1. When an ER diagram is mapped to tables, the representation is redundant for
A.
Weak entity sets
B.
Weak
relationship sets
C.
Strong entity sets
D.
Strong relationship sets
2.In SQL the word natural can be used with
A.
Inner join
B.
Full outer join
C.
Right outer join
D.
All the above
3.A relation is in ……….if an attribute of a composite key is depend on an attribute of other composite key.
A.
2NF
B.
3NF
C.
BCNF
D.
1NF
4. In E-R diagram double line indicate
A. Total participationB. Multiple participationC. CardinalityD. None
5. Programs such an Internet Explorer that serve as navigable windows into the Web are called ________.
A.
Hypertext
B.
Networks
C.
Internet
D.
Web browsers
6. While passing an array as an actual argument, the function call must have
A. The array name with empty bracketsB. The array name with its sizeC. The array name aloneD. All of the above
7. Filters are used in
A.
firewall
B.
for error detection
C.
Both (1) and (2)
D.
Purifier
8. In a compiler, grouping of characters into token is done
A.
scanner
B.
parser
C.
code generator
D.
code optimizer
9. __________ is a better authentication protocol.
A.
PAP
B.
HDLC
C.
CHAP
D.
SLIP
10. Fastest LAN is
A.
Token bus
B.
ethernet
C.
Token ring
D.
FDDI
11. The minimum time delay between the initiations of two independent memory operations is called
A.
Access time
B.
Cycle time
C.
Transfer rate
D.
Latency time
12. The interfacing device used for the generation of accurate time delay in a microcomputer system is
A.
Intel-8251
B.
Intel-8257
C.
Intel-8253
D.
Intel-8259
13. The number of output pins of a 8085 microprocessor are
A.
40
B.
27
C.
21
D.
19
14. Memory-mapped I/O-scheme for the allocation of address to memories and I/O devices, is used for
A.
Small systems
B.
Large systems
C.
Both Large and Small systems
D.
Very large systems
15. The program counter in a 8085 microprocessor is a 16 bit register, because
A.
It counts 16 bits at a time
B.
There are 16 address times
C.
It facilitates the user storing 16 bit data temporarily
D.
It has to fetch two 8 bit data at a time
16. Which logical operation is performed by ALU of 8085 complement a number?
A.
AND
B.
NOT
C.
EXCLUSIVE OR
D.
OR
17. Belady’s Anomaly is a behavior of which page replacement Algorithm?
A.
FIFO
B.
Optimal
C.
Circular FIFO
D.
LRU
18. EBCDIC have how many bytes?
A.
64
B.
256
C.
128
D.
512
19. Winchester disk is __________.
A.
Disk stack
B.
RAM
C.
ROM
D.
Magnetic tape
20. The topology with highest reliability _______.
A.
Bus topology
B.
Star topology
C.
Ring topology
D.
Mesh topology
READ PREVIOUS EXPECTED QUESTIONS (SOLVED)
- IT SPECIALIST OFFICER | EXPECTED QUESTIONS SET 8 (SOLVED)
- IT SPECIALIST OFFICER | EXPECTED QUESTIONS SET 7 (SOLVED)
- IT SPECIALIST OFFICER | EXPECTED QUESTIONS SET 6 (SOLVED)
- IT SPECIALIST OFFICER | EXPECTED QUESTIONS SET 5 (SOLVED)
- CRACK IT SPECIALIST OFFICER EXAMINATION SET 4 (SOLVED)
- CRACK IT SPECIALIST OFFICER EXAMINATION SET 3 (SOLVED)
- IT OFFICER MODEL QUESTIONS | SET 2 (SOLVED)
- IT OFFICER MODEL QUESTIONS | SET 1 (SOLVED)
Social Plugin