1.
em
y
IT Questions
DOS floppy disk does not have ________
1) a boot record
2) a file allocation table
4) virtual memory
5) None of the above
3) a root directory
2.
The ________ component is used by the data analyst to create queries that access the database.
1) data store
2) query and reporting
3) ETL tools
4) data visualisation
5) None of these
3.
The altering of data so that it is not usable unless the changes are undone is ________
1) Ergonomics
2) Biometrics
3) Compression
4) Encryption
5) None of these
Which of the following is a general-purpose programming language designed by Sun Microsystems and well suited for
use on the web?
1) Java
2) Java Script
3) CSS
4) VBS Script
5) None of these
5.
ad
4.
4) Plug-ins
5) None of These
Programs that automatically submit your search request to several search engines simultaneously are called ________
1) Hits
2) Webcrawlers
3) Spiders
4) Metasearch engines 5) None of these
7.
If you wanted to locate the hardware address of a local device, which protocol would you use?
1) PING
2) ICMP
3) ARP
4) RARP
5) PONG
8.
In Oracle, which is more appropriate to store a small list of values in a single column in each row in your address table?
1) Index
2) Nested table
3) Oracarray
4) Varray
5) Index
9.
OLAP applications are widely used by ________ and it uses ________ scheme.
1) RDBMS, Bus
2) Java, Bus
3) Operating System, Star
4) Data mining techniques, star or multidimensional
5) None of these
10.
11.
Ac
6.
2) RDBMS
5) C language
4) COMMIT
5) None of these
13.
The mechanism by which the data and functions are bound together within an object definition is called ________
1) Abstraction
2) Polymorphism
3) Inheritance
4) Encaspsulation
5) None of these
14.
The TRAP is one of the interrupts available in INTEL 8085.Which of the following statements is true of TRAP?
1) It is negative edge-triggered.
2) It is positive edge-triggered.
3) It is both edge-triggered and level-triggered.
4) It is level-triggered.
5) None of these
15.
The ________ data mining technique derives rules from real-world case examples.
1) Waterfall Model
2) Spiral Model
3) Prototyping Model 4) Incremental Model
BS
12.
16.
IT Quesetions
5) None of these
BSC Academy
Which of the following is not a context-free grammar component?
1) Terminal symbols
2) Non-terminal symbol
4) List
5) None of these
3) Productions
em
y
17.
19.
________ allows a DFD (Data Flow Diagram) with transform flow characteristics to be mapped into a predefined
template for program structure.
1) Transaction flow 2) Contributor
3) Transform mapping 4) Design evaluation 5) None of these
20.
A combinational logic circuit which is used to send data coming from a single source to two or more separate destinations
is called
1) Decoder
2) Encoder
3) Multiplexer
4) Demultiplexer
5) None of these
21.
22.
4) NAND
5) None of these
ad
18.
3) EX OR
4) 101000.0011
5) None of these
4) All of these
5) None of these
24.
25.
Ac
23.
RSA algorithm
1) supports encryption and digital signature
3) encrypts the checksum
5) None of these
A special type gateway that can keep external users from accessing resources on the LAN users access the external info
is called
1) Repeater
2) Firewall
3) Encryption
4) Hub
5) None of these
27.
What is the name given to the exchange of control signals which is necessary for establishing a connection between a
modem and a computer at one end of a line and another modem and computer at the other end?
1) Handshaking
2) Modem Options
3) Protocol
4) All of these
5) None of these
28.
4) APPEND
5) None of these
5) None of these
5) None of these
5) None of these
BS
29.
26.
30.
31.
32.
33.
An indexing operation
1) Sorts a file using a single key
4) Both 1 and 3
2) Privacy invasion
5) None of these
IT Quesetions
BSC Academy
The language used in application programs to request data from the DBMS is referred to as the
1) DML
2) DDL
3) Query Language
4) DCL
5) None of these
35.
A________ contains the smallest unit of meaningful data, so you might call it the basic building block for a data file.
1) File Structures
2) Records
3) Fields
4) Data base
5) None of these
36.
A ________ means that one record in a particular record type is related to only one record of another record type.
1) One-to-one relationship
2) One-to-many relationship
3) Many-to-one relationship
4) Many-to-many relationship
5) None of these
37.
38.
em
y
34.
3) Queue
4) All of these
5) None of these
3) Stack
Most database management systems allow you to have more than one key so that you can sort records in different ways.
One of the keys is designated the ________ and must hold a unique value for each record.
1) Unique Key
2) Prime attribute
3) Index key
4) Primary Key
5) Null key
40.
________ is primarily used for mapping host names and email destinations to IP address but can also be used for other
purposes
1) TCP (Transfer Control Protocol)
2) DNS (Domain Name System)
3) SHA (Secure Hash Algorithm)
4) Simple Network Management Protocol (SNMP)
5) None of these
41.
Override is a method
1) For an operation that replaces an inherited method for the same operation
2) For a data that replaces an inherited method for the same operation
3) For an operation that takes arguments from library function
4) All of these
5) None of these
42.
Local variables
1) Are created outside a block
3) Continue to exist when their block ends
5) None of these
44.
Ac
Which of the following TCP/IP protocol is used for remote terminal connection service?
1) Telnet
2) RARP
3) FTP
4) All the above
5) None of these
5) Incremental model
BS
45.
43.
ad
39.
4) Prototyping model
46.
Data mining evolved as a mechanism to cater to the limitations of ________ systems to deal massive data sets with high
dimensionality, new data type, multiple heterogeneous data resource etc.
1) OLTP
2) OLAP
3) DSS
4) DWH
5) None of these
47.
48.
49.
3) Data structure
IT Quesetions
4) An entity
5) None of these
4) Insertion sort
5) None of these
BSC Academy
52.
53.
54.
55.
5) None of these
Information is
1) Data
5) All of These
2) Processed data
em
y
51.
Which layer of OSI determines the interface of the system with the user?
1) Network
2) Application
3) Data link
4) Session
3) Manipulated input
4) Computer output
2) Massive
5) All of These
3) Top managers
3) Processed correctly
4) All workers
ad
50.
5) Only 1 and 2
57.
________ refers to the contracting of a specific business task to a third party service provider.
1) Insourcing
2) Outsourcing
3) Offshore Outsourcing
4) Cross-Functioning
5) Business Process Outsourcing
58.
59.
60.
BS
Ac
56.
61.
62.
63.
64.
4) Only C and D
5) Only B and D
3) Summarised
4) Irrelevant
5) Only 1 and 2
Operational information is
1) Haphazard
2) Well organized
3) Unstructured
4) Partly structured
5) Only 1 and 2
The quality of information which does not hide any unpleasant information is known as
1) Complete
2) Trustworthy
3) Relevant
4) None of the above
IT Quesetions
BSC Academy
68.
69.
70.
71.
75.
3) Only B and D
4) Only C and D
5) Only A and D
4) Only A, B and C
5) Only A and D
BS
74.
5) None Of These
em
y
67.
4) CD- ROM
ad
66.
Ac
65.
IT Quesetions
BSC Academy
Which of the following IEEE standards deal(s) with LAN and MAN (metropolitan area network)?
1) 801
2) 803
3) 802
4) 800
5) Only 1 and 2
77.
81.
82.
83.
84.
85.
86.
87.
88.
89.
90.
5) Only 1 and 2
4) Diskette
5) Only 1 and 2
4) Parallel adder
3) crossword
4) modem
5) Only 1 and 2
3) Flowchart
4) Output
5) All of These
4) SIGN OUT
4) 256
5) None of these
Which scheme is used for mapping host names and email destinations to IP addresses?
1) DNS
2) TCP/IP
3) TELENET
4) RARP
5) None of These
4) Bootstrap
The linker produces a ________ which contains binary codes for all compound modules.
1) Bit file
2) Load file
3) Link file
4) Object Program
92.
93.
94.
5) None of these
5) None of These
In C++ we can use the same function name to create functions that perform a variety of different tasks.This is known
as
1) Inheritance
2) Global function
3) Function overloading
4) Only 1 and 2
5) All of the above
BS
91.
4) pen
ad
80.
Ac
79.
3) virus attacks
78.
2) fire attacks
5) Only 1 and 2
em
y
76.
3) Tannenbaum
4) Milan Melkovinec
5) None of These
If the disk head is located initially at 32, find the number of disk moves required with FCFS if the disk queue of I/O blocks
requests are 98, 37, 14, 124, 65, 67.
1) 324
2) 321
3) 310
4) 315
5) 320
IT Quesetions
BSC Academy
The action of parsing the source program into proper syntactic classes is known as
1) Lexical analysis
2) Syntax Analysis
3) General Syntax Analysis
4) Interpretation Analysis
5) None of the above
96.
97.
em
y
95.
4) Assembler
5) None of These
4) C++
5) None of these
98.
In the UNIX systems the user can change the access rights of the file to different users by using
1) Tail
2) PID
3) Chmod
4) Head
5) None of These
99.
4) sliding packet
5) None of these
5) None of these
ad
102. The IEEE 802.6 standard describes a ________ standard called Distributed Queue Dual Bus (DQDB).
1) WAN
2) MAN
3) LAN
4) Internet
5) None of the above
3) Blank List
4) Both 1 and 2
3) 10Base-T
4) 10Base-F
5) None of these
Ac
2) Numeric Data
5) None of these
4) Tree
5) None Of These
4) Only 1 and 2
108. Which of the following operators in C does not associate from the right?
1) ,
2) =
3) +
4) ++
109. Which language has recently become the de facto standard for interfacing application programs with relational database
system?
1) SQL
2) Oracle
3) 4 GL
4) Database
5) None of the above
110. Sockets are used in
1) Data link Layer
2) Physical Layer
3) Transport Layer
4) Network Layer
BS
112. In which manner should we traverse a binary search tree so that elements are visited in ascending order?
1) Preorder
2) Inorder
3) Postorder
4) Graph
5) None of These
113. 253.45.67.9 is a class ________ address.
1) D
2) A
114. Semantic errors can be detected
1) At compile time only
3) At run time only
5) None of these
3) E
4) C
5) None of These
IT Quesetions
BSC Academy
em
y
115. Which of the following communication modes supports two-way traffic but in only one direction at a time?
1) Duplex
2) Simplex
3) Three- Quarters Duplex
4) Half-Duplex
5) All of the above
116. In a PC-to-telephone hookup for long-distance communication, modem is connected between the telephone line and
1) Synchronous Port
2) PC
3) Cross-Over Cable
4) Asynchronous Port
5) None of These
117. In compilers, syntax analysis is done by
1) Scanner
2) Parser
3) Code generator
4) Lexical analyser
5) None of these
4) Rear
5) None of These
ad
120. If a memory page containing a heavily used variable that was initialised very early and is in constant use is removed, then
the page replacement algorithm used is
1) FIFO
2) LFU
3) LRU
4) All of These
5) None of These
121. When you connect to an online information service you are asked to provide some kind of identification such as your
name, an account number and a password.
What is the name given to this brief dialogue between you and information
system?
1) Security Procedure
2) Log-on Procedure
3) Safeguard Procedure
4) Identification Procedure
5) None of These
Ac
122. Which of these determines authorised sign in an EDI (Electronic Data Interchange) transaction?
1) Masking
2) Spoofing
3) Digital Signature
4) Privacy Key Cryptosystems
5) None of these
123. C is a ________- generation language.
1) 3rd
2) 4th
3) 5th
124. Which of the following usually creates bad sector on hard disk?
1) Trojan
2) Worm
3) Stealth Virus
4) 2nd
5) None of These
4) All of these
5) None of these
125. When an organisation gives contract for development of software, it has to give data to the service provider. In such
cases, the ownership of data should be
1) Shared by both parties
2) Transferred to the service provider
3) With the client organisation that outsources service
4) Not transferred
5) None of These
126. ________ cant be used for source of data automation.
1) OCR
2) UPC
3) POS Terminal
4) Keyboard
5) None of these
BS
3) Acts as manager
IT Quesetions
BSC Academy
2) 8086s supplementary IC
5) None of the above
3) Unwanted
3) Aftereffects of virus
4) Same type of
2) Special System
5) None of These
5) All of these
em
y
130. Which segment identifies the kind of business documents in an EDI transmission?
1) ISA
2) GS
3) ST
4) SE
5) None of These
3) Administrator Division
134. Which of the following identification techniques provides the best means of user authentication?
1) What the user knows
2) What the user is
3) What the user has
4) What is user has and what the user knows
5) None of These
135. The earliest approach that was used for software development was
1) Incremental development model 2) Waterfall model
4) Rapid prototyping model
5) None of These
ad
Ac
137. If the network of the company is to be protected from remote access that may damage companys reputation due to
misuse of information, then security policy should include
1) Only the employer
2) All the employees
3) Contractors
4) All the above
5) None of these
2) Part of Internet
4) Only 1 and 2
140. The process of organising the memory into two banks to allow 8- and 16-bit data operation is called?
1) Indexed mapping
2) Bank switching
3) Two-way memory interleaving
4) Memory segmentation
5) None of these
BS
142. The OSPF was created to overcome the drawbacks that ________ faced.
1) VLSM
2) IGRP
3) EIRP
4) RIP
143. FDDI is
1) Star Network
4) Bus-Based Network
2) Mesh Network
5) All of the above
3) Ring Network
IT Quesetions
5) None of These
4) 4
5) 9
BSC Academy
2) Lower power consumption and better noise margins
4) Higher power consumption with high fan-out
em
y
147. A loading scheme in which loading and linking of external references are postponed until execution time:
1) Dynamic loading
2) Direct linking loader
3) Relocating loader
4) Dynamic linking
5) None of These
148. Backtracking problem is seen in
1) LR Parser
4) None of these
2) Predictive Parser
5) All of the above
ad
149. Which of the following filename extension suggests that the file is a backup copy of another file?
1) BAK
2) TXT
3) BAS
4) COM
5) None of These
150. Connected graphs without circuits is called a
1) Hamiltonian graph
2) Euler graph
4) Tree
5) All of these are types of graph
3) Path
4) Clock replacement
4) 12 edges
5) 3 edges
4) DCL
5) None of these
Ac
3) DDL
154. What is the average waiting time (in minutes) in FCFS of a given process p1, p2, p3, p4 if the execution time are 5, 10, 8,
3 minutes and turnaround time are 5, 15, 23, 26 minutes?
1) 10
2) 10.75
3) 12.75
4) 12
5) 13
155. In an architecture of a database system external level is the
1) logical level
2) physical level
3) conceptual level
4) view level
5) None of these
5) None of these
5) None of these
BS
157. The statement in SQL which allows to change the definition of a table is
1) Alter
2) Create
3) Update
4) Select
3) tree search
4) linear Search
159. Maximum number of nodes in B-tree at depth h and order t (root of depth 0) is given by
1) t(h + 1)
2) 2t(h 1)
3) t(h 1)
4) 2t(h + 1)
5) None of these
160. Which of the following can be a sequence of nodes examined in a binary search tree while searching for key 98?
1) 100, 50, 75, 60, 98
2) 100, 120, 90, 95, 98
3) 200, 70, 100, 95, 98
4) 75, 150, 90, 80, 98
5) None of these
161. What protocol is used between e-mail servers?
1) SMTP
2) FTP
3) SNMP
10
IT Quesetions
4) TCP
5) None of these
BSC Academy
162. The way a card game player arranges his cards as he picks them up one by one, is an example of
1) Selection Sort
2) Bubble Sort
3) Insertion sort
4) Merge sort
5) None of these
em
y
4) Abstraction
5) Maintenance
166. If you want to tell the database management system that a specific attribute contained numbers only, what will you need
to set?
1) Data type
2) Data category
3) Data dictionary
4) Data definition
5) Data Integrity
ad
167. When you link one database table to another database table, what are you creating?
1) Connectivity
2) Primary Link
3) Relationships
4) Referential integrity 5) Foreign key
168. The process known as ________ is used by large retailers to study trends.
1) POS
2) Data selection
3) Data mining
4) Data conversion
5) None of these
169. Accessing records from a file directly without searching from the beginning of the file is called
1) Time sharing
2) Random
3) Direct access
4) Access time
5) None of these
Ac
3) deadlock recovery
4) Optical fiber
5) Router
172. In TCP/IP protocol, checksum field contains ________-bit value which is used for ________.
1) 32, deadlock avoidance
2) 48, error detection
3) 16, error detection
4) 16, deadlock avoidance
5) None of these
173. Granting an outside organisation access to Internet web pages is often implemented using a(n)
1) Extranet
2) Intranet
3) Internet
4) Hacker
5) None of these
5) None of these
4) vertical
5) None of these
BS
IT Quesetions
11
BSC Academy
178. A flip-flop can store
1) Two bits of data
4) Any number of bits of data
em
y
4) mkdir
5) None of these
180. Which of the following is true about the data warehouse environment architecture?
1) It contains a data warehouse methodology, analysis design, construction and administration.
2) It increases processing power and sophistication of analytical tools and techniques that have resulted in the
development of data warehouses.
3) It provides storage, functionality, and responsiveness to queries beyond the capabilities of transaction-oriented
databases.
4) All the above
5) None of these
181. Altering of data so that it is not usable unless the changes are undone is called
1) Encryption
2) Compression
3) Biometrics
4) Ergonomics
5) None of these
ad
182. A ________ main purpose is to prohibit unauthorised access to your computer via the Internet.
1) popup blockers
2) firewalls
3) spyware blockers
4) spam assassins
5) None of these
183. When one computer provides services to another computer, the environment is a(n) ________ infrastructure.
1) client/server
2) dependent
3) independent
4) reliant
5) None of these
Ac
184. Object oriented programming relies on three basic concepts. These are
1) data abstraction, inheritance and array
2) data abstraction, inheritance and polymorphism
3) encapsulation, inheritance and polymorphism
4) inheritance, I/O, class
5) None of these
185. A ________ can check the MAC addresses contained in the frame.
1) bridge
2) repeater
3) passive hub
4) router
186. Each station on an Ethernet network has a unique ________ address imprinted on its network interface card (NIC).
1) 5-byte
2) 32-bit
3) 64-bit
4) 48-bit
5) None of these
187. Decryption and encryption of data are the responsibilities of the ________ layer.
1) Physical
2) Data link
3) Presentation
4) Session
5) Application
188. The communication mode that supports data in both the directions at the same time is called
1) Half duplex
2) Simplex
3) Full duplex
4) Multiplex
5) None of these
5) None of these
5) None of these
BS
4) n nodes
3) AB+CD*E-*F*G/
12
IT Quesetions
BSC Academy
194. What type of technology allows you to use your finger, eye, or voice print to secure your information resources?
1) RFID
2) Caves
3) Biometrics
4) Haptics
5) None of these
em
y
195. A ________ can be used as a connecting device between two internetworks that use different models.
1) repeater
2) router
3) bridge
4) gateway
5) hub
196. IP address has been classified into five classes A, B, C, D and E.
1) 0.0.0.0 to 126.255.255.255
2) 128.1.0.1 to 191.255.255.255
4) 192.0.1.1 to 223.255.255.255
5) None of these
197. Relation in the relational database model is defined as the set of ________ that have the same attributes.
1) objects
2) relations
3) tuples
4) attributes
5) None of these
198. Ifalphaisasetofattributesandbetaisasubsetofalpha,thenalphaholdsbeta.InArmstrongsAxioms,thisisknown
as
1) augmentation rule 2) reflexivity rule
3) transitivity rule
4) passivity rule
5) None of these
199. In an E-R diagram, total participation is represented by
1) circle
2) single line
3) double lines
4) concentric circles
ad
5) None of these
5) None of these
Answers
5. 3
106. 3
107. 1
108. 1
109. 1
110. 5; Session Layer
111. 4
112. 2
113. 3
114. 1
116. 4
117. 2
118. 1
119. 1
121. 2
122. 3
123. 1
124. 5
126. 4
127. 2
128. 2
129. 4
131. 1
132. 4
133. 3
134. 2
136. 1
137. 4
138. 1
139. 1
141. 4
142. 4; Routing Information protocol
143. 3
144. 1
145. 2
146. 5
147. 4
148. 3
149. 1
151. 3
152. 4
153. 1
154. 4
156. 2
157. 3
158. 2
159. 3
161. 1
162. 3
163. 4
164. 4
166. 1
167. 1
168. 3
169. 3
171. 1
172. 3
173. 1
174. 2
176. 2
177. 3
178. 2
179. 3
181. 1
182. 2
183. 1
184. 3
186. 4
187. 3
188. 3
189. 3
191. 3
192. 4
193. 4
194. 3
196. 2
197. 3
198. 2
199. 3
BS
Ac
1. 4
2. 2
3. 4
4. 1
6. 4
7. 3; Address Resolution Protocol
8. 4
9. 4
10. 3
11. 3
12. 4
13. 4
14. 3
16. 3
17. 4
18. 4
19. 3
21. 4
22. 2
23. 2
24. 2
26. 2
27. 1
28. 1
29. 4
31. 2
32. 3
33. 2
34. 1
36. 1
37. 4
38. 2
39. 4
41. 1
42. 2
43. 5
44. 1
46. 1
47. 3
48. 2
49. 3
51. 2
52. 2
53. 3
54. 3
56. 2
57. 5
58. 1
59. 1
61. 1
62. 2
63. 2
64. 2
66. 3
67. 1
68. 3
69. 3
71. 2
72. 3
73. 1
74. 1
76. 3
77. 1
78. 4
79. 2
81. 4
82. 2
83. 1
84. 2
86. 3
87. 1
88. 5
89. 2
91. 3
92. 2
93. 1
94. 2
96. 2
97. 1
98. 3
99. 3
101. 1
102. 2
103. 4
104. 1
15. 2
20. 4
25. 4
30. 1
35. 3
40. 2
45. 3
50. 2
55. 3
60. 2
65. 3
70. 3
75. 3
80. 1
85. 4
90. 3
95. 1
100. 2
105. 3
IT Quesetions
13
115. 4
120. 1
125. 3
130. 2
135. 2
140. 3
150. 4
155. 2
160. 5
165. 2
170. 4
175. 3
180. 4
185. 1
190. 2
195. 4
200. 4