Wednesday 26 September 2012

DECEMBER 2011 - PAPER II


22. Which command classes text file, which has been created using “SET ALTERNA TIVE” “Command” ?

(A) SET ALTERNATE OFF
(B) CLOSE DATABASE
(C) CLOSE ALTERNATE
(D) CLEAR ALL

Ans:-A

Explanation:-
Actually the question should be which command is used for closing the text file, which has been created using SET ALTERNATE TO . The answer is SET ALTERNATE OFF. SET ALTERNATE ON directs the output to text file. OFF disables the output to text file.


23. Data security threats include

(A) privacy invasion
(B) hardware failure
(C) fraudulent manipulation of data
(D) encryption and decryption

Ans:-C

Explanation:-
Option B and D are completely ruled out. Since the question talks about data security threat choosing option C is correct than option A.


24. Which of the following statements is true, when structure of database file with 20 records is modified ?

A) ? EOF ( ) Prints. T
(B) ?BOF()Prints F
(C) ?BOF()Prints T
(D) ?EOF()Prints F

Ans:-A


25. The SQL Expression Select distinct T. branch name from branch T, branch S where T. assets > S. assets and S. branch-city = DELHI, finds the name of

(A) all branches that have greater asset than any branch located in DELHI.
(B) all branches that have greater assets than allocated in DELHI.
(C) the branch that has the greatest asset in DELHI.
(D) any branch that has greater asset than any branch located in DELHI.

Ans:-A


26. Dijkestra banking algorithm in an operating system, solves the problem of

(A) deadlock avoidance
(B) deadlock recovery
(C) mutual exclusion
(D) context switching

Ans:-A


27. The multiuser operating system, 20 requests are made to use a particular resource per hour, on an average the probability that no request are made in 45 minutes is

(A) e-15
(B) e-5
(C) 1-e-5
(D) 1-e-10

Ans:-A


No comments:

Post a Comment