6

Download as pdf or txt
Download as pdf or txt
You are on page 1of 12

Model Paper of Programmer 6 (P1)

Q1. Based on storage capacity, which is the largest dam in the state of Rajasthan?
Hk.Mkj.k {kerk ds vk/kkj ij jktLFkku jkT; dk lcls cM+k cka/k dkSulk gS\
(a) Meja Dam estk cka/k (b) Rana Pratap Sagar Dam jk.kk izrki lkxj cka/k
(c) Jawai Dam tokbZ cka/k (d) Jakham Dam tk[ke cka/k

Q2. When was the “Sariska” sanctuary elevated to the level of a national park?
ÞlfjLdkÞ vHk;kj.; dks jk"Vªh; m|ku ds Lrj rd dc c<+k;k x;k\
(a) 1994 (b) 1992 (c) 1995 (d) 1990

Q3. Where is the office of Oil India located in the state of Rajasthan?
v‚;y bafM;k dk dk;kZy; jktLFkku jkT; esa dgk¡ fLFkr gS
(a) Nagaur ukxkSj (b) Jodhpur tks/kiqj
(c) Jaisalmer tSlyesj (d) Bikaner chdkusj

Q4. Which personality from Udaipur district has been honored with the Dadasaheb Phalke Icon Award-2023 in
Mumbai?
mn;iqj ftys dh fdl 'kf[l;r dks eqacà esa nknk lkgc QkYds vkbd‚u vokMZ&2023 ls lEekfur fd;k x;k gS\
(a) Rambabu jkeckcw (b) Ramesh Awasthi jes’k voLFkh
(c) Rohit Kothari jksfgr dksBkjh (d) Anil Bhojak vfuy Hkkstd

Q5. Where has Rajasthan's first iodized salt plant been established?
jktLFkku dk igyk vk;ksMkbt ued IykaV dgka LFkkfir fd;k x;k gS\
(a) Nathdwara, Rajsamand ukFk}kjk] jktlean (b) Osian, Jodhpur vksfl;ka] tksèkiqj
(c) Nawan, Kuchaman ukoka] dqpkeu (d) Sambhar, Jaipur lkaHkj] t;iqj

Q6. Recently, which state government has signed a MoU with NTPC for green hydrogen and renewable energy
development?
gky gh es]a fdl jkT; ljdkj us gfjr gkbMªkstu vkSj uohdj.kh; ÅtkZ fodkl ds fy, ,uVhihlh ds lkFk ,d le>kSrk Kkiu ij gLrk{kj fd, gSa\
[A]Rajasthan jktLFkku [B]Maharashtra egkjk"Vª
[C]UttarPradesh mÙkj izn’s k [D] Haryana gfj;k.kk

Q7. The Rajasthan government has decided to hold convention on preserving heritage properties in which city?
jktLFkku ljdkj us fdl 'kgj esa fojklr laifÙk;ksa ds laj{k.k ij lEesyu vk;ksftr djus dk fu.kZ; fy;k gS\
[A]Bikaner chdkusj [B]Jaipur t;iqj
[C]Udaipur mn;iqj [D] Bharatpur Hkjriqj

Q8. Which city of Rajasthan has recently declared UNESCO World Heritage site?
jktLFkku ds fdl 'kgj dks gky gh esa ;wuLs dks us foÜo èkjksgj LFky ?kksf"kr fd;k gS\
[A]Bikaner chdkusj [B]Udaipur mn;iqj
[C]Jaipur t;iqj [D] Jodhpur tks/kiqj

Q9. What is the new name of the food security scheme in Rajasthan, previously known as Indira Rasoi Yojana?
jktLFkku esa [kk| lqj{kk ;kstuk] ftls igys bafnjk jlksà ;kstuk ds uke ls tkuk tkrk Fkk] dk u;k uke D;k gS\
[A] Atal Bhojan Yojana vVy Hkkstu ;kstuk [B] Shree Annapurna Rasoi Yojana Jh vUuiw.kkZ jlksbZ ;kstuk
[C] Atal Rasoi vVy jlksbZ [D] Swami Vivekananda Aahar Yojana Lokeh foosdkuUn vkgkj ;kstuk

Q10.Recently, the Supreme Court has ordered the Rajasthan government to shutter 68 mines operating within a 1 km
periphery of the critical tiger habitat of which tiger reserve?
gky gh es]a lqçhe dksVZ us jktLFkku ljdkj dks fdl ck?k vHk;kj.; ds egRoiw.kZ ck?k fuokl LFkku ds 1 fdeh dh ifjfèk ds Hkhrj py jgh 68
[knkuksa dks can djus dk vkns'k fn;k gS\
A. SariskaTigerReserve lfjLdk Vkbxj fjtoZ

Head Office:- 68/27 Haldighati Marg Pratap Nagar Sanganer Call Us:- 8233013555
B. RanthamboreTigerReserve j.kFkaHkkSj Vkbxj fjtoZ
C. Dholpur&KarauliTigerReserve èkkSyiqj&djkSyh Vkbxj fjtoZ
D. Ramgarh Visdhari Tiger Reserve jkex<+ fo"kèkkjh Vkbxj fjtoZ

Q11. If Reena says, “Anjali's father Raman is the only son of my father-in-law Ramanand”, then how is Piyu, who is the
sister of Anjali, related to Ramanand ?
;fn jhuk dgrh gS] Þvatfy ds firk jeu esjs llqj jkekuan dk bdykSrk iq= gSÞ] rks fi;w] tks vatfy dh cgu gS] jkekuan ls dSls lacfa èkr gS\
A. Wife iRuh B. Sister cgu
C. Grand-daughter iksrh D. Daughter csVh

Q12. Assume that there are three statements followed by several conclusions. You have to take the given statements
to be true, even if they seem to be at variance from commonly-known facts and then decide which of the given
conclusion/s logically follows.
eku yhft, fd rhu dFku vkSj mlds ckn dà fu"d"kZ gSaA vkidks fn, x, dFkuksa dks lR; ekuuk gS] Hkys gh os lkekU;r% Kkr rF;ksa ls fHkUu çrhr
gksrs gksa vkSj fQj fu.kZ; ysa fd fn, x, fu"d"kks± esa ls dkSu lk fu"d"kZ rkÆdd :i ls vuqlj.k djrk gSA
Statements : I. All Pens are Tables lHkh isu Vscy gSa
II. Some tables are rulers. dqN Vscysa :yj gSA
III. Some rulers are chalk. dqN 'kkld pkd gSa
Conclusion : I. Some tables are chalk. dqN Vscy pkWd gSaA
II. Some pens are chalk. dqN isu pkWd gSa
III. Some rulers are pens. dqN :yj isu gSaA
IV. Some chalk are ruler dqN pkd :yj gS
A. Only IV follows B. Only II and I follows.
C. Only III follows. D. Only I, II and III followse

Q13. Arrange the given words in the sequence in which they occur in the dictionary and choose the correct sequence.
fn, x, 'kCnksa dks mlh Øe esa O;ofLFkr djsa ftlesa os 'kCndks"k esa vkrs gSa vkSj lgh Øe pquaAs
1. Economic vkfFkZd 2. Earlier igys 3. Each izR;sd
4. Edition laLdj.k 5. Eager mRlqd
A. 3, 4, 1, 5, 2 B. 2, 1, 3, 5, 4
C. 3, 2, 4, 1, 5 D. 3, 5, 2, 1, 4

Q14. If “GREEN” is given number code as 49, what is the difference between the number codes of “VIOLET” and
“PINK” ?
;fn ÞGREENÞ dks la[;k dksM 49 fn;k x;k gS] rks ÞVIOLETÞ vkSj ÞPINKÞ ds la[;k dksM ds chp D;k varj gS\
a. 55 b. 45 c. 33 d. 60

Q15. In given question, various terms of an alphabet series is given with one term missing as shown by (?). Choose the
missing term out of the given alternatives.
fn, x, ç'u es]a o.kZekyk J`a[kyk ds fofHkUu in fn, x, gSa] ftlesa ,d in yqIr gS tSlk fd ¼\½ }kjk n'kkZ;k x;k gSA fn, x, fodYiksa esa ls yqIr
in pqfu,A
D, G, J, M, ?, S, V
A. N B. P C. K D. O

Q16. 'A' is the sister of 'B'. 'C' is the husband of 'B'. 'C' is the brother of 'H'. What is the relation of 'H' and 'A' ?
'A' 'B' dh cgu gSA 'C' 'B' dk ifr gSA 'C', 'H' dk HkkbZ gSA 'H' vkSj 'A' dk lac/a k gS\
a. Son csVk b. No specific relation dksbZ fo’ks"k lac/a k ugha
c. Sister-in-law HkkHkh d. Brother-in-la Tkhtkth

Q17. In a span of 24 hours, how many times would the two hands of a clock point exactly in opposite directions ?
24 ?kaVs dh vofèk es]a ?kM+h dh nksuksa lwb;ka fdruh ckj fcYdqy foijhr fn'kkvksa esa bafxr djsaxh\
a. 10 b. 11 c. 23 d. 22
Head Office:- TRIVANI CHOURAHA, GOPALPURA BYPASS, JAIPUR Call Us:- 8233013555
Q18. ¾ part of tank is full of water. When 30 litres of water is taken out it becomes empty. The capacity of the tank is?
Vadh dk ¾ Hkkx ikuh ls Hkjk gSA 30 yhVj ikuh fudkyus ij ;g [kkyh gks tkrk gSA VSad dh {kerk gS\
a. 36 litres b. 42 litres c. 40 litres d. 38 litres

Q19. 280 oranges are divided among some boys and girls whose total number is 50 so that each boy gets 5 oranges
and each girl get 7 oranges. The number of girls is
280 larjs dqN yM+dksa vkSj yM+fd;ksa ds chp ckaVs x, ftudh dqy la[;k 50 gS rkfd çR;sd yM+ds dks 5 larjs vkSj çR;sd yM+dh dks 7 larjs feysAa
yM+fd;ksa dh la[;k gS
a. 30 b. 35 c. 15 d. 20

Q20. In a certain language, if SUNSHINE is coded as TVOTIJOF then how will MOON be coded:
,d fuf'pr Hkk"kk es]a ;fn SUNSHINE dks TVOTIJOF ds :i esa dksfMr fd;k tkrk gS rks MOON dks dSls dksfMr fd;k tk,xk%
a. NPPQ b. NPPO c. PPON d. NQQP

Q21. What is a Homogeneous DDB?


A. Database systems running on these platforms are running on the same operating system, using the same
application protocol, and using similar hardware.
B. Database systems on these platforms operate on different operating systems and use different application
protocols, as well as different hardware.
C. Database systems running on these platforms are running on the different operating system, using the same
application protocol, and using similar hardware.
D. Database systems on these platforms operate on same operating systems and use different application protocols, as
well as different hardware.

Q22. Which Schema is also known as Physical Schema?


A. Internal B. Conceptual C. External D. None

Q23. Conceptual level is also termed as __________ level.


A. Physical B. Logical C. Rational D. Transitional

Q24. Instance and Schemas are part of the –


A. Data Definition B. Data Manipulation
C. Data Models D. Data Redundancy

Q25. The ________ of a database describes its overall structure.


A. Schema B. Instance C. Design D. Structure

Q26. Which aspect of schema can be displayed in schema diagram?


A. Record Type B. Data Type C. Constraints D. All of the above

Q27. ____ are designed by database designers to facilitate communications between the database and the software.
A. Database Instances B. Database Schemas
C. Database Roles D. Database Structure

Q28. _____ diagrams can be used to represent database schemas.


A. Visual B. Logical C. Analytical D. Structural

Q29. Let R = ABCDE is a relational scheme with functional dependency set F = {A → B, B → C, AC → D}. The attribute
closures of A and E are
A. ABCD, φ B. ABCD, E C. Φ, φ D. ABC, E

Head Office:- TRIVANI CHOURAHA, GOPALPURA BYPASS, JAIPUR Call Us:- 8233013555
Q30. The Relation Vendor Order (V_no, V_ord_no, V_name, Qty_sup, unit_price) is in 2NF because:
A. Non_key attribute V_name is dependent on V_no which is part of composite key
B. Non_key attribute V_name is dependent on Qty_sup
C. Key attribute Qty_sup is dependent on primary_key unit price
D. Key attribute V_ord_no is dependent on primary_key unit price

Q31. Which of the following concurrency control protocols ensure both conflict serializability and freedom from
deadlock? I. 2-phase locking II. Time-stamp ordering
A. I only B. II only
C. Both I and II D. Neither I nor II

Q32. Consider the following transactions with data items P and Q initialized to zero:
T1: read (P) ;
read (Q) ;
if P = 0 then Q : = Q + 1 ;
write (Q) ;
T2: read (Q) ;
read (P) ;
if Q = 0 then P : = P + 1 ;
write (P) ;
Any non-serial interleaving of T1 and T2 for concurrent execution leads to
A. A serializable schedule B. A schedule that is not conflict serializable
C. A conflict serializable schedule D. A schedule for which a precedence graph cannot be drawn

Q33. Assume the following information: Original timestamp value = 46 Receive timestamp value = 59 Transmit
timestamp value = 60 Timestamp at arrival of packet = 69 Which of the following statements is correct?
A. Receive clock should go back by 3 milliseconds
B. Transmit and Receive clocks are synchronized
C. Transmit clock should go back by 3 milliseconds
D. Receive clock should go ahead by 1 milliseconds

Q34. Suppose a database system crashes again while recovering from a previous crash. Assume check pointing is not
done by the database either during the transactions or during recovery. Which of the following statements is/are
correct?
A. The same undo and redo list will be used while recovering again
B. The system cannot recover any further
C. All the transactions that are already undone and redone will not be recovered again
D. The database will become inconsistent

Q35. The physical locations of a record is determined by a mathematical formula that transforms file key into a record
location in a/an
A. B-tree file B. Indexed file C. Hashed file D. All these

Q36. Which of the following is/are NOT CORRECT statement?


A. The first record in each block of the data file is known as actor record.
B. Dense index has index entries for every search key value in the data file.
C. Searching is harder in the B+ tree B- tree as the all external nodes linked to each other.
D. In extendible hashing the size of directory is just an array of 2d-1, where d is global depth.
Choose the correct answer from the options given below:
A. (A), (B) and (C) Only B. (A), (C) and (D) Only
C. (A), (B) and (D) Only D. (A), (B), (C) and (D) Only
Head Office:- TRIVANI CHOURAHA, GOPALPURA BYPASS, JAIPUR Call Us:- 8233013555
Q37. In a B-Tree, each node represents a disk block. Suppose one block holds 8192 bytes. Each key uses 32 bytes. In a
B-tree of order M there are M-1 keys. Since each branch is on another disk block. We assume a branch is of 4 bytes.
The total memory requirement for a non-leaf node is
A. 32 M - 32 B. 36 M - 32
C. 36 M – 36 D. 32 M - 36

Q38. Consider a database implemented using B+ tree for file indexing and installed on a disk drive with block size of 4
KB. The size of search key is 12 bytes and the size of tree/disk pointer is 8 bytes. Assume that the database has one
million records. Also assume that no node of the B+ tree and no records are present initially in main memory. Consider
that each record fits into one disk block. The minimum number of disk accesses required to retrieve any record in the
database is _______
A. 4 B. 6
C. 7 D. 8

Q39. Assume transaction A holds a share lock R. If a transaction B also requests for a shared lock or R.
A. result in deadlock situation B. immediately be granted
C. immediately be rejected D. be granted as soon as it is released by A

Q40. In context of database, let T1 and T2 are two concurrent transactions. Consider the following sequence of
operations on data X :
T1 : READ(X) T2 : READ(X)
T1 : WRITE(X) T2 : WRITE(X)
This is a __________ problem.
A. Dirty Read B. Lost Update
C. Incorrect Summary D. Unrepeatable Read

Q41. Concurrency control in RDBMS is important for which of the following reasons?
A. To ensure data integrity when updates occur to the database in a single - user environment.
B. To ensure data integrity when reads occur to the database in a single-user environment.
C. To ensure data integrity when updates occur to the database in a multi-user environment.
D. To ensure data integrity when reads occur to the database in a multi-user environment.

Q42. Which of the following concurrency control protocols ensure both conflict serializability and freedom from
deadlock?
I. 2-phase locking
II. Time-stamp ordering
A. I only B. II only
C. Both I and II D. Neither I nor II

Q43. If transaction T1 reads a change made by transaction T2, then T1 commits only after T2 commits. This property of
a transaction schedule is known as:
A. Strict B. Serializable
C. Recoverable D. Cascadeless

Q44. Which of the following is correct according to the technology deployed by DBMS?
a) Pointers are used to maintain transactional integrity and consistency
b) Cursors are used to maintain transactional integrity and consistency
c) Locks are used to maintain transactional integrity and consistency
d) Triggers are used to maintain transactional integrity and consistency

Head Office:- TRIVANI CHOURAHA, GOPALPURA BYPASS, JAIPUR Call Us:- 8233013555
Q45. Two concurrent executing transactions T1 and T2 are allowed to update same stock item say ‘A’ in an
uncontrolled manner. In such a scenario, following problems may occur:
(a) Dirty read problem
(b) Lost update problem
(c) Transaction failure
(d) Inconsistent database state
Which of the following option is correct if database system has no concurrency module and allow concurrent
execution of above two transactions?
A. (a), (b) and (c) only B. (c) and (d) only
C. (a) and (b) only D. (a), (b) and (d) only

Q46. Which one of the following makes permanently recorded transaction in the database?
A. View B. Commit
C. Roll back D. Flash back

Q47. Consider the following schedules involving two transactions.


S1 : r1(X); r1(Y); r2(X); r2(Y); w2(Y); w1(X)
S2: r1(X); r2(X); r2(Y); w2(Y); r1(Y); w1(X)
Consider the following schedules involving two transactions. Which one of the following statements is TRUE?
A. Both S1 and S2 are conflict serializable.
B. S1 is conflict serializable and S2 is not conflict serializable.
C. S1 is not conflict serializable and S2 is conflict serializable.
D. Both S1 and S2 are not conflict serializable.

Q48. Consider a schema R(X, Y, Z W) and functional dependencies X → Y and W → Z. Then the decomposition of R into
T1(X, Y) and T2(Z, W) is
A. Dependency preserving and lossless join
B. Dependency preserving but not lossless join
C. Not dependency preserving but lossless join
D. Neither dependency preserving nor lossless join

Q49. Let the set of functional dependencies F = {QR → S, R → P, S → Q} hold on a relation schema X = (PQRS). X is not
in BCNF. Suppose X is decomposed into two schemas and Z where Y = (PR) and Z = (QRS). Consider the two statements
given below:
I. Both Y and Z are in BCNF
II. Decomposition of X into Y and Z is dependency preserving and a lossless.
Which of the above statements is/are correct?
A. I only B. Neither I nor II
C. Both I and II D. II only

Q50. Let r be a relation instance with schema R = (A, B, C, D). We define r1 = ΠA, B, C (r) and r2 = ΠA.D (r). Let s = r1 *
r2 where * denotes natural join. Given that the decomposition of r into r1 and r2 is lossy, which one of the following is
TRUE?
A. s ⊂ r B. r ∪ s C. r ⊂ s D. r * s = s

Q51. Consider a relation scheme R = (A, B, C, D, E, H) on which the following functional dependencies hold: {A–>B, BC–
>D, E–>C, D–>A}. What are the candidate keys of R?
A. AE, BE B. AE, BE, DE
C. AEH, BEH, BCH D. AEH, BEH, DEH

Head Office:- TRIVANI CHOURAHA, GOPALPURA BYPASS, JAIPUR Call Us:- 8233013555
Q52. The relation scheme Student Performance (name, courseNo, rollNo, grade) has the following functional
dependencies:
name, courseNo → grade
rollNo, courseNo → grade
name → rollNo
rollNo → name
The highest normal form of this relation scheme is
A. 2 NF B. 3 NF
C. BCNF D. 4NF

Q53. Consider the relation Student (name, sex, marks), where the primary key is shown underlined, pertaining to
students in a class that has at least one boy and one girl. What does the following relational algebra expression
produce? (Note: r is the rename operator).

The condition in join is "(sex = female ^ x = male ^ marks ≤ m)"


A. names of girl students with the highest marks
B. names of girl students with more marks than some boy student
C. names of girl students with marks not less than some boy students4)
D. names of girl students with more marks than all the boy students

Q54. Consider the following functional dependencies in a database:


Data_of_Birth → Age
Age → Eligibility
Name → Roll_number
Roll_number → Name
Course_number → Course_name
Course_number → Instructor
(Roll_number, Course_number) → Grade
The relation (Roll_number, Name, Date_of_birth, Age) is:
A. In second normal form but not in third normal form
B. In third normal form but not in BCNF
C. In BCNF
D. None of the above

Q55. Relation R with an associated set of functional dependencies, F is decomposed into BCNF. The redundancy
(arising out of functional dependencies) in the resulting set relations is.
A. Zero
B. More than zero but less than that of an equivalent 3NF decomposition
C. Proportional to the size of F+
D. Indeterminate

Q56. Which of the following is TRUE?


A. Every relation in 3NF is also in BCNF
B. A relation R is in 3NF if every non-prime attribute of R is fully functionally dependent on every key of R
C. Every relation in BCNF is also in 3NF
D. No relation can be in both BCNF and 3NF

Head Office:- TRIVANI CHOURAHA, GOPALPURA BYPASS, JAIPUR Call Us:- 8233013555
Q57. Consider the relation employee(name, sex, supervisorName) with name as the key. supervisorName gives the
name of the supervisor of the employee under consideration. What does the following Tuple Relational Calculus query
produce?

A. Names of employees with a male supervisor.


B. Names of employees with no immediate male subordinates.
C. Names of employees with no immediate female subordinates.
D. Names of employees with a female supervisor.

Q58. Consider a join (relation algebra) between relations r(R)and s(S) using the nested loop method. There are 3
buffers each of size equal to disk block size, out of which one buffer is reserved for intermediate results. Assuming
size(r(R)) < size(s(S)), the join will have fewer number of disk block accesses if
A. relation r(R) is in the outer loop.
B. relation s(S) is in the outer loop.
C. join selection factor between r(R) and s(S) is more than 0.5.
D. join selection factor between r(R) and s(S) is less than 0.5.

Q59. Which is the optimized version of the relational algebra expression: ПA1(ПA2(σF1(σF2(r))) where A1, A2are sets
of attributes in r with A1< A2and F1, F2 are Boolean expression based on attributes in r?
(a)ПA1(σF1⋂F2(r)) (b) ПA1(σ(F1⋃F2) (r))
(c) ПA2(σ(F1⋂F2)(r)) (d) ПA2(σ(F1⋃ F2) (r))

Q60. A database of research articles in a journal uses the following schema.


(VOLUME, NUMBER, STARTPGE, ENDPAGE, TITLE, YEAR, PRICE)
The primary key is (VOLUME, NUMBER, STARTPAGE, ENDPAGE) and the following functional dependencies exist in the
schema.
(VOLUME, NUMBER, STARTPAGE, ENDPAGE) - > TITLE
(VOLUME, NUMBER) -> YEAR
(VOLUME, NUMBER, STARTPAGE, ENDPAGE) -> PRICE
The database is redesigned to use the following schemas.
(VOLUME, NUMBER, STARTPAGE, ENDPAGE, TITLE, PRICE)
(VOLUME, NUMBER, YEAR)
Which is the weakest normal form that the new database satisfies, but the old one does not?
A. 1NF B. 2NF C. 3NF D. BCNF

Q61. Which of the following is not an application layer protocol?


A. RIP B. UDP C. BOOTP D. DHCP

Q62. A network security system that protects network resources by filtering message at the application layer is,
A. Packet Filter Firewall B. Proxy Firewall
C. Stateful inspection Firewall D. Next-Gen Firewall

Q63. Post office protocol (POP) is a message access protocol which is used to extract message for client. In this regard,
which of the following are true ?
(A) POP has two modes, Delete mode and keep
(B) In Delete mode, mail is deleted from mail box after each retrival
(C) In Delete mode, mail is deleted from mail box before each retrieval
(D) In keep mode, mail is deleted before retrival
Head Office:- TRIVANI CHOURAHA, GOPALPURA BYPASS, JAIPUR Call Us:- 8233013555
(E) In keep mode, mail remains in mail box after retrival
Choose the correct answer from the options given below:
A. (A) and (B) only B. (A), (D) and (E) only
C. (A), (B), (C) and (D) only D. (A), (B) and (E) only

Q64. Two or more devices share a single link in ______ connection.


A. Unipoint B. Primary
C. Multipoint D. Point to point

Q65. Which of the following is not a protocol for communication within network?
A. TCP/IP B. HTML
C. HTTP D. None of the above

Q66. In computing, ______ is a network security system that monitors and controls incoming and outgoing network
traffic based on predetermined security rules.
A. Spyware B. Cookie
C. Spam D. Firewall

Q67. Which among the following network topologies has the highest transmission speed?
A. LAN B. WAN
C. MAN D. Both LAN and WAN have equal transmission speeds.

Q68. IPv6 addresses have a size of:


A. 64 bits B. 128 bits
C. 256 bits D. 512 bits

Q69. Which among the following protocols is known as the terminal emulation protocol?
A. HTTP B. FTP
C. SMTP D. TELENET

Q70. A combination of hardware and software which links two parts of the same LAN or two compatible LANs by
directing message to the correct node is called
A. Embedded System B. Router
C. Hybrid Computer D. Microprocessor

Q71. Arrange the following different types of computer networks in an ascending order on the basic of geographical
area implied.
(A) MAN (B) WAN (C) LAN
Choose the correct answer from the options given below:
A. (C), (B), (A) B. (A), (C), (B)
C. (C), (A), (B) D. (B), (a), (C)

Q72. Which of the following statements is/are correct?


A. A Local Area Network (LAN) is usually located on one brand of computer
B. The acronym 'ISP' stands for internal Standard Provider
Choose the correct answer from the options given below:
A. A only B. B only
C. Both A and B D. Neither A nor B

Q73. What is the maximum number of links in a mesh network with N nodes?
A. N(N - 1) B. N2 C. N(N - 1) / 2 D. N
Head Office:- TRIVANI CHOURAHA, GOPALPURA BYPASS, JAIPUR Call Us:- 8233013555
Q74. Which of the following internet service is appropriate to access the computer of your office from home?
A. WWW B. IRC C. FTP D. Telnet

Q75. Which of the following device is used to connect similar LAN with same protocols?
A. Gateways B. Router C. Switches D. Bridges

Q76. Which of the following topologies provides a highly fault - tolerant architecture?
A. Star B. Bus C. Ring D. Mesh

Q77. A message consisting of 2400 bits is to be passed over the Internet. The message is passed to the transport layer
which appends a 150-bit header, followed by the network layer which uses a 120-bit header. Network layer packets
are transmitted via two networks, each of which uses a 26-bit header. The destination network only accepts up to 900
bits long. The number of bits, including headers delivered to the destination network, is
A. 2706 bits B. 2634 bits
C. 2554 bits D. 2476 bits

Q78. In circuit switching


A. Transmission path is set before data transfer B. Dedicated communication link is not required
C. Data is stored at intermediate nodes D. None of these

Q79. What is the name of the device that connects two computers by means of telephone line?
A. Cable B. Bus C. Modem D. Tape

Q80. A medium for transferring data between two locations is called


A. Network B. Communication Channel
C. Modem D. Bus

Q81. The period of a signal is 100ms. What is its frequency in kilohertz?


A. 10-1 kHz B. 10-2 kHz
C. 10-3 kHz D. 10-4 kHz

Q82. Period of a signal of 100 ms. Then the frequency The of this signal in kilohertz is ______.
A. 10 B. 10-1 C. 10-2 D. 10-3

Q83. Pick the incorrect statement in error retransmission used in continuous ARQ method
A. Go back N method requires more storage at the receiving side
B. Selected repeat involves complex logging than Go back N
C. Go back N has better line utilization
D. Selective repeat has better line utilization

Q84. Which of the following device is used to connect similar LAN with same protocols?
A. Gateways B. Router
C. Switches D. Bridges

Q85. The data-link layer is responsible for


A. Incoming bit stream and simply repeats to other devices connected
B. An error free communication across the physical link connecting primary and secondary stations within a network
C. An end-to-end integrity of data message propagated through the network between two devices
D. Logical connection at application layer

Head Office:- TRIVANI CHOURAHA, GOPALPURA BYPASS, JAIPUR Call Us:- 8233013555
Q86. The device bridge is used at _____ layer of OSI reference model.
A. Datalink B. Network
C. Transport D. Application

Q87. Which layer in the OSI model provides the data transfer in the form of frames across the transmission link?
A. Data link layer B. Physical layer
C. Network layer D. Session layer

Q88. Which of the following is not a valid multicast MAC address?


A. 01:00:5E:00:00:00 B. 01:00:5E:00:00:FF
C. 01:00:5E:00:FF:FF D. 01:00:5F:FF:FF:FF

Q89. ICMP (internet control message protocol) is


A. A protocol that handles error and control messages
B. A protocol used to monitor computers
C. Both (A) and (2)
D. None of these

Q90. Consider the following two statements:


S1: TCP handles both congestion and flow control.
S2: UDP handles congestion but not flow control.
Which of the following option is correct with respect to the above statements (S1) and (S2) ?
A. Both S1 and S2 are correct B. Neither S1 nor S2 is correct
C. S1 is not correct but S2 is correct D. S1 is correct but S2 is not correct

Q91. Consider the following statements regarding the slow start phase of the TCP congestion control algorithm. Note
that cwnd stands for the TCP congestion window and MSS denotes the Maximum Segment Size.
(i) The cwnd increase by 2 MSS on every successful acknowledgement.
(ii) The cwnd approximately doubles on every successful acknowledgement.
(iii) The cwnd increase by 1 MSS every round trip time.
(iv) The cwnd approximately doubles every round trip time.
Which one of the following is correct?
A. Only (ii) and (iii) are true B. Only (i) and (iii) are true
C. Only (iv) is true D. Only (i) and (iv) are true

Q92. Station A uses 32-byte packets to transmit message to Station B using a sliding window protocol. The round trip
time between A and B is 40 ms and the bottleneck bandwidth on the path A and B is 64 kbps. What is the optimal
window size that A should use?
A. 5 B. 10 C. 40 D. 80

Q93. With regard to Internet security, the full form of SSL is ____ and it provides security at the _____ layer.
A. Simple Socket Layer; Transport B. Secure Service Layer; Application
C. Secure Socket Layer; Transport D. Secure Socket Layer; Application

Q94. Which layer of OSI model provide the service of token management?
A. Session Layer B. Physical Layer
C. Transport Layer D. Data link layer

Head Office:- TRIVANI CHOURAHA, GOPALPURA BYPASS, JAIPUR Call Us:- 8233013555
Q95. Match the following:
I II
A. Physical Layer P. Packets
B. Network Layer Q. Error control
C. Transport Layer R. Dialogue control
D. Session Layer S. Bits
A. A - R, B - P, C - S, D - Q B. A - S, B - P, C - R, D - Q
C. A - S, B - P, C - Q, D - R D. A - R, B - P, C - Q, D - S

Q96. Which layer is associated with log in and log out form the network?
A. Data Link B. Presentation
C. Session D. Transport

Q97. Which of the following statement is incorrect about the ISO-OSI model?
A. when any two computers communicate, then all the layers communicate virtually with each other.
B. The communication between the corresponding layer is carried out by the protocol.
C. Representation of 1's and 2's complement operates at the presentation layer.
D. Interruption management, dialogue management are the functions of session management.

Q98. Match List I and List II


List I List II
a. Physical layer i. Provide token management service
b. Transport layer ii. Concerned with transmitting raw bits over a communication channel
c. Session layer iii. Concerned with the syntax and semantics of the information transmitted
d. Presentation layer iv. True end-to-end layer from source to destination
Choose the correct option form those given below:
A. a - ii. b - iv, c - iii, d – I B. a - iv. b - iii, c - ii, d - i
C. a - ii. b - iv, c - i, d – iii D. a - iv. b - ii, c - i, d - iii

Q99. In the TCP/IP model, encryption and decryption are functions of _____ layer
A. data link B. Network
C. Transport D. Application

Q100. The major functions of the presentation layer in OSI stack are:
A. Dialog presentation and control
B. Dealing with difference in data representation, encryption and compression
C. Presenting the full and half duplex services to the user
D. enabling end to end error control presentation

Head Office:- TRIVANI CHOURAHA, GOPALPURA BYPASS, JAIPUR Call Us:- 8233013555

You might also like