Q 1: | What is numerical range of char? |
(1) | 0 to 32767 |
(2) | 0 to 65535 |
(3) | -256 to 255 |
(4) | -32768 to 32767 |
Correct Answer: 0 to 65535 | |
Q 2: | What is the sequence of major events in the life of an applet? |
(1) | init, start, stop, destroy |
(2) | start, init, stop, destroy |
(3) | init, start, destroy, stop |
(4) | init, start, destroy |
Correct Answer: init, start, stop, destroy | |
Q 3: | ......... Points provide a method to recover data that has been delivered but not yet used |
(1) | Segmentation |
(2) | Concatenation |
(3) | Translation |
(4) | Synchronization |
Correct Answer: Synchronization | |
Q 4: | Let R(a,b,c) and S (d,e,f) be two relations in which d is the foreign key of S that refers to the primary key to R. Consider the following four operations
|
(1) | None of them can cause any violation |
(2) | All of them can cause violation |
(3) | 1 and 4 can cause violation |
(4) | 2 and 3 can cause violation |
Correct Answer: 2 and 3 can cause violation | |
Q 5: | Dirty bit is used to show the |
(1) | Page with corrupted data |
(2) | The wrong page in the memory |
(3) | Page that is modified after being loaded into cache memory |
(4) | Page that is less frequently accessed |
Correct Answer: Page that is modified after being loaded into cache memory | |
Q 6: | Which of the following is not Network topology? |
(1) | Bus |
(2) | Spider |
(3) | Tree |
(4) | Ring |
Correct Answer: Spider | |
Q 7: | Packets of the same session may be routed through different paths in |
(1) | TCP and UDP |
(2) | TCP, but not UDP |
(3) | UDP, but not TCP |
(4) | Neither TCP nor UDP |
Correct Answer: TCP and UDP | |
Q 8: | ...... allow insertion and extraction of signals |
(1) | ADMs |
(2) | STS multiplexer/ demultiplexers |
(3) | regenerators |
(4) | None of the above |
Correct Answer: ADMs | |
Q 9: | The development of a/an ......................... is a key step in solving a problem |
(1) | Structure |
(2) | Program |
(3) | Algorithm |
(4) | None of the above |
Correct Answer: Algorithm | |
Q 10: | Which will help analysts to work with users to determine system usage? |
(1) | Actor |
(2) | Component |
(3) | Class |
(4) | Use Case |
Correct Answer: Use Case | |