Beltron Programmer Book PDF Download-Protected - pdf1
Beltron Programmer Book PDF Download-Protected - pdf1
com/beltron-book/ Page 1
Programming Language with theirs Founders & Use
C Programming Language:
https://beltronvacancy.com/beltron-book/ Page 2
Time Complexity
Here is a table listing common sorting algorithms along with their best-case, average-case, and worst-case time
complexities:
Sorting Algorithm Best Case Time Complexity Average Case Time Complexity Worst Case Time Complexity
https://beltronvacancy.com/beltron-book/ Page 3
Invention & Founders
https://beltronvacancy.com/beltron-book/ Page 4
Computer Abbreviations
https://beltronvacancy.com/beltron-book/ Page 5
PPP - Point-to-Point Protocol GIGO - Garbage in Garbage Out
LIFO - Last In First Out
SEO - Search Engine Optimization FIFO - First In First Out
https://beltronvacancy.com/beltron-book/ Page 6
Problem Solving and Programming
Problem solving and programming are closely related concepts in the field of computer science and software
development. Problem solving refers to the process of finding solutions to complex or challenging problems.
Programming, on the other hand, is the act of writing instructions (code) that a computer can follow to solve those
problems.
Problem solving involves several steps:
Understanding the problem: This step involves analyzing the problem, identifying the requirements and constraints,
and gaining a clear understanding of what needs to be achieved.
Breaking down the problem: Complex problems are often broken down into smaller, more manageable sub-
problems. This helps in tackling the problem in a systematic and organized manner.
Designing a solution: Once the problem is broken down, a plan or strategy is devised to solve each sub-problem.
This may involve creating algorithms, flowcharts, or other visual representations to outline the steps needed to solve
the problem.
Implementing the solution: In programming, implementing the solution means translating the designed plan into a
computer program. This is done by writing code using a programming language.
Testing and debugging: After writing the program, it is important to test it thoroughly to ensure it works correctly. If
any issues or bugs are identified, they need to be debugged and fixed.
Iteration and refinement: Problem solving is often an iterative process. If the initial solution does not meet all the
requirements or if there are better approaches, the process may need to be repeated, refining the solution until the
desired outcome is achieved.
What is the process of repeatedly executing a block of code until a certain condition is met?
Answer: Looping
https://beltronvacancy.com/beltron-book/ Page 7
print(y)
Answer: 7
What is the process of converting a high-level language code into machine code?
Answer: Compilation
https://beltronvacancy.com/beltron-book/ Page 8
What is the time complexity of inserting an element at the end of an array?
Answer: O(1)
Which programming language is often used for web development and server-side scripting?
Answer: JavaScript
What is the process of combining multiple sorted arrays into a single sorted array called?
Answer: Merge
What is the time complexity of searching an element in a hash table (average case)?
Answer: O(1)
https://beltronvacancy.com/beltron-book/ Page 9
What is the purpose of using the "elif" statement in programming?
Answer: To specify an alternative condition if the previous conditions are not met
What is the process of combining two or more strings into a single string called?
Answer: String concatenation
What is the time complexity of searching an element in a binary search tree (average case)?
Answer: O(log n)
Which programming language is often used for machine learning and artificial intelligence?
Answer: Python
Which programming language is often used for web scraping and automation?
Answer: Python
https://beltronvacancy.com/beltron-book/ Page 10
What is the output of the following code snippet?
x = "Hello"
print(x.split("e"))
Answer: ['H', 'llo']
What is the time complexity of the selection sort algorithm (average case)?
Answer: O(n^2)
Which programming language is often used for web development and server-side scripting?
Answer: JavaScript
What is the process of combining multiple sorted arrays into a single sorted array called?
Answer: Merge
https://beltronvacancy.com/beltron-book/ Page 11
7. Which data structure is used to implement a hash table?
a) Array b) Stack
c) Queue d) Linked List Ans: a) Array
13. Which algorithm is used to find the shortest path in a graph with non-negative edge weights?
a) Dijkstra's algorithm b) Bellman-Ford algorithm
c) Depth-first search d) Breadth-first search Ans: a) Dijkstra's algorithm
14. Which sorting algorithm has a worst-case time complexity of O(n log n)?
a) Bubble Sort b) Insertion Sort
c) Quick Sort d) Merge Sort Ans: d) Merge Sort
https://beltronvacancy.com/beltron-book/ Page 12
18. Which sorting algorithm is based on the "divide and conquer" strategy?
a) Quick Sort b) Heap Sort
c) Insertion Sort d) Radix Sort Ans: a) Quick Sort
19. Which programming language is commonly used for web development and server-side scripting?
a) C++ b) Java
c) Python d) JavaScript Ans: d) JavaScript
20. Which of the following is a programming paradigm that focuses on solving problems by breaking them
Down into smaller, reusable parts?
a) Procedural programming b) Object-oriented programming
c) Functional programming d) Logical programming
Ans: a) Procedural programming
24. In object-oriented programming, what is the process of creating an instance of a class called?
a) Inheritance b) Polymorphism
c) Encapsulation d) Instantiation Ans: d) Instantiation
https://beltronvacancy.com/beltron-book/ Page 13
Computer Organization and Assembly Language Programming
Computer organization and assembly language programming are two closely related concepts in the field of
computer science.
Computer organization refers to the design and structure of a computer system, including its hardware components
and the way they interact with each other to execute instructions and perform tasks. It involves understanding the
underlying architecture and organization of a computer system, including its central processing unit (CPU), memory
hierarchy, input/output devices, and the interconnections between these components. Computer organization deals
with topics such as processor design, memory systems, instruction set architecture, and system buses.
Assembly language programming, on the other hand, is a low-level programming language that closely resembles
the machine code instructions executed by a computer's CPU. Assembly language is specific to a particular computer
architecture and provides a more human-readable representation of the machine code instructions. It allows
programmers to write programs using mnemonic codes that correspond to the machine-level instructions, which are
then converted into machine code using an assembler.
Assembly language programming requires an understanding of computer organization because programmers need
to know how the computer's hardware components work and how to write instructions that can effectively utilize
the system resources. It involves writing programs using instructions such as load, store, arithmetic operations, and
control flow instructions that directly map to the computer's underlying hardware. Assembly language programming
provides a level of control and efficiency that higher-level programming languages cannot achieve.
Overall, studying computer organization and assembly language programming provides a deeper understanding of
how computers work at a fundamental level. It enables programmers to write more efficient and optimized code, as
well as gain insights into the inner workings of computer systems, which can be beneficial in various areas such as
system programming, embedded systems, and computer architecture design.
Here are a few sample questions and answers related to computer organization and assembly language
programming:
https://beltronvacancy.com/beltron-book/ Page 14
Q: How does computer organization influence program performance?
Ans: The organization of a computer system, including its memory hierarchy, CPU design, and input/output
mechanisms, can significantly impact program performance. Efficient utilization of system resources and
optimization of data access patterns can result in improved program execution speed.
Q: What is the difference between assembly language and high-level programming languages?
Ans: Assembly language is a low-level language that closely corresponds to machine code instructions, while
high-level programming languages provide abstractions and higher-level constructs that make programming
easier. High-level languages are typically more portable and easier to read and maintain, but they sacrifice
some of the low-level control and efficiency offered by assembly language.
Computer Organization and Assembly Language Programming – Objective Questions and Answer.
2. The usual BUS structure used to connect the I/O devices is ___________
a) Star BUS structure b) Multiple BUS structure
c) Single BUS structure d) Node to Node BUS structure
Answer: c
Explanation: BUS is a collection of address, control and data lines used to connect the various devices of the
computer.
3. In intel’s IA-32 architecture there is a separate 16 bit address space for the I/O devices.
a) False b) True
Answer: b
Explanation: This type of access is called as I/O mapped devices.
https://beltronvacancy.com/beltron-book/ Page 15
c) The devices have to deal with fewer address lines
d) No advantage as such
Answer: c
Explanation: Since the I/O mapped devices have a separate address space the address lines are limited by
the amount of the space allocated.
6. To overcome the lag in the operating speeds of the I/O device and the processor we use ______
a) Buffer spaces b) Status flags
c) Interrupt signals d) Exceptions
Answer: b
Explanation: The processor operating is much faster than that of the I/O devices, so by using the status flags
the processor need not wait till the I/O operation is done. It can continue with its work until the status flag is
set.
7. The method of accessing the I/O devices by repeatedly checking the status flags is ___________
a) Program-controlled I/O b) Memory-mapped I/O
c) I/O mapped d) None of the mentioned
Answer: a
Explanation: In this method, the processor constantly checks the status flags, and when it finds that the flag
is set it performs the appropriate operation.
8. The method of synchronising the processor with the I/O device in which the device sends a signal when it
is ready is?
a) Exceptions b) Signal handling
c) Interrupts d) DMA
Answer: c
Explanation: This is a method of accessing the I/O devices which gives the complete power to the devices,
enabling them to intimate the processor when they’re ready for transfer.
https://beltronvacancy.com/beltron-book/ Page 16
10. The process wherein the processor constantly checks the status flags is called as ___________
a) Polling b) Inspection
c) Reviewing d) Echoing Answer: a
Interrupts.
Answer: b
Explanation: The Interrupt-request line is a control line along which the device is allowed to send the
interrupt signal.
2. The return address from the interrupt-service routine is stored on the ___________
a) System heap b) Processor register
c) Processor stack d) Memory
Answer: c
Explanation: The Processor after servicing the interrupts as to load the address of the previous process and
this address is stored in the stack.
3. The signal sent to the device from the processor to the device after receiving an interrupt is ____
a) Interrupt-acknowledge b) Return signal
c) Service signal d) Permission signal
Answer: a
Explanation: The Processor upon receiving the interrupt should let the device know that its request is
received.
4. When the process is returned after an interrupt service ______ should be loaded again.
i) Register contents ii) Condition codes
iii) Stack contents iv) Return addresses
a) i, iv
b) ii, iii and iv
c) iii, iv
d) i, ii
Answer: d
Explanation: None.
5. The time between the receiver of an interrupt and its service is ______
a) Interrupt delay b) Interrupt latency
c) Cycle time d) Switching time
https://beltronvacancy.com/beltron-book/ Page 17
Answer: b
Explanation: The delay in servicing of an interrupt happens due to the time is taken for contact switch to
take place.
6. Interrupts form an important part of _____ systems.
a) Batch processing b) Multitasking
c) Real-time processing d) Multi-user
Answer: c
Explanation: This forms an important part of the Real time system since if a process arrives with greater
priority then it raises an interrupt and the other process is stopped and the interrupt will be serviced.
Answer: a
Explanation: None.
8. ______ type circuits are generally used for interrupt service lines.
I) open-collector ii) open-drain
iii) XOR iv) XNOR
a) i, ii
b) ii
c) ii, iii
d) ii, iv
Answer: a
Explanation: None.
Answer: b
Explanation: This resistor is used to pull up the voltage of the interrupt service line.
12. CPU as two modes privileged and non-privileged. In order to change the mode from privileged to non-
privileged.
a) A hardware interrupt is needed
b) A software interrupt is needed
c) Either hardware or software interrupt is needed
d) A non-privileged instruction (which does not generate an interrupt)is needed
Answer: b
Explanation: A software interrupt by some program which needs some CPU service, at that time the two
modes can be interchanged.
Answer: c
Explanation: The trap is a non-maskable interrupt as it deals with the ongoing process in the processor. The
trap is initiated by the process being executed due to lack of data required for its completion. Hence trap is
unmaskable.
14. From amongst the following given scenarios determine the right one to justify interrupt mode of data
transfer.
i) Bulk transfer of several kilo-byte
ii) Moderately large data transfer of more than 1kb
iii) Short events like mouse action
iv) Keyboard inputs
a) i and ii b) ii
c) i, ii and iv d) iv
Answer: d
Explanation: None.
15. How can the processor ignore other interrupts when it is servicing one ___________
a) By turning off the interrupt request line
b) By disabling the devices from sending the interrupts
c) BY using edge-triggered request lines
d) All of the mentioned
Answer: d
Explanation: None.
https://beltronvacancy.com/beltron-book/ Page 19
Direct Memory Access.
Answer: d
Explanation: DMA is an approach of performing data transfers in bulk between memory and the external
device without the intervention of the processor.
Answer: b
Explanation: The Controller performs the functions that would normally be carried out by the processor.
3. In DMA transfers, the required signals and addresses are given by the __________
a) Processor b) Device drivers
c) DMA controllers d) The program itself
Answer: c
Explanation: The DMA controller acts as a processor for DMA transfers and overlooks the entire process.
4. After the completion of the DMA transfer, the processor is notified by __________
a) Acknowledge signal b) Interrupt signal
c) WMFC signal d) None of the mentioned
Answer: b
Explanation: The controller raises an interrupt signal to notify the processor that the transfer was complete.
6. When the R/W bit of the status register of the DMA controller is set to 1.
a) Read operation is performed b) Write operation is performed
c) Read & Write operation is performed d) None of the mentioned
Answer: a
Explanation: None.
https://beltronvacancy.com/beltron-book/ Page 20
7. The controller is connected to the ____
a) Processor BUS b) System BUS
c) External BUS d) None of the mentioned
Answer: b
Explanation: The controller is directly connected to the system BUS to provide faster transfer of data.
8. Can a single DMA controller perform operations on two different disks simultaneously?
a) True b) False
Answer: a
Explanation: The DMA controller can perform operations on two different disks if the appropriate details
are known.
9. The technique whereby the DMA controller steals the access cycles of the processor to operate is called
a) Fast conning b) Memory Con
c) Cycle stealing d) Memory stealing
Answer: c
Explanation: The controller takes over the processor’s access cycles and performs memory operations.
10. The technique where the controller is given complete access to main memory is __________
a) Cycle stealing b) Memory stealing
c) Memory Con d) Burst mode
Answer: d
Explanation: The controller is given full control of the memory access cycles and can transfer blocks at a
faster rate.
11. The controller uses _____ to help with the transfers when handling network interfaces.
a) Input Buffer storage b) Signal enhancers
c) Bridge circuits d) All of the mentioned
Answer: a
Explanation: The controller stores the data to transfer in the buffer and then transfers it.
12. To overcome the conflict over the possession of the BUS we use ______
a) Optimizers b) BUS arbitrators
c) Multiple BUS structure d) None of the mentioned
Answer: b
Explanation: The BUS arbitrator is used to overcome the contention over the BUS possession.
Answer: d
Explanation: The process requesting the transfer is paused and the operation is performed, meanwhile
another process is run on the processor.
Answer: c
Explanation: The transfer can only be initiated by an instruction of a program being executed.
Answer: a
Explanation: Each data is made up of a number of units.
2. The collection of the above mentioned entities where data is stored is called ______
a) Block b) Set
c) Word d) Byte
Answer: c
Explanation: Each readable part of the data is called blocks.
Answer: d
Explanation: The number of addressable locations in the system is called as address space.
4. If a system is 64 bit machine, then the length of each word will be _______
a) 4 bytes b) 8 bytes
c) 16 bytes d) 12 bytes
Answer: b
Explanation: A 64 bit system means, that at a time 64 bit instruction can be executed.
https://beltronvacancy.com/beltron-book/ Page 22
5. The type of memory assignment used in Intel processors is _____
a) Little Endian b) Big Endian
c) Medium Endian d) None of the mentioned
Answer: a
Explanation: The method of address allocation to data to be stored is called as memory assignment.
6. When using the Big Endian assignment to store a number, the sign bit of the number is stored in _____
a) The higher order byte of the word
b) The lower order byte of the word
c) Can’t say
d) None of the mentioned
Answer: a
Explanation: None.
7. To get the physical address from the logical address generated by CPU we use ____________
a) MAR b) MMU
c) Overlays d) TLB
Answer: b
Explanation: Memory Management Unit, is used to add the offset to the logical address generated by the
CPU to get the physical address.
8. _____ method is used to map logical addresses of variable length onto physical memory.
a) Paging b) Overlays
c) Segmentation d) Paging with segmentation
Answer: c
Explanation: Segmentation is a process in which memory is divided into groups of variable length called
segments.
9. During the transfer of data between the processor and memory we use ______
a) Cache b) TLB
c) Buffers d) Registers
Answer: d
Explanation: None.
10. Physical memory is divided into sets of finite size called as ______
a) Frames b) Pages
c) Blocks d) Vectors
Answer: a
Explanation: None.
https://beltronvacancy.com/beltron-book/ Page 23
Read-Only Memory
Answer: a
Explanation: It allows the user to program the ROM.
Answer: c
Explanation: The EPROM uses extra transistor where the ground connection is there in ROM chip.
Answer: b
Explanation: To erase the contents of the EPROM the chip is exposed to the UV rays, which dissipate the
charge on the transistor.
https://beltronvacancy.com/beltron-book/ Page 24
8. EEPROM stands for Electrically Erasable Programmable Read Only Memory.
a) True b) False
Answer: a
Explanation: The disadvantages of the EPROM led to the development of the EEPROM.
10. The memory devices which are similar to EEPROM but differ in the cost effectiveness is ______
a) Memory sticks b) Blue-ray devices
c) Flash memory d) CMOS
Answer: c
Explanation: The flash memory functions similar to the EEPROM but is much cheaper.
11. The only difference between the EEPROM and flash memory is that the latter doesn’t allow bulk data to
be written.
a) True b) False
Answer: a
Explanation: This is not permitted as the previous contents of the cells will be overwritten.
13. The memory module obtained by placing a number of flash chips for higher memory storage called as
a) FIMM b) SIMM
c) Flash card d) RIMM Answer: c
14. The flash memory modules designed to replace the functioning of a hard disk is ______
a) RIMM b) Flash drives
c) FIMM d) DIMM
Answer: b
Explanation: The flash drives have been developed to provide faster operation but with lesser space.
15. The reason for the fast operating speeds of the flash drives is ____________
a) The absence of any movable parts b) The integrated electronic hardware
c) The improved bandwidth connection d) All of the mentioned Answer: a
https://beltronvacancy.com/beltron-book/ Page 25
System Analysis and Design
System analysis and design is a process of examining, modeling, and designing an efficient and effective system to
meet specific business requirements. It involves understanding the existing system, identifying problems or
inefficiencies, and proposing solutions to improve the system's functionality, performance, and user experience.
The process of system analysis and design typically consists of several stages:
Requirements Gathering: This stage involves gathering information about the current system's functionality, user
requirements, business processes, and constraints. It may include conducting interviews, surveys, and workshops
with stakeholders to understand their needs and expectations.
Feasibility Study: A feasibility study is conducted to assess the practicality and viability of the proposed system. It
involves analyzing technical, operational, economic, and legal factors to determine if the project is worth pursuing.
System Analysis: In this stage, the current system is analyzed in detail to identify its strengths, weaknesses, and
areas for improvement. This includes studying existing documentation, conducting interviews with users and
stakeholders, and analyzing data and processes. The goal is to gain a thorough understanding of the system's
requirements and constraints.
System Design: Once the requirements are gathered and analyzed, the system design phase begins. The design
includes defining the architecture of the system, specifying the components and their interactions, and creating
system models, such as data flow diagrams, entity-relationship diagrams, and system flowcharts. The design phase
also involves selecting appropriate hardware, software, and technologies.
Implementation: During the implementation phase, the system is developed based on the design specifications. This
may involve programming, configuring software components, integrating third-party systems, and setting up
hardware infrastructure. The implementation phase also includes testing and debugging to ensure that the system
functions correctly and meets the specified requirements.
Deployment and Maintenance: Once the system is implemented, it is deployed and made available to the users.
User training and documentation are provided to ensure smooth adoption. The maintenance phase involves
monitoring and supporting the system, addressing any issues or bugs that arise, and implementing updates or
enhancements as needed.
Throughout the entire system analysis and design process, it is crucial to involve stakeholders, users, and subject
matter experts to ensure that the proposed system meets their needs and aligns with the organization's goals.
Iterative approaches, such as prototyping and user feedback, are often employed to refine the system design and
ensure its success.
Overall, system analysis and design is a structured and systematic approach to designing and implementing
information systems that effectively support business processes and meet user requirements. It combines technical
expertise, problem-solving skills, and a deep understanding of organizational needs to create efficient, user-friendly,
and sustainable systems.
https://beltronvacancy.com/beltron-book/ Page 26
Here are a few sample questions and answers related to system analysis and design:
https://beltronvacancy.com/beltron-book/ Page 27
System Analysis and Design – Objective Questions and Answer.
Q: Which technique involves observing users as they perform their tasks to gather requirements?
a) Interviews b) Questionnaires
c) Prototyping d) Observation
Ans: d) Observation
Q: Which type of requirement specifies the system's response time and availability?
a) Functional requirements b) Non-functional requirements
c) Business requirements d) Technical requirements
Q: Which testing phase involves validating the system against user requirements?
a) Unit testing
b) Integration testing
c) User acceptance testing
d) Regression testing
https://beltronvacancy.com/beltron-book/ Page 28
Q: Which design phase involves creating a detailed plan for the proposed system?
a) System analysis b) System modeling
c) System implementation d) System design
Ans: c) To depict the interactions between system actors and the system itself
Q: Which of the following is not a phase of the SDLC (Software Development Life Cycle)?
A. Planning B. Analysis
C. Implementation D. Review
Ans: D. Review
Explanation: The phases of the SDLC are Planning, Analysis, Design, Implementation, and Maintenance.
https://beltronvacancy.com/beltron-book/ Page 29
C. To determine if a project is socially feasible
D. To determine if a project is politically feasible
Q: What is the difference between black box testing and white box testing?
A. Black box testing is conducted by the development team, while white box testing is conducted by the
testing team.
B. Black box testing focuses on the system’s internal logic, while white box testing focuses on the system’s
external behavior.
C. Black box testing is conducted without knowledge of the system’s internal workings, while white box
testing is conducted with knowledge of the system’s internal workings.
D. Black box testing is conducted using automated tools, while white box testing is conducted manually.
Ans: C. Black box testing is conducted without knowledge of the system’s internal workings, while white box
testing is conducted with knowledge of the system’s internal workings.
https://beltronvacancy.com/beltron-book/ Page 30
Explanation: Black box testing is conducted without knowledge of the system’s internal workings, while
white box testing is conducted with knowledge of the system’s internal workings.
https://beltronvacancy.com/beltron-book/ Page 31
Q: What is the purpose of a use case scenario?
A. To describe the system requirements B. To describe the system design
C. To describe the system architecture D. To describe the system functionality
Ans: D. To describe the system functionality
Explanation: A use case scenario describes the steps involved in a use case.
Q: What is the purpose of a system flowchart?
A. To illustrate the system architecture B. To depict the system inputs and outputs
C. To depict the system data and relationships D. To illustrate the system processes
Ans: D. Ambiguous
Explanation: A good requirement should be specific, measurable, achievable, and unambiguous. Ambiguous
requirements can lead to misunderstandings and misinterpretations, which can result in the delivery of an
incorrect solution.
https://beltronvacancy.com/beltron-book/ Page 32
Q: In Prototyping
(a) BASIC is used (b) COBOL is used
(c) 4GLs are used (d) system is documented Ans: C
Q. Which of the following is the most critical requirement of a Passenger Reservation System?
(A) Ease of programming (B) Response time
(C) Graphical user Interface (D) Printing of tickets
Answer: B
Q. In Decision trees
(A) Nodes represent the conditions, with the right side of tree listing the actions to be taken
(B) The root is drawn on the left and is the starting point on the decision sequence
(C) The branch depends on the condition and decisions to made
(D) All of the above
Answer: D
Q. When desk-checking an algorithm, you should set up a table that contains _______.
(A) One column for each input item
(B) One column for each output item
https://beltronvacancy.com/beltron-book/ Page 33
(C) One column for each processing item
(D) All of the above
Answer: D
Q. The short statements that represent the steps the computer needs to follow to solve a problem are called
(A) Flowcharts (B) Flow diagrams
(C) IPO charts (D) Pseudo code
Answer: D
Q. A pseudo code is
(A) A machine code
(B) A computer generated random number
(C) A protocol used in data communication
(D) An easy way to communicate the logic of a program, in English like statements
Answer: D
Q. The data stored on a tape or disk file may be recorded in a report form; described as
(A) A soft copy ledger (B) Printer spacing form
(C) Proof listing (D) All of the above
Answer: Option C
Q. A structure chart is
(A) A document of what has to be accomplished
(B) A hierarchical partitioning of the program
(C) A statement of information processing requirements
(D) All of the above
Answer: B
https://beltronvacancy.com/beltron-book/ Page 35
Q. The longest method of conversion is
(A) Direct (B) Parallel
(C) Phased (D) Pilot
Answer: A
Q. Which of the following is an integrated collection of data with minimum redundancy, so that different
applications can use the required data?
(A) Records (B) File
(C) DBMS (D) Schema
Answer: C
Q. A problem's _______ will answer the question, "What does the user want to see either printed or
displayed on the screen?"
(A) Input (B) Output
(C) Processing (D) Purpose
Answer: B
https://beltronvacancy.com/beltron-book/ Page 36
Q. The system study project includes
(A) System analysis (B) System design
(C) Implementation (D) Both (a) and (b) Answer: D
Q. The systems conversion technique of totally removing the existing system and immediately implementing
the new system is called as
(A) Crash conversion (B) Phased conversion
(C) Pilot conversion (D) Parallel run
Answer: A
Q. Tracing, of any input record or process, performed on a system, back to its original source, is an
(A) Audit trial (B) Report generation
(C) Batch processing (D) Conversion
Answer: A
https://beltronvacancy.com/beltron-book/ Page 37
Q. Which of the following represents processor activities, methods, and procedures in a data flow diagram?
(A) Datagram (B) Actigram
(C) Feed back (D) Flow chart
Answer: C
Q. Which of the following is a graphic representation of the modules in the System and the interconnection
between them?
(A) Pie chart (B) Flow chart
(C) Structural chart (D) System chart
Answer: C
Q. The person communicating with the manager to identify information needs is the
(A) Executive vice-president (B) Vice- president of information system
(C) Programmer (D) System analyst
Answer: D
Q. Which of the following is not a factor in the failure of a systems development project?
(A) Inadequate user involvement
(B) Failure of systems integration
(C) Size of company
(D) Continuation of a project that should have been cancelled
Answer: C
https://beltronvacancy.com/beltron-book/ Page 38
Q. Procedure development occurs within the
(A) Structured design phase (B) Conversion phase
(C) System building phase (D) Maintenance
Answer: C
Q. Structured design methodology is an approach to design that adheres to rules based on principles such as
(A) Top-down refinement (B) Bottom-up design
(C) Data flow analysis (D) All of the above
Answer: C
Q. An open rectangle
(A) Defines a source or destination of system data
(B) Identifies data flow
(C) Represents a process that transforms incoming data flow(s) into outgoing data flows
(D) Is a data store-data at rest, or a temporary repository of data
Answer: D
Q. The term used to refer to the checking of outputs of a computer, with the corresponding input
documents, is called
(A) Auditing around the computer (B) Auditing through the computer
(C) Process control (D) Beta-test
Answer: A
Q. The systems conversion technique of totally removing the existing system and immediately implementing
the new system is called a
(A) Pilot conversion (B) Crash conversion
(C) Phased conversion (D) Parallel run
Answer: B
https://beltronvacancy.com/beltron-book/ Page 39
Q. Mistakes made in the requirements analysis stage show up in
(A) System design (B) System development
(C) System testing (D) System implementation
Answer: D
https://beltronvacancy.com/beltron-book/ Page 40
Q. The feasibilities studied in preliminary investigation is (are):
(A) Technical feasibility (B) Economic feasibility
(C) Operational feasibility (D) All of the above
Answer: D
Q. Cost-Benefit analysis
(A) Evaluates the tangible and non-tangible factors
(B) Compares the cost, with the benefits, of introducing a computer-based system
(C) Estimates the hardware and software costs
(D) All of the above
Answer: D
Q. Unit testing is
(A) Running the system with line data by the actual user
(B) Making sure that the new programs do in fact process certain transactions according to Specifications
(C) Is checking the logic of one or more programs in the candidate system
(D) Testing changes made in an existing or a new program
Answer: D
Q. Which of the following tools is not used in modeling the new system?
(A) Decision tables (B) Data dictionary
(C) Data-flow diagrams (D) All of the above
Answer: D
Q. A Pseudo code is
(A) A machine - level code
(B) A random number
(C) A flow chart
(D) Structured English to communicate the logic of a program
Answer: D
Q. Conversion method in which users, being used to an old system, continue to use the old system, alongside
the new system, is
(A) Multi processing (B) Multitasking
(C) Parallel run (D) All of the above
Answer: C
https://beltronvacancy.com/beltron-book/ Page 42
Q. Which of the following is used when a company goes outside its organization to develop a new system?
(A) Request for proposal (B) Data flow diagram
(C) Systems flowchart (D) Project directory
Answer: A
Q. A hierarchical chart that divides a large program into modules, in which greater details is designed in
successively lower programming levels, is called a
(A) Scheme (B) Sub-schema
(C) Structure (D) All of the above
Answer: C
Q. Which of the following systems implementation approaches should be used if you want to run the old
system and the new system at the same time for a specified period?
(A) Direct (B) Pilot
(C) Parallel (D) Phased
Answer: C
Q. A Square Symbols
(A) Defines a source or destination of system data
(B) Identifies data flow
(C) Represents a process that transforms incoming data flow(s) into outgoing data flows
(D) Is a data store-data at rest, or a temporary repository of data
Answer: A
https://beltronvacancy.com/beltron-book/ Page 43
Q. A design that consists of a hierarchy of modules; each module has a single entry and a single exit
subroutine, is known as
(A) Hierarchy structure (B) Top-down design
(C) Tulle (D) Turnaround
Answer: B
Q. Which of the following systems implementation approaches should be used if you want to run the old
system and the new system at the same time for a specified period?
(A) Direct (B) Pilot
(C) Phased (D) Parallel
Answer: D
Q. A Decision table
(A) Represents the information flow
(B) Documents rules, that select one or more actions, based on one or more conditions, from a set of
possible conditions
(C) Gets an accurate picture of the system
(D) Shows the decision paths
Answer: B
https://beltronvacancy.com/beltron-book/ Page 44
Q. Main characteristic of "ring", in Data structure, is
(A) First record points only to the last record (B) Last record points to the first record
(C) Many records point to one record (D) Each record points to all other records
Answer: B
Q. Which of the following is not considered a tool at the system Design phase?
(A) Data-Flow Diagram (B) Decision Table
(C) Pie chart (D) System Flowchart
Answer: C
Q. You record the algorithm in the _______ column of the IPO chart.
(A) Input (B) Output
(C) Processing (D) Purpose
Answer: C
Q. Graphic representation of the control logic of processing functions or modules representing a system is
known as:
(A) Structured analysis (B) Structured chart
(C) Structured English (D) System Flow chart
Answer: B
Q. Which of the following is not considered as a tool at the system design phase?
(A) Pie chart (B) Data-flow diagram
(C) Decision table (D) Systems flowchart
Answer: A
Q. In a Decision tree
(A) The root is drawn on the left and is the starting point on the decision sequence
(B) The branch, to be followed, depends on the conditions and decisions, to be made
(C) The nodes represent the conditions, with the right wise of tree listing the actions to be taken
(D) All of the above
Answer: D
Q. A feasibility study
(A) Includes a statement of the problems
(B) Considers a single solutions
(C) Both (a) and (b)
(D) A list of alternative solution considered
Answer: A
Q. Where one has to process all the data records in a file, the best tile organization is
(A) Indexed (B) Sequential
(C) Direct access (D) Random access
Answer: B
Q. Which of the following is used to derive the address, of a record from the record key
(A) Comma (B) Hashing
(C) Variable (D) Field
Answer: B
https://beltronvacancy.com/beltron-book/ Page 46
Q. Structured design produces computer programs that are:
(A) Easily maintained (B) Easily understood
(C) Tested in a bottom-up fashion (D) Both (a) and (b)
Answer: D
Q. A _______ is software that is designed for drawing diagrams of information systems, writing process
specifications, and maintaining data dictionaries.
(A) System Development Life Cycle (B) CASE tool
(C) Phased Conversion (D) Success factors
Answer: B
Q. Reverse video is a technique of
(A) Showing data with half brightness
(B) Showing data upside down on the screen
(C) Hiding confidential data on the screen
(D) Emphasizing data by reversing the foreground and background
Answer: D
Q. A channel for communicating across a boundary between two or more subsystems is known as
(A) Interface (B) Actigram
(C) Walk through (D) Data path
Answer: B
Q. Direct-access organization
(A) Means storing records in contiguous blocks according to a key
(B) Stores records sequentially but uses an index to locate records
(C) Uses an index for each key type
(D) Has records placed randomly throughout the file
Answer: D
https://beltronvacancy.com/beltron-book/ Page 47
Q. The term Parallel Run refers to
(A) The same job run on two different computer to test their speeds
(B) The processing of two different jobs initiated from two terminals
(C) The concurrent operation of an existing system and a new system
(D) All of the above
Answer: C
Q. The time lag, between the keying of the last character on the keyboard input and the appearance of the
first output character on the screen, is known as
(A) Key (B) System review
(C) Response time (D) Batch Processing
Answer: C
Q. The outstanding Invoice file should be stared on a Pardon Access Storage Device if
(A) Invoice data entry is on-line
(B) Payment recording is done in a batch rode
(C) Inquires concerning payable are to be answered on-line
(D) Last record points to the first record
Answer: C
https://beltronvacancy.com/beltron-book/ Page 48
Internet Concepts and Web Design
Internet Concepts and Web Design encompass the fundamental principles and techniques related to the functioning
of the internet and the creation of visually appealing and user-friendly websites. It involves understanding how the
internet works, exploring web technologies, and designing websites that effectively communicate and engage with
users. Here are some key aspects of Internet Concepts and Web Design:
Internet Basics:
Understanding the internet infrastructure, including networks, protocols, and data transmission.
Exploring the client-server model and the role of web browsers and web servers.
Familiarity with IP addresses, domain names, and the Domain Name System (DNS).
Understanding internet protocols such as HTTP, HTTPS, FTP, and SMTP.
Knowledge of HTML tags and elements for structuring and presenting content on webpages.
Understanding semantic HTML and the proper use of headings, paragraphs, lists, and links.
Knowledge of HTML forms for user input and interaction.
Mastery of HTML5 features, including audio, video, canvas, and responsive design.
Knowledge of user interface (UI) and user experience (UX) design principles.
Creating visually appealing and accessible websites.
Applying principles of color theory, typography, and visual hierarchy.
Designing intuitive navigation and interactive elements.
Web Accessibility:
https://beltronvacancy.com/beltron-book/ Page 49
Applying accessibility guidelines to ensure websites are usable by people with disabilities.
Implementing proper markup, alternative text for images, and keyboard navigation support.
Understanding SEO best practices to improve website visibility in search engine results.
Implementing proper HTML tags, meta tags, and structured data.
Optimizing website content for keywords and relevancy.
Building quality backlinks and improving website authority.
Web Analytics:
Knowledge of web analytics tools like Google Analytics for tracking website performance.
Analyzing user behavior, traffic sources, and conversion rates.
Using data insights to make informed decisions and optimize website design and content.
These topics provide a comprehensive overview of Internet Concepts and Web Design. Mastering these concepts
and techniques can help create visually appealing, user-friendly, and successful websites.
https://beltronvacancy.com/beltron-book/ Page 50
Which organization is responsible for assigning IP addresses globally?
Answer: Internet Assigned Numbers Authority (IANA).
Which organization is responsible for the maintenance and development of the TCP/IP protocol suite?
Answer: Internet Engineering Task Force (IETF).
Which organization is responsible for managing top-level domain names (e.g., .com, .org, .net)?
Answer: Internet Corporation for Assigned Names and Numbers (ICANN).
https://beltronvacancy.com/beltron-book/ Page 52
What does the acronym "WAN" stand for?
Answer: Wide Area Network.
Which organization is responsible for the maintenance and development of the TCP/IP protocol suite?
Answer: Internet Engineering Task Force (IETF).
https://beltronvacancy.com/beltron-book/ Page 53
What does the acronym "SSH" stand for?
Answer: Secure Shell.
Which organization is responsible for the maintenance and development of the TCP/IP protocol suite?
Answer: Internet Engineering Task Force (IETF).
https://beltronvacancy.com/beltron-book/ Page 54
Here are 100 objective questions with their answers related to HTML:
Which attribute is used to specify the URL of the linked document in an <a> tag?
Answer: href attribute.
Which attribute is used to specify the method used to submit form data in an <form> tag?
Answer: method attribute.
Which attribute is used to specify the action to be performed when a form is submitted in an <form> tag?
Answer: action attribute.
https://beltronvacancy.com/beltron-book/ Page 55
Which tag is used to create a text input field in HTML?
Answer: <input> tag.
Which attribute is used to specify the type of input field in an <input> tag?
Answer: type attribute.
Which attribute is used to specify the source URL of an image in an <img> tag?
Answer: src attribute.
Which attribute is used to specify the alternative text for an image in an <img> tag?
Answer: alt attribute.
Which attribute is used to specify the width of a table column in an <td> tag?
Answer: width attribute.
https://beltronvacancy.com/beltron-book/ Page 56
Answer: <!--> tag.
Which attribute is used to specify the checked state of a checkbox in an <input> tag?
Answer: checked attribute.
Which attribute is used to specify the selected option in a dropdown list in an <option> tag?
Answer: selected attribute.
Which attribute is used to specify the number of visible rows in a text area in a <textarea> tag?
Answer: rows attribute.
Which attribute is used to specify the maximum number of characters allowed in a text area in a
<textarea> tag?
Answer: maxlength attribute.
https://beltronvacancy.com/beltron-book/ Page 57
Which attribute is used to specify the label for a form element in an <input> tag?
Answer: id attribute.
Which attribute is used to group related form elements together in an <input> tag?
Answer: name attribute.
Which attribute is used to provide additional information about an HTML element in a <input> tag?
Answer: title attribute.
Which attribute is used to associate a label with a form element in an <input> tag?
Answer: for attribute.
Which attribute is used to specify the width of a table border in a <table> tag?
Answer: border attribute.
Which attribute is used to specify the shape of an area in an image map in an <area> tag?
Answer: shape attribute.
Which attribute is used to specify the coordinates of an area in an image map in an <area> tag?
Answer: coords attribute.
Which attribute is used to specify the source URL of a video in a <video> tag?
Answer: src attribute.
Which attribute is used to specify whether the video should start playing automatically in a <video> tag?
Answer: autoplay attribute.
Which attribute is used to specify the source URL of an audio file in an <audio> tag?
Answer: src attribute.
Which attribute is used to specify whether the audio should start playing automatically in an <audio> tag?
Answer: autoplay attribute.
Which attribute is used to specify the value of a progress bar in a <progress> tag?
Answer: value attribute.
https://beltronvacancy.com/beltron-book/ Page 58
Answer: <input> tag with type attribute set to "range".
Which attribute is used to specify the minimum value of a slider control in an <input> tag?
Answer: min attribute.
Which attribute is used to specify the maximum value of a slider control in an <input> tag?
Answer: max attribute.
Which attribute is used to specify the width of a video element in an <video> tag?
Answer: width attribute.
Which attribute is used to specify the height of a video element in an <video> tag?
Answer: height attribute.
Which attribute is used to specify whether the video controls should be displayed in an <video> tag?
Answer: controls attribute.
Which attribute is used to specify the source URL of an iframe in an <iframe> tag?
Answer: src attribute.
Which attribute is used to specify the width of an iframe element in an <iframe> tag?
Answer: width attribute.
Which attribute is used to specify the height of an iframe element in an <iframe> tag?
Answer: height attribute.
Which attribute is used to specify the target window or frame for a hyperlink in an <a> tag?
Answer: target attribute.
Which attribute is used to specify whether a table cell should span multiple columns in an <td> tag?
Answer: colspan attribute.
Which attribute is used to specify whether a table cell should span multiple rows in an <td> tag?
Answer: rowspan attribute.
https://beltronvacancy.com/beltron-book/ Page 59
Answer: <dl> tag.
Which attribute is used to specify the maximum number of characters allowed in a text input field in an
<input> tag?
Answer: maxlength attribute.
Which attribute is used to specify the pattern that a value should match in a text input field in an <input>
tag?
Answer: pattern attribute.
Which attribute is used to specify a placeholder text for a text input field in an <input> tag?
Answer: placeholder attribute.
Which attribute is used to specify whether a text input field is required in an <input> tag?
Answer: required attribute.
Which attribute is used to specify the step size for a number input field in an <input> tag?
Answer: step attribute.
Which attribute is used to specify whether a checkbox or radio button is checked by default in an <input>
tag?
Answer: checked attribute.
Which attribute is used to specify the default value for a text input field in an <input> tag?
Answer: value attribute.
Which attribute is used to specify the position of an element in relation to the surrounding text flow in an
<input> tag?
Answer: float attribute.
Which attribute is used to specify the color of an HTML element in a <input> tag?
Answer: color attribute.
https://beltronvacancy.com/beltron-book/ Page 60
Internet Concepts & Design – Objective Questions and Answer.
https://beltronvacancy.com/beltron-book/ Page 61
Q. Which protocol is used for secure web browsing?
a) HTTPS b) HTTP
c) FTP d) SMTP
Answer: a) HTTPS
Q. Which protocol is used for transferring web pages from a server to a browser?
a) HTTP b) FTP
c) SMTP d) DNS
Answer: a) HTTP
Q. Which organization is responsible for the maintenance and development of the TCP/IP protocol suite?
a) IETF b) ICANN
c) IEEE d) ISO
Answer: a) IETF
https://beltronvacancy.com/beltron-book/ Page 63
Q. Which protocol is used for secure email communication?
a) SMTP b) POP
c) IMAP d) S/MIME Answer: d) S/MIME
Q. Which protocol is used for streaming audio and video over the Internet?
a) RTP b) RTSP
c) SMTP d) SNMP
Answer: b) RTSP
Q. Which organization is responsible for the maintenance and development of the TCP/IP protocol suite?
a) IETF b) ICANN
c) IEEE d) ISO
Answer: a) IETF
https://beltronvacancy.com/beltron-book/ Page 65
Q. Which protocol is used for secure email communication?
a) SMTP b) POP
c) IMAP d) S/MIME
Answer: d) S/MIME
Q. Which protocol is used for transferring data securely over the Internet?
a) HTTPS b) HTTP
c) FTPS d) FTP
Answer: a) HTTPS
https://beltronvacancy.com/beltron-book/ Page 66
Q. Which organization is responsible for assigning domain names globally?
a) ICANN b) IANA
c) IETF d) IEEE
Answer: a) ICANN
Q. Which protocol is used for transferring data between web browsers and web servers?
a) HTTP b) HTTPS
c) FTP d) FTPS
Answer: a) HTTP
https://beltronvacancy.com/beltron-book/ Page 67
Q. Which organization is responsible for assigning Autonomous System Numbers (ASNs)?
a) IANA b) IEEE
c) ICANN d) ARIN
Answer: d) ARIN
Q. Which protocol is used for securely accessing and managing network devices?
a) SNMPv3 b) SNMPv2
c) SNMPv1 d) SMTP
Answer: a) SNMPv3
Q. Which protocol is used for transferring data securely over the Internet?
a) HTTPS b) HTTP
c) FTPS d) FTP Answer: a) HTTPS
Q. Which protocol is used for streaming audio and video over the Internet?
a) RTP b) RTSP
c) SMTP d) SNMP
Answer: b) RTSP
https://beltronvacancy.com/beltron-book/ Page 69
Q. What does the acronym "SSH" stand for?
a) Secure Socket Hosting b) Secure Shell Hosting
c) Secure Server Hosting d) Socket Secure Hosting
Answer: b) Secure Shell Hosting
C and Assembly Language Programming are two different programming languages used for different purposes.
C Programming:
C is a high-level programming language that was developed in the 1970s. It is a general-purpose language known for
its efficiency, simplicity, and portability. C is widely used for system programming, embedded systems, and
application development. It provides a structured and procedural approach to programming, allowing developers to
write modular and reusable code.
Structured programming constructs: C supports constructs like loops, conditionals, and functions, allowing
developers to write structured and organized code.
Pointers: C allows direct manipulation of memory addresses using pointers, which enables low-level
memory operations and efficient data manipulation.
Standard Library: C provides a rich set of library functions for various operations, such as input/output,
string manipulation, mathematical calculations, and memory management.
Portability: C programs can be compiled and executed on different platforms with minor modifications,
making it a highly portable language.
https://beltronvacancy.com/beltron-book/ Page 70
Assembly Language Programming:
Assembly language is a low-level programming language that represents machine instructions using
mnemonic codes. It is specific to the architecture of a particular computer system and provides direct
control over the hardware resources. Assembly language is often used for tasks that require precise control
of hardware, such as device drivers, operating systems, and embedded systems.
Low-level operations: Assembly language allows direct manipulation of hardware resources, including
registers, memory, and I/O devices.
Mnemonic instructions: Assembly language uses mnemonic codes to represent machine instructions,
making it easier for programmers to understand and write code.
Close-to-hardware control: Assembly language provides fine-grained control over the underlying hardware,
allowing programmers to optimize code for specific tasks.
Platform-specific: Assembly language programs are highly specific to a particular hardware architecture and
may require modifications to work on different systems.
C and Assembly language are closely related as C can be used to write low-level code that interfaces with
assembly language. In fact, C compilers often generate assembly language code as an intermediate step
before translating it into machine code. Programmers can also write inline assembly code within C programs
to perform specific low-level operations. This combination allows developers to take advantage of both the
high-level abstraction and low-level control offered by C and assembly language, respectively.
Overall, C and Assembly language programming serve different purposes, with C focusing on high-level
abstraction and portability, while assembly language offers low-level control and direct hardware access.
The choice between the two depends on the specific requirements of the task at hand and the level of
control and optimization needed.
2. What is a variable in C?
Answer: A variable in C is a named storage location that holds a value of a specific data type. It is used to
store and manipulate data within a program.
https://beltronvacancy.com/beltron-book/ Page 71
4. What is the difference between a local variable and a global variable in C?
Answer: A local variable is declared within a function and has a limited scope, accessible only within that
function. A global variable is declared outside of any function and can be accessed by any function within
the program.
5. What is a function in C?
Answer: A function in C is a reusable block of code that performs a specific task. It can accept inputs
(parameters), execute a series of statements, and return a value (optional).
https://beltronvacancy.com/beltron-book/ Page 72
15. What is the if statement in C used for?
Answer: The if statement in C is used to execute a block of code conditionally. It allows the program to make
decisions based on a given condition.
18. What is the difference between the while loop and the do-while loop in C?
Answer: In a while loop, the condition is checked at the beginning. If the condition is false, the loop is not
executed. In a do-while loop, the condition is checked at the end, ensuring that the loop is executed at least
once.
26. What is the difference between the "++i" and "i++" increment operators?
Answer: The "++i" operator increments the value of i and returns the updated value, while "i++" increments
the value of i but returns the original value before the increment.
https://beltronvacancy.com/beltron-book/ Page 73
27. What are the bitwise operators in C?
Answer: The bitwise operators in C are used for manipulation of individual bits of an operand. They include
bitwise AND (&), bitwise OR (|), bitwise XOR (^), left shift (<<), and right shift (>>).
31. What is the difference between pass by value and pass by reference in C?
Answer: In pass by value, a copy of the variable is passed to a function, so any changes made to the
parameter within the function do not affect the original variable. In pass by reference, the memory address
of the variable is passed, allowing changes to be reflected in the original variable.
https://beltronvacancy.com/beltron-book/ Page 74
38. What is the difference between strcpy() and strncpy() functions in C?
Answer: strcpy() function is used to copy a null-terminated string from one character array to another, while
strncpy() function allows specifying the maximum number of characters to be copied.
41. What is the difference between the "strcpy()" and "memcpy()" functions in C?
Answer: The "strcpy()" function is used to copy a string from one character array to another until it
encounters a null character. The "memcpy()" function, on the other hand, is used to copy a specified
number of bytes from one memory location to another.
42. What is the purpose of the "const" keyword when declaring function parameters in C?
Answer: The "const" keyword when used with function parameters in C indicates that the parameter is
read-only and cannot be modified within the function.
43. What are the storage modifiers "extern" and "static" used for in C?
Answer: The "extern" keyword is used to declare a variable that is defined in a different file, while the
"static" keyword is used to declare a variable with file scope, limiting its visibility to the current file.
48. What is the purpose of the "sizeof()" operator in C when used with arrays?
Answer: When used with arrays, the "sizeof()" operator in C returns the total size in bytes occupied by the
entire array.
https://beltronvacancy.com/beltron-book/ Page 75
49. What is the purpose of the "enum" keyword in C?
Answer: The "enum" keyword in C is used to define an enumeration type, which represents a set of named
integer constants. It provides a way to create symbolic names for integer values.
52. What is the purpose of the "typedef" keyword when used with structures in C?
Answer: The "typedef" keyword when used with structures in C allows creating a new type name (alias) for
the structure. It provides a way to simplify the declaration of structure variables.
59. What is the difference between "++x" and "x++" increment operators in C?
Answer: The "++x" operator increments the value of x and returns the updated value, while "x++" also
increments the value of x but returns the original value before the increment.
https://beltronvacancy.com/beltron-book/ Page 76
60. What is the purpose of the "pow()" function in C?
Answer: The "pow()" function is used to calculate the power of a given base raised to a specified exponent.
It is part of the math library in C.
https://beltronvacancy.com/beltron-book/ Page 77
72. What is the purpose of the "sprintf()" function in C?
Answer: The "sprintf()" function is used to format a string and store the resulting characters into a buffer. It
is similar to the "printf()" function but writes the formatted output to a character array.
https://beltronvacancy.com/beltron-book/ Page 78
84. What is the purpose of the "isalpha()" function in C?
Answer: The "isalpha()" function is used to check whether a given character is an alphabetic character (A-Z
or a-z). It returns a non-zero value if the character is an alphabet.
https://beltronvacancy.com/beltron-book/ Page 79
96. What is the purpose of the "sscanf()" function in C?
Answer: The "sscanf()" function is used to read formatted input from a string. It takes a format string as
input and extracts values from the string according to the specified format.
Join Telegram
https://beltronvacancy.com/beltron-book/ Page 80
C Programming MCQ (Multiple Choice Questions)
6. How many number of pointer (*) does C have against a pointer variable declaration?
a) 7 b) 127
c) 255 d) No limits
Answer: d
https://beltronvacancy.com/beltron-book/ Page 81
9. Which of the following is true for variable names in C?
a) They can contain alphanumeric characters as well as special characters
b) It is not an error to declare a variable to be one of the keywords(like goto, static)
c) Variable names cannot start with a digit
d) Variable can be of any length
Answer: c
Explanation: According to the syntax for C variable name, it cannot start with a digit.
9. Which keyword is used to prevent any changes in the variable within a C program?
a) immutable b) mutable
c) const d) volatile
Answer: c
Explanation: const is a keyword constant in C program.
https://beltronvacancy.com/beltron-book/ Page 82
10. What is the result of logical or relational expression in C?
a) True or False
b) 0 or 1
c) 0 if an expression is false and any positive number if an expression is true
d) None of the mentioned
Answer: b
https://beltronvacancy.com/beltron-book/ Page 83
18. The standard header _______ is used for variable list arguments (…) in C.
a) <stdio.h > b) <stdlib.h>
c) <math.h> d) <stdarg.h>
Answer: d
https://beltronvacancy.com/beltron-book/ Page 84
35. What will happen if the following C code is executed?
#include <stdio.h>
int main()
{
int main = 3;
printf("%d", main);
return 0;
}
a) It will cause a compile-time error b) It will cause a run-time error
c) It will run without any error and prints 3 d) It will experience infinite looping
Answer: c
Explanation: A C program can have same function name and same variable name.
$ cc pgm3.c
$ a.out
3
43. What will be the output of the following C code considering the size of a short int is 2, char is 1 and int is 4
bytes?
https://beltronvacancy.com/beltron-book/ Page 85
int main()
{
short int i = 20;
char c = 97;
printf("%d, %d, %d\n", sizeof(i), sizeof(c), sizeof(c + i));
return 0; }
a) 2, 1, 2 b) 2, 1, 1
c) 2, 1, 4 d) 2, 2, 8
Answer: c
44. How many times i value is checked in the following C program?
#include <stdio.h>
int main()
{
while (i < 3)
i++;
printf("In while loop\n"); }
a) 2 b) 3
c) 4 d) 1
Answer: c
52. What will be the data type returned for the following C function?
#include <stdio.h>
int func()
{
return (double)(char)5.0;
}
a) char b) int
c) double d) multiple type-casting in return is illegal
Answer: b
https://beltronvacancy.com/beltron-book/ Page 86
a) It reduces execution time. B) It reduces code size.
c) It increases execution time. D) It increases code size.
Answer: (d) It reduces code size.
Explanation: Macro is used in place of a function because it reduces code size, and very efficient.
https://beltronvacancy.com/beltron-book/ Page 87
63. What is the purpose of the "sizeof" operator in C?
a) To return the size in bytes of a data type or variable
b) To perform arithmetic operations
c) To compare two variables
d) To convert data types
Answer: a) To return the size in bytes of a data type or variable
67. What will be the value of "x" after the execution of the following code snippet?
int x = 10;
x = x++ + ++x;
Answer: The value of "x" will be 23.
68. Which header file is required to use the functions like malloc() and free() in C?
a) stdio.h b) math.h
c) stdlib.h d) string.h
Answer: c) stdlib.h
73. What will be the value of "x" after the execution of the following code snippet?
int x = 10;
x += 5 * 2;
Answer: The value of "x" will be 20.
77. What will be the value of "num" after the execution of the following code snippet?
int num = 5;
num = -num--;
Answer: The value of "num" will be -5.
https://beltronvacancy.com/beltron-book/ Page 90
Data & File Structures
Data and File Structures is a branch of computer science that deals with the organization, storage, and retrieval of
data in various data structures and files. It focuses on designing efficient algorithms and data structures to manage
and manipulate large volumes of data.
Here are some key concepts related to Data and File Structures:
Data Structures: Data structures refer to the organization and storage of data in a computer's memory. They
provide efficient ways to access, insert, delete, and manipulate data. Common data structures include
arrays, linked lists, stacks, queues, trees, graphs, and hash tables.
Abstract Data Types (ADTs): ADTs are high-level data structures that define a set of operations without
specifying the underlying implementation details. They encapsulate the data and the operations that can be
performed on that data. Examples of ADTs include lists, stacks, queues, and dictionaries.
https://beltronvacancy.com/beltron-book/ Page 91
Algorithm Analysis: Algorithm analysis involves analyzing the efficiency and performance of algorithms in
terms of time complexity and space complexity. It helps in evaluating the efficiency of different algorithms
and selecting the most suitable algorithm for a specific task.
File Structures: File structures refer to the organization and storage of data in files. Different file
organizations, such as sequential, direct, indexed, and hashed, are used to optimize data access and retrieval
based on specific requirements.
Sorting and Searching: Sorting and searching algorithms are essential in data and file structures. Sorting
algorithms arrange data in a specific order, such as ascending or descending, while searching algorithms
help locate specific data efficiently.
Trees and Graphs: Trees and graphs are hierarchical data structures used to represent relationships
between data elements. Trees have a hierarchical structure with a root node and child nodes, while graphs
have nodes connected by edges. Tree structures include binary trees, AVL trees, B-trees, and heaps, while
graph structures include directed and undirected graphs.
Hashing: Hashing is a technique used to map data to a fixed-size array or table, called a hash table, based on
a hash function. It provides fast access and retrieval of data by generating a unique index for each data item.
Hashing is commonly used for implementing dictionaries and databases.
Dynamic Memory Allocation: Dynamic memory allocation allows programs to allocate memory at runtime
dynamically. Functions like malloc(), calloc(), and realloc() are used to allocate memory for data structures
based on the program's requirements.
File Operations: File operations involve reading from and writing to files. It includes opening and closing
files, reading and writing data, positioning the file pointer, and performing file-related operations such as
appending, deleting, or modifying records.
Data Compression: Data compression techniques are used to reduce the size of data to save storage space
and optimize data transfer. It includes methods like Huffman coding, run-length encoding, and Lempel-Ziv-
Welch (LZW) compression.
Understanding data and file structures is crucial for efficient data management, algorithm design, and software
development. It helps in creating optimized and scalable solutions for handling large volumes of data and
implementing efficient data storage and retrieval systems.
https://beltronvacancy.com/beltron-book/ Page 92
Data & File Structures.
Here are 100 objective questions with answers related to Data and File Structures for a competitive exam:
1. Which data structure is used to store a collection of elements with a last-in-first-out (LIFO) order?
a) Queue b) Stack
c) Linked List d) Tree
Answer: b) Stack
3. Which file organization technique allows direct access to records using a key field?
a) Sequential File b) Indexed File
c) Hashed File d) B-tree File
Answer: b) Indexed File
4. Which of the following sorting algorithms has a worst-case time complexity of O(n^2)?
a) Bubble Sort b) Merge Sort
c) Quick Sort d) Radix Sort
Answer: a) Bubble Sort
6. Which searching algorithm is used to search a sorted array by repeatedly dividing the search interval in
half?
a) Linear Search b) Binary Search
c) Depth-First Search d) Breadth-First Search
Answer: b) Binary Search
7. Which file organization technique provides efficient access to records by using a hash function?
a) Sequential File b) Indexed File
c) Hashed File d) B-tree File
Answer: c) Hashed File
9. Which data structure represents a collection of elements with no specific order and may contain
duplicates?
a) Array b) Linked List
c) Set d) Tree
Answer: c) Set
https://beltronvacancy.com/beltron-book/ Page 93
10. Which of the following operations is not supported by a queue?
a) Enqueue b) Dequeue
c) Push d) Peek
Answer: c) Push
11. Which data structure is used to implement a dictionary with fast search, insert, and delete operations?
a) Stack b) Queue
c) Hash Table d) Tree
Answer: c) Hash Table
12. Which file organization technique allows random access to records using an index?
a) Sequential File b) Indexed File
c) Hashed File d) B-tree File
Answer: b) Indexed File
13. Which sorting algorithm has a time complexity of O(n log n) in the average and worst cases?
a) Bubble Sort b) Insertion Sort
c) Quick Sort d) Radix Sort
Answer: c) Quick Sort
15. Which of the following is a self-adjusting data structure that moves accessed elements to the front for
faster access?
a) Stack b) Queue
c) Linked List d) Cache
Answer: d) Cache
16. Which searching algorithm is used to find the shortest path between two nodes in a graph?
a) Linear Search b) Binary Search
c) Depth-First Search d) Breadth-First Search
Answer: d) Breadth-First Search
17. Which file organization technique is used to handle large amounts of data that cannot fit into memory?
a) Sequential File b) Indexed File
c) External File d) B-tree File
Answer: c) External File
18. Which sorting algorithm is based on the comparison of adjacent elements and swapping if they are in the
wrong order?
a) Bubble Sort b) Merge Sort
c) Quick Sort d) Radix Sort
Answer: a) Bubble Sort
19. Which data structure is used to store and retrieve data in the order of their arrival?
a) Stack b) Queue
c) Linked List d) Heap
Answer: b) Queue
https://beltronvacancy.com/beltron-book/ Page 94
20. Which searching algorithm is used to search a tree data structure?
a) Linear Search b) Binary Search
c) Depth-First Search d) Breadth-First Search
Answer: c) Depth-First Search
21. Which file organization technique uses a balanced tree structure to provide efficient access to records?
a) Sequential File b) Indexed File
c) Hashed File d) B-tree File
Answer: d) B-tree File
22. Which sorting algorithm is based on the principle of repeatedly dividing the input array into smaller
subarrays and conquering them individually?
a) Insertion Sort b) Selection Sort
c) Merge Sort d) Quick Sort
Answer: d) Quick Sort
24. Which of the following is a non-linear data structure with a hierarchical arrangement of elements?
a) Array b) Linked List
c) Stack d) Tree
Answer: d) Tree
25. Which file organization technique provides the fastest access to records but requires the records to be in
sorted order?
a) Sequential File b) Indexed File
c) Hashed File d) B-tree File
Answer: b) Indexed File
26. Which sorting algorithm is based on the comparison of adjacent elements and swapping if they are in the
wrong order, repeatedly until the entire array is sorted?
a) Bubble Sort b) Merge Sort
c) Quick Sort d) Radix Sort
Answer: a) Bubble Sort
27. Which data structure is used to implement undo-redo operations in text editors?
a) Stack b) Queue
c) Linked List d) Tree
Answer: a) Stack
28. Which searching algorithm is used to find the maximum or minimum value in a set of elements?
a) Linear Search b) Binary Search
c) Depth-First Search d) Breadth-First Search
Answer: a) Linear Search
29. Which file organization technique uses a hash function to calculate the storage location of a record?
a) Sequential File b) Indexed File
c) Hashed File d) B-tree File
Answer: c) Hashed File
https://beltronvacancy.com/beltron-book/ Page 95
30. Which sorting algorithm is based on the principle of dividing the input array into two halves, sorting them
recursively, and then merging them together?
a) Insertion Sort b) Selection Sort
c) Merge Sort d) Quick Sort
Answer: c) Merge Sort
31. Which data structure is used to efficiently find the maximum or minimum element in a set of elements?
a) Array b) Linked List
c) Stack d) Heap Answer: d) Heap
32. Which of the following is a non-linear data structure that represents a collection of elements with a
hierarchical relationship?
a) Array b) Linked List
c) Queue d) Tree
Answer: d) Tree
33. Which file organization technique provides efficient access to records by storing an index that maps key
values to their corresponding record addresses?
a) Sequential File b) Indexed File
c) Hashed File d) B-tree File
Answer: b) Indexed File
34. Which sorting algorithm is based on the principle of selecting the smallest (or largest) element from the
unsorted part of the array and swapping it with the first element?
a) Bubble Sort b) Merge Sort
c) Quick Sort d) Selection Sort
Answer: d) Selection Sort
35. Which data structure is used to implement a double-ended queue that allows insertion and deletion at
both ends?
a) Array b) Linked List
c) Queue d) Deque
Answer: d) Deque
36. Which searching algorithm is used to find the shortest path between two nodes in a weighted graph?
a) Linear Search b) Binary Search
c) Dijkstra's Algorithm d) A* Algorithm
Answer: c) Dijkstra's Algorithm
37. Which file organization technique uses a balanced tree structure to provide efficient access to records and
supports range queries?
a) Sequential File b) Indexed File
c) Hashed File d) B-tree File Answer: d) B-tree File
38. Which sorting algorithm is based on the principle of repeatedly finding the minimum element from the
unsorted part of the array and swapping it with the element at the beginning of the unsorted part?
a) Bubble Sort b) Merge Sort
c) Quick Sort d) Selection Sort
Answer: d) Selection Sort
39. Which data structure is used to represent a collection of elements in a sorted order with efficient
insertion and deletion operations?
a) Array b) Linked List
c) Queue d) Binary Search Tree
Answer: d) Binary Search Tree
https://beltronvacancy.com/beltron-book/ Page 96
40. Which of the following is a non-linear data structure that represents a collection of elements in a
hierarchical order with a single root node?
a) Array b) Linked List
c) Queue d) Tree
Answer: d) Tree
41. Which file organization technique provides efficient access to records by using a secondary index along
with the primary index?
a) Sequential File b) Indexed File
c) Hashed File d) B+ Tree File Answer: d) B+ Tree File
42. Which sorting algorithm is based on the principle of repeatedly dividing the input array into two subarrays
and conquering them individually using a pivot element?
a) Insertion Sort b) Selection Sort
c) Merge Sort d) Quick Sort
Answer: d) Quick Sort
43. Which data structure is used to efficiently find the maximum or minimum element in a set of elements, as
well as perform insert and delete operations?
a) Array b) Linked List
c) Stack d) Heap
Answer: d) Heap
44. Which of the following is a non-linear data structure that represents a collection of elements in a
hierarchical order with no cycles?
a) Array b) Linked List
c) Queue d) Directed Acyclic Graph (DAG)
Answer: d) Directed Acyclic Graph (DAG)
45. Which file organization technique allows efficient access to records by using a multi-level index structure?
a) Sequential File b) Indexed File
c) Hashed File d) B-tree File
Answer: d) B-tree File
46. Which sorting algorithm is based on the principle of repeatedly partitioning the array into smaller parts
and sorting them individually?
a) Bubble Sort b) Merge Sort
c) Quick Sort d) Radix Sort
Answer: c) Quick Sort
47. Which data structure is used to implement a priority queue with efficient insert and delete operations?
a) Array b) Linked List
c) Stack d) Heap
Answer: d) Heap
48. Which searching algorithm is used to find a particular element in a binary search tree?
a) Linear Search b) Binary Search
c) Depth-First Search d) Breadth-First Search
Answer: b) Binary Search
49. Which file organization technique provides efficient access to records by storing them in the order of their
primary key values?
a) Sequential File b) Indexed File
c) Hashed File d) B-tree File
Answer: a) Sequential File
https://beltronvacancy.com/beltron-book/ Page 97
50. Which sorting algorithm is based on the principle of repeatedly dividing the input array into digits and
sorting them individually?
a) Bubble Sort b) Merge Sort
c) Quick Sort d) Radix Sort
Answer: d) Radix Sort
51. Which data structure is used to implement a first-in-first-out (FIFO) queue with efficient enqueue and
dequeue operations?
a) Array b) Linked List
c) Stack d) Queue
Answer: b) Linked List
52. Which searching algorithm is used to find the shortest path between two nodes in a graph with weighted
edges?
a) Linear Search b) Binary Search
c) Dijkstra's Algorithm d) A* Algorithm
Answer: c) Dijkstra's Algorithm
53. Which file organization technique provides efficient access to records by using a secondary index for
faster search operations?
a) Sequential File b) Indexed File
c) Hashed File d) B+ Tree File
Answer: b) Indexed File
54. Which sorting algorithm is based on the principle of comparing adjacent elements and swapping them if
they are in the wrong order, repeatedly until the entire array is sorted?
a) Bubble Sort b) Merge Sort
c) Quick Sort d) Selection Sort
Answer: a) Bubble Sort
55. Which data structure is used to represent a collection of elements in a sorted order with efficient search,
insert, and delete operations?
a) Array b) Linked List
c) Queue d) Balanced Search Tree
Answer: d) Balanced Search Tree
56. Which of the following is a non-linear data structure that represents a collection of elements in a
hierarchical order with multiple root nodes?
a) Array b) Linked List
c) Queue d) Forest
Answer: d) Forest
57. Which file organization technique allows efficient access to records by using a balanced tree structure
with multiple keys per node?
a) Sequential File b) Indexed File
c) Hashed File d) B+ Tree File
Answer: d) B+ Tree File
58. Which sorting algorithm is based on the principle of repeatedly selecting the maximum (or minimum)
element from the unsorted part of the array and placing it in its final position?
a) Bubble Sort b) Merge Sort
c) Quick Sort d) Selection Sort
Answer: d) Selection Sort
https://beltronvacancy.com/beltron-book/ Page 98
59. Which data structure is used to implement a double-ended queue that allows insertion and deletion at
both ends, and supports efficient random access to elements?
a) Array b) Linked List
c) Queue d) Deque
Answer: a) Array
60. Which searching algorithm is used to find the shortest path between two nodes in a weighted graph with
heuristic values?
a) Linear Search b) Binary Search
c) Dijkstra's Algorithm d) A* Algorithm
Answer: d) A* Algorithm
61. Which file organization technique provides efficient access to records by using a multi-level index
structure with variable-sized nodes?
a) Sequential File b) Indexed File
c) Hashed File d) B+ Tree File
Answer: d) B+ Tree File
62. Which sorting algorithm is based on the principle of dividing the input array into two subarrays, sorting
them recursively, and then merging them together using a merge operation?
a) Bubble Sort b) Merge Sort
c) Quick Sort d) Radix Sort
Answer: b) Merge Sort
63. Which data structure is used to implement a stack with efficient push and pop operations?
a) Array b) Linked List
c) Stack d) Queue
Answer: c) Stack
64. Which searching algorithm is used to find a particular element in a binary search tree by comparing the
element with the current node and moving left or right accordingly?
a) Linear Search b) Binary Search
c) Depth-First Search d) Breadth-First Search
Answer: b) Binary Search
65. Which file organization technique provides efficient access to records by using a hash function and a
bucket structure?
a) Sequential File b) Indexed File
c) Hashed File d) B+ Tree File
Answer: c) Hashed File
66. Which sorting algorithm is based on the principle of dividing the input array into smaller subarrays,
sorting them individually, and then combining them in a bottom-up manner?
a) Bubble Sort b) Merge Sort
c) Quick Sort d) Radix Sort
Answer: b) Merge Sort
67. Which data structure is used to implement a queue with efficient enqueue and dequeue operations?
a) Array b) Linked List
c) Stack d) Queue
Answer: a) Array
https://beltronvacancy.com/beltron-book/ Page 99
68. Which searching algorithm is used to find the shortest path between two nodes in a graph with weighted
edges and heuristic values?
a) Linear Search b) Binary Search
c) Dijkstra's Algorithm d) A* Algorithm
Answer: d) A* Algorithm
69. Which file organization technique provides efficient access to records by using a multi-level index
structure with fixed-sized nodes?
a) Sequential File b) Indexed File
c) Hashed File d) B-tree File
Answer: d) B-tree File
70. Which sorting algorithm is based on the principle of comparing adjacent elements and swapping them if
they are in the wrong order, repeatedly until the entire array is sorted, but in a modified way to improve
performance?
a) Bubble Sort b) Merge Sort
c) Quick Sort d) Cocktail Shaker Sort Answer: d) Cocktail Shaker Sort
71. Which data structure is used to efficiently store a collection of key-value pairs with fast retrieval and
insertion operations based on the key?
a) Array b) Linked List
c) Hash Table d) Binary Search Tree
Answer: c) Hash Table
72. Which of the following is a non-linear data structure that represents a collection of elements in a
hierarchical order with a single root node and an ordering property?
a) Array b) Linked List
c) Queue d) Binary Search Tree
Answer: d) Binary Search Tree
73. Which file organization technique allows efficient access to records by using a hash function and a bucket
structure with overflow handling?
a) Sequential File b) Indexed File
c) Hashed File d) Extendible Hashing
Answer: c) Hashed File
74. Which sorting algorithm is based on the principle of repeatedly selecting the maximum (or minimum)
element from the unsorted part of the array and placing it at the end (or beginning) of the sorted part?
a) Bubble Sort b) Merge Sort
c) Quick Sort d) Insertion Sort
Answer: a) Bubble Sort
75. Which data structure is used to represent a collection of elements in a sorted order with efficient search,
insert, and delete operations, and supports dynamic resizing?
a) Array b) Linked List
c) Queue d) Balanced Search Tree
Answer: d) Balanced Search Tree
76. Which of the following is a non-linear data structure that represents a collection of elements in a
hierarchical order with multiple root nodes and an ordering property?
a) Array b) Linked List
c) Queue d) Forest of Binary Search Trees
Answer: d) Forest of Binary Search Trees
78. Which sorting algorithm is based on the principle of repeatedly partitioning the array into smaller parts
and sorting them individually using a pivot element, but with the use of additional space?
a) Bubble Sort b) Merge Sort
c) Quick Sort d) Bucket Sort
Answer: b) Merge Sort
79. Which data structure is used to implement a stack with efficient push, pop, and top operations?
a) Array b) Linked List
c) Stack d) Queue
Answer: c) Stack
80. Which searching algorithm is used to find a particular element in a binary search tree by traversing the
tree in a depth-first manner and comparing the element with the current node?
a) Linear Search b) Binary Search
c) Depth-First Search d) Breadth-First Search Answer: c) Depth-First Search
81. Which file organization technique provides efficient access to records by using a secondary index that is
smaller in size compared to the primary index?
a) Sequential File b) Indexed File
c) Hashed File d) Dense Index File
Answer: d) Dense Index File
82. Which sorting algorithm is based on the principle of dividing the input array into two subarrays, sorting
them recursively using a base case, and then combining them together?
a) Bubble Sort b) Merge Sort
c) Quick Sort d) Shell Sort
Answer: b) Merge Sort
83. Which data structure is used to implement a queue with efficient enqueue, dequeue, and peek
operations?
a) Array b) Linked List
c) Stack d) Queue
Answer: b) Linked List
84. Which searching algorithm is used to find the shortest path between two nodes in a graph with weighted
edges and no negative cycles?
a) Linear Search b) Binary Search
c) Dijkstra's Algorithm d) Bellman-Ford Algorithm
Answer: c) Dijkstra's Algorithm
85. Which file organization technique provides efficient access to records by using a multi-level index
structure with variable-sized nodes and supports range queries?
a) Sequential File b) Indexed File
c) Hashed File d) B+ Tree File
Answer: d) B+ Tree File
87. Which data structure is used to implement a priority queue with efficient insert, delete, and retrieve-min
operations?
a) Array b) Linked List
c) Stack d) Heap
Answer: d) Heap
88. Which searching algorithm is used to find a particular element in a binary search tree by traversing the
tree in a breadth-first manner and comparing the element with the current node?
a) Linear Search b) Binary Search
c) Depth-First Search d) Breadth-First Search
Answer: d) Breadth-First Search
89. Which file organization technique allows efficient access to records by using a hash function and a bucket
structure with dynamic overflow handling?
a) Sequential File b) Indexed File
c) Hashed File d) Extendible Hashing
Answer: c) Hashed File
90. Which sorting algorithm is based on the principle of dividing the input array into smaller subarrays,
sorting them individually using a base case, and then combining them together using an insertion-like
operation?
a) Bubble Sort b) Merge Sort
c) Quick Sort d) Tim Sort
Answer: d) Tim Sort
91. Which data structure is used to represent a collection of elements in a sorted order with efficient search,
insert, and delete operations, and supports dynamic resizing and fast random access?
a) Array b) Linked List
c) Queue d) Balanced Search Tree
Answer: a) Array
92. Which of the following is a non-linear data structure that represents a collection of elements in a
hierarchical order with multiple root nodes and an ordering property, but with additional constraints on
the maximum number of children per node?
a) Array b) Linked List
c) Queue d) B-tree
Answer: d) B-tree
93. Which file organization technique provides efficient access to records by using a multi-level index
structure with fixed-sized nodes and supports range queries?
a) Sequential File b) Indexed File
c) Hashed File d) B-tree File
Answer: d) B-tree File
95. Which data structure is used to efficiently store a collection of key-value pairs with fast retrieval,
insertion, and deletion operations based on the key, and supports ordered traversal of the keys?
a) Array b) Linked List
c) Hash Table d) Balanced Search Tree
Answer: d) Balanced Search Tree
96. Which of the following is a non-linear data structure that represents a collection of elements in a
hierarchical order with a single root node and an ordering property, but with additional constraints on the
maximum number of children per node?
a) Array b) Linked List
c) Queue d) K-ary Tree
Answer: d) K-ary Tree
97. Which file organization technique allows efficient access to records by using a balanced tree structure
with variable-sized nodes and supports efficient range queries?
a) Sequential File b) Indexed File
c) Hashed File d) B+ Tree File
Answer: d) B+ Tree File
98. Which sorting algorithm is based on the principle of dividing the input array into smaller subarrays,
sorting them individually using a base case, and then combining them together using an insertion-like
operation, but with the optimization of run-length encoding?
a) Bubble Sort b) Merge Sort
c) Quick Sort d) Timsort
Answer: d) Timsort
99. Which data structure is used to implement a stack with efficient push, pop, and top operations, and
supports dynamic resizing?
a) Array b) Linked List
c) Stack d) Dynamic Array
Answer: d) Dynamic Array
100. Which searching algorithm is used to find the shortest path between two nodes in a graph with weighted
edges, no negative cycles, and heuristic values?
a) Linear Search b) Binary Search
c) Dijkstra's Algorithm d) A* Algorithm
Answer: d) A* Algorithm
Operating System concepts refer to the fundamental principles and components of an operating system, which is a
software program that acts as an intermediary between computer hardware and software applications. The main
purpose of an operating system is to manage and coordinate the various resources and processes of a computer
system, providing an environment for efficient and reliable execution of programs.
Process Management: Involves creating, scheduling, and terminating processes, as well as managing their
communication, synchronization, and resource allocation.
Memory Management: Deals with allocating and managing the computer's memory, including processes'
memory requirements, virtual memory, and memory protection mechanisms.
File Systems: Organizes and manages the storage of files on secondary storage devices, providing functions
for file creation, deletion, manipulation, and access control.
Device Management: Handles the interaction between the operating system and peripheral devices, such as
input/output devices, storage devices, and network devices.
User Interface: Provides a means for users to interact with the computer system, including command-line
interfaces, graphical user interfaces (GUI), and other user-friendly interfaces.
Process Scheduling: Determines the order in which processes are executed, ensuring fairness, efficiency,
and responsiveness of the system.
Interprocess Communication (IPC): Facilitates communication and data sharing between different
processes, either through shared memory, message passing, or synchronization mechanisms.
File Protection and Security: Implements access control mechanisms to protect files and resources from
unauthorized access, ensuring data integrity and system security.
Multithreading: Enables concurrent execution of multiple threads within a single process, allowing for
better utilization of system resources and improved responsiveness.
Networking and Distributed Systems: Deals with networking protocols, communication between
distributed systems, and managing network resources.
Understanding these operating system concepts is crucial for computer scientists, system administrators,
and software developers as it provides a foundation for designing, developing, and maintaining efficient and
reliable computer systems.
OS - Operating System
CPU - Central Processing Unit
RAM - Random Access Memory
ROM - Read-Only Memory
HDD - Hard Disk Drive
SSD - Solid State Drive
GUI - Graphical User Interface
CLI - Command Line Interface
BIOS - Basic Input/Output System
API - Application Programming Interface
GUI - Graphical User Interface
CLI - Command Line Interface
GUI - Graphical User Interface
CLI - Command Line Interface
BIOS - Basic Input/Output System
API - Application Programming Interface
ACPI - Advanced Configuration and Power Interface
FAT - File Allocation Table
NTFS - New Technology File System
FAT32 - File Allocation Table 32-bit
GUI - Graphical User Interface
CLI - Command Line Interface
GUI - Graphical User Interface
CLI - Command Line Interface
BIOS - Basic Input/Output System
API - Application Programming Interface
ACPI - Advanced Configuration and Power Interface
FAT - File Allocation Table
NTFS - New Technology File System
FAT32 - File Allocation Table 32-bit
GUI - Graphical User Interface
CLI - Command Line Interface
GUI - Graphical User Interface
CLI - Command Line Interface
BIOS - Basic Input/Output System
API - Application Programming Interface
ACPI - Advanced Configuration and Power Interface
FAT - File Allocation Table
NTFS - New Technology File System
FAT32 - File Allocation Table 32-bit
4. To access the services of the operating system, the interface is provided by the ___________
a) Library b) System calls
c) Assembly instructions d) API
Answer: b
Explanation: To access services of the Operating System an interface is provided by the System Calls.
Generally, these are functions written in C and C++. Open, Close, Read, Write are some of most prominently
used system calls.
7. Which one of the following errors will be handle by the operating system?
a) lack of paper in printer b) connection failure in the network
c) power failure d) all of the mentioned
Answer: d
Explanation: All the mentioned errors are handled by OS. The OS is continuously monitoring all of its
resources. Also, the OS is constantly detecting and correcting errors.
9. If a process fails, most operating system write the error information to a ______
a) new file b) another running process
c) log file d) none of the mentioned
Answer: c
Explanation: If a process fails, most operating systems write the error information to a log file. Log file is
examined by the debugger, to find out what is the actual cause of that particular problem. Log file is useful
for system programmers for correcting errors.
10. Which one of the following is not a real time operating system?
a) RTLinux b) Palm OS
c) QNX d) VxWorks
Answer: b
Explanation: VxWorks, QNX & RTLinux are real-time operating systems. Palm OS is a mobile operating
system. Palm OS is developed for Personal Digital Assistants (PDAs).
13. In a timeshare operating system, when the time slot assigned to a process is completed, the process
switches from the current state to?
a) Suspended state b) Terminated state
c) Ready state d) Blocked state
Answer: c
Explanation: In a time-sharing operating system, when the time slot given to a process is completed, the
process goes from the running state to the Ready State. In a time-sharing operating system, unit time is
defined for sharing CPU, it is called a time quantum or time slice. If a process takes less than 1 time
quantum, then the process itself releases the CPU.
14. Cascading termination refers to the termination of all child processes if the parent process terminates
______
a) Normally or abnormally b) Abnormally
c) Normally d) None of the mentioned
Answer: a
Explanation: Cascading termination refers to the termination of all child processes if the parent process
terminates Normally or Abnormally. Some systems don’t allow child processes to exist if the parent process
has terminated. Cascading termination is normally initiated by the operating system.
15. When a process is in a “Blocked” state waiting for some I/O service. When the service is completed, it
goes to the __________
a) Terminated state b) Suspended state
c) Running state d) Ready state
Answer: d
Explanation: Suppose that a process is in “Blocked” state waiting for some I/O service. When the service is
completed, it goes to the ready state. Process never goes directly to the running state from the waiting
state. Only processes which are in ready state go to the running state whenever CPU allocated by operating
system.
17. The portion of the process scheduler in an operating system that dispatches processes is concerned with
________
a) assigning ready processes to waiting queue b) assigning running processes to blocked queue
c) assigning ready processes to CPU d) all of the mentioned
Answer: c
https://beltronvacancy.com/beltron-book/ Page 108
18. The FCFS algorithm is particularly troublesome for ____________
a) operating systems b) multiprocessor systems
c) time sharing systems d) multiprogramming systems
Answer: c
Explanation: In a time sharing system, each user needs to get a share of the CPU at regular intervals.
21. Swapping _______ be done when a process has pending I/O, or has to execute I/O operations only into
operating system buffers.
a) must never b) maybe
c) can d) must
Answer: a
24. The operating system and the other processes are protected from being modified by an already running
process because __________
a) every address generated by the CPU is being checked against the relocation and limit registers
b) they have a protection algorithm
c) they are in different memory spaces
d) they are in different logical addresses
Answer: a
27. For real time operating systems, interrupt latency should be ____________
a) zero b) minimal
c) maximum d) dependent on the scheduling
Answer: b
Explanation: Interrupt latency is the time duration between the generation of interrupt and execution of its
service.
43) When you delete a file in your computer, where does it go?
(a) Recycle bin (b) Hard disk
(c) Taskbar (d) None of these
Answer: (a) Recycle bin
Explanation: When you delete a file on your computer device, it is transferred to your computer system's
recycle bin or trash.
51. If a page number is not found in the translation lookaside buffer, then it is known as a?
(a) Translation Lookaside Buffer miss (b) Buffer miss
(c) Translation Lookaside Buffer hit (d) All of the mentioned
Answer: (a) Translation Lookaside Buffer miss
Explanation: A Translation Lookaside Buffer miss arises when the page table entry needed to translate a
virtual address to a physical address is not available in the translation lookaside buffer.
54. Which of the following operating systems does not support more than one program at a time?
(a) Linux (b) Windows
(c) MAC (d) DOS
https://beltronvacancy.com/beltron-book/ Page 113
Answer: (d) DOS
Explanation: DOS stands for Disk operating system. Disk operating system is a single-user operating system
that does not support more than one program at a time.
57. Where are placed the list of processes that are prepared to be executed and waiting?
(a) Job queue (b) Ready queue
(c) Execution queue (d) Process queue
Answer: (b) Ready queue
Explanation: The ready queue is a set of all the processes that processes are ready to execute and wait.
58. Who among the following can block the running process?
(a) Fork (b) Read
(c) Down (d) All of these
Answer: (d) All of these
59. Which of the following does not interrupt the running process?
(a) Timer interrupt (b) Device
(c) Power failure (d) Scheduler process
Answer: (b) Scheduler process
Explanation: Scheduler process does not interrupt in any running process. Its job is to select the processes
for long-term, short-term, and short-term scheduler.
63. Which of the following operating systems do you use for a client-server network?
(a) MAC (b) Linux
(c) Windows XP (d) Windows 2000
Answer: (d) Windows 2000
Explanation: Windows 2002 operating systems were used to implement a client Server Network. It is a
server OS that was developed by Microsoft in April 24, 2002. It includes some features of Windows XP.
64. Which command is used to fetch a group (.doc) of files that have just been deleted?
(a) Undelete (b) Undelete/all
(c) Undelete *.doc (d) All of above
Answer: (c) Undelete *.doc
Explanation: Undelete *.doc command is used to fetch a group (.doc) of files that have just been deleted.
66. Which program runs first after booting the computer and loading the GUI?
(a) Desktop Manager (b) File Manager
(c) Windows Explorer (d) Authentication
67. Which of the following keys does the user use to switch between applications running simultaneously in
the Windows operating system?
(a) FN + TAB (b) ALT + TAB
(c) CTRL + TAB (d) SHIFT + TAB
Answer: (b) ALT + TAB
Explanation: The user uses the Alt + Tab button to switch from one window to another in the Windows
operating system. Also, the user can use the Ctrl + Tab button to switch from tab to tab in internet explorer.
69. What type of memory stores data in a swap file on a hard drive?
(a) Secondary memory (b) Virtual memory
(c) Low memory (d) RAM
Answer: (b) Virtual memory
Explanation: A swap file is a type of file that stores the data retrieved from Read-Only-Memory (RAM) or
main memory. It is also a virtual memory because it is not stored in physical RAM.
70. Which of the following operating system does not require a command to run?
(a) Kali Linux (b) Windows
(c) Unix (d) All of the these
Answer: (b) Windows
Explanation: Windows is a GUI operating system. This operating system does not require a command to run.
Only one mouse is required to run this operating system.
A Database Management System (DBMS) is a software system that enables users to create, manipulate, and manage
databases. It provides an interface for interacting with databases and facilitates the storage, retrieval, modification,
and deletion of data.
The primary goal of a DBMS is to provide a structured and organized approach to storing and managing large
volumes of data efficiently. It offers a way to define and enforce data integrity, security, and consistency rules. A
DBMS also supports concurrent access to the database by multiple users or applications.
Data: Refers to the raw facts, figures, and statistics that are stored in a database.
Database: A collection of related data organized and structured in a particular way to facilitate efficient
storage, retrieval, and management.
Database Schema: A blueprint or logical structure that defines the organization, relationships, and
constraints of the data in a database.
Database Management System (DBMS): Software that provides an interface for managing databases,
including creating, modifying, and querying data.
Data Models: Abstract representations of how data is organized and structured in a database. Common data
models include the relational model, hierarchical model, network model, and object-oriented model.
Relational Database Management System (RDBMS): A type of DBMS that manages data using the relational
model, which organizes data into tables with rows and columns.
SQL (Structured Query Language): A standard language for managing relational databases. SQL allows users
to perform various operations such as querying, inserting, updating, and deleting data.
Database Administrator (DBA): An individual responsible for overseeing the design, implementation, and
maintenance of databases, as well as ensuring data integrity, security, and performance.
Data Integrity: Ensuring the accuracy, consistency, and validity of data stored in a database. This is achieved
through constraints, such as primary keys, foreign keys, and data validation rules.
Data Security: Measures taken to protect the confidentiality, integrity, and availability of data stored in a
database. This includes access control, encryption, backup, and recovery mechanisms.
Data Normalization: The process of organizing data in a database to minimize redundancy and improve data
integrity and efficiency.
Indexing: Creating data structures (indexes) to optimize the retrieval of data from a database, improving
query performance.
Transaction: A logical unit of work that consists of one or more database operations. Transactions ensure
the atomicity, consistency, isolation, and durability (ACID properties) of database operations.
Data Mining: The process of discovering patterns, relationships, and insights from large datasets using
various techniques and algorithms.
Here is a list of common full forms related to Database Management Systems (DBMS):
2. What is a database?
a) Organized collection of information that cannot be accessed, updated, and managed
b) Collection of data or information without organizing
c) Organized collection of data or information that can be accessed, updated, and managed
d) Organized collection of data that cannot be updated
Answer: c
Explanation: It is defined as an organized collection of data or information for easy access, updating, and
management in a computer.
3. What is DBMS?
a) DBMS is a collection of queries b) DBMS is a high-level language
c) DBMS is a programming language d) DBMS stores, modifies and retrieves data
Answer: d
Explanation: DBMS is nothing but a storehouse wherein the authorized user can create a database to store,
modify or retrieve the organized data in the table. It can be modified or retrieved by users who have access
to DBMS only.
6. In which of the following formats data is stored in the database management system?
a) Image b) Text
c) Table d) Graph
Answer: c
Explanation: The data is stored in a table format intended to manage the storage of data and manipulate
stored data to generate information.
https://beltronvacancy.com/beltron-book/ Page 120
7. Which of the following is not a type of database?
a) Hierarchical b) Network
c) Distributed d) Decentralized
Answer: d
Explanation: Different types are:
1) Centralized
2) Distributed
3) Relational
4) NoSQL
5) Cloud
6) Object-oriented
7) Hierarchical
8) Network
14. Which of the following is known as a set of entities of the same type that share same properties, or
attributes?
a) Relation set b) Tuples
c) Entity set d) Entity Relation model
Answer: c
Explanation: In the actual world, an entity is a distinct “thing” or “object” from all other objects. For
example: Each employee of an organization is an entity.
17. The values appearing in given attributes of any tuple in the referencing relation must likewise occur in
specified attributes of at least one tuple in the referenced relation, according to _____________________
integrity constraint.
a) Referential b) Primary
c) Referencing d) Specific
Answer: a
Explanation: Consider 2 relations r1 and r2. r1 may include among its attributes the primary key of relation
r2. This attribute is called a foreign key from r1, referencing r2. The relation r1 is also called the referencing
relation of the foreign key dependency, and r2 is called the referenced relation of the foreign key.
18. _____________ is a hardware component that is most important for the operation of a database
management system.
a) Microphone b) High speed, large capacity disk to store data
c) High-resolution video display d) Printer
Answer: b
Explanation: Since all the data are stored in form of memory in the disk, a high speed, and large-capacity
disk is required for the operation of the database management system.
19. The DBMS acts as an interface between ________________ and ________________ of an enterprise-class
system.
a) Data and the DBMS b) Application and SQL
c) Database application and the database d) The user and the software
Answer: c
Explanation: A database management system is an application that acts as an interface between the user
and the database. The user interacts with the application to access data.
20. The ability to query data, as well as insert, delete, and alter tuples, is offered by ____________
a) TCL (Transaction Control Language) b) DCL (Data Control Language)
c) DDL (Data Definition Langauge) d) DML (Data Manipulation Langauge)
Answer: d
Explanation: A query is a request for data or information. Relational Schema is the design and structure of
the relation. DDL consists of commands that help in modifying. DML performs the change in the values of
the relation.
21. ______________ is a set of one or more attributes taken collectively to uniquely identify a record.
a) Primary Key b) Foreign key
c) Super key d) Candidate key
Answer: c
23. Which of the following set should be associated with weak entity set for weak entity to be meaningful?
a) Neighbour set b) Strong entity set
c) Owner set d) Identifying set
Answer: d
Explanation: Every weak entity must be linked to an identifying entity; in other words, the existence of the
weak entity set is contingent on the presence of the identifying entity set. The weak entity set that the
identifying entity set identifies is said to be owned by the identifying entity set. Owner entity set is another
name for it.
24. Which of the following command is correct to delete the values in the relation teaches?
a) Delete from teaches; b) Delete from teaches where Id =’Null’;
c) Remove table teaches; d) Drop table teaches;
Answer: a
Explanation: To delete the entries from the table Delete from table command should be used.
27. Which forms have a relation that contains information about a single entity?
a) 4NF b) 2NF
c) 5NF d) 3NF
Answer: a
28. The top level of the hierarchy consists of ______ each of which can contain _____.
a) Schemas, Catalogs b) Schemas, Environment
c) Environment, Schemas d) Catalogs, Schemas
Answer: d
Explanation: Schemas represent the logical configuration of the DBMS. Catalogs consist of metadata of the
objects and system settings used.
29. _______ indicates the maximum number of entities that can be involved in a relationship.
a) Greater Entity Count b) Minimum cardinality
c) Maximum cardinality d) ERD
Answer: c
Explanation: The term cardinality refers to the uniqueness of data values included in a single column
(attribute) of a table in SQL (Structured Query Language).
30. The user IDs can be added or removed using which of the following fixed roles?
a) db_sysadmin b) db_accessadmin
c) db_securityadmin d) db_setupadmin
Answer: b
Explanation: Along with security, as the name suggests the db_accessadmin role also handles access.
db_sysadmin refers to the system administrator. db_securityadmin as the name suggests it involves granting
or declining permission to access the data ensuring security.
36. Which of the following is the best way to represent the attributes in a large db?
a) Dot representation b) Concatenation
c) Relational-and d) All of the mentioned
Answer: b
Explanation: Concatenation in DBMS is used to join two or more table fields of the same table or different
tables. Example inst sec and student sec.
37. Which of the following is the subset of SQL commands used to manipulate Oracle Structures, including t
ables?
a) Data Described Language b) Data Retrieval Language
c) Data Manipulation Language d) Data Definition Language
Answer: d
Explanation: DDLs are used to define schema and table characters and consist of commands that help in
modifying. DML performs the change in the values of the relation.
38. Which of the following functions construct histograms and use buckets for ranking?
a) Ntil() b) Newtil()
c) Rank() d) All of the mentioned
Answer: a
Explanation: ntile(n) returns the number of the bucket in which each tuple is stored, with bucket numbers
beginning with 1.
40. Which of the following key is required in to handle the data when the encryption is applied to the data so
that the unauthorised user cannot access the data?
a) Primary key b) Authorised key
c) Encryption key d) Decryption key
Answer: d
Explanation: The encryption key is used to encrypt the message. Even if the message is intercepted by an
enemy, the enemy will be unable to decrypt and interpret the message because he lacks the key.
41. Which of the following is known as the process of viewing cross-tab with a fixed value of one attribute?
a) Dicing b) Pivoting
c) Slicing d) Both Pivoting and Dicing
Answer: c
Explanation: Slice procedure takes one dimension from a cube and turns it into a new sub-cube. Dice takes
two or more dimensions from a cube and creates a new sub-cube from them.
42. For designing a normal RDBMS which of the following normal form is considered adequate?
a) 4NF b) 3NF
c) 2NF d) 5NF
Answer: b
Explanation: Because most 3NF tables are free of insertion, update, and deletion anomalies, an RDBMS
table is sometimes regarded as “normalized” if it is in the Third Normal Form.
43. Which of the following is popular for applications such as storage of log files in a database management
system since it offers the best write performance?
a) RAID level 0 b) RAID level 1
c) RAID level 2 d) RAID level 3
Answer: b
Explanation: RAID level 0 refers to data stripping. RAID level 1 refers to disk mirroring with block striping.
RAID level 2 refers to bit-level stripping and RAID level 3 refers to byte-level striping with dedicated parity.
46. What happens if a piece of data is stored in two places in the db?
a) Storage space is wasted & Changing the data in one spot will cause data inconsistency
b) In can be more easily accessed
c) Changing the data in one spot will cause data inconsistency
d) Storage space is wasted
Answer: a
Explanation: One of the main features of a database management system is minimum data duplication and
redundancy. Hence, is always consistent and so there is no duplication.
47. The logical design, and the snapshot of the data at a given instant in time is known as?
a) Instance & Relation b) Relation & Schema
c) Domain & Schema d) Schema & Instance
Answer: d
Explanation: Instance is an instance of time, the relation is also known as table consists of data with similar
characteristics, Domain is the collection of values that an attribute can contain and schema is a
representation.
48. Which of the following is generally used for performing tasks like creating the structure of the relations,
deleting relation?
(a) DML(Data Manipulation Language) (b) Query
(c) Relational Schema (d) DDL(Data Definition Language)
Answer: D
Explanation: The term "DDL" stands for Data Definition Language, used to perform all other essential tasks
such as deleting relation and related schemas in defining the structure relation.
49. Which of the following provides the ability to query information from the database and insert tuples into,
delete tuples from, and modify tuples in the database?
(a) DML(Data Manipulation Language) (b) DDL(Data Definition Language)
(c) Query (d) Relational Schema
Answer: A
Explanation: The term "DML" stands for the Data Manipulation Language used to perform the required
changes in the relation's values.
51. Which one of the following given statements possibly contains the error?
(select * from emp where empid = 10003;
select empid from emp where empid = 10006;
select empid from emp;
select empid where empid = 1009 and Lastname = 'GELLER';
Answer: D
Explanation: The Query given in option D does not contain the "from" clause, which specifies the relation
from which the values have to be selected or fetched. Therefore the correct answer is D.
54. In the following Query, which of the following can be placed in the Query's blank portion to display the
salary from highest to lowest amount, and sorting the employs name alphabetically?
SELECT *
FROM instructor
ORDER BY salary ____, name ___;
Ascending, Descending
Asc, Desc
Desc, Asc
All of the above
https://beltronvacancy.com/beltron-book/ Page 129
Answer: C
Explanation: To sort the salary from highest to lowest amount and display the employee's name
alphabetically, one can use the "Desc and Asc" in the above-given Query.
57. Which of the following can be considered as the maximum size that is supported by FAT?
(a) 8GB (b) 4GB
(c) 4TB (d) None of the above
Answer: B
Explanation: The files with a size of less than 4 GB or equal to 4GB are easily supported by the FAT. All files
with a size greater than the maximum size (or is 4Gb) are not supported by the FAT.
59. A huge collection of the information or data accumulated form several different sources is known as
________:
(a) Data Management (b) Data Mining
(c) Data Warehouse (d) Both B and C
Answer: C
Explanation: A huge collection of different types of data/information which collected from many different
sources stored in one place is called a data warehouse. It works just like the standard warehouse, which is
generally a type of holding area/building to store the different types of different goods in huge quantities
until they are further distributed. Therefore the correct answer is Data Warehouse.
https://beltronvacancy.com/beltron-book/ Page 130
60. Which one of the following refers to the "data about data"?
(a) Directory (b) Sub Data
(b) Warehouse (d) Meta Data
Answer: D
Explanation: The Mata Data refers to the type of data that describes the other data or information.
A general file or document is nothing more than a sequence of bytes that contains information like file
name, file size, and date & time when the document was created or modified.
67. Which of the following command is a type of Data Definition language command?
(a) Create (b) Update
(c) Delete (d) Merge
Answer: A
Explanation: The Data definition language is generally used to maintain or define the structure of the
database. For example, creating a table, drop table, alter table. In short, we can say that the command of
data definition languages is used to work on the table's schemas inside the database.
68. In a relation database, every tuples divided into the fields are known as the______.
(a) Queries (b) Domains
(c) Relations (d) All of the above
Answer: B
Explanation: In a database, the number of rows inside a table is known as tuples, and if we further divide
those tuples (or rows) into those fields, they become the domains. So the correct answer will be B.
70. In the relational table, which of the following can also be represented by the term "attribute"?
(a) Entity (b) Row
(c) Column (d) Both B &C
Answer: C
Explanation: In the database, the number of rows inside a table is called the tuples, and the numbers of
columns are known as the attributes. Therefore the correct answer is C.
https://beltronvacancy.com/beltron-book/ Page 132
71. Which of the following refers to the number of attributes in a relation?
(a) Degree (b) Row
(c) Column (d) All of the above
Answer: A
Explanation: The column inside the table is called the attribute, and the total number of attributes inside
the table is called the degree. So, here as we can see, degree refers to the number of attributes in a relation.
Therefore the correct answer is C.
73. Which one of the following refers to the total view of the database content?
(a) Conceptual view (b) Physical view
(c) Internal view (d) External view
Answer: A
Explanation: The conceptual view refers to the total view of the content available in the database.
Therefore the correct answer is A.
75. Which of the following is used in the application programs to request data from the database
management system?
(a) Data Manipulation language (b) Data Definition Language
(c) Data Control Language (d) All of the above
Answer: A
Explanation: To fetch data from the database management system, generally, the "select" statement is
used. Therefore, the Data Manipulation Language is used in the application programs while requesting the
data from the database management system.
76. Which one of the following command is used to delete the existing row in a table?
(a) Delete (b) Update
(c) Insert (d) None of the above
Answer: A
Explanation: To delete an existing row in a table the generally, the "delete" command is used. The "delete"
command is one of the commands that belong to the Data manipulation language.
78. Which one of the following commands is used for removing (or deleting) a relation forms the SQL
database?
(a) Delete (b) Drop
(c) Remove (d) All of the above
Answer: B
Explanation: To removing( or deleting) a relation, the "drop" command is used instead of delete because
here we are working on the objects of the database. So, to maintain the objects of a database, the Data
definition language is used. Therefore the "drop" command is used to delete a relation form a database
instead of using the "delete" command.
79. Which one of the following commands is used to restore the database to the last committed state?
(a) Savepoint (c) Rollback
(c) Commit (d) Both A & B
Answer: B
Explanation: As we all know that while working with the Transactions, the Transaction Control Language is
used. To restore the database to the last committed state ( or to undo the latest changes), the "rollback"
command is used that belongs to the Transaction Control Language.
80. Which of the following is the property of transaction that protects data from system failure?
(a) Atomicity (b) Isolation
(c) Durability (d) Consistency
Answer - C
Explanation : The property durability protects data from system failure.
Object-Oriented Technology is a programming paradigm that organizes software design around objects, which are
instances of classes that encapsulate data and behavior. It focuses on the concepts of abstraction, encapsulation,
inheritance, and polymorphism. Java is a popular programming language that incorporates object-oriented
principles and is widely used for developing various applications, including web, mobile, and enterprise systems.
Class: A blueprint or template that defines the attributes and behaviors of objects.
Object: An instance of a class that represents a real-world entity and has its own state and behavior.
Abstraction: The process of simplifying complex entities by representing only the essential features and
hiding unnecessary details.
Encapsulation: The bundling of data and methods within a class, where data is protected and accessed
through methods.
Inheritance: The mechanism by which a class inherits properties and behaviors from a parent class, allowing
for code reuse and hierarchy.
Polymorphism: The ability of an object to take on multiple forms or have different behaviors based on the
context, achieved through method overriding and method overloading.
Object-Oriented Analysis (OOA): The process of identifying and modeling the requirements of a system
using object-oriented techniques.
Object-Oriented Design (OOD): The process of designing the structure and relationships between objects
based on the analysis model.
Object-Oriented Programming (OOP): The practice of implementing software systems using object-oriented
principles, focusing on classes, objects, and interactions.
Association: A relationship between two classes that indicates a connection or dependency between their
objects.
Aggregation: A type of association that represents a whole-part relationship, where one class contains
instances of another class.
Composition: A stronger form of aggregation where the whole object controls the lifecycle of the part
object.
Polymorphism: The ability of an object to take on different forms or exhibit different behaviors based on its
context.
Method Overloading: Defining multiple methods with the same name but different parameters in a class.
Method Overriding: Providing a new implementation for a method in a subclass that is already defined in its
super class.
Object-Oriented: Java supports object-oriented programming with features like classes, objects,
inheritance, and polymorphism.
Platform-Independent: Java programs can run on any platform that has a Java Virtual Machine
(JVM) installed, ensuring portability.
Memory Management: Java handles memory management through automatic garbage collection,
relieving developers from manual memory management.
Exception Handling: Java provides robust exception handling mechanisms to handle runtime errors
and exceptions.
Multithreading: Java supports concurrent programming by allowing multiple threads of execution to
run simultaneously.
Standard Library: Java comes with a vast standard library that provides ready-to-use classes and
APIs for various functionalities.
Security: Java incorporates built-in security features to create secure applications, including
sandboxing and access control.
Networking: Java offers extensive networking capabilities, allowing developers to create networked
applications easily.
Rich Ecosystem: Java has a large and active developer community, with numerous frameworks,
libraries, and tools available for various application development needs.
Q: What is the difference between method overriding and method overloading in Java?
Ans: Method overriding involves providing a different implementation of a method in a subclass, while method
overloading involves defining multiple methods with the same name but different parameters within a class.
3. Which was the first purely object oriented programming language developed?
a) Kotlin b) SmallTalk
c) Java d) C++
Answer: b
Explanation: SmallTalk was the first programming language developed which was purely object oriented. It
was developed by Alan Kay. OOP concept came into the picture in 1970’s.
11. The feature by which one object can interact with another object is _____________
a) Message reading b) Message Passing
c) Data transfer d) Data Binding
Answer: b
Explanation: The interaction between two object is called the message passing feature. Data transfer is not
a feature of OOP. Also, message reading is not a feature of OOP.
12. Which among the following, for a pure OOP language, is true?
a) The language should follow at least 1 feature of OOP
b) The language must follow only 3 features of OOP
c) The language must follow all the rules of OOP
d) The language should follow 3 or more features of OOP
Answer: c
Explanation: The language must follow all the rules of OOP to be called a purely OOP language. Even if a
single OOP feature is not followed, then it’s known to be a partially OOP language.
13. How many types of access specifiers are provided in OOP (C++)?
a) 4 b) 3
c) 2 d) 1
Answer: b
Explanation: Only 3 types of access specifiers are available. Namely, private, protected and public. All these
three can be used according to the need of security of members.
14. In multilevel inheritance, which is the most significant feature of OOP used?
a) Code efficiency b) Code readability
c) Flexibility d) Code reusability
Answer: d
Explanation: The classes using multilevel inheritance will use the code in all the subsequent subclasses if
available. Hence the most significant feature among the options given is code reusability. This feature is
generally intended to use the data values and reuse the redundant functions.
20. In which access should a constructor be defined, so that object of the class can be created in any function?
a) Any access specifier will work b) Private
c) Public d) Protected
Answer: c
Explanation: Constructor function should be available to all the parts of program where the object is to be
created. Hence it is advised to define it in public access, so that any other function is able to create objects.
26. Which access specifier is usually used for data members of a class?
a) Protected b) Private
c) Public d) Default
Answer: b
Explanation: All the data members should be made private to ensure the highest security of data. In special
cases we can use public or protected access, but it is advised to keep the data members private always.
29. Which operator can be used to free the memory allocated for an object in C++?
a) Unallocate b) Free()
c) Collect d) delete
Answer: d
Explanation: The delete operator in C++ can be used to free the memory and resources held by an object.
The function can be called explicitly whenever required. In C++ memory management must be done by the
programmer. There is no automatic memory management in C++.
Q: What is Java?
Ans: Java is a high-level, general-purpose programming language developed by Sun Microsystems (now owned by
Oracle Corporation). It is designed to be platform-independent and can run on various devices and operating
systems.
Q: What are the access modifiers in Java, and what do they mean?
Ans: Java provides four access modifiers: public, protected, private, and default (no modifier). They control the
visibility and accessibility of classes, variables, and methods. Public allows unrestricted access, protected
allows access within the same package or subclass, private allows access only within the same class, and
default allows access within the same package.
3. Which component is used to compile, debug and execute the java programs?
a) JRE b) JIT
c) JDK d) JVM
Answer: c
Explanation: JDK is a core component of Java Environment and provides all the tools, executables and
binaries required to compile, debug and execute a Java Program.
Explanation: Operator ++ has more preference than *, thus g becomes 4 and when multiplied by 8 gives 32.
output:
$ javac increment.java
$ java increment
32
20. What will be the output of the following Java code snippet?
import java.util.*;
class Arraylists
{
public static void main(String args[])
{
ArrayLists obj = new ArrayLists();
obj.add("A");
obj.add("B");
obj.add("C");
obj.add(1, "D");
System.out.println(obj);
}
}
a) [A, D, C] b) [A, B, C]
c) [A, B, C, D] d) [A, D, B, C]
Answer: d
Explanation: obj is an object of class ArrayLists hence it is an dynamic array which can increase and decrease
its size. obj.add(“X”) adds to the array element X and obj.add(1,”X”) adds element x at index position 1 in
the list, Hence obj.add(1,”D”) stores D at index position 1 of obj and shifts the previous value stored at that
position by 1.
Output:
$ javac Arraylist.java
$ java Arraylist
[A, D, B, C].
21. Which of these packages contains the exception Stack Overflow in Java?
a) java.io b) java.system
c) java.lang d) java.util
Answer: c
29. Which operator is used to compare two values for equality in Java?
a) = b) ==
c) != d) ===
Answer: b) ==
75. Which of the following is a valid way to create a multi-line comment in Java?
a) /* comment */ b) // comment
c) <!-- comment --> d) /** comment */
Answer: a) /* comment */
91. Which of the following statements is true about method overloading in Java?
a) Two methods with the same name and different return types can be overloaded
b) Two methods with the same name and same return type but different parameter types can be
overloaded
c) Two methods with the same name and same parameter types but different return types can be
overloaded
d) Method overloading is not supported in Java
Answer: b) Two methods with the same name and same return type but different parameter types can be
overloaded
Linux is an open-source operating system kernel originally developed by Linus Torvalds in 1991. It is based on the
Unix operating system and is widely used in various computing devices, from personal computers to servers, mobile
devices, embedded systems, and even supercomputers.
The Linux kernel provides the core functionality of the operating system, including managing hardware devices,
memory, and processes. However, Linux itself is often referred to as a complete operating system, even though it is
technically just the kernel.
One of the defining characteristics of Linux is its open-source nature. This means that its source code is freely
available, allowing individuals and organizations to modify, distribute, and contribute to its development. The open-
source model fosters collaboration and innovation, as a vast community of developers worldwide can contribute
their expertise and improve the operating system.
Linux offers a wide range of features that contribute to its popularity and usefulness as an operating system. Here
are some key features of Linux:
Open-source: Linux is built on the open-source model, which means its source code is freely available to the
public. This allows developers to view, modify, and distribute the code, fostering collaboration and
innovation.
Stability and Reliability: Linux is known for its stability and reliability. It is designed to handle high workloads
and can run for extended periods without the need for a reboot. This makes it well-suited for servers and
critical systems where uptime is crucial.
Security: Linux has a strong focus on security. The open-source nature allows for thorough code review and
prompt fixing of vulnerabilities. Additionally, Linux provides robust security features, including user
permissions, file encryption, secure remote access protocols, and built-in firewall capabilities.
Multiuser and Multitasking: Linux supports multiple users simultaneously, allowing multiple individuals to
use the system at the same time. It also provides excellent multitasking capabilities, enabling efficient
execution of multiple processes simultaneously.
Hardware Support: Linux supports a wide range of hardware architectures, making it adaptable to different
computing devices. It has extensive driver support, enabling it to work with a variety of devices, from old
hardware to the latest components.
Scalability: Linux is highly scalable, meaning it can efficiently handle varying workloads and adapt to
changing demands. It can be deployed on both small-scale devices and large-scale systems, including
clusters and supercomputers.
Compatibility: Linux provides compatibility with various file systems, including popular ones like Ext4, Btrfs,
and XFS. It can also read and write files from other operating systems, such as Windows and macOS,
allowing for easy data exchange.
Package Management: Most Linux distributions come with package management systems that simplify
software installation, updates, and removal. These tools allow users to easily manage software packages and
resolve dependencies.
Extensive Software Ecosystem: Linux has a vast library of open-source software applications and utilities
available. Users have access to a wide range of productivity tools, development environments, multimedia
applications, and server software, many of which are free to use.
These features, along with the community-driven development model, have contributed to Linux's widespread
adoption and its use in various domains, including desktop computing, servers, embedded systems, and specialized
devices.
Here is a list of commonly used Linux commands with a brief explanation of each:
UNIX is a powerful, multi-user, multitasking operating system that was developed in the 1970s. It was designed to
provide a stable and reliable platform for running software applications on a wide range of hardware architectures.
UNIX is the foundation for many modern operating systems, including Linux and macOS.
Multiuser: UNIX supports multiple users simultaneously. Each user has their own account with a unique
username and password. Users can log in and work independently, with their own files, processes, and
permissions.
Multitasking: UNIX is capable of running multiple tasks or processes concurrently. It efficiently allocates
system resources, such as CPU time and memory, to different processes, allowing them to execute
simultaneously.
Hierarchical File System: UNIX organizes files and directories in a hierarchical structure, forming a tree-like
directory structure. This allows for easy organization and navigation of files and directories.
Command-Line Interface (CLI): UNIX primarily uses a command-line interface, where users interact with the
system by entering commands. The command-line interface provides powerful control and automation
capabilities, allowing users to perform complex tasks efficiently.
Shell: The UNIX shell is a command-line interpreter that allows users to interact with the operating system.
It interprets user commands and executes them by invoking the appropriate system programs. Popular UNIX
shells include Bourne shell (sh), C shell (csh), and Bourne Again shell (bash).
Portability: UNIX was designed to be highly portable, meaning it can run on different hardware
architectures with minimal modifications. This portability has contributed to the widespread adoption and
longevity of UNIX.
Networking Capabilities: UNIX has robust networking capabilities, allowing it to function as a server in a
networked environment. It supports various network protocols, such as TCP/IP, and provides tools for
networking tasks, including file sharing, remote login, and network administration.
Modularity and Extensibility: UNIX follows a modular design, where functionality is separated into small,
independent utilities that perform specific tasks. These utilities can be combined and piped together to
create complex workflows, providing flexibility and extensibility.
Security: UNIX has a strong focus on security. It provides various security mechanisms, such as user
permissions, file access controls, and authentication protocols, to protect system resources and user data.
Large Software Ecosystem: UNIX has a vast collection of software applications and tools available, both
proprietary and open source. This rich software ecosystem allows users to choose from a wide range of
software solutions for various purposes.
These commands are commonly used in UNIX-based operating systems, such as Linux and macOS. It's important
to note that there are variations and additional options for each command depending on the specific UNIX
variant or distribution. It's recommended to refer to the manual pages (man) for a more comprehensive
understanding of each command and its available options.
Design and Analysis of Algorithms is a field of study in computer science that focuses on the design, analysis, and
optimization of algorithms. It involves developing efficient algorithms to solve various computational problems and
analyzing their performance in terms of time complexity, space complexity, and other factors.
Here are some key concepts and components related to the Design and Analysis of Algorithms:
Algorithm Design: This involves the process of formulating a step-by-step approach to solving a problem. It
requires understanding the problem requirements, identifying possible solutions, and designing an
algorithm that can produce the desired output.
Algorithm Analysis: This refers to the evaluation of an algorithm's efficiency and performance
characteristics. It involves analyzing the algorithm's time complexity (how the running time grows with the
input size) and space complexity (how much memory is required).
Time Complexity: It measures the amount of time an algorithm takes to run as a function of the input size. It
helps in understanding how the algorithm's performance scales with larger inputs. Common time complexity
notations include O(1), O(n), O(log n), O(n^2), etc.
Space Complexity: It measures the amount of memory an algorithm requires as a function of the input size.
It helps in analyzing the algorithm's memory usage. Similar to time complexity, space complexity is also
expressed using big O notation.
Algorithm Paradigms: There are various algorithm design paradigms, such as Divide and Conquer, Greedy
Algorithms, Dynamic Programming, Backtracking, and more. Each paradigm provides a systematic approach
to problem-solving and offers different trade-offs in terms of efficiency and correctness.
Data Structures: Algorithms often operate on data structures like arrays, linked lists, stacks, queues, trees,
graphs, and hash tables. Choosing appropriate data structures is crucial in algorithm design to optimize
performance and enable efficient operations.
Algorithm Optimization: Once an algorithm is designed, there may be opportunities to optimize its
performance. Techniques like memoization, pruning, early termination, and heuristics can be applied to
improve efficiency and reduce unnecessary computations.
Complexity Analysis: This involves analyzing the worst-case, best-case, and average-case time and space
complexities of an algorithm. It helps in understanding the algorithm's behavior under different scenarios
and input distributions.
Algorithm Correctness: Ensuring that an algorithm produces the correct output for all valid inputs is
essential. Techniques like formal proofs, loop invariants, and mathematical induction are used to establish
algorithm correctness.
The study of Design and Analysis of Algorithms is crucial for understanding algorithmic efficiency and making
informed choices in algorithm design. It provides the foundation for developing efficient algorithms that can handle
large-scale computational problems effectively.
Here are some objective questions and answers about Design and Analysis of Algorithms for a competitive exam:
Question: What does the term "space complexity" refer to in algorithm analysis?
Answer: Space complexity refers to the amount of memory or space required by an algorithm as a function
of the input size. It helps in understanding the algorithm's memory usage and efficiency.
Question: What are the common data structures used in algorithm design?
Answer: Common data structures used in algorithm design include arrays, linked lists, stacks, queues, trees,
graphs, and hash tables. Choosing appropriate data structures is crucial for efficient algorithm
implementation.
Question: What is the difference between best-case, worst-case, and average-case time complexity?
Answer: Best-case time complexity refers to the minimum amount of time an algorithm takes for any input.
Worst-case time complexity refers to the maximum amount of time an algorithm takes for any
input. Average-case time complexity considers the expected time taken for a random distribution of
inputs.
These objective questions cover various aspects of Design and Analysis of Algorithms. Understanding these concepts
will provide a solid foundation for algorithmic problem-solving and preparation for a competitive exam.
1. Which of the following data structures is best suited for implementing a recursive algorithm?
a) Array b) Linked list
c) Stack d) Queue
Answer: c) Stack
Explanation: Recursion works on the principle of Last in First Out (LIFO), which is the same principle
followed by the Stack data structure.
4. Which of the following sorting algorithms has a worst-case time complexity of O(n^2)?
a) Merge Sort b) Heap Sort
c) Quick Sort d) Bubble Sort
Answer: d) Bubble Sort
Explanation: Bubble Sort is an inefficient sorting algorithm with a worst-case time complexity of O(n^2).
5. Which of the following algorithms is used to find the strongly connected components in a directed graph?
a) Kruskal’s algorithm b) Prim’s algorithm
c) Floyd-Warshall algorithm d) Kosaraju’s algorithm
Answer: d) Kosaraju’s algorithm
Explanation: Kosaraju’s algorithm is used to find the strongly connected components in a directed graph.
7. Which of the following algorithms is used to find the shortest path between two vertices in a graph?
a) Breadth First Search b) Depth First Search
c) Dijkstra’s shortest path algorithm d) Bellman-Ford algorithm
Answer: c) Dijkstra’s shortest path algorithm
Explanation: Dijkstra’s algorithm is used to find the shortest path between two vertices in a graph.
8. Which of the following data structures is best suited for implementing a hash table?
a) Array b) Linked list
c) Stack d) Queue
Answer: a) Array
Explanation: Hash tables are implemented using arrays.
9. Which of the following algorithms is used to find the minimum spanning tree of a weighted graph?
a) Kruskal’s algorithm b) Prim’s algorithm
c) Floyd-Warshall algorithm d) Bellman-Ford algorithm
Answer: a) Kruskal’s algorithm or b) Prim’s algorithm
Explanation: Kruskal’s algorithm and Prim’s algorithm are both used to find the minimum spanning tree of a
weighted graph. Kruskal’s algorithm works by selecting the edges with the lowest weight until all vertices
are connected, while Prim’s algorithm starts with a single vertex and adds the minimum weight edges that
connect it to other vertices until all vertices are connected.
10. Which of the following algorithms is used to find the articulation points in a graph?
a) Bellman-Ford algorithm b) Floyd-Warshall algorithm
c) Depth First Search d) Kruskal’s algorithm
Answer: c) Depth First Search
Explanation: Depth First Search is used to find the articulation points in a graph.
11. Which of the following algorithms is used to find the shortest path between all pairs of vertices in a
graph?
a) Breadth First Search b) Depth First Search
c) Dijkstra’s shortest path algorithm d) Floyd-Warshall algorithm
Answer: d) Floyd-Warshall algorithm
Explanation: Floyd-Warshall algorithm is used to find the shortest path between all pairs of vertices in a
graph.
12. Which of the following algorithms is used to find the longest increasing subsequence in a sequence?
a) Merge Sort b) Heap Sort
c) Quick Sort d) Dynamic Programming
Answer: d) Dynamic Programming
https://beltronvacancy.com/beltron-book/ Page 169
Explanation: The longest increasing subsequence problem can be solved using dynamic programming.
13. Which of the following data structures is best suited for implementing a breadth-first search algorithm?
a) Array b) Linked list
c) Stack d) Queue
Answer: d) Queue
Explanation: Breadth-first search uses a queue data structure to traverse a graph.
14. Which of the following algorithms is used to find the diameter of a tree?
a) Breadth First Search b) Depth First Search
c) Dijkstra’s shortest path algorithm d) Kruskal’s algorithm
Answer: b) Depth First Search
Explanation: Depth First Search is used to find the diameter of a tree.
15. Which of the following algorithms is used to find the longest path in a directed acyclic graph?
a) Breadth First Search b) Depth First Search
c) Dijkstra’s shortest path algorithm d) Bellman-Ford algorithm
Answer: b) Depth First Search
Explanation: Depth First Search is used to find the longest path in a directed acyclic graph.
16. Which of the following algorithms is used to find the minimum number of coins needed to make change
for a given amount?
a) Greedy algorithm b) Depth First Search
c) Breadth First Search d) Dijkstra’s shortest path algorithm
Answer: a) Greedy algorithm
Explanation: The minimum coin change problem can be solved using a greedy algorithm.
17. Which of the following algorithms is used to find the kth largest element in an unsorted array?
a) Quick Sort b) Merge Sort
c) Heap Sort d) Selection algorithm
Answer: d) Selection algorithm
Explanation: The selection algorithm can be used to find the kth largest element in an unsorted array.
18. Which of the following algorithms is used to find the longest common subsequence between two
sequences?
a) Merge Sort b) Heap Sort
c) Quick Sort d) Dynamic Programming
19. Which of the following algorithms is used to find the minimum vertex cover in a graph?
a) Dijkstra’s algorithm b) Bellman-Ford algorithm
c) Depth First Search d) Hungarian algorithm
Answer: d) Hungarian algorithm
Explanation: Hungarian algorithm is used to find the minimum vertex cover in a graph.
21. The two primitive operations of the function Fact(x) are ___ and ___.
a. Indexing an array, comparing two numbers
b. To check if the value of x is 1, To multiply x and Fact(x-1)
c. To check if the value of x is 1, To multiply x
d. To multiply x and Fact(x-1), Compare two numbers
Answer : b) To check if the value of x is 1, To multiply x and Fact(x-1)
22. The two main conditions for theta notation are ___ and___.
a. f(n)=O(g(n)), f(n)≠Θ(g(n)) b. f(n)>O(g(n)), f(n)=Θ(g(n))
c. f(n)≠O(g(n)), f(n)≥Θ(g(n)) d. f(n)>O(g(n)), f(n)>Θ(g(n))
Answer: a) f(n)=O(g(n)), f(n)≠Θ(g(n))
23. Which of the following is used to analyze the efficiency of an algorithm?
a) Time complexity b) Space complexity
c) Both a) and b) d) None of the above
Answer: c) Both a) and b)
25. Which algorithm design paradigm focuses on dividing a problem into smaller subproblems and solving
them independently?
a) Divide and Conquer b) Greedy Algorithms
c) Dynamic Programming d) Backtracking
Answer: a) Divide and Conquer
26. Which data structure is best suited for implementing a Last-In-First-Out (LIFO) mechanism?
a) Queue b) Stack
c) Linked List d) Tree
Answer: b) Stack
28. Which complexity class includes problems that are believed to be inherently difficult to solve efficiently?
a) P b) NP
c) NP-complete d) Both b) and c)
Answer: d) Both b) and c) (NP and NP-complete)
https://beltronvacancy.com/beltron-book/ Page 171
29. Which technique is used to prove the correctness of an algorithm?
a) Loop invariants b) Mathematical induction
c) Formal proofs d) All of the above
Answer: d) All of the above
30. Which algorithmic paradigm makes locally optimal choices at each step to find a global optimum?
a) Divide and Conquer b) Greedy Algorithms
c) Dynamic Programming d) Backtracking
Answer: b) Greedy Algorithms
The Internet is a global system of interconnected computer networks that use the standard Internet
protocol suite (TCP/IP) to link several billion devices worldwide.
It is a network of networks that consists of millions of private, public, academic, business, and
government networks, of local to global scope, that are linked by a broad array of electronic, wireless,
and optical networking technologies
ARPANET adopted TCP / IP in 1983, and from there researchers began to assemble the “network of
network” that become the modern Internet.
The World Wide Web (WWW or W3) is a system of interlinked hypertext documents that are accessed
via the Internet
A Website is a set of related web pages served from a single web domain.
A Home Page, Index Page, or Main Page is a page on a website. A home page usually refers to:
• The initial or main web page of a website, sometimes called the "front page" (by analogy with
newspapers).
• The first page that appears upon opening a web browser program, which is also sometimes called the
Start page.
A Hyperlink is a reference to data that the reader can directly follow either by clicking or by hovering or
that is followed automatically.
A Web Browser (commonly referred to as a browser) is a Application Software for retrieving, presenting
and traversing information resources on the World Wide Web Some of the famous browsers are (Safari
(Apple), Google Chrome, Firefox, Internet Explorer, UC Browser (China), Opera, Microsoft Edge, Baidu
(China)
A Search Engine is a web-based tool that enables users to locate information on the World Wide Web.
Popular examples of search engines are Google, Yahoo, Bing (Made by Microsoft), AOI, Ask.com, Baidu,
Duck Duck GO.
Domain names are used to identify one or more IP Address
Simplex :- This, communication is Unidirectional i.e. one of the two devices can transmit the data and
the other can only receive the data. For e.g. Radio broadcasting, television broadcasting etc.
Half Duplex: - This communication is Bidirectional. Either of the devices can act as transmitter or receiver
but only one device can transmit the data at one time. For e.g. Walkie- Talkie.
Full Duplex: - Here the communication is in both direction and both the devices can simultaneously
transmit the data. For e.g. Telephone conversation.
The Open Systems Interconnection model (OSI) is a conceptual model that characterizes and
standardizes the internal functions of a communication system by partitioning it into abstraction layers.
The model is a product of the Open Systems Interconnection project at the Data Communication
Simplex: Half duplex: Full Duplex: Open Systems Interconnection model (OSI) International Organization
for Standardization (ISO).
Network Topology is the arrangement of the elements (links, nodes etc.) of a communication network. Network
topology can be used to define or describe the arrangement of various types of telecommunication networks,
including command and control radio networks, industrial field busses and computer networks.
Network Topology is the topological structure of a network and may be depicted physically or logically. It is an
application of graph theory wherein communicating devices are modeled as nodes and the connections
between the devices are modeled as links or lines between the nodes
Star Topology - All the computers are connected to a single hub through a cable. This hub is the central node
and all others nodes are connected to the central node.
Ring Topology - Each computer is connected to another computer, with the last one connected to the first.
Mesh Topology - It is a point-to-point connection to other nodes or devices. All the network nodes are
connected to each other
Hybrid Topology - A network structure whose design contains more than one topology is said to be hybrid
topology. Hybrid topology inherits merits and demerits of all the incorporating topologies.
Computer Graphics and Multimedia are two closely related fields that involve the creation, manipulation, and
presentation of visual and audio content using computer technology. While Computer Graphics focuses on the
generation and rendering of visual elements, Multimedia encompasses the integration of various media types,
including graphics, audio, video, and interactive elements.
Computer Graphics:
Computer Graphics deals with the creation, manipulation, and rendering of visual content using computer
algorithms and hardware. It involves techniques for generating and representing images, animations, and 3D
models. Computer Graphics is widely used in various domains, including entertainment, gaming, virtual reality,
computer-aided design (CAD), scientific visualization, and user interfaces.
Rendering: Rendering refers to the process of generating 2D or 3D images from a scene description. It
involves techniques such as rasterization, ray tracing, and shading to simulate lighting, materials, and other
visual effects.
Modeling: Modeling is the process of creating 3D objects or scenes using mathematical representations.
Techniques like polygonal modeling, spline-based modeling, and procedural modeling are used to create
realistic or stylized objects.
Animation: Animation involves creating a sequence of images or frames that give the illusion of motion. It
includes techniques like keyframing, interpolation, skeletal animation, and particle systems.
Rendering Techniques: Computer Graphics employs various rendering techniques, including raster graphics,
vector graphics, and ray tracing. These techniques determine how graphics primitives such as points, lines,
and polygons are rendered on the screen.
Graphics Programming: Computer Graphics programming involves writing code to create and manipulate
visual content. Popular graphics APIs (Application Programming Interfaces) such as OpenGL and DirectX
provide a set of functions and tools to interact with graphics hardware and generate graphics output.
Multimedia:
Multimedia combines different forms of media, including text, images, audio, video, and interactive elements, to
create interactive and immersive experiences. It focuses on integrating these media types to convey information,
entertain, educate, or communicate ideas effectively.
Interactive Multimedia: Interactive multimedia allows users to interact with the content, providing a
dynamic and engaging experience. It includes user interfaces, interactive games, virtual reality, and
augmented reality applications.
Multimedia Formats and Standards: Multimedia content is typically stored and encoded in various formats,
such as JPEG for images, MP3 for audio, MPEG for video, and HTML5 for web-based multimedia. Standards
like SVG (Scalable Vector Graphics) and HTML5 provide specifications for multimedia content on the web.
Multimedia Authoring Tools: Multimedia authoring tools facilitate the creation and editing of multimedia
content. These tools provide features for media integration, synchronization, and interactivity, allowing non-
programmers to create multimedia presentations.
CG - Computer Graphics
3D - Three-Dimensional
2D - Two-Dimensional
CAD - Computer-Aided Design
GPU - Graphics Processing Unit
API - Application Programming Interface
GUI - Graphical User Interface
SVG - Scalable Vector Graphics
VR - Virtual Reality
AR - Augmented Reality
MPEG - Moving Picture Experts Group
JPEG - Joint Photographic Experts Group
GIF - Graphics Interchange Format
HTML5 - Hypertext Markup Language version 5
CSS - Cascading Style Sheets
UI - User Interface
UX - User Experience
HCI - Human-Computer Interaction
DRM - Digital Rights Management
FPS - Frames Per Second
2. Among the given scientists/inventor who is known as the father of Computer Graphics?
a) Nikola Tesla b) Ivan Sutherland
c) Ada Lovelace d) Marie Curie
Answer: b
Explanation: Ivan Sutherland is considered the father of Computer Graphics. He is the inventor of an
interactive graphics system called sketchpad in 1963.
9. In a graphical system, an array of pixels in the picture are stored in which of the following locations?
a) Frame buffer b) Processor
c) Memory d) All of the mentioned
Answer: c
Explanation: The main purpose of using a framer buffer is to store pixels.
10. Curves in computer graphics is primarily used for which of the following function?
a) To draw different types of objects onto the screen
b) Zooming out a picture
c) Copying a picture
d) Zooming in a picture
Answer: a
Explanation: We frequently need to draw several types of things onto the screen in computer graphics.
Objects are not always flat, and we must draw curves many times in order to draw an object.
13. Which of the following devices provides positional information to the graphics system?
a) Pointing devices b) Both Input devices and Pointing devices
c) Output devices d) Input devices
Answer: b
Explanation: Input devices provide positional information to the system they are often called pointing
devices.
14. Which of the following is defined as the number of pixels stored in the frame buffer of a graphics system?
a) Resolution b) Resolution
c) Depth d) None of the mentioned
Answer: d
16. Which of the following is used in graphics workstations as input devices to accept voice commands?
a) Speech recognizers b) Touch panels
c) None of the mentioned d) All of the mentioned
Answer: a
Explanation: Speech recognizers allow users to issue voice commands.
18. Which of the following is defined as the process of elimination of parts of a scene outside a window or a
viewport?
a) editing b) cutting
c) plucking d) clipping
Answer: d
Explanation: Clipping is the process of removing excess content from a project. Clipping is a way of
selectively enabling or disabling rendering activities within a defined region of interest in computer graphics.
19. Which of the following is known as the window opened on the raster graphics screen in which the image
will be displayed?
a) Interface window b) World window
c) World co-ordinate system d) Screen co-ordinate system
Answer: a
Explanation: In layman’s terms, it’s referred to as a graphical user interface (GUI). Users can interact with
electronic equipment by using graphical icons and visual indicators like secondary notation.
20. Which of the following operations can be used to zoom in or out around any axis on a three-dimensional
object from its original position?
a) Rotation b) Shearing
c) Scaling d) Translation
Answer: c
Explanation: Scaling is the process of changing or modifying the size of objects in computer graphics. The
object’s size can be increased or decreased via scaling.
21. Among the following process, which process is known as the elimination of parts of a scene outside a
window or a viewport?
a) editing b) plucking
c) cutting d) clipping
Answer: d
Explanation: Clipping is the process of removing excess content from a project. Clipping is a way of
selectively enabling or disabling rendering activities within a defined region of interest in computer graphics.
23. Which of the following is defined as the drawing of number of copies of the same image in rows and
columns across the interface window so that they cover the entire window?
a) Zooming b) Panning
c) Tiling d) Roaming
Answer: c
Explanation: ‘Tilling’ is the process of drawing several copies of the same image in rows and columns across
the interface window until the entire window is covered. In computer graphics, the window remains static
while the viewpoint is modified multiple times to accomplish tiling.
25. Which of the following is the most commonly used boundary representation for a 3-dimensional graphics
object?
a) Volume polygon b) System polygon
c) Data polygon d) Surface polygon
Answer: d
Explanation: The most common border representation for a 3-D graphics item is a surface polygon. This
surface polygon encloses the object’s inside. A set of polygons is maintained for a description of the object
in this way of representation.
26. Which of the following is the process of digitizing a given picture definition into a set of pixel-intensity for
storage in the frame buffer?
a) Scan conversion b) True color system
c) Encoding d) Rasterization
Answer: a
Explanation: The digitization of a picture definition into a collection of pixel-intensity for storage in the
frame buffer process is called scan conversion.
27. Which of the following is commonly known as frame buffer on a black and white system with one bit per
pixel?
a) Bitmap b) Pix map
c) Multi map d) All of the mentioned
Answer: a
Explanation: The bit map frame buffer is always 1 bit per pixel.
28. Which of the following algorithm is a faster method for calculating pixel positions?
a) Parallel line algorithm b) Mid-point algorithm
c) DDA line algorithm d) Bresenham’s line algorithm
Answer: c
Explanation: The fastest method DDA for calculating pixel positions is a faster method.
33. The Cohen-Sutherland algorithm divides the region into how many spaces?
a) 9 b) 8
c) 7 d) 6
Answer: a
Explanation: The Cohen-Sutherland algorithm divides a two-dimensional space into 9 areas before
determining the visible lines and sections of lines. The sections of interest are seen in the central region.
34. The Cohen Sutherland algorithm is more efficient than the Liang-Barsky algorithm.
a) False b) True
Answer: a
Explanation: Because the Liang–Barsky clipping technique performs as much testing as feasible before
computing line crossings, it is significantly more efficient than other algorithms.
35. Which of the following is used for 3D positioning and modeling, animation, and other application?
a) Spac ball b) Trackball
c) Space ball d) All of the mentioned
Answer: c
Explanation: A space ball is a 3D positioning device.
36. Which of the following can be used to determine the position on the data tablet?
a) Either Signal strength or coded pulse b) Coded pulse
c) Signal strength d) Strip microphones
Answer: a
Explanation: Either Signal strength or coded pulse determines the position on the data tablet.
38. Which of the following type of perspective projection is used in drawings of railway lines?
a) Three-point b) Two-point
c) One-point d) Perspective projection is not used to draw railway lines
Answer: c
Explanation: The One Point projection is commonly used to depict highways, railroad tracks, and buildings.
Only one vanishing point on the horizon line is present in a One-Point perspective, which aids in the creation
of railway tracks.
Join Telegram
Beltron Vacancy
REGISTRATION NUMBER : CANDIDATE NAME
EXAM DATE : 28-October-2018 EXAM START TIME : 10:00:00
EXAM NAME : BELTRON PROGRAMMER EXAM DURATION : 02:00 Hrs
TOTAL MARKS : 100 TOTAL NO OF QUESTIONS : 100
Candidate Answer: 1 ⊕ 1 ⊕ 1 = 1
QID : 2 - Which of the following gates are known as universal gates in Boolean algebra?
Options:
1) NOR, AND
2) NAND, NOR
3) OR, AND
4) NAND, OR
Correct Answer: NAND, NOR
Candidate Answer: In the graph, all its vertices have the same degree
1 of 17 11/21/2018, 4:11 PM
BELTRON PROGRAMMER
QID : 9 - Which of the following are the three phases of communication via circuit switching?
Options:
1) Circuit establishment, Data compression, Circuit disconnect
2) Circuit establishment, Data transfer, Circuit disconnect
3) Data transfer, Data compression, Circuit disconnect
4) Circuit establishment, Switching, Data transfer
Correct Answer: Circuit establishment, Data transfer, Circuit disconnect
QID : 11 -
Options:
1) 1000
2) 7
3) 6
4) 5
Correct Answer: 6
Candidate Answer: 7
2 of 17 11/21/2018, 4:11 PM
BELTRON PROGRAMMER
QID : 12 -
Options:
1) 526
2) 625
3) 52.6
4) 0
Correct Answer: 625
QID : 13 - According to the Standard C specification, what are the respective minimum sizes (in bytes) of the following three data types: short, int and long?
Options:
1) 1, 2, 2
2) 1, 2, 4
3) 1, 2, 8
4) 2, 2, 4
Correct Answer: 2, 2, 4
Candidate Answer: 1, 2, 4
Candidate Answer: 11
3 of 17 11/21/2018, 4:11 PM
BELTRON PROGRAMMER
QID : 15 -
Options:
1) 512
2) 215
3) 8
4) 0
Correct Answer: 8
QID : 16 -
Options:
1) 14
2) 1100
3) 21
4) 110
Correct Answer: 1100
4 of 17 11/21/2018, 4:11 PM
BELTRON PROGRAMMER
Options:
1) go_cart
2) go4it
3) _what
4) 4reason
Correct Answer: 4reason
QID : 18 -
Options:
1) 12
2) 14
3) 16
4) 10
Correct Answer: 14
Candidate Answer: 14
QID : 20 - Which one of the following statements allocates enough space to hold an array of 10 integers that are initialized to 0?
Options:
1) int *ptr = (int *) malloc(10, sizeof(int));
2) int *ptr = (int *) calloc(10, sizeof(int));
3) int *ptr = (int *) malloc(10*sizeof(int));
4) int *ptr = (int *) alloc(10*sizeof(int));
Correct Answer: int *ptr = (int *) calloc(10, sizeof(int));
QID : 21 - ______ is usually used by assembly language programmers to remember the operations of a machine.
Options:
1) Mnemonics
2) Hex code
3) ASCII code
4) No option is correct
Correct Answer: Mnemonics
5 of 17 11/21/2018, 4:11 PM
BELTRON PROGRAMMER
Options:
1) Reduced Intergraded Set Computer
2) Resource Instruction Set Computer
3) Reduced Instruction Set Computer
4) Resource Instruction System Computer
Correct Answer: Reduced Instruction Set Computer
QID : 23 - Which one of the following is not considered in a software life cycle model?
Options:
1) Spiral model
2) Prototyping model
3) Capability maturity model
4) Waterfall model
Correct Answer: Capability maturity model
QID : 24 - Which one of the following step(s) is/are followed by system design?
Options:
1) Specification of system output
2) Development of system flowchart
3) Development of program specifications
4) All options are correct
Correct Answer: All options are correct
QID : 29 - Which of the following sorting is not suitable for large data sets?
Options:
1) Heap sort
2) Merge sort
3) Quick sort
4) Bubble sort
Correct Answer: Bubble sort
QID : 30 - Which one is a technique to convert a range of key values into a range of indexes of an array?
6 of 17 11/21/2018, 4:11 PM
BELTRON PROGRAMMER
Options:
1) Heap
2) Radix
3) Hashing
4) Bucket sort
Correct Answer: Hashing
QID : 31 - What is the number of trees in the forest for the given nodes {0, 1}, {0, 2}, {3, 4}?
Options:
1) 2
2) 3
3) 4
4) None of these
Correct Answer: 2
Candidate Answer: 2
QID : 34 - Which of the following key(s) is/are used in tables for Database design?
Options:
1) Candidate key
2) Primary key
3) Foreign key
4) All options are correct
Correct Answer: All options are correct
QID : 36 - In a relational database, a data structure that organizes the information about a single topic into rows and columns, is called ______.
Options:
1) block
2) record
3) tuple
4) table
Correct Answer: table
QID : 37 - DBMS is comprised of tables that made up of rows called ______ and columns called ______.
Options:
1) fields, records
2) records, fields
3) address, fields
4) records, ranges
Correct Answer: records, fields
7 of 17 11/21/2018, 4:11 PM
BELTRON PROGRAMMER
Options:
1) Deletion
2) Insertion
3) Sorting
4) Updating
Correct Answer: Sorting
QID : 45 - Which type of DBMS distributes data processing tasks between the workstation and network server?
Options:
1) Client server
2) Network
3) Relational
4) Hierarchical
Correct Answer: Client server
8 of 17 11/21/2018, 4:11 PM
BELTRON PROGRAMMER
Options:
1) WHERE clause
2) GROUP BY clause
3) FROM clause
4) HAVING clause
Correct Answer: HAVING clause
QID : 48 -
Options:
1) TRUE
2) FALSE
3) 1
4) Compilation error
Correct Answer: FALSE
9 of 17 11/21/2018, 4:11 PM
BELTRON PROGRAMMER
QID : 49 -
Options:
1) 0
2) 2
3) Runtime error
4) Compilation error
Correct Answer: 2
QID : 51 -
Options:
1) abc
2) abcd
3) bcd
4) bd
Correct Answer: bcd
Candidate Answer: bd
10 of 17 11/21/2018, 4:11 PM
BELTRON PROGRAMMER
QID : 52 -
Options:
1) 6 4 6 9
2) 5 4 5 9
3) 7 8 8 9
4) 4 3 6 9
Correct Answer: 6 4 6 9
Candidate Answer: 7 8 8 9
QID : 53 - Which part of code gets executed whether exception is caught or not?
Options:
1) finally
2) try
3) catch
4) throw
Correct Answer: finally
QID : 55 - Which of these keywords are used for generating an exception manually?
Options:
1) try
2) catch
3) throw
4) check
Correct Answer: throw
QID : 56 - Which of these method is used to explicitly set the priority of a thread?
Options:
1) set()
2) make()
3) setPriority()
4) makePriority()
Correct Answer: setPriority()
11 of 17 11/21/2018, 4:11 PM
BELTRON PROGRAMMER
QID : 57 -
Options:
1) True true
2) True false
3) False true
4) False false
Correct Answer: False true
QID : 59 - Which of these method of Thread class is used to Suspend a thread for a period of time?
Options:
1) sleep()
2) terminate()
3) suspend()
4) stop()
Correct Answer: sleep()
Candidate Answer: It’s a process in which many different process are able to access same information.
12 of 17 11/21/2018, 4:11 PM
BELTRON PROGRAMMER
Options:
1) Union Method Language
2) Unified Modeling Language
3) Unified Method Language
4) Union Member Language
Correct Answer: Unified Modeling Language
QID : 65 - Which one of the following is not the Software development cycle phase?
Options:
1) Analysis
2) Coding
3) Testing
4) Abstraction
Correct Answer: Abstraction
QID : 71 - ‘Integration & test’ phase of ‘Bath tub curve’ is related to ______.
13 of 17 11/21/2018, 4:11 PM
BELTRON PROGRAMMER
Options:
1) Hardware reliability
2) Software reliability
3) Both Hardware reliability and Software reliability
4) No option is correct
Correct Answer: Software reliability
QID : 76 - Each level in Capability Maturing Model is defined into KPA which is ______.
Options:
1) Key Product Area
2) Key Process Area
3) Key Parallel Area
4) Key Predefine Area
Correct Answer: Key Process Area
QID : 77 - Which of the following document is/are needed before the testing starts?
Options:
1) SRS document
2) Test case document
3) Test summary document
4) All options are correct
Correct Answer: SRS document
14 of 17 11/21/2018, 4:11 PM
BELTRON PROGRAMMER
Options:
1) Maximum Time To Failure
2) Mean Time to Failure
3) Minimum Time to Failure
4) Measured Time To Failure
Correct Answer: Mean Time to Failure
QID : 80 - Which is automatically executed by the processor when turning on the computer?
Options:
1) Relating loader
2) Bootstrap loader
3) Boot loader
4) Compile and Go loader
Correct Answer: Bootstrap loader
QID : 86 - ______ is used by the operating system to manage files on hard drives and other computer system.
Options:
1) File Application Table
2) First Allocation Table
3) File Allocation Table
4) First Application Table
Correct Answer: File Allocation Table
QID : 87 - A problem where a set of blocked processes each holding a resource and waiting to acquire a resource held by another process in the set?
15 of 17 11/21/2018, 4:11 PM
BELTRON PROGRAMMER
Options:
1) Dead lock
2) Semaphore
3) Belady’s anomaly
4) No option is correct
Correct Answer: Dead lock
QID : 88 - Which of the following technique is used to speed up communication with slow devices?
Options:
1) Segmentation
2) Caching
3) Fragmentation
4) All options are correct
Correct Answer: Caching
QID : 89 - Which scheduling determines the new processes that are admitted to the system?
Options:
1) Short term scheduling
2) Medium term scheduling
3) Long term scheduling
4) Only Short term scheduling and Long term scheduling
Correct Answer: Long term scheduling
QID : 93 - Which of the following strategies cannot used to remove deadlock after its occurrence?
Options:
1) Kill one or more processes
2) Rollback
3) Preemption
4) Mutual Exclusion
Correct Answer: Mutual Exclusion
16 of 17 11/21/2018, 4:11 PM
BELTRON PROGRAMMER
Options:
1) Intranet
2) Internet
3) Browser
4) Hyperlinks
Correct Answer: Hyperlinks
QID : 97 - The extension .edu, .nic, .net and .gov are called as ______.
Options:
1) browsers
2) IP address
3) domain codes
4) URL
Correct Answer: domain codes
QID : 100 - Animation we create by the help of many online animation tools in the form of ______.
Options:
1) GIF image
2) PDF image
3) JPEG image
4) Audio/Video image
Correct Answer: GIF image
17 of 17 11/21/2018, 4:11 PM
7/25/2018 PROGRAMMER
Join Telegram
Beltron Vacancy
QID : 101 - How many two-input AND and OR gates are required to realize Y = CD+EF+G?
Options:
1) 4, 2
2) 3, 3
3) 2, 3
4) No option is correct
Correct Answer: No option is correct
Candidate Answer: 3, 3
QID : 102 - If X, Y and Z are 3 Boolean variables, then X(Y + Z) equals (X + Y) (X + Z), if X, Y, Z take the values ______.
Options:
1) 0, 1, 0
2) 1, 0, 1
3) 0, 1, 1
4) 1, 0, 0
Correct Answer: 0, 1, 1
Candidate Answer: 1, 0, 1
Candidate Answer: 2
Candidate Answer: When a page cannot be accessed due to its absence from memory
QID : 110 - In Unix which system call creates the new process?
Options:
1) alter
2) new
3) create
4) fork
Correct Answer: fork
QID : 111 -
7/25/2018 PROGRAMMER
Options:
1) Output: "15"
2) Output: "60"
3) Output: "120"
4) Output: "180"
Correct Answer: Output: "120"
QID : 112 - ______ correctly shows the hierarchy of arithmetic operations in C language.
Options:
1)
2)
3)
4)
Correct Answer:
Candidate Answer:
QID : 113 -
Options:
1) Output: "10"
2) Output: "510"
3) Compilation Error
4) Run time Error
Correct Answer: Output: "10"
QID : 115 - Which of the following function is use for reading in a multi-word string?
7/25/2018 PROGRAMMER
Options:
1) printf();
2) scanf();
3) gets();
4) puts();
Correct Answer: gets();
QID : 116 -
Options:
1) Output: "15"
2) Output: "16"
3) Output: "8"
4) Compilation Error
Correct Answer: Output: "8"
QID : 117 - Which of the following operations can be performed on the file "Honey.txt" using the below code?
int (*ptr)[5];
Options:
1) ptr is array of pointers to 5 integers
2) ptr is a pointer to an array of 5 integers
3) ptr is an array of 5 integers
4) ptr is an pointer to array
Correct Answer: ptr is a pointer to an array of 5 integers
QID : 119 -
Options:
1) Output: "x=20 y=500 z=500"
2) Output: "y=504 z=504 x=20"
3) Output: "x=21 y=504 z=504"
4) Compilation Error
Correct Answer: Output: "x=20 y=500 z=500"
QID : 120 -
Options:
1) Output: "8 1 7 5 6"
2) Output: "8 1 5 5 6"
3) Output: "8 1 6 5 5"
4) Runtime Error
Correct Answer: Output: "8 1 7 5 6"
QID : 122 - The intel 8086 microprocessor is a _______ processor in Assembling language.
7/25/2018 PROGRAMMER
Options:
1) 8 bit
2) 16 bit
3) 32 bit
4) 4 bit
Correct Answer: 16 bit
QID : 123 - In a ______ one module of the new information system is activated at a time.
Options:
1) System Development Life Cycle
2) CASE tool
3) Phased Conversion
4) Success factors
Correct Answer: Phased Conversion
QID : 124 - The step-by-step instructions that solves a problem are called ______.
Options:
1) a sequential structure
2) a list
3) an algorithm
4) a plan
Correct Answer: an algorithm
QID : 125 - A feasibility document should contain all of the following except______.
Options:
1) project name
2) data-flow diagrams
3) feasible alternative
4) problem descriptions
Correct Answer: problem descriptions
QID : 128 - Which linked list type that navigates for an item in forward and backward direction is called_______.
Options:
1) Absolute linked List
2) Linear Linked List
3) Circular linked List
4) Doubly Linked List
Correct Answer: Doubly Linked List
2
Candidate Answer: O(n logn)
QID : 130 - Second most used data structure after array is______.
Options:
1) Linked List
2) Queue
3) Hash table
4) Stack
Correct Answer: Linked List
QID : 131 - Binary search tree whose left subtree and right subtree differ in height by at most 1 level is called______.
Options:
1) Red-black tree
2) AVL tree
3) Lemma tree
4) No option is correct
Correct Answer: AVL tree
QID : 137 - An entity set that does not have sufficient attributes to form a primary key is a _______.
Options:
1) Strong entity set
2) Weak entity set
3) Simple entity set
4) Primary entity set
Correct Answer: Weak entity set
QID : 138 - _____operation is used if we are interested in only certain columns of a table.
Options:
1) Projection
2) Selection
3) Union
4) Join
Correct Answer: Projection
QID : 140 - The result of the UNION operation between R1 and R2 is a relation that includes _______.
Options:
1) All the tuples of R1
2) All the tuples of R2
3) All the tuples of R1 and R2
4) All the tuples of R1 and R2 which have common columns
Correct Answer: All the tuples of R1 and R2 which have common columns
QID : 146 - ______is a set of one or more attributes taken collectively to uniquely identify a record.
Options:
1) Sub key
2) Candidate key
3) Super key
4) Foreign key
Correct Answer: Super key
QID : 147 - An attribute in a relation is a foreign key if the __________ key from one relation is used as an attribute in that relation in DBMS.
Options:
1) Candidate
2) Primary
3) Super
4) Sub
Correct Answer: Primary
Candidate Answer: one class inheriting from more then one super classes
QID : 149 - Which of the following type of inheritance is not directly applicable in java?
Options:
1) Multilevel Inheritance
2) Hierarchial Inheritance
3) Single Inheritance
4) Multiple Inheritance
Correct Answer: Multiple Inheritance
7/25/2018 PROGRAMMER
QID : 154 - Which of the following is the default value of a static integer variable in Java?
Options:
1) 1
2) 0
3) Null
4) -1
Correct Answer: 0
Candidate Answer: 0
7/25/2018 PROGRAMMER
QID : 155 -
Options:
1) Output: "Ram"
2) Output: "Radha"
3) Compilation Error
4) Runtime Error
Correct Answer: Output: "Ram"
QID : 156 -
Options:
1) Output: "10 200 400 "
2) Output: "10 20 400"
3) Runtime Error
4) Compilation Error
Correct Answer: Output: "10 200 400 "
QID : 158 -
Options:
1) Output: "112360"
2) Output: "070811234"
3) Compilation Error
4) No option is correct
Correct Answer: Compilation Error
QID : 160 -
Options:
1) Output: "abcd abcd true abcd abc false"
2) Output: "abcd abc false abcd abcd true"
3) Output: "abcd abc true abcd abcd false"
4) Output: "abcd abc true abcd abcd true"
Correct Answer: Output: "abcd abc false abcd abcd true"
QID : 161 - Classes that allow primitive types to be accessed as objects are known as ______.
Options:
1) Concrete Classes
2) Wrapper Classes
3) Converter Classes
4) No option is correct
Correct Answer: Wrapper Classes
Options:
1) Output: "Static Block 2 Static Block 1 Value of num = 100"
2) Output: "Static Block 1 Static Block 2 Value of num = 100 Value of mystr = Constructor"
3) Output: "Static Block 2 Static Block 1 Value of num = 100 Value of mystr = Constructor"
4) Compilation Error
Correct Answer: Output: "Static Block 1 Static Block 2 Value of num = 100 Value of mystr = Constructor"
Candidate Answer: Output: "Static Block 1 Static Block 2 Value of num = 100 Value of mystr = Constructor"
QID : 163 - The concept of converting real world objects in terms of class is known as ______.
Options:
1) Encapsulation
2) Abstraction
3) Polymorphism
4) Inheritance
Correct Answer: Abstraction
Options:
1) System developer
2) System tester
3) System Analyst
4) No option is correct
Correct Answer: System Analyst
QID : 167 - Which of the following does not account for software failure?
Options:
1) Increasing Demand
2) Increasing Supply
3) Low expectation
4) Less reliable and expensive
Correct Answer: Increasing Supply
QID : 179 - What requirement gathering method developed at IBM in 1970s is used for managing requirement elicitation?
Options:
1) JAD
2) FAST
3) Traceablity
4) Both JAD and Traceablity
Correct Answer: Both JAD and Traceablity
QID : 182 - Cascading termination refers to termination of all child processes before the parent terminates
Options:
1) normally
2) abnormally
3) normally or abnormally
4) No option is correct
Correct Answer: normally
QID : 183 - With ______ only one process can execute at a time.
Options:
1) Multiprocessing
2) Multiprogramming
3) Multiprogramming and Multiprocessing
4) Uniprogramming
Correct Answer: Uniprogramming
QID : 184 - The child process completes execution, but the parent keeps executing, then the child process is known as______.
Options:
1) Orphan
2) Zombie
3) Body
4) Dead
Correct Answer: Zombie
QID : 190 - Interrupt table of pointers having addresses for each interrupt is located at______memory.
Options:
1) high
2) low
3) mid
4) both high and low
Correct Answer: low
QID : 192 - Which of the following statement defines remote method invocation?
Options:
1) It allows a process to invoke memory on a remote object
2) It allows a thread to invoke a method on a remote object
3) It allows a thread to invoke memory on a remote object
4) It allows a process to invoke a subprocess on a remote object
Correct Answer: It allows a thread to invoke a method on a remote object
QID : 193 - The process that is based on IPC mechanism which executes on different systems and can communicate with other processes using message
based communication is known as ______.
Options:
1) Local Procedure Call
2) Inter Process Communication
3) Remote Procedure Call
4) Remote Machine Invocation
7/25/2018 PROGRAMMER
Correct Answer: Remote Procedure Call
QID : 194 - The link between two processes M and N to send and receive messages is called______.
Options:
1) message-passing link
2) synchronization link
3) message- message link
4) communication link
Correct Answer: communication link
QID : 197 - Ipv4 or Ipv6 does not include which of the following field in the base header?
Options:
1) Next Header field
2) Field for Fragmentation information
3) Flow Label
4) Kind field
Correct Answer: Field for Fragmentation information
QID : 198 - Primary author of HTML (hyper text markup language) is______.
Options:
1) Brendan Eich
2) Tim Berners-Lee
3) google inc.
4) Peter Norton
Correct Answer: Tim Berners-Lee
QID : 200 - Once a file is saved in JPEG format ,some data is lost______.
7/25/2018 PROGRAMMER
Options:
1) Permanently
2) Temporarily
3) Both Permanently & Temporarily
4) No option is correct
Correct Answer: Permanently