System Analyst/Programmer KPSC 021/2018

 

       Multiple regression is used

A:-To predict scores on an independent variable from scores on multiple dependent variables

B:-To predict scores on an dependent variable from scores on multiple dependent variables

C:-To predict scores on an dependent variable from scores on multiple independent variables

 

D:-To predict scores on an independent variable from scores on multiple independent variables

Correct Answer:- Option-C


         Which of the following is not true when conducting multiple regression?

A:-Data must be free from outliers for a multiple regression

 B:-Data must be heterogeneous for a multiple regression

C:-Multiple regressions can be used to access linear relationships

D:-Data must be normally distributed for multiple regressions

Correct Answer: - Option-B


As compared to TTL, CMOS logic has

A:-Higher speed of operation

B:-Higher Power

C:-Smaller physical size

D:-All of the above

 Correct Answer:- Option-C

 Pin 21 of 8086 microprocessor is used for the signal

 A:-READY

B:-ALE

C:-RESET

 D:-QS1

Correct Answer:- Option-C 

Assume that the following jobs are to be executed on a single processor system

 

Job identifier

CPU-Burst Time

P1

4

P2

1

P3

8

P4

1

P5

2

 

The jobs are assumed to have arrived at time 0 and in the order P1, P2, P3, P4, P5. Calculate the departure completion time for job P1 if scheduling is round robin with time slice 1.

A:-4

B:-10

C:-12

D:-11

Correct Answer:- Option-D



          The Banker's algorithm is used

A:-To prevent deadlock in operating systems

 B:-To detect deadlock in operating systems

C:-To avoid deadlock in operating systems

 D:-All of the above

Correct Answer:- Option-C 


        The performance of a digital computer improves when its RAM size increases. This is because

A:-Size of virtual memory increases

B:-Number of page faults are less

C:-Larger RAMS are very faster

D:-Number of segment faults are less

Correct Answer:- Option-B 

 

 Multiplier Quotient register is placed in

A:-Main Memory

B:-CPU

C:-I/O Equipment

D:-None of these

Correct Answer:- Option-B


Which of the following is/are not true in contiguous allocation of disk space?

 A:-Size of the file is to be declared in advance

B:-There is no external fragmentation

C:-Difficulty in finding space for a new file

 D:-Both 2 and 3

Correct Answer: - Option-B

 Interrupt latency for real time OS should be

A:-Maximum

B:-Zero

C:-Minimal

D:-None of the above

 Correct Answer:- Option-C


Which of the following is an invalid shell variables?

A:-india_15

B:-_15_india

 C:-15_india

D:-Both 2 and 3

Correct Answer:- Option-C 


The output of the following shell programming is var_1 = good

Readonly var_1 var_1= morning echo $var_1 exit 0

A:-good

B:-morning

C:-program will generate an error message

D:-none of the above

Correct Answer:- Option-A 

The time complexity of building a heap with 'n' elements is A:-O(n)

B:-O(log n)

C:-`O(n^2)`

D:-O(n log n)

Correct Answer:- Option-A 


Which of the following is false regarding AVL trees?

A:-AVL tree is more balanced than binary search tree

B:-AVL tree is more space efficient than binary search tree

 

C:-AVL tree is more time efficient than binary search tree

 

D:-None of the above

Correct Answer:- Option-B 



:-What is the worst case complexity of quick sort?

A:-O(n log n)

B:-O(n)

C:-`O(n^2)`

D:-O(log n)

Correct Answer:- Option-C 


   Which data structure can be used to efficiently implement dijkstra's algorithm?

A:-Double ended queue B:-Priority queue

C:-Stack

D:-Binary search tree

 

Correct Answer:- Option-B 

          Which data structure is well suited for separate chaining?

A:-Singly linked list 

B:-Doubly linked list

C:-Circular linked list

D:-Binary trees

Correct Answer:- Option-B


In the following code, how many times the program will print "Hello"?

 

#include<stdio.h> int main()

{

printf("Hello"); main();

return 0;

}

A:-Infinite times

B:-32767 times

C:-65535 times

D:-till stack overflows

Correct Answer:- Option-D

 What will be output if you will compile and execute the following c code?

#include "string.h"

void main()

{

printf("%d%d",sizeof("program"),strlen("program")); getch();

}

A:-8 7

B:-7 8

C:-8 8

D:-7 7

Correct Answer:- Option-A 

 

 Predict the outputs of following C program. int main()

{

int x = -20; while (x++ !=1); printf("%d", x); return 0;

}

A:-2

B:-1

C:--1

D:-infinite

Correct Answer:- Option-A


What is the return type of malloc()?

A:-void*

B:-pointer of allocated memory type

C:-void**

D:-int*

Correct Answer:- Option-A 



What does the following declaration mean?

 int (*ptr)[20];

A:-ptr is array of pointers to 20 integers

B:-ptr is a pointer to an array of 20 integers

C:-ptr is an array of 20 integers

D:-None of these

Correct Answer:- Option-B



If class C is derived from another class B which is derived from class A, which class will have minimum level of abstraction?

A:-Class A

B:-Class B

C:-Class C

D:-All have same level of abstraction

Correct Answer:- Option-C 


        Which of the following statement is false?

 A:-An abstract class is a class which cannot be instantiated

B:-Creation of an object is not possible with abstract class but it can be inherited

 C:-An abstract class can contain only Abstract method

D:-None of these

Correct Answer:- Option-D

 Which is the necessary condition for virtual function to achieve late binding?

A:-Virtual function is to be accessed with direct name

B:-Virtual functions is to be accessed using base class object only

C:-Virtual function is to be accessed using pointer or reference

D:-Virtual function is to be accessed using derived class object only

Correct Answer:- Option-C


Operator overloading is

A:-Making c++ operator works with objects

 B:-Giving new meaning to existing operator

 C:-Adding operation to the existing operators

 D:-All the above

Correct Answer:- Option-C


What are all the operators that cannot be overloaded?

A:-Scope Resolution (::)

B:-Member Selection (.)

C:-New operator (new)

D:-Both 1 and 2

Correct Answer:- Option-D 

   Which two of the following methods are defined in class Thread?

A:-Start and wait

B:-Start and run

C:-Wait and notify

 D:-Start Only

Correct Answer:- Option-B 


          Which of these class object cannot be used to form a dynamic array in JAVA?

A:-ArrayList

B:-Map

C:-Vector

D:-ArrayList and Vector

Correct Answer:- Option-B 


Predict the output of the following code

 

public class Check

{

public static void main(String args[])

{

String s1 = "test";

String s2 = new String(s1);

System.out.println(s1==s2);

}

}

A:-true

B:-false

C:-0

D:-test

Correct Answer:- Option-B 

 

 

 In java applet programs, the applet life cycle functions are called in which order?

A:-start(), init(), paint(), destroy(), stop()

B:-init(), run(), start(), stop(), destroy()

C:-init(), start(), paint(), stop(), destroy()

D:-start(), run(), paint(), destroy(), stop()

Correct Answer:- Option-C


 

The three notion of java virtual machine are

A:-class, object, variable

B:-specification, implementation, instance

 C:-primitive, referential, user defined

D:-byte code, object code, executable

 Correct Answer:- Option-B


Collection of entities that have the same attributes are called

 A:-Domain

B:-Value set 

C:-Entity set

D:-Entity type

Correct Answer:- Option-D 

Which of the following key is related with referential integrity constraint?

A:-Primary key

B:-Candidate key 

C:-Foreign key

D:-Super key

Correct Answer:- Option-C 

Consider the following table of data r(R) of the relation schema R(XYZ)

 

  Z

x1 y1  z1 x2 y1  z1 x3 y2 z1

 

Which of the following functional dependency sets are valid

 A:-X->Y, Y->Z, Z->X

B:-X->Y, X->Z, Y->Z

C:-Both 1 and 2

D:-None of the above

Correct Answer:- Option-B

 

The SQL aggregate function that returns number of values in a given column is

A:-count( )

B:-count(*)

C:-sum( )

D:-All of the above

 Correct Answer:- Option-A 


Which of the following construct returns true if a given tuple is not present in the subquery

 

A:-exists

B:-not present

 C:-not exists

D:-none of the above

Correct Answer:- Option-C 


What will be the output of the following query?

CREATE EmployeeView VIEW AS SELECT nothing FROM Employee 

WHERE ID < 100

A:-EmployeeView will be created with no columns

B:-EmployeeView will be created with column nothing

C:-Syntax error

D:-None of the above

Correct Answer:- Option-C

Consider a relation A with m rows and relation B with n rows. How many rows will be generated if A × B is performed?

A:-m

B:-m + n 

C:-m - n

D:-m * n

Correct Answer:- Option-D 

      is the statement which specifies when the trigger is to be executed.

A:-From

 

B:-Where

 

C:-When

D:-None of the above

 

Correct Answer:- Option-C

 Which of the following is true about Atomicity?


A:-Smallest unit of transaction

B:-Either all of its operations are executed or none

 C:-Atleast one of the operation should be executed

D:-All of the above

Correct Answer:- Option-B 

Which of the following differentiates Two-Phase Locking with Strict Two-Phase Locking in Concurrency control?

A:-Release locks after usage

B:-Release locks at commit 

C:-Cascading aborts

D:-None of the above 

Correct Answer:- Option-B 

The middle layer of a three layer client/server architecture is called

A:-Presentation layer

B:-Application layer 

C:-Database layer

D:-None of the above Correct 

Answer:- Option-B

           Which of the following element in CSS allows authors to use external style sheets in their pages?

A:-position 

B:-span

C:-extern 

D:-link

Correct Answer:- Option-D 

Which of the following object displays prompt dialog in JavaScript?

A:-alert

B:-prompt

C:-document

D:-window

Correct Answer:- Option-D 

 A technology for locating information in an XML document is

A:-xPath

B:-XSL

C:-MathML

D:-All of the above

Correct Answer:- Option-A

 The method used in PHP to transfer binary data from client to server is

A:-GET

B:-POST

C:-Both 1 and 2

D:-None of the above

Correct Answer:- Option-B

Which object in AJAX applications manage asynchronous interaction with the server?

A:-HttpURLConnection

B:-HttpRequest

C:-XMLHttpRequest

D:-All of the above 

Correct Answer:- Option-C 

Cross-Site Scripting attacks are normally initiated by

A:-Web Client

B:-Web Server 

C:-Both 1 and 2

D:-None of the above 

Correct Answer:- Option-A 

Which of the following in ASP.NET is a data source control method?

A:-ExecuteReader 

B:-SqlDataReader 

C:-SqlCommand

D:-SqlConnection

Correct Answer:- Option-D 

 Which of the following function is used to exit from a PHP Script?

A:-exit( )

B:-die( )

C:-both 1 and 2

D:-none of the above

Correct Answer:- Option-C

Which one among the following is a private IP address?

A:-11.0.0.1

B:-168.172.29.41

C:-172.15.24.33

D:-192.168.24.40

Correct Answer:- Option-D 

Which layer in the TCP/IP stack is equivalent to the Transport layer in the OSI model?

A:-Application

B:-Host-to-Host

C:-Internet

D:-Network Access

 Correct Answer:- Option-B 

Which among the following describes the DHCP Discover message?

 It uses FF:FF:FF:FF:FF:FF as a layer 2 broadcast

It uses UDP as the Transport layer protocol

It uses TCP as the Transport layer protocol

It does not use a layer 2 destination address

 A:-i only

B:-i and ii

C:-iii and iv

D:-iv only

Correct Answer:- Option-B 


Among the following IP address classes, which one provides a maximum of only 254 host addresses per network ID?

A:-Class A

B:-Class

 B C:-Class

C D:-Class D

Correct Answer:- Option-C 

You have an IP address of 172.16.13.5 with a 255.255.255.128 subnet mask. What is your class of address, subnet address, and broadcast address?

A:-Class A, Subnet 172.16.13.0, Broadcast address 172.16.13.127

 B:-Class B, Subnet 172.16.13.0, Broadcast address 172.16.13.127

C:-Class B, Subnet 172.16.13.0, Broadcast address 172.16.13.255

D:-Class B, Subnet 172.16.0.0, Broadcast address 172.16.255.255

Correct Answer:- Option-B 

You have an interface on a router with the IP address of 192.168.192.10/29. Including the router interface, how many hosts can have IP addresses on the LAN attached to the router interface?

A:-32

B:-30

C:-8

D:-6

Correct Answer:- Option-D 

Which of the following is true about HTTP headers and connection management?

A:-All HTTP responses must either close a connection or include a Content-Length:header to signify to end of a HTTP response body

B:-The Host : field in HTTP allows the same web server to server content for multiple domains

C:-When transferring many small Web objects, the only performance difference between persistent and non-persistent HTTP connections is related to connection establishment

D:-HTTP headers have a fixed size

 

Correct Answer:- Option-B 

 

 Which of the following about UNIX socket programming is true?

 

When a TCP sender calls close(), the network stack immediately sends a FIN packet to its peer

send() on a TCP socket causes a sender to a generate a TCP/IP packet and send it out the appropriate network interface

accept() returns when the receiver completes the three-way TCP handshake

The return value of recv() specifies the number of bytes read from a socket, or if the socket was closed or an error was encountered

A:-i only

 

B:-i and ii

C:-iii and iv

 

D:-iv only

Correct Answer:- Option-C


COCOMO stands for

A:-Consumed Cost Model 

B:-Constructive Cost Model 

C:-Common Control Model 

D:-Composition Cost Model 

Correct Answer:- Option-B 

Which of the following is not defined in a good Software Requirement Specification (SRS) document?

A:-Functional Requirement

B:-Nonfunctional Requirement C:-Goals of implementation

D:-Algorithm for software implementation 

Correct Answer:- Option-D 

Software process and improvement are assessed by

 

A:-ISO 9000

B:-ISO 9001

C:-SPICE (ISO/IEC15504)

D:-Both 2 and 3

Correct Answer:- Option-D 

CMM model in Software Engineering is a technique of 

A:-Develop the software

B:-Improve the software process 

C:-Improve the testing process

D:-All of the above

Correct Answer:- Option-B 

 Alpha and Beta Testing are forms of

 

A:-Acceptance testing

B:-Integration testing

 

C:-System testing

D:-Unit testing

Correct Answer:- Option-A

Coupling and cohesion can be represented using a

A:-cause-effect graph

B:-dependence matrix

C:-structure chart

D:-SRS

Correct Answer:- Option-B

 The tests that run every night during the project development or before a programmer checks in any changes to the global repository are normally characterized as

A:-Integration tests

 

B:-Regression tests

 

C:-Validation tests

 

D:-System tests

Correct Answer:- Option-B



Which of the following reason is valid ones for choosing a top-down process?

A:-Developers can present a demo of the project to the management faster than using a bottom-up process

 

B:-A top-down process is more time consuming because of the unit tests

C:-In a top-down design, if an error is detected its always because a lower-level module is not meeting its specifications (because the higher-level ones are already been tested)

D:-A top-down process makes it possible to detect performance problems faster

 

Correct Answer:- Option-A

Question99:-Consider the following statements

 

Bottom-up testing is not an effective way to reveal architectural design flaws.

Top-down testing can be time-consuming, because you need to write stubs for many modules.

 

A:-Only (i) is true

B:-Only (ii) is true

C:-Both (i) and (ii) are true

 

D:-Both (i) and (ii) are false

 

Correct Answer:- Option-C

Consider the following statements

 When designing tests, if partitions are chosen perfectly, there is no point to testing boundary values near the edges of the partition.

Glass-box tests designed for one implementation are valid to use when testing another implementation

 

. A:-Only (i) is true

B:-Only (ii) is true

C:-Both (i) and (ii) are true

 

D:-Both (i) and (ii) are false

 

Correct Answer:- Option-C

  

Comments