Q 1: | A copy constructor takes
|
(1) | no argument |
|
(2) | one argument |
|
(3) | two arguments |
|
(4) | arbitary no of arguments |
|
Correct Answer: one argument |
|
Q 2: | The language used in application programs to request data from the DBMS is called
|
(1) | DML |
|
(2) | DDL |
|
(3) | Query Language |
|
(4) | All of the above |
|
Correct Answer: All of the above |
|
Q 3: | Project risk factor is considered in
|
(1) | Spiral model |
|
(2) | Prototyping model |
|
(3) | Waterfall model |
|
(4) | Iterative enhancement model |
|
Correct Answer: Spiral model |
|
Q 4: | Data mining can be used as ..................tool.
|
(1) | Software |
|
(2) | Process |
|
(3) | Research |
|
(4) | Hardware |
|
Correct Answer: Research |
|
Q 5: | Full form of MAC address
|
(1) | Machine Access Coding Address |
|
(2) | Mode Access Coding Address |
|
(3) | Machine Access Control Address |
|
(4) | Media Access Control Address |
|
Correct Answer: Media Access Control Address |
|
Q 6: | Maximum throughput of Pure Aloha is..... of a given load
|
(1) | 36.8% |
|
(2) | 26.8% |
|
(3) | 18.4% |
|
(4) | 46.6% |
|
Correct Answer: 18.4% |
|
Q 7: | A feasibility document should contain all of the following except:
|
(1) | Data FLow Diagrams |
|
(2) | Feasible Alternative |
|
(3) | Project Name |
|
(4) | Problem Descriptions |
|
Correct Answer: Problem Descriptions |
|
Q 8: | What does the data dictionary identify
|
(1) | Field types |
|
(2) | Field names |
|
(3) | Field formates |
|
(4) | All |
|
Correct Answer: All |
|
Q 9: | A plan to overcome the risk called as
|
(1) | Migration Plan |
|
(2) | Master Plan |
|
(3) | Maintenance plan |
|
(4) | Mitigation plan |
|
Correct Answer: Mitigation plan |
|
Q 10: | Which are the tools not used for System Analysis : |
(1) | Decision table |
|
(2) | Flowcharts |
|
(3) | System-test data |
|
(4) | Data Flow Diagram |
|
Correct Answer: System-test data |
|