Top Banner
1 Adda247 | No. 1 APP for Banking & SSC Preparation Website:store.adda247.com | Email:[email protected]
13

| No. 1 APP for Banking & SSC Preparation Website: Email · What is page stealing in operating system? (a) ... Internet Explorer ... No. 1 APP for Banking & SSC Preparation Website:store.adda247.com

Jun 12, 2018

Download

Documents

lytruc
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: | No. 1 APP for Banking & SSC Preparation Website: Email · What is page stealing in operating system? (a) ... Internet Explorer ... No. 1 APP for Banking & SSC Preparation Website:store.adda247.com

1 Adda247 | No. 1 APP for Banking & SSC Preparation Website:store.adda247.com | Email:[email protected]

Page 2: | No. 1 APP for Banking & SSC Preparation Website: Email · What is page stealing in operating system? (a) ... Internet Explorer ... No. 1 APP for Banking & SSC Preparation Website:store.adda247.com

2 Adda247 | No. 1 APP for Banking & SSC Preparation Website:store.adda247.com | Email:[email protected]

Q1. When you visit certain website, spyware may be automatically downloaded. This is called:

(a) Logic bomb

(b) Drive-by download

(c) Virus

(d) Drive-in download

(e) Spooling

Q2. Which of the following is basically a multiport repeater?

(a) Hub

(b) Bridge

(c) Router

(d) VLAN

(e) Repeater

Q3. How a 3NF relation is split into 4NF?

(a) By removing overlapping composite key

(b) By splitting into relations which do not have more than one independent multivalued

dependency

(c) By removing multivalued dependency

(d) By putting dependent non-key attribute in a separate table.

(e) None of these

Q4. Which of the following is not a Data Definition Language Statement?

(a) Delete

(b) Create

(c) Drop

(d) Alter

(e) Truncate

Q5. Which keyword must be used here to rename the field name?

Select name __________ instructor name, course id from

instructor, teaches where instructor.ID= teaches.ID;

(a) From

(b) Rename

(c) As

(d) Join

(e) Like

Page 3: | No. 1 APP for Banking & SSC Preparation Website: Email · What is page stealing in operating system? (a) ... Internet Explorer ... No. 1 APP for Banking & SSC Preparation Website:store.adda247.com

3 Adda247 | No. 1 APP for Banking & SSC Preparation Website:store.adda247.com | Email:[email protected]

Q6. What is page stealing in operating system?

(a) is a sign of an efficient system

(b) is taking page frames from other working sets

(c) should be the tuning goal

(d) is taking larger disk spaces for pages paged out

(e) None of these

Q7. What is the file extension of compiled java program?

(a) (.class)

(b) (.java)

(c) (.css)

(d) (.html)

(e) (.javcc)

Q8. Which one of these popular windows feature is not include in window 8?

(a) Desktop

(b) Office Assistant Paperclip

(c) Wallpaper

(d) Start Button

(e) Internet Explorer

Q9. Which of the following addressing mode, the operand is available in the instruction itself?

(a) Direct addressing

(b) Immediate addressing

(c) Implied addressing

(d) Indirect addressing

(e) None of these

Q10. What is linker in an operating system?

(a) is the same a loader

(b) is required to create a load module

(c) user source code as input

(d) is always used before programs are executed

(e) All of the above

Q11. Which HTML tag is used to make a bulleted list with numbers?

(a) <dl>

(b) <ol>

(c) <list>

(d) <ul>

(e) <p>

Page 4: | No. 1 APP for Banking & SSC Preparation Website: Email · What is page stealing in operating system? (a) ... Internet Explorer ... No. 1 APP for Banking & SSC Preparation Website:store.adda247.com

4 Adda247 | No. 1 APP for Banking & SSC Preparation Website:store.adda247.com | Email:[email protected]

Q12. Which statement is used to terminate a statement sequence?

(a) Break

(b) Switch

(c) Continue

(d) Wait

(e) Truncate

Q13. Which type of cyber-attack involves, hackers taking control of a computer system and

blocking access of its work until a certain amount of money is paid?

(a) Trojan horse

(b) Encryption

(c) Pirated software

(d) Ransomware

(e) Shareware

Q14. The time for the actual data transfer after receiving the request for data from secondary

storage is referred to as the disk’s _____.

(a) Transfer time

(b) Movement time

(c) Access time

(d) Data input time

(e) Throughput

Q15. Which technique is used to send more than one call over a single line is _______

(a) Digital transmission

(b) Infrared transmission

(c) Streaming

(d) Multiplexing

(e) Demultiplexing

Q16. Which of the following defines the syntax of a programming

language?

(a) Token

(b) Pattern

(c) Context-Free Grammar

(d) Source

(e) Both (a) and (b)

Page 5: | No. 1 APP for Banking & SSC Preparation Website: Email · What is page stealing in operating system? (a) ... Internet Explorer ... No. 1 APP for Banking & SSC Preparation Website:store.adda247.com

5 Adda247 | No. 1 APP for Banking & SSC Preparation Website:store.adda247.com | Email:[email protected]

Q17. What will be the result of given code?

#include<stdio.h>

int main()

{

printf(5+"Not Good");

}

(a) Not

(b) Good

(c) ood

(d) Not G

(e) Error

Q18. What is the process of defining a method in terms of itself that is a method that calls itself?

(a) Polymorphism

(b) Abstraction

(c) Encapsulation

(d) Recursion

(e) Polymorphism

Q19. An assembler that runs on one machine but produces machine code for another machine is

called____

(a) Simulator

(b) Emulator

(c) Cross assembler

(d) Boot-strap loader

(e) Programmer

Q20. Which of these keywords can be used to prevent Method overriding?

(a) Static

(b) Constant

(c) Protected

(d) Final

(e) Catch

Q21. Which virus hides from operating system and antivirus by changing its direction?

(a) Stealth

(b) Macro

(c) Resident

(d) Logic Bomb

(e) Ransomware

Page 6: | No. 1 APP for Banking & SSC Preparation Website: Email · What is page stealing in operating system? (a) ... Internet Explorer ... No. 1 APP for Banking & SSC Preparation Website:store.adda247.com

6 Adda247 | No. 1 APP for Banking & SSC Preparation Website:store.adda247.com | Email:[email protected]

Q22. Which page replacement policy sometimes leads more page faults, when size of the memory

is increased?

(a) FIFO

(b) LRU

(c) Optimal page replacement

(d) No such policy exists

(e) Both (b) and (c)

Q23. What is thrashing?

(a) Reduces page I/O

(b) Decreases the degree of multiprogramming

(c) Implies excessive page I/O

(d) Improves the system performance

(e) Useful in page replacement algorithm

Q24. Which feature in Object Oriented Programming allows reusing code?

(a) Polymorphism

(b) Inheritance

(c) Encapsulation

(d) Data hiding

(e) Abstraction

Q25. Congestion Control is done by which layer?

(a) Data link layer

(b) Network layer

(c) Transport layer

(d) Application layer

(e) Session layer

Q26. Brouter works at which layer of OSI Model.

(a) Network layer

(b) Data link layer

(c) Physical layer

(d) Application layer

(e) Both (a) and (b)

Q27. which of the following indicated by double line in ER diagram?

(a) Total participation

(b) Multiple participation

(c) Cardinality

(d) Entity

(e) Partial participation

Page 7: | No. 1 APP for Banking & SSC Preparation Website: Email · What is page stealing in operating system? (a) ... Internet Explorer ... No. 1 APP for Banking & SSC Preparation Website:store.adda247.com

7 Adda247 | No. 1 APP for Banking & SSC Preparation Website:store.adda247.com | Email:[email protected]

Q28.Which clause is used to specify condition while retrieving data from table in SQL?

(a) WHERE

(b) LIKE

(c) HAVING

(d) Group By

(e) Order By

Q29. Which of the following is the correct syntax of UPDATE Command?

(a) UPDATE table_name where condition SET column_name = <value>;

(b) UPDATE table_name SET column_name = <value> WHERE <condition>;

(c) UPDATE table table_name set column_name = <value> WHERE <condition>;

(d) UPDATE IN table_name WHERE condition set column_name = <value>;

(e) UPDATE from table_name where condition set “column_name”=<value>;

Q30. What is the condition of page fault in operating system?

(a) the page is corrupted by application software

(b) the page is in main memory

(c) the page is not in main memory

(d) the tries to divide a number by 0

(e) When operating system not booted properly

Q31. Which of the following is used to translates internet domain and host names to IP address?

(a) DNS

(b) Routing Information Protocol

(c) Network Time Protocol

(d) Internet Relay chat

(e) Router

Page 8: | No. 1 APP for Banking & SSC Preparation Website: Email · What is page stealing in operating system? (a) ... Internet Explorer ... No. 1 APP for Banking & SSC Preparation Website:store.adda247.com

8 Adda247 | No. 1 APP for Banking & SSC Preparation Website:store.adda247.com | Email:[email protected]

Q32. Which of the following error occurs when software tries to access protected memory?

(a) Segmentation Fault

(b) Display time Error

(c) IO Error

(d) Runtime Error

(e) Page fault

Q33. Which of the following is not proper state of transaction?

(a) Partially aborted

(b) Partially committed

(c) Aborted

(d) Committed

(e) Active

Q34. 803.11 is use in which technology.

(a) Wireless LAN

(b) ARPANET

(c) ETHERNET

(d) BITNET

(e) None of these

Q35. Which of the following algorithms solves the all pair shortest path problem?

(a) Diskstra’s algorithm

(b) Floyd’s algorithm

(c) Prims algorithm

(d) Warshall’s algorithm

(e) None of these

Q36. A switch uses which type of address of machine to transfer data?

(a) MAC

(b) IP

(c) Header

(d) a & b

(e) None of these

Q37. Which command is use for sorting the table?

(a) Like

(b) Distinct

(c) Group By

(d) Order By

(e) None of these

Page 9: | No. 1 APP for Banking & SSC Preparation Website: Email · What is page stealing in operating system? (a) ... Internet Explorer ... No. 1 APP for Banking & SSC Preparation Website:store.adda247.com

9 Adda247 | No. 1 APP for Banking & SSC Preparation Website:store.adda247.com | Email:[email protected]

Q38. What is data integrity?

(a) It is the data contained in the database that is non- redundant.

(b) It is the data contained in the database that is accurate and consistent.

(c) It is the data contained in the database that is secured

(d) It is the data contained in the database that is shared

(e) None of these

Q39. Which tracking program records every keystroke you make on the computer?

(a) Key logger

(b) eFollow

(c) ITrack/ULead

(d) Stalking software

(e) None of these

Q40. Which of the following is the smallest unit of storage in oracle database?

(a) Control file

(b) Datafile

(c) Data Block

(d) Segment

(e) None of these

Q41. If requirements are easily understandable and defined then which model is best suited?

(a) Spiral model

(b) Waterfall model

(c) Prototyping model

(d) Incremental model

(e) None of these

Q42. A server farm is an example of_____

(a) Server clustering

(b) Redundant servers

(c) Multiple servers

(d) Server fault tolerance

(e) None of these

Q43. Which of the following is also known as PC Program Counter.

(a) Instruction pointer

(b) Memory pointer

(c) Data counter

(d) File pointer

(e) None of these

Page 10: | No. 1 APP for Banking & SSC Preparation Website: Email · What is page stealing in operating system? (a) ... Internet Explorer ... No. 1 APP for Banking & SSC Preparation Website:store.adda247.com

10 Adda247 | No. 1 APP for Banking & SSC Preparation Website:store.adda247.com | Email:[email protected]

Q44. Which C++ oops feature is related to re-usability?

(a) Encapsulation

(b) Inheritance

(c) Abstraction

(d) Polymorphism

(e) None of these

Q45. Which of the following is a technique of improving the priority of process waiting in Queue

for CPU allocation?

(a) Aging

(b) Starvation

(c) Revocation

(d) Relocation

(e) None of these

Q46. OLAP applications are widely used by________

(a) RDBMS

(b) JAVA

(c) Data Mining Technique

(d) Operating System

(e) Web server

Q47. Which one of the following is a cryptographic protocol used to secure HTTP connection?

(a) stream control transmission protocol (SCTP)

(b) transport layer security (TSL)

(c) explicit congestion notification (ECN)

(d) resource reservation protocol

(e) None of these

Q48. IP Address 168.2.7.6 belong to_____

(a) Class A

(b) Class B

(c) Class C

(d) Class D

(e) Class E

Q49. What is the port number of Post Office Protocol (POP3)?

(a) 119

(b) 23

(c) 25

(d) 110

(e) 123

Page 11: | No. 1 APP for Banking & SSC Preparation Website: Email · What is page stealing in operating system? (a) ... Internet Explorer ... No. 1 APP for Banking & SSC Preparation Website:store.adda247.com

11 Adda247 | No. 1 APP for Banking & SSC Preparation Website:store.adda247.com | Email:[email protected]

Q50. Which HTTP message shows " Service Unavailable"?

(a) 400

(b) 401

(c) 500

(d) 503

(e) 404

Q51. Proxy firewall sometimes known as:

(a) Packet filtering firewalls

(b) Circuit-level gateways

(c) Stateful inspection firewalls

(d) Application-level gateways

(e) Next-gen firewalls

Q52. Which of the following is a malicious program that enable

administrator level to a computer or computer network?

(a) Micro virus

(b) Logic bombs

(c) Rootkit

(d) Spyware

(e) Keyloggers

Q53. What is the main protocol used to access data on WWW?

(a) FTP

(b) HTML

(c) HTTP

(d) SMTP

(e) TFTP

Q54. Which UNIX command allows you to move and rename files?

(a) cd

(b) mv

(c) cp

(d) rm

(e) Is

Q55. What is the solution to starvation in priority scheduling?

(a) Raising Interrupts

(b) Predicting next CPU burst

(c) Aging

(d) Adjusting the value of time quantum

(e) None of these

Page 12: | No. 1 APP for Banking & SSC Preparation Website: Email · What is page stealing in operating system? (a) ... Internet Explorer ... No. 1 APP for Banking & SSC Preparation Website:store.adda247.com

12 Adda247 | No. 1 APP for Banking & SSC Preparation Website:store.adda247.com | Email:[email protected]

Q56. With SQL, how can you insert a new record into the "Persons" table?

(a) INSERT ('Swati', 'Purohit') INTO Persons

(b) INSERT VALUES ('Swati', 'Purohit') INTO Persons

(c) INSERT INTO Persons VALUES ('Swati', 'Purohit')

(d) INSERT (‘Swati’, ’Purohit’) VALUES INTO Person

(e) INSERT (‘Swati’, ’Purohit’) IN Person

Q57. Which of the following operation is used if we are interested in only certain columns of a

table?

(a) PROJECTION

(b) SELECTION

(c) UNION

(d) JOIN

(e) FROM

Q58. Which cloud computing service provided by Microsoft?

(a) Azure

(b) Elastic

(c) Smart

(d) Grid

(e) Web service

Q59. SRS in software engineering stand for:

(a) System recourses Specification

(b) System Recursive specification

(c) System requirement specification

(d) Software requirement specification

(e) None of these

Q60. Which level of database architecture is representing total view of database?

(a) Conceptual view

(b) Internal view

(c) External view

(d) Physical view

(e) Relational View

Page 13: | No. 1 APP for Banking & SSC Preparation Website: Email · What is page stealing in operating system? (a) ... Internet Explorer ... No. 1 APP for Banking & SSC Preparation Website:store.adda247.com

13 Adda247 | No. 1 APP for Banking & SSC Preparation Website:store.adda247.com | Email:[email protected]