| Q 1: | A copy constructor takes
|
| (1) | no argument |
|
| (2) | one argument |
|
| (3) | two arguments |
|
| (4) | arbitary no of arguments |
|
| Correct Answer: one argument |
|
| Q 2: | The language used in application programs to request data from the DBMS is called
|
| (1) | DML |
|
| (2) | DDL |
|
| (3) | Query Language |
|
| (4) | All of the above |
|
| Correct Answer: All of the above |
|
| Q 3: | Project risk factor is considered in
|
| (1) | Spiral model |
|
| (2) | Prototyping model |
|
| (3) | Waterfall model |
|
| (4) | Iterative enhancement model |
|
| Correct Answer: Spiral model |
|
| Q 4: | Data mining can be used as ..................tool.
|
| (1) | Software |
|
| (2) | Process |
|
| (3) | Research |
|
| (4) | Hardware |
|
| Correct Answer: Research |
|
| Q 5: | Full form of MAC address
|
| (1) | Machine Access Coding Address |
|
| (2) | Mode Access Coding Address |
|
| (3) | Machine Access Control Address |
|
| (4) | Media Access Control Address |
|
| Correct Answer: Media Access Control Address |
|
| Q 6: | Maximum throughput of Pure Aloha is..... of a given load
|
| (1) | 36.8% |
|
| (2) | 26.8% |
|
| (3) | 18.4% |
|
| (4) | 46.6% |
|
| Correct Answer: 18.4% |
|
| Q 7: | A feasibility document should contain all of the following except:
|
| (1) | Data FLow Diagrams |
|
| (2) | Feasible Alternative |
|
| (3) | Project Name |
|
| (4) | Problem Descriptions |
|
| Correct Answer: Problem Descriptions |
|
| Q 8: | What does the data dictionary identify
|
| (1) | Field types |
|
| (2) | Field names |
|
| (3) | Field formates |
|
| (4) | All |
|
| Correct Answer: All |
|
| Q 9: | A plan to overcome the risk called as
|
| (1) | Migration Plan |
|
| (2) | Master Plan |
|
| (3) | Maintenance plan |
|
| (4) | Mitigation plan |
|
| Correct Answer: Mitigation plan |
|
| Q 10: | Which are the tools not used for System Analysis : |
| (1) | Decision table |
|
| (2) | Flowcharts |
|
| (3) | System-test data |
|
| (4) | Data Flow Diagram |
|
| Correct Answer: System-test data |
|