Lecturer in Computer Application Collegiate Education 427/2016 Answer Key 125/2017

code

Post : Lecturer in Computer Application
Department :  Collegiate Education
Category Code : 427/16
Qualification: Masters Degree in the concerned subject
Question Paper Code : 125/17
Date of Test : 26-10-2017



  1. UNIVAC is :
    • Universal Automatic Computer
    • Universal Array Computer
    • Universal Automatic Control
    • Unvalued Automatic Computer

  2. DBMS is a collection of __________ that enables users to create and maintain a database.
    • Keys
    • Translators
    • Program
    • Language Activity

  3. In a relational schema, each tuple is divided into fields called :
    • Relations
    • Domains
    • Queries
    • All of these
    Question error

  4. Which is single user operating system?
    • MS-DOS
    • UNIX
    • XENIX
    • LINUX

  5. In which year the first operating system was developed?
    • 1910
    • 1940
    • 1950
    • 1980
    Question error

  6. How can you disable extended selection mode?
    • Press F8 again to disable
    • Press Del to disable
    • Press Esc to disable
    • Press Enter to disable

  7. Maximum length of DOS command using any optional parameter is :
    • 26 Character
    • 87 Character
    • 127 Character
    • None of these

  8. Which of the following helps to reduce spelling error in the document?
    • Auto format
    • Autocorrect
    • Smart tags
    • Autotest

  9. Disk copy command in DOS is used to :
    • Copy a file
    • Copy contents of one floppy disk to another
    • Copy contents of CD-ROM to another
    • All of these

  10. What is gutter margin?
    • Margin that is added to the left margin when printing
    • Margin that is added to right margin when printing
    • Margin that is added to the binding side of page when printing
    • Margin that is added to the outside of the page when printing

  11. VGA is :
    • Video Graphics Array
    • Visual Graphics Array
    • Volatile Graphics Array
    • Video Graphics Adapter

  12. Disk scheduling includes deciding :
    • Which should be accessed next?
    • Order in which disk access requests must be serviced
    • The physical location of the file
    • The logical location of the file

  13. CD-ROM stands for :
    • Compactable Read Only Memory
    • Compact Data Read Only Memory
    • Compactable Disk Read Only Memory
    • Compact Disk Read Only Memory

  14. Which technique is used by operating system to execute several programs concurrently by switching back and forth?
    • Partitioning
    • Multitasking
    • Windowing
    • Paging

  15. Dispatcher function is to :
    • Put tasks in I/O wait
    • Schedule tasks in processor
    • Change task priorities
    • All of these

  16. Where can you set the shading color for a range of cells in Excel?
    • Chose required color form Patterns tab of Format cells dialog box
    • Chose required color on Fill Color tool in Formating toolbar
    • Chose required color on Fill Color tool drawing toolbar
    • All of these

  17. An operating system is :
    • a collection of hardware components
    • a collection of input outputs devices
    • a collection of software routines
    • all of these

  18. Which enables us to send the same letter to different persons?
    • macros
    • template
    • mail merge
    • none

  19. Which one is example for network database?
    • Unify
    • Ingress
    • IDMS
    • None of these

  20. Which of the following format you can decide to apply or not in Auto Format dialog box?
    • Number format
    • Border format
    • Font format
    • All of these

  21. Which scheduling policy is best suited for time sharing operating systems?
    • Shortest job first
    • Round robin
    • First come first serve
    • Elevator

  22. Reference bit is used for :
    • Implementing LRU page replacement algorithm
    • Implementing NRU algorithm
    • To check page table entry in the cache memory
    • None of these
    Question error

  23. Which file is the batch file that is read while booting a computer?
    • Autoexec.bat
    • Auto-batch
    • Auto executive.bat
    • Auto.bat

  24. Macintosh computer uses :
    • System 7.0
    • AU/X
    • Xenix
    • None of these

  25. In 3-tier client/server applications, the business logic lies at __________.
    • The client
    • The Database Server
    • Divided between client and server alternatively
    • Middle Tier

  26. Copy and Xcopy are same in the sense :
    • Both are internal command of DOS
    • Both are external command of DOS
    • Both can be used to copy file or group of files
    • Both 'internal command of DOS' and 'external command of DOS'

  27. For two variables, n=2, the number of possible Boolean functions is :
    • 4
    • 8
    • 16
    • 12

  28. The one major advantage of CMOS is its :
    • Low propagation delay
    • High propagation delay
    • Very low propagation delay
    • Very high propagation delay
    Question error

  29. 64K memory contains how many words of 8 bits each :
    • 65,536
    • 64,536
    • 65,436
    • 65,546

  30. The sum of −6 and −13 using 2’s complement addition is :
    • 11100011
    • 11110011
    • 11001100
    • 11101101

  31. What is Q, when S=1 and R=1 for SR flip-flop?
    • No change
    • Clear to 0
    • Set to 1
    • Indeterminate

  32. What does T stands for in T filp-flop?
    • Top
    • Type
    • Toggle
    • Tickle

  33. What number will z be in the sample code given below?
    int z, x=5, y=−10, a=4, b=2;
    z=x++−−−y*b/a;
    • 5
    • 6
    • 10
    • 11

  34. Which of the following is not a keyword in C language?
    • Void
    • Volatile
    • Sizeof
    • Getchar

  35. What is the return value of the following statement if it is placed in C program?
    strcmp (“ABC”, “ABC’’);
    • 33
    • −1
    • 1
    • 0

  36. Every C program consists of __________ function(s).
    • Only one
    • Only two
    • One or two
    • One or many

  37. What is the only function, all C programs must contain?
    • Start()
    • System()
    • Main()
    • Program()

  38. Which of the following is not a correct variable type?
    • Float
    • Real
    • Int
    • Double

  39. HTTP (Hyper Text Transfer Protocol) has similarities to both of the following protocols :
    • FTP; SMTP
    • FTP; SNMP
    • FTP; MTV
    • FTP; URL

  40. MIME allows what type of data to be sent through SMTP?
    • Audio
    • Non-ASCII data
    • Image
    • FTP; SMTP
    Question error

  41. What names objects, defines the type of data that can be stored in an object, and encodes data for network transmission?
    • MIB
    • SMI
    • SNMP
    • ASN.1

  42. Which of the following application protocol is a framework for managing devices in an internet using the TCP/IP protocol suite?
    • SMTP
    • SNMP
    • FTP
    • TELNET

  43. What is the bit combination used by the SAPI field of ISDN’s data link layer, to control call for end-to-end signaling in LAPD addressing format?
    • 000000
    • 000010
    • 010000
    • 000001

  44. The values for the position(i), position(j) where i=14 and j=11, are :
    • 2, 8
    • 8, 2
    • 8, 13
    • 2, 13
    Question error

  45. What is the value to find the reachability of the problem with which you can say the solution is reachable or not?
    • 71
    • 72
    • 73
    • 69
    Question error

  46. The upper bound on the time complexity of the nondeterministic sorting algorithm is :
    • O(n)
    • O(n log n)
    • O(1)
    • O(log n)

  47. There is a chain of 20 stores; each of the store having 5 departments. Then, which of the following is a correct representation of array size?
    • 5*20
    • 6*21
    • 20*5
    • 21*6

  48. One from the following is also known as Pre-Order traversal. What that one is?
    • LNR
    • LRN
    • RLN
    • NLR

  49. From the following, select the valid data structure which reflects hierarchical relationship between the elements :
    • Graph
    • Queue
    • Tree
    • Stack

  50. Which of the following matrix does have high proportions of zero entries as the elements?
    • Inverse Matrix
    • Sparse Matrix
    • Determinant Matrix
    • Square Matrix

  51. Recursive algorithms are based on :
    • Divide and conquer approach
    • Top-down approach
    • Bottom-up approach
    • Hierarchical approach

  52. What do you call the selected keys in the quick sort method?
    • Outer key
    • Inner key
    • Partition key
    • Pivot key

  53. How many nodes does a complete binary tree of level 5 have?
    • 16
    • 15
    • 32
    • 31

  54. The Sorting method which is used for external sort is :
    • Bubble sort
    • Quick sort
    • Merge sort
    • Radix sort

  55. A node of a directed graph G having no out-degree and a positive in-degree is called :
    • Source node
    • Sink node
    • Sibling node
    • Null node

  56. What would be the depth of tree whose level is 9?
    • 10
    • 8
    • 9
    • 11

  57. A collection of data designed to be used by different people is called a/an :
    • Organization
    • Database
    • Relationship
    • Schema

  58. Which of the following is an attribute that can uniquely identify a row in a table?
    • Secondary key
    • Candidate key
    • Foreign key
    • None of these

  59. Which of the following is the oldest database model?
    • Relational
    • Deductive
    • Physical
    • Network

  60. Which of the following terms does refer to the correctness and completeness of the data in a database?
    • Data integrity
    • Data constraint
    • Data independence
    • Data model

  61. If the state of the database no longer reflects a real state of the world that the database is supposed to capture, then such a state is called :
    • Inconsistent state
    • Parallel state
    • Durable state
    • Consistent state

  62. A transaction completes its execution is said to be :
    • Committed
    • Aborted
    • Rolled back
    • Failed

  63. Which of the following allows substitution of code to occur at the translation time in a JSP page?
    • <jsp:include> Tag
    • <@include> directive
    • <@page> directive
    • Declaration block

  64. Which EJB uses EJB-QL for query operations?
    • BMP Entity Bean
    • CMP Entity Bean
    • Session Bean
    • Message-Driven Bean

  65. Which of the following is used to redirect the response from a servlet to a JSP page?
    • response.sendRedirect()
    • request.sendRedirect()
    • request.forward()
    • response.forward()

  66. Which of the following are not a container for EJB?
    (i) Internet Information Server
    (ii) Java System Application Server
    (iii) Tomcat
    (iv) WebLogic
    • Both (i) and (ii)
    • Both (ii) and (iii)
    • Both (iii) and (iv)
    • Both (i) and (iii)

  67. Which method of the request object is used to extract values of the input fields in a form when it is submitted?
    • getParameter
    • getParameterNames
    • getValues
    • putValues

  68. Which of the following is not true for servlet?
    • It is persistent
    • Platform independent
    • High performance
    • It is single threaded

  69. Which part of multi-tier enterprise application contains EJB component?
    • Application Server
    • Web Server
    • Database Server
    • Fat Client

  70. Which of the following is true for Java Bean?
    • It can not be a GUI component
    • It never implements serializable interface
    • It has zero-argument constructor
    • It is a distributed component

  71. Metal Molds for mass-producing CDs are known as :
    • Father
    • Mothers
    • Sons
    • Sisters

  72. What is the quicktime embedded HTML command?
    • HFS
    • Hues
    • HREF
    • HYPERLINK

  73. Which of these is not likely to be the responsibility of a multimedia project?
    • Create interfaces
    • Ensure the visual consistency of the project
    • Structure content
    • Create budgets and timelines for the project

  74. Identify the Macintosh character for<>
    • (....)Ellipse
    • ?
    • ““
    • =

  75. Which of the following mechanism is used to achieve concurrency control?
    • Clusters
    • Triggers
    • Control access
    • Locks

  76. If a program is under execution by CPU then we say the process is under :
    • CPU Burst
    • Process
    • I/O Burst
    • Ready Queue

  77. In a segmentation scheme the logical memory will be divided into :
    • Pages
    • Frames
    • Blocks
    • Segments

  78. Information in the file is processed in order, one record after another. This mode of access is called __________.
    • Relative
    • Sequential
    • Direct
    • Index

  79. Which of the following is in correct order of size, smallest first?
    • Cylinder, track, sector
    • Cylinder, sector, track
    • Sector, track, cylinder
    • Sector, cylinder, track

  80. The set of pages that a process is currently using is called as :
    • Program
    • Page Group
    • Working Group
    • Working Set

  81. Sarva Shiksha Abhiyan was launched in which five year plan?
    • 7th
    • 8th
    • 9th
    • 10th

  82. Child helpline phone No. in Kerala :
    • 1098
    • 1091
    • 1090
    • 1900

  83. Right to Information act was enacted from :
    • 2001
    • 2005
    • 2007
    • 2008

  84. Founder of the Akhila Thiruvithamcore Navika Thozhilali Sanghamam :
    • P.K. Chathan Master
    • M.C. Joseph
    • K.Kelappan
    • Dr. Velukutty Arayan

  85. Rajiv Gandhi Equity Savings Scheme is designed for :
    • High net worth individuals
    • Post offices
    • Corporates
    • Individual retail investors

  86. Mahila Samridhi Yojana started in :
    • 1990
    • 1993
    • 1995
    • 1998

  87. Who was called ‘Simhala Simham’?
    • C. Kesavan
    • C.V. Kunjuraman
    • K.P. Kesava Menon
    • P. Krishna Pillai

  88. How many members can be nominated to the Rajya Sabha by President of India?
    • 8
    • 10
    • 12
    • 18

  89. The most essential feature of the Parliamentary form of Government is the :
    • Sovereignty of the Parliament
    • Independent Judiciary
    • Written Constitution
    • Accountability of the executive to the Legislature

  90. Constitution of India was adopted by Constituent assembly on :
    • 15th January 1950
    • 26th January 1950
    • 26th November 1949
    • 15th November 1949

  91. The newspaper Mithavadi was started by :
    • C. Krishnan
    • K.P. Kesava Menon
    • T.K. Madhavan
    • Balakrishna Pillai

  92. Which of the following journals was published by Vakkom Abdul Khadar Maulavi?
    • Kesari
    • Samatha
    • Deepika
    • Maratha

  93. First Novel in Malayalam :
    • Indulekha
    • Parinamam
    • Mahaprasthanam
    • Kundalatha

  94. Kodungallur kunhikkuttan Tampuran was Popularly known as :
    • Kerala Vyasan
    • Kerala Panini
    • Kerala Valmiki
    • Kerala Kalidasan

  95. The founder of Samathwa Samajam :
    • Sahodaran Ayyappan
    • Ayya Vaikundar
    • Brahmananda Sivayogi
    • Dr. Palpu

  96. Study of Fossils is known as :
    • Orology
    • Limnology
    • Lithology
    • Palaeontology

  97. Temple entry proclamation was in the year :
    • 1934
    • 1936
    • 1938
    • 1942

  98. Which of the following is known as the Magna Carta of education in India?
    • Wood’s Despatch
    • Macaulay’s Minute
    • Hunter Commission
    • Kothari Commission

  99. ‘Akkappoorinte Irupathu Nasrani Varshangal’ was the novel of :
    • C.S. Chandrika
    • K.R. Meera
    • Benyamin
    • C. Radhakrishnan

  100. Who was known as the Grand Old man of India?
    • Jawaharlal Nehru
    • Subhash Chandra Bose
    • Dr. Rajendra Prasad
    • Dadabhai Naoroji

%

Post a Comment

0 Comments