Thursday, 8 February 2018

HSST Computer Science Junior Solved Paper 016/2018 - Part 4

61.       Which among the following is the programmable DMA controller in 8086?
(A) 8259
(B) 8257
(C) 8251
(D) 8250
Answer: B
62.       In cyclomatic complexity, if E is the number of edges and N is the number of nodes, V(G), for a flow graph is defined as:
(A) E−N+2
(B) E−N−1
(C) E+N−2
(D) E+N−1
Answer: C
63.       Which among the following is the risk driven process model?
(A) Prototyping
(B) Spiral model
(C) Component based development
(D) Waterfall model
Answer: C
64.       Which testing method is normally used as the acceptance test for a software system?
(A) Unit testing
(B) Integration testing
(C) Functional testing
(D) Regression testing
Answer: B
65.       Application like Banking and Reservation require which type of operating system:
(A) Hard real time
(B) Soft real time
(C) Real time
(D) Time sharing
Answer: B
66.       Preemptive scheduling is the strategy of temporally suspending a running process:
(A) To avoid collision
(B) When it request i/o
(C) Before the CPU time slice expires
(D) None of the above
Answer: C
67.       Time for the disk, rotate to the start of the desired sector is known as:
(A) Seek time
(B) Transfer time
(C) Latency time
(D) Access time
Answer: C
68.       Mutual exclusion problem occurs between:
(A) Process that share resources
(B) Process use not the same resources
(C) Two disjoint process that do not interact
(D) None of the above
Answer: A
69.       PNG stands for:
(A) Packet network graphics
(B) Portable network graphics
(C) Protocol for network graphic
(D) None of the above
Answer: B
70.    The maintenance activity to find and fix error during operation of error is:
(A) adaptive maintenance
(B) corrective maintenance
(C) perfective maintenance
(D) preventive maintenance
Answer: B
71.    Which method uses small increments with minimum planning and iterations are short time frames?
(A) Water fall model
(B) Spiral model
(C) Agile model
(D) Prototype model
Answer: B
72.    Telnet is a:
(A) Remote login
(B) Television network
(C) Network of telephone
(D) None of the above
Answer: A
73.    Trends to outsource IT functions t other countries is known as:
(A) Outer outsourcing
(B) External outsourcing
(C) Foreign outsourcing
(D) Offshore outsourcing
Answer: D
74.    Which of the following method of channelization are used for mobile data internet working?
(A) Time division multiple access
(B) Frequency division multiple access
(C) Code division multiple access
(D) All of the above
Answer: D
75.    Honey pot is an example for:
(A) Security auditing software
(B) Encryption−decryption software
(C) Intrusion−detection software
(D) Virus
Answer: C
76.    ‘Hibernate’ in Windows XP/Windows 7 means:
(A) Shutdown the computer without closing the running application
(B) Shutdown the computer terminating all running applications
(C) Restart the computer
(D) Restart the computer in safe mode
Answer: A
77.    The UNIX Shell is:
(A) A command line interpreter
(B) Set of user commands
(C) A GUI interface
(D) All of the above
Answer: A
78.    If every non key attribute is functionally depend on primary key, then the relation will be:
(A) First normal form
(B) Second normal form
(C) Third normal form
(D) Fourth normal form
Answer: C
79.    An attribute of one table is matching the primary key of another table, is known as:
(A) Secondary key
(B) Foreign key
(C) Candidate key
(D) Composite key
Answer: B
80.    In relational model, tuple is equivalent to:
(A) Record
(B) Table
(C) File
(D) Field
Answer: A

Pages   2   3   4   5 


Post a Comment