Posts

Showing posts from December, 2013

Interview MCQ Questions of Computer Fundamentals set-3

Image
1. Which is special register, which holds machine instructions? A) Control unit B) RAM C) Control instruction register D) None of the above 2. A language used to express algorithms in computer understandable form is A) Assembly language B) Low-level language C) Algorithmic language D) Programming language 3. Which statement is not valid about computer A) Can accept data supplied by the user B) Can process the data C) Can output the data as result D) None of the above 4. Central processing Unit is combination of A) Control and Storage unit B) Control and Output unit C) Arithmetic Logic and Input Unit D) Arithmetic Logic and Control Unit 5. ASCII stands for A) American Standard Code for Introduction Interchange B) American Standard Code for Information Interchange C) American Start Code for Information Interchange D) American Stop Code for Information Interchange 6. Seek time is A) Time to position the head over proper track B) Time to position the head over proper sector C) Time to posi

Computer Networks MCQ Interview Questions with Answer set-8

Image
1. In addresses for ................... networks, the first 16 bits specify a particular network, and the last 16 bits specify a particular host.  SMTP (Photo credit: Wikipedia ) A) class A B) class B C) class C D) class D 2. The .............. protocol is based on end to end delivery. A) SMTP B) TCP C) IP D) SCTP 3. A/An .................... routing scheme is designed to enable switches to react to changing traffic patterns on the network. A) static routing B) fixed alternate routing C) adaptive routing D) dynamic routing 4. The IPV4 address is a .................. address because it is assigned at the internet layer. A) logical B) physical C) common D) shared 5. The ................... layer provides a well defined service interface to the network layer, determining how the bits of the physical layer are grouped into frames. A) Data Link B) Physical C) Network D) Session 6. A distributed data processing configuration in which all activities must pass through a centrally located compu

Solved MCQ of Wireless Mobile Communication set-1

Image
GSM Network Architecture (Photo credit: Wikipedia ) 1. Which of the following is/are the main part(s) of basic cellular system . A) A mobile Unit B) A cell Site C) A mobile Telephone Switching Office D) All of the above 2. Fading of the received radio signals in a mobile communication environment occurs because of ..... A) Direct propagation B) Multipath Propagation C) Bi-path Propagation D) None of the above 3.State whether True of False. i) The cells or subdivisions of a geographical area are always hexagonal. ii) A land to Mobile call originates through the Telephone exchange . A) True, False B) False, True C) False, False D) True, True 4. In .............. Frequency Spectrum is divided into smaller spectra and is allocated to each user. A) TDMA B) CDMA C) FDMA D) FGMA 5. In ................ multiple access is achieved by allocating different time slots for the different users. A) TDMA B) CDMA C) FDMA D) FGMA 6. State whether True of False. i) In GSM only TDMA is used. ii) There is

Solved MCQ of Client Server Computing set-1

Image
1. ........................ tier it's much easier to design the application to be DBMS agnostic. A) Middle application server Client-Server Model (Photo credit: Wikipedia ) B) Multithreaded application C) Application server D) Client server application 2. Which of the following is not the correct benefit of distributed computing . A) Resource sharing B) Performance C) Availability D) Security 3. ................... serve as the 'glue' between the client and server applications respectively, and that ORB . A) ORB and ORB Interface B) CORBA IDL stubs and skeletons C) Client and servant D) Client and server 4. In ........................ the client invokes the request, and then blocks waiting for the response. A) Deferred Synchronous Invocation B) One way Invocation C) Synchronous Invocation D) Two way Invocation 5. In ...................... the client invokes the request, continues processing while the request in dispatched, and later collects the response. A) Deferred Synch

Computer Organization and Architecture Objective Questions set-5

Image
1. Memory unit that communicates directly with the CPU is called the ............... A) Main memory RISC (Photo credit: Wikipedia ) B) Secondary memory C) Auxiliary memory D) Register 2. CISC stands for ................ A) Common Instruction Set Computers B) Complex Instruction Set Compilers C) Complex Instruction Set Computers D) Compound Instruction Set Computers 3. The communication between central system and the outside environment is done by A) Input-output subsystem B) Control system C) Memory system D) Logic system 4. The register that keeps track of the instructions in the program stored in memory is .. A) Control register B) Program counter C) Status register D) Direct register 5. ................ is a small very speed register file maintained by the instruction fetch segment of the pipeline. A) Branch Target Buffer B) Loop buffer C) Branch loop buffer D) Target register 6. In case of only one memory operand, when a second operand is needed, as in the case of an Add instruct

Computer Organization and Architecture Interview Questions set-4

Image
1. The computer code for the interchange of information between terminal is .. A) ASCII Example of how to construct a NAND gate from NOR gates (Photo credit: Wikipedia ) B) BCD C) EBCDIC D) All of the above 2. SIMD stands for .... A) Single Instruction Stream Over Multiple Data Streams B) Single Instruction Stream Over Minimum Data Streams C) Single Instruction Stream Over Media Data Streams D) Multiple Instruction Streams and Single Data Stream 3. The NOR gate is complement of .. A) AND gate B) OR gate C) NAND gate D) NOT gate 4. A .............. is a digital circuit that performs the inverse operation of decodes. A) multiplexer B) adder C) subtractor D) encoder 5. Pipelining increases the CPU instruction .......... A) efficiency B) latency C) throughput D) Both a and c 6. The ............... is a program whose function is to start the computer software operating when power is turned on. A) Bootstrap loader B) Multi programming C) Loader D) None of the above 7. .................. i

Java MCQ Interview Questions With Answers set-10

Image
1. Java was developed by the company A) Sun Micro systems Sun Micro systems Image CrunchBase B) Microsoft C) Micro tech D) IBM 2. What is the file extension of compiled java program? A) .class B) .java C) .css D) .html 3. .................. keyword is used to invoke the current object. A) New B) That C) This D) Me 4. Which of the function is used to convert string to Number in java program? A) to Number() B) conString() C) valueOf() D) toString() 5. What are the part in executing a Java program and their purposes? A) Java Compiler B) Java Interpreter C) Java Pre-processor D) Directive Pre-processor 6. Method overloading is one of the way that Java supports ............ A) encapsulation B) class C) inheritence D) polymorphism 7. Java support RMI. What does this RMI stands for? A) Random Memory Interface B) Remote Method Invocation C) Random Method Invocation D) Remote Memory Interface 8. Which of the following represent legal flow control statements? A) break; B) break(); C) continue(in

SQL Interview Multiple Choice Questions and Answers set-4

Image
1. In SQL, which command is used to issue multiple CREATE TABLE , CREATE VIEW and GRANT statements in a single transaction? SQL database icon with shortcut identification (Photo credit: Wikipedia ) A) CREATE PACKAGE B) CREATE SCHEMA C) CREATE CLUSTER A) All of the above 2. In SQL, the CREATE TABLESPACE is used A) to create a place in the database for storage of scheme objects, rollback segments, and naming the data files to comprise the tablespace. B) to create a database trigger . C) to add/rename data files, to change storage D) All of the above 3. Which character function can be used to return a specified portion of a character string ? A) INSTR B) SUBSTRING C) SUBSTR D) POS 4. Which of the following is TRUE for the System Variable $date$? A) Can be assigned to a global variable. B) Can be assigned to any field only during design time. C) Can be assigned to any variable or field during run time. D) Can be assigned to a local variable. 5. What are the different events in Triggers? A)

SQL MCQ Interview Questions With Answers set-3

Image
1. In SQL , which command is used to remove a stored function from the database? Cover of SQL Server magazine (Photo credit: Wikipedia ) A) REMOVE FUNCTION B) DELETE FUNCTION C) DROP FUNCTION D) ERASE FUNCTION 2. In SQL, which command is used to select only one copy of each set of duplicate rows A) SELECT DISTINCT B) SELECT UNIQUE C) SELECT DIFFERENT D) All of the above 3. Count function in SQL returns the number of A) Values B) Distinct values C) Groups D) Columns 4. Composite key is made up of ................ A) One column B) One super key C) One foreign key D) Two or more columns 5. What command is used to get back the privileges offered by the GRANT command? A) Grant B) Revoke C) Execute D) Run 6. Which command displays the SQL command in the SQL buffer, and then executes it? A) CMD B) OPEN C) EXECUTE D) RUN 7. What is a DATABLOCK? A) Set of Extents B) Set of Segments C) Smallest Database storage unit D) Set of blocks 8. If two groups are not linked in the data model editor, wha

Solved Objective Questions of Database Management System set-9

Image
1. ............................ is the powerful language for working with RDBMS . A) Embedded Programs Database Management System (Photo credit: Wikipedia ) B) Dynamic Programs C) Query Language D) Static Language Programs 2. The file in DBMS is called as .................. in RDBMS. A) console B) schema C) table D) object 3. In ..................... , we have a strict parent-child relationship only. A) hierarchical databases . B) network databases C) object oriented databases D) relational databases 4. Which normal form is considered adequate for relational database design ? A) 2 NF B) 3 NF C) 4 NF D) BCNF 5. What operator tests column for the absence of data? A) IS NULL operator B) ASSIGNMENT operator C) LIKE operator D) NOT operator 6. Which is proper subset designed to support views belonging to different classes of users in order to hide or protect information. A) Schema B) Sub-schema C) Non-schema D) Non-sub schema 7. Which contain information about a file needed by system progr