a) A programming language b) A collection of algorithms c) A way to store and organize data d) A type of computer hardware. 2 What are the disadvantages of arrays? a b c d d a) Index value of an array can be negative b) Elements are sequentially accessed c) Data structure like queue or stack cannot be implemented d) There are chances of wastage of memory space if elements inserted in an array are lesser than the allocated size. 3 Which data structure is used for implementing a b c d a recursion? a) Stack b) Queue c) List d) Array. 4 The data structure required to check whether an a b c d b expression contains a balanced parenthesis is? a) Queue b) Stack c) Tree d) Array. 5 Which of the following is not the application of a b c d a stack? a) Data Transfer between two asynchronous process b) Compiler Syntax Analyzer c) Tracking of local variables at run time d) A parentheses balancing program. 6 Which data structure is needed to convert infix a b c d c notation to postfix notation? a) Tree b) Branch c) Stack d) Queue. 7 What is the value of the postfix expression 6 3 2 4 a b c d b + – *? a) 74 b) -18 c) 22 d) 40. 8 The basic data structures that are directly a b c d b operated upon the machine instructions are A. Non primitive data structure B. Primitive data structure C. Both D. none 9 Data structures emphasize on structuring of a a b c d a group of homogeneous or heterogeneous data items is known as. A. Non primitive data structure B . Primitive data structure C. Both D. none. 10 Integer , float , character , pointer are examples a b c d b of A. Non primitive data structure B. Primitive data structure C. Both
New Section 270 Page 1
C. Both D. none. 11 Arrays , Lists , Files are examples of a b c d a A. Non primitive data structure B. Primitive data structure C. Both D. none. 12 The variables which can be accessed by all a b c d d modules in a programme are called (A) Local variables (B) Internal Variables (C) External Variables (D) Global variables. 13 Which of the following sorting procedure is the a b c d d slowest (A) Quick sort (B) Heap sort (C) Shell sort (D) Bubble sort . 14 A full binary tree with n leaves contains a b c d c (A) n nodes (B) log2n nodes (C) 2n -1 (D) 2n+1 nodes. 15 The minimum number of fields with each node a b c d c of doubly linked list is (A) 1 (B)2 (C) 3 (D) 4. 16 Stack is useful for implementing a b c d c (A) Radix (B) BFS (C) Recursion (D) None. 17 The max degree of any vertex in a simple graph a b c d b with n vertices (A) n (B) n-1 (C) n + 1 (D) 2n-1. 18 Procedural programming language is a b c d a (A) COBOL (B) BASIC (C) C++ (D) PASCAL. 19 PASCAL is a b c d a (A) Structural programming language (B) Procedural programming (C) Monolithic programming (D) Object oriented. 20 The data continues to exists even when the persistent transient write read persistent system is not active is data data data data data 21 The data is created while an application is persistent transient write read transient running and not needed when the data data data data data application has terminated is 22 collection of related data is known as data storage data base data none data base dump 23 The information contained in data base is data structure data and none data and represented as structure structure 24 Which is large and is being frequently modified data structure data and none data is structure 25 Which is small and stable in time data structure data and none structure structure 26 Which keyword is used to declare virtual functions? a b c d c a) virt b) virtually c) virtual d) anonymous 27 Data structures emphasize on structuring of a a b c d a group of homogeneous or heterogeneous data items is known as. A. Non primitive data structure B. Primitive data structure C. Both D. none. 28 Integer , float , character , pointer are examples a b c d b
New Section 270 Page 2
28 Integer , float , character , pointer are examples a b c d b of A. Non primitive data structure B. Primitive data structure C. Both D. none. 29 Arrays , Lists , Files are examples of a b c d a A. Non primitive data structure B. Primitive data structure C. Both D. none. 30 Which of the following are examples of a b c d c branched structures . A. Trees B. Graphs C. Trees and Graphs D. None. 31 ______are used to represent hierarchical a b c d a relation ship between data elements . A. Trees B. Graphs C. Trees and Graphs D. None. 32 ________are used to Represent non hierarchical a b c d b relations among data elements . A. Trees B. Graphs C. Trees and Graphs D. None. 33 Which is not a linear data structure . a b c d d A. Array B. Stack C. Queue D. Tree. 34 The memory locations in array are . a b c d b A. Random B. Contiguous C. Sequential D. any order. 35 The size of the array has to be declared a b c d a A. Before compilation B. End of compilation C. At any time D. none . 36 The array definition int marks [ 10 ] [ 15 ] a b c d d defines an array of A. 5 tables and 10 rows B. 10 columns and 5 rows C. 10 rows and 15 tables D. 10 rows and 15 columns. 37 In C square brackets [ ] are used for a b c d b A. functions B. arrays C. statements D. all . 38 ADT ( Abstract Data Types) comprises a b c d c A. Data structures B. Fundamental operations related to data structures C. Both D. None. 39 No of elements in A [ 1: 26 ] are . a b c d a A. 26 B. 25 C. 27 D. None. 40 The number of elements in A [ 1: 10 , 1: 5 ] are a b c d a A. 50. B. 52 C. 51 D. none. 41 Array stores the data in . a b c d c A. Row major order B. Column major order C. Both D. None. 42 Faster access to non local variables is achieved a b c d c using an array of pointers to activation record called A. Heap B. Activation tree C. Display D. Stack .
New Section 270 Page 3
A. Heap B. Activation tree C. Display D. Stack . 43 If Int s [ s ] is one dimensional array of integers , a b c d a which of the following refers to the third element in the array . A. *( s+ 2 ) B. s+ 3 C. * ( s+ 3 ) + 5 D. * ( s + 3 ) + 2. 44 Primary ADT’s are . a b c d d A. Linked lists B. Stacks C. Queues D. all of the above. 45 Among the following which is not a primitive data a b c d d type . A. Int B. Float C. Char D. Structure. 46 ADT contains . a b c d c A. A value definition B. an Operator definition C. both D. None. 47 Stack is an ADT operates on -------------principle . a b c d b A. FILO B. LIFO C. FIFO D. All . 48 Which is not a stack operation . a b c d d A. Push B. Pop C. Stack top D. None. 49 The best data structure to check whether an a b c d b arithmetic expression has balanced parenthesis is. A. Queue B. Stack C. Tree D. List . 50 Stack can be useful for implementing . a b c d c A. Radix Sort B. BFS C. Recursion D. None. 51 Stack is not used in a b c d d A. Compilers B. System Programming C. Operating system D. Process scheduling . 52 The following operations are shown a b c d b 1. ^ ( exponential ) , 2. * , / ( Multiplication or division ). 3. + ,- ( addition or subtraction ). Then the Operator precedence is A. 1,3,2 B. 1,2,3 C. 3,2,1 D. none. 53 For the Infix operation (A+B ) * ( C- D ) post fix a b c d a operation is A. AB+ CD-* B. * + AB – CD C. Both D. None. 54 Prefix operation of a b c d a A - B/C * D $ E is . A. - / * $ ACBDE B. – ABCD * $ DE C. – A/BC * C $ DE D. None. 55 Reverse Polish Notation is often called as a b c d a A. Post Fix B. Prefix C. Infix D. None. 56 Which of the following statements are wrong a b c d d related to queue. A. All insertions to the queue are made at Rear or Tail . B. All deletions from the queue are made at Front or Head. C. An insertion operation is known as Enqueuing a queue and deletion operation is referred as Dequeuing a queue. D. Queue operates in LIFO principle. 57 The queues are implemented in a b c d c A. Static implementation ( using arrays ).
New Section 270 Page 4
A. Static implementation ( using arrays ). B. Dynamic Implementation ( Using pointers ). C. Both A&B D. None of the above. 58 In -------------implementation of queue we have to a b c d c declare the size of the array at design time or before the processing starts. A. Static B. Dynamic C. Both D. None. 59 Which of the following data structure may give a b c d a overflow error , even though the current number of element in it is less than the size A. Queue B. Circular space C. Stack D. None. 60 A linear list in which elements can be added or a b c d b deleted at either end but not in the middle is . A. Queue B. Dequeue C. Stack D. Tree. 61 In Dequeue the following are the list of four a b c d d operations. 1. Insertion of an element at the REAR end of the queue. 2. Deletion of an element from the FRONT end of the queue. 3. Insertion of an element at the FRONT end of the queue. 4. Deletion of an element at the REAR end of the queue. For Input restricted and out put restricted modes the operations can be performed are . A. 1,2,3 and 1,2,3,4 B. 1,2,3,4 and 2,3,4 C. 1,2,3,4 and 1,3,4 D. 1,2,3,4 and 1,2,3, 62 Insert operation on queue has to be done a b c d a after -----testing . A. Over flow B. Memory space C. Under flow D. None . 63 In empty queue rear and front can be initialized a b c d a as . A. R = F = -1 B. R = F = 1 C. R = 0 , F =1 D. R = -1 , F = 0 . 64 What is the prototype property of Priority a b c d a queue. A. Time sharing B. Batch processing C. Multitasking D. None . 65 The number of characters in the string correct a b c d b and Correct string are . A. 7 , 13 B. 7 , 14 C. 1, 3 D. 1,2 . 66 A linear Queue suffers from the draw back of a b c d a A. QUEUE_FULL B. QUEUE-NULL C. QUEUE_VOID D. NONE 67 Which of the following statements are true a b c d d related to linked lists. A. The two parts of a node are Info part and address pointer. B. Info part stores the information and address or pointer part which holds the address of the next element of same type. C. Advantages of Linked lists are dynamic data
New Section 270 Page 5
C. Advantages of Linked lists are dynamic data structure , efficient utilization of memory and insertion and deletion can be done easily. D. All of the above. 68 Which is not a form of linked list. a b c d d A. Single linked list B. Double linked list C. Circular Linked list D. Double ended linked list. 69 The max no of nodes on level L of a binary Tree a b c d a is A. 2 ^ L-1 B. 2 ^ L C. 2 – L D. none. 70 The max no of nodes in a binary tree of Height a b c d a H is A. 2^ H -1 B. 2^ H C. 2 H D. H 71 Which of the following statements are true a b c d d related to traversals in tree A. PREORDER TRAVERSAL ( ROOT , LEFT SUBTREE , RIGHT SUBTREE ) B. POST ORDER TRAVERSAL ( LEFT SUB TREE , RIGHT SUBTREE , ROOT ) C. INORDER TRAVERSAL ( LEFT SUBTREE , ROOT , RIGHT SUBTREE ) D. All of the above. 72 BFT uses ------------ for Traversing and DFT a b c d c uses ---------- for Traversing . A. Queues , Lists B. Stacks , queues C. Queues , stacks D. None. 73 The Depth of the Complete Binary Tree with n a b c d a nodes is A. Log2 (n + 1 ) B. Log 2 ( 2n ) C. Log2 ( n -1 ) D. none. 74 A circular list can be used to represent . a b c d d A. Stack B. Queue C. Tree D. Both A&B 75 A list with no nodes is called a b c d b A. Error list B. Empty list C. Unique list D. None 76 Merge Sort is a sorting technique based on true false true divide and conquer method 77 What is the full form of DBMS? a b c d b a) Data of Binary Management System b) Database Management System c) Database Management Service d) Data Backup Management System 78 What is a database? a b c d c a) Organized collection of information that cannot be accessed, updated, and managed b) Collection of data or information without organizing c) Organized collection of data or information that can be accessed, updated, and managed d) Organized collection of data that cannot be updated. 79 What is DBMS? a b c d d a) DBMS is a collection of queries b) DBMS is a high-level language
New Section 270 Page 6
b) DBMS is a high-level language c) DBMS is a programming language d) DBMS stores, modifies and retrieves data 80 Who created the first DBMS? a b c d b a) Edgar Frank Codd b) Charles Bachman c) Charles Babbage d) Sharon B. Codd 81 Which type of data can be stored in the database? a b c d d a) Image oriented data b) Text, files containing data c) Data in the form of audio or video d) All of the above. 82 In which of the following formats data is stored in a b c d c the database management system? a) Image b) Text c) Table d) Graph. 83 Which of the following is not an example of DBMS? a b c d d a) MySQL b) Microsoft Access c) IBM DB2 d) Google. 84 Which of the following is not a feature of DBMS? a b c d c a) Minimum Duplication and Redundancy of Data b) High Level of Security c) Single-user Access only d) Support ACID Property. 85 Students and courses enrolled is an example of a b c d d ( A) One to one relation ( B) many to one relation (C) one to many relation (D) Many to many relation . 86 Relations produced from an E-R model will a b c d a always be in (A) 1NF (B) 2NF (C) 3NF (D) 4BF. 87 E- R modelling technique is a ----------approach a b c d a (A) Top down (B) bottom up (C) left Right (D) None. 88 The employee Salary should not be greater than a b c d a Rs 2000 . This is (A) Integrity constraint (B) Referential constraint (C) Over defined constraint (D) None. 89 Which of the following is not a logical data a b c d d base (A) Tree (B) Relational (C) Network (D) Chain. 90 The conditions immediately outside the system a b c d c is called (A) Boundary (B) Interface (C) Environment (D) None . 91 A graphical representation of an information a b c d b system is called (A) Flow chart (B) Data Flow diagram (C) Pictogram (D) None. 92 A word processor designed for programmers is a b c d a called (A) an editor (B) A formatter (C) A debugger (D) None of these . 93 Which of the following statements are true . a b c d c
New Section 270 Page 7
93 Which of the following statements are true . a b c d c 1. Known facts that can be stored or recorded is called data. 2. Two types of data are persistent data and Transient date . a. 1 is true b. 2 is true c. 1 & 2 are true d. none. 94 Which provides efficient , reliable , convenient data storage data base data none data base and safe storage of and access to massive dump amounts of persistent data is called 95 The person who builds the DBMS data base data base data base data base data base implementer designer applicatio administr implementer n ator developer 96 Person responsible for preparing external data base data base data base data base data base schemas for applications , identifying and implementer designer applicatio administr designer integrating user needs into conceptual schema n ator developer 97 Person responsible for implementing data base data base data base data base data base data base application programs that facilitates data access implementer designer applicatio administr application for end users n ator developer developer 98 Person responsible for define the internal data base data base data base data base data base schema, sub schemas and mapping between implementer designer applicatio administr administrator schemas , monitoring data base usage and n ator supervising DBMS functionality developer 99 End users are casual users parametri both none both c users 100 Occasional unanticipated access to data base is casual users parametri both none casual users related with c users 101 Users who query and update the data base casual users parametri both none parametric through fixed programs c users users 102 ______ provides mechanism for defining data data model data data schema data model structures and operations for retrieval and design structures modification of data 103 The overall design of the data base or data model data data schema schema description of data in terms of a data model is design structures called 104 Data abstraction in DBMS contains 2 levels 3 levels 7 levels none 3 levels 105 Lowest level of data abstraction in DBMS physical level middle logical view physical level level level level 106 The data is actually stored in physical level middle logical view physical level level level level 107 The middle level of data abstraction in DBMS physical level middle logical view logical level level level level 108 Each record is described by a type definition physical level middle logical view logical level and the interrelation ships in level level level 109 Highest level of data abstraction is physical level middle logical view view level level level level 110 Several views of the data base are defined and physical level middle logical view view level data base uses these views at level level level 111 The level provides a security mechanism to physical level middle logical view view level prevent users from accessing certain parts of the level level level data base is 112 Logical design of the data base and a data base data model data data schema schema instance is a snap shot of the data in the data design structures base at a given instant of time is
New Section 270 Page 8
base at a given instant of time is 113 Relational Schema contains attributes and their true false true corresponding domains . 114 Types of schemas physical or logical or external all of the all of the internal conceptu or view above above schema al schema schema 115 Data independence is /are logical data physical both none both independence data independ ence 116 _____refers to the immunity of the external logical data physical both none logical data schema to changes in the conceptual schema indepenedence data indepnedence independ ence 117 ____________refers to the immunity to the logical data physical both none physical data conceptual schema to change the internal indepenedence data independence schema is independ ence 118 select the functions of DBMS a b c d d 1. Concurrency control 2. Back up and recovery 3. redundancy management 4. access control 5. Performance optimization 6. meta data management 7. Active features like rules and triggers . a. 1,2,3,4 b. 1,3,4,5,6 c. 2,3,4,7 d. 1,2,3,4,5,6,7 119 _____________is Responsible for ensuring concurrency back up redundan access concurrency correctness of competing accesses to same data control and cy control control recovery managem ent 120 ___________Facilitates for recovering from hard concurrency back up redundan access back up and ware and software failures control and cy control recovery recovery managem ent 121 ___________performs Storing several copies of concurrency back up redundan access redundancy data control and cy control management recovery managem ent 122 _____________is responsible for enforcing concurrency back up redundan access access control security and authorisation control and cy control recovery managem ent 123 In a Multiuser data base access control is true false true Mandatory . 124 Performing physical reorganizations to enhance true false true performance eg adding index , dropping index , sorting file is known as Performance optimization 125 Meta data means Data about data true false true 126 Types of data models are a b c d d a. Hierarchical model b. Network model c. Relational model d. all of the above. 127 RDBMS means relational data base management true false true
New Section 270 Page 9
127 RDBMS means relational data base management true false true system . 128 Data must be available in tabular form where true false true each table contains rows and columns in RDBMS 129 In RDBMS relation is table column of row of a none table a table table 130 In RDBMS attribute is table column of row of a none column of a a table table table 131 In RDBMS degree means no of no of rows in a none no of attributes in a tuples in a table attributes in relation table a relation 132 In RDBMS cardinality means no of no of rows in a none no of tuples attributes in a tuples in a table in a table relation table 133 In RDBMS Tuple means row column table none row 134 In RDBMS a pool of values from which specific degree domain or cardinality none domain or attributes draw their values is known as type type 135 In RDBMS --------- refers to unknown undefined both none both 136 Mechanism for defining data structures , true false true operations for retrieval and modification of data and integrity constraints is called Relational data model . 137 An attribute or set of attributes whose values domain type key none key uniquely identify each entity in an entity set is called 138 A set of one or more attributes that allows us to super key candidate both none super key identify uniquely an entity in the entity set is key known as 139 __________ key is a column, or set of columns, in a super key candidate both none candidate key table that can uniquely identify any database record key without referring to any other data 140 The most minimal subset of fields that uniquely super key candidate both none candidate key identifies a tuple is ------ key 141 The set of fields that contains a key. super key candidate both none super key key 142 A candidate key that is chosen by the data base primary set child set foreign none primary set designers as the principle means of identifying key entities within an entity set is called 143 The primary key from one table that appears as super key candidate foreign none foreign key a field in another is called key key 144 ER model means Entity relationship model . true false true 145 In E -R model anything that exists and can be entity attribute tuple none entity distinguished is called 146 A group of similar entities are called tuple entity set primary none entity set set 147 An entity set may not have sufficient attributes weak entity set strong not none weak entity to form a primary key is called entity set existing set 148 An entity set that has a primary key is called weak entity set strong not none strong entity entity set existing set 149 Properties that describes the entity are relations keys attributes none attributes 150 Types of attributes a b c d d a. Composite attributes b. Derived attributes and descriptive attributes c. single valued attributes and multi valued attributes
New Section 270 Page 10
attributes d. All of these 151 In ER model Rectangle represents entity attribute relation none entity 152 In ER model Diamond represents entity attribute relation none relation ship ship 153 In ER model ellipse represents entity attribute relation none attribute ship 154 In ER model double ellipse represents Multivalued derived both none Multivalued attribute attribute attribute 155 In ER model Dashed ellipse represents Multivalued derived both none derived attribute attribute attribute 156 Entity sets to entity set relation ship is denoted line circle dot none line by a 157 Double line representation in ER model is total true false true participation of an entity in a relation ship . 158 Types of relations exists between entity to entity a b c d d sets a. One to one b. One to many c. Many to many d. all 159 The process of designing subgrouping within an true false true entity set is called specialization. 160 Specialization is ---------- design process top down bottom left right right left top down up 161 Union of lower entity types to produce higher true false true entity sets is called Generalization. 162 Database __________ , which is the logical design of a b c d d the database, and the database _______,which is a snapshot of the data in the database at a given instant in time. (A) Instance, Schema (B) Relation, Schema (C) Relation, Domain (D) Schema, Instance. 163 Which one of the following is a set of one or more a b c d c attributes taken collectively to uniquely identify a record? (A) Candidate key (B) Sub key (C) Super key (D) Foreign key 164 Fifth Normal form is concerned with a b c d c (A) Functional dependency (B) Multivalued dependency (C) Join dependency (D) Domain key 165 If the state of the database no longer reflects a real a b c d d state of the world that the database is supposed to capture, then such a state is called (A) Consistent state (B) Parallel state (C) Durable state (D) Inconsistent state 166 Which view that contains more than one table in a b c d c the top level FROM clause of the SELECT statement: (A) Join view (B) Datable join view (C) Updatable join view
New Section 270 Page 11
(C) Updatable join view (D) All of the mentioned 167 Which of the following protocols ensures conflict a b c d b serializability and safety from deadlocks? (A) Two phase locking protocol (B) Time stamp ordering protocol (C) Graph based protocol (D) Both (a) and (b) above 168 A unit of storage that can store one or more records a b c d a in a hash file organization is denoted as (A) Buckets (B) Disk pages (C) Blocks (D) Nodes 169 When two inputs that we desire to pipeline into the a b c d d join are not already sorted it is the _____________ technique. (A) Hash join (B) Buffer join (C) double pipelined hash join (D) double pipelined join 170 A Database Management System (DBMS) is a b c d d Collection of a. programs to access data b. Collection of data describing one particular enterprise c. Collection of interrelated data d. All of these 171 Which failure includes the case of deadlock or a b c d a resource unavailability? a. Transaction failure b. System Crash c. Disk Failure d. None of these 172 Which of the following is not type of class? a b c d c a. Abstract Class b. Final Class c. Start Class d. String Class 173 In data-flow diagram, ____ shows the direction of a b c d d data flow and their name describing the data flowing along that path. a. rounded rectangle b. rectangles c. circles d. arrows 174 When a program is abnormally terminated, the a b c d b equivalent of a ______ command occurs. a. Commit b. Rollback c. Quit d. Exit 175 Abstraction can apply to a b c d a a. Control and data b. Only data c. Only control d. Classes 176 Which aggregate function gives the arithmetic mean a b c d b for the specific column? a. COUNT b. AVG c. MIN d. SUM 177 Which of the following is used in the application a b c d a programs to request data from the database management system? a. data manipulation language b. data definition language c. data control language
New Section 270 Page 12
c. data control language d. None of these 178 Which of the following commands is used to save a b c d a any transaction permanently into the database? a. commit b. roll back c. Save point d. None of these 179 In the relation model, the relation are generally a b c d d termed as a. tuple b. Attributes c. rows d. tables 180 The architecture of a database can be viewed as the a b c d c a. one level b. two level c. three level d. Four level 181 Which of the following keys is generally used to a b c d b represents the relationships between the tables? a. primary key b. Foreign key c. Candidate key d. None of these 182 Which of the following is not an object oriented a b c d d programming (OOPs) concept a. encapsulation b. polymorphism c. Inheritance d. Exception 183 Which feature of object oriented programming a b c d c (OOPs) described the reusability of code? a. encapsulation b. polymorphism c. Inheritance d. Exception 184 Which feature of object oriented programming a b c d c (OOPS) derives the class from another class? a. encapsulation b. polymorphism c. Inheritance d. Exception 185 Which operator from the following can be used to a b c d a illustrate the feature of polymorphism? a. Overloading << b. Overloading && c. Overloading || d. Overloading += 186 Which member of the superclass is never accessible a b c d c to the subclass? a. Public member b. Protected member c. Private member d. Private member & protected member 187 A program in execution is called a b c d a a. Process b. instruction c. procedure d. function 188 Generalization is ------ design process . a b c d b a. top down b. Bottom up c. Left to right d. None. 189 The abstraction through which relationships are true false true
New Section 270 Page 13
189 The abstraction through which relationships are true false true treated as higher level entities is known as Aggregation . 190 A finite no of relation schemas and a set of true false true integrity constraints is known as Relational data base schema . 191 Collection of relational instances satisfying the a b c d b integrity constraints is known as a. Data base design b. Data base instance c. Data flow d. None 192 Necessary conditions to be satisfied by the data a b c d a values in the relational instances so that the set of data values constitute a meaningful data base is a. Integrity constraints b. Domain constraints c. Key constraints d. entity integer constraints 193 The value of the attribute must be within the a b c d b domain is a. Integrity constraints b. Domain constraints c. Key constraints d. entity integer constraints 194 Primary key of a relation should not contain null a b c d d values a. Integrity constraints b. Domain constraints c. Key constraints d. entity integrity constraints 195 In relational data base design the process for a b c d b organizing data to minimize redundancy is known as a. Generalization b. Normalization c. Aggregation d. None. 196 If the Domains of each attribute of the relation a b c d a are atomic in ----form a. 1NF b. 2 NF c. 3 NF d. 4 NF 197 Multivalued attributes are disallowed in a b c d a a. 1NF b. 2 NF c. 3 NF d. 4 NF 198 A constraint that describes the relationship true false true between attributes in a relation is known as Functional dependency 199 The Main disadvantage of 1NF is a b c d b a. Low redundancy b. High redundancy c. No redundancy d. None 200 A nonprime attribute is functionally dependent on true false true part of a candidate key is known as Partial dependency . 201 A nonprime attribute is an attribute that's not part a b c d c of any -------- key a. Primary key b. Foreign key c. Candidate key
New Section 270 Page 14
c. Candidate key d. None 202 A relation should be in 1 NF and relation should 2 normal form 3 normal 4 normal 5 normal 2 normal form not contain any partial dependency is in form form form 203 2 normal Form is based on full functional true false true dependency . 204 A relation is in 2NF and no non key attribute is 2 normal form 3 normal 4 normal 5 normal 3 normal form transitively dependent on the primary Key is form form form known as 205 BCNF means Boyce codd Normal form true false true 206 4 NF is mainly concerned with Multivalued true false true dependency . 207 Project Join Normal form is 2 normal form 3 normal 4 normal 5 normal 5 normal form form form form 208 Create , Alter , Drop are --------languages a b c d b a. DML b. DDL c. DCL d. None 209 Insert , Select , Update , Delete are examples a b c d b of ------------ a. DDL b. DML c. DCL d. None 210 Grant , Revoke are examples of a b c d c a. DDL b. DML c. DCL d. None 211 Commit , Roll back are examples of a b c d c a. DDL b. DML c. TCL d. None 212 Sorting the result of a query in a specific order group by order by having where order by whether ascending or descending we use ----- clause 213 Divide the result set into groups we use ----- group by order by having where group by clause 214 To set the conditions for the Group by clause group by order by having where having we use ------clause 215 ______________clause kept conditions on rows group by order by having where where 216 Sum , AVG , COUNT , Min , Max are examples of a b c d a a. aggregate function b. Transaction function c. both d. None 217 Collection of operations involving data items true false true Involving data items in a data base is known as Transaction 218 The Properties of Transaction management a b c d d 1. Atomicity 2. Consistency 3. Isolation 4. Durability a. 1,2,3 b. 2,3,4 c. 1,3,4 d. 1,2,3,4 219 Which normal form is considered adequate for a b c d b relational data base design a. 2NF b. 3NF c. 4NF d. BCNF 220 The column of a table is referred as a b c d b a. Tuple b. Attribute c. entity d. Degree 221 The set of permitted values for each attribute is a b c d c called its a. attribute set b. attribute range
New Section 270 Page 15
b. attribute range c. domain d. group 222 E- R modelling technique is a a b c d a a. Top down approach b. bottom up approach c. Left right approach d. none 223 Redundancy is dangerous as it is a potential a b c d d threat to data a. Integrity b. consistency c. sufficiency d. both integrity and consistency 224 The employee salary should not be greater than a b c d a Rs2000 is a. Integrity constraint b. Referential constraint c. Over defined constraint d. desirable constraint . 225 Manager’s salary details are hidden from the a b c d c employee this is a. Conceptual level data hiding b. Physical level data hiding c. External level data hiding d. None 226 Generally speaking for a weak entity set to be a b c d a meaningful it must be a part of a. One to one relationship b. One to many relationship c. Many to one relationship d. none 227 If a relation scheme is in BCNF then it is also in a b c d d a. 1NF b. 2NF c. 3 NF d. All 228 Data Independency in DBMS is known as a b c d a a. Data modelling b. data hiding c. data capturing d. Data consistency 229 The Data base environment has all of the a b c d b following components except a. users b. separate files c. data base d. database administration 230 The way a particular application views the data a b c d d form the data base that the application uses is a a. module b. Relational c. Schema d. Subschema 231 What does the data dictionary identify a b c d d a. Field names b. Field Types c. Filed format d. all 232 Relations produced from an ER model will always a b c d c be in a. 1NF b. 2NF c. 3 NF d. 4 NF 233 Student and courses enrolled is an example of a b c d d
New Section 270 Page 16
233 Student and courses enrolled is an example of a b c d d a. one to one relation b. One to many relation c. many to one relation d. many to many relation 234 The feature by which one object can interact with a b c d b another object is _____________ a) Message reading b) Message Passing c) Data transfer d) Data Binding. 235 What is encapsulation in OOP? a b c d a a) It is a way of combining various data members and member functions that operate on those data members into a single unit b) It is a way of combining various data members and member functions into a single unit which can operate on any data c) It is a way of combining various data members into a single unit d) It is a way of combining various member functions into a single unit. 236 Which of the following is not true about a b c d b polymorphism? a) Helps in redefining the same functionality b) Increases overhead of function definition always c) It is feature of OOP d) Ease in readability of program 237 Which of the following is not an OOPS concept? a b c d c a. Encapsulation b. Polymorphism c. Exception d. Abstraction. 238 Which feature of OOPS described the reusability of a b c d d code? a. Abstraction b. Encapsulation c. Polymorphism d. Inheritance. 239 Object is ____ abstraction a b c d c a. Object b. Logical c. Real d. Hypothetical 240 Association among several entities is called a b c d b a. Extraction b. Relationship c. Combination d. Association 241 What is the programming style of the object a b c d c oriented conceptual model? a. Invariant relationships b. Algorithms c. Classes and objects d. Goals, often expressed in a predicate calculus 242 The SQL command _____ is used to withdraw a b c d b privileges on specific user accounts. A. REMOVE B. REVOKE C. ROLE D. GRANT 243 What is the purpose of back up protection? a b c d d a. To increase the speed b. To increase the reach c. To leave no blind spot d. To guard against failure of primary
New Section 270 Page 17
244 Finding the location of the element with a given a b c d b value is a. Traversal b. Search c. Sort d. None of these 245 Who invented OOP? a b c d c a) Andrea Ferro b) Adele Goldberg c) Alan Kay d) Dennis Ritchie 246 Which is not a feature of OOP in general definitions? a b c d d a) Efficient Code b) Code reusability c) Modularity d) Duplicate/Redundant data 247 Which was the first purely object oriented a b c d b programming language developed? a) Kotlin b) Small Talk c) Java d) C++ 248 Which header file is required in C++ to use OOP? a b c d a a) OOP can be used without using any header file b) stdlib.h c) iostream.h d) stdio.h 249 Which among the following doesn’t come under a b c d c OOP concept? a) Data hiding b) Message passing c) Platform independent d) Data binding 250 The feature by which one object can interact with a b c d b another object is _____________ a) Message reading b) Message Passing c) Data transfer d) Data Binding 251 Encapsulation in OOP means True False True bundling data and methods into a single unit. 252 Which of the following is not true about a b c d b polymorphism? a) Helps in redefining the same functionality b) Increases overhead of function definition always c) It is feature of OOP d) Ease in readability of program 253 What is an abstraction in object-oriented a b c d a programming? a) Hiding the implementation and showing only the features b) Hiding the important data c) Hiding the implementation d) Showing the important data 254 In which access should a constructor be defined, so a b c d c that object of the class can be created in any function? a) Any access specifier will work b) Private c) Public d) Protected 255 The copy constructors can be used to ________ a b c d c a) Copy an object so that it can be passed to another primitive type variable b) Copy an object for type casting c) Copy an object so that it can be passed to a
New Section 270 Page 18
c) Copy an object so that it can be passed to a function d) Copy an object so that it can be passed to a class 256 Which among the following represents correct a b c d b constructor? a) –classname() b) classname() c) ()classname d) ~classname() 257 What happens when an object is passed by a b c d c reference? a) Destructor is called at end of function b) Destructor is called when called explicitly c) Destructor is not called d) Destructor is called when function is out of scope 258 Which access specifier is usually used for data a b c d b members of a class? a) Protected b) Private c) Public d) Default 259 How to access data members of a class? a b c d d a) Dot, arrow or direct call b) Dot operator c) Arrow operator d) Dot or arrow as required 260 Which feature of OOP reduces the use of nested a b c d a classes? a) Inheritance b) Binding c) Abstraction d) Encapsulation 261 Which keyword among the following can be used to a b c d c declare an array of objects in java? a) allocate b) arr c) new d) create 262 Which operator can be used to free the memory a b c d d allocated for an object in C++? a) Unallocate b) Free() c) Collect d) delete 263 Which of the following is not a property of an a b c d b object? a) Properties b) Names c) Identity d) Attributes 264 Single level inheritance supports _____________ a b c d d inheritance. a) Language independency b) Multiple inheritance c) Compile time d) Runtime 265 Software is defined as ___________ a b c d a a) set of programs, documentation & configuration of data b) set of programs c) documentation and configuration of data d) None of the mentioned. 266 What is Software Engineering? a b c d c a) Designing a software b) Testing a software c) Application of engineering principles to the design a software d) None of the above 267 Which of the following language was developed as a b c d a the first purely object programming language? a. Small Talk b. C++ c. Kotlin d. Java. 268 The longest method of conversion is called a b c d d
New Section 270 Page 19
268 The longest method of conversion is called a b c d d (A) Direct (B) Parallel (C) Pilot (D) Phased. 269 In What manner coding and testing are done a b c d c (A) Top- Down (B) Bottom up (C) both A & B (D) Adhoc . 270 Data Flow diagram (DFD ) shows a b c d d (A) Flow of data (B) Processes (C) Areas where they are stored (D) All . 271 Which are the tools not used for System analysis a b c d a (A) System test data (B) Decision Table (C) Data Flow diagram (D) Flow charts. 272 The first phase of Software development is a b c d a (A) Requirement analysis (B) Design (C) coding (D) Testing. 273 What are the characteristics of software? a b c d d a. Software is developed or engineered; it is not manufactured in the classical sense. b. Software doesn’t wear out . c. Software can be custom built or custom build. d. All mentioned above 274 Compilers, Editors software come under which type a b c d a of software? a. System software b. Application software c. Scientific software d. None of the above. 275 RAD Software process model stands for _____ a b c d a a. Rapid Application Development. b. Relative Application Development. c. Rapid Application Design. d. Recent Application Development. 276 Software project management comprises of a a b c d d number of activities, which contains _________. a. Project planning b. Scope management c. Project estimation d. All 277 Which of the following is not defined in a good a b c d d Software Requirement Specification (SRS) document? a. Functional Requirement. b. Nonfunctional Requirement. c. Goals of implementation. d. Algorithm for software implementation. 278 What is the simplest model of software a b c d d development paradigm? a. Spiral model b. Big Bang model c. V-model d. Waterfall model 279 Which method is used for evaluating the expression a b c d a that passes the function as an argument?
New Section 270 Page 20
that passes the function as an argument? a. Strict evaluation b. Recursion c. Calculus d. Pure functions 280 Requirement engineering process includes which of a b c d d these steps? a. Feasibility study b. Requirement Gathering c. Software Requirement specification & Validation d. All 281 COCOMO model is ________ . a b c d b a. Common Cost Estimation Model. b. Constructive Cost Estimation Model. c. Complete Cost Estimation Model. d. Comprehensive Cost estimation Model 282 Software Requirement Specification (SRS) is also a b c d d known as specification of _______. a. White box testing b. Acceptance testing c. Integrated testing d. Black box testing 283 If requirements are easily understandable and a b c d b defined then which model is best suited? a. Spiral model b. Waterfall model c. Prototyping model d. None of the above 284 CASE Tool stands for. a b c d a a. Computer Aided Software Engineering b. Component Aided Software Engineering c. Constructive Aided Software Engineering d. Computer Analysis Software Engineering 285 Software is defined as ____ . a b c d d a. Instructions b. Data Structures c. Documents d. All of the above 286 FAST stands for ______ . a b c d c a. Facilitated Application Software Technique. b. Functional Application Software Technique. c. Facilitated Application Specification Technique. d. None of the above. 287 Which may be estimated either in terms of KLOC a b c d a (Kilo Line of Code) or by calculating number of function points in the software? a. Time estimation b. Effort estimation c. Cost estimation d. Software size estimation 288 What is described by means of DFDs as studied a b c d a earlier and represented in algebraic form? a. Data flow b. Data storage c. Data Structures d. Data elements 289 Which document is created by system analyst after a b c d a the requirements are collected from Various stakeholders? a. Software requirement specification b. Software requirement validation
New Section 270 Page 21
b. Software requirement validation c. Feasibility study d. Requirement Gathering 290 What is the most common measure for correctness? a b c d a a. Defects per KLOC b. Errors per KLOC c. $ per KLOC d. Pages of documentation per KLOC 291 Which tools are used in implementation, testing and a b c d c maintenance? a. Upper case tools b. Integrated case tools c. Lower case tools d. None of the above 292 Which model is also known as Verification and a b c d c validation model? a. Waterfall model b. Big Bang model c. V-model d. Spiral model 293 Match the List 1 to List 2 and choose the correct a b c d d option. 1. Requirement Elicitation ----- a. Module Development and integration. 2. Design---------b. Analysis 3. Implementation--------c. Structure and behavioural 4. Maintenance ---------- d. Performance tuning. a. 1-c , 2-a , 3-d , 4-b b. 1-c , 2-a , 3-b , 4-d c. 1-a , 2-c , 3-d , 4-b d. 1-b , 2-c , 3-a , 4-d 294 A generic process framework for software a b c d b engineering encompasses five activities. What are those activities? a. Communication, risk management, measurement, production, deployment. b. Communication, Planning, Modelling, construction, deployment. c. Analysis, designing, programming, debugging, maintenance d. None of the above. 295 Who deliver the technical skills that are necessary to a b c d b engineer for a product or an application? a. Project managers b. Practitioners c. Customers d. End users 296 Project risk factor is considered in which model? a b c d a a. Spiral model. b. Waterfall model. c. Prototyping model d. None of the above. 297 Which model is not suitable for large software a b c d a projects but good one for learning and experimenting? a. Big Bang model b. Spiral model c. Iterative model d. Waterfall model 298 Which tools are helpful in all the stages of SDLC, for a b c d c
New Section 270 Page 22
298 Which tools are helpful in all the stages of SDLC, for a b c d c requirement gathering to testing and documentation? a. Upper case tools b. Lower case tools c. Integrated case tools D. none of the above. 299 Which phase is refers to the support phase of a b c d c software development? a. Acceptance Phase. b. Testing. c. Maintenance. d. None of the above. 300 Which model is also called as the classic life cycle or a b c d b the Waterfall model? a. Iterative Development b. Linear Sequential Development c. RAD Model. d. Incremental development 301 The tools that support different stages of software a b c d a development life cycle are called as ______ . a. CASE Tools b. CAME tools c. CAQE tools d. CARE tools 302 Find out which phase is not available in SDLC? a b c d d a. Coding b. Testing c. Maintenance d. Abstraction 303 Which of the following is/are considered a b c d d stakeholder in the software process? a. Customers b. End-users c. Project managers d. All of the above. 304 First level of prototype is evaluated by ______ . a b c d c a. Developer b. Tester c. User d. System Analyst 305 Line of code(LOC) of the product comes under a b c d b which type of measures? a. Indirect measures b. Direct measures c. Coding d. None of the above. 306 What is the main aim of Software engineering? a b c d c a. Reliable software b. Cost effective software c. Reliable and cost effective software d. None of the above 307 Where is the prototyping model of software a b c d c development well suited? a. When requirements are well defined. b. For projects with large development teams. c. When a customer cannot define requirements clearly. d. None of the above. 308 Grouping of all functionally related elements is a b c d a known as ______ . a. Cohesion b. Coupling c. Both A & B
New Section 270 Page 23
c. Both A & B d. None of the above 309 Design phase is followed by ______ . a b c d b a. Coding b. Testing c. Maintenance d. None of the above. 310 Which depicts flow of control in program modules? a b c d a a. Flowchart b. DFD c. Both A & B d. None of the above 311 From the following methods which size of the a b c d c software product can be calculated? a. Counting the lines of delivered code b. Counting delivered function points c. Both A and B d. None of the above 312 Spiral model is a combination of both Iterative true false true model and one of the SDLC model. 313 The software becomes more popular if its user a b c d d interface is __________ . a. Attractive b. Simple to use c. Responsive in short time d. All mentioned above 314 Knowledge of software program, design and a b c d b structure is essential in _______ . a. Black-box testing b. White-box testing c. Integration testing d. None of the above 315 Alpha and Beta Testing are forms of _______ . a b c d a a. Acceptance testing b. Integration testing c. System Testing d. Unit testing 316 The model in which the requirements are a b c d a implemented by its category is ______ . a. Evolutionary Development Model b. Waterfall Model c. Prototyping d. Iterative enhancement Model 317 Software consists of ______ a b c d b a. Set of instructions + operating procedures b. Programs + documentation + operating procedures c. Programs + hardware manuals d. Set of programs 318 Which is the most important feature of spiral a b c d b model? a. Quality management b. Risk management c. Performance management d. Efficiency management 319 One of the fault base testing techniques is ______ . a b c d d a. Unit Testing b. Beta Testing c. Stress Testing d. Mutation Testing
New Section 270 Page 24
d. Mutation Testing 320 The process of developing a software product using a b c d c software engineering principles and methods is referred to as, _______ . a. Software myths b. Scientific Product c. Software Evolution d. None of the above 321 The testing is performed by the selected a b c d a customer and experts at the development site is a. alpha testing b. Beta testing c. both d. none. 322 The testing is performed by the customer in a b c d b actual live environment at the development time is a. alpha testing b. Beta testing c. both d. none. 323 In data-flow diagram, ____ shows the direction of a b c d d data flow and their name describing the data flowing along that path. a. rounded rectangle b. rectangles c. circles d. arrows 324 Criterion used for judging appropriateness of tool a b c d a software is a. Functionality b. scalability c. compatibility d. security. 325 Linux is a b c d d a. Application software b. Word processor c. Database management system d. Operating software 326 Software is defined as ___________ a b c d a a) set of programs, documentation & configuration of data b) set of programs c) documentation and configuration of data d) None of the mentioned. 327 What is Software Engineering? a b c d c a) Designing a software b) Testing a software c) Application of engineering principles to the design a software d) None of the above 328 Who is the father of Software Engineering? a b c d b a) Margaret Hamilton b) Watts S. Humphrey c) Alan Turing d) Boris Beizer 329 What are the features of Software Code? a b c d d a) Simplicity b) Accessibility c) Modularity d) All of the above 330 ____________ is a software development activity a b c d d that is not a part of software processes. a) Validation b) Specification c) Development
New Section 270 Page 25
c) Development d) Dependence 331 ________ is defined as the process of generating a b c d c analysis and designing documents? a) Re-engineering b) Reverse engineering c) Software re-engineering d) Science and engineering. 332 The activity that distributes estimated effort across a b c d a the planned project duration by allocating the effort to specific software developing tasks is __ a) Project scheduling b) Detailed schedule c) Macroscopic schedule d) None of the mentioned. 333 What is a Functional Requirement? a b c d a a) specifies the tasks the program must complete b) specifies the tasks the program should not complete c) specifies the tasks the program must not work d) All of the mentioned 334 Why do bugs and failures occur in software? a b c d c a) Because of Developers b) Because of companies c) Because of both companies and Developers d) None of the mentioned 335 Attributes of good software is __________ a b c d b a) Development b) Maintainability & functionality c) Functionality d) Maintainability 336 What does SDLC stands for? a b c d c a) System Design Life Cycle b) Software Design Life Cycle c) Software Development Life Cycle d) System Development Life cycle 337 Who proposed the spiral model? a b c d a a) Barry Boehm b) Pressman c) Royce d) IBM 338 ______________ is not among the eight principles a b c d b followed by the Software Code of Ethics and Professional Practice. a) PRODUCT b) ENVIRONMENT c) PUBLIC d) PROFESSION 339 _________ is not a fundamental activity for a b c d d software processes in software development. a) Evolution b) Design and implementation c) Validation d) Verification 340 _________ is a software development life cycle a b c d c model that is chosen if the development team has less experience on similar projects. a) Iterative Enhancement Model b) RAD c) Spiral d) Waterfall 341 A description of each function presented in the DFD a b c d b is contained in a ________
New Section 270 Page 26
is contained in a ________ a) data flow b) process specification c) control specification d) data store 342 What is the first step in the software development a b c d d lifecycle? a. System Design b. Coding c. System Testing d. Preliminary Investigation and Analysis 343 Which of the following is an example of Black Box a b c d d and Functional Processing? a. First Generation Language b. Second Generation Language c. Third Generation Language d. Fourth Generation Language 344 __________ is identified as fourth generation a b c d a language. a. Unix shell b. C++ c. COBOL d. FORTRAN 345 Software maintenance costs are expensive in true false c d true contrast to software development. 346 Which of the following activities of the generic a b c d a process framework delivers a feedback report? a. Deployment b. Planning c. Modelling d. Construction 347 Which of the following refers to internal software a b c d b equality? a. Scalability b. Reusability c. Reliability d. Usability 348 ____ is concerned with realizing a software design a b c d d using an object-oriented programming language. a. Object oriented analysis b. Object oriented methods c. Object oriented design d. Object oriented programming 349 Which of the following is not an operating system? a b c d c A. Windows B. Linux C. Oracle D. DOS 350 What is the maximum length of the filename in a b c d c DOS? A. 4 B. 5 C. 8 D. 12 351 Which of the following is the extension of Notepad? a b c d a A. .txt B. .xls C. .ppt D. .bmp 352 What else is a command interpreter called? a b c d c A. prompt B. kernel C. shell D. command 353 What is the full name of FAT? a b c d b A. File attribute table B. File allocation table C. Font attribute table D. Format allocation table 354 BIOS is used? a b c d a A. By operating system B. By compiler C. By interpreter D. By application software
New Section 270 Page 27
355 What is the mean of the Booting in the operating a b c d a system? A. Restarting computer B. Install the program C. To scan D. To turn off 356 When does page fault occur? a b c d c A. The page is present in memory. B. The deadlock occurs. C. The page does not present in memory. D. The buffering occurs. 357 Banker's algorithm is used? a b c d a A. To prevent deadlock B. To deadlock recovery C. To solve the deadlock D. None of these 358 When you delete a file in your computer, where a b c d a does it go? A. Recycle bin B. Hard disk C. Taskbar D. None of these 359 Which is the Linux operating system? a b c d c A. Private operating system B. Windows operating system C. Open-source operating system D. None of these 360 What is the full name of the DSM? a b c d d A. Direct system module B. Direct system memory C. Demoralized system memory D. Distributed shared memory 361 What is the full name of the IDL? a b c d a A. Interface definition language B. Interface direct language C. Interface data library D. None of these 362 What is bootstrapping called? a b c d a A. Cold boot B. Cold hot boot C. Cold hot strap D. Hot boot 363 If the page size increases, the internal a b c d b fragmentation is also? A. Decreases B. Increases C. Remains constant D. None of these 364 Which of the following is a single-user operating a b c d c system? A. Windows B. MAC C. Ms-DoS D. None of these 365 The size of virtual memory is based on which of the a b c d c following? A. CPU B. RAM C. Address bus D. Data bus 366 Which of the following is not application software? a b c d a A. Windows 7 B. WordPad C. Photoshop D. MS-excel 367 Which of the following supports Windows 64 bit? a b c d a
New Section 270 Page 28
367 Which of the following supports Windows 64 bit? a b c d a A. Window XP B. Window 2000 C. Window 1998 D. None of these 368 Which of the following windows does not have a a b c d b start button? A. Windows 7 B. Windows 8 C. Windows XP D. None of these 369 Which of the following operating systems does not a b c d d support more than one program at a time? A. Linux B. Windows C. MAC D. DOS 370 Which of the following is a condition that causes a b c d d deadlock? A. Mutual exclusion & Hold and wait B. Circular wait C. No pre emption D. All of these 371 Who provides the interface to access the services of a b c d b the operating system? A. API B. System call C. Library D. Assembly instruction 372 Where are placed the list of processes that are a b c d b prepared to be executed and waiting? A. Job queue B. Ready queue C. Execution queue D. Process queue 373 Who among the following can block the running a b c d d process? A. Fork B. Read C. Down D. All of these 374 Which of the following does not interrupt the a b c d d running process? A. Timer interrupt B. Device C. Power failure D. Scheduler process 375 What is Microsoft window? a b c d a A. Operating system B. Graphics program C. Word Processing D. Database program 376 Which of the following is group of programs? a b c d a A. Accessories B. Paint C. Word D. All of above 377 Which of the following is an example of a Real Time a b c d d Operating System? A. MAC B. MS-DOS C. Windows 10 D. Process Control 378 Which of the following operating systems do you a b c d d use for a client-server network? A. MAC B. Linux C. Windows XP D. Windows 2000 379 Which command is used to fetch a group (.doc) of a b c d c files that have just been deleted? A. Undelete
New Section 270 Page 29
A. Undelete B. Undelete/all C. Undelete *.doc D. All of above 380 Which of the following is system software? a b c d d A. Operating system B. Compiler C. Utilities D. All of the above 381 Which program runs first after booting the a b c d d computer and loading the GUI? A. Desktop Manager B. File Manager C. Windows Explorer D. Authentication 382 What is the use of directory structure in the a b c d b operating system? A. The directory structure is used to solve the problem of the network connection in OS. B. It is used to store folders and files hierarchically. C. It is used to store the program in file format. D. All of the these 383 What type of scheduling is round-robin scheduling? a b c d c A. Linear data scheduling B. Non-linear data scheduling C. Pre emptive scheduling D. Non-preemptive scheduling 384 Which conditions must be satisfied to solve a critical a b c d d section problem? A. Bounded Waiting B. Progress C. Mutual Exclusion D. All of these. 385 Which of the following scheduling algorithms is pre - a b c d d emptive scheduling? A. FCFS Scheduling B. SJF Scheduling C. Network Scheduling D. SRTF Scheduling 386 What type of memory stores data in a swap file on a b c d b a hard drive? A. Secondary memory B. Virtual memory C. Low memory D. RAM 387 Which of the following semaphore can take the a b c d b non-negative integer values? A. Binary Semaphore B. Counting Semaphore C. Real Semaphore D. All of the these 388 Which method is the best among file allocation a b c d c methods? A. Linked B. Contiguous C. Indexed D. None of the these 389 The operating system work between a b c d a A. User and Computer B. Network and User C. One user to another user
New Section 270 Page 30
C. One user to another user D. All of the these 390 What is the paging in the operating system? a b c d a A. Memory management scheme B. Network management scheme C. Internet management scheme D. None of the these 391 Which of the following programs is loaded first a b c d c when starting a computer? A. Window desktop B. Network connection program C. Operating system D. CMD 392 Which of the following scheduling reduces process a b c d c flow time? A. FCFS B. LIFO C. SJF D. All of the these 393 Which of the following method is used to improve a b c d c the main memory utilization? A. Swapping B. Operating system C. Memory stack D. None of these. 394 Buffer is a ___________. a b c d b A. Permanent area B. Temporary area C. Small area D. Large area 395 What is Kali Linux? a b c d b A. Network device B. Operating system C. Server name D. Computer name 396 Which of the following statement is correct about a b c d c fragmentation? A. It is software that connects the OS. B. It is part of the software. C. Loss the memory D. All of the these 397 SSTF stands for ________. a b c d b A. Shortest Signal Time First B. Shortest Seek Time First C. System Seek Time First D. System Shortest Time First 398 The PCB ( Process Control Block ) is identified by a b c d d ___________. A. Real-Number B. Binary Number C. Store block D. Integer Process ID 399 Which is the part of a computer that one can touch a b c d a and feel ? A. Hardware B. Software C. Programs D. Output 400 Which of the following is hardware and not a b c d d software ? A. Excel B. Printer driver C. Power Point D. CPU 401 A device for changing the connection on a a b c d d connector to a different configuration is ? A. a converter B. a component C. an attachment
New Section 270 Page 31
C. an attachment D. an adapter 402 _______ is the process of dividing the disk into a b c d b tracks and sectors ? A. Tracking B. Formatting C. Crashing D. Allotting 403 Hardware includes ? a b c d d A. all devices used to input data into a computer B. sets of instructions that a computer runs or executes C. the computer and all the devices connected to it that are used to input and output data D. all devices involved processing information including the central processing unit, memory, and storage 404 Tangible, physical computer equipment that can be a b c d a seen and touched is called _______ ? A. hardware B. software C. storage D. input/output 405 Which of the following devices translate data and a b c d d programs that humans can understand into a form that the computer can process ? A. Display B. Input C. Output D. None of these. 406 Which of the following is usually connected to a a b c d d computer with the help of a cable ? A. Icon B. Virus C. Database D. Peripheral devices 407 When you save the following the data would remain a b c d c intact even after turning off computer ? A. RAM B. Motherboard C. Secondary Storage Device D. Primary Storage Device 408 The main system board of a computer is called the ? a b c d b A. integrated circuit B. motherboard C. processor D. microchip 409 Fax machines and imaging systems are examples a b c d b of ? A. bar-code readers B. imaging systems C. scanning devices D. pen-based systems 410 A __________ is a device that not only provides a b c d c surge protection, but also furnishes your computer with battery backup power during a power outage. ? A. surge strip B. USB C.UPS D. Battery strip . 411 The motherboard is the ? a b c d d A. circuit board that houses peripheral devices B. same as the CPU chip C. the first chip that is accessed when the computer is turned on D. circuit board that contains a CPU and other chips 412 The disks stores information in ? a b c d d A. Tables B. Rows and columns C. Blocks D. Tracks and sectors
New Section 270 Page 32
D. Tracks and sectors 413 What resides on the motherboard and connects the a b c d c CPU to other components on the motherboard ? A. Input Unit B. System Bus C. ALU D. Primary Memory 414 The clock rate of a processor is measured in ? a b c d d A. milliseconds B. microhertz C. megabytes or gigabytes D. megahertz or gigahertz 415 __________ ports connect special types of music a b c d d instruments to sound cards ? A. BUS B. CPU C. USB D. MIDI 416 Any hardware component that allows you to enter a b c d d data or instructions into a computer is called a(n) _________ ? A. printer B. storage device C. output device D. input device 417 A directory within a directory is called a a b c d d __________ ? A. Mini Directory B. Junior Directory C. Part Directory D. Sub Directory 418 A microprocessor is the brain of the computer and is a b c d a also called a(n) ? A. microchip B. macrochip C. macroprocessor D. calculator 419 What is the most popular hardware for multimedia a b c d a creations ? A. PCs B. Minicomputers C. Mainframe Computers D. WANs 420 Which type of storage is a hard disc ? a b c d d A. Non-permanent B. Volatile C. Temporary D. Non-volatile 421 Restarting a computer that is already on is referred a b c d d to as ? A. shut down B. cold booting C. warm booting D. logging off 422 The indentations on CDs and DVDs are called ? a b c d a A. pits B. clusters C. tracks D. lands 423 Another word for the CPU is __________ ? a b c d a A. microprocessor B. execute C. microchip D. decode 424 If a processor has a word size of 32 bits, compared a b c d b to a processor with a word size of 16 bits, it can
New Section 270 Page 33
to a processor with a word size of 16 bits, it can process __________ at a time. ? A. thrice as much B. twice as much C. a fourth as much D. the same amount 425 When installing __________, the user must copy a b c d d and usually decompress program files from a CD- ROM or other medium to the hard disk ? A. programming software B. system hardware C. application hardware D. applications software 426 A computer’s type, processor, and operating system a b c d d define its ? A. brand B. size C. platform D. speed 427 Which of the following is a secondary memory a b c d b device ? A. Keyboard B. Disk C. ALU D. Mouse. 428 When a computer is switched on, the booting a b c d b process performs ? A. Integrity Test B. Power-On-Self-Test C. Correct Functioning Test D. Reliability Test 429 The general term peripheral equipment is used for a b c d a _________ ? A. any device that is attached to a computer system B. large-scale computer systems C. a program collection D. None of these . 430 What provide expansion capability for a computer a b c d b system ? A. Sockets B. Slots C. Bytes D. Bays 431 Different components on the motherboard of a PC a b c d b unit are linked together by sets of parallel electrical conducting lines. What are these lines called ? A. Conductors B. Buses C. Connectors D. Consecutives 432 The cost of a given amount of computing power has a b c d d _______ dramatically with the progress of computer technology ? A. stayed the same B. changed proportionally with the economy C. increased D. decreased 433 Which of the following is an example of a b c d d connectivity ? A. CD B. Floppy disk C. Power cord D. Internet 434 What is the process of copying software programs a b c d d from secondary storage media to the hard disk called ? A. Configuration B. Download C. Storage D. Installation 435 A device that is connected to the motherboard is a b c d c ________ ?
New Section 270 Page 34
________ ? A. called an external device B. called an adjunct device C. called a peripheral device D. must connect using ribbon cable 436 Storage and memory differ with respect to which of a b c d d the following characteristics ? A. Price B. Reliability C. Speed D. All of these 437 The other name of a motherboard is ? a b c d d A. System Device B. Computer Board C. Central Board D. System Board 438 The box that contains the central electronic a b c d b components of the computer is the ? A. motherboard B. system unit C. peripheral D. input device 439 A CPU-chip developed by Intel for wireless laptops is a b c d b called the ? A. Celeron B. Pentium-M C. Xen D. Itanium 440 What is a backup ? a b c d d A. Restoring the information backup B. An exact copy of a system’s information C. The ability to get a system up and running in the event of a system crash or failure D. All of these 441 Permanent instructions that the computer uses a b c d a when it is turned on and that cannot be changed by other instructions are contained in __________ ? A. ROM B. RAM C. ALU D. None. 442 The _________ directory is mandatory for every a b c d a disk. ? A. Root B. Base C. Sub D. Case 443 A computer’s hard disk is __________ ? a b c d d A. an arithmetic and logical unit B. computer software C. operating system D. computer hardware 444 An operating system's primary function includes a b c d d which of the following? A. Providing user interface B .Managing hardware resources C. Running applications D. All of the above 445 Which of the following is not a type of operating a b c d c system? A. Batch Operating System B. Real-time Operating System C. Sequential Operating System D. Distributed Operating System 446 Which component of an operating system is a b c d a responsible for managing files? A. File System Manager B. Memory Manager C. Process Manager D. Device Driver 447 The kernel of an operating system is: a b c d b A. The user interface
New Section 270 Page 35
A. The user interface B. The part that manages hardware interactions C. An application software D. A type of virus 448 In an operating system, what is the role of a a b c d c scheduler? A. To allocate disk space B. To manage user accounts C. To determine which process runs at a certain point in time D. to configure network settings. 449 Multitasking in operating systems allows for: a b c d b A. Multiple users to share a single device B. A single user to perform multiple tasks at one time C. Devices to run without an OS D. None 450 Which command in Unix is used to display the a b c d a current directory's contents? A . ls B. cd C. Mk dir D. touch
Sri Ramanjar Engineering College Department of Electronic and Communication Engineering EC 8393 Fundamental of DATA STRUCTURE Model Exam MARKS: 100 TIME: 2hrs Part A