so-it model question 02(2013)

13
BSCACADEMY SINCE1993 BSC Publishing Co. Pvt. Ltd. Head Office C-37, Ganesh Nagar, Pandav Nagar Complex, Delhi - 110092 Phone: 65252855, 56 E-mail: [email protected], [email protected], Web Site :www.bscacademy.com, www.bsccareer.com 1 Each packet contains the full source and destination address, this statement indicates which of the following? a) Virtual Circuit b) Datagram c) Data link d) FDDI e) None of these Ans b) 2.Which of the following identities belongs to Demorgan’s therorems? a) x+x=1 b) xy=yx c) (xy)’=x’+y’ d) x.0=0 e) None of the above. Ans c) 3. Network layer is responsible for ........................delivery of packet. a) Source to Destination b) End to end c) Error free d) Point to Point e) None of these Ans a) 4. An encoder has 2 to the power n input lines and ................output lines. a) 2 b)2*n c) n d)n*n e) None of the above Ans c) 5. which of the following statement is used in the binary search algorithm to value of middle sub in the array? a) =(start sub + stop sub)/2

Upload: puneet-khatri

Post on 03-May-2017

229 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: So-it Model Question 02(2013)

BSCACADEMY SINCE1993

BSC Publishing Co. Pvt. Ltd.

Head Office

C-37, Ganesh Nagar, Pandav Nagar Complex, Delhi - 110092

Phone: 65252855, 56

E-mail: [email protected], [email protected],

Web Site :www.bscacademy.com, www.bsccareer.com

1 Each packet contains the full source and destination address, this statement indicates which of the following?

a) Virtual Circuit

b) Datagram

c) Data link

d) FDDI

e) None of these

Ans b)

2.Which of the following identities belongs to Demorgan’s therorems?

a) x+x=1

b) xy=yx

c) (xy)’=x’+y’

d) x.0=0

e) None of the above.

Ans c)

3. Network layer is responsible for ........................delivery of packet.

a) Source to Destination

b) End to end

c) Error free

d) Point to Point

e) None of these

Ans a)

4. An encoder has 2 to the power n input lines and ................output lines.

a) 2

b)2*n

c) n

d)n*n

e) None of the above

Ans c)

5. which of the following statement is used in the binary search algorithm to value of middle sub in the array?

a) =(start sub + stop sub)/2

Page 2: So-it Model Question 02(2013)

BSCACADEMY SINCE1993

BSC Publishing Co. Pvt. Ltd.

Head Office

C-37, Ganesh Nagar, Pandav Nagar Complex, Delhi - 110092

Phone: 65252855, 56

E-mail: [email protected], [email protected],

Web Site :www.bscacademy.com, www.bsccareer.com

b) =(start sub – stop sub)/2

c) =start sub/2 + stop sub

d) = start sub/2 – start sub

Ans a)

6 Which of the following tool is known as the parser generator ?

a) Lex

b) Yaac

c) Tex

d) Emacs

e) None of these

Ans b)

7 which amongst them is not translator?

a) Assembler

b) Loader

c) Compiler

d) Interpreter

e) None of the above

Ans b)

8) Which of the following code detects and corrects error in data?

a) Windows

b) Encryption

c) Hamming codes

d) All of these

e) None of these

Ans c)

9 BCNF is needed because

a) When a data is deleted tuples may be lost

b) Otherwise tuples may be lost

c) Updating is otherwise difficult

d) When there is dependent attributes in two possible composite keys is unnecessary duplicated in the tuples

e) None of these

Ans d)

10) What is the date function in SQL?

a) Date

Page 3: So-it Model Question 02(2013)

BSCACADEMY SINCE1993

BSC Publishing Co. Pvt. Ltd.

Head Office

C-37, Ganesh Nagar, Pandav Nagar Complex, Delhi - 110092

Phone: 65252855, 56

E-mail: [email protected], [email protected],

Web Site :www.bscacademy.com, www.bsccareer.com

b) System date

c) Sysdate

d) Datesys

e) None of these

Ans c)

11. If each node in a tree has value greater than every value in its left subtree and has value less than every value in its

right subtree, the tree is known as ......................

a) Complete tree

b) Full binary tree

c) Binary search tree

d) Threaded tree

e) None of these

Ans c)

12. The loss in signal power as light travels down the fiber is called

a) Attenuation

b) Propagation

c) Scattering

d) Interruption

e) None of these

Ans a)

13. The relational database environment has all of the following components except

a) Users

b) Separate files

c) Database

d) Database administrator

e) None of these

Ans b)

14. A path in graph G, Which contains every vertex of G once and only once ?

Page 4: So-it Model Question 02(2013)

BSCACADEMY SINCE1993

BSC Publishing Co. Pvt. Ltd.

Head Office

C-37, Ganesh Nagar, Pandav Nagar Complex, Delhi - 110092

Phone: 65252855, 56

E-mail: [email protected], [email protected],

Web Site :www.bscacademy.com, www.bsccareer.com

a) Eular tour

b) Hamiltonian path

c) Eular trail

d) Hamiltonian tour

e) None of the above

Ans b)

15. The mechanism by which the data and function are bounded together with an object definition

a) Inheritance

b) Encapsulation

c) Abstraction

d) Polymorphism

e) None of these

Ans b)

16. Which of the following statement manages the changes made by DML statements?

a) SELECT

b) UPDATE

c) DELETE

d) COMMIT

e) None of these

Ans d)

17 Unix operating system is based on .......................

a) Language structure

b) Kernel approach

c) Virtual machine

d) Time sharing

e) None of these

Ans b)

18. What is term used to describe the situation when a derived class provides a function already provided in the base class.

a) Overloading

b) Overriding

Page 5: So-it Model Question 02(2013)

BSCACADEMY SINCE1993

BSC Publishing Co. Pvt. Ltd.

Head Office

C-37, Ganesh Nagar, Pandav Nagar Complex, Delhi - 110092

Phone: 65252855, 56

E-mail: [email protected], [email protected],

Web Site :www.bscacademy.com, www.bsccareer.com

c) Polymorphism

d) Encapsulation

e) None of the above

Ans b)

19. Concept of developing a compiler for a language by using subset of the same language known as ....................

a) Bootstrap

b) Lex

c) yacc

d) Analyzer

e) none of thease

Ans a)

20. ..................... is a communication device that combines transmissions from several I/O devices into one line.

a) Concentrator

b) Modifier

c) Full duplex

d) Multiplexer

e) None of the above

Ans d)

21. In database we use which command to discard all pending data changes ?

a) Commit

b) Rollback

c) Savepoint

d) Lock

e) None of the above

Ans b)

22 Which structure indicates many to many relation ?

a) Relational database

Page 6: So-it Model Question 02(2013)

BSCACADEMY SINCE1993

BSC Publishing Co. Pvt. Ltd.

Head Office

C-37, Ganesh Nagar, Pandav Nagar Complex, Delhi - 110092

Phone: 65252855, 56

E-mail: [email protected], [email protected],

Web Site :www.bscacademy.com, www.bsccareer.com

b) Network database

c) Hierarchy structure

d) Chain

e) None of the above

Ans b)

23. A address of the first element of array is called ................

a) First address

b) Location address

c) Initial address

d) Base address

e) None of the above

Ans d)

24. Point to Point Protocol (PPP) used for which purpose ?

a) Error detection

b) Authentication

c) Both (a) and (b)

d) Either (a) or (b)

e) None of these

Ans c)

25) To overcome the difficulties of race around condition which of the following flip-flop is used?

a) JK flip-flop

b) SR flip-flop

c) D flip-flop

d) Master-slave flip-flop

e) None of the above

Ans d)

26. Only the process executing the critical section is allowed access to the shared variable, all other processes should

prevented from doing so until the completion of the critical section. This is often referred to as ...............

Page 7: So-it Model Question 02(2013)

BSCACADEMY SINCE1993

BSC Publishing Co. Pvt. Ltd.

Head Office

C-37, Ganesh Nagar, Pandav Nagar Complex, Delhi - 110092

Phone: 65252855, 56

E-mail: [email protected], [email protected],

Web Site :www.bscacademy.com, www.bsccareer.com

a) Semaphores

b) Deadlock

c) Mutual exclusion

d) Interprocess communication

e) None of these

Ans c)

27. Piggy backing is a technique for --------------

a) Flow control

b) Acknowledgement

c) Sequence

d) Instructions

e) None of these

Ans b)

28. How much bits addition is used by Full adder?

a) 2

b) 3

c) 4

d) Unlimited

e) None of these

Ans b)

29. Prefix to postfix is possible in which Data structure?

a) Stack

b) Queue

c) Link list

d) Tree

e) None of the above

Ans a)

Page 8: So-it Model Question 02(2013)

BSCACADEMY SINCE1993

BSC Publishing Co. Pvt. Ltd.

Head Office

C-37, Ganesh Nagar, Pandav Nagar Complex, Delhi - 110092

Phone: 65252855, 56

E-mail: [email protected], [email protected],

Web Site :www.bscacademy.com, www.bsccareer.com

30. A solution to the problem where the source and destination hosts are on the same type of network, but there is a

different network in between....................

a) Data link

b) Packet

c) Tunnelling

d) Hopping

e) None of these

Ans c)

31. In which of the following categories falls Round robin scheduling algorithm?

a) Preemptive scheduling

b) Non-preemptive scheduling

c) Sometime preemptive sometime non- preemptive.

d) All of the above

e) None of the above

Ans a)

32. Wasting of memories within a partition, due to a difference in size of a partition and of the object resident within it, is

called------------

a) External fragmentation

b) Internal fragmentation

c) Compaction

d) Coalescing

e) None of these

Ans b)

33. In digital signature the private key is used for ................. and the public key for ............... .

a) Encryption, decryption

b) Decryption, encryption

c) Plaintext, ciphertext

d) Cipertest, Plaintext

e) None of the above

Page 9: So-it Model Question 02(2013)

BSCACADEMY SINCE1993

BSC Publishing Co. Pvt. Ltd.

Head Office

C-37, Ganesh Nagar, Pandav Nagar Complex, Delhi - 110092

Phone: 65252855, 56

E-mail: [email protected], [email protected],

Web Site :www.bscacademy.com, www.bsccareer.com

Ans a)

34. ................... hold actual data in the database?

a) Schemes

b) Triggers

c) Reports

d) Tables

e) None of the above

Ans d)

35. In queues, the items deleted at one end is called?

a) Rear

b) Front

c) Top

d) Base

e) None of the above

Ans b)

36. What is the name given to the database management system which is able handle full text data, image data, audio and

video?

a) Full media

b) Graphics

c) Multimedia

d) Hypertext

e) None of the above

Ans c)

37. Tranmission of computerised data form one location to another is called.........

a) Data flow

b) Data transfer

c) Data communication

d) Data management

Page 10: So-it Model Question 02(2013)

BSCACADEMY SINCE1993

BSC Publishing Co. Pvt. Ltd.

Head Office

C-37, Ganesh Nagar, Pandav Nagar Complex, Delhi - 110092

Phone: 65252855, 56

E-mail: [email protected], [email protected],

Web Site :www.bscacademy.com, www.bsccareer.com

e) None of the above

Ans c)

38. What is the name of operating system that reads and reacts in terms of actual time?

a) Time sharing system

b) Quick response system

c) Real time system

d) Batch system

e) None of the above

Ans c)

39. Spooling is most benefited in a multiprogramming environment where

a) There is limited primary memory and need for secondary memory

b) Most jobs are I/O bound

c) Jobs are evenly divided as I/O bound and CPU- bound

d) Most jobs are cpu-bound

e) None of these

Ans c)

40. Which of the following commands is used to update access and modification time of a file?

a) Touch

b) Wc

c) Grep

d) Cat

e) None of the above

Ans a)

41. You need to configure a switch from a remote subnet. Which of the following must be configured on the switch?

a) Console port

b) IP

c) Hostname

d) SNMP

Page 11: So-it Model Question 02(2013)

BSCACADEMY SINCE1993

BSC Publishing Co. Pvt. Ltd.

Head Office

C-37, Ganesh Nagar, Pandav Nagar Complex, Delhi - 110092

Phone: 65252855, 56

E-mail: [email protected], [email protected],

Web Site :www.bscacademy.com, www.bsccareer.com

e) Default gateway

Ans e)

42 which of the following is easiest software development process model?

a) Water fall model

b) Prototyping

c) Interative enhancement

d) Spiral model

e) None of the above

Ans a)

43. To avoid race condition, the maximum number of processes that may be simultaneously inside the critical section is

a) Zero

b) One

c) Two

d) More than two

e) None of the above

Ans b)

44. The extent to which the software can continue to operate correctly despite the introduction of invalid input is called as

a) Reliability

b ) Robustness

c) Fault tolerance

d) Portability

e) None of the above

Ans b)

45. When more than one attributes of a table are related with many attributes of one or more other tables, then such a

relationship is known as

a) One-to-one

b) Many-to-many

c) Many-to-one

Page 12: So-it Model Question 02(2013)

BSCACADEMY SINCE1993

BSC Publishing Co. Pvt. Ltd.

Head Office

C-37, Ganesh Nagar, Pandav Nagar Complex, Delhi - 110092

Phone: 65252855, 56

E-mail: [email protected], [email protected],

Web Site :www.bscacademy.com, www.bsccareer.com

d) One-to-many

e) None of the above

Ans b)

46. Which of the following is hierarchical database implementation?

a) Table

b) Array

c) List

d) Tree

e) None of the above

Ans d)

47. Which of the following action can be performed from Drop table in Database?

a) To delete the records from a table

b) To delete a table with record

c) To delete a particular column from the table

d) To delete a blank table from the database

e) None of the above

Ans d)

48. When a sub class is inherited from a super class, which itself inherited from a super class, then such inheritance is

known as

a) Single inheritance

b) Multiple inheritance

c) Hierarchical inheritance

d) Multilevel inheritance

e) None of the above

Ans d)

49. The first AI programming language was called?

a) BASIC

b) FORTRAN

Page 13: So-it Model Question 02(2013)

BSCACADEMY SINCE1993

BSC Publishing Co. Pvt. Ltd.

Head Office

C-37, Ganesh Nagar, Pandav Nagar Complex, Delhi - 110092

Phone: 65252855, 56

E-mail: [email protected], [email protected],

Web Site :www.bscacademy.com, www.bsccareer.com

c) IPL

d) LISP

e) None of the above

Ans c)

50) Data security threats include

a) Hardware failure

b) Privacy invasion

c) Fraudulent manipulation of data

d) Software failure

e) All of the above

Ans b)