| Q 1: | Which of the following is the bit oriented protocol |
| (1) | Link Access Protocol Balanced (LAPB) |
| (2) | Synchronous Data Link Control Protocol (SDLC) |
| (3) | Link Access Protocol for D channel (LAP-D) |
| (4) | All |
| Correct Answer: All | |
| Q 2: | What is the port number for NNTP |
| (1) | 80 |
| (2) | 79 |
| (3) | 119 |
| (4) | 70 |
| Correct Answer: 119 | |
| Q 3: | Which one of the following protocols is NOT used to resolve one form of address to another one? |
| (1) | DNS |
| (2) | ARP |
| (3) | DHCP |
| (4) | RARP |
| Correct Answer: DNS | |
| Q 4: | The....... are used to model a system's behavior in response to internal and external events |
| (1) | Activity Diagrams |
| (2) | Data flow Diagrams |
| (3) | E-R Diagrams |
| (4) | State Diagrams |
| Correct Answer: State Diagrams | |
| Q 5: | Some questions related to UML followed I by possible answers are given below.. |
| (1) | Only (III) above |
| (2) | Both (1) and (II) above |
| (3) | Both (1) and (III) above |
| (4) | Both (II) and (III) above |
| Correct Answer: Both (1) and (III) above | |
| Q 6: | How do you explicitly kill a user's session? |
| (1) | Session.CLose() |
| (2) | Session.Discard() |
| (3) | Session.Abandon() |
| (4) | Session.End() |
| Correct Answer: Session.Abandon() | |
| Q 7: | What is default time of expire session |
| (1) | 20 Minute |
| (2) | 40 Minute |
| (3) | 100 Minute |
| (4) | 120 Minute |
| Correct Answer: 20 Minute | |
| Q 8: | Which one of the following is not desired in a good Software Requirement Specifications (SRS) document? |
| (1) | Functional requirements |
| (2) | Goals of implementation |
| (3) | Non- Functional requirements |
| (4) | Algorithms for Software Implementation |
| Correct Answer: Algorithms for Software Implementation | |
| Q 9: | In object oriented programming, composition relates to |
| (1) | The use of consistent coding conventions |
| (2) | The organization of components interacting to achieve a coherent, common behavior |
| (3) | The use of inheritance to achieve polymorphic behavior |
| (4) | The use of data hiding to achieve polymorphich behavior. |
| Correct Answer: The organization of components interacting to achieve a coherent, common behavior | |
| Q 10: | Which of the following does not belong: If a class inherits from some other class, it should |
| (1) | Make use of the parent class's capabilities |
| (2) | Over-ride or add the minimum to accomplish the derived class' purpose |
| (3) | Over-ride all the methods of its parent class |
| (4) | Make sure the result "IS-A-KIND-OF" its base class |
| Correct Answer: Make sure the result "IS-A-KIND-OF" its base class | |