Uploaded by naveen saini

IT Officer Questions & Answers PDF by AffairsCloud

advertisement
AffairsCloud Q&A PDF
IT Officer Questions & Answers
Table of Contents
Computer Networks Questions .......................................................................................................................... 2
Data Structures Questions ................................................................................................................................ 32
Mixed Questions 1 ........................................................................................................................................... 63
Compiler Questions ......................................................................................................................................... 79
DBMS Questions: Part - I ................................................................................................................................ 88
Mixed Questions:2 ......................................................................................................................................... 115
DBMS Questions: Part - 2 ............................................................................................................................. 120
Kindly Check Other PDF’s





AffairsCloud Exam PDF
Current Affairs PDF
Current Affairs Pocket PDF
Current Affairs Questions & Answers PDF
Study Material PDF
“Help others achieve their dreams and you will achieve yours”
Help:
If You Satisfied with our Capsule, kindly donate some amount to SavetheChildren.in –
Education is a Gift for Life or Kindly Suggest this site to your family members & friends.
1|Page
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
Computer Networks Questions
1. The building block of a Wireless LAN as defined by IEEE 802.11 standard?
(A) BSS
(B) ESS
(C) Both (A) & (B)
(D) None of the above
Answer- (A) BSS
2. A protocol that provides configuration information from a table is called…..
(A) BGP
(B) BOOTP
(C) FTP
(D) None of the above
Answer- (B) BOOTP
3. CIDR stands for
(A) Code Inter Domain Routing
(B) Code Inter Division Routing
(C) Classless Inter Domain Routing
(D) Classful Inter Domain Routing
Answer- (C) Classless Inter Domain Routing
4. In PPP, a three-way handshaking protocol used for authentication is known
as……
(A) CHAP
(B) BOOTP
(C) FTP
(D) None of the above
Answer- (A) CHAP
5. A technique in which a protocol used for address resolution is called……
(A) dynamic routing
(B) dynamic mapping
(C) exterior routing
(D) None of the above
Answer- (B) dynamic mapping
6. Which of the following converts user friendly names to IP addresses?
(A) Domain Name Space
(B) Domain Name System
(C) DHCP
(D) None of the above
Answer- (B) Domain Name System
7. A protocol in which the sender sends one frame and stops until it receives
confirmation from the receiver?
2|Page
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
(A) Stop and Wait ARQ
(B) Store and forward switch
(C) Stop and Wait Protocol
(D) None of the above
Answer- (C) Stop and Wait Protocol
8. Which of the following is an application service for retrieving a web document?
(A) HTML
(B) HTTP
(C) FTP
(D) None of the above
Answer- (B) HTTP
9. You are in the process of analyzing a problem that requires you to collect and
store TCP/IP Packets.Which of the following utilities is best suited for this purpose?
(A) Performance Monitor
(B) Network Monitor
(C) NETSTAT
(D) NBTSTAT
Answer- (B) Network Monitor
10. Which of the following protocol provides confidentiality and authentication for
an e-mail?
(A) BGP
(B) BOOTP
(C) PGP
(D) None of the above
Answer- (C) PGP
11. An addressing method in which the IP address space is not divided into classes?
(A) Classful addressing
(B) Classless addressing
(C) Classless IDR
(D) None of the above
Answer- (B) Classless addressing
12. The number of differences between the corresponding bits in a two data words
is known as…… distance
(A) Hanning
(B) Hamming
(C) Huffman
(D) None of the above
Answer- (B) Hamming
13. An Address Resolution Protocol (ARP) request is ____________
(A) unicast
(B) anycast
(C) broadcast
3|Page
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
(D) None of the above
Answer- (C) broadcast
14. The splitting of a message into multiple packets at transport layer is known
as______
(A) Fragmentation
(B) Segmentation
(C) Synchronization
(D) None of the above
Answer- (B) Segmentation
15. RARP stands for____
(A) Reverse Address Resolution Protocol
(B) Reverse Address Routing Protocol
(C) Reverse Address Reflexive Protocol
(D) Resource Address Resolution Protocol
Answer- (A) Reverse Address Resolution Protocol
16. The loss of signal’s energy due to the resistance of medium is called……
(A) Fragmentation
(B) Attenuation
(C) Synchronization
(D) None of the above
Answer- (B) Attenuation
17. In Wireless LAN’s, a time interval between two frames to control access to the
channel is called…..
(A) Interframe space
(B) Interleaving
(C) Interior routing
(D) None of the above
Answer- (A) Interframe space
18. An array of switches that are used to reduce the number of cross points is
called…..
(A) single stage switch
(B) dual stage switch
(C) multistage switch
(D) None of the above
Answer- (C) multistage switch
19. An application protocol of TCP/IP that allows remote login is known as…….
(A) NCP
(B) NVT
(C) NAV
(D) None of the above
Answer- (B) NVT
4|Page
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
20. TFTP stands for……
(A) Trivial File Transfer Protocol
(B) Temporary File Transfer Protocol
(C) Trunk File Transfer Protocol
(D) Transparent File Transfer Protocol
Answer- (A) Trivial File Transfer Protocol
21. Communication in a Hybrid Fiber Coaxial (HFC) cable TV network can be
(A) unidirectional
(B) bidirectional
(C) multidirectional
(D) None of the above
Answer-(B) bidirectional
22. Circuit switching uses…..
(A) Space Division Switch
(B) Time Division Switch
(C) Either (A) or (B)
(D) None of the above
Answer- (C) Either (A) or (B)
23. ADSL stands for
(A) Asynchronous Digital Subscriber Line
(B) Asymmetric Digital Subscriber Line
(C) Advanced Digital Subscriber Line
(D) Asynchronous Digital Security Line
Answer-(B) Asymmetric Digital Subscriber Line
24. Encryption and decryption of data are the responsibility of ……. layer
(A) Physical
(B) Datalink
(C) Transport
(D) Presentation
Answer-(D) Presentation
25. What is the main function of transport layer in the OSI model?
(A) peer to peer message delivery
(B) node to node message delivery
(C) process to process message delivery
(D) None of the above
Answer- (C) process to process message delivery
26. OSI stands for…..
(A) Open Systems Interconnection
(B) Original Systems Interconnection
(C) Original Security Interconnection
(D) Open Software Interconnection
Answer- (A) Open Systems Interconnection
5|Page
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
27. In OSI model, as the data packet moves from the upper to the lower layers,
headers are _______.
(A) added
(B) removed
(C) deleted
(D) edited
Answer- (A) added
28. Which of the following layer is the User Support layer?
(A) Session layer
(B) Presentation layer
(C) Application layer
(D) All of the above
Answer- (D) All of the above
29. Error detection at the data link layer is achieved by…..
(A) Hamming code
(B) Cyclic Redundancy Code
(C) Bit stuffing
(D) synchronization
Answer- (B) Cyclic Redundancy Code
30. Port address in TCP/IP is ….. bits long
(A) 16
(B) 32
(C) 64
(D) 128
Answer- (A) 16
31. IEEE 802.3 standard used what method as the media access method?
(A) CSMA/CD
(B) CSMA/CA
(C) CDMA
(D) FDMA
Answer- (A) CSMA/CD
32. WEP stands for
(A) Wireless Equivalent Privacy
(B) Wired Equivalent Privacy
(C) Wired Equivalent Protocol
(D) Wireless Equivalent Protocol
Answer- (A) Wireless Equivalent Privacy
33. What is the key element of a Protocol?
(A) Syntax
(B) Semantics
(C) Timing
6|Page
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
(D) All of the above
Answer- (D) All of the above
34. Gigabit Ethernet has a data rate of
(A) 100 Mbps
(B) 1000 Mbps
(C) 500 Mbps
(D) None
Answer- (B) 1000 Mbps
35. The datalink layer of Ethernet consists of
(A) LLC sublayer
(B) MAC sublayer
(C) Both (A) & (B)
(D) Only (B)
Answer- (C) Both (A) & (B)
36. What is the minimum & maximum frame length for 10 Mbps Ethernet?
(A) 32 bytes, 64 bytes
(B) 64 bytes, 128 bytes
(C) 64 bytes, 1518 bytes
(D) 32 bytes, 1518 bytes
Answer- (C) 64 bytes, 1518 bytes
37. SNMP stands for
(A) Simple Network Management Protocol
(B) Sample Network Management Protocol
(C) Structured Network Management Protocol
(D) Security Network Management Protocol
Answer- (A) Simple Network Management Protocol
38. Which of the following refers to a group of standards that are still being
developed as a part of overall IEEE 802.11 WLAN support?
(A) 802.11i
(B) 802.11x
(C) Both (A) & (B)
(D) None of the above
Answer- (C) Both (A) & (B)
39. Which of the following is a security protocol designed to provide a wireless LAN
with better security and privacy?
(A) WEP
(B) SNMP
(C) WAP
(D) LDAP
Answer- (C) WAP
40. Which of the following is a timer used for Collision Avoidance (CA)?
7|Page
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
(A) PCF
(B) MAC
(C) NAV
(D) None of the above
Answer- (C) NAV
41. Peer-to-Peer (P2P) is a ……..communications model
(A)Centralized
(B)decentralized
(C)client/server
(D)None
Answer- (B)decentralized
42. Ethernet, token ring and token bus are types of………
(A) MAN
(B) WAN
(C) LAN
(D) None
Answer- (C) LAN
43. What is the name of network topology in which there are bidirectional links
between each possible node?
(A) Star
(B) Mesh
(C) Ring
(D) None
Answer- (B) Mesh
44. Fiber Distributed Data Interface (FDDI) is an example of which topology?
(A) Star
(B) Mesh
(C) Ring
(D) None
Answer- (C) Ring
45. Which TCP/IP protocol is used for file transfer with minimal capability and
minimal overhead?
(A) SGMP
(B) TFTP
(C) SUMP
(D) None
Answer- (B) TFTP
46. An IPV6 address is…… bits long
(A) 64
(B) 128
(C) 256
(D) 512
8|Page
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
Answer- (B) 128
47. Addresses in Class D are used for…..
(A) Unicast Communication
(B) Multicast Communication
(C) Both (A) & (B)
(D) None
Answer- (B) Multicast Communication
48. An IPV4 address is…..bits long
(A) 64
(B) 128
(C) 256
(D) 32
Answer- (D) 32
49. How many classes are there in IPV4 addresses?
(A) 7
(B) 4
(C) 5
(D) 6
Answer- (C) 5
50. What are the three types of addresses in IPV6?
(A) Class A, Class B, Class C
(B) Unicast, anycast, multicast
(C) Unicast, dual cast, multicast
(D) None
Answer- (B) Unicast, anycast, multicast
51. Switch is a device of……. Layer of OSI model?
(A) Physical
(B) Datalink
(C) Application
(D) Session
Answer- (B) Datalink
52. Packets are found at which layer?
(A) Physical
(B) Datalink
(C) Application
(D) Network
Answer- (D) Network
53. The IP address 135.0.10.27 belongs to address class?
(A) Class A
(B) Class B
(C) Class C
9|Page
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
(D) None
Answer- (B) Class B
54. An http request contains how many parts?
(A) 1
(B) 2
(C) 3
(D) 4
Answer- (C) 3
55. A device which divides the incoming signal into low frequencies to send to voice
devices, and high frequencies for data to the computer.
(A) multicast router
(B) interface
(C) splitter
(D) None
Answer- (C) splitter
56. Which of the following function is performed by TCP?
(A) Flow Control
(B) Error checking
(C) Subnetting
(D) All of the above
Answer- (D) All of the above
57. Which layer establishes, maintains & synchronizes the interaction between
communicating devices?
(A) Physical
(B) Datalink
(C) Application
(D) Session
Answer- (D) Session
58. Which of the following is a timer used for collision avoidance?
(A) NAV
(B) DCF
(C) PCF
(D) None
Answer- (A) NAV
59. The access method used in DCF MAC sub-layer is
(A) CSMA/CD
(B) CSMA/CA
(C) Polling
(D) None
Answer- (B) CSMA/CA
60. The access method used in PCF MAC sub-layer is
10 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
(A) CSMA/CD
(B) CSMA/CA
(C) Polling
(D) None
Answer- (C) Polling
61. Which layer is the closest to transmission medium?
(A) Transport layer
(B) Physical layer
(C) Network layer
(D) Datalink layer
Answer- (B) Physical layer
62. Which protocol is used to eliminate loops?
(A) TCP/IP
(B) Spanning Tree Protocol
(C) SMTP
(D) None
Answer- (B) Spanning Tree Protocol
63. What kind of scheme is the http protocol?
(A) get/put
(B) request/response
(C) store/forward
(D) queuing
Answer- (B) request/response
64. Which layer of OSI determines the interface of the system with the user?
(A) Session layer
(B) Application layer
(C) Network layer
(D) Datalink layer
Answer- (B) Application layer
65. Which of the following is an example of client-server model?
(A) FTP
(B) DNS
(C) TELNET
(D) All of the above
Answer- (D) All of the above
66. At which layer TCP/IP defines two protocols: Transmission Control
Protocol(TCP) and User Datagram Protocol(UDP)?
(A) Transport layer
(B) Application layer
(C) Network layer
(D) Datalink layer
Answer- (A) Transport layer
11 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
67. which of the following uses the greatest number of layers in the OSI model?
(A) Bridge
(B) Repeater
(C) Router
(D) Gateway
Answer- (D) Gateway
68. Which Protocol use link state routing?
(A) OSPF
(B) IGRP
(C) RIP
(D) None
Answer- (A) OSPF
69. Which PPP Protocol provides authentication and dynamic addressing?
(A) LCP
(B) NCP
(C) RIP
(D) None
Answer- (A) LCP
70. Which of the following layer is the network support layer?
(A) Physical layer
(B) Data link layer
(C) Network layer
(D) All of the above
Answer- (D) All of the above
71. Which protocol working at the Transport layer provides a connectionless service
between hosts?
(A) UDP
(B) ARP
(C) TCP/IP
(D) None
Answer- (A) UDP
72. Which protocol does Ping use?
(A) UDP
(B) ICMP
(C) TCP/IP
(D) None
Answer- (B) ICMP
73. UDP stands for
(A) User Datagram Protocol
(B) User Data Protocol
(C) Unlimited Datagram Protocol
12 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
(D) None
Answer- (A) User Datagram Protocol
74. What protocol does PPP use to identify the Network Layer Protocol?
(A) UDP
(B) ICMP
(C) NCP
(D) None
Answer- (C) NCP
75. With respect to a network interface card, the term 10/100 refers to
(A) protocol speed
(B) a fiber speed
(C) megabits per seconds
(D) None
Answer- (C) megabits per seconds
76. If you want to locate the hardware address of a local device, which protocol
would you use
(A) UDP
(B) ARP
(C) NCP
(D) None
Answer- (B) ARP
77. ______ is primarily used for mapping host names and email destinations to IP
address
(A) TCP
(B) DNS
(C) NCP
(D) None
Answer- (B) DNS
78. Which of the following TCP/IP protocol is used for transferring electronic mail
messages from one machine to another?
(A) TCP
(B) SMTP
(C) NCP
(D) None
Answer- (B) SMTP
79. _____ is the continuous ability to send and receive data between
interconnected networks.
(A) FTP
(B) SMTP
(C) TNS
(D) Network Interoperability
Answer- (D) Network Interoperability
13 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
80. What is the default subnet mask for a class C network?
(A) 127.0.0.1
(B) 2550.0.0
(C) 255.255.0.0
(D) 255.255.255.0
Answer- (D) 255.255.255.0
81. What is the default subnet mask for a class B network?
(A) 127.0.0.1
(B) 2550.0.0
(C) 255.255.0.0
(D) 255.255.255.0
Answer- (C) 255.255.0.0
82. What is loopback address?
(A) 127.0.0.1
(B) 255.0.0.0
(C) 255.255.0.0
(D) 127.0.0.0
Answer- (A) 127.0.0.1
83. A central computer surrounded by one or more satellite computers is called a
(A) Bus network
(B) Ring network
(C) Star network
(D) None of these
Answer- (C) Star network
84. A networking device that receives a signal on an electromagnetic or an optical
transmission medium, amplifies the signal,and then retransmits it along the
medium is called
(A) Router
(B) Hub
(C) transmitter
(D) Repeater
Answer- (D) Repeater
85. What is the default subnet mask for a class A network?
(A) 127.0.0.1
(B) 255.0.0.0
(C) 255.255.0.0
(D) 255.255.255.0
Answer- (B) 255.0.0.0
86. UTP stands for
(A) Unshielded Twisted Pair
(B) Unshielded Twisted Port
14 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
(C) Uniformly Twisted Pair
(D) None
Answer- (A) Unshielded Twisted Pair
87. Which of the following organization defines standards for modems?
(A) IEEE
(B) CCITT
(C) BELL
(D) None
Answer- (B) CCITT
88. Which topology requires a hub?
(A) Ring
(B) Star
(C) Bus
(D) None
Answer- (B) Star
89. Which OSI layer divides a file into segments that are an efficient size for
routing?
(A) Transport Layer
(B) Network Layer
(C) Data link Layer
(D) None
Answer- (A) Transport Layer
90. FDDI stands for
(A) Fiber Data Distribution Interface
(B) Fiber Distributed Data Interface
(C) Fixed Data Distribution Interface
(D) None
Answer- (B) Fiber Distributed Data Interface
91. Which of the following are the types of Internal Network Cards?
(A) Peripheral Component Interconnect (PCI), Wireless Network Card
(B) Industry Standard Architecture (ISA),Wireless Network Card
(C) Peripheral Component Interconnect (PCI), Industry Standard Architecture(ISA)
(D) None of the Above
Answer- (C) Peripheral Component Interconnect (PCI), Industry Standard
Architecture(ISA)
92. A networking device that forwards data packets along networks and acts as a
central point of network is called
(A) Repeater
(B) Router
(C) Bridge
(D) Hub
Answer- (B) Router
15 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
93. Repeater operates in which layer of OSI model?
(A) Application layer
(B) Presentation layer
(C) Physical layer
(D) Transport layer
Answer- (C) Physical layer
94. Where does Bridge operate in OSI model?
(A) Physical layer
(B) Data link layer
(C) Both (1)and (2)
(D) Application layer
Answer- (B) Data link layer
95. ____ uses a standard called IEEE 802.6.
(A) LAN
(B) WAN
(C) MAN
(D) PAN
Answer- (C) MAN
96. Which is the general network standard for the data link layer in the OSI
Reference Model?
(A) IEEE 802.1
(B) IEEE 802.2
(C) IEEE 802.3
(D) IEEE 802.4
Answer- (B) IEEE 802.2
97. Which of the following IEEE Standard is used for Wi-Fi systems?
(A) 802.11
(B) 802.1
(C) 802.2
(D) 802.10
Answer- (A) 802.11
98. ____ refers to a family of IEEE standards dealing with local area network and
metropolitan area network.
(A) 802
(B) 800
(C) 801
(D) 803
Answer- (A) 802
99. Routers operate in which layer of the OSI model?
(A) Physical layer
(B) Data link layer
16 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
(C) Network Layer
(D) All of these
Answer- (C) Network Layer
100. A communication network which is used by large organizations over regional,
national or global area is called ___
(A) LAN
(B) WAN
(C) MAN
(D) PAN
Answer- (B) WAN
Operating Systems Questions:
101. Producer – Consumer problem, one of the classical problems of
synchronization is also called……
(A) Bounded Buffer Problem
(B) Readers Writers Problem
(C) Dining Philosophers Problem
(D) None of the above
Answer- (A) Bounded Buffer Problem
102. Which of the following command is used to print current working directory in
Unix?
(A) mkdir
(B) pwd
(C) rm
(D) None of the above
Answer- (B) pwd
103. ……. is a classic synchronization problem that involves the allocation of limited
resources amongst a group of processes in a deadlock free and starvation free
manner.
(A) Bounded Buffer Problem
(B) Dining Philosophers Problem
(C) Readers Writers Problem
(D) None of the above
Answer- (B) Dining Philosophers Problem
104. ……. is a system call that returns the process ID of the parent of the current
process.
(A) getpid
(B) wait
(C) getppid
(D) None of the above
Answer- (C) getppid
105. Which of the following is standard print command in Unix?
17 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
(A) ncftp
(B) grep
(C) ls
(D) lpr
Answer- (D) lpr
106. In Unix, “file” command is used to determine ……
(A) file name
(B) file type
(C) file content
(D) None of the above
Answer- (B) file type
107. What is the full form of RTSP?
(A) Real Time System Protocol
(B) Real Transfer System Protocol
(C) Real Time Streaming Protocol
(D) Real Trigger Streaming Protocol
Answer- (C) Real Time Streaming Protocol
108. Which of the following is a System call that can be used to send signal to a
process?
(A) kill
(B) wait
(C) exec
(D) None of the above
Answer- (A) kill
109. …….. allows a thread to terminate the execution of other threads in the
process.
(A) Thread Scheduling
(B) Thread Safety
(C) Thread Cancellation
(D) None of the above
Answer- (C) Thread Cancellation
110. Which of the following scheduling algorithm is impossible to implement?
(A) FCFS Scheduling
(B) Priority Scheduling
(C) Shortest Job First (SJF) Scheduling
(D) None of the above
Answer- (C) Shortest Job First (SJF) Scheduling
111. …… provides an Interface between the process and the Operating System
(A) Synchronization
(B) System call
(C) Segmentation
18 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
(D) None of the above
Answer- (B) System call
112. The resolution of externally defined symbols is performed by?
(A) Compiler
(B) Assembler
(C) Linker
(D) None of the above
Answer- (C) Linker
113. Which of the following is not used on multiprogramming systems?
(A) Memory Management
(B) File Management
(C) Process Management
(D) None of the above
Answer- (A) Memory Management
114. …… is a system call that runs an executable file into an existing process.
(A) fork
(B) wait
(C) exec
(D) None of the above
Answer- (C) exec
115. Which of the following technique is used to convert a blocking system call into
a non blocking system call?
(A) Segmentation
(B) Jacketing
(C) Fragmentation
(D) None of the above
Answer- (B) Jacketing
116. One user-level thread is mapped to many kernel level thread is known as….
(A) One to Many model
(B) One to One model
(C) Many to One model
(D) None of the above
Answer- (A) One to Many model
117. In Operating Systems, a single thread is termed as
(A) Light Weight Process (LWP)
(B) Heavy Weight Process (HWP)
(C) Both (A) & (B)
(D) None of the above
Answer- (B) Heavy Weight Process (HWP)
118. ……. is a system call that returns the process ID of current process.
(A) getpid
19 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
(B) wait
(C) getppid
(D) None of the above
Answer- (A) getpid
119. In Unix, “cat” command is used to display ……
(A) file names
(B) folder names
(C) file contents
(D) None of the above
Answer- (C) file contents
120. Which of the following command is used to create terminal connection to
another host in Unix?
(A) ssh
(B) scp
(C) telnet
(D) None of the above
Answer- (C) telnet
121. ………. is an user interface that uses only keyboard for input.
(A) Graphical User Interface
(B) Command Line Interface
(C) Both (A) & (B)
(D) None of the above
Answer- (B) Command Line Interface
122. Which of the following is an example of Preemptive Multi-Tasking OS?
(A) MS-DOS
(B) Linux
(C) OS/2
(D) Mac OS
Answer- (C) OS/2
123. An Operating System that can predict the exact time duration for operations is
called
(A) Hard RTOS
(B) Soft RTOS
(C) Both (A) & (B)
(D) None of the above
Answer- (A) Hard RTOS
124. The use of software to allow system hardware to run multiple applications on
different OS is termed as
(A) OS Virtualization
(B) OS level Virtualization
(C) Both (A) & (B)
(D) None of the above
20 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
Answer- (A) OS Virtualization
125. The command interpreter in Linux is known as …..
(A) Fork
(B) Kernel
(C) Shell
(D) None of the above
Answer- (C) Shell
126. Which is a hardware register that contains status information of the
Processor?
(A) Stack pointer
(B) Program Counter
(C) Accumulator
(D) Status register
Answer- (D) Status register
127. Physical memory can be divided into a number of equal sized blocks called…..
(A) Page
(B) Frame
(C) Block
(D) None of the above
Answer- (B) Frame
128. The most commonly used Linux shell is…….
(A) C Shell
(B) Korn Shell
(C) Bourne Shell
(D) Bash Shell
Answer- (D) Bash Shell
129. A table that contains the base address of each page in physical memory is
called…..
(A) Page table
(B) Frame table
(C) Memory table
(D) None of the above
Answer- (A) Page table
130. Virtual memory can be implemented with ……
(A) Thrashing
(B) Synchronization
(C) Demand Paging
(D) None of the above
Answer- (C) Demand Paging
131. A register that can be used for memory protection is called……
(A) memory data register
21 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
(B) fence register
(C) memory buffer register
(D) index register
Answer- (B) fence register
132. …… occurs in a dynamic memory allocation system when most of the free
blocks are too small to satisfy any request?
(A) Paging
(B) Segmentation
(C) Fragmentation
(D) None of the above
Answer- (C) Fragmentation
133. Which of the following holds the data currently being worked on?
(A) Stack pointer
(B) Program Counter
(C) Accumulator
(D) None of the above
Answer- (C) Accumulator
134. The total number of processes completed per unit time is termed as
(A) throughput
(B) response time
(C) waiting time
(D) None of the above
Answer- (A) throughput
135. .….. is generic and that can run on any OS.
(A) Kernel level thread
(B) User level thread
(C) Both (A) & (B)
(D) None of the above
Answer- (B) User level thread
136. Which of the following is multi threading model?
(A) many to many relationship
(B) many to one relationship
(C) one to One relationship
(D) All of the above
Answer- (D) All of the above
137. …….files represent physical devices like printers, terminals etc.,
(A) Ordinary files
(B) Directory files
(C) Special files
(D) None of the above
Answer- (C) Special files
22 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
138. An interrupt that is reserved for unrecoverable memory errors is called……
(A) maskable interrupt
(B) non maskable interrupt
(C) Both (A) & (B)
(D) None of the above
Answer- (B) non maskable interrupt
139. Process Control Block (PCB) is also called……
(A) Program Control Block
(B) Memory Control Block
(C) Task Control Block
(D) None of the above
Answer- (C) Task Control Block
140. The process that is currently being executed is called
(A) Waiting State
(B) Running State
(C) Ready state
(D) None of the above
Answer- (B) Running State
141. …… holds the address of the next instruction to be executed?
(A) Accumulator
(B) Stack Pointer
(C) Status Register
(D) Program Counter
Answer- (D) Program Counter
142. Which of the following condition leads to deadlock?
(A) Hold and Wait
(B) Preemption
(C) Rollback
(D) None of the above
Answer- (A) Hold and Wait
143. Which type of scheduler is used in batch systems?
(A) Medium Term Scheduler
(B) Short Term Scheduler
(C) Long Term Scheduler
(D) None of the above
Answer- (C) Long Term Scheduler
144. Message queuing is managed by?
(A) Shell
(B) Kernel
(C) Fork
(D) None of the above
Answer- (B) Kernel
23 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
145. Interrupt latency should be…… for Real Time Operating Systems (RTOS)?
(A) minimal
(B) maximum
(C) zero
(D) None of the above
Answer- (A) minimal
146. In DOS, MD command is used to….
(A) display message on screen
(B) create new files
(C) create new folders
(D) None of the above
Answer- (C) create new folders
147. Which of the following is the delay that occur during the playback of a stream
is called?
(A) jitter
(B) playback delay
(c) stream delay
(D) None of the above
Answer- (A) jitter
148. The high paging activity is called………
(A) Fragmentation
(B) Segmentation
(C) Thrashing
(D) None of the above
Answer- (C) Thrashing
149. Which is not a valid state of a thread?
(A) running
(B) blocked
(C) parsing
(D) None of the above
Answer- (C) parsing
150. The …… register is read by the host to get input
(A) data out
(B) data in
(C) flow out
(D) None of the above
Answer- (B) data in
151. Which of the following scheduling algorithms provide minimum average
waiting time?
(A) Round Robin (RR)
(B) First come First Serve (FCFS)
24 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
(C) Shortest Job First Scheduling
(D) None of the above
Answer- (C) Shortest Job First Scheduling
152. Medium term scheduler is based on
(A) Scroll in, Scroll out
(B) Fetch in, Fetch out
(C) Swap in, Swap out
(D) None of the above
Answer- (C) Swap in, Swap out
153. A computer is restarted by restart button or by pressing the Combination of
(Ctrl+Alt+Del). This type of booting is called
(A) Cold Booting
(B) Warm Booting
(C) Both (A) and (B)
(D) None of the above
Answer- (B) Warm Booting
154. Which of the following is a type of Semaphores?
(A) Binary Semaphore
(B) Counting Semaphore
(C) Both(A) & (B)
(D) None of the above
Answer- (C) Both(A) & (B)
155. ……. are required to complete a critical task within a guaranteed amount of
time.
(A) Real Time Operating Systems
(B) Multi Tasking Operating Systems
(C) Distributed Operating Systems
(D) None of the above
Answer- (A) Real Time Operating Systems
156. Long Term Scheduler is a……
(A) CPU scheduler
(B) process swapping scheduler
(C) job scheduler
(D) None of the above
Answer- (C) job scheduler
157. …… is a way of processing data serially.
(A) spooling
(B) caching
(C) Paging
(D) All of the above
Answer- (A) spooling
25 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
158. Which of the following is true for the algorithms for memory allocation?
(A) First Fit
(B) Best Fit
(C) Worst Fit
(D) All of the above
Answer- (D) All of the above
159. Which type of scheduler typically uses a FIFO or Priority queue?
(A) Short Term Scheduler
(B) Medium Term Scheduler
(C) Long Term Scheduler
(D) All of the above
Answer- (A) Short Term Scheduler
160. Which of the following is a solution to fragmentation problem?
(A) Thread
(B) Kernel
(C) Paging
(D) All of the above
Answer- (C) Paging
161. First Come First Serve(FCFS) is
(A) Preemptive scheduling
(B) Non-preemptive scheduling
(C) deadline scheduling
(D) None of the above
Answer- (B) Non-preemptive scheduling
162. A variant of deadlock is called….
(A) Mutex lock
(B) Live lock
(C) Both(A) & (B)
(D) None of the above
Answer- (B) Live lock
163. ….. is a system call that causes the caller to block.
(A) Await
(B) Sleep
(C) Wakeup
(D) None of the above
Answer- (B) Sleep
164. …… is the most used method to communicate over a network.
(A) Sockets
(B) Semaphores
(C) Pipes
(D) None of the above
Answer- (A) Sockets
26 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
165. …… is the process of switching of CPU from one thread to another.
(A) Process handling
(B) interrupt handling
(C) Context switching
(D) None of the above
Answer- (C) Context switching
166. Which of the following is an example of Real Time Operating Systems?
(A) Lynx OS
(B) Mac OS
(C) UNIX
(D) None of the above
Answer- (A) Lynx OS
167. Which of the following is a function of an OS?
(A) Process Management
(B) I/O Management
(C) Memory Management
(D) All of the above
Answer- (D) All of the above
168. In DOS, ECHO command is used to….
(A) display message on screen
(B) display the contents of a text file
(C) Both (A) & (B)
(D) None of the above
Answer- (A) display message on screen
169. Which of the following is an external command of DOS?
(A) CALL
(B) SHIFT
(C) TITLE
(D) FORMAT
Answer- (D) FORMAT
170. …… is a technique used to speed up communication with slow devices.
(A) Fragmentation
(B) Caching
(C) Segmentation
(D) None of the above
Answer- (B) Caching
171. Round Robin(RR) scheduling algorithm is suitable for……
(A) Real Time Operating Systems
(B) Embedded Operating Systems
(C) Distributed Operating Systems
27 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
(D) Time Sharing Operating Systems
Answer- (D) Time Sharing Operating Systems
172. …… is a special system software that is used to handle process scheduling in
different ways.
(A) Fork
(B) Scheduler
(C) Spawn
(D) None of the above
Answer- (B) Scheduler
173. Short term scheduler is a……
(A) CPU scheduler
(B) process swapping scheduler
(C) job scheduler
(D) None of the above
Answer- (A) CPU scheduler
174. Which one of the following scheduler controls the degree of
multiprogramming?
(A) Long Term Scheduler
(B) Medium Term Scheduler
(C) Short Term Scheduler
(D) None of the above
Answer- (A) Long Term Scheduler
175. Which of the following is a scheduling algorithm that allows a process to move
up and down between queues?
(A) Round Robin(RR) scheduling
(B) First Come First Served (FCFS) scheduling
(C) Multilevel feedback queue scheduling
(D) Shortest Job First (SJF) scheduling
Answer- (C) Multilevel feedback queue scheduling
176. ….. commands are automatically loaded into main memory when the booting
process gets completed.
(A) External
(B) Internal
(C) Both (A) & (B)
(D) None
Answer- (B) Internal
177. Which of the following is an Internal command?
(A) DEBUG
(B) EDIT
(C) EXTRACT
(D) COPY
Answer- (D) COPY
28 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
178. Which of the following is an example of Batch Processing Operating Systems?
(A) Lynx OS
(B) Mac OS
(C) UNIX
(D) None of the above
Answer- (C) UNIX
179. In DOS, TYPE command is used to….
(A) display message on screen
(B) display the contents of a text file
(C) Both (A) & (B)
(D) None
Answer- (B) display the contents of a text file
180. ….. process checks to ensure the components of the computer are operating
and connected properly.
(A) Editing
(B) Saving
(C) Booting
(D) None of the above
Answer- (C) Booting
181. An Integer variable that is used to manage concurrent processes is called…..
(A) Thread
(B) Semaphore
(C) Counter
(D) None of the above
Answer- (B) Semaphore
182. Dijkstra’s banking algorithm for resource allocation is used for
(A) Deadlock detection
(B) Deadlock prevention
(C) Deadlock avoidance
(D) Deadlock recovery
Answer- (C) Deadlock avoidance
183. In UNIX, cached disk blocks are managed by the Kernel and referred to as…..
(A) Cache
(B) Disk Cache
(C) Buffer Cache
(D) None of the above
Answer- (C) Buffer Cache
184. …… is the smallest unit for processing that consists of a program counter, a
stack & a set of registers.
(A) Compiler
(B) Thread
29 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
(C) Heap
(D) None of the above
Answer- (B) Thread
185. Which of the following services is not supported by the OS?
(A) I/O Operation
(B) Protection
(C) Compilation
(D) None of the above
Answer- (C) Compilation
186. Which of the following is used to remove deadlock?
(A) Preemption
(B) Mutual Exclusion
(C) Circular Wait
(D) None of the above
Answer- (A) Preemption
187. First Come First Serve (FCFS) Scheduling is…….
(A) used to reduce waiting time
(B) easy to understand and implement
(C) impossible to implement
(D) None of the Above
Answer- (B) easy to understand and implement
188. ……… is a system call of OS that is used to create a new process?
(A) Shell
(B) Kernel
(C) Fork
(D) Thread
Answer- (C) Fork
189. Which of the following is an example of Cooperative Multi-Tasking OS?
(A) Lynx OS
(B) Mac OS
(C) MS DOS
(D) None of the above
Answer- (B) Mac OS
190. The performance of Round Robin(RR) scheduling depends on……
(A) quantum
(B) priority
(C) preemption
(D) None of the above
Answer- (A) quantum
191. …… is mainly responsible for allocating the resources as per process
requirement?
30 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
(A) RAM
(B) Compiler
(C) Operating Systems
(D) Software
Answer- (C) Operating Systems
192. Which of the following plays an important role in modern Operating
Systems(OS)?
(A) Kernel
(B) Shell
(C) Fork
(D) None
Answer- (A) Kernel
193. FAT stands for
(A) File Allocation Table
(B) File Application Table
(C) First Allocation Table
(D) First Application Table
Answer- (A) File Allocation Table
194. BAT refers to…
(A) Executable Files
(B) Batch Files
(C) Boot Files
(D) None
Answer- (B) Batch Files
195. ….. occur commonly in multi-tasking when two or more threads waiting for
each other.
(A) Kernel
(B) Shell
(C) Fork
(D) Deadlock
Answer- (D) Deadlock
196. In DOS the DIR command is used to…….
(A) Display Information
(B) Display list of files & Sub directories
(C) Delete files
(D) Copy files
Answer- (B) Display list of files & Sub directories
197. …… is the program which interprets commands given by the user?
(A) Kernel
(B) Shell
(C) Fork
(D) None
31 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
Answer- (B) Shell
198. Which of the following is an MS-DOS external command?
(A) DIR
(B) COPY
(C) FORMAT
(D) PROMPT
Answer- (C) FORMAT
199. In DOS label command is used to….
(A) Create the label of disk
(B) Change the label of disk
(C) Both (A) & (B)
(D) None
Answer- (C) Both (A) & (B)
200. NTFS stands for…..
(A) New Technology File System
(B) New Transmission File System
(C) Net Transmission File System
(D) None
Answer- (A) New Technology File System
Data Structures Questions
201. A postfix expression is merely the _____ of the prefix expression.
(A) Forward
(B) Reverse
(C) Inverse
(D) None of the above
Answer- (B) Reverse
202. Which of the following begins the search with the element that is located in
the middle of the Array?
(A) Random Search
(B) Parallel Search
(C) Binary Search
(D) Serial Search
Answer- (D) Serial Search
203. In a Circular linked list, insertion of a record involves the modification of____
(A) 1 Pointer
(B) 2 Pointer
(C) 3 Pointer
(D) None of the above
Answer- (B) 2 Pointer
32 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
204. Which of the following is useful in traversing a given graph by breadth first
search?
(A) Stack
(B) List
(C) Queue
(D) None of the above
Answer- (C) Queue
205. A characteristic of the data that binary search uses but linear search ignores
is______
(A) Order of the list
(B) length of the list
(C) Both (A) & (B)
(D) None of the above
Answer- (A) Order of the list
206. A sort which iteratively passes through a list to exchange the first element
with any element less than it and then repeats with a new first element is
called__________
(A) Heap Sort
(B) Quick Sort
(C) Selection Sort
(D) None of the above
Answer- (C) Selection Sort
207. To insert a node in a circular list at rear position, it should be inserted at
______ of the Queue.
(A) Front – 1 position
(B) Rear position
(C) Front position
(D) None of the above
Answer- (C) Front position
208. In an extended-binary tree, the nodes with two children are called ……..
(A) Interior node
(B) Domestic node
(C) Internal node
(D) Inner node
Answer- (C) Internal node
209. A terminal node in a binary tree is called ______
(A) Child
(B) Leaf
(C) Branch
(D) None of the above
Answer- (B) Leaf
33 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
210. Sequential representation of binary tree uses ______
(A) Three dimensional arrays
(B) Array with pointers
(C) Two dimensional arrays
(D) None of the above
Answer- (B) Array with pointers
211. In linked list, an element can be inserted at _______
(A) beginning of the list
(B) end of the list
(C) middle of the list
(D) Both (A) & (B)
Answer- (D) Both (A) & (B)
212. Which of the following is/are real time application(s) of Circular linked list?
(A) Printer
(B) Multi player games
(C) Interrupts handling in real-time systems
(D) All of the above
Answer- (B) Multi player games
213. Stack is also called______
(A) Pop up array
(B) Pop down list
(C) Push down list
(D) None of the above
Answer- (C) Push down list
214. Prim’s algorithm is a ________
(A) Greedy algorithm
(B) Backtracking algorithm
(C) Divide and Conquer method
(D) None of the above
Answer- (A) Greedy algorithm
215. A heap allows a very efficient implementation of a _______
(A) Stack
(B) Tree
(C) priority queue
(D) None of the above
Answer- (C) priority queue
216. ________is an algorithm that builds a solution by repeated selecting the
cheapest among all options at each stage.
(A) Greedy algorithm
(B) Backtracking algorithm
(C) Divide and Conquer method
(D) None of the above
34 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
Answer- (A) Greedy algorithm
217. The Complexity of Quick Sort algorithm is ______
(A) O (n^2)
(B) O (n log n)
(C) O (n)
(D) None of the above
Answer- (B) O (n log n)
218. The best average behaviour is shown by________
(A) Heap Sort
(B) Insertion Sort
(C) Quick Sort
(D) Bubble Sort
Answer- (C) Quick Sort
219. A mathematical-model of user defined type along with the collection of all
operations defined on that model is known as ______
(A) Data Structure
(B) Primitive Data Type
(C) Algorithm
(D) Abstract Data Type
Answer- (D) Abstract Data Type
220. In ________ traversal we can convert a binary tree into its mirror image.
(A) In order
(B) Pre order
(C) Post order
(D) None of the above
Answer- (C) Post order
221. The performance of an algorithm is measured on the basis of_______
(A) Time Complexity
(B) Space Complexity
(C) Both (A) & (B)
(D) None of the above
Answer- (C) Both (A) & (B)
222. A set of functions that grow slower than or at the same rate as expression is
represented by_____
(A) Big Omega notation
(B) Theta notation
(C) Big O notation
(D) None of the above
Answer- (C) Big O notation
223. The average time complexity of Insertion sort algorithm is________
(A) O (n^2)
35 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
(B) O (n log n)
(C) O (n)
(D) None of the above
Answer- (A) O (n^2)
224. Which of the following is not a stable sort?
(A) Insertion Sort
(B) Heap Sort
(C) Merge Sort
(D) None of the above
Answer- (B) Heap Sort
225. The space required to store the values of all the constants and variables is
called_______
(A) Instruction space
(B) Data Space
(C) Environment Space
(D) None of the above
Answer- (B) Data Space
226. In Heap data structure, If the parent nodes are greater than their children
nodes then it is called __________
(A) Max-Heap
(B) Min-Heap
(C) Both (A) & (B)
(D) None of the above
Answer- (A) Max-Heap
227. The Quick sort algorithm divides the list into ______ main parts
(A) Four
(B) Six
(C) Five
(D) Three
Answer- (D) Three
228. Circular linked list can also be used to create _____
(A) Priority Queue
(B) Double ended Queue
(C) Circular queue
(D) None of the above
Answer- (C) Circular queue
229. Which of the following is/are real-time application(s) of Queue?
(A) Printer
(B) CPU task scheduling
(C) Interrupts handling in real-time systems
(D) All of the above
Answer- (D) All of the above
36 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
230. Linked Lists are used to implement______
(A) Stacks
(B) Graphs
(C) Queues
(D) All of the above
Answer- (D) All of the above
231. Linear search is also called …….
(A) Interpolation Search
(B) Transpose Sequential Search
(C) Sequential Search
(D) None of the above
Answer-(C) Sequential Search
232. The Array as an Abstract Data Type (ADT) supports ….. operations.
(A) Store
(B) Retrieve
(C) Both (A) & (B)
(D) None of the above
Answer- (C) Both (A) & (B)
233. Each position of the hash table is called ……
(A) Bucket
(B) Entry
(C) Cell
(D) Slot
Answer- (D) Slot
234. The common way of keeping subsequent items within the table and computing
possible positions is termed as …………
(A) Direct Chaining
(B) Open Addressing
(C) Both (A) & (B)
(D) None of the above
Answer- (B) Open Addressing
235. An extra key inserted at the end of an Array is known as………
(A) Sentinel
(B) Stop key
(C) Both (A) & (B)
(D) None of the above
Answer- (A) Sentinel
236. In Binary Tree Traversal, the node is visited after both trees is called…….
(A) pre order
(B) In order
(C) post order
37 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
(D) None of the above
Answer- (C) post order
237. Shell Sort is also called …….
(A) Partition exchange sort
(B) Diminishing increment sort
(C) Both (A) & (B)
(D) None of the above
Answer- (B) Diminishing increment sort
238. The complexity of Merge sort algorithm is………
(A) O (log n)
(B) O (n log n)
(C) O (n^2)
(D) None of the above
Answer- (B) O (n log n)
239. …… is a header list in which the last node points back to the header node.
(A) Circular Header linked list
(B) Grounded Header linked list
(C) Both (A) & (B)
(D) None of the above
Answer- (A) Circular Header linked list
240. A pointer that contains the address of a heap-dynamic variable is called …..
(A) Dangling pointer
(B) Null pointer
(C) Void pointer
(D) None of the above
Answer- (A) Dangling pointer
241. The complexity of Bubble sort algorithm is ………
(A) O (log n)
(B) O (n log n)
(C) O (n^2)
(D) None of the above
Answer- (C) O (n^2)
242. Which of the following data structure stores heterogeneous data elements?
(A) Record
(B) Pointer
(C) Linear Array
(D) None of the above
Answer- (A) Record
243. ……. is required for languages that support dynamic data structure.
(A) Stack allocation
(B) Static allocation
38 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
(C) Heap allocation
(D) None of the above
Answer- (C) Heap allocation
244. In Binary Tree Traversal, the node is visited before its left and right sub trees
is called…….
(A) pre order
(B) In order
(C) post order
(D) None of the above
Answer- (A) pre order
245. Which of the following is non linear data structure?
(A) Stack
(B) Tree
(C) Queue
(D) None of the above
Answer- (B) Tree
246. Which algorithm solves the all pairs shortest path problem ?
(A) Floyd’s algorithm
(B) Prim’s algorithm
(C) Both (A) & (B)
(D) None of the above
Answer- (A) Floyd’s algorithm
247. Pre order traversal is also known as …….
(A) depth-first order
(B) end order
(C) symmetric order
(D) None of the above
Answer- (A) depth-first order
248. Queues can be used to implement ……
(A) recursion
(B) quick sort
(C) radix sort
(D) None of the above
Answer- (C) radix sort
249. …… is a header list in which the last node contains the null pointer.
(A) Circular Header list
(B) Grounded Header list
(C) Both (A) & (B)
(D) None of the above
Answer- (B) Grounded Header list
250. Quicksort is also called …….
39 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
(A) Partition exchange sort
(B) Diminishing increment sort
(C) Both (A) & (B)
(D) None of the above
Answer- (A) Partition exchange sort
251. Print Server uses ….. which is a buffer that holds data before it is send to the
printer
(A) Queue
(B) Stack
(C) Spool
(D) None of the above
Answer- (C) Spool
252. …… is a balanced binary search tree in which the difference between the
height of any node’s left and right subtree is at most one.
(A) AVL Tree
(B) Red-Black Tree
(C) 2-3-4 Tree
(D) None of the above
Answer- (A) AVL Tree
253. Enqueue means to insert an item into the ……. of the Queue
(A) front
(B) rear
(C) middle
(D) None of the above
Answer- (B) rear
254. The process of deleting an element from the top of stack is called ….. operation
(A) POP
(B) PUSH
(C) Both (A) & (B)
(D) None of the above
Answer- (A) POP
255. Merge Sort is based on ……..
(A) Greedy approach
(B) Backtracking algorithm
(C) Divide and Conquer method
(D) None of the above
Answer- (C) Divide and Conquer method
256. Post order traversal is also known as……
(A) depth-first order
(B) end order
(C) symmetric order
(D) None of the above
40 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
Answer- (B) end order
257. A queue is a ……. data structure
(A) Last In First Out (LIFO)
(B) Linear Array
(C) First In First Out (FIFO)
(D) None of the above
Answer- (C) First In First Out (FIFO)
258. Which of the following data structure stores homogeneous data elements?
(A) Record
(B) Pointer
(C) Linear Array
(D) None of the above
Answer- (C) Linear Array
259. An algorithm that calls itself directly or indirectly is called ……
(A) Iteration
(B) Recursion
(C) Traversal
(D) None of the above
Answer- (B) Recursion
260. Which of the following is used to find the location of an element with a given
value?
(A) Search
(B) Iteration
(C) Traversal
(D) None of the above
Answer- (A) Search
261. The term “PUSH” is used to …… an element into a stack
(A) Update
(B) Edit
(C) Insert
(D) None of the above
Answer- (C) Insert
262. The condition “FRONT = NULL” represents that the queue is…..
(A) Overflow
(B) Empty
(C) Full
(D) None of the above
Answer- (B) Empty
263. A linked list is also called
(A) One way list
(B) Multi way list
41 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
(C) Single way list
(D) None of the above
Answer- (A) One way list
264. Which data structure represents hierarchical relationship between various
elements?
(A) Linked List
(B) Tree
(C) Array
(D) None of the above
Answer- (B) Tree
265. The process of accessing data stored in a tape is similar to handle data on…….
(A) Linked List
(B) Tree
(C) Array
(D) Queue
Answer- (D) Queue
266. Which of the following search start at the beginning of the list and each
element in the list?
(A) Linear Search
(B) Binary Tree Search
(C) Hash Search
(D) None of the above
Answer- (A) Linear Search
267. In Binary Tree Traversal, the node is visited between the sub trees is called……
(A) Pre-order traversal
(B) In-order traversal
(C) Post-order traversal
(D) None of the above
Answer- (B) In-order traversal
268. Which of the following data structure is indexed data structure?
(A) Linked List
(B) Stack
(C) Queue
(D) Linear Array
Answer- (D) Linear Array
269. …….. is a data structure in which each node has at most two children.
(A) Red-Black Tree
(B) Binary Tree
(C) AVL Tree
(D) None of the above
Answer- (B) Binary Tree
42 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
270. Which of the following sorting algorithm is not an internal sort?
(A) Bubble Sort
(B) Insertion Sort
(C) Merge Sort
(D) Heap Sort
Answer- (C) Merge Sort
271. In Queue, the elements added at…..end
(A) front
(B) rear
(C) top
(D) base
Answer- (B) rear
272. The terms “POP” and “PUSH” are related to…..
(A) queue
(B) stack
(C) linked list
(D) None of the above
Answer- (B) stack
273. Stack is also called a …….
(A) Last In First Out
(B) First In First Out
(C) LIFO & FIFO
(D) None of the above
Answer- (A) Last In First Out
274. The largest element of an Array Index is called……
(A) Range
(B) Upper bound
(C) lower bound
(D) None of the above
Answer- (B) Upper bound
275. The memory address of the first element of an array is called…
(A) first address
(B) floor address
(C) base address
(D) None of the above
Answer- (C) base address
276. The complexity of shellsort is
(A) O(log)
(B) O(n^2)
(C) O(n (log n)^2)
(D) None of the above
Answer- (C) O(n (log n)^2)
43 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
277. Which of the following is a linear data structure?
(A) Array
(B) Graph
(C) Tree
(D) None of the above
Answer- (A) Array
278. ….. is a technique to convert a range of key values into a range of Indices of an
Array?
(A) Thrashing
(B) Hashing
(C) Interpolation
(D) None of the above
Answer- (B) Hashing
279. ……. is a queue with limited number of elements.
(A) Bounded queue
(B) Unbounded queue
(C) Both (A) & (B)
(D) None of the above
Answer- (A) Bounded queue
280. An odd-even sort is also called……
(A) Bubble Sort
(B) Heap Sort
(C) Quick Sort
(D) Brick Sort
Answer- (D) Brick Sort
281. ……. contains the information about an array used in a program.
(A) Dope vector
(B) Record
(C) Table
(D) None of the above
Answer- (A) Dope vector
282. The term DEQUE refers……
(A) single ended queue
(B) double ended queue
(C) Both (A) & (B)
(D) None of the above
Answer- (B) double ended queue
283. A sort that compares each element with its adjacent element in a list is
called…..
(A) Bubble Sort
(B) Insertion Sort
44 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
(C) Quick Sort
(D) Heap Sort
Answer- (A) Bubble Sort
284. Which of the following data structure is required to evaluate a post fix
expression?
(A) Stack
(B) linked list
(C) Array
(D) None of the above
Answer- (A) Stack
285. A linked list that has no beginning and no end is called…..
(A) Doubly linked list
(B) Singly linked list
(C) Circular linked list
(D) None of the above
Answer- (C) Circular linked list
286. In order traversal is also known as……
(A) Pre order
(B) Symmetric order
(C) End order
(D) None of the above
Answer- (B) Symmetric order
287. A matrix in which number of zero elements are much higher than the number
of non zero elements is called
(A) Scalar Matrix
(B) Identity Matrix
(C) Sparse Matrix
(D) None of the above
Answer- (C) Sparse Matrix
288. Which of the following is the slowest sorting algorithm?
(A) Heap Sort
(B) Insertion Sort
(C) Quick Sort
(D) Bubble Sort
Answer- (D) Bubble Sort
289. The smallest element of an Array’s index is known as…..
(A) Range
(B) Upper bound
(C) Lower bound
(D) None of the above
Answer- (C) Lower bound
45 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
290. Which data structure is required to check balanced parenthesis in an
expression?
(A) Linked List
(B) Queue
(C) Tree
(D) Stack
Answer- (D) Stack
291. A linear list in which elements can be added/removed at either end but not in
the middle is called
(A) Deque
(B) Stack
(C) List
(D) Queue
Answer- (A) Deque
292. Which of the following is the best sorting algorithm when the list is already
sorted?
(A) Bubble Sort
(B) Insertion Sort
(C) Quick Sort
(D) Heap Sort
Answer- (B) Insertion Sort
293. The representation of data structure in memory is called
(A) memory structure
(B) abstract data type
(C) recursive
(D) file structure
Answer- (B) abstract data type
294. The complexity of Heapsort algorithm is
(A) O(n^2)
(B) O( n log n)
(C) O(1)
(D) None of these
Answer- (B) O( n log n)
295. In Queue, the items deleted at…..end
(A) front
(B) rear
(C) top
(D) base
Answer- (A) front
296. Which data structure is needed to convert infix notation to post fix notation?
(A) Branch
(B) Queue
46 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
(C) Tree
(D) Stack
Answer- (D) Stack
297. In a circular linked list, insertion of a record involves modification of
(A) Multiple pointer
(B) One pointer
(C) Two pointer
(D) None of these
Answer- (C) Two pointer
298. Which data structure is used for implementing recursion?
(A) Queue
(B) Stack
(C) Arrays
(D) List
Answer- (B) Stack
299.The drawback of the binary tree sort is remedied by
(A) Bubble Sort
(B) Insertion Sort
(C) Quick Sort
(D) Heap Sort
Answer- (D) Heap Sort
300. Which of the following is the method of graph traversal?
(A) Breadth first search
(B) Depth first Search
(C) Both (A) & (B)
(D) None of these
Answer- (C) Both (A) & (B)
Web Technology Questions:
301. In CSS, you can override precedence rules by adding the ____ property to a
style declaration.
A. !override
B. !main
C. !important
D. !priority
Answer- C. !important
302. Which of the following class in JSP provides the capability to implement a
growable array of objects?
A. Array class
B. GrowAbleArray class
C. Container class
D. Vector class
47 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
Answer- D. Vector class
303. Which XML extension is a standard way to describe how to transform the
structure of an XML document into an XML document with a different structure?
A. tree structure
B. XSLT
C. Both (A) & (B)
D. None of the Above
Answer- B. XSLT
304. In JSP, the classes that allow primitive types to be accessed as objects are
known as________
A. Primitive classes
B. Object classes
C. Boxing classes
D. Wrapper classes.
Answer- D. Wrapper classes.
305. Which XML-based registry is intended as on online Internet registry for
businesses worldwide?
A. Universal Plug and Play(UPnP)
B. UDF
C. Uniform Resource Locator(URL)
D. Universal Description Discovery and Integration(UDDI)
Answer- D. Universal Description Discovery and Integration(UDDI)
306. Which language is considered to be extensible because of its unlimited and
self-defining markup symbols?
A. HTML
B. XHTML
C. XML
D. None of the Above.
Answer- C. XML
307. In JSP, a Canvas object provides access to a Graphics object via one of its
method called______
A. getCanvas()
B. getGraphics()
C. accessGraphics().
D. paint()
Answer- D. paint()
308. HTML defines ________ levels of headings.
A. Five
B. Four
C. Six
D. Three
Answer- C. Six
48 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
309. Which method of the Component class is used to set the position and size of a
component in JSP?
A. setSize()
B. setPositionSize()
C. setPosition()
D. setBounds()
Answer- D. setBounds()
310. What method is used to specify a container’s layout in JSP?
A. setLayout()
B. Layout()
C. setContainerLayout()
D. setConLayout()
Answer- A. setLayout()
311. Which of the following is not an advantage of CSS?
A. Easy Maintenance
B. Offline Browsing
C. Multiple Device Compatibility
D. Platform Dependent
Answer- D. Platform Dependent
312. In CSS, which cursor indicates that an edge of a box is to be moved down?
A. se-resize
B. sw-resize
C. w-resize
D. s-resize
Answer- D. s-resize
313. Which of the following is a front-end framework for web development?
A. Ruby
B. Bootstrap
C. PHP
D. Python
Answer- B. Bootstrap
314. An alternative of JavaScript on windows platform is________
A. VBScript
B. ASP.NET
C. JSP
D. PHP
Answer- A. VBScript
315. AJAX stands for_________
A. Advanced JSP and XML
B. Asynchronous JSP and XML
C. Advanced JS and XML
49 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
D. Asynchronous JavaScript and XML
Answer- D. Asynchronous JavaScript and XML
316. Which of the following is a boolean cookie attribute in JS?
A. domain
B. lookup
C. secure
D. None of the Above
Answer- C. secure
317. _______ method returns the character at a specified index in a string?
A. CharCodeAt()
B. substring()
C. charAt()
D. None of the Above
Answer- C. charAt()
318. Which of the following is used to describe elements in CSS?
A. Selectors
B. Protectors
C. Both (A) & (B)
D. None of the Above
Answer- A. Selectors
319. What are the events generated by the Node objects called?
A. generators
B. highevents
C. emitters
D. None of the Above
Answer- C. emitters
320. Which of the following is a stateless protocol?
A. TCP
B. HTTP
C. HTML
D. XHTML
Answer- B. HTTP
321. Which one of the following objects is passed to a JavaBean when one of its
properties is set via a JSP action?
A. ServletRequest
B. HTTPServletRequest
C. ServletResponse
D. HTTPServletResponse
Answer- B. HTTPServletRequest
322. Which of the following are used by servlet containers to set JavaBean
properties?
50 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
A. cookies
B. form fields
C. memory
D. disk
Answer- B. form fields
323. ________ header gives the MIME type of the response document.
A. Content Encoding
B. Content Language
C. Content Length
D. Content Type
Answer- D. Content Type
324. The term “Hypertext” means _______
A. Hypermedia
B. Non-Sequential writing
C. Blinking text
D. None of the Above
Answer- B. Non-Sequential writing
325. Which of the following is not a JSP Implicit Object?
A. In
B. Out
C. Page
D. Response
Answer- A. In
326. Where are cookies stored?
A. on the server
B. In Web.xml
C. On the Client
D. In HTML
Answer- C. On the Client
327. Document Type Declaration includes ______
A. Element Declarations
B. Attribute Declarations
C. Entity Declarations
D. All of the Above
Answer- D. All of the Above
328. The XML DOM object is _________
A. Entity Reference
B. Comment Reference
C. Both (A) and (B)
D. All of the Above
Answer- A. Entity Reference
51 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
329. Any part of the graphic that is not included in another hot zone is considered
to be part of _______
A. rect
B. point
C. default
D. polygon
Answer- C. default
330. SAX stands for________
A. Simple Application for XML
B. Smart Application for XML
C. Smart API for XML
D. Simple API for XML
Answer- Simple API for XML
331. In CSS, ______ property controls the capitalization of text.
(A) text-decoration
(B) text-indent
(C) text-shadow
(D) text-transform
Answer- (D) text-transform
332. Which properties are used to generate space around elements?
(A) CSS Borders
(B) CSS Margins
(C) CSS Padding
(D) None of the above
Answer- (B) CSS Margins
333. In CSS, _______ property creates or resets one or more counters.
(A) Content
(B) Counter-increment
(C) Counter-reset
(D) None of the above
Answer- (C) Counter-reset
334. ________ method replaces a specified value with another value in a string?
(A) CharCodeAt()
(B) CharAt()
(C) Concat()
(D) replace()
Answer- (D) replace()
335. In JavaScript, _____ method returns a number as a number.
(A) valueOf()
(B) toPrecision()
(C) toExponential()
(D) toString()
52 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
Answer- (A) valueOf()
336. Which method is used to replace an element to the HTML DOM(Document
Object Model)?
(A) removeChild()
(B) replaceChild()
(C) Both(A) & (B)
(D) None of the above
Answer- (B) replaceChild()
337. Which of the following attribute is a boolean attribute?
(A) autocomplete
(B) placeholder
(C) step
(D) autofocus
Answer- (D) autofocus
338. Which of the following message denotes the server is currently unavailable?
(A) 500 Internal server Error
(B) 501 Not Implemented
(C) 503 Service Unavailable
(D) 504 Gateway Time out
Answer- (C) 503 Service Unavailable
339. Which of the following is used to define the content of web pages?
(A) HTML
(B) CSS
(C) Java Script
(D) None of the above
Answer- (A) HTML
340. In JS,__________ returns a number, converted from its argument.
(A) parseFloat()
(B) toPrecision()
(C) toExponential()
(D) number()
Answer- (D) number()
341. Which of the following was designed to store and transport data?
(A) Java Script
(B) HTML
(C) XML
(D) None of the above
Answer- (C) XML
342. ______ language has no predefined tags.
(A) XML
(B) HTML
53 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
(C) Both (A) and (B)
(D) None of the above
Answer- (A) XML
343. ________message denotes the request has been fulfilled and a new source is
created.
(A) 202 Accepted
(B) 201 created
(C) 403 Forbidden
(D) 404 Not Found
Answer- (B) 201 created
344. Cascading Style Sheets(CSS) can be used to create an ______
(A) Image Gallery
(B) Image Opacity
(C) Image Sprites
(D) None of the above
Answer- (A) Image Gallery
345. JavaScript can change all the ___________ in the web page.
(A) HTML elements
(B) CSS Styles
(C) HTML attributes
(D) All of the above
Answer- (D) All of the above
346.In JS, the ______ method returns the index of the last occurrence of a
specified text in a string.
(A) slice()
(B) substr()
(C) lastIndex()
(D) search()
Answer- (C) lastIndex()
347. ________ message denotes the request can not be fulfilled due to the wrong
syntax.
(A) 202 Accepted
(B) 400 Bad Request
(C) 403 Forbidden
(D) 404 Not Found
Answer- (B) 400 Bad Request
348. In JavaScript, _____ method returns a number as a string.
(A) valueOf()
(B) toPrecision()
(C) toExponential()
(D) toString()
Answer- (D) toString()
54 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
349. Which properties are used to generate space around content?
(A) CSS Borders
(B) CSS Margins
(C) CSS Padding
(D) None of the above
Answer- (C) CSS Padding
350.In CSS, _______ property can be used to wrap text around images?
(A) float
(B) clear
(C) Both(A) & (B)
(D) None of the above
Answer- (A) float
351. Which of the following is used to specify the layout of web pages?
(A) HTML
(B) CSS
(C) Java Script
(D) None of the above
Answer- (B) CSS
352. In Java Script, the multi-line comment is denoted as ________
(A) //
(B) /*/
(C) /* */
(D) None of the above
Answer- (C) /* */
353. In JS, The ______ method searches a string for a specified value and returns
the position of match.
(A) slice()
(B) substr()
(C) index()
(D) search()
Answer- (D) search()
354. In Java Script, the _____ method returns the new array length.
(A) shift()
(B) substr()
(C) index()
(D) unshift()
Answer- (D) unshift()
355. In Java Script, which statement lets you to handle the error?
(A) try
(B) catch
(C) Both (A) & (B)
55 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
(D) None of the above
Answer- Both (A) & (B)
356. Which property is very useful for getting or replacing the content of HTML
elements?
(A) innerHTML
(B) outerHTML
(C) Both(A) & (B)
(D) None of the above
Answer- (A) innerHTML
357. Which of the following function converts an object’s value to a number?
(A) Number()
(B) isNaN()
(C) isFinite()
(D) None of the above
Answer- (A) Number()
358. ________message denotes the requested page could not be found and it may
be available in future?
(A) 202 Accepted
(B) 201 created
(C) 403 Forbidden
(D) 404 Not Found
Answer- (D) 404 Not Found
359. Which of the following method can be cached?
(A) GET
(B) POST
(C) Both (A) and (B)
(D) None of the above
Answer- (A) GET
360. Which can reduce the number of server requests and save bandwidth?
(A) Image Gallery
(B) Image Opacity
(C) Image Sprites
(D) None of the above
Answer- (C) Image Sprites
361. Which of the following property sets or returns the CORS settings of the
audio/video?
(A) controls
(B) crossOrigin
(C) currentSrc
(D) None of the above
Answer- (B) crossOrigin
56 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
362. The Javascript allows _____
(A) single line comment
(B) multi line comment
(C) Both(A) & (B)
(D) None of the above
Answer- (C) Both(A) & (B)
363. CSS Stands for______
(A) Combined Styling Sheets
(B) Cascading Style Sheets
(C) Current Style Sheets
(D) Cascading Script Sheets
Answer- (B) Cascading Style Sheets
364. Which of the following message denotes the requested page has moved
temporarily to a new URL?
(A) 202 Accepted
(B) 201 created
(C) 301 Moved Permanently
(D) 302 Found
Answer- (D) 302 Found
365. In CSS, _______ property is used to control the behaviour of floating
elements?
(A) float
(B) clear
(C) Both(A) & (B)
(D) None of the above
Answer- (B) clear
366. Which method returns the HTTP methods that the server supports?
(A) HEAD
(B) PUT
(C) DELETE
(D) OPTIONS
Answer- (D) OPTIONS
367. In Java Script, the single line comment is denoted as ________
(A) //
(B) /*/
(C) /* */
(D) None of the above
Answer- (A) //
368. Java Script can be used to create ________
(A) cookies
(B) spam
(C) cache
57 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
(D) None of the above
Answer- (A) cookies
369. Which determines whether a value is a finite number?
(A) Number()
(B) isNaN()
(C) isFinite()
(D) None of the above
Answer- (C) isFinite()
370. How many types of pop up boxes are used in JavaScript?
(A) One
(B) Two
(C) Four
(D) Three
Answer- (D) Three
371. The default display value for most elements is _____
(A) line
(B) block
(C) (A) or (B)
(D) None of the above
Answer- (C) (A) or (B)
372. XHTML stands for_________
(A) Extensible Hyper Text Markup Language
(B) Extended Hyper Text Markup Language
(C) Expensive Hyper Text Markup Language
(D) Extensible Hyper Text Marked Language
Answer- (A) Extensible Hyper Text Markup Language
373. The attributes and elements of XHTML are must be in ______
(A) Upper-case
(B) Lower-case
(C) Both (A) and (B)
(D) None of the above
Answer- (B) Lower-case
374. Which of the following message denotes the requested page has moved to a
new URL?
(A) 202 Accepted
(B) 201 created
(C) 302 Found
(D) 301 Moved Permanently
Answer- (D) 301 Moved Permanently
375. Which of the following method uploads a representation of the specified URI?
(A) HEAD
58 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
(B) PUT
(C) DELETE
(D) OPTIONS
Answer- (B) PUT
376. Which is a uniform naming scheme for locating resources on the web?
(A) Uniform Resource Identifier(URI)
(B) HTTP
(C) Resource Name
(D) None of the above
Answer- (A) Uniform Resource Identifier(URI)
377. Which of the following method cannot be bookmarked?
(A) GET
(B) POST
(C) Both (A) and (B)
(D) None of the above
Answer- (B) POST
378. Which of the following property returns the length of the current audio/video?
(A) error
(B) loop
(C) ended
(D) duration
Answer- (D) duration
379. Which method pauses the currently playing the audio/video?
(A) play()
(B) pause()
(C) load()
(D) None of the above
Answer- (B) pause()
380. XHTML is almost similar to _______
(A) HTML
(B) XML
(C) HTTP
(D) None of the above
Answer- (A) HTML
381. The ______ method submits data to be processed to a specified resource.
(A) GET
(B) POST
(C) Both (A) & (B)
(D) None of the above
Answer- (B) POST
59 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
382. Which of the following specifies a short cut key to activate or focus an
element?
(A) class
(B) hidden
(C) draggable
(D) access key
Answer- (D) access key
383. ______ specifies the tabbing order of an element.
(A) class
(B) hidden
(C) draggable
(D) tabindex
Answer- (D) tabindex
384. HTTP works as a ______ protocol between a Client and Server.
(A) request – response
(B) Standard
(C) Both (A) & (B)
(D) None of the above
Answer- (A) request – response
385.Which of the following method has length restrictions?
(A) GET
(B) POST
(C) Both (A) & (B)
(D) None of the above
Answer- (A) GET
386. ______ converts character into a format which can be transmitted over the
Internet?
(A) URL Encoding
(B) URL Decoding
(C) Both (A) & (B)
(D) None of the above
Answer- (A) URL Encoding
387. Which of the following method draws a “filled” rectangle?
(A) rect()
(B) clearRect()
(C) StrokeRect()
(D) fillRect()
Answer- (D) fillRect()
388. Which is the standard response for successful HTTP requests?
(A) 202 Accepted
(B) 201 created
(C) 200 OK
60 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
(D) None of the above
Answer- (C) 200 OK
389. _______ creates an arc/curve between two tangents.
(A) arc()
(B) arcTo()
(C) quadraticCurveTO()
(D) None of the above
Answer- (B) arcTo()
390. ______ sets or returns whether the audio/video should start playing as soon
as it is loaded.
(A) audioTracks
(B) autoplay
(C) Controller
(D) None of the above
Answer- (B) autoplay
391. Which of the following provide additional information about HTML elements?
(A) Headings
(B) Paragraphs
(C) Styles
(D) Attributes
Answer- (D) Attributes
392. The ______ method requests data from a specified source.
(A) GET
(B) POST
(C) Both (A) & (B)
(D) None of the above
Answer- (A) GET
393. Symbol used at the beginning of the HERF text is_______
(A) #
(B) $
(C) &
(D) ^
Answer- (A) #
394. Which of the following method converts the request connection to a
transparent TCP/IP tunnel?
(A) HEAD
(B) PUT
(C) OPTIONS
(D) CONNECT
Answer- (D) CONNECT
395. HTML is a subset of ______
61 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
(A) SGMT
(B) SGML
(C) SGMD
(D) None of the above
Answer- (B) SGML
396. The MIME text file is saved with _____
(A) THM extension
(B) HTML extension
(C) HMT extension
(D) None of the above
Answer- (B) HTML extension
397. SGML stands for______
(A) Standard General Mark Language
(B) Security General Markup Language
(C) Standard Generalized Markup Language
(D) Standard Generalized Mark Language
Answer- (C) Standard Generalized Markup Language
398. HTML tags are surrounded by ______
(A) Square Brackets
(B) Curly Brackets
(C) Angle Brackets
(D) None of the above
Answer- (C) Angle Brackets
399. Extensible Markup Language (XML) tags are ____
(A) Case Insensitive
(B) Case Sensitive
(C) Both (A) & (B)
(D) None of the above
Answer- (B) Case Sensitive
400. Document Object Model(DOM) is a ______
(A) Character User Interface (CUI)
(B) Application Programming Interface (API)
(C) Both (A) & (B)
(D) None of the above
Answer- (B) Application Programming Interface (API)
62 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
Mixed Questions 1
401. Concept of developing a compiler for a language by using subsets of the same
language?
A. Bootstrap
B. Lex
C. Yacc
D. None of the Above
Answer- A. Bootstrap
402. System Calls are usually invoked by using ______
A. Hardware Interrupt
B. Software Interrupt
C. Polling
D. An Indirect jump
Answer- B. Software Interrupt
403. A detective control is used to check if correct numbers are keyed in _______
A. Sequence Check
B. Manual Check
C. Check digit
D. None of the Above
Answer- C. Check digit
404. In object-oriented technology hiding the complexity of characteristics is called
________
A. Inheritance
B. Polymorphism
C. Abstraction
D. None of the Above
Answer- C. Abstraction
405. _________ is a component of on-line shopping mall.
A. Shopping Cart
B. Customer databases
C. Inventory Control systems
D. All of the above
Answer- A. Shopping Cart
406. Which of these e-commerce systems handle non-monetary documents?
A. SWIFT
B. EFTS
C. EDI
D. None of the above
Answer- C.Electronic Data Interchange(EDI)
63 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
407. Which of the following is/are part(S) of EDI?
A. Trading partners
B. Data segment
C. Encryption
D. All of the above
Answer- D. All of the Above
408. Which of the following is the job of a DNS?
A. Name is displayed
B. File is transferred
C. IP address is displayed
D. All of the above
Answer- C. IP address is displayed
409. Which of these determines authorised sign in an EDI transaction?
A. Spoofing
B. Masking
C. private key Cryptosystem
D. Digital Signature
Answer- D. Digital Signature
410. _______ is associated with implementation of E-Commerce.
A. Local Area Network
B. Wireless LAN
C. Value Added Network
D. All of the above
Answer- C. Value Added Network
411. Which of the following feature is related to bottom up parsing?
A. Shift
B. Reduce
C. Precedence Relation
D. All of the Above
Answer- D. All of the Above
412. You need to configure a switch from a remote subnet.Which of the following
must be configured on the switch?
A. IP
B. Console part
C. SNMP
D. Default gateway
Answer- D. Default gateway
413. “Each packet contains the full source and destination address”.This statement
indicates which of the following?
A. FDDI
B. Data link
C. Data gram
64 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
D. Virtual Circuit
Answer- C. Data gram
414. RST 6.5 is _______
A. Maskable Interrupt
B. Vector Interrupt
C. Both (A) and (B)
D. None of the Above
Answer- C. Both (A) and (B)
415. Creating a _______ eliminate the need to qualify the object name with the
schema and provides you with an alternative name for a table, view, sequence,
procedure or other objects.
A. synonym
B. Antonym
C. Column
D. Alias
Answer-A. synonym
416. Data bus is _______
A. Unidirectional
B. Bidirectional
C. Multidirectional
D. None of the Above
Answer- B. Bidirectional
417. Which of the following is/are application(S) of Flip-Flop?
A. Latch
B. Counter
C. Bounce elimination switch
D. All of the Above
Answer- D. All of the above
418. Round Robin(RR) scheduling algorithm falls under the category of _________
A. Preemptive scheduling
B. Non-Preemptive scheduling
C. Both (A) and (B)
D. None of the Above
Answer-A. Preemptive scheduling
419. Which of the following is a variation of Frequency Division Multiplexing(FDM)?
A. Time Division Multiplexing
B. Pulse Code Modulation
C. Wavelength Division Multiplexing
D. None of the Above
Answer- C. Wavelength Division Multiplexing
420. Backus-Naur Form (BNF) is a meta language for___________
65 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
A. Specifying the syntax of a language
B. Specifying a context free language
C. Both (A) and (B)
D. None of the Above
Answer- C. Both (A) and (B)
421. Which one of the following interrupt is non-maskable?
A. RDT 6.5
B. RST 7.5
C. INTR
D. TRAP
Answer- D. TRAP. A Non Maskable Interrupt(NMI) is a hardware interrupt that can
not be ignored by the instructions of CPU.
422. One can interface with operating system by means of _________
A. Operating System Call
B. Operating System Command
C. Both (A) and (B)
D. None of the Above
Answer- C. Both (A) and (B)
423. A file organization component of a Virtual Access Storage Method(VSAM) file is
________
A. relative record data set
B. keyed sequential data set
C. entry sequential data set
D. All of the Above
Answer- D. All of the above
424. When the maximum clock rate is quoted for a logic family it applies to
________
A. Shift register
B. Flip-Flop
C. Counter
D. None of the Above
Answer- A. Shift register
425. Which of the following UNIX command is used to create empty files?
A. cat
B. Vi
C. Pico
D. Touch
Answer- D. Touch
426. Which of the following operators can be overloaded in C++?
A. Scope resolution operator
B. Size of operator
C. Conditional operator
66 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
D. arithmetic operator
Answer- D. arithmetic operator
427. The mechanism that brings a page into memory only when it is needed is
called __________
A. Segmentation
B. Fragmentation
C. Demand paging
D. None of the Above
Answer- C. Demand paging
428. Which of the following addressing modes permits relocation without any
change?
A. Indirect addressing
B. Indexed addressing
C. Base register addressing
D. PC relative addressing
Answer- C. Base register addressing
429. A __________ is a software that manages the time of a microprocessor to
ensure that all time critical events are processed as efficiently as possible. This
software allows the system activities to be divided into multiple independent
elements called tasks.
A. Kernel
B. Shell
C. Processor
D. Device Driver
Answer- A. Kernel
430. In OSI model, terminal emulation is done in ________
A. Session layer
B. Application layer
C. Presentation layer
D. Transport layer
Answer- B. Application layer. Terminal emulation is the process by which a
microcomputer imitates a dumb terminal in order to communicate with a mainframe
computer or other device.
431. Which of the following is/are routing protocol(s)?
A. Appletalk
B. IPX
C. TCP/IP
D. All of the above
Answer- D. All of the above
432. An assembler that runs on one machine but produces machine code for
another machine is called ________
A. Simulator
67 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
B. Cross Assembler
C. Boot-strap loader
D. None of the above
Answer- B. Cross Assembler
433. The two basic types of record access methods are _______
A. Direct and indirect
B. On-line and real-time
C. Sequential and indexed
D. Direct and Sequential
Answer- C. Sequential and indexed
434. Which of the following is/are valid Protocol Data Units(PDU)?
A. Packets
B. Frame
C. Segments
D. All of the above
Answer- D. All of the above
435. Which of the following is/are type of UNIX Shell?
A. Korn Shell
B. Bourne Shell
C. C Shell
D. All of the above
Answer- D. All of the above
436. Which of the following is/are advantages of Virtual LANs (VLANs)?
A. They increase switching throughput
B. They reduce switching overhead
C. They simplify the adding, moving and changing of users
D. All of the above
Answer- C. They simplify the adding, moving and changing of users
437. If a denormalization situation exists with a one to one binary relationship then
all fields are stored in ______
A. four relations
B. one relation
C. three relations
D. two relations
Answer- B. one relation
438. Which of the following is/are advantages of using VLAN Trunking Protocol
(VTP) in a switching environment?
A. It allows switches to read tags
B. It enables VLANs to span multiple switches.
C. It simplifies the scalability of the switched work
D. All of the above
Answer- C. It simplifies the scalability of the switched work
68 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
439. When a network has multiple bridges and is using Spanning Tree Protocol, how
is the root bridge determined?
A. The bridge with the lowest ID number assumes the root bridge role.
B. The bridge with the highest ID number assumes the root bridge role.
C. The bridge with the lowest MAC address is always the root bridge.
D. All of the above
Answer- A. The bridge with the lowest ID number assumes the root bridge role.
440. Which of the following is/are congestion control algorithm(S)?
A. Resource reSerVation Protocol (RSVP)
B. Token Bucket
C. The leaky Bucket
D. All of the above
Answer- D. All of the above
441. Which of the following is the preferred way to recover a database after a
transaction in progress terminates abnormally?
A. Rollforward
B. Rollback
C. Reprocess transactions
D. None of the above
Answer- B. Rollback
442. ___________ is usually a specialized hardware instruction dedicated to invoke
the Operating System.
A. Procedure Call
B. Supervisor Call
C. Both (A) and (B)
D. None of the above
Answer- B. Supervisor Call
443. _______ is a versatile instruction that is finding its way into an increasing
number of computer systems, especially microprocessors.
A. Procedure Call
B. Supervisor Call
C. Software Interrupt (SWI)
D. None of the above
Answer- C. Software Interrupt (SWI)
444. A ________ is a collection of autonomous computer systems capable of
communication and cooperation via their hardware and software interconnections.
A. System
B. distributed computer system
C. Centralized Computer
D. None of the above
Answer- B. distributed computer system
69 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
445. Locking may cause which of the following problems?
A. Deadlock
B. Rollback
C. Reprocess
D. None of the above
Answer- A. Deadlock
446. A data warehouse administrator is concerned with which of the following?
A. The time to make a decision but not the typical roles of a database administrator
B. The time to make a decision and the typical roles of a database administrator
C. The typical roles of a database administrator and redesigning existing applications.
D. None of the above
Answer- C. The typical roles of a database administrator and redesigning existing
applications.
447. Concurrency control is important for which of the following reasons?
A. To ensure data integrity when updates occur to the database in single-user environment.
B. To ensure data integrity when updates occur to the database in Multi-user environment.
C. To ensure data integrity while reading data occurs to the database in Multi-user
environment.
D. None of the above
Answer- B. To ensure data integrity when updates occur to the database in Multiuser environment.
448. Which of the following is associated with implementation of e-commerce?
A. LAN
B. WLAN
C. VLAN
D. VAN
Answer- D. VAN (Value Added Network)
449. Which of the following makes Web insecure?
A. RSA security algorithm
B. Network Interface Card (NIC)
C. Static keys
D. None of the above
Answer- C. Static keys
450. The buffer in DBMS has data that has to be__________
A. Accessed
B. Read
C. Transmitted
D. All of the above
Answer- D. All of the above
451. _________ means that each logical object is placed in a set of memory
locations with strictly consecutive addresses.
A. External Fragmentation
70 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
B. Internal Fragmentation
C. Contiguous Allocation
D. None of the above
Answer- C. Contiguous Allocation
452. Which of the following eliminates internal fragmentation?
A. External Fragmentation
B. Contiguous Allocation
C. Static partitioning
D. Dynamic partitioning
Answer- D. Dynamic partitioning
453. Wasting of memory between partitions, due to scattering of the free space into
a number of dis-contiguous areas, is called _________
A. External Fragmentation
B. Internal Fragmentation
C. Contiguous Allocation
D. None of the above
Answer- A. External Fragmentation
454. A ________ is a hardware complex that contains most of the logic address
translation in microprocessor systems.
A. Memory Management Unit (MMU)
B. Translation Lookaside Buffer (TLB)
C. Page Map Table (PMT)
D. None of the above
Answer- A. Memory Management Unit (MMU)
455. Which of the following is a memory cache that stores recent translations of
virtual memory to physical addresses for faster retrieval.
A. Memory Management Unit (MMU)
B. Translation Lookaside Buffer (TLB)
C. Page Map Table (PMT)
D. None of the above
Answer- B. Translation Lookaside Buffer (TLB)
456. Which of the following requires that all channels in a message transmission
path be of the same speed?
A. Packet-switched networks
B. Circuit-switched networks
C. Message-switched networks
D. None of the above
Answer- B. Circuit-switched networks
457. Which protocol works at the Internet layer and provides a connection service
between hosts?
A. Internet Protocol(IP)
B. Packet Internet Gopher(PING)
71 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
C. Reverse Address Resolution Protocol (RARP)
D. Address Resolution Protocol (ARP)
Answer- A. Internet Protocol(IP)
458. If a host broadcasts a frame that includes a source and destination hardware
address, and its purpose is to assign IP addresses to itself, Which protocol at the
Network Layer does the host use?
A. Internet Control Message Protocol(ICMP)
B. Packet Internet Gopher(PING)
C. Reverse Address Resolution Protocol (RARP)
D. Address Resolution Protocol (ARP)
Answer- C. Reverse Address Resolution Protocol (RARP)
459. When you connect to an online information service you are asked to provide
some kind of identification such as your name, an account number and a password.
What is the name given to this brief dialogue between you and the information
system?
A. Security Procedure
B. Safeguard Procedure
C. Identification Procedure
D. Log-on procedure
Answer- D. Log-on procedure
460. A heap allows a very efficient implementation of a ________
A. Stack
B. Queue
C. Priority Queue
D. None of the above
Answer- C. Priority Queue
461. Error detection at the data link layer is achieved by?
A. Bit stuffing
B. Cyclic redundancy codes
C. Hamming codes
D. Equalization
Answer- B. Cyclic redundancy codes
462. Which of the following services is used to translate host names into IP
addresses?
A. SNMP
B. SMTP
C. UDP
D. DNS
Answer- D. DNS
463. Which of the following functions is not performed by TCP?
A. Flow Control
B. Error Checking
72 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
C. Sequencing
D. Subnetting
Answer- D. Subnetting
464. Which of the following table helps in representing the previous and next state
of the sequential circuit prior to and the clock pulse respectively?
A. Truth Table
B. Characteristic Table
C. Excitation Table
D. None of the above
Answer- C. Excitation Table
465. One method of programming a computer to exhibit human intelligence is called
modeling or ________
A. Simulation
B. Cognitization
C. Duplication
D. None of the above
Answer- A. Simulation
466. Which of the following is an important component of semantic analysis?
A. Symbol table
B. Type Checking
C. Lex
D. Yacc
Answer- B. Type Checking
467. Which of the following tools will identify the address intermediate hops
between two stations?
A. TCP
B. Telnet
C. Ping
D. Traceroute or Tracert
Answer- D. Traceroute or Tracert
468. Lexical Analyzer transforms an input streams into __________
A. Regular expression
B. Binary
C. Symbols
D. Sequence Tokens
Answer- D. Sequence Tokens
469. The relative position of the file marker can be changed via the _________
A. Marker call
B. EXEC Command
C. Fence Register
D. LSEEK Call
Answer- D. LSEEK Call
73 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
470. In a Third Normal Form relation, every________attribute is non-transitively
and fully dependent on the every candidate Keys.
A. Prime
B. Unique
C. Non-Prime
D. None of the Above
Answer- C. Non-Prime
471. Which of the following methods provides the greatest frame throughput?
A. Frame-tag switching
B. ISL Switching
C. Store-and-forward switching
D. Cut-through switching
Answer- D. Cut-through switching
472. What must you do to allow a Virtual LAN(VLAN) to span two or more switches?
A. Configure port security on the switch.
B. Set up a VTP domain
C. Configure the duplex setting on the ports
D. Set up a trunk location.
Answer- D. Set up a trunk location.
473. What is ISL used for?
A. To allow simultaneous routing and switching
B. To allow an Ethernet interface to understand frame tags
C. Both (A) and (B)
D. None of the above
Answer- B. To allow an Ethernet interface to understand frame tags
474. What is the name of the protocol used to eliminate loops?
A. Switching
B. Frame tagging
C. Spanning tree protocol
D. None of the above
Answer- C. Spanning tree protocol
475. If you wanted to locate the hardware address of a local device, which protocol
would you use?
A. Internet Control Message Protocol(ICMP)
B. Packet Internet Gopher(PING)
C. Reverse Address Resolution Protocol (RARP)
D. Address Resolution Protocol (ARP)
Answer- D. Address Resolution Protocol (ARP)
476. To which pin on the RAM chip does the address decoder connect in order to
signal which memory chip is being accessed?
A. The address input
74 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
B. The output enable
C. The chip enable
D. The data input
Answer- C. The chip enable
477. The altering of data so that it is not usable unless the changes are undone is
________
A. Compression
B. Encryption
C. Ergonomics
D. None of the above
Answer- B. Encryption
478. Which of the following scheduler is in charge of handling the swapped out
process?
A. Medium term
B. Long term
C. Short term
D. None of the above
Answer- A. Medium term
479. Race around condition can be eliminated using_________
A. False Triggering
B. Two clock pulses
C. Master-slave Flip-Flop
D. All of the above
Answer- C. Master-slave Flip-Flop
480. Which of the following is an operating system Call?
A. OPEN
B. CLOSE
C. UNLINK
D. All of the above
Answer- D. All of the above
481. Which component is used by the data analyst to create the queries that access
the database?
A. Data extraction
B. End-user query tool
C. End-user presentation tool
D. None of the Above
Answer- B. End-user query tool
482. __________ allows wireless mobile devices to access the Internet and its
services.
A. WAP
B. Ethernet
C. TCP/IP
75 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
D. None of the Above
Answer- Wireless Application Protocol (WAP)
483. Which data structure is needed to convert Infix notation to postfix notation?
A. Tree
B. Queue
C. Stack
D. None of the Above
Answer- C. Stack
484. Binding the same name to multiple operations whose signature differ in
number or types of arguments?
A. Overloading
B. Object model
C. Package
D. None of the above
Answer- A. Overloading
485. Implementation of an inverted list to maintain the record list for each value for
a given attribute can be done by________
A. Sequential file
B. Direct file
C. Indexed file
D. None of the above
Answer- A. Sequential file
486. _______ is a communication mode in which only one signal is transmitted.
A. Half Duplex Channel
B. Full Duplex Channel
C. Simplex Channel
D. None of the above
Answer- C. Simplex Channel
487. In Operating Systems, protection in a paging system is achieved mainly by the
PMLTR. PMLTR stands for ________
A. Page Map Table Limit Record
B. Page Memory Table Limit Register
C. Page Memory Table Limit Register
D. Page Map Table Limit Register
Answer- D. Page Map Table Limit Register. Paging is a memory-management scheme
that removes the requirement of contiguous allocation of physical memory.
488. Which of the following protocol is related to message format in e-mail?
A. RFC 822
B. RFC 832
C. RFC 844
D. None of the above
Answer- A. RFC 822
76 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
489. Wasting of memory within a partition, due to a reference in size of a partition
and of the object resident within it, is called _________
A. External Fragmentation
B. Internal Fragmentation
C. Both (A) and (B)
D. None of the above
Answer- B. Internal Fragmentation
490. In OSI model, routing is performed by ________
A. Layer 5
B. Layer 4
C. Layer 6
D. Layer 3
Answer- D. Layer 3
491. What is the purpose of VLAN Trunking Protocol(VTP) Pruning?
A. To simplify the management of VLANS
B. To reduce unnecessary flooded traffic on specified trunk lines.
C. Both (A) and (B)
D. None of the Above
Answer- B. To reduce unnecessary flooded traffic on specified trunk lines.
492. A network administrator wants to pass traffic between two Virtual
LANS(VLANs) on the same switch. What will he need to accomplish this?
A. bridge
B. switch
C. router
D. None of the Above
Answer- C. router
493. Which layer uses the segment as a Protocol Data Unit(PDU)?
A. Layer 5
B. Layer 3
C. Layer 2
D. Layer 4
Answer- D. Layer 4
494. Which of the following tools can be utilized to test IP connectivity between two
devices?
A. Ping
B. Telnet
C. Traceroute
D. All of the Above
Answer- D. All of the Above
495. A descending heap is also called _________
A. Max heap
77 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
B. Min heap
C. Priority heap
D. None of the Above
Answer- A. Max heap
496. Piggy backing is a technique for _______
A. Acknowledgement
B. Flow control
C. Both (A) and (B)
D. None of the Above
Answer- A. Acknowledgement
497. Tracking and recording of page modifications is usually performed in hardware
by adding a written-into bit to each entry of the page map table. This bit is
sometimes called ________
A. Protection bits
B. Dirty bits
C. Priority bits
D. None of the Above
Answer- B. Dirty bits
498. The best adequate Normal Form is _________
A. 2NF
B. 3NF
C. 4NF
D. None of the Above
Answer- B. 3NF
499. Which of the following is an Object-Oriented Programming (OOP)?
A. AI and expert system
B. Neural Networks
C. Parallel Programming
D. All of the Above
Answer- D. All of the Above
500. In C++, setw is _____ operator.
A. Initialization
B. Conditional
C. Field Width
D. None of the Above
Answer- C. Field Width
78 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
Compiler Questions
501. _______ translates high level language(source code) into low level
language(object code)
A. Compiler
B. Interpreter
C. Assembler
D. None of the Above
Answer- A. Compiler
502. System program such as Compiler are designed so that they are __________
A. Recursive
B. Non-reusable
C. Serially usable
D. Re-enterable
Answer- D. Re-enterable
503. The computer language generally translated to pseudocode is ______
A. Interpreter
B. Compiler
C. Assembly
D. None of the Above
Answer- C. Assembly
504. A system program that combines separately compiled modules of a program
into a form suitable for execution is __________
A. Assembler
B. Linking loader
C. Linker
D. None of the Above
Answer- B. Linking loader
505. In an absolute loading scheme, which loader function is accomplished by
programmer?
A. Allocation
B. Linking
C. Both (A) and (B)
D. None of the Above
Answer- C. Both (A) and (B)
506. Resolution is externally defined symbols is performed by _________
A. Assembler
B. Linking loader
C. Linker
D. None of the Above
Answer- C. Linker
79 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
507. Which of the following is used for grouping of characters into tokens?
A. Parser
B. Code generator
C. Loader
D. Lexical Analyser
Answer- D. Lexical Analyser
508. A compiler that runs on a particular platform and is capable of generating
executable code for another platform is called a _______
A. Assembler
B. Linking loader
C. Loader
D. Cross-Compiler
Answer- D. Cross-Compiler
509. A system program that set up an executable program in main memory ready
for execution is __________ ?
A. Assembler
B. Linker
C. Loader
D. Text editor
Answer- C. Loader
510. A compiler which allows only the modified section of the source code to be
recompiled is called as _______
A. Incremental Compiler
B. Dynamic Compiler
C. Subjective Compiler
D. None of the Above
Answer- A. Incremental Compiler
511. The output of lexical analyser is _________
A. A set of regular expressions
B. Syntax tree
C. Set of tokens
D. None of the Above
Answer- C. Set of tokens
512. A bottom-up parser generates ___________
A. right-most derivation
B. left-most derivation
C. right-most derivation in reverse
D. left-most derivation in reverse
Answer- C. right-most derivation in reverse
513. A top-down parser generates ___________
A. right-most derivation
80 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
B. left-most derivation
C. right-most derivation in reverse
D. left-most derivation in reverse
Answer- B. left-most derivation
514. A form of recursive-descent parsing that does not require any back-tracking is
known as__________
A. Predictive parsing
B. Recursive-descent parsing
C. Both (A) and (B)
D. None of the above
Answer- A. Predictive parsing
515. __________ checks whether the parse tree constructed follows the rules of a
language.
A. Syntax Analysis
B. Semantic Analysis
C. Lexical Analysis
D. None of the above
Answer- B. Semantic Analysis
516. Which of the following is/are advantage(s) of Compiler Technology?
A. Parsers for HTML in web browser
B. Software testing
C. Malicious code detection
D. All of the above
Answer- D. All of the above
517. __________ defines the syntax of a programming language.
A. Token
B. Pattern
C. Context-Free Grammar
D. None of the above
Answer- C. Context-Free Grammar
518. The graph that shows the basic blocks and their successor relationship is
called_______
A. Control graph
B. Hamiltonian graph
C. Flow Chart
D. None of the above
Answer- C. Flow Chart
519. The optimization technique which is typically applied on loops is _____
A. Peephole optimization
B. Removal of invariant computation
C. Constant folding
D. All of the Above
81 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
Answer- D. All of the Above
520. Semantic errors can be detected at__________
A. run time
B. compile time
C. Both (A) and (B)
D. None of the above
Answer- B. compile time
521. In an absolute loading scheme which loader function is accomplished by
assembler?
A. re-allocation
B. allocation
C. linking
D. loading
Answer- D. loading
522. ________or scanning is the process where the stream of characters making up
the source program is read from left to right and grouped into tokens.
A. Lexical analysis
B. Diversion
C. Modeling
D. None of the above
Answer- A. Lexical analysis
523. Load address for the first word of the program is called_________
A. Linker address origin
B. load address origin
C. Phase library
D. None of the above
Answer- B. load address origin
524. The translator which perform macro expansion is called a _________
A. Macro processor
B. Macro pre-processor
C. Micro pre-processor
D. assembler
Answer- B. Macro pre-processor
525. Which of the following is permanent database in the general model of
compiler?
A. Identifier table
B. Literal table
C. Terminal table
D. None of the above
Answer- C. Terminal table
82 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
526. Which of the following module does not incorporate initialization of values
changed by the module?
A. reusable module
B. Serially usable module
C. re-enterable module
D. non reusable module
Answer- D. non reusable module
527. Analysis that determines the meaning of a statement once its grammatical
structure becomes known is termed as __________
A. Semantic analysis
B. Syntax analysis
C. Regular analysis
D. General analysis
Answer- A. Semantic analysis
528. Which of the following system software resides in main memory always?
A. Linker
B. Loader
C. Assembler
D. None of the above
Answer- B. Loader
529. Parsing is also known as __________
A. Lexical analysis
B. Syntax analysis
C. Semantic analysis
D. Code generation
Answer- B. Syntax analysis
530. Back-patching is useful for handling ________
A. Unconditional jumps
B. Conditional jumps
C. backward references
D. forward references
Answer- D. forward references
Software Engineering Questions:
531. A computer program can often be a very satisfactory _______ of a physical
system such as road traffic conditions.
A. solution
B. replacement
C. model
D. simulation
Answer- D. simulation
83 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
532. Which of the following software engineering concept does Ada language
support?
A. abstraction
B. generic
C. information hiding
D. All of the Above
Answer- D. All of the Above
533. A module that is supplied along with the programming language translator to
make the language easier is called a/an ________
A. intrinsic function
B. benchmark program
C. data structure
D. None of the Above
Answer- A. intrinsic function
534. The model which reduces the cost of development of software is _______
A. waterfall model
B. spiral
C. prototyping
D. None of the Above
Answer- C. prototyping
535. The model which estimates the total effort in terms of person, months of the
technical project staff, is ________
A. waterfall model
B. spiral
C. COCOMO Model
D. prototyping
Answer- C. COCOMO Model
536. The graph theoretic concept will be useful in software testing is ________
A. Cyclomatic number
B. Eulerian Cycle
C. Hamultonian circuit
D. prototyping
Answer- A. Cyclomatic number
537. A desirable property of module is________
A. multifunctional
B. independency
C. high coupling
D. None of the Above
Answer- B. independency
538. The maximum effort distribution in phases of software development is
________
A. requirement analysis
84 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
B. testing
C. coding
D. None of the Above
Answer- B. testing
539. COM stands for ________
A. Computer on Microprocessor
B. Computer Output Microprocessor
C. Computer on Microfilm
D. Computer Output Microfilm
Answer- D. Computer Output Microfilm
540. In Object oriented design of software, objects have _____
A. Attributes
B. Operations
C. Both (A) and (B)
D. None of the Above
Answer- C. Both (A) and (B)
541. Which of the following is/are included in the Software Requirement
Specification(SRS) document?
A. Functional requirements
B. Non-Functional requirements
C. Goals of Implementation
D. All of the Above
Answer- D. All of the Above
542. Black box testing is also known as ________
A. graph based testing
B. loop testing
C. behavioral testing
D. None of the Above
Answer- C. behavioral testing
543. White box testing, a software testing technique is also called _________
A. graph based testing
B. loop testing
C. data flow testing
D. structural testing
Answer- D. structural testing
544. In Software development prototype is a ________
A. Mini-model of existing system
B. rudimentary working model of a product
C. Working model of the existing system
D. None of the above
Answer- B. rudimentary working model of a product
85 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
545. _______ is a popular version of the Systems Development Life Cycle (SDLC)
model for Software Engineering.
A. Waterfall Model
B. Iterative Model
C. Spiral Model
D. V Model
Answer- A. Waterfall Model
546. In RAD model, RAD stands for _________
A. Random Application Development
B. Rapid Access Development
C. Random Application Design
D. Rapid Application Development
Answer- D. Rapid Application Development
547. The traditional methodology used to develop, maintain, and replace
information systems is _____________
A. SDLC
B. RAD
C. OOAD
D. prototyping
Answer- A. SDLC
548. Automated tools for design are also called ________
A. CASE Tools
B. System design
C. DFD
D. RAD
Answer- A. CASE Tools
549. Which of the following is the Central component of any CASE tool?
A. CASE concentrator
B. CASE origin
C. CASE repository
D. None of the above
Answer- C. CASE repository
550. The phase of the SDLC in which an information system is systematically
repaired and improved is referred to as________
A. analysis
B. implementation
C. maintenance
D. None of the above
Answer- C. maintenance
551. Which of the following model is a combination of Iterative model and Waterfall
model?
A. linear-sequential Model
86 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
B. Spiral Model
C. V Model
D. None of the Above
Answer- B. Spiral Model
552. SRS stands for ________
A. Software Resolution Specification
B. Software Requirement Standards
C. Software Response Service
D. Software Requirements Specifications
Answer- D. Software Requirements Specifications
553. Which of the following model is also referred to as a linear-sequential life cycle
model?
A. Waterfall Model
B. Iterative Model
C. Spiral Model
D. V Model
Answer- A. Waterfall Model
554. SDLC stands for ________
A. Software Department Load Cycle
B. Software Department Life Cycle
C. Software Development Load Cycle
D. Software Development Life Cycle
Answer- D. Software Development Life Cycle
555. According to Lehman’s laws of software evolution, the software can be divided
into _______ types.
A. Two
B. Four
C. Three
D. Six
Answer- C. Three
556. What is the final result of the requirements analysis and specifications phase ?
A. data flow diagram
B. SRS Document
C. Coding the project
D. User Manual
Answer- B. SRS Document
557. In software development, What is noise?
A. Adding requirements in SRS document
B. Writing irrelevant statement in SRS document
C. Writing over-specific requirements in SRS document
D. None of the Above
Answer- B. Writing irrelevant statement in SRS document
87 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
558. The 4GT Model is a package of __________________.
A. CASE Tools
B. Software tools
C. Both (A) and (B)
D. None of the Above
Answer- B. Software tools
559. Risk analysis of a project is done in _______
A. System Analysis phase
B. Implementation phase
C. Maintenance phase
D. Feasibility Study
Answer- D. Feasibility Study
560. Which of the following is the most important phase of Software Development
Life Cycle (SDLC)?
A. Requirements analysis
B. Coding
C. Testing
D. Designing
Answer- A. Requirements analysis
DBMS Questions: Part - I
561. Which handles the SQL requests and converts it into a request the individual
database understands?
A. Graphical User Interface(GUI)
B. ActiveX Data Objects (ADO)
C. Universal Data Access (UDA)
D. Open Database Connectivity(ODBC)
Answer- D. Open Database Connectivity(ODBC)
562. __________ is a database that contains billions of table rows.
A. Very Large Database (VLDB)
B. Holographic storage
C. Both (A) and (B)
D. None of the Above
Answer- A. Very Large Database (VLDB)
563. ACID is a concept that defines four transaction properties of a database.ACID
stands for ______
A. Accuracy, Characteristics, Interface, Data mart
B. Atomicity, Consistency, Interface, Data mart
C. Accuracy, Characteristics, Isolation, Data mart
D. Atomicity, Consistency, Isolation, Durability
88 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
Answer- D. Atomicity, Consistency, Isolation, Durability
564. Which of the following is middle ware designed to support rapid high volume
on-line transactions?
A. Oracle
B. Customer Information Control System(CICS)
C. Both (A) and (B)
D. None of the Above
Answer- B. Customer Information Control System(CICS)
565. Which of the following middle ware technology might need the Interface
Definition Language (IDL)?
A. COBOL
B. RAI
C. CORBA
D. None of the Above
Answer- C. CORBA
566. CORBA stands for _______
A. Common Object Request Broker Application
B. Common Oriented Request Broker Application
C. Common Oriented Request Broker Architecture
D. Common Object Request Broker Architecture
Answer- D. Common Object Request Broker Architecture
567. The basic unit of PL/SQL is called ______
A. Array
B. Row
C. Unit
D. Block
Answer- D. Block
568. __________ is a refinement process of organizing data in the database to
avoid data redundancy and anomalies in insert, delete and update operations.
A. Data Modeling
B. Normalization
C. Clustering
D. None of the Above
Answer- B. Normalization
569. Which term is used to describe the process of forecasting or discovering
pattern in data?
A. Data Modeling
B. Data Warehousing
C. Data Mining
D. Normalization
Answer- C. Data Mining
89 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
570. Which of the following technology was Microsoft’s first attempt at an objectoriented database interface?
A. Data Access Objects (DAO)
B. ActiveX Data Objects (ADO)
C. Universal Data Access (UDA)
D. None of the Above
Answer- A. Data Access Objects (DAO)
571. ___________ is a centralized repository that stores data from multiple sources
and transforms them into a common, multi dimensional model for efficient querying
and analysis.
A. Data Selection
B. Data Cleaning
C. Data Integration
D. Data Warehouse
Answer- D. Data Warehouse
572. Who is known as the father of data warehousing?
A. Grace Hopper
B. Niklaus Wirth
C. James Gosling
D. William H.Imnon
Answer- D. William H.Imnon
573. __________ is a simple form of Data Warehouse that is focused on single
subject.
A. Spread Mart
B. Data Mart
C. Both (A) and (B)
D. None of the Above
Answer- B. Data Mart
574. Which is/are the basic operation(S) in Online Analytical Processing (OLAP)?
A. Consolidation
B. Drill- down
C. Slicing and Dicing
D. All of the Above
Answer- D. All of the Above
575. _________ is a class of software programs capable of supporting large
number of short online transactions?
A. OLAP
B. OLTP
C. Both (A) and (B)
D. None of the Above
Answer- B. OLTP
90 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
576. Which performs multidimensional analysis of business data and provides the
capability for complex calculations, trend analysis and sophisticated data modeling?
A. OLAP
B. OLTP
C. Both (A) and (B)
D. None of the Above
Answer- A. OLAP
577. Which of the following is the simplest and less technical type of data
warehouse?
A. Real Time Data Warehouse
B. Integrated Data Warehouse
C. Offline Data Warehouse
D. Offline operational Data Warehouse
Answer- D. Offline operational Data Warehouse
578. Which of the following Data Warehouse is updated from data in the operational
systems on a regular basis?
A. Real Time Data Warehouse
B. Integrated Data Warehouse
C. Offline Data Warehouse
D. Offline operational Data Warehouse
Answer- C. Offline Data Warehouse
579. __________ is a data warehouse that can assemble data from different areas
of business.
A. Real Time Data Warehouse
B. Integrated Data Warehouse
C. Offline Data Warehouse
D. Offline operational Data Warehouse
Answer- B. Integrated Data Warehouse
580. _________is updated for every transaction performed on the source data.
A. Real Time Data Warehouse
B. Integrated Data Warehouse
C. Offline Data Warehouse
D. Offline operational Data Warehouse
Answer- A. Real Time Data Warehouse
581. ____________ is described as extracting the information from large amount of
data in a database.
A. Data Modeling
B. Data Warehousing
C. Data Mining
D. None of the Above
Answer- C. Data Mining
91 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
582. ________ is a type of data mining used in Customer Relationship
Management(CRM)
A. Clustering
B. Web mining
C. Both (A) and (B)
D. None of the Above
Answer- B. Web mining
583. _________ is the process of using graph theory to analyse the node and
connection structure of a web site.
A. Web structure mining
B. Web content mining
C. Web usage mining
D. None of the Above
Answer- A. Web structure mining
584. The information gathered through web mining is evaluated by using ________
A. clustering
B. classification
C. Association
D. All of the Above
Answer- D. All of the above
585. Which of the following is used to examine data collected by search engines and
web spiders?
A. Web structure mining
B. Web content mining
C. Web usage mining
D. None of the Above
Answer- B. Web content mining
586. ________ a special type of computational cluster that is specifically designed
for storing and analysing large amount of unstructured data.
A. Hadoop Cluster
B. Failover Cluster
C. Both (A) and (B)
D. None of the Above
Answer- A. Hadoop Cluster
587. The process of grouping a set of objects into classes of similar objects is called
___________
A. clustering
B. classification
C. Association
D. All of the Above
Answer- A. clustering
92 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
588. Which parameter is used to discover patterns in data that can lead to
reasonable predictions about the future?
A. clustering
B. classification
C. Association
D. Forecasting
Answer- D. Forecasting
589. Which of the following is the process of detecting and correcting the wrong
data?
A. Data Selection
B. Data Cleaning
C. Data Integration
D. None of the Above
Answer- B. Data Cleaning
590. Which of the following is the process of combining data from different
resources?
A. Data Selection
B. Data Cleaning
C. Data Integration
D. None of the Above
Answer- C. Data Integration
591. An important purpose of the shared pool is to cache the executable versions of
_________ statements.
A. SQL
B. PL/SQL
C. Both (A) and (B)
D. None of the above
Answer- C. Both (A) and (B)
592. Which of the following is/are main component(s) of the shared pool?
A. library Cache
B. dictionary Cache
C. Both (A) and (B)
D. None of the above
Answer- C. Both (A) and (B)
593. Oracle Database segregates a small amount of the shared pool for large
objects(Over 5KB).The segregated area of the shared pool is called ______
A. Fixed Pool
B. Reserved Pool
C. Allocated Pool
D. None of the above
Answer- B. Reserved Pool
93 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
594. Which stores the executable(parsed) form of SQL cursors and PL/SQL
programs?
A. library Cache
B. dictionary Cache
C. Both (A) and (B)
D. None of the above
Answer- A. library Cache
595. Information stored in dictionary cache includes ______
A. User names
B. Profile data
C. table space information
D. All of the above
Answer- D. All of the above
596. When a query is submitted to oracle server for execution, oracle checks if
same query has been executed previously. If found the same then this event is
known as ________
A. Library cache hit
B. soft parsing
C. Both (A) and (B)
D. None of the above
Answer- C. Both (A) and (B)
597. If the parsed form of the statement is not found in the shared pool then new
statement is parsed and its parsed version is stored in Shared SQL area. This is
known as ________
A. Library cache hit
B. Soft parsing
C. Hard parsing
D. None of the above
Answer- C. Hard parsing
598. Shared pool size is an important factor for ______ applications.
A. On-line Transaction Processing (OLTP)
B. Decision Support Systems (DSS)
C. Both (A) and (B)
D. None of the above
Answer- A. On-line Transaction Processing (OLTP)
599. The shared pool is also able to support ________ in data warehousing
applications.
A. Shared SQL
B. Stored SQL
C. Unsorted SQL
D. Unshared SQL
Answer- D. Unshared SQL
94 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
600. Reuse of shared SQL for multiple users running the same application avoids
______
A. Library cache hit
B. Soft parsing
C. Hard parsing
D. None of the above
Answer- C. Hard parsing
601. Which of the following is/are feature(s) of Oracle 9i?
A. Scalability
B. Reliablity
C. One Development model
D. All of the above
Answer- D. All of the above
602. Which of the following is an example for Embedded SQL Statement?
A. ROLLBACK
B. SETROLE
C. ALTER SYSTEM
D. FETCH
Answer- D. FETCH
603. ________ is a tool for entering and running ad-hoc based database
statements.
A. MySQL
B. PL/SQL
C. SQL*PLUS
D. None of the above
Answer- C. SQL*PLUS
604. ___________ Database is the only database specifically designed as an
Internet development and deployment platform
A. Oracle 6i
B. Oracle 7i
C. Oracle 8i
D. Oracle 9i
Answer- D. Oracle 9i
605. Oracle 9i can scale tens of thousands of concurrent users support upto
_________ petabytes data.
A. 124
B. 256
C. 512
D. 624
Answer- C. 512
606. Oracle 9i Reports gives us _______options for building a Web report.
A. two
95 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
B. three
C. four
D. five
Answer- A. two
607. Oracle 9i Reports is the solution of _______
A. Paper publishing
B. Web publishing
C. Both (A) and (B)
D. None of the above
Answer- C. Both (A) and (B)
608. The ______ process is used for inter-instance locking in Real Application
Clusters.
A. Front Manager Server
B. Back Manager Server
C. Lock Manager Server
D. None of the above
Answer- C. Lock Manager Server
609. The ________ performs recovery when a failed instance starts up again.
A. Log Writer(LGWR)
B. Checkpoint(CKPT)
C. System Monitor(SMON)
D. Process Monitor(PMON)
Answer- C. System Monitor(SMON)
610. The ________ performs process recovery when a user process fails.
A. Log Writer(LGWR)
B. Checkpoint(CKPT)
C. System Monitor(SMON)
D. Process Monitor(PMON)
Answer- D. Process Monitor(PMON)
611. What type of failure occurs when Oracle fails due to an operating system or
computer hardware failure?
A. Application failure
B. Instance Failure
C. Media Failure
D. Roll back failure
Answer- B. Instance Failure
612. Which Oracle backup and recovery file contains user and system data?
A. Control file
B. Data file
C. Offline Redo file
D. None of the Above
Answer- B. Data file
96 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
613. When is the System Global Area (SGA) created in an Oracle database
environment?
A. When the database is created
B. When a user process is started
C. When the database is mounted
D. When the instance is started
Answer- D. When the instance is started
614. What is the type of Oracle backup in which all uncommitted changes have been
removed from the data files?
A. Full backup
B. Consistent backup
C. Inconsistent backup
D. Differential backup
Answer- B. Consistent backup
615. Which type of file is a part of the Oracle database?
A. Control file
B. Password file
C. Parameter files
D. log files
Answer- A. Control file
616. Which password management feature ensures a user cannot reuse a password
for a specified time interval?
A. Account Locking
B. Password History
C. Password Verification
D. None of the Above
Answer- B. Password History
617. Which privilege is required to create a database?
A. SYSDBA
B. DBA
C. SYSOPER
D. RESOURCE
Answer- A. SYSDBA
618. The most open source DBMS is _______
A. Oracle
B. Microsoft Access
C. MySQL
D. None of the Above
Answer- C. MySQL
619. Which database level is the closest level to the users?
A. Internal
97 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
B. External
C. Conceptual
D. None of the Above
Answer- B. External
620. Which Normal Form(NF) is considered adequate for normal relational database
design?
A. 2NF
B. 5NF
C. 4NF
D. 3NF
Answer- D. 3NF
621. Which of the following is used to generate a square root of a number?
(A) MySQL SQRT Function
(B) MySQL RAND Function
(C) MySQL AVG Function
(D) None of the above
Answer- (A) MySQL SQRT Function
622. Which datatype is used to store up to 65,536 characters?
(A) Memo
(B) Text
(C) Integer
(D) None of the above
Answer- (A) Memo
623. Which of the following operator combines two or more SELECT statements?
(A) In
(B) Like
(C) Union
(D) None of the above
Answer- (C) Union
624. Long datatype allows whole numbers between ___________
(A) 0 to 255
(B) -32,768 to 32,767
(C) -2,147,483,648 to 2,147,483,647
(D) None of the above
Answer- (C) -2,147,483,648 to 2,147,483,647
625. Which of the following datatype holds a string with maximum length of 255
characters?
(A) Text
(B) Medium Text
(C) Long Text
(D) Tiny Text
Answer- (D) Tiny Text
98 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
626. In E-R Diagram, the total participation by entities is represented as________
(A) Dashed line
(B) Rectangle
(C) Double rectangle
(D) Double line
Answer- (D) Double line
627. Intersection operator is used to obtain the _______ tuples.
(A) Unique
(B) Common
(C) Different
(D) None of the above
Answer- (B) Common
628. Which is a low level operator?
(A) Insert
(B) Update
(C) Directory
(D) None of the above
Answer- (C) Directory
629. The LAST() function is only supported in _______
(A) MS Word
(B) MS Access
(C) MS Excel
(D) None of the above
Answer- (B) MS Access
630. _______ are used to specify the rules for the data in a table.
(A) Constraints
(B) Aliases
(C) Wildcards
(D) None of the above
Answer- (A) Constraints
621. Which of the following is used to generate a square root of a number?
(A) MySQL SQRT Function
(B) MySQL RAND Function
(C) MySQL AVG Function
(D) None of the above
Answer- (A) MySQL SQRT Function
622. Which datatype is used to store up to 65,536 characters?
(A) Memo
(B) Text
(C) Integer
(D) None of the above
99 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
Answer- (A) Memo
623. Which of the following operator combines two or more SELECT statements?
(A) In
(B) Like
(C) Union
(D) None of the above
Answer- (C) Union
624. Long datatype allows whole numbers between ___________
(A) 0 to 255
(B) -32,768 to 32,767
(C) -2,147,483,648 to 2,147,483,647
(D) None of the above
Answer- (C) -2,147,483,648 to 2,147,483,647
625. Which of the following datatype holds a string with maximum length of 255
characters?
(A) Text
(B) Medium Text
(C) Long Text
(D) Tiny Text
Answer- (D) Tiny Text
626. In E-R Diagram, the total participation by entities is represented as________
(A) Dashed line
(B) Rectangle
(C) Double rectangle
(D) Double line
Answer- (D) Double line
627. Intersection operator is used to obtain the _______ tuples.
(A) Unique
(B) Common
(C) Different
(D) None of the above
Answer- (B) Common
628. Which is a low level operator?
(A) Insert
(B) Update
(C) Directory
(D) None of the above
Answer- (C) Directory
629. The LAST() function is only supported in _______
(A) MS Word
(B) MS Access
100 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
(C) MS Excel
(D) None of the above
Answer- (B) MS Access
630. _______ are used to specify the rules for the data in a table.
(A) Constraints
(B) Aliases
(C) Wildcards
(D) None of the above
Answer- (A) Constraints
631. ______ is the complex search criteria in the where clause.
(A) Substring
(B) Drop Table
(C) Predicate
(D) None of the above
Answer- (C) Predicate
632. Which of the following clause is an additional filter that is applied to the
result?
(A) Having
(B) Group-by
(C) Select
(D) Order by
Answer- (A) Having
633. _______ is the process of organizing data into related tables.
(A) Generalization
(B) Normalization
(C) Specialization
(D) None of the above
Answer- (B) Normalization
634. Which of the following is used to determine whether of a table contains
duplicate rows?
(A) Unique predicate
(B) Like Predicate
(C) Null predicate
(D) In predicate
Answer-(A) Unique predicate
635. The candidate key is that you choose to identify each row uniquely is
called_______
(A) Primary Key
(B) Foreign Key
(C) Alternate Key
(D) None of the above
Answer- (A) Primary Key
101 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
636. An operator is basically a join followed by a project on the attributes of first
relation is known as_______
(A) Join
(B) Inner Join
(C) Full Join
(D) Semi-Join
Answer- (D) Semi-Join
637. Which of the following is a special type of integrity constraint that relates two
relations and maintains consistency across the relations?
(A) Entity Integrity Constraints
(B) Referential Integrity Constraints
(C) Domain Integrity Constraints
(D) None of the above
Answer- (B) Referential Integrity Constraints
638. Each modification done in database transaction are first recorded into
the______
(A) Hard Drive
(B) Disk
(C) Log File
(D) Data Mart
Answer- (C) Log File
639. Which of the following is preferred method for enforcing data integrity?
(A) Cursors
(B) Constraints
(C) Triggers
(D) None of the above
Answer- (B) Constraints
640. Which allows to make copies of the database periodically to help in the cases
of crashes and disasters?
(A) Recovery utility
(B) Data loading utility
(C) Monitoring utility
(D) Backup Utility
Answer- (D) Backup Utility
641. Which operator is used to select values within a range?
(A) WITHIN
(B) RANGE
(C) BETWEEN
(D) None of the above
Answer- (C) BETWEEN
102 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
642. Which of the following is the most common type of Join?
(A) INNER JOIN
(B) INSIDE JOIN
(C) JOINED
(D) None of the above
Answer- (A) INNER JOIN
643. DBMS may be combined with or used by ______ type of transaction manager.
(A) DB2
(B) Customer Information Control System (CICS)
(C) Oracle
(D) None of the above
Answer- (B) Customer Information Control System (CICS)
644. The _____clause is used to specify the number of records to return.
(A) FROM
(B) WHERE
(C) SELECT TOP
(D) None of the above
Answer- (C) SELECT TOP
645. In SQL, Wildcard characters are used with the _______ operator.
(A) LIKE
(B) RANGE
(C) BETWEEN
(D) None of the above
Answer- (A) LIKE
646. Which operator allows to specify multiple values in a WHERE Clause?
(A) LIKE
(B) IN
(C) BETWEEN
(D) None of the above
Answer- (B) IN
647. In SQL,which of the following wildcard character is used as a substitute for
Zero or more characters?
(A) *
(B) _
(C) ^
(D) %
Answer- (D) %
648. The basic unit of PL/SQL variant is called a _____
(A) block
(B) cell
(C) table
(D) None of the above
103 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
Answer- (A) block
649. Which of the following is a special type of stored procedure that is
automatically invoked whenever the data in the table is modified?
(A) Curser
(B) Trigger
(C) Both (A) & (B)
(D) None of the above
Answer- (B) Trigger
650. __________ are used to temporarily rename a table or heading of a column.
(A) Wildcards
(B) Constraints
(C) Joins
(D) Aliases
Answer- (D) Aliases
651. Which SQL statement is used to extract data from a database?
(A) EXTRACT
(B) GET
(C) OPEN
(D) SELECT
Answer- (D) SELECT
652. Which of the following keyword can be used to return different values?
(A) SELECT
(B) GET
(C) OPEN
(D) DISTINCT
Answer- (D) DISTINCT
653. ______ operator is used to display a record if either the first condition or the
second condition is true.
(A) AND
(B) OR
(C) Both (A) & (B)
(D) None of the above
Answer- (B) OR
654. Which of the following DBMS provides faster response time and better
performance?
(A) Relational Database Management System (RDBMS)
(B) NoSQL DBMS
(C) In-Memory Database Management System (IMDBMS)
(D) None of the above
Answer- (C) In-Memory Database Management System (IMDBMS)
104 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
655.________is suitable for data warehouses that have a large number of similar
data items.
(A) Relational Database Management System (RDBMS)
(B) Columnar Database Management system (CDBMS)
(C) In-Memory Database Management System (IMDBMS)
(D) None of the above
Answer- (B) Columnar Database Management system (CDBMS)
656. Which of the following is standard interactive and programming language for
getting information from and updating a database.
(A) SQL
(B) PHP
(C) ASP
(D) None of the above
Answer- (A) SQL
657. _______ keyword sorts the record in ascending order by default.
(A) ORDER BY
(B) SORT BY
(C) SORT
(D) None of the above
Answer- (A) ORDER BY
658. Which of the following is an open standard Application Programming Interface
(API) for accessing a database?
(A) Universal Data Access
(B) Open Database Connectivity
(C) Command Line Interface
(D) Open Data-Link Interface
Answer- (B) Open Database Connectivity
659. Which SQL statement is used to insert new data in a database?
(A) INSERT INTO
(B) ADD NEW
(C) ADD RECORD
(D) None of the above
Answer- (A) INSERT INTO
660. Which method of Online Analytical Processing stores data in both a relational
and a multi dimensional database.
(A) Hybrid OLAP
(B) Relational OLAP
(C) OLAP
(D) None of the above
Answer- (A) Hybrid OLAP
661. OLAP stands for_____
(A) Online Arithmetic Processing
105 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
(B) Online Analysis Processing
(C) Online Analytical Processing
(D) None of the above
Answer- (C) Online Analytical Processing
662. The _____ operation allows the combining of two relations by merging pairs of
tuples, one from each relation, into a single tuple.
(A) Join
(B) Intersection
(C) Union
(D) None of the above
Answer- (A) Join
663. ________is the multiplication of all the values in the attributes.
(A) Set difference
(B) Cartesian product
(C) Intersection
(D) None of the above
Answer- (B) Cartesian product
664.Which command is used to remove a relation from an SQL database?
(A) Delete
(B) Remove
(C) Drop
(D) None of the above
Answer- (C) Drop
665. In SQL, the spaces at the end of the string are removed by _______ function .
(A) Lower
(B) String
(C) Trim
(D) None of the above
Answer- (C) Trim
666. ________ is used to save permanently any transaction into database.
(A) commit
(B) rollback
(C) savepoint
(D) None of the above
Answer- (A) commit
667. A unit of storage that can store one or more records in a hash file organization
is denoted as_______
(A) Bucket
(B) Disk pages
(C) Blocks
(D) Nodes
Answer- (A) Bucket
106 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
668. Which of the following operator used for appending two strings?
(A) %
(B) &
(C) +
(D) ||
Answer- (D) ||
669. The management information system (MIS) structure with one main computer
system is called a________
(A) Decentralized MIS structure
(B) Distributed MIS structure
(C) Centralized MIS structure
(D) None of the above
Answer- (C) Centralized MIS structure
670. The highest level in the hierarchy of data organization is called________
(A) data base
(B) data file
(C) data record
(D) None of the above
Answer- (A) data base
671. A top to bottom relationship among the items in a database is established by a
______
(A) Network Schema
(B) Relational Schema
(C) Hierarchical Schema
(D) None of the above
Answer- (C) Hierarchical Schema
672. Aggregation is a special form of _______
(A) Specialization
(B) Association
(C) Generalization
(D) None of the above
Answer- (B) Association
673. In E-R Diagram, _________ represents Key Attribute.
(A) Ellipse with underlying line
(B) Rectangle with underlying line
(C) Double rectangle
(D) None of the above
Answer- (A) Ellipse with underlying line
674. Which TCL command is used to permanently save any transaction into
database?
(A) rollback
107 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
(B) savepoint
(C) commit
(D) None of the above
Answer- (C) commit
675. Which TCL command restores the database to last committed state?
(A) rollback
(B) savepoint
(C) commit
(D) None of the above
Answer- (A) rollback
676. _______ is used to control privilege in Database.
(A) Data Manipulation Language
(B) Data Definition Language
(C) Data Query Language
(D) Data Control Language
Answer- (D) Data Control Language
677. Which model remains operative until the software is required?
(A) Waterfall model
(B) Incremental model
(C) Prototyping model
(D) Spiral model
Answer- (D) Spiral model
678. In oracle, which tablespace is the minimum required when creating a
database?
(A) System tablespace
(B) Undo tablespace
(C) temporary tablespace
(D) None of the above
Answer- (A) System tablespace
679. Which of the following is another name for weak entity?
(A) Dominant
(B) Child
(C) Owner
(D) None of the above
Answer- (B) Child
680. ODBC is based on ________
(A) C++ language
(B) RDBMS
(C) Structured Query Language
(D) C language
Answer- (C) Structured Query Language
108 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
681. The language used in application programs to request data from the DBMS is
referred to as the ______
(A) DML
(B) DDL
(C) DCL
(D) None of the above
Answer- (A) DML
682. In Oracle, who owns the data dictionary?
(A) DBA
(B) SYS
(C) SYSTEM
(D) None of the above
Answer- (B) SYS
683. In SQL, which command is used to update existing row in a table?
(A) Insert
(B) Delete
(C) Update
(D) None of the above
Answer- (C) Update
684. A ________ contains the smallest unit of meaningful data, so you might call it
the basic building block for a data file.
(A) Record
(B) Field
(C) Table
(D) None of the above
Answer- (B) Field
685. A relation between two entities is treated as a single entity is
called__________
(A) Aggregation
(B) Specialization
(C) Generalization
(D) None of the above
Answer- (A) Aggregation
686. Data mining evolve as a mechanism to cater the limitations of _______
systems to deal massive data sets with high dimensionality.
(A) OLAP
(B) OLTP
(C) DWH
(D) None of the above
Answer- (B) OLTP
687. In Relational table, the term “Attribute” is also used to represent _______
(A) row
109 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
(B) column (or) field
(C) entity
(D) None of the above
Answer- (B) column (or) field
688. Which of the following categories of the data integrity RDBMS will enforce
specific business rules?
(A) Entity Integrity
(B) Domain Integrity
(C) User-Defined Integrity
(D) None of the above
Answer- (C) User-Defined Integrity
689. E-R Modeling technique is a _______
(A) top-down approach
(B) bottom-up approach
(C) User-Defined
(D) None of the above
Answer- (A) top-down approach
690. The number of attributes in a relation is called its _____
(A) row
(B) column
(C) degree
(D) None of the above
Answer- (C) degree
691. Rows of a relation are called ________
(A) entity
(B) degree
(C) tuples
(D) None of the above
Answer- (C) tuples
692. The number of tuples in a relation is termed as ______
(A) cardinality
(B) entity
(C) column
(D) None of the above
Answer- (A) cardinality
693. In SQL, Which of the following is a Data Manipulation Language(DML)
command?
(A) create
(B) alter
(C) merge
(D) drop
Answer- (C) merge
110 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
694. ….. is a top-down approach in which one higher level entity can be divided into
two lower level entities.
(A) Aggregation
(B) Specialization
(C) Generalization
(D) None of the above
Answer- (B) Specialization
695. Which of the following is not a type of database?
(A) Hierarchical
(B) Relational
(C) Network
(D) Transition
Answer- (D) Transition
696. In a relational database, each tuple is divided into fields called_______
(A) Relations
(B) Domains
(C) Queries
(D) None of the above
Answer- (B) Domains
697. In E-R Diagram, attribute is represented by…….
(A) Rectangle
(B) Square
(C) Double Rectangle
(D) eclipse
Answer- (D) eclipse
698. In SQL, TCL stands for______
(A) Transmission Control Language
(B) Transaction Central Language
(C) Ternary Control Language
(D) Transaction Control Language
Answer- (D) Transaction Control Language
699. Which of the following is a part of the Oracle database system?
(A) Free lists
(B) Front end
(C) Network
(D) None of the above
Answer- (B) Front end
700. Which of the following is used with database?
(A) ATM
(B) Payment gateway
(C) Data Mining
111 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
(D) None of the above
Answer- (C) Data Mining
701. A collection of conceptual tools for describing data, relationships, semantics
and constraints is referred to as ……….
(A) Data Model
(B) E-R Model
(C) DBMS
(D) All of the above
Answer- (A) Data Model
702. Dr.E.F. Codd represented ……. rules that a database must obey if it has to be
considered truly relational.
(A) 10
(B) 15
(C) 14
(D) 12
Answer- (D) 12
703. In E-R Diagram, weak entity is represented by…….
(A) Rectangle
(B) Square
(C) Double Rectangle
(D) Circle
Answer- (C) Double Rectangle
704. An entity that is related with itself is known as…….
(A) binary relationship
(B) recursive relationship
(C) ternary relationship
(D) None of the above
Answer- (B) recursive relationship
705. ……. is a bottom-up approach in which two lower level entities combine to
form a higher level entity.
(A) Aggregation
(B) Specialization
(C) Generalization
(D) None of the above
Answer- (C) Generalization
706. An entity set that does not have sufficient attributes to form a primary key, is a
……
(A) Primary entity set
(B) Weak entity set
(C) Strong entity set
(D) None of the above
Answer- (B) Weak entity set
112 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
707. Which SQL command delete all the records and does not remove the structure?
(A) Drop
(B) Insert
(C) Truncate
(D) None of the above
Answer- (C) Truncate
708. Which of the following is a Data Definition Language (DDL) command?
(A) Delete
(B) Insert
(C) Drop
(D) Merge
Answer- (C) Drop
709. In …….. database, data is organized in the form of trees with nodes.
(A) Hierarchical
(B) Relational
(C) Network
(D) None of the above
Answer- (A) Hierarchical
710. Which command is used to retrieve records from one or more table?
(A) Delete
(B) Insert
(C) Drop
(D) Select
Answer- (D) Select
711. ________ allows a unique number to be generated when a new record is
inserted into a table.
(A) Insert Into Select
(B) Insert Into
(C) Select Into
(D) Auto Increment
Answer- (D) Auto Increment
712. Which of the following constraint is used to limit the value range that can be
placed in a column?
(A) Check
(B) Default
(C) Unique
(D) None of the above
Answer- (A) Check
713. A Foreign key in one table points to a ________ key in another table.
(A) Alternate
(B) Default
113 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
(C) Primary
(D) None of the above
Answer- (C) Primary
714. Domain constraints, functional dependency and referential integrity are special
forms of _________
(A) Foreign key
(B) Primary key
(C) Referential constraint
(D) Assertion
Answer- (D) Assertion
715. 4NF stands for ______
(A) Fourth Normal File
(B) Fourth Normal Form
(C) Fourth Normal Fraction
(D) Fourth Negative File
Answer- (B) Fourth Normal Form
716. Which of the following field type is used to store photograph of employees?
(A) Memo
(B) Picture
(C) OLE
(D) Photo
Answer- (C) OLE
717. _______ statement is used in conjunction with the aggregate functions to
group the result-set by one or more columns.
(A) Select
(B) Group By
(C) Distinct
(D) None of the above
Answer- (B) Group By
718. Which of the following method can be used to add more tables in a database?
(A) Design View
(B) Table Wizard
(C) Both (A) & (B)
(D) None of the above
Answer- (C) Both (A) & (B)
719. Which of the following field type is the best to store serial numbers?
(A) Number
(B) Auto Number
(C) Text
(D) Memo
Answer- (B) Auto Number
114 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
720. The feature that database allows to access only certain records in database
is______
(A) Queries
(B) Reports
(C) Forms
(D) Tables
Answer- (A) Queries
Mixed Questions:2
721. The process by which the structure of the database is modified to eliminate
hidden dependencies and replacing groups is _________
A. Normalization
B. Indexing
C. Enforcing referential integrity
D. Enforcing data integrity
Answer- A. Normalization
722. Which kind of lock includes a keypad that can be used to control access into
areas?
A. Cipher
B. Warded
C. Device
D. Tumber
Answer- A. Cipher
723. Programs that automatically submit your search request to several search
engines simultaneously are calledA. WebCrawler
B. Meta search engines
C. Spiders
D. Hits
Answer- B. Meta search engines
724. This _________ tier processes HTTP protocol, scripting tasks, performs
calculations, and
provides access to data.
A. Applications/Web server
B. Client
C. Enterprise server
D. DBA
Answer- B. Client
725. A communication processor that connects dissimilar networks by providing the
translation from one set of protocol to another is______
A. Bridge
115 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
B. Router
C. Gateway
D. Modem
Answer- C. Gateway
726. Which the result of a computation depends on the speed of the processes
involved there is said to be ?
A. Cycle stealing
B. Race condition
C. A time look
D. A dead lock
Answer- B. Race condition
727. A method which transfers the entire block of data from its own buffer to main
memory takes place without intervention by CPU.
A. Programmed Input/Output
B. Input driven Input/output
C. Direct Memory Access
D. None of the above
Answer- C. Direct Memory Access
728. In C++ a function contained within a class is called ________
A. Member Function
B. A Class Function
C. An operator
D. None of the above
Answer- A. Member Function
729. CIDR (Classless Inter Domain Routing)–
A. It is used in class C Networks
B. It is used in class B Networks
C. It is used in class A Networks
D. All of the above
Answer- A. It is used in class C Networks
730. Classes are useful because they _______
A. are removed from memory when not in use
B. permit data to be hidden from other classes
C. bring together all aspects of an entity in one place
D. can closely model objects in the real world
Answer- B. permit data to be hidden from other classes
731. Which of the following systems implementation approaches should be used if
you want to run the old system and the new system at the same time for a specified
period?
A. direct
B. pilot
C. phased
116 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
D. parallel
Answer- D. parallel
732. The usual method of __________ mapping is by some arithmetical
manipulation of the key value, in direct file organization.
A. Random
B. Serial
C. Direct
D. One to many
Answer- C. Direct
733. A generalization of the Boyce Codd Normal Form to relation schemes which
includes the multivalued dependencies is called __________
A. Second Normal Form
B. Third Normal Form
C. Fourth Normal Form
D. Fifth Normal Form
Answer- C. Fourth Normal Form
734. PPP (Point to Point Protocol) used for which purpose?
A. Error Detection
B. Authentication
C. Both (A) and (B)
D. None of the above
Answer- C. Both (A) and (B)
735. PPP used in which layer?
A. Layer 1
B. Layer 3
C. Layer 5
D. Layer 2
Answer- B. Layer 3
736. If communication software can be called the "traffic cop" of a micro
communication system, then what should the modem be called?
A. Park
B. Bridge
C. Interface
D. Link
Answer- B. Bridge
737. Yacc is available as a command (utility) on the ______
A. DOS
B. UNIX
C. MINIX
D. None of these
Answer- B. UNIX
117 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
738. Which of the following communications service provides message preparation
and transmission facilities?
A. Teletex
B. Teletext
C. x400
D. Fax
Answer- A. Teletex
739. An assembler that runs on one machine but produces machine code for
another machine is called _______
A. Simulator
B. Emulator
C. Boot-Strap loader
D. Cross Assembler
Answer- D. Cross Assembler
740. Resolution of externally defined symbols is performed by___________
A. Linker
B. Loader
C. Compiler
D. Assembler
Answer- A. Linker
741. A transition between two memory resident process in a multiprogramming
system is called ______
A. Process Switch
B. Mode Switch
C. Transition Switch
D. All of the above
Answer-A. Process Switch
742. The memory address of the first element of an array is called _________
A. floor address
B. first address
C. foundation address
D. base address
Answer- D. base address
743. A set of resources' allocations such that the system can allocate resources to
each process in some order, and still avoid a deadlock is called ________
A. Unsafe state
B. Safe state
C. Starvation
D. Greedy allocation
Answer- B. Safe state
744. Which of the following does not allow multiple users or devices to share one
communications line?
118 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
A. doubleplexer
B. multiplexer
C. concentrator
D. controller
Answer- A. doubleplexer
745. Consider an operation of addition. For two numbers the operation will generate
a sum. If the operands are strings, and the same operation would produce a third
string by concatenation. This feature is called________
A. Inheritance
B. Encapsulation
C. Polymorphism
D. Binding
Answer- C. Polymorphism
746. Precedence determines which operator is ______
A. is evaluated first
B. is more important
C. is fastest number
D. None of the above
Answer- A. is evaluated first
747. In a circular linked list organization, insertion of a record involves modification
of
A. one pointer
B. two pointers
C. multiple pointers
D. no pointer
Answer- A. one pointer
748. A operator precedence parser is a ________
A. Bottom-up parser
B. Top-down parser
C. Back tracing parser
D. None of the above.
Answer- C. Back tracing parser
749. Programming in a language that actually controls the path of signals or data
within the computer is controlled __________
A. micro-programming
B. instruction set
C. assembly language programming
D. machine language programming.
Answer- A. micro-programming
750. A utility programme that takes a procedure and searches a library to locate
copies of any procedures called but not defined in the first procedure, is called
__________
119 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
A. linker
B. re-locator
C. loader
D. text editor
Answer- A. linker
DBMS Questions: Part - 2
751. This is a type of program that lets one or more computer users create,
manage, and access data in a database.
A. B2B
B. DBMS
C. multidimensional database
D. None
Answer- DBMS
752. In a relational database, this is a data structure that organizes the information
about a single topic into rows and columns.
A. block
B. record
C. tuple
D. table
Answer- table
753. This is a family of relational database management system products from IBM
that serve a number of different operating system platforms.
A. Cognos
B. DB2
C. ADO
D. Universal Data Access
Answer- DB2
754. This is a central repository for all or significant parts of the data that an
enterprise's various business systems collect.
A. data warehouse
B. business information warehouse
C. knowledge warehouse
D. None
Answer- data warehouse
755. This is the job title of someone who directs or performs all activities related to
maintaining a successful database environment.
A. DBA
B. MOLAP
120 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
C. PHP
D. RFC
Answer- DBA
756. This is a common standard language used to update and get information from
a database.
A. VB
B. TMQL
C. PHP
D. SQL
Answer- SQL
757. This is a file format that contains the values in a table in which column values
are separated by a comma and each row starts a new line.
A. ASCII
B. CSV file
C. virtual organization
D. None
Answer- CSV file
758. In a relational database, this is the data structure that holds a single piece of
data, such as first name or phone number.
A. catalog
B. field
C. entity
D. object
Answer- field
759. This is an organized selection of data from a database that allows you to look
at it from a particular perspective.
A. Venn diagram
B. Gantt chart
C. view
D. splay tree
Answer- view
760. This a program tool allows you to reorganize and summarize selected columns
and rows of data in a spreadsheet or database table to obtain a desired report.
A. pivot table
B. PERT chart
C. quad tree
D. ODBC
Answer- pivot table
761. At this level of normalization, each column in a table that is not a determiner
of the contents of another column, must itself be a function of the other columns in
the table.
A. 1NF
121 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
B. 2NF
C. 3NF
D. DKNF
Answer- 2NF
762. This method of online analytical processing stores data in both a relational and
a multi dimensional database.
A. HOLAP
B. ROLAP
C. OLAP
D. DIMM
Answer- HOLAP
763. Which technology was Microsoft's first attempt at an object-oriented database
interface?
A. MQSeries
B. ADO
C. DAO
D. UDA
Answer- DAO
764. What concept would a data modeler NOT be expected to know?
A. class
B. object
C. UML
D. FMP
Answer- FMP
765. Which of the following tree structures is unique in that the tree organization
varies depending on which nodes are most frequently accessed?
A. B-tree
B. binary tree
C. quad tree
D. splay tree
Answer- splay tree
766. The basic unit of this SQL variant is called a block.
A. PL/SQL
B. XQL
C. SQLJ
D. TMQL
Answer- PL/SQL
767. The acronym ACID is typically used in reference to __________
A. transactions
B. CRM analytics
C. data integrity
D. stubs
122 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
Answer- transactions
768. A Database Management System (DBMS) may be used by, or combined with,
this type of transaction manager.
A. DB2
B. CICS
C. Oracle
D. Cognos
Answer- CICS
769. Encapsulation, types, classes, inheritance, overriding combined with late
binding, and extensibility are all features of this type of database.
A. multidimensional database
B. relational database
C. object-oriented
D. open source
Answer- object-oriented
770. A programmer using this type of middleware might need the Interface
Definition Language (IDL).
A. RPC
B. ORB
C. MUD
D. EAI
Answer- ORB
771. This is a collection of data items organized as a set of formally-described
tables from which data can be accessed or reassembled in many different ways
without having to reorganize the database tables.
A. relational database
B. array
C. file allocation table
D. splay tree
Answer- relational database
772. This is a standard interactive and programming language for getting
information from and updating a database.
A. dynamic data exchange
B. Structured Query Language
C. ASCII
D. Erlang programming language
Answer- Structured Query Language
773. In creating a database, this is the process of organizing it into tables insuch a
way that the results of using the database are always unambiguous.
A. probability
B. normalization
C. data modeling
123 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
D. query by example
Answer- normalization
774. This family of products is IBM's cross-platform relational database
management system.
A. DBA
B. DB2
C. PHP
D. RDF
Answer- DB2
775. This is an open standard application programming interface (API) for
accessing a database.
A. Universal Data Access
B. Open Database Connectivity
C. Topic Map Query Language
D. Open Data-Link Interface
Answer- Open Database Connectivity
776. This term, used to describe a database that occupies magnetic storage in the
terabyte range, describes a database that contains billions of table rows.
A. Very Large Database
B. holographic storage
C. Cold Fusion
D. giant
Answer- Very Large Database
777. This is a collection of descriptions about data objects that is created for the
benefit of programmers and others who might need to refer to them.
A. data dictionary
B. stored procedure
C. Virtual File Allocation table
D. catalog
Answer- data dictionary
778. This term is used to describe the process of forecasting, or simply discovering
patterns in data that can lead to predictions about the future.
A. customer relationship management
B. PERT chart
C. data mining
D. enterprise risk management
Answer- data mining
779. In the relational modes, cardinality is termed as:
A. Number of tuples.
B. Number of attributes.
C. Number of tables.
D. Number of constraints
124 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
Answer- Number of tuples.
780. Relational calculus is a ______
A. Procedural language.
B. Non- Procedural language.
C. Data definition language.
D. High level language
Answer- Non- Procedural language.
781. The view of total database content is
A. Conceptual view.
B. Internal view.
C. External view
D. None
Answer- Conceptual view.
782. Which type of file is part of the Oracle database?
A. Control file
B. Password file
C. Parameter files
D. Archived log files
Answer- Control file
783. Which statements are use to UNLOCK the user?
A. Alter user Scott account lock;
B. Modified user Scott account unlock;
C. Alter user Scott account unlock;
D. Alter user Scott unlock
Answer- Alter user Scott account unlock;
784. For which two constraints are indexes created when the constraint is added?
A. Primary key
B. Unique
C. Not null
D. Both (A) & (B)
Answer- Both (A) & (B)
785. What type of failure occurs when Oracle fails due to an operating system or
computer hardware failure?
A. Application failure
B. Instance Failure
C. Media Failure
D. Rollback failure
Answer- Instance Failure
786. When is the SGA created in an Oracle database environment?
A. When the database is created
B. When a user process is started
125 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
C. When the database is mounted
D. When the instance is started
Answer- When the database is created
787. Which password management feature ensures a user cannot reuse a password
for a specified time interval?
A. Account Locking
B. Password History
C. Password Verification
D. Password Expiration and Aging
Answer- Password History
788. Which privilege is required to create a database?
A. SYSDBA
B. DBA
C. SYSOPER
D. RESOURCE
Answer- SYSDBA
789. What is the type of Oracle backup in which all uncommitted changes have been
removed from the Data files?
A. Full backup
B. Consistent backup
C. Inconsistent backup
D. Differential backup
Answer- Consistent backup
790. Which are the physical structures that constitute the Oracle database?
A. control file
B. Data file
C. Log file
D. All of the above
Answer- All of the above
791. DML is provided for
A. Description of logical structure of database.
B. Addition of new structures in the database system.
C. Manipulation & processing of database.
D. Definition of physical structure of database system.
Answer- Manipulation & processing of database.
792.‘AS’ clause is used in SQL for
A. Selection operation.
B. Rename operation.
C. Join operation.
D. Projection operation
Answer- Rename operation.
126 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
793. ODBC stands for
A. Object Database Connectivity.
B. Oral Database Connectivity.
C. Oracle Database Connectivity.
D. Open Database Connectivity.
Answer- Open Database Connectivity.
794. In an E-R diagram attributes are represented by
A. rectangle.
B. Square.
C. Ellipse.
D. Triangle.
Answer- Ellipse.
795. The database environment has all of the following components except:
A. Users.
B. Separate files.
C. Database.
D. Database administrator
Answer- Users.
796. The language which has recently become the de-facto standard for interfacing
application programs with relational database system is
A. Oracle.
B. SQL.
C. DBase.
D. None
Answer- SQL.
797. In an E-R diagram an entity set is represented by a
A. Rectangle.
B. Ellipse.
C. Diamond box.
D. Circle.
Answer- Rectangle.
798. The DBMS language component which can be embedded in a program is
A. The data definition language (DDL).
B. The data manipulation language (DML).
C. The database administrator (DBA).
D. A query language.
Answer- The data manipulation language (DML).
799. A relational database developer refers to a record as
A. A criteria.
B. A relation.
C. A tuple.
D. An attribute.
127 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
Answer- A tuple.
800. The method in which records are physically stored in a specified order
according to a key field in each record is
A. Hash.
B. Direct.
C. Sequential.
D. All of the above.
Answer- Hash.
801. Count function in SQL returns the number of
A. Values.
B. Distinct values.
C. Groups.
D. Columns.
Answer- Values.
802. An advantage of the database management approach is
A. Data is dependent on programs.
B. Data redundancy increases.
C. Data is integrated and can be accessed by multiple programs.
D. None of the above.
Answer- Data is integrated and can be accessed by multiple programs.
803. A DBMS query language is designed to
A. Support end users who use English-like commands.
B. Support in the development of complex applications software.
C. Specify the structure of a database.
D. None
Answer- Specify the structure of a database.
804. The method of access which uses key transformation is known as
A. Direct.
B. Hash.
C. Random.
D. Sequential.
Answer- Hash.
805. The statement in SQL which allows to change the definition of a table is
A. Alter.
B. Update.
C. Create.
D. Select.
Answer- Alter.
806. Relational Algebra is
A. Data Definition Language.
B. Meta Language
128 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
C. Procedural query Language
D. None of the above
Answer- Procedural query Language
807. Key to represent relationship between tables is called
A. Primary key
B. Secondary Key
C. Foreign Key
D. None of these
Answer- Foreign Key
808. DBMS helps to achieve
A. Data independence
B. Centralized control of data
C. Both (A) and (B)
D. None
Answer- Both (A) and (B)
809. Which of the following are the properties of entities?
A. Groups
B. Table
C. Attributes
D. Switchboards
Answer- Attributes
810. Which of the following is a valid SQL type?
A. CHARACTER
B. NUMERIC
C. FLOAT
D. All of the above
Answer- All of the above
811. Which of the following is an advantage of view?
A. Data security
B. Derived columns
C. Hiding of complex queries
D. All of the above
Answer- All of the above
812. Which database level is closest to the users?
A. External
B. Internal
C. Physical
D. Conceptual
Answer- External
813. A set of possible data values is called
A. Attribute.
129 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
B. Degree.
C. Tuple.
D. Domain.
Answer- Domain.
814. Which of the following is another name for weak entity?
A. Child
B. Owner
C. Dominant
D. All of the above
Answer- Child
815. Which of the following database object does not physically exist?
A. Base table
B. Index
C. View
D. None of the above
Answer- View
816. Which two files are used during operation of the DBMS?
A. Query languages and utilities
B. DML and query language
C. Data dictionary and transaction log
D. Data dictionary and query language
Answer- Data dictionary and transaction log
817. …………data type can store unstructured data
A. RAW
B. CHAR
C. NUMERIC
D. VARCHAR
Answer- RAW
818. Cartesian product in relational algebra is
A. a Unary operator
B. a Binary operator
C. a Ternary operator
D. None
Answer- a Binary operator
819. In a Hierarchical model records are organized as
A. Graph.
B. List.
C. Links.
D. Tree.
Answer- Tree.
820. In case of entity integrity, the primary key may be
130 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
A. not Null
B. Null
C. both Null & not Null.
D. any value.
Answer- not Null
821. The language used in application programs to request data from the DBMS is
referred to as the
A. DML
B. DDL
C. VDL
D. SDL
Answer- DML
822. A subschema expresses
A. the logical view.
B. the physical view.
C. the external view.
D. all of the above.
Answer- the external view.
823. E-R model uses this symbol to represent weak entity set?
A. Dotted rectangle.
B. Diamond
C. Doubly outlined rectangle
D. None of these
Answer-Doubly outlined rectangle
824. SET concept is used in :
A. Network Model
B. Hierarchical Model
C. Relational Model
D. None of these
Answer- Network Model
825. _______ produces the relation that has attributes of R1 and R2
A. Cartesian product
B. Difference
C. Intersection
D. Product
Answer- Cartesian product
826. In a relation
A. Ordering of rows is immaterial
B. No two rows are identical
C. Both (A) and (B)
D. None of these.
Answer- Both (A) and (B)
131 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
827. The conceptual model is
A. dependent on hardware.
B. dependent on software.
C. dependent on both hardware and software.
D. independent of both hardware and software.
Answer- independent of both hardware and software.
828. Which of the following operation is used if we are interested in only certain
columns of a table?
A. PROJECTION
B. SELECTION
C. UNION
D. JOIN
Answer- PROJECTION
829. The users who use easy-to-use menu are called
A. Sophisticated end users.
B. Naive users.
C. Stand-alone users.
D. Casual end users.
Answer- Naive users.
830. Which are the two ways in which entities can participate in a relationship?
A. Passive and active
B. Total and partial
C. Simple and Complex
D. All of the above
Answer- Total and partial
831. Which of the following is a comparison operator in SQL?
A. =
B. LIKE
C. BETWEEN
D. All of the above
Answer- All of the above
832. A data dictionary is a special file that contains:
A. The name of all fields in all files.
B. The width of all fields in all files.
C. The data type of all fields in all files.
D. All of the above.
Answer- All of the above.
833. A file manipulation command that extracts some of the records from a file is
called
A. SELECT
B. PROJECT
132 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
C. JOIN
D. PRODUCT
Answer- SELECT
834. The physical location of a record is determined by a mathematical formula that
transforms a file key into a record location is :
A. B-Tree File
B. Hashed File
C. Indexed File
D. Sequential file.
Answer- Hashed File
835. Which of the following is record based logical model?
A. Network Model
B. Object oriented model
C. E-R Model
D. None of these
Answer- Network Model
836. A primary key is combined with a foreign key creates
A. Parent-Child relationship between the tables that connect them.
B. Many to many relationship between the tables that connect them.
C. Network model between the tables that connect them.
D. None of the above.
Answer- A. Parent-Child relationship between the tables that connect them.
837. The natural join is equal to
A. Cartesian Product
B. Combination of Union and Cartesian product
C. Combination of selection and Cartesian product
D. Combination of projection and Cartesian product
Answer- Combination of projection and Cartesian product
838. In E-R Diagram relationship type is represented by
A. Ellipse
B. Dashed ellipse
C. Rectangle
D. Diamond
Answer- Diamond
839. The ______ operator is used to compare a value to a list of literals values that
have been specified.
A. BETWEEN
B. ANY
C. IN
D. ALL
Answer-BETWEEN
133 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
840. _____________ function divides one numeric expression by another and
returns the remainder.
A. POWER
B. MOD
C. ROUND
D. REMAINDER
Answer- MOD
841. In E-R diagram generalization is represented by
A. Ellipse
B. Dashed ellipse
C. Rectangle
D. Triangle
Answer- Triangle
842. _________ is a virtual table that draws its data from the result of an SQL
SELECT statement.
A. View
B. Synonym
C. Sequence
D. Transaction
Answer- View
843. A table joined with itself is called
A. Join
B. Self Join
C. Outer Join
D. Equi Join
Answer- Self Join
844. A DBMS query language is designed to
A. support end users who use English-like commands.
B. support in the development of complex applications software.
C. specify the structure of a database.
D. All of the above
Answer- All of the above
845. Transaction processing is associated with everything below except
A. producing detail, summary, or exception reports.
B. recording a business activity.
C. confirming an action or triggering a response.
D. maintaining data
Answer- confirming an action or triggering a response.
846. It is possible to define a schema completely using
A. VDL and DDL.
B. DDL and DML.
C. SDL and DDL.
134 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
D. VDL and DML
Answer- DDL and DML.
847. It is better to use files than a DBMS when there are
A. Stringent real-time requirements.
B. Multiple users wish to access the data.
C. Complex relationships among data.
D. All of the above.
Answer- Multiple users wish to access the data.
848. Which of the operations constitute a basic set of operations for manipulating
relational data?
A. Predicate calculus
B. Relational calculus
C. Relational algebra
D. None of the above
Answer- Relational algebra
849. A key more than one attribute is called
A. composite key
B. primary key
C. candidate key
D. None of the above
Answer- composite key
850. An attribute or set of attributes that uniquely identifies an entity is called
A. Super key
B. primary key
C. candidate key
D. None of the above
Answer- Super key
135 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
AffairsCloud Q&A PDF
AffairsCloud Important Page Links
Current Affairs Sections







Current Affairs
Current Affairs 2016
Current Affairs Today
Current Affairs PDF
Current Affairs Quiz
Current Affairs Mock Test
Study Materials PDF
Subject-Wise Question Sections





Reasoning Questions
Quantitative Aptitude Questions
English Questions
Computer Questions
Banking Awareness Questions
Study Guide Sections





General Aptitude
Reasoning
Letter Writing
Math Tricks
Computer Awareness
GOOD LUCK WITH YOUR EXAMS!!!
Suggestions are welcomed; Contact us any time at
Affairscloud@gmail.com & AffairsCloud1@gmail.com
136 | P a g e
Follow Us - FB.com/AffairsCloudOfficialPage
Copyright 2016 @ AffairsCloud.Com
Download