1) What is data? a) Raw facts and figures b) Processed information c) Summarized reports d) System logs 2) What is information? a) Raw facts collected from users b) Data stored in databases c) Processed and meaningful data d) A type of metadata 3) Metadata refers to: a) The actual data in database b) The data about data c) Data stored in tables d) Graphical representation of data 4) What is a Database? a) A graphical representation of entities b) A collection of unrelated files c) An organized collection of data d) A data processing software 5) Which of these is a function of DBMS? a) Email transmission b) Data modelling only c) Data storage, retrieval and update d) Compiling C programs 6) Traditional file processing systems suffer from: a) High security b) Easy access to data c) Data redundancy and inconsistency d) Low cost of of implementation 7) One of the key advantages of a DBMS: a) Manual data entry b) Data redundancy c) Controlled data access d) No recovery mechanism 8) Which of the following is not a component of the data base environment a) Users b) Hardware c) Operating system kernel d) DBMS 9) which type of database is used to store data in tabular form a) Hierarchical database b) Relational database c) Object oriented database d) No SQL database 10) What is the risk associated with database systems a) Easy scalability b) Data security breaches c) Increased redundancy d) High speed 11) In ER model an entity is a) A table b) A set of objects with same properties c) Always a person d) Only physical objects 12) A binary relationship in ER model connects a) One entity b) Two entities c) Three attributes d) Multiple relationships 13) Risk of DBMS a) Secure environment b) Data breaches c) No backup d) Poor integration 14) Which is not a DB model? a) Relational b) Hierarchical c) Network d) Spreadsheet 15) Which is a DBMS software? a) Oracle b) MS word c) Adobe reader d) Paint 16) "Manages physical data storage" a) Application layer b) Storage manager c) Metadata d) Cache 17) Data independence refers to: a) Data in XML b) Schema changes dont effect app c) Isolated queries d) Foriegn keys 18) Hierarchical model organizes data as: a) Graphs b) Trees c) Matrix d) Table 19) Relational databases uses a) Graphs b) Trees c) Tables d) Documents 20) DDL stands for a) Data driven language b) Database download link c) Data dump layer d) Data definition language 21) Derived attribute: a) Manually entered b) Computed from others c) Not stored d) B & C 22) Recursive relationships: a) Between two different entities b) An entity with itself c) Between 3 entities d) None 23) Cardinality defines a) Data type b) Entity count in relationships c) Attribute length d) Key field 24) Total participation in ER diagram a) Dashed line b) Arrow c) Oval d) Bold line 25) Simple attribute is a) Indivisible b) Repeating c) Derived d) Computed 26) In virtual memory systems, what is a page fault? a) CPU executes an invalid instruction b) Page is already in memory c) Requested page is not in memory d) Disk fails to respond 27) Which protocol allows autonomous systems to exchange routing information on the internet? a) OSPF b) EIGRP c) RIP d) BGP 28) What does CAP theorem state in distributed systems? a) CPU, algorithm, protocol b) Consistency, availability, partition tolerance c) Cache, access, performance d) Control, authentication, privacy 29) In database transactions, what does the 'isolation' property ensure? a) Changes made by a transaction are visible to others b) Database remains consistent after crash c) All queries return the same result d) Transactions run concurrently without interference 30) Which cache mapping technique uses both direct and associative mapping features a) Fully associative b) Direct mapped c) Set associative d) Multi level 31) What is the main difference between IPv4 and IPv6 in terms of addressing? a) IPv6 uses MAC addresses b) IPv6 uses 32 - bit addressing  c) IPv6 uses hexadecimal and 128 bits d) IPv6 is wireless only 32) Which algorithm is used for page replacement in virtual memory that gives the best performance but is impractical? a) Optimal b) FIFO c) LRU d) Second chance 33) What protocol uses a three way handshake to establish connections? a) UDP b) ICMP c) ARP d) TCP 34) In RAID, which level offers mirroring with fault tolerance but requires double the storage? a) RAID 0 b) RAID 1 c) RAID 5 d) RAID 10 35) What is the primary vulnerability exploited by a SQL injection attack? a) OS kernel b) Server cache c) User input not sanitized d) Broken disk encryption 36) What is the primary function of the TLB in a CPU? a) To store programs b) Cache recently used disk sectors c) Speed up virtual address translation d) Store BIOS configuration 37) In networking, what is the function of ICMP? a) Transfers emails b) Routes packets c) Provides error reporting and diagnostics d) Encrypts packets 38) Which type of memory retains data without power but is slower to write a) DRAM b) SRAM c) Flash d) Cache 39) In database indexing, what is the major trade-off using clustered indexes? a) Higher disk usage b) Slower insert operations  c) Inability to sort records d) Reduced query speed 40) The Bell-LaPadula model primarily focuses on: a) Network performance b) Data encryption c) File system optimization d) Confidentiality in access control 41) What happens in a distributed system during a Byzantine failure? a) Node behaves arbitrarily, possibly maliciously b) Node is completely offline c) Node causes a segmentation fault d) Node gives no response 42) Which of the following databases is designed for horizontal scaling and eventual consistency? a) PostgreSQL b) Oracle c) MongoDB d) MySQL 43) What is the primary benefit of using a tire data structure? a) High speed for arithmetic operations b) Efficient for searching prefixes c) Lower memory usage than arrays d) Self - balancing insertions 44) What is the function of a context switch in an OS? a) Switching users b) Switching power modes  c) Saving and restoring process states d) Redirecting I/O 45) In TCP congestion control, what is the purpose of slow start? a) Prevents early packet loss b) Prioritizes video traffic c) Allocates ports d) Speeds up handshaking 46) What is the primary limitation of a classical Von Neuman architecture? a) It uses analog memory b) No graphics support c) The Von Neumann bottleneck d) Cannot handle floating point 47) In cryptography, what is a nonce? a) A digital signature b) A key generator c) A type of cipher d) A number used once to prevent replay attacks 48) In unix like systems, which syscall is used to create a new process? a) exec() b) spawn() c) clone() d) fork() 49) What is the worst case time complexity of searching in a balanced binary search tree (AVL)? a) O(log n) b) O(n) c) O(1) d) O(n log n) 50) What is the main difference between hashing and encryption? a) Hashing is two way, encryption is one way b) Hashing stores passwords in plain texts c) Hashing is one way and irreversible d) Encryption is used in databases

Leaderboard

Visual style

Options

Switch template

Continue editing: ?