Ibps I.T. Officer Scale-I 2012

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Prashant_kr
P
Prashant_kr
Community Contributor
Quizzes Created: 3 | Total Attempts: 1,467
Questions: 50 | Attempts: 348

SettingsSettingsSettings
Scale Quizzes & Trivia

Test consists of 50 Questions 75 Marks. Total Time=30 minutes


Questions and Answers
  • 1. 

    A special type gateway that can keep external users from accessing resources on the LAN users access the external info is called:

    • A.

      Repeater

    • B.

      Firewall

    • C.

      Encryption

    • D.

      Hub

    • E.

      None of these

    Correct Answer
    B. Firewall
    Explanation
    A firewall is a special type of gateway that is designed to prevent unauthorized access to resources on a LAN (Local Area Network) from external users. It acts as a barrier between the internal network and the external network, monitoring and controlling incoming and outgoing network traffic based on predetermined security rules. By enforcing these rules, a firewall can effectively protect the LAN from potential threats and unauthorized access attempts. Therefore, a firewall is the correct answer in this case.

    Rate this question:

  • 2. 

    In SQL, which command is used to changes data in a data table?

    • A.

      UPDATE

    • B.

      INSERT

    • C.

      BROWSE

    • D.

      APPEND

    • E.

      None of These

    Correct Answer
    A. UPDATE
    Explanation
    The correct answer is UPDATE. The UPDATE command in SQL is used to modify or change existing data in a data table. It allows you to update specific columns or rows in a table based on certain conditions or criteria. This command is essential for making changes to data within a database and is commonly used in conjunction with the WHERE clause to specify which rows should be updated. The other options, INSERT, BROWSE, and APPEND, are not used for modifying existing data but rather for inserting new data or browsing and viewing data. Therefore, the correct command for changing data in a data table is UPDATE.

    Rate this question:

  • 3. 

    In SQL, which of the following is not a data definition language command?

    • A.

      RENAME

    • B.

      REVOKE

    • C.

      GRANT

    • D.

      UPDATE

    • E.

      None of these

    Correct Answer
    D. UPDATE
    Explanation
    UPDATE is a DML Command

    Rate this question:

  • 4. 

    What is the name given to the exchange of control signals which is necessary for establishing a connection between a modem and a computer at one end of a line and another modem and computer at the other end?

    • A.

      Handshaking

    • B.

      Modem

    • C.

      Protocol

    • D.

      All of These

    • E.

      None of these

    Correct Answer
    A. Handshaking
    Explanation
    Handshaking is the name given to the exchange of control signals that is necessary for establishing a connection between a modem and a computer at one end of a line and another modem and computer at the other end. Handshaking involves the exchange of signals to ensure that both devices are ready to communicate and to establish the parameters of the connection, such as data rate and error control. This process is crucial for the successful establishment of a connection between the two devices.

    Rate this question:

  • 5. 

    Which command(s) is (are) used to redefine a column of the table in SQL ?

    • A.

      ALTER TABLE

    • B.

      DEFINE TABLE

    • C.

      MODIFY TABLE

    • D.

      All of these

    • E.

      None of these

    Correct Answer
    A. ALTER TABLE
    Explanation
    The correct answer is ALTER TABLE. The ALTER TABLE command is used in SQL to modify the structure of a table, including redefining columns. This command allows you to add, modify, or delete columns in an existing table. It is a commonly used command when you need to make changes to the structure of your database table.

    Rate this question:

  • 6. 

    In a relational schema, each tuple is divided into fields called

    • A.

      Relations

    • B.

      Domains

    • C.

      Queries

    • D.

      All of the above

    • E.

      None of these

    Correct Answer
    B. Domains
    Explanation
    In a relational schema, each tuple is divided into fields called domains. A domain represents the set of possible values that a particular attribute can have. It defines the data type and constraints for the attribute, ensuring that only valid values are stored in the database. Therefore, the correct answer is "Domains".

    Rate this question:

  • 7. 

    An indexing operation

    • A.

      Sorts a file using a single key

    • B.

      Sorts file using two keys

    • C.

      Establishes an index for a file

    • D.

      Both (A) and (C)

    • E.

      None of these

    Correct Answer
    D. Both (A) and (C)
    Explanation
    The correct answer is "Both (A) and (C)". An indexing operation can refer to two different actions. Firstly, it can sort a file using a single key, which means organizing the file's records in a specific order based on a particular attribute. Secondly, it can establish an index for a file, which involves creating a separate data structure that allows for quicker access to specific records based on the chosen key. Therefore, both sorting a file using a single key and establishing an index for a file are valid explanations for an indexing operation.

    Rate this question:

  • 8. 

    Data security threats include

    • A.

      Hardware failure

    • B.

      Privacy invasion

    • C.

      Fraudulent manipulation of data

    • D.

      All of these

    • E.

      RTL

    Correct Answer
    B. Privacy invasion
    Explanation
    Data security threats include privacy invasion, which refers to unauthorized access or disclosure of sensitive information. This can occur when individuals or organizations gain access to personal data without consent or use it for malicious purposes. Privacy invasion can lead to identity theft, financial fraud, or reputational damage. It is crucial for organizations to implement robust security measures, such as encryption and access controls, to protect against privacy invasion and ensure the confidentiality and integrity of data.

    Rate this question:

  • 9. 

    A ___ means that one record in a particular record type is related to only one record of another record type.

    • A.

      One to one relationship

    • B.

      One to many relationship

    • C.

      Many to one relationship

    • D.

      Many to many relationship

    • E.

      Both (A) and (C)

    Correct Answer
    A. One to one relationship
    Explanation
    A one-to-one relationship means that each record in a particular record type is associated with only one record in another record type. This implies a unique and direct correspondence between the two record types, where each record in one type is linked to a single record in the other type. This type of relationship ensures a one-to-one mapping between the records of the two types, allowing for a specific and individual connection between them.

    Rate this question:

  • 10. 

    A ___ contains the smallest unit of meaningful data, so you might call it the basic building block for a data file.

    • A.

      File structures

    • B.

      Records

    • C.

      Fields

    • D.

      Database

    • E.

      None of These

    Correct Answer
    C. Fields
    Explanation
    Fields contain the smallest unit of meaningful data in a data file. They are the basic building blocks for organizing and storing data. A field represents a single piece of information, such as a name, age, or address, within a record. Records, on the other hand, are collections of fields that are grouped together to represent a complete set of related data. File structures and databases are broader concepts that encompass multiple records and fields. Therefore, the correct answer is Fields.

    Rate this question:

  • 11. 

    Through linked list one can implement

    • A.

      Stack

    • B.

      Graph

    • C.

      Queue

    • D.

      All of the above

    • E.

      None of these

    Correct Answer
    D. All of the above
    Explanation
    A linked list is a data structure that consists of a sequence of nodes, where each node contains a reference to the next node in the sequence. This allows for efficient insertion and deletion operations. By utilizing the concept of linked lists, one can implement various data structures such as a stack, graph, and queue.

    In a stack, elements are added and removed from one end only, making it suitable for implementing a Last-In-First-Out (LIFO) behavior. A linked list can be used to represent the stack efficiently.

    A graph can be represented using linked lists by storing each vertex as a node and connecting them through edges. This allows for efficient traversal and manipulation of the graph.

    A queue follows the First-In-First-Out (FIFO) behavior, where elements are added at one end and removed from the other end. Linked lists can be used to efficiently implement a queue by maintaining references to the first and last nodes.

    Therefore, all of the above options can be implemented using linked lists.

    Rate this question:

  • 12. 

    A heap allows a very efficient implementation of a

    • A.

      Doubled ended queue

    • B.

      Priority queue

    • C.

      Stacks

    • D.

      Trees

    • E.

      None of these

    Correct Answer
    B. Priority queue
    Explanation
    A heap allows a very efficient implementation of a priority queue because it ensures that the element with the highest priority is always at the root of the heap. This allows for quick access to the highest priority element and efficient insertion and deletion operations. A priority queue is a data structure where each element has a priority assigned to it, and elements with higher priority are dequeued first. Therefore, using a heap data structure to implement a priority queue ensures efficient operations and maintains the desired order of elements based on their priority.

    Rate this question:

  • 13. 

    In files, there is a key associated with each record which is used to differentiate among different records. For every file there is at least one set of keys that is unique. Such a Key is called

    • A.

      Unique key

    • B.

      Prime attribute

    • C.

      Index key

    • D.

      Primary Key

    • E.

      Null key

    Correct Answer
    D. Primary Key
    Explanation
    A primary key is a unique identifier for each record in a file. It ensures that each record in the file can be uniquely identified and differentiated from other records. The primary key is used to enforce data integrity and ensure that there are no duplicate or null values in the key field. It is a fundamental concept in database design and is essential for maintaining the integrity and consistency of the data.

    Rate this question:

  • 14. 

    ____ is primarily used for mapping host names and email destinations to IP address but can also be used for other purposes.

    • A.

      TCP(transfer control protocol)

    • B.

      DNS(Domain Name System)

    • C.

      SHA (Secure Hash Algorithm)

    • D.

      Simple Network Management Protocol (SNMP)

    • E.

      None of these

    Correct Answer
    B. DNS(Domain Name System)
    Explanation
    DNS (Domain Name System) is primarily used for mapping host names and email destinations to IP addresses. It serves as a directory that translates human-readable domain names into machine-readable IP addresses. However, DNS can also be used for other purposes, such as mapping other types of network resources or providing additional information about a domain.

    Rate this question:

  • 15. 

    Override is a method

    • A.

      For an operation that replaces an inherited method for the same operation

    • B.

      For a data that replaces an inherited method for the same operation

    • C.

      For an operation that takes arguments form library function

    • D.

      All of these

    • E.

      None of these

    Correct Answer
    A. For an operation that replaces an inherited method for the same operation
    Explanation
    Override is a method that replaces an inherited method for the same operation. This means that when a subclass inherits a method from its superclass, it can override that method by providing its own implementation. This allows the subclass to customize the behavior of the method to suit its own needs. By overriding the inherited method, the subclass can effectively replace the implementation of the method in the superclass.

    Rate this question:

  • 16. 

    Local variables

    • A.

      Are created outside a block

    • B.

      Are known only to that block

    • C.

      Continue to exist when their block ends

    • D.

      Are illegal in C++

    • E.

      None of these

    Correct Answer
    B. Are known only to that block
    Explanation
    Local variables are known only to the block in which they are created. They have a limited scope and are not accessible outside of that block. Once the block ends, the local variables cease to exist. This is a fundamental concept in programming languages like C++ where variables are used to store and manipulate data within a specific context or block of code.

    Rate this question:

  • 17. 

    ____ is virus that inserts itself into a system’s memory. Then it take number of actions when an infected file is executed.

    • A.

      Web scripting virus

    • B.

      Polymorphic virus

    • C.

      Macro virus

    • D.

      Boot sector virus

    • E.

      Resident virus

    Correct Answer
    E. Resident virus
    Explanation
    A resident virus is a type of virus that inserts itself into a system's memory. Once it is in the memory, it can take a number of actions when an infected file is executed. This type of virus remains in the computer's memory even after the initial execution, allowing it to continue its malicious activities. Unlike other types of viruses that may only infect specific files or sectors, a resident virus has the ability to infect multiple files and can be difficult to detect and remove.

    Rate this question:

  • 18. 

    Each node in a linked list must contain at least:

    • A.

      Three fields

    • B.

      Five fields

    • C.

      Four fields

    • D.

      Two Fields

    • E.

      One Field

    Correct Answer
    D. Two Fields
    Explanation
    A linked list is a data structure where each node contains two fields: one for storing the data and another for storing the reference to the next node in the list. These two fields are essential for the linked list to maintain the connectivity between nodes and to store the actual data being stored in the list. Therefore, each node in a linked list must contain at least two fields.

    Rate this question:

  • 19. 

    This ___ data mining technique derives rules from real world case examples.

    • A.

      Waterfall model

    • B.

      RAD

    • C.

      White Box

    • D.

      Spiral model

    • E.

      Case Based Reasoning

    Correct Answer
    E. Case Based Reasoning
    Explanation
    Case Based Reasoning is a data mining technique that derives rules from real-world case examples. It involves solving new problems by finding similar cases from past experiences and using their solutions as a guide. This approach is useful when there is a lack of explicit rules or knowledge about a problem domain, as it relies on the similarity of cases to make decisions. By analyzing and comparing previous cases, Case Based Reasoning can provide valuable insights and solutions for new situations.

    Rate this question:

  • 20. 

    The ___ remains operative until the software is required.

    • A.

      Waterfall model

    • B.

      Incremental Model

    • C.

      Spiral Model

    • D.

      Any Model

    • E.

      Prototyping model

    Correct Answer
    C. Spiral Model
    Explanation
    The Spiral Model remains operative until the software is required. The Spiral Model is an iterative software development process that combines elements of both waterfall and incremental models. It involves a series of iterations, each consisting of planning, risk analysis, development, and evaluation. This model is suitable for projects where risks need to be identified and mitigated early on, and where there is a need for frequent feedback and adaptation. Therefore, the Spiral Model continues to be used throughout the software development process until the final product is required.

    Rate this question:

  • 21. 

    An important application of cryptography, used in computerized commercial and financial transaction

    • A.

      Data mining

    • B.

      Data warehousing

    • C.

      Digital signature

    • D.

      Media convergence

    • E.

      Both (b) and (c)

    Correct Answer
    C. Digital signature
    Explanation
    A digital signature is an important application of cryptography that is used in computerized commercial and financial transactions. It provides a way to verify the authenticity and integrity of digital documents or messages. It uses encryption techniques to create a unique digital signature that can be used to verify the identity of the sender and ensure that the message has not been tampered with during transmission. This is crucial in ensuring the security and trustworthiness of online transactions. Therefore, the correct answer is digital signature.

    Rate this question:

  • 22. 

    Data mining evolve as a mechanism to cater the limitations of ___ systems to deal massive data sets with high dimensionality, new data type, multiple heterogeneous data resource etc.

    • A.

      OLTP

    • B.

      OLAP

    • C.

      DSS

    • D.

      Data Warehouse

    • E.

      None of these

    Correct Answer
    A. OLTP
    Explanation
    Data mining evolved as a mechanism to cater to the limitations of OLTP systems. OLTP systems are designed to handle transactional processing and are not well-suited for dealing with massive data sets with high dimensionality, new data types, and multiple heterogeneous data resources. Data mining, on the other hand, is specifically designed to extract valuable insights and patterns from large and complex datasets, making it a more suitable approach for handling these challenges.

    Rate this question:

  • 23. 

    Rows of a relation are called:

    • A.

      Relation

    • B.

      Tuples

    • C.

      Data structure

    • D.

      An entity

    • E.

      None of these

    Correct Answer
    B. Tuples
    Explanation
    The rows of a relation are called tuples. In a relational database, a tuple represents a single record or row of data. It contains a set of attributes or fields, each of which holds a specific piece of information. Tuples are used to organize and store data in a structured manner, allowing for efficient retrieval and manipulation of information.

    Rate this question:

  • 24. 

    Which of the following is not a connecting device?

    • A.

      Bridge

    • B.

      Trans receiver

    • C.

      Router

    • D.

      Repeater

    • E.

      None of these

    Correct Answer
    B. Trans receiver
    Explanation
    A transceiver is a device that combines both a transmitter and receiver in one unit, allowing for bidirectional communication. It is commonly used in networking to connect devices to a network, making it a connecting device. Therefore, the correct answer is "None of these," as all the other options listed (Bridge, Router, and Repeater) are indeed connecting devices.

    Rate this question:

  • 25. 

    Which layer of OSI determines the interface of the system with the user?

    • A.

      Network

    • B.

      Application

    • C.

      Data link

    • D.

      Session

    • E.

      None of these

    Correct Answer
    B. Application
    Explanation
    The application layer of the OSI model determines the interface of the system with the user. This layer provides services for user applications to access the network and interact with it. It includes protocols such as HTTP, FTP, SMTP, and Telnet, which allow users to access web pages, transfer files, send emails, and establish remote connections. The application layer is responsible for presenting data to the user in a meaningful way and providing a platform for user interaction with the network.

    Rate this question:

  • 26. 

    The tracks on a disk which can be accused without repositioning the R/W heads is

    • A.

      Surface

    • B.

      Cylinder

    • C.

      Cluster

    • D.

      All of these

    • E.

      None of these

    Correct Answer
    B. Cylinder
    Explanation
    A cylinder is a set of tracks on a disk that are at the same distance from the center of the disk. The R/W (Read/Write) heads can move from one track to another within a cylinder without repositioning, as they are all at the same distance. Therefore, the correct answer is "Cylinder."

    Rate this question:

  • 27. 

    A computer system consisting of its processor, memory and I/O devices accepts data, processes it and produces the output results .Can you tell in which component is the raw data fed?

    • A.

      Mass Memory

    • B.

      Main Memory

    • C.

      Logic Unit

    • D.

      Arithmetic unit

    • E.

      None of these

    Correct Answer
    B. Main Memory
    Explanation
    The raw data is fed into the Main Memory component of the computer system. Main Memory, also known as RAM (Random Access Memory), is a volatile storage device that temporarily holds data and instructions that are currently being processed by the processor. It is directly accessible by the processor and is used to store both the input data and the intermediate results during the processing.

    Rate this question:

  • 28. 

    The mechanical diskette drive in which you insert your diskette is connected to the computer’s—bus

    • A.

      Data

    • B.

      Communication

    • C.

      Address

    • D.

      Parallel

    • E.

      None of these

    Correct Answer
    B. Communication
    Explanation
    The mechanical diskette drive is connected to the computer's communication bus. The communication bus is responsible for transferring data between different components of the computer, including the diskette drive. This allows the computer to read and write data to the diskette inserted in the drive.

    Rate this question:

  • 29. 

    A set of programs that handle firm’s database responsibilities is called a

    • A.

      Data base Management System (DBMS)

    • B.

      Data Base Processing System (DBPS)

    • C.

      Data Management System (DMS)

    • D.

      All of these

    • E.

      None of these

    Correct Answer
    D. All of these
    Explanation
    The correct answer is "All of these". This means that a set of programs that handle a firm's database responsibilities can be referred to as a Database Management System (DBMS), a Data Base Processing System (DBPS), or a Data Management System (DMS).

    Rate this question:

  • 30. 

    You are in the process of analyzing a problem that requires you to collect and store TCP/ IP Packets. Which of the following utilities is best suited for this purpose

    • A.

      NBTSTAT

    • B.

      Performance Monitor

    • C.

      NETSTAT

    • D.

      Network Monitor

    • E.

      DHCP Management Console

    Correct Answer
    D. Network Monitor
    Explanation
    Network Monitor is the best utility for collecting and storing TCP/IP packets. NBTSTAT is used for NetBIOS over TCP/IP troubleshooting, Performance Monitor is used for monitoring system performance, NETSTAT is used for displaying active network connections and listening ports, and DHCP Management Console is used for managing DHCP servers. However, Network Monitor is specifically designed for capturing and analyzing network traffic, making it the most suitable utility for this purpose.

    Rate this question:

  • 31. 

    Which of the following is true about GUIs?

    • A.

      They make computers easier to use for nonprofessionals

    • B.

      They use icons and menus that users can select with a mouse

    • C.

      Both (1) and (2)

    • D.

      None of these

    Correct Answer
    C. Both (1) and (2)
    Explanation
    GUIs, or Graphical User Interfaces, are interfaces that use visual elements such as icons and menus to allow users to interact with a computer system. This makes computers easier to use for nonprofessionals, as they can navigate through the system by selecting these visual elements with a mouse. Therefore, both statements (1) and (2) are true about GUIs.

    Rate this question:

  • 32. 

    The process of transferring data intended for a peripheral device into a disk (or intermediate store) so that it can be transferred to peripheral at a more convenient time or in bulk is known as

    • A.

      Multiprogramming

    • B.

      Spooling

    • C.

      Caching

    • D.

      Virtual programming

    • E.

      None of these

    Correct Answer
    B. Spooling
    Explanation
    Spooling is the correct answer because it refers to the process of transferring data intended for a peripheral device, such as a printer, into a disk or intermediate store. This allows the data to be held temporarily until the peripheral device is ready to process it. Spooling helps to improve efficiency by allowing the computer to continue processing other tasks while the peripheral device is busy.

    Rate this question:

  • 33. 

    Decision support system are based on ____ analysis

    • A.

      Query and reporting

    • B.

      Data mining

    • C.

      OLAP

    • D.

      All of these

    • E.

      None of these

    Correct Answer
    D. All of these
    Explanation
    Decision support systems (DSS) are tools that help in making informed decisions by analyzing data. These systems are based on various types of analysis, including query and reporting, data mining, and online analytical processing (OLAP). Query and reporting involve retrieving specific data and generating reports, while data mining focuses on discovering patterns and relationships in large datasets. OLAP enables multidimensional analysis of data, allowing users to drill down and explore data from different perspectives. Therefore, all of these analysis techniques are utilized in decision support systems to provide valuable insights and support decision-making processes.

    Rate this question:

  • 34. 

    From what location are the 1st computer instructions available on boot up ?

    • A.

      ROM BIOS

    • B.

      CPU

    • C.

      Boot.ini

    • D.

      CONFIG.SYS

    • E.

      None of these

    Correct Answer
    A. ROM BIOS
    Explanation
    The 1st computer instructions are available on boot up from ROM BIOS. ROM BIOS stands for Read-Only Memory Basic Input Output System. It is a firmware that is stored in a chip on the motherboard of a computer. During the boot up process, the ROM BIOS initializes the hardware components of the computer and loads the operating system. It contains the initial instructions that are necessary for the computer to start up and perform basic functions.

    Rate this question:

  • 35. 

    In ER diagrams, the term cardinality is a synonym for the term—

    • A.

      Attribute

    • B.

      Degree

    • C.

      Entities

    • D.

      Cartesian

    • E.

      All of these

    Correct Answer
    B. Degree
    Explanation
    In ER diagrams, the term "cardinality" refers to the number of instances of one entity that can be associated with the number of instances of another entity. This is also known as the "degree" of the relationship between entities. Therefore, the correct answer is "Degree".

    Rate this question:

  • 36. 

    Aggregation is a special form of

    • A.

      Generalization

    • B.

      Specialization

    • C.

      Association

    • D.

      Object

    • E.

      None of these

    Correct Answer
    C. Association
    Explanation
    Aggregation is a special form of association in object-oriented programming. It represents a "has-a" relationship between classes, where one class contains a reference to another class as a member variable. Unlike generalization and specialization, which represent "is-a" relationships, aggregation does not involve inheritance. Instead, it emphasizes the concept of composition, where one class is composed of one or more instances of another class.

    Rate this question:

  • 37. 

    An oracle server index—

    • A.

      Is a schema object

    • B.

      Is used to speed up the retrieval of rows by using a pointer

    • C.

      Is independent of the table it indexes

    • D.

      All of these

    • E.

      None of these

    Correct Answer
    D. All of these
    Explanation
    An oracle server index is a schema object that is used to speed up the retrieval of rows by using a pointer. It is also independent of the table it indexes, meaning it can exist separately from the table it is associated with. Therefore, all of these statements are correct.

    Rate this question:

  • 38. 

    Relocation bits used by relocating loader are specifically (generated) by:

    • A.

      Relocating loader itself

    • B.

      Linker

    • C.

      Assembler or translator

    • D.

      Macro processor

    • E.

      None of these

    Correct Answer
    B. Linker
    Explanation
    The relocation bits used by a relocating loader are specifically generated by the linker. The linker is responsible for combining object files and resolving external references, ensuring that the final executable code can be loaded and executed correctly. As part of this process, the linker generates relocation information, which specifies the memory locations that need to be adjusted during the loading process. This allows the relocating loader to modify the object code and adapt it to the actual memory layout of the system, enabling the program to run correctly regardless of its load address.

    Rate this question:

  • 39. 

    Which of the following system program forgoes the production of object code to generate absolute machine code and load it into the physical main storage location from which it will be executed immediately upon completion of the assembly?

    • A.

      Two pass assembler

    • B.

      Load and go assembler

    • C.

      Macro processor

    • D.

      Compiler

    • E.

      None of these

    Correct Answer
    B. Load and go assembler
    Explanation
    A load and go assembler is a system program that forgoes the production of object code and directly generates absolute machine code. It then loads this machine code into the physical main storage location, from which it can be executed immediately after the assembly process is completed. This approach eliminates the need for separate steps of generating and loading object code, making the assembly process more efficient.

    Rate this question:

  • 40. 

    Abstraction is

    • A.

      The act of representing the essential features of something without including much detail.

    • B.

      The act of representing the features of something much detail

    • C.

      A tree structure

    • D.

      All of these

    • E.

      None of these

    Correct Answer
    A. The act of representing the essential features of something without including much detail.
    Explanation
    Abstraction refers to the process of representing the fundamental aspects or characteristics of something while omitting unnecessary details. It involves focusing on the key elements or concepts that are essential for understanding or working with the subject matter at hand. This allows for a simplified and generalized representation that can be easily comprehended and utilized.

    Rate this question:

  • 41. 

    Which of the following is a phase of RAD model?

    • A.

      Business modeling

    • B.

      Data modeling

    • C.

      Application generation

    • D.

      All of the above

    • E.

      None of these

    Correct Answer
    D. All of the above
    Explanation
    The RAD (Rapid Application Development) model is a software development methodology that consists of several phases. Business modeling is one of these phases, which involves understanding and defining the business processes and requirements. Data modeling is another phase, where the data structures and relationships are designed. Application generation is also a phase in RAD, where the actual software application is developed using various tools and techniques. Therefore, all of the above options (Business modeling, Data modeling, and Application generation) are phases of the RAD model.

    Rate this question:

  • 42. 

    Which of the following is not a context free grammar components?

    • A.

      Terminal symbols

    • B.

      Nonterminal symbol

    • C.

      Production line

    • D.

      List

    • E.

      None of these

    Correct Answer
    D. List
    Explanation
    A context-free grammar consists of terminal symbols, nonterminal symbols, and production rules. Terminal symbols represent the basic elements or tokens of the language, while nonterminal symbols represent groups of symbols. Production rules define how symbols can be replaced or rearranged. However, "List" is not a component of a context-free grammar. It is not a commonly used term in the context of grammar components.

    Rate this question:

  • 43. 

    Consider an operation of addition. For two numbers, the operating will generate a sum. If the operand are strings, and the same operation would produce a third string by concatenation. This features is called ____.

    • A.

      Inheritance

    • B.

      Encapsulation

    • C.

      Polymorphism

    • D.

      Binding

    • E.

      All of these

    Correct Answer
    C. Polymorphism
    Explanation
    Polymorphism is the correct answer because it refers to the ability of an operation to behave differently depending on the type of operands. In this case, the operation of addition can produce different results (a sum or a concatenated string) depending on whether the operands are numbers or strings. Polymorphism allows for flexibility and adaptability in programming, as it allows the same operation to be applied to different types of data.

    Rate this question:

  • 44. 

    A combinational logic circuit which is used to send data coming from a single source to two or more separate destinations is called as

    • A.

      Decoder

    • B.

      Encoder

    • C.

      Multiplexer

    • D.

      Demultiplexer

    • E.

      None of these

    Correct Answer
    D. Demultiplexer
    Explanation
    A demultiplexer is a combinational logic circuit that takes input from a single source and sends it to multiple separate destinations. It is the opposite of a multiplexer, which takes multiple inputs and sends them to a single output. In this case, the demultiplexer is the correct answer because it fits the description of a circuit used to send data from a single source to two or more separate destinations.

    Rate this question:

  • 45. 

    Which of the following is a universal gate?

    • A.

      AND

    • B.

      OR

    • C.

      EXOR

    • D.

      NAND

    • E.

      None of these

    Correct Answer
    D. NAND
    Explanation
    A universal gate is a gate that can be used to implement any logic function. The NAND gate is a universal gate because it can be used to implement all other logic gates such as AND, OR, and EXOR. By connecting multiple NAND gates together, any logic function can be realized. Therefore, the NAND gate is considered a universal gate.

    Rate this question:

  • 46. 

    The two’s compliment of binary number 010111.1100 is

    • A.

      101001.1100

    • B.

      101000.0100

    • C.

      010111.0011

    • D.

      101000.0011

    • E.

      None of these

    Correct Answer
    B. 101000.0100
    Explanation
    The two's complement of a binary number is obtained by inverting all the bits and adding 1 to the least significant bit. In this case, the binary number is 010111.1100. Inverting all the bits gives 101000.0011. Adding 1 to the least significant bit gives the final answer of 101000.0100.

    Rate this question:

  • 47. 

    In 8086 the overflow flag is set when

    • A.

      The sum is more than 16 bits

    • B.

      Signed numbers go out their range after an arithmetic operation

    • C.

      Carry and sign flags are set

    • D.

      During subtraction

    • E.

      None of above

    Correct Answer
    B. Signed numbers go out their range after an arithmetic operation
    Explanation
    The correct answer is that the overflow flag is set when signed numbers go out of their range after an arithmetic operation. In the 8086 processor, the overflow flag is used to indicate when the result of a signed arithmetic operation exceeds the range that can be represented with the available number of bits. This can occur when adding or subtracting signed numbers and the result is too large or too small to fit within the designated number of bits. The overflow flag helps to detect and handle these cases appropriately.

    Rate this question:

  • 48. 

    What does microprocessor speed depends on?

    • A.

      Clock

    • B.

      Data bus width

    • C.

      Address bus width

    • D.

      All of these

    • E.

      None of these

    Correct Answer
    C. Address bus width
    Explanation
    The microprocessor speed depends on the address bus width. The address bus is responsible for carrying memory addresses from the microprocessor to the memory modules. A wider address bus allows the microprocessor to access a larger range of memory locations, which can result in faster processing speeds. Therefore, the speed of the microprocessor is directly influenced by the width of the address bus.

    Rate this question:

  • 49. 

    The TRAP is one of the interrupts available its INTEL 8085. Which one statement is true of TRAP?

    • A.

      It is level triggered

    • B.

      It is negative edge triggered It is positive edge triggered

    • C.

      It is positive edge triggered

    • D.

      It is both positive edge triggered and level triggered

    • E.

      None of these

    Correct Answer
    D. It is both positive edge triggered and level triggered
    Explanation
    The TRAP interrupt in the INTEL 8085 is unique in that it can be triggered by both a positive edge and a level. This means that it can be activated either when the signal transitions from low to high (positive edge) or when the signal remains consistently high (level). This flexibility allows for more versatile interrupt handling in the system.

    Rate this question:

  • 50. 

    ____ is a set design steps that allows a DFD with transform flow characteristics to be mapped into a predefined template for program structure.

    • A.

      Transaction flow

    • B.

      Contributor

    • C.

      Transform mapping

    • D.

      Design evaluation

    • E.

      None of these

    Correct Answer
    C. Transform mapping
    Explanation
    Transform mapping is a set of design steps that allows a DFD with transform flow characteristics to be mapped into a predefined template for program structure. This process helps in converting the data flow diagram into an actual program by identifying the modules, functions, and procedures required for the transformation of inputs to outputs. It ensures that the program structure aligns with the flow of data and transforms specified in the DFD.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Feb 04, 2014
    Quiz Created by
    Prashant_kr
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.