151. When Performing a looping operation, the instruction gets
stored in the ______ .
(a) Registers (b) Cache
(c) System Heap (d) System stack
(e) None of these
152. Which of the following is not considered a tool at system
design phase ?
(a) Data flow diagram (b) Decision table
(c) Pie chart (d) System flow chart
(e) none of these
153. Checking quality of software in both simulated and live
environments is known as
(a) Checking (b) Usability
(c) Vaidity (d) Validation
(e) none of these
154. Page fault frequency in an operating system is reduced when
the
(a) processes tend to the I/O-bound
(b) size of pages is reduced
(c) processes tend to be CPU-bound
(d) locality of reference is applicable to the process
(e) None of these.
155. The largest percentage of total life cycle cost of software is:
(a) Design cost (b) Maintenance cost
(c) Coding cost (d) Testing cost
(e) None of these.
156. The most creative and challenging phase of system life cycle
is
(a) Feasibility study (b) Maintenance
(c) Design (d) None of the above
(e) None of these
157. The memory allocation scheme subject to "external"
fragmentation is
(a) segmentation
(b) swapping
(c) pure demand paging
(d) multiple fixed contiguous partitions
(e) None of these.
158. Network layer firewall works as a
(a) frame filter
(b) packet filter
(c) bit filter
(d) Both (a) and (b)
(e) none of the mentioned
159. Every host computer on the internet has a(n)
(a) Similar IP address
(b) Unique 10-digit number
(c) Common name and number
(d) Unique IP address
(e) Unique 15-digit number
160. What is the result of a SQL SELECT statement called?
(a) Report (b) File
(c) Page (d) Table
(e) Form
161. Which of the following is true regarding Common Gateway
Interface (CGI)?
(a) An interface that accepts and returns data that may be
written in SQL.
(b) A small program that executes within other application
and is stored on the server.
(c) A small program that executes within other application
and is stored on the client.
(d) A small program that executes within other application
and is stored on the client or the server.
(e) An interface that accepts and returns data that may be
written in any language that produces executable file.
162. __________ is an essential process where intelligent
methods are applied to extract data patterns.
(a) Data warehousing (b) Data mining
(c) Text mining (d) Data selection
(e) None of these.
163. A Process Control Block (PCB) does not contain
____________.
(a) Code (b) Stack
(c) Heap (d) Bootstrap program
(e) Program Counter
164. Which one of the following cannot be scheduled by the
kernel?
(a) Kernel level thread
(b) User level thread
(c) Process
(d) None of the mentioned
(e) Kernel can schedule each thread
165. Default network mask for CLASS is:
(a) 255.0.0.0
(b) 255.255.0.0
(c) 255.255.255.0
(d) 255.255.255.255
(e) None of these
166. CPU scheduling is based on ____________.
(a) Multi-processor systems
(b) Multi-programming operating systems
(c) Larger memory sized systems
(d) None of these
(e) All of these.
167. A subset of data in a data warehouse in the form of summary
data, related to a particular department or business function:
(a) Meta Data
(b) Archive data
(c) Operational Data store
(d) Data marts
(e) All of these.
168. Re-locatable programs
(a) cannot be used with fixed partitions
(b) can be loaded almost anywhere in memory
(c) do not need a linker
(d) can be loaded only at one specific location
(e) None of these.
169. Android tries hard to ____________ low-level components,
such as the software stack, with interfaces so that vendor-
specific code can be managed easily.
(a) confound (b) abstract
(c) modularize (d) compound
(e) None of these.
170. Which of the following is used to create and delete views
and relations within tables?
(a) SQL Data Identification Language
(b) SQL Data Identification and Manipulation Languages
(c) SQL Data Relational Language
(d) SQL Data Definition Language
(e) SQL Data Manipulation Language
171. How long is an IPv6 address?
(a) 32 bits (b) 128 bits
(c) 128 bytes (d) 64 bits
(e) None of these
172. To avoid race condition, the maximum number of processes
that may be simultaneously inside the critical section is
(a) zero (b) one
(c) two (d) more than two
(e) none of these
173. The tables generated on compilation of data definition
language are stored in?
(a) Data abstraction (b) Data File
(c) Data Meta (d) Data Dictionary
(e) None of these
174. When a DNS server accepts and uses incorrect information
from a host that has no authority giving that information,
then it is called
(a) DNS lookup (b) DNS hijacking
(c) DNS spoofing (d) None of the mentioned
(e) None of these
175. Which of the following is true for a CASE SQL statement?
(a) CASE SQL statement a way to establish a data definition
in SQL or establish a loop in SQL
(b) CASE SQL statement a way to establish an IF-THEN-
ELSE in SQL
(c) CASE SQL statement a way to establish a loop in SQL
(d) CASE SQL statement a way to establish a data definition
in SQL
(e) Establish a loop in SQL and establish an IF-THEN-ELSE
in SQL
176. White box testing sometimes called:
(a) Basic Path (b) Graph Testing
(c) Data flow testing (d) Glass box testing
(e) None of these
177. What type of join is needed when you wish to include rows
that do not have matching values?
(a) Inner Join (b) Equip Join
(c) Outer Join (d) Intermediate Join
(e) All of these
178. X.25 standard specifies
(a) Technique for start-stop data
(b) Technique for dial access
(c) Data bit rate
(d) DTE/DCE interface
(e) None of these
179. Tuple in relational algebra refers to:
(a) Table
(b) Relation
(c) Column
(d) Raw
(e) None of these
180. An attempt to make a computer resource unavailable to its
intended users is called
(a) denial-of-service attack
(b) virus attack
(c) worms attack
(d) botnet process
(e) None of these.
181. The total time to prepare a disk drive mechanism for a block
of data to be read from is its
(a) latency
(b) latency plus transmission time
(c) latency plus seek time
(d) latency plus seek time plus transmission time
(e) None of these
182. How does Google check for malicious software in the Android
Market?
(a) Every new app is scanned by a virus scanner
(b) Users report malicious software to Google
(c) Google employees verifies each new app
(d) A separate company monitors the Android Market for
Google
(e) None of these
183. Page stealing
(a) is a sign of efficient system
(b) is taking page frames other working sets
(c) should be the tuning goal
(d) is taking larger disk spaces for pages paged out
(e) None of these
184. What happens when you boot up a PC?
(a) A portion of the operating system is copied from disk
into memory.
(b) Portions of the operating system are copied from
memory into the disk.
(c) Portions of the operating system are compiled.
(d) Portions of the operating system are emulated.
(e) The PC gets switched off.
185. When we talk about the 'VLSI & ULSI' technology in a
processor, what is integrated into the processor?
(a) Transistors (b) Accumulator
(c) Capacitors (d) Registers
(e) All of these.
186. A relation is in ____________ if an attribute of a composite
key is dependent on an attribute of other composite key.
(a) 2NF (b) 3NF
(c) BCNF (d) 1NF
(e) None of these.
187. The processes that are residing in main memory and are
ready and waiting to execute are kept on a list called _____.
(a) Job queue (b) Ready queue
(c) Execution queue (d) Process queue
(e) Priority queue
188. Time quantum is defined in:
(a) Shortest job scheduling algorithm
(b) Round robin scheduling algorithm
(c) Priority scheduling algorithm
(d) Multilevel queue scheduling algorithm
(e) All of the above
189. Which one is a DCL command?
(a) merge (); (b) call();
(c) select(); (d) top();
(e) grant ();
190. The collection of information stored in a database at a
particular moment is?
(a) View (b) Scheme
(c) All of the above (d) Instance
(e) None of the above
191. A logical schema
(a) Describes how data is actually stored on disk.
(b) Is the entire Database
(c) Is a standard way of organizing information into
accessible parts.
(d) It is a primary key.
(e) None of the above
192. ________ Clause is an additional filter that is applied to the
result.
(a) Order by (b) Group by
(c) Select (d) Having
(e) None of these
193. Alternate and adaptive routing algorithm belongs to ______
(a) static routing (b) permanent routing
(c) standard routing (d) dynamic routing
(e) None of these.
195. Which one is a DCL command?
(a) Drop (b) Call
(c) Revoke (d) Pop
(e) Select
196. The clock rate of the processor can be improved by:
(a) Improving the IC technology of the logic circuits
(b) Reducing the amount of processing done in one step
(c) By using over-clocking method
(d) All of these
(e) None of these
197. Parameter that is normally achieved through a trailer added
to end of frame is
(a) Access Control (b) Flow Control
(c) Error Control (d) Physical addressing
(e) None of these.
198. The objective of multiprogramming is to:
(a) Have some process running at all times
(b) Have multiple programs waiting in a queue ready to run
(c) To minimize CPU utilization
(d) To maximize CPU utilization
(e) Both (a) and (d)
199. An internetworking device operating at the transport layer
is called a
(a) Bridge (b) Router
(c) Repeater
(d) Gateway
(e) None of these
200. Which layers of the OSI determines the interface often
system with the user?
(a) Network (b) Application
(c) Data link (d) Session
(e) None of these.
No comments: