Monday, August 30, 2021

Python Programming Language in Data Science

Introduction

Python Programming is one of the object-oriented (based around data), high-level (easy to understand) programming language. First released in 1992, it is developed in a way that it is relevantly intuitive to write and understand. As such, it is an ideal coding language for those who want to speed-up the development.

If you are thinking about the uses of Python Programming, you will find that most of the big companies in the world implement it in some form. NASA, Google, Netflix, Spotify, etc. uses the Python programming language to improve their services.

Why Python Programming is becoming popular?

According to the TIOBE index, which measures the popularity of programming languages, Python Programming is the third most popular programming language in the world, behind only Java and C. There are many reasons for the Python Programming to get famous;

• It is ease of use. Those who are new at development using coding and programming, Python Programming can be an excellent first step. It is comparatively easy to learn, making it a great deal to start developing your own programming.

• It is simple syntax. Python Programming is comparatively easy to read and understandable, as its syntax is more like English language. It is straightforward layout that you can figure out what each line of code is doing.

• It is thriving community. As it is an open-source language, anyone can use Python Programming to code. There is a community which supports and develops the environment, adding their own contributions and libraries.

• It is versatility. As we’ll explore in more detail, there are many uses for Python Programming. Whether you are interested in data visualization, artificial intelligence or web development, you can find a use for the language.

Why should we learn Python Programming?

We know why Python Programming is very famous now a days, but why should we learn and how to use it? Aside from the ease of use and versatility mentioned above, there are several good reasons to learn Python Programming:

• Python Programming developers are in demand. Across a wide range of area, there is jobs and vacancies for those with Python Programming skills. If you are looking to start or change your career, it could be a vital skill to help you.

• It could lead to a well-paid career. Data suggests that the median annual salary for those with Python Programming skills is around £65,000 in the UK.

• There will be many job opportunities. Python Programming language used in most of the emerging technologies, such as AI, machine learning, and data analytics, it is likely that it is a future-proof skill. Learning Python Programming now could benefit you across your career.

What is Python Programming used for?

Python Programming is a famous and on-demand programming language to learn. But what is Python Programming used for? We’ve already seen some of the areas it can be applied to, and we’ve expanded on these and more Python Programming examples below. Python Programming can be used for:

1. AI and machine learning

Because Python Programming is such a stable, flexible, and simple programming language, it is perfect for various machine learning (ML) and artificial intelligence (AI) projects. In fact, Python Programming is among the favorite languages among data scientists, and there are many Python Programming machine learning and AI libraries and packages available.

If you are interested in this application of Python Programming, our Deep Learning and Python Programming for AI with Microsoft Azure ExpertTrack can help you develop your skills in these areas. You can discover the uses of Python Programming and deep learning while boosting your career in AI.

2. Data analytics

Much like AI and machine learning, data analytics is another rapidly developing field that utilizes Python Programming. At a time when we’re creating more data than ever before, there is a need for those who can collect, manipulate and organize the information.

Python Programming for data science and analytics makes sense. The language is easy-to-learn, flexible, and well-supported, meaning it is relatively quick and easy to use for analyzing data. When working with large amounts of information, it is useful for manipulating data and carrying out repetitive tasks.

You can learn about data analytics using Python Programming with our ExpertTrack, which will help you develop practical data analytics skills.

3. Data visualization

Data visualization is another popular and developing area of interest. Again, it has many strengths of Python Programming. Also, it is flexible and it is open-source, Python Programming provides a variety of graphing libraries with all kinds of features.

Whether you are looking to create a simple graphical representation or a more interactive plot, you can find a library to match your needs. Examples include Pandas Visualization. The possibilities are various, allowing you to convert data into meaningful forms.

If data visualization with Python Programming sounds appealing. You will learn how to leverage Python Programming libraries to interpret and analyze data sets.

4. Programming applications

You can program all kinds of applications using Python Programming. The other programming language can be used to read and create file directories, create GUIs and APIs, and more. Even if it is blockchain applications, audio and video apps, or machine learning applications, you can develop them all with Python Programming.

5. Web development

Python Programming is a great choice for web development. This is largely due to the fact that there are many Python Programming web development frameworks to choose from, such as Django, Pyramid, and Flask. These development frameworks have been used to create sites and services such as Spotify, Reddit and Mozilla.

Very grateful to the updated libraries and modules which comes with Python Programming language, functions like access to databases, content management, and authorization are all possible and easily retrievable. Given the versatility, it is very surprising that Python Programming is so widely used in web development.

6. Game development

Python Programming does have its uses in the industry for gaming development. It is possible to develop simple games using the programming language, which means it can be a useful tool for a rapid development a prototype. Similarly, certain function like dialogue tree development is possible in Python Programming.

If you are newbie in game development using Python Programming, then you can also find out how to make a text-based game in Python Programming. In doing so, you can work on various of skills and improve your knowledge in various areas.

7. Language development

The simple and elegant framework of Python Programming and its syntax convention that it has inspired the creation of new programming languages. Languages such as CoffeeScript, Cobra, and Go all use a similar syntax conventions to Python Programming.

This fact also means that Python Programming is a useful language. So, if you are totally new to programming, understanding Python Programming can help you determine other areas more easily.

8. Finance

Python Programming is rapidly being utilized in the world of finance and banking, often in fields like where quantitative and qualitative analysis is required. It can be a useful tool in finding out asset price trends and predictions, as well as in automating workflows across various data sources.

As mentioned already, Python Programming is an ideal tool for working with big data sets, and there are many libraries available to help with compiling and processing information. As such, it is one of the preferred languages in the finance industry.

9. SEO

Python Programming uses is in the field of search engine optimization (SEO). It is an area that often benefits from automation for web crawler and search engine robots, which is certainly possible through Python Programming. If it is implementing changes across multiple pages or categorizing keywords, Python Programming can guide.

Emerging technologies such as natural language processing (NLP) are also likely to be relative to those working in SEO. Python Programming is a powerful tool in developing these NLP skills and understanding how people search and how search engines return results.

10. Design

When asking ‘what is Python Programming used for?’ you probably were not expecting design to feature on the list. However, Python Programming is used to develop graphical design applications. The language is used in various 2D imaging software, such as Paint Shop Pro and Gimp.

Python Programming is even used in 3D animation software such as Lightwave, Blender, and Cinema 4D, showing just how versatile the language is.

Use of Python Programming Language in Data Science

The programming requirements of data science wants a very versatile yet flexible language which is easy and simple to write the code but can handle highly complex mathematical operations. Python is most suitable for such requirements as it has already established itself both as a language for general computing as well as scientific computing. More over it is being regularly upgraded in form of new addition to its libraries aimed at different programming need.

Mostly Python has got a very large collection of libraries which serve as special purpose analysis tools. For example – the NumPy package deals with scientific computing and its array needs much less memory than the conventional python list for managing numerical data. And the number of such packages is continuously growing.

Data Science: Challenges and solutions


Data Science: Data Science is a domain which involves working with a huge amount of data and use it for developing prediction, prescriptive and prescriptive model for analysis. It is about digging the information from data, capturing the data, (creating the model) analyzing(validating the analytical model) and utilizing the data(implementing the best model). It is a blended field of Computer Science, Business and Statistics altogether. It is an intersection of Data and computation.

Applications of Data Science

1. Search on Internet

Search engines uses various data science algorithms to display the best results for search queries within seconds.

2. Advertisement on digital platform

The digital marketing uses the data science methods (from display banners to digital hoarding). This is the significant reason that digital advertisement platform have higher click-through rates than traditional advertisement platform.

3. Systems for recommendation

The recommendation systems not only make it easy to search related products from millions of available products, but they also add more to the user experience. Many companies use this system to promote products and suggestions in accordance with the customer's demand and related information. The recommendations are based on the user’s previous demand.

Data Science Challenges and solutions:

1. Identifying the problem

One of the major task in analyzing a problem and designing a solution is to determine the problem properly and state each aspects of it. Mostly, data scientists opt for a manual approach and start working on data and tools without a clear information of the business problem or the client demand.

Solution:

There should be a well-defined workout before starting the actual data analysis work. The first step in this process is to identify the problem, then designing a solution, and finally analyze the results.

2. Access to the right data

For correct analysis, it is significant to lay the hands on the right type of data. Acquiring access to data in the most appropriate form is very difficult as well as time-consuming task. There could be an issues ranging from concealed data, insufficient volume of data or less variety of data. Data could be spread unevenly across variety of business so getting the access of that data can also a challenging task.

Solution:

Data Scientists has to be smart in data management systems and other data integration tools like Stream analytics software which is helpful for filtering and classifying of data. Many Data integration software also permit connection with external data sources and the seamless inclusion in the workflow.

3. Data Cleansing

Working with data which is full of inconsistencies and anomalies is every data scientist’s nightmare. Dirty or invalid data leads to vague results. Data scientists work with terabytes to exabytes of data and when they have to spend most of the time just cleaning the data before starting the analysis.

Solution:

Data Scientists should create Data Governance tools for overall accuracy, consistency and formatting of data. Moreover, maintaining data quality should be the main aim. Business operations across the enterprise take advantage from good quality data. There should be some people employed in departments as data quality managers.

4. Lack of domain expert

Data scientists has to be good at high-end tools and techniques, is one of the crucial challenge. Data Scientists also need to have good domain knowledge and acquire subject matter expertise. The biggest task for data scientists is to apply domain knowledge to business solutions. Data scientists are a bridge between the top management and the IT department. Domain expertise is needed to convey the needs of the top management to IT Department and vice versa.

Solution:

Data scientists have to work on gaining scenario of business, understand the real problem and work on analyzing and modeling the effective solutions. Along the mastering statistical and technical tools, Data scientists also need to concentrate on the business requirements.

5. Data security issues

Now a days, data security is a biggest issue. Since data is acquired and retrieved through a lot of channels like, social media, etc. there is increased vulnerability of attack by hackers. Due to the confidentiality of data, Data scientists are facing problems in data extraction, utilization, developing algorithms. The procedure of taking consent from users is causing a major delay in time and expensiveness.

Solution:

For this issue, there are no shortcuts. One has to follow the pre-defined global data protection rules. There should be additional security checks and make use of cloud platforms for data storage. Organizations also actively need to take help of advanced solutions that involve Machine Learning to secure against cyber-crimes and fraudulent practices.

Bigdata: Challenges and solutions

Big Data: It is very huge, quite large or abundant amount of data, information or the co-related statistics collected by the big organizations. Most of the software and data storage developed and prepared, as it is tough to evaluate the big data, manually. It is used to find out patterns and trends to make decisions concerning human, and interactive technology.

Applications of Big Data

1. Banking and Financial Services

All Credit card companies, retail banks, private wealth management services, insurance companies, and institutional investment houses use big data analysis for their financial services. The problem among them is that the massive amount of is multi-structured data stored in multiple systems, which big data can solve in quick time to make decisions. Big data is used in many ways, such as:

• Customer analytics

• Compliance analytics

• Fraud analytics

• Operational analytics

2. Big Data in telecommunications

Gaining new customers to subscribe, retaining the customers, and expanding within current customer base are top priorities for telephone communication companies. The solutions to these challenges is in the ability to collate and analyze the customer-generated data and/or machine-generated data that is being created day by day.

3. Big Data for Retail marketing

Whether the company is an online retailer or offline construction company, They all want to understand the demand of the customers and change in their needs. This need is to analyze all different data sources (data-mart) that companies deal day to day, including the customer transaction data, weblogs, social media, credit card data, and reward/coupon program data.

Bigdata challenges and solution

1. Lack of understanding of Big Data

Many organizations fail in their Big Data initiatives due to lack of understanding. Employees might not be knowing what data is, its storage methods, operations on data, importance, and data sources. Data professionals may know what needs to be done, but others may not have a clear view.

For example, if an employee do not understand the significance of data storage, he may not keep the backup of confidential or sensitive data. They might not use database systems properly for storage. As a result, when this data is required and needs to be accessed, it cannot be retrieved, easily.

Solution:

Big Data workshops and hands-on practice must be conducted for everyone. Basic training programs must be conducted for all the employees who are handling data, daily and as a part of the Big Data projects. A basic understanding of concept of Bigdata must be inculcated by all organization.

2. Data growth issues

One of the most complex challenge of Big Data is storing all these voluminous data, properly. The abundance of data being stored in data marts and databases of companies is growing, rapidly.

As these data grow rapidly with time, it will be difficult to handle in the future. The data is unstructured and comes from documents, audios, videos, text files and other sources. It means that you cannot search them in databases.

Solution:

In order to maintain these large data sets, companies are going for present techniques, such as compression, tiering (level-wise storage), and de-duplication. Compression is used for reducing the redundancies in the data, thus reducing its overall size upto some extent witout changing the meaning of data. De-duplication is the process of eradicating duplicate and unwanted data from a data. Data tiering allows companies to store the data in different storage tiers to ensure the data is residing in the most appropriate storage space. Data tiers can be private cloud, public cloud, and flash storage, depending on the data size and significance.

3. Confusion in selecting Bigdata tool

The companies sometimes get confused while selecting the best tool for Big Data analysis and storage. There are many questions arises like;

Is HBase or Cassandra the best technology for storage?

Is Hadoop or MapReduce good enough or Spark be a better choice for data analytics and storage?

Above questions bother companies and often they are unable to find the answers. They end up making poor decisions and select a technology which is not suitable. Therefore, money, time, and efforts are wasted.

Solution:

The best way to seek professional assistance. You can either hire experienced Bigdata professionals who knows much more about the tools. Another way is to go for Big Data consultancy for proper advice. Here, consultants will give some advice and recommend best tools, based on the company’s scenario. Based on their advice, you can make a strategy and then select the best tool for the betterment of the company.

4. Lack of data professionals

To utilize these novice technologies and Big Data tools, companies need to have skilled data professionals. These data professionals include data scientists, data analysts and data engineers who are experienced in working with the data handling tools and making sense out of voluminous data sets. Companies face lack of Big Data professionals in current scenario. This is because data handling tools have evolved, rapidly, but in many cases, the data professionals have not evolved as compared to.

Solution:

The companies are investing more and more money in hiring skilled professionals. They also have to offer free training programs to the existing staff to get the most out of them.

Another significant step taken by companies is to purchase the data analytics software/tools that are powered by artificial intelligence and /or machine learning. These tools can be used by professionals who are not data science experts but have preliminary knowledge.

5. Securing the data

Securing the huge data is one of the challenges task of Big Data. Often many big companies are also busy in collecting, understanding, storing, and analyzing the data that arises data security for later stages. But, this is not a good move as unprotected data repositories may become breeding grounds for hackers. Companies can lose the data with their revenue.

Solution:

Companies should recruit cyber-security professionals to protect the data. Other steps taken for securing data; such as:

• Data encryption

• Data segregation

• Identity and access control

• Implementation of endpoint security

• Real-time security monitoring

• Use Big Data security tools

6. Integrating data from a various sources

Data in company comes from a variety of sources or data marts, such as social media pages, ERP applications, MIS applications, customer logs, financial reports, e-mails, presentations and data reports created by employees. Combining all these types data to prepare a single reports is a challenging task. This is field often neglected by firms. But, data integration is important for analysis, reporting and business intelligence, so it has to be worked out.

Solution:

Companies have to resolve the data integration problems by buying the right data handling tools. Few of them are mentioned below:

• Talend Data Integration

• Centerprise Data Integrator

• ArcESB

• IBM InfoSphere

• Xplenty

• Informatica PowerCenter

• CloverDX

• Microsoft SQL

• QlikView

• Oracle Data Service Integrator

Types of open access publishing

There are 2 (two) types of open access

a. Gold open access: As per Elsevier

• An author can publish in an open access journal or hybrid journal which supports open access.

• The published article is freely available to everyone but the author can choose commercial or non-commercial Creative Commons license.

• If there is fee then publishing cost should be covered by the author or the institution or funding agency.

• All the open access journals can be found on the Directory of open access journals (https://doaj.org).

• DOAJ contains the journals in various 80 languages from 126 countries having 16665 journals and 6376560 articles till date.

b. Green open access: As per Elsevier

• The article can be published under a subscription model by linking and self-archiving the article for sharing as per policy.

• All accepted manuscripts should have Creative Commons use license, thus author retain the right to the article for further use.

• No fee is required to pay by the author for the publication as it is covered under the subscription.

• All the self-archiving publishers with policies can be found of SHERPA/RoMEO database.

• Open Access SHERPA-RoMEO project for free self-archiving.

• Sharing the research information, freely in the form of article/paper

• Self-archiving also known as "Green Open Access" in institutional repository.

• SHERPA project commenced in 2002 by JISC and CURL

• RoMEO is Publisher's copyright and archiving policies

• This project is backed by UNESCO.

Open Access Publishing

1. Many publishing house owns the rights of the articles published in their journals and they charge fee from whoever wants to read them.

2. Therefore, the idea of open access publishing is introduced where the authors and the readers are free from publishing and accessing, respectively.

3. In research, open access is a set of rule and regulation by which a research scholar can access the resource of relevant field of research for further research.

4. Open access publish the research article for free and give access to other researcher for further study for free.

5. The main principle of open access publishing is peer reviewed literature for the research and eradicates copying and reuse by open access licensing.

6. Open access publications are applicable to all types of publications like peer-reviewed journals, research papers, theses, books, etc.

7. Open access publishing is backed by UNESCO to provided free and unrestricted online resource for the research purpose. 

8. As per UNESCO, "the content is universally and freely accessible, at no cost to the reader, via the Internet or otherwise." 

9. As per UNESCO, the author or copyright owner irrevocably grants to all users, for an unlimited period, "the right to use, copy, or distribute the article, on condition that proper attribution is given."

10. As per UNESCO, "it is deposited, immediately, in full and in a suitable electronic form, in at least one widely and internationally recognized open access repository committed to open access."

11. All digital contents like audio, video, text, graph, images, software, data, executable code, articles, theses, etc. are free to publish by the author and free to access by the person who wants to use it, ethically.

12. Advantages of open access publications are

• Free for all the authors and readers who wants to use, ethically

• Increase in accessing the resource

• Free access to the researchers in all the countries

13. Disadvantages of open access publications are

• Sustainability in longer run for publication houses

• Lack in quality of the written materials as quantity increases

• No fee leads many publications houses to be shut down without fund

Turnitin similarity check

1. Turnitin is an online software based on SAAS (Software as a Service) to check for the similarity in content for plagiarism.

2. Turnitin is not an open source therefore the institutions, universities have to pay for the software to use.

3. Turnitin was developed by John Barrie and Christian Storm launched in 1997 for educational industry.

4. Turnitin is a privately owned company which provides similarity checking by online based services on payment basis.

5. It gives the similarity check on plagiarized content to get similarity report also known as plagiarism report.

6. The research scholar or scientist can check for the similarity score on Turnitin by submitting their content.

7. In Turnitin, the similarity score is shown in terms of percentage of the plagiarized content in a report.

8. High similarity score does not always mean that the content is plagiarized because some sentences can be written, generally.

9. Turnitin provides easier interpretation by color coding, various filters and source for comparison for the similarity in content.

10. It compares the similarity in content from the database repository of various industries, academic institutions for plagiarism.

11. It enables students and researchers to use the paraphrasing, citation, quoting and sources of content, appropriately.

12. It protects the institutions and researchers from the research misconduct like plagiarism, Salami-slicing, contract cheating, etc. and follow the research ethics for writing thesis and/or research article.

13. It is considered that 10% or below similarity score is allowed to submit the research paper and thesis of Ph.D.

14. The researcher has to remove the uploaded file from the Turnitin after checking the similarity score and made the changes as required to get the limitation of 10% or below similarity score.

Saturday, October 10, 2020

Analysis and Design of Algorithms Multiple choice questions

 1.Recursion is similar to which of the following?
 Switch Case
 Loop
 If-else
 if elif else

2.In recursion, the condition for which the function will stop calling itself is ____________
 Best case
 Worst case
 Base case
 There is no such condition

3.Consider the following code snippet:
void my_recursive_function()
{
my_recursive_function();
}
int main()
{
my_recursive_function();
return 0;
}

What will happen when the above snippet is executed?
 The code will be executed successfully and no output will be generated
 The code will be executed successfully and random output will be generated
 The code will show a compile-time error
 The code will run for some time and stop when the stack overflows

4.What is the output of the following code?
void my_recursive_function(int n)
{
if(n == 0)
return;
printf("%d ",n);
my_recursive_function(n-1);
}
int main()
{
my_recursive_function(10);
return 0;
}
 10
 1
 10 9 8 ... 1 0
 10 9 8 ... 1

5.What is the base case for the following code?
void my_recursive_function(int n)
{
if(n == 0)
return;
printf("%d ",n);
my_recursive_function(n-1);
}
int main()
{
my_recursive_function(10);
return 0;
}

 Return
 printf(“%d “, n)
 if(n == 0)
 My_recursive_function(n-1)

6.How many times is the recursive function called, when the following code is executed?
void my_recursive_function(int n)
{
if(n == 0)
return;
printf("%d ",n);
my_recursive_function(n-1);
}
int main()
{
my_recursive_function(10);
return 0;
}

 9
 10
 11
 12

7.Which of the following statements is true?
 Recursion is always better than iteration
 Recursion uses more memory compared to iteration
 Recursion uses less memory compared to iteration
 Iteration is always better and simpler than recursion

8.What will be the output of the following code?
int cnt=0;
void my_recursive_function(int n)
{
if(n == 0)
return;
cnt++;
my_recursive_function(n/10);
}
int main()
{
my_recursive_function(123456789);
printf("%d",cnt);
return 0;
}

 123456789
 10
 0
 9

9.
void my_recursive_function(int n)
{
if(n == 0)
{
printf("False");
return;
}
if(n == 1)
{
printf("True");
return;
}
if(n%2==0)
my_recursive_function(n/2);
else
{
printf("False");
return;
}
}
int main()
{
my_recursive_function(100);
return 0;
}

 True
 False

10.What is the output of the following code?
int cnt = 0;
void my_recursive_function(char *s, int i)
{
if(s[i] == '\0')
return;
if(s[i] == 'a' || s[i] == 'e' || s[i] == 'i' || s[i] == 'o' || s[i] == 'u')
cnt++;
my_recursive_function(s,i+1);
}
int main()
{
my_recursive_function("thisisrecursion",0);
printf("%d",cnt);
return 0;
}

 6
 9
 5
 10

11.What is the output of the following code?
void my_recursive_function(int *arr, int val, int idx, int len)
{
if(idx == len)
{
printf("-1");
return ;
}
if(arr[idx] == val)
{
printf("%d",idx);
return;
}
my_recursive_function(arr,val,idx+1,len);
}
int main()
{
int array[10] = {7, 6, 4, 3, 2, 1, 9, 5, 0, 8};
int value = 2;
int len = 10;
my_recursive_function(array, value, 0, len);
return 0;
}

 3
 4
 5
 6

12.______is the first step in solving the problem
 Understanding the Problem
 Identify the Problem
 Evaluate the Solution
 None of these

13.______is the last step in solving the problem
 Understanding the Problem
 Identify the Problem
 Evaluate the Solution
 None of these

14.Following is true for understanding of a problem
 Knowing the knowledgebase
 Understanding the subject on which the problem is based
 Communication with the client
 All of the above

15.The six-step solution for the problem can be applied to
I. Problems with Algorithmic Solution
II. Problems with Heuristic Solution
 Only I
 Only II
 Both I and II
 Neither I nor II

16.______ solution requires reasoning built on knowledge and experience
 Algorithmic Solution
 Heuristic Solution
 Random Solution
 None of these

17.The correctness and appropriateness of ___________solution can be checked very easily.
 Algorithmic solution
 Heuristic solution
 Random solution
 None of these

18.The branch of computer that deals with heuristic types of problem is called _________________.
 System software
 Real time software
 Artificial intelligence
 None of these

19.Artificial Intelligence makes use of following prominently
 Database
 Data Warehouse
 Knowledge base
 None of these

20.Naming convention for variable is followed in company because ____________.
 It enhances readability
 It allows to work without conflicts
 It enhances the efficiency
 All of the above

Friday, October 09, 2020

Operating System multiple choice questions

1) Which of the following is not an operating system?
Windows
Linux
Oracle
DOS
Answer: (c) Oracle
Explanation: Oracle is an RDBMS (Relational Database Management System). It is known as Oracle Database, Oracle DB, or Oracle Only. The first database for enterprise grid computing is the Oracle database.

2) What is the maximum length of the filename in DOS?
4
5
8
12
Answer: (c) 8
Explanation: The maximum length of the filename is 8 characters in the DOS operating system. It is commonly known as an 8.3 filename.

3) When was the first operating system developed?
1948
1949
1950
1951
Answer: (c) 1950
Explanation: The first operating system was developed in the early 1950's. It was also called a single-stream batch processing system because it presented data in groups.

4) When were MS windows operating systems proposed?
1994
1990
1992
1985
Answer: (d) 1985
Explanation: The first MS Windows operating system was introduced in early 1985.

5) Which of the following is the extension of Notepad?
.txt
.xls
.ppt
.bmp
Answer: (a) .txt
Explanation: The .txt file extension is a standard text document extension that contains the unformatted text. It is the default file extension for the notepad.

6) What else is a command interpreter called?
prompt
kernel
shell
command
Answer: (c) shell
Explanation: The command interpreter is also called the shell.

7) What is the full name of FAT?
File attribute table
File allocation table
Font attribute table
Format allocation table
Answer: (b) File allocation table.
Explanation: The FAT stands for File allocation table. The FAT is a file system architecture. It is used in computer systems and memory cards. A FAT of the contents of a computer disk indicates which field is used for which file.

8) BIOS is used?
By operating system
By compiler
By interpreter
By application software
Answer: (a) By operating system
Explanation: BIOS is used by the operating system. It is used to configure and identify the hardware in a system such as the hard drive, floppy drive, optical drive, CPU, and memory.

9) What is the mean of the Booting in the operating system?
Restarting computer
Install the program
To scan
To turn off
Answer: (a) Restarting computer
Explanation: Booting is a process of the restart the computer. After restarting it, there is no software in the computer's main memory.

10) When does page fault occur?
The page is present in memory.
The deadlock occurs.
The page does not present in memory.
The buffering occurs.
Answer: (c) The page does not present in memory.
Explanation: Page faults occur when a process tries to access a block page of the memory and that page is not stored in RAM (Read only memory) or memory.

11) Banker's algorithm is used?
To prevent deadlock
To deadlock recovery
To solve the deadlock
None of these
Answer: (a) To prevent deadlock
Explanation: Banker's algorithm is used to prevent the deadlock condition. The banker algorithm is sometimes called the detection algorithm. It is named the banker algorithm because it is used to determine whether a loan can be granted in the banking system or not.

12) When you delete a file in your computer, where does it go?
Recycle bin
Hard disk
Taskbar
None of these
Answer: (a) Recycle bin
Explanation: When you delete a file on your computer device, it is transferred to your computer system's recycle bin or trash.

13) Which is the Linux operating system?
Private operating system
Windows operating system
Open-source operating system
None of these
Answer: (c) Open-source operating system
Explanation: The Linux operating system is an open-source operating system made up of a kernel. It is a very safe operating system.

14) What is the full name of the DSM?
Direct system module
Direct system memory
Demoralized system memory
Distributed shared memory
Answer: (d) Distributed shared memory
Explanation: The DSM stands for Distributed Shared Memory.

15) What is the full name of the IDL?
Interface definition language
Interface direct language
Interface data library
None of these
Answer: (a) Interface definition language
Explanation: The IDL stands for Interface Definition Language. It is used to establish communications between clients and servers in RPC (Remote Procedure Call).

16) What is bootstrapping called?
Cold boot
Cold hot boot
Cold hot strap
Hot boot
Answer: (a) Cold boot
Explanation: Bootstrapping is also known as the cool boot.

17) What is the fence register used for?
To disk protection
To CPU protection
To memory protection
None of these
Answer: (c) To memory protection
Explanation: The fence register is used for memory protection on the computer. It is a way to access the memory in the computer.

18) If the page size increases, the internal fragmentation is also?..?
Decreases
Increases
Remains constant
None of these
Answer: (b) Increases
Explanation: None

19) Which of the following is a single-user operating system?
Windows
MAC
Ms-Dos
None of these
Answer: (c) Ms-Dos
Explanation: The single-user operating system is the operating system in which only one user can access the computer system at a time, and Ms-DOS is the best example of a single-user operating system.

20) The size of virtual memory is based on which of the following?
CPU
RAM
Address bus
Data bus
Answer: (c) Address bus
Explanation: The size of virtual memory is based on the address bus.

21) If a page number is not found in the translation lookaside buffer, then it is known as a?
Translation Lookaside Buffer miss
Buffer miss
Translation Lookaside Buffer hit
All of the mentioned
Answer: (a) Translation Lookaside Buffer miss
Explanation: A Translation Lookaside Buffer miss arises when the page table entry needed to translate a virtual address to a physical address is not available in the translation lookaside buffer.

22) Which of the following is not application software?
Windows 7
WordPad
Photoshop
MS-excel
Answer: (a) Windows 7
Explanation: Windows 7 is not an application software because it is a operating system.

23) Which of the following supports Windows 64 bit?
Window XP
Window 2000
Window 1998
None of these
Answer: (a) Window XP
Explanation: Windows XP supports the 64-bits. Windows XP is designed to expand the memory address space. Its original name is Microsoft Windows XP Professional x64 and it is based on the x86-64 architecture.

24) Which of the following windows does not have a start button?
Windows 7
Windows 8
Windows XP
None of these
Answer: (b) Windows 8
Explanation: Windows 8 does not have a start button because it uses the tablet mode, but windows 8.1 has a start button.

25) Which of the following operating systems does not support more than one program at a time?
Linux
Windows
MAC
DOS
Answer: (d) DOS
Explanation: DOS stands for Disk operating system. Disk operating system is a single-user operating system that does not support more than one program at a time.

26) Which of the following is a condition that causes deadlock?
Mutual exclusion
Hold and wait
Circular wait
No preemption
All of these
Answer: (e) All of these
Explanation: None

27) Who provides the interface to access the services of the operating system?
API
System call
Library
Assembly instruction
Answer: (b) System call
Explanation: The system call provides an interface for user programs to access the services of the operating system through the API (Application Program Interface).

28) Where are placed the list of processes that are prepared to be executed and waiting?
Job queue
Ready queue
Execution queue
Process queue
Answer: (b) Ready queue
Explanation: The ready queue is a set of all the processes that processes are ready to execute and wait.

29) Who among the following can block the running process?
Fork
Read
Down
All of these
Answer: (d) All of these
Explanation: None

30) Which of the following does not interrupt the running process?
Timer interrupt
Device
Power failure
Scheduler process
Answer: (b) Scheduler process
Explanation: Scheduler process does not interrupt in any running process. Its job is to select the processes for long-term, short-term, and short-term scheduler.

31) What is Microsoft window?
Operating system
Graphics program
Word Processing
Database program
Answer: (a) Operating system
Explanation: Microsoft Windows is an operating system that was developed by Microsoft company. The Microsoft Windows is available in 32-bits and 64-bits in the market.

32) Which of the following is group of programs?
Accessories
Paint
Word
All of above
Answer: (a) Accessories
Explanation: The windows accessories are a group of programs in the operating system. Windows XP offers many accessories or software that you can use to help with your work. The accessories are not full features programs, but it is useful for a specific task in the operating systems. It provides many programs such as a painting program, a calculator, a word processor, a notepad, and Internet software.

33) Which of the following is an example of a Real Time Operating System?
MAC
MS-DOS
Windows 10
Process Control
Answer: (d) Process Control
Explanation: Process control is a best example of a Real time operating system.

34) Which of the following operating systems do you use for a client-server network?
MAC
Linux
Windows XP
Windows 2000
Answer: (d) Windows 2000
Explanation: Windows 2002 operating systems were used to implement a client Server Network. It is a server OS that was developed by Microsoft in April 24, 2002. It includes some features of Windows XP.

35) Which windows was introduced to My Computer?
Windows 10
Windows XP
Windows 95
Windows 98
Answer: (c) Windows 95
Explanation: Windows 95 was first window to introduced the My Computer.

36) What type of commands are required to perform various tasks in DOS?
Internal commands
External commands
Valuable commands
Primary commands
Answer: (b) External commands
Explanation: External commands are required to perform various tasks in DOS.

37) What is the number of characters contained in the primary name of the file of MS-DOS?
Up to 8 characters
3 characters
Up to 10 characters
None of the above
Answer: (a) Up to 8 characters
Explanation: MS-DOS operating system uses the file system that supports the 8.3 characters. The eight characters are used to the filename, and three characters are used to the extension.

38) Which command is used to fetch a group (.doc) of files that have just been deleted?
Undelete
Undelete/all
Undelete *.doc
All of above
Answer: (c) Undelete *.doc
Explanation: Undelete *.doc command is used to fetch a group (.doc) of files that have just been deleted.

39) Which of the following is system software?
Operating system
Compiler
Utilities
All of the above
Answer: (d) All of the above
Explanation: The system software is a type of computer program designed to run hardware and software programs on a computer. According to some definitions, system software also includes system utilities, system restore, development tools, compilers, and debuggers.

40) Which program runs first after booting the computer and loading the GUI?
Desktop Manager
File Manager
Windows Explorer
Authentication
Answer: (d) Authentication
Explanation: The authentication program is run first after booting the computer and loading the GUI. Authentication is a process of verifying the person or device. For example, when you log in to Facebook, you enter a username and password.

Database Management System Multiple choice questions

1) In the context of data warehousing, data map or ‘data about data’ is known as …………….
a) tuple
b) attribute
c) metadata
d) teradata

2) Which of the following normal form deals with the anomaly of multivalue dependency?
a) 1NF
b) 2NF
c) 4NF
d) 5NF

3) Which of the following normal form deals with the repeating group anomaly?
a) 1NF
b) 2NF
c) 4NF
d) 5NF

4) …………… is a database language used to define data structures in SQL?
a) Sybase
b) Oracle
c) DDL
d) MySQL

5) The ………………… is a database file that contains metadata.
a) data index
b) data repository
c) data dictionary
d) none

6)Which of the following is not the state of a transaction in the database?
a) Active
b) Committed
c) Terminated
d) Nullified

7) The …………… file saves the recovery scenario in Quick Test Professional (QTP) environment
a) QRS
b) JPEG
c) DOC
d) TSR

8) Which of the following is not a command is SQL?
a) WHERE
b) ORDER BY
c) REMOVE
d) SELECT

9) How should we traverse an oracle database to retrieve a row in the quickest possible time?
a) Full table scan
b) Unique index
c) Primary key
d) Table access by row id

10) Which of the following is a concurrency control protocol?
a) Locked-based protocol
b) two-phase locking protocol
c) Timestamp ordering protocol
d) all

11) Which of the following normal forms deals with the anomaly of partial functional dependency on the composite key?
a) 1NF
b) 2NF
c) 4NF
d) 5NF

12) ………………… represents the structure of the database in a formal language acceptable by the DBMS.
a) Database schema
b) ER diagram
c) Database table
d) None

13) Which of the following statements are used to create indexes in the database?
a) CREATE INDEX
b) BUILD INDEX
c) WRITE INDEX
d) None’

14)Which of the following is a database recovery technique?
a) Check-pointing
b) Transaction rollback
c) Shadow paging
d) All

15)Which of the following is a foreing key constraint?
a)Referential integrity
b) Domain integrity
c) Entity integrity
d) All

16) Which of the following trains are important to select a primary key?
a) Unique
b) Not Null
c) Fully functional dependency
d) Indexed
e) All

17) What are various types of DBMS?
a) ORBDMS
b) Client server DBMS
c) Distributed DBMS
d) OODBMS
e) All

18) Which of the following are the types of integrity constraints enforced by RDBMS?
a) Entity integrity
b) Domain integrity
c) Referential integrity
d) All

19) The data model which describes how the data is actually stored is :
a) internal model
b) external model
c) logical model
d) none of these

20) Data about data is normally termed as :
a) directory
b) data bank
c) meta data
d) none of the above

21. In an object-oriented model, one object can access data of another object by passing:
a. Instance variable
b. Message
c. Variable
d. None of these

22. A view of database that appears to an application program is known as:
a. Schema
b. Subschema
c. virtual table
d. none of the above

23. An abstraction concept for building composite object from their component object is called:
a. Specialization
b. Normalization
c. Generalization
d. Aggregation

24. A set of objects that share a common structure and
a common behavior is called:
a. Object
b. Class
c. Entity
d. None of these

25. Every weak entity set can be converted into a strong entity set by:
a. using generalization
b. adding appropriate attributes
c. using aggregation
d. none of the above

26. The number of entities to which another entity can be associated via a relationship set is expressed as:
a. Entity
b. Cardinality
c. Schema
d. Attributes

27. Relations produced from an E-R model will always be in:
a. First normal form
b. Second normal form
c. Third normal form
d. Fourth normal form

28. In ER model the details of the entities are hidden from the user. This process is called:
a. Generalization
b. Specialization
c. Abstraction
d. none of these above

29. The file organization that provides very fast access to any arbitrary record of a file is:
a. Ordered file
b. Unordered file
c. Hashed file
d. B-tree

30. What is not true about a view?
a. It is a definition of a restricted portion of the database
b. It is a security mechanism
c. It is always updatable like any other table
d. All are true

31. In a relational database a referential integrity constraint can be specified with the help of
a. primary key
b. foreign key
c. secondary key
d. none of the above

32. A super key is a set of one or more attributes that, taken collectively, allow us
a. to identify uniquely an entity in the entityset
b. to make the key most powerful for fasterretrieval
c. to increase effectiveness of database access
d. none of the above

33. 4NF is designed to cope with:
a. Transitive dependency
b. Join dependency
c. Multi valued dependency
d. None of these

34. Every Boyee-Codd normal form is in
a. First normal form
b. Second normal form
c. Third normal form
d. All of the above

35. Which command is used to remove all rows from a table?
a. Delete
b. Remove
c. Truncate
d. Both [A] and [B]

36. Which of the following is an aggregate function in SQL?
a. Union
b. Like
c. Group By
d. Max

37. Which command is used to add a column to an existing table?
a. Create
b. Update
c.Alter
d. None of these

38. A deadlock exists in the system if and only if the wait for graph:
a. has a cycle in it
b. has a path from first node to last node
c. is a tree
d. none of the above

39. Rollback of transactions is normally used to:
a. recover from transaction failure
b. update the transaction
c. retrieve old records
d. repeat a transaction

40. Prevention of access to the database by unauthorized users is referred to as:
a. Integrity
b. Productivity
c. Security
d. Reliability

Algorithms Multiple choice questions

 1.Algorithm is a ________________.
 Processing of problem
 Step by Step method to solve a problem
 Graphical method
 None of the above

2.Algorithm should have _______________ or more output.
 Zero
 One
 Two
 Three

3.Which is correct according to increasing order of growth rate
 n, n! , nlogn , n^2 , n^3 , n^5 , 2^n
 nlogn , n^2 , n^3 , n^5 , 2^n , n!
 n , nlogn , n^2 , n^3 , n^5 , 2^n , n!
 n , nlogn , n^2 , n^3 , n^5 ,  n!, 2^n

4.Big Oh! notation looks for____________ value.
 Maximum
 Minimum
 Average
 Mean

5.Omega (Ω) notation looks for ___________ value.
 Maximum
 Minimum
 Average
 Mean

6.A function which calls itself is called __________ function.
 Null
 Default
 Recursive
 Non recursive

7. _____________ method is used to solve recurrence.
 Main
 Major
 Divide
 Master

8.Time complexity of binary search is _____________.
 O(n)
 O(logn)
 O(nlogn)
 None of the above

9.The condition for applying binary search is _______________.
 Elements should be sorted
 Elements should be unsorted
 Elements should have priority
 None of the above

10.best case of binary search, the searching element is at _______________ position.
 First
 Second
 Last
 Middle

11.The __________________of an algorithm is the amount of computer time it needs to run to completion.
 Time complexity
 Space complexity
 Time period
 None of the above

12.The minimum number of comparisons required finding the minimum and maximum of 100 numbers is ________
 99
 100
 101
 None of the above

13.Divide and Merge operation is done in ____________.
 Binary search
 Merge sort
 Quicksort
 Heap sort

14.Which sort takes an extra array.
 Binary search
 Merge sort
 Quicksort
 Heap sort

15.Recurrence equation of merge sort is _______________.
 T(n) = T(n/2) + O(n)
 T(n) = 2T(n/2) + O(n)
 T(n) = 3T(n/2) + O(n)
 None of the above

16.Pivot element is used in ___________ sort.
 Binary search
 Mergesort
 Quick sort
 Heap sort

17.Partition operation is done in _____________ sort.
 Binary search
 Mergesort
 Quick sort
 Heap sort

18.Quick sort algorithm is an example of
 Greedy
 Improved search
 Dynamic Programming
 Divide and Conquer

19.Time complexity of merge sort is ___________.
 O(n)
 O(logn)
 O(nlogn)
 None of the above

20.Time complexity of quick sort is depends on _____________.
 O(n)
 O(logn)
 O(nlogn)
 None of the above

21.Merge sort uses which of the following technique to implement sorting?
 Backtracking
 Greedy algorithm
 Divide and conquer
 Dynamic programming

22.What is the average case time complexity of merge sort ?
 O(n log n)
 O(n^2)
 O(n^2log n)
 O(n log n2)

23.What is the auxiliary space complexity of merge sort?
 O(1)
 O(log n)
 O(n)
 O(n log n)

24.Merge sort can be implemented using O(1) auxiliary space.
 True
 False

25.What is the worst case time complexity of merge sort?
 O(n log n)
 O(n^2)
 O(n^2 log n)
 O(n logn2 )

26.Which of the following method is used for sorting in merge sort?
 Merging
 Partitioning
 Selection
 Exchanging

27.What will be the best case time complexity of merge sort ?
 O(n log n)
 O(n2)
 O(n2 logn)
 O(n logn2)

28. Which of the following is not a variant of merge sort ?
 In-place merge sort
 Bottom up merge sort
 Top down merge sort
 Linear merge sort

29.Choose the incorrect statement about merge sort from the following?
 It is a comparison based sort
 It is an adaptive algorithm
 It is not an in place algorithm
 It is stable algorithm

30.Which of the following is not in place sorting algorithm?
 Merge sort
 Quick sort
 Heap sort
 Insertion sort

31.Which of the following is not a stable sorting algorithm?
 Quick sort
 Cocktail sort
 Bubble sort
 Merge sort

32.Which of the following stable sorting algorithm takes the least time when applied to an almost sorted array?
 Quick sort
 Insertion sort
 Selection sort
 Merge sort

33.Merge sort is preferred for arrays over linked lists.
 True
 False

34.Which of the following sorting algorithm makes use of merge sort?
 Tim sort
 Intro sort
 Bogo sort
 Quick sort

35.Choose the correct code for merge sort.
 void merge_sort(int arr[], int left, int right) { if (left > right) { int mid = (right-left)/2; merge_sort(arr, left, mid); merge_sort(arr, mid+1, right); merge(arr, left, mid, right); //function to merge sorted arrays } }
 void merge_sort(int arr[], int left, int right) { if (left < right) { int mid = left+(right-left)/2; merge_sort(arr, left, mid); merge_sort(arr, mid+1, right); merge(arr, left, mid, right); //function to merge sorted arrays } }
 void merge_sort(int arr[], int left, int right) { if (left < right) { int mid = left+(right-left)/2; merge(arr, left, mid, right); //function to merge sorted arrays merge_sort(arr, left, mid); merge_sort(arr, mid+1, right); } }
 void merge_sort(int arr[], int left, int right) { if (left < right) { int mid = (right-left)/2; merge(arr, left, mid, right); //function to merge sorted arrays merge_sort(arr, left, mid); merge_sort(arr, mid+1, right); } }

36. Which of the following sorting algorithm does not use recursion?
 Quick sort
 Merge sort
 Heap sort
 Bottom up merge sort

37.Which of the following sorting algorithms is the fastest ?
 Merge sort
 Quick sort
 Insertion sort
 Shell sort

38.Quick sort follows Divide-and-Conquer strategy.
 True
 False

39.What is the worst case time complexity of a quick sort algorithm?
 O(N)
 O(N log N)
 O(N^2 )
 O(log N)

40.Which of the following methods is the most effective for picking the pivot element ?
 First element
 Last element
 Median-of-three partitioning
 Random element

41.Find the pivot element from the given input using median-of-three partitioning method. 8, 1, 4, 9, 6, 3, 5, 2, 7, 0.
 8
 7
 9
 6

42.Which is the safest method to choose a pivot element ?
 Choosing a random element as pivot
 Choosing the first element as pivot
 Choosing the last element as pivot
 Median-of-three partitioning method

43.What is the average running time of a quick sort algorithm ?
 O(N^2 )
 O(N)
 O(N log N)
 O(log N)

44.Which of the following sorting algorithms is used along with quick sort to sort the sub arrays?
 Merge sort
 Shell sort
 Insertion sort
 Bubble sort

45.Quick sort uses join operation rather than merge operation.
 True
 False

46.How many sub arrays does the quick sort algorithm divide the entire array into?
 One
 Two
 Three
 Four

47.Which is the worst method of choosing a pivot element ?
 First element as pivot
 Last element as pivot
 Median-of-three partitioning
 Random element as pivot

48.Which among the following is the best cut-off range to perform insertion sort within a quick sort ?
 N=0-5
 N=5-20
 N=20-30
 N>30

49.Recursion is a method in which the solution of a problem depends on ____________
 Larger instances of different problems
 Larger instances of the same problem
 Smaller instances of the same problem
 Smaller instances of different problems

50.Which of the following problems can’t be solved using recursion?
 Factorial of a number
 Nth fibonacci number
 Length of a string
 Problems without base case

Search Aptipedia