0% found this document useful (0 votes)
34 views36 pages

DS, DBMS, Os, Se, Oop Etc Questions

Uploaded by

facbuki
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
34 views36 pages

DS, DBMS, Os, Se, Oop Etc Questions

Uploaded by

facbuki
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 36

Topics :- Data structures , DBMS, Software Engineering , Operating Systems,

and Other Topics in Computer engineering

Q no QUESTION OPT a OPT b OPT c OPT d Answer

1 What is a data structure? a b c d c


a) A programming language
b) A collection of algorithms
c) A way to store and organize data
d) A type of computer hardware.
2 What are the disadvantages of arrays? a b c d d
a) Index value of an array can be negative
b) Elements are sequentially accessed
c) Data structure like queue or stack cannot be
implemented
d) There are chances of wastage of memory space if
elements inserted in an array are lesser than the
allocated size.
3 Which data structure is used for implementing a b c d a
recursion? a) Stack b) Queue c) List d) Array.
4 The data structure required to check whether an a b c d b
expression contains a balanced parenthesis is?
a) Queue b) Stack c) Tree d) Array.
5 Which of the following is not the application of a b c d a
stack?
a) Data Transfer between two asynchronous process
b) Compiler Syntax Analyzer
c) Tracking of local variables at run time
d) A parentheses balancing program.
6 Which data structure is needed to convert infix a b c d c
notation to postfix notation?
a) Tree b) Branch c) Stack d) Queue.
7 What is the value of the postfix expression 6 3 2 4 a b c d b
+ – *? a) 74 b) -18 c) 22 d) 40.
8 The basic data structures that are directly a b c d b
operated upon the machine instructions are
A. Non primitive data structure
B. Primitive data structure
C. Both
D. none
9 Data structures emphasize on structuring of a a b c d a
group of homogeneous or heterogeneous data
items is known as.
A. Non primitive data structure
B . Primitive data structure
C. Both
D. none.
10 Integer , float , character , pointer are examples a b c d b
of
A. Non primitive data structure
B. Primitive data structure
C. Both

New Section 270 Page 1


C. Both
D. none.
11 Arrays , Lists , Files are examples of a b c d a
A. Non primitive data structure
B. Primitive data structure
C. Both
D. none.
12 The variables which can be accessed by all a b c d d
modules in a programme are called
(A) Local variables
(B) Internal Variables
(C) External Variables
(D) Global variables.
13 Which of the following sorting procedure is the a b c d d
slowest
(A) Quick sort (B) Heap sort (C) Shell sort (D) Bubble
sort .
14 A full binary tree with n leaves contains a b c d c
(A) n nodes (B) log2n nodes (C) 2n -1 (D) 2n+1
nodes.
15 The minimum number of fields with each node a b c d c
of doubly linked list is
(A) 1 (B)2 (C) 3 (D) 4.
16 Stack is useful for implementing a b c d c
(A) Radix (B) BFS (C) Recursion (D) None.
17 The max degree of any vertex in a simple graph a b c d b
with n vertices
(A) n (B) n-1 (C) n + 1 (D) 2n-1.
18 Procedural programming language is a b c d a
(A) COBOL (B) BASIC (C) C++ (D) PASCAL.
19 PASCAL is a b c d a
(A) Structural programming language
(B) Procedural programming
(C) Monolithic programming
(D) Object oriented.
20 The data continues to exists even when the persistent transient write read persistent
system is not active is data data data data data
21 The data is created while an application is persistent transient write read transient
running and not needed when the data data data data data
application has terminated is
22 collection of related data is known as data storage data base data none data base
dump
23 The information contained in data base is data structure data and none data and
represented as structure structure
24 Which is large and is being frequently modified data structure data and none data
is structure
25 Which is small and stable in time data structure data and none structure
structure
26 Which keyword is used to declare virtual functions? a b c d c
a) virt b) virtually c) virtual d) anonymous
27 Data structures emphasize on structuring of a a b c d a
group of homogeneous or heterogeneous data
items is known as.
A. Non primitive data structure
B. Primitive data structure
C. Both
D. none.
28 Integer , float , character , pointer are examples a b c d b

New Section 270 Page 2


28 Integer , float , character , pointer are examples a b c d b
of
A. Non primitive data structure
B. Primitive data structure
C. Both
D. none.
29 Arrays , Lists , Files are examples of a b c d a
A. Non primitive data structure
B. Primitive data structure
C. Both
D. none.
30 Which of the following are examples of a b c d c
branched structures .
A. Trees B. Graphs C. Trees and Graphs D.
None.
31 ______are used to represent hierarchical a b c d a
relation ship between data elements .
A. Trees B. Graphs C. Trees and Graphs D.
None.
32 ________are used to Represent non hierarchical a b c d b
relations among data elements .
A. Trees B. Graphs C. Trees and Graphs D.
None.
33 Which is not a linear data structure . a b c d d
A. Array B. Stack C. Queue D. Tree.
34 The memory locations in array are . a b c d b
A. Random B. Contiguous C. Sequential D. any
order.
35 The size of the array has to be declared a b c d a
A. Before compilation
B. End of compilation
C. At any time
D. none .
36 The array definition int marks [ 10 ] [ 15 ] a b c d d
defines an array of
A. 5 tables and 10 rows
B. 10 columns and 5 rows
C. 10 rows and 15 tables
D. 10 rows and 15 columns.
37 In C square brackets [ ] are used for a b c d b
A. functions B. arrays C. statements D. all .
38 ADT ( Abstract Data Types) comprises a b c d c
A. Data structures
B. Fundamental operations related to data
structures C. Both
D. None.
39 No of elements in A [ 1: 26 ] are . a b c d a
A. 26 B. 25 C. 27 D. None.
40 The number of elements in A [ 1: 10 , 1: 5 ] are a b c d a
A. 50. B. 52 C. 51 D. none.
41 Array stores the data in . a b c d c
A. Row major order
B. Column major order
C. Both
D. None.
42 Faster access to non local variables is achieved a b c d c
using an array of pointers to activation record
called
A. Heap B. Activation tree C. Display D. Stack .

New Section 270 Page 3


A. Heap B. Activation tree C. Display D. Stack .
43 If Int s [ s ] is one dimensional array of integers , a b c d a
which of the following refers to the third element
in the array .
A. *( s+ 2 ) B. s+ 3 C. * ( s+ 3 ) + 5 D. * ( s + 3 ) + 2.
44 Primary ADT’s are . a b c d d
A. Linked lists B. Stacks C. Queues D. all of the
above.
45 Among the following which is not a primitive data a b c d d
type .
A. Int B. Float C. Char D. Structure.
46 ADT contains . a b c d c
A. A value definition
B. an Operator definition
C. both
D. None.
47 Stack is an ADT operates on -------------principle . a b c d b
A. FILO B. LIFO C. FIFO D. All .
48 Which is not a stack operation . a b c d d
A. Push B. Pop C. Stack top D. None.
49 The best data structure to check whether an a b c d b
arithmetic expression has balanced parenthesis is.
A. Queue B. Stack C. Tree D. List .
50 Stack can be useful for implementing . a b c d c
A. Radix Sort B. BFS C. Recursion D. None.
51 Stack is not used in a b c d d
A. Compilers
B. System Programming
C. Operating system
D. Process scheduling .
52 The following operations are shown a b c d b
1. ^ ( exponential ) ,
2. * , / ( Multiplication or division ).
3. + ,- ( addition or subtraction ).
Then the Operator precedence is
A. 1,3,2 B. 1,2,3 C. 3,2,1 D. none.
53 For the Infix operation (A+B ) * ( C- D ) post fix a b c d a
operation is
A. AB+ CD-* B. * + AB – CD C. Both D. None.
54 Prefix operation of a b c d a
A - B/C * D $ E is .
A. - / * $ ACBDE
B. – ABCD * $ DE
C. – A/BC * C $ DE
D. None.
55 Reverse Polish Notation is often called as a b c d a
A. Post Fix B. Prefix C. Infix D. None.
56 Which of the following statements are wrong a b c d d
related to queue.
A. All insertions to the queue are made at Rear
or Tail .
B. All deletions from the queue are made at
Front or Head.
C. An insertion operation is known as Enqueuing
a queue and deletion operation is referred as
Dequeuing a queue.
D. Queue operates in LIFO principle.
57 The queues are implemented in a b c d c
A. Static implementation ( using arrays ).

New Section 270 Page 4


A. Static implementation ( using arrays ).
B. Dynamic Implementation ( Using pointers ).
C. Both A&B
D. None of the above.
58 In -------------implementation of queue we have to a b c d c
declare the size of the array at design time or
before the processing starts.
A. Static B. Dynamic C. Both D. None.
59 Which of the following data structure may give a b c d a
overflow error , even though the current number
of element in it is less than the size
A. Queue B. Circular space C. Stack D. None.
60 A linear list in which elements can be added or a b c d b
deleted at either end but not in the middle is .
A. Queue B. Dequeue C. Stack D. Tree.
61 In Dequeue the following are the list of four a b c d d
operations.
1. Insertion of an element at the REAR end of the
queue.
2. Deletion of an element from the FRONT end of
the queue.
3. Insertion of an element at the FRONT end of
the queue.
4. Deletion of an element at the REAR end of the
queue. For Input restricted and out put restricted
modes the operations can be performed are .
A. 1,2,3 and 1,2,3,4
B. 1,2,3,4 and 2,3,4
C. 1,2,3,4 and 1,3,4
D. 1,2,3,4 and 1,2,3,
62 Insert operation on queue has to be done a b c d a
after -----testing .
A. Over flow B. Memory space C. Under flow D.
None .
63 In empty queue rear and front can be initialized a b c d a
as . A. R = F = -1
B. R = F = 1
C. R = 0 , F =1
D. R = -1 , F = 0 .
64 What is the prototype property of Priority a b c d a
queue.
A. Time sharing
B. Batch processing
C. Multitasking
D. None .
65 The number of characters in the string correct a b c d b
and Correct string are .
A. 7 , 13 B. 7 , 14 C. 1, 3 D. 1,2 .
66 A linear Queue suffers from the draw back of a b c d a
A. QUEUE_FULL
B. QUEUE-NULL
C. QUEUE_VOID
D. NONE
67 Which of the following statements are true a b c d d
related to linked lists.
A. The two parts of a node are Info part and
address pointer.
B. Info part stores the information and address
or pointer part which holds the address of the
next element of same type.
C. Advantages of Linked lists are dynamic data

New Section 270 Page 5


C. Advantages of Linked lists are dynamic data
structure , efficient utilization of memory and
insertion and deletion can be done easily.
D. All of the above.
68 Which is not a form of linked list. a b c d d
A. Single linked list
B. Double linked list
C. Circular Linked list
D. Double ended linked list.
69 The max no of nodes on level L of a binary Tree a b c d a
is A. 2 ^ L-1 B. 2 ^ L C. 2 – L D. none.
70 The max no of nodes in a binary tree of Height a b c d a
H is A. 2^ H -1 B. 2^ H C. 2 H D. H
71 Which of the following statements are true a b c d d
related to traversals in tree
A. PREORDER TRAVERSAL ( ROOT , LEFT
SUBTREE , RIGHT SUBTREE )
B. POST ORDER TRAVERSAL ( LEFT SUB TREE ,
RIGHT SUBTREE , ROOT )
C. INORDER TRAVERSAL ( LEFT SUBTREE , ROOT ,
RIGHT SUBTREE )
D. All of the above.
72 BFT uses ------------ for Traversing and DFT a b c d c
uses ---------- for Traversing .
A. Queues , Lists
B. Stacks , queues
C. Queues , stacks
D. None.
73 The Depth of the Complete Binary Tree with n a b c d a
nodes is
A. Log2 (n + 1 )
B. Log 2 ( 2n )
C. Log2 ( n -1 )
D. none.
74 A circular list can be used to represent . a b c d d
A. Stack B. Queue C. Tree D. Both A&B
75 A list with no nodes is called a b c d b
A. Error list
B. Empty list
C. Unique list
D. None
76 Merge Sort is a sorting technique based on true false true
divide and conquer method
77 What is the full form of DBMS? a b c d b
a) Data of Binary Management System
b) Database Management System
c) Database Management Service
d) Data Backup Management System
78 What is a database? a b c d c
a) Organized collection of information that cannot
be accessed, updated, and managed
b) Collection of data or information without
organizing
c) Organized collection of data or information that
can be accessed, updated, and managed
d) Organized collection of data that cannot be
updated.
79 What is DBMS? a b c d d
a) DBMS is a collection of queries
b) DBMS is a high-level language

New Section 270 Page 6


b) DBMS is a high-level language
c) DBMS is a programming language
d) DBMS stores, modifies and retrieves data
80 Who created the first DBMS? a b c d b
a) Edgar Frank Codd
b) Charles Bachman
c) Charles Babbage
d) Sharon B. Codd
81 Which type of data can be stored in the database? a b c d d
a) Image oriented data
b) Text, files containing data
c) Data in the form of audio or video
d) All of the above.
82 In which of the following formats data is stored in a b c d c
the database management system?
a) Image b) Text c) Table d) Graph.
83 Which of the following is not an example of DBMS? a b c d d
a) MySQL b) Microsoft Access c) IBM DB2 d)
Google.
84 Which of the following is not a feature of DBMS? a b c d c
a) Minimum Duplication and Redundancy of Data
b) High Level of Security
c) Single-user Access only
d) Support ACID Property.
85 Students and courses enrolled is an example of a b c d d
( A) One to one relation
( B) many to one relation
(C) one to many relation
(D) Many to many relation .
86 Relations produced from an E-R model will a b c d a
always be in (A) 1NF (B) 2NF (C) 3NF (D) 4BF.
87 E- R modelling technique is a ----------approach a b c d a
(A) Top down (B) bottom up (C) left Right (D)
None.
88 The employee Salary should not be greater than a b c d a
Rs 2000 . This is
(A) Integrity constraint
(B) Referential constraint
(C) Over defined constraint
(D) None.
89 Which of the following is not a logical data a b c d d
base
(A) Tree (B) Relational (C) Network (D) Chain.
90 The conditions immediately outside the system a b c d c
is called
(A) Boundary (B) Interface (C) Environment (D)
None .
91 A graphical representation of an information a b c d b
system is called
(A) Flow chart
(B) Data Flow diagram
(C) Pictogram
(D) None.
92 A word processor designed for programmers is a b c d a
called (A) an editor
(B) A formatter
(C) A debugger
(D) None of these .
93 Which of the following statements are true . a b c d c

New Section 270 Page 7


93 Which of the following statements are true . a b c d c
1. Known facts that can be stored or recorded is
called data.
2. Two types of data are persistent data and
Transient date .
a. 1 is true b. 2 is true c. 1 & 2 are true d.
none.
94 Which provides efficient , reliable , convenient data storage data base data none data base
and safe storage of and access to massive dump
amounts of persistent data is called
95 The person who builds the DBMS data base data base data base data base data base
implementer designer applicatio administr implementer
n ator
developer
96 Person responsible for preparing external data base data base data base data base data base
schemas for applications , identifying and implementer designer applicatio administr designer
integrating user needs into conceptual schema n ator
developer
97 Person responsible for implementing data base data base data base data base data base data base
application programs that facilitates data access implementer designer applicatio administr application
for end users n ator developer
developer
98 Person responsible for define the internal data base data base data base data base data base
schema, sub schemas and mapping between implementer designer applicatio administr administrator
schemas , monitoring data base usage and n ator
supervising DBMS functionality developer
99 End users are casual users parametri both none both
c users
100 Occasional unanticipated access to data base is casual users parametri both none casual users
related with c users
101 Users who query and update the data base casual users parametri both none parametric
through fixed programs c users users
102 ______ provides mechanism for defining data data model data data schema data model
structures and operations for retrieval and design structures
modification of data
103 The overall design of the data base or data model data data schema schema
description of data in terms of a data model is design structures
called
104 Data abstraction in DBMS contains 2 levels 3 levels 7 levels none 3 levels
105 Lowest level of data abstraction in DBMS physical level middle logical view physical level
level level level
106 The data is actually stored in physical level middle logical view physical level
level level level
107 The middle level of data abstraction in DBMS physical level middle logical view logical level
level level level
108 Each record is described by a type definition physical level middle logical view logical level
and the interrelation ships in level level level
109 Highest level of data abstraction is physical level middle logical view view level
level level level
110 Several views of the data base are defined and physical level middle logical view view level
data base uses these views at level level level
111 The level provides a security mechanism to physical level middle logical view view level
prevent users from accessing certain parts of the level level level
data base is
112 Logical design of the data base and a data base data model data data schema schema
instance is a snap shot of the data in the data design structures
base at a given instant of time is

New Section 270 Page 8


base at a given instant of time is
113 Relational Schema contains attributes and their true false true
corresponding domains .
114 Types of schemas physical or logical or external all of the all of the
internal conceptu or view above above
schema al schema schema
115 Data independence is /are logical data physical both none both
independence data
independ
ence
116 _____refers to the immunity of the external logical data physical both none logical data
schema to changes in the conceptual schema indepenedence data indepnedence
independ
ence
117 ____________refers to the immunity to the logical data physical both none physical data
conceptual schema to change the internal indepenedence data independence
schema is independ
ence
118 select the functions of DBMS a b c d d
1. Concurrency control
2. Back up and recovery
3. redundancy management
4. access control
5. Performance optimization
6. meta data management
7. Active features like rules and triggers .
a. 1,2,3,4
b. 1,3,4,5,6
c. 2,3,4,7
d. 1,2,3,4,5,6,7
119 _____________is Responsible for ensuring concurrency back up redundan access concurrency
correctness of competing accesses to same data control and cy control control
recovery managem
ent
120 ___________Facilitates for recovering from hard concurrency back up redundan access back up and
ware and software failures control and cy control recovery
recovery managem
ent
121 ___________performs Storing several copies of concurrency back up redundan access redundancy
data control and cy control management
recovery managem
ent
122 _____________is responsible for enforcing concurrency back up redundan access access control
security and authorisation control and cy control
recovery managem
ent
123 In a Multiuser data base access control is true false true
Mandatory .
124 Performing physical reorganizations to enhance true false true
performance eg adding index , dropping index ,
sorting file is known as Performance
optimization
125 Meta data means Data about data true false true
126 Types of data models are a b c d d
a. Hierarchical model
b. Network model
c. Relational model
d. all of the above.
127 RDBMS means relational data base management true false true

New Section 270 Page 9


127 RDBMS means relational data base management true false true
system .
128 Data must be available in tabular form where true false true
each table contains rows and columns in
RDBMS
129 In RDBMS relation is table column of row of a none table
a table table
130 In RDBMS attribute is table column of row of a none column of a
a table table table
131 In RDBMS degree means no of no of rows in a none no of
attributes in a tuples in a table attributes in
relation table a relation
132 In RDBMS cardinality means no of no of rows in a none no of tuples
attributes in a tuples in a table in a table
relation table
133 In RDBMS Tuple means row column table none row
134 In RDBMS a pool of values from which specific degree domain or cardinality none domain or
attributes draw their values is known as type type
135 In RDBMS --------- refers to unknown undefined both none both
136 Mechanism for defining data structures , true false true
operations for retrieval and modification of data
and integrity constraints is called Relational data
model .
137 An attribute or set of attributes whose values domain type key none key
uniquely identify each entity in an entity set is
called
138 A set of one or more attributes that allows us to super key candidate both none super key
identify uniquely an entity in the entity set is key
known as
139 __________ key is a column, or set of columns, in a super key candidate both none candidate key
table that can uniquely identify any database record key
without referring to any other data
140 The most minimal subset of fields that uniquely super key candidate both none candidate key
identifies a tuple is ------ key
141 The set of fields that contains a key. super key candidate both none super key
key
142 A candidate key that is chosen by the data base primary set child set foreign none primary set
designers as the principle means of identifying key
entities within an entity set is called
143 The primary key from one table that appears as super key candidate foreign none foreign key
a field in another is called key key
144 ER model means Entity relationship model . true false true
145 In E -R model anything that exists and can be entity attribute tuple none entity
distinguished is called
146 A group of similar entities are called tuple entity set primary none entity set
set
147 An entity set may not have sufficient attributes weak entity set strong not none weak entity
to form a primary key is called entity set existing set
148 An entity set that has a primary key is called weak entity set strong not none strong entity
entity set existing set
149 Properties that describes the entity are relations keys attributes none attributes
150 Types of attributes a b c d d
a. Composite attributes
b. Derived attributes and descriptive attributes
c. single valued attributes and multi valued
attributes

New Section 270 Page 10


attributes
d. All of these
151 In ER model Rectangle represents entity attribute relation none entity
152 In ER model Diamond represents entity attribute relation none relation ship
ship
153 In ER model ellipse represents entity attribute relation none attribute
ship
154 In ER model double ellipse represents Multivalued derived both none Multivalued
attribute attribute attribute
155 In ER model Dashed ellipse represents Multivalued derived both none derived
attribute attribute attribute
156 Entity sets to entity set relation ship is denoted line circle dot none line
by a
157 Double line representation in ER model is total true false true
participation of an entity in a relation ship .
158 Types of relations exists between entity to entity a b c d d
sets
a. One to one
b. One to many
c. Many to many
d. all
159 The process of designing subgrouping within an true false true
entity set is called specialization.
160 Specialization is ---------- design process top down bottom left right right left top down
up
161 Union of lower entity types to produce higher true false true
entity sets is called Generalization.
162 Database __________ , which is the logical design of a b c d d
the database, and the database _______,which is a
snapshot of the data in the database at a given
instant in time.
(A) Instance, Schema
(B) Relation, Schema
(C) Relation, Domain
(D) Schema, Instance.
163 Which one of the following is a set of one or more a b c d c
attributes taken collectively to uniquely identify a
record?
(A) Candidate key
(B) Sub key
(C) Super key
(D) Foreign key
164 Fifth Normal form is concerned with a b c d c
(A) Functional dependency
(B) Multivalued dependency
(C) Join dependency
(D) Domain key
165 If the state of the database no longer reflects a real a b c d d
state of the world that the database is supposed to
capture, then such a state is called
(A) Consistent state
(B) Parallel state
(C) Durable state
(D) Inconsistent state
166 Which view that contains more than one table in a b c d c
the top level FROM clause of the SELECT statement:
(A) Join view
(B) Datable join view
(C) Updatable join view

New Section 270 Page 11


(C) Updatable join view
(D) All of the mentioned
167 Which of the following protocols ensures conflict a b c d b
serializability and safety from deadlocks?
(A) Two phase locking protocol
(B) Time stamp ordering protocol
(C) Graph based protocol
(D) Both (a) and (b) above
168 A unit of storage that can store one or more records a b c d a
in a hash file organization is denoted as
(A) Buckets (B) Disk pages (C) Blocks (D) Nodes
169 When two inputs that we desire to pipeline into the a b c d d
join are not already sorted it is the _____________
technique.
(A) Hash join
(B) Buffer join
(C) double pipelined hash join
(D) double pipelined join
170 A Database Management System (DBMS) is a b c d d
Collection of
a. programs to access data
b. Collection of data describing one particular
enterprise
c. Collection of interrelated data
d. All of these
171 Which failure includes the case of deadlock or a b c d a
resource unavailability?
a. Transaction failure
b. System Crash
c. Disk Failure
d. None of these
172 Which of the following is not type of class? a b c d c
a. Abstract Class
b. Final Class
c. Start Class
d. String Class
173 In data-flow diagram, ____ shows the direction of a b c d d
data flow and their name describing the data
flowing along that path.
a. rounded rectangle
b. rectangles
c. circles
d. arrows
174 When a program is abnormally terminated, the a b c d b
equivalent of a ______ command occurs.
a. Commit b. Rollback c. Quit d. Exit
175 Abstraction can apply to a b c d a
a. Control and data
b. Only data
c. Only control
d. Classes
176 Which aggregate function gives the arithmetic mean a b c d b
for the specific column?
a. COUNT b. AVG c. MIN d. SUM
177 Which of the following is used in the application a b c d a
programs to request data from the database
management system?
a. data manipulation language
b. data definition language
c. data control language

New Section 270 Page 12


c. data control language
d. None of these
178 Which of the following commands is used to save a b c d a
any transaction permanently into the database?
a. commit
b. roll back
c. Save point
d. None of these
179 In the relation model, the relation are generally a b c d d
termed as
a. tuple b. Attributes c. rows d. tables
180 The architecture of a database can be viewed as the a b c d c
a. one level
b. two level
c. three level
d. Four level
181 Which of the following keys is generally used to a b c d b
represents the relationships between the tables?
a. primary key
b. Foreign key
c. Candidate key
d. None of these
182 Which of the following is not an object oriented a b c d d
programming (OOPs) concept
a. encapsulation
b. polymorphism
c. Inheritance
d. Exception
183 Which feature of object oriented programming a b c d c
(OOPs) described the reusability of code?
a. encapsulation
b. polymorphism
c. Inheritance
d. Exception
184 Which feature of object oriented programming a b c d c
(OOPS) derives the class from another class?
a. encapsulation
b. polymorphism
c. Inheritance
d. Exception
185 Which operator from the following can be used to a b c d a
illustrate the feature of polymorphism?
a. Overloading <<
b. Overloading &&
c. Overloading ||
d. Overloading +=
186 Which member of the superclass is never accessible a b c d c
to the subclass?
a. Public member
b. Protected member
c. Private member
d. Private member & protected member
187 A program in execution is called a b c d a
a. Process b. instruction c. procedure d. function
188 Generalization is ------ design process . a b c d b
a. top down
b. Bottom up
c. Left to right
d. None.
189 The abstraction through which relationships are true false true

New Section 270 Page 13


189 The abstraction through which relationships are true false true
treated as higher level entities is known as
Aggregation .
190 A finite no of relation schemas and a set of true false true
integrity constraints is known as Relational
data base schema .
191 Collection of relational instances satisfying the a b c d b
integrity constraints is known as
a. Data base design
b. Data base instance
c. Data flow
d. None
192 Necessary conditions to be satisfied by the data a b c d a
values in the relational instances so that the set
of data values constitute a meaningful data base
is
a. Integrity constraints
b. Domain constraints
c. Key constraints
d. entity integer constraints
193 The value of the attribute must be within the a b c d b
domain is
a. Integrity constraints
b. Domain constraints
c. Key constraints
d. entity integer constraints
194 Primary key of a relation should not contain null a b c d d
values
a. Integrity constraints
b. Domain constraints
c. Key constraints
d. entity integrity constraints
195 In relational data base design the process for a b c d b
organizing data to minimize redundancy is known
as
a. Generalization
b. Normalization
c. Aggregation
d. None.
196 If the Domains of each attribute of the relation a b c d a
are atomic in ----form
a. 1NF b. 2 NF c. 3 NF d. 4 NF
197 Multivalued attributes are disallowed in a b c d a
a. 1NF b. 2 NF c. 3 NF d. 4 NF
198 A constraint that describes the relationship true false true
between attributes in a relation is known as
Functional dependency
199 The Main disadvantage of 1NF is a b c d b
a. Low redundancy
b. High redundancy
c. No redundancy
d. None
200 A nonprime attribute is functionally dependent on true false true
part of a candidate key is known as Partial
dependency .
201 A nonprime attribute is an attribute that's not part a b c d c
of any -------- key
a. Primary key
b. Foreign key
c. Candidate key

New Section 270 Page 14


c. Candidate key
d. None
202 A relation should be in 1 NF and relation should 2 normal form 3 normal 4 normal 5 normal 2 normal form
not contain any partial dependency is in form form form
203 2 normal Form is based on full functional true false true
dependency .
204 A relation is in 2NF and no non key attribute is 2 normal form 3 normal 4 normal 5 normal 3 normal form
transitively dependent on the primary Key is form form form
known as
205 BCNF means Boyce codd Normal form true false true
206 4 NF is mainly concerned with Multivalued true false true
dependency .
207 Project Join Normal form is 2 normal form 3 normal 4 normal 5 normal 5 normal
form form form form
208 Create , Alter , Drop are --------languages a b c d b
a. DML b. DDL c. DCL d. None
209 Insert , Select , Update , Delete are examples a b c d b
of ------------
a. DDL b. DML c. DCL d. None
210 Grant , Revoke are examples of a b c d c
a. DDL b. DML c. DCL d. None
211 Commit , Roll back are examples of a b c d c
a. DDL b. DML c. TCL d. None
212 Sorting the result of a query in a specific order group by order by having where order by
whether ascending or descending we use -----
clause
213 Divide the result set into groups we use ----- group by order by having where group by
clause
214 To set the conditions for the Group by clause group by order by having where having
we use ------clause
215 ______________clause kept conditions on rows group by order by having where where
216 Sum , AVG , COUNT , Min , Max are examples of a b c d a
a. aggregate function
b. Transaction function
c. both
d. None
217 Collection of operations involving data items true false true
Involving data items in a data base is known as
Transaction
218 The Properties of Transaction management a b c d d
1. Atomicity
2. Consistency
3. Isolation
4. Durability
a. 1,2,3
b. 2,3,4
c. 1,3,4
d. 1,2,3,4
219 Which normal form is considered adequate for a b c d b
relational data base design
a. 2NF b. 3NF c. 4NF d. BCNF
220 The column of a table is referred as a b c d b
a. Tuple b. Attribute c. entity d. Degree
221 The set of permitted values for each attribute is a b c d c
called its
a. attribute set
b. attribute range

New Section 270 Page 15


b. attribute range
c. domain
d. group
222 E- R modelling technique is a a b c d a
a. Top down approach
b. bottom up approach
c. Left right approach
d. none
223 Redundancy is dangerous as it is a potential a b c d d
threat to data
a. Integrity
b. consistency
c. sufficiency
d. both integrity and consistency
224 The employee salary should not be greater than a b c d a
Rs2000 is
a. Integrity constraint
b. Referential constraint
c. Over defined constraint
d. desirable constraint .
225 Manager’s salary details are hidden from the a b c d c
employee this is
a. Conceptual level data hiding
b. Physical level data hiding
c. External level data hiding
d. None
226 Generally speaking for a weak entity set to be a b c d a
meaningful it must be a part of
a. One to one relationship
b. One to many relationship
c. Many to one relationship
d. none
227 If a relation scheme is in BCNF then it is also in a b c d d
a. 1NF b. 2NF c. 3 NF d. All
228 Data Independency in DBMS is known as a b c d a
a. Data modelling
b. data hiding
c. data capturing
d. Data consistency
229 The Data base environment has all of the a b c d b
following components except
a. users
b. separate files
c. data base
d. database administration
230 The way a particular application views the data a b c d d
form the data base that the application uses is a
a. module
b. Relational
c. Schema
d. Subschema
231 What does the data dictionary identify a b c d d
a. Field names
b. Field Types
c. Filed format
d. all
232 Relations produced from an ER model will always a b c d c
be in
a. 1NF b. 2NF c. 3 NF d. 4 NF
233 Student and courses enrolled is an example of a b c d d

New Section 270 Page 16


233 Student and courses enrolled is an example of a b c d d
a. one to one relation
b. One to many relation
c. many to one relation
d. many to many relation
234 The feature by which one object can interact with a b c d b
another object is _____________
a) Message reading
b) Message Passing
c) Data transfer
d) Data Binding.
235 What is encapsulation in OOP? a b c d a
a) It is a way of combining various data members
and member functions that operate on those data
members into a single unit
b) It is a way of combining various data members
and member functions into a single unit which can
operate on any data
c) It is a way of combining various data members
into a single unit
d) It is a way of combining various member
functions into a single unit.
236 Which of the following is not true about a b c d b
polymorphism?
a) Helps in redefining the same functionality
b) Increases overhead of function definition always
c) It is feature of OOP
d) Ease in readability of program
237 Which of the following is not an OOPS concept? a b c d c
a. Encapsulation
b. Polymorphism
c. Exception
d. Abstraction.
238 Which feature of OOPS described the reusability of a b c d d
code?
a. Abstraction
b. Encapsulation
c. Polymorphism
d. Inheritance.
239 Object is ____ abstraction a b c d c
a. Object b. Logical c. Real d. Hypothetical
240 Association among several entities is called a b c d b
a. Extraction
b. Relationship
c. Combination
d. Association
241 What is the programming style of the object a b c d c
oriented conceptual model?
a. Invariant relationships
b. Algorithms
c. Classes and objects
d. Goals, often expressed in a predicate calculus
242 The SQL command _____ is used to withdraw a b c d b
privileges on specific user accounts.
A. REMOVE B. REVOKE C. ROLE D. GRANT
243 What is the purpose of back up protection? a b c d d
a. To increase the speed
b. To increase the reach
c. To leave no blind spot
d. To guard against failure of primary

New Section 270 Page 17


244 Finding the location of the element with a given a b c d b
value is
a. Traversal b. Search c. Sort d. None of these
245 Who invented OOP? a b c d c
a) Andrea Ferro
b) Adele Goldberg
c) Alan Kay
d) Dennis Ritchie
246 Which is not a feature of OOP in general definitions? a b c d d
a) Efficient Code
b) Code reusability
c) Modularity
d) Duplicate/Redundant data
247 Which was the first purely object oriented a b c d b
programming language developed?
a) Kotlin b) Small Talk c) Java d) C++
248 Which header file is required in C++ to use OOP? a b c d a
a) OOP can be used without using any header file
b) stdlib.h
c) iostream.h
d) stdio.h
249 Which among the following doesn’t come under a b c d c
OOP concept?
a) Data hiding
b) Message passing
c) Platform independent
d) Data binding
250 The feature by which one object can interact with a b c d b
another object is _____________
a) Message reading
b) Message Passing
c) Data transfer
d) Data Binding
251 Encapsulation in OOP means True False True
bundling data and methods into a single unit.
252 Which of the following is not true about a b c d b
polymorphism?
a) Helps in redefining the same functionality
b) Increases overhead of function definition always
c) It is feature of OOP
d) Ease in readability of program
253 What is an abstraction in object-oriented a b c d a
programming?
a) Hiding the implementation and showing only the
features
b) Hiding the important data
c) Hiding the implementation
d) Showing the important data
254 In which access should a constructor be defined, so a b c d c
that object of the class can be created in any
function?
a) Any access specifier will work
b) Private
c) Public
d) Protected
255 The copy constructors can be used to ________ a b c d c
a) Copy an object so that it can be passed to
another primitive type variable
b) Copy an object for type casting
c) Copy an object so that it can be passed to a

New Section 270 Page 18


c) Copy an object so that it can be passed to a
function
d) Copy an object so that it can be passed to a class
256 Which among the following represents correct a b c d b
constructor?
a) –classname()
b) classname()
c) ()classname
d) ~classname()
257 What happens when an object is passed by a b c d c
reference?
a) Destructor is called at end of function
b) Destructor is called when called explicitly
c) Destructor is not called
d) Destructor is called when function is out of scope
258 Which access specifier is usually used for data a b c d b
members of a class?
a) Protected b) Private c) Public d) Default
259 How to access data members of a class? a b c d d
a) Dot, arrow or direct call
b) Dot operator
c) Arrow operator
d) Dot or arrow as required
260 Which feature of OOP reduces the use of nested a b c d a
classes?
a) Inheritance
b) Binding
c) Abstraction
d) Encapsulation
261 Which keyword among the following can be used to a b c d c
declare an array of objects in java?
a) allocate b) arr c) new d) create
262 Which operator can be used to free the memory a b c d d
allocated for an object in C++?
a) Unallocate b) Free() c) Collect d) delete
263 Which of the following is not a property of an a b c d b
object?
a) Properties b) Names c) Identity d) Attributes
264 Single level inheritance supports _____________ a b c d d
inheritance.
a) Language independency
b) Multiple inheritance
c) Compile time
d) Runtime
265 Software is defined as ___________ a b c d a
a) set of programs, documentation & configuration
of data
b) set of programs
c) documentation and configuration of data
d) None of the mentioned.
266 What is Software Engineering? a b c d c
a) Designing a software
b) Testing a software
c) Application of engineering principles to the design
a software
d) None of the above
267 Which of the following language was developed as a b c d a
the first purely object programming language?
a. Small Talk b. C++ c. Kotlin d. Java.
268 The longest method of conversion is called a b c d d

New Section 270 Page 19


268 The longest method of conversion is called a b c d d
(A) Direct (B) Parallel (C) Pilot (D) Phased.
269 In What manner coding and testing are done a b c d c
(A) Top- Down
(B) Bottom up
(C) both A & B
(D) Adhoc .
270 Data Flow diagram (DFD ) shows a b c d d
(A) Flow of data
(B) Processes
(C) Areas where they are stored
(D) All .
271 Which are the tools not used for System analysis a b c d a
(A) System test data
(B) Decision Table
(C) Data Flow diagram
(D) Flow charts.
272 The first phase of Software development is a b c d a
(A) Requirement analysis
(B) Design
(C) coding
(D) Testing.
273 What are the characteristics of software? a b c d d
a. Software is developed or engineered; it is not
manufactured in the classical sense.
b. Software doesn’t wear out .
c. Software can be custom built or custom build.
d. All mentioned above
274 Compilers, Editors software come under which type a b c d a
of software?
a. System software
b. Application software
c. Scientific software
d. None of the above.
275 RAD Software process model stands for _____ a b c d a
a. Rapid Application Development.
b. Relative Application Development.
c. Rapid Application Design.
d. Recent Application Development.
276 Software project management comprises of a a b c d d
number of activities, which contains _________.
a. Project planning
b. Scope management
c. Project estimation
d. All
277 Which of the following is not defined in a good a b c d d
Software Requirement Specification (SRS)
document?
a. Functional Requirement.
b. Nonfunctional Requirement.
c. Goals of implementation.
d. Algorithm for software implementation.
278 What is the simplest model of software a b c d d
development paradigm?
a. Spiral model
b. Big Bang model
c. V-model
d. Waterfall model
279 Which method is used for evaluating the expression a b c d a
that passes the function as an argument?

New Section 270 Page 20


that passes the function as an argument?
a. Strict evaluation
b. Recursion
c. Calculus
d. Pure functions
280 Requirement engineering process includes which of a b c d d
these steps?
a. Feasibility study
b. Requirement Gathering
c. Software Requirement specification & Validation
d. All
281 COCOMO model is ________ . a b c d b
a. Common Cost Estimation Model.
b. Constructive Cost Estimation Model.
c. Complete Cost Estimation Model.
d. Comprehensive Cost estimation Model
282 Software Requirement Specification (SRS) is also a b c d d
known as specification of _______.
a. White box testing
b. Acceptance testing
c. Integrated testing
d. Black box testing
283 If requirements are easily understandable and a b c d b
defined then which model is best suited?
a. Spiral model
b. Waterfall model
c. Prototyping model
d. None of the above
284 CASE Tool stands for. a b c d a
a. Computer Aided Software Engineering
b. Component Aided Software Engineering
c. Constructive Aided Software Engineering
d. Computer Analysis Software Engineering
285 Software is defined as ____ . a b c d d
a. Instructions
b. Data Structures
c. Documents
d. All of the above
286 FAST stands for ______ . a b c d c
a. Facilitated Application Software Technique.
b. Functional Application Software Technique.
c. Facilitated Application Specification Technique.
d. None of the above.
287 Which may be estimated either in terms of KLOC a b c d a
(Kilo Line of Code) or by calculating number of
function points in the software?
a. Time estimation
b. Effort estimation
c. Cost estimation
d. Software size estimation
288 What is described by means of DFDs as studied a b c d a
earlier and represented in algebraic form?
a. Data flow
b. Data storage
c. Data Structures
d. Data elements
289 Which document is created by system analyst after a b c d a
the requirements are collected from Various
stakeholders?
a. Software requirement specification
b. Software requirement validation

New Section 270 Page 21


b. Software requirement validation
c. Feasibility study
d. Requirement Gathering
290 What is the most common measure for correctness? a b c d a
a. Defects per KLOC
b. Errors per KLOC
c. $ per KLOC
d. Pages of documentation per KLOC
291 Which tools are used in implementation, testing and a b c d c
maintenance?
a. Upper case tools
b. Integrated case tools
c. Lower case tools
d. None of the above
292 Which model is also known as Verification and a b c d c
validation model?
a. Waterfall model
b. Big Bang model
c. V-model
d. Spiral model
293 Match the List 1 to List 2 and choose the correct a b c d d
option.
1. Requirement Elicitation ----- a. Module
Development and integration.
2. Design---------b. Analysis
3. Implementation--------c. Structure and
behavioural
4. Maintenance ---------- d. Performance tuning.
a. 1-c , 2-a , 3-d , 4-b
b. 1-c , 2-a , 3-b , 4-d
c. 1-a , 2-c , 3-d , 4-b
d. 1-b , 2-c , 3-a , 4-d
294 A generic process framework for software a b c d b
engineering encompasses five activities. What are
those activities?
a. Communication, risk management,
measurement, production, deployment.
b. Communication, Planning, Modelling,
construction, deployment.
c. Analysis, designing, programming, debugging,
maintenance
d. None of the above.
295 Who deliver the technical skills that are necessary to a b c d b
engineer for a product or an application?
a. Project managers
b. Practitioners
c. Customers
d. End users
296 Project risk factor is considered in which model? a b c d a
a. Spiral model.
b. Waterfall model.
c. Prototyping model
d. None of the above.
297 Which model is not suitable for large software a b c d a
projects but good one for learning and
experimenting?
a. Big Bang model
b. Spiral model
c. Iterative model
d. Waterfall model
298 Which tools are helpful in all the stages of SDLC, for a b c d c

New Section 270 Page 22


298 Which tools are helpful in all the stages of SDLC, for a b c d c
requirement gathering to testing and
documentation?
a. Upper case tools
b. Lower case tools
c. Integrated case tools
D. none of the above.
299 Which phase is refers to the support phase of a b c d c
software development?
a. Acceptance Phase.
b. Testing.
c. Maintenance.
d. None of the above.
300 Which model is also called as the classic life cycle or a b c d b
the Waterfall model?
a. Iterative Development
b. Linear Sequential Development
c. RAD Model.
d. Incremental development
301 The tools that support different stages of software a b c d a
development life cycle are called as ______ .
a. CASE Tools
b. CAME tools
c. CAQE tools
d. CARE tools
302 Find out which phase is not available in SDLC? a b c d d
a. Coding
b. Testing
c. Maintenance
d. Abstraction
303 Which of the following is/are considered a b c d d
stakeholder in the software process?
a. Customers
b. End-users
c. Project managers
d. All of the above.
304 First level of prototype is evaluated by ______ . a b c d c
a. Developer b. Tester c. User d. System Analyst
305 Line of code(LOC) of the product comes under a b c d b
which type of measures?
a. Indirect measures
b. Direct measures
c. Coding
d. None of the above.
306 What is the main aim of Software engineering? a b c d c
a. Reliable software
b. Cost effective software
c. Reliable and cost effective software
d. None of the above
307 Where is the prototyping model of software a b c d c
development well suited?
a. When requirements are well defined.
b. For projects with large development teams.
c. When a customer cannot define requirements
clearly.
d. None of the above.
308 Grouping of all functionally related elements is a b c d a
known as ______ .
a. Cohesion
b. Coupling
c. Both A & B

New Section 270 Page 23


c. Both A & B
d. None of the above
309 Design phase is followed by ______ . a b c d b
a. Coding
b. Testing
c. Maintenance
d. None of the above.
310 Which depicts flow of control in program modules? a b c d a
a. Flowchart
b. DFD
c. Both A & B
d. None of the above
311 From the following methods which size of the a b c d c
software product can be calculated?
a. Counting the lines of delivered code
b. Counting delivered function points
c. Both A and B
d. None of the above
312 Spiral model is a combination of both Iterative true false true
model and one of the SDLC model.
313 The software becomes more popular if its user a b c d d
interface is __________ .
a. Attractive
b. Simple to use
c. Responsive in short time
d. All mentioned above
314 Knowledge of software program, design and a b c d b
structure is essential in _______ .
a. Black-box testing
b. White-box testing
c. Integration testing
d. None of the above
315 Alpha and Beta Testing are forms of _______ . a b c d a
a. Acceptance testing
b. Integration testing
c. System Testing
d. Unit testing
316 The model in which the requirements are a b c d a
implemented by its category is ______ .
a. Evolutionary Development Model
b. Waterfall Model
c. Prototyping
d. Iterative enhancement Model
317 Software consists of ______ a b c d b
a. Set of instructions + operating procedures
b. Programs + documentation + operating
procedures
c. Programs + hardware manuals
d. Set of programs
318 Which is the most important feature of spiral a b c d b
model?
a. Quality management
b. Risk management
c. Performance management
d. Efficiency management
319 One of the fault base testing techniques is ______ . a b c d d
a. Unit Testing
b. Beta Testing
c. Stress Testing
d. Mutation Testing

New Section 270 Page 24


d. Mutation Testing
320 The process of developing a software product using a b c d c
software engineering principles and methods is
referred to as, _______ .
a. Software myths
b. Scientific Product
c. Software Evolution
d. None of the above
321 The testing is performed by the selected a b c d a
customer and experts at the development site is
a. alpha testing b. Beta testing c. both d. none.
322 The testing is performed by the customer in a b c d b
actual live environment at the development time
is
a. alpha testing b. Beta testing c. both d. none.
323 In data-flow diagram, ____ shows the direction of a b c d d
data flow and their name describing the data
flowing along that path.
a. rounded rectangle
b. rectangles
c. circles
d. arrows
324 Criterion used for judging appropriateness of tool a b c d a
software is
a. Functionality
b. scalability
c. compatibility
d. security.
325 Linux is a b c d d
a. Application software
b. Word processor
c. Database management system
d. Operating software
326 Software is defined as ___________ a b c d a
a) set of programs, documentation & configuration
of data
b) set of programs
c) documentation and configuration of data
d) None of the mentioned.
327 What is Software Engineering? a b c d c
a) Designing a software
b) Testing a software
c) Application of engineering principles to the design
a software
d) None of the above
328 Who is the father of Software Engineering? a b c d b
a) Margaret Hamilton
b) Watts S. Humphrey
c) Alan Turing
d) Boris Beizer
329 What are the features of Software Code? a b c d d
a) Simplicity
b) Accessibility
c) Modularity
d) All of the above
330 ____________ is a software development activity a b c d d
that is not a part of software processes.
a) Validation
b) Specification
c) Development

New Section 270 Page 25


c) Development
d) Dependence
331 ________ is defined as the process of generating a b c d c
analysis and designing documents?
a) Re-engineering
b) Reverse engineering
c) Software re-engineering
d) Science and engineering.
332 The activity that distributes estimated effort across a b c d a
the planned project duration by allocating the effort
to specific software developing tasks is __
a) Project scheduling
b) Detailed schedule
c) Macroscopic schedule
d) None of the mentioned.
333 What is a Functional Requirement? a b c d a
a) specifies the tasks the program must complete
b) specifies the tasks the program should not
complete
c) specifies the tasks the program must not work
d) All of the mentioned
334 Why do bugs and failures occur in software? a b c d c
a) Because of Developers
b) Because of companies
c) Because of both companies and Developers
d) None of the mentioned
335 Attributes of good software is __________ a b c d b
a) Development
b) Maintainability & functionality
c) Functionality
d) Maintainability
336 What does SDLC stands for? a b c d c
a) System Design Life Cycle
b) Software Design Life Cycle
c) Software Development Life Cycle
d) System Development Life cycle
337 Who proposed the spiral model? a b c d a
a) Barry Boehm b) Pressman c) Royce d) IBM
338 ______________ is not among the eight principles a b c d b
followed by the Software Code of Ethics and
Professional Practice.
a) PRODUCT
b) ENVIRONMENT
c) PUBLIC
d) PROFESSION
339 _________ is not a fundamental activity for a b c d d
software processes in software development.
a) Evolution
b) Design and implementation
c) Validation
d) Verification
340 _________ is a software development life cycle a b c d c
model that is chosen if the development team has
less experience on similar projects.
a) Iterative Enhancement Model
b) RAD
c) Spiral
d) Waterfall
341 A description of each function presented in the DFD a b c d b
is contained in a ________

New Section 270 Page 26


is contained in a ________
a) data flow
b) process specification
c) control specification
d) data store
342 What is the first step in the software development a b c d d
lifecycle?
a. System Design
b. Coding
c. System Testing
d. Preliminary Investigation and Analysis
343 Which of the following is an example of Black Box a b c d d
and Functional Processing?
a. First Generation Language
b. Second Generation Language
c. Third Generation Language
d. Fourth Generation Language
344 __________ is identified as fourth generation a b c d a
language.
a. Unix shell b. C++ c. COBOL d. FORTRAN
345 Software maintenance costs are expensive in true false c d true
contrast to software development.
346 Which of the following activities of the generic a b c d a
process framework delivers a feedback report?
a. Deployment
b. Planning
c. Modelling
d. Construction
347 Which of the following refers to internal software a b c d b
equality?
a. Scalability
b. Reusability
c. Reliability
d. Usability
348 ____ is concerned with realizing a software design a b c d d
using an object-oriented programming language.
a. Object oriented analysis
b. Object oriented methods
c. Object oriented design
d. Object oriented programming
349 Which of the following is not an operating system? a b c d c
A. Windows B. Linux C. Oracle D. DOS
350 What is the maximum length of the filename in a b c d c
DOS?
A. 4 B. 5 C. 8 D. 12
351 Which of the following is the extension of Notepad? a b c d a
A. .txt B. .xls C. .ppt D. .bmp
352 What else is a command interpreter called? a b c d c
A. prompt B. kernel C. shell D. command
353 What is the full name of FAT? a b c d b
A. File attribute table
B. File allocation table
C. Font attribute table
D. Format allocation table
354 BIOS is used? a b c d a
A. By operating system
B. By compiler
C. By interpreter
D. By application software

New Section 270 Page 27


355 What is the mean of the Booting in the operating a b c d a
system?
A. Restarting computer
B. Install the program
C. To scan
D. To turn off
356 When does page fault occur? a b c d c
A. The page is present in memory.
B. The deadlock occurs.
C. The page does not present in memory.
D. The buffering occurs.
357 Banker's algorithm is used? a b c d a
A. To prevent deadlock
B. To deadlock recovery
C. To solve the deadlock
D. None of these
358 When you delete a file in your computer, where a b c d a
does it go?
A. Recycle bin
B. Hard disk
C. Taskbar
D. None of these
359 Which is the Linux operating system? a b c d c
A. Private operating system
B. Windows operating system
C. Open-source operating system
D. None of these
360 What is the full name of the DSM? a b c d d
A. Direct system module
B. Direct system memory
C. Demoralized system memory
D. Distributed shared memory
361 What is the full name of the IDL? a b c d a
A. Interface definition language
B. Interface direct language
C. Interface data library
D. None of these
362 What is bootstrapping called? a b c d a
A. Cold boot
B. Cold hot boot
C. Cold hot strap
D. Hot boot
363 If the page size increases, the internal a b c d b
fragmentation is also?
A. Decreases
B. Increases
C. Remains constant
D. None of these
364 Which of the following is a single-user operating a b c d c
system?
A. Windows B. MAC C. Ms-DoS D. None of these
365 The size of virtual memory is based on which of the a b c d c
following?
A. CPU B. RAM C. Address bus D. Data bus
366 Which of the following is not application software? a b c d a
A. Windows 7
B. WordPad
C. Photoshop
D. MS-excel
367 Which of the following supports Windows 64 bit? a b c d a

New Section 270 Page 28


367 Which of the following supports Windows 64 bit? a b c d a
A. Window XP
B. Window 2000
C. Window 1998
D. None of these
368 Which of the following windows does not have a a b c d b
start button?
A. Windows 7
B. Windows 8
C. Windows XP
D. None of these
369 Which of the following operating systems does not a b c d d
support more than one program at a time?
A. Linux B. Windows C. MAC D. DOS
370 Which of the following is a condition that causes a b c d d
deadlock?
A. Mutual exclusion & Hold and wait
B. Circular wait
C. No pre emption
D. All of these
371 Who provides the interface to access the services of a b c d b
the operating system?
A. API
B. System call
C. Library
D. Assembly instruction
372 Where are placed the list of processes that are a b c d b
prepared to be executed and waiting?
A. Job queue
B. Ready queue
C. Execution queue
D. Process queue
373 Who among the following can block the running a b c d d
process?
A. Fork B. Read C. Down D. All of these
374 Which of the following does not interrupt the a b c d d
running process?
A. Timer interrupt
B. Device
C. Power failure
D. Scheduler process
375 What is Microsoft window? a b c d a
A. Operating system
B. Graphics program
C. Word Processing
D. Database program
376 Which of the following is group of programs? a b c d a
A. Accessories B. Paint C. Word D. All of above
377 Which of the following is an example of a Real Time a b c d d
Operating System?
A. MAC
B. MS-DOS
C. Windows 10
D. Process Control
378 Which of the following operating systems do you a b c d d
use for a client-server network?
A. MAC B. Linux C. Windows XP D. Windows 2000
379 Which command is used to fetch a group (.doc) of a b c d c
files that have just been deleted?
A. Undelete

New Section 270 Page 29


A. Undelete
B. Undelete/all
C. Undelete *.doc
D. All of above
380 Which of the following is system software? a b c d d
A. Operating system
B. Compiler
C. Utilities
D. All of the above
381 Which program runs first after booting the a b c d d
computer and loading the GUI?
A. Desktop Manager
B. File Manager
C. Windows Explorer
D. Authentication
382 What is the use of directory structure in the a b c d b
operating system?
A. The directory structure is used to solve the
problem of the network connection in OS.
B. It is used to store folders and files hierarchically.
C. It is used to store the program in file format.
D. All of the these
383 What type of scheduling is round-robin scheduling? a b c d c
A. Linear data scheduling
B. Non-linear data scheduling
C. Pre emptive scheduling
D. Non-preemptive scheduling
384 Which conditions must be satisfied to solve a critical a b c d d
section problem?
A. Bounded Waiting
B. Progress
C. Mutual Exclusion
D. All of these.
385 Which of the following scheduling algorithms is pre - a b c d d
emptive scheduling?
A. FCFS Scheduling
B. SJF Scheduling
C. Network Scheduling
D. SRTF Scheduling
386 What type of memory stores data in a swap file on a b c d b
a hard drive?
A. Secondary memory
B. Virtual memory
C. Low memory
D. RAM
387 Which of the following semaphore can take the a b c d b
non-negative integer values?
A. Binary Semaphore
B. Counting Semaphore
C. Real Semaphore
D. All of the these
388 Which method is the best among file allocation a b c d c
methods?
A. Linked
B. Contiguous
C. Indexed
D. None of the these
389 The operating system work between a b c d a
A. User and Computer
B. Network and User
C. One user to another user

New Section 270 Page 30


C. One user to another user
D. All of the these
390 What is the paging in the operating system? a b c d a
A. Memory management scheme
B. Network management scheme
C. Internet management scheme
D. None of the these
391 Which of the following programs is loaded first a b c d c
when starting a computer?
A. Window desktop
B. Network connection program
C. Operating system
D. CMD
392 Which of the following scheduling reduces process a b c d c
flow time?
A. FCFS B. LIFO C. SJF D. All of the these
393 Which of the following method is used to improve a b c d c
the main memory utilization?
A. Swapping
B. Operating system
C. Memory stack
D. None of these.
394 Buffer is a ___________. a b c d b
A. Permanent area
B. Temporary area
C. Small area
D. Large area
395 What is Kali Linux? a b c d b
A. Network device
B. Operating system
C. Server name
D. Computer name
396 Which of the following statement is correct about a b c d c
fragmentation?
A. It is software that connects the OS.
B. It is part of the software.
C. Loss the memory
D. All of the these
397 SSTF stands for ________. a b c d b
A. Shortest Signal Time First
B. Shortest Seek Time First
C. System Seek Time First
D. System Shortest Time First
398 The PCB ( Process Control Block ) is identified by a b c d d
___________.
A. Real-Number
B. Binary Number
C. Store block
D. Integer Process ID
399 Which is the part of a computer that one can touch a b c d a
and feel ?
A. Hardware B. Software C. Programs D. Output
400 Which of the following is hardware and not a b c d d
software ?
A. Excel B. Printer driver C. Power Point D. CPU
401 A device for changing the connection on a a b c d d
connector to a different configuration is ?
A. a converter
B. a component
C. an attachment

New Section 270 Page 31


C. an attachment
D. an adapter
402 _______ is the process of dividing the disk into a b c d b
tracks and sectors ?
A. Tracking B. Formatting C. Crashing D. Allotting
403 Hardware includes ? a b c d d
A. all devices used to input data into a computer
B. sets of instructions that a computer runs or
executes
C. the computer and all the devices connected to it
that are used to input and output data
D. all devices involved processing information
including the central processing unit, memory, and
storage
404 Tangible, physical computer equipment that can be a b c d a
seen and touched is called _______ ?
A. hardware
B. software
C. storage
D. input/output
405 Which of the following devices translate data and a b c d d
programs that humans can understand into a form
that the computer can process ?
A. Display B. Input C. Output D. None of these.
406 Which of the following is usually connected to a a b c d d
computer with the help of a cable ?
A. Icon B. Virus C. Database D. Peripheral devices
407 When you save the following the data would remain a b c d c
intact even after turning off computer ?
A. RAM
B. Motherboard
C. Secondary Storage Device
D. Primary Storage Device
408 The main system board of a computer is called the ? a b c d b
A. integrated circuit
B. motherboard
C. processor
D. microchip
409 Fax machines and imaging systems are examples a b c d b
of ?
A. bar-code readers
B. imaging systems
C. scanning devices
D. pen-based systems
410 A __________ is a device that not only provides a b c d c
surge protection, but also furnishes your computer
with battery backup power during a power
outage. ?
A. surge strip B. USB C.UPS D. Battery strip .
411 The motherboard is the ? a b c d d
A. circuit board that houses peripheral devices
B. same as the CPU chip
C. the first chip that is accessed when the computer
is turned on
D. circuit board that contains a CPU and other chips
412 The disks stores information in ? a b c d d
A. Tables
B. Rows and columns
C. Blocks
D. Tracks and sectors

New Section 270 Page 32


D. Tracks and sectors
413 What resides on the motherboard and connects the a b c d c
CPU to other components on the motherboard ?
A. Input Unit
B. System Bus
C. ALU
D. Primary Memory
414 The clock rate of a processor is measured in ? a b c d d
A. milliseconds
B. microhertz
C. megabytes or gigabytes
D. megahertz or gigahertz
415 __________ ports connect special types of music a b c d d
instruments to sound cards ?
A. BUS B. CPU C. USB D. MIDI
416 Any hardware component that allows you to enter a b c d d
data or instructions into a computer is called a(n)
_________ ?
A. printer
B. storage device
C. output device
D. input device
417 A directory within a directory is called a a b c d d
__________ ?
A. Mini Directory
B. Junior Directory
C. Part Directory
D. Sub Directory
418 A microprocessor is the brain of the computer and is a b c d a
also called a(n) ?
A. microchip
B. macrochip
C. macroprocessor
D. calculator
419 What is the most popular hardware for multimedia a b c d a
creations ?
A. PCs
B. Minicomputers
C. Mainframe Computers
D. WANs
420 Which type of storage is a hard disc ? a b c d d
A. Non-permanent
B. Volatile
C. Temporary
D. Non-volatile
421 Restarting a computer that is already on is referred a b c d d
to as ?
A. shut down
B. cold booting
C. warm booting
D. logging off
422 The indentations on CDs and DVDs are called ? a b c d a
A. pits B. clusters C. tracks D. lands
423 Another word for the CPU is __________ ? a b c d a
A. microprocessor
B. execute
C. microchip
D. decode
424 If a processor has a word size of 32 bits, compared a b c d b
to a processor with a word size of 16 bits, it can

New Section 270 Page 33


to a processor with a word size of 16 bits, it can
process __________ at a time. ?
A. thrice as much
B. twice as much
C. a fourth as much
D. the same amount
425 When installing __________, the user must copy a b c d d
and usually decompress program files from a CD-
ROM or other medium to the hard disk ?
A. programming software
B. system hardware
C. application hardware
D. applications software
426 A computer’s type, processor, and operating system a b c d d
define its ?
A. brand B. size C. platform D. speed
427 Which of the following is a secondary memory a b c d b
device ?
A. Keyboard B. Disk C. ALU D. Mouse.
428 When a computer is switched on, the booting a b c d b
process performs ?
A. Integrity Test
B. Power-On-Self-Test
C. Correct Functioning Test
D. Reliability Test
429 The general term peripheral equipment is used for a b c d a
_________ ?
A. any device that is attached to a computer system
B. large-scale computer systems
C. a program collection
D. None of these .
430 What provide expansion capability for a computer a b c d b
system ?
A. Sockets B. Slots C. Bytes D. Bays
431 Different components on the motherboard of a PC a b c d b
unit are linked together by sets of parallel electrical
conducting lines. What are these lines called ?
A. Conductors
B. Buses
C. Connectors
D. Consecutives
432 The cost of a given amount of computing power has a b c d d
_______ dramatically with the progress of computer
technology ?
A. stayed the same
B. changed proportionally with the economy
C. increased
D. decreased
433 Which of the following is an example of a b c d d
connectivity ?
A. CD B. Floppy disk C. Power cord D. Internet
434 What is the process of copying software programs a b c d d
from secondary storage media to the hard disk
called ?
A. Configuration
B. Download
C. Storage
D. Installation
435 A device that is connected to the motherboard is a b c d c
________ ?

New Section 270 Page 34


________ ?
A. called an external device
B. called an adjunct device
C. called a peripheral device
D. must connect using ribbon cable
436 Storage and memory differ with respect to which of a b c d d
the following characteristics ?
A. Price B. Reliability C. Speed D. All of these
437 The other name of a motherboard is ? a b c d d
A. System Device
B. Computer Board
C. Central Board
D. System Board
438 The box that contains the central electronic a b c d b
components of the computer is the ?
A. motherboard
B. system unit
C. peripheral
D. input device
439 A CPU-chip developed by Intel for wireless laptops is a b c d b
called the ?
A. Celeron B. Pentium-M C. Xen D. Itanium
440 What is a backup ? a b c d d
A. Restoring the information backup
B. An exact copy of a system’s information
C. The ability to get a system up and running in the
event of a system crash or failure
D. All of these
441 Permanent instructions that the computer uses a b c d a
when it is turned on and that cannot be changed by
other instructions are contained in __________ ?
A. ROM B. RAM C. ALU D. None.
442 The _________ directory is mandatory for every a b c d a
disk. ?
A. Root B. Base C. Sub D. Case
443 A computer’s hard disk is __________ ? a b c d d
A. an arithmetic and logical unit
B. computer software
C. operating system
D. computer hardware
444 An operating system's primary function includes a b c d d
which of the following?
A. Providing user interface
B .Managing hardware resources
C. Running applications
D. All of the above
445 Which of the following is not a type of operating a b c d c
system?
A. Batch Operating System
B. Real-time Operating System
C. Sequential Operating System
D. Distributed Operating System
446 Which component of an operating system is a b c d a
responsible for managing files?
A. File System Manager
B. Memory Manager
C. Process Manager
D. Device Driver
447 The kernel of an operating system is: a b c d b
A. The user interface

New Section 270 Page 35


A. The user interface
B. The part that manages hardware interactions
C. An application software
D. A type of virus
448 In an operating system, what is the role of a a b c d c
scheduler?
A. To allocate disk space
B. To manage user accounts
C. To determine which process runs at a certain
point in time
D. to configure network settings.
449 Multitasking in operating systems allows for: a b c d b
A. Multiple users to share a single device
B. A single user to perform multiple tasks at one
time
C. Devices to run without an OS
D. None
450 Which command in Unix is used to display the a b c d a
current directory's contents?
A . ls B. cd C. Mk dir D. touch

New Section 270 Page 36

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy