Q 1: | In ............. protocols, we use.............. |
(1) | byte-oriented; bit stuffing |
(2) | character-oriented; bit stuffing |
(3) | bit-oriented; bit stuffing |
(4) | none |
Correct Answer: bit-oriented; bit stuffing | |
Q 2: | In a network with dozens of switches, how many root bridges would you have? |
(1) | 1 |
(2) | 2 |
(3) | 5 |
(4) | 12 |
Correct Answer: 1 | |
Q 3: | The data is stored, retrieved and updated in............. |
(1) | OLAP |
(2) | OLTP |
(3) | Online processing |
(4) | POP3 |
Correct Answer: OLTP | |
Q 4: | The package is a collection of |
(1) | Editing Tolls |
(2) | Interfaces |
(3) | Classes |
(4) | Classes and interfaces |
Correct Answer: Classes and interfaces | |
Q 5: | Which of the following is true? |
(1) | If an exception is uncaught in a method, the method will terminate and normal execution will resume |
(2) | An overriding method must declare that it throws the same exception classes as the method it overrides |
(3) | The main() method of a program can declare that it throws checked exceptions |
(4) | finally blocks are executed if, and only if, an exception gets throws while inside the corresponding try block |
Correct Answer: The main() method of a program can declare that it throws checked exceptions | |
Q 6: | Which two statements, added independently at 3 beginning of the program, allow the code to compile? public static void main(String[] args) java.util.TreeSet t = new java.util.TreeSet(); t.clear(); }
|
(1) | 1 Only |
(2) | 2 and 5 |
(3) | 3 and 4 |
(4) | 2 and 4 |
Correct Answer: 2 and 5 | |
Q 7: | In prototyping |
(1) | 4GL are used |
(2) | BASIC is used |
(3) | COBOL is used |
(4) | System is documented |
Correct Answer: 4GL are used | |
Q 8: | ......... is a technique used to show the effects of change of one or more variables on an outcome |
(1) | Statistical Analysis |
(2) | Sensitivity Analysis |
(3) | Proportional Analysis |
(4) | Quantitative Analysis |
Correct Answer: Sensitivity Analysis | |
Q 9: | The IPv4 header size............ |
(1) | is 20 to 60 bytes long |
(2) | is always 20 bytes long |
(3) | is always 60 bytes long |
(4) | depends on the MTU |
Correct Answer: is 20 to 60 bytes long | |
Q 10: | In IEEE 802.11, a BSS without an AP is called an........................ |
(1) | an ad hoc architecture |
(2) | and infrastructure network |
(3) | both |
(4) | none |
Correct Answer: an ad hoc architecture | |