Bscacademy.com Sample Papers IT Qeustions 06-02-2015

Embed Size (px)

DESCRIPTION

bsc magazine

Citation preview

  • BSC Academy

    IT Quesetions / 1

    BSC

    Acad

    emyIT Questions1. DOS floppy disk does not have ________1) a boot record 2) a file allocation table 3) a root directory4) virtual memory 5) None of the above

    2. The ________ component is used by the data analyst to create queries that access the database.1) data store 2) query and reporting 3) ETL tools4) data visualisation 5) None of these

    3. The altering of data so that it is not usable unless the changes are undone is ________1) Ergonomics 2) Biometrics 3) Compression 4) Encryption 5) None of these

    4. Which of the following is a general-purpose programming language designed by Sun Microsystems and well suited foruse on the web?1) Java 2) Java Script 3) CSS 4) VBS Script 5) None of these

    5. ________ are used to identify a user who returns to a website.1) ASPs 2) Scripts 3) Cookies 4) Plug-ins 5) None of These

    6. Programs that automatically submit your search request to several search engines simultaneously are called ________1) Hits 2) Webcrawlers 3) Spiders 4) Metasearch engines 5) None of these

    7. If you wanted to locate the hardware address of a local device, which protocol would you use?1) PING 2) ICMP 3) ARP 4) RARP 5) PONG

    8. In Oracle, which is more appropriate to store a small list of values in a single column in each row in your address table?1) Index 2) Nested table 3) Oracarray 4) Varray 5) Index

    9. OLAP applications are widely used by ________ and it uses ________ scheme.1) RDBMS, Bus 2) Java, Bus3) Operating System, Star 4) Data mining techniques, star or multidimensional5) None of these

    10. ODBC is based on ________1) C++ language 2) RDBMS 3) Structured Query Language4) .net language 5) C language

    11. To discard all pending data changes use the ________ command.1) LOCK 2) SAVEPOINT 3) ROLLBACK 4) COMMIT 5) None of these

    12. Round robin scheduling is essentially the preemptive version of ________1) Shortest job first 2) Shortest remaining 3) Longest time first4) FIFO 5) None of these

    13. The mechanism by which the data and functions are bound together within an object definition is called ________1) Abstraction 2) Polymorphism 3) Inheritance 4) Encaspsulation 5) None of these

    14. The TRAP is one of the interrupts available in INTEL 8085.Which of the following statements is true of TRAP?1) It is negative edge-triggered. 2) It is positive edge-triggered.3) It is both edge-triggered and level-triggered. 4) It is level-triggered.5) None of these

    15. The ________ data mining technique derives rules from real-world case examples.1) Waterfall Model 2) Spiral Model 3) Prototyping Model 4) Incremental Model 5) None of these

    16. An oracle server index1) Is a schema object2) Is used to speed up the retrieval of rows by using a pointer3) Is independent of the table it indexes4) All of these5) None of these

  • BSC Academy

    2 / IT Quesetions

    BSC

    Acad

    emy17. Which of the following is not a context-free grammar component?1) Terminal symbols 2) Non-terminal symbol 3) Productions4) List 5) None of these18. Which of the following is a phase(s) of RAD (Rapid Application Development) model?1) Business modelling 2) Data modelling 3) Application generation4) All of these 5) None of these

    19. ________ allows a DFD (Data Flow Diagram) with transform flow characteristics to be mapped into a predefinedtemplate for program structure.1) Transaction flow 2) Contributor 3) Transform mapping 4) Design evaluation 5) None of these

    20. A combinational logic circuit which is used to send data coming from a single source to two or more separate destinationsis called1) Decoder 2) Encoder 3) Multiplexer 4) Demultiplexer 5) None of these

    21. Which of the following is a Universal Gate?1) AND 2) OR 3) EX OR 4) NAND 5) None of these

    22. Twos complement of binary number 010111.1100 is1) 101001.1100 2) 101000.0100 3) 010111.0011 4) 101000.0011 5) None of these

    23. In 8086, the overflow flag is set when1) The sum is more than 16 bits2) Signed numbers go out of their range after an arithmetic operation3) Carry and sign flags are set4) During subtraction5) None of these

    24. What does microprocessor speed depend on?1) Clock 2) Data bus width 3) Address bus width 4) All of these 5) None of these

    25. RSA algorithm1) supports encryption and digital signature 2) supports source authentication3) encrypts the checksum 4) All the above5) None of these

    26. A special type gateway that can keep external users from accessing resources on the LAN users access the external infois called1) Repeater 2) Firewall 3) Encryption 4) Hub 5) None of these

    27. What is the name given to the exchange of control signals which is necessary for establishing a connection between amodem and a computer at one end of a line and another modem and computer at the other end?1) Handshaking 2) Modem Options 3) Protocol 4) All of these 5) None of these

    28. In SQL, which command is used to change data in a data table?1) UPDATE 2) INSERT 3) BROWSE 4) APPEND 5) None of these

    29. In SQL, which of the following is not a data definition language command?1) RENAME 2) REVOKE 3) GRANT 4) UPDATE 5) None of these

    30. Which command(s) is (are) used to redefine a column of the table in SQL ?1) ALTER TABLE 2) DEFINE TABLE 3) MODIFY TABLE 4) All of these 5) None of these

    31. In a relational schema, each tuple is divided into fields called1) Relations 2) Domains 3) Queries 4) All of the these 5) None of these

    32. An indexing operation1) Sorts a file using a single key 2) Sorts a file using two keys 3) Establishes an index for a file4) Both 1 and 3 5) None of these

    33. Data security threats include1) Hardware failure 2) Privacy invasion 3) Fraudulent manipulation of data4) All of these 5) None of these

  • BSC Academy

    IT Quesetions / 3

    BSC

    Acad

    emy34. The language used in application programs to request data from the DBMS is referred to as the1) DML 2) DDL 3) Query Language 4) DCL 5) None of these35. A________ contains the smallest unit of meaningful data, so you might call it the basic building block for a data file.1) File Structures 2) Records 3) Fields 4) Data base 5) None of these36. A ________ means that one record in a particular record type is related to only one record of another record type.1) One-to-one relationship 2) One-to-many relationship 3) Many-to-one relationship

    4) Many-to-many relationship 5) None of these37. Through linked list one can implement

    1) Stack 2) Graph 3) Queue 4) All of these 5) None of these38. A heap allows a very efficient implementation of a

    1) Double-ended queue 2) Priority queue 3) Stack4) Trees 5) None of these

    39. Most database management systems allow you to have more than one key so that you can sort records in different ways.One of the keys is designated the ________ and must hold a unique value for each record.1) Unique Key 2) Prime attribute 3) Index key 4) Primary Key 5) Null key

    40. ________ is primarily used for mapping host names and email destinations to IP address but can also be used for otherpurposes1) TCP (Transfer Control Protocol) 2) DNS (Domain Name System)3) SHA (Secure Hash Algorithm) 4) Simple Network Management Protocol (SNMP)5) None of these

    41. Override is a method1) For an operation that replaces an inherited method for the same operation2) For a data that replaces an inherited method for the same operation3) For an operation that takes arguments from library function4) All of these5) None of these

    42. Local variables1) Are created outside a block 2) Are known only to that block3) Continue to exist when their block ends 4) Are illegal in C++5) None of these

    43. ________ is a virus that inserts itself into a systems memory. Then it takes a number of actions when aninfected file is executed.1) Web scripting virus 2) Polymorphic Virus 3) Macro virus4) Boot sector virus 5) Resident virus

    44. Which of the following TCP/IP protocol is used for remote terminal connection service?1) Telnet 2) RARP 3) FTP 4) All the above 5) None of these

    45. The ________ model remains operative until the software is retired.1) Waterfall model 2) Incremental model 3) Spiral model 4) Prototyping model 5) Incremental model

    46. Data mining evolved as a mechanism to cater to the limitations of ________ systems to deal massive data sets with highdimensionality, new data type, multiple heterogeneous data resource etc.1) OLTP 2) OLAP 3) DSS 4) DWH 5) None of these

    47. An important application of cryptography used in computerized commercial and financial transactions:1) Data mining 2) Data warehousing 3) Digital signature 4) Media convergence 5) None of these

    48. Rows of a relation are called1) Relation 2) Tuples 3) Data structure 4) An entity 5) None of these

    49. The drawbacks of the binary tree sort are remedied by the1) Linear sort 2) Quick sort 3) Heap Sort 4) Insertion sort 5) None of these

  • BSC Academy

    4 / IT Quesetions

    BSC

    Acad

    emy50. Which layer of OSI determines the interface of the system with the user?1) Network 2) Application 3) Data link 4) Session 5) None of these51. Information is 1) Data 2) Processed data 3) Manipulated input 4) Computer output 5) All of These 52. Data by itself is not useful unless 1) It is massive 2) It is processed to obtain information

    3) It is collected from diverse sources 4) It is properly stated 5) None of These

    53. For taking decisions data must be 1) Very accurate 2) Massive 3) Processed correctly 4) Collected from diverse sources 5) All of These

    54. Strategic information is needed for 1) Day-to-day operations 2) Meeting government requirements 3) Long-range planning 4) Short-range planning 5) Only 2 and 3

    55. Strategic information is required by1) Middle managers 2) Line managers 3) Top managers 4) All workers 5) Only 1 and 2

    56. A ROLLBACK command in a transaction1) Makes sure that all changes to the database are in effect.2) Undoes all changes to the database resulting from the execution of the transaction3) Does nothing4) Undoes the effects of the last UPDATE command5) Restores the current of the database to its state at the end of the previous day

    57. ________ refers to the contracting of a specific business task to a third party service provider.1) Insourcing 2) Outsourcing 3) Offshore Outsourcing4) Cross-Functioning 5) Business Process Outsourcing

    58. Operational information is needed for 1) Day-to-day operations 2) Meeting government requirements 3) Long-range planning 4) Short-range planning 5) All of these

    59. In motorcar manufacturing the following type of information is strategic:1) Decision on introducing a new model 2) Scheduling production 3) Assessing competitor car 4) Computing sales tax collected 5) Only 1 and 2

    60. A computer-based information system is needed because (A) The size of organisations has become large and data is massive (B) Timely decisions are to be taken based on available data (C) Computers are available (D) It is difficult to get clerks to process data 1) Only A and C 2) Only A and B 3) Only A and D 4) Only C and D 5) Only B and D

    61. Volume of strategic information is 1) Condensed 2) Detailed 3) Summarised 4) Irrelevant 5) Only 1 and 2

    62. Operational information is 1) Haphazard 2) Well organized 3) Unstructured 4) Partly structured 5) Only 1 and 2

    63. The quality of information which does not hide any unpleasant information is known as 1) Complete 2) Trustworthy 3) Relevant 4) None of the above 5) All of the above

    64. Every record stored in a Master file has a key field because 1) it is the most important field 2) it acts as a unique identification of record3) it is the key to the database 4) it is a very concise field5) None of These

  • BSC Academy

    IT Quesetions / 5

    BSC

    Acad

    emy65. The primary storage medium for storing archival data is 1) floppy disk 2) magnetic disk 3) magnetic tape 4) CD- ROM 5) None Of These66. Edit program is required to 1) authenticate data entered by an operator 2) format correctly input data 3) detect errors in input data 4) expedite retrieving input data5) All of the above

    67. Data rejected by edit program are 1) corrected and re-entered 2) removed from processing 3) collected for later use 4) ignored during processing 5) Only 1 and 3

    68. Online transaction processing is used because 1) it is efficient 2) disk is used for storing files 3) it can handle random queries4) transactions occur in batches 5) None of the above

    69. Off-line data entry is preferable when (A) data should be entered without error (B) the volume of data to be entered is large (C) the volume of data to be entered is small (D) data is to be processed periodically1) Only A and B 2) Only B and C 3) Only B and D 4) Only C and D 5) Only A and D

    70. Batch processing is used when (A) response time should be short (B) data processing is to be carried out at periodic intervals (C) transactions are in batches (D) transactions do not occur periodically 1) Only A and B 2) Only A, C and D 3) Only B and C 4) Only A, B and C 5) Only A and D

    71. A management information system is one which 1) is required by all managers of an organisation 2) processes data to yield information of value in tactical management 3) provides operational information 4) allows better management of organisations 5) Only 1 and 2

    72. Data mining is used to aid in 1) operational management 2) analysing past decision made by managers 3) detecting patterns in operational data 4) retrieving archival data5) Only 2 and 3

    73. Data mining requires 1) large quantities of operational data stored over a period of time 2) lots of tactical data 3) several tape drives to store archival data 4) large mainframe computers 5) All of these

    74. Data mining cannot be done if 1) operational data has not been archived 2) earlier management decisions are not available 3) the organization is large 4) all processing had been only batch processing5) All the above

    75. Decision support systems are essential for 1) Day-to-day operations of an organisation 2) Providing statutory information 3) Top-level strategic decision making 4) Ensuring that organisations are profitable5) Only 3 and 4

  • BSC Academy

    6 / IT Quesetions

    BSC

    Acad

    emy76. Which of the following IEEE standards deal(s) with LAN and MAN (metropolitan area network)?1) 801 2) 803 3) 802 4) 800 5) Only 1 and 277. Firewalls protect against1) unauthorised attacks 2) fire attacks 3) virus attacks 4) data-driven attacks 5) Only 1 and 278. Which of the following is not related to computer?

    1) mouse 2) screen 3) bit 4) pen 5) Only 1 and 279. During cutting and pasting, the item cut is temporarily stored in

    1) Hard drive 2) Clipboard 3) ROM 4) Diskette 5) Only 1 and 280. Two binary digits can be added using the logical circuit

    1) Half adder 2) Full adder 3) Serial adder 4) Parallel adder 5) None of the Above81. Full form of BIOS:

    1) Better input output services 2) basic inner outer services 3) basic input output services4) basic input/output system 5) None of The Above

    82. The device that connects inputs to outputs:1) RAM 2) crossbar 3) crossword 4) modem 5) Only 1 and 2

    83. Data entered into the computer is called1) Input 2) Algorithm 3) Flowchart 4) Output 5) All of These

    84. The process of connecting to the internet account is called1) SIGN IN 2) LOG IN 3) LOG OUT 4) SIGN OUT 5) None of the above

    85. How many values can be represented by a single byte?1) 4 2) 16 3) 64 4) 256 5) None of the above

    86. Most data communications involving telegraph lines use1) simplex lines 2) wideband channel 3) narrowband channel 4) dialled service 5) None of these

    87. Which scheme is used for mapping host names and email destinations to IP addresses?1) DNS 2) TCP/IP 3) TELENET 4) RARP 5) None of These

    88. Broad band ISDN consists of1) Physical layer 2) Asynchronous Transfer Mode (ATM) layer3) ATM adaptation layer 4) Only 1 and 25) All of the above

    89. The ________ component is not present in every router.1) POST 2) DRAM 3) Mini-IOS 4) Bootstrap 5) None of these

    90. The linker produces a ________ which contains binary codes for all compound modules.1) Bit file 2) Load file 3) Link file 4) Object Program 5) None of These

    91. In C++ we can use the same function name to create functions that perform a variety of different tasks.This is knownas1) Inheritance 2) Global function 3) Function overloading4) Only 1 and 2 5) All of the above

    92. Which of the following is the easiest software development process model?1) Prototyping 2) Waterfall model 3) Spiral model4) Interactive enhancement 5) None of the above

    93. C++ was developed by1) Bjarne Stroustrup 2) Dennis Ritchie 3) Tannenbaum 4) Milan Melkovinec 5) None of These

    94. If the disk head is located initially at 32, find the number of disk moves required with FCFS if the disk queue of I/O blocksrequests are 98, 37, 14, 124, 65, 67.1) 324 2) 321 3) 310 4) 315 5) 320

  • BSC Academy

    IT Quesetions / 7

    BSC

    Acad

    emy95. The action of parsing the source program into proper syntactic classes is known as1) Lexical analysis 2) Syntax Analysis 3) General Syntax Analysis4) Interpretation Analysis 5) None of the above96. Resolution of externally defined symbols is performed by1) Loader 2) Linker 3) Compiler 4) Assembler 5) None of These97. Which language is best used for real time system?

    1) Java 2) C 3) Assembly 4) C++ 5) None of these98. In the UNIX systems the user can change the access rights of the file to different users by using

    1) Tail 2) PID 3) Chmod 4) Head 5) None of These99. Which of the following Unix commands is used to create empty files?

    1) Vi 2) Cat 3) Touch 4) Pico 5) None of these100. Both Go-Back-N and Selective-Repeat Protocols use a

    1) sliding frame 2) sliding window 3) sliding data 4) sliding packet 5) None of these101. Which of the memories has the shortest access time?

    1) Cache Memory 2) RAM 3) Magnetic Bubble Memory4) Magnetic Core Memory 5) All the above have equal access time.

    102. The IEEE 802.6 standard describes a ________ standard called Distributed Queue Dual Bus (DQDB).1) WAN 2) MAN 3) LAN 4) Internet 5) None of the above

    103. The list with no nodes on it is called1) Null List 2) Empty List 3) Blank List 4) Both 1 and 2 5) None of the above

    104. ________ uses thin coaxial cable.1) 10Base2 2) 10Base5 3) 10Base-T 4) 10Base-F 5) None of these

    105. The input of Lex is1) Statement 2) Numeric Data 3) Set of regular expressions4) ASCII Code 5) None of these

    106. Which of the following is not a logical database structure?1) Relational 2) Network 3) Chain 4) Tree 5) None Of These

    107. CIDR (Classless Inter Domain Routing) is most often used in1) class C Networks 2) class A Networks 3) class B Networks 4) Only 1 and 2 5) None of the above

    108. Which of the following operators in C does not associate from the right?1) , 2) = 3) + 4) ++ 5) None of the above

    109. Which language has recently become the de facto standard for interfacing application programs with relational databasesystem?1) SQL 2) Oracle 3) 4 GL 4) Database 5) None of the above

    110. Sockets are used in1) Data link Layer 2) Physical Layer 3) Transport Layer 4) Network Layer 5) None of the above

    111. Lexical Analyzer transforms an input stream into1) Regular expression 2) Binary 3) Symbols 4) Sequence of tokens 5) None of these

    112. In which manner should we traverse a binary search tree so that elements are visited in ascending order?1) Preorder 2) Inorder 3) Postorder 4) Graph 5) None of These

    113. 253.45.67.9 is a class ________ address.1) D 2) A 3) E 4) C 5) None of These

    114. Semantic errors can be detected1) At compile time only 2) Both at compile time and at run time3) At run time only 4) All of the above5) None of these

  • BSC Academy

    8 / IT Quesetions

    BSC

    Acad

    emy115. Which of the following communication modes supports two-way traffic but in only one direction at a time?1) Duplex 2) Simplex 3) Three- Quarters Duplex4) Half-Duplex 5) All of the above116. In a PC-to-telephone hookup for long-distance communication, modem is connected between the telephone line and1) Synchronous Port 2) PC 3) Cross-Over Cable4) Asynchronous Port 5) None of These

    117. In compilers, syntax analysis is done by1) Scanner 2) Parser 3) Code generator 4) Lexical analyser 5) None of these

    118. RAD (Rapid Application Development) is not appropriate when1) Technical risks are high 2) Findings are already done 3) Testing is not needed4) Only 1 and 2 5) None of These

    119. In queues, the items are deleted at one end called1) Front 2) Top 3) Base 4) Rear 5) None of These

    120. If a memory page containing a heavily used variable that was initialised very early and is in constant use is removed, thenthe page replacement algorithm used is1) FIFO 2) LFU 3) LRU 4) All of These 5) None of These

    121. When you connect to an online information service you are asked to provide some kind of identification such as yourname, an account number and a password. What is the name given to this brief dialogue between you and informationsystem?1) Security Procedure 2) Log-on Procedure 3) Safeguard Procedure4) Identification Procedure 5) None of These

    122. Which of these determines authorised sign in an EDI (Electronic Data Interchange) transaction?1) Masking 2) Spoofing 3) Digital Signature4) Privacy Key Cryptosystems 5) None of these

    123. C is a ________- generation language.1) 3rd 2) 4th 3) 5th 4) 2nd 5) None of These

    124. Which of the following usually creates bad sector on hard disk?1) Trojan 2) Worm 3) Stealth Virus 4) All of these 5) None of these

    125. When an organisation gives contract for development of software, it has to give data to the service provider. In suchcases, the ownership of data should be1) Shared by both parties 2) Transferred to the service provider3) With the client organisation that outsources service 4) Not transferred5) None of These

    126. ________ cant be used for source of data automation.1) OCR 2) UPC 3) POS Terminal 4) Keyboard 5) None of these

    127. Switched mode power supply1) Converts DC to AC2) Converts raw input power to controlled voltage and current3) Enhances output of a circuit4) Switches to and fro between high and low power fluctuations5) None of these

    128. Which of the following is false about OS?1) Acts as command processor 2) Acts as compiler 3) Acts as manager4) All are true 5) None of these

    129. Which of the following is incorrect?1) LAN is faster than MAN. 2) Servers are powerful PCs.3) Clients can store information. 4) Peer-to-peer networks have high security.5) None of these

  • BSC Academy

    IT Quesetions / 9

    BSC

    Acad

    emy130. Which segment identifies the kind of business documents in an EDI transmission?1) ISA 2) GS 3) ST 4) SE 5) All of these131. Disk Scanners are1) Anti-virus protection systems 2) 8086s supplementary IC 3) Aftereffects of virus4) All of these 5) None of the above132. Array is a set of ________ objects.

    1) Different types of 2) Unique 3) Unwanted 4) Same type of 5) None of These133. The operating system is also

    1) Control System 2) Special System 3) Administrator Division4) Boot Sector 5) None of These

    134. Which of the following identification techniques provides the best means of user authentication?1) What the user knows 2) What the user is3) What the user has 4) What is user has and what the user knows5) None of These

    135. The earliest approach that was used for software development was1) Incremental development model 2) Waterfall model 3) Spiral development model4) Rapid prototyping model 5) None of These

    136. To make a program safe we should take care of1) Strong authentication and access controls 2) Doing risk analysis3) Error-checking controls 4) All of these5) None of these

    137. If the network of the company is to be protected from remote access that may damage companys reputation due tomisuse of information, then security policy should include1) Only the employer 2) All the employees 3) Contractors4) All the above 5) None of these

    138. TCP/IP protocol stack is1) A family of protocols that connect to PCs 2) Part of Internet3) A combination of TCP and IP protocols 4) Only 1 and 25) All of these

    139. What is a non-dedicated server?1) A workstation that can double up as a server 2) A computer reserved for a special task3) A computer reserved for special task 4) Only 1 and 25) None of the above

    140. The process of organising the memory into two banks to allow 8- and 16-bit data operation is called?1) Indexed mapping 2) Bank switching 3) Two-way memory interleaving4) Memory segmentation 5) None of these

    141. Which of the following is a layer of object-oriented design pyramid?1) Message Layer 2) Subsystem layer 3) Class and Object Layer4) All of the above 5) None of the above

    142. The OSPF was created to overcome the drawbacks that ________ faced.1) VLSM 2) IGRP 3) EIRP 4) RIP 5) None of These

    143. FDDI is1) Star Network 2) Mesh Network 3) Ring Network4) Bus-Based Network 5) All of the above

    144. Fragment Free Switches check ________ bytes of data.1) 64 2) 24 3) 16 4) 4 5) 9

  • BSC Academy

    10 / IT Quesetions

    BSC

    Acad

    emy145. The main advantages of CMOS as compared to TTL:1) Lower power consumption with low fan-out 2) Lower power consumption and better noise margins3) Higher speed operation with low power consumption 4) Higher power consumption with high fan-out5) None of these146. RISC processor has1) All operations done within the register and CPU 2) Relatively few instructions and addressing modes3) Single-cycle instruction execution 4) Only 1 and 2

    5) All of these147. A loading scheme in which loading and linking of external references are postponed until execution time:

    1) Dynamic loading 2) Direct linking loader 3) Relocating loader4) Dynamic linking 5) None of These

    148. Backtracking problem is seen in1) LR Parser 2) Predictive Parser 3) Recursive Descent Parser4) None of these 5) All of the above

    149. Which of the following filename extension suggests that the file is a backup copy of another file?1) BAK 2) TXT 3) BAS 4) COM 5) None of These

    150. Connected graphs without circuits is called a1) Hamiltonian graph 2) Euler graph 3) Path4) Tree 5) All of these are types of graph

    151. What replacement policy is used by Windows NT?1) LRU 2) NFU 3) FIFO 4) Clock replacement 5) None of the above

    152. The graph K (3, 4), a complete bipartite graph, has1) 4 edges 2) 8 edges 3) 10 edges 4) 12 edges 5) 3 edges

    153. The database schema is written in1) DML 2) HLL 3) DDL 4) DCL 5) None of these

    154. What is the average waiting time (in minutes) in FCFS of a given process p1, p2, p3, p4 if the execution time are 5, 10, 8,3 minutes and turnaround time are 5, 15, 23, 26 minutes?1) 10 2) 10.75 3) 12.75 4) 12 5) 13

    155. In an architecture of a database system external level is the1) logical level 2) physical level 3) conceptual level 4) view level 5) None of these

    156. In a circular linked list1) Components are all linked together in some sequential manner2) There is no beginning and no end3) Components are arranged hierarchically4) Forward and backward transversal within the list is permitted5) None of these

    157. The statement in SQL which allows to change the definition of a table is1) Alter 2) Create 3) Update 4) Select 5) None of these

    158. A technique for direct searching is1) binary search 2) hashing 3) tree search 4) linear Search 5) None of these

    159. Maximum number of nodes in B-tree at depth h and order t (root of depth 0) is given by1) t(h + 1) 2) 2t(h 1) 3) t(h 1) 4) 2t(h + 1) 5) None of these

    160. Which of the following can be a sequence of nodes examined in a binary search tree while searching for key 98?1) 100, 50, 75, 60, 98 2) 100, 120, 90, 95, 98 3) 200, 70, 100, 95, 984) 75, 150, 90, 80, 98 5) None of these

    161. What protocol is used between e-mail servers?1) SMTP 2) FTP 3) SNMP 4) TCP 5) None of these

  • BSC Academy

    IT Quesetions / 11

    BSC

    Acad

    emy162. The way a card game player arranges his cards as he picks them up one by one, is an example of1) Selection Sort 2) Bubble Sort 3) Insertion sort 4) Merge sort 5) None of these163. Which phase is not available in software life cycle?1) Design 2) Testing 3) Coding 4) Abstraction 5) Maintenance164. Which type of error detection uses binary division?1) Parity check 2) Longitudinal Redundancy checking (LRC)

    3) Checksum Checking 4) Cyclic Redundancy Checking (CRC)5) None of these

    165. Basis path testing is1) Both black and white box testing method 2) White box testing method3) Unique testing method 4) Black box testing method5) None of these

    166. If you want to tell the database management system that a specific attribute contained numbers only, what will you needto set?1) Data type 2) Data category 3) Data dictionary 4) Data definition 5) Data Integrity

    167. When you link one database table to another database table, what are you creating?1) Connectivity 2) Primary Link 3) Relationships 4) Referential integrity 5) Foreign key

    168. The process known as ________ is used by large retailers to study trends.1) POS 2) Data selection 3) Data mining 4) Data conversion 5) None of these

    169. Accessing records from a file directly without searching from the beginning of the file is called1) Time sharing 2) Random 3) Direct access 4) Access time 5) None of these

    170. Bankers algorithm for resource allocation deals with1) deadlock preventation 2) deadlock avoidance 3) deadlock recovery4) mutual exclusion 5) None of these

    171. Which of the following performs modulation and demodulation?1) Modem 2) Satellite 3) Coaxial Cable 4) Optical fiber 5) Router

    172. In TCP/IP protocol, checksum field contains ________-bit value which is used for ________.1) 32, deadlock avoidance 2) 48, error detection 3) 16, error detection4) 16, deadlock avoidance 5) None of these

    173. Granting an outside organisation access to Internet web pages is often implemented using a(n)1) Extranet 2) Intranet 3) Internet 4) Hacker 5) None of these

    174. What is the advantage of packet switching over message switching?1) The first packet of multipacket message can be forwarded before the second one has fully arrived.2) reduces delay and improves throughput3) advance setup not required4) All the above5) None of these

    175. The third-generation computers were based on1) transistors 2) valves 3) ICs 4) vacuum tubes 5) None of these

    176. Generalisation is a ________ process.1) top-down 2) bottom-up 3) Both 1 and 2 4) vertical 5) None of these

    177. Spooling is most beneficial in a multiprogramming environment where1) most jobs are I/O-bound2) most jobs are CPU-bound3) jobs are evenly divided as I/O-bound and CPU-bound4) there is limited primary memory and there is a need for secondary memory5) None of these

  • BSC Academy

    12 / IT Quesetions

    BSC

    Acad

    emy178. A flip-flop can store1) Two bits of data 2) One bit of data 3) Three bits of data4) Any number of bits of data 5) All the above179. ________ command lists directory content of files and directories.1) cat 2) cp 3) ls 4) mkdir 5) None of these180. Which of the following is true about the data warehouse environment architecture?

    1) It contains a data warehouse methodology, analysis design, construction and administration.2) It increases processing power and sophistication of analytical tools and techniques that have resulted in the

    development of data warehouses.3) It provides storage, functionality, and responsiveness to queries beyond the capabilities of transaction-oriented

    databases.4) All the above5) None of these

    181. Altering of data so that it is not usable unless the changes are undone is called1) Encryption 2) Compression 3) Biometrics 4) Ergonomics 5) None of these

    182. A ________ main purpose is to prohibit unauthorised access to your computer via the Internet.1) popup blockers 2) firewalls 3) spyware blockers4) spam assassins 5) None of these

    183. When one computer provides services to another computer, the environment is a(n) ________ infrastructure.1) client/server 2) dependent 3) independent 4) reliant 5) None of these

    184. Object oriented programming relies on three basic concepts. These are1) data abstraction, inheritance and array 2) data abstraction, inheritance and polymorphism3) encapsulation, inheritance and polymorphism 4) inheritance, I/O, class5) None of these

    185. A ________ can check the MAC addresses contained in the frame.1) bridge 2) repeater 3) passive hub 4) router 5) All the above

    186. Each station on an Ethernet network has a unique ________ address imprinted on its network interface card (NIC).1) 5-byte 2) 32-bit 3) 64-bit 4) 48-bit 5) None of these

    187. Decryption and encryption of data are the responsibilities of the ________ layer.1) Physical 2) Data link 3) Presentation 4) Session 5) Application

    188. The communication mode that supports data in both the directions at the same time is called1) Half duplex 2) Simplex 3) Full duplex 4) Multiplex 5) None of these

    189. The functions AVG, COUNT, MAX and MIN are1) supported only by SQL 2) supported only by QBE 3) supported by both SQL and QBE4) supported by ORACLE 5) supported by none

    190. Multivalued dependency among attributes is checked at which level?1) 2NF 2) 3NF 3) 4NF 4) 5NF 5) None of these

    191. A full binary tree with n leaves contains1) 2n nodes 2) log2n nodes 3) 2n 1 nodes 4) n nodes 5) None of these

    192. The postfix form of an expression (A+B)*(C*D-E)*F/G is1) AB+CD*E-FG/** 2) AB+CD*E-F**G/ 3) AB+CD*E-*F*G/4) AB+CDE*-*F*G/ 5) None of these

    193. Slotted ALOHA1) Divides time into discrete intervals 2) Requires global time synchronisation3) Is used for data transfer 4) All the above5) None of these

  • BSC Academy

    IT Quesetions / 13

    BSC

    Acad

    emy194. What type of technology allows you to use your finger, eye, or voice print to secure your information resources?1) RFID 2) Caves 3) Biometrics 4) Haptics 5) None of these195. A ________ can be used as a connecting device between two internetworks that use different models.1) repeater 2) router 3) bridge 4) gateway 5) hub196. IP address has been classified into five classes A, B, C, D and E. What is address range of class B?1) 0.0.0.0 to 126.255.255.255 2) 128.1.0.1 to 191.255.255.255 3) 244.0.0.0 to 239.255.255.255

    4) 192.0.1.1 to 223.255.255.255 5) None of these197. Relation in the relational database model is defined as the set of ________ that have the same attributes.

    1) objects 2) relations 3) tuples 4) attributes 5) None of these198. Ifalphaisasetofattributesandbetaisasubsetofalpha,thenalphaholdsbeta.InArmstrongsAxioms,thisisknown

    as1) augmentation rule 2) reflexivity rule 3) transitivity rule 4) passivity rule 5) None of these

    199. In an E-R diagram, total participation is represented by1) circle 2) single line 3) double lines 4) concentric circles 5) None of these

    200. If a key attribute of a relation is referred in another relation, it is called1) domain key 2) referential key 3) relation key 4) foreign key 5) None of these

    Answers

    1. 4 2. 2 3. 4 4. 1 5. 36. 4

    7. 3; Address Resolution Protocol8. 4 9. 4 10. 3

    11. 3 12. 4 13. 4 14. 3 15. 216. 3 17. 4 18. 4 19. 3 20. 421. 4 22. 2 23. 2 24. 2 25. 426. 2 27. 1 28. 1 29. 4 30. 131. 2 32. 3 33. 2 34. 1 35. 336. 1 37. 4 38. 2 39. 4 40. 241. 1 42. 2 43. 5 44. 1 45. 346. 1 47. 3 48. 2 49. 3 50. 251. 2 52. 2 53. 3 54. 3 55. 356. 2 57. 5 58. 1 59. 1 60. 261. 1 62. 2 63. 2 64. 2 65. 366. 3 67. 1 68. 3 69. 3 70. 371. 2 72. 3 73. 1 74. 1 75. 376. 3 77. 1 78. 4 79. 2 80. 181. 4 82. 2 83. 1 84. 2 85. 486. 3 87. 1 88. 5 89. 2 90. 391. 3 92. 2 93. 1 94. 2 95. 196. 2 97. 1 98. 3 99. 3 100. 2

    101. 1 102. 2 103. 4 104. 1 105. 3

    106. 3 107. 1 108. 1 109. 1110. 5; Session Layer111. 4 112. 2 113. 3 114. 1 115. 4116. 4 117. 2 118. 1 119. 1 120. 1121. 2 122. 3 123. 1 124. 5 125. 3126. 4 127. 2 128. 2 129. 4 130. 2131. 1 132. 4 133. 3 134. 2 135. 2136. 1 137. 4 138. 1 139. 1 140. 3141. 4142. 4; Routing Information protocol143. 3 144. 1 145. 2146. 5 147. 4 148. 3 149. 1 150. 4151. 3 152. 4 153. 1 154. 4 155. 2156. 2 157. 3 158. 2 159. 3 160. 5161. 1 162. 3 163. 4 164. 4 165. 2166. 1 167. 1 168. 3 169. 3 170. 4171. 1 172. 3 173. 1 174. 2 175. 3176. 2 177. 3 178. 2 179. 3 180. 4181. 1 182. 2 183. 1 184. 3 185. 1186. 4 187. 3 188. 3 189. 3 190. 2191. 3 192. 4 193. 4 194. 3 195. 4196. 2 197. 3 198. 2 199. 3 200. 4