1.
The primary function of CPU is to take care of a. b. c. d.
Input, output and Arithmetic and Logical Activities Control and Output Activities Control and Arithmetic - Logical Activities Input and Control Activities
Most Appropriate Answer is Control and Arithmetic-logic activities as CPU do not execute Input and output activities. 2.
Data in a PC is represented by a. ASCII Code ( Cramming Question)
3.
Which of the following device is a random Access Media? a. Magnetic Tape b. DAT c. CD-ROM
Most Appropriate Answer is CD-ROM as Magnetic Tape and DAT access the data serially. 4.
When the computer is switched on, the system performs some tasks before loading the operating system. Such ROM chips can be classified as a. Hardware b. Software c. Firmware
Most Appropriate Answer is Firmware as it contains the features of hardware and software both. 5.
One features provided by the OS is to store all the data and program in the auxiliary memory and bring only selective and needed portions into the main memory for processing. The feature is termed as a. b. c. d.
Spooling Multiplexing Caching Paging
Most Appropriate Answer is paging as when a program is selected for execution, the system brings it into virtual storage, divides it into pages of four kilobytes, and transfers the pages into central storage for execution.
spooling refers to putting jobs in a buffer, a special area in memory or on a disk where a device can access them when it is ready Multiplexing is throwing or catching more than one object at the same time with the same hand.
6.
Which of the following is not a function of the kernel of OS? a. To determine which processes are to be executed b. To prepare the access matrix for accessing resources c. To allocate quantum of man memory for each and every user. d. To overcome the problem of deadlock.
Most Appropriate Answer is to prepare the access matrix for accessing resources as the main functions of kernel are • • • •
Controls and mediates access to Hardware Scheduling/allocation of System resources i.e. Memory, CPU, Disk etc. Enforcing Security and Protection Responding the user request for services ( system Calls)
A deadlock is a situation in which two computer programs sharing the same resource are effectively preventing each other from accessing the resource 7.
In its truest sense, which of the following applications is a real time application? a. Missile Launching system b. Railway Reservation System c. Banking Application. d. Financial Accounting System
Most Appropriate Answer is Missile Launching System as it is the most Instant in all the four. 8.
As an IS Auditor, what precautionary method would you suggest to the company when old computers that held confidential data are being disposed off a. Dispose it off to reliable people b. Format the disk c. Delete all the files in the disk d. Demagnetize the hard disk
Most Appropriate Answer is (D) Demagnetize the hard disk since this will cause all of the bits to be set to zero thus eliminating any chance of information, which was previously stored on the disk, being retrieved. A mid-level format does not delete information from the hard disk. It only resets the directory pointers. The deletion of data from the disk removes the pointer to the file, but in actual fact leaves the data in place so, with the proper tools, the information can be retrieved. The defragmentation of the disk does not cause information to be deleted, but simply moves it around to make it more efficient to access. 9
Which of the following is not addressed in data and capacity management? a. b. c. d.
Rapid Growth of the volumes of Data Rapid Growth in the number of Computer Systems in the organization. Effective data backup schemes Ensuring 24×7 availability
Most Appropriate Answer is (B) Rapid Growth in the number of Computer Systems in the organization as it has no linkage with the data and capacity management
10.
Which is one of the following is the most essential activity for effective capacity planning? e. f. g. h.
Doing the process of liaison with the management and hardware suppliers. Talking to the security administrator for incorporating security procedures To perform the process of Disaster Recovery Planning and Business Continuity Planning Determine the workload of application.
Most Appropriate Answer is (d) Determine the workload of application. 11
An invitation of Tender does not address which of the following? e. Availability of service personnel f. Application portfolio and Transaction Volumes g. Budget of the project h. Compatibility of the new system with the existing one
Most Appropriate Answer is (c) Budget of the project
12.
Which of the following is the best option with regard to an Information Processing Facility (IPF)? a. High MTBF and Low MTTR b. High MTTR and Low MTBF c. High MTBF and High MTTR d. Low MTBF and Low MTTR
Most Appropriate Answer is (a) High MTBF and Low MTTR as MTBF stands for mean Time before Failure and MTTR stands for Mean Time to repair. 13.
Which of the following is not a key concept of object-oriented technology? a. Encapsulation b. Cohesion and coupling c. Polymorphism d. Inheritance
Most Appropriate Answer is (B) Cohesion and coupling as i.e. Object-oriented technology A general term which describes tools, processes, and programming languages concerned with the development of systems that consist of chunks of data known as objects. Encapsulation is the process of hiding all of the details of an object that do not contribute to its essential characteristics Polymorphism is the ability of an object (or reference) to assume (be replaced by) or become many different forms of object. Inheritance (or delegation) specifies slightly different or additional structure or behavior for an object, and these more specific or additional attributes of an object of a base class (or type) when assuming or becoming an object of a derived class characterizes object-oriented polymorphism. This is a special case of parametric polymorphism, which allows an object (or reference) to assume or become any object (possibly satisfying some implicit or explicit type constraints (parametric type), or a common structure), with this common structure being provided by base classes or types (subclass and subtype polymorphism, respectively). "Poly" means "many" and "morph" means "form". The homograph polymorphism has many uses in the sciences, all referring to objects that can take on or assume many different forms.
14.
Software that translates a program in 2GL to 1GL is: a. Compiler b. Interpreter c. Assembler d. Editor
Most Appropriate Answer is (C) as it converts Assembly Languages into Machine Language. - In the computer industry, these abbreviations are widely used to represent major steps or "generations" in the evolution of programming languages. 1GL or first-generation language was (and still is) machine language or the level of instructions and data that the processor is actually given to work on (which in conventional computers is a string of 0s and 1s). 2GL or second-generation language is assembler (sometimes called "assembly") language. A typical 2GL instruction looks like this: ADD
12,8
An assembler converts the assembler language statements into machine language. 3GL or third-generation language is a "high-level" programming language, such as PL/I, C, or Java. Java language statements look like this: public boolean handleEvent (Event evt) { switch (evt.id) { case Event.ACTION_EVENT: { if ("Try me" .equald(evt.arg)) {
A compiler converts the statements of a specific high-level programming language into machine language. (In the case of Java, the output is called bytecode, which is converted into appropriate machine language by a Java virtual machine that runs as part of an operating system platform.) A 3GL language requires a considerable amount of programming knowledge. 4GL or fourth-generation language is designed to be closer to natural language than a 3GL language. Languages for accessing databases are often described as 4GLs. A 4GL language statement might look like this: EXTRACT ALL CUSTOMERS WHERE "PREVIOUS PURCHASES" TOTAL MORE THAN $1000
5GL or fifth-generation language is programming that uses a visual or graphical development interface to create source language that is usually compiled with a 3GL or 4GL language compiler. Microsoft, Borland, IBM, and other companies make 5GL visual programming products for developing applications in Java, for example. Visual programming allows you to easily envision object-oriented programming class hierarchies and drag icons to assemble program components.
15.
if a program is written using mnemonics and op-codes then the program is in a. Machine Language b. Assembly Level Language c. Procedural Language d. Non- Procedural Language Most Appropriate Answer is (B) assembly language In an assembly language program the instructions are written using mnemonic codes and symbolic addresses. 16.
Which of the following tool would be used when program coding has to be done? a. b. c. d.
Compiler Editor Loader Linker.
Most Appropriate Answer is (B) Editor 17.
Which of the following is false with respect to system software’s? a. Provides Facilities for debugging systems b. Provides facilities to optimally use the resources of the system c. Provides software for cryptographic purpose d. Provides facilities to manage users connected to the system
Most Appropriate Answer is (C) Provides software for cryptographic purpose Functions of System Software
All operating systems must handle the same basic tasks. These functions can be divided into three groups:
Allocating System Resources
The operating system directs the traffic inside the computer, deciding what resources will be used and for how long. Time
Time in the CPU is divided into time slices which are measured in milliseconds. Each task the CPU does is assigned a certain number of time slices. When time expires, another task gets a turn. The first task must wait until it has another turn. Since time slices are so small, you usually can't tell that any sharing is going on. Tasks can be assigned priorities so that high priority (foreground) tasks get more time slices than low priority (background) tasks. Memory Memory must be managed also by the operating system. All those rotating turns of CPU use leave data waiting around in buffers. Care must be taken not to lose data!! One way to help out the traffic jam is to use virtual memory. This includes disk space as part of main memory. While it is slower to put data on a hard disk, it increases the amount of data that can be held in memory at one time. When the memory chips get full, some of the data is paged out to the hard disk. This is called swapping. Windows uses a swap file for this purpose. Input Flow control is also part of the operating system's responsibilities. The operating system and must manage all requests to read data from disks or tape and all writes to these and to output printers. To speed up the output to printers, most operating systems now allow for print spooling, where the data to be printed is first put in a file. This frees up the processor for other work in between the times data is going to the printer. A printer can only handle so much data at a time. Without print spooling you'd have to wait for a print job to finish before you can do anything else. With it you can request several print jobs and go on working. The print spool will hold all the orders and process them in turn.
Monitoring System Activities System performance
A user or administrator can check to see whether the computer or network is getting overloaded. Changes could be made to the way tasks are allocated or maybe a shopping trip is in order! System performance would include response time ( how long it takes for the computer to respond when data is entered) and CPU utilization (comparing the time the CPU is working to the time it is idle.)
System security
Some system security is part of the operating system, though additional software can add more security functions. For multiple users who are not all allowed access to everything, there must be a logon or login procedure where the user supplies a user name or ID and a secret password. An administrator must set up the permissions list of who can have access to what programs and what data.
File and Disk Management
Keeping track of what files are where is a major job. If you can't find a file, it doesn't help to know that it is safe and secure somewhere. So an operating system comes with basic file management commands. A user needs to be able to create directories for storing files. (Dumping everything in one pile soon becomes the needle-in-the-haystack story.) A user needs to copy, move, delete, and rename files. This is the category of operating system functions that the user actually sees the most.
A more technical task is that of disk management. Under some operating systems your hard disk can be divided up, or partitioned into several virtual disks. The operating system treats each virtual disk as though it were a physically separate disk. Managing several physical and/or virtual disks can get pretty complex, especially if some of the disks are set up with different operating systems. (Some folks are never satisfied with just one of anything!) 18.
Which of the following is not a job scheduling algorithm? a. b. c. d.
Round Robin Demand Paging Shortest Set Up Time Jobs with a Red Tag.
The Most Appropriate answer is (B) Demand Paging A job scheduler is a program that enables an enterprise to schedule and, in some cases, monitor computer "batch" jobs (units of work, such as the running of a payroll program). A job scheduler can initiate and manage jobs automatically by processing prepared job control language statements or through equivalent interaction with a human operator. Today's job schedulers typically provide a graphical user interface and a single point of control for all the work in a distributed network of computers. Some features that may be found in a job scheduler include: • • • •
Continuously automatic monitoring of jobs and completion notification Event-driven job scheduling Performance monitoring Report scheduling
Scheduling disciplines Scheduling disciplines are algorithms used for distributing resources among parties which simultaneously and asynchronously request them. Scheduling disciplines are used in routers (to handle packet traffic) as well as in operating systems (to share CPU time among threads and processes). The main purposes of scheduling algorithms are to minimize resource starvation and to ensure fairness amongst the parties utilizing the resources.
Common scheduling disciplines The following is a list of common scheduling practices and disciplines: • • • • • • •
Borrowed-Virtual-Time Scheduling (BVT) Completely Fair Scheduler (CFS) Critical Path Method of Scheduling Deadline-monotonic scheduling (DMS) Deficit round robin (DRR) Dominant Sequence Clustering (DSC) Earliest deadline first scheduling (EDF)
• • • • • • • • • • • • • • • • • • • • • • • • • • • • • •
19.
Elastic Round Robin Fair-share scheduling First In, First Out (FIFO), also known as First Come First Served (FCFS) Gang scheduling Genetic Anticipatory Highest response ratio next (HRRN) Interval scheduling Last In, First Out (LIFO) Job Shop Scheduling (see Job shops) Least-connection scheduling Least slack time scheduling (LST) List scheduling Lottery Scheduling Multilevel queue Multilevel Feedback Queue Never queue scheduling O(1) scheduler Proportional Share Scheduling Rate-monotonic scheduling (RMS) Round-robin scheduling (RR) Shortest expected delay scheduling Shortest job next (SJN) Shortest time remaining (STR) Staircase Deadline scheduler (SD) [1] "Take" Scheduling Two-level scheduling Weighted fair queuing (WFQ) Weighted least-connection scheduling Weighted round robin (WRR) Group Ratio Round-Robin: O(1) [2] Which of the following provide complete information about a database? a. Database Model b. The Internal Schema of Database c. Data Dictionary d. Database Views
The Most Appropriate answer is (C) Data Dictionary
In database management systems, a file that defines the basic organization of a database. A data dictionary contains a list of all files in the database, the number of records in each file, and the names and types of each field. Most database management systems keep the data dictionary hidden from users to prevent them from accidentally destroying its contents. Data dictionaries do not contain any actual data from the database, only bookkeeping information for managing it. Without a data dictionary, however, a database management system cannot access data from the database.
20.
Which of the following is not considered as a method for data representation in DBMS? a. Hierarchical Model b. Indexed Sequential Model
c. Network Model d. Relational Model e. The Most Appropriate answer is (B) Indexed Sequential Model A Computer Database is a structured collection of records or data that is stored in a computer system. The structure is achieved by organizing the data according to a database model. The model in most common use today is the relational model. Other models such as the hierarchical model and the network model use a more explicit representation of relationships. 21.
Which of the following statement about a DBMS is Incorrect a. Data Redundancy is minimized b. Application Share Data c. Provides the logic to solve a problem in an application d. Provides facilities to access & store data which is accessed by users.
The Most Appropriate answer is (C) Provides the logic to solve a problem in an application Functions of a DBMS The functions performed by a typical DBMS are the following: •
Data Definition The DBMS provides functions to define the structure of the data in the application. These include defining and modifying the record structure, the type and size of fields and the various constraints/conditions to be satisfied by the data in each field.
•
Data Manipulation Once the data structure is defined, data needs to be inserted, modified or deleted. The functions which perform these operations are also part of the DBMS. These function can handle planned and unplanned data manipulation needs. Planned queries are those which form part of the application. Unplanned queries are ad-hoc queries which are performed on a need basis.
•
Data Security & Integrity The DBMS contains functions which handle the security and integrity of data in the application. These can be easily invoked by the application and hence the application programmer need not code these functions in his/her programs.
•
Data Recovery & Concurrency Recovery of data after a system failure and concurrent access of records by multiple users are also handled by the DBMS.
•
Data Dictionary Maintenance Maintaining the Data Dictionary which contains the data definition of the application is also one of the functions of a DBMS.
•
Performance
Optimizing the performance of the queries is one of the important functions of a DBMS. Hence the DBMS has a set of programs forming the Query Optimizer which evaluates the different implementations of a query and chooses the best among them. Thus the DBMS provides an environment that is both convenient and efficient to use when there is a large volume of data and many transactions to be processed.
22.
The data base administrator is not responsible for which one of the following functions? a. Physical design of a database b. Security of a database c. Coordinate and resolve conflicting needs and desires of users in their diverse application areas d. Logical design of a database.
The Most Appropriate answer is (D) Logical design of a database 23.
SQL is an example for a. 1GL b. 2GL c. 3GL d. 4GL
The Most Appropriate answer is (D) 4GL 24.
The process of Database tuning is carried out by a. Data administrator b. Database Administrator c. Application Programmer d. System Programmer
The Most Appropriate answer is ( B) Database Administrator 25.
Which of the following is not within the scope of DBA? a. Defining the conceptual schema b. Performing the task of data Tuning c. Determine the storage capacity for applications d. Granting and revoking the rights of Users
The Most Appropriate answer is (A) Defining the conceptual schema Database administrator (DBA) is a person who is responsible for the environmental aspects of a database. In general, these include: • • • •
Recoverability - Creating and testing Backups Integrity - Verifying or helping to verify data integrity Security - Defining and/or implementing access controls to the data Availability - Ensuring maximum uptime
• •
Performance - Ensuring maximum performance Development and testing support - Helping programmers and engineers to efficiently utilize the database.
•
The role of a database administrator has changed according to the technology of database management systems (DBMSs) as well as the needs of the owners of the databases. For example, although logical and physical database design are traditionally the duties of a database analyst or database designer, a DBA may be tasked to perform those duties.
Duties The duties of a database administrator vary and depend on the job description, corporate and Information Technology (IT) policies and the technical features and capabilities of the DBMS being administered. They nearly always include disaster recovery (backups and testing of backups), performance analysis and tuning, data dictionary maintenance, and some database design. Some of the roles of the DBA may include •
Installation of new software — It is primarily the job of the DBA to install new versions of DBMS software, application software, and other software related to DBMS administration. It is important that the DBA or other IS staff members test this new software before it is moved into a production environment.
•
Configuration of hardware and software with the system administrator — In many cases the system software can only be accessed by the system administrator. In this case, the DBA must work closely with the system administrator to perform software installations, and to configure hardware and software so that it functions optimally with the DBMS.
•
Security administration — Ones of the main duties of the DBA is to monitor and administer DBMS security. This involves adding and removing users, administering quotas, auditing, and checking for security problems.
•
Data analysis — The DBA will frequently be called on to analyze the data stored in the database and to make recommendations relating to performance and efficiency of that data storage. This might relate to the more effective use of indexes, enabling "Parallel Query" execution, or other DBMS specific features.
•
Database design (preliminary) — The DBA is often involved at the preliminary database-design stages. Through the involvement of the DBA, many problems that might occur can be eliminated. The DBA knows the DBMS and system, can point out potential problems, and can help the development team with special performance considerations.
•
Data modeling and optimization — By modeling the data, it is possible to optimize the system layouts to take the most advantage of the I/O subsystem.
•
Responsible for the administration of existing enterprise databases and the analysis, design, and creation of new databases.
→ Data modeling, database optimization, understanding and implementation of schemas, and the ability to interpret and write complex SQL queries → proactively monitor systems for optimum performance and capacity constraints
→ Establish standards and best practices for SQL → Interact with and coach developers in Structured mark up language scripting
26.
An organization decides to migrate from conventional file system to a DBMS. Which of the following function will increase on account of such migration a. Programming Errors b. Data Entry Errors c. Improper File Access d. Loss of Parity
The Most Appropriate answer is (B) Improper File Access as in conventional file system access is somehow restricted but in DBMS environment it is not there. 27.
DBMS is a software package used to create access and maintain a database. The sub language of a DBMS that define a database is: a. Data description Language b. Data Manipulation language c. Data control language d. Data access language
The Most Appropriate answer is ( B) Database Administrator 28.
Decision support system (DSS) supports which of the following? a. Structured Problems b. Semi-Structured Problems c. Un-Structured Problems d. Problems that focuses on exceptional reporting
The Most Appropriate answer is (B) Semi-Structured Problems
Decision Support Systems – DSS (definition) Decision Support Systems (DSS) are a specific class of computerized information system that supports business and organizational decision-making activities. A properly designed DSS is an interactive softwarebased system intended to help decision makers compile useful information from raw data, documents, personal knowledge, and/or business models to identify and solve problems and make decisions. Typical information that a decision support application might gather and present would be: • • • •
Accessing all of your current information assets, including legacy and relational data sources, cubes, data warehouses, and data marts Comparative sales figures between one week and the next Projected revenue figures based on new product sales assumptions The consequences of different decision alternatives, given past experience in a context that is described
29.
With regard to a DSS, which of the following statements are true? a. It deals with semi-structured problems b. It tackles problems with uncertainty c. Permits “what-if” analysis i. A and B ii. B and C iii. A and C iv. A,B and C
The Most Appropriate answer is (iii) A and C
30.
Middleware is implemented by: a. Server Monitor b. Transaction processing monitor c. CPU Utilization Monitor d. Network connectivity monitor
The Most Appropriate answer is (B) Transaction processing Monitor