3i INFOTECH TECHNICAL QUESTIONS - 3
61. In OST, terminal emulation is done in (a) sessions layer (b) application layer (c) presentation layer (d) transport layer Ans: (b) 62. For 1 MB memory, the number of address lines required, (a)11 (b)16 (c)22 (d) 24 Ans. (b) 63. Semaphore is used for (a) synchronization (b) dead-lock avoidance (c) box (d) none Ans. (a) 64. Which holds true for the following statement class c: public A, public B a) 2 member in class A, B should not have same name b) 2 member in class A, C should not have same name c) both d) none Ans. (a) 65. Preproconia.. does not do which one of the following (a) macro (b) conditional compliclation (c) in type checking (d) including load file Ans. (c) 66. Piggy backing is a technique for a) Flow control b) Sequence c) Acknowledgement d) retransmition Ans. (c) 67. Which is not a memory management scheme? a) buddy system b) swapping c) monitors d) paging Ans : c 68. There was a circuit given using three nand gates with two inputs and one output. Find the output. a) OR b) AND c) XOR d) NOT Ans. (a) 69. Iintegrated check value(ICV) are used as: Ans. The client computes the ICV and then compares it with the senders value. 70. When applets are downloaded from web sites , a byte verifier performs _________? Ans. Status check 71. An IP/IPX packet received by a computer using... having IP/IPX both how the packet Is handled. Ans. Read the, field in the packet header with to send IP or IPX protocol. 72. The UNIX shell .... a) does not come with the rest of the system b) forms the interface between the user and the kernal c) does not give any scope for programming d) deos not allow calling one program from with in another e) all of the above Ans. (b) 73. In UNIX a files i-node ......? Ans. Is a data structure that defines all specifications of a file like the file size, number of lines to a file, permissions etc. 74. The very first process created by the kernal that runs till the kernal process is halts is a) init b) getty c) both (a) and (b) d) none of these Ans. (a) 75. In the process table entry for the kernel process, the process id value is (a) 0 (b) 1 (c) 2 (d) 255 (e) it does not have a process table entry Ans. (a) 76. Which of the following API is used to hide a window a) ShowWindow b) EnableWindow c) MoveWindowd) SetWindowPlacement e) None of the above Ans. (a) 77. Which function is the entry point for a DLL in MS Windows 3.1 a) Main b) Winmain c) Dllmain d) Libmain e) None Ans. (b) 78. The standard source for standard input, standard output and standard error is a) the terminal b) /dev/null c) /usr/you/input, /usr/you/output/, /usr/you/error respectively d) None Ans. (a) 79. The redirection operators > and >> a) do the same function b) differ : > overwrites, while >> appends c) differ : > is used for input while >> is used for output d) differ : > write to any file while >> write only to standard output e) None of these Ans. (b) 80. The command grep first second third /usr/you/myfile a) prints lines containing the words first, second or third from the file /usr/you/myfile b) searches for lines containing the pattern first in the files second, third, and /usr/you/myfile and prints them c) searches the files /usr/you/myfiel and third for lines containing the words first or second and prints them d) replaces the word first with the word second in the files third and /usr/you/myfile e) None of the above Ans. (b) 81. You are creating a Index on EMPNO column in the EMPLOYEE table. Which statement will you use? a) CREATE INdEX emp_empno_idx ON employee, empno; b) CREATE INdEX emp_empno_idx FOR employee, empno; c) CREATE INdEX emp_empno_idx ON employee(empno); d) CREATE emp_empno_idx INdEX ON employee(empno); Ans. c 82. Which program construct must return a value? a) Package b) Function c) Anonymous block d) Stored Procedure e) Application Procedure Ans. b 83. Which Statement would you use to remove the EMPLOYEE_Id_PK PRIMARY KEY constraint and all depending constraints fromthe EMPLOYEE table? a) ALTER TABLE employee dROP PRIMARY KEY CASCAdE; b) ALTER TABLE employee dELETE PRIMARY KEY CASCAdE; c) MOdIFY TABLE employee dROP CONSTRAINT employee_id_pk CASCAdE; d) ALTER TABLE employee dROP PRIMARY KEY employee_id_pk CASCAdE; e) MOdIFY TABLE employee dELETE PRIMARY KEY employee_id_pk CASCAdE; Ans. a 84. Which three commands cause a transaction to end? (Chosse three) a) ALTER b) GRANT c) DELETE d) INSERT e) UPdATE f) ROLLBACK Ans. a ,b ,f 85. Under which circumstance should you create an index on a table? a) The table is small. b) The table is updated frequently. c) A columns values are static and contain a narrow range of values d) Two columns are consistently used in the WHERE clause join condition of SELECT statements. Ans.d 86. What was the first name given to Java Programming Language. a) Oak - Java b) Small Talk c) Oak d) None Ans.a 87. A certain radioactive element A, has a half life = t seconds. In (t/2) seconds the fraction of the initial quantity of the element so far decayed is nearly (a) 29% (b) 15% (c) 10% (d) 45% Ans. (a) 88. Which of the following plots would be a straight line ? (a) Logarithm of decay rate against logarithm of time (b) Logarithm of decay rate against logarithm of number of decaying nuclei (c) Decay rate against time (d) Number of decaying nuclei against time Ans. (b) 89. A radioactive element x has an atomic number of 100. It decays directly into an element y which decays directly into element z. In both processes a charged particle is emitted. Which of the following statements would be true? (a) y has an atomic number of 102 (b) y has an atomic number of 101 (c) z has an atomic number of 100 (d) z has an atomic number of 101 Ans. (b) 90. If the sum of the roots of the equation ax2 + bx + c=0 is equal to the sum of the squares of their reciprocals then a/c, b/a, c/b are in (a) AP (b) GP (c) HP (d) None of these Ans. (c)