UPPSC LT Grade Computer subject exam paper 29 July 2018 (Answer key)


UPPSC LT Grade Computer subject exam paper 29 July 2018 (Answer key)

131. Every EJB class file has
A. One accompanying interface and one XML file
B. One accompanying interface and two XML file
C. Two accompanying interface and one XML file
D. Two accompanying interface and two XML file

Show Answer

Answer -C

Hide Answer

132. In unit testing of a model, it is found that for a set of test data, at the maximum 90% of the code alone were with the probability of success. 0.9 Than the reliability of the model is
A. Greater than 0-9
B. Equal to 0-9
C. At most 0.81
D. At least 1/0.81

Show Answer

Answer -C

Hide Answer

133. Which of the following activities does not belong to implementation phase of SDLC?
A. Program testing
B. File conversion
C. User training
D. New changes to the system

Show Answer

Answer -A

Hide Answer

134. Project risk factor is considered in
A. Waterfall model
B. Prototyping model
C. Spiral model
D. Iterative enhancement model

Show Answer

Answer -C

Hide Answer

135. According to PUTNAM, the project effort is inversely proportional to the fourth power of the development time. Doubling the development schedule for a 100 person-Month (PM) project would reduce the project effort to
A. 50 PM
B. 7.16 PM
C. 25 PM
D. 6.25 PM

Show Answer

Answer -D

Hide Answer

136. In virtual memory paging, page size and frame size have which of the following relations?
A. Both are of equal size
B. Both are of unequal size
C. The page size is exactly half of the frame size
D. the page size twice the frame size

Show Answer

Answer -A

Hide Answer

137. To change the command prompt in UNIX, one can use
A. grep
B. is
C. ps1
D. pwd

Show Answer

Answer -C

Hide Answer

138. Which of the following page replacement algorithms requires futuristic information about page references?
A. FIFO
B. LRU
C. Second chance
D. Optimal

Show Answer

Answer -D

Hide Answer

139. A process refers to 5 pages A, B, C, D, E in the order
A; B; C; D; A; B; E; A; B; C; D; E;
It the page replacement is FIFO, the number of pages which transfer with an ’empty Internal store of 3 frames’ is
A. 8
B. 10
C. 9
D. 7

Show Answer

Answer -C

Hide Answer

140. The number of 3’s in the output of the program
main()
{
printf(“1”);
fork ();
printf(“2”);
fork ();
fork();
printf(“3”)
A. 16
B. 8
C. 4
D. 2

Show Answer

Answer -B

Hide Answer

141. The data blocks of a very large file in UNIX file system are allocated using
A. contiguous allocation
B. linked allocation
C. indexed allocation
D. an extension indexed allocation

Show Answer

Answer -D

Hide Answer

142. if a function does not modify the data base, the purity level is
A. RNDS
B. WNPS
C. RNPS
D. WNDS

Show Answer

Answer -D

Hide Answer

134. Which of the following concurrency control protocols ensure(s) both conflict serializability and freedom from deadlock?
I. 2-phase locking
II. Timestamp ordering
A. I only
B. II only
C. Both I and II
D. Neither I nor II

Show Answer

Answer -B

Hide Answer

144. In RDBMS, different classes of relations are created using _____ technique to prevent modification anomalies.
A. Functional dependencies
B. Data integrity
C. Referential integrity
D. Normal forms

Show Answer

Answer -D

Hide Answer

145. Which of the following is not a record-based data model?
A. Relational model
B. Hierarchical model
C. E-R model
D. network model

Show Answer

Answer -C

Hide Answer

146. If transaction A holds a shared lock R and if transaction B also requests for a shared lock on R, it will
A. Result in deadlock situation
B. Immediately be granted
C. Immediately be rejected
D. Be granted as soon as it is released by A

Show Answer

Answer -B

Hide Answer

147. A data model is a collection of conceptual tools for describing
A. Data and data relationship
B. Data semantics and consistency constraints
C. Data, data relationship, data semantics and consistency constraints
D. None of the above

Show Answer

Answer -C

Hide Answer

148. The difference (-) operation removes common tuples from the first relation. This operation is
A. Commutative and associative
B. Non-commutative and associative
C. Commutative and non-associative
D. Non-commutative and non-associative

Show Answer

Answer -A

Hide Answer

149. Which of the following is possible security threat?
A. Information destruction
B. Information alteration


C. Information release
D. All of the above

Show Answer

Answer -D

Hide Answer

150. Salami attack is for
A. Website defacement
B. Controlling the website
C. financial crimes
D. Theft of internet itme


Show Answer

Answer -C

Hide Answer

Pages: 1 2 3 4 5 6


Leave a Reply

Your email address will not be published. Required fields are marked *