You are on page 1of 13

BSC ACADEMY SINCE1993 Specialist Officer (IT Officer) Model Question

1 Given references to the following pages by a program 0,1,4,2,0,2,6,5,1,2,3,2,1,2,6,2,1,3,6,2 Number of page faults will occur, if the program has 3 page frames available to it and uses. What is optimal replacement? a) 7 b) 9 c) 11 d) 13 e) 15 Ans: b 2 The graph K (3, 4) is complete bipartite graph has a) b) c) d) e) 3 edges 4 edges 8 edges 10 edges 12 edges

Ans e
3. The database schema is written in a) HLL b) DML c) DDL d) DCL e) None of these Ans C)

4. What is average waiting time in FCFS of given process p1, p2, p3, p4 if execution time 5, 10, 8, 3 and turnaround time are 5, 15, 23, 26 a) 10

BSC ACADEMY SINCE1993


b) 10.75 c) 12 d) 12.75 e) 13 Ans b
5. In an architecture of a database system external level is the a) Physical level b) Logical level c) Conceptual level d) View level e) None of these Ans d) view level

6. In a circular linked list a) Components are all linked together in some sequential manner b) There is no beginning and no end c) Components are arranged hierarchically d) Forward and backward transversal within the list is permitted e) None of the above Ans b 7. The statement in SQL which allows to change the definition of a table is
a) Alter b) Update c) Create d) Select e) None of these Ans a )Alter

BSC ACADEMY SINCE1993


8 . A technique for direct searching is a) binary seache b) linear search c) Tree search d) Hashing e) None of these Ans- d) 9. Maximum number of nodes in B-tree at depth h and order t ( root of depth 0) a) t
(h+1)

b) 2t c) t

(h-1)

( h-1)

d) 2t

(h+1)

e) none of these Ans b)

10. which of the following can be sequence of nodes examined in a binary search tree while searching for key 98? a) 100, 50, 75, 60, 98 b) 100, 120, 90, 95, 98 c) 200, 70, 100, 95, 98 d) 75, 150, 90, 80, 98 e) None of these Ans c
11. What protocol is used between E- mail servers? a) FTP b) SMTP c) SNMP d) POP3 e) None of these

BSC ACADEMY SINCE1993


Ans- b) SMTP 12. The way a card game player arranges his cards as he picks them up one by one , is an

example of a) Bubble sort b) Selection sort c) Insertion sort d) Merge sort e) None of above Ans c
13. Which phase is not available in software life cycle? a) Coding b) Testing c) Design d) Abstraction e) Maintenance Ans- d)

14. Which type of error detection uses binary divasion? a) Parity check b) Longitudinal Redundancy checking ( LRC) c) Checksum checking d) Cyclic Redundancy Checking (CRC) e) None of the above Ans d 15. Basis path testing is a) both Black and white box b) White box testing method c) Black box testing method

BSC ACADEMY SINCE1993


d) unique testing e) none of the above ans b
16. If you wanted to tell the database management system that a specific attribute contained numbers only, what would you need to set? A)Data category B) Data type C) Data dictionary D) Data definition Ans:b 17. When you link one database table to another database table, what are you creating? A) Primary link B) Connectivity C) Relationships D) Referential integrity E) foreign key E) data Integrity

Ans: c

18. The process known as ----------- is used by large retailers to study trends. a) Data mining b) Data selection c) POS d) Data conversion e) None of the above Ans a
19 . Accessing records from a file directly without searching from the beginning of the file is (a) Time sharing (b) Random (c) Direct access (d) Access time (e) None of above Ans: (c)

20. Bankers algorithm for resource allocation deals with (a) Dead look preventation (b) Dead look avoidance (c) Dead look recovery

BSC ACADEMY SINCE1993


(e) Mutual exclusion (f) None of these Ans b
21. Which of the following performs modulation and demodulation ? (a) Coaxial cable (b) Satellite (c) Modem (d) Optical fiber (e) Router Ans: (c)

22. In TCP/IP protocol check sum field contains ------------ bit value that use for --------------. a) 32 bit, dead lock avoidance b) 48 bit , error detection c) 16 bit, error detection d) 16 bit dead lock avoidance e) None of these. Ans c
23. Granting an outside organisation access to Internet web pages is often implemented using a (an) (a) Extranet (b) Intranet (c) Internet (d) Hacker (e) None of these ANS: (a)

24. The advantage of packet switching over message switching a) The first packet of multipacket message can be forwarded before the second one has fully arrived b) reduce delay and improving throughput c) not required advance setup d) All of the above e) None of the above

BSC ACADEMY SINCE1993


Ans d

25. The Third generation computers were based upon (a) transistors (b) ICs (c) valves (d) chips (e) none of the above Ans : b 26. Generalization is _________ process. a) Top-down b) Bottom-up c) Both(a) and (b) d) vertical process e) None of the above Ans:- b)

27 Spooling is most beneficial in a multiprogramming environment where: a) Most jobs are CPU-bound b) Most jobs are I/O bound c) Jobs are evenly divided as I/O- bound and CPU- bound d) There is limited primary memory and need for secondary memory e) None of the above Ans c
*28. A Flip-flop can store a) one bit of data b) Two bits of data c) Three bits of data d) Any number of bits of data e) All of above Ans: a)

BSC ACADEMY SINCE1993


29. ----------- command displays the contents of the file specified. a) $ mkdir b) $cp c ) $ Is-1 d) $ cat e) None of the above Ans d 30. Data warehouse environment architecture a) A data warehouse methodology, analysis design, construction and administration. b) The increasing processing power and sophistication of analytical tools and techniques have resulted in the development of data warehouses. c) Provide Storage, functionality, and responsiveness to queries beyond the capabilities of transaction- oriented databases. d) All of the above e) None of the above. Ans d 31. Altering of data so that it is not usable unless the changes are undone is ____. (a) Biometrics (b) Compression (c) Encryption (d) Ergonomics (e) None of these Ans c
*32. A __________s main purpose is to prohibit unauthorized access to your computer via the Internet. A) above Ans: b 33. When one computer provides services to another computer, the environment is a(n) _____ infrastructure. A) B) C) D) e) Ans: a Client/server dependent reliant independent None of the above popup blocker B) firewall C) spyware blocker D) spam assassin E) None of the

34. Object oriented programming relies on three basic concepts: a) data abstraction, inheritance, and array b) data abstraction, inheritance and polymorphism c) I/O , Inheritance and polymorphism

BSC ACADEMY SINCE1993


d) Inheritance, I/O, class e) None of the above Ans b
*35. A) B) C) D) E) Ans: c 36. Each station on an Ethernet network has a unique _______ address imprinted on its network interface card (NIC). A) B) C) D) E) Ans: c 37. Decryption and encryption of data are the responsibilities of the __________Layer? a) Physical b) Data link c) Presentation d) Application e) Session Ans: c) 38. The communication mode that supports data in both directions at the same time is a) Simplex b) Half duplex c) Full duplex 5-byte 32-bit 48-bit 64- bit none of the above A _______ can check the MAC addresses contained in the frame. passive hub repeater bridge router All of above.

BSC ACADEMY SINCE1993


d) Multiplex e) None of these Ans: c 39. The function AVG, COUNT, MAX, and MIN a) Supported only by SQL b) Supported only by QBE c) Supported both SQL and QBE d) Supported by ORACLE e) Supported by none Ans: c 40. Multivalued dependency among attribute is checked at which level? a) 2NF b) 3NF c) 4NF d) 5NF Ans: c 41. A full binary tree with n leaves contains a) n nodes b) log2n nodes c) 2n-1 nodes d) 2n nodes e) None of the above Ans: c) 2n-1 nodes. 42. The postfix form of a expression (A+B)*(C*D-E)*F/G is a) AB+CD*E-FG/** b) AB+CD*E-F**G/

BSC ACADEMY SINCE1993


c) AB+CD*E-*F*G/ d) AB+CDE*-*F*G/ Ans: a)

43 Slotted ALOHA
a ) Divide time into discrete intervals b) Require global time synchronization c) Used for data transfer d) All of above e) None of above Ans a
44. What type of technology allows you to use your finger, eye, or voice print to secure your information resources? A) B) C) D) E) Haptics Caves Biometrics RFID None of the above

Ans: c) Biometrics 45. A _____ can be used as a connecting device between two internetworks that use different models. A) B) C) D) E) repeater bridge router gateway hub

Ans: d) gateway 46. IP address classified into five classes A, B, C, D, E. what is address range of class B? a) 0.0.0.0 b) 128.1.0.1 c) 244.0.0.0 d) 192.0.1.1 to 126.255.255.255 to 191.255.255.255 to 239.255.255.255 to 223. 255.255.255

BSC ACADEMY SINCE1993


e) none of these Ans: b 47. __________ uses thin coaxial cable. A) B) C) D) E) Ans: b 48. A) B) C) D) E) Ans: b Both Go-Back-N and Selective-Repeat Protocols use a _________. sliding frame sliding window sliding packet sliding data None of the above. 10Base5 10Base2 10Base-T 10Base-F None of these

49. which of the following TCP/IP protocol is used for remote terminal connection service ? a) Telnet b) RARP c) FTP d) None of the above Ans a 50. RSA algorithm a) Support Encryption and digital signature b) Encrypt the checksum c) Support Source authentication

BSC ACADEMY SINCE1993


d) All of the above e) None of the above Ans a

You might also like