Q 1: | Error detection at the data link level is achieved by |
(1) | Bus stuffing |
(2) | Cycle redundancy codes |
(3) | Hamming Codes |
(4) | Equalization |
Correct Answer: Cycle redundancy codes | |
Q 2: | A copy constructor takes |
(1) | no argument |
(2) | one argument |
(3) | two arguments |
(4) | arbitary no of arguments |
Correct Answer: one argument | |
Q 3: | Tables derived from the ER-Diagram |
(1) | Are totally normalised |
(2) | Can be further denormalised |
(3) | May have multi-valued attributes |
(4) | Are always in INF |
Correct Answer: Are always in INF | |
Q 4: | The language used in application programs to request data from the DBMS is called |
(1) | DML |
(2) | DDL |
(3) | Query Language |
(4) | All of the above |
Correct Answer: All of the above | |
Q 5: | The relationship between DEPARTMENT and EMPLOYEE is a |
(1) | One to one relationship |
(2) | One to many relationship |
(3) | Many to many relationship |
(4) | Many to one relationship |
Correct Answer: One to many relationship | |
Q 6: | A relational operator that yields all possible pairs of rows from two tables is known as a/an |
(1) | Union |
(2) | Intersect |
(3) | Project |
(4) | Product |
Correct Answer: Product | |
Q 7: | In Link State Routing.............. is employed to distribute the link state packets. |
(1) | Broadcastin |
(2) | Hierarchical Routing |
(3) | Distance Vector Routing |
(4) | Flooding |
Correct Answer: Flooding | |
Q 8: | TO test the IP Stack on your local host, which IP address would you ping |
(1) | 127.0.0.0 |
(2) | 1.0.0.127 |
(3) | 127.0.0.1 |
(4) | 127.0.0.255 |
Correct Answer: 127.0.0.1 | |
Q 9: | Which of the following is a threat for electronic payment system? |
(1) | Trojan Horse |
(2) | Computer Virus |
(3) | Computer Worm |
(4) | All |
Correct Answer: All | |
Q 10: | Non-Polling system is |
(1) | TDMA |
(2) | Continuous ARQ |
(3) | Stop and wait |
(4) | None of these |
Correct Answer: TDMA | |