Multiple Choice Questions
Tick the best alternatives:
1. All the candidate remaining candidate key which are not selected as a
primary key are called ……………
a) Foreign Key
b)
Compound Key
c) Alternate Key
d)
Composite Key
2. Which of the following statements is true about the star topology?
a) Each device is connected to a switch or hub
b) Each device is connected to each
other.
c) Each device is connected to a terminal
d) Each device is connected to trunk.
3. Which query is used to delete a table.
a) DROP TABLE
b) DELETE TABLE
c) REMOVE TABLE
d) RD TABLE
4. The …………. Layer establishes and terminates a connection between two
physically connected nodes on network.
a) transport
b)
session
c) data link
d)
physical
5. Which of the following method sends input to a script via a URL?
a) Get
b)
Post
c) onfocus
d)
RMI
6. The process of creating multiple classes from an existing class is called ……….. inheritance.
a) single
b) multiple
c) hierarchical
d) multilevel
7. The data flow diagram (DFD) shows;
a) the flow of data
b) the processes
c) the areas where they are stored
d) All of the above
8. The primary objectives of system designs is:
a) design the programs,
databases and test plans
b) design only
the user interface
c) implement the
system
d) find out how the system will
perform
9. Which of the following is the component of AI?
a) Learning
b) Training
c) Designing
d)
Puzzling
10. What would be the output of following C code?
#include <stdio.h>
int f(int x)
{
return x;
}
int main ()
{
f(7);
f(8);
printf("%d", f(9));
return 0;
}
a) 789
b) 9
c) 0
d)
8
In the given C code, the function f simply returns
the value it receives as input. In the main function, the function f is called
three times with arguments 7, 8, and 9 respectively. However, the return values
of these function calls are not being printed or stored anywhere.
10. ___________ is not the data type of MS Access.
a) Number
b)
Text
c) Memo
d) Form
11. _______ refers to the sending, receiving and processing of information.
a) Computer
b) Communication
c) Software
d)
Program
12. Which one is not a network topology?
a) Star
b)
Ring
c) Client/Server
d)
Bus
13. Which one is a bounded media?
a) Fiber optic
b)
Microwave
c) Laser Transmission
d)
Infrared transmission
14. ____ is a reserved word that has standard and predefined meaning in C.
a) Variable
b)
Identifier
c) Keyword
d)
None of the above
15. Collection of different data types in C
a) Array
b)
Structure
c) Both (a) and (b)
d)
None of them
16. OOP stands for ___________
a) Operator Overloading Program
b)
Object Overloading Program
c) Optimum Oriented Program
d) Object Oriented Programming
17. SDLC stands for __________
a) Scheme Development Life
b) Software Development Life Cycle
c) System Design Life Cycle
d)
All
18. Which of the following symbol represents the processing task?
a) Oval
b)
Parallelogram
c) Diamond
d) Rectangle
19. In which normal form of database, atomicity is introduced?
A) First
B) Second
C) Third
D) Fourth
20. Which of the following techniques is not implemented to protect a database?
A) Rollback
B) Backup
C) Recovery
D) Firewall
21. Which one of the following SQL commands is executed to display all the records having a second letter in the LNAME (LAST NAME) as “A” from the customer table?
A) SELECT * FROM CUSTOMER WHERE LNAME LIKE “?A%”;
B) SELECT * FROM CUSTOMER WHERE LNAME LIKE “_A%”;
C) SELECT * FROM CUSTOMER WHERE LNAME LIKE “A%”; D)
SELECT * FROM CUSTOMER WHERE LNAME LIKE “%A”;
22. Which of the following is an incorrect IP address?
A) 192.168.0.1
B) 192.168.1
C) 172.255.0.0
D) 202.10.79.4
23. Which of the following is a server-side scripting language?
A) JavaScript
B) MySql
C) PHP
D) Jquery
24. Which of the following keywords are used to declare a variable in JavaScript?
A) int or var
B) float or let
C) var or let
D) char or var
25. Which of the following commands is executed in PHP to concatenate the variables $x with $y?
A) $x + $y
B) $x=$y
C) concat ($x,$y)
D) $x.$y
26. Which statement is incorrect about the object-oriented approach?
A) Emphasis is on data rather than procedure.
B) Data is hidden and cannot be accessed.
C) Objects communicate through functions.
D) It supports abstract data but not the class.
27 Which of the following feasibility study is concerned with cost benefit analysis?
A) Technical feasibility
B) Economic feasibility
C) Operational feasibility
D) Schedule feasibility
28. With SQL, how do you select all the records from a table named “Persons” where the value of the column “FirstName” ends with an “a”
a) SELECT * FROM Persons WHERE FirstName=’a
b) SELECT * FROM Persons WHERE FirstName LIKE ‘a%’
c) SELECT * FROM Persons WHERE FirstName LIKE ‘%a’
d) SELECT * FROM Persons WHERE
FirstName=’%a%’.