Académique Documents
Professionnel Documents
Culture Documents
Q2. In OSI Model which layer is responsible for Encryption & Decryption of data?
(a) Physical
(b) Data Link
(c) Presentation
(d) Session
(e) Application
Q4. Which of the following is a single communication channel that is shared by all the users on the
network?
(a) Point-to-Point
(b) Broadcast Network
(c) Protocol
(d) PAN
(e) None of these
Q5. Which type of network consists set of switches connected by physical links?
(a) Circuit Switched Network
(b) Datagram Network
(c) Virtual Circuit Network
(d) All of these
(e) None of these
Q9. Which of the following service is responsible for changing the source IP address of a packet to
the IP address of the public interface on the router.
(a) NAT
(b) SMTP
(c) DHCP
(d) HTTP
(e) UDP
Q10. Which of the following protocol uses both TCP and UDP?
(a) HTTP
(b) SMTP
(c) TELNET
(d) DNS
(e) FTP
Q11. In which protocol, the sender sends one frame and then waits for an acknowledgement before
proceeding?
(a) Sliding window
(b) Stop and wait
(c) Frame buffer
(d) IP
(e) Routing Protocol
Q17. Which of the following allows you to specify multiple values in a WHERE clause?
(a) Between
(b) In
(c) Like
(d) Joins
(e) Insert
Q18. Which transaction property ensure that multiple transactions can occur concurrently without
leading to inconsistency of database state?
(a) Consistency
(b) Isolation
(c) Durability
(d) Atomicity
(e) Not any property ensures the transaction independency
Q20. which of the following is a view of the database that appears to an application program?
(a) Tuple
(b) Instance
(c) Subschema
(d) Relation
(e) Virtual Table
Q22. Which clause is used to specify condition while retrieving data from table in SQL?
(a) WHERE
(b) LIKE
(c) HAVING
(d) Group By
(e) Select
Q24. Which of the following type of anomalies are not found in relational database?
(a) Insertion Anomalies
(b) Deletion Anomalies
(c) Update Anomalies
(d) Create Anomalies
(e) None of these
Q26. How can you return all the records from a table named "Student" sorted descending by
"FirstName", in SQL?
(a) SELECT * FROM Student ORDER BY FirstName DESC
(b) SELECT * FROM Student SORT BY 'FirstName'DESC
(c) SELECT * FROM Student ORDER FirstName DESC
(d) SELECT * FROM Student SORT 'FirstName'DESC
(e) SELECT ALL FROM Student ORDER FirstName DESC
Q27. The ability to modify the internal schema without causing any change to the external schema:
(a) Physical data independence
(b) Logical data independence
(c) External data independence
(d) Both Physical and External data independence
(e) None of these
Q36. Which of the following is the time interval between the submission and completion of job?
(a) Waiting time
(b) Turnaround time
(c) Throughput
(d) Response time
(e) Seek time
Q41. The processes that are residing in main memory and are ready and waiting to execute are kept
on a list called:
(a) job queue
(b) ready queue
(c) execution queue
(d) process queue
(e) priority queue
Q42. Which of the following is the time between a command request and the beginning of a
response?
(a) Throughput
(b) Waiting time
(c) Response time
(d) Turnaround time
(e) Beginning time
Q45. Which of the following UNIX command is used to remove or delete files?
(a) rm
(b) mv
(c) cp
(d) lpr
(e) man
Q47. Which of the following is the combination of public and private cloud?
(a) Business cloud
(b) Space cloud
(c) Rackspace cloud
(d) Hybrid cloud
(e) Commodity cloud
Q48. In which debugging technique, when an error has occurred, one needs to start tracing the
program backward one step at a time evaluating the values of all variables until the cause of error
is found?
(a) Cause Elimination
(b) Program Slicing
(c) Backtracking
(d) Brute Force Method
(e) None of these
Q51. In which type of SQL join returns all the rows from left table combine with the matching rows
of the right table
(a) Inner join
(b) Left outer join
(c) Right outer join
(d) Full join
(e) Self join
Q52. An accountant office has four employees. They have four computers and two printers. What
kind of network would you suggest they install?
(a) Client server network
(b) Peer-to peer network
(c) Intranet
(d) MAN
(e) None of the above
Q53. Which of the following is the process of taking control over an existing session between a client
and a server?
(a) IP spoofing
(b) Replay attack
(c) Session hijacking
(d) WarDriving
(e) Backdoor
Q55. Which keyword is used to define a scope where identifiers like variables, functions, classes,
etc. are declared in C++?
(a) namespace
(b) mutable
(c) long
(d) while
(e) int
Q56. Which among the following is not a necessary condition for constructors?
(a) Its name must be same as that of class
(b) It must not have any return type
(c) It must contain a definition body
(d) It can contain arguments
(e) None of these
Q57. Which feature works with both Microsoft Explorer and Microsoft Edge and monitors websites,
pages, and downloads for known issues?
(a) Agent X
(b) Blocker
(c) Armenia
(d) SmartScreen
(e) None of there
Q58. A free file storage and file sharing service provided by Microsoft when you sign up for a
Microsoft account is:
(a) OneDrive
(b) Google Drive
(c) iCloud
(d) AWS
(e) D-cloud
Q67. In which type of switching technique whole message are transmitted at a time from source to
destination?
(a) Packet switching
(b) Circuit switching
(c) Message switching
(d) Data switching
(e) Key switching
Q68. Which of the following protocol is used for remote terminal connection service?
(a) TELNET
(b) FTP
(c) RARP
(d) UDP
(e) SMTP
Q70. SIP, DHCP and DNS are which layer protocol of OSI model?
(a) Presentation layer
(b) Transport layer
(c) Application layer
(d) Session layer
(e) Network layer
Q73. Which of the following OSI model layer is used for logical addressing?
(a) Transport Layer
(b) Application Layer
(c) Network Layer
(d) Session Layer
(e) Physical Layer
Q76. Which level of testing is evaluating the software/system compatibly with the business
requirements?
(a) Integration testing
(b) System testing
(c) Acceptance testing
(d) Unit Testing
(e) Evaluation Testing
Q83. In which debugging technique, when an error has occurred, one needs to start tracing the
program backward one step at a time evaluating the values of all variables until the cause of error
is found?
(a) Cause Elimination
(b) Program Slicing
(c) Backtracking
(d) Brute Force Method
(e) None of these
Q86. Which of the following is testing is also known as clear box testing?
(a) White box testing
(b) Black box testing
(c) Grey box testing
(d) Behavioral testing
(e) None of these
Q89. Which process is the examination and alteration of a system to reconstitute it in a new form?
(a) Software reengineering
(b) Software reverse engineering
(c) Software forward engineering
(d) Software testing
(e) Software costing
Q91. Which of the following is used to obtain information about a professor with name “pankaj”?
(a)
(b)
(c)
(d)
(e)
Q92. How can you change "Tripathi" into "Purohit" in the "LastName" column in the Persons table?
(a) MODIFY Persons SET LastName='Tripathi' INTO LastName='Purohit’
(b) MODIFY Persons SET LastName='Purohit' WHERE LastName='Tripathi'
(c) UPDATE Persons SET LastName='Tripathi' INTO LastName='Purohit'
(d) UPDATE Persons SET LastName='Purohit' WHERE LastName='Tripathi'
(e) CREATE Person SET LastName=’Purohit’ WHERE LastName=’Tripathi’
Q93. In which type of SQL join returns all the rows from left table combine with the matching rows
of the right table?
(a) Inner join
(b) Left outer join
(c) Right outer join
(d) Full join
(e) Self join
Q94. In E-R Diagram, total participation in entities is represented by which of the following shape?
(a) Double Rectangle
(b) Eclipse
(c) Diamond
(d) Double line
(e) Double eclipse
Q95. Which SQL operator allows you to specify multiple values in a WHERE clause?
(a) Between
(b) Select
(c) Joins
(d) In
(e) Like
Q97. Which of the following is a condition created within a database or data storage technology in
which the same piece of data is stored in two separate places?
(a) Data Enumeration
(b) Data Iteration
(c) Data Concurrency
(d) Data Redundancy
(e) Data Sufficiency
Q99. By which of the following statements, we can undo all the updates performed on the
transaction?
(a) Undo
(b) Commit
(c) Rollback
(d) Replace
(e) Reverse
Q105. The ability to modify the internal schema without causing any change to the external scheme:
(a) Physical data independence
(b) Logical data independence
(c) External data independence
(d) Both Physical and External data independence
(e) None of these
Q107. What would be the worst run time complexity of queue and dequeue operations, if queue is
implemented using arrays?
(a) O(n), O(n)
(b) O(n), O(1)
(c) O(1), O(n)
(d) O(1), O(1)
(e) None of these
Q111. Which of the following is an online cloud storage service from Microsoft?
(a) MicroDrive
(b) OneDrive
(c) CloudDrive
(d) WindowsDrive
(e) None of these
Q112. Which of the following sorting algorithm is best if a list is already sorted?
(a) Insertion sort
(b) Quick Sort
(c) Merge Sort
(d) Heap sort
(e) Bubble Sort
Q113. Which of the following HTTP error message shows when server is currently unavailable?
(a) 503
(b) 404
(c) 406
(d) 400
(e) 202
Q118. An assembler that runs on one machine but produces machine code for another machine is
called:
(a) Simulator
(b) Emulator
(c) Cross assembler
(d) Boot-strap loader
(e) Native code compiler
Q119. Amazon Web Services is which type of cloud computing distribution model?
(a) Software as a service
(b) Platform as a service
(c) Infrastructure as a service
(d) Communication as a service
(e) None of these