HSST Computer Science 19/09/2012 Category No.111/2010 - Part 1

1.         A document preparation software:
(A) FOXPRO         (B) ORACLE
(C) LATEX             (D) MATLAB
Answer: C
2.         A technique in which system resources are shared among multiple users:
(A) Multiplexing    (B) Demultiplexing  
(C) Modulation      (D) Demodulation
Answer: A
3.         Interaction modeling cannot be done using:
(A) State Diagrams                       (B) Use-Cases
(C) Sequence Diagrams             (D) Activity Diagrams
Answer: A
4.         The number of bits that can be transmitted over a network in a certain period of time:
(A) Latency            (B) Delay      
(C) Bandwidth       (D) Baud
Answer: C
5.         Which of these not a markup language?
(A) HTML    (B) XML         
(C) SGML   (D) XGML
Answer: D
6.         A network topology that combines features of linear bus and star topology:
(A) Mesh    (B) Ring        
(C) Tree      (D) Cube
Answer: C
7.         If language L={0,1}*, then the reversed language LR                =
(A) {0,1}*     (B) {} 
(C) {0}*        (D) {1}*         
Answer: A
8.         In Linux, the subdirectory that contains system configuration files including user passwords:
(A) /boot                  (B) /usr          
(C) /etc                    (D) /proc
Answer: C
9.         SQL command to delete a column from an existing table:
(A) Alter table        (B) Drop table          
(C) Delete table     (D) Delete column
Answer: A
10.      A technique not associated with data mining:
(A) Predictive Modeling              
(B) Link Analysis
(C) Database Segmentation      
(D) Dimensionality Modeling
Answer: D

11.      Memory bank experiencing too much contention from processor:
(A) Fan-in              (B) Hot-spot  
(C) Thrash             (D) Fan-out
Answer: C
12.      The number of nodes in a complete binary tree of height n:
(A) 2n-1-1                 (B) 2n-1+1      
(C) 2n+1-1                (D) 2n+1+1
Answer: C
13.      The science and art of breaking ciphers.
(A) Cryptography              (B) Steganography 
(C) Cryptanalysis              (D) Steganalysis
Answer: C
14.      A raster scan display system with 24 bits per pixel and a screen resolution of 1024x1024 requires a frame buffer size.
(A) 1 Mega Bytes              (B) 3 Mega Bytes
(C) 8 Mega Bytes              (D) 24 Mega Bytes
Answer: B
15.      Not a parallel programming language.
(A) C*                      (B) SEQUENT C     
(C) nCube C          (D) C++
Answer: D
16.      Process of mapping a network interface IP address to its hardware address:
(A) ARP      (B) RARP     
(C) ICMP    (D) IGMP
Answer: A
17.      For the following sample database table staff:
Staff no
Name
Designation
Branch
Salary
SL21
John
Assistant
B003
30000
SG37
Ann
Supervisor
B007
42000
SL25
Julie
Assistant
B007
32000
SL52
Susan
Manager
B003
51000
SG10
David
Manager
B004
47000
The SQL query: SELECT COUNT(Staff no) AS mycount, SUM(Salary) AS mysum FROM Staff WHERE Designation=’Manager’
Returns the result
(A) mycount=2, mysal=47000   
(B) mycount=2, mysal=98000   
(C) mycount=5, mysal=47000   
(D) mycount=5, mysal=98000
Answer: B
18.      Linux partitions are created using the file system:
(A) FAT                   (B) FAT32     
(C) EXT3                (D) NTFS      
Answer: C
19.      The local area network technology used in Ethernet.
(A) CSMA               (B) CSMA/CD          
(C) CSMA/CA        (D) ALOHA
Answer: B
20.      Data abstraction means:
(A) Objects of one class acquire properties of object of another class
(B) Insulation of data from direct access by programs
(C) Code associated with a procedure call is not known until run time
(D) Putting together essential features without including background details    
Answer: D


Post a Comment

0 Comments