Jku Cs IT - Model Exam Take Exam
Jku Cs IT - Model Exam Take Exam
A) Robust
B) Structured
C) Distributed
D) High Performance
A) The content of a static web page can only change if the source code is changed.
C) An application that collects data from users through a form and stores it in a database
requires the integration of client & server-side scripts
4. Suppose String S=null; then what type of exception will occur when we execute the statement
System.out.println(S.charAt(0));
A) ArithmeticException
B) OutOfMemoryError
C) NumberFormatException
D) NullPointerException
5. Which one of the following scheduling algorithms is both preemptive and non-preemptive?
A) Round Robin
B) Priority
C) FCFS
D) SJF
6. Which mode of transmission the entire capacity of the channel can be utilized for each direction?
A) Simplex
B) Half duplex
D) all except A
7. The activity of choosing an efficient execution strategy for processing a query is called
as____________?
A) Query execution
C) Query optimization
D) Query parsing
8. Which types of switching each node receives the entire message, stores it, and then transmits it to
the next node?
A) Circuit Switching
B) Packet Switching
C) Message Switching
D) all
9. What happens if several catch blocks match the type of the thrown exception?
A) All the catch blocks for that try statement are executed in order.
B) The first catch block is executed and the others are skipped.
C) All the catch blocks for that try statement are skipped.
D) The program will terminate without executing any of the catch blocks.
10. The DBMS acts as an interface between what two components of an enterprise-class database
system?
A) 9
C) 27
D) 3
13. Which one of the HTML5 attributes makes a text box inactive to edit? A. B. C. D.
A) required
B) pattern
C) read-only
D) disable
A) outside program
B) inside function
C) outside function
15. Which Java statement always executes its body at least once, even though the condition is not
true?
A) for
B) do-while
C) while
D) continue
16. Software and hardware that uses hypertext Transfer Protocol to respond to client requests is -----?
A) ile server
B) mail server
C) web server
D) A and C
B) In inheritance the sub class can introduce its own specific variables
C) A super class can access its own sub classes unique data members
18. Features of Java used to handle more than one job at a time.
A) Distributed
C) Portable
D) Multi-threaded
19. Which one of the following is not necessary condition for deadlock to occurred?
B) Mutual inclusion
C) No- preemption
D) Circular wait
20. Which TCP/IP layer allows an IP packet to make a physical link to transmission media?
A) Application layer
B) Internet layer
D) transport layer
A) Function parameters
B) Local variables
C) Return addresses
22. One of the following is not the reason for the need of query optimization?
C) To maximize throughput
23. Which of the following is not common member to both abstract classes and interfaces?
A) static variables
B) final variables
C) private members
D) abstract methods
24. Given a class named Student, which of the following is a valid constructor declaration for this class?
A) Constructor Student ( ) { }
B) public Student ( ) { }
D) Void Student ( ) { }
25. Which one of the following statements is True about operating systems as an I/O manager?
C) Provide an interface between the device and the rest of the system.
D) All
26. Identify the correct statement based on the code snippet given below. $fop=fopen(“xyz.txt”,”a+”);
fwrite($fop,”hello”); fclose($fop);
B) the text hello will be appended to the existing content in xyz.txt file
C) the text hello won’t be written to xyz.txt file, if the file does not exist
27. To ensure integrity of the data, a database system should ensure transactions to possess certain
properties. The property which makes sure that the partial effects of incomplete transactions should not
visible to the other transactions is called__________?
A) Atomicity
B) Isolation
C) Consistency
D) Durability
28. which one of the following is the result of the following PHP code? Given Code: echo strlen(“IP II
Model-Exam !”);
A) 20
B) 18
C) 16
D) 15
29. Which layer allows an IP packet to make a physical link to the media?
A) Internet layer
C) Transport layer
D) Application layer
B) static
C) public
D) string
31. Assume Mr. Daniel is running different applications at the same time like browsing the internet
while preparing his assignment, so which type of operating system he used.
A) ROTS
B) Multi-tasking
C) Multi-user
D) DOS
32. Based on the code snippet given below, which one of the following statements allow you to assign
an email submitted from the form to a variable called email? UserEmail
A) $email= $_GET[“email”];
B) $email= $_POST[“email”];
C) echo $_REQUEST[“email”];
D) $email= $_REQUEST[“UserEmail”];
33. One of the following is not consider in cost estimation during query optimization?
A) Input/Output cost
B) Communication cost
D) Device cost
34. Among the following lists one doesn’t describe a field in a relation?
A) Record
B) Attributes
C) Column
D) All of them
35. Choose the lists of the keywords in order that they would be used to handle exceptions in Java.
D) All
37. Which of the following primitive data types is not Integer type?
A) byte
B) double
C) int
D) short
38. Which one of the following is wrong about structural and object-oriented programming paradigms?
C) C. In java new operator used to declare variable that used to store single value
41. Which one of the following is the output of the given program? $m) { if($k!=2) continue; else echo
$m; } ?>
A) 0134
B) Nov
C) 2
D) SeptOctDecJan
43. Which one of the following PHP functions is used to redirect a user to a specific page?
A) Send_redirect()
B) header_location()
C) header()
D) redirect()
44. Which one is the right name given for unique identification of each entity?
A) Composite Key
B) Primary Key
C) Foreign key
D) Candidate Key
45. Which coding transition is at the middle of the bit and changes phase when a different bit is
encountered?
A) Differential Manchester
B) Manchester
C) Delta modulation
A) String
B) long
C) Boolean
D) int
47. The velocity of propagation of a signal through a guided medium varies with frequency. This type
transmission impairment is called……………………………?
A) Noise
B) Attenuation distortion
C) Delay distortion
48. Among the following one describes the functional dependency between non-key attributes of a
relation?
49. _______is methods assume conflict is rare and only checks for conflicts at commit/terminate time?
A) Shared Locking
B) Optimistic
C) Time stamping
D) Executive locking
50. ______is a rule of no component of the primary key may contain a NULL value.
A) Entity integrity
B) Referential integrity
C) Domain Integrity
D) Cardinal integrity
A) document.write()
B) out.print()
C) print()
D) write()
52. Among the following one is the process of analyzing the given relation schemas based on their
functional dependencies and primary keys.
A) Decomposition
B) Normalization
C) Partitioning
D) Distributing
53. _________are rules that should be obeyed or followed while manipulating the data?
A) E-R diagram
B) Entity
C) Relationship
54. A program written in _________ language does not require a server to run.
A) PHP
B) Servlet
C) JSP
D) HTML
56. Which one is false about abstract class and interface in Java?
57. Which of the following OOP concept binds the code and data together and keeps them secure from
the outside world?
A) Polymorphism
B) Inheritance
C) Abstraction
D) Encapsulation
58. From the following list of Java variables; which one is invalid?
A) EMP_Salary
B) Age27
C) My-Name
D) _1200IDN
59. Which one of the following PHP functions is used to execute SQL queries?
A) mysqli_select_db()
B) mysqli_fetch_assoc()
C) mysqli_execute_query()
60. Which method execute first when you run Servlet code?
A) Service ( )
B) destroy ( )
C) init( )
D) start( )
61. A class declaration that begins with the keyword ____________ must be stored in a file that has
exactly the same name as that class and ends with the .java file-name extension.
A) private
B) final
C) public
D) abstract
62. Which layer allows an IP packet to make a physical link to the media?
A) Internet layer
C) Transport layer
D) Application layer
63. Based on the html code given below identify the correct statement. Given Code:
Hello Everyone
B) “Hello Everyone” is an element that will be displayed on the browser in red color
B) Both NRZ-L and NRZ-I changes voltage level when different bit is encountered
65. Which one of the following statements is False about segmentation and paging?
B) In paging the virtual address space is divided into equal-sized block called pages frame.
D) To map each page into frames we need a special data structure called page table
66. __________is a technique/process of keeping and maintaining a log file of all transaction changes
made to database to enable effective recovery in event of failure?
A) Journaling
B) View
C) Backup
D) Encryption
67. Timestamp ordering protocol is said to be free from deadlock because of ____ reason?
A) It is cascading free
C) It guarantees serializability
D) None of them
68. One of the following is false about Java database connectivity (JDBC)
A) It allows you to create Java application that can access data from different types of database
systems.
C) It uses different predefined java classes and methods to handle various data access
functions.
D) Different database systems can use the same JDBC driver, which used to establish the
connection interface.
69. Which keyword is used to prevent content of a variable from being modified?
A) final
B) last
C) constant
D) static
70. Which one of the following statements is True about operating systems?
C) It primarily focuses on managing the hardware resource rather than software resources.
71. Transaction-processing systems usually allow multiple transactions to run concurrently. Which of
the following best suits as the advantage(s) of allowing concurrent execution of transactions?
B) Serializability
72. Which one of the following subnet masks represents class A before and after subnetting?
A) 255.0.0.0
B) 255.255.0.0
C) 255.255.255.0
D) all
73. Which mode of transmission the entire capacity of the channel can be utilized for each direction?
A) Simplex
B) Half duplex
C) Full duplex
D) all except A
74. If a transaction is allowed to read a data item that was produced by an uncommitted transaction,
what do we call this read?
A) Repeatable read
B) Dirty read
C) Phantom read
D) Conflict read
75. ______is s a problem which occurs when two transactions access the same data items concurrently
and their operations interleaved.
A) Loss Update
B) Incorrect summery
C) Temporary read
D) Unrepeatable read
76. which one of the following syntaxes is the correct way of defining a function in PHP?
B) next()
C) nextLine()
D) nextString()
A) .php
B) .hphp
C) .xml
D) .html
A) Several classes can be declared as sub classes of the same super class
C) When we create an object of a sub class, constructor of a subclass executed first and then
constructors of super class
80. For recovery purposes, the transaction processing system not needs to keep ______________?
D) Transaction status(committed/aborted)
81. Which of the following is true about Java static methods and instance methods?
A) Instance methods belong to the class rather than the object of a class.
B) Instance methods can be invoked without the need for creating an instance of a class.
C) A static method can access static data member and can change the value of it.
D) Static methods require an object of its class to be created before it can be called.
82. Which one of the following wireless transmission systems the sending and receiving antennas need
not be aligned?
A) Microwave
B) Radio waves
C) Infrared waves
D) Bluetooth
B) echo $_SESSION[“email”]; is used to display the value of a session variable called email.
C) session_start() function is used to start a session and must be there at the beginning of an
index.php page of the website
84. What will happen when we run the following segment of Java code? public static void main(String
args[]){ int i; int []a={3,4,0,5}; for( i=3;i>=0;i--){ System.out.print(30/a[i]); System.out.print(a[i]); }
B) 10 7 0 6 will be printed
D) 10 7 0 6 3 4 0 5 will be printe
85. ________means the transaction happens indivisibly; a transaction either happens completely or
not at all.?
A) Isolated
B) Atomicity
C) Consistency
D) Durability
86. Which one of the following is used for only local communication in private network?
A) 172.16.6.2
B) 10.123.16.145
C) 192.168.14 23
D) All
A) void
B) protected
C) public
D) private
88. One of the following is not the end result of abstraction in OOP?
A) Possible attributes
B) Possible methods
C) Possible class
A) base
B) super
C) this
D) upper
A) continue
B) quit
C) break
D) exit
A) Polymorphism
B) Inheritance
C) Encapsulation
D) Abstraction
92. One of the following is true about relational database data model?
C) Constructors have the same name as class name and can return values
94. Which one of the following is the correct way of creating a PHP variable?
A) int stud_age=20;
B) $stud-age=20;
C) stud_age=20;
D) $_age=20;
96. Which connectivity device packets send to all connected device at the same time?
A) Switch
B) router
C) Hub
D) Bridges
97. Which one of the following statements is the right way of creating a cookie called product that can
only stay for 2?
A) createcookie(“product”,”smart phone”,time()+(60*60*14),”/”,”localhost”,0);
B) setcookie(“product”,”smart phone”,time()+(60*60*2*24),”/”,”localhost”,0);
C) setcookie(“product”,”smart phone”,time()+(60*60*24*14),”/”,”localhost”,0);
D) setcookie(“product”,”smart phone”,time()+(60*60*24),”/”,”localhost”,0);
98. Based on the above question #13, what is the broadcasting address for subnet #2?
A) 178.191.0.255
B) 178.191.255.255
C) 178.191.12.255
D) 178.191.1.255
99. Unshielded twisted pair cable that is used for 16 Mbps Token Ring is ---------------------
A) Category 5
B) Category 6
C) Category 4
D) Category 3
100. Which one of the following statements is True about process state transition?
A) If the given quantum time expired a running process can be interrupted and goes to the
ready queue.
D) all
101. One of the following is/are the recovery technique from catastrophic failures?
B) Backup
C) Redo
D) Encryption
102. The built-in base class in Java, which is used to handle all exceptions is:
A) Exception
B) Runtime Exception
C) Checked Exceptions
D) Unchecked Exception
103. In a schedule S with two transactions T1 and T2, T1 reads the data item which was produced by T2
and T1 commits before T2 commits. In this case, the schedule S is said to be a _________ schedule?
A) Recoverable
B) Conflict serializable
C) Non-recoverable
D) Serial
104. An entity that cannot stand by itself or that cannot have a record unless there is another entity to
be related with it is for its existence is called?
A) strong Entity
B) Weak entity
C) dependent entity
D) Independent
105. Which wireless security method generates new keys each time when a client establishes
connection to the router?
D) Traffic Filtering
A) if…else if
B) for loop
C) nested if
D) if…else
108. _____________ is a program that executes compiled Java bytecode on a specific platform.
A) NetBeans
B) JVM
C) JDK
D) JRE
109. Which one of the following database models under record database model category?
D) all of them
A) interface A implements B {}
B) class B implements A {}
C) class B extends A {}
D) interface B extends A {}