Open Competition TU Lecturer 2081 Subject ICT Part 3

From ICTED-WIKI
Revision as of 05:32, 24 November 2024 by WikiSysop (talk | contribs) (Created page with "'''29. In the hypermedia database, information bits are stored in the form of...''' A) Cubes B) Nodes C) Signals D) Symbols '''30. The project planner examines the statement of scope and extracts software functions, which is known as..... all-important''' A) Planning process B) Decomposition C) Association D) Version managerment '''31. Which of the following is ''not'' a type of database?''' A) Hierarchical B) Network C) Distributed D) Decentralized '''32...")
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

29. In the hypermedia database, information bits are stored in the form of...

A) Cubes

B) Nodes

C) Signals

D) Symbols

30. The project planner examines the statement of scope and extracts software functions, which is known as..... all-important

A) Planning process

B) Decomposition

C) Association

D) Version managerment

31. Which of the following is not a type of database?

A) Hierarchical

B) Network

C) Distributed

D) Decentralized

32. Which of the following is not a relational algebra operator?

A) Set difference

B) Cartesian product

C) Rename

D) Join

33. In object oriented programming, an encapsulation is.....

A) Member function

B) Information hiding

C) Methods

D) Constructor

34. If a packet arrived with an M-bit value is '1' and a fragmentation offset value '0' then it is ..... fragment.

A) First

B) Second

C) Middle

D) Last

35. Which of the following are introduced to reduce the overheads caused by the log-based recovery?

A) Deadlocks

C) Checkpoints

D) Locks

B) Indices

36. AES is a round cipher based on the Rijndal Algorithm that uses a 128 bit block of data. It has three configurations viz..... rounds with a key size of 128 bits,.... rounds with a key size of 192 bits and ..... rounds with a key size of 256 bits.

A) 5,7,15

B) 10,12,14

C) 5,6,7

D) 20,12,14

37. What data structure would you most likely see in non recursive implementation of a recursive algorithm?

A) Stack

B) Linked list

C) Tree

D) Queue

38. If database modifications occur while the transaction is still active, the transaction is said to use the..... technique.

A) Deferred-modification

B) Late-modification

C) Immediate-modification

D) Undo

39. What is the minimum number of gates required to implement the Boolean function (AB+C) if we have to use only 2-input NOR gates?

A) 2

B) 3

C) 4

D) 5

40. Which of the following is a type of cloud computing service?

A) Service as a Software (SAAS)

B) Software and a Service(Saas)

C) Software as a Service (SaaS)

D) Software as a Server (Saas)

41. Which of the following moodels NOT suitable for accommodating any change?

A) Prototyping model

B) RAD model

C) Build and Fix model

D) Waterfall model

42 The layer of the computer OSI model that by water services that directly suppor user applications is.....

A) Application layer

B) presentation layer

C) transport layer

D) physical layer

Previous

Next