0% found this document useful (0 votes)
56 views

Programmer Sandeep Kumar

The document is a summary of a candidate's performance on a programmer exam consisting of 100 multiple choice questions. It provides details of the candidate's registration information, exam details, and their answers to the first 30 questions. The candidate answered some questions correctly and some incorrectly.

Uploaded by

Chotu111
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
56 views

Programmer Sandeep Kumar

The document is a summary of a candidate's performance on a programmer exam consisting of 100 multiple choice questions. It provides details of the candidate's registration information, exam details, and their answers to the first 30 questions. The candidate answered some questions correctly and some incorrectly.

Uploaded by

Chotu111
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 19

7/30/2018 PROGRAMMER

Click to Print logout

REGISTRATION NUMBER : 20151933 CANDIDATE NAME : SANDEEP KUMAR


EXAM DATE : 22-May-2018 EXAM START TIME : 10:00:00
EXAM NAME : PROGRAMMER EXAM DURATION : 02:00 Hrs
TOTAL MARKS : 100 TOTAL NO OF QUESTIONS : 100

QID : 1 - Which of the following is the Boolean expression for a three-input AND gate?
Options:
1) A - B - C
2) X = A + B + C
3) X = A . B . C
4) A $ B $ C
Correct Answer: X = A + B + C

Candidate Answer: X = A + B + C

QID : 2 - ______ gate has the exact inverse output of the OR gate for all possible input combinations.
Options:
1) AND
2) NAND
3) NOR
4) NOT
Correct Answer: NOR

Candidate Answer: NOR

QID : 3 - Find the union of the sets {1, 2, 5} and {1, 2, 6} in Discrete Mathematics.
Options:
1) {1, 2, 6, 1}
2) {1, 2, 5, 6}
3) {1, 2, 1, 2}
4) {1, 5, 6, 3}
Correct Answer: {1, 2, 5, 6}

Candidate Answer: {1, 2, 5, 6}

QID : 4 - What is the Cartesian product of A = {1, 2} and B = {a, b} in Discrete Mathematics?
Options:
1) {(1, a), (1, b), (2, a), (b, b)}
2) {(1, 1), (2, 2), (a, a), (b, b)}
3) {(1, a), (2, a), (1, b), (2, b)}
4) {(1, 1), (a, a), (2, a), (1, b)}
Correct Answer: {(1, a), (2, a), (1, b), (2, b)}

Candidate Answer: {(1, 1), (2, 2), (a, a), (b, b)}

QID : 5 - Which error detection method consists of just one redundant bit per data unit?
Options:
1) CRC
2) Checksum
3) Simple parity check
4) Two-dimensional parity check
Correct Answer: Simple parity check

Candidate Answer: Checksum

QID : 6 - A simple parity-check code can detect ______errors.


Options:
1) an odd-number of
2) an even-number of
3) two
4) no errors
Correct Answer: an odd-number of

http://thepracticetest.in/beltron/response_questions.php?subject_code=101&t_id=MjIwNTIwMTg=&appid=1368062d74107fc05177712c90c3885c 1/19
7/30/2018 PROGRAMMER

Candidate Answer: no errors

QID : 7 - What is caching in Operating System Concepts and Networking?


Options:
1) Holding only title of the data
2) A slow memory
3) Holding copy of the data
4) Holding output for a device
Correct Answer: Holding copy of the data

Candidate Answer: A slow memory

QID : 8 - Which of the following I/O Interface used for large data transfers in Operating System ?
Options:
1) dma
2) programmed I/O
3) controller register
4) All options are correct
Correct Answer: dma

Candidate Answer: All options are correct

QID : 9 - Transmission delay does not depend on______ in Operating System Concepts and Networking.
Options:
1) Packet length
2) Distance between the routers
3) Transmission rate
4) Transmission rate and packet length
Correct Answer: Distance between the routers

Candidate Answer: Distance between the routers

QID : 10 - The correct syntax to be written in the web browser to Telnet to www.google.co.in is______.
Options:
1) telnet//google.co.in
2) telnet: google.co.in
3) telnet:// google.co.in
4) telnet google.co.in
Correct Answer: telnet:// google.co.in

Candidate Answer: telnet:// google.co.in

QID : 11 -

Options:
1) Logical Error
2) Output: "0"
3) Runtime Error
4) Compilation Error
Correct Answer: Compilation Error

Candidate Answer: Compilation Error

http://thepracticetest.in/beltron/response_questions.php?subject_code=101&t_id=MjIwNTIwMTg=&appid=1368062d74107fc05177712c90c3885c 2/19
7/30/2018 PROGRAMMER
QID : 12 -

Options:
1) Output: "200THEGREATKHALI"
2) Output: "THEGREATKHALI"
3) Compilation Error
4) Runtime Error
Correct Answer: Compilation Error

Candidate Answer: Compilation Error

QID : 13 - Which of the following is not a valid C variable name?


Options:
1) double num;
2) float rate;
3) int variable_count;
4) int $main;
Correct Answer: int $main;

Candidate Answer: int variable_count;

QID : 14 -

Options:
1) Output: "0.833333333333333"
2) Output: "0.83"
3) Compilation Error
4) Runtime Error
Correct Answer: Runtime Error

Candidate Answer: Runtime Error

QID : 15 - What is the minimum size of an char data type in C programming?

http://thepracticetest.in/beltron/response_questions.php?subject_code=101&t_id=MjIwNTIwMTg=&appid=1368062d74107fc05177712c90c3885c 3/19
7/30/2018 PROGRAMMER
Options:
1) 4 Bytes
2) 8 bits
3) 8 Bytes
4) 16 bits
Correct Answer: 8 bits

Candidate Answer: 8 bits

QID : 16 - Which of the following is not a user-defined data type in C language?


Options:
1) typedef int Boolean;
2) typedef enum {Mon, Tue, Wed, Thu, Fri} Workdays;
3) struct {char name[10], int age};
4) double number
Correct Answer: double number

Candidate Answer: typedef enum {Mon, Tue, Wed, Thu, Fri} Workdays;

QID : 17 -

Options:
1) Output: "1200"
2) Output: "112"
3) Output: "100"
4) Compilation Error
Correct Answer: Output: "100"

Candidate Answer: Output: "100"

QID : 18 - Which of the following is a user-defined data type in C programming?


Options:
1) typedef int number;
2) typedef long big_ number;
3) typedef float decimal;
4) All options are correct
Correct Answer: All options are correct

Candidate Answer: All options are correct

http://thepracticetest.in/beltron/response_questions.php?subject_code=101&t_id=MjIwNTIwMTg=&appid=1368062d74107fc05177712c90c3885c 4/19
7/30/2018 PROGRAMMER
QID : 19 -

Options:
1) Output: "Both are equal"
2) Runtime Error
3) Logical Error
4) Compilation Error
Correct Answer: Compilation Error

Candidate Answer: Runtime Error

QID : 20 - The function ____ obtains block of memory dynamically in C programming.


Options:
1) calloc
2) malloc
3) free
4) Both calloc & malloc
Correct Answer: Both calloc & malloc

Candidate Answer: malloc

QID : 21 - The last statement of assembly language source program should be _______.
Options:
1) Stop
2) Op
3) GOTO
4) End
Correct Answer: End

Candidate Answer: End

QID : 22 - The alternate way of writing the instruction in assembly language, ADD #5,R1 is ______
Options:
1) ADD [5],[R1];
2) ADDI 5,R1;
3) ADDIME 5,[R1];
4) There is no other way
Correct Answer: ADDI 5,R1;

Candidate Answer: ADD [5],[R1];

QID : 23 - In a DFD external entities are represented by a______


Options:
1) Circle
2) Diamond shaped box
3) Ellipse
4) Rectangle
Correct Answer: Rectangle

Candidate Answer: Ellipse

QID : 24 - ______refers to the collection of information pertinent to systems Project in System Analysis and Design.

http://thepracticetest.in/beltron/response_questions.php?subject_code=101&t_id=MjIwNTIwMTg=&appid=1368062d74107fc05177712c90c3885c 5/19
7/30/2018 PROGRAMMER
Options:
1) Data transfer
2) Data gathering
3) Data Embedding
4) Data Request
Correct Answer: Data gathering

Candidate Answer: Data Embedding

QID : 25 - ______strategies are adopted if information requirements are not well-defined in System Analysis and Design.
Options:
1) Rapid application development method
2) Systems development life cycle method
3) Prototyping method
4) Structured analysis development method
Correct Answer: Prototyping method

Candidate Answer: Structured analysis development method

QID : 26 - _______is the incoming e-mail server protocol in Internet Concepts and Web Design.
Options:
1) POP
2) SMIP
3) SMTP
4) PPP
Correct Answer: POP

Candidate Answer: POP

QID : 27 - The Internet uses the _______ as the protocol engine in Internet Concepts.
Options:
1) SLIP
2) HTTP
3) TCP/IP
4) PPP
Correct Answer: TCP/IP

Candidate Answer: TCP/IP

QID : 28 - Which of the following data structure can be used to solve the Tower of Hanoi problem in Data Structure?
Options:
1) Tree
2) Heap
3) Priority queue
4) Stack
Correct Answer: Stack

Candidate Answer: Stack

QID : 29 - A B-tree of order 'b' has maximum of _________ children.


Options:
1) b
2) b/2
3) (b-1)
4) (b+1)
Correct Answer: (b+1)

Candidate Answer: (b+1)

QID : 30 - Which of the following is not a palindrome in Data Structure?


Options:
1) Madam
2) Dad
3) Malayalam
4) Maadam
Correct Answer: Maadam

Candidate Answer: Maadam

http://thepracticetest.in/beltron/response_questions.php?subject_code=101&t_id=MjIwNTIwMTg=&appid=1368062d74107fc05177712c90c3885c 6/19
7/30/2018 PROGRAMMER
QID : 31 - How do you allocate a matrix using a single pointer in C language?(rw and cl are the number of rows and columns respectively)
Options:
1) int *arr = malloc(rw * cl * sizeof(int));
2) int *arr = (int *)malloc(rw * cl * sizeof(int));
3) int *arr = (int *)malloc(rw + cl * sizeof(int));
4) int *arr = (int *)malloc(rw * cl * sizeof(arr));
Correct Answer: int *arr = (int *)malloc(rw * cl * sizeof(int));

Candidate Answer: int *arr = (int *)malloc(rw * cl * sizeof(arr));

QID : 32 - ______ is not a part of ADT description.


Options:
1) Operation
2) Data
3) Both Operation and Data
4) No option is correct
Correct Answer: No option is correct

Candidate Answer: Operation

QID : 33 - ______is needed when you wish to include rows that do not have matching values.
Options:
1) Outer join
2) Natural join
3) Equi-join
4) All options are correct
Correct Answer: Outer join

Candidate Answer: Outer join

QID : 34 - ______is needed when you wish to return rows that do have matching values.
Options:
1) Natural join
2) Equi-join
3) Outer join
4) All options are correct
Correct Answer: All options are correct

Candidate Answer: Equi-join

QID : 35 - The function that an entity plays in a relationship is called that entity’s _________ in DBMS.
Options:
1) Position
2) Instance
3) Participation
4) Role
Correct Answer: Role

Candidate Answer: Instance

QID : 36 - Locks placed by command are called ________ in DBMS.


Options:
1) implicit locks
2) explicit locks
3) exclusive locks
4) shared locks
Correct Answer: explicit locks

Candidate Answer: implicit locks

QID : 37 - ______SQL command will allow you to change the table STUDENT to add the constraint named GradeCheck that states that the values of the Grade
column must be greater than 0.
Options:
1) ALTER TABLE STUDENT ALTER CONSTRAINT GradeCheck (Grade > 0);
2) ALTER TABLE STUDENT ADD CONSTRAINT GradeCheck (Grade > 0);
3) ALTER TABLE STUDENT ADD CONSTRAINT GradeCheck CHECK (Grade > 0);
4) No option is correct
Correct Answer: ALTER TABLE STUDENT ADD CONSTRAINT GradeCheck CHECK (Grade > 0);

http://thepracticetest.in/beltron/response_questions.php?subject_code=101&t_id=MjIwNTIwMTg=&appid=1368062d74107fc05177712c90c3885c 7/19
7/30/2018 PROGRAMMER
Candidate Answer: ALTER TABLE STUDENT ADD CONSTRAINT GradeCheck (Grade > 0);

QID : 38 - What SQL constraint is used to limit column values of a table in DBMS?
Options:
1) The LIMIT constraint
2) The CHECK constraint
3) The VALUE constraint
4) No option is correct
Correct Answer: The CHECK constraint

Candidate Answer: No option is correct

QID : 39 - Views constructed from SQL SELECT statements that conform to the SQL-92 standard may not contain______.
Options:
1) GROUP BY.
2) WHERE.
3) ORDER BY.
4) FROM.
Correct Answer: ORDER BY.

Candidate Answer: WHERE.

QID : 40 - In ODBC, a data source that is local to a single computer is called a______.
Options:
1) system data source.
2) file data source.
3) user data source.
4) SQL text file
Correct Answer: system data source.

Candidate Answer: system data source.

QID : 41 - The attribute AGE is calculated from DATE_OF_BIRTH . The attribute AGE is______ in DBMS.
Options:
1) Single valued
2) Composite
3) Multi valued
4) Derived
Correct Answer: Derived

Candidate Answer: Composite

QID : 42 - Relational schemas and other metadata about relations are stored in a structure called the _______
Options:
1) Metadata
2) Catalog
3) Log
4) Data Dictionary
Correct Answer: Data Dictionary

Candidate Answer: Data Dictionary

QID : 43 - A data dictionary is created when a __________ is created in DBMS.


Options:
1) Instance
2) Segment
3) Database
4) Dictionary
Correct Answer: Database

Candidate Answer: Database

QID : 44 - How can the values in the relation teaches be deleted ?


Options:
1) Drop table teaches;
2) Delete from teaches;
3) Purge table teaches;
4) Delete from teaches where Id =’Null’;
Correct Answer: Drop table teaches;

http://thepracticetest.in/beltron/response_questions.php?subject_code=101&t_id=MjIwNTIwMTg=&appid=1368062d74107fc05177712c90c3885c 8/19
7/30/2018 PROGRAMMER

Candidate Answer: Delete from teaches where Id =’Null’;

QID : 45 - Not applicable condition can be represented in relation entry as______ in DBMS.
Options:
1) NA
2) 0
3) NULL
4) Blank Space
Correct Answer: NULL

Candidate Answer: NULL

QID : 46 - ______has each related entity set has its own schema and there is an additional schema for the relationship set in DBMS.
Options:
1) A many-to-many relationship set
2) A multivalued attribute of an entity set
3) A one-to-many relationship set
4) One-to-One
Correct Answer: A many-to-many relationship set

Candidate Answer: A multivalued attribute of an entity set

QID : 47 - _______function is used to find the count of distinct departments.


Options:
1) Count of distinct
2) Distinct
3) Dist
4) Count
Correct Answer: Count

Candidate Answer: Count

QID : 48 - Which of the following is the mechanism where one object acquires all the properties and behaviors of the parent object?
Options:
1) Encapsulation
2) Polymorphism
3) Inheritance
4) No option is correct
Correct Answer: Inheritance

Candidate Answer: Inheritance

QID : 49 -

http://thepracticetest.in/beltron/response_questions.php?subject_code=101&t_id=MjIwNTIwMTg=&appid=1368062d74107fc05177712c90c3885c 9/19
7/30/2018 PROGRAMMER
Options:
1) Output: "Hello World End of thread"
2) Output: "Hello World"
3) Compilation Error
4) Runtime Error
Correct Answer: Runtime Error

Candidate Answer: Output: "Hello World End of thread"

QID : 50 - What is the extension of compiled java classes?


Options:
1) .class
2) .java
3) .byte
4) .jvm
Correct Answer: .class

Candidate Answer: .jvm

QID : 51 - ______keyword is used to make the classes and interface of another package accessible to the current package.
Options:
1) Import
2) Implements
3) Instanceof
4) package
Correct Answer: Import

Candidate Answer: Instanceof

QID : 52 - Which of the following access specifiers can be used for a class so that it’s members can be accessed by a different class in the different package?
Options:
1) Private
2) Public
3) Protected
4) No option is correct
Correct Answer: Public

Candidate Answer: Public

QID : 53 -

Options:
1) Output: "Hello Delhi"
2) Output: "Hello Delhi Hello Delhi"
3) Compilation Error
4) Runtime Error
Correct Answer: Runtime Error

Candidate Answer: Output: "Hello Delhi"

http://thepracticetest.in/beltron/response_questions.php?subject_code=101&t_id=MjIwNTIwMTg=&appid=1368062d74107fc05177712c90c3885c 10/19
7/30/2018 PROGRAMMER
QID : 54 -

Options:
1) Output: "Ram"
2) Output: "Seeta"
3) Compilation Error
4) No option is correct
Correct Answer: Compilation Error

Candidate Answer: Output: "Ram"

QID : 55 - Which class automatically flushes the data so that there is no need to call the flush() method.
Options:
1) Console class
2) Scanner Class
3) File Input Stream class
4) Print Stream class
Correct Answer: Print Stream class

Candidate Answer: File Input Stream class

QID : 56 - ______interface extends Data Output interface.


Options:
1) Serializable
2) Externalization
3) Object Output
4) Object Input
Correct Answer: Object Output

Candidate Answer: Object Input

QID : 57 - ______is a method of Object Output interface used to finalize the output state so that any buffers are cleared.
Options:
1) clear()
2) flush()
3) fflush()
4) close()
Correct Answer: flush()

Candidate Answer: clear()

http://thepracticetest.in/beltron/response_questions.php?subject_code=101&t_id=MjIwNTIwMTg=&appid=1368062d74107fc05177712c90c3885c 11/19
7/30/2018 PROGRAMMER
QID : 58 -

Options:
1) Output: "0"
2) Output: "1"
3) Compilation Error
4) No option is correct
Correct Answer: Compilation Error

Candidate Answer: No option is correct

QID : 59 - ______class can be used to implement input stream that uses a character array as the source.
Options:
1) File Reader
2) Buffered Reader
3) File Array Reader
4) Char Array Reader
Correct Answer: Char Array Reader

Candidate Answer: File Reader

QID : 60 - Which of the following method can be used to make the main thread to be executed last among all the threads?
Options:
1) stop()
2) join()
3) sleep()
4) call()
Correct Answer: sleep()

Candidate Answer: stop()

QID : 61 - What is the default value of priority variable MIN_PRIORITY AND MAX_PRIORITY?
Options:
1) 0 & 256
2) 1 & 256
3) 0 & 1
4) 1 & 10
Correct Answer: 1 & 10

Candidate Answer: 0 & 1

http://thepracticetest.in/beltron/response_questions.php?subject_code=101&t_id=MjIwNTIwMTg=&appid=1368062d74107fc05177712c90c3885c 12/19
7/30/2018 PROGRAMMER
QID : 62 -

Options:
1) Output: "ending of main here"
2) Output: "ending of main here finalize method"
3) Compilation Error
4) Runtime Error
Correct Answer: Output: "ending of main here"

Candidate Answer: Compilation Error

QID : 63 - Which of the following mechanisms, types of all variables and expressions are fixed at compilation time?
Options:
1) Strong Typing
2) Weak Typing
3) Static Binding/ early binding
4) Dynamic Binding/ late binding
Correct Answer: Static Binding/ early binding

Candidate Answer: Dynamic Binding/ late binding

QID : 64 - ______are the transformations in the diagram, which are responsible for central processing functions.
Options:
1) Input transformations
2) Output transformations
3) System-processing transformations
4) Storage transformations
Correct Answer: System-processing transformations

Candidate Answer: Storage transformations

QID : 65 - The term module in the design phase refers to ______.


Options:
1) functions
2) procedures
3) sub programs
4) All option are correct
Correct Answer: All option are correct

Candidate Answer: All option are correct

QID : 66 - ______is not a software development life cycle model.

http://thepracticetest.in/beltron/response_questions.php?subject_code=101&t_id=MjIwNTIwMTg=&appid=1368062d74107fc05177712c90c3885c 13/19
7/30/2018 PROGRAMMER
Options:
1) Spiral Model
2) Waterfall Model
3) Prototyping Model
4) Capability maturity Model
Correct Answer: Capability maturity Model

Candidate Answer: Capability maturity Model

QID : 67 - Build and Fix model has?


Options:
1) 3 Phases
2) 1 Phases
3) 2 Phases
4) 4 Phases
Correct Answer: 2 Phases

Candidate Answer: 3 Phases

QID : 68 - RAD stands for ______.


Options:
1) Rapid Application Development
2) Relative Application Development
3) Ready Application Development
4) Repeated Application Development
Correct Answer: Rapid Application Development

Candidate Answer: Rapid Application Development

QID : 69 - Black box testing sometimes called______.


Options:
1) Data Flow Testing
2) Loop Testing
3) Behavioral Testing
4) Graph Based Testing
Correct Answer: Behavioral Testing

Candidate Answer: Behavioral Testing

QID : 70 - What is the important aspect of coding in software engineering?


Options:
1) Readability
2) Productivity
3) To use as small memory space as possible
4) Brevity
Correct Answer: Readability

Candidate Answer: Readability

QID : 71 - ______ developed a set of software quality factors that has been given the acronym FURPS - Functionality, Usability, Reliability, Performance,
Supportability.
Options:
1) Booch
2) Rambaugh
3) Hewlett - Packard
4) Jacobson
Correct Answer: Hewlett - Packard

Candidate Answer: Hewlett - Packard

QID : 72 - Detailed design is expressed by______ in software engineering.


Options:
1) CSPEC
2) PSPEC
3) MINI SPEC
4) Code SPEC
Correct Answer: MINI SPEC

Candidate Answer: Code SPEC

http://thepracticetest.in/beltron/response_questions.php?subject_code=101&t_id=MjIwNTIwMTg=&appid=1368062d74107fc05177712c90c3885c 14/19
7/30/2018 PROGRAMMER

QID : 73 - In risk analysis of spiral model, which of the following risk includes?
Options:
1) Management
2) Technical
3) Both Management and Technical
4) No option is correct
Correct Answer: Both Management and Technical

Candidate Answer: Both Management and Technical

QID : 74 - Which three framework activities are present in Adaptive Software Development (ASD)?
Options:
1) analysis, design, coding
2) requirements gathering, adaptive cycle planning, iterative development
3) speculation, collaboration, learning
4) No option is correct
Correct Answer: speculation, collaboration, learning

Candidate Answer: analysis, design, coding

QID : 75 - _____ is not suitable for accommodating any change.


Options:
1) Build & Fix Model
2) Prototyping Model
3) RAD Model
4) Waterfall Model
Correct Answer: Waterfall Model

Candidate Answer: Build & Fix Model

QID : 76 - _______can be selected if user is involved in all the phases of SDLC.


Options:
1) Waterfall Model
2) Prototyping Model
3) RAD Model
4) both Prototyping Model & RAD Model
Correct Answer: RAD Model

Candidate Answer: both Prototyping Model & RAD Model

QID : 77 - The goal of modularization can be said to be_______.


Options:
1) produce systems that have stamp or data coupling between modules
2) control and content coupling between modules
3) control and data coupling between modules
4) common and stamp coupling between modules
Correct Answer: produce systems that have stamp or data coupling between modules

Candidate Answer: produce systems that have stamp or data coupling between modules

QID : 78 - 4GL is an example of ______________ processing.


Options:
1) White Box
2) Black Box
3) Functional
4) Both Black Box & Functional
Correct Answer: Both Black Box & Functional

Candidate Answer: Both Black Box & Functional

QID : 79 - ______ has a major disadvantage in terms of the coding phase of a software life cycle model.
Options:
1) Spiral Model
2) Waterfall Model
3) Rad Model
4) 4GT Model
Correct Answer: 4GT Model

http://thepracticetest.in/beltron/response_questions.php?subject_code=101&t_id=MjIwNTIwMTg=&appid=1368062d74107fc05177712c90c3885c 15/19
7/30/2018 PROGRAMMER
Candidate Answer: Waterfall Model

QID : 80 - What is the two steps of a process execution?


Options:
1) I/O & OS Burst
2) Memory & I/O Burst
3) CPU & I/O Burst
4) OS & Memory Burst
Correct Answer: CPU & I/O Burst

Candidate Answer: CPU & I/O Burst

QID : 81 - Scheduling is done so as to ______ in Operating System


Options:
1) increase CPU utilization
2) decrease CPU utilization
3) keep the CPU more idle
4) No option is correct
Correct Answer: increase CPU utilization

Candidate Answer: keep the CPU more idle

QID : 82 - ______Operating System does not implement multitasking truly.


Options:
1) Windows 98
2) Windows NT
3) Windows XP
4) MS DOS
Correct Answer: MS DOS

Candidate Answer: MS DOS

QID : 83 - Taskbar is used for ______ in Operating System.


Options:
1) Navigation program
2) Switching between program
3) Start a program
4) All options are correct
Correct Answer: All options are correct

Candidate Answer: All options are correct

QID : 84 - ______is suitable after you install new drivers.


Options:
1) Shut Down
2) Restart
3) Sleep
4) Hibernate
Correct Answer: Restart

Candidate Answer: Restart

QID : 85 - Swap space exists in ______ in Operating System.


Options:
1) primary memory
2) secondary memory
3) CPU
4) No option is correct
Correct Answer: secondary memory

Candidate Answer: primary memory

QID : 86 - When a program tries to access a page that is mapped in address space but not loaded in physical memory, then?
Options:
1) segmentation fault occurs
2) fatal error occurs
3) page fault occurs
4) no error occurs
Correct Answer: page fault occurs

http://thepracticetest.in/beltron/response_questions.php?subject_code=101&t_id=MjIwNTIwMTg=&appid=1368062d74107fc05177712c90c3885c 16/19
7/30/2018 PROGRAMMER

Candidate Answer: segmentation fault occurs

QID : 87 - ______is the address generated by CPU.


Options:
1) Physical address
2) Absolute address
3) Logical address
4) No option is correct
Correct Answer: Logical address

Candidate Answer: Physical address

QID : 88 - The relocation register helps in ______ in Operating System.


Options:
1) providing more address space to processes
2) a different address space to processes
3) to protect the address spaces of processes
4) No option is correct
Correct Answer: to protect the address spaces of processes

Candidate Answer: providing more address space to processes

QID : 89 - When the memory allocated to a process is slightly larger than the process, then______.
Options:
1) internal fragmentation occurs
2) external fragmentation occurs
3) both internal fragmentation occurs and external fragmentation occurs
4) neither internal fragmentation occurs nor external fragmentation occurs
Correct Answer: internal fragmentation occurs

Candidate Answer: both internal fragmentation occurs and external fragmentation occurs

QID : 90 - The interval from the time of submission of a process to the time of completion is termed as______in Operating System.
Options:
1) waiting time
2) turnaround time
3) response time
4) throughput
Correct Answer: turnaround time

Candidate Answer: turnaround time

QID : 91 - With round robin scheduling algorithm in a time shared system______in Operating System.
Options:
1) using very large time slices converts it into First come First served scheduling algorithm
2) using very small time slices converts it into First come First served scheduling algorithm
3) using extremely small time slices increases performance
4) using very small time slices converts it into Shortest Job First algorithm
Correct Answer: using very large time slices converts it into First come First served scheduling algorithm

Candidate Answer: using very small time slices converts it into First come First served scheduling algorithm

QID : 92 - Under multiprogramming, turnaround time for short jobs is usually ______and that for long jobs is slightly ______.
Options:
1) Lengthened; Shortened
2) Shortened; Lengthened
3) Shortened; Shortened
4) Shortened; Unchanged
Correct Answer: Shortened; Lengthened

Candidate Answer: Shortened; Lengthened

QID : 93 - Semaphore is a/an _______ to solve the critical section problem in Operating System.
Options:
1) hardware for a system
2) special program for a system
3) integer variable
4) No option is correct

http://thepracticetest.in/beltron/response_questions.php?subject_code=101&t_id=MjIwNTIwMTg=&appid=1368062d74107fc05177712c90c3885c 17/19
7/30/2018 PROGRAMMER
Correct Answer: integer variable

Candidate Answer: integer variable

QID : 94 - The main disadvantage of spinlocks is that______.


Options:
1) they are not sufficient for many process
2) they require busy waiting
3) they are unreliable sometimes
4) they are too complex for programmers
Correct Answer: they require busy waiting

Candidate Answer: they are unreliable sometimes

QID : 95 - What is a web browser?


Options:
1) A program that can display a web page
2) A program used to view html documents
3) It enables user to access the resources of internet
4) All options are correct
Correct Answer: All options are correct

Candidate Answer: All options are correct

QID : 96 - A web cookie is a small piece of data______.


Options:
1) sent from a website and stored in user’s web browser while a user is browsing a website
2) sent from user and stored in the server while a user is browsing a website
3) sent from root server to all servers
4) No option is correct
Correct Answer: sent from a website and stored in user’s web browser while a user is browsing a website

Candidate Answer: sent from a website and stored in user’s web browser while a user is browsing a website

QID : 97 - Inserting spurious data or information into an organization’s system to disrupt or overload services is called______.
Options:
1) interruption
2) interception
3) modification
4) fabrication
Correct Answer: fabrication

Candidate Answer: interruption

QID : 98 - A dial-up connection enables to connect to ISP using a______.


Options:
1) modem
2) router
3) gateways
4) bridge
Correct Answer: modem

Candidate Answer: modem

QID : 99 - The maximum number of points that can be displayed without overlap on a CRT is referred as______.
Options:
1) picture
2) resolution
3) persistence
4) No option is correct
Correct Answer: resolution

Candidate Answer: resolution

QID : 100 - Which display devices allows us to walk around an object and view it from different sides?

http://thepracticetest.in/beltron/response_questions.php?subject_code=101&t_id=MjIwNTIwMTg=&appid=1368062d74107fc05177712c90c3885c 18/19
7/30/2018 PROGRAMMER
Options:
1) Direct view storage tubes
2) Three-dimensional devices
3) Flat panel display devices
4) Plasma panel display devices
Correct Answer: Three-dimensional devices

Candidate Answer: Plasma panel display devices

http://thepracticetest.in/beltron/response_questions.php?subject_code=101&t_id=MjIwNTIwMTg=&appid=1368062d74107fc05177712c90c3885c 19/19

You might also like