Q 1: | .........are applied throughout the software process
|
(1) | Framework activities |
|
(2) | Umbrella activities |
|
(3) | Planning activities |
|
(4) | Construction activities |
|
Correct Answer: Umbrella activities |
|
Q 2: | Not a basic function of automated estimation
|
(1) | Selecting project activities |
|
(2) | Predicting software effort |
|
(3) | Predicting software cost |
|
(4) | Mantenance plan creation |
|
Correct Answer: Mantenance plan creation |
|
Q 3: | The process for looking for pattern to document is called
|
(1) | Pattern |
|
(2) | Anti-pattern |
|
(3) | Frameworks |
|
(4) | Pattern mining |
|
Correct Answer: Pattern mining |
|
Q 4: | Transmission media lie below the ............layer
|
(1) | physical |
|
(2) | network |
|
(3) | transport |
|
(4) | application |
|
Correct Answer: physical |
|
Q 5: | Which of the following is not a field in the Ethernet message packet
|
(1) | Data |
|
(2) | Type |
|
(3) | Pin-code |
|
(4) | Address |
|
Correct Answer: Pin-code |
|
Q 6: | Which of the following is not a network
|
(1) | WAN |
|
(2) | LAN |
|
(3) | XAN |
|
(4) | MAN |
|
Correct Answer: XAN |
|
Q 7: | The modem is used to converts
|
(1) | Analog, Digital |
|
(2) | Digital, Analog |
|
(3) | Analog, Digital and Digital, Analog |
|
(4) | None |
|
Correct Answer: Analog, Digital and Digital, Analog |
|
Q 8: | In an E-R diagram ellipses represent
|
(1) | Relationship among entity sets |
|
(2) | Entity sets |
|
(3) | Attributes |
|
(4) | Link Between attributes and entity sets |
|
Correct Answer: Attributes |
|
Q 9: | Which of the following technique is an alternative to log based recovery
|
(1) | Locks |
|
(2) | Page based |
|
(3) | Check Points |
|
(4) | Shadow paging |
|
Correct Answer: Shadow paging |
|
Q 10: | The topology with highest reliability is
|
(1) | Bus topology |
|
(2) | Star topology |
|
(3) | Ring topology |
|
(4) | Mesh topology |
|
Correct Answer: Mesh topology |
|