Daily Exam Programmer 15-09-2024

Join us on Telegram


Q 1:

Which of the following models is concerned with what is represented in the database, rather than how it is represented?

(1) Conceptual model
(2) View model
(3) Physical model
(4) External model
Correct Answer: Conceptual model

Q 2: Which allocation scheme would work best for a file system implemented on a device that can only be accessed sequentially, a tape drive, for instance?
(1) contiguous allocation
(2) Indexed allocation
(3) Non Contiguous allocation
(4) None of the above
Correct Answer: contiguous allocation

Q 3: ........ can detect burst error of length less than or equal to degree of the polynomial and detects burst errors that affect odd number of bits.
(1) Hamming Code
(2) CRC
(3) VRC
(4) None of the above
Correct Answer: CRC

Q 4: The logical risk of ethical hacking include lawsuits due to ............ of personal data
(1) stealing
(2) disclosure
(3) deleting
(4) hacking
Correct Answer: disclosure

Q 5: Data are sent over pin ....................... of the EIA - 232 interface.
(1) 2
(2) 3
(3) 4
(4) All of the above
Correct Answer: 2

Q 6: A.............. routing table contains information entered manually.
(1) static
(2) dynamic
(3) hierarchical
(4) None of the above
Correct Answer: static

Q 7: The lowest level of decomposition for a data flow diagrma is a
(1) Primitive DFD
(2) Unit DFD
(3) Context DFD
(4) Level-0 DFD
Correct Answer: Primitive DFD

Q 8: Which of the following is not a resource for setting JAD session?
(1) Overhead projector
(2) Black and white board
(3) Flip chart
(4) All of the above
Correct Answer: All of the above

Q 9: What does class share?
(1) Attributes, behavior and operations
(2) Identity, behavior and state
(3) Attributes, operations and relationship
(4) Identity, mannerism and state
Correct Answer: Attributes, operations and relationship

Q 10: Which interface does java.util.HashTable implement?
(1) Java.util.Map
(2) Java.util.List
(3) Java.util.HashTable
(4) Java.util.Collection
Correct Answer: Java.util.Map