DB/OS/DS/Networking/HTML - 2

1)   Which of the following may lead to an irrecoverable error in a database system?

a. A transaction reads a data item after it is written by an uncommitted transaction
b. A transaction reads a data item after it is written by a committed transaction
c. A transaction reads a data item after it is read by an uncommitted transaction
d. A transaction writes a data item after it is read by an uncommitted transaction
Answer  Explanation 

ANSWER: A transaction reads a data item after it is written by an uncommitted transaction

Explanation:
No explanation is available for this question!


2)   Which type of clustering index is defined on the fields?

a. Non-key and non-ordering
b. Non-key and ordering
c. Key and non-ordering
d. Key and Ordering
Answer  Explanation 

ANSWER: Non-key and ordering

Explanation:
No explanation is available for this question!


3)   Which is the concurrency control protocol that ensure both conflict serializability and freedom from deadlock? (Database)

a. Time stamp ordering
b. 2 - phase locking
c. Both A and B
d. Neither A nor B
Answer  Explanation 

ANSWER: Time stamp ordering

Explanation:
No explanation is available for this question!


4)   What do you mean by atomicity?

a. When an update occurs to a database, either all or none of the update becomes available to anyone
b. It determines how the transaction integrity will be visible to the other users and systems
c. The transactions have been committed and will survive permanently
d. All of the above
Answer  Explanation 

ANSWER: When an update occurs to a database, either all or none of the update becomes available to anyone

Explanation:
No explanation is available for this question!


5)   What type of relationship does a hierarchical schema help to establish between the items of a database?

a. top-to-bottom relationship
b. bottom-to-top relationship
c. one-to-many relationship
d. many-to-one
Answer  Explanation 

ANSWER: top-to-bottom relationship

Explanation:
No explanation is available for this question!


6)   A ROLLBACK statement will also release any existing savepoints that may not be in use.

a. True
b. False


Answer  Explanation 

ANSWER: False

Explanation:
No explanation is available for this question!


7)   What is truncating a table?

a. Data alone deleted, Performs an automatic commit
b. Data alone deleted, Doesn’t perform automatic commit
c. Table structure + Data are deleted
d. Table structure alone deleted, Performs an automatic commit
Answer  Explanation 

ANSWER: Data alone deleted, Performs an automatic commit

Explanation:
No explanation is available for this question!


8)   Key value pair is usually seen in __________.

a. Hash Tables
b. Heaps
c. Both a and b
d. Skip list
Answer  Explanation 

ANSWER: Hash Tables

Explanation:
No explanation is available for this question!


9)   Which of the following statements is true for Binary search Trees?

a. The left subtree of a node contains only nodes with keys less than the node's key.
b. The right subtree of a node contains only nodes with keys greater than the node's key.
c. Both a and b above
d. Both left and right subtree nodes contains only nodes with keys less than the node's key.
Answer  Explanation 

ANSWER: Both a and b above

Explanation:
No explanation is available for this question!


10)   Where can we use Breadth First Search(BFS)?

a. Binary trees
b. Stacks
c. Graphs
d. Both a and c
Answer  Explanation 

ANSWER: Graphs

Explanation:
No explanation is available for this question!


11)   In _____________, the heights of the two child subtrees of any node differ by at most one.

a. Binary Tree
b. Red Black Tree
c. Splay Tree
d. AVL Tree
Answer  Explanation 

ANSWER: AVL Tree

Explanation:
No explanation is available for this question!


12)   Which Linked List have the last node of the list pointing to the first node?

a. Circular Doubly Linked List
b. Circular Linked List
c. Circular Singly Linked List
d. Doubly Linked List
Answer  Explanation 

ANSWER: Circular Singly Linked List

Explanation:
No explanation is available for this question!


13)   Which of the following is the faster operation in AVL Trees?

a. Insertion
b. Deletion
c. Updation
d. Retrieval
Answer  Explanation 

ANSWER: Retrieval

Explanation:
No explanation is available for this question!


14)   Which principle works on Stack?

a. FILO
b. FIFO
c. LILO
d. LIFO or FILO
Answer  Explanation 

ANSWER: LIFO or FILO

Explanation:
No explanation is available for this question!


15)   In a heap the element with the greatest key is always located in which node?

a. leaf
b. root
c. first node of left sub tree
d. first node of right sub tree
Answer  Explanation 

ANSWER: root

Explanation:
No explanation is available for this question!


16)   Which among the following belongs to the category of a Pre-order Traversal?

a. Root -> Left Sub Tree -> Right Sub Tree
b. Root -> Right Sub Tree -> Left Sub Tree
c. Right Sub Tree -> Left Sub Tree -> Root
d. Left Sub Tree -> Right Sub Tree -> Root
Answer  Explanation 

ANSWER: Root -> Left Sub Tree -> Right Sub Tree

Explanation:
No explanation is available for this question!


17)   Which HTML element defines the title of a work and is usually displayed in italics?

a. <bold>
b. <bdo>
c. <cite>
d. <address>
Answer  Explanation 

ANSWER: <cite>

Explanation:
No explanation is available for this question!


18)   What does the <kbd> tag define in an HTML page?

a. Defines keyboard input
b. Defines mathematical variable
c. Defines preformatted text
d. Defines computer output
Answer  Explanation 

ANSWER: Defines keyboard input

Explanation:
No explanation is available for this question!


19)   What are the three ways by which styling can be added to the HTML elements?

a. Inter, Outer, External
b. Outline, Inline, External
c. Inline, Internal, External
d. None of the above
Answer  Explanation 

ANSWER: Inline, Internal, External

Explanation:
No explanation is available for this question!


20)   Which attributes can the screen readers read? (HTML)

a. ctrl
b. alt
c. both A & B
d. None of the above
Answer  Explanation 

ANSWER: alt

Explanation:
No explanation is available for this question!


21)   In OSI Model, from which layer the physical layer translates the logical communication request, where hardware specific operations are to be done?

a. Transport Layer
b. Application Layer
c. Data Link Layer
d. Network Layer
Answer  Explanation 

ANSWER: Data Link Layer

Explanation:
No explanation is available for this question!


22)   What should we call a network which is located within a building or campus?

a. MAN
b. WAN
c. VAN
d. LAN
Answer  Explanation 

ANSWER: LAN

Explanation:
No explanation is available for this question!


23)   Which topology has a Central Controller or a Hub?

a. Bus
b. Star
c. Mesh
d. Tree
Answer  Explanation 

ANSWER: Star

Explanation:
No explanation is available for this question!


24)   Which switching methods are used to move data through a network link and switches?

a. Circuit Switching
b. Pocket Switching
c. Both A and B
d. Line Switching
Answer  Explanation 

ANSWER: Both A and B

Explanation:
No explanation is available for this question!


25)   What is the size of the MAC Address?

a. 48 bits
b. 36 bits
c. 24 bits
d. 42 bits
Answer  Explanation 

ANSWER: 48 bits

Explanation:
No explanation is available for this question!


26)   A system has 'm' number of resources of same type and 3 processes A, B, C. Share these resources A, B, C which have the peak demand of 3, 4 and 6 respectively. Deadlock will not occur if the value of 'm' is __________.

a. m = 15
b. m = 8
c. m = 13
d. m = 9
Answer  Explanation 

ANSWER: m = 13

Explanation:
No explanation is available for this question!


27)   In the given table it shows P1, P2 and P3 are the three processes.
What is the completion order of the 3 processes under the policies First Come First Serve(FCFS) and Round Robin Scheduling? (RRS with CPU quantum time of 2 units)


computer-science-22.png
a. FCFS: P1, P2, P3 RR2: P1, P3, P2
b. FCFS: P1, P3, P2 RR2: P1, P2, P3
c. FCFS: P1, P3, P2 RR2: P1, P3, P2
d. FCFS: P1, P2, P3 RR2: P1, P2, P3
Answer  Explanation 

ANSWER: FCFS: P1, P2, P3 RR2: P1, P3, P2

Explanation:
No explanation is available for this question!


28)   What is said to happen when the result of computation depends on the speed of the processes involved?

a. A deadlock
b. A time lock
c. Cycle stealing
d. Race condition
Answer  Explanation 

ANSWER: Race condition

Explanation:
No explanation is available for this question!


29)   Consider a counting semaphore which was initialized to 10 and then 6P (wait) operations and 4v(signal) operations were completed on this semaphore. What is the resulting value of semaphore?

a. 10
b. 9
c. 8
d. 0
Answer  Explanation 

ANSWER: 8

Explanation:
No explanation is available for this question!


30)   Why is the Software interrupt required by the processor?

a. Return from subroutine.
b. Obtain system services, which need execution of privileged instruction.
c. Test the interrupt system of the processor.
d. Implement co-routines.
Answer  Explanation 

ANSWER: Obtain system services, which need execution of privileged instruction.

Explanation:
No explanation is available for this question!