Sie sind auf Seite 1von 151

(From Avatto and Careeride) Option: C

HTML: Explanation :

1: HTML stands for? Click on Discuss to view users


A. Hyper Text Markup Language comments.
B. High Text Markup Language 4:
C. Hyper Tabular Markup Language
Correct HTML tag for the largest heading is
D. None of these
Answer Report Discuss
A. <head>
Option: A
B. <h6>
Explanation : C. <heading>
D. <h1>
Click on Discuss to view users Answer Report Discuss
comments. Option: D
2:
Explanation :
which of the following tag is used to mark a
begining of paragraph ? Click on Discuss to view users
comments.
A. <TD> 5:
B. <br>
C. <P> The attribute of <form> tag
D. <TR>
A. Method
Answer Report Discuss
B. Action
Option: C
C. Both (a)&(b)
Explanation : D. None of these
Answer Report Discuss
Click on Discuss to view users Option: C
comments.
3:
6:
From which tag descriptive list starts ?
Markup tags tell the web browser
A. <LL>
B. <DD> A. How to organise the page
C. <DL> B. How to display the page
D. <DS> C. How to display message box on page
Answer Report Discuss D. None of these
Answer Report Discuss

1
Option: B A. size
B. len
Explanation :
C. maxlength
Click on Discuss to view users D. all of these
comments. Answer Report Discuss
7: Option: C

www is based on which model? Explanation :

A. Local-server Click on Discuss to view users


comments.
B. Client-server
10:
C. 3-tier
D. None of these Web pages starts with which ofthe
Answer Report Discuss following tag?
Option: B
A. <Body>
Explanation : B. <Title>
C. <HTML>
Click on Discuss to view users
comments. D. <Form>
8: Answer Report Discuss
Option: C
What are Empty elements and is it valid?

No, there is no such terms as Empty 11:


A.
Element
B. Empty elements are element with no data HTML is a subset of
C. No, it is not valid to use Empty Element
A. SGMT
D. None of these
B. SGML
Answer Report Discuss
C. SGMD
Option: B
D. None of these
Explanation : Answer Report Discuss
Option: B
Click on Discuss to view users
comments. Explanation :
9:
Click on Discuss to view users
Which of the following attributes of text box comments.
control allow to limit the maximum 12:
character?
Which of the following is a container?

2
A. <SELECT> Option: B
B. <BODY>
Explanation :
C. <INPUT>
D. Both (a) and (b) Click on Discuss to view users
Answer Report Discuss comments.
Option: D 15:

Explanation : Character encoding is

Container tags require opening and method used to represent numbers in


closing command eg <body>....</body> , A.
a character
<html>......</html> method used to represent character in
B.
a number
Click on Discuss to view users
comments. a system that consists of a code which
pairs each character with
13:
C. a pattern,sequence of natural numbers or
electrical pulse in order to transmit the
The attribute, which define the relationship
data
between current document and HREF'ed
URL is D. none of these
Answer Report Discuss
A. REL Option: C
B. URL 16:
C. REV
From which tag the descriptive list starts?
D. all of these
Answer Report Discuss A. <LL>
Option: A B. <DD>
Explanation : C. <DL>
D. <DS>
Click on Discuss to view users Answer Report Discuss
comments. Option: C
14:
Explanation :
<DT> tag is designed to fit a single line of
our web page but <DD> tag will accept a Click on Discuss to view users
comments.
A. line of text 17:
B. full paragraph
C. word Correct HTML to left align the content
inside a table cell is
D. request
Answer Report Discuss A. <tdleft>

3
B. <td raligh = "left" > 20:
C. <td align = "left">
How can you open a link in a new browser
D. <td leftalign>
window?
Answer Report Discuss
Option: C A. < a href = "url" target = "new">
B. <a href = "url" target= "_blank">
Explanation :
C. <a href = "url".new>
Click on Discuss to view users D. <a href = "url" target ="open">
comments. Answer Report Discuss
18: Option: B
21:
The tag which allows you to rest other
HTML tags within the description is A much better approach to establish the base
URL is to use
A. <TH>
B. <TD> A. BASE element
C. <TR> B. HEAD element
D. <CAPTION> C. both (a) and (b)
Answer Report Discuss D. none of these
Option: D Answer Report Discuss
Option: A
Explanation :
Explanation :
Click on Discuss to view users
comments. Click on Discuss to view users
19: comments.
22:
<Base> tag is designed to appear only
between The tag used to create a new list item and
also include a hyperlink is
A. <HEAD>
B. <TITLE> A. <LI>
C. <BODY> B. <DL>
D. <FORM> C. <DD>
Answer Report Discuss D. <UL>
Option: A Answer Report Discuss
Option: A
Explanation :
Explanation :
Click on Discuss to view users
comments. Click on Discuss to view users

4
comments. 25:
23:
Which of the tag is used to creates a number
Can the element <First> be replaced with list?
<first>
A. <LI>
No, they represent different elements B. <OL>
A.
altogether C. <LI> and <OL>
B. Both are same D. None of these
C. First is correct only Answer Report Discuss
D. first is only correct Option: C
Answer Report Discuss 26:
Option: B
<INPUT> is
Explanation :
A. format tag
Tag names for HTML elements may be B. empty tag
written with any mix of lowercase and
C. both (a) and (b)
uppercase letters that are a case-
insensitive match for the names of the D. none of these
elements given in the HTML elements Answer Report Discuss
section of this document; that is, tag Option: B
names are case-insensitive.
Explanation :
Click on Discuss to view users
comments. Click on Discuss to view users
24: comments.
27:
Any part of the graphic that is not included
in another hot zone is considered to be part The map definition file is generally stored in
of
A. CGI-BIN
A. rect B. RECYCLE-BIN
B. point C. BIN
C. default D. All of these
D. polygon Answer Report Discuss
Answer Report Discuss Option: A
Option: C
Explanation :
Explanation :
Click on Discuss to view users
Click on Discuss to view users comments.
comments. 28:

5
The latest HTML standard is What i s the correct HTML for adding a
background color?
A. XML
B. SGML A. <background>yellow<Background>
C. HTML 4.0 B. <body color = "yellow">
D. HTML 5.0 C. <body bg color = "yellow">
Answer Report Discuss D. <body bg ="yellow">
Option: D Answer Report Discuss
Option: C
Explanation :
Explanation :
Click on Discuss to view users
comments. Click on Discuss to view users
29: comments.
32:
The tag used to create a hypertext
relationship between current document and Main container for <TR>, <TD> and <TH>
another URL is is

A. <ISINDEX> A. <TABLE>
B. <A> B. <GROUP>
C. <LINK> C. <DATA>
D. none of these D. All of these
Answer Report Discuss Answer Report Discuss
Option: C Option: A

Explanation : Explanation :

Click on Discuss to view users Click on Discuss to view users


comments. comments.
30: 33:

The text inside the <TEXT AREA> tag The body tag usually used after
works like
A. Title tag
A. <P> formatted text B. HEAD tag
B. <T> formatted text C. EM tag
C. <PRE> formatted text D. FORM tag
D. none of these Answer Report Discuss
Answer Report Discuss Option: B
Option: C
31:

6
Explanation : Explanation :

Click on Discuss to view users Click on Discuss to view users


comments. comments.
34: 37:

How can you make an e-mail link? Which of the following is a Valid Name?

A. <mail href +"xxx@y.com"> A. <_person>


B. <a href ="mail to: xxx@y.com"> B. <123 person>
C. <a href = "xxx@y.com"> C. Both (a) and (b)
D. Both (b) and (c) D. None of these
Answer Report Discuss Answer Report Discuss
Option: B Option: A

Explanation : Explanation :

Click on Discuss to view users Click on Discuss to view users


comments. comments.
35: 38:

Which tag creates a number/order list? The web standard allows programmers on
many different computer platforms to
A. <UL> dispersed format and display the information
B. <OL> server. These programs are called
C. <OT>
A. Web Browsers
D. None of these
B. HTML
Answer Report Discuss
C. Internet Explorer
Option: B
D. None of these
36:
Answer Report Discuss
Symbol used at the beginning of the HREF Option: A
text is XML:

A. # 1:
B. $
The MIME text file is saved with
C. &
D. ^ A. HMT extension
Answer Report Discuss B. HTML extension
Option: A C. THM extension
D. None of these

7
Answer Report Discuss Ways to create templates for out does
A.
Option: B type
B. Document type declaration in XML
Explanation : C. Part of Name spaces
D. None of these
Click on Discuss to view users
comments. Answer Report Discuss
2: Option: A

White spaces in XML includes Explanation :

Click on Discuss to view users


Things like space characters, new lines
A. comments.
and tabs
5:
B. Only spaces
C. Space between two double quotes The words Document Node, Nodelist,
D. None of these Element Node, Named Node Map etc. are
Answer Report Discuss
Option: C A. Interfaces
B. Objects
Explanation : C. Attributes
D. Elements
Click on Discuss to view users
comments. Answer Report Discuss
3: Option: A
6:
XPATH used to
The attribute, which define the relationship
Address your documents by specifying a between current document and HREF'ed
A. URL is
location path
B. Address the server
A. REL
C. Store the IP address of the server
B. URL
D. None of these
C. REV
Answer Report Discuss
D. all of these
Option: A
Answer Report Discuss
Explanation : Option: C

Click on Discuss to view users Explanation :


comments.
4: Click on Discuss to view users
comments.
DTD's are 7:

8
Which of the following creates push button? Explanation :

A. CHECK BOX Click on Discuss to view users


B. RADIO comments.
C. RESET 10:
D. INPUT
Scheme is
Answer Report Discuss
Option: C template written in XML and can be
A. modified
Explanation : at runtime
B. read only for all practical purposes
Click on Discuss to view users
comments. C. a global name space
8: D. None of these
Answer Report Discuss
The tags elements in XML are Option: A
11:
A. case-insensitive
B. case-sensitive XML
C. browser dependent
D. none of these A. can be used as a database
Answer Report Discuss B. can't be used as a database
Option: B C. XML is not a database, it is language
"storage format", but a textual storage
D.
Explanation : format which can be called a language
Answer Report Discuss
Click on Discuss to view users Option: D
comments.
9: Explanation :

Node in XML is Click on Discuss to view users


comments.
any part of the document whether it is 12:
A.
elements, attribute or otherwise
B. referred only to the attributes Web links are stored within the page itself
referred to the top element in the and when you wish to "jump" to the page
C. that is linked, we select the hotspot or
document
anchor. This technique is called
D. none of these
Answer Report Discuss A. hypertext
Option: A B. hypermedia
C. both (a) and (b)

9
D. anchoring an XML based language to create style
A.
Answer Report Discuss sheets
Option: C B. a language which is not used in XML
C. extensible solution language
Explanation : D. extended stylesheet language
Answer Report Discuss
Click on Discuss to view users
comments. Option: A
13: 16:

A much better approach to establish the base How DOM differs from SAX?
URL is to use
DOM is not event driven and builds up
A.
A. BASE element the whole memory
B. HEAD element SAX is event driven and requires less
B.
space
C. both (a) and (b)
C. DOM and SAX are packages
D. none of these
D. None ofthese
Answer Report Discuss
Answer Report Discuss
Option: A
Option: B
Explanation :
Explanation :
Click on Discuss to view users
comments. Click on Discuss to view users
comments.
14:
17:
Well formed XML
Any part of the graphic that is not included
in another hot zone is considered to be part
meets certain grammatical rules outlined
A. of
in the XML 1.0 specification
B. doesn't contain DTD's
A. rect
C. is full of formula's
B. point
D. none of these
C. default
Answer Report Discuss
D. polygon
Option: A
Answer Report Discuss
Explanation : Option: C

Click on Discuss to view users Explanation :


comments.
Click on Discuss to view users
15:
comments.
XSL is 18:

10
The map definition file is generally stored in Document type declaration and document
type definition are
A. CGI-BIN
B. RECYCLE-BIN A. different terms
C. BIN B. same
D. All of these C. uncertain
Answer Report Discuss D. can't say
Option: A Answer Report Discuss
Option: A
Explanation :
Explanation :
Click on Discuss to view users
comments. Click on Discuss to view users
19: comments.
22:
XML is a/an
XSLT is
A. imperative language
B. declarative language an extended stylesheet language is used
A.
for formatting
C. standard
an extensible stylesheet language and is
D. none of these B.
used for formatting
Answer Report Discuss
C. used for session tracking in XML
Option: B
D. none of these
Explanation : Answer Report Discuss
Option: B
Click on Discuss to view users
comments. Explanation :
20:
Click on Discuss to view users
Namespace comments.
23:
distinguishes one XML vocabulary from
A. MSXML is
another
B. provides the spaces in the names
A. a Microsoft language
C. is a querying language
B. XML parser that ships with IE5.0
D. none of these
C. used for interacting with XML
Answer Report Discuss
D. Both (b) & (c)
Option: A
21: Answer Report Discuss
Option: D

11
Explanation : D. none of these
Answer Report Discuss
Click on Discuss to view users Option: C
comments.
24: 26:

What is XML? Document Object Model (DOM) is a

Subset of SGML, Extensible Markup A. a parser


A.
Language
Superset of SGML, Extendable Markup B. specification
B.
Language
C. Like SGML, Extended Markup Language C. coding style
D. None of these
Answer Report Discuss D. none of these
Option: A
Answer Report Discuss
Explanation :
Option: A
HTML and XML are like brother and
sister. Their mother is SGML. SGML Explanation :
(Standard Generalized Markup
Language) is the overriding language that Click on Discuss to view users
produced both XML and HTML. SGML comments.
is not a language, but rather a series of 27:
commands that are all understood by
another program. A similar example A document have how many DTD's?
would be JavaScript. By itself, there's not
much to it, but if you use the JavaScript A. Two
commands in a particular order and then
allow a Web browser to read it, you get B. None
some neat effects. So correct option is
(A)
C. Three
Click on Discuss to view users
D. All of these
comments.
25:
Answer Report Discuss
Attributes in XML are
Option: B
A. elements in XML
1) When trying to access a URL, the
B. child nodes following message is displayed on the
a way of attaching characteristics or browser:
C.
properties to elements of a document Server; Error 403.

12
What could be the reason for the message? Answer Explanation
- Published on 26 Feb 17 ANSWER: Xmlns
a. The requested HTML file is not available
Explanation:
b. The path to the interpreter of the script
No explanation is available for this
file is invalid
question!
c. The first line of the output from the script
is not a valid HTTP header
d. The requested HTML file or CGI script 4) Which is not a property of attribute
has insufficient permission. Behaviour of <Marquee> tag?
- Published on 26 Feb 17
Answer Explanation
ANSWER: The requested HTML file or a. alternate
CGI script has insufficient permission. b. blur
c. scroll
Explanation: d. slide
No explanation is available for this Answer Explanation
question!
ANSWER: blur
2) The elements <DIV> and <SPAN> Explanation:
have the following characteristics No explanation is available for this
- Published on 26 Feb 17 question!
a. Element <DIV> inherits properties
defined for <SPAN> in a stylesheet 5) Which of these tags are all <table>
b. Elements <SPAN> and <DIV> define tags?
content to be inline or block-level - Published on 26 Feb 17
c. <DIV> and <SPAN> are used as
a. <table><head><tfoot>
alternatives for the element <P>
b. <table><tr><td>
d. <DIV> is used inside element <P>.
c. <table><tr><tt>
Answer Explanation d. <thead><body><tr>
ANSWER: Elements <SPAN> and <DIV> Answer Explanation
define content to be inline or block-level
ANSWER: <table><tr><td>
Explanation:
Explanation:
No explanation is available for this
No explanation is available for this
question!
question!
3) The attribute used to define a new
6) How can you open a link in a new
namespace is.
browser window?
- Published on 26 Feb 17
- Published on 26 Feb 17
a. XMLNS
a. <a href="url" new>
b. XmlNameSpace
b. <a href="url" target="new">
c. Xmlns
c. <a href="url" target="_blank">
d. XmlNs
d. <a href="url" target="">

13
Answer Explanation - Published on 26 Feb 17
ANSWER: <a href="url" target="_blank">
a. <body background="yellow">
b. <background>yellow</background>
Explanation:
c. <body style="background-
No explanation is available for this
color:yellow">
question!
d. <background
color="yellow">text<background>
7) How can you create an e-mail link?
Answer Explanation
- Published on 26 Feb 17
ANSWER: <body style="background-
a. <mail href="a@b"> color:yellow">
b. <mail>a@b</mail>
c. <a href="a@b"> Explanation:
d. <a href="mailto:a@b.com"> No explanation is available for this
Answer Explanation question!
ANSWER: <a href="mailto:a@b.com">
10) How do I add scrolling text to my
Explanation: page?
No explanation is available for this - Published on 26 Feb 17
question!
a. <scroll>
b. <marquee>
8) What is the correct HTML for creating c. <ciruler>
a hyperlink? d. <tab>
- Published on 26 Feb 17
Answer Explanation
a. <a name="">A</a> ANSWER: <marquee>
b. <a>B</a> 11) Can a data cell contain images?
c. <a - Published on 26 Feb 17
href="http://www.example.com">example<
/a> a. Yes
d. <a
url="http://www.example.com">example</ b. No
a>
Answer Explanation Answer Explanation
ANSWER: <a
ANSWER: Yes
href="http://www.example.com">example
</a>
Explanation:
No explanation is available for this
Explanation:
question!
No explanation is available for this
question!
12) What is the correct HTML tag for
9) What is the preferred way for adding a inserting a line break?
background color in HTML? - Published on 26 Feb 17

14
a. <br /> ANSWER: body {color: black}

b. <break /> Explanation:


No explanation is available for this
c. <lb /> question!
d. <nbsp>
15) Which HTML attribute is used to
Answer Explanation
define inline styles?
- Published on 26 Feb 17
ANSWER: <br />
a. font
Explanation:
No explanation is available for this b. class
question!
c. styles

13) Choose the correct HTML tag for the d. style


largest heading
- Published on 26 Feb 17 Answer Explanation

a. <h6> ANSWER: style

b. <heading> Explanation:
No explanation is available for this
c. <head> question!
d. <h1>
16) What can't layers do if you want to
Answer
convert them to tables?
Explanation - Published on 26 Feb 17

a. Be close

14) Which is the correct CSS syntax? b. Contain a Color


- Published on 26 Feb 17
c. Be larger than the target table
a. body:color=black
d. Overlap
b. {body;color:black}
Answer
c. {body:color=black(body} Explanation
d. body {color: black}

Answer Explanation
17) Which file controls how your frames
will appear?

15
- Published on 26 Feb 17 a. onopen

a. Frameset b. onmessage

b. Master Document c. onerror

c. Template d. None of the above

d. Timeline Answer Explanation

Answer Explanation ANSWER: onopen

ANSWER: Frameset Explanation:


No explanation is available for this
Explanation: question!
No explanation is available for this
question!
20) Pseudo-classes in CSS ________.
- Published on 19 Oct 15
18) When you create a "recipient" hidden
field for a form, which of the following is a. match a specified element
the ONLY correct way to type the word
"recipient?" b. select the active links
- Published on 26 Feb 17
c. are used to define a special state of an
a. Recipient element

b. <recipient></recipient> d. are used to select all the visited links

c. recipient Answer Explanation

d. RECIPIENT ANSWER: are used to define a special


state of an element
Answer Explanation 21) A CSS combinator is the one which
explains the relationship between the
ANSWER: <recipient></recipient> selectors.
- Published on 19 Oct 15
Explanation:
No explanation is available for this a. True
question!
b. False

19) Which event will be used when a Answer Explanation


connection to the server is opened.
- Published on 19 Oct 15 ANSWER: True

Explanation:

16
No explanation is available for this state of the links in CSS?
question! - Published on 19 Oct 15

a. a:link
22) Which CSS property sets the stack
order of an element? b. a:visited
- Published on 19 Oct 15
c. a:hover
a. z-index
d. a:active
b. position
e. All of the above.
c. overflow
Answer Explanation
d. clip
ANSWER: All of the above.
Answer Explanation
Explanation:
ANSWER: z-index No explanation is available for this
question!
Explanation:
No explanation is available for this
question! 25) Which CSS property is used with the
direction property to set or return whether
the text should be overridden to support
23) Which CSS property is used for multiple languages in the same document?
controlling the layout? - Published on 28 Aug 15
- Published on 19 Oct 15
a. unicode - bidi
a. header
b. color
b. display
c. line - height
c. footer
d. direction
d. none of the above
Answer Explanation
Answer Explanation
ANSWER: unicode - bidi
ANSWER: display
Explanation:
Explanation: No explanation is available for this
No explanation is available for this question!
question!

26) Which CSS property sets a


24) Which of the following is / are the background image for an element?

17
- Published on 28 Aug 15 performance of the page

a. background c. It is a functional tool

b. background - attachment d. None of the above

c. background - color Answer Explanation


d. background - image ANSWER: It is a JavaScript running in the
background without affecting the
Answer Explanation performance of the page

ANSWER: background - image Explanation:


No explanation is available for this
Explanation: question!
No explanation is available for this
question!
29) A simple text file which tells the
browser what to cache is known as a
27) Which object is used to receive the ________.
server - sent event notifications? - Published on 28 Aug 15
- Published on 28 Aug 15
a. Input files
a. source.onmessage
b. HTML file
b. getElementById
c. A manifest file
c. EventSource
d. Output files
d. echo
Answer Explanation
Answer Explanation
ANSWER: A manifest file
ANSWER: EventSource
Explanation:
Explanation: No explanation is available for this
No explanation is available for this question!
question!

30) Which are the objects used for storing


28) What is a web worker? data on the client provided by the HTML
- Published on 28 Aug 15 local storage?
- Published on 27 Aug 15
a. It helps in executing the tags on the page
a. window.localStorage
b. It is a JavaScript running in the
background without affecting the

18
b. window.sessionStorage

c. window.localSession 33) Which tags can be used to display the


audio and video?
d. both a & b - Published on 27 Aug 15

Answer Explanation a. <audio>

ANSWER: both a & b b. <video>


31) Which object returns the current
c. both a & b
position of the user and continues to return
updated position as the user moves? d. none of the above
- Published on 27 Aug 15
Answer Explanation
a. watchPosition()

b. clearWatch() ANSWER: both a & b

c. getCurrentPosition() Explanation:
No explanation is available for this
d. timestamp question!

Answer Explanation
34) Which attribute is used to start a video
ANSWER: watchPosition() automatically?
- Published on 27 Aug 15
Explanation:
No explanation is available for this a. submit
question!
b. select

c. <video>
32) The <embed> element can contain an
alternative text. d. autoplay
- Published on 27 Aug 15
Answer Explanation
a. True

b. False ANSWER: autoplay

Answer Explanation Explanation:


No explanation is available for this
ANSWER: False question!

Explanation:
No explanation is available for this 35) Does HTML5 support multimedia?
question! - Published on 27 Aug 15

19
a. yes Answer Explanation
b. no ANSWER: All of the above
Answer Explanation Explanation:
No explanation is available for this
ANSWER: yes question!

Explanation:
No explanation is available for this 38) Abbreviate CSS.
question! - Published on 27 Aug 15

a. Classical Style Sheets


36) Abbreviate SVG.
- Published on 27 Aug 15 b. Cascading Style Sheets

a. Scalable Vector Graphics c. Common Style Sheets

b. Segmented Variable Graphics d. Cascading Symbol Sheets

c. Scalable Variable Graphics Answer Explanation


d. Segmented Variable Graphics ANSWER: Cascading Style Sheets
Answer Explanation Explanation:
No explanation is available for this
ANSWER: Scalable Vector Graphics question!

Explanation:
No explanation is available for this 39) A semantic web allows data to be
question! shared and reused across applications,
enterprises, and communities.
- Published on 27 Aug 15
37) Which of the following statement is /
are true about a canvas? a. True
- Published on 27 Aug 15
b. False
a. It is a rectangular area on an HTML page
Answer Explanation
b. By default it does have no borders and
content ANSWER: True
c. Always specify the height and the width
Explanation:
to define the size
No explanation is available for this
d. All of the above question!

20
40) Semantic elements are elements which b. <rp>
____________.
- Published on 27 Aug 15 c. <rt>

a. describe its meaning only to the d. <ruby>


developer
Answer Explanation
b. do not have any meaning
ANSWER: <rp>
c. are used to describe a page
Explanation:
d. clearly describe its meaning to the No explanation is available for this
browser and the developer question!
Answer Explanation
43) Which tag defines self - contained
ANSWER: clearly describe its meaning to content like diagrams, photos, illustrations
the browser and the developer etc.?
41) Where is the tag <canvas> used in an - Published on 27 Aug 15
HTML page?
- Published on 27 Aug 15 a. <figure>

a. For adding images b. <mark>

b. For a graphic drawing using SVG c. <main>

c. For a graphic drawing using javascript d. <details>

d. None of the above Answer Explanation

Answer Explanation ANSWER: <figure>

ANSWER: For a graphic drawing using Explanation:


javascript No explanation is available for this
question!
Explanation:
No explanation is available for this
question! 44) Which of the following is / are the
new APIs of HTML5?
- Published on 27 Aug 15
42) Which HTML tag is used to define
what should be displayed in browsers that a. HTML Geolocation
do not support ruby annotations?
- Published on 27 Aug 15 b. HTML Drag & Drop

a. <nav> c. HTML Web Workers

21
d. All of the above No explanation is available for this
question!
Answer Explanation

ANSWER: All of the above 47) What is the inline style used for?
- Published on 27 Aug 15
Explanation:
No explanation is available for this a. To apply style to all the pages
question!
b. To applying a unique style to a single
HTML element
45) If the browser does not know the size
of the image, the page will not flicker while c. To define a common style for all HTML
the images load. elements on a page
- Published on 27 Aug 15
d. All of the above
a. True
Answer Explanation
b. False
ANSWER: To applying a unique style to a
Answer Explanation single HTML element

ANSWER: False Explanation:


No explanation is available for this
Explanation: question!
No explanation is available for this
question!
48) What are the two method attributes
that are used while submitting the forms?
46) The tag <link> is used to _______. - Published on 27 Aug 15
- Published on 27 Aug 15
a. GET
a. give a page description
b. POST
b. define style information
c. SUBMIT
c. define a link between a document and an
external resource d. Both A & B

d. both A & B Answer Explanation

Answer Explanation ANSWER: Both A & B

ANSWER: define a link between a Explanation:


document and an external resource No explanation is available for this
question!
Explanation:

22
Answer Explanation
49) Abbreviate XHTML. ANSWER: True
- Published on 26 Aug 15
Explanation:
a. Extensible HyperText Markup Language
No explanation is available for this
b. Extensive High Text Markup Language question!

c. Extensive HyperText Markup Language


52) Which HTML is a container for meta
d. Extensible High Text Markup Language data?
- Published on 26 Aug 15
Answer Explanation
a. <body>
ANSWER: Extensible HyperText Markup
Language b. <html>

c. <head>
Explanation:
No explanation is available for this d. <p>
question!
Answer Explanation
50) Which of the following statements is ANSWER: <head>
true about a URL?
- Published on 26 Aug 15 Explanation:
No explanation is available for this
a. It is used to address a document on the
question!
web

b. It is known as Uniform Resource Locator


53) Which HTML tag is used to define a
c. The web pages from the web servers are client - side script such as the Javascript?
requested by the URL - Published on 26 Aug 15

d. All of the above a. <script>

Answer Explanation b. <unscript>

c. Both A & B
ANSWER: All of the above
51) Entity names are case sensitive. d. None of the above
- Published on 26 Aug 15
Answer Explanation
a. True
ANSWER: <script>
b. False
Explanation:

23
No explanation is available for this syntax to add an iframe?
question! - Published on 26 Aug 15

a. <iframe src = " demo_iframe.htm " style


54) What are the methods used to specify = " border:none " > < / iframe >
colors in HTML?
- Published on 26 Aug 15 b. <iframe src = " demo_iframe.htm " style
= " border:5px dotted red " > < / iframe >
a. RGB colors
c. <iframe src = " demo_iframe.htm " width
b. Color names = " 200 " height = " 200 " > < / iframe >

c. Hexadecimal colors d. <iframe src = " URL " >< / iframe>

d. All of the above Answer Explanation

Answer Explanation ANSWER: <iframe src = " URL " >< /


iframe>
ANSWER: All of the above
Explanation:
Explanation: No explanation is available for this
No explanation is available for this question!
question!

57) Abbreviate RWD. (HTML)


55) How many HTML colors are - Published on 26 Aug 15
supported by all the browsers?
- Published on 26 Aug 15 a. Real World Data

a. 100 b. Relay Wave Diagram

b. 140 c. Responsive Web Design

c. 50 d. Rewind

d. 90 Answer Explanation

Answer Explanation ANSWER: Responsive Web Design

ANSWER: 140 Explanation:


No explanation is available for this
Explanation: question!
No explanation is available for this
question!
58) The <div> element has no required
attributes, but style and class are common.
56) Which of the following is the correct

24
- Published on 26 Aug 15 Answer
Explanation
a. True

b. False ANSWER: id
61) Which attributes can the screen
Answer Explanation readers read? (HTML)
- Published on 25 Aug 15
ANSWER: True
a. ctrl
Explanation: b. alt
No explanation is available for this
question! c. both A & B

d. None of the above


59) Which HTML element is used to
define the description data? Answer Explanation
- Published on 26 Aug 15
ANSWER: alt
a. <dt>
Explanation:
b. <dl>
No explanation is available for this
c. <li> question!

d. <dd>
62) What are the three ways by which
Answer Explanation styling can be added to the HTML
elements?
ANSWER: <dd> - Published on 25 Aug 15

a. Inter, Outer, External


Explanation:
No explanation is available for this b. Outline, Inline, External
question!
c. Inline, Internal, External
60) Which attribute can be used to d. None of the above
uniquely define one table?
- Published on 26 Aug 15 Answer Explanation
a. alt ANSWER: Inline, Internal, External
b. id
Explanation:
c. <p> No explanation is available for this
question!
d. border

25
63) What does the <kbd> tag define in an a. <strong>
HTML page?
- Published on 25 Aug 15 b. <em>

a. Defines keyboard input c. <bold>

b. Defines mathematical variable d. Both A & B

c. Defines preformatted text Answer Explanation

d. Defines computer output ANSWER: Both A & B

Answer Explanation Explanation:


No explanation is available for this
ANSWER: Defines keyboard input question!

Explanation:
No explanation is available for this 66) What can be used to change the
question! default style of an HTML element?
- Published on 25 Aug 15

64) Which HTML element defines the title a. Default attribute


of a work and is usually displayed in
italics? b. Style attribute
- Published on 25 Aug 15
c. Text align
a. <bold>
d. Both A & B
b. <bdo>
Answer Explanation
c. <cite>
ANSWER: Style attribute
d. <address>
Explanation:
Answer Explanation No explanation is available for this
question!
ANSWER: <cite>

Explanation: 67) Which of the following is a


No explanation is available for this declaration for an HTML document?
question! - Published on 25 Aug 15

a. <!DOCTYPE html>
65) Which element of the text type shows
that it is important? b. <html>.....</html>
- Published on 25 Aug 15
c. <body>.....</body>

26
d. <p>.....</p> 70) HTML is a case sensitive language
- Published on 16 Jun 15
Answer Explanation
a. True
ANSWER: <!DOCTYPE html>
b. False
Explanation:
No explanation is available for this Answer
question! Explanation

ANSWER: False
68) HTML cannot have attributes. 71) To give a larger heading on an HTML
- Published on 25 Aug 15 page which tag can we use?

a. True - Published on 16 Jun 15


b. False a. < head>

Answer Explanation b. < h1>

ANSWER: False c. < h6>

Explanation: d. < h10>


No explanation is available for this
question! Answer Explanation

ANSWER: < h1>


69) Abbreviate HTML.
- Published on 25 Aug 15 Explanation:
The < h1> tags are used to give headings
a. High Text Marking Language

b. Highlight Text Making Language 72) If you want to change the text colour
to red which of the following tags will you
c. Hyper Text Markup Language use?
- Published on 16 Jun 15
d. None of the above
a. < body text = red>
Answer Explanation
b. < body bgcolour = red>
ANSWER: Hyper Text Markup Language
c. < body colour = red>
Explanation:
No explanation is available for this d. None of the above
question!
Answer Explanation

27
ANSWER: < body text = red> 1) Which HTML tag is used to define an
internal style sheet?
Explanation: - Published on 26 Feb 17

a. <script>
b. <css>
73) To create a checkbox for a form which
tag is used? c. <style>
- Published on 16 Jun 15 d. None of these
a. < input type = “checkbox”> Answer Explanation
b. < checkbox>
ANSWER: <style>
c. < input = checkbox> 1) The general definition of a(n) ____ is a
set of linked documents with shared
d. < cb> attributes, such as related topics, a similar
design, or a shared purpose.
Answer Explanation - Published on 26 Feb 17

ANSWER: < input type = “checkbox”> a. index

Explanation: b. website
This tag is used to add a checkbox on a
HTML form c. Internet

d. Homepage
74) Which tag can be used to insert a
horizontal line on a web page? Answer Explanation

- Published on 16 Jun 15 ANSWER: website


a. < hr> Explanation:
No explanation is available for this
b. < br>
question!
c. < line>

d. < line direction = “horizontal”> 2) To enable data tainting, the end user sets
the _________ environment variable.
Answer - Published on 26 Feb 17
Explanation
a. ENABLE_TAINT
ANSWER: < hr>
b. MS_ENABLE_TAINT

28
c. NS_ENABLE_TAINT not contain any text

d. ENABLE_TAINT_NS Explanation:
No explanation is available for this
Answer Explanation question!

ANSWER: NS_ENABLE_TAINT
4) _________ keyword is used to declare
Explanation: variables in javascript.
No explanation is available for this - Published on 26 Feb 17
question!
a. Var

3) The following is a web-page: b. Dim

<html> c. String
<head> <title>JavaScript</title> </head>
<body bgcolor=""#0000ff""> d. None of the above
<script language=""JavaScript"">
<!-- document.write(""<h1> hello Answer Explanation
world </h1>""); //-->
</script> ANSWER: Var
</body>
</html> Explanation:
No explanation is available for this
When the above web page is loaded into a question!
browser, what will happen?
- Published on 26 Feb 17
5) Which of the following JavaScript
a. The body of the web page will not contain
cannot do?
any text
- Published on 26 Feb 17
b. The body of the web page will contain the
a. JavaScript can react to events
text “hello world” as an H1 heading
b. JavaScript can manipulate HTML
c. The background color of the web page
elements
will be green
c. JavaScript can be use to validate data
d. document.write("<h1> hello world </h1
>”); is a comment.
d. All of the Above
Answer Explanation
Answer Explanation
ANSWER: The body of the web page will

29
ANSWER: All of the Above Answer Explanation

Explanation: ANSWER: if (conditional expression is


No explanation is available for this true) {then execute this code>->}
question!
1) Which is the first Internet search
engine?
- Published on 26 Feb 17
6) The _______ method of an Array object
adds and/or removes elements from an a. Google
array.
- Published on 26 Feb 17 b. Archie

a. Reverse c. Altavista

b. Shift d. WAIS

c. Slice Answer Explanation


d. Splice ANSWER: Archie

Answer Explanation Explanation:


No explanation is available for this
ANSWER: Splice question!

Explanation:
No explanation is available for this
2) Who is making the Web standards?
question!
- Published on 26 Feb 17

a. Mozilla
7) Which of the following is the structure
of an if statement? b. Microsoft
- Published on 26 Feb 17
c. The World Wide Web Consortium
a. if (conditional expression is true)
thenexecute this codeend if d. NVDIA

b. if (conditional expression is true)execute Answer Explanation


this codeend if
ANSWER: Mozilla
c. if (conditional expression is true) {then
execute this code>->} Explanation:
No explanation is available for this
d. if (conditional expression is true) then question!
{execute this code}

30
syntax of CSS.

3) To set up the window to capture all


Click events, we use which of the following 5) In a Javascript Application what
statement? function can be used to send messages to
- Published on 26 Feb 17 users requesting for an text input?
- Published on 16 Jun 15
a. window.captureEvents(Event.CLICK);
a. Display()
b. window.handleEvents (Event.CLICK);
b. Alert()
c. window.routeEvents(Event.CLICK );
c. GetOutput()
d. window.raiseEvents(Event.CLICK );
d. Prompt()
Answer Explanation
Answer Explanation
ANSWER:
window.captureEvents(Event.CLICK); ANSWER: Prompt()

Explanation: Explanation:
No explanation is available for this This function is used when we want to
question! input text in javascript.

4) If you want to align text to the right side 6) What does error 404 or Not Found error
of an block element in a cascading style while accessing a URL mean?
sheet (CSS) then which of the following - Published on 16 Jun 15
property would you use?
- Published on 16 Jun 15 a. The server could not find the requested
URL
a. Right align
b. Requested HTML file is not available
b. Justify
c. The path to the interpreter of the script is
c. Left align not valid

d. Text align d. The requested HTML file does not have


sufficient permissions
Answer Explanation
Answer Explanation
ANSWER: Text align
ANSWER: The server could not find the
Explanation:
The text align will be used according to the

31
requested URL b. FTP, HTTP, SMTP

Explanation: c. HTTP, FTP, SMTP


When we send a URL request it sends a
request back to us but it may happen that d. SMTP, HTTP, FTP
the server may not find that URL that time
it sends us error 404 or not found. Answer Explanation

ANSWER: FTP, HTTP, SMTP


7) Assume that an HTML form is designed
to purchase the furniture. All the items Explanation:
required are being checked. After selecting PROMPT- This command is used in FTP
the items the payment details are entered HEAD-used in HTTP asks for the response
and the submit button is pressed. From the identical to the one that would correspond
following options which one would you to a GET request but without the response
prefer to send the data to the server. Assume body.
that all the security is handled. RCPT- used by SMTP. It is used to
- Published on 16 Jun 15 establish the return address or return path.

a. Only POST
9) Which of the following statements are
b. Only GET true?
- Published on 16 Jun 15
c. Either of GET or POST
a. HTTP runs over TCP
d. Neither GET nor POST
b. HTTP allows information to be stored in a
Answer Explanation URL

ANSWER: Either of GET or POST c. HTTP can be used to test the validity of a
hypertext link
Explanation:
For sending the data to the server either of d. All of the above
them can be used.
Answer Explanation

8) From the following options indicate a ANSWER: All of the above


correct association of the PROMPT, HEAD
and RCPT commands with protocols where Explanation:
they are used? No explanation is available for this
question!
- Published on 16 Jun 15

a. HTTP, SMTP, FTP 10) Which of the following objects can be


used in expression and scriplets in JSP

32
without explicitly declaring them? A.
¬ P1 ∨ P2
- Published on 16 Jun 15
B.
a. Request and response only P1 ∨ P2
C.
b. Response and session only P1 ∧ P2
D.
c. Session and request only P1 ∧ ¬P2
Answer Report Discuss
d. Session,request and response
Option: A
Answer Explanation
Explanation :
ANSWER: Session and request only
11) Which of these is a client server Click on Discuss to view users
application? comments.
- Published on 16 Jun 15 2:

a. Web browsing A logical schema


b. E-mail
A. Is the entire database.
c. Internet Chat
describe data in terms of relational tables
d. All of the above B.
and columns, object-oriented classes,
and XML tags.
Answer Explanation
C. Describes how data is actually stored on
disk.
ANSWER: All of the above
D. Both (A) and (C)
Explanation:
In Computer science client-server is a Answer Report Discuss
software architecture model consisting of
two parts, client systems and server systems, Option: A
both communicating over a computer
network or on the same computer. A client- Explanation :
server application is a distributed system
made up of both client and server software. Click on Discuss to view users
DBMS: comments.
3:
1:
Related fields in a database are grouped to
In tuple relational calculus P1 → P2 is form a
equivalent to
A. Data file

33
B. Data record. A. Module.

C. Menu. B. Relational model.

D. Bank. C. Schema.

Answer Report Discuss D. Sub schema.

Option: B Answer Report Discuss

Explanation :
Related data fields in a database are Option: D
grouped to form a data record. 6:
(A record is a collection of related fields)
A report generator is used to
Click on Discuss to view users
comments.
A. Update files.
4:
B. Print files on paper
The database environment has all of the
following components except: C. Data entry.

A. Users. D. Delete files.

B. Separate files Answer Report Discuss

C. Database. Option: B

D. Database administrator Explanation :

Answer Report Discuss Click on Discuss to view users


comments.
Option: B 7:

Explanation : The property / properties of a database is /


are :
Click on Discuss to view users
comments.
A. It is an integrated collection of logically
5: related records.
B. It consolidates separate files into a
The way a particular application views the common pool of data records.
data from the database that the
application uses is a C. Data stored in a database is independent
of the application programs using it

34
D. All of the above Answer Report Discuss

Answer Report Discuss Option: B

Option: D Explanation :

Explanation : In relational model data is stored in


tables and if we talk about data
Click on Discuss to view users independence it is one of the major
comments. feature of DBMS which holds in all
8: DBMS models.

A relational database developer refers to a Click on Discuss to view users


record as comments.
10:
A. A criteria.
Conceptual design
B. A relation.
A. Is a documentation technique.
C. A tuple.
Needs data volume and processing
B. frequencies to determine the size of the
D. An attribute.
database.
Answer Report Discuss C. Involves modelling independent of the
DBMS
Option: C D. Is designing the relational model.

Explanation : Answer Report Discuss

Click on Discuss to view users


comments. Option: C
9: 11:

The relational model feature is that there The method in which records are physically
stored in a specified order according to a
A. Is no need for primary key data key field in each record is

B. Is much more data independence than A. Hash


some other database models
C. Are explicit relationships among records B. Direct.

D. Are tables with many dimensions C. Sequential

35
D. All of the above. Which one of the following statements is
false?
Answer Report Discuss
A. The data dictionary is normally
Option: A maintained by the database administrator.
B. Data elements in the database can be
Explanation : modified by changing the data dictionary.
C. The data dictionary contains the name
A method in which records are physically and description of each data element.
stored in a specified order according to a
The data dictionary is a tool used
key field in each record is hash. (In hash D. exclusively by the database
method, a hash function is performed on
administrator.
the key value to determine the unique
physical address of the record to store or Answer Report Discuss
retrieve)
Option: B
Click on Discuss to view users
comments. Explanation :
12:
Click on Discuss to view users
comments.
A subschema expresses
14:
A. The logical view
An advantage of the database management
approach is
B. The physical view.

C. The external view. A. Data is dependent on programs

D. All of the above. B. Data redundancy increases.

Answer Report Discuss C. Data is integrated and can be accessed by


multiple programs.
Option: C D. None of the above

Explanation : Answer Report Discuss

A subschema expresses the external Option: C


view. (External schemas are called also
called as subschemas) Explanation :

Click on Discuss to view users Click on Discuss to view users


comments. comments.
13: 15:

A DBMS query language is designed to

36
A. Support end users who use English-like D. None of these
commands
B. Support in the development of complex Answer Report Discuss
applications software
C. Specify the structure of a database. Option: C

D. All of the above. Explanation :

Click on Discuss to view users


Answer Report Discuss
comments.
18:
Option: D
16: SET concept is used in :

Data independence means A. Network Model

A. Data is defined separately and not B. Hierarchical Model


included in programs
C. Relational Model
B. Programs are not dependent on the
physical attributes of data.
D. None of these
C. Programs are not dependent on the
logical attributes of data
Answer Report Discuss
D. Both (B) and (C).
Option: A
Answer Report Discuss
Explanation :
Option: D
Click on Discuss to view users
Explanation : comments.
19:
Click on Discuss to view users
comments.
Relational Algebra is
17:
A.
E-R model uses this symbol to represent Data Definition Language
weak entity set ?
B. Meta Language
A. Dotted rectangle C. Procedural query Language
B. Diamond D. None of the above
C. Doubly outlined rectangle Answer Report Discuss

37
Option: C 22:

Explanation : DBMS helps achieve

Click on Discuss to view users A. Data independence


comments.
20: B. Centralized control of data

Key to represent relationship between tables C. Control redundancy


is called
D. All of above
A. Primary key
Answer Report Discuss
B. Secondary Key
Option: D
C. Foreign Key
Explanation :
D. None of these
Click on Discuss to view users
Answer Report Discuss comments.
23:
Option: C
Which of the following are the properties of
21: entities?

_______ produces the relation that has A. Groups


attributes of R1 and R2
B. Table
A. Cartesian product
C. Attributes
B. Difference
D. Switchboards
C. Intersection
Answer Report Discuss
D. Product
Option: C
Answer Report Discuss
Explanation :
Option: A
Click on Discuss to view users
Explanation : comments.
24:
Click on Discuss to view users
comments. In a relation

38
A. Ordering of rows is immaterial D. Independent of both hardware and
software
B. No two rows are identical Answer Report Discuss

C. (A) and (B) both are true Option: D

D. None of these Explanation :

Answer Report Discuss Click on Discuss to view users


comments.
Option: C 27:

Explanation : What is a relationship called when it is


maintained between two entities?
Click on Discuss to view users
comments. A. Unary
25:
B. Binary
It is better to use files than a DBMS when
there are C. Ternary

A. Stringent real-time requirements D. Quaternary

B. Multiple users wish to access the data Answer Report Discuss

C. Complex relationships among data Option: B

D. All of the above. Explanation :

Answer Report Discuss Click on Discuss to view users


comments.
28:
Option: B
26: Which of the following operation is used if
we are interested in only certain columns of
The conceptual model is a table?

A. Dependent on hardware A. PROJECTION

B. Dependent on software. B. SELECTION

C. Dependent on both hardware and C. UNION


software

39
D. JOIN Answer Report Discuss

Answer Report Discuss Option: D


Option: A 31:

Explanation : The users who use easy-to-use menu are


called
Click on Discuss to view users
comments. A. Sophisticated end users
29:
B.
Naïve users.
The RDBMS terminology for a row is
C. Stand-alone users.
A. Tuple.
D. Casual end user
B. Relation.
Answer Report Discuss
C. Attribute.
Option: B
D. Degree.
Explanation :
Answer Report Discuss
Click on Discuss to view users
Option: A comments.
32:
Explanation :
Which database level is closest to the users?
Click on Discuss to view users
comments. A. External
30:
B. Internal
Which of the following is an advantage of
view? C. Physical

A. Data security D. Conceptual

B. Derived columns Answer Report Discuss

C. Hiding of complex queries Option: A

D. All of the above Explanation :

Click on Discuss to view users

40
comments. A set of possible data values is called
33:
A. Attribute
Which are the two ways in which entities
can participate in a relationship? B. Degree.

A. Passive and active C. Tuple.

B. Total and partial D. Domain.

C. Simple and Complex Answer Report Discuss

D. All of the above Option: D

Answer Report Discuss 6:

Option: B Which of the operations constitute a basic


set of operations for manipulating
Explanation : relational data?

Click on Discuss to view users A. Predicate calculus


comments.
34: B. Relational calculus

The result of the UNION operation between C. Relational algebra


R1 and R2 is a relation that includes
D. None of the above
A. All the tuples of R1
Answer Report Discuss
B. All the tuples of R2
Option: C
C. All the tuples of R1 and R2
Explanation :
D. All the tuples of R1 and R2 which have
common columns Click on Discuss to view users
comments.
Answer Report Discuss
37:
Option: C
Which of the following is another name for
Explanation : weak entity?

Click on Discuss to view users A. Child


comments.
35:

41
B. Owner C. The same as 0 for integer and blank for
character
C. Dominant D. Not a value

D. All of the above Answer Report Discuss

Answer Report Discuss Option: D

Option: A Explanation :

Explanation : Click on Discuss to view users


comments.
Click on Discuss to view users 40:
comments.
38: Which of the following is record based
logical model?
Which of the following database object does
not physically exist? A. Network Model

A. Base table B. Object oriented model

B. Index C. E-R Model

C. View D. None of these

D. None of the above Answer Report Discuss

Answer Report Discuss


Option: A
Option: C 41:

Explanation : A data dictionary is a special file that


contains:
Click on Discuss to view users
comments. A.
39: The name of all fields in all files.
B. The width of all fields in all files.
NULL is
C. The data type of all fields in all file
A. The same as 0 for integer
D. All of the above
B. The same as blank for character
Answer Report Discuss

42
Option: D Explanation :

Explanation : Click on Discuss to view users


comments.
Click on Discuss to view users 44:
comments.
42: In E-R Diagram derived attribute are
represented by
A file manipulation command that extracts
some of the records from a file is called A. Ellipse

A. SELECT B. Dashed ellipse

B. PROJECT C. Rectangle

C. JOIN D. Triangle

D. PRODUCT Answer Report Discuss

Answer Report Discuss Option: B

Option: A Explanation :

Explanation : Click on Discuss to view users


comments.
Click on Discuss to view users 45:
comments.
43: Cross Product is a:

A primary key is combined with a foreign A. Unary Operator


key creates
B. Ternary Operator
A. Parent-Child relationship between the
tables that connect them C. Binary Operator
B. Many to many relationship between the
tables that connect them. D. Not an operator
C. Network model between the tables that
connect them. Answer Report Discuss
D. None of the above
Option: C
Answer Report Discuss
6:
Option: A

43
An instance of relational schema R (A, B, C) The natural join is equal to :
has distinct values of A including
NULL values. Which one of the following is A. Cartesian Product
true?
B. Combination of Union and Cartesian
A. A is a candidate key product
C. Combination of selection and Cartesian
B. A is not a candidate key product
D. Combination of projection and Cartesian
C. A is a primary Key product
Answer Report Discuss
D. Both (A) and (C)
Option: C
Answer Report Discuss
Explanation :
Option: B
Click on Discuss to view users
Explanation : comments.
49:
Click on Discuss to view users
comments.
Which one of the following is not true for a
47:
view:
Consider the join of a relation R with
A. View is derived from other tables.
relation S. If R has m tuples and S has n
tuples, then the maximum size of join is:
B. View is a virtual table.
A. mn
C. A view definition is permanently stored
as part of the database.
B. m+n
D. View never contains derived columns.
C. (m+n)/2
Answer Report Discuss
D. 2(m+n)
Option: C
Answer Report Discuss
Explanation :
Option: A
Click on Discuss to view users
comments.
Explanation :
50:
Click on Discuss to view users
comments. A primary key if combined with a foreign
48: key creates

44
A. Parent-Child relationship between the D. Table Structure
tables that connect them.
B. Many to many relationship between the Answer Report Discuss
tables that connect them.
C. Network model between the tables that Option: A
connect them.
Explanation :
D. None of the above.
Click on Discuss to view users
Answer Report Discuss comments.
53:
Option: A
51: In E-R diagram generalization is represented
by
In E-R Diagram relationship type is
represented by A. Ellipse

B. Dashed ellipse
A. Ellipse
C. Rectangle
B. Dashed ellipse
D. Triangle
C. Rectangle
Answer Report Discuss
D. Diamond
Option: D
Answer Report Discuss
Explanation :
Option: D
Click on Discuss to view users
Explanation :
comments.
Click on Discuss to view users 54:
comments.
52: The method of access which uses key
transformation is known as
Hierarchical model is also called
A. Direct
A. Tree structure
B. Hash
B. Plex Structure
C. Random
C. Normalize Structure
D. Sequential

45
Answer Report Discuss B. Registration Num can be a primary key

Option: B C. UID is candidate key if all students are


from same country.
Explanation : D. If S is a superkey such that S ∩ UID is
NULL then S ∪ UID is also a superkey.
Click on Discuss to view users Answer Report Discuss
comments.
55: Option: A

A table joined with itself is called Explanation :

A. Join Click on Discuss to view users


comments.
B. Self Join 57:

C. Outer Join The following functional dependencies hold


for relation R(A, B, C) and S(B, D, E) B —
D. Equi Join > A, A —> C , the relation R contains 200
tuples and relation S contains 100 tuples.
Answer Report Discuss What is maximum number of tuples
possibles in natural join R and S ?
Option: B
A. 100
56:
B. 200
Consider a relational table with a single
record for each registered student with the C. 300
following attributes.
1. Registration Num: Unique registration of D. 400
each registered student.
2. UID Unique identity number, unique at Answer Report Discuss
the national level for each citizen.
3. Name: Name of the student. Option: A
4. BanIcAccount Num: Unique account
number at the bank. A student can have Explanation :
multiple account or joint accounts.
This attribute stores the primary account Click on Discuss to view users
number. comments.
5. Hostel_Room: Room number ofhe hostel.
58:
Which ofthe following option
is INCORRECT?
Which structure is the hierarchical model
based
A. BankAccount Num is a candidate key.

46
A. Tree A. Row

B. Graph B. Column

C. Linked List C. Table

D. None of the above D. None of the above

Answer Report Discuss Answer Report Discuss

Option: A Option: B
Explanation : 61:

Click on Discuss to view users Why do we have to create a primary index


comments. on a primary key
59:
A. Ease of searching
In the relational model, the number of
attributes and number of tuples iri a relation B. Sequential ordering of a file
are termed as __________and
______________respectively C. Both (a) and (b)

A. Cardinality, domain D. None of these

B. Degree, cardinality Answer Report Discuss

C. Domain degree Option: C

D. Cardinality, degree Explanation :

Answer Report Discuss Click on Discuss to view users


comments.
Option: B 62:

Explanation : In context with relational Algebra. Which of


the following are unary operatiors.
Click on Discuss to view users 1.Select
comments. 2. Project
60: 3. Union
4. Product
In domain relational calculus we create a
variable for every A. 1 and 3 only

47
B. 2 and 4 only 3. An undetermined field
must be in the key.
C. 1 and 2 only 4. REST must include all
attributes but NOT on
D. All are binary LHS They don't
determine anything so
Answer Report Discuss they can not be part of
key.
Option: C 5. If field is not in ANY FD,
it must be part of the key
Explanation :
Now considering these 5 points we get D
Click on Discuss to view users as Key.
comments.
Click on Discuss to view users
63:
comments.
64:
Let R is a relation schema, R(A, B, C, D)
and F = {A —> B, B --> C, C —> A) is the
set of functional dependency. Determine the Which of the following statement is correct?
key of relation ?
A.
F |= x ---> x iff y ⊆ x+
A. A
B.
F |= y ---->x iff y ⊆ x+
B. B
C.
F |=x --->y iff x+ ⊆ y
C. C
D.
F |= y --->x iff x+⊆ y
D. D
Answer Report Discuss
Answer Report Discuss
Option: A
Option: D
Explanation :
Explanation :
Click on Discuss to view users
Rule to find out the key in relation :- comments.
65:
 Key ---> Rest of Attributes
1. As Key determies rest of Given the basic ER and relational model
the attributes which of the following is incorrect?
2. Key must include all
attributes but can not be A. An entity can have more than one
on RHS of any functional attrbute
dependency i.e Only fields B. An attribute of an entity can be
on RHS are determined.

48
composite.
C. In row of a relational table, an attribute
have more than one value.
In row of a relational table, an attribute
D. can have exactly one vlaue or a NULL
value.
Answer Report Discuss

Option: C
66: A. (i), (iv), (vi), (viii)

It is desired to design an object-oriented B. (i), (iv), (vii)


employee record system for a company.
Each employee has a name, unique id and C. (i), (iii), (v), (vi), (viii)
salary. Employees belong to diferent
categories and their salary is determined by D. (ii) , (v) , (viii)
their category. The functions geName, getld
and compute Salary are required. Given the Answer Report Discuss
class hierachy below, possible locations for
these functions are:
Option: A
(i) getld is implemented in the superclass
(ii) getld is implemented in the subclass
Explanation :
(iii) getName is an abstract funciton in the
superclass
Click on Discuss to view users
(iv) getName is implemented in the
comments.
superclass.
(v) getName is implemented in the subclass 67:
(vi) getSalary is an abstract function in the
superclas Let r be a relation instance with schema R =
(vii) getSalary is implemented in the (A, B, C, D). We define r1 =∏ A,B,C (r) and r2
superclass = ∏A, D (r)
(viii) getSalary is implemented in the Let S = r1* r2 where * denotes natural join.
subclass. Given that the decomposition of r into r1
and r2 is lossy, which one of the following is
Choose the best design TRUE?

A.
S⊂r
B.
r∪s = r
C.
r⊂s
D. r*s = s

49
Answer Report Discuss

Option: C

Explanation :

Click on Discuss to view users


comments.
68:
a. T2 -> T3 -> T1
Let E1 and E2 be two entities in an E/R
diagram with simple single-valued b. T3 -> T2 -> T1
attributes. R1 and R2 are two relationships
between E1 and E2, where R1 is one-to- c. T1 -> T2 -> T3
many and R2 is many-to-many. RI and R2
do not have any attributes of their own. d. T1 -> T3 -> T2
What is the minimum number of tables
required to represent this situation in the Answer Explanation
relational model?
ANSWER: T1 -> T3 -> T2
A. 2 Explanation:
No explanation is available for this
B. 3 question!
C. 4
2) Which of the following is an Open
D. 5 Source DBMS?
- Published on 19 Oct 15
Answer Report Discuss
a. MySQL
Option: B b. Microsoft SQL Server
1) In the table given below T1, T2 and T3
c. Microsoft Access
are the transactions.The correct serialization
of the below schedules is d. Oracle
- Published on 19 Oct 15
Answer Explanation

ANSWER: MySQL

Explanation:
No explanation is available for this
question!

50
3) When a primary key is define in the Explanation:
table, DBMS automatically creates a ____ No explanation is available for this
on a primary key column. question!
- Published on 19 Oct 15

a. Unique index 5) Which normal form is the partial


b. Sequence dependency removed?
- Published on 19 Oct 15
c. Trigger
a. First
d. Synonym b. Second

Answer Explanation c. Third

ANSWER: Unique index d. BCNF

Explanation: Answer Explanation


No explanation is available for this
question! ANSWER: Second

Explanation:
4) Match the following No explanation is available for this
question!
A) Composite attribute ------ i) Attribute
whose value is calculated from other
6) What is the responsibility of the buffer
attributes
manager?
B) Multivalued Attribute ---- ii) Attribute
that can be further subdivided to yield
- Published on 19 Oct 15
additional attributes
C) Derived Attribute -------- iii) Attribute a. Fetching data from disk storage into main
that can have more values memory, and deciding what data to cache in
- Published on 19 Oct 15 main memory.
b. Allocation of space on disk storage and
a. A-i, B-ii, C-iii
the data structures used to represent
b. A-ii, B-i, C-iii
information stored on disk.
c. A-ii, B-iii, C-i
c. Storing details such as how many users,
d. A-iii, B-ii, C-i which user has which permissions etc.

Answer Explanation d. None of the above

ANSWER: A-ii, B-iii, C-i Answer Explanation

ANSWER: Fetching data from disk storage

51
into main memory, and deciding what data No explanation is available for this
to cache in main memory. question!

Explanation:
No explanation is available for this 9) An attribute or combination of attributes
question! in one table whose values must either match
the primary key in another table or be null is
called __________.
7) The problem caused by independent
multivalued dependencies is eliminated in
- Published on 19 Oct 15
which of the normal form?
- Published on 19 Oct 15 a. Secondary Key
b. Super key
a. 3NF
b. BCNF c. Candidate Key
c. 4NF d. Foreign Key
d. 5NF Answer Explanation
Answer Explanation ANSWER: Foreign Key
ANSWER: 4NF Explanation:
No explanation is available for this
Explanation: question!
No explanation is available for this
question!
10) A transaction state changes from active
to______, after the transaction has been
8) Which is not the relational algebra
rolled back and the database restored to its
operator?
state prior to the start of the transaction.
- Published on 19 Oct 15
- Published on 19 Oct 15
a. Set difference
a. Partially committed
b. Cartesian product
b. Committed
c. Rename
c. Aborted
d. Join
d. Failed
Answer Explanation
Answer
ANSWER: Set difference Explanation

Explanation: ANSWER: Aborted

52
11) How is specialization denoted in an ER - Published on 28 Aug 15
Diagram?
- Published on 19 Oct 15 a. Checks whether all the relations
mentioned under the FROM clause in the
a. Triangle labeled IS A SQL statement are from the database the
user is referenced.
b. Rectangle labeled IS A
b. Checks all the attribute values and also
c. Rectangle Labeled HAS A checks whether they exist in a particular
relation that is specified in the query. It
d. Triangle labeled HAS A
checks all the attribute values that are
mentioned in the SELECT and WHERE
Answer Explanation
clauses of the SQL statement.
ANSWER: Triangle labeled IS A
c. Verifies whether the types of attributes
Explanation: are compatible with the values used for the
No explanation is available for this attributes.
question!
d. All of these.

12) What is Degree of relationships? Answer Explanation


- Published on 19 Oct 15
ANSWER: All of these.
a. number of participating entity types
Explanation:
b. number of participating relations No explanation is available for this
question!
c. number of participating attribute types

d. number of participating constraints 14) Generalization is a bottom up design


process that combines a number of entity
Answer Explanation sets, which share the same features into a
higher level entity set.
ANSWER: number of participating entity - Published on 28 Aug 15
types
a. True
Explanation:
No explanation is available for this b. False
question!
Answer Explanation
13) What does a query processor do in ANSWER: True
semantic checking?

53
Explanation: question!
No explanation is available for this
question!
17) What stores the metadata about the
structure of the database, in particular the
15) How many primary key can a table in schema of the database?
database have? - Published on 28 Aug 15
- Published on 28 Aug 15
a. Indices
a. Only one
b. Database log
b. At least one
c. Data files
c. More than one
d. Data Dictionary
d. Any number of
Answer Explanation
Answer Explanation
ANSWER: Data Dictionary
ANSWER: Only one
Explanation:
Explanation: No explanation is available for this
No explanation is available for this question!
question!

18) What data structure is used to construct


16) Which of the following language is a Prev LSN in a database log?
used to define the integrity constraints? - Published on 28 Aug 15
- Published on 28 Aug 15
a. Queue
a. DCL
b. Link List
b. DML
c. Graph
c. DDL
d. Tree
d. All of the above
Answer Explanation
Answer Explanation
ANSWER: Link List
ANSWER: DDL
Explanation:
Explanation: No explanation is available for this
No explanation is available for this question!

54
ANSWER: Both a and b
21) Which is the correct SQL syntax from
19) Abbreviate ACID. the following to create a PRIMARY KEY
- Published on 28 Aug 15 constraint on existing table “ EMPLOYEE ”
on " EMPID " column and currently column
a. Atomicity, Consistency, Isolation,
does not contain any value?
Durability
- Published on 27 Aug 15
b. Atomicity, Concurrency, Isolation,
a. Alter table EMPLOYEE Add Constraint
Duplicity
PK - EMPID Primary Key, EMPID;
c. Aggregation, Consistency, Isolation,
b. Update table EMPLOYEE Add
Durability
Constraint PK - EMPID Primary Key
d. Atomicity, Consistency, Identity, (EMPID);
Durability
c. Alter table EMPLOYEE Add Constraint
Answer Explanation PK - EMPID Primary Key (EMPID);

ANSWER: Atomicity, Consistency, d. Alter table EMPLOYEE Add Constraint


Isolation, Durability PK - EMPID Primary Key, (EMPID);

Explanation: Answer Explanation


No explanation is available for this
question! ANSWER: Alter table EMPLOYEE Add
Constraint PK - EMPID Primary Key
(EMPID);
20) What is a schedule for a set of
transactions? Explanation:
No explanation is available for this
- Published on 27 Aug 15
question!
a. It consists of all instructions of those
transactions.
22) What information is not provided by a
b. It preserve the order in which the data dictionary?
instructions appear in each individual - Published on 27 Aug 15
transaction.
a. How data is used
c. Both a and b
b. Where data is located
d. None of these
c. Size of storage disk
Answer Explanation d. Who owns or is responsible for data

55
Answer Explanation ANSWER: The width of each field

ANSWER: Size of storage disk Explanation:


No explanation is available for this
Explanation: question!
No explanation is available for this
question!
25) Which of the following is not a
relational data of DBMS?
23) What is a master list of index file? - Published on 27 Aug 15
- Published on 27 Aug 15
a. FOX PRO
a. Has a number assigned to each record
b. dBASE IV
b. Is sorted in ascending order
c. 4th Dimension
c. Contains only a list of keys and record
number d. ReFlex

d. Both A and B. Answer Explanation

Answer Explanation ANSWER: FOX PRO

ANSWER: Has a number assigned to each Explanation:


record No explanation is available for this
question!
Explanation:
No explanation is available for this
question! 26) Which of the following is not true
regarding to traditional information
processing?
24) What does a form define? - Published on 27 Aug 15
- Published on 27 Aug 15
a. Common sharing of data between
a. Where data is placed on screen applications
b. The width of each field b. Is file oriented
c. Both A and B c. Programs are dependent on the files
d. None of the above d. It is inflexible

Answer Explanation Answer Explanation

56
ANSWER: Common sharing of data No explanation is available for this
between applications question!

Explanation:
No explanation is available for this 29) What is the generalization of
question! functional dependencies?
- Published on 27 Aug 15
27) Which command permanently deletes a. Database dependencies
the record from database?
- Published on 27 Aug 15 b. Key dependencies

a. PACK c. Relation dependencies

b. ZAP d. None of these

c. SEEK Answer Explanation

d. SKIP ANSWER: Key dependencies

Answer Explanation Explanation:


No explanation is available for this
ANSWER: PACK question!

Explanation:
No explanation is available for this 30) What is the maximum length of a field
question! name?
- Published on 27 Aug 15
28) What is a network structure? a. 10 characters
- Published on 27 Aug 15
b. 30 characters
a. Dominant database.
c. 50 characters
b. Is physical representation of data
d. 20 characters
c. Many to many relationship
Answer Explanation
d. Is conceptually simple
ANSWER: 10 characters
Answer Explanation 31) Data items are composed of data
elements.
ANSWER: Many to many relationship
- Published on 27 Aug 15
Explanation:

57
a. True d. All of the above

b. False Answer Explanation

Answer Explanation ANSWER: Hide sensitive information

ANSWER: False Explanation:


No explanation is available for this
Explanation: question!
No explanation is available for this
question!
34) How can a tuple be divided in a
relational schema?
32) What is used to delete an entire file - Published on 27 Aug 15
except for a file structure?
- Published on 27 Aug 15 a. Domains

a. Eraser b. Queries

b. Pack c. Relations

c. Delete d. Joins

d. Zap Answer Explanation

Answer Explanation ANSWER: Domains

ANSWER: Zap Explanation:


No explanation is available for this
Explanation: question!
No explanation is available for this
question!
35) What is a trigger?
- Published on 27 Aug 15
33) Where can a subschema be used?
- Published on 27 Aug 15 a. It is a procedural code which is executed
automatically in response to certain events
a. Present information in different formats on a particular table or view.

b. Create very different personalized view b. Statement that enables to start any
of the same data DBMS.

c. Hide sensitive information c. Condition the system tests for the validity

58
of the database user. a. Established an index for a file

d. Statement that is executed by the user b. Sorts a file using a single key
when debugging an application program.
c. Sorts a file using two keys
Answer Explanation
d. Both B and C
ANSWER: It is a procedural code which is
executed automatically in response to Answer Explanation
certain events on a particular table or view.
ANSWER: Established an index for a file
Explanation:
No explanation is available for this Explanation:
question! No explanation is available for this
question!

36) What are the properties of Relational


Database model? 38) Which of the following provides an
- Published on 27 Aug 15 access path?
- Published on 27 Aug 15
a. Data is presented as a collection of
relations. a. Physical record key

b. Each relation is depicted as a table b. Private key

c. Each row ( “ tuple ” ) represents as a c. File key


single entity
d. None of the above
d. All of the above
Answer Explanation
Answer Explanation
ANSWER: File key
ANSWER: All of the above
Explanation:
Explanation: No explanation is available for this
No explanation is available for this question!
question!

39) Between what can information be


37) Which of the following is true transferred?
regarding indexing operation? - Published on 27 Aug 15
- Published on 27 Aug 15
a. DBMS to Spread sheet program

59
b. DBMS to Word processor program Answer Explanation

c. DBMS to Graphics program ANSWER: Print Files

d. All of the above Explanation:


No explanation is available for this
Answer Explanation question!

ANSWER: DBMS to Graphics program


42) Which command allows the user to
Explanation: change multiple fields?
No explanation is available for this - Published on 27 Aug 15
question!
a. Modify
b. Lookup
40) What is a transparent DBMS?
- Published on 27 Aug 15 c. Update

a. Keeps its logical structure hidden from d. Change


users
Answer Explanation
b. Keeps its physical structure hidden from
users ANSWER: Update

c. Cannot hide sensitive information from Explanation:


No explanation is available for this
users.
question!
d. Both A and B.
43) Which of the following command
Answer Explanation
executes faster?
- Published on 27 Aug 15
ANSWER: Cannot hide sensitive
information from users.
a. Copy File < FILE 1>< FILE 2 >
b. Copy Structure to < NEW FILE >
41) What is a report generator used for?
c. Copy to M FILE - DAT DELIMITED.
- Published on 27 Aug 15
d. Copy to < New file >
a. Update Files
b. Print Files Answer Explanation
c. Alter files ANSWER: Copy Structure to < NEW FILE
>
d. All the above

60
Explanation: Answer Explanation
No explanation is available for this
question! ANSWER: Isolation level

Explanation:
44) State the main difference between a No explanation is available for this
latch and a lock. question!
- Published on 27 Aug 15

a. Locks are more restrictive than Latches in 46) What relationships does Referential
that they are always exclusive. integrity control?
b. Latches are more restrictive than locks in - Published on 27 Aug 15
that they are always exclusive.
a. Attributes in a table
c. Latch is used to protect data while lock is b. Operations of an object
not.
c. Instances of a class
d. Lock is used to protect data while latch is
d. Tables in a database
not.
Answer Explanation
Answer Explanation
ANSWER: Attributes in a table
ANSWER: Latches are more restrictive
than locks in that they are always exclusive.
Explanation:
No explanation is available for this
Explanation:
question!
No explanation is available for this
question!
47) What type of database object represents
45) What are the following types of? a result set and is used to manipulate data
row by row?
SERIALIZABLE - Published on 27 Aug 15
REPEATABLE READ
a. Trigger
READ COMMITTED
b. Procedure
- Published on 27 Aug 15
c. Cursor
a. Locks
b. Logs d. Monitor

c. Isolation level Answer Explanation


d. Latch types ANSWER: Cursor

61
Explanation: question!
No explanation is available for this
question!
50) Under which category do the
commands CREATE and ALTER belong
48) Which of the following is / are known to?
as a minimal superkey? - Published on 26 Aug 15
- Published on 26 Aug 15
a. DML
a. Primary key b. DDL
b. Foreign key
c. UML
c. Unique key
d. None of the above.
d. Candidate key
Answer
Answer Explanation Explanation

ANSWER: Candidate key ANSWER: DDL


51) Attribute B has a functional
Explanation:
No explanation is available for this dependency on attribute A if, for each value
question! of attribute A, there is exactly one value of
attribute B. (Database)
- Published on 26 Aug 15
49) What is a degree of relation?
- Published on 26 Aug 15 a. True

a. It is the number of attributes of its relation b. False


schema.
b. The number of relationships with other Answer Explanation
tables
ANSWER: True
c. Number of association among two or
more entities Explanation:
No explanation is available for this
d. Number of foreign key dependencies question!

Answer Explanation
52) Which type of lock ensures that
ANSWER: It is the number of attributes of multiple updates cannot be made to the same
its relation schema. resource at the same time?
- Published on 26 Aug 15
Explanation:
No explanation is available for this

62
a. Schema schema of a table?
- Published on 26 Aug 15
b. Shared
a. DESCRIBE
c. Exclusive
b. DISPLAY
d. Intent
c. DESC
Answer Explanation
d. SHOW
ANSWER: Exclusive
Answer Explanation
Explanation:
No explanation is available for this ANSWER: DESCRIBE
question!
Explanation:
No explanation is available for this
53) What is degree 0 isolation? question!
- Published on 26 Aug 15

a. Transaction does not read dirty data from 55) Primary key should always be auto
other transactions. increment.
- Published on 26 Aug 15
b. Transaction does not commit any writes
until it completes all its writes. a. True

c. Transactions do not dirty data read by a b. False


transaction before the transaction commits.
Answer Explanation
d. A transaction does not overwrite data
updated by another user or process. ANSWER: True

Answer Explanation Explanation:


No explanation is available for this
ANSWER: A transaction does not question!
overwrite data updated by another user or
process.
56) What is the highest level in a hierarchy
Explanation: of data organization?
No explanation is available for this - Published on 26 Aug 15
question!
a. Data Record

54) Which command helps to display b. Data File

63
c. Database c. Attributes

d. None of the above d. Tables

Answer Explanation Answer Explanation

ANSWER: Database ANSWER: Attributes

Explanation: Explanation:
No explanation is available for this No explanation is available for this
question! question!

57) Which of the following is used to 59) What type of form says “ Each column
define the schema of each database hosted in type is unique ” ?
the DBMS? - Published on 26 Aug 15
- Published on 26 Aug 15
a. 1NF
a. ER diagram
b. 2NF
b. UML
c. 4NF
c. Database model
d. BCNF
d. Both b and c above
Answer Explanation
Answer Explanation
ANSWER: 1NF
ANSWER: Database model
Explanation:
Explanation: No explanation is available for this
No explanation is available for this question!
question!

60) Which among the following comprises


58) Which of the following has a of a complete record of all activities
relationship between / among themselves as responsible in affecting the database
a functional dependency? contents for a specific duration?
- Published on 26 Aug 15 - Published on 26 Aug 15

a. Rows a. Transaction log

b. Relations b. Data manipulation language

64
c. Query language d. Fifth

d. Report writer Answer Explanation

Answer Explanation ANSWER: Boyce - Codd

ANSWER: Transaction log Explanation:


61) What is 5NF? No explanation is available for this
- Published on 26 Aug 15 question!

a. The database should be in 3NF and all


tables can have only one primary key. 63) What are the Report Generators used
for?
b. There should be no cyclic dependencies in - Published on 26 Aug 15
a composite key.
a. Retrieve information from files
c. All attributes within the entity should
depend solely on the entity's unique b. Answer queries
identifier.
c. Both A & B
d. Tables cannot have multi - valued
d. None of the above
dependencies on a Primary Key.
Answer Explanation
Answer Explanation
ANSWER: Both A & B
ANSWER: There should be no cyclic
dependencies in a composite key. Explanation:
No explanation is available for this
Explanation: question!
No explanation is available for this
question!
64) What is durability?
- Published on 26 Aug 15
62) Which is an essential characteristic of a
normal form where every determinant in a
a. When an update occurs to a database,
table must be a candidate key? either all or none of the update becomes
- Published on 26 Aug 15 available to anyone
a. First b. The transactions have been committed
and will survive permanently
b. Second
c. It determines how the transaction integrity
c. Boyce - Codd

65
will be visible to the other users and systems c. DISTINCT

d. All of the above d. UNIQUE

Answer Explanation Answer Explanation

ANSWER: When an update occurs to a ANSWER: DISTINCT


database, either all or none of the update
becomes available to anyone Explanation:
No explanation is available for this
Explanation: question!
No explanation is available for this
question!
67) Issuing which type of savepoint will
cause the named savepoint to be discarded?
65) Which type of lock does a record or (Database)
page get locked immediately? - Published on 26 Aug 15
- Published on 26 Aug 15
a. TRUNCATE SAVEPOINT
a. Pessimistic locking
b. DELETE SAVEPOINT
b. Optimistic locking
c. DISCARD SAVEPOINT
c. Both A & B
d. RELEASE SAVEPOINT
d. None of the above
Answer Explanation
Answer Explanation
ANSWER: RELEASE SAVEPOINT
ANSWER: Pessimistic locking
Explanation:
Explanation: No explanation is available for this
No explanation is available for this question!
question!

68) What is an audit trial? (Database)


66) Which SQL keyword is used to remove - Published on 26 Aug 15
the duplication of rows from the result set?
- Published on 26 Aug 15 a. Used for making backup copies

a. DELETE b. The recorded history of operations


performed on a file
b. SELECT
c. Used for retrieving the lost information

66
d. All of the above b. False

Answer Explanation Answer


Explanation
ANSWER: The recorded history of
operations performed on a file ANSWER: False
71) What type of relationship does a
Explanation:
hierarchical schema help to establish
No explanation is available for this
question! between the items of a database?
- Published on 25 Aug 15

69) What is truncating a table? a. top-to-bottom relationship


- Published on 25 Aug 15
b. bottom-to-top relationship
a. Data alone deleted, Performs an automatic
c. one-to-many relationship
commit
d. many-to-one
b. Data alone deleted, Doesn’t perform
automatic commit Answer Explanation
c. Table structure + Data are deleted ANSWER: top-to-bottom relationship
d. Table structure alone deleted, Performs an Explanation:
automatic commit No explanation is available for this
question!
Answer Explanation

ANSWER: Data alone deleted, Performs an 72) What do you mean by atomicity?
automatic commit - Published on 25 Aug 15
Explanation: a. When an update occurs to a database,
No explanation is available for this
either all or none of the update becomes
question!
available to anyone

b. It determines how the transaction integrity


70) A ROLLBACK statement will also
will be visible to the other users and systems
release any existing savepoints that may not
be in use. c. The transactions have been committed
- Published on 25 Aug 15 and will survive permanently
a. True d. All of the above

67
Answer Explanation d. Key and Ordering

ANSWER: When an update occurs to a Answer Explanation


database, either all or none of the update
becomes available to anyone ANSWER: Non-key and ordering

Explanation: Explanation:
No explanation is available for this No explanation is available for this
question! question!

73) Which is the concurrency control 75) Which of the following may lead to an
protocol that ensure both conflict irrecoverable error in a database system?
serializability and freedom from deadlock? - Published on 25 Aug 15
(Database)
- Published on 25 Aug 15 a. A transaction reads a data item after it is
written by an uncommitted transaction
a. Time stamp ordering
b. A transaction reads a data item after it is
b. 2 - phase locking written by a committed transaction

c. Both A and B c. A transaction reads a data item after it is


read by an uncommitted transaction
d. Neither A nor B
d. A transaction writes a data item after it is
Answer Explanation read by an uncommitted transaction

ANSWER: Time stamp ordering Answer Explanation

Explanation: ANSWER: A transaction reads a data item


No explanation is available for this after it is written by an uncommitted
question! transaction

Explanation:
74) Which type of clustering index is No explanation is available for this
defined on the fields? question!
- Published on 25 Aug 15

a. Non-key and non-ordering 76) Which of the following statement is /


are not true about normal forms? (Database)
b. Non-key and ordering - Published on 25 Aug 15

c. Key and non-ordering a. Any relation with two attributes is in

68
BCNF Explanation:
No explanation is available for this
b. BCNF is stricter than 3NF question!

c. Lossless, dependency - preserving


decomposition into 3NF is always possible 78) The functional dependencies for the
relational schema student performance
d. Lossless, dependency - preserving (name, courseNo, rollno, grade) is given
decomposition into BCNF is always below :
possible
name, courseNo -> grade
Answer Explanation
rollno, courseNo -> grade
name -> rollno
ANSWER: Lossless, dependency -
preserving decomposition into BCNF is rollno-> name
always possible
What is the highest normal form of this
Explanation: relational schema?
No explanation is available for this - Published on 25 Aug 15
question!
a. 3NF

77) What is the maximum possible size of b. 4NF


the file in the index allocation scheme of
blocks to a file depend on? (Database) c. BCNF
- Published on 25 Aug 15
d. 2NF
a. The size of the blocks and the size of the
address of the blocks Answer Explanation

b. The number of blocks used for the index, ANSWER: 3NF


the size of the blocks and the size of the
Explanation:
address of the blocks
No explanation is available for this
question!
c. The number of blocks used for the index
and the size of the blocks
79) Which normal relational database
d. None of the above
design the form that is considered adequate?
Answer Explanation - Published on 25 Aug 15

ANSWER: The number of blocks used for a. 3NF


the index and the size of the blocks

69
b. 5NF b. 2 tuples

c. 2NF c. 3 tuples

d. 4NF d. 4 tuples

Answer Explanation Answer Explanation

ANSWER: 3NF ANSWER: 3 tuples

Explanation: Explanation:
No explanation is available for this No explanation is available for this
question! question!

80) Which one of the following statements 82) Database: A condition that led to the
is / are true about SQL? development of database was
- Published on 25 Aug 15 - Published on 29 Jun 15

a. SQL permits attribute names to be a. A demand for more data to support


repeated in the same relation information needs

b. If there are no indexes on the relations b. An increase in the amount of data handled
then an SQL query will not work by organizations

c. Duplicates are automatically eliminated c. The poliferation of data files


by an SQL query
d. All of above
d. None of the above
Answer Explanation
Answer Explanation
ANSWER: All of above
ANSWER: None of the above
81) Consider an SQL query Explanation:
No explanation is available for this
question!
SELECT A.Id FROM A WHERE A.Age>
All (SELECT B.Age FROM B WHERE
B.name = ‘Anay’) 83) Database: Which of the following
fields in a student file can be used as a
The result of this query contains primary key?
- Published on 25 Aug 15 - Published on 29 Jun 15
a. 1 tuple

70
a. class aggregate function?
- Published on 29 Jun 15
b. Social Security Number
a. Count
c. GPA
b. Avg
d. Major
c. Create
Answer Explanation
d. Max
ANSWER: Social Security Number
Answer Explanation
Explanation:
The primary key is a unique identifier and ANSWER: Create
it is unique for each record. Here the social
security number is unique as each student is Explanation:
identified by that and there will be no The aggregate functions are used for
duplications. calculation in the database. The create is a
keyword used in dbms.

84) Database: Which is the make given to


the database management system which is 86) Database: To avoid the problem of
able to handle full text data, image data, updating you can take the following
audio and video? principle for a good database design.
- Published on 29 Jun 15 - Published on 29 Jun 15

a. full media a. Unrelated data should be kept in different


table.
b. graphics media
b. Table should not contain any redundancy.
c. multimedia
c. Table should represent constraint.
d. hypertext
d. All the above
Answer Explanation
Answer Explanation
ANSWER: multimedia
ANSWER: All the above
Explanation:
multimedia is where there are collection of Explanation:
pictures,video,audio,text. No explanation is available for this
question!

85) Database: Which is not a function of

71
87) Database: In second normal form Explanation:
______________________ The Database lookup allows you to look up
- Published on 29 Jun 15 for the values in a database table. The
lookup values are added as new fields onto
a. A composite attributes is converted to the stream.
individual attributes.

b. Non key attributes are functional 89) An unnormalized relation contains


dependent on key attributes. values ?
- Published on 25 Jun 15
c. The non key attributes functionally
dependent on not a part of key attributes. a. Atomic

d. All the above. b. Non - Atomic

Answer Explanation c. Classified

ANSWER: Non key attributes are d. None of these


functional dependent on key attributes.
Answer Explanation
Explanation:
A table is said to be in the second normal ANSWER: Classified
form when all the non-key attributes are
fully functional dependent on the primary Explanation:
key. No explanation is available for this
question!

88) Primitive operations common to all


record management system include ? 90) A trigger is ?
(Database) - Published on 25 Jun 15
- Published on 25 Jun 15
a. A statement that enables to start any
a. Print DBMS

b. Sort b. A statement that is executed by the user


when debugging an application program
c. Look up
c. A condition the system tests for the
d. All of above validity of the database user

Answer Explanation d. A statement that is executed automatically


by the system as a side effect of
ANSWER: Look up modification to the database

72
Answer Explanation d. All the above

ANSWER: A statement that is executed Answer Explanation


automatically by the system as a side effect
of modification to the database ANSWER: All the above

Explanation: Explanation:
A database trigger is what is executed The tables designed in a database are very
automatically in response to certain events important. If the above criteria are not
on a particular table or view in a database. fulfilled we would say that the table design
It is mostly used to maintain the integrity of is bad.
the database.
91) Which of the following database object
does not physically exist? (Database) 93) Databases: The view of total database
- Published on 25 Jun 15 content is _____
- Published on 25 Jun 15
a. Base table
a. Conceptual view.
b. Index
b. Internal view.
c. View
c. External view
d. None of the above
d. Physical View.
Answer Explanation
Answer Explanation
ANSWER: View
ANSWER: Conceptual view.
Explanation:
A view is a result set of a stored query on Explanation:
the data in which the database users can The conceptual view is where it describes
query just as they would in a database what data are actually stored in the
collection database. It contains information about the
entire database in terms of small and simple
structures.
92) What are the important criteria for
designing tables? (Datebases)
- Published on 25 Jun 15 94) Which is the major data structure used
in RDBMS?
a. Meaningful grouping of attribute
- Published on 16 Jun 15
b. No redundancy
a. Trees
c. No inapplicable attribute

73
b. Stacks a. Disk capacities are greater than memory
capacities
c. Graph
b. Disk access is much slower than memory
d. Array access

Answer Explanation c. Disk data transfer rates are much less than
memory data transfer rates
ANSWER: Array
d. Disks are more reliable than memory
Explanation:
Array of structures is used majorly in Answer Explanation
RDBMS so that the data is maintained
properly.
ANSWER: Disks are more reliable than
memory

95) Which of the following forms is Explanation:


considered as adequate for normal relational Transfer of data from disk to primary
database design? memory is in form of data blocks. These
- Published on 16 Jun 15 data blocks can store large information
while transferring,transferring on single
a. 1NF block is more efficient.

b. 5NF
97) State the concurrency protocols which
c. 4 NF ensure both conflict serializability and
freedom from deadlock
d. 3NF 1. 2-phase locking
2. Time-stamp ordering
Answer Explanation
- Published on 16 Jun 15
ANSWER: 3NF
a. 1 only
Explanation:
b. 2 only
There is not always a decomposition into
BCNF that is lossless and dependency
c. Both 1 and 2
preserving. So 3NF is considered adequate
for normal RDBMS design.
d. Neither 1 nor 2

Answer Explanation
96) Why are B+ trees preferred over binary
trees in databases? ANSWER: 2 only
- Published on 16 Jun 15
Explanation:

74
As the time- stamp ordering is a non-lock Click on Discuss to view users
concurrency control method. It is used to comments.
safely handle transactions. 3:
Computer Network:
Simple network management protocol
1: (SNMP) is implemented with a daughter
board in
Which of the following is possible in a token
passing bus network ? A. the nodes

A. in-service expansion B. the server

B. unlimited number of stations C. the hubs

C. both (a) and (b) D. a separate PC that manages the network

D. unlimited distance Answer Report Discuss

Answer Report Discuss Option: C

Option: A Explanation :

Explanation : Click on Discuss to view users


comments.
Click on Discuss to view users 4:
comments.
2: The amount of uncertainty in a system of
symbol is called
In networking terminology UTP means
A. Bandwidth
A. Unshielded Twisted pair
B. Entropy
B. Ubiquitious Teflon port
C. Loss
C. Uniformly Terminating port
D. Quantum
D. Unshielded T-connector port
Answer Report Discuss
Answer Report Discuss
Option: B
Option: A
Explanation :
Explanation :
Click on Discuss to view users

75
comments. A. 1963, USA
5:
B. 1965, Germany
Working of the WAN generally involves
C. 1950, USA
A. telephone lines
D. 1950, Japan
B. micro waves
Answer Report Discuss
C. satellites
Option: C
D. All of these
Explanation :
Answer Report Discuss
Click on Discuss to view users
comments.
Option: D 8:
6:
Fibre optics have maximum segment
Different computers are connected to a
LAN by a cable and A. 500 m

A. modem B. 200 m

B. interface card C. 100 m

C. special wires D. 2000 m

D. telephone lines Answer Report Discuss

Answer Report Discuss Option: D

Option: B Explanation :

Explanation : Click on Discuss to view users


comments.
Click on Discuss to view users 9:
comments.
7: Twisted pair have maximum segment of

Modem is used in data trasmission. When A. 500 m


was it involved and in which country ?
B. 200 m

76
C. 100 m Option: D

D. 2000 m Explanation :

Answer Report Discuss A half-duplex (HDX) system provides


communication in both directions, but
Option: C only one direction at a time (not
simultaneously). Typically, once a party
Explanation : begins receiving a signal, it must wait for
the transmitter to stop transmitting,
Click on Discuss to view users before replying (antennas are of trans-
comments. receiver type in these devices, so as to
transmit and receive the signal as well).
10:
A full-duplex (FDX), or
sometimes double-duplex system, allows
Thick coax have maximum segment of communication in both directions, and,
unlike half-duplex, allows this to happen
A. 500 m simultaneously. Land-line
telephone networks are full-duplex, since
B. 200 m they allow both callers to speak and be
heard at the same time, the transition
C. 100 m from four to two wires being achieved by
a hybrid coil. A good analogy for a full-
D. 700 m duplex system would be a two-lane road
with one lane for each direction.
Answer Report Discuss For further Reference Click Here

Click on Discuss to view users


Option: A comments.
11: 12:

Method of communication in which Unmodulated signal coming from a


transmission takes place in both directions, transmitter is known as
but only in one direction at a time, is called
A. carrier signal
A. simplex
B. baseband signal
B. four wire circuit
C. primary singal
C. full duplex
D. None of these
D. half duplex
Answer Report Discuss
Answer Report Discuss

77
Option: B C. full-duplex

Explanation : D. All of these

Click on Discuss to view users Answer Report Discuss


comments.
13: Option: B

Bit stuffing refers to Explanation :

inserting a '0' in user stream to Click on Discuss to view users


A. comments.
differentiate it with a lag
15:
inserting a '0' in lag stream to avoid
B. Frequency range at which the land coaxial
ambiguity
cables are used, is
C. appending a nibble to the lag sequence
A. 106 to 108 Hz
D. appending a nibble to the use data stream
B. 1010 to 1011 Hz
Answer Report Discuss
C. 103 to 104 Hz
Option: A
D. None of these
Explanation :
Bit stuffing is required when there is a Answer Report Discuss
flag of bits to represent one of the
incidents like start of frame, end of Option: A
frame, etc, If same lag of bits appear in
the data stream, a zero can be inserted. 16:
The receiver deletes this zero from the
data stream. What uses a physical star topology ?

Click on Discuss to view users A. 10 base 5


comments.
14: B.
10 base 2
In a broad sense, a railway track is an
example of C. 10 base T

A. simplex D. None of these

B. half-duplex Answer Report Discuss

78
Option: C B. Regeneration of the frame

Explanation : C. Passing of the frame to the next station


10 base T cable is also called as
Twisted-pair- D. All of these
Ethernet. A star topology LAN using
unshared Answer Report Discuss
twisted pair instead of coaxial cable
Option: D
Click on Discuss to view users
comments. Explanation :
17: In a token ring each station with capture
the token and checks the destination
The monitor station in what standard address if it is
ensures that one and only one token is addressed to any other station then the
circulating ? frame
will be regenerated and passed to the next
A. 802.3 station

B. 802.5 Click on Discuss to view users


comments.
C. Both (a) and (b) 19:

D. All of these In Token Ring, when a frame reaches its


destination station, then
Answer Report Discuss
A. message is copied
Option: B
B. four bits in the packet are changed
Explanation :
Here 802.3 is Ethernet, it uses message is taken of the ring and replaced
CSMA/CD. But 802.5 is Token ring. It C.
by the token
will have only one token in circulation.
These are IEEE standards but FDDI is D. both (a) and (b)
ANSI standard
Answer Report Discuss
Click on Discuss to view users
comments.
Option: D
18:
Explanation :
What can happen at a Token Ring station In Token ring, when a frame reaches its
destination station, the entire message is
A. Examination of the destination address copied and four bits in the packet are
changed.

79
Click on Discuss to view users Base - TX is 100 meters. But in 100-
comments. Base-FX
20: design. The distance between station-to-
hub is
Which of the following is not a transceiver 2000 meters.
function?
Click on Discuss to view users
comments.
A. Transmission and receipt of data
22:
B. Checking of line voltages
Ether LAN uses
C. Addition and subtraction of headers
A. polar encoding
D. Collision detection
B. diferential manchester encoding
Answer Report Discuss
C. manchester encoding
Option: C
D. NRZ
Explanation :
Transceiver is an acronym for Answer Report Discuss
transmission receiver, which receives
data after checking the line voltage, Option: C
hence it can't add headers.
1: Explanation :
. Base band Ethernet LAN uses
The station-to-hub distance in which of the Manchester encoding
following is 2000 meters ?
Click on Discuss to view users
comments.
A. 100 Base-TX
23:
B. 100 Base-FX
Which of the given below houses the
C. 100 Base - T4 switches in Token Ring ?

D. 100 Base - T1 A. NIC

Answer Report Discuss B. MAU

Option: B C. Nine-pin connector

Explanation : D. Transceiver
The distance between station-to-hub in
100

80
Answer Report Discuss 25:

Option: B IBM's Token-Ring network uses

Explanation : A. adaptive routing


MAU (Multistation Access Unit) :
Individual automatic switches are B. source routing
combined into
a hub called a multistation access unit C. alternative routing
(MAU)
and MAU can support up to eight D. spanned tree routing
stations. Token ring uses the MAU.
Answer Report Discuss
Click on Discuss to view users
comments.
24: Option: A
26:
Which of the following uses an 8B/6T
encoding scheme?
In which circuit switching, delivery of data
is delayed because data must be stored and
A. 100 Base-TX retrieved from RAM

B. 100 Base-FX A. space-division


C. 100 Base-T4 B. time-division

D. 100 Base-T1 C. virtual

Answer Report Discuss D. packet


Option: C Answer Report Discuss
Explanation : Option: B
100 base-T4 requires four pairs of
unshielded
Explanation :
twisted pair cable to reduce baud rate of
TSI (Time Slot Interchanger) in time
transmission (number of signal changes)
division switches consists of random
8B/6T
access memory (RAM) with several
(eight binary / six ternary) is used in
memory locations. The RAM ills up with
which each block of eight bits is
incoming data from the time slots in the
transformed into six bauds
order received. Hence in time division
of three voltages levels.
switches deliver of data is delayed
because data
Click on Discuss to view users must be stored and retrieved from RAM.
comments.

81
Click on Discuss to view users Answer Report Discuss
comments.
27: Option: D

If a network designer wants to connect 5 Explanation :


routers as point-to-point simplex line, then
total number of lines required would be Click on Discuss to view users
comments.
A. 5 29:

B. 10 A 100 km long cable runs at the T1 data


rate. The propagation speed in the cable is
C. 20 half the speed of light. How many bits is in
the cable ?
D. 32
A. 572
Answer Report Discuss
B. 672
Option: B
C. 772
Explanation :
D. 873
If 1st router connect with other 4 routers
then total for 1st=4 same as 2nd router Answer Report Discuss
connect with 3 routers so total for 2nd=3
same as for 3rd router connect with 2 Option: C
routers so total =2 same as 4th router
with 1 so total=1 so total simplex lines Explanation :
will be = 4+3+2+1=10. So answer is 'B'.
Propagation speed in the cable = 200,000
Click on Discuss to view users km/sec = 200 km/psec. Hence 100 km
comments. cable will be filled in 500 psec. This
28: corresponds to four 193-bit frames, or
772 bits on the cable.
To interface a computer terminal with a
modem, required physical layer standard is Click on Discuss to view users
comments.
A. RS 424 - A 30:

B. RS 232 - C How much bandwith is there in 0.1 micron


of spectrum at a wavelength of 1 micron ?
C. RS 449
A. 20,000 GHz
D. Either (b) or (c)

82
B. 25,000 GHz λ=2.5 x 105 microns

C. 30,000 GHz

D. None of these Click on Discuss to view users


comments.
Answer Report Discuss 32:

Option: C Establishing a virtual connection is virtually


equivalent to
Explanation :
A. connecting as virtual memory
Given : ∆ λ= 10-6, and λ= 10-6
B. physically connecting a DTE and DCE
∆f = (c∆λ)/λ2=30,000 GHz
31: placing a telephone call prior to a
C.
conversion
It is desired to send a sequence of computer
screen images over an optical fiber. The D. placing a modem prior to a conversion
screen is 480 x 640 pixels, each pixel being
24 bits. There are 60 screen images per Answer Report Discuss
second. How much bandwidth is needed,
and how many microns of wavelenth are Option: C
needed for this band at 1.30 microns?
Explanation :
A. 1.0 x 105 microns
Click on Discuss to view users
B. 2 x 105 microns comments.
33:
C. 2.5 x 105 microns
How many digits of the network user
D. 5 x 105 microns Address are known as the DNIC (Data
Network Identiication Code) ?
Answer Report Discuss
A. First three
Option: C
B. First four
Explanation :
C. First five
Data rate is 480 x 640 x 24 x 60 bps,
which is 442 Mbps.
Assume 1 bps per Hz. ∆ λ = 4.42 x 105 D. First seven
From the ralation λ = ∆ λ c
⇒ ∆ λ= λ2/c Answer Report Discuss
∆ λ =4.42 x 105

83
Option: B Option: A
Explanation : 36:

Click on Discuss to view users Which of the following digits are known as
comments. the terminal number of the network user
34: address

How many digits of the DNICC (Data A. 5-7


Network Identiication Code) identify the
country ? B. 1-4

A. First three C. 8-12

B. First four D. 13-14

C. First five Answer Report Discuss

D. First six Option: C

Answer Report Discuss Explanation :

Option: A Click on Discuss to view users


comments.
Explanation : 37:

Click on Discuss to view users Four bits are used for packed sequence
comments. numbering in a sliding window protocol
35: used in a computer network. What is the
maximum window size ?
Which of the following digits are known as
the area code of the network user address A. 4
(NUA) ?
B. 8
A. 5-7
C. 15
B. 1-4
D. 16
C. 8-12
Answer Report Discuss
D. 13-14
Option: C
Answer Report Discuss

84
Explanation : Option: C

Click on Discuss to view users Explanation :


comments.
38: Click on Discuss to view users
comments.
A station in a network forward incoming 40:
packets by placing them on its shortest
output queue. What routing algorithm is Working of the WAH generally involves
being used ?
A. telephone lines
A. Hot potato routing
B. micro waves
B. Floding
C. satellites
C. Static routing
D. All of these
D. Delta routing
Answer Report Discuss
Answer Report Discuss
Option: D
Option: A
41:
Explanation :
Slotted ALOHA
Click on Discuss to view users
comments. A. divide time into discrete intervals
39:
B. require global time synchronization
Which of the following program is used to
copy files to or from another using time C. both (a) and (b)
sharing system over a single link ?
D. none of these
A. VMTP
Answer Report Discuss
B. TFTP
Option: C
C. UUCP
Explanation :
D. UART
Click on Discuss to view users
Answer Report Discuss comments.
42:

85
Start and stop bits are used in serial The systems that can be used in both priority
communication for and non-priority modes is

A. error detection A. TDM

B. error correction B. Register insertion

C. synchronization C. Carrier sense systems

D. slowing down the communication D. all of these

Answer Report Discuss Answer Report Discuss

Option: C Option: C

Explanation : Explanation :

Click on Discuss to view users Click on Discuss to view users


comments. comments.
43: 45:

In the carrier sense network, if prevailing Number of cross point needed for 10 lines
condition is a 'channel busy', then technique in a cross point switch which is full duplex
used is in nature and there are no self-connection is

A. non-persistent then it results in A. 100


randomised wait and sense
B. 1-persistent then the channel is B. 45
continually sensed
C. p-persistent then randomised C. 8
retransmission is done
D. both (a) and (b) D. 28

Answer Report Discuss Answer Report Discuss

Option: B Option: B

Explanation : Explanation :

Click on Discuss to view users As all lines are full-duplex and there are
comments. no self-connections, only the cross points
above the diagonal are needed. Hence
44:
formula for the number of cross points
needed is n (n -1) / 2
6:

86
Maximum data rate of a channel for a Explanation :
noiseless 3-kHz binary channel is
Click on Discuss to view users
A. 3000 bps comments.
48:
B. 1500 bps
Minimum number of bits required to
C. 6000 bps represent all the symbols together is

D. none of these A. 15

Answer Report Discuss B. 14

Option: C C. 12

Explanation : D. 11

Maximum data rate = 2H log2 V bps, Answer Report Discuss


where, H = bandwidth
V = discrete levels Option: A
Here H is 3 kHz and V is 2.
Explanation :
Click on Discuss to view users
comments.
Click on Discuss to view users
47: comments.
49:
Which of the following measures the
number of lost or garbled messages as a A field in the Ethernet message packet is
fraction of the total sent in the sampling
period ?
A. Type
A. Residual error rate
B. data
B. Transfer failure probability
C. address
C. Connection release failure probability
D. none of these
D. Connection establishment failure
Answer Report Discuss
probability
Answer Report Discuss Option: D
Option: A Explanation :

Click on Discuss to view users

87
comments. 50,000.
50:
S / N = 230 -1,48 ~ 93 db.
If data rate of ring is 20 Mbps, signal
propagation speed is 200 b/ms, then number Click on Discuss to view users
of bits that can be placed on the channel of comments.
200 km is 52:

A. 2000 bits In which ARQ, when a NAK is received, all


frame sent since the last frame
B. 20,000 bits acknowledged an retransmitted

C. 1,000 bits A. stop-and-wait

D. none of these B. go-back-n

Answer Report Discuss C. selective-reject

D. both (a) and (b)


Option: B
51: Answer Report Discuss

What signal-to-noise ratio is needed to put a Option: B


T1 carrier on a T0-kHz line ?
Explanation :
A. 63 db
In the case of go-back-n protocol, when a
B. 73 db NAK is received, all the frames sent
since the last frame acknowledged are
retransmitted. Go ----> Back ----> n.
C. 83 db
Click on Discuss to view users
D. 93 db comments.
53:
Answer Report Discuss
PURE ALOHA
Option: D

Explanation : A. Does not require global time


synchronization
B. does require global time synchronization

To send a T1 signal we need C. both (a) and (b)

Hlog2, (1 + S / N ) = 1.544 x 106 with

88
D. none of these B. stop and wait

Answer Report Discuss C. continuous ARQ

Option: A D. none of these

Explanation : Answer Report Discuss

Click on Discuss to view users


comments. Option: A
54: 56:

Manchester code is a Adaptive or dynamic directory used in


packet routing changes
A. non-return to zero code
A. within each user session
B. polar code
B. with each user session
C. both (a) and (b)
C. at system generation time only
D. none of these
D. none of these
Answer Report Discuss
Answer Report Discuss
Option: C
Option: A
Explanation :
Explanation :
In bipolar code, the singal varies among
three levels. In non-return to zero code, Click on Discuss to view users
the signal remains the same through-out comments.
the bit cell. In unipolar code, there will be 57:
no signal either below zero or above zero.
In Manchester code, the signal level will Differential Manchester code for the given
not vary in the middle and is unipolar. figure is
Click on Discuss to view users
comments.
55:

Non-polling system is

A. TDMA

89
Explanation :

Maximum number of bps = Hlog2 (1 +


SNR).

Click on Discuss to view users


comments.
59:

Minimum number of bits required to


represent B is
A. 111100101
A. 1
B. 100010111
B. 2
C. 101001111
C. 3
D. 101001101
D. 4
Answer Report Discuss
Answer Report Discuss
Option: B
Option: C
Explanation :
Explanation :
Click on Discuss to view users
comments.
Click on Discuss to view users
58: comments.
60:
Maximum data rate of a channel of 3000 Hz
bandwidth and SNR of 30 dB is
A 3000 Hz bandwidth noisy channel
transmits bits with a signal to thermal noise
A. 75,000 bps ratio of 30 dB. What is the maximum data
rate of the channel ?
B. 60,000 bps
A. 30 kbps
C. 30,000 bps
B. 00 kbps
D. 3,000 bps
C. 60 kbps
Answer Report Discuss
D. none of these
Option: C

90
Answer Report Discuss Click on Discuss to view users
comments.
Option: A 63:

61: In stop-and-wait ARQ, if data 1 has an


error, then receiver sends which frame ?
In a broad sense, a railway track is an
example of A. NAK 0

A. simplex B. NAK 1

B. C. NAK 2
half-duplex
C. full-duplex D. NAK

D. all of these Answer Report Discuss

Answer Report Discuss Option: D

Option: B Explanation :

Explanation : Stop-and-wait ARQ (Automatic Repeat


Request) is similar to stop - and - wait
Click on Discuss to view users flow control protocol, but it includes
comments. retransmission of data in case of lost or
62: damaged frames.
Both data and ACK frames are numbered
Which of the following access control alternately 0 and 1. But NAK frames are
methods is probabilstic ? not numbered. If any error occurs the
Receiver sends a NAK frame, it tells the
sender to retransmit the frame last sent.
A. Polling
Sender maintains a copy of frame until
the Acknowledgement is back.
B. Contention
Click on Discuss to view users
C. Token passing comments.
64:
D. Sliding window
In which communication, poll/select method
Answer Report Discuss
used to determine control of the line ?
Option: D
A. peer-to-peer
Explanation :
B. peer-to-primary

91
C. primary-to-peer subfields?

D. primary-to-secondary I. Router change flag


II. Virtual path identifier
Answer Report Discuss III. Header error control
IV. Cell loss priority
Option: D
- Published on 19 Oct 15
Explanation :
a. III, IV
Poll / select method is used in primary - b. II, III, IV
to - secondary communication.
c. I, II
ENQ/ACK is used in peer-to-peer
communication method. d. I, III, II
Click on Discuss to view users Answer Explanation
comments.
65: ANSWER: II, III, IV

The secondary device in a multipoint Explanation:


configuration sends data in response to No explanation is available
which of the following event ? for this question!

A. ACK
2) All networks require a
B. ENQ central location to bring
media segments together.
C. Poll These central locations are
called _________ .
D. Sel
- Published on 19 Oct 15
Answer Report Discuss
a. Bridges
b. Switches
Option: C
c. Hubs
Explanation :
d. Routers
Poll/select is a line discipline method.
The primary device always initiates Answer Explanation
communication with either a poll or
select (SEL) frame. In this point the ANSWER: Hubs
secondary device sends data in response
to a poll frame event. Explanation:
1) Which of the following No explanation is available
is/are functions of header

92
for this question! routing is not.

d. Forwarding is used in
3) Why ATM was telephony while routing is
developed? used in all networks.
- Published on 19 Oct 15
Answer Explanation
a. To handle both traditional
high-throughput data traffic ANSWER: Forwarding is
used in telephony while
and real-time,low-latency
routing is used in all
content. networks.
b. Designed to unify
telecommunication and Explanation:
computer networks. No explanation is available
for this question!
c. To meet the needs of the
Broadband Integrated
Services Digital Network. 5) Match the following List
1 to List 2
d. All of the above.
1. Open message ---------------
Answer Explanation
i. To close an active session
ANSWER: All of the above. 2. Update message ------------
ii. Opens a BGP
Explanation: communications session
No explanation is available 3. Keep-alive message --------
for this question! iii. Provide routing updates to
other BGP system
4. Notification message -------
4) What is the difference
iv. Notifies BGP peers device
between forwarding and
is active
routing?
- Published on 19 Oct 15
- Published on 19 Oct 15
a. 1-ii, 2-i, 3-iv, 4-iii
a. Forwarding does not
b. 1-iv, 2-iii, 3-i, 4-ii
transmit data on outgoing
links, but routing does. c. 1-ii, 2-iii, 3-iv, 4-i
b. Forwarding finds suitable
path for a packet than routing. d. 1-i, 2-ii, 3-iii, 4-iv

c. Forwarding is a part of Answer Explanation


decision making while
ANSWER: 1-ii, 2-iii, 3-iv, 4-

93
i information.

Explanation: Answer Explanation


No explanation is available
for this question! ANSWER: Maintains the
path information and gets
updated dynamically.
6) Which of the following
is/are the advantages of Explanation:
hierarchical routing? No explanation is available
for this question!
- Published on 19 Oct 15

a. Portability
8) What is a path vector
b. Scalability
routing?
c. Reliability - Published on 19 Oct 15

d. Flexibility a. network routing protocol


b. inter-domain routing
Answer Explanation
c. exterior gateway protocol
ANSWER: Scalability
d. None of the above
Explanation:
No explanation is available Answer Explanation
for this question!
ANSWER: network routing
protocol
7) Which of the following
statements is/are true about Explanation:
No explanation is available
path vector routing?
for this question!
- Published on 19 Oct 15

a. Path vector routing is 9) What is the default port of


similar to the link state router. SMTP?
b. Exterior Gateway Protocol - Published on 19 Oct 15
(EGP) is used in Path Vector.
a. 85
c. Maintains the path
b. 70
information and gets updated
dynamically. c. 80

d. Not flexible in selecting the d. 25


path while hiding the

94
Answer Explanation Answer Explanation

ANSWER: 25 ANSWER: CDMA offers


higher transmission quality
Explanation: than TDMA.
No explanation is available
for this question! Explanation:
No explanation is available
for this question!
10) Ethernet is a multi-
access network and most
successful local area 12) What is/are the
networking technology. advantages of TDMA?
- Published on 19 Oct 15 - Published on 19 Oct 15

a. True a. provide entire bandwidth


b. False but not simultaneously

Answer b. cost effective technology


Explanation
c. offer personal
ANSWER: True communication
11) What is the difference
d. All of the above
between TDMA and CDMA?
- Published on 19 Oct 15
Answer Explanation
a. In CDMA only one user is
ANSWER: All of the above
allowed to share a channel or
sub channel . while it is Explanation:
allowed in TDMA. No explanation is available
for this question!
b. CDMA offers higher
transmission quality than
TDMA. 13) Abbreviate TDMA.
- Published on 19 Oct 15
c. CDMA is a dominant
technology in the wireless a. Time Division Multiple
market than TDMA. Access

d. Both a and b b. Tree Diagonal Matrix


Algorithm
e. Both b and c
c. Transmission Devices

95
Media Access - Published on 19 Oct 15

d. Transport Devices Multiple a. Router don’t knows the


Algorithm identity of other router.

Answer Explanation b. Cost of each couple is not


equal to destination.
ANSWER: Time Division
Multiple Access c. Each router maintains a
distance vector.
Explanation:
No explanation is available d. All of the above.
for this question!
Answer Explanation

14) What is the use of LAN ANSWER: Each router


bridges in the network? maintains a distance vector.
- Published on 19 Oct 15
Explanation:
a. Provides real time and non No explanation is available
real time services. for this question!

b. Checks the MAC address


of source and destination. 16) Consider the following
types,
c. Provides broadband ISDN
for the data packets. I. Destination unreachable
II. Source quench
d. None of the above III. Query Messages
IV. Time exceeded
Answer Explanation V . Redirection
ANSWER: Checks the MAC
address of source and In the above, which is/are the
destination. error reporting types?
- Published on 19 Oct 15
Explanation:
No explanation is available a. I, II, III
for this question!
b. I, II, IV, V

15) Which of the following c. III, IV, V


statements is/are correct about
d. III, II, IV, V
distance vector?

96
Answer Explanation 3. Netstat --------- iii) control
the network connections on
ANSWER: I, II, IV, V Windows NT/XP
4. Ipconfig -------- iv) finding
Explanation: problems in the network
No explanation is available
- Published on 19 Oct 15
for this question!
a. 1-iii, 2-i, 3-iv, 4-ii
17) ICMP stands for b. 1-ii, 2-i, 3-iv, 4-iii
______________ .
- Published on 19 Oct 15 c. 1-i, 2-iii, 3-ii, 4-iv

a. Internet Component Mail d. 1-iv, 2-ii, 3-iii, 4-ii


Protocol
Answer Explanation
b. Internet Control Mail
Protocol ANSWER: 1-ii, 2-i, 3-iv, 4-
iii
c. Information Component
Mail Protocol Explanation:
No explanation is available
d. Internet Control Message for this question!
Protocol

Answer Explanation 19) Which architectures


is/are required to QoS?
ANSWER: Internet Control - Published on 19 Oct 15
Message Protocol
a. Integrated Services
Explanation:
No explanation is available b. Differentiated Services
for this question!
c. Reserved Services

18) Match the d. Both a and b


following List 1 to List 2
e. Both b and c
1. Ping ------------ i) discover
Answer Explanation
the routes
2.Traceroute ----- ii) method ANSWER: Both a and b
for troubleshooting the
accessibility of devices Explanation:

97
No explanation is available correct destination.
for this question!
Explanation:
No explanation is available
20) When too many packets for this question!
are present in a part of a
subnet the performance
22) Which of the following
degrades, this situation is
statements is/are correct about
called as Congestion.
the UDP header?
- Published on 19 Oct 15
- Published on 19 Oct 15
a. True
a. application programs use to
b. False send data to other application
programs.
Answer
Explanation b. distinguish port numbers
between multiple programs
ANSWER: True on a single device.
21) What is the purpose of
using pseudo header in UDP? c. UDP have limited size
- Published on 19 Oct 15 header of 8 bytes.

a. The data packets are d. Both a and b


delivered sequentially.
e. Both a and c
b. Find out the destination
Answer Explanation
port number and source port
number. ANSWER: Both a and b
c. Sends the context of a Explanation:
particular internet destination No explanation is available
address to UDP. for this question!

d. Verifying the UDP packet


has reached its correct 23) Match the following List
destination. 1 to List 2

Answer Explanation 1. DHCP Server ------------ i)


works as a virtual post office
ANSWER: Verifying the
2. Proxy Server ------------- ii)
UDP packet has reached its
automatically provides an

98
internet protocol.
3. Mail Server ----------------
iii) make indirect network 25) What type of addresses
connections to other network does DHCP server use?
services. - Published on 19 Oct 15
- Published on 19 Oct 15
a. Permanent address
a. 1-iii, 2i-, 3-ii
b. Local address
b. 1-iii, 2-ii, 3-i
c. Pool address
c. 1-ii, 2-iii-, 3-i
d. Both a and b
d. 1-ii, 2i-, 3-iii
e. Both a and c
Answer Explanation
Answer Explanation
ANSWER: 1-ii, 2-iii-, 3-i
ANSWER: Both a and c
Explanation:
No explanation is available Explanation:
for this question! No explanation is available
for this question!

24) Which of the following


26) Define the term DHCP
protocol is widely used in
server.
Dynamic assignment?
- Published on 19 Oct 15
- Published on 19 Oct 15
a. administrator requires to
a. BOOTP
add an entry for each
b. DHCP computer in DHCP.

c. RARP b. assigned a permanent


address to the server software.
d. DCHP
c. doesn't allow a computer to
Answer Explanation join a new network.

ANSWER: DHCP d. None of the above.

Explanation: Answer Explanation


No explanation is available
for this question! ANSWER: assigned a

99
permanent address to the b. ISO
server software.
c. FPO
Explanation:
No explanation is available d. ITC
for this question!
Answer Explanation

27) Which of the following ANSWER: ISO


are the HTTP methods
(request types)? Explanation:
No explanation is available
for this question!
I. GET
II. POST
III. PATCH 29) Both HDLC and PPP are
IV. BODY data link layer protocols.
V. CREATE - Published on 19 Oct 15
VI. OPTION
- Published on 19 Oct 15 a. True

a. I, II, III, IV, V b. False

b. I, II Answer Explanation

c. IV, V, VI ANSWER: True

d. I, II, III, VI Explanation:


No explanation is available
Answer Explanation for this question!

ANSWER: I, II, III, VI


30) What is the difference
Explanation: between MPLS and Virtual
No explanation is available
Circuit?
for this question!
- Published on 19 Oct 15

a. The forwarding table is


28) HDLC is developed by
mostly used in MPLS but not
________ .
in Virtual Circuit.
- Published on 19 Oct 15
b. The forwarding table is not
a. ISI
constructed in Virtual Circuit

100
but it is constructed in MPLS. d. Both b and c

c. In virtual-circuit, the user e. Both a and c


establishes new connection
and launches a set up packet Answer Explanation
and created the path while
there is no set up for each ANSWER: The label is used
as an index for determining
connection in MPLS.
which outgoing line and new
label is to be used. This new
d. All of the above.
label contains the address of
next MPLS router.
Answer Explanation
Explanation:
ANSWER: In virtual-circuit, No explanation is available
the user establishes new for this question!
connection and launches a
set up packet and created the
path while there is no set up 32) Which of the following
for each connection in
MPLS. aspects is/are mostly covered
in the FEC?
31) Which of the following
- Published on 23 Sep 15
statements is/are true about
MPLS packets?
a. How many packets are
- Published on 23 Sep 15 there.
a. It creates a virtual circuit b. What type of service class
for transmission of data is there
packets.
c. Which packets are going to
b. The label is used as an be used.
index for determining which
outgoing line and new label is d. Where the packets are
to be used. This new label going.
contains the address of next
MPLS router. Answer Explanation

c. MPLS packet hits a router, ANSWER: Where the


that router will contact the packets are going.
next router where the packet
will be going to generate a Explanation:
No explanation is available
label for the flow.
for this question!

101
Answer Explanation

33) Match the following List ANSWER: to create


1 to List 2 standardized protocols

1. Label --------------- i) 3 bit Explanation:


2. QoS ----------------- ii) 1 bit No explanation is available
for this question!
3. S-field -------------- iii) 8 bit
4. TTL ------------------ iv) 20
bit 35) Match the following List
- Published on 23 Sep 15 1 to List 2
a. 1- ii, 2-iii, 3-iv, 4-i
1. Repeaters ------------- i)
b. 1-iii, 2-iv, 3-i, 4-ii Connects multiple device
segments.
c. 1-iv, 2-i, 3-ii, 4-iii 2. Bridges ----------------- ii)
Provide translation services
d. 1-i, 2-iv, 3-ii, 4-iii between incompatible LANs.
3. Routers ----------------- iii)
Answer Explanation
Receives a signal and
retransmits it at a higher level.
ANSWER: 1-iv, 2-i, 3-ii, 4-
iii 4. Gateways -------------- iv)
Provide links between two
Explanation: seperate devices but same
No explanation is available type LANs.
for this question! - Published on 23 Sep 15

a. 1-i, 2-iv, 3-ii, 4- iii


34) Why was the IETF
developed? b. 1-iii, 2-i, 3-iv, 4-ii
- Published on 23 Sep 15
c. 1-ii, 2iv-, 3-iii, 4-i
a. to support quality of service
d. 1-iii, 2-iv, 3-i, 4-ii
b. to create standardized
protocols Answer Explanation

c. for IP security ANSWER: 1-iii, 2-i, 3-iv, 4-


ii
d. All of the above
Explanation:
No explanation is available

102
for this question! Explanation:
No explanation is available
for this question!
36) Abbreviate MPLS.
- Published on 23 Sep 15
38) Match the following List
a. Multi Protocol Label 1 to List 2
Switching
1. Application Layer ---------
b. Multiple Lable Storage i) Repeater or Hub
2. Network Layer -------------
c. Multiplicative Label
ii) Gateway or five layer
Switching
switch
d. Multi Process Label 3. Data link Layer ------------
Switching iii) Bridge or two layer switch
4. Physical Layer --------------
Answer Explanation iv) Router or three layer
switch
ANSWER: Multi Protocol - Published on 23 Sep 15
Label Switching
a. 1-i, 2-iv, 3-iii, 4-iv
Explanation:
No explanation is available b. 1-ii, 2-iii, 3-i, 4-iv
for this question!
c. 1-ii, 2-iv, 3-iii, 4-i

37) Which of the following d. 1-i, 2-ii, 3-iv, 4-iii


types is/are the network
connecting devices? Answer Explanation
- Published on 23 Sep 15
ANSWER: 1-ii, 2-iv, 3-iii, 4-
a. Repeaters and Hubs i

b. Bridges and Routers Explanation:


No explanation is available
c. Gateway and switches for this question!

d. All of the above


39) Consider the following
Answer Explanation features,

ANSWER: All of the above I. Load Balancing


II. Security

103
III. Easy to configure - Published on 23 Sep 15
IV. Supports authentication
a. Object Service Priority
What is/are the features of First
OSPF?
b. Open Shortest Path First
- Published on 23 Sep 15
c. Open Space Preservation
a. II, IV
Fund
b. II, III
d. Ocular Sun Protective
c. I, II, IV Factor

d. I, II, III Answer Explanation

Answer Explanation ANSWER: Open Shortest


Path First
ANSWER: I, II, IV
Explanation:
Explanation: No explanation is available
No explanation is available for this question!
for this question!

42) Which of the following


40) Which of the following is/are the Routing algorithms?
statements is/are true about - Published on 23 Sep 15
OSPF?
- Published on 23 Sep 15 a. Nonadaptive algorithm and
Adaptive algorithm
a. error detecting process.
b. Static routing and Dynamic
b. interior routing protocol. routing

c. widely used in TCP/IP. c. Distance vector routing and


link state routing
d. create traffic load on
multiple links. d. Both a and b

Answer Explanation e. All of the above

ANSWER: interior routing Answer Explanation


protocol.
41) OSPF stands for ANSWER: Both a and b
_______ .

104
Explanation: Answer Explanation
No explanation is available
for this question! ANSWER: regions

Explanation:
43) When hierarchical No explanation is available
routing is used on the for this question!
internet?
- Published on 23 Sep 15
45) What is the difference
a. Total number of routers are between Virtual Circuit and
divided into different regions. Datagram?
- Published on 23 Sep 15
b. Routers cannot handle
network traffic efficiently. a. The quality of service is
easy in Virtual Circuit while
c. Router increases the it is difficult in Datagram.
network size.
b. In the connection oriented
d. None of the above service, a connection is called
as Virtual Circuit while in the
Answer Explanation connectionless service, the
independent packets are
ANSWER: Routers cannot
called as Datagrams.
handle network traffic
efficiently.
c. The services are
Explanation: independent in Virtual Circuit
No explanation is available but that won't be so in
for this question! Datagrams.

d. Both a and b
44) Cluster is a group of
___________ . e. Both b and c
- Published on 23 Sep 15
Answer Explanation
a. regions
ANSWER: In the connection
b. zones oriented service, a
connection is called as
c. resources. Virtual Circuit while in the
connectionless service, the
d. parameters independent packets are
called as Datagrams.

105
Explanation: and congestion control.
No explanation is available
for this question! c. It doesn't provide error
reporting mechanism.

46) What is the difference d. All of the above


between IP and ICMP?
- Published on 23 Sep 15 Answer Explanation

a. IP is a reliable protocol ANSWER: It provides a


while ICMP is an unreliable mechanism for host and
management queries.
protocol.
Explanation:
b. In IP, error checking and
No explanation is available
control are not concerns while for this question!
in ICMP it concerns.

c. IP provides assistance 48) What is the difference


mechanisms while ICMP between IPv4 and IPv6?
doesn't provide assistance - Published on 23 Sep 15
mechanisms.
a. The IPv4 address is written
d. None of the above. in hexadecimal value while
the IPv6 address is written by
Answer Explanation
dotted-decimal notation.
ANSWER: In IP, error
b. In IPV4 source and
checking and control are not
concerns while in ICMP it destination address is 128 bits
concerns. while in IPv6 it is 32 bits.

Explanation: c. The IPv4 node has only


No explanation is available stateful auto-configuration
for this question! while the IPv6 node has both
a stateful and a stateless
address auto-configuration.
47) What is the use of ICMP
protocol in the network? d. In IPv4 the IPsec support is
- Published on 23 Sep 15 required while in IPv6 it is
optional.
a. It provides a mechanism for
host and management queries. Answer Explanation

b. There is no flow control

106
ANSWER: The IPv4 node a. It is an open loop control.
has only stateful auto-
configuration while the IPv6 b. It will not regulate the
node has both a stateful and average rate of data
a stateless address auto- transmission.
configuration.
c. It is also known as traffic
Explanation: policing.
No explanation is available
for this question! d. All of the above.

Answer Explanation
49) What kind of task does
the Token Bucket Algorithm ANSWER: It is an open loop
do on the network? control.
- Published on 23 Sep 15 51) Which of the following
policies is/are related to
a. Drops data packets.
Network layer?
b. Allows for varying output - Published on 23 Sep 15
rates.
a. Window policy
c. Give low priority to the
b. Traffic shaping
data packets.
c. Traffic policing
d. Doesn't manage the queue
regulator. d. Packet services

Answer Explanation Answer Explanation

ANSWER: Allows for ANSWER: Packet services


varying output rates.
Explanation:
Explanation: No explanation is available
No explanation is available for this question!
for this question!

52) What is the difference


50) Which of the following between Class based QoS and
statements is/are true about Flow based QoS?
Traffic shaping? - Published on 23 Sep 15
- Published on 23 Sep 15
a. Class based QoS does not
provide flexible service

107
differentiation. Flow based ANSWER: FIFO
QoS provide flexible service
differentiation. Explanation:
No explanation is available
b. Class based QoS is a for this question!
perception of users and it is
more important than Flow
54) What kind of task does
based while Flow based QoS
the Leaky Bucket algorithm
is not more important than
do in traffic shaping
class based.
technique?
c. Both a and b - Published on 23 Sep 15

d. None of the above. a. Control congestion in


network traffic.
Answer Explanation
b. Working on routing
ANSWER: Class based QoS protocol.
does not provide flexible
service differentiation. Flow c. Data flow control.
based QoS provide flexible
service differentiation. d. None of the above

Explanation: Answer Explanation


No explanation is available
for this question! ANSWER: Control
congestion in network
traffic.
53) Which queue operation
is used for holding the Explanation:
packets in Leaky Bucket No explanation is available
for this question!
implementation?
- Published on 23 Sep 15
55) Which of the following
a. LIFO
statements is/are not correct
b. FILO about Leaky Bucket
Algorithm?
c. FIFO - Published on 23 Sep 15

d. All of the above a. It is a bucket with a hole at


bottom.
Answer Explanation

108
b. Packets are never lost. 57) What is/are the
characteristics of RSVP?
c. A variant on the leaky - Published on 23 Sep 15
bucket is the token bucket.
a. It doesn’t provide
d. Leaky bucket doesn't have reservations for bandwidth in
the finite queue length. multicast trees.

Answer Explanation b. It is a receiver oriented.

ANSWER: Leaky bucket c. Both a and b


doesn't have the finite queue
length. d. None of the above

Explanation: Answer Explanation


No explanation is available
for this question! ANSWER: It is a receiver
oriented.

56) Consider the following Explanation:


things which RSVP cannot do No explanation is available
in the network? for this question!
- Published on 23 Sep 15

a. It doesn’t specify the 58) Abbreviate RSVP


exactly reservation of the - Published on 23 Sep 15
bandwidth.
a. Resource Service Virtual
b. It is not a routing protocol. Protocol

c. It does not perform any b. Resource Reservation


signaling operation. Protocol

d. All of the above. c. Receiver Service Virtual


Protocol
Answer Explanation
d. Receiver Reservation
ANSWER: All of the above. Protocol

Explanation: Answer Explanation


No explanation is available
for this question! ANSWER: Resource
Reservation Protocol

109
Explanation: d. None of the above
No explanation is available
for this question! Answer Explanation

ANSWER: Byte stream


59) If all the links on the won't be transferred to
internet provide reliable another machine.
delivery services, then will 61) Which of the following
this TCP delivery service be congestion control will not
redundant? give converge in TCP
- Published on 23 Sep 15 congestion avoidance?
- Published on 23 Sep 15
a. Yes
a. MIMD
b. No
b. AIAD
Answer Explanation
c. Both a and b
ANSWER: No
d. AIMD
Explanation:
No explanation is available Answer Explanation
for this question!
ANSWER: Both a and b

60) Which of the following Explanation:


statements is/are true if the No explanation is available
for this question!
transport layer is removed
from the TCP/IP protocol
stack? 62) Which algorithm is best
- Published on 23 Sep 15 for use in TCP congestion
avoidance?
a. Flow control will be
- Published on 23 Sep 15
handled
a. MIMD
b. Data transfer will be
reliable.
b. AIAD
c. Byte stream won't be c. Both a and b
transferred to another
machine. d. AlMD

110
Answer Explanation - Published on 23 Sep 15

ANSWER: AlMD a. Connection establishment


delay
Explanation:
No explanation is available b. Connection establishment
for this question! failure probability

c. Protection and Priority


63) What is the difference
between TCP and UDP? d. All of the above
- Published on 23 Sep 15
e. None of the above
a. TCP guarantees that a
packet will reach the Answer Explanation
destination without any
ANSWER: All of the above
duplication while UDP does
not provide this guarantee. Explanation:
No explanation is available
b. The order of data will be for this question!
same in TCP but that won't be
so in UDP.
65) Three way handshake
c. TCP is unreliable protocol technique in TCP is used
but UDP is a reliable __________.
protocol. - Published on 23 Sep 15
d. Only a and b a. to indicate the problems.
e. Only b and c b. to solve the problem of
delayed duplicate packet.
Answer Explanation
c. for data transmission
ANSWER: Only a and b
d. all of the above
Explanation:
No explanation is available Answer Explanation
for this question!
ANSWER: to solve the
problem of delayed duplicate
64) What is/are the packet.
parameters of Quality of
Service? Explanation:

111
No explanation is available No explanation is available
for this question! for this question!

66) The protocol which is 68) Which of the following


used for defining the legal statements is/are correct about
request and replies is called Non Persistent HTTP?
______ . - Published on 23 Sep 15
- Published on 23 Sep 15
a. Non Persistent HTTP
a. FTP connection is also called as
HTTP keep-alive.
b. SMTP
b. All the requests and
c. TCP responses between client and
server can be sent over the
d. HTTP
same connection.
Answer Explanation c. Non persistent uses HTTP
version 2.0
ANSWER: HTTP
d. All of the above
Explanation:
No explanation is available
for this question! Answer Explanation

ANSWER: All the requests


and responses between client
67) What is the default port
and server can be sent over
of HTTP? the same connection.
- Published on 23 Sep 15
Explanation:
a. 20 No explanation is available
for this question!
b. 101

c. 80 69) Which of the following


statements is/are not true
d. 60
about Persistent HTTP?
Answer Explanation - Published on 23 Sep 15

ANSWER: 80 a. TCP connection is closed


after the interval timeout by
Explanation:

112
the http server. service.

b. The new connection is b. Connectionless service is


established and maintained suitable for bursty
for each request object. transmission.

c. Persistent will use HTTP c. Connectionless services can


version 1.1. give services guarantees.

d. None of the above d. Connectionless services


can avoid bottleneck problem.
Answer Explanation
Answer Explanation
ANSWER: TCP connection
is closed after the interval ANSWER: Connectionless
timeout by the http server. service is suitable for bursty
transmission.
Explanation:
No explanation is available Explanation:
for this question! No explanation is available
for this question!

70) The connection oriented


service is a dedicated 72) What is/are the
connection between the users characteristics of Connection
before the data is exchanged. Oriented Service?
- Published on 23 Sep 15 - Published on 19 Oct 15

a. True a. The connection oriented


services are reliable because
b. False there is a minimization of
data loss and retransmission
Answer of lost bits is possible.
Explanation
b. Connection oriented
ANSWER: True service is suitable for short
71) Which of the following communication.
statement is true about
Connectionless service? c. Both a and b
- Published on 19 Oct 15
d. The connection is not
a. The connection is established in the connection
established in connectionless oriented service.

113
Answer Explanation a. It is strictly used for data
authentication.
ANSWER: The connection
oriented services are reliable b. It decides the encapsulation
because there is a of network layer data into the
minimization of data loss data link frame
and retransmission of lost
bits is possible. c. It is useful to set-up
configure, maintain and
Explanation:
terminate a link connection.
No explanation is available
for this question!
d. All of the above.

Answer Explanation
73) What is Frame Check
Sequence (FCS)?
ANSWER: It decides the
- Published on 19 Oct 15 encapsulation of network
layer data into the data link
a. FCS is an error recovery frame
process.
Explanation:
b. FCS is an upper layer data. No explanation is available
for this question!
c. FCS is an error detecting
code.
75) Which protocol is used
d. FCS is a communication after authentication has been
protocol. completed?
- Published on 19 Oct 15
Answer Explanation
a. User Datagram Protocol
ANSWER: FCS is an error
detecting code. b. PPP Protocol

Explanation: c. Transmission Control


No explanation is available Protocol
for this question!
d. Network Control Protocol

74) Which of the following Answer Explanation


is true about Network Control
Protocol (NCP)? ANSWER: Network Control
- Published on 19 Oct 15 Protocol

114
Explanation: Answer Explanation
No explanation is available
for this question! ANSWER: All of the above

Explanation:
76) Which of the following No explanation is available
protocol is used to allow the for this question!
encapsulation of data coming
from the network layer
78) Which protocol does the
protocol?
PPP protocol provide for
- Published on 19 Oct 15
handling the capabilities of
a. TCP the connection/link on the
network?
b. NCP - Published on 19 Oct 15

c. LCP a. LCP

d. HDLC b. NCP

Answer Explanation c. Both a and b

ANSWER: NCP d. TCP

Explanation: Answer Explanation


No explanation is available
for this question! ANSWER: Both a and b

Explanation:
77) What does the Link No explanation is available
Control Protocol (LCP) do in for this question!
PPP?
- Published on 19 Oct 15
79) Which of the following
a. Set-up configure is the communication
protocol developed by ISO?
b. Maintaining a link - Published on 19 Oct 15

c. Terminating a link a. MPLS

d. Both b and c b. PPP

e. All of the above c. HDLC

115
d. CRC Answer Explanation

Answer Explanation ANSWER: Connectionless


service is suitable for bursty
ANSWER: HDLC transmission.

Explanation: Explanation:
No explanation is available No explanation is available
for this question! for this question!

80) Both HDLC and PPP 72) What is/are the


both are Data link layer characteristics of Connection
protocol. Oriented Service?
- Published on 19 Oct 15 - Published on 19 Oct 15

a. True a. The connection oriented


services are reliable because
b. False there is a minimization of
data loss and retransmission
Answer of lost bits is possible.
Explanation
b. Connection oriented
ANSWER: True service is suitable for short
71) Which of the following communication.
statement is true about
Connectionless service? c. Both a and b
- Published on 19 Oct 15
d. The connection is not
a. The connection is established in the connection
established in connectionless oriented service.
service.
Answer Explanation
b. Connectionless service is
suitable for bursty ANSWER: The connection
transmission. oriented services are reliable
because there is a
c. Connectionless services can minimization of data loss
give services guarantees. and retransmission of lost
bits is possible.
d. Connectionless services
Explanation:
can avoid bottleneck problem.
No explanation is available
for this question!

116
d. All of the above.

73) What is Frame Check Answer Explanation


Sequence (FCS)?
- Published on 19 Oct 15 ANSWER: It decides the
encapsulation of network
a. FCS is an error recovery layer data into the data link
process. frame

b. FCS is an upper layer data. Explanation:


No explanation is available
c. FCS is an error detecting for this question!
code.

d. FCS is a communication 75) Which protocol is used


protocol. after authentication has been
completed?
Answer Explanation - Published on 19 Oct 15

ANSWER: FCS is an error a. User Datagram Protocol


detecting code.
b. PPP Protocol
Explanation:
No explanation is available c. Transmission Control
for this question! Protocol

d. Network Control Protocol


74) Which of the following
is true about Network Control Answer Explanation
Protocol (NCP)?
- Published on 19 Oct 15 ANSWER: Network Control
Protocol
a. It is strictly used for data
Explanation:
authentication.
No explanation is available
for this question!
b. It decides the encapsulation
of network layer data into the
data link frame 76) Which of the following
protocol is used to allow the
c. It is useful to set-up
encapsulation of data coming
configure, maintain and
from the network layer
terminate a link connection.
protocol?

117
- Published on 19 Oct 15 handling the capabilities of
the connection/link on the
a. TCP network?
- Published on 19 Oct 15
b. NCP
a. LCP
c. LCP
b. NCP
d. HDLC
c. Both a and b
Answer Explanation
d. TCP
ANSWER: NCP
Answer Explanation
Explanation:
No explanation is available ANSWER: Both a and b
for this question!
Explanation:
No explanation is available
77) What does the Link for this question!
Control Protocol (LCP) do in
PPP?
- Published on 19 Oct 15 79) Which of the following
is the communication
a. Set-up configure protocol developed by ISO?
- Published on 19 Oct 15
b. Maintaining a link
a. MPLS
c. Terminating a link
b. PPP
d. Both b and c
c. HDLC
e. All of the above
d. CRC
Answer Explanation
Answer Explanation
ANSWER: All of the above
ANSWER: HDLC
Explanation:
No explanation is available Explanation:
for this question! No explanation is available
for this question!

78) Which protocol does the


PPP protocol provide for

118
80) Both HDLC and PPP - Published on 19 Oct 15
both are Data link layer
protocol. a. Transport Protocol
- Published on 19 Oct 15 Distribution Unit

a. True b. Transcranial Pulsed


Doppler Ultrasound
b. False
c. Transport Protocol Data
Answer Unit
Explanation
d. Terminal Power
ANSWER: True Distribution Unit
91) Which of the following
is true about “Threshold”? Answer Explanation
- Published on 19 Oct 15
ANSWER: Transport
Protocol Data Unit
a. Threshold is a value.
Explanation:
b. Threshold has value levels,
No explanation is available
such as minimum level, for this question!
maximum level, equal level.

c. If the data value doesn't suit 93) What is the use of TPDU
the threshold value, then it in socket programming?
indicates that this data value - Published on 19 Oct 15
might lead to poor
performance of the network. a. It creates new socket in the
transport entity when it
d. All of the above requests for a connection.

Answer Explanation b. It allocates the table space


within the transport entity.
ANSWER: All of the above
c. It is used for establishing
Explanation:
the connection.
No explanation is available
for this question!
d. None of the above.

Answer Explanation
92) Abbreviate the term
TPDU in socket ANSWER: It creates new
programming. socket in the transport entity

119
when it requests for a d. All of the above
connection.
Answer Explanation
Explanation:
No explanation is available ANSWER: All of the above
for this question!
Explanation:
No explanation is available
94) The communication for this question!
structure that we need in
socket programming is called
as _________. 96) Connection-oriented is a
- Published on 19 Oct 15 _______ connection.
- Published on 23 Sep 15
a. System calls
a. secure
b. Socket
b. virtual
c. Procedure
c. stable
d. Table space
d. reliable
Answer Explanation
Answer Explanation
ANSWER: Socket
ANSWER: virtual
Explanation:
No explanation is available Explanation:
for this question! No explanation is available
for this question!

95) Which of the following


is/are the advantages of 97) What is Packetizing?
connection-oriented - Published on 23 Sep 15
networking
a. It is a process of dividing a
- Published on 23 Sep 15
long message into smaller
a. Quality of service ones.

b. No Priority service b. It is a process of


encapsulating the packets into
c. Bandwidth utilization the data fields of the transport
layer packet.

120
c. It is a process of an adding No explanation is available
headers to each packet to for this question!
allow the transport layer for
performing its other
functions. 99) Data transfer is _______
in FTP.
d. All of the above. - Published on 23 Sep 15

Answer Explanation a. efficient

ANSWER: All of the above. b. reliable

Explanation: c. secure
No explanation is available
for this question! d. unreliable

Answer Explanation
98) Which of the following
is true about Domain Name ANSWER: reliable
System (DNS)?
Explanation:
- Published on 23 Sep 15 No explanation is available
for this question!
a. DNS is the client server
application.
100) What kind of task does
b. It uses alias names for
MIME do in the SMTP
identifying the sender and
protocol?
receiver instead of an IP
- Published on 23 Sep 15
address. So the alias address
has to be mapped to the IP a. It only transfers the email
address. and not receive them.

c. It identifies sender and b. It transfers a message from


receiver so they should be the SMTP sender to the
known to each other. SMTP receiver over a
TCP/IP.
d. All of the above.
c. It works under the Mail
Answer Explanation Transfer Agent (MAT).
ANSWER: All of the above. d. It encodes the binary files
and send.
Explanation:

121
Answer Explanation D. all of these

ANSWER: It encodes the Answer Report Discuss


binary files and send.
Option: D

Operating System: Explanation :

1: Safe State

With a single resource, deadlock occurs  A system is in a safe state only if


there exists a safe sequence of
A. if there are more than two processes processes P1, P2, P3, Pn where:
competing for that resource o For each Pi, the resources
that Pi can still request can
B. if there are only two processes competing
for that resource be satisfied by the
currently available
C. if there is a single process competing for resources plus the
that resource resources help by all Pj,
D. none of these j<i.

Answer Report Discuss  If a system is in safe state, there is


no deadlock.
Option: D
 If the system is deadlocked, it is
Explanation : in an unsafe state.

Deadlock doesn't occurs with a single  If a system is in unsafe state, there


resource is a possibility for a deadlock.

Click on Discuss to view users  Avoidance: making sure the


comments. system will not enter an unsafe
2: state.

A state is safe if the system can allocate Click on Discuss to view users
resources to each process (up to its comments.
maximum) in some order and still avoid 3:
deadlock. Then
A computer system has 6 tape drives, with
A. deadlocked state is unsafe 'n' processes competing for them. Each
process may need 3 tape drives. The
B. unsafe state may lead to a deadlock maximum value of 'n' for which the system
situation is guaranteed to be deadlock free is
C. deadlocked state is a subset of unsafe
state A. 4

122
B. 3 completing its task, will release all its
resources, thereby avoiding any possible
C. 2 deadlock.

D. 1 Click on Discuss to view users


comments.
Answer Report Discuss 5:

Option: C Consider a system having 'm' resources of


the same type. These resources are shared by
Explanation : 3 processes A, B, C, which have peak time
demands of 3, 4, 6 respectively. The
Two processes can never lead to minimum value of 'm' that ensures that
deadlock as the peak time demand of 6 (3 deadlock will never occur is
+ 3) tape drives can be satisfied. But 3
processes can lead to a deadlock if each A. 11
hold 2 drives and then demand one more.
B. 12
Click on Discuss to view users
comments. C. 13
4:
D. 14
'm' processes share 'n' resources of the same
type. The maximum need of each process Answer Report Discuss
doesn't exceed 'n' and the sum all the their
maximum needs is always less than m + n. Option: A
In this set up
Explanation :
A. deadlock can never occur
Having 11 resources ensures that atleast 1
B. deadlock may occur process will have no pending request.
This process after using will release the
C. deadlock has to occur resources and so deadlock can never
occur.
D. none of these :

Answer Report Discuss The methods for dealing with the deadlock
problem is
Option: A
Use a protocol to make sure that the
Explanation : A. system never enters in to the deadlock
state.
Using Banker's algorithm, one can show B. Allow the system to enter a deadlock
that one process has to acquire all its state and then recover.
needed resources. This process, after

123
Ignore the problem, and pretend that C. deadlock has to occur
C. deadlocks never occur in the system. The
UNIX operating system uses this D. none of these
solution.
D. all of these Answer Report Discuss

Answer Report Discuss Option: A

Option: D Explanation :

Explanation : Atleast one process will be holding 2


resources in case of a simultaneous
Methods for Handling Deadlocks demand from all the processes. That
process will release the 2 resources,
 Deadlock Detection. thereby avoiding any possible deadlock.
o Always grant resource 1) What will a simple two pass
request when possible. assembler do in the first pass?
Periodically check for - Published on 19 Oct 15
deadlocks. If a deadlock
exists, recover from it. a. It will allocate space for the literals.
 Deadlock Prevention
b. It will generate the code for all the
o Disallow one of the four
necessary conditions for load and store register instruction.
deadlock.
c. It will build the symbol table for the
 Deadlock Avoidance.
o Do not grant a resource
symbols and their values.
request if this allocation
d. It will compute the total length of the
have the potential to lead
to a deadlock. program.
 Ignore the problem
o Makes sense if the Answer Explanation
likelihood is very low.
ANSWER: It will allocate space for the
Click on Discuss to view users literals.
comments.
7: Explanation:
No explanation is available for this
question!
A system has 3 processes sharing 4
resources. If each process needs a maximum
of 2 units, then
2) What should be the size of ROM if it
is used to store the table for
A. deadlock can never occur
multiplication of two 8 - bit unsigned
B. deadlock may occur integers?

124
- Published on 19 Oct 15 b. It implies excessive page I/O

a. 64k x 8 c. It decreases the degree of


b. 64k x 16 multiprogramming

c. 4k x 8 d. It reduces page I/O

d. 64k x 16 Answer Explanation

Answer Explanation ANSWER: It decreases the degree of


multiprogramming
ANSWER: 64k x 8
Explanation:
Explanation: No explanation is available for this
No explanation is available for this question!
question!

5) Match the following list1 with list2:


3) What will happen when we format a
floppy disk? a. DMA I/O ----------------------------------
- Published on 19 Oct 15 ---- 1. High speed RAM
b. Cache --------------------------------------
a. Identification information is written -- 2. Disk
on all tracks and sectors c. Interrupt I/O ------------------------------
b. The system area is deleted --- 3. Printer
c. Data is written d. Condition code register -----------------
-- 4. ALU
d. Data is arranged on the disk in - Published on 19 Oct 15
contiguous fashion
a. a – 2, b – 1, c – 3, d - 4
Answer Explanation b. a – 4, b – 1, c – 3, d - 2

ANSWER: Data is arranged on the disk c. a – 2, b – 3, c – 1, d - 4


in contiguous fashion
d. a – 3, b – 4, c – 2, d - 1
Explanation:
No explanation is available for this Answer Explanation
question!
ANSWER: a – 2, b – 1, c – 3, d - 4

4) What is the use of thrashing? Explanation:


- Published on 19 Oct 15 No explanation is available for this
question!
a. It improves system performance

125
6) What must reside in the main - Published on 28 Aug 15
memory under all situations in a resident
- OS computer? a. Helps to maintain LRU information
- Published on 19 Oct 15 b. Allows only read on a page

a. Linker c. Helps to avoid unnecessary writes on


b. Loader paging device

c. Assembler d. None of the above

d. Compiler Answer Explanation

Answer Explanation ANSWER: Helps to avoid unnecessary


writes on paging device
ANSWER: Loader
Explanation:
Explanation: No explanation is available for this
No explanation is available for this question!
question!

9) Which is the system call that is


7) Which is the device that should get responsible for sending of SYN packets?
the highest priority in assigning the - Published on 28 Aug 15
interrupts?
a. Bind
- Published on 28 Aug 15
b. Socket
a. Floppy disk
c. Connect
b. Hard disk
d. Listen
c. CPU temperature sensor

d. Keyboard Answer Explanation

Answer Explanation ANSWER: Connect

Explanation:
ANSWER: CPU temperature sensor
No explanation is available for this
question!
Explanation:
No explanation is available for this
question!
10) Which of the following statements
are true?
8) Which of the following statements is - Published on 28 Aug 15
true for the dirty page in a page table?
a. Shortest remaining time first

126
scheduling may cause starvation a. LRU Page Replacement Policy
b. Starvation may be caused by
preemptive scheduling. b. MRU Page Replacement Policy

c. In terms of response time robin round c. Optimal Page Replacement Policy


is better than FCFS
d. FIFO Page Replacement Policy
d. All of the above statements are true
Answer Explanation
Answer Explanation
ANSWER: FIFO Page Replacement
ANSWER: All of the above statements Policy
are true
11) An operating system maintains Explanation:
smaller data structures for a thread than No explanation is available for this
question!
a process, as a thread is usually defined
as a ‘ light weight process ’. What is the
per thread basis of the operating system?
13) Let P1 and P2 be the two processes
- Published on 28 Aug 15 and S1 and S2 be the two shared
Boolean variables. The initial values of
a. Does not maintain a separate stack
S1 and S2 are randomly assigned. For
b. Maintains only CPU register state. accessing the critical sections of P1 and
P2 the methods used by them are given
c. Does not maintain a virtual memory below:
state
Method used by P1
d. Maintains only scheduling and While ( S1 == S2 );
accounting information Critical section
S1 = S2;
Answer Explanation

ANSWER: Maintains only scheduling Method used by P2


and accounting information While ( S1! = S2 )
Critical section
Explanation: S2 = not (S1);
No explanation is available for this
question! Which statement / s describes that the
properties are achieved?
- Published on 27 Aug 15
12) Where can the Belady’s anomaly
occur? a. Progress but not mutual exclusion
- Published on 27 Aug 15

127
b. Mutual exclusion but not progress a. Gang scheduling -------------------------
------ i. Guaranteed scheduling
c. Both mutual exclusion and progress b. Rate monotonic scheduling ------------
------ ii. Real-time scheduling
d. Neither mutual exclusion nor progress
c. Fair share scheduling --------------------
----- iii. Thread scheduling
Answer Explanation

ANSWER: Mutual exclusion but not - Published on 27 Aug 15


progress
a. a – i, b – iii, c - ii
Explanation:
No explanation is available for this b. a – iii, b – ii, c - i
question!
c. a – i, b – ii, c - iii

14) Which page is selected by the d. a – ii, b – iii, c - i


Optimal Page Replacement Algorithm?
Answer Explanation
- Published on 27 Aug 15
ANSWER: a – iii, b – ii, c - i
a. The page that has been used for
maximum. Explanation:
No explanation is available for this
b. The page that has been used question!
minimum.

c. The page that has not been used for 16) Which of the following is / are the
the longest time in the past. essential contents in each entry of a page
table?
d. The page that will not be used for the
longest time in the future. - Published on 27 Aug 15

a. Page frame number


Answer Explanation
b. Virtual page number
ANSWER: The page that will not be
used for the longest time in the future. c. Access right information
Explanation: d. Both page frame number and virtual
No explanation is available for this
page number
question!
Answer Explanation
15) Match the following lists:
ANSWER: Page frame number

128
Explanation: ANSWER: Disk
No explanation is available for this
question! Explanation:
No explanation is available for this
question!
17) A system that uses FIFO page
replacement policy has 4 page frames
with no pages loaded initially. 100 19) What is the non - preemptive
distinct pages are accessed by the scheduling algorithm?
system in some order and then the same - Published on 27 Aug 15
100 pages are accessed in the reverse
a. Multilevel queue scheduling with
order. How many page faults will occur?
feedback
- Published on 27 Aug 15
b. Multilevel queue scheduling
a. 193
c. First - In - First - Out
b. 194
d. Round Robin
c. 195

d. 196 Answer Explanation

ANSWER: First - In - First - Out


Answer Explanation
Explanation:
ANSWER: 196 No explanation is available for this
question!
Explanation:
No explanation is available for this
question!
20) Three CPU intensive processes
requires 10, 20 and 30 time units and
18) Where does the swap space reside? arrive at times 0, 2 and 6 respectively.
- Published on 27 Aug 15 The operating system implements a
shortest remaining time first scheduling
a. Disk algorithm. Considering that the context
switches at time zero and at the end are
b. ROM not counted the number of context
switches are needed is ______.
c. RAM
- Published on 27 Aug 15
d. On - chip cache
a. 4
Answer Explanation b. 3

129
c. 2 translation process

d. 1 d. The large memory overhead in


maintaining page tables
Answer
Explanation Answer Explanation

ANSWER: 2 ANSWER: The large memory overhead


21) We have a uniprocessor machine in maintaining page tables
where a set of n tasks with known run
Explanation:
times r1, r2, r3,….rn are to be run. What
No explanation is available for this
will be the maximum throughput result question!
of the processor scheduling algorithm?
- Published on 27 Aug 15
23) Consider the following statements:
a. Shortest Job First
a. With the use of kernel supported
b. First Come First Served
threads context switch is faster.
c. Round Robin b. The entire process can be blocked by
the system for user - level threads.
d. Highest Response Ratio Next c. Kernel supported threads can be
scheduled independently.
Answer Explanation d. User level threads are transparent to
the kernel.
ANSWER: Shortest Job First

Explanation: Which of the above statements are true?


No explanation is available for this - Published on 27 Aug 15
question!
a. a and d

22) Consider a system with 32 bit b. a and b


virtual addresses and 1 kbyte page size.
c. b and c
Why is it not possible to use one - level
page tables for virtual to physical d. a and c
address translation?
- Published on 27 Aug 15 Answer Explanation

a. The amount of external fragmentation ANSWER: b and c

b. The amount of internal fragmentation Explanation:


No explanation is available for this
c. The large computation overhead in the

130
question! - Published on 27 Aug 15

a. 0%
24) What is the effect of using a larger
block size in a fixed block size file b. 25%
system?
c. 50%
- Published on 27 Aug 15
d. 75%
a. It leads to poorer disk throughput and
poorer disk space utilization Answer Explanation
b. It leads to poorer disk throughput but ANSWER: 0%
better disk space utilization
Explanation:
c. It leads to better disk throughput and No explanation is available for this
better disk space utilization question!

d. It leads to better disk throughput and


poorer disk space utilization 26) In a virtual memory environment
the minimum number of page frames
Answer Explanation that must be allocated to a running
process is determined by
ANSWER: It leads to better disk
___________________.
throughput and poorer disk space
utilization - Published on 27 Aug 15

Explanation: a. The Number of Processes in the


No explanation is available for this Memory
question!
b. The Instruction Set Architecture

25) We have an operating system, c. The Page Size


which is capable of loading and
d. The Physical Memory Size
executing a single sequential user
process at a time. If the disk head Answer Explanation
scheduling algorithm which is initially
First Come First Served (FCFS) is ANSWER: The Instruction Set
replaced by Shortest Seek Time First Architecture
(SSTF) claimed by the vendor to give
50% better benchmark results then what Explanation:
is the expected improvement in the I / O No explanation is available for this
question!
performance of the user programs?

131
libraries, if all 100 libraries are loaded
from random location on the disk?
27) The program given below consists - Published on 27 Aug 15
of three concurrent processes P0, P1, P2
and three binary semaphores with the a. 1.50s
values S0 = 1, S1 = 0, S2 = 0.
How many times the process P0 will b. 1.00s
print ‘0’ ?
c. 1.87s
- Published on 27 Aug 15
d. 0.74s

Answer Explanation

ANSWER: 1.50s

Explanation:
a. At least thrice No explanation is available for this
question!
b. Exactly thrice

c. At least twice 29) Why do we translate a virtual


address to physical address where a
d. Exactly twice
multilevel page table is preferred in
comparison to a single level page table?
Answer Explanation
- Published on 27 Aug 15
ANSWER: At least twice
a. It is required by the translation look-
Explanation: aside buffer
No explanation is available for this
question! b. It helps to reduce the memory access
time to read or write a memory location

28) An application loads 100 libraries c. It helps to reduce the number of page
at startup and loading each library faults in page replacement algorithm
exactly one disk access is required.
d. It helps to reduce the size of a page
10ms is the seek time of the disk to a
table needed to implement the virtual
random location and 6000rpm is the
address space of a process
rotational speed of the disk. Neglect the
time to transfer data from the disk block Answer Explanation
once the head has been positioned at the
start of the block. What will be the time ANSWER: It helps to reduce the size of
taken by the application to load all the a page table needed to implement the

132
virtual address space of a process minimum size of the TLB tag?
- Published on 27 Aug 15
Explanation:
No explanation is available for this a. 16 bit
question!
b. 20 bit

30) Consider a virtual memory system c. 11 bit


that uses First In First Out (FIFO) page
replacement policy and it allocates a d. 15 bit
fixed number of frames to a process.
Answer Explanation
Consider the following two statements,
ANSWER: 15 bit
1: Sometimes the page fault rate is
increased if the number of page frames Explanation:
allocated is increased. No explanation is available for this
2: Some programs do not exhibit question!
Locality of reference.

Which of the following is true? 32) Which of the following statements


- Published on 27 Aug 15 is not true for the deadlock prevention
and deadlock avoidance schemes?
a. 1 is false and 2 is true - Published on 26 Aug 15

b. both 1 and 2 are false a. Deadlock avoidance is less restrictive


than deadlock prevention.
c. both 1 and 2 are true but 2 is not the
reason for 1 b. In deadlock prevention, the request
for resources is always granted, if the
d. both 1 and 2 are true and 2 is the resulting state is safe.
reason for 1
c. It is the priority to have the
Answer Explanation knowledge of resource requirements for
deadlock avoidance.
ANSWER: both 1 and 2 are true but 2
is not the reason for 1 d. In deadlock avoidance, the request for
31) We have a CPU that generates resources is always granted, if the
virtual addresses of 32 bits and the page resulting state is safe.
size is of 4 kbyte. Transition Lookaside
Buffer ( TLB ) of the processor can hold Answer Explanation
a total of 128 page table entries and 4 -
way set associative. What is the ANSWER: In deadlock avoidance, the
request for resources is always granted,

133
if the resulting state is safe. string) is made by the process :
1, 2, 1, 3, 7, 4, 5, 6, 3, 1
Explanation: How many page faults will occur for the
No explanation is available for this above reference string with the Least
question!
Recently Used(LRU) Page Replacement
Policy in comparison to an Optimal
33) We have three processes P0, P1 Page Replacement policy?
and P2 whose arrival time and burst time - Published on 26 Aug 15
are given below.
a. 3
If the preemptive Shortest Job First
(SJF) scheduling algorithm is carried out b. 2
only at arrival or completion of
processes then the average waiting time c. 1
for the three processes is ________.
- Published on 26 Aug 15 d. 0

Answer Explanation

ANSWER: 2

Explanation:
a. 7.33ms No explanation is available for this
question!
b. 6.33ms

c. 5.0ms 35) We have a process that has been


allocated 3 page frames and initially
d. 4.33ms none of the pages of the process are
available in the memory. The following
Answer Explanation
sequence of page references (reference
string) is made by the process :
ANSWER: 5.0ms
1, 2, 1, 3, 7, 4, 5, 6, 3, 1
Explanation: If Optimal Page Replacement policy is
No explanation is available for this used, _______ page faults will occur for
question! the above reference string.
- Published on 26 Aug 15

34) We have a process that has been a. 7


allocated 3 page frames and initially
none of the pages of the process are b. 8
available in the memory. The following
sequence of page references (reference

134
c. 9 never request a lower numbered
resource than the last one requested.
d. 6
b. Request and all required resources be
Answer Explanation allocated before execution.

ANSWER: 7 c. Release all resources before


requesting a new resource.
Explanation:
No explanation is available for this d. Never request a resource after
question! releasing any resource.

Answer Explanation
36) A machine has a physical memory
of 64 Mbyte and a virtual address space ANSWER: Never request a resource
of 32 - bit. The page size is 4kbyte, after releasing any resource.
What is the approximate size of the page
table? Explanation:
No explanation is available for this
question!
- Published on 26 Aug 15

a. 24 Mbyte
38) The average time of service a page
b. 16 Mbyte fault is 10ms and the time taken to
access the memory is 1µs. A 99.99% hit
c. 2 Mbyte ratio results in average memory their
access time is __________.
d. 8 Mbyte - Published on 26 Aug 15

Answer Explanation a. 1.9999µs

ANSWER: 2 Mbyte b. 1.9999ms

Explanation: c. 1ms
No explanation is available for this
question! d. 9.99µs

Answer Explanation
37) Which of the following statements
is not valid for deadlock prevention ANSWER: 1.9999µs
scheme?
- Published on 26 Aug 15 Explanation:
No explanation is available for this
a. Number the resources uniquely and question!

135
d. Round Robin

39) Consider a uniprocessor computer Answer Explanation


system that has 2 processes and both of
them alternate 10ms CPU bursts with ANSWER: Round Robin
90ms I / O bursts. Both the processes 41) Which of the following is an
were created at nearly the same time and example of Spooled Device?
can proceed in parallel. What is the - Published on 26 Aug 15
scheduling strategy for this system that
will result in the least CPU utilization a. A graphic display device
(over a long period of time)?
b. A line printer used to print the output
- Published on 26 Aug 15
of a number of jobs
a. Round Robin scheduling with a time
c. A terminal used to enter input data to
quantum of 5ms
a running program
b. First Come First Served scheduling
d. A secondary storage device in a
c. Shortest remaining time first virtual memory system

d. Static priority scheduling with Answer Explanation


different priorities for the two processes
ANSWER: A line printer used to print
Answer Explanation the output of a number of jobs

Explanation:
ANSWER: Round Robin scheduling
No explanation is available for this
with a time quantum of 5ms
question!
Explanation:
No explanation is available for this
question! 42) Consider a Unix - style I - node
that has 10 direct pointers, 1 single, 1
double and 1 triple indirect pointers.
40) What is the most suitable What is the maximum possible file size
scheduling policy for a time - shared if disk block size of 1kbyte, disk block
operating systems? address of 32 bit and 48 bit integers are
- Published on 26 Aug 15 used?
- Published on 26 Aug 15
a. Shortest Job First
a. 234 byte
b. Elevator
b. 232 byte
c. First Come First Served

136
c. 264 byte a. 3

d. 2 24 byte b. 5

Answer Explanation c. 7

ANSWER: 232 byte d. 9

Explanation: Answer Explanation


No explanation is available for this
question! ANSWER: 9

Explanation:
43) What invokes the system calls? No explanation is available for this
(Operating System) question!
- Published on 26 Aug 15

a. A privileged instruction 45) If hardware does not support


_________ then a multi - user and multi
b. An indirect jump - processing operating system cannot be
implemented.
c. A software interrupt - Published on 26 Aug 15

d. Polling a. At least two modes of CPU execution

Answer Explanation b. Demand paging

ANSWER: A software interrupt c. DMA for disk transfer

Explanation: d. Address translation


No explanation is available for this
question! Answer Explanation

ANSWER: Demand paging


44) On a single processor four jobs are
to be executed. At time t = (0) + (jobs Explanation:
arrive in the order of A, B, C, D). The No explanation is available for this
burst CPU time requirements are 4, 1, 8, question!
1 time units respectively.
Under Round Robin Scheduling with the
46) A process executes the code,
time slice of 1 time unit the completion
time of A is ______.
fork();
- Published on 26 Aug 15
fork();

137
fork(); question!

How many child processes are created?


- Published on 26 Aug 15 48) Consider a counting semaphore
which was initialized to 10 and then 6P
a. 5 (wait) operations and 4v(signal)
operations were completed on this
b. 8 semaphore. What is the resulting value
of semaphore?
c. 7
- Published on 25 Aug 15
d. 9
a. 10
Answer Explanation
b. 9
ANSWER: 7
c. 8
Explanation:
d. 0
No explanation is available for this
question!
Answer Explanation

ANSWER: 8
47) Why is the Software interrupt
required by the processor? Explanation:
- Published on 25 Aug 15 No explanation is available for this
question!
a. Return from subroutine.

b. Obtain system services, which need 49) What is said to happen when the
execution of privileged instruction. result of computation depends on the
speed of the processes involved?
c. Test the interrupt system of the
- Published on 25 Aug 15
processor.
a. A deadlock
d. Implement co-routines.
b. A time lock
Answer Explanation
c. Cycle stealing
ANSWER: Obtain system services,
which need execution of privileged d. Race condition
instruction.
Answer Explanation
Explanation:
No explanation is available for this

138
ANSWER: Race condition b. m = 8

Explanation: c. m = 13
No explanation is available for this
question! d. m = 9

Answer Explanation
50) In the given table it shows P1, P2
and P3 are the three processes. ANSWER: m = 13
What is the completion order of the 3
Explanation:
processes under the policies First Come
No explanation is available for this
First Serve(FCFS) and Round Robin question!
Scheduling? (RRS with CPU quantum
time of 2 units)
- Published on 25 Aug 15 52) The capacity of a memory unit =
(the number of words) * (the number of
bits / words). What will be the number
of separate address and data lines
needed for a memory of 4k * 16 ?
- Published on 25 Aug 15
a. FCFS: P1, P2, P3 RR2: P1, P3, P2
a. 12 address and 16 data lines
b. FCFS: P1, P3, P2 RR2: P1, P2, P3
b. 12 address and 12 data lines
c. FCFS: P1, P3, P2 RR2: P1, P3, P2
c. 11 address and 6 data lines
d. FCFS: P1, P2, P3 RR2: P1, P2, P3
d. 12 address and 8 data lines
Answer Explanation
Answer Explanation
ANSWER: FCFS: P1, P2, P3 RR2: P1,
P3, P2 ANSWER: 12 address and 16 data lines
51) A system has 'm' number of
Explanation:
resources of same type and 3 processes
No explanation is available for this
A, B, C. Share these resources A, B, C question!
which have the peak demand of 3, 4 and
6 respectively. Deadlock will not occur
if the value of 'm' is __________. 53) A program is executing in a pure
- Published on 25 Aug 15 demand paging system with 100 records
per page with 1 free main memory
a. m = 15 frame. The address sequence that is
generated by tracing this program is

139
recorded as follows, question!
0100, 0200, 0430, 0499, 0510, 0530,
0560, 0120, 0220, 0240, 0260, 0320,
0370 55) Consider a computer system with 6
What are the number of page faults? tape drives and 'n' processes completing
- Published on 25 Aug 15 for them. What is the maximum value of
'n' for the system to be deadlock free?
a. 8 (Assuming that each processes may need
3 tape drives)
b. 11 - Published on 25 Aug 15
c. 7 a. 3
d. 12 b. 2

Answer Explanation c. 4

ANSWER: 7 d. 7

Explanation: Answer Explanation


No explanation is available for this
question! ANSWER: 2

Explanation:
54) When size of the memory is No explanation is available for this
increased the page replacement policy question!
that sometimes leads to more page faults
is called _________ .
- Published on 25 Aug 15 56) What works on the principle of
locality?
a. FIFO - Published on 25 Aug 15

b. Optimal a. Cache memory

c. LRU b. Interrupts

d. None of the above c. Polling

Answer Explanation d. DMA

ANSWER: FIFO Answer Explanation

Explanation: ANSWER: Cache memory


No explanation is available for this

140
Explanation: ANSWER: will not be used for the
No explanation is available for this longest time in future.
question!
Explanation:
No explanation is available for this
57) Data Structure: A complete Binary question!
Tree contains 15 nodes, then how many
edges are there in the tree?
59) Operating System: Which of the
- Published on 19 Oct 15
following scheduling algorithm is non-
a. 15 pre-emptive?
- Published on 19 Oct 15
b. 30
a. Multilevel feedback queue.
c. 14
b. Round Robin
d. 16
c. FIFO
Answer Explanation
d. None of the above.
ANSWER: 14
Answer Explanation
Explanation:
No explanation is available for this ANSWER: FIFO
question!
Explanation:
No explanation is available for this
58) Operating System: The optimal question!
page replacement algorithm will select
the page that
60) Operating System: The address
- Published on 19 Oct 15
generated by the CPU is referred to as:
a. has been used least number of times. - Published on 19 Oct 15

b. has been used most number of times. a. physical address

c. has been used for the longest time in b. logical address


the past.
c. physical as well as logical address.
d. will not be used for the longest time
d. None of the above.
in future.

Answer Explanation Answer Explanation

141
ANSWER: logical address 63) Operating System: Which of the
61) Operating System: Which one of following scheduling policy is well
the following is not a valid state of a suited for a time shared operating
thread? system?
- Published on 19 Oct 15 - Published on 19 Oct 15

a. running a. First come first serve.

b. destroying b. Shortest job first

c. ready c. Round robin

d. blocked d. None of the above.

Answer Explanation Answer Explanation

ANSWER: destroying ANSWER: Round robin

Explanation: Explanation:
No explanation is available for this No explanation is available for this
question! question!

62) Operating System: Which RAID 64) Which protocol has flow control,
level refers to disk mirroring? but not error control?
- Published on 19 Oct 15 - Published on 23 Jun 15

a. 0 a. Simplest

b. 1 b. Selective-Repeat ARQ

c. 2 c. Go-Back-N ARQ

d. 3 d. Stop-and-Wait

Answer Explanation Answer Explanation

ANSWER: 1 ANSWER: Stop-and-Wait

Explanation: Explanation:
No explanation is available for this No explanation is available for this
question! question!

142
65) In an undirected graph, the sum of - Published on 23 Jun 15
degrees of all vertices is
- Published on 23 Jun 15 a. round-robin algorithm

a. Odd b. banker's algorithm

b. Even c. Multilevel feedback

c. Even and odd both. d. None of the above.

d. None of the above. Answer Explanation

Answer Explanation ANSWER: banker's algorithm

ANSWER: Even Explanation:


No explanation is available for this
Explanation: question!
No explanation is available for this
question!
68) Choose the correct option
regarding deadlock.
66) In a graph the number of vertices - Published on 23 Jun 15
of odd degree is always
- Published on 23 Jun 15 a. If a resource-allocation graph contains
no cycles, then no process in the system
a. even is deadlocked.

b. odd b. If the graph does contain a cycle, then


a deadlock may exist.
c. sometimes odd sometimes even
c. Only A
d. None of the above.
d. Option A and B are correct.
Answer Explanation
Answer Explanation
ANSWER: even
ANSWER: Option A and B are correct.
Explanation:
No explanation is available for this Explanation:
question! No explanation is available for this
question!

67) Which of the following is deadlock


avoidance algorithm? 69) Deadlocks can be described by

143
which graph? a. Swapping
- Published on 23 Jun 15
b. Spooling
a. Resource-Allocation Graph
c. Scheduler
b. Hamilton Graph
d. None of the above.
c. Complete Graph
Answer Explanation
d. None of the above.
ANSWER: Swapping
Answer Explanation
Explanation:
ANSWER: Resource-Allocation Graph No explanation is available for this
question!
Explanation:
No explanation is available for this
question! 72) Operating system supports
different page replacement policy. From
the given below option which is not a
70) In which of the following page valid page replacement policy?
replacement policies Balady’s anomaly - Published on 22 Jun 15
occurs?
- Published on 23 Jun 15 a. Least Recently Used

a. Most recently used. b. First in first out

b. LRU c. Currently used policy

c. FIFO d. Optimal page replacement policy

d. Optimal page replacement policy. Answer Explanation

Answer ANSWER: Currently used policy


Explanation
Explanation:
ANSWER: FIFO No explanation is available for this
71) Which technique is used to question!
temporarily removing non-active
programs from the memory of computer
73) OS: Which scheduler performs the
system?
"swapping out" or "swapping in"?
- Published on 23 Jun 15
- Published on 22 Jun 15

144
a. Long-term scheduling b. Mutual exclusion, Hold and wait, No
preemption, Circular wait.
b. Medium-term scheduling
c. Mutual exclusion, Hold and wait,
c. Short-term scheduling Preemption, Circular wait.

d. None of the above. d. None of the above.

Answer Explanation Answer Explanation

ANSWER: Medium-term scheduling ANSWER: Mutual exclusion, Hold and


wait, No preemption, Circular wait.
Explanation:
No explanation is available for this Explanation:
question! No explanation is available for this
question!

74) OS: Shell is the exclusive feature


of which software? 76) OS: If the disk head is located
- Published on 22 Jun 15 initially at 32, find the number of disk
moves required with FCFS if the disk
a. UNIX queue of I/O blocks requests are 98, 37,
14, 124, 65, 70.
b. DOS
- Published on 22 Jun 15
c. System software
a. 320
d. Application software
b. 321
Answer Explanation
c. 324
ANSWER: UNIX
d. None of the above
Explanation:
No explanation is available for this Answer Explanation
question!
ANSWER: 324

Explanation:
75) What are the necessary conditions
No explanation is available for this
to occur the deadlock? question!
- Published on 22 Jun 15

a. Sharable resource, Hold and wait, 77) OS: Resources are allocated to the
Preemption, Circular wait. process on non-sharable basis is

145
- Published on 22 Jun 15 output.

a. mutual exclusion b. Number of times the program is


running.
b. hold and wait
c. Number of programs processed by it
c. no pre-emption per unit time

d. circular wait d. None of the above.

Answer Explanation Answer Explanation

ANSWER: mutual exclusion ANSWER: Number of programs


processed by it per unit time
Explanation:
No explanation is available for this Explanation:
question! No explanation is available for this
question!

78) Some IPV4 address is given below,


choose the correct option. 80) Your system response time is very
- Published on 17 Jun 15 poor. What may be the reason?
- Published on 17 Jun 15
a. 22.34.7.8.20
a. Process is busy
b. 200.56.045.78
b. I/O rates may be high
c. 200.56.045.78
c. High paging rates
d. None of the above.
d. All of the above
Answer Explanation
Answer Explanation
ANSWER: None of the above.
ANSWER: All of the above
Explanation: 81) The procedure of starting a
No explanation is available for this
question! computer by loading the kernel is known
as
- Published on 17 Jun 15
79) How you will describe Throughput
a. Starting of kernel
in operating system?
- Published on 17 Jun 15 b. Booting the system.
a. Number of times a program produces

146
c. Loading the API. c. To get and execute the next user-
specified command.
d. None of the above.
d. None of the above.
Answer Explanation
Answer Explanation
ANSWER: Booting the system.
ANSWER: To get and execute the next
Explanation: user-specified command.
No explanation is available for this
question! Explanation:
No explanation is available for this
question!
82) Operating System provides the
different types of services to the user.
For accessing these services, the 84) Which of the following is correct
interface is provided by the regarding process in operating system?
- Published on 17 Jun 15 - Published on 17 Jun 15

a. system calls. a. a program is a passive entity

b. Application Programming Interface. b. process is an active entity.

c. Native library. c. A process is the unit of work.

d. None of the above. d. All of the above.

Answer Explanation Answer Explanation

ANSWER: system calls. ANSWER: All of the above.

Explanation: Explanation:
No explanation is available for this No explanation is available for this
question! question!

83) The main function of the command 85) Choose the correct option about
interpreter is abstract data type(ADT).
- Published on 17 Jun 15 - Published on 17 Jun 15

a. To handle the compiler. a. An abstract data type is a model of a


certain kind of data structure.
b. To handle the parser.
b. In abstract data type we know what a

147
specific data type can do, but how it c. Register
actually does it is hidden.
d. All of the above.
c. ADT is user defined type.
Answer Explanation
d. All of the above.
ANSWER: All of the above.
Answer Explanation
Explanation:
ANSWER: All of the above. No explanation is available for this
question!
Explanation:
No explanation is available for this
question! 88) Where does a computer add and
compare data?
- Published on 17 Jun 15
86) Which of the following is correct
regarding operating system? a. Hard disk
- Published on 17 Jun 15
b. Floppy disk
a. It manages the computer hardware.
c. CPU chip
b. It executes user programs.
d. Memory chip
c. Provide system services to the
application. Answer Explanation

d. All of the above. ANSWER: CPU chip

Answer Explanation Explanation:


No explanation is available for this
ANSWER: All of the above. question!

Explanation:
No explanation is available for this 89) Interrupts which are initiated by an
question! instruction are
- Published on 17 Jun 15

87) The volatile storage is/are a. Internal


- Published on 17 Jun 15
b. External
a. Main memory
c. Hardware
b. Cache

148
d. Software b. magnetic disk

Answer Explanation c. magnetic tape

ANSWER: Software d. None of the above.

Explanation: Answer Explanation


No explanation is available for this
question! ANSWER: random-access memory

Explanation:
90) Match the following: No explanation is available for this
List – I - - - - - - - - - - - - - - - - - - - - - - - question!
- - List – II
a. Multilevel feedback queue - - - - - - - -
92) What is page cannibalizing?
- i. Time-slicing
b. FCFS - - - - - - - - - - - - - - - - - - - - - -
- Published on 16 Jun 15
- -ii. Criteria to move processes between
queues a. Page swapping or Page replacements
c. Shortest process next - - - - - - - - - - -
-iii. Batch processing b. Adding timestamps to the page
d. Round robin scheduling - - - - - - - - -
- -iv. Exponential smoothing c. Avoiding page replacements

d. All the above


- Published on 17 Jun 15

a. a-i, b-iii, c-ii, d-iv Answer Explanation

b. a-iv, b-iii, c-ii, d-i ANSWER: Page swapping or Page


replacements
c. a-iii, b-i, c-iv, d-i
Explanation:
d. a-ii, b-iii, c-iv, d-i Page swapping is where data is being
exchanged between the hard disk and
RAM.
Answer Explanation

ANSWER: a-ii, b-iii, c-iv, d-i


93) From the following statements
91) CPU can access which type of
which one is not a valid deadlock
memory directly?
prevention scheme?
- Published on 17 Jun 15
- Published on 16 Jun 15
a. random-access memory
a. Number the resources uniquely and

149
never request a lower numbered Explanation:
resource than the last one A race condition generally occurs when
two or more operations are being
b. Release all the resources before performed together. A simple example
requesting for a new resource of a race condition can be a light
switch.
c. Request all the resources before
execution
95) Which of the following helps a
d. Never request a resource after system call to invoke?
releasing any resources
- Published on 16 Jun 15
Answer Explanation
a. Polling
ANSWER: Never request a resource
after releasing any resources b. A software interrupt

Explanation: c. Call function


The deadlock prevention has 4 methods
to mutual exclusion,hold and wait,no d. Queues
preemption,circular wait.
Answer Explanation

94) What is known as a race condition? ANSWER: A software interrupt

- Published on 16 Jun 15 Explanation:


Whenever a software is run which
a. When a deadlock occurs means it interrupts and the system call
gets invoked.
b. When it has a starvation and not a
deadlock
96) From the following hardware
c. When the result of a computation where would the swap space reside?
depends on the speed of the processes
involved - Published on 16 Jun 15

d. When it cannot have a subroutine call. a. RAM

Answer Explanation b. ROM

ANSWER: When the result of a c. Disk


computation depends on the speed of
the processes involved d. On-chip cache

150
Answer
Explanation

ANSWER: Disk

151

Das könnte Ihnen auch gefallen