| Q 1: | Which of the following statement is not defined in the Object class? |
| (1) | sleep (long milliseconds) |
| (2) | wait() |
| (3) | notify() |
| (4) | toString() |
| Correct Answer: sleep (long milliseconds) | |
| Q 2: | What is the result of the expression 75.22+"5.2"? |
| (1) | The double value in 80.42 |
| (2) | The string in "80.42" |
| (3) | The string is "75.225.2" |
| (4) | The long value is 80 |
| Correct Answer: The string is "75.225.2" | |
| Q 3: | What is extension name of a Java source code file? |
| (1) | .java |
| (2) | .bj |
| (3) | .class |
| (4) | .exe |
| Correct Answer: .java | |
| Q 4: | Identify the following who presented the object modeling technique (OMT) |
| (1) | Booch |
| (2) | Jim Rumbaugh ET AL |
| (3) | Both of them |
| (4) | None of the above |
| Correct Answer: Jim Rumbaugh ET AL | |
| Q 5: | Data flow in DFD must have:
|
| (1) | 1 and 2 |
| (2) | 1 and 3 |
| (3) | 2 and 4 |
| (4) | 3 and 4 |
| Correct Answer: 1 and 2 | |
| Q 6: | The receive equalizer reduces delay distortions using a- |
| (1) | tapped delay lines |
| (2) | gearshift |
| (3) | descrambler |
| (4) | difference engine |
| Correct Answer: tapped delay lines | |
| Q 7: | Banner grabbing is an example of what? |
| (1) | Footprinting |
| (2) | Active operating system fingerprinting |
| (3) | Passive operating system fingerprinting |
| (4) | Application analysis |
| Correct Answer: Passive operating system fingerprinting | |
| Q 8: | The approach of transport layer; in which if data comes into the sender node in small pieces, it sends the first piece and buffer all the rest until the first piece is acknowledged; is called |
| (1) | Silly Window syndrome |
| (2) | RTP (Real Time, Transport Protocol) |
| (3) | Nagle's algorithm |
| (4) | Slow start algorithm |
| Correct Answer: Nagle's algorithm | |
| Q 9: | If every non-key attribute is functionally dependent on the primary key, then the relation is in |
| (1) | First normal form |
| (2) | Second normal form |
| (3) | Third normal form |
| (4) | Fourth normal form |
| Correct Answer: Second normal form | |
| Q 10: | Which one of the following statements is false |
| (1) | The data dictionary is normally maintaned by the database administrator |
| (2) | Data elements in the database can be modified by changing the data dictionary |
| (3) | The data dictionary contains the name and description of each data element |
| (4) | The data dictionary is a tool used exclusively by the database administrator |
| Correct Answer: Data elements in the database can be modified by changing the data dictionary | |