131. Every EJB class file has
A. One accompanying interface and one XML file
B. One accompanying interface and two XML file
C. Two accompanying interface and one XML file
D. Two accompanying interface and two XML file
Show Answer
Hide Answer
132. In unit testing of a model, it is found that for a set of test data, at the maximum 90% of the code alone were with the probability of success. 0.9 Than the reliability of the model is
A. Greater than 0-9
B. Equal to 0-9
C. At most 0.81
D. At least 1/0.81
Show Answer
Hide Answer
133. Which of the following activities does not belong to implementation phase of SDLC?
A. Program testing
B. File conversion
C. User training
D. New changes to the system
Show Answer
Hide Answer
134. Project risk factor is considered in
A. Waterfall model
B. Prototyping model
C. Spiral model
D. Iterative enhancement model
Show Answer
Hide Answer
135. According to PUTNAM, the project effort is inversely proportional to the fourth power of the development time. Doubling the development schedule for a 100 person-Month (PM) project would reduce the project effort to
A. 50 PM
B. 7.16 PM
C. 25 PM
D. 6.25 PM
Show Answer
Hide Answer
136. In virtual memory paging, page size and frame size have which of the following relations?
A. Both are of equal size
B. Both are of unequal size
C. The page size is exactly half of the frame size
D. the page size twice the frame size
Show Answer
Hide Answer
137. To change the command prompt in UNIX, one can use
A. grep
B. is
C. ps1
D. pwd
Show Answer
Hide Answer
138. Which of the following page replacement algorithms requires futuristic information about page references?
A. FIFO
B. LRU
C. Second chance
D. Optimal
Show Answer
Hide Answer
139. A process refers to 5 pages A, B, C, D, E in the order
A; B; C; D; A; B; E; A; B; C; D; E;
It the page replacement is FIFO, the number of pages which transfer with an ’empty Internal store of 3 frames’ is
A. 8
B. 10
C. 9
D. 7
Show Answer
Hide Answer
140. The number of 3’s in the output of the program
main()
{
printf(“1”);
fork ();
printf(“2”);
fork ();
fork();
printf(“3”)
A. 16
B. 8
C. 4
D. 2
Show Answer
Hide Answer
141. The data blocks of a very large file in UNIX file system are allocated using
A. contiguous allocation
B. linked allocation
C. indexed allocation
D. an extension indexed allocation
Show Answer
Hide Answer
142. if a function does not modify the data base, the purity level is
A. RNDS
B. WNPS
C. RNPS
D. WNDS
Show Answer
Hide Answer
134. Which of the following concurrency control protocols ensure(s) both conflict serializability and freedom from deadlock?
I. 2-phase locking
II. Timestamp ordering
A. I only
B. II only
C. Both I and II
D. Neither I nor II
Show Answer
Hide Answer
144. In RDBMS, different classes of relations are created using _____ technique to prevent modification anomalies.
A. Functional dependencies
B. Data integrity
C. Referential integrity
D. Normal forms
Show Answer
Hide Answer
145. Which of the following is not a record-based data model?
A. Relational model
B. Hierarchical model
C. E-R model
D. network model
Show Answer
Hide Answer
146. If transaction A holds a shared lock R and if transaction B also requests for a shared lock on R, it will
A. Result in deadlock situation
B. Immediately be granted
C. Immediately be rejected
D. Be granted as soon as it is released by A
Show Answer
Hide Answer
147. A data model is a collection of conceptual tools for describing
A. Data and data relationship
B. Data semantics and consistency constraints
C. Data, data relationship, data semantics and consistency constraints
D. None of the above
Show Answer
Hide Answer
148. The difference (-) operation removes common tuples from the first relation. This operation is
A. Commutative and associative
B. Non-commutative and associative
C. Commutative and non-associative
D. Non-commutative and non-associative
Show Answer
Hide Answer
149. Which of the following is possible security threat?
A. Information destruction
B. Information alteration
C. Information release
D. All of the above
Show Answer
Hide Answer
150. Salami attack is for
A. Website defacement
B. Controlling the website
C. financial crimes
D. Theft of internet itme
Show Answer
Hide Answer
Leave a Reply