115129, 823 AM cee
Computer Science Model Examination
RESULT'S
1.) Which of these classes are the direct subclasses of the Throwable class?
Answer : RuntimeException
2.) Which one of the following is not true about computer register?
Answer: AC and , IR holds 11 bits
3 .) Basic data transfer, reliability, flow control, error control, multiplexing, connection
control, precedence and security are functions of which layer?
Answer : Network layer
4.) Which of the following statements is correct about the firewall?
Answer :Itis a device installed at the boundary of an incorporate to protect it against
the unauthorized access.
5 .) Your IT Company is constantly changing, with new users coming and g
throughout the year. One of your common tasks requires the deletion of user
accounts for employees who have left the company. Which command can be used to
delete user accounts?
9
Answer : Dsmod.
6.) Among the following which is checked exception?
Answer: All are correct
7.) Which one of the following is true about transa:
in?
Answer : If Tj reads an object last written by Ti, Tj must be aborted
8 .) Each process is represented in the operating system by =
Answer : Program control block
10,9.99,189/0es/home.php?page=result&id=7 wn115129, 823 AM cee
10..) Which exception is thrown when divide by zero statement executes?
Answer : NullPointerException
1) is the practice and precautions taken to protect valuable information
from unauthorised access, recording, disclosure or destruction.
Answer : Network Security
12..) Which one of the following transaction are all possible under Dirty read,
Unrepeatable read & Phantom?
‘Answer : READ UNCOMMITTED
13 .) The algorithms like merge sort, quick sort and binary search are based on
Answer : Divide and conquer algorithm
14.) Which one of the following is not true about 1NF (First Normal Form) Rules?
Answer: It should be 2NF (Second Normal Form)
15.) Used to delete all the rows of a table easily once and quickly.
Answer : Truncate statement
16 .) Which of the following is a non-functional requirement?
Answer : The system always respond to user clicks in less than one tenth of a second
17.) If an Address Resolution Protocol (ARP) request is broadcast, an ARP reply is
Answer: universal
18 .) Adding a machine name to the file /etc/x0.host accomplishes wh
following
of the
Answer : Restricts that machine from being accessed using X.
19 .) What does the port number in a TCP connection specify?
Answer : All are correct
20..} What is a widely used privacy ensuring program by individuals and
corporations?
10,9.99,189/0es/home.php?page=result&id=7 an115129, 823 AM cee
21.) Which one of the following Is not true about naming ER diagram?
Answer : Adjectives --> prospective entities
22 .) Which of the following is not true about relational data model?
‘Answer : A table is either a BASE TABLES (Unnamed Relations) or VIEWS (Named
Relations)
23 .) Which of the following is the m: ion for not running a Web server over
a small home network connected to the Internet with a cable modem
Answer : Security risk
24.) If matching tuples are not found, the kind of OUTER JOIN operation which keeps
all the tuples of
st and second relation is classified as
‘Answer : LEFT OUTER JOIN
25..) In an any organi:
tion, company or firm the policies of information security
come under.
Answer : CIA Triad
26 .) Which of the following is not true about three-State Bus Buffers?
Answer : Two of the states are signals equivalent to logic 1 and 0 as in a conventional
gate.
27..) The rapid application development model is
Answer: All
28 .) Which one of the following is not true about Participation of an Entity Set in a
Relationship?
Answer : In partial participation, every tuple in the entity or relation participates in at
least one relationship by taking a role.
29 .) Multilevel Amplitude Shift Keying (MASK) is not implemented with pure
Amplitude Shift Keying (ASK), it is implemented with
‘Answer : Binary ASK
30..) Which of the following remote access programs is the most secure
10,9.99,189/0es/home.php?page=result&id=7 ar115129, 823 AM cee
Answer: R
32 .) When the CPU refers to memory and finds the word in cache, it is said to
produce a___.
Answer : Hit
33 .) Which one of the following can force the elimination of duplicates from student
tablein select clause?
Answer: select * from student
34.) You have a network that needs 29 subnets while maximizing the number of hosts
addresses available on each subnet. How many bits must you must you borrow from
the host field to provide the correct subnet musk?
Answer : 4
35 .) The method name and the parameter list together constitute,
Answer : method signature
36 .) Which one of the following is not true about shift regi
Answer : Data are input only to the leftmost flip-flop.
37.) In which phase in compiler design do we check the grammar of the
programming language?
Answer : Semantic analysis.
38 .) Which regular expression is used to denotes all strings with an even number of
a's followed by an odd number of b's
‘Answer : (aa)*(bb)*b
39 .) Which of the following reasoning is based on heuristic knowledge?
Answer : Common Sense Reasoning
40 .) Which mode of operation for a block cipher has the characteristic that each
possible block of plaintext has a defined corresponding ciphertext value and vice
versa
Answer : Electronic code book
10,9.99,189/0es/home.php?page=result&id=7 ar115129, 823 AM cee
42.) Cohesion is a qualita
indication of the degree to which a module
Answer : Is connected to other modules and the outside word
43 .) What is the function of an Artificial Intelligence “Agent”?
Answer : Mapping of environment sequence to an action
44_.) The web application like banking websites should ask its users to log-
after some specific period of
of which cybersecurity pri
again
1e, let say 30 min. It can be considered as an example
ciple?
Answer : Compromise recording
45 .) Among the following which is false about interface?
Answer : The methods that are declared in interface have no bedies
46.) means two methods having same name but take different input
parameters
Answer : Overriding
47 .) Which one of the following is not true about SET NOCOUNT ON statement in the
stored procedure?
Answer : If SET NOCOUNT OFF is set, no message would appear indicating the number
of rows affected.
48 .) Which of the following is arranged in the correct Active Directory organizational
order (largest to smallest)?
Answer : Forest, Domain, Tree, Branch, Computer
49 .) Which one of the following is true about control word?
‘Answer : The five bits of the OPR select one of the operations in the ALU.
50.) is a combinational circuit that receives binary information from one of
2n input data & directs to one output.
‘Answer : Decoder
51 .j Which one of the following is true about S-R flip-flop?
10,9.99,189/0es/home.php?page=result&id=7 ST115129, 823 AM cee
memory.
Anawer : Cache memory
53 .) At least one resource must be held
a non-sharable mode; that is, only one
process at a time can use the resource. If another process requests that resource, the
requesting process must be delayed until the resource has been released. This
condition for deadlock is referred to as:
‘Answer : Hold and Wait
54..) Select the incorrect rule statement from the given patterns.
Answer : ‘COMP%' matches any string ending with "COMP"
55 .) From the following collection framework interface allows duplicate values to be
stored?
Answer : Set interface
56 .) What is the result of a bottom-up parse?
Answer : The right-most derivation in reverse.
57 .) Which of the following is false about LinkedList?
Answer : insertion and removal of elements is expensive
58 .) What is the maximum number of IP addresses that can be assigned to hosts on a
local subnet that uses the 255.255.255.224 subnet mask?
Answer: 40
59.) You install Active Directory on a server. You want it to be a separate domain that
part of an existing forest but containing a namespace separate from the forest
it. What is this type of domain called?
where you are installi
Answer : A child domain
60 .) You need to subnet a network into 5 subnets, each with at least 16 hosts. Which
classful subnet mask would you use?
Answer : 255.255.255.24
10,9.99.189/0es/home.php?page=result&id=7 er115129, 823 AM
Percentage
10,9.98,1890esmnome.php?page=result&id=7_
38.333333333333%