Professional Documents
Culture Documents
Kset 2014 S
Kset 2014 S
K-2414 1 ±Üâ.£.®æãà./P.T.O.
*k-2414* Total Number of Pages : 8
K-2414 3 Paper II
*k-2414* Total Number of Pages : 8
16. Evaluate the set of SQL statements : 19. In which case would you use a FULL
CREATE TABLE dept OUTER JOIN ?
(deptho NUMBER (2), (A) Both tables have NULL values
dname VARCHAR 2(14), (B) You want all unmatched data from
loc VARCHAR 2(131) ; both tables
ROLLBACK ; (C) One of the tables has more data
DESCRIBE DEPT than the other
What is true about the set ?
(D) You want all unmatched data from
(A) The DESCRIBE DEPT statement
one table
displays the structure of the DEPT
table 20. What is necessary for your query on an
(B) The ROLLBACK statement frees the existing view to execute successfully ?
storage space occupies by the (A) The underlying table must have
DEPT table
data
(C) The DESCRIBE DEPT statement
(B) The underlying tables must be in the
returns an error, object DEPT does
not exist same schema
(D) The DESCRIBE DEPT statement (C) You need SELECT privileges on the
displays the structure of the DEPT view
table only if there is a COMMIT (D) You need SELECT privileges only
statement introduced before the on the underlying tables
ROLLBACK statement
21. In a row-major 2 dimensional array of
17. Evaluate the SQL statement
size m×n, the address of element a(i, j)
SELECT ROUND (TRUNC
is obtained by the general equation
(MOD(1600, 10), –1), 2)
(A) base address + (j*m*size) +
FROM dual ;
(i*n*size)
What will be displayed ?
(A) 0 (B) 1 (B) base address + (i*n*size) +
(C) 0.00 (D) 1.00 (j*m*size)
(C) base address + (i*n*size) + (j*size)
18. In a SELECT statement that includes a
(D) base address + (i*size) + (j*m*size)
WHERE clause, where is the GROUP
By clause placed in the SELECT 22. The postfix of the infix expression
statement ? ((((a/b) – c) + (d*c)) – a *c)
(A) Before the WHERE clause
(A) a/bc – de * + ac * –
(B) After the ORDER BY clause
(B) ab/c – de + * ac * –
(C) Immediately after the SELECT
clause (C) ab/c – de * + ac – *
(D) After the WHERE clause (D) ab/c – de * + ac * –
Paper II 4 K-2414
*k-2414* Total Number of Pages : 8
23. The total number of nodes in a complete 28. In a banyan switch, for 8 inputs and
binary tree of height n is 8 outputs, we have ________ stages.
(A) 2n
(A) 8
(B) 2n – 1 – 1
(B) 4
(C) 2n – 1
(D) 2n + 1 (C) 3
(D) 2
24. In the process of depth first search in a
graph, the adjacency list is maintained 29. X.25 recommendation makes
in a references to different standards.
(A) Stack Match these standards :
(B) Tree
(i) X.1 (a) Categories of access
(C) Graph
(ii) X.2 (b) Reference connections
(D) Queue
for packets
25. The Indices of an Index sequential file
(iii) X.10 (c) User classes of
maintains the details of
services
(A) Record structure
(B) Storage structure (iv) X.92 (d) User facilities
(C) Address of records based on key (A) i – b, ii – c, iii – a, iv – d
field (B) i – c, ii – d, iii – a, iv – b
(D) None of the above
(C) i – b, ii – d, iii – a, iv – c
26. IP addresses are converted to (D) i – a, ii – d, iii – b, iv – c
(A) A binary string
(B) Alphanumeric string 30. Use RSA algorithm, with p = 3, q = 11,
(C) A hierarchy of domain names and e = 7, the public and private keys
(D) A hexadecimal string will be
(A) (7, 33) (3, 33)
27. Among services available on the World
Wide Web are (B) (7, 11) (3, 22)
(i) Encryption (C) (3, 33) (11, 37)
(ii) HTTP (D) (7, 11) (3, 33)
(iii) HTML
31. Run-time is
(iv) Firewalls
(A) (i) and (ii) (A) Static policy
(B) (ii) and (iii) (B) Dynamic policy
(C) (iii) and (iv) (C) Hybrid policy
(D) (i) and (iv) (D) Mixed policy
K-2414 5 Paper II
*k-2414* Total Number of Pages : 8
Paper II 6 K-2414
*k-2414* Total Number of Pages : 8
40. If you want to find all the lines in a file 46. In Loopback address, first byte
called slnolist that begin with a number equal to
(A) grep *[0 – 9] slnolist (A) 127
(B) grep @[0 – 9] slnolist (B) 128
(C) grep ![0 – 9] slnolist (C) 255
(D) grep ∧ [0 – 9] slnolist (D) 126
41. Which one of the below is not a software 47. e-mail auto-replies are created using
development model ? (A) e-mail rules
(A) Prototyping (B) web rules
(B) Incremental (C) message rules
(C) Cocomo (D) internet rules
(D) Spiral
48. What does SSL stands for
42. RAD stands for (A) System Socket Layer
(A) Rapid And Design (B) Superuser System Login
(B) Rapid Aided Development (C) Secure System Layer
(C) Rapid Application Design (D) Secure Socket Layer
(D) Rapid Application Development
49. DNS is
43. Debugging is the process of (A) The distributed hierarchical naming
(A) Checking for errors system
(B) Locating errors (B) The vertical naming system
(C) Correcting errors (C) The horizontal naming system
(D) Finding syntax errors (D) The client server system
44. Software maintenance is required for 50. Imagery that you can see in Google
(A) Enhancement Earth.
(B) Changes (A) Represents one snapshot in time
(C) Corrections from when the image was acquired
(D) All of the above (B) Is updated via a live link to a Google
Satellite in orbit
45. Which one is not considered in (C) Represents the current satellite
software quality ? image from when you start Google
(A) Maintenance earth
(B) Feasibility (D) Is not updated – you must use
(C) User friendly (usability) Keyhole viewer program to the
(D) Portability current imagery
____________
K-2414 7 Paper II
*k-2414* Total Number of Pages : 8
Paper II 8 K-2414
KSET -2014
KEY - Paper - II