Saturday 20 October 2018

Network Multiplexing Quiz 1

1. The sharing of a medium and its link by two or more devices is called _________
a) Fully duplexing
b) Multiplexing
c) Both Fully duplexing and Multiplexing
d) None of the mentioned

2. Multiplexing is used in _______
a) Packet switching
b) Circuit switching
c) Data switching
d) None of the mentioned

3. Which multiplexing technique transmits digital signals ?
a) FDM
b) TDM
c) WDM
d) None of the mentioned

4. If there are n signal sources of same data rate than TDM link has _______ slots
a) n
b) n/2
c) n*2
d) 2n

5. If link transmits 4000frames per second, and each slot has 8 bits,the transmission rate of circuit this TDM is
a) 32kbps
b) 500bps
c) 500kbps
d) None of the mentioned

Answer
1 b
2 a
3 b
Explanation: FDM and WDM are used in analog signals.
4 a
Explanation: Each slot is dedicated to one of the source.
5 a
Explanation: Transmission rate= frame rate * number of bits in a slot.

6. The state when dedicated signals are idle are called
a) Death period
b) Poison period
c) Silent period
d) None of the mentioned

7. Multiplexing can provide
a) Efficiency
b) Privacy
c) Anti jamming
d) Both Efficiency & Privacy

8. In TDM, the transmission rate of the multiplexed path is usually _______ the sum of the transmission rates of the signal sources.
a) Greater than
b) Lesser than
c) Equal to
d) Equal to or greater than

9. In TDM, slots are further divided into
a) Seconds
b) Frames
c) Packets
d) None of the mentioned

Answer
6 c
7 d
8 a
9 b

Network Topology Quiz 1

1. Physical or logical arrangement of network is
a) Topology
b) Routing
c) Networking
d) None of the mentioned

2. In this topology there is a central controller or hub
a) Star
b) Mesh
c) Ring
d) Bus

3. This topology requires multipoint connection
a) Star
b) Mesh
c) Ring
d) Bus

4. Data communication system spanning states, countries, or the whole world is
a) LAN
b) WAN
c) MAN
d) None of the mentioned

Answer
1 a
2 a
3 d
4 b
Explanation: Wide area network(WAN) covers the whole of the world network.

5. Data communication system within a building or campus is
a) LAN
b) WAN
c) MAN
d) None of the mentioned

6. Expand WAN
a) World area network
b) Wide area network
c) Web area network
d) None of the mentioned

7. In TDM, slots are further divided into
a) Seconds
b) Frames
c) Packets
d) None of the mentioned

8. Multiplexing technique that shifts each signal to a different carrier frequency
a) FDM
b) TDM
c) Both FDM & TDM
d) None of the mentioned

Answer
5 a
6 b
7 b
8 a
Explanation: FDM stands for Frequency division multiplexing.

IT OS PROCESSES 1

1. The systems which allows only one process execution at a time, are called
a) uniprogramming systems
b) uniprocessing systems
c) unitasking systems
d) none of the mentioned

2. In operating system, each process has its own
a) address space and global variables
b) open files
c) pending alarms, signals and signal handlers
d) all of the mentioned

3. In Unix, Which system call creates the new process?
a) fork
b) create
c) new
d) none of the mentioned

4. A process can be terminated due to
a) normal exit
b) fatal error
c) killed by another process
d) all of the mentioned

5. What is the ready state of a process?
a) when process is scheduled to run after some execution
b) when process is unable to run until some task has been completed
c) when process is using the CPU
d) none of the mentioned

Answer:
1. b
Explanation: Those systems which allows more than one process execution at a time, are called multiprogramming systems. Uniprocessing means only one processor.
2. d
3. a
4. d
5. a
Explanation: When process is unable to run until some task has been completed, the process is in blocked state and if process is using the CPU, it is in running state.

6. What is interprocess communication?
a) communication within the process
b) communication between two process
c) communication between two threads of same process
d) none of the mentioned

7. A set of processes is deadlock if
a) each process is blocked and will remain so forever
b) each process is terminated
c) all processes are trying to kill each other
d) none of the mentioned

8. A process stack does not contain
a) Function parameters
b) Local variables
c) Return addresses
d) PID of child process

9. Which system call returns the process identifier of a terminated child?
a) wait
b) exit
c) fork
d) get

10. The address of the next instruction to be executed by the current process is provided by the
a) CPU registers
b) Program counter
c) Process stack
d) Pipe

Answer:
6. b
7. a
8. d
9. a


10. b

Friday 19 October 2018

IT OS BASIC QUIZ 1

1. What is operating system?

a) collection of programs that manages hardware resources

b) system service provider to the application programs

c) link to interface the hardware and application programs

d) all of the mentioned

2. To access the services of operating system, the interface is provided by the

a) System calls

b) API

c) Library

d) Assembly instructions

3. Which one of the following is not true?

a) kernel is the program that constitutes the central core of the operating system

b) kernel is the first part of operating system to load into memory during booting

c) kernel is made of various modules which can not be loaded in running operating system

d) kernel remains in the memory during the entire computer session


4. Which one of the following error will be handle by the operating system?

a) power failure

b) lack of paper in printer

c) connection failure in the network

d) all of the mentioned


5. The main function of the command interpreter is

a) to get and execute the next user-specified command

b) to provide the interface between the API and application program

c) to handle the files in operating system

d) none of the mentioned

Answer:
1. d
2. a
3. c
4. d
5. a

6. By operating system, the resource management can be done via

a) time division multiplexing

b) space division multiplexing

c) both time and space division multiplexing

d) none of the mentioned

7. If a process fails, most operating system write the error information to a ______

a) log file

b) another running process

c) new file

d) none of the mentioned

8. Which facility dynamically adds probes to a running system, both in user processes and in the kernel?

a) DTrace

b) DLocate

c) DMap

d) DAdd

9. Which one of the following is not a real time operating system?

a) VxWorks

b) Windows CE

c) RTLinux

d) Palm OS

10. The OS X has ____________

a) monolithic kernel

b) hybrid kernel

c) microkernel

d) monolithic kernel with modules

Answer:
6. c
7. a
8. a
9. d
10. b

Thursday 18 October 2018

IT QUIZ RANDOM MEGA 1

1. The tracks on a disk which can be accused without repositioning the R/W heads is

a. Surface
b. Cylinder
c. Cluster
d. All of these
e. None of these

Ans : b

2. Which of the following is true about GUIs ?

a. They make computers easier to use for non professionals
b. They use icons and menus that users can select with a mouse
c. Both a and b
d. All of these
e. None of these

Ans : c

3. A computer system consisting of its processor, memory and I/O devices accepts data, processes it and produces the output results. Can you tell in which component is the raw data fed ?

a. Mass Memory
b. Main Memory
c. Logic Unit
d. Arithmetic Unit
e. None of these

Ans : b

4. The mechanical diskette drive in which you insert your diskette is connected to the computer's ________ bus

a. Data
b. Communication
c. Address
d. Parallel
e. None of these

Ans : b

5. A set of programs that handle firm's database responsibilities is called a

a. Data Base Management System (DBMS)
b. Data Base Processing System (DBPS)
c. Data Management System (DMS)
d. All of these
e. None of these

Ans : d

6. You are in the process of analyzing a problem that requires you to collect and store TCP/IP Packets. Which of the following utilities is best suited for this purpose ?

a. NBTSTAT
b. Performance Monitor
c. NETSTAT
d. Network Monitor
e. DHCP Management Console

Ans : d

7. A top to bottom relationship among the items in a database is established by a

a. Hierarchical Schema
b. Network Schema
c. Relational Schema
d. All of these
e. None of these

Ans : a

8. The process of transferring data intended for a peripheral device into a disk (or intermediate store) so that it can be transferred to peripheral at a more convenient time or in bulk is known as

a. Multi Programming
b. Spooling
c. Caching
d. Virtual Programming
e. None of these

Ans : b

9. Which of the following system program forgoes the production of object code to generate absolute machine code and load it into the physical main storage location from which it will be executed immediately upon completion of the assembly ?

a. Two pass assembler
b. Load and go assembler
c. Macro processor
d. Compiler
e. None of these

Ans : b

10. Relocation bits used by relocating loader are specified (generated) by

a. Relocating loader itself
b. Linker
c. Assembler or translator
d. Macro Processor
e. None of these

Ans : b

11. From what location are the 1st computer instructions available on boot up ?

a. ROM BIOS
b. CPU
c. Boot.ini
d. CONFIG.SYS
e. None of these

Ans : a

12. Abstraction is __________

a. The act of representing the essential features of something without including much detail
b. The act of representing the features of something much detail
c. A tree structure
d. All of these
e. None of these

Ans : a

13. Aggregation is a special form of _____

a. Generalization
b. Spectalization
c. Association
d. Object
e. None of these

Ans : c

14. Consider an operation of addition. For two numbers, the operating will generate a sum. If the operand are strings and the same operation would produce a third string by concatenation. This feature is called

a. Inheritance
b. Encapsulation
c. Polymorphism
d. Binding
e. None of these

Ans : c

15. In E - R diagrams, the term cardinality is a synonym for the term ___

a. Attribute
b. Degree
c. Entities
d. Cartesian
e. None of these

Ans : b

16. An oracle server index ____

a. Is a schema object
b. Is used to speed up the retrieval of rows by using a pointer
c. Is independent of the table it indexes
d. All of these
e. None of these

Ans : d

17. Which of the following is not a context free grammar components ?

a. Terminal symbols
b. Non termincal symbol
c. Production line
d. List
e. None of these

Ans : d

18. Which of the following is a phase of RAD model ?

a. Business modeling
b. Data modeling
c. Application generation
d. All of these
e. None of these

Ans : d

19. ______ is a set design steps that allows a DFD with transform flow characteristics to be mapped into a predefined template for program structure.

a. Transaction flow
b. Contributor
c. Transform mapping
d. Design evaluation
e. None of these

Ans : c

20. A combinational logic circuit which is used to send data coming from a single source to two or more separate destinations is called as

a. Decoder
b. Encoder
c. Multiplexer
d. Demultiplexer
e. None of these

Ans : d

21. Which of the following is a Universal Gate ?

a. AND
b. OR
c. EX - OR
d. NAND
e. None of these

Ans : d

22. The 2's compliment of binary number 010111.1100 is

a. 101001.1100
b. 101000.0100
c. 010111.0011
d. 101000.0011
e. None of these

Ans : b

23. In 8086, the overflow flag is set when

a. The sum is more than 16 bits
b. Signed numbers go out their range after an arithmetic operation
c. Carry and sign flags are set
d. During subtraction
e. None of these

Ans : b

24. What does mircro processor speed depends on ?

a. Clock
b. Data bus width
c. Address bus width
d. All of these
e. None of these

Ans : c

25. The TRAP is one of the interrupts available its INTEL 8086. Which one statement is true of TRAP ?

a. It is level triggered
b. It is negative edge triggered
c. It is positive edge triggered
d. It is both positive edge triggered and level triggered
e. None of these

Ans : d

26. A special type gateway that can keep external users from accessing resources on the LAN users access the external info is called _____

a. Repeater
b. Firewall
c. Encryption
d. Hub
e. None of these

Ans : b

27. What is the name given to the exchange of control signals which is necessary for establishing a connection between a modem and a computer at one end of a line and another modem and computer at the other end ?

a. Handshaking
b. Modem Options
c. Protocol
d. All of these
e. None of these

Ans : a

28. In SQL, which command is used to change data in a data table ?

a. UPDATE
b. INSERT
c. BROWSE
d. APPEND
e. None of these

Ans : a

29. In SQL, which of the following is not a data definition language command ?

a. RENAME
b. REVOKE
c. GRANT
d. UPDATE
e. None of these

Ans : d

30. Which command(s) is(are) used to redefine a column of the table in SQL ?

a. ALTER TABLE
b. DEFINE TABLE
c. MODIFY TABLE
d. All of these
e. None of these

Ans : a

31. In a relational schema, each tuple is divided into fields called

a. Relations
b. Domains
c. Queries
d. All of the these
e. None of these

Ans : b

32. An indexing operation

a. Sorts a file using a single key
b. Sorts file using two keys
c. Establishes an index for a file
d. Both a and c
e. None of these

Ans : c

33. Data security threats include

a. Hardware failure
b. Privacy invasion
c. Fraudulent manipulation of data
d. All of these
e. None of these

Ans : b

34. The language used in application programs to request data from the DBMS is referred to as the

a. DML
b. DDL
c. Query Language
d. DCL
e. None of these

Ans : a

35. A________ contains the smallest unit of meaningful data, so you might call it the basic building block for a data file.

a. File Structures
b. Records
c. Fields
d. Data base
e. None of these

Ans : c

36. A ______ means that one record in a particular record type is related to only one record of another record type.

a. One-to-one relationship
b. One-to-many relationship
c. Many-to-one relationship
d. Many-to-many relationship
e. None of these

Ans : a

37. Through linked list one can implement ____

a. Stack
b. Graph
c. Queue
d. All of these
e. None of these

Ans : d

38. A heap allows a very efficient implementation of a ____

a. Double ended queue
b. Priority queue
c. Stack
d. Trees
e. None of these

Ans : b

39. In files, there is a key associated with each record which is used to differentiate among different records. For every file there is atleast one set of keys that is unique. Such a Key is called ____

a. Unique Key
b. Prime attribute
c. Index key
d. Primary Key
e. Null key

Ans : d

40. _____ is primarily used for mapping host names and email destinations to IP address but can also be used for other purposes

a. TCP (Transfer Control Protocol)
b. DNS (Domain Name System)
c. SHA (Secure Hash Algorithm)
d. Simple Network Management Protocol (SNMP)
e. None of these

Ans : b

41. Override is a method ____

a. For an operation that replaces an inherited method for the same operation
b. For a data that replaces an inherited method for the same operation
c. For an operation that takes arguments from library function
d. All of these
e. None of these

Ans : a

42. Local Variables ______

a. Are created outside a block
b. Are known only to that block
c. Continue to exist when their block ends
d. Are illegal in C++
e. None of these

Ans : b

43. ______ is virus that inserts itself into a system's memory. Then it take number of actions when an infected file is executed.

a. Web scripting virus
b. Polymorphic Virus
c. Macro virus
d. Boot sector virus
e. Resident virus

Ans : e

44. This _____ data mining technique derives rules from real world case examples.

a. Waterfall model
b. RAD
c. White Box
d. Spiral model
e. Case based reasoning

Ans : e

45. The ____ model remains operative until the software is required.

a. Waterfall model
b. Incremental model
c. Spiral model
d. Prototyping model
e. Incremental model

Ans : c

46. Data mining evolve as a mechanism to cater the limitations of ____ systems to deal massive data sets with high dimensionality, new data type, multiple heterogeneous data resource etc..

a. OLTP
b. OLAP
c. DSS
d. DWH
e. None of these

Ans : a

47. An important application of cryptography, used in computerized commercial and financial transaction ____

a. Data mining
b. Data warehousing
c. Digital signature
d. Media convergence
e. None of these

Ans : c

48. Rows of a relation are called __

a. Relation
b. Tuples
c. Data structure
d. An entity
e. None of these

Ans : b

49. The drawbacks of the binary tree sort are remedied by the

a. Linear sort
b. Quick sort
c. Heap Sort
d. Insertion sort
e. None of these

Ans : c

50. Which layer of OSI determines the interface of the system with the user ?

a. Network
b. Application
c. Data link
d. Session
e. None of these

Ans : b

Wednesday 17 October 2018

IT DBMS QUIZ 8

1.Sort/report generators
A.   are faster than index/report generators
B.   require more disk space than index/report generators
C.   do not need to sort before generating a report
D.   both (a) and (b)
E.   None of the above

2.The data dictionary tells the DBMS
A.   what files are in the database
B.   what attribute are possessed by the data
C.   what these files contain
D.   All of the above
E.   None of the above

3.In SQL, which command(s) is(are) used to enable/disable a database trigger?
A.   MODIFY USER
B.   CHANGE USER
C.   ALTER TRIGGER
D.   All of the above
E.   None of the above

4.If the record management system allows you to edit values before they are recorded on disk, you can
A.   correct spelling changes before they are recorded
B.   change the name of a field
C.   change the width of a field
D.   All of the above
E.   None of the above

5.The relational model uses some unfamiliar terminology. A tuple is equivalent to a:
A.   record
B.   field
C.   file
D.   data base
E.   data item

Answer
1 A
2 D
3 C
4 A
5 A

6.The files stored on a secondary stage device are composed of a hierarchy of data. What does a record in a file contain?
A.   Bits
B.   Characters
C.   Data field
D.   Schema
E.   None of the above

7.Which command is used to remove an index from the database in SQL?
A.   DELETE INDEX
B.   DROP INDEX
C.   REMOVE INDEX
D.   ROLL BACK INDEX
E.   None of the above

8.An-owner-member set in the CODASYL specifications may have
A.   only one owner but many owner occurrences
B.   only one member but many member occurrence
C.   more than one member but only one occurrence per member
D.   All of the above
E.   None of the above

9.What is the name given to the database management system which is able to handle full text data, image data, audio and video?
A.   Full media
B.   Graphics media
C.   Multimedia
D.   Hypertext
E.   None of the above

10.A top-to-bottom relationship among the items in a database is established by a
A.   Hierarchical schema
B.   Network schema
C.   Relational schema
D.   All of the above
E.   None of the above

Answer
6 C
7 B
8 A
9 C
10 A

IT DBMS QUIZ 7

1.A report generator is used to
A. update files
B. print files on paper
C. data entry
D. All of the above
E. None of the above

2. Which of the following is not a logical data-base structure?
A. tree
B. relational
C. network
D. chain
E. All of the above

3.Which of the following is a database administrator's function?
A. database design
B. backing up the database
C. performance monitoring
D. user coordination
E. All of the above

4.Primitive operations common to all record management systems include
A. Print
B. Sort
C. Look-up
D. All of the above
E. None of the above

5.Each of data files has a _____ that describe the way the data is stored in the file.
A. File structure
B. Records
C. Fields
D. Database
E. None of the above

Answer :
1. B
2. D
3. D
4. C
5. D

6.After you _____ a record, many data management the environments require you to issue a command to save the changes you made.
A.   Delete
B.   Update
C.   Sort key
D.   Index
E.   None of the above

7.What is the language used by most of the DBMSs for helping their users to access data?
A.   High level language
B.   Query language
C.   SQL
D.   4GL
E.   None of the above

8.Data item characteristics that are important in data management include
A.   punctuation
B.   language
C.   spelling
D.   width
E.   None of the above

9.In SQL, which command is used to make permanent changes made by statements issue since the beginning of a transaction?
A.   ZIP
B.   PACK
C.   COMMIT
D.   SAVE
E.   None of the above

10.Periodically adding, changing and deleting file records is called file
A.   Updating
B.   upgrading
C.   restructuring
D.   renewing
E.   None of the above

Answer :
6 B
7 B
8 D
9 C
10 A

Tuesday 16 October 2018

IT DBMS QUIZ 6

1)The shared pool is also able to support ________ in data warehousing applications.
A. Unshared SQL
B. Stored SQL
C. Unsorted SQL
D. Shared SQL
E. None of these

2)An important purpose of the shared pool is to cache the executable versions of _________ statements.
A. SQL
B. PL/SQL
C. Both (A) and (B)
D. MS ACESS
E. None of these

3)___________ Database is the only database specifically designed as an Internet development and deployment platform
A. Oracle 8i
B. Oracle 9i
C. Oracle 6i
D. Oracle 7i
E. None of these

4)Oracle9i Reports is the solution of _______
A. Paper publishing
B. Web publishing
C. Both (A) and (B)
D. Publishing is not possible
E. None of these

5)When a query is submitted to oracle server for execution, oracle checks if same query has been executed previously. If found the same then this event is known as ________
A. Library cache hit
B. Soft parsing
C. Both (A) and (B)
D. Redo log
E. None of these

Answers:
1)a
2)c
3)b
4)c
5)c

6)The ________ performs recovery when a failed instance starts up again.
A. Log Writer(LGWR)
B. Checkpoint(CKPT)
C. Process Monitor(PMON)
D. System Monitor(SMON)
E. None of these

7) Oracle9i Reports gives us _______options for building a Web report.
A. two
B. three
C. four
D. five
E. None of these

8)Which of the following is an example for Embedded SQL Statement?
A. ROLLBACK
B. SETROLE
C. ALTER SYSTEM
D. FETCH
E. None of these

9)Oracle Database segregates a small amount of the shared pool for large objects(Over 5KB).The segregated area of the shared pool is called ______
A. Fixed Pool
B. Allocated Pool
C. Reserved Pool
D. All of the above
E. None of the above

10)The ______ process is used for inter-instance locking in Real Application Clusters.
A. Lock Manager Server
B. Back Manager Server
C. Front Manager Server
D. Administration Manager
E. None of these

Answers:
6)d
7)a
8)d
9)c
10)a

IT QUIZ DBMS 5

1)Which JDBC driver Type(s) can be used in either applet or servlet code?
a)Both Type 1 and Type 2
b)Both Type 1 and Type 3
c)Both Type 3 and Type 4
d)Type 4 only

2)________ is considered to be one of the foundations of data access in the Microsoft world.
a)ODBC
b)OLE DB
c)JPCD
d)ADO

3)What is sent to the user via HTTP, invoked using the HTTP protocol on the user’s computer, and run on the user’s computer as an application?
a)A Java application
b)A Java applet
c)A Java servlet
d)None of the above is correct.

4)A snowflake schema is which of the following types of tables?
a)Fact
b)Dimension
c)Helper
d)All of the above

5)The most popular way to materialize XML documents is to use:
a)DTD.
b)XSLT.
c)HTML.
d)SOAP.

Answers:
1)c
2)b
3)b
4)d
5)b

6)In OLE DB, actions that an object can perform are called:
a)properties.
b)collections.
c)methods.
d)abstractions.

7)A star schema has what type of relationship between a dimension and fact table?
a)Many-to-many
b)One-to-one
c)One-to-many
d)All of the above.

8)How many copies of a JSP page can be in memory at a time?
a)One
b)Two
c)Three
d)Unlimited

9)If the XML data instance conforms to the DTD, the document is said to be:
a)type-invalid.
b)type-valid.
c)not-type-valid.
d)an HTML document.

10)When using ODBC, which of the following serves as an intermediary between the application and the DBMS drivers?
Aa)Data source
b)Driver
c)Driver manager
d)OLE DB

Answers:
6)c
7)c
8)a
9)b
10)c

IT QUIZ DBMS 4

1)Which privilege is required to create a database?
(A) SYSDBA
(B) DBA
(C) SYSOPER
(D) RESOURCE

2)Which Normal Form(NF) is considered adequate for normal relational database design?
(A) 2NF
(B) 5NF
(C) 4NF
(D) 3NF

3)A Foreign key in one table points to a ________ key in another table.
(A) Alternate
(B) Default
(C) Primary
(D) None of the above

4)In SQL, the spaces at the end of the string are removed by _______ function 
(A) Lower
(B) String
(C) Trim
(D) None of the above

5)The highest level in the hierarchy of data organization is called________
(A) data base
(B) data file
(C) data record
(D) None of the above

Answers:
1)a
2)d
3)c
4)c
5)a

6)_______ is the process of organizing data into related tables.
(A) Generalization
(B) Normalization
(C) Specialization
(D) None of the above

7)Which of the following keyword can be used to return different values?
(A) SELECT
(B) GET
(C) OPEN
(D) DISTINCT

8)Which of the following field type is used to store photograph of employees?
(A) Memo
(B) Picture
(C) OLE
(D) Photo

9)Which of the following is standard interactive and programming language for getting information from and updating a database.
(A) SQL
(B) PHP
(C) ASP
(D) None of the above

10)Which TCL command is used to permanently save any transaction into database?
(A) rollback
(B) savepoint
(C) commit
(D) None of the above

Answers:
6)b
7)d
8)c
9)a
10)c

IT QUIZ DBMS 3

1)Each block of B tress of order ‘n’ can have
a)n-1 key values, and n pointers
b)n+1 key values, and n pointers
c)n key values, and n+1 pointers
d)Cannot be determined

2)Which normal form is considered adequate for relational database design?
a)2NF
b)3NF
c)4NF
d)BCNF

3)The concept of locking can be used to solve the problems of 
a)Lost Updates
b)Uncommited dependency
c)Inconsistent data
d)All of the above

4)When the number of buckets or the bucket address range changes with file, it is called 
a)Hashing
b)Extendable Hashing
c)Inverted index Hashing
d)None of the above

5)Blocking factor is applicable for ………….. organization
a)Spanned
b)Un-spanned
c)Both
d)None

Answers:
1)a
2)b
3)d
4)b
5)b

6)A correlate sub-query always executes in
a)Top-Bottom
b)Bottom-Top
c)Top-Bottom-Top
d)None of these

7)Access time in B+ trees 
a)Varies
b)Constant
c)Cannot say
d)Both a and b

8)The five aggregation operations in SQL is 
a)SUM, AVG, IN ALL, ANY
b)SUM, AVG, MIN, MAX, DISTINCT
c)SUM, AVG, MIN,MAX,COUNT
d)SUM, AVG,IN, DISTINCT,COUNT

9)Deadlock in database system is an example of…
a)User error
b)Consistency error
c)System error
d)None of these

10)Which language is used to define the integrity constraints?
a)DDL
b)DML
c)DCL
d)None of these

Answers:
6)c
7)b
8)c
9)c
10)a

IT QUIZ DBMS 2

1)Locking may cause which of the following problems?
a)Deadlock
b)Versioning
c)Versioning & deadlock
d)Erroneous updates
e)Erroneous updates and deadlock

2)Which of the following are placeholders for literal values in a SQL query being sent to the database?
a)reduction and resolution variables
b)resolution variables
c)reduction variables
d)assimilation variables
e)bind variables

3)What is meant by type in RDBMS?
a)Domain
b)Range
c)Named set of value
d)Both a and c
e)None of these

4)What are the function of DCL?
a)handling the authorization aspects of data
b)permitting the user to control who has access to see or manipulate data within the database
c)both a and b
d)a only
e)None of these

5)Which database level is closest to the users?
a)External
b)Internal
c)Physical
d)Conceptual
e)None of these

Answers:
1)a
2)e
3)d
4)c
5)a

6)Fifth Normal Form is concerned with
a)Functional dependency
b)Multi-valued Dependency
c)Join Dependency
d)Domain Key
e)None of these

7)In E-R diagram, the term cardinality is a synonym for the term………
a)Attributes
b)Degree
c)Entities
d)Cartesian
e)None of these

8)Rows of a relation are called:
a)Relation
b)Tuples
c)Data Structures
d)An entity
e)None of these

9)An Oracle server index———
a)Is a schema object
b)Is used to speed up the retrieval of rows by using a pointer
c)Is independent of the table its indexes
d)All of the above
e)None of these

10)In Oracle, what is the default number of transactions that MAXTRANS is set to if not specified?
a)512
b)10
c)40
d)1
e)255

Answers:
6)c
7)b
8)b
9)d
10)e

IT QUIZ DBMS 1


1)A set of programs that handle firm’s database responsibilities is called a
a)Database Management System(DBMS)
b)Database Processing System(DBPS)
c)Data Management System(DMS)
d)All of the above
e)None of these

2)Which of the following is used with database?
a)EDI
b)Credit card
c)ATM
d)Payment Gateway
e)Data mining

3)In Oracle, who owns the data dictionary?
a)Oracle
b)SYS
c)The DBA
d)System
e)None of these

4)The language used in application programs to request data from the DBMS is referred to as the
a)DML
b)DDL
c)Query Language
d)DCL
e)None of these

5)An indexing operation
a)Sorts a file using a single key
b)Sorts file using two keys
c)Establishes an index for a file
d)Both a and c
e)None of these

Answers:
1)d
2)e
3)b
4)a
5)c

6)In SQL, which command is used to changes data in a data table?
a)Update
b)Insert
c)Browse
d)Append
e)None of these

7)An Oracle server index……..
a)Is a schema object
b)Is used to speed up the retrieval of rows by using a pointer
c)Is independent of the table it indexes
d)All of the above
e)None of these

8)Aggregation is special form of ……..
a)Object
b)Specialization
c)Generalization
d)Association
e)None of these

9)Which command is used to redefine a column of the table in SQL?
a)Alter Table
b)Modify Table
c)All of the Above
d)Define Table
e)None of these

10)Data mining evolve as a mechanism to cater the limitations of ……….system to deal massive data sets with high dimensionality, new data type, multiple heterogenous data resources etc.
a)OLTP
b)OLAP
c)DSS
d)DWH
e)None of these

Answers:
6)a
7)d
8)d
9)a
10)a

IT QUIZ Random 2

1)When a web page is loading, and the user presses a button on the browser to stop loading the page :
a) the thread loading the page continues with the loading
b) the thread loading the page does not stop, but continues with another task
c) the thread loading the page is paused
d) the thread loading the page is cancelled
e) None of these

2) When one thread immediately terminates the target thread, it is called :
a) Asynchronous cancellation
b) Systematic cancellation
c) Sudden Termination
d) Deferred cancellation
e) None of these

3) When the target thread periodically checks if it should terminate and terminates itself in an orderly manner, it is called :
a) Asynchronous cancellation
b) Systematic cancellation
c) Sudden Termination
d) Deferred cancellation
e) None of these

4) The wait operation of the semaphore basically works on the basic _______ system call.
a) stop()
b) block()
c) hold()
d) wait()
e) None of these

5) The signal operation of the semaphore basically works on the basic _______ system call.
a) continue()
b) wakeup()
c) getup()
d) start()
e) None of these

6) The interrupt vector contains :
a) the interrupts
b) the memory addresses of specialized interrupt handlers
c) the identifiers of interrupts
d) the device addresses
e) None of these

7) An absolute path name begins at the :
a) leaf
b) stem
c) current directory
d) root
e) None of these

8) A relative path name begins at the :
a) leaf
b) stem
c) current directory
d) root
e) None of these

9) When two users keep a subdirectory in their own directories, the structure being referred to is :
a) tree structure
b) cyclic graph directory structure
c) two level directory structure
d) acyclic graph directory
e) None of these

10) Many systems recognize three classifications of users in connection with each file (to condense the access control list) :
a) Owner
b) Group
c) Universe
d) All of the mentioned
e) None of these

Answers:
1)d
2)a
3)d
4)b
5)b
6)b
7)d
8)c
9)d
10)d

IT QUIZ Random 1

1)Which of the following cables is also known as a Ethernet Cable?
a)CAT 1
b)CAT 2
c)CAT 4
d)CAT 5
e)CAT 5

2)Name the location where the operands of zero address instruction method get stored.
a)Accumulators
b)Registers
c)Push Down Stack
d)Cache
e)None of these

3)The physical address can be retrieved from the logical address provided by CPU by using
a)TLB
b)MAR
c)MMU
d)Overlays
e)None of these

4)Two cellphones can transfer data to each other using Bluetooth technology.Which type of network they establish to transfer data?
a)WAN
b)PAN
c)MAN
d)LAN
e)None of these

5)A software that is used to convert high level language into machine language is known as a/an….
a)Compiler
b)Interpreter
c)Assembler
d)Both 2 and 3
e)None of these

6)Which of the following language is a client-side scirpting language?
a)Javascript
b)C++
c)C
d)C#
e)Java

7)Which of the following files are created by websites on a user’s computer to recognise him/her on revisits?
a)Cookies
b)Kitkat
c)Marshmallow
d)Lollipop
e)None of these

8)Which of the following connectors is used as a phone connectors?
a)RJ 11
b)RJ 10
c)RJ 45
d)RJ 41
e)RJ 30

9)Which type of data structure is used to represent internal storage of data in RDBMS efficiently?
a)Linked List
b)B+ Tree
c)Circular Queues
d)Stack
e)None of these

10)Whenever an interrupt is detected by CPU,which of the following action is taken by it?
a)Completes it
b)Discards it
c)Depends on CPU
d)Saves it
e)None of these

Answers:
1)a
2)c
3)c
4)b
5)a
6)a
7)a
8)a
9)b
10)d