+1 and +2 Computer Science

Previous Question paper answered , and Questions from Textbook

+1 and +2 Computer Application

Previous Question paper answered , and Questions from Textbook

Diploma in Computer Application (DCA)

Previous Question paper answered , and Questions from Textbook.

Master of Computer Applications (MCA)

Previous Question paper answered , and Questions from Textbook

True IQ Computer Online Academy

Contact : +91 9036433020 , mail2trueiq@gmail.com

Pageviews

Friday 28 January 2022

UGC (Computer application) net based solved multiple questions Computer system and architecture

 


                       UGC net Computer Application solved  multiple questions

                                                Computer system and architecture)

1.A technique in which system resources are shared among multiple users

  Ans. Multiplexing

2. Memory bank experiencing too much contention from processor

  Ans. Thrash

3. Simplified form of the Boolean expression Y=A'BC'D'+ABC'D'+A'BCD'+ABCD' is

   Ans. BD'

4. ~(pVq)=~p^~q is a famous law in logic known as

  Ans. De Morgan's law

5. A full adder circuit with x, y and z as input bits produces an output the binary sum represented by

  Ans. 

6. In 80287 is

  Ans. Co- processor

7. The maximum size of main memory of a computer is determined by

   Ans. Address bus

8. In computer terminology POST stands for

   Ans. Power on self test

9. Not an assembler directive

   Ans. XCHG

10. In a CDMA system a code for a certain system should have

   Ans. Good auto correlation with other codes and Orthogonality to other codes

11. 8251 is a

    Ans. USART

12. The basic types of programmable arrays are made of -----------

     Ans. AND gates and OR gates

13. An assembler is

     Ans. Machine  dependent

14. Von Neumann architecture is

      Ans. SSID

15. The first modern computer was called ------

    Ans. ENIAC

16. If L is a lattice, then for every a and b in L which among the following is correct?

      Ans. av(bvc)=(avb)vc

17. p------>q is logically equivalent to

    Ans. ~pvq

18. Which one of the following proposition is a tautology?

     Ans. pv(p--->q)

19.In the write operation of DMA, the data is transferred

    Ans. From I/O to memory

20. A circuit that is used to store one bit of data is

    Ans. Flip Flop

21. An n bit microprocessor has

    Ans. n bit instruction register

22. Given  a 4 input AND gate, how many inputs must be HIGH in order for the output of the logic gate to go HIGH

  Ans. All four inputs

23. Which level of RAID uses mirroring to achieve redundancy?

    Ans. 1

24. Which IEEE standard is refers to fast Ethernet?

    Ans. 802.3u

25. The new generation Intel processor with the IA-64 architecture is called?

     Ans. Itanium

26. Which among the following chips is a programmable peripheral interface?

     Ans. 82C55A

27. Which among the following is a little -endian machine?

     Ans. DEC Alpha

28. IEEE802.11 standard is known as

     Ans. CSMA/CA

29. The designation for an electronics standard for connecting devices to your personal computer is

      Ans. IEEE1394

30. Flip flop is a basic structure of the device?

    Ans. Memory

31. ~qvp is equilvalent to

    Ans. q---->p

32. Totem pole output is characteristic of the logic IC family

    Ans. TTL

33. A XOR B is equivalent to

    Ans. (A+B)-(B bar +A bar )

34. Which among the following flipflops is a modification to the R-S flip-flop that avoids its intermediate state?

   Ans. D flip-flop

35. A register organized to allow moving left to right operations is called a

    Ans. Shift register

36. De Morgan's theorem states that NAND gate is equivalent to a bubbled ----------- gate

     Ans. OR

37. Standard TTL has a  multiple emitter input transistor and a --------output

    Ans. Totem-pole

38. The Boolean function x'y'+xy+x'y

    Ans. x'+y

39 Which of the  following logic families highest noise immunity

   Ans. HTL

40. What is the 2's complement of -24 in a 16 bit micro computer

   Ans. 1111 1111 1110 1000


     


Friday 21 January 2022

UGC (Computer application)net based solved multiple questions from DBMS

 

                       UGC net Computer Application solved  multiple questions

                                                DBMS(Database Management System)


1. Data abstraction means

   Ans. Putting together essential features without including background details.

2. A famous technique used in data warehousing

    Ans. OLAP

3. With QBE, inserting records from one or more source tables into a single target table can be achieved        by 

  Ans. Append action query

4. An attribute or set of attributes within one relation that matches the candidate key of some relation

  Ans. Foreign key

5. A subset of data in a data warehouse in the form of summary data related to  a particular department or business function 

Ans. Data  Marts

6. The normalization of  1NF relations to 2NF involves

Ans. Removal of partial dependencies

7. Tuple in relational algebra refers to

   Ans. Row

8. In relational algebra the query that finds customers who have a balance of over 800 is

 Ans. Pi customer_name(sigma balance>800(deposit)

9. The language component of DBMS which can be embedded in a program is

  Ans. The data manipulation language

10. A subschema expresses

   Ans. The external view

11. The language that has recently become the defacto standard for interacting application programs with relational database system is

   Ans. SQL

12. The view of total database content is

   Ans. Conceptual view

13. A foreign key imposes a specific kind of integrity to related tables. What is the name of the integrity?

  Ans. Referential

14. The -----------consists of individual user views of portions of the database.

  Ans. External level schema

15. An attribute that is used as a linkage from records in one table to a record in another table is specified as the---------

Ans. Foreign key

16. Data is stored on computer systems in files. The two basic file types are

  Ans. Master and Transaction

17. Which of the following cannot be blank(Null)

  Ans. Primary key

18. Third normal form is a term used to describe

   Ans. A database that is well structured

19. Select the option that matches the order of the languages to the order of the functions.

Querying, creating, modifying the database.

  Ans. DQL,DDL,DML

20. Which SQL command is a projection operation?

  Ans. SELECT

21. The ------------ clause is used to list the attributes desired in the result of a query?

    Ans. SELECT

22. We express queries in QBE by

     Ans. Skeleton table. 

23. ------------is a set of permitted values for each attribute

     Ans. Domain. 

24. Minimal super keys are called

     Ans. Candidate key

25. A relation is in ----------------every non-key attribute is irreducibly dependent on the primary key.

     Ans. 2NF

26. A statement that the system executes automatically when a database related event occurs

     Ans. Trigger

27. If a relation is in BCNF then it is in

      Ans. 3NF

28. The margin of a word document can be displayed on the horizontal or vertical ruler with the mouse        and the

   Ans.  Alt Key

29. E-R modelling technique is

    Ans. Top-Down structure

30. Data items stored as grouped items is

    Ans. Record

31. data items are fragmented,  replicated and propagated in 

    Ans. DDBMS

32. In data manipulation the first element of T[5] is

    Ans. T[0]

33. Processed data is called

     Ans. Information

34. Which of the among the following DMLs given below is a domain calculus language

     Ans. QBE

35. A relation in BCNF with no multivalued dependencies is in 

    Ans. 4NF

36. From a table STUDENT with the fields ROLL NO.,NAME,MARK1,MARK2 and MARK3 which of the following SQL command list student with highest mark in mark1 field

 Ans. SELECT ROLL NO.MARK1 FROM STUDENT WHERE MARK1=SELECT MAX(MARK1)FROM STUDENT

37. Which of the following data structure is widely used in a network model RDBMS?

    Ans. Graph

38. Tables derived from the ER diagram are

    Ans. Are always in 1NF

39. Spurious tuple may occur due to

     1.Bad normalization

      2. Theta join

       3. Updating tables from join

     Ans. 1 and 3

40. If A---->BC,B---->E,CD----->EF hold in a relation scheme R(A,B,C,D,E,F).Which of the following functional dependencies also hold?

    Ans. AD---->CD

41.In a relation scheme R with attribute A,B,C which of the following defines the augmentation property?

   Ans.  If A---->B holds then AC----->BC where C is a subset of R

42. Discovery of hidden patterns in a very large database is called

    Ans. Data mining

43. SQL is 

    Ans. Data definition language and Data manipulation language

44. The way an application views the data from the database that the application uses is a 

     Ans. Sub schema

45. Which of the following is not characteristic of a relational database model

     Ans. Tree like structure

46. Which of the following SQL statement is not a DML statement

     a) CREATE  b)SELECT c)UPDATE  d)INSERT

Ans. a

47. Which normal form is considered adequate for normal relational database design

   Ans. 3NF

48. In write locks all distributed database concurrency control strategy

     Ans. A transaction is said to have write-lock on item A whenever it has  write lock on any copy of A

49.  A ---------- is responsible for the design and control of a company's database

    Ans. DBA