1000 Question It Ebook
1000 Question It Ebook
1000 IMPORTANT
QUESTIONS EBOOK
Questions Covered From Topic:
DBMS
Computer Network
Network Security
Operating System
Computer Organization
Software Engineering
C/C++
Web Technology
Data Structure
Subscribe Our Study Regular Youtube Channel For Daily Videos
4)Which of the following wildcard masks is most useful for matching all IP packets in
subnet 10. 1. 128. 0, mask 255.255.255.0?
a)0.0.0.0
b)0.0.0.255
c)0.0.0240
d)0.0.0.31
e)None of these
6)……………………… are two important technologies for developing the Semantic web
a)XML and RDF
b)XML and HTML
c)RDF and HTML
d)Wi-Fi and RDF
e)None of these
2
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
7)In what kind of storage, we can easily insert, delete, concatenate and reaarange
substrings?
a)Stack
b)Linked list
c)Queue
d)Array
e)None of these
9) Which of the following techniques provides redundancy by using two disks and two
controllers?
a) Disk striping
b) Disk striping with parity
c) Drive mirroring
d) Drive duplexing
e) None of these
10) _________ is the term for the use of deception to get someone’s sensitive information
a) Identity theft
b) Personal engineering
c) Spoofing
d) Social engineering
e) None of these
12) A DBMS performs several important functions that guarantee the integrity and
consistency of the data in the database. Which of the following is not one of those
functions?
a) Data integrity management
b) Data reports
3
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
c) Security and storage management
d) Data storage management
e)None of these
14) Which of the following is the phase of SDLC in which the identified requirements are
incorporated into the new system’s design
a) Maintenance
b) Physical Layout
c) Requirement design
d) Systems design
e) None of these
17) A communications medium where data are transformed into lights pulses is
a) coaxial cable
b) optical fibre
c) satellite
d) twisted – pair cable
e) None of these
18) __________ is a standard for security that is inclined at the network or packet
processing layer of network communications, as opposed to the application layer.
4
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
a) Passive FTP
b) TCP
c) SSL
d) IPsec
e) None of these
21) _________ is one of the older and slowest methods an intruder might use to scan a
network to determine which of a range of IP addresses map to live hosts.
a) Ping sweep
b) Phreaking
c) Smurfing
d) War driving
e) None of these
22) which of the following is used to create and delete views and relations within tables?
a) SQL Data Identification Language
b) SQL Data Identification and Manipulation Language
c) SQL Data Relational Language
d) SQL Data Definition Language
e) None of these
25) ________ is the integration of economic, social, cultural and ecological facets of life,
enabled by information technologies.
a) Business environment
b) Neutralisation
c) Nationalisation
d) Globalisation
e) None of these
26) ________ is the process and tools used by managers and executives with the support
of the project team to manage employee resistance.
a) Resistance management
b) Change management
c) Detailing management
d) Probing management
e) None of these
6
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
30) A CASE SQL statement is which of the following?
a) A way to establish a data definition in SQL or establish a loop in SQL
b) A way to establish an IF – THEN – ELSE in SQL
c) A way to establish a loop in SQL
d) A way to establish a data definition in SQL
e) None of these
31)The CMM Level at which measurable goals for quality and productivity are established
in
a)Level 1
b)Level 2
c)Level 3
d)Level 4
e)None of these
32)When you will visit websites spyware may be substantially downloaded. This is called
a
a)logic bomb
b)drive – by download
c)Virus
d)spyot
e)None of these
34)A data structure where element can be added or removed at either end but not in the
middle is called
a)requeue
b)queues
c)linked list
d)stacks
e)None of these
35)Which of the following are placeholders for literal value in a SQL query being sent to
the database
a)resolution variables
b)reduction variables
c)assimilation variables
7
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
d)bind variables
e)None of these
36)In TPS system, an output that signifies that a specifies that a specific transaction has
taken place is called a (n)
a)detail report
b)action document
c)inception report
d)exception report
e)None of these
37)………………………….. is the process whereby media files such as a video start playing as
they are downloading
a)Streaming
b)Pushing
c)Dragging
d)Pulling
e)None of these
40)What type of join is needed when you wish to include rows that do not have matching
values?
a)Equi – Join
b)Indefinite Join
c)Intermediate Join
d)Outer Join
e)None of these
43)Frame relay
a)does not use error correction routines
b)is used by facsimile machine
c)does not work will on the internet
d)is an outdated technology
e)None of these
44)The design tool used to illustrate the logic of a new computer software logic diagram
that uses symbols to represent program elements is called a (n)
a)data logic chart
b)data flow diagram
c)software logic diagram
d)system flow chart
e)None of these
45)A web facility that helps to find sites with the information and / or services that is
desired is
a)a hyperlink
b)a search engine
c)a network access point
d)a blog
e)None of these
46)When new data are to inserted into a data structure but there is not available space;
this situation is usually called
a)underflow
b)overflow
c)Houseful
d)empty
e)None of these
9
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
47)A ………………………….. is acrylic diagraph, which as only node with in – degree 0, and
other nodes have in degree 1.
a)Dis – joint tree
b)Direction oriented tree
c)Directed tree
d)Undirected tree
e)none of these
49)Which of the following forms does not describe parallel ATA devices?
a)SCSI
b)IOE and DOE
c)IOE
d)DOE
e)None of these
51) The building block of a Wireless LAN as defined by IEEE 802.11 standard?
(A) BSS
(B) ESS
(C) Both (A) & (B)
(D) DSS
(E) None of the above
10
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
53) CIDR stands for
(A) Code Inter Domain Routing
(B) Code Inter Division Routing
(C) Classless Inter Domain Routing
(D) Classful Inter Domain Routing
(E) None of the above
57) A protocol in which the sender sends one frame and stops until it receives
confirmation from the receiver?
(A) Stop and Wait ARQ
(B) Store and forward switch
(C) Stop and Wait Protocol
(D) Dynamic routing
(E) None of the above
58) Which of the following is an application service for retrieving a web document?
(A) HTML
(B) HTTP
(C) FTP
(D) BSS
(E) None of the above
11
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
59) You are in the process of analyzing a problem that requires you to collect and
store TCP/IP Packets.Which of the following utilities is best suited for this purpose?
(A) Performance Monitor
(B) Network Monitor
(C) NETSTAT
(D) NBTSTAT
(E) None of the above
60) Which of the following protocol provides confidentiality and authentication for
an e-mail?
(A) BGP
(B) BOOTP
(C) PGP
(D) ESS
(E) None of the above
61) An addressing method in which the IP address space is not divided into classes?
(A) Classful addressing
(B) Classless addressing
(C) Classless IDR
(D) Network Monitor
(E) None of the above
62) The number of differences between the corresponding bits in a two data words
is known as...... distance
(A) Hanning
(B) Hamming
(C) Huffman
(D) Exterior routing
(E) None of the above
64) The splitting of a message into multiple packets at transport layer is known
as______
(A) Fragmentation
(B) Segmentation
12
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
(C) Synchronization
(D) Broadcast
(E) None of the above
66) The loss of signal’s energy due to the resistance of medium is called......
(A) Fragmentation
(B) Attenuation
(C) Synchronization
(D) Segmentation
(E) None of the above
67) In Wireless LAN’s, a time interval between two frames to control access to the
channel is called.....
(A) Interframe space
(B) Interleaving
(C) Interior routing
(D) Dynamic routing
(E) None of the above
68) An array of switches that are used to reduce the number of cross points is
called.....
(A) single stage switch
(B) dual stage switch
(C) multistage switch
(D) Huffman
(E) None of the above
69) An application protocol of TCP/IP that allows remote login is known as.......
(A) NCP
(B) NVT
(C) NAV
(D) PGP
(E) None of the above
74) Encryption and decryption of data are the responsibility of ....... layer
(A) Physical
(B) Datalink
(C) Transport
(D) Presentation
(E) None of the above
75) What is the main function of transport layer in the OSI model?
(A) peer to peer message delivery
(B) node to node message delivery
(C) process to process message delivery
(D) direct to direct message deliver
(E) None of the above
77) In OSI model, as the data packet moves from the upper to the lower layers,
headers are _______.
(A) added
(B) removed
(C) deleted
(D) edited
(E) None of the above
81) IEEE 802.3 standard used what method as the media access method?
(A) CSMA/CD
(B) CSMA/CA
(C) CDMA
(D) FDMA
(E) None of the above
86) What is the minimum & maximum frame length for 10 Mbps Ethernet?
(A) 32 bytes, 64 bytes
(B) 64 bytes, 128 bytes
(C) 64 bytes, 1518 bytes
(D) 32 bytes, 1518 bytes
(E) None of these
88) Which of the following refers to a group of standards that are still being
developed as a part of overall IEEE 802.11 WLAN support?
(A) 802.11i
(B) 802.11x
16
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
(C) Both (A) & (B)
(D) Only (A)
(E) None of the above
89) Which of the following is a security protocol designed to provide a wireless LAN
with better security and privacy?
(A) WEP
(B) SNMP
(C) WAP
(D) LDAP
(E) None of the above
90) Which of the following is a timer used for Collision Avoidance (CA)?
(A) PCF
(B) MAC
(C) NAV
(D) LAN
(E) None of the above
92) Ethernet, token ring and token bus are types of.........
(A) MAN
(B) WAN
(C) LAN
(D) MAC
(E) None of the above
93) What is the name of network topology in which there are bidirectional links
between each possible node?
(A) Star
(B) Mesh
(C) Ring
(D) All of these
(E) None of the above
95) Which TCP/IP protocol is used for file transfer with minimal capability and
minimal overhead?
(A) SGMP
(B) TFTP
(C) SUMP
(D) SNMP
(E) None of the above
101) Which protocol working at the Transport layer provides a connectionless service
between hosts?
(A) UDP
(B) ARP
(C) TCP/IP
(D) NCP
(E) None of the above
104) What protocol does PPP use to identify the Network Layer Protocol?
(A) UDP
(B) ICMP
(C) NCP
(D) RIP
(E) None of the above
105) With respect to a network interface card, the term 10/100 refers to
(A) protocol speed
(B) a fiber speed
(C) megabits per seconds
(D) All of these
(E) None of the above
106) If you want to locate the hardware address of a local device, which protocol
would you use
(A) UDP
19
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
(B) ARP
(C) NCP
(D) TCP
(E) None of the above
107) ______ is primarily used for mapping host names and email destinations to IP
address
(A) TCP
(B) DNS
(C) NCP
(D) UDP
(E) None of the above
108) Which of the following TCP/IP protocol is used for transferring electronic mail
messages from one machine to another?
(A) TCP
(B) SMTP
(C) NCP
(D) ARP
(E) None of the above
109) _____ is the continuous ability to send and receive data between
interconnected networks.
(A) FTP
(B) SMTP
(C) TNS
(D) Network Interoperability
(E) None of the above
20
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
112) What is loopback address?
(A) 127.0.0.1
(B) 255.0.0.0
(C) 255.255.0.0
(D) 127.0.0.0
(E) None of the above
119) Which OSI layer divides a file into segments that are an efficient size for
routing?
(A) Transport Layer
(B) Network Layer
(C) Data link Layer
(D) Physical layer
(E) None of the above
121) Which of the following are the types of Internal Network Cards?
(A) Peripheral Component Interconnect (PCI), Wireless Network Card
(B) Industry Standard Architecture (ISA),Wireless Network Card
(C) Peripheral Component Interconnect (PCI), Industry Standard Architecture(ISA)
(D) All of these
(E) None of the above
122) A networking device that forwards data packets along networks and acts as a
central point of network is called
(A) Repeater
(B) Router
(C) Bridge
(D) Hub
(E) None of the above
126) Which is the general network standard for the data link layer in the OSI
Reference Model?
(A) IEEE 802.1
(B) IEEE 802.2
(C) IEEE 802.3
(D) IEEE 802.4
(E)None of the above
127) Which of the following IEEE Standard is used for Wi-Fi systems?
(A) 802.11
(B) 802.1
(C) 802.2
(D) 802.10
(E)None of the above
128) ____ refers to a family of IEEE standards dealing with local area network and
metropolitan area network.
(A) 802
(B) 800
(C) 801
(D) 803
(E)None of the above
135) A device which divides the incoming signal into low frequencies to send to voice
devices, and high frequencies for data to the computer.
(A) multicast router
(B) interface
24
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
(C) splitter
(D) network
(E) None of the above
137) Which layer establishes, maintains & synchronizes the interaction between
communicating devices?
(A) Physical
(B) Datalink
(C) Application
(D) Session
(E) None of the above
144) Which layer of OSI determines the interface of the system with the user?
(A) Session layer
(B) Application layer
(C) Network layer
(D) Datalink layer
(E) None of the above
147) which of the following uses the greatest number of layers in the OSI model?
(A) Bridge
(B) Repeater
26
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
(C) Router
(D) Gateway
(E) None of the above
152) Which of the following command is used to print current working directory in
Unix?
(A) mkdir
(B) pwd
(C) rm
(D) udp
(E)None of the above
153) ....... is a classic synchronization problem that involves the allocation of limited
resources amongst a group of processes in a deadlock free and starvation free
27
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
manner.
(A) Bounded Buffer Problem
(B) Dining Philosophers Problem
(C) Readers Writers Problem
(D) Unlimited Datagram Problem
(E)None of the above
154) ....... is a system call that returns the process ID of the parent of the current
process.
(A) getpid
(B) wait
(C) getppid
(D) Hub
(E)None of the above
158) Which of the following is a System call that can be used to send signal to a
process?
(A) kill
(B) wait
(C) exec
(D) ipr
(E)None of the above
28
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
159) ........ allows a thread to terminate the execution of other threads in the
process.
(A) Thread Scheduling
(B) Thread Safety
(C) Thread Cancellation
(D) Thread Terminate
(E)None of the above
161)…. ....... provides an Interface between the process and the Operating System
(A) Synchronization
(B) System call
(C) Segmentation
(D) Fragmentation
(E)None of the above
164) …...... is a system call that runs an executable file into an existing process.
(A) fork
(B) wait
(C) exec
(D) ipr
(E)None of the above
29
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
165) Which of the following technique is used to convert a blocking system call into
a non blocking system call?
(A) Segmentation
(B) Jacketing
(C) Fragmentation
(D) Application
(E)None of the above
166) One user-level thread is mapped to many kernel level thread is known as....
(A) One to Many model
(B) One to One model
(C) Many to One model
(D) Many to Many model
(E)None of the above
168) ....... is a system call that returns the process ID of current process.
(A) getpid
(B) wait
(C) getppid
(D) exec
(E)None of the above
171) .......... is an user interface that uses only keyboard for input.
(A) Graphical User Interface
(B) Command Line Interface
(C) Both (A) & (B)
(D) Only (A)
(E)None of the above
173) An Operating System that can predict the exact time duration for operations is
called
(A) Hard RTOS
(B) Soft RTOS
(C) Both (A) & (B)
(D) Only (A)
(E)None of the above
174) The use of software to allow system hardware to run multiple applications on
different OS is termed as
(A) OS Virtualization
(B) OS level Virtualization
(C) Both (A) & (B)
(D) Operating System
(E)None of the above
177) Physical memory can be divided into a number of equal sized blocks called.....
(A) Page
(B) Frame
(C) Block
(D) Shell
(E)None of the above
179) A table that contains the base address of each page in physical memory is
called.....
(A) Page table
(B) Frame table
(C) Memory table
(D) Typing Table
(E)None of the above
182) ...... occurs in a dynamic memory allocation system when most of the free
blocks are too small to satisfy any request?
(A) Paging
32
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
(B) Segmentation
(C) Fragmentation
(D) Thrashing
(E)None of the above
183) Which of the following holds the data currently being worked on?
(A) Stack pointer
(B) Program Counter
(C) Accumulator
(D) Register
(E)None of the above
184) The total number of processes completed per unit time is termed as
(A) throughput
(B) response time
(C) waiting time
(D) program counter
(E)None of the above
195) Interrupt latency should be...... for Real Time Operating Systems (RTOS)?
(A) minimal
(B) maximum
(C) zero
(D) high
(E)None of the above
197) Which of the following is the delay that occur during the playback of a stream
is called?
(A) jitter
(B) playback delay
(c) stream delay
(D) thread
(E)None of the above
202) ...... is a special system software that is used to handle process scheduling in
different ways.
(A) Fork
(B) Scheduler
(C) Spawn
(D) Wait
(E) None of the above
205) Which of the following is a scheduling algorithm that allows a process to move
up and down between queues?
(A) Round Robin(RR) scheduling
(B) First Come First Served (FCFS) scheduling
(C) Multilevel feedback queue scheduling
(D) Shortest Job First (SJF) scheduling
(E) None of the above
206) ..... commands are automatically loaded into main memory when the booting
process gets completed.
36
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
(A) External
(B) Internal
(C) Both (A) & (B)
(D) Only (A)
(E) None of the above
210) ..... process checks to ensure the components of the computer are operating
and connected properly.
(A) Editing
(B) Saving
(C) Booting
(D) Memory
(E) None of the above
213) In UNIX, cached disk blocks are managed by the Kernel and referred to as.....
(A) Cache
(B) Disk Cache
(C) Buffer Cache
(D) Only (A)
(E) None of the above
214) ...... is the smallest unit for processing that consists of a program counter, a
stack & a set of registers.
(A) Compiler
(B) Thread
(C) Heap
(D) Pipes
(E) None of the above
221) ...... is mainly responsible for allocating the resources as per process
requirement?
(A) RAM
(B) Compiler
(C) Operating Systems
(D) Software
(E) None of the above
39
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
224) BAT refers to...
(A) Executable Files
(B) Batch Files
(C) Boot Files
(D) File Management
(E) None of the above
225) ..... occur commonly in multi-tasking when two or more threads waiting for
each other.
(A) Kernel
(B) Shell
(C) Fork
(D) Deadlock
(E) None of the above
227) ...... is the program which interprets commands given by the user?
(A) Kernel
(B) Shell
(C) Fork
(D) Thread
(E) None of the above
40
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
230) NTFS stands for.....
(A) New Technology File System
(B) New Transmission File System
(C) Net Transmission File System
(D) New Technology File System
(E) None of the above
235) ....... are required to complete a critical task within a guaranteed amount of
time.
(A) Real Time Operating Systems
(B) Multi Tasking Operating Systems
(C) Distributed Operating Systems
(D) Real Time Streaming Protocol
41
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
(E) None of the above
238) Which of the following is true for the algorithms for memory allocation?
(A) First Fit
(B) Best Fit
(C) Worst Fit
(D) All of the above
(E) None of the above
245) ...... is the process of switching of CPU from one thread to another.
(A) Process handling
(B) interrupt handling
(C) Context switching
(D) Handling
(E) None of the above
43
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
248) In DOS, ECHO command is used to....
(A) display message on screen
(B) display the contents of a text file
(C) Both (A) & (B)
(D) Only (A)
(E) None of the above
252) Which of the following begins the search with the element that is located in
the middle of the Array?
(A) Random Search
(B) Parallel Search
(C) Binary Search
(D) Serial Search
(E) None of the above
253) In a Circular linked list, insertion of a record involves the modification of____
(A) 1 Pointer
(B) 2 Pointer
(C) 3 Pointer
(D) 4Pointer
(E) None of the above
44
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
254) Which of the following is useful in traversing a given graph by breadth first
search?
(A) Stack
(B) List
(C) Queue
(D) Binary
(E) None of the above
255) A characteristic of the data that binary search uses but linear search ignores
is______
(A) Order of the list
(B) length of the list
(C) Both (A) & (B)
(D) Only (B)
(E) None of the above
256) A sort which iteratively passes through a list to exchange the first element
with any element less than it and then repeats with a new first element is
called__________
(A) Heap Sort
(B) Quick Sort
(C) Selection Sort
(D) Merge Sort
(E) None of the above
258) In an extended-binary tree, the nodes with two children are called ........
(A) Interior node
(B) Domestic node
(C) Internal node
(D) Inner node
(E) None of the above
262) Which of the following is/are real time application(s) of Circular linked list?
(A) Printer
(B) Multi player games
(C) Interrupts handling in real-time systems
(D) All of the above
(E) None of the above
269) A mathematical-model of user defined type along with the collection of all
operations defined on that model is known as ______
(A) Data Structure
(B) Primitive Data Type
(C) Algorithm
(D) Abstract Data Type
(E) None of the above
270) In ________ traversal we can convert a binary tree into its mirror image.
(A) In order
(B) Pre order
(C) Post order
(D) Traversal order
(E) None of the above
272) A set of functions that grow slower than or at the same rate as expression is
represented by_____
(A) Big Omega notation
(B) Theta notation
(C) Big O notation
(D) All of these
(E) None of the above
275) The space required to store the values of all the constants and variables is
called_______
(A) Instruction space
(B) Data Space
(C) Environment Space
(D) Graphs
(E) None of the above
276) In Heap data structure, If the parent nodes are greater than their children
nodes then it is called __________
(A) Max-Heap
(B) Min-Heap
(C) Both (A) & (B)
(D) Only (A)
(E) None of the above
48
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
277) The Quick sort algorithm divides the list into ______ main parts
(A) Four
(B) Six
(C) Five
(D) Three
(E) None of the above
282) The Array as an Abstract Data Type (ADT) supports ..... operations.
(A) Store
(B) Retrieve
(C) Both (A) & (B)
(D) Only (A)
(E) None of the above
49
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
283) Each position of the hash table is called ......
(A) Bucket
(B) Entry
(C) Cell
(D) Slot
(E) None of the above
284) The common way of keeping subsequent items within the table and computing
possible positions is termed as ............
(A) Direct Chaining
(B) Open Addressing
(C) Both (A) & (B)
(D) Only (A)
(E) None of the above
286) In Binary Tree Traversal, the node is visited after both trees is called.......
(A) pre order
(B) In order
(C) post order
(D) traversal
(E) None of the above
50
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
289) ...... is a header list in which the last node points back to the header node.
(A) Circular Header linked list
(B) Grounded Header linked list
(C) Both (A) & (B)
(D) Only (A)
(E) None of the above
290) A pointer that contains the address of a heap-dynamic variable is called .....
(A) Dangling pointer
(B) Null pointer
(C) Void pointer
(D) Function pointer
(E) None of the above
292) Which of the following data structure stores heterogeneous data elements?
(A) Record
(B) Pointer
(C) Linear Array
(D) Pointer
(E) None of the above
293) ....... is required for languages that support dynamic data structure.
(A) Stack allocation
(B) Static allocation
(C) Heap allocation
(D) Quick allocation
(E) None of the above
294) In Binary Tree Traversal, the node is visited before its left and right sub trees
is called.......
(A) pre order
(B) In order
(C) post order
(D) traversal order
(E) None of the above
51
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
295) Which of the following is non linear data structure?
(A) Stack
(B) Tree
(C) Queue
(D) Linked list
(E) None of the above
296) Which algorithm solves the all pairs shortest path problem ?
(A) Floyd’s algorithm
(B) Prim’s algorithm
(C) Both (A) & (B)
(D) Randomized algorithm
(E) None of the above
299) ...... is a header list in which the last node contains the null pointer.
(A) Circular Header list
(B) Grounded Header list
(C) Both (A) & (B)
(D) Linked list
(E) None of the above
308) ..... is a technique to convert a range of key values into a range of Indices of an
Array?
(A) Thrashing
(B) Hashing
(C) Interpolation
(D) Graph
(E) None of the above
313) A sort that compares each element with its adjacent element in a list is
called.....
54
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
(A) Bubble Sort
(B) Insertion Sort
(C) Quick Sort
(D) Heap Sort
(E) None of the above
314) Which of the following data structure is required to evaluate a post fix
expression?
(A) Stack
(B) linked list
(C) Array
(D) Bubble sort
(E) None of the above
317) A matrix in which number of zero elements are much higher than the number
of non zero elements is called
(A) Scalar Matrix
(B) Identity Matrix
(C) Sparse Matrix
(D) Vector Matrix
(E) None of the above
55
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
319) The smallest element of an Array’s index is known as.....
(A) Range
(B) Upper bound
(C) Lower bound
(D) Linked list
(E) None of the above
321) A linear list in which elements can be added/removed at either end but not in
the middle is called
(A) Deque
(B) Stack
(C) List
(D) Queue
(E) None of the above
322) Which of the following is the best sorting algorithm when the list is already
sorted?
(A) Bubble Sort
(B) Insertion Sort
(C) Quick Sort
(D) Heap Sort
(E) None of the above
326) Which data structure is needed to convert infix notation to post fix notation?
(A) Branch
(B) Queue
(C) Tree
(D) Stack
(E) None of the above
332) ...... is a balanced binary search tree in which the difference between the
height of any node’s left and right subtree is at most one.
(A) AVL Tree
(B) Red-Black Tree
(C) 2-3-4 Tree
(D) Binary Tree
(E) None of the above
333) Enqueue means to insert an item into the ....... of the Queue
(A) front
(B) rear
(C) middle
(D) back
(E) None of the above
334) The process of deleting an element from the top of stack is called ..... operation
(A) POP
(B) PUSH
(C) Both (A) & (B)
(D) Only (A)
(E) None of the above
338) Which of the following data structure stores homogeneous data elements?
(A) Record
(B) Pointer
(C) Linear Array
(D) Binary
(E) None of the above
340) Which of the following is used to find the location of an element with a given
value?
(A) Search
(B) Iteration
(C) Traversal
(D) Recursion
(E) None of the above
342) The condition “FRONT = NULL” represents that the queue is.....
(A) Overflow
(B) Empty
(C) Full
(D) Update
59
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
(E) None of the above
345) The process of accessing data stored in a tape is similar to handle data on.......
(A) Linked List
(B) Tree
(C) Array
(D) Queue
(E) None of the above
346) Which of the following search start at the beginning of the list and each
element in the list?
(A) Linear Search
(B) Binary Tree Search
(C) Hash Search
(D) Binary Search
(E) None of the above
347) In Binary Tree Traversal, the node is visited between the sub trees is called......
(A) Pre-order traversal
(B) In-order traversal
(C) Post-order traversal
(D) Directory traversal
(E) None of the above
349) ........ is a data structure in which each node has at most two children.
(A) Red-Black Tree
(B) Binary Tree
(C) AVL Tree
(D) Linear Tree
(E) None of the above
351) In CSS, you can override precedence rules by adding the ____ property to a
style declaration.
A. !override
B. !main
C. !important
D. !priority
E. None of these
352) Which of the following class in JSP provides the capability to implement a
growable array of objects?
A. Array class
B. GrowAbleArray class
C. Container class
D. Vector class
E. None of these
353) Which XML extension is a standard way to describe how to transform the
structure of an XML document into an XML document with a different structure?
A. tree structure
B. XSLT
C. Both (A) & (B)
D. array class
E. None of these
354) In JSP, the classes that allow primitive types to be accessed as objects are
known as________
61
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
A. Primitive classes
B. Object classes
C. Boxing classes
D. Wrapper classes.
E. None of these
357) In JSP, a Canvas object provides access to a Graphics object via one of its
method called______
A. getCanvas()
B. getGraphics()
C. accessGraphics().
D. paint()
E. None of these
359) Which method of the Component class is used to set the position and size of a
component in JSP?
A. setSize()
B. setPositionSize()
C. setPosition()
D. setBounds()
62
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
E. None of these
362) In CSS, which cursor indicates that an edge of a box is to be moved down?
A. se-resize
B. sw-resize
C. w-resize
D. s-resize
E. None of these
369) What are the events generated by the Node objects called?
A. generators
B. highevents
C. emitters
D. secure
E. None of these
371) Which one of the following objects is passed to a JavaBean when one of its
properties is set via a JSP action?
A. ServletRequest
B. HTTPServletRequest
C. ServletResponse
D. HTTPServletResponse
E. None of these
64
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
372) Which of the following are used by servlet containers to set JavaBean
properties?
A. cookies
B. form fields
C. memory
D. disk
E. None of these
373) ________ header gives the MIME type of the response document.
A. Content Encoding
B. Content Language
C. Content Length
D. Content Type
E. None of these
379) Any part of the graphic that is not included in another hot zone is considered
to be part of _______
A. rect
B. point
C. default
D. polygon
E. None of these
388) Which of the following message denotes the server is currently unavailable?
(A) 500 Internal server Error
(B) 501 Not Implemented
(C) 503 Service Unavailable
(D) 504 Gateway Time out
(E) None of these
389) Which of the following is used to define the content of web pages?
(A) HTML
(B) CSS
(C) Java Script
(D) DSS
(E) None of these
67
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
390) In JS,__________ returns a number, converted from its argument.
(A) parseFloat()
(B) toPrecision()
(C) toExponential()
(D) number()
(E) None of these
391) Which of the following was designed to store and transport data?
(A) Java Script
(B) HTML
(C) XML
(D) CSS
(E) None of these
393) ________message denotes the request has been fulfilled and a new source is
created.
(A) 202 Accepted
(B) 201 created
(C) 403 Forbidden
(D) 404 Not Found
(E) None of these
395) JavaScript can change all the ___________ in the web page.
(A) HTML elements
(B) CSS Styles
(C) HTML attributes
(D) All of the above
(E) None of these
68
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
396)In JS, the ______ method returns the index of the last occurrence of a
specified text in a string.
(A) slice()
(B) substr()
(C) lastIndex()
(D) search()
(E) None of these
397) ________ message denotes the request can not be fulfilled due to the wrong
syntax.
(A) 202 Accepted
(B) 400 Bad Request
(C) 403 Forbidden
(D) 404 Not Found
(E) None of these
400)In CSS, _______ property can be used to wrap text around images?
(A) float
(B) clear
(C) Both(A) & (B)
(D) Value
(E) None of these
401) Which of the following is used to specify the layout of web pages?
(A) HTML
(B) CSS
(C) Java Script
(D) HTTP
69
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
(E) None of the above
403) In JS, The ______ method searches a string for a specified value and returns
the position of match.
(A) slice()
(B) substr()
(C) index()
(D) search()
(E) None of the above
404) In Java Script, the _____ method returns the new array length.
(A) shift()
(B) substr()
(C) index()
(D) unshift()
(E) None of the above
405) In Java Script, which statement lets you to handle the error?
(A) try
(B) catch
(C) Both (A) & (B)
(D) index
(E) None of the above
406) Which property is very useful for getting or replacing the content of HTML
elements?
(A) innerHTML
(B) outerHTML
(C) Both(A) & (B)
(D) Only (B)
(E) None of the above
408) ________message denotes the requested page could not be found and it may
be available in future?
(A) 202 Accepted
(B) 201 created
(C) 403 Forbidden
(D) 404 Not Found
(E) None of the above
410) Which can reduce the number of server requests and save bandwidth?
(A) Image Gallery
(B) Image Opacity
(C) Image Sprites
(D) All of these
(E) None of the above
411) Which of the following property sets or returns the CORS settings of the
audio/video?
(A) controls
(B) crossOrigin
(C) currentSrc
(D) toolbox
(E) None of the above
414) Which of the following message denotes the requested page has moved
temporarily to a new URL?
(A) 202 Accepted
(B) 201 created
(C) 301 Moved Permanently
(D) 302 Found
(E) None of the above
416) Which method returns the HTTP methods that the server supports?
(A) HEAD
(B) PUT
(C) DELETE
(D) OPTIONS
(E) None of the above
(D) float
(E) None of the above
72
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
419) Which determines whether a value is a finite number?
(A) Number()
(B) isNaN()
(C) isFinite()
(D) index()
(E) None of the above
424) Which of the following message denotes the requested page has moved to a
new URL?
(A) 202 Accepted
(B) 201 created
(C) 302 Found
(D) 301 Moved Permanently
(E) None of the above
73
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
425) Which of the following method uploads a representation of the specified URI?
(A) HEAD
(B) PUT
(C) DELETE
(D) OPTIONS
(E) None of the above
426) Which is a uniform naming scheme for locating resources on the web?
(A) Uniform Resource Identifier(URI)
(B) HTTP
(C) Resource Name
(D) HTML
(E) None of the above
428) Which of the following property returns the length of the current audio/video?
(A) error
(B) loop
(C) ended
(D) duration
(E) None of the above
432) Which of the following specifies a short cut key to activate or focus an
element?
(A) class
(B) hidden
(C) draggable
(D) access key
(E) None of the above
436) ______ converts character into a format which can be transmitted over the
Internet?
(A) URL Encoding
(B) URL Decoding
(C) Both (A) & (B)
(D) URL
(E) None of the above
75
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
437) Which of the following method draws a “filled” rectangle?
(A) rect()
(B) clearRect()
(C) StrokeRect()
(D) fillRect()
(E) None of the above
440) ______ sets or returns whether the audio/video should start playing as soon
as it is loaded.
(A) audioTracks
(B) autoplay
(C) Controller
(D) Pause
(E) None of the above
441) Which of the following provide additional information about HTML elements?
(A) Headings
(B) Paragraphs
(C) Styles
(D) Attributes
(E) None of the above
76
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
443) Symbol used at the beginning of the HERF text is_______
(A) #
(B) $
(C) &
(D) ^
(E) None of the above
77
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
449) Extensible Markup Language (XML) tags are ____
(A) Case Insensitive
(B) Case Sensitive
(C) Both (A) & (B)
(D) Upper - Case
(E) None of the above
454) When the maximum clock rate is quoted for a logic family it applies to
________
A. Shift register
B. Flip-Flop
C. Counter
D. All of these
E. None of the above
78
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
455) Which of the following UNIX command is used to create empty files?
A. cat
B. Vi
C. Pico
D. Touch
E. None of the above
457) The mechanism that brings a page into memory only when it is needed is
called __________
A. Segmentation
B. Fragmentation
C. Demand paging
D. Caching
E. None of the above
458) Which of the following addressing modes permits relocation without any
change?
A. Indirect addressing
B. Indexed addressing
C. Base register addressing
D. PC relative addressing
E. None of the above
462) An assembler that runs on one machine but produces machine code for
another machine is called ________
A. Simulator
B. Cross Assembler
C. Boot-strap loader
D. Accumulator
E. None of the above
463) The two basic types of record access methods are _______
A. Direct and indirect
B. On-line and real-time
C. Sequential and indexed
D. Direct and Sequential
E. None of the above
467) If a denormalization situation exists with a one to one binary relationship then
all fields are stored in ______
A. four relations
B. one relation
C. three relations
D. two relations
E. None of the above
468) Which of the following is/are advantages of using VLAN Trunking Protocol
(VTP) in a switching environment?
A. It allows switches to read tags
B. It enables VLANs to span multiple switches.
C. It simplifies the scalability of the switched work
D. All of the above
E. None of the above
469) When a network has multiple bridges and is using Spanning Tree Protocol, how
is the root bridge determined?
A. The bridge with the lowest ID number assumes the root bridge role.
B. The bridge with the highest ID number assumes the root bridge role.
C. The bridge with the lowest MAC address is always the root bridge.
D. All of the above
E. None of the above
471) Which of the following is the preferred way to recover a database after a
transaction in progress terminates abnormally?
A. Rollforward
B. Rollback
C. Reprocess transactions
D. Procedure call
E. None of the above
81
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
472) ___________ is usually a specialized hardware instruction dedicated to invoke
the Operating System.
A. Procedure Call
B. Supervisor Call
C. Both (A) and (B)
D. Software Interrupt
E. None of the above
473) _______ is a versatile instruction that is finding its way into an increasing
number of computer systems, especially microprocessors.
A. Procedure Call
B. Supervisor Call
C. Software Interrupt (SWI)
D. All of these
E. None of the above
481) Concept of developing a compiler for a language by using subsets of the same
language?
A. Bootstrap
B. Lex
C. Yacc
D. All of these
E. None of the above
483) A detective control is used to check if correct numbers are keyed in _______
A. Sequence Check
B. Manual Check
83
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
C. Check digit
D. All of these
E. None of the above
492) You need to configure a switch from a remote subnet.Which of the following
must be configured on the switch?
A. IP
B. Console part
C. SNMP
D. Default gateway
E. None of the above
493) “Each packet contains the full source and destination address”.This statement
indicates which of the following?
A. FDDI
B. Data link
C. Data gram
D. Virtual Circuit
E. None of the above
495) Creating a _______ eliminate the need to qualify the object name with the
schema and provides you with an alternative name for a table, view, sequence,
85
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
procedure or other objects.
A. synonym
B. Antonym
C. Column
D. Alias
E. None of the above
498) Round Robin(RR) scheduling algorithm falls under the category of _________
A. Preemptive scheduling
B. Non-Preemptive scheduling
C. Both (A) and (B)
D. Only (B)
E. None of the above
86
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
501) How does applet and servlet communicate?
a) HTTP
b) HTTPS
c) FTP
d) HTTP Tunneling
e) None of these
503) What happens is ServerSocket is not able to listen on the specified port?
a) The system exits gracefully with appropriate message
b) The system will wait till port is free
c) IOException is thrwon when opening the socket
d) PortOccupiedException is thrown
e)None of these
87
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
507) What is the java method for ping?
a) hostReachable()
b) ping()
c) isReachable()
d) portBusy()
e) None of these
508) To access the services of operating system, the interface is provided by the
a) System calls
b) API
c) Library
d) Assembly instructions
e) none of these
510) Which one of the following error will be handle by the operating system?
a) power failure
b) lack of paper in printer
c) connection failure in the network
d) all of the mentioned
e) None of these
511) Which facility dynamically adds probes to a running system, both in user processes
and in the kernel?
a) DTrace
b) DLocate
c) DMap
d) DAdd
e) None of these
512) Which one of the following is not a real time operating system?
a) VxWorks
b) Windows CE
c) RTLinux
d) Palm OS
e) None of these
88
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
513) The OS X has ____________
a) monolithic kernel
b) hybrid kernel
c) microkernel
d) monolithic kernel with modules
e) none of these
89
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
519) Which of the following is a good practice ?
a) Give full permission for remote transferring
b) Grant read only permission
c) Grant limited permission to specified account
d) Give both read and write permission but not execute
e) None of these
90
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
525) What is not a best practice for password policy ?
a) Deciding maximum age of password
b) Restriction on password reuse and history
c) Password encryption
d) Having change password every 2 years
e) None of these
526) The addressing mode/s, which uses the PC instead of a general purpose register is
______
a) Indexed with offset
b) Relative
c) Definite
d) Direct
e) None of these
528) In case of, Zero-address instruction method the operands are stored in _____
a) Offset
b) Register
c) Push down stack
d) Indexed
e) None of these
530) The bits used to indicate the status of the page in the memory is called ______
a) Control bits
b) Frame
c) Memory
d) Page
e) None of these
91
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
531) Microprocessor 8085 is the enhanced version of ......... with essentially the same
construction set
a) 6800
b) 7000
c) 7500
d) 8080
e) None of these
532) The _______ bit is used to indicate the validity of the page.
a) Invalid bit
b) Dirty bit
c) Modify bit
d) Valid bit
e) None of these
536) If timestamps of two events are same, then the events are
a) concurrent
b) non-concurrent
c) monotonic
d) non-monotonic
e) None of these
92
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
537) In distributed systems, transaction coordinator
a) starts the execution of transaction
b) breaks the transaction into number of sub transactions
c) coordinates the termination of the transaction
d) all of the mentioned
e) None of these
538) What are the different ways in which clients and servers are dispersed across
machines ?
a) Servers may not run on dedicated machines
b) Servers and clients can be on same machines
c) Distribution cannot be interposed between a OS and the file system
d) OS cannot be distributed with the file system a part of that distribution
e) None of these
541) UNIVAC is
a. Universal Automatic Computer
b. Universal Array Computer
c. Unique Automatic Computer
d. Unvalued Automatic Computer
e. None of these
93
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
543) ALU is
a. Arithmetic Logic Unit
b. Array Logic Unit
c. Application Logic Unit
d. Applicable Logic Unit
e. None of these
544) VGA is
a. Video Graphics Array
b. Visual Graphics Array
c. Volatile Graphics Array
d. Video Graphics Adapter
e. None of these
94
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
a. Wap Area Network
b. Wide Area Network
c. Wide Array Net
d. Wireless Area Network
e. None of these
554)The memory blocks are mapped on to the cache with the help of ______
a) Mapping function
b) Interrupts
c) Exception
d) Vectors
e) None of these
555) Which datatype should be more preferred for storing a simple number like 35 to
improve execution speed of a program?
95
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
a) sbyte
b) short
c) int
d) long
e) None of these
556) While using the direct mapping technique, in a 16 bit system the higher order 5 bits
is used for ________
a) Id
b) Tag
c) Direct
d) System
e) None of these
558) In associative mapping, in a 16 bit system the tag field has ______ bits.
a) 10
b) 14
c) 8
d) 12
e) None of these
559) Which of the following is the object oriented way to handle run time errors?
a) Exception
b) Structure
c) Handling
d) Onerror
e) None of these
561) A control bit called ____ has to be provided to each block in set-associative.
96
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
a) Idol bit
b) Binary
c) Linear
d) Valid bit
e) None of these
565) Which principle states the following “Designs that make easier to change are
better”?
a) Principle of Feasibility
b) Principle of Economy
c) Principle of Changeability
d) Principle of Adequacy
e)None of these
569) Which of the following are the entities of product line organizations?
a) Core Asset Group
b) Marketers
c) Customer
d) All of the mentioned
e) None of these
570) Every possible architecture partition possible changes into which of the following
categories?
a) Local
b) Non Local
c) Architectural
d) All of the mentioned
e) None of these
574) Which operator is used to invert all the digits in binary representation of a number?
a) ~
b) <<<
c) >>>
d) ^
e) None of these
575) On applying Left shift operator, <<, on an integer bits are lost one they are shifted
past which position bit?
a) 1
b) 32
c) 33
d) 31
e) None of these
576) Which right shift operator preserves the sign of the value?
a) <<
b) >>
c) <<=
d) >>=
e) None of these
578) Which of these jump statements can skip processing remainder of code in its body
for a particular iteration?
a) break
99
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
b) return
c) exit
d) continue
e) None of these
579) What is the stored in the object obj in following lines of code?
box obj;
a) Memory address of allocated memory of object.
b) NULL
c) Any arbitrary pointer
d) Garbage
e) None of these
581) What is the return type of a method that does not returns any value?
a) int
b) float
c) void
d) double
e) None of these
582) Which of the following is a method having same name as that of it’s class?
a) finalize
b) delete
c) class
d) constructor
e) None of these
586) The database environment has all of the following components except:
a)Separate files
b)Operation
c)Bank
d)Module
e)None of these
588)The way a particular application views the data from the database that the
application uses is a
a)Number
b)Security
c)Extra space
d)Sub schema
e)None of these
590)The method in which records are physically stored in a specified order according to a
key field in each record is
101
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
a)Lift
b)Support
c)Confidence
d)Hash
e)None of these
591)For each attribute of a relation, there is a set of permitted values, called the
________ of that attribute.
a)Domain
b)Divisible
c)Different
d)Sorted
e)None of these
102
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
596) Which concept of Java is a way of converting real world objects in terms of class?
a) Polymorphism
b) Encapsulation
c) Abstraction
d) Inheritance
e) None of these
597) Which concept of Java is achieved by combining methods and attribute into a class?
a) Encapsulation
b) Inheritance
c) Polymorphism
d) Abstration
e) None of these
598) What is it called if an object has its own lifecycle and there is no owner?
a) Aggregation
b) Composition
c) Encapsulation
d) Association
e) None of these
599) What is it called where child object gets killed if parent object is killed?
a) Aggregation
b) Composition
c) Encapsulation
d) Association
e) None of these
600) What is it called where object has its own lifecycle and child object cannot belong to
another parent object?
a) Aggregation
b) Compostion
c) Encapsulation
d) Association
e) None of these
601) ___________ is a centralized repository that stores data from multiple sources
and transforms them into a common, multi dimensional model for efficient querying
and analysis.
A. Data Selection
B. Data Cleaning
C. Data Integration
D. Data Warehouse
103
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
E. None of these
604) Which is/are the basic operation(S) in Online Analytical Processing (OLAP)?
A. Consolidation
B. Drill- down
C. Slicing and Dicing
D. All of the Above
E. None of these
606) Which performs multidimensional analysis of business data and provides the
capability for complex calculations, trend analysis and sophisticated data modeling?
A. OLAP
B. OLTP
C. Both (A) and (B)
D. Only (B)
E. None of these
607) Which of the following is the simplest and less technical type of data
warehouse?
A. Real Time Data Warehouse
104
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
B. Integrated Data Warehouse
C. Offline Data Warehouse
D. Offline operational Data Warehouse
E. None of these
608) Which of the following Data Warehouse is updated from data in the operational
systems on a regular basis?
A. Real Time Data Warehouse
B. Integrated Data Warehouse
C. Offline Data Warehouse
D. Offline operational Data Warehouse
E. None of these
609) __________ is a data warehouse that can assemble data from different areas
of business.
A. Real Time Data Warehouse
B. Integrated Data Warehouse
C. Offline Data Warehouse
D. Offline operational Data Warehouse
E. None of these
610) _________is updated for every transaction performed on the source data.
A. Real Time Data Warehouse
B. Integrated Data Warehouse
C. Offline Data Warehouse
D. Offline operational Data Warehouse
E. None of these
614) The information gathered through web mining is evaluated by using ________
A. clustering
B. classification
C. Association
D. All of the Above
E. None of these
615) Which of the following is used to examine data collected by search engines and
web spiders?
A. Web structure mining
B. Web content mining
C. Web usage mining
D. Data mining
E. None of these
617) The process of grouping a set of objects into classes of similar objects is called
___________
A. clustering
B. classification
C. Association
D. All of the Above
E. None of these
618) Which parameter is used to discover patterns in data that can lead to
reasonable predictions about the future?
A. clustering
106
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
B. classification
C. Association
D. Forecasting
E. None of these
619) Which of the following is the process of detecting and correcting the wrong
data?
A. Data Selection
B. Data Cleaning
C. Data Integration
D. Data Mining
E. None of these
620) Which of the following is the process of combining data from different
resources?
A. Data Selection
B. Data Cleaning
C. Data Integration
D. Data Mining
E. None of these
621) An important purpose of the shared pool is to cache the executable versions of
_________ statements.
A. SQL
B. PL/SQL
C. Both (A) and (B)
D. Oracle
E. None of these
622) Which of the following is/are main component(s) of the shared pool?
A. library Cache
B. dictionary Cache
C. Both (A) and (B)
D. Only (A)
E. None of these
623) Oracle Database segregates a small amount of the shared pool for large
objects(Over 5KB).The segregated area of the shared pool is called ______
A. Fixed Pool
B. Reserved Pool
C. Allocated Pool
D. Association
E. None of these
107
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
624) Which stores the executable(parsed) form of SQL cursors and PL/SQL
programs?
A. library Cache
B. dictionary Cache
C. Both (A) and (B)
D. Only (B)
E. None of these
626) When a query is submitted to oracle server for execution, oracle checks if
same query has been executed previously. If found the same then this event is
known as ________
A. Library cache hit
B. soft parsing
C. Both (A) and (B)
D. Profile data
E. None of these
627) If the parsed form of the statement is not found in the shared pool then new
statement is parsed and its parsed version is stored in Shared SQL area. This is
known as ________
A. Library cache hit
B. Soft parsing
C. Hard parsing
D. table information system
E. None of these
629) The shared pool is also able to support ________ in data warehousing
applications.
108
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
A. Shared SQL
B. Stored SQL
C. Unsorted SQL
D. Unshared SQL
E. None of these
630) Reuse of shared SQL for multiple users running the same application avoids
______
A. Library cache hit
B. Soft parsing
C. Hard parsing
D. All of these
E. None of these
631) Which of the following model is a combination of Iterative model and Waterfall
model?
A. linear-sequential Model
B. Spiral Model
C. V Model
D. Waterfall Model
E. None of these
633) Which of the following model is also referred to as a linear-sequential life cycle
model?
A. Waterfall Model
B. Iterative Model
C. Spiral Model
D. V Model
E. None of these
636) What is the final result of the requirements analysis and specifications phase ?
A. data flow diagram
B. SRS Document
C. Coding the project
D. User Manual
E. None of these
640) Which of the following is the most important phase of Software Development
Life Cycle (SDLC)?
A. Requirements analysis
B. Coding
C. Testing
D. Designing
110
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
E. None of these
641) Which handles the SQL requests and converts it into a request the individual
database understands?
A. Graphical User Interface(GUI)
B. ActiveX Data Objects (ADO)
C. Universal Data Access (UDA)
D. Open Database Connectivity(ODBC)
E. None of these
644) Which of the following is middle ware designed to support rapid high volume
on-line transactions?
A. Oracle
B. Customer Information Control System(CICS)
C. Both (A) and (B)
D. Only (A)
E. None of these
645) Which of the following middle ware technology might need the Interface
Definition Language (IDL)?
A. COBOL
B. RAI
C. CORBA
D. Oracle
E. None of these
650) Which of the following technology was Microsoft’s first attempt at an object-
oriented database interface?
A. Data Access Objects (DAO)
B. ActiveX Data Objects (ADO)
C. Universal Data Access (UDA)
D. Graphical User Interface
E. None of these
112
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
652) Which of the following is an example for Embedded SQL Statement?
A. ROLLBACK
B. SETROLE
C. ALTER SYSTEM
D. FETCH
E. None of these
653) ________ is a tool for entering and running ad-hoc based database
statements.
A. MySQL
B. PL/SQL
C. SQL*PLUS
D. SQL
E. None of these
655) Oracle 9i can scale tens of thousands of concurrent users support upto
_________ petabytes data.
A. 124
B. 256
C. 512
D. 624
E. None of these
658) The ______ process is used for inter-instance locking in Real Application
Clusters.
A. Front Manager Server
B. Back Manager Server
C. Lock Manager Server
D. Data Server Manger
E. None of these
659) The ________ performs recovery when a failed instance starts up again.
A. Log Writer(LGWR)
B. Checkpoint(CKPT)
C. System Monitor(SMON)
D. Process Monitor(PMON)
E. None of these
660) The ________ performs process recovery when a user process fails.
A. Log Writer(LGWR)
B. Checkpoint(CKPT)
C. System Monitor(SMON)
D. Process Monitor(PMON)
E. None of these
661) What type of failure occurs when Oracle fails due to an operating system or
computer hardware failure?
A. Application failure
B. Instance Failure
C. Media Failure
D. Roll back failure
E. None of these
662) Which Oracle backup and recovery file contains user and system data?
A. Control file
B. Data file
C. Offline Redo file
D. Computer file
E. None of these
663) When is the System Global Area (SGA) created in an Oracle database
environment?
A. When the database is created
B. When a user process is started
114
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
C. When the database is mounted
D. When the instance is started
E. None of these
664) What is the type of Oracle backup in which all uncommitted changes have been
removed from the data files?
A. Full backup
B. Consistent backup
C. Inconsistent backup
D. Differential backup
E. None of these
666) Which password management feature ensures a user cannot reuse a password
for a specified time interval?
A. Account Locking
B. Password History
C. Password Verification
D. Protection Password
E. None of these
670) Which Normal Form(NF) is considered adequate for normal relational database
design?
A. 2NF
B. 5NF
C. 4NF
D. 3NF
E. None of these
673) Which of the following operator combines two or more SELECT statements?
(A) In
(B) Like
(C) Union
(D) Intersection
(E) None of these
675) Which of the following datatype holds a string with maximum length of 255
characters?
116
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
(A) Text
(B) Medium Text
(C) Long Text
(D) Tiny Text
(E) None of these
680) _______ are used to specify the rules for the data in a table.
(A) Constraints
(B) Aliases
(C) Wildcards
(D) Directory
(E) None of these
682) Which of the following clause is an additional filter that is applied to the
result?
(A) Having
(B) Group-by
(C) Select
(D) Order by
(E) None of these
685) The candidate key is that you choose to identify each row uniquely is
called_______
(A) Primary Key
(B) Foreign Key
(C) Alternate Key
(D) Secondary Key
(E) None of these
688) Each modification done in database transaction are first recorded into
the______
(A) Hard Drive
(B) Disk
(C) Log File
(D) Data Mart
(E) None of these
689) Which of the following is preferred method for enforcing data integrity?
(A) Cursors
(B) Constraints
(C) Triggers
(D) All of these
(E) None of these
690) Which allows to make copies of the database periodically to help in the cases
of crashes and disasters?
(A) Recovery utility
(B) Data loading utility
(C) Monitoring utility
(D) Backup Utility
(E) None of these
693) DBMS may be combined with or used by ______ type of transaction manager.
(A) DB2
(B) Customer Information Control System (CICS)
(C) Oracle
(D) JOINED
(E) None of these
695) In SQL, Wildcard characters are used with the _______ operator.
(A) LIKE
(B) RANGE
(C) BETWEEN
(D) DOMAIN
(E) None of these
702) Which of the following keyword can be used to return different values?
(A) SELECT
(B) GET
(C) OPEN
(D) DISTINCT
(E) None of these
703) ______ operator is used to display a record if either the first condition or the
second condition is true.
(A) AND
(B) OR
(C) Both (A) & (B)
(D) NOR
(E) None of these
704) Which of the following DBMS provides faster response time and better
performance?
(A) Relational Database Management System (RDBMS)
121
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
(B) NoSQL DBMS
(C) In-Memory Database Management System (IMDBMS)
(D) DBMS
(E) None of these
705)________is suitable for data warehouses that have a large number of similar
data items.
(A) Relational Database Management System (RDBMS)
(B) Columnar Database Management system (CDBMS)
(C) In-Memory Database Management System (IMDBMS)
(D) DBMS
(E) None of these
706) Which of the following is standard interactive and programming language for
getting information from and updating a database.
(A) SQL
(B) PHP
(C) ASP
(D) PL/SQL
(E) None of these
122
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
710) Which method of Online Analytical Processing stores data in both a relational
and a multi dimensional database.
(A) Hybrid OLAP
(B) Relational OLAP
(C) OLAP
(D) PHP
(E) None of these
712) The _____ operation allows the combining of two relations by merging pairs of
tuples, one from each relation, into a single tuple.
(A) Join
(B) Intersection
(C) Union
(D) Cartesian product
(E) None of these
715) In SQL, the spaces at the end of the string are removed by _______ function .
(A) Lower
(B) String
(C) Trim
(D) Drop
(E) None of these
123
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
718) Which of the following operator used for appending two strings?
(A) %
(B) &
(C) +
(D) ||
(E) None of these
719) The management information system (MIS) structure with one main computer
system is called a________
(A) Decentralized MIS structure
(B) Distributed MIS structure
(C) Centralized MIS structure
(D) DSS
(E) None of these
724) Which TCL command is used to permanently save any transaction into
database?
(A) rollback
(B) savepoint
(C) commit
(D) trim
(E) None of these
725) Which TCL command restores the database to last committed state?
(A) rollback
(B) savepoint
(C) commit
(D) trim
(E) None of these
731) The language used in application programs to request data from the DBMS is
referred to as the ______
(A) DML
(B) DDL
(C) DCL
(D) DBA
(E) None of these
734) A ________ contains the smallest unit of meaningful data, so you might call it
the basic building block for a data file.
(A) Record
(B) Field
(C) Table
(D) Insert
(E) None of these
737) In Relational table, the term “Attribute” is also used to represent _______
(A) row
(B) column (or) field
(C) entity
(D) model
(E) None of these
738) Which of the following categories of the data integrity RDBMS will enforce
specific business rules?
(A) Entity Integrity
(B) Domain Integrity
(C) User-Defined Integrity
(D) Data Integrity
(E) None of these
127
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
739) E-R Modeling technique is a _______
(A) top-down approach
(B) bottom-up approach
(C) User-Defined
(D) All of these
(E) None of these
744) ..... is a top-down approach in which one higher level entity can be divided into
two lower level entities.
(A) Aggregation
(B) Specialization
(C) Generalization
(D) Fragmentation
(E) None of these
128
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
745) Which of the following is not a type of database?
(A) Hierarchical
(B) Relational
(C) Network
(D) Transition
(E) None of these
129
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
751) The process by which the structure of the database is modified to eliminate
hidden dependencies and replacing groups is _________
A. Normalization
B. Indexing
C. Enforcing referential integrity
D. Enforcing data integrity
E. None of the above
752) Which kind of lock includes a keypad that can be used to control access into
areas?
A. Cipher
B. Warded
C. Device
D. Tumber
E. None of the above
753) Programs that automatically submit your search request to several search
engines simultaneously are called-
A. WebCrawler
B. Meta search engines
C. Spiders
D. Hits
E. None of the above
754) This _________ tier processes HTTP protocol, scripting tasks, performs
calculations, and provides access to data.
A. Applications/Web server
B. Client
C. Enterprise server
D. DBA
E. None of the above
756) Which the result of a computation depends on the speed of the processes
involved there is said to be ?
A. Cycle stealing
130
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
B. Race condition
C. A time look
D. A dead lock
E. None of the above
757) A method which transfers the entire block of data from its own buffer to main
memory takes place without intervention by CPU.
A. Programmed Input/Output
B. Input driven Input/output
C. Direct Memory Access
D. All of these
E. None of the above
131
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
762) The usual method of __________ mapping is by some arithmetical
manipulation of the key value, in direct file organization.
A. Random
B. Serial
C. Direct
D. One to many
E. None of the above
763) A generalization of the Boyce Codd Normal Form to relation schemes which
includes the multivalued dependencies is called __________
A. Second Normal Form
B. Third Normal Form
C. Fourth Normal Form
D. Fifth Normal Form
E. None of the above
769) An assembler that runs on one machine but produces machine code for
another machine is called _______
A. Simulator
B. Emulator
C. Boot-Strap loader
D. Cross Assembler
E. None of the above
772) The memory address of the first element of an array is called _________
A. floor address
B. first address
C. foundation address
D. base address
E. None of the above
773) A set of resources' allocations such that the system can allocate resources to
each process in some order, and still avoid a deadlock is called ________
A. Unsafe state
133
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
B. Safe state
C. Starvation
D. Greedy allocation
E. None of the above
774) Which of the following does not allow multiple users or devices to share one
communications line?
A. doubleplexer
B. multiplexer
C. concentrator
D. controller
E. None of the above
775) Consider an operation of addition. For two numbers the operation will generate
a sum. If the operands are strings, and the same operation would produce a third
string by concatenation. This feature is called________
A. Inheritance
B. Encapsulation
C. Polymorphism
D. Binding
E. None of the above
780) A utility programme that takes a procedure and searches a library to locate
copies of any procedures called but not defined in the first procedure, is called
__________
A. linker
B. re-locator
C. loader
D. text editor
E. None of the above
782) Dr.E.F. Codd represented ....... rules that a database must obey if it has to be
considered truly relational.
(A) 10
(B) 15
(C) 14
(D) 12
(E) None of the above
785) ....... is a bottom-up approach in which two lower level entities combine to
form a higher level entity.
(A) Aggregation
(B) Specialization
(C) Generalization
(D) Function
(E) None of the above
786) An entity set that does not have sufficient attributes to form a primary key, is a
......
(A) Primary entity set
(B) Weak entity set
(C) Strong entity set
(D) Secondary entity set
(E) None of the above
787) Which SQL command delete all the records and does not remove the structure?
(A) Drop
(B) Insert
(C) Truncate
(D) Circle
(E) None of the above
789) In ........ database, data is organized in the form of trees with nodes.
(A) Hierarchical
(B) Relational
(C) Network
(D) Operational
(E) None of the above
790) Which command is used to retrieve records from one or more table?
136
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
(A) Delete
(B) Insert
(C) Drop
(D) Select
(E) None of the above
792) Which of the following constraint is used to limit the value range that can be
placed in a column?
(A) Check
(B) Default
(C) Unique
(D) Select
(E) None of the above
793) A Foreign key in one table points to a ________ key in another table.
(A) Alternate
(B) Default
(C) Primary
(D) Secondary
(E) None of the above
794) Domain constraints, functional dependency and referential integrity are special
forms of _________
(A) Foreign key
(B) Primary key
(C) Referential constraint
(D) Assertion
(E) None of the above
798) Which of the following method can be used to add more tables in a database?
(A) Design View
(B) Table Wizard
(C) Both (A) & (B)
(D) Only (A)
(E) None of the above
799) Which of the following field type is the best to store serial numbers?
(A) Number
(B) Auto Number
(C) Text
(D) Memo
(E) None of the above
800) The feature that database allows to access only certain records in database
is______
(A) Queries
(B) Reports
(C) Forms
(D) Tables
(E) None of the above
801) This is a type of program that lets one or more computer users create,
manage, and access data in a database.
A. B2B
B. DBMS
C. multidimensional database
138
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
D. Database
E. None of the above
802) In a relational database, this is a data structure that organizes the information
about a single topic into rows and columns.
A. block
B. record
C. tuple
D. table
E. None of the above
803) This is a family of relational database management system products from IBM
that serve a number of different operating system platforms.
A. Cognos
B. DB2
C. ADO
D. Universal Data Access
E. None of the above
804) This is a central repository for all or significant parts of the data that an
enterprise's various business systems collect.
A. data warehouse
B. business information warehouse
C. knowledge warehouse
D. All of these
E. None of the above
805) This is the job title of someone who directs or performs all activities related to
maintaining a successful database environment.
A. DBA
B. MOLAP
C. PHP
D. RFC
E. None of the above
806) This is a common standard language used to update and get information from
a database.
A. VB
B. TMQL
C. PHP
D. SQL
E. None of the above
139
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
807) This is a file format that contains the values in a table in which column values
are separated by a comma and each row starts a new line.
A. ASCII
B. CSV file
C. virtual organization
D. PHP
E. None of the above
808) In a relational database, this is the data structure that holds a single piece of
data, such as first name or phone number.
A. catalog
B. field
C. entity
D. object
E. None of the above
809) This is an organized selection of data from a database that allows you to look
at it from a particular perspective.
A. Venn diagram
B. Gantt chart
C. view
D. splay tree
E. None of the above
810) This a program tool allows you to reorganize and summarize selected columns
and rows of data in a spreadsheet or database table to obtain a desired report.
A. pivot table
B. PERT chart
C. quad tree
D. ODBC
E. None of the above
811) At this level of normalization, each column in a table that is not a determiner
of the contents of another column, must itself be a function of the other columns in
the table.
A. 1NF
B. 2NF
C. 3NF
D. DKNF
E. None of the above
812) This method of online analytical processing stores data in both a relational and
a multi dimensional database.
140
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
A. HOLAP
B. ROLAP
C. OLAP
D. DIM
E. None of the above
815) Which of the following tree structures is unique in that the tree organization
aries depending on which nodes are most frequently accessed?
A. B-tree
B. binary tree
C. quad tree
D. splay tree
E. None of the above
141
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
818) A Database Management System (DBMS) may be used by, or combined with,
this type of transaction manager.
A. DB2
B. CICS
C. Oracle
D. Cognos
E. None of the above
820) A programmer using this type of middleware might need the Interface
Definition Language (IDL).
A. RPC
B. ORB
C. MUD
D. EAI
E. None of the above
823) In creating a database, this is the process of organizing it into tables insuch a
way that the results of using the database are always unambiguous.
142
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
A. probability
B. normalization
C. data modeling
D. query by example
E. None of the above
826) This term, used to describe a database that occupies magnetic storage in the
terabyte range, describes a database that contains billions of table rows.
A. Very Large Database
B. holographic storage
C. Cold Fusion
D. giant
E. None of the above
827) This is a collection of descriptions about data objects that is created for the
benefit of programmers and others who might need to refer to them.
A. data dictionary
B. stored procedure
C. Virtual File Allocation table
D. catalog
E. None of the above
828) This term is used to describe the process of forecasting, or simply discovering
patterns in data that can lead to predictions about the future.
A. customer relationship management
B. PERT chart
C. data mining
143
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
D. enterprise risk management
E. None of the above
834) For which two constraints are indexes created when the constraint is added?
A. Primary key
B. Unique
C. Not null
D. Both (A) & (B)
144
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
E. None of the above
835) What type of failure occurs when Oracle fails due to an operating system or
computer hardware failure?
A. Application failure
B. Instance Failure
C. Media Failure
D. Rollback failure
E. None of the above
837) Which password management feature ensures a user cannot reuse a password
for a specified time interval?
A. Account Locking
B. Password History
C. Password Verification
D. Password Expiration and Aging
E. None of the above
839) What is the type of Oracle backup in which all uncommitted changes have been
removed from the Data files?
A. Full backup
B. Consistent backup
C. Inconsistent backup
D. Differential backup
E. None of the above
840) Which are the physical structures that constitute the Oracle database?
A. control file
B. Data file
145
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
C. Log file
D. All of the above
E. None of the above
845) The database environment has all of the following components except:
A. Users.
B. Separate files.
C. Database.
D. Database administrator
E. None of the above
846) The language which has recently become the de-facto standard for interfacing
application programs with relational database system is
A. Oracle.
B. SQL.
146
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
C. DBase.
D. PL/SQL
E. None of the above
850) The method in which records are physically stored in a specified order
according to a key field in each record is
A. Hash.
B. Direct.
C. Sequential.
D. All of the above.
E. None of the above
855) The statement in SQL which allows to change the definition of a table is
A. Alter.
B. Update.
C. Create.
D. Select.
E. None of the above
865) Which of the following database object does not physically exist?
A. Base table
B. Index
C. View
D. Variable
E. None of the above
866) Which two files are used during operation of the DBMS?
A. Query languages and utilities
B. DML and query language
C. Data dictionary and transaction log
D. Data dictionary and query language
E. None of the above
873) E-R model uses this symbol to represent weak entity set?
A. Dotted rectangle.
B. Diamond
C. Doubly outlined rectangle
D. All of these
E. None of the above
876) In a relation
A. Ordering of rows is immaterial
B. No two rows are identical
C. Both (A) and (B)
D. Only (A)
E. None of the above
151
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
877) The conceptual model is
A. dependent on hardware.
B. dependent on software.
C. dependent on both hardware and software.
D. independent of both hardware and software.
E. None of the above
878) Which of the following operation is used if we are interested in only certain
columns of a table?
A. PROJECTION
B. SELECTION
C. UNION
D. JOIN
E. None of the above
880) Which are the two ways in which entities can participate in a relationship?
A. Passive and active
B. Total and partial
C. Simple and Complex
D. All of the above
E. None of the above
889) The ______ operator is used to compare a value to a list of literals values that
have been specified.
A. BETWEEN
B. ANY
C. IN
D. ALL
E. None of the above
892) _________ is a virtual table that draws its data from the result of an SQL
SELECT statement.
A. View
B. Synonym
C. Sequence
D. Transaction
E. None of the above
898) Which of the operations constitute a basic set of operations for manipulating
relational data?
A. Predicate calculus
B. Relational calculus
C. Relational algebra
D. All of these
E. None of the above
901) _________ means that each logical object is placed in a set of memory
locations with strictly consecutive addresses.
A. External Fragmentation
B. Internal Fragmentation
C. Contiguous Allocation
D. Segmentation
E. None of these
903) Wasting of memory between partitions, due to scattering of the free space into
a number of dis-contiguous areas, is called _________
A. External Fragmentation
B. Internal Fragmentation
C. Contiguous Allocation
D. Dynamic partitioning
E. None of these
904) A ________ is a hardware complex that contains most of the logic address
translation in microprocessor systems.
A. Memory Management Unit (MMU)
B. Translation Lookaside Buffer (TLB)
C. Page Map Table (PMT)
D. Network Interface Card (NIC)
E. None of these
905) Which of the following is a memory cache that stores recent translations of
virtual memory to physical addresses for faster retrieval.
A. Memory Management Unit (MMU)
B. Translation Lookaside Buffer (TLB)
C. Page Map Table (PMT)
D. Network Interface Card (NIC)
E. None of these
156
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
906) Which of the following requires that all channels in a message transmission
path be of the same speed?
A. Packet-switched networks
B. Circuit-switched networks
C. Message-switched networks
D. All of these
E. None of these
907) Which protocol works at the Internet layer and provides a connection service
between hosts?
A. Internet Protocol(IP)
B. Packet Internet Gopher(PING)
C. Reverse Address Resolution Protocol (RARP)
D. Address Resolution Protocol (ARP)
E. None of these
908) If a host broadcasts a frame that includes a source and destination hardware
address, and its purpose is to assign IP addresses to itself, Which protocol at the
Network Layer does the host use?
A. Internet Control Message Protocol(ICMP)
B. Packet Internet Gopher(PING)
C. Reverse Address Resolution Protocol (RARP)
D. Address Resolution Protocol (ARP)
E. None of these
909) When you connect to an online information service you are asked to provide
some kind of identification such as your name, an account number and a password.
What is the name given to this brief dialogue between you and the information
system?
A. Security Procedure
B. Safeguard Procedure
C. Identification Procedure
D. Log-on procedure
E. None of these
912) Which of the following services is used to translate host names into IP
addresses?
A. SNMP
B. SMTP
C. UDP
D. DNS
E. None of these
914) Which of the following table helps in representing the previous and next state
of the sequential circuit prior to and the clock pulse respectively?
A. Truth Table
B. Characteristic Table
C. Excitation Table
D. Symbol Table
E. None of these
919) The relative position of the file marker can be changed via the _________
A. Marker call
B. EXEC Command
C. Fence Register
D. LSEEK Call
E. None of these
921) Which of the following methods provides the greatest frame throughput?
A. Frame-tag switching
B. ISL Switching
C. Store-and-forward switching
D. Cut-through switching
E. None of these
922) What must you do to allow a Virtual LAN(VLAN) to span two or more switches?
A. Configure port security on the switch.
B. Set up a VTP domain
C. Configure the duplex setting on the ports
D. Set up a trunk location.
159
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
E. None of these
925) If you wanted to locate the hardware address of a local device, which protocol
would you use?
A. Internet Control Message Protocol(ICMP)
B. Packet Internet Gopher(PING)
C. Reverse Address Resolution Protocol (RARP)
D. Address Resolution Protocol (ARP)
E. None of these
926) To which pin on the RAM chip does the address decoder connect in order to
signal which memory chip is being accessed?
A. The address input
B. The output enable
C. The chip enable
D. The data input
E. None of these
927) The altering of data so that it is not usable unless the changes are undone is
________
A. Compression
B. Encryption
C. Ergonomic
D. Interrupt
E. None of these
928) Which of the following scheduler is in charge of handling the swapped out
process?
A. Medium term
160
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
B. Long term
C. Short term
D. All of these
E. None of these
931) Which component is used by the data analyst to create the queries that access
the database?
A. Data extraction
B. End-user query tool
C. End-user presentation tool
D. Abstraction
E. None of these
932) __________ allows wireless mobile devices to access the Internet and its
services.
A. WAP
B. Ethernet
C. TCP/IP
D. LAN
E. None of these
933) Which data structure is needed to convert Infix notation to postfix notation?
A. Tree
B. Queue
C. Stack
D. Array
E. None of these
934) Binding the same name to multiple operations whose signature differ in
161
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
number or types of arguments?
A. Overloading
B. Object model
C. Package
D. Tree
E. None of these
935) Implementation of an inverted list to maintain the record list for each value for
a given attribute can be done by________
A. Sequential file
B. Direct file
C. Indexed file
D. Document file
E. None of these
944) Which of the following tools can be utilized to test IP connectivity between two
devices?
A. Ping
B. Telnet
C. Traceroute
D. All of the Above
E. None of these
951) _______ translates high level language(source code) into low level
language(object code)
A. Compiler
164
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
B. Interpreter
C. Assembler
D. Recursive
E. None of these
952) System program such as Compiler are designed so that they are __________
A. Recursive
B. Non-reusable
C. Serially usable
D. Re-enterable
E. None of these
957) Which of the following is used for grouping of characters into tokens?
165
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
A. Parser
B. Code generator
C. Loader
D. Lexical Analyser
E. None of these
959) A system program that set up an executable program in main memory ready
for execution is __________ ?
A. Assembler
B. Linker
C. Loader
D. Text editor
E. None of these
960) A compiler which allows only the modified section of the source code to be
recompiled is called as _______
A. Incremental Compiler
B. Dynamic Compiler
C. Subjective Compiler
D. Cross-Compiler
E. None of these
964) A form of recursive-descent parsing that does not require any back-tracking is
known as__________
A. Predictive parsing
B. Recursive-descent parsing
C. Both (A) and (B)
D. Only (B)
E. None of these
965) __________ checks whether the parse tree constructed follows the rules of a
language.
A. Syntax Analysis
B. Semantic Analysis
C. Lexical Analysis
D. All of these
E. None of these
968) The graph that shows the basic blocks and their successor relationship is
called_______
A. Control graph
B. Hamiltonian graph
C. Flow Chart
167
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
D. Syntax tree
E. None of these
972) ________or scanning is the process where the stream of characters making up
the source program is read from left to right and grouped into tokens.
A. Lexical analysis
B. Diversion
C. Modeling
D. Loading
E. None of these
973) Load address for the first word of the program is called_________
A. Linker address origin
B. load address origin
C. Phase library
D. Diversion
E. None of these
976) Which of the following module does not incorporate initialization of values
changed by the module?
A. reusable module
B. Serially usable module
C. re-enterable module
D. non reusable module
E. None of these
977) Analysis that determines the meaning of a statement once its grammatical
structure becomes known is termed as __________
A. Semantic analysis
B. Syntax analysis
C. Regular analysis
D. General analysis
E. None of these
978) Which of the following system software resides in main memory always?
A. Linker
B. Loader
C. Assembler
D. Compiler
E. None of these
982) Which of the following software engineering concept does Ada language
support?
A. abstraction
B. generic
C. information hiding
D. All of the Above
E. None of these
983) A module that is supplied along with the programming language translator to
make the language easier is called a/an ________
A. intrinsic function
B. benchmark program
C. data structure
D. abstraction
E. None of these
984) The model which reduces the cost of development of software is _______
A. waterfall model
B. spiral
C. prototyping
D. generic
E. None of these
985) The model which estimates the total effort in terms of person, months of the
technical project staff, is ________
A. waterfall model
B. spiral
C. COCOMO Model
D. prototyping
170
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
E. None of these
986) The graph theoretic concept will be useful in software testing is ________
A. Cyclomatic number
B. Eulerian Cycle
C. Hamultonian circuit
D. prototyping
E. None of these
993) White box testing, a software testing technique is also called _________
A. graph based testing
B. loop testing
C. data flow testing
D. structural testing
E. None of these
995) _______ is a popular version of the Systems Development Life Cycle (SDLC)
model for Software Engineering.
A. Waterfall Model
B. Iterative Model
C. Spiral Model
D. V Model
E. None of these
999) Which of the following is the Central component of any CASE tool?
A. CASE concentrator
B. CASE origin
C. CASE repository
D. All of these
E. None of these
173
www.studyregular.in contact@studyregular.in
STUDY REGULAR 1000 QUESTIONS IT EBOOK
174
www.studyregular.in contact@studyregular.in