Tuesday, May 28, 2019

Expected Questions Series 5

1) What is 5NF?
a. The database should be in 3NF and all tables can have only one primary key.
b. There should be no cyclic dependencies in a composite key.
c. All attributes within the entity should depend solely on the entity's unique identifier.
d. Tables cannot have multi - valued dependencies on a Primary Key.

2) Which of the following is used to define the schema of each database hosted in the DBMS?
a. ER diagram
b. UML
c. Database model 
d. Both b and c above

3) Consider a uniprocessor computer system that has 2 processes and both of them alternate 10ms CPU bursts with 90ms I / O bursts. Both the processes were created at nearly the same time and can proceed in parallel. What is the scheduling strategy for this system that will result in the least CPU utilization (over a long period of time)?
a. Round Robin scheduling with a time quantum of 5ms 
b. First Come First Served scheduling
c. Shortest remaining time first
d. Static priority scheduling with different priorities for the two processes

4) Which of the following statements is not valid for deadlock prevention scheme?
a. Number the resources uniquely and never request a lower numbered resource than the last one requested.
b. Request and all required resources be allocated before execution.
c. Release all resources before requesting a new resource.
d. Never request a resource after releasing any resource.

5) How many HTML colors are supported by all the browsers?
a. 100
b. 140 
c. 50
d. 90

6) If every node ' u ' in ' G ' is adjacent to every other node ' v ' in ' G ', A graph is said to be ___________.
a. isolated
b. complete 
c. finite
d. strongly connected

7) You have to sort a list L consisting of a sorted list, followed by a few “ random ” elements. Which of the following sorting methods would be especially suitable for such a task?
a. Bubble sort 
b. Selection sort
c. Quick sort 
d. Insertion sort 

Answers
1) b
2) c
3) a
4) d
5) b
6) b
7) d

Monday, May 27, 2019

Expected Questions Series 4

1) What can we call an Ethernet frame that is less than the IEEE 802.3's minimum length of 64 octets? (Networking)
a. Short Frame
b. Mini Frame
c. Runt frame
d. None of the Above

2) Where can we use Internet Packet Exchanger (IPX) / Sequence Package Exchanger (SPX)?
a. Xerox Network Systems
b. Netware Core Protocol
c. NetBIOS
d. Novell's Netware Network 

3)  In a connection between Client and Server, which protocol can send multiple objects over a TCP / IP?
a. Non - Persistent HTTP
b. Persistent HTTP
c. All of the Above
d. None of the Above

4) What is an audit trial? (Database)
a. Used for making backup copies
b. The recorded history of operations performed on a file 
c. Used for retrieving the lost information 
d. All of the above

5)  Issuing which type of savepoint will cause the named savepoint to be discarded? (Database)
a. TRUNCATE SAVEPOINT
b. DELETE SAVEPOINT
c. DISCARD SAVEPOINT
d. RELEASE SAVEPOINT

6) Which type of lock does a record or page get locked immediately? 
a. Pessimistic locking
b. Optimistic locking
c. Both A & B
d. None of the above

7) What is durability?
a. When an update occurs to a database, either all or none of the update becomes available to anyone
b. The transactions have been committed and will survive permanently
c. It determines how the transaction integrity will be visible to the other users and systems
d. All of the above 

8) R Tree’s are typically used in which way that are differing from B Tree's?
a. Spatial access methods
b. Vectors
c. Both A and B 
d. FAT

9) Which of the following is / are the Applications of B Tree’s?
a. Databases
b. File Systems
c. Both A and B 
d. Memory

10) From where the insertion starts with a B tree?
a. Root node
b. Any node
c. Could be A or B
d. Leaf node 

11)A graph with n vertices will definitely have a parallel edge or a self loop if the total number of edges is  ____________.
a. greater than n –1 
b. less than n ( n – 1 )
c. greater than n ( n – 1 ) / 2 
d. less than n2 / 2

12) Abbreviate RWD. (HTML)
a. Real World Data
b. Relay Wave Diagram
c. Responsive Web Design 
d. Rewind

13)  If hardware does not support _________ then a multi - user and multi - processing operating system cannot be implemented.
a. At least two modes of CPU execution 
b. Demand paging
c. DMA for disk transfer
d. Address translation

Answers:
1) c
2) d
3) b
4) b
5) d
6) a
7) a
8) c
9) c
10) d
11) c
12) c
13) b

Saturday, May 25, 2019

Expected Questions Series 3

1) Which type of clustering index is defined on the fields?
a. Non-key and non-ordering
b. Non-key and ordering
c. Key and non-ordering
d. Key and Ordering

2) What type of relationship does a hierarchical schema help to establish between the items of a database?
a. top-to-bottom relationship 
b. bottom-to-top relationship
c. one-to-many relationship
d. many-to-one

3) What is truncating a table?
a. Data alone deleted, Performs an automatic commit 
b. Data alone deleted, Doesn’t perform automatic commit
c. Table structure + Data are deleted
d. Table structure alone deleted, Performs an automatic commit

4) Which attributes can the screen readers read? (HTML)
a. ctrl
b. alt 
c. both A & B
d. None of the above

5) Consider a counting semaphore which was initialized to 10 and then 6P (wait) operations and 4v(signal) operations were completed on this semaphore. What is the resulting value of semaphore?
a. 10
b. 9
c. 8
d. 0

6) Why is the Software interrupt required by the processor?
a. Return from subroutine.
b. Obtain system services, which need execution of privileged instruction. 
c. Test the interrupt system of the processor.
d. Implement co-routines.

Answers:
1) b
2) a
3) a
4) b
5) c
6) b

Expected Questions Series 2

1) Which one of the following statements is / are true about SQL?
a. SQL permits attribute names to be repeated in the same relation
b. If there are no indexes on the relations then an SQL query will not work
c. Duplicates are automatically eliminated by an SQL query
d. None of the above 

2) What is the maximum possible size of the file in the index allocation scheme of blocks to a file depend on? (Database)
a. The size of the blocks and the size of the address of the blocks
b. The number of blocks used for the index, the size of the blocks and the size of the address of the blocks
c. The number of blocks used for the index and the size of the blocks 
d. None of the above

3)What is the pecularity of Red - black Trees?
a. In red-black trees, the root do not contain data.
b. In red-black trees, the leaf nodes are not relevant and do not contain data. 
c. In red-black trees, the leaf nodes are relevant but do not contain data.
d. Both a and c above

4) ________ is a tree where each parent node have only one associated child node. 
a. Balanced Binary Tree
b. Rooted Complete Binary Tree
c. Complete Binary Tree
d. Degenerate Tree

5)  Which of the following is a declaration for an HTML document? 
a. <!DOCTYPE html>
b. <html>.....</html>
c. <body>.....</body>
d. <p>.....</p>

6)  Which of the following statement is / are not  true about normal forms? (Database)
a. Any relation with two attributes is in BCNF
b. BCNF is stricter than 3NF
c. Lossless, dependency - preserving decomposition into 3NF is always possible
d. Lossless, dependency - preserving decomposition into BCNF is always possible

Answers:

1) d
2) c
3) b
4) d
5) a
6) d

Friday, May 24, 2019

Expected Questions Series 1

1) Database: Which is the make given to the database management system which is able to handle full text data, image data, audio and video?
a. full media
b. graphics media
c. multimedia
d. hypertext

2) Java: In which the JDBC type represents a "single precision" floating point number that supports seven digits of mantissa?
a. REAL
b. DOUBLE
c. FLOAT
d. INTEGER

3) Java: Generic pointers can be declared with__________
a. auto 
b. void 
c. asm 
d. None of these

4) C++: During a class inheritance in CPP, if the visibility mode or mode of derivation is not provided, then by default visibility mode is___________.
a. public 
b. protected 
c. private 
d. friend

5)  Software Engineering: Which model gives the overall reliability of the system that is projected and certified?
a. Sampling model
b. Component model
c. Certification model
d. Both A & B

6)  Software Engineering: What can static analysis NOT find? 
a. the use of a variable before it has been defined
b. unreachable (“dead”) code
c. memory leaks
d. array bound violations

Answers:
1) c
2) a
3) b
4) c
5) c
6) c

Wednesday, May 22, 2019

Most Frequently asked questions series 10

1)  Which is true about a method-local inner class? (Java)
a. It must be marked final.
b. It can be marked abstract.
c. It can be marked public.
d. It can be marked static.

2) Which constructs an anonymous inner class instance? (Java)
a. Runnable r = new Runnable() { };
b. Runnable r = new Runnable(public void run() { });
c. Runnable r = new Runnable { public void run(){}};
d. System.out.println(new Runnable() {public void run() { }})

3)  Which of the following allows the programmer to destroy an object x? (Java)
a. x.delete()
b. x.finalize()
c. Runtime.getRuntime().gc()
d. Only the garbage collection system can destroy an object.

4) Which of the following statements are correct? (Java)
a. If multiple listeners are added to a component only events for the last listener added will be processed
b. If multiple listeners are added to a component the events will be processed for all but with no guarantee in the order
c. Adding multiple listeners to a comnponent will cause a compile time error
d. You can not remove or add listeners to a component.

5) Which of the following methods are members of the Vector class and allow you to input a new element? (Java)
a. addElement
b. insert
c. append
d. addItem

6)  What is the default return-type of getchar()? (C programming)
a. char
b. int
c. char *
d. Reading character doesn't require a return-type

7) The Bedrock that supports software Engineering in layered technology.
a. Methods
b. Tools
c. Process
d. Quality Focus

Answers:
1) b
2) d
3) d
4) b
5) a
6) b
7) d

Friday, May 17, 2019

Most Frequently asked questions series 9

1) Which model depicts the profile of the end users of a computer system. (Software Engineering)
a. Spiral model
b. Iterative model
c. Waterfall model
d. User model

2) How many types of Prototype models are there? (Software Engineering)
a. 2
b. 3
c. 5
d. 4

3) Fanin in an OO context indicates. (Software Engineering)
a. Objects
b. Inheritance
c. Messages
d. Polymorphism

4) How many address lines are needed to address each memory location in a 2048 x 4 memory chip? (Networking)
a. 10 
b. 11
c. 8
d. 12

5)  Which one of the following statement is true for a layer-4 firewall which is a device that can look at all protocol headers up to the transport layer? (Networking)
a. It cannot block TCP traffic from a specific user on a multiple-user system during 9.00pm and 5.00pm
b. It cannot stop incoming traffic from a specific IP address but allow outgoing traffic to the same IP address.
c. It cannot block entire HTTP traffic during 9.00 pm and 5.00pm
d. It cannot block all ICMP traffic.

6) C programming:  What function should be used to free the memory allocated by calloc() ?
a. dealloc();
b. malloc(variable_name, 0)
c. free();
d. memalloc(variable_name, 0) 

7) A transparent DBMS? (Database)
a. Can not hide sensitive information from users
b. Keep its logical structure hidden from users
c. Keeps its physical structure hidden from users
d. Both B and C

8) An unnormalized relation contains values ? 
a. Atomic
b. Non - Atomic
c. Classified
d. None of these

9) Primitive operations common to all record management system include ? (Database)
a. Print
b. Sort
c. Look up
d. All of above

Answers

1) d
2) d
3) b
4) b
5) c
6) c
7) c
8) c
9) c