| Q 1: | Which of the following represents the condition of an object at a specific moment in time?
|
| (1) | behavior |
|
| (2) | properties |
|
| (3) | instance |
|
| (4) | state |
|
| Correct Answer: state |
|
| Q 2: | Which of the following represents the condition of an object at a specific moment in time?
|
| (1) | behavior |
|
| (2) | properties |
|
| (3) | instance |
|
| (4) | state |
|
| Correct Answer: state |
|
| Q 3: | In transaction, cascade rollback
|
| (1) | Can occur in sytems which use deferred writeback |
|
| (2) | Occurs in systems which use the waterfall writeback |
|
| (3) | Is a result of simultaneous transaction commits |
|
| (4) | None of the above |
|
| Correct Answer: Can occur in sytems which use deferred writeback |
|
| Q 4: | If a relation is in 2NF and 3NF forms then:
|
| (1) | No non-prime attribute is functionally dependent on other non-prime attributes |
|
| (2) | All attributes are functionally independent |
|
| (3) | No non-prime attribute is functionally dependent on prime attributes |
|
| (4) | Prime attribute is functionally independent of all non prime attributes |
|
| Correct Answer: No non-prime attribute is functionally dependent on other non-prime attributes |
|
| Q 5: | The SQL.ALTER statement can be used to
|
| (1) | change the table structure |
|
| (2) | change the table data |
|
| (3) | add rows to the table |
|
| (4) | delete rows from the table |
|
| Correct Answer: change the table structure |
|
| Q 6: | The dotted-decimal notation of the following IPv4 address in binary notation is................. 10000001 00001011 00001011 11101111
|
| (1) | 111.56.45.239 |
|
| (2) | 129.11.10.238 |
|
| (3) | 129.11.11.239 |
|
| (4) | 111.56.11.239 |
|
| Correct Answer: 129.11.11.239 |
|
| Q 7: | When a hacker attempts to attack a host via the Internet it is known as what type of attack?
|
| (1) | local access |
|
| (2) | remote attack |
|
| (3) | internal attack |
|
| (4) | physical access |
|
| Correct Answer: remote attack |
|
| Q 8: | The...... layer of Ethernet consists of teh LLC sublayer and the MAC sublayer.
|
| (1) | data link |
|
| (2) | physical |
|
| (3) | network |
|
| (4) | None of the above |
|
| Correct Answer: data link |
|
| Q 9: | Which of the following is not a software engineering paradigm?
|
| (1) | Waterfall model |
|
| (2) | Spiral model |
|
| (3) | Incremental Process model |
|
| (4) | Generic model |
|
| Correct Answer: Generic model |
|
| Q 10: | In design phase more emphasis is given on
|
| (1) | How the system will be developed |
|
| (2) | What the system will do |
|
| (3) | What ar ethe risk in developing the system |
|
| (4) | Which computer language must be used for development |
|
| Correct Answer: How the system will be developed |
|