Head Office C-37, Ganesh Nagar, Pandav Nagar Complex, Delhi - 110092 Phone: 65252855, 56 E-mail: bscacademy@gmail.com, bscho@bscacademy.com, Web Site :www.bscacademy.com, www.bsccareer.com
1 Each packet contains the full source and destination address, this statement indicates which of the following? a) Virtual Circuit b) Datagram c) Data link d) FDDI e) None of these Ans b) 2.Which of the following identities belongs to Demorgans therorems? a) x+x=1 b) xy=yx c) (xy)=x+y d) x.0=0 e) None of the above. Ans c) 3. Network layer is responsible for ........................delivery of packet. a) Source to Destination b) End to end c) Error free d) Point to Point e) None of these Ans a) 4. An encoder has 2 to the power n input lines and ................output lines. a) 2 b)2*n c) n d)n*n e) None of the above Ans c) 5. which of the following statement is used in the binary search algorithm to value of middle sub in the array? a) =(start sub + stop sub)/2 BSCACADEMY SINCE1993
BSC Publishing Co. Pvt. Ltd. Head Office C-37, Ganesh Nagar, Pandav Nagar Complex, Delhi - 110092 Phone: 65252855, 56 E-mail: bscacademy@gmail.com, bscho@bscacademy.com, Web Site :www.bscacademy.com, www.bsccareer.com
b) =(start sub stop sub)/2 c) =start sub/2 + stop sub d) = start sub/2 start sub Ans a) 6 Which of the following tool is known as the parser generator ? a) Lex b) Yaac c) Tex d) Emacs e) None of these Ans b) 7 which amongst them is not translator? a) Assembler b) Loader c) Compiler d) Interpreter e) None of the above Ans b) 8) Which of the following code detects and corrects error in data? a) Windows b) Encryption c) Hamming codes d) All of these e) None of these Ans c) 9 BCNF is needed because a) When a data is deleted tuples may be lost b) Otherwise tuples may be lost c) Updating is otherwise difficult d) When there is dependent attributes in two possible composite keys is unnecessary duplicated in the tuples e) None of these Ans d) 10) What is the date function in SQL? a) Date BSCACADEMY SINCE1993
BSC Publishing Co. Pvt. Ltd. Head Office C-37, Ganesh Nagar, Pandav Nagar Complex, Delhi - 110092 Phone: 65252855, 56 E-mail: bscacademy@gmail.com, bscho@bscacademy.com, Web Site :www.bscacademy.com, www.bsccareer.com
b) System date c) Sysdate d) Datesys e) None of these Ans c) 11. If each node in a tree has value greater than every value in its left subtree and has value less than every value in its right subtree, the tree is known as ...................... a) Complete tree b) Full binary tree c) Binary search tree d) Threaded tree e) None of these Ans c) 12. The loss in signal power as light travels down the fiber is called a) Attenuation b) Propagation c) Scattering d) Interruption e) None of these Ans a) 13. The relational database environment has all of the following components except a) Users b) Separate files c) Database d) Database administrator e) None of these Ans b) 14. A path in graph G, Which contains every vertex of G once and only once ? BSCACADEMY SINCE1993
BSC Publishing Co. Pvt. Ltd. Head Office C-37, Ganesh Nagar, Pandav Nagar Complex, Delhi - 110092 Phone: 65252855, 56 E-mail: bscacademy@gmail.com, bscho@bscacademy.com, Web Site :www.bscacademy.com, www.bsccareer.com
a) Eular tour b) Hamiltonian path c) Eular trail d) Hamiltonian tour e) None of the above Ans b) 15. The mechanism by which the data and function are bounded together with an object definition a) Inheritance b) Encapsulation c) Abstraction d) Polymorphism e) None of these Ans b) 16. Which of the following statement manages the changes made by DML statements? a) SELECT b) UPDATE c) DELETE d) COMMIT e) None of these Ans d) 17 Unix operating system is based on ....................... a) Language structure b) Kernel approach c) Virtual machine d) Time sharing e) None of these Ans b) 18. What is term used to describe the situation when a derived class provides a function already provided in the base class. a) Overloading b) Overriding BSCACADEMY SINCE1993
BSC Publishing Co. Pvt. Ltd. Head Office C-37, Ganesh Nagar, Pandav Nagar Complex, Delhi - 110092 Phone: 65252855, 56 E-mail: bscacademy@gmail.com, bscho@bscacademy.com, Web Site :www.bscacademy.com, www.bsccareer.com
c) Polymorphism d) Encapsulation e) None of the above Ans b) 19. Concept of developing a compiler for a language by using subset of the same language known as .................... a) Bootstrap b) Lex c) yacc d) Analyzer e) none of thease Ans a) 20. ..................... is a communication device that combines transmissions from several I/O devices into one line. a) Concentrator b) Modifier c) Full duplex d) Multiplexer e) None of the above Ans d)
21. In database we use which command to discard all pending data changes ? a) Commit b) Rollback c) Savepoint d) Lock e) None of the above Ans b) 22 Which structure indicates many to many relation ? a) Relational database BSCACADEMY SINCE1993
BSC Publishing Co. Pvt. Ltd. Head Office C-37, Ganesh Nagar, Pandav Nagar Complex, Delhi - 110092 Phone: 65252855, 56 E-mail: bscacademy@gmail.com, bscho@bscacademy.com, Web Site :www.bscacademy.com, www.bsccareer.com
b) Network database c) Hierarchy structure d) Chain e) None of the above Ans b) 23. A address of the first element of array is called ................ a) First address b) Location address c) Initial address d) Base address e) None of the above Ans d) 24. Point to Point Protocol (PPP) used for which purpose ? a) Error detection b) Authentication c) Both (a) and (b) d) Either (a) or (b) e) None of these Ans c) 25) To overcome the difficulties of race around condition which of the following flip-flop is used? a) JK flip-flop b) SR flip-flop c) D flip-flop d) Master-slave flip-flop e) None of the above Ans d) 26. Only the process executing the critical section is allowed access to the shared variable, all other processes should prevented from doing so until the completion of the critical section. This is often referred to as ............... BSCACADEMY SINCE1993
BSC Publishing Co. Pvt. Ltd. Head Office C-37, Ganesh Nagar, Pandav Nagar Complex, Delhi - 110092 Phone: 65252855, 56 E-mail: bscacademy@gmail.com, bscho@bscacademy.com, Web Site :www.bscacademy.com, www.bsccareer.com
a) Semaphores b) Deadlock c) Mutual exclusion d) Interprocess communication e) None of these Ans c) 27. Piggy backing is a technique for -------------- a) Flow control b) Acknowledgement c) Sequence d) Instructions e) None of these Ans b) 28. How much bits addition is used by Full adder? a) 2 b) 3 c) 4 d) Unlimited e) None of these Ans b) 29. Prefix to postfix is possible in which Data structure? a) Stack b) Queue c) Link list d) Tree e) None of the above Ans a) BSCACADEMY SINCE1993
BSC Publishing Co. Pvt. Ltd. Head Office C-37, Ganesh Nagar, Pandav Nagar Complex, Delhi - 110092 Phone: 65252855, 56 E-mail: bscacademy@gmail.com, bscho@bscacademy.com, Web Site :www.bscacademy.com, www.bsccareer.com
30. A solution to the problem where the source and destination hosts are on the same type of network, but there is a different network in between.................... a) Data link b) Packet c) Tunnelling d) Hopping e) None of these Ans c) 31. In which of the following categories falls Round robin scheduling algorithm? a) Preemptive scheduling b) Non-preemptive scheduling c) Sometime preemptive sometime non- preemptive. d) All of the above e) None of the above Ans a) 32. Wasting of memories within a partition, due to a difference in size of a partition and of the object resident within it, is called------------ a) External fragmentation b) Internal fragmentation c) Compaction d) Coalescing e) None of these Ans b) 33. In digital signature the private key is used for ................. and the public key for ............... . a) Encryption, decryption b) Decryption, encryption c) Plaintext, ciphertext d) Cipertest, Plaintext e) None of the above BSCACADEMY SINCE1993
BSC Publishing Co. Pvt. Ltd. Head Office C-37, Ganesh Nagar, Pandav Nagar Complex, Delhi - 110092 Phone: 65252855, 56 E-mail: bscacademy@gmail.com, bscho@bscacademy.com, Web Site :www.bscacademy.com, www.bsccareer.com
Ans a) 34. ................... hold actual data in the database? a) Schemes b) Triggers c) Reports d) Tables e) None of the above Ans d) 35. In queues, the items deleted at one end is called? a) Rear b) Front c) Top d) Base e) None of the above Ans b) 36. What is the name given to the database management system which is able handle full text data, image data, audio and video? a) Full media b) Graphics c) Multimedia d) Hypertext e) None of the above Ans c) 37. Tranmission of computerised data form one location to another is called......... a) Data flow b) Data transfer c) Data communication d) Data management BSCACADEMY SINCE1993
BSC Publishing Co. Pvt. Ltd. Head Office C-37, Ganesh Nagar, Pandav Nagar Complex, Delhi - 110092 Phone: 65252855, 56 E-mail: bscacademy@gmail.com, bscho@bscacademy.com, Web Site :www.bscacademy.com, www.bsccareer.com
e) None of the above Ans c) 38. What is the name of operating system that reads and reacts in terms of actual time? a) Time sharing system b) Quick response system c) Real time system d) Batch system e) None of the above Ans c) 39. Spooling is most benefited in a multiprogramming environment where a) There is limited primary memory and need for secondary memory b) Most jobs are I/O bound c) Jobs are evenly divided as I/O bound and CPU- bound d) Most jobs are cpu-bound e) None of these Ans c) 40. Which of the following commands is used to update access and modification time of a file? a) Touch b) Wc c) Grep d) Cat e) None of the above Ans a) 41. You need to configure a switch from a remote subnet. Which of the following must be configured on the switch? a) Console port b) IP c) Hostname d) SNMP BSCACADEMY SINCE1993
BSC Publishing Co. Pvt. Ltd. Head Office C-37, Ganesh Nagar, Pandav Nagar Complex, Delhi - 110092 Phone: 65252855, 56 E-mail: bscacademy@gmail.com, bscho@bscacademy.com, Web Site :www.bscacademy.com, www.bsccareer.com
e) Default gateway Ans e) 42 which of the following is easiest software development process model? a) Water fall model b) Prototyping c) Interative enhancement d) Spiral model e) None of the above Ans a) 43. To avoid race condition, the maximum number of processes that may be simultaneously inside the critical section is a) Zero b) One c) Two d) More than two e) None of the above Ans b) 44. The extent to which the software can continue to operate correctly despite the introduction of invalid input is called as a) Reliability b ) Robustness c) Fault tolerance d) Portability e) None of the above Ans b) 45. When more than one attributes of a table are related with many attributes of one or more other tables, then such a relationship is known as a) One-to-one b) Many-to-many c) Many-to-one BSCACADEMY SINCE1993
BSC Publishing Co. Pvt. Ltd. Head Office C-37, Ganesh Nagar, Pandav Nagar Complex, Delhi - 110092 Phone: 65252855, 56 E-mail: bscacademy@gmail.com, bscho@bscacademy.com, Web Site :www.bscacademy.com, www.bsccareer.com
d) One-to-many e) None of the above Ans b) 46. Which of the following is hierarchical database implementation? a) Table b) Array c) List d) Tree e) None of the above Ans d) 47. Which of the following action can be performed from Drop table in Database? a) To delete the records from a table b) To delete a table with record c) To delete a particular column from the table d) To delete a blank table from the database e) None of the above Ans d) 48. When a sub class is inherited from a super class, which itself inherited from a super class, then such inheritance is known as a) Single inheritance b) Multiple inheritance c) Hierarchical inheritance d) Multilevel inheritance e) None of the above Ans d) 49. The first AI programming language was called? a) BASIC b) FORTRAN BSCACADEMY SINCE1993
BSC Publishing Co. Pvt. Ltd. Head Office C-37, Ganesh Nagar, Pandav Nagar Complex, Delhi - 110092 Phone: 65252855, 56 E-mail: bscacademy@gmail.com, bscho@bscacademy.com, Web Site :www.bscacademy.com, www.bsccareer.com
c) IPL d) LISP e) None of the above Ans c) 50) Data security threats include a) Hardware failure b) Privacy invasion c) Fraudulent manipulation of data d) Software failure e) All of the above Ans b)
A Comparative Study On Effect of Ambulation and Birthing Ball On Maternal and Newborn Outcome Among Primigravida Mothers in Selected Hospitals in Mangalor