Professional Documents
Culture Documents
Mock Exam2
Mock Exam2
In which normal form should a table not have any transitive dependencies?
First normal form (1NF)
Third normal form (3NF)
Second normal form (2NF)
Fourth normal form (4NF)
If no multivalued attributes exist and no partial dependencies exist in a relation, then the relation is in
what normal form.
First normal form
Third normal form
Second normal form
Fourth normal form
If we want to retain all duplicate records, we must write _________________ in place of Union.
Union All
Union Some
Intersect All
Intersect Some
Data Dependency
Full Dependency
Partial Dependency:
Transitive Dependency
______________ join is along with tuples that satisfy the matching criteria, italso includes some or all
tuples that do not match the criteria
Outer join
Inner join
Tuples join
None
If an attribute value does not appear in the corresponding domain or is not of the appropriate data type,
then which constraint is violated?
Key constraint
Referential integrity constraint
Domain constraint
All
Which relational algebra is used to select the common rows (tuples) from two tables
(relations)?
Project
Rename
Union
Intersection
Which one of the following properties of a transaction states that all operations of a transaction must
be executed entirely; otherwise, the transaction will be aborted?
Atomicity
Consistency
Isolation
Durability
__________________ requires a transaction to lock all the items it accesses before the transaction
begins execution, by predeclaring its read-set and write-set.
Strict 2PL
Conservative 2-PL
Rigorous 2-PL
Exclusive Lock
Lock that allows concurrent transactions to access different rows of the same table is known as
a_________________
Database-level lock
Row-level lock
Table-level lock
Page-level lock
A system is in a ______ state if there exists a set of transactions such that every transaction in the set is
waiting for another transaction in the set.
Active
Partially Committed
Deadlock
Committed
When transaction Ti requests a data item currently held by Tj, Ti is allowed to wait only if it has a
timestamp smaller than that of Tj (that is, Ti is older than Tj). Otherwise, Ti is rolled back (dies). This
is_________________
Wait-die
Wait-wound
Wound-wait
None of the Above
Consider the following transaction involving two bank account X and Y: read(X); X=X-50; write(X);
read(Y); Y=Y+50; write(Y); the constraint that the sum of account X and Y should remain the same
is
Durability
Isolation
Consistency
Atomicity
To satisfy user information need the developed information retrieval system should
AIncrease the recall of the system without affecting the precision of the system.
Decrease the precision of the system without affecting the recall of the system
Increase the precision of the system without affecting the recall of the system
Decrease the recall of the system without affecting the precision of the system
What is true about the tf and idf values of misspelled words like “infromation” and “retreival”?
Consider the following documents, and find the relevant documents retrieved by the
Boolean model. Suppose user query is: Q = data ˄ (sets˅ analysis).
Doc1: Data analysis deals with data sets
Doc2: Data mining in various fields
Doc3: Data analysis techniques and algorithms
Doc4: Data sets with temporal attributes
Doc1,Doc3, Doc4
Doc1, Doc4
Doc1
Doc1, Doc2,Doc3,Doc4
The formula used to estimate the vocabulary size of a collection is known as:
Zipf's law
Luhn’s idea
Heap's law
Compression ratio
One of the following Multimedia Hardwares’are often under direct control by a human user and they
communicate commands regularly.
Output devices
Input devices
Connecting Devices
Storage devices
Vector Quantisation
Discrete Cosine Transform
Huffman Coding
Transform Coding
What is a measure of the limit of lossless compression?
Prefix Code
Codeword
Average Bit length
Entropy
CD-R
DVD-R
CD-RW
CD-ROM
Which part of the file contents of multimedia database is used as indices for searching purpose value?
Media data
Media format data
Media feature data
All of the Above
Text Multimedia
Graphic Multimedia
Animation Multimedia
All of the Above
Which database is used to optimize and build a virtualized environment for housing multimedia
data?
MongoDB
MySQL DB
PostgreSQL
Oracle DB
1KB
1024KB
6000KB
512KB
Which one of the following Image File Formats supports 8 bits, 16-, and 24-bit colors?
GIF
PNG
JPEG
TIFF
A small business requires a network that provides connectivity between two buildings located in
different cities. Which of the following network types is the best fit for this requirement?
LAN
WAN
MAN
VPN
Which of the following protocols operates at the transport layer of the OSI model?
HTTP
SMTP
FTP
TCP
A company is considering different types of cables for its network infrastructure. They want to choose
a cable that can handle high speeds over long distances with minimal interference. Which type of cable
should they choose?
A small business has recently expanded its operations and now has two separate locations that need to
be connected. They are considering two different network topologies to link the two locations: a star
topology and a mesh topology. Which of the following is an advantage of using a mesh topology in
this scenario?
A company has a local area network (LAN) that uses Carrier Sense Multiple Access with Collision
Detection (CSMA/CD) protocol. What happens when two devices on the network transmit data
simultaneously?
Both devices stop transmitting and wait for a random amount of time before trying again.
The device with the stronger signal continues transmitting, while the other device stops.
Both devices continue transmitting simultaneously, and data packets are lost.
Both devices continue transmitting simultaneously, and the data packets are re-transmitted
automatically.
A group of friends is having a conversation over a walkie-talkie. Only one person can speak at a time,
and the others have to wait for their turn. Which type of communication mode would be most suitable
for them?
Simplex
Half duplex
Full duplex
All of the above
A company has a web server and wants to ensure that all traffic to and from the server is encrypted.
Which protocol would be most suitable for this task?
HTTP
HTTPS
FTP
Telnet
At which layer of the OSI reference model would switches and bridges operate?
Application layer
Transport layer
Network layer
Data link layer
Physical layer
Which type of multiplexing is used in digital subscriber line (DSL) technology to transmit data over
existing telephone lines?
FDM
QAM
TDM
CDM
You have a network with the IP address 10.0.0.0/8. You need to create 5 subnets with 40 hosts each.
What is the subnet mask that you should use?
/28
/30
/27
None
If an Ethernet port on a router were assigned an IP address of 172.16.112.1/25, what would be the
valid subnet address of this host?
A
172.16.112.0
172.16.0.0
172.16.96.0
172.16.255.0
The network address of 172.16.0.0/19 provides how many subnets and hosts?
A company's server was breached, and customer data was stolen. What is the company's legal
obligation?
None
Deny responsibility
Notify affected customers
Pay a fine
An employee connects a personal device to the company network. What is the most
significant security risk?
A vulnerability is a potential security weakness, while a threat is a malicious action that exploits
that weakness.
A vulnerability is a malicious action that exploits a security weakness, while a threat is a potential
security weakness.
A vulnerability and a threat are the same thing.
A vulnerability is a type of malware, while a threat is a type of social engineering attack.
Symmetric encryption uses one key for both encryption and decryption, while asymmetric
encryption uses two different keys.
Symmetric encryption uses two different keys for encryption and decryption, while asymmetric
encryption uses one key.
Symmetric encryption is faster than asymmetric encryption.
Asymmetric encryption is more secure than symmetric encryption.
Two-factor authentication
Firewall
Encryption
Security cameras
Architecture
Performance
Current data/ testing data
Environment
Which one is not the limitation of Propositional Logic in logical representation of knowledge?
Expressive power
Handling domain with small words
Defining declarative statements
Representation of relations such as “all”, “some” and “none”
In the course of mapping human thinking to artificial intelligence components, in which stage
reasoning and thinking process done?
Interpretation layer
Interacting layer
Sensing layer
Application layer
Internal state
Model
Goal
Intelligence
Which level of artificial intelligence has the ability to solve the problem related to world hunger and
dangerous environmental change?
Suppose we would like to perform clustering on spatial data such as the geometrical locations of
houses. We wish to produce clusters of many different sizes and shapes. Which of the following
methods is the most appropriate?
Decision Trees
Density-based clustering
Model-based clustering
K-means clustering
When working with a small dataset, one should prefer low bias/high variance classifiers over high
bias/low variance classifiers.
When working with a small dataset, one should prefer high bias/high variance classifiers over low
bias/high variance classifiers.
When working with a large dataset, one should prefer high bias/low variance classifiers over low
bias/high variance classifiers.
When working with a large dataset, one should prefer low bias/high variance classifiers over high
bias/low variance classifiers.
You trained a binary classifier model which gives very high accuracy on the training data, but much
lower accuracy on validation data. Which of the following may be Not true?
A type of machine learning that uses artificial neural networks with multiple layers
A type of unsupervised learning algorithm
A type of reinforcement learning algorithm
A type of rule-based system for decision making
What is the difference between supervised and unsupervised learning in machine learning?
Supervised learning requires labeled data, while unsupervised learning does not.
Unsupervised learning requires labeled data, while supervised learning does not.
Supervised and unsupervised learning are the same thing.
Supervised and unsupervised learning are not used in machine learning.
What is the purpose of a knowledge audit?
Objects.
Predicates.
Associative networks.
All
Which one of the following is most likely differ from the others?
Expert systems.
Help desk systems.
Web application.
Decision-support systems.
Which of the following is true regarding syntactic and semantic analysis in programming languages?
Which phase of the C++ compilation process converts the source code into an object file?
Preprocessing
Compilation
Assembly
Linking
What is the difference between source code and object code in C++?
Source code is written in machine language, while object code is written in high-level language.
Source code is the human-readable code written by the programmer, while object code is the
machine-readable binary code.
Source code is the compiled code, while object code is the interpreted code.
Source code is the code written by the compiler, while object code is the code written by the
linker.
functionName(array)
functionName(*array)
functionName(&array)
functionName(array[])
0
1
-1
2
What is the result of concatenating two C++ strings using the '+' operator?
1 byte
4 bytes
2 bytes
It varies depending on the platform
Which of the following functions allows us to read a text that contains a space?
cin>>
cin.get>>
cin.get()
All
Which of the following is the correct syntax to make the background-color of all
paragraph elements black?
p {background-color : black;}
p {background-color : #black;}
all {background-color : yellow;}
all p {background-color : #black;}
Which one of the following is the correct an ordered list with the count of numeric value
3?
canRead()
canWrite()
getName()
All
If we have vechile and car classes,then which one is true about polymorphism concept?
Initialization=>condition=>execution=>iteration
Initialization=> execution => condition =>iteration
Initialization=> iteration => condition =>execution
None
One of your project stakeholders has a high amount of authority and a high amount of interest. How
should you manage that relationship?
Keep informed
Keep satisfied
Manage closely
Monitor
A ____________ report is a reflective statement that documents important information learned from
working on the project.
kanban
lessons-learned
project archive
progress
.A staffing management plan often includes a resource____________, which is a column chart that
shows the number of resources assigned to the project over time.
chart
graph
histogram
timeline
Your project team has decided not to use an upcoming release of software because it might cause your
schedule to slip. Which negative risk response strategy are you using?
Avoidance
Acceptance
Transference
Mitigation
Your project involves using a new release of a common software application, but if that
release is not available, your team has_____________ plans to use the current release.
Contingency
Fallback
Reserve
Mitigation
Several application development projects done for the same functional group might best be managed
as part of a ____________.
Portfolio
Program
Investment
Collaborative
Project management software helps you develop a ____________, which serves as a basis for creating
Gantt charts, assigning resources, and allocating cost
Project plan
Schedule
WBS
Deliverable
Why is business process considered as integrated end to end department and business
unit?
Business process
Business integration
Business function
Business operation
The following can be the reasons for the growth of ERP. ERP___________
The people who have developed ERP packages by investing huge amount of time and effort in
research and development to create the packaged solutions are _________
Actors
Stakeholders
Vendors
Shareholders
Regarding maintenance tasks, which could not be the duty of the support team?
Service packs
Payment runs
Problem solving
None
Unfreeze stage
Change stage
Refreeze stage
All
Why organizational change?
Information quality
Management filters
Organizational inertia
Varied and complex task.
None
Communication
Content management
Workflow control
Data-driven
Communication
Content management
Workflow control
Data-driven
Buyers have greater bargaining power when their numbers are small but the amount of substitute
products is high.
Buyers have less bargaining power when they buy in small amounts and have few alternative
product options
The more suppliers with quality products, the easier it is to gain great discounts
Fewer suppliers have more control and can quickly decrease the prices of their commodities.
_________is the type of information system that used at tactical level.
Suppose the bargaining power of buyers in the airline industry is high and few consumers, then which
one is true?
Suppose the bargaining power of buyers in the airline industry is high and few consumers, then which
one is true?
Which of the following are the common factors for the Failures of MIS?
Not given adequate attention to the quality control aspects of the inputs, the process
and the outputs MIS.
MIS is developed without streamlining the transaction processing systems in the
organization.
Lack of training and user-friendly system and the dependence on the system
personnel.
All
Why Management Information Systems provide timely, integrated, relevant, accurate, and useful
information for manager of organization?
Object
Message
Event
Association
Object modeling
Sequence diagram
Class diagram
None
If we have Teacher and Student tables, then which one is true to make persistent database model
between the two tables?
In which model that problem formulated, user requirements identified, and the model
built based upon real world objects.
Object design
Object oriented analysis
Object oriented implementation
None
Which one is true about interface?
It is a collection of operations
It can extend another interface
If class C implements interface I, then class C should implement all operations of I.
All