KVS 22-12-2018 Part-B

 Question 1
Which of the following algorithms use recursion for sorting an array of integers?
 A Bubble sort and Insertion sort B Bubble sort and Quicksort C Bubble sort and merge sort D Quicksort and merge sort
Question 1 Explanation:
Recursion is used in quicksort and merge sort.
The quick sort and merge sort algorithms are based on the divide and conquer algorithm which works in the quite similar way.
In the both algorithm, the larger problem is divided into smaller one until you find the solution later we will combine all smaller solutions into final solution.
 Question 2
______ operation preserves those tuples that would be lost in____
 A Natural join, outer join B Outer join, natural join C Left outer join, right outer join D Left outer join, natural join
Question 2 Explanation:
→ A NATURAL JOIN is a JOIN operation that creates an implicit join clause for you based on the common columns in the two tables being joined. Common columns are columns that have the same name in both tables.
→ A NATURAL JOIN can be an INNER join, a LEFT OUTER join, or a RIGHT OUTER join. The default is INNER join.
→ The SQL OUTER JOIN returns all rows from both the participating tables which satisfy the join condition along with rows which do not satisfy the join condition. The SQL OUTER JOIN operator (+) is used only on one side of the join condition only.
 Question 3
Social network analysts use ____ to access facebook data
 A Facebook system calls B Facebook APIs C Facebook Scripts D Facebook System Libraries
Question 3 Explanation:
→ The Facebook API is a platform for building applications that are available to the members of the social network of Facebook.
→ The API allows applications to use the social connections and profile information to make applications more involving, and to publish activities to the news feed and profile pages of Facebook, subject to individual users privacy settings.
 Question 4
In which of the topology, each device has a dedicated point-to-point link to a central controller?
 A Mesh B Bus C Ring D Star
Question 4 Explanation:
→ In a star topology, each device has a dedicated point-to-point link only to a central controller, usually called a hub.
→ The devices are not directly linked to one another.
 Question 5
While making bubbled lists, which of the following options are available?
 A Square,disc,tringle B Triangle,disc,circle C Triangle,square,circle D Disc,square,circle
Question 5 Explanation:
→ Disc: A filled circle
→ Circle : An unfilled circle
→ square : A filled square
 Question 6
Resolution of externally defined symbols is performed by____
 A Linker B Loader C Compiler D Editor
Question 6 Explanation:
→ A linker is a computer utility program that takes one or more object files generated by a compiler and combines them into a single executable file, library file, or another 'object' file.
→ A loader is a major component of an operating system that ensures all necessary programs and libraries are loaded, which is essential during the startup phase of running a program.
→ It places the libraries and programs into the main memory in order to prepare them for execution.
 Question 7
In which case it is mandatory to provide a destructor in a class?
 A Almost in every class B Class for which two or more than two objects will be created C Class for which copy constructor D Class whose objects will be created dynamically
Question 7 Explanation:
→ Destructors are used to de-allocate the memory that has been allocated for the object by the constructor.
→ Unlike constructor a destructor neither takes any arguments nor does it returns value. And destructor can’t be overloaded.
 Question 8
Action implementing instructor’s meaning are actually carried out by____
 A Instruction fetch B Instruction decode C Instruction execution D Instruction program
Question 8 Explanation:
→ The basic function performed by a computer is the execution of a program. The program which is to be executed is a set of instructions which are stored in memory.
→ The central processing unit (CPU) executes the instructions of the program to complete a task.
→ The major responsibility of the instruction execution is with the CPU. The instruction execution takes place in the CPU registers
 Question 9
Given a relation schema R(ABCDEFGH) in first normal form. For the set of dependencies F={ A→ B, A→ C, CG→ H, B→ H, G→ F}, which dependency is logically implied?
 A AC→ H B C→ H C G→ H D A→ H
Question 9 Explanation:
From the dependencies A→ B and B→ H, we can imply A→ H by using transitive dependency
 Question 10
To load a byte of data parallelly into a shift register with a synchronous load, there must be__
 A One clock pulse B One clock pulse for each 1 in the data C Eight clock pulses D One clock pulse for each 0 in the data
Question 10 Explanation:
The sequential device loads the data present on its inputs and then moves or “shifts” it to its output once every clock cycle, hence the name Shift Register.
 Question 11
Which of the following is the correct declaration of linked list?
 A Struct node* { Int data; node*link; } B Struct node { int data; Struct node*link; } C Struct node { int data; node link; } D Struct node* { int data; struct node*link; }
Question 11 Explanation:
Declaration syntax is
Struct tag_name
{
Datatype variable_name;
Struct tag_name *pointer_variable;
};
 Question 12
The operation executed on data stored in registers is called____
 A Macro operation B Micro operation C Bit operation D Byte operation
Question 12 Explanation:
Micro-operations perform basic operations on data stored in one or more registers, including transferring data between registers or between registers and external buses of the central processing unit (CPU), and performing arithmetic or logical operations on registers
 Question 13
Which of the following is true about time value assignment in VBscript?
 A The time value should be assigned without double quotes(“). B The time value should be enclosed within double quotes(“). C The time value should be enclosed within single quotes(‘); D The time value should be enclosed within hash symbols(#).
Question 13 Explanation:
→The numeric values should be declared without double quotes.
→The String values should be enclosed within double quotes(")
→Date and Time variables should be enclosed within hash symbol(#)
 Question 14
Shifting a register content to left by one bit is equivalent to____
 A Division by 2 B Addition by 2 C Multiplication by 2 D Subtraction by 2
Question 14 Explanation:
→ The left-shift operator (<<), which moves the bits of shift-expression to the left.
→ The bit positions that have been vacated by the shift operation are zero-filled.
→ For example a=5 and equivalent binary value is 101 and shifting one bit left side means the result binary value is 1010 whose decimal value is 10
 Question 15
Consider the relation Emp-Dept with SSn as key

Which of the following is (are) invalid operation(s)?
a) Inserting an employee without name and address
b) Inserting an employee with only SSn
c) Inserting a department with no employee
d) Inserting an employee without SSn
 A (a) B (d) C (c) and (d) D (b) and (c)
Question 15 Explanation:
Inserting an employee without SSn because SSn is key to the table.
 Question 16
What shall be the 2’s complement represented of -24 in a 16 bit computer?
 A 1111 1111 1110 1011 B 1111 1111 1110 1001 C 1111 1111 1110 0111 D 1111 1111 1110 1000
Question 16 Explanation:
Negative numbers are represented in 2’s complement form.
The binary equivalent of 24 is 0000 0000 0001 1000
One’s complement is 1111 1111 1110 0111 (Flipping the bits 1 by 0 and 0 by 1)
Two’s complement is 1111 1111 1110 1000 (adding 1 to the LSB bit)
 Question 17
Which of the following is/are wrong?
a) RAM and ROM are volatile memories
b) ROMs,PROMs and EPROMs are non volatile memories
c) RAM and Dynamic RAM are same
d) A random access memory(RAM) is a read write memory
 A (a) and (b) B (a) and (c) C (a) and (d) D (c) and (d)
Question 17 Explanation:
Statements b and d are correct.
Random Access Memory (RAM) –
→ It is also called as read write memory or the main memory or the primary → memory.
→ The programs and data that the CPU requires during execution of a program are stored in this memory.
→ It is a volatile memory as the data loses when the power is turned off.

ROM
→ Stores crucial information essential to operate the system, like the program essential to boot the computer.
→ It is non-volatile memory.
 Question 18
The process of removing deficiencies and loopholes in the data is called as____
 A Data aggregation B Extraction of data C Compression of data D Cleaning of data
Question 18 Explanation:
→ Data cleansing or data cleaning is the process of detecting and correcting (or removing) corrupt or inaccurate records from a record set, table, or database and refers to identifying incomplete, incorrect, inaccurate or irrelevant parts of the data and then replacing, modifying, or deleting the dirty or coarse data.
→ Data cleansing may be performed interactively with data wrangling tools, or as batch processing through scripting.
There are 18 questions to complete.

Register Now