81.
A
subset of data in a data warehouse in the form of summary data, related to a
particular department or business function:
(A) Meta Data (B) Archive data
(C) Data Marts (D)
Operational Data Store
Answer: C
82.
In
an IP packet, header checksum computes:
(A) 1’s complement sum of
16 bit words in the header without data field
(B) 2’s complement sum of
16 bit words in the header without data field
(C) 1’s complement sum of
16 bit words in the header including data field
(D) 2’s complement sum of
16 bit words in the header including data field
Answer: A
83.
A
TCP server must prepare to accept a connection attempt from a TCP client by
calling the function:
(A) connect() (B) bind()
(C) accept() (D) listen()
Answer: calling listen() and then calling accept()
84.
Not
a Bernstein’s condition for two processes P1 and P2 executing in parallel on
input set I1 and I2, producing output set 01 and 02 respectively.
(A) 01Ç02=F (B) I1Ç02=F
(C) I2Ç01=F (D) I1ÇI2=F
Answer: D
85.
The
normalization of 1NF relations to 2NF involves:
(A) Removal of partial
dependencies
(B) Removal of full
dependencies
(C) Removal of transitive
dependencies
(D) Removal of multi-valued
dependencies
Answer: A
86.
The
technique used for dimensionality reduction of original data:
(A) Discrete Wavelet
transform
(B) Principal Component
Analysis
(C) Both (A) and (B)
(D) Neither (A) nor (B)
Answer: C
87.
The
technique used for producing color displays with random scan CRT monitors:
(A) Beam Penetration (B) Shadow Mask
(C) Direct View Storage (D) Gas-Discharge
Answer: A
88.
An
objective measure of pattern interestingness in data mining:
(A) Support rule (B) Confidence rule
(C) Both (A) and (B) (D) Neither (A) nor (B)
Answer: C
89.
DHCP
stands for:
(A) Dynamic Host
Configuration Protocol
(B) Dynamic Host Control
Protocol
(C) Dynamic Heap Control
Protocol
(D) Dynamic Heap
Configuration Protocol
Answer: A
90. A static member function
can have access to:
(A) Static functions in the
same class
(B) Static members in the
class
(C) Static members of other
classes
(D) Public functions of the
same class
Answer: B
91. Hidden terminals in a
wireless network may cause:
(A) Delay (B)
Collisions
(C) Drain of battery charge (D) Reduction of Signal Strength
Answer: B
92. IC 80287 is:
(A) Graphics Processor (B) Microprocessor
(C) Micro-controller (D) Co-processor
Answer: D
93. The maximum size of main
memory of a computer is determined by:
(A) Operating System (B) Address Bus
(C) Data Bus (D) Chipset
Answer: B
94. In computer terminology,
POST stands for:
(A) Power Operating System (B) Push Pop Stack
(C) Power On self Test (D) Power Storage
Answer: C
95. SaaS is a popular term in
the field of:
(A) Data mining (B) Bioinformatics
(C) Information Security (D) Cloud Computing
Answer: D
96. Not an assembler directive
(A) XCHG (B)
ASSUME
(C) SHORT (D) DB
Answer: A
97. In a CDMA system, a code
for a certain system should have:
(A) Good auto correlation
with other codes
(B) Orthogonality to other
codes
(C) High standard deviation
(D) Both (A) and (B)
Answer: D
98. 1 Kilo Bytes refers to:
(A) 1000 Bytes (B) 1024 Bytes
(C) 8000 Bytes (D) 8192 Bytes
Answer: B
99. Tuple in relational algebra
refers to:
(A) Row (B) Column
(C) Table (D) Relation
Answer: A
100. A ternary operator in C++
(A) ?: (B) ||
(C) :: (D) .*
Answer: A
0 Comments