Section 1
Question
1.
Series-1000,200,40,____
1. 20
2. 15
3. 8
4. 80
Question
id : 2.
664, 332, 340, 170, ____, 89
1. 85
2. 178
3. 170
4. 166
Question
id : 3
Fact 1: All dogs like to run, Fact 2: Some dogs like to swim, Fact 3: Some dogs look like their owners. In the first three statements are facts, which of the following statements must also be a fact: A. All dogs who like to swim look like their owners, B. Dogs who like to swim also like to run, C. Dogs who like to run do not look like their owners.
1. Only A
2. Only B
3. B and C
4. A and C
Question
id : 4
Series - 11, 12, 16, 25, 41, 66, ____
1. 87
2. 100
3. 108
4. 102
Question
id : 5
1. 14
2. 13
3. 15
4. 16
Question
id : 8
Four friends of Tenth grade were sharing a pizza. They decided that the oldest among them would get
the extra piece. Suresh is two months older than Gagan, who is three months younger than Nand Kumar. Kishore is one month older than
Gagan. Who should get the extra piece of pizza?
1. Suresh
2. Nand Kumar
3. Gagan
4. Kishor
Question
id : 9
Shrikant is shorter than Nilima. Pratima is tallen than Shrikant. Subhash is taller then Nilima but shorter than Meera. Nilima is tallen than Pratima. Who will be in the middle if they stand in a row according to height?
1. Shrikant
2. Nilima
3. Subhash
4. Meera
Question
id : 10
1. A
2. B
3. C
4. D
Question
id : 11
1. 0.81
2. 0.405
3. 0.225
4. 0.25
Question
id :12
Car : Garage :: Aero plane : ?????
1. Port
2. Hanger
3. Depot
4. Harbor
Question
id : 13
Vishwanath Anand won the world chess title for how many times
1. 4
2. 3
3. 5
4. 2
Question
id : 14
Who was captain of IPL winner team 2012
1. Virat Kohli
2. Gautam Gambhir
3. M.S. Dhoni
4. Harbhajan Singh
Question
id : 15
Who won Santosh Trophy Football in 2012
1. Goa
2. Services
3. West Bengal
4. Tamil Nadu
Question
id : 16
The idea of India' is written by
1. Dilip D'Souza
2. Ram Chandra Guha
3. Sunil Khilnani
4. Santosh Desai
Question
id : 17
India's Foreign Secretary presently is
1. Veena Sikri
2. Huder Ali
3. Ranjan Mathai
4. S.K. Sharma
Question
id : 18
Chief Election Commissioner of India
1. V.S. Sampath
2. S.Y. Qureshi
3. B.K. Jutshi
4. Sudhir Verma
Question
id : 19
The Governor of Uttarakhand is
1. Ram Naresh Yadav
2. V. Manchoo
3. B.L. Joshi
4. Aziz Qureshi
Question
id : 20
IMF present Chief is
1. Christina Lagrade
2. Camilla Gutt
3. Ivar Rooth
4. Rodrigo Rato
Question
id : 21
In May 2011, India and Russia conducted a joint armed exercise, in which more than 15,000 armedmen participated. The name of the joint exercise was
1. Shakti Sambandh
2. Jai Ho
3. Vijay exercise
4. Vijayi Bhav
Question
id : 22
India's Cabinet Secretary is
1. Ajit Seth
2. Surendra Singh
3. Prabhat Kumar
4. B.K. Chaturvedi
Question
id : 23
What is big size of IPv6 addresses?
1. 16 bits
2. 32 bits
3. 64 bits4. 128 bits
Question
id : 24
Which protocol does DHCP uses at the Transport Layer
1. UDP
2. IP
3. TCP
4. TRP
Question
id : 25
In a Network with 10 switches, how many root bridge(s) would be there?
1. One
2. Three
3. Five
4. Ten
(You should have
only one root bridge per network )
Question
id : 26
CSMA/CD is a set of rules determining -
1. How two network devices are performing
2. How two network devices communicates with each other in a wireless network
3. How network devices respond when two devices attempt to use a data channel simultaneously
4. How network devices respond when two devices attempt to use a data channel separately
Question
id : 27
The dialogue control and token management are responsiblity of, in OSI network architecture -
1. Network layer
2. Physical layer
3. Session layer
4. Data-link layer
Question
id : 28
What is (are) an advantage(s) of using Fibre optics data transmission?
1. Fast data transmission
2. Resistance to data theft
3. Low noise level
4. All the above
Question
id : 29
Which mode is operating when communication circuits allow transmit data in both directions but not at the same time?
1. A Half-Duplex Mode
2. A Simplex Mode
3. A Full-Duplex Mode
4. An Asynchronous Mode
Question
id : 30
Full form of MAC Address?
1.
Machine Access Coding Address
2. Mode Access Control Address
3. Master Access Code Address4. Media Access Control Address
2. Mode Access Control Address
3. Master Access Code Address4. Media Access Control Address
Question
id : 31
How many layers does OSI network architecture has?
1. Five
2. Eight
3. Seven
4. Six
Question
id : 32
Class of IP address which provides a maximum of only 254 unique host addresses per network ID?
1. Class D
2. Class C
3. Class A
4. Class B
Question
id : 33
DNS is the abbreviation of -
1. Dynamic Name System
2. Domain Network Service
3. Domain Name System
4. Dynamic Network Service
Question
id : 34
Primary function of the network layer is?
1. Error detection
2. Routing
3. Setup a session
4. Encryption
Question
id : 35
The loss in signal power as light travels down the fibre is called?
1. Prorogation
2. Attenuation
3. Scattering
4. Interruption
Question
id : 36
Which of the following communications lines is best suited to interactive processing applications?
1. Narrow Band Lines
2. Simplex Lines
3. Full Duplex Lines
4. Mixed Band Lines
Question
id : 37
Layer-1 of the OSI model is?
1. Link Layer
2. Physical Layer
3. Presentation Layer
4. Session Layer
Question
id : 38
What is a Firewall in the Computer Network?
1. The Operating System of Computer Network
2. The Physical boundary of the Network
3. A system designed to prevent unauthorised access
4. A web browsing Software
Question
id : 39
IPv4 address is?
1. 8 bits
2. 16 bits
3. 32 bits
4. 64 bits
Question
id : 40
DHCP is the abbreviation of -
1. Dynamic Host Control Protocol
2. Dynamic Hyper Configuration Protocol
3. Dynamic Hyper Control Protocol
4. Dynamic Host Configuration Protocol
Question
id : 41
TCP / IP is?
1. One Protocol
2. Suite of Protocols
3. Application Package
4. Communication medium
Question
id : 42
For every IP address, Subnet Mask is?
1. Always required
2. Sometimes required
3. Not required
4. None of the above
Question
id : 43
With the class-A address of 10.0.0.0 and a subnet mask of 255.255.224.0, how many subnets can be created?
1. 2048
2. 2046
3. 4096
4. 4092
Question
id : 44
HOSTS file contains -
1. IP addresses followed by comma and name to resolve
2. Name to resolve followed by tab/space and IP addresses
3. IP addresses followed by tab/space and name to resolve
4. Name to resolve followed by comma and IP addresses
Question
id : 45
Data Moved across the network in manageable chunks of data is called?
1. Headers
2. Packets
3. Records
4. Packages
Question
id : 46
What is the standard subnet mask for a class A address?
1. 255.255.0.0
2. 255.255.255.0
3. 255.255.255.255
4. 255.0.0.0
Question
id : 47
Host(s) for which a network administrator should consider using manually assigning IP address -
1. Server
2. Printers
3. Routers
4. All the above
Question
id : 48
What does WINS stand for?
1. Windows Internet Name Standard
2. Windows Internal Name Service
3. Windows Internet Name Service
4. Windows Internal Name Standard
Question
id : 49
What does OSI stands for?
1. Open Standards Interconnection
2. Open Standards Internet
3. Open Standards Interdependence
4. Open Standards Interface
Question
id : 50
Can a Server be both an FTP Server and a Web Server?
1. No, it cannot be
2. Yes, it can be
3. Yes it can be, but technically it will work as either FTP or Web Server at a time
4. None of the above
Question
id : 51
What is the Standard HTTP port?
1. 80
2. 161
3. 21
4. 1024
Question
id : 52
Router is a device?
1. that generates protocols
2. that interconnects networks
3. that control the traffic on a network
4. that manages switches
Question
id : 53
IP address basically made up of which two parts?
1. Host and Server portion
2. Host andNetwork portion
3. Network and Server Portion
4. Network and address portion
Question
id : 54
If you use supernet mask 255.255.248.0, how many bits is IP is going to examine?
1. 7
2. 21
3. 14
4. 255
Question
id : 55
What does SMTP stands for?
1. Simplwe Mail Transaction Protocol
2. Simple Mail Toggle Protocol
3. Simple Mail Traffic Protocol
4. Simple Mail Transfer Protocol
Question
id : 56
Convert the following IPv4 address to an IPv6 address : 10.25.135.123
1. 0A15:877B
2. 1015:877A
3. 0A15:877A
4. 1015:877B
Question
id : 57
NAT application -
1. Translate the IP address of the sending host to another IP address
2. Does Encrypt of data stream
3. Does Network Administration
4. Does Decryption of data stream
Question
id : 58
ISDN Stands for -
1. Internet Digital Service Network
2. Integrated Service Digital Network
3. Integrated Systems Digital Network
4. Integrated Service Digital Naming
Question
id : 59
What is the name of the process that TCP uses to setup a connection -
1. Three-way handshake
2. Two-way handshake
3. Mono directional connection
4. None of the above
Question
id : 60
Which of the following statements is true for fibre optic cable?
1. Fibre optic cable transfers data in a mesh
2. Fibre optic cable transfers data in light form
3. Fibre optic cable are similar to coaxial cables
4. None of the above
Question
id : 61
How many characters does the hardware address contain?
1. 12 hexadecimal characters
2. 32 hexadecimal characters
3. 16 hexadecimal characters
4. 64 hexadecimal characters
Question
id : 62
What is the purpose of checksum?
1. It verifies the speed of data transfer
2. It verifies that the packet was received correctly
3. It verifies that the connection is stable
4. It verifies that right protocol is used
Question
id : 63
What are way(s) to assign IP addresses to hosts?
1. Manually
2. Automatically
3. Both above
4. IP cannot be assigned to host
Question
id : 64
When does a DHCP client renew the lease of an address?
1. After 25 percent of the lease has expired
2. After 50 percent of the lease has expired
3. After 75 percent of the lease has expired
4. It never renew the lease
Question
id : 65
Which of these is responsible for the connection of Local Area Networks with Wide Area Networks?
1. Hub
2. Bridge
3. Switch
4. Gateway
Question
id : 66
Headers of the packet includes -
1. Addressing and routing details
2. Network Name
3. Packet Name
4. Packet data contains
Question
id : 67
In Circuit-switched network -
1. All data in communication takes separate path
2. All data in communication takes same path
3. All data in communication uses different medium to travel
4. None of the above
Question
id : 68
What is function of router?
1. Packet filtering
2. Path Selection
3. Packet switching
4. All the above
Question
id : 69
Which of
the these can used for Broadband communication channel?
1. Coaxial Cable
2. Fibre Optics Cable
3. Microwave circuits
4. All the above
Question
id : 70
Ping is -
1. Packet InterNet Graber
2. Packet InterNet Groper
3. Packet InterNet Google
4. Packet InterNet Gateway
Question
id : 71
What type of query does the client send to the DNS server?
1. A recursive query
2. An iterative query
3. A Simple query
4. None of these
Question
id : 72
Which application level Protocol run on the top of TCP/IP?
1. TELNET
2. FTP
3. SMTP
4. All the above
Question
id : 73
The relational model consists of:
1. Data redundancy
2. Unorganised data
3. Data in the form of tables
4. Operations using non-SQL languages
Question
id : 74
What is overall responsibility of DBA
1. Development Operation and maintenance of the database and its applications
2. Create and populate tables
3. Facilitate development of use of database
4. Both 1 and 3
Question
id : 75
Which advantages does a Distributed database has over a Centralised database?
1. Slow Response
2. Overall complexity
3. Modular Growth
4. Software Cost
Question
id : 76
Which of
the following objects make up a relation?
1. Data types
2. Tuples
3. Attributes
4. Both 2 and 3
Question
id : 77
When user create views, they are part of which schema?
1. Virtual
2. Conceptual
3. External
4. Internal
Question
id : 78
A Key -
1. Can only be one column
2. Identifies a row
3. Must always composed of two or more column
4. Identifies a column
Question
id : 79
A stored program that is attached to a table or a view is called?
1. Embedded SELECT Statement
2. Trigger
3. System file
4. Virtual file
Question
id : 80
Which one of the following is used to limit column values of a table?
1. The CHECK constraint
2. The LIMIT constraint
3. The VALUE constraint
4. The SIZE constraint
Question
id : 81
When using cursors in embedded SQL, what is
the first step you must take before you can retrieve data through that cursor?
1. Fetch the cursor
2. Declare the cursor
3. Close the cursor
4. Open the cursor
Question
id : 82
Locks which are placed by DBMS are called?
1. Shared locks
2. Exclusive locks
3. Implicit locks
4. Explicit locks
Question
id : 83
Which one is used to sort row in SQL?
1. SORT BY
2. GROUP BY
3. ALIGN BY
4. ORDER BY
Question
id : 84
Which schema objects provide the basic unit of data management in the SQL
environment?
1. Views
2. Domains
3. Base Tables
4. Character sets
Question
id : 85
Which of the following is correct with respect to ODBMS?
1. They are overtaking RDBMS for all applications
2. They have the ability to store complex data types on the web
3. They are most useful for traditional database tables
4. All of the above
Question
id : 86
Maintaining a separate copy of the database at
multiple locations is?
1. Horizontal Partitioning
2. Data Replication
3. Vertical Partitioning
4. Horizontal and Vertical Partitioning
Question
id : 87
Which Statement is correct for Triggers?
1. They are not created with SQL
2. They cannot cascade (cause other trigger to fire)
3. Execute against only some applications that access a database
4. They have an event, condition and action
Question
id : 88
Out of
these which one applies to a Class not on Object
1. Query
2. Scope
3. Update
4. Constructor
Question
id : 89
Wildcard is used in WHERE clause when?
1. Exact match is not possible in a SELECT statement
2. Exact match is necessary in a CREATE statement
3. Exact match is not possible in a CREATE statement
4. Exact match is necessary in a SELECT statement
Question
id : 90
Hiding the
internal implementation details of an object is called?
1. Polymorphism
2. Inheritance
3. Encapsulation
4. Pseudo Code
Question
id : 91
The example of
embedded SQL is -
1. Hard Coded SQL statements in a procedure
2. Hard Coded SQL statements in a trigger
3. Hard Coded statement in a program language such as Java
4. The process of making an application capable of generating specific SQL code on fly
Question
id : 92
Which one of these disk array type is capable of the fastest read/write time and most efficient data storage -
1. RAID-0
2. RAID-1
3. RAID-2
4. RAID-3
Question
id : 93
Four built-in functions of SQL are -
1. COUNT, MIN, MAX, DIV
2. SUM, COUNT, MAX, MIN
3. SUM, MAX, NAME, AVG
4. COUNT, SUM, DIV, AVG
Question
id : 94
Problem arising from redundancy are addressed through the process called -
1. Data manipulation
2. Fragmentation
3. Decomposition
4. All the above
Question
id : 95
GRANT and REVOKE are -
1. Mandatory Access Control
2. Discretionary Access Control
3. Database Access Control
4. DBMS Access Control
Question
id : 96
Advantage(s) of placing computations in SQL views?
1. It save users from having to write an expression
2. It ensures results are consistent
3. Both 1 and 2
4. None of the above
Question
id : 97
In B+ tree search structure, the leaf node contains
1. Search entries
2. Data entries
3. Tree entries
4. All the above
Question
id : 98
RAID Level-1 allows -
1. Block-Interleaved Parity
2. Mirroring
3. Stripping and Mirroring
4. Bit-Interleaved Parity
Question
id : 99
In RDBMS, relationship between tables are created by using?
1. Composite keys
2. Foreign keys
3. Candidate keys
4. Local keys
Question
id : 100
Which SQL statement will terminate a transaction?
1. SAVEPOINT
2. ROLLBACK
3. COMMIT
4. Both 2 and 3
Question
id : 101
Which type of condition join should you use if you want to return only
matched rows?
1. Inner Join
2. Left Outer Join
3. Right Outer Join
4. Full Outer Join
Question
id : 102
Approach(es) to distributed DBMS?
1. Client-Server System
2. Collaborating Server
3. Middle ware
4. All the above
Question
id : 103
Recovery in a distributed DBMS is achieved using?
1. Commit Protocol
2. Revoke Protocol
3. Un-Commit Protocol
4. None of the above
Question
id : 104
The discretionary access control allows -
1. Users to have privileges to access or modify objects in the database
2. Users can grant their privileges to other users
3. Users do not have control over any objects in the database
4. Both 1 and 2
Question
id : 105
A Trigger can be
defined on how many tables?
1. Only One
2. One of More
3. One to Three
4. Any number of Tables
Question
id : 106
Which two operators can you use in a GROUP BY clause to
return additional summary data in a query result?
1. ROLLUP
2. HAVING
3. CUBE
4. Both 1 to 3
Question
id : 107
A DBMS maintains information about the data in a special set of relations called -
1. The Catalog
2. The System Catalog
3. The data dictionary
4. All the above
Question
id : 108
SELECT CUSTOMER_T. CUSTOMER_ID, ORDER_T, CUSTOMER-ID, NAME, ORDER_ID FROM CUSTOMER_T, ORDER_T WHERE CUSTOMER_T, CUSTOMER_ID = ORDER_T. CUSTOMER_ID - Which type of join is this?
1. Nature Join
2. Outer Join
3. Equi-Join
4. Cartesian Join
Question
id : 109
Locks which are placed by command are known as?
1. Implicit locks
2. Explicit locks
3. Exclusive locks
4. Shared locks
Question
id : 110
Which qualifier is used to remove duplicate rows from the results of SELECT statement?
1. SINGLE
2. DISTINCT
3. UNIQUE
4. ONLY
Question
id : 111
Three Tier architecture consists of -
1. Two clients layer and One Server layer
2. Three Server layer
3. A client layer and two server layer
4. Three client layers and three server layer
Question
id : 112
Which one is not advantage of
stored procedure -
1. Increases network traffic
2. Allows Code sharing
3. Greater security
4. Optimize DBMS
Question
id : 113
The language used in application programs to request data from the
DBMS is called
1. DML
2. DDL
3. Query Language
4. None of the above
Question
id : 114
A recursive relationship is a relationship between an entity and ______
1. Itself
2. an instance entity
3. other entity
4. sub type entity
Question
id : 115
Which SQL statement below is equivalent to : SELECT NAME FROM EMPLOYEE WHERE HOMETOWN='KA';
1. SELECT NAME IN EMPLOYEE WHERE HOMETOWN IN ('KA');
2. SELECT NAME IN EMPLOYEE WHERE HOMETOWN = 'KA'
3. SELECT NAME IN EMPLOYEE WHERE HOMETOWN = 'K'
4. SELECT NAME FROM EMPLOYEE WHERE HOMETOWN IN ('KA')
Question
id : 116
Which Statement to used to add Schema in SQL environment?
1. ADD SCHEMA
2. CREATE SCHEMA
3. INSERT SCHEMA
4. None of these
Question
id : 117
Which of the following types of constrains support NOT NULL constraints -
1. Table Constraints
2. Column Constraints
3. Domain Constraints
4. Assertions
Question
id : 118
On which types of database objects can you assign the TRIGGER privilege?
1. Tables
2. Views
3. Columns
4. Domains
Question
id : 119
Which set function should you use to add together the values in a column?
1. MAX
2. COUNT
3. SUM, MAX, NAME, AVG
4. AVG
Question
id : 120
Which type of join contains an ON clause?
1. Cross Join
2. Comma-Separated Join
3. Natural Join
4. Condition Join
Question
id : 121
Which statement can you use in embedded SQL to provide your host program with exception and warning information?
1. WHENEVER
2. INTO
3. CAST
4. WHENIT
Question
id : 122
Which statement do you use to invoke an SQL-invoked procedure?
1. RETURN
2. CALL
3. Setup a session
4. DECLARE