Kerala SET Computer Science Paper II 2010 - Part 4

61.       In SQL, which statement is used to select employee number (EMPNO) and Department(DEPT) from (EMPL) table whose salary (SALARY) is 8000?
(A) SELECT EMPNO, DEPT FROM EMPL=8000;
(B) SELECT EMPNO, DEPT FROM EMPL WHERE SALARY=8000;
(C) SELECT EMPNO, DEPT, SALARY =8000 FROM EMPL;
(D) SELECT EMPNO, DEPT, FROM TABLE EMPL WHENSALARY=8000;
Answer: B
62.       Which of the following is useful in implementing quick sort?
(A) Stack
(B) Set
(C) List
(D) Queue
Answer: A,C
63.       The task(s) of the Lexical analysis phase of a compiler is
(A) To parse the source program into the basic elements or tokens of the language
(B) To build an executable application
(C) To build a uniform symbol tree
(D) All of the above
Answer: A
64.       In CRT displays, increasing the refresh rate
(A) Decreases flickering
(B) Increases flickering
(C) Decreases the size of image
(D) Increases the size of image
Answer: A
65.       The point of time a variable comes into existence in memory is determined by its
(A) Scope
(B) Storage class
(C) Data type
(D) All of the above
Answer: B
66.       The topology with the highest reliability is
(A) Bus topology
(B) Star topology
(C) Ring topology
(D) Mesh topology
Answer: D
67.       Which of the following ISO Layer is more closely related to the Network layer in TCP / IP model?
(A) Application
(B) Session
(C) Network
(D) Data Link
Answer: D
68.       Which of the following is not a standard RS-232 C signal?
(A) RTS
(B) CTS
(C) DSR
(D) VDR
Answer: D
69.       The extent to which the software can continue to operate correctly despite the introduction of invalid input is called
(A) Reliability
(B) Robustness
(C) Fault-tolerance
(D) Portability
Answer: B
70.    Let R= (A, B, C, D, E, F) be a relation scheme with the following dependencies C->F, E->A, EC->D, A->B Which of the following is a key for R?
(A) CD
(B) EC
(C) AE
(D) AC
Answer: B

71.    Which of the following layer protocols in OSI Reference model are responsible for user and the application program Support such as passwords, file transfer, etc.?
(A) Layer 7 protocols
(B) Layer 6 protocols
(C) Layer 5 protocols
(D) Layer 4 protocols
Answer: A
72.    The probability of success of two modules in unit testing is 0.9 each. The probability of success of integration testing is 0.9. The joint probability of success is
(A) 0.9
(B) 0.81
(C) 0.729
(D) 0.1
Answer: C
73.    Which of the following testing methods is normally used as the acceptance test for a software system?
(A) Regression testing
(B) Integration testing
(C) Unit testing
(D) Beta testing
Answer: D
74.    A PL/SQL block can return user data to SQL*Plus through
(A) Bind variables
(B) Substitution variables
(C) Local variables
(D) None of these
Answer: A
75.    Which of the following is widely used tool for developing PL/SQL code?
(A) Rapid SQL
(B) SQL++
(C) SQL programmer
(D) TOAD
Answer: D
76.    PL/SQL does not support arrays. However it has an equivalent construct which is
(A) Records
(B) Collections
(C) Packages
(D) Types
Answer: B
77.    Which of the following triggers can be used in DDL operations?
(A) Instead-Of-Trigger
(B) DML Trigger
(C) System trigger
(D) DDL trigger
Answer: C
78.    Which of the following is/are correct?
(A) An SQL query automatically eliminates duplicates
(B) An SQL query will not work if there are no indexes on the relations
(C) SQL permits attribute names to be repeated in the same relation
(D) one of the above
Answer: B
79.    Which of the following is a collection of Form components?
(A) Record Group
(B) Record Set
(C) Data Store
(D) Object Group
Answer: D
80.    A certain processor supports only the immediate and the direct addressing modes. Which of the following programming language formats cannot be implemented on this processor?
1. Pointers 2 .Arrays 3. Records
(A) 1and 2 only
(B) 2 and 3 only
(C) 1 and 3 only
(D) 1, 2 and 3
Answer: D


Post a Comment

0 Comments