Download as pdf
Download as pdf
You are on page 1of 7
115129, 823 AM cee Computer Science Model Examination RESULT'S 1.) Which of these classes are the direct subclasses of the Throwable class? Answer : RuntimeException 2.) Which one of the following is not true about computer register? Answer: AC and , IR holds 11 bits 3 .) Basic data transfer, reliability, flow control, error control, multiplexing, connection control, precedence and security are functions of which layer? Answer : Network layer 4.) Which of the following statements is correct about the firewall? Answer :Itis a device installed at the boundary of an incorporate to protect it against the unauthorized access. 5 .) Your IT Company is constantly changing, with new users coming and g throughout the year. One of your common tasks requires the deletion of user accounts for employees who have left the company. Which command can be used to delete user accounts? 9 Answer : Dsmod. 6.) Among the following which is checked exception? Answer: All are correct 7.) Which one of the following is true about transa: in? Answer : If Tj reads an object last written by Ti, Tj must be aborted 8 .) Each process is represented in the operating system by = Answer : Program control block 10,9.99,189/0es/home.php?page=result&id=7 wn 115129, 823 AM cee 10..) Which exception is thrown when divide by zero statement executes? Answer : NullPointerException 1) is the practice and precautions taken to protect valuable information from unauthorised access, recording, disclosure or destruction. Answer : Network Security 12..) Which one of the following transaction are all possible under Dirty read, Unrepeatable read & Phantom? ‘Answer : READ UNCOMMITTED 13 .) The algorithms like merge sort, quick sort and binary search are based on Answer : Divide and conquer algorithm 14.) Which one of the following is not true about 1NF (First Normal Form) Rules? Answer: It should be 2NF (Second Normal Form) 15.) Used to delete all the rows of a table easily once and quickly. Answer : Truncate statement 16 .) Which of the following is a non-functional requirement? Answer : The system always respond to user clicks in less than one tenth of a second 17.) If an Address Resolution Protocol (ARP) request is broadcast, an ARP reply is Answer: universal 18 .) Adding a machine name to the file /etc/x0.host accomplishes wh following of the Answer : Restricts that machine from being accessed using X. 19 .) What does the port number in a TCP connection specify? Answer : All are correct 20..} What is a widely used privacy ensuring program by individuals and corporations? 10,9.99,189/0es/home.php?page=result&id=7 an 115129, 823 AM cee 21.) Which one of the following Is not true about naming ER diagram? Answer : Adjectives --> prospective entities 22 .) Which of the following is not true about relational data model? ‘Answer : A table is either a BASE TABLES (Unnamed Relations) or VIEWS (Named Relations) 23 .) Which of the following is the m: ion for not running a Web server over a small home network connected to the Internet with a cable modem Answer : Security risk 24.) If matching tuples are not found, the kind of OUTER JOIN operation which keeps all the tuples of st and second relation is classified as ‘Answer : LEFT OUTER JOIN 25..) In an any organi: tion, company or firm the policies of information security come under. Answer : CIA Triad 26 .) Which of the following is not true about three-State Bus Buffers? Answer : Two of the states are signals equivalent to logic 1 and 0 as in a conventional gate. 27..) The rapid application development model is Answer: All 28 .) Which one of the following is not true about Participation of an Entity Set in a Relationship? Answer : In partial participation, every tuple in the entity or relation participates in at least one relationship by taking a role. 29 .) Multilevel Amplitude Shift Keying (MASK) is not implemented with pure Amplitude Shift Keying (ASK), it is implemented with ‘Answer : Binary ASK 30..) Which of the following remote access programs is the most secure 10,9.99,189/0es/home.php?page=result&id=7 ar 115129, 823 AM cee Answer: R 32 .) When the CPU refers to memory and finds the word in cache, it is said to produce a___. Answer : Hit 33 .) Which one of the following can force the elimination of duplicates from student tablein select clause? Answer: select * from student 34.) You have a network that needs 29 subnets while maximizing the number of hosts addresses available on each subnet. How many bits must you must you borrow from the host field to provide the correct subnet musk? Answer : 4 35 .) The method name and the parameter list together constitute, Answer : method signature 36 .) Which one of the following is not true about shift regi Answer : Data are input only to the leftmost flip-flop. 37.) In which phase in compiler design do we check the grammar of the programming language? Answer : Semantic analysis. 38 .) Which regular expression is used to denotes all strings with an even number of a's followed by an odd number of b's ‘Answer : (aa)*(bb)*b 39 .) Which of the following reasoning is based on heuristic knowledge? Answer : Common Sense Reasoning 40 .) Which mode of operation for a block cipher has the characteristic that each possible block of plaintext has a defined corresponding ciphertext value and vice versa Answer : Electronic code book 10,9.99,189/0es/home.php?page=result&id=7 ar 115129, 823 AM cee 42.) Cohesion is a qualita indication of the degree to which a module Answer : Is connected to other modules and the outside word 43 .) What is the function of an Artificial Intelligence “Agent”? Answer : Mapping of environment sequence to an action 44_.) The web application like banking websites should ask its users to log- after some specific period of of which cybersecurity pri again 1e, let say 30 min. It can be considered as an example ciple? Answer : Compromise recording 45 .) Among the following which is false about interface? Answer : The methods that are declared in interface have no bedies 46.) means two methods having same name but take different input parameters Answer : Overriding 47 .) Which one of the following is not true about SET NOCOUNT ON statement in the stored procedure? Answer : If SET NOCOUNT OFF is set, no message would appear indicating the number of rows affected. 48 .) Which of the following is arranged in the correct Active Directory organizational order (largest to smallest)? Answer : Forest, Domain, Tree, Branch, Computer 49 .) Which one of the following is true about control word? ‘Answer : The five bits of the OPR select one of the operations in the ALU. 50.) is a combinational circuit that receives binary information from one of 2n input data & directs to one output. ‘Answer : Decoder 51 .j Which one of the following is true about S-R flip-flop? 10,9.99,189/0es/home.php?page=result&id=7 ST 115129, 823 AM cee memory. Anawer : Cache memory 53 .) At least one resource must be held a non-sharable mode; that is, only one process at a time can use the resource. If another process requests that resource, the requesting process must be delayed until the resource has been released. This condition for deadlock is referred to as: ‘Answer : Hold and Wait 54..) Select the incorrect rule statement from the given patterns. Answer : ‘COMP%' matches any string ending with "COMP" 55 .) From the following collection framework interface allows duplicate values to be stored? Answer : Set interface 56 .) What is the result of a bottom-up parse? Answer : The right-most derivation in reverse. 57 .) Which of the following is false about LinkedList? Answer : insertion and removal of elements is expensive 58 .) What is the maximum number of IP addresses that can be assigned to hosts on a local subnet that uses the 255.255.255.224 subnet mask? Answer: 40 59.) You install Active Directory on a server. You want it to be a separate domain that part of an existing forest but containing a namespace separate from the forest it. What is this type of domain called? where you are installi Answer : A child domain 60 .) You need to subnet a network into 5 subnets, each with at least 16 hosts. Which classful subnet mask would you use? Answer : 255.255.255.24 10,9.99.189/0es/home.php?page=result&id=7 er 115129, 823 AM Percentage 10,9.98,1890esmnome.php?page=result&id=7_ 38.333333333333%

You might also like