1 Adda247 | No. 1 APP for Banking & SSC Preparation Website:store.adda247.com | Email:[email protected]
2 Adda247 | No. 1 APP for Banking & SSC Preparation Website:store.adda247.com | Email:[email protected]
Q1. When you visit certain website, spyware may be automatically downloaded. This is called:
(a) Logic bomb
(b) Drive-by download
(c) Virus
(d) Drive-in download
(e) Spooling
Q2. Which of the following is basically a multiport repeater?
(a) Hub
(b) Bridge
(c) Router
(d) VLAN
(e) Repeater
Q3. How a 3NF relation is split into 4NF?
(a) By removing overlapping composite key
(b) By splitting into relations which do not have more than one independent multivalued
dependency
(c) By removing multivalued dependency
(d) By putting dependent non-key attribute in a separate table.
(e) None of these
Q4. Which of the following is not a Data Definition Language Statement?
(a) Delete
(b) Create
(c) Drop
(d) Alter
(e) Truncate
Q5. Which keyword must be used here to rename the field name?
Select name __________ instructor name, course id from
instructor, teaches where instructor.ID= teaches.ID;
(a) From
(b) Rename
(c) As
(d) Join
(e) Like
3 Adda247 | No. 1 APP for Banking & SSC Preparation Website:store.adda247.com | Email:[email protected]
Q6. What is page stealing in operating system?
(a) is a sign of an efficient system
(b) is taking page frames from other working sets
(c) should be the tuning goal
(d) is taking larger disk spaces for pages paged out
(e) None of these
Q7. What is the file extension of compiled java program?
(a) (.class)
(b) (.java)
(c) (.css)
(d) (.html)
(e) (.javcc)
Q8. Which one of these popular windows feature is not include in window 8?
(a) Desktop
(b) Office Assistant Paperclip
(c) Wallpaper
(d) Start Button
(e) Internet Explorer
Q9. Which of the following addressing mode, the operand is available in the instruction itself?
(a) Direct addressing
(b) Immediate addressing
(c) Implied addressing
(d) Indirect addressing
(e) None of these
Q10. What is linker in an operating system?
(a) is the same a loader
(b) is required to create a load module
(c) user source code as input
(d) is always used before programs are executed
(e) All of the above
Q11. Which HTML tag is used to make a bulleted list with numbers?
(a) <dl>
(b) <ol>
(c) <list>
(d) <ul>
(e) <p>
4 Adda247 | No. 1 APP for Banking & SSC Preparation Website:store.adda247.com | Email:[email protected]
Q12. Which statement is used to terminate a statement sequence?
(a) Break
(b) Switch
(c) Continue
(d) Wait
(e) Truncate
Q13. Which type of cyber-attack involves, hackers taking control of a computer system and
blocking access of its work until a certain amount of money is paid?
(a) Trojan horse
(b) Encryption
(c) Pirated software
(d) Ransomware
(e) Shareware
Q14. The time for the actual data transfer after receiving the request for data from secondary
storage is referred to as the disk’s _____.
(a) Transfer time
(b) Movement time
(c) Access time
(d) Data input time
(e) Throughput
Q15. Which technique is used to send more than one call over a single line is _______
(a) Digital transmission
(b) Infrared transmission
(c) Streaming
(d) Multiplexing
(e) Demultiplexing
Q16. Which of the following defines the syntax of a programming
language?
(a) Token
(b) Pattern
(c) Context-Free Grammar
(d) Source
(e) Both (a) and (b)
5 Adda247 | No. 1 APP for Banking & SSC Preparation Website:store.adda247.com | Email:[email protected]
Q17. What will be the result of given code?
#include<stdio.h>
int main()
{
printf(5+"Not Good");
}
(a) Not
(b) Good
(c) ood
(d) Not G
(e) Error
Q18. What is the process of defining a method in terms of itself that is a method that calls itself?
(a) Polymorphism
(b) Abstraction
(c) Encapsulation
(d) Recursion
(e) Polymorphism
Q19. An assembler that runs on one machine but produces machine code for another machine is
called____
(a) Simulator
(b) Emulator
(c) Cross assembler
(d) Boot-strap loader
(e) Programmer
Q20. Which of these keywords can be used to prevent Method overriding?
(a) Static
(b) Constant
(c) Protected
(d) Final
(e) Catch
Q21. Which virus hides from operating system and antivirus by changing its direction?
(a) Stealth
(b) Macro
(c) Resident
(d) Logic Bomb
(e) Ransomware
6 Adda247 | No. 1 APP for Banking & SSC Preparation Website:store.adda247.com | Email:[email protected]
Q22. Which page replacement policy sometimes leads more page faults, when size of the memory
is increased?
(a) FIFO
(b) LRU
(c) Optimal page replacement
(d) No such policy exists
(e) Both (b) and (c)
Q23. What is thrashing?
(a) Reduces page I/O
(b) Decreases the degree of multiprogramming
(c) Implies excessive page I/O
(d) Improves the system performance
(e) Useful in page replacement algorithm
Q24. Which feature in Object Oriented Programming allows reusing code?
(a) Polymorphism
(b) Inheritance
(c) Encapsulation
(d) Data hiding
(e) Abstraction
Q25. Congestion Control is done by which layer?
(a) Data link layer
(b) Network layer
(c) Transport layer
(d) Application layer
(e) Session layer
Q26. Brouter works at which layer of OSI Model.
(a) Network layer
(b) Data link layer
(c) Physical layer
(d) Application layer
(e) Both (a) and (b)
Q27. which of the following indicated by double line in ER diagram?
(a) Total participation
(b) Multiple participation
(c) Cardinality
(d) Entity
(e) Partial participation
7 Adda247 | No. 1 APP for Banking & SSC Preparation Website:store.adda247.com | Email:[email protected]
Q28.Which clause is used to specify condition while retrieving data from table in SQL?
(a) WHERE
(b) LIKE
(c) HAVING
(d) Group By
(e) Order By
Q29. Which of the following is the correct syntax of UPDATE Command?
(a) UPDATE table_name where condition SET column_name = <value>;
(b) UPDATE table_name SET column_name = <value> WHERE <condition>;
(c) UPDATE table table_name set column_name = <value> WHERE <condition>;
(d) UPDATE IN table_name WHERE condition set column_name = <value>;
(e) UPDATE from table_name where condition set “column_name”=<value>;
Q30. What is the condition of page fault in operating system?
(a) the page is corrupted by application software
(b) the page is in main memory
(c) the page is not in main memory
(d) the tries to divide a number by 0
(e) When operating system not booted properly
Q31. Which of the following is used to translates internet domain and host names to IP address?
(a) DNS
(b) Routing Information Protocol
(c) Network Time Protocol
(d) Internet Relay chat
(e) Router
8 Adda247 | No. 1 APP for Banking & SSC Preparation Website:store.adda247.com | Email:[email protected]
Q32. Which of the following error occurs when software tries to access protected memory?
(a) Segmentation Fault
(b) Display time Error
(c) IO Error
(d) Runtime Error
(e) Page fault
Q33. Which of the following is not proper state of transaction?
(a) Partially aborted
(b) Partially committed
(c) Aborted
(d) Committed
(e) Active
Q34. 803.11 is use in which technology.
(a) Wireless LAN
(b) ARPANET
(c) ETHERNET
(d) BITNET
(e) None of these
Q35. Which of the following algorithms solves the all pair shortest path problem?
(a) Diskstra’s algorithm
(b) Floyd’s algorithm
(c) Prims algorithm
(d) Warshall’s algorithm
(e) None of these
Q36. A switch uses which type of address of machine to transfer data?
(a) MAC
(b) IP
(c) Header
(d) a & b
(e) None of these
Q37. Which command is use for sorting the table?
(a) Like
(b) Distinct
(c) Group By
(d) Order By
(e) None of these
9 Adda247 | No. 1 APP for Banking & SSC Preparation Website:store.adda247.com | Email:[email protected]
Q38. What is data integrity?
(a) It is the data contained in the database that is non- redundant.
(b) It is the data contained in the database that is accurate and consistent.
(c) It is the data contained in the database that is secured
(d) It is the data contained in the database that is shared
(e) None of these
Q39. Which tracking program records every keystroke you make on the computer?
(a) Key logger
(b) eFollow
(c) ITrack/ULead
(d) Stalking software
(e) None of these
Q40. Which of the following is the smallest unit of storage in oracle database?
(a) Control file
(b) Datafile
(c) Data Block
(d) Segment
(e) None of these
Q41. If requirements are easily understandable and defined then which model is best suited?
(a) Spiral model
(b) Waterfall model
(c) Prototyping model
(d) Incremental model
(e) None of these
Q42. A server farm is an example of_____
(a) Server clustering
(b) Redundant servers
(c) Multiple servers
(d) Server fault tolerance
(e) None of these
Q43. Which of the following is also known as PC Program Counter.
(a) Instruction pointer
(b) Memory pointer
(c) Data counter
(d) File pointer
(e) None of these
10 Adda247 | No. 1 APP for Banking & SSC Preparation Website:store.adda247.com | Email:[email protected]
Q44. Which C++ oops feature is related to re-usability?
(a) Encapsulation
(b) Inheritance
(c) Abstraction
(d) Polymorphism
(e) None of these
Q45. Which of the following is a technique of improving the priority of process waiting in Queue
for CPU allocation?
(a) Aging
(b) Starvation
(c) Revocation
(d) Relocation
(e) None of these
Q46. OLAP applications are widely used by________
(a) RDBMS
(b) JAVA
(c) Data Mining Technique
(d) Operating System
(e) Web server
Q47. Which one of the following is a cryptographic protocol used to secure HTTP connection?
(a) stream control transmission protocol (SCTP)
(b) transport layer security (TSL)
(c) explicit congestion notification (ECN)
(d) resource reservation protocol
(e) None of these
Q48. IP Address 168.2.7.6 belong to_____
(a) Class A
(b) Class B
(c) Class C
(d) Class D
(e) Class E
Q49. What is the port number of Post Office Protocol (POP3)?
(a) 119
(b) 23
(c) 25
(d) 110
(e) 123
11 Adda247 | No. 1 APP for Banking & SSC Preparation Website:store.adda247.com | Email:[email protected]
Q50. Which HTTP message shows " Service Unavailable"?
(a) 400
(b) 401
(c) 500
(d) 503
(e) 404
Q51. Proxy firewall sometimes known as:
(a) Packet filtering firewalls
(b) Circuit-level gateways
(c) Stateful inspection firewalls
(d) Application-level gateways
(e) Next-gen firewalls
Q52. Which of the following is a malicious program that enable
administrator level to a computer or computer network?
(a) Micro virus
(b) Logic bombs
(c) Rootkit
(d) Spyware
(e) Keyloggers
Q53. What is the main protocol used to access data on WWW?
(a) FTP
(b) HTML
(c) HTTP
(d) SMTP
(e) TFTP
Q54. Which UNIX command allows you to move and rename files?
(a) cd
(b) mv
(c) cp
(d) rm
(e) Is
Q55. What is the solution to starvation in priority scheduling?
(a) Raising Interrupts
(b) Predicting next CPU burst
(c) Aging
(d) Adjusting the value of time quantum
(e) None of these
12 Adda247 | No. 1 APP for Banking & SSC Preparation Website:store.adda247.com | Email:[email protected]
Q56. With SQL, how can you insert a new record into the "Persons" table?
(a) INSERT ('Swati', 'Purohit') INTO Persons
(b) INSERT VALUES ('Swati', 'Purohit') INTO Persons
(c) INSERT INTO Persons VALUES ('Swati', 'Purohit')
(d) INSERT (‘Swati’, ’Purohit’) VALUES INTO Person
(e) INSERT (‘Swati’, ’Purohit’) IN Person
Q57. Which of the following operation is used if we are interested in only certain columns of a
table?
(a) PROJECTION
(b) SELECTION
(c) UNION
(d) JOIN
(e) FROM
Q58. Which cloud computing service provided by Microsoft?
(a) Azure
(b) Elastic
(c) Smart
(d) Grid
(e) Web service
Q59. SRS in software engineering stand for:
(a) System recourses Specification
(b) System Recursive specification
(c) System requirement specification
(d) Software requirement specification
(e) None of these
Q60. Which level of database architecture is representing total view of database?
(a) Conceptual view
(b) Internal view
(c) External view
(d) Physical view
(e) Relational View
13 Adda247 | No. 1 APP for Banking & SSC Preparation Website:store.adda247.com | Email:[email protected]
Top Related