DB/OS/DS/Networking/HTML - 4

1)   What is 5NF?

a. The database should be in 3NF and all tables can have only one primary key.
b. There should be no cyclic dependencies in a composite key.
c. All attributes within the entity should depend solely on the entity's unique identifier.
d. Tables cannot have multi - valued dependencies on a Primary Key.
Answer  Explanation 

ANSWER: There should be no cyclic dependencies in a composite key.

Explanation:
No explanation is available for this question!


2)   Which among the following comprises of a complete record of all activities responsible in affecting the database contents for a specific duration?

a. Transaction log
b. Data manipulation language
c. Query language
d. Report writer
Answer  Explanation 

ANSWER: Transaction log

Explanation:
No explanation is available for this question!


3)   What type of form says “ Each column type is unique ” ?

a. 1NF
b. 2NF
c. 4NF
d. BCNF
Answer  Explanation 

ANSWER: 1NF

Explanation:
No explanation is available for this question!


4)   Which of the following has a relationship between / among themselves as a functional dependency?

a. Rows
b. Relations
c. Attributes
d. Tables
Answer  Explanation 

ANSWER: Attributes

Explanation:
No explanation is available for this question!


5)   Which of the following is used to define the schema of each database hosted in the DBMS?

a. ER diagram
b. UML
c. Database model
d. Both b and c above
Answer  Explanation 

ANSWER: Database model

Explanation:
No explanation is available for this question!


6)   What is the highest level in a hierarchy of data organization?

a. Data Record
b. Data File
c. Database
d. None of the above
Answer  Explanation 

ANSWER: Database

Explanation:
No explanation is available for this question!


7)   Primary key should always be auto increment.

a. True
b. False


Answer  Explanation 

ANSWER: True

Explanation:
No explanation is available for this question!


8)   Which of the following is an example of Spooled Device?

a. A graphic display device
b. A line printer used to print the output of a number of jobs
c. A terminal used to enter input data to a running program
d. A secondary storage device in a virtual memory system
Answer  Explanation 

ANSWER: A line printer used to print the output of a number of jobs

Explanation:
No explanation is available for this question!


9)   What is the most suitable scheduling policy for a time - shared operating systems?

a. Shortest Job First
b. Elevator
c. First Come First Served
d. Round Robin
Answer  Explanation 

ANSWER: Round Robin

Explanation:
No explanation is available for this question!


10)   Consider a uniprocessor computer system that has 2 processes and both of them alternate 10ms CPU bursts with 90ms I / O bursts. Both the processes were created at nearly the same time and can proceed in parallel. What is the scheduling strategy for this system that will result in the least CPU utilization (over a long period of time)?

a. Round Robin scheduling with a time quantum of 5ms
b. First Come First Served scheduling
c. Shortest remaining time first
d. Static priority scheduling with different priorities for the two processes
Answer  Explanation 

ANSWER: Round Robin scheduling with a time quantum of 5ms

Explanation:
No explanation is available for this question!


11)   The average time of service a page fault is 10ms and the time taken to access the memory is 1µs. A 99.99% hit ratio results in average memory their access time is __________.

a. 1.9999µs
b. 1.9999ms
c. 1ms
d. 9.99µs
Answer  Explanation 

ANSWER: 1.9999µs

Explanation:
No explanation is available for this question!


12)   Which of the following statements is not valid for deadlock prevention scheme?

a. Number the resources uniquely and never request a lower numbered resource than the last one requested.
b. Request and all required resources be allocated before execution.
c. Release all resources before requesting a new resource.
d. Never request a resource after releasing any resource.
Answer  Explanation 

ANSWER: Never request a resource after releasing any resource.

Explanation:
No explanation is available for this question!


13)   Which of the following is the correct syntax to add an iframe?

a. <iframe src = " demo_iframe.htm " style = " border:none " > < / iframe >
b. <iframe src = " demo_iframe.htm " style = " border:5px dotted red " > < / iframe >
c. <iframe src = " demo_iframe.htm " width = " 200 " height = " 200 " > < / iframe >
d. <iframe src = " URL " >< / iframe>
Answer  Explanation 

ANSWER: <iframe src = " URL " >< / iframe>

Explanation:
No explanation is available for this question!


14)   How many HTML colors are supported by all the browsers?

a. 100
b. 140
c. 50
d. 90
Answer  Explanation 

ANSWER: 140

Explanation:
No explanation is available for this question!


15)   What are the methods used to specify colors in HTML?

a. RGB colors
b. Color names
c. Hexadecimal colors
d. All of the above
Answer  Explanation 

ANSWER: All of the above

Explanation:
No explanation is available for this question!


16)   Which HTML tag is used to define a client - side script such as the Javascript?

a. <script>
b. <unscript>
c. Both A & B
d. None of the above
Answer  Explanation 

ANSWER: <script>

Explanation:
No explanation is available for this question!


17)   Which of the following is the fastest ways to store and retrieve data?

a. Sorting
b. Hashing
c. Indexing
d. both A and C
Answer  Explanation 

ANSWER: Hashing

Explanation:
No explanation is available for this question!


18)   If every node ' u ' in ' G ' is adjacent to every other node ' v ' in ' G ', A graph is said to be ___________.

a. isolated
b. complete
c. finite
d. strongly connected
Answer  Explanation 

ANSWER: complete

Explanation:
No explanation is available for this question!


19)   What should we call a binary tree whose every node has either zero or two children?

a. Complete Binary Tree
b. Binary Search Tree
c. Extended Binary Tree
d. None of Above
Answer  Explanation 

ANSWER: Extended Binary Tree

Explanation:
No explanation is available for this question!


20)   Why the elements of an Array are stored successively in Memory Cells?

a. by this way computer can keep track only the address of the first element and the addresses of the other elements can calculated
b. the architecture of computer memory does not allow arrays to store other than serially
c. Both of above
d. None of above
Answer  Explanation 

ANSWER: by this way computer can keep track only the address of the first element and the addresses of the other elements can calculated

Explanation:
No explanation is available for this question!


21)   What is the difference between Linear Array and a Record?

a. An array is suitable for homogeneous data but the data items in a record may have different data type.
b. In a record, there may not be a natural ordering in opposed to linear array.
c. A record form a hierarchical structure but a linear array does not
d. All of above
Answer  Explanation 

ANSWER: All of above

Explanation:
No explanation is available for this question!


22)   You have to sort a list L consisting of a sorted list, followed by a few “ random ” elements. Which of the following sorting methods would be especially suitable for such a task?

a. Bubble sort
b. Selection sort
c. Quick sort
d. Insertion sort
Answer  Explanation 

ANSWER: Insertion sort

Explanation:
No explanation is available for this question!


23)   The operation of processing each element in the list is known as, _________.

a. Sorting
b. Merging
c. Inserting
d. Traversal
Answer  Explanation 

ANSWER: Traversal

Explanation:
No explanation is available for this question!


24)   When the time factor determining the efficiency of the algorithm is measured?

a. Counting microseconds
b. Counting the number of key operations
c. Counting the number of statements
d. Counting the kilobytes of algorithm
Answer  Explanation 

ANSWER: Counting the number of key operations

Explanation:
No explanation is available for this question!


25)   Which of the following data structure is not a Linear Data Structure?

a. Arrays
b. Linked lists
c. Both of these
d. None of these
Answer  Explanation 

ANSWER: None of these

Explanation:
No explanation is available for this question!


26)   HTTP Protocol is used in ________.

a. Application Layer
b. Data Link Layer
c. Transport Layer
d. Network Layer
Answer  Explanation 

ANSWER: Application Layer

Explanation:
No explanation is available for this question!


27)   What does the Standard x.25 specify?

a. DTE / DCE Interface
b. Data bit rate
c. Start - Stop Data
d. Dial Access
Answer  Explanation 

ANSWER: DTE / DCE Interface

Explanation:
No explanation is available for this question!


28)   What is the size of the Ipv6 address?

a. 64 bits
b. 128 bits
c. 32 bits
d. 128 bytes
Answer  Explanation 

ANSWER: 128 bits

Explanation:
No explanation is available for this question!


29)   Which of the following is / are the disadvantages of fragmentation? (Networking)

a. Overlapping of Fragments
b. Complicates Routers
c. Open to DoS Attack
d. All of the Above
Answer  Explanation 

ANSWER: All of the Above

Explanation:
No explanation is available for this question!


30)   Why does the Client get blocked while the call is being processed in RPC by a Server?

a. Completing the duration of the Connection.
b. Client sends an Asynchronous Request to the Server.
c. Call Processing is Complete.
d. It discovers the process path.
Answer  Explanation 

ANSWER: Client sends an Asynchronous Request to the Server.

Explanation:
No explanation is available for this question!