Question 1:
Spring is a _______ framework?
A. Free
B. Open source
C. Under license
D. Proprietary
Question 2:
Which forms simplifies and ensures that there are minimal aggregates and repetitive groups?
A. 1NF
B. 2NF
C. 3NF
D. 4NF
Question 3:
If there exists a set of transactions such that every transaction in the set is waiting for another
transaction in the set, then the system enters in:
A. Deadlock State
B. Rollback state
C. Active state
D. Prevent state
Question 4:
The counter measures to protect databases against threats are-
A. Access Control
B. Inference Control
C. Flow Control
D. All of these
Question 5:
____________ do not take their decisions on measurements or estimates of the current traffic and
topology.
A. Static algorithms
B. Adaptive algorithms
C. Non-Adaptive algorithms
D. Recursive algorithms
Question 6:
_______ advanced macro facility allows us to establish loops.
A. DB
B. REPT
C. ANOP
D. DW
Question 7:
Which statement is correct with respect to wireless ad-hoc network
A. Access point is must
B. All nodes are access points
C. Access point is not required
D. Nodes are not required
Question 8:
Which one of the following languages over the alphabet {0,1} is described by the regular expression:
(0+1) 0 (0+1)*0 (0+1)*?
A. The set of all Istrings containing the substring 00
B. The set of all strings containing at most two O's
C. The set of all strings containing at least two 0's
D. The set of all strings that begin and end with either 0 or 1
Question 9:
In a n-node binary tree maximum ______ number of threads are possible.
A. n+1
B. n
C. n-1
D. n(n-1)
Question 10:
In soft real time operating system, time constraints are very strict and even the shortest possible delay is
not acceptable. T/F
A. TRUE
B. FALSE
Question 11:
The sort which has best case as well as worst case time complexity O(n log n) is
A. bubble sort
B. Insertion sort
C. Quick sort
D. Merge sort
Question 12:
What is a long-term scheduler?
A. It selects which process has to be brought into the ready queue
B. It selects which process has to be executed next and allocates CPU
C. It selects which process to remove from memory by swapping
D. None of above
Question 13:
PHP keyword to define derived class is
A. extend
B. extends
C. inherit
D. link
Question 14
What are the examples of NoSql document store databases ?
A. Cassandra
B. MongoDB
C. Neo4j
D. All
Question 15:
SMTP is ______ protocol
A. Network Layer
B. Application Layer
C. Transport Layer
D. Session Layer
Question 16:
If user requirements are unclear and frequently changed, which one of the following models is used to
develop such projects?
A. Waterfall model
B. Incremental model
C. Concurrent model
D. Prototyping model
Question 17:
In PL/SQL, a way to select multiple rows of data from the database and then process each individually is
provided by
A. View
B. Cursor
C. Trigger
D. Procedure
Question 18:
Type 1 grammar is represented by which of the following language?
A. Recursively Enumerable Language
B. Context Sensitive Language
C. Recursive Language
D. Deterministic Context free Language
Question 19:
What is Checked Exception in Java
A. An exception which should be thrown inside the method along with declaring that the method
throws it
B. An exception which should be handled using TRY CATCH statements.
C. Exceptions for which the compiler throws error without completing. compilation for not
handling properly.
D. All the above
Question 20:
Which of the following techniques can be used for wireless session tracking?
A. Cookies
B. URL Rewriting
C. Hidden Fields
D. None of the above
Question 21:
A synthesized attribute is an attribüte whose value at a parse tree node depends on __________
A. Attributes at the siblings only
B. Attributes at parent node only
C. Attributes at children nodes only
D. None of the above
Question 22:
The derived classes possess characteristics of base class is known as...
A. Data Abstraction
B. Data Binding
C. Inheritance
D. Polymorphism
Question 23:
_____________multiple access technique is used by IEEE 802.11 standard for wireless LAN?
A. CDMA
B. ALOHA
C. CSMA/CD
D. CSMA/CA
Question 24:
Which of the following is a type of file organization?
A. Sequential FO
B. Heap FO
C. Hash FO
D. All of the above
Question 25:
PHP communicate with Web Server using protocol
A. SMTP
B. NTFS
C. HTTP
D. FTP
Question 26:
The ________ is an implicit parameter to all member functions.
A. friend function
B. this pointer
C. iostream file
D. class object
Question 27:
A queue that allows deletion of only the largest item in collection is called
A. Prionty Queue
B. Ascending Priority Queue
C. Descending priority Queue
D. None of the above
Question 28:
Constant pointer to constant memory of type integer can be written as___________
A. const int const ptr
B. const int const ptr = &x
C. int *const ptr
D. const int *ptr
Question 29:
Which of the following is not considered in Communication Practices?
A. Listen
B. Face-to-face Communication
C. The risk consider
D. Facilitate the activity
Question 30:
_______is used to find and fix bugs in the Java programs
A. JVM
B. JRE
C. JDK
D. JDB
Question 31:
At the ready queue when a process arrives In priority scheduling algorithm, the priority of this process is
compared with the priority of?
A. currently running process
B. parent process
C. all process
D. init process
Question 32:
Consider the following DAG. What will be the regular expression for the DAG?
A. (a+a(b-(c))) + (b-(c) (d))
B. a+a(b-c)+(b-c) d
C. (a+a*(b-(c)+(b-(c))) *(d))
D. a+(a*b-c)+(b-cd)
Question 33:
PHP function to start session
A. startsession()
B. session()
C. session_start()
D. session_init()
Question 34:
Array name is a _____
A. Special variable
B. Special Pointer
C. Pointer to Constant Memory
D. Constant Pointer To Non-constant Memory
Question 35:
pg_fetch_array() function returns
A. values
B. array
C. row
D. NULL
Question 36:
IEEE 802.15 standard is known for------LANS
A. Wired Network
B. Wireless Speciality Network
C. Bluetooth
D. not in the list
Question 37:
Which statement is true about a static nested class?
A. You must have a reference to an instance of the enclosing class to instantiate it.
B. It does not have access to non-static members of the enclosing class.
C. It's variables and methods must be static
D. It must extend the enclosing class.
Question 38:
What is a comparator in Java?
A. Interface to compare integer.
B. Comparison method for lists
C. Interface to compare two objects in Java.
D. All of these
Question 39:
The language accepted by this DFA is -
A. a(a+b)*ab
B. a(a+b)*
C. a(a+b)* + b (a+b)*
D. e+(a+b)*
Question 40:
AJAX allows communication
A. synchronous
B. without reloading whole page
C. next page
D. web page
Question 41:
What are the disadvantages of File Systems?
A. Data redundancy
B. Data inconsistency
C. Difficulty in accessing data
D. All of the above
Question 42
What will be the output of the JAVA program below ?class Equals
{ public static void main(String[] args)
{ int x = 100;
double y = 100.1,
boolean b = (x = y);
System.out.println(b); } }
A. TRUE
B. FALSE
C. Compilation fails.
D. An exception is thrown at runtime.
Question 43:
The time complexity of the following code is: for (i=1;i<=n;i++) for (j=1;j<= j)
x=x+1
A. O(n)
B. O(n)
C. O(log n)
D. O(n log n)
Question 44:
What is the name of the machine for the following definition M = (Q, à, G, d,q0, ZO, F) where d:Qx (àÈ
{e})xG→QxG*
A. DFA
B. NFA
C. Push Down Automata(PDA)
D. Turing Machine
Question 45:
______is the process of modifying the addresses used in the address sensitive instructions of a program
such that the program can execute correctly from the designated area of memory.
A. Program Relocation
B. Pure interpretation
C. Impure Interpretation
D. Linking
Question46:
Error detection is the _________
A. detection of errors caused by noise or other impairments during transmission from the
transmitter to the receiver
B. Odetection of errors and reconstruction of the original, error-free data.
C. only restructuring of data
D. none the mentioned
Question47:
Generalization is denoted by using…………. symbol.
a. Triangle
b. Ellipse
c. Circle
d. Square
Question 48:
Which of the following machine has a Read-Write Head?
A. Turing Machine
B. Melay Machine
C. Moore Machine
D. NFA
Question 49:
XML: is used
a. Reduce load on server
b. connect to server
c. display data
d. display data on server
Question 50:
Objects are…………………. components of modeling.
A. fundamental and structural
B. fundamental, logical and structural
C. logical and structural
D. fundamental and logical
Question 51:
Identify the correct extension of the user-defined header file in C++
a. .cpp
b. hg
c. hf
d. h
Question 52:
In _______ Operand fields are completely processed in intermediate code.
a. Variant-1
b. Variant-2
c. Both of above
d. None of above
Question 53:
Function pointer that takes int argument and returns void can be declared as
A. (void*) fptr (int)
B. (void) *fptr (int *)
C. (void *) *fptr (int)
D. (void*) fptr (int*)
Question 54:
UML stands for
A. Universal Modeling Language
B. Unified Modeling Language
C. Unique Model Language
D. Unify Model Language
Question55:
C++ uses which approach?
a. right-left
b. Top-down
c. left-right
d. bottom-up
Question 56:
10 Base5 also known as ________
A. thick ethernet
B. shield ethernet
C. twist ethernet
D. thin ethernet
Question 57:
To allocate special memory in CPU; we use ……………… modifier.
a. register
b. const
c. MU
d. MR
Question 58:
Class diagram represents ………………..
A. Time dependent view of the system
B. Behavioral view of the system
C. Structural view of the system
D. Sequential view of the system
Question 59:
Which of the following is not system call?
a. fork()
b. exec()
c. scanf()
d. wait()
Question 60:
To include integrity constraint in the existing relation, which command is used?
A. Drop table
B. Modify table
C. Alter table
D. Create table
Question 61:
To include integrity constraint in the existing relation, which command is used?
A. Drop table
B. Modify table
C. Alter table
D. Create table
Question 61
Suppose that you would like to create an instance of a new Map that has an iteration order that is the
same as the iteration order of an existing instance of a Map.
Which concrete implementation of the Map interface should be used for the new instance?
A. LinkedHashMap
B. TreeMap
C. Answer depends on the implementation of existing instance.
D. HashMap
Question 62:
skips the comments and white spaces from the input characters.
A. Parser
B. Scanner
C. Preprocessor
D. Loader
Question 53:
System Design is a development of
A. Investigation and study of problem.
B. blue print, a computer solution to a problem that has same components and inter
relationship amongst the components as original problem has.
C. gathering of facts and diagnosing the problem.
D. its detailed study and analysis
Question 64:
Which of the following is an Advanced Assembler directive?
A. DC
B. LTORG
C. DS
D. START
Question 65:
PHP function to send Email is
A. SMTP
B. main()
C. send_email()
D. mail()
Question 66:
To declare constant in C, we can use
A. const
B. const and #define
C. void
D. constant
Question 67:
To keep the values of variables unchanged during multiple entries and exits from a block, we use
A. Pass By Reference
B. Pass By Value
C. Pointers
D. static modifier
Question 68:
The number of bits used for addressing in Gigabit Ethernet is
A. 32 bits
B. 48bits
C. 64bits
D. 128bits
Question 69:
B-tree of order m has how many maximum number of children?
A. m
B. m+1
C. m-1
D. m/2
Question 70:
What is the result of the following program?
public static synchronized void main(String[] args) throws InterruptedException
{Thread f = new Thread(),
f.start();
System.out.print("A");
f wait(1000);
System.out.print("B"); }
A. It prints A and B with a 1000 seconds delay between them
B. It only prints A and exits.
C. It only prints B and exits.
D. A will be printed, and then an exception is thrown
Question 71:
The statement in JDBC that can execute stored procedure and dynamic SQL is
A. Callable
B. PreaparedStatement
C. executeQuery
D. executeUpdate
Question 72:
To specify the number of digits to be displayed after the decimal point of a float value the command in
C++ is _________
A. width()
B. precision()
C. fill()
D. setf()
Question 73:
Which of the following is high-speed adaptation of a waterfall model where multiple software teams
work in parallel on different system functions?
A. RAD model
B. Concurrent model
C. Spiral model
D. Prototyping model
Question 74:
What are the functions of DBA?
A. Network Maintenance
B. Routine Maintenance
C. Authorization for data access
D. All of the above
Question 75:
Consider the following Grammar G=({S, A, B, C}, {a, b}, P, S ) where P is:
S -> BC |AB
A -> aAa | epsilon
B -> bAa
C -> epsilon
Then Follow (A) is:
A. {a, b}
B. {a, $}
C. {a}
D. { b ,$}
Question 76:
Which of the following devices takes data sent from one network device and forwards it to the
destination node based on MAC address?
A. Hub
B. Switch
C. Modem
D. Gateways
Question 77:
Well documented systems are ……….
A. difficult to maintain and manage
B. not manageable
C. easy to maintain and manage
D. none of the above
Question 78:
Choose the RDBMS which supports full fledged client server application development
A. dBase V
B. Oracle 7.1
C. FoxPro 2.1
D. Ingress
Question 79:
If the transaction Ti has obtained exclusive lock on the data item Q, then
A. Ti can both read and write Q.
B. Ti can read Q
C. Ti can write Q
D. Ti cannot read and write Q.
Question 80:
How can we share memory of a variable at bit level instead at byte level?
A. Using Bitwise Operators
B. Using structure
C. Using Union
D. Using Array
Question 81:
Macro and Pre-Processing definitions starts with _______
A. #
B. ##
C. #and ##
D. /*
Question 82:
The structure used to store the database modifications and maintains a record of all the update activities
in the database is
A. Stable Memory
B. Log
C. Record
D. Catalog
Question 83:
PHP function to sort associative array by value in ascending order
A. sort()
B. arsort()
C. Orsort()
D. asort()
Question 84:
Operator overloading in C++ indicates ____________
A. Data Abstraction
B. Run time polymorphism
C. Compile time polymorphism
D. Exception Handling
Question 85:
Public, Private and Protected visibilities of attributes and methods are denoted by using ………….. symbols
respectively in a class diagram.
A. +,#,-
B. #, +,-
C. -,+,#
D. +,-,#
Question 86:
The relation employee(ID, name, street, credit, salary) is decomposed into employee1 (ID, name) and
employee2(name, street, credit, salary)
A. lossless decomposition
B. lossless join decomposition
C. lossy decomposition
D. All of the above
Question 87:
PHP function to change the owner of file
A. chown
B. nlink
C. chgrp
D. chmod
Question 88:
Aggregation is a ………… relationship.
A. Owns a
B. Whole Part
C. General
D. Nominal
Question 89:
Which of the following is not an action of LR parser?
A. Shift
B. Accept
C. Reduce
D. GOTO
Question 90:
The cost benefit analysis of the system is determined by:
A. Technical feasibility
B. Economical feasibility
C. Operational feasibility
D. Conventional feasibility
Question 91:
Which of the following address belongs class A?
A. 130.12.12.248
B. 128.12.12.248
C. 121.12.12.248
D. 129.12.12.248
Question 92:
printf("%d",*(a+i)) is same as _____
A. printf("%d", *a[i])
B. printf("%d",a[i])
C. printf("%d", **a[i])
D. printf("%d",a[i+1])
Question 93:
Keyword asm is used for _________
A. Assembly Code in C
B. Assembling of code In C
C. Constant Declaration In C
D. Reserved For Future Use
Question 94:
Lock that prevents the use of any tables in the database from one transaction, while another transaction
is being processed is called
A. database-level lock
B. table-level lock
C. page-level lock
D. row-level lock
Question 95:
strstr() function in PHP used for
A. find string position
B. Searches first occurrence of string
C. Searches occurrence of string
D. Searches the pattern in string
Question 97:
If we use header node in a linked list then __________
A. space can be optimized
B. space overhead but time optimized
C. Time overhead
D. Both space & time can be optimized
Question 98:
In which agile model, Pair programming is carried out ?
A. Extrem Programming
B. Dynamic Systems Development technique
C. Adaptive Software Development
D. Scrum
Question 99:
ER Diagram is a tool for ............ modeling while Data Flow Diagram is a tool for ……….. modeling.
A. General, Physical
B. Data, Process
C. Logical, Physical
D. Fundamental, Logical
Question 100:
paging suffers from fragmentation.
A. Internal
B. External
C. Both of above
D. None of above