0% found this document useful (0 votes)
639 views174 pages

1000 Question It Ebook

IT OFFICER EXAM 2017 provides 1000 important questions covering topics such as DBMS, Computer Network, Network Security, Operating System, Computer Organization, Software Engineering, C/C++, Web Technology, and Data Structure. The questions are multiple choice and cover foundational concepts in information technology. Subscribers to the Study Regular Youtube channel can find daily video lessons. If any answers are incorrect, email can be sent to contact@studyregular.in. The ebook provides questions, answers, and explanations to help students prepare for IT exams.

Uploaded by

harisha b
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
639 views174 pages

1000 Question It Ebook

IT OFFICER EXAM 2017 provides 1000 important questions covering topics such as DBMS, Computer Network, Network Security, Operating System, Computer Organization, Software Engineering, C/C++, Web Technology, and Data Structure. The questions are multiple choice and cover foundational concepts in information technology. Subscribers to the Study Regular Youtube channel can find daily video lessons. If any answers are incorrect, email can be sent to contact@studyregular.in. The ebook provides questions, answers, and explanations to help students prepare for IT exams.

Uploaded by

harisha b
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 174

IT OFFICER EXAM 2017

1000 IMPORTANT
QUESTIONS EBOOK
Questions Covered From Topic:
DBMS
Computer Network
Network Security
Operating System
Computer Organization
Software Engineering
C/C++
Web Technology
Data Structure
Subscribe Our Study Regular Youtube Channel For Daily Videos

If you find any wrong answer then please our email id


contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
1)Every host computer on the internet has a (n)
a)similar IP address
b)unique 10 – digit number
c)common name and number
d)unique IP address
e)None of these

2)Which of the following are five built – in functions provided by SQL?


a)SUM, AVG, MIN, MAX, NAME
b)MIN, MAX, MULT, DIV, NAME
c)SUM, AVG, MIN, MAX, MULT
d)COUNT, SUM, AVG, MAX, MIN
e)None of these

3)Common Gateway Interface (CGI) is which of the following?


a)An interface that accepts and return data that may be written in SQL
b)A small program that executes within other application and is stored on the server
c)A small program that executes within other application and is stored on the client
d)An interface that accepts and returns data that may be written in any language that
produces executable file
e)None of these

4)Which of the following wildcard masks is most useful for matching all IP packets in
subnet 10. 1. 128. 0, mask 255.255.255.0?
a)0.0.0.0
b)0.0.0.255
c)0.0.0240
d)0.0.0.31
e)None of these

5)Which of the following is not a testable Web App security element?


a)Encryption
b)Firewalls
c)Authentication
d)Penetration
e)None of these

6)……………………… are two important technologies for developing the Semantic web
a)XML and RDF
b)XML and HTML
c)RDF and HTML
d)Wi-Fi and RDF
e)None of these
2
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
7)In what kind of storage, we can easily insert, delete, concatenate and reaarange
substrings?
a)Stack
b)Linked list
c)Queue
d)Array
e)None of these

8)Web Pages can be created using


a)only Web authoring software
b)only Microsoft products
c)any Word processor
d)only Microsoft Front Page
e)None of these

9) Which of the following techniques provides redundancy by using two disks and two
controllers?
a) Disk striping
b) Disk striping with parity
c) Drive mirroring
d) Drive duplexing
e) None of these

10) _________ is the term for the use of deception to get someone’s sensitive information
a) Identity theft
b) Personal engineering
c) Spoofing
d) Social engineering
e) None of these

11) In addition to an internet connection, which of the following is needed to?


a) Telnet client
b) Scanner
c) Mail client
d) Web browser
e) None of these

12) A DBMS performs several important functions that guarantee the integrity and
consistency of the data in the database. Which of the following is not one of those
functions?
a) Data integrity management
b) Data reports
3
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
c) Security and storage management
d) Data storage management
e)None of these

13) A procedural program stores __________ in a collection of variables and a set of


_______ performs operations on it.
a) parameters ; arguments
b) data ; functions
c) assets ; actions
d) strings ; operators
e) none of these

14) Which of the following is the phase of SDLC in which the identified requirements are
incorporated into the new system’s design
a) Maintenance
b) Physical Layout
c) Requirement design
d) Systems design
e) None of these

15) What does DLCI stand for?


a) Data Link Circuit Identifier
b) Data Link Connection Interrupt
c) Data Link Connection Indicator
d) Data Link Connection Identifier
e) None of these

16) What standard Java Package is used to move the cursors?


a) Javax swing
b) java cio
c) java lo
d) java awt event
e) none of these

17) A communications medium where data are transformed into lights pulses is
a) coaxial cable
b) optical fibre
c) satellite
d) twisted – pair cable
e) None of these

18) __________ is a standard for security that is inclined at the network or packet
processing layer of network communications, as opposed to the application layer.
4
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
a) Passive FTP
b) TCP
c) SSL
d) IPsec
e) None of these

19) Locking may cause which of the following problems?


a) Deadlock
b) Versioning
c) Versioning and Deadlock
d) Erroneous updates
e) None of these

20) Which of the following is not a WebApp Interface mechanism ?


a) Links
b) Cookies
c) Browser
d) Cookies and Links
e) None of these

21) _________ is one of the older and slowest methods an intruder might use to scan a
network to determine which of a range of IP addresses map to live hosts.
a) Ping sweep
b) Phreaking
c) Smurfing
d) War driving
e) None of these

22) which of the following is used to create and delete views and relations within tables?
a) SQL Data Identification Language
b) SQL Data Identification and Manipulation Language
c) SQL Data Relational Language
d) SQL Data Definition Language
e) None of these

23) Criminal hacking is called


a) cracking
b) a virus
c) a trojan horse
d) a worm
e) None of these

24) Backword recovery is which of the following?


5
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
a) Where the before – images are applied to the database
b) Where the after – images and a = before – images are applied to the database.
c) Where the after – images are applied to the database
d) Continuing without any recovery
e) None of these

25) ________ is the integration of economic, social, cultural and ecological facets of life,
enabled by information technologies.
a) Business environment
b) Neutralisation
c) Nationalisation
d) Globalisation
e) None of these

26) ________ is the process and tools used by managers and executives with the support
of the project team to manage employee resistance.
a) Resistance management
b) Change management
c) Detailing management
d) Probing management
e) None of these

27) A cross life – cycle activity of system development is


a) data modeling
b) fact finding
c) prototyping
d) data flow diagram modeling
e) None of these

28) The result of a SQL SELECT statement is a(n)


a) report
b) file
c) page
d) table
e) None of these

29) Web App performance tests are designed to


a) assess Web App usability
b) test network performance
c) test network connectivity
d) simulate real – world loading situations
e) None of these

6
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
30) A CASE SQL statement is which of the following?
a) A way to establish a data definition in SQL or establish a loop in SQL
b) A way to establish an IF – THEN – ELSE in SQL
c) A way to establish a loop in SQL
d) A way to establish a data definition in SQL
e) None of these

31)The CMM Level at which measurable goals for quality and productivity are established
in
a)Level 1
b)Level 2
c)Level 3
d)Level 4
e)None of these

32)When you will visit websites spyware may be substantially downloaded. This is called
a
a)logic bomb
b)drive – by download
c)Virus
d)spyot
e)None of these

33)Malicious software is known as


a)malware
b)badware
c)disasterware
d)illegalware
e)None of these

34)A data structure where element can be added or removed at either end but not in the
middle is called
a)requeue
b)queues
c)linked list
d)stacks
e)None of these

35)Which of the following are placeholders for literal value in a SQL query being sent to
the database
a)resolution variables
b)reduction variables
c)assimilation variables
7
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
d)bind variables
e)None of these

36)In TPS system, an output that signifies that a specifies that a specific transaction has
taken place is called a (n)
a)detail report
b)action document
c)inception report
d)exception report
e)None of these

37)………………………….. is the process whereby media files such as a video start playing as
they are downloading
a)Streaming
b)Pushing
c)Dragging
d)Pulling
e)None of these

38)Which of the following statements about Stacks is incorrect?


a)New nodes can only be added to the top of the stack
b)Stacks can be implemented using linked lists
c)Stacks are first – in, first – out data structures
d)stacks are very useful
e)None of these

39)The UML designation for a public class member is


a)the symbol @
b)the symbol #
c)the word public
d)the plus symbol (+)
e)None of these

40)What type of join is needed when you wish to include rows that do not have matching
values?
a)Equi – Join
b)Indefinite Join
c)Intermediate Join
d)Outer Join
e)None of these

41)A home page is


a)the web page that identifies a website
8
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
b)a web page you eventually reach by clicking a series of hyperlinks
c)the last page of the website
d)the web page you like to visit the most
e)None of these

42)A network covering a large geographic area is usually referred to as a(n)


a)huge area network
b)wide area network
c)internetwork
d)intranet
e)None of these

43)Frame relay
a)does not use error correction routines
b)is used by facsimile machine
c)does not work will on the internet
d)is an outdated technology
e)None of these

44)The design tool used to illustrate the logic of a new computer software logic diagram
that uses symbols to represent program elements is called a (n)
a)data logic chart
b)data flow diagram
c)software logic diagram
d)system flow chart
e)None of these

45)A web facility that helps to find sites with the information and / or services that is
desired is
a)a hyperlink
b)a search engine
c)a network access point
d)a blog
e)None of these

46)When new data are to inserted into a data structure but there is not available space;
this situation is usually called
a)underflow
b)overflow
c)Houseful
d)empty
e)None of these

9
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
47)A ………………………….. is acrylic diagraph, which as only node with in – degree 0, and
other nodes have in degree 1.
a)Dis – joint tree
b)Direction oriented tree
c)Directed tree
d)Undirected tree
e)none of these

48)Which of the following are true of XML?


a)XML is too complicated
b)XML is difficult to learn
c)XML is set of tags designed to tell browser how to display text on a webpage
d)XML is a set of rules for creating tags to describe data
e)None of these

49)Which of the following forms does not describe parallel ATA devices?
a)SCSI
b)IOE and DOE
c)IOE
d)DOE
e)None of these

50)……………………… maps domain name to their IP addresses.


a)Wi -Fi
b)DNS
c)HTML
d)XML
e)None of these

51) The building block of a Wireless LAN as defined by IEEE 802.11 standard?
(A) BSS
(B) ESS
(C) Both (A) & (B)
(D) DSS
(E) None of the above

52) A protocol that provides configuration information from a table is called.....


(A) BGP
(B) BOOTP
(C) FTP
(D) ESS
(E) None of the above

10
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
53) CIDR stands for
(A) Code Inter Domain Routing
(B) Code Inter Division Routing
(C) Classless Inter Domain Routing
(D) Classful Inter Domain Routing
(E) None of the above

54) In PPP, a three-way handshaking protocol used for authentication is known


as......
(A) CHAP
(B) BOOTP
(C) FTP
(D) DSS
(E) None of the above

55) A technique in which a protocol used for address resolution is called......


(A) dynamic routing
(B) dynamic mapping
(C) exterior routing
(D) address resolution
(E) None of the above

56) Which of the following converts user friendly names to IP addresses?


(A) Domain Name Space
(B) Domain Name System
(C) DHCP
(D) CHAP
(E) None of the above

57) A protocol in which the sender sends one frame and stops until it receives
confirmation from the receiver?
(A) Stop and Wait ARQ
(B) Store and forward switch
(C) Stop and Wait Protocol
(D) Dynamic routing
(E) None of the above

58) Which of the following is an application service for retrieving a web document?
(A) HTML
(B) HTTP
(C) FTP
(D) BSS
(E) None of the above
11
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
59) You are in the process of analyzing a problem that requires you to collect and
store TCP/IP Packets.Which of the following utilities is best suited for this purpose?
(A) Performance Monitor
(B) Network Monitor
(C) NETSTAT
(D) NBTSTAT
(E) None of the above

60) Which of the following protocol provides confidentiality and authentication for
an e-mail?
(A) BGP
(B) BOOTP
(C) PGP
(D) ESS
(E) None of the above

61) An addressing method in which the IP address space is not divided into classes?
(A) Classful addressing
(B) Classless addressing
(C) Classless IDR
(D) Network Monitor
(E) None of the above

62) The number of differences between the corresponding bits in a two data words
is known as...... distance
(A) Hanning
(B) Hamming
(C) Huffman
(D) Exterior routing
(E) None of the above

63) An Address Resolution Protocol (ARP) request is ____________


(A) unicast
(B) anycast
(C) broadcast
(D) Hamming
(E) None of the above

64) The splitting of a message into multiple packets at transport layer is known
as______
(A) Fragmentation
(B) Segmentation
12
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
(C) Synchronization
(D) Broadcast
(E) None of the above

65) RARP stands for____


(A) Reverse Address Resolution Protocol
(B) Reverse Address Routing Protocol
(C) Reverse Address Reflexive Protocol
(D) Resource Address Resolution Protocol
(E) None of the above

66) The loss of signal’s energy due to the resistance of medium is called......
(A) Fragmentation
(B) Attenuation
(C) Synchronization
(D) Segmentation
(E) None of the above

67) In Wireless LAN’s, a time interval between two frames to control access to the
channel is called.....
(A) Interframe space
(B) Interleaving
(C) Interior routing
(D) Dynamic routing
(E) None of the above

68) An array of switches that are used to reduce the number of cross points is
called.....
(A) single stage switch
(B) dual stage switch
(C) multistage switch
(D) Huffman
(E) None of the above

69) An application protocol of TCP/IP that allows remote login is known as.......
(A) NCP
(B) NVT
(C) NAV
(D) PGP
(E) None of the above

70) TFTP stands for......


(A) Trivial File Transfer Protocol
13
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
(B) Temporary File Transfer Protocol
(C) Trunk File Transfer Protocol
(D) Transparent File Transfer Protocol
(E) None of the above

71) Communication in a Hybrid Fiber Coaxial (HFC) cable TV network can be


(A) unidirectional
(B) bidirectional
(C) multidirectional
(D) interleaving
(E) None of the above

72) Circuit switching uses.....


(A) Space Division Switch
(B) Time Division Switch
(C) Either (A) or (B)
(D) Dual Stage Switch
(E) None of the above

73) ADSL stands for


(A) Asynchronous Digital Subscriber Line
(B) Asymmetric Digital Subscriber Line
(C) Advanced Digital Subscriber Line
(D) Asynchronous Digital Security Line
(E) None of the above

74) Encryption and decryption of data are the responsibility of ....... layer
(A) Physical
(B) Datalink
(C) Transport
(D) Presentation
(E) None of the above

75) What is the main function of transport layer in the OSI model?
(A) peer to peer message delivery
(B) node to node message delivery
(C) process to process message delivery
(D) direct to direct message deliver
(E) None of the above

76) OSI stands for.....


(A) Open Systems Interconnection
(B) Original Systems Interconnection
14
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
(C) Original Security Interconnection
(D) Open Software Interconnection
(E) None of the above

77) In OSI model, as the data packet moves from the upper to the lower layers,
headers are _______.
(A) added
(B) removed
(C) deleted
(D) edited
(E) None of the above

78) Which of the following layer is the User Support layer?


(A) Session layer
(B) Presentation layer
(C) Application layer
(D) All of the above
(E) None of the above

79) Error detection at the data link layer is achieved by.....


(A) Hamming code
(B) Cyclic Redundancy Code
(C) Bit stuffing
(D) synchronization
(E) None of the above

80) Port address in TCP/IP is ..... bits long


(A) 16
(B) 32
(C) 64
(D) 128
(E) None of the above

81) IEEE 802.3 standard used what method as the media access method?
(A) CSMA/CD
(B) CSMA/CA
(C) CDMA
(D) FDMA
(E) None of the above

82) WEP stands for


(A) Wireless Equivalent Privacy
(B) Wired Equivalent Privacy
15
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
(C) Wired Equivalent Protocol
(D) Wireless Equivalent Protocol
(E) None of the above

83) What is the key element of a Protocol?


(A) Syntax
(B) Semantics
(C) Timing
(D) All of the above
(E) None of the above

84) Gigabit Ethernet has a data rate of


(A) 100 Mbps
(B) 1000 Mbps
(C) 500 Mbps
(D) 200Mbps
(E) None of these

85) The datalink layer of Ethernet consists of


(A) LLC sublayer
(B) MAC sublayer
(C) Both (A) & (B)
(D) Only (B)
(E) None of these

86) What is the minimum & maximum frame length for 10 Mbps Ethernet?
(A) 32 bytes, 64 bytes
(B) 64 bytes, 128 bytes
(C) 64 bytes, 1518 bytes
(D) 32 bytes, 1518 bytes
(E) None of these

87) SNMP stands for


(A) Simple Network Management Protocol
(B) Sample Network Management Protocol
(C) Structured Network Management Protocol
(D) Security Network Management Protocol
(E) None of these

88) Which of the following refers to a group of standards that are still being
developed as a part of overall IEEE 802.11 WLAN support?
(A) 802.11i
(B) 802.11x
16
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
(C) Both (A) & (B)
(D) Only (A)
(E) None of the above
89) Which of the following is a security protocol designed to provide a wireless LAN
with better security and privacy?
(A) WEP
(B) SNMP
(C) WAP
(D) LDAP
(E) None of the above

90) Which of the following is a timer used for Collision Avoidance (CA)?
(A) PCF
(B) MAC
(C) NAV
(D) LAN
(E) None of the above

91) Peer-to-Peer (P2P) is a ........communications model


(A)Centralized
(B)decentralized
(C)client
(D)server
(E) None of the above

92) Ethernet, token ring and token bus are types of.........
(A) MAN
(B) WAN
(C) LAN
(D) MAC
(E) None of the above

93) What is the name of network topology in which there are bidirectional links
between each possible node?
(A) Star
(B) Mesh
(C) Ring
(D) All of these
(E) None of the above

94) Fiber Distributed Data Interface (FDDI) is an example of which topology?


(A) Star
(B) Mesh
17
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
(C) Ring
(D) All of these
(E) None of the above

95) Which TCP/IP protocol is used for file transfer with minimal capability and
minimal overhead?
(A) SGMP
(B) TFTP
(C) SUMP
(D) SNMP
(E) None of the above

96) An IPV6 address is...... bits long


(A) 64
(B) 128
(C) 256
(D) 512
(E) None of the above

97) Addresses in Class D are used for.....


(A) Unicast Communication
(B) Multicast Communication
(C) Both (A) & (B)
(D) Both (A)
(E) None of the above

98) An IPV4 address is.....bits long


(A) 64
(B) 128
(C) 256
(D) 32
(E) None of the above

99) How many classes are there in IPV4 addresses?


(A) 7
(B) 4
(C) 5
(D) 6
(E) None of the above

100) What are the three types of addresses in IPV6?


(A) Class A, Class B, Class C
(B) Unicast, anycast, multicast
18
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
(C) Unicast, dual cast, multicast
(D) Class C, Class D, Class E
(E) None of the above

101) Which protocol working at the Transport layer provides a connectionless service
between hosts?
(A) UDP
(B) ARP
(C) TCP/IP
(D) NCP
(E) None of the above

102) Which protocol does Ping use?


(A) UDP
(B) ICMP
(C) TCP/IP
(D) RIP
(E) None of the above

103) UDP stands for


(A) User Datagram Protocol
(B) User Data Protocol
(C) Unlimited Datagram Protocol
(D) Unitary Development Plan
(E) None of the above

104) What protocol does PPP use to identify the Network Layer Protocol?
(A) UDP
(B) ICMP
(C) NCP
(D) RIP
(E) None of the above

105) With respect to a network interface card, the term 10/100 refers to
(A) protocol speed
(B) a fiber speed
(C) megabits per seconds
(D) All of these
(E) None of the above

106) If you want to locate the hardware address of a local device, which protocol
would you use
(A) UDP
19
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
(B) ARP
(C) NCP
(D) TCP
(E) None of the above

107) ______ is primarily used for mapping host names and email destinations to IP
address
(A) TCP
(B) DNS
(C) NCP
(D) UDP
(E) None of the above

108) Which of the following TCP/IP protocol is used for transferring electronic mail
messages from one machine to another?
(A) TCP
(B) SMTP
(C) NCP
(D) ARP
(E) None of the above

109) _____ is the continuous ability to send and receive data between
interconnected networks.
(A) FTP
(B) SMTP
(C) TNS
(D) Network Interoperability
(E) None of the above

110) What is the default subnet mask for a class C network?


(A) 127.0.0.1
(B) 2550.0.0
(C) 255.255.0.0
(D) 255.255.255.0
(E) None of the above

111) What is the default subnet mask for a class B network?


(A) 127.0.0.1
(B) 2550.0.0
(C) 255.255.0.0
(D) 255.255.255.0
(E) None of the above

20
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
112) What is loopback address?
(A) 127.0.0.1
(B) 255.0.0.0
(C) 255.255.0.0
(D) 127.0.0.0
(E) None of the above

113) A central computer surrounded by one or more satellite computers is called a


(A) Bus network
(B) Ring network
(C) Star network
(D) Neywork
(E) None of the above

114) A networking device that receives a signal on an electromagnetic or an optical


transmission medium, amplifies the signal,and then retransmits it along the
medium is called
(A) Router
(B) Hub
(C) transmitter
(D) Repeater
(E) None of the above

115) What is the default subnet mask for a class A network?


(A) 127.0.0.1
(B) 255.0.0.0
(C) 255.255.0.0
(D) 255.255.255.0
(E) None of the above

116) UTP stands for


(A) Unshielded Twisted Pair
(B) Unshielded Twisted Port
(C) Uniformly Twisted Pair
(D)Unlikely To Pay
(E) None of the above

117) Which of the following organization defines standards for modems?


(A) IEEE
(B) CCITT
(C) BELL
(D) ICMP
(E) None of the above
21
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
118) Which topology requires a hub?
(A) Ring
(B) Star
(C) Bus
(D) Mesh
(E) None of the above

119) Which OSI layer divides a file into segments that are an efficient size for
routing?
(A) Transport Layer
(B) Network Layer
(C) Data link Layer
(D) Physical layer
(E) None of the above

120) FDDI stands for


(A) Fiber Data Distribution Interface
(B) Fiber Distributed Data Interface
(C) Fixed Data Distribution Interface
(D) File Direct Data Interface
(E) None of the above

121) Which of the following are the types of Internal Network Cards?
(A) Peripheral Component Interconnect (PCI), Wireless Network Card
(B) Industry Standard Architecture (ISA),Wireless Network Card
(C) Peripheral Component Interconnect (PCI), Industry Standard Architecture(ISA)
(D) All of these
(E) None of the above

122) A networking device that forwards data packets along networks and acts as a
central point of network is called
(A) Repeater
(B) Router
(C) Bridge
(D) Hub
(E) None of the above

123) Repeater operates in which layer of OSI model?


(A) Application layer
(B) Presentation layer
(C) Physical layer
(D) Transport layer
22
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
(E)None of the above

124) Where does Bridge operate in OSI model?


(A) Physical layer
(B) Data link layer
(C) Both (1)and (2)
(D) Application layer
(E)None of the above

125) ____ uses a standard called IEEE 802.6.


(A) LAN
(B) WAN
(C) MAN
(D) PAN
(E)None of the above

126) Which is the general network standard for the data link layer in the OSI
Reference Model?
(A) IEEE 802.1
(B) IEEE 802.2
(C) IEEE 802.3
(D) IEEE 802.4
(E)None of the above

127) Which of the following IEEE Standard is used for Wi-Fi systems?
(A) 802.11
(B) 802.1
(C) 802.2
(D) 802.10
(E)None of the above

128) ____ refers to a family of IEEE standards dealing with local area network and
metropolitan area network.
(A) 802
(B) 800
(C) 801
(D) 803
(E)None of the above

129) Routers operate in which layer of the OSI model?


(A) Physical layer
(B) Data link layer
(C) Network Layer
23
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
(D) All of these
(E)None of the above

130) A communication network which is used by large organizations over regional,


national or global area is called ___
(A) LAN
(B) WAN
(C) MAN
(D) PAN
(E)None of the above

131) Switch is a device of....... Layer of OSI model?


(A) Physical
(B) Datalink
(C) Application
(D) Session
(E) None of the above

132) Packets are found at which layer?


(A) Physical
(B) Datalink
(C) Application
(D) Network
(E) None of the above

133) The IP address 135.0.10.27 belongs to address class?


(A) Class A
(B) Class B
(C) Class C
(D) Class D
(E) None of the above

134) An http request contains how many parts?


(A) 1
(B) 2
(C) 3
(D) 4
(E) None of the above

135) A device which divides the incoming signal into low frequencies to send to voice
devices, and high frequencies for data to the computer.
(A) multicast router
(B) interface
24
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
(C) splitter
(D) network
(E) None of the above

136) Which of the following function is performed by TCP?


(A) Flow Control
(B) Error checking
(C) Subnetting
(D) All of the above
(E) None of the above

137) Which layer establishes, maintains & synchronizes the interaction between
communicating devices?
(A) Physical
(B) Datalink
(C) Application
(D) Session
(E) None of the above

138) Which of the following is a timer used for collision avoidance?


(A) NAV
(B) DCF
(C) PCF
(D) DSS
(E) None of the above

139) The access method used in DCF MAC sub-layer is


(A) CSMA/CD
(B) CSMA/CA
(C) Polling
(D) PCF
(E) None of the above

140) The access method used in PCF MAC sub-layer is


(A) CSMA/CD
(B) CSMA/CA
(C) Polling
(D) PCF
(E) None of the above

141) Which layer is the closest to transmission medium?


(A) Transport layer
(B) Physical layer
25
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
(C) Network layer
(D) Datalink layer
(E) None of the above

142) Which protocol is used to eliminate loops?


(A) TCP/IP
(B) Spanning Tree Protocol
(C) SMTP
(D) SGMP
(E) None of the above

143) What kind of scheme is the http protocol?


(A) get/put
(B) request/response
(C) store/forward
(D) queuing
(E) None of the above

144) Which layer of OSI determines the interface of the system with the user?
(A) Session layer
(B) Application layer
(C) Network layer
(D) Datalink layer
(E) None of the above

145) Which of the following is an example of client-server model?


(A) FTP
(B) DNS
(C) TELNET
(D) All of the above
(E) None of the above

146) At which layer TCP/IP defines two protocols: Transmission Control


Protocol(TCP) and User Datagram Protocol(UDP)?
(A) Transport layer
(B) Application layer
(C) Network layer
(D) Datalink layer
(E) None of the above

147) which of the following uses the greatest number of layers in the OSI model?
(A) Bridge
(B) Repeater
26
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
(C) Router
(D) Gateway
(E) None of the above

148) Which Protocol use link state routing?


(A) OSPF
(B) IGRP
(C) RIP
(D) TCP
(E) None of the above

149) Which PPP Protocol provides authentication and dynamic addressing?


(A) LCP
(B) NCP
(C) RIP
(D) IP
(E) None of the above

150) Which of the following layer is the network support layer?


(A) Physical layer
(B) Data link layer
(C) Network layer
(D) All of the above
(E) None of the above

151) Producer – Consumer problem, one of the classical problems of


synchronization is also called......
(A) Bounded Buffer Problem
(B) Readers Writers Problem
(C) Dining Philosophers Problem
(D) User Datagram Problem
(E)None of the above

152) Which of the following command is used to print current working directory in
Unix?
(A) mkdir
(B) pwd
(C) rm
(D) udp
(E)None of the above

153) ....... is a classic synchronization problem that involves the allocation of limited
resources amongst a group of processes in a deadlock free and starvation free
27
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
manner.
(A) Bounded Buffer Problem
(B) Dining Philosophers Problem
(C) Readers Writers Problem
(D) Unlimited Datagram Problem
(E)None of the above

154) ....... is a system call that returns the process ID of the parent of the current
process.
(A) getpid
(B) wait
(C) getppid
(D) Hub
(E)None of the above

155) Which of the following is standard print command in Unix?


(A) ncftp
(B) grep
(C) ls
(D) lpr
(E)None of the above

156) In Unix, “file” command is used to determine ......


(A) file name
(B) file type
(C) file content
(D) file transfer
(E)None of the above

157) What is the full form of RTSP?


(A) Real Time System Protocol
(B) Real Transfer System Protocol
(C) Real Time Streaming Protocol
(D) Real Trigger Streaming Protocol
(E)None of the above

158) Which of the following is a System call that can be used to send signal to a
process?
(A) kill
(B) wait
(C) exec
(D) ipr
(E)None of the above
28
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
159) ........ allows a thread to terminate the execution of other threads in the
process.
(A) Thread Scheduling
(B) Thread Safety
(C) Thread Cancellation
(D) Thread Terminate
(E)None of the above

160) Which of the following scheduling algorithm is impossible to implement?


(A) FCFS Scheduling
(B) Priority Scheduling
(C) Shortest Job First (SJF) Scheduling
(D) Thread Scheduling
(E)None of the above

161)…. ....... provides an Interface between the process and the Operating System
(A) Synchronization
(B) System call
(C) Segmentation
(D) Fragmentation
(E)None of the above

162) The resolution of externally defined symbols is performed by?


(A) Compiler
(B) Assembler
(C) Linker
(D) Interpreter
(E)None of the above

163) Which of the following is not used on multiprogramming systems?


(A) Memory Management
(B) File Management
(C) Process Management
(D) All of these
(E)None of the above

164) …...... is a system call that runs an executable file into an existing process.
(A) fork
(B) wait
(C) exec
(D) ipr
(E)None of the above
29
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
165) Which of the following technique is used to convert a blocking system call into
a non blocking system call?
(A) Segmentation
(B) Jacketing
(C) Fragmentation
(D) Application
(E)None of the above

166) One user-level thread is mapped to many kernel level thread is known as....
(A) One to Many model
(B) One to One model
(C) Many to One model
(D) Many to Many model
(E)None of the above

167) In Operating Systems, a single thread is termed as


(A) Light Weight Process (LWP)
(B) Heavy Weight Process (HWP)
(C) Both (A) & (B)
(D) Only (A)
(E)None of the above

168) ....... is a system call that returns the process ID of current process.
(A) getpid
(B) wait
(C) getppid
(D) exec
(E)None of the above

169) In Unix, “cat” command is used to display ......


(A) file names
(B) folder names
(C) file contents
(D) file transfer
(E)None of the above

170) Which of the following command is used to create terminal connection to


another host in Unix?
(A) ssh
(B) scp
(C) telnet
(D) dns
30
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
(E)None of the above

171) .......... is an user interface that uses only keyboard for input.
(A) Graphical User Interface
(B) Command Line Interface
(C) Both (A) & (B)
(D) Only (A)
(E)None of the above

172) Which of the following is an example of Preemptive Multi-Tasking OS?


(A) MS-DOS
(B) Linux
(C) OS/2
(D) Mac OS
(E)None of the above

173) An Operating System that can predict the exact time duration for operations is
called
(A) Hard RTOS
(B) Soft RTOS
(C) Both (A) & (B)
(D) Only (A)
(E)None of the above

174) The use of software to allow system hardware to run multiple applications on
different OS is termed as
(A) OS Virtualization
(B) OS level Virtualization
(C) Both (A) & (B)
(D) Operating System
(E)None of the above

175) The command interpreter in Linux is known as .....


(A) Fork
(B) Kernel
(C) Shell
(D) Wait
(E)None of the above

176) Which is a hardware register that contains status information of the


Processor?
(A) Stack pointer
(B) Program Counter
31
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
(C) Accumulator
(D) Status register
(E)None of the above

177) Physical memory can be divided into a number of equal sized blocks called.....
(A) Page
(B) Frame
(C) Block
(D) Shell
(E)None of the above

178) The most commonly used Linux shell is.......


(A) C Shell
(B) Korn Shell
(C) Bourne Shell
(D) Bash Shell
(E)None of the above

179) A table that contains the base address of each page in physical memory is
called.....
(A) Page table
(B) Frame table
(C) Memory table
(D) Typing Table
(E)None of the above

180) Virtual memory can be implemented with ......


(A) Thrashing
(B) Synchronization
(C) Demand Paging
(D) Paging
(E)None of the above

181) A register that can be used for memory protection is called......


(A) memory data register
(B) fence register
(C) memory buffer register
(D) index register
(E)None of the above

182) ...... occurs in a dynamic memory allocation system when most of the free
blocks are too small to satisfy any request?
(A) Paging
32
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
(B) Segmentation
(C) Fragmentation
(D) Thrashing
(E)None of the above

183) Which of the following holds the data currently being worked on?
(A) Stack pointer
(B) Program Counter
(C) Accumulator
(D) Register
(E)None of the above

184) The total number of processes completed per unit time is termed as
(A) throughput
(B) response time
(C) waiting time
(D) program counter
(E)None of the above

185) ...... is generic and that can run on any OS.


(A) Kernel level thread
(B) User level thread
(C) Both (A) & (B)
(D) Only(A)
(E)None of the above

186) Which of the following is multi threading model?


(A) many to many relationship
(B) many to one relationship
(C) one to One relationship
(D) All of the above
(E)None of the above

187) .......files represent physical devices like printers, terminals etc.,


(A) Ordinary files
(B) Directory files
(C) Special files
(D) Document files
(E)None of the above

188) An interrupt that is reserved for unrecoverable memory errors is called......


(A) maskable interrupt
(B) non maskable interrupt
33
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
(C) Both (A) & (B)
(D) Interrupt
(E)None of the above

189) Process Control Block (PCB) is also called......


(A) Program Control Block
(B) Memory Control Block
(C) Task Control Block
(D) File Control Block
(E)None of the above

190) The process that is currently being executed is called


(A) Waiting State
(B) Running State
(C) Ready state
(D) New State
(E)None of the above

191) ...... holds the address of the next instruction to be executed?


(A) Accumulator
(B) Stack Pointer
(C) Status Register
(D) Program Counter
(E)None of the above

192) Which of the following condition leads to deadlock?


(A) Hold and Wait
(B) Preemption
(C) Rollback
(D) Hard RTOS
(E)None of the above

193) Which type of scheduler is used in batch systems?


(A) Medium Term Scheduler
(B) Short Term Scheduler
(C) Long Term Scheduler
(D) Scheduling Criteria
(E)None of the above

194) Message queuing is managed by?


(A) Shell
(B) Kernel
(C) Fork
34
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
(D) Wait
(E)None of the above

195) Interrupt latency should be...... for Real Time Operating Systems (RTOS)?
(A) minimal
(B) maximum
(C) zero
(D) high
(E)None of the above

196) In DOS, MD command is used to....


(A) display message on screen
(B) create new files
(C) create new folders
(D) All of these
(E)None of the above

197) Which of the following is the delay that occur during the playback of a stream
is called?
(A) jitter
(B) playback delay
(c) stream delay
(D) thread
(E)None of the above

198) The high paging activity is called.........


(A) Fragmentation
(B) Segmentation
(C) Thrashing
(D) Jacketing
(E)None of the above

199) Which is not a valid state of a thread?


(A) running
(B) blocked
(C) parsing
(D) ready
(E)None of the above

200) The ...... register is read by the host to get input


(A) data out
(B) data in
(C) flow out
35
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
(D) flow in
(E)None of the above

201) Round Robin(RR) scheduling algorithm is suitable for......


(A) Real Time Operating Systems
(B) Embedded Operating Systems
(C) Distributed Operating Systems
(D) Time Sharing Operating Systems
(E) None of the above

202) ...... is a special system software that is used to handle process scheduling in
different ways.
(A) Fork
(B) Scheduler
(C) Spawn
(D) Wait
(E) None of the above

203) Short term scheduler is a......


(A) CPU scheduler
(B) process swapping scheduler
(C) job scheduler
(D) Long term scheduler
(E) None of the above

204) Which one of the following scheduler controls the degree of


multiprogramming?
(A) Long Term Scheduler
(B) Medium Term Scheduler
(C) Short Term Scheduler
(D) Job Scheduler
(E) None of the above

205) Which of the following is a scheduling algorithm that allows a process to move
up and down between queues?
(A) Round Robin(RR) scheduling
(B) First Come First Served (FCFS) scheduling
(C) Multilevel feedback queue scheduling
(D) Shortest Job First (SJF) scheduling
(E) None of the above

206) ..... commands are automatically loaded into main memory when the booting
process gets completed.
36
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
(A) External
(B) Internal
(C) Both (A) & (B)
(D) Only (A)
(E) None of the above

207) Which of the following is an Internal command?


(A) DEBUG
(B) EDIT
(C) EXTRACT
(D) COPY
(E) None of the above

208) Which of the following is an example of Batch Processing Operating Systems?


(A) Lynx OS
(B) Mac OS
(C) UNIX
(D) OS/2
(E) None of the above

209) In DOS, TYPE command is used to....


(A) display message on screen
(B) display the contents of a text file
(C) Both (A) & (B)
(D) Only (A)
(E) None of the above

210) ..... process checks to ensure the components of the computer are operating
and connected properly.
(A) Editing
(B) Saving
(C) Booting
(D) Memory
(E) None of the above

211) An Integer variable that is used to manage concurrent processes is called.....


(A) Thread
(B) Semaphore
(C) Counter
(D) Thrashing
(E) None of the above

212) Dijkstra’s banking algorithm for resource allocation is used for


37
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
(A) Deadlock detection
(B) Deadlock prevention
(C) Deadlock avoidance
(D) Deadlock recovery
(E) None of the above

213) In UNIX, cached disk blocks are managed by the Kernel and referred to as.....
(A) Cache
(B) Disk Cache
(C) Buffer Cache
(D) Only (A)
(E) None of the above

214) ...... is the smallest unit for processing that consists of a program counter, a
stack & a set of registers.
(A) Compiler
(B) Thread
(C) Heap
(D) Pipes
(E) None of the above

215) Which of the following services is not supported by the OS?


(A) I/O Operation
(B) Protection
(C) Compilation
(D) Preemption
(E) None of the above

216) Which of the following is used to remove deadlock?


(A) Preemption
(B) Mutual Exclusion
(C) Circular Wait
(D) Protection
(E) None of the above

217) First Come First Serve (FCFS) Scheduling is.......


(A) used to reduce waiting time
(B) easy to understand and implement
(C) impossible to implement
(D) display message on screen
(E) None of the above

218) ......... is a system call of OS that is used to create a new process?


38
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
(A) Shell
(B) Kernel
(C) Fork
(D) Thread
(E) None of the above

219) Which of the following is an example of Cooperative Multi-Tasking OS?


(A) Lynx OS
(B) Mac OS
(C) MS DOS
(D) OS/2
(E) None of the above

220) The performance of Round Robin(RR) scheduling depends on......


(A) quantum
(B) priority
(C) preemption
(D) protection
(E) None of the above

221) ...... is mainly responsible for allocating the resources as per process
requirement?
(A) RAM
(B) Compiler
(C) Operating Systems
(D) Software
(E) None of the above

222) Which of the following plays an important role in modern Operating


Systems(OS)?
(A) Kernel
(B) Shell
(C) Fork
(D) Thread
(E) None of the above

223) FAT stands for


(A) File Allocation Table
(B) File Application Table
(C) First Allocation Table
(D) First Application Table
(E) None of the above

39
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
224) BAT refers to...
(A) Executable Files
(B) Batch Files
(C) Boot Files
(D) File Management
(E) None of the above

225) ..... occur commonly in multi-tasking when two or more threads waiting for
each other.
(A) Kernel
(B) Shell
(C) Fork
(D) Deadlock
(E) None of the above

226) In DOS the DIR command is used to.......


(A) Display Information
(B) Display list of files & Sub directories
(C) Delete files
(D) Copy files
(E) None of the above

227) ...... is the program which interprets commands given by the user?
(A) Kernel
(B) Shell
(C) Fork
(D) Thread
(E) None of the above

228) Which of the following is an MS-DOS external command?


(A) DIR
(B) COPY
(C) FORMAT
(D) PROMPT
(E) None of the above

229) In DOS label command is used to....


(A) Create the label of disk
(B) Change the label of disk
(C) Both (A) & (B)
(D) Only (A)
(E) None of the above

40
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
230) NTFS stands for.....
(A) New Technology File System
(B) New Transmission File System
(C) Net Transmission File System
(D) New Technology File System
(E) None of the above

231) Which of the following scheduling algorithms provide minimum average


waiting time?
(A) Round Robin (RR)
(B) First come First Serve (FCFS)
(C) Shortest Job First Scheduling
(D) Response Time
(E) None of the above

232) Medium term scheduler is based on


(A) Scroll in, Scroll out
(B) Fetch in, Fetch out
(C) Swap in, Swap out
(D) All of these
(E) None of the above

233) A computer is restarted by restart button or by pressing the Combination of


(Ctrl+Alt+Del). This type of booting is called
(A) Cold Booting
(B) Warm Booting
(C) Both (A) and (B)
(D) Only (A)
(E) None of the above

234) Which of the following is a type of Semaphores?


(A) Binary Semaphore
(B) Counting Semaphore
(C) Both(A) & (B)
(D) Only (A)
(E) None of the above

235) ....... are required to complete a critical task within a guaranteed amount of
time.
(A) Real Time Operating Systems
(B) Multi Tasking Operating Systems
(C) Distributed Operating Systems
(D) Real Time Streaming Protocol
41
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
(E) None of the above

236) Long Term Scheduler is a......


(A) CPU scheduler
(B) process swapping scheduler
(C) job scheduler
(D) long term scheduler
(E) None of the above

237) ...... is a way of processing data serially.


(A) spooling
(B) caching
(C) Paging
(D) All of the above
(E) None of the above

238) Which of the following is true for the algorithms for memory allocation?
(A) First Fit
(B) Best Fit
(C) Worst Fit
(D) All of the above
(E) None of the above

239) Which type of scheduler typically uses a FIFO or Priority queue?


(A) Short Term Scheduler
(B) Medium Term Scheduler
(C) Long Term Scheduler
(D) All of the above
(E) None of the above

240) Which of the following is a solution to fragmentation problem?


(A) Thread
(B) Kernel
(C) Paging
(D) All of the above
(E) None of the above

241) First Come First Serve(FCFS) is


(A) Preemptive scheduling
(B) Non-preemptive scheduling
(C) deadline scheduling
(D) Round Robin
(E) None of the above
42
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
242) A variant of deadlock is called....
(A) Mutex lock
(B) Live lock
(C) Both(A) & (B)
(D) Only (A)
(E) None of the above

243) ..... is a system call that causes the caller to block.


(A) Await
(B) Sleep
(C) Wakeup
(D) Fork
(E) None of the above

244) ...... is the most used method to communicate over a network.


(A) Sockets
(B) Semaphores
(C) Pipes
(D) Rollback
(E) None of the above

245) ...... is the process of switching of CPU from one thread to another.
(A) Process handling
(B) interrupt handling
(C) Context switching
(D) Handling
(E) None of the above

246) Which of the following is an example of Real Time Operating Systems?


(A) Lynx OS
(B) Mac OS
(C) UNIX
(D) OS/2
(E) None of the above

247) Which of the following is a function of an OS?


(A) Process Management
(B) I/O Management
(C) Memory Management
(D) All of the above
(E) None of the above

43
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
248) In DOS, ECHO command is used to....
(A) display message on screen
(B) display the contents of a text file
(C) Both (A) & (B)
(D) Only (A)
(E) None of the above

249) Which of the following is an external command of DOS?


(A) CALL
(B) SHIFT
(C) TITLE
(D) FORMAT
(E) None of the above

250) ...... is a technique used to speed up communication with slow devices.


(A) Fragmentation
(B) Caching
(C) Segmentation
(D) Jacketing
(E) None of the above

251) A postfix expression is merely the _____ of the prefix expression.


(A) Forward
(B) Reverse
(C) Inverse
(D) List
(E) None of the above

252) Which of the following begins the search with the element that is located in
the middle of the Array?
(A) Random Search
(B) Parallel Search
(C) Binary Search
(D) Serial Search
(E) None of the above

253) In a Circular linked list, insertion of a record involves the modification of____
(A) 1 Pointer
(B) 2 Pointer
(C) 3 Pointer
(D) 4Pointer
(E) None of the above

44
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
254) Which of the following is useful in traversing a given graph by breadth first
search?
(A) Stack
(B) List
(C) Queue
(D) Binary
(E) None of the above

255) A characteristic of the data that binary search uses but linear search ignores
is______
(A) Order of the list
(B) length of the list
(C) Both (A) & (B)
(D) Only (B)
(E) None of the above

256) A sort which iteratively passes through a list to exchange the first element
with any element less than it and then repeats with a new first element is
called__________
(A) Heap Sort
(B) Quick Sort
(C) Selection Sort
(D) Merge Sort
(E) None of the above

257) To insert a node in a circular list at rear position, it should be inserted at


______ of the Queue.
(A) Front – 1 position
(B) Rear position
(C) Front position
(D) Rear – 1 position
(E) None of the above

258) In an extended-binary tree, the nodes with two children are called ........
(A) Interior node
(B) Domestic node
(C) Internal node
(D) Inner node
(E) None of the above

259) A terminal node in a binary tree is called ______


(A) Child
45
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
(B) Leaf
(C) Branch
(D) List
(E) None of the above

260) Sequential representation of binary tree uses ______


(A) Three dimensional arrays
(B) Array with pointers
(C) Two dimensional arrays
(D) One dimensional arrays
(E) None of the above

261) In linked list, an element can be inserted at _______


(A) beginning of the list
(B) end of the list
(C) middle of the list
(D) Both (A) & (B)
(E) None of the above

262) Which of the following is/are real time application(s) of Circular linked list?
(A) Printer
(B) Multi player games
(C) Interrupts handling in real-time systems
(D) All of the above
(E) None of the above

263) Stack is also called______


(A) Pop up array
(B) Pop down list
(C) Push down list
(D) Push up array
(E) None of the above

264) Prim’s algorithm is a ________


(A) Greedy algorithm
(B) Backtracking algorithm
(C) Divide and Conquer method
(D) Multi player games
(E) None of the above

265) A heap allows a very efficient implementation of a _______


(A) Stack
(B) Tree
46
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
(C) priority queue
(D) Queue
(E) None of the above

266) ________is an algorithm that builds a solution by repeated selecting the


cheapest among all options at each stage.
(A) Greedy algorithm
(B) Backtracking algorithm
(C) Divide and Conquer method
(D) Banker’s algorithm
(E) None of the above

267) The Complexity of Quick Sort algorithm is ______


(A) O (n^2)
(B) O (n log n)
(C) O (n)
(D) log n
(E) None of the above

268) The best average behaviour is shown by________


(A) Heap Sort
(B) Insertion Sort
(C) Quick Sort
(D) Bubble Sort
(E) None of the above

269) A mathematical-model of user defined type along with the collection of all
operations defined on that model is known as ______
(A) Data Structure
(B) Primitive Data Type
(C) Algorithm
(D) Abstract Data Type
(E) None of the above

270) In ________ traversal we can convert a binary tree into its mirror image.
(A) In order
(B) Pre order
(C) Post order
(D) Traversal order
(E) None of the above

271) The performance of an algorithm is measured on the basis of_______


(A) Time Complexity
47
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
(B) Space Complexity
(C) Both (A) & (B)
(D) Only (A)
(E) None of the above

272) A set of functions that grow slower than or at the same rate as expression is
represented by_____
(A) Big Omega notation
(B) Theta notation
(C) Big O notation
(D) All of these
(E) None of the above

273) The average time complexity of Insertion sort algorithm is________


(A) O (n^2)
(B) O (n log n)
(C) O (n)
(D) log n
(E) None of the above

274) Which of the following is not a stable sort?


(A) Insertion Sort
(B) Heap Sort
(C) Merge Sort
(D) Quick Sort
(E) None of the above

275) The space required to store the values of all the constants and variables is
called_______
(A) Instruction space
(B) Data Space
(C) Environment Space
(D) Graphs
(E) None of the above

276) In Heap data structure, If the parent nodes are greater than their children
nodes then it is called __________
(A) Max-Heap
(B) Min-Heap
(C) Both (A) & (B)
(D) Only (A)
(E) None of the above

48
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
277) The Quick sort algorithm divides the list into ______ main parts
(A) Four
(B) Six
(C) Five
(D) Three
(E) None of the above

278) Circular linked list can also be used to create _____


(A) Priority Queue
(B) Double ended Queue
(C) Circular queue
(D) Enqueue
(E) None of the above

279) Which of the following is/are real-time application(s) of Queue?


(A) Printer
(B) CPU task scheduling
(C) Interrupts handling in real-time systems
(D) All of the above
(E) None of the above

280) Linked Lists are used to implement______


(A) Stacks
(B) Graphs
(C) Queues
(D) All of the above
(E) None of the above

281) Linear search is also called .......


(A) Interpolation Search
(B) Transpose Sequential Search
(C) Sequential Search
(D) After Search
(E) None of the above

282) The Array as an Abstract Data Type (ADT) supports ..... operations.
(A) Store
(B) Retrieve
(C) Both (A) & (B)
(D) Only (A)
(E) None of the above

49
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
283) Each position of the hash table is called ......
(A) Bucket
(B) Entry
(C) Cell
(D) Slot
(E) None of the above

284) The common way of keeping subsequent items within the table and computing
possible positions is termed as ............
(A) Direct Chaining
(B) Open Addressing
(C) Both (A) & (B)
(D) Only (A)
(E) None of the above

285) An extra key inserted at the end of an Array is known as.........


(A) Sentinel
(B) Stop key
(C) Both (A) & (B)
(D) Bucket
(E) None of the above

286) In Binary Tree Traversal, the node is visited after both trees is called.......
(A) pre order
(B) In order
(C) post order
(D) traversal
(E) None of the above

287) Shell Sort is also called .......


(A) Partition exchange sort
(B) Diminishing increment sort
(C) Both (A) & (B)
(D) Merge sort
(E) None of the above

288) The complexity of Merge sort algorithm is.........


(A) O (log n)
(B) O (n log n)
(C) O (n^2)
(D) n2
(E) None of the above

50
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
289) ...... is a header list in which the last node points back to the header node.
(A) Circular Header linked list
(B) Grounded Header linked list
(C) Both (A) & (B)
(D) Only (A)
(E) None of the above

290) A pointer that contains the address of a heap-dynamic variable is called .....
(A) Dangling pointer
(B) Null pointer
(C) Void pointer
(D) Function pointer
(E) None of the above

291) The complexity of Bubble sort algorithm is .........


(A) O (log n)
(B) O (n log n)
(C) O (n^2)
(D) log n
(E) None of the above

292) Which of the following data structure stores heterogeneous data elements?
(A) Record
(B) Pointer
(C) Linear Array
(D) Pointer
(E) None of the above

293) ....... is required for languages that support dynamic data structure.
(A) Stack allocation
(B) Static allocation
(C) Heap allocation
(D) Quick allocation
(E) None of the above

294) In Binary Tree Traversal, the node is visited before its left and right sub trees
is called.......
(A) pre order
(B) In order
(C) post order
(D) traversal order
(E) None of the above

51
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
295) Which of the following is non linear data structure?
(A) Stack
(B) Tree
(C) Queue
(D) Linked list
(E) None of the above

296) Which algorithm solves the all pairs shortest path problem ?
(A) Floyd’s algorithm
(B) Prim’s algorithm
(C) Both (A) & (B)
(D) Randomized algorithm
(E) None of the above

297) Pre order traversal is also known as .......


(A) depth-first order
(B) end order
(C) symmetric order
(D) In order
(E) None of the above

298) Queues can be used to implement ......


(A) recursion
(B) quick sort
(C) radix sort
(D) Merge sort
(E) None of the above

299) ...... is a header list in which the last node contains the null pointer.
(A) Circular Header list
(B) Grounded Header list
(C) Both (A) & (B)
(D) Linked list
(E) None of the above

300) Quicksort is also called .......


(A) Partition exchange sort
(B) Diminishing increment sort
(C) Both (A) & (B)
(D) Merge sort
(E) None of the above

301) In Queue, the elements added at.....end


52
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
(A) front
(B) rear
(C) top
(D) base
(E) None of the above

302) The terms “POP” and “PUSH” are related to.....


(A) queue
(B) stack
(C) linked list
(D) bubble sort
(E) None of the above

303)Stack is also called a .......


(A) Last In First Out
(B) First In First Out
(C) LIFO & FIFO
(D) Sequential
(E) None of the above

304) The largest element of an Array Index is called......


(A) Range
(B) Upper bound
(C) lower bound
(D) Stack
(E) None of the above

305) The memory address of the first element of an array is called...


(A) first address
(B) floor address
(C) base address
(D) Second address
(E) None of the above

306) The complexity of shellsort is


(A) O(log)
(B) O(n^2)
(C) O(n (log n)^2)
(D) log n
(E) None of the above

307) Which of the following is a linear data structure?


(A) Array
53
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
(B) Graph
(C) Tree
(D) Queue
(E) None of the above

308) ..... is a technique to convert a range of key values into a range of Indices of an
Array?
(A) Thrashing
(B) Hashing
(C) Interpolation
(D) Graph
(E) None of the above

309) ....... is a queue with limited number of elements.


(A) Bounded queue
(B) Unbounded queue
(C) Both (A) & (B)
(D) Only (A)
(E) None of the above

310) An odd-even sort is also called......


(A) Bubble Sort
(B) Heap Sort
(C) Quick Sort
(D) Brick Sort
(E) None of the above

311) ....... contains the information about an array used in a program.


(A) Dope vector
(B) Record
(C) Table
(D) Tree
(E) None of the above

312) The term DEQUE refers......


(A) single ended queue
(B) double ended queue
(C) Both (A) & (B)
(D) Only (A)
(E) None of the above

313) A sort that compares each element with its adjacent element in a list is
called.....
54
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
(A) Bubble Sort
(B) Insertion Sort
(C) Quick Sort
(D) Heap Sort
(E) None of the above

314) Which of the following data structure is required to evaluate a post fix
expression?
(A) Stack
(B) linked list
(C) Array
(D) Bubble sort
(E) None of the above

315) A linked list that has no beginning and no end is called.....


(A) Doubly linked list
(B) Singly linked list
(C) Circular linked list
(D) Binary Search
(E) None of the above

316) In order traversal is also known as......


(A) Pre order
(B) Symmetric order
(C) End order
(D) In order
(E) None of the above

317) A matrix in which number of zero elements are much higher than the number
of non zero elements is called
(A) Scalar Matrix
(B) Identity Matrix
(C) Sparse Matrix
(D) Vector Matrix
(E) None of the above

318) Which of the following is the slowest sorting algorithm?


(A) Heap Sort
(B) Insertion Sort
(C) Quick Sort
(D) Bubble Sort
(E) None of the above

55
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
319) The smallest element of an Array’s index is known as.....
(A) Range
(B) Upper bound
(C) Lower bound
(D) Linked list
(E) None of the above

320) Which data structure is required to check balanced parenthesis in an


expression?
(A) Linked List
(B) Queue
(C) Tree
(D) Stack
(E) None of the above

321) A linear list in which elements can be added/removed at either end but not in
the middle is called
(A) Deque
(B) Stack
(C) List
(D) Queue
(E) None of the above

322) Which of the following is the best sorting algorithm when the list is already
sorted?
(A) Bubble Sort
(B) Insertion Sort
(C) Quick Sort
(D) Heap Sort
(E) None of the above

323) The representation of data structure in memory is called


(A) memory structure
(B) abstract data type
(C) recursive
(D) file structure
(E) None of the above

324) The complexity of Heapsort algorithm is


(A) O(n^2)
(B) O( n log n)
(C) O(1)
(D) n2
56
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
(E) None of the above

325) In Queue, the items deleted at.....end


(A) front
(B) rear
(C) top
(D) base
(E) None of the above

326) Which data structure is needed to convert infix notation to post fix notation?
(A) Branch
(B) Queue
(C) Tree
(D) Stack
(E) None of the above

327) In a circular linked list, insertion of a record involves modification of


(A) Multiple pointer
(B) One pointer
(C) Two pointer
(D) Four pointer
(E) None of the above

328) Which data structure is used for implementing recursion?


(A) Queue
(B) Stack
(C) Arrays
(D) List
(E) None of the above

329)The drawback of the binary tree sort is remedied by


(A) Bubble Sort
(B) Insertion Sort
(C) Quick Sort
(D) Heap Sort
(E) None of the above

330) Which of the following is the method of graph traversal?


(A) Breadth first search
(B) Depth first Search
(C) Both (A) & (B)
(D) Binary Search
(E) None of the above
57
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
331) Print Server uses ..... which is a buffer that holds data before it is send to the
printer
(A) Queue
(B) Stack
(C) Spool
(D) Pointer
(E) None of the above

332) ...... is a balanced binary search tree in which the difference between the
height of any node’s left and right subtree is at most one.
(A) AVL Tree
(B) Red-Black Tree
(C) 2-3-4 Tree
(D) Binary Tree
(E) None of the above

333) Enqueue means to insert an item into the ....... of the Queue
(A) front
(B) rear
(C) middle
(D) back
(E) None of the above

334) The process of deleting an element from the top of stack is called ..... operation
(A) POP
(B) PUSH
(C) Both (A) & (B)
(D) Only (A)
(E) None of the above

335) Merge Sort is based on ........


(A) Greedy approach
(B) Backtracking algorithm
(C) Divide and Conquer method
(D) Prim’s algorithmm
(E) None of the above

336) Post order traversal is also known as......


(A) depth-first order
(B) end order
(C) symmetric order
(D) In order
58
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
(E) None of the above

337) A queue is a ....... data structure


(A) Last In First Out (LIFO)
(B) Linear Array
(C) First In First Out (FIFO)
(D) Binary search
(E) None of the above

338) Which of the following data structure stores homogeneous data elements?
(A) Record
(B) Pointer
(C) Linear Array
(D) Binary
(E) None of the above

339) An algorithm that calls itself directly or indirectly is called ......


(A) Iteration
(B) Recursion
(C) Traversal
(D) Pre - order
(E) None of the above

340) Which of the following is used to find the location of an element with a given
value?
(A) Search
(B) Iteration
(C) Traversal
(D) Recursion
(E) None of the above

341) The term “PUSH” is used to ...... an element into a stack


(A) Update
(B) Edit
(C) Insert
(D) Full
(E) None of the above

342) The condition “FRONT = NULL” represents that the queue is.....
(A) Overflow
(B) Empty
(C) Full
(D) Update
59
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
(E) None of the above

343) A linked list is also called


(A) One way list
(B) Multi way list
(C) Single way list
(D) Double way list
(E) None of the above

344) Which data structure represents hierarchical relationship between various


elements?
(A) Linked List
(B) Tree
(C) Array
(D) Binary
(E) None of the above

345) The process of accessing data stored in a tape is similar to handle data on.......
(A) Linked List
(B) Tree
(C) Array
(D) Queue
(E) None of the above

346) Which of the following search start at the beginning of the list and each
element in the list?
(A) Linear Search
(B) Binary Tree Search
(C) Hash Search
(D) Binary Search
(E) None of the above

347) In Binary Tree Traversal, the node is visited between the sub trees is called......
(A) Pre-order traversal
(B) In-order traversal
(C) Post-order traversal
(D) Directory traversal
(E) None of the above

348) Which of the following data structure is indexed data structure?


(A) Linked List
(B) Stack
(C) Queue
60
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
(D) Linear Array
(E) None of the above

349) ........ is a data structure in which each node has at most two children.
(A) Red-Black Tree
(B) Binary Tree
(C) AVL Tree
(D) Linear Tree
(E) None of the above

350) Which of the following sorting algorithm is not an internal sort?


(A) Bubble Sort
(B) Insertion Sort
(C) Merge Sort
(D) Heap Sort
(E) None of the above

351) In CSS, you can override precedence rules by adding the ____ property to a
style declaration.
A. !override
B. !main
C. !important
D. !priority
E. None of these

352) Which of the following class in JSP provides the capability to implement a
growable array of objects?
A. Array class
B. GrowAbleArray class
C. Container class
D. Vector class
E. None of these

353) Which XML extension is a standard way to describe how to transform the
structure of an XML document into an XML document with a different structure?
A. tree structure
B. XSLT
C. Both (A) & (B)
D. array class
E. None of these

354) In JSP, the classes that allow primitive types to be accessed as objects are
known as________
61
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
A. Primitive classes
B. Object classes
C. Boxing classes
D. Wrapper classes.
E. None of these

355) Which XML-based registry is intended as on online Internet registry for


businesses worldwide?
A. Universal Plug and Play(UPnP)
B. UDF
C. Uniform Resource Locator(URL)
D. Universal Description Discovery and Integration(UDDI)
E. None of these

356) Which language is considered to be extensible because of its unlimited and


self-defining markup symbols?
A. HTML
B. XHTML
C. XML
D. XSLT
E. None of these

357) In JSP, a Canvas object provides access to a Graphics object via one of its
method called______
A. getCanvas()
B. getGraphics()
C. accessGraphics().
D. paint()
E. None of these

358) HTML defines ________ levels of headings.


A. Five
B. Four
C. Six
D. Three
E. None of these

359) Which method of the Component class is used to set the position and size of a
component in JSP?
A. setSize()
B. setPositionSize()
C. setPosition()
D. setBounds()
62
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
E. None of these

360) What method is used to specify a container’s layout in JSP?


A. setLayout()
B. Layout()
C. setContainerLayout()
D. setConLayout()
E. None of these

361) Which of the following is not an advantage of CSS?


A. Easy Maintenance
B. Offline Browsing
C. Multiple Device Compatibility
D. Platform Dependent
E. None of these

362) In CSS, which cursor indicates that an edge of a box is to be moved down?
A. se-resize
B. sw-resize
C. w-resize
D. s-resize
E. None of these

363) Which of the following is a front-end framework for web development?


A. Ruby
B. Bootstrap
C. PHP
D. Python
E. None of these

364) An alternative of JavaScript on windows platform is________


A. VBScript
B. ASP.NET
C. JSP
D. PHP
E. None of these

365) AJAX stands for_________


A. Advanced JSP and XML
B. Asynchronous JSP and XML
C. Advanced JS and XML
D. Asynchronous JavaScript and XML
E. None of these
63
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
366) Which of the following is a boolean cookie attribute in JS?
A. domain
B. lookup
C. secure
D. range
E. None of these

367) _______ method returns the character at a specified index in a string?


A. CharCodeAt()
B. substring()
C. charAt()
D. codeAt()
E. None of these

368) Which of the following is used to describe elements in CSS?


A. Selectors
B. Protectors
C. Both (A) & (B)
D. Pointer
E. None of these

369) What are the events generated by the Node objects called?
A. generators
B. highevents
C. emitters
D. secure
E. None of these

370) Which of the following is a stateless protocol?


A. TCP
B. HTTP
C. HTML
D. XHTML
E. None of these

371) Which one of the following objects is passed to a JavaBean when one of its
properties is set via a JSP action?
A. ServletRequest
B. HTTPServletRequest
C. ServletResponse
D. HTTPServletResponse
E. None of these
64
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
372) Which of the following are used by servlet containers to set JavaBean
properties?
A. cookies
B. form fields
C. memory
D. disk
E. None of these

373) ________ header gives the MIME type of the response document.
A. Content Encoding
B. Content Language
C. Content Length
D. Content Type
E. None of these

374) The term “Hypertext” means _______


A. Hypermedia
B. Non-Sequential writing
C. Blinking text
D. Hypertext
E. None of these

375) Which of the following is not a JSP Implicit Object?


A. In
B. Out
C. Page
D. Response
E. None of these

376) Where are cookies stored?


A. on the server
B. In Web.xml
C. On the Client
D. In HTML
E. None of these

377) Document Type Declaration includes ______


A. Element Declarations
B. Attribute Declarations
C. Entity Declarations
D. All of the Above
E. None of these
65
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
378) The XML DOM object is _________
A. Entity Reference
B. Comment Reference
C. Both (A) and (B)
D. All of the Above
E. None of these

379) Any part of the graphic that is not included in another hot zone is considered
to be part of _______
A. rect
B. point
C. default
D. polygon
E. None of these

380) SAX stands for________


A. Simple Application for XML
B. Smart Application for XML
C. Smart API for XML
D. Simple API for XML
E. None of these

381) In CSS, ______ property controls the capitalization of text.


(A) text-decoration
(B) text-indent
(C) text-shadow
(D) text-transform
(E) None of these

382) Which properties are used to generate space around elements?


(A) CSS Borders
(B) CSS Margins
(C) CSS Padding
(D) All of these
(E) None of these

383) In CSS, _______ property creates or resets one or more counters.


(A) Content
(B) Counter-increment
(C) Counter-reset
(D) Comment reference
(E) None of these
66
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
384) ________ method replaces a specified value with another value in a string?
(A) CharCodeAt()
(B) CharAt()
(C) Concat()
(D) replace()
(E) None of these

385) In JavaScript, _____ method returns a number as a number.


(A) valueOf()
(B) toPrecision()
(C) toExponential()
(D) toString()
(E) None of these

386) Which method is used to replace an element to the HTML DOM(Document


Object Model)?
(A) removeChild()
(B) replaceChild()
(C) Both(A) & (B)
(D) Only(A)
(E) None of these

387) Which of the following attribute is a boolean attribute?


(A) autocomplete
(B) placeholder
(C) step
(D) autofocus
(E) None of these

388) Which of the following message denotes the server is currently unavailable?
(A) 500 Internal server Error
(B) 501 Not Implemented
(C) 503 Service Unavailable
(D) 504 Gateway Time out
(E) None of these

389) Which of the following is used to define the content of web pages?
(A) HTML
(B) CSS
(C) Java Script
(D) DSS
(E) None of these
67
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
390) In JS,__________ returns a number, converted from its argument.
(A) parseFloat()
(B) toPrecision()
(C) toExponential()
(D) number()
(E) None of these

391) Which of the following was designed to store and transport data?
(A) Java Script
(B) HTML
(C) XML
(D) CSS
(E) None of these

392) ______ language has no predefined tags.


(A) XML
(B) HTML
(C) Both (A) and (B)
(D) None of the above
(E) None of these

393) ________message denotes the request has been fulfilled and a new source is
created.
(A) 202 Accepted
(B) 201 created
(C) 403 Forbidden
(D) 404 Not Found
(E) None of these

394) Cascading Style Sheets(CSS) can be used to create an ______


(A) Image Gallery
(B) Image Opacity
(C) Image Sprites
(D) All of these
(E) None of these

395) JavaScript can change all the ___________ in the web page.
(A) HTML elements
(B) CSS Styles
(C) HTML attributes
(D) All of the above
(E) None of these
68
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
396)In JS, the ______ method returns the index of the last occurrence of a
specified text in a string.
(A) slice()
(B) substr()
(C) lastIndex()
(D) search()
(E) None of these

397) ________ message denotes the request can not be fulfilled due to the wrong
syntax.
(A) 202 Accepted
(B) 400 Bad Request
(C) 403 Forbidden
(D) 404 Not Found
(E) None of these

398) In JavaScript, _____ method returns a number as a string.


(A) valueOf()
(B) toPrecision()
(C) toExponential()
(D) toString()
(E) None of these

399) Which properties are used to generate space around content?


(A) CSS Borders
(B) CSS Margins
(C) CSS Padding
(D) CSS Styles
(E) None of these

400)In CSS, _______ property can be used to wrap text around images?
(A) float
(B) clear
(C) Both(A) & (B)
(D) Value
(E) None of these

401) Which of the following is used to specify the layout of web pages?
(A) HTML
(B) CSS
(C) Java Script
(D) HTTP
69
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
(E) None of the above

402) In Java Script, the multi-line comment is denoted as ________


(A) //
(B) /*/
(C) /* */
(D) /*/*
(E) None of the above

403) In JS, The ______ method searches a string for a specified value and returns
the position of match.
(A) slice()
(B) substr()
(C) index()
(D) search()
(E) None of the above

404) In Java Script, the _____ method returns the new array length.
(A) shift()
(B) substr()
(C) index()
(D) unshift()
(E) None of the above

405) In Java Script, which statement lets you to handle the error?
(A) try
(B) catch
(C) Both (A) & (B)
(D) index
(E) None of the above

406) Which property is very useful for getting or replacing the content of HTML
elements?
(A) innerHTML
(B) outerHTML
(C) Both(A) & (B)
(D) Only (B)
(E) None of the above

407) Which of the following function converts an object’s value to a number?


(A) Number()
(B) isNaN()
(C) isFinite()
70
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
(D) index()
(E) None of the above

408) ________message denotes the requested page could not be found and it may
be available in future?
(A) 202 Accepted
(B) 201 created
(C) 403 Forbidden
(D) 404 Not Found
(E) None of the above

409) Which of the following method can be cached?


(A) GET
(B) POST
(C) Both (A) and (B)
(D) Number
(E) None of the above

410) Which can reduce the number of server requests and save bandwidth?
(A) Image Gallery
(B) Image Opacity
(C) Image Sprites
(D) All of these
(E) None of the above

411) Which of the following property sets or returns the CORS settings of the
audio/video?
(A) controls
(B) crossOrigin
(C) currentSrc
(D) toolbox
(E) None of the above

412) The Javascript allows _____


(A) single line comment
(B) multi line comment
(C) Both(A) & (B)
(D) Only(A)
(E) None of the above

413) CSS Stands for______


(A) Combined Styling Sheets
(B) Cascading Style Sheets
71
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
(C) Current Style Sheets
(D) Cascading Script Sheets
(E) None of the above

414) Which of the following message denotes the requested page has moved
temporarily to a new URL?
(A) 202 Accepted
(B) 201 created
(C) 301 Moved Permanently
(D) 302 Found
(E) None of the above

415) In CSS, _______ property is used to control the behaviour of floating


elements?
(A) float
(B) clear
(C) Both(A) & (B)
(D) value
(E) None of the above

416) Which method returns the HTTP methods that the server supports?
(A) HEAD
(B) PUT
(C) DELETE
(D) OPTIONS
(E) None of the above

417) In Java Script, the single line comment is denoted as ________


(A) //
(B) /*/
(C) /* */
(D) /*/*
(E) None of the above

418) Java Script can be used to create ________


(A) cookies
(B) spam
(C) cache

(D) float
(E) None of the above

72
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
419) Which determines whether a value is a finite number?
(A) Number()
(B) isNaN()
(C) isFinite()
(D) index()
(E) None of the above

420) How many types of pop up boxes are used in JavaScript?


(A) One
(B) Two
(C) Four
(D) Three
(E) None of the above

421) The default display value for most elements is _____


(A) line
(B) block
(C) (A) or (B)
(D) add
(E) None of the above

422) XHTML stands for_________


(A) Extensible Hyper Text Markup Language
(B) Extended Hyper Text Markup Language
(C) Expensive Hyper Text Markup Language
(D) Extensible Hyper Text Marked Language
(E) None of the above

423) The attributes and elements of XHTML are must be in ______


(A) Upper-case
(B) Lower-case
(C) Both (A) and (B)
(D) case sensitive
(E) None of the above

424) Which of the following message denotes the requested page has moved to a
new URL?
(A) 202 Accepted
(B) 201 created
(C) 302 Found
(D) 301 Moved Permanently
(E) None of the above

73
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
425) Which of the following method uploads a representation of the specified URI?
(A) HEAD
(B) PUT
(C) DELETE
(D) OPTIONS
(E) None of the above

426) Which is a uniform naming scheme for locating resources on the web?
(A) Uniform Resource Identifier(URI)
(B) HTTP
(C) Resource Name
(D) HTML
(E) None of the above

427) Which of the following method cannot be bookmarked?


(A) GET
(B) POST
(C) Both (A) and (B)
(D) Index
(E) None of the above

428) Which of the following property returns the length of the current audio/video?
(A) error
(B) loop
(C) ended
(D) duration
(E) None of the above

429) Which method pauses the currently playing the audio/video?


(A) play()
(B) pause()
(C) load()
(D) resume()
(E) None of the above

430) XHTML is almost similar to _______


(A) HTML
(B) XML
(C) HTTP
(D) CSS
(E) None of the above

431) The ______ method submits data to be processed to a specified resource.


74
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
(A) GET
(B) POST
(C) Both (A) & (B)
(D) INDEX
(E) None of the above

432) Which of the following specifies a short cut key to activate or focus an
element?
(A) class
(B) hidden
(C) draggable
(D) access key
(E) None of the above

433) ______ specifies the tabbing order of an element.


(A) class
(B) hidden
(C) draggable
(D) tabindex
(E) None of the above

434) HTTP works as a ______ protocol between a Client and Server.


(A) request – response
(B) Standard
(C) Both (A) & (B)
(D) Only (B)
(E) None of the above

435)Which of the following method has length restrictions?


(A) GET
(B) POST
(C) Both (A) & (B)
(D) Value
(E) None of the above

436) ______ converts character into a format which can be transmitted over the
Internet?
(A) URL Encoding
(B) URL Decoding
(C) Both (A) & (B)
(D) URL
(E) None of the above

75
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
437) Which of the following method draws a “filled” rectangle?
(A) rect()
(B) clearRect()
(C) StrokeRect()
(D) fillRect()
(E) None of the above

438) Which is the standard response for successful HTTP requests?


(A) 202 Accepted
(B) 201 created
(C) 200 OK
(D) 302 Found
(E) None of the above

439) _______ creates an arc/curve between two tangents.


(A) arc()
(B) arcTo()
(C) quadraticCurveTO()
(D) All of these
(E) None of the above

440) ______ sets or returns whether the audio/video should start playing as soon
as it is loaded.
(A) audioTracks
(B) autoplay
(C) Controller
(D) Pause
(E) None of the above

441) Which of the following provide additional information about HTML elements?
(A) Headings
(B) Paragraphs
(C) Styles
(D) Attributes
(E) None of the above

442) The ______ method requests data from a specified source.


(A) GET
(B) POST
(C) Both (A) & (B)
(D) INDEX
(E) None of the above

76
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
443) Symbol used at the beginning of the HERF text is_______
(A) #
(B) $
(C) &
(D) ^
(E) None of the above

444) Which of the following method converts the request connection to a


transparent TCP/IP tunnel?
(A) HEAD
(B) PUT
(C) OPTIONS
(D) CONNECT
(E) None of the above

445) HTML is a subset of ______


(A) SGMT
(B) SGML
(C) SGMD
(D) CSS
(E) None of the above

446) The MIME text file is saved with _____


(A) THM extension
(B) HTML extension
(C) HMT extension
(D) HTTP extension
(E) None of the above

447) SGML stands for______


(A) Standard General Mark Language
(B) Security General Markup Language
(C) Standard Generalized Markup Language
(D) Standard Generalized Mark Language
(E) None of the above

448) HTML tags are surrounded by ______


(A) Square Brackets
(B) Curly Brackets
(C) Angle Brackets
(D) All of these
(E) None of the above

77
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
449) Extensible Markup Language (XML) tags are ____
(A) Case Insensitive
(B) Case Sensitive
(C) Both (A) & (B)
(D) Upper - Case
(E) None of the above

450) Document Object Model(DOM) is a ______


(A) Character User Interface (CUI)
(B) Application Programming Interface (API)
(C) Both (A) & (B)
(D) Only (A)
(E) None of the above

451) Which one of the following interrupt is non-maskable?


A. RDT 6.5
B. RST 7.5
C. INTR
D. TRAP
E. None of the above

452) One can interface with operating system by means of _________


A. Operating System Call
B. Operating System Command
C. Both (A) and (B)
D. Only (B)
E. None of the above

453) A file organization component of a Virtual Access Storage Method(VSAM) file is


________
A. relative record data set
B. keyed sequential data set
C. entry sequential data set
D. All of the Above
E. None of the above

454) When the maximum clock rate is quoted for a logic family it applies to
________
A. Shift register
B. Flip-Flop
C. Counter
D. All of these
E. None of the above
78
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
455) Which of the following UNIX command is used to create empty files?
A. cat
B. Vi
C. Pico
D. Touch
E. None of the above

456) Which of the following operators can be overloaded in C++?


A. Scope resolution operator
B. Size of operator
C. Conditional operator
D. arithmetic operator
E. None of the above

457) The mechanism that brings a page into memory only when it is needed is
called __________
A. Segmentation
B. Fragmentation
C. Demand paging
D. Caching
E. None of the above

458) Which of the following addressing modes permits relocation without any
change?
A. Indirect addressing
B. Indexed addressing
C. Base register addressing
D. PC relative addressing
E. None of the above

459) A __________ is a software that manages the time of a microprocessor to


ensure that all time critical events are processed as efficiently as possible. This
software allows the system activities to be divided into multiple independent
elements called tasks.
A. Kernel
B. Shell
C. Processor
D. Device Driver
E. None of the above

460) In OSI model, terminal emulation is done in ________


A. Session layer
79
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
B. Application layer
C. Presentation layer
D. Transport layer
E. None of the above

461) Which of the following is/are routing protocol(s)?


A. Appletalk
B. IPX
C. TCP/IP
D. All of the above
E. None of the above

462) An assembler that runs on one machine but produces machine code for
another machine is called ________
A. Simulator
B. Cross Assembler
C. Boot-strap loader
D. Accumulator
E. None of the above

463) The two basic types of record access methods are _______
A. Direct and indirect
B. On-line and real-time
C. Sequential and indexed
D. Direct and Sequential
E. None of the above

464) Which of the following is/are valid Protocol Data Units(PDU)?


A. Packets
B. Frame
C. Segments
D. All of the above
E. None of the above

465) Which of the following is/are type of UNIX Shell?


A. Korn Shell
B. Bourne Shell
C. C Shell
D. All of the above
E. None of the above

466) Which of the following is/are advantages of Virtual LANs (VLANs)?


A. They increase switching throughput
80
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
B. They reduce switching overhead
C. They simplify the adding, moving and changing of users
D. All of the above
E. None of the above

467) If a denormalization situation exists with a one to one binary relationship then
all fields are stored in ______
A. four relations
B. one relation
C. three relations
D. two relations
E. None of the above

468) Which of the following is/are advantages of using VLAN Trunking Protocol
(VTP) in a switching environment?
A. It allows switches to read tags
B. It enables VLANs to span multiple switches.
C. It simplifies the scalability of the switched work
D. All of the above
E. None of the above

469) When a network has multiple bridges and is using Spanning Tree Protocol, how
is the root bridge determined?
A. The bridge with the lowest ID number assumes the root bridge role.
B. The bridge with the highest ID number assumes the root bridge role.
C. The bridge with the lowest MAC address is always the root bridge.
D. All of the above
E. None of the above

470) Which of the following is/are congestion control algorithm(S)?


A. Resource reSerVation Protocol (RSVP)
B. Token Bucket
C. The leaky Bucket
D. All of the above
E. None of the above

471) Which of the following is the preferred way to recover a database after a
transaction in progress terminates abnormally?
A. Rollforward
B. Rollback
C. Reprocess transactions
D. Procedure call
E. None of the above
81
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
472) ___________ is usually a specialized hardware instruction dedicated to invoke
the Operating System.
A. Procedure Call
B. Supervisor Call
C. Both (A) and (B)
D. Software Interrupt
E. None of the above

473) _______ is a versatile instruction that is finding its way into an increasing
number of computer systems, especially microprocessors.
A. Procedure Call
B. Supervisor Call
C. Software Interrupt (SWI)
D. All of these
E. None of the above

474) A ________ is a collection of autonomous computer systems capable of


communication and cooperation via their hardware and software interconnections.
A. System
B. distributed computer system
C. Centralized Computer
D. Operating system
E. None of the above

475) Locking may cause which of the following problems?


A. Deadlock
B. Rollback
C. Reprocess
D. Counter
E. None of the above

476) A data warehouse administrator is concerned with which of the following?


A. The time to make a decision but not the typical roles of a database administrator
B. The time to make a decision and the typical roles of a database administrator
C. The typical roles of a database administrator and redesigning existing applications.
D. To ensure data integrity when updates occur to the database in user environment
E. None of the above

477) Concurrency control is important for which of the following reasons?


A. To ensure data integrity when updates occur to the database in single-user environment.
B. To ensure data integrity when updates occur to the database in Multi-user environment.
C. To ensure data integrity while reading data occurs to the database in Multi-user
82
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
environment.
D. To ensure a database administrator and redesigning existing application
E. None of the above

478) Which of the following is associated with implementation of e-commerce?


A. LAN
B. WLAN
C. VLAN
D. VAN
E. None of the above

479) Which of the following makes Web insecure?


A. RSA security algorithm
B. Network Interface Card (NIC)
C. Static keys
D. Value Added Network(VAN)
E. None of the above

480) The buffer in DBMS has data that has to be__________


A. Accessed
B. Read
C. Transmitted
D. All of the above
E. None of the above

481) Concept of developing a compiler for a language by using subsets of the same
language?
A. Bootstrap
B. Lex
C. Yacc
D. All of these
E. None of the above

482) System Calls are usually invoked by using ______


A. Hardware Interrupt
B. Software Interrupt
C. Polling
D. An Indirect jump
E. None of the above

483) A detective control is used to check if correct numbers are keyed in _______
A. Sequence Check
B. Manual Check
83
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
C. Check digit
D. All of these
E. None of the above

484) In object-oriented technology hiding the complexity of characteristics is called


________
A. Inheritance
B. Polymorphism
C. Abstraction
D. Recursion
E. None of the above

485) _________ is a component of on-line shopping mall.


A. Shopping Cart
B. Customer databases
C. Inventory Control systems
D. All of the above
E. None of the above

486) Which of these e-commerce systems handle non-monetary documents?


A. SWIFT
B. EFTS
C. EDI
D. URL
E. None of the above

487) Which of the following is/are part(S) of EDI?


A. Trading partners
B. Data segment
C. Encryption
D. All of the above
E. None of the above

488) Which of the following is the job of a DNS?


A. Name is displayed
B. File is transferred
C. IP address is displayed
D. All of the above
E. None of the above

489) Which of these determines authorised sign in an EDI transaction?


A. Spoofing
B. Masking
84
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
C. private key Cryptosystem
D. Digital Signature
E. None of the above

490) _______ is associated with implementation of E-Commerce.


A. Local Area Network
B. Wireless LAN
C. Value Added Network
D. All of the above
E. None of the above

491) Which of the following feature is related to bottom up parsing?


A. Shift
B. Reduce
C. Precedence Relation
D. All of the Above
E. None of the above

492) You need to configure a switch from a remote subnet.Which of the following
must be configured on the switch?
A. IP
B. Console part
C. SNMP
D. Default gateway
E. None of the above

493) “Each packet contains the full source and destination address”.This statement
indicates which of the following?
A. FDDI
B. Data link
C. Data gram
D. Virtual Circuit
E. None of the above

494) RST 6.5 is _______


A. Maskable Interrupt
B. Vector Interrupt
C. Both (A) and (B)
D. Only (A)
E. None of the above

495) Creating a _______ eliminate the need to qualify the object name with the
schema and provides you with an alternative name for a table, view, sequence,
85
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
procedure or other objects.
A. synonym
B. Antonym
C. Column
D. Alias
E. None of the above

496) Data bus is _______


A. Unidirectional
B. Bidirectional
C. Multidirectional
D. Directional
E. None of the above

497) Which of the following is/are application(S) of Flip-Flop?


A. Latch
B. Counter
C. Bounce elimination switch
D. All of the Above
E. None of the above

498) Round Robin(RR) scheduling algorithm falls under the category of _________
A. Preemptive scheduling
B. Non-Preemptive scheduling
C. Both (A) and (B)
D. Only (B)
E. None of the above

499) Which of the following is a variation of Frequency Division Multiplexing(FDM)?


A. Time Division Multiplexing
B. Pulse Code Modulation
C. Wavelength Division Multiplexing
D. Backus - Naur Form
E. None of the above

500) Backus-Naur Form (BNF) is a meta language for___________


A. Specifying the syntax of a language
B. Specifying a context free language
C. Both (A) and (B)
D. Only (A)
E. None of the above

86
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
501) How does applet and servlet communicate?
a) HTTP
b) HTTPS
c) FTP
d) HTTP Tunneling
e) None of these

502) Which class provides system independent server side implementation?


a) Socket
b) ServerSocket
c) Server
d) ServerReader
e) None of these

503) What happens is ServerSocket is not able to listen on the specified port?
a) The system exits gracefully with appropriate message
b) The system will wait till port is free
c) IOException is thrwon when opening the socket
d) PortOccupiedException is thrown
e)None of these

504) What does bind() method of ServerSocket offer?


a) binds the serversocket to a specific address (IPAddress and port)
b) binds the server and client browser
c) binds the server socket to the JVM
d) binds the port to the JVM
e)None of these

505) Which of the below are common network protocols?


a) TCP
b) UDP
c) TCP and UDP
d) CNP
e)None of these

506) Which class represents an Internet Protocol address?


a) InetAddress
b) Address
c) IPAddress
d) TCPAddress
e) None of these

87
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
507) What is the java method for ping?
a) hostReachable()
b) ping()
c) isReachable()
d) portBusy()
e) None of these

508) To access the services of operating system, the interface is provided by the
a) System calls
b) API
c) Library
d) Assembly instructions
e) none of these

509) Which one of the following is not true?


a) kernel is the program that constitutes the central core of the operating system
b) kernel is the first part of operating system to load into memory during booting
c) kernel is made of various modules which can not be loaded in running operating system
d) kernel remains in the memory during the entire computer session
e) None of these

510) Which one of the following error will be handle by the operating system?
a) power failure
b) lack of paper in printer
c) connection failure in the network
d) all of the mentioned
e) None of these

511) Which facility dynamically adds probes to a running system, both in user processes
and in the kernel?
a) DTrace
b) DLocate
c) DMap
d) DAdd
e) None of these

512) Which one of the following is not a real time operating system?
a) VxWorks
b) Windows CE
c) RTLinux
d) Palm OS
e) None of these

88
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
513) The OS X has ____________
a) monolithic kernel
b) hybrid kernel
c) microkernel
d) monolithic kernel with modules
e) none of these

514) In operating system, each process has its own


a) address space and global variables
b) open files
c) pending alarms, signals and signal handlers
d) all of the mentioned
e) none of these

515) A process can be terminated due to


a) normal exit
b) fatal error
c) killed by another process
d) all of the mentioned
e) None of these

516) A process stack does not contain


a) Function parameters
b) Local variables
c) Return addresses
d) PID of child process
e) none of these

517) Which of the following are forms of malicious attack ?


a) Theft of information
b) Modification of data
c) Wiping of information
d) All of the mentioned
e) None of these

518) What are common security threats ?


a) File Shredding
b) File sharing and permission
c) File corrupting
d) File integrity
e) None of these

89
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
519) Which of the following is a good practice ?
a) Give full permission for remote transferring
b) Grant read only permission
c) Grant limited permission to specified account
d) Give both read and write permission but not execute
e) None of these

520) What is not a good practice for user administration ?


a) Isolating a system after a compromise
b) Perform random auditing procedures
c) Granting privileges on a per host basis
d) Using telnet and FTP for remote access
e) none of these

521) Why is one time password safe ?


a) It is easy to generated
b) It cannot be shared
c) It is different for every access
d) It is a complex enctypted password
e) None of these

522) What is characteristic of RADIUS system ?


a) It is essential for centralized encryption and authentication
b) It works on Network layer to deny access to unauthorized people
c) It provides centralized authentication mechanism via network devices
d) It’s a strong File access system
e) None of these

523) What is characteristics of Authorization ?


a) RADIUS and RSA
b) 3 way handshaking with syn and fin
c) Multilayered protection for securing resources
d) Deals with privileges and rights
e) None of these

524) What forces the user to change password at first logon ?


a) Default behavior of OS
b) Part of AES encryption practice
c) Devices being accessed forces the user
d) Account administrator
e) None of these

90
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
525) What is not a best practice for password policy ?
a) Deciding maximum age of password
b) Restriction on password reuse and history
c) Password encryption
d) Having change password every 2 years
e) None of these

526) The addressing mode/s, which uses the PC instead of a general purpose register is
______
a) Indexed with offset
b) Relative
c) Definite
d) Direct
e) None of these

527) A low memory can be connected to microprocessor by using


a) Ready
b) New
c) Hold
d) Operand
e) None of these

528) In case of, Zero-address instruction method the operands are stored in _____
a) Offset
b) Register
c) Push down stack
d) Indexed
e) None of these

529) The addressing mode used in an instruction of the form ADD X, Y, is


a) Absolute
b) Logical
c) Address
d) Relative
e) None of these

530) The bits used to indicate the status of the page in the memory is called ______
a) Control bits
b) Frame
c) Memory
d) Page
e) None of these

91
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
531) Microprocessor 8085 is the enhanced version of ......... with essentially the same
construction set
a) 6800
b) 7000
c) 7500
d) 8080
e) None of these

532) The _______ bit is used to indicate the validity of the page.
a) Invalid bit
b) Dirty bit
c) Modify bit
d) Valid bit
e) None of these

533) The addressing mode used in the instruction PUSH B is


a) Register
b) Array
c) Stack
d) Direct
e) None of these

534) The page table should be ideally situated within ______


a) Cache
b) Function
c) MMU
d) TLB
e) None of these

535) If the page table is large then it is stored in ______


a) Secondary storage
b) Main memory
c) Hard disk
d) Floppy disk
e) None of these

536) If timestamps of two events are same, then the events are
a) concurrent
b) non-concurrent
c) monotonic
d) non-monotonic
e) None of these

92
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
537) In distributed systems, transaction coordinator
a) starts the execution of transaction
b) breaks the transaction into number of sub transactions
c) coordinates the termination of the transaction
d) all of the mentioned
e) None of these

538) What are the different ways in which clients and servers are dispersed across
machines ?
a) Servers may not run on dedicated machines
b) Servers and clients can be on same machines
c) Distribution cannot be interposed between a OS and the file system
d) OS cannot be distributed with the file system a part of that distribution
e) None of these

539) What are not the characteristics of a DFS ?


a) login transparency and access transparency
b) Files need not contain information about their physical location
c) No Multiplicity of users
d) No Multiplicity if files
e) None of these

540) What are the different ways mounting of file system ?


a) boot mounting
b) auto mounting
c) explicit mounting
d) all of the mentioned
e) None of these

541) UNIVAC is
a. Universal Automatic Computer
b. Universal Array Computer
c. Unique Automatic Computer
d. Unvalued Automatic Computer
e. None of these

542) CD-ROM stands for


a. Compactable Read Only Memory
b. Compact Data Read Only Memory
c. Compactable Disk Read Only Memory
d. Compact Disk Read Only Memory
e. none of these

93
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
543) ALU is
a. Arithmetic Logic Unit
b. Array Logic Unit
c. Application Logic Unit
d. Applicable Logic Unit
e. None of these

544) VGA is
a. Video Graphics Array
b. Visual Graphics Array
c. Volatile Graphics Array
d. Video Graphics Adapter
e. None of these

545) IBM 1401 is


a. First Generation Computer
b. Second Generation Computer
c. Third Generation Computer
d. Fourth Generation Computer
e. None of these

546) MSI stands for


a. Medium Scale Integrated Circuits
b. Medium System Integrated Circuits
c. Medium Scale Intelligent Circuit
d. Medium System Intelligent Circuit
e. None of these

547) The capacity of 3.5 inch floppy disk is


a. 1.40 MB
b. 1.44 GB
c. 1.40 GB
d. 1.44 MB
e. None of these

548) The first computer introduced in Nepal was


a. IBM 1400
b. IBM 1401
c. IBM 1402
d. IBM1402
e. None of these

549) WAN stands for

94
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
a. Wap Area Network
b. Wide Area Network
c. Wide Array Net
d. Wireless Area Network
e. None of these

550) MICR stands for


a. Magnetic Ink Character Reader
b. Magnetic Ink Code Reader
c. Magnetic Ink Cases Reader
d. Management Ink Code Reader
e. None of these

551) What are examples of state information ?


a) opened files and their clients
b) file descriptors and file handles
c) current file position pointers
d) all of the mentioned
e) None of these

552) Which is not an examples of state information ?


a) Mounting information
b) Description of HDD space
c) Session keys
d) Lock status
e) None of these

553) How many Bytes are stored by ‘Long’ Datatype in C# .net?


a) 6
b) 4
c) 8
d) 5
e) None of these

554)The memory blocks are mapped on to the cache with the help of ______
a) Mapping function
b) Interrupts
c) Exception
d) Vectors
e) None of these

555) Which datatype should be more preferred for storing a simple number like 35 to
improve execution speed of a program?
95
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
a) sbyte
b) short
c) int
d) long
e) None of these

556) While using the direct mapping technique, in a 16 bit system the higher order 5 bits
is used for ________
a) Id
b) Tag
c) Direct
d) System
e) None of these

557) Default Type of number without decimal is ?


a) Signed
b) Unsigned
c) int
d) Long
e) None of these

558) In associative mapping, in a 16 bit system the tag field has ______ bits.
a) 10
b) 14
c) 8
d) 12
e) None of these

559) Which of the following is the object oriented way to handle run time errors?
a) Exception
b) Structure
c) Handling
d) Onerror
e) None of these

560) Which of these keywords is not a part of exception handling?


a) Catch
b) Thrown
c) Attribute
d) Character
e) None of these

561) A control bit called ____ has to be provided to each block in set-associative.
96
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
a) Idol bit
b) Binary
c) Linear
d) Valid bit
e) None of these

562) Data which is not up-to date is called as _______


a) Stale data
b) Block
c) Word
d) Dirty data
e) None of these

563) What is true about good programs?


a) Good program must have certain characteristic at delivery and must be maintainable
during time
b) A good program at delivery must satisfy its requirements
c) A good program must conform to its design constraints
d) All of the mentioned
e) none of these

564) What is principle of feasibility?


a) A Design is acceptable only when it is realized
b) Designs that make easier to change are better
c) Designs that can be built for less money, in less time with less risk are better
d) Designs that can meet more stakeholder needs and desired subject to constraints are
better
e) None of these

565) Which principle states the following “Designs that make easier to change are
better”?
a) Principle of Feasibility
b) Principle of Economy
c) Principle of Changeability
d) Principle of Adequacy
e)None of these

566) What is principle of adequacy?


a) A Design is acceptable only when it is realized
b) Designs that make easier to change are better
c) Designs that can be built for less money, in less time with less risk are better
d) Designs that can meet more stakeholder needs and desired subject to constraints are
better
97
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
e) None of these

567) What is principle of economy ?


a) A Design is acceptable only when it is realized
b) Designs that make easier to change are better
c) Designs that can be built for less money, in less time with less risk are better
d) Designs that can meet more stakeholder needs and desired subject to constraints are
better
e)None of these

568) Which of these does a good design follow?


a) A good design should specify a program that can be built, tested and deployed on time
b) A good design should be concluded in its budget
c) A good design can vary risk
d) A good design should specify a program that can be built, tested and deployed on time
and within its budget
e) None of these

569) Which of the following are the entities of product line organizations?
a) Core Asset Group
b) Marketers
c) Customer
d) All of the mentioned
e) None of these

570) Every possible architecture partition possible changes into which of the following
categories?
a) Local
b) Non Local
c) Architectural
d) All of the mentioned
e) None of these

571) Which of the following can be operands of arithmetic operators?


a) Numeric
b) Boolean
c) Characters
d) Both Numeric & Characters
e) None of these

572) Decrement operator, −−, decreases value of variable by what number?


a) 1
b) 2
98
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
c) 3
d) 4
e) None of these

573) Which of these is not a bitwise operator?


a) &
b) &=
c) |=
d) <=
e) None of these

574) Which operator is used to invert all the digits in binary representation of a number?
a) ~
b) <<<
c) >>>
d) ^
e) None of these

575) On applying Left shift operator, <<, on an integer bits are lost one they are shifted
past which position bit?
a) 1
b) 32
c) 33
d) 31
e) None of these

576) Which right shift operator preserves the sign of the value?
a) <<
b) >>
c) <<=
d) >>=
e) None of these

577) Which of these are selection statements in Java?


a) if()
b) for()
c) continue
d) break
e) None of these

578) Which of these jump statements can skip processing remainder of code in its body
for a particular iteration?
a) break
99
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
b) return
c) exit
d) continue
e) None of these

579) What is the stored in the object obj in following lines of code?
box obj;
a) Memory address of allocated memory of object.
b) NULL
c) Any arbitrary pointer
d) Garbage
e) None of these

580) Which of these operators is used to allocate memory for an object?


a) malloc
b) alloc
c) new
d) give
e) None of these

581) What is the return type of a method that does not returns any value?
a) int
b) float
c) void
d) double
e) None of these

582) Which of the following is a method having same name as that of it’s class?
a) finalize
b) delete
c) class
d) constructor
e) None of these

583)A relational database consists of a collection of


a)Tables
b)Data type
c)Relation
d)Record
e)None of these

584)Related fields in a database are grouped to form a


a)User data
100
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
b)Meta data
c)Data record
d)Reports
e)None of these

585) A ________ in a table represents a relationship among a set of values.


a)Attribute
b)Structure
c)Entry
d)Row
e)None of these

586) The database environment has all of the following components except:
a)Separate files
b)Operation
c)Bank
d)Module
e)None of these

587) The term _______ is used to refer to a row.


a)Attribute
b)Tuple
c)Aggregation
d)Encapsulation
e)None of these

588)The way a particular application views the data from the database that the
application uses is a
a)Number
b)Security
c)Extra space
d)Sub schema
e)None of these

589)A report generator is used to


a)Dirty data
b)Inconsistent data
c)Print files on paper
d)Meta data
e)None of these

590)The method in which records are physically stored in a specified order according to a
key field in each record is
101
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
a)Lift
b)Support
c)Confidence
d)Hash
e)None of these

591)For each attribute of a relation, there is a set of permitted values, called the
________ of that attribute.
a)Domain
b)Divisible
c)Different
d)Sorted
e)None of these

592) _______ produces the relation that has attributes of R1 and R2


a)Dimensional
b)Cartesian product
c)Difference
d)Switchboards
e)None of these

593)Which of the following is not OOPS concept in Java?


a) Inheritance
b) Encapsulation
c) Polymorphism
d) Compilation
e) None of these

594) Which of the following is a type of polymorphism in Java?


a) Compile time polymorphism
b) Execution time polymorphism
c) Multiple polymorphism
d) Multilevel polymorphism
e) None of these

595) When does method overloading is determined?


a) At run time
b) At compile time
c) At coding time
d) At execution time
e) None of these

102
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
596) Which concept of Java is a way of converting real world objects in terms of class?
a) Polymorphism
b) Encapsulation
c) Abstraction
d) Inheritance
e) None of these

597) Which concept of Java is achieved by combining methods and attribute into a class?
a) Encapsulation
b) Inheritance
c) Polymorphism
d) Abstration
e) None of these

598) What is it called if an object has its own lifecycle and there is no owner?
a) Aggregation
b) Composition
c) Encapsulation
d) Association
e) None of these

599) What is it called where child object gets killed if parent object is killed?
a) Aggregation
b) Composition
c) Encapsulation
d) Association
e) None of these

600) What is it called where object has its own lifecycle and child object cannot belong to
another parent object?
a) Aggregation
b) Compostion
c) Encapsulation
d) Association
e) None of these

601) ___________ is a centralized repository that stores data from multiple sources
and transforms them into a common, multi dimensional model for efficient querying
and analysis.
A. Data Selection
B. Data Cleaning
C. Data Integration
D. Data Warehouse
103
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
E. None of these

602) Who is known as the father of data warehousing?


A. Grace Hopper
B. Niklaus Wirth
C. James Gosling
D. William H.Imnon
E. None of these

603) __________ is a simple form of Data Warehouse that is focused on single


subject.
A. Spread Mart
B. Data Mart
C. Both (A) and (B)
D. Only (A)
E. None of these

604) Which is/are the basic operation(S) in Online Analytical Processing (OLAP)?
A. Consolidation
B. Drill- down
C. Slicing and Dicing
D. All of the Above
E. None of these

605) _________ is a class of software programs capable of supporting large


number of short online transactions?
A. OLAP
B. OLTP
C. Both (A) and (B)
D. CICS
E. None of these

606) Which performs multidimensional analysis of business data and provides the
capability for complex calculations, trend analysis and sophisticated data modeling?
A. OLAP
B. OLTP
C. Both (A) and (B)
D. Only (B)
E. None of these

607) Which of the following is the simplest and less technical type of data
warehouse?
A. Real Time Data Warehouse
104
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
B. Integrated Data Warehouse
C. Offline Data Warehouse
D. Offline operational Data Warehouse
E. None of these

608) Which of the following Data Warehouse is updated from data in the operational
systems on a regular basis?
A. Real Time Data Warehouse
B. Integrated Data Warehouse
C. Offline Data Warehouse
D. Offline operational Data Warehouse
E. None of these

609) __________ is a data warehouse that can assemble data from different areas
of business.
A. Real Time Data Warehouse
B. Integrated Data Warehouse
C. Offline Data Warehouse
D. Offline operational Data Warehouse
E. None of these

610) _________is updated for every transaction performed on the source data.
A. Real Time Data Warehouse
B. Integrated Data Warehouse
C. Offline Data Warehouse
D. Offline operational Data Warehouse
E. None of these

611) ____________ is described as extracting the information from large amount of


data in a database.
A. Data Modeling
B. Data Warehousing
C. Data Mining
D. All of these
E. None of these

612) ________ is a type of data mining used in Customer Relationship


Management(CRM)
A. Clustering
B. Web mining
C. Both (A) and (B)
D. Only(A)
E. None of these
105
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
613) _________ is the process of using graph theory to analyse the node and
connection structure of a web site.
A. Web structure mining
B. Web content mining
C. Web usage mining
D. Data mining
E. None of these

614) The information gathered through web mining is evaluated by using ________
A. clustering
B. classification
C. Association
D. All of the Above
E. None of these

615) Which of the following is used to examine data collected by search engines and
web spiders?
A. Web structure mining
B. Web content mining
C. Web usage mining
D. Data mining
E. None of these

616) ________ a special type of computational cluster that is specifically designed


for storing and analysing large amount of unstructured data.
A. Hadoop Cluster
B. Failover Cluster
C. Both (A) and (B)
D. Only (B)
E. None of these

617) The process of grouping a set of objects into classes of similar objects is called
___________
A. clustering
B. classification
C. Association
D. All of the Above
E. None of these

618) Which parameter is used to discover patterns in data that can lead to
reasonable predictions about the future?
A. clustering
106
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
B. classification
C. Association
D. Forecasting
E. None of these

619) Which of the following is the process of detecting and correcting the wrong
data?
A. Data Selection
B. Data Cleaning
C. Data Integration
D. Data Mining
E. None of these

620) Which of the following is the process of combining data from different
resources?
A. Data Selection
B. Data Cleaning
C. Data Integration
D. Data Mining
E. None of these

621) An important purpose of the shared pool is to cache the executable versions of
_________ statements.
A. SQL
B. PL/SQL
C. Both (A) and (B)
D. Oracle
E. None of these

622) Which of the following is/are main component(s) of the shared pool?
A. library Cache
B. dictionary Cache
C. Both (A) and (B)
D. Only (A)
E. None of these

623) Oracle Database segregates a small amount of the shared pool for large
objects(Over 5KB).The segregated area of the shared pool is called ______
A. Fixed Pool
B. Reserved Pool
C. Allocated Pool
D. Association
E. None of these
107
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
624) Which stores the executable(parsed) form of SQL cursors and PL/SQL
programs?
A. library Cache
B. dictionary Cache
C. Both (A) and (B)
D. Only (B)
E. None of these

625) Information stored in dictionary cache includes ______


A. User names
B. Profile data
C. table space information
D. All of the above
E. None of these

626) When a query is submitted to oracle server for execution, oracle checks if
same query has been executed previously. If found the same then this event is
known as ________
A. Library cache hit
B. soft parsing
C. Both (A) and (B)
D. Profile data
E. None of these

627) If the parsed form of the statement is not found in the shared pool then new
statement is parsed and its parsed version is stored in Shared SQL area. This is
known as ________
A. Library cache hit
B. Soft parsing
C. Hard parsing
D. table information system
E. None of these

628) Shared pool size is an important factor for ______ applications.


A. On-line Transaction Processing (OLTP)
B. Decision Support Systems (DSS)
C. Both (A) and (B)
D. Only (B)
E. None of these

629) The shared pool is also able to support ________ in data warehousing
applications.
108
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
A. Shared SQL
B. Stored SQL
C. Unsorted SQL
D. Unshared SQL
E. None of these

630) Reuse of shared SQL for multiple users running the same application avoids
______
A. Library cache hit
B. Soft parsing
C. Hard parsing
D. All of these
E. None of these

631) Which of the following model is a combination of Iterative model and Waterfall
model?
A. linear-sequential Model
B. Spiral Model
C. V Model
D. Waterfall Model
E. None of these

632) SRS stands for ________


A. Software Resolution Specification
B. Software Requirement Standards
C. Software Response Service
D. Software Requirements Specifications
E. None of these

633) Which of the following model is also referred to as a linear-sequential life cycle
model?
A. Waterfall Model
B. Iterative Model
C. Spiral Model
D. V Model
E. None of these

634) SDLC stands for ________


A. Software Department Load Cycle
B. Software Department Life Cycle
C. Software Development Load Cycle
D. System Development Life Cycle
E. None of these
109
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
635) According to Lehman’s laws of software evolution, the software can be divided
into _______ types.
A. Two
B. Four
C. Three
D. Six
E. None of these

636) What is the final result of the requirements analysis and specifications phase ?
A. data flow diagram
B. SRS Document
C. Coding the project
D. User Manual
E. None of these

637) In software development, What is noise?


A. Adding requirements in SRS document
B. Writing irrelevant statement in SRS document
C. Writing over-specific requirements in SRS document
D. All of these
E. None of these

638) The 4GT Model is a package of __________________.


A. CASE Tools
B. Software tools
C. Both (A) and (B)
D. Only (A)
E. None of these

639) Risk analysis of a project is done in _______


A. System Analysis phase
B. Implementation phase
C. Maintenance phase
D. Feasibility Study
E. None of these

640) Which of the following is the most important phase of Software Development
Life Cycle (SDLC)?
A. Requirements analysis
B. Coding
C. Testing
D. Designing
110
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
E. None of these

641) Which handles the SQL requests and converts it into a request the individual
database understands?
A. Graphical User Interface(GUI)
B. ActiveX Data Objects (ADO)
C. Universal Data Access (UDA)
D. Open Database Connectivity(ODBC)
E. None of these

642) __________ is a database that contains billions of table rows.


A. Very Large Database (VLDB)
B. Holographic storage
C. Both (A) and (B)
D. Only (B)
E. None of these

643) ACID is a concept that defines four transaction properties of a database.ACID


stands for ______
A. Accuracy, Characteristics, Interface, Data mart
B. Atomicity, Consistency, Interface, Data mart
C. Accuracy, Characteristics, Isolation, Data mart
D. Atomicity, Consistency, Isolation, Durability
E. None of these

644) Which of the following is middle ware designed to support rapid high volume
on-line transactions?
A. Oracle
B. Customer Information Control System(CICS)
C. Both (A) and (B)
D. Only (A)
E. None of these

645) Which of the following middle ware technology might need the Interface
Definition Language (IDL)?
A. COBOL
B. RAI
C. CORBA
D. Oracle
E. None of these

646) CORBA stands for _______


A. Common Object Request Broker Application
111
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
B. Common Oriented Request Broker Application
C. Common Oriented Request Broker Architecture
D. Common Object Request Broker Architecture
E. None of these

647) The basic unit of PL/SQL is called ______


A. Array
B. Row
C. Unit
D. Block
E. None of these

648) __________ is a refinement process of organizing data in the database to


avoid data redundancy and anomalies in insert, delete and update operations.
A. Data Modeling
B. Normalization
C. Clustering
D. Designing
E. None of these

649) Which term is used to describe the process of forecasting or discovering


pattern in data?
A. Data Modeling
B. Data Warehousing
C. Data Mining
D. Normalization
E. None of these

650) Which of the following technology was Microsoft’s first attempt at an object-
oriented database interface?
A. Data Access Objects (DAO)
B. ActiveX Data Objects (ADO)
C. Universal Data Access (UDA)
D. Graphical User Interface
E. None of these

651) Which of the following is/are feature(s) of Oracle 9i?


A. Scalability
B. Reliablity
C. One Development model
D. All of the above
E. None of these

112
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
652) Which of the following is an example for Embedded SQL Statement?
A. ROLLBACK
B. SETROLE
C. ALTER SYSTEM
D. FETCH
E. None of these

653) ________ is a tool for entering and running ad-hoc based database
statements.
A. MySQL
B. PL/SQL
C. SQL*PLUS
D. SQL
E. None of these

654) ___________ Database is the only database specifically designed as an


Internet development and deployment platform
A. Oracle 6i
B. Oracle 7i
C. Oracle 8i
D. Oracle 9i
E. None of these

655) Oracle 9i can scale tens of thousands of concurrent users support upto
_________ petabytes data.
A. 124
B. 256
C. 512
D. 624
E. None of these

656) Oracle 9i Reports gives us _______options for building a Web report.


A. two
B. three
C. four
D. five
E. None of these

657) Oracle 9i Reports is the solution of _______


A. Paper publishing
B. Web publishing
C. Both (A) and (B)
D. Only (A)
113
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
E. None of these

658) The ______ process is used for inter-instance locking in Real Application
Clusters.
A. Front Manager Server
B. Back Manager Server
C. Lock Manager Server
D. Data Server Manger
E. None of these

659) The ________ performs recovery when a failed instance starts up again.
A. Log Writer(LGWR)
B. Checkpoint(CKPT)
C. System Monitor(SMON)
D. Process Monitor(PMON)
E. None of these

660) The ________ performs process recovery when a user process fails.
A. Log Writer(LGWR)
B. Checkpoint(CKPT)
C. System Monitor(SMON)
D. Process Monitor(PMON)
E. None of these

661) What type of failure occurs when Oracle fails due to an operating system or
computer hardware failure?
A. Application failure
B. Instance Failure
C. Media Failure
D. Roll back failure
E. None of these

662) Which Oracle backup and recovery file contains user and system data?
A. Control file
B. Data file
C. Offline Redo file
D. Computer file
E. None of these

663) When is the System Global Area (SGA) created in an Oracle database
environment?
A. When the database is created
B. When a user process is started
114
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
C. When the database is mounted
D. When the instance is started
E. None of these

664) What is the type of Oracle backup in which all uncommitted changes have been
removed from the data files?
A. Full backup
B. Consistent backup
C. Inconsistent backup
D. Differential backup
E. None of these

665) Which type of file is a part of the Oracle database?


A. Control file
B. Password file
C. Parameter files
D. log files
E. None of these

666) Which password management feature ensures a user cannot reuse a password
for a specified time interval?
A. Account Locking
B. Password History
C. Password Verification
D. Protection Password
E. None of these

667) Which privilege is required to create a database?


A. SYSDBA
B. DBA
C. SYSOPER
D. RESOURCE
E. None of these

668) The most open source DBMS is _______


A. Oracle
B. Microsoft Access
C. MySQL
D. PL/SQL
E. None of these

669) Which database level is the closest level to the users?


A. Internal
115
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
B. External
C. Conceptual
D. Operational
E. None of these

670) Which Normal Form(NF) is considered adequate for normal relational database
design?
A. 2NF
B. 5NF
C. 4NF
D. 3NF
E. None of these

671) Which of the following is used to generate a square root of a number?


(A) MySQL SQRT Function
(B) MySQL RAND Function
(C) MySQL AVG Function
(D) All of these
(E) None of these

672) Which datatype is used to store up to 65,536 characters?


(A) Memo
(B) Text
(C) Integer
(D) File
(E) None of these

673) Which of the following operator combines two or more SELECT statements?
(A) In
(B) Like
(C) Union
(D) Intersection
(E) None of these

674) Long datatype allows whole numbers between ___________


(A) 0 to 255
(B) -32,768 to 32,767
(C) -2,147,483,648 to 2,147,483,647
(D) 1 to 245
(E) None of these

675) Which of the following datatype holds a string with maximum length of 255
characters?
116
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
(A) Text
(B) Medium Text
(C) Long Text
(D) Tiny Text
(E) None of these

676) In E-R Diagram, the total participation by entities is represented as________


(A) Dashed line
(B) Rectangle
(C) Double rectangle
(D) Double line
(E) None of these

677) Intersection operator is used to obtain the _______ tuples.


(A) Unique
(B) Common
(C) Different
(D) Long
(E) None of these

678) Which is a low level operator?


(A) Insert
(B) Update
(C) Directory
(D) Union
(E) None of these

679) The LAST() function is only supported in _______


(A) MS Word
(B) MS Access
(C) MS Excel
(D) MS Office
(E) None of these

680) _______ are used to specify the rules for the data in a table.
(A) Constraints
(B) Aliases
(C) Wildcards
(D) Directory
(E) None of these

681) ______ is the complex search criteria in the where clause.


(A) Substring
117
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
(B) Drop Table
(C) Predicate
(D) Aliases
(E) None of these

682) Which of the following clause is an additional filter that is applied to the
result?
(A) Having
(B) Group-by
(C) Select
(D) Order by
(E) None of these

683) _______ is the process of organizing data into related tables.


(A) Generalization
(B) Normalization
(C) Specialization
(D) Fragmentation
(E) None of these

684) Which of the following is used to determine whether of a table contains


duplicate rows?
(A) Unique predicate
(B) Like Predicate
(C) Null predicate
(D) In predicate
(E) None of these

685) The candidate key is that you choose to identify each row uniquely is
called_______
(A) Primary Key
(B) Foreign Key
(C) Alternate Key
(D) Secondary Key
(E) None of these

686) An operator is basically a join followed by a project on the attributes of first


relation is known as_______
(A) Join
(B) Inner Join
(C) Full Join
(D) Semi-Join
(E) None of these
118
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
687) Which of the following is a special type of integrity constraint that relates two
relations and maintains consistency across the relations?
(A) Entity Integrity Constraints
(B) Referential Integrity Constraints
(C) Domain Integrity Constraints
(D) SQL Integrity Constraints
(E) None of these

688) Each modification done in database transaction are first recorded into
the______
(A) Hard Drive
(B) Disk
(C) Log File
(D) Data Mart
(E) None of these

689) Which of the following is preferred method for enforcing data integrity?
(A) Cursors
(B) Constraints
(C) Triggers
(D) All of these
(E) None of these

690) Which allows to make copies of the database periodically to help in the cases
of crashes and disasters?
(A) Recovery utility
(B) Data loading utility
(C) Monitoring utility
(D) Backup Utility
(E) None of these

691) Which operator is used to select values within a range?


(A) WITHIN
(B) RANGE
(C) BETWEEN
(D) DOMAIN
(E) None of these

692) Which of the following is the most common type of Join?


(A) INNER JOIN
(B) INSIDE JOIN
(C) JOINED
119
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
(D) UPPER JOIN
(E) None of these

693) DBMS may be combined with or used by ______ type of transaction manager.
(A) DB2
(B) Customer Information Control System (CICS)
(C) Oracle
(D) JOINED
(E) None of these

694) The _____clause is used to specify the number of records to return.


(A) FROM
(B) WHERE
(C) SELECT TOP
(D) TOP
(E) None of these

695) In SQL, Wildcard characters are used with the _______ operator.
(A) LIKE
(B) RANGE
(C) BETWEEN
(D) DOMAIN
(E) None of these

696) Which operator allows to specify multiple values in a WHERE Clause?


(A) LIKE
(B) IN
(C) BETWEEN
(D) RANGE
(E) None of these

697) In SQL,which of the following wildcard character is used as a substitute for


Zero or more characters?
(A) *
(B) _
(C) ^
(D) %
(E) None of these

698) The basic unit of PL/SQL variant is called a _____


(A) block
(B) cell
(C) table
120
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
(D) union
(E) None of these

699) Which of the following is a special type of stored procedure that is


automatically invoked whenever the data in the table is modified?
(A) Curser
(B) Trigger
(C) Both (A) & (B)
(D) Only (A)
(E) None of these

700) __________ are used to temporarily rename a table or heading of a column.


(A) Wildcards
(B) Constraints
(C) Joins
(D) Aliases
(E) None of these

701) Which SQL statement is used to extract data from a database?


(A) EXTRACT
(B) GET
(C) OPEN
(D) SELECT
(E) None of these

702) Which of the following keyword can be used to return different values?
(A) SELECT
(B) GET
(C) OPEN
(D) DISTINCT
(E) None of these

703) ______ operator is used to display a record if either the first condition or the
second condition is true.
(A) AND
(B) OR
(C) Both (A) & (B)
(D) NOR
(E) None of these

704) Which of the following DBMS provides faster response time and better
performance?
(A) Relational Database Management System (RDBMS)
121
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
(B) NoSQL DBMS
(C) In-Memory Database Management System (IMDBMS)
(D) DBMS
(E) None of these

705)________is suitable for data warehouses that have a large number of similar
data items.
(A) Relational Database Management System (RDBMS)
(B) Columnar Database Management system (CDBMS)
(C) In-Memory Database Management System (IMDBMS)
(D) DBMS
(E) None of these

706) Which of the following is standard interactive and programming language for
getting information from and updating a database.
(A) SQL
(B) PHP
(C) ASP
(D) PL/SQL
(E) None of these

707) _______ keyword sorts the record in ascending order by default.


(A) ORDER BY
(B) SORT BY
(C) SORT
(D) ORDER
(E) None of these

708) Which of the following is an open standard Application Programming Interface


(API) for accessing a database?
(A) Universal Data Access
(B) Open Database Connectivity
(C) Command Line Interface
(D) Open Data-Link Interface
(E) None of these

709) Which SQL statement is used to insert new data in a database?


(A) INSERT INTO
(B) ADD NEW
(C) ADD RECORD
(D) All of these
(E) None of these

122
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
710) Which method of Online Analytical Processing stores data in both a relational
and a multi dimensional database.
(A) Hybrid OLAP
(B) Relational OLAP
(C) OLAP
(D) PHP
(E) None of these

711) OLAP stands for_____


(A) Online Arithmetic Processing
(B) Online Analysis Processing
(C) Online Analytical Processing
(D) Online Automatic Processing
(E) None of these

712) The _____ operation allows the combining of two relations by merging pairs of
tuples, one from each relation, into a single tuple.
(A) Join
(B) Intersection
(C) Union
(D) Cartesian product
(E) None of these

713) ________is the multiplication of all the values in the attributes.


(A) Set difference
(B) Cartesian product
(C) Intersection
(D) Union
(E) None of these

714)Which command is used to remove a relation from an SQL database?


(A) Delete
(B) Remove
(C) Drop
(D) Update
(E) None of these

715) In SQL, the spaces at the end of the string are removed by _______ function .
(A) Lower
(B) String
(C) Trim
(D) Drop
(E) None of these
123
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK

716) ________ is used to save permanently any transaction into database.


(A) commit
(B) rollback
(C) savepoint
(D) All of these
(E) None of these
717) A unit of storage that can store one or more records in a hash file organization
is denoted as_______
(A) Bucket
(B) Disk pages
(C) Blocks
(D) Nodes
(E) None of these

718) Which of the following operator used for appending two strings?
(A) %
(B) &
(C) +
(D) ||
(E) None of these

719) The management information system (MIS) structure with one main computer
system is called a________
(A) Decentralized MIS structure
(B) Distributed MIS structure
(C) Centralized MIS structure
(D) DSS
(E) None of these

720) The highest level in the hierarchy of data organization is called________


(A) data base
(B) data file
(C) data record
(D) data
(E) None of these

721) A top to bottom relationship among the items in a database is established by a


______
(A) Network Schema
(B) Relational Schema
(C) Hierarchical Schema
124
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
(D) Model
(E) None of these

722) Aggregation is a special form of _______


(A) Specialization
(B) Association
(C) Generalization
(D) All of these
(E) None of these

723) In E-R Diagram, _________ represents Key Attribute.


(A) Ellipse with underlying line
(B) Rectangle with underlying line
(C) Double rectangle
(D) E-R Model
(E) None of these

724) Which TCL command is used to permanently save any transaction into
database?
(A) rollback
(B) savepoint
(C) commit
(D) trim
(E) None of these

725) Which TCL command restores the database to last committed state?
(A) rollback
(B) savepoint
(C) commit
(D) trim
(E) None of these

726) _______ is used to control privilege in Database.


(A) Data Manipulation Language
(B) Data Definition Language
(C) Data Query Language
(D) Data Control Language
(E) None of these

727) Which model remains operative until the software is required?


(A) Waterfall model
(B) Incremental model
(C) Prototyping model
125
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
(D) Spiral model
(E) None of these

728) In oracle, which tablespace is the minimum required when creating a


database?
(A) System tablespace
(B) Undo tablespace
(C) temporary tablespace
(D) Association
(E) None of these

729) Which of the following is another name for weak entity?


(A) Dominant
(B) Child
(C) Owner
(D) Space
(E) None of these

730) ODBC is based on ________


(A) C++ language
(B) RDBMS
(C) Structured Query Language
(D) C language
(E) None of these

731) The language used in application programs to request data from the DBMS is
referred to as the ______
(A) DML
(B) DDL
(C) DCL
(D) DBA
(E) None of these

732) In Oracle, who owns the data dictionary?


(A) DBA
(B) SYS
(C) SYSTEM
(D) DML
(E) None of these

733) In SQL, which command is used to update existing row in a table?


(A) Insert
(B) Delete
126
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
(C) Update
(D) Field
(E) None of these

734) A ________ contains the smallest unit of meaningful data, so you might call it
the basic building block for a data file.
(A) Record
(B) Field
(C) Table
(D) Insert
(E) None of these

735) A relation between two entities is treated as a single entity is


called__________
(A) Aggregation
(B) Specialization
(C) Generalization
(D) Fragmentation
(E) None of these

736) Data mining evolve as a mechanism to cater the limitations of _______


systems to deal massive data sets with high dimensionality.
(A) OLAP
(B) OLTP
(C) DWH
(D) DML
(E) None of these

737) In Relational table, the term “Attribute” is also used to represent _______
(A) row
(B) column (or) field
(C) entity
(D) model
(E) None of these

738) Which of the following categories of the data integrity RDBMS will enforce
specific business rules?
(A) Entity Integrity
(B) Domain Integrity
(C) User-Defined Integrity
(D) Data Integrity
(E) None of these

127
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
739) E-R Modeling technique is a _______
(A) top-down approach
(B) bottom-up approach
(C) User-Defined
(D) All of these
(E) None of these

740) The number of attributes in a relation is called its _____


(A) row
(B) column
(C) degree
(D) field
(E) None of these

741) Rows of a relation are called ________


(A) entity
(B) degree
(C) tuples
(D) field
(E) None of these

742) The number of tuples in a relation is termed as ______


(A) cardinality
(B) entity
(C) column
(D) degree
(E) None of these

743) In SQL, Which of the following is a Data Manipulation Language(DML)


command?
(A) create
(B) alter
(C) merge
(D) drop
(E) None of these

744) ..... is a top-down approach in which one higher level entity can be divided into
two lower level entities.
(A) Aggregation
(B) Specialization
(C) Generalization
(D) Fragmentation
(E) None of these
128
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
745) Which of the following is not a type of database?
(A) Hierarchical
(B) Relational
(C) Network
(D) Transition
(E) None of these

746) In a relational database, each tuple is divided into fields called_______


(A) Relations
(B) Domains
(C) Queries
(D) Relational
(E) None of these

747) In E-R Diagram, attribute is represented by.......


(A) Rectangle
(B) Square
(C) Double Rectangle
(D) eclipse
(E) None of these

748) In SQL, TCL stands for______


(A) Transmission Control Language
(B) Transaction Central Language
(C) Ternary Control Language
(D) Transaction Control Language
(E) None of these

749) Which of the following is a part of the Oracle database system?


(A) Free lists
(B) Front end
(C) Network
(D) Back end
(E) None of these

750) Which of the following is used with database?


(A) ATM
(B) Payment gateway
(C) Data Mining
(D) Network
(E) None of these

129
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
751) The process by which the structure of the database is modified to eliminate
hidden dependencies and replacing groups is _________
A. Normalization
B. Indexing
C. Enforcing referential integrity
D. Enforcing data integrity
E. None of the above

752) Which kind of lock includes a keypad that can be used to control access into
areas?
A. Cipher
B. Warded
C. Device
D. Tumber
E. None of the above

753) Programs that automatically submit your search request to several search
engines simultaneously are called-
A. WebCrawler
B. Meta search engines
C. Spiders
D. Hits
E. None of the above

754) This _________ tier processes HTTP protocol, scripting tasks, performs
calculations, and provides access to data.
A. Applications/Web server
B. Client
C. Enterprise server
D. DBA
E. None of the above

755) A communication processor that connects dissimilar networks by providing the


translation from one set of protocol to another is______
A. Bridge
B. Router
C. Gateway
D. Modem
E. None of the above

756) Which the result of a computation depends on the speed of the processes
involved there is said to be ?
A. Cycle stealing
130
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
B. Race condition
C. A time look
D. A dead lock
E. None of the above

757) A method which transfers the entire block of data from its own buffer to main
memory takes place without intervention by CPU.
A. Programmed Input/Output
B. Input driven Input/output
C. Direct Memory Access
D. All of these
E. None of the above

758) In C++ a function contained within a class is called ________


A. Member Function
B. A Class Function
C. An operator
D. Array
E. None of the above

759) CIDR (Classless Inter Domain Routing)–


A. It is used in class C Networks
B. It is used in class B Networks
C. It is used in class A Networks
D. All of the above
E. None of the above

760) Classes are useful because they _______


A. are removed from memory when not in use
B. permit data to be hidden from other classes
C. bring together all aspects of an entity in one place
D. can closely model objects in the real world
E. None of the above

761) Which of the following systems implementation approaches should be used if


you want to run the old system and the new system at the same time for a specified
period?
A. direct
B. pilot
C. phased
D. parallel
E. None of the above

131
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
762) The usual method of __________ mapping is by some arithmetical
manipulation of the key value, in direct file organization.
A. Random
B. Serial
C. Direct
D. One to many
E. None of the above

763) A generalization of the Boyce Codd Normal Form to relation schemes which
includes the multivalued dependencies is called __________
A. Second Normal Form
B. Third Normal Form
C. Fourth Normal Form
D. Fifth Normal Form
E. None of the above

764) PPP (Point to Point Protocol) used for which purpose?


A. Error Detection
B. Authentication
C. Both (A) and (B)
D. Only (A)
E. None of the above

765) PPP used in which layer?


A. Layer 1
B. Layer 3
C. Layer 5
D. Layer 2
E. None of the above

766) If communication software can be called the "traffic cop" of a micro


communication system, then what should the modem be called?
A. Park
B. Bridge
C. Interface
D. Link
E. None of the above

767) Yacc is available as a command (utility) on the ______


A. DOS
B. UNIX
C. MINIX
D. LINUX
132
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
E. None of the above

768) Which of the following communications service provides message preparation


and transmission facilities?
A. Teletex
B. Teletext
C. x400
D. Fax
E. None of the above

769) An assembler that runs on one machine but produces machine code for
another machine is called _______
A. Simulator
B. Emulator
C. Boot-Strap loader
D. Cross Assembler
E. None of the above

770) Resolution of externally defined symbols is performed by___________


A. Linker
B. Loader
C. Compiler
D. Assembler
E. None of the above

771) A transition between two memory resident process in a multiprogramming


system is called ______
A. Process Switch
B. Mode Switch
C. Transition Switch
D. All of the above
E. None of the above

772) The memory address of the first element of an array is called _________
A. floor address
B. first address
C. foundation address
D. base address
E. None of the above

773) A set of resources' allocations such that the system can allocate resources to
each process in some order, and still avoid a deadlock is called ________
A. Unsafe state
133
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
B. Safe state
C. Starvation
D. Greedy allocation
E. None of the above

774) Which of the following does not allow multiple users or devices to share one
communications line?
A. doubleplexer
B. multiplexer
C. concentrator
D. controller
E. None of the above

775) Consider an operation of addition. For two numbers the operation will generate
a sum. If the operands are strings, and the same operation would produce a third
string by concatenation. This feature is called________
A. Inheritance
B. Encapsulation
C. Polymorphism
D. Binding
E. None of the above

776) Precedence determines which operator is ______


A. is evaluated first
B. is more important
C. is fastest number
D. All of these
E. None of the above

777) In a circular linked list organization, insertion of a record involves modification


of
A. one pointer
B. two pointers
C. multiple pointers
D. no pointer
E. None of the above

778) A operator precedence parser is a ________


A. Bottom-up parser
B. Top-down parser
C. Back tracing parser
D. All of these
E. None of the above
134
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
779) Programming in a language that actually controls the path of signals or data
within the computer is controlled __________
A. micro-programming
B. instruction set
C. assembly language programming
D. machine language programming.
E. None of the above

780) A utility programme that takes a procedure and searches a library to locate
copies of any procedures called but not defined in the first procedure, is called
__________
A. linker
B. re-locator
C. loader
D. text editor
E. None of the above

781) A collection of conceptual tools for describing data, relationships, semantics


and constraints is referred to as ..........
(A) Data Model
(B) E-R Model
(C) DBMS
(D) All of the above
(E) None of the above

782) Dr.E.F. Codd represented ....... rules that a database must obey if it has to be
considered truly relational.
(A) 10
(B) 15
(C) 14
(D) 12
(E) None of the above

783) In E-R Diagram, weak entity is represented by.......


(A) Rectangle
(B) Square
(C) Double Rectangle
(D) Circle
(E) None of the above

784) An entity that is related with itself is known as.......


(A) binary relationship
135
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
(B) recursive relationship
(C) ternary relationship
(D) relationship
(E) None of the above

785) ....... is a bottom-up approach in which two lower level entities combine to
form a higher level entity.
(A) Aggregation
(B) Specialization
(C) Generalization
(D) Function
(E) None of the above

786) An entity set that does not have sufficient attributes to form a primary key, is a
......
(A) Primary entity set
(B) Weak entity set
(C) Strong entity set
(D) Secondary entity set
(E) None of the above

787) Which SQL command delete all the records and does not remove the structure?
(A) Drop
(B) Insert
(C) Truncate
(D) Circle
(E) None of the above

788) Which of the following is a Data Definition Language (DDL) command?


(A) Delete
(B) Insert
(C) Drop
(D) Merge
(E) None of the above

789) In ........ database, data is organized in the form of trees with nodes.
(A) Hierarchical
(B) Relational
(C) Network
(D) Operational
(E) None of the above

790) Which command is used to retrieve records from one or more table?
136
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
(A) Delete
(B) Insert
(C) Drop
(D) Select
(E) None of the above

791) ________ allows a unique number to be generated when a new record is


inserted into a table.
(A) Insert Into Select
(B) Insert Into
(C) Select Into
(D) Auto Increment
(E) None of the above

792) Which of the following constraint is used to limit the value range that can be
placed in a column?
(A) Check
(B) Default
(C) Unique
(D) Select
(E) None of the above

793) A Foreign key in one table points to a ________ key in another table.
(A) Alternate
(B) Default
(C) Primary
(D) Secondary
(E) None of the above

794) Domain constraints, functional dependency and referential integrity are special
forms of _________
(A) Foreign key
(B) Primary key
(C) Referential constraint
(D) Assertion
(E) None of the above

795) 4NF stands for ______


(A) Fourth Normal File
(B) Fourth Normal Form
(C) Fourth Normal Fraction
(D) Fourth Negative File
(E) None of the above
137
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
796) Which of the following field type is used to store photograph of employees?
(A) Memo
(B) Picture
(C) OLE
(D) Photo
(E) None of the above

797) _______ statement is used in conjunction with the aggregate functions to


group the result-set by one or more columns.
(A) Select
(B) Group By
(C) Distinct
(D) Insert
(E) None of the above

798) Which of the following method can be used to add more tables in a database?
(A) Design View
(B) Table Wizard
(C) Both (A) & (B)
(D) Only (A)
(E) None of the above

799) Which of the following field type is the best to store serial numbers?
(A) Number
(B) Auto Number
(C) Text
(D) Memo
(E) None of the above

800) The feature that database allows to access only certain records in database
is______
(A) Queries
(B) Reports
(C) Forms
(D) Tables
(E) None of the above

801) This is a type of program that lets one or more computer users create,
manage, and access data in a database.
A. B2B
B. DBMS
C. multidimensional database
138
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
D. Database
E. None of the above

802) In a relational database, this is a data structure that organizes the information
about a single topic into rows and columns.
A. block
B. record
C. tuple
D. table
E. None of the above

803) This is a family of relational database management system products from IBM
that serve a number of different operating system platforms.
A. Cognos
B. DB2
C. ADO
D. Universal Data Access
E. None of the above

804) This is a central repository for all or significant parts of the data that an
enterprise's various business systems collect.
A. data warehouse
B. business information warehouse
C. knowledge warehouse
D. All of these
E. None of the above

805) This is the job title of someone who directs or performs all activities related to
maintaining a successful database environment.
A. DBA
B. MOLAP
C. PHP
D. RFC
E. None of the above

806) This is a common standard language used to update and get information from
a database.
A. VB
B. TMQL
C. PHP
D. SQL
E. None of the above

139
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
807) This is a file format that contains the values in a table in which column values
are separated by a comma and each row starts a new line.
A. ASCII
B. CSV file
C. virtual organization
D. PHP
E. None of the above

808) In a relational database, this is the data structure that holds a single piece of
data, such as first name or phone number.
A. catalog
B. field
C. entity
D. object
E. None of the above

809) This is an organized selection of data from a database that allows you to look
at it from a particular perspective.
A. Venn diagram
B. Gantt chart
C. view
D. splay tree
E. None of the above

810) This a program tool allows you to reorganize and summarize selected columns
and rows of data in a spreadsheet or database table to obtain a desired report.
A. pivot table
B. PERT chart
C. quad tree
D. ODBC
E. None of the above

811) At this level of normalization, each column in a table that is not a determiner
of the contents of another column, must itself be a function of the other columns in
the table.
A. 1NF
B. 2NF
C. 3NF
D. DKNF
E. None of the above

812) This method of online analytical processing stores data in both a relational and
a multi dimensional database.
140
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
A. HOLAP
B. ROLAP
C. OLAP
D. DIM
E. None of the above

813) Which technology was Microsoft's first attempt at an object-oriented database


interface?
A. MQSeries
B. ADO
C. DAO
D. UDA
E. None of the above

814) What concept would a data modeler NOT be expected to know?


A. class
B. object
C. UML
D. FMP
E. None of the above

815) Which of the following tree structures is unique in that the tree organization
aries depending on which nodes are most frequently accessed?
A. B-tree
B. binary tree
C. quad tree
D. splay tree
E. None of the above

816) The basic unit of this SQL variant is called a block.


A. PL/SQL
B. XQL
C. SQLJ
D. TMQL
E. None of the above

817) The acronym ACID is typically used in reference to __________


A. transactions
B. CRM analytics
C. data integrity
D. stubs
E. None of the above

141
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
818) A Database Management System (DBMS) may be used by, or combined with,
this type of transaction manager.
A. DB2
B. CICS
C. Oracle
D. Cognos
E. None of the above

819) Encapsulation, types, classes, inheritance, overriding combined with late


binding, and extensibility are all features of this type of database.
A. multidimensional database
B. relational database
C. object-oriented
D. open source
E. None of the above

820) A programmer using this type of middleware might need the Interface
Definition Language (IDL).
A. RPC
B. ORB
C. MUD
D. EAI
E. None of the above

821) This is a collection of data items organized as a set of formally-described


tables from which data can be accessed or reassembled in many different ways
without having to reorganize the database tables.
A. relational database
B. array
C. file allocation table
D. splay tree
E. None of the above

822) This is a standard interactive and programming language for getting


information from and updating a database.
A. dynamic data exchange
B. Structured Query Language
C. ASCII
D. Erlang programming language
E. None of the above

823) In creating a database, this is the process of organizing it into tables insuch a
way that the results of using the database are always unambiguous.
142
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
A. probability
B. normalization
C. data modeling
D. query by example
E. None of the above

824) This family of products is IBM's cross-platform relational database


management system.
A. DBA
B. DB2
C. PHP
D. RDF
E. None of the above

825) This is an open standard application programming interface (API) for


accessing a database.
A. Universal Data Access
B. Open Database Connectivity
C. Topic Map Query Language
D. Open Data-Link Interface
E. None of the above

826) This term, used to describe a database that occupies magnetic storage in the
terabyte range, describes a database that contains billions of table rows.
A. Very Large Database
B. holographic storage
C. Cold Fusion
D. giant
E. None of the above

827) This is a collection of descriptions about data objects that is created for the
benefit of programmers and others who might need to refer to them.
A. data dictionary
B. stored procedure
C. Virtual File Allocation table
D. catalog
E. None of the above

828) This term is used to describe the process of forecasting, or simply discovering
patterns in data that can lead to predictions about the future.
A. customer relationship management
B. PERT chart
C. data mining
143
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
D. enterprise risk management
E. None of the above

829) In the relational modes, cardinality is termed as:


A. Number of tuples.
B. Number of attributes.
C. Number of tables.
D. Number of constraints
E. None of the above

830) Relational calculus is a ______


A. Procedural language.
B. Non- Procedural language.
C. Data definition language.
D. High level language
E. None of the above

831) The view of total database content is


A. Conceptual view.
B. Internal view.
C. External view
D. Operational
E. None of the above

832) Which type of file is part of the Oracle database?


A. Control file
B. Password file
C. Parameter files
D. Archived log files
E. None of the above

833) Which statements are use to UNLOCK the user?


A. Alter user Scott account lock;
B. Modified user Scott account unlock;
C. Alter user Scott account unlock;
D. Alter user Scott unlock
E. None of the above

834) For which two constraints are indexes created when the constraint is added?
A. Primary key
B. Unique
C. Not null
D. Both (A) & (B)
144
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
E. None of the above

835) What type of failure occurs when Oracle fails due to an operating system or
computer hardware failure?
A. Application failure
B. Instance Failure
C. Media Failure
D. Rollback failure
E. None of the above

836) When is the SGA created in an Oracle database environment?


A. When the database is created
B. When a user process is started
C. When the database is mounted
D. When the instance is started
E. None of the above

837) Which password management feature ensures a user cannot reuse a password
for a specified time interval?
A. Account Locking
B. Password History
C. Password Verification
D. Password Expiration and Aging
E. None of the above

838) Which privilege is required to create a database?


A. SYSDBA
B. DBA
C. SYSOPER
D. RESOURCE
E. None of the above

839) What is the type of Oracle backup in which all uncommitted changes have been
removed from the Data files?
A. Full backup
B. Consistent backup
C. Inconsistent backup
D. Differential backup
E. None of the above

840) Which are the physical structures that constitute the Oracle database?
A. control file
B. Data file
145
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
C. Log file
D. All of the above
E. None of the above

841) DML is provided for


A. Description of logical structure of database.
B. Addition of new structures in the database system.
C. Manipulation & processing of database.
D. Definition of physical structure of database system.
E. None of the above

842)‘AS’ clause is used in SQL for


A. Selection operation.
B. Rename operation.
C. Join operation.
D. Projection operation
E. None of the above

843) ODBC stands for


A. Object Database Connectivity.
B. Oral Database Connectivity.
C. Oracle Database Connectivity.
D. Open Database Connectivity.
E. None of the above

844) In an E-R diagram attributes are represented by


A. rectangle.
B. Square.
C. Ellipse.
D. Triangle.
E. None of the above

845) The database environment has all of the following components except:
A. Users.
B. Separate files.
C. Database.
D. Database administrator
E. None of the above

846) The language which has recently become the de-facto standard for interfacing
application programs with relational database system is
A. Oracle.
B. SQL.
146
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
C. DBase.
D. PL/SQL
E. None of the above

847) In an E-R diagram an entity set is represented by a


A. Rectangle.
B. Ellipse.
C. Diamond box.
D. Circle.
E. None of the above

848) The DBMS language component which can be embedded in a program is


A. The data definition language (DDL).
B. The data manipulation language (DML).
C. The database administrator (DBA).
D. A query language.
E. None of the above

849) A relational database developer refers to a record as


A. A criteria.
B. A relation.
C. A tuple.
D. An attribute.
E. None of the above

850) The method in which records are physically stored in a specified order
according to a key field in each record is
A. Hash.
B. Direct.
C. Sequential.
D. All of the above.
E. None of the above

851) Count function in SQL returns the number of


A. Values.
B. Distinct values.
C. Groups.
D. Columns.
E. None of the above

852) An advantage of the database management approach is


A. Data is dependent on programs.
B. Data redundancy increases.
147
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
C. Data is integrated and can be accessed by multiple programs.
D. All of these
E. None of the above

853) A DBMS query language is designed to


A. Support end users who use English-like commands.
B. Support in the development of complex applications software.
C. Specify the structure of a database.
D. All of these
E. None of the above

854) The method of access which uses key transformation is known as


A. Direct.
B. Hash.
C. Random.
D. Sequential.
E. None of the above

855) The statement in SQL which allows to change the definition of a table is
A. Alter.
B. Update.
C. Create.
D. Select.
E. None of the above

856) Relational Algebra is


A. Data Definition Language.
B. Meta Language
C. Procedural query Language
D. Query
E. None of the above

857) Key to represent relationship between tables is called


A. Primary key
B. Secondary Key
C. Foreign Key
D. None of these
E. None of the above

858) DBMS helps to achieve


A. Data independence
B. Centralized control of data
C. Both (A) and (B)
148
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
D. Only (A)
E. None of the above

859) Which of the following are the properties of entities?


A. Groups
B. Table
C. Attributes
D. Switchboards
E. None of the above

860) Which of the following is a valid SQL type?


A. CHARACTER
B. NUMERIC
C. FLOAT
D. All of the above
E. None of the above

861) Which of the following is an advantage of view?


A. Data security
B. Derived columns
C. Hiding of complex queries
D. All of the above
E. None of the above

862) Which database level is closest to the users?


A. External
B. Internal
C. Physical
D. Conceptual
E. None of the above

863) A set of possible data values is called


A. Attribute.
B. Degree.
C. Tuple.
D. Domain.
E. None of the above

864) Which of the following is another name for weak entity?


A. Child
B. Owner
C. Dominant
D. All of the above
149
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
E. None of the above

865) Which of the following database object does not physically exist?
A. Base table
B. Index
C. View
D. Variable
E. None of the above

866) Which two files are used during operation of the DBMS?
A. Query languages and utilities
B. DML and query language
C. Data dictionary and transaction log
D. Data dictionary and query language
E. None of the above

867) ............data type can store unstructured data


A. RAW
B. CHAR
C. NUMERIC
D. VARCHAR
E. None of the above

868) Cartesian product in relational algebra is


A. a Unary operator
B. a Binary operator
C. a Ternary operator
D. All of these
E. None of the above

869) In a Hierarchical model records are organized as


A. Graph.
B. List.
C. Links.
D. Tree.
E. None of the above

870) In case of entity integrity, the primary key may be


A. not Null
B. Null
C. both Null & not Null.
D. any value.
E. None of the above
150
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
871) The language used in application programs to request data from the DBMS is
referred to as the
A. DML
B. DDL
C. VDL
D. SDL
E. None of the above

872) A subschema expresses


A. the logical view.
B. the physical view.
C. the external view.
D. all of the above.
E. None of the above

873) E-R model uses this symbol to represent weak entity set?
A. Dotted rectangle.
B. Diamond
C. Doubly outlined rectangle
D. All of these
E. None of the above

874) SET concept is used in :


A. Network Model
B. Hierarchical Model
C. Relational Model
D. E-R Model
E. None of the above

875) _______ produces the relation that has attributes of R1 and R2


A. Cartesian product
B. Difference
C. Intersection
D. Product
E. None of the above

876) In a relation
A. Ordering of rows is immaterial
B. No two rows are identical
C. Both (A) and (B)
D. Only (A)
E. None of the above
151
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
877) The conceptual model is
A. dependent on hardware.
B. dependent on software.
C. dependent on both hardware and software.
D. independent of both hardware and software.
E. None of the above

878) Which of the following operation is used if we are interested in only certain
columns of a table?
A. PROJECTION
B. SELECTION
C. UNION
D. JOIN
E. None of the above

879) The users who use easy-to-use menu are called


A. Sophisticated end users.
B. Naive users.
C. Stand-alone users.
D. Casual end users.
E. None of the above

880) Which are the two ways in which entities can participate in a relationship?
A. Passive and active
B. Total and partial
C. Simple and Complex
D. All of the above
E. None of the above

881) Which of the following is a comparison operator in SQL?


A. =
B. LIKE
C. BETWEEN
D. All of the above
E. None of the above

882) A data dictionary is a special file that contains:


A. The name of all fields in all files.
B. The width of all fields in all files.
C. The data type of all fields in all files.
D. All of the above.
E. None of the above
152
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
883) A file manipulation command that extracts some of the records from a file is
called
A. SELECT
B. PROJECT
C. JOIN
D. PRODUCT
E. None of the above

884) The physical location of a record is determined by a mathematical formula that


transforms a file key into a record location is :
A. B-Tree File
B. Hashed File
C. Indexed File
D. Sequential file.
E. None of the above

885) Which of the following is record based logical model?


A. Network Model
B. Object oriented model
C. E-R Model
D. Relational Model
E. None of the above

886) A primary key is combined with a foreign key creates


A. Parent-Child relationship between the tables that connect them.
B. Many to many relationship between the tables that connect them.
C. Network model between the tables that connect them.
D. All of these
E. None of the above

887) The natural join is equal to


A. Cartesian Product
B. Combination of Union and Cartesian product
C. Combination of selection and Cartesian product
D. Combination of projection and Cartesian product
E. None of the above

888) In E-R Diagram relationship type is represented by


A. Ellipse
B. Dashed ellipse
C. Rectangle
D. Diamond
153
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
E. None of the above

889) The ______ operator is used to compare a value to a list of literals values that
have been specified.
A. BETWEEN
B. ANY
C. IN
D. ALL
E. None of the above

890) _____________ function divides one numeric expression by another and


returns the remainder.
A. POWER
B. MOD
C. ROUND
D. REMAINDER
E. None of the above

891) In E-R diagram generalization is represented by


A. Ellipse
B. Dashed ellipse
C. Rectangle
D. Triangle
E. None of the above

892) _________ is a virtual table that draws its data from the result of an SQL
SELECT statement.
A. View
B. Synonym
C. Sequence
D. Transaction
E. None of the above

893) A table joined with itself is called


A. Join
B. Self Join
C. Outer Join
D. Equi Join
E. None of the above

894) A DBMS query language is designed to


A. support end users who use English-like commands.
B. support in the development of complex applications software.
154
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
C. specify the structure of a database.
D. All of the above
E. None of the above

895) Transaction processing is associated with everything below except


A. producing detail, summary, or exception reports.
B. recording a business activity.
C. confirming an action or triggering a response.
D. maintaining data
E. None of the above

896) It is possible to define a schema completely using


A. VDL and DDL.
B. DDL and DML.
C. SDL and DDL.
D. VDL and DML
E. None of the above

897) It is better to use files than a DBMS when there are


A. Stringent real-time requirements.
B. Multiple users wish to access the data.
C. Complex relationships among data.
D. All of the above.
E. None of the above

898) Which of the operations constitute a basic set of operations for manipulating
relational data?
A. Predicate calculus
B. Relational calculus
C. Relational algebra
D. All of these
E. None of the above

899) A key more than one attribute is called


A. composite key
B. primary key
C. candidate key
D. super key
E. None of the above

900) An attribute or set of attributes that uniquely identifies an entity is called


A. Super key
B. primary key
155
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
C. candidate key
D. composite key
E. None of the above

901) _________ means that each logical object is placed in a set of memory
locations with strictly consecutive addresses.
A. External Fragmentation
B. Internal Fragmentation
C. Contiguous Allocation
D. Segmentation
E. None of these

902) Which of the following eliminates internal fragmentation?


A. External Fragmentation
B. Contiguous Allocation
C. Static partitioning
D. Dynamic partitioning
E. None of these

903) Wasting of memory between partitions, due to scattering of the free space into
a number of dis-contiguous areas, is called _________
A. External Fragmentation
B. Internal Fragmentation
C. Contiguous Allocation
D. Dynamic partitioning
E. None of these

904) A ________ is a hardware complex that contains most of the logic address
translation in microprocessor systems.
A. Memory Management Unit (MMU)
B. Translation Lookaside Buffer (TLB)
C. Page Map Table (PMT)
D. Network Interface Card (NIC)
E. None of these

905) Which of the following is a memory cache that stores recent translations of
virtual memory to physical addresses for faster retrieval.
A. Memory Management Unit (MMU)
B. Translation Lookaside Buffer (TLB)
C. Page Map Table (PMT)
D. Network Interface Card (NIC)
E. None of these

156
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
906) Which of the following requires that all channels in a message transmission
path be of the same speed?
A. Packet-switched networks
B. Circuit-switched networks
C. Message-switched networks
D. All of these
E. None of these

907) Which protocol works at the Internet layer and provides a connection service
between hosts?
A. Internet Protocol(IP)
B. Packet Internet Gopher(PING)
C. Reverse Address Resolution Protocol (RARP)
D. Address Resolution Protocol (ARP)
E. None of these

908) If a host broadcasts a frame that includes a source and destination hardware
address, and its purpose is to assign IP addresses to itself, Which protocol at the
Network Layer does the host use?
A. Internet Control Message Protocol(ICMP)
B. Packet Internet Gopher(PING)
C. Reverse Address Resolution Protocol (RARP)
D. Address Resolution Protocol (ARP)
E. None of these

909) When you connect to an online information service you are asked to provide
some kind of identification such as your name, an account number and a password.
What is the name given to this brief dialogue between you and the information
system?
A. Security Procedure
B. Safeguard Procedure
C. Identification Procedure
D. Log-on procedure
E. None of these

910) A heap allows a very efficient implementation of a ________


A. Stack
B. Queue
C. Priority Queue
D. Binary Search
E. None of these

911) Error detection at the data link layer is achieved by?


157
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
A. Bit stuffing
B. Cyclic redundancy codes
C. Hamming codes
D. Equalization
E. None of these

912) Which of the following services is used to translate host names into IP
addresses?
A. SNMP
B. SMTP
C. UDP
D. DNS
E. None of these

913) Which of the following functions is not performed by TCP?


A. Flow Control
B. Error Checking
C. Sequencing
D. Subnetting
E. None of these

914) Which of the following table helps in representing the previous and next state
of the sequential circuit prior to and the clock pulse respectively?
A. Truth Table
B. Characteristic Table
C. Excitation Table
D. Symbol Table
E. None of these

915) One method of programming a computer to exhibit human intelligence is called


modeling or ________
A. Simulation
B. Cognitization
C. Duplication
D. Sequencing
E. None of these

916) Which of the following is an important component of semantic analysis?


A. Symbol table
B. Type Checking
C. Lex
D. Yacc
E. None of these
158
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
917) Which of the following tools will identify the address intermediate hops
between two stations?
A. TCP
B. Telnet
C. Ping
D. Traceroute or Tracert
E. None of these

918) Lexical Analyzer transforms an input streams into __________


A. Regular expression
B. Binary
C. Symbols
D. Sequence Tokens
E. None of these

919) The relative position of the file marker can be changed via the _________
A. Marker call
B. EXEC Command
C. Fence Register
D. LSEEK Call
E. None of these

920) In a Third Normal Form relation, every________attribute is non-transitively


and fully dependent on the every candidate Keys.
A. Prime
B. Unique
C. Non-Prime
D. Telnet
E. None of these

921) Which of the following methods provides the greatest frame throughput?
A. Frame-tag switching
B. ISL Switching
C. Store-and-forward switching
D. Cut-through switching
E. None of these

922) What must you do to allow a Virtual LAN(VLAN) to span two or more switches?
A. Configure port security on the switch.
B. Set up a VTP domain
C. Configure the duplex setting on the ports
D. Set up a trunk location.
159
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
E. None of these

923) What is ISL used for?


A. To allow simultaneous routing and switching
B. To allow an Ethernet interface to understand frame tags
C. Both (A) and (B)
D. Only (A)
E. None of these

924) What is the name of the protocol used to eliminate loops?


A. Switching
B. Frame tagging
C. Spanning tree protocol
D. Duplication
E. None of these

925) If you wanted to locate the hardware address of a local device, which protocol
would you use?
A. Internet Control Message Protocol(ICMP)
B. Packet Internet Gopher(PING)
C. Reverse Address Resolution Protocol (RARP)
D. Address Resolution Protocol (ARP)
E. None of these

926) To which pin on the RAM chip does the address decoder connect in order to
signal which memory chip is being accessed?
A. The address input
B. The output enable
C. The chip enable
D. The data input
E. None of these

927) The altering of data so that it is not usable unless the changes are undone is
________
A. Compression
B. Encryption
C. Ergonomic
D. Interrupt
E. None of these

928) Which of the following scheduler is in charge of handling the swapped out
process?
A. Medium term
160
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
B. Long term
C. Short term
D. All of these
E. None of these

929) Race around condition can be eliminated using_________


A. False Triggering
B. Two clock pulses
C. Master-slave Flip-Flop
D. All of the above
E. None of these

930) Which of the following is an operating system Call?


A. OPEN
B. CLOSE
C. UNLINK
D. All of the above
E. None of these

931) Which component is used by the data analyst to create the queries that access
the database?
A. Data extraction
B. End-user query tool
C. End-user presentation tool
D. Abstraction
E. None of these

932) __________ allows wireless mobile devices to access the Internet and its
services.
A. WAP
B. Ethernet
C. TCP/IP
D. LAN
E. None of these

933) Which data structure is needed to convert Infix notation to postfix notation?
A. Tree
B. Queue
C. Stack
D. Array
E. None of these

934) Binding the same name to multiple operations whose signature differ in
161
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
number or types of arguments?
A. Overloading
B. Object model
C. Package
D. Tree
E. None of these

935) Implementation of an inverted list to maintain the record list for each value for
a given attribute can be done by________
A. Sequential file
B. Direct file
C. Indexed file
D. Document file
E. None of these

936) _______ is a communication mode in which only one signal is transmitted.


A. Half Duplex Channel
B. Full Duplex Channel
C. Simplex Channel
D. Logical Channel
E. None of these

937) In Operating Systems, protection in a paging system is achieved mainly by the


PMLTR. PMLTR stands for ________
A. Page Map Table Limit Record
B. Page Memory Table Limit Register
C. Page Memory Table Limit Register
D. Page Map Table Limit Register
E. None of these

938) Which of the following protocol is related to message format in e-mail?


A. RFC 822
B. RFC 832
C. RFC 844
D. All of these
E. None of these

939) Wasting of memory within a partition, due to a reference in size of a partition


and of the object resident within it, is called _________
A. External Fragmentation
B. Internal Fragmentation
C. Both (A) and (B)
D. Only (A)
162
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
E. None of these

940) In OSI model, routing is performed by ________


A. Layer 5
B. Layer 4
C. Layer 6
D. Layer 3
E. None of these

941) What is the purpose of VLAN Trunking Protocol(VTP) Pruning?


A. To simplify the management of VLANS
B. To reduce unnecessary flooded traffic on specified trunk lines.
C. Both (A) and (B)
D. Only (A)
E. None of these

942) A network administrator wants to pass traffic between two Virtual


LANS(VLANs) on the same switch. What will he need to accomplish this?
A. bridge
B. switch
C. router
D. Ethernet
E. None of these

943) Which layer uses the segment as a Protocol Data Unit(PDU)?


A. Layer 5
B. Layer 3
C. Layer 2
D. Layer 4
E. None of these

944) Which of the following tools can be utilized to test IP connectivity between two
devices?
A. Ping
B. Telnet
C. Traceroute
D. All of the Above
E. None of these

945) A descending heap is also called _________


A. Max heap
B. Min heap
C. Priority heap
163
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
D. Binary heap
E. None of these

946) Piggy backing is a technique for _______


A. Acknowledgement
B. Flow control
C. Both (A) and (B)
D. Flow chart
E. None of these

947) Tracking and recording of page modifications is usually performed in hardware


by adding a written-into bit to each entry of the page map table. This bit is
sometimes called ________
A. Protection bits
B. Dirty bits
C. Priority bits
D. Router bits
E. None of these

948) The best adequate Normal Form is _________


A. 2NF
B. 3NF
C. 4NF
D. 5NF
E. None of these

949) Which of the following is an Object-Oriented Programming (OOP)?


A. AI and expert system
B. Neural Networks
C. Parallel Programming
D. All of the Above
E. None of these

950) In C++, setw is _____ operator.


A. Initialization
B. Conditional
C. Field Width
D. Compression
E. None of these

951) _______ translates high level language(source code) into low level
language(object code)
A. Compiler
164
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
B. Interpreter
C. Assembler
D. Recursive
E. None of these

952) System program such as Compiler are designed so that they are __________
A. Recursive
B. Non-reusable
C. Serially usable
D. Re-enterable
E. None of these

953) The computer language generally translated to pseudocode is ______


A. Interpreter
B. Compiler
C. Assembly
D. Recursive
E. None of these

954) A system program that combines separately compiled modules of a program


into a form suitable for execution is __________
A. Assembler
B. Linking loader
C. Linker
D. Compiler
E. None of these

955) In an absolute loading scheme, which loader function is accomplished by


programmer?
A. Allocation
B. Linking
C. Both (A) and (B)
D. Linking loader
E. None of these

956) Resolution is externally defined symbols is performed by _________


A. Assembler
B. Linking loader
C. Linker
D. Recursive
E. None of these

957) Which of the following is used for grouping of characters into tokens?
165
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
A. Parser
B. Code generator
C. Loader
D. Lexical Analyser
E. None of these

958) A compiler that runs on a particular platform and is capable of generating


executable code for another platform is called a _______
A. Assembler
B. Linking loader
C. Loader
D. Cross-Compiler
E. None of these

959) A system program that set up an executable program in main memory ready
for execution is __________ ?
A. Assembler
B. Linker
C. Loader
D. Text editor
E. None of these

960) A compiler which allows only the modified section of the source code to be
recompiled is called as _______
A. Incremental Compiler
B. Dynamic Compiler
C. Subjective Compiler
D. Cross-Compiler
E. None of these

961) The output of lexical analyser is _________


A. A set of regular expressions
B. Syntax tree
C. Set of tokens
D. Text editor
E. None of these

962) A bottom-up parser generates ___________


A. right-most derivation
B. left-most derivation
C. right-most derivation in reverse
D. left-most derivation in reverse
E. None of these
166
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
963) A top-down parser generates ___________
A. right-most derivation
B. left-most derivation
C. right-most derivation in reverse
D. left-most derivation in reverse
E. None of these

964) A form of recursive-descent parsing that does not require any back-tracking is
known as__________
A. Predictive parsing
B. Recursive-descent parsing
C. Both (A) and (B)
D. Only (B)
E. None of these

965) __________ checks whether the parse tree constructed follows the rules of a
language.
A. Syntax Analysis
B. Semantic Analysis
C. Lexical Analysis
D. All of these
E. None of these

966) Which of the following is/are advantage(s) of Compiler Technology?


A. Parsers for HTML in web browser
B. Software testing
C. Malicious code detection
D. All of the above
E. None of these

967) __________ defines the syntax of a programming language.


A. Token
B. Pattern
C. Context-Free Grammar
D. Linker
E. None of these

968) The graph that shows the basic blocks and their successor relationship is
called_______
A. Control graph
B. Hamiltonian graph
C. Flow Chart
167
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
D. Syntax tree
E. None of these

969) The optimization technique which is typically applied on loops is _____


A. Peephole optimization
B. Removal of invariant computation
C. Constant folding
D. All of the Above
E. None of these

970) Semantic errors can be detected at__________


A. run time
B. compile time
C. Both (A) and (B)
D. Flow chart
E. None of these

971) In an absolute loading scheme which loader function is accomplished by


assembler?
A. re-allocation
B. allocation
C. linking
D. loading
E. None of these

972) ________or scanning is the process where the stream of characters making up
the source program is read from left to right and grouped into tokens.
A. Lexical analysis
B. Diversion
C. Modeling
D. Loading
E. None of these

973) Load address for the first word of the program is called_________
A. Linker address origin
B. load address origin
C. Phase library
D. Diversion
E. None of these

974) The translator which perform macro expansion is called a _________


A. Macro processor
B. Macro pre-processor
168
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
C. Micro pre-processor
D. assembler
E. None of these

975) Which of the following is permanent database in the general model of


compiler?
A. Identifier table
B. Literal table
C. Terminal table
D. All of these
E. None of these

976) Which of the following module does not incorporate initialization of values
changed by the module?
A. reusable module
B. Serially usable module
C. re-enterable module
D. non reusable module
E. None of these

977) Analysis that determines the meaning of a statement once its grammatical
structure becomes known is termed as __________
A. Semantic analysis
B. Syntax analysis
C. Regular analysis
D. General analysis
E. None of these

978) Which of the following system software resides in main memory always?
A. Linker
B. Loader
C. Assembler
D. Compiler
E. None of these

979) Parsing is also known as __________


A. Lexical analysis
B. Syntax analysis
C. Semantic analysis
D. Code generation
E. None of these

980) Back-patching is useful for handling ________


169
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
A. Unconditional jumps
B. Conditional jumps
C. backward references
D. forward references
E. None of these

981) A computer program can often be a very satisfactory _______ of a physical


system such as road traffic conditions.
A. solution
B. replacement
C. model
D. simulation
E. None of these

982) Which of the following software engineering concept does Ada language
support?
A. abstraction
B. generic
C. information hiding
D. All of the Above
E. None of these

983) A module that is supplied along with the programming language translator to
make the language easier is called a/an ________
A. intrinsic function
B. benchmark program
C. data structure
D. abstraction
E. None of these

984) The model which reduces the cost of development of software is _______
A. waterfall model
B. spiral
C. prototyping
D. generic
E. None of these

985) The model which estimates the total effort in terms of person, months of the
technical project staff, is ________
A. waterfall model
B. spiral
C. COCOMO Model
D. prototyping
170
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
E. None of these

986) The graph theoretic concept will be useful in software testing is ________
A. Cyclomatic number
B. Eulerian Cycle
C. Hamultonian circuit
D. prototyping
E. None of these

987) A desirable property of module is________


A. multifunctional
B. independency
C. high coupling
D. prototyping
E. None of these

988) The maximum effort distribution in phases of software development is


________
A. requirement analysis
B. testing
C. coding
D. operations
E. None of these

989) COM stands for ________


A. Computer on Microprocessor
B. Computer Output Microprocessor
C. Computer on Microfilm
D. Computer Output Microfilm
E. None of these

990) In Object oriented design of software, objects have _____


A. Attributes
B. Operations
C. Both (A) and (B)
D. Testing
E. None of these

991) Which of the following is/are included in the Software Requirement


Specification(SRS) document?
A. Functional requirements
B. Non-Functional requirements
C. Goals of Implementation
171
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
D. All of the Above
E. None of these

992) Black box testing is also known as ________


A. graph based testing
B. loop testing
C. behavioral testing
D. attributes
E. None of these

993) White box testing, a software testing technique is also called _________
A. graph based testing
B. loop testing
C. data flow testing
D. structural testing
E. None of these

994) In Software development prototype is a ________


A. Mini-model of existing system
B. rudimentary working model of a product
C. Working model of the existing system
D. All of these
E. None of these

995) _______ is a popular version of the Systems Development Life Cycle (SDLC)
model for Software Engineering.
A. Waterfall Model
B. Iterative Model
C. Spiral Model
D. V Model
E. None of these

996) In RAD model, RAD stands for _________


A. Random Application Development
B. Rapid Access Development
C. Random Application Design
D. Rapid Application Development
E. None of these

997) The traditional methodology used to develop, maintain, and replace


information systems is _____________
A. SDLC
B. RAD
172
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
C. OOAD
D. prototyping
E. None of these

998) Automated tools for design are also called ________


A. CASE Tools
B. System design
C. DFD
D. RAD
E. None of these

999) Which of the following is the Central component of any CASE tool?
A. CASE concentrator
B. CASE origin
C. CASE repository
D. All of these
E. None of these

1000) The phase of the SDLC in which an information system is systematically


repaired and improved is referred to as________
A. analysis
B. implementation
C. maintenance
D. attribute
E. None of these

173
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK

Subscribe Our Study Regular


Youtube Channel And
Join Our Facebook Group For
Notes & MCQ

MUST READ BEFORE AN EXAM

174
www.studyregular.in contact@studyregular.in

You might also like