You are on page 1of 27

Total_questions: 100

1) Which of the following is a basic component of a computer system?

A. mouse

B. Printer

C. Scanner

D. USB drive

2) What is the role of thermal paste in a computer system?

A. To protect the processor from overheating

B. To provide a seal between the processor and heatsink

C. To prevent static electricity from damaging the processor

D. To speed up the processor's performance

3) Which of the following is a method of preventing malware infections on a computer system?

A. Keep your software up-to-date

B. Use weak passwords

C. Disable your firewall

D. Share your personal information online

4) What is the purpose of a UPS (Uninterruptible Power Supply)?

A. To provide temporary power during a power outage

B. To regulate the power supply to the computer system

C. To prevent damage to the computer system from power surges

D. All of the above


5) How can you clean the keyboard of your computer system?

A. Use a damp cloth to wipe the keys

B. Use a can of compressed air to blow out debris

C. Remove the keys and wash them in soapy water

D. All of the above

6) Which of the following is a reason to perform regular backups of your data?

A. To recover lost or deleted files

B. To protect against hardware failure

C. To prepare for a disaster

D. All of the above

7) How can you test the performance of your computer system?

A. Use benchmarking software

B. Run diagnostic tests

C. Check the system's event log

D. All of the above

8) What is the purpose of a BIOS (Basic Input/Output System)?

A. To control the computer's basic functions

B. To configure the hardware settings of the computer

C. To provide a platform for the operating system to run on

D. All of the above

9) How can you remove a virus or malware from your computer system?
A. Use anti-virus and anti-malware software

B. Reformat the hard drive and reinstall the operating system

C. Delete infected files manually

D. All of the above

10) Which of the following is a safety measure to take when repairing or maintaining a computer system?

A. Wear an anti-static wristband

B. Work in a poorly ventilated area

C. Use metal tools near the power supply

D. None of the above

11) In which database design phase we will develop all the technologies and organizational specifications

A. conceptual design

B. Logical Design

C. Physical design

D. Enterprise designing

12) Which of the following statement is not true about the database approach

A. Database system contains only the database itself but does not contain a complete definition or descripti

B. The Database approach is characterized by program-data independence.

C. It allows multiple users to access the database at the same time.

D. It provides facilities for recovering hardware and software failures

13) Which of the following statement is true about distributed database systems

A. User at one site cannot be able access data that is available at another site
B. If one site fails the rest can continue operation as long as transaction does not demand data from the faile

C. cannot Speedup of query processing

D. there is no communication problems in DDBMS

14) Which of the following statement shows the difference between homogenous and heterogeneous in distr

A. Appears to user as a single system and Appears to user as multiple system

B. Different sites may use different schemas and software and all sites have identical software

C. Difference in schema is a major problem for query processing and same in schema is a major problem for

D. Sites may not be aware of each other and Sites have aware of each other

15) a schedule where the operations of each transaction are executed consecutively without any other interfe

A. Conflict schedules

B. Equivalent schedules

C. No-serial schedules

D. Serial schedule

16) It is a Recovery Techniques which is useful if transactions execute serially

A. Shadow paging

B. Check pointing

C. Log-Based

D. Taking Backup

17) In Which transaction properties all statements or none are executed.

A. Consistency

B. Isolation
C. Durability

D. Atomicity

18) The aims of query processing is:

A. To transform a query written in a low-level language into a high-level language

B. To determine a strategy the one which is the most cost effective and efficient

C. To execute the strategy to retrieve the irrelevant data

D. To check that the query is only syntactically correct

19) It is a technique that holds great promise for providing even more improvements to query processing effic

A. Semantic optimization

B. Syntactical Optimization

C. Heuristic query optimization

D. Cost based query optimization

20) Assume the admin of the database and newly created user user1 by the admin. So Which of the following

A. grant delete on table name to user1;

B. grant on table name delete to user1

C. grant on table name delete from user1

D. grant delete on table name from user1;

21) Which of the following statement is true about triggers

A. A trigger is not a stored procedure

B. A trigger can be invoked when a row is inserted into a specified table

C. A trigger cannot be invoked when certain table columns are being updated
D. AFTER triggers run the trigger action before the triggering statement is run

22) Which of the following statement is true about the indexes

A. It is used to speed up querying during fetching data

B. It is used to speed up update time than the normal update time

C. Cannot speed up fetching time than the normal fetching time

D. we cannot stored table keys in indexes

23) Which of the following data management approach is difficult to cross-referencing?

A. Manual approach

B. File-based approach

C. Database approach

D. all

24) Which of the following statement is served as a criterion for Optimization?

A. Reduce total execution time of the query

B. increase the number of disk access

C. increase response time of the query

D. reduce pipelining

25) One of your classmates creates the student table. then he or she creates a view and he or she wants an u
result why?

A. because the view is secured

B. because it hides unnecessary information from users

C. because it Provides very low flexibility


D. aggregation and summary results are computed from a base relation

26) The key difference between the hierarchical data model and the network data model is

A. There is one parent in the hierarchical data model but in the network data model there will be more than

B. in hierarchical data model sees records as a set of members but not network data model

C. in hierarchical data model allows no many to many relationships between entities but not network data m

D. hierarchical data model is collection of physically linked records but not network data model

27) Which one of the following is carry information from sender to receiver?

A. Protocol

B. Media

C. Sender

D. All

28) Which one is Metropolitan Area Network (MAN) technology?

A. WiFi

B. WiMAX

C. Internet

D. Ad hoc network

29) Computer is connect to the network connection via?

A. NIC

B. Module

C. NOS

D. Modem
30) Which one is incorrect about MAC address and IP address?

A. IPv4 uses 32-bit addresses in dotted notations.

B. 48-bit address in colons notations

C. IPv6 uses 128-bit addresses in hexadecimal notations

D. MAC Address of computer can be changed

31) Which one is true about Connection-oriented and Connection-less communication?

A. Connection-oriented is faster than Connection-less

B. Connection-oriented and Connection-less performed by the same protocol

C. In Connection-less traffic congestion is possible

D. In connection-oriented acknowledge is not important

32) The advantage of wireless network over wired network is?

A. Security

B. Accessibility

C. Speed

D. Communication

33) Let, network designer installed 6 hosts by using mush topology, so how many cables are needed?

A. 5

B. 15

C. 30

D. None

34) Transmission media is present at the OSI layer of?


A. Physical

B. Network

C. Presentation

D. Application

35) Which division multiplexing is divided channel into fixed length and cannot available (reallocate) when ch

A. TDM

B. FDM

C. SDM

D. All

36) In which OSI layer dissimilar devices communicate by bit reordering?

A. Physical layer

B. Presentation layer

C. Network layer

D. Session layer

37) In which OSI layer both error detection and correction is performed?

A. Transport layer

B. Data link layer

C. Network layer

D. Session layer

38) Which one is combine Segment into Frame and Frame into Packet?

A. Network layer
B. Transport layer

C. Data link layer

D. Session layer

39) At which layer routing protocols are determining the shortest path of the destination?

A. Network layer

B. Transport layer

C. Data link layer

D. Session layer

40) At which layer transmission mode (simplex , half duplex, full duplex) is determine?

A. Network layer

B. Transport layer

C. Data link layer

D. Session layer

41) Which one is Protocol Data Unit (PDU) of Data-link layer?

A. Frame

B. Packet

C. Segment

D. Data

42) Which protocol is available in Data-link layer

A. Ethernet

B. PPP
C. UDP

D. SMTP

43) Which one is incorrect about OSI and TCP/IP model?

A. TCP/IP model has 4 layers

B. TCP/IP is developed by ARPANET

C. OSI Model has 7 layers

D. OSI model is support both connection-oriented and connectionless

44) Which protocol is address resolution protocol responsible for translating from IP addresses to MAC addre

A. ARP

B. RARP

C. UDP

D. TCP

45) The Port Number of Secure Shell (SSH) is?

A. 23

B. 22

C. 25

D. 80

46) Which one is not available in IPv4 network?

A. Unicast

B. Broadcast

C. Multicast
D. Anycast

47) Workgroup name and computer name must be?

A. The same name

B. Different name

C. Name may be special characters

D. All

48) Which one is false concerned on domain and workgroup?

A. In workgroup, all computers are managed by server

B. In domain, all computers are managed by server

C. A workgroup is not protected by a password

D. In workgroup, all computers must be on the same local network

49) Logical structure of active directory includes?

A. Domain

B. Tree

C. Forest

D. Domain controller

50) A collection of trees that share a common global catalog, directory schema, logical structure, and director

A. Domain

B. Tree

C. Forest

D. Site
51) A relationship between different domains or forests that allow sharing of resources between them is calle

A. Trust

B. Tree

C. Domain

D. Group

52) The process of granting someone to access a resource is called?

A. Authentication

B. Authorization

C. Access control

D. Validation

53) Which password policy prevents users from creating a new password that is the same as their current pas

A. Enforce password history

B. Maximum password age

C. Minimum password length

D. Passwords must meet complexity requirements

54) Dividing a network & its IP addresses into segments is called?

A. Subneting

B. Cider

C. Superneting

D. IP classification
55) Why subnetting a given IP address?

A. To enhance the growth of global Internet routing table

B. To prevent buying new IP address

C. To secure computers

D. All

56) Subneting IP address to support 25 hosts, so how many available hosts?

A. 8

B. 30

C. 32

D. 24

57) Which one is correct about Link-State routing algorithm?

A. It available for flat topology

B. It uses Open Shortest Path First rule

C. Routing Information Protocol used to rout packets

D. None

58) Which one is used to store configured routing information permanently?

A. RAM

B. FLASH

C. Non-Volatile RAM

D. Volatile RAM

59) Which one is global configuration mode?


A. Switch>

B. Switch(config)#

C. Switch(config-if )#

D. Switch #

60) Which one is used single key to encrypt and decrypt?

A. Symmetric Key Cryptography

B. Asymmetric Key Cryptography

C. Hash Functions

D. RMD Function

61) Which protocol is used to secure when transfer data through a network?

A. Secure Shell (SSH)

B. HyperText Transfer Protocol Secure (HTTPS)

C. IPSec protocol

D. All

62) Which one is add?

A. Virus

B. Trapdoor

C. Bacterium

D. OpenVAS

63) Which types of Trusts created automatically?

A. Realm trust
B. External trust

C. Tree-rCoot trust

D. Forest trust

64) Which one is False about FLSM and VLSM?

A. FLSM has equal interval of hosts

B. FLSM has the same subnet mask

C. VLSM wasted more IP address than FLSM

D. VLSM has different subnet mask

65) package javaapplication1;


public class Java_class1 extends Main{
int x=10;
public static void main(String[] args) {
Java_class1 myObj=new Java_class1();
Main myObj1=new Main();
Main myObj2=new Java_class1();
Java_class1 myObj3=new Main();
}
}

Which of the following line of code is incorrect?

A. Java_class1 myObj=new Java_class1();

B. Main myObj1=new Main();

C. Main myObj2=new Java_class1();

D. Java_class1 myObj3=new Main();

66) package javaapplication1;


public class Main{
private static int x=89;
}

package javaapplication1;
public class Java_class1 extends Main{
int x=10;
public static void main(String[] args) {
Main myObj2=new Java_class1();
System.out.println(myObj2.x);
}
}

Which of the following is the output of the above program?

A. 10

B. 89

C. Error

D. None

67) package javaapplication1;


public class Main{
int Show_res(int a,int b)
{
return a+b;
}
void show()
{
Show_res(5,6);
}
}

..................

package javaapplication1;
public class Java_class1 extends Main{
int x=10;
void Show()
{
System.out.println(Show_res(7,7));
}
public static void main(String[] args) {
Java_class1 myObj2=new Java_class1();
myObj2.Show();
}
}

Which of the following is the output of the above program?

A. 14

B. 11

C. 10

D. A&B

68) What will be the access modifier of an object if you don't specify when declaring?

A. private

B. public

C. default

D. protected

69) Which of the following is false about abstraction in java?

A. Data abstraction is the process of hiding certain details and showing only essential information to the use

B. The abstract keyword can be used for classes and methods

C. Abstract class cannot be used to create objects

D. Abstraction can only be achieved by interface classes

70) Which of the following is false about inheritance in java?

A. the class that inherits from another class is known as superclass

B. If you don't want other classes to inherit from a class, use the final keyword

C. Java doesn't allow multiple inheritance

D. the class that inherits from another class is known as child class
71) Which of the following is correct about the difference between structural and object oriented programmi

A. The structured programming allows developing a program using a set of modules or functions

B. Structured programming includes data hiding feature therefore it is more secure

C. brings together data and functions

D. A&C

72) One of the following programming focuses on representing both structure and behavior of information sy

A. Structured programming

B. Object oriented programming

C. modular programming

D. functional programming

73) package javaapplication1;


public class Java_class1{
public static void main(String[] args) {
int k=1;
int my_array[]=new int[100];
for(int i=0;i<20;i++)
{
my_array[i]=i+2;

}
while(k>=0)
{
System.out.println(my_array[k]);
k--;
}

}
}
What will be the output of the above program?

A. 3
2

B. 2
3

C. 4
3

D. 3
4

74) List DEPARTMENT_LIST=new ArrayList();

How do you insert a list item to the list?

A. DEPARTMENT_LIST.iterator("IT");

B. DEPARTMENT_LIST.stream("IT");

C. DEPARTMENT_LIST.add("IT");

D. DEPARTMENT_LIST.get("IT");

75) package javaapplication1;


import java.util.*;
public class Java_class1{
public static void main(String[] args) {
int res=100/0;
} }

Which of the following is the correct way to handle an exception that occurs in this program?

A. try{
int res=100/0;
System.out.println(res);
}
catch(ArithmeticException e)
{
System.out.println(e);
}

B. try{
int res=100/0;
System.out.println(res);
}
catch(NullPointerException e)
{
System.out.println(e);
}

C. try{
int res=100/0;
System.out.println(res);
}
catch(ArrayIndexOutOfBoundsException e)
{
System.out.println(e);
}

D. try{
int res=100/0;
System.out.println(res);
}
catch(NumberFormatException e)
{
System.out.println(e);
}

76) String s=null;


System.out.println(s.length()); Which type of exception must be handled?

A. NumberFormatException

B. NullPointerException

C. Although using exception handling is a better programming method, the above program will not through

D. IndexOutOfBoundsException

77) The __________ method when used in the method field, leaves entity body empty.
A. POST

B. SEND

C. GET

D. PUT

78) The correct sequence of HTML tags for starting a webpage is

A. Head, Title, HTML, body

B. HTML, Body, Title, Head

C. HTML, Head, Title, Body

D. HTML, Head, Title, Body

79) Which is the right way of declaring a variable in PHP?

A. $3hello

B. $_hello

C. $this

D. $5_Hello

80) _____What is an activity in Android?

A. Activity performs the actions on the screen

B. Manage the Application content

C. Screen UI

D. None of the above

81) What is the life cycle of services in android?

A. onCreate()â??>onStartCommand()â??>onDestory()

B. onRecieve()
C. final()

D. Service life cycle is same as activity life cycle.

82) What is the life cycle of broadcast receivers in android?

A. send intent()

B. onRecieve()

C. implicitBroadcast()

D. sendBroadcast(), sendOrderBroadcast(), and sendStickyBroadcast().

83) Which of the following is not considered as a risk in project management?

A. Specification delays

B. Product competition

C. Testing

D. Staff turnover

84) Which of the following is not project management goal?

A. Keeping overall costs within budget

B. Delivering the software to the customer at the agreed time

C. Maintaining a happy and well-functioning development team

D. Avoiding customer complaints

85) Which of these truly defines Software design?

A. software design is an activity subjected to constraints

B. software design specifies nature and composition of software product

C. software design satisfies client needs and desires


D. all of the mentioned

86) What are the Five Project Management Process Groups in order?

A. Initiating, Planning, Monitoring & Controlling, Executing, and Closing.

B. Initiating, Monitoring & controlling, Planning, Executing, and Closing

C. Initiating, Executing, Planning, Monitoring & Controlling, and Closing

D. Initiating, Planning, Executing, Monitoring & Controlling. and Closing

87) What is the purpose of system analysis and design?

A. To develop software

B. To improve system efficiency

C. To provide training to employees

D. To monitor system performance

88) What is the purpose of the planning phase of the SDLC?

A. To determine the system requirements

B. To develop a detailed project plan

C. To design the system

D. To implement the system

89) Which of the following is not a type of system requirement?

A. Functional

B. Non-functional

C. User

D. Technical
90) Which of the following is not a software development methodology?

A. Agile

B. Waterfall

C. RAD (Rapid Application Development)

D. UML (Unified Modeling Language)

91) What is the purpose of a class diagram?

A. To depict the system inputs and outputs

B. To depict the system processes

C. To depict the system data and relationships

D. To illustrate the system architecture

92) How can we create and manage threads in java?

A. only by extending the Thread class

B. only by implementing the Runnable interface

C. by extending the Runnable interface and implementing the Thread class

D. by implementing the Runnable interface & extending the Thread class

93) This Of The Following Is An Internet Protocol.

A. FTP

B. TCP/IP

C. EFT

D. EDI
94) Which Of The Following Is An Example Of FTP.

A. Personal

B. Web Server

C. Sql

D. Cute-ftp

95) What is PHP?

A. PHP is an open-source programming language

B. PHP is used to develop dynamic and interactive websites

C. PHP is a server-side scripting language

D. All of the mentioned

96) What is a web browser?

A. a program that can display a web page

B. a program used to view html documents

C. it enables user to access the resources of internet

D. all of the mentioned

97) Which of the following is used to read an HTML page and render it?

A. Web server

B. Web network

C. Web browser

D. Web matrix

98) Variable name in PHP starts with -


A. ! (Exclamation)

B. $ (Dollar)

C. & (Ampersand)

D. # (Hash)

99) Which of the following is used to display the output in PHP?

A. echo

B. write

C. print

D. Both (a) and (c)

100) Which of the following is used for concatenation in PHP?

A. + (plus)

B. * (Asterisk)

C. . (dot)

D. append()

You might also like