+ All Categories
Home > Documents > Department: BSC.IT Exam Type: Regular Semester: III ...

Department: BSC.IT Exam Type: Regular Semester: III ...

Date post: 10-Dec-2021
Category:
Upload: others
View: 7 times
Download: 0 times
Share this document with a friend
54
Department: BSC.IT Exam Type: Regular Semester: III Subject: PYTHON PRGRAMMING
Transcript

Department: BSC.IT

Exam Type: Regular

Semester: III

Subject: PYTHON PRGRAMMING

1. Which of the following is an invalid variable?

a) variable1

b) var

c) var_name

d) 1variable

2. Which of the following can be a variable?

a) for

b) in

c) while

d) 123in

3. Which is the correct operator for power (XY)?

a) X??y

b) X**Y

c) X^^y

d) X*Y

4. What is the answer to this expression, 53%24 is?

a) 2.20833333

b) 5

c) 2.20

d) 2

5. What is the output of this expression, 5*1**5?

a) 25

b) 75

c) 5

d) 1

6. What error occurs when you execute the following Python code snippet?

apple = mango

a) SyntaxError

b) NameError

c) ValueError

d) TypeError

7. How many keywords are in python?

a) 45

b) 30

c) 33

d) 27

8. What is the latest version of python?

a)3.8.0

b)3.9.0

c)3.7.6

d)3.8.5

9. Which of the following is not feature of python?

a) easy to code

b) statically typed language

c) free and open source

d) high level language

10. Which of the following results in a SyntaxError?

a) ‘‛Once upon a time<‛, she said.’

b) ‚He said, ‘Yes!'‛

c) ‘3\’

d) ‛’That’s okay‛

11. In Python, ______are a self-contained block of statements that perform single

logical task

A. Recursion

B. variable

C. loop

D. Function

12. In Python which keyword is used to start Function?

A. function

B.def

C. try

D. import

13. Python was released publicly in

A. 1941

B. 1971

C. 1981

D. 1991

14. Which of the following function converts the strings to all upper case?

A. upper()

B. title()

C. isdecimal()

D. lower ()

15. What will be the output of below Python code? str1="Application"

str2=str1.replace('a', 'A')

print(str2) application

A. Application

B. ApplicAtion

C. application

D. VIEW

16. Which of the following function headers is correct?

A. def fun (a = 2, b = 3, c)

B. def fun (a = 2, b, c = 3)

C. def fun (a, b = 2, c = 3)

D. def fun (a, b, c = 3, d)

17. To use sqrt() functions we need to import_______module.

A. GUI

B. Database

C. math

D. mathematics

18. In Python which is the correct method to load a module?

A. include math

B. import math

C. #include math.h

D. using math

19. Which Function is used to open the file for reading in python?

A. fopen(filename, mode)

B. open(filename, mode)

C. openfile(filename, mode)

D. open_file(filename, mode)

20. Which of the following items are present in the function header?

a) function name

b) parameter list

c) return value

d) Both A and B

21. Files are used to permanently store data in a

______________________memory.

A. Volatile

B. Non-volatile

C. RAM

D. ROM

22. To open the file which method is used?

A. Read( )

B. Write( )

C. Open( )

D. Append( )

23. To open a file which is the correct syntax?

A. F=open(‚file_name‛)

B. F=open(‚mode‛)

C. F=open(‚mode,‛file_name‛)

D. F=open(‚file_name‛,mode)

24. The attribute file.closed is used for:

A. Returns true if file is closed & false otherwise

B. Returns only true

C. Returns only false

D. Returns false if file is closed & true otherwise

25. Which function returns the complete file as a list of string each separated by

\n?

A. Readline( )

B. Readlines( )

C. Read( )

D. Readl( )

26. Which method returns or tell the current cursor position within the file.

A. Seek( )

B. Tell( )

C. Cursor( )

D. Position( )

27. Which method change the current file position?

A. Seek( )

B. Tell( )

C. Cursor( )

D. Position( )

28. To work with files and directories which module need to be imported?

A. Import system

B. Import operating system

C. Import os

D. Import platfom

29. Which OS module is used to create directories in the current path?

A. Mkdir( )

B. os.mkdir( )

C. os.dir( )

D. rmdir( )

30. Which OS module is used to change the current path to another?

A. os.chgdir( )

B. os.chdir( )

C. os.changedir( )

D. os.cdir( )

31. What is the function of thread.join( ) in multithreading?

A. Merging of two threads

B. Add the threads to a pool

C. Waits for the thread to finish

D. Restricts access to the resources

32. Python support which of the following thread.

A. Operating System

B. User interface

C. Main thread

D. User-space

33. Kernel thread are a part of ___________________.

A. Interface

B. Operating system

C. Outside kernel

D. Command line

34. User space threads are implemented _____________ of the kernel.

A. Outside

B. Inside

C. Interface

D. Command line

35. threading.activeCount( ) returns the number of ______________thread objects.

A. Passive

B. Active

C. Dormant

D. Closed

36. Which thread method returns the number of thread objects in the caller’s

thread control.

A. threading.activeCount( )

B. threading.currentThread( )

C. threading.enumerate( )

D. threading.passiveCount( )

37. Which method is entry point for a thread?

A. Run( )

B. Start( )

C. Join( )

D. isAlive ( )

38. Which method check whether a tread is still active?

A. Run( )

B. Join( )

C. Start( )

D. isAlive( )

39. The new lock is created using _________method.

A. New lock( )

B. Lock( )

C. Thread.lock( )

D. Join.lock( )

40. Which method returns the number of items that are currently in the queue?

A. Empty( )

B. Full( )

C. Qsize( )

D. isAlive( )

41. Config() in Python Tkinter are used for

A. destroy the widget

B. place the widget

C. change property of the widget

D. configure the widget

42. For what purpose, the bg is used in Tkinter widget?

A. To change the direction of widget

B. To change the size of widget

C. To change the color of widget

D. To change the background of widget

43. How we install tkinter in system ?

A. pip install python

B. tkinter install

C. pip install tkinter

D. tkinter pip install

44. Minimum number of argument we pass in a function to create a rectangle using

canvas tkinter?

A. 2

B. 4

C. 6

D. 5

45. Minimum number of argument we require to pass in a function to create a line?

A. 2

B. 4

C. 6

D. 8

46. Screen inside another screen is possible by creating

A. Another window

B. Frames

C. Buttons

D. Labels

47. To change the color of the text in the Button widget, what we use?

A. bg

B. fg

C. color

D. cchng

48. To change the property of the widget after the declaration of widget, what we use?

A. mainloop() function

B. config() function

C. pack() function

D. title() function

49. To delete any widget from the screen which function we use?

A. stop()

B. delete()

C. destroy()

D. break()

50. What is the correct syntax of destroy in tkinter?

A. destroy(object)

B. object.destroy()

C. object(destroy)

D. delete(object)

Answer Key

Q.NO ANSWER Q.NO ANSWER Q.NO ANSWER Q.NO ANSWER Q.NO ANSWER

1 d 11 d 21 b 31 d 41 c

2 d 12 b 22 b 32 a 42 d

3 b 13 d 23 a 33 d 43 c

4 b 14 a 24 b 34 b 44 b

5 c 15 c 25 a 35 b 45 a

6 b 16 c 26 b 36 c 46 b

7 c 17 c 27 a 37 b 47 b

8 b 18 b 28 c 38 a 48 b

9 b 19 b 29 a 39 a 49 c

10 c 20 d 30 b 40 c 50 b

Department: BSC.IT

Exam Type: Regular

Semester: III

Subject: Data Structures

1. _______ is raw, unorganized facts that need to be processes.

A. Information

B. Data

C. File

D. Database

2. Datatype is an attribute which tells ______ or _______ on how programmer wants to use

data.

A. Keyboard, monitor

B. Input, output

C. Compiler, interpreter

D. Libraries, Macros

3. _______ feature will allow providing data and operations together

A. Lists

B. Set

C. Encapsulation

D. Polymorphism

4. ___________ data structures will have fixed memory allocation and memory taken by

them cannot be increased or decreased at runtime

A. Linear

B. Static

C. Homogeneous

D. Logical

5. ___________ data structures will store data of similar type.

A. Non-Linear

B. Dynamic

C. Homogeneous

D. Physical

6. ____________ will store and sort the data in contiguous block within files on disk.

A. Sequential

B. Binary

C. Random

D. Direct Access

7. Data structures work in _________memory location

A. ROM

B. SDD

C. RAM

D. Tapes

8. ____________ is an operation of data structure where every element is visited exactly only

once.

A. Insertion

B. Deletion

C. Updation

D. Traversal

9. ___________ data structures will have fixed memory allocation and memory taken by

them can be increased or decreased at runtime

A. Linear

B. Homogeneous

C. Dynamic

D. Static

10. ___________ can be defined as finite collection of well-defined steps to solve a particular

problem.

A. Files

B. Algorithm

C. Information

D. Data

11. Which of the following statements is/are true about linked list?

A. Addition and deletion of an item to/ from the linked list require modification of the

existing pointers

B. The linked list pointers do not provide an efficient way to search an item in the linked list

C. Linked list pointers always maintain the list in ascending order

D. The linked list data structure provides an efficient way to find kth element in the list

12. Linked lists are not suitable to for the implementation of?

A. Insertion sort

B. Radix sort

C. Polynomial manipulation

D. Binary search

13. One way linked list is also called as _____________?

A. Doubly Linked List

B. Circular Linked List

C. Singular Linked List

D. Deque

14. If there is no free node in the list to insert an element then that condition is known as

____________?

A. Error

B. Overflow

C. Testing

D. Underflow

15. In a circular linked list ______________?

A. Components are all linked together in some sequential manner.

B. There is no beginning and no enD.

C. Components are arranged hierarchically.

D. Forward and backward traversal within the list is permitteD.

16. A linear collection of data elements where the linear node is given by means of pointer is

called?

A. Linked list

B. Node list

C. Primitive list

D. Data

17. Which of the following operations is performed more efficiently by doubly linked list

than by singly linked list?

A. Deleting a node whose location in given

B. Searching of an unsorted list for a given item

C. Inverting a node after the node with given location

D. Traversing a list to process each node

18. Before inserting a node we need to check _______________

A. list is empty or not.

B. list exists or not

C. list can be traversed or not

D. list has to be updated

19. For ______________ we need to locate the position of the node after which we want to

insert the new node.

A. deleting node

B. searching node

C. inserting node

D. traversing node

20. To insert an element in sorted linked list, list should be ___________

A. Existing

B. Complete

C. Full

D. Sorted

21) The prefix form of an infix expression p + q − r t* is

A. + pq − rt

B. − +pqr t*

C. − +pq*rt

D. - +*pqrt

22) In Reverse Polish notation, expression A*B+C*D is written as

A. AB*CD*+

B. A*BCD*+

C. AB*CD+*

D. A*B*CD+

23) When a stack is organized as an array, a variable named Top is used to point to the top

element of the stack. Initially, the value of Top is set to_______to indicate an empty stack.

A. -1

B. 0

C. 1

D. X

24) Jan Lukasiewicz, who suggested two alternative notations to represent an arithmetic

expression belonged to which nationality?

A. English

B. Polish

C. German

D. Swedish

25) The postfix form of the following infix notation is : (A + B.* (C*D − E)* F

A. AB + CD*E − *F*

B. AB+ CDE + − * F*

C. AB+ CD − EF + − **

D. ABCDEF* − + * +

26) What are the sequence of popped out values if the sequence of operations - push(1),

push(2), pop, push(1), push(2), pop, pop, pop, push(2), pop are performed on a stack.

A. 2, 2, 1, 1, 2

B. 2, 2, 1, 2, 2

C. 2, 1, 2, 2, 1

D. 2, 1, 2, 2, 2

27) In conversion from prefix to postfix using stack data-structure, if operators and operands

are pushed and popped exactly once, then the run-time complexity is ............

A. Ο(1)

B. Ο(n)

C. Ο(log n)

D. Ο(n^2)

28) The result of evaluating the following postfix expression is 5, 7, 9, *, +, 4, 9, 3, /, +, -

A. 50

B. 65

C. 61

D. 70

29) n elements of a Queue are to be reversed using another queue. The number of “ADD” and

“REMOVE” operations required to do so is:

A. 2*n

B. 4*n

C. n

D. The task cannot be accomplished

30) User push 1 element in the stack having already five elements and having stack size as 5

then stack becomes ___________.

A. Overflow

B. Underflow

C. User Flow

D. Crash

31. The arrangement of data in an order way is known as ___________

A. Traversing

B. Inserting

C. Sorting

D. Merging

32. ____________ is a series of instruction to arrange the data in either ascending or

descending order

A. Algorithm

B. Program

C. Machine Instructions

D. Sorting Algorithm

33. Ascending order sorting, will swap the current element with the next one , if the current

element is __________

A. Equal

B. Smaller

C. Greater

D. Null

34. In bubble sort the last index value will be its correct position after the _______ iteration

A. Last

B. First

C. Middle

D. Half

35. The sort which works on comparison of key element is ___________

A. Bubble

B. Merge

C. Insertion

D. Simple

36. After each iteration ________ value is placed in front of unsorted list

A. Maximum

B. Minimum

C. Zero

D. Null

37. In _____ sort two unsorted array will create a sorted array

A. Bubble

B. Selection

C. Merge

D. Insertion

38. The last index of array is represented using ______

A. Bound

B. Upper bound

C. Lower bound

D. Last value

39. _____________ search will require data to be not sorted

A. Linear Search

B. Binary Search

C. Simple Search

D. Complex Search

40. The worst case of linear search is when data to be searched is located at _______ index

position

A. First

B. Middle

C. Last

D. Third

41. When a hash function maps to two different keys in the same table _______ occurs.

A. Intersect

B. Parallel

C. Collision

D. Resolution

42. When an identifier get mapped into a full bucket ________ will occur

A. Underflow

B. Overflow

C. Full

D. Nullify

43. In _________ hashing method we square the key and take the number of digits required

to form address

A. Square Method

B. Square Hash

C. Mid Square

D. Two Square

44. In __________ method the reverse values of outer parts of keys are added

A. Fold boundary

B. Fold shifting

C. Reverse fold

D. Fold reverse

45. Using linear probing considering the key as 89 and value of hash table as 10 , the index

hash value formed will be ___________

A. 10

B. 8

C. 9

D. 89

46. _______________ is used to resolve collisions in open addressed has tables

A. Hash resolve

B. Probing

C. Double hashing

D. Quick hashing

47. _____________ is a block of space large enough to hold multiple values

A. Tray

B. Bucket

C. List

D. Cache

48. As soon as the hash table is half full , _________-should be performed

A. Collision

B. Parallel

C. Rehash

D. Naïve hash

49. The graph in data structure is a set of __________ and _________

A. Lines and bars

B. Columns and lines

C. Vertices and edges

D. Circles and square

50. When two vertices are connected through an edge they are known as_________ with each

other

A. Not adjacent

B. Parallel

C. Adjacent

D. Collide

Answer Key

Q.NO ANSWER Q.NO ANSWER Q.NO ANSWER Q.NO ANSWER Q.NO ANSWER

1 B 11 B 21 C 31 C 41 C

2 C 12 D 22 A 32 D 42 B

3 C 13 C 23 A 33 C 43 C

4 B 14 B 24 B 34 B 44 B

5 C 15 B 25 A 35 C 45 C

6 A 16 A 26 A 36 B 46 C

7 C 17 A 27 B 37 C 47 B

8 D 18 A 28 C 38 B 48 C

9 C 19 C 29 D 39 A 49 C

10 B 20 D 30 A 40 C 50 C

Department: BSC.IT

Exam Type: Regular

Semester: III

Subject: COMPUTER NETWORK

1. Temperature, air pressure, humidity are all an example of

a) Digital data

b) Analog data

c) Digital signal

d) analog signal

2. In data communication we commonly use ________ Analog signal and __________

digital signal

a) Periodic and non periodic

b) non periodic and periodic

c) aperiodic and periodic

d) periodic and aperiodic

3. The ______ of a signal is its absolute value of its highest intensity proportional to the

energy it carries

a) Frequency

b) Throughput

c) Delay

d) peak amplitude

4. Change in short span of time means________ frequency whereas change over a long

span of time means________ frequency

a) High and low

b) low and high

c) definite and indefinite

d) indefinite and definite

5. If a signal does not change at all its frequency is _________ whereas if a signal changes

instantaneously its frequency is _________

a) finite and infinite

b) Infinite and zero

c) zero and infinite

d) infinite and finite

6. In _______Transmission we send 1 start Bit (0) at the beginning and one or more stop

bits (1s) at the end of each byte.

a) synchronous transmission

b) asynchronous transmission

c) isochronous transmission

d) Chronos transmission

7. ________ coding is normally referred to as mB/nB coding where it replaces each m-bit

group with an n-bit group

a) Line

b) Group

c) Block

d) Segment

8. In bipolar encoding we use _______ levels

a) 1

b) 2

c) 3

d) 4

9. In ________ the inversion or lack of inversion determines the value of the bit

a) NRZ- L

b) NRZ - I

c) RZ

d) NRZ

10. ________ is the time needed for each intermediate or end device to hold the message

before it can be processed.

a) propagation time

b) queuing time

c) transmission time

d) processing delay

11. The ______ technique expands the bandwidth of a signal by replacing each data bit with

n bits using a spreading code.

a) FDM

b) DSSS

c) FHSS

d) TDM

12. In ________ TDM, slots are dynamically allocated to improve bandwidth efficiency.

a) synchronous

b) statistical

c) isochronous

d) Asynchronous

13. In ________ TDM, slots are wasted if there is no data to transmit.

a) synchronous

b) statistical

c) isochronous

d) asynchronous

14. Which multiplexing technique involves signals composed of light beams?

a) FDM

b) TDM

c) WDM

d) PDM

15. FHSS uses ______________

a) Frequency synthesizer

b) Multiplexer

c) Hopping machine

d) De-multiplexer

16. In other words, each bit is assigned a code of n bits, called _____ .

a) Chips

b) Node

c) Spectrum

d) Period

17. We can divide ____ into two different schemes: synchronous or statistical.

a) FDM

b) TDM

c) WDM

d) FDMA

18. Transmission media are usually categorized as _______.

a) fixed or unfixed

b) guided or unguided

c) determinate or indeterminate

d) metallic or non-metallic

19. Transmission media lie below the _______ layer.

a) physical

b) network

c) transport

d) application

20. Which of the following is guided media?

a) UTP cable

b) Microwave

c) Radio wave

d) Bluetooth

21. Which of the following is not a type of data link control protocol

a) stop and wait

b) stop and wait arq

c) go back n arq

d) stop and proceed

22. S frames in HDLC stands for

a) Support frames

b) supervisory frame

c) suspicious frames

d) super frames

23. ________ means the sending station must not send frames at a rate faster than the

receiving station can absorb them

a) error control

b) frame control

c) data control

d) flow control

24. ______Is not a type of Random Access protocol

a) Aloha

b) CSMA

c) CSMA/CD

d) CDMA

25. ________ Method is used if the channel has time slots with the slot duration equal to or

greater than the maximum propagation time

a) I-persistent

b) Non-persistent

c) P persistent

d) d-persistent

26. In _______ one device is designated as a primary station and other devices are secondary

stations and all data exchanges must be made through the primary device

a) Polling

b) token passing

c) Reservation

d) logical ring

27. In _______ the available bandwidth of a link is divided into frequency bands

a) CDMA

b) TDMA

c) FDMA

d) SDMA

28. _________is a wireless LAN Technology designed to connect devices of different

function such as telephones notebooks computers cameras printers and even coffee

makers when they are at a short distance from each other

a) WiMAX

b) Bluetooth

c) fibre optic cable

d) coaxial cable

29. There are ________ generations of cellular telephony

a) 1

b) 2

c) 3

d) 4

30. __________is a combination of nodes some of which are satellites that provide

communication from one point on the earth to another

a) satellite network

b) Bluetooth

c) Infrared

d) Wi-Fi

31. A packet switched network uses which type of approach

a) datagram approach

b) virtual circuit approach

c) both datagram and virtual circuit approach

d) packet approach

32. Connection oriented approach is also called as_______

a) virtual circuit approach

b) datagram approach

c) connectionless approach

d) Packet aaproch

33. packet approach _______ is a 32 bit address that uniquely and universally define the

connection of a host or a router to the internet

a) ipv 1 addressing

b) ipv2 addressing

c) Ipv3 addressing

d) ipv4 addresses

34. _________means to place the packet in its route to its destination

a) Sending

b) Forwarding

c) Delivering

d) dividing

35. ICMP stands for

a) Internet control Management protocol

b) Internet control message protocol

c) internet Control Management process

d) internet control message process

36. _________ Is a variable length packet consisting of two parts header and data

a) Datagram

b) Protocol

c) Packet

d) group

37. ________ report problem that a router or a host may encounter when it processes and IP

packet

a) error reporting messages

b) query messages

c) time exceeded messages

d) redirection messages

38. ________Routing table is the one that is created once manually but it is updated

automatically whenever there is some change in the internet

a) Static

b) Dynamic

c) Modified

d) updated

39. ________timer in RIP determine when the router must send the update packet to other

routers

a) Periodic

b) Expiration

c) garbage collection

d) Aperiodic

40. OSPF stands for _______

a) Open shortest protocol first

b) open standard protocol first

c) open shortest path first

d) open standard path first

41. ______helps you identify processes on the computer

a) process number

b) port number

c) data number

d) Transport number

42. The receivers sends_______ acknowledgement if a frame has arrived safe and sound and

in order

a) Positive

b) Negative

c) No

d) Some

43. _________Protocol report the sequence number of a damaged frame before the timer

expires

a) simple protocol

b) stop and wait protocol

c) Go back n protocol

d) selective repeat protocol

44. A technique called as_______ is used to improve the efficiency of bidirectional

protocols

a) simple protocol

b) Piggybacking

c) stop and wait protocol

d) selective repeat protocol

45. __________Is a connectionless unreliable transport protocol which does not add

anything to the services of IP except for providing process to process communication

instead of host-to-host communication

a) user datagram protocol

b) transmission control protocol

c) selective repeat protocol

d) simple protocol

46. _________Is a connection oriented reliable protocol which defines connection

establishment data transfer and connection teardown phase to provide a connection

oriented service

a) user datagram protocol

b) transmission control protocol

c) selective repeat protocol

d) simple protocol

47. In __________ communication data can flow in both directions at the same time

a) Simplex

b) Half duplex

c) semi duplex

d) full duplex

48. In case of________ a logical window is maintained in the buffer of the sender

a) user datagram protocol

b) sliding window protocol

c) transmission control protocol

d) simple protocol

49. A _________ Timer is used to prevent a long idle connection between two machines

a) time wait

b) keepalive

c) Retransmission

d) Persistent

50. _____ means creating documents that refer to other documents

a) Hypertext

b) Hypermedia

c) client protocol

d) web server

Answer Key

Q.NO ANSWER Q.NO ANSWER Q.NO ANSWER Q.NO ANSWER Q.NO ANSWER

1 b 11 b 21 d 31 c 41 b

2 a 12 b 22 b 32 a 42 a

3 d 13 a 23 d 33 d 43 d

4 a 14 c 24 d 34 b 44 b

5 c 15 a 25 c 35 b 45 a

6 b 16 d 26 a 36 a 46 b

7 c 17 b 27 c 37 a 47 d

8 c 18 b 28 b 38 b 48 b

9 b 19 a 29 d 39 a 49 b

10 b 20 a 30 a 40 c 50 a

Department: BSC.IT

Exam Type: Regular

Semester: III

Subject: DATABASE MANAGEMENT SYSTEM

1. What do you mean by one to many relationship between Teacher and Class

table?

a) One class may have many teachers

b) One teacher can have many classes

c) Many classes may have many teachers

d) Many teachers may have many classes

2. In one-to-many relationship, the table on 'many' sides is called _______

a) Parent

b) Child

c) Sister

d) Master

3. Which of the following enables us to view data from a table based on a

specific criterion

a) Form

b) Query

c) Macro

d) Report

4. This key that uniquely identifies each record is called :

a) Primary Key

b) Key Record

c) Unique Key

d) Field Name

5. Which name must be unique within a database ?

a) Table

b) Field

c) Record

d) Character

6. In an ER Diagram an entity set is represented by____________.

a) Rectangle

b) Ellipse

c) Diamond

d) Circle

7. The collection of related data is termed as _________

a) Data

b) Database

c) DBMS

d) Information

8. The process of hiding irrelevant details from the user is called

a) data abstraction

b) data encryption

c) data integrity

d) data encapsulation

9. The total number of attributes which in the relation is called the __________ of

the relation.

a) Table

b) Tuple

c) Degree

d) Attribute

10. ___________ is an extension of the Hierarchical model.

a) Relational Model

b) Data Model

c) Network Model

d) ER-Model

11. Which one of the following is a set of one or more attributes taken collectively

to uniquely identify a record?

a. Candidate key

b. Sub key

c. Super key

d. Foreign key

12. Which one of the following attributes can be taken as a primary key?

a. Name

b. Street

c. Id

d. Department

13. An attribute in a relation is a foreign key if the _______ key from one relation is

used as an attribute in that relation.

a. Candidate

b. Primary

c. Super

d. Sub

14. A _________ integrity constraint requires that the values appearing in

specified attributes of any tuple in the referencing relation also appear in

specified attributes of at least one tuple in the referenced relation.

a. Referential

b. Referencing

c. Specific

d. Primary

15. A set of possible data values is called

a. Attribute

b. Degree

c. Tuple

d. Domain

16. In the __________ normal form, a composite attribute is converted to

individual attributes.

a. First

b. Second

c. Third

d. Fourth

17. A table on the many side of a one to many or many to many relationship must:

a. Be in Second Normal Form (2NF)

b. Be in Third Normal Form (3NF)

c. Have a single attribute key

d. Have a composite key

18. Tables in second normal form (2NF):

a. Eliminate all hidden dependencies

b. Eliminate the possibility of an insertion anomalies

c. Have a composite key

d. Have all non key fields depended on the whole primary key

19. Functional Dependencies are the types of constraints that are based on______

a. Key

b. Key revisited

c. Superset key

d. Composite key

20. Which is a bottom-up approach to database design that design by examining

the relationship between attributes:

a. Functional dependency

b. Database modelling

c. Normalization

d. Decomposition

21. A _______________ key is a minimal super key

a) Primary

b) Foreign

c) Candidate

d) Non-Prime

22. By default, which key creates Clustered index?

a) Foreign Key

b) Unique Key

c) Primary Key

d) Candidate Key

23. The following Constraint must be always column level.

e) Not Null

f) Unique Constraint

g) Check Constraint

h) Default Constraint

24. ____________ integrity validates the data before getting stored in the columns

of the table.

a) Entity

b) Data

c) Domain

d) User-defined

25. ____________ integrity ensures the relationships between tables remain

preserved as data is inserted, deleted & modified.

a) Referential

b) Primary

c) Domain

d) Data

26. This means the capacity to change the schema at one level of database system

without having to change the schema at the next higher level.

a) Security

b) View

c) Data independence

d) Table

27. Which key accepts multiple NULL values?

a) Foreign Key

b) Unique Key

c) Primary Key

d) Natural Key

28. A Foreign key is combined with a foreign key creates

a) Parent child relationship between the tables that connect them

b) Many-Many relationship between the tables that connect them

c) Network model between the tables that connect them

d) Many-One relationship between the tables that connect them

29. Which of the following is not the DDL statements?

a) Create

b) Drop

c) Alter

d) Insert

30. In SQL, which command(s) is(are) used to change a table’s storage

characteristics?

a) ALTER TABLE

b) MODIFY TABLE

c) CHANGE TABLE

d) UPDATE TABLE

31. A transaction completes its execution is said to be

a. Committed

b. Aborted

c. Rolled back

d. Failed

32. The process of managing simultaneous operations on the database without

having them interfere with one another is

a. Serializability

b. Recoverability

c. Concurrency control

d. Transaction management

33. A schedule where the operations of each transaction are executed

consecutively without any other interference from other transactions is called

a. Non-serial schedule

b. Serial schedule

c. Recoverable schedule

d. Non-recoverable schedule

34. Which of the following is not a deadlock handling strategy?

a. Deadlock prevention

b. Timeout

c. Deadlock detection and recovery

d. Deadlock annihilation

35. Which of the following does refer to the size of the data item chosen as the unit

of protection by a concurrency control program?

a. Granularity

b. Lock

c. Starvation

d. Timestamp

36. Which of the following hashing techniques does allow a hash file to expand

and shrink its number of buckets dynamically without needing a directory?

a. Linear hashing

b. Extensible hashing

c. Internal hashing

d. External hashing

37. Which of the following indexes is based on the values being uniformly

distributed using a mathematical function?

a. Ordered index

b. Hashed index

c. Dense index

d. Sparse index

38. A join in which the joining condition is based on equality between values in

the common columns is called

a. Equi-join

b. lateral join

c. Natural join

d. Left join

39. A type of query that is placed within a WHERE or HAVING clause of another

query is called

a. Master query

b. Query

c. Superquery

d. Subquery

40. The entity integrity rule states that

a. No primary key attribute can be null

b. Referential integrity must be maintained across all entities

c. Each entity must have a primary key

d. A primary key must have only one attribute

41. __How to give single line comment in PL/SQL

a. //

b. /*

c. --

d. <--

42. PL/SQL is ______ to SQL.

a. new

b. extension

c. main

d. important

43. Find invalid declaration

a. v_number1 NUMBER(10);

b. v_num NUMBER := 100;

c. v_astring VARCHAR2(2) NOT NULL;

d. v_str VARCHAR2(1) NOT NULL := ‘Y’;

44. Which package is get used to print output on screen

a. DBMS_PRINT

b. DBMS_OUTPUT

c. DBMS_SHOW

d. DBMS_COUT

45. Which one is invalid procedure?

a. PUT

b. PUT_LINE

c. NEW_LINE

d. NEW

46. PL/SQL groups the syntax of the programs into units called _______.

a. sections

b. blocks

c. parts

d. queries

47. PL/SQL named blocks are called ________

a. subprograms

b. anonymous

c. code

d. query

48. PL/SQL unnamed blocks are called _________

a. subprograms

b. anonymous

c. code

d. query

49. __________ can be referred as either function or procedures.

a. subprograms

b. anonymous

c. code

d. query

50. DECLARE section begins with the keyword DECLARE and ends when the

keyword ________

a. END

b. BEGIN

c. END DECLARE

d. STOP

Answer Key

Q.No Answer Q.No Answer Q.No Answer Q.No Answer Q.No Answer

1 b

11 b

21 c 31 a 41 c

2 b

12 c

22 c 32 c 42 b

3 b

13 b 23 a 33 b 43 c

4 a

14 a

24 b 34 d 44 b

5 a

15 d 25 a 35 a 45 d

6 a

16 a 26 c 36 b 46 b

7 b

17 d

27 a 37 b 47 a

8 a

18 a

28 a 38 a 48 b

9 c

19 a 29 d 39 d 49 a

10 c 20 c 30 a 40 a 50 b

Department: BSC.IT

Exam Type: Regular

Semester: III

Subject: APPLIED MATHEMATICS

1. Which of the following Matrix is scalar matrix?

a) *

+

b) *

+

c) *

+

d) *

+

2. If a matrix A is both symmetric and skew symmetric then matrix A is

a) a scalar matrix

b) a diagonal matrix

c) a zero matrix of order n × n

d) a rectangular matrix

3. To find rank of matrix using Normal form which operations are allowed

a) Only row

b) Only column

c) Both row and column

d) Row or column

4. The formula for finding inverse of matrix using adjoint method is

a)

b)

c)

| | ))

d) ))

5. The system of linear non-homogenous equation is consistent if

a) ) | )

b) )

c) ) | )

d) | ) )

6. The characteristic equation is

a) | |

b)

c) | |

d)

7. Cayley-Hamilton theorem states that Every matrix satisfy its own ______________

a) Characteristic Equation

b) Differential Equation

c) Potential Equation

d) Caley’s Equation

8. The system of homogenous linear equations has infinitely many solutions if

a) ) | )

b) ) | )

c) ) | )

d) )

9. The vectors are independent vectors if for every equation of

the type gives

a)

b)

c)

d)

10. The eigen values are roots of

a) The characteristic equation

b) Rank of matrix

c) Polynomial

d) Eigen vector

11. Determine the order and degree of the differential equation

(

)

a)

b)

c)

d)

12. Which of the following equations is an exact differential equation?

a) )

b) )

c) )

d) )

13. The Differential Equation of type ) ) is said to be exact if

a)

b)

c)

d)

14. What is integrating factor of differential equation of type

a) ∫

b) ∫

c) ∫

d) ∫

15. Which of the following is Clairaut’s form of Differential equation?

a) )

b) )

c) )

d) )

16. The solution to exact differential Equation is given by

a) ∫ ∫

b) ∫ ∫ )

c) ∫ ∫ )

d) ∫ ∫ )

17. If linear differential equation with constant coefficient is given by )

) then its general solution is

a)

b)

c)

d)

18. What is solution of Differential equation )

a)

b)

c)

d)

19. Find the particular integral:

a)

b)

c)

d)

20. What is solution to equation:

a) )

b) ) )

c) ) )

)

d)

21. Laplace of function ) is given by?

a) ) ∫ )

b) ) ∫ )

c) ) ∫ )

d) ) ∫ )

22. Laplace transform of )is?

a)

b)

c)

d)

23. Find the Laplace transform of )

a)

)

b)

)

c)

)

d)

)

24. Laplace transform of )

a)

)

b)

)

c)

)

d)

( )

25. Find the Laplace transform of

a)

(

)

b)

(

)

c)

(

)

d)

(

)

26. ) ) [ )]

a)

b)

c)

d) 1

27. [ ]

a) )

b) )

c) )

d) )

28. )

a)

b)

c)

d)

29. ) *∫ )

+

a)

)

b)

c)

)

d)

30.

a)

b)

c)

d)

31. *

+

a) 1

b)

c) 0

d)

32. Find the value of ∬

a) )

b) ) )

c) )

d) ) )

33. The value of ∬ over the area bounded by parabola and is

a)

b)

c)

d)

34. The value of ∬ over the area bounded by parabola and is

a)

b)

c)

d)

35. Find the value of the integral ∫ ∫ )

a)

b)

c)

d)

36. The value of ∫ ∫ ∫

is given by

a)

b)

c)

d) 1

37. The integral value of ∫ ∫ ∫

is

a)

)

b)

c)

)

d)

)

38. The integral of ∫ ∫ ∫ )

a) 0

b) 1

c) 0.25

d) 4

39. The integral value of ∫ ∫ ∫

)

is given by

a) √

b) √

c) √

d) √

40. The integral value of ∫ ∫ ∫

is

a) 0.5

b) 0.25

c) 1

d) 0

41. ∫ ∫ )

a) Zero

b)

c)

d) 2

42. The value of ∫ )

∫ )

a) 0

b) x

c) a

d) t

43. Which of the following is true?

a) ) )

b) ) )

c) ) ) d) ) )

44. What is the value of

1

2 ?

a) π

b) π

2

c) π

2

d)

π

2

45. What is the value of √ ?

a) √

b) √

c) √

d) √

46. ∫

a) √

b) √

c) √

d)

47. What is the value of

9

4 ?

a)

b)

c)

d)

48. Which of the following is not a definition of Gamma function?

a) )

b) ) n-1 x

0

  x e dx?

c) ) )

d) ) 2 2 1

0

2 dxx ne x

49. What is the value of β(3,2)?

a) 1/14

b) 1/16

c) 1/12

d) 1/10

50. What is the value of (

)

a) π

b) 2π

c) 2π

d) 2π

Answer Key

Q.NO ANSWER Q.NO ANSWER Q.NO ANSWER Q.NO ANSWER Q.NO ANSWER

1 d 11 a 21 d 31 a 41 d

2 c 12 c 22 d 32 b 42 d

3 c 13 b 23 a 33 b 43 c

4 c 14 b 24 d 34 b 44 a

5 a 15 a 25 b 35 b 45 b

6 a 16 b 26 a 36 c 46 b

7 a 17 a 27 c 37 d 47 a

8 a 18 c 28 c 38 a 48 a

9 a 19 a 29 c 39 a 49 c

10 a 20 d 30 a 40 d 50 b


Recommended