RPSC Programmer Exam 2011 Paper I Question Paper
RPSC Programmer Exam 2011 Paper I Question Paper
Programmer - I
Question id : 85183 (Correct + 1.0 , Wrong - 0.33)
Consider a database table T containing two columns X and Y each of type integer. After the creation of the table, one record (X= 1, Y=l)
is inserted in the table.
Let MX and MY denote the respective maximum values of X and Y among all records in the table at any point in time. Using MX and MY, n
ew records are inserted in the table 128 times with X and Y values being MX+1, 2*MY
+1 respectively. It may be noted that each time after the insertion, values of MX and MY change.
What will be the output of the following SQL query after the steps mentioned above are carried out?
SELECT Y FROM T WHERE X=7;
1. 127
2. 255
3. 129
4. 257
Question id : 85184 (Correct + 1.0 , Wrong - 0.33)
SELECT count(*) FROM( (SELECT Borrower. Bank_Manager FROM Loan_Records) AS S NATURAL JOIN (SELECT Bank_
Manager, Loan_Amount FROM Loan_Records) AS T );
1. 3
2. 9
3. 5
4. 6
Question id : 85185 (Correct + 1.0 , Wrong - 0.33)
Consider a relational table with a single record for each registered student with the following attributes.
1. Registration_Number: Unique registration number for each registered student
2. UID: Unique Identity number, unique at the national level for each citizen
3. BankAccount_
Number: Unique account number at the bank. A student can have multiple accounts or joint accounts. This attributes stores the primary accoun
t number
4. Name: Name of the Student
5. Hostel_Room: Room number of the hostel
3. UID is a candidate key if all students are from the same country
4. If S is a superkey such that S UID is NULL then S UID ∩ ∪ is also a superkey
Question id : 85186 (Correct + 1.0 , Wrong - 0.33)
1. Lost update
2. Uncommitted Dependency
3. Incosistent Data
4. Deadlock
Question id : 85187 (Correct + 1.0 , Wrong - 0.33)
1. i, ii
2. i, ii, iii
3. i, ii, iii, iv
4. i, ii, iv
Question id : 85188 (Correct + 1.0 , Wrong - 0.33)
1. Atomicity
2. Acidity
3. Alphabetically
4. None of the above
Question id : 85189 (Correct + 1.0 , Wrong - 0.33)
Relational calculus is a
1. Procedural language.
2. Non- Procedural language.
3. Data definition language.
4. High level language.
Question id : 85190 (Correct + 1.0 , Wrong - 0.33)
1. a Unary operator.
2. a Binary operator.
3. a Ternary operator.
4. not defined.
Question id : 85191 (Correct + 1.0 , Wrong - 0.33)
1. two levels.
2. four levels.
3. three levels.
4. one level.
An entity set that does not have sufficient attributes to form a primary key is a
The way a particular application views the data from the database that the application uses is a
1. module.
2. relational model.
3. schema.
4. sub schema.
Question id : 85195 (Correct + 1.0 , Wrong - 0.33)
Assume transaction A holds a shared lock R, If transaction B also requests for a shared lock on R.
The method in which records are physically stored in a specified order according to a key
field in each record is
1. hash.
2. direct.
3. sequential.
4. all of the above.
Question id : 85198 (Correct + 1.0 , Wrong - 0.33)
1. i and iii
2. i and ii
3. ii and iii
4. ii and iv
Question id : 85199 (Correct + 1.0 , Wrong - 0.33)
1. Selection Operation
2. Rename Operation
3. Join Operation
4. Projection Operation
Question id : 85200 (Correct + 1.0 , Wrong - 0.33)
A relation is said to be in 2 NF if
(i) it is in 1 NF
(ii) non-key attributes dependent on key attribute
(iii) non-key attributes a re independent of one another
(iv) if it has a composite key, no no n-key attribute should be dependent on part of the composite key
1. i, ii, iii
2. i and ii
3. i, ii, iv
4. i, iv
Question id : 85201 (Correct + 1.0 , Wrong - 0.33)
A relation is said to be in 3 NF if
(i) it is in 2 NF
(ii) non-key attributes are independent of one another
(iii) key attribute is not dependent on part of a composite key
(iv) has no multi-valued dependency
1. i and iii
2. i and iv
3. i and ii
4. ii and iv
Question id : 85202 (Correct + 1.0 , Wrong - 0.33)
1. student (roll no , name, year of study, address) course (course no , course max. marks)
2. student ( roll no, name, year of study, address) student (roll no , course no )
course (course no , course max. marks)
4. student (roll no , name, address) course (course no , course max. marks, year of study)
Question id : 85203 (Correct + 1.0 , Wrong - 0.33)
1. i and ii
2. ii and iii
3. i and iv
4. i and iii
Question id : 85205 (Correct + 1.0 , Wrong - 0.33)
A subschema expresses
1. Network Model
2. Hierarchical Model
3. Relational Model
4. None of these
Transaction timestamp is
Which of the following operation is used if we are interested in only certain columns of a
table?
1. PROJECTION
2. SELECTION
3. UNION
4. JOIN
Question id : 85215 (Correct + 1.0 , Wrong - 0.33)
1. unlock_item(X)
2. lock_item(X)
3. dlock(X)
4. all of the above
Question id : 85216 (Correct + 1.0 , Wrong - 0.33)
1. External
2. Internal
3. Physical
4. Conceptual
Question id : 85217 (Correct + 1.0 , Wrong - 0.33)
Which of the operations constitute a basic set of operations for manipulating relational data?
1. Predicate calculus
2. Relational calculus
3. Relational algebra
4. None of the above
Question id : 85218 (Correct + 1.0 , Wrong - 0.33)
1. B-Tree File
2. Hashed File
3. Indexed File
4. Sequential file.
Question id : 85220 (Correct + 1.0 , Wrong - 0.33)
If the complete execution of transactions takes the database from one consistent state to the other, then that property of the transaction is called
1. Isolation
2. Durability
3. Consistency preservation
4. None of the above
Question id : 85221 (Correct + 1.0 , Wrong - 0.33)
Consider the join of a relation R with relation S. If R has m tuples and S has n tuples,
then the maximum size of join is:
1. mn
2. m+n
3. (m+n)/2
4. 2(m+n)
Question id : 85222 (Correct + 1.0 , Wrong - 0.33)
1. Cartesian Product
2. Combination of Union and Cartesian product
3. Combination of selection and Cartesian product
4. Combination of projection and Cartesian product
Question id : 85223 (Correct + 1.0 , Wrong - 0.33)
_________ is a virtual table that draws its data from the result of an SQL SELECT statement.
1. View
2. Synonym
3. Sequence
4. Transaction
Question id : 85225 (Correct + 1.0 , Wrong - 0.33)
1. Attribute.
2. Degree.
3. Tuple.
4. Domain.
Question id : 85226 (Correct + 1.0 , Wrong - 0.33)
1. Counter
2. Current date/time
3. both
4. None of the above
Question id : 85227 (Correct + 1.0 , Wrong - 0.33)
A layer-4 firewall (a device that can look at all protocol headers up to the transport layer) CANNOT
1. To indicate the correct router interface that should be used to forward a segment
2. To identify which switch ports should receive or forward the segment
3. To determine which Layer 3 protocol should be used to encapsulate the data
4. To enable a receiving host to forward the data to the appropriate application
Question id : 85230 (Correct + 1.0 , Wrong - 0.33)
Which is the protocol among the following that is used for translating from physical address to Internet address?
1. ICMP
2. ARP
3. IGRP
4. RARP
Question id : 85232 (Correct + 1.0 , Wrong - 0.33)
1. Internet Chat
2. Web browsing
3. E-mail
4. Ping
Question id : 85234 (Correct + 1.0 , Wrong - 0.33)
Suppose computers A and B have IP addresses 10.105.1.113 and 10.105.1.91 respectively and they both use the same net mask N. Which of th
e values of N given below should not be used if A and B should belong to the same network?
1. 255.255.255.0
2. 255.255.255.128
3. 255.255.255.192
4. 255.255.255.224
Question id : 85235 (Correct + 1.0 , Wrong - 0.33)
While opening a TCP connection, the initial sequence number is to be derived using a time-of-day (ToD)
clock that keeps running even when the host is down. The low order 32 bits of the counter of the ToD clock is to be used for the initial seque
nce numbers. The clock counters increments once per millisecond. The maximum packet lifetime is given to be 64s. Which one of the choices
given below is closest to the minimum permissible rate at which sequence numbers used for packets of a connection can increase?
1. 0.015/s
2. 0.064/s
3. 0.135/s
4. 0.327/s
Question id : 85236 (Correct + 1.0 , Wrong - 0.33)
Let G(x) be the generator polynomial used for CRC checking. What is the condition that should be satisfied by G(x)
to detect odd number of bits in error?
A computer on a 10Mbps network is regulated by a token bucket. The token bucket is filled at a rate of 2Mbps. It is initially filled to capacity
with 16Megabits. What is the maximum duration for which the computer can transmit at the full 10Mbps?
1. 1.6 seconds
2. 2 seconds
3. 5 seconds
4. 8 seconds
Question id : 85238 (Correct + 1.0 , Wrong - 0.33)
There are n stations in a slotted LAN. Each station attempts to transmit with a probability p in each time slot. What is the probability that ONL
Y one station transmits in a given time slot?
1. np(1-p)n-1
2. (1-p)n-1
3. p(1-p)n-1
4. 1-(1-p)n-1
Question id : 85240 (Correct + 1.0 , Wrong - 0.33)
. In a token ring network the transmission speed is 107 bps and the propagation speed is 200 meters/ms. The 1-
bit delay in this network is equivalent to:
Station A uses 32 byte packets to transmit messages to Station B using a sliding window protocol. The round trip delay between A and B is 80
milliseconds and the bottleneck bandwidth on the path between A and B is 128 kbps. What is the optimal window size that A should use?
1. 20
2. 40
3. 160
4. 320
Question id : 85243 (Correct + 1.0 , Wrong - 0.33)
Two computers C1 and C2 are configured as follows. C1 has IP address 203.197.2.53 and netmask 255.255.128.0. C2 has IP address 203.197.
75.201 and netmask 255.255.192.0. which one of the following statements is true?
Station A needs to send a message consisting of 9 packets to Station B using a sliding window (window size 3) and go-back-
n error control strategy. All packets are ready and immediately available for transmission. If every 5th packet that A transmits gets lost
(but no acks from B ever get lost), then what is the number of packets that A will transmit for sending the message to B?
1. 12
2. 14
3. 16
4. 18
Question id : 85245 (Correct + 1.0 , Wrong - 0.33)
1. 53-Byte cells are the ideal size for the voice communication
2. 53-Byte cells are the ideal size for data communication
3. 53-Byte cells are the ideal size for circuit switching
4. 53-Byte cells are the compromised size for both voice and data communication
Question id : 85246 (Correct + 1.0 , Wrong - 0.33)
1. Frame Relaying have error control (ARQ) functionality but not ATM.
2. ATM does not need to have CRC checking/generation or bit stuffing’s functionality in the packets as in Frame Relay.
3. Frame Relaying needs to do multiplexing of logical channels but not ATM.
4. Although both Frame relay and ATM have frame boundary recognition (flags), ATM doesn’t have bit stuffing as in frame Relaying.
Question id : 85247 (Correct + 1.0 , Wrong - 0.33)
Which of the following is not true about the difference of B-ISDN as compared to ISDN?
1. B-ISDN provides for communication services with very high bit rate requirements such as digital television
2. B-ISDN uses optical fiber cable whereas ISDN makes us of the existing infrastructure.
3. B-ISDN uses only packet switching whereas ISDN does not perform packet switching.
4. The bit rate for ISDN is prespecified unlike B-ISDN
Question id : 85249 (Correct + 1.0 , Wrong - 0.33)
ATM is said to be a connection oriented technology. What does this mean and why is it necessary?
1. Cells travels through the same path to the receiver. By this, cell do not have to be rearranged.
2. Cells travels through different paths. Therefore cells can reach the receiver faster.
3. A path is reserved exclusively for one user. Arrangement of cells is not necessary
4. Cells are transmitted using fiber optic cables. Cells would be less susceptible to errors.
Question id : 85252 (Correct + 1.0 , Wrong - 0.33)
Which of the following is done in the physical layer of the ATM network?
How much power (roughly) a light emitting diode can couple into an optical fiber?
1. 100 microwatts
2. 440 microwatts
3. 100 picowatts
4. 10 miliwatts
Question id : 85254 (Correct + 1.0 , Wrong - 0.33)
Which of the following assertions is FALSE about the Internet Protocol (IP)?
A 2 km long broadcast LAN has 107 bps bandwidth and uses CSMA/CD. The signal travels along the wire at 2 x 108 m/
s. What is the minimum packet size that can be used on this network?
1. 50 bytes
2. 100 bytes
3. 200 bytes
4. None of the above
Question id : 85256 (Correct + 1.0 , Wrong - 0.33)
Host A is sending data to host B over a full duplex link. A and B are using the sliding window protocol for flow control. The send and receive
window sizes are 5 packets each. Data packets (sent only from A to B)
are all 1000 bytes long and the transmission time for such a packet is 50 micro s. Acknowledgment packets (sent only from B to A)
are very small and require negligible transmission time. The propagation delay over the link is 200 micro s.. What is the maximum achievable
throughput in this communication?
Which of the following functionalities must be implemented by a transport protocol over and above the network protocol?
Which of the following is NOT true with respect to a transparent bridge and a router?
How many 8-
bit characters can be transmitted per second over a 9600 baud serial communication link using asynchronous mode of transmission with one sta
rt bit, eight data bits, and one parity bit?
1. 600
2. 800
3. 876
4. 1200
Question id : 85260 (Correct + 1.0 , Wrong - 0.33)
A and B are the only two stations on an Ethernet. Each has a steady queue of frames to send. Both A and B attempt to transmit a frame, collide
, and A wins the first backoff race. At the end of this successful transmission by A, both A and B attempt to transmit and collide. The probabili
ty that A wins the second
1. 0.5
2. 0.625
3. 0.75
4. 1
Question id : 85261 (Correct + 1.0 , Wrong - 0.33)
Assuming that the packets are correctly delivered, how many bytes, including headers, are delivered to the IP layer at the destination for one a
pplication message, in the best case? Consider only data packets.
1. 200
2. 220
3. 240
4. 260
Question id : 85262 (Correct + 1.0 , Wrong - 0.33)
1. 2n
2. 2n-1
3. 2n - 1
4. 2n-2
Question id : 85265 (Correct + 1.0 , Wrong - 0.33)
In a network of LANs connected by bridges, packets are sent from one LAN to another through intermediate bridges. Since more than one pat
h may exist between two LANs, packets may have to be routed through multiple bridges. Why is the spanning tree algorithm used for bridge-
routing?
1. 31.27 ms.
2. 3.198 ms
3. 31.98 ms
4. 312.7 ms
Question id : 85267 (Correct + 1.0 , Wrong - 0.33)
A data link between the head office of a financial organization and one of its branches runs continuously at 2.048 Mbps. Between the hours of
0900 and 1700 it is noted that there are 295 bits received in error. Determine the bit error rate.
1. 2 x 10-7
2. 2 x 10-10
3. 5 x 10-9
4. 5 x 10-8
Question id : 85268 (Correct + 1.0 , Wrong - 0.33)
A block of data consisting of 2048 bits is transmitted between two computers interconnected by 450 m of twisted-
pair wire. If the transmission rate is 34 kbps determine a, the ratio of propagation delay to transmission delay.
1. 3.76 x 10-6
2. 376 x 10-6
3. 3.76 x 10-3
4. 37.6 x 10-6
Question id : 85269 (Correct + 1.0 , Wrong - 0.33)
The event that will not cause recalculation of the distance vector is
The protocol data unit (PDU) for the application layer in the Inter stack is
1. Segment
2. Datagram
3. Message
4. Frame
Question id : 85271 (Correct + 1.0 , Wrong - 0.33)
While transmitting odd-parity coded symbols, the number of zeros in each symbol is
1. Odd
2. Even
3. A and B both
4. Unknown
Question id : 85272 (Correct + 1.0 , Wrong - 0.33)
Which organization has authority over interstate and international commerce in the communication field?
1. ITU-T
2. IEEE
3. FCC
4. ISOC
Question id : 85273 (Correct + 1.0 , Wrong - 0.33)
What is common between X.25 Packet switching and Fast Packet Switching
1. Both ATM and Packet switching have relatively small size cells
2. Packet Switching has no windowing while ATM has
3. Both have fixed length cells
4. ATM has no error detection on data while Packet Switching has
Question id : 85275 (Correct + 1.0 , Wrong - 0.33)
1. North Sudan
2. South Sudan
3. Sudan
4. Lebnan
Question id : 85277 (Correct + 1.0 , Wrong - 0.33)
1. Sweden
2. Germany
3. Finland
4. Cheli
Question id : 85278 (Correct + 1.0 , Wrong - 0.33)
Who was the Chief Guest of the India's 63rd Republic Day's celebrations.
NRI Kamla Persad Bissessar, Prime Minister of Trinidad and Tobago has her ancestral roots in villages in;
1. Nalanda, Bihar
2. Pushkar, Rajasthan
3. Buxar, Bihar
4. Hissar, Haryana
Question id : 85280 (Correct + 1.0 , Wrong - 0.33)
1. 51
2. 34
3. 17
4. 68
Question id : 85281 (Correct + 1.0 , Wrong - 0.33)
A Cow has 4 legs & a Hen has 2 legs. If there are a total of 60 legs for a group of Cows & Hens than the confirmed number of Cows & Hens i
n the group are :
1. 10 Cows, 10 Hens.
2. 10 Cows, 15 Hens.
3. 15 Cows, 5 Hens.
4. Data is insufficient to confirm number of Cows & Hens in the group.