Description : An ER Model includes I. An ER diagram portraying entity types. II. Attributes for each entity type III. Relationships among entity types. IV. Semantic integrity constraints that reflects the business rules about data not ... ; IV (B) I&IV (C) I, II & IV (D) I & III
Last Answer : (A) I, II, III & IV
Description : The value of the normalized frequency parameter (V) relates the core size with mode propagation. When single mode fibers propagate only the fundamental mode, what is the value of V?
Last Answer : V≤2.405.
Description : Which of the following is a knowledge representation technique used to represent knowledge about stereotype situation? (A) Semantic network (B) Frames (C) Scripts (D) Conceptual Dependency
Last Answer : (C) Scripts
Description : High level knowledge which relates to the use of sentences in different contexts and how the context affect the meaning of the sentences? (A) Morphological (B) Syntactic (C) Semantic (D) Pragmatic
Last Answer : (D) Pragmatic
Description : Slots and facets are used in (A) Semantic Networks (B) Frames (C) Rules (D) All of these
Last Answer : (B) Frames
Description : Which of the following is not valid with reference to Message Passing Interface (MPI)? (A) MPI can run on any hardware platform (B) The programming model is a distributed memory model. (C) All ... implicit. (D) MPI - Comm - Size returns the total number of MPI processes in specified communication.
Last Answer : (C) All parallelism is implicit.
Description : Automatic initialization of object is carried out using a special member function called ………… A) Friend B) Casting C) Reference Parameter D) Constructor
Last Answer : D) Constructor
Description : A constructor that accepts no parameters is called the ………………. A) Paramless constructor B) No parameter constructor C) Default constructor D) Argumentless constructor
Last Answer : C) Default constructor
Description : When an array is passed as a parameter to a function which of the following statements is correct? (A) The function can change values in the original array. (B) The function cannot change values in the original array. (C) Results in compilation error. (D) Results in runtime error.
Last Answer : (A) The function can change values in the original array.
Description : When an array is passed as parameter to a function, which of the following statements is correct ? (A) The function can change values in the original array. (B) In C, parameters are passed by value, ... . (D) Results in a run time error when the function tries to access the elements in the array.
Description : Which of the following is not a primary/fundamental, but a derived pharmacokinetic parameter: A. Bioavailability B. Volume of distribution C. Clearance D. Plasma half life
Last Answer : D. Plasma half life
Description : By using ................... you can force immediate termination of a loop, by passing the conditional expression and any remaining code in the body of the loop. A) Break B) Continue C) Terminate D) Loop Close
Last Answer : A) Break
Description : The distributed system is a collection of (P) and communication is achieved in distributed system by (Q) , where (P) and (Q) are : (A) Loosely coupled hardware on tightly ... message passing ,respectively. (D) Loosely coupled software on tightly coupled hardware and file sharing, respectively.
Last Answer : (C) Tightly coupled software on loosely coupled hardware and message passing ,respectively.
Description : What are the values that can be specified for OPTIMIZER MODE Parameter ?
Last Answer : COST and RULE.
Description : Abstraction and encapsulation are fundamental principles that underlie the object oriented approach to software development. What can you say about the following two statements? I. Abstraction allows us to focus on what something ... and II are correct. (3) Only II is correct. (4) Only I is correct.
Last Answer : (1) Neither I nor II is correct.
Description : In a relational database model, NULL values can be used for all but which one of the following? (A) To allow duplicate tuples in the table by filling the primary key column(s) with NULL. (B) To ... D) To fill a column in a tuple when that column does not really exist for that particular tuple.
Last Answer : (A) To allow duplicate tuples in the table by filling the primary key column(s) with NULL.
Description : Which of the following statement(s) is/are FALSE in the context of Relational DBMS ? I. Views in a database system are important because they help with access control by allowing users to see only a particular subset of the data ... (B) III and IV only (C) I, II and III only (D) II, III and IV only
Last Answer : (D) II, III and IV only
Description : Which command is used to change protection mode of files starting with the string emp and ending with 1,2, or 3? A. chmod u+x emp[l-3] B. chmod 777 emp* C. chmod u+r ??? emp D. chmod 222 emp? E. None of the above
Last Answer : A. chmod u+x emp[l-3]
Description : …………… are very effective because a mode switch is not required to switch from one thread to another. A) Kernel-level threads B) User-level threads C) Alterable threads D) Application level threads
Last Answer : B) User-level threads
Description : In the ………………… mode any record in the file can be accessed at random A) Sequential access B) Random access C) Standard access D) Source access
Last Answer : B) Random access
Description : …………….. mode is used whenever either end of a security association is gateway. A) Tunnel B) Encapsulating C) Transport D) Gateway
Last Answer : A) Tunnel
Description : In ……………………. mode, a common technique in packet-switched networks consists of wrapping a packet in a new one. A) Tunneling B) Encapsulation C) Both A and B D) None of the above
Last Answer : C) Both A and B
Description : In ………………. Mode, the authentication header is inserted immediately after the IP header. A) Tunnel B) Transport C) Authentication D) Both A and B
Last Answer : D) Both A and B
Description : Which of the following operations can be performed by using FTP. i) Connect to a remote host ii) Select directory iii) Define the transfer mode iv) List file available A) i, and ii only B) i, ii and iii only C) ii, iii and iv only D) All i, ii, iii and iv
Last Answer : C) ii, iii and iv only
Description : Let the time taken to switch between user mode and kernel mode of execution be T1 while time taken to switch between two user processes be T2. Which of the following is correct? (A) T1 < T2 (B) T1 > T2 (C) T1 = T2 (D) Nothing can be said about the relation between T1 and T2.
Last Answer : (A) T1 < T2
Description : Which one of the following is not an addressing mode? (A) Register indirect (B) Auto increment (C) Relative indexed (D) Immediate operand
Last Answer : (C) Relative indexed
Description : The size of the ROM required to build an 8-bit adder/subtractor with mode control, carry input, carry output and two’s complement overflow output is given as
Last Answer : (B) 218 × 10
Description : WOW32 is a: (A) Win 32 API library for creating processes and threads. (B) Special kind of file system to the NT name space. (C) Kernel - mode objects accessible through Win32 API (D) Special execution environment used to run 16 bit Windows applications on 32 - bit machines.
Last Answer : (D) Special execution environment used to run 16 bit Windows applications on 32 - bit machines.
Description : In Unix, files can be protected by assigning each one a 9-bit mode called rights bits. Now, consider the following two statements: I. A mode of 641 (octal) means that the owner can read and write the file, other ... (B) Only II is correct (C) Both I and II are correct (D) Both I and II are incorrect
Last Answer : (C) Both I and II are correct
Description : The ............... addressing mode is similar to register indirect addressing mode, except that an offset is added to the contents of the register. The offset and register are specified in the instruction. (A) Base indexed (B) Base indexed plus displacement (C) Indexed (D) Displacement
Last Answer : (D) Displacement
Description : One of the disadvantages of user level threads compared to Kernel level threads is (1) If a user level thread of a process executes a system call, all threads in that process are ... privileges. (4) The library procedures invoked for thread management in user level threads are local procedures.
Last Answer : If a user level thread of a process executes a system call, all threads in that process are blocked.
Description : The single parameter model proposed for describing non-ideal flow is the __________ model. (A) Tank in series (B) Dispersion (C) Both (A) & (B) (D) Neither (A) nor (B)
Last Answer : (C) Both (A) & (B)
Description : How to create "dependant" parameter "Make, Model, Year"
Last Answer : They need to be in correct order, and previous parameter should filter next parameter dataset. For instance Model dataset should be filtered using Make parameter
Description : Uricotelic mode of passing out nitrogenous wastes is found in
Last Answer : Uricotelic mode of passing out nitrogenous wastes is found in A. Reptiles and Birds B. Birds ... C. Amphibians and Reptiles D. Insects and Amphibians
Last Answer : Uricotelic mode of passing out nitrogenous wastes is found in A. Reptiles and bird B. Birds ... C. Amphibians and reptiles D. Insects and amphibians
Description : Consider the following statements regarding relational database model: (a) NULL values can be used to opt a tuple out of enforcement of a foreign key. (b) Suppose that table T has only one candidate key. If Q is in 3NF, then it is ... true. (C) (b) and (c) are true. (D) (a), (b) and (c) are true.
Last Answer : (D) (a), (b) and (c) are true.
Description : For a given system, the minimum frequency of a standing wave is in a A. fundamental mode B. lowest mode C. highest mode D. peak mode
Last Answer : fundamental mode
Description : What happens to the fundamental mode as the operating wavelength becomes longer than the single mode cutoff wavelength?
Last Answer : The fundamental mode becomes increasingly lossy.
Description : An organ pipe which is open at both ends resonates at its fundamental frequency. Neglecting any end effects, what wavelength is formed by this pipe in this mode of vibration if the pipe is 2 meters long? w) 2 meters x) 4 meters y) 6 meters z) 8 meters.
Last Answer : ANSWER: X -- 4 METERS
Description : Which of the following are the states of a five state process model? i) Running ii) Ready iii) New iv) Exit v) Destroy A) i, ii, iii and v only B) i, ii, iv and v only C) i, ii, iii, and iv only D) All i, ii, iii, iv and v
Last Answer : C) i, ii, iii, and iv only
Description : Decision making model was proposed by …………………. A) Harry Goode B) Herbert A Simon C) Recon Michal D) None of this
Last Answer : B) Herbert A Simon
Description : ……………….. level is where the model becomes compatible executable code A) Abstract level B) Application level C) Implementation level D) All of the above
Last Answer : C) Implementation level
Description : The relational model is based on the concept that data is organized and stored in two-dimensional tables called ………………………A) Fields B) Records C) Relations D) Keys
Last Answer : C) Relations
Description : …………… database is used as template for all databases created. A) Master B) Model C) Tempdb D) None of the above
Last Answer : B) Model
Description : In an ER model, ……………. is described in the database by storing its data. A) Entity B) Attribute C) Relationship D) Notation
Last Answer : A) Entity
Description : The ............layer of OSI model can use the trailer of the frame for error detection. A) Physical B) Data link C) Transport D) Presentation
Last Answer : A) Physical
Description : The layer one of the OSI model is A) Physical layer B) Link layer C) Router layer D) Broadcast layer
Last Answer : A) Physical layer
Description : The name of the protocol which provides virtual terminal in TCP/IP model is. A) Telnet B) SMTP C) HTTP
Last Answer : A) Telnet
Description : The conceptual model is (A) dependent on hardware. (B) dependent on software. (C) dependent on both hardware and software . (D) independent of both hardware and software.
Last Answer : (D) independent of both hardware and software.