1. Which module gives control of the CPU to the process selected by the short-tern scheduler?
(A) Dispatcher (B) interrupt
(C) Scheduler (D) None of these
2. The processes that are residing in main memory for execution are kept on a list called:
A) Job queue
B) Ready queue
C) Execution queue
D) Process queue
3. The interval from the time of submission of a process to the time of completion Is termed as:
(A) Waiting time (B) Turnaround time
(C) Response time (0) Throughput
4. Which scheduling algorithm allocates the CPU first to the process that requests the CPU first?
(A First-come first-served scheduling
(B Shortest Job scheduling
(C Priority scheduling
(D None of these
5. In priority scheduling algorithm:
(A) CPU is allocated to the process with highest priority
(B) CPU is allocated to the 'process with lowest priority
(C) Equal priority processes cannot be scheduled
(D) None of these
6. In priority scheduling algorithm, when a process arrives at the ready queue, its priority Is compared with the priority of:
A) All process
B) Currently running process
C) Parent process
D) Init process
7. Time quantum is defined in:
A) Shortest job scheduling algorithm
B) Round robin scheduling algorithm
C) Priority scheduling algorithm
D) Multilevel queue scheduling algorithm
8. In multilevel feedback scheduling algorithm;
(A) A process can move to a different classified ready queue
(B) Classification of ready queue is permanent
(C) Processes are not classified into groups
(D) None of the mentioned
9. Which one of the following cannot be scheduled by the kernel?
A) Kernel level thread
B) User level thread
C) Process
D) None of these
10. A process refers to 5 pages, A, B, C, D, E in the order: A, B, C, D, A, B, E, A, B, C, D, E. If the page replacement algorithm is FIFO, the number of page transfers with an empty Internal store of 3 frames Is:
(A)8
(B) 10
(C) 9
(D) 7
11. A memory page containing a heavily used variable that was Initialized very early and Is in constant use is remove and then the page replacement algorithm used is:
(A LRU (B) LFU
(C FIFO (0) None of these
12. Users are______ that their processes are running on a paged system.
(A) Aware (B) Unaware
(C) informed (D) None of these
13. The aim of creating page replacement algorithms is to:
A) Replace pages faster
B) Increase the page fault rate
C) Decrease the page fault rate
D) To allocate multiple pages to processes
14. A FIFO replacement algorithm associates with each page the
A) Time It was brought into memory
B) Size of the page in memory
C) Page after and before it
D) All of these
15. Optimal page - replacement algorithm is:
(A) Replace the page that has not been used for a long lime
(B) Replace the page that has been used for a long time
(C) Replace the page that will not be used for a long time
(D) None of these
16. Optimal page - replacement algorithm is difficult to implement, because:
(A) It requires a lot of Information
(B) It requires future knowledge of the reference string
(C) It is too complex
(D) It Is extremely expensive
17. LRU page - replacement algorithm associates with each page the
(A) Time it was brought into memory
(B) The time of that page s last use
(C) Page after and before it
(D) All of these
18. For 3 page frames, the following is the reference string: 701 20 3 0 4 2 3 0 3 2 1 2 0 1 7 0 1; How many page faults does the LRU page replacement algorithm produce?
(A) 10 (B) 15
(C) 11 (D) 12
19. CPU fetches the Instruction from memory according to the value of:
(A) Program counter
(B) Status register
(C) Instruction register
(D) Program status word
20. A memory buffer used to accommodate a spood differential Is called:
(A) Slack pointer(B) Cache
(C) Accumulator (D) Disk buffer
21. Which one of the following is the address generated by CPU?
A) Physical address
B) Absolute address
C) Logical address
D) None of these
22. Run time mapping from virtual to physical address is done by:
(A) Memory management unit
(B) CPU
(C) PCI
(D) None of these
23. Memory management technique In which system stores and retrieves data from secondary storage for use In main memory Is called:
(A) Fragmentation (B) Paging
(C) Mapping (D) None of these
24. The Interrupt-request line Is a part of the:
(A) Data line (B) Control line
(C) Address line (D) None of these
25. The return address from the Interrupt-service routine is stored on the:
(A) System heap (B) Processor register
(C) Processor slack (0) Memory
26. The signal sent to the device from the processor to the device after receiving an interrupt Is:
(A) interrupt-acknowledge
(B) Return signal
(C) Service signal
(D) Permission signal
27. A relational database consists of a collection of:
(A) Tables (B) Fields
(C) Records (D) Keys
28. A ______In a table represents relationship among a set of values.
(A) Column (B) Key
(C) Row (D) Entry
29. The term _____ Is used to refer to a row.
(A) Attributes
(B) Tuple
(C) Fields
(D) Instance
30. The term attribute refers to a _____ of table.
(A) Record (B) Column
(C) Tuple (D) Key
31. For each attribute of a relation, there Is a set of permitted values, called the ____ of that attribute.
(A) Domain (B) Relation
(C) Set (D) Schema
32. Which of the following is a tuple-generating dependency?
(A) Functional dependency
(B) Equality-generating dependencies
(C) Multi-valued dependencies
(D) Non-functional dependency
33. The main teak carried out In the _____ Is to remove repeating attributes to separate tables.
(A) First Normal Form
(B) Second Normal Form
(C) Third Normal Form
(D) Fourth Normal Form
34. Which of the normal form is based on multi valued dependencies?
(A) First (B) Second
(C) Third (D) Fourth
35. Which forms has a relation that possesses data about an Individual entity?
(A) 2NF (B) 3NF
(C) 4NF (D) 5NF
36. Which of the following has each related entity set has Its own schema and there is an additional schema for the relationship set?
(A) A many-to-many relationship set
(B) A multi-valued attribute of an entity set
(C) A ore-to-many relationship set
(D) Both A and B
37. In which of the following, a separate schema Is created consisting of that attribute and the primary key of the entity set?
(A) one-to-many relationship set
(B) A multi valued attribute of an entity set
(C)
(D) Both A and B
38. In 2NF:
(A) No functional dependences (FDs) exist(
(B) No multi-valued dependencies (MVDs)
(C) No partial FDs exist.
(D) No partial MVDs exist.
39. Can help us detect poor E-R Design
A) Database Design Process
B) E-R Design Process
C) Relational scheme
(D) Functional dependencies
40. Build & Fix Model Is suitable for programming exercises of LOC (Line of Code).
(A) 100-200 (B) 200-400
(C) 400-1000 (D) Above 1000
41. What Is the best way to represent the attributes in a large database?
A) Relational And
B) Concatenation
C) Dot representation
D) All of these
42. Designers use which of the following to tune performance of systems to support time-critical operations?
A) Demoralization
B) Redundant Optimization
C) Optimization
D) Realization
43. RAD stands for
A) Relative Application Development
B) Rapid Application Development
C) Rapid Application Document
D) Rational Application Document
44. Which one of the following models is not suitable for accommodating any change?
A) Build & Fix Model
B) Prototyping Model
C) RAD Model
D) Waterfall Model
45. Which. one of the following is not a phase Prototyping Model?
A) Quick Design
B) Coding
C) Prototype Refinement
D) Engineer Product
46. RAD Model has:
(A) 2 Phase (B) 3 phase
(C) 5 phases (D) 6 phases
47. What is major drawback of RAD Model:
A) Highly specialized designers are required.
B) Increases re-usability of components
C) Encourages customer/client feedback
D) Both A & C
48. SDLC stands for:
A) Software Development life Cycle
B) System Development Life cycle
C) Software Design Life Cycle
D) System Design Life Cycle
49. Which model can be selected if user is Involved in all the phases of SDLC?
A) Waterfall Model
B) Prototyping Model
C) RAD Model
D) Both 8 & C
50. Two devices are In network If:
(A) A process In one device Is able to exchange Information with a process In another device
(B) A process is running on both devices
(C) PIDs of the processes running of different devices are same
(D) None of these
51. In computer network nodes are:
A) The computer that originates the data
B) The computer that routes the data
C) The computer that terminates the data
D) AI of these
52. Communication channel is shared by all the machines on the network In:
A) Broadcast network
B) Uni-cast network
C Multi-cast network
D) None of these
53. Bluetooth Is an example of:
A) Personal area network
B) Local area network
C) Virtual private network
D) None of these
54. A_____Is a device that forwards packets between networks by processing the routing Information Included in the packet.
(A Bridge (B) Firewall
(C)) Router (D) All of these
55. A list of protocols used by a system, one protocol per layer, is called;
A) Protocol architecture
B) Protocol stack
C) Protocol suit
D) None of these
56. Network congestion occurs:
(A) In case of traffic overloading
(B) When a system terminates
(C) When connection between two nodes terminates
(D) None of these
57. Which one of the following extends a private network across public networks?
A) Local Area Network
B) Virtual Private Network
C) Enterprise Private Network
(D) Storage area network
58. The network layer concerns with:
(A) Bits (B) Frames
(C) Packets (D) None of these
59. Which one of the following is not a function of network layer?
(A) Routing
(B) Inter-networking
(C) Congestion control
(D) None of these
60. The 4 byte IP address consists of:
A) Network address
B) Host address
C) Both A and B
D) None of these
61. In virtual circuit, network each packet contains:
A) Full source and destination address
B) A short VC number
C) Both A and B
(D) None of these
62. Which one of the following routing algorithm can be used for network layer design?
A) Shortest path algorithm
B) Distance vector routing
C) Link stale routing
D) All of these
63. The network layer protocol of Internet is:
A) Ethernet
B) Internet protocol
C) Hypertext transfer protocol
D)None of these
64. ICMP is primarily used for:
A) Error and diagnostic functions
B) Addressing
C) Forwarding
D) None of these
65. The lexical analyzer takes ____as Input and produces a stream ___as output
(A) Source program tokens
(B) Token, source program
(C) Both A & B
(D) None of these
66. In graphical system, the array of pixels In the picture is stored in:
(A) Memory (B) Frame buffer
(C) Processor (D) All of these
67. Which of the following is key characteristic of hacker?
(A) Afraid to say they don't know the answer
(B) Willing to find answers on their own
(C) Not willing to find answers on their own
(D) All of these
68. Which of the following focuses on the discovery of (previously) unknown properties on data?
A) Data Mining
B) Big Data
C) Data wrangling
D) Machine Learning
69. Which process model should be used in virtually all situations of web engineering?
(A) Incremental Model
(B) Waterfall Model
(C) Spiral Model
(D) None of these
70. Which analysis is a part of Analysis model of the web engineering process framework?
(A) Content Analysis
(B) Interaction Analysis
(C) Functional Analysis
(D) All of these
71. Which of the following statements are Incorrect with reference to web-based systems? Web-based systems:
(A) Should be un-scalable
(B) Must be to cope uncertain, random heavy demand on services
(C) Must be secure
(D) Are subject to assorted legal, social and ethical scrutiny
72. What category of web-based system would you assign to electronic shopping?
(A) Information
(B) Interactive
(C) Transaction-oriented.
(D) Workflow-oriented
73. What category of web-based system would you assign to discussion groups?
(A) Collaborative work
(B) Online communities
(C) Web Portals
(D) Workflow Oriented
74. Parsing is also known as:
(A) Lexical Analysis
(B) Syntax Analysis
(C) Semantic Analysis
(D) Code Generation
0 Comments