1.
Which of the following microprocessors is not 8bit microprocessor?
Correct Answer
D. 68000
Explanation
68000 is a 16 bit Microprocessor
2.
Which of the following interrupts has the lowest priority?
Correct Answer
D. INTR
Explanation
he lowest priority interrupt in the 8085 microprocessor is INTR
3.
The Data control language (DCL).
Correct Answer
A. Is used to manage user access to data bases
Explanation
The correct answer is "is used to manage user access to databases." The Data Control Language (DCL) is a subset of SQL (Structured Query Language) that is used to control access to the database by granting or revoking privileges to users. It includes commands such as GRANT and REVOKE, which allow administrators to specify the level of access that different users or user groups have to the database. DCL is primarily focused on managing user permissions and ensuring data security within the database system.
4.
Microprocessor 8085 is the enhanced version of which essentially the same construction set
Correct Answer
B. 8080
Explanation
The correct answer is 8080. The microprocessor 8085 is an enhanced version of the 8080 microprocessor. It is essentially the same construction set as the 8080 but with some added features and improvements. The 8085 is backward compatible with the 8080, meaning that programs written for the 8080 can run on the 8085 without any modifications. Therefore, the 8080 is the correct answer as it is the predecessor to the 8085 and shares the same construction set.
5.
A collection of fields is called a record with respect of DBMS, a record corresponds to
Correct Answer
A. Tuple
Explanation
In the context of a DBMS, a record is a collection of fields that represents a single entity or instance of a table. In this case, the correct term for a collection of fields is a "tuple". A tuple is a row in a table that contains data for each attribute or field. Therefore, the correct answer is "Tuple".
6.
Multiplexer means
Correct Answer
B. Many into one
Explanation
A multiplexer is a device that combines multiple input signals into a single output signal. It selects one of the input signals based on a control signal and forwards it to the output. Therefore, the correct answer is "Many into one" as it accurately describes the functionality of a multiplexer.
7.
Which gate is known as universal gate ?
Correct Answer
B. NAND gate
Explanation
The NAND gate is known as the universal gate because it can be used to implement any other logic gate. It can perform the functions of AND, OR, and NOT gates by combining multiple NAND gates in different configurations. This makes it a versatile gate that can be used to design complex digital circuits.
8.
Which of the following is the first integrated logic family?
Correct Answer
E. RTL
Explanation
RTL stands for Resistor-Transistor Logic, which was the first integrated logic family. It was developed in the late 1950s and early 1960s and was widely used in early computer systems. RTL logic gates were constructed using resistors and transistors, and they operated by using the transistor as a switch to control the flow of current. This allowed for the creation of complex logic circuits on a single integrated circuit, paving the way for the development of modern digital electronics.
9.
In the relational schema, each tuple is divided into fields called.
Correct Answer
B. Domains
Explanation
In a relational schema, each tuple is divided into fields called domains. Domains define the set of possible values that a field can take in a relation. They specify the data type and constraints for each field in a relation. By dividing tuples into fields called domains, it allows for better organization and management of data within a relational database system.
10.
A top to bottom relationship among the items in a database is established by a
Correct Answer
A. Hierarchical schema
Explanation
A hierarchical schema is a database structure where the data is organized in a tree-like structure, with a top-to-bottom relationship among the items. This means that each item has only one parent and can have multiple children. This type of schema is commonly used in systems where data has a clear parent-child relationship, such as organizational structures or file systems. Network schema, on the other hand, allows for a more complex relationship among items, with each item being able to have multiple parents and children. Relational schema, on the other hand, is a database structure where data is organized into tables with relationships established through keys. Therefore, the correct answer is hierarchical schema as it establishes a top-to-bottom relationship among the items in a database.
11.
The modify operation is likely to be done after.
Correct Answer
C. Look up
Explanation
The correct answer is "Look up" because the modify operation typically involves searching for an existing element or record in a data structure or database before making any changes to it. This involves looking up the desired element or record based on certain criteria or key values. Therefore, "Look up" is the most appropriate option among the given choices.
12.
The way a particular application views the data from the database that the application uses is a :
Correct Answer
D. Subschema
Explanation
A subschema refers to a subset of the entire database schema that is relevant to a specific application or user. It allows the application to view and manipulate only the data that is necessary for its functionality, while hiding the rest of the database's structure and data. This helps in maintaining data security and providing a simplified view of the database for different applications or users.
13.
Which two files are used during operation of the DBMS?
Correct Answer
C. Data dictionary and transaction log
Explanation
During the operation of a DBMS, two important files are used: the data dictionary and the transaction log. The data dictionary contains metadata about the database, such as the structure, organization, and relationships between tables. It helps in maintaining data integrity and ensuring consistency. On the other hand, the transaction log records all the changes made to the database, including insertions, deletions, and modifications. It provides a way to recover the database in case of system failures or errors. Therefore, the data dictionary and transaction log are essential components for the smooth functioning of a DBMS.
14.
Which normal form is considered adequate for relational da tabase design?
Correct Answer
B. 3 NF
Explanation
The third normal form (3NF) is considered adequate for relational database design. This normal form ensures that there is no transitive dependency between non-key attributes in a table. It eliminates any redundancy and allows for efficient storage and retrieval of data. By adhering to 3NF, a database can achieve a high level of data integrity and maintainability.
15.
An attribute of one matching the primary key another table, is called as
Correct Answer
A. Foreign key
Explanation
A foreign key is an attribute in one table that matches the primary key of another table. It is used to establish a relationship between the two tables and enforce referential integrity. When a foreign key is defined, it ensures that values in the referencing table (child table) must exist in the referenced table (parent table). This helps maintain data consistency and integrity between related tables in a database. Therefore, the correct answer is "Foreign key".
16.
Which of the following SQL commands can be used modify existing data in a database table?
Correct Answer
B. UPDATE
Explanation
The UPDATE command is used to modify existing data in a database table. It allows users to change the values of specific columns in one or more rows of a table. The other options, MODIFY, CHANGE, and NEW, are not valid SQL commands for modifying data in a table. Therefore, the correct answer is UPDATE.
17.
The average number of key comparisons done in a successful sequential search in a list of length “n” is
Correct Answer
D. (n+1)/2
Explanation
The average number of key comparisons done in a successful sequential search in a list of length "n" is (n+1)/2. This is because in a sequential search, each element in the list is compared with the key until a match is found. On average, the key is expected to be found in the middle of the list, so the number of comparisons needed would be approximately half of the length of the list. Adding 1 to account for the final comparison gives us the average number of comparisons as (n+1)/2.
18.
Each node in a linked list must contain at least:
Correct Answer
D. Two Fields
Explanation
In a linked list, each node stores two fields: one for the data and one for the reference to the next node in the list. These two fields are essential for maintaining the structure and connectivity of the linked list. The data field holds the actual value or information that the node is intended to store, while the reference field points to the next node in the list, allowing traversal through the linked list. Having only one field would not be sufficient to create a linked list, and having more than two fields would be unnecessary for the basic functionality of a linked list.
19.
The order of the binary search algorithm is
Correct Answer
D. Log(n)
Explanation
The order of the binary search algorithm is logarithmic (log(n)). This is because in each step of the algorithm, the search space is divided in half. As a result, the algorithm can quickly narrow down the search range until it finds the desired element or determines that it does not exist. This logarithmic time complexity makes binary search efficient, especially for large datasets, as it significantly reduces the number of comparisons needed to find the target element.
20.
Which of the following is useful in implementing quick sort using recursion?
Correct Answer
A. Stack
Explanation
Stack is useful in implementing quick sort using recursion because it follows the Last In First Out (LIFO) principle. In quick sort, the partitioning step involves selecting a pivot element and rearranging the array such that all elements smaller than the pivot are placed before it, and all elements greater than the pivot are placed after it. This partitioning process is performed recursively on the sub-arrays formed before and after the pivot. Using a stack allows us to keep track of the sub-arrays that need to be processed, ensuring that the recursive calls are made in the correct order and preventing stack overflow.
21.
Which data communication method is used to transmit the data over a serial communication link.
Correct Answer
B. Full duplex
Explanation
Full duplex is the correct answer because it is a data communication method that allows data to be transmitted simultaneously in both directions over a serial communication link. In full duplex, data can be sent and received at the same time, enabling faster and more efficient communication. This is different from simplex, where data can only be transmitted in one direction, and half duplex, where data can be transmitted in both directions but not simultaneously. Both (a) and (b) and both (b) and (c) are incorrect options as they do not accurately describe the method used to transmit data over a serial communication link.
22.
OSI model consists of ____ layers
Correct Answer
E. 7
Explanation
The OSI (Open Systems Interconnection) model consists of 7 layers. These layers are a conceptual framework that helps in understanding how different network protocols and technologies interact with each other. Each layer has a specific function and is responsible for a particular aspect of network communication. These layers include the physical layer, data link layer, network layer, transport layer, session layer, presentation layer, and application layer.
23.
Encryption and decryption are functions of the ____ layer.
Correct Answer
E. Presentation
Explanation
The correct answer is Presentation. Encryption and decryption are functions of the Presentation layer in the OSI model. This layer is responsible for the formatting and encryption of data to be sent over the network. It ensures that the data is in a format that can be understood by the receiving device and also handles encryption and decryption for secure communication.
24.
Which of the following is not a connecting device?
Correct Answer
B. Trans receiver
Explanation
A transceiver is a device that combines both transmitter and receiver functions in one unit. It is used for transmitting and receiving signals in a network. Therefore, it is considered a connecting device. Bridges, routers, and repeaters are all examples of connecting devices as well, as they are used to connect different parts of a network together.
25.
How many hosts are attached to each of the local area network at your site?
Correct Answer
C. 254
Explanation
The correct answer is 254 because in a local area network, the number of hosts that can be attached is determined by the available IP addresses in the network's subnet. In a typical IPv4 subnet, the total number of usable IP addresses is 2^(number of bits in the host portion of the IP address) - 2. Since a typical subnet has 8 bits for the host portion, the calculation would be 2^8 - 2, which equals 256 - 2 = 254. Therefore, each local area network at the site can have 254 hosts attached.
26.
Which of the following types of software should we use if we often need to create, edit and print documents?
Correct Answer
A. Word processing
Explanation
Word processing software is the appropriate choice for creating, editing, and printing documents. This type of software provides tools and features specifically designed for manipulating text, formatting documents, and producing professional-looking prints. Word processing software allows users to easily type, edit, and format text, insert images and tables, apply styles and templates, and perform spell-checking and grammar correction. It also offers features like page layout customization, header and footer management, and printing options, making it the ideal choice for tasks related to document creation, editing, and printing.
27.
_____ is present in spiral model
Correct Answer
B. Risk analysis
Explanation
The spiral model is a software development process model that combines elements of both waterfall and iterative development models. It involves a series of iterations or spirals, with each spiral representing a phase of the software development life cycle. During the risk analysis phase of the spiral model, potential risks and uncertainties associated with the project are identified and analyzed. This helps in making informed decisions and taking necessary actions to mitigate or manage these risks effectively. Therefore, risk analysis is an integral part of the spiral model.
28.
The approach used in top down analysis and design is :
Correct Answer
B. To identify a top level function and then create hierarchy of lower level modules and components
Explanation
The correct answer is to identify a top level function and then create a hierarchy of lower level modules and components. This approach involves breaking down a complex system into smaller, manageable components and organizing them in a hierarchical structure. By identifying the top level function first, the design process can be structured and the lower level modules and components can be designed to fulfill the requirements of the top level function. This approach allows for better understanding, organization, and management of the system's functionality.
29.
B2C ecommerce focuses on customer ___.
Correct Answer
D. All of these
Explanation
B2C ecommerce focuses on customer satisfaction and engagement throughout the entire buying process. It involves responding to customer inquiries and concerns, obtaining customer feedback to improve products and services, and facilitating the buyer-seller transaction. Therefore, all of these options are correct as they encompass the various aspects of customer interaction in B2C ecommerce.
30.
OLAP stands for
Correct Answer
E. Online Analytical processing
Explanation
OLAP stands for Online Analytical Processing. It is a technology used in data analysis that allows users to extract and view data from multiple dimensions or perspectives. It enables users to perform complex calculations, generate reports, and gain insights from large volumes of data. OLAP is commonly used in business intelligence and decision-making processes, as it provides a multidimensional view of data, allowing users to analyze it from different angles.
31.
Thrashing
Correct Answer
B. Is a natural consequence of virtual memory system Always occurs on large computers
Explanation
Thrashing refers to a situation in which a computer's performance is severely degraded due to excessive swapping of pages between the main memory and the disk. It occurs when the system is constantly busy swapping pages in and out, instead of executing useful work. This is a natural consequence of the virtual memory system, where pages are swapped in and out to manage memory usage. While it can occur on any computer, it is more likely to happen on large computers with high memory demands. Poor paging algorithms can also contribute to thrashing.
32.
Data mining is
Correct Answer
B. Automatic extraction of patters of information
Explanation
The correct answer is "Automatic extraction of patterns of information." Data mining refers to the process of discovering patterns, correlations, and relationships in large datasets. It involves using various techniques and algorithms to automatically extract valuable information from the data. This information can be used for decision-making, predictive analysis, and other purposes. Storing data when in need and searching data on the internet are not accurate definitions of data mining. Therefore, the correct answer is automatic extraction of patterns of information.
33.
Decision support system are based on ____ analysis
Correct Answer
D. All of these
Explanation
Decision support systems are based on various types of analysis, including query and reporting, data mining, and OLAP (Online Analytical Processing). Query and reporting analysis allows users to retrieve specific information from the system, while data mining involves discovering patterns and relationships in large datasets. OLAP analysis involves multidimensional analysis of data to provide insights and support decision-making. Therefore, all of these types of analysis are utilized in decision support systems.
34.
Backup procedure helps in
Correct Answer
D. All of the above
Explanation
A backup procedure is an essential part of any system to ensure the continuity of operations and protect against data loss. It helps in restoring the operation whenever there is a disk failure by providing a copy of the data that can be used to rebuild the system. It also helps in restoring both application and system software whenever there is disk corruption, allowing the system to be brought back to a functional state. Additionally, it helps in restoring the data sites whenever there is a system crash, ensuring that the data is not permanently lost. Therefore, the correct answer is "All of the above."
35.
Banker’s algorithm for resource allocation deals with
Correct Answer
B. Deadlock avoidance
Explanation
The Banker's algorithm for resource allocation is a technique used to prevent deadlocks from occurring in a system. It works by carefully analyzing the available resources and the current allocation requests to determine if granting a request would potentially lead to a deadlock. By avoiding situations that may result in a deadlock, the Banker's algorithm helps to ensure the system's stability and prevent resource deadlocks.
36.
Regression testing in primarily related to
Correct Answer
A. Functional testing
Explanation
Regression testing is primarily related to functional testing because it is a type of testing that ensures that previously developed and tested software still performs correctly after changes or updates have been made. Functional testing focuses on testing the functionality of the software to ensure that it meets the specified requirements. Regression testing is specifically aimed at verifying that the existing functionality has not been affected by any changes or updates, making it closely related to functional testing.
37.
Pointer is used in
Correct Answer
B.
Indirect Addressing
Explanation
Indirect addressing is a method of accessing data in which the address of the data is stored in a pointer variable. Instead of directly accessing the data, the pointer is used to indirectly access the data. This allows for more flexibility and dynamic memory allocation as the pointer can be updated to point to different memory locations. In contrast, direct addressing refers to directly accessing data using its memory address. Indexed mode and immediate addressing are different addressing modes that are not related to the use of pointers.
38.
The break statement causes an exit.
Correct Answer
C. From the loops and switches
Explanation
The break statement in programming is used to exit a loop or switch statement. In this case, the correct answer is "From the loops and switches", which means that the break statement can cause an exit from both loops and switch statements. This means that when a break statement is encountered within a loop or switch, the program will immediately exit out of the loop or switch and continue with the next line of code outside of it.
39.
The term push and pop is related to the
Correct Answer
C. Stacks
Explanation
The term push and pop is related to stacks. In a stack data structure, the push operation adds an element to the top of the stack, while the pop operation removes the topmost element from the stack. This follows the Last-In-First-Out (LIFO) principle, where the last element pushed onto the stack is the first one to be popped off. Arrays and ArrayLists can also perform push and pop operations, but they are not specifically designed for it like stacks are. Therefore, the correct answer is Stacks.
40.
Software testing is
Correct Answer
D. The process of executing a program with the intent of finding errors
Explanation
The correct answer is "The process of executing a program with the intent of finding errors." This answer accurately describes software testing as the process of intentionally executing a program to identify any errors or bugs present. The other options either do not fully capture the purpose of software testing or are not comprehensive enough to encompass the entire process.
41.
HTTP refers to
Correct Answer
B. Hyper Text Transfer Protocol
Explanation
HTTP stands for Hyper Text Transfer Protocol. It is a protocol used for transmitting hypertext over the internet. Hypertext refers to text that contains links to other texts, allowing users to navigate and access information on the World Wide Web. The correct answer is "Hyper Text Transfer Protocol."
42.
Array can be passed in a functions in C language through
Correct Answer
B. ‘Call by reference’ only
Explanation
In C language, arrays can only be passed to functions using 'Call by reference'. This means that when an array is passed to a function, the function receives a reference to the original array in memory, allowing it to modify the original array. This is different from 'Call by value', where a copy of the array would be passed to the function, and any modifications made to the array within the function would not affect the original array. Therefore, the correct answer is 'Call by reference' only.
43.
Which of the following is easiest software development process model?
Correct Answer
A. Waterfall Model
Explanation
The Waterfall Model is considered the easiest software development process model because it follows a linear and sequential approach. It involves clearly defined phases, starting from requirements gathering and ending with maintenance. Each phase is completed before moving on to the next, which makes it easier to plan and manage the development process. Additionally, the Waterfall Model is well-documented and has a clear structure, making it easier for developers to understand and follow.
44.
An email account includes a storage area, often called a (n)
Correct Answer
A. Attachment
Explanation
An email account includes a storage area, often called a mailbox, where incoming and outgoing emails are stored. This mailbox acts as a virtual container for all the messages and attachments that are sent and received through the email account. It allows users to access and manage their emails, including attachments, in one central location. Therefore, the correct answer is "Mailbox".
45.
A(n) ____ is a collection of information that determines which files you can access and which setting you use.
Correct Answer
B. User account
Explanation
A user account is a collection of information that determines which files you can access and which settings you use. It allows you to log in to a system or network and provides you with specific permissions and privileges based on your user role and level of access. With a user account, you can customize your settings, access specific files and folders, and interact with the operating system or network in a personalized manner.
46.
To print a document
Correct Answer
A. Select the print command and then select OK
Explanation
The explanation for the given correct answer is that to print a document, the user needs to first select the print command. After selecting the print command, they should then select the "OK" button to confirm the printing action. This sequence of steps ensures that the document is sent to the printer and the printing process is initiated.
47.
Which part of the computer provides only temporary storage of files?
Correct Answer
E. RAM memory
Explanation
RAM memory provides only temporary storage of files. Unlike the hard drive, which stores files permanently, RAM memory is volatile and loses its data when the computer is powered off or restarted. The processor and motherboard are responsible for executing and managing tasks, while ROM memory stores permanent instructions for the computer. Therefore, RAM memory is the correct answer as it is specifically designed for temporary storage.
48.
SONET uses
Correct Answer
B. Fiber Optic Cable
Explanation
SONET (Synchronous Optical Network) is a high-speed telecommunications network that is widely used for transmitting large amounts of data over long distances. It utilizes fiber optic cables for transmission because they offer high bandwidth, low signal loss, and immunity to electromagnetic interference. Twisted pair and coaxial cables are not suitable for SONET due to their limited bandwidth and higher susceptibility to signal degradation. Therefore, the correct answer is "Fiber Optic Cable."
49.
-
What will be the output of “a” in following code?
#include
int main()
int a=20;
{
int a=10;
printf(“%d”,a);
printf(“%d”,a);
return 0;
}
Correct Answer
E. Compilation Error
Explanation
The code will result in a compilation error because the main function is missing its opening and closing braces.
50.
In Queue, the items deleted at one end called___
Correct Answer
B. Front
Explanation
In a queue, the items that are deleted or removed are always done so from the front of the queue. This is because a queue follows the First-In-First-Out (FIFO) principle, where the item that has been in the queue for the longest time is the first one to be removed. Therefore, the correct answer is "Front".