00:00
Time Left
020/2023 - Junior Manager (Information Management)
You are currently taking the Junior Manager (Information Management) series. Good luck!
Question 1
Which of the following is the time complexity of the given program ?
void sample (int n)
{
int p,q,r,c=0;
for (p=n/2; p<=n; p++)
for (q=1; q+n/2;q++)
for (r=1; r<=n; r=r*2)
c++;
}
void sample (int n)
{
int p,q,r,c=0;
for (p=n/2; p<=n; p++)
for (q=1; q+n/2;q++)
for (r=1; r<=n; r=r*2)
c++;
}
Question 2
Which of the following is the correct postfix expression corresponding to the given infix expression ? A + B – C*D + (E^F)* G/H/I * J + K
Question 3
Which of the following statement(s) is/are not correct about circular queue ?
I. It provides a quick way to store FIFO data with a maximum size.
II. Efficient utilization of the memory.
III. In the Round-Robin scheduling algorithm, a circular queue is utilized to maintain processes that are in a ready state.
IV. It uses dynamic memory.
I. It provides a quick way to store FIFO data with a maximum size.
II. Efficient utilization of the memory.
III. In the Round-Robin scheduling algorithm, a circular queue is utilized to maintain processes that are in a ready state.
IV. It uses dynamic memory.
Question 4
Which of the following statement(s) is/are true relating to linked lists ?
I. more memory is required in the linked list as compared to an array.
II. direct access to an element is not possible in a linked list as in an array by index.
III. There is no need to shift elements after the insertion or deletion of an element only the address present in the next pointer needs to be updated.
I. more memory is required in the linked list as compared to an array.
II. direct access to an element is not possible in a linked list as in an array by index.
III. There is no need to shift elements after the insertion or deletion of an element only the address present in the next pointer needs to be updated.
Question 5
Which among the following statement(s) is/are not correct regarding the properties of the binary trees ?
1. The number of leaf nodes l in a perfect binary tree, is l = (n + 1)/2.
2. A full binary tree with l leaves has 2l + 1nodes (n).
3. The number of null links (i.e. , absent children of the nodes) in a binary tree of n nodes is (n – 1)
1. The number of leaf nodes l in a perfect binary tree, is l = (n + 1)/2.
2. A full binary tree with l leaves has 2l + 1nodes (n).
3. The number of null links (i.e. , absent children of the nodes) in a binary tree of n nodes is (n – 1)
Question 6
Consider the following statements about AVl trees :
I. Searching for a specific key in an AVL tree can be done the same way as that of any balanced or unbalanced binary search tree.
II. Once a node has been found in an AVl tree, the next or previous node can be accessed in amortized constant time.
III. The retracing can stop if the balance factor becomes (+/–) 1 implying that the height of that sub tree remains unchanged.
Which among the above statement(s) is/are not correct ?
I. Searching for a specific key in an AVL tree can be done the same way as that of any balanced or unbalanced binary search tree.
II. Once a node has been found in an AVl tree, the next or previous node can be accessed in amortized constant time.
III. The retracing can stop if the balance factor becomes (+/–) 1 implying that the height of that sub tree remains unchanged.
Which among the above statement(s) is/are not correct ?
Question 7
Which of the following is/are correct relating to the possible multiplicity property of MST ?
1. If all the edge weights of a graph are the same, then every spanning tree of that graph is the minimum.
2. If each edge has a distinct weight then there will be only one, unique minimum spanning tree.
3. If the weights are positive, then a minimum spanning tree is a minimum cost subgraph connecting all vertices.
1. If all the edge weights of a graph are the same, then every spanning tree of that graph is the minimum.
2. If each edge has a distinct weight then there will be only one, unique minimum spanning tree.
3. If the weights are positive, then a minimum spanning tree is a minimum cost subgraph connecting all vertices.
Question 8
Which of the following statement(s) is/are correct relating to double hashing ?
a. The interval between probes is fixed (usually 1).
b. The interval between probes is increased by adding the successive outputs of a quadratic polynomial to the value given by the original hash computation.
c. The interval between probes is computed by a secondary hash function.
a. The interval between probes is fixed (usually 1).
b. The interval between probes is increased by adding the successive outputs of a quadratic polynomial to the value given by the original hash computation.
c. The interval between probes is computed by a secondary hash function.
Question 9
Which of the following are the two key attributes that a problem must have in dynamic programming to be applicable ?
1. Overlapping sub-problems
2. Non-overlapping sub-problems
3. Optimal substructure
4. divide and Conquer
1. Overlapping sub-problems
2. Non-overlapping sub-problems
3. Optimal substructure
4. divide and Conquer
Question 10
Which of the following statement(s) is/are correct regarding greedy algorithms ?
i. The choice made by a greedy algorithm may depend on choices made so far, but not on future choices or all the solutions to the sub-problem.
ii. A greedy algorithm never reconsiders its choices.
iii. Greedy algorithms produce good solutions to some mathematical problems, but not to others.
i. The choice made by a greedy algorithm may depend on choices made so far, but not on future choices or all the solutions to the sub-problem.
ii. A greedy algorithm never reconsiders its choices.
iii. Greedy algorithms produce good solutions to some mathematical problems, but not to others.
Question 11
Which of the following statement(s) is/are correct about mongodB horizontal scaling ?
a. It refers to bringing on additional nodes to share the load.
b. This allows them to be distributed across nodes more simply, as queries do not have to “join” them together across nodes.
c. It refers to increasing the processing power of a single server or cluster.
d. It is a good option to try first if massive storage and processing are not required.
a. It refers to bringing on additional nodes to share the load.
b. This allows them to be distributed across nodes more simply, as queries do not have to “join” them together across nodes.
c. It refers to increasing the processing power of a single server or cluster.
d. It is a good option to try first if massive storage and processing are not required.
Question 12
Consider the following statements :
i. It is a database management system based on the relational model.
ii. Entity type refers to the collection of the entity that shares a common definition.
iii. Stores data in entities, defined as tables that hold specific information.
iv. Stores data as well as methods.
Which among the above statement(s) is/are correct regarding the OODBMS ?
i. It is a database management system based on the relational model.
ii. Entity type refers to the collection of the entity that shares a common definition.
iii. Stores data in entities, defined as tables that hold specific information.
iv. Stores data as well as methods.
Which among the above statement(s) is/are correct regarding the OODBMS ?
Question 13
Which of the following is/are not a concurrency control technique(s) ?
a. Locking
b. Time stamping
c. Normalization
d. Optimistic method
a. Locking
b. Time stamping
c. Normalization
d. Optimistic method
Question 14
Which of the following is not the utility of DBMS ?
1. Loading
2. Recovery
3. File organization
4. Backup
1. Loading
2. Recovery
3. File organization
4. Backup
Question 15
Which of the following is used to manipulate Oracle database structures, including tables ?
Question 16
Which of the following statements are true about the Third Normal Form (3NF) ?
1. Non-prime attributes cannot be transitively dependent.
2. It helps to maintain the integrity of the data.
3. 3NF is sometimes referred to as project-join NF.
1. Non-prime attributes cannot be transitively dependent.
2. It helps to maintain the integrity of the data.
3. 3NF is sometimes referred to as project-join NF.
Question 17
Which of the following statement(s) is/are true regarding network model (data model) ?
I. The schema, viewed as a graph in which object types are nodes and relationship types are arcs, is not restricted to being a hierarchy or lattice.
II. A method of data modelling that has been defined as “attribute free”, and “fact based”.
III. It is sometimes known as the CODASYL model.
IV. A database model based on first-order predicate logic.
I. The schema, viewed as a graph in which object types are nodes and relationship types are arcs, is not restricted to being a hierarchy or lattice.
II. A method of data modelling that has been defined as “attribute free”, and “fact based”.
III. It is sometimes known as the CODASYL model.
IV. A database model based on first-order predicate logic.
Question 18
A ___________ is a stored procedure in a database which automatically invokes whenever a special event in the database occurs.
Question 19
Which of the following statement(s) is/are correct about composite attributes ?
1. An attribute consisting of more than one value for a given entity.
2. An attribute that can be derived from other attributes of the entity type.
3. An attribute composed of many other attributes.
4. An attribute that can be further subdivided into sub-attributes.
1. An attribute consisting of more than one value for a given entity.
2. An attribute that can be derived from other attributes of the entity type.
3. An attribute composed of many other attributes.
4. An attribute that can be further subdivided into sub-attributes.
Question 20
Given that W, X, Y, and Z are sets of attributes in a relation R, one can derive several properties of functional dependencies :
Which among the following represents pseudo-transitive rule ?
Which among the following represents pseudo-transitive rule ?
Question 21
Which of the following option leads to the portability and security of Java ?
Question 22
Which of the following is/are not the un-conditional control constructs in Python ?
i. pass
ii. break
iii. continue
iv. quit()
i. pass
ii. break
iii. continue
iv. quit()
Question 23
Which of the following statement(s) is/are not true regarding Encapsulation ?
i. The bundling of data with the methods that operate on that data, or the restricting of direct access to some of an object’s components.
ii. This mechanism is unique to OOP.
iii. It can be used to hide data members and member functions.
i. The bundling of data with the methods that operate on that data, or the restricting of direct access to some of an object’s components.
ii. This mechanism is unique to OOP.
iii. It can be used to hide data members and member functions.
Question 24
Which of the following statement(s) is/are not true regarding method overriding ?
i. It is used to provide the specific implementation of the method that is already provided by its super class.
ii. It is an example of run time polymorphism.
iii. It is performed within class.
i. It is used to provide the specific implementation of the method that is already provided by its super class.
ii. It is an example of run time polymorphism.
iii. It is performed within class.
Question 25
Considering the following statements about compile-time polymorphism, which of the following is/are true ?
a. It is also known as static polymorphism.
b. Overloading of methods is called through the reference variable of a class.
c. Compile-time polymorphism is achieved by method overloading and operator overloading.
d. It can be achieved through static binding.
a. It is also known as static polymorphism.
b. Overloading of methods is called through the reference variable of a class.
c. Compile-time polymorphism is achieved by method overloading and operator overloading.
d. It can be achieved through static binding.
Question 26
Which of the following statement(s) relating to interfaces in Java is/are not correct ?
i. It is a mechanism of achieving abstraction and multiple inheritances.
ii. There can be multiple interfaces in a package.
iii. It is not possible to create objects using an interface.
iv. There is no constructor in an interface.
i. It is a mechanism of achieving abstraction and multiple inheritances.
ii. There can be multiple interfaces in a package.
iii. It is not possible to create objects using an interface.
iv. There is no constructor in an interface.
Question 27
Which of the following statement(s) regarding the exception handling in Java is/are true ?
a. It is a mechanism to handle runtime errors.
b. One advantage of the exception handling is to maintain the normal flow of the application.
c. It enables programmers to write robust and fault-tolerant programs.
d. One approach to handle exceptions in Java using try ... catch block.
a. It is a mechanism to handle runtime errors.
b. One advantage of the exception handling is to maintain the normal flow of the application.
c. It enables programmers to write robust and fault-tolerant programs.
d. One approach to handle exceptions in Java using try ... catch block.
Question 28
Considering different states of a Thread during its lifetime, which of the following pairs are correctly matched ?
1. Running : The processor has given its time to the thread for its execution.
2. Runnable : The thread may be running or may be ready to run at any given instant of time.
3. Waiting : When the thread is prevented from entering into the runnable state and subsequently the running state.
4. Timed Waiting : A thread lies in the waiting state for a specific span of time, and not forever.
1. Running : The processor has given its time to the thread for its execution.
2. Runnable : The thread may be running or may be ready to run at any given instant of time.
3. Waiting : When the thread is prevented from entering into the runnable state and subsequently the running state.
4. Timed Waiting : A thread lies in the waiting state for a specific span of time, and not forever.
Question 29
Consider the following statements about Java swing
1. Swing in Java doesn’t support pluggable look and feel.
2. Java swing doesn’t follows MVC (Model View Controller).
3. Java swing components are platform-independent.
4. Swing components are lightweight.
Which among the above statement(s) is/are correct ?
1. Swing in Java doesn’t support pluggable look and feel.
2. Java swing doesn’t follows MVC (Model View Controller).
3. Java swing components are platform-independent.
4. Swing components are lightweight.
Which among the above statement(s) is/are correct ?
Question 30
JDBC API uses JDBC drivers to connect with the database, which of the following are the JDBC drivers ?
1. JDBC-ODBC Bridge Driver
2. Thin driver
3. Network Protocol driver
4. Native driver
1. JDBC-ODBC Bridge Driver
2. Thin driver
3. Network Protocol driver
4. Native driver
Question 31
Which of the following are the built-in Python data types ?
a. Sequence types
b. Binary types
c. Mapping data types
d. Set data types
a. Sequence types
b. Binary types
c. Mapping data types
d. Set data types
Question 32
Which of the following statement(s) is/are correct regarding list data structure ?
1. A list organizes data values by association with other data values rather than by sequential position.
2. The logical structure of a list is similar to the structure of a string.
3. Each of the items in a list is ordered by position.
4. Each item in a list has a unique index that specifies its position.
1. A list organizes data values by association with other data values rather than by sequential position.
2. The logical structure of a list is similar to the structure of a string.
3. Each of the items in a list is ordered by position.
4. Each item in a list has a unique index that specifies its position.
Question 33
Which of the following are the examples of dictionaries ?
i. [1980, 1951, 1990]
ii. {‘Name’ : ‘Bob’, ‘Occupation’ : ‘Manager’}
iii. {‘Name’ : ‘Bob’, 1 : [1, 2, 3, 4]}
iv. [[‘Welcome’, ‘You’], [‘Bob’]]
i. [1980, 1951, 1990]
ii. {‘Name’ : ‘Bob’, ‘Occupation’ : ‘Manager’}
iii. {‘Name’ : ‘Bob’, 1 : [1, 2, 3, 4]}
iv. [[‘Welcome’, ‘You’], [‘Bob’]]
Question 34
Which of the following parsing library in Python that enables web scraping from HTML and XML documents ?
Question 35
Which of the following statement is true for when TypeError exception raised ?
1. When a key does not exist in a dictionary.
2. When two different types are combined.
3. When the user presses Ctrl+C, Ctrl+Z or delete.
1. When a key does not exist in a dictionary.
2. When two different types are combined.
3. When the user presses Ctrl+C, Ctrl+Z or delete.
Question 36
A context switch takes place when
Question 37
A Process Control Block (PCB) is
Question 38
Threads within the same process do not share the same
Question 39
The disadvantage of round-robin process scheduling is
Question 40
A race condition occurs when
Question 41
Page-based virtual memory is subject to
Question 42
A system uses 32-bit logical addresses, a 16K byte page size, and 36-bit physical addresses. What is the size of the page table ?
Question 43
Memory compaction is a technique to
Question 44
With a direct mapping paging system on a 32-bit processor with 32KB pages, what is the size of each process’ page table ?
Question 45
A logical address of 0x514413ab on a 32-bit page-based virtual memory system with 4KB pages has the following offset
Question 46
Assume that a main memory access takes 100 ns. If we are using a two-level page table and have a 50% TlB hit ratio, the effective memory access time is (assume no memory cache and no page faults)
Question 47
A certain memory management Unit (MMU) converts 16-bit virtual address with 512-byte pages into 20-bit physical addresses. How big is the page table ?
Question 48
Thrashing in a virtual memory system is caused by
Question 49
The wait system call on linux systems puts a process to sleep until
Question 50
The linux slab allocator is not designed to
Question 51
The Address Resolution Protocol (ARP) is used to
Question 52
The network device driver is responsible for which layer of the OSI stack ?
Question 53
In the Internet Protocol (IP), a port number is present at the
Question 54
TCP/IP differs from UDP/IP in that TCP/IP
Question 55
In the OSI Reference model, what is the purpose of the Transport layer ?
Question 56
Which is true about the Transport Control Protocol (TCP) ?
Question 57
Given are the following subnet addresses:
X : 192.168.128.0/22 Y : 192.168.136.0/22 Z : 192.168.142.0/22
Which of the following statements is true ?
X : 192.168.128.0/22 Y : 192.168.136.0/22 Z : 192.168.142.0/22
Which of the following statements is true ?
Question 58
A typical router in the core of the Internet has
Question 59
The Internet Control message Protocol (ICMP) is used by
Question 60
In a Class B IP address like 136.159.5.20, the network Id portion is
Question 61
In Classless Inter-domain Routing (CIdR), the network Id in an IPv4 address is
Question 62
Which one of the following IP addresses is a private IP address ?
Question 63
The typical Maximum Segment Size (MSS) for TCP on the Internet is
Question 64
The new feature(s) in IPv6 compared to IPv4 is/are
Question 65
The Domain Name Service (DNS) is an example of a
Question 66
As part of requirement analysis, customer is getting a chance to use the product before it is finally implemented. Which of the following software process model follows this concept ?
Question 67
Which of the following is not an Object Oriented methodology for Software design ?
Question 68
Which of the following International Standards Organization’s (ISO) standard is applicable for software product development ?
Question 69
_____________ testing verifies whether the software meeting fuctionalities and not checking the implementation details.
Question 70
Which of the following is false when calculating cyclomatic complexity, V(G), for a flow graph G ?
Question 71
Which of the following is a system testing done among the small group of customers ?
Question 72
Which of the following is not a level of Capability maturity model developed by Software Engineering Institute of Carnegie mellon University ?
Question 73
Which of the following PHP function converts 100.56 to 100 ?
Question 74
AJAX stands for
Question 75
Which one of the following is another name of Javascript ?
Question 76
________ is a text based protocol and uses XML based rule to allow applications interchange information over HTTP.
Question 77
From the following statements, related to XML syntax, which one is false ?
Question 78
Which of the following is not datatype in JSON ?
Question 79
Node.js is not advisable to use for
Question 80
What is the starting of all jQuery selectors?
Question 81
The use of technologies such as fingerprint, retina and iris scans to authenticate the individuals requesting access to resource is called
Question 82
The DES algorithm is an example of what type of cryptography ?
Question 83
Which of the following is not a cryptographic algorithm that uses hashing function ?
Question 84
Which one of the following quality is most affected by denial of Service (DoS) attack ?
Question 85
_________ is a network authentication protocol designed to provide authentication for client/server applications by using symmetric key cryptography.
Question 86
The Secure Shell (SSH) operates at the _______ of the OSI reference model.
Question 87
Which one of the following is not a VPN protocol ?
Question 88
What is the port number used by HTTPS ?
Question 89
Which encryption algorithm is used by WPA2 for securing wireless networks ?
Question 90
The PGP stands for
Question 91
Which one of the following is a private cloud ?
Question 92
Google AppEngin is an example of
Question 93
The characteristic of a software program that enables an instance of the program to serve different consumers where by each is isolated from other is referred to as
Question 94
______________ are system level messages exchanged between hypervisors, hypervisor and virtual services and hypervisor and Virtualized Infrastructure Managers (VIMs).
Question 95
What does the acronym CAP stands for, in the CAP theorem of distributed Systems ?
Question 96
A popular non-relational cloud database
Question 97
___________ is a mainframe operating system which allows other operating system to run on the same system concurrently and monitor access of virtual machines.
Question 98
_________ is a Apache project which uses MapReduce programming model of cloud computing.
Question 99
Blockchain can refer to
Question 100
_________ is a technology for building apps and organizations, holding assets, transacting and communicating without being controlled by a central authority.