Friday, October 25, 2019

Software Engineering Kerala PSC,UGC, Specialist Officer

1.Arrange the tasks involved in requirements elicitation in an appropriate manner.
        I.            Consolidation
      II.            Prioritization
    III.            Requirements gathering
    IV.            Evaluvation
  1.       Iii,I,ii,iv           
  2.       iii,iv,ii,i
  3.       Iii,ii,iv,I                               
  4.      ii,iii,iv,i
    Ans : is Option 2 

    2.Which of the following is in directive measure of product?
A.      Quality
B.      Reliability
C.      Complexity
D.      All of the above
           Ans : is
3. The modification of the software to match the changes in ever changing environment, falls under    which category of software maintenance?
A.      Adaptive
B.     Corrective
C.      Perfective
D.      Preventive

4. Which of the following is a dynamic model that shows how the system interacts with its environment as it is used?
A.      System context model
B.      Interaction model
C.      Environmental model
D.      Both system context and interaction
5. ITG Stands for:
A.      Instantaneous Test Group
B.      Independent Test Group
C.      Integration Test Group
D.      Individual Testing Group

Thursday, October 24, 2019

Kerala PSC System Analyst COIR Marketting 2019 Question Paper with Answer

1.      A class is declared  inside  a class but outside a method it is known as-----------------------
a.       Annoymous inner class
b.      Member inner class
c.       Local Inner Class
d.      Static nested Class




2.      JVM stands for

a.       Java Very Large Machine
b.      Java Verified Machine
c.       Java Very small machine
d.      Java Virtual Machine


3.      What type of constructor is used to provide different values to the distinct objects?
a.       Default constructor
b.      Parameterized Constructor
c.       Overloading Constructor
d.      None of the above
4.      How many types of controls does AWT support?
a.       7
b.      6
c.       5
d.      8
AWT  stands for Abstract window tool kit.
5.      Which type of inheritance one super-class have more than on sub-class
a.       Hierarchical inheritance
b.      single inheritance
c.       Multiple inheritances
d.      Multilevel inheritance
  1. Hierarchical Inheritance : In Hierarchical Inheritance, one class serves as a superclass (base class) for more than one sub class.In below image, the class A serves as a base class for the derived class B,C and D.
  2. hie



6.      Which  allows you to define one interface and have multiple implementations?
a.       Encapsulation
b.      inheritance
c.       Polymorphism
d.      None of the above


7.      which right shift operator preserves the sign of the value?
8.      ~
      Unary not operator, ~, inverts all of the bits of its operand in binary representation.


9.      What is  it called if an object has its own lifecycle and there is no owner?
A.                  Aggregation
B.                  Composition
C.                  Encapsulation
D.                  Association

10.  What is the return type of constructors ?
A.                  int
B.                  float
C.                  void
D.                  none of the mentioned

11.  Which of these is an incorrect array declaration ?
A.                  int arr[]=new int[5]
B.                  int[]arr=new int[5]
C.                  int arr[]=int[5] new
D.                  int arr[]=new int[5]
Data type array name=data type and array size
12.  ---------- is comparable to pair of persons in a room taking turns to speak with each other
A.                  Time Division Multiplexing
B.                  Frequency Division Multiplexing
C.                  Code Division Multiplexing
D.                  None of these
13.  Which one of the following error detecting code is also known as polynomial code?
A.                  Checksum
B.                  Parity
C.                  Cyclic Redundancy checks
D.                  None of these


14.  The encryption algorithm for WPA2 is based on
A.                  DES
B.                  AES
C.                  Elliptic Curve
D.                  EI Gamal
15.  ------------------ is used to divide physical network topology into different logical topologies
A.                  Wimax
B.                  WLAN
C.                  Adhoc Network
D.                  VLAN
16.  Which one of the following is not a Network layer  Protocol?
A.                  TCP
B.                  ICMP
C.                  ARP
D.                  DHCP
17.  Select the service which is not provided by the Transport Layer.
A.                  Congestion Control
B.                  Routing
C.                  Flow Control
D.                  Error Correction


18.  ----------------- is not a linux file system
A.                  Ext4
B.                  Jfs
C.                  XFS        
D.                  ReFS
19.  The IEEE standard for Wimax is
A.                  802.11
B.                  802.15
C.                  802.15.1
D.                  802.16
20.  ----------------- is not a web server
A.                  IIS
B.                  Apache
C.                  Firefox
D.                  Nginx
21.  A Denial of service attack against a network belongs to which of the following type of threat?
A.                  Modification
B.                  Interception
C.                  Interruption
D.                  None of these



22.  ---------------Caches web pages on the server hard disk so that they can be quickly retrieved later.
A.                  File Server
B.                  Proxy Server
C.                  Web Server
D.                  None of these
23.  --------------- is not an active attack in Nertwork Security
A.                  Traffic Analysis
B.                  Masquerade
C.                  Replay
D.                  Denial Of Service

24.  ----------- is an indication of the relative independence among the modules
A.                  Cohesion
B.                  Coupling
C.                  Pattern
D.                  Modularity
25.  The test-Case design technique that complements equivalence partitioning and leads to the selection of test cases at the edges of the class
A.                  Orthogonal array testing
B.                  Model-Based Testing
C.                  Boundary Value analysis
D.                  Condition testing
26.  The framework activity that presents software increment to the customer and includes delivery , support and feedback
A.                  Communication
B.                  Planning
C.                  Modeling
D.                  Deployment
27.  ----------------- structures a team loosely and depends on individual initiative of the team members.
A.                  Random paradigm
B.                  Open Paradigm
C.                  Closed Paradigm
D.                  Synchronous Paradigm
28.  The w5HH principle is suggested by
A.                  Reel
B.                  Grady Bosch
C.                  Liu
D.                  Barry Boehm
29.  A quality metric that provides benefit at both the project and process level is called
A.                  Defect Removal efficiency
B.                  FP
C.                  LOC
D.                  Use-Case Points

30.  The prioritized list of project requirements or features which provides business value for the customer
A.                  Sprints
B.                  Demos
C.                  Backlog
D.                  States
31.  ----------------- is an agile process  model that provides a framework for building and maintaining systems which meet tight time constraints through the use of incremental prototyping.
A.                  Adaptive Software Development
B.                  Dynamic systems development method
C.                  Scrum Model
D.                  Crystal
32.  The small and highly motivated and self-organizing project team is called-----------------
A.                  Stake holders
B.                  Team leaders
C.                  Agile
D.                  Mavericks
33.  --------------- is also called behavioral  testing, focuses on the functional requirements of the software.
A.                  Black box testing
B.                  White box Testing
C.                  Basis Path Testing
D.                  Data Flow Testing
34.  Used to show dynamic communications between objects during execution of a task
A.                  Class Diagram
B.                  Deployment Diagram
C.                  Use Case Diagram
D.                  Sequence Diagram
35.  A new technology that emphasizes the design of test cases before the creation of source code
A.                  Agile Process
B.                  Test- driven Development
C.                  Postmodern design
D.                  Model-driven Software Development
36.  Which is a technique in a java in which a class can have any number of constructors that differ  in parameter lists?
A.                  Constructor overloading
B.                  Method Overloading
C.                  Operator Overloading
D.                  None of the above
37.  Which method is used to change the name of thread?
A.                  Public string getName()
B.                  Public Void setName(String name)
C.                  Public  void getName()
D.                  Public String setName(sting name)
38.  Which statement provides an easy way to dispatch execution to different parts of your code based on the value of expression?
A.                  If
B.                  Switch
C.                  Nested-if
D.                  If-else-if
39.  Which keyword is used to make the classes and interface of another package accessible to the current package?
A.                  Import
B.                  Implements
C.                  Instanceof
D.                  None of the above
40.  Which method DataInputStream class reads a line from the file and returns it as a string?
A.                  WriteInt()
B.                  reading()
C.                  readLine()
D.                  writeDouble()
41.  Under which package is the string class encapsulated?
A.                  Java.awt
B.                  Java.util
C.                  Java.io
D.                  Java.lang
42.  Which of the following is a valid declaration of an object of class Box?
A.                  Box obj =new box()
B.                  Box obj = new Box
C.                  Obj=new Box()
D.                  new Box obj
43.  What is the output of this program?
Class selection_statements
{
Public static void main(string args[])
{
Int var1=5
Int var2=6
If (var 2==1)==var1)
System.out.prin(var2);
else
System.out.print(++var2)
}
}
A.    1
B.     2
C.     3
D.    4
44. A class member declared protected becomes a member of subclass of which type?
A.    Public Member
B.     Static Member
C.     Protected Member
D.    Private Member
45. Which of these is not a bitwise operator?
A &
B &=
C!=
Dless than= 
Thread priority in Java is
A.    Integer
B.      Float
C.     double
D.    long
46. Which of the method is a part of Abstract Window Toolkit (AWT)?
A.    Display()
B.     Paint ()
C.     drawString()
D.    Transient
44.  The ------------------- attribute of applet tag specifies the amount of horizontal blank space the browser should leave surrounding the applet
A)   SPACE=Pixel
45.  b) HSPACE=Pixel
46.  c)HWDTH=pixel
47.  e)HBLANK=pixel
48.  The --------------------method is defined by the AWT which cause the AWT runtime system to execute a call to your applet's update() method.
49.  A)Update()
50.  B)Paint()
51.  C)repaint()
52.  D)reupdate()
53.  -------------------------Package in java contents language utility classes such as vectors, hash, tables, random numbers data etc.
A)   Java.util
B)   Java.awt
C)   Java.net
54.  D. Java.lang
55.  HTML Stands for
56.  A)Hyper Text Markup Language
57.  B)Hyper Text Marking Lanuage
58.  C)Hyper Text MArkup Lists
59.  D)None of the above
60.  The capablity to store one object inside  another object is called
A)   Encapsulation
B)   Aggregation(Ans Key)
C)   Polymorphism
D)   Inheritance
61.  The capability to store one object inside  another object is called
A)   Encapsulation
B)   Aggregation(Ans Key)
C)   Polymorphism
D)   Inheritance
62.  Result of getAIIResponseHeaders() XMLHTTP Request method is
A)   Returns the complete set to HTTP headers as a string
63.  B)Returns the value of the specified HTTP header
64.  C) Both (A) and (B)
65.  D) None of the above
66.  WAMP Variant for MAC operating system is
A)   LAMP
B)   MAMP
C)   SAMP
D)   None of these
67.  DNS Comprises
A)   Domain Names and Name Server
B)   Domain Names and Domain Name Space
C)   Domain Names, Domain Name Space and Name Server
68.  Latest web browser of Microsoft
69.  A)Internet Explorer
70.  B)Opera
71.  C)Safari
72.  D)Edge
73.  TCP/IP Stands for
A)   Transmission control protocol/Internet Protocol
B)   Transfer Control Protocol/ Internet Protocol
C)   Both A and B
74.  Packet switching method is used in
A)   TCP
B)   UDP
C)   Both A and B
D)   None of these
75.  bWhich layer uses error control mechanism in  OSI?
76.  A)Network Layer
77.  b) Data Link Layer
78.  C) Tran spot Layer
79.  D) Application Layer
80.  ISDN is an exaple of --------------------network
81.  A)Circuit Switched Telephone Network
82.  B) Packet Switched Network
83.  C) Message Switched Network
84.  D) None of the above
85.  What is the maximum cable length of STP
86.  A)300 m
87.  B) 200 m
88.  c) 100 m
89.  D) 150 m
90.  Application layer uses the following protocols:
91.  A)SMTP
92.  B)FTP
93.  C)HTTP
94.  D)All of the above 
95.  To define style shee rules in header section of the HTML document called
A)   Externam Style Sheet
B)   Internal Style Sheet
C)   Inline style sheet
96.  None of the above
97.  The application server for Java Web Application is
A)   JBoss
B)   Glassfish
C)   Weblogic
98.  D)Tomcat
99.  The protocol used to send email from one to another
100.                      A)POP3
101.                      B)HTTP
102.                      c)SMTP
103.                      D)FTP
104.                      commonly used web application that make use of AJAX
A)   Google Map
B)   Yahoo Maps
C)   Gmail
105.                      D)All of the above
106.                      IIS stands for
A)   International information Standards
B)   International Information Services
C)   Internet Information Standards
107.                      D)Internet Information Services
108.                     
The attribute of an HTML tag can be used to uniquely identify any element within an HTML page is
A)   id
B)   Title
C)   Class
D)   Style
109.                      gA smalla area can use the following network
A)   LAN|
B)   WAN
C)   MAN
D)   None of the above
110.                      The attribute is used to specify the URL of the document that occupies the inline frame
A)   Frame
B)   Sup
111.                      c) Src
112.                      D) Span
113.                      HTML form control tag is
A)   File select boxes
B)   Text input controls
114.                      c) Checkboxes Controls
115.                      D)All of the above
116.                      Client software that is used for email retrieval
A)   IMAP
B)   HTTP
117.                      C)DHCP
118.                      D)ICMP
119.                      bThe number of sub keys generated by IDEA algorithm is
A)   64
B)   32
C)   54
D)   52
120.                      ---------------- is an example of public key algorithm?
A)   DES
121.                      B)RSA
122.                      C)IREA
123.                      bD)RCS
124.                      DSS Signature uses which hash algorithm?
A)   MD5
B)   SHA-1
C)   SHA-2
D)   Does not use hash algorithm
125.                      In asymmetric key cryptography the private key is kept by
A)   Sender
B)   Receiver
C)   Sender and receiver
D)   Cryptoanalyst
126.                      What is Data Encryption Standard (DES) ?
A.                  Block Cipher
B.                  Stream Cipher
C.                  Bit Cipher
D.                  None of the above
127.                      In Cryptography , the order of the letters in a message is rearranged by
A.                  Transposition Ciphers
B.                  Substitution Ciphers
C.                  Both A and B
D.                  None of the above

128.                      Using RSA algorithm,  What is the value of cipher text C, If the plain text M=5 and P=3 , q=11 and d=7
A.                  24
B.                  25
C.                  26
D.                  32

129.                      ---------------- is used for hiding the payment information from the merchant
A.                  SET
B.                  SSL
C.                  SHTTP
D.                  TSP
130.                      The URL Property belongs to which of the following object?
A.                  Document
B.                  Element
C.                  Location
D.                  Event
131.                      Which of the following attribute can hold the JavaScript version?
A.                  Language
B.                  Script
C.                  Version
D.                  None of the above
132.                      Which event occurs when user click on an HTML element?
A.                  onclick()
B.                  onmouceclick()
C.                  onchange()
D.                  onmouseover
133.                      <Script language ="javascript">
134.                      function x()
135.                      {
136.                      Document.write(2+0+"4");
137.                      }
138.                      </scipt>
A.                  204
B.                  2
C.                  Error
D.                  24
139.                      What is the value of $a and $b after the function call ?
140.                      <?php
141.                      function doSomething(&$arg)
142.                      {
143.                      $fruit=$arg;
144.                      $arg +=1;
145.                      return $fruit;
146.                      }
147.                      $a=3;
148.                      $b=doSomething($a);
149.                      ?>
A.                  a is 3 and b is 4
B.                  a is 4 and b is 3
C.                  both are 3
D.                  both are 4
150.                      which version of PHP was added with Exception handling?
A.                  PHP 4
B.                  PHP 5
C.                  PHP 5.3
D.                  PHP
151.                      Which one of the following way can you embed PHP code in an HTML page?
A.                  <?php PHP code goes here ?>
B.                  <?PHP code goes here?>
C.                  <script language="php"> PHP code goes here </script>
D.                  All of the above
152.                      is php case sensitive?

153.                      Referential Integrity is directly related to
A.                  Relation Key
B.                  Foreign Key
C.                  Primary Key
D.                  Candidate Key
154.                      Consider a schema R(P,Q,R,S) and functional dependencies P->Q  and R->S. Then the decomposition R1(P,Q) and R2(R,S) is
A.                  Dependency Preserving and lossless join
B.                  Lossless join but not dependency preserving
C.                  Lossless Join
D.                  Dependency preserving but not lossless join



155.                      The normalization if 1 NF relations to 2NF involves
A.                  Removal of full dependencies
B.                  Removal of Transitive dependencies
C.                  Removal of partial dependencies
D.                  Removal of multivalued dependencies
156.                     


157.                      An attribute A of data type Varchar(20) has the value "Ram". the attribure of data type char(20) has value "Ramu". Here attribute A has --------- Spaces and attribute B ahs ----------------- spaces. 
  1.              3,4
  2.              20,4
  3.             20,20
  4.             3,20

162.                      E-R model uses this symbol to represent weak entity set.

163.                      Dotted Rectangle
164.                      Doubly Dotted Rectangle
165.                      Double lined Rectangle
166.                      Rectangle
167.                      Data mining is used to aid in
168.                      Operational management
169.                      analyzing past decision made by managers
170.                      detecting patterns in operational data
171.                      retrieving archival data

172.                      ------------- helps solve concurrency problem
173.                      two -phase commit
174.                      transaction serializablity
175.                      locking
176.                      transaction monitor
177.                      ------------------cursor are declared by ORACLE for each UPDATE, DELETE and INSERT SQL commands
178.                      internal
179.                      External
180.                      Implicit
181.                      Explicit






182.                     
 
183.                     











184.                     






1.      A class is declared  inside  a class but outside a method it is known as-----------------------
a.       Annoymous inner class
b.      Member inner class
c.       Local Inner Class
d.      Static nested Class




2.      JVM stands for

a.       Java Very Large Machine
b.      Java Verified Machine
c.       Java Very small machine
d.      Java Virtual Machine


3.      What type of constructor is used to provide different values to the distinct objects?
a.       Default constructor
b.      Parameterized Constructor
c.       Overloading Constructor
d.      None of the above
4.      How many types of controls does AWT support?
a.       7
b.      6
c.       5
d.      8
5.      Which type of inheritance one super-class have more than on sub-class
a.       Hierarchical inheritance
b.      single inheritance
c.       Multiple inheritances
d.      Multilevel inheritance


6.      Which  allows you to define one interface and have multiple implementations?
a.       Encapsulation
b.      inheritance
c.       Polymorphism
d.      None of the above


7.      which right shift operator preserves the sign of the value?
8.      ~


9.      What is  it called if an object has its own lifecycle and there is no owner?
A.                  Aggregation
B.                  Composition
C.                  Encapsulation
D.                  Association

10.  What is the return type of constructors ?
A.                  int
B.                  float
C.                  void
D.                  none of the mentioned

11.  Which of these is an incorrect array declaration ?
A.                  int arr[]=new int[5]
B.                  int[]arr=new int[5]
C.                  int arr[]=int[5] new
D.                  int arr[]=new int[5]
12.  ---------- is comparable to pair of persons in a room taking turns to speak with each other
A.                  Time Division Multiplexing
B.                  Frequency Division Multiplexing
C.                  Code Division Multiplexing
D.                  None of these
13.  Which one of the following error detecting code is also known as polynomial code?
A.                  Checksum
B.                  Parity
C.                  Cyclic Redundancy checks
D.                  None of these


14.  The encryption algorithm for WPA2 is based on
A.                  DES
B.                  AES
C.                  Elliptic Curve
D.                  EI Gamal
15.  ------------------ is used to divide physical network topology into different logical topologies
A.                  Wimax
B.                  WLAN
C.                  Adhoc Network
D.                  VLAN
16.  Which one of the following is not a Network layer  Protocol?
A.                  TCP
B.                  ICMP
C.                  ARP
D.                  DHCP
17.  Select the service which is not provided by the Transport Layer.
A.                  Congestion Control
B.                  Routing
C.                  Flow Control
D.                  Error Correction


18.  ----------------- is not a linux file system
A.                  Ext4
B.                  Jfs
C.                  XFS        
D.                  ReFS
19.  The IEEE standard for Wimax is
A.                  802.11
B.                  802.15
C.                  802.15.1
D.                  802.16
20.  ----------------- is not a web server
A.                  IIS
B.                  Apache
C.                  Firefox
D.                  Nginx
21.  A Denial of service attack against a network belongs to which of the following type of threat?
A.                  Modification
B.                  Interception
C.                  Interruption
D.                  None of these



22.  ---------------Caches web pages on the server hard disk so that they can be quickly retrieved later.
A.                  File Server
B.                  Proxy Server
C.                  Web Server
D.                  None of these
23.  --------------- is not an active attack in Nertwork Security
A.                  Traffic Analysis
B.                  Masquerade
C.                  Replay
D.                  Denial Of Service

24.  ----------- is an indication of the relative independence among the modules
A.                  Cohesion
B.                  Coupling
C.                  Pattern
D.                  Modularity
25.  The test-Case design technique that complements equivalence partitioning and leads to the selection of test cases at the edges of the class
A.                  Orthogonal array testing
B.                  Model-Based Testing
C.                  Boundary Value analysis
D.                  Condition testing
26.  The framework activity that presents software increment to the customer and includes delivery , support and feedback
A.                  Communication
B.                  Planning
C.                  Modeling
D.                  Deployment
27.  ----------------- structures a team loosely and depends on individual initiative of the team members.
A.                  Random paradigm
B.                  Open Paradigm
C.                  Closed Paradigm
D.                  Synchronous Paradigm
28.  The w5HH principle is suggested by
A.                  Reel
B.                  Grady Bosch
C.                  Liu
D.                  Barry Boehm
29.  A quality metric that provides benefit at both the project and process level is called
A.                  Defect Removal efficiency
B.                  FP
C.                  LOC
D.                  Use-Case Points

30.  The prioritized list of project requirements or features which provides business value for the customer
A.                  Sprints
B.                  Demos
C.                  Backlog
D.                  States
31.  ----------------- is an agile process  model that provides a framework for building and maintaining systems which meet tight time constraints through the use of incremental prototyping.
A.                  Adaptive Software Development
B.                  Dynamic systems development method
C.                  Scrum Model
D.                  Crystal
32.  The small and highly motivated and self-organizing project team is called-----------------
A.                  Stake holders
B.                  Team leaders
C.                  Agile
D.                  Mavericks
33.  --------------- is also called behavioral  testing, focuses on the functional requirements of the software.
A.                  Black box testing
B.                  White box Testing
C.                  Basis Path Testing
D.                  Data Flow Testing
34.  Used to show dynamic communications between objects during execution of a task
A.                  Class Diagram
B.                  Deployment Diagram
C.                  Use Case Diagram
D.                  Sequence Diagram
35.  A new technology that emphasizes the design of test cases before the creation of source code
A.                  Agile Process
B.                  Test- driven Development
C.                  Postmodern design
D.                  Model-driven Software Development
36.  Which is a technique in a java in which a class can have any number of constructors that differ  in parameter lists?
A.                  Constructor overloading
B.                  Method Overloading
C.                  Operator Overloading
D.                  None of the above
37.  Which method is used to change the name of thread?
A.                  Public string getName()
B.                  Public Void setName(String name)
C.                  Public  void getName()
D.                  Public String setName(sting name)
38.  Which statement provides an easy way to dispatch execution to different parts of your code based on the value of expression?
A.                  If
B.                  Switch
C.                  Nested-if
D.                  If-else-if
39.  Which keyword is used to make the classes and interface of another package accessible to the current package?
A.                  Import
B.                  Implements
C.                  Instanceof
D.                  None of the above
40.  Which method DataInputStream class reads a line from the file and returns it as a string?
A.                  WriteInt()
B.                  reading()
C.                  readLine()
D.                  writeDouble()
41.  Under which package is the string class encapsulated?
A.                  Java.awt
B.                  Java.util
C.                  Java.io
D.                  Java.lang
42.  Which of the following is a valid declaration of an object of class Box?
A.                  Box obj =new box()
B.                  Box obj = new Box
C.                  Obj=new Box()
D.                  new Box obj
43.  What is the output of this program?
Class selection_statements
{
Public static void main(string args[])
{
Int var1=5
Int var2=6
If (var 2==1)==var1)
System.out.prin(var2);
else
System.out.print(++var2)
}
}
A.    1
B.     2
C.     3
D.    4
44. A class member declared protected becomes a member of subclass of which type?
A.    Public Member
B.     Static Member
C.     Protected Member
D.    Private Member
45. Which of these is not a bitwise operator?
A &
B &=
C!=
Dless than= 
Thread priority in Java is
A.    Integer
B.      Float
C.     double
D.    long
46. Which of the method is a part of Abstract Window Toolkit (AWT)?
A.    Display()
B.     Paint ()
C.     drawString()
D.    Transient
44.  The ------------------- attribute of applet tag specifies the amount of horizontal blank space the browser should leave surrounding the applet
A)   SPACE=Pixel
45.  b) HSPACE=Pixel
46.  c)HWDTH=pixel
47.  e)HBLANK=pixel
48.  The --------------------method is defined by the AWT which cause the AWT runtime system to execute a call to your applet's update() method.
49.  A)Update()
50.  B)Paint()
51.  C)repaint()
52.  D)reupdate()
53.  -------------------------Package in java contents language utility classes such as vectors, hash, tables, random numbers data etc.
A)   Java.util
B)   Java.awt
C)   Java.net
54.  D. Java.lang
55.  HTML Stands for
56.  A)Hyper Text Markup Language
57.  B)Hyper Text Marking Lanuage
58.  C)Hyper Text MArkup Lists
59.  D)None of the above
60.  The capablity to store one object inside  another object is called
A)   Encapsulation
B)   Aggregation(Ans Key)
C)   Polymorphism
D)   Inheritance
61.  The capability to store one object inside  another object is called
A)   Encapsulation
B)   Aggregation(Ans Key)
C)   Polymorphism
D)   Inheritance
62.  Result of getAIIResponseHeaders() XMLHTTP Request method is
A)   Returns the complete set to HTTP headers as a string
63.  B)Returns the value of the specified HTTP header
64.  C) Both (A) and (B)
65.  D) None of the above
66.  WAMP Variant for MAC operating system is
A)   LAMP
B)   MAMP
C)   SAMP
D)   None of these
67.  DNS Comprises
A)   Domain Names and Name Server
B)   Domain Names and Domain Name Space
C)   Domain Names, Domain Name Space and Name Server
68.  Latest web browser of Microsoft
69.  A)Internet Explorer
70.  B)Opera
71.  C)Safari
72.  D)Edge
73.  TCP/IP Stands for
A)   Transmission control protocol/Internet Protocol
B)   Transfer Control Protocol/ Internet Protocol
C)   Both A and B
74.  Packet switching method is used in
A)   TCP
B)   UDP
C)   Both A and B
D)   None of these
75.  bWhich layer uses error control mechanism in  OSI?
76.  A)Network Layer
77.  b) Data Link Layer
78.  C) Tran spot Layer
79.  D) Application Layer
80.  ISDN is an exaple of --------------------network
81.  A)Circuit Switched Telephone Network
82.  B) Packet Switched Network
83.  C) Message Switched Network
84.  D) None of the above
85.  What is the maximum cable length of STP
86.  A)300 m
87.  B) 200 m
88.  c) 100 m
89.  D) 150 m
90.  Application layer uses the following protocols:
91.  A)SMTP
92.  B)FTP
93.  C)HTTP
94.  D)All of the above 
95.  To define style shee rules in header section of the HTML document called
A)   Externam Style Sheet
B)   Internal Style Sheet
C)   Inline style sheet
96.  None of the above
97.  The application server for Java Web Application is
A)   JBoss
B)   Glassfish
C)   Weblogic
98.  D)Tomcat
99.  The protocol used to send email from one to another
100.                      A)POP3
101.                      B)HTTP
102.                      c)SMTP
103.                      D)FTP
104.                      commonly used web application that make use of AJAX
A)   Google Map
B)   Yahoo Maps
C)   Gmail
105.                      D)All of the above
106.                      IIS stands for
A)   International information Standards
B)   International Information Services
C)   Internet Information Standards
107.                      D)Internet Information Services
108.                     
The attribute of an HTML tag can be used to uniquely identify any element within an HTML page is
A)   id
B)   Title
C)   Class
D)   Style
109.                      gA smalla area can use the following network
A)   LAN|
B)   WAN
C)   MAN
D)   None of the above
110.                      The attribute is used to specify the URL of the document that occupies the inline frame
A)   Frame
B)   Sup
111.                      c) Src
112.                      D) Span
113.                      HTML form control tag is
A)   File select boxes
B)   Text input controls
114.                      c) Checkboxes Controls
115.                      D)All of the above
116.                      Client software that is used for email retrieval
A)   IMAP
B)   HTTP
117.                      C)DHCP
118.                      D)ICMP
119.                      bThe number of sub keys generated by IDEA algorithm is
A)   64
B)   32
C)   54
D)   52
120.                      ---------------- is an example of public key algorithm?
A)   DES
121.                      B)RSA
122.                      C)IREA
123.                      bD)RCS
124.                      DSS Signature uses which hash algorithm?
A)   MD5
B)   SHA-1
C)   SHA-2
D)   Does not use hash algorithm
125.                      In asymmetric key cryptography the private key is kept by
A)   Sender
B)   Receiver
C)   Sender and receiver
D)   Cryptoanalyst
126.                      What is Data Encryption Standard (DES) ?
A.                  Block Cipher
B.                  Stream Cipher
C.                  Bit Cipher
D.                  None of the above
127.                      In Cryptography , the order of the letters in a message is rearranged by
A.                  Transposition Ciphers
B.                  Substitution Ciphers
C.                  Both A and B
D.                  None of the above

128.                      Using RSA algorithm,  What is the value of cipher text C, If the plain text M=5 and P=3 , q=11 and d=7
A.                  24
B.                  25
C.                  26
D.                  32

129.                      ---------------- is used for hiding the payment information from the merchant
A.                  SET
B.                  SSL
C.                  SHTTP
D.                  TSP
130.                      The URL Property belongs to which of the following object?
A.                  Document
B.                  Element
C.                  Location
D.                  Event
131.                      Which of the following attribute can hold the JavaScript version?
A.                  Language
B.                  Script
C.                  Version
D.                  None of the above
132.                      Which event occurs when user click on an HTML element?
A.                  onclick()
B.                  onmouceclick()
C.                  onchange()
D.                  onmouseover
133.                      <Script language ="javascript">
134.                      function x()
135.                      {
136.                      Document.write(2+0+"4");
137.                      }
138.                      </scipt>
A.                  204
B.                  2
C.                  Error
D.                  24
139.                      What is the value of $a and $b after the function call ?
140.                      <?php
141.                      function doSomething(&$arg)
142.                      {
143.                      $fruit=$arg;
144.                      $arg +=1;
145.                      return $fruit;
146.                      }
147.                      $a=3;
148.                      $b=doSomething($a);
149.                      ?>
A.                  a is 3 and b is 4
B.                  a is 4 and b is 3
C.                  both are 3
D.                  both are 4
150.                      which version of PHP was added with Exception handling?
A.                  PHP 4
B.                  PHP 5
C.                  PHP 5.3
D.                  PHP
151.                      Which one of the following way can you embed PHP code in an HTML page?
A.                  <?php PHP code goes here ?>
B.                  <?PHP code goes here?>
C.                  <script language="php"> PHP code goes here </script>
D.                  All of the above
152.                      is php case sensitive?

153.                      Referential Integrity is directly related to
A.                  Relation Key
B.                  Foreign Key
C.                  Primary Key
D.                  Candidate Key
154.                      Consider a schema R(P,Q,R,S) and functional dependencies P->Q  and R->S. Then the decomposition R1(P,Q) and R2(R,S) is
A.                  Dependency Preserving and lossless join
B.                  Lossless join but not dependency preserving
C.                  Lossless Join
D.                  Dependency preserving but not lossless join



155.                      The normalization if 1 NF relations to 2NF involves
A.                  Removal of full dependencies
B.                  Removal of Transitive dependencies
C.                  Removal of partial dependencies
D.                  Removal of multivalued dependencies
156.                     


157.                      An attribute A of data type Varchar(20) has the value "Ram". the attribure of data type char(20) has value "Ramu". Here attribute A has --------- Spaces and attribute B ahs ----------------- spaces. 
  1.              3,4
  2.              20,4
  3.             20,20
  4.             3,20

162.                      E-R model uses this symbol to represent weak entity set.

163.                      Dotted Rectangle
164.                      Doubly Dotted Rectangle
165.                      Double lined Rectangle
166.                      Rectangle
167.                      Data mining is used to aid in
168.                      Operational management
169.                      analyzing past decision made by managers
170.                      detecting patterns in operational data
171.                      retrieving archival data

172.                      ------------- helps solve concurrency problem
173.                      two -phase commit
174.                      transaction serializablity
175.                      locking
176.                      transaction monitor
177.                      ------------------cursor are declared by ORACLE for each UPDATE, DELETE and INSERT SQL commands
178.                      internal
179.                      External
180.                      Implicit
181.                      Explicit






182.                     
 
183.                     











184.