Department: BSC.IT Exam Type: Regular Semester: III ...
Transcript of Department: BSC.IT Exam Type: Regular Semester: III ...
1. Which of the following is an invalid variable?
a) variable1
b) var
c) var_name
d) 1variable
2. Which of the following can be a variable?
a) for
b) in
c) while
d) 123in
3. Which is the correct operator for power (XY)?
a) X??y
b) X**Y
c) X^^y
d) X*Y
4. What is the answer to this expression, 53%24 is?
a) 2.20833333
b) 5
c) 2.20
d) 2
5. What is the output of this expression, 5*1**5?
a) 25
b) 75
c) 5
d) 1
6. What error occurs when you execute the following Python code snippet?
apple = mango
a) SyntaxError
b) NameError
c) ValueError
d) TypeError
7. How many keywords are in python?
a) 45
b) 30
c) 33
d) 27
8. What is the latest version of python?
a)3.8.0
b)3.9.0
c)3.7.6
d)3.8.5
9. Which of the following is not feature of python?
a) easy to code
b) statically typed language
c) free and open source
d) high level language
10. Which of the following results in a SyntaxError?
a) ‘‛Once upon a time<‛, she said.’
b) ‚He said, ‘Yes!'‛
c) ‘3\’
d) ‛’That’s okay‛
11. In Python, ______are a self-contained block of statements that perform single
logical task
A. Recursion
B. variable
C. loop
D. Function
12. In Python which keyword is used to start Function?
A. function
B.def
C. try
D. import
13. Python was released publicly in
A. 1941
B. 1971
C. 1981
D. 1991
14. Which of the following function converts the strings to all upper case?
A. upper()
B. title()
C. isdecimal()
D. lower ()
15. What will be the output of below Python code? str1="Application"
str2=str1.replace('a', 'A')
print(str2) application
A. Application
B. ApplicAtion
C. application
D. VIEW
16. Which of the following function headers is correct?
A. def fun (a = 2, b = 3, c)
B. def fun (a = 2, b, c = 3)
C. def fun (a, b = 2, c = 3)
D. def fun (a, b, c = 3, d)
17. To use sqrt() functions we need to import_______module.
A. GUI
B. Database
C. math
D. mathematics
18. In Python which is the correct method to load a module?
A. include math
B. import math
C. #include math.h
D. using math
19. Which Function is used to open the file for reading in python?
A. fopen(filename, mode)
B. open(filename, mode)
C. openfile(filename, mode)
D. open_file(filename, mode)
20. Which of the following items are present in the function header?
a) function name
b) parameter list
c) return value
d) Both A and B
21. Files are used to permanently store data in a
______________________memory.
A. Volatile
B. Non-volatile
C. RAM
D. ROM
22. To open the file which method is used?
A. Read( )
B. Write( )
C. Open( )
D. Append( )
23. To open a file which is the correct syntax?
A. F=open(‚file_name‛)
B. F=open(‚mode‛)
C. F=open(‚mode,‛file_name‛)
D. F=open(‚file_name‛,mode)
24. The attribute file.closed is used for:
A. Returns true if file is closed & false otherwise
B. Returns only true
C. Returns only false
D. Returns false if file is closed & true otherwise
25. Which function returns the complete file as a list of string each separated by
\n?
A. Readline( )
B. Readlines( )
C. Read( )
D. Readl( )
26. Which method returns or tell the current cursor position within the file.
A. Seek( )
B. Tell( )
C. Cursor( )
D. Position( )
27. Which method change the current file position?
A. Seek( )
B. Tell( )
C. Cursor( )
D. Position( )
28. To work with files and directories which module need to be imported?
A. Import system
B. Import operating system
C. Import os
D. Import platfom
29. Which OS module is used to create directories in the current path?
A. Mkdir( )
B. os.mkdir( )
C. os.dir( )
D. rmdir( )
30. Which OS module is used to change the current path to another?
A. os.chgdir( )
B. os.chdir( )
C. os.changedir( )
D. os.cdir( )
31. What is the function of thread.join( ) in multithreading?
A. Merging of two threads
B. Add the threads to a pool
C. Waits for the thread to finish
D. Restricts access to the resources
32. Python support which of the following thread.
A. Operating System
B. User interface
C. Main thread
D. User-space
33. Kernel thread are a part of ___________________.
A. Interface
B. Operating system
C. Outside kernel
D. Command line
34. User space threads are implemented _____________ of the kernel.
A. Outside
B. Inside
C. Interface
D. Command line
35. threading.activeCount( ) returns the number of ______________thread objects.
A. Passive
B. Active
C. Dormant
D. Closed
36. Which thread method returns the number of thread objects in the caller’s
thread control.
A. threading.activeCount( )
B. threading.currentThread( )
C. threading.enumerate( )
D. threading.passiveCount( )
37. Which method is entry point for a thread?
A. Run( )
B. Start( )
C. Join( )
D. isAlive ( )
38. Which method check whether a tread is still active?
A. Run( )
B. Join( )
C. Start( )
D. isAlive( )
39. The new lock is created using _________method.
A. New lock( )
B. Lock( )
C. Thread.lock( )
D. Join.lock( )
40. Which method returns the number of items that are currently in the queue?
A. Empty( )
B. Full( )
C. Qsize( )
D. isAlive( )
41. Config() in Python Tkinter are used for
A. destroy the widget
B. place the widget
C. change property of the widget
D. configure the widget
42. For what purpose, the bg is used in Tkinter widget?
A. To change the direction of widget
B. To change the size of widget
C. To change the color of widget
D. To change the background of widget
43. How we install tkinter in system ?
A. pip install python
B. tkinter install
C. pip install tkinter
D. tkinter pip install
44. Minimum number of argument we pass in a function to create a rectangle using
canvas tkinter?
A. 2
B. 4
C. 6
D. 5
45. Minimum number of argument we require to pass in a function to create a line?
A. 2
B. 4
C. 6
D. 8
46. Screen inside another screen is possible by creating
A. Another window
B. Frames
C. Buttons
D. Labels
47. To change the color of the text in the Button widget, what we use?
A. bg
B. fg
C. color
D. cchng
48. To change the property of the widget after the declaration of widget, what we use?
A. mainloop() function
B. config() function
C. pack() function
D. title() function
49. To delete any widget from the screen which function we use?
A. stop()
B. delete()
C. destroy()
D. break()
50. What is the correct syntax of destroy in tkinter?
A. destroy(object)
B. object.destroy()
C. object(destroy)
D. delete(object)
Answer Key
Q.NO ANSWER Q.NO ANSWER Q.NO ANSWER Q.NO ANSWER Q.NO ANSWER
1 d 11 d 21 b 31 d 41 c
2 d 12 b 22 b 32 a 42 d
3 b 13 d 23 a 33 d 43 c
4 b 14 a 24 b 34 b 44 b
5 c 15 c 25 a 35 b 45 a
6 b 16 c 26 b 36 c 46 b
7 c 17 c 27 a 37 b 47 b
8 b 18 b 28 c 38 a 48 b
9 b 19 b 29 a 39 a 49 c
10 c 20 d 30 b 40 c 50 b
1. _______ is raw, unorganized facts that need to be processes.
A. Information
B. Data
C. File
D. Database
2. Datatype is an attribute which tells ______ or _______ on how programmer wants to use
data.
A. Keyboard, monitor
B. Input, output
C. Compiler, interpreter
D. Libraries, Macros
3. _______ feature will allow providing data and operations together
A. Lists
B. Set
C. Encapsulation
D. Polymorphism
4. ___________ data structures will have fixed memory allocation and memory taken by
them cannot be increased or decreased at runtime
A. Linear
B. Static
C. Homogeneous
D. Logical
5. ___________ data structures will store data of similar type.
A. Non-Linear
B. Dynamic
C. Homogeneous
D. Physical
6. ____________ will store and sort the data in contiguous block within files on disk.
A. Sequential
B. Binary
C. Random
D. Direct Access
7. Data structures work in _________memory location
A. ROM
B. SDD
C. RAM
D. Tapes
8. ____________ is an operation of data structure where every element is visited exactly only
once.
A. Insertion
B. Deletion
C. Updation
D. Traversal
9. ___________ data structures will have fixed memory allocation and memory taken by
them can be increased or decreased at runtime
A. Linear
B. Homogeneous
C. Dynamic
D. Static
10. ___________ can be defined as finite collection of well-defined steps to solve a particular
problem.
A. Files
B. Algorithm
C. Information
D. Data
11. Which of the following statements is/are true about linked list?
A. Addition and deletion of an item to/ from the linked list require modification of the
existing pointers
B. The linked list pointers do not provide an efficient way to search an item in the linked list
C. Linked list pointers always maintain the list in ascending order
D. The linked list data structure provides an efficient way to find kth element in the list
12. Linked lists are not suitable to for the implementation of?
A. Insertion sort
B. Radix sort
C. Polynomial manipulation
D. Binary search
13. One way linked list is also called as _____________?
A. Doubly Linked List
B. Circular Linked List
C. Singular Linked List
D. Deque
14. If there is no free node in the list to insert an element then that condition is known as
____________?
A. Error
B. Overflow
C. Testing
D. Underflow
15. In a circular linked list ______________?
A. Components are all linked together in some sequential manner.
B. There is no beginning and no enD.
C. Components are arranged hierarchically.
D. Forward and backward traversal within the list is permitteD.
16. A linear collection of data elements where the linear node is given by means of pointer is
called?
A. Linked list
B. Node list
C. Primitive list
D. Data
17. Which of the following operations is performed more efficiently by doubly linked list
than by singly linked list?
A. Deleting a node whose location in given
B. Searching of an unsorted list for a given item
C. Inverting a node after the node with given location
D. Traversing a list to process each node
18. Before inserting a node we need to check _______________
A. list is empty or not.
B. list exists or not
C. list can be traversed or not
D. list has to be updated
19. For ______________ we need to locate the position of the node after which we want to
insert the new node.
A. deleting node
B. searching node
C. inserting node
D. traversing node
20. To insert an element in sorted linked list, list should be ___________
A. Existing
B. Complete
C. Full
D. Sorted
21) The prefix form of an infix expression p + q − r t* is
A. + pq − rt
B. − +pqr t*
C. − +pq*rt
D. - +*pqrt
22) In Reverse Polish notation, expression A*B+C*D is written as
A. AB*CD*+
B. A*BCD*+
C. AB*CD+*
D. A*B*CD+
23) When a stack is organized as an array, a variable named Top is used to point to the top
element of the stack. Initially, the value of Top is set to_______to indicate an empty stack.
A. -1
B. 0
C. 1
D. X
24) Jan Lukasiewicz, who suggested two alternative notations to represent an arithmetic
expression belonged to which nationality?
A. English
B. Polish
C. German
D. Swedish
25) The postfix form of the following infix notation is : (A + B.* (C*D − E)* F
A. AB + CD*E − *F*
B. AB+ CDE + − * F*
C. AB+ CD − EF + − **
D. ABCDEF* − + * +
26) What are the sequence of popped out values if the sequence of operations - push(1),
push(2), pop, push(1), push(2), pop, pop, pop, push(2), pop are performed on a stack.
A. 2, 2, 1, 1, 2
B. 2, 2, 1, 2, 2
C. 2, 1, 2, 2, 1
D. 2, 1, 2, 2, 2
27) In conversion from prefix to postfix using stack data-structure, if operators and operands
are pushed and popped exactly once, then the run-time complexity is ............
A. Ο(1)
B. Ο(n)
C. Ο(log n)
D. Ο(n^2)
28) The result of evaluating the following postfix expression is 5, 7, 9, *, +, 4, 9, 3, /, +, -
A. 50
B. 65
C. 61
D. 70
29) n elements of a Queue are to be reversed using another queue. The number of “ADD” and
“REMOVE” operations required to do so is:
A. 2*n
B. 4*n
C. n
D. The task cannot be accomplished
30) User push 1 element in the stack having already five elements and having stack size as 5
then stack becomes ___________.
A. Overflow
B. Underflow
C. User Flow
D. Crash
31. The arrangement of data in an order way is known as ___________
A. Traversing
B. Inserting
C. Sorting
D. Merging
32. ____________ is a series of instruction to arrange the data in either ascending or
descending order
A. Algorithm
B. Program
C. Machine Instructions
D. Sorting Algorithm
33. Ascending order sorting, will swap the current element with the next one , if the current
element is __________
A. Equal
B. Smaller
C. Greater
D. Null
34. In bubble sort the last index value will be its correct position after the _______ iteration
A. Last
B. First
C. Middle
D. Half
35. The sort which works on comparison of key element is ___________
A. Bubble
B. Merge
C. Insertion
D. Simple
36. After each iteration ________ value is placed in front of unsorted list
A. Maximum
B. Minimum
C. Zero
D. Null
37. In _____ sort two unsorted array will create a sorted array
A. Bubble
B. Selection
C. Merge
D. Insertion
38. The last index of array is represented using ______
A. Bound
B. Upper bound
C. Lower bound
D. Last value
39. _____________ search will require data to be not sorted
A. Linear Search
B. Binary Search
C. Simple Search
D. Complex Search
40. The worst case of linear search is when data to be searched is located at _______ index
position
A. First
B. Middle
C. Last
D. Third
41. When a hash function maps to two different keys in the same table _______ occurs.
A. Intersect
B. Parallel
C. Collision
D. Resolution
42. When an identifier get mapped into a full bucket ________ will occur
A. Underflow
B. Overflow
C. Full
D. Nullify
43. In _________ hashing method we square the key and take the number of digits required
to form address
A. Square Method
B. Square Hash
C. Mid Square
D. Two Square
44. In __________ method the reverse values of outer parts of keys are added
A. Fold boundary
B. Fold shifting
C. Reverse fold
D. Fold reverse
45. Using linear probing considering the key as 89 and value of hash table as 10 , the index
hash value formed will be ___________
A. 10
B. 8
C. 9
D. 89
46. _______________ is used to resolve collisions in open addressed has tables
A. Hash resolve
B. Probing
C. Double hashing
D. Quick hashing
47. _____________ is a block of space large enough to hold multiple values
A. Tray
B. Bucket
C. List
D. Cache
48. As soon as the hash table is half full , _________-should be performed
A. Collision
B. Parallel
C. Rehash
D. Naïve hash
49. The graph in data structure is a set of __________ and _________
A. Lines and bars
B. Columns and lines
C. Vertices and edges
D. Circles and square
50. When two vertices are connected through an edge they are known as_________ with each
other
A. Not adjacent
B. Parallel
C. Adjacent
D. Collide
Answer Key
Q.NO ANSWER Q.NO ANSWER Q.NO ANSWER Q.NO ANSWER Q.NO ANSWER
1 B 11 B 21 C 31 C 41 C
2 C 12 D 22 A 32 D 42 B
3 C 13 C 23 A 33 C 43 C
4 B 14 B 24 B 34 B 44 B
5 C 15 B 25 A 35 C 45 C
6 A 16 A 26 A 36 B 46 C
7 C 17 A 27 B 37 C 47 B
8 D 18 A 28 C 38 B 48 C
9 C 19 C 29 D 39 A 49 C
10 B 20 D 30 A 40 C 50 C
1. Temperature, air pressure, humidity are all an example of
a) Digital data
b) Analog data
c) Digital signal
d) analog signal
2. In data communication we commonly use ________ Analog signal and __________
digital signal
a) Periodic and non periodic
b) non periodic and periodic
c) aperiodic and periodic
d) periodic and aperiodic
3. The ______ of a signal is its absolute value of its highest intensity proportional to the
energy it carries
a) Frequency
b) Throughput
c) Delay
d) peak amplitude
4. Change in short span of time means________ frequency whereas change over a long
span of time means________ frequency
a) High and low
b) low and high
c) definite and indefinite
d) indefinite and definite
5. If a signal does not change at all its frequency is _________ whereas if a signal changes
instantaneously its frequency is _________
a) finite and infinite
b) Infinite and zero
c) zero and infinite
d) infinite and finite
6. In _______Transmission we send 1 start Bit (0) at the beginning and one or more stop
bits (1s) at the end of each byte.
a) synchronous transmission
b) asynchronous transmission
c) isochronous transmission
d) Chronos transmission
7. ________ coding is normally referred to as mB/nB coding where it replaces each m-bit
group with an n-bit group
a) Line
b) Group
c) Block
d) Segment
8. In bipolar encoding we use _______ levels
a) 1
b) 2
c) 3
d) 4
9. In ________ the inversion or lack of inversion determines the value of the bit
a) NRZ- L
b) NRZ - I
c) RZ
d) NRZ
10. ________ is the time needed for each intermediate or end device to hold the message
before it can be processed.
a) propagation time
b) queuing time
c) transmission time
d) processing delay
11. The ______ technique expands the bandwidth of a signal by replacing each data bit with
n bits using a spreading code.
a) FDM
b) DSSS
c) FHSS
d) TDM
12. In ________ TDM, slots are dynamically allocated to improve bandwidth efficiency.
a) synchronous
b) statistical
c) isochronous
d) Asynchronous
13. In ________ TDM, slots are wasted if there is no data to transmit.
a) synchronous
b) statistical
c) isochronous
d) asynchronous
14. Which multiplexing technique involves signals composed of light beams?
a) FDM
b) TDM
c) WDM
d) PDM
15. FHSS uses ______________
a) Frequency synthesizer
b) Multiplexer
c) Hopping machine
d) De-multiplexer
16. In other words, each bit is assigned a code of n bits, called _____ .
a) Chips
b) Node
c) Spectrum
d) Period
17. We can divide ____ into two different schemes: synchronous or statistical.
a) FDM
b) TDM
c) WDM
d) FDMA
18. Transmission media are usually categorized as _______.
a) fixed or unfixed
b) guided or unguided
c) determinate or indeterminate
d) metallic or non-metallic
19. Transmission media lie below the _______ layer.
a) physical
b) network
c) transport
d) application
20. Which of the following is guided media?
a) UTP cable
b) Microwave
c) Radio wave
d) Bluetooth
21. Which of the following is not a type of data link control protocol
a) stop and wait
b) stop and wait arq
c) go back n arq
d) stop and proceed
22. S frames in HDLC stands for
a) Support frames
b) supervisory frame
c) suspicious frames
d) super frames
23. ________ means the sending station must not send frames at a rate faster than the
receiving station can absorb them
a) error control
b) frame control
c) data control
d) flow control
24. ______Is not a type of Random Access protocol
a) Aloha
b) CSMA
c) CSMA/CD
d) CDMA
25. ________ Method is used if the channel has time slots with the slot duration equal to or
greater than the maximum propagation time
a) I-persistent
b) Non-persistent
c) P persistent
d) d-persistent
26. In _______ one device is designated as a primary station and other devices are secondary
stations and all data exchanges must be made through the primary device
a) Polling
b) token passing
c) Reservation
d) logical ring
27. In _______ the available bandwidth of a link is divided into frequency bands
a) CDMA
b) TDMA
c) FDMA
d) SDMA
28. _________is a wireless LAN Technology designed to connect devices of different
function such as telephones notebooks computers cameras printers and even coffee
makers when they are at a short distance from each other
a) WiMAX
b) Bluetooth
c) fibre optic cable
d) coaxial cable
29. There are ________ generations of cellular telephony
a) 1
b) 2
c) 3
d) 4
30. __________is a combination of nodes some of which are satellites that provide
communication from one point on the earth to another
a) satellite network
b) Bluetooth
c) Infrared
d) Wi-Fi
31. A packet switched network uses which type of approach
a) datagram approach
b) virtual circuit approach
c) both datagram and virtual circuit approach
d) packet approach
32. Connection oriented approach is also called as_______
a) virtual circuit approach
b) datagram approach
c) connectionless approach
d) Packet aaproch
33. packet approach _______ is a 32 bit address that uniquely and universally define the
connection of a host or a router to the internet
a) ipv 1 addressing
b) ipv2 addressing
c) Ipv3 addressing
d) ipv4 addresses
34. _________means to place the packet in its route to its destination
a) Sending
b) Forwarding
c) Delivering
d) dividing
35. ICMP stands for
a) Internet control Management protocol
b) Internet control message protocol
c) internet Control Management process
d) internet control message process
36. _________ Is a variable length packet consisting of two parts header and data
a) Datagram
b) Protocol
c) Packet
d) group
37. ________ report problem that a router or a host may encounter when it processes and IP
packet
a) error reporting messages
b) query messages
c) time exceeded messages
d) redirection messages
38. ________Routing table is the one that is created once manually but it is updated
automatically whenever there is some change in the internet
a) Static
b) Dynamic
c) Modified
d) updated
39. ________timer in RIP determine when the router must send the update packet to other
routers
a) Periodic
b) Expiration
c) garbage collection
d) Aperiodic
40. OSPF stands for _______
a) Open shortest protocol first
b) open standard protocol first
c) open shortest path first
d) open standard path first
41. ______helps you identify processes on the computer
a) process number
b) port number
c) data number
d) Transport number
42. The receivers sends_______ acknowledgement if a frame has arrived safe and sound and
in order
a) Positive
b) Negative
c) No
d) Some
43. _________Protocol report the sequence number of a damaged frame before the timer
expires
a) simple protocol
b) stop and wait protocol
c) Go back n protocol
d) selective repeat protocol
44. A technique called as_______ is used to improve the efficiency of bidirectional
protocols
a) simple protocol
b) Piggybacking
c) stop and wait protocol
d) selective repeat protocol
45. __________Is a connectionless unreliable transport protocol which does not add
anything to the services of IP except for providing process to process communication
instead of host-to-host communication
a) user datagram protocol
b) transmission control protocol
c) selective repeat protocol
d) simple protocol
46. _________Is a connection oriented reliable protocol which defines connection
establishment data transfer and connection teardown phase to provide a connection
oriented service
a) user datagram protocol
b) transmission control protocol
c) selective repeat protocol
d) simple protocol
47. In __________ communication data can flow in both directions at the same time
a) Simplex
b) Half duplex
c) semi duplex
d) full duplex
48. In case of________ a logical window is maintained in the buffer of the sender
a) user datagram protocol
b) sliding window protocol
c) transmission control protocol
d) simple protocol
49. A _________ Timer is used to prevent a long idle connection between two machines
a) time wait
b) keepalive
c) Retransmission
d) Persistent
50. _____ means creating documents that refer to other documents
a) Hypertext
b) Hypermedia
c) client protocol
d) web server
Answer Key
Q.NO ANSWER Q.NO ANSWER Q.NO ANSWER Q.NO ANSWER Q.NO ANSWER
1 b 11 b 21 d 31 c 41 b
2 a 12 b 22 b 32 a 42 a
3 d 13 a 23 d 33 d 43 d
4 a 14 c 24 d 34 b 44 b
5 c 15 a 25 c 35 b 45 a
6 b 16 d 26 a 36 a 46 b
7 c 17 b 27 c 37 a 47 d
8 c 18 b 28 b 38 b 48 b
9 b 19 a 29 d 39 a 49 b
10 b 20 a 30 a 40 c 50 a
1. What do you mean by one to many relationship between Teacher and Class
table?
a) One class may have many teachers
b) One teacher can have many classes
c) Many classes may have many teachers
d) Many teachers may have many classes
2. In one-to-many relationship, the table on 'many' sides is called _______
a) Parent
b) Child
c) Sister
d) Master
3. Which of the following enables us to view data from a table based on a
specific criterion
a) Form
b) Query
c) Macro
d) Report
4. This key that uniquely identifies each record is called :
a) Primary Key
b) Key Record
c) Unique Key
d) Field Name
5. Which name must be unique within a database ?
a) Table
b) Field
c) Record
d) Character
6. In an ER Diagram an entity set is represented by____________.
a) Rectangle
b) Ellipse
c) Diamond
d) Circle
7. The collection of related data is termed as _________
a) Data
b) Database
c) DBMS
d) Information
8. The process of hiding irrelevant details from the user is called
a) data abstraction
b) data encryption
c) data integrity
d) data encapsulation
9. The total number of attributes which in the relation is called the __________ of
the relation.
a) Table
b) Tuple
c) Degree
d) Attribute
10. ___________ is an extension of the Hierarchical model.
a) Relational Model
b) Data Model
c) Network Model
d) ER-Model
11. Which one of the following is a set of one or more attributes taken collectively
to uniquely identify a record?
a. Candidate key
b. Sub key
c. Super key
d. Foreign key
12. Which one of the following attributes can be taken as a primary key?
a. Name
b. Street
c. Id
d. Department
13. An attribute in a relation is a foreign key if the _______ key from one relation is
used as an attribute in that relation.
a. Candidate
b. Primary
c. Super
d. Sub
14. A _________ integrity constraint requires that the values appearing in
specified attributes of any tuple in the referencing relation also appear in
specified attributes of at least one tuple in the referenced relation.
a. Referential
b. Referencing
c. Specific
d. Primary
15. A set of possible data values is called
a. Attribute
b. Degree
c. Tuple
d. Domain
16. In the __________ normal form, a composite attribute is converted to
individual attributes.
a. First
b. Second
c. Third
d. Fourth
17. A table on the many side of a one to many or many to many relationship must:
a. Be in Second Normal Form (2NF)
b. Be in Third Normal Form (3NF)
c. Have a single attribute key
d. Have a composite key
18. Tables in second normal form (2NF):
a. Eliminate all hidden dependencies
b. Eliminate the possibility of an insertion anomalies
c. Have a composite key
d. Have all non key fields depended on the whole primary key
19. Functional Dependencies are the types of constraints that are based on______
a. Key
b. Key revisited
c. Superset key
d. Composite key
20. Which is a bottom-up approach to database design that design by examining
the relationship between attributes:
a. Functional dependency
b. Database modelling
c. Normalization
d. Decomposition
21. A _______________ key is a minimal super key
a) Primary
b) Foreign
c) Candidate
d) Non-Prime
22. By default, which key creates Clustered index?
a) Foreign Key
b) Unique Key
c) Primary Key
d) Candidate Key
23. The following Constraint must be always column level.
e) Not Null
f) Unique Constraint
g) Check Constraint
h) Default Constraint
24. ____________ integrity validates the data before getting stored in the columns
of the table.
a) Entity
b) Data
c) Domain
d) User-defined
25. ____________ integrity ensures the relationships between tables remain
preserved as data is inserted, deleted & modified.
a) Referential
b) Primary
c) Domain
d) Data
26. This means the capacity to change the schema at one level of database system
without having to change the schema at the next higher level.
a) Security
b) View
c) Data independence
d) Table
27. Which key accepts multiple NULL values?
a) Foreign Key
b) Unique Key
c) Primary Key
d) Natural Key
28. A Foreign key is combined with a foreign key creates
a) Parent child relationship between the tables that connect them
b) Many-Many relationship between the tables that connect them
c) Network model between the tables that connect them
d) Many-One relationship between the tables that connect them
29. Which of the following is not the DDL statements?
a) Create
b) Drop
c) Alter
d) Insert
30. In SQL, which command(s) is(are) used to change a table’s storage
characteristics?
a) ALTER TABLE
b) MODIFY TABLE
c) CHANGE TABLE
d) UPDATE TABLE
31. A transaction completes its execution is said to be
a. Committed
b. Aborted
c. Rolled back
d. Failed
32. The process of managing simultaneous operations on the database without
having them interfere with one another is
a. Serializability
b. Recoverability
c. Concurrency control
d. Transaction management
33. A schedule where the operations of each transaction are executed
consecutively without any other interference from other transactions is called
a. Non-serial schedule
b. Serial schedule
c. Recoverable schedule
d. Non-recoverable schedule
34. Which of the following is not a deadlock handling strategy?
a. Deadlock prevention
b. Timeout
c. Deadlock detection and recovery
d. Deadlock annihilation
35. Which of the following does refer to the size of the data item chosen as the unit
of protection by a concurrency control program?
a. Granularity
b. Lock
c. Starvation
d. Timestamp
36. Which of the following hashing techniques does allow a hash file to expand
and shrink its number of buckets dynamically without needing a directory?
a. Linear hashing
b. Extensible hashing
c. Internal hashing
d. External hashing
37. Which of the following indexes is based on the values being uniformly
distributed using a mathematical function?
a. Ordered index
b. Hashed index
c. Dense index
d. Sparse index
38. A join in which the joining condition is based on equality between values in
the common columns is called
a. Equi-join
b. lateral join
c. Natural join
d. Left join
39. A type of query that is placed within a WHERE or HAVING clause of another
query is called
a. Master query
b. Query
c. Superquery
d. Subquery
40. The entity integrity rule states that
a. No primary key attribute can be null
b. Referential integrity must be maintained across all entities
c. Each entity must have a primary key
d. A primary key must have only one attribute
41. __How to give single line comment in PL/SQL
a. //
b. /*
c. --
d. <--
42. PL/SQL is ______ to SQL.
a. new
b. extension
c. main
d. important
43. Find invalid declaration
a. v_number1 NUMBER(10);
b. v_num NUMBER := 100;
c. v_astring VARCHAR2(2) NOT NULL;
d. v_str VARCHAR2(1) NOT NULL := ‘Y’;
44. Which package is get used to print output on screen
a. DBMS_PRINT
b. DBMS_OUTPUT
c. DBMS_SHOW
d. DBMS_COUT
45. Which one is invalid procedure?
a. PUT
b. PUT_LINE
c. NEW_LINE
d. NEW
46. PL/SQL groups the syntax of the programs into units called _______.
a. sections
b. blocks
c. parts
d. queries
47. PL/SQL named blocks are called ________
a. subprograms
b. anonymous
c. code
d. query
48. PL/SQL unnamed blocks are called _________
a. subprograms
b. anonymous
c. code
d. query
49. __________ can be referred as either function or procedures.
a. subprograms
b. anonymous
c. code
d. query
50. DECLARE section begins with the keyword DECLARE and ends when the
keyword ________
a. END
b. BEGIN
c. END DECLARE
d. STOP
Answer Key
Q.No Answer Q.No Answer Q.No Answer Q.No Answer Q.No Answer
1 b
11 b
21 c 31 a 41 c
2 b
12 c
22 c 32 c 42 b
3 b
13 b 23 a 33 b 43 c
4 a
14 a
24 b 34 d 44 b
5 a
15 d 25 a 35 a 45 d
6 a
16 a 26 c 36 b 46 b
7 b
17 d
27 a 37 b 47 a
8 a
18 a
28 a 38 a 48 b
9 c
19 a 29 d 39 d 49 a
10 c 20 c 30 a 40 a 50 b
1. Which of the following Matrix is scalar matrix?
a) *
+
b) *
+
c) *
+
d) *
+
2. If a matrix A is both symmetric and skew symmetric then matrix A is
a) a scalar matrix
b) a diagonal matrix
c) a zero matrix of order n × n
d) a rectangular matrix
3. To find rank of matrix using Normal form which operations are allowed
a) Only row
b) Only column
c) Both row and column
d) Row or column
4. The formula for finding inverse of matrix using adjoint method is
a)
b)
c)
| | ))
d) ))
5. The system of linear non-homogenous equation is consistent if
a) ) | )
b) )
c) ) | )
d) | ) )
6. The characteristic equation is
a) | |
b)
c) | |
d)
7. Cayley-Hamilton theorem states that Every matrix satisfy its own ______________
a) Characteristic Equation
b) Differential Equation
c) Potential Equation
d) Caley’s Equation
8. The system of homogenous linear equations has infinitely many solutions if
a) ) | )
b) ) | )
c) ) | )
d) )
9. The vectors are independent vectors if for every equation of
the type gives
a)
b)
c)
d)
10. The eigen values are roots of
a) The characteristic equation
b) Rank of matrix
c) Polynomial
d) Eigen vector
11. Determine the order and degree of the differential equation
(
)
a)
b)
c)
d)
12. Which of the following equations is an exact differential equation?
a) )
b) )
c) )
d) )
13. The Differential Equation of type ) ) is said to be exact if
a)
b)
c)
d)
14. What is integrating factor of differential equation of type
a) ∫
b) ∫
c) ∫
d) ∫
15. Which of the following is Clairaut’s form of Differential equation?
a) )
b) )
c) )
d) )
16. The solution to exact differential Equation is given by
a) ∫ ∫
b) ∫ ∫ )
c) ∫ ∫ )
d) ∫ ∫ )
17. If linear differential equation with constant coefficient is given by )
) then its general solution is
a)
b)
c)
d)
18. What is solution of Differential equation )
a)
b)
c)
d)
19. Find the particular integral:
a)
b)
c)
d)
20. What is solution to equation:
a) )
b) ) )
c) ) )
)
d)
21. Laplace of function ) is given by?
a) ) ∫ )
b) ) ∫ )
c) ) ∫ )
d) ) ∫ )
22. Laplace transform of )is?
a)
b)
c)
d)
23. Find the Laplace transform of )
a)
)
b)
)
c)
)
d)
)
24. Laplace transform of )
a)
)
b)
)
c)
)
d)
( )
25. Find the Laplace transform of
⁄
a)
(
√
)
b)
(
√
)
c)
(
√
)
d)
(
√
)
26. ) ) [ )]
a)
b)
c)
d) 1
27. [ ]
a) )
b) )
c) )
d) )
28. )
a)
b)
c)
d)
29. ) *∫ )
+
a)
)
b)
c)
)
d)
30.
a)
b)
c)
d)
31. *
+
a) 1
b)
c) 0
d)
32. Find the value of ∬
a) )
b) ) )
c) )
d) ) )
33. The value of ∬ over the area bounded by parabola and is
a)
b)
c)
d)
34. The value of ∬ over the area bounded by parabola and is
a)
b)
c)
d)
35. Find the value of the integral ∫ ∫ )
a)
b)
c)
d)
36. The value of ∫ ∫ ∫
is given by
a)
b)
c)
d) 1
37. The integral value of ∫ ∫ ∫
is
a)
)
b)
c)
)
d)
)
38. The integral of ∫ ∫ ∫ )
a) 0
b) 1
c) 0.25
d) 4
39. The integral value of ∫ ∫ ∫
)
is given by
a) √
b) √
c) √
d) √
40. The integral value of ∫ ∫ ∫
is
a) 0.5
b) 0.25
c) 1
d) 0
41. ∫ ∫ )
a) Zero
b)
c)
d) 2
42. The value of ∫ )
∫ )
a) 0
b) x
c) a
d) t
43. Which of the following is true?
a) ) )
b) ) )
c) ) ) d) ) )
44. What is the value of
1
2 ?
a) π
b) π
2
c) π
2
d)
π
2
45. What is the value of √ ?
a) √
b) √
c) √
d) √
46. ∫
a) √
b) √
c) √
d)
47. What is the value of
9
4 ?
a)
⌈
b)
⌈
c)
⌈
d)
⌈
48. Which of the following is not a definition of Gamma function?
a) )
b) ) n-1 x
0
x e dx?
c) ) )
d) ) 2 2 1
0
2 dxx ne x
49. What is the value of β(3,2)?
a) 1/14
b) 1/16
c) 1/12
d) 1/10
50. What is the value of (
)
a) π
b) 2π
c) 2π
d) 2π
Answer Key
Q.NO ANSWER Q.NO ANSWER Q.NO ANSWER Q.NO ANSWER Q.NO ANSWER
1 d 11 a 21 d 31 a 41 d
2 c 12 c 22 d 32 b 42 d
3 c 13 b 23 a 33 b 43 c
4 c 14 b 24 d 34 b 44 a
5 a 15 a 25 b 35 b 45 b
6 a 16 b 26 a 36 c 46 b
7 a 17 a 27 c 37 d 47 a
8 a 18 c 28 c 38 a 48 a
9 a 19 a 29 c 39 a 49 c
10 a 20 d 30 a 40 d 50 b