0

Information Technology Mixed Test - 2

Description: Information Technology Mix Test - 2
Number of Questions: 25
Created by:
Tags: Information Technology Mix Test - 2 Databases Data Communication & Networks Data Structures Operating System
Attempted 0/25 Correct 0 Score 0

In which of the following networks are reassembly buffers required?

  1. Message-switched networks

  2. Packet-switched networks

  3. Both (1) and (2)

  4. None of above


Correct Option: B
Explanation:

Buffers are used for packet reassembly at each node and then the packets are transmitted to the next node.

Which of the following is/are NOT the characteristic(s) of a physical layer?

  1. Functional

  2. Mechanical

  3. Electrical

  4. None of these


Correct Option: D
Explanation:

All of the above are the characterstics of a physical layer, i.e. electrical, functional and mechanical. So, 'none of these' is the correct answer.

What is the meaning of 'A ' in ACID Model in SQL ?

  1. Attributes

  2. Atomicity

  3. Both (1) and (2)

  4. None of above


Correct Option: B
Explanation:

Atomicity means 'all or nothing'  and 'may be all or nothing' in the transaction. ACID stands for ' Atomicity Consistency Isolation Durability '.

How can we increase the efficiency of the doubly linked list ?

  1. By accessing the last element of the list.

  2. By accessing any element from the list.

  3. By traversing the list in left or right direction from node.

  4. None of these


Correct Option: C
Explanation:

When a linked list is connected doubly, i.e doubly linked list in which each node contains the address of next as well as previous node is very efficient other than we transverse the list from any direction of side of any node. 

Which of the following is/are example(s) of virtual terminal?

  1. Presentation layer

  2. Transport Layer

  3. Application Layer

  4. Both (2) and (3)


Correct Option: C
Explanation:

Virtual Terminal is an example of Application Layer Protocol because Virtual Terminal protocol defines the specification on driving the Virtual Terminal.

The number of subtrees of a node in a Tree/Graph is called as

  1. level

  2. depth

  3. degree

  4. none of these


Correct Option: C
Explanation:

The number of subtrees of a node in a tree/graph is called degree.

Let the depth of a root = 1, what would be the maximum number of nodes in a binary tree of depth 5 ?

  1. 32

  2. 36

  3. 30

  4. 31


Correct Option: D
Explanation:

According to the rules of Binary tree, the number of nodes that a node can have as its child is 2.  The total number of nodes with depth 5 is calculated as:

25  =  2x2x2x2x2, deduct 1node because first root is at depth, therefore, 32 - 1 = 31 

DOD's transmission control protocol is/are example(s) of _______________ layer.

  1. data link

  2. transport

  3. both (1) and (2)

  4. physical


Correct Option: B
Explanation:

TCP is responsible for guaranteed delivery of packets to the applications. 

Which of the following is not a Guided Transmission Line ?

  1. Laser beam

  2. A pair of wires

  3. Optical fibre

  4. Both (1) and (2)


Correct Option: A
Explanation:

Laser beam is not a Guided Transmission line because it requires some physical medium, such as wires, for transmission.

How many number of nodes are used in a FULL BINARY TREE of depth 5 with no children (from right to left) ?

  1. 17

  2. 15

  3. 16

  4. 18


Correct Option: C
Explanation:

(2n-1 ), where n = depth of nodes. 25-1= 16 is the correct answer.

___________________ is used to provide cure or remedy when there are variations amongst clocks of various data sources.

  1. Shared bit

  2. Clock cycle

  3. Pulse stuffing

  4. None of above


Correct Option: C
Explanation:

Pulse stuffing is insertion of additional pulses to synchronize the various clock pulses.

Which of the following layers of the OSI reference model resolves the problems of the damage or loss of duplicate frames?

  1. Session layer

  2. Application layer

  3. Network layer

  4. Data link layer


Correct Option: D
Explanation:

Data link layer is responsible for resolving the problems due to damage or loss of duplicate frames. Data link layer uses methods such as addition of special bits patterns and acknowledgement receiving.

You cannot use duplicate values in a _______________ key.

  1. duplicate

  2. public

  3. private

  4. primary


Correct Option: D
Explanation:

Each row of the data in the table is uniquely identified by a Primary Key (PK).

Which of the following is NOT an example of standard at the data link layer?

  1. HDLC

  2. ADCCP

  3. TCP

  4. None of these


Correct Option: C
Explanation:

TCP (Transport Control Protocol ) is a protocol that resides in the transport layer of the OSI Model. 

Which topology of the LAN uses circuit switching?

  1. Tree

  2. Bus

  3. Ring

  4. Star


Correct Option: D
Explanation:

Star topology uses circuit switching because transmission is always controlled by a centralised hub and route is predecided from root node to receiving node.

Which of the following is/are the main objective(s) of SQL SELECT statement?

  1. Projection, selection and joining

  2. Updating the data

  3. Inserting new data in the tables

  4. Deleting data from tables


Correct Option: A
Explanation:

Projection is used to choose the columns in a table that you want, returned by your query. Selection is used to choose the rows in a table that you want, returned by a query. Joining is used to join different tables by creating logic between them.

A ___________ key value must match an existing primary key value or unique key value.

  1. foreign

  2. refer

  3. relation

  4. duplicate


Correct Option: A
Explanation:

Foreign Key (FK) is used to relate the multiple tables.

Which of the following statements is used for eliminating duplicating data in the row 'name' of 'class' table in a SELECT clause?

  1. SELECT UNIQUE name from class.

  2. SELECT name UNIQUE from class;

  3. SELECT DISTINCT name from class.

  4. SELECT name DISTINCT from name.


Correct Option: C
Explanation:

DISTINCT statement is used for eliminating duplicate data in the row. 

If 0(nlogn) time is used in average case, which of the following sorting techniques is used?

  1. Quick sort

  2. Selection sort

  3. Insertion sort

  4. None of these


Correct Option: A
Explanation:

Quick sort is used to sorting methods works in 0(nlogn) time in the average case.

Which of the following operator precedences is used in SQL Oracle?

  1. [ { ( / * + -

  2. / + * -

    • + / -
    • / + -

Correct Option: D
Explanation:

In computer science as well as in SQL, the following operator precedence is standard. Every operator in every programming language has its priority.

Which of the following operating systems does not truly support multithreading?

  1. Solaris Operating system

  2. Windows XP

  3. OS/2

  4. MS DOS


Correct Option: D
Explanation:

 MS DOS does not support multitreading concept. 

Which of the following operating systems does not have GUI Environment (Graphical User Interface)?

  1. Windows 98

  2. Windows Vista

  3. MS DOS

  4. Window XP


Correct Option: C
Explanation:

MS DOS stands for Microsoft Disk operating system which has a command prompt and executed with commands, having no requirement of mouse as a pointing device because a mouse is used in GUI environment.

Which is the path where the user data is stored in windows operating system, i.e windows is installed in C drive ?

  1. C:windowssystem32

  2. c:system

  3. c:Documents and Settings

  4. C:windows


Correct Option: D
Explanation:

The user data is a window system and the files are stored in window's folder.

Which of the following cabling techniques is assumed as the best technique for building and establishing LANS?

  1. 10BaseF

  2. 10Base2

  3. 10Base5

  4. None of these


Correct Option: A
Explanation:

10BaseF is a Fibre Optic Inter Repeater Link. It has the capability to connect upto 2000 meters. It has better transmission quality to connect amongst buildings also.

Which of the following contains the information about file permission, ownership and location?

  1. File block

  2. File system

  3. FCB - File Control Block

  4. Nested Block


Correct Option: C
Explanation:

FCB contains file permission, ownership and location. FCB is of 36 bits.

- Hide questions