1. Which layers of the OSI model are included in the lower layers?
A. Application, Session, Presentation
B. Physical, Transport, Data Link
C. Data Link, Physical, Network
D. Session, Data Link, Physical
E. None of these
2. From smallest to largest, rank the following logical pieces of the database : data block, table space, extent, segment
A. table space, segment, extent, data block
B. data block, segment, extent, table space
C. Segment, extent, data block, table space
D. data block, extent, segment, table space
E. None of these
3. Where are cookies stored?
A. On the server
B. In web.xml
C. On the client
D. In HTML
E. None of these
4. How is power supplied to a low-power USB device?
A. Through a power cable
B. From an external power supply
C. Directly from the computer's power supply
D. Through the USB cable
E. None of these
5. When you are selecting a mouse for a particular computer system, what is the most important consideration?
A. The type of drivers that come with the mouse
B. The length of the mouse cord
C. The type of connector the mouse is equipped with
D. The number of buttons the mouse has
E. None of these
6. Programme that automatically submit your search request to several search engines simultaneously are called..................
A. Metasearch engines
B. Webcrawlers
C. Spiders
D. Hits
E. None of these
7. You are planning on using a single network that support 208 users. Which IP address class would you choose to be the most effect?
A. Class A
B. Class B
C. Class C
D. Class D
E. Class E
8. Which of the following options is not a JSP implicit object?
A. Out
B. In
C. Response
D. Page
E. None of these
9. In Oracle, which statement is true about segments?
A. Each table has its own segment
B. A segment is created every time an extent is created, extended, or altered
C. An index segment is created every time a table is created
D. A segment is deleted whenever a table is truncated
E. None of these
10. All of the following are basic principles of networks, except ...............
A. each computer must have a network card
B. there must be communications media connecting the network hardware devices
C. there must be at least one connecting device
D. each computer must have software that supports the movement of information
E. None of these
11. Which of the following could be a legitimate Media Access Control address?
A. 192.168.254.3
B. 3FA2.4756.F9A3
C. A5514
D. C1.3A.77.5B
E. None of these
12. The term, hypertext means .................
A. Non-sequential writing
B. Hypermedia
C. Blinking text
D. Text with heavy formatting
E. None of these
13. You receive an e-mail message that forms you that a terrible virus has been unleashed on the Internet and that you should warn all the people in your Address Book. Which of the following have you most likely encountered?
A. A virus hoax
B. A filter
C. A spam
D. A virus
E. A worm
14. If 20 people need to communicate using symmetric-key cryptography, .................symmetric keys are needed
A. 190
B. 200
C. 20
D. 19
E. 210
15. What should you do as soon as you have successfully created the data base and the data dictionary?
A. Open the data base for users to start adding data
B. Start adding a bunch of table space to allow users to use
C. Leave it running for a few days to make sure that nothing bad is going to happen
D. Shut it down and take a cold back up
E. None of these
16. Which of the following is the default mask of a class A IP address?
A. 255.0.0.255
B. 255.255.0.0
C. 255.0.0.0
D. 255.255.255.0
E. None of these
17. What is Internet 2?
A. A new type of cabling system for Wide Area Networks
B. A second local area network that can connect with another online LAN to share access
C. A new standard for Internet browsers
D. An association to develop advanced Internet technology
E. None of these
18. Which of the following objects is passed to a Java Bean when one of its properties is set via at JSP action?
A. Servlet Request
B. Http Servlet Request
C. Servlet Response
D. Http Servlet Response
E. None of these
19. If you wanted to locate the hardware address to a local device, which protocol would you use?
A. ARP
B. RARP
C. ICMP
D. PING
E. PONG
20. In oracle, which table space is the minimum required when creating a new data base?
A. Undo table space
B. Temporary table space
C. System table space
D. Users table space
E. None of these
21. Data space red sign is not terribly difficult if the .........................
A. data base is structured
B. data base is well- designed
C. data space has no data
D. data base is relatively small
E. data base is relatively large
22. Which of the following are normally used to initialize a computer system's hard ware?
A. Bootstrap memory
B. Volatile memory
C. External mass memory
D. Static memory
E. Random access memory
23. Which of the following is not true about two-tier client-server data base architecture?
A. SQL statements are processed on the server
B. SQL statements may be processed on some of the clients
C. Business logic is mostly processed on clients
D. Business logic may be processed on the server
E. None of these
24. The process by which the structure of the data base is modified to eliminate hidden dependencies and repeating groups is .............
A. enforcing data integrity
B. enforcing referential integrity
C. indexing
D. normalization
E. None of these
25. Which of the following functions is not performed by TCP?
A. Flow control
B. Sequencing
C. Error checking
D. Sub netting
E. None of these
26. In oracle, who owns the data dictionary?
A. Oracle
B. SYS
C. The DBA
D. SYSTEM
E. None of these
27. The reason the data outputs of most ROM ICs are tri-state outputs is to .........
A. allow for three separate data input lines
B. allow the bi-directional flow of data between the bus lines and the ROM registers
C. permit the connection of many ROM chips to a common data bus
D. isolate the registers from the data bus during read operations
E. None of these
28. To drop a column that is used as a foreign key, first......................
A. drop the primary key
B. drop the table
C. drop the foreign key constraint
D. All of these
E. None of these
29. In the straight CGI approach to data-base connectivity on the Internet.....................
A. the external program is located between the client and the web server
B. the external program is located between the data base server and the data base
C. the external program is located between the web server and the data base server
D. there is no external program
30. What is the name of protocol used to eliminate loops?
A. Switching
B. ISL
C. Frame Tagging
D. Spanning Tree Protocol
E. Scanning
31. The effect of the ROLLBACK command in a transaction is the following.............................
A. undo all changes to the data base resulting from the execution of the transaction
B. undo the effects of the last UPDATE command
C. restore the content of the data base to its state at the end of the previous day
D. make sure that all changes to the data base are in effect
E. None of these
32. In Oracle, what is the default number of transactions that MAXTRANS is set to if not specified?
A. 512
B. 10
C. 40
D. 1
E. 255
33. To which pin on the RAM chip does the address decoder connect in order to signal which memory chip is being accessed?
A. The address input
B. The output enable
C. The chip enable
D. The data input
E. The data output
34. Which of the following switching methods provides the greatest frame through out?
A. Store-and-forward switching
B. Frame-tag switching
C. Cut-through switching
D. ISL switching
E. Store-and-backward switching
35. Which kind of lock includes a keypad that can be used to control access into areas?
A. Cipher
B. Warded
C. Device
D. Tumbler.
E. Typelock
36. A gateway is .............................
A. a device that enables users to send information simultaneously over a network without slowing down transmission
B. an electronic device that connects several computing devices to a network
C. a point in one network that is an entrance point to another network
D. a device that links two or more segments of a network and helps direct traffic
E. None of these
37. Which of the following is considered a vulnerability of SNMP?
A. Clear text community strings
B. Its use of TCP
C. The fact that it is on by default in Windows 2000 server
D. The fact that it is on by default in Windows XP Professional
E. None of these
38. Network routing information distributed among routers is stored in which of the following?
A. Flash memory
B. Route table
C. Metric table
D. NVRAM
E. Router memory
39. If the destination did not receive a segment, how will the TCP host know to resend the information?
A. The ACK received will not include the segment number that was not received
B. The ACK received will include the segment number that was not received
C. The sending host will send a PACK to verify segment receipt
D. The destination host will send a YACK message back to the sending host
E. None of these
40. What are the effects of mixing RAM modules with different speed ratings?
A. The system runs at the speed of the slowest RAM stick
B. The system runs normally
C. The system runs at the speed of the memory bus
D. The system may not run, or it crashes periodically
E. None of these
41. What kind of scheme is the HTTP protocol?
A. Get/ put
B. Store/ forward
C. Queuing
D. Search/ return
E. Request/ response'
42. What type of error does a memory parity error create?
A. A fatal exception error
B. An NMI error
C. A corrupt windows operating system file
D. A GPF error
E. A GPA error
43. Which is not a part of the Oracle data base base block?
A. Header
B. Row directory
C. Data
D. Freelists
E. None of these
44. Which of the following cannot be used as the scope when using a Java Bean with JSP?
A. Page
B. Request
C. Session
D. Application
E. Response
45. Which of the following is used for integrity?
A. DES
B. Diffie-Hellman
C. SED
D. AES
E. MD5
46. What is ISL used for?
A. To allow an Ethernet interface to understand frame tags
B. To make two Ethernet interfaces appear as one
C. To connect an Ethernet switch with a high-speed core switch such as ATM
D. To allow simultaneous routing and switching
E. None of these
47. Which of the following describes programs that can run independently, travel from system and disrupt computer communications?
A. Trojans
B. Viruses
C. Idlers
D. Droppers
E. Worms
48. You need to configure a switch from a remote subnet. Which of the following must be configured on the switch?
A. Console port
B. IP
C. Hostname
D. SNMP
E. Default gateway
49. In Oracle, which is more appropriate to store a small list of values in a single column in each row in your address table?
A. ORACARRAY
B. Nested table
C. Index organised table
D. Index
E. VARRAY
50. While searching a website, you have been unable to find information that was on the site several months ago. What might you do to attempt to locate that information?
A. Visit Google's cached page to view the older copy
B. Forget about it, as there is no way to find this information
C. Visit a partner site of the organisation to see if it is there
D. Use the way back machine
E. None of these
____________________________________________________________________________________________________
Read articles, Questions and answers, Multiple choice questions, GATE Previous years questions papers with answer key, UGC-NET Old question papers with answer key about Computer Science and Information Technology
Sunday, August 09, 2009
Wednesday, August 05, 2009
Software Engineering
1. Software Engineering primarily aims on
a. Reliable software
b. Cost effective software
c. Reliable and cost effective software
d. Non of the above
2. A good specification should be
a. Unambiguous
b. Distinctly specific
c. Functional
d. None of the above
3. Which of the following is a tool in design phase?
a. Abstraction
b. Refinement
c. Information hiding
d. None of the above
4. In object oriented design of software, which of the following is not true?
a. Objects inherit the properties of the class
b. Classes are defined based on the attributes of objects
c. An object can belong to two classes
d. Classes are always different
5. Information hiding is to hide from user, details
a. That are relevant to him
b. That are irrelevant to him
c. That may be maliciously handled by him
d. That are confidential
6. Design phase includes
a. Data, architectural and procedural designs only
b. Architectural, procedural and interface designs only
c. Data, architectural and interface designs only
d. Data, architectural, interface and procedural designs
7. Data structure suitable for the application is discussed in
a. Data design
b. Architectural design
c. Procedural design
d. Interface design
8. Design phase will usually be
a. Top-down
b. Bottom-up
c. Random
d. Centre fringing
9. Assertions are conditions which are true at the point of execution
a. Always
b. Sometimes
c. Many times
d. No time
10. Assuming the existence of a start and end nodes for a program graph (PG), the total number of paths is equivalent to ________________ set of test data required to test software.
a. Minimum
b. Maximum
c. Optimum
d. Supremum
11. In a program graph (PG), if X is a if-then-else node and the number of paths from if part to end node is y and for else part is Z with the number of paths from strat node to end node is x, the total number of paths through X is
a. xy+z
b. xz+y
c. x+y+z
d. x(y+z)
12. If X is a case statement in a program graph (PG) with n cases instead of an if-then-else statement in the previous question with each case leading to only one path to end node, total number of paths through X is
a. x+n
b. x**n
c. x*log(n)
d. x*n
13. Structured programming codes include
a. Sequencing
b. Alteration
d. Multiple exit from loops
14. Which of the following is a desirable property of module?
a. Independency
b. Low cohesiveness
c. High coupling
d. Multifunctional
15. Which of the following types of maintenance takes the maximum chunk of the total maintenance effort in a typical commercial application environment?
a. Adaptive maintenance
b. Corrective maintenance
c. Preventive maintenance
d. Perfective maintenance
16. An important aspect in coding is
a. Readability
b. Productivity
c. To use as small memory space as possible
d. Brevity
17. One way to improve readability in coding is to
a. Avoid goto statement
b. Name variables and functions according to their use
c. Modularize the program
d. None of the above
18. The data flow model of an application mainly shows
a. The underlying data and the relationship among them
b. Processing requirements and he flow of the data
c. Decision and control information
d. Communication network structure
19. According to Brooks, if n is the number of programmers in a project team then the number of communication path is
a. n*(n-1)/2
b. n*log(n)
c. n
d. n*(n+1)/2
20. The extent to which the software can continue to operate correctly despite the introduction of invalid input is called as
a. Reliability
b. Robustness
c. Fault-tolerance
d. Portability
21. Which of the following statements is not true?
a. Content coupling in a module is desirable
b. Logical cohesion in a module is desirable
c. Stamp coupling is preferred over functional coupling
d. None of the above
22. Configuration management is not concerned with
a. Controlling changes to the source code
b. Choice of hardware configuration for an application
c. Controlling documentation changes
d. Maintaining versions of software
23. The railway reservation system currently operational in India can be classified as a
a. Batch processing system
b. Real-time system
c. Online system
d. Expert system
24. Data flow diagram, regular expression and transition table can be combined to provide __________________ for functional specification OS system software
a. Decision table
b. Finite state automata
c. Event table
d. None of the above
25. A program P calls two subprograms P1 and P2. P1 can fail 50% times and P2 40% times P can fail
a. 50%
b. 60%
c. 10%
d. 70%
26. Which of the following graph theoretic concept will be useful in software testing?
a. Cyclomatic number
b. Hamiltonian circuit
c. Eularian cycle
d. None of the above
27. In a decision table if there are 3 variables and 3 rules, implies
a. Specification may not be complete
b. Design could be faulty
c. Coding will be incorrect
d. All of the above
28. In unit testing of a module, it is found for a set of test data, at the maximum 90% of the code alone were tested with the probability of success 0.9. the reliability of the module is
a. Atleast greater than 0.9
b. Equal to 0.9
c. Atmost 0.81
d. Atleast 1/0.81
29. Which of the following testing methods is normally used as the acceptance test for a software system?
a. Regression testing
b. Integration testing
c. Unit testing
d. Functional testing
30. A computer program can often be a very satisfactory __________________ of a physical system such as road traffic conditions
a. Solution
b. Replacement
c. Stimulation
d. Model
31. On an average, the programmer months is given by 3.6*(KDSI)**1.2. If so, a project requiring one thousand source instruction will require
a. 3.6 PM
b. 0.36PM
c. 0.0036PM
d. 7.23PM
32. Considering a program graph(PG) with statement as vertices and control as edges, which of the following is not true for any program graph
a. PG is always acyclic
b. PG is always a directed graph
c. There won’t be any self loops
d. PG is always a connected graph
33. In object-oriented design of software, objects have
a. Attributes and name only
b. Operations and name only
c. Attributes, name and operations
d. None of the above
___________________________________________________________________________________________________
a. Reliable software
b. Cost effective software
c. Reliable and cost effective software
d. Non of the above
2. A good specification should be
a. Unambiguous
b. Distinctly specific
c. Functional
d. None of the above
3. Which of the following is a tool in design phase?
a. Abstraction
b. Refinement
c. Information hiding
d. None of the above
4. In object oriented design of software, which of the following is not true?
a. Objects inherit the properties of the class
b. Classes are defined based on the attributes of objects
c. An object can belong to two classes
d. Classes are always different
5. Information hiding is to hide from user, details
a. That are relevant to him
b. That are irrelevant to him
c. That may be maliciously handled by him
d. That are confidential
6. Design phase includes
a. Data, architectural and procedural designs only
b. Architectural, procedural and interface designs only
c. Data, architectural and interface designs only
d. Data, architectural, interface and procedural designs
7. Data structure suitable for the application is discussed in
a. Data design
b. Architectural design
c. Procedural design
d. Interface design
8. Design phase will usually be
a. Top-down
b. Bottom-up
c. Random
d. Centre fringing
9. Assertions are conditions which are true at the point of execution
a. Always
b. Sometimes
c. Many times
d. No time
10. Assuming the existence of a start and end nodes for a program graph (PG), the total number of paths is equivalent to ________________ set of test data required to test software.
a. Minimum
b. Maximum
c. Optimum
d. Supremum
11. In a program graph (PG), if X is a if-then-else node and the number of paths from if part to end node is y and for else part is Z with the number of paths from strat node to end node is x, the total number of paths through X is
a. xy+z
b. xz+y
c. x+y+z
d. x(y+z)
12. If X is a case statement in a program graph (PG) with n cases instead of an if-then-else statement in the previous question with each case leading to only one path to end node, total number of paths through X is
a. x+n
b. x**n
c. x*log(n)
d. x*n
13. Structured programming codes include
a. Sequencing
b. Alteration
d. Multiple exit from loops
14. Which of the following is a desirable property of module?
a. Independency
b. Low cohesiveness
c. High coupling
d. Multifunctional
15. Which of the following types of maintenance takes the maximum chunk of the total maintenance effort in a typical commercial application environment?
a. Adaptive maintenance
b. Corrective maintenance
c. Preventive maintenance
d. Perfective maintenance
16. An important aspect in coding is
a. Readability
b. Productivity
c. To use as small memory space as possible
d. Brevity
17. One way to improve readability in coding is to
a. Avoid goto statement
b. Name variables and functions according to their use
c. Modularize the program
d. None of the above
18. The data flow model of an application mainly shows
a. The underlying data and the relationship among them
b. Processing requirements and he flow of the data
c. Decision and control information
d. Communication network structure
19. According to Brooks, if n is the number of programmers in a project team then the number of communication path is
a. n*(n-1)/2
b. n*log(n)
c. n
d. n*(n+1)/2
20. The extent to which the software can continue to operate correctly despite the introduction of invalid input is called as
a. Reliability
b. Robustness
c. Fault-tolerance
d. Portability
21. Which of the following statements is not true?
a. Content coupling in a module is desirable
b. Logical cohesion in a module is desirable
c. Stamp coupling is preferred over functional coupling
d. None of the above
22. Configuration management is not concerned with
a. Controlling changes to the source code
b. Choice of hardware configuration for an application
c. Controlling documentation changes
d. Maintaining versions of software
23. The railway reservation system currently operational in India can be classified as a
a. Batch processing system
b. Real-time system
c. Online system
d. Expert system
24. Data flow diagram, regular expression and transition table can be combined to provide __________________ for functional specification OS system software
a. Decision table
b. Finite state automata
c. Event table
d. None of the above
25. A program P calls two subprograms P1 and P2. P1 can fail 50% times and P2 40% times P can fail
a. 50%
b. 60%
c. 10%
d. 70%
26. Which of the following graph theoretic concept will be useful in software testing?
a. Cyclomatic number
b. Hamiltonian circuit
c. Eularian cycle
d. None of the above
27. In a decision table if there are 3 variables and 3 rules, implies
a. Specification may not be complete
b. Design could be faulty
c. Coding will be incorrect
d. All of the above
28. In unit testing of a module, it is found for a set of test data, at the maximum 90% of the code alone were tested with the probability of success 0.9. the reliability of the module is
a. Atleast greater than 0.9
b. Equal to 0.9
c. Atmost 0.81
d. Atleast 1/0.81
29. Which of the following testing methods is normally used as the acceptance test for a software system?
a. Regression testing
b. Integration testing
c. Unit testing
d. Functional testing
30. A computer program can often be a very satisfactory __________________ of a physical system such as road traffic conditions
a. Solution
b. Replacement
c. Stimulation
d. Model
31. On an average, the programmer months is given by 3.6*(KDSI)**1.2. If so, a project requiring one thousand source instruction will require
a. 3.6 PM
b. 0.36PM
c. 0.0036PM
d. 7.23PM
32. Considering a program graph(PG) with statement as vertices and control as edges, which of the following is not true for any program graph
a. PG is always acyclic
b. PG is always a directed graph
c. There won’t be any self loops
d. PG is always a connected graph
33. In object-oriented design of software, objects have
a. Attributes and name only
b. Operations and name only
c. Attributes, name and operations
d. None of the above
___________________________________________________________________________________________________
Subscribe to:
Posts (Atom)