Professional Documents
Culture Documents
A. mouse
B. Printer
C. Scanner
D. USB drive
9) How can you remove a virus or malware from your computer system?
A. Use anti-virus and anti-malware software
10) Which of the following is a safety measure to take when repairing or maintaining a computer system?
11) In which database design phase we will develop all the technologies and organizational specifications
A. conceptual design
B. Logical Design
C. Physical design
D. Enterprise designing
12) Which of the following statement is not true about the database approach
A. Database system contains only the database itself but does not contain a complete definition or descripti
13) Which of the following statement is true about distributed database systems
A. User at one site cannot be able access data that is available at another site
B. If one site fails the rest can continue operation as long as transaction does not demand data from the faile
14) Which of the following statement shows the difference between homogenous and heterogeneous in distr
B. Different sites may use different schemas and software and all sites have identical software
C. Difference in schema is a major problem for query processing and same in schema is a major problem for
D. Sites may not be aware of each other and Sites have aware of each other
15) a schedule where the operations of each transaction are executed consecutively without any other interfe
A. Conflict schedules
B. Equivalent schedules
C. No-serial schedules
D. Serial schedule
A. Shadow paging
B. Check pointing
C. Log-Based
D. Taking Backup
A. Consistency
B. Isolation
C. Durability
D. Atomicity
B. To determine a strategy the one which is the most cost effective and efficient
19) It is a technique that holds great promise for providing even more improvements to query processing effic
A. Semantic optimization
B. Syntactical Optimization
20) Assume the admin of the database and newly created user user1 by the admin. So Which of the following
C. A trigger cannot be invoked when certain table columns are being updated
D. AFTER triggers run the trigger action before the triggering statement is run
A. Manual approach
B. File-based approach
C. Database approach
D. all
D. reduce pipelining
25) One of your classmates creates the student table. then he or she creates a view and he or she wants an u
result why?
26) The key difference between the hierarchical data model and the network data model is
A. There is one parent in the hierarchical data model but in the network data model there will be more than
B. in hierarchical data model sees records as a set of members but not network data model
C. in hierarchical data model allows no many to many relationships between entities but not network data m
D. hierarchical data model is collection of physically linked records but not network data model
27) Which one of the following is carry information from sender to receiver?
A. Protocol
B. Media
C. Sender
D. All
A. WiFi
B. WiMAX
C. Internet
D. Ad hoc network
A. NIC
B. Module
C. NOS
D. Modem
30) Which one is incorrect about MAC address and IP address?
A. Security
B. Accessibility
C. Speed
D. Communication
33) Let, network designer installed 6 hosts by using mush topology, so how many cables are needed?
A. 5
B. 15
C. 30
D. None
B. Network
C. Presentation
D. Application
35) Which division multiplexing is divided channel into fixed length and cannot available (reallocate) when ch
A. TDM
B. FDM
C. SDM
D. All
A. Physical layer
B. Presentation layer
C. Network layer
D. Session layer
37) In which OSI layer both error detection and correction is performed?
A. Transport layer
C. Network layer
D. Session layer
38) Which one is combine Segment into Frame and Frame into Packet?
A. Network layer
B. Transport layer
D. Session layer
39) At which layer routing protocols are determining the shortest path of the destination?
A. Network layer
B. Transport layer
D. Session layer
40) At which layer transmission mode (simplex , half duplex, full duplex) is determine?
A. Network layer
B. Transport layer
D. Session layer
A. Frame
B. Packet
C. Segment
D. Data
A. Ethernet
B. PPP
C. UDP
D. SMTP
44) Which protocol is address resolution protocol responsible for translating from IP addresses to MAC addre
A. ARP
B. RARP
C. UDP
D. TCP
A. 23
B. 22
C. 25
D. 80
A. Unicast
B. Broadcast
C. Multicast
D. Anycast
B. Different name
D. All
A. Domain
B. Tree
C. Forest
D. Domain controller
50) A collection of trees that share a common global catalog, directory schema, logical structure, and director
A. Domain
B. Tree
C. Forest
D. Site
51) A relationship between different domains or forests that allow sharing of resources between them is calle
A. Trust
B. Tree
C. Domain
D. Group
A. Authentication
B. Authorization
C. Access control
D. Validation
53) Which password policy prevents users from creating a new password that is the same as their current pas
A. Subneting
B. Cider
C. Superneting
D. IP classification
55) Why subnetting a given IP address?
C. To secure computers
D. All
A. 8
B. 30
C. 32
D. 24
D. None
A. RAM
B. FLASH
C. Non-Volatile RAM
D. Volatile RAM
B. Switch(config)#
C. Switch(config-if )#
D. Switch #
C. Hash Functions
D. RMD Function
61) Which protocol is used to secure when transfer data through a network?
C. IPSec protocol
D. All
A. Virus
B. Trapdoor
C. Bacterium
D. OpenVAS
A. Realm trust
B. External trust
C. Tree-rCoot trust
D. Forest trust
package javaapplication1;
public class Java_class1 extends Main{
int x=10;
public static void main(String[] args) {
Main myObj2=new Java_class1();
System.out.println(myObj2.x);
}
}
A. 10
B. 89
C. Error
D. None
..................
package javaapplication1;
public class Java_class1 extends Main{
int x=10;
void Show()
{
System.out.println(Show_res(7,7));
}
public static void main(String[] args) {
Java_class1 myObj2=new Java_class1();
myObj2.Show();
}
}
A. 14
B. 11
C. 10
D. A&B
68) What will be the access modifier of an object if you don't specify when declaring?
A. private
B. public
C. default
D. protected
A. Data abstraction is the process of hiding certain details and showing only essential information to the use
B. If you don't want other classes to inherit from a class, use the final keyword
D. the class that inherits from another class is known as child class
71) Which of the following is correct about the difference between structural and object oriented programmi
A. The structured programming allows developing a program using a set of modules or functions
D. A&C
72) One of the following programming focuses on representing both structure and behavior of information sy
A. Structured programming
C. modular programming
D. functional programming
}
while(k>=0)
{
System.out.println(my_array[k]);
k--;
}
}
}
What will be the output of the above program?
A. 3
2
B. 2
3
C. 4
3
D. 3
4
A. DEPARTMENT_LIST.iterator("IT");
B. DEPARTMENT_LIST.stream("IT");
C. DEPARTMENT_LIST.add("IT");
D. DEPARTMENT_LIST.get("IT");
Which of the following is the correct way to handle an exception that occurs in this program?
A. try{
int res=100/0;
System.out.println(res);
}
catch(ArithmeticException e)
{
System.out.println(e);
}
B. try{
int res=100/0;
System.out.println(res);
}
catch(NullPointerException e)
{
System.out.println(e);
}
C. try{
int res=100/0;
System.out.println(res);
}
catch(ArrayIndexOutOfBoundsException e)
{
System.out.println(e);
}
D. try{
int res=100/0;
System.out.println(res);
}
catch(NumberFormatException e)
{
System.out.println(e);
}
A. NumberFormatException
B. NullPointerException
C. Although using exception handling is a better programming method, the above program will not through
D. IndexOutOfBoundsException
77) The __________ method when used in the method field, leaves entity body empty.
A. POST
B. SEND
C. GET
D. PUT
A. $3hello
B. $_hello
C. $this
D. $5_Hello
C. Screen UI
A. onCreate()â??>onStartCommand()â??>onDestory()
B. onRecieve()
C. final()
A. send intent()
B. onRecieve()
C. implicitBroadcast()
A. Specification delays
B. Product competition
C. Testing
D. Staff turnover
86) What are the Five Project Management Process Groups in order?
A. To develop software
A. Functional
B. Non-functional
C. User
D. Technical
90) Which of the following is not a software development methodology?
A. Agile
B. Waterfall
A. FTP
B. TCP/IP
C. EFT
D. EDI
94) Which Of The Following Is An Example Of FTP.
A. Personal
B. Web Server
C. Sql
D. Cute-ftp
97) Which of the following is used to read an HTML page and render it?
A. Web server
B. Web network
C. Web browser
D. Web matrix
B. $ (Dollar)
C. & (Ampersand)
D. # (Hash)
A. echo
B. write
C. print
A. + (plus)
B. * (Asterisk)
C. . (dot)
D. append()