Professional Documents
Culture Documents
Jku MEXFCS!
Jku MEXFCS!
A. Addresses
B. Table indices
3 .) Which transaction property ensures changes are still present following a crash
or system failure?
A. isolation
B. consistency
C. atomicity
D. durability
A. sequential access
B. timed access
C. direct access
D. variable access
5 .) Which one of the following network device connects networks that use
different network technologies?
A. Switches
B. Bridges
C. Routers
D. Gateways
A. Abstraction
B. Polymorphism
C. Encapsulation
D. Inheritance
7 .) Process of creating copy of stored data onto another disc is termed as creating
A. locked files
B. backup files
C. modified file
D. destroyed file
A. Partial
B. Total
C. Over lap
D. Disjoint
A. 1NF
B. 3NF
C. 5NF
D. 8NF
A. Table
B. Form
C. Query
D. Report
11 .)
C. It is feature of OOP
D. None of these
13 .) A telephone number, abirth date and a customer name all are examples of
A. A database
B. A record
C. A file
D. data
C. Switches can alert the network administrator to high data collision rates.
A. Intension
B. Extension
C. Expansion
D. Defination
A. Design
B. Detailed Design
C. Coding
A. lost update
B. data intigrity
C. funcational dependency
D. transitive dependence
C. Design
D. Analysis
A. user mode
B. system mode
C. supervisor mode
D. both a and b
A. Candidate key
B. Foreign key.
C. Composite key
D. Determinants
A. Partial-mesh
B. Bus
C. Ring
D. Full-mesh
A. One register
B. operating system
D. other threads
A. Software Design
B. Feasibility Study
C. Requirement Gathering
D. System Analysis
A. mutual exclusion
A. Schema
C. Data domain
D. Independence
B. Private
C. Public
D. Protected
A. Buffers
B. Data Set
C. Buses
D. Registers
32 .) How many useable hosts are on each subnet when the Network ID is
150.150.0.0 and the subnet mask is 5.255.192.0?
A. 32
B. 64
C. 62
D. 30
C. The best approach to use for projects with large development teams
A. path file
B. batched file
C. directory
D. path name
A. Text
B. Mixed
C. Memo
D. Auto number
37 .) One is the process of creating new classes from the existing class or classes
with taken some properties of the base class.
A. funcation
B. encapsulation
C. inheritance
D. polymorphism
38 .) A lock that allows concurrent transaction to acess different rows of the same
table is known as
A. database-level lock
B. field-level lock
C. table-level lock
D. row-level lock
40 .) When memory is divided into several fixed sized partitions, each partition
may contain ________.
D. None of these
41 .) The type of AI systems have no memory and which cannot use past
experiences to inform future one are referred as:-
A. Limited memory
B. Self-awareness
C. Theory of mind
D. Reactive machines
A. 192.150.20.10
B. 172.17.41.55
C. 172.32.45.80
D. 192.167.25.65
A. Heuristic processing
B. Cognitive science
C. Relative Symbolism
D. Pattern matching
44 .) Which one of the following refers to the total view of the data base content?
A. Conceptual view
B. Physical view
C. Internal view
D. External view
45 .) The operating system and the other processes are protected from being
modified by an already Running process because :
D. every address generated by the CPU is being checked against the relocation
and limit registers
46 .) You can use the C++ _____ function to assign a value to a String variable
A. assign
B. copy
C. string
D. strcpy
47 .) In situations where we need to execute body of the loop before testing the
condition, we should use_____.
A. For loop
B. while loop
C. do-while loop
A. void
B. int
C. string
D. bool
A. Stack organization
B. Program control
C. Instructional code
D. CPU
B. Declared variables
D. missing brackets
51 .) Which of the following machine requires input from the humans but can
interpret the outputs themselves?
A. Actuators
B. Agents
C. Sensors
D. AI System
B. Cylindrical (R2P)
C. Articulated/anthropomorphic (3R)
B. To search and measure how far a node in a search tree seems to be from a goal
C. To compare two nodes in a search tree to see if one is better than another
A. HTTPS
B. SNMP
C. Telnet
D. DNS
A. Conditional operator
B. Relational operator
D. Comma operator
A. Aggregation
B. Generalization
C. Specialization
A. symmetric multiprocessor
B. asymmetric multiprocessor
C. symmetric multiprocessing
D. asymmetric multiprocessing
A. Partial
B. Rational
C. Deterministic
D. Stochastic
A. State
B. Method
C. Procedures
D. Behavior
A. storage package
B. database package
C. organized package
D. hardware package
A. Spiral Model
B. Waterfall Model
C. 4GT Model
D. RAD Model
64 .) _____ is the concept in which a process is copied into main memory from the
secondary memory According to the requirement.
A. Paging
B. Demand paging
C. Segmentation
D. Swapping
65 .) When a program tries to access a page that is mapped in address space but
not loaded in physical Memory, then?
D. no error occurs
A. Switching
B. Remote access
C. Convergence
D. Network management
B. Application programe
C. Source code
D. Schema
69 .) Which type of file contains data and database objects such as tables and
indexes?
A. Binary files
B. File groups
C. Log files
D. Data file
A. Portion
B. Scene
C. View
D. Part