Professional Documents
Culture Documents
DFRR T: ( (FL Ul. Torfrh KR
DFRR T: ( (FL Ul. Torfrh KR
Part-V/r[rT-V
INFoRMATION TECHNoLOGY {{fl *dfrr*t
/
121. wlich of the following symbol is ul. F{l t +tc qr fuF HTML i qlfEd
used to create a link to a named torfrH q-+, kr {qri +H nc'FT
anchor in HTML ? fuqr enr tt
(2) @
(1) & (2) @
(4) $ (3) # (4) $
122. which of the followiry CSS tag is Eqt t Elq Fr css #q * {Wt
tr
best suited to change the appearance er$r'r + rq'+fi{'r 4} q(fi+ + H
of an entirc section of the web Page ? v+twgmtt
(l) <Hl> (1) <81>
(2) <DIV> (2) <Dw>
{3)- <SPAN> (3) <SPAN>
(4) <P> (4) <P>
123. Observe the HTML code given r23. ++ fr+ HTML +)'g s) tqd{ 3q qk
below and identry rhe line that will sr q6sr{ :iI Errs{ Errr :r{fuT i6qr
be ignored and oot displayed bY the qrlm '*r rre c<flsrd rfi 6).n
r
browser :
<HTML>
<HTML>
(TITLE> Browser Tesl {TITLE>
<TITLE> Browser Test </TITLE>
<BODY>
<BODY>
<I> Test <{>
<I> Test </I>
<l --Testing-->
<! -* Testing -->
<B> Website </B>
<B> website </B>
</BODY> <tsoDY>
</HTML> </HTML>
?TITLE> <TITLE>
(2) <B> Website </B> (2) <B> Website <,ts>
(3) <!--Testing-->
;fi.<!--TestinS-->
(4) <I> Test <^> (4) <b Test <,iI>
INFORMATION TECH. (3) U1
124. An elemenr in an XML DTD having 124, xML DrD + gs eivr ftq+ ++ $nr
no content is known as +1llc* n Ei T+ 6EA t
(1) Uuesrrictedelement
1t) etat@s q-d+.
(2) Containe. elemenr (2) F+fi\riiiit
(3) Empty element (3) Sdqdriia
(4y'Nu[ e]emenr
(4) rd q+ilz
Pick out the invalid element naming 125. E{ €t+ ffii t t xML i-dtEL +
rule for an XML element from the qflq$ffi qqlq fi-qq 6T qq'rst.
following rules :
(t/ Narnes can start with a tumber (1) ?Ic gs. 3i6 qr fu{rq fug * q's
\'/ or punctuation character 6r *teo(It 6 I
126. Choose the compulsory athibute of 126. 5+ x$ qfrqad t xMr, qlqon +rn' *
the XML declamtion statement from eirqr{ \'tep st q6-qr si r
127. The element content model of a DTD r27. DTD + q+il- 6iiz rfr-se t cTff ,+,
uses the '+' symbot to indicate that foa t*-q eiyr si lEffiii 61-fl t r
the element
(1) S6'qr qftq'E]{qfud +{r
(lrf occurs one or multiple times
I
(3) occurs once or rlot at all (3) \rr qT{ qr rfq sR sEd Eln I
UTILITY)> LTflLITY)>
l> l>
(1) 32 (1) 32
(2) 64
^.qt*
(3) 128 (3) 128
(4) Variable (4) qR-{+ryftfi
131. Ideftiry the incofiect statement about 131. xML !T+{ + et ii q'trn m'q+ q}
XML pa$er : qd-sr+
prcbability.
(1) r+-{rfude
(1) None-persisient
(2) l-q{fuea
(2) One-persistent
(3) P-lrfu{ta
(3) P-persisteflt.
(4) fr{-crR
(4) Non-persistent
(6) INFORMATION TECH'
U1
variables.
(3) fi *.m eroq-qarr t *iil+
t 3rl Botlr .tatement' are dilferent as q6dl +{d q}qw stfrr t qqt*'
" on" is only declafing while
{q{r AsqI orl *' sM ss{
othel is declaring and vnFro*q srffiT t t
idtializing.
(a) dii qq+ qerr-qfir t Rjt6-
(4) Both statements are different as
:r-oq-ero[ qi'fiR + 3rt q1 *qqr
they dectare arrays of different
mdt t
sizes.
INTORMATION TECH. (7) U1
135. Skeya is adding links to her school 13s. +qr 3rq+ fusr€q di ns-{T{d c{ rro fu'*'
website. She wanrs that the link
colour should change as soofl as the
qlE ru} t r 16 lT-ift + fu-qe spt-6
(3) Only Statement 1 and (3) *e-q sr{-r e*r ae-r-3 a6;
'
,Sfatement 3 are true.
..]r,f All three Statements aJe true. (a) {$+{aqq F-fr} |
t- (8) INIORMATION TECH.
U1
<HTML> <HTML>
<HEAD>
<HEAD>
<SCRIPT LANGUAGE =
"JavaScriPf'> <SCNPT LANGUAGE =
"JavaScripf'>
function Start ( )
{ function Start ( )
alelt ("Event Occued") {
l alert ("Event Occued")
</SCRIPT> </tlEAD>
<BODY onload = "Starto"> )
is refteshed
13r OnlY once \ hen rhe uindoq i'
(2) E.{ sE qq +q+E ft}v tl'tr t t
(4) Will not be called as the event (4) 6+ 6rfi {& E}'ft 4iitr sdz-
handler is wrong.
io-s-dr q"d( t r
139. Sankjukta created a smiley face in 139, {E-ffr i d{r t q* eTad +6{T qim
flash and then converted ia into a ]i{ qrr arg# i qtr-da 6,'{i +
f,q
symbol to be stored in the flash H Ei fuEe' d qffifi frqt rg+it
library. Which of the following
+iq {r sq{ {q wfus'fuq-d 'qrEe'
staiement is false about this graphic
cb t':1q rtdal 6 7
symbol named "Smiley" ?
(2) Smiley is a overlay level object. (2) mfi+ \'r sfr{td +q-d 3&€
,!2f Many instances of *ris graphic tr
.can be created and used on (3) E€ nks+4'.i t{d+{ Q-q q{
stage. qqd qr v6t t r
140. What will be the output of the 140. tl-qfrfgf, lwq qqie q erseg. m
following script command ? frnt
document.write (2+5+"8"); document.write (2+5+"8");
^9f 18 (3) 78
(4) 1 (4) 7
141. To delete unwanted parts of an image laf. \r5 Sq { * i1qifu-d r+FT.q} sr{d-fi
which are not required in the firral ats-cgc t sTiftrd' n E), s] Ezr+ + H
output, one has to :
.lnr+r e-cqT d,Tr -
(1) Blur unwanted parts (1) erqifo-r k +) qr r
143. Identify and name the Photoshop 143. +lqiq * ss qi-qr or rrq qeqr+ si
featue that is a set of instructions sr.*qrc t sT-dM qT fu t aqr lq€sT
built into the program to apply 3c+'T ++ fr+ fr€€ qT-& fui q fri'q
" special effects to Pictures with crTrqi +'H t*cr qrfi t ,
options such as
(1) +d{,1,
(1, Feathering (2) F6-€+
y'2r Filters
€) +{ffi
. (3) Channels (4) dqd
(4) Layers
(4) +s+E
{,stackmode
INFORMATION TECH. (11) U1
interface which is the lower portion i ia&-q sT enns+ f6wr dal * 3rt{
of the interface and has two views rq5 q 6rd i - fl+r# q }in qE
:
"t
graphical view and list Yiew.
q.
t$pectot
(1) iq$ aisi€{
:g//Ptopefiy
(2) (cl qirl
(2) Tools Panel
(Jl qlr qrdl
(3) Scene Panel
(4) +{d q'{n
(4) Layers Panel
146, f,rom the following statements pick 146. d$ I ic E++l + qt-q frq d t
out the incorect statement with rtiriT seFl 6i) :
tween.
(2) \'6YIqEr r-+{ 6d +k-a +€
(2) To shape tween a whole word,
qlr{ E} oler irR c{ {q6{ +5
put each lettq orl a separate
separately.
(3) rh di {, sifrq }q d qo eml
Gf In shape tweening. a blanl ke)
^-/
fiame is iaserted in last frame
41"8c +gr qrar t +itts'{s+
frame.
(4) rlc f6<T er+t*+ etr Is. q]fr
(4) Shape hints create uneve[ and
rough morphs.
q+i t r
U1 (12) INTORMATION TECH.
devices
(2) 6c FE€ s1*{€ *l srrs[{rdr r
(3) A11 nodes are diectly t:t c"i qrs*& t slt $.i EIA t r
(3) Beviewing,Exporting
(3) ffiqri, C*dftr'
(1)
+r r+q e-ri * r
Equalization
154. A Firewall is
154. q.5-rsFRerm tt
g,l/only e software (1) +{d \rr#{{
hardwarc ++
(4) a software with or without
(4) * sls qr k{r \'6'
6rCac{
hardware
#4{
--:
155.. It has much Sreater bandwidth
lss. o €c+t ffiq {{t gqR qr{q} t
than other traosmission media. orql eT( t t
transmission distaoce.
o mkq gq+tq qfuq;<vrtlffi t t
. It is immune to elecaomagnetic
157, Wtuch of the following is used 15?. F{+ + sI ildc rfiIl{ a{r{ +
+t'q
execute cPU instuction ? e-$Ri sl 6ntkd E+ t gqh di'ct t t
(1) Peisonal Computer (1) +clff6-sq{{
(2) -ftogram Counte! (2) *qrc TIfrl,
(3) Protection Check
(3) gGr +s
"(4) ParameterCombinatiol
(a) clqqrs d+irr
160. In computers, this is the processing I 160. qrq.{ t, \-;n iqrc + lr{H dr
of program iNtructions by dividing i+qrfud q.G's+$i {srqqiirr*qrc s}
them among multiple Prccessom with 4il t
6q qqq + 4rqllqd 4] EdR
the objective of running a progmm in
163. This system software provides an 163. T6 !'qr* ffi, cffi{Eq fu€c sli
interface to a hardware det ice. rr6+q{ ilr qt-q+ n e+r gs+ { Frdl{ff
enabling the opeEting system to
6(dT t
access that hardware
Device Driver
(2) kqr{q 9r{d{
^;l2f (3)
(3) Program installer
gilTc {isrrf
(4) Device help file (4) (6T',{dT sr{d Giq t6r{o
166. Which of the following is non-linear 166. r+++ +{ + qdc srer {rfi + ?
table's colurDn F ?
x F
x Y F
0 0 1
&
0 0
0 1 0
0 1 a
1 0 0
1 0 0
I I 1
1 1 \
(1) x .Y'+ x
(1) x.Y'+ x
(2) X'.Y+X Y'
X' .Y + X.Y'
_{ (3) X.Y+X Y'
(3) X.Y+X Y'
(4) x.Y+X Y'
(4) x.Y+x'.Y'
INFOR]\fATION TECH. (19) UI
170. Find missing term in the following 176. fi'qfrfun Ei{q i{qr ji qqfurd q(
Boolean Expression : *trertr
x@ -l
(1) 1 (1) I
(2) x (2) x
(3) x' (3) x'
sy'o (4) 0
171. Observe the following circuit and 171, w cftcq + +qs{ s-d'E+ fu cr fus
find which operation ilterFets it
appropriately.
y-qrf,{ s} qffrd s.rdr t r
173. Given two sorted lists of size m and n 173. q] sfu-d fu€ fr t fu+*T En+n rT pr:
respectively. The number of m ei't n t r c-q \rriftq S F{* +sR
compadsoN needed in the worst case aq+{5affiqn{rt+,frr
by the merge algorithm will be
(1) min (m, n) (1) min (m, n)
(2) ma.r (m, n) (2) rnax (m, n)
(3) m+n-1 (3) m+n- 1
y'4) na \gr-m
(20) INTORMATION TECII.
U1
175. The operator us€d to access member r75. qE rimrr6' q6- $iq€ Ei{ EqE FN-
furction of a class ftom its object is
*q<s qm{ rs c
+ffic'jnn
(2)
qrdr t
(1) ',t
't I
(1) *
(3) : (u'-. (3) : (4)
176. In this programming methodology' 176, Eq *fiftq 614 rdfr d {qq qrqI 6l
E ffE s{+ Edx {6EqI { rer
qrdr
common functionalities are grouped
together irto separate itldependent t r 5t *nr oi 5o r+rel { fufa-t
units. The whole Progam is divided q+ s}+q{ dr* + Y{r i+qr qrdr t t
handlilg of text
rePreseotation and (1) EBCDIC
(1)._EBCDIC (2) Unicode
/.. tJrncode
:l (3) ASCII Code
(3) ASCII code
(4) QR Code
'(4) QR code
]NTORMATION TECH. (21) U1
178. The following is the coEect 178. q6 ffi{q EisnT*q (rnheritance) $1 {I&
interpretalion of Hiemrcirical qrqrt
Inheritaflce :
(1) qs 3{r{€ (derived) siTRr + {M
(1) one base class with one derived qs qFIR (base) WIRI
class
{3r- one
-\2- base class with more than
qf eItIR (base) RF
one derived classes (4) \16 derived wI{ + slq \r€ *
(4) more than one base classes 3{}16 ell]R. oase) Rfls
with one derived class
182. select the colrect ouQut of the lEz fr'qfEfun +ic 6I Fi ar5c$e fqfrTd
(2) D (2) D
(3) ZING (3) ZING
\4.r z
(4) Z
'183. A complete binary tree with n leaf rs3. (r6Ti sr5{t A frqit n +q,+sqt +
nodes can have nodes of
t
degree 2.
tot'" - -nqezkri'*dFrAt
(1) logrn
-V (2) n- I
(2) n- 1
(3) o (3) n
t4N 2r
{4) 2"
184. OrIy the process executing *re 184. +{d {6 **s q} fufuda qT'r d
cdtical section is allowed to access +rqlkt or rdr t €lsr ifri+a qt
the shared vad;bb and all other Hs or r+m t qs1 s++esd
processes should bg prevented from tsr rd t m t+r qrdr t qq n-st
<-o
186. Find the output of the followiag : trqkfiqr c++ qls 6r .xrsc5d qfl( :
C++ code :
itrt *P, A[ ]={20, 90, 70, 10);
int *P. At l={20. 90. 70. l0}:
P=A;
FA;
A[2]+=10;
At?lt=to;
P+=2;
P+=2i
cout<< xP<<etrdl;
cout<< *P(<endl;
(1) 70
(1) 70
(2) (2) 80
80
(3) e0
-14 90
(4) 10 (4) l0
if.
187. A table has more tha! one attributes 187. q6-kn { r'+. t qrEr t+ qtqe t
each of which identify a tuple H t E{ \rs zT6 + fffrrq sq *
uDiquely. AI such l(eys arc known as :
qrqr<m t r ce rp*:id qr qror* E r
Primary keys (1) ctrc${+
(2) Altemate ksys (2) q€+.{*
(3) Candidate keys
ol +*,*.*
(4) Forcign keys
(4) st{rt!ff
i
I
(u\ INFORMATION IECI{.
U1
(4)
Y*o FIFO
189, Which of the following cannot be rs9. E{+ t +{ $ crcr+{ * ttq q-6'F+
as a qd t*qr qt
r used front-end software
fr< ffir *1 ett s-+r
alongwith a database ?
s+mtt
(l) Visual basic (1) kgonfir6
(2) Visual C++ (2) fuq€ c++
(3) Power Builder (3) qrq{t+€{
(l) detetes onlY the stucture of (1) +Em )q6 ql{r*{ 4} t{zrf,r t I
table.
a) ke*rSqfu+iisitraart' t
I
1008 BANTA I000 GI]EST 16- 1008 BANTA 1000 GLTEST 16-
]EORGE SEP,- GF-ORGE SEP.-
16 i6
1014 AIIYA 5000 v{ONTHLY 15- 1014 ALIYA 5000 MONTHLY 15-
DAGA SEP.- DAGA SEP,.
10 10
In the above table "CLLE". TYPE iq{tfr }iE "CLUB" ii, TYPE si'dq
column has type of membe$hip arld ii essfl 6r arqq. cq FEE Erdq ii
FEE contains membe$hip fee as per q{Frdr zEq + 3riqR v{sdr q'-6-fflr
the tlpe of membership. "LIFE" 6 r ',LIFE ZTg s. q(gl.er.oruer-'
q qsqs4
members have paid orc time FEE, vlq qqT FfqT *, r<f6
whereas ANNUAL membem pay zrEc + s{s fl q{ {6' €m s'{+ t q
FEE every year on the Day and fu s-<* v<*q-ar dt qi
nriq 1ooD +
month of
their joining (DOJ), i<< q q*i c{ 3rfl fucr qrdr * r
MONTHLY members pay FEE every 'MONTHLY', zrsq +' v<-s E{ tI*+
qqi FwrdT q-6ur 6d +1 drt€ (DoJ)
month on Day of their DOJ, GUEST
members pay FEE daily ftom the day
*'leq e+Er sii t lGUEsT' znc +
they havejoined.
v(q, erc+ y*r ++ + ftr +qnT t
{-ffi 3i-ST q-ri + I
Based on tabla CLLTB,fird out the 19L crus kfi * TrrlF cr 5-fl FBE r<frra
"192.
most apprcPriate SQL statement
qri * H r-st scTfi SQL 4!I? 4I{
ftom the following to display the Frt?
. Iotal amount of FEE collected from
;olthlY members till date :
(1) SELECT ST]M
(MONTHS-BETWEEN
( I ).,/-SELECT SUM
(SYSDATE, DOJ) x FEE)
(MONTHS_BETWEEN
-/ isYso,lrr,ooD * rsE) FROM CLUB WHERE TYPE
FROM CLI,E WHERE TYPE = "MONTHLY"i
='MONTHLY"I (2) SELECT SL\4
12) SELECT SI^4 (MONTH BETWEEN (DOJ'
i MONTH BETWEEN I DOJ' SYSDATE) * FEE)
ivsoerr) * rPr)
FROM CLI'B WHERE TYPE
FROM CLUB WHERE TYPE .,MONTHLY"i
,.MONTHLY]'i =
=
(3) SELECT SUM (MONIH
13) SELECT SIIM RETWEEN TDOJ. SYSDATE)
r MoNTHBETWEEN (DOJ' X rEE)
SYSDATE) * FEE)
FROM CLUB WHERE TYPE
FROM CLIIB WHERE TYPE
= "MONTHLY":
= "MONIHLY";
{4) SELECT
(4) SELECT
MONTHS BETWEEN MONTHS-BETWEEN
X FEE (SYSDATE, DOJ) * FEE
(SYSDATE, DOJ)
194, Based on table "CLUB", which SQL 194. CLUB *qo * ewn qr g+i * 6I+ d
query will help us to know the sQL dft qk{ s{Fif ft1 {qr q-dr+,fr
number of "MONTHLY" members, t{d'i "ol-JA}r-o7" * sR cr,un +1
who joined club after '01-JAN-07" {fimr it t ?
L ARI
lo.
lt I
r4r The link metlod oPens a srnall rar (rfiTi #r idt Ein-dl
new window ro stan Playing ' ko<ir+r
t i{qg qrrq rqa: ir+ griqiirg
the file automatically without Hsq+E l-frt t
downloading.
INFORMA'TION TECIL (29) U1
ll}7. Which of the following is not a valid rq{ t o}t sr <FRAME> trr sr g€
value of the SCROLLING attdbute qq6tfrr\.tq.r$t?
ofthe <FRAME> tag ?
o) YEs
\ qr---YEs (2) No
{
(2) NO
(3) AUTO
(3) ArrTO
(4,'
(4) NONE
NONE
Which is not the state of the process q<t * da + smfer fu€c + ++q
in OS ?
qff qqsr qrt t r
(1) hivileged (l) fifu+ss
(2) Running (2) rftr
f3) Ready (3) i-s
gV1locked (4) qi€
(1) <TR>
(l) <TR>