (Navigation System with Time and Ranging) and placed in space in six different orbital paths with four satellites in each orbital plane and covering the entire earth under their signal beams. The first GPS satellite was launched in February 1978. The satellites signals can be received anywhere and at any time in the world. The GPS is based on well known concept called the triangulation technique. YCT GPS is also helping to save lives many police, fire and emergency medical service units are using GPS receivers to determine to the location of a police car, a fire truck, or an ambulance nearest to an emergency, enabling the quickest possible response in death or life situations. Introduction to Internet A network is group of one or extra computer systems which are related through a couple of channels for the motive of sending and receiving records or data in a shared environment. Internet is a group of computer systems related from all around the world. The internet protocol suite is a framework defined through the internet standards. The internet is a global computer network that connects various devices and sends a lot of information and media. It uses an internet protocol (IP) and transport control protocol (TCP) based packet routing network. TCP and IP work together to ensure that data transmission across the internet is consistent and dependable, regardless of the device or location. Data is delivered across the internet in the form of messages and packets. IP is a set of rules that control how data is transmitted from one computer to another computer over the internet and TCP is used with IP to ensure that data is transferred in a secure and reliable manner. Virtual shops where you may buy anything you want and need without leaving your house, Hundreds and thousands of newsgroups and service that keeps you updated with every tick of the clock, the internet is a source of the most recent news. Disadvantages of the internet : Spending too much time on the internet is hazardous for the young generations health and leads to obesity. Children who use the internet develop an addiction, which is quite dangerous. It is now quite easy to decipher some one’s chat or email messages thanks to the hacking community. Data Communication Communication is a process or act in which we can send or receive interconnected collection of autonomous means no computer can start, stop or control another computer. Data communication refers to the transmission of this digital data between two or more computers and a computer network or data network is a telecommunications network that allows computer to exchange data. Data Communication Channels : Communication Channels are the medium that connects two or more workstations. Workstations can be connected by either wired media or wireless History of Internet : media. It is also known as a transmission medium. The ARPANET (Later renamed the internet) We can group the communication media into two established a successful link between the university categories. of California, Los Angeles and the Stanford (A) Guided media transmission Research Institute on October 29, 1969. (B) Unguided media transmission In year 1991 a user friendly internet interface was developed. Delphi was the first national A. Guided Media Transmission : In this transmission medium, the physical link is created using wires or commercial online service to offer internet cables between two or more computers or devices, connectively in July 1992. and then the data is transmitted using these cable in Wi-Fi was first introduced in 1997. The year is terms of signals. Type of guided media transmission: 1998 and windows 98 is released. Smartphone use is (i) Twisted Pair Cable : It is used most common widespread in 2007. The 4G network is launched in form of wire used in communication in a 2009 now day internet is used by 3 billion people. twisted pair cable, two identical wires are By 2030 there are expected to be 7.5 billion internet wrapped together in a double helix. users and 500 billion devices linked to the internet. The twisting of the wire reduces the crosstalk. It Advantages of the Internet : is known as the leaking of a signal from one It is the best source of a wide range of wire to another due to which signal can corrupt information. There is no better place to conduct and can cause network errors. research than the internet. The twisting protects the wire from internal Online gaming, talking, browsing, music and crosstalk as well as external forms of signal TV are quickly becoming the most popular way interference. to pass the time. Communication & Network Concept 158 YCT Unshielded Twisted Pair (UTP) It is used in computer and telephones widely as the name suggest, there is no external shielding so it does not protect from external interference it is cheaper than STP. Shielded Twisted Pair (STP) It offers greater protection from crosstalk due to shield. Due shielding it protects from external interference. It is heavier and costlier compare to UTP. (ii) Coaxial Cable : It consists of solid wire core that is surrounded by one or more foil or wire shields. The inner core of the coaxial cable carries ground. It is widely used for television signals and also used by large corporations in building security systems. data transmission of this coaxial cable is better but it is expensive as compared to twisted pair. (iii) Optical Fibers : Optical fibers is an important technology. It transmits large amounts of data at very high speeds due to which it is widely used in internet cables. It carries data as a light that travels inside a thin glass fiber. The fiber optic cable is made up to three pieces. 1. Core : Core is the piece through which light travels. It is generally created using glass or plastic. 2. Cladding : It is the covering of the core and reflects the light back to the core. 3. Sheath : It is the protective covering that protects fiber cable from the environment. B. Unguided Media Transmission : The unguided transmission media is a transmission mode in which the signals are propagated from one device to another device wirelessly. Signals can wave through the air. Water, or vacuum. It is generally used to transmit signals in all direction unguided media is further divided into various parts : Microwave : Microwave offers communication without the use of cables. Microwave signals are just like radio and television signals. It is used in a long-distance communication. Microwave transmission consists of a transmitter, receiver and atmosphere. In microwave communication, there are parabolic antennas that are mounted on the towers to send a beam to another antenna. The higher tower, greater the range. Radio wave : When communication is carried out by radio frequencies, then it is termed radio transmission. It offers mobility. It is consists of Communication & Network Concept the transmitter and the receiver, both use antennas to radiate and capture the radio signal. Infrared : It is short-distance communication and can pass through any object. It is generally used in TV remotes, wireless mouse etc. Important Facts ● The portion of physical layer that interfaces with the media access control sublayer is called physical signaling sublayer. ● In the communication of two processes, an endpoint for communication is called socket. ● HTTP protocols may be used for accessing world wide web. ● Web pages are created in a language called HTML. ● Amplitude shift keying technique is used for transmitting digital signal. ● Resource sharing, improving reliability and availability and enhancing performance are advantages of computer networks. ● A network spreading in different geographical locations is known as WAN. ● The secured socket layer (SSL) is used in presentation layer. ● SSL protocol is generally used to encrypt data between web browser and web server. ● The media access control sublayer resides in data link layer. ● Secure Electronic Transaction (SET) is a communications protocol standard for securing credit card transactions over the internet. ● A gateway can forward packets across different networks that may also use different protocols. ● In symmetric key cryptography, for encrypting and decrypting the message, the key is same. ● In early ARPANET, distance vector routing method was used. ● Ethernet encoding ( 8B10B) has the highest redundancy. ● An Ethernet hub functions as a repeater. ● Cyclic redundancy check techniques is based on binary division. ● The length of an IPv6 address is 128 bits. ● Switch is not a network edge device while PC , server and Smartphone are network edge device. ● Application layer protocol defines the types of message exchanged, rules for when and how processes send and respond to messages and message format, syntax and semantics as well. 159 YCT ● The medium is the physical path over a message travels. ● A set of rules that governs the data communication is known as protocol. ● Bluetooth is an example of personal area network. ● ARP finds the MAC address from IP address. ● The structure of format of data is called syntax. ● ARPANET is the first network. ● HTTP and SMTP protocols can use multiple TCP connections between the same client and the server. ● E-mail uses SMTP as application layer protocol while TCP and UDP are two transport layer protocols. SMTP uses TCP as transport layer protocol because TCP is reliable. ● In the IPv4 addressing format, the number of networks allowed under class C address is 2^21. ● The protocol data unit ( PDU) for the application layer in the Internet stack is message. ● IP address consists of 4 parts separated by dots. ● Domain name matching to IP address is performed by DNS. ● 'Internet' is an example of WAN. ● If a computer network cable is broken , then whole network goes down in ring topology. ● Mesh topology is one of the most reliable topology. ● Hierarchical topology is used to establish a network which is also known as tree network. ● Twisted pair wire has minimum transmission speed. ● TCP/ IP is an example of communication protocol, networking protocol and data transfer protocol. ● In a computer network router ,hub switch are connecting devices. ● Link state is routing algorithm used by OSPF routing protocol. ● Block cipher is data encryption standard (DES). ● On packet switching internet works. ● X.21 is a network access standard for connecting stations to a circuit switch network. ● Token ring is connection free protocol. ● Encryption and decryption provide secrecy, or confidentiality, but not integrity. ● The term UPnP protocol is a short form for universal plug and play. ● The noise due to random behavior of charge carriers is shot noise. ● Ethernet card is responsible for network communication in a computer system. Communication & Network Concept ● Error correction can be done by using Hamming code. ● Multiplexer is a device that combines transmission from various I/O devices into one line. ● In communication satellite, multiple repeaters are known to transponders. ● 'Communication protocol' means set of rules to communicate data from one machine to another machine. ● A network using message switching technique is called a store and forward network. ● File server is a specialised computer system which is used to store files received from various client machines. ● Encryption is a technique to provide privacy of data. ● When a DNS server accepts and uses incorrect information from a host that has no authority giving that information, then it is called DNS spoofing. ● Bit stuffing refers to inserting a '0' in user stream to differentiate it with a flag. ● Dynamic routing protocol enable routers to dynamically discover and maintain routes, distribute routing updates to other routers and reach agreement with other routers about the network topology. ● Lightweight directory access protocol is used for authentication. ● DHCP network protocol allows hosts to dynamically get a unique IP number on each bootup. ● The IEEE standard for Wi- Max technology is IEEE 802.16 ● Use of IPSEC in tunnel mode results in IP packet with same header. ● In networking, UTP stands for unshielded twisted pair. ● SHA-1 is a message digest function. ● Advanced Encryption standard (AES) is based on symmetric key algorithm. ● Distributed parity is the characteristic of RAID 5. ● IPsec protocol suite designed by IETF to provide security for a packet at the internet layer. ● Physical topology of FDDI is ring. ● SMTP protocol is used for transferring electronic mail message from one machine to another machine. ● Security services such as access control, connectionless integrity and rejection of replayed packets are provided by IPSec. ● Reflection attack is a method of attacking a challenge-response authentication system that uses the same protocol in the both directions. 160 YCT ● An ATM cell has the payload field of 48 bytes. ● Manchester Encoding, the data bit is represented by both 0 and 1 as transition in the middle of bit period. ● A bridge is used to interconnect two networks at data link layer. ● In TCP/IP, network layer and transport layer provides only connectionless,both connectionless and connection- oriented. ● In selective repeat, the error free frames received following an erroneous frame are buffered and only the oldest unacknowledged frame is retransmitted by the sender. ● In point to point protocol (PPP), network layer option are negotiated using dynamic host control protocol. ● In pure ALOHA, the sender starts transmitting the data as soon as it has data to send. ● Distance vector routing algorithm suffers from countto- infinity problem. ● In link state routing distance vector routing is employed to distribute the link state packets. ● BiSYNC is the character oriented protocol. ● nmap is an open source port scanner used to determine open ports and basic vulnerabilities on the network. ● 1000Base-T is a four- wire Gigabit Ethernet implementation. ● TCP is connection- oriented while UDP is connection less. ● A RTP packet is encapsulated in a UDP user datagram. ● In real - time video conference,data from the server is multicast to the client site. ● Routers communicate with each other and forward the packets based on IP address. ● The DES algorithm has a key length of 64 bits. ● Analysis Engine and Alert database are the components of intrusion detection system. ● DNS uses UDP as the transport protocol. ● The protocol used by TCP for connection establishment is three way handshake. ● ISDN is an example of circuit switched network. ● SMTP provides a basic electronic mail transport facility. ● Transport layer protocol deals with process to process communication. ● Default gateway is used for handling the request for route which is not present in routing table. ● Cell Relay is also known as ATM. Communication & Network Concept ● The secret key between members needs to be created as a session key when two members contact KDC. ● Network layer firewall works as a packet filter. ● In cryptography, the order of the letters in a message is rearranged by transpositional ciphers. ● Many packets present in the subnet degrades the performance which leads to congestion. ● In tunel mode IPSec protects the entire IP packet. ● When a packet is lost in transit, it should be handled by sequence control. ● In serial communication, start and stop bits are used for synchronization. ● The DMA transfers are performed by a control circuit called as DMA controller. ● UDP socket is connection less socket. ● RARP is used to obtain the IP address of a host based on its physical address. ● In multicasting communication, the destination address in each packet is the same for all duplicates. ● A router must have at least 2 NICs. ● I/O devices is not a consumable resources. ● In OSI model, network layer is between data link layer and transport layer. ● SMTP protocols uses port number 25. ● If a packet has arrived with an M bit value of 0,then this is the last fragment. ● The wireless application protocol (WAP) aims to ensure interoperability among service providers. ● In a LAN network every system is identified by IP address. ● The transport layer protocols used for real time multimedia, files transfer, DNS and Email respectively are UDP, TCP, UDP and TCP. ● Md5sum can be used for digital fingerprint of a file. ● Hub creates big collision domain and one large broadcast domain. ● 16 bits are in header checksum of IPv4 datagram format. ● Pharming attack involves change in DNS entries so that users are directed to invalid site. ● The encryption and compression are done by presentation layer. ● WiMax belongs to 802.16 IEEE family. ● HTML is the scripting technologies which is not used at server site. ● Fibre distribution data interface (FDDI) does not support transmission media. 161 YCT ● In TCP/IP protocol suite destination port number is not part of the IP header. ● The amount of uncertainty in a system of symbol is called entropy. ● Poll/select line discipline requires address to identify the packet recipient. ● TCP/IP model doesn't consist of session layer. ● BGP routing protocol is used Dijkstra algorithm during it's execution. ● Any electronic device on a network is called a node. ● Network interface card installs in a PC and allows the PC to connect to a network. ● The network area within which data packets originate and collide is called a collision domain. ● WEP security solutions uses the same key for both encryption and authentication. ● A communication device that combines transmission from several I/O devices into one line is a multiplexer. ● TCP/IP application layer corresonds to the OSI models to three layers. ● NFS applications allows a user to access and change remote files without actual transfer. ● The data unit in the TCP/IP layer called a frame. ● The full form of PING is Packet Internet Groper. ● Devices on one network can communicate with devices on another network via a gateway. ● An SSID is used for identifying the WLAN on a WLAN. ● DNS can obtain the IP address of host if its domain name is known and vice versa. ● CSMA stands for career sense multiple access. ● A remote batch- processing operation in which data is solely input to a central computer would require a simplex lines. ● Application layer of the OSI determines the interface of the system with the user. ● The slwest transmission speeds are in twisted pair wire. ● The standard suit of protocols used by the internet, intranets, extranets and some other networks is TCP/IP protocol. ● Modem is used for modulation and demodulation. ● DHCP server can greatly reduce TCP/IP configuration problems. ● Transport, session, presentation and application layers of the OSI reference model are host- to- host layers. Communication & Network Concept ● The DNS maps the IP addresses to a hierarchy of domain names. ● SSL is not responsible for error detection & correction. ● Silly window syndrome is related to degrade in TCP performance. ● Application frameworks provide a means for creating SaaS hosted application using IDE. ● TCP groups a number of bytes together into a packet called segment. ● Communication offered by TCP is full- duplex. ● The packet sent by node to the source to inform it of congestion is called choke. ● User datagram protocol is called connection less because all UDP packets are treated independently by transport layer. ● Control of users' access to network resources through charges is the main responsibility of accounting management. ● Open shortest path first (OSPF) is also called as link state protocol. ● Frame relay doesn't provide flow or error control, they must be provided by the upper level protocol. ● The instrument that can be used to find the location of a cable short is termed as TDR. ● Two network switches that do not support MDI-X need to be connected via copper cabling. The cabling method that needs to be used is crossover. ● TPM is an acronym for trusted platform module. ● The method used for transmitting IPv6 traffic over IPv4 network is tunneling. ● ICANN is the name of internet corporation for assigned names & numbers to different domains. ● To host a website, web server is required. ● DNS servers translates web addresses or host name to IP address. ● RS- 232 is a standard that applies to serial port. ● IEEE 802.11 stands for wireless LAN. ● RIP stands for routing information protocol. ● The network layer concerns with packets. ● Frames from one LAN can be transmitted to another LAN via bridges. ● Head- end device terminates VPNs at a primary location. ● VPN design guide in SDM can be used to assist in choosing a VPN. 162 YCT Important Questions Asked in Previous Years Examinations 1. 2. 3. 4. 5. 6. 7. 8. 9. The portion of physical layer that interfaces with the media access control sublayer is called _____ (a) physical signaling sublayer (b) physical data sublayer (c) physical address sublayer (d) physical transport sublayer GPSC Asstt. Prof. 30.06.2016 In the communication of two processes, an endpoint for communication is called : (a) Socket (b) Pipe (c) Port (d) Remote procedure call Karnataka PSC Comp. Sci. Teacher 16.10.2017 Which of the following protocols may be used for accessing world wide Web? (a) HTTP (b) SMTP (c) SLIP (d) None of the above UPPSC LT GRADE 29.07.2018 Web pages are created in a language called (a) SLIP (b) HTML (c) HTTP (d) WWW UPPSC LT GRADE 29.07.2018 Which of the following techniques is used for transmitting digitial signal? (a) Amplitude modulation (b) Frequency modulation (c) Pulse code modulation (d) Amplitude shift keying UPPSC LT GRADE 29.07.2018 Which of the following is an advantage of computer networks? (a) Resource sharing (b) Improving reliability and availability (c) Enhancing performacnce (d) All of the above UPPSC LT GRADE 29.07.2018 A network spreading in different geographical locations is known as (a) LAN (b) WAN (c) Both (a) and (b) (d) None of the above UPPSC LT GRADE 29.07.2018 In which layer of network architecture, the secured socket layer (SSL) is used? (a) Physical layer (b) Session layer (c) Application layer (d) Presentation layer UPPSC LT GRADE 29.07.2018 The media access control sublayer resides in which OSI layer? (a) Transport (b) Network (c) Physical (d) Data link UPPSC LT GRADE 29.07.2018 Communication & Network Concept 10. 11. 12. 13. 14. 15. 16. 17. 18. 163 Which of the following is a communications protocol standard for securing credit card transactions over the Internet? (a) Secure Electronic Transaction (SET) (b) File Transfer Protocol (FTP) (c) Post Office Protocol (POP) (d) Hypertext Transfer Protocol (HTTP) APPSC Lect. Degree College 16.09.2020 A______ can forward packets across different networks that may also use different protocols: (a) repeater (b) bridge (c) router (d) gate way TRB Poly. Lect. 2017 In symmetric key cryptography, for encrypting and decrypting the message, the key is (a) private (b) public (c) different (d) same RPSC ACF & FRO 23.02.2021 (CS) In early ARPANET, which routing method was used (a) Distance vector routing (b) Link state routing (c) Least cost routing (d) Flooding RPSC ACF FRO 23.02.2021 (Comp. App./Sci.) Which of the 'following Ethernet encoding has the highest redundancy' (a) 1B2B (b) 4B5B (c) 5B6B (d) 8B10B RPSC ACF FRO 23.02.2021 (Comp. App./Sci.) An Ethernet hub (a) functions as a repeater (b) connects to a digital PBX (c) connects to a token- ring network (d) function as a gateway ISRO Scientist/Engineer 2007 Which of the following error detection techniques is based on binary division? (a) Checksum (b) Cyclic Redundancy Check (CRC) (c) Simple parity check (d) Two- dimensional parity check UPPCL AE 18.05.2016 The length of an IPv6 address is: (a) 16 bits (b) 32 bits (c) 64 bits (d) 128 bits APPSC Poly. Lect. 13.03.2020 Which of this is not a network edge device? (a) PC (b) Server (c) Smartphone (d) Switch NIELIT Scientists-B 04.12.2016 (CS) YCT 19. 20. 21. 22. 23. 24. 25. 26. 27. Application layer protocol defines: (a) types of messages exchanged (b) rules for when and how processes send and respond to messages (c) message format, syntax and semantics (d) all of above NIELIT Scientists-B 04.12.2016 (CS) The _____ is the physical path over which a message travels. (a) Path (b) Protocol (c) Route (d) Medium NIELIT Scientists-B 04.12.2016 (CS) A set of rules that governs data communication: (a) Rule (b) Medium (c) Link (d) Protocol NIELIT Scientists-B 04.12.2016 (CS) Bluetooth is an example of: (a) local area network (b) virtual private network (c) personal area network (d) none of the mentioned above NIELIT Scientists-B 04.12.2016 (CS) NIELIT Scientists-B 04.12.2016 (IT) Which protocol finds the MAC address from IP address? (a) SMTP (b) ICMP (c) ARP (d) RARP NIELIT Scientists-B 04.12.2016 (CS) The structure of format of data is called: (a) Syntax (b) Struct (c) Semantic (d) none of the above NIELIT Scientists-B 04.12.2016 (IT) The first Network: (a) ARPANET (b) NFSNET (c) CNNET (d) ASAPNET NIELIT Scientists-B 04.12.2016 (IT) In one of the pairs of protocols given below, both the protocols can use multiple TCP connections between the same client and the server. Which one is that? (a) HTTP, FTP (b) HTTP, TELNET (c) FTP, SMTP (d) HTTP, SMTP GATE 2015 (Shift-I) Which of the following transport layer protocols is used to support electronic mail? (a) SMTP (b) IP (c) TCP (d) UDP GATE 2012 Communication & Network Concept 28. 29. 30. 31. 32. 33. 34. 35. 36. 37. 164 In the IPv4 addressing format, the number of networks allowed under class C addresses is (b) 27 (a) 214 (c) 221 (d) 224 GATE 2012 The protocol data unit (PDU) for the application layer in the Internet stack is (a) Segment (b) Datagram (c) Message (d) Frame GATE 2012 IP address consists of _____ parts separated by dots (a) 2 (b) 3 (c) 4 (d) 1 MPPSC State Forest Service Examination 2014 Domain name matching to IP address is performed by (a) Electronic mail (b) URL (c) DNS (d) FTP MPPSC State Forest Service Examination 2014 ‘Internet’ is an example of (a) LAN (b) MAN (c) WAN (d) None of these MPPSC State Forest Service Examination 2014 If a computer network cable is broken whole network goes down in ____ topology (a) Star (b) Ring (c) Mesh (d) All options are correct MPPSC State Forest Service Examination 2014 Which of the following is a most reliable topology? (a) Bus (b) Star (c) Ring (d) Mesh MPPSC State Forest Service Examination 2014 Hierarchical topology is used to establish a network which is also known as (a) Bus network (b) Star network (c) Tree network (d) Mesh network MPPSC State Forest Service Examination 2014 MAN stands for (a) Machine Area Network (b) Metropolitan Area Network (c) Metropolitan Asynchronous Network (d) Machine asynchronous Network MPPSC State Forest Service Examination 2014 Which of the following has minimum transmission speed? (a) Twisted pair wire (b) Fiber optic cable (c) Coaxial cable (d) Microwave MPPSC State Forest Service Examination 2014 YCT 38. 39. 40. 41. 42. 43. 44. 45. 46. TCP/IP is an example of (a) Communication protocol (b) Networking protocol (c) Data transfer protocol (d) All options are correct MPPSC State Forest Service Examination 2014 In a computer network, which of the following is a connecting device? (a) Router (b) Hub (c) Switch (d) All options are correct MPPSC State Forest Service Examination 2014 What is routing algorithm used by OSPF routing protocol? (a) Distance vector (b) Flooding (c) Path vector (d) Link state ISRO Scientist/Engineer 2014 What is data encryption standard (DES)? (a) Block cipher (b) Stream cipher (c) Bit cipher (d) None of the above UPPSC LT GRADE 29.07.2018 On what type of switching does internet work? (a) Circuit (b) Bit (c) Packet (d) Line UPPSC LT GRADE 29.07.2018 X.21 is (a) a method of determining which device has access to the transmission medium at any time (b) a method access control technique or multiple access transmission media (c) very common but oriented at linked protocol issued to ISO (d) a network access standard for connecting stations to a circuit switch network UPPSC LT GRADE 29.07.2018 Which of the following is contention free protocol ? (a) Pure Aloha (b) Ethernet (c) Non-persistent CSMA (d) token Ring RPSC VPITI 2018 (CS) Encryption and decryption provide secrecy, or confidentiality, but not (a) Authentication (b) Integrity (c) Frames (d) All of these RPSC ACF & FRO 23.02.2021 (CS) The term UPnP protocol is a short form for: (a) Uniform Plug and Play (b) Unit Plug and Play (c) Useful Plug and Play (d) Universal Plug and Play APPSC Poly. Lect. 13.03.2020 Communication & Network Concept 47. 48. 49. 50. 51. 52. 53. 54. 55. 165 The noise due to random behavior of charge carriers is: (a) Partition noise (b) Industrial noise (c) Shot noise (d) Flicker noise NIELIT Scientists-B 04.12.2016 (IT) Which of the following component is responsible for network communication in a computer system? (a) UPS (b) Ethernet card (c) SVGA card (d) SMPS MPPSC State Forest Service Examination 2014 Error correction can be done by using (a) Hamming code (b) CRC (c) Framing (d) Two dimensional parity check MPPSC State Forest Service Examination 2014 _____ is a device that combines transmission from various I/O devices into one line (a) Modifier (b) Multiplexer (c) Concentrator (d) Gateway MPPSC State Forest Service Examination 2014 In communication satellite, multiple repeaters are known as (a) Detector (b) Modulator (c) Stations (d) Transponders MPPSC State Forest Service Examination 2014 ‘Communication protocol’ means (a) Data transformation (b) Set of rules to communicate data from one machine to another machine (c) Transmission signals (d) None of these MPPSC State Forest Service Examination 2014 A network using____ technique is called a store and forward network (a) Circuit switching (b) Message switching (c) Packet switching (d) Both (Circuit switching) and (Message switching) MPPSC State Forest Service Examination 2014 File server is a _____ which is used to store files received from various client machines (a) Specialized computer system (b) Modem (c) Router (d) Transponder MPPSC State Forest Service Examination 2014 Encryption is a technique (a) To design conceptual schema (b) To translate global data YCT 56. 57. 58. 59. 60. 61. 62. 63. (c) To provide privacy of data (d) To update database MPPSC State Forest Service Examination 2014 When a DNS server accepts and uses incorrect information from a host that has no authority giving that information, then it is called (a) DNS lookup (b) DNS hijacking (c) DNS spoofing (d) None of the mentioned ISRO Scientist/Engineer 2016 (July) Bit stuffing refers to (a) Inserting a '0' in user stream to differentiate it with a flag (b) Inserting a '0' in flag stream to avoid ambiguity (c) appending a nibble to the flag sequence (d) Appending a nibble to the user data stream ISRO Scientist/Engineer 2016 (July) Dynamic routing protocol enable routers to: (a) Dynamically discover and maintain routes (b) distribute routing updates to other routers (c) Reach agreement with other routers about the network topology (d) All of the above ISRO Scientist/Engineer 2016 (July) Lightweight Directory Access Protocol is used for (a) Routing the packets (b) Authentication (c) Obtaining IP address (d) Domain name resolving ISRO Scientist/Engineer 2011 In which layer of network architecture, the secured socket layer (SSL) is used? (a) physical layer (b) session layer (c) application layer (d) presentation layer ISRO Scientist/Engineer 2011 Which network protocol allows hosts to dynamically get a unique IP number on each bootup? (a) DHCP (b) BOOTP (c) RARP (d) ARP ISRO Scientist/Engineer 2016 (July) The IEEE standard for Wi-Max technology is (a) IEEE 802.16 (b) IEEE 802.36 (c) IEEE 812.16 (d) IEEE 806.16 ISRO Scientist/Engineer 2011 The network protocol which is used to get MAC address of a node by providing IP address is (a) SMTP (b) ARP (c) RIP (d) BOOTP ISRO Scientist/Engineer 2011 Communication & Network Concept 64. 65. 66. 67. 68. 69. 70. 71. 166 Use of IPSEC in tunnel mode results in (a) IP packet with same header (b) IP packet with new header (c) IP packet without header (d) No changes in IP packet ISRO Scientist/Engineer 2009 In networking, UTP stands for (a) Unshielded T- connector port (b) Unshielded twisted pair (c) Unshielded terminating pair (d) Unshielded transmission process ISRO Scientist/Engineer 2009 The address resolution protocol (ARP) is used for (a) Finding the IP address from the DNS (b) Finding the IP address of the default gateway (c) Finding the IP address that corresponds to a MAC address (d) Finding the MAC address that corresponds to an IP address ISRO Scientist/Engineer 2009 SHA-1 is a (a) Encryption algorithm (b) Decryption algorithm (c) Key exchange algorithm (d) Message digest function. ISRO Scientist/Engineer 2009 Advanced Encryption Standard (AES) is based on (a) Asymmetric key algorithm (b) Symmetric key algorithm (c) Public key algorithm (d) Key exchange ISRO Scientist/Engineer 2009 Which one of these is characteristic of RAID 5? (a) Dedicated parity (b) Double parity (c) Hamming code parity (d) Distributed parity ISRO Scientist/Engineer 2017 (May) which protocol suite designed by IETF to provide security for a packet at the Internet layer? (a) IPsec (b) NetSec (c) PacketSec (d) SSL ISRO Scientist/Engineer 2017 (May) Physical topology of FDDI is? (a) Bus (b) Ring (c) Star (d) None of the above ISRO Scientist/Engineer 2017 (May) YCT 72. In networking terminology UTP means (a) Uniquitous Teflon port (b) Uniformly terminating port 79. (c) Unshielded twisted pair (d) Unshielded T-connector port ISRO Scientist/Engineer 2017 (May) 73. Which of the following protocol is used for transferring electronic mail messages from one 80. machine to another? (a) TELENET (b) FTP (c) SNMP (d) SMTP ISRO Scientist/Engineer 2017 (May) 74. Match with the suitable one: List-I List-II Multicast group 1. Distance vector (A) membership routing (B) Interior gateway 2. IGMP 81. protocol 3. OSPF (C) Exterior gateway protocol (D) 75. 76. 77. 78. RIP 4. BGP (a) A-2, B-3, C-4, D-1 (b) A-2, B-4, C-3, D-1 (c) A-3, B-4, C-1, D-2 (d) A-3, B-1, C-4, D-2 ISRO Scientist/Engineer 2017 (May) Which security service is not provided by IPSec (a) Access control (b) Connectionless integrity (c) Use authentication (d) Rejection of replayed packets RPSC VPITI 2014 (IT) …………. is a method of attacking a challengeresponse authentication system that uses the same protocol in both directions. (a) Replay attack (b) Denial of Service Attack (c) Masquerading (d) Reflection Attack RPSC VPITI 2014 (IT) An ATM cell has the payload field of (a) 53 bytes (b) 48 bytes (c) 64 bytes (d) 56 bytes RPSC VPITI 2014 (IT) Manchester Encoding, the data bit is represented by (a) 0 as high, 1 as low (b) Both 0 and 1 as transition in the middle of bit period (c) 0 as transition at the beginning of bit period, 1 as no transition Communication & Network Concept 82. 83. 84. 85. 167 (d) Both 0 and 1 as No transition in the middle of bit period RPSC VPITI 2014 (IT) A……… is used to interconnect two networks at data link layer (a) Hub (b) Repeater (c) Bridge (d) Router RPSC VPITI 2014 (IT) In TCP/IP, network layer and transport layer provides……….Services respectively (a) Only connectionless, Both Connectionless and Connection Oriented (b) Both connectionless and Connection Oriented, Only connectionless (c) Connectionless, Connection Oriented (d) Connection Oriented, Connectionless RPSC VPITI 2014 (IT) In…………., the error free frames received following an erroneous frame are buffered and only the oldest unacknowledged frame is retransmitted by the sender. (a) Go Back N (b) Selective Repeat (c) One bit Sliding Window Protocol (d) All the above RPSC VPITI 2014 (IT) In point-to-Point Protocol (PPP), network layer option are negotiated using (a) Link Control Protocol (b) Dynamic Host Control Protocol (c) Internet Protocol (d) Network Control Protocol RPSC VPITI 2014 (IT) In………., the sender starts transmitting the data as soon as it has data to send. (a) Pure ALOHA (b) slotted ALOHA (c) persistent CSMA (d) Nopersistent CSMA RPSC VPITI 2014 (IT) ………………routing algorithm suffers from count-to-infinity problem (a) Link State (b) Flooding (c) Distance Vector (d) Reverse Path Forwarding RPSC VPITI 2014 (IT) In Link State Routing,……………is employed to distribute the link state packets. (a) Broadcasting (b) Hierarchical Routing (c) Distance Vector Routing (d) Flooding RPSC VPITI 2014 (IT) YCT 86. 87. 88. 89. 90. 91. 92. 93. 94. 95. Which of the following is the character oriented protocol (a) SDLC (b) HDLC (c) BiSYNC (d) LAPB RPSC Lect. 2014 An open source port scanner used to determine open ports and basic vulnerabilities on the network is: (a) nmap (b) netfind (c) nslookup (d) nbtstat RPSC Lect. 2014 Which of the following is a four-wire Gigabit Ethernet implementation? (a) 1000Base-SX (b) 1000Base-LX (c) 1000Base-T (d) 1000Base-CX RPSC Lect. 2014 Which protocol is used to configure host computers automatically for obtaining IP? (a) DNS (b) HDLC (c) ICMP (d) DHCP RPSC Lect. 2014 Which statement is true for TCP and UDP protocols? (a) TCP is connection-less and UDP is connection oriented (b) TCP is unreliable and UDP is connectionoriented (c) TCP is unreliable and UDP is reliable (d) TCP is connection oriented and UDP is connection less RPSC Lect. 2014 Which protocol is generally used to encrypt data between web browser and web servers? (a) IPSec (b) SSL (c) PPTP (d) Digital Signature RPSC Lect. 2014 A RTP packet is encapsulated in ______ (a) a UDP user datagram (b) A TCP segment (c) an IP datagram (d) None of the above RPSC Lect. 2014 In a real- time video conference, data from the server is ____ to the client sites. (a) Unicast (b) Multicast (c) Broadcast (d) None of the above RPSC Lect. 2014 Routers communicate with each other and forward the packets base on _______ (a) MAC (b) IP Address (c) Host name (d) Neighbour table RPSC VPITI 2018 (IT) The DES algorithm has a key length of (a) 128 bits (b) 32 bits (c) 64 bits (d) 16 bits RPSC VPITI 2018 (IT) Communication & Network Concept 96. 97. 98. 99. 100. 101. 102. 103. 104. 168 Identify the components of intrusion detection system : (a) Analysis Engine (b) Alert Database (c) Both (1) and (2) (d) None RPSC VPITI 2018 (IT) Which of the following uses UDP as the transport protocol? (a) HTTP (b) SMTP (c) Telnet (d) DNS RPSC VPITI 2018 (IT) The protocol used by TCP for connection establishment is (a) Three way handshake (b) One way handshake (c) Two way handshake (d) None RPSC VPITI 2018 (IT) ISDN is an example of _______ network. (a) Circuit switched (b) Packet switched (c) Electric switch (d) None RPSC VPITI 2018 (IT) ______ provides a basic electronic mail transport facility. (a) TELNET (b) SNMP (c) SMTP (d) UDP RPSC VPITI 2018 (IT) Transport layer protocol deals with (a) Application to application communication (b) Process to process communication (c) Node to Node communication (d) None of above RPSC VPITI 2018 (IT) Default gateway is used for handling the request for route which is not present in (a) Topology table (b) Routing table (c) Neighbhour table (d) Use for finding best path RPSC VPITI 2018 (IT) Cell Relay, also known as (a) ISDN (b) X.25 (c) ATM (d) Frame Relay RPSC VPITI 2018 (IT) The secret key between members needs to be created as a ______ key when two members contact KDC. (a) Public (b) Session (c) Complimentary (d) None of these RPSC VPITI 2018 (IT) YCT 105. Network layer firewall works as a (a) frame filter (b) packet filter 115. (c) both frame filter and packet filter (d) None RPSC VPITI 2018 (IT) 106. In cryptography, the order of the letters in a message is rearranged by 116. (a) transpositional ciphers (b) substitution ciphers (c) both (a) and (b) (d) None RPSC VPITI 2018 (IT) 117. 107. Many packets present in the subnet degrades the performance which leads to (a) Congestion (b) Digestion (c) Ingestion (d) None RPSC VPITI 2018 (IT) 118. 108. In tunel mode IPsec protects the (a) Entire IP packet (b) IP header (c) IP payload (d) None RPSC VPITI 2018 (IT) 119. 109. When a packet is lost in transit, it should be handled by ________ . (a) error control (b) loss control (c) sequence control (d) duplication control RPSC VPITI 2018 (IT) 110. In serial communication, start and stop bits are used for 120. (a) Synchronization (b) Error detection (c) Error correction (d) None RPSC VPITI 2018 (IT) 111. The DMA transfers are performed by a Control Circuit called as (a) Device interface (b) DMA controller (c) Data controller (d) Overlooker RPSC VPITI 2018 (IT) 121. 112. UDP socket is: (a) Connection oriented socket (b) Connectionless socket (c) Multicast socket (d) Connection oriented and multicast socket TNPSC 2016 (Degree) P-II 113. ______ is used to obtain the IP address of a host based on its physical address. 122. (a) RARP (b) IPV6 (c) TFTP (d) TELNET TRB Poly. Lect. 2017 114. In which kind of communication, the destination address in each packet is the same for all duplicates? Communication & Network Concept 169 (a) Unicasting (b) Multicasting (c) Multiple unicasting (d) Broad casting TRB Poly. Lect. 2017 A router must have at least_____ NICs. (a) 3 (b) 4 (c) 2 (d) 5 TRB Poly. Lect. 2017 Which one of the following is not a consumable resources? (a) Interrupts (b) Signals (c) I/O devices (d) Messages TRB Poly. Lect. 2017 Which of the following OSI layers is between Data link layer and Transport layer? (a) Network layer (b) Session layer (c) Presentation layer (d) Physical layer UPPCL AE 18.05.2016 Which of the following protocols uses port number 25? (a) HTTP (b) POP3 (c) FTP (d) SMTP UPPCL AE 18.05.2016 A packet has arrived with an M bit value of 0. Which of the following statements is true? (a) This is the first fragment (b) This the last fragment (c) This is the middle fragment (d) This is a fragmented packet APPSC Poly. Lect. 13.03.2020 The Wireless Application Protocol (WAP) is : (a) A product of W 3C-World Wide Web Consortium (b) A data link layer of the OSI model (c) Aims to ensure Interoperability among service providers (d) Incurs high overheads of protocol stack UPSC Senior Scientific Officer Grade-II 16.07.2017 The transport layer protocols used for real time multimedia, file transfer, DNS and E-mail respectively are (a) TCP, UCP, UDP and TCP (b) TCP, UDP, TCP and UDP (c) UDP, TCP, UDP and TCP (d) UDP, TCP, TCP and UDP UPSC Senior Scientific Officer Grade-II 16.07.2017 In a LAN network every system is identified by (a) Name (b) MAC Address (c) IP Address (d) Serial number given by manufacturer UPSC Senior Scientific Officer Grade-II 16.07.2017 YCT 123. Which of the following can be used for digital fingerprint of a file? (a) Netstart (b) Cryptcat (c) Md5sum (d) All of these UPSC Senior Scientific Officer Grade-II 16.07.2017 124. Which is the most reliable topology (a) Ring topology (b) Star topology (c) Mesh topology (d) Bus topology UPPCL AE 2014 125. Which device creates big collision domain and one large broadcast domain (a) Switch (b) Bridge (c) Router (d) Hub UPPCL AE 2014 126. How many bits are in Header Checksum of IPv4 datagram format (a) 16 (b) 2 (c) 4 (d) 8 UPPCL AE 2014 127. Which attack involves change in DNS entries so that users are directed to invalid site (a) Phishing (b) Masquerade (c) Worm (d) Pharming UPPCL AE 2014 128. The encryption and compression are done by which layer (a) Session Layer (b) Application layer (c) Transport Layer (d) Presentation Layer UPPCL AE 2014 129. To which IEEE family does WiMAX belong (a) 802.14 (b) 802.13 (c) 802.16 (d) 802.11 UPPCL AE 2014 130. The scripting technologies not used at server site is (a) JSP (b) ASP (c) HTML (d) PHP UPPCL AE 2014 131. Fibre distribution data interface (FDDI) does not support which of the following (a) data encoding/decoding (b) transmission media (c) fault tolerant transmission (d) media access control UPPCL AE 2014 132. In the TCP/IP Protocol suite which one of the following is NOT part of the IP header? (a) Fragment Offset (b) Source IP address (c) Destination IP address (d) Destination port number RPSC ACF & FRO 23.02.2021 (CS) Communication & Network Concept 133. The amount of uncertainty in a system of symbol is called: (a) Bandwidth (b) Entropy (c) Loss (d) Quantum Punjab PSC Lect. 2016 (IT) 134. Poll/select line discipline requires.............. to identify the packet recipient? (a) Timer (b) Buffer (c) Address (d) Dedicated line Punjab PSC Lect. 2016 (IT) 135. What is the destination address of a frame containing an ARP request? (a) A broadcast IP address. (b) A broadcast MAC address. (c) The default getaway IP address. (d) The default getaway MAC address. Punjab PSC Network Engineer 21.06.2014 136. In OSI network architecture, the routing is performed by: (a) network layer (b) data link layer (c) transport layer (d) session layer Punjab PSC Network Engineer 21.06.2014 137. TCP-IP Model does not consist of following layers: (a) Application layer (b) Physical layer (c) Session layer (d) Data link layer Punjab PSC Network Engineer 21.06.2014 138. BGP Routing Protocol is used following algorithm during it's execution: (a) Bellman Ford Algorithm (b) Insertion Sort Algorithm (c) Dijkstra Algorithm (d) Kruskal Algorithm Punjab PSC Network Engineer 21.06.2014 139. Any electronic device on a network is called a: (a) Node. (b) Hub. (c) Router. (d) Cable. Punjab PSC Network Engineer 21.06.2014 140. Which piece of equipment installs in a PC and allows the PC to connect to a network? (a) Hub. (b) Access Router. (c) Graphic Accelerator Card (d) Network Interface Card. Punjab PSC Network Engineer 21.06.2014 141. The network area within which data packets originate and collide is called a ......... ? (a) Network segment (b) Collision segment (c) Network domain (d) Collision domain Punjab PSC Network Engineer 21.06.2014 170 YCT 142. Which of the following security solutions uses the same key for both encryption and authentication? (a) wpa (b) wpa 2 (c) WEP (d) 802.11i Punjab PSC Network Engineer 21.06.2014 143. A communication device that combines transmissions from several I/O devices into one line is a: (a) Concentrator (b) Modifier (c) Multiplexer (d) Adder Punjab PSC Network Engineer 21.06.2014 144. TCP/IP .......... layer corresponds to the OSI models to three layers. (a) Application (b) Presentation (c) Session (d) Transport Punjab PSC Network Engineer 21.06.2014 145. Which of the following applications allows a user to access and change remote files without actual transfer? (a) DNS (b) FTP (c) NFS (d) Telnet Punjab PSC Network Engineer 21.06.2014 146. The data unit in the TCP/IP layer called a ......... (a) Message (b) Segment (c) Datagram (d) Frame Punjab PSC Network Engineer 21.06.2014 147. What is the full form of PING? (a) Packet Internet Groper (b) Protocol Internet Groper (c) Packet Intranet Gateway (d) Protocol Internet Gateway Punjab PSC Network Engineer 21.06.2014 148. Which of the following OSI layers correspond to TCP/IP's application layer? (a) Application (b) Presentation (c) Session (d) All of the options Punjab PSC Network Engineer 21.06.2014 149. Devices on one network can communicate with devices on another network via a ......... . (a) File Server (b) Router (c) Printer Server (d) Gateway Punjab PSC Network Engineer 21.06.2014 150. What is an SSID used for on a WLAN? (a) To secure the WLAN (b) To manage the WLAN settings (c) To identify the WLAN (d) To configure the WLAN AP Punjab PSC Network Engineer 21.06.2014 Communication & Network Concept 151. DNS can obtain the .......... of host if its domain name is known and vice versa. (a) Station address (b) IP address (c) Port address (d) Checksum Punjab PSC Network Engineer 21.06.2014 152. CSMA stands for: (a) Carrier Sense Multiple Access (b) Carrier Switch Multiple Access (c) Carrier Switch Medium Access (d) Control Sense Multiple Access. Punjab PSC Network Engineer 21.06.2014 153. A remote batch-processing operation in which data is solely input to a central computer would require a: (a) telegraph line (b) simplex lines (c) mixedband channel (d) All of the options Punjab PSC Network Engineer 21.06.2014 154. Which of the transport layer protocols is connectionless? (a) UDP (b) TCP (c) FTP (d) SMTP Punjab PSC Network Engineer 21.06.2014 155. Which layers of the OSI determines the interface of the system with the user? (a) Network (b) Application (c) Data link (d) Session Punjab PSC Network Engineer 21.06.2014 156. The slowest transmission speeds are those of: (a) twisted-pair wire (b) coaxial cable (c) fiber-optic cable (d) Copper cable Punjab PSC Network Engineer 21.06.2014 157. The standard suit of protocols used by the Internet, Intranets, extranets and some other networks. (a) TCP/IP (b) Protocol (c) Open system (d) Internet work processor Punjab PSC Network Engineer 21.06.2014 158. What can greatly reduce TCP/IP configuration problems? (a) WINS Server (b) WINS Proxy (c) DHCP Server (d) PDC Punjab PSC Network Engineer 21.06.2014 159. Which of the following is used for modulation and demodulation? (a) Modem (b) Protocols (c) Gateway (d) Multiplexer Punjab PSC Network Engineer 21.06.2014 160. Frames from one LAN can be transmitted to another LAN via the device: (a) Router (b) Bridge (c) Repeater (d) Switch Punjab PSC Network Engineer 21.06.2014 171 YCT 161. What terminates VPNs at a primary location? (a) Router (b) ASA (c) Head-end device (d) Software client Punjab PSC Network Engineer 21.06.2014 162. What wizard in SDM can be used to assist in choosing a VPN? (a) VPN Design Guide (b) IPSec Wizard (c) VPN Recommendation Guide (d) IPSec Guide Punjab PSC Network Engineer 21.06.2014 163. The network layer concerns with: (a) bits (b) frames (c) packets (d) none of the options Punjab PSC Network Engineer 21.06.2014 164. Which one of the following is not a function of network layer? (a) routing (b) inter-networking (c) congestion control (d) none of the options Punjab PSC Network Engineer 21.06.2014 165. RIP stands for: (a) Routing Information Protocol (b) Route Internet Protocol (c) Router Information Protocol (d) Route Intranet Protocol Punjab PSC Network Engineer 21.06.2014 166. IEEE 802.11 stands for: (a) Wireless LAN (b) Wired LAN (c) Bluetooth technology (d) Wi-MAX Punjab PSC Network Engineer 21.06.2014 167. RS- 232 is a standard that applies to? (a) Parallel port (b) Serial port (c) Game port (d) All of above Punjab State Civil Supplies Corp. Ltd. 13.11.2011 168. DNS servers translates web addresses or host name to: (a) MAC address (b) FTP address (c) IP address (d) Host Name Punjab State Civil Supplies Corp. Ltd. 13.11.2011 169. To host a web site which of following is required? (a) Web Server (b) Exchange Server (c) Mail Server (d) Database Server 170. 171. IPv6 address is___________ bits long. (a) 16 (b) 32 (c) 64 (d) 128 Punjab State Civil Supplies Corp. Ltd. 13.11.2011 172. Which layers of the OSI reference model are host-to host layers? (a) Transport, session presentation, application (b) Session, presentation, application (c) Datalink, transport, presentation, application (d) Physical, datalink, network, transport ISRO Scientist/Engineer 2015 173. The DNS maps the IP addresses to (a) A binary address as strings (b) An alphanumeric address (c) A hierarchy of domain names (d) A hexadecimal address ISRO Scientist/Engineer 2015 174. SSL is not responsible for (a) Mutual authentication of client & server (b) Secret communication (c) Data integrity protection (d) Error detection & correction ISRO Scientist/Engineer 2007 175. Silly window Syndrome is related to (a) Error during transmission (b) File transfer protocol (c) Degrade in TCP performance (d) Interface problem ISRO Scientist/Engineer 2007 176. Application frameworks provide a means for creating _______ hosted application using iDE. (a) PaaS (b) SaaS (c) CaaS (d) All of the above GPSC Asstt. Prof. 30.06.2016 177. TCP groups a number of bytes together into a packet called ______ (a) Packet (b) Buffer (c) Segment (d) Stack GPSC Asstt. Prof. 30.06.2016 178. Communication offered by TCP is _____ (a) Full-duplex (b) Half-duplex (c) Semi-duplex (d) Byte by byte GPSC Asstt. Prof. 30.06.2016 Punjab State Civil Supplies Corp. Ltd. 13.11.2011 179. The packet sent by node to the source to inform ICANN is: it of congestion is called ______ (a) Name of internet corporation for assigned (a) Explicit (b) Discard names & numbers to different domains (c) Choke (d) Backpressure (b) Organization for setting up rules to operate GPSC Asstt. Prof. 30.06.2016 Internet 180. User datagram protocol is called connectionless (c) Organization to provide security to services because ______ (d) For making network administration more (a) All UDP packets are treated independently by manageable transport layer Punjab State Civil Supplies Corp. Ltd. 13.11.2011 (b) It sends data as a stream of related packets Communication & Network Concept 172 YCT (c) It is received in the same order as sent order (d) It sends data very quickly GPSC Asstt. Prof. 30.06.2016 181. Control of users' access to network resources through charges is the main responsibility of ________ (a) Reactive Fault Management (b) Reconfigured Fault Management (c) Accounting Management (d) Security Management GPSC Asstt. Prof. 30.06.2016 182. Open Shortest Path First (OSPF) is also called as _____ (a) Link state protocol (b) Error-correction protocol (c) Routing information protocol (d) Border gateway protocol GPSC Asstt. Prof. 30.06.2016 183. Frame Relay does not provide flow or error control, they must be provided by the _____ (a) Lower Level Protocol (b) highest level protocol (c) Upper Level Protocol (d) Lowest level protocol GPSC Asstt. Prof. 30.06.2016 184. The instrument that can be used to find the location of a cable short is termed as (a) Multimeter (b) CSU/DSU (c) Protocol analyzer (d) TDR GPSC Asstt. Manager 13.12.2020 (IT) 185. Two network switches that do not support MDI-X need to be connected via copper cabling. The cabling method that needs to be used is (a) Straight (b) Rollover (c) Crossover (d) Loopback GPSC Asstt. Manager 13.12.2020 (IT) 186. TPM is an acronym for (a) Trusted Platform Mode (b) Trusted Platform Module (c) Trusted Privacy Module (d) True Platform Module GPSC Asstt. Manager 13.12.2020 (IT) 187. The method used for transmitting IPV6 traffic over a IPV4 network is (a) Subnetting (b) Tunneling (c) Supernetting (d) Contracting GPSC Asstt. Manager 13.12.2020 (IT) ANSWER KEY 1. (a) 2. (a) 3. (a) 4. (b) 5. (d) 6. (d) 7. (b) 8. (d) 9. (d) 10. (a) 11. (d) 12. (d) 13. (a) 14. (d) 15. (a) 16. (b) 17. (d) 18. (d) 19. (d) 20. (d) 21. (d) 22. (c) 23. (c) 24. (a) 25. (a) 26. (d) 27. (c) 28. (c) 29. (c) 30. (c) 31. (c) 32. (c) 33. (b) 34. (d) 35. (c) 36. (b) 37. (a) 38. (d) 39. (d) 40. (d) 41. (a) 42. (c) 43. (d) 44. (d) 45. (b) 46. (d) 47. (c) 48. (b) 49. (a) 50. (b) 51. (d) 52. (b) 53. (b) 54. (a) 55. (c) 56. (c) 57. (a) 58. (d) 59. (b) 60. (d) 61. (a) 62. (a) 63. (b) 64. (b) 65. (b) 66. (d) 67. (d) 68. (b) 69. (d) 70. (a) 71. (b) 72. (c) 73. (d) 74. (a) 75. (c) 76. (d) 77. (b) 78. (b) 79. (c) 80. (a) 81. (b) 82. (b) 83. (a) 84. (c) 85. (d) 86. (c) 87. (a) 88. (c) 89. (d) 90. (d) 91. (b) 92. (a) 93. (b) 94. (b) 95. (c) 96. (c) 97. (d) 98. (a) 99. (a) 100. (c) 101. (b) 102. (b) 103. (c) 104. (b) 105. (b) 106. (a) 107. (a) 108. (a) 109. (c) 110. (a) 111. (b) 112. (b) 113. (a) 114. (b) 115. (c) 116. (c) 117. (a) 118. (d) 119. (b) 120. (c) 121. (c) 122. (c) 123. (c) 124. (c) 125. (d) 126. (a) 127. (d) 128. (d) 129. (c) 130. (c) 131. (b) 132. (d) 133. (b) 134. (c) 135. (b) 136. (a) 137. (c) 138. (c) 139. (a) 140. (d) 141. (d) 142. (c) 143. (c) 144. (a) 145. (c) 146. (d) 147. (a) 148. (d) 149. (d) 150. (c) 151. (b) 152. (a) 153. (b) 154. (a) 155. (b) 156. (a) 157. (a) 158. (c) 159. (a) 160. (b) 161. (c) 162. (a) 163. (c) 164. (d) 165. (a) 166. (a) 167. (b) 168. (c) 169. (a) 170.(a) 171. (d) 181. (c) 172. (a) 182. (a) 173. (c) 183. (c) 174. (d) 184. (d) 175. (c) 185. (c) 176. (b) 186. (b) 177. (c) 187. (b) 178. (a) 179. (c) 180.(a) Communication & Network Concept 173 YCT 07. NETWORK SECURITY AND MALICIOUS ATTACKS Authentication and Authorization: Network Security The security provided to the computer and network to protect against unauthorized access and risk is called network or computer security. Network or computer can be kept secure by using some process or software– (i) Antivirus (ii) Firewall (iii) Authentication and Authorization (iv) Cryptography Protecting computer systems from viruses and malicious Attacks– A malicious attack is an attempt to forcefully access someone's computer using computer viruses, phishing or other techniques like spamming, social media etc. Computer virus is a type of malicious computer program of software that can damage and destroy computer files. Following some security practices can help you reduce the risks and protect computer systems from viruses and malicious attacks- (i) Authentication– Authentication is a process of verifying or identifying user or information with its help the identity of the data or user is verified. There are several methods of authentication: (i) Username and Password (ii) Biometrics (iii) OTP (One time password) (ii) Authorization– Authorization is to verify the rights of the user. This process is done after authentication. In authorization the rights of the user are checked. Cryptography: Cryptography is a technique through which information and communication are kept secure. In this, it is coded in such a way that only the recipient can understand the data or message. The word cryptography is derived from the Greek word Kryptos and Graphene. Krypto means hidden and Graphene means- writing. In cryptography, the data or message is converted into an unreadable secret code called cipher text and this data can be read only by those who have the secret key to Antivirus decrypt it. Decrypted data is called plain text. Antivirus is a software tool that is used to detect and Cryptography is completed in two process: remove or prevent malicious software (malware). (i) Encryption Antivirus software protects your computer from malware (ii) Decryption and cyber criminals (hackers). It is used to remove and repair malicious web pages, files, software applications etc. We can protect our computer system by installing and using antivirus from malicious software like (i) Encryption– The process of converting data malware viruses and hackers etc. Antivirus software plain text into cipher text is called encryption. This is a prevents, detects & removes malicious software (like technique whose code cannot be easily understood by an worms, virus) from a side variety of threats, cyber unauthorized person because a key is needed to decrypt criminals. it. (ii) Decryption– Converting cipher text back to Some of the main antivirus software are– plain text is called decryption. (i) Norton Types of Cryptography– There are two types of (ii) McAfee cryptography: (iii) AVG (a) Symmetric Cryptography– In this type of (iv) Quick Heal cryptography, the same key is used to encryption (v) PANDA and decryption of data. (vi) Microsoft Security Essentials (b) Asymmetric Cryptography– In this cryptography, (vii) Avast public key is used for encryption and private key is used for decryption. (viii) Avira Network Security and Malicious Attacks 174 YCT • Source or destination based blocking of incoming network traffic firewalls block the incoming traffic by Install software patches on your computer so looking into the source of the traffic. attackers do not take advantages of known vulnerabilities. Consider enabling automatic updates, • Outgoing network traffic can be blocked based on the source or destination that means firewalls can also when available. filter data between your internal network and internet. Avoid Using Public Wi-Fi : Keep Software Updated: Unsecured Public Wi-Fi may allow an attacker to • Block network traffic based on content. intercept your device's network traffic and gain access to (ii) Preventing Hacks– Firewalls keep hackers out of your data, emails, computer system and other your personal information. sensitive information. Backup and Restoring Data : (iii) Promotes Privacy– Having a firewall keeps the data Any data that you want to protect against loss or safe and builds an environment of privacy that is damage can be unsaved as backup data. The meaning of trustworthy and a system without a firewall is backup is to make a copy of lost data. Backup means accepting every connection into the network from "You keep a copy of your data or information in a anyone. location other than the original" so that if the data is Type of Firewall: deleted or corrupted from the original source the data can be retrieved (recovered) again from the data kept at that A firewall is usually classified in two types– (i) Packet Filter Firewall other location. Restoring data is the process of copying backup data (ii) Proxy Based Firewall (i) Packet Filter Firewall– It is used as a packet from secondary storage and restoring it to its original filter. It can forward or block packets based on the location or new location. information in the network layer and transport layer. Firewall : A packet filtering firewall can block particular host A firewall is a network security device that prevents from accessing the Network. unauthorized access to personal data on your computer These type of firewall monitors network traffic and from outsiders by filtering network traffic. Along with filters incoming packets based on configured security blocking unwanted traffic it also protects your computer rules. from getting infected by blocking malicious software. They also monitor outgoing and incoming packets. This firewall is also known as a static firewall. These types of firewalls do not prevent web based attacks. (ii) Proxy Firewall– A proxy firewall sometimes called an application gateway, which stands between the two computer. Customer computer and the corporation computer. A proxy firewall filters or operate at the application layer. There are some other firewalls Firewall also prevents the virus from a system to another system. It acts as a wall between the computer and the network/internet or in other word we can say a firewall typically establishes a barrier between a trusted network and untrusted network, such as the internet. Utility of Firewalls • Stateful inspection Firewalls • Next-Generation Firewalls • Circuit Level Gateways • Cloud Firewall Advantages of Network Firewall (1) Halt Hacking (i) Monitoring Network Traffic– Monitoring of (2) Stop Viruses network traffic involves the following security (3) Better Security (4) Increasing Privacy measures– Network Security and Malicious Attacks 175 YCT Network attack Hacker and its Type : Hacker are those person, who have good knowledge in the world of computer science. Who are well versed in computer programming and network. Hacker can control anyone's computer system through internet even by sitting remotely, such as access data, stealing data, deleting data etc. Types of Hackers– (1) White Hat Hacker/Ethical Hacker (2) Black Hat Hackers (3) Gray Hat Hackers (4) Red Hat Hackers 1. White Hat Hacker– White Hat Hackers are known as Ethical Hackers. Ethical Hackers do hacking only after getting permission by the owner of the system with good motives. They do completely legal work only. This type of Hackers are employed by businesses and government agencies as data security analysts, security specialists etc. 2. Black Hat Hacker– These type of hacker use their ability to perform illegal tasks. Such as stealing or tampering with personal information and data of a company or person's website or their computer. These type of hackers are criminals of cyber crime and they have a malicious motive and goal to make money by stealing funds from online bank accounts, stealing secret and data etc. 3. Grey Hat Hacker– Grey hat hackers are a blend of both black hat and white hat activities. Often, grey hat hackers will look for vulnerabilities in a system without the owner's permission or knowledge. If issues are found they will repeat them to the owner. However this type of hacking is still considered illegal because the hacker did not receive permission from the owner prior to attempting to attack the system. 4. Red Hat Hacker– These types of hackers work to prevent government agencies, top secret centers and cybercrime. These hackers are a combination of both black and white hat. Malicious Software : Malware & Virus Malware– Malware is a malicious software or program designed to damage computer servers or networks without the knowledge of a computer user. Network Security and Malicious Attacks There are some different type of malware– (1) Computer Virus (2) WORM (3) Trojan Horse (4) Back Door (5) Spyware (6) Adware 1. Computer Virus– A computer virus is a type of malicious computer program that can damage and destroy computer files or data. It is a special type of code or program created by programmers. Through a computer virus the data of any computer can be stolen, destroyed and the computer can be taken under its control. It can reduce the capacity of the system disc by entering the boot sector. Virus is transmitted to the computer through internet, pen derive, storage disc etc. Computer virus is divided into different type: (a) Boot Sector Virus– It is a type of virus that infects the boot sector or the master boot record (MBR) of the hard disc. It infects the file that starts the operating system. It spreads through removable media. (b) File Infector Virus– This virus is also known as parasitic virus, it is associated with program files, such as .com or .exe file. The main source of this virus are the game, world processor. (c) Multipartite Virus– This type of virus can infect both the boot sector and executable file. If this type of virus attacks your system then your system is at increased risk of cyber threat, that is data may be lost or breach and misuse. (d) Macro Virus– It is associated with an application such as MS word or excel. This virus starts running automatically as soon as the application is opened. 2. WORM– Worm is a type of malware, which spreads from one computer to another by making a copy of itself and occupies the memory. 3. Trojan Horse– A Trojan horse is a malware program that looks like other software or programs such as games etc. but its effects are terrible when run it. It can be used by a hacker to break the password or access the data of hard disc. Trojan horse spreads through downloading software from website or legimate looking emails and files attached to emails. 176 YCT 4. Back Door– Back door is a type of malware like (4) Maintaining Access a Trojan. It is used by the attacker to gain unauthorized (5) Clearing Track remote access to the PC. 5. Spyware– Spyware is a type of malware program that steals data by sending it to the user's system without his knowledge. It monitors your computer when it is connected to the internet and your (user) system is completely under the control of the hacker. It monitors user's activity on internet and transmits that information in the background to someone else. 6. Adware– This is a type of advertising malware software or program, which will suddenly appear in the 1. Reconnaissance– This is the first step of form of pop-up window (in the form of a text message) Hacking, also known as the footprint or information or banner and ask you to click, but after clicking this gathering phase. This is the preparatory phase where we malware starts downloading. collect as much information as possible about the target. Before launching an attack, the attacker collects all the necessary information about the target footprint collects data from TCP, UDP, IP and Host Network Area. Spam : There are two types of foot printing: (i) Active Spam is unsolicited e-mail or message sent through (ii) Passive the internet. It is difficult to identify the sender of spam (i) Active– Directly interacting with the target to gather because it is anonymous. It is mostly used for information about target directly using Nmap tool to advertising. scam. Hacking : (ii) Passive–Trying to collect information without Hacking is the process of gaining unauthorized directly accessing the target in anyway. access to computer network security systems for some 2. Scanning– This is the second phase of hacking. legal or illegal purpose. This process is done by a hacker. In this phase hackers try to find different ways to get Hackers do some hacking by making or using information of system such as information of user's software programs like malware, virus, worm and by account, IP address etc. transmitting it to the user's. In this phase, three types of scanning are involved: Ethical Hacking : (i) Port scanning Ethical hacking involves hackers who do hack into a (ii) Vulnerability scanning system with prior permission to find out vulnerabilities (iii) Network mapping so that they can be fixed before a person with malicious 3. Gaining Access– In this phase, Hackers gains intent find them. This procedure is called ethical access to the system, applications network and escalates hacking. Ethical hacking is completely legal. their user privileges to control the system connected to it. Phases of Ethical Hacking– In this phase, hacker will connect to the network. This To find such vulnerabilities, ethical hackers will allow hacker to launch more powerful attacks and undertake several phases of the ethical hacking get more accurate information. methodology. 4. Maintain Access– Once a hacker has gained access, they want to keep that access for future These phases are– exploitation and attacks. Here, the hacker secure access (1) Reconnaissance to the organizations Rootkits and Trojans and uses it to (2) Scanning launch additional attacks on the network. (3) Gaining Access Network Security and Malicious Attacks 177 YCT 5. Clearing Tracks– Once the hacker gains access, Important Facts they cover their tracks to escape the security personal. 1. 2. 3. • Creeper is a first computer virus. Threat– A cyber security threat is a malicious act • Brain is a first boot sector virus for MS DOS (PC). that seeks to damage data, steal data etc. • Malware is a Malicious Software. Salami Attack– It is financial crimes. • Phishing is a fraudulent attempts to obtain bank details such as credit/debit card and password details. Multipartite Virus– Hybrid of program virus and 4. • Firewall can be a software program or a hardware device that filters all data packets coming through the Plagiarism– Stealing the ideas or creations of internet network. others. • Cross site scripting attack allows attacker's to inject 5. Polymorphic Virus– It is a form of malware that boot sector virus. client side script into web pages. "Mutates" as it propagates to make is more difficult • The main purpose of the Data Protection Act is to protect personal privacy. to detect and block. 6. 7. 8. 9. 10. 11. 12. 13. Deep Inspection Firewall– It makes filtering • A Malware that secretly collects information about users without their consent is called spyware. decisions based on application payload. • Virtual Private Network (VPN) allows remote Trojan-Horse– Legimate programs that allow workers to have secure access to their organization's unauthorized access. network while using a public telecommunication infrastructure, such as the internet. Denial-of-Service Attack– An attempt to slow down or stop a computer system or network by • Possible security threat are information destruction, information alteration, information release. flooding the system with requests for information. • Packet filters firewall works in the network layer of Piracy– Piracy refers to unauthorized duplication of OSI Model. copyrighted content that is the sold at substantially • State full Firewall and stateless firewall enumerates lower prices. the two subcategories of the standard network layer firewall. Public Key– In public key, two keys are used for • Identity theft is the impersonation by as thief of encryption and decryption. someone's identity for purpose of economic/social Private Key– Same key is used for encryption and gain. decryption. • Firewall is a software or Hardware used to isolate a Firewall– It is hardware or software used to isolate private network form a public network. a private network from public network. • SHA1 and MD5 are used to generate a message digest by the network security protocols. Cybercrime– Crime that involves a computer and networks. 14. Avalanche Effect– A small change in either the plain text or the key producing a significant change in the cipher text. • A packet filtering firewall can block some hosts from accessing the network. • IEEE 1394 (FireWire) is an interface standard for a serial bus for high-speed communications and realtime data transfer. 15. Substitution and Transposition– Generally used for • RSA Algorithm and Diffle-Hellman algorithm are asymmetric algorithm. transforming plain text to cipher text. 16. DES– Data Encryption Standard (DES) encryption • Click Fraud is a type of cybercrime that occurs in pay-per-click (PPC) online advertising. algorithms is based on the Feistel structure. • DES and public Key algorithm are combined to 17. SSL – Secure Socket Layer speed up encrypted message transmission and to 18. Brute Force Attack– Try to determine the key by ensure higher security by using different key for each attempting all possible keys. transmission. Network Security and Malicious Attacks 178 YCT Important Questions Asked in Previous Years Examinations 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. First computer virus is (a) Creeper (b) Sasser (c) Blaster (d) I Love You The first boot sector virus for MS-DOS (PC) (a) Creeper (b) Brain (c) Blaster (d) Sasser McAfee is a example of _____ (a) Quick Heal (b) Malware (c) Virus (d) Antivirus Malware is a type of _____ (a) Malicious software (b) Antivirus (c) Beware (d) Illegal ware A person who hacks a computer is called? (a) Hacker (b) Cracker (c) Human ware (d) Spyware Hackers who help to find bugs and vulnerabilities in a system with the permission of the owner of a computer system and do not intend to cause any harm to the system: (a) Black Hat Hackers (b) White Hat Hackers (c) Grey Hat Hackers (d) Red Hat Hackers Such hackers who do cyber crime to gain financial profit are their main motive: (a) Black Hat Hackers (b) White Hat Hackers (c) Grey Hat Hackers (d) Red Hat Hackers Fraudulent attempts to obtain bank details such as credit/debit card and password details (a) phishing (b) spoofing (c) Hacking (d) Cracking ____ is software that helps a computer to detect and avoid viruses (a) Malware (b) Adware (c) Antivirus (d) Both (a) and (b) ______ can be a software program or a hardware device that filters all data packets coming through the internet network: (a) Antivirus (b) Firewall (c) Cookies (d) Malware Process of converting plain text to unreadable text (cipher text) is: (a) Decryption (b) Encryption (c) Network security (d) Information Hiding A program that copies itself: (a) WORM (b) Trojan Horse (c) Virus (d) BOMB Which of the following is not a stand-alone program? (a) Trojan (b) WORM (c) Virus (d) Spyware UPPSC Computer Asst. 23.08.2020 Network Security and Malicious Attacks 14. 15. 16. 17. 18. 19. 20. 21. 22. 179 Viruses can enter to computer as an attachment of (a) Images (b) Audio/Video files (c) Downloads (d) All of these What are types of malware? (a) Caterpillars (b) WORM (c) Lions (d) Horses UPPSC Computer Asst. 23.08.2020 The technique by which data is converted into an encrypted form so that is cannot be easily understood by an unauthorized person is called– (a) Encryption (b) Modulation (c) Decryption (d) Demodulation A malware that secretly collects information about users without their consent is called: (a) Spyware (b) Virus (c) Boot ware (d) Adware UPPCL Accountant 10.02.2018 The deadlock- avoidance schemes like the banker's algorithm would lead to (a) Increase overhead (b) Increase system throughput (c) More concurrent use of resources (d) All of these RPSC ACF FRO 23.02.2021 (Comp. App./Sci.) Which type of virus attaches with exe files and the resulting infected exe file attacks other exe files and infects them? UPPCL JE 2019 (Batch-2) (a) Parasitic Virus (b) Boot Sector Virus (c) Stealth Virus (d) Memory Resident Virus Which mechanism is used by the computer virus 'WORM' to duplicate itself? (a) Swap (b) Increment (c) Spawn (d) Swarm Computer virus affects (a) Software (b) Hardware (c) Computer language (d) None of the above Computer virus is: (a) A chemical substance that attacks silicon (b) A micro-organism that destroys integrated circuits (c) data that the computer cannot handle (d) A special type of computer program SSC Section off. Exam 2007 YCT 23. 24. 25. 26. 27. 28. 29. 30. 31. 32. Computer virus is (a) a computer program that can copy itself (b) a virus that the health of humans (c) both of the above (d) None of the above MPPSC (Pre) G.S. Ist Paper 2012 A computer virus is a (a) Hardware (b) software (c) Bacteria (d) Freeware RRB JE 2014 Computer virus is (a) Malicious program (b) Useful program (c) Firewall (d) None of these A type of cybercrime that occurs in pay per click online advertising when a person, automated script of computer program imitates a legitimate user of a web browser clicking on an ad, for the purpose of generating charge per click without having actual interest in the targets of the ad's link (a) Phishing (b) Zombie (c) Click fraud (d) None of these RPSC VPITI 2014 (IT) Which of following is an antivirus? (a) Code Red (b) Melissa (c) Crypto Locker (d) Dr. Web What is the other name for crackers, the malicious hackers who infiltrate secure systems in order to steal information or cause image? (a) Black hats (b) Infliterer (c) Pirates (d) Digital rouges Which of the following is not an antivirus software. (a) Avira (b) Kaspersky (c) McAfee (d) Firefox One of the computer viruses that attracted widespread public attention was designed to infect MS DOS on 6 March 1992. The name of virus is: (a) Brain (b) Catch me if you can (c) Micalangilo (d) Friday the thirteenth Which of the following viruses generally found in the hard disk's root directory, but it keeps on changing location? (a) Trj. Reboot (b) Vienna (c) Way (d) Trival.88.D RRB JE (Shift-I) 02.09.2015 Which of the following viruses spreads via malicious emails (a) Trj-Reboot (b) Vienna (c) Js. Fortnight (d) Trivial.88.D RRB SSE (Shift-II) 02.09.2015 Network Security and Malicious Attacks 33. 34. 35. 36. 37. 38. 39. 40. 41. 42. 43. 180 Viruses that run at the passage of time or on a particular date are called (a) boot sector virus (b) time bomb (c) worm (d) none of these SBI (PO) 2008 The virus usually comes from the floppy disc left in the floppy disc drive. (a) Trojan horse (b) boot sector (c) script (d) logic bomb Which of the following category of viruses does not replicate themselves? (a) worms (b) trojan horses (c) boot sector viruses (d) macro viruses RRB JE Bhopal Paper-I (Shift-II), 28.08.2015 Which of the following is not a 'overwrite' virus? (a) Trj. Reboot (b) Meve (c) Way (d) Trivial.88.D RRB SSE (Shift-III) 01.09.2015 Which of the following categories of viruses normally infect executable code, such as .com and .exe files. (a) File infector viruses (b) Boot sector viruses (c) Master boot record viruses (d) Macro viruses RRB JE (Shift-III) 28.08.2015 What is the primary goal of an Ethical Hacker? (a) Avoiding detection (b) Testing security controls (c) Resolving security vulnerabilities (d) Determining return on investment for security measures What is the first phase of hacking? (a) Maintaining access (b) Gaining access (c) Reconnaissance (d) Scanning Hacking for a cause is called (a) Hacktivism (b) Black-hat hacking (c) Active hacking (d) Activism Abuse messaging system to send unsolicited is ______? (a) Phishing (b) Firewall (c) Adware (d) Spam What is the system designed to prevent unauthorized access to or from a private network called as ___ (a) Firewall (b) Digital (c) Biotech (d) Computer scam Packet filtering firewalls are vulnerable to ____ (a) Hardware vulnerabilities (b) Phishing (c) MiTm (d) Spoofing YCT 44. 45. 46. 47. 48. 49. 50. 51. 52. _____ firewalls are a combination of other three types of firewalls. (a) Stateful multilayer inspection (b) Circuit level gateway (c) Packet filtering (d) Application level gateway Advantage of stateful multilayer inspection firewall is (a) complex internal architecture (b) large to manage but efficient (c) costlier but easy to understand (d) small to manage Packet filtering firewall are: (a) First generation firewalls (b) Second generation firewalls (c) Third generation firewalls (d) Fourth generation firewalls Application layer firewalls are (a) First generation firewalls (b) Second generation firewalls (c) Third generation firewalls (d) Fourth generation firewalls Which of the following refers to stealing one's idea or invention of others and use it for their own benefits (a) Piracy (b) Plagiarism (c) Intellectual property rights (d) All of the above Which of the following is not an example of Malware? (a) Worm (b) Trajan Horse (c) Virus (d) Browser Which of the following is the cyber security goals. (a) Protect the confidentiality of data (b) Promote the availability of data for authorized users (c) Preserve the integrity of data (d) all above Which of the following is not a valid category of computer viruses? (a) Macro viruses (b) Trojans (c) Memory resident viruses (d) Interrupts RRB SSE (Shift-II), 01.09.2015 Which of the following malwares is used by an attacker to get unauthorized remote access to a PC by exploiting security vulnerabilities? (a) logic bomb (b) back door (c) Poverty (d) Self-replicating UPPCL JE 2019 (Batch-01) Network Security and Malicious Attacks 53. 54. 55. 56. 57. 58. 59. 181 Which of the following Malicious Software creates new processes in an infinite loop? (a) Boot Sector Virus (b) Memory Resident Virus (c) Stealth Virus (d) Fork Bomb UPPCL-JE 31-01-2019 (Batch -01) Anti-virus software must be regularly updated else(a) New viruses wouldn't be recognized (b) None of these (c) Software will become corrupt (d) Both of these UPPCL Accountant 10-02-2018 Verification of a login name and password is known as (a) Configuration (b) Accessibility (c) Authentication (d) logging in UPPCL TG-2 26.06.2016 Which of the following types of attack allows attackers to inject client side script into web pages? (a) Cross Client Scripting (b) Cross Site Scripting (c) Cross Server Scripting (d) Cross Sort Scripting UPPCL JE 2019 (Batch-01) We categorise cyber-crimes in two ways, that is _____. (a) crime committed in i) the real world and ii) the computer world (b) crime committed through i) the WWW and ii) the internet (c) crime committed in i) cyberspace and ii) the real world (d) crime committed where i) a computer is a target and ii) where a computer is a weapon UPPCL ARO 13-09-2018 A malware that secretly collects information about users without their consent is called (a) Spyware (b) Virus (c) Bootware (d) Adware UPPCL Accountant 10-02-2018 Which of the following allows remote workers to have secure access to their organization's network while using a public telecommunication infrastructure, such as the Internet? (a) Intrusion detection system (b) VPN (c) Wingate (d) Shoulder surfing UPP Computer Operator 21-12-2018 (Batch-02) YCT 60. 61. 62. 63. 64. 65. 66. 67. Which of the following is possible security threat? (a) Information destruction (b) Information alteration (c) Information release (d) All of the above UPPSC LT GRADE 29.07.2018 Salami attack is for (a) website defacement (b) controlling the website (c) financial crimes (d) Internet time theft UPPSC LT GRADE 29.07.2018 What is multipartite virus? (a) Hybrid of macro virus and stealth virus (b) Hybrid of virus and worms (c) Hybrid of ActiveX and Java control (d) Hybrid of program virus and boot sector virus UPPSC LT GRADE 29.07.2018 The main purpose of the Data Protection Act is to (a) protect personal privacy (b) prevent viruses (c) increase the security of computer systems (d) reduce project failures UPPSC LT GRADE 29.07.2018 Which of the following represents stealing the ideas or stealing the creations of others? (a) Plagiarism (b) Intellectual Property Rights (c) Piracy (d) All of the above UPPSC LT GRADE 29.07.2018 ________ monitors user’s activity on Internet and transmits that information in the background to someone else. (a) Malware (b) Spyware (c) Adware (d) None of the above UPPSC LT GRADE 29.07.2018 A portion of the polymorphic virus, generally called a ______, creates a random encryption key to encrypt the remainder of the virus. (a) polymorphic engine (b) multiple engine (c) mutual engine (d) mutation engine UPPSC LT GRADE 29.07.2018 Which of the following makes filtering decisions based on application payload? (a) Packet filter (b) deep inspection firewall (c) reverse proxy (d) stateful packet inspection firewall TRB Poly. Lect. 2017 Network Security and Malicious Attacks 68. 69. 70. 71. 72. 73. 74. 182 Which of the following is not a factor in choosing a firewall? (a) The applications that your network uses (b) Information in your security policy (c) How much traffic will pass through the firewall (d) Security audit measures in place Punjab PSC Network Engineer 21.06.2014 Which of the following types of firewall works in the network layer of the OSI Model? (a) Packet filters (b) Application gateways (c) Circuit level gateways (d) Both application level and circuit level gateways APPSC Lect. Degree College 16.09.2020 Which of the following options correctly enumerates the two subcategories of the standard network layer firewall? (a) Bit-oriented firewall and byte-oriented firewall (b) State full firewall and stateless firewall (c) Frame firewall and packet firewall (d) Static firewall and dynamic firewall APPSC Lect. Degree College 16.09.2020 Which of the following is not correct? (a) Platform security demands data decryption (b) Platform security demands strict password policies (c) Platform security demands fault tolerant external firewalls (d) Platform security demands system trust certificate TNPSC 2016 (Degree) P-II Trojan-Horse programs: (a) Are legitimate programs that allow unauthorized access (b) Are hacker programs that do not show up on the system (c) Are really do not work usually (d) Are usually immediately discovered TNPSC 2016 (Degree) P-II A Trojan horse is a: (a) Special password that is built into the system firmware (b) Computer virus that spreads through email (c) Program that does something beyond its apparent purpose (d) Program that shut down if its initial condition are not met TNPSC 2016 (Degree) P-II Spam is: (a) antivirus (b) unsolicited e-mail (c) Firewall (d) Hardware device YCT 75. Identity theft is the (a) impersonation by a thief of someone with a large bank account (b) impersonation by a thief of someone with 83. computer skills (c) impersonation by a thief of someone with good credit (d) Impersonation by as thief of someone's identity for purpose of economic/social gain Punjab State Civil Supplies Corp. Ltd. 13.11.2011 76. 77. 78. 79. 80. 81. 82. An attempt to slow down or stop a computer system or network by flooding the system with requests for information is called a (a) virus (b) worm (c) denial-of-service attack (d) Trojan horse Punjab State Civil Supplies Corp. Ltd. 13.11.2011 Which of the following would best fit the following description - Software in copied and given to a friend without the permission of the copyright owner? (a) freeware (b) piracy (c) shareware (d) public domain Punjab State Civil Supplies Corp. Ltd. 13.11.2011 The private key in public key encryption is used for (a) encryption (b) hashing (c) decryption (d) encryption and hashing APPSC Lect. Degree College 07.06.2017 (CS) Public key encryption makes use of (a) one key (b) two keys (c) hash function (d) All the given options APPSC Lect. Degree College 07.06.2017 (CS) a firewall is (a) an established network performance reference point (b) software or hardware used to isolate a private network from a public network (c) a virus that infects macros (d) a predefined encryption key used to encrypt and decrypt data transmissions APPSC Lect. Degree College 07.06.2017 (CS) It is a program of hardware device that filters the information coming through an internet connection to a network or computer system. (a) anti virus (b) Cookies (c) Firewall (d) Cyber safety TANGEDCO AE 2018 A small change in either the plaintext or the key producing a significant change in the ciphertext is called: (a) Feistel effect (b) Claude Shannon effect Network Security and Malicious Attacks 84. 85. 86. 87. 183 (c) Bit independence effect (d) Avalanche effect UPSC Poly Lect. 10.03.2019 Using public key cryptography, X adds a digital signatures o to a message M, encrypts Mσ and sends it to Y, where it is decrypted. Which one of the following sequence of keys is use for operations? (a) Encryption: Xs private key followed by Y’s private key. Decryption: X’s public key followed by Y’s public key (b) Encryption: X’s private key followed by Y’s public key; Decryption: X’s public key followed by Y’s private key (c) Encryption: X’s private key followed by Y’s public key; Decryption: Y’s private key followed by X’s public key (d) Encryption: X’s public key followed by Y’s private key, Decryption: Y’s private key ISRO Scientist/Engineer 17.12.2017 Which of the following are used to generate a message digest by the network security protocols? (P) SHA-256 (Q) AES (R) DES (S) MD5 (a) P and S only (b) P and Q only (c) R and S only (d) P and R only ISRO Scientist/Engineer 17.12.2017 Which of the following operations are generally used for transforming plain text to cipher text? (a) substitution (b) transposition (c) substitution and transposition (d) normalisation APPSC Lect. 2017 (Degree College) (CS) A packet filtering firewall can (a) deny certain users from accessing a service (b) block worms and viruses from entering the network (c) disallow some files from being accessed through FTP (d) block some hosts from accessing the network ISRO Scientist/Engineer 2013 Which of the following encryption algorithms is based on the Fiestal structure? (a) Advanced Encryption Standard (b) RSA public key cryptographic algorithm (c) Data Encryption Standard (d) RCA ISRO Scientist/Engineer 2013 YCT 88. 89. 90. 91. 92. 93. 94. IEEE 1394 is related to (a) RS-232 (b) USB (c) Firewire (d) PCI ISRO Scientist/Engineer 2013 With respect to security, SSL stands for: (a) Secure Service Layer (b) Synchronous Socket Layer (c) Secure Socket Layer (d) Synchronous Service Layer APPSC Lect. Degree College 16.09.2020 The art and science of concealing the messages to introduce secrecy in information security is recognized as : (a) Scientometrics (b) Cryptography (c) Biography (d) Information forensics APPSC Lect. Degree College 16.09.2020 The encryption process where same keys are used for encrypting and decrypting the information is known as _____ encryption. (a) Symmetric Key (b) Asymmetric Key (c) Linear (d) Tertiary Key APPSC Lect. Degree College 16.09.2020 Which of the following is NOT an example of symmetric key encryption? (a) Digital encryption standard (DES) (b) Triple-DES (3DES) (c) RSA (d) BLOWFISH APPSC Lect. Degree College 16.09.2020 A process whereby a message is encoded in a format that cannot be read or understood by an eavesdropper is called: (a) Steganography (b) Encryption (c) Decryption (d) Multiplexing APPSC Lect. Degree College 16.09.2020 In which of the following cases, does the attacker try to determine the key by attempting all possible keys? (a) (b) (c) (d) 95. 96. 97. 98. Dictionary attack Man in middle attack Brute force attack Timing attack APPSC Lect. Degree College 16.09.2020 What is one advantage of setting up a DMZ (Demilitarized Zone) with two firewalls? (a) You can control where traffic goes in the three networks (b) You can do stateful packet filtering (c) You can do load balancing (d) Improve network performance ISRO Scientist/Engineer 22.04.2018 Which one of the following algorithm is not used in asymmetric key cryptography? (a) RSA Algorithm (b) Diffie-Hellman Algorithm (c) Electronic Code Book Algorithm (d) None of the above ISRO Scientist/Engineer 22.04.2018 Which of the following is a cybercrime (a) Hacking (b) Worm attack (c) Virus attack (d) All of them RPSC VPITI 2014 (IT) DES and public key algorithm are combined (i) to speed up encrypted message transmission (ii) to ensure higher security by using different key for each transmission (iii) as a combination is always better than individual system (iv) As it is required in e-commerce (a) (i) and (ii) (b) (ii) and (iii) (c) (iii) and (iv) (d) (i) and (iv) RPSC ACF & FRO 23.02.2021 (CS) ANSWER KEY 1. (a) 2. (b) 3. (d) 4. (a) 5. (a) 6. (b) 7. (a) 8. (a) 9. (c) 10. (b) 11. (b) 12. (a) 13. (c) 14. (d) 15. (b) 16. (a) 17. (a) 18. (d) 19. (a) 20. (c) 21. (a) 22. (d) 23. (a) 24. (b) 25. (a) 26. (c) 27. (d) 28. (a) 29. (d) 30. (c) 31. (b) 32. (c) 33. (b) 34. (b) 35. (b) 36. (b) 37. (a) 38. (c) 39. (c) 40. (a) 41. (d) 42. (a) 43. (d) 44. (a) 45. (a) 46. (a) 47. (c) 48. (d) 49. (d) 50. (d) 51. (d) 52 (b) 53. (d) 54. (a) 55. (c) 56. (b) 57. (d) 58. (a) 59. (b) 60. (d) 61. (c) 62. (d) 63. (a) 64. (a) 65. (b) 66. (d) 67. (b) 68. (b) 69. (a) 70. (b) 71. (c) 72. (a) 73. (b) 74. (b) 75. (d) 76. (c) 77. (b) 78. (b) 79. (b) 80. (b) 81. (c) 82. (d) 83. (c) 84. (a) 85. (c) 86. (d) 87. (c) 88. (c) 89. (c) 90. (b) 91. (a) 92. (c) 93. (b) 94. (c) 95. (c) 96. (c) 97. (d) 98. (a) Network Security and Malicious Attacks 184 YCT 08. DATABASE MANAGEMENT SYSTEM An Overview of the Database Management A database is a collection of related data organised in a way that data can be easily accessed, managed and updated. Any piece of information can be a data. For example- Name of our college, institutions etc or in other words, database is a place where related piece of information is stored and various operations are performed on it. Database– • The database is a collection of interrelated data which is used to retrive, insert and delete the data more efficiently. • It is used to organize the data in the form of a table, schema, views and reports etc. For example– The college database organizes the data about the admin, staff, students and faculty etc. History of DBMS– • Database management system is software that is used to manage the database. • DBMS also provides protection and securing to database and maintains data consistency in case of multiple users. Examples of DBMS are SQL server, MySQL, Oracle, Sybase, Microsoft Access and IBM DB2 etc. • The first general purpose DBMS was developed by Charles Bachman in early 1960's. Edgar Codd proposed a new data representation technique known as relational model. • DBMS allows users the following tasks– Data Definition– Used for creation, modification and removal of definition. Data Updating– Used for insertion, modification and deletion of actual data. Data Retrieval– Used to retrieve the data from the database. User Administration– Used for registering and monitoring users, maintain data integrity, enforcing data security, performance monitoring, concurrency control and recovering information corrupted by unexpected failure. Components of Database System It can be divided into four components– Database Management System User– DB administrator, System developer & End users. Database Application– Database application such as Personal, Departmental, Enterprise and Internal. DBMS– Software such as MySQL, Oracle etc. Database– Collection of logical data. Characteristics of DBMS– • Uses a digital repository established on a server to store and manage the information. • Provides a clear and logical view of the process • It contains automatic backup and recovery procedures. • Reduce the complex relationship between data. • Help in support manipulation and processing of data. Advantages of DBMS– • Controlling data redundancy • Elimination of inconsistency • Better services to the users • Better flexibility • Integrity is improved • Standards can be enforced • Security can be improved • Easy to retrieval of data • Reduce development time and maintenance need • Segregation of application program Disadvantages of DBMS • Data redundancy and inconsistency • Difficulty in accessing data • Data Isolation • Concurrent data anomalies • Security problems • Integrity problems • Automicity problems • Complexity & costly • Large in size DBMS systems can be used extensively in the following fields– Transportation, Banking, Sales, Manufacturing, Education, Human resources etc. Architecture of DBMS Database architecture can be seen as a single tier or multi-tier. But logically, it is of two types, 2 tier architecture and 3-tier architecture– 185 YCT Tier Architecture– Here, the database is directly available to the user and any changes brought will directly affect the database itself. Generally it is used for development of logical application. 2. Tier Architecture– It is same as basic client-server and applications on the client end can directly communicate with the database at the server side. And API's, such a as ODBC, JDBC are used for this interaction. • User interfaces and application programs are run on the client side and server-side is responsible for providing functions such as query processing and transaction management. • And to communicate with the dbms, client side application builds a connection with the server side. 1. • RDBMS is a special system software that is used to manage the organization, storage, access, security and integrity of data. • It is a set of applications and features that allow. IT professionals and others to develop, edit, administer and interact with relational database. • The term "relational database" was invented by E.F. Codd at IBM in 1970. He introduced the term in his seminal paper "A Relational Model of Data for Large Shared Data Banks". • A relational DBMS stores information in a set of 'tables' and each of which has a unique identifier or 'primary key'. • RDBMS is the organization of data stored in rows & columns. Tuples are the rows of the records in the given table and attributes are the columns headers of the table. Table– In RDBMS, a table is a collection of data elements which is organised in terms of rows and columns. It is also said to be a convenient representation of relations. Field– A table consists of many records (row) and each record can be broken into several small-small entities which is known as fields. In the below given table Roll No., Name, Age, Gender represent Fields. 3-Tier Architecture– • It contains another layer between the client and server and her client can't directly interact with the server. • The application on the client-end communicates with an application server which further communicates with the database system. This is generally used in case of large web application. • The full form of DBA is database administrator who designs, implements, administers and monitors data management systems and also ensures design, consistency, quality and security. Record (Tuple)– A single entry in a table is called a record or row. It represents set of related data in a table. It is also called as tuple. For example 1 Suraj 21 Male Column– A column is a vertical entity in a table that contains all information associated with a specific field in a particular table. For example– Relational Database Name Management System (RDBMS) Suraj • A relational database management system (RDBMS) Rani is a database management system (dbms) that is based Tapasya on the relational model which was introduced by E.F. Ravi Codd of IBM's san Jose Research laboratory. Database Management System 186 YCT Null Value– A null value is the term used to represent a missing value and in a table it appears to be blank. SQL Constraints– Constraints are basically used to specify rules for the data in a table. It limits the type of data in a table and ensures the accuracy and reliability of data in a table. • If there occurs any violation between constraints and data action, then the action get aborted. There are some integrity constraints which is commonly used in SQL (Structured query language). Not Null– It ensures column not be Null value. Unique– It ensures all the values to be different in a column. Primary Key– Primary key is a combination of a NOT NULL and UNIQUE. It identifies each row in a table. Foreign Key– It prevents action that ends links between the tables. Check– It ensures that the values in a column satisfies a specific condition. Default– This sets a default value for a column if no value is specified. Create Index– It is used to create and retrieve data from the database. Data Integrity– 'Data Integrity' refers to the accuracy and consistency of data stored in a database or rbdms. Following categories of data integrity are there in each RDBMS. Entity Integrity– There must not be duplicate rows in a table. Domain Integrity– It enforces valid entries for a given column by restricting the type, format or the range of values. Referential Integrity– It ensures that the rows not to be deleted which are used by other records. User-Defined Integrity– It enforces some specific business rules that do not fall into entity, domain or referential integrity. Database Normalization– It is a database schema design technique by which an existing schema is modified to minimize redundancy and dependency of data. • In database normalization the word normalization and normal form refers to the structure of a database and normalization increases clarity in organizing data in database. • Database normalization was developed by IBM researcher E. F. Codd in the 1970s. • Database normalization is obtained by following a set of rules called 'forms' in creating the database. ER Diagram– ER is a graphical representation of the logical structure of the database. In this model realworld problems are represented in a pictorial form to make understand the stakeholders. Database Management System There are some components of an E-R diagram. Entities– It is a real-world things which can be a person place or a concept etc. It is shown by a rectangle. Each entity has one of its attributes as a primary key which can define it uniquely and such an entity is known as strong entity. And entities which cannot be defined uniquely is known as weak entity. For examples– In school management system there can be Teachers, students, courses building, department which are entities. Strong Entity type is represented by rectangle symbol while weak entity is represented by double rectangle. Student Note– Entities along with attributes are called entity type or schema. Attributes– Properties of an entity or relationship type is called as attribute. It is represented by an oval. For example– The entity car may have some properties such as car-no, price, color etc. (i) Simple Attributes– It is divided into two parts. An attributes composed of simple component with an independent existence. For example– Designation of an staff & salary. Composite Attributes– It is divided into many parts. An attribute composed of multiple component and each component has its own independent existence. For example– Name of a student can be divided further into First_name, Middle_name and Last_name (ii) Single Valued– It is an attribute that holds a single value for each occurrence of entity type. Example– Each branch has single valued attributes is known as branch_no 187 Multi Valued Attributes– It is an attributes that holds multiple values for each occurrence of an entity type. For example– Each staff members has multiple mobile numbers YCT Database Design . In dbms, the database design is a collection of processes that facilitate the designing, development, implementation and maintenance of data. • It helps in maintaining and improving data consistency. • The main objective of database design in DBMS are to produce logical and physical designs models of the proposed database system. Database Development Life Cycle– • (iii) Derived Attributes– The value of this attribute are derived from some other attributes. This is done mainly because the value for such attribute keeps on changing and it is shown by dashed oval. Example– The value of age attribute is derived from the DOB (date of birth) Age • Relationships– It is a set of meaningful relationship among several entities. To indicate the diamond symbol for relationships • among the several entities it is read from left to right. For example- Branch has a staff • There are three types of relationships that exit between two entities. One to One Relationship– In this relationship each record of one table is related to only one record of the other table. For example– If there are two entities 'person' and 'passport' therefore, each person can have only one passport and each passport belongs to only one person. One to Many Relationship– The following example showcases this relationship that It has number of development life cycle which are followed during the development of database system. It is not essential to follow the cycle in order and is very simple. It does not require many steps. Requirement Analysis • Planning– Concerned with planning of entire database life cycle. • System Definition– Defines the scope and boundaries of the proposed database system. Database Designing Logical Model– Concerned with developing a database model as per requirement and the entire design is done on paper rather physical implementation. Implementation • Data Conversion and Loading– Concerned with importing and converting data from old system into the new database. • Testing– It checks the database against the requirement specifications and identify errors in newly implemented system. Manipulating Data . 1 student can opt for many courses but a course can • only have 1 student, this is how it is. Many to One Relationship– When more than one instances of an entity is associated with a single instance of another entity then it is called many to • one relationship. For example- Many students can study in a single college but a student cannot study in many colleges at the same time. • Manipulation of data is the modification of information to make it easer to read and more structured. DML (Data Manipulation Language) is used to manipulate data and it is a programming language which helps in modifying data such as adding, removing and altering databases. Data manipulation is a key feature for business operations and optimization. Steps involved in Data Manipulation Many to Many Relationship– Followings are the steps in the data manipulation– 1. There must be some possible data to create a database which is generated from the data sources. The above diagram represents that one student can 2. Knowledge of restructuring and reorganization is required which is done with the manipulation of enroll for more than one courses and a course can data. have more than 1 students enrolled in it. Database Management System 188 YCT 3. In this step then we need to import a database and create it to start working with data. 4. Then we can edit, delete, merge or combine our information with the help of data manipulation. 5. And at the end, analysis of data becomes easy at the time of manipulating data. Why to use data manipulation? • To improve the growth of any business and organization. • Helps in organising raw data in a structured way which boosts productivity, trend analysis, cutting cost and analyzing customer behaviour etc. • DML-Data Manipulation Language in SQL With the help of DML command we can easily access, store, modify, update and delete the existing records from the database. Followings are the DML commands in SQL (i) SELECT Command– This command shows the records of the specified table and it also shows the particular record of a particular column by using the clause WHERE. Syntax– To retrieve the data from all the columns of the table, following SELECT commands is usedSELECT * FROM table_Name; INSERT Command– It allows users to insert data in database tables. Syntax– INSERT INTO table_name (Col_name1, Col_name2, .....Col_NameN) VALUES(Val_1, Val_2, Val_3 ...... Val_N) UPDATE Command– It allows users to update or modify the existing data in database tables. Syntax– UPDATE table_name SET [Col_name1 = Value_1 .... Col_name N = Value_N] WHERE CONDITION; DELETE Command– It allows user to remove single or multiple existing records from the database tables. Syntax– DELETE FROM table_Name WHERE conditions • NoSql database . NoSQL Database is nothing but mongoDB. It is used to refer to a non-SQL or non relational database.Database doesn't use tables for storing data. It is generally used to store big data and realtime web applications. Followings are the advantages of NoSQL database• supports query language. • provides fast performance. • provides horizontal scalability • flexible schemas Database Management System • ease of use for developers • lightning fast queries Types of NoSQL Databases Document Databases: it stores data in documents similar to JSON (JavaScript Object Notation) objects. Each document contains pairs of fields and values. The values can typically be a variety of types including things like strings, numbers, booleans, arrays, or objects. Graph Databases: it stores data in nodes and edges. Nodes typically store information about people, places, and things, while edges store information about the relationships between the nodes. Wide-column: it stores data in tables, rows, and dynamic columns. Key-value Databases: These are a simpler type of database where each item contains keys and values. Various Factors to Use NoSQL:● Fast-paced agile development ● Storage of structured and semi-structured data ● Huge volumes of data ● Requirements for scale-out architecture ● Modern application paradigms like microservices and real-time streaming Datatypes in MongoDB String- It is used to store data and it must be UTF 8 valid in mongodb. Integer- it stores numeric value and It can be 32 bit or 64 bit depending on the server. Double- it stores floating point values. Arrays- it is used to store a list or multiple values into a single key. Object- it is used to store a list or multiple values into a single key. Null- It is used to store null values. Date-It stores the current date or time in unix time format. MongoDB Compass• It is based on GUI therefore ,it is also called as mongoDB GUI. • It allows users to analyze the content of their stored data without any prior knowledge of MongoDB query syntax. It is an open source. Components of the BI System MongoDB Database: it is used to store data. BI Connector: It translates the SQLqueries and provides a relational schema between BI tool and MongoDB. ODBC Data Source Name (DSN): It holds the connection and authorization configuration data. BI Tool: This tool is used for visualization and analysis of data. Java MongoDB ConnectivityIt includes the following steps to connect with the mongoDB database. 1. Create a Maven Project 189 YCT 2. Add dependency to POM file 3. Create Java File 4. Build Dependency to load JAR 5. Enter into Mongo Shell Php MongoDB Connectivity• Php provides a mongodb driver to connect with the mongoDB database. • It performs database operations by using PHP. It includes the following steps to connect with the mongoDB database. 1. Installing Driver 2. Edit php.ini File 3. Install mongo-php library 4. Create Php Script 5. Execute Php Script 6. Enter into Mongo Shell Python MongoDB Connectivity pymongo driver is installed to create connection between Python programming language and MongoDB database. It includes the following steps: 1. Install Driver 2. Create Python File 3. Execute Python Script 4. Enter into Mongo Shell 5. Check Databases 6. Check Collection 7. Access records MongoDB Query and Projection Operator It includes comparison, logical, element, evaluation, larray, bitwise, and comment operators. MongoDB Comparison Operators $eq- refers to equality condition Syntax- { <field> : { $eq: <value> } } $gt- it selects a document where the value of the field is greater than the specified value. Syntax- { field: { $gt: value } } $gte- It selects the documents where the field value is greater than or equal to a specified value. Syntax{ field: { $gte: value } } $in- Choose the documents where the value of a field equals any value in the specified array. Syntax{ filed: { $in: [ <value1>, <value2>, ……] } } $lt- The $lt operator opt for the documents where the value of the field is less than the specified value. Syntax{ field: { $lt: value } } $lte- It chooses the documents where the field value is less than or equal to a specified value. Syntax{ field: { $lte: value } } Database Management System MongoDB Logical Operator $and- It works as a logical AND operation on an array. The array should be of one or more expressions and chooses the documents that satisfy all the expressions in the array. Syntax{ $and: [ { <exp1> }, { <exp2> }, ....]} $not- The $not operator works as a logical NOT on the specified expression and chooses the documents that are not related to the expression. Syntax{ field: { $not: { <operator-expression> } } } $or- It works as a logical OR operation on an array of two or more expressions and chooses documents that meet the expectation at least one of the expressions. Syntax{ $or: [ { <exp_1> }, { <exp_2> }, ... , { <exp_n> } ] } $type- The type operator chooses documents where the value of the field is an instance of the specified BSON type. Syntax{ field: { $type: <BSON type> } } $jsonSchema- It matches the documents that satisfy the specified JSON Schema. Syntax{ $jsonSchema: <JSON schema object> } limit() Method in mongoDB– limit() method is used to limit the fields of document. Syntaxdb.COLLECTION_NAME.find().limit(NUMBER) skip() method in mongoDB– It is used to skip the documents and . It is used with find() and limit() methods. Syntaxdb.COLLECTION_NAME.find().limit(NUMBER).skip( NUMBER) sort() method– sort() method is used to sort the documents in the collection. Syntaxdb.COLLECTION_NAME.find().sort({KEY:1}) MongoDB Create Database– mongoDB doesn't have a create database command.In SQL we used to create a table and insert value manually but in mongoDB it creates automatically. Drop Database– This command is used to drop a database. It also deletes the associated data files and it operates on the current database. Syntax– db.dropDatabase() 7.0 SQL • SQL is a short-form of the structured query language. • SQL is a standard language for storing, manipulating and retrieving data in databases. 190 YCT History of SQL:• A Relational Model of Data for Large Shared Data Banks" was a paper which was published by the great computer scientist "E.F. Codd" in 1970. • The IBM researchers Raymond Boyce and Donald Chamberlin developed the SEQUEL (Structured English Query Language) after learning from the paper given by E.F. Codd. They both developed the SQL at the San Jose Research laboratory of IBM Corporation in 1970. • SQL became a standard of the American National Standards Institute (ANSI) in 1986, and of the International Organization for Standardization (ISO) in 1987 SQL SELECT Statement– It is used to select data from a database. SyntaxSELECT col1, col2, ... FROM table_name; SELECT DISTINCT statement- It is used to return only distinct values. Inside a table, a column often contains many duplicate values; and sometimes we only want to list the distinct values. SyntaxSELECT DISTINCT col1, col2, ... FROM table_name; WHERE Clause• It is used to filter records and It is used to extract only those records that fulfill a specified condition. • The WHERE clause is not only used in SELECT statements, it is also used in UPDATE, DELETE, etc SyntaxSELECT col1, col2,... FROM table_name WHERE condition; SELECT UNIQUE• There is no difference between DISTINCT and UNIQUE. • SELECT UNIQUE statement is used to retrieve a unique or distinct element from the table. SyntaxSELECT UNIQUE column_name FROM table_name; SELECT SUM- t is also known as SQL SUM() function. And It is used in a SQL query to return the summed value of an expression. SyntaxSELECT SUM (exp) FROM tables WHERE conditions; NULL Value- A field with a NULL value is a field with no value. And It is not possible to test for NULL values with comparison operators, such as =, <, or <>. Therefore,we will have to use the IS NULL and IS NOT NULL operators instead. Database Management System SyntaxIS NULL SELECT column_names FROM table_name WHERE column_name IS NULL; SyntaxIS NOT NULL SELECT col_names FROM table_name WHERE col_name IS NOT NULL; AND, OR and NOT Operators– • The WHERE clause can be combined with AND, OR, and NOT operators while the AND and OR operators are used to filter records based on more than one condition. • The AND operator shows a record if all the conditions separated by AND are TRUE. • The OR operator shows a record if any of the conditions separated by OR is TRUE. • The NOT operator shows a record if the condition(s) is NOT TRUE. SyntaxAND SELECT col1, col2, ... FROM table_name WHERE condition1 AND condition2 AND condition3 …; SyntaxOR SELECT col1, col2, ... FROM table_name WHERE condition1 OR condition2 OR condition3 ...; Syntax- NOT SELECT column1, column2, ... FROM table_name WHERE NOT condition; ORDER BY Keyword • It is used to sort the result-set in ascending or descending order. • It sorts the records in ascending order by default. To sort the records in descending order, use the DESC keyword. SyntaxORDER BY SELECT col1, col2, ... FROM table_name ORDER BY column1, column2, ... ASC|DESC; INSERT INTO Statement- It is used to insert new records in a table. SyntaxINSERT INTO table_name (col1, col2, col3, ...) VALUES (val1, val2, val3, ...); 191 YCT UPDATE Statement• The UPDATE statement is used to modify the existing records in a table. • The WHERE clause specifies which record(s) that should be updated. If we omit the WHERE clause, all records in the table will be updated. SyntaxUPDATE table_name SET col1 = val1, col2 = val2, ... WHERE condition; DELETE Statement– • The DELETE statement is used to delete existing records in a table. • The WHERE clause specifies which record(s) should be deleted. If we omit the WHERE clause, all records in the table will be deleted. SyntaxDELETE FROM table_name WHERE condition; MIN() function–It returns the smallest value of the selected column. SyntaxSELECT MIN(col_name) FROM table_name WHERE condition; MAX() Function–It returns the largest value of the selected column. SyntaxSELECT MAX(col_name) FROM table_name WHERE condition; LIKE Operator– The LIKE operator is used in a WHERE clause to search for a specified pattern in a column. SyntaxSELECT col1, col2, ... FROM table_name WHERE columnN LIKE pattern; COUNT() Function– It returns the number of rows that matches a specified criterion. SyntaxSELECT COUNT(col_name) FROM table_name WHERE condition; AVG() Function– The AVG() function returns the average value of a numeric column. SyntaxSELECT AVG(col_name) FROM table_name WHERE condition; JOIN- It is clause that is used to combine rows ofrom two or more tables, based on a related column between them. There are different types of the JOINs in SQL:Database Management System • INNER JOIN: it returns records that have matching values in both tables • LEFT OUTER JOIN: it returns all records from the left table, and the matched records from the right table • RIGHT OUTER JOIN: it returns all records from the right table, and the matched records from the left table • FULL OUTER JOIN: it returns all records when there is a match in either left or right table Cartesian Join or Cross Join– If cross join is used to combine two different tables, then we will get the Cartesian product of the sets of rows from the joined table and when each row of the first table is combined with each row from the second table, then it is known as Cartesian join or cross join. Self Join– It is a regular join, but the table is joined with itself. SyntaxSELECT col_name(s) FROM table1 T1, table1 T2 WHERE condition; EQUI JOIN– • EQUI JOIN performs a JOIN against equality or matching column(s) values of the associated tables. An equal sign (=) is used as comparison operator in the where clause to refer equality. • We can also perform EQUI JOIN by using JOIN keyword followed by ON keyword and then specifying names of the columns along with their associated tables to check equality. SyntaxSELECT col_list FROM t1, t2.... WHERE t1.col_name = t2.col_name; Or SELECT * FROM table1 JOIN table2 [ON (join_condition)] Natural Join– NATURAL JOIN is a type of EQUI JOIN and is structured in such a way that, columns with the same name of associated tables will appear once only. SyntaxSELECT * FROM table1 NATURAL JOIN table2; CREATE DATABASE Statement– It is statement used to create a new SQL database. SyntaxCREATE DATABASE database_name; 192 YCT DROP DATABASE- It is statement used to drop an existing SQL database. SyntaxDROP DATABASE database_name; BACKUP– It is used in SQL Server to create a full back up of an existing SQL database. SyntaxBACKUP DATABASE database_name TO DISK = 'filepath'; CREATE TABLE Statement– The CREATE TABLE statement is used to create a new table in a database. SyntaxCREATE TABLE table_name ( col1 datatype, col2 datatype, col3 datatype, .... ); DROP TABLE- It is used to drop an existing table in a database. SyntaxDROP TABLE table_name; ALTER TABLE Statement– • It is used to add, delete, or modify columns in an existing table. • It is also used to add and drop various constraints on an existing table. SyntaxALTER TABLE table_name ADD col_name datatype; ALTER TABLE-DROP COLUMN– It is used to delete a column in a table. SyntaxALTER TABLE table_name DROP COLUMN col_name; ALTERTABLE-ALTER/MODIFY COLUMN– It is used to change the data type of a column in a table. SyntaxALTER TABLE table_name ALTER COLUMN col_name datatype; Constraints– It is specified when the table is created with the CREATE TABLE statement, or after the table is created with the ALTER TABLE statement. SyntaxCREATE TABLE table_name ( col1 datatype constraint, col2 datatype constraint, col3 datatype constraint, .... ); NOT NULL Constraint– The NOT NULL constraint enforces a column to NOT accept NULL values.By default, a column can hold NULL values. Database Management System PRIMARY KEY– The PRIMARY KEY constraint uniquely identifies each record in a table. Primary keys must contain UNIQUE values, and cannot contain NULL values. A table can have only ONE primary key; and in the table, this primary key can consist of single or multiple columns (fields). FOREIGN KEY Constraint– • The FOREIGN KEY constraint is used to prevent actions that would destroy links between tables. • A FOREIGN KEY is a field in one table, that refers to the PRIMARY KEY in another table. • The table with the foreign key is called the child table, and the table with the primary key is called the referenced or parent table. CREATE INDEX Statement– It is used to create indexes in tables. Indexes are used to retrieve data from the database more quickly than otherwise. SyntaxCREATE INDEX index_name ON table_name (col1, col2, ...); Dense Index– The dense index contains an index record for every search key value in the data file. It makes searching faster.In a dense index, the number of records in the index table is same as the number of records in the main table. It requires more space to store index record itself. The index records have the search key and a pointer to the actual record on the disk. CREATE VIEW Statement– A view is a virtual table based on the result-set of an SQL statement. It contains rows and columns, just like a real table. The fields in a view are fields from one or more real tables in the database. SyntaxCREATE VIEW view_name AS SELECT col1, col2, ... FROM table_name WHERE condition; Updating a View– A view can be updated with the CREATE OR REPLACE VIEW statement. SyntaxCREATE OR REPLACE VIEW view_name AS SELECT col1, col2, ... FROM table_name WHERE condition; Dropping a View– A view can be deleted with the DROP VIEW statement. SyntaxDROP VIEW view_name; Facts Table– The fact table is a primary table in the dimensional model. It also contains measurement, metric and quantitative information. Transaction Fact Table– The transaction fact table is a basic approach to operate the businesses. These fact tables represent an event that occurs at the primary point. A line exists in the fact table for the customer or product when the transaction takes place. Fact tables are completely normalized. 193 YCT Triggers in SQL– A trigger is a set of SQL statements that reside in system memory with unique names. It is a specialized category of stored procedure that is called automatically when a database server event occurs. Each trigger is always associated with a table. SyntaxCREATE TRIGGER schema.trigger_name ON table_name AFTER {INSERT, UPDATE, DELETE} [NOT FOR REPLICATION] AS {Statements} Benefits of Triggers– Generating some derived column values automatically • Enforcing referential integrity • Synchronous replication of tables • Imposing security authorizations • Preventing invalid transactions TRUNCATE– It removes all the values from the table permanently. This command cannot delete the particular record because it is not used with the WHERE clause. SyntaxTRUNCATE TABLE Table_Name; EXCEPT– The EXCEPT clause in SQL is widely used to filter records from more than one table. it retrieves all rows from the first SELECT query while deleting redundant rows from the second. SyntaxSELECT col_lists from table_name1 EXCEPT SELECT col_lists from table_name2; of a diagram which is known as entity relationship diagram. • An E-R model is a design or blue print of a database that can later be implemented as a database. • A data model is a collection of conceptual tools for describing data, data relationship, data semantics and consistency constraints. • Data flow is described by means of DFDs as studied earlier and represented in algebraic form. • The difference (–) operation removes common tuples from the first relation that is known as commutative and associative operation. • Relational algebra is a procedural language which takes instances of relations as input and yields instances of relations as output. • A recursive relationship is a relationship between an entity and itself. • Cardinality in an ER diagram is a relationship between two entity sets. • In a dataflow diagram, a circle/bubble represents process. • Key constraints states that the value of foreign key must be unique for each records. • In dbms, there are three levels of abstractions logical physical and view level. • Related fields in a database are grouped to form a data record. • If attribute of relation schema R is member of some candidate key then this type of attributes are classified • LIKE operator is used to perform the pattern as prime attribute. matching. • 'AS' clause is used in SQL for rename operation. Important Facts . • In RDBMS, different classes of relationship are • A table joined with itself is called as self join. created using normal forms technique to prevent • In functional dependency between two sets of modification anomalies and 3NF normal from is attributes A and B then set of attributes A of database considered enough for database design. is classified as left hand side. • Second Normal form (2NF) disallows partial • If there is more than one key for relation schema in functional dependency. dbms then each key in relation schema classified as • Fifth normal form (5 NF) is also called as project join candidate key. The primary key is selected from the normal form. candidate key. • If a relation is in 2NF and 3NF forms, then prime • Normalization form which is based on transitive attribute is functionally independent of all non-prime dependency is classified as third normal form. The attributes. process of analyzing relation schemas to achieve • In a relational database table a row is called as tuple. minimal redundancy and insertion or update • Tables, records and complex logical relationships are anomalies is classified as normalization of data. SQL characteristic of relational DBMS. is developed to support relational database and it • E-R model is not record based data model and it provides controlling access to database, facility for describes the structure of a database with the help of integrity constraints and query on database files. Database Management System 194 YCT • Transaction in a database should be atomic, durable and consistent. from the operational environment to the data warehouse. • The full form of DDL in SQL is data definition • In second normal form partial dependency get removed. language. DML commands of SQL allows deletion of tuples from tables. Create table, Alter and Drop are a • Centralized database is best for security and DDL command of SQL. management. • Natural join operator of relational algebra joins two • A virtual relation composed of columns form one or tables at a time. more related relations is called a view. A view of a • The goal of normalization is to eliminate insertion anomaly deletion anomaly and update anomaly. database that appears to an application program is known as subschema. • In ACID properties of transaction 'A' stands for • Armstrong's inference rule does not determine mutual atomicity, 'C' stands for consistency, 'I' stands for dependency. isolation and 'D' stands for durability. These are the • Project operation is used to extract specified columns four properties in ACID that maintain the integrity of from a table. data. • In case the indices values are larger, index is created • ER diagram can be transformed to tables. for these values of the index and this is called • A database file must ensure data consistency and data multilevel index. integrity both. • Designers use de-normalization to tune the • If a relation contains atomic values of the attributes, performance of systems to support time-critical then the relation. operations. • A relational database is a set of tuples and a database • Domain constraints, functional dependency and always requires secondary storage device. referential integrity are special forms of assertion. • A weak entity set is a entity set whose existence • Mapping ordinations. depends on another strong entity set. • Domain constraints, functional dependency and • Under keyword is used in SQL to achieve inheritance. referential integrity are special forms of assertion. • A functional dependency is a relationship between • Mapping cardinality express the number of entities to attributes. which another entity can be associated via a • Outer join operator is used to retain the unmatched relationship set. rows of relations when they joined. • Data model view of reports editor depicts the • Entity types that do have key attributes of their own structural representation of the data used in report are called weak entity types. definition. • Address is an example of a composite attribute. • Query acts as a data source for the reports definition. • Logical design describes an abstract or conceptual • Entity integrity constraint states that no primary key design of the database. value can be null. • ADO is a simple object model that is easier to • A super key for an entity consist of one or more understand and use than OLE DB and is frequently attributes. used for database applications. • Data dictionary contains name, width and data type • A primary key for an entity is a unique attributes. • Horizontal fragmentation is based on SELECT operation in relational algebra. • For a relation the number of tuples is called • Min-Max normalization is a data transformation cardinality. technique. • SQL provides special aggregate functions such as • A relation in a relational database can have only one count() min() and sum() etc. primary key. • The content of the data dictionary is metadata and it etc. contains at least the structure of the data, the • BIRCH is balanced item set reducing and clustering using hierarchies. algorithms used for summarization and the mapping Database Management System 195 YCT • The phenomenon in which a single transaction failure • leads to a series of transaction rollbacks is called cascading rollback. • • The database must not contain any unmatched foreign key values and this property is called as referential • integrity. The load and index is a process to load the data in the data warehouse and to create the necessary indexes. Alter table is used to include integrity constraints in an existing relation. OLAP stands for online analytical processing. The data is stored, retrieved and updated in OLTP (online transactional processing). • User's view in a database is also called as external view. • Visualisation is the technique used for discovering • Update, insertion and deletion are database anomaly. patterns in database at the beginning of data mining processes. • Secondary index is also known as dense index. • Double lines, double rectangles and dashed ellipses • SELECT is not a DDL statement. Weak entities are double rectangles which is a correct notation in ER are valid component of a E-R diagram. diagram. • Set difference, rename and cartesian product are • Domain is the RDBMS terminology for a set of legal values that an attribute can have. • Referential integrity constraint can be enforced by designing foreign key with respect to primary key of • An entity s a distinct real world item in an application. fundamental operation in the relational algebra. • The change made by one transaction are not visible to others till the commit point, this property is called • A database can be inconsistent due to redundancy. isolation. • Conceptual design of the database is done with the • NULL, Check and unique is an integrity constraints. help of data models. another table. • Primary means of searching the records from database • Database schema, which is the logical design of the database and the database instance which is a snapshot is called as primary key. Subschema can be created of the data in the database at a given instant in time. using create view. • Management of metadata information is done by • SQL is a non-procedural query language. And in logical file system and a locked file can be accessed dbms, data about data is stored in data dictionary. by only one user. • A culstering index is defined on the fields which are • Data mining refers to analyzing large databases to find useful patterns. • Trigger is statement that is executed automatically by the system as a side effect of a modification to the • Conn's rule of high-level update rule states that the RDBMS support insertion, updation and deletion at a database. table level. • 'Second normal form' is based on the concept of 'Full • Minimal super key is candidate key. functional dependency'. of type non-key and ordering. • The purpose of 'foreign key' in a table is to ensure null • Authorization is the process by which the user's privileges are ascertained in database. and domain integrity. • If several concurrent transactions are executed over • The values of the attribute should be present in the domain and a domain is a set of values permitted. the same data set and the second transaction updates the database before the first transaction is finished, the • Table in second normal form (2NF) eliminates all hidden dependency domain constraints, functional isolation property is violated and the database is no dependency and referential integrity are special terms longer consistent. of assertion. • Referential integrity constraints is a special type of integrity constraint that relates two relations & • Selection operations are commutative and natural join operations are associative. maintains consistency across the relations. • The DROP TABLE statement deletes the table • Distinct is the keyword used to eliminate duplicate rows from the query result. structure along with the table data. • Business metadata contains information that gives • The overall logical structure of a database can be expressed graphically by entity relationship model. users an easy to understand perspective of the information stored in the data warehouse. Database Management System • The relation schema describes set of field. 196 YCT Important Questions Asked in Previous Years Examinations 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. What is DBMS? (a) any organised piece of information (b) database (c) meta data (d) non-organised data. DBMS is a type of(a) program (b) software (c) spyware (d) malware Which is not a fundamental operation in the relational algebra ? (a) natural join (b) cartesian product (c) set difference (d) rename RPSC VPITI 2018 (CS) Which of the following is not an example of DBMS? (a) SQL server (b) MySQL (c) Microsoft outlook (d) Microsoft Access UPPCL ARO Official paper I 18/02/2018 Shift-I What type of database can not be stored in a database software? (a) Any form of image, text, audio or video files (b) Any inaccessible data (c) Any organised and updated data (d) Any releted piece of information. In which of the following forms data can be stored in the database management system? (a) Image (b) Graph (c) Audio (d) Table A data can be stored in the format of(a) Table (b) Schema (c) Views and reports (d) All of the above Which one of the following is a disadvantage of database management system? (a) Data redundancy (b) Elimination of inconsistency (c) Flexibility (d) Security improvement Which of the following is an advantage of database management system? (a) Reduce development time (b) Complexity (c) Costly (d) large is size What does the mean of user administration in dbms? (a) Registering users (b) Performance monitoring (c) Maintaining data integrity (d) All of the above Database Management System 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 197 Who developed the first general purpose DBMS? (a) Charles Bachman (b) Edgar codd (c) Francis Bacon (d) William Drebbel Duplication of data is known as(a) Redundancy (b) Consistency (c) Data security (d) Data integrity Which of the following is true about database being an organised collection of? (a) Data (b) Attributes (c) Records (d) Views Which of the following is correct full form of RDBMS? (a) Relational database management system (b) Relative database management system (c) Rotational database manageable service (d) Regional database management system The term "relational database" was invented by. (a) E.F. Codd (b) Charles Bachman (c) Steve Woznaik (d) Ronald Wayne A relational DBMS stores information in a set of(a) Table (b) Key (c) Row (d) Horizontal Which of the following is used to refer for a 'row'? (a) Attribute (b) Tuple (c) Field (d) Column What does attribute mean in a particular table? (a) Record (b) Column (c) Key (d) Tuple An absent value in a particular field represents(a) Empty value (b) Absent value (c) Null value (d) New value Which of the following is not an integrity constraint? (a) PRIMARY KEY (b) FOREIGN KEY (c) CHECK (d) NULL Which one of the following does prevent action that ends links between the tables? (a) foreign Key (b) primary Key (c) check constraint (d) default 'Data integrity' refers to (a) accuracy and consistency (b) prevents users from the changing the data (c) ensures duplicate records (d) allow access to data YCT 23. 24. 25. 26. 27. 28. 29. 30. 31. 32. 33. 34. Primary Key is a combination of(a) NOT NULL & UNIQUE (b) FOREIGN KEY & CHECK (c) DEFAULT & CREATE (d) UNIQUE Which of the following does ensure all the values to be different in a column? (a) PRIMARY KEY (b) CHECK (c) NOT NULL (d) UNIQUE What is the function of constraints? (a) Ensuring accuracy and reliability (b) Ensuring deletion of data (c) Ensuring creation of data (d) None of the able A single entry in a table is called(a) column (b) null value (c) attributes (d) row or record Database normalization was developed by(a) Charles Bachman (b) Franeic Bacon (c) E.F. codd (d) William Drebbel Which of the following does enforce valid entries for a given column? (a) Entity integrity (b) user-defined integrity (c) Domain integrity (d) Referential integrity A constraints which ensures, a value in a column to be satisfied a specific conditions(a) DEAAULT (b) PRIMARY KEY (c) FOREIGN KEY (d) CHECK How many types of database architecture are, there logically? (a) 3 (b) 2 (c) 4 (d) 5 Which of the following enforces valid entry for a given column by restricting the type, format or the range of values. (a) Referential integrity (b) Data integrity (c) Domain integrity (d) Entity integrity Which is not a valid join in SQL ? (a) left outer join (b) partial outer join (c) full outer join (d) natural full outer join RPSC VPITI 2018 (CS) An attributes composed of simple components with an independent existence is called(a) Composite attributes (b) Simple attributes (c) Derived attributes (d) Single attributes In which relationship each record of one table is related to only one record of the other table? (a) One to many (b) One to one (c) Many to one (d) Many to many Database Management System 35. 36. 37. 38. 39. 40. 41. 42. 43. 44. 198 Which of the following model is concerned with developing a database model as per requirement and the entire design is completed on paper rather physical implementation? (a) Physical model (b) Logical model (c) Schematic model (d) Sigma model With reference to data manipulation which of the following statement is correct? 1. To improve the growth of any business and organisations 2. It helps in organising raw data in a structured way 3. It doesn't help in organising raw data 4. DML is used to manipulate data and it helps in modifying data. (a) 1 ,2 & 3 (b) 2 & 4 (c) 1 & 3 (d) 1,2 & 4 Which command does allow users to insert data in database tables? (a) Update (b) Insert (c) Put data (d) Delete Which command does allow a user to remove single or multiple existing records from database tables? (a) Delete (b) Remove (c) Destroy (d) Select & delete Which of the following is not part of database development life cycle? (a) Requirement analysis (b) Database designing (c) Implementation (d) Structured data Which of the following is used to specify rules for the data in a table? (a) Column (b) Record (c) Protocol (d) Constraints Which of the following is not advantages of NoSQL? (a) Supports query language (b) Provides horizontal scalability (c) Flexible schemas (d) Ease of use for non-developers Which of the following is type of NoSQL database? (a) Document database (b) Graph database (c) Key value database (d) All of the above Which of the following databases store data in nodes and edges? (a) Graph (b) Document (c) Wide-column (d) Key-value In NoSQL, which method is used to sort the documents in the collection? (a) Select() (b) Sort() (c) Opt() (d) Skip() YCT 45. 46. 47. 48. 49. 50. 51. 52. 53. 54. 55. 56. Which of the following command is used to delete the associated data files and it operates on the correct database? (a) Truncate (b) Drop (c) Delete (d) Remove Which of the following is standard language for storing, manipulating and retrieving data in databases? (a) C++ (b) Java (c) SQL (d) ADA "A relational model of data for large shared data banks" was a paper which was published by the great computer scientist "E.F. Codd" in(a) 1970 (b) 1972 (c) 1975 (d) 1977 In which laboratory of IBM SQL was developed? (a) Son Josh research (b) San Jose research (c) Brainly research (d) ANSI In which year did SQL become a standard of ANSI and of the ISO ? (a) 1986&1987 (b) 1988&1999 (c) 2001& 2004 (d) 1986& 1988 Which clause in SQL is used to filter records and extract only those records that full fil a specified condition? (a) SELECT (b) WHERE (c) UNIQUE (d) NULL The keywords in SQL which is used to sort the result-set in ascending or descending order? (a) Select by (b) Order by (c) Order to (d) Order for Which of the following statement in SQL is used to modify the existing records in a table? (a) DELETE (b) UPDATE (c) UPDATION (d) RE NEW Which of the following function in SQL is used to return the smallest value of the selected column? (a) MAX() (b) MIN() (c) COUNT() (d) AVG() Which of the following function in SQL is used to return the largest value of the selected column? (a) MIN() (b) MAX() (c) LARGEST () (d) SMALLEST () The function in SQL that is used to return the number of rows that matches a specified criterion is . (a) RETURN () (b) COUNT() (c) MAX() (d) MIN() Cartesian join is also known as (a) Self join (b) Inner join (c) Cross join (d) Triplate join Database Management System 57. 58. 59. 60. 61. Which of the following is used to perform a JOIN against equality or matching column(s) values of the associated table? (a) Full outer join (b) Equi join (c) Self join (d) Product join Natural Join is a type of (a) Equi join (b) Self join (c) Inner join (d) Select join Which of the following in SQL server is used to create a full back up of an existing SQL database? (a) BACKUP (b) ROLLUP (c) DROP (d) REVERSE Which of the following is a set of SQL statements that reside in system memory with unique names? (a) Triggers (b) Foreign key (c) Primary key (d) Constraints Which operator perform the pattern matching? (a) As operator (b) LIKE Operator (c) SELECT Operator (d) None of above Punjab State Civil Supplies Corp. Ltd. 13.11.2011 62. 63. 64. 65. 66. 199 Which of the following is NOT a characteristic of relational DBMS? (a) tables (b) tree-like structures (c) complex logical relationships (d) records RPSC Lect. 2011 Which normal form is considered adequate for database design? (a) 3NF (b) 2NF (c) 1NF (d) 4NF RPSC Lect. 2011 In RDBMS, different classes of relations are created using ______ technique to prevent modification anomalies. (a) functional dependencies (b) data integrity (c) referential intergrity (d) normal forms UPPSC LT GRADE 29.07.2018 Which of the following is not is recordbased data model? (a) Relational model (b) Hierarchical model (c) E-R model (d) Network model UPPSC LT GRADE 29.07.2018 A data model is a collection of conceptual tools for describing (a) data and data relationship YCT 67. 68. 69. 70. 71. 72. 73. (b) data semantics and consistency constraints (c) data, data relationship, data semantics and consistency constraints (d) None of the above UPPSC LT GRADE 29.07.2018 The difference (-) operation removes common tuples from the first relation. This operation is (a) commutative and associative (b) non-commutative and associative (c) commutative and non-associative (d) non-commutative and non-associative UPPSC LT GRADE 29.07.2018 Fifth normal form is also called :(a) Protect-join normal form (b) Process-join normal form (c) Project-join normal form (d) None of these RPSC VPIITI 2012 (CS) Second normal form disallows (a) Full functional dependency (b) Partial functional dependency (c) Transitive functional dependency (d) Non- trivial Multivalued dependency TANGEDCO AE 2018 If a relation is in 2NF and 3NF forms, then (a) no non-prime attribute is functionally dependent on other non-prime attributes (b) no non-prime attribute is functionally dependent on the prime attributes (c) all attributes are functionally independent (d) prime attribute is functionally independent of all non-prime attributes APPSC Lect. Degree College 07.06.2017 (CS) Which normal form is considered adequate for relational database design? (a) 2 NF (b) 3 NF (c) 4 NF (d) BCNF APPSC Lect. Degree College 07.06.2017 (CS) A table on the many side of a one to many or many to many relationship must: (a) Be in Second Normal Form (2NF) (b) Be in Third Normal Form (3NF) (c) Have a single attribute key (d) Have a composite key GPSC Asstt. Prof. 30.06.2016 Which of the following is a procedural language? (a) tuple relational calculus (b) domain relational calculus (c) relational algebra (d) None of these RPSC ACF & FRO 23.02.2021 (CS) Database Management System 74. 75. A recursive relationship is a relationship between an entity and............... (a) itself (b) a subtype entity (c) an archetype entity (d) an instance entity Punjab PSC Lect. 2016 (IT) Key constraint states that: (a) the value of primary key can not be Null (b) the value of foreign key can not be Null (c) the value of primary key must be unique for each records (d) the value of foreign key must be unique for each records (e) the value of foreign key can be Null CGPSC Asstt. Prof. 2014 (IT) 76. 77. 78. 79. 80. 81. 82. 200 Weight is a in the above ER diagram : (a) entity (b) relation (c) context (d) attribute RPSC ACF FRO 23.02.2021 (Comp. App./Sci.) In a data flow diagram, a circle/bubble represents (a) Data flow (b) External entity (c) Data store (d) Process RPSC ACF FRO 23.02.2021 (Comp. App./Sci.) What is cardinality in an ER diagram ? (a) Relationship between two data stores. (b) Relationship between two entity sets. (c) Relationship between two attributes. (d) Relationship between two processes. RPSC ACF FRO 23.02.2021 (Comp. App./Sci.) A table joined with itself is called (a) Join (b) Self Join (c) Outer Join (d) Equi Join NIELIT Scientists-B 22.07.2017 (IT) Consider the join of a relation R with relation S If R has m tuples and S has n tuples, then the maximum size of join is (a) mn (b) m+n (c) (m+n)/2 (d) 2(m+n) NIELIT Scientists-B 22.07.2017 (IT) ‘AS’ clause is used in SQL for (a) Selection operation (b) Rename operation (c) Join operation (d) projection operation NIELIT Scientists-B 22.07.2017 (IT) Related fields in a database are grouped to form a (a) data file (b) data record (c) menu (d) bank NIELIT Scientists-B 22.07.2017 (IT) YCT 83. 84. 85. 86. 87. 88. 89. 90. 91. If attribute of relation schema R is member of some candidate key then this type of attributes are classified as: (a) atomic attribute (b) candidate attribute (c) nonprime attribute (d) prime attribute NIELIT Scientists-B 04.12.2016 (CS) In functional dependency between two sets of attributes A and B then set of attributes A of database is classified as: (a) top right side (b) down left side (c) left hand side (d) right hand side NIELIT Scientists-B 04.12.2016 (CS) The primary key is selected from the: (a) Composite keys. (b) Determinants (c) Candidate keys. (d) Foreign keys. NIELIT Scientists-B 04.12.2016 (CS) Normalization form which is based on transitive dependency is classified as: (a) first normal form (b) second normal form (c) fourth normal form (d) third normal form NIELIT Scientists-B 04.12.2016 (CS) If there is more than one key for relation schema in DBMS then each key in relation schema is classified as: (a) prime key (b) super key (c) candidate key (d) primary key NIELIT Scientists-B 04.12.2016 (IT) Process of analyzing relation schemas to achieve minimal redundancy and insertion or update anomalies is classified as: (a) normalization of data (b) denomination of data (c) isolation of data (d) de-normalization of data NIELIT Scientists-B 04.12.2016 (IT) SQL is developed to support (a) Hierarchical database (b) Relational database (c) Network database (d) A simple data file MPPSC State Forest Service Examination 2014 SQL provides (a) Controlling access to database (b) Providing facility for integrity constraints (c) Query on database files (d) All options are correct MPPSC State Forest Service Examination 2014 Which of the following is not a DDL command of SQL? (a) Create table (b) Alter (c) Drop (d) Insert MPPSC State Forest Service Examination 2014 Database Management System 92. DML commands of SQL allows (a) Deletion of tuples from table(s) (b) Definition of table(s) (c) Creation of views (d) None of these MPPSC State Forest Service Examination 2014 93. Transaction in a database should be (a) Atomic (b) Durable (c) Consistent (d) All options are correct MPPSC State Forest Service Examination 2014 94. Natural join operator of relational Algebra, joins _____ tables at a time (a) Three (b) Four (c) Two (d) Five MPPSC State Forest Service Examination 2014 95. Which of the following is not a Set operator in SQL? (a) Like (b) Union (c) Intersection (d) Minus MPPSC State Forest Service Examination 2014 96. A relation is in 4NF if it is in 3NF and contains (a) No multi-valued dependency (b) No non prime attribute is transitively dependent on the key (c) Non lossy decomposition (d) Every non key attributes is fully dependent on the primary key MPPSC State Forest Service Examination 2014 97. Full form of DDL in SQL is (a) Data directed language (b) Data definition language (c) Data density language (d) None of these MPPSC State Forest Service Examination 2014 98. A database can be inconsistent due to (a) Atomicity (b) Redundancy (c) Efficiency (d) All options are correct MPPSC State Forest Service Examination 2014 99. In order to have multi-valued dependency on the table, it must have (a) Only one attribute (b) NULL or one attribute (c) Two or more attributes (d) Less than two attributes MPPSC State Forest Service Examination 2014 100. The goal of normalization is to eliminate (a) Insertion anamoly (b) Deletion anamoly (c) Update anamoly (d) All options are correct MPPSC State Forest Service Examination 2014 201 YCT 101. “NOT NULL” keyword in SQL is used (a) As constraint (b) When value is unknown (c) When value is missed during insertion (d) All options are correct MPPSC State Forest Service Examination 2014 102. A relation contains atomic values of the attributes, then relation is said to be in (a) 1 NF (b) 2NF (c) 3NF (d) 4NF MPPSC State Forest Service Examination 2014 103. In ACID properties of transactions processing, ‘C’ stands for (a) Consistency (b) Cordinality (c) Conefirmity (d) None of these MPPSC State Forest Service Examination 2014 104. A database file must ensure following properties (a) Data consistency (b) Data integrity (c) Both (Data consistency) and (Data integrity) (d) None of these MPPSC State Forest Service Examination 2014 105. A relational database is a (a) Set of tuples (b) Set of nodes in tree form (c) Set of nodes in hierarchical form (d) None of these MPPSC State Forest Service Examination 2014 106. In DBMS, Network model is based on (a) Linked list (b) Graph (c) Tree (d) Queue MPPSC State Forest Service Examination 2014 107. A database always requires (a) Secondary storage device (b) Only primary storage device (c) DMA controller (d) None of these MPPSC State Forest Service Examination 2014 108. E-R diagram can be transformed to (a) Objects and classes (b) Tables (c) Arrays (d) None of these MPPSC State Forest Service Examination 2014 109. A weak entity set is a (a) Entity set whose existence depends on another weak entity set (b) Entity set whose existence depends on another strong entity set (c) Entity set whose existence dependency does not matter (d) None of these MPPSC State Forest Service Examination 2014 Database Management System 110. Conceptual design of the data base is done with the help of (a) Data marts (b) Data models (c) DFD (d) Flowchart MPPSC State Forest Service Examination 2014 111. Primary means of searching the records from database is called as (a) Candidate Key (b) Primary Key (c) Foreign key (d) alternate Key MPPSC State Forest Service Examination 2014 112. Trigger is (a) Statement that enables to start any DBMS (b) Statement that is executed by the user when debugging an application program (c) the condition that the system tests for the validity of the database user (d) Statement that is executed automatically by the system as a side effect of a modification to the database ISRO Scientist/Engineer 2016 (July) 113. Which 'Normal Form' is based on the concept of 'full functional dependency' is (a) First Normal Form (b) Second Normal Form (c) Third Normal Form (d) Fourth Normal Form ISRO Scientist/Engineer 2011 114. Purpose of 'Foreign Key' in a table is to ensure (a) Null integrity (b) Referential integrity (c) Domain integrity (d) Null & Domain integrity ISRO Scientist/Engineer 2009 115. If several concurrent transactions are executed over the same data set and the second transaction updates the database before the first transaction is finished, the____ property is violated and the database is no longer consistent. (a) Atomicity (b) consistency (c) isolation (d) Durability RPSC VPITI 2014 (IT) 116. Which of the following protocols ensures conflict serializability and safety from deadlocks? (a) Two- phase locking protocol (b) Time- stamp ordering protocol (c) Graph based protocol (d) Both Two- phase locking protocol and Timestamp ordering protorcol RPSC VPITI 2014 (IT) 117. If a transaction is performed in a database and committed, the changes are taken to the previous state of transaction by (a) Flashback (b) Rollback (c) Both Flashback and Rollback (d) Cannot be done RPSC VPITI 2014 (IT) 202 YCT 118. …….is a special type of integrity constraint that relates two relations & maintains consistency across the relations. (a) Entity Integrity constraints (b) Referential Integrity Constraints (c) Domain Integrity Constraints (d) Key Constraints RPSC VPITI 2014 (IT) 119. The DROP TABLE statement: (a) Deletes the table structure only (b) Deletes the table structure along with the table data (c) works whether or not referential integrity constraints would be violated (d) is not an SQL statement RPSC VPITI 2014 (IT) 120. The_____ contains information that gives users an easy-to- understand perspective of the information stored in the data warehouse. (a) business metadata. (b) technical metadata . (c) operational metadata. (d) financial metadata. RPSC VPITI 2014 (IT) 121. The load and index is _____. (a) a process to upgrade the quality of data before it is moved into a data warehouse. (b) a process to upgrade the quality of data after it is moved into a data warehouse. (c) a process to reject data from the data warehouse and to create the necessary indexes. (d) a process to load the data in the data warehouse and to create the necessary indexes. RPSC VPITI 2014 (IT) 122. To include integrity constraint in an existing relation use: (a) Create table (b) Modify table (c) Alter table (d) Drop table RPSC VPITI 2014 (IT) 123. In the daily running of the business which of the following information systems are used? (a) Operational planning systems. (b) Transaction Processing systems (TPS). (c) Process control system. (d) Office automation system (OAS). RPSC VPITI 2014 (IT) 124. Which is not a valid component of a E-R diagram ? (a) dashed lines (b) double lines (c) double rectangles (d) dashed ellipses RPSC VPITI 2018 (CS) RPSC Lect. 2014 125. The data is stored, retrieved and updated in……….. (a) OLAP (b) OLTP (c) Online processing (d) POP3 RPSC Lect. 2014 Database Management System 126. In order to maintain the consistency during transactions databases provides (a) Commit (b) Atomic (c) Flashback (d) Rollback RPSC Lect. 2014 127. Which is the technique used for discovering patterns in dataset at the beginning of data mining processes? (a) Kohenen map (b) Visualisation (c) OLAP (d) SQL RPSC VPITI 2018 (IT) 128. Which one of following is a correct notation in ER diagrams? (a) Entities are oval (b) Relationships are rectangles. (c) Attributes are diamonds (d) Weak entities are double rectangles. RPSC VPITI 2018 (IT) 129. What is the RDBMS terminology for a set of legal values that an attribute can have? (a) Tuple (b) Relation (c) Attribute (d) Domain RPSC VPITI 2018 (IT) 130. An entity is: (a) A collection of items in an application (b) A distinct real world item in an application (c) An inanimate object in an application (d) A data structure in DBMS TNPSC 2016 (Degree) P-II 131. The changes made by one transaction are not visible to others till the commit point, this property is called: (a) Automicity (b) Consistency (c) Isolation (d) Durability TNPSC 2016 (Degree) P-II 132. Which of the following is not a integrity constraints? (a) Not null (b) Positive (c) Unique (d) Check TNPSC 2016 (Degree) P-II 133. Database .........., which is the logical design of the database and the database ........., which is a snapshot of the data in the database at a given instant in time: (a) Instance, schema (b) Schema, Relation (c) Domain, Relation (d) Schema, Instance TNPSC 2016 (Degree) P-II 134. A locked file can be? (a) Accessed by only one user (b) Modified by users with correct password (c) Is used to hide sensitive information (d) Both (b) and (c) TNPSC 2016 (Degree) P-II 203 YCT 135. Management of metadata information is done by: (a) File-organisation module (b) Logical file system (c) Basic file system (d) Application programs TNPSC 2016 (Degree) P-II 136. Data mining refers to: (a) Retrieving a record from a large database (b) Retrieving similar records from a large database (c) To find out whether a particular pattern exists among the records (d) Analyzing large databases to find useful patterns TNPSC 2016 (Degree) P-II 137. Minimal super key is: (a) Candidate key (b) Primary key (c) Referential key (d) Foreign key TNPSC 2016 (Degree) P-II 138. Which of the following conn's rule states that the RDBMS support insertion, updation and deletion at a table level: (a) High-level update rule (b) Guaranteed access rule (c) Non-subversion rule (d) View updating rule TNPSC 2016 (Degree) P-II 139. Which of the following is the process by which the user's privileges are ascertained in database? (a) Authentication (b) Authorization (c) Access control (d) Login TNPSC 2016 (Degree) P-II 140. OLAP stands for: (a) Online Analysis and processing (b) Online Analytical Processing (c) One time Analysis and Processing (d) One time Analytical Processing TNPSC 2016 (Degree) P-II 141. For each attribute of a relations there is a set of permitted values, called the .......... that attribute. (a) Domain (b) Relation (c) Set (d) Schema TNPSC 2016 (Degree) P-II 142. Table in second normal form (2NF): (a) Eliminates all hidden dependencing (b) Eliminates the possibility of a insertion anomalies (c) Has a composite key (d) Has all non key field, depends on the whole primary key TNPSC 2016 (Degree) P-II 143. Domain constraints, functional dependency and referential integrity are special terms of: (a) Foreign key (b) Primary key Database Management System 144. 145. 146. 147. 148. 149. 150. 151. 152. 153. 204 (c) Assertion (d) Referential constraint TNPSC 2016 (Degree) P-II Selection operations are ......... and natural join operations are ........ . (a) Commutative, Associative (b) Associative, commutative (c) Associative, associative (d) Commutative, commutative TNPSC 2016 (Degree) P-II ......... is the keyword used to eliminate duplicate rows from the query result: (a) No duplicate (b) Unique (c) Distinct (d) Primary TNPSC 2016 (Degree) P-II ALL or NONE refers: (a) Consistency (b) Isolation (c) Durability (d) Atomicity TRB Poly. Lect. 2017 Inheritance achieved by the keyword is SQL is: (a) of (b) sub (c) under (d) from TRB Poly. Lect. 2017 A functional dependency is a relationship between: (a) tables (b) attributes (c) rows (d) relations TRB Poly. Lect. 2017 ______ operator is used to retain the unmatched rows of relations when they joined. (a) Outer join (b) Inner join (c) Natural join (d) Self Join TRB Poly. Lect. 2017 Entity types that do have key attributes of their own are called: (a) Identifying relationship (b) Strong entity types (c) Identifying owner (d) Weak entity types UPPCL AE 18.05.2016 The conceptual organization of the entire database, as viewed by the database administrator, relates to (a) schema (b) sub-schema (c) DML (d) DDL APPSC Poly. Lect. 13.03.2020 Which of the following options is an example of a composite attribute? (a) Address (b) Age (c) First name (d) DOB APPSC Poly. Lect. 13.03.2020 A minimal (irreducible) super key in a relational database is: (a) Candidate key (b) Primary key (c) Secondary key (d) Foreign key APPSC Poly. Lect. 13.03.2020 YCT 164. In which normal form partial dependency 154. Which of he following options describes an removed? abstract or conceptual design of the database? (a) First normal form (a) Modular design (b) Physical design (b) Second normal form (c) Logical design (d) Mapped design (c) Third normal form APPSC Poly. Lect. 13.03.2020 (d) BCNF 155. The simple object model that is frequently used RPSC ACF & FRO 23.02.2021 (CS) for database applications and which is easier to understand and use than OLEDB is : 165. Which of the following creates a virtual relation for storing the query? (a) ADO (b) ASP (a) Function (b) View (c) XML (d) ODBC (c) Procedure (d) None of these UPSC Senior Scientific Officer Grade-II 16.07.2017 RPSC ACF & FRO 23.02.2021 (CS) 156. Joining a table with itself is called 166. Which of the join operation do not preserve (a) Self Join (b) Equi Join non matched tuples? (c) Outer Join (d) Join (a) Left Outer join (b) Right Outer Join UPPCL AE 2014 (c) Inner Join (d) full outer join 157. Data dictionary contains RPSC ACF & FRO 23.02.2021 (CS) (i) name (ii) width (iii) data type 167. To sort the results of a query use: (a) i and ii (b) ii and iii (a) SORT BY (b) GROUP BY (c) i and iii (d) i, ii and iii (c) ORDER BY (d) None of the above UPPCL AE 2014 Punjab PSC Lect. 2016 (IT) 158. Duplicate rows are eliminated using 168. The SQL WHERE clause: (a) ELIMINATE (b) NODUPLICATE (a) limits the column data that are returned (c) DISTINCT (d) UNIQUE (b) limits the row data are returned UPPCL AE 2014 (c) Both (a) and (b) are correct 159. For a relation the number of tuples is called (d) Neither A nor B are correct (a) Degree (b) Cardinality Punjab PSC Lect. 2016 (IT) (c) Columns (d) Rows 169. Centralized database: UPPCL AE 2014 (a) Is best for security and management. 160. SQL provides a number of special aggregate (b) Has all or part of the database copied at 2 or functions. Which of the following is not more computers. included in SQL? (c) Is dispersed among multiple computer (a) Count (b) Median systems. (c) Min (d) Sum (d) Has problem of keeping all up to date data. RPSC ACF & FRO 23.02.2021 (CS) Punjab PSC Network Engineer 21.06.2014 161. The data can be stored, retrieved and updated 170. A virtual relation composed of columns from in: one or more related relations is called a/an: (a) OLAP (b) OLTP (a) Index (b) View (c) SMTP (d) FTP (c) Relational map (d) Base table RPSC ACF & FRO 23.02.2021 (CS) Punjab State Civil Supplies Corp. Ltd. 13.11.2011 162. Metadata contains at least: 171. Which process in database design has as a (a) The structure of the data. purpose the elimination of data redundancy (b) the algorithms used for summarization and the avoidance of update anomalies? (c) the mapping from the operational (a) Hierarchical representation environment to the data warehouse. (b) Normalization (d) All of these (c) Data warehousing RPSC ACF & FRO 23.02.2021 (CS) (d) Entity relationship modeling 163. The content of the data dictionary is Punjab State Civil Supplies Corp. Ltd. 13.11.2011 (a) DML Commands 172. A view of a database that appears to an (b) DDL Commands application program is known as (c) Indexes to user data (a) Schema (b) Subschema (d) Metadata (c) Virtual table (d) None of these ISRO Scientist/Engineer 2007 RPSC ACF & FRO 23.02.2021 (CS) Database Management System 205 YCT 173. Armstrong's inference rule doesn't determine (a) Reflexivity (b) Augmentation (c) Transitivity (d) Mutual dependency ISRO Scientist/Engineer 2007 174. Which operation is used to extract specified columns from a table? (a) Project (b) Join (c) Extract (d) Substitute ISRO Scientist/Engineer 2007 175. In case the indices values are larger, index is created for these values of the index. This is called (a) Pointed index (b) Sequential index (c) Multilevel index (d) Multiple index GPSC Asstt. Prof. 30.06.2016 176. Which is a join condition contains an equality operator: (a) Equijoins (b) Cartesian (c) Both (a) and (b) (d) None of the above GPSC Asstt. Prof. 30.06.2016 177. Which operation is/are allowed in a join view: (a) UPDATE (b) INSERT (c) DELETE (d) Any of the above GPSC Asstt. Prof. 30.06.2016 178. Which of the join operations do not preserve non matched tuples? (a) Left outer join (b) Right outer join (c) Inner join (d) Natural join GPSC Asstt. Prof. 30.06.2016 179. In SQL the statement select * from R, S is equivalent to (a) Select * from R natural join S (b) Select * from R cross join S (c) Select * from R union join S (d) Select * from R inner join S GPSC Asstt. Prof. 30.06.2016 180. Designers use which of the following to tune the performance of systems to support time-critical operations? (a) De-normalization (b) Redundant optimization (c) Optimization (d) Realization GPSC Asstt. Prof. 30.06.2016 181. ______ can help us detect poor E-R design. (a) Database Design Process (b) E-R Design Process (c) Relational scheme (d) Functional dependencies GPSC Asstt. Prof. 30.06.2016 Database Management System 182. Weak entity in the following ER diagram is (a) (b) (c) (d) 183. 184. 185. 186. 187. 188. 189. 206 Loan Loan payment Payment Both Loan payment and payment RPSC VPITI 2018 (CS) Domain constraints, functional dependency and referential integrity are special forms of _____ (a) Foreign key (b) Primary key (c) Assertion (d) Referential constraints GPSC Asstt. Prof. 30.06.2016 _______ express the number of entities to which another entity can be associated via a relationship set. (a) Mapping Cardinality (b) Relational Cardinality (c) Participation Constraints (d) None of the above GPSC Asstt. Prof. 30.06.2016 In an enterprise structure, a Legal Entity is (a) Same as Enterprise (b) Part of an Enterprise (c) Refers to Legal Department (d) None of the above GPSC Asstt. Manager 13.12.2020 (IT) Which view of reports editor depicts the structural representation of the data used in report definition? (a) Web source view (b) Paper design view (c) Data Model view (d) Paper parameter view GPSC Asstt. Manager 13.12.2020 (IT) Which of the following acts as a data source for the reports definition? (a) Database columns (b) Parameters (c) Query (d) Group GPSC Asstt. Manager 13.12.2020 (IT) The set of permitted values of an attribute is called (a) Tuple (b) Column (c) Domain (d) Table GPSC Asstt. Manager 13.12.2020 (IT) What is true about the INSERT statement in Oracle SQL? (a) An INSERT statement can be used only if a constraint is placed on the table (b) An INSERT statement can never insert a row that violates a constraint YCT 190. 191. 192. 193. 194. 195. (c) An INSERT statement can override any constraint put on the table (d) An INSERT statement cannot be used if a constraint is placed on the table GPSC Asstt. Manager 13.12.2020 (IT) Computer table has CompId, Make, Model and MYear attributes. Which of the following statement will not execute successfully? (a) SELECT * FROM Computer ORDER BY Make (b) SELECT CompId FROM Computer ORDER BY Make (c) SELECT CompId FROM Computer ORDER BY 2 (d) SELECT * FROM Computer ORDER BY 1 GPSC Asstt. Manager 13.12.2020 (IT) In which of the following circumstances a GROUP BY clause is mandatory? (a) SELECT query having only one aggregate function (b) SELECT query having two aggregate functions (c) SELECT query having one aggregate function along with other columns (d) SELECT query having only two columns GPSC Asstt. Manager 13.12.2020 (IT) Which of the following is true? (a) Selection, projection union, difference, and Cartesian product are independent. (b) Selection, projection, intersection, difference, and Cartesian product are independent. (c) Selection, projection, union, division, and Cartesian product are independent. (d) Natural Join, selection, projection, Division are independent. GPSC Asstt. Manager 13.12.2020 (IT) Choose the right option for the Query below: SELECT MAX(AVG(Salary)) FROM Employee (a) Displays Maximum Average Salary of Employees (b) Error (c) Displays Average Salary of Employees (d) Displays Average and Maximum Salary of Employees GPSC Asstt. Manager 13.12.2020 (IT) Which Join is equivalent to Cartesian Join? (a) INNER JOIN (b) OUTER JOIN (c) CROSS JOIN (d) NATURAL JOIN GPSC Asstt. Manager 13.12.2020 (IT) Which of the following conditions has to be satisfied for INNER JOIN to work? (a) Columns used for joining must have same name Database Management System 196. 197. 198. 199. 200. 201. 202. 207 (b) Columns used for joining can have same or different name (c) Columns used for joining must have different names (d) A column is not required for joining GPSC Asstt. Manager 13.12.2020 (IT) Which join is to be used between two tables A and B when the resultant table needs rows from A and B that matches the condition and rows from A that does not match the condition. (a) OUTER JOIN (b) CROSS JOIN (c) INNER JOIN (d) SELF JOIN GPSC Asstt. Manager 13.12.2020 (IT) The degree (or arity) of a database relation is the number of _____ in its relation schema. (a) attributes (b) tuples (c) entities (d) primary keys (e) foreign keys CGPSC Asstt. Prof. 2014 (CS) Entity integrity constraint states that: (a) no candidate key value can be null (b) no foreign key value can be null (c) Primary key values can't be duplicate (d) No primary key value can be null (e) foreign key values can't be duplicate CGPSC Asstt. Prof. 2014 (CS) A superkey for an entity consists of (a) one attribute only (b) atleast two attributes (c) at most two attributes (d) one or more attributes APPSC Lect. Degree College 07.06.2017 (CS) Which of the following sets of keywords constitutes a mapping in SQL? (a) SELECT, FROM, TABLE (b) SELECT, FROM, WHERE (c) CONNECT, TABLE, CREATE (d) SELECT, TABLE, INSERT APPSC Lect. Degree College 07.06.2017 (CS) A primary key for an entity is (a) A candidate key (b) Any attribute (c) A unique attribute (d) A super key APPSC Lect. Degree College 07.06.2017 (CS) Aggregate functions in SQL are (a) GREATEST, LEAST and ABS (b) SUM, COUNT AND AVG (c) UPPER, LOWER AND LENGTH (d) SQRT, POWE AND MOD APPSC Lect. Degree College 07.06.2017 (CS) YCT 203. Horizontal fragmentation is based on _________ operation in relational algebra. (a) Select (b) Project (c) Join (d) Division TANGEDCO AE 2018 204. Min- Max normalization is a ______ technique (a) Data cleaning (b) Data integration (c) Data transformation (d) Outlier mining TANGEDCO AE 2018 205. A relation in a relational database can have_____ primary key (s). (a) any number of (b) a maximum of four (c) only one (d) at least two TANGEDCO AE 2018 206. BIRCH is: (a) Balanced Iterative Reducing and Characterization using Hierarchies (b) Balanced Iterative Repartitioning and Clustering using Hierarchies (c) Balanced Iterative Reducing and Computation using Hierarchies (d) Balanced Iterative Reducing and Clustering using Hierarchies (e) Balanced Item set Reducing and Clustering using Hierarchies CGPSC Asstt. Prof. 2014 (IT) 207. The phenomenon in which a single transaction failure leads to a series of transaction rollbacks is called: (a) Concurrent rollback (b) Continuous rollback (c) Cascading rollback (d) Conflict rollback (e) Control rollback CGPSC Asstt. Prof. 2014 (IT) 208. An entity set which may not have sufficient attributes to form a primary key is termed as: (a) Relationship set (b) Strong entity set (c) Redundant set (d) Trivial entity set (e) Weak entity set CGPSC Asstt. Prof. 2014 (IT) 209. Constraint that ensures that a value appearing in one relation for a given set of attributes also appears for a certain set of attributes in another relation is: (a) Domain constraint (b) Unique constraint (c) Key constraint (d) Referential Integrity constraint (e) Entity integrity constraint CGPSC Asstt. Prof. 2014 (IT) Database Management System 210. Which of the join operations do not preserve non matched tuples :(a) Left outer join (b) Right outer join (c) Inner join (d) Natural join RPSC VPIITI 2012 (CS) 211. The entity integrity rule requires that (a) All primary key entries are unique (b) A part of the key may be null (c) Foreign key values do not reference primary key values (d) Duplicate object values are allowed TSPSC Manager 2015 212. The referential integrity rule requires that (a) Every null foreign key value must reference an existing primary key value. (b) It makes it possible for an attribute to have a corresponding value. (c) Every non- null foreign key value must reference and existing primary key value. (d) It makes it possible to delete a row in one table whose primary key does not have a matching foreign key value in another table. TSPSC Manager 2015 213. Fact tables are which of the following? (a) Completely denormalized (b) Partially denormalized (c) Completely normalized (d) Partially normalized APPSC Lect. Degree College 07.06.2017 (CS) 214. The content of the database cannot be modified using the operation (a) Deletion (b) Insertion (c) Updating (d) Selection RPSC ACF FRO 23.02.2021 (Comp. App./Sci.) 215. The key chosen by database designer as principal means of identifying entities within an entity set, is (a) Candidate key (b) Super key (c) Foreign key (d) primary key RPSC ACF FRO 23.02.2021 (Comp. App./Sci.) 216. The database must not contain any unmatched foreign key values. This property is known as (a) Entity integrity (b) Atomicity (c) Referential integrity (d) Consistency RPSC ACF FRO 23.02.2021 (Comp. App./Sci.) 217. User's view in a database is also called (a) External view (b) Conceptual view (c) Internal view (d) Contextual view RPSC ACF FRO 23.02.2021 (Comp. App./Sci.) 208 YCT 221. Which one of the following statement is correct 218. Which is not a database anomaly ? about keys in databases ? (a) Update anomaly (a) A super key is also a candidate key. (b) Create anomaly (b) A primary key is also a candidate key. (c) Insertion anomaly (c) A primary key is also a minimal key. (d) Deletion anomaly (d) A minimal super key is a candidate key. RPSC ACF FRO 23.02.2021 (Comp. App./Sci.) RPSC VPITI 2018 (CS) 219. Which of the following is dense index? 222. Which term is used to describe user's view of (a) Primary index data item types and record types? (b) Clusters index (a) schema (b) view (c) Secondary index (c) subschema (d) instance (d) Secondary non key index RPSC VPITI 2018 (CS) ISRO Scientist/Engineer 22.04.2018 223. The ______ are used to model a system's 220. Which of the following is not a Unified behavior in response to internal and external Modeling Language (UML) diagram ? events. (a) Class diagram (a) Activity diagrams (b) Deployment diagram (b) Data flow diagrams (c) Sequence diagram (c) E-R diagrams (d) Star diagram (d) State diagrams RPSC VPITI 2018 (CS) RPSC VPITI 2018 (CS) ANSWER KEY 1. (a) 2. (b) 3. (a) 4. (c) 5. (b) 6. (d) 7. (d) 8. (a) 9. (a) 10. (d) 11. (a) 12. (a) 13. (a) 14. (a) 15. (a) 16. (a) 17. (b) 18. (b) 19. (c) 20. (d) 21. (a) 22. (a) 23. (b) 24. (d) 25. (a) 26. (d) 27. (c) 28. (c) 29. (d) 30. (b) 31. (c) 32. (a) 33. (b) 34. (b) 35. (b) 36. (d) 37. (b) 38. (a) 39. (d) 40. (d) 41. (d) 42. (d) 43. (a) 44. (b) 45. (b) 46. (c) 47. (a) 48. (b) 49. (a) 50. (b) 51. (b) 52. (b) 53. (b) 54. (b) 55. (b) 56. (c) 57. (b) 58. (a) 59. (a) 60. (a) 61. (b) 62. (b) 63. (a) 64. (d) 65. (c) 66. (c) 67. (a) 68. (c) 69. (b) 70. (d) 71. (b) 72. (d) 73. (c) 74. (a) 75. (c) 76. (d) 77. (d) 78. (b) 79. (b) 80. (a) 81. (b) 82. (b) 83. (d) 84. (c) 85. (c) 86. (d) 87. (c) 88. (a) 89. (b) 90. (d) 91. (d) 92. (a) 93. (d) 94. (c) 95. (a) 96. (a) 97. (b) 98. (b) 99. (c) 100. (d) 101. (d) 102. (a) 103. (a) 104. (c) 105. (a) 106. (b) 107. (a) 108. (b) 109. (b) 110. (b) 111. (b) 112. (d) 113. (b) 114. (d) 115. (c) 116. (b) 117. (d) 118. (b) 119. (b) 120. (a) 121. (d) 122. (c) 123. (b) 124. (a) 125. (b) 126. (d) 127. (b) 128. (d) 129. (d) 130. (b) 131. (c) 132. (b) 133. (d) 134. (a) 135. (b) 136. (d) 137. (a) 138. (a) 139. (b) 140. (b) 141. (a) 142. (a) 143. (c) 144. (a) 145. (c) 146. (d) 147. (c) 148. (b) 149. (a) 150. (d) 151. (a) 152. (a) 153. (a) 154. (c) 155. (a) 156. (a) 157. (d) 158. (c) 159. (b) 160. (b) 161. (b) 162. (d) 163. (d) 164. (b) 165. (b) 166. (c) 167. (c) 168. (b) 169. (a) 170. (b) 171. (b) 172. (b) 173. (d) 174. (a) 175. (c) 176. (a) 177. (d) 178. (c) 179. (b) 180. (a) 181. (d) 182. (c) 183. (c) 184. (a) 185. (b) 186. (c) 187. (c) 188. (c) 189. (b) 190. (c) 191. (c) 192. (a) 193. (b) 194. (c) 195. (b) 196. (a) 197. (a) 198. (d) 199. (d) 200. (b) 201. (c) 202. (b) 203. (a) 204. (c) 205. (c) 206. (d) 207. (c) 208. (e) 209. (d) 210. (c) 211. (a) 212. (c) 213. (c) 214. (d) 215. (d) 216. (c) 217. (a) 218. (b) 119. (c) 220. (d) 221. (b) 222. (c) 223. (d) Database Management System 209 YCT 09. SYSTEM ANALYSIS AND DESIGN Dynamic System Models– It shows an on-going, constant changing status of the system. • The system development life cycle (SDLC) is the Elements of a System:-The following diagram process of determining how an information system demonstrates the element of a system. (IS) can support business needs, designing the system, building it and delivering it to users. • System development is a systematic process which includes phases like planning, analysis, design, deployment and maintenance System Analysis– Input– The information as a input is given to system • The study of system analysis is conducted to study the for the processing. system and identify its objective. Output– It is the outcome of the processing. • In other words, we can say, It is a kind of problem Processor–It is the part of a system which transmits solving techniques which improves the system and input into output. ensures all the components to function efficiently. Control– It controls the pattern of activities to System design– govern input, processing and output • A system design is the process of defining elements of Feedback– It provides the control in a dynamic a system such as module, architecture components, system and positive feedback is routine in nature that their interfaces and data for a system based on the encourages the performances of the system whereas specified requirements. negative feedback is informational in nature which • It is a process of defining, developing and designing provides the controller with information for action. systems which satisfies the specific needs and Environment– It ensure how a system must work. requirements of a business or organization. Boundaries Interface– A system must have • It is a process where a planning is done about a new boundaries to ensure its sphere of influence and control. business system by replacing the old system. Requirement Gathering and • It is important to understand the specific requirement Feasibility Analysis of users and that is why before planning, we need to understand the old system thoroughly and find out Requirement determination– It is an important how computer can be used in best way to operate features of a new system that includes processing or efficiently capturing of data, controlling the activities of business, producing information and supporting the management • The primary objective of system analysis is to focus or in other words we can say it is a simply a statement of on how to accomplish the objective of the system. what the system must do or what characteristics it System Model: requires to have. • A system model represents of a system and its • It involves to study the existing system and gathering environment. information or details to identify what are the There are some types of system modelrequirements, how it functions and where Schematic Models- It is a 2-D chart which shows improvement is necessary. system elements and their linkages. Here, different types Following are the major activities in requirement of arrows are used to display information flow, material determination– flow and information feedback as well. Requirement Anticipation- It tells the features of Flow System Models-It displays the orderly flow of system based on prior experience that include certain the material, energy and information that hold the system problems or features. It also suggest for the requirement together. Program evaluation and review technique is of new system if necessary. used to abstract a real world system model form. Requirement Investigation– The study of current Static System Models–The gantt chart provides a system and documentation of its features are conducted static picture of an activity time relationship and for further analysis. Here, the analysts describe about the represent one pair of relationship such as activity-time or features of system with the help of prototyping, finding cost quantity. techniques and computer assisted tools. Introduction System Analysis and Design . 210 YCT Information gathering techniques There are many information gathering techniques Interviewing–Here, system analyst gathers information from individuals or groups with the help of interview conduction. The success of interview can depend on the skill of analysts. The interview can be conducted into two waysStructured Interview– It consists of standard questions where users have to respond either in objective (Close) or descriptive (open) format. Unstructured Interview– Here, the system analyst can conduct normal question- answer session to find out the basic information about the system. Benefits of Interviewing– • To gather qualitative information about system • Validation of the information by cross-checking • Becomes easy to find key problems by seeking opinions. • Bridges gaps in misunderstanding and reduce further problems. Questionnaires– With the help of this method, an analysts gathers information about the issues found in the system. It is also of two types– Open-ended Questionnaires– It consists of questions that can be easily and correctly interpreted. They find out the problems and lead to a specific direction of answer. Closed-ended Questionnaires– It contains the questions that are used when the system analyst effectively list all the possible responses. Benefits of Questionnaires– • More reliable and provides high confidentiality of honest responses. • Effective in surveying interests, attitudes and beliefs of users • Useful in determining the overall opinion before giving any specific direction to the system project. Observation– • By this method, the information is collected by noticing and observing the people object and events. • The system analyst go for visit in organization to observe the working of current system and to get to know the requirements of the system. Benefits of Observation– • Produces more accurate and reliable data • Produces all the aspect of documentation that are incomplete and outdated. Background Reading (Secondary Research) • In this method the information is gathered by accessing the gleaned information. • Previous gathered information is provided to marketer by any internal or external source. System Analysis and Design Benefits • Provides valuable information in low cost and less time. • Accessible with internet • Work as forerunner in primary research. Joint Application Development (JAD) • It is an information gathering technique that allows the project team, users and management to work together to identify the requirements for the system. • IBM developed the JAD technique in the late 1970s, and it is often the most useful method for collecting information from the users. • JAD is a structured process in which 10 to 20 users meet under the direction of a facilitator skilled in JAD techniques. • A facilitator is a person who conducts meeting agenda and guides the discussion, but does not join in the discussion as a participant. Feasibility Analysis Feasibility analysis guides the organization in determining whether to proceed with the project and it identifies the important risks associated with the project that must be managed if the project is approved. • It is considered as preliminary investigation which helps the management to take decision about whether study of system is feasible for development or not. Economic Feasibility– It is determined by identifying costs and benefits associated with the system, assigning values to them, calculating futures cash flows, and measuring the financial worthiness of the project. As a result of this analysis, the financial opportunities and risks of the project can be understood. Technical Feasibility– • Technical feasibility analysis is in essence, a technical risk analysis that strives to answer the question "Can we build it" Many risks can endanger the successful completion of the project. • It helps organizations to determine whether the technical resources meet capacity and technical team is capable of converting the ideas into working systems. • It also involves the evaluation of the hardware, software and other technical requirements of the proposed system. 211 YCT Operational Feasibility– • Operational feasibility involves undertaking a study to analyze and determine whether and how well the organization's need can be met by completing the project • It also examines how a project plan satisfies the requirements identified in the requirements analysis phase of system development. • It also ensures that the computer resources and network architecture of candidate system are workable, or not. Schedule Feasibility– Schedule Feasibility is defined as the likelihood of a project being completed within its scheduled time frame. If the project has a high likelihood of completion by the desired due the date, then the schedule feasibility is considered to be high • It ensures that a project can be completed before the project or technology becomes obsolete or unnecessary. • `Schedule feasibility is also referred to as time visibility and proper evaluation at this step can also help to avoid unpredictable or extra costs. Structured Analysis . Structured Analysis is a development method that allows the analyst to understand the system and its activities in a logical way. It is a systematic approach, which uses graphical tools that analyze and refine the objectives of an existing system and develop a new system specification which can be easily understandable by user. It has following attributes– Data Flow Diagram • A data flow diagram is a conventional visual representation of information within a system. It can be manual, automated or a combination of both. • The primary objective of a DFD is to show the scope and boundaries of a system as a whole • The DFD is also known as data flow graph or bubble chart. Following are the name, function and symbol for a DFD. Data Flow– Function– It is used to connect processes to each other and indicates direction of data flow Source of Sink (External Entity) Function– It is a source of system inputs or sink of system outputs. Symbol → Data Store Function– It is repository of data, the arrow heads indicate net outputs and net inputs to store. Types of Data flow diagram– The data flow diagram is of two typesLogical DFD and Physical DFD Logical DFD- It focuses on the system and flow of data in the system. Physical DFD It denotes how the data flow is implemented in the system. Data Dictionary– It is a file or a set of files that includes a database's metadata. The data dictionary hold records about other object in the database such as data ownership, data relationships to other objects, and other, data • It also contains name, width and data type etc. • The data dictionary is an essential component of any relational database Importance of Data DictionaryIt plays vital role in software development processes because of the following reasons 1. It provides the analyst with a means to determine the definition of different data structure in terms of their component elements. 2. It provides a standard terminology for all relevant data for use by the engineers working in a project. Decision Tree • It is the most powerful and popular tool for classification and prediction. • It is a flowchart such as tree structure where each internal node denotes a test on an attribute, each branch represents an outcome of the test and each leaf node (terminal node) holds a class label. Decision TableIt is a brief visual representation for specifying Symbol → which actions to perform depending on given conditions. Process • It is also known as a cause-effect table because it is a Function– It performs some transformation of input best way to settle with different combination inputs data to yield output data with their corresponding outputs. • The information represented in decision tables can also be represented as decision trees and in Symbol → programming language it can be used as if-else or switch case statements as well. System Analysis and Design 212 YCT Pseudocode– It is an informal way of programming description that does not require any strict programming language syntax or underlying technology considerations. It is used for creating an outline or a rough draft of a program. System designers write pseudocode to ensure that programmers understand a software project's requirements and align code accordingly. Structured English– It is similar to a programming language such as Pascal and it does not have strict syntax rules like programming language. Example Customer authentication in the online shopping environment. Enter Cust_Name SEEK Cust_Name in Cust_Name_DB file IF Cust_Name found THEN call procedure USER_PASSWORD_AUTHETICATE() ELSE PRINT error message Call procedure NEW_customer_req() END IF Types of System Design– Logical Design– It is used to represent the data flow, input and output of the system. For example– Entity Relationship diagram (ERD) Physical Design– In ensures 1. How users add information to the system and how the system represents information back to user. 2. How the data is modelled and stored within the system. 3. How data moves through the system and how data is validated, secured and transformed because it flows through and out of the system. Architectural Design– It is used to describe the views models, behavior and structure of the system. etc. Structured Design Cohesion– It is a measure of the degree to which the elements of the module are functionally related. It is the degree to which all elements directed towards performing a single task are contained in the component. It is basically internal glue that keeps the module together. A good software design has high cohesion. Structure Chart • A structure chart is used in structured programming to arrange the program modules in a tree structure and each module is displayed by a box, which contains the module name. • It represents hierarchical structure of module and it breaks down the entire system into lowest functional modules. 1. Module– Shows the process and it is of three types Control Module– It branches to more than one sub module. Sub Module– It is a part (child) of another module. Library Module– They are reusable and invokes from any module. 2. Conditional Call– It shows that control module can select any of the sub module on the basis of certain condition. Control Module Sub Module 3. Hoop Module– It shows the repetitive execution of module by the sub model and a curved arrow denotes loop in the module. . • Structure design is a systematic methodology to determine design specification of software • It is a conceptualization of problem into many well- 4. organized elements of solution and is concerned with the solution design. • It is based on 'divide and conquer' strategy where problems are broken into many small- small problems and each small problem is individually solved until the whole problem get solved. • It helps designer a lot to identify and concentrate on 5. the problem more accurately. Coupling & Cohesion Coupling–It is the measure of the degree of 6. interdependence between modules. A good software design has low coupling arrangements. System Analysis and Design Sub Module 213 Data Flow– It denotes the flow of data between the modules and it is represented by directed arrow with empty circle at the end. Control Flow– It denotes the flow of control between the module. Physical Storage– Here, all the information are stored. Physical storage YCT Transaction Analysis– Such types of structure chart are designed for the systems which receives an input which can be transformed by a sequence of operations which can be carried out by one module. Transform Analysis- These types of structure chart explains a system that processes a number of different types of transactions. Program Flow Chart • Program flow chart helps in defining the problems in a systematic and logical way. • A flow chart is a graphical representation of various logical steps of a program. • The program flow chart is a data flow that displays the data flow while writing a program or algorithm. • Program flow charts improve the condition and efficiency of work and help in forming a relationship between various elements to explain the data flow. Structure Flow Chart • It is an important technique that helps the analyst design the program for the new system. • It shows all the components of the code that must be included in a program at a high level, arranged in a hierarchical format that implies sequence, selection and iteration. • The components are usually read from top to bottom, left to right, and they are numbered by a hierarchical numbering scheme in which lower level have an additional level of numbering. • A structure flow chart is composed of modules that work together to form a program. • The modules are depicted by a rectangle and connected by lines which represent the passing of control. • A control module is a higher-level components that it calls and controls are considered subordinate note modules. Following are the structured flow chart elements– Module– Every module has a number, numec etc. Purpose– Denotes a logical piece of the program. Library module It has a number, name and multiple instances within a diagram. Purpose It denotes a logical piece of the program that is repeated within the structure chart. Loop– A loop is drawn with a curved arrow and is placed around lines of one or more modules that are repeated. Purpose– It communicates that a module is get repeated. Symbol → System Analysis and Design Conditional line–It is drawn with a diamond and includes modules that are invoked on the basis of some condition Purpose– Communicates that subordinate modules are invoked by the control module based on some condition. Symbol → Data Couple– It contains an arrow and an empty circle. It can be passed up or down and has a direction that is denoted by the arrow. Purpose– It communicates that data are being passed from one module to another Control Couple– It contains an arrow and a filledin-circle. It also has a direction that is represented by the arrow. Purpose– Communicates that a message or a system flag is being passed from one module to another. An off-page Connector– It is denoted by the hexagon and has a title. It is used when the diagram is too large to fit everything on the same page. Purpose– It identifies when parts of the diagram are continued on another page of the structure chart. Symbol → An-on-page connector– It is represented by the circle and has a title. It is used when the diagram is too large to fit everything in the same spot on a page. Purpose– It identifies when parts of the diagram are continued somewhere else on the same page of the structure chart Symbol → HIPO Documentation:- The full form of HIPO is hierarchical input process output. It is a combination of two organized method to analyze the system and provide the means of documentations. • HIPO model was developed by IBM in year 1978. It represent the hierarchy of modules in the software system 214 YCT • System analyst uses HIPO diagram in order to obtain high-level view of system functions and it decomposes functions into sub functions in a hierarchical manner. • HIPO diagrams are good for documentation purposes and their graphical representation makes it easier for designers and managers to get the pictorial idea of the system structure. It also depicts the functions performed by system. Some fundamental concepts of object-oriented world are– Object– It represents an entity and basic building block. Class– It is a blue print of an object. Abstraction– It represents the behavior of an real world entity. Inheritance– It is a mechanism to create new classes from the existing ones. Encapsulation– It is the process of binding the data Object-oriented Modeling using UML together and hiding them from the outside world. • An object-oriented system is made up of interacting Polymorphism– Polymorphism is the ability of any objects that maintain their own local state and provide data to be processed in more than one form. It defines the operation on that state. mechanism to exists in different forms • The representation of the state is private and cannot be Testing accessed directly from outside the object. • Object-oriented design processes involve designing Software Testing– object classes and the relationships between these • Software testing is a process, to evaluate the classes. functionality of a software application with an intent • And these classes define the objects in the system and to find whether the developed software met the their interaction. specified requirements or not and to identify the • And when the design is realized as an executing defects to ensure that the product is defect-free in program, the object are created dynamically from order to produce a quality product. these class definitions. • Software testing is a process of software analysis and • Object-oriented system become easy to change than defect detecting or we can say in other words "Testing developed system using functional approaches. is the process of executing a program with intention of • Objects can have data and operations to manipulate finding error". the data and they may therefore be understood and • It is a process of identifying the correctness of modified as stand-alone entities. software by considering its all attributes (such as To develop a system design from concept to detailed, reliability, scalability, portability, reusability and object-oriented design, these are various things that are usability) and evaluating the execution of software required to do– components to get the software bugs or errors or (i) Understand and define the context and external defects. interactions with the system. Types of Software Testing:(ii) Designing the system architecture There are two types of software testing– (iii) Identifying the principal objects in the system. Manual testing & Automation testing (iv) Developing design models and (v) Specifying interfaces. • UML stands for Unified Modeling Language. It is a standard language to specify, visualizing and documenting the artifacts of software systems. • Unified modeling language is different from other common programming languages like C, C++, JAVA etc. It is a pictorial language that is used to make software blueprints. • An unified modeling language is also described as the successor of object-oriented analysis and design. • A class explains an object and they form a hierarchy which can be represented in the form of inheritance and classes. • Objects are the real-world entities which exists around the basic concepts of OOPs such as abstraction , encapsulation, inheritance and polymorphism using UML. • Therefore, it becomes essential to learn OOPs before UML. . System Analysis and Design 215 YCT Manual Testing– It is the practice of testing of an application manually to find defects and bugs. Test cases are executed manually, by a human without any support from tools or scripts. It is further divided into three types of testingWhite Box Testing– • It is based on knowledge of the internal logic of an application's code and includes tests such as coverage of code statement, branches, paths, conditions etc. • In white box testing, code are visible for the testers therefore, it is also known as clear box testing, glass box testing, open box testing, transparent testing and code-based testing etc. Black Box Testing– • Black box testing is a method of software testing that verifies the functionality of an application without having specific knowledge of the application's code or internal code structure. • Black box testing is based on requirements and functionality or specifications. • Black box testing is also called as behavioral testing. It is of two types– Functional Testing– It is based on functional requirements of a system and it is performed by a software tester. It consists of several other software testing's such asUnit Testing– • It is a type of testing where individual units or components of a software are tested. Here, the purpose is to validate that each unit of the software code performs as expected. • The unit testing is conducted during the development (coding phase) of an application. • Unit tests isolate a section of code and verify its correctness. It can be an individual function, method, procedure, module or object as well. Integration Testing– • It is a type of testing where software modules are integrated logically and tested as a group • It focuses on checking data communication amongst these modules. Therefore, it is also called as 'I & T' (integration and testing), 'string testing' or thread testing. System Testing– • It is a level of testing which validates the complete and fully integrated software product. • It is a series of different tests whose sales purpose is to exercise the full computer based system etc. • The primary objective of system testing is to evaluate the end to end system specifications. User Acceptance Testing– • It is a type of testing done by the end user or the client to verify or accept the software system before moving the software application to the production environment. System Analysis and Design • It is the last phase of testing after functional, integration and system testing is over. • It is a type of black box testing where two or more end-users get involved. • It does not focus on spelling errors, cosmetic errors or system testing. Non-functional Testing– • It is defined to check non-functional, aspects (such as performance, usability, reliability etc) of a software application • It is basically designed to test the readiness of a system as per non-functional parameters that cannot be addressed by functional testing. • It may have several other software testing such as– Compatibility Testing– It is a type of software testing that checks whether the software is capable of running on different hardware, operating systems, applications, network environments or mobile devices etc. Performance Testing– It is a software testing process used for testing the speed, response time, scalability, reliability seat ability and resource usage of a software application under particular workload. • It is a subset of performance engineering and also called as "Perf Testing" • The primary objective of performance testing is to identify and eliminate the performance bottlenecks in the software application. Types of performance testing are– • Load testing • Stress testing • Volume testing • Scalability testing • Endurance testing Usability Testing– • It is also known as user experience testing (UET). • It is a testing method for measuring how easy and user-friendly a software application is. • Usability testing is recommended during the initial phase of SDLC that provides more visibility on the expectations of the users. • Usability testing determines whether an application is useful, findable, accessible usable and desirable or not. • It consists of the following phases– Scalability Testing • It is a non-functional testing method that measures performance of a system or network when the number of user requests are scaled up or down. 216 YCT • It ensures that system can handle projected increase in user traffic, data volume, transaction counts frequency etc. • The idea behind scalability testing is to measure at what point the application stops scaling and identify the reason behind it. Gray Box Testing– • It is combination of black box and white box testing methods- testing a piece of software against its specification but using some knowledge of its internal workings. • It is performed by either development or testing teams. Maintenance Testing– Maintenance testing is a test that is performed to either identify equipment problems or to confirm that repair measures have been effective. Regression Testing • Regression testing is defined as a type of software testing to confirm that a recent program or code changes has not adversely affected the existing features. • It ensures that the old code still works once the latest code changes are done. 2. Automation Testing– Automation Testing is a software testing technique that performs using special automated testing software tools to execute a test case suite. Some Other Important Testing– Ad-hoc testing– • It is done randomly and an unplanned activity which does not follow any documentation and test design techniques to create test cases. • It is an informal or unstructured software testing type that aims to break the testing process to find out possible defects or bugs at an early stage. Basic Path Testing– • Basic path testing is a software box testing method in which test cases are defined based on flows or logical paths that can be taken through the program. • It is a hybrid method of branch testing and path testing methods. • It helps to determine all the faults lying within a piece of code. Big Bang Testing It integrates individual program modules only when everything is ready and performed by the testing teams. Smoke Testing • Smoke testing is a software testing technique that is performed post software build to verify that the critical functionalities of software are working fine. • It is performed before any detailed functional or regression tests are executed. System Analysis and Design • The main purpose of smoke testing is to reject a software application with defects so that QA team may not waste time testing broken software application. Gorilla Testing • It is a software testing technique which focuses on heavily testing of one particular module • It is performed by quality assurance teams. Alpha Testing • It is a type of software testing that is performed to identify bugs before releasing the software products to the real user or public. • It is also called as acceptance testing and it is done early on. Beta Testing Beta testing is the final testing before releasing application for commercial purpose. It is generally performed by end-users or others. Software Requirement Specification • SRS is a document that describes what the software will do and how it will be expected to perform the task. • Software requirement specification also depicts the functionality the product required to fulfill all stakeholders needs. • SRS provides a complete picture of the entire project. • SRS is plan of action and keeps all the teams- from development to maintenance on the same page. • Software requirement specification provides dept details than a system requirements specification. Followings are the outline that must be during software requirement specifications– • Defining the purpose of products. • Description of product what is going to be built. • Providing specific requirement in details. • Deliver for approval. Software Implementation and Maintenance Software Implementation: • Software implementation is the process of integrating an application into an organization's flow. • It is used during the adoption of new application for project management, supply chain management and enterprise resource planning. • Software implementation is also performed when the development team updates an existing application. Followings are the Elements of a Successful Software Implementation– 1. Defining the organization's requirement. 2. Selecting the application 3. Installing the application 4. Configuring features. 5. Customizing features 6. Integrating with existing system 7. Training employees. 217 YCT Software Maintenance– • Software maintenance is the general process of changing a system after it has been delivered. • The changes made to the software may be changes to correct coding errors, more extensive changes to correct design errors, or significant enhancements to correct specification errors or accommodate new requirements. • Changes are implemented by modifying existing system components and, where necessary, by adding new components to the system. Different types of software maintenance are– Fault Repairs– Coding errors are usually relatively cheap to correct, design errors are more expensive because they may involve rewriting several program components. Requirement errors are the most expensive to repair because of the extensive system redesign which may be necessary. Environmental Adaptation (Adaptive Maintenance) • This type of maintenance is required when some aspect of the system's environmental such as hardware, the platform operating system or other support software changes. • This application system must be modified to adapt it to cope with these environmental changes. Functionality Addition (Perfective Maintenance) • This type of maintenance is required when the system requirements change in response to business or organizational change. • The scale of the changes required to the software is often much greater than for the other types of maintenance. Other Software Development Approaches Software development methodologies play a vital role in developing software system. • The main goal of it is to provide smooth software development as per the requirement of project. • It is a framework that is used to structure, plan and control the process development of an information system. Types of Software Development Approaches. There are several types of software development approaches. Waterfall Model– • Waterfall model is the 'Classical' model of system development which is also known as one-shot or oncethrough model. • There is a sequence of activities working from top to bottom. • The diagram given below displays some arrows pointing upwards and backwards which indicates that a later stage may show the need for some extra work at an earlier stage, but this can be the exception rather than the rule. System Analysis and Design • It is often referred to as the linear and sequential model or Stage-gate model for the flow of activities in this model. • In this model, the software development activities move to the next phase only after the activities in the current phase are over. • The waterfall model can be expanded into the vprocess model and this expansion is done by expanding the testing process into different types of testing which check the executable code against the products of each of the activities in the project life cycle leading up to the coding. Advantages of Waterfall Model– • Simple and easy to understand and use. • Easy to manage due to the rigidity of the model • In water fall model, phases are processed and completed one at a time and it does not overlap. Disadvantages of Waterfall Model– In waterfall model, once an application is in the testing phase, it becomes very difficult to go back and change something that was not well- thought out in the concept phase. • High amount of risks and uncertainties. • It is not a good model for complex and object-oriented projects. • Not apt for the projects where requirements are at a moderate to high risk of changing. Spiral Model– Spiral model is a risk-driven controlled prototyping approach that develops prototypes early in the development process to specifically address risk areas followed by an assessment of prototyping results and further determination of risk areas to prototype. • Areas which are prototyped frequently include user requirements and algorithm performance • Prototyping continues until high-risk areas are resolved and mitigated to an acceptable level. 218 YCT • In spiral model, during each iteration, the system is • In incremental model, each module passes through the explored at greater depth and more detail is added. requirements design, implementation and testing phases. • Spiral model is appropriate for exploratory projects that are working in an unfamiliar domain or with unproven technical approaches • In spiral model, the iterative nature allows for knowledge gained during early passes to inform subsequent passes. • It requires low up-front commitment. • Following diagram demonstrates the spiral model Advantage of Spiral Model– • The risk management feature is one of the best development characteristics of the spiral model. • It is suitable for intricate and extensive projects. • Replacements and other demands for projects requirement in the spiral model are docile. • The early estimation cost of the project can be computed in the spiral model. Disadvantage of Spiral Model– • The spiral model is difficult to use since the volume of documentation required in its initial stage is vast. • Developing a spiral model is very expensive and small projects may find it difficult to use. • The spiral model depends on risk analysis and without a highly experienced team developing this project is impossible. • It is not user-friendly especially for projects with an unambiguous SRS. Incremental Model– • It determines the user needs and defines the overall architecture, but then delivers the system in a series of increments (software builds). • In incremental model, multiple development cycles take place to make the life cycle a "Multi-waterfall" cycle. • The cycles are get divided into smaller and more easily managed modules. • It is a type of software development model such as Vmodel, Agile model etc. System Analysis and Design Advantages– • More flexible & less costly to change scope and requirements. • Early to test and debug during iterations. • Initial delivery cost is minimal. Disadvantages• It requires clear and completes definition of the entire system before breaking down and building incrementally. • Total cost can be high. • It requires good planning and design. Generic Process Model– • The generic process model is an abstraction of the software development process and it specifies the stages and order of a process. • It establishes the foundation for a complete software process by identifying a small number of framework activities. • It also includes a set of umbrella activities that are applicable across the entire software processes. • A generic process framework for software development encompasses five activities which have been mentioned in the below diagram. Software Prototyping– • This is one way in which we can buy knowledge and reduce uncertainty. • A prototype is working model of one or more aspects of the projected system. It is constructed and tested quickly and inexpensively • in order to test out assumptions. It is classified as– Throw-away Prototypes • It tests out some ideas and is then discarded when the true development of the operational system is commenced. 219 YCT • It can be developed using different software or hardware environment. Evolutionary Prototypes– • It is developed and modified until it is finally in a state where it can become the operational system. • In this case, the standards which are used to develop the software have to be carefully considered. Rapid Application Development– • RAD is model which is also sometimes referred to as the rapid prototyping model. • RAD has the features of both the prototyping and the incremental delivery models. Major Objectives of RAD are– • To decrease the time taken and the cost incurred to develop software systems. • To limit the costs of accommodating change requests by incorporating them as early as possible before large investments have been made on development and testing. Agile Model– • It is also a type of incremental model and used for time critical applications. • Software is developed in incremental, rapid cycles and this results in small incremental releases with each release building on previous functionality. • Each release is here thoroughly tested to ensure that the quality of software is maintained. Advantages– • Face to face communication/conversation • Close, daily cooperation between business people and developers. • Regular adaptation to changing circumstances. • Customers satisfaction by rapid, continuous delivery of useful of software. Disadvantages– • Difficult to assess the effort required at the beginning of the software development life cycle. • Lack of emphasis on the required designing and documentation. Software Cost Estimation– • It is a process to predict or estimate the approximate cost of the software project before the development gets started. • It explains the approximate requirements of efforts, development time and resources to complete the software project. • It is very important processes to start development for software by considering all internal & external cost factors. COCOMO Model (Algorithmic Model)– • The full form for COCOMO is constructive cost model. • It is mainly used for software cost estimation. System Analysis and Design • It predicts the efforts required for the software project. • It depends on the number of lines of code for software product development. • It also estimates or predicts the required number of man-months (MM) for the full development of software products. Software Development Life Cycle– • It is a process that produces software with the highest quality and lowest cost in the shortest time possible. • It provides a well-structured flow of phases that help an organization to quickly produce high- quality software that is well-tested and ready for production use. SDLC Six Phases– that has been given in the below diagram. Important Facts . • Software project management comprises of a number of activities that contains project planning, project estimation and scope management • Program evaluation review technique (PERT) is a project management tool that provides a graphical representation of a project's timeline and it can be used to track the tasks of a project, when the estimation of task time is fairly uncertain. • The extent to which the software can continue to operate correctly despite the introduction of invalid inputs is called as robustness. • In software maintenance tackling the changes in the hardware or software environment where the software work, is adaptive maintenance. • Planning is a life-cycle concern. • Communication planning becomes increasingly important in a virtual team environment. • Top-down design does not require loop in variants. • Waterfall model is simplest model in software development. • A major defect in waterfall model in software development is that a trial version is available only at the end of the project. • Abstraction, generic and information hiding are software engineering concepts that support Ada language. • Stage model prototyping is used to refine and establish requirements gathering. 220 YCT • The defect rate for six sigma is 3.4 defects per million lines of code. • The chargeback scheme where the IT costs are defined in measurable events, transactions and functions that are relevant to the business and outside the IT organizations are resource or usage based, allocation based and activity based costing. • The constructive cost model (COCOMO) model does not address the area of Mid architecture-state model. • The rational unified process correct sequence of four discrete phases in the software process is inception, elaboration, construction and transition. • Mean Time Between Failure (MTBF) is the predicted elapsed time between inherent failures of a mechanical or electronic system, during normal system operation. • It is calculated as the arithmetic mean time between failures of a system. MTBF = ( Down time − Uptime ) ( Number of Failures ) • MTTR or Mean time to recovery is a software term that measures the time period between a service being detected as "down" to a state of being "available" from a user's perspective. MTTR = Total Maintainance time Number of repairs • A simple measure of reliability is MTBF Where MTBF = MTTF + MTTR • The availability of the software with MTBF & MTTR MTBF is given by availability = × 100 MTBF + MTTR • Design specification checking and feasibility study is not a valid step of requirement definition. • Software maintenance model are corrective maintenance, adaptive maintenance and perfective maintenance. • If A is the total items consumed per year, P is the procurement cost per order and C is annual inventory carrying cost per item, then the most economic ordering quantity (EOQ) is equal to (2AP/C)1/2. • File conversion, user training and new changes to the system belong to implementation phase of SDLC. • Project risk factor is considered in spiral model. Brain storming is related to application development strategies. • An approach which is very simple in its philophy where basically all the modules are constructed and tested independently of each other and when they are finished, they are all put together at same time is BigBang strategy. System Analysis and Design • Characteristics of software are– It is developed or engineered and not manufactured in the classical sense, it can be custom built or custom built and software does not "wear out". • RAD software process model stands for Rapid Application Development • Functional requirements, non-functional requirements and goal of implementation are desired in a good software requirement specification (SRS) document. • Interoperability is the testing to ensure the WebApp properly interfaces with other applications or database. • Line of code (LOC) of the product comes under direct measures. • Software requirement specification (SRS) is also known as specification of black box testing. • In the context of modular software design, the combination of high cohesion and low coupling is desirable. • In the spiral model of software development, the primary determinant in selecting activities in each iteration is risk. • Configuration management is concerned with controlling changes to the source code, controlling documentation charges and maintaining versions of software. • Black Box software testing method focuses on the functional requirement of the software. • A context model of a software system can be shown by drawing a LEVEL-0 DFD. • Activities which ensure that the software that has been built is traceable to customer requirement is covered as part of modeling. • A testing method, which is normally used as the acceptance test for a software system, is integration testing. • Software life cycle model are spiral model, prototyping model and water fall model. Capability maturity model (CMM) is a methodology to develop and refine an organization's software development process. • The UML 2.0 diagrams such as use case diagram, activity diagram and state machine diagram capture behavioral aspects of a system. • Dashed ellipse symbol denote derived attributes in ER model. • A software requirements specification (SRS)document should avoid discussing design specification. • The incremental model is a result of combination of elements of two models linear model and prototyping model. • A key concept of quality control is that all work products have measurable specification for process outputs. 221 YCT • The correct order of activities corresponding to • The benefits of smoke testing are the quality of the end product is improved, error diagnosis and software testing are unit, integration, system and correction are simplified and integration risk is validation. maximized. • RAD and prototyping models will not be able to give the desired outcome if user's participation is not • The process of changing the software in such a way that it does not change external behaviour of the code involved. but improves the internal structure is called as • Statistical testing is a software testing process in refactoring. which the objective is to measure the reliability of the • The attribute of software that measures software quality in terms of its process speed, response time Specification phase of SDLC statistically, belongs to and resource consumption is performance. the maximum percentage of errors. The purpose of using capability maturity model • Agile methods of software development involve rapid delivery of software, accept changing requirement and (CMM) is quality assurance accreditation. there is a customer involvement. Maintenance phase of SDLC is most effected during • In maintenance testing additional new tests may be costly faults is introduced. required apart from re-test and regression test and it Quality costs may be divided into costs associated needs careful risk and impact analysis as its scope is with prevention, appraisal and failure. difficult. The correct order of conducting tests are Boundary value analysis in done through black box verification, unit testing, integration testing. System testing. testing and then acceptance testing. The linear sequential model is an alternative name for • Condition coverage is white box-testing, boundary water fall model. analysis and data equivalence partitioning is black-box software rather than to discover software faults. • • • • • • • The Booch Method, the Jacbson method and the testing while decision coverage is white-box testing. Rumbaugh method are object-oriented software • The capability maturity model (CMM) level 5 defines engineering analysis method. optimizing work processes in software development organization. • Create virtual machine, delete virtual machine and migrate virtual machine are function of hypervisor • Block-box testing is also called behavioral testing. management software. • Glass box testing is also known as white-box testing • The value of method inheritance factor provides an or structural test. indication of the impact of inheritance on the object- • Graph-based testing, comparison testing and oriented software. equivalence partitioning are black-box testing. • An independently deliverable piece of functionality • Mc call's quality factors are characterised using three providing access to its services through interface is aspects name them operation, revision and transition called software component. approaches such as PSL/PSA, prototyping and structural analysis are used in software requirement. • Efficiency, reliability and stability is a non-functional requirement. • Logical design, conceptual design, planning and analysis are the steps of design process. • As per the distribution of maintenance effort, perfective maintenance has consumed maximum • Debugging is the part of defect analysis, defect share. resolution and defect identification. • Operating system, Database management system and • Construction and transition is applicable for unified compilers are the example of infrastructure software. process. • The use of 4GT without design will cause the • A software requirement specification (SRS) document difficulties in quality, maintainability and customer should avoid discussing design specification. acceptance. • The final form of testing COTs software is Beta • The primary objective of formal technical reviews is to find errors. • • Basic path testing method enables the test case designer to derive a logical complexity measures. System Analysis and Design 222 testing. COCOMO (Constructive cost model) is used to estimate effort and duration based on the size of the software. YCT • The ability of the system to handle incorrect inputs is • The major drawback of using RAD model are highly specialized & skilled developers/designers are called as robustness. required and it increase reusability of components. • Stress testing, system testing and boundary value • The disadvantages of spiral model are high amount of risk analysis, strong approval and documentation • White Box-testing can be started after installation. control and additional functionality can be added at a • Live data items would not come under configuration later date. management of software. testing are validation activities. • Testing activity which is performed to expose defects • Extreme programming (XP) and Agile unified process (AUP) are agile software. in the interfaces and in the interaction between • A graphical technique for finding if changes and integrated components is integration level testing. variation in metrics data are meaningful is called as • Security testing is a type of functions testing which control chart. investigates the function relating to deflection of • Structural model in system modeling depicts the static nature of the system. • A document called work break down structure is created by decomposing the project scope into • The UML supports event-based modeling using state chart diagrams. smaller, more manageable elements. • The conditions immediately outside the software • Function-related metrics is related to the overall functionality of the delivered software. system is called the environment. threats such as virus from malicious outsiders. • Coupling is a qualitative indication of the degree to • Estimation by analogy is application when other projects in the same analogy application domain have which a module is connected to other modules and outside world. been completed. • The spiral of software development included project • Model preferred to create client/server application is risks evaluation during each iteration. concurrent model. • Life cycle of a process includes the states such as • Integration testing aims to identify interface errors. New, Ready, Running, Waiting and terminated. • Prototyping model allows refining the requirements. • Alpha and Beta testing are forms of acceptance • The approach of software testing is to design test testing. cases to analyze the output of the software. • For a software project, the spiral model was employed • Beta testing is carried out by users. and it will stop when the software product is retired. • Regression testing is primarily related to maintenance • Initial repeatable and optimized are maturity level as testing. per capability maturity model. • Acceptance testing is done by customers. • In UML diagram of a class state is represented as an • Software configuration management is used to attribute. manage changes in the software. • Rayleigh model is used for software reliability. • An incremental process model delivers an operational • To execute all loops at their boundaries and within product in each increment. their operational bounds is an example of while-box • The change control process starts with a change texting. request. • Use case, class diagram and swimlane diagram are • Use cases define the interactions between user and UML diagram. system. • Early design stage model of COCOMO states that • Quality metrics on reliability of the software include once requirements have been stabilized, the basic mean time between failures. software architecture has been established. • FP-Based Estimation and COCOMO use empirically • Beta testing is conducted at one or more customer sites by the end-user of the software. derived formulas to predict effort as a function of • Black-box testing of software testing that examines the functionality of an application without peering into • Quick design, prototype refinement and engineer its internal structures or workings. product are phases of prototyping model. LOC or FP. System Analysis and Design 223 YCT • A software engineer must design the modules with the • Data flow based testing are used for selection of test goal of high cohesion and low coupling. cases during structural testing. • "Spiral model is an incremental model" and it will • Top-down approach is generally applied for module continue until the system retires. design phase while developing new software. • Enforced disciplined approach is an advantage of • waterfall modal. • • The early prototyping model, the early design model and the post-architectural model are COCOMO-I • MODEL. • Waterfall model is not suitable for accommodating project. • Actual programming of software code is done during the development and documentation step in the SDLC. Regression testing is primarily related to maintenance testing. • Exploratory decomposition techniques is used to decompose problems whose underlying computations correspond to a search of a space for solutions. • The period of time within which systems, applications or functions must be recovered after an outage is recovery time objective. • Capability maturity model in software engineering is a technique which is used to improve the software process. Data coupling has the weakest coupling. Mutation testing methods uses fault simulation technique. The evolutionary software development model are incremental model, WINWIN spiral model and concurrent development model. • A client/server application should be developed preferably using incremental model. • Valid category of software measurement metric are size-oriented metrics, function-oriented metrics and extended function point metrics. • Maintenance is the last phase in waterfall model. • Functional requirement are I/O format, storage structure and timing and synchronizations. • The lower degree of cohesion is kind of coincidental cohesion. • Technique used for finding a solution for optimizing the given objective under certain constraint is called linear programming. • A model which enables the developer to apply the • Productivity, quality, efficiency and portability are a prototyping at any stage in evolution of the product process metric. and which addresses the risks associated with software • Burn-in, burn-out useful life and wear out are the development is risk. phases of "bathtub curve" of hardware reliability. • Unit testing is essentially a set of path test performed to examine the many different paths through the modules. • In software engineering, acceptance testing is also known as Beta testing. • Cohesion is a qualitative indications of the degree to which a module focuses on just one thing. • • • • • • Repeatable term is a level name in the capability maturity model. • Spiral model begins with customer communication. • Alpha testing is done at developer's end. • Unit testing is not a non-functional testing. Nonfunctional testing are load testing, performance testing Cyclomatic complexity is related to while-box testing and reliability testing. method. • STLC is related to V Model. Prototyping software development process in not • The full form of STLC is software testing life cycle. It necessarily useful for developing software for is a sequence of specific actions performed during the automating an existing manual system for a client. testing process to ensure that the software quality The characteristics of a good software requirement objectives are met. The STLC includes both specification are completeness, verifiability and verification and validation. modifiability. In software development, UML diagrams are used • Risk Exposure (RE) is computed if P and L corresponds to risk probability and loss respectively during requirement analysis, system/module design and it is given by RE = P×L and system integration. A recognized software project type under COCOMO • (4n + 1) test cases a boundary value analysis yields for model are embedded, semidetached and organic. a function of two various. System Analysis and Design 224 YCT Important Questions Asked in Previous Years Examinations 1. 2. 3. 4. 5. 6. 7. 8. 9. Which of the following is a kind of problem solving techniques that improves the system and ensures all the components to function efficiently? (a) System Analysis (b) System Design (c) System Model (d) System testing Which of the following is a process of defining elements of a system such as module, architecture components, their interfaces and data for a system based on the specified requirements? (a) System Analysis (b) System Design (c) System Model (d) System defining Which of the following model is a 2D chart that shows system elements and their linkages? (a) Schematic model (b) Flow system model (c) Static model (d) Dynamic model Which of the following is not element of a system? (a) Input/output (b) Processor (c) Control & Feedback (d) Processing Which element of system does control the pattern of activities to govern input, processing and output? (a) Processor (b) Software (c) Control (d) Feedback Which of the following is an information gathering technique that allows the project team, users and management to work together to identify the requirements for the system? (a) Joint application development (b) Feasibility study (c) Operational feasibility (d) Technical feasibility Which of the following is the measure of the degree of interdependence between modules? (a) Cohesion (b) Coupling (c) Both (d) None of these Which of the following does denote the flow of data between the modules and represented by directed arrow with empty circle at the end? (a) Control flow (b) Data flow (c) Structured flow (d) All of the above The full form of HIPO is(a) hierarchical input/output process (b) hierarchical input process output System Analysis and Design 10. 11. 12. 13. 14. 15. 16. 17. 225 (c) hierarchy input processing output (d) hierarchical input output process In which year was HIPO model developed? (a) 1980 (b) 1979 (c) 1978 (d) 1990 Which of the following testing is known as user experience testing? (a) Scalability testing (b) Usability testing (c) Compatibility testing (d) Ad-hoc testing A testing which is done randomly and does not follow any documentation and test design techniques to create test cases is called as: (a) Ad-hoc testing (b) Basic path testing (c) Big Bang testing (d) User acceptance testing A software testing in which test cases are defined based on flows or logical paths that can be taken through program is called (a) Basic path testing (a) Big Bang testing (c) Non- functional testing (d) Performance testing Which of the following testing is the final testing before releasing application for commercial purposes? (a) Alpha testing (b) Beta testing (c) Regression testing (d) Smoke testing A software testing techniques which focuses on heavily testing of one particular module is known as (a) Alpha testing (b) Beta testing (c) Gorilla testing (d) Glass testing Which of the following testing does ensure the old code still works once the latest code changes are done? (a) Alpha testing (b) Gorilla testing (c) Smoke testing (d) Regression testing Which of the following statement is correct regarding software requirement specification (SRS)? (i) SRS is a document that describes what the software will do and how it will be expected to perform the task. (ii) Software requirement specification also depicts the functionality of the product required to fulfill all stakeholders needs. YCT 18. 19. 20. 21. 22. 23. (iii) It doesn't provide complete picture of the entire project. (iv) It provides the depth details than a system requirements specification. (a) (i) & (ii) (b) (i) (ii) & (iii) (c) (i) (ii) & (iv) (d) All of the above Which of the following is not a type of software maintenance? (a) Fault repairs (b) Adaptive maintenance (c) Perfective maintenance (d) Corrective maintenance Which of the following statement is not true about Software Development Life Cycle? (a) It is a process that produces software with the highest quality and lowest cost in the shortest time possible. (b) It provides a well- structured flow of phases that help an organisation to quickly produce high quality software. (c) It is well- tested and ready for production use. (d) It is a process that produces software with the highest quality and lowest cost in the shortest time possible. Which of the following model is used to determine the user needs and defines the overall architecture, but delivers the system in a series of increment? (a) Spiral model (b) Incremental model (c) Software development model (d) Waterfall model The risk management feature is one of the best development characteristics of the …………. (a) Waterfall model (b) Incremental model (c) Spiral model (d) Generic Model Which of the following model is often referred to as the linear or stage- gate model? (a) Incremental model (b) Spiral model (c) Generic Model (d) Waterfall model Which of the following model is a risk- driven controlled prototyping approach that develops prototypes early in the development process? (a) Spiral model (b) Waterfall model (c) Joint application development (d) COCOMO model System Analysis and Design 24. 25. 26. 27. 28. 29. 30. 226 Which of the following can not be disadvantages of waterfall model? (a) It might have high amount of risks and uncertainties. (b) It is apt for the projects where requirements are at a moderate to high risk of changing. (c) It is not a good model for complex and object- oriented projects. (d) Once an application is in the testing phase, it becomes very difficult to go back and change something. In which model at the time of each iteration, the system is explored at greater depth and more details is added? (a) Waterfall model (b) Spiral model (c) Generic process model (d) Integration model Which of the following is also known as algorithmic model? (a) Spiral model (b) Incremental model (c) COCOMO model (d) Waterfall model Which of the following can be used to track the tasks of a project, when the estimation of task time is fairly uncertain? (a) Decision table (b) Case tools (c) DFD (d) PERT UPPSC LT GRADE 29.07.2018 Software project management comprises of a number of activities, which contains: (a) Project planning (b) Project estimation (c) Scope management (d) All mentioned above NIELIT Scientists-B 04.12.2016 (CS) The extent to which the software can continue to operate correctly despite the introduction of invalid inputs is called as (a) Reliability (b) Robustness (c) Fault tolerance (d) Portability ISRO Scientist/Engineer 2016 (July) In software maintenance tackling the changes in the hardware or software environment where the software works, is (a) Corrective maintenance (b) Perfective maintenance (c) Adaptive maintenance (d) Preventive maintenance ISRO Scientist/Engineer 2017 (May) YCT 31. 32. Which of the following is a life-cycle concern? (a) Testing (b) Portability (c) Programming (d) Planning Punjab PSC Lect. 2016 (IT) 38. Which of the following becomes increasingly important in a virtual team environment ? (a) Requirements engineering (b) Communication planning (c) Formal Procurements Closure (d) Network diagramming 39. Punjab State Civil Supplies Corp. Ltd. 13.11.2011 33. 34. 35. 36. 37. Top-down design does not require (a) step-wise refinement (b) loop in variants (c) flow charting (d) modularity APPSC Lect. Degree College 07.06.2017 (CS) Which model is simplest model in software development? (a) Waterfall model 40. (b) Prototyping model (c) Iterative model (d) None of the given options APPSC Lect. Degree College 07.06.2017 (CS) A major defect in waterfall model in software development is that (a) the documentation is difficult 41. (b) a blunder at any stage can be disastrous (c) a trial version is available only at the end of the project (d) the maintenance of the software is difficult APPSC Lect. Degree College 07.06.2017 (CS) What is the appropriate pairing of items in the two columns listing various activities encountered in a software cycle? P Requirements Capture 1. Module development and Integration Q Design 2. Domain Analysis R Implementation 3. Structural and Behavioral Modeling S Maintenance 42. 4. Performance Tuning (a) P–3, Q–2, R–4, S–1 43. (b) P–2, Q–3, R–1, S–4 (c) P–3, Q–2, R–1, S–4 (d) P–2, Q–3, R–4, S–1 APPSC Lect. Degree College 07.06.2017 (CS) Which of the following software engineering concepts does Ada language support? (a) Abstraction (b) Generic System Analysis and Design 227 (c) Information hiding (d) All the given options APPSC Lect. Degree College 07.06.2017 (CS) Stage model Prototyping is used to (a) test the software as an end product (b) expand design details (c) refine and establish requirements gathering (d) None of the given options APPSC Lect. Degree College 07.06.2017 (CS) What is the availability of the software with following reliability figures Mean Time Between Failures (MTBF) is 20 days Mean Time To Repair (MTTR) is 20 hours (a) 90% (b) 96% (c) 24% (d) 50% ISRO Scientist/Engineer 2020 What is the defect rate for Six sigma? (a) 1.0 defect per million lines of code (b) 1.4 defects per million lines of code (c) 3.0 defect per million lines of code (d) 3.4 defects per million lines of code ISRO Scientist/Engineer 2020 The chargeback scheme where the IT costs are defined in measurable events, transactions and functions that are relevant to the business and outside the IT organization is: (a) Resource or usage based (b) Allocation based (c) Activity based costing (d) Product or service based UPSC Poly Lect. 10.03.2019 The Constructive Cost Model (COCOMO) model does not address the area of (a) Application composition model (b) Early design stage model (c) Post architecture (d) Mid architecture-stage model RPSC ACF FRO 23.02.2021 (Comp. App./Sci.) The Rational Unified Process correct sequence of four discrete phases in the software process is (a) Inception, Elaboration, Construction, Transition. (b) Elaboration, Construction, Inception, Transition. (c) Construction, Inception, Elaboration, Transition. (d) Construction, Transition, Inception, Elaboration. RPSC ACF FRO 23.02.2021 (Comp. App./Sci.) YCT 44. 45. 46. 47. 48. 49. 50. If A is the total items consumed per year, P is the procurement cost per order and C is annual inventory carrying cost per item, then the most economic ordering quantity (EOQ) is equal to: 51. 1 ( 2A P / C ) 2 (a) (A. P/C)2 (b) (c) 2A P / C (d) A2 P/C (e) A. P/C CGPSC Asstt. Prof. 2014 (Comp. App.) Which is not a valid tool for Software Quality Assurance (SQA) ? (a) Inspection (b) Auditing (c) Mean Time Between Failure (MTBF) (d) Technical Review RPSC VPITI 2018 (CS) Which is not a valid step of requirement definition ? (a) Requirements gathering (elicitation) (b) Analyse and model the requirements (c) Design specification checking and feasibility study. (d) Review and validate SRS and get confirmation from users RPSC VPITI 2018 (CS) Which one is not a software maintenance model ? (a) Corrective maintenance (b) Effective maintenance (c) Adaptive maintenance (d) Perfective maintenance RPSC VPITI 2018 (CS) Which of the following activities does not belong to implementation phase of SDLC? (a) Program testing (b) File conversion (c) User training (d) New changes to the system UPPSC LT GRADE 29.07.2018 Project risk factor is considered in (a) waterfall model (b) prototyping model (c) spiral model (d) iterative enhancement model UPPSC LT GRADE 29.07.2018 What is related to application development strategies? (a) Brainstorming (b) Technical planning System Analysis and Design 52. 53. 54. 55. 56. 228 (c) Writing the creative brief (d) All of the above UPPSC LT GRADE 29.07.2018 An approach which is very simple in its philosophy where basically all the modules are constructed and tested independently of each other and when they are finished, they are all put together at same time is: (a) Top-Down strategy (b) Bottom-Up strategy (c) Big-Bang strategy (d) Breadth-First strategy UPSC Poly Lect. 10.03.2019 What are the characteristics of software? (a) Software is developed or engineered; it is not manufactured in the classical sense. (b) Software can be custom built or custom build. (c) Software doesn't "wear out" (d) All mentioned above NIELIT Scientists-B 04.12.2016 (CS) RAD Software process model sands for: (a) Rapid Application Development. (b) Rapid Application Design. (c) Relative Application Development. (d) Recent Application Development. NIELIT Scientists-B 04.12.2016 (CS) What is the appropriate pairing of items in the two columns listing various activities encountered in a software life cycle? P. Requirements Capture 1. Module Development and Integration Q. Design 2. Domain Analysis R. Implementation 3. Structural and Behavioral Marketing S. Maintenance 4. Performance tuning (a) P-3, Q-2, R-4, S-1 (b) P-2, Q-3, R-1, S-4 (c) P-3, Q-2, R-1, S-4 (d) P-2, Q-3, R-4, S-1 NIELIT Scientists-B 22.07.2017 (CS) What is the testing to ensure the WebApp properly interfaces with other applications or databases? (a) Compatibility (b) Interoperability (c) Performance (d) Security NIELIT Scientists-B 04.12.2016 (IT) Software Requirement Specification (SRS) is also known as specification of: (a) White box testing (b) Integrated testing (c) Acceptance testing (d) Black box testing NIELIT Scientists-B 04.12.2016 (IT) YCT 57. 58. 59. 60. 61. 62. 63. Which of the following is not defined in a good Software Requirement Specification (SRS) document? (a) Functional Requirement. (b) Goals of implementation. (c) Nonfunctional Requirement. (d) Algorithm for software implementation NIELIT Scientists-B 04.12.2016 (IT) Match the following: (P) Condition coverage (i) Black-box testing (Q) Equivalence class (ii) System testing partitioning (R) Volume testing (iii) White-box testing (S) Alpha testing (iv) Performance testing (a) P-ii, Q-iii, R-i, S-iv (b) P-iii, Q-iv, R-ii, S-i (c) P-iii, Q-i, R-iv, S-ii (d) P-iii, Q-i, R-ii, S-iv GATE 2015 (Shift-I) In the context of modular software design, which one of the following combinations is desirable? (a) High cohesion and high coupling (b) High cohesion and low coupling (c) Low cohesion and high coupling (d) Low cohesion and low coupling GATE 2014 (Shift-III) In the spiral model of software development, the primary determinant in selecting activities in each iteration is (a) Iteration size (b) Cost (c) Adopted process such as Rational Unified Process of Extreme Programming (d) Risk ISRO Scientist/Engineer 2016 (July) Which one of the following is a functional requirement? (a) Maintainability (b) Portability (c) Robustness (d) None of the mentioned ISRO Scientist/Engineer 2016 (July) Configuration management is not concerned with (a) Controlling changes to the source code (b) Choice of hardware configuration for an application (c) Controlling documentation charges (d) Maintaining versions of software ISRO Scientist/Engineer 2016 (July) Black Box software testing method focuses on the (a) Boundary condition of the software (b) Control Structure of the software System Analysis and Design 64. 65. 66. 67. 68. 69. 70. 229 (c) Functional Requirement of the software (d) Independent paths of the software ISRO Scientist/Engineer 2011 A context model of a software system can be shown by drawing a (a) LEVEL-0 DFD (b) LEVEL-1 DFD (c) LEVEL-2 DFD (d) LEVEL-3 DFD ISRO Scientist/Engineer 2011 Activities which ensure that the software that has been built, is traceable to customer requirement is covered as part of (a) Verification (b) Validation (c) Maintenance (d) Modeling ISRO Scientist/Engineer 2009 A Testing method, which is normally used as the acceptance test for a software system, is (a) Regression Testing (b) Integration Testing (c) Unit Testing (d) System Testing ISRO Scientist/Engineer 2009 In the context of modular software design, which one of the following combinations is desirable? (a) High cohesion and high coupling (b) High cohesion and low coupling (c) Low cohesion and high coupling (d) Low cohesion and low coupling ISRO Scientist/Engineer 2017 (May) Which of the following is not a life cycle model? (a) Spiral model (b) Prototyping model (c) Waterfall model (d) Capability maturity model ISRO Scientist/Engineer 2017 (May) Capability Maturity Model (CMM) is a methodology to (a) develop and refine an organization's software development process (b) develop the software (c) test the software (d) all of the above ISRO Scientist/Engineer 2017 (May) Which of the following UML 2.0 diagrams capture behavioural aspects of a system? (a) Use Case Diagram, Object Diagram, Activity Diagram and State Machine Diagram (b) Use Case diagram, Activity Diagram, and State Machine Diagram (c) Object Diagram, Communication Diagram, Timing Diagram, and Interaction diagram YCT 71. 72. 73. 74. 75. 76. 77. (d) Object Diagram, Composite Structure Diagram, Package Diagram, and Deployment Diagram ISRO Scientist/Engineer 2017 (May) Estimation of software development effort for organic software in basic COCOMO is (a) E = 2.0 (KLOC)1.05 PM (b) E = 3.4 (KLOC)1.06 PM (c) E = 2.4 (KLOC)1.05 PM (d) E = 2.4 (KLOC)1.07 PM ISRO Scientist/Engineer 2017 (May) A software requirements specification (SRS) document should avoid discussing which one of the following ? (a) User interface issues (b) Non-functional requirements (c) Design specification (d) Interfaces with third party software GATE 2015 (Shift-II) Which symbol denote derived attributes in ER Model? (a) Double ellipse (b) Dashed ellipse (c) Squared ellipse (d) Ellipse with attribute name underlined ISRO Scientist/Engineer 2017 (May) In which testing all the modules of the system are tested and integrated as complete system (a) Bottom up testing (b) Top- down testing (c) Sandwich testing (d) Big-Bang testing RPSC VPITI 2014 (IT) …….model couples the iterative nature of the prototyping with the controlled and systematic aspects of the linear sequential model. (a) Spiral (b) Rapid Application Development (RAD) (c) Iterative Development (d) Incremental Development RPSC VPITI 2014 (IT) How Risk Exposure (RE) is computed if P and L corresponds to risk probability and loss respectively (a) RE= P/L (b) RE= P+L (c) RE= P*L (d) RE= 2*P*L RPSC VPITI 2014 (IT) How many test cases a boundary value analysis yields for a function of two variables. (a) 4n+3 (b) 4n+1 (c) n+4 (d) None of these RPSC VPITI 2014 (IT) System Analysis and Design 78. 79. 80. 81. 82. 83. 84. 230 The incremental Model is a result of combination of elements of which two models? (a) Build & Fix Model and Waterfall Model (b) Linear Model and RAD Model (c) Linear Model and Prototyping Model (d) Waterfall model and RAD Model RPSC VPITI 2014 (IT) Find out the correct order of activities corresponding to software testing (a) Unit, integration, system, validation (b) system, integration, unit, validation (c) unit, integration, validation, system (d) none of these RPSC VPITI 2014 (IT) Which two of the following models will not be able to give the desired outcome if user's participation is not involved? (a) Waterfall and spiral (b) RAD and Spiral (c) RAD and Waterfall (d) RAD and Prototyping RPSC VPITI 2014 (IT) Statistical testing is a software testing process in which the objective is to measure the…….. of the software rather than to discover software faults. (a) availability (b) reliability (c) reusability (d) all of these RPSC VPITI 2014 (IT) Which phase of SDLC statistically, belongs to the maximum percentage of errors (a) Design (b) Implementation and Coding (c) Specification (d) Testing RPSC Lect. 2014 The purpose of using Capability Maturity Model (CMM) is? (a) Inventory control (b) Production control (c) Quality assurance accreditation (d) None of the above RPSC Lect. 2014 Which model of software development is best suited if requirements are easily understandable and defined? (a) Waterfall model (b) Prototyping model (c) Iterative enhancement model (d) Spring model RPSC Lect. 2014 YCT 85. 86. 87. 88. 89. 90. 91. 92. 93. What are characteristic required for a good Software Requirement Specification (SRS)? (a) Correctness (b) Completeness (c) Consistency (d) All of the above RPSC Lect. 2014 Which phase of SDLC is most effected during, Costly faults is introduced? (a) Analysis (b) Design (c) Coding (d) Maintenance RPSC Lect. 2014 Quality costs may be divided into costs associated with prevention, appraisal and (a) failure (b) compliant (c) control (d) normalization RPSC VPITI 2018 (IT) Boundary value analysis is done through (a) White box testing (b) Black box testing (c) Regression testing (d) Conditional testing RPSC VPITI 2018 (IT) The linear sequential model is an alternative name for (a) Waterfall model (b) Spiral model (c) Prototype model (d) RAD model RPSC VPITI 2018 (IT) Which is not an object oriented Software Engineering Analysis method? (a) The Booch Method (b) The Jacbson Method (c) The Rumbaugh Method (d) The Rj-jindale Method RPSC VPITI 2018 (IT) Integration testing in the small (a) Tests the individual components that have been developed. (b) Only uses components that form part of the line system. (c) Tests interactions between modulus or subsystems. (d) Tests interfaces to other systems. RPSC VPITI 2018 (IT) The first step in software development life cycle (a) Software Requirement Specification (b) System Design (c) System Testing (d) None RPSC VPITI 2018 (IT) Which of the following is not a software engineering paradigm? (a) Waterfall model System Analysis and Design 94. 95. 96. 97. 98. 99. 231 (b) Spiral model (c) Incremental process model (d) Generic model RPSC VPITI 2018 (IT) A key concept of quality control is that all work products (a) are delivered on time and under budget (b) have complete documentation (c) have measureable specification for process outputs (d) are thoroughly tested before delivery to the customer RPSC VPITI 2014 (IT) Which of the following is not good test characteristics? (a) A good test has a high probability of finding an error. (b) A good test is redundant. (c) A good test should be best of breed. (d) A good test should be neither too simple nor too complex. TRB Poly. Lect. 2017 The value of ______ provides an indication of the impact of inheritance on the object oriented software. (a) Method inheritance factor (b) Coupling factor (c) Cohensive factor (d) Cpmplexity metrics TRB Poly. Lect. 2017 An Independently deliverable piece of functionality providing access to its services through interface is called: (a) Software measurement (b) Software composition (c) Software maintenance (d) Software component TRB Poly. Lect. 2017 Which one of the following is not a nonfunctional requirement? (a) efficiency (b) reliability (c) product features (d) stability TRB Poly. Lect. 2017 As per the distribution of maintenance effort, which type of maintenance has consumed maximum share? (a) Adaptive (b) Corrective (c) Perfective (d) Preventive TRB Poly. Lect. 2017 YCT 100. Which one of the following is not a infrastructure software? (a) Operating system (b) Database Management System (c) Compilers (d) Result Management System TRB Poly. Lect. 2017 101. The use of 4 GT without____ will cause the difficulties in quality, maintainability and customer acceptance. (a) data structure (b) testing (c) design (d) information gathering TRB Poly. Lect. 2017 102. The primary objective of formal technical reviews is to: (a) fix errors (b) find errors (c) clear errors (d) modify errors TRB Poly. Lect. 2017 103. _____ testing method enables the test case designer to derive a logical complexity measure. (a) Control structure testing (b) Basic path testing (c) Orthogonal array testing (d) Scenario- based testing TRB Poly. Lect. 2017 104. What is the appropriate pairing of items in the two columns that list various activities encountered in a Software life cycle? 1. Module Development P. Requirement Capture and Integration Q. Design R. Implementation S. Maintenance 2. Domain Analysis 3. Structural and Behavioural Modeling 4. Performance Tuning (a) P-3, Q-2, R-4, S-1 (b) P-2, Q-3, R-1, S-4 (c) P-3, Q-2, R-1, S-4 (d) P-2, Q-3, R-4, S-1 APPSC Poly. Lect. 13.03.2020 105. Which of the following option is NOT a part of regression suite? (a) A representative sample of tests that will exercise all software functions (b) Additional tests that focus on software functions that are likely to be affected by the change (c) Tests that focus on the software components that have been changed (d) Only those tests that do not address one or more classes of errors APPSC Poly. Lect. 13.03.2020 System Analysis and Design 106. Which of the following is NOT a benefit of smoke testing? (a) Integration risk is maximised (b) The quality of the end product is improved (c) Error diagnosis and correction are simplified (d) Progress is easier to assess APPSC Poly. Lect. 13.03.2020 107. Which of the following is NOT true about the waterfall model? (a) It is a classic life cycle model (b) It is linear model (c) It is a phased model (d) It supports backtracking APPSC Poly. Lect. 13.03.2020 108. CMMI is a short form for which of the following? (a) Capability Maturity Model Integration (b) Code Maturity Model Integration (c) Custom Maturity Model Integration (d) Capability Mode Maturity Integration APPSC Poly. Lect. 13.03.2020 109. The process of changing the software in such a way that it does not change external behaviour of the code but improves the internal structure is known as: (a) Refactoring (b) Rechanging (c) Redesigning (d) Factoring APPSC Poly. Lect. 13.03.2020 110. The attribute of software that measures software quality in terms of its process speed, response time and resource consumption is: (a) Performance (b) Usability (c) Adaptability (d) Reliability APPSC Poly. Lect. 13.03.2020 111. Which of the following is NOT true about agile methods of software development? (a) They involve rapid delivery of software (b) There is a customer involvement (c) They are complex (d) They accept changing requirement APPSC Poly. Lect. 13.03.2020 112. Consider the following test processes : 1. Acceptance testing 2. System testing 3. Verification 4. Unit testing 5. Integration testing Which is the correct order of conducting, these tests? 232 YCT (a) 3, 4, 5, 2 and 1 (c) 3, 2, 5, 4 and 1 113. 114. 115. 116. 117. 118. (b) 4, 3, 5, 2 and 1 (d) 4, 2, 5, 3 and 1 119. Which of the following is not a step of design process (a) Logical design UPSC Senior Scientific Officer Grade-II 16.07.2017 (b) Conceptual design Consider the following statements : (c) Planning and analysis 1. Condition coverage is Black-Box testing (d) Testing 2. Boundary analysis is Black-Box testing UPPCL AE 2014 3. Decision coverage is White-Box testing 120. Debugging is not a part of which of the 4. Data Equivalence partitioning is Black-Box following testing (a) Defect analysis (b) Defect resolution Which of the above statements are correct? (c) Testing (d) Defect identification (a) 2, 3 and 4 (b) 1, 2 and 4 UPPCL AE 2014 (c) 1, 2 and 3 (d) 1, 3 and 4 121. Which of the phases is not applicable for the UPSC Senior Scientific Officer Grade-II 16.07.2017 unified process? The Capability Maturity Model (CMM) level 5 (i) Inspection, (ii) Elaboration defines : (iii) Construction (iv) Transition (a) Initial mature work process in software (a) (i), (ii) and (iii) (b) (i), (ii) and (iv) development organization (c) (ii) and (iii) (d) (i) and (ii) (b) Managed work processes in software UPPCL AE 2014 development organization 122. A software Requirements Specification (SRS) (c) Optimizing work processes in software document should avoid discussing which one development organization of the following? (d) Repeatable work process in software (a) User Interface issues development organization (b) Non- functional requirements UPSC Senior Scientific Officer Grade-II 16.07.2017 (c) Design specification Black box testing is also called (d) Interfaces with third party software (a) Data flow testing (b) Loop testing RPSC ACF & FRO 23.02.2021 (CS) (c) Behavioral testing (d) Graph based testing 123. Which one is not right in the reference of Black UPSC Senior Scientific Officer Grade-II 16.07.2017 Box Testing? Which of the following is not a black box (a) Internal workings of an application are not testing? required. (a) Glass box testing (b) Also know as clear box/ structural testing. (c) This can only be done by trial and error (b) Equivalence partitioning method. (c) Graph-Based testing (d) Also known as closed box/ data driven (d) Comparison testing testing. UPPCL AE 2014 RPSC ACF & FRO 23.02.2021 (CS) Mc Call's quality factors are characterised 124. The final form of testing COTS soft ware is? using three aspects name them (a) Unit (b) Integration (a) Processes, revision, transition (c) Alpha (d) Beta (b) Management, Operation, transition RPSC ACF & FRO 23.02.2021 (CS) (c) Operation, revision, transition 125. Match the following: (d) Management, Operation, revision A. Maintainability (i) Must be usable by the UPPCL AE 2014 users for which it was In software requirement which approach is not designed used in analysis model. B. Dependability (ii) Ability to meet the (a) PSL/PSA changing needs of (b) Prototyping customers (c) Analysis patterns C. Efficiency (iii) Optimal use of resources (d) Structural analysis D. Acceptability (iv) Ability to withstand the UPPCL AE 2014 events of system failure System Analysis and Design 233 YCT 126. 127. 128. 129. 130. Matches: A B C D (a) (ii) (i) (iv) (iii) (b) (ii) (iv) (iii) (i) (b) (i) (iv) (iii) (ii) (d) (ii) (i) (iii) (iv) RPSC ACF & FRO 23.02.2021 (CS) The system design process does not include (a) modularity (b) cohesion (c) coupling (d) None of these RPSC ACF & FRO 23.02.2021 (CS) COCOMO (Constructive Cost Model) is used to estimate (a) effort and duration based on the size of the software (b) size and duration based on the effort of the software (c) effort and cost based on the duration of the software (d) size, effort and duration based on the cost of the software RPSC ACF & FRO 23.02.2021 (CS) The ability of the system to handle incorrect inputs is called as (a) Accuracy (b) Reliability (c) Correctness (d) Robustness RPSC ACF & FRO 23.02.2021 (CS) Which of the following are validation activities: (i) Code Review (ii) Stress Testing (iii) System Testing (iv) Document Verification (v) Boundary Value Testing (a) (i), (v) (b) (i), (iv) (c) (ii), (iii), (v) (d) All of these RPSC ACF & FRO 23.02.2021 (CS) The coupling between different modules of a software is categorized as follows: I. Content coupling II. Common coupling III. Control coupling IV. Stamp coupling V. Data coupling Coupling between modules can be ranked in the order of strongest (least desirable) to weakest (most desirable) as follows: (a) I-II-III-IV-V (b) V-IV-III-II-I (c) I, III-V-II-IV (d) IV-II-V-III-I Punjab PSC Lect. 2016 (IT) System Analysis and Design 131. White box testing can be started (a) After SRS creation (b) After installation (c) After Programming (d) Anytime in SDLC Punjab State Civil Supplies Corp. Ltd. 13.11.2011 132. Which of the following items would not come under Configuration Management of Software? (a) live data (b) test documentation (c) operating systems (d) user requirement document Punjab State Civil Supplies Corp. Ltd. 13.11.2011 133. Testing activity which is performed to expose defects in the interfaces and in the interaction between integrated components is :(a) System Level Testing (b) Integration Level Testing (c) Unit Level Testing (d) Component Testing Punjab State Civil Supplies Corp. Ltd. 13.11.2011 134. A Type of functional Testing, which investigates the function relating to deflection of threats, such as virus from malicious outsiders. (a) Security Testing (b) Recovery Testing (c) Performance Testing (d) Functionality Testing Punjab State Civil Supplies Corp. Ltd. 13.11.2011 135. A document called _____________ is created by decomposing the project scope into smaller, more manageable elements. (a) Scope Statement (b) Network Logic Diagram (c) Work Breakdown Structure (d) Requested Change 136. Which should be included in a Requirements management plan? (a) The document should trace requirements to project scope/WBS deliverables. (b) It should describe how requirements activities will be planned, tracked, and reported. (c) It should trace high-level requirements to more detailed requirements. (d) It should trace requirements to business needs, opportunities, goals, and objectives. Punjab State Civil Supplies Corp. Ltd. 13.11.2011 234 Punjab State Civil Supplies Corp. Ltd. 13.11.2011 YCT the 144. In UML diagram of a class (a) state of object cannot be represented (b) state in irrelevant (c) state is represented as an attribute (d) state is represented as a result of an operation ISRO Scientist/Engineer 2007 145. Which of the following models is used for Punjab State Civil Supplies Corp. Ltd. 13.11.2011 software reliability? Coupling is a qualitative indication of the (a) Waterfall (b) Musa degree to which a module (c) COCOMO (d) Rayleigh (a) Can be written more compactly ISRO Scientist/Engineer 2007 (b) Is connected to other modules and outside 146. To execute all loops at their boundaries and world within their operational bounds is an example of (c) Is table to complete its function in a timely (a) Black Box Testing (b) alpha Testing manner (c) Recover testing (d) white Box testing (d) Focuses on Just one thing ISRO Scientist/Engineer 2007 Punjab State Civil Supplies Corp. Ltd. 13.11.2011 147. Which of the following is not a UML The spiral model of software development DIAGRAM? (a) Ends with delivery of software product (a) Use Case (b) Is more chaotic than incremental model (b) Class Diagram (c) Includes project risks evaluation during each (c) Analysis Diagram iteration (d) Swimlane Diagram (d) Risky model that rarely produces a ISRO Scientist/Engineer 2007 meaningful product 148. Which version of COCOMO states that once Punjab State Civil Supplies Corp. Ltd. 13.11.2011 requirements have been stabilized, the basic Life cycle of a process includes the following software architecture has been established? states: (a) Early design stage model (a) Newborn, Ready, Running, Waiting and (b) Post-architecture-stage model Terminated (c) Application composition model (b) Initiated, Ready, Running, Waiting and Halted (d) All of the above (c) New, Ready, Running, Blocked and Terminated GPSC Asstt. Prof. 30.06.2016 (d) New, Ready, Running waiting and terminated 149. A 66.6% risk is considered as Karnataka PSC Comp. Sci. Teacher 16.10.2017 (a) very low (b) low Alpha and beta testing are forms of (c) moderate (d) high (a) Acceptance testing (b) Integration testing GPSC Asstt. Prof. 30.06.2016 (c) System testing (d) Unit testing 150. Which of the following uses empirically derived ISRO Scientist/Engineer 2015 formulas to predict effort as a function of LOC For a software project, the spiral model was or FP? employed. When will the spiral stop? (a) FP-Based Estimation (a) When the software product is retired (b) Process-Based Estimation (b) When the software product is released after (c) COCOMO Beta testing (d) Both (a) and (c) (c) When the risk analysis is completed GPSC Asstt. Prof. 30.06.2016 (d) After completing five loops 151. Which one of the following is not a phase of ISRO Scientist/Engineer 2014 Prototyping Model? Which of the following is not a maturity level (a) Quick Design as per Capability Maturity Model? (b) Coding (a) Initial (b) Measurable (c) Prototype Refinement (c) Repeatable (d) Optimized (d) Engineer Product ISRO Scientist/Engineer 2014 GPSC Asstt. Prof. 30.06.2016 137. The conditions immediately software system is called (a) the boundary (b) the graphical user interface (c) the environment (d) None of the Above 138. 139. 140. 141. 142. 143. System Analysis and Design outside 235 YCT 152. What is the major drawback of using RAD Model? (a) Highly specialized & skilled developers/ designers are required (b) Increase reusability of components (c) Encourages customer/client feedback (d) Both (a) and (b) GPSC Asstt. Prof. 30.06.2016 153. Identify the disadvantage of Spiral Model. (a) Doesn't work well for smaller projects (b) High amount of risk analysis (c) Strong approval and documentation control (d) Additional Functionality can be added at a later date GPSC Asstt. Prof. 30.06.2016 154. Which one of the following is not agile method? (a) XP (b) 4GT (c) AUP (d) All of the above GPSC Asstt. Prof. 30.06.2016 155. Which of the following does not apply to agility to a software process? (a) Uses incremental product delivery strategy (b) Only essential work products are produced (c) Eliminate the use of project planning and testing (d) All of the above GPSC Asstt. Prof. 30.06.2016 156. A graphical technique for finding if changes and variation in metrics data are meaningful is known as (a) DRE (Defect Removal Efficiency) (b) Function points analysis (c) Control Chart (d) All of the above GPSC Asstt. Prof. 30.06.2016 157. Which model in system modelling depicts the static nature of the system? (a) Behavioral Model (b) Context Model (c) Data Model (d) Structural Model GPSC Asstt. Prof. 30.06.2016 158. The UML supports event-based modeling using ______ diagrams. (a) Deployment (b) Collaboration (c) State chart (d) All of the above GPSC Asstt. Prof. 30.06.2016 159. What is related to the overall functionality of the delivered software? (a) Function-related metrics (b) Product-related metrics System Analysis and Design 160. 161. 162. 163. 164. 165. 236 (c) Size-related metrics (d) None of the above GPSC Asstt. Prof. 30.06.2016 Which technique is applicable when other projects in the same analogy application domain have been completed? (a) Algorithmic cost modeling (b) Expert Judgement (c) Estimation by analogy (d) Parkinson's law GPSC Asstt. Prof. 30.06.2016 Model preferred to create client/server applications is (a) WINWIN Spiral Model (b) Spiral Model (c) Concurrent Model (d) Incremental Model GPSC Asstt. Prof. 30.06.2016 Integration testing aims to identify: (a) SRS errors (b) Analysis errors (c) Interface errors (d) Design errors (e) Semantic errors CGPSC Asstt. Prof. 2014 (CS) Which of the following software development models allows refining the requirements? (a) Waterfall model (b) Incremental model (c) spiral model (d) Prototyping model (e) Rapid application development model CGPSC Asstt. Prof. 2014 (CS) The process of software modifications to match changes in the ever changing environment is termed as: (a) Assertive maintenance (b) Corrective maintenance (c) Adaptive maintenance (d) Perfective maintenance (e) Preventive maintenance CGPSC Asstt. Prof. 2014 (CS) The approach to software testing is to design test cases to (a) break the software (b) understand the software (c) analyze the design of sub processes in the software (d) analyze the output of the software APPSC Lect. Degree College 07.06.2017 (CS) YCT 166. In a software project, COCOMO (Constructive Cost Model) is used to estimate (a) effort, cost and schedule based on the size of the software (b) size and duration based on the effort of the software (c) effort and cost based on the duration of the software (d) size, effort and duration based on the cost of the software APPSC Lect. Degree College 07.06.2017 (CS) 167. Beta testing is carried out by (a) users (b) developers (c) managers (d) None of the given options APPSC Lect. Degree College 07.06.2017 (CS) 168. Regression testing is primarily related to (a) functional testing (b) data flow testing (c) development testing (d) maintenance testing APPSC Lect. Degree College 07.06.2017 (CS) 169. Acceptance testing is done by (a) developers (b) customers (c) testers (d) None of the given options APPSC Lect. Degree College 07.06.2017 (CS) 170. The COCOMO model is (a) an analysis model (b) a design model (c) a cost model (d) a testing model TANGEDCO AE 2018 171. Software configuration management is used (a) to manage different software systems (b) to manage changes in the software (c) To manage interactions between software (d) to manage setting up software TANGEDCO AE 2018 172. An incremental process model (a) increments the process in each cycle (b) delivers one completed product (c) Delivers an operational product in each increment (d) increments changes to the model in each cycle TANGEDCO AE 2018 173. The change control process starts with (a) a test case (b) a design feature (c) a specification (d) a change request TANGEDCO AE 2018 System Analysis and Design 174. Use cases (a) define the interactions between user and system (b) brings out cases of usage by the system (c) defines details of the system behavior (d) defines interactions between modules TANGEDCO AE 2018 175. Quality metrics on reliability of the software include (a) average time taken to execute a function (b) mean time between failures (c) number of words in the documentation (d) number of lines of code TANGEDCO AE 2018 176. Which testing is conducted at one or more customer sites by the end-user of the software? (a) Alpha testing (b) Beta testing (c) Gamma testing (d) Delta testing (e) Sigma testing CGPSC Asstt. Prof. 2014 (IT) 177. The COCOMO model is a: (a) Common Cost Estimation Model (b) Complete Cost Estimation Model (c) Constructive Cost Estimation Model (d) Comprehensive Cost Estimation Model (e) Cash Cost Estimation Model CGPSC Asstt. Prof. 2014 (IT) 178. Name the method of software testing that examines the functionality of an application without peering into its internal structures or workings: (a) White box testing (b) Black box testing (c) Grey box testing (d) Basic path testing (e) Code path analysis CGPSC Asstt. Prof. 2014 (IT) 179. In DFDs, an entity is represented by: (a) Rectangle (b) Arrow (c) Oval (d) Triangle (e) Diamond CGPSC Asstt. Prof. 2014 (IT) 180. A software engineer must design the modules: (a) with the goal of low cohesion and low coupling (b) with the goal of high cohesion and high coupling (c) with the goal of high cohesion and low coupling (d) with the goal of low cohesion and high coupling (e) with the goal of no cohesion and low coupling CGPSC Asstt. Prof. 2014 (IT) 237 YCT 181. "Spiral model is an incremental model". How long the spiral will continue? (a) Until the system (or software) retires (b) up to β-testing (c) When rest analysis is completed (d) None of these RPSC VPIITI 2012 (CS) 182. What does CASE Tool mean :(a) Tools used for analysis and design only (b) Any computer based tool for software planning, development and evolution (c) Any tool used for case study only (d) Tools for testing the software RPSC VPIITI 2012 (CS) 183. Which of the following is an advantage of waterfall model? (a) The model assume stage rigidity (b) Enforced disciplined approach (c) The model makes no allowance for prototyping (d) Relegating maintenance is limited to minor changes RPSC VPIITI 2012 (CS) 184. Which of the following is not a COCOMO-I MODEL ? (a) The early prototyping model (b) The early design model (c) The early testing model (d) The post-architectural model RPSC VPIITI 2012 (CS) 185. Waterfall model is not suitable for :(a) Complex project (b) Small project (c) Accommodating project (d) None of these RPSC VPIITI 2012 (CS) 186. The following are the two main approaches to designing black box test cases :(a) Equivalence class partitioning and Coincident object analysis (b) Equivalence class partitioning and Boundary value analysis (c) Boundary value analysis and partitioning analysis (d) None of these RPSC VPIITI 2012 (CS) 187. Consider the following statements with respect to coding phase: I. Verification: It is the process of determining whether the output of one phase of software development conforms to that of its previous phase II. Velidation: It is System Analysis and Design 188. 189. 190. 191. 192. 238 the process of determining whether a fully developed system conforms to its requirements specification. Which of the following is correct? (a) I (b) II (c) Both are correct (d) None of the statement are correct RPSC VPIITI 2012 (CS) Actual programming of software code is done during the_____ step in the SDLC. (a) Maintenance and evaluation (b) Design (c) analysis (d) Development and Documentation RPSC VPIITI 2012 (CS) Identify the correct statement with respect to Evolutionary development (a) Evolutionary development usually has two flavors; exploratory development and throwaway prototyping (b) Very large projects are usually done using evolutionary development based approach (c) It facilitates easy project management, through the high volume of documentation it generates (d) Sometimes the construction of a throw-away prototype is not followed by a re- implementation of the software system using a more RPSC VPIITI 2012 (CS) Regression testing is primarily related to (a) Functional testing (b) Development testing (c) Data flow testing (d) Maintenance testing ISRO Scientist/Engineer 2020 Which one of the following decomposition techniques is used to decompose problems whose underlying computations correspond to a search of a space for solutions? (a) Recursive decomposition (b) Data decomposition (c) Exploratory decomposition (d) Speculative decomposition UPSC Poly Lect. 10.03.2019 The period of time within which systems, applications or functions must be recovered after an outage is: (a) Mean Time to Recover (b) Recovery Time Objective (c) Recovery Point Objective (d) Mean Time Return Failure UPSC Poly Lect. 10.03.2019 YCT 193. A model which enables the developer to apply the prototyping at any stage in evolution of the product and which addresses the risks associated with software development is: (a) Spiral model (b) Prototype model (c) Water fall model (d) V-shape model UPSC Poly Lect. 10.03.2019 194. The primary determinant in selecting activities in each iteration of the spiral model of software development is: (a) Cost (b) Iteration size (c) Constraints (d) Risk UPSC Poly Lect. 10.03.2019 195. Which one of the following testing is essentially a set of path test performed to examine the many different paths through the modules? (a) Integration testing (b) Unit testing (c) Function testing (d) System testing UPSC Poly Lect. 10.03.2019 196. What is the disadvantage of spiral model? (a) It is inefficient for smaller projects (b) High amount of risk analysis (c) Strong approval and documentation control (d) Additional functionalities can be added later TSPSC Manager 2015 197. In software engineering, acceptance testing is also known as (a) black-box testing (b) white box testing (c) Alpha testing (d) Beta testing TSPSC Manager 2015 198. Cohesion is a qualitative indication of the degree to which a module (a) can be written more compactly (b) focuses on just one thing (c) is able to complete its function in a timely manner (d) is connected to other modules and the outside world TSPSC Manager 2015 199. Cyclamatic complexity is related to which of the following testing method? (a) White-box (b) Black-box testing (c) White- box and black-box testing (d) Functional-test TSPSC Manager 2015 System Analysis and Design 200. Consider the following : A. Condition p. Black box testing Coverage B. Equivalence Class q. System testing partitioning C. Volume Testing r. White box texting D. Beta Testing s. Performance testing 201. 202. 203. 204. 205. 206. 239 Matching A, B, C, D in the same order gives. (a) r, p, s, q (b) p, r, q, s (c) s, r, q, p (d) q, r, s, p ISRO Scientist/Engineer 17.12.2017 Which of the following software development process is not necessarily useful for developing software for automating an existing manual system for a client? (a) Prototyping (b) Iterative enhancement (c) Spiral model (d) Waterfall model APPSC Lect. 2017 (Degree College) (CS) Which of the follwing is NOT the characteristic of a good software Requirement Specification? (a) Completeness (b) verifiability (c) modifiability (d) short size of code APPSC Lect. 2017 (Degree College) (CS) Which of the following is NOT a recognized software project type under COCOMO model? (a) embedded (b) semidetached (c) detached (d) organic APPSC Lect. 2017 (Degree College) (CS) In software development, UML diagrams are used during..... (a) requirements analysis (b) system/module design (c) system integration (d) All the given options APPSC Lect. 2017 (Degree College) (CS) Which of the following techniques are used for selection of test cases during structural testing? (a) Data flow based testing (b) equivalence class partitioning (c) cause-effect graphing (d) boundary value analysis APPSC Lect. 2017 (Degree College) (CS) Match the following P) Waterfall model (a) Specifications can be developed Incrementally Q) Evolutionary model (b) Requirements compromises are inevitable YCT R) Component based model 207. 208. 209. 210. 211. 212. 213. (c) Explicitly addressing the problem of Risk during development S) Spiral Model (d) Inflexible Partitioning of the Project into stages (a) P-a, Q-b, R-c, S-d (b) P-d, Q-a, R-b, S-c (c) P-d, Q-c, R-a, S-b (d) P-c, Q-a, R-b, S-d APPSC Lect. 2017 (Degree College) (CS) Which of the following approaches is generally applied for module design phase while developing new software? (a) top-down approach (b) Bottom-up approach (c) centre fringing (d) depends on the size of software APPSC Lect. 2017 (Degree College) (CS) Which of the following type of coupling has the weakest coupling? (a) Pathological coupling (b) Control coupling (c) Data coupling (d) massage coupling ISRO Scientist/Engineer 2013 Which of the following testing methods uses fault simulation technique? (a) unit testing (b) beta testing (c) beta testing (d) mutation testing ISRO Scientist/Engineer 2013 Which of the following is NOT an evolutionary software development model? (a) Incremental model (b) WINWIN spiral model (c) Concurrent development model (d) RAD model APPSC Lect. Degree College 16.09.2020 In software engineering, which of the following is NOT a valid type of change that is encountered during support phase? (a) Correction (b) Adoption (c) Prevention (d) Avoidance APPSC Lect. Degree College 16.09.2020 A client/server application should be developed preferably using _______ model. (a) Spiral (b) WINWIN spiral (c) Incremental (d) Concurrent APPSC Lect. Degree College 16.09.2020 Which of the following is NOT a valid category of software measurement metric? (a) Size-oriented metrics (b) Function-oriented metrics System Analysis and Design 214. 215. 216. 217. 218. 219. 220. 221. 240 (c) Module-oriented metrics (d) Extended function point metrics APPSC Lect. Degree College 16.09.2020 Match the following: (a) White-box testing (1) Behavioural testing (b) Black-box testing (2) Glass-box testing (c) Basic path testing (3) Cyclomatic complexity (a) a - 1, b - 2, c - 3 (b) a - 2, b - 1, c - 3 (c) a - 3, b - 2, c - 1 (d) a - 3, b - 1, c - 2 APPSC Lect. Degree College 16.09.2020 Which is not a type of coupling in software Engineering ? (a) Data coupling (b) Stamp coupling (c) Context coupling (d) Content coupling RPSC ACF FRO 23.02.2021 (Comp. App./Sci.) Which is not a type of testing ? (a) Proper testing (b) Unit testing (c) Integration testing (d) System testing RPSC ACF FRO 23.02.2021 (Comp. App./Sci.) Which is the last phase in waterfall model ? (a) Testing (b) Maintenance (c) Coding (d) Design RPSC ACF FRO 23.02.2021 (Comp. App./Sci.) Which is not a functional requirement ? (a) I/O format (b) Reliability (c) Storage structure (d) Timing and Synchronization RPSC ACF FRO 23.02.2021 (Comp. App./Sci.) The lower degree of cohesion is kind of (a) Logical Cohesion (b) Coincidental Cohesion (c) Procedural Cohesion (d) Communicational Cohesion ISRO Scientist/Engineer 22.04.2018 Technique used for finding a solution for optimizing the given objective (such as profit maximization or cost minimization) under certain constraints is called(a) Quailing Theory (b) Waiting Line (c) Linear Programming (d) Graph Theory (e) Maxima CGPSC Asstt. Prof. 2014 (Comp. App.) Which of the following is not a process metric? (a) Productivity (b) Functionality (c) Quality (d) Efficiency (e) Portability CGPSC Asstt. Prof. 2014 (Comp. App.) YCT (b) Unknown requirement 222. Which one is not a phase of "bathtub curve" of hardware reliability? (c) Undreamt requirement (a) Burn-in (b) Wear-out (d) Complex requirement (c) Test-out (d) Useful life (e) Functional requirement (e) Burn-out CGPSC Asstt. Prof. 2014 (Comp. App.) CGPSC Asstt. Prof. 2014 (Comp. App.) 226. Alpha testing is done at 223. Which one of the following term is a level name (a) User's end in the Capability Maturity Model? (b) Developer's end (a) Ad hoc (b) Repeatable (c) User's and Developer's end (c) Reusable (d) Organized (d) Client's end (e) Systemized RPSC VPITI 2018 (CS) CGPSC Asstt. Prof. 2014 (Comp. App.) 227. Which of the following is not a Non-functional 224. Spiral model begins with: testing ? (a) Design (a) Performance testing (b) Risk analysis (b) Unit testing (c) Coding (c) Load testing (d) Customer communication (d) Reliability testing (e) Analysis RPSC VPITI 2018 (CS) CGPSC Asstt. Prof. 2014 (Comp. App.) 228. STLC is related to which model? 225. Which one of the following is not a valid type of (a) Waterfall Model (b) RAD Model requirement? (c) V Model (d) Spiral Model (a) Known requirement RPSC VPITI 2018 (CS) ANSWER KEY 1. (a) 11. (b) 21. (c) 31. (d) 41. (d) 51. (c) 61. (d) 71. (c) 81. (b) 91. (c) 101. (c) 111. (c) 121. (a) 131. (b) 141. (a) 151. (b) 161. (c) 171. (b) 181. (a) 191. (c) 201. (a) 211. (d) 221. (b) 2. (b) 12. (a) 22. (d) 32. (b) 42. (d) 52. (d) 62. (b) 72. (c) 82. (c) 92. (a) 102. (b) 112. (a) 122. (c) 132. (a) 142. (a) 152. (d) 162. (c) 172. (c) 182. (b) 192. (b) 202. (d) 212. (d) 222. (c) 3. (a) 13. (a) 23. (a) 33. (b) 43. (a) 53. (a) 63. (c) 73. (b) 83. (c) 93. (d) 103. (b) 113. (a) 123. (b) 133. (b) 143. (b) 153. (a) 163. (d) 173. (d) 183. (b) 193. (a) 203. (c) 213. (c) 223. (b) System Analysis and Design 4. (d) 14. (b) 24. (b) 34. (a) 44. (b) 54. (b) 64. (a) 74. (d) 84. (a) 94. (c) 104. (b) 114. (c) 124. (d) 134. (a) 144. (c) 154. (b) 164. (c) 174. (a) 184. (c) 194. (d) 204. (d) 214. (b) 224. (d) 5. (c) 15. (c) 25. (b) 35. (c) 45. (c) 55. (b) 65. (d) 75. (a) 85. (d) 95. (b) 105. (d) 115. (c) 125. (b) 135. (c) 145. (d) 155. (c) 165. (d) 175. (b) 185. (c) 195. (b) 205. (a) 215. (c) 225. (d) 241 6. (a) 16. (d) 26. (c) 36. (b) 46. (c) 56. (d) 66. (b) 76. (c) 86. (d) 96. (a) 106. (a) 116. (a) 126. (d) 136. (b) 146. (d) 156. (c) 166. (a) 176. (b) 186. (b) 196. (a) 206. (b) 216. (a) 226. (b) 7. (b) 17. (c) 27. (d) 37. (d) 47. (b) 57. (d) 67. (b) 77. (b) 87. (a) 97. (d) 107. (d) 117. (c) 127. (a) 137. (c) 147. (c) 157. (d) 167. (a) 177. (c) 187. (c) 197. (d) 207. (a) 217. (b) 227. (b) 8. (b) 18. (d) 28. (d) 38. (c) 48. (a) 58. (d) 68. (d) 78. (c) 88. (b) 98. (c) 108. (a) 118. (c) 128. (d) 138. (b) 148. (a) 158. (c) 168. (d) 178. (b) 188. (d) 198. (b) 208. (c) 218. (b) 228. (c) 9. (b) 19. (d) 29. (b) 39. (b) 49. (c) 59. (b) 69. (a) 79. (a) 89. (a) 99. (c) 109. (a) 119. (d) 129. (c) 139. (c) 149. (d) 159. (a) 169. (b) 179. (a) 189. (a) 199. (a) 209. (d) 219. (b) 10. (c) 20. (b) 30. (c) 40. (d) 50. (a) 60. (d) 70. (b) 80. (d) 90. (d) 100. (d) 110. (a) 120. (c) 130. (a) 140. (d) 150. (d) 160. (c) 170. (c) 180. (c) 190. (d) 200. (a) 210. (d) 220. (c) YCT 10. INTERNET OF THINGS AND ITS APPLICATION Introduction to IoT . The full name of IoT is internet of things. Internet of things (IoT) is a set of devices that are connected via the internet. IoT is a network of physical objects available on the internet that is embedded with sensors, software and other technologies, so that other devices available on the internet can be connected, and data can be exchanged. IoT devices are being used every day in our daily life such as- smart phones, TV, lights, AC, doors, cars etc. are used by IoT sensors. Amazon Echo, ring door bell and nest thermostat were all a part of internet of things (IoT). Understanding IoT with an example if a person wants that the "AC" of his room should be turned on before reaching his home and he gets his room cold as soon as he reaches at home then he did so through internet of things. Same can be done, if your "AC" remains on while leaving the house, then with the help of IoT, you can also turn it off. How internet of things (IoT) works? Internet of things is a networking technology. To use it have general knowledge of the internet and computer. Any person can connect their electronic devices together with the help of internet in IoT. It can be used only if the IP address of your mobile and device is the same. The devices are interconnected via WiFi or Bluetooth and data is exchanged between them through a wireless technology. The connected devices send and receive signals through the binary method (0,1). Main application of internet of things– Smart Home– With the help of smart home IoT application, we can connect home appliances with help of smart phone or sensor with help of this, we can turn "ON" and "OFF" the light and "AC" of the house before coming to the house. The door fan, light etc. of the house can be managed through IoT. Wearable devices– All those devices that can be wear such as smart clothes, smart watch, smart shoes etc all devices some under the internet of things. It is useful for fitness health and entertainment. Example- Samsung, Apple or Google Company's smart watches. Agriculture– With the help of internet of things weather can be predicted. We can also predicted the availability and requirement of foods, cereals and fruits through the IoT. Farmers can find out their soil moisture, acidity level, the presence of nutrients, temperature level and many more. Internet of things and its Application Hospital– The wide importance of internet of things in the hospital and health sector, along with keeping a database of hospital equipment and data, as well as a record of patient symptoms and reports. Smart City– With the help of internet of things, everyday problems like- water, electricity supply, traffic, crime and environment related problems can be solved. Features of the internet of things– Connectivity– Connectivity means establishing a good connection between all the devices from IoT platform to IoT, which can be server or cloud. Analyzing– After connecting IoT devices the data collected in the device is analyzed in real time and used to build business intelligence. Artificial Intelligence– IoT technology comes with a combination of hardware and software that makes IoT devices state-of-the-art, allowing the devices to output intelligently in a particular situation. Advantages of IoT Easy Access– With the help of IoT we can access information very easily, like using Google maps, we can find the location and distance of any place. Communications– In IoT the equipment communicates with each other which is called machineto-machine communication. Through this communication remains transparent, which improves the quality of the results. Speed– The data transfer speed of IoT device is very high, so that any task can be completed at a very fast speed. Cost Reduction– The use of IoT in business reduces costs. The IoT world is used for the maintenance of goods and equipment, which reduces the cost of equipment maintenance. Automation– Through the IoT, we can achieve automation, automating the work in any business increases the quality of service human presence less. Disadvantage of IoT– Security and Privacy– The main disadvantage of IoT is its security and privacy because all the devices are connected to the internet, so that these devices can be hacked. Hackers can steal money by hacking the user's photo, email, password and even bank account. Complexity– It is very difficult to design, develop and maintain any technology in IoT. Dependency–Nowadays we have become dependent on IoT for most of the work. Online shopping to online banking everything is now being done sitting at home. 242 YCT We can do all the work through mobile, Which has incrased the dependence of human beings on it. Children have become addicted to this technology which is very dangerous. Job Shortage– With the advent of IoT there has been a decrease in jobs because the work done by humans, is now being done by machine, automation has increased through IoT, which has reduced jobs. History of IoT– The creation of smart networks by interconnecting modern equipment was started in 1982 at Carnegie Mellon University. With this, a coke vending machine was created in the University which could tell about the bottles kept inside the machine. Whether it was cold or not and also able to give stock information. But the father of the term internet of things is considered to be the honorable "Kevin Ashton". Those who worked at Procter and Gambler used the word IoT in 1999 from this word the internet of things was formed of this task. He also recommended RFIDRadio Frequency Identification Technology which could give computers the ability to manage different devices. What is data . When data is presented to an electronic machine or to any person in such a way that it is easy to communicate, interpret, process then those data is called data. Data is represented with the help of characters for example- alphabet (a-z, A-Z), number (0, 9) or a special character (@ , ! , #, $, %, *, +, = ) etc. The quantities, characters or symbols on which operations are performed by a computer which may be stored and transmitted in the form of electrical signals and recorded on magnetic, optical or mechanical recording media they are called data. What is Big Data– Big data is also a type of data but with a large size. It is term used to describe a collection of data, which is large in size and is increasing over time. Types of Big Data– There are mainly three type of Big Data– Structured– Any data that can be stored, transmitted and processed in a fixed format an "Employee" table in a database is example of structured data. Like– Employee ID Employee Name Gender 1001 Rahul male 1002 Amit male 1003 Vikash male Unstructured– Any data without any order or structure is know as unstructured data. In addition to being large unstructured poses a number of challenges in terms of its processing for example- the results returned by Google Search. Semi Structured– Semi-structured data is information that does not reside in a relational database Internet of things and its Application but that, does have some organizational proper files that make it easier to analyze. Example of Semi-structured data is a data represented in an XMC file. <employee> <name> Amit </name> <gender> male </gender> <salary> 8000 </salary> </employee> </employee> <name>Vivek</name> <gender> male </gender> <salary> 5500 </salary> </employee> Characteristics of Big Data– Volume– Volume is the most important feature of Big Data, because it is named Big Data after it. When the data is analyzed then its size is the most important, through this we can know how much size the data is. Generally the size of Big Data in Terabytes and Petabytes. Variety– Variation refers to heterogeneous sources and the nature of data, both structured and un-structured. Unstructured camp for something. Variety deals with the storage, mining and analysis of data. Velocity– The term velocity refers to the speed of data generation. The speed at which data flows through business processes, application logs, network and social media sites, sensor mobile devices etc. The flow of data is massive and continuous. Advantages and Disadvantages of Big data Advantages of Big data– • Big data analysis helps in understanding and targeting customers. It helps in optimizing business processes. • It helps in improving science and research. • It improves healthcare and public health with availability of patient records. • It helps in financial trading, sports, polling security/law enforcement etc. • Any one can access vast information via survey and deliver answer of any query. Disadvantages of Big Data– • Traditional storage can cost lot of money to store big data. • Lots of big data is unstructured form. • Big data analysis violates principles of privacy. • Big data analysis is not useful in short run. It needs to be analyzed for longer duration to leverage its benefits. • Big data analysis results are misleading sometimes. Applications of Big Data– Healthcare is a field in which a lot of data is generated, earlier this data could not be used in the health sector. But now using this data to find out the symptoms of a disease, to correct a disease. Big data has been used to do much more and in the coming time, big data will also be used to make medicine for "Corona" virus. Government– Big data analytics has proved to be very useful in the government sector. It contributed in the re-election of Barack Obama in 2012 and it was also very helpful for the BJP of 2019. 243 YCT The Government of India used many techniques to know what voters think about the work of the government and at the some time uses big data to improve policies. Social Media– The data of social media is very much and any company can be successful by analyzing its data. Social media provides us important real-time information and also tells the trends in the market. People share their information through social media and by analyzing those information. They can reach their business and products to the people of needy places. Cyber Security & Intelligence– The security of computer networks is being improved by analyzing big data. Security agency collects and analyzes data from social media and satellite. So that their short comings are discovered and be make better. Architecture of Big Data– To analyze the data in big data is mainly divided into 4 layers, their main function is to analyze the data and divide it into different component. Sources Layer– The main function of the big data source layer is used to find out about the source of the data and what is the format of the data. Such as- a data structured or unstructured, and also to find out the volume and velocity of the source layer. Decision making for all these tasks is the main function of this layer. Data Managing and Store Layer– The function of the data managing and store layer is to preserve the data in its correct format. So that it can be analyzed and converted for example- an image file is being uploading and it has to be stored in the Hadoop Distributed File System (HDFS), then this layer to convert the data according to that file system. Analysis Layer– The function of the analysis layer in big data is use to the information gathered from the source layer and the store layer to create algorithms and present the information that can be accessed using existing tools. This information is used to create advertising and business intelligent methods. Consumption Layer– The main function of the consumption layer is to observe the information provided by the analysis layer and convert it into business intelligence report. Which is used by companies to design and present the product in the market compared to their competitors. Big Data Analytics–- Big data analytics defines the method of analyzing huge amounts of big data. Big data analytics is a process by which large sets of data are collected and analyzed to detect hidden patterns and useful information. Organization use this information to improve their business. More decision efficient, operations by big data analytics can lead to higher profits and happier customers. Internet of things and its Application The work of data analysis is not limited to drawing conclusion to make better decision for the company. Rather they can also do other tasks like machine learning, data architect, data modeler etc. in which they get to explore new algorithms and new aspects, which are related to data analysis. Type of big data Analytics– Big data Analytics is mainly defined in four types– Descriptive Analytics– It is the first stage of data processing in which the previous data is extracted from the raw data and the data is prepared for the next processing. That is, through this the performance report of the business last year can be extracted and accordingly the further strategy can be made. This type of analytics analyzes incoming data in real time for insights about future outlook. Prescriptive Analytics– The most useful analytics technique is prescriptive analytics suggests the best solution out of many choices. Prescriptive analytics adds the task of manipulating the future, providing advice on the possible results and results that key business metrics are likely to maximize. Predictive Analytics– Predictive analytics is most commonly used. It envisions a situation as to what could happen in that situation? It used past data to predict the future so "Predictive Analytics Visualizes Future Events". Diagnostic Analytics– This technique is used when we want to know why something is happening, that it is involves asking questions, why did it happen? Diagnostic analytics looks for the root cause of a problem. It analyzes past performance to determine what happened and why. What is Cloud . Cloud is interconnected networks of services designed to provide computer resources. In this you can work according to your need, it is a huge network. You do not even know about how it brings data in front of you. Cloud computing is a collection of licensed services that are provided by different vendors. What is Cloud Computing– Cloud computing is the technology in which various types of services are provided using the internet. These services can be anything such as software or storage space provided on the server or any other service. Cloud computing means providing any kind of computing services on the demand of the user through the internet. If understood in simple language in this technology the user is provided with the facility of data storage on a server of the internet. Buy purchasing space on the cloud, the user can save his data on it and can access his data from anywhere in the world through the internet. Cloud Computing History– The beginning of cloud computing, a company named Salesforce thanked to provide the service to the peoples of its website. It was 244 YCT only after this that it came to know how important it can prove to be in the coming times. After many years this field gained momentum and by coming in the 21st century many giant companies like Amazon, Google and Microsoft started providing their services in the field of cloud computing. Features of Cloud Computing Resources Pooling– Resource pooling is one of the essential features of cloud computing. Resource pooling means that a cloud service provider can share resources among multiple clients, each providing a different set of services according to their needs. It is a multi-client strategy that can applied to data storage, processing and bandwidth-delivered services. The administration process of allocating resources in real-time does not conflict with the client's experience. On-demand Self-Service– It is one of the important and essential features of cloud computing. This enables the client to continuously monitor server uptime, capabilities and allocated network storage. This is a fundamental feature of cloud computing and a customer can also control the computing capabilities according to their needs. Easy Maintenances– This is one of the best cloud features. Servers are easily maintained and downtime is minimum or sometimes zero. Cloud computing powered resources often undergo several updates to optimize their capabilities and potential. Security– Data security is one of the best features of cloud computing. cloud services make a copy of the stored data to prevent any kind of data loss. If one server loss data by any chance, the copied version is restored from the other server. This feature handy when multiple users are working on a particular file in real-time and file suddenly gets corrupted. Cost Savings– Using web-based services eliminates the need for large expenditures on implementing and maintaining the hardware. Cloud services work on a payas-you-go subscription model. Advantages and Disadvantages of Cloud Computing– Advantages of Cloud Computing–Cloud applications improve collaboration by allowing groups of people to quickly and easily share information in the cloud via shared storage. • On cloud you can provide unlimited storage capacity which you can customize according to your need can increase or decrease. • Data security on the cloud is a huge benefit. Cloud provides facilities to provide a lot of security for data security to protect data. • In cloud computing organization, the maintenance cost of computer hardware and software is reduced. Thereby reducing the cost of the organization. • You can access the cloud from anywhere and can take facility of all the services that the cloud provides. For this you just need to have internet. Internet of things and its Application Disadvantages of Cloud Computing– When you use cloud you must have internet connection, so that user can access his cloud account. Cloud can not be used without internet. • The cloud is fully infrastructure and manage by the cloud provider, so that the cloud provider can discontinue your services at any time. • Many cloud provider company's limit the bandwidth. If you want to increase your bandwidth then you will have to pay for it separately. • A high speed internet connection is required to access the cloud. If you have an internet connection but the speed is slow then you will not be able to use the cloud. How Cloud Computing Works– In cloud computing there can be many server i.e. computers on which a particular type of software is installed, it can be one or more. Cloud computing basically works on dual layers technology to manage the servers. There is a separate layer called backend and second layer which is used by client is called frontend. Similarly the server setup for a complete cloud computing is done by combining both the backend and frontend. Type of Cloud Computing– Cloud computing is divided on the basis of two different method. A. On the basis of deployment. B. Depending on the service provided by the cloud. A. Following are the types of cloud computing on the basis of deployment– 1. Public Cloud– Public cloud available to everyone and it is managed by the service provider. Public cloud services are sometimes free or charged very little for them. Amazon web services (AWS), Microsoft Azure ware all example of public cloud computing. In this type of cloud the infrastructure is hosted by other service providers and which are later made public. 2. Private Cloud– Private cloud will provide the infrastructure to only one organizations or company, whether managed internally or by a third party and hosted either internally or externally. 3. Hybrid Cloud– Hybrid cloud is a combination of public and private cloud, many company use public cloud for their database as well as use a private cloud to store sensitive application. 4. Community Cloud– In community cloud computing, there is sharing of data between such organization that have similar goals and who together form a community. Only members of that community can use this services. 245 YCT B. There are following types of cloud computing based on the service provided by the cloud– 1. Iaas (Infrastructure as a Service) – In this type of service, the computing power, storage, software, network power and all other control of the cloud is with the user. This service is basically used for business. The biggest example of this is VPS (Virtual Private Server) in which you get computing power along with software and network. 2. Pass (Platform as a Service)– In pass the user gets only one platform which can be either storage or computing power. In this things do not control completely only the cloud provider can control them. Example of this are Gmail, Yahoo, Rediff etc. 3. Saas (Software as a Service)– In saas you get only one software hosted on remote server, which is used for a specific task. These type of services are mostly used in small business for example- Google Docs, Website etc. Uses of Cloud Computing– File Storage– Generally users use cloud computing to store, manage and share their files in remotely hosted system. Examples are Google drive and drop box. Website Hosting– Cloud hosting is used to host any websites in addition to hosting your website. Cloud host provide also provide their own computing resources. Backup and Recovery– Businesses and organizations usually backup their data a storage device, but its not very effective. Such as loss or damage to the device, that is you can easily back up your data in cloud base backup, in this way it is also easy to recover data. Test and Development– Cloud computing also play a good role in the testing and development of any software and network. Cloud services help to check whether your software is running smoothly or there is no error in it. Example of Cloud Computing– YouTube– YouTube is famous video sharing platform, in which millions of videos are uploaded daily in such a situation. YouTube uses cloud computing to store so many videos. Facebook– Facebook is famous social media platform which on the millions of people profile and lot of data are available to store it facebook also uses cloud computing. Emails– All the companies providing email services such as Gmail, Rediff, Yahoo and all the companies providing online storage such as drop box, yadex, media fire mega etc. all uses cloud computing. Virtual Reality Virtual Reality is a computer device used to create an imaginary world. The world created in virtual reality makes the user feel the presence of the world that in which he is. Virtual reality makes the user feel the ability Internet of things and its Application to manipulate the objects present in the world and navigate through it, so that he can feel his presence in that object and can also do action-reaction. To create virtual reality special types of glasses are presented on the glass as well as the user has to wear fiber hand gloves from which he controls the actions. Like - playing a car race game on a computer. We get involved in the game in such a way that we are actually driving the car, but in reality it does not happen thus virtual reality given an impression of reality. Characteristics of Virtual Reality– Believable– You feel like you're in the virtual world through what you see and hear. Full Immersive– As you move your head around with the VR headset on, what you see changes as well, just as it world in real life. Computer-generated– VR world are usually created with complex 3D computer graphics that change in real time as we move. Interactive– You can interact with and move the different objects in the scene. Internet Technology– The internet is a network of global system interconnected with computers that connect any computer in the world through routers and servers. In other words, the connection established between two computers through TCP/IP protocol to exchange information is called internet. Internet is the largest network in the world. History of Internet– The first workable prototype of the internet came in the late 1960s with the creation of ARPANET, or the Advanced Research Projects Agency Network. Originally funded by the U.S. Department of defense, ARPANET used packet switching to allow multiple computers to communicate on a single network. The internet is a vast network that connects computers all over the world. Through the internet, people can share information and communicate form anywhere with an internet connection. Protocol– A protocol is a set of rule that govern the process of exchanging information. The standard protocols used for this purpose are TCP, IP, FTP, UDP etc. TCP/IP– TCP stands for transmission control protocol and IP stands for internet protocol. Internet protocol suite commonly known as TCP/IP. IP handles datagram routing while TCP handles higher level functions such as segmentation, reconnection and error detection. It is a collection of communication protocols. There are four layers in TCP/IP. Application Layer Transport Layer Internet Layer Network Interface Layer (i) Application Layer Protocol– The application layer serves as the top 3 layer (application, presentation, session) of the OSI model. It is responsible for nodeto-node communication and user interface. 246 YCT (ii) Transport Layer Protocol– This is the third layer from the bottom. It is responsible for all types of data transfer. It establishes connection oriented and connectionless communication. In this layer TCP and UDP protocols are included. TCP is a connection based and reliable protocol whereas UDP is connectionless protocol. (iii) Internet Layer Protocol– This protocol is responsible for routing. Its purpose is to follow a set of protocols to deliver data packets to the destination as per the information contained in the packet header. The main function of this layer is to send IP address, routing and avoiding traffic. (iv) Network Interface Layer Protocol– This is the bottom layer of the TCP/IP model and contains the physical and datalink layers of the OSI model. It recognizes the characteristics of the protocol, hardware and media used for communication. FTP–File Transfer Protocol (FTP) is a standard communication protocol used to transmit files between computers over the internet. FTP is an application layer protocol that transfer files between local and remote file systems. UDP–User Datagram Protocol (UDP) is a widely used transport protocol. It is faster than TCP but it is less reliable. It is used to transmit small size data packets. These small sized data packets is known as datagram. HTTP–HTTP stands for Hypertext Transfer Protocol. HTTP is used to transfer data over the web. It is an application layer protocol that allows users to communicate data over the world wide web (www). LAN (Local Area Network)– A Local Area Network is a network used within a very small geographical area (about 1 km) such as a home, school, computer lab, office building etc. within a group. It is used to connect network and computer accessories. In this communication, devices like hubs, switches are used. The hub, switch and router are connected to an Ethernet cable via an RJ45 port. MAN (Metropolitan Area Network)– MAN is the extended form of LAN which covers a large geographical area like city or town. The data transfer rate in MAN is in Mbps. In MAN, different LANs are connected to each other through a telephone exchange line. It can be extended up to 30-40 km. Routers, Internet of things and its Application switches and hubs together form a metropolitan area network. Government agencies use MAN to connect with citizens and private industries. WAN (Wide Area Network)– A wide area network is a type of network that transmits voice, data, image and video across a geographic area. It is a group of local area networks. It connects different cities, states or countries. Example- connects districts and all state headquarters. Internet is also a type of wide area network, it is spread all over the world. Data communication is done with the help of hubs, switches, fiber optics, modems and routers etc. and technologies like ATM, ISDN, MPLS, frame relay are used to transfer data through the internet. Search Engines– A search engines is a software that searches the desired information, web pages, images etc. from the database of the internet and displays the results to the user on the browser. The search engine searches any web page on the basis of its title, key words or any phrase located on that page. The results displayed on a search are often arranged in a list according to the most frequently visited pages. Some of the popular search engines are as follows– (i) Google (ii) Yahoo (iii) Ask.com (iv) Bing (v) Duck Duck Go (i) Google– Google is a famous search engine, which was created by Sergey Brin and Larry Page, two Ph.D students of (Stanford University California). Initially its name was BACKRUB, later in 1997 it was renamed as Google. Initially it was made for ranking. 247 YCT (ii) Yahoo– Yahoo is a search engine, started in 1994 by Jerry Yang and David Fillo at Stanford University. But it was registered in 1995. (iii) Ask.com– It is a question-answer based e-business and web search engine. Ask browser toolbar is an extension that displays as a separate bar on the browser window. It was created in 1996 in California by Garrett Gruener and David Warthen. (iv) Bing– It was launched by Microsoft on 3 June 2009 as a web search engine. (v) Duck Duck Go– Duck Duck Go (also abbreviated as DDG) is an internet search engine that emphasizes on protecting searchers privacy and avoiding the filter bubble of personalized search results. Introduction to online & offline messaging– If a person is active over a messaging tool and able to accept the messages, it is termed as online message and if the person is not available and the message is left to view when the person is back, it is termed as offline message. Instant messaging technology is a type of online message allowing real-time text transmission over the internet or another computer network. Messages are typically transmitted between two or more parties, who are all connected on a common network. Instead of using mobile or Wi-Fi data like popular messaging apps such as Whatsapp. The offline messaging apps create a peerto-peer bluetooth mesh network or Wi-Fi direct-based network on your phone eliminating the need for mobile data services. The network uses these nodes to transfer data across devices. World Wide Web Browsers– The World Wide Web was the first web browser invented by Team Berners Lee in 1990. The World Wide Web is known as the Web. It is a large group of interconnected information (web pages) through hyper links, which can be accessed on the internet with the help of a web browser. The World Wide Web is a system that interconnects the information gathered in many computers with the help of hyper text documents and hyper text transfer protocol (http). It is used to send these information from one place to another. Which exchanges data with the help of hyper links. Web Page– Each page stored on the World Wide Web (WWW) is called a webpage, which is created using HTML (Hyper Text Markup Language). Web pages are stored on web servers and can contain a large amount of information, including text, graphics, audio, video and hyperlinks. Hyperlink– A hyperlink is that part of HTML text in which the address of another page or webpage is given. On clicking the hyperlink, the computer shows us the page or webpage. Web Publishing– Web publishing is the process of publishing original content on the internet. The process includes building and uploading websites, updating the Internet of things and its Application associated webpages and posting content to these web pages online. The content meant for web publishing can include text, videos, digital images, artwork and other forms of media. Web publishing comprises of personal, business and community websites in addition to e-books and blogs. Publishers must possess a web server, a web publishing software and an internet connection to carry out web publishing. Web publishing is also known as online publishing. These are the 5 steps to publish your website 1. Prepare your website content– The structure and layout of a web design converges around content. The communication of ideas informs everything from navigation to the arrangement of writing and visuals. When you don't work with the actual text and images, your design is only an approximation. Go over your content are make sure that it's in great shape before you place a single element in your design. Optimize your content for SEO and having SEO in place makes the content you are working with even more accurate. 2. Design and build your website– This is the biggest step in this process. There are many way to arrange your pages with a layout. • Select appropriate typography • Create a user experience • Develop a consistent and usable user interface 3. Find Web Hosting– When looking for hosting you need to consider the speed, reliability, level of security as well as the ease of scalability to accommodate future traffic growth. 4. Do a quality assurance audit– Your website is done, you found web hosting and you are ready to put it out into the world. Before you hit the publish button make sure to do a thorough QA before going live. The process of creating a website can be a long one, with many changes and edits that may have happened along the way. • Proofread the content • Check the spelling • Do a grammar check • Check all the text • Optimize images • Follow proper semantic structure • Test links and integrations 5. Publish your website with a domain name– A domain host provides a domain name like www.yourdomainname.com that visitors can use to find you. A domain name is an identification string that defines a realm of administrative autonomy, authority or control within the internet. Domain names are used in various networking contexts and for application specific naming and addressing purposes. 248 YCT visual imagery in order to make the website more visually appealing and easy to use. Developing a web page involves designing and implementing the part that your readers see and interact with, known as the front end, as well as the programming and database element of the page, known as the back end. Web design has numerous components that work together to create the finished experience of a website, including graphic design, user experience design, interface design, search engine optimization (SEO) and content creation. These elements determine how a website looks, feels and works on various devices. Website Maintenance– Website maintenance is the practice of monitoring your websites overall health and performance. Keeping a website up-to-date it is crucial to ensure it's working at full capacity, engaging and retaining site visitors. There are a number of tasks required to properly check and maintain a website, including updating security software and plugins, adding fresh content, increasing new and returning traffic and meeting the satisfaction of your site users. Website maintenance can impact your business first impressions, SEO strategy, security and sales. Whether you are a business owner or starting a blog, you will want to make sure that when people and search engines land on your site. They will immediately see the benefits of your sites offerings or risk losing them. This means that your ability to retain online interest lies primarily in your website maintenance. HTML Tools– HTML tools prove to be a great help when it comes to step up their workflow and perform repetitive tasks. These tools are blessed with all the richness and power that help webmasters to augment the value of their work and improve the usability of their web designs. They are compelling enough to build beautiful and responsive website in the quickest possible manner. The majority of HTML5 tools is available for free and they are popular because they take less time and efforts to fabricate a commendable website. Using HTML5 tools, developers can easily incorporate eyecatching animation effects, video, fonts and graphics to their websites. You can pick any one of them to manage and build the code for your website. 1. Font Dragr 2. HTML5 Maker 3. HTML Kickstart 4. Initializer 5. Liveweave 6. Adobe Edge Animate 7. Modernizr 8. CrossWalk 9. Online 3D sketch 10. Patternizer Creation & Maintenance of websites 1. Font Dragr– Font dragr is all what you need to Website Creation– Web design is a web preview custom web fonts in the browser. It's a very development process for creating a website that focuses simple tool that comes with a drag and drop on aesthetic factors like layout, user interface and other interface allowing you to drop your typeface, Basic Knowledge HTML, XML and Scripts HTML (Hyper Text Markup Language)– Hyper text markup language (HTML) is the standard markup language for web page documents to be displayed in web browsers. Which is used to give the structure of the webpage and its content. The structure of the web page is created using paragraphs, lists, images and data tables. HTML allows creating and structuring sections, headings, links, paragraphs and more in a webpage using various tags and elements. <!DOCTYPE html>– All HTML documents must start with a <!DOCTYPE html> declaration. The declaration is not an HTML tag. It is an information to the browser about what document type to expect. like– HTML5 declaration <!DOCTYPE html> <html>– This is the root element of an HTML page called the start tag. This is the first tag of an HTML document. <head>– This element contains the meta data of the HTML page. <title>– This element is for the title of the HTML page which is shown in the title bar of the browser or in the tab of the web page. <body>– This is the container for all the visible content or information that defines the body of the document. This tag is required for every HTML document and should only use once in the whole HTML document. XML (Extensible Markup Language)– Extensible Markup Language (XML) is a markup language and a file format for storing, transmitting and reconstructing arbitrary data. It defines a set of rules for encoding documents in a format that is both human-readable and machine-readable. XML is one of the most widely used formats for sharing structured information, between programs, between people, between computer and people, both locally and across networks. If you are already familiar with HTML, you can see that XML is very similar. Scripts– In computer programming, a script is a program or sequence of instructions that is interpreted or carried out by another program rather than by the computer processor (as a compiled program). As with scripts in general, scripting language are mostly used to automate processes at the application level. At the command line or through a web server, they are able to execute programs running on a web server and display the appropriate results to the users. Every computer user uses scripts of some kind, even if they are not aware of it. Scripts are sometimes used to customize and automate repeated tasks and control overall computer functions. Internet of things and its Application 249 YCT scalable vector graphics and web open fonts on the web page to test all of them instantly. Use font dragr to instantly load your font and know whether it's appropriate or not. 2. HTML5 Maker– Animation make a dynamic visual impact on the appearance of a website and HTML5 maker is a richly different take on this aspect. Being the finest online animation tool, HTML5 maker makes it easy for developers to add interactive content to their website with the help of HTML, CSS and Javascript. 3. HTML kickstart– HTML kickstart is a set of HTML, CSS, JQuery elements and layouts that together help you to start your HTML5 venture while saving you a lot of precious time and efforts. 4. Initializer– Initializer is a high-end HTML5 tool and template generator to help you kick start your next HTML5 boilerplate project quickly. It's nice tool for developing impressive and customizable template to suit your project needs. 5. Liveweave– Liveweave is yet another exemplary HTML5 tool that comes packed with context sensitive auto completion for both HTML and CSS. The tool provides you a playground to play around different codes and tag elements to structure your project. Liveweave is a highly sough-after tool among front-end developers as it helps them generate HTML and CSS tags automatically. 6. Adobe Edge Animate– Adobe edge animate is a compelling tool for HTML5 developers for creating interactive HTML animations. If you are a part of digital publishing, web or advertisement then adobe edge animation will surely appease you. 7. Modernizr– Modernizr is an advanced open source javascript library that allows designers to create pleasurable website experiences on the basis of visitors browser. Using this tool, you can easily detect whether the current browser supports CSS3 and HTML5 features. This way you can make your website suitable as per the browser. 8. CrossWalk–Create cutting-edge HTML5 applications using crosswalk. In its bare bones, crosswalk is a web runtime tool that comes complete with outstanding features of a modern browser. Crosswalk is a tool that deserves your attention for constructing interactive mobile applications. 9. Online 3D Sketch– Online 3D sketch is a remarkable tool that makes the process of creating sketches and drawings absolutely fun and easy. It's a free online tool that allows developers to create and share their drawing experiences among their friends and team members while encouraging their valuable feedbacks. 10. Patternizer– As the name suggests, patternizer is a tool that enables developers to develop inspiring patterns for their website. The tool is available for free and allows you to integrate clean codes to Internet of things and its Application generate impressive patterns that are sure to please your website visitors. Multimedia and Graphics– Computer graphics are picture and films created using computers. Multimedia is content that uses a combination of different content forms such as text, audio, images, animations, video and interactive content. Multimedia– The word multi and media are combined to form the word multimedia. That is many types of media (hardware/software) used for communication of information. Multimedia is a representation of information in an attractive and interactive manner with the use of a combination of text, audio, video, graphics and animation. In other words, we can say that multimedia is a computerized method of presenting information combining textual data, audio, video, graphics and animations. Component of Multimedia Text– All multimedia productions contain some amount of text. The text can be in a variety of fonts and sizes to match the multimedia softwares professional presentation. Graphics– Graphics make the multimedia application attractive. In many circumstances, people dislike reading big amounts of material on computers. As a result, pictures are more frequently used than words to clarify concepts, offer background information and so on. Graphics are at the heart of any multimedia presentation. Audio– A multimedia application may require the use of speech, music and sound effects. These are called audio or sound element of multimedia. Sound is the most serious aspect of multimedia, delivering the joy of music, special effects and other forms of entertainment. Speech is also a perfect way for teaching. Computer stores the sound in digital form. Therefore the sound used in multimedia application is digital audio. Video– The term video refers to the moving picture, accompanied by sound such as a picture in television. Video element of multimedia application gives a lot of information in small duration of time. Digital video is useful in multimedia application for showing real life objects. Digital video files can be stored like any other files in the computer and the quality of the video can still be maintained. The digital video clips can be edited easily. Animation– Animation is a process of making a static image look like it is moving. An animation is just a continuous series of still images that are displayed in a sequence. The animation can be used effectively for attracting attention. Animation also makes a presentation light and attractive. Animation is very popular in multimedia application. Graphics– A graphic is an image or visual representation of an object. Therefore, computer graphics are simple images displayed on a computer screen. Graphics are often contrasted with text, which is 250 YCT comprised of characters, such as numbers and letters, rather than images. Computer graphics are separated into two different categories– raster graphics and vector graphics. Raster Graphics– Raster graphics represents image by bitmaps stored in computer memory and displayed on a screen composed of tiny pixels. Each pixel is represented by one or more memory bits. Also known as bitmaps and one bit per pixel suffices for black and white images, while four bits per pixel specify a 16 step gray scale image. Vector Graphics– Whereas raster graphics depend on pixels vector graphics use path made from a mathematical formula. The formula also known as vectors, tells the path its shape, color and if there is one its border. Vector graphics are computer images created using a sequence of commands or mathematical statements that place lines and shapes in a twodimensional or three-dimensional space. Voice Mail and Video Conferencing– Voice Mail– Voicemail is a computerized system that allows callers to leave a message. A voicemail is an electronically stored voice message that is left by a caller to be retrieved later by the intended recipient. Callers leave short messages that are stored on digital media. It is stored on the service providers server, in a space reserved for the user called a mailbox. Voicemail has the same characteristics of email, except that the messages are voices instead of text. Voicemail comes with features like a user interface to enable selecting, playing and managing of messages. Voicemail message receive from many callers at the same time and broadcast voice messages to send to more than one person at the same time. Video Conferencing– Video conferencing is live, visual connection between two or more remote parties over the internet that simulates a face to face meeting. With a strong internet connection, the participants can see, hear and talk to each other in real time, no matter where in the world they are. Video conferencing is important because it joins people who would not normally be able to form a face to face connection. This technology is particularly convenient for business users in different cities or even different countries because it saves time, expenses and hassles associated with business travel. Uses of video conferencing include holding routine meetings, negotiating business deals and interviewing job candidates. When a video conference is held for informal purposes, it is called a video call or video chat. Components of video conferencing– • Video Camera or Webcam • Display device (computer monitor, television, projector or laptop) Internet of things and its Application Microphone, Speakers A stable internet connection A computer or conference phone Video conferencing software Video Conferencing Protocols– Internet communication simply means communication between two or many users over the internet or the WWW (World Wide Web). The communication can be in the form of texting, sharing information, videos, audios, ideas, video chatting etc. Some protocols of video conferencing are– • • • • 1. Video Conferencing Protocol H.323– • Designed by ITU (International Telecommunication Union) • Computer language used is binary • Provides multimedia communication over a variety of networks. • It is quite complex, possibilities of delay. • Multipoint Control Unit (MCU), gateway, gatekeeper (optional) and the terminal are some functioning components. 2. SIP (Session Initiation Protocol)– • Designed by IETF (Internet Engineering Task Force) • Computer Language used is ASCII • Highly Flexible and Simple • User-Agent and Network server are two major functioning components. • Used to establish, modify and terminate multimedia sessions or calls • Resembles HTTP protocol • Works with both IPv4 and IPv6. Introduction to e-commerce– E-commerce (electronic commerce) is the buying and selling of goods and services or the transmitting of funds or data, over the internet. E-commerce is also known as electronic commerce or internet commerce. There are no physical market places and the entire process of marketing and selling of goods, takes place online or electronically. Online stores like Amazon, Flipkart, Shopify, Myntra, Ebay, Olx are example of e-commerce websites. These business transactions occur either as business-to-business (B2B), business-to-consumer (B2C), consumer-toconsumer (C2C) or consumer-to-business (C2B). The terms e-commerce and e-business are often used interchangeably. The term e-tail is also sometimes used in reference to the transactional process that make up online retail shopping. 251 YCT Types of E-commerce Models– Electronic commerce (e-commerce) can be classified into four main categories. The basis for this simple classification is the parties that are involved in the transactions. So the four basic e-commerce models are as follow. 1. Business-to-Business (B2B) 2. Business-to-Consumer (B2C) 3. Consumer-to-Consumer (C2C) 4. Consumer-to-Business (C2B) 1. Business-to-Business (B2B)– Business to Business e-commerce refers to the electronic exchange of products, services or information between businesses. Here the companies are doing business with each other. The final consumer is not involved. So the online transaction only involve the manufactures, wholesalers, retailers etc. 2. Business-to-Consumer (B2C)– Business to Consumer is the retail part of e-commerce on the internet. It is when businesses sell products, services or information directly to consumers. The consumer can browse their website and look at products, pictures, read reviews. Then they place their order and the company ships the goods directly to them. Popular examples are Amazon, Flipkart etc. 3. Consumer-to-Consumer (C2C)– Consumer to Consumer is a type of e-commerce in which consumers trade products, services and information with each other online. These transactions are generally conducted through a third party that provides an online platform on which the transactions are carried out. Consumer to consumer are direct contact with each other. It helps people sell their personal good and assets directly to an interested party. Usually, goods traded are car, bikes, electronics etc. and the example of this model is OLX, Quikr etc. 4. Consumer-to-Business (C2B)– This is the opposite of the traditional commerce model of B2C. Consumer to Business is a type of e-commerce in which consumers make their products and services available online for companies to bid on and purchase. A popular example of C2B platform is a market that sales royalty-free photographs, images, media and design elements, such as istock. Important Facts HTTPS– Hypertext Transfer Protocol Secure is an extension of the Hypertext Transfer Protocol. It is used for secure communication over a computer network and is widely used on the internet. IP Address– An Internet Protocol address (IP address) is a numerical label assigned to each device connected to a computer network that uses the internet protocol for communication. Internet of things and its Application Intranet– An intranet is a private network that can only be accessed by authorized users. Some intranet are limited to a specific local area network (LAN), while others can be accessed from remote locations over the internet. Email– The history of modern internet email services reaches back to early ARPANET, with standards for encoding email messages published as early as 1973. Ray Tomlinson is credited as the inventor of networked email in 1971, he developed the first system able to send mail between users on different hosts across the ARPANET, using the @ sign to link the user name with a destination server. Electronic mail (e-mail or email) is a method of exchanging messages (mail) between people using electronic devices. A world wide e-mail network allows people to exchange e-mail messages very quickly. Email Spam– Email spam, also referred to as junk email or simply spam is unsolicited messages sent in bulk by email (Spamming). SMTP– The Simple Mail Transfer Protocol (SMTP) is an internet standard communication protocol for electronic mail transmission. Mail servers and other message transfer agents use SMTP to send and receive mail messages. FTP– The File Transfer Protocol (FTP) is a standard communication protocol used for the transfer of computer files from a server to a client on a computer network. FTP is design for sending files to a server on the internet. EPS File– EPS (Encapsulated Post Script) is perhaps the most common vector image format. It is the standard interchange format in the print industry. EPS files also contain bitmap data, retaining individual coding on colour and size. This means the image retains its resolution regardless of scale. RGB Model– The main purpose of the RGB colour model is for the sensing, representation and display of images in electronic systems, such as televisions and computers though it has also been used in conventional photography. B2G– Business-To-Government (B2G), also known as Business-To-Administration (B2A), refers to trade between the business sector as a supplier and a government body as a customer. ARP– The Address Resolution Protocol (ARP) is a communication protocol used for discovering the link layer address, such as a MAC address, associated with a given internet layer address, typically an IPv4 address. This mapping is a critical function in the internet protocol suite. IPv6– Internet Protocol Version (IPv6) is the most recent version of the Internet Protocol (IP). All IPv6 addresses are 128 bits long, written as 8 sections of 16 bits each. 252 YCT Important Questions Asked in Previous Years Examinations 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. AMQP stands for– (a) Advanced Mass Query Protocol (b) Advanced Message Queuing Protocol (c) Add-on Message Query Protocol (d) Add-on Message Queuing Protocol What does IDE stand for? (a) In Deep Environment (b) Integrated Development Environment (c) Internal Deep Escape (d) IDLE Which is not a characteristic of TCP/IP Model? (a) Connection-oriented protocol. (b) Implements flow control (c) Support for a flexible architecture (d) Unreliable Which of the following things can have an effect on the development of an individual's personality? (a) physical and mental capabilities (b) health and physical appearance (c) skin color and gender (d) all of the above The huge number of devices connected to the IoT to communicate automatically. It is called– (a) Bot to Bot (B2B) (b) Machine to Machine (M2M) (c) Skynet (d) InterCloud IoT security management includes– (a) Protocol abstraction (b) Simple and fast installation (c) Security with hardware (d) Data storage IoT data scalability includes _____. (a) Protocol abstraction (b) Simple and fast installation (c) Security with hardware (d) Data storage Which protocol is used to link all the devices in the IoT? (a) TCP/IP (b) Network (c) UDP (d) HTTP ______ supports low energy radio operation. (a) IETF 6LoWPAN (b) IEFT CoAP (c) RFID/NFC (d) Bluetooth MQTT stands for– (a) Mass Query Telemetry Transport (b) Message Queuing Telemetry Transport (c) Message Query Text Transport (d) Mass Queuing Text Transport What is the microcontroller used in Arduino UNO? (a) ATmega328P (b) ATmega2560 (c) ATmega32114 (d) AT91SAM3x8E What does GPIO stands for? (a) General Purpose Inner Outer (b) General Purpose Input/Output (c) General Purpose Intersected Old (d) General Purpose Input Outpur Internet of things and its Application 13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 23. 24. 25. 253 Which of the following is not a TCP/IP layer? (a) Application Layer (b) Transport Layer (c) Network Layer (d) Data Link Layer Which of the following communication medium supports highest data rate? (a) Ethernet (b) Bluetooth (c) Optical Fibre (d) Wi-Fi The IIoT stands for– (a) Indepth Internet of Things (b) Innovative Internet of Things (c) Information Internet of Things (d) Industrial Internet of Things What are the challenges in IoT? (a) Energy Consumption (b) Security (c) Network Congestion (d) All the above ________ tags, devices, smart phones useful in identification. (a) IETF 6LoWPAN (b) IEFT CoAP (c) RFID/NFC (d) IEEE 802.15.4LoWPAN Which protocol interacts asynchronously over UDP? (a) HMTP (b) CoAP (c) MQTT (d) TCP/IP WSN stands for _____. (a) Wired Sensor Network (b) Wireless Sensor Network (c) Wired Service Network (d) Wireless Service Network Which of the following design is a high level design without any detail? (a) Logical Design (b) Physical Design (c) Both (a) and (b) (d) None of the these Which one of the technologies is not a technology of software IoT system? (a) M2M (b) Data Collection (c) Device Integration (d) Real time Analytics What is a private key? (a) A key on your key chain (b) A key not to be given to the public (c) A key that opens a secret door (d) A key given to the public Communication is a non stop _____. (a) Process (b) Paper (c)Programme (d) Plan Full form of OSI Model. (a) Option systems Interconnection (b) Output systems Interconnection (c) Open system Interconnection (d) None of these _______ is an open light-weight easy to implement messaging protocol for M2M communication. (a) XMPP (Extensible Messaging and Presence Protocol) YCT 26. 27. 28. 29. 30. 31. 32. 33. 34. 35. 36. 37. 38. 39. 40. (b) MQTT (Message Queuing Telementry Transport) (c) AMQP (Advance Message Queuing Protocol) (d) HTTP (Hypertext Transfer Protocol) Who is the real creator of Bitcoin? (a) Santoshi Nakamoto (b) Jeff Bezos (c) Jerry Yang (d) Paul Allen Which is the seventh layer of OSI model? (a) Physical layer (b) Presentation layer (c) Application layer (d) Data Link layer Which of the following is not a part of IoT applications? (a) Smart city (b) Connected Cars (c) Home automation (d) Television Arduino is a prototype based on an ---- to use? (a) Hardware (b) Software (c) Both (a) and (b) (d) None of the above Which of the following is not element of IoT? (a) Data Cloud (b) System Security (c) User interface (d) People Full form of SIG is _____. (a) Special Interface Group (b) Special Interest Group (c) Standard Interface Group (d) None of these To secure your data in IoT devices. (a) Keep changing your password (b) Keep updated your device (c) Reduce your use of Cloud Technology (d) All of above Which layer of the OSI model does data compression? (a) Network (b) Data link (c) Physical (d) Presentation Which of the following electronic components stores electric charge? (a) Resistor (b) Capacitor (c) LED (d) Relay Li-Fi technology is base on _____ for high speed data transmission. (a) VLC (Visible Light Communication) (b) Wi-Fi (c) Cellular Network (d) Twisted Pair Cables PubNub ……….. publishes and subscribes in order to send and receive message. (a) Network (b) Account (c) Portal (d) Keys Arduino in an _____ plateform. (a) Open-source (b) Close source (c) Adware (d) All of the above Which type of cable has glass center core? (a) UTP (b) Fiber-optic (c) STP (d) Coaxial The CISC stand for ______. (a) Computer Instruction Set Compliment (b) Complete Instruction Set Components (c) Computer Indexed Set Componets (d) Complex Instruction Set computer What is the minimum operating frequency of the Arduino UNO broad? Internet of things and its Application 41. 42. 43. 44. 45. 46. 47. 48. 49. 50. 51. 52. 53. 54. 55. 56. 254 (a) 20 MHz (b) 16 MHz (c) 6 MHz (d) 10 MHz Which one of the following protocol is mainly used for home automation? (a) Bluetooth protocol (b) X-10 protocol (c) MQTT (d) Zigbee protocol Which transport layer protocol is used by DHCP? (a) RSVP (b) TCP (c) DCCP (d) UDP Which of the following is not weakness of IoT? (a) Communication attacks (b) Life cycle attack (c) Physical attack (d) Cost reduction End-to-end connection is established by ______ protocol of the TCP/IP suite. (a) IP (b) UDP (c) TCP (d) All of these The RISC Stands for ______. (a) Reduced Instruction Set Computer (b) Revise Instruction Set Computer (c) Reduced Instrument Set Computer (d) Reduced Instrument Setting Computer A program that is used to view websites is called a: (a) Browser (b) Web viewer (c) Spreadsheet (d) Word processor TCP/IP is a: (a) Network Hardware (b) Network Software (c) Protocol (d) None of these Which IP address is reserved for loop back or local host: (a) 192.168.0.0 (b) 127.0.0.0 (c) 127.0.0.1 (d) None of these The size of the IPv4 is: (a) 16 bits (b) 32 bits (c) 64 bits (d) 128 bits Who provide us internet: (a) TCP (b) ISP (c) FTP (d) HTTP Which is not the search engine: (a) Altavista.com (b) Google.com (c) Yahoo.com (d) Facebook.com What protocol does www use: (a) HTTP (b) FTP (c) WBC (d) MTP In computer FTP stands for (a) file transfer protocol (b) finding telepath (c) finish tele program (d) file transfer process Bluetooth is a technology that connected devices in a small area: (a) VLAN (b) Wireless LAN (c) Wired LAN (d) None of the above The Word Wide Web (www) is the largest: (a) LAN (b) MAN (c) WAN (d) All of these Computer network over a large area such as a city: (a) LAN (b) WLAN (c) PAN (d) MAN YCT 57. 58. 59. 60. 61. 62. 63. 64. 65. 66. 67. 68. 69. 70. What is the acronym MAN stands for: (a) Magnetic Access Network (b) Multi-Area Network (c) Metropolitan Area Network (d) Multi-Access Net How many layers are present in the TCP/IP reference model? (a) 6 (b) 7 (c) 5 (d) 4 The packets of data that is transported by IP is called: (a) datagrams (b) frames (c) segments (d) encapsulate message Arrange the search engines by there popularity: 1. Bing 2. Yahoo 3. Ask 4. Goolge (a) 4321 (b) 4312 (c) 4231 (d) 4213 SEO stands for: (a) Search Entry Optimization (b) Search Engine Optimization (c) Search Engine Operation (d) None of the above Website is a collection of (a) Webpage (b) HTML page (c) Both (a) and (b) (d) HTTP page Which is a client program that acts as an interface between user and World Wide Web. (a) Web browser (b) HTML (c) URL (d) OS A multimedia file (a) is same as any other regular file (b) must be accessed at specific rate (c) stored on remote server cannot be delivered to client (d) none of the mentioned In which type of streaming multimedia file is delivered to the client but not shared? (a) real-time streaming (b) progressive download (c) compression (d) none of the mentioned The graphics can be (a) Drawing (b) Photograph, movies (c) Simulation (d) All of these The component of interactive computer graphics are: (a) A light pen (b) Display unit (c) Bank of switches (d) All of these Several graphics image file formats that are used by most of graphics system are (a) GIF (b) JPEG (c) TIFF (d) All of these The length of on IPv6 address is: (a) 16 bits (b) 32 bits (c) 64 bits (d) 128 bits Internet is an example of: (a) LAN (b) MAN (c) WAN (d) None of these Internet of things and its Application 71. 72. 73. 74. 75. 76. 77. 78. 79. 80. 81. 82. 83. 255 TCP/IP is an example of (a) communication protocol (b) networking protocol (c) data transfer protocol (d) all of the above The network protocol which is used to get MAC address of a node by providing IP address is (a) SMTP (b) ARP (c) RIP (d) BOOTP The address resolution protocol (ARP) is used for (a) Finding the IP address from the DNS (b) Finding the IP address of the default gateway (c) Finding the IP address that corresponds to a MAC address (d) Finding the MAC address that corresponds to a IP address An example of an internet search engine is (a) Windows (b) Linux (c) Yahoo (d) MS Word What is the name of the software that allows us to browse through web pages called: (a) Browser (b) Mail client (c) FTP client (d) Messenger Buying and selling goods over the internet is called: (a) Hyper-marketing (b) E-commerce (c) Cyber-selling (d) Euro-conversion Which of the following e-commerce company has launched shopsy, an app that allows Indians to start online shops for free. (a) Amazon (b) Snapdeal (c) Filpkart (d) Paytm Which segment do Flipkart, Amazon, eBay etc. belong to: (a) B2G (b) C2C (c) B2B (d) B2C Which of the following is TRUE only for XML but not for HTML: (a) It is derived from SGML (b) It describes content and layout (c) It allows user defined tags (d) It is restricted only to be used with web browsers Which network has the highest speed of data transfer: (a) MAN (b) WAN (c) LAN (d) SAN Which of the following protocols may be used for accessing World Wide Web? (a) HTTP (b) SMTP (c) SLIP (d) None of the above A network spreading in different geographical location is known as (a) LAN (b) WAN (c) Both (a) and (b) (d) None of the above A set of rules that governs data communication: (a) Rule (b) Medium (c) Link (d) Protocol YCT 84. 85. 86. 87. 88. 89. 90. 91. 92. 93. 94. 95. 96. 97. What is the scope of e-commerce business platform like Flipkart, Amazon etc. (a) Virtual (b) National (c) Local (d) Global Used for video conferencing: (a) Zoom (b) Skype (c) Both (a) & (b) (d) None of these ____ is used to store the data within the document on the server. (a) XML (b) DHTML (c) HTML (d) CGI Which language is case sensitive? (a) HTML (b) XML (c) Both (a) & (b) (d) None of the above What does XML stands for: (a) Extra Modern Link (b) Extensible Markup Language (c) Example Markup Language (d) X-Markup Language A proper scripting language is a (a) High level programming language (b) Assembly level programming language (c) Machine level programming language (d) Low level programming language Which tag tells browser where the page starts and stops: (a) <html> (b) <body> (c) <head> (d) <title> Types of computer graphics are (a) scalar and raster (b) vector and raster (c) vector and scalar (d) none of these The GIF format is much ____ to be downloaded or uploaded over the www. (a) slower (b) faster (c) medium (d) none of these Once a file is saved in JPEG format some data is lost (a) Temporarily (b) Permanently (c) Both (a) & (b) (d) None What is a method of communication between two persons with personal computers who are both connected online through the internet? (a) E-Groups (b) Audio Visual Conference (c) Multimedia Conference (d) Audio-Video Conference What is an electronic communication network for the interconnection of computers to access different websites. (a) Wi-Fi (b) Bluetooth (c) Internet (d) Broadband Which one of the following telephonic conferencing with a radio link is very popular throughout the world? (a) TPS (b) Telepresence (c) Video conference (d) Video teletext Voice Mail is called (a) Voice sequence (b) Voice message (c) Both (a) & (b) (d) None of these Internet of things and its Application 98. Graphics programs are those that create (a) Designs (b) Pictures (c) Images (d) All of the above 99. Video conferencing is used for: (a) Business (b) Education (c) Health (d) All of the above 100. Vector graphics is composed of (a) Pixels (b) Palette (c) Paths (d) None of these 101. Raster graphics are composed of (a) Paths (b) Pixels (c) Palette (d) None of these 102. The quality of an image depends on (a) No of resolution used by image (b) No. of pixel used by image (c) No. of line used by image (d) None 103. EPS image file format is used for (a) Vector graphics (b) Bitmap (c) Both (a) & (b) (d) None of these 104. EPS means (a) Encapsulated Post Script (b) Entire Post Script (c) Entire Post Scale (d) None of these 105. RGB model are used for (a) Printing (b) Computer display (c) Painting (d) None of these 106. E-mail stands for (a) Electronic man (b) Electromagnetic mail (c) Engine mail (d) Electronic mail 107. An unsolicited email message sent to many recipients at once is (a) Inbox (b) Virus (c) Spam (d) Attack 108. Write the correct sequence of HTML tags to design a webpage? (a) HTML, Head, Title, Body (b) HTML, Title, Body, Head (c) Title, HTML, Head, Body (d) Head, Title, HTML, Body 109. The first network that planted the seeds of internet was (a) ARPANET (b) NSFNET (c) VNET (d) INET (UPPCL TG-2 26.06.2016) 110. ..............is a global system of interconnected governmental, academic, corporate, public, and private computer networks. (a) Intranet (b) Internet (c) Extranet (d) Darknet (SSC 10+2 CHSL 31.01.17, 1.15 pm) 111. Internet, initially started as– (a) TCP/IP experiment (b) Network for the defence force of America (c) Group of research scientists of bell Lab (d) Contribution was done by all the above institutions (RRB JE-2014) 256 YCT 112. Which of the following is not a web browser? 124. Flipkart is an example of which type of website? (a) Chrome (b) Firefox (a) Celebrity website (c) Safari (d) Linux (b) Forum Website (c) E-commerce website (SSC 10+2 CHSL 27.01.17, 10 am) (d) Social networking website 113. Internet Explorer is a (UPPCL TG2 11-11-2016) (a) Web browser 125. What is e-commerce? (b) Web search engine (a) Buying and selling of computer products (c) Hypertext transfer protocol (b) Buying and selling of products and services (d) Web data store not found in stores (RRB JE (Shift-II), 29.8.2015) (c) Buying and selling of intermational goods 114. Which of the following options displays the (d) Buying and selling of products and services name of the web page in an Internet Explorer over the internet browser? (UPPCL TG-2 26.06.2016) (a) Address bar (b) Menu bar 126. Which of the following is a tiny digital camera (c) Status bar (d) Title bar generally used in video chats or video UPPCL JE 31-01-2019 (Batch-02) conferencing? 115. To view information on the web you must have a (a) Joystick (b) Light pen (a) Cable modem (b) Web browser (c) Web camera (d) MICR (c) Domain name server (d) Hypertext viewer (AHC RO-2016) (UPPCL TG-2 26.06.2016) 116. Client-side scripting generally refers to the 127. HTTP stands for – (a) Hyper Text Transmission Protocol class of computer programs on the web that (b) Hyper Text Transfer Program are executed client-side by (c) Hyper Text Transfer Protocol (a) web browser (b) web server (d) Hyper Text Transmission Program (c) website (d) URL (RRB SSE Secundrabad (Shift-I), 01.09.2015) (UPPCL RO/ARO-2014) 128. Which of the following is an application 117. Who invented E-Mail? protocol? (a) Tim Berners-Lee (b) James Gosling (a) HTTP (b) TCP (c) Vinton Cerf (d) Ray Tomlinson (c) IP (d) UDP (SSC 10+2 CHSL 15.01.17, 4.15 pm) (SSC CGL (TIER-1) 27-08-2016, 10am) 118. World Wide Web was invented by………. 129. SMTP in computer science stands for? (a) John Barber (b) Tim Berners-Lee (a) Simple Markup Transfer Protocol (c) Alan Blumlein (d) David Brewster (b) Systems Mail Transfer Protocol (SSC 10+2 CHSL 24.01.17, 4.15 pm) (c) Simple Mail Transfer Protocol 119. The process of publishing original content on (d) Systems Memory Transfer Protocol the Internet is called (UPPCL RO/ARO-2014) (a) Community publishing 130. Which Network protocol is used to send email? (b) Digital publishing (c) Web publishing (a) FTP (b) SSH (d) Desktop publishing (c) POP 3 (d) SMTP UPPCL ARO-18.02.2018 (RRB SSE Bilaspur Yellow paper, 21.12.2014) 120. Links that lead to another webpage are called- 131. Which of the following is not an e–mail (a) Hyperlinks (b) HTTP Links protocol ? (c) Embedded Links (d) URL (a) POP (b) IMAP UPPCL Accountant 10-02-2018 (c) SMTP (d) FTP 121. A program that serves requested HTML files (RRB JE (Shift-2), 27.8.2015) and page is 132. In HTTP, P stands for– (a) Web address (b) Web page (a) Pattern (b) Protocol (c) Web server (d) Home page (c) Program (d) Policy (UPPCL RO/ARO-2014) RRB NTPC 28.01.2021 (Shift-II) Stage Ist 122. Files can be safely transferred using Internet 133. The internet works by using a protocol called TCP/IP. What is the full form of TCP/IP? through(a) Transmission Control Protocol/Internet (a) FTP (b) SMTP Protocol (c) TCP/IP (d) HTTP (b) Tele Computer Protocol/Internet Protocol UPPCL Accountant 10-02-2018 123. Mozilla Firefox, Google Chrome, Opera etc. (c) Temporary Computer Protocol/Internet are the example of _______. Protocol (a) Railway services (b) Web browsers (d) Transmission Computer Programme/Internet Protocol (c) Search engine (d) Email services RRB NTPC 16.01.2021 (Shift-II) Stage Ist UPPCL APS Exam-18.02.2018 Internet of things and its Application 257 YCT 134. _______ is a communication protocol. (a) HTP (b) CP (c) TP (d) HTTP RRB NTPC 09.01.2021 (Shift-I) Stage Ist 135. Which of the following is an advantage of LAN? ? (a) automatic pricing of data (b) sharing peripherals (c) saving up data (d) backing up data RRB NTPC 23.02.2021 (Shift-I) Stage Ist 136. An organization has a private network for exclusive use by its employees(a) Internet (b) Intranet (c) LAN (d) Network interface RRB NTPC Stage-Ist, , 29.04.2016 (Set-II) 137. Which of the following is the largest network in terms of area? (a) MAN (b) WAN (c) INTRANET (d) INTERNET RRB NTPC Stage-Ist, 27.04.2016 (Shift-I) 138. Transmission of which of the following network topologies has the highest speed? (a) LAN (b) WAN (c) MAN (d) LAN and WAN have equal transmission speed. RRB NTPC Stage-Ist, , 29.04.2016 (Shift-II) 139. What is the extension of TCP in relation to computer system? (a) Transmission control protocol (b) Transfer call plan (c) Transfer control process (d) Transmission call protocol RRB NTPC Stage-Ist, , 16.04.2016 (Shift-III) 140. In reference to computers what is the meaning of LAN? (a) Largest Area Network (b) Local Area Network (c) Legal Area Network (d) Longest Area Network RRB NTPC Stage-Ist, , 28.03.2016 (Shift-III) 141. What is the address given to the computer connected to a network is called? (a) System address (b) S.Y.SI.D (c) Process id (d) IP address RRB J.E. (14.12.2014, Green Paper) 142. Which of the following is NOT an internet browser? (a) Panda (b) Safari (c) Firefox (d) Chrome RRB NTPC 27.02.2021 (Shift-II) Stage Ist 143. What is the meaning of letter 's' in 'https' Protocol ? (a) Scale (b) Save (c) Software (d) Secure RRB NTPC 11.03.2021 (Shift-II) Stage Ist 144. Which is the world’s oldest web browser? (a) World Wide Web (b) Mosaic (c) Opera (d) Netscape RRB NTPC Stage-Ist, , 12.04.2016 (Shift-I) 145. Whenever we open the internet, we see ourselves by creating ‘www’. What is the full form of WWW? (a) World Wide Web (b) World Wide Word (c) World Wise Web (d) None of the above RRB J.E. (14.12.2014,Red Ppaer) 146. Webpages are created using…. (a) HTTP (b) URL (c) HTML (d) FTP RRB NTPC Stage-Ist, , 31.03.2016 (Shift-III) ANSWER KEY 1. (b) 11. (a) 21. (a) 31. (b) 41. (b) 51. (d) 61. (b) 71. (d) 81. (a) 91. (b) 101. (b) 111. (b) 121. (b) 131. (d) 141.(d) 2. (b) 12. (b) 22. (b) 32. (d) 42. (d) 52. (a) 62. (a) 72. (b) 82. (b) 92. (b) 102. (b) 112. (d) 122. (a) 132. (b) 142. (a) 3. (d) 13. (d) 23. (a) 33. (d) 43. (d) 53. (a) 63. (a) 73. (d) 83. (d) 93. (b) 103. (c) 113. (a) 123. (b) 133. (a) 143. (d) 4. (d) 14. (c) 24. (c) 34. (b) 44. (c) 54. (b) 64. (b) 74. (c) 84. (d) 94. (d) 104. (a) 114. (d) 124. (c) 134. (d) 144. (a) Internet of things and its Application 5. (b) 15. (d) 25. (b) 35. (a) 45. (a) 55. (c) 65. (a) 75. (a) 85. (c) 95. (c) 105. (b) 115. (b) 125. (d) 135. (b) 145. (a) 258 6. (c) 16. (d) 26. (c) 36. (d) 46. (a) 56. (d) 66. (d) 76. (b) 86. (a) 96. (c) 106. (d) 116. (a) 126. (c) 136. (b) 146. (c) 7. (d) 17. (c) 27. (a) 37. (a) 47. (c) 57. (c) 67. (d) 77. (c) 87. (b) 97. (b) 107. (c) 117. (d) 127. (c) 137.(d) 8. (a) 18. (b) 28. (d) 38. (b) 48. (c) 58. (d) 68. (d) 78. (d) 88. (b) 98. (d) 108. (a) 118. (b) 128. (a) 138. (a) 9. (d) 19. (b) 29. (c) 39. (d) 49. (b) 59. (a) 69. (d) 79. (c) 89. (a) 99. (d) 109. (a) 119. (c) 129. (c) 139.(a) 10. (b) 20. (a) 30. (d) 40. (b) 50. (b) 60. (d) 70. (c) 80. (c) 90. (a) 100. (c) 110. (b) 120. (a) 130. (d) 140.(b) YCT 11. MAJOR DEVELOPMENTS IN IT Introduction . Today's information technology is the fastest growing industry and its structure with change a lot in the coming times. It is bringing very quick revolutionary changes in the various fields like Medical, Entertainment, Education, Business marketing etc. and it will be an more booms in the coming years. What are the current trends in Information Technology? Information technology is growing so fast that in every coming day it is leaving behind the old one. Following as some recent developments in the field of information technology. 1. Automation– Automation is the way of describing the various technologies that are used to minimize human intervention in the production of different types of goods and services. To achieve this various decision criteria, relationship between the subprocesses and related actions are determined and then feed into the machine. It improves the speed, reliability and efficiency of production. It is estimated that automation will grow more in the coming years. 2. Cloud Computing– Cloud computing is the ondemand delivery of different types of computing services over the cloud (i.e. internet) like storage, software, servers, databases, analytics, networking and intelligence. Normally this word is used to express the data centers accessible over the internet to the users. Cloud storage and sharing is a very in demand trend that many organizations acquired. The cloud environments (cloud deployment models) are three types. (i) Public Cloud– It is owned by an outsourced cloud provider and it is accessible to many types of users (businesses or organizations) by using the internet. (ii) Private Cloud– This type of cloud is limited to a single organization or business. It gives a more controlled environment to access the resources. It provides higher security to the resources. (iii) Hybrid Cloud– It is a combination of both public and private clouds and it is a decent option for the organization that looking for the advantages of both types of clouds. Cloud computing has three types of service models. (a) Infrastructure as a service (b) Platform as a service (c) Software as a service Major Developments in IT (a) Infrastructure as a service (IaaS)– It is usually the most famous service model. It provides the fundamental infrastructure of data storage drives, virtual servers, operating systems and networks. It is an ideal option for small and medium size business (or organizations). It is an outsourced and paid service. It is accessible as private, public or hybrid. (b) Platform as a service– In PaaS, the service providers deploy the infrastructure and the software framework while the organizations/users/businesses can develop and execute their applications. The different types of web application can be created very fast and very easily by using this service. (c) Software as a service (SaaS)– In SaaS, the service providers deploy the software over the internet for the different users/business that paid for this through subscription or any other way. It is the best option for short term projects. 3. Internet of Things– The internet of things means a network of billions of things (or physical devices) embedded with various type of technologies like sensors, software etc. to make them capable of transferring and receiving the data and instructions to or from the other devices and system over the internet. So any physical device (or electronics device) that can be connected to the internet to send, receive and controlled information can be used as an IoT device. 4. Edge Computing– Edge computing is a prototype of a distributed computing (or distributed information technology architecture) that makes it possible to access the data and services at the locations where it is required so that the response time can be improved as well as can save bandwidth also. IN simple words, we can say it as an architecture that helps in running the little number of processes in the cloud and then shift them to the local places like a user's computer an edge server, or any IoT devices. 5. Artificial Intelligence– Artificial Intelligence is a broad branch of computer science that is used to make machines smart (i.e. that can carry out the tasks that commonly needed human intelligence). 6. Machine Learning– Machine learning is a branch of computer science and artificial intelligence. It deals with the use of algorithms and data to emulate human learning behaviour. These algorithm improve automatically by using the experience and the data. 259 YCT • • • There are lots of services that are possible due to machine learning like search engines, recommendations systems, voice assistants, social media feeds and many more. Machine learning can be classified into the following categories. 7. • Supervised machine learning • Unsupervised machine learning • Reinforcement machine learning Supervised machine learning– The data is labeled to advise the machine precisely what patterns if should search for example, when you watch any video on YouTube. You advise the algorithm to show you similar video also. 8. Unsupervised machine learning– There is neither classified nor labeled data, the machine just searches for patterns by itself. The machine does not find out the right output or pattern but if can find out the hidden patterns or structures by using the labeled dataset. Reinforcement machine learning– It is a trial and error method of learning by a machine to reach a specific goal. This permits the machines and the software agents to find out the ideal behaviour automatically within a particular condition so the performance can be maximized. Deep Learning– Deep learning also known as deep neural networks or neural learning is a subset of machine learning i.e, it is also a form of artificial intelligence as machine learning. In simple word, we can say that deep learning is an AI function that imitates the human brain's working to detect objects, speech recognition, language translation and also is a decision making. Virtual Reality– It is the use of computer technology to generate a simulated environment (including many senses like vision, touch, hearing and smell as well) that enables users to interact with the 3D worlds. By using VR technology we can experience the virtual world or environment like the real one. To perceive such as environment, we have to use a special device known as a virtual reality headset or helmet. Important Questions Asked in Previous Years Examinations 1. 2. 3. 4. 5. 6. Which represents the expression of size and form of particular thinking? (a) Data (b) Information (c) Both (a) and (b) (d) None of these Which of the following has the characteristic of information. (a) Timelines (b) Purpose (c) Mode (d) All of these Computing the information is based on preliminary investigation of. (a) Shainnan (b) Weever (c) Shainnen & Weever (d) None of these Which of the following is an essential concept related to cloud? (a) Reliability (b) Abstraction (c) Productivity (d) All of the mentioned In which one of the following a strategy record or document is created respectively to the events conditions to user may face while applying cloud computing mode. (a) Cloud computing value preposition (b) Cloud computing strategy planning (c) Planning phase (d) Business Architecture Development Which one of the following is related to the services provided by cloud? (a) Sourcing (b) Ownership Major Developments in IT 7. 8. 9. 10. 260 (c) Reliability (d) AaaS What is edge computing role in cloud computing? (a) They are the same (b) Edge computing is the cloud's silver living or the edge of the cloud (c) Edge computing could act as an alternative to cloud computing (d) They are unrelated What issue is common is many edge computing challenges? (a) Bandwidth (b) Latency (c) Network security (d) Network traffic How can software defined networking (SDN) work with edge computing? (a) Edge computing only works in a software defined network. (b) SDN can streamline how edge computing processes data. (c) They don't work well together. (d) They are the same. Why should anyone care about edge computing? (a) It can alleviate latency issues (b) It can ease network congestion (c) It can bolster bandwidth for IoT devices (d) All of the above YCT 11. 12. 13. 14. 15. 16. 17. 18. Machine learning is a field of AI consisting of learning algorithms that ____ (a) Executing some task (b) Over time with experience (c) Improve their performance (d) All of the above Machine learning algorithms build a machine based on sample data known as _____ (a) Training data (b) Transfer data (c) Data training (d) None of above What are the three types of machine learning? (a) Supervised learning (b) Unsupervised learning (c) Reinforcement learning (d) All of the above Real time decisions Game AI learning tasks, skill acquisition and Robot Navigation are application of ___ (a) Reinforcement learning (b) Supervised learning (c) Unsupervised learning (d) None of the above How many layers deep learning algorithm are constructed? (a) 2 (b) 3 (c) 4 (d) 5 Which of the following is limitations of deep learning? (a) Data labeling (b) Obtain huge training datasets (c) None of the above (d) Both (a) and (b) Which of the following deep learning models uses back propagation? (a) Convolutional Neural Network (b) Multilayer perception Network (c) Recurrent Neural Network (d) All of the above For an image classification task which of the following deep learning algorithm is best suited? (a) Recurrent Neural Network (b) Multi Layer Perception (c) Convolution Neural Network (d) None of the these 19. 20. 21. 22. 23. 24. 25. It is a mediated environment which creates the sensation in a user of being present in a (physical) surrounding. (a) WWW (b) HMD (c) VR (d) GUI A type of VR environment in which subjects are visually isolated from the real environment. (a) Immersive (b) Semi Immersive (c) Non immersive (d) Augmented Application of machine learning methods to large database is called (a) Data Mining (b) Artificial Intelligence (c) Big Data Computing (d) Internet of Things In what type of learning labelled training data is used. (a) unsupervised learning (b) supervised learning (c) reinforcement learning (d) active learning What characterize unlabelled examples in machine learning? (a) there is no prior knowledge (b) there is no confusing knowledge (c) there is prior knowledge (d) there is plenty of confusing knowledge Compared to humans machines. (a) Can make more complex decisions based on unexpected circumstances (b) Can work in harsher environment (c) Make fewer errors (d) (a) and (c) What is true about machine learning? (a) machine learning is the field of computer science (b) ML is a type of artificial intelligence that extract patterns out of raw data by using an algorithm or method (c) The main focus of ML is to allow computer systems learn from experience without being explicitly programmed or human intervention. (d) All of the above ANSWER KEY 1. (b) 2. (d) 3. (c) 4. (b) 5. (b) 6. (a) 7. (c) 8. (d) 9. (b) 10. (d) 11. (d) 12. (a) 13. (d) 14. (a) 15. (b) 16. (d) 17. (c) 18. (c) 19. (c) 20. (a) 21. (a) 22. (b) 23. (d) 24. (d) 25. (d) Major Developments in IT 261 YCT 12. PEDAGOGY OF COMPUTER SCIENCE "Nano Technology is knocking at our doors. We should be aware of the trends of technology and nurture our young minds." Dr. A.P.J. Abdul Kalam UNIT-I : Aims and Objectives of Teaching Computer Sciences Pedagogy of Computer Science– Computer science is an integral part of our lives, shaping virtually everything from the objects around us to the ways in which we communicate, travel , work and play. Purpose of Teaching Computer Science– The purpose of computer science teaching in school is: • To enable the student to grasp the basic knowledge needed from further study of computer science and the related technology and • To understand its application. Aims and Objectives of Teaching Computer Science– The teaching of computer science should aim to 1. Provide fundamental knowledge to the students. 2. Develop in them the skill of thinking and analyzing. 3. Inculcate proficiency in reasoning and synthesizing. 4. Create interest and scientific attitudes. 5. Develop communicative skills and soft skills. 6. Help the students apply their knowledge in learning activities. 7. Help the students attain the thinking process. 8. Make the student attain the skills of initiatives. 9. Make the students associate the knowledge in real time application. 10. Build team spirit. 11. Help the students attain the skill of problem-solving. 12. Provide them vocational skills. 13. Inculcate citizenship and love for the society and Nation. 14. Promote local and global understanding. Need for Teaching Computer Science– The use of computers is inevitable and it has become a necessary electronic gadget in every individual's life. By introducing computer science in the school curriculum, we can confidently challenge that the educational industries be fixed on to the global standards. Bloom's Taxonomy of Educational Objectives– Objectives are the specific and precise behavioural outcome of teaching a topic. The main objectives of teaching computer science must ensure a better match between the industry's requirements and outputs of the education sector emphasizing the quality needs. Knowledge acquisition, adaptation and utility are the prime slogans of the present learning society. Hence learning computers from the school is the need of the hour. Whole human processes can be divided into three levels as follows: 1. Cognitive Domain (Activities related to head) 2. Affective Domain (Activities related to the heart) 3. Psycho-Motor Domain (Activities related to hand) On the basis of these three Domains, B.S. Bloom and his associates divided educational objectives and there were six objectives for each domain. Pedagogy Computer Science Teaching at Different Levels in Schools– Primary Level • At primary levels, the computer is being used to display the lessons in the form of Rhymes, Games and Browsing and Interactive mode. • Simple software applications like MS Paint are taught. Secondary Level • At the secondary level, computer skills are developed. • The application software like MS Word, Excel and Power Point are taught. Higher Secondary Level • At a higher secondary level, computer science teaching is at a high level. • The programming skill-based curriculum is introduced at this level. The languages like C, C++ and Visual Basic and the web language like HTML are in the higher secondary curriculum. The Place of Computer Science in School Curriculum–The 5 reasons for computer science courses to be taught at present are: 1. To use electronic gadgets in all fields. 2. To be on part with ever-increasing societal needs and expectations. 3. To become equipped for new business and industries dimensions. 4. To be competent for local and global competitions. 5. Working with finance. Computer Science Teaching in Relation to other School Subjects Computer Science and Chemistry– • Nuclear magnetic resonance, mass, infra-red and ultraviolet spectrometry all depend on computers to control the sensitive equipment and obtain and record detailed measurements. • It is obvious that computers are important in taking measurements but they can also be used to predict measurements. • There is some very powerful software available for predicting the physical properties of compounds. • Bonds lengths, melting points, vibrational frequencies and properties such as solubility can be predicted using dedicated software based on theories known. • Software like this can help you to 'design' a molecule to the specific needs of the chemist. • Without the software, it would take hours of calculations to predict the properties. Computer Science and Physics– • Computers have great influence in the field of physics. • Starting from atom energy to Astronomy, the computer has a deep influence. • Finding weather reports, moments of particles and their functions can be monitors through computers. • Research in the field of physics is enhanced and sophisticated by computer and its applications. • Computers are used in Mechanical engineering through CAD, CAM, ANSYS and CATIA as designing and analyzing software. 262 YCT Computer Science and Biology– • The use of computer technology has greatly enhanced the medical field. • This is particularly so in hospital environments where reliability and quality are critical factors. • Many computer applications, such as patient information systems, monitoring and control systems and diagnostic systems have been used to enhance healthcare. Computer Science and Social Science– The computer is used to review the past with documentary evidence. • The books and all other old documents are being digitalized using computers. • Moreover, it helps to develop new dimensions of maps and it is useful in finding natural resources using satellites, Receivers and Sensors. • The computer has great influence in developing Global Positioning System (GPS) Computer Science and Language • Computer science is used to develop software in languages. • Computer spread languages throughout the world. UNIT II : Hardware and Software of Computers What is Computer? A computer is a device, which can compute. It is an electronic device, which works under a set of instructions automatically accepts the supplied data, processes and analyzes the data and produces the information. • The first fully electronic computers, introduced in the 1940s' were huge machines that required teams of people to operate. But now days we have the most advanced machines which perform a number of calculations within a fraction of time. How does computer works? Computers work through an interaction of Hardware and Software. Hardware– Hardware refers to the parts of a computer that we can see and touch, including the case and everything inside it. The most important piece of hardware is a ting rectangular chip inside the computer called the Central Processing Unit (CPU), or microprocessor. • It is the "brain" of your computer the part that translates instructions and performs calculations. • Hardware items such as your monitor, keyboard, mouse, printer and other components are often called hardware devices or devices. Software– • Software refers to the instructions or programs that tell the hardware what to do. • A word processing program that we can use to write letters on your computer is a type of software. • The operating system is software that manages our computer and the devices connected to it. • Two well-known operating systems are Windows and Macintosh operating systems. History of Computers– The history of computer development is often in reference to the different generations of computing devices. Each of the five generations of computers is characterized by a major technological development that fundamentally changed the way computers operate. First Generation Computers– • The first electronic computer came into use at the end of the II World War. Pedagogy • It contained approximately 18500 vacuum tubes, 70000 resistors and 10000 capacitors and weighed about 30 tones. • It also consumed a large amount of electrical power, considerable space and a large amount of money. Second Generation Computers– • In this generation, the large bulky vacuum tubes were replaced with the much smaller transistors. • The transistors were not only smaller in size but also more reliable and consumed less energy, besides reducing the size of the computers considerably. • Also, second generation computers used high level programming languages. Third Generation Computers– • The third generation of computers began in 1960, after the invention of an integrated circuit or chip. • This chip was a one quarter inch square piece of material on which thousands of electronic circuits (replacements for vacuum tubes, transistors, resistors, and capacitors) could be implanted. • This is considered to be the backbone of today's modern electronic computers. Fourth Generation Computers– • This generation of computers was characterized by the development of a microprocessor or a microchip in 1970. • Approximately 70,000 or more vacuum tube equivalents or transistors could be embedded in a single chip of this kind. • They were very powerful in terms of the speed of processing and memory. • They were otherwise known as "computers on a chip". Fifth Generation Computers– • The fifth generation computers of the 1990s was much faster and more powerful. • Therefore, this generation of computer is characterized by "Artificial Intelligence." Because of the rapid growth of technological advancements in computers, no one can predict what the future will bring. It is certain that computers will continue to evolve and will bring about significant changes in our lives in the future. Types of Computers– • Analog • Digital • Hybrid Computers • Super Computers • Mainframe Computer • Minicomputer • Workstation • Personal Computer • Notebook Computer • Laptop Computer Computer Network– A computer network is an interconnection of various computer systems located in different places. In a computer network, two or more computers are linked together with medium and data communication devices for the purpose of communicating data and sharing resources. Benefits of Network– 1. File Sharing 2. Printer/Peripheral Sharing 3. Internet Connection Sharing 4. Multi-Player Games 5. Internet Telephone Service 6. Home Entertainment 263 YCT Types of Networks– There are many different types of networks. However, from an end user's point of view there are three basic types: 1. Local Area Network 2. Wide Area Network 3. Metropolitan Area Network Computer Virus– • A computer virus is a program that is able to copy itself when it is run. • In addition to copying itself, a computer virus can also execute instructions that cause harm. For this reason, computer viruses affect security. • Computer viruses are created for a cause, sometimes they are created to spread political messages and they are also created to hack some system files. • Computer viruses are spread in many ways. Some of the types of spreading are email, removable hardware, downloading and so on. The Various Uses of Computers– A computer is used in all human life. The most important areas have been given as follows. 1. Routine Job Handling 2. Traffic Control 3. Electronic Money 4. Industrial Application 5. Trade 6. Scientific Research 7. Medicine 8. Space Science 9. Publication 10. Communications 11. Education Uses of Computers in Schools • Administrative uses– Many educational institutions computerize nearly all their operations from mailing labels to staff payroll. • Office Applications– In the offices, computers are used in the filing, typing/word processing, preparing to mail for dispatch and making labels of addresses. • Library Applications– In the library, computers are used for retrieval of bibliographic information, cataloging, circulation, purchasing of books, journals etc. searching books, and charging fines from students. Also, databases can be prepared for the different users of the library. • Financial Applications– Computers are used for making budgets, auditing, accounts receivable/payable, general ledger, purchase order generation, salary schedule analysis and maintenance of students fees records etc. • Student Applications– Computers are used to make a time table for students, report cards, grade information, maintenance of attendance, students health and demographic records, result processing, fee statements, railway concessions cards, bio-data of students etc. • Personnel Applications– Computers are used to prepare payrolls of workers, maintenance personnel records staff assignments, leave records of teachers, health records, tax information and reporting, issuing circular to teaching and non-teaching staffmaintaining bio-data of teachers and non-teaching staff. Pedagogy • Research and Planning Applications– Computers are used in various research and planning applications such as test item analysis, project planning and evaluation, budget forecasting the feasibility of opening new courses etc. UNIT-III : Micro Teaching Micro-teaching is one of the most important developments in the field of teaching practice. It is originated at Stanford University in 1963. Basically, micro-teaching is a 'scaled-down teaching encounter' in which a teacher teaches a small unit to a group of 5 to 10 students for a small period of 5 to 10 minutes and one teaching skill is practiced during the teaching. Micro-teaching is a new training design for pupilsteachers which provide an opportunity to practice one teaching skill at a time and with information about their performance immediately after completion of their lesson. "Allen (1966) defines micro-teaching as a 'scaled down teaching encounter in class size and class time'." "According to the Encyclopedia of Education (Ed. Deighton), "Micro-Teaching is a real, constructed, scaled down teaching encounter which is used for teacher training, curriculum development and research." Microteaching is a teacher training technique for learning teaching skills. It employs a real teaching situation for developing skills and helps to get deeper knowledge regarding the art of teaching. Principles of Micro-Teaching 1. Principle of one Skill at a Time 2. Principle of Limited contents 3. Principle of Practice 4. Principle of experimentation 5. Principle of Immediate Feedback 6. Principle of Evaluation 7. Principle of Continuity 8. Principle of Individualized Training Phases of Micro-Teaching 1. Knowledge Acquisition Phase 2. Skill Acquisition Phase 3. Transfer Phase of Micro-Teaching Teaching Skills– Teaching is considered science as well as art. An effective teacher employs certain teaching skills to general calculative learning situations in his classroom. "A teaching skill is defined as set of teachers behaviour and activities which are especially effective in bringing about desirable behavioral changes or skills among teachers and pupil teachers." Allen and Ryans (1969), have prepared and suggested a list of the following fourteen teaching skills. 1. Stimulus variation 2. Set induction 3. Closure 4. Silence and non-verbal cues 5. Reinforcement of student 6. Asking question participation 7. Probing questions 8. Divergent question 9. Attending behavior 10. Illustrating 11. Lecturing 12. Higher-Order Questions 13. Planned repetition 14. Communication completeness 264 YCT UNIT-IV : Instructional Methods Unit Plan– A unit plan is basically a list or series of lesson plans designed around a specific topic, project, content etc. and among other reasons that apply for planning in general, it is important for teachers to design one because a great deal of learning is directly correlated to teachers' planning and preparation. Components in a Unit Plan– 1. Unit Title & Subject Area 2. Communicative Competence Components 3. Classroom/Level 4. Unit Rationale 5. Goals 6. Objectives 7. Content 8. Learning Activities 9. List of Sources 10. List of Materials 11. Assessment 12. Explanation of how the unit plan addresses a particular student profile. Lesson Plan Writing in Computer Science– In education, it is necessary to plan a lesson scientifically. In the teaching of computer science, writing a lesson plan is very important. A lesson plan is an instructional outline prepared by the teacher in order to import systematic and planned information to the students in the class. Herbartian Lesson Plan– It is an ancient method of lesson-plan. This method is used from past times but today its use is also not less. In most training institutions Herbartian lesson-plan is used. Herbartian five-step for Making a Lesson Plan are– 1. Preparation 2. Presentation 3. Comparison and Abstraction 4. Generalization 5. Application Methods of Teaching Computer Science– The various methods of teaching Computer Science are as follows • Lecture • Demonstration • Lecture-demonstration • Project method • Analytic method • Problem-solving • Scientific method • Synthetic method 1. Lecture Method– Lecture means teaching a lesson in the form of speech or talk. The teacher delivers a lecture on a particular topic and the students keep listening in an idle manner. 2. Demonstration Method– In this method, the spoken word is supplemented with a demonstration using varied aids resulting in auditory and visual learning. 3. Lecture-Demonstration Method– • This method of teaching is sometimes also referred to as lecture-cum-Demonstration method. • This lecture-demonstration method is used by computer science teachers for imparting computer science education in the class room. 4. Project Method– • This method is based on the principle of learning by doing and learning by living. Pedagogy • In this method, the school curriculum and contents of studies are considered from the pupils point of view. • It also illustrates the problem-solving method. • It is a pupil-centered method. • The students work out problems selected by themselves, investigate them and solve them in groups or individually • The teacher act as a guide and instructor. "A project is a problematic act carried to completion in its natural setting" – Stevenson "It is a unit of activity in which pupils are made responsible for planning and purposing" – Parker 5. Analytic Method • Analysis means breaking up of subject matter. • It starts from unknown to known facts. • This method helps to break the complex problem into simpler ones. • The students by this method develop the ability to attack upon the problem and analyze it into a simpler form. • The spirit of investigation and critical reasoning is developed by this method. • It increases individual thinking • New facts are discovered by the objective approach of students. 6. Synthetic Method • It binds different known facts into unknown facts. • It leads from known to unknown facts. 7. Scientific Method or Problem Solving Method • Any method of solving a problem systematically and scientifically may be called scientific. • Scientific method refers to a technique for investigating phenomena, acquiring new knowledge or correcting and integrating previous knowledge. • A scientific method consists of the collection of data through observation and experimentation and the formulation and testing of hypotheses. 8. The Inductive Approach • This method requires the study and careful examination of particular facts to deduce a general principle. • Pupils are actively engaged in thinking for themselves and discovered new rules, generalization etc. • The students draw generalization from particular principles from observed rules and from instances. Steps involved in the inductive method are– i. Sensing the problem ii. Analyzing the situation iii. Organizing information iv. Framing solution v. Eliminating vi. Verification 9. The Deductive Approach It suggests the verification of general principles, rules, definitions already learned. It should be noted that this method has two functions to perform– 1. Drawing inferences from general principles studied. 2. Explaining particular facts with the help of general principles, laws etc. Steps of the Deductive Method– i. Understanding the problem ii. Collecting information iii. Reviewing 265 YCT iv. Drawing inferences v. Verification 10. Programmed Learning • Programmed learning is an educational innovation and auto instructional device. • It has been coined from principles of operant learning by B. F. Skinner. • It is also named programmed instruction and instructional technology. Principles of Programmed Learning • Principle of small steps • Principle of active responding • Principle of immediate confirmation • Principle of self-pacing • Principle of evaluation Computer Assisted Instruction Computer assisted instruction is a method of using computer technology in teaching and learning. Computer-Assisted instruction (CAI) is an interactive instructional technique whereby a computer is used to present the instructional material and monitor the learning that takes place. Computer-Managed Instruction Computer-managed instruction is an instructional strategy whereby the computer is used to provide learning objectives, learning resources and assessment of learner performance. It refers to the use of a computer system to manage information about learner performance and learning resources options. UNIT-V : Instructional Aids Instructional Aids in the Teaching of Computer Science– Meaning of the term instructional material or teaching aid use and importance of instructional material or teaching aid in Computer-Science-Guiding principles for the effective use of audio visual aids– Audio Visual Aids– Audio visual aids are sensitive tools used in teaching and as avenues for learning. These are planned educational materials that appeal to the senses of the people and quicken learning facilities for clear understanding. According to Kinder S. James– "Audio visual aids are any device which can be used to make the learning experience more concrete, more realistic and more dynamic." According to K.P. Neeraja– An audio visual aids is an instructional devices in which the message can be heard as well as seen." Characteristics of Instructional Aids or AudioVisual Aids– J.K. Davies has suggested the following five characteristics of Audio-Visual Aids: • Audio-Visual Aids help in developing perception. • It helps in developing understanding. • It enables the pupils to acquire correct knowledge. • Audio-Visual Aids help in the transfer of training. • These are helpful in acquiring knowledge and providing reinforcement. • Audio-Visual Aids help in developing retention. Instructional Aids Used in Teaching– The Instructional Aids used in teaching can be classified in the following ways: • Traditional Aids- Blackboard/Chalkboard, Books, Periodicals. Pedagogy • Visual Aids- Objects, Picture, Map, Figure, Chart, Posters, Model, Bulletin Board, Flannel Boards, Globe, Graph or Any other type of Graphics such as diagrams, Cut-outs, cartoons etc. • Audio- Radio, Tape Recorder, Teaching Machine. • Visual- Projector, Epidiascope, Film Strips, Motion Picture etc. Audio-Visual- Films, Television, Video, Cassettes etc. Visual Material Aids- Use of Charts. Interactive Whiteboard • An Interactive whiteboard is a touch-sensitive screen that works in conjunction with a computer and a projector. • It is a presentation device that interfaces with a computer. • The computer images are displayed on the board by a digital projector, where they can be seen and manipulated. Powerpoint Presentation– • Powerpoint can be an effective tool to present material in the classroom and encourages student learning. • Powerpoint can be used to project visuals which would otherwise be difficult to bring to class. UNIT-VI : Latest Trends in Information Technology Multimedia– The term multimedia by definition means 'more than are media'. "According to Hofstetter (2001), Multimedia is the use of computer to present and combine text, graphics, audio and video with links and tools that let the user navigate, interact, create and communicate." Desktop Publishing– Desktop publishing is the process of preparing documents for printing via special page layout software known as desktop publishing software. Internet–The internet has revolutionized communication methods on the world. Sitting at a work station or a PC, one can get any kind of information one wants. • The latest technological advances have enabled it to be used as a business tool as well, with the result that companies are today spending a considerable amount of money on internet research. The internet is a system that lets computers all over the world to communicate with each other. The internet is a network of networks that connects computers all over the world. E-Learning– • E-learning can encompass a wide variety of online initiatives. • E-learning is the use of electronic media (computers, tablets or phones) to educate or train learners. Virtual learning– A virtual learning environment is a set of teaching and learning tools designed to enhance a students learning experience by including computers and the internet in the learning process. Web-Based Learning– Web-Based Learning encompasses all educational interventions that make use of the internet (or a local internet). There are currently three broad classifications or configurations within Web-Based Learning: tutorials, online discussion groups and virtual patients. 266 YCT Tele-conferencing– • The term teleconferencing refers to electronic meetings that involve people who are at physically different sites. • The telecommunication technology system allows meeting participants to interact with one another without travelling to the same location. Audio Conferencing– Audio conferencing is the use of voice communication equipments to establish an audio link between geographically dispersed persons, one that allows them to conduct a conference. Video Conferencing– • Video conferencing is the use of television equipment to link geographically dispersed conference participants. • The equipment provides both sound and picture. • With video conferencing, participants can see and hear each other. UNIT-VII : Evaluation in Computer Science Introduction– Evaluation is integrated with the whole test of education and its purpose is to improve instruction and not merely to measure its achievements. It exercises a great influence on the pupil's study habits, the teacher's methods of instruction and thus helps not only to measure educational achievements but also to improve it. Purposes of Evaluation– • To provide for the collection of evidence which will show the degree to which the pupils are progressing towards curricular goals. • To permit teachers and supervisors to evaluate the effectiveness of curricular experiences, activities and instructional methods. • To make provision for guiding the growth of individual pupils to diagnose their weaknesses and strengths, to point out areas where remedial measures are desirable. • To provide a basis for modification of the curriculum or for the introduction of experiences to meet the needs of the individuals and groups of pupils. • To motivate pupils towards better attainment and growth. Types of Evaluation Formative Evaluation– A formative test is constructed to evaluate each unit. Such tests are used to make teaching-learning more effective and to give students the opportunity to get mastery over the content matter. Here, more emphasis is laid on the achievement rather than objectives. "Formative evaluation occurs over a period of time and monitors student progress. –Wiersma and Jurs" Summative Evaluation– A summative test is given to students at the end of the year to measure the educational attainments and achievement of and to determine the grade or division or certificate for the individual learner. It provides a complete picture of the progress of the learner individually and aims at the total evaluation of the learner. "Summative evaluation is done at the conclusion of instruction and measures the extent to which students have attained the desired outcomes." –W. Wiersma & S.G. Gurs Continuous and Comprehensive Evaluation– CCE helps in improving Students performance by identifying his/her learning difficulties and abilities at Pedagogy regular time intervals right from the beginning of the academic session and employing suitable remedial measures for enhancing their learning performance. CCE is the modern method of evaluating all the prime dimensions of a student's personality that of how much he has been throughout. New scheme of Evaluation– As a part of this new system, Students marks will be replaced by grades which will be evaluated through a series of curricular and extra-curricular evaluations along with academics. The aim is to reduce the workload on students and to improve the overall skill and ability of the student by means of evaluation of other activities. Grades are awarded to students based on work experience skills, dexterity, innovation, steadiness, teamwork, public speaking, behaviour etc. to evaluate and present an overall measure of the students ability. This helps the students who are not good in academics to show their talent in other fields such as arts, humanities, sports, music, athletics etc. Techniques and Tools of Evaluation • Questionnaire • Rating scale • Observation Method • Interview Method • Inventory • Assignment Achievement Test– Scholastic achievement tests constitute an important tool for evaluation. It is necessary for the teacher to know how far the pupils have attained in a particular subject area. In the school evaluation program, various forms of achievement tests are used to measure the accomplishment of the pupils. "Any test that measures the attainments or accomplishments of an individual after a period of training or learning is called an achievement test." – Downie "An achievement test is a test designed to measure a person's knowledge, skills, understanding etc, in a given field taught in a school." –Goods' Dictionary An achievement test is an instrument designed to measure the accomplishment of the students in a specified area of learning, after a period of instruction. Preparation of Achievement Test The important steps envisaged in the preparation of a good teacher made test are as under. 1. Planning the test 2. Preparation of a design 3. Designing the test items 4. Reviewing and editing 5. Arranging the items 6. Providing directions 7. Preparing the scoring key and marking scheme 8. Administering the test and scoring 9. Evaluating the test Online Examinations • Online examination helps the students for appearing the exam online. • Its mission is to offer a quick and easy way to appear the exam and it also provides the result immediately after the exam. • Through partnerships with boards that are conducting the multiple-choice type examination it can provide special advantages to the students that can't be found anywhere else. 267 YCT Important Questions Asked in Previous Years Examinations 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. The method & practice especially as an academic subject or theoretical concept– (a) Analysis (b) Subject-expert (c) Pedagogy (d) Expertise _______ prepares students to take the role of a developer by expanding their knowledge of programming and in designing of the web page and applying the same documentaries for uses. (a) Designing of web (b) Designing of program (c) Programming (d) Computer & Data analysis Which of the following is not the element of internet? (a) Email (b) Chatting (c) Furniture (d) Search Engines Skill that all pupils must learn if they are to be ready for the work place & able to participate effectively in the digital worlds (a) Computer Interaction (b) Computational Thinking's (c) Computer Science (d) Computer Teachers The components that process data are located in the? (a) Input devices (b) Output devices (c) System unit (d) Storage component The CPU and memory are located on the? (a) Expansion board (b) Motherboard (c) Storage device (d) Output device Teaching of computer science is done at (a) Primary level (b) Secondary level (c) Middle level (d) All of the above What are the aims of teaching Computer Science. (a) To provide theoretical knowledge of the terminologies used in computer science education. (b) To make aware the students with the criteria & methodologies being used in the functional of the computers. (c) Both (a) & (b) (d) None of these Types of general Aims & Objectives (a) Knowledge (b) Application (c) Analysis (d) All of the above When Blooms Taxonomy of educational objectives was proposed? (a) 1956 (b) 1957 (c) 1955 (d) 1959 Central processing unit has (a) Memory (b) ALU (Arithmetic & Logic Unit) (c) Control Unit (d) All of the above ______ are graphical objects used to represent commonly used application. (a) GUI (b) Windows (c) Application (d) Icons Pedagogy 13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 23. 24. 25. 26. 268 Documents converted to _____ can be published to the web. (a) Doc file (b) Http (c) Machine (d) HTML The computer that is not considered as a portable computer is (a) Laptop computer (b) Mini computer (c) Notebook computer (d) None of these Part of computer that has a physical structure is called (a) Hardware (b) Software (c) Motherboard (d) None of these Output unit (a) It accepts the results produced by the computer (b) It supplies the converted result to the user (c) It converts these results to human acceptable form (d) all of the above Which of the following is knowledge is known as microcomputer. (a) Desktop (b) Laptop (c) Palmtop (d) All of the above ALU stands for (a) Arithmetic & Logic Unit (b) Allegoristic & Logic Unit (c) Application & Logic Unit (d) Analogy & Logic Unit What is computer? (a) An electronic device (b) An information device (c) An educational device (d) None of these Character printers are also called (a) Serial printers (b) Line printers (c) Page printers (d) Impact printers DNP stands for (a) Dot Matrix Printers (b) Digital Menology Printers (c) Digital Matrix Printers (d) Digital Monitoring Printers Dot matrix and Daisywheel printers are example of (a) Non impact printers (b) Dot printers (c) Impact printers (d) Noisy printers What is known as secondary storage media? (a) OCR (b) Magnetic Tape (c) MICR (d) Magnetic Disc Most popular processing for tests (a) OCR (b) OMR (c) MICR (d) BCR Advantages of magnetic tape (a) Storage capacity (b) Cheap (c) Reusable (d) All of the above OCR stands for (a) Optical Character Reader (b) Optional Code (c) Optical Character Recognition (d) Optical Code Recognition YCT 27. 28. 29. 30. 31. 32. 33. 34. 35. 36. 37. 38. 39. BCR stands for (a) Bar Code Reader (b) Bar Character Reader (c) Bar Code Recognition (d) Bar Character Recognition MICR stands for (a) Magnetic INK Code Recognition (b) Magnetic INK Character (c) Magnetic INK Code Reader (d) Magnetic INK Character Reader Barcode reader or scanner is called (a) Point of sale (b) Point of scanner (c) Both 1 & 2 (d) None of these Devices required to store and execute the software is called? (a) Hardware (b) Software (c) Reliability (d) Instructions The ability to use learnt material in a new situation by the child making use of his previous knowledge to solve the problem is called (a) Analysis (b) Synthesis (c) Application (d) Knowledge According to Bloom's taxonomy which option is incorrect for the preparation of objective based questions? (a) Analysis (b) Evaluation (c) Self actualization (d) Application Which of the following is an example of higherorder of cognitive learning outcome? (a) Learning of facts and their sequences (b) Learning roles and action sequences (c) Learning of concepts and abstractions (d) Learning of awareness and valuing This domain deals with the emotions, attitudes and interests of the students (a) Affective (b) Cognitive (c) Psychomotor (d) Developmental In cognitive process, constructing meaning from instructional messages refers to which of the following? (a) Understand (b) Analyse (c) Remember (d) Evaluate Which level of the cognitive domain would the following question relate to? "Would frequent washing of hands result in a reduction in the incidence of diarrhoeal diseases?" (a) Comprehending (b) Applying (c) Analyzing (d) Evaluation Pedagogy is concerned with? (a) Aims (b) Content (c) Evaluation (d) Teaching methods Which of the following learning strategies are not developed by B. S. Bloom? (a) Division of contents into units (b) Diagnose the learning difficulties (c) Attain mastery level by teachers (d) Administering unit test A teaching approach which attempts to help students to question and challenge domination and the beliefs and practices that dominate Pedagogy 40. 41. 42. 43. 44. 45. 46. 47. 48. 49. 50. 51. 52. 269 (a) Inductive Approach (b) Heuristic Method (c) Critical Pedagogy (d) Deductive Approach Pedagogy is a Greek word which literally means (a) To understand the child (b) To guide the child (c) To educate the child (d) To lead the child Which one of the following is not an example of software? (a) MS Word (b) Windows (c) Monitor (d) MS Paint CU stands for ____ (a) Compressed Unit (b) Computer Unit (c) Control Unit (d) None of these Which part is known as backbone of the computer? (a) CPU (b) Hardware (c) Software (d) Keyboard A microprocessor is _____ (a) A combined unit of monitor and keyboard. (b) A combined unit of ALU and CU. (c) A combined unit of CPU and UPS (d) None of these Which of the following is required to run MS Paint? (a) Application software (b) System software (c) Multimedia software (d) None of these ______ is the brain of the computer. (a) Monitor (b) Software (c) CPU (d) Keyboard ______ is the set of instructions. (a) Hardware (b) Application software (c) System software (d) Both (b) and (c) A computer virus is a: (a) Hardware (b) Software (c) Bacteria (d) Freeware Who is known by the name of crackers in the context of computer security? (a) Black Hat Hackers (b) White Hat Hackers (c) Elite Hackers (d) Script Kiddie Which of the following terms is just the collection of networks that can be joined together? (a) Intranet (b) Extranet (c) Internet (d) LAN Micro-teaching is (a) Scaled down teaching (b) Effective teaching (c) Evaluation teaching (d) Real teaching Which step is prominent in the syntax of teaching model of memory level and understanding level? (a) Planning (b) Exploration (c) Generalization (d) Presentation YCT 53. 54. 55. 56. 57. 58. 59. 60. 61. Morrison has described five steps in his teaching model at understanding level which are I. Presentation II. Exploration III. Organisation IV. Assimilation V. Recitation The correct sequence is (a) I, II, III, IV, V (b) II, I, IV, III, V (c) IV, V, III, I, II (d) II, I, III, IV, V Total time taken in Indian Model of Micro Teaching is (a) 30 minute (b) 40 minute (c) 36 minute (d) 45 minute In which of the following skill, testing of previous knowledge comes? (a) Skill of demonstration (b) Skill of introduction (c) Skill of stimulus variation (d) Skill of closure If a teacher finds a problematic child in the class, what should he does? (a) send the child back to home immediately (b) ignore the child (c) Punish the child (d) Provide counseling to the child You have a mixed class of boys and girls. Which method would you adopt to improve cooperation between them? (a) Asking parents to discuss equality (b) Talking about equality in lessons (c) Setting tasks which have to be done together (d) Making boys and girls share a bench _____ is a very detailed and specific plan consisting of intended learning outcomes, description of teaching-learning strategies and activities and actual tool for assessment of learning outcome. (a) Unit plan (b) Yearly plan (c) Lesson plan (d) Both (a) and (c) _____ is a file, folder, pocket, or space allocated for each child where actual work done by a child, over a period of time. (a) Diary (b) Anecdotal record (c) Teacher's Handbook (d) Portfolio Which of the following is not a democratic teaching strategy? (a) Problem solving (b) Project (c) Discovery (d) Demonstration Identify the skills needed by present day teachers to make classroom teaching more efficient. I. knowledge of technology II. Use of technology in classroom transactions III. Knowledge of students needs IV. Content Mastery (a) I and III (b) II and III (c) II, III and IV (d) II and IV Pedagogy 62. 63. 64. 65. 66. 67. 68. 69. 270 Which of the following method provides the proof of the problem? (a) Project method (b) Analytic method (c) Inductive method (d) Synthetic method Which one of the following happenings in the classroom is an activity? (a) Children engaged in exploration (b) Teacher explaining how to do sums (c) Children reciting counting in form of rhymes (d) Children copying from blackboard Which of the following activities is best suited for the development of spatial understanding among children? (a) Drawing the top view of a bottle (b) Locating cities on a map (c) Noting the time of moon rise (d) Representing numbers on a number line Which one of the following methods is most suitable for teaching mathematics at upper primary level? (a) Demonstration method (b) Lecture method (c) Activity-Based learning (d) Problem-solving method Out of the following, which of the teaching methods in mathematics is difficult to use in a formal classroom situation? (a) Inductive (b) Deductive (c) Project (d) Analytic Which of the following is the best method of teach geometry? (a) Play method (b) Drill method (c) Formula-based method (d) Display method Which of the following methods of teaching will encourage indirect learning? (a) Lecturing with examples (b) Team teaching (c) Demonstration on a subject (d) Collaborative projects Match the following methods of teaching with their meaning. List-I List-II A. Oral presentation of 1. Brainstorming information, principles, concepts, ideas about a topic B. Sharing experiences, 2. Project ideas and attitudes C. Generating as many 3. Lecture ideas without judging them D. A whole-hearted 4. Collaboration purposeful activity proceeding in a social environment. 5. Discussion YCT 70. 71. 72. 73. 74. 75. 76. 77. 78. A B C D (a) 1 2 3 4 (b) 3 5 1 2 (c) 5 4 3 2 (d) 3 4 1 2 Match the elements in list-I with that of List-II and choose the correct alternative. List-I List-II A. Lecturing 1. Working in groups B. Project method 2. Small steps with feedback C. Heuristic Method 3. Economical and time-saving D. Programmed 4. Prof. Armstrong learning A B C D (a) 3 1 2 4 (b) 3 1 4 2 (c) 2 3 4 1 (d) 1 3 2 4 Identify media resources that may be helpful in the teaching-learning process. (a) Newspaper (b) Picture (c) Exhibitions (d) All of the above Which of the following types of learning materials are in the form of real objects or ideals that make the concepts very clear? (a) Visual material (b) Surrounding environment (c) Information and Communication Technology (d) Tactile material Most effective teaching aid is (a) non-projected (b) direct experience (c) projected (d) None of these ______ are models used to explain the process involved. (a) Working models (b) Replica models (c) Specimens (d) Photographs Which of the following is NOT an audio-visual aid used by a teacher in classroom for teachinglearning process? (a) Television (b) Films (c) Computer assisted instruction (d) Graphs What is most important while writing on blackboard? (a) Good writing (b) Clarity in writing (c) Writing in big letters (d) Writing in small letters The use of teaching aids is justified on the grounds of: (a) Attracting students attention in the classroom. (b) Minimizing indiscipline problems in the classroom. (c) Optimizing learning outcomes of students. (d) Effective engagement of students in learning tasks By using audio-visual teaching aids: (a) Students become active in classroom learning Pedagogy 79. 80. 81. 82. 83. 84. 85. 86. 271 (b) Teaching becomes active in teaching (c) Teaching becomes effective (d) All of the above The selection of teaching aid depends largely on the ______ (a) age of students (b) interests of students (c) age and motivation of students (d) educational level and age of students Which of the following is not a physical facility provided by the state schools? (a) Room size (b) Drinking water (c) Seating arrangements (d) Smart boards Learning across multiple contexts through social and content interactions using personal electronic devices is called (a) Co-operative learning (b) Team learning (c) M-learning (d) E-learning The pedagogy which involves productive learning and finding new solutions to problems, where manipulation of existing information and creation of real-world products are possible with ICT, is called (a) Collaborative pedagogy (b) Creative pedagogy (c) Integrative pedagogy (d) Evaluative pedagogy Given below are two statements: One is labeled as Assertion (A) and the other is labeled as Reason (R). Assertion (A) : The use of ICT has a great potential for optimizing learning outcomes. Reason (R) : ICT promotes scope for variety, flexibility and attractiveness. In the light of the above statements, choose the correct answer from the options given below: (a) Both A and R true and R is the correct explanation of A (b) Both A and R are true but R is NOT the correct explanation of A (c) A is true but R is false (d) A is false but R is true ______ proposed that learning can happen by observing others. (a) Gardener (b) Albert Bandura (c) Chomasky (d) Jerome Brunner Find out correct sequence of technology based growth of learning pattern. (a) 'M-learning' – 'U-learning' – 'E-learning' (b) 'E-learning' – 'M-learning' – 'U-learning' (c) 'T-learning' – 'E-learning' – 'M-learning' (d) 'U-learning' – 'M-learning' – 'E-learning' Which of the following is/are major issues arising out of the growing reliance on information technology? 1. Profitability 2. Security threats 3. Privacy concerns Choose the correct option: (a) 1 and 2 only (b) 1 and 3 only (c) 2 and 3 only (d) 1, 2 and 3 YCT 87. 88. 89. 90. 91. 92. 93. 94. Information Technology (IT) Act 2000 came into force on? (a) 17 October 2000 (b) 9 June 2000 (c) 1 June 2000 (d) 1 October 2000 Which of the following is Doordarshan's educational television channel? (a) Gurukul (b) Gyan Bharati (c) Gyan Darshan (d) Vidya Who is known as the father of modern media education. (a) Edger Dale (b) Flanders (c) Erikson (d) Charles Babbage Method used to transfer information to far off places instantly is called (a) Data (b) Information technology (c) Language (d) Tele communication As per CBSE, the test which is designed to proved a measure of performance that is compared with pre-specified level of accomplishment is known as: (a) prognostic test (b) norm reference test (c) criterion-reference test (d) standardised test Continuous, comprehensive and scholastic evaluation means: (a) Scholastic evaluation of students (b) Physical evaluation of students (c) Evaluation of students through continuous examination (d) Evaluation of overall development of students through continuous evaluation Which of the following is the least important function of grading system of evaluation? (a) It gives information about students academic progress (b) It is used for administrative purposes (c) It provides short term goals (d) It helps in developing an evaluation system Evaluation is a continuous process, which involves (a) Learner (b) Curriculum (c) Teaching objectives (d) All of the above 95. A college teacher conducts a quiz session with a view to accelerate the tempo of motivational participation. This will form part of which type of evaluation? (a) Summative evaluation (b) Criterion based evaluation (c) Formative evaluation (d) Diagnostic evaluation 96. Which one of the following assessment procedures is conducted during an in progress teaching-learning session? (a) Summative (b) Formative (c) Norm-referenced (d) Criterion-referenced 97. The purpose of the evaluation is (a) to label children as slow learner and gifted children (b) to identify children who need remediation (c) to diagnose learning difficulties and problem areas (d) to provide feedback on the extent to which we have been successful in imparting education for a productive life. 98. In _____ the role of measurement is to provide an overview or achievement across a number of skills. (a) Formative evaluation (b) Summative evaluation (c) Diagnostic evaluation (d) None of the above 99. Which of the following is not the limitation of an achievement test? (a) Scores in the achievement test may not be the exact measure of achievement. (b) Factors like standard of teaching, completion of curriculum may not be measured (c) It is good for critical examination of the content and the methods of teaching (d) Achievement scores of students differ in similar types of achievement tests. 100. The most important step of teaching learning system which includes observing, testing and assessing is called (a) Leading (b) Evaluating (c) Planning (d) Organising ANSWER KEY 1. (c) 11. (d) 21. (a) 31. (c) 41. (c) 51. (a) 61. (c) 71. (d) 81. (c) 91. (c) Pedagogy 2. (a) 12. (d) 22. (c) 32. (c) 42. (c) 52. (d) 62. (d) 72. (d) 82. (b) 92. (d) 3. (c) 13. (d) 23. (b) 33. (c) 43. (c) 53. (b) 63. (a) 73. (b) 83. (a) 93. (b) 4. (b) 14. (b) 24. (b) 34. (a) 44. (b) 54. (c) 64. (a) 74. (a) 84. (b) 94. (d) 5. (c) 15. (a) 25. (d) 35. (a) 45. (a) 55. (b) 65. (d) 75. (d) 85. (b) 95. (d) 272 6. (b) 16. (d) 26. (a) 36. (b) 46. (c) 56. (d) 66. (c) 76. (a) 86. (c) 96. (b) 7. (d) 17. (d) 27. (a) 37. (d) 47. (d) 57. (c) 67. (d) 77. (c) 87. (a) 97. (d) 8. (c) 18. (a) 28. (b) 38. (c) 48. (b) 58. (d) 68. (d) 78. (d) 88. (c) 98. (b) 9. (d) 19. (a) 29. (a) 39. (c) 49. (a) 59. (d) 69. (d) 79. (d) 89. (a) 99. (c) 10. (a) 20. (a) 30. (a) 40. (d) 50. (a) 60. (d) 70. (b) 80. (d) 90. (d) 100. (b) YCT