| Q 1: | In ............. protocols, we use.............. |
| (1) | byte-oriented; bit stuffing |
| (2) | character-oriented; bit stuffing |
| (3) | bit-oriented; bit stuffing |
| (4) | none |
| Correct Answer: bit-oriented; bit stuffing | |
| Q 2: | In a network with dozens of switches, how many root bridges would you have? |
| (1) | 1 |
| (2) | 2 |
| (3) | 5 |
| (4) | 12 |
| Correct Answer: 1 | |
| Q 3: | The data is stored, retrieved and updated in............. |
| (1) | OLAP |
| (2) | OLTP |
| (3) | Online processing |
| (4) | POP3 |
| Correct Answer: OLTP | |
| Q 4: | The package is a collection of |
| (1) | Editing Tolls |
| (2) | Interfaces |
| (3) | Classes |
| (4) | Classes and interfaces |
| Correct Answer: Classes and interfaces | |
| Q 5: | Which of the following is true? |
| (1) | If an exception is uncaught in a method, the method will terminate and normal execution will resume |
| (2) | An overriding method must declare that it throws the same exception classes as the method it overrides |
| (3) | The main() method of a program can declare that it throws checked exceptions |
| (4) | finally blocks are executed if, and only if, an exception gets throws while inside the corresponding try block |
| Correct Answer: The main() method of a program can declare that it throws checked exceptions | |
| Q 6: | Which two statements, added independently at 3 beginning of the program, allow the code to compile? public static void main(String[] args) java.util.TreeSet t = new java.util.TreeSet(); t.clear(); }
|
| (1) | 1 Only |
| (2) | 2 and 5 |
| (3) | 3 and 4 |
| (4) | 2 and 4 |
| Correct Answer: 2 and 5 | |
| Q 7: | In prototyping |
| (1) | 4GL are used |
| (2) | BASIC is used |
| (3) | COBOL is used |
| (4) | System is documented |
| Correct Answer: 4GL are used | |
| Q 8: | ......... is a technique used to show the effects of change of one or more variables on an outcome |
| (1) | Statistical Analysis |
| (2) | Sensitivity Analysis |
| (3) | Proportional Analysis |
| (4) | Quantitative Analysis |
| Correct Answer: Sensitivity Analysis | |
| Q 9: | The IPv4 header size............ |
| (1) | is 20 to 60 bytes long |
| (2) | is always 20 bytes long |
| (3) | is always 60 bytes long |
| (4) | depends on the MTU |
| Correct Answer: is 20 to 60 bytes long | |
| Q 10: | In IEEE 802.11, a BSS without an AP is called an........................ |
| (1) | an ad hoc architecture |
| (2) | and infrastructure network |
| (3) | both |
| (4) | none |
| Correct Answer: an ad hoc architecture | |