Q 1: | Which of the following represents the condition of an object at a specific moment in time?
|
(1) | behavior |
|
(2) | properties |
|
(3) | instance |
|
(4) | state |
|
Correct Answer: state |
|
Q 2: | Which of the following represents the condition of an object at a specific moment in time?
|
(1) | behavior |
|
(2) | properties |
|
(3) | instance |
|
(4) | state |
|
Correct Answer: state |
|
Q 3: | In transaction, cascade rollback
|
(1) | Can occur in sytems which use deferred writeback |
|
(2) | Occurs in systems which use the waterfall writeback |
|
(3) | Is a result of simultaneous transaction commits |
|
(4) | None of the above |
|
Correct Answer: Can occur in sytems which use deferred writeback |
|
Q 4: | If a relation is in 2NF and 3NF forms then:
|
(1) | No non-prime attribute is functionally dependent on other non-prime attributes |
|
(2) | All attributes are functionally independent |
|
(3) | No non-prime attribute is functionally dependent on prime attributes |
|
(4) | Prime attribute is functionally independent of all non prime attributes |
|
Correct Answer: No non-prime attribute is functionally dependent on other non-prime attributes |
|
Q 5: | The SQL.ALTER statement can be used to
|
(1) | change the table structure |
|
(2) | change the table data |
|
(3) | add rows to the table |
|
(4) | delete rows from the table |
|
Correct Answer: change the table structure |
|
Q 6: | The dotted-decimal notation of the following IPv4 address in binary notation is................. 10000001 00001011 00001011 11101111
|
(1) | 111.56.45.239 |
|
(2) | 129.11.10.238 |
|
(3) | 129.11.11.239 |
|
(4) | 111.56.11.239 |
|
Correct Answer: 129.11.11.239 |
|
Q 7: | When a hacker attempts to attack a host via the Internet it is known as what type of attack?
|
(1) | local access |
|
(2) | remote attack |
|
(3) | internal attack |
|
(4) | physical access |
|
Correct Answer: remote attack |
|
Q 8: | The...... layer of Ethernet consists of teh LLC sublayer and the MAC sublayer.
|
(1) | data link |
|
(2) | physical |
|
(3) | network |
|
(4) | None of the above |
|
Correct Answer: data link |
|
Q 9: | Which of the following is not a software engineering paradigm?
|
(1) | Waterfall model |
|
(2) | Spiral model |
|
(3) | Incremental Process model |
|
(4) | Generic model |
|
Correct Answer: Generic model |
|
Q 10: | In design phase more emphasis is given on
|
(1) | How the system will be developed |
|
(2) | What the system will do |
|
(3) | What ar ethe risk in developing the system |
|
(4) | Which computer language must be used for development |
|
Correct Answer: How the system will be developed |
|