You are on page 1of 19

PAPER – V

2005
1. Fill in the blanks with appropriate word(s):
a) The next major step after feasibility study is system analysis.
b) At the end of feasibility study it is necessary to prepare a Feasibility Report.
c) Business transaction can be used in transaction processing.
d) System boundary separates the system from its environment
e) System quality required that SRS Document should be prepared and properly followed.
f) A Flow Chart is the primary tool used in structured system development to graphically depict system.
g) In a DFD external entity refers to source or destination of data.
h) Spiral Model is concerned with finding the best feasible solution.
i) CASE is understood as Computer Aided Software Engineering.
j) PERT is the abbreviation for program evaluation and review technique.
k) Synchronization transmission is almost 20% more efficient than asynchronous transmission.
l) The velocity of transmission of energy in free space is given by λf=c
m) STP and UTP can be used for both analog and digital data.
n) Broadband system use analog signaling and range of frequency.
o) TDM multiplexing technique is used to transmit digital signal.
p) The quantization process in a PCM Modulator introduces an error in the original signal and the final
demodulated signal.
q) The topology used in Ethernet is bus.
r) End to end connection is established by transport layer protocol of the TCP/IP suit.
s) The data link layer is responsible for sending media from the network layer to the physical layer.
t) Gateway are devices that can transmit data between two heterogeneous LANs

2006
1. Fill in the blanks with appropriate word(s):
a) Full form of SRS is System Requirement Specification.
b) In batch processing the data are gathered for a period and collected into group before they are entered into a
computer and processed.
c) Unit testing must precede system testing.
d) System security deals with protecting the various resources and information of a computer system against
destruction and unauthorized access.
e) System Development is the process of collecting, organizing storing and maintaining records of different
phase of SDLC.
f) ERP stands for Enterprise Resource Planning.
g) System Quality requires that test plan should be prepared and properly followed.
h) In a DFD external entity refers to source destination data.
i) parallel run a method of processing current data by both the old and new system.
j) CISC stands for Complex Instruction Set Computers.
k) CDMA stands for Code Division Multiple Access.
l) GSM stands for Global System for Mobile Communication.
m) Internet Layer is below the transport layer in the TCP/IP model.
n) Bits is the common unit of data transfer rate of modem.
o) A stream socket is designed to be used with a connection oriented protocol.
p) 1014-1015 Hz is the bandwidth range of optical fiber.
q) TRANSPONDER in satellite communication stands for Transmitter and Responder.
r) Failure of system in a Mesh topology is easy to detect and can be removed from the network.
s) Database query is good example of connectionless server.
t) Two types of files sequential and direct are maintained in index sequential file organization technique.
2007
1. Fill in the blanks with appropriate word(s):
a) Economic feasibility is often referred to as Cost-Benefit analysis.
b) Phase Evaluation is must at every phase of system development.
c) Implement aids in quality assurance.
d) System specifies a set of goals and objectives for the organization.
e) In a system, customer is an information system.
f) Unit testing must precede system testing.
g) ERP stands for Enterprise Resource Planning.
h) Circles represent process in data flow diagram.
i) RISC stands for Reduce Instruction Set Computer.
j) CDMA stands for Code Division Multiple Access.
k) TDMA stands for Time Division Multiple Access
l) CRC is used to check the accuracy digital transmission.
m) For optical fiber used in point-to-point transmission the repeater spacing is 30 km.
n) Bits from physical layer are converted in into frames by data link layer.
o) Virtual LAN is a networking technology that allow to be segmented logically.
p) The capacity of ISDN D-channel is 16/64 kbps.
q) Modem is a device that converts computer output into a form that can be transmitted over a telephone line.
r) Electronic waves ranging in frequency b/w 3 kHz to 1 GHz are normally called Radio waves.
s) PDU stands for Protocol Data Unit
t) ARPANET stands for Advanced Research Project Agency Network.

2008
1. Fill in the blanks with appropriate word(s):
a) The arrangement components that helps to achieve objectives is called system.
b) A formal information system is based on the organisation represented by the organisation chart.
c) During System testing the system is used experimentally to ensure that the software does not fall .
d) The purpose of the preliminary investigation is to evaluate Problem identification. .
e) The problem of throughput may be viewed as the reverse of Problem of capacity..
f) An _________ is a routine design to allow the analysts, user or auditor to verify a process or an area in the
new system.
g) Online processing are used for online data entry.
h) A major aspect of conversion the preparation of the Information. .
i) A cost-benefit Analysis is a procedure designed to keep track of accumulated saving and expenditure on a
regular basis.
j) PERT stands for Program Evaluation and Review Technique.
k) The data unit on physical layer is called Bits..
l) The SPMT is used for the transfer or mail message and attachment.
m) AM stands for Amplitude Modulation.
n) ITU stands for International Telecommunication union.
o) PCM is commonly used to transmit Digital signal. .
p) The capacity of switch determined by No. of ports.
q) Subnet and Router makes wide are a computer network possible.
r) Congestion in a network can be controlled by introducing congestion control algorithm..
s) Fiber optic transmission is more appropriate for high speed communication.
t) In FDM, consecutive channels are separated by Frequency.

2009
1. Fill in the blanks with appropriate word(s):
a) A file sometimes called a collection units.
b) The file structure that redefines its first record at the base of zero use the term sequential file.
c) Sequential file organization are supported by magnetic tape.
d) A word processor designed for programmers is called Editor.
e) The item of documentation added to the description of the system is documentation.
f) A person who writes program for running the hardware of a computer is called Programmer.
g) Boot strap or vector is called ______________
h) Lowest level of security system is _______________
i) If the number of condition in a decision table is n, then maximum number of rules (column) possible
is_______________
j) The extent to which the software can control to operate correctly despite the introduction of invalid input is
called as ______________
k) Preliminary investigation and system analysis is the first phase of software development
l) A module that is supplied along with the programming language translator to make the language easier
called ______________
m) The minimum number writes needed send data over a serial communication link layer is ________
n) A network that requires human intervention to rout signals is called a Routing.
o) A central computer surrounded by one or more satellite computer is called a________________
p) Data link layer of international standard organization, OSI model is responsible for creating and recognizing
frame boundaries.
q) _________________TCP/IP internet protocol a disk less machine its IP address from a server.
r) Network which is used for sharing data, software, hardware among several users owing micro computers is
called _______________
s) SMTP protocol is used for transferring electronic mail messages from one machine to another.
t) End-to-end connectivity is provided from host-to-host in_Host-to-Host network layer.

2010
1. Fill in the blanks with appropriate word(s):
a) Subsystem testing must precede system testing.
b) SDLC is understood as system development life cycle.
c) Documentation is the process of collecting, organizing, storing records of different phase of SDLC.
d) In a system, customer is an actor..
e) EDP stands for Electronic Data Processing.
f) RISC stands Reduced Instruction Set Computer.
g) The next major step after feasibility study is request approval.
h) System boundary separates the system from its Environment______________.
i) System in a DFD external entity refers to source/destination of data.
j) SRS stands for System Requirement Specification.
k) Cable N/W (TV) are the best example of MAN
l) A satellite link introduces larger WAN.
m) FDM multiplexing avoid wastage of time slot.
n) N/W enables the shaving of Drivers _____________ and even connection to the internet.
o) FDM stands for Frequency Division Multiplexing program.
p) The IP addresses are 32 bits in size.
q) Radio Waves are unguided transmission media.
r) Transmission of computerized data from one location to another is called Networking.
s) PSTN stands for Public Switched Network.
t) Electronic Waves ranging in frequency between 3 KHz to 1GHz are normally called Radio.

2011
1. Fill in the blanks with appropriate word(s):
a) In BUS topology, if a computer's network cable is broken, whole network goes down.
b) ISO stands for International Organization for Standardization.
c) ISDN is an example of _______________ network.
d) _1000 mbps_________ is max data capacity for optical fiber cable.
e) The first step in the system development life cycle (SDLC) is Preliminary Investigation.
f) In the analysis phase, the development of the Software occurs, which is a clear statement of the goals and
objectives of the project.
g) Actual programming of software code is done during the coding step in the SDLC.
h) Preliminary investigation spend most of their time in the beginning stages of the SDLC, talking with end
-users, gathering information, documenting systems and proposing solutions.
i) ____________ is the process of translating a task into a series of commands that a computer will use to
perform that task.
j) ERP is used for enterprise resource planning.
k) CASE is understood as Computer Aided Software Engineering.
l) DFD is used for Data Flow Diagram
m) Circle represents process in Data Flow Diagram.
n) TCP/IP has four layers.
o) IPv4 address is of length 32 Bits.
p) BDP stands for ________________.
q) Software engineering primarily aims on developing Program
r) Design phase includes Input, Output, File & Procedure design.
s) Validation checks _______________.
t) Feasibility study aims to ______________.
u) 2012
v) 1. Fill in the blanks with appropriate word(s):
w) a) the technique used to represent and store the record on a file is called …………………………………..
x) b) in ________________ processing, the data are gathered for a period and collected into a group before hey are
entered into a computer and processed.
y) c) a ______________ is a person with unique skills who plays a major role in business benefit from computer
technology.
z) d) ________________ refers to the set of activities that ensure the correctly implementation of a software for a
specific function.
aa) e) _____________________ will ensure accuracy of input to a computer.
bb) f) _____________________review aids in quality assurance.
cc) g) sdlc is understood as .system development life cycle.
dd) h) __dba _ specifies a set of goals and objectives for the organization.
ee) i) ______________________ is the processing of collecting, organizing, storing and maintaining records of
different phases of sdlc.
ff) j) _______________________ is layered technology which provides automated and semi-automated support for
building software.
gg) k) edp stands for electronic data processing.
hh) l) a _____________ is a primary tool used in structured system development to graphically depict system.
ii) m) in a dfd ____________________ refers to source or destination of data.
jj) n) case ______________is understand as
_____________________________________________________________________.
kk) o) srs stands for ________________________________________________________________.
ll) p) the parabolic dish antenna and the horn antenna are used for transmission of _____________________.
mm) q) fdm stands for frequency division multiplexing.
nn) r) the ip addresses are _32bits in size.
oo) s) transmission of computerized data from are location to another is called ______________________________.
pp) t) failure of a system in a _star_ topology is easy to detect and can be removed from the network.
qq)
rr) 2013
ss) 1. Fill in the blanks with appropriate word(s):
tt) (a)There are _____________ steps in the system Development life cycle(SDLC).
uu) (b) The first step in the system development life cycle (SDLC) is Preliminary Investigation.
vv) (c)_______ determines whether the project should go forward.
ww) (d)________ is provided by Technical writers for the new system.
xx) (e) _______ responsible for design and implementation of database structure.
yy) (f)Debugging is _______________.
zz) (g)The largest percentage of total life cycle cost of software is ____________.
aaa) (h)Traditionally the only phase of software development where a formal approach is used as _____.
bbb) (i)______ may not be required by a System Analyst.
ccc) (j)Data store is represented in a Data Flow Diagram by ______
ddd) (k)STP and ___ __ _ _ can be used for analogue and digital data.
eee) (l)Cable network is the best example of _ _ _ _ _ .
fff) (m)The IP addresses are _ _ _ _ bits in size.
ggg) (n) TCP /IP has ____ _ _ layers.
hhh) (o) CDMA stands for _ _ _ _ .
iii) (p)_ _ _ _ _ _ _ _ _ is the example of unguided transmission medium.
jjj) (q)__ _ _ _ _ technique is used to transmit digital data.
kkk) (r)Database query is good example of _ _ _ _ _ _ .
lll) (s)_ _ _ _ is used for transferring electronic mail message toother.
mmm) (t)___ _ _ _ is the command of data transfer rate of MODEM.
nnn) 2014
ooo) 1. Fill in the blanks with appropriate word(s):
ppp) (a)PERT stands for _ _ _ _ _ _ _ _ .
qqq) (b)The _ _ _ _ is used for the transfer or mail message and attachment.
rrr) (c)PCM is commonly used to transmit _____ _ _ _ _.
sss)(d)_ _ _ _ _ _ _ makes wide are a computer network possible.
ttt) (e)In FDM, consecutive channels are separated by magnetic tape.
uuu) (f)The item of documentation added to the description of the system is _ _ _ _ _ _.
vvv) (g)_ _ _ _ _ _ _ is the first phase of software development.
www) (h)_ _ _ _ _ _ layer of international standard organization , OSI model is responsible for creating and
recognizing frame boundaries.
xxx) (i)_ _ _ _ _ _ testing must precede system testing.
yyy) (j) _ _ _ _ _ _ the process of collecting , organizing , storing records of different phase of SDLC.
zzz) (k)EDP stands for _ _ _ _ _ _ _ .
aaaa) (l)RISC stands for _ _ _ _ __ _ _ _ .
bbbb) (m)System boundary separates the system from its _ _ __ _ _ _ .
cccc) (n)System in a DFD _ _ _ _ _ _refers to source /destination of data.
dddd) (o) _ _ _ _ _ _ _ multiplexing avoids wastage of time slot.
eeee) (p)In the analysis phase , the development of the _ _ _ _ _ _ _occurs, which is a clear statement of the
goals and objectives of the project.
ffff) (q)CASE is understood as _ _ _ _ _ _ _ .
gggg) (s)Ipv4 address is of length _ _ _ _ _ Bits.
hhhh) (t)software engineering primarily aims on developing _ _ _ _ _ _ .

Paper-VI
2005
1. Fill in the blanks with appropriate word(s):
a) Java does not support multiple inheritances.
b) Character literals are stored as unicode character.
c) Member methods are function defined inside classes that operate an instance of those classes.
d) The memory available for object is called a heap.
e) The java class hierarchy begins with the class import class as its upper class.
f) The attributes and method declared as public in the base class can be accessed within the classes any of its
derived class.
g) By default, all programs import the java.lang package.
h) In a HTML document, the source of the image is specified using the src element
i) The applet class provides a helper function getcode which return the path (URL) of class file.
j) getName method is used to obtain thread’s name.
k) To inherit a class, we simply incorporate the definition of are class into another by using the extends
keyword.
l) The items in a list box can be added at code and run time.
m) Grouping of various Active X control can be done by activeX DLL.
n) The option statement makes declaration of a variable necessary.
o) To accept a value from the keyboard the explicit function is used.
p) Using the MDI forms input box property which returns the child from the has the focus or that was most
recently active.
q) In visual basic, a variables name must not exceed 40-225 characters.
r) If the stretch property is true, the image is resized to fill the area of the image box control exit for.
s) Exit for statement is used to forcibly terminate from a for Loop.
t) Clear method is used to remove all items from a list box.

2006
1. Fill in the blanks with appropriate word(s):
a) RMI stands for Remote Method Invocation.
b) All applets are sub class of _java.Applet.
c) final variable can’t be declared as static.
d) Java doesn’t support Multiple inheritance.
e) The paint () method is called after init().
f) getPriority () method is used to obtain the threads priority.
g) HTML stands for Hypertext Markup Language.
h) The <PARAM> tag contains the attribute Name and Value.
i) The default value for character type variable is Null.
j) Java applets are executed by applet viewer.
k) The unload command is used to remove the form from memory.
l) set focus() method of text box placed the cursor in a specified text box .
m) Properties window has two tabs Alphabetic and Categories.
n) The fill color property of the picture box determines the color of the shape you draw.
o) A V.B. application runs in three modes Design, Run and Break.
p) A shortcut key to switch over from the run mode to break mode is shift+F7
q) A frame control of toolbar acts as a container for other control.
r) The count property returns the no. of items in collection.
s) Event procedure can be only made in Form module.
t) Sub procedure is divided into general and event.

2007
1. Fill in the blanks with appropriate word(s):
a) All applets are sub class of Java.applet.
b) The menu bar has drop down from which you control the operation of V.B. environment.
c) To explicitly type a variable, you must first determine its datatype scope.
d) scroll bar provides an intuitive way to move through a list of information and make great input device .
e) The sub option of line method defines the second end _ points of the line relative to the end _point, in
terms of distance from first end point .
f) When an MDI form is unloaded, the query unload events are invoked first for the MDI form.
g) A/an class file is a binary file that contains instruction only the machine can understand and execute.
h) clear method removes all the items from the collection .
i) String buffer represents flexible length character string.
j) The java class hierarchy begins with the class imported as its super class.
k) JVM is an interpreter for byte code.
l) The get Name() method is used to obtain a thread’s name.
m) Virtual machine code is also referred as byte code.
n) Java provides a character data type called char.
o) Resume () method is used to revive from suspend method
p) During run time new() allocates memory for an objects.
q) VB’s case structure is equivalent of C++’s switch function.
r) The unload command is used to remove the form from memory.
s) The windows that are displayed when you start VB are collectively known as IDE.
t) Text boxes, labels, scroll bars, command buttons are known as controls.

2008
1. Fill in the blanks with appropriate word(s):
a) Choose activate .exe icon an the new tab page to create an executable component.
b) The Img naming convention represents the Image control.
c) Common dialog control uses dialog open() methods to display open dialog box .
d) Syntax errors are caused by typographical error.
e) A class module can certain procedure and declaration.
f) If the stretch property is true, the image is resized to fill the over of the image box control.
g) If you omit static, the variable is set dim.
h) Scrollbar provides an intuitive way to move through a list of information and make great input devices
i) To inside a storing in the text box, we use the Text property.
j) The LoadPicture function is used to blitz or copy an image from source to a destination object.
k) A Exit is needed to terminate recursion.
l) A Package import all static member of a class.
m) The compiler uses a System Variable to locale the classes, it in the class path.
n) A thread enters the terminated state Stop.
o) Methods that perform common tasks and don't require object are called Static methods.
p) The Package states that code should be grant only the amount of privilege and access that the code needs to
accomplish its designated task.
q) Overloading constructers enables objects of a class to be initialized in different ways.
r) Every applet should extend class Applet.
s) Software reuse reduces Access Time.
t) A program creates an array and initializes its element with Set of Value.

2009
1. Fill in the blanks with appropriate word(s):
a) A Event causes an object to do something.
b) Method are the activities that happen when an object does something.
c) The user modifies text in a combo box or text box by the use of event Change.
d) An object looses focus by event LostFocus.
e) Byte is a data type allows positive integer in range to 225.
f) A Constant is a value that doesn’t change.
g) A named storage location whose value can be manipulated is known as Variable.
h) MDI stands for Multiple Document Interface.
i) Visual is a method to create GUI application, which stands for Graphical User Interface.
j) A PopUp menu is a floating menu that is displayed over a form, independent of the menu bar.
k) In java all variables of type Primitive contain signed values.
l) A Static is a member of a class variable.
m) S/w reuse reduces Access time.
n) Wrapper Class are commonly used to convert variables of primitive type to true object.
o) Java supports both primitive types and reference (or object) types.
p) JVM stands for Java Virtual Machine.
q) Java allows user-defined variable types called Non-Primitive type.
r) Method prototype consists of Parameter & Return type.
s) sizeOf operator is used to return the size in bytes of that type or object .
t) A thread enters the terminated state when Stop.

2010
1. Fill in the blanks with appropriate word(s):
a) The extension of visual basic project is [.vbp].
b) When the project is run, the Load event occurs first. [Load/unload/click].
c) Which one of the followings is the keyword? (a)area (b)integer (c)float (d)all of them.
d) .ocx is the extension of ActiveX control.[Form/textbox/activeX].
e) The only event associated with menu is Click.[doubleclick/click/mouse move].
f) Which method is used to place currsor in a specified textbox? i) lostfocus ii)click iii)gotfocus iv)none
g) To show system date and time, we use now (i)date(ii)time(iii)now(iv)all of them.
h) The default property of picture box is (i)caption(ii)picture(iii)text(iv)align.
i) Timer_control is not visible at run time . [textbox/timer/comand button].
j) The multiline property of textbox is by default true (i)true(ii)false(iii)both(iv)none
k) char data type takes 1byte bytes of memory .[1byte/2bytes/4bytes].
l) Java is a platform independent language .[platform/hardware/software].
m) What will the result of the expression 13&25?:9 (i)38(ii)25(iii)9(iv)12.
n) new is the keyword used to allocate memory to an array.[new/delet/insert].
o) Java does note support Multiple .inheritance.[single/multiple/multilevel].
p) trim method is used to remove blank space from either side .[length/trim/vtrim].
q) Java applets are executed by applet viewer.[applet viewer/text editor/notepad].
r) Which one of the followings is the wrapper class? Byte [i) byte ii) Byte iii) float iv)char.]
s) throw keyword is used to catch an exception. [throw/catch/final].
t) Which one of the followings is the keyword? all of them i)private ii)public iii)protected iv)all of them.

2011
1. Fill in the blanks with appropriate word(s):
a) Which control is not visible at run time? i) label ii) command button iii) picture box iv) Timer
b) Which of the following is the keyword? i) Float ii) Long iii) Boolean iv) None of these
c) The only event will associated with timer is --tick (tick/timer).
d) The default multiline property of textbox is true (true/false).
e) Which event will occur when cursor leaves the textbox? i) Got focus ii) Lost focus iii) click iv) All of
these
f) To show system date Date is used. i) Date ii) Time iii) Now iv) All of these
g) The default event of form is Click. (load/click)
h) Which of the following is a keyword? i) if ii) then iii) next iv) none of these
i) SDI stands for Single document interface (Short Document Interface/Single document interface)
j) Exit sub is used to forcibly exit from _sub.(do loop /sub).
k) Java follows UNI code. (ASCII/UNI).
l) mid function is used to obtain both from single . (single character/ substring/both)
m) Integer data type takes-four bytes of memory. (one/two/four)
n) Which of the following is the keyword? i) float ii)date iii)string iv)All of these
o) multiple inheritance is not supported by Java. (single/multiple/multilevel)
p) Applet viewer is used to run Applet program. (Application/Applet)
q) 'new' keyword is used to allocate memory to i) Object ii) Array iii) i)and ii) iv) None of these
r) Package is the container of Class. i) Array ii) String iii) Class iv) None of these
s) throw keyword is used to catch an exception. (throw/catch/final)
t) 2012
u) 1. Fill in the blanks with appropriate word(s):
v) 1. a control can be named by setting its ____________________________________.
w)
x) [(i) name property (ii) caption property (ii) front property (iv) visible property]
y) 2. in an if statement, when the condition is true?
z) 3. str() function converts:
aa)
bb) [(i) number into string (ii) string into number (iii)string into binary (iv) number into binary ]
cc) 4. the passwordchar property of textbox can be used to
dd)
ee) [show password character enter/hide the text entered/display encoded character/all the choices.]
ff) 5. a textbox is an example of which of the following?
gg)
hh) [(i)property (ii)method (ii)event (iv) control
ii) 6. how many bytes of memory will the number 50000 consume if it is declared as a variant?
jj)
kk) [(i) 13 (ii) 14 (iii)15 (iv) 16]
ll) 7. the code that is used in a sub procedure to stop execution of a program is________
mm)
nn) [(i) exit (ii) end with (iii) end (iv) end sub
oo) 8. for which of the following is default set to true in a menu editor:
pp)
qq) [(i) checked (ii) enabled (iii) visible (iv) window list]
rr) 9. which of the following statements are used to resize a dynamic array?
ss)
tt) [(i) dim (ii) redim (iii) declare (iv) array
uu) 10. what was the name of the first version of java?
vv)
ww) [(i) mustang (ii) playground (iii) tiger (iv) oak]
xx) 11. a tool that is used for running applet is :
yy)
zz) [(i) javap (ii) javac (iii) appletviewer (iv) appletrun
aaa) 12. which is the keyword used for deriving classes in java?
bbb)
ccc) [(i) implements (ii) extends (iii) throws (iv) inherits
ddd) 13. what are the two types of exceptions available in java?
eee)
fff) [ checked and compile/unchecked and compile/checked and unchecked/compiled and non-checked
ggg) 14. which one of the following statements is false?
hhh) 15. a subclass can use the ____________keyword in its constructor in order to invoke the constructor of
its immediate super class.
iii)
jjj) [(i) final (ii) super (iii)extends (iv) none of these ]
kkk) 16. an automatic technique of freeing unused memory is called_______________________.
lll)
mmm) [(i)new (ii) throw (iii) garbage collection (iv)none of these]
nnn) 17. the __________________ examines bytecodes to ensure that they are valid.
ooo) 18. [class loader/virtual machine/bytecode verifier ]
ppp) 19. an interface that extends the data input interface and provides for reading of objects is
called____________.
qqq)
rrr) [(i) objectinput (ii) objectinputstream (iii)objectoutput
sss)20. ____________________class is used to encapsulate or wrap a primitive data type.
ttt)
uuu) [(i) writer (ii) wrapper (iii) package]
vvv) 2013
www) 1. Fill in the blanks with appropriate word(s):
xxx) (1)Visual basic is a tool that allows to develop windows GUI(Graphical user interface) application
yyy) (2)visual basic programs built around_ _ _ _ _ _ _
zzz) (3)All the controls in toolbox expect_ _ _ _ _ _ .
aaaa) (4)The _ _ _ _ _ _consists of the title bar, menu bar, and bar.
bbbb) (5)_ _ _ _ _ variables declared in this manner do not retain their value once a procedure terminates.
cccc) (6)To make the procedure level variable retain its value open existing the procedure, replace Dim
keyword with__ _ _ _ _ _ _ .
dddd) (7)Which one of the following is NOT one of the three main types of errors ?
eeee) [1]Dynamic [2]Static [3]Local [4]Global
ffff) (8)what type of numeric variable type holds the most data ?
gggg) [1]short [2]Long [3] Integer [4]Double
hhhh) (9)Checked mark can be placed on a menu item using _ _ _ _ property.
iiii) (10)_ _ _ _ arguments is an integer called button.
jjjj) (11)Input ()and Msgbox() function are used to add _ _ _ _ _dialog boxes.
kkkk) (12)_ _ _ _ _ function specifies the file name and assigns the picture to the picture property.
llll) (13)Which of the following statement are true?
mmmm) [1] java support multiple inheritance [2] java support interfaces
nnnn) [3] Java support polymorphism [4] (2)and (3)
oooo) (14)which of the following is TRUE?
pppp) [a] in java, an instance field declared public generates a compilation error.
qqqq) [b] int is the name of the class available in the package java.lang
rrrr) [c]Instance variable names may only contain letters and digits
ssss) [d]A class has always a constructor (possibly automatically supplied by the java compiler)
tttt) (15)which of the following may be part of a class definition?
uuuu) [a]Instance variable [b]Instance methods [c]Constructor [d]all the above
vvvv) (16)A constructor :
wwww) [a]Must have the same name as the class it is declared within
xxxx) [b]Is used to create objects
yyyy) [c]May be declared private
zzzz) [d]All the above
aaaaa) (17)What is the difference between a java applet and a java application?
bbbbb) [a]A application can in general be trusted where as an applet can‟t
ccccc) [b]An applet must be executed in a browser environment
ddddd) [c]an applet is not able to access the filesa of the computer it runs on
eeeee) [d]all the above
fffff) (18)consider the following code snippet:
ggggg) String river=newString(“Columbia”);
hhhhh) System.out.println(river.length());
iiiii) What is printed
jjjjj) [a]6 [b]6 [c]8 [d]Columbia
kkkkk) (19)what is byte code in the context ofjava?
lllll) [a]The type of code generated by a java compiler
mmmmm) [b] The type of code generated by a java virtual Machine
nnnnn) [c]it is the another name for a java source file
ooooo) [d]it is the code written within the instance methods of a class
ppppp) (20)what is garbage collection in the context of java?
qqqqq) [a]the o/s periodically deletes all the java files available on the system
rrrrr) [b]Any package imported in a program and not used in automatically deleted
sssss) [c]When all references to an object are gone, the memory used by the object is automatically reclaimed
ttttt) [d]The JVM checks the output of any java program and anything that doesn‟t make sense
uuuuu) 2014
vvvvv) 1. Fill in the blanks with appropriate word(s):
wwwww) (1)In event-driven programing an event is generated by _____ _ _ _ _ _ _ _
xxxxx) (2)Which statements are optional in an if _ _ _ _ _ then statement?
yyyyy) (3)The endif statement is required :
zzzzz) [a]in all if….. then statement
aaaaaa) [b]in all multi-line statements with else
bbbbbb) [c]in single line statement [d]both a and b [e]all
cccccc) (4)which is not a common control event?
dddddd) [a]click [b]single click [c]Double click [d]mouse click[e]mouse down
eeeeee) (5) the Boolean data types is /has :
ffffff) [a]Unsigned [b]Two states [c]Displayed by the program as yes or no
gggggg) [d]both a and b[e]all these
hhhhhh) (6)which is a valid statement for declaring a variable
iiiiii) [a]Const From As integer [b]const my from as integer
jjjjjj) [c]Dim from as integer [d]Dim myfromas integer[e] all Of these
kkkkkk) (7)An exception is another name for:
llllll) [a]compile error[b]logical error[c] runtime error[d]superficial error [e]syntax error
mmmmmm) (8)which action will raise an exception?
nnnnnn) [a]dividing by zero [b]accessing an empty cd drive [c] accessing the string “hi” to an integer variable
[d]both a and b [e]all
oooooo) (9) A check box can also appear as:
pppppp) [a]button [b]radio button [c]scroll bar [d] both a and b[e]all
qqqqqq) (10)which of the following statement are usd to resize a dynamic array?
rrrrrr) [a]Dim [b] ReDim[c]Declare [d]Array
ssssss) (11)which statement is true?
tttttt) [a]Exe can run independently [b]all can independently [c] exe and dll both can run independently [d]non
of these
uuuuuu) (12)A tool that is used for running applet is
vvvvvv) (a)javap [b]javac [c]applet viewer [d]Appletrun
wwwwww)(13)which is the keyword used for deriving classes in java?
xxxxxx) [a]Implements [b]extends[c] throws [d]Inherits
yyyyyy) (15) Which one of the following statement is FALSE?
zzzzzz) [a]java support multi-threaded programing
aaaaaaa) [b]Threads in a single program can have different priorities.
bbbbbbb) [c]Multiple threads can manipulate files and get user input at the same time.
ccccccc) [d]Two threads can never act on the same object at the same time
ddddddd) (16)A subclass can use the _ _ _ _ _keyword in its constructor in order to invoke the constructor of its
immediate super class.
eeeeeee) [a]final [b]super [c]extends [d]none of these.
fffffff) (17)An automatic technique of freeing unused memory is called _ _ _ _ _
ggggggg) [a]new [b]Throw [c] Garbage collection [d]none of these
hhhhhhh) (18)The _ _ _ _examines bytecodes to ensure that they are valid.
iiiiiii) [a]class order [b]virtual machine (VM) [c]Bytecode verifier
jjjjjjj) (19)An interface that extends the data input interface and provide for reading of object is called……..
[a]Object Input [b]Object Input Stream [c]Object Output
kkkkkkk) (20)_ __ _ _ _class is used to encapsulate or wrap a primitive data type.
lllllll) [a] Writer [b] Wrapper [c]Package

Paper-VII: UNIX, ORACLE, O.S., E-Commerce.


2005
1. Fill in the blanks with appropriate word(s):
a) The statement C=expr 5/2 evaluates to 2.
b) UNIX is written in C language.
c) A shell variable can not start with Special character.
d) The kernel always maintains a copy of the Super block in memory.
e) PCB stands for Process control block.
f) The best way to save and quit the editor into use the command wq in the command node.
g) In the Round-Robin _scheduling algorithm, CUP time is divided in the slices.
h) To fined the number of files are in current directory command would be Count .
i) The command grep searches files for a pattern.
j) While loop works then condition is True.
k) The protocol use to setup communication b/w aclient and server on the Internet is TCP/IP.
l) Height and width attributes are used to cotrol the size of the image on the webpage.
m) HTML accepts JPEG and BMP picture format.
n) The src attribute of <FRAME> tag contains the URL of the document to be loaded into the frame.
o) SLIP stands for Serial Line Internet Protocol.
p) The not null constraints can only be applied at Column label.
q) A unique key can't be Long or date data type.
r) Function that acts on onlly are value at n time is called Scalar function.
s) The concept of joining multiple table is called Join.
t) Procedure and Function are stored in the Oracle engine.

2006
1. Fill in the blanks with appropriate words.
a) The command pwd tells in which directory you are.
b) -----cp-------- command is used to create the exact image of an ordinary file on disk with different name.
c) Binary executables required for system administration are usually placed in bin directory.
d) For displaying message and to issue prompts for taking user input echo printf command is used.
e) To change the prompt ps2 variable is used.
f) Variables name in Unix operating system should be of …..length.
g) The echo command is substituted by printf.
h) Function are blocks of java script code that perform a specific task and return a value
i) URL stands for uniform restore locator
j) Java script as a scripting language created by Netscape.
k) E-commerce applies marketing through internet.
l) Browser is a s/w program that acts as an interface between the user and the www.
m) The default html page that is delivered to a client to a web server is index.html
n) Desc command is use to display the structure of a table
o) Column level constraints are defined along with column definition.
p) An owner of an object permission to other user through grant statement.
q) The data is store in the cursor is called active data set.
r) An device in UNIX are implemented as Files.
.
2007
1. Fill in the blanks with appropriate words.
s) The technique which converts the dedicated device to device is called Spooling.
t) A Scheduler is an o/s program that selects the next job to be admitted for execution.
u) Moving Bootstrap is a small initialization program to startup the computer.
v) UNIX o/s was first developed by Dennis Ritchie at AT&T Bell Laboratory.
w) An device in UNIX are implemented as Files.
x) There are Three modes of Vi editor.
y) Path is System variable.
z) The option -x returns true if file exit and have executable permission.
aa) Two files can be merges together using the cat command at the command line.
bb)PID stands for Process Identification
cc) The natural language of DBA is ANSI SQL.
dd)The view on which data manipulation can be done are Updatable views.
ee) Oracle loads the compiled procedures in the memory are called Oracle engine.
ff) A fen can be deleted from the database by using drop command.
gg) A master detail relationship is set by using Relation Object command.
hh)Primary key can combine up to 16 column in a composite primary key.
ii) A Row lebel trigger is fired each time a row in the table is affected by the triggering statement.
jj) Union, Intersect and Minus are set operator.
kk)Subquery are nested select command.
ll) Join is query in which data is retrieve from more than one table.

2008
1. Fill in the blanks with appropriate word(s):
a) OS gets loaded in the computer memory by the process of booting.
b) The R-R scheduling algorithm is based on the concept of time sharing.
c) Long term scheduler also called job scheduler.
d) The wc-c command will tell you the no. of characters in afile.
e) Program interact with the kernal using system calls and library routines
f) device driver control the interaction between the hardware devices and kernel
g) A running state of program is called a process.
h) The long data type hold locaters that specify the locatin of large objects.
i) A stored procedure is created with create procedure statement.
j) The procedure specification begins with create procedure and ends with procedure name or parameter list.
k) The attribute for explicit cursors are referred to as cursor attribute.
l) To insert data from other tables, sub-query can be used inside insert command.
m) ------variables are used at SQL prompt.
n) Customize refers to the personalization of communicatin b/w uses and a website.
o) Consumers can ban together to presents themselves as a buyer group in a customer business relationship.
p) The proto used to setup communication b/w q) URL stands for Uniform Resource Locater.
q) a client & server or the internet is ISP/IP.
r) Business activity refers to the full spectrum of e-commerce that can occur b/w two argananisation.
s) The default HTML page that is delivered to a client connected to a web server is ____________.
t) global variable are used to store values that can be used in other parts of a program.

2009
1. Fill in the blanks with appropriate words.
a) An Operating system is system software.
b) SPOOLING is an acronym for printer buffer.
c) shell provide the interface between a process and operating system.
d) The time taken by the CPU to stop one process and start another is known as interrupt time
e) SJF and priority scheduling are non pre-emptive.
f) A process is said to be in dead state if it is waiting for an event that will never occur.
g) floor Function finds the largest integer less than or equal to the value passed.
h) The constraints are specified with _________________ command.
i) Only materialized views can be modified.
j) br tag is used for line breaks.
k) Face is an attribute of <font>tag.
l) Font color can be specified either by using color name of color or its numeric code value.
m) The SRC attribute is used to <IMG > and <frame>.
n) An image map is used to graphic link.
o) Links to sections of the current documents can be provided by anchor.
p) The difference between relative and absolute links is period.
q) The two main sections of an HTML document are head and body.

2010
1. Fill in the blanks with appropriate words.
a) UNIX is a Multiprocessing and Multitasking operating system.
b) The command ______________teus in which directory ----- are.
c) Usually the size of each block in UNIX file system is 512 bytes.
d) All devices in UNIX are implemented as __Files.
e) To change the prompt ps2 variable is used.
f) The default prompt of C shell is $.
g) The echo command is sub Stituted by False .
h) An HTML document is divided into head and body tag.
i) The default HTML page that is delivered to a client connected to a web server is Index.html_.
j) In Java script the variable names are Case-sensitive .
k) The sub_query is also termed as nested query.
l) Oracle provides tow levels of automatic locking Row and Table .
m) Column level constraints are defined along with_col-defination.
n) The data is stored in the cursor is called Active data set.
o) The concept of joining a table to itself is known as Self Join.
p) The natural language of DBA is ANSI SQL .
q) Describe command is used to display the structure of a table.
r) A trigger has three basic parts Event ,Restriction and Function .
s) Oracle is a SQL statement the courses a trigger to be fired.
t) There are __________index of V2 Editor .

2011
1. Fill in the blanks with appropriate words.
a) The default value of unmask is ___________.
b) the command pwd displays a file one screen full at a time.
c) PATH is System variable.
d) Until works when condition is FullFilled.
e) The option __________ true if file exists and have executable permission.
f) The default prompt of the C-Shell is $.
g) The default case is represented in Unix operating system by _____________ character.
h) PID stands for Process Identification.
i) Unix is written in C language.
j) HTML is abbreviation of Hypertext Markup Language.
k) HTML stands for Hypertext Markup Language.
l) BCC is acronym of Blind Carbon Copy.
m) HTML was originally developed by Tim Burners Lee at ___________.
n) An image map is used to _____________.
o) E-Commerce applies marketing through internet.
p) Union clause can't be used in SQL
q) A cursor declared by the user is called Explicit Cursor.
r) The DCL commands are grant and revoke.
s) SQL is very powerful language that benefits all types of users of the ________ database _____.
t) Oracle loads the compiled procedure in the memory area called Database.
u) 2012
v) 1. Fill in the blanks with appropriate word(s):
w) a) UNIX is a _______________ operating system.
x) b) ____________________ is actually, the interface between user and the kernel.
y) c) the expression „expr 2%7‟ evaluates to ______________________.
z) d) the command ________________________ tells in which directory you are.
aa) e) usually the size of each block in unix file system is ______________ bytes.
bb) f) there are _________________ modes of vi editor.
cc) g) the default prompt of the c shell is ____________________.
dd) h) PID stands for _________________________________________________________.
ee) i) html stands for _________________________________________________________________.
ff) j) the <hr> tag is used for ________________________________________.
gg) k) in java script the variable names are
______________________________________________________.
hh) l) every computer that is connected into the internet is given a unique address is called
________________.
ii) m) the most common transfer protocol used on internet is _____________________________.
jj) n) ISP stands for __________________________________________________.
kk) o) _____________ command is used to display the structure of a table.
ll) p) when multiple table columns are included in the index, it is called _______________ index.
mm) q) the views on which data manipulation can be done are called ________________ views.
nn) r) a cursor declared by user is called _____________________________.
oo) s) the concept of joining a table to itself is known as _______________________________.
pp) t) __________________________ is a SQL statement that causes a trigger to be fired.
qq)
rr) 2013
ss) 1. Fill in the blanks with appropriate word(s):
tt) (a)PCB stands for—PROCESS CONTROL BLOCK.
uu) (b)The command _ _ _ _ _ searches files for a pattern.
vv) (c)The _ _ _ _ _ _ _ command will tell you the no. of characters in a file.
ww) (d) The _ _ _ _ _ _ _ command will display the top most line of a file.
xx) (e)A_ _ _ _ _state of a program is called a process.
yy) (f)An O/S is _ _ _ _ _ _ _software.
zz) (g)The _ _ _ _ display the long listing of files and directories.
aaa) (h)The command _ _ _ __ display a file one screen full at a time.
bbb) (i)URL stands for UNIFORM RESOURSE LOCATOR.
ccc) (j)_ _ _ _ _ _ _ is a software program that acts as an interface between the user and www .
ddd) (k)The two main sections of an HTML document are _ _ _ __ _ __ and _ _ _ _ _ _ .
eee) (l)The _ _ _ _ _tag is used to create a hyperlink.
fff) (m) SMTP stands for _ _ _ _ _ _ .
ggg) (n)_ _ _ _ _ _ _ _ applies marketing through internet.
hhh) (o)the _ _ _ _ _tag is used for line break.
iii)(p)A unique key can‟t be _ _ _ _ _or date data type.
jjj)(q)An owner of project permission to other user through _ _ _ _ _ _ _ statement.
kkk) (r)The sub query is also termed as _ _ _ _ _ _ query.
lll)(s)The concept of joining a table to itself is known as _ _ _ _ _ _ _ _ .
mmm) (t)The DCL commands are _ _ _ _ _ _ and _ _ _ _ _ _
nnn) 2014
ooo) 1. Fill in the blanks with appropriate word(s):
ppp) (a)A program is a _ _ _ _ _ _ _ entity where as a process is a _ _ _ _ _ entity.
qqq) (b)Usually the size of each block is UNIX file system is _ _ _ _ _bytes.
rrr) (c)_ _ _ _ _ __ and _ _ _ _ _are the models of vi editors.
sss) (d)RR scheduling is based on the concept of _ _ _ _ _ __ _.
ttt) (e) _ _ _ . . . . . provides the interface between a process and Operating system.
uuu) (f)Long-term scheduler is also called …… . . . . . .. .
vvv) (g) The command __ _ _ _ _ _ tells in which directory you are.
www) (h)In java script variable names are __ _ _ _ _ _ .
xxx) (i)UNIX is a _ _ _ _ _ _ _ and _ _ _ _ _ _ operating syatem.
yyy) (j)_ _ _ _ _ _ _ _ is used to display the structure of table.
zzz) (k)A cursor declared by the user is called _ _ _ _ _ _ _ _.
aaaa) (l) _ _ _ _ _ _ _ applies marketing through internet.
bbbb) (m)ISP Stands for INTERNET SERVICE PROVIDER.
cccc) (n)When multiple table columns are included in the index, it is called _ _ _ _ index.
dddd) (o)PATH is a SYSTEM variable.
eeee) (p)SMTP stands for
ffff) (r)The most common transfer protocol used on internet _ _ _ _ _ _ _ .
gggg) (s)The <HR> tag is used for _ _ _ _ _ _ .
hhhh) (t)The concept of joining a table to itself is known as _ _ _ _ _ _ .

You might also like