Saturday 28 November 2015

IBPS IT SO Computer Organization MCQs Set 3

COMPUTER ORGANIZATION AND ARCHITECTURE MCQs

1.Memory management technique in which system stores and retrieves data from secondary storage for use in main memory is called
a) fragmentation
b) paging
c) mapping
d) none of the mentioned
Answer:b

2.The address of a page table in memory is pointed by
a) stack pointer
b) page table base register
c) page register
d) program counter

3.Program always deals with
a) logical address
b) absolute address
c) physical address
d) relative address
Answer:a

4. A group of bits that tell the computer to perform a specific operation is known as____.
A. Instruction code
B. Micro-operation
C. Accumulator
D. Register
Ans: A

5. The time interval between adjacent bits is called the_____.
A. Word-time
B. Bit-time
C. Turn around time
D. Slice time
Ans: B

6. A k-bit field can specify any one of_____.
A. 3k registers
B. 2k registers
C. K2 registers
 D. K3 registers
 Ans: B

7. MIMD stands for _____.
A. Multiple instruction multiple data
B. Multiple instruction memory data
C. Memory instruction multiple data
D. Multiple information memory data
Ans: A

8. Logic gates with a set of input and outputs is arrangement of______.
A. Computational circuit
 B. Logic circuit
C. Design circuits
D. Register
Ans: A

9. The average time required to reach a storage location in memory and obtain its contents is called_____.
 A. Latency time.
 B. Access time.
 C. Turnaround time.
 D. Response time.
 Ans: B

10. The BSA instruction is______.
A. Branch and store accumulator
B. Branch and save return address
C. Branch and shift address
D. Branch and show accumulator
Ans: B

11. A floating point number that has a O in the MSB of mantissa is said to have_____.
A. Overflow
B. Underflow
 C. Important number
 D. Undefined
 Ans: B

12. Translation from symbolic program into Binary is done in_____.
 A. Two passes.
B. Directly
 C. Three passes.
D. Four passes.
 Ans: A

13. The instruction ‘ORG O’ is a______.
A. Machine Instruction.
B. Pseudo instruction.
C. High level instruction.
D. Memory instruction.
Ans: B

14. ‘Aging registers’ are _______.
 A. Counters which indicate how long ago their associated pages have been referenced.
B. Registers which keep track of when the program was last accessed.
 C. Counters to keep track of last accessed instruction.
 D. Counters to keep track of the latest data structures referred.
 Ans: A

15. Memory unit accessed by content is called______.
A. Read only memory
B. Programmable Memory
C. Virtual Memory
D. Associative Memory
 Ans: D

16. _________ register keeps tracks of the instructions stored in program stored in memory.
A. AR (Address Register)
 B. XR (Index Register)
 C. PC (Program Counter)
 D. AC (Accumulator)
Ans: C

17. n bits in operation code imply that there are ___________ possible distinct operators.
A. 2n
B. 2n
C. n/2
 D. n2
Ans: B

18. A three input NOR gate gives logic high output only when_____.
 A. one input is high
B. one input is low
 C. two input are low
 D. all input are high
Ans: D

19. The circuit converting binary data in to decimal is_____.
A. Encoder
 B. Multiplexer
C. Decoder
D.Code converter
 Ans: D

20. The multiplicand register & multiplier register of a hardware circuit implementing booth's algorithm have (11101) & (1100). The result shall be ______.
A. (812)10
B. (-12)10
C. (12)10
D. (-812)10
Ans: A

121. PSW is saved in stack when there is a _____.
A. interrupt recognized
B. execution of RST instruction
C. Execution of CALL instruction
 D. All of these
Ans: A

22. In computers, subtraction is carried out generally by____.
A. 1's complement method
B. 2's complement method
C. signed magnitude method
D. BCD subtraction method
Ans: B

23. The main memory in a Personal Computer (PC) is made of_____.
A. cache memory.
 B. static RAM
C. Dynamic Ram
D. bothA.and (B).
Ans: D

24. Cache memory works on the principle of_____.
A. Locality of data
B. Locality of memory
 C. Locality of reference
D. Locality of reference & memory
Ans: C

25. An n-bit microprocessor has_____.
A. n-bit program counter
B. n-bit address register
C. n-bit ALU D. n-bit instruction register
Ans: D

 26. When CPU is executing a Program that is part of the Operating System, it is said to be in _____.
 A. Interrupt mode
B. System mode
C. Half mode
D. Simplex mode
Ans: B

27. Logic X-OR operation of (4ACO)H& (B53F)H results _____.
A. AACB
B. 0000
C. FFFF
D. ABCD
Ans: C

28. If the main memory is of 8K bytes and the cache memory is of 2K words. It uses associative mapping. Then each word of cache memory shall be_____.
A. 11 bits
B. 21 bits
C. 16 bits
D. 20 bits
Ans: C

 29. A Stack-organised Computer uses instruction of _____.
 A. Indirect addressing
B. Two-addressing
C. Zero addressing
 D. Index addressing
Ans: C

30. In a program using subroutine call instruction, it is necessary______.
A. initialize program counter
B. Clear the accumulator
C. Reset the microprocessor
 D. Clear the instruction register
Ans: D

31. Virtual memory consists of _______.
A. Static RAM
B. Dynamic RAM
 C. Magnetic memory
D. None of these
 Ans: A

32. In signed-magnitude binary division, if the dividend is (11100)2 and divisor is (10011)2 then the result is ______.
A. (00100)2
 B. (10100)2
C. (11001)2
D. (01100)2
Ans: B

33. Generally Dynamic RAM is used as main memory in a computer system as it______.
A. Consumes less power
B. has higher speed
C. has lower cell density
D. needs refreshing circuitry
 Ans: B

34. Write Through technique is used in which memory for updating the data _____.
A. Virtual memory
B. Main memory
C. Auxiliary memory
D. Cache memory
Ans: D

35. Cache memory acts between_______.
A. CPU and RAM
B. RAM and ROM
C. CPU and Hard Disk
 D. None of these
 Ans: A

36. The circuit used to store one bit of data is known as ______.
A. Encoder
B. OR gate
C. Flip Flop
D. Decoder
Ans: C

37. Von Neumann architecture is ______.
A. SISD
B. SIMD
C. MIMD
 D. MISD
Ans: A

38. In a vectored interrupt.
A. the branch address is assigned to a fixed location in memory.
 B. the interrupting source supplies the branch information to the processor through an interrupt vector.
C. the branch address is obtained from a register in the processor
D. none of the above
Ans: B

39. . In a memory-mapped I/O system, which of the following will not be there?
A. LDA
B. IN
C. ADD
 D. OUT
Ans: A

40. If memory access takes 20 ns with cache and 110 ns without it, then the ratio (cache uses a 10 ns memory) is _____.
 A. 93%
B. 90%
C. 88%
D. 87%
Ans: B

41. The addressing mode used in an instruction of the form ADD X Y, is _____.
A. Absolute
 B. indirect
 C. index
D. none of these Ans: C

42. _________ register keeps track of the instructions stored in program stored in memory.
A. AR (Address Register)
B. XR (Index Register)
C. PC (Program Counter)
D. AC (Accumulator)
Ans: C

43. The idea of cache memory is based ______.
A. on the property of locality of reference
B. on the heuristic 90-10 rule
 C. on the fact that references generally tend to cluster
 D. all of the above
Ans: A

44. Which of the following is not a weighted code?
A. Decimal Number system
 B. Excess 3-cod
C. Binary number System
D. None of these
Ans: B

45. The average time required to reach a storage location in memory and obtain its contents is called the _____.
 A. seek time
B. turnaround time
C. access time
D. transfer time
Ans: C

46. (2FAOC)16 is equivalent to _____.
 A. (195 084)10
B. (001011111010 0000 1100)2
C. Both A.and (B)
 D. None of these
Ans: B

47. The circuit used to store one bit of data is known as_______.
A. Register
B. Encoder
C. Decoder
D. Flip Flop
Ans: D

48. . Computers use addressing mode techniques for ____________.
A. giving programming versatility to the user by providing facilities as pointers to memory counters for loop control
 B. to reduce no. of bits in the field of instruction
 C. specifying rules for modifying or interpreting address field of the instruction
D. All the above
Ans: D

49. What characteristic of RAM memory makes it not suitable for permanent storage?
A. too slow
B. unreliable
C. it is volatile
D. too bulky
Ans: C

50. The amount of time required to read a block of data from a disk into memory is composed of seek time, rotational latency, and transfer time. Rotational latency refers to ______.
A. the time its takes for the platter to make a full rotation
B. the time it takes for the read-write head to move into position over the appropriate track
C. the time it takes for the platter to rotate the correct sector under the head
 D. none of the above
Ans: A 

IBPS IT SO Computer Organization MCQs Set 2

COMPUTER ORGANIZATION AND ARCHITECTURE MCQs

1. MIMD stands for
(A) Multiple instruction multiple data (B) Multiple instruction memory data
(C) Memory instruction multiple data (D) Multiple information memory data
Ans: A

2 A k-bit field can specify any one of
(A) 3k registers (B) 2k registers
(C) K2 registers (D) K3 registers
Ans: B

3 The time interval between adjacent bits is called the
(A) Word-time (B) Bit-time (C) Turn around time (D) Slice time
Ans: B

4 A group of bits that tell the computer to perform a specific operation is known as
(A) Instruction code (B) Micro-operation (C) Accumulator (D) Register
Ans: A

5 The load instruction is mostly used to designate a transfer from memory to a processor register known as
(A) Accumulator (B) Instruction Register
(C) Program counter (D) Memory address Register
Ans: A

6 The communication between the components in a microcomputer takes place via the address and
(A) I/O bus (B) Data bus (C) Address bus (D) Control lines
Ans: B

7 An instruction pipeline can be implemented by means of
(A) LIFO buffer (B) FIFO buffer (C) Stack (D) None of the above
Ans: B

8 Data input command is just the opposite of a
(A) Test command (B) Control command (C) Data output (D) Data channel
Ans: C

9 A microprogram sequencer
(A) generates the address of next micro instruction to be executed.
(B) generates the control signals to execute a microinstruction.
(C) sequentially averages all microinstructions in the control memory.
(D) enables the efficient handling of a micro program subroutine.
Ans: A

10 . A binary digit is called a
(A) Bit (B) Byte (C) Number (D) Character
Ans: A

11 A flip-flop is a binary cell capable of storing information of
(A) One bit (B) Byte (C) Zero bit (D) Eight bit
Ans: A

12 The operation executed on data stored in registers is called
(A) Macro-operation (B) Micro-operation
(C) Bit-operation (D) Byte-operation
Ans: B

13 MRI indicates
(A) Memory Reference Information. (B) Memory Reference Instruction.
(C) Memory Registers Instruction. (D) Memory Register information
Ans: B

14 Self-contained sequence of instructions that performs a given computational task is called
(A) Function (B) Procedure (C) Subroutine (D) Routine
Ans: A

15 Microinstructions are stored in control memory groups, with each group specifying a (A) Routine (B) Subroutine (C) Vector (D) Address
Ans: A

16 An interface that provides a method for transferring binary information between internal storage and external devices is called
(A) I/O interface (B) Input interface (C) Output interface (D) I/O bus
Ans: A

17 Status bit is also called
(A) Binary bit (B) Flag bit (C) Signed bit (D) Unsigned bit
Ans: B

18 An address in main memory is called
(A) Physical address (B) Logical address (C) Memory address (D) Word address
Ans: A

19 If the value V(x) of the target operand is contained in the address field itself, the addressing mode is
(A) immediate. (B) direct. (C) indirect. (D) implied.
Ans: B

20 can be represented in a signed magnitude format and in a 1’s complement format as (A) 111011 & 100100 (B) 100100 & 111011
(C) 011011 & 100100 (D) 100100 & 011011
Ans: A

21 The instructions which copy information from one location to another either in the processor’s internal register set or in the external main memory are called
(A) Data transfer instructions. (B) Program control instructions.
(C) Input-output instructions. (D) Logical instructions.
Ans: A

22 A device/circuit that goes through a predefined sequence of states upon the application of input pulses is called
(A) register (B) flip-flop (C) transistor. (D) counter.
Ans: D

23. The performance of cache memory is frequently measured in terms of a quantity called
(A) Miss ratio. (B) Hit ratio. (C) Latency ratio. (D) Read ratio.
Ans: C

24. The information available in a state table may be represented graphically in a
(A) simple diagram. (B) state diagram. (C) complex diagram. (D) data flow diagram.
Ans: B

25 Content of the program counter is added to the address part of the instruction in order to obtain the effective address is called.
(A) relative address mode. (B) index addressing mode.
(C) register mode. (D) implied mode.
Ans: A

26 An interface that provides I/O transfer of data directly to and form the memory unit and peripheral is termed as
(A) DDA. (B) Serial interface. (C) BR. (D) DMA.
Ans: D

27 The 2s compliment form (Use 6 bit word) of the number 1010 is
(A) 111100. (B) 110110. (C) 110111. (D) 1011.
Ans: B

28 A register capable of shifting its binary information either to the right or the left is called a
(A) parallel register. (B) serial register. (C) shift register. (D) storage register.
Ans: C

29 What is the content of Stack Pointer (SP)?
(A) Address of the current instruction (B) Address of the next instruction
(C) Address of the top element of the stack (D) Size of the stack.
Ans: C

80 Which of the following interrupt is non maskable
(A) INTR. (B) RST 7.5. (C) RST 6.5. (D) TRAP.
Ans: D

31 Which of the following is a main memory
(A) Secondary memory. (B) Auxiliary memory.
(C) Cache memory. (D) Virtual memory.
Ans: C

32 Which of the following are not a machine instructions
(A) MOV. (B) ORG. (C) END. (D) (B) & (C) .
Ans: D

33 In Assembly language programming, minimum number of operands required for an instruction is/are
(A) Zero. (B) One. (C) Two. (D) Both (B) & (C) .
Ans: A

34 The maximum addressing capacity of a micro processor which uses 16 bit database & 32 bit address base is
(A) 64 K. (B) 4 GB. (C) both (A) & (B) . (D) None of these.
Ans: B

35 The memory unit that communicates directly with the CPU is called the
(A) main memory (B) Secondary memory
(C) shared memory (D) auxiliary memory.
Ans: A

36 The average time required to reach a storage location in memory and obtain its contents is called
(A) Latency time. (B) Access time.
(C) Turnaround time. (D) Response time.
Ans: B
State True or False

37 A byte is a group of 16 bits.
Ans: False

38 A nibble is a group of 16 bits.
Ans: False

39 When a word is to be written in an associative memory, address has got to be given.
Ans: False

40 When two equal numbers are subtracted, the result would be ______and not_________.
Ans: +ZERO, -ZERO.

41 A ___________development system and an ______are essential tools for writing large assembly language programs.
Ans: Microprocessor, assembler

42 In an operation performed by the ALU, carry bit is set to 1 if the end carry C 8 is ________. It is cleared to 0 (zero) if the carry is ______ _______.
Ans: One, zero

43 A successive A/D converter is
(A) a high-speed converter. (B) a low speed converter.
(C) a medium speed converter. (D) none of these.
Ans: C

44 When necessary, the results are transferred from the CPU to main memory by (A) I/O devices. (B) CPU. (C) shift registers. (D) none of these.
Ans: C


45. The load instruction is mostly used to designate a transfer from memory to a processor register known as____.
 A. Accumulator
 B. Instruction Register
C. Program counter
D. Memory address Register
Ans: A

46 A combinational logic circuit which sends data coming from a single source to two or more separate destinations is
(A) Decoder. (B) Encoder. (C) Multiplexer. (D) Demultiplexer.
Ans: D

47 In which addressing mode the operand is given explicitly in the instruction
(A) Absolute. (B) Immediate . (C) Indirect. (D) Direct.
Ans: B

48 A stack organized computer has
(A) Three-address Instruction. (B) Two-address Instruction.
(C) One-address Instruction. (D) Zero-address Instruction.
Ans: D

49 A Program Counter contains a number 825 and address part of the instruction contains the number 24. The effective address in the relative address mode, when an instruction is read from the memory is
(A) 849. (B) 850. (C) 801. (D) 802.
Ans: B

50 A page fault
(A) Occurs when there is an error in a specific page.
(B) Occurs when a program accesses a page of main memory.
(C) Occurs when a program accesses a page not currently in main memory.
(D) Occurs when a program accesses a page belonging to another program.
Ans: C

IBPS IT SO Computer Organization MCQs Set 1

COMPUTER ORGANIZATION AND ARCHITECTURE MCQs

1. In Reverse Polish notation, expression A*B+C*D is written as
(A) AB*CD*+ (B) A*BCD*+ (C) AB*CD+* (D) A*B*CD+
Ans: A

2. SIMD represents an organization that ______________.
(A) refers to a computer system capable of processing several programs at the same
time.
(B) represents organization of single computer containing a control unit, processor unit and a memory unit.
(C) includes many processing units under the supervision of a common control unit
(D) none of the above.
Ans: C

3. Floating point representation is used to store
(A) Boolean values (B) whole numbers (C) real integers (D) integers
Ans: C

4. Suppose that a bus has 16 data lines and requires 4 cycles of 250 nsecs each to transfer data. The bandwidth of this bus would be 2 Megabytes/sec. If the cycle time of the bus was reduced to 125 nsecs and the number of cycles required for transfer stayed the same what would the bandwidth of the bus?
(A) 1 Megabyte/sec (B) 4 Megabytes/sec (C) 8 Megabytes/sec (D) 2 Megabytes/sec
Ans: D

5. Assembly language
(A) uses alphabetic codes in place of binary numbers used in machine language
(B) is the easiest language to write programs
(C) need not be translated into machine language
(D) None of these
Ans: A

6. In computers, subtraction is generally carried out by
(A) 9’s complement (B) 10’s complement (C) 1’s complement (D) 2’s complement Ans: D

7. The amount of time required to read a block of data from a disk into memory is composed of seek time, rotational latency, and transfer time. Rotational latency refers to (A) the time its takes for the platter to make a full rotation
(B) the time it takes for the read-write head to move into position over the appropriate track
(C) the time it takes for the platter to rotate the correct sector under the head
(D) none of the above
Ans: A

8. What characteristic of RAM memory makes it not suitable for permanent storage?
(A) too slow (B) unreliable (C) it is volatile (D) too bulky
Ans: C

9. Computers use addressing mode techniques for _____________________.
(A) giving programming versatility to the user by providing facilities as pointers to memory counters for loop control
(B) to reduce no. of bits in the field of instruction
(C) specifying rules for modifying or interpreting address field of the instruction
(D) All the above
Ans: D

10. The circuit used to store one bit of data is known as
(A) Register (B) Encoder (C) Decoder (D) Flip Flop
Ans: D

11. (2FAOC) 16 is equivalent to
(A) (195 084) 10 (B) (001011111010 0000 1100) 2 (C) Both (A) and (B) (D) None of these
Ans: B

12. The average time required to reach a storage location in memory and obtain its contents is called the
(A) seek time (B) turnaround time (C) access time (D) transfer time
Ans: C

13. Which of the following is not a weighted code?
(A) Decimal Number system (B) Excess 3-cod
(C) Binary number System (D) None of these
Ans: B

14. The idea of cache memory is based
(A) on the property of locality of reference (B) on the heuristic 90-10 rule
(C) on the fact that references generally tend to cluster (D) all of the above
Ans: A 15. Which of the following is lowest in memory hierarchy? (A) Cache memory (B) Secondary memory (C) Registers (D) RAM (E) None of these Ans (B) Secondary memory

16. The addressing mode used in an instruction of the form ADD X Y, is
(A) Absolute (B) indirect (C) index (D) none of these
Ans: C

17. If memory access takes 20 ns with cache and 110 ns with out it, then the ratio ( cache uses a 10 ns memory) is
(A) 93% (B) 90% (C) 88% (D) 87%
Ans: B

18. In a memory-mapped I/O system, which of the following will not be there?
(A) LDA (B) IN (C) ADD (D) OUT
Ans: A

19. In a vectored interrupt.
(A) the branch address is assigned to a fixed location in memory.
(B) the interrupting source supplies the branch information to the processor through an interrupt vector.
(C) the branch address is obtained from a register in the processor
(D) none of the above
Ans: B

20. Von Neumann architecture is
(A) SISD (B) SIMD (C) MIMD (D) MISD
Ans: A

21. The circuit used to store one bit of data is known as
(A) Encoder (B) OR gate (C) Flip Flop (D) Decoder
Ans: C

22. Cache memory acts between
(A) CPU and RAM (B) RAM and ROM (C) CPU and Hard Disk (D) None of these
Ans: A

23. Write Through technique is used in which memory for updating the data
(A) Virtual memory (B) Main memory
(C) Auxiliary memory (D) Cache memory
Ans: D

24. Generally Dynamic RAM is used as main memory in a computer system as it
(A) Consumes less power (B) has higher speed
(C) has lower cell density (D) needs refreshing circuitary
Ans: B

25. In signed-magnitude binary division, if the dividend is (11100) 2 and divisor is (10011) 2 then the result is
(A) (00100) 2 (B) (10100) 2 (C) (11001) 2 (D) (01100) 2
Ans: B
26. Virtual memory consists of
(A) Static RAM (B) Dynamic RAM
(C) Magnetic memory (D) None of these
Ans: A

27. In a program using subroutine call instruction, it is necessary
(A) initialise program counter (B) Clear the accumulator
(C) Reset the microprocessor (D) Clear the instruction register
Ans: D

28. A Stack-organised Computer uses instruction of
(A) Indirect addressing (B) Two-addressing (C) Zero addressing (D) Index addressing
Ans: C

29. If the main memory is of 8K bytes and the cache memory is of 2K words. It uses associative mapping. Then each word of cache memory shall be
(A) 11 bits (B) 21 bits (C) 16 bits (D) 20 bits
Ans: C

30 A-Flip Flop can be converted into T-Flip Flop by using additional logic circuit
(A) n TQD =• (B) T D = (C) D = T . Q n (D) n TQD =⊕
Ans: D
31. Logic X-OR operation of (4ACO) H & (B53F) H results
(A) AACB (B) 0000 (C) FFFF (D) ABCD
Ans: C

32. When CPU is executing a Program that is part of the Operating System, it is said to be in (A) Interrupt mode (B) System mode (C) Half mode (D) Simplex mode
Ans: B

33. An n-bit microprocessor has
(A) n-bit program counter (B) n-bit address register
(C) n-bit ALU (D) n-bit instruction register
Ans: D

34. Cache memory works on the principle of
(A) Locality of data (B) Locality of memory
(C) Locality of reference (D) Locality of reference & memory
Ans: C

35. The main memory in a Personal Computer (PC) is made of
(A) cache memory. (B) static RAM
(C) Dynamic Ram (D) both (A) and (B) .
Ans: D
36. In computers, subtraction is carried out generally by
(A) 1's complement method (B) 2's complement method
(C) signed magnitude method (D) BCD subtraction method
Ans: B

37. PSW is saved in stack when there is a
(A) interrupt recognised (B) execution of RST instruction
(C) Execution of CALL instruction (D) All of these
Ans: A

38. The multiplicand register & multiplier register of a hardware circuit implementing booth's algorithm have (11101) & (1100). The result shall be
(A) (812) 10 (B) (-12) 10 (C) (12) 10 (D) (-812) 10
Ans: A
39. The circuit converting binary data in to decimal is
(A) Encoder (B) Multiplexer (C) Decoder (D) Code converter
Ans: D

40. A three input NOR gate gives logic high output only when
(A) one input is high (B) one input is low
(C) two input are low (D) all input are high
Ans: D

41. n bits in operation code imply that there are ___________ possible distinct operators (A) 2n (B)
2n (C) n/2 (D) n2
Ans: B
42. _________ register keeps tracks of the instructions stored in program stored in memory.
(A) AR (Address Register) (B) XR (Index Register)
(C) PC (Program Counter) (D) AC (Accumulator)
Ans: C

43. Memory unit accessed by content is called
(A) Read only memory (B) Programmable Memory
(C) Virtual Memory (D) Associative Memory
Ans: D


44. ‘Aging registers’ are
(A) Counters which indicate how long ago their associated pages have been referenced.
(B) Registers which keep track of when the program was last accessed.
(C) Counters to keep track of last accessed instruction.
(D) Counters to keep track of the latest data structures referred.
Ans: A

45 The instruction ‘ORG O’ is a
(A) Machine Instruction. (B) Pseudo instruction.
(C) High level instruction. (D) Memory instruction.
Ans: B

46 Translation from symbolic program into Binary is done in
(A) Two passes. (B) Directly (C) Three passes. (D) Four passes.
Ans: A

47 A floating point number that has a O in the MSB of mantissa is said to have
(A) Overflow (B) Underflow (C) Important number (D) Undefined
Ans: B

48 The BSA instruction is
(A) Branch and store accumulator (B) Branch and save return address
(C) Branch and shift address (D) Branch and show accumulator
Ans: B

49 State whether True or False.
(i) Arithmetic operations with fixed point numbers take longer time for execution as compared to with floating point numbers.
Ans: True.
(ii) An arithmetic shift left multiplies a signed binary number by 2.
Ans: False.

50 Logic gates with a set of input and outputs is arrangement of
(A) Combinational circuit (B) Logic circuit (C) Design circuits (D) Register
Ans: A

Monday 23 November 2015

IBPS IT SO DBMS MCQs Set 3

DBMS IT SO MCQs Set 3

1. DBMS is a collection of ………….. that enables user to create and maintain a database.
A) Keys
B) Translators
C) Program
D) Language Activity
Ans: C

2. In a relational schema, each tuple is divided into fields called 
A) Relations
B) Domains
C) Queries
D) All of the above
Ans: B

3. In an ER model, ……………. is described in the database by storing its data.
A) Entity
B) Attribute
C) Relationship
D) Notation
Ans: A

4. DFD stands for
A) Data Flow Document
B) Data File Diagram
C) Data Flow Diagram
D) Non of the above
Ans: C

5. A top-to-bottom relationship among the items in a database is established by a 
A) Hierarchical schema
B) Network schema
C) Relational Schema
D) All of the above
Ans: A

6. ……………… table store information about database or about the system.
A) SQL
B) Nested
C) System
D) None of these
Ans: C


7. …………..defines the structure of a relation which consists of a fixed set of attribute-domain pairs.
A) Instance 
B) Schema
c) Program
D) Super Key
Ans: B

8. ……………… clause is an additional filter that is applied to the result.
A) Select
B) Group-by
C) Having
D) Order by
Ans: C

9. A logical schema 
A) is the entire database
B) is a standard way of organizing information into accessible parts.
C) Describes how data is actually stored on disk.
D) All of the above
B


10. ………………… is a full form of SQL.
A) Standard query language
B) Sequential query language
C) Structured query language
D) Server side query language
Ans: C

11) A relational database developer refers to a record as 
A. a criteria
B. a relation
C. a tuple
D. an attribute
Ans: C

12) .......... keyword is used to find the number of values in a column.
A. TOTAL
B. COUNT
C. ADD
D. SUM
Ans: B


13) An advantage of the database management approach is 
A. data is dependent on programs
B. data redundancy increases
C. data is integrated and can be accessed by multiple programs
D. none of the above
Ans: C

14) The collection of information stored in a database at a particular moment is called as ......
A. schema
B. instance of the database
C. data domain
D. independence
Ans: B


15) Data independence means
A. data is defined separately and not included in programs.
B. programs are not dependent on the physical attributes of data 
C. programs are not dependent on the logical attributes of data 
D. both B and C 
Ans:  D

16) A ......... is used to define overall design of the database
A. schema
B. application program
C. data definition language
D. code
Ans: A


17) Key to represent relationship between tables is called
A. primary key
B. secondary key
C. foreign key
D. none of the above
Ans: C

18) Grant and revoke are ....... statements.
A. DDL
B. TCL 
C. DCL
D. DML
Ans: C

19) DBMS helps achieve
A. Data independence 
B. Centralized control of data
C. Neither A nor B
D. Both A and B 
Ans: D

20) .......... command can be used to modify a column in a table
A. alter
B. update
C. set
D. create
Ans: A

31. The candidate key is that you choose to identify each row uniquely is called ……………..
A) Alternate Key
B) Primary Key
C) Foreign Key
D) None of the above
Ans:B

2. …………….. is used to determine whether of a table contains duplicate rows.
A) Unique predicate
B) Like Predicate
C) Null predicate
D) In predicate
Ans:A


3. To eliminate duplicate rows ……………… is used
A) NODUPLICATE
B) ELIMINATE
C) DISTINCT
D) None of these
Ans:C

4. State true or false
i) A candidate key is a minimal super key.
ii) A candidate key can also refer to as surrogate key.
A) i-true, ii-false
B) i-false, ii-true
C) i-true, ii-true
D) i-false, ii-false
Ans:C

5. DCL stands for
A) Data Control Language
B) Data Console Language
C) Data Console Level
D) Data Control Level
Ans:A

6. …………………… is the process of organizing data into related tables.
A) Normalization
B) Generalization
C) Specialization
D) None of the above
Ans:A

7. A ………………. Does not have a distinguishing attribute if its own and mostly are dependent entities, which are part of some another entity.
A) Weak entity
B) Strong entity
C) Non attributes entity
D) Dependent entity
Ans:A

8. …………….. is the complex search criteria in the where clause.
A) Sub string
B) Drop Table
C) Predict
D) Predicate
Ans:D

9. ………………… is preferred method for enforcing data integrity
A) Constraints
B) Stored Procedure
C) Triggers
D) Cursors
Ans:A

10. The number of tuples in a relation is called its …………. While the number of attributes in a relation is called it’s ………………..
A) Degree, Cardinality
B) Cardinality, Degree
C) Rows, Columns
D) Columns, Rows
Ans:B

11) The language that requires a user to specify the data to be retrieved without specifying exactly how to get it is
A. Procedural DML
B. Non-Procedural DML
C. Procedural DDL
D. Non-Procedural DDL
Ans:B

12) Which two files are used during operation of the DBMS?
A. Query languages and utilities
B. DML and query language
C. Data dictionary and transaction log
D. Data dictionary and query language
Ans:C

13) The database schema is written in
A. HLL
B. DML
C. DDL
D. DCL
Ans:C

14) The way a particular application views the data from the database that the application uses is a
A. module
B. relational model
C. schema
D. sub schema
Ans:D

15) The relational model feature is that there
A. is no need for primary key data
B. is much more data independence than some other database models
C. are explicit relationships among records.
D. are tables with many dimensions
Ans:B

16) Which one of the following statements is false?
A. The data dictionary is normally maintained by the database administrator
B. Data elements in the database can be modified by changing the data dictionary.
C. The data dictionary contains the name and description of each data element.
D. The data dictionary is a tool used exclusively by the database administrator.
Ans:B

17) Which of the following are the properties of entities?
A. Groups
B. Table
C. Attributes
D. Switchboards
Ans:C

18) Which database level is closest to the users?
A. External
B. Internal
C. Physical
D. Conceptual
Ans:A

19) Which are the two ways in which entities can participate in a relationship?
A. Passive and active
B. Total and partial
C. Simple and Complex
D. All of the above
Ans:B

20) ........ data type can store unstructured data
A. RAW
B. CHAR
C. NUMERIC
D. VARCHAR
Ans:A

IBPS IT SO DBMS MCQs Set 2

DBMS MCQs

1. Software that defines a database, stores the data, supports a query language, produces reports and creates data entry screens is a:
A) data dictionary
B) database management system (DBMS)
C) decision support system
 D) relational database
Ans:( B )

2. The modern database report writer:
A) is a career path that focuses on creating, managing and supporting the reports generated from databases
B) provide limited control over how information is displayed and reported.
C) provides the tools for database designer to display information in the desired format
D)provides the tools for the database administrator to monitor and report on database use and activity
Ans:( C )
3. The separation of the data definition from the program is known as:
A) data dictionary
B) data independence
C) data integrity
 D) referential integrity
Ans:( B )
4. In the client / server model, the database:
A) is downloaded to the client upon request
 B) is shared by both the client and server
C) resides on the client side
D) resides on the server side
Ans:( D )

5. The traditional storage of data that is organized by customer, stored in separate folders in filing cabinets is an example of what type of 'database' system?
A) Hierarchical
B) Network  
C) Object oriented
 D) Relational
Ans:( A )

6. The database design that consists of multiple tables that are linked together through matching data stored in each table is called a:
A) Hierarchical database
B) Network database
 C) Object oriented database
  D) Relational database
Ans:( D )

7. What is the main limitation of Hierarchical Databases?
A) Limited capacity (unable to hold much data)
 B) Limited flexibility in accessing data
 C) Overhead associated with maintaining indexes
D) The performance of the database is poor
Ans:( B )

8. An abstract data type is used to:
A) link data from remote databases
B) prevent users from getting to database security information
 C) provide a conceptual view of the data so it is easier to understand
D) store complex data structure to represent the properties of objects
Ans:( D )

9. One of the first phases of a new database project that involves critical areas, expensive hardware or software within the organization is called ___________.
A) analysis phase
B) feasibility study
C) investigation stage
 D) system design
Ans:( B )

10. Which component of the database management system (DBMS) most affects the ability to handle large problems (scalability)?
A) Data Storage Subsystem
B) Database Engine
C) Query Processor
 D) Security Subsystem
Ans:( B )

11. The primary difference between the Relational database (RDB) and Object Oriented database (OODB) models is:
A) OODB incorporates methods in with the definition of the data structure, while RDB does not B) OODB supports multiple objects in the same database while RDB only supports a single table per database
C) RDB allows the definition of the relationships between the different tables, while OODB does not allow the relationships to be defined between objects
D) RDB supports indexes, while OODB does not support indexes
Ans:( A )

12. Which of the following items is not the advantage of a DBMS?
A) Improved ability to enforce standards
 B) Improved data consistency
 C) Local control over the data
D) Minimal data redundancy
Ans:( C )

13. The predominant way of storing data today is using which type of database models?
A) Hierarchical
 B) Network
 C) Object oriented
 D) Relational
Ans:( D )

14. Two different terms are used to describe the characteristics of interest for an entity. They are attributes and:
A) classes
 B) entities
C) properties
D) traits
Ans:( C )

15. When building a database, the data dealing with an entity is modeled as a:
A) attribute
 B) class
C) object
D) table
Ans:( B )
16. Database system modelers use this type of diagram to graphically represent both the data structure and how the different objects are interrelated.
A) Class Diagram
B) Data Diagram
C) Object Diagram
D) Table Relationship Diagram
Ans:( A )

17. In relational database model, after conceptually designing your database, the information contained in a single class would be stored in a:
A) database
B) field
C) property
D) table
Ans:( D )

18. The property (or set of properties) that uniquely defines each row in a table is called the:
A) identifier
B) index
C) primary key
 D) symmetric key
Ans:( C )

19. Business rules can be represented in the database through:
A) associations (or relationships)
B) attributes
C) properties
D) secondary keys
Ans:( A )

20. The association role defines:
A) how tables are related in the database
B) the relationship between the class diagram and the tables in the database
C) the tables that each attribute is contained
D) which attribute is the table's primary key
Ans:( A )

21. The purpose of an N-Ary association is:
A) to capture a parent-child relationship
B) to deal with one to many relationships
C) to deal with relationships that involve more than two tables
D) to represent an inheritance relationship
Ans:( C )

22. A composition association is drawn using which symbol:
A) A line which loops back onto the same table
 B) Small closed diamond at the end of a line connecting two tables
C) Small open diamond at the end of a line connecting two tables
D) Small triangle at the end of a line connecting the aggregated item and multiple component items
Ans:( B )

23. A reflexive association is drawn using which symbol:
A) a line which loops back onto the same table
 B) small closed diamond at the end of a line connecting two tables
C) small open diamond at the end of a line connecting two tables
D) small triangle at the end of a line connecting the aggregated item and multiple component items
Ans:( A )

24. Assume you are creating a database to handle the data associated with instruction at a university. What is the most appropriate special association to model that a class may have multiple pre-requisites?
A) aggregation association
B) generalization association
C) n-ary association
D) reflexive association
Ans:( D )

25. Assume you are creating a database to handle the data associated with instruction at a university. What is the most appropriate special association to model degree requirements (i.e., required number of courses in humanity, science, math, etc)?
A) composition association   B) generalization association   C) n-ary association   D) reflexive association
Ans:( A )

26. Assume you are creating a database to handle the data associated with instruction at a university. What is the most appropriate special association to model that a course has an assigned instructor, Teaching Assistants, a classroom, meeting time slot, and class roster?
A) aggregation association
B) generalization association
C) n-ary association
D) reflexive association
Ans:( C )

27. What is the most appropriate special association that indicates that multiple textbooks make up a course required reading list?
A) aggregation association
B) generalization association
 C) n-ary association
 D) reflexive association
Ans:( C )

28. What is the special association that indicates that one object can be broken down into multiple special cases?
A) composition association
B) generalization association
C) n-ary association
D) reflexive association
Ans:( B )

29. The ability to define common properties or functions in the higher class and then modify them in the lower classes is called:
A) Inheritance
B) Polymorphism
C) Reflexive
D) Transformance
Ans:( B )

30. A reflexive association is one where one class is:
A) broken down into special cases
B) combined with multiple other classes
C) combined with one other class
D) linked back to itself
Ans:( D )