ARU Online Model
ARU Online Model
Select one:
a. The process of identifying the requirements and constraints of a software project.
b. The process of designing the user interface of a software application.
c. The process of writing code for a software application.
d. The process of creating a detailed plan for implementing a software project.
Your answer is correct.
The correct answer is: The process of creating a detailed plan for implementing a software
project.
Question 2
Feedback
Question 3
Select one:
a. The process of testing the entire software system to ensure that it meets its specified
requirements.
b. The process of testing individual units or components of a software system to ensure
that they function correctly.
c. The process of identifying the requirements and constraints of a software project.
d. The process of designing the user interface of a software application.
Feedback
Question 4
Which of the following is NOT a valid HTTP method?
Select one:
a. GET
b. POST
c. DELETE
d. SEND
Feedback
Question 5
Select one:
a. To define the structure and content of a web page
b. To add interactivity to a web page
c. To style web pages
d. To create databases for web applications
Feedback
Question 6
Select one:
a. Flask
b. Bootstrap
c. Ruby on Rails
d. Express.js
Feedback
Question 7
What is the purpose of a web cache?
Select one:
a. To store and organize data for a website
b. To display web pages for users
c. To manage network traffic between clients and servers
d. To improve the performance of web applications
Feedback
Question 8
Select one:
a. Relational model
b. Entity relationship model
c. Aggregation model
d. Object oriented data model
Feedback
Question 9
Which one of the following Provide concepts of a data model that describe details of how
data is stored in the computer.
Select one:
a. Conceptual Level
b. Physical Level
c. Implementation Level
d. Semantic Level
Feedback
Select one:
a. Logical data is independent from how data is actually stored on the disk
b. The changes made to the data on the disk storage should not be reflected in the logical
level
c. Changes done to logical level should not change how the data is stored on the disk.
d. The user’s view of the data should not be altered if the data is changed in the logical
level.
Feedback
Question 11
Select one:
a. Transient object
b. Persistent object
c. Structured object
d. Distractor object
Feedback
Question 12
Select one:
a. The same DBMS is used at each location and data are not distributed across all nodes.
b. The same DBMS is used at each location and data are distributed across all nodes. C.
c. Different DBMS is used at each location and data are not distributed across all nodes.
d. A different DBMS is used at each location and data are distributed across all nodes.
Feedback
Your answer is correct.
The correct answer is: A different DBMS is used at each location and data are distributed
across all nodes.
Question 13
Which one of the following concurrency control technique is prefer for conflict rare
situation?
Select one:
a. Multiple Granularity Locking
b. Locking
c. Timestamp
d. Optimistic
Feedback
Question 14
Question text
Select one:
a. call by value
b. call by reference
c. call by pointer
d. call by array
Feedback
Question 15
Question text
Feedback
Question 16
The ______ statement used to stop a loop's current iteration and begin the next one.
Select one:
a. break
b. goto
c. re-iterate
d. continue
Feedback
Question 17
Box b2 = b1;
Select one:
a. b2 is being assigned a reference to a copy of the object referred by b1.
b. b1 and b2 refer to separate and distinct objects.
c. b1 and b2 will both refer to the same object.
d. Any changes made to the object through b2 will not affect the object to which b1 is
referring.
Feedback
The correct answer is: b1 and b2 will both refer to the same object.
Question 18
class Father {
System.out.println("Son's Car");
john.car();
}
Select one:
a. Father's Car
b. Son's Car
c. There is an ambiguity, so no one Car
d. Compiler Error
Feedback
Question 19
Feedback
Question 20
Feedback
Question 21
Consider the following graph. Using Kruskal’s algorithm, which edge will be selected first?
Select one:
a. GF
b. DE
c. BE
d. BG
Feedback
Question 22
Feedback
Question 23
When the user tries to delete the element from the empty stack then the condition is said to be
a ________.
Select one:
a. Underflow
b. Garbage collection
c. Overflow
d. Full
Feedback
Question 24
#define SIZE 8
struct STACK
{ int arr[SIZE];
int top=-1; }
What would be the maximum value of the top that does not cause the overflow of the stack?
Select one:
a. 8
b. 7
c. 9
d. -1
Feedback
Question 25
Which of the following is the time complexity to search an element in the linked list?
Select one:
a. O(n)
b. O(1)
c. O(logn)
d. O(nlogn)
Feedback
Question 26
If the array is already sorted, then the running time for merge sort is____.
Select one:
a. O(1)
b. O(n*log n)
c. O(n)
d. O(n^2)
Feedback
Question 27
Feedback
Question 28
From the following protocols which one is odd?
Select one:
a. ARP
b. RARP
c. IP
d. TCP
Feedback
Question 29
Feedback
Question 30
______________is to mean be diplomatic and understand the politically correct way to say
things.
Select one:
a. Be Proactive
b. Be do-able
c. Avoid absolutes
d. Be phased in
Feedback
Question 31
Someone might change the values in a database or alter a program happen when
Select one:
a. Confidentiality is compromised
b. Integrity is compromised
c. Availability is compromised
d. System is intercepted
Feedback
Question 32
Which SNMP version sends the data in the clear format without using encryption technique?
Select one:
a. SNMPv2
b. SNMPv1
c. SNMPv3
d. SNMPv4
Feedback
Question 33
Type of user account can only use the software that’s already installed by the administrator
and change system settings that don’t affect other users is
Select one:
a. Administrator
b. Standard
c. Guest
d. Special
Feedback
Question 34
Which of the following is cryptographic network tool for secure data communication between
two networked computers that connects, via a secure channel over an insecure network?
Select one:
a. Telnet
b. Secure Shell (SSH)
c. OpenSSH (OpenBSD Secure Shell)
d. rlogin
Feedback
Question 35
Feedback
Question 36
Feedback
Question 37
Question text
Machines that try to imitate human intuition while handling vague information lie in the field
of AI called?
Select one:
a. Fuzzy logic
b. Functional logic
c. Boolean logic
d. Human logic
Feedback
Question 38
Using Greedy best-first search, find the best path and cost of the following problem.
Select one:
a. Path: S,C,G Cost: 13
b. Path: S,B,G Cost: 9
c. Path: S,A,G Cost: 10
d. Path: S,A,D Cost: 4
Feedback
Question 39
The ______can be written by the host to start a command or to change the mode of a device
in I/O port.
Select one:
a. Status register
b. Data-in register
c. Control register
d. Data-out register
Feedback
Question 40
Which one of the following algorithm is used to allocate the largest hole
Select one:
a. Next fit
b. First Fit
c. Worst fit
d. Best fit
Feedback
Question 41
____________a situation that occurs when two or more processes are reading/writing into
some shared data and the final outcome depends on the order the processes execute
Select one:
a. Race condition
b. Mutual exclusion
c. Deadloak
d. Sleep and wait
Feedback
Question 42
Feedback
Feedback
Question 44
What is the maximum number of unique values that can be stored in an n-bit register?
Select one:
a. n^2
b. 2^n
c. n/2
d. 2n
Feedback
Question 45
Feedback
Question 46
Feedback
The correct answer is: It accepts all inputs and may run indefinitely on non-members
Question 47
Feedback
The correct answer is: It measures the computational resources required to solve a problem.
Question 48
Feedback
Question 49
Which phase of the compiler verifies if the program adheres to the language's grammar rules?
Select one:
a. Lexical analysis
b. Semantic analysis
c. Syntactic analysis
d. Code optimization
Feedback
Question 50
Feedback
The correct answer is: Translates high-level language constructs into tokens