Description : ………… system consists of programs, data files and documentation A) Conceptual B) Logical C) Physical D) None of the above
Last Answer : C) Physical
Description : A ……………… system in no more than idea. A) Conceptual B) Logical C) Physical D) None
Last Answer : A) Conceptual
Description : A …………. System is no more than idea A) Conceptual B) Logical C) Physical D) All of the above
Description : Manager's salary details are to be hidden from Employee Table. This Technique is called as (A) Conceptual level Datahiding (B) Physical level Datahiding (C) External level Datahiding (D) Logical level Datahiding
Last Answer : (C) External level Datahiding
Description : The view of total database content is (A) Conceptual view. (B) Internal view. (C) External view. (D) Physical View.
Last Answer : (A) Conceptual view.
Description : In Data mining, .............. is a method of incremental conceptual clustering. (A) STRING (B) COBWEB (C) CORBA (D) OLAD
Last Answer : (B) COBWEB
Description : The different types of tables maintained by the operating system are ............. A) memory, logical , I/O file B) memory, I/O, file, physical C) memory, I/O, file, process D) memory, logical, I/O, physical
Last Answer : C) memory, I/O, file, process
Description : DML is provided for (A) Description of logical structure of database. (B) Addition of new structures in the database system. (C) Manipulation & processing of database. (D) Definition of physical structure of database system.
Last Answer : C) Manipulation & processing of database.
Description : A memory management system has 64 pages with 512 bytes page size. Physical memory consists of 32 page frames. Number of bits required in logical and physical address are respectively: (1) 14 and 15 (2) 14 and 29 (3) 15 and 14 (4) 16 and 32
Last Answer : (3) 15 and 14
Description : The conceptual model is (A) dependent on hardware. (B) dependent on software. (C) dependent on both hardware and software . (D) independent of both hardware and software.
Last Answer : (D) independent of both hardware and software.
Description : Which of the following is a knowledge representation technique used to represent knowledge about stereotype situation? (A) Semantic network (B) Frames (C) Scripts (D) Conceptual Dependency
Last Answer : (C) Scripts
Description : Find the false statement: (A) The relationship construct known as the weak relationship type was defined by Dey, Storey & Barron (1999). (B) A weak relationship occurs when two ... Ternary, Quaternary and Quintary relationships are shown through a series of application scenario's and vignette's
Last Answer : (C) Conceptual model is not accurate representation of "Universe of interest".
Description : The four levels of Cloud Federation include a) Conceptual level, Logical level, Operational level, Infrastructural level b) Conceptual level, Service level, Operational level, Infrastructural ... level, Infrastructural level d) Security level, Logical level, Operational level, Infrastructural leve
Last Answer : Conceptual level, Logical level, Operational level, Infrastructural level
Description : .The __________ addresses the technical challenges involved in enabling heterogeneous cloud computing systems to interoperate seamlessly a) Logical and Operational Level b) Infrastructure Level c) None of the above d) Conceptual Level
Last Answer : Infrastructure Level
Description : Which of the following addresses is used to deliver a message to the correct application program running on a host? (A) Port (B) IP (C) Logical (D) Physical
Last Answer : (A) Port
Description : DFD stands for A) Data Flow Document B) Data File Diagram C) Data Flow Diagram D) Non of the above
Last Answer : C) Data Flow Diagram
Description : A logical schema A) is the entire database B) is a standard way of organizing information into accessible parts. C) Describes how data is actually stored on disk. D) All of the above
Last Answer : B) is a standard way of organizing information into accessible parts.
Description : The first requirement for logical troubleshooting of any system is the ability to ______________. A. collect all available data on a casualty B. recognize normal operation C. identify the probable cause of a symptom D. isolate the faulty component
Last Answer : Answer: B
Description : ………… is not the component of data structure. A) Operations B) Storage Structures C) Algorithms D) None of above
Last Answer : D) None of above
Description : What error will be generated if a space is given between the logical AND operator (&&)? Will it be a compile-time or a run-time error?
Last Answer : Example: if(5>2 & & 6
Description : State true or false. i) comparisons precede logical operations in java ii) assignment operations succeed increment operations iii) arithmetic operations succeed comparisons iv) x precede + A) i-true, ii-true, iii-false, ... false, ii-true, iii-false, iv-false D) i-true, ii-false, iii-false, iv-true
Last Answer : A) i-true, ii-true, iii-false, iv-true
Description : .................. is a facility that allows programmers to address memory from a logical point of view, without regard to the main memory, physically available. A) Visual memory B) Real memory C) Virtual memory D) Secondary memory
Last Answer : C) Virtual memory
Description : Which of the following is not a logical database structure? A) Chain B) Network C) Tree D) Relational
Last Answer : A) Chain
Description : Which of the following is the logical topology? A) Bus B) Tree C) Star D) Both A and B
Last Answer : C) Star
Description : "lf my computations are correct and I pay the electric bill, then I will run out of money. If I don't pay the electric bill, the power will be turned off. Therefore, if I don't run out of money and the power is still on ... r and ¬p → ¬b, then (¬r∨p)→¬c (D) if (c∨b) → r and ¬b → ¬p, then (¬r∧p)→¬c
Last Answer : (A) if (c∧b) → r and ¬b → ¬p, then (¬r∧p)→¬c
Description : Which of the following statements is true? (1) The sentence S is a logical consequence of S1,..., Sn if and only if S1˄S2˄........˄Sn→S is satisfiable. (2) The sentence S is a logical consequence of ... S is a logical consequence of S1,..., Sn if and only if S1˄S2˄........˄Sn˄S is inconsistent.
Last Answer : The sentence S is a logical consequence of S1,..., Sn if and only if S1˄S2˄........˄Sn→S is valid.
Description : In Unix operating system, special files are used to : (A) buffer data received in its input from where a process reads (B) provide a mechanism to map physical device to file names (C ... pointers associated with i-nodes (D) store information entered by a user application program or utility program
Last Answer : (B) provide a mechanism to map physical device to file names
Description : An ER Model includes I. An ER diagram portraying entity types. II. Attributes for each entity type III. Relationships among entity types. IV. Semantic integrity constraints that reflects the business rules about data not ... ; IV (B) I&IV (C) I, II & IV (D) I & III
Last Answer : (A) I, II, III & IV
Description : Consider the following statements for priority queue: S1: It is a data structure in which the intrinsic ordering of the elements does determine the result of its basic operations. S2: The elements of a priority queue ... . (C) SI is incorrect and S2 is correct. (D) Both S1 and S2 are correct.
Last Answer : (D) Both S1 and S2 are correct.
Description : ………….. gives defining the flow of the data through and organization or a company or series of tasks that may or may not represent computerized processing. A) System process B) System flowchart C) System design D) Structured System
Last Answer : B) System flowchart
Description : To obtain the desired data in a study, which of the following types of definition is most essential? a. Theoretical b. Conceptual c. Operational d. Dictionary
Last Answer : c. Operational
Description : The ............layer of OSI model can use the trailer of the frame for error detection. A) Physical B) Data link C) Transport D) Presentation
Last Answer : A) Physical
Description : In which OSI layers does the FDDI protocol operate? A) Physical B) Data link C) Network D) A and B
Last Answer : D) A and B
Description : The ............ layer change bits onto electromagnetic signals. A) Physical B) Transport C) Data Link D) Presentation
Description : Which layer of OSI reference model is responsible for decomposition of messages and generation of sequence numbers to ensure correct re-composition from end to end of the network? (A) Physical (B) Data-link (C) Transport (D) Application
Last Answer : (C) Transport
Description : Which layers of the OSI reference model are host-to-host layers ? (A) Transport, Session, Presentation, Application (B) Network, Transport, Session, Presentation (C) Data-link, Network, Transport, Session (D) Physical, Data-link, Network, Transport
Last Answer : (A) Transport, Session, Presentation, Application
Description : A specific editor has 200 K of program text, 15 K of initial stack, 50 K of initialized data, and 70 K of bootstrap code. If five editors are started simultaneously, how much physical memory is needed if shared text is used ? (A) 1135 K (B) 335 K (C) 1065 K (D) 320 K
Last Answer : (B) 335 K
Description : Java Servlet i) is key component of server side java development ii) is a small pluggable extension to a server that enhances functionality iii) runs only in Windows Operating System iv) allows developers to customize any java ... & iv are true C) ii, iii & iv are true D) i, ii & iv are true
Last Answer : D) i, ii & iv are true
Description : Software safety is quality assurance activity that focuses on hazards that (A) affect the reliability of a software component (B) may cause an entire system to fail. (C) may result from user input errors. (D) prevent profitable marketing of the final product
Last Answer : (B) may cause an entire system to fail.
Description : The physical layer translates logical communication requests from the ______ into hardware specific operations. a. data link layer b. network layer c. trasnport layer d. application layer
Last Answer : a. data link layer
Description : Protocols are? A. Agreements on how communication components and DTE's are to communicate. B. Logical communication channels for transferring data C. Physical communication channels sued for transferring data D. None of above
Last Answer : A. Agreements on how communication components and DTE's are to communicate.
Description : Data cannot flow between two data stores because A) it is not allowed in DFD B) a data store is a passive repository of data C) data can get corrupted D) they will get merged
Last Answer : D) they will get merged
Description : A data cannot flow between a store and i) a store ii) a process iii) an external entity A) i and iii B) i and ii C) ii and iii D) ii
Last Answer : A) i and iii
Description : A data flow can A) Only a data store B) Only leave a data store C) Enter or leave a data Store D) Either enter or leave a data store but not both
Last Answer : C) Enter or leave a data Store
Description : A data flow can A) Only emanate from an external entity B) Only terminate in an external entity C) May emanate and terminate in an external entity D) May either emanate or terminate in an external entity but not both
Last Answer : C) May emanate and terminate in an external entity
Description : A context diagram is used A) as the first step in developing a detailed DFD of a system B) in systems analysis of very complex systems C) as an aid to system design D) as an aid to programmer
Last Answer : A) as the first step in developing a detailed DFD of a system
Description : A context diagram A) Describes the context of a system B) is a DFD which gives an overview of the system C) is a detailed description of a system D) is not used in drawing a detailed DFD
Last Answer : B) is a DFD which gives an overview of the system
Description : FAN IN of a component A is defined as (A) Number of components that can call or pass control to component A. (B) Number of components that are called by component A. (C) Number of components related to component A. (D) Number of components dependent on component A.
Last Answer : (A) Number of components that can call or pass control to component A.
Description : Which of the following statements regarding the features of the objectoriented approach to databases are true ? (a) The ability to develop more realistic models of the real world. (b) The ability to represent the world in a non-geometric way. ( ... ) and (d) (C) (a), (d) and (e) (D) (c), (d) and (e)
Last Answer : (A) (a), (b) and (c)
Description : Design Phase consists of ……………………. 1. Identity the functions to be performed 2. Design the input/output and file design 3. Defining basic parameters for system design A) 1 & 2 B) 2 & 3 C) 1 & 3 D) 1, 2 & 3
Last Answer : D) 1, 2 & 3