111. ………….. may be used to show how the system reacts to internal and external events.
(A) Entity-relation diagram
(B) Data flow diagram
(C) Objects class diagram
(D) State transaction diagram
Show Answer
Hide Answer
112. ………….. have the advantage that unlike some other modeling notations, they are simple and intuitive.
(A) Entity-relation diagram
(B) Data flow diagram
(C) Objects class diagram
(D) State transaction diagram
Show Answer
Hide Answer
113. …………………. in data-flow diagram represent data stores, which should be given a descriptive name.
(A) rounded rectangle
(B) rectangles
(C) circles
(D) arrows
Show Answer
Hide Answer
114. ……………. enables the software engineer to derive sets of input conditions that will fully exercise all functional requirements for a program.
(B) Control structure testing
(C) Black-box testing
(D) Gray-box testing
Show Answer
Hide Answer
115. The independent versions from the basis of a black-box testing technique are called …………….
(A) Condition testing
(B) Graph-based testing
(C) Comparison testing
(D) loop testing
Show Answer
Hide Answer
116. Which of the following is/ are the part of an operating system?
(A) Kernel services
(B) Library services
(C) Application level services
(D) All of the above
Show Answer
Hide Answer
117. The first batch operating system was developed in the …………….. by General Motors for use on an IBM 701.
(A) mid 1940’s
(B) mid 1950’s
(C) mid 1960’s
(D) mid 1970’s
Show Answer
Hide Answer
118. …………….. is the ability of multiple process to co-ordinate their activities by exchange of information
(A) Synchronization
(B) Mutual Exclusion
(C) Dead lock
(D) Starvation
Show Answer
Hide Answer
119. A direct method of deadlock prevention is to prevent the occurrences of …………
(A) Mutual exclusion
(B) Hold and wait
(C) Circular waits
(D) No preemption
Show Answer
Hide Answer
120. ……………….. is an example of an operating system that supports single user process and single thread.
(A) UNIX
(B) MS-DOS
(C) OS/2
(D) Windows 2000
Show Answer
Hide Answer
121. ……….. also known as monitor mode.
(A) User mode
(B) System mode
(C) Unprivileged mode
(D) Process mode
Show Answer
Hide Answer
122. Which of the following is crucial time while accessing data on the disk?
(A) Seek time
(B) Rotational time
(C) Transmission time
(D) Waiting time
Show Answer
Hide Answer
123. Which technique was introduced because a single job could keep both the CPU and the I/O devices busy?
(A) Time sharing
(B) Spooling
(C) Preemptive scheduling
(D) Multiprogramming
Show Answer
Hide Answer
124. Error handling and I/O interrupt handling are the functions of ……
(A) I/O device Handler
(B) I/O traffic controller
(C) I/O scheduler
(D) I/O buffer
Show Answer
Hide Answer
125. The attribute ……………… of <BODY> tag sets color of hypertext links.
(A) link
(B) vlink
(C) alink
(D) hlink
Show Answer
Hide Answer
126. In order to upload a HTML file to a web server, you use
(A) HTTP
(B) SMTP
(C) SIP
(D) FTP
Show Answer
Hide Answer
127. Which of the following protocol is used for e-mail services.
(A) SMAP
(B) SMTP
(C) SMIP
(D) SMOP
Show Answer
Hide Answer
128. XML stands for ………………….
(A) Extensible Markup Language
(B) Eccessive Markup Language
(C) Executive Markup Language
(D) Extensible Managing Language
Show Answer
Hide Answer
129. …………………….. encloses a group of links to serve as document or site navigation.
(A) nav
(B) menu
(C) group
(D) navigation
Show Answer
Hide Answer
130. Java has its origin in
(A) C programming language
(B) PERRL
(C) COBOL
(D) Oak programming language
Show Answer
Hide Answer