Q1. Which OSI model layer is responsible of compression-decompression as well as encryption-decryption of data?
(a) Application layer
(b) Network layer
(c) Datalink layer
(d) Presentation layer
Q2. Which statement makes permanent the change made to the database during the current transaction?
(a) SET TRANSACTION
(c) BEGIN TRANSACTION
Q3. Which type of operating system used in Air traffic control?
(a) soft real time
(b) Hard real time
(c) Application specific
(d) Batch processing
Q5. Which of the following hold the actual data in the DBMS?
Q6. Which of the following shortcut key is used to move slide to beginning in MS PowerPoint?
(a) Ctrl+Shift+Up Arrow
(b) Ctrl+Up Arrow
Q7. In which type of security threats, someone tries to steal information that computers, smartphones, or other devices transmit over a network?
(a) Intrusion attack
(b) Network spoofing
Q8. Which of the following kind of computer virus that hides and stores itself within the computer memory, which then allows it to infect any file that is run by the computer, depending on the virus’ programming?
(a) Encrypted virus
(b) Overwriting virus
(c) Polymorphic virus
(d) Resident virus
Q9. Which type of testing strategy deals with the internal logic and structure of the code?
(a) Gray-box testing
(b) Closed-box testing
(c) Black box testing
(d) White box testing
Q10. Which of the following layer is not User Support layer?
(b) Presentation layer
(c) Both (a) and (b)
(d)Data Link Layer
Q11. Which of the following is a not a necessary condition for deadlock?
(a) Mutual Exclusion
(b) Hold and Wait
(d) No Preemption
Q12. Which of the following is not a relational database?
(c) IBM DB2
Q13. Tuple variables in SQL are defined in which clause?
Q14. Speed of super computer measure in:
Q15. Which of the following allows you to specify multiple values in a WHERE clause?
Sol. Presentation layer is the second last layer in the OSI model responsible for services like data compression, encryption, decryption, data conversion etc.
Sol. Use the COMMIT statement to end your current transaction and make permanent all changes performed in the transaction. A transaction is a sequence of SQL statements that Oracle Database treats as a single unit. This statement also erases all savepoints in the transaction and releases transaction locks.
Sol. A hard real-time system (also known as an immediate real-time system) is hardware or software that must operate within the confines of a stringent deadline. The application may be considered to have failed if it does not complete its function within the allotted time span.
Sol. Table is a basic structure to hold actual data in a relational database.
Sol. Eavesdropping is the unauthorized real-time interception of a private communication, such as a phone call, instant message, videoconference or fax transmission. An eavesdropping attack takes advantage of unsecured network communications in order to access the data being sent and received.
Sol. A resident virus is a computer virus which embeds itself into the memory on a computer, activating whenever the operating system performs a specific function so that it can infect files on the computer.
Sol. In white box testing methodology, the tester has the knowledge of the internals of a system and knows how the system is implemented. The tester uses this knowledge to develop test cases that will examine the control flow, information flow, data flow, exception and error handling as well as coding practices of the system.
Sol. Data link layer is network support layer. The network support layers are Physical layer, Data link layer and Network layer. These layers deal with electrical specifications, physical connection, transport timing and reliability. The user support layers are: Session layer, Presentation layer, Application layer. These allow interoperability among unrelated software system. Transport layer provides end to end reliable data transmission.
Sol. There are 4 necessary condition for deadlock:
•Mutual Exclusion: At least one un sharable resource – processes claim exclusive control of resources they need
•Hold and Wait: Process holds one resource while waiting for another
•No Preemption: Resources only released voluntarily – no interruption possible (i.e. cannot be forcefully withdrawn by another process)
•Circular Wait: Circular chain of processes – each waiting for a resource held by another
Sol. Relational database is also called relational database management systems (RDBMS) or SQL databases. The most popular of these are Microsoft SQL Server, Oracle Database, MySQL, and IBM DB2. HBase is a non-relational database.
Sol. Tuple variables can be used in SQL, and are defined in the from clause.
Sol. A supercomputer is about speed. Its processing speed is measured in floating point operations per second (flops), or the number of calculations a supercomputer can perform in a second.
Sol. The IN operator allows you to specify multiple values in a WHERE clause.
WHERE column_name IN (value1, value2, …);