0% found this document useful (0 votes)
12 views272 pages

MadXAbhi_RSSB_Basic_&_Senior_Computer_Instructor_study_Material

The document is a study material and question bank for the Rajasthan Staff Selection Board's Basic and Senior Computer Instructor exams, edited by Anand Kumar Mahajan. It covers a wide range of topics including computer fundamentals, data processing, programming, network security, database management, and pedagogy, along with important questions from previous years. The material is designed to aid candidates in their preparation for the exams, providing both theoretical knowledge and practical insights.

Uploaded by

workurbannest
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views272 pages

MadXAbhi_RSSB_Basic_&_Senior_Computer_Instructor_study_Material

The document is a study material and question bank for the Rajasthan Staff Selection Board's Basic and Senior Computer Instructor exams, edited by Anand Kumar Mahajan. It covers a wide range of topics including computer fundamentals, data processing, programming, network security, database management, and pedagogy, along with important questions from previous years. The material is designed to aid candidates in their preparation for the exams, providing both theoretical knowledge and practical insights.

Uploaded by

workurbannest
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 272

Rajasthan Staff Selection Board

RSSB
Basic and Senior
Computer Instructor
Study Material
&

Question Bank
Chief Editor
Anand Kumar Mahajan
Written by
Shrikant Vishwakarma, Vikash Maurya, Nitesh Mishra,
Pramod Yadav, Shashikant Yadav, Meena Kanaujia
Computer Graphics by
Balkrishna, Charan Singh
Editorial Office
Youth Competition Times
12, Church Lane Prayagraj-211002
Mob. : 9415650134
Email : [email protected]
website : www.yctbooks.com
Publisher Declaration
Edited and Published by A.K. Mahajan for YCT Publication Pvt. Ltd.
and printed by R.A. Security Printers, Prayagraj.
In order to publish the book, full care has been taken by the editor and
the publisher, still your suggestions and queries are welcomed. Rs. : 250/-
In the event of any dispute, the Judicial area will be Prayagraj.
Content
Syllabus of RSSB ............................................................................................................................... 3-3
Fundamentals of Computer ............................................................................................................ 4-19
Introduction of Computer Computer Hardware and Devices Input Device Output Device
Memory/Storage Device Representation of Data, Number system Conversion of Numbers
Introduction to Data Processing Data Processing Files and Types Important Facts
Important Questions Asked in Previous Years Examinations with Answer Key
Data Processing.............................................................................................................................. 20-52
Word Processing Microsoft Office Word (MS Word) Microsoft Excel PowerPoint M.S.
Office (Access) Important Facts Important Questions Asked in Previous Years Examinations
with Answer Key
Programming Fundamentals...................................................................................................... 53-110
Introduction to C Introduction to C++ Java .Net Artificial Intelligence Machine
Learning Pytho Blockchain, Principles and programming techniques Introduction of object
oriented programming (OOPs) Integrated Development Environment Important facts
Important Questions Asked in Previous Years Examinations with Answer Key
Data structures and Algorithms ............................................................................................... 111-125
Algorithms for Problem Solving Abstract Data Types (ADT) Arrays as Data Structure
Linked list V/S Array for Storage Stack & Stack Operation Queue Basic Operations
General Tree Graph and their representation Sorting & Searching Symbol Table Data
Structure Using C & C++ Important Points Important Questions Asked in Previous Years
Examinations with Answer Key
Computer Organization and Operation System ..................................................................... 126-149
Basic Structure of Computer Computer Arithmetic Operations Central Processing Unit and
Instructions Memory Organization I/O Organization Operating Systems Overview Process
Management Finding & Processing File Important Facts Important Questions Asked in
Previous Years Examinations with Answer Key
Communication and Network Concepts ................................................................................. 150-173
Introduction to Computer Network Networks Layers/Models Networking Devices
Fundamentals of Mobile Communication Important Facts Important Questions Asked in
Previous Years Examinations with Answer Key
Network Security ....................................................................................................................... 174-184
Network Security Protecting computer systems from viruses and malicious Attacks Firewall
Network attack Ethical Hacking Important Facts Important Questions Asked in Previous
Years Examinations with Answer Key
Database Management System................................................................................................. 185-209
An Overview of the Database Management Architecture of DBMS Relational Database
Management System (RDBMS) Database Design Manipulating Data NoSql database SQL
Important Facts Important Questions Asked in Previous Years Examinations with Answer Key
System Analysis and Design ..................................................................................................... 210-241
Introduction Requirement Gathering & Feasibility Analysis Structured Analysis
Structured Design Object-oriented Modeling using UML Testing Software
Implementation and Maintenance Software Implementation: Other Software Development
Approaches Important Facts Important Questions Asked in Previous Years Examinations with
Answer Key
Internet of things and its application ....................................................................................... 242-258
Introduction to IoT What is data What is Cloud Virtual Reality Internet Technology
Protocol Search Engines Introduction to online & offline messaging World Wide Web
Browsers Web Publishing Basic Knowledge HTML, XML and Scripts Creation &
Maintenance of websites HTML Tools Multimedia and Graphics Voice Mail and Video
Conferencing Introduction to e-commerce Important Facts Important Questions Asked in
Previous Years Examination with Answer Key
Major Developments in IT........................................................................................................ 259-261
Introduction Important Questions Asked in Previous Years Examinations with Answer Key
Pedagogy..................................................................................................................................... 262-272
Aims and Objectives of Teaching Computer Sciences Hardware and Software of Computers
Micro Teaching Instructional Methods Instructional Aids Latest Trends in Information
Technology Evaluation in Computer Science Important Questions Asked in Previous Years
Examinations with Answer Key
2
Syllabus of RSSB
1. Fundamentals of Computer: Overview of the Computer 12. Pedagogy:
System including input-Output devices, pointing devices UNIT-I: Aims and Objectives of Teaching computer Sciences
and scanner, Representation of Data (Digital versus 1.1 Introduction
Analog, Number System- Decimal, Binary & 1.2 Objectives
1.3 Purpose of Teaching Computer Science
Hexadecimal), Introduction to Data Processing, Concepts
1.4 Aims and Objectives of Teaching Computer Science
of files and its types.
1.5 Need for Teaching Computer Science
2. Data Processing: Word Processing (MS-Word), Spread Sheet 1.6 Bloom's Taxonomy of Educational Objectives
Software (MS Excel), Presentation Software (MS Power Point), 1.7 Computer Science Teaching at Different Levels in Schools
DBMS software (MS Access). 1.8 The Place of Computer Science in School Curriculum
3. Programming Fundamentals: Introduction to C, C++, 1.9 Computer Science Teaching in Relation to Other School
Java, .NET, Artificial Intelligence (AI), Machine learning, Subjects
Python and Block Chain, Principles and Programming UNIT-II: Hardware and Software of Computers
Techniques, Introduction of Object Oriented Programming 2.1 Introduction
(OOPs) concepts, Introduction to "Integrated 2.2 Objectives
Development Environment" and its advantages. 2.3 Definitions Computers
2.4 History of Computers
4. Data structures and Algorithms: Algorithms for Problem
2.5 Types of Computers
Solving, Abstract data types, Arrays as data structures, linked 2.6 Computer Network
list v/s array for storage, stack and stack operations, queues, 2.7 Computer Virus
binary tress, binary search trees, graphs and their 2.8 The Various Uses of Computers
representations sorting and searching, symbol table. Data 2.9 Uses of Computers in Schools
Structure using c & C++. UNIT-III: Micro Teaching
5. Computer Organization and Operation System: Basic 3.1 Introduction
Structure of Computers, Computer Arithmetic Operations, 3.2 Objectives
Central Processing Unit and Instructions, Memory 3.3 Micro Teaching
Organization, I/O organization, Operating Systems Overview, 3.4 Principles of Micro Teaching
Process Management, Finding and processing files. 3.5 Phases of Micro-Teaching
3.6 Teaching Skills
6. Communication and Network Concepts: Introduction to
UNIT-VI: Instructional Methods
Computer Networks, Introduction: Networks layers/
4.1 Introduction
Models, Networking Devices, Fundamentals of Mobile 4.2 Objectives
Communication. 4.3 Unit Plan
7. Network Security: Protecting Computer Systems from 4.4 Lesson Plan Writing in Computer Science
viruses & malicious attacks, Introduction to Firewalls and its 4.5 Methods of Teaching Computer Science
utility, Backup & Restoring data, Networking (LAN & WAN), UNIT V: Instructional Aids
Security, Ethical Hacking. 5.1 Instructional Aids in the Teaching of Computer Science
8. Database Management System: An Overview of the 5.2 Characteristics of Instructional Aids or Audio-Visual Aids
Database Management, Architecture of Database System, 5.3 Instructional Aids Used in Teaching
Relational Database Management System (RDBMS), Database 5.4 Interactive Whiteboard
Design, Manipulating Data, NoSQL Database Technologies, 5.5 PowerPoint Presentation
UNIT VI: Latest Trends In Information Technology
Selecting Right Database.
6.1 Multimedia
9. System Analysis and Design: Introduction, Requirement, 6.2 Desktop Publishing
Gathering and Feasibility Analysis, Structured Analysis, 6.3 Internet
Structured Design, Object-Oriented Modeling Using 6.4 E-Learning
UML, Testing, System Implementation and Maintenance, 6.5 Virtual Learning
Other Software Development Approaches. 6.6 Web-based Learning
10. Internet of things and its application: Introduction of 6.7 Tele-Conferencing
Internet Technology and Protocol, LAN, MAN, WAN, 6.8 Audio Conferencing
Search Services/Engines, Introduction to online & offline 6.9 Video Conferencing
messaging, World Wide View Browsers, Web Publishing, UNIT VII: Evaluation In Computer Science
Basic knowledge HTML, XML and Scripts Creation Y 7.1 Introduction
7.2 Purposes of Evaluation
maintenance of Websites, HTML interactivity Tools,
7.3 Types of Evaluation
Multimedia and Graphics, Voice Mail and Video
7.4 New Scheme of Evaluation
Conferencing, Introduction to e-Commerce.
7.5 Techniques and Tools of Evaluation
11. Major developments in the field of Information 7.6 Achievement Test
Technology. 7.7 Online Examination
3
01.
FUNDAMENTALS OF COMPUTER
Introduction of Computer 2. Input Unit– Input is a unit with the help of which
data or instructions are entered into the computer. It is a
The word computer is derived from the Latin Word link between the computer and the user.
'Compute' which means 'to calculate'. Therefore, the 3. Output Unit– An output unit is a device through
literal meaning of computer is calculator. which type processor or CPU displays the result of a
A computer is an electronic device that receives data written task in the form of output. These output can be in
control through input and displays it as an output by the form of softcopy or hardcopy.
working on it according to the instructions given.
1.1 Structure of Computer– All types of computers Types of Computer
follow the same basic logical structure. Computers are (i) Analog Computer– Analog computers are
made of three basic units. computers that measure physical units (pressure,
1. CPU (Central Processing Unit) temperature etc.) and convert them into numbers. These
2. Input Unit computers measures any quantity on the basis of
3. Output Unit comparison. For example- Thermometer, Voltmeter.
Data is used continuously in analog computers.
(ii) Digital Computer– In this category come those
computer, which calculate the marks. Most of the
computers fall under the category of digital computers.
Digital computers convert data and programs into binary
(0's and 1's) and carry them in electronic form.
(iii) Hybrid Computer– Hybrid computers are
made up of a mixture of analog and digital computers,
hybrid computers are capable of performing the
functions of both computers.

1. CPU (Central Processing Unit)– Processes the


Computer Hardware and Devices
data or instructions entered by the input unit acts Components that can be physically seen or touched
according to the user assigns the result to the output unit are called Hardware.
or stores the given data or instruction in memory. CPU Personal Computer–
also known as Microprocessor.
CPU has three main parts.
(a) ALU (Arithmetic Logic Unit)
(b) Control Unit
(c) Memory Unit
(a) ALU (Arithmetic Logic Unit)– The execution
of the command given to the computer mathematical and
logical operations are done by this unit. Personal computer is a multipurpose computer. It is
Mathematical operations means addition, a type of microcomputer. In 1981 the IBM processor
subtraction, multiplication, division and comparing International Business Machines launched its first
selecting, matching data etc. personal computer under the name of IBM PC. Which
(b) Control Unit– The control unit is called the was the most popular PC at that time.
nervous system of the computer. The control unit Components of personal Computers
controls the operation of all the parts of the computer. It
• System Unit
is responsible for controlling and managing all the units
of the computer and controlling the transfer of data or • Input Device
instructions between the ALU and the memory. • Output Device
(c) Memory Unit– Memory unit is a component of • Memory/Storage Device
the computer system. It is used to store data, instructions System Unit– The system unit also known as a
and information. It is actually a work area of computer 'tower’ or a 'chassis'. It consists of the main components
where the CPU stores data and instructions. This is or internal components of a desktop or personal
known as main internal memory. computer. It includes the motherboard, processor (CPU),

Fundamental of Computer 4 YCT


RAM and other components. A system unit is a set of (vi) VGA Port– Video output using the video
electronic components of a computer. Inside which there graphics port monitor, projector or TV is used to
are many hardware components memory, Hard disk, connect.
power supply, motherboard etc. (vii) Expansion Slots– These are additional slots for
adding new cards such as video cards, audio card,
graphics cards to the motherboard.
(viii) Bays– This is a space inside the computer
case, where a hard drive, floppy drive or CD-ROM drive
is kept.
(ix) Parallel Port– Parallel port consists of two
rows of 25 pins which are surrounded by metal casing. It
(i) Processor– Processor is a hardware component. is also known as printer port.
Which is responsible for all the operations performed in
(x) Ethernet LAN Port– This is a port through
a computer system, most computer users refer to it as the
which the computer is connected to the internet/network
brain of the computer and it is placed on the motherboard
by cable.
by slots.
Its two main components– Input Device
1. Control Unit The devices through which data in inputted, that is
2. Arithmetic Logic Unit the devices from which words, data or instructions are
Process speed is measured in MHz or Gigahertz. put in memory, are called input devices.
(ii) Motherboard– Motherboard is the main circuit Following are some of the major input devices.
board that connects all the hardware components of the
Mouse– It is an input device, it is used in the
computer. It is the main circuit board of the
computer to give instructions to the computer with the
microcomputer. Motherboard consists of special chips
help of graphics. It was invented by Douglas Engelbart.
and integrated circuit (IC) processor, RAM etc.
It usually has two or three buttons. It has left button,
right button and scroll wheel in the middle.
Keyboard– Keyboard is the most important device
of any computer. You can enter text or numerical data in
the computer from the keyboard itself. In a keyboard, all
the letters are arranged in the same order as in a
typewriter but it has more buttons than a typewriter.
Trackball– A trackball is a pointing device similar
to a mouse, but if consists of a ball that is controlled by
(iii) Power Supply (SMPS)– SMPS means rotating the fingers to control the movement of the
Switched Mode Power Supply. It is the power supply of pointer. It neither needs a flat surface nor does it need to
the computer, which gives electricity to the electronics be moved around like a mouse.
components of the computer according to them. Scanner– The scanner is used to convert the image
written or printed on the paper into digital form and store
it in the memory/disc of the computer and for editing.
There are three types of scanners available :
1. Flat Bed Scanner
2. Hand Held Scanner
3. Drum Scanner
Joystick– Joystick is an input device. It is a pointing
1. SMPS converts a higher AC power into a lower
device. It moves in all directions. It is used in flight
voltage DC power.
simulators, computer gaming systems. It consists of a
2. Different electronic components present inside the
computer require different amount of electric power. stick, which rotates on a base and reports its angle and
SMPS provides electricity to each part according to direction to the CPU.
its requirement. Light Pen– Light pen is an electro-optical pointing
(iv) Power Connector– Connects the power cable input device. Uses a photosensitive detector to select
to the computer. objects on the display screen.
(v) USB Port– It allows to connect pen drive, mouse Web Camera– This is a digital camera, which is
or keyboard or other external hardware device to the connected with the computer. Web camera are used for
computer. online videos conferencing and chatting.
Fundamental of Computer 5 YCT
Digitizer– Digitizer is an input device that converts Memory/Storage Device
analog information into digital form. Digitizer is also
known as graphics tablet. It is specially used for The function of computer memory/storage device is
designing images, animations and graphics. It consists of to store any instruction, information or result.
a pen and a pad. Computer memory are two types.
Microphone– It is an input device that inputs sound, 1. Primary or Main Memory
which is then stored in digital form. 2. Secondary Memory
Magnetic Ink Character Recognition (MICR)– 1. Primary or Main Memory– Primary memory is
Examines MICR information in the form of a matrix. It the memory that is directly accessed by the CPU. In this
is used in banks to identify the code number and the the data can't be stored for a long time as desired by the
check number printed on the check with a magnetic ink. user, it is also known as internal memory. It contains the
currently running data or instructions. There are two
Bar Code Reader (BCR)– A bar code reader is an
types of primary memory.
input device used to read bar codes (data in the form of
1. RAM (Random Access Memory)
light and drak lines) printed on a paper product.
2. ROM (Read Only Memory)
Optical Character Reader (OCR)– OCR is an
input device. Its use converts the image of hand written 1. RAM (Random Access Memory)– RAM is a
and typed or printed text into digital form. temporary memory, which means the memory that holds
only those data or instructions for some time on which
Optical Mark Reader (OMR)– OMR is an input
the computer is currently working.
device which is used for recognize (select one among
Types of RAM Memory
some options) symbols made by pen or pencil.
(a) SRAM (Static RAM)
Output Device (b) DRAM (Dynamic RAM)
An output device is a device through which the 2. ROM (Read Only Memory)– The full name of
result of the work done by the CPU (processor) is ROM is Read Only Memory. Which means that memory
obtained in the form of output such as monitor, printer can only be read but no data store. Data in this memory
etc. is only a single store. Again it can not delete or store it.
Monitor– Monitor is an output device which Types of ROM Memory :
displays the result of the input as output on the screen. (a) PROM (Programmable Read Only Memory)
(i) CRT Monitor (Cathode Ray Tube) (c) EPROM (Erasable Programmable Read Only
(ii) Flat Panel Screen Monitor LCD (Liquid Crystal Memory)
Display), LED (Light Emitting Diode) & TFT (Thin (a) EEPROM (Electrically Erasable Programmable
Film Transistor) Read Only Memory)
Printer– Printer is an output device, it uses the 2. Secondary Memory– The secondary memory is
results received from the computer as a output by also known as external memory or Auxiliary storage. We
printing on a paper. can keep the data from the secondary memory to keep it
(i) Impact Printer– This printer paper, ribbon and for a long time. Before closing the computer the data can
character prints data together on all three. be placed permanently in secondary memory.
(ii) Non-Impact Printer– This printer is a noise free Magnetic Tape– Magnetic tape is made up of a thin
printer, it does not hit paper, but leaves the splash of the and long plastic strip. The magnetic layer which is
ink on paper. They use electrostatic chemicals. climbed and the data is saved on that layer. This is a
Plotter– This is an output device, which is used in gradual access memory. Whose data can be read only by
large drawing or pictures such as construction plant Auto order. In this the data can be stored more than once upon
CAD. To make drawing, the pen, pencil, marker etc. Is the data store the old data ends itself.
the use of writing tool. It provides output such as graphs Magnetic Disk– Magnetic Disk is a secondary
and sketches. storage device, which is used to store data, Access data.
Speakers– This is an output device that is connected This is a permanent (non-volatile) and assistant.
to the computer and tells the sound as the output through Secondary storage device, which stores data and program
the speaker. longer.
Projector– A projector is an output device that Hard Disk Drive (HDD)– Hard disk this magnetic
enables the user to project output into a large surface disk is a main component of the personal computer. It is
such as a large screen or a wall. It is connected to the known as hand drive or hand disk drive. It is a permanent
computer and uses light and lens to show text, pictures, (non-volatile) and auxiliary, secondary storage device,
videos. It is used for presentation. which store data and programs for a long time.
Speech Synthesizer– Speech Synthesizer is a output Floppy Disk– Floppy disk is a magnetic storage
device, by which text message is converted into voice used to read and write data in Floppy disk. Earlier it was
massage and received as output. used to store the operating system.
Fundamental of Computer 6 YCT
Optical Disc– Optical disc is a type of direct access Different between Analog and Digital Signal–
secondary memory. Optical disc are made of Analog Signal Digital Signal
polycarbonate plastic and they used laser beams to store
1. Analog signals are Digital signals are not
or read data. It is usually flat and rounded.
continuous signals. continuous they are
Some example in below. discrete signals.
(i) CD (Compact Disc)
2. We can represent We can represent
(ii) DVD (Digital Versatile Disc) analog signals in the digital signals in the
(iii) Blue-Ray Disc form of sign waves. form of waves.
Pen Drive– Pen drive is also called thumb drive, 3. The values of voltage The values of voltage
flash drive or USB drive. Pen drive is an example of will be in a continuous will be discontinuous.
EEPROM (Electrically Erasable Programmable Read range.
Only Memory)
4. These signals are used Digital electronic
Memory Card– Memory card is a device that
in analog devices. devices like computers,
provides a fast and easy way to store and transfer digital Smartphone, smart
files. It is small card like- electronic memory device of a watches etc. use these
thin size, which is used to another modern devices such signals.
as mobile phones digital cameras, PDA, Palmtops,
5. Any natural sound, Electronic signals,
Smartphone's etc. It is also called multimedia card. Its
human voice, data read computer signals, data
use is becoming popular as Removable Storage Device.
by analog devices. read by digital devices.
Solid State Drive (SSD)– SSD is a type of
secondary storage. It is faster and more expensive than Number system
HDD. Flash Memory has been used in this. With its use, Introduction- Every number system has a set of
the speed of the computer increases slightly. Like HDD, unique characters or literals. The count of these literals is
you can also store data in if for a long time as desired. called the radix or base of the number system. Number
Memory Units or Measure– systems are also called positional number system
1 Byte = 8 bit = 2 Nibble because the value of each symbol (digit and alphabet) in
1 KB = 1024 Byte = 8192 Bits a number depends upon its position within the number.
1 MB = 1024 KB Number may also have a fractional part similar to
decimal numbers used by us.
1 GB = 1024 MB
A computer is a digital system that stores and
1 TB = 1024 GB processes different types of data in the form of 0s and 1s.
1 PB = 1024 TB The different types of data handled by a computer system
1 EB = 1024 PB include numbers, alphabets and some special characters.
1 ZB = 1024 EB Therefore, there is a need to change the data entered by
1 YB = 1024 ZB the users into a form that the computer system can
(TB = Terrabyte, PB = Petabyte, EB = Exabyte, ZB = understand and process. different types of codes have
Zettabyte, YB = Yottabyte) been developed and used to represent the data entered by
the users in the binary format. The binary system represents
Representation of Data each type of data in terms of binary digits, 0s and 1s. Since
these code convert the data into the binary form, the
Data representation refers to the form in which data
computer codes are also referred as binary codes.
is stored, processed and transmitted. Information, such as
The different number systems, which come under.
text, numbers, photo or music into digital data that can
The category of positional number system are as follows.
be manipulated by electronic devices.
1. Decimal system
Digital Signal– A digital signal represents the
2. Binary system
original time varying quantity as a sampled sequence of
quantized values. This imposes some bandwidth and 3. Octal system
dynamic range constraints on the representation but, 4. Hexadecimal system.
unlike the analog signal, can avoid further electronic 1. Decimal System– The decimal system is the most
noise and distortion. common number system used by human beings. It is a
positional number system that uses 10 as a base to
Analog Signal– An analog signal is any continuous represent different values. Therefore, this number system
signal for which the time varying feature of the signal is also known as base 10 number system. In this system,
represents some other time varying quantity i.e. 10 symbols are available for representing the value.
analogous to another time varying signal. For example- These symbols include the digits from 0 to 9. The
in an analog audio signal the instantaneous voltage of the common operations performed in the decimal system are
signal varies continuously with the pressure of the sound addition (+), subtraction (-), multiplication (x), and
waves. division (/)
Fundamental of Computer 7 YCT
The decimal system can be used to represent both Terrabyte 1024 GB
the integer as well as floating point values. The floating (TB)
point values are generally represented in this system by Petabyte (PB) 1024 TB
using a period called decimal point. The decimal point is
Exabyte (EB) 1024 PB
used to separate the integer part and the fraction part of
the given floating point number. In the following Zettabyte (ZB) 1024 EB
example, the value 237 which comes before the decimal Yottabyte 1024 ZB
point, is called integer value and the value 25, which (YB)
comes after the decimal point, is called fraction value. 3. Octal system– The octal system is the positional
number system that used base-8 to represent different
values. Therefore, this number system is also known as
base-8 system. As this system uses base-8, eight symbols
are a available for representing the value in this system.
These symbols are the digits 0 to 7. In octal system, the
point used to separate the integer and the fraction part of
2. Binary System– Among all the positional number a number is known as octal point. In the following
system, the binary system is the most dominant number example, The octal number 215.43 represents the
system that is employed by almost all the modern digital decimal value 141.5469.
computer system. The binary system uses base-2 to
represent different value. Therefore, the binary system is
also known as base-2 system. As this system used base-
2, only two symbols are available for representing the
different values in this system. These symbols are 0 and The following lists the octal representation of decimal
1, which are also known as bits in computer terminology. numbers 0 through 15.
Using binary system, the computer systems can store and Decimal number Octal representation
process each type of data in terms of 0s and 1s only.
0 0
In binary system, the point use to separate the
1 1
integer and the fraction part of a number is known as
binary point. In the following example, the binary 2 2
number 11001.101 represents the decimal value 25. 625. 3 3
4 4
5 5
6 6
7 7
⇒ The following are some of the technical terms used in
binary system. 8 10
Technical Used in Binary System. 9 11
terms 10 12
11 13
Bit It is the smallest unit of information 12 14
used in a computer system.
13 15
It can either have the value 0 or 1.
14 16
Derived from the words 'Binary
digit'. 15 17
Nibble It is a combination of 4 bits. 4. Hexadecimal system– The hexadecimal system is a
positional number system that uses base-16 to represent
Byte It is combination of 8 bits.
different values. Therefore, this number system is known
Derived from words 'by eight'. as base-16 system. As this system uses base-16, 16
Word It is a combination of 16 bits. symbols are available for representing the value in this
Double word. It is a combination of 32 bits. system. These symbols are the digits 0-9 and the letters
Kilobyte (KB) It is used to represent the 1024 bytes A, B, C, D, E and F. The digits 0-9 are used to represent
of information. the decimal value 0 through 9 and The letters A, B, C, D,
E and F are used to represent the decimal value 10
Megabyte 1024 KB through 15. In hexadecimal system, the point used to
(MB) separate the integer and the fraction part of a number is
Gigabyte (GB) 1024 MB known as hexadecimal point. In the following example,

Fundamental of Computer 8 YCT


the hexadecimal number 4A9.2B represents the decimal the decimal number by 2 till the decimal number
value 1193.1679. becomes zero and then reading the remainders from last
to first to obtain the binary equivalent of the given
decimal number.
Let us now convert a decimal value to its binary
representation and verify that the binary equivalent of
The following Lists shows decimal and binary equivalent (65)10 is (1000001)2.
of 16 alphanumeric symbols used in hexadecimal
number system.
Decimal Hexadecimal 4-bit Binary
Number Symbol Number
0 0 0000
1 1 0001
2 2 0010
3 3 0011
4 4 0100
5 5 0101
6 6 0110
7 7 0111 (ii) Decimal to Octal Conversion– The decimal
8 8 1000 to octal conversion is performed by repeatedly dividing
9 9 1001 the decimal number by 8 till the decimal number
becomes zero and reading the remainders. from last to
10 A 1010
first to obtain the octal equivalent of the given decimal
11 B 1011 number. The following example illustrate the method of
12 C 1100 converting decimal number 98 into its equivalent octal
13 D 1101 number.
14 E 1110
15 F 1111

Conversion of Numbers
The computer systems accept the data in decimal
form, whereas they store and process the data in binary
form. Therefore, it becomes necessary to convert the
number represented in one system into the numbers
represented in another system. The different types of (iii) Decimal to Hexadecimal Conversion– The
number system conversions can be divided into the decimal to hexadecimal conversion is performed by
following major categories. repeatedly dividing the decimal number by 16 till the
1. Decimal to Non-decimal decimal number becomes zero and reading the
2. Non-decimal to Decimal remainders from last to first to obtain the hexadecimal
3. Binary to Octal equivalent of the given decimal number. The following
4. Binary to Hexadecimal example illustrate the method of converting decimal
5. Octal to Hexadecimal number to its hexadecimal equivalent.
1. Decimal to Non-decimal– The decimal to non-
decimal (binary, octal or hexadecimal), conversions use
the step given below.
Step 1: Divide the given number by the base value
of the number system in which it is to be converted.
Step 2 : Note the remainder.
Step 3: Keep on dividing the quotient by the base
value and note the remainder till the quotient is Zero.
Step 4 : Write the noted remainders in the reverse 2. Non-decimal to Decimal– The non-decimal to
order (from bottom to top). decimal conversions can be implemented by taking the
(i) Decimal to Binary conversion– The decimal to concept of place values not consideration we can use the
binary conversion is performed by repeatedly dividing following steps to convert the given number with base
Fundamental of Computer 9 YCT
value to its decimal equivalent, where base value can be number of 0s on most significant position of the binary
2, 8 and 16 for binary, octal and hexadecimal number number
system, respectively. Example – Convert (10101100)2 to octal number.
Step 1 : Write the position number for each Make group of 3-bits of the
alphanumeric symbol in the given number. given binary number (Right to Left) 010 101
Step 2 : Get positional value for each symbol by 100
raising its position number to the base value symbol in Write octal number for each 3- bit group. 2 5
the given number. 4
Step 3 : Multiply each digit with the respective Therefore, (10101100)2 = (254)8
positional value to get a decimal value. (ii) Octal Number to Binary Number– Each octal
Step 4 : Add all these decimal values to get the digit is an encoding for a 3-digit binary number. Octal
equivalent decimal number. number is converted to binary by replacing each octal
(i) Binary Number to Decimal Number digit by a group of three binary digits.
Conversion– A binary number can be converted to Example– Convert (705)8 to binary number.
equivalent decimal number by calculating the sum of the Octal digit → 7 0 5
products of each bit multiplied by its corresponding Write 3-bits binary
place value. The following example illustrate the method
value for each digit → 111 000 101
of converting binary number (1101)2 to decimal number.
Therefore, (705)8 = (111000101)2
Digit→ 1 1 0 1
4 Conversion from Binary Number to
Positional value→ 23 22 21 2º
Hexadecimal Number and Vice-versa–
Decimal Number→ 1× 23 + 1×22 + 0×21 + 1× 2º
(i) Binary Number to Hexadecimal Number–
8 + 4 + 0 + 1 = (13)10 Given a binary number, its equivalent hexadecimal
Therefore, (1101)2 = (13)10 number is computed by making a group of 4 binary
(ii) Octal Number to Decimal Number digits from right to left and substituting each 4-bit group
Conversion– An octal number can be converted into its by its corresponding computed by making a group of 4
equivalent number in decimal system by calculating the binary digits from right to left and substituting each 4-bit
sum of the products of each digit multiplied by its group by its corresponding hexadecimal alphanumeric
corresponding place value. The following example symbol. If required, add 0 bit on to have number of bit in
shows how to compute the decimal equivalent of an octal a binary number as multiple of 4.
number (257)8. Example– Convert (0110101100)2 to hexadecimal
Digit→ 2 5 7 number.
Positional value→ 82 81 80 Make group of 4-bits of
Decimal Number→ 2× 82 + 5×81 + 7×80 the given binary number (Right to left)
128 + 40 + 7 = (175)10 → 0001 1010 1100
Therefore, (257)8 = (175)10 Write hexadecimal symbol for each group
(iii) Hexadecimal Number to Decimal Number → 1 A C
Conversion– A hexadecimal number can be converted Therefore, (0110101100)2 = (1AC)16
into its equivalent number in decimal system by (ii) Hexadecimal Number to Binary Number–
calculating the sum of the products of each symbol Each hexadecimal symbol is an encoding for a 4-digit
multiplied by its corresponding place value. The binary number. Hence, the binary equivalent of a
following example shows how to compute the decimal hexadecimal number is obtained by substituting 4-bit
equivalent of an Hexadecimal (3A5)16. binary equivalent of each hexadecimal digit and
Digit→ 3 A 5 combining them together.
Positional value→ 162 161 16º Example. Convert (23D)16 to binary number.
2
Decimal Number→ 3× 16 +10×16 + 5×160
1
Hexadecimal digits→ 2 3 D
768 + 160 + 5 = (933)10 Write 4-bit binary for each digit→ 0010 0011 1101
Therefore, (3A5)16 = (933)10 Therefore, (23D)16 = (001000111101)2
3. Conversion from Binary Number to Octal 5. Conversion from Octal Number to
Number and Vice-versa– Hexadecimal Number– The given octal number can be
(i) Binary Number to Octal Number- Given a converted into its equivalent hexadecimal number in two
binary number, an equivalent octal number different steps. Firstly, We need to convert the given
representation by 3 bits is computed by grouping 3 bits octal number into its binary equivalent. After obtaining
from right to left and replacing each 3-bit group by the the binary equivalent, we need to making a group of 4
corresponding octal digit. In case number of bits in a binary digits from right to left and substituting each 4-bit
binary number is not multiple of 3, then add required, group by its corresponding hexadecimal alphanumeric
Fundamental of Computer 10 YCT
symbol. In this type of conversion, we need to represent (ii) Fractional Part of Decimal Number to Octal
each digit in the octal number to its equivalent 3-bit Number.
binary number.
Example– Convert the octal number (365)8 into its
hexadecimal number.
Octal digits→ 3 6 5
Write 3-bits binary value Since the fractional part is 0, the multiplication is
for each digit→ 011 110 stopped, write the integer part from top to bottom to get
101 octal number for the fractional part .
Regrouping into 4-bits of Therefore, (0.625)10 = (0.50)8
the binary number (Right to Left) → (iii) Fractional Part of Decimal Number to
0000 1111 0101 Hexadecimal Number.
Write hexadecimal symbol Example– Convert (0.675)10 to hexadecimal form.
for each group→ 0 F 5
Therefore, (365)8 = (F5)16
Conversion of a Number with Fractional
Part. Since the fractional part (.800) is repeating, the
Decimal Number with Fractional Part to multiplication is stopped, Write the integer part from top
Another– to bottom to get hexadecimal equivalent for the
Number system– To convert the fractional part of a fractional part.
decimal number to another number system with base
Therefore, (0.675)10 = (0.AC)16
value, repeatedly multiply the fractional part by the base
Non-decimal Number with Fractional Part to
value till the fractional part becomes 0. Use integer part
Decimal Number System– Computer positional value
from top to bottom to get equivalent number in that
number system. The fractional part does not become 0 in of each digit in the given number using its base value,
successive multiplication, then stop after, 10 Add the product for positional value and the digit to get
multiplications. In some cases, fractional part may start the equivalent decimal number with fractional part.
repeating then stop further calculation. (i) Fractional Part of Binary Number to Decimal
(i) Fractional Part of Decimal Number to Binary Number.
Number. Convert (0.111)2 into decimal number.
Example. Convert decimal number (0.25)10 to Digit→ 0 1 1 1
–1
binary. Fractional value→ 0 2 2–2 2–3
–1 –2 –3
Decimal value→ 1×2 + 1× + 1×2
0.25×2 = 0.50 0.5 + 0.25 + 0.125 = 0.875
0.50×2 = 1.00 Therefore, (0.111)2 = (0.875)10
Since the fractional part is 0, the multiplication is (ii) Fractional Part of Octal Number to Decimal
stopped. Write the integer part from top to bottom to get
Number.
binary number for the fractional part.
Convert (0.12)8 into decimal number.
Therefore, (0.25)10 = (0.01)2
Digit→ 0. 1 2
Example– Convert (0.675)10 to binary.
Fractional value→ 0. 8–1 8–2
–1 –2
Decimal value→ 1×8 + 2×8
0.125 + 0.03125 = 0.15625
Therefore, (0.12)8 = (0.15625)10
(iii) Fractional Part of Hexadecimal Number to
Decimal Number
Convert (0.58)16 into decimal number.
Digit→ 0. 5 8
Since the fractional part (400) is the repeating value
Fractional value→ 16–1 16–2
in the calculation, the multiplication is stepped, write the
integer part from top to bottom to get binary number for Decimal value→ 5×16–1 + 8×16–2
the fractional part. 0.3125 + 0.03125 =0.34375
Therefore, (0.675) = (0.1010110)2 Therefore, (0.58) 16 = (0.34375) 10

Fundamental of Computer 11 YCT


Fractional Binary Number to Octal or Therefore, The 8421 BCD representation of decimal
Hexadecimal Number- To convert the fractional binary number (87.34)10 is (1000 0111.0011 0100)2.
number into octal or hexadecimal value, substitute Excess-3 BCD Code– The Excess-3 (XS-3) BCD
groups of 3-bit or 4-bit for integer part by the code does not use the principle of positional weights into
corresponding digit, similarly, make groups of 3-bit or 4- consideration while converting the decimal numbers to
bit for fractional part starting from left to right, and 4-bit BCD system. Therefore, we can say that this code
substitute each group by its equivalent digit or symbol in is a non-weighted BCD code. The function of XS-3 code
octal or hexadecimal number system, Add 0s at the end is to transform the decimal numbers into their
of the fractional part to make a perfect group of 3 or 4 corresponding 4-bit BCD code, In this code, the decimal
bits. number is transformed to the 4-bit BCD code by first
Example– Convert (10101100.01011)2 to octal adding 3 to all the digits of the number and then
number. converting the excess digits, so obtained, into their
Make perfect group of 3-bits→ corresponding 8421 BCD code. Therefore, we can say
010 101 100 . 010 110 that the XS-3 code is strongly related with 8421 BCD
Write octal symbol for each group → code in its functioning.
2 5 4 . 2 6 Example– Convert the decimal number 85 to XS-3
BCD code.
Therefore, (10101100.01011)2 = (254.26)8
Note– Make 3-bit groups from right to left for the ⇒ The given decimal number is 85. Now, add 3 to
integer part and left to right for the fractional part. each digit of the given decimal number as–
Example– Convert (10101100.010111)2 to 8 + 3 = 11
hexadecimal number. 5+3=8
make perfect group of 4-bits→ The corresponding 4-bit 8421 BCD representation of
the decimal digit–
1010 1100 . 0101 1100
Write hexadecimal symbol for each group→
A C. 5 C
Therefore, (10101100.010111)2 = (AC.5C)16
Binary Coded Decimal (BCD) Systems– The BCD Therefore, the XS-3 BCD representation of the
system is employed by computer systems to encode the decimal number 85 is 1011 1000.
decimal number into its equivalent binary number. This ASCII Code– ASCII, abbreviated form American
is generally accomplished by encoding each digit of the Standard Code for Information Interchange, is a
decimal number into its equivalent binary sequence. The character encoding standard for electronic
4-bit BCD system is usually employed by the computer communication. The ASCII codes represent text in
systems to represent and process numerical data only. In computers, telecommunications equipment, and other
the 4-bit BCD system each digit of the decimal number devices. The ASCII code is pronounced as ASKEE and
is encoded to its corresponding 4-bit binary sequence. is used for the same purpose for which the EBCDIC code
The two most popular 4-bit BCD systems are- is used. Initially, this code was declared as a 7-bit BCD
• Weighted 4-bit BCD code code to handle 128 characters but later it was modified to
• Excess -3 (XS - 3 BCD) code an 8-bit code we can check the value of any ASCII code
Weighted 4-bit BCD Code– The weighted 4-bit by just holding down the Alt key and Typing the ASCII
BCD code is more commonly known as 8421 weighted code. For example, when we hold down the alt key and
code. It is called weighted code because it encodes the type 66 form the keyboard, then the character B appears
decimal system into binary system by using the concept on the screen. This shows that the ASCII decimal code
of positional weighting into consideration. In this code, 66 represents the character B.
each decimal digit is encoded into its 4-bit binary Characters Decimal Hexadecimal
number in which the bits from left to right have the representation representation
weights 8, 4, 2 and 1 respectively. NUL 0 0
Example– Convert the decimal number (87.34)10 to SOH 1 1
weighted BCD code.
STX 2 2
The given decimal number is 87.34
The corresponding 4-bit 8421 BCD representation of ETX 3 3
decimal digit EOT 4 4
ENQ 5 5
ACK 6 6
BEL 7 7
BS 8 8
Fundamental of Computer 12 YCT
HT 9 9 2. Scientific Data Processing– Data processing in
CAN 24 18 scientific and engineering problems is termed as
scientific data processing. Basically, it is the application
SUB 26 1A
of computer simulation and other forms of computation
ESC 27 1B
to problems in various scientific disciplines. It is
RS 30 1E characterized by relatively little input and output but
US 31 1F extensive internal computation. It emphasize on high
! 33 21 speed internal processing but may have limited input and
# 35 23 output capabilities.
$ 36 24 Real Time Data Processing– There are many types
% 37 25 of large applications that may require the real time data
processing. In this the result is presented at the same time
& 38 26
when the data enter. We can easily analyze this type of
* 42 2A data processing in the stock market and currency trends.
+ 43 2B The technology which mostly used in real time data
/ 47 2F processing is stream processing.
0-9 48 - 57 30 - 39 Advantages of Data Processing–
< 60 3C • Highly efficient
= 61 3D • Time saving
> 62 3E • High speed
? 63 3F • Reduces errors
A-I 65 - 73 41 - 49 Disadvantages of Data Processing–
J-O 74 - 79 4A - 4F • Large Power Consumption
P-Z 80 - 90 50 - 5A • Occupies Large Memory
a-i 97 - 105 61 - 69 • The Cost of Installations is High
j-o 106 -111 6A - 6F • Wastage of Memory
p-z 112 - 122 70 - 7A Data Processing Files and Types
Introduction to Data Processing A data file is a computer file which stores data to be
Data processing means to process the data i.e. to used by a computer application or system, including
convert its format. As we all know data is the very useful input and output data. A data file usually does not
and when it is well presented and it becomes informative contain instructions or code to be executed (that is, a
useful. Data processing system is also referred as computer program)
information system. It is also right to say that data There are numerous types of files used for storing
processing becomes the process of converting data needed for processing reference or back up. The
information into data and also vice-versa. main common types of processing files include.
Data → Process → Information 1. Master Files
In simple words, data processing can be expressed as. 2. Transaction File
• Process of conversion of data in the computer 3. Reference
understandable format. 4. Back-up
• The sorting or processing of data by a computer. 5. Report
Types of Data Processing– Data processing is 6. Sort File
broadly divides into two categories, Business, Scientific 1. Master Files– A master file is the main that
and Real time data processing. These are explained as contains relatively permanent record about particular
following below. items or entries. For example a customer file will contain
1. Business Data Processing– The process of data details of a customer such as customer id, name and
in the accounting or business management referred as
contact address.
business or administrative data processing. In this type of
data processing, data is usually in the numeric form. It 2. Transaction Files– A transaction file is used to
refers to the all the computing functions that occur in an hold data during transaction processing the file is later
enterprise. The computer that is oriented towards used to update the master file and audit daily, weekly or
business data processing will demand for high speed monthly transactions. For example in a busy
input and output so that conversion of stored data into supermarket, daily sales are recorded on a transaction file
report format can occur easily. and later used to update the stock file.
Fundamental of Computer 13 YCT
3. Reference File– A reference file is mainly use for • To produce high quality graphics in color you would
reference or look-up purposes. Look-up information is use plotter.
the information that is stored in a separate file but is • A dumb terminal has a keyboard and screen.
required during processing. For example in a point of
• The output quality of a printer is measured by dot
sale terminal, the item code entered either manually or
per inch.
using a barcode reader looks up the item description and
price from a reference file stored on a storage device. • Bit manipulation is changing of single bits or small
groups of his within word.
4. Backup Files– A backup files is used to hold
copies of data or information from the computers fixed • Tracks and sectors organized by Floppy disk.
storage (Hard disk).Since a file held on the Hard disk • Secondary storage media, input media, output media
may be corrupted lost or changed accidentally, it is is serve as magnetic tape.
necessary to keep copies of the recently updated files. In • Name of pointing device are Mouse, Touchpad,
case of the Hard disk failure, a backup file can be used to Trackball, Pointing sticks, Light pen, Graphics
reconstruct the original file. Tablet and Joystick.
5. Report Files– Used to store relatively permanent • The first super computer is Param 8000 in India.
records extracted from the master file or generated after • ROM is permanent memory in computer.
processing. For example you may obtain a stock levels
• Characteristic of RAM is Faster, Expensive, High
report generated from an inventory system while a copy
Power Consumption.
of the report will be stored in the report file.
6. Sort File– It stores data which is arranged in a • Part of the CPU is ALU, CU and Memory Unit.
particular order, used mainly where data is to be • The console monitors computer processing.
processed sequentially. In sequential processing data or • ALU is responsible for performing mathematical
records are first sorted and held on a magnetic tape operations in CPU.
before updating the master file. • Joy stick primarily used for computer gaming.
Important Facts • BCD is sort form of Binary Coded Decimal.
• Name of the father of computer Mouse is Douglas
• The first computer installed in India is, Indian
Engelbart.
Statistical Institute Kolkata.
• CPU and memory located in Motherboard.
• The first Mini Computer was PDP-8.
• Megabyte is approximately a million bytes.
• Cache memory has the shortest access time.
• Technology used to provide internet by transmitting • A normal CD-ROM usually can store up to 680 MB
data over wires of telephone network is digital data.
subscriber line. • The common name for the crime stealing password
• Scanner convert a physical image into digital image. is spoofing.
• ASCII is a sort form of American Standard Code for • Hardware is the part of a computer that one can
Information Interchange. touch and feel.
• Characteristic of the modern digital computer is • Executing is the process of carrying out commands.
High speed, Large storage capacity, Greater • Mini computers are also called midrange computer.
accuracy. • Analog computer works on the supply of continuous
• Sequential access storage device is magnetic tape. electrical pulses.
• Computer understandable language is Binary (0 & • Minicomputer was first released in 1960.
1). • Light pen is containing sensors send signals to
• Computer language written in binary code machine computer whenever light changes are detected.
language. • 35300 is the 8th complement of an octal number
• The speech signal is obtained after analog/digital 42500.
converter. • The first electronic digital computer was built in
• Telegram signal is digital signal. university of Pennsylvania USA.
• DTFT is the representation of Aperiodic Discrete • The ASCII code for CR (Carriage Return) in octal is
Time Signals. 15.
• Characteristic of the power signal is infinite energy. • With respect to the first digital electronic computer
• Computer speed is measured in Gigahertz (GHz). full form of ABC is Atanasoff-Berry computer.
• The ALU of a computer responds to the commands • The ASCII code for the LF (Line Feed) in
coming from control section. hexadecimal is 0A.

Fundamental of Computer 14 YCT


Important Questions Asked in Previous Years Examinations
1. The main parts of computer are 13. Which of the following devices is used to
(a) 6 (b) 7 recognize a pre-specified type of mark by
(c) 8 (d) 9 pencil or pen?
(UPSSSC JE-2016) (a) Bar-Code Reader (b) OCR
2. The main purpose of software is to convert data (c) Scanner (d) OMR
into (UPSSSC JE-2016)
(a) Website (b) Information 14. Screen or Monitor Devices is
(c) Program (d) Object (a) Hard copy (b) Soft copy
UPSSSC JE-2015 (c) Input devices (d) Display devices
3. Which of the following control memory, input (UPSSSC JE-2016)
and output devices? 15. Permanent Memory of a computer is known as-
(a) C.P.U. (b) A.L.U. (a) RAM (b) CD-ROM
(c) C.U. (d) Memory (c) ROM (d) CPU
(UPSSSC JE-2016) (UPSSSC VDO-2016)
4. High power micro processors are 16. Full name of EPROM is
(a) Pantium, Pantium pro (a) Erasable Programmable Read Only Memory
(b) Pantium II and III (b) Electronic Programmable Read Only Memory
(c) Pantium II (c) Both (a) and (b)
(d) all of these (d) All of these
(UPSSSC JE-2016) (UPSSSC JE-2016)
5. Where was the first computer in India installed?
17. Which of the following memories has the
(a) Tata Institute of Fundamental Research,
Mumbai shortest access time?
(b) Indian Statistical Institute, Kolkata (a) Cache Memory
(c) Compunational Research Laboratory (CRL), (b) Magnetic Bubble Memory
Pune (c) Magnetic Core Memory
(d) Indian Railway, New Delhi (d) Random Access Memory
(UPSSSC Sugarcane Sup.-2016) UPSSSC JE-2015
6. First mini computer was 18. Technology used to provide internet by
(a) PDP-8 (b) ENIAC transmitting data over wires of telephone
(c) UNISAC (d) EDVAC network is?
(UPSSSC JE-2016) (a) Transmitter
7. What name has been given to the first super (b) Diodes
computer made in India? (c) Uniform Resource Locator
(a) Akash (b) Param (d) Digital Subscriber Line
(c) Arjun (d) Siddharh (UPSSSC Revenue Ins. 2016)
UPSSSC JE-2015 19. ISDN is a telecommunication technology where
8. Name of super computer is (a) Voice, video and data all are transmitted
(a) CRAY-2 (b) CRAY XMP-24 simultaneously
(c) Tianhe-2 (d) All of above (b) Only sound is transmitted
(UPSSSC JE-2016) (c) Only video is transmitted
9. Example of input devices is (d) Only data is transmitted
(a) Mouse (b) Joystick (UPSSSC Sugarcane Sup.-2016)
(c) Trackball (d) all of these 20. The device that converts a physical image into
(UPSSSC JE-2016) a digital one is called:
10. Type of keyboard is (a) Scanner (b) Image Converter
(a) Serial keyboard (b) Parallel keyboard (c) Printer (d) Recorder
(c) Both (a) and (b) (d) None of these UPPCL Stenographer Exam-18.02.2018
(UPSSSC JE-2016) 21. Which of the following is an input device?
11. How many keys are there on keyboard for (a) Mouse (b) Keyboard
alphabet? (c) Scanner (d) All of these
(a) 24 (b) 25 UPPCL TG-2 26.06.2016
(c) 26 (d) 27 22. Which among the following input devices
UPSSSC JE-2015 consists of a stick which pivots on a base and
12. Computer Mouse is this kind of Device? reports its angle or direction of the CPU?
(a) Input (b) Output (a) Microphone (b) Light pen
(c) Software (d) Storage (c) Keyboard (d) Joystick
(UPSSSC JE 2015) UPPCL JE 2019 (Batch-02)
Fundamental of Computer 15 YCT
23. Touchpad is a good alternative to the mouse, it 33. Which of the following was the first pure
is an example of ______ electronic programmable computer developed
(a) Software device (b) Printing device in the year 1944/1945?
(c) Pointing device (d) Temporary device (a) MARK1 (b) ENIAC
UPPCL TG2 11-11-2016 (c) Colossus (d) EDVAC
24. The technology of scanning that recognized 34. Which of the following unit is a part of the
handwritten text and printed text is. CPU?
(a) MICR (b) OMR (a) ALU (b) CU
(c) OCR (d) BCR (c) Memory Unit (d) All of the above
UPPCL-JE 31-01-2019 (Batch -01) 35. What is the full form of RAM?
25. The technology of scanning that reads the (a) Dynamic Remote Access Memory
check boxes contained inside a predefined (b) Random Access Memory
space is (c) Remote Access Memory
(a) BCR (b) OCR (d) Remote Access Memory
(c) OMR (d) MICR 36. Which of the following is not considered
UPPCL JE 2019 (Batch-02) hardware?
26. Which of the following input devices utilizes a (a) Operating system (b) CPU
light sensitive detector to select an object on a (c) Keyboard (d) Hard disk
display screen? 37. Which of the following is exclusively a
(a) OMR (b) Light pen sequential access storage device?
(c) Scanner (d) Printer (a) Hard disk (b) Floppy disk
UPPCL JE 2019 (Batch-01) (c) Magnetic tape (d) DVD
27. Which input device converts analog
38. What is the full form of SRAM?
information into digital form and can be used
(a) Static Random Access Memory
for doing fine works of drawing and image
(b) Static Remote Access Memory
manipulation?
(a) Microphone (b) Bar Code Reader (c) Setup Random Access Memory
(c) Digitizer (d) Graphic Plotter (d) Setup Remote Access Memory
UPPCL JE 2019 (Batch-02) 39. Which of the following is not a form data
28. Full form of ASCII is storage media?
(a) American Scientific code for Interchange of (a) A database (b) Magnetic tape
Information (c) Magnetic disk (d) Optical disc
(b) American Scientific code for Information 40. Which of the following language does the
Interchange computer understand?
(c) American Standard code for Information (a) Computer understands only C language
Interchange (b) Computer understands only Assembly
(d) Altruistic Scientific Code For information language
Interchange (c) Computer understands only Binary language
UPPCL Accountant 10-02-2018 (d) Computer understands only BASIC
29. Which among the following describes ROM? 41. Which of the following computer language is
(a) Read Only Memory written in binary codes only?
(b) Read Once Memory (a) Pascal (b) Machine language
(c) Read On Memory (c) C (d) C#
(d) Read Other Memory 42. Which of the following unit is responsible for
UPPCL ARO-18.02.2018 converting the data received from the user into
30. Which of the following is a volatile memory? a computer understandable format?
(a) RAM (b) CD-ROM (a) Output Unit
(c) ROM (d) EPROM (b) Input Unit
UPPCL APS 27-09-2018 (Evening) (c) Memory Unit
31. Which of the following is NOT a characteristic (d) Arithmetic & Logic Unit
of RAM? 43. Convert 89 into binary notation.
(a) Faster (b) Expensive (a) 1100110 (b) 101110
(c) High power consumption (d) Smaller (c) 1011011 (d) 1011001
UPPCL ARO-18.02.2018 44. Addition of binary number 10011 and 11101
32. Which of the following is a characteristic of the are.
modern digital computer? (a) 11000 (b) 10000
(a) High speed (c) 10001 (d) 110000
(b) Large storage capacity 45. The binary representation of 99.25 is.
(c) Greater accuracy (a) (1100011.10)2 (b) (1100011.01)2
(d) All of the above (c) (1101011.10)2 (d) (1000011.11)2
Fundamental of Computer 16 YCT
46. Convert 101110 into decimal notation. (c) Aperiodic signals are power signals
(a) 44 (b) 56 (d) None of the above
(c) 72 (d) 46 60. The hardware unit which is used to monitor
47. The decimal representation of the binary computer processing is?
number (101010.011)2 is (a) ROM (b) Mouse
(a) 42.25 (b) 24.25 (c) Dot Matrix printer (d) Console
(c) 24.375 (d) 42.375 61. Which of the following data is put into a
48. The 2's complement of the binary number formula to produce commonly accepted
(11001001)2 is results?
(a) (000110110)2 (b) (00111111)2 (a) Raw
(c) (00110111)2 (d) (10110111)2 (b) Processed
49. Considering 2's complement representation for (c) Synchronized
negative numbers –128 will be stored into an 8- (d) All of the mentioned
bit memory space as: 62. Which of the following is equal to a gigabyte?
(a) 11111111 (b) 10000000 (a) 1024 bytes (b) 512 GB
(c) 11111110 (d) 10000001 (c) 1024 megabytes (d) 1024 bits
50. In octal number system the different symbol 63. Which type of program acts as an intermediary
are used is. between a user of a computer and the computer
(a) 8 (b) 2 hardware?
(c) 16 (d) 4 (a) Operating system
51. The octal representation of 195.25 is (b) User thread
(a) (303.20)8 (b) (303.02)8 (c) Super user thread
(c) (313.120)8 (d) (323.20)8 (d) Application program
52. The 15's complement of the hexadecimal 64. Which of the following values is the correct
number (B0210)16 is. value of the binary code 1011 and 1111?
(a) (4FDEF)16 (b) (4FDF0)16 (a) 11 and 14 (b) 12 and 15
(c) (50EF0)16 (d) (40DE0)16 (c) 11 and 15 (d) 12 and 14
53. How many Gigabyte is equal to 1 Petabyte. 65. Which of the following is not one of the internal
(a) 256 (b) 512 components of a CPU?
(c) 1024 (d) 1024×1024 (a) Control sequencer (b) M-D-R
54. The interface between an analog signal and a (c) M-A-R (d) Floppy disk
digital processor is. 66. What is the speed of computer measured in?
(a) D/A converter (b) A/D converter (a) Nanoseconds (b) Kilo-seconds
(c) Modulator (d) Remodulator (c) Gigahertz (d) Megabytes
55. The speech signal is obtained after. 67. Pentium is related with which part of the
(a) Analog to digital conversion computer.
(b) Digital to analog conversion (a) DVD (b) Hard disk
(c) Modulation (c) Microprocessor (d) Mouse
(d) Quantization 68. What difference does the 5th generation
56. Telegraph signals are example of computer have from other generation
(a) Digital signals (b) Analog signals computer?
(c) Impulse signals (d) Pulse train (a) Technological Advancement
57. As compared to the analog systems, the digital (b) Object oriented programming
processing of signals allow. (c) Scientific Code
1. Programmable operations (d) All of the above
2. Flexibility in the system design 69. When a key is pressed an keyboard, which
3. Cheaper systems standard is used for converting the keystroke
4. More reliability into the corresponding bits.
(a) 1, 2 and 3 are correct (a) ANSI (b) ASCII
(b) 1 and 2 are correct (c) EBCDIC (d) ISO
(c) 1, 2 and 4 are correct 70. Which device used as the standard pointing
(d) All the four are correct device in a graphical user environment?
58. DTFT is the representation of. (a) keyboard (b) mouse
(a) Periodic Discrete Time Signals (c) joystick (d) trackball
(b) Aperiodic Discrete Time Signals 71. The section of the CPU that is responsible for
(c) Aperiodic Continuous Signals performing mathematical operations.
(d) Periodic Continuous Signals (a) Memory (b) Register Unit
59. Which of the following is the characteristic of (c) Control Unit (d) ALU
the power signal? 72. A half byte is called a
(a) Power signal is infinite (a) Byte (b) Nibble
(b) Power signals are time-limited (c) Bit (d) Word size
Fundamental of Computer 17 YCT
73. Analytical engine the first fully automatic 86. The binary equivalent of the decimal number
calculating machine was developed by 10 is.
(a) Charles Babbage (b) Blaise Pascal (a) 0010 (b) 10
(c) Leibniz (d) John ron Neuman (c) 1010 (d) 010
74. Analytical engine invented during the first 87. Which of the following is the correct definition
generation of computer used which memory of computer?
unit. (a) Computer is a machine or device that can be
(a) RAM (b) Counter wheels programmed to perform arithmetical or logic
(c) Floppies (d) Cards operation sequences automatically
75. Storage capacity of magnetic disk depends on (b) Computer understands only binary language
(a) Tracks per inch of surface which is written in the form of 0 & 1.
(b) Bit per inch of tracks (c) Computer is a programmable electronic
(c) Disc pack in disc surface device that stores, retrieves and processes the
(d) All of above data.
76. A storage area used to store data to a (d) All of the mentioned
compensate for the difference in speed at which 88. CPU reads the information from secondary
the different units can handle data is. memory.
(a) Memory (b) Buffer (a) Directly
(c) Accumulater (d) Address (b) First information is transferred to the main
77. CD-ROM is a memory and from there the CPU reads it.
(a) Semiconductor memory
(c) Through registers
(b) Memory register
(d) None of these
(c) Magnetic memory
(d) None of the above 89. A Laser printer uses.
(a) Photo sensitive drum
78. The ALU of a computer responds to the
commands coming from. (b) Camera lens
(a) Primary memory (c) Heat sensitive paper
(b) Control section (d) None of these
(c) External memory 90. In a Hard disk, the 0 track is
(d) Cache memory (a) The outermost (b) The innermost
79. To produce high quality graphics (hard copy) (c) Totally machine (d) None of these
in color you would want to use a/n. 91. Which of the following is not a mouse
(a) RGB monitor (b) Plotter technique commonly used in windows?
(c) Inkjet Printer (d) Laser printer (a) Lifting (b) Dragging
80. A dumb terminal has (c) Double-clicking (d) Clicking
(a) an embedded microprocessor 92. A Floppy disk is organized as
(b) extensive memory (a) Tracks (b) Sectors
(c) independent processing capability (c) Tracks and Sectors (d) Heads and Sectors
(d) a keyboard and screen 93. Laser printer resolution is specified in terms of.
81. The output quality of a printer is measured by (a) CPI (b) API
(a) Dot per square inch (c) DPI (d) LSI
(b) Dot per inch 94. Which of the following holds the ROM, CPU,
(c) Dots printed per unit time RAM and expansion cards?
(d) All of the above (a) Hard disk (b) Floppy disk
82. Any type of storage that is used for holding (c) Motherboard (d) None of the above
information between steps in its processing is 95. Magnetic tape can serve as
(a) CPU (a) Secondary storage media
(b) Primary storage (b) Input media
(c) Intermediate storage (c) Output media
(d) None of the above (d) All of these
83. The examination and changing of single bits or 96. Which of the following is not an appropriate
small groups of his within a word is called. criterion for file organisation?
(a) Bit (b) Bit manipulation (a) Larger access time (b) Ease of update
(c) Byte (d) Bit Slice (c) Simple maintenance (d) Economy of storage
84. Which device of computer operation dispenses 97. The user can load and execute a program but
with the user of the keyboard? can't copy it. This process is.
(a) Joystick (b) Light pen (a) Execution (b) Appending
(c) None of the above (d) Mouse (c) Reading (d) Updating
85. What is the binary number for decimal 98. In the Gray code, successive numeric values
number 9? differ only by bit.
(a) 1100 (b) 0111 (a) 1 (b) 3
(c) 1001 (d) 1011 (c) 2 (d) 4
Fundamental of Computer 18 YCT
99. In a binary number, the leftmost bit is called 111. Which of the following is a valid number in all
(a) Most significant bit (b) Least significant bit systems taking into account binary, octal,
(c) Carry bit (d) Extra bit decimal and hexadecimal.
100. Which of the following in not a valid Binary (a) 8090 (b) A100
numbers?
(a) 1010 (b) 1002 (c) 3030 (d) 1010
(c) 0000 (d) 1111 112. What is the octal (base-8) equivalent of the
101. Gray Code of decimal number 2 is binary number 1010101000101?
(a) 0010 (b) 1000 (a) 50521 (b) 51205
(c) 0011 (d) 0101 (c) 12505 (d) 5AB1
102. The hexadecimal representation of (407)8 is 113. To represent a 31 digit binary number we need
(a) (107)16 (b) (701)16
a maximum of digits in the decimal number
(c) (017)16 (d) (710)16
103. 15th complement of hexadecimal number system.
(A01)16 is (a) 7 (b) 10
(a) (5F0)16 (b) (6EE)16 (c) 11 (d) 15
(c) (6E0)16 (d) (5FE)16 114. Which of the following is a toggle key on a
104. Which of the given options is the minimum keyboard?
amount of memory? (a) Alt (b) Shift
(a) Gigabyte (b) Terabyte (c) Scroll lock (d) Ctrl
(c) Megabyte (d) Petabyte
105. How many KB is equal to GB? 115. The first electronic digital computer was built
(a) 1024 (b) 256×1024 in
(c) 1024×1024 (d) 1024×1024×128 (a) Cambridge University, UK
106. The excess-3 code of decimal 2 is. (b) Bern University, Switzerland
(a) 1010 (b) 1100 (c) University of Pennsylvania, USA
(c) 0101 (d) 0011 (d) MIT, USA
107. The ASCII code for the LF (Line feed) in 116. The ASCII code for CR (Carriage Return) in
hexadecimal is
(a) 0D (b) 0A Octal is.
(c) 0C (d) 0B (a) 10 (b) 12
108. What would be the 8th complement of an octal (c) 11 (d) 15
number 42500? 117. BIOS is a type of system software which is
(a) 35200 (b) 35301 stored in _____ located on the motherboard.
(c) 35300 (d) 35100 (a) Cache memory (b) SRAM
109. Based on their data persistence property, (c) ROM (d) DRAM
identify the odd one out from the following
options. 118. With respect to the first digital electronic
(a) SRAM (b) EEPROM computer, what is the full form of ABC?
(c) EPROM (d) PROM (a) Atanasoff Binary Computer
110. Equal 1 Gigabyte. (b) Analog Berry Computer
(a) 216 byte (b) 1030 byte (c) Atanasoff Berry Computer
30
(c) 8 byte (d) 230 byte (d) Analog Binary Computer

ANSWER KEY
1. (a) 2. (b) 3. (a) 4. (d) 5. (b) 6. (a) 7. (b) 8. (d) 9. (d) 10. (c)
11. (c) 12. (a) 13. (d) 14. (d) 15. (c) 16. (a) 17. (a) 18. (d) 19. (a) 20. (a)
21. (d) 22. (d) 23. (c) 24. (c) 25. (c) 26. (b) 27. (c) 28. (c) 29. (a) 30. (a)
31. (d) 32. (d) 33. (b) 34. (d) 35. (b) 36. (a) 37. (c) 38. (a) 39. (a) 40. (c)
41. (b) 42. (b) 43. (d) 44. (d) 45. (b) 46. (d) 47. (d) 48. (c) 49. (b) 50. (a)
51. (a) 52. (a) 53. (d) 54. (b) 55. (b) 56. (a) 57. (d) 58. (b) 59. (a) 60. (d)
61. (b) 62. (c) 63. (a) 64. (c) 65. (d) 66. (c) 67. (c) 68. (a) 69. (b) 70. (b)
71. (d) 72. (b) 73. (a) 74. (b) 75. (d) 76. (b) 77. (d) 78. (b) 79. (b) 80. (d)
81. (b) 82. (c) 83. (b) 84. (d) 85. (c) 86. (c) 87. (d) 88. (b) 89. (a) 90. (a)
91. (a) 92. (c) 93. (c) 94. (c) 95. (d) 96. (a) 97. (a) 98. (d) 99. (a) 100. (b)
101. (c) 102. (a) 103. (d) 104. (c) 105. (c) 106. (c) 107. (b) 108. (c) 109. (a) 110. (d)
111. (d) 112. (c) 113. (b) 114. (c) 115. (c) 116. (d) 117. (c) 118. (c)

Fundamental of Computer 19 YCT


02.
DATA PROCESSING
Word Processing 1.2 Start a MS Word Application:
Word processing is a process of creating, editing, To start MS Word application, we need to install MS
Office in a computer system. After installing Microsoft
saving and printing document or text using word Office software, we can start or open MS Word.
processing software such as MS Word, Word Pad, There are two ways to open MS Office–
Notepad, Open office writer. 1. Using the start menu.
A word processor is computer program or device 2. Using run command.
that provides for input, editing, formatting and output of 1. Using the start menu: Following these step, we can
text, printing document etc. start MS Word:
Start → All program → Microsoft office → Microsoft
1.1 Microsoft Office Word (MS Word): word
MS Word is an application software that install with Step-1: click the start menu.
the Microsoft office package, MS word is also known as Step-2: Click the all program option from the menu
word processor software. It is used to create various Step-3: Search for Microsoft Office from the submenu
and click it.
document like writing a letter, preparing a resume and Step-4: Select Microsoft Word 2010 from the submenu
exam paper etc. of Microsoft office and click it.
MS Word software was added to the first version of After clicking Microsoft Word 2010, you will
Microsoft office package in the year 1990. see the following GUI window-
2. Using Run Command:
Creating a documents, editing, saving, printing,
Step-1: Press windows key+R.
moving documents, deleting, creating and editing tables, Step-2: Type “winword” inside the run box image
all these are done in Microsoft Word. Step-3: Click on the OK option or press the Enter key.
1.3 Elements & Interface of MS Word 2019
After starting MS word application , this type of window interface will appear -

Data Processing 20 YCT


Dialog Box launcher- Dialog Box launchers are Zoom Control- It is located on the right side of
small icons that appear in groups. Clicking on it opens a the view toolbar, where you can slide left or right to
related task pen or dialog box with several options zoom in or zoom out. You can also click on “+” sign
related to that group. There is a diagonal arrow on the button to zoom-in and “-” sign button to zoom out.
right edge of some groups, it appears on the ribbon as a Zoom-in or Zoom-out can be done from 10% to 500% in
very small arrow in the lower-right corner of several MS-Word.
groups Short cut key-
Quick Access Toolbar- The Quick Access tool Ctrl + mouse scroll up → zoom in
bar is a customizable toolbar that contains a set of Ctrl + mouse scroll down → zoom out
commands that are independent of the tab on the ribbon Control button- It is in the form of a group of
that is currently display. It gives you quick access to three buttons to the right of the title bar or at top-right
commonly used commands such as save undo, Redo etc. hand corner of SMS word window:-
Title bar- The top most bar of the opened window (i) Minimize button- It hides the window of MS
is called the title bar. It displays the title or name of the word from the screen and pin it to the task bar, that
means after minimizing the window appears in the task
currently open document
bar.
Status bar- This is a thin bar at the bottom of the (ii) Maximize button- It keeps the window in full
window in the MS Word program and just above the task screen mode.
bar that displays the number of pages, number of word, (iii) Close button- It closes the window of
proofing errors, language in the active document. MS word.
View toolbar- View toolbar is a group of five Work Area- This is the area where user types the
buttons located to the right of status bar and to left of the text in word document ,it is a blank area of a word
zoom control that adjust the view of the document. processor.
(i) Print layout view- It displays the pages exactly Ruler- Ruler is used to change the format of the
as they would appear when printed. document such as alignment of text, tables, graphics etc.
(ii) Full screen Reading view- Clicking on it makes It is located below the Ribbon around the edge of the
the document visible in full screen. document. In the word, there are two ruler.
(iii) Web layout view- Clicking on it shows how to (i) Horizontal Ruler
a document appears when viewed by the web. (ii) Vertical Ruler
(iv) Outline view- This allows you to work with Menu Bar
established outlines using word's standard heading styles. It is located just below the title bar. In this, it
(v) Draft view- When using this view certain contains some Tabs such as Home, Insert, Design,
aspects of the document are not visible, for example layout, References, Mailings, Review, View, Help, tell
headers or footers. me, share.

1. File Tab→In word 2010, the file tab replaces word 2007's office button. The file tab contains some commands
like Home,New, Open, Save, Save As, Print etc.

2. Home Tab: It is used to changing document setting like font size, font color, adding bullets, adjusting styles.
Data Processing 21 YCT
3. Insert Tab→ It is used to insert pictures icons, shapes, tables etc into the word document.

.
4. Draw Tab→ It is used to draw different colored inks with pen, pencil and highlighter with different effects.

5. Design Tab→ It is the fourth tab from the left between the insert and the layout tabs. It is includes document
formatting, page background like watermark, page color, page border etc.

6.Layout→ It is use to set margin, control of page orientation and size, add or remove column, line breaks and set
paragraph indentation and lines.

7. References Tab→ It is used to enter document sources citations, bibliography commands etc. in word document.
It is used to create a table of contents and insert caption etc.

Data Processing 22 YCT


8. Mailings Tab→ This tab is often used to create commands related to mass mailing. It consists of create, start mail
merge, write & insert fields, preview results, etc commands.

9. Review→ It consist of spelling & grammar, Thesaurus, speech-Read Aloud, Accessibility Track changes etc
commands. It provides icons for document review-related commands, such as spelling check, translation track
changes, apply changes and toggles the display of the research task pane defaulting the research service to the
thesaurus.

10. View→ This tab contains the commands of all the methods of viewing the documents, such as-
Views: read mode, Print layout, Web Layout, Outline, draft.
Page movement: Vertical, side to side.
Show: ruler, Gridlines, navigation pane, zoom split windows macros etc.

1.4 Create A New Document:


goto File tab→ New → blank document
or
Press Ctrl + N keys
Data Processing 23 YCT
1.5 Add and Format Text:
1. Place the cursor and type some text.
2. To format, select the text and then select an option: Bold, Italic, Bullets, Numbering, and more.

1.6 Add Pictures,Shapes,SmartArt and more:


Step-1: Select the Insert tab.
Step-2: Select what you want to add:
o Tables - select Table, hover over the size you want, and select it.
o Pictures - select Pictures, browse for pictures from your computer, select a stock image, or even
search Bing.
Note: Older versions of Word may have Online Pictures on the ribbon next to Pictures.
o Shapes - select Shapes, and choose a shape from the drop-down.
o Icons - select Icons, pick the one you want, and select Insert.
o 3D Models - select 3D Models, choose from a file or online source, go to the image you want, and
select Insert.
o SmartArt - select SmartArt, choose a SmartArt Graphic, and select OK.
o Chart - select Chart, select the chart you want, and select OK.
o Screenshot - select Screenshot and select one from the drop-down

1.7 Open an existing word document:


Goto File tab → Open → Browse → select your document → Click open.
Step 1: Click on file tab
Step 2: Click on open and browse or navigate to where the document is store and double click it or select it.
Short Cut key- Press Ctrl + O keys.

Data Processing 24 YCT


1.8 Save The document:
The document should not be closed until we have saved file because the unsaved document remains in the main
memory (RAM) and if the power is turned off, the documents are destroyed(data loss).
Save→ To save the changes in the original document. It just update current file.
Save As→ To save a different copy of the document along with the changes made Save As mean don't update
current file and create new file with different name.
1. Save your document to Hard drive-
Click on File Tab > save, pick or browse to a folder, type a name for your document in the file name box, and
click save.
2. Save your document to OneDrive- Save your document to one drive so you can get to it from anywhere- at
work, at home or on the go.
One Drive is the Microsoft cloud storage service that connects to all your files.
Go the File tab> Save As (or save a copy) ,Select one Drive, enter a name and select save.

Note→ When your document is stored in one drive ,word will save your changes automatically.
Shortcut Keys→
Ctrl + S → Save
F12 → Save As
Note→ When you save for the first time "save" and "Save As" command are same.

1.9 Print a document:


Before you print, you can preview your document and specify which pages you want to print.
Step-1: Click File > Print.
or
Press Ctrl + P shortcut keys from keyboard .

Step-2: To preview each page, select the forward and backward arrows at the bottom of the page.

If the text is too small to read, use the zoom slider at the bottom of the page to enlarge it.

Data Processing 25 YCT


Step-3: Choose the number of copies and any other option you want such as print all pages, print current page
orientation and choose printer etc.

1.10 Close a document:


go to file > close
Or
click on the 'X' button provided in the Top-right corner of the file window.

Or

Press the 'CTRL + F4' key (shortcut keys).


If the file is not saved, then a pop-up will arise to either save, don't save cancel.

Data Processing 26 YCT


1.11 Cut ,Copy ,Paste:

1-Copying a text one place to another place:


Copy and Paste:
Copy command makes a copy of only selected text or file and using paste command, the copied text can be placed
anywhere you want.
Step-1: Select a file or text
Step-2: Copy the file or text using some options like-
using right click on mouse

using copy button from ribbon

using crtl+C shortcut keys

Step-3: Paste the copied text or file with the help of paste command.
there are some method for paste command:
- using right click on mouse
- using paste button from ribbon
- using Ctrl+V (shortcut keys).
2-Moving a text one place to another place:
cut and paste:
Step-1: Select the text you want to move.
Step-2: go to the "clipboard section" in the home tab and click on 'cut' option.

or
press ctrl + X keys from keyboard.
Step-3: Click on "Paste" option from clipboard in the "Home" tab where you want to move text.
or
Press Ctrl + V Key form keyboard
Shortcut key→
Ctrl + X and Ctrl + V

Data Processing 27 YCT


1.12 Selection Of Text:
The text or item have to be selected to perform some kind of formatting on the text in the document such as to move
format or delete the picture, text or any other items.

Text can be selected either by mouse or keyboard- 1.13 Undo and Redu:
To select text with mouse, place the cursor at the Undo: The undo command is used to reverse a
beginning of the word or line, hold down the left mouse immediate changes in document. You can undo changes,
button and then drag the pointer over the text that you even after you have saved and then save again as long as
want to select to select text with keyboard, place the you are within the undo limits.
cursor at the beginning of the word or line using arrow
Note- By default office saves the last 100 undoable
keys and press shift + right arrow.
actions.
Select all text:
To undo an action press Ctrl + Z or click undo on quick
Click anywhere within the document and press Ctrl
access toolbar.
+ A on your keyboard
Select a single word:
to select a single word, quickly double-click that
word
Select a line of text:
Place your cursor at the start of the line and press
shift + down arrow key.
Select a paragraph of document :
Place your cursor at the anywhere of the paragraph
and quickly 3 times click on that paragraph. Place your Redo: Redo is the opposite of undo action. To Redo an
cursor at the beginning of the paragraph text and press action press Ctrl + Y or click on redo from quick access
Ctrl + Shift + down arrow. toolbar.

Data Processing 28 YCT


1.14 Find and Replace: Press Ctrl + J or click on justify tool for
distribute your text evenly between the margins.
Find and replace allows you to search a document for a
specific work or phrase, text and replace it with another Note→ Justified text can be difficult to read for people
word or text. who have a reading disability, such as dyslexia to
Step-1: make your document as accessible as possible, choose
a different alignment style.
Go to Home tab → Editing group →Replace
Important Facts
• Microsoft Word is an example of application software.
• Arial is a Sans Serif Font.
• Microsoft word software used for creating documents
such as letters, brochures, learning activities, tests,
quizzes etc.
• The default zoom level in word is set at 100%.
• Ctrl + R– To right align a text.
or • Auto fill is the feature of MS Word that fills up forms
press Ctrl + H keys. etc automatically with pre-set values.
Step-2. Enter the text you want to locate in the 'find • Page orientations are portrait and landscape in MS
what' box. Word 2010.
Step-3. Enter you new text in the 'Replace' with box. • Ctrl + Z– Short key to undo the last action in a
document in MS-Word.
• Smallest font size that can be applied to text in a
Microsoft word document is 1 and maximum is 1638.
• Default font size in MS Word is 8.
• Office programs have a default undo/Redo maximum
of 100 actions.
MS Word Shortcut Keys
Press keys To do this one
Ctrl + A Select all contents of the page.
Step-4. Select 'find next' until you come to the word Ctrl + B Bold selected text.
you want to update Ctrl + C Copy selected text.
Step-5. Choose replace to update all instances at once, Ctrl + D Open Font dialog box
choose replace all.
Ctrl + X Cut selected text.
Note→ If you want to find not replace then press ctrl +
Ctrl + P Open the print window.
F or go to Home → editing group → find.
Ctrl + E Aligns the line or selected text to
the center of the screen
1.15 Text Alignment: Ctrl + F Open find box.
Ctrl + G Go to
We can align text in 4 types- Ctrl + H Replace
i. Align left Ctrl + I Italic selected text.
ii. Align right
Ctrl + J Justify the text
iii. Align center
Ctrl + K Open insert hyperlink window
iv. Justify
Ctrl + U Underline selected text
Step-1 Select word or paragraph text or line that you
Ctrl + V Paste
want to align.
Ctrl + Y Redo the last action performed
or
Place the insertion point anywhere in the paragraph. Ctrl + Z Undo last action
Step-2: Ctrl + L Aligns the line or selected text to
the left of the screen.
Press Ctrl + L or click on Align Left tool for
align your context with the left margin. Ctrl + R Align Selected text to the right of
the screen.
Press Ctrl+ R or Click on Align Right tool for
Ctrl + M Indents the paragraph
Align your content with the right margin.
Ctrl + N Create a new document.
press Ctrl + E or click on center tool for align
your content. Center of the page. Ctrl + Shift + F Change the font.

Data Processing 29 YCT


Ctrl + Shift + > Increase selected font with 1pts F7 Spell and grammar
up to 12pt and then increase font Shift + F7 Runs a Thesaurus check on the
+with 2pts. word highlighted.
Ctrl + O Open a file F12 Save As.
Ctrl + F12 launch the open dialog box Shift + F12 Save
End key Move the cursor to the end of Ctrl + Shift + Prints the document
line F12
Home key Move the cursor to the start of Alt + Shift + D Insert the current date
line Alt + Shift + T Insert the current time
Ctrl + ] Increase selected font with 1pts. Mouse Action To do this one
Ctrl + Shift + < Decrease selected font with 1pts, Click, hold Selects text from where you
if above 12pts then decreases and drag want.
font by 2pt.
Double-click To select a word.
Ctrl + [ Decrease selected font with 1pts.
Triple-click To Select the paragraph.
Ctrl + Shift + * View or hide non printing
Ctrl + Mouse Zooms in and out
characters.
wheel
Ctrl + left arrow Moves cursor one word to the
key left.
Ctrl + right Moves cursor one word to the Microsoft Excel .

arrow key right. General information of Microsoft Excel–


Ctrl + up arrow Moves cursor to the beginning of MS Excel is a spreadsheet program which is used to
key the paragraph. save and analyse numerical data. It comes under
Ctrl + down Moves cursor to the end of the Microsoft Office package. In spreadsheet program, data
arrow paragraph. is stored in the form of tables. So it is easy to open,
create, edit, formatting. Calculating, share and print data
Ctrl + Del Deletes word to right of cursor
in MS Excel spreadsheet.
Ctrl + Backspace Deletes word to left of cursor Each spreadsheet is a set of cells that are organized
Ctrl + End Moves the cursor to the end of in to row and columns.
the document Elements of electronic spreadsheet–
Ctrl + Home Moves the cursor to the home of Some important terminology are following
the document 1. Workbook– Workbook is collection of one or more
Ctrl + Spacebar Reset selected text to the default spreadsheets. Opening a workbook three worksheets
font. open by default and we can add maximum 255
worksheet within workbook.
Ctrl + 1 Single space lines
2. Worksheet– Worksheet is a collection of cells
Ctrl + 2 Double space lines where you keep and manipulate the data. It is use to
Ctrl + 5 1.5-line spacing create statistical documents.
Ctrl + Alt + 1 Changes text to heading 1. 3. Row– A row runs horizontally in the grid layout of a
Ctrl + Alt + 2 Changes text to heading 2. worksheet. Maximum number of row can be
1048576 in an MS Excel worksheet.
Ctrl + Alt + 3 Changes text to heading 3. 4. Column– It is a vertical block of cell that runs from
Ctrl + F1 Toggles the display of the top to bottom along the length of worksheet. In this,
Ribbon. the alphabet is displayed from left to right. A
F1 Open help worksheet has a maximum 16384 columns.
Columns. column start with A, B, C and end with
Alt + Ctrl + F2 Open new document
XFD.
Ctrl + F2 Display the print preview. 5. Cells– A cells is the intersection of a row and a
Alt + P, SP To open page setup dialog box column. Columns are identified by letters (A, B, C)
Shift + F3 change case while rows are identified by numbers (1, 2, 3) each
cell has its own name or cell address.
Shift + insert Paste the copying text
F4 Repeat the last action performed
(Word 2000+)
F5 Go To
Ctrl + Shift + F6 Opens to another open Microsoft
Word document. Cell Address-C2
Data Processing 30 YCT
6. Formula– In MS Excel, a formula is an expression num2 – [optional] the second value to sum
that operates on values in a range of cells. A formula For example– =sum (A2:A5)
always start with equal (=) signSUM, COUNT,
AVERAGE are example of formula.
7. Function– A function is a predefined formula that
performs calculation using specific values in a
particular order. In order to use functions correctly,
you will need to understand the different parts of a
function.
Saving a workbook– There are two command to
save a workbook in MS Excel. The save command is 2. AVERAGE()–
used to save a workbook and the save as command is AVERAGE function calculate the average value in
used to save the workbook under a new name. the range of cells
First time save workbook– syntax–
File → Save or Ctrl + S = AVERAGE (num1, [num2], .....)
MS Excel 2010 worksheet is saved using XML num1 – A number or cell reference that refers to
based file format with .xlsx extension. numeric value [required]
Auto sum Feature– Using the auto sum feature in num2 – A number or cell reference that refers to
MS Excel, you can quickly add data in a row or column. numeric values.
It is located standard tool bar in form of special Example- AVERAGE (A1: A5)
command. It makes the calculation of row and columns
easy.
To use Auto sum in Excel–
• Select the cell in which you want to sum
Home tab → Editing group → Auto sum
or, Formulas tab → Function Library group → Auto
sum button.
To click on the Auto sum drop down arrow, select
the option as shown in the picture below. 3. Count()– The count function, counts the numbers of
cells in a range of cells. Empty cells and text values are
or Press Shortcut keys Alt + =
ignored.
Syntax–
= COUNT (value1, [value2], ....)
value1 – An item, cell reference, or range.
value2 – An item, cell reference, or range [optional]
Example–
=COUNT(1, 2, 3, 4)//Returns 4
=COUNT(1, "a")// Returns 1

Selecting sum in the formulas tab

• Excel automatically receives the column data range


you click and displays a dashed line along the border
line. One pressing the enter button, it displays the sum of
the selected cell range. 4. COUNTA()– COUNTA function returns the count of
Some important function used in MS Excel which are cells that contain numbers, text, logical value, error
following– values and empty text (" "). COUNTA does not count
1. SUM– The sum function adds values you can add empty cells.
individual values, cell references or ranges or a mix all Syntax–
three. = COUNTA (value1, [value2], .....)
Syntax– Example–
sum (num1, [num2], ......) = COUNTA (1, 3, 8)//returns 3
num1 – The first value to sum [required] = COUNTA (2, 5, "b", 1%)//returns 4
Data Processing 31 YCT
8. TODAY()–
In MS Excel TODAY() functions returns current date.
Syntax–
=TODAY()
Example– TODAY()// Current date
TODAY() + 90// 90 days from today

5. ROUND()– The ROUND function rounds a number to


a specific number of digits.
Syntax–
= ROUND (number, num_digits) 9. NOW()– In MS Excel NOW() functions returns
number-(required) current date and time.
The number that you want to round. Syntax–
num-digits (Required) NOW()
The number of digits to which you want to round the
number argument.
Example–
= ROUND (B, B1, 1)// ROUND to 1 decimal
place
10. DAY()– The DAY() function returns the day value in
a given date as a number between 1 to 31 from a given
date.
Syntax–
6. MAX()– The Excel MAX function returns the largest = DAY(date)
numeric value in the data provided.
Syntax–
= MAX (number1, [number2], .....)
Example–
= MAX (15, 16, 19)// returns 19
11. MONTH()–
This function returns the month of date represented by a
serial number. The month is given as an integer from
1(January) to 12 (December).
Syntax–
MONTH (Serial_Number)
Example–
MONTH ("12_NOV")//Returns11
7. MIN()– This function returns the smallest value out of
a set of values.
Syntax–
= MIN (num1, [num2], ....)
Example–
MIN (18, 20, 13)//returns13

12. YEAR()–
This function returns the year corresponding to the date,
given as an argument.
Syntax–
YEAR (Serial_Number)
Serial_Number is the date of the year you want to find it.
Example–
Year ("11/8/2022") = 2022

Data Processing 32 YCT


Printing a worksheet– To print a worksheet, select the
print option from backstage view or click the print
13. CONCATENATE()– preview and buttons from the quick access toolbar.
CONCATENATE() use to join two or more text string • In Excel 2010, the user can prints the entire worksheet
into one string. or part of it.
Syntax– • Open the worksheet which you want to print
CONCATENATE (text1, [text2], .....) • File → Print
Example- CONCATENATE("TOTAL", " VALUE") or Press Ctrl + Shift + F12 or Ctrl + P
= TOTAL VALUE • Print back stage view → Print

14. CEILING()– The CEILING function rounds a


number up to its nearest multiple of significance.
Syntax–
=CEILING (Number, significance)

The nearest highest multiple of 3 for 10 is 12.


15. FLOOR()– In MS Excel the FLOOR rounds a
Microsoft Excel Shortcuts Keys
number down to the nearest multiple of significance. Press Keys To do this one
Syntax– F2 Edit the selected cell.
=FLOOR(number, significance) F5 Go to a specific cell. For example
A5.
F11 Create chart.
Ctrl + Shift + ; Enter the current time.
Ctrl + : Enter the current date.
The nearest lowest multiple of 3 for 10 is 9. Alt+Shift + F1 Insert New Worksheet.
16. DATEDIF()– In MS Excel the DATEDIF function Shift + F3 Open the Excel formula window.
returns the difference between two date values in years, Shift + F5 Bring up search box.
month or days.
Ctrl + A Select all contents of the
Syntax– worksheet.
=DATEDIF(start_dat, end_date,unit)
Ctrl + B Bold selected text.
Ctrl + I Italic selected text.
Ctrl + K Insert link.
Ctrl + U Underline selected text.
Ctrl + 5 Strikethrough selected text.
Ctrl + P Printing dialog box open.
17. POWER()– The POWER() returns the result of a
Ctrl + Z Undo last action.
number raised to a given number. This function is
alternative of exponent operator. Ctrl + F9 Minimize current window.
Syntax– Ctrl + F10 Maximize currently selected
=POWER(number, power) window.

Data Processing 33 YCT


Ctrl + F6 Switch between open workbooks/ PowerPoint
windows.
MS PowerPoint is an electronic presentation
Ctrl + Page up Move between Excel worksheets in program that helps people to present a speech using a
the same Excel document. collection of slides. A PowerPoint presentation is a
Ctrl + Page Move between Excel worksheets in collection of slides. The presentation may include slides,
down the same Excel document. handouts, notes, outline, graphics and animation. In
Ctrl + Tab Move between two or more open PowerPoint we can create any presentation of particular
Excel files. topic and topic may be education, company business etc.
Alt + = Create a formula to sum all of the The default file format in PowerPoint version 2007 or
above cells. newer is presentation1.pptx.
Ctrl + ' Insert the value of the above cell
into cell currently selected.
Ctrl + Shift + ! Format number in comma format.
Ctrl+Shift + $ Format number in currency format.
Ctrl+Shift + # Format number in date format
Ctrl+Shift + % Format number in percentage format
Ctrl + shift + ^
Format number in scientific
format.
Ctrl+Shift + @ Format number in time format.
Ctrl+Arrow Key Move cursor to next section to text.
Ctrl + Space Select entire column.
Shift + Space Select entire row.
Important Facts
• MS Excel is components of MS Office and it is
mainly used for accounting purpose.
• A file created in Microsoft Excel is called a
workbook. Basic Element of a slide
• Spreadsheet program are used to create amount based (i) Title Bar– This shows the name title current
document. presentation.
• In MS Excel By default, the text data is left aligned (ii) Office Button– MS Office button is located on the
and numeric data is right aligned in cell. upper-left corner of the PowerPoint Window.
• What if analysis command is available under data (iii) Menu Bar– Contains menu items like Insert,
section of menu bar in MS Excel 2007. Design, View etc.
• Making heading visible even while scrolling in excel (iv) Formatting Toolbar–It contain tool like Bold,
can be done by using freeze pane. Italic, Underline, Font shape and Size etc.
• In an absolute cell address, row number and column (v) Zoom Slider– To zoom in or zoom out your
levels are preceded by symbol. presentation. Maximum and minimum zoom limit in
• .xls is extension of MS Excel. slide is 10% to 400% by default PowerPoint zoom
• In MS Excel by default all cell reference are relative size is 69%.
references. (vi) Slide Sorter Pane– It allows us to choose which
• Line chart is useful for showing trends or changes slides will be shown in which sequence during the
over time. slide show.
• Pie chart is useful for showing trends or changes over time. (vii) Notes Pane– It allows us to type notes that we may
• Filtering features displays only the data in columns require later when preparing for the presentation, but
according to specified criteria. they will not be displayed during the slide show.
• Ctrl+Shift+L use to enable filtering of the selected cell. Tab
• Data sorting is the process of arranging data in some Home– The home tab holds the cut and paste features,
logical order. MS Excel allows us to sort data either in Font and Paragraph option and what you need to add
ascending or descending order. organize slides.
Key Description
Home Mouse active cell to the first column of
the current row.
Page Up Move active cell to row 1 column 1
Page UP Move active cell up to one screen.
Data Processing 34 YCT
Insert– Click Insert tab to add something to a slide. This View– Views allow you to look at your presentation in
includes Pictures, Shapes, Charts, Links, Text boxes, different ways depending on where you are in the
Video and more. creation or delivery process.

File– the file tab is used to opening, saving, sharing,


Design– On the design tab, you can add a theme or exporting, printing and managing your presentation.
colour scheme or format the slide background.

Transitions– A slide transition is the visual effect that


occur when you move from one slide to the next during a
presentation. You can control the speed, add sound, and
customize the look of the transition effect.
Set up how your slides change from one to the next
on the transition tab. Find a gallery of the possible
transitions to this slide group.
Click More at the side of the gallery to see all of them.

Animation– Use the animations tab to apply animation


to a slides and the effect based on animation type.

Quick Access Toolbar– It is located beside the MS


Office button. The quick Access Toolbar is a
Slides Show– On the slide show tab, set up the way that customizable toolbar that contains a set of commands
you want to show your presentation to others. that are independent of the tab on the ribbon that is
currently display.
Create a Presentation–
1. Open PowerPoint
2. In the left pane, select New.
3. Select an option.
• To create a presentation from scratch, select blank
presentation.
Review– The review tab lets you add comments, run • To use a prepared design, select one of the template.
spell check. Add a slide–
1. In the thumbnails on the left pane, select the slide you
want new slide to follow.
2. In the Home tab, in the slides section, select new slide.
3. In the slides section, select layout and then select the
layout you want from the menu.
Data Processing 35 YCT
Slide Show– This view is used to show the final
presentation with the all effect and colour schemes.
Placeholder– In PowerPoint, the dotted areas in an
empty slides are called placeholder. A placeholder is a
pre-formatted container on a slide for content (text,
graphics or video). The pre-set formatting makes it easier
to format slides consistently. To resize a placeholder,
drag one of its corner borders.

Add and Format text


1. Place the cursor inside a text box and then type.
2. Select the text and then select one or more option from
the font section of the Home tab such as Font,
Increase Font Size, decrease Font Size, Bold, Italic,
Underline etc.
3. To create bulleted or numbered lists, select the text Add, edit or remove a placeholder on a slide
and then select Bullets or Numbering. layout– You format a placeholder in slide master view.
Then you use the placeholder add content to it in normal
view. The picture slide has two rectangular placeholder.
1. The upper title placeholder prompts the user for text
and formats it in the default Heading, Font, Size and
Colour.
2. The (lower) content placeholder accepts text or a table
chart smart Art graphic, picture or video as indicated
by the clickable icons at its center.

Add a picture, shape and more


1. Go to the Insert tab
2. To add a picture
• In the Images section, select the pictures.
• In the insert picture from menu, select the source you
want.
• Browse for the picture you want select it and then
select insert.
Type of View used in MS PowerPoint PowerPoint template– A PowerPoint template is a
You can find the different PowerPoint view options pattern or blueprint of a slide or group of slide that you save
on the view tab. as a .potx file extension. Templates can contain layouts,
Normal View– In any presentation by default layout colours, set, effects background styles and even content.
is normal layout, and normal layout can be divide in PowerPoint theme– A theme is a predefined set of
three parts. colours, Fonts and visual effect that you apply to your
Outline view– In this view we can see only the text slides for a unified, professional look.
of the slides in the presentation.
Slide Sorter View– In this view, slides appear of
thumbnails size and they can be moved or sorted
according to slides can be moved by first clicking then
and dragging them to their desired location.
Data Processing 36 YCT
Add, rearrange, duplicate and delete slides in Animation Painter– In PowerPoint you can copy
PowerPoint animation from one object to another object by using the
Add slides– animation painter.
1. Select the slide you want your new slide to follow. Copy an animation–
2. Select Home > New Slide 1. Select the object that has the animation that you want
3. Select a layout. to copy.
4. Select the text box and type. 2. On the animations tab of the toolbar ribbon, in the
advance animation group, click animation painter.
Delete Slides
3. On the slides, click the object to which you want to
1. For a single slide– Right click the slide in the copy the animation.
thumbnail plane on the left, and select delete slide.
Format Painter– Copy formatting form one place
2. For multiple Slides– Press and hold ctrl and in and apply it to another. Double-click this button to apply
the thumbnail plane on the left, select the slides. Release the same formatting to multiple places in the document.
the ctrl key. Then right click selection and choose the
delete slide. Important Facts
3. For a sequence of slides– Press and hold shift • In a slide show menu of MS PowerPoint 2007,
and thumbnail pane on the left select the first and last 640×480 'resolution option is fastest and 1440×900
slide in the sequence. Release the shift key. Then right resolution option is slowest.
click the selection and choose delete slide.
• In MS PowerPoint a black slide indicates the end of
Duplicate a slide– In the thumbnail pane on the left
presentation.
right-click the slide the slides thumbnail that you want to
duplicate and then click duplicate slide. The duplicate is • By default MS PowerPoint presentation name is
inserted immediately after the original. presentation1.pptx.
Rearrange the order of slides– In the pane on the • Slide sorter view gives you a view of your slides in
left, click the thumbnail of the slide that you want to thumbnail form.
move and then drag it to the new location. • In PowerPoint, the dotted are in an empty slide are
Page orientation in PowerPoint– PowerPoint called place holders.
slides are automatically set up in landscape (Horizontal) • Text can not be inserted anywhere on the slide.
layout. But you can change the slide orientation to • A text box can be place anywhere on the slide.
portrait (vertical layout). • In a PowerPoint show, .jpg, .giv, .wav file format can
Slide master– When you want all image your slides be added.
to contain the same fonts and images (such as logos). • To select one hyperlink after another during a slide
You can make those changes in one place the slide presentation press tab key.
master and they all be applied to all your slides. To open • Auto content wizard PowerPoint feature allow any
slide master view on the view tab, select slide master.
user to create presentation quickly.
MS PowerPoint Short Cut Keys
Ctrl + N Create new presentation
Ctrl + M Add a new slide
Ctrl + B Make selected text bold
Ctrl + X Cut selected text, object or slide
Ctrl + C Copy selected text, object or slide
Ctrl + V Paste cut or copied text, object or
slide
Ctrl + Z Undo the last action
Ctrl + S Save the presentation
Alt + H Go to the Home tab
Alt + N Go to the Insert tab
The master slide is top slide in the thumbnail pane F5 Start the slide show
on the left side of the window.
Esc End the slide show
PowerPoint handouts– Handouts are paper copies
of your power point presentation. When you can use the Ctrl + Shift +Tab Switch between the thumbnail
Handout Master tab to edit the appearance of pane and the outline view pane.
presentation handouts, including layout headers and Ctrl + A Select all object on a slide
footers and background. Ctrl + Shift + C Copy Formatting only
The maximum number of 9 slides can be printed in Ctrl + K Insert a hyperlink
one handout. Ctrl + Shift + V Paste formatting
To see the handout options, select the view tab and Ctrl + Spacebar Remove formatting
then select handout master views group.
Data Processing 37 YCT
Ctrl + O Open a presentation 3. Click the Blank database icon under the New section
Ctrl + P Print a presentation to display File New Database dialog box, as shown
Ctrl + Q Exit PowerPoint in Fig.
Ctrl + W Close a presentation
Shift + F5 Resume slide show
Backspace Delete one character to the left
Ctrl + Backspace Delete one word to the left
Delete Delete one character to the right.
Ctrl + Delete Delete one word to the right.
Ctrl + F Open find dialog box.
F10 Active the menu bar end.
Ctrl + H Open the replace dialog box
Shift + F4 Repeat the last find action.
Shift + F3 Switch between sentence case.
M.S. Office (Access) 4. Select the location from the save in list for saving
the database.
Microsoft Access system 5. Enter the name of the database such as Database1 in
Microsoft Access (MS Access) is a Relational the File name text box and click the created button
Database Management system (RDBMS) that allows the to create the Database1. Figure shows the database1:
users to create a database and store the data in the form Database (Access 2007) window.
of rows and columns i.e. in the form of tables. MS
Access comprises of a database engine known as
Microsoft Jet Database engine and a GUI. It also
supports various tools that help the users in creating and
managing database. MS Access is used by business
organizations and programmers for creating an organized
database system. It can combine data from various files
through creating relationships, and can make data entry
more efficient and accurate.
1. Basic operations performed in MS Access
MS Access is a database management system that
can be used for creating database. We can perform
various operations in MS Access for storing the data in
an efficient manner. The following are some of the key 1.2 Creating a database table- We can create a table in
operations that can be performed in MS Access. MS Access using any of the following three options
(i) Creating a database available in the Database1: Database (Access 2007)
(ii) Creating a database table window.
(iii) Defining relationships • Create table in Design view→ this option allows us
(iv) Creating a database query. to first create the design of the table, i.e. the fields of
1.1 Creating a database- we can create a database in the table along with its data type and then enter data
MS Access by performing the following steps- into it.
1. Open the Microsoft Access window. • Create table by using wizard→ This option
2. Select file→ New to display the New file task pane provides some sample tables to the user. These
on the right side of the Microsoft Access window, as sample tables are divided into two categories,
shown in fig. business and personal. After selecting a sample table
and its fields, the users can enter data into the newly
created table.
• Create table by entering data→ This option allows
the user to design the table and enter data in the
table simultaneously. There is no need to specify the
data type for the fields.
• To create a table in design view→ The most
commonly used method the created a table in MS
Access is the create table in design table in MS
Access using the create table in design view option,
we need to perform the following the steps-

Data Processing 38 YCT


1. Double-click the create table in Design view option In above fig. we can either select the yes or no option
is Datebase1: Database (Access 2007) window to depending upon our requirement of defining a primary key
display the table 1: Table page, as shown in fig. is a single field or a combination of multiple fields that are
used to uniquely identify a record in the database table.
6. Click the No button to display the Microsoft Access
- [Database1: Database (Access 2007)] window.
1.3 Defining Relationships→ In MS Access,
relationship between two or more tables of a database
help to create a link between the two tables. It links the
two tables with the help of the columns of same types
present in both the tables. The linking of same columns
helps in reducing the duplicacy and inconsistency of
data. These types of relationships can be defined for
databases-
• One-to-one- One-to-one relationship maps one
record of a table to a single record of another table
in the same database.
2. Enter the name of the fields in the field Name
column and the data types is the data type column, • One-to-many- One-to-many relationship maps one
as shown in fig. record of a table in a database to multiple records of
another table in the same database.
• Many-to-many- Many-to-many relationship maps
multiple records of a table to multiple records of
another table in the same database.
• To create a relationship between two tables of a
database, we need to perform the following steps-
1. Select tools → Relationships to display show table
dialog box containing the names of all the tables
contained in the database, as shown in fig.

3. Close the Table 1: Table page, Before closing the


table 1: Table page, a message prompt appears, as
shown in fig.

4. Click the Yes button to display the save As dialog


box, as shown in Fig. 2. Select a table name and click the Add bottom to add
a relationship to it.
3. Click the close button to close the show table dialog
box and display the relationship window, as shown
in fig.

5. Enter the name of the table, say Database1_Details,


in the Table Name text box and click ok. A message
prompt again appears, as shown in fig.

Data Processing 39 YCT


4. Drag the Employee_id field, which is present in the
tablet to the Employee_id field in the table2 to
display the Edit Relationships dialog box, as shown
fig.

2. Double-click the Create query in Design view option


to display the Show Table window.
3. Click the Add button to add the tables from which
data is to extracted.
4. Click the Close button to close the Show Table
window. The Microsoft Access – [Query1: select
Query] window appears, as shown in fig.
5. Click the Create button to establish a relationship
between the two table. The following figure shows
the relationships window displaying a relation
created between the two tables.

5. Select the field name to be displayed from the Field


list and the table name from the Table list.
6. Specify the condition on the basis of which data is to
be extracted in the Criteria field, as shown in fig.

6. Close the relationships window. A message prompt


appears asking whether to save the changes or not.
7. Click the Yes button to save the relationship.
1.4 Creating a database query
Query is a request through which a record or a set of
records can be accessed conditionally form a database.
On the basis of the query, only the records fulfilling the
specified condition are displayed in the result. There
exists two ways of creating a query, which are as
follows-
• Create a query in Design view.
Window with field names and specified criteria.
• Create a query using wizard. 7. Close the Microsoft Access - [Query 1 : select
The most commonly used method for creating a Query] window. A message prompt appears asking
query in MS Access is by using the create query in whether to save the changes pertaining to the query
Design view option. For creating a query in MS Access or not.
using the create query in Design view option, we need to
perform the following the steps.
1. Click the Queries button in left pane of the
Microsoft Access – [Database1: Database (Access
2007)] window to display the various query options,
as shown in fig.
Data Processing 40 YCT
8. Click the Yes button to save the query. Figure shows Alt Close the visible menu and submenu at
the save as dialog box. the same time.
Esc Close the visible menu.
Ctrl + Tab Switch to the next or previous tab in a
dialog box.
Shift + Tab Move to the next or previous option or
option group.
Alt + Down Open the selected drop-down list box
Arrow
Esc Cancel the command and close the
dialog box.
9. Enter the name of the query, say query - roll in the
Alt + N Move to the next page of the wizard.
Query Name text box.
Alt + B Move to the previous page of the
10. Click OK to save the query. The Microsoft access -
wizard.
Database1: Database (Access 2007) window appears
Alt + F Complete the wizard.
containing the name of the query.
F4 Show or hide the property sheet.
Microsoft Access : Shortcuts Keys Alt + Enter Display a property sheet in design view.
1. Shortcuts keys for database files. Ctrl + Tab Toggle forward between tabs when a
Ctrl + N Open a new database. property is selected.
Ctrl + O Open an existing database. Ctrl + Shift Toggle backward between tabs when a
Shift + F10 Display a shortcut menu for a selected + Tab property is selected.
item. Shift + Select from the insertion point to the
Alt + I Open the look in list. Home beginning of the text entry.
Ctrl + S Save a database object. Ctrl + Shift Change the selection by one word to the
F12 Open the save as dialog box. + Left left.
Ctrl + P Print the current or selected object. Arrow
Esc Cancel print preview. Ctrl + Shift Change the selection by one word to the
2. Shortcuts keys for the ribbon + Right right.
Alt + F Open the file Menu. Arrow
Alt + H Open the Home tab. F4 Open a combo box.
Alt + C Open the create tab. F2 Rename a selected object.
Alt + T Open the table tab. Ctrl + G Display the immediate window in the
Alt + X Open the external data tab. Visual Basic Editor.
Alt + Y Open the database tools tab. 4. Shortcuts keys for Design, Layout, Datasheet
Alt + J Open the fields tab. view.
F10 Select the active tab of the ribbon. F2 Switch between edit mode and
Shift + Tab Move the focus to commands on the Navigation mode in a datasheet.
ribbon. Esc Exit Navigation mode.
Ctrl + F1 Expand or collapse the ribbon. F5 Switch to the form view from the form
F6 Move the focus to a different pane of design view.
the window. F6 Switch between the upper and lower
F11 Show or hide the Navigation Pane. portions of a window.
Ctrl + F Go to search box in the Navigation F7 Open the Visual Basic Editor from a
Pane. selected property in the property sheet
Ctrl + F6 Switch to the next or previous database for a form.
window. Alt + F11 Switch from the visual basic editor back
Ctrl + W Close the active database window. to the form or report design view.
Alt + F11 Switch between the visual basic editor Alt + F8 Show or hide the field list pane.
and the previous active window. Ctrl + C Copy the selected control to the
Ctrl + F10 Maximize or restore a selected window Clipboard.
3. Shortcuts keys for menus, dialog boxers, wizards, Ctrl + X Cut the selected control to the
property sheets, text boxes, combo boxes and list clipboard.
boxes. Ctrl + V Paste the contents of the clipboard in
Home Select the first or last command on the the upper-left corner of the selected
menu. section.
Spacebar Open the selected menu. Ctrl + A Select all records.
Shift + F10 Open a shortcut menu. F9 Recalculated the fields in the window.
Ctrl + Home Move to the top or bottom of the F1 Open the help window.
selected gallery list. F7 Check spelling.

Data Processing 41 YCT


Important Questions Asked in Previous Years Examinations
1. Which of the following applications belongs to 11. The feature that fills up forms etc
MS Office? automatically with pre-set values is called:-
(a) Word (b) Photoshop (a) AutoFill (b) Instant Fill
(c) Gmail (d) Chrome (c) Filler (d) FillUp
UPPCL JE 2019 (Batch-02) UPPCL Asst. Accountant Eaxm-09.02.2018
2. MS Word is basically used for 12. The two types of Page Orientations are
(a) creating databases Portrait and _____
(b) analyzing the data (a) Landscape (b) Paper Size
(c) preparing the various documents (c) Print (d) Paper source
(d) preparing slides 13. While editing a text document in MS Word, the
(UPPCL RO/ARO-2014) combination keys used for copying and pasting
3. Which among the following is a sans serif font? text are respectively :
(a) All of these (b) Arial (a) Ctrl + c, Ctrl + z
(c) Courier (d) Times (b) Ctrl + c, Ctrl + v
UPPCL ARO-18.02.2018 (c) Ctrl + x, Ctrl + v
4. Microsoft Word is an example of a/an: (d) Ctrl + v, Ctrl + c
RRB NTPC, (Shift -2) Online, 19.03.2016
(a) application software
14. The shortcut for opening a file is -
(b) system software
(c) database (a) Ctrl + Alt (b) Shift + O
(d) operating system (c) Alt + O (d) Ctrl + O
UPPCL APS 27-09-2018 (Evening) UPPCL Accountant 10-02-2018
5. Which is a popular software used primarily for 15. What is the shortcut key to "Center Align" the
selected text?
creating documents such as letters, brochures,
(a) Ctrl + C (b) Ctrl + E
learning activities, tests, quizzes and students'
homework assignments? (c) Ctrl + F (d) Ctrl + H
(a) Paint (b) MS Word (UPPCL TG-2 26.06.2016)
(c) MS Access (d) Calculator 16. In MS word, You can display the "Find and
UPPCL JE 31-01-2019 (Batch-02) Replace" Dialog box by pressing which of the
6. The default Zoom level in Word is set at following Function Keys ?
(a) F5 (b) CTRL + F5
(a) 0% (b) 125%
(c) CTRL + F4 (d) F4
(c) 100% (d) 1%
UPP Computer Operator 21-12-2018 (Batch-01)
UPPCL ARO-18.02.2018
17. In Microsoft Word 2013, What is the shortcut
7. Which of the following is not in–built feature of
MS Word? key for print preview?
(a) Ctrl + F4 (b) Ctrl + F2
(a) Live Stream (b) Spell Check
(c) Ctrl + Alt + F3 (d) Ctrl + F12
(c) Thesaurus (d) Translate
UPPCL (Office Assistant III) 23-09-2018
UPPCL Stenographer Exam-18.02.2018
18. An application on desktop can be opened
8. Which of the following is NOT a Section Break through shortcut by
type? (a) Double clicking on its shortcut
(a) Odd Page (b) Next page (b) Right clicking and choosing "open" option
(c) Column (d) Even Page (c) Selecting the icon and pressing enter
UPPCL Office Assistant III 24-10-2018 (Evening) (d) All of these
9. Which of the following is NOT a basic text (UPPCL TG-2 26.06.2016)
formatting feature? 19. In Microsoft Word, what will be the effect of
(a) Italic (b) Underline CTRL + SPACEBAR on a selected portion of
(c) Capitalize (d) Bold text?
UPPCL Stenographer Exam-18.02.2018 (a) Moves the cursor to the end of the document
10. Which among the following method can be (b) Moves the corsor to the beginning of the
used to right align a text? document
(a) Ctrl + I (b) Ctrl + Z (c) Changes case (upper to lower/lower to upper)
(c) Ctrl + J (d) Ctrl + R (d) Clears all formatting on the selected text
UPPCL ARO-18.02.2018 UPPCL ARO 13-09-2018
Data Processing 42 YCT
20. In MS-Word 2007, the shortcut key used to (a) Lower case (b) Sentence case
italicize a text is _______. (c) Toggle case (d) Upper case
(a) Shift + Alt + I (b) Shift + I UPPCL-JE 31-01-2019 (Batch -01)
(c) Alt + I (d) Ctrl + I 30. Which of the following features are available in
UPPCL APS Exam-18.02.2018 Microsoft Word.
21. Which shortcut key will undo an action? I. Check the document for spelling and
(a) Ctrl + L (b) Ctrl + Z grammar errors
(c) Ctrl + Y (d) Ctrl + J II. Add header, footer and page number
UPPCL (Office Assistant III) 23-09-2018 III. Protect the Word document with password
22. In MS Excel 2016, what is the shortcut key (a) I and III only (b) II and III only
launch the Open dialog box? (c) I and II only (d) I, II and III
(a) Alt + F12 (b) Ctrl + F12 UPPCL-JE 31-01-2019 (Batch -01)
(c) Shift + F12 (d) F12 31. What is Macro?
UPPCL JE 2019 (Batch-02) (a) Small add-on programs that are installed
23. Which of the following options is used as a afterwards if you need them
(b) A type of high level programming language
short cut for adding a hyperlink in a MS-Word
application? (c) A type of low level programming language
(a) Ctrl + S (b) Ctrl + K (d) Small programs created in MS–Word to
(c) Ctrl + H (d) Ctrl + O automate repetitive tasks by using VBA
UPP Computer Operator 21-12-2018 (Batch-02) (UPPCL TG2 Re-exam 16-10-2016)
24. Using the end key in Microsoft Word, 32. Which of the following fonts is used as default
processor moves the cursor to the end of font in MS Word 2016?
the.......... (a) Arial (b) Calibri
(a) page (b) file (c) Times New Roman (d) Verdana
(c) document (d) line UPPCL JE 31-01-2019 (Batch-02)
(SSC J.E. 02.03.17, 10:00 am) 33. Which of the following would you choose to
25. In Microsoft Word 2013, which menu includes move selected text from one place to another?
'Table row height' to change the height of the (a) Move and Paste (b) Copy and Paste
row? (c) Cut and Paste (d) Delete and Paste
(a) Page layout (b) Design (UPPCL TG2 Re-exam 16-10-2016)
(c) Layout (d) Insert 34. In MS Word, by pressing which of the
UPPCL (Office Assistant III) 23-09-2018 following key combination a page break can be
26. Which of the following is included in inserted?
Paragraph Formatting in a word processor? (a) Ctrl + F1 (b) Shift + Enter
(a) subscript (b) font (c) Shift + F1 (d) Ctrl + Enter
(c) underline colour (d) line spacing UPPCL JE 31-01-2019 (Batch-02)
(SSC J.E. 04.03.17, 10:00 am) 35. Saving your current file as a new one without
27. Using the 'Home Key' in Microsoft word, overwriting the original file can be done via:
processor moves the cursor to the beginning of (a) New (b) Save
the ............ (c) Save As (d) Open
(a) Page (b) file UPPCL Stenographer Exam-18.02.2018
(c) document (d) line 36. Which of the following would you choose to
(SSC J.E. 01.03.17, 10:00 am) save a document with a new name ?
28. To change selected text to All Capital Letters, (a) Press Ctrl +S
you have to click the change case button and (b) Click File,Save
then click (c) Click Tools, Option, Save
(a) Uppercase (b) Upper all (d) Click File, Save as
(c) Caps lock/ (d) Lock upper (UPPCL TG2 Re-exam 16-10-2016)
(UPPCL TG-2 26.06.2016) 37. Which of the following saves the changes of a
29. In MS Word, which of the following options document into a new file?
under "Change Case" is used to convert the (a) Print Preview (b) Print
selected text from upper case to lower case and (c) Save (d) Save As
vice versa? (AHC RO-2016)
Data Processing 43 YCT
38. You need to save an existing word document in 48. We can emphasize text in Word using:
another name. Which of the following options (a) Word Warp (b) Indentation
will you use ? (c) Highlight (d) All of these
(a) Insert (b) Save As UPPCL Stenographer Exam-18.02.2018
(c) Save (d) Edit 49. Which of the following statements is FALSE
UPP Computer Operator 21-12-2018 (Batch-01) about MS Word software?
39. In MS Word 2016, which of the following (a) MS Word software can create, edit, save and
groups has page formatting options like print documents
margins, size and orientation? (b) MS Word software can insert elements from
(a) Page (b) Document other software, such as illustrations or
(c) Section (d) Page Setup photographs
(c) MS Word Software cannot correct spelling
UPPCL-JE 31-01-2019 (Batch -01)
and grammar
40. The keyboard shortcut to "cut" something is:
(d) MS Word software can format text, such as
(a) Shift + X (b) Shift + Alt font type, make the text bold, underline the
(c) Ctrl + C (d) Ctrl + X text and italicize the text
UPPCL Stenographer Exam-18.02.2018 UPPCL JE 2019 (Batch-01)
41. What is the short key for GO–TO menu in 50. In Microsoft Word 2013, which of the following
MS–Word ?
are INCORRECT steps for creating a table?
(a) Ctrl + Del (b) Ctrl + G + T (a) Click on insert-> Click on Table-> Select
(c) Ctrl + C (d) Ctrl + G table
(UPPCL TG2 Re-exam 16-10-2016) (b) Click on Insert-> Click on Table -> Draw
42. Which Shortcut key is used in MS Word to table
change the font? (c) Click on Insert -> Click on Table -> Insert
(a) Ctrl + F (b) Ctrl + Shift + F table
(c) Shift + Alt + F (d) Ctrl + Alt + F (d) Click on Insert -> Click on Table -> Move
(UPPCL TG2 11-11-2016) the cursor over the grid to select required
43. Shortcut Key "Shift + Tab" is used for ............. number of rows and columns
(a) Move forward through the Tabs UPPCL (Office Assistant III) 23-09-2018
(b) Move backward through the Tabs 51. In MS Word 2016, under which of the
(c) Move forward through the options following ribbon items is "Header and Footer"
(d) Move backward through the options option available?
(a) Insert (b) Tools
(UPPCL TG2 11-11-2016)
(c) View (d) Format
44. What is the function of Thesaurus in MS-Word?
UPPCL JE 2019 (Batch-02)
(a) Change word to its synonyms
52. In Microsoft Word 2013, Which group menu of
(b) Alignment of word
the Home tab includes the Format Painter?
(c) Change in graphics of word
(a) Editing (b) Styles
(d) Used in Mail Merge
(c) Clipboard (d) Paragraph
(UPPCL TG2 11-11-2016) UPPCL (Office Assistant III) 23-09-2018
45. In MS-Word, _____ allows the user to type the 53. What menu is selected to print?
text directly inside it. (a) File (b) Tools
(a) Cable (b) Print (c) Special (d) Edit
(c) Callouts (d) Numbers only UPSSSC JE-2015
UPPCL Office Assistant III 24-10-2018 (Evening) 54. In Microsoft Word 2013 which of the following
46. What is the shortcut key for making the menus includes the split cells option?
selected text subscript in MS-Word? (a) Layout (b) Design
(a) Ctrl+ = (b) Ctrl+- (c) Page Layout (d) Insert
(c) Ctrl+Shift+ = (d) Ctrl+Shift+- UPPCL (Office Assistant III) 23-09-2018
(UPPCL TG-2 26.06.2016) 55. With the ruler bar in MS Word, you can
47. In word, you can create bullets with adjust:
(a) Numbers (b) Roman numerals (a) Background Color (b) Font
(c) All of these (d) Letters (c) Text Size (d) Indentation
UPPCL ARO-18.02.2018 UPPCL Stenographer Exam-18.02.2018
Data Processing 44 YCT
56. To delete backwards in the case of mistakes, 64. In Microsoft Word, the 'hyphenation' option is
the ____key is used. available under______.
(a) Shift (b) Backspace (a) View
(c) Delete (d) Tab (b) Insert
UPPCL Office Assistant III 24-10-2018 (Evening) (c) Margins (under Page Layout)
57. Which shortcut key is used to move directly to (d) Page Layout
the bottom of the word document in MS-Word? UPPCL ARO 13-09-2018
(a) Alt+End (b) End 65. Which of the following options is an image and
(c) Shift+End (d) Ctrl+End graphics solution available in MS Word 2016?
(UPPCL TG2 11-11-2016) (a) Drop Cap (b) Hard disk
58. Word includes a series of predefined graphics (c) Clipart (d) WordArt
called _____ that can be inserted into the Word UPPCL JE 31-01-2019 (Batch-02)
Document. 66. In MS Word, what is the function of Ctrl +
(a) Captions (b) Clip Art Right Arrow Key?
(c) Bookmarks (d) Hyperlinks (a) Moves to next character
UPPCL APS 27-09-2018 (Evening) (b) Moves to next page
59. What is the use of Drop caps feature in a MS (c) Moves to next word
Word document? (d) Moves to next paragraph
(a) To drop all the capital letters UPPCL Stenographer Exam-18.02.2018
(b) To begin a paragraph with a large dropped 67. What is the second largest font size that can be
initial capital letter selected using the 'font size' drop down list in
(c) To automatically begin each paragraph with MS-word 2016?
capital letter (a) 96 (b) 48
(d) To automatically begin each paragraph with (c) 72 (d) 36
small letter UPPCL Stenographer Exam-18.02.2018
UPPCL JE 2019 (Batch-01) 68. The maximum number of columns, that can be
60. Why are Drop Caps used in a document? inserted in MS-word 2019 through 'Insert
(a) To begin a paragraph with a large dropped Table' operation is _______ .
initial capital letter. (a) 32 (b) 63
(b) To begin with a small letter. (c) 64 (d) 60
(c) To automatically begin each paragraph with a UPPCL Assistant Accountant 24/02/2022
capital letter. 69. Select the appropriate tool for data analysis
(d) To drop all the capital letters. from the following option:
UPPCL APS 27-09-2018 (Evening) (a) MS Word (b) MS Access
61. …...…..clicking on mouse selects the entire (c) MS Excel (d) MS PowerPoint
paragraph by default, while working with text UPPCL (Ste.) 28-08-2018 (Morning)
document is MS Word. 70. Which of the following tabs is activated by
(a) Alt + Single (b) Triple default when Microsoft Excel 2016 is
(c) Double (d) Single launched?
RRB NTPC, (Shift -1) Online, 18.03.2016 (a) Data (b) Formula
62. The selected portion of a text is called _______. (c) Home (d) View
(a) formula (b) function UPPCL (TG-II) 24-01-2019 (EVENING)
(c) block (d) method 71. If you enter the formula "=SUM(A1:A4)" in
UPPCL APS 27-09-2018 (Evening) cell A5, it would:
63. In MS Word, the Shortcut key Ctrl + I is used A B
for/to 1 50
(a) Inserting a line break 2 100
(b) make the selected text bold 3 150
(c) Apply italic format to selected text 4 200
(d) Increase font size
5 Total
UPPCL JE 31-01-2019 (Batch-02)
Data Processing 45 YCT
(a) Throw an error message because text values 80. Which of the following is a spreadsheet
cannot be added. Note that the numbers are application program?
left justified instead of right justified (a) MS Word (b) MS Excel
(b) Display the result, but will be of junk value (c) MS Access (d) MS PowerPoint
as it adds the ASCII value instead of the UPPCL RO/ARO-2014
numerical value 81. The best application to express a large amount
(c) Display the average of all numbers from A1 of detailed data would be:
to A4 (a) Outlook (b) Excel
(d) Display the correct sum of all numbers from (c) Word (d) PowerPoint
A1 to A4 UPPCL Asst. Accountant Exam-09.02.2018
UPP Computer Operator 21-12-2018 (Batch-02) 82. Which of the following components of MS-
72. In Microsoft Excel, the basic function of _____ Office is mainly used for accounting purpose?
is to join two or more text strings together. (a) MS-Word (b) MS-Visio
(a) CONCATENATE (b) VLOOKUP (c) MS- Excel (d) MS- Access
(c) SUMIF (d) DSUM AHC RO-2016
H.C. Ald. (ARO) Exam-2016 83. Which of the following is not an archive
73. The file extension of Excel workbooks is: format?
(a) .txt (b) .jpg (a) Tar (b) Zip
(c) .zip (d) .xls (c) .xlsx (d) rar
UPPCL APS 27-09-2018 (Evening) UPPCL ARO-18.02.2018
74. An Excel workbook is a collection of: 84. “.xlsx” is an extension for
(a) worksheets (a) Access (b) Excel
(b) charts (c) Word (d) PowerPoint
(c) workbooks UPPCL Asst. Accountant Exam-09.02.2018
(d) worksheets and charts 85. Workbook, in a computer application, is
UPPCL APS 27-09-2018 (Evening) basically related to
75. What is the shortcut key to enable filtering of (a) MS Excel (b) Adobe Reader
selected cells in MS-Excel? (c) MS PowerPoint (d) MS Word
(a) Ctrl + Shift + L (b) Ctrl + F RRB NTPC, (Shift -2) Online, 19.03.2016
(c) Alt + Click + L (d) Shift + F 86. A file created in Microsoft Excel is called a
UPPCL ARO-18.02.2018 ____.
76. CalC, Lotus 1-2-3, QuattroPro etc. are popular (a) Grid (b) Database
examples of ________. (c) Worksheet (d) Workbook
(a) Backup Utility UPPCL TG-II 25-01-2019 (Morning)
(b) Spreadsheet Packages 87. Which programs are used to create amount
(c) Word Processing Software based documents?
(d) DBMS (a) Word processing (b) Presentation
UPPCL APS Exam-18.02.2018 (c) Spread sheet (d) Graphics
77. The basic unit of excel spreadsheet where data SSC CHSL (10+2) 2012
entry is done is called: 88. Which of the following is invalid statement?
(a) Tab (b) Box (a) The width of a row and be specified
(c) Cell (d) None of above manually or fit automatically
MPPSC (Pre) G.S. Ist Paper, 2016 (b) Sheet tabs can be colored
78. Microsoft Excel is part of the ______ suite of (c) some picture can be applied as a background
applications. of a sheet
(a) Microsoft Window (b) Open Office (d) You can set the column width automatically
fit the amount of text.
(c) Microsoft Office (d) Visual Basic
RBI (Office Assi-2012)
UPPCL (TG-II) 24-01-2019 (EVENING)
89. A Doughnut chart in Excel is similar to:
79. The column of a Microsoft Access table is
(a) Bubble chart
known as a/an: (b) Bar chart
(a) Inverted row (b) vertical cell (c) Scatter chart
(c) record (d) field (d) Pie chart
UPPCL ARO 13-09-2018 UPPCL ARO-18.02.2018
Data Processing 46 YCT
90. Each spreadsheet file is called a workbook 99. When the following Microsoft excel function is
because _____ entered in a cell, what will be the result?
(a) It consists charts and graphs = AVERAGE (3, 12 > 16, 9)
(b) It contains text and data (a) 4 (b) 9
(c) It can be modified (c) 6 (d) 4.5
(d) It consists of several sheets containing UPPCL TG-II 25-01-2019 (Evening)
worksheet and charts sheets includes 100. Which of the following can be created in Excel?
AHC RO/ARO-2014 (a) Line graphs and pie charts
91. What is the maximum number of worksheets (b) Only line graphs
available in Microsoft Excel? (c) Bar charts, line graphs and pie charts
(a) No limit (restricted by the memory capacity) (d) Bar charts and line graphs
(b) 8 UPPCL TG-2 26.06.2016
(c) 28 101. What is the intersection of a row and a column
(d) 48 in MS Excel called?
UPPCL ARO 13-09-2018 (a) a filed (b) data
92. In a spreadsheet ____ columns are available. (c) an equation (d) a cell
(a) 257 (b) 254 UPP Computer Operator 21-12-2018 (Batch-02)
(c) 256 (d) 255 102. An active cell has a thick border in Microsoft
UPPCL Office Assistant III 24-10-2018 (Evening) excel (Thicker than normal grid lines). It has a
small solid box in the lower right corner. What
93. Which types of software is like an accountant's
is this box called?
worksheets
(a) Fill handle (b) Edit handle
(a) Word processing (b) Database
(c) Copy handle (d) File handle
(c) Spreadsheets (d) Graphics
UPPCL (Ste.) 28-08-2018 (Morning)
Ald. Bank (Clerk) 2009
103. By default, how is text horizontally aligned
94. In which of the following area is spreadsheet inside a cell in Excel?
software more useful? (a) Left aligned (b) Center aligned
(a) Psychology (c) Right aligned (d) None of these
(b) Publication UPPCL TG-2 26.06.2016
(c) Statistics 104. In Microsoft Excel 2013, a cell can contain a
(d) Message transmission
total number of _____ characters.
S.S.C. CHSL (Tier-I) Exam 2011 (a) 32,767 (b) 16,384
95. Which of the following is a spreadsheet (c) 409 (d) 255
application program? UPPCL (Office Assistant III) 23-09-2018
(a) MS Word (b) MS Excel 105. "What-if Analysis" command is available
(c) MS Access (d) MS PowerPoint under _______ section of menu bar in MS-
UPPCL TG2 Re-exam 16-10-2016 Excel 2007.
96. Microsoft Excel is a windows based _____ (a) Review (b) View
package. (c) Formulas (d) Data
(a) spreadsheets (b) Paint UPPCL APS Exam-18.02.2018
(c) Style sheet (d) Presentation 106. The best application to express a large amount
UPPCL Office Assistant III 24-10-2018 (Evening) of detailed data would be
97. In MS Excel, which of the following function is (a) Outlook (b) Excel
used to find the highest value within in a list? (c) Word (d) PowerPoint
(a) Count (b) Proper UPPCL Accountant 10-02-2018
(c) Max (d) Sum 107. Making headings visible even while scrolling in
S.S.C. Combined Higher Secondary Level Exam Excel can be done by using
(10+2), 2013 (a) Freeze Pane (b) Paradox
(c) Fixed Pane (d) Carousel
98. In MS Excel 2016, what is the result of the
UPPCL Accountant 10-02-2018
following formula? 108. By default, numeric data is aligned to
=AVERAGE(10, 20, 30, 40, 50) Microsoft.
(a) 30 (b) 150 (a) Top (b) Left
(c) 50 (d) 10 (c) Centre (d) Right
UPPCL JE 2019 (Batch-01) UPPCL TG-II 25-01-2019 (Evening)
Data Processing 47 YCT
109. In an absolute cell address, row numbers and 118. In PowerPoint, the dotted areas in an empty
column labels are preceded by……….symbol. slide are called
(a) # (b) $ (a) Template (b) Placards
(c) % (d) & (c) Placeholders (d) Themes
(AHC RO-2016) UPPCL ARO-18.02.2018
110. Which of the following is used to move an 119. State whether the following statements
active cell to the first column on the current
row? pertaining to PowerPoint 2013 are true or
(a) Home (b) Page down false.
(c) Ctrl + Home (d) Page up i) Translate option which translates selected
RRB SSE (Shift-III), 03.09.2015 text into different languages is NOT
111. Which of the following statement about available in PowerPoint 2013.
Microsoft Excel is incorrect? ii) Research option in 'proofing' group menu
(a) Any worksheet can be renamed gives alternative word to selected word.
(b) The worksheet cannot contain both text and iii) The Comments pane has three default
numbers buttons: Insert comment. Previous and
(c) By default the number is right-aligned Next
(d) By default, text data is aligned to the left. (a) i) True, ii) True, iii) True
UPPCL (TG-II) 24-01-2019 (EVENING) (b) i) False, ii) True, iii) True
112. In Excel, you can select the entire row by (c) i) True, ii) True, iii) False
pressing (d) i) True, ii) False, iii) True
(a) Ctrl + Spacebar UPPCL (Office Assistant III) 23-09-2018
(b) F8 + arrow key 120. What is the maximum number of slides that
(c) Shift + arrow key
can be printed in one hand out?
(d) Shift + Spacebar
(a) 2 (b) 4
UPPCL TG2 Re-exam 16-10-2016
(c) 8 (d) 9
113. When a Microsoft application is opened, the
UPPCL (Ste.) 28-08-2018 (Morning)
default screen that appears is called
121. To present slides in a presentation is called
(a) Database (b) Document
(c) Table (d) Worksheet (a) Effect (b) Custom animation
UPPCL TG-II 25-01-2019 (Evening) (c) Transition (d) Animation
114. What is the keyboard shortcut for creating a (Ald. Bank (Clerk)2011)
chart from the selected cell range in Excel? 122. In Microsoft PowerPoint _____ view is useful
(a) F2 (b) F4 in arranging the slides of the presentation.
(c) F8 (d) F11 (a) Slide Sorter (b) Reading
UPPCL TG-2 26.06.2016 (c) Normal (d) Outline
115. To edit any text or formula in Microsoft Excel UPPCL (TG-II) 24-01-2019 (EVENING)
you have to select that cell and press ______. 123. You can set to include _______ in every slide.
(a) F2 (b) F4
(a) Date and time (b) All of these
(c) F1 (d) Shift + F3
(c) Footer (d) Slide number
UPPCL (Ste.) 28-08-2018 (Morning)
UPPCL Accountant 10-02-2018
116. What will be the effect of pressing the F2 key
after selecting a cell in Microsoft Excel? 124. MS PowerPoint view that displays only text
(a) The contents of the cell will become bold. (headings and bullets).
(b) The cell will switch to edit mode. (a) Slide Sorter View (b) Slide Show
(c) The background color of the cell will be (c) Notes Page View (d) Outline View
changed. UPPCL Office Assistant III 24-10-2018 (Mor.)
(d) The contents of the cell will be deleted. 125. Which of the following view is good to use
UPPCL (TG-II) 24-01-2019 (EVENING) when you want to delete, copy, paste or move
117. Microsoft PowerPoint is used to create _____ your slides?
(a) Spread Sheet (b) Presentation (a) Slide sorter (b) Notes page
(c) Web Pages (d) Browser (c) Slide show (d) Normal
(UPPCL TG2 11-11-2016) (AHC RO-2016)
Data Processing 48 YCT
126. In order to check spelling of a text in MS– 134. The special effects used to present a slides in a
Power point, we press _________. presentation are called?
(a) F7 (b) Alt + Shift + L (a) layouts
(c) Alt + Click (d) Shift + F7 (b) custom animations
UPPCL ARO-18.02.2018 (c) transitions
127. The shortcut to add new slide in Power point is (d) present animations
UPPCL Office Assistant III 24-10-2018 (Evening)
(a) Ctrl + N (b) Ctrl + Z
135. In PowerPoint, you can copy animation from
(c) Alt + N (d) Ctrl + M
one object to another by using the ______
UPPCL ARO-18.02.2018 (a) animation repeater (b) animation copier
128. In PowerPoint 2013, which of the following (c) animation selector (d) animation painter
menus contains the 'Record Slide Show' UPPCL Office Assistant III 24-10-2018 (Mor.)
option? 136. Which shortcut key is used to duplicate a slide?
(a) Review (b) Slide show (a) Shift + D (b) Ctrl + D
(c) Animation (d) Transition (c) Ctrl + N (d) Ctrl + S
UPPCL (Office Assistant III) 23-09-2018 UPPCL Office Assistant III 24-10-2018 (Mor.)
129. In 'Slide Show' menu of MS PowerPoint 2007, 137. The extension of a PowerPoint template is:
(a) potx (b) temp
which 'Resolution' option is said to be the
(c) pot (d) pptx
fastest?
UPPCL Stenographer Exam-18.02.2018
(a) 640 × 480 (b) 800 × 600
138. By default MS PowerPoint 2016 saves files with
(c) 1366 × 768 (d) 1024 × 768
_____ extension.
UPPCL-JE 31-01-2019 (Batch -01) (a) .pptp (b) .pptx
130. To start a slide show from the beginning one (c) .xppt (d) .ppt
should press ____ and to start a slideshow from UPPCL (TG-II) 24-01-2019 (Morning)
the current slide one should press _____. 139. What is the default orientation of slides in a
(a) F5; Shift + F5 (b) Shift + F4; F4 MS PowerPoint presentation?
(c) F4; Shfit + F4 (d) Shift + F5; F5 (a) Portrait (b) Vertical
UPPCL TG-II 25-01-2019 (Morning) (c) Diagonal (d) Landscape
131. In power point, Themes could be found under– UPPCL TG-II 25-01-2019 (Evening)
140. To choose the screen resolution for slide show,
(a) Transitions tab (b) Design tab
command is available under ________ section
(c) Insert tab (d) Animation tab of menu bar in MS-PowerPoint.
UPPCL ARO-18.02.2018 (a) Animations (b) Insert
132. A Black Slide indicates: (c) Design (d) Slide Show
(a) User-action required UPPCL APS Exam-18.02.2018
(b) End of presentation 141. In Microsoft PowerPoint which of the following
(c) Error in slide does not appear in the 'Clipboard' group of the
'Home' tab?
(d) Slide to be loaded
(a) New slide (b) Format Painter
UPPCL Stenographer Exam-18.02.2018 (c) Paste (d) Copy
133. Which of the following statement is wrong? UPPCL TG-II 25-01-2019 (Morning)
(i) In Microsoft PowerPoint 2016, the slide 142. Which PowerPoint feature allows the user to
sorter option is placed under the 'Review create a simple presentation without having to
Tab' spend too much time on it ?
(ii) In Microsoft PowerPoint 2016, to add (a) Auto Content Wizard
music to your presentation, click the (b) Animation
(c) Colour schemes
Insert tab → Media group → Audio (d) Chart Wizard
(a) Both (i) and (ii) UPPCL TG2 Re-exam 16-10-2016
(b) Neither (i) and nor (ii) 143. Orientation NOT supported by PowerPoint is:–
(c) Only (i) (a) Landscape (b) Portrait
(d) Only (ii) (c) Canvas (d) None of these
UPPCL (TG-II) 24-01-2019 (Morning) UPPCL Asst. Accountant Exam-09.02.2018
Data Processing 49 YCT
144. A PowerPoint presentation is a collection of 152. The PowerPoint status bar has a slide bar to
_____ that can be used to create oral increase/decrease the size of the slide. What is
presentations. the range available in the Slide bar, in
(a) documents (b) slides percentage?
(c) worksheets (d) graphics (a) 10 to 400 (b) 0 to 1000
(AHC RO-2016) (c) -100 to ±100 (d) 0 to 300
145. In MS PowerPoint, which of the following UPPCL ARO-15.09.2018
153. In MS PowerPoint what does motion path
effect would you use for 'dotted appearance' of
represent?
new slide through old slide in slide show?
(a) How is an object moving in a slide
(a) Cover Left (b) Box Out (b) How the slide is selected
(c) Dissolve (d) Cover Right (c) How will the slide move
UPPCL Office Assistant III 24-10-2018 (Evening) (d) Animation between slides.
146. The _____ in Microsoft PowerPoint 2016 lets UPPCL (Ste.) 28-08-2018 (Morning)
you play a slide show in a PowerPoint windows 154. In Microsoft PowerPoint, for the logo of an
without having to switch to full screen. organisation to appear automatically in the
(a) Reading View (b) Notes Page same position in all the slides, you must insert
it in the.
(c) Slide Master (d) Outline View
(a) Slide Master (b) Notes Master
UPPCL Office Assistant III 17-10-2018 (Morning)
(c) Chart Master (d) Handout Master
147. In MS PowerPoint 2016, which of the following UPPCL (Ste.) 28-08-2018 (Morning)
is not a valid slide layout. 155. Under which tab page setup appears?
(a) Title and Content (a) Insert (b) Review
(b) Picture with caption (c) Design (d) None of above
(c) Blank with Title 156. Which of the following view is not one of
(d) Comparison PowerPoint view?
UPPCL Office Assistant III 17-10-2018 (Morning) (a) Sorter view (b) Slide shown view
148. What will happen if you press ESC key during (c) Slide view (d) Slide shorter view
PowerPoint slides how ? 157. The save as dialog box can be used for?
(a) End of slide show (a) saving the file for the first time
(b) Minimizes PowerPoint window (b) save the file by some alternative name
(c) saving the file in a format other than word
(c) Displays first slide
(d) All of the above
(d) Displays last slide
158. What is the keyboard shortcut to go to the
UPP Computer Operator 21-12-2018 (Batch-01)
'Home' tab in MS PowerPoint 2016?
149. To automatically place the logo in the same (a) Alt + H (b) Ctrl + M
position on each slide, enter it in the ______. (c) Alt + M (d) Ctrl + H
(a) Presentation Master (b) Handout Master 159. Which of the following gives you various
(c) Slide Master (d) Notes Master options for saving, opening, printing and
UPPCL Office Assistant III 24-10-2018 (Mor.) sharing your presentations in MS PowerPoint
150. ______ stores information about the current 2016?
(a) Normal View (b) Slide Sorter View
topic for a presentation the layout of
(c) Backstage View (d) Reading View
placeholders bullet characters and other
160. In MS PowerPoint slides show, which of the
formats that affect all slides in a presentation.
(a) Slide Painter (b) Slide Layer following is NOT a valid option?
(a) From the current slide
(c) Slide Bank (d) Slide Master
(b) From the beginning
UPPCL Office Assistant III 24-10-2018 (Mor.)
(c) Reverse from the rear
151. The object on the slide holding the text is (d) Custom built
called. 161. Which option is not available to print
(a) Object holder (b) Placeholder presentation slides?
(c) Text holder (d) Image holder (a) Handout Orientation (b) Slide Size
UPPCL Office Assistant III 24-10-2018 (Mor.) (c) Slide Master (d) slide Per page
Data Processing 50 YCT
162. Which of the following statements regarding 171. How many characters you can type in
insertion of text in a slide is incorrect? maximum while writing the field name?
(a) text can be inserted through the keyboard (a) 60
inside the text box (b) 64
(c) 68
(b) shapes such as squares, circles collect
balloons and block arrows can contain text (d) Any number of character
172. In MS Access, how can we create relationship
(c) The font size of the text in the text box can be
between two tables in the GUI?
changed
(a) Drag the foreign key of a table into primary
(d) A text box can contain text with only one key of another table.
font size and font type. (b) Drag any field from parent table and drop on
163. By default, in which view does MS PowerPoint child table.
open a presentation slide? (c) Drag the primary key of a table into foreign
(a) Slide Sorter (b) Slide Master key of another table.
(c) Notes Page (d) Normal (d) Any of these can be done to create
relationship.
164. Which of the following statements are correct?
173. What is the shortcut key to switch between the
I. the format painter feature is not supported field names and properties panels in table
II. to apply a motion effect between exiting a design view?
slide and entering another slide, the slide (a) F3 key (b) F4
transition feature can be used (c) F5 (d) F6
(a) I and II both (d) Only I 174. How can we remove a relationship defined
(c) Only II (d) Neither I nor II between two tables?
165. Which one of the following slide views can be (a) From edit menu (by choosing delete
relationship)
used to view all slide in a single screen in MS
PowerPoint? (b) Select the relationship line and press delete
(c) Choose deletes option from relationship menu
(a) Slide sorter view (b) Slide master view
(d) Choose remove option from relationship
(c) Normal view (d) Outline view menu.
166. Which option can be used set custom timings 175. Which of the following database object hold
for slides in a presentation? data?
(a) Slide show setup (b) Slider Timing (a) Forms (b) Reports
(c) Rehearsal (d) Slider Timer (c) Queries (d) Tables
167. Which tab is not available on left panel when 176. Which option allows us to build a new table by
entering data directly into a tabular grid?
your open a presentation?
(a) Datasheet view (b) Design view
(a) Slides (b) Outline
(c) Linked table (d) Grid view
(c) Notes (d) All of the above
177. How can we create a query in Microsoft
168. What happens if you select first and second Access?
slide and then click on new slide button on (a) Drag and drop fields
toolbar? (b) Type the SWL
(a) A new slide is inserted as second slide in (c) Use query wizard
presentation (d) All of above
(b) A new slide is inserted as first slide in 178. Which of the following is not a type of
presentation relationship that can be applied in Access
(c) A new slide is inserted as third slide in database?
presentation (a) One to one (b) One to many
(d) None of above (c) Many to many (d) All of above
169. Microsoft Access is a? 179. The columns in a Microsoft Access table are
also called ............ ?
(a) OODBMS (b) RDBMS
(a) Rows (b) Records
(c) ORDBMS (d) None of the above
(c) Fields (d) Columns
170. The default format for newly created database 180. The upper part of the query design window in
files in Microsoft Access-2010 is? MS Access has two parts shows .............?
(a) .accdb (b) .odcbd (a) Fields name with relationships
(c) .sq1db (d) All of the above (b) Fields name with field size
Data Processing 51 YCT
(c) Fields and Criteria (a) Design view
(d) Sorting options. (b) While using wizard
181. In the context of Microsoft Access, which of the (c) Create table by entering date
following statement is true? (d) All of above
(a) Reports are used to retrieve and calculate data 185. Which of the following is not a type of MS
from tables. Access database object?
(b) Queries can be printed and presented as the (a) Table (b) Form
information. (c) Worksheets (d) Modules
(c) Queries can include calculated fields that do 186. The complete information about an entity in a
not exist in table. database is called-
(d) Reports and forms are similar but forms are (a) Field (b) Record
use to print but reports to display on screen (c) Information (d) All of the above
only. 187. In one-to-many relationship the table in 'one'
182. What does the show cheek box in query design side is called ................ and an 'many' side is
window indicate? called .............
(a) It indicates whether the field is to be used or (a) Parent, child (b) Child, parent
not. (c) Row, column (d) None of the above
(b) It indicates whether the field is to be 188. In MS Access "Lookup Wizard" is used to?
displayed in query result or not. (a) to select value from another table
(c) It indicates whether the field names to be (b) to select value from excel sheet
displayed in query result or not. (c) to select from previous values
(d) It indicates whether the field is to be used for
(d) none of the above
grouping result or not.
189. The ............. is a wild card that represents one
183. Which field type will you select of you need to
or more character.
enter long text in that field?
(a) Question mark (?)
(a) Memo (b) Text
(b) Asterisk (*)
(c) Currency (d) Hyperlink
(c) Exclamation mark (!)
184. In which method we don't need to specify the
(d) Dollar sign ($)
field type and size while creating a new table?

ANSWER KEY
1. (a) 2. (c) 3. (b) 4. (a) 5. (b) 6. (c) 7. (a) 8. (c) 9. (c) 10. (d)
11. (a) 12. (a) 13. (b) 14. (d) 15. (b) 16. (a) 17. (b) 18. (d) 19. (d) 20. (d)
21. (b) 22. (b) 23. (b) 24. (d) 25. (c) 26. (d) 27. (d) 28. (a) 29. (c) 30. (d)
31. (d) 32. (b) 33. (c) 34. (d) 35. (c) 36. (d) 37. (d) 38. (b) 39. (d) 40. (d)
41. (d) 42. (b) 43. (d) 44. (a) 45. (c) 46. (a) 47. (c) 48. (c) 49. (c) 50. (a)
51. (a) 52. (c) 53. (a) 54. (a) 55. (d) 56. (b) 57. (d) 58. (b) 59. (b) 60. (a)
61. (b) 62. (c) 63. (c) 64. (d) 65. (c) 66. (c) 67. (b) 68. (b) 69. (c) 70. (c)
71. (d) 72. (a) 73. (d) 74. (d) 75. (a) 76. (b) 77. (c) 78. (c) 79. (d) 80. (b)
81. (b) 82. (c) 83. (c) 84. (b) 85. (a) 86. (d) 87. (c) 88. (a) 89. (d) 90. (d)
91. (a) 92. (c) 93. (c) 94. (c) 95. (b) 96. (a) 97. (c) 98. (a) 99. (a) 100. (c)
101. (d) 102. (a) 103. (a) 104. (a) 105. (d) 106. (b) 107. (a) 108. (d) 109. (b) 110. (a)
111. (b) 112. (d) 113. (d) 114. (d) 115. (a) 116. (b) 117. (b) 118. (c) 119. (b) 120. (d)
121. (c) 122. (a) 123. (b) 124. (d) 125. (a) 126. (a) 127. (d) 128. (b) 129. (a) 130. (a)
131. (b) 132. (b) 133. (c) 134. (c) 135. (d) 136. (b) 137. (a) 138. (b) 139. (d) 140. (d)
141. (a) 142. (a) 143. (c) 144. (b) 145. (c) 146. (a) 147. (c) 148. (a) 149. (c) 150. (d)
151. (b) 152. (a) 153. (a) 154. (a) 155. (c) 156. (d) 157. (d) 158. (a) 159. (c) 160. (c)
161. (c) 162. (d) 163. (d) 164. (c) 165. (a) 166. (c) 167. (c) 168. (c) 169.(b) 170. (a)
171. (b) 172. (c) 173. (d) 174. (b) 175. (d) 176. (a) 177. (d) 178. (d) 179. (c) 180. (a)
181. (c) 182. (b) 183. (a) 184. (c) 185. (c) 186. (b) 187. (a) 188. (a) 189. (b)

Data Processing 52 YCT


03.
PROGRAMMING FUNDAMENTALS
Introduction to C .
(ii) Global Variable– It is defined outside the function
or block. Following example illustrates the declaration of
• C is a computer programming language and it is easy global variable.
to learn and also called as compiled language. int value = 5; // global variable
• It is a procedural programming language which was void fun()
initially developed by Dennis Ritchie in the year 1972. {
• It is considered to be the base for other programming int a = 10; // local variable
languages therefore, it is also called as mother of all }
programming language. 1.4 Data type in C
• The knowledge of C language helps a lot in learning It specifies the type of data that a variable may have to
other programming languages such as C++, OOPs store.
Java, Python etc. For example → the type of data can be integer, float,
• Most of the compilers such as JVMs, Kernels etc are double, char etc.
written in C language and programming languages
such as C++, Java, C# etc follow the syntax of C
language.
• It provides core concepts of array, functions, strings, (i) Basic: It is based on integer or floating point and the
file handing as well. memory size of basic data types can be changed 32
1.1 Features of C- to 64 bit as per operating system.
It consists of int, char, floar, double etc.
(ii) Derived: Data types that are derived from
fundamental data types is called as derived types.
For example- arrays, pointers, structures, functions
union etc.
(iii) Enumeration: It is a user defined data type in C that
is mainly used to assign names to integral constants;
the names make a program easy to read and
maintain.
For example- enum weak day;
1. 2 Variable declaration in C (iv) Void data type: Void is an empty data type that has
no value.
It is a name of memory location and used to store data.
syntax- • We use void data type in functions when we do not
want to return any value to the calling function. For
Type variable_ list; example-
For example– void sum (int x, int y);
int x; , double a; • The above function will not return any value to the
here x, a are variables and int, double are data type. calling function.
Note– we can also provide value during the declaration • If we use int in place of void, then the function will
of variables. return value to the calling function. For example
For example– int x = 5; int sum (int x, int y);
double a = 3.8; 1.5 Printf() function
char b = 'T'; It is used for output and prints the given statement to the
console.
1.3 Types of variables: There are various types of
Syntax–
variable in C.
printf("format string", arg_list);
(i) Local variable: It is declared inside the function or Note:- format string can be
block.
%d → integer 
Syntax– %c → character 
void fun(){  
 
int a = 10; //local variable declaration  %s → string 
} %f → float 

Programming Fundamentals 53 YCT


1.6 Scanf() function- It is used for input and reads the #include<stdio.h>
input data from the console. int main()
syntax– {
scanf("format string", arg_list); /*Data for print
1.7 Keywords in C language MLC*/
• Keywords are predefined, reserved words used in printf("welcome to Yct");
programming which have special meanings to the return(0);
compiler. }
• These are part of syntax and they can not be used as Output–
an identifier. There are total 32 reserved keywords welcome to yct
which are- 1.10 Operators in C language
auto continue case char In programming language, an operator is a symbol which
const break default extern is used to perform operations.
There are many types of operators in C-
double else enum do
(i) Arithmetic operator-
float for goto if It performs mathematical operations such as addition,
int long register return subtraction, multiplication, division etc.
short signed sizeof static Operator Meaning
struct switch typedef union + additon / unary plus
unsigned void volatile while − subtraction / unary minus
1.8 C Identifiers: * multiplication
• Identifier refers to name given to entities such as / division
variables, functions, structures etc.
% remainder after division
• They must be unique and are created to provide a
unique name to an entity to indentify it during the (ii) Relational operators
execution of the program. • These are the operators used to create a relationship
Example– and compare the values of two operands.
int yct; • It checks the relationship between two operands. If the
Here, yct refers to identifier. relation is true, it returns 1, If the relation is false, it
returns value 0.
Note:- Identifier name must be different from keywords.
• These are used in decision making and loops
1.9 Types of comments in C language-
statements.
There are two types of comments-
(iii) Equal to (= = )
(i) Single-line comment-
It starts with double slash (//) and ends in the same line. • It is used to compare both operands and return 1 if
both are equal or same. If both are not equal or same,
For example
then it return 0.
#include<stdio.h> Syntax–
int main() operand 1 = operand 2;
{ 5 = = 4 → returns 0 because they are not equal or same.
// define integer var 3 = = 3 → return 1 because they are same or equal.
int age = 10; (iv)Not equal to (!=)
// print the age var It compares both operands and returns 1 if both operands
printf("Age: % d", age); are not the same, otherwise it will return 0.
return(0); Syntax–
} operand 1! = operand 2;
Output: For example– 5! = 3
Age: 10 Here, both operands 5 & 3 are not equal, therefore it
(ii) Multi-line comments: returns 1.
• They are shown by slash asterisk such as (v) Greater than (>)
/*.................*/ • It checks the value of the left operand is greater than
• In this type of comment, the C compiler ignores the right operand.
everything from /* to */. • If the condition is true, then it said to be greater than
for example operator.
Programming Fundamentals 54 YCT
Syntax– (iii) NOT (!)- It is used to reverse the logical state of its
a > b; operand if a condition is true, then logical NOT operate
Example– will make it false.
5 > 3 → It returns 1 as the condition is true. For example–
!(a & b) → true.
4 > 5 → It returns 0 as the condition is false.
1. 13 Bitwise operator–
(vi) Less than (<)–
• It is used to perform bit-level operations.
It checks whether the value of the left operand is less
• It consists of two digits either 0 or 1 and it is mainly
than the right operand.
used in numerical computations to make the
Syntax– calculations faster.
a < b;
Operators Meaning
Example–
& Bitwise AND
3 < 4; → it returns 1 as the condition is true.
5 < 3; → it returns 0 as the condition is false. | Bitwise OR
(vii)Greater than or equal to (> =) ∧ Bitwise exclusive OR
• It checks whether the left operand's value is greater ~ Bitwise complement
than or equal to the right operand. << Shift + left
Syntax– Shift + right
>>
x > = y; 1.14 Header file in C:
Example– • It contains the set of predefined standard library
5 > = 3; It returns 1 because the condition is true. functions.
(viii)Less than equal to- • The "#include" preprocessing directive is used to
It checks whether the value of left operand is less than or include the header files with '.h' extension in the
equal to the right operand. program.
Syntax– There are some header files in C language which are-
x < = y; stdio.h → used for input/output functions.
Example – conio.h → used for console I/O functions.
4 < = 5; stdlib.h → it is used for general utility functions.
1.11 Assignment operator math.h → used for mathematics functions.
It is used to assign a value to a variable. The most float.h → it limits the float types.
common assignment operator is (=). 1.15 Flowchart in C language–
• A Flowchart is a diagrammatic representation of an
Operator Example Meaning
algorithm.
= x=y x=y • It helps in writing programs and explaining the
+= x+ = y x =x+y program to others as well.
−= x− = y x =x−y Symbols used in flowchart-
x* = y x = x*y Flow line- It indicates the flow of logic by connecting
*=
symbols.
/= x/ = y x = x/y
Symbol–
%= x% = y x = x%y
Terminal (stop/start)
1.12 Logical operators in C language It shows the start and the end of a Flow chart.
• It is commonly used in decision making. Symbol-
• It allows the usage of three logical operators, namely,
'AND' (&&), 'OR'(||), 'NOT' (!).
(i) AND (&&)- In logical AND, if both the operands are
non-zero, then condition becomes true.
Input/output- It is used for input and output operation.
For example–
Symbol-
(a&&b) → false
(ii) OR(||)- In logical OR, if any of the two operands is
non-zero, then the condition becomes true.
For example– Processing- It is used for arithmetic operations and data-
(a||b) true. manipulations.
Programming Fundamentals 55 YCT
Symbol- 1.18 File Handling in C
A file is a container in computer storage devices which is
used for storing output or information permanently in the
form of a sequence of bytes on the disk.
There are various functions in the C library-
Decision– It is used for decision making between two or
fopen() → used for opening new or existing file
more alternatives.
fprint() → Iterates data from the file
Symbol– fscanf() → It reads data from the file
fputc() → It reads character from file
fclose() → choose the file.
fgetc() → It reads a character from file.
fseek() → It sets the file pointer to given position.
Following example illustrates the flowchart in fputs() → It is a function declared in stdio.h header file
programming language. and used for writing the contents of file.
fgets() → It terminates at the newline character but
appends it at the end of string.
str. The function can also append the terminating null
character at the end of the passed string.
1.19 Control statement in C
It is called as sequential control flow, there are many
types of central statements in C-
If statement
• If statement enables the programmer to choose a set of
instructions based on a condition.
• When the condition is evaluated as a true, then a set of
instructions are executed and a different set of
instructions get executed if the condition is false.
Syntax–
if (statement)
{
code ≡
}
If-else statement - If the condition is true then the first
1.16 Literal in C– expression will execute if the condition is false then else
Literals are data which is used for representing fixed part of statement will be executed.
values and they can be used directly in the code. Syntax–
For example- 2, 6.3, 'd' etc. if (exp)
It can be of many types- {
Integer- it can be a numeric literal (integer only). code
For example- '2', '4' etc. }
else
Floating-point literals- It is also a numeric literal that
{
has either a fractional form or a exponent form.
code
For example- '6.3' }
Characters- It is written by enclosing a single character Switch statement: A switch case statement is used when
inside single quotation marks. we have multiple options and we need to perform a
For example– different task for each option.
'A', 't' etc. syntax–
1.17 Tokens in C- switch (exp)
• In C programming, each word and punctuation is {
called as token. case constant:
// statement;
• They are the smallest building block or smallest unit
case constant:
of C program.
// statements;
They can be classified as- default:
• Keywords, identifiers, constants, string special // statements;
symbols and operators etc. }
Programming Fundamentals 56 YCT
Break statement in C– Do while loop
• It is used to bring the program control out of the loop. • It is a post tested loop.
• It can be used either inside loops or switch statement. • It is mainly used in case where we need to execute the
syntax– break; loop at least once.
Working of break statement • It is also similar to while loop with one exception that
While (Test exp) it executes the statements inside the body of do-while
{ before checking the condition.
// codes Syntax–
if (condition to break){ do
break; {
} // codes
//codes } while (condition);
} 1.21 Type casting in C
It refers to changing a variable of one data type into
1.20 Looping statement in C another.
It executes the sequence of statement many times until
There are two types of type casting.
the given condition becomes false.
i) implicit type conversion
A loop in C statement consists of two parts-
body of loop and ii) explicit type conversion
control statement Implicit type conversion-
Types of loops When the type conversion is done automatically by the
It can be classified into two categories- compiler without programmers intervention then it is
called as implicit type conversion or type promotion.
(a) Entry controlled loop→ Here the condition is
checked before executing the body of a loop. It is also For example-
known as pre-checking loop. int a = 5;
(b) Exit controlled loop→ Here,the condition is checked float x = 15.5, y;
after executing the body of a loop. It is also called as a y = x/a;
post-checking loop. Explicit type casting-
Infinite loop- The loop that does not stop executing and It is performed by the programmer by posing the data
processes the statements number of times is called as an type of the expression of specific type which is called as
infinite loop. It is also called as an "Endlessloop". explicit type conversion.
There are three types of loops in C programming- Syntax–
For loop (data type) exp;
• It is used in the case where we need to execute some Here, expression can be any constant or variable etc.
part of the code until the given condition is satisfied. while data type will be any valid C data type.
• It is also known as pre-tested loop. for example
Syntax– int a = 10, b = 3;
for (initialization; condition test; increment or float c;
decrement) C = (float)a/(float)b; /* here the value of z would
{ be 3.33% */
//codes to be executed 1. 22 Function in C
} • A function is a block of code that performs a specific
While loop task.
• It is also called as pre-tested loop. • We can pass data that is called as parameters, into a
• It allows a part of the code to be executed multiple function.
times depending upon the given condition. • Functions are used to perform some actions and they
• It is basically used in case where the number of are important for reusing code.
iterations is not clear in advance. • We can define code once and use it many times. There
Syntax– are three aspects of C function.
While (Condition) (i) Function declaration
{ A function is declared globally in a C program to tell the
// codes compiler about function name, function parameters and
} return type.
Programming Fundamentals 57 YCT
Syntax– Call by reference
return _ type fun _ name(arg list); Here, original value is changed or modified because we
pass address (reference). Address of value is passed in
(ii) Function call- the function, therefore actual and formal arguments
• It can be called from anywhere in the program. shares the same address space. Hence, any value changed
• The argument list should not be different in function inside the function is get reflected in both places inside
calling and function declaration. and outside the function.
• We have to pass the same number of functions as it is //C program to illustrate call by reference
declared in the function declaration. #include<stdio.h>
Syntax– #include<conio.h>
void swap (int*p, int*q)
func _ Name (argument _ list)
{
(iii) Function definition- int temp;
• Function definition contains the actual statements temp = *p;
which are to be executed. *p = *q;
• It is the most important aspect to which control comes *q = temp;
when the function is called. }
Syntax– void main(){
return _ typef _ name (argument _ list) int p = 500, q = 200;
{ clrscr();
function body // passing value to function
≡ swap (& p, & q);
} printf ("\n value of p: %d, p);
A function can be invoked in two ways. printf ("\n value of q: %d, q);
getch();
• call by value or
}
• call by reference
Call by value– O/P
In call by value, values of actual parameters are copied to value of p = 200
function's formal parameters while the parameters value of q = 500
received by function are called parameters.
1.23 Recursion in C
For example
Recursion is the process in which a function calls itself
/*C program to illustrate call by value */
up to n-number of times.
#include<stdio.h>
A recursive function call itself directly or indirectly in
#include<conio.h> the same program.
void swap (int x, int y) Syntax-
{ void rec()
int temp; {
temp = x; rec(); /* Recursive function calls
x = y; } itself inside the same function */
y= temp; int main()
} {
void main(){ rec(); //function calling
int x = 50, y 100; }
clrscr(); In the above syntax, the main function calls the recursion
swap (x, y); /*passing value to function */ function only once. But, thereafter recursion function
printf ("\n value of x is: %d", x); calls itself till the defined condition and it calls the same
printf ("\n value of y is: %d", y); function n-number of time-and so on.
getch(); 1.24 Array in C
} • An array is a variable that can store multiple values.
O/P → • It is a collection of similar data items stored at
contiguous memory location.
value of x is :100
Elements can be accessed randomly using indices of an
value of y is : 50 array.
Programming Fundamentals 58 YCT
syntax– following is the memory representation of a string is-
Data type array _ Name[size of array]; Let the word be yct.
example- float mark [5];
Initialization of an array in C
I) It is initialized at declaration time such as- Note– '\0' shows null character used to indicate the
int age [4] = {15, 14, 20, 21}; termination of string which differs strings from normal
II) Pictorial representation of array- character arrays.
C string functions
There are many string functions defined in "string.h"
library.
1D Array- It contains single row and multiple columns.
Strlen() → It returns the length of string name.
It is a simple collection of elements.
2D Array- It contains multiple row and multiple Strcpy()→ It copies the contents of source string to
columns and it is collection of 1D array. destination string.
Syntax- datatype array name [x][y]; Strcmp() → It is used for comparing the first string with
second string. If both strings are same then it returns.
Multidimensional array
It is an array of arrays and data in multidimensional Strrev() → It reverse strings.
arrays are stored in tabular form. Strupr() → It returns string characters in uppercase.
Syntax– Strwr() → It returns string characters in lowercase.
data type arr_name [size 1 ][size 2] ---[size N]; Introduction to C++ .
Note:- the total number of elements that can be stored in
a multidimensional array is calculated by multiplying the • C++ is an object-oriented programming language and
size of all the dimensions. it is an extension of C programming language.
For example- • It is case-sensitive, general purpose programming
The array- language that supports object-oriented, procedural and
int a[10][30] can store total 10×30 = 300 elements. generic programming.
Similarly, array a[5][5][10] can store total [5×5×10] = • It encapsulates both high and low level language
250 elements. features as well.
1.25 Pointer in C History of C++
• They are special variables that are used to store • C++ was developed by Bjarne Stroustrup at Bell
addresses rather than values. Laboratories over a period starting in 1979.
• Pointers variable can be to type int, char array, • Since C++ is an attempt to add object-oriented
function etc. features to C, therefore, earlier it was called as "C
• It is declared by using * (asterisk symbol). with objects." And in 1983, Bjarne stroustrup named
For example int*p; it as C++.
Null Pointer • C++ was made available outside Bell Laboratories in
It is pointer that does not point to any memory location. the year 1985.
It stores the base address of the segment. The null pointer • The first commercial C++ compiler, C front was
stores the null value while void is the type of a pointer. released in 1985.
For example- int * ptr = (int*)0; Features of C++
OR
int * ptr = NULL;
Void Pointer
It is a generic pointer that points to any data type.
for example→ void*pointer_name;

Note-Malloc() and Calloc() function return the void


pointer therefore, these functions are used to allocate the
memory of any data type.
String in C
They are defined as an array of characters and it is
terminated with a special character '\0'. Advantages of C++
Syntax– • It has compiler support and debuggers
Char string_name [size]; • C++ has a large selection of literature.
Programming Fundamentals 59 YCT
• In C++, one class can have more than one base class, 32 Keywords in C++
that is referred to as polymorphism. auto break case char const
• Encapsulation, polymorphism, abstraction are the double else enum extern float
important properties of C++ language. int long register return short
• It is easy to maintain and modify existing code as new struct switch typedef union unsigned
objects with small difference to existing ones. continue default do for go to
Disadvantages of C++ if signed size of static void
• Use of pointers while volatile
• Security issues Identifier in C++
• Absence of garbage collector • Identifiers are the basic requirement of any language
• Absence of Built-in threads and they are used to refer the name of variables,
• Efficiency of program in decreased functions, arrays or other user-defined data types.
• Code redundancy • Identifiers must start with letter or underscore (_)
symbol. The rest of the characters should be letters,
• When C++ is used for web applications then it is digits or underscores.
difficult to debug For example-
Difference between C & C++ X, X1, X_1, _ abc, are valid identifiers.
C C++ • Name cannot start with digit, uppercase & lowercase
structured programming object oriented letters are distinct.
language programming language • Keywords cannot be used as a variable name.
it does not support an it supports inline function Functions in C++
inline function A function provides modularity and code reusability and
it is also called as procedure or sub routine and it can be
middle level language high level language called number of times in a program.
it uses scanf() and printf() it uses cin>> and cout<< Advantages of function
function for standard for standard input & Code reusability- After creating functions, we can call it
input & output output. many times and don't need to write the same code again.
it is saved with .c it is saved with .cpp & again.
extensions extension Code optimization-
We don't require to write much code and it makes the
Variable in C++
code optimized.
It is a name of memory location and used for storing Types of function-
data. There are two types of functions-
Syntax- Library function- they are defined in C++ header files
type variable_list; for example-
For example- ceil(x), cos(x), exp(x) etc.
int a; User defined function–
float b; These functions are written by any programmer therefore
char c; they can use it multiple times. It minimizes the
complexity of a big program and optimizes the code.
Here a, b, c are variables and int, float and char shows
Syntax of function
data type.
return-type fun_name (data_type parameter------)
Data types in C++ {
Data type in C++ in nothing but the type of data that a code ≡
variable stores such as integer, float and character etc. }
There are four types of data types in C++ Recursion in C++
Basic Data type– It contains int, char, float double etc. Calling function within the same function is called as
the memory size of data types can be changed as per 32 recursion in C++ and the function that calls the same
or 64 bit operating system. function is called as recursive function.
Derived Data type- It contains array, pointer etc. Syntax-
Enumeration Data type- It contains enum data type. recursion fun()
User defined Data type- It contains structure data type. {
Keywords in C++
recursion fun (); /*function call* /
It is reserved word and cannot be used as a variable name
or constant name etc. }

Programming Fundamentals 60 YCT


Pointer in C++ string FN = "Ankur";
• It refers to a variable that holds the address of another string LN = "Mahazan";
variable. string Full_Name = FN + LN;
• In C++, it provides the & (reference) operator that cout << "Full Name;
returns the address that a variable occupies. return0;
For example- If a is variable then & a returns the address }
of a variable.
Output–
Syntax-
Ankur Mahazan
Datatype * variable _ Name; Note- we can also concatenate string with the append()
For example- int * a; function.
Note- & (reference operator) returns the variable's For example–
address while * (deference operator) gets the value that int main()
has been stored in a memory location. {
Advantages of pointer– string FN = "Ankur";
• Reduce codes and improves the performance string LN = "Mahazan";
• Used for retrieving strings, trees string Full_Name = FN.append (LN);
• Used with function, structures and array cout<< Full_Name;
• Helps in accessing any memory location return0;
• Searching or sorting large size data is much easier. }
Disadvantage of Pointers– string length()
• If a pointer goes wrong then it becomes very difficult It is used to get the length of a string for that length()
to find the bug in the program. function is used.
• If it contains a wrong value then it can lead to the For example–
disaster of great magnitude when used.
int main(){
Strings in C++
string text = "iamstudentofMSCITin
Strings are used for storing text and it contains the
universityofMumbai";
collection of characters surrounded by double quotes.
cout<< "The length of the text is:" << text.
For example-
length();
string greet = "wc to yct";
return0;
Note- for using string, an additional header file in the
source code is required in <string> library. }
For example- Output–
#include<iostream> The length of the text is: 37.
#include<string> Structure in C++
using name space std; • It is a collection of different data types and similar to
int main() the class that holds different types of data.
{ • They are used to create the instance of a class.
string greeting = "wc to yct"; Syntax-
cout << greet; struct structure_Name
return0; {
} // code
Output– }
wc to YCT Linker– It is a computer utility program that takes one
String concatenation– or more object files generated by a compiler and it
(+) operator is used between strings to add them together combines multiple object code and links them with
to make a new string and this process is known as libraries.
concatenation. Loader– It is a part of operating system which is
For example- responsible for loading programs to memory. It prepares
#include<iostream> executable file for running.
#include<string> Compiler– It is software that transforms computer code
using namespace std, written in one programming language into another
int main() programming language. It transforms the source code
{ into object code.
Programming Fundamentals 61 YCT
Assembler– It is a language processor that converts an Simple– Java is very easy to learn, and its syntax is
assembly language program into a machine language simple, and easy to understand.
program.
Object-oriented– Java is an object-oriented
Low-level language–
programming language and everything in Java is an
It is a programming language that deals with a
computer's hardware components and constraints. It is object.
also called as computer's native language. The languages Platform Independent:
that come under this category are machine level language ● Java is platform independent and it is a write once,
and assembly language. run anywhere language.
High level language–
● It has two components:-
A high level language is a programming language such
as C, FORTRAN, or Pascal that enables a programmer to (i) Runtime Environment and
write programs that are more or less independent. They (ii) API(Application Programming Interface).
are considered to be high level because of closeness to Java code can be executed on multiple platforms, for
human language and further more machine language. example, Windows, Linux etc.
examples of high-level-language are
Following diagram illustrates Java being a platform
python, C, Fortran, Java etc.
independent language clearly.
Java .

• Java is a high level, robust, object-oriented and secure


programming language.
• It is a programming language and a platform.
What is a platform?
Any hardware or software environment in which a
program runs, is called as a platform. Since Java has a
runtime environment (JRE) and API that is why it is
called a platform.
History of JAVA Secured– Java is secured because it has no explicit
• Java was developed in the year 1995 by James pointer and Java Programs run inside a virtual machine
Gosling, who is called as the father of Java. James sandbox. Java is best known for its security.
Gosling and his team members started the project in Robust–
the early '90s.
• Java is robust as it is capable of handling run-time
• Oak was the initial name of Java given by James
Gosling and his team. errors, supports automatic garbage collection and
exception handling, and avoids explicit pointer
• JDK 1.0 was released on January 23, 1996 and in
1995, Time magazine called Java one of the Ten Best concept.
Products of 1995. • It helps in eliminating errors as it checks the code
• It is owned by Oracle, and more than 3 billion devices during both compile and runtime.
run Java. Architectural Neutral–
• The latest version of Java (Java SE 18 ) is going to be • It is based on the ‘Write-once-run-anywhere’
released by March 2022. (WORA) or ‘Write-once-run-everywhere’ (WORE)
Features of Java
approach.
Followings are the features of Java and its features are
also called as java buzzwords: • Byte-code is not dependent on any machine
architecture and Java Virtual Machine (JVM) can
easily translate bytecode into a machine-specific code.
Portable– Java is “portable” and it refers to the SE
(Standard Edition) version. The portability actually
comes from architecture-neutrality.
High-performance–
Java provides high performance with the use of “JIT–
Just In Time compiler”, in which the compiler compiles
the code on demand basis, that is, it compiles only that
method which is being called and this saves time and
makes it more efficient.

Programming Fundamentals 62 YCT


Distributed– Following diagram shows the data types in java:
This feature in Java provides the advantage of distributed
programming, which is very helpful when we develop
large projects. Java helps us to achieve this by providing
the concept of RMI (Remote Method Invocation) and
EJB (Enterprise JavaBeans).
Multi-threaded–
• Multithreaded means handling multiple tasks
simultaneously or executing multiple portions
(functions) of the same program in parallel.
• The code of java is divided into smaller parts and Java
executes them in a sequential and timely manner.
Dynamic–
● Java provides the facility of dynamically linking new
class libraries, methods, and objects. It is highly
dynamic as it can adapt to its evolving environment.
● Java even supports functions written in other
languages such as C and C++ to be written in Java
programs. These functions are called “native
methods” and these methods are dynamically linked
at runtime.
Disadvantages of Java–
Java language has also some drawbacks which are as
follows: Keywords in Java– Java has a set of keywords that are
reserved words that cannot be used as variables,
1. Java is slow and has a poor performance.
methods, classes, or any other identifiers. Following are
2. Java provides not so attractive look and feel of the
some keywords given below.
GUI.
Abstract– it is used to declare an abstract class.
3. Java provides no backup facility. Boolean– it is used to declare a variable as a Boolean
4. Java requires significant memory space. type and It can hold true and false values only.
5. Verbose and Complex codes. For example–
Java Variables– public class Boolean {
In Java,variables are containers for storing data values. public static void main(String[] args) {
Syntax– int n1=10;
Type variable_Name = value; int n2=20;
For example– boolean t1=true;
int data= 100; boolean t2=false;
Yere, data is a variable name. if(n1<n2)
There are three types of variables in Java™ {
1. Local Variable– A variable declared inside the body System.out.println(t1);
of the method is known as local variable. }
2. Instance Variable– A variable declared inside the else
class but outside the body of the method, is called an {
instance variable. System.out.println(t2);
3. Static variable– A variable that is declared as static is }
called a static variable. }
Data types in Java– Data types define the different sizes }
and values which can be stored in the variable. There are Output– true
two types of data types in Java programming language: Break– it is used to break the loop or switch statement.
Primitive data types– The primitive data types include It breaks the current flow of the program at specified
Boolean, char, byte, short, int, long, float and double. conditions.
Non-primitive data types– The non-primitive data types For example-
include Classes, Interfaces, and Arrays. public class Break {
Programming Fundamentals 63 YCT
public static void main(String[] args) { Packages in Java–
for(int i=1;i<=10;i++){ Package in Java is a method to encapsulate a group of
if(i==7){ classes, sub packages and interfaces.
break; These packages help to reserve the class namespace and
} create a maintainable code.
System.out.println(i); The keyword package is used to create a package in
} java.
} Packages in Java are of two types:
Built-in Packages and
}
User-defined packages
Catch– Java catch keyword is used to catch the
exceptions generated by try statements. It must be used Built-in Packages–
after the try block only. Built-in packages(or predefined packages) consist of a
large number of classes and they are existing java
Class– it is used to declare a class.
packages that come along with the JDK. For example,
For example- java.lang, java.util, java.io, etc.
public class Class { There are some core packages in Java are:
public static void main(String[] args) { Java.lang– Java.lang is a package which contains the
System.out.println("welcome to yct"); classes like System, String, String Buffer etc. This
} package does not have to be explicitly imported as they
} are imported by default.
Default– It is used to specify the default block of code in Java.io– It provides a set of Input/Output streams that
a switch statement. are used to read and write data to files. A stream
Extends– It is used to indicate that a class is derived represents a flow of data from one place to another place.
from another class or interface. Java util– Here, util stands for utility and It contains a
Import– Java import keyword makes classes and collection of useful utility classes and related interfaces
interfaces available and accessible to the current source that implement data structures such as LinkedList,
code. Dictionary, HashTable, stack, vector, Calender, data
Package– Java package keyword is used to declare a utility, etc.
Java package that includes the classes. Java.net– In java.net, net stands for network and It
Static– it is used to indicate that a variable or method is contains networking classes and interfaces for
a class method. The static keyword in Java is mainly networking operations. The programming related to
used for memory management. client-server is done by using this package.
This– this keyword can be used to refer the current Java.applet– It is used for creating applets and they are
object in a method or constructor. programs that are executed from the server into the client
machine on a network.
Throw– it is used to explicitly throw an exception. The
Java.awt– awt stands for abstract window toolkit and
throw keyword is mainly used to throw custom
these packages contain the GUI elements such as
exceptions. It is followed by an instance.
buttons, lists, menus, and text areas.
Throws– The Java throws keyword is used to declare an
Java.sql– This package is used in a Java program to
exception. Checked exceptions can be propagated with
connect databases such as Oracle or Sybase and retrieve
throws.
the data from them.
Volatile– it is used to indicate that a variable may
User-defined Package–
change asynchronously.
They are defined by the users therefore, it is called as
Some parameters used in Java program: user- defined packages and It contains user-defined
Class– It is used to declare a class in Java. classes and following is the general form to create user-
Public– It is an access modifier that represents visibility. defined packages.
It is used for classes, attributes, methods and package package_ name;
constructors, making them accessible by any other class. Here, package_name is the name of package and the
Static– It is used in memory management and static are package statement must be the first line in a java source
applied with variables, methods, blocks and nested class. code file followed by one or more classes.
Void– it is return type of method and void doesn't return For example-
value. package myPackage;
Main– it shows the starting point of the program. public class A {
String[] args or String args[]– It is used for command ………
line arguments. ………
System.out.println()– it is used to print an argument ……...
that is passed to it. }
Programming Fundamentals 64 YCT
Advantage of using packages in Java– The following diagram explains the CLR:
Name conflict– Packages help to resolve the naming
conflict between the two classes with the same name.
Reusability– We can place the common code in a
common folder so that everybody can check that folder
and use it whenever needed.
Access Protection– A package provides access
protection and it can be used to provide visibility control.
Organized– It also helps in organizing the files within
our project.
Maintenance– Java packages are used for proper
maintenance.

.Net .
2. .Net Framework Class Library (FCL)
.Net framework • It is a standard library that is a collection of
thousands of classes and used to build an
• .Net is a framework which was designed and application. The BCL (Base Class Library) is the
developed by Microsoft and it is a framework to core of the FCL and provides basic functionalities.
develop software applications. • In short, developers just need to import the BCL
• It is a software development framework for building in their language code and use its predefined
methods and properties to implement common and
and running applications on Windows.
complex functions like reading and writing to file,
• The software programs written in .NET are executed graphic rendering, database interaction, and XML
in CLR (Common Language Runtime). document manipulation.
• The .Net Framework supports programming languages 3. Common Type System (CTS)–
such as C#, F#, VB.NET, J#, VC++, JScript.NET, • The Common Type System (CTS) is a standard
for defining and using data types in the
APL, COBOL, Perl, Oberon, ML, Pascal, Eiffel, .NETframework.
Smalltalk, Python, etc. • CTS defines a collection of data types, which are
Components of .Net framework– used and managed by the run time to facilitate
1. Common Language Runtime (CLR) cross-language integration.
4. Common Language Specification (CLS)
• .Net Framework provides a runtime environment
• The Common Language Specification (CLS) is a
called Common Language Runtime (CLR). fundamental set of language features supported by
• It provides an environment to run all the .Net the Common Language Runtime (CLR) of the
Programs. .NET Framework.
The code which runs under the CLR is called as • It is a part of the specifications of the .NET
Framework and was designed to support language
Managed Code. Programmers need not to worry on
constructs commonly used by developers and to
managing the memory if the programs are running under produce verifiable code, which allows all CLS-
the CLR because it provides memory management and compliant languages to ensure the type safety of
thread management as well. code.
● Programmatically, when our program needs memory, • CLS includes features common to many object-
CLR allocates the memory for scope and de-allocates oriented programming languages. It forms a
subset of the functionality of common type system
the memory if the scope is completed. (CTS) and has more rules than defined in CTS.
● Programmatically, when our program requires C# –
memory then CLR allocates the memory for scope and C# is pronounced as "C-Sharp". It is an object-oriented
de-allocates the memory if the scope is completed. programming language provided by Microsoft that runs
● Language Compilers ( for example C#, VB.Net, J#) on .Net Framework.
History of C#
will convert the Code to Microsoft Intermediate
• The development of the dot net Framework began
Language (MSIL) intern this will be converted to about two decades ago in the mid-90s with the
Native Code by CLR. premise being very different from what it is now.
Programming Fundamentals 65 YCT
• The idea was built around the concept of a code that is Advantages of Dotnet–
named “managed code.” It was supposed to be the Object Oriented:
kind of code that developers would be able to execute • .NET is based on an Object-Oriented Programming
while it is under a runtime environment.
Module.
• This was essential because of how previous coding
• And it is a development model that involves breaking
processes and platforms were inefficient in providing
more flexible and secure experiences. down software into easily manageable smaller pieces.
• By building the .NET Framework, those issues are • It compartmentalizes data into data fields and
addressed, along with active memory management. It describes objects behavior through the declaration of
also dealt with more minor problems involved when classes.
working with C and C++. • It eliminates necessary programming and hence less
• C# was developed in the year 2002 and was introduced coding for developers. In addition to this, .NET makes
with .Net framework 1.0 it possible to reuse components and code, thereby
• Anders Hejlsberg is known as the founder of C# saving time and cost of development.
language. Visual Studio IDE–
Features of C# Visual Studio is an Integrated Development Environment
Simple by Microsoft which is used for building, debugging and
• In C# pointers are missing in C#. publishing applications across various platforms,
• Unsafe operations such as direct memory including Android and iOS.
manipulation are not allowed. The key features of the Visual Studio IDE:
• In C# there is no usage of "::" or "->" operators. It is a single IDE for all .NET applications
• Since it's on .NET, it inherits the features of automatic • The IDE comprises debugging and integrated
memory management and garbage collection. compilation features
• Varying ranges of the primitive types like Integer, • The solution can be used for applications that are
Floats, etc. based on code written in different languages.
• Integer values of 0 and 1 are no longer accepted as • It also customizes the environment to match user
Boolean values. Boolean values are pure true or false preference.
values in C# so no more errors of "="operator and
Flexible Deployment and Easy Maintenance–
"=="operator.
• "==" is used for comparison operation and "=" is used • One of the crucial and most advantageous features of
for assignment operation. .NET Core is flexible deployment.
Modern– • It can be installed as a part of the application .
C# programming is based upon the current trend and it is • The modular design allows including all the
very powerful and simple for building scalable, dependencies that we need. Moreover, the deployment
interoperable and robust applications. with .NET is as easy as copying a folder.
Object-oriented– • Another benefit is that we can have more than one
C# is object oriented programming language and it is a .NET Core version running side by side on the same
simple, modern, object oriented language derived from machine.
C++ and Java.C# supports Data Encapsulation, • Therefore, making it easy to cover different projects
inheritance, polymorphism, interfaces. and seamlessly perform a deployment task.
Type safe–
Great Caching System–
• In C# we cannot perform unsafe casts like convert
double to a Boolean. • The simplicity of the caching system of .NET makes it
reliable and easy to temporarily store data.
• Value types (primitive types) are initialized to zeros
and reference types (objects and classes) are • Moreover, it allows for the cache implementation to
initialized to null by the compiler automatically. be customized, so developers can improve
• Arrays are zero base indexed and are bound checked. performance and scale as needed.
• Overflow of types can be checked. Large Community:-
Interoperability– • When a framework is used by many businesses and
It enables the C# programs to do almost anything that a developers, it means it has such features that attract
native C++ application can do. them.
Scalable and Updateable– • It also proves its stability and high level of trust from
• C# is automatic scalable and updateable programming the community, making everyone try the framework.
language. • Moreover, a large community means that almost any
• For updating our application we delete the old files issue can be solved with the aid of community
and update them with new ones. members.
Programming Fundamentals 66 YCT
• According to the recent survey by Stack Overflow, • It was first released in 2002 to replace Visual Basic 6.
ASP.NET took fourth place among the most popular VB.NET is an object-oriented programming language.
frameworks, while dotNET and .NET core has ranked • This means that it supports the features of object-
second and third. oriented programming which include encapsulation,
Cost-Effective– polymorphism, abstraction, and inheritance.
• Visual Code Studio by Microsoft has been preferred • Visual Basic .ASP NET runs on the .NET framework
by a large number of front-end developers as it is that means that it has full access to the .NET libraries.
good, small, extensible and updated. • It is a very productive tool for rapid creation of a wide
• When choosing the appropriate technology, one of the range of Web, Windows, Office, and Mobile
first things that we check is the IDEs and tools that are applications.
mandatory or add to productivity. Control Statement in C#
• A lot of them are free, but the best ones come with C# IF Statement–
licensing costs per developer, per, which can sum up It checks the condition first and if the condition is true
to thousands of dollars. then the statement is executed.
• No matter whether we are a Startup trying to find our Syntax–
way into the market or a big company, the money if(expression)
could be spent in a better way. {
Disadvantages of .NET ………
Limited Object-Relational Support ………
• As we know, .NET works on the Object-Oriented }
Programming approach, which is based on objects C# IF-else Statement–
rather than actions and data rather than logic.
In C#, if-else statement also tests the condition. It
• The support of data-oriented software application executes the if block, if the condition is true otherwise
development in .NET Framework is provided by the the else block is executed.
Entity Framework.
Syntax–
• The entity acts as the bridge between the object- if(expression)
oriented .NET Framework and SQL databases.
{
• However, some developers believe The Entity ………
Framework doesn’t offer the required flexibility and
……..
doesn’t support all the available database designs.
}
Stability Issues for New Releases–
else
• Finally, whenever the company decides to launch new
{
features or make new updates, documents and support
can be lacking. ……
• This can jeopardize the stability of development ……
projects. }
Memory Leaks For loop in C#
• .NET is one of those platforms that are frequently Syntax–
criticized for memory-related and memory leak issues. for(initialization; condition; incr/decr)
• Although .NET possesses a garbage collector for this {
problem. ………
Difficulty in the Transition to .NET core– ……...
• The transition to .NET core can be long and difficult. }
The applications built with older .NET versions are far While Loop in C#
more than that built with .NET core. Syntax–
• Transiting these applications to the latest versions of while(condition)
.NET can be a little bumpy. {
Licensing Cost– ,........
• Many aspects of the .NET family will cost money in ……..
terms of licensing fees and they can stack up. }
• The more demanding the project, the more expensive Do-While Loop in C#
it can get. For example, Visual Studio can cost a Syntax–
whopping $539.00 for one year. do
VB.Net– {
• VB.NET stands for Visual Basic.NET and it is a ……..
computer programming language developed by ……..
Microsoft. }while(condition);
Programming Fundamentals 67 YCT
Arrays in C# • Artificial intelligence is the ability of machines that
• Array in C# is a group of similar types of elements perform certain tasks which require the intelligence
that have contiguous memory locations. showcased by humans and animals.
• In C#, array is an object of base type System.Array. • The above definition was proposed by Marvin Minsky
Array index starts from 0 in C#. and John McCarthy from 1950s who were also known
as the father of the Artificial intelligence.
Array declaration in C#
Types of AI
Following is single array declaration:
There are two ways in which artificial intelligence is
generally classified-
int[ ] array = new int [4 ]; (i) Based on capabilities and
(ii) Based on functionality of AI
this keyword in C# Following diagram depicts the types of AI
this is a keyword which is used to refer the current meaningfully:
instance of the class.
Artificial Intelligence .

• Artificial intelligence is the field of computer science


that is associated with the concept of machines
"thinking like humans" to perform tasks such as
learning, problem-solving, planning, reasoning and
identifying patterns. Based on Capabilities
• Artificial intelligence is a combination of two words Narrow AI– It is also called as weak AI. It performs a
artificial and intelligence where artificial means 'man- dedicated task with intelligence. It is the most common
made', and intelligence means 'thinking power', available AI in the world of artificial intelligence.
therefore AI means "a man-made thinking power". Examples of Narrow AI are Google search, image
History of Artificial Intelligence recognition software, Siri, Alexa etc.
General AI– It performs any intellectual task with
efficiency like a human. The worldwide researchers are
now focused on developing machines with General AI.
Strong AI– Strong artificial intelligence is an artificial
intelligence construct that has mental capabilities and
functions that mimic the human brain.
Based on functionality
Reactive machine– Reactive machine are the most basic
type of AI system. This means that they cannot form
memories or use past experiences to influence present-
made decisions. A famous example of reactive machine
is Deep Blue, a chess-playing super computer produced
by IBM in the mid-1980s.
Limited memory–
It is comprised of machine learning models that derive
knowledge from previously-learned information, stored
data or event.
An example of limited memory can be an autonomous
vehicles (self-driving car).
There are three major machine learning models that
utilize limited memory AI.
(i) Reinforcement learning learns to make better
predictions through repeated trial-and-error.
(ii) Long short term memory (LSTM) utilizes past
data to help in predicting the next item in sequence.
(iii) Evolutionary generative adversial networks
(EGAN) E-GAN which evolves over time, growing
to explore slightly modified paths based off of
previous experiences with every new decision. It is
used to predict outcomes throughout its evolutionary
mutation cycle.
Programming Fundamentals 68 YCT
Theory of Mind– make sense of text and automatically perform tasks such
• This type of artificial machine are still not invented as translation, spellcheck or tropic classification.
but researchers are making lots of efforts and Reinforcement Learning– It is defined as machine
improvement for developing such AI machines. learning method which is concerned with how software
• Theory of mind AI must understand the human agents should take actions in an environment. It is part of
emotions, people, beliefs and must be able to interact deep learning method that helps in maximize some
like humans. portion of the cumulative reward.
Self Awareness– • There are three approaches to implement a
Self Awareness AI does not exist in reality so far and it reinforcement learning algorithm-
is kind of hypothetical concept. These types of machine • Value based
will be smarter than human mind. • Policy based
Application of AI– • Model based
Now-a-days, AI has many applications and it is making Intelligent Agent in AI–
our daily life more comfortable and fast. The application • Intelligent agents can be any entity or object such as
of AI is widely used in many fields such as- human beings, software and machines etc. that enables
artificial intelligence to be put into action.
• It uses actuators to initiate action in that environment.
• The two main functions of intelligent agents include
perception and action. Perception is done with the
help of sensors while actions are initiated with the
help of actuators.
There are three forms of intelligent agent-
Human Agent– Human agent uses eyes, nose, tongue
and other sensory organs as sensors to percept
information from the environment and uses limbs and
vocal-tract as actuators to perform an action based on the
Advantage of AI– information.
• Rational decision maker Robotic Agent– It uses cameras and infrared radars as
• Application in medical industry sensors to record information from the environment; and
• Accurate decision making uses reflex motors as actuators to deliver output back to
• Availability the environment.
Software Agent–
• Reducing human risk
They use keypad strokes, audio commands as input
• New invention
sensors and shows screens as actuators.
• Reduction in human error
• Predictive Maintenance
Disadvantages of AI–
• Lack of qualified professionals
• Loss of jobs Examples of Intelligent agents are Alexa and Siri.
• Privacy concern Condition Action Rule– A condition-action rule is a
• Serious threat to humanity rule that maps a state, condition to an action. If the
condition is true, then the action is taken otherwise not.
• Incurs high cost
Utility Based Agent– A utility-based agent is an agent
• Lacks in creativity that acts based on only on what the goal is, but the best
• Dependency on Machines way to reach that goal. In other words, it is the usefulness
• Potential for misuse of the agent that makes itself distinct from its counter
Machine Learning– Machine learning is an application parts.
of artificial intelligence that provides systems the ability Pattern Matching– It is a method that is used by an AI
to automatically learn and improve from experience entity to understand a certain string of data to find
without being explicitly programmed. sequence of patterns from it. It is a foundational concept
Deep Learning– It is a subfield of machine learning when working with any kind of classification or
concerned with algorithms inspired by the structure and recognition operation.
function of the brain called artificial neural networks. Inference Rules– These are templates for generating
Natural Language Processing (NLP)– It is a branch of valid arguments. Inference rules are applied to derive
AI that enables machines to understand the human proofs in AI, and the proof is a sequence of the
language. The goal of NLP is to build system that can conclusion that leads to the desired goal.
Programming Fundamentals 69 YCT
Inference Engine– In the field of Artificial intelligence, sophistication of Machine Learning, which enables the
it is a component of the system that applies logical rules analysis of large chunks of Big Data.
to the knowledge base to deduce new information. • Resurging interest in machine learning is due to the
Knowledge-Based Agents– They are the agents who same factors that have made data mining and Bayesian
have capability of maintaining an internal state of analysis more popular than ever.
knowledge, reason over that knowledge, update their • Things like growing volumes and varieties of
knowledge after observations and take actions. available data, computational processing that is
Heuristic Approach– they are used in machine learning cheaper and more powerful, and affordable data
and artificial intelligence when it is impractical to solve a storage.
particular problem with a step by step algorithm. • Machine Learning has also changed the way data
Machine Learning . extraction and interpretation are done by automating
generic methods or algorithms, thereby replacing
• Machine learning is a branch of artificial intelligence traditional statistical techniques.
(AI) and computer science which focuses on the use Features of Machine Learning–
of data and algorithms to imitate the way that humans
Machine learning is unique within the field of artificial
learn, gradually improving its accuracy.
intelligence because it has triggered the largest real-life
• It is an application of artificial intelligence (AI) that impacts for business. Followings are the features of
provides systems the ability to automatically learn and machine learning.
improve from experience without being explicitly
• It uses data to detect various patterns in a given
programmed.
dataset.
• Machine learning makes computers more intelligent
• Accurate data analysis.
without explicitly teaching them how to behave.
• Business intelligence at its best.
• Machine learning is an important component of the
growing field of data science. • The ability to perform automated data visualization.
• Through the use of statistical methods, algorithms are • Automation at its best.
trained to make classifications or predictions, • Customer engagement like never before.
uncovering key insights within data mining projects. • The ability to take efficiency to the next level when
• Machine learning algorithms build a model based on merged with IoT.
sample data, which is known as training data. • Machine learning is a data-driven technology.
History of Machine Learning– • It is much similar to data mining as it also deals with
• Machine learning is one way to use AI. It was defined the huge amount of the data.
in the 1950s by AI pioneer Arthur Samuel as “the • Machine learning learns from past data and improves
field of study that gives computers the ability to learn automatically.
without explicitly being programmed.” Advantages of Machine Learning
• Arthur Samuel, a pioneer in machine learning, created • Continuous improvement
a program for playing championship-level computer
• Easily identifies trends and pattern
checkers.
• No human Interventions needed (automation)
• The game used alpha-beta pruning instead of
researching each and every possible path that • Wide range of applications
measured the chances of winning. • Handling multidimensional and multi-variety data
• Apart from it, he used a minimax algorithm (which is Disadvantages of Machine Learning
still widely used for games today) of finding the • Data Acquisition
optimal move, assuming that the opponent is also • Time and Resources
playing optimally. • Interpretation of Results
• And he also designed methods for his program to • High Error Susceptibilities
continuously improve, for example, by remembering
Difference Between Artificial Intelligence and
previous checker moves and comparing them with
Machine Learning
chances of winning.
Artificial Intelligence Machine Learning
• The father of machine learning is Geoffrey Everest
Hinton. 1. The aim of AI is to Machine learning
Why machine learning ? increase success and works to increase
not accuracy. accuracy but is not
• The rapid evolution in Machine Learning has caused a
concerned with success.
subsequent rise in the use cases, demands, and the
sheer importance of ML in modern life. 2. It works as a computer It is a concept machine
• Big Data has also become a well-used buzzword in the program which works which has the ability
last few years and this is, in part, due to the increased smartly. to learn from data.

Programming Fundamentals 70 YCT


3. The goal is for AI to The goal is for a containing data points that are neither classified nor
stimulate natural machine to learn from labeled.
intelligence required data on how a task • In other words, unsupervised learning allows the
to solve complex must be performed to system to identify patterns within data sets on its own.
problems. maximize the • The goal of unsupervised learning is to find the
performance of the underlying structure of dataset, group that data
machine in the according to similarities, and represent that dataset in
particular task. a compressed format.
4. AI involves decision ML involves the It is categorised into two types of problems:
making. creation of self-
learning algorithms.
5. AI involves decision ML will only work to
making. find the solution
regardless of whether
it is optimal or not.
6. AI leads to ML only leads to
intelligence or wisdom knowledge which can
which can be gained. be gained. Advantages of Unsupervised Learning–
• Labeling of data demands a lot of manual work and
Types of Learning expenses.
Supervised Learning– • It solves the problem by learning the data and
• Supervised learning, also known as supervised classifying it without any labels.
machine learning, is a subcategory of machine • This is the perfect tool for data scientists, as
learning and artificial intelligence. unsupervised learning can help to understand raw
• It is defined by its use of labeled datasets to train data.
algorithms that to classify data or predict outcomes • It is similar to human intelligence in some way as the
accurately. model learns slowly and then calculates the result.
• In the real-world, supervised learning can be used for Disadvantages of Unsupervised Learning–
Risk Assessment, Image classification, Fraud
• The more the features, the more the complexity
Detection, spam filtering, etc.
increases.
Supervised learning is further divided into two types of
problems: • It does not consider spatial relationships in the data.
• It can take time to interpret the spectral classes.
• It is costlier as it might require human intervention to
understand the patterns and correlate them with the
domain knowledge.
• It is not always certain that the obtained results will be
useful since there is no label or output measure to
confirm its usefulness.
Advantages of Supervised Learning– Semi Supervised Learning–
• It allows to collect data and produces data output • It is a type of machine learning algorithm that lies
from previous experiences. between supervised and unsupervised machine
• It helps to optimize performance criteria with the help learning.
of experience. • To overcome the drawbacks of supervised learning
• It helps to solve various types of real-world and unsupervised learning algorithms, the concept of
computation problems. Semi-supervised learning is introduced.
Disadvantages of Supervised Learning– Advantages of Semi Supervised Learning–
• Classifying big data can be challenging. • Simple and easy to understand highly efficient.
• Computation time is vast for supervised learning. • Used to solve drawbacks of Supervised and
• Unwanted data downs efficiency. Unsupervised Learning algorithms.
• Always in need of updates. • It reduces the amount of annotated data used.
• Anyone can over fit supervised algorithms easily. Disadvantages of Semi Supervised Learning–
Unsupervised Learning • Iteration results are not stable.
• Unsupervised learning refers to the use of artificial • It is not applicable to network-level data.
intelligence algorithms to identify patterns in data sets • It has low accuracy.
Programming Fundamentals 71 YCT
Reinforcement Learning– Support Vector Machine–
• Reinforcement Learning (RL) is the science of • Support Vector Machine is one of the most popular
decision making. It is about learning the optimal Supervised Learning algorithms, which is used for
behavior in an environment to obtain maximum Classification as well as Regression problems.
reward. However, primarily, it is used for Classification
• In general, a reinforcement learning agent is able to problems in Machine Learning.
perceive and interpret its environment, take actions • In this algorithm, we plot each data item as a point in
and learn through trial and error. n-dimensional space (where n is number of features
• Examples of Reinforcement Learning are Robotics, we have) with the value of each feature being the
AlphaGo and Autonomous Driving,etc. value of a particular coordinate.
Note– kNN (k- Nearest Neighbors)–
• RL is a separate paradigm of machine learning. • K-nearest neighbor, also known as the KNN
algorithm, is a non-parametric algorithm that classifies
• RL does not require a supervisor or a pre-labelled data points based on their proximity and association to
dataset; instead, it acquires training data in the form of other available data.
experience by interacting with the environment and
• This algorithm assumes that similar data points can
observing its response.
be found near each other.
Advantages of Reinforcement Learning–
• As a result, it seeks to calculate the distance between
• It focuses on the problem as a whole. data points, usually through Euclidean distance, and
• RL does not need a separate data collection step. then it assigns a category based on the most frequent
• It works in dynamic and uncertain environments. category or average.
Disadvantages of Reinforcement Learning– K-Means–
• Reinforcement learning agent needs extensive experience. • It is a type of unsupervised algorithm which solves the
• Lack of interpretability. clustering problem.
• Delayed rewards. • Its procedure follows a simple and easy way to
Algorithms of Machine Learning– classify a given data set through a certain number of
clusters .
Following are some popular machine learning
algorithms. • Data points inside a cluster are homogeneous and
heterogeneous to peer groups.
Linear Regression–
Random Forest–
• Linear Regression Algorithm is a machine learning
• Random Forest is a classifier that contains a number
algorithm based on supervised learning.
of decision trees on various subsets of the given
• It is used to estimate real values based on continuous dataset and takes the average to improve the predictive
variable(s). Here, we establish relationship between accuracy of that dataset.
independent and dependent variables by fitting a best • It belongs to the supervised learning technique and It
line. This best fit line is known as regression line and can be used for both classification and regression
represented by a linear equation Y= a *X + b. problems in machine learning.
In this equation ,here • The "forest" refers to a collection of uncorrelated
Y – Dependent Variable decision trees, which are then merged together to
a – Slope reduce variance and create more accurate data
X – Independent variable predictions.
b – Intercept • It is a widely used and effective machine learning
Logistic Regression– algorithm based on the idea of bagging.
It predicts the probability of occurrence of an event by Anomaly Detection–
fitting data to a logit function. Hence, it is also known as Anomaly detection is one of the most common use cases
logit regression. Since, it predicts the probability and its of machine learning.
output values lies between 0 and 1. Finding and identifying outliers helps to prevent fraud,
Decision Tree– adversary attacks, and network intrusions that can
• It is a type of supervised learning algorithm that is compromise your company’s future.
mostly used for classification problems. Pattern Recognition–
• It works for both categorical and continuous • Pattern recognition is the use of computer algorithms
dependent variables. to recognize data regularities and patterns in machine
• In this algorithm, we split the population into two or learning.
more homogeneous sets and this is done based on • And this type of recognition can be done on various
most significant attributes or independent variables to input types, such as biometric recognition, colors,
make as distinct groups as possible. image recognition, and facial recognition.
Programming Fundamentals 72 YCT
Find-S Algorithms– Python is a great choice for–
• It is a basic concept learning algorithm in machine • Web and Internet Development
learning. • Scientific and Numeric Computing
• The find-S algorithm finds the most specific • Education
hypothesis that fits all the positive examples.
• Software Development
Backpropagation Algorithm–
• GUI Development
• Backpropagation algorithm is probably the most
fundamental building block in a neural network. • Games
• It is used to effectively train a neural network through • Business Applications
a method called chain rule. History of Python–
• The general tasks that are performed with • Python was created by Guido van Rossum, and first
backpropagation algorithm is pattern mapping, released on February 20, 1991.
prediction and function approximation etc. • The name of the Python programming language
Bayes Rule– comes from an old BBC television comedy sketch
• Bayes theorem helps to contribute more accurate series called Monty Python’s Flying Circus.
results. Advantages of Python
• Bayes Theorem is used to estimate the precision of Easy to Read, Learn and Write–
values and provides a method for calculating the • Python is a high-level programming language that has
conditional probability. English-like syntax.
MDL– • And that makes it easier to read and understand the
The minimum description length (MDL) principle is a code therefore, a lot of people recommend Python to
powerful method of inductive inference, the basis of beginners.
statistical modeling, pattern recognition, and machine
learning. • Here, we need fewer lines of code to perform the same
task as compared to other major languages like C/C++
PAC–
and Java.
In computational learning theory, probably
approximately correct (PAC) learning is a framework for Interpreted Language–
mathematical analysis of machine learning. It was • Python being an interpreted language it directly
proposed in 1984 by Leslie Valiant. executes the code line by line. In case of any error, it
Inductive Logic Programming– stops further execution and reports back the error
Inductive logic programming is the subfield of machine which has occurred.
learning that uses first-order logic to represent • And it shows only one error even if the program has
hypotheses and data. multiple errors. This makes the debugging process
CBR– easier.
Case-based reasoning (CBR) is an experience-based Improved Productivity–
approach to solve new problems by adapting previously • Python is a very productive language. Due to the
successful solutions to similar problems. simplicity of Python, developers can focus on solving
Python .
the problem.
• They don’t need to spend too much time in
• Python is a general purpose, dynamic, high-level, and
understanding the syntax or behavior of the
interpreted programming language.
programming language.
• It supports an Object Oriented programming approach
Dynamically Typed–
to develop applications and
• Python doesn’t know the type of variable until we run
• It is used in web development, data science, creating
the code. It automatically assigns the data type during
software prototypes, and so on.
the execution.
• Fortunately for beginners, Python has simple easy-to-
use syntax and this makes Python an excellent • The programmer doesn’t need to worry about
language to learn to program for beginners. declaring variables and their data types.
Why Python? Free and Open-Source–
• Python is commonly used for developing websites , • Python comes under the OSI approved open-source
software, task automation, data analysis, and data license and this makes it free to use and distribute.
visualization. • We can download the source code, modify it and even
• Since it is relatively easy to learn, Python has been distribute your version of Python.
adopted by many non-programmers such as • This is useful for organizations that want to modify
accountants and scientists, for a variety of everyday some specific behavior and use their version for
tasks, like organizing finances. development.
Programming Fundamentals 73 YCT
Portability– Python Identifiers
• In many languages such as C/C++, we need to change • An identifier is a name given to entities such as class,
your code to run the program on different platforms. functions, variables, etc.
• That is not the same with Python. We only write once • It helps to differentiate one entity from another.
and run it anywhere. Rules for Defining Identifiers–
Disadvantages of Python– 1. An identifier cannot start with a digit.
Not Memory Efficient- For example-
• For providing simplicity to the developer, Python has
a1( valid declaration)
to do a little tradeoff. And the Python programming
But 1a is not a valid declaration.
language uses a large amount of memory.
• This can be a disadvantage while building applications 2. Keywords cannot be used as identifiers.
when we prefer memory optimization. For example-
Weak in Mobile Computing– assert = 1
• Python is generally used in server-side programming. 3. Special symbols such as !, @, #, $, % etc. cannot be
And we don’t get to see Python on the client-side or used as an identifier.
mobile applications because of the following reasons. For example-
• Python is not memory efficient and it has slow b$ = 3
processing power as compared to other languages. Variables in Python–
Database Access– Defining variables-
• Programming in Python is easy and stress-free. But when • In Python, variables are containers for storing data
we are interacting with the database, it lacks behind. values.
• The Python’s database access layer is primitive and • Variable is a name that is used to refer to memory
underdeveloped in comparison to the popular location. Variables in python are also known as an
technologies such as JDBC and ODBC. identifier and used to hold value.
Runtime Errors– For example-
• Python is a dynamically typed language therefore, the a = 10
data type of a variable can be changed anytime. x = "welcome to yct"
• A variable containing integer number may hold a
print(a)
string in the future, which can lead to runtime errors.
print(x)
• Therefore, Python programmers require testing of the
applications. Output–
Slow Speed– 10
• In python programming, the line by line execution of welcome to yct
code often leads to slow execution. Casting in Python–
• The dynamic nature of Python is also responsible for We can specify the data type of a variable by using
the slow speed of Python because it has to do the extra casting.
work while executing code. For example-
• Therefore, Python is not used for purposes where x = str (4)
speed is an important aspect of the project. y = float (4)
Keywords in Python programming– Output- 4
• In Python, keywords are case sensitive and they are 4.0
reserved words. That means we cannot use keywords Get the Type–
as a variable or function. We can also get the data type of a variable by declaring
• Keywords are used to define the syntax and structure type() function.
of the Python language. For example-
Following are some keywords available in Python x=4
programming language.
y = "welcome to yct"
False await else import pass
None break except in raise print(type(x))
True class finally is return print(type(y))
and continue for lambda Output–
as def from nonlocal while <class 'int'>
assert del global not with <class 'str'>
async elif if or yield Single or Double Quotes–
try In python programming language, a string variable can
Note:- All the keywords except True, False and None are be declared either by using single or double quotes and it
in lowercase and they must be written as they are. doesn't make any sense ,both are the same.
Programming Fundamentals 74 YCT
For example– For example–
x = "youth competition times" Converting integer to float-
print(x) N_int = 5
x = 'youth competition times' N_float = 5.5
print(x) N_new = N_int + N_float
Output– print("datatype of N_int:",type(N_int))
youth competition times print("datatype of N_float:",type(N_float))
youth competition times
Data Type in Python– print("Value of N_new:",N_new)
• Every value in Python has a datatype. print("datatype of N_new:",type(N_new))
• Since everything is an object in Python programming, After running the above code we get output as :-
data types are actually classes and variables are datatype of N_int: <class 'int'>
instances (object) of these classes. datatype of N_float: <class 'float'>
• Following diagram demonstrates the various types of
data types in python programming language. Value of N_new: 10.5
datatype of N_new: <class 'float'>

Explicit Type Conversion–


In explicit type conversion, users convert the data type of
an object to required data type and for that we use the
predefined functions such as int(), float(), str(), etc to
perform explicit type conversion.
Syntax–
<required_datatype>(expression)
Comments in Python–
For example– To add string and integer data types using
• Comments in python is an essential tool and generally explicit type conversion.
used to explain the code.
a = 50
• They describe what is going on inside a program, so
b = “100”
that a person looking at the source code does not have
result1 = a + b
a hard time figuring it out.
b = int(b)
• We use the hash (#) symbol to start writing a comment
result2 = a + b
in python.
print(result2)
For example-
Output–
#Proof of comments here is given .
Traceback (most recent call last):
print(" Hello, welcome to yct!")
File “”, line 1, in
TypeError: unsupported operand type(s) for +: ‘int’ and
Output– Hello, welcome to yct!
‘str’
Multi Line Comments in Python–
150
• Python does not really have a syntax for multi line
In the above example, variable a is of the number data
comments.
type and variable b is of the string data type. When we
• To add a multiline comment we can insert a # for try to add these two integers and store the value in a
each line: variable named result1, a TypeError occurs as displayed
For example– in the output. So, in order to perform this operation, we
# youths competition times have to use explicit type casting. As we can see in the
# is one of the best publication above code block, we have converted the variable b into
# for competitive exams int type and then added variables a and b. The sum is
print("Hello, welcome to yct!") stored in the variable named result2, and when printed it
Type Conversion in Python– displays 150 as output, as we can see in the output block.
The process of converting the value of one data type Python Namespace–
such as (integer, string, float, etc.) to another data type is A namespace is a collection of names and python
known as type conversion. There are two types of type implements namespaces as dictionaries.
conversion. A namespace allows us to have unique names for each
Implicit Type Conversion– object If we don’t know, this is just a quick reminder to
In Implicit type conversion, Python automatically tell us that strings, lists, functions, etc. everything in
converts one data type to another data type. python is an object.
Programming Fundamentals 75 YCT
In other words, we can say that the role of a namespace Output–
is like a surname. 1
Namespaces are of basically three types:- 2
1. Built-in Namespace– It includes functions and 3
exception names that are built-in in Python. 4
2. Global Namespace– It includes names from the Break Statement in Python–
modules that are imported in the project. It is created
With the help of break statement we can stop the loop
when we include the module and it lasts until the even if the while condition is true.
script ends.
For example- Exit the loop when i is 4.
3. Local Namespace– It is created when the function is
called and the scope ends when the value is returned. i=1
if...else Statement in python– while i < 8:
If statement print(i)
Syntax– if (i == 4):
if test exp: break
statement(s) i += 1
if...else Statement Output–
Syntax– 1
if test exp: 2
Body of if 3
else: 4
Body of else Pass Statement in Python–
if...elif...else In Python programming, the pass statement is a null
Syntax– statement. It is generally used as placeholder.
if test exp: Syntax– pass
Body of if Errors and Exceptions in Python–
elif test exp: Syntax Errors– when error caused by not following the
Body of elif proper syntax of the language is called syntax error or
else: parsing error.
Body of else Exceptions– when errors occurring at runtime (after
Loop in Python Programming– passing the syntax test) are called exceptions or logical
For loop– A for loop is used for iterating over a errors.
Exception Handling in Python–
sequence (that is either a list, a tuple, a dictionary, , or a
string). • When exceptions occur, the Python interpreter stops
Syntax– the current process and passes it to the calling process
for val in sequence: until it is handled. If not handled, the program will
loop body crash.
• These exceptions can be handled using the try
For example– statement.
fruits = ["mango", "banana", "orange"] RegEx in Python–
for x in fruits: A regular expression is a sequence of characters that
print(x) defines a search pattern. A pattern defined using RegEx
Output– mango can be used to match against a string.
banana Iterators in Python–
orange An iterator is an object that implements the iterator
While Loop– With the help of while loop we can protocol. In other words, an iterator is an object that
execute a set of statements as long as a condition is true. implements the following methods:
Syntax– • __iter__ - It returns the iterator object itself.
while test_expression: • __next__ - It returns the next element.
body of while Generators in Python–
For example– • Python generators are a simple way of creating
i=1 iterators.
while i < 5: • A generator is a special type of function which does
print(i) not return a single value, instead, it returns an iterator
i += 1 object with a sequence of values.
Programming Fundamentals 76 YCT
• In a generator function, a yield statement is used • Then all the nodes validate the information on the
rather than a return statement. block.
File Handling in python– • After validation, it gets added to the chain.
Python has a number of functions for creating, reading, • And thus , finally the transaction gets verified and
updating, and deleting files. The key function for executed.
working with files in Python is the open() function. The History of Blockchain
open() function takes two parameters; filename, and • Blockchain technology was first outlined in 1991 by
mode. Stuart Haber and W. Scott Stornetta, two researchers
f = open(filename, mode) who wanted to implement a system where document
There are four different modes for opening a file:- time stamps could not be tampered with.
"r" - Read - Opens a file for reading • Satoshi Nakamoto conceptualized the first blockchain
"a" - Append - Opens a file for appending in 2008 from where the technology has evolved and
"w" - Write - Opens a file for writing found its way into many applications beyond
"x" - Create - Creates the specified file cryptocurrencies.
• Satoshi Nakamoto released the first whitepaper about
Blockchain .

the technology in 2009. In the whitepaper, he gave the


• A blockchain is a distributed database that is shared details of how the technology was well equipped to
among the nodes of a computer network. enhance digital trust given the decentralization aspect
• As a database, a blockchain stores information that means nobody would ever be in control of
electronically in digital format. anything.
• It is a digital decentralized (no financial institutions • But Nakamoto's white paper was just the beginning
involved) and distributed ledger. and In 2009, bitcoin went from concept to reality.
Benefits of Blockchain Technology–
• In layperson’s terms, it is a database that stores
records and transactions on multiple computers Better Transparency– Blockchain is a type of
distributed ledger and all nodes in the network share a
without one controlling party and according to an
copy of documentation. The data on the blockchain
agreed policy.
ledger is easily accessible for everyone to see. If a
• The data that is stored is a block, and the blocks are transaction history changes, everyone in the network can
linked (chained) together to form a blockchain. see the change and the updated records. That is why, all
• The blockchain is distributed across a peer-to-peer the information about currency exchange is available to
(P2P) network and It is made up of data blocks that everyone.
are linked together to form a continuous chain of Enhanced Security– The shared documentation of
immutable records. transactions can only be updated or modified with the
• The concept of proof-of-work (PoW) was introduced consensus on a blockchain network. The information is
to verify computational effort and deter cyber attacks. edited only if everyone or majority of nodes agree to
• To prevent bad actors from validating bad transactions update a record. Moreover, when a transaction is
approved then it is encrypted and connected with the
or double spends, blockchains are secured by a
previous transaction. Therefore, nobody or any third
consensus mechanism such as proof of work (PoW) or
party has the potential to change a record.
proof of stake (PoS). And these methods allow for
Reduced Costs– As blockchain eliminates the need
agreement even when no single node is in charge.
for third parties and middlemen and it saves big costs in
How the Blockchain Technology Works– business as we can trust the trading partner. We don't
• The goal of blockchain is to allow digital information need anyone else to establish the rules and policies of
to be recorded and distributed, but not edited. exchange. The cost and effort spent on the
• Therefore, a blockchain is the foundation for documentation and its revisions are also saved because
immutable ledgers, or records of transactions that everyone gets to view a single immutable version of the
cannot be altered, deleted, or destroyed. ledger.
• That is why blockchains are also known as a Improved Speed and Efficiency–
distributed ledger technology (DLT). With traditional paperwork processes , completing a
Followings are the steps in which a Blockchain transaction is exhausting as it requires third party
technology works: meditation and is prone to human errors. Blockchain can
streamline and discipline these legacy methods and
• Firstly, the users requests for a transaction and then.
remove the risk of errors and it makes trading more
• A block representing the transaction is created. efficient and faster and leads to much less clutter.
• Thereafter, the block is broadcasted to all the nodes in True traceability– In complex supply chains, it is
the network. difficult to trace products back to their origins. But , with
Programming Fundamentals 77 YCT
the help of blockchain, the exchanges of goods are 4. Network layer
recorded. Therefore, we get an audit trial to learn from 5. Infrastructure layer
where a particular asset came and we also get to know Web3 the New Internet
every stop the product made on its journey. This Artificial Intelligence– it understands information
traceability of products can help in verifying the like humans with natural language processing.
authenticity and prevent frauds.
Ubiquity– All the devices would be connected to
Drawback of Blockchain Technology–
the network.
Scalability– Blockchain's application Bitcoin is
Enhanced Connectivity– it uses semantic metadata
massively popular , however, it can only handle 7
for better connectivity.
transactions per second whereas Hyperledger can handle
Semantic Web– it focuses on web content rather
10k and Visa 56k transactions per second. The practical
than keywords.
use of blockchain gets a bit hard to believe with the issue
of scalability in view. 3D Graphics– it utilizes virtual reality therefore, it
offers more realistic and natural looking graphics.
Storage– Since Blockchain databases are stored
Peer to peer network:- it is a decentralized network
indefinitely on all network nodes and the issue of storage
that gets rid of centralized authority.
surfaces. With the increasing number of transactions, the
size of the database will expand and there is no way Example of Popular Blockchain Platforms–
personal computers can store unlimited data and it only Hyperledger–
gets appended. To put this in perspective, the Ethereum • It is one of the best blockchain platforms that is used
blockchain is expanding at the speed of 55 GB per year in almost any kind of sector.
as of 2017. It is at 180 GB per year. • It offers some of the most lucrative features on the
Privacy– Data on a public blockchain is encrypted market –
and anonymous but it lies in the hands of all nodes in the 1. Data availability based on the need to know the
network. Therefore, everyone in the network has a right concept.
to access this data and there is a possibility that someone 2. Safety protocols that will safeguard our information.
can track down the identity of a person in the network 3. Permissioned network that can be used to add
through transactional data. privacy in our network.
Regulation– Regulatory regimes in the financial Ethereum Enterprise–
field are a challenge for blockchain' s implementation. • Ethereum is also great for all kinds of industry.
Blockchain applications will have to lay down the However, as it is public, it might not be suitable for
process of pinpointing a culprit in case of a fraud blockchain technology in banking.
happens and that is a bit of a challenge.Other regulatory • But its commercial version Ethereum Enterprises
aspects of a blockchain technology will need to be laid offers a private channel in the architecture. Therefore,
down first for facilitating its wide adoption. that version is most suitable for blockchain technology
Security– Satoshi Nakamoto highlighted the 51% in banking.
attack when he launched Bitcoin. The attack can simply R3 Corda–
be put such as - if 51 % of the nodes in a network lie and Corda comes with two different versions – enterprise
it will have to be accepted as truth. So everyone in the Corda and Corda.
network will have to constantly have a watch on to In reality, the enterprise Corda is most suited for any
perceive any unwanted influence. kind of enterprise use cases.
Layers of Blockchain Technology– It provides some of the lucrative features such as –
• Blockchain technology is an amalgamation of various • The monitoring system that allows any user to locate
technologies coming together under one roof to help any disasters and recover them.
the system run smoothly. • Blockchain application firewall that safeguards the
• Mathematical computation, cryptography, game whole network from any kind of cyber-attack.
theory, peer-to-peer systems, and validation protocols Quorum–
essentially join forces to power blockchain operations. • It came when the enterprises were looking for a good
• Blockchains have a layered architecture to facilitate solution that can ensure their full confidentiality.
this unique way of authenticating transactions. • Instead of depending on typical power-consuming
Primarily there are five layers of blockchain technology: ones, it offers a faster and better algorithm.
1. Application layer • It provides private transactions, permissioned
2. Services layer network, node management, high scalability for better
3. Semantic layer experience and faster settlement to save time.
Programming Fundamentals 78 YCT
Types of Blockchain– Taxation– with the help of a decentralized ledger ,
There are four types of blockchain structures: the Government can bring up better transparency in
Public Blockchains– solving tax issues.
• They are permissionless in nature and allow anyone to UTXO- The term UTXO refers to the amount of
join, and are completely decentralized. digital currency someone has left remaining after
executing a cryptocurrency transaction such as bitcoin.
• Public blockchains allow all nodes of the blockchain
to have equal rights to access the blockchain, create It stands for unspent transaction output.
new blocks of data, and validate blocks of data. Principles and Programming
• Public blockchains are primarily used for exchanging
and mining cryptocurrency.
Techniques
Private Blockchains– • Programming principles help an individual to
• Private blockchains, which is also referred to as become a good programmer.
managed blockchains, are permissioned blockchains • After learning these coding principles a
controlled by a single organization. programmer or developer becomes more efficient
• In a private blockchain, the central authority and able to produce code which is easier to
determines who can be a node. maintain.
• The central authority also does not necessarily grant • It also helps in saving development and
each node with equal rights to perform functions. maintenance time as well.
• Private blockchains are only partially decentralized Programming principles–
because public access to these blockchains is • Programming is the process of coding, testing,
restricted. troubleshooting, debugging and maintaining a system.
Consortium Blockchains– • Programming principles help us to write excellent
• Consortium blockchains are permissioned blockchains quality of code and maintain a good coding practice.
governed by a group of organizations, rather than one Following are certain programming principles that can
entity. help to be a better coder.
• Consortium blockchains, therefore, enjoy more KISS(keep it simple, stupid)–
decentralization than private blockchains, resulting in This programming principle is one of the most important
higher levels of security. principles. Writing simple code is a good sign of a
Hybrid blockchains– programmer. Writing a thick block of advanced and
• Hybrid blockchains are blockchains that are controlled complicated code does not make any sense. Therefore,
by a single organization, but with a level of oversight this principle suggests making coding as simple as
performed by the public blockchain that is required to possible.
perform certain transaction validations. Therefore, when you write code your solution or logic
• An example of a hybrid blockchain is IBM Food should not be complicated that takes a lot of time and
Trust, which was developed to improve efficiency effort to understand. That is why, always try to simplify
throughout the entire food supply chain. your code using different approaches such as breaking a
Blockchain Technology for Government Services– complex problem into smaller chunks or taking out some
A blockchain-based government has the potential to unnecessary code you have written.
solve legacy pain points and it helps in the following For example:-
fields: function addNumbers(n1,n2)
Legal enforcement– The Government can use {
public blockchain data to monitor transactions to return n1 + n2;
facilitate legal transactions and stop money laundering.
}
Welfare distribution– Blockchain technology can
In the above simple function , it is very easy to know and
help to cut off the system losses which will pave the way
understand what is going on.
for better welfare distribution.
Write DRY Code–
Healthcare services– Government can improve
healthcare services by using distributed ledgers. • DRY stands for don't repeat yourself. DRY is a
programming principle which focuses on mainly not
Cyber protection– Government can use blockchain
repeating the code.
technology to protect vital government infrastructure
against hacks and cyber attacks. • It avoids duplication of data or logic while writing
Security and safety– Government can provide code.
better social security against online frauds with the help • It states that a piece of code should be implemented in
of blockchain technology. just one place in the source code.
Programming Fundamentals 79 YCT
For example– Suppose you want to print 15 lines in a • This means that a class will do only one job, which
program then you write 15 blocks of code. But a good leads us to conclude it should have only one reason to
programmer will try to use a loop or some logic instead change.
of writing the duplicate lines. Following diagram illustrates the single responsibility
Open/ Closed Principle(OCP)– principle very well.
A module should be open for extension but closed
for modification. This is an important principle when
releasing a library or framework that others will use.
Following diagram demonstrates the open/ closed
principle very well.

Separation of Concerns–
• Separation of concerns is a principle used in
programming to separate an application into units,
with minimal overlapping between the functions of
the individual units.
• The separation of concerns is achieved using
Composition Over Inheritance– modularization, encapsulation and arrangement in
• The Composition Over Inheritance principle is very software layers.
useful while writing code by using object- oriented Following diagram demonstrates the separation of
programming . concerns.
• It states that objects with complex behaviors should
contain instances of objects with individual behaviors
and they should not inherit a class and add new
behaviors.
• Only relying on inheritance causes two major
problems. First, the inheritance hierarchy can get
messy in a hurry and we also have less flexibility for
defining special-case behaviors.
Following diagram illustrates composition over
inheritance.

You Aren't Going to Need It (YAGNI)–


• YAGNI originally is an acronym that stands for "You
Aren't Going to Need It". It is a mantra from extreme
programming that is often used in agile software
teams.
• "YAGNI" is a principle which arose from extreme
programming that states a programmer should not add
functionality until deemed necessary.
• XP co-founder Ron Jeffries has written: "Always
Single Responsibility implement things when you actually need them, never
• As the name suggests, this principle states that each when you just foresee that you need them."
class should have one responsibility, one single Following diagram illustrates YAGNI principle in
purpose. beautiful way-
Programming Fundamentals 80 YCT
Introduction of Object Oriented
Programming (OOPs)
• The concept of object-oriented programming (OOP)
was coined by Alan Kay at grad school.
• OPP first came into picture in 1970's by Alan and his
team and later it was used by some programming
languages and was implemented successfully.
Smalltalk was first language to use pure OOP
Refactoring– concepts and followed all the rules strictly.
• Refactoring is a systematic process of improving code • The concept of object-oriented programming was
without creating new functionality. brought to remove the flaws encountered in the
• Refactoring transforms a mess into clean code and procedural approach.
simple design. • Object-oriented programming treats data as a critical
• It is the process of changing a software system in such element in the program development and it does not
a way that it doesn't change the external behavior of allow it to flow freely around the system.
code and yet improves its internal structure. • OOP ties data more closely to the functions that
Interface Segregation Principle– operate on it and protects it from accidental
• It segregates interfaces as per requirements of the modification from outside functions.
program, rather than one general purpose • OOP gives permission for the decomposition of a
implementation. problem into a number of entities which is called as
• The Interface Segregation Principle was defined by objects and then create data and functions around
Robert C. Martin while consulting for Xerox to help these objects.
them build the software for their new printer systems. • Or in other words we can say that the main goal of
• He defined it as “Clients should not be forced to OOP is to make complex code simpler and for this the
depend upon interfaces that they do not use.” program is divided into independent blocks which are
Following diagram demonstrates the interface known as objects.
segregation principle-
• The data of an object can be accessed only by the
function associated with that object, therefore,
function of one object can access the function of other
objects. following is the diagram that illustrates the
organization of data and function in object oriented
programming.

Dependency inversion Principle


• The Dependency Inversion Principle (DIP) states that
high level modules should not depend on low level
modules; both should depend on abstractions.
• Abstractions should not depend on details but details
should depend upon abstractions.
Following diagram illustrates the dependency inversion
principle–
Basic Concepts of OOPs–
OOPs refers to languages that aims to implement real
world entities such as inheritance, polymorphism,
dynamic binding and message passing etc.
OOPs includes–
Object–
• Objects are the basic-run time entities and they can be
a person, a place, a bank account or a table of data etc
• It may also represent user-defined data like vectors,
time and lists as well.
Programming Fundamentals 81 YCT
• An objects is an instance of a class and when a class is Inheritance–
defined then no memory is allocated but when it is • Inheritance is the process by which objects of one
created then memory allocation is done. class acquire the properties of objects of another class.
• An object has an identity, state and behavior. • It supports the concept of hierarchical classification.
For example. • It allows to create new class (derived class) from an
"Dog" is a real-life object that has certain existing class (base class).
characteristics such as color, bark, eats etc.
For example

Class–
• Objects are variables of the type class and once a class
is defined then we can create any number of objects
belonging to that class.
• A class is therefore, a collection of objects of similar
OR
type and it represents the set of properties or methods
that are common to all objects of one type. Class Animal {
• A class is like a blue print for an object. // eat () → function
For example– Mango, apple and orange are members // shout () → function
of a class fruit. };
fruit mango; class Dog: public Animal{
↓ ↓ // bark () → function
(class) (object) };
Data abstraction– Data abstraction refers to the act Note– In OOP the concept of inheritance provides the
of providing essential features without including the idea of reusability that means we can add additional
background details or explanations. features to an existing class without modifying it.
For example- A man who knows to drive a car but There are many forms of inheritance-
does not know the inner mechanism of car how it runs. Single inheritance–
Note– This is a form of inheritance in which a class inherits
• Attributes are sometime called as data members only one parent class.
because they hold information.
for example
• The functions which operate on these data are
sometime is called as method or member functions.
Encapsulation–
• In general, encapsulation is a process of wrapping
similar code in one place. In the above diagram, class y extends only class x and
• It involves the bundling of data members and class x is a super class and class y is a sub-class.
functions inside a single class. Multiple Inheritance–
• Bundling similar data members and functions inside Here, one class extends more than one class.
a class together helps in data hiding as well.
For example
class Rect
{
public:
int leng; Note-: Java does not support multiple inheritance.
int brdth; Multilevel Inheritance– Here, one class can inherit
int getArea() from a derived class; therefore, the derived class
{ becomes the base class for the new class.
return long * brdth;
}
};

in the above code leng and brdth are data members and
the function get Area () are kept together in Rect class.
Programming Fundamentals 82 YCT
Hierarchical Inheritance– Here, one class is For example
inherited by many sub classes. Class Text
{
public:
void display ()
It is clear from the above diagram that class b, class {
c and class d inherit the same class. cout << "Text class";
Hybrid Inheritance– }
It is also known as multipath inheritance due to the };
subclass deriving its properties from super class Class Derived: public Text
following the various paths. {
public:
void display ()
{
cout << "Derived class";
}
}
Polymorphism– Polymorphism, a Greek term, Now, it is clear from the above example that function
which means the ability to take more than one form. It is display () is overridden in the derived class.
the same entity (function or operator) that behaves Dynamic binding–
differently in different scenarios. • Dynamic binding means that a block of code executed
For example– (+) operator in C++ programming is with reference to a procedure (method) call is
used in two ways- determined at run time.
First as arithmetic operation as addition and second • Dynamic binding is also called as late binding or run-
as string concatenation or in layman words we can say, a time binding
lady can perform as a teacher in school and mother at Message passing–
home. • Objects communicate with one another by sending
Polymorphism is mainly divided into two parts– and receiving information to each other. A message
• Compile time polymorphism for an object is a request for execution of a procedure
• Runtime polymorphism (method) and that is why it invokes function in the
• Compile time polymorphism– receiving object that generates the desired results.
It is achieved by function overloading or operator over • Message passing involves specifying the name of
loading. object, the name of the function and the information to
be sent.
Function overloading–
Constructors–
Function overloading refers to the use of the same
• A constructor is a 'special' member function whose task
thing for different purposes that means we can use the
is to initialize the objects of its class.
same function name to create functions that perform a
variety of different tasks. This is also called as function • It is special because its name is the same as the class
polymorphism in OOP. Functions can be overloaded by name.
change in number of arguments or change in type of • It is invoked whenever an object of its associated class
argument. is created.
Operator overloading– • It is called constructor because it constructs the values
of data members of the class
Overloading means assigning different meanings to
an operation, depending on the context. For example, '+' Syntax–
operator is performed as addition in arithmetic operation Class integer //class with a constructor
and it is also used for concatenate two strings. {
int x, y;
• Runtime polymorphism–
public:
Runtime polymorphism is achieved by function
overriding. integer(void) // constructor declared
..........
Function overriding– It is a feature that allows to
use a function in the child class that is already present in ..........
its parent class. The child class inherits all the data };
members and the member functions present in the parent integer :: integer(void)
class. {
Function overriding means creating a newer version x = 0; y = 0;
of the parent class function in the child class. }
Programming Fundamentals 83 YCT
Destructors– It is used to destroy the object that is Number of objects created 5
created by a constructor. Same as constructor, the Number of objects destroyed 5
destructor is a member function whose name is the same Re-enter main
as the class name but it is preceded by a tidle (~). Number of objects destroyed 4
for example, the destructor for the class text can be Number of objects destroyed 3
defined as- Number of objects destroyed 2
~ class () Number of objects destroyed 1
{ Note–
} 1. A constructors has the same name as that of a class.
For example 2. Constructors are normally used to initialize variables
# include<iostream> and to allocate memory.
using namespace std; Features of OOPs–
int count = 0, • Emphasis in on doing things (algorithms)
class birth • Large programs are divided into smaller programs
{ which is known as functions.
public: • Data is hidden and cannot be accessed by external
birth() functions.
{ • Data move openly around the system from function to
count ++; function.
cout<<"\n number of objects created"<< • Employs top-down approach in program design.
count; Benefits of OOP's–
• With the help of inheritance, we can eliminate
} redundant code and extend the use of existing classes.
~birth (){ • The principle of data hiding helps the programmer to
cout<<"\n number of objects destroyed" build secure programs that can not be invaded by code
<< count; in other parts of the program.
count --; • Software complexity can be easily managed.
} • The data centered design approach enables to capture
}; more details of a model in implementation form.
int main (){ • Message passing techniques for communication
cout<< "\n\ n Enter Main \ n"; between objects make the interface descriptions with
birth B1,B2, B3, B4 external systems much simpler.
{ • Flexibility through polymorphism.
cout<< "\n\n Enter Block 1\n"; • Security→ because of concept of data abstraction,
birth B5; only limited amount of data is shown to user. It allows
} the maintenance of security.
{ Integrated Development Environment
cout<< "\n\ n Enter Block 2 \n"; • Integrated development environments (IDE) are
birth B6; applications that facilitates the development of other
} applications.
cout<< "\n\n Re-enter main \n"; • It provides a central interface with any tools which
return 0; appears convenient for developer to use.
} • It is a build application that combines common
The output of the program is- developer tools into a single graphical user interface
Enter main (GUI). An IDE typically may have source code
Number of objects created 1 editor, local build automation and debugger etc.
Number of objects created 2 History of IDE
Number of objects created 3 • Before the development of IDE, programmer used to
Number of objects created 4 write their program in text editor.
Enter Block 1 • And this involved writing and saving an application in
Number of objects created 5 the text editor before running run the compiler, taking
Number of objects destroyed 5 note of any error messages, and then going back to the
Enter Block 2 text editor to revise their code.
Programming Fundamentals 84 YCT
• During 1983, Borland Ltd. acquired a Pascal compiler Unit Testing–
and published it as Turbo Pascal which had for the It’s necessary to conduct proper testing for checking
first time integrated editor and compiler. the quality of code in the software. We can do the testing
Benefits of Using IDEs– with different types of testing software such as PHPUnit,
It improve developers productivity. Perl TAP, Python unit test, and Ruby’s rake test to
support frameworks for our language.
Boost the speed of development activities.
Code Refactoring & Profiling–
• Keeps developers up to date with the latest practices
It allows to change the code globally, which saves time
and threats.
instead of changing the code manually. Code profiling
• It saves times and a programmer doesn't need to type quickly recognizes the congestion by analyzing the code
out full character sequences. performance based on a function-by-function basis.
• Help developers to organize their workflow and solve Source Code Integration–
problems. An IDE contains necessary commands such as push,
• Syntax highlighting is also common in most IDEs, pull/update, commit, history, etc…, that keeps the
which uses visual cues to distinguish grammar in the application up to date with the team and vice versa
text editor. without using another tool. For example, Komodo IDE
Multi-Language IDE– supports for Subversion, Mercurial, Git, Perforce,
• The multi-language IDE such as Eclipse, Aptana, Bazaar, and CVS.
Komodo, NetBeans, and Geany support multiple Development and Release Tool Integration–
programming languages. The IDE software can easily integrate tools or other
• Eclipse- It supports C++, Perl, Python, Ruby, PHP, systems and allows accessing them easily. Some features
Java and others. It is managed and directed by the include spell-checking, track changes and database
Eclipse.org Consortium.It is a free and open source integrations with the database explorer.
editor for many development frameworks. Important facts
• Aptana- It supports HTML, JavaScript, CSS, AJAX • A static variable retains its value throughout the file of
and others through plugins. It is a popular choice for the program
programmers who do web app development. • A continue statement in a while loop shall transfer
• Komodo- It supports Perl, PHP, Python, Tcl, control to test condition of while loop.
JavaScript, Ruby etc. • Semantic errors can be detected at both compile time
• NetBeans- It supports Java, PHP, JavaScript, C, C++, and run-time only.
Python, Ruby etc. It is also free and open source. • C was primarily developed as a system programming
• Geany- It supports C, PHP, Java, HTML, Perl, language.
Python, Pascal etc. • One of the disadvantages of pass by reference is that
Visual Studio– It supports VB.NET, Visual C++, the called function may inadvertently corrupt the
C#, F# and more. Visual Studio is Microsoft's IDE, caller's data and this can be avoided by declaring the
designed to create apps for the Microsoft platform. formal parameters constant.
MonoDevelop– It supports Visual Basic, C/C++, • Register, Extern and Type def are storage class
C#, and additional .NET languages. specifies in C programming language.
Coda– Supports PHP, CSS, HTML, JavaScript, • The value range for "short" data type in Java is -215
AppleScript, and Cocoa API. This IDE is highlighted as to +215–1.
"one-window development" for Mac users. • In java, the "DataInputastream" class is defined in
Espresso: it supports XML, HTML, CSS, PHP, and java.io package.
JavaScript. Espresso is a tool specifically for Mac web • Earlier name of Java programming language was
programmers. OAK.
Why IDE Should be used– • Object oriented inheritance models "is a kind of"
The functionality of IDE saves time and makes relationship.
coding easier . Followings are certain points that specify • Prepared statement can execute parameterized queries.
why to go for IDE. • The keyword used to transfer control from a function
Debugging– back to the calling function is return.
It is a tool for monitoring and analyzing the • Java is a platform free language.
programs and generates the output as specified. The • Bug means a logical error in a program.
Komodo IDE contains debugging features such as • Polymorphism, Data encapsulation and operator over
breakpoint control, remote debugging, watching loading is the property of object oriented
variables, viewing the call stack, etc. programming.

Programming Fundamentals 85 YCT


• The header file iostream.h is included in C++ program • Throw able is a super class of all errors and exceptions
to use input/output functions. in the Java language
• Member function of a class in C++ can be called by an • Malloc and Calloc is used for dynamic memory
object of that class using dot operator. allocation.
• Relational operator can be overloaded in C++. Virtual • Four types of class members in Java script are
class cannot be instantiated. instance fields, instance, methods, class fields and
• Reusability of code in C++ program is justified with class methods.
the inheritance. • Java provides a monitor like concurrency control for
• Inheriting the attributes of two or more existing threads synchronization
classes at same level for defining new class is called • An exception is caused by a runtime error.
as multiple inheritances. • Bit fields can only be declared as a part of structure.
• In C++ '?' is a Ternary operator. • Unsigned int data type is accepted while declaring bit-
• New keyword is used for memory allocation in C++. fields.
• Destructor destroy the objects when no longer • Runtime polymorphism is achieved by virtual
requires. function.
• In C++ virtual function is defined and declared in base • In java the throw keyword is used to generate
class. exception programmatically.
• Member function with the same name in two different • In a multi file program, the default storage class for a
classes in allowed. function is External.
• Variable, Arrays and class objects can be passed to a • The purpose of abstract class is to provide an
function in C++ appropriate base class from which other classes can
• "Run time binding" is the term used in C++, its inherit.
synonym is polymorphism.
• Mechanism of deriving a class from another derived
• Object occupies space in memory during C++ class is called as inheritance.
program execution.
• The derive class constructor is responsible for passing
• C++, Java and small talk are object-oriented the entire test of arguments needed by base class
programming language. constructors.
• In C++ information hiding is achieved through data • Collection of Java is a group of objects.
encapsulation.
• Java allows programmers to develop the applets,
• During program execution in C++, "divide by zero"
applications and servlets.
error can be handled by exception handling.
• Smalltalk is the pure object-oriented language.
• In C++, the operator overloading is an example of
polymorphism. • Array is a structured data type in C programming
language and it may be defined as a finite ordered
• In (c) language, system level programming can be
collection of data items of the same data type.
done easily because it facilitates bit wise operators.
• 'Union' in 'c' is used to store different members at • In C++, a container is a holder object that stores and
same memory location. manipulates a collection of objects.
• fread(), fseek() and ftell() are common functions that • During a recursive call, all static variables retained
are used for direct/random access file in 'c'. form the last execution.
• In 'c' language '#' notation is used as preprocessor • The first and second arguments of open are a character
directive. string containing the name of the file and the second
agreement is the mode.
• 'call by reference' method uses pointers when
parameters are passed in functions. • The order in which recursive functions are executed is
• A function of a 'C' program cannot return more than last in first out order.
one value. • If only one memory location is to be reserved for a
• String is 'C' is a set of 'characters'. class variable, no matter how many objects are
instantiated, then the variable should be declared as
• "Continue" keywords in 'C' is used to transfer the
static.
control to the beginning of loop.
• LISP programming language provides garbage
• The execution of a 'C' program starts from main()
function. collection automatically.
• In 'C' programming language, dynamic memory is • Exception handling is a type of forward error recovery
allocated using pointers. mechanism.
• A problem whose language is recursion is called • Short in 'C' is the qualifier and int is the basic data
decidable. type.
Programming Fundamentals 86 YCT
• Function overloading is also similar to constructor • The concept of composition facilitates to use the
overloading. objects of one class inside another class.
• The concept of OOps that allows compiler to insert • A constructor class member function automatically
arguments in a function call if it is not specified is initializes the data members.
default arguments. • finalize() function is used to perform some action
• Pure object oriented languages are Java, Simula, when the object is to be destroyed.
Small talk and Eiffel. • The characteristic of a computer system that is capable
• Friend keyword does not appear in the private section of reasoning, learning and problem solving is termed
of a class. as artificial intelligence.
• Function overloading in C++ is a group of function • John McCarthy coined the term "artificial
with the same name. intelligence" and he invented the LISP (list
processing) programming language for artificial
• In C++, the default storage class of local variable is
intelligence.
auto.
• LISP is expression-based and provides high-level
• In object-oriented programming using C++ static debugging and a convenient macro system. prolog
variable is also called as class variable. language is related to artificial language.
• The classes such as anonymous class, nested class and • (.pl) is the extension of prolog source files. SWI-
base class are used to create objects. prolog is a free implementation of the prolog
• A class which can inherit the attributes of two or more programming language.
classes is called multiple inheritance. • In artificial intelligence, utility-based agents describes
• The types of constructors are copy constructor, default high quality behaviors (degree of happiness).
constructor and parameterized constructor. • Another name for lazy learning algorithm is k-Nearest
• Bottom-up approach is generally adopted by C++ Neighbor.
programming. • In NLP, the conference resolution is defined as the
• Serialization process takes place automatically by task of finding all expression that refer to the same
JAVA run time system. entity in a text.
• The 'new' operator in JAVA obtains memory for a • In terms of machine learning the correct full form of
new variable. ROC curve is receiver operating characteristic curve.
• 'This' keyword in JAVA is used to refer to current class • Clustering is an unsupervised machine learning
object. algorithm.
• Primary constant in 'C' are integer, float and character • Prediction is the purpose of regression technique in
etc. machine learning.
• scanf() function receives value from the key board. • For a given current state and an input symbol, if an
automation can only jump to one and only one state
• ?: is a ternary operator.
then it is a deterministic automaton.
• 'go to' keyword should be avoided as for as possible.
• A finite-state machine with no output function at all is
• (!) has the highest priority. known as a semi automation.
• Basic run time entities in an object-oriented system • Omega geometric does not have probabilistic
are objects. acceptance while geometric, quantum finite and
• Examples of OOP language are Ruby, C++ and small metric automation do have probabilistic acceptance.
talk etc. • The field that investigates the mechanics of human
• <stdio.h> may be written as (in C++) <cstdio>. intelligence is cognitive science.
• In the Java statement import Java. • AI computing focus on knowledge and conventional
• Lang.Math; math is class. 'Private' fields enjoy highest computing focus on knowledge and conventional
degree of protection in Java. computing focus on data and information. The
• A package is a collection of classes and interfaces. intelligent agents senses through sensors and take
actions through actuators.
• Basic Java language functions are stored in Java.lang
• AO* algorithm is also called as And-or algorithm.
package. Math is a member of the Java language
package. • Wumpus world problem is example of reasoning with
knowledge.
• Output stream has a method name flush ().
• The process of defining a problem is terms of few
• A class that allows only one object of it to be created, steps and then exploring each of the steps further is
is called singleton class. known as step-wise refinement.
• The concept of Dynamic binding determines method • In AI, the problem solving using judgmental or
to invoke at runtime. common-sense part is generally known as Heuristic
• "Cout" in C++ is an object. approach.
Programming Fundamentals 87 YCT
Important Questions Asked in Previous Years Examinations
1. In which year C language was developed? 14. Which of the following statement is true about
(a) 1972 (b) 1973 for loop?
(c) 1970 (d) 1971 (i) It is used in the case where we need to
2. The person who developed C language is:- execute some part of the code until the
(a) Dennis Henry (b) Dennis Rossum given condition is satisfied.
(c) Dennis Ritchie (d) Bjarne Stroustrup (ii) It is also known as pre-tested loop.
3. The very first JVM compiler was written in- (iii) It is also a post- tested loop.
(a) Java language (b) C language (a) (i) & (ii) (b) (ii) & (iii)
(c) C++ language (d) C# language (c) (iii) only (d) All of the above
15. Which loop does execute the statements inside
4. Which of the following is/are feature of c
the body before checking the condition?
language?
(a) While loop (b) Do- while loop
(a) Memory management (b) Mid- level
(c) For loop (d) None of these
(c) Simple (d) All of the above
16. Which of the following string function is used
5. Which of the following is not a correct
to reverse the string in C language?
declaration of variable in C programming
(a) Strrev() (b) Strupr()
language?
(c) Strrev() (d) strngrv()
(a) int X= 2 (b) int X;
17. Which of the following string function is used
(c) double = 2.5; (d) char a = 'yct';
to return the length of string name in C
6. The variable declared outside the function or language?
block is known as
(a) Strreturn() (b) Strlen()
(a) Local variable (b) Static variable
(c) Strcmp() (d) Strwr()
(c) Dynamic variable (d) Global variable
18. C++ is an extension of ?
7. An empty data type which has no value is (a) C language (b) Jaava language
called
(c) OOPs (d) ADA
(a) Basic (b) Derived
19. Which is not a valid access specifier among the
(c) Void (d) Enumeration following ?
8. Which of the following is used for output and (a) protected (b) public
prints the given statement to the console? (c) derived (d) private
(a) scanf() (b) printed() RPSC VPITI 2018 (CS)
(c) printf() (d) clrscr() 20. In which year C++ was made available outside
9. Which of the following is used for input and Bell Laboratories?
reads the input data from the console? (a) 1986 (b) 1981
(a) scanf() (b) printf() (c) 1982 (d) 1985
(c) stringf() (d) getch() 21. Which of the following is disadvantages of
10. Which of the following is not a c language C++?
keyword? (a) Use of pointers (b) Security issues
(a) auto (b) case (c) Code redundancy (d) All of the above
(c) union (d) structured 22. Which of the following is not a disadvantage of
11. Which of the following header file is used for C++ programming language?
console input/output functions? (a) Code redundancy
(a) studio.h (b) conio.h (b) Security issues
(c) stdlib.h (d) iostream.h (c) Absence of built-in threads
12 A loop in C statement consists of (d) Presence of garbage collector
(a) two parts (b) three parts 23. With reference to C ++ programming
(c) one parts (d) four parts language, which of the following statement
13. Which loop in C programming language is is/are correct?
called as an " Endlessloop"? (i) It is object-oriented programming
(a) while loop (b) do- while loop language.
(c) infinite loop (d) for loop (ii) It supports inline function.
Programming Fundamentals 88 YCT
(iii) It is a high level language. 35. Which of the following is non- primitive data
(iv) It is saved with .cpp extension. type?
(a) (i) & (ii) (b) (i) ,(ii)& (iii) (a) String (b) Boolean
(c) (i) & (iii) only (d) All of the above (c) Char (d) Byte
24. Which of the following is not a keyword in C++ 36. Which of the following does represent floating
programming language? point data type?
(a) signed (b) static (a) Long (b) Double
(c) return (d) constant (c) Byte (d) Integer
25. Which of the following is used for storing text 37. In java programming language the keyword
and it contains the collection of characters which is used to catch the exceptions generated
surrounded by double quotes in C++ ? by try statements?
(a) strings (b) pointers (a) Default (b) Import
(c) Array (d) None of these (c) Catch (d) Package
26. Which of the following is collection of different 38. Which of the following keyword is used to
datatypes and similar to the class that holds indicate that a class is derived from another
different types of data in C++? class or interface?
(a) String (b) Structure (a) Default (b) Extends
(c) Pointers (d) Array (c) Import (d) this
27. ………. is a computer utility program that 39. The keyword which is used to explicitly throw
takes one or more object files generated by a an exception in java is-
compiler and it combines multiple object code (a) throw- out (b) throw in
and links them with libraries? (c) throw (d) throw for
(a) Loader (b) Linker 40. What is the full form of awt in java?
(c) Compiler (d) Assember (a) Allow windows toolkit
28. Who is known as the father of Java? (b) Abstract window toolkit
(a) James Arthur (b) James Gosling (c) Application window toolkit
(c) Dennis M. Ritchie (d) Bjarne Stroustrup (d) None of the these
29. In which year was java language developed? 41. Which of the following package is used in Java
(a) 1995 (b) 1996 program to connect databases such as Oracle
(c) 1994 (d) 1990 or Sysbase and retrieving the data from them?
30. Java is a (a) Java.awt (b) Java.sql
(a) Platform- oriented (b) Platform dependent (c) Java.net (d) Java.io
(c) Platform independent (d) None of these 42. Which of the following package does contain
the classes such as System, String or String
31. Which of the following is a feature of java
Buffer?
language?
(a) Java.lang (b) Java.io
(a) Object- oriented (b) Simple
(c) Java.util (d) Java.net
(c) Portable (d) All of the above
43. Which of the following parameters are used to
32. What is full form of JVM?
print an argument that is passed to it?
(a) Java virtual Machine
(a) String.out.println()
(b) Java volt machine
(b) System.out.println()
(c) Java vehicle machine
(c) Strings.out.printf()
(d) Java volatile machine
(d) Systems.out.println()
33. A variable declared inside the class but outside
44. Which of the following is not a advantages of
the body of the method, is known as using packages in Java?
(a) Instance variable (b) Static variable (a) Name conflict (b) Reusability
(c) Local variable (d) Global variable (c) Access protection (d) Package destroyer
34. The data type that includes Boolean, char , 45. Which of the following components of the .NET
byte, short , int, long float and double is called framework provide an extensible set of classes
as which can be used by any .NET compliant
(a) Static (b) Non primitive programming language?
(c) Global (d) Primitive (a) .Net class libraries
Programming Fundamentals 89 YCT
(b) Common Language Runtime (c) Volume.Net framework
(c) Common Language Infrastructure (d) Versatile Basic .Net
(d) Common Type System 56. Which of the following is a very productive tool
46. Which of the following constitutes the .NET for rapid creation of a wide range of Web,
Framework? Windows, Office, and Mobile applications?
1. ASP.NET Applications (a) C++ (b) Java
2. CLR (c) ADA (d) VB.Net
3. Framework Class Library 57. What is the full form of CLS?
4. WinForm Applications (a) common language specification
(a) 1 & 2 (b) 2 & 3 (b) common language special
(c) 3 & 4 (d) 2 & 4 (c) common language specific
47. Which of the following does execute the actual (d) common level sense
.Net code? 58. Which of the following is the field of computer
(a) CLS (b) MSIL science that is associated with the concept of
machine "thinking like human" to perform
(c) CTS (d) CLR
tasks such as learning, problem solving,
48. Common language specification(CLS)
planning, reasoning and identifying patterns?
(a) is an execution engine for all .Net application
(a) Human learning
(b) is similar to JVM as in Java (b) Deep learning
(c) It defines standard rules for defining .Net (c) Machine learning
compliant languages
(d) Artificial intelligence
(d) It is a compiler
59. Who is known as the father of artificial
49. What is CTS in .NET? intelligence?
(a) defines rules concerning data types (a) Marvin Minsky (b) John McCarthy
(b) defines a set of rules for all compilers to (c) Charles Hawkins (d) a & b
generate manage code for .NET 60. How many types are artificial intelligence
(c) describes a set of features that different based on capabilities?
languages have in common (a) 3 (b) 5
(d) none of the above (c) 7 (d) 6
50. Which of the following is not a .NET 61. Which of the following artificial intelligence is
compatible language? based on capabilities?
(a) C# (b) J# (a) Narrow AI (b) General AI
(c) V(b)NET (d) Java (c) Strong AI (d) All of the above
51. C# is a …… 62. How many types are artificial intelligence
(a) Object-oriented programming language based on functionality?
(b) Procedural language (a) 3 (b) 4
(c) It is similar to java programming (c) 6 (d) 8
(d) It doesn't run on .Net framework 63. Which of the following artificial intelligence is
52. Who is the founder of C# language? based on functionality?
(a) Anders Hejlsberg (b) Mark jukerberq (a) Reactive machine
(c) Charles Hawkins (d) Andrew Thomson (b) Limited memory
53. Which of the following is not feature of C#? (c) Theory of mind & self awareness
(a) Simple (b) Modern (d) All of the above
(c) Type safe (d) Repetition 64. Which of the following artificial intelligence is
54. Which of the following does enable the C# called as weak artificial intelligence?
programs to do almost anything that a native (a) Narrow AI (b) General AI
(c) Strong AI (d) None of these
C++ application can do?
65. ............. artificial intelligence is an artificial
(a) Object-oriented (b) Interoperability intelligence construct that has mental
(c) Type safe (d) Modern capabilities and functions that mimic the
55. VB.Net stands for human brain.
(a) Visual Basic.Net (a) Theory of mind (b) Strong
(b) Visualisation Basic.Net (c) General (d) Narrow
Programming Fundamentals 90 YCT
66. What is the full form of EGAN? (b) NLP may require more keystrokes
(a) Evolution general advisory network (c) It is very time-efficient
(b) Evolutionary genetics advance network (d) NLP helps computers to communicate with
(c) Evolutionary generative adversial networks humans in their languages
(d) Evolution generated advisory networks APPSC Poly. Lect. 13.03.2020
67. Which of the following learns to make better 75. The characteristic of a computer system that is
predictions through repeated trial- and- error? capable of reasoning, learning and problem
(a) Reinforcement learning solving is termed as :
(b) Deep learning (a) artificial intelligence
(c) Machine learning (b) human intelligence
(d) NLP (c) virtual intelligence
68. Which agent does use cameras and infrared (d) common intelligence
radars as sensors to record information from APPSC Poly. Lect. 13.03.2020
environment and use reflex motors as actuators 76. In artificial intelligence, which among the
to deliver output back to the environment? following agents describes high quality
(a) Human agent (b) Robotic agent behaviour (degree of happiness)
(c) Software agent (d) Utility based agent (a) goal-based agents
69. Which one of the following is used in machine (b) simple reflex agents
learning and artificial intelligence when it is (c) utility-based agents
impractical to solve a particular problem with (d) agents that keep track of the world
a step by step algorithm? APPSC Poly. Lect. 13.03.2020
(a) Heuristic approach 77. Who among the following is known as the
(b) Knowledge based agent inventor of LISP?
(c) Pattern recognition (a) John McCarthy
(d) Condition action rule (b) Alan Turing
70. ……….is a method that is used by an AI entity (c) John Backus
to understand a certain string of data to find (d) Marvin Minsky
sequence of pattern from it. APPSC Poly. Lect. 13.03.2020
(a) Inference rule 78. What will be the correct output of the below
(b) Pattern matching line when executed in LISP?
(c) Heuristic algorithm (write-line "Welcome to \ "Park\"")
(d) Natural learning process (a) "Welcome to "Park"
71. Which of the following programming (b) Welcome to "Park"
languages is related to AI (Artificial (c) "Welcome to Park"
Intelligence) development? (d) Welcome to \"Park\"
(a) C language (b) C++ language APPSC Poly. Lect. 13.03.2020
(c) Java language (d) Prolog language 79. Which of the following statements is NOT true
RPSC Lect. 2011 about LISP?
72. Another name for lazy learning algorithm is: (a) It is machine-dependent
(a) K-Nearest Neighbor (b) Regression (b) It is expression-based
(c) Classification (d) Neural Networks (c) It provides a convenient macro system
APPSC Poly. Lect. 13.03.2020 (d) It provides high-level debugging
73. Which is the correct full form of LISP from APPSC Poly. Lect. 13.03.2020
below? 80. What is the extension of Prolog source files?
(a) Language Processing (a) .pl (b) .lg
(b) List Processing (c) .lsp (d) .pg
(c) Language Inspection APPSC Poly. Lect. 13.03.2020
(d) Linguistics Programming 81. Which of the following is a free implementation
APPSC Poly. Lect. 13.03.2020 of the programming language Prolog?
74. Which among the following options is NOT (a) CLISP (b) LNU-Prolog
true with regard to NLP? (c) SWING-Prolog (d) SWI-Prolog
(a) NLP is predictable APPSC Poly. Lect. 13.03.2020
Programming Fundamentals 91 YCT
82. In NLP, the Co-reference resolution is defined 89. The field that investigates the mechanics of
as the: human intelligence is
(a) task anaphora resolution (a) Artificial science
(b) task of determining a computer's logic (b) Cognitive science
(c) task of machine translation (c) Psychology
(d) task of finding all expression that refer to the (d) Sociology
same entity in a text APPSC Lect. Degree College 07.06.2017 (CS)
APPSC Poly. Lect. 13.03.2020 90. AI computing focus on --------and conventional
83. In terms of machine learning, the correct full computing focus on --------- and
form of ROC curve is: (a) data, information, knowledge
(a) Receiver Operating Characteristic curve (b) information, data, knowledge
(b) Revised Operating Characteristic curve (c) knowledge, data, information
(c) Recall Operation Characteristic curve (d) None of the given options
(d) Represent Operating Characteristic curve APPSC Lect. Degree College 07.06.2017 (CS)
APPSC Poly. Lect. 13.03.2020 91. The intelligent agents senses through ............
84. Which of the following is an unsupervised and take actions through
machine learning algorithm? (a) sensors, actuators
(a) Clustering (b) remote, signals
(b) Decision Trees (c) sensors, actuators and remote, signals
(c) K-Nearest Neighbour (d) None of the given options
(d) Naive Bayes APPSC Lect. Degree College 07.06.2017 (CS)
APPSC Poly. Lect. 13.03.2020 92. A* Algorithm uses --------- heuristic function to
85. What is the purpose of regression technique in search any goal node
machine learning? (a) admissible function
(a) Prediction (b) fitness number
(b) Classification (c) evaluation function
(c) Clustering (d) None of the given options
(d) Reinforcement APPSC Lect. Degree College 07.06.2017 (CS)
APPSC Poly. Lect. 13.03.2020 93. An algorithm, if it is guaranteed to return an
86. For a given current state and an input symbol, optimal solution if it exists, is known as
if an automaton can only jump to one and only (a) admissible (b) heuristic
one state then it is a (c) optimistic (d) cognitive
(a) Nondeterministic automaton APPSC Lect. Degree College 07.06.2017 (CS)
(b) Deterministic automaton 94. AO* Algorithm is also known as
(c) Alternation (a) Admissible optimal algorithm
(d) Semi automaton (b) Accurate optimistic algorithm
UPPCL AE 2014 (c) And-or algorithm
87. A finite-state machine with no output function (d) None of the given options
at all is known as APPSC Lect. Degree College 07.06.2017 (CS)
(a) a null automation 95. Wumpus World problem is example of:
(b) A full automation (a) single player game
(c) a dummy automation (b) two player game
(d) a semi automation (c) reasoning with knowledge
UPPCL AE 2014 (d) knowledge based game
88. Which of the following does not have (e) natural language processing
probabilistic acceptance? CGPSC Asstt. Prof. 2014 (IT)
(a) omega automation 96. Most commonly used language for Artificial
(b) geometric automation Intelligence programming is:
(c) quantum finite automation (a) C (b) C++
(d) metric automation (c) LISP (d) PASCAL
UPPCL AE 2014 UPSC Poly Lect. 10.03.2019
Programming Fundamentals 92 YCT
97. The process of defining a problem is terms of 107. In language understanding, the levels of
few steps and then exploring each of the steps knowledge that does not include?
further is known as (a) Empirical (b) Logical
(a) step- wise refinement (c) Phonological (d) Syntactic
(b) modularization 108. What kind of learning algorithm is for “Facial
(c) Integration identities or facial expressions”?
(d) Divide and Conquer (a) Prediction
TSPSC Manager 2015 (b) Recognition Patterns
98. In AI, the problem solving using judgmental or (c) Recognition trend
common-sense part is generally known as ____
(d) Mind reading
approach.
109. FIND-S algorithm ignores
(a) Depth-first-search (b) Random
(c) Heuristic (d) Breadth-first-search (a) Negative
APPSC Lect. Degree College 16.09.2020 (b) Positive
99. Who coined the term "artificial intelligence"? (c) Both Negative & Positive
(a) Alan Turing (b) John McCarthy (d) None of the above
(c) Bill Gates (d) Tim Berners Lee 110. The general tasks that are performed with
APPSC Lect. Degree College 16.09.2020 back propagation algorithm is-
100. Who invented the LISP programming (a) Pattern mapping
language for artificial intelligence? (b) Prediction
(a) Tim Berners Lee (b) Dennis Ritchie (c) Function approximation
(c) Alan Turing (d) John McCarthy (d) All of the above
APPSC Lect. Degree College 16.09.2020 111. Bayes rule can be used for:-
101. Which of the following option is not a type of (a) Solving queries
learning? (b) Increasing complexity
(a) supervised learning (c) Answering probabilistic query
(b) unsupervised learning (d) Decreasing complexity
(c) reinforcement learning
112. What is the full form of MDL?
(d) semi unsupervised learning
(a) Minimum Description Length
102. Which of the following is a widely used and
(b) Maximum Description Length
effective machine learning algorithm based on
the idea of bagging? (c) Minimum Domain Length
(a) Regression (b) Classification (d) None of the above
(c) Decision Tree (d) Random Forest 113. PAC stand for
103. Machine learning algorithms build a model (a) Probably Approximate Correct
based on sample data, which is known as - (b) Probably Approx Coding
(a) Training Data (b) Transfer Data (c) Probably Approximate Computation
(c) Data Training (d) All of the above (d) Probably Approx Computation
104. Machine learning is a subset of 114. Application of CBR is
(a) Artificial intelligence (a) Design (b) Planning
(b) Non machine learning (c) Diagnosis (d) All of these
(c) deep learning 115. The full form of ILP is-
(d) data bundling (a) Intriguing Logical programming
105. A Machine Learning technique which helps in (b) Inductive Logic Programming
detecting the outliers in data. (c) Introductory Logical Program
(a) Clustering (b) Classification
(d) Inductive Logic Program
(c) Anamoly Detection (d) All of the above
116. For what artificial neural network is used ?
106. Who is the father of Machine Learning?
(a) Pattern Recognition
(a) John McCarthy
(b) Classification
(b) Brown Chaucer
(c) Clustering
(c) Geoffrey Everest Hinton
(d) None of the above (d) All Answer

Programming Fundamentals 93 YCT


117. What is required to make probabilistic systems 125. When for the first time python was released
feasible in the world? on?
(a) Reliability (a) February 24,1991 (b) February 25,1991
(b) Crucial robustness (c) February 28,1991 (d) February 27,1991
(c) Feasibility 126. Which of the following is not a disadvantage of
(d) None of these Python?
118. Learning symbolic representations of concepts (a) Not memory efficient
is called as: (b) Weak in mobile computing
(a) Artificial Intelligence (c) Database Access
(b) Machine Learning (d) Free and open- source
(c) Both a & b 127. Which of the following is keyword in python
(d) None of the above programming language?
119. The autonomous acquisition of knowledge (a) False (b) Await
through the use of computer programs is (c) Pass (d) all of the above
called- 128. Which of the following is not a keyword in
(a) Artificial Intelligence python programming language?
(b) Machine Learning (a) While (b) As
(c) Deep learning (c) Short (d) From
(d) NLP 129. In python programming language, a string
120. The field of study that gives computers the variable can be declared either by using
capability to learn without being explicitly (a) Single quote (b) Double quotes
programmed- (c) Both (d) None of these
(a) Machine Learning 130. In which conversion, python automatically
(b) Artificial Intelligence converts one data type to another datatype?
(c) Deep Learning (a) Implicit (b) Explicit
(d) Both a & b (c) Both (d) None of these
121. What are the types of learning used in 131. How many types are namespaces in java
machine? programming language?
(a) Supervised (b) Unsupervised (a) 4 (b) 5
(c) Reinforcement (d) All of the above (c) 3 (d) 2
122. A model can learn based on the rewards it 132. Which of the following namespace does include
received for its previous action is called as: functions and exception names that are built-in
(a) Supervised learning in python programming?
(b) Unsupervised learning (a) Global namespace
(c) Reinforcement learning (b) Built-in namespace
(d) Concept learning (c) Local namespace
123. Which of the following statement is correct (d) User defined namespaces
regarding python programming language? 133. Which of the following statements is/are
(a) It is a general purpose, dynamic, high-level correct in the context of generators in python?
and interpreted language. (a) Python generators are a simple way of
(b) It supports an object- oriented programming creating iterators.
approach. (b) It is a special type of function which does not
(c) It is used in web development and data return a single value, instead,it returns an
science and so on. iterator object with a sequence of values.
(d) All of the above (c) In a generator function, a yield statement is
124. Who developed python programming used rather than a return statement.
language? (d) All of the above
(a) Guido van Rossum 134. The blockchain technology was first outlined
(b) Guido tan Rossum in………
(c) Guido san Rossum (a) 1990 (b) 1991
(d) Guido Henry Rossum (c) 1992 (d) 1994
Programming Fundamentals 94 YCT
135. Who for the first time outlined the blockchain 145. Proof of Stake is __________.
technology? (a) A transaction and block verification
(a) Stuart Haber (b) W.Scott protocol
(c) Both (d) None of these (b) A certificate required to use the blockchain
136. Blockchain technology is also known as (c) Both A and B
(a) Distributed ledger technology (d) None of the above
(b) Destroyed ledger technology 146. Which of the following is the part of
(c) Distributed longer technology asymmetric encryption?
(d) Doorstep ledger technology (a) Public key
137. Which concept was introduced to verify (b) Private Key
computational effort and deter cyberattacks? (c) Passphrase
(a) Proof -of -work (b) Proof of woe (d) All of the above
(c) Proof of worth (d) Proof of waste 147. The full form of UTXO is-
138. Which of the following mechanism is used to (a) Unspent Transaction Office
prevent bad actors from validating bad (b) United Transaction Office
transactions? (c) United Transaction Output
(a) Proof-of- work (b) Proof- of- stake (d) Unspent Transaction Output
(c) Both (d) None of these 148. The process of creating new bitcoins is called
139. Which of the following is not a drawback of as-
blockchain technology? (a) Financing (b) Sourcing
(a) Scalability (b) Storage (c) Mining (d) None of the above
(c) Privacy (d) Traceability 149. The type of ledger present in Blockchain is.
140. Which of the following is not a benefit of (a) Distributed Ledger
blockchain technology? (b) Decentralized Ledger
(a) Enhanced security (c) Both A and B
(b) Regulation (d) None of the above
(c) Reduced cost 150. How many pillars do a Blockchain technology
(d) True traceability have ?
141. Which of the following is the best blockchain (a) 3 (b) 5
platforms that is used in almost any kind of (c) 10 (d) 21
sector? 151. Blockchain was invented in -
(a) Ethereum (b) Hyperledger (a) 2010 (b) 2007
(c) R3 Corda (d) Quoram (c) 2008 (d) 2009
142. Which type of blockchains are only partially 152. The research paper that brought Bitcoin to the
decentralized because public access to these world is called as-
blockchains is restricted?
(a) Black Paper (b) Green Paper
(a) Hybrid (b) Public
(c) Blue Paper (d) White Paper
(c) Private (d) Consortium
153. Who created Bitcoin ?
143. Which blockchain are permissionless in nature
(a) John Mcafee
and allow anyone to join and are completely
(b) Satoshi Nakamoto
decentralized?
(c) Elon musk
(a) Public (b) Private
(c) Hybrid (d) Consortium (c) Mc Garth
144. Which of the following is correct option 154. Blockchain is a type of .,......
regarding Blockchain? (a) View (b) Table
(a) A blockchain is a centralized digital ledger (c) Entity (d) Database
consisting of records called blocks. 155. A hybrid blockchain is a combination of which
b) A blockchain is a decentralized, distributed, features?
digital ledger consisting of records called blocks. (a) Centralized
(c) A blockchain is a digital database consisting (b) Decentralized
of records called class. (c) Both Centralized & Decentralized
(d) None of the above (d) None of above
Programming Fundamentals 95 YCT
156. What are the four types of Blockchain 166. Which among the following shows the correct
networks? constructor?
A) Public blockchains (a) –yctname() (b) yctname()
B) Private blockchains (c) ()yctname (d) ~yctname()
(c) Consortium & Hybrid blockchains 167. Which of the following is not a property of an
(c) All of the Above object?
157. Who developed the concept of OOP? (a) Properties (b) identify
(a) Andrea Ferro (b) Ellon Musk (c) Identity (d) Attributes
(c) Alan Kay (d) Dennis Ritchie 168. Which of the following does support the single
158. Which of the following is not a feature of OOP level inheritance?
in general definitions? (a) Redundant data (b) Multiple inheritance
(a) Efficient Code (c) Compile time (d) Runtime
(b) Code reusability 169. Which of the following keyword is used to
(c) Modularity declare virtual functions?
(d) Duplicate data (a) ~virtual (b) virtua.text
159. Which was the first purely object oriented (c) virtual (d) virtual_();
programming language developed? 170. Where does the memory allocate for the
(a) Python (b) SmallTalk objects?
(c) Java (d) C++ (a) Cache (b) ROM
160. When did the concept of OPP first came into (c) RAM (d) Hard Disk
picture? 171. Which feature of object oriented programming
(a) 1980’s (b) 1995 is exhibited by the function overriding?
(c) 1970’s (d) 1990 (a) Message passing (b) Polymorphism
161. The feature of OOP that indicates code (c) Abstraction (d) Inheritance
reusability? 172. Which keyword is used to declare static
(a) Data hiding (b) Polymorphism variables?
(c) Encapsulation (d) Inheritance (a) const (b) struct
162. Which among the following doesn’t come (c) static (d) enum
under OOP concept?
173. Which among the following is not a required
(a) Data hiding
condition for constructors?
(b) Message passing
(a) Its name must be same as that of class
(c) Platform independent
(b) It must not have any return type
(d) Polymorphism
(c) It must contain a definition body
163. The feature by which one object can interact
(d) It can contain arguments
with another object is:
174. Instance of which type of class can’t be
(a) Data encryption
created?
(b) Message Passing
(a) Parent class
(c) Data transmission
(b) Abstract class
(d) Data binding
(c) Anonymous class
164. In multilevel inheritance, which of the
following is the most significant feature of OOP (d) Nested class
that is used? 175. Which feature of OOP can be implemented
(a) Code modularity using encapsulation?
(b) Code readability (a) Polymorphism
(c) Flexibility (b) Overriding
(d) Code reusability (c) Inheritance
165. What is an abstraction in object-oriented (d) Abstraction
programming? 176. Which programming language does restrict
(a) to hide the implementation and showing only the use of multiple inheritance?
the features (a) C++
(b) hiding the external data (b) PHP
(c) hiding the implementation (c) COBOL
(d) Showing the raw data (d) Java
Programming Fundamentals 96 YCT
177. Which of the following principles states that 184. XP co-founder Ron Jeffries has written:
high level modules should not depend on low "Always implement things when you actually
level modules; both should depend on need them, never when you just foresee that
abstractions? you need them."
(a) Dependency Inversion Principle Which programming principle does it indicate?
(b) Interface segregation principle (a) Write DRY code
(c) Refactoring principle (b) YAGNI
(d) Separation of concerns principle (c) KISS
178. Which one of the following principles arises (d) Interface segregation
from extreme programming that states a 185. Which of the following statements are correct
programmer should not add functionality until in the context of integrated development
deemed necessary? environment?
(a) Open/Closed (i) Integrated development environment are
(b) Single responsibility applications that facilitates the
(c) Write DRY code development of other applications.
(d) YAGNI (ii) It provides a central interface with any
179. What is the full form of KISS? tools which appears convenient for
(a) Keep it solid, stupid developer to use.
(b) Keep it simple, stupid (iii) An IDE typically may not have source code
(c) Keep it simple with stupidity editor, local build automation and
(d) Keep it simple or stupid debugger.
180. In write DRY code , what is the meaning of (a) (i) & ( ii) (b) (i) , ( ii) & (iii)
DRY? (c) (i) & ( iii) (d) None of the above
(a) Don't repeat yourself 186. Which of the following is not a type of
(b) Do respect yourself integrated development environment?
(c) Do repeat yourself (a) Multi-language
(d) Don't reveal yourself (b) Visual Studio
181. The principle which state that a module should (c) Mono develop
be open for extension but closed for (d) All of the above
modification is 187. The example of multi-language IDE are
(a) Interoperability (a) Aptana-
(b) Open/ Closed (b) Komodo
(c) Single immutable (c) NetBeans
(d) Refactoring (d) All of the above
182. Which principle is a systematic process of
188. Which of the following language does Espresso
improving code without creating new
not support?
functionality?
(a) XML (b) HTML
(a) Single responsibility
(c) CSS (d) C++
(b) Refactoring
189. An integrated development environment that
(c) Composition over inheritance
contains necessary commands such as push,
(d) KISS
pull/update, commit, history is known as
183. It is the process of changing a software system
(a) Release tool integration
in such a way that it doesn't change the
(b) Code refactoring
external behavior of code and yet improves its
internal structure. (c) Defining errors
Which principle the above statement (d) Source code integration
demonstrates ? 190. Which of the following is necessary to conduct
(a) Refactoring proper testing for checking the quality of code
(b) Keep it simple, stupid in the software?
(c) Write DRY code (a) Code refactoring (b) Debugging
(d) Separation of concerns (c) Unit testing (d) Code testing

Programming Fundamentals 97 YCT


191. With reference to benefits of using IDEs , hich 197. One of the disadvantages of pass by reference is
of the following is not correct? that the called function may inadvertently
(a) It improve developers productivity corrupt the caller’s data. This can be avoided by
(b) It keeps developers up to date with the latest (a) passing pointers
practices and threats (b) declaring the formal parameters constant
(c) It helps developers to organize their workflow (c) declaring the actual parameters constant/
and solve problems. (d) All of the above
(d) Syntax highlighting is not common in most UPPSC LT GRADE 29.07.2018
IDEs. 198. C was primarily devolved as a
192. A continue statement in a while loop shall (a) system programming language
(a) transfer control to statement just before while (b) general purpose language
loop (c) data processing language
(b) transfer control to first statement of while (d) None of the above
loop UPPSC LT GRADE 29.07.2018
(c) transfer control to last statement of while loop 199. Which of the following is not a storage class
specifier in C programming language?
(d) transfer control to test condition of while loop
(a) Register (b) Volatile
RPSC Lect. 2011
(c) Extern (d) Typedef
193. Consider following statement
UPPSC LT GRADE 29.07.2018
int a, b, c;
200. What does the following C statement mean?
b = ∼ a; scanf(“%4s”, str);
c = b ++; (a) Read exactly 4 characters from console
(a) c is 1's complement of a (b) Read maximum 4 characters from console
(b) c is always 0 (c) Read a string in multiples of 4
(c) c is 2's complement of a (d) None of the above
(d) c is always 1 UPPSC LT GRADE 29.07.2018
RPSC Lect. 2011 201. What is the meaning of the following
194. A static variable declaration in C programming language?
(a) can not be initialized Int(*p)[5];
(b) is initialized once at the commencement of (a) It will result in compile error because there
execution and can not be changed at run time should not be any parenthesis, i.e., “int *p[5]”
(c) retains its value throughout the file of the is valid
program (b) p is a pointer to 5 integers
(d) is same as an automatic variable but is placed (c) p is a pointer to integer array
at the end of a program (d) p is a pointer to an array of 5 integers
RPSC Lect. 2011 UPPSC LT GRADE 29.07.2018
195. Semantic errors can be detected at 202. Which of the following is NOT true about the
(a) compile time only 'THIS' keyword in Java?
(a) It can be used to refer instance variable of
(b) run-time only
current class
(c) both compile time and run-time only
(b) It can be passed as argument in the
(d) none of these constructor call
RPSC Lect. 2011 (c) It can be passed as an argument in the method
196. Object oriented programmers primarily focus call
on (d) It cannot be used to invoke or initiate current
(a) procedure to be performed class constructor
(b) the step by step statements needed to solve a APPSC Lect. Degree College 16.09.2020
problem 203. What is the value range for "short" data type
(c) the physical orientation of objects within a in Java?
program (a) –215 to +215 (b) –216 to +216
16 16
(d) objects and the tasks that must be performed (c) –2 to +2 –1 (d) –216 –1 to +216–1
with those objects (e) –215 to +215–1
RPSC Lect. 2011 CGPSC Asstt. Prof. 2014 (IT)
Programming Fundamentals 98 YCT
204. In Java, which of the following method of a 208. Which of the following is/are true about
user-defined "Matrix" class can be overridden packages in Java?
to print the matrix in a proper format (row- 1. Every class is part of some package.
column format) after passing an object of the 2. All classes in a file are part of the same
"matrix" to system.out.print1n( ) method? package.
(a) string() (b) toString() 3. If no package is specified, the classes in the
(c) toPrint() (d) Constructor method file go into a special unnamed package.
(e) Copy constructor 4. If no package is specified, a new package is
CGPSC Asstt. Prof. 2014 (IT) created with folder name of class and the
205. In Java, the "DataInputStream" class is class is put in this package.
defined in .......... package. (a) Only 1, 2 and 3 (b) Only 1, 2 and 4
(a) java.lang (b) java.util (c) Only 4 (d) Only 1 and 3
(c) java.in (d) java.io NIELIT Scientists-B 22.07.2017 (IT)
(e) java.out 209. Which of the following is FALSE about
CGPSC Asstt. Prof. 2014 (IT) abstract classes in Java?
206. Earlier name of Java programming language (a) If we derive an abstract class and do not
was: implement all the abstract methods, then the
(a) OAK (b) D derived class should also be marked as
(c) Netbean (d) Eclipse abstract using ‘abstract’ keyword.
NIELIT Scientists-B 04.12.2016 (CS) (b) Abstract classes can have constructors.
207. Give the Output (c) A class can be made abstract without any
#include >iostream> abstract without any abstract method.
using namespace std; (d) A class can inherit from multiple abstract classes.
class Base1 { NIELIT Scientists-B 22.07.2017 (IT)
public: 210. Object oriented inheritance models:
∼Base1() { cout << “ Base1’s (a) "is a kind of" relationship
destructor” << endl;} (b) "has a" relationship
}; (c) "want to be" relationship
class Base2 { (d) "contains" of relationship
public: NIELIT Scientists-B 04.12.2016 (CS)
∼Base2() { cout << “ Base1’s 211. Which type of Statement can execute
destructor” << endl;} Parameterized queries?
}; (a) PreparedStatement
Class Derived: public Base 1, public Base2{ (b) ParameterizedStatement
public; (c) ParameterizeStatement and CallableStatement
∼Derived() {cout << “Derived’s (d) All kind of Statements
destructor” <<endl;} NIELIT Scientists-B 04.12.2016 (CS)
}; 212. An operation can be described as:
int main() (a) Object behavior (b) Functions
{ (c) Class behavior (d) (A),(B)
Derived d; NIELIT Scientists-B 04.12.2016 (CS)
return 0; 213. The keyword used to transfer control from a
} function back to the calling function is:
(a) Base1’s destructor (a) switch (b) go to
Base2’s destructor (c) go back (d) return
Derived’s destructor NIELIT Scientists-B 04.12.2016 (CS)
(b) Derived’s destructor 214. What is the meaning of following declaration?
Base2’s destructor int(*p[7])();
Base1’s destructor (a) p is pointer to function.
(c) Derived’s destructor (b) p is pointer to such function which return type
(d) Compiler Dependent is array.
NIELIT Scientists-B 22.07.2017 (IT) (c) p is array of pointer to function.
Programming Fundamentals 99 YCT
(d) p is pointer to array of function. i = 0;
NIELIT Scientists-B 04.12.2016 (CS) for (j = –3; J <= 3; j++)
215. Which of the following is a platform free {
language? if ((j >= 0) && (i++))
(a) JAVA (b) C count = count + j;
(c) Assembly (d) Fortran }
NIELIT Scientists-B 04.12.2016 (CS) count = count + i;
216. An object can have which of the following printf("%d", count);
multiplicities? return 0;
(a) Zero (b) More than one }
(c) One (d) All of the above Which one of the following options is correct?
NIELIT Scientists-B 04.12.2016 (CS) (a) The program will not compile successfully.
217. Given a class named student, which of the (b) The program will compile successfully and
following is a valid constructor declaration for
output 10 when executed.
the class?
(c) The program will compile successfully and
(a) Student student ( ){ }
output 8 when executed.
(b) Private final student ( ){ }
(d) The program will compile successfully and
(c) Student (student s) { }
output 13 when executed.
(d) Void student ( ){ }
GATE 2021 (Shift-I)
NIELIT Scientists-B 04.12.2016 (CS)
222. Consider the following C functions.
218. Bug means
int fun1(int n) { int fun2(int n) {
(a) A logical error in a program
static int i = 0; static int i = 0;
(b) A difficult syntax error in a program
if (n > 0) { if (n > 0) {
(c) Documenting programs using an efficient
documentation tool ++i; i = i + fun1(n);
(d) All of the above fun1(n–1); fun2(n–1);
NIELIT Scientists-B 22.07.2017 (CS) } }
219. What will be output if you will compile and return(i); return(i);
execute the following c code? } }
void main ( ){ The return value of fun2(5) is ________.
printf("%d",sizeof(5.2));
} (a) 55 to 35 (b) 50 to 55
(a) 4 (b) 8 (c) 55 to 55 (d) 55 to 56
(c) 2 (d) 16 GATE 2020
NIELIT Scientists-B 04.12.2016 (IT) 223. Consider the following C program.
220. What will be output if you will compile and #include < stdio.h>
execute the following c code? int main ( ) {
void main ( ) { int m = 10 ;
char c=125; int n, n1 ;
c=c+10; n = ++m;
printf("%d",c); n1 = m++;
} n––;
(a) 135 (b) 115 – – n1 ;
(c) –121 (d) –8 n – = n1;
NIELIT Scientists-B 04.12.2016 (IT) printf ("%d" , n) ;
221. Consider the following ANSI C program. return 0 ;
#include <stdio.h> }
int main() The output of the program is_______.
{ GATE 2017 (Shift-II)
int i, j, count; (a) 0 (b) 45.03
count = 0; (c) 52.40 (d) 81.15
Programming Fundamentals 100 YCT
224. Consider the following C program. 231. Which of the following operators can be
#include<stdio.h> overloaded in C++
#include<string.h> (a) Relational operator
int main ( ) { (b) Dot operator
char* c = "GATECSIT2017" (c) Scope resolution operator
char* p = c ; (d) Point to member operator
printf ("%d" , (int) strlen (c+2 [p] –6 [p] – 1)) ; MPPSC State Forest Service Examination 2014
return 0 ; 232. ‘In-line’ function may not work when
The output of the program is_________. (a) Function contains static variable
(b) Function is recursive
GATE 2017 (Shift-II)
(c) Function not returning value, if a return exists
(a) 0 (b) 45.23
(d) All options are correct
(c) 2.04 (d) 2.0 to 2.0
MPPSC State Forest Service Examination 2014
225. Which of the following is the property of object
233. Inheriting the attributes of two or more
oriented programming?
existing classes at same level for defining new
(a) Polymorphism
class is known as
(b) Data encapsulation (a) Multilevel inheritance
(c) Operator overloading (b) Multiple inheritance
(d) All options are correct (c) Hybrid inheritance
MPPSC State Forest Service Examination 2014 (d) All options are correct
226. The header file iostream.h is included in C++ MPPSC State Forest Service Examination 2014
program to use 234. Reusability of code in C++ programs is
(a) return() justified with the following feature
(b) Input/output functions (a) Information binding
(c) main() (b) Data abstraction
(d) Run operation (c) Data encapsulation
MPPSC State Forest Service Examination 2014 (d) Inheritance
227. In C++, size of character array should be _____ MPPSC State Forest Service Examination 2014
the number of characters in the string 235. Which class cannot be instantiated?
(a) One larger than (b) One less than (a) Inherited class (b) Public class
(c) Two larger than (d) Two less than (c) Private class (d) Virtual class
MPPSC State Forest Service Examination 2014 MPPSC State Forest Service Examination 2014
228. Member function of a class in C++ can be 236. In C++, “?” is a:
called by an object of that class using (a) Unary operator (b) Binary operator
(a) Dot operator (c) Ternary operator (d) None of these
(b) Ternary operator MPPSC State Forest Service Examination 2014
(c) Relational operator 237. Which one of the following keywords is used
(d) Scope resolution operator for memory allocation in C++?
MPPSC State Forest Service Examination 2014 (a) Malloc (b) Calloc
229. Which of the following is an insertion operator (c) New (d) Free
in C++? MPPSC State Forest Service Examination 2014
(a) >> (b) & 238. Which statement is true about destructor in
C++?
(c) << (d) !
(a) Destroy the objects when no longer requires
MPPSC State Forest Service Examination 2014
(b) Create and use constant objects
230. What value is displayed in the following C++
(c) Used in classes to display the class contents
example?
(d) All options correct
Float fees [5] = {32.15, 45.23, 52.43, 82.15,
MPPSC State Forest Service Examination 2014
97.05};
239. In C++, virtual function is defined and
Cout << fees [2]; declared in
(a) 0 (b) 45.23 (a) Derived class (b) Base class
(c) 52.43 (d) 82.15 (c) Derived object (d) Destructor
MPPSC State Forest Service Examination 2014 MPPSC State Forest Service Examination 2014
Programming Fundamentals 101 YCT
240. In C++, member function with the same name 248. In C++, the operator overloading is an example
in two different classes is of
(a) Not allowed (a) Polymorphism (b) Inheritance
(b) Allowed (c) Encapsulation (d) Data hiding
(c) Only if the two classes have same name MPPSC State Forest Service Examination 2014
249. Which of the following is object oriented
(d) Both (Not allowed) and (Only if the two
programming language?
classes have same name)
(a) C (b) Pascal
MPPSC State Forest Service Examination 2014
(c) COBOL (d) C++
241. Which of the following cannot be passed to a MPPSC State Forest Service Examination 2014
function is C++? 250. In ‘C’ language, System level programming
(a) Variable (b) Arrays can be done easily because it facilitates
(c) Class objects (d) Header files (a) Binary operators
MPPSC State Forest Service Examination 2014 (b) Bit wise operators
242. “Run time binding” is the term used in C++, its (c) Logical operators
synonym is (d) None of these
(a) Virtual function MPPSC State Forest Service Examination 2014
(b) Instantiation 251. union in ‘C’ is
(c) Polymorphism (a) Used to store different members at same
memory location
(d) None of these
(b) A primitive data type
MPPSC State Forest Service Examination 2014 (c) A text file
243. Which entity occupies space in memory during (d) A variable of long integer type
C++ program execution? MPPSC State Forest Service Examination 2014
(a) Class (b) Virtual class 252. Commonly used function for direct/random
(c) Public class (d) Object access file in ‘C’ is
MPPSC State Forest Service Examination 2014 (a) fread() (b) fseek()
244. Which language is not an object oriented (c) ftell() (d) All options are correct
programming language? MPPSC State Forest Service Examination 2014
(a) C++ (b) Java 253. In ‘C’ which notation used as preprocessor
(c) Small talk (d) C directive?
(a) % (b) ||
MPPSC State Forest Service Examination 2014
(c) # (d) !
245. In C++, information hiding is achieved through
MPPSC State Forest Service Examination 2014
(a) Polymorphism
254. When parameters are passed in functions of a
(b) Type Conversion ‘C’ program, which method uses pointers?
(c) Data encapsulation (a) Call by value (b) Call by reference
(d) None of these (c) Call by return (d) None of these
MPPSC State Forest Service Examination 2014 MPPSC State Forest Service Examination 2014
246. During Program execution in C++, “divide by 255. A function of a ‘C’ program cannot return
Zero” error can be handled by more than
(a) Polymorphism (a) One value (b) Two values
(b) Data encapsulation (c) Three values (d) Four values
MPPSC State Forest Service Examination 2014
(c) Exception handling
256. Which of the following C statement is used to
(d) None of these
print the values of a, b and c?
MPPSC State Forest Service Examination 2014 int a = 27
247. The feature supported by inheritance in C++ is float b = 5.14;
(a) Characteristics of super class are inherited to double c = 5.24;
subclass (a) printf(“%d%f%f ”, a, b, c);
(b) Member functions are inherited at subclass (b) printf(“%d%f%lf ”, a, b, c);
(c) Member functions can be redefining at subclass (c) printf(“%d%f% d ”, a, b, c);
(d) All options are correct (d) printf(“%lf%f%f ”, a, b, c);
MPPSC State Forest Service Examination 2014 MPPSC State Forest Service Examination 2014
Programming Fundamentals 102 YCT
257. String in ‘C’ is a set of_____ 264. A problem whose language is recursion is
(a) Numbers called?
(b) Characters (a) Unified problem
(c) Floating point numbers (b) Boolean function
(d) None of these (c) Recursive problem
MPPSC State Forest Service Examination 2014 (d) Decidable
258. “Continue” keywords in ‘C’ is used to transfer ISRO Scientist/Engineer 2011
the control to the beginning of 265. The feature in object- oriented programming
(a) loop (b) program that allows the same operation to be carried out
(c) if statement (d) main() function differently, depending on the object is
MPPSC State Forest Service Examination 2014 (a) Inheritance (b) Polymorphism
259. Which of the following is the default return (c) Over functioning (d) Overriding
type of a function in ‘C’? ISRO Scientist/Engineer 2009
(a) float (b) int 266. Which of these is a super class of all errors and
(c) char (d) void exceptions in the Java language?
MPPSC State Forest Service Examination 2014 (a) Run Time Exceptions
260. The execution of a ‘C’ program starts from (b) Throwable
(a) scanf() function (c) Catchable
(b) main() function (d) None of the above
(c) library function ISRO Scientist/Engineer 2017 (May)
(d) do-while loop 267. We use malloc and calloc for
MPPSC State Forest Service Examination 2014 (a) Dynamic memory allocation
261. In ‘C’ Programming language, dynamic
(b) Static memory allocation
memory is allocated using
(c) Both dynamic and static memory allocation
(a) Structures (b) Arrays
(d) None of the above
(c) Pointers (d) Queues
ISRO Scientist/Engineer 2017 (May)
MPPSC State Forest Service Examination 2014
268. Which of the following is associated with
262. Which one of the following is correct about the
objects?
statements given below?
I. All function calls are resolved at compile- (a) State (b) Behavior
time is C language. (c) Identity (d) All of the above
II. All function calls are resolved at compile- ISRO Scientist/Engineer 2017 (May)
time in C++. 269. The four kinds of class members in Java Script
(a) Only II is correct are
(b) Both I and II are correct (a) Instance methods, Instance fields, Static
(c) Only I is correct method, Dynamic method
(d) Both I and II are incorrect (b) instance fields, Instance methods, Class
ISRO Scientist/Engineer 2016 (July) fields, Class methods
263. What will be output of following program? (c) Instance field, Non-instance fields, Dynamic
Assume that you are running this program in methods, Global methods
little- endian processor. (d) Global methods, Local methods, Dynamic
#include<stdio.h> methods, Static methods.
int main ( ) { RPSC VPITI 2014 (IT)
short a= 320; 270. What will be output of the program given
char * ptr; below
ptr = (char *)&a; sum =0;
printf ("%d",*ptr); for ( I =-10; i<0: i++)
return 0; sum = sum + abs (i);
} printf ("%d", sum);
(a) 1 (b) 320 (a) 500 (b) -505
(c) 64 (d) Compilation Error (c) 55 (d) -22
ISRO Scientist/Engineer 2016 (July) RPSC Lect. 2014
Programming Fundamentals 103 YCT
271. Java provides a monitor like concurrency 278. How we can access data members using
control for ______ synchronization. objects?
(a) Process (b) TLB (a) object @ datamember
(c) Program (d) Threads (b) object → datamember
RPSC VPITI 2018 (IT) (c) object * datamember
272. Consider the following program in C language : (d) object . datamember
# include < stdio.h> TNPSC 2016 (Degree) P-II
Main() 279. Which of the following statements is correct
{ when a class is inherited publicly?
int i; (a) Public members of the base class become
int * p = & i; protected members of derived class
scanf (“%d”, p); (b) Public members of the base class become
printf (“%d\n”, i + 7); private members of derived class
} (c) Private members of the base class become
Which one of the following statement is true? protected members of derived class
(a) Compilation fails. (d) Public members of base class become public
(b) Execution results in a run-time error. members of derived class
(c) On execution, the value printed is 7 more than TNPSC 2016 (Degree) P-II
the integer value entered.
280. In java, the throw keyword is used:
(d) On execution, the value printed is 7 more than
(a) to generate exception programmatically
the address of variable i.
(b) to throw exception object
RPSC VPITI 2018 (IT)
273. An exception is caused by: (c) to catch exception object
(a) A hardware problem (d) to remove the errors from the block
(b) A problem in the operating system TNPSC 2016 (Degree) P-II
(c) A syntax error 281. Choose the correct answer :
(d) A runtime error (I) A function can return only one value to the
TNPSC 2016 (Degree) P-II calling function
274. Match the following: (II) A function can return multiple value to the
(1) Compile time (A) Function overloading calling function
polymorphism (III) A function can include multiple return
(2) Runtime (B) Operator overloading statements
polymorphism (IV) A function should not include multiple return
(C) Virtual function statement
(D) Late binding (a) Only I is correct
(a) 1–A, B 2–C, D (b) 1–A, d 2–B, C (b) Only IV is correct
(c) 1–A, C 2–B, D (d) 1–B, C 2–A, D (c) Both I and III is correct
TNPSC 2016 (Degree) P-II (d) Both II and III is correct
275. Bit fields can only be declared as a part of : TNPSC 2016 (Degree) P-II
(a) Structure (b) Array 282. In a multi file program, the default storage
(c) Files (d) Pointers class for a function is:
TNPSC 2016 (Degree) P-II (a) Static (b) Automatic
276. Which of the following data types are accepted (c) External (d) Register
while declaring bit-fields? TNPSC 2016 (Degree) P-II
(a) char (b) float 283. What is the output of the following code?
(c) double (d) unsigned int int a = 128, b = 122;
TNPSC 2016 (Degree) P-II printf ("%d", a+b);
277. Runtime polymorphism is achieved by: (a) 250 (b) 128
(a) Friend function (c) 256 (d) 000
(b) Virtual function TNPSC 2016 (Degree) P-II
(c) Operator overloading 284. What is the purpose of abstract class?
(d) Function overloading (a) to provide help with database connectivity
TNPSC 2016 (Degree) P-II (b) to provide data input to other class
Programming Fundamentals 104 YCT
(c) to provide security to other classes (a) Collection of data items, not necessarily
(d) to provide an appropriate base class from ordered, but of the same data type
which other classes can inherit (b) Collection of data items, not necessarily
TNPSC 2016 (Degree) P-II ordered, but of different data type
285. Mechanism of deriving a class from another (c) Ordered collection of data items of different
derived class is known as: data type
(a) Polymorphism (b) Encapsulation (d) Ordered collection of data items of the same
(c) Inheritance (d) Message passing data type
TNPSC 2016 (Degree) P-II UPSC Senior Scientific Officer Grade-II 16.07.2017
286. Which class is a base class for all exceptions in 293. In C + +, a container is
Java? (a) A data structure composed of objects
(a) String (b) Error (b) A holder object that stores and manipulates a
(c) Throwable (d) Runtime Exception collection of objects
TNPSC 2016 (Degree) P-II (c) An objects that contains housekeeping
287. The derived class constructor: information
(a) never passes any values to base class (d) An interface for binary search tree
constructor implemented as a class
(b) can pass arguments only to one base class UPSC Senior Scientific Officer Grade-II 16.07.2017
constructor function 294. During a recursive call, all static variables
(c) is responsible for passing the entire test of (a) maintained in a stack
arguments needed by base class constructors (b) maintained in a queue
(d) none of the above (c) initialized during each execution of the
TNPSC 2016 (Degree) P-II function
288. Collection in java is: (d) retained from the last execution
(a) a group of objects UPPCL AE 2014
(b) a group of classes 295. Methods are specified in the language by:
(c) a group of interfaces (a) Syntax (b) Semantics
(d) a group of packages (c) Inference (d) None
TNPSC 2016 (Degree) P-II RPSC ACF & FRO 23.02.2021 (CS)
289. Identify the pure object oriented language 296. A destructor can be
given below: (a) virtual (b) volatile
(a) Small talk (b) C++ (c) static (d) None of these
(c) Objective C (d) Java RPSC ACF & FRO 23.02.2021 (CS)
TNPSC 2016 (Degree) P-II 297. Can operator overloading change the operation
290. Which operators can not be overloaded? performed by an operator?
(a) Binary operator (a) No (b) Yes
(b) Ternary operator (c) Conditionally (d) With restrictions
(c) Unary operator RPSC ACF & FRO 23.02.2021 (CS)
(d) All can be overloaded 298. A variable P is called pointer if:
TNPSC 2016 (Degree) P-II (a) P contains the address of first element in
291. What allows the Java programmer to destroy DATA
an object A? (b) P can store only DATA value
(a) a. delete ( ) (c) P contains the address of an element in
(b) a. finalize ( ) DATA
(c) Runtime. GetRuntime ( ) . gc ( ) (d) P contains the Data and the address of DATA
(d) Only the garbage collection system can Karnataka PSC Comp. Sci. Teacher 16.10.2017
destroy an object 299. The first and second arguments of open are :
(a) A character string containing the name of the
UPSC Senior Scientific Officer Grade-II 16.07.2017
292. Array is a structured data type in C file and the second argument is the mode
programming language. It may be defined as, a (b) A character string containing the name of the
finite : user and the second argument is the mode
Programming Fundamentals 105 YCT
(c) A character string containing the pointer and (c) applets, applications, servlets, Java beans and
the second argument is the mode distributed objects
(d) None of the above (d) none of the above
Karnataka PSC Comp. Sci. Teacher 16.10.2017 TNPSC 2016 (Degree) P-II
300. What is meant by 'a' in the following 306. Which of the following programming language
operation? (s) provides garbage collection automatically
fp = fopen ("Random.txt","a"); (a) Lisp (b) C++
(a) Attach (b) Append (c) Fortran (d) C
(c) Apprehend (d) Add ISRO Scientist/Engineer 2007
Karnataka PSC Comp. Sci. Teacher 16.10.2017 307. Exception handling is a type of
301. C-character set includes : (a) forward error recovery mechanism
(A) Alphabets (b) backward error recovery mechanism
(B) Digits (c) All of the above
(C) Special Symbols (d) None of the above
(D) Constants, variables and key words GPSC Asstt. Prof. 30.06.2016
Select the code for the correct answer from the 308. What is short int in C programming?
options given below :
(a) The basic data type of C
(a) A and B only (b) A, B and C only
(b) Qualifier
(c) D only (d) A only
(c) Short is the qualifier and int is the basic data
Karnataka PSC Comp. Sci. Teacher 16.10.2017
type
302. Which statements are true with respect to
(d) All of the above
LINKER?
GPSC Asstt. Prof. 30.06.2016
(A) A program that links separately compiled
modules into one program. 309. How structures and classes in C++ differ?
(B) Combines the functions in the standard C- (a) In Structures, members are public by default
library with the code that you wrote. whereas, in Classes, they are private by
(C) The output of linker is an executable default
program. (b) In Structures, members are private by default
(D) Object code is the input to the linker. whereas, in Classes, they are public by default
Select the code for the correct answer from the (c) Structures by default hide every member
options given below : whereas classes do not
(a) A, B and C only (b) B and C only (d) Structures cannot have private members
(c) A and D only (d) All of the above whereas classes can have
Karnataka PSC Comp. Sci. Teacher 16.10.2017 GPSC Asstt. Prof. 30.06.2016
303. The order in which recursive functions are 310. How access specifies in Class helps in
executed is: Abstraction?
(a) Parallel order (a) They does not help in any way
(b) Last in first out order (b) They allow us to show only required things to
(c) First in last out order outer world
(d) Iterative order (c) They help in keeping things together
Karnataka PSC Comp. Sci. Teacher 16.10.2017 (d) Abstraction concept is not used in classes
304. If only one memory location is to be reserved GPSC Asstt. Prof. 30.06.2016
for a class variable, no matter how many 311. Which of the following is the correct difference
objects are instantiated, then the variable between cin and scanf()?
should be declared as ______. (a) Both are the same
(a) extern (b) static (b) cin is a stream object whereas scanf() is
(c) volatile (d) const function
ISRO Scientist/Engineer 2014 (c) scanf() is a stream object whereas cin is a
305. Java allows programmers to develop the function
following: (d) cin is used for printing whereas scanf() is
(a) applets, applications and servlets used for reading input
(b) applets and applications GPSC Asstt. Prof. 30.06.2016
Programming Fundamentals 106 YCT
312. The number of instance of an abstract class 320. In C++, the default storage class of local
that can be created is: variables is:
(a) 1 (b) 5 (a) auto (b) extern
(c) 13 (d) 0 (c) both auto and register (d) static
(e) 10 (e) register
CGPSC Asstt. Prof. 2014 (CS) CGPSC Asstt. Prof. 2014 (IT)
313. The concept of OOPs that allows compiler to 321. The effective and well established technique to
insert arguments in a function call if it is not catch inconsistency in programs is called:
specified is: (a) Type checking (b) Error checking
(a) Call by value (b) call by reference (c) Type casting (d) Bounds checking
(c) Default arguments (d) call by pointer UPSC Poly Lect. 10.03.2019
(e) Call by input 322. The category of software maintenance which
CGPSC Asstt. Prof. 2014 (CS) fixes errors in the original system design and
314. What will be the outputs of the following C implementation is:
program segment? (a) Perfective maintenance
printf(''%d'' ,printf("Examination)): (b) Adaptive maintenance
(a) Examination,11 (b) 11, Examination (c) Corrective maintenance
(c) Examination,12 (d) 12, Examination (d) Software maintenance
(e) Examination,0 UPSC Poly Lect. 10.03.2019
CGPSC Asstt. Prof. 2014 (CS) 323. In Object-Oriented Programming using C++,
315. Which of the following is not a pure object- static variable is also known as:
oriented language? (a) Object variable (b) Class variable
(a) Java (b) Simula (c) Stored variable (d) Global variable
(c) Smalltalk (d) Ada UPSC Poly Lect. 10.03.2019
(e) Eiffel 324. Which one of the following types of class is not
CGPSC Asstt. Prof. 2014 (CS) used to create objects?
316. Which of the following is not a valid property (a) Anonymous class (b) Nested class
of C++? (c) Base class (d) Abstract class
(a) Encapsulation UPSC Poly Lect. 10.03.2019
(b) Garbage collection 325. A class which can inherit the attributes of two
(c) Multiple inheritance or more classes is called:
(d) Polymorphism (a) Hierarchical Inheritance
(e) Early and late binding (b) Multilevel Inheritance
CGPSC Asstt. Prof. 2014 (CS) (c) Multiple Inheritance
317. The operator that cannot be overloaded is (d) Hybrid Inheritance
(a) ++ (b) :: UPSC Poly Lect. 10.03.2019
(c) 0 (d) ~ 326. Which of the following is NOT a type of
APPSC Lect. Degree College 07.06.2017 (CS) constructor
318. The keyword friend does not appear in (a) Copy constructor
(a) the class allowing access to another class (b) Friend constructor
(b) the class desiring access to another class (c) Default constructor
(c) the private section of a class (d) Parameterized constructor
(d) the public section of a class APPSC Lect. 2017 (Degree College) (CS)
APPSC Lect. Degree College 07.06.2017 (CS) 327. Which of the following approach is generally
319. Function overloading in C++ is adopted by C++ programming.
(a) A group function with the same name (a) top-down (b) Bottom-up
(b) all have the same numbers and type of (c) Right-left (d) left-right
arguments APPSC Lect. 2017 (Degree College) (CS)
(c) functions with same name and same numbers 328. Which among the following is the correct way
and same type of arguments of declaring object of a class
(d) None of the given options (a) classname objectname;
APPSC Lect. Degree College 07.06.2017 (CS) (b) class classname objectname;
Programming Fundamentals 107 YCT
(c) class classname obj objectname; 338. Which keyword should be avoided as far as
(d) classname obj objectname possible ?
APPSC Lect. 2017 (Degree College) (CS) (a) switch (b) case
329. How many objects can be created in a single (c) break (d) goto
class? RPSC ACF FRO 23.02.2021 (Comp. App./Sci.)
(a) 1 (b) 2 339. If a C program contains only one function, it
(c) 3 (d) as many as required must be
APPSC Lect. 2017 (Degree College) (CS) (a) getch ( ) (b) main ( )
330. Which of this process occur automatically by (c) exit ( ) (d) void ( )
JAVA run time system? RPSC ACF FRO 23.02.2021 (Comp. App./Sci.)
(a) Serialization 340. Among the operators, which has highest
(b) Garbage collection priority ?
(a) && (b) +
(c) File Filtering
(c) = (d) !
(d) All the given options
RPSC ACF FRO 23.02.2021 (Comp. App./Sci.)
APPSC Lect. 2017 (Degree College) (CS)
341. Basic run-time entities in an object-oriented
331. The 'new' operator in JAVA
system are
(a) returns a pointer to a variable
(a) classes (b) functions
(b) creates a variable called new
(c) objects (d) methods
(c) obtains memory for a new variable
RPSC ACF FRO 23.02.2021 (Comp. App./Sci.)
(d) tells how much memory is available
342. The wrapping up of data and functions into a
APPSC Lect. 2017 (Degree College) (CS) single unit is called
332. 'this' keyword in JAVA is used to (a) polymorphism (b) Inheritance
(a) refer to current class object (c) Deviation (d) Encapsulation
(b) refer to static method of the class RPSC ACF FRO 23.02.2021 (Comp. App./Sci.)
(c) refer to parent class object 343. Which of the following is not an object oriented
(d) refer to static variable of the class language ?
APPSC Lect. 2017 (Degree College) (CS) (a) Ruby (b) PASCAL
333. Which is not a primary constant in C ? (c) Smalltalk (d) C++
(a) Integer (b) Float RPSC ACF FRO 23.02.2021 (Comp. App./Sci.)
(c) Union (d) Character 344. The process by which object of one class
RPSC ACF FRO 23.02.2021 (Comp. App./Sci.) acquire properties of objects of another class is
334. Which is not a keyword in C ? known as
(a) inheritance (b) polymorphism
(a) auto (b) Stop
(c) encapsulation (d) abstraction
(c) break (d) static
RPSC ACF FRO 23.02.2021 (Comp. App./Sci.)
RPSC ACF FRO 23.02.2021 (Comp. App./Sci.)
345. C + + was developed by
335. Which function receives value from the key
(a) Ken Thompson (b) Denis Richie
board ?
(c) Bjarne Stroustrup (d) Donald Knuth
(a) getf ( ) (b) scanf ( )
RPSC ACF FRO 23.02.2021 (Comp. App./Sci.)
(c) printf ( ) (d) send ( )
346. Which is the field width operator in C + + ?
RPSC ACF FRO 23.02.2021 (Comp. App./Sci.)
(a) endl (b) set w
336. Which of the following is a ternary operator ? (c) new (d) delete
(a) & (b) && RPSC ACF FRO 23.02.2021 (Comp. App./Sci.)
(c) ! (d) ? : 347. In the Java statement import java. Lang.
RPSC ACF FRO 23.02.2021 (Comp. App./Sci.) Math; math is
337. The control statement that allows us to make a (a) Object (b) Package
decision from the number of choices, is called (c) Class (d) Method
a/an RPSC ACF FRO 23.02.2021 (Comp. App./Sci.)
(a) integer (b) function 348. java does not support
(c) switch (d) variable (a) Hierarchical inheritance
RPSC ACF FRO 23.02.2021 (Comp. App./Sci.) (b) Single inheritance
Programming Fundamentals 108 YCT
(c) Multi-level inheritance 356. A class that allows only one object of it to be
(d) Multiple inheritance created, is called:
RPSC ACF FRO 23.02.2021 (Comp. App./Sci.) (a) Virtual class (b) Abstract class
349. Which fields enjoy highest degree of protection (c) Singleton class (d) Friend class
in java ? (e) Absolute class
(a) public (b) Secure CGPSC Asstt. Prof. 2014 (Comp. App.)
(c) Private (d) Ultra 357. Which of the following is not a type of
RPSC ACF FRO 23.02.2021 (Comp. App./Sci.) constructor?
350. Which of the following is not a valid storage (a) Copy constructor
class in C++? (b) Friend constructor
(a) auto (b) register (c) Default constructor
(c) dynamic (d) static (d) Parameterized constructor
(e) extern (e) Paste constructor
CGPSC Asstt. Prof. 2014 (Comp. App.) CGPSC Asstt. Prof. 2014 (Comp. App.)
351. The inheritance represented by the following 358. Identify the function which is not the member
figure is a category of: of class.
(a) Static function (b) Friend function
(c) Const function (d) Virtual function
(e) Dynamic function
CGPSC Asstt. Prof. 2014 (Comp. App.)
(a) Multiple inheritance
359. Which of the following concepts determines
(b) Multilevel inheritance
method to invoke at runtime?
(c) Single inheritance
(a) Data hiding
(d) Hierarchical inheritance
(b) Dynamic Typing
(e) Hybrid inheritance
(c) Dynamic binding
CGPSC Asstt. Prof. 2014 (Comp. App.)
(d) Dynamic loading
352. A package is a collection of:
(e) Data encrypting
(a) Classes
CGPSC Asstt. Prof. 2014 (Comp. App.)
(b) Interfaces
360. In C++, "cout" is a/an _______.
(c) Editing tools
(a) operator (b) function
(d) Classes and interfaces
(c) object (d) macro
(e) Editing tools and interfaces
(e) arithmetic function
CGPSC Asstt. Prof. 2014 (Comp. App.)
CGPSC Asstt. Prof. 2014 (Comp. App.)
353. Basic Java language functions are stored in
361. Which of the following concepts facilitates to
which of the following java package?
use the objects of one class inside another
(a) java.lang (b) java.io class?
(c) java.net (d) java.util (a) Encapsulation (b) Abstraction
(e) java.awt (c) Composition (d) Inheritance
CGPSC Asstt. Prof. 2014 (Comp. App.) (e) Decapsulation
354. Which of the following is a member of the Java CGPSC Asstt. Prof. 2014 (Comp. App.)
language package? 362. What is the number of polymorphism
(a) List (b) Queue categories supported by C++?
(c) Math (d) Stack (a) 1 (b) 2
(e) Process (c) 3 (d) 4
CGPSC Asstt. Prof. 2014 (Comp. App.) (e) 5
355. Which of the following has a method name CGPSC Asstt. Prof. 2014 (Comp. App.)
flush()? 363. Which of the following class member function
(a) Input stream (b) Output stream automatically initializes the data members ?
(c) Reader stream (d) Input reader stream (a) An operator (b) A constructor
(e) Input output stream (c) A cast (d) The init function
CGPSC Asstt. Prof. 2014 (Comp. App.) RPSC VPITI 2018 (CS)
Programming Fundamentals 109 YCT
364. Which is not a defining characteristic feature (c) main ( ) (d) destroy ( )
of Object Oriented Languages ? RPSC VPITI 2018 (CS)
(a) Reusability 366. Which among the followings can show
(b) Inheritance polymorphism ?
(c) Polymorphism (a) Overloading
(d) Recursion
RPSC VPITI 2018 (CS) (b) Overloading + =
365. Which function is used to perform some action (c) Overloading < <
when the object is to be destroyed ? (d) Overloading & &
(a) finalize ( ) (b) delete ( ) RPSC VPITI 2018 (CS)

ANSWER KEY
1. (a) 2. (c) 3. (b) 4. (d) 5. (a) 6. (d) 7. (c) 8. (c) 9. (a) 10. (d)
11. (b) 12. (a) 13. (c) 14. (a) 15. (b) 16. (a) 17. (b) 18. (a) 19. (c) 20. (d)
21. (d) 22. (d) 23. (d) 24. (d) 25. (a) 26. (b) 27. (b) 28. (b) 29. (a) 30. (c)
31. (d) 32. (a) 33. (a) 34. (d) 35. (a) 36. (b) 37. (c) 38. (b) 39. (c) 40. (b)
41. (b) 42. (a) 43. (b) 44. (d) 45. (a) 46. (b) 47. (d) 48. (c) 49. (a) 50. (d)
51. (a) 52. (a) 53. (d) 54. (b) 55. (a) 56. (d) 57. (a) 58. (d) 59. (d) 60. (a)
61. (d) 62. (b) 63. (d) 64. (a) 65. (b) 66. (c) 67. (a) 68. (b) 69. (a) 70. (b)
71. (d) 72. (a) 73. (b) 74. (a) 75. (a) 76. (c) 77. (a) 78. (b) 79. (a) 80. (a)
81. (d) 82. (d) 83. (a) 84. (a) 85. (a) 86. (b) 87. (d) 88. (a) 89. (b) 90. (c)
91. (a) 92. (a) 93. (a) 94. (c) 95. (c) 96. (c) 97. (a) 98. (c) 99. (b) 100. (d)
101. (d) 102. (d) 103. (a) 104. (a) 105. (c) 106. (c) 107. (a) 108. (b) 109. (a) 110. (d)
111. (c) 112. (a) 113. (a) 114. (a) 115. (b) 116. (d) 117. (b) 118. (a) 119. (b) 120. (a)
121. (d) 122. (c) 123. (d) 124. (a) 125. (a) 126. (d) 127. (d) 128. (c) 129. (c) 130. (a)
131. (c) 132. (b) 133. (d) 134. (b) 135. (c) 136. (a) 137. (a) 138. (c) 139. (d) 140. (b)
141. (b) 142. (c) 143. (a) 144. (b) 145. (a) 146. (d) 147. (d) 148. (c) 149. (b) 150. (a)
151. (c) 152. (d) 153. (b) 154. (d) 155. (c) 156. (d) 157. (c) 158. (d) 159. (b) 160. (c)
161. (d) 162. (c) 163. (b) 164. (d) 165. (a) 166. (b) 167. (b) 168. (d) 169. (c) 170. (c)
171. (b) 172. (c) 173. (c) 174. (b) 175. (d) 176. (d) 177. (a) 178. (d) 179. (b) 180. (a)
181. (b) 182. (b) 183. (a) 184. (b) 185. (a) 186. (d) 187. (d) 188. (d) 189. (d) 190. (c)
191. (d) 192. (d) 193. (a) 194. (c) 195. (c) 196. (d) 197. (b) 198. (a) 199. (b) 200. (b)
201. (d) 202. (d) 203. (e) 204. (b) 205. (d) 206. (a) 207. (b) 208. (a) 209. (d) 210. (a)
211. (a) 212. (d) 213. (d) 214. (c) 215. (a) 216. (d) 217. (c) 218. (a) 219. (b) 220. (c)
221. (b) 222. (c) 223. (a) 224. (d) 225. (d) 226. (b) 227. (a) 228. (a) 229. (c) 230. (c)
231. (a) 232. (d) 233. (b) 234. (d) 235. (d) 236. (c) 237.(c) 238. (a) 239. (b) 240. (b)
241. (d) 242. (c) 243. (d) 244. (d) 245. (c) 246. (c) 247. (d) 248. (a) 249. (d) 250. (b)
251. (a) 252. (d) 253. (c) 254. (b) 255. (a) 256. (b) 257. (b) 258. (a) 259. (d) 260. (b)
261. (c) 262. (d) 263. (c) 264. (d) 265. (a) 266. (b) 267. (a) 268. (d) 269. (b) 270. (c)
271. (d) 272. (c) 273. (d) 274. (a) 275. (a) 276. (d) 277. (b) 278. (d) 279. (d) 280. (a)
281. (c) 282. (c) 283. (a) 284. (d) 285. (c) 286. (c) 287. (c) 288. (a) 289. (a) 290. (b)
291. (d) 292. (d) 293. (b) 294. (d) 295. (c) 296. (a) 297. (b) 298. (c) 299. (a) 300. (b)
301. (b) 302. (d) 303. (b) 304. (b) 305. (a) 306. (a) 307. (a) 308. (c) 309. (a) 310. (b)
311. (b) 312. (d) 313. (c) 314. (a) 315. (d) 316. (b) 317. (b) 318. (c) 319. (a) 320. (a)
321. (a) 322. (c) 323. (b) 324. (d) 325. (c) 326. (b) 327. (b) 328. (a) 329. (d) 330. (a)
331. (c) 332. (a) 333. (c) 334. (b) 335. (b) 336. (d) 337. (c) 338. (d) 339. (b) 340. (d)
341. (c) 342. (d) 343. (b) 344. (a) 345. (c) 346. (b) 347. (c) 348. (d) 349.(c) 350. (c)
351. (d) 352. (d) 353. (a) 354. (c) 355. (b) 356. (c) 357. (b) 358. (b) 359. (c) 360. (c)
361. (c) 362. (b) 363. (b) 364. (d) 365. (a) 366. (c)

Programming Fundamentals 110 YCT


04.
DATA STRUCTURES AND ALGORITHM
Algorithms for Problem Solving– In Brief
An algorithm is a process or set of rules which must • An array is a data structure for storing multiple data
be followed to complete a particular task. This is type that have a similar data type.
basically the step-by-step procedure to complete any
• Identifier, data types, array length, elements and index
task. All the tasks are followed a particular algorithm,
are major parts of an array.
from making. A cup of tea to make high scalable
software. This is the way to divide a task into several • Use the index for processing the values of array
parts. element
The algorithm is used for • Arrays are best for processing large number of values
• To develop a frame-work for instructing computer and efficient for sorting and searching.
• Introduce notation of basic function to perform basic • All dictionary operation like insert, delete search,
tasks. update and traverse.
• For defining & describing a big problem into small Linked list V/S Array for Storage–
parts, so it is to execute. Array and linked list are two ways of organizing the
The basic steps to make on algorithm. data in the memory. An array is collection of elements of
1. Start similar data type. A linked list is a collection of object
2. Input known as node where nodes consist of two parts i.e. data
3. Condition and address. Array elements store in a contiguous
4. Output memory location. Linked list elements can be stored
5. End anywhere in the memory or randomly stored. Linked list
are less rigid in their storage structure and elements are
Abstract Data Types (ADT)–
usually not stored in contiguous locations, hence they
An ADT is a mathematical model of a data structure that
need to be stored with additional tags giving in a
specifies the type of data stored, operation supported on
them and types of parameters of the operation. An ADT reference to next element. Arrays store elements in
specifies what each operation does but not how it does it. contiguous memory locations, resulting in easily
In C++ no object (instance) of ADT is created rather it calculable addresses of next elements stored and this
describe a foundation of another class. permit quicker access to element of specific subscript.
Arrays as Data Structure–
An array is a data structure for storing more than one
data item that has a similar data type. The items are
organized in adjacent memory locations. Those memory Array length = 6
location are called elements of that array. Total number First index = 0
of element in an array is called length. The array Last index = 5
elements are accessed through index. Index start from 0, Data storage scheme of an array
1, 2 _ _ n-1 of length n.
Three parts will common in all the initialization i.e.,
array name, element and the data types of elements.
In C++, array is defined as follows- So linked list provides the following two advantages
int account [4] = {100, 300, 500, 120} over arrays
↓ ↓ ↑ 1. Dynamic-size
data type Array name elements 2. Easiness of insertion/deletion
There are some reason for using arrays in data structure: Linked lists have the following short coming :
• Arrays are best for storing multiple values in a single 1. In linked list each elements is traversed sequentially
variable. from first node. so here we cannot perform binary
• Arrays are better at processing many values easily and search with linked lists
quickly 2. Extra memory space for a pointer is required with
• Sorting and searching the values is easier in arrays. each element of the list
DATA Structures and Algorithm 111 YCT
3. Arrays have better cache locality that can make a 2. Circular Queue– In this queue the last element is
pretty big difference in performance linked to first element.
Stack & Stack Operation– Dequeue– It's full form is double ended queue. A
Stack is a data structure in which insertion and dequeue is also a special type of queue. In this queue the
deletion is done from one end only, usually referred to as enqueue & dequeue operation take place at both front
TOP. Stock fallows the LIFO Principle using which an rear. That means we can insert an Item at both the ends
element inserted last will be first one to be out. PUSH & and can remove on item from both the ends.
PoP are two basic operation performed on a stack for • All the dictionary operation can be performed in
insertion & deletion of elements respectively. Stack is 0(n) time.
commonly use data structure to convert an infix Priority Queue – A priority queue is a special kind
expression into equivalent prefix/postfix notation. While of queue in which each item has a predefined priority of
conversion of infix Notation to its equivalent service. In this queue the enqueue operation takes place
Prefix/postfix notation, only operator are pushed onto the at rear in the order of arrival of items, while the dequeue
stack when evaluating an expression. operation takes place at the front based on priority of
Operation item. An item with a high priority will be dequeued
1. PUSH()→ To insert or add, item in stack before an item with a low priority.
Step 1 → First we check the stack is full or not. Tree data structure
Step 2 → If stack is full then error message will be Tree is a hierarchical data structure. A tree whose
displayed elements have at most 2 children is called a binary tree.
Since each element in a binary tree can have only 2
Step 3 → If stack is not full then we add the top element
children, we typically Name them the left & right child.
and TOP is incremented by one.
2. POP() – To delete on item-from stack.
3. Isempty() – To cheek whether stack is empty.
4. Isfull() – To check whether stack is full.
5. Peep() – It acquire the Top element without deleting.
Queue–
Queue is a abstract data structure similar to stack. Queue
is open at both end one end is always used to insert data.
(enqueue) and other is used to remove data (dequeue).
Queue follows first-in-first out methodology. A real A binary tree has following parts
world example is ticket window where first person in 1. Data
waiting Queue is served first in ticket counter and last 2. Pointer to left child
person in queue is served at last in queue. 3. Pointer to right child
Basic Operations– A node which has one child node is called internal node.
We shall try to understand the basic operations we can do searching & traversing
associated with queues. In easy way a node which has no child node is called leaf
enqueue() – add (Store) an item to the queue. node or terminal node.
dequeue() – remove (access) an item from the queue. Types of tree
• Few more functions are required to make the above 1. General Tree– A node which has zero children &
mentioned queue operation efficient. following are more child team we call it general tree.
some function as follows. 2. Binary Tree– A node of tree has almost two children.
Peek() – Gets the element at the front of the queue Left child is counted as 0 and right child as 1.
without removing it.
Isfull() – Cheeks of the queue is full. It throw overflow
condition.
Isempty() – Checks if Queue is empty.
If queue is empty, it throws underflow condition.
• Queue is used for disk scheduling & CPU
scheduling queue is used for buffer in number of
application.
Types of queue 3. Binary Search Tree– Binary search tree is a node-
1. Linear Queue– In this Queue, item is inserted from based binary tree data structure which has the
rear end & deleted from front end. following feature.
DATA Structures and Algorithm 112 YCT
• Left sub tree of a node contains only nodes with keys Example–
lesser than the node's key.
• Right sub tree of a node contains only nodes with keys
greater than the node's key.
• The left and right sub tree each must also be a binary
search tree.

In order: 42513
Pre order: 12453
Post order: 45231
AVl Tree–
AVL tree can be defined as height balanced binary
search tree in which each node is associated with a
balance factor which is calculated by subtracting the
height of its right sub tree from that of its left sub tree. If
• Strictly Binary Tree– If every non leaf node in a there are N nodes then height of tree is log 2(N+1).
binary tree has non-empty left and right sub trees. All of When a tree is balanced then difference of height between
the nodes in a strictly binary tree are of degree zero or left sub tree and right sub tree is not more than 1.
two, never degree one. Graph and their representation–
Graph is linear or data type, to represent a graph, we
just need the set of vertices and each vertex the
neighbors of vertex. If it is weighted graph, then the
weight will be associated with each edge, there are
different ways to optimally represent a graph, depending
on the density of its edges, type of operations to be
performed and ease of use.
Adjacency Matrix–
• Adjacency matrix is sequential representation
• It is used to represent which nodes are adjacent to
each other.
A strictly binary tree with n leaves always 2n-1 nodes. • In this representation we have to construct nxn matrix
Complete Binary Tree– A Complete binary tree is of there is any edge from a vertex i to vertex J then the
a binary tree in which all the levels are completely filled corresponding element of A i.e. aiJ = 1 otherwise
except possibly the lowest one which is filled from left. aiJ = 0.
Tree Traversal Undirected graph representation–
Pre-order Traversal
First visit the root then traverse the left sub tree after
that traverse the right sub tree.
Note- Preorder traversal is used to create a copy of
the tree. Pre order traversal is also used to get prefix
expression on an expression tree.
In Order Traversal- Traverse the left sub tree.
Visit the root & then traverse the right sub tree.
Directed graph representation
Note- In the case of binary search tree in order
traversal gives nodes in non-diseasing order.
Post-order Traversal
First traverse the left sub tree then traverse the right
sub tree after that visit root.
Note- Post order traversal is used to delete the tree.
Post order traversal is also useful to get the post fix
expression of an expression tree.
DATA Structures and Algorithm 113 YCT
In the above figure I represents an edge from row Example–
vertex to column vertex and o represent no edge from
row vertex to column vertex.
Undirected weighted graph representation–

• Adjacency list saves a lot of space


• We can easily insert or delete as we use linked list
• It clearly shows the adjacent nodes of a node.
Matrix re presentation takes a lot of time to visit all Sorting & Searching–
the neighbors of a vertex, we have to traverse all the Searching-Searching means locating a particular
vertices in the graph, which takes some time. element in a collection of elements. Search result
Incidence Matrix– In this representation the size of determines whether that particular element is present in
matrix is total number of vertices by total number of the collection or not. If it is present, we can also find out
edges. In this representation column represent edges and the position of the element in the given collection.
row represent vertices. Matrix is filled 0 or 1 or – 1 Searching in an important technique in computer science.
where- In order to design algorithms programmers need to
• 0 is used to represent row edge which is not connected understand the different ways in which a collection of
to column vertex. data can be searched for retrieval.
• 1 is used to represent row edge which is connected as There are three types of searching
outgoing edge to column vertex. 1. Linear search
• –1 is used to represent row edge which is connected as 2. Binary search
incoming edge to column vertex. 3. Hash based search
Example– consider the following directed graph Linear Search– In this search check the elements of
representation a list, one at a time, without skipping any element. It is
useful when we need to search for an item in a small
unsorted list, but it is slow and time consuming. It there
are n element in the list then time complexity of linear
search is θ (n).
Algorithm–
Linear search (Array A, Key x)
1. i ← 1
2. If i > n then GoTo step 7
3. For i = 1 to n
4. If A[i] = key then Goto step 6
5. i ← i + 1
6. Print element found at index i and Goto step 8.
7. Print element not found.
Adjacency List– 8. Exit
• Adjacency list is linked list representation of every Time complexity of Linear Search Best Case →
vertex. O(1)
• In this representation, for each vertex in the graph, we Average Case & Worst Case – n comparisons are
maintain a list of neighbours. required so its complexity is O(n).
DATA Structures and Algorithm 114 YCT
Binary Search– It takes a sorted/ordered list and sort is θ (n log n). Insertion sort follows the incremental
divides it in the middle. It then compares the middle approach of designing. Its complexity is θ (n2). Bubble
element with the key to be searched. If the middle sort there are two loops. A loop within a loop will have
element matches the key the search is declared the complexity as θ (n2). Heap sort uses heap data
successful and program end. If middle element is greater structure. Its complexity is θ (n log n).
than key, the search repeats only in first half of the list. If Merge sort–
middle element is lesser than the key, the search repeats Algorithm-
only in the second half of the list. Binary search follow
Mergesort(arr, low, high)
the divide & conquer approach. In best case, complexity
1. If (low < high)
is θ(1) and worst case time complexity is θ(log n).
low + high
Algorithm– 2. mid =
2
Binarysearch (arr, key, low, high)
3. Mergesort(arr, low, mid–1)
1. If low > high
4. merge(arr, mid+1, high)
2. return false
5. merge(arr, low, mid, high)
3. else
Divide step stakes time O(1) & merge procedure takes
low + high
4. mid = O(n) time so combine effort of divide + combine = O(1)
2 + O(n) = O(n)
5. If key = arr [mid] so recurrence relation is.
6. return mid
n
7. else key < arr[mid] T(n) = 2T   + O ( n )
 2
8. return Binarysearch (arr, key low mid)
It is solution by master method is O(n log n).
9. else
Quick sort– Quick sort follows divide & Conquer
10. return Binarysearch (arr, key, mid + 1, high)
approach. Its partition procedure is complex but combine
Complexity–
step is simple total effort is θ(n) + θ(1) = θ(n).
Best case → O(1) Algorithm–
Worst Case → Quicksort(arr[], low, high)
recurrence relation is {
n If (low < high)
T (n) = T   +1
2 {
Complexity T(n) = O(log n) P = partition(arr, low, high)
Hash Based Search– Hash based search requires quicksort (arr, low, P-1)
only one key comparison to discover the presence or quicksort (arr, P+1, high)
absence of a key. Provided every elements is present at }
its designated position decided by a hash function. }
Sorting– is process of arranging the element in Choose the pivot as last element of the queue these
increasing or decreasing order. Sorting is an important which are less than pivot element they put into left sub-
area of study in computer science and many sorting problem and those element which are greater than pivot
algorithms have been developed and analysed from their they are put into right sub-problem.
performance point of view. Common sorting algorithms Complexity– Here divide step is little bit complex
are and it is θ(n) time & combine step will not take anytime,
1. Bubble sort since nature array elements are reshuffled within the
2. Insertion sort array. Pivot is such that left sub-problem contain. One
3. Selection sort element & right sub-problem contain n-1 element.
4. Quick sort so worst case complexity is
5. Merge sort T(n) = T (1) + T ( n − 1) + θ ( n )
6. Heap sort = T(n – 1 + n – 2 + n – 3 ......+ 2 + 1) + θ(n)
Merge sort and quick sort follow the divide &
 ( n − 1) .n 
conquer approach. The time complexity of quick sort in = T∑  + θ(n)
worst case is θ (n2). The time complexity of quick sort in  2 
best & average case in θ (n log n). Complexity of merge = θ(n2)
DATA Structures and Algorithm 115 YCT
Average & Best Case– Symbol Table–
T (n) = θ(n log n) Symbol table is an important data structure created
So average & best case complexity is same as merge and maintained by compilers in order to store
sort. Merge sort take the help of other array so. It is not information about the occurrence of various entities such
sort inplace so merge procedure is tough in merge sort as variable name, function names, objects and classes,
and in quick sort partition is complex and merge interfaces etc. symbol Table is used by both the analysis
procedure is simple. and the synthesis parts of a compiler.
Bubble sort– A symbol table may serve the following purposes
1. For every element of array depending upon the language in hand.
2. If array[i] > arr[i+1] • To store the name all entities in structured from at one
3. then swap[arr[i], arr[i+1]] place.
4. end if • To verify a variable has been declared.
5. end For
• To implement type checking, by verifying
In first pass largest element reaches to the end of
assignments and expressions in the source code are
array. In second pass second largest element reaches to
semantically correct.
second position from last element.
• To determine the scope of a name.
Its complexity is θ(n2). Since one is outer loop and
A symbol table is simply a Table which can be
second one is inner loop. So total time is θ(n2).
either linear or a hash table. It maintains an entry for
Insertion sort–Insertion sort follows the
each name in the following format.
incremental approach of designing.
Void insertionsort (int arr[], int n]) <symbol name, type, attribute>
{ For example, if a symbol table has to store
int i, key, J information about the following declaration.
for (i =1; i<n; i++) Register int increment,
{ then it should store entry such as:
key = arr[i] <increment, in, register>
J = i–1 Implementation of symbol Table–
while (J > = 0 && arr [J]> key) If a compiler is to handle a small amount of data
{ then the symbol table can be implemented as an
arr[J+1] = arr [J] unordered list, which is easy to code, but it is only
J=J–1 suitable for small tables only. A symbol table can be
} implemented in one of the following ways:
arr[J+1] =Key; • Linear (sorted or unsorted) list
} • Binary Search Tree
} • Hash table
Complexity of insertion sort– Symbol Tables are mostly implemented as hash tables
(i) Best case– Best case occur when element is sorted Operations–
order and int his case complexity of insertion sort is A symbol is implemented as linear or hash should
θ(n). provide the following operations.
(ii) Average & Worst Case– Average & worst case Insert–
occur when array element is reverse sorted order. In
This operation is used in analysis phase with the
this case complexity is θ(n2).
help of insert operation add information is used. In
Stable Sort– Counting sort is stable sort. Stable means if
source code, the unique name occurring will be added in
two or more than two elements are equal then they will
symbol Table. The insert () function takes the symbol
appear in output array in the same order as they appear in
and its attributes as argument & store the information in
input array.
the symbol table.
Single source shortest problem, which is based on
For example–
Greedy Algorithm uses the adjacency list representation
of graph whereas all pair shortest path problem based on int salary;
dynamic programming technique uses the matrix should be processed by compiler as:
representation of graph. insert (salary int),
DATA Structures and Algorithm 116 YCT
Lookup– • A simple path in a graph G that passes through every
lookup operation is used to search a name in the vertex exactly one is called a Hamillon path, and a
symbol table to determine simple circuit in a graph G that passes through every
• If symbol present in the table. vertex exactly once is called a Hamilton circuit.
• If it is declared before it is being used • Stack is used for depth first traversal of a graph.
• If the name is used in the scope • A dequeue is a linear list in which insertions and
• If the symbol is initialized deletions are made to and from either end of the
structure stack data structure is used in recursion.
• If the symbol declared multiple times
• Linked lists are best suited for the dynamic allocation
The basic format of lookup () is as follows
of data. Static queue is implemented using arrays.
lookup (symbol)
• The access of queue element is sequential from front
Data Structure Using C & C++
end of the queue element are deleted.
Data structure is a particular way of organizing data
• A full binary tree with n leaves contains 2n-1 nodes.
in a computer so that it can be used effectively.
• Strings, Arrays, Queue are linear type data structure.
For example, we can store a list of items using the
Stack linear data structure allow both insertion and
array data structure.
deletion at only one end.
Main data structure in C & C++ are Array, Linked
list, Stack, Queue, Binary Tree, Binary search tree, Heap, • A graph in which all nodes are of equal degree is
called as circuit.
Hashing, Graph, Advance data structure, description of
above data structure is given in previous pages. • The best data structure to check whether an arithmetic
Important Points– expression has balanced parenthesis is a stack.
• Binary search is applicable in array and AVL tree. • Selection sort require the minimum number of swap.
• Minimum & maximum height of a binary search tree • Queue data structure is useful in traversing a given
of n nodes is log2n, n. graph by breadth first search.
• The number of leaf nodes in a complete binary tree of
• Maximum number of edges in a n-node undirected
depth d is 2d.
graph without self-loops is n(n − 1) 2.
• Link list is preferably suitable for implementation of
• Pointer head points to first node of a linked list each insertion sort, radix sort and polynomial manipulation.
node has link to next node then time complexity to
• Stack and array are examples of linear data structure.
swap values of pth and qth nodes shall be then
• Quick sort algorithm is based on divide and conquer.
O(max(p, q)).
• As the process enters the system, it is placed in the job
• The best data structure to check whether an arithmetic
queue.
expression has balanced parenthesis is a stack.
• Examples of binary tree are heap, AVL-tree and
• Level order traversal of a rooted tree can be done by
search tree etc.
starting from the root and performing breadth first
search. • The largest element of in array index is called upper
bound
• N-queen problem and M-coloring problem are back
tracking algorithm and back tracking is a general • Depth-first search is similar to minimax search.
algorithm for finding solutions to same computational • Insertion sort is used by shell sort.
problems that uses a brute force approach for finding • Linear array data structure uses the index to refer to its
the desired output. Queue is useful in traversing a individual items.
given graph by breadth-first search (BFS). • A graph is a collection of nodes called vertices and
• Boolean, byte and double are primitive data type. line segments called edges that connect pairs of nodes.
• At the time of implementing a stack on a register • In linked list representation, graph is stored in
stack, the stack pointer register is incremented first adjacency list.
during push operation. • Heap sort and merge sort perform in least time in the
• Zero address instructions are implemented with the worst case.
help of stack. • Feedback queues dispatch tasks according to
• Two labeled trees are isomorphic if graphs of the two execution characteristics.
trees are isomorphic and the two trees have same • Selection sort algorithm design techniques is an
label. example of greedy methods.
• A circular list can be used to represent queue. • Heap can be used as priority queue.
DATA Structures and Algorithm 117 YCT
• An internal sorting algorithm is an algorithm that uses • Graphs are represented by using adjacency linked list.
main memory during the sort. • Pre order is nothing but depth-first order.
• The process of accessing data stored in a serial access • Stack is one ended data structure.
memory is similar to manipulating data on a stack.
• A list which displays the relationship of adjacency
• Spatial locality concepts make extensive use of array. between elements is said to be linear.
• The physical size in a dynamic array shows the size of • Complexity analysis is performed to explain how
the underlying array at the back-end.
algorithm will perform when the input grow larger.
• FIFO (first in first out) property is associated with a
• Array is linear data structure of same data types on the
queue.
basis of data type these array is called integer array,
• Effective usage of memory is the need for a circular
float array, character array etc.
queue. An important application of binary tree is
huffan coding. • Linked list is stored in non-contiguous location. In
linear linked list we can traverse in forward direction
• The operation of processing each element in the list is
but in doubly linked we can traverse in both direction
known as traversal.
i.e. forward & backward. In circular linked list we can
• The data structure required for breadth first traversal
delete any node in 0(1) time.
on a graph is queue.
• Stack is data structure in which insertion & deletion is
• The data type created by data abstraction process is
called abstract data type. done from one end only, usually referred at to as Top.
• Insertion sorting methods is the best suitable for • Stack follows LIFO principle.
sorting a list. A sort which compare adjacent elements • PUSH & POP are two basic operations performed on
in a list. A sort which compare adjacent elements in a a stock.
list and switches where necessary is insertion sort. • Stack is commonly used data structure for converting
• Program counter is updated during instruction an infix expression into equivalent prefix/postfix
execution to point to the next instruction byte to be notation.
fetched. • While conversion of an infix notation to its equivalent
• A model which is used to understand the design of a prefix/Postfix notation, only operators are pushed into
data structure to indicate an implementation the stack.
independent view of the data structure is abstract data • Queue is on ordered linear data structure, follow FIFO
type.
strategy.
• In priority queue an element can be added arbitrarily
• Front & rear are used to indicate beginning and end of
and from which only either the smallest or largest
queue.
element can be removed.
• Insertion in a queue happens at the rear end. Deletion
• Postfix notation is also called as reverse polish
notation. happens at the front.
• A sorting technique is called stable if relative order of • Dequeue is version of queue, which allows insertion
occurrence of non-district elements is maintained. & deletion at both ends.
• Heap sorting algorithms does in-place sorting with • Binary tree is non-linear data structure.
minimized space overhead. ChiMerge discretisation is • All operation performed corresponding to height of
a supervised method which employs the bottom-up the tree AVL (Adelson-Velsky and Landis) tree is
approach. balanced tree. Complete binary tree is binary tree
• Cyclomatic complexity provides a quantitative filled from Top to bottom and left to right. If there are
measure of logical complexity of a program. The n leaves then total number of leaves is 2n – 1. If
formula to find out cyalomatic complexity (m) is M = complete binary tree has 2n leaves then total number
E – N + 2P where E represents number of edges in of nodes in tree is (2n–1)2.2n –1=2n+1 – 1 nodes.
graph, N represents number of nodes and P the • Graph is a data structure represented by vertices and
number of connected component. edges (set of adjacent vertex) minimum spanning tree
• Spanning tree of a graph with V vertices has (V-1) is based on greedy algorithm. Single source shortest
edges. path problem is also based on Greedy algorithm. All
• The running time of Quick sort depends on whether pair shortest path problem is based on Dynamic
the partitioning is balanced or unbalanced. programming.
DATA Structures and Algorithm 118 YCT
Important Questions Asked in Previous Years Examinations
1. A binary search tree whose left subtree & right 14. What is maximum number of swaps that can
subtree differ in height by at most 1 unit is be performed in selection sort algorithm?
called_____ (a) n–1 (b) n
(a) AVL Tree (b) Red Black Tree (c) 1 (d) n–2
(c) Lemma Tree (d) None of the above 15. What is time complexity of binary search
2. Stack is also called as algorithm?
(a) Last in first out (b) First in last out (a) O(n) (b) O(1)
(c) Last in last out (d) First in first out (c) O(log2n) (d) O(n2)
3. ______ is not the component of data structure 16. Kruskal algorithm for finding the minimum
(a) Operators (b) Storage structure spanning tree of a graph is a kind of a?
(c) Algorithms (d) None of above (a) DP Problem (b) Greedy Algorithm
4. Inserting an item into the stack when stack is (c) Ad hoc Problem (d) None of above
not full is called ______ operation and is not 17. Maps in C++ are implemented using which of
empty is called ____ operation. the following data structure?
(a) PUSH, POP (b) POP, PUSH (a) Red Black Tree (b) Binary Search Tree
(c) Insert, delete (d) Delete, Insert (c) Avl Trees (d) Hash Table
5. ______ is a file in which items are added at one 18. What is best case time complexity of the binary
end & remove from other search algorithm?
(a) Stack (b) Queue (a) O(1) (b) O(n)
(c) List (d) Link List (c) O(log2n) (d) O(n2)
6. _______ is very useful in situation when data
19. What is time complexity to insert an element to
have to stored and then retrieved in reverse
the front of a linked list (head pointer green)?
order
(a) O(n) (b) O(1)
(a) Stack (b) Queue
(c) O(log n) (d) O(n log n)
(c) List (d) Link List
20. What is time complexity to insert an element to
7. Which of the following data structure can not
the rear of a linked list
store the non-homogeneous data element?
(a) Arrays (b) Records (a) O(n) (b) O(1)
(c) Pointers (d) Stacks (c) O(log n) (d) O(n log n)
8. Which of the following is non-linear data 21. Which of following can be done with linked list
structure? (a) implementation of stacks and queues
(a) Stack (b) List (b) implementation of binary trees
(c) Strings (d) Trees (c) implementation of data structure that can
9. Which data structure is used in breath first simulate dynamics arrays
search of a graph to hold nodes? (d) All of the above
(a) Stack (b) Queue 22. What is the information, which a linked list
(c) Tree (d) Array node must store?
10. Which of following data structure is non-linear (a) the address of the next node of it exists
type? (b) the value of the current node
(a) Strings (b) Lists (c) both (a) & (b)
(c) Stacks (d) Graph (d) none of the above
11. Which of the following data structure is linear 23. Worst case time complexity to access an
type? element in a BFS can be?
(a) Graph (b) Trees (a) O(n) (b) O(n log n)
(c) Binary tree (d) Stack (c) O(1) (d) O(log n)
12. To represent hierarchical relationship between 24. Which of following represents the post order
elements, which data structure is suitable? traversal to binary tree?
(a) Dequeue (b) Priority (a) Left-Right Root (b) Left-Root Right
(c) Tree (d) Graph (c) Right-Left Root (d) Right-Root Left
13. Which of the following is a divide and conquer 25. In what time complexity can we find the
algorithm? diameter of binary tree optimally
(a) Bubble sort (b) Selection sort (a) O(V+E) (b) O(V)
(c) Heap sort (d) Merge sort (c) O(E) (d) O(V log E)
DATA Structures and Algorithm 119 YCT
26. Which of the following statement is true about 36. Linear search is highly in efficient compared to
AVL trees binary search when dealing with:
(a) the difference between the height of left and (a) Small, unsorted arrays
right nodes can not be more than 1 (b) Small, sorted arrays
(b) the height of a AVL tree always remains of (c) Large, unsorted arrays
the order of O(log n) (d) Large, sorted arrays
(c) AVL trees are a type of self balancing binary 37. Which of the following operation is performed
search trees more efficiently by double linked list than by
(d) All of the above single linked list?
27. In a graph of n nodes and n edges how many (a) Deleting a node whose location is given
edges will be present? (b) Searching of an unsorted list for a given item
(a) Exactly 1 (b) At must 1 (c) Inserting a new node after node whose
(c) At must 2 (d) Depends on the graph location is given
28. Which of the following algorithms are used to (d) Traversing the list to process each node
find the shortest path from a source node to all 38. One can determine whether a binary tree is a
other nodes in a weighted graph binary search tree by traversing it in _____
(a) BFS (a) Pre-order (b) In-order
(b) Dijkstra Algorithm (c) Post-order (d) Any of these
(c) Prim's Algorithm 39. Spanning tree of connected graph with 10
(d) Kruskal's Algorithm vertices contains
29. Which data structure is mainly used for (a) 9 edges (b) 11 edges
implementing the recursive algorithm? (c) 10 edges (d) 9 vertices
(a) Queue (b) Stack 40. A sorted file contains 16 items. Using binary
(c) Array (d) List search, the maximum number of comparisons
30. In circular queue the value of r will be to search for an item in this file is _____
(a) r = r + 1 (a) 15 (b) 8
(b) r = (r + 1)% [queue size-1] (c) 1 (d) 4
(c) r = (r + 1)% queue_size 41. A complete binary tree with n leaf nodes has
(d) r = (r – 1)% queue_size _____.
31. Which of the following statement is true? (a) n + 1 nodes (b) 2n – 1 nodes
I. Using singly linked list & circular list, it is n ( n − 1)
not possible to traverse the list backwards. (c) 2n + 1 nodes (d) nodes
2
II. To find the predecessor, it is required to 42. Time required to delete a node x from a doubly
transverse the list from the first node in case of linked list having n node is
singly list. (a) O(n) (b) O(log n)
(a) I only (b) II only (c) O(1) (d) O(n log n)
(c) Both I and II (d) None of both 43. One can convert on infix expression to postfix
32. The advantage of _______ is that they solve the expression using a _____
problem of sequential storage representation (a) stack (b) queue
but disadvantage in that is they are sequential (c) deque (d) None of these
lists. 44. Which one of below mentioned is linear data
(a) Lists (b) Linked Lists structure?
(c) Trees (d) Queues (a) queue (b) stack
33. What will be the value of top, if there is a size (c) arrays (d) all of these
of stack STACK-SIZE is 5 45. Linked list are not suitable data structure for
(a) 5 (b) 6 which one of the following problems?
(c) 4 (d) None (a) insertion sort (b) binary search
34. _____ is not the operation that can be (c) radix sort (d) polynomial manipulation
performed on a queue. 46. What value does function my function return
(a) Insertion (b) Deletion when called with a value of 4?
(c) Retrieval (d) Traversal int my_function(int number)
35. Which of the following is not the type of queue? { if(number <=1)
(a) Ordinary queue (b) Single ended queue return 1;
(c) Circular queue (d) Priority queue else
DATA Structures and Algorithm 120 YCT
return number* my_function(number- 58. A technique for direct search is ______
1) (a) binary search (b) linear search
} (c) tree search (d) hashing
(a) 1 (b) 4 59. In a min heap
(c) 12 (d) 24 (a) minimum value of stored
47. For an undirected graph G with n vertices and (b) child nodes have less value than parent nodes
e edges, the sum of degrees of each vertices is (c) parent nodes have less value than child nodes
____ (d) maximum value is contained by the root node
(a) (n + 1)e (b) 2e 60. Minimum number of queues required for
(c) 2n (d) (e + 1)n priority queue implementation?
48. If locality is a concern you can use ___ to (a) 5 (b) 4
traverse the graph (c) 3 (d) 2
(a) Breadth First Search (b) Depth First Search 61. Which of the following sorting methods is not
(c) Either BFS or DFS (d) None of these suited for an already sequence?
49. A sorting technique which uses the binary tree (a) merge sort (b) selection sort
concept such that label of any node is larger (c) bubble sort (d) insertion sort
than all the labels in the sub tree is called _____ RPSC Lect. 2011
(a) selection sort (b) insertion sort 62. Minimum and maximum height of a binary
(c) heap sort (d) quick sort search tree of n nodes is
50. A full binary tree with n non-leaf nodes (a) 1, log2n (b) log2n, log2n
contains _____ (c) log2n, n (d) n, n2
(a) log 2n nodes (b) n + 1 nodes RPSC Lect. 2011
(c) 2n nodes (d) 2n + 1 nodes 63. Binary search is applicable in
51. Recursive procedure are implemented by using (a) Array and AVL tree
____ data structure. (b) Array and Heap tree
(a) queue (b) stacks (c) Queue and AVL tree
(c) linked lists (d) strings (d) Queue and Heap tree
52. Quick sort is an example of RPSC Lect. 2011
(a) divide & conquer 64. Pointer head points to first node of a linked list
(b) greedy approach Each node has link to next node. Time
(c) improved binary search complexity to swap values of pth and qth nodes
(d) dynamic programming shall be
53. In C programming, when we remove an item (a) O(p2+q2) (b) O(max (p,q))
from bottom of the stack, then: (c) O(1) (d) O((p+q)2)
(a) stack will fall down RPSC Lect. 2011
(b) stack will rearrange items 65. Every node of a tree has exactly 3 children. If
(c) it will convert to LIFO root is at height 1, number of nodes in a full
(d) This operation is not allowed tree (every level is full except last level that
54. The worst case of quick sort has order _____ consists of leaf nodes only) of height h is given
(a) O(n2) (b) O(n) by
(c) O(n log2 n) (d) O(log2 n) (a) (3h–1)/2 (b) (3h+1–1)/2
h–1
55. Which one of the following is not an example of (c) (3 –1)/2 (d) (3h–1)
computer language? RPSC Lect. 2011
(a) ALGORITHM (b) FORTRAN 66. The best data structure to check whether an
(c) PASCAL (d) COBOL arithmetic expression has balanced parentheses
56. You have to sort a list L consisting of a sorted is a/an
list followed by a few "random" elements. (a) stack (b) priority queue
Which of the following sorting methods would (c) array (d) linked list
be especially suitable for such a task? RPSC Lect. 2011
(a) Bubble sort (b) Selection sort 67. Maximum number of edges in a n-node
(c) Quick sort (d) Insertion sort undirected graph without self-loops is
57. Linked List Search complexity is (a) n2 (b) n(n – 1)/2
(a) O(1) (b) O(n) (c) n(n – 1) (d) n(n+1)/2
(c) O(log n) (d) O(log(log n)) RPSC Lect. 2011
DATA Structures and Algorithm 121 YCT
68. Level order traversal of a rooted tree can be 78. A Dequeue allows
done by starting from the root and performing (a) Insertion at only one end but deletion at both
(a) preorder traversal (b) in-order traversal ends
(c) depth first search (d) breadth first search (b) Insertion at both ends but deletion at one end
RPSC Lect. 2011 (c) Both (insertion at only one end but deletion at
69. Which of the following is not a backtracking both ends) and (insertion both ends but etion
algorithm? at one end)
(a) Knight tour problem (b) N-queen problem (d) Insertion and deletion in middle but not at
(c) Towers of Hanoi (d) M-coloring problem either ends
MPPSC State Forest Service Examination 2014
UPPSC LT GRADE 29.07.2018
79. Static queue is implemented using
70. Which of the following is useful in traversing a
(a) Pointers (b) Nodes
given graph by breadth-first search (BFS)?
(c) Arrays (d) None of these
(a) Stack (b) Set
MPPSC State Forest Service Examination 2014
(c) List (d) Queue
80. From which end of the Queue elements are
UPPSC LT GRADE 29.07.2018
deleted?
71. Which of the following is not a primitive data
(a) Rear (b) Front
type?
(c) Middle (d) Any Position
(a) Boolean (b) Byte
MPPSC State Forest Service Examination 2014
(c) String (d) Double
81. The access of queue element is
UPPSC LT GRADE 29.07.2018 (a) Sequential (b) Random
72. Zero address instructions are implemented (c) Direct (d) Indexed
with the help of
MPPSC State Forest Service Examination 2014
(a) queue (b) stack
82. Liner type data structure is
(c) register (d) None of the above (a) Strings (b) Arrays
UPPSC LT GRADE 29.07.2018 (c) Queue (d) All options are correct
73. Two labeled trees are isomorphic if ______ MPPSC State Forest Service Examination 2014
(a) graphs of the two trees are isomorphic 83. The best data structure to check whether an
(b) the two trees have same label arithmetic expression has balanced parenthesis
(c) Both (a) and (b) is a
(d) graphs of the two trees are cyclic (a) Queue (b) Stack
GPSC Asstt. Prof. 30.06.2016 (c) Tree (d) List
74. A path in graph G, which contains every vertex ISRO Scientist/Engineer 2017 (May)
of G once and only once? 84. When two n-bit binary numbers are added the
(a) Eular Circuit (b) Hamiltonian Path sum will contain at the most
(c) Eular Path (d) Hamiltonian Circuit (a) n bits (b) (n+3) bits
NIELIT Scientists-B 22.07.2017 (IT) (c) (n+2) bits (d) (n+1) bits
75. What data structure is used for depth first ISRO Scientist/Engineer 2017 (May)
traversal of a graph? 85. Which one of the following in-place sorting
(a) Queue (b) Stack algorithms needs the minimum number of
(c) List (d) None of above swaps ?
NIELIT Scientists-B 04.12.2016 (CS) (a) Insertion Sort (b) Quick Sort
76. A ________ is a linear list in which insertions (c) Heap Sort (d) Selection Sort
and deletions are made to from either end of ISRO Scientist/Engineer 2017 (May)
the structure 86. Which of the following data structure is useful
(a) Circular queue (b) Priority queue in traversing a given graph by breadth first
search ?
(c) Stack (d) Dequeue
(a) Stack (b) Queue
NIELIT Scientists-B 04.12.2016 (CS)
(c) List (d) None of the above
77. Linked lists are best suited
ISRO Scientist/Engineer 2017 (May)
(a) For relatively permanent collection of data
87. The number of leaf nodes in a complete binary
(b) For the dynamic allocation of data tree of depth d is
(c) For the insertion of data at one end (a) 2d (b) 2d-1+1
(d) When data accesses is done at one end d-1
(c) 2 +1 (d) 2d +1
MPPSC State Forest Service Examination 2014 RPSC VPITI 2014 (IT)
DATA Structures and Algorithm 122 YCT
88. Link list is preferably not suitable for 98. Shell sort uses:
implementation of? (a) Insertion sort (b) Merge sort
(a) Insertion sort (c) Quick sort (d) Selection sort
(b) Binary search Punjab PSC Lect. 2016 (IT)
(c) Radix sort 99. If all the edge weights of an undirected graph
(d) Polynomial manipulation are positive, then any subset of edges that
RPSC Lect. 2014 connects all the vertices and has minimum total
89. The linear data structures are weight is a:
(i) Stack (ii) Array (a) Hamiltonian cycle (b) Grid
(iii) Tree (iv) Graph (c) Hypercube (d) Tree
(a) (i) only (b) (i) & (ii) only Punjab PSC Lect. 2016 (IT)
(c) (iii) (d) (iv)
100. A graph is a collection of nodes called ..........
RPSC VPITI 2018 (IT)
and line segments called .......... that connect
90. Quick sort algorithm is based on pairs of nodes.
(a) Divide and Conquer
(a) Vertices, Paths (b) Paths, Edges
(b) Dynamic Programming
(c) Vertices, Edges (d) Vertices, Vertices
(c) Greedy Method
Karnataka PSC Comp. Sci. Teacher 16.10.2017
(d) None
101. In a linear search :
RPSC VPITI 2018 (IT)
91. .......... contains metadata: (a) Search starts at the middle and goes to left or
(a) Table (b) Data dictionary right depending on the case
(c) Data directory (d) Database (b) Search starts at the beginning of the list and
TNPSC 2016 (Degree) P-II checks every element in the list until either
92. The term OSPF is a short form for: the search is successful or the list ends
(a) Optimal Shortest Path First (c) Computes a hash value and compares
(b) Open Shortest Path First (d) Search is randomly carried out
(c) Open Short Packet First Karnataka PSC Comp. Sci. Teacher 16.10.2017
(d) Optimum Start Path First 102. In Tower of Hanoi problem, with n disks, the
APPSC Poly. Lect. 13.03.2020 number of moves from source to destination is:
93. As the process enters the system, it is placed in (a) 2n – 1 (b) 2n–1
n
which type of the queue? (c) 2 + 1 (d) 2n+1
(a) Block queue (b) Ready queue Karnataka PSC Comp. Sci. Teacher 16.10.2017
(c) Job queue (d) Waiting queue 103. In linked list representation, graph is stored in:
APPSC Poly. Lect. 13.03.2020 (a) Edge list (b) Vertex list
94. Which of the following is not to a binary tree? (c) Adjacency list (d) None of the above
(a) Heap (b) AVL-Tree Karnataka PSC Comp. Sci. Teacher 16.10.2017
(c) B-Tree (d) Search tree 104. Consider the following sorting algorithms.
UPPCL AE 2014 I. Quicksort
95. Link lists are not suitable for
II. Heapsort
(a) Polynomial manipulation
III. Mergesort
(b) Binary search
Which of them perform in least time in the
(c) Radix sort
worst case?
(d) Insertion sort
(a) I and II only (b) II and III only
UPPCL AE 2014
96. Which search is similar to minimax search? (c) III only (d) I,II and III
(a) Hill- climbing search (b) Depth- first search ISRO Scientist/Engineer 2014
(c) Breadth - first search (d) All of these 105. Feedback queues
RPSC ACF & FRO 23.02.2021 (CS) (a) are very simple to implement
97. Which one is informed search? (b) dispatch tasks according to execution
(a) Depth First Search characteristics
(b) Breadth First Search (c) are used to favour real time tasks
(c) Bi- Directional Search (d) require manual intervention to implement
(d) Heuristic Search properly
RPSC ACF & FRO 23.02.2021 (CS) ISRO Scientist/Engineer 2007
DATA Structures and Algorithm 123 YCT
106. Selection sort algorithm design techniques is (d) implement LIFO principle in queues
an example of GPSC Asstt. Prof. 30.06.2016
(a) Greedy method 115. An important application of binary tree is ____
(b) Divide-and -conquer (a) Huffman coding
(c) Dynamic Programming (b) Stack implementation
(d) Backtracking (c) queue implementation
ISRO Scientist/Engineer 2007 (d) traverse a cyclic graph
107. A graph with "n" vertices and n-1 edges that is GPSC Asstt. Prof. 30.06.2016
not a tree, is 116. The operation of processing each element in the
(a) Connected (b) disconnected list is known as
(c) Euler (d) A circuit (a) sorting (b) merging
ISRO Scientist/Engineer 2007 (c) inserting (d) traversal
108. Heap can be used as _____ APPSC Lect. Degree College 07.06.2017 (CS)
(a) Priority queue 117. A full binary tree with n leaves contains
(b) Stack (a) n nodes (b) log2 n nodes
(c) A decreasing order array (c) 2n–1 nodes (d) 2n nodes
(d) Normal Array APPSC Lect. Degree College 07.06.2017 (CS)
GPSC Asstt. Prof. 30.06.2016 118. The data structure required for breadth first
109. A graph with all vertices having equal degree is traversal on a graph is
known as a ______ (a) queue (b) stack
(a) Multi Graph (b) Regular Graph (c) array (d) tree
(c) Simple Graph (d) Complete Grah APPSC Lect. Degree College 07.06.2017 (CS)
GPSC Asstt. Prof. 30.06.2016 119. The data type created by data abstraction
process is called
110. What is an internal sorting algorithm?
(a) class (b) structure
(a) Algorithm that uses tape or disk during the
(c) abstract data type (d) user defined data type
sort
APPSC Lect. Degree College 07.06.2017 (CS)
(b) Algorithm that uses main memory during the
sort 120. Which one of the following register is updated
during instruction execution to point to the
(c) Algorithm that involves swapping
next instruction byte to be fetched?
(d) Algorithm that are considered 'in place'
(a) Stack pointer (b) Frame pointer
GPSC Asstt. Prof. 30.06.2016 (c) Program counter (d) Argument pointer
111. The process of accessing data stored in a serial UPSC Poly Lect. 10.03.2019
access memory is similar to manipulating data
121. A model which is used to understand the design
on a _______
of a data structure to indicate an
(a) Heap (b) Binary Tree implementation-independent view of the data
(c) Array (d) Stack structure is:
GPSC Asstt. Prof. 30.06.2016 (a) Linear data type
112. What is meant by physical size in a dynamic (b) Non-linear data type
array? (c) Abstract data type
(a) The size allocated to elements (d) Primitive data type
(b) The size extended to add new elements UPSC Poly Lect. 10.03.2019
(c) The size of the underlying array at the back- 122. In a queue an element can be added arbitrarily
end and from which only either the smallest or
(d) The size visible to users largest element can be removed, the type of the
GPSC Asstt. Prof. 30.06.2016 queue is:
113. Which of the following properties is associated (a) Circular queue (b) Priority queue
with a queue? (c) Deques (d) Ordinary queue
(a) First In Last Out (b) First In First Out UPSC Poly Lect. 10.03.2019
(c) Last In First Out (d) Last In Last Out 123. Postfix notation is also known as:
GPSC Asstt. Prof. 30.06.2016 (a) Reverse polish notation
114. What is the need for a circular queue? (b) Polish notation
(a) effective usage of memory (c) Infix notation
(b) easier computations (d) Reverse notation
(c) to delete elements based on priority UPSC Poly Lect. 10.03.2019
DATA Structures and Algorithm 124 YCT
124. A sorting technique is called stable if 129. Which type of behavior a stack exhibits ?
(a) If it takes O (n log n) time (a) First in, first out (b) Last in , last out
(b) It uses divides and conquer technique (c) Last in, first out (d) None of these
(c) Relative order of occurrence of non-district RPSC ACF FRO 23.02.2021 (Comp. App./Sci.)
elements is maintained 130. Spanning tree of a graph with V vertices has
(d) It takes O (n) space (a) v - 1 edges (b) v edges
ISRO Scientist/Engineer 17.12.2017 (c) v + 1 edges (d) v + 2 edges
125. Which of the following sorting algorithms does RPSC ACF FRO 23.02.2021 (Comp. App./Sci.)
in-place sorting with minimal space overhead? 131. Graphs are represented using:
(a) Merge sort (a) Adjacency tree
(b) Radix sort (b) Adjacency linked list
(c) Heap sort (c) Adjacency graph
(d) Address Calculation sort (d) Adjacency queue
APPSC Lect. 2017 (Degree College) (CS) (e) Adjacency output
126. What is the cyclomatic complexity of a module CGPSC Asstt. Prof. 2014 (Comp. App.)
which has seventeen edges and thirteen nodes? 132. The running time of ________ depends on
(a) 4 (b) 5 whether the partitioning is balanced or
(c) 6 (d) 7 unbalanced.
ISRO Scientist/Engineer 2013 (a) Insertion sort (b) Selection sort
127. ChiMerge discretisation is a_____method, (c) Quick sort (d) Merge sort
which employs the _____ approach. (e) Bubble sort
(a) Supervised, top-down CGPSC Asstt. Prof. 2014 (Comp. App.)
(b) Unsupervised, top-down 133. Preorder is nothing but:
(c) Supervised, bottom-up (a) Depth-first order (b) Breadth-first order
(d) Unsupervised, bottom-up (c) Topological order (d) Linear order
APPSC Lect. Degree College 16.09.2020 (e) Reverse order
128. Which metric provides a quantitative measure CGPSC Asstt. Prof. 2014 (Comp. App.)
of logical complexity of a program? 134. A queue in which items are inserted and
(a) Loop complexity removed from any position based on same
(b) Data complexity property :
(c) Behaviour complexity (a) deque (b) property queue
(d) Cyclomatic complexity (c) priority queue (d) preference queue
RPSC ACF FRO 23.02.2021 (Comp. App./Sci.) RPSC VPITI 2018 (CS)

ANSWER KEY
1. (a) 2. (a) 3. (d) 4. (a) 5. (b) 6. (a) 7. (a) 8. (d) 9. (b) 10. (d)
11. (d) 12. (c) 13. (d) 14. (a) 15. (c) 16. (b) 17. (a) 18. (a) 19. (b) 20. (b)
21. (d) 22. (c) 23. (a) 24. (a) 25. (a) 26. (d) 27. (a) 28. (b) 29. (b) 30. (c)
31. (c) 32. (b) 33. (c) 34. (d) 35. (b) 36. (d) 37. (a) 38. (b) 39. (a) 40. (d)
41. (b) 42. (c) 43. (a) 44. (d) 45. (b) 46. (d) 47. (b) 48. (b) 49. (c) 50. (d)
51. (b) 52. (a) 53. (b) 54. (a) 55. (a) 56. (d) 57. (b) 58. (d) 59. (c) 60. (d)
61. (b) 62. (c) 63. (a) 64. (b) 65. (a) 66. (a) 67. (b) 68. (d) 69. (c) 70. (d)
71. (c) 72. (b) 73. (c) 74. (b) 75. (b) 76. (d) 77. (b) 78. (c) 79. (c) 80. (b)
81. (a) 82. (d) 83. (b) 84. (d) 85. (d) 86. (b) 87. (a) 88. (b) 89. (b) 90. (a)
91. (b) 92. (b) 93. (c) 94. (c) 95. (b) 96. (b) 97. (d) 98. (a) 99. (d) 100. (c)
101. (b) 102. (a) 103. (c) 104. (b) 105. (b) 106. (a) 107. (b) 108. (a) 109. (b) 110. (b)
111. (d) 112. (c) 113. (b) 114. (a) 115. (a) 116. (d) 117. (c) 118. (a) 119. (c) 120. (c)
121. (c) 122. (b) 123. (a) 124. (c) 125. (c) 126. (c) 127. (c) 128. (d) 129. (c) 130. (a)
131. (b) 132. (c) 133. (a) 134. (c)

DATA Structures and Algorithm 125 YCT


05.
COMPUTER ORGANIZATION AND
OPERATING SYSTEM
Basic Structure of Computer Secondary Storage– Secondary memory is made up
of magnetic material. Memory all the instruction & Data
A Computer is an electronic device which takes some
which is not going to be executed is stored in secondary
input, do some arithmetic & logical operation and
produce the desired result. memory Secondary memory is slower and cheaper than
main memory so Its capacity is large. It is characterized
by low cost, large access time & large storage Capacity.
(c) Processing– Program is made of instruction &
data. The process of performing operation on data as per
the instruction specified by Program is called Processing.
Data Processing is an activity where data is manipulated
so that meaningful information can be achieved. Data
and instruction is taken from main memory & transferred
to ALU (Arithmetic Logic unit), a part of CPU, which
perform every type of calculation. When all the
processing completes, the final result is transferred to
main memory
(d) Output– In output unit result is displayed. result
It has following components is given through output devices like monitor, Printer etc
a. Input unit (For accepting data & Instruction) computer process the data in binary format & result of
b. Storing Data (Primary& Secondary memory) Processing is also in the binary form. the result can not
c. Processing Data (CPU) be directly given to the user, The output device therefore
d. Output unit (displaying result & Printer) convert the result in available in binary form into human
e. Controlling and coordinating all operation inside readable language. before displaying it to the user.
computer (Control unit) (e) Controlling– The function of managing the
Computer is a system, so all the subsystem interact controlling of all the component i.e Coordinating all the
with each other to achieve the goal of computer operation is done by control unit. Control unit fetch the
(a) Input– Input device is the main component of instruction, decode the instruction and execute the
Computer. Through this device data & instruction are instruction.
inserted inside the Computer. Main input device is Computer Arithmetic Operations– ALU is
Keyboard, Mouse, Scanner & Trackball & Light Pen etc.
mathematical Brain of computer, ALU is digital circuit
(b) Storage– Storage is the properties of computer that provides arithmetic & logic operations, It is the
where data & instructions are stored in computer. Some
fundamental building block of the central processing unit
storage are volatile and some non-volatile. There are two
of a computer most of the operations are performed by
types of Storage
one or more ALU which load data from input register
I. Primary storage
Registers are small amount of storage available to the
II. Secondary storage
CPU
Primary storage– Primary memory is key fast
memory. It is an electronic device so all content of
memory takes equal time Main memory is also called
Random access memory (RAM). The Program and data
are loaded into the primary memory before processing.
CPU directly interact With the RAM. It is volatile in
nature. Primary memory is very expensive & therefore
Limited in capacity.
Computer Organization and Operating System 126 YCT
Central Processing Unit and Instructions Memory Hierarchy– Memory usually refers to
random access memory typically DRAM (Dynamic
CPU Consist of arithmetic logic unit (ALU) control
unit (CU) and Register the Brain of computer is known RAM) and memory can also refer to other forms of data
as Central Processing Unit. It carries out the actual storage.
Processing, it is known as processor of computer. It is Term storage refers to storage Devices that are not
placed on the circuit Known as integrated circuit, directly accessible by the CPU (Secondary Storage)
Integrated circuits are made up of semiconductor Example of secondary storage device are hard disk,
material. Program consist of data & instruction. These optical disk Drives and other devices that are slower than
are given to CPU for execution of Program. RAM but are used to store data permanently.
CPU fetches the program and data from memory and
perform arithmetic and logic operation as per given CPU Register– Register are directly accessible by
instruction and stores the result back to memory. CPU CPU. Registers are the fastest of all forms of computer
has its own memory called Register. Register are part of data storage.
CPU chip and they are limited in size and number. These Cache Memory– Cache memory is located between
Register are used for storing data, instruction and Register and main memory. It is used to store instruction
intermediate result. & data that are repeatedly require to execute Program.
CPU has two main component– CPU first checks within the data & instruction is
Arithmetic Logic Unit (ALU) and Control Unit available in cache memory. When the same piece of data
(CU), ALU perform all kind of calculations such as
and instruction is needed, the CPU read it from cache
arithmetic (Add, subtract, multiply divide), comparison
(Less than, Greater than or Equal to) and other operation memory instead of main memory .
Control unit's main function is to direct and Primary Memory – Primary memory (main
coordinate the computer operations. It interpret the memory or Internal memory can be directly accessed by
instruction and initiates action to execute them. Control the CPU. CPU continuously reads instruction stored in
Unit, Control the flow of data through the computer the primary memory and execute them any data that has
system & direct the ALU, input-output (I/O) devices and to be operated by CPU is also store there, There are two
other units. It is also called central nervous system of the types of primary memory RAM & ROM. RAM is
computer system In addition the CU is responsible for usually referred to as main memory & It is faster than
fetching decoding, executing instructions and storing
the secondary memory.
result.
ROM is non-volatile, which means Its contents are
not lost even when the power is turned off. It is a small
but faster permanent storage for the contents which are
rarely changed. For Example boot loader that loads the
operating system into primary memory, is stored in
ROM.
Secondary Memory– Primary memory has limited
storage capacity and is either volatile (RAM) or read-
only (ROM) This memory is not directly accessible by
the CPU. Secondary Storage devices hold data even
when the computer is switch off. An example of such a
Memory Organization device is hard-disk.
A computer system require to store the data & Computer usually uses its input/output channel to
instruction for processing, Whenever we talk about the access the data from secondary storage device to transfer
memory of computer system we usually Talk about the the data in the main memory. While the CPU can read
main or primary memory. the data stored in main memory in nanoseconds, the data
Secondary memory is used to store data, instructions from these days there are secondary storage devices like
and result permanently for future use. SDD which support very fast data Transfer speed as
compared to earlier HDD (Hard disk Drive). Data
transfer between commutes have become easier and
simple due to availability of small-sized and portable
flash or pen drive.
I/O Organization
I/O Subsystem of computer provides an efficient
communication between the central system and outside
environment. It handles all the input output operations of
the computer system.
Computer Organization and Operating System 127 YCT
Peripheral Devices– memory buses directly would improve the speed of
Input or output devices that are connected to transfer. This technique is known as DMA.
computer are called Peripheral devices. For example In this, the interface transfer data to and from the
Keyboard display units and Printers are common memory through memory bus. A DMA controller
peripheral devices. There are three types of Peripherals manages to transfer data between peripherals & memory
Input Peripherals– unit.
Allows user input, from the outside world to the Many hardware systems use DMA such as disk
computer. Example : keyboard, mouse etc drive controller, graphic cards, network cards. It is also
Output-Peripherals– Allows information output used for intra chip data transfer in multicore processor.
from computer to the outside world example: Printer, In DMA, CPU would initiate the transfer, do other
Monitor etc. operations while the transfer is in progress and receive an
Input-output Peripherals– Allows both input as interrupt from DMA controller when the transfer has
well as, output, Example-Touch screen etc been completed.
Interfaces– Interface is a shared boundary between Operating Systems Overview
two separated components to the system for
Operating system is software that make the
communication purposes.
computer hardware to work. operating system is a system
There are Two types of interface: software that must be loaded before starting any task.
a. CPU Interface Operating system is an Interface for users to
b. I/O Interface communicate with the computer. We can say that
Input-Output Interface– In computer system, there operating system is control program of a computer main
are special hardware components between the CPU and function of the operating system include:
peripherals to control or manage the input-output • Operates CPU of the computer
transfers. These components are called input-output • Control input/output devices that provides the
interface units because they provide communication interface between user and the Computer
links between processor bus and peripherals. They Handles the working of application programs with the
provide a method for transferring information between hardware and other software systems
internal system and input-output devices.
• Manages the storage and retrieval of information
Modes of I/O Data Transfer- Data transfer
between the central unit and I/O devices can be handled
in generally there types of modes which are given below.
a. Programmed I/O
b. Interrupt initiated I/O
c. Direct memory access
Programmed I/O→ Programmed I/O instruction
are result of I/O instruction written in computer program.
Each data item transfer is initiated by the instruction in
the Program. Usually the program control data transfer For hardware functions such as input and output and
to and from CPU & peripheral. Transferring data under memory allocations, the operating system acts as an
Programmed I/O requires constant monitoring of the intermediary between programs and computer Hardware.
peripherals by the CPU. Although the application code is usually executed by the
Interrupt Initiated I/O – In the programmed I/O hardware and frequently makes system calls to on
method the CPU stays in the program loop until the I/O operating function.
unit indicates that it is ready for data transfer. This is Dominant general purpose personal computer operating
time Consuming process because it keeps the processor system is Microsoft windows with market share of
busy needlessly. around 76.45% mac OS by Apple inc is in second place
This problem can be overcome by interrupt initiated (17.72%) and the varieties of Linux are collectively in
I/O In this when interface determines that the peripheral third place (1.73%) In the mobile sector (including
is ready for data transfer, it generates an interrupt. After Smartphone and Tablet), Android share is up to 72% in
receiving the interrupt signal, the CPU stops the task the year 2020. Linux distribution are dominant in the
which it is processing and service the I/O transfer and server and Super computing sectors.
there return back to its previous processing task. Types of operating system
Direct Memory Access– Removing the CPU from a. Batch processing
the path & letting the peripheral device manage the b. Single user single tasking
Computer Organization and Operating System 128 YCT
c. Single user multi tasking 3.1 (a) Advantages of Batch Operating System :
d. Multi Processing It is very difficult to guess or know the time required
5. Real time operating system for any job to complete. Processes of the batch system
01. Operating System know how long the job would be when it is in queue.
Operating System acts as an interface between Multiple users can share the batch systems.
computer hardware and user. It manages and controls all The idle time for the batch system is very less.
the hardware and flow of data, instructions and It is easy to manage large work repeatedly.
information to and within the system. The Operating 3.1 (b) Disadvantages of Batch Operating System :
System takes instructions from the user and directs it to Lack of interaction between the user and the job.
CPU, which further passes the instructions to the
Batch systems are hard to debug.
hardware.
The other jobs will have to wait for an unknown time
if any job fails.
3.1 (c) Example of Batch Based Operating System :
Payroll system, Bank statements, etc.
3.2 Time Sharing Operating System :
The user directly gives instructions to an OS, and the
OS executes multiple tasks at a time. The computer
memory stores these programs and they share a single
processor. The tasks switch rapidly from one to another
giving immediate response to the user. These system are
also known as multitasking systems. The task can be
Operating System is one of the core software from a single user or different users also. It uses the
programs that run on hardware and makes is usable. The concept of CPU scheduling and multiprogramming so
user can interact with hardware so that they can send that the time of the CPU is divided equally among the
commands and receive output. An Operating System tasks. This allows all the tasks to work smoothly. As the
provides an interface between user and machine. This interactive I/O is slower as compared to the CPU, this
interface can be graphical user interface (GUI) in which OS also increases CPU utilization as there is always a
users. Click on screen elements to interact with spare job to execute. This OS focuses on decreasing the
Operating System or a command line interface (CLI) to response time of a task. The time taken to execute a
tell the Operating System to do things, it also manages the single task is called quantum. Once this time interval is
computer's resource such as CPU, memory, disk drives and over the OS switches to the next task.
printers. It provides services for application software.
3 Types of Operating System :
An Operating System performs all the basic tasks
like managing files.
Some widely used Operating System are as follows : -
3.1 Batch Operating System :
This type of Operating System does not interact with
the computer directly. There is an operator which takes 3.2 (a) Advantages of Time Sharing Operating
similar jobs having the same requirement and group System :
them into batches. It is the responsibility of the operator Each task receives equal time to use the CPU.
to sort jobs with similar needs. The main characteristics Reduces CPU idle time.
of the batch Operating System is the CPU executes the Fewer chances of duplication of software.
jobs in the same sequence that they are sent to it by the 3.2 (b) Disadvantages of Time Sharing Operating
operator, which implies. That the task sent to the CPU System :
first will be executed first, It’s also known as the ‘First Due to multiple sharing, it is unreliable.
come, First serve’. One must have to take care of the security and
integrity of user programs and data.
Data communication is difficult.
3. 2 (c) Example of Time Sharing Operating System :
Multics, Unix, Linux, Windows 2000 server,
Windows NT server, etc.
Computer Organization and Operating System 129 YCT
3.3 Distributed Operating System : of Operating Systems allow shared access of files,
In this type of Operating System, multiple CPUs are printers, security, applications and other networking
used to serve multiple processes and users. All the functions, over a small private network. One more
computers have their own memory unit and CPU are important aspect of users are well aware of the
interconnected and communicate with each other over a underlying configuration of all other users within the
shared communication network. The processors differ in network, their individual connections etc. and that’s why
size and function and remote access is enabled within the these computers are popularly known as tightly coupled
devices connected to network. The job of data processing systems.
is distributed among various processors which makes the
job more efficient. The major benefit of working with
these types of the Operating System is that it is always
possible that one user can access the files or software
which are not actually present on his system but some
other system connected within this network i.e., remote
access is enabled within the devices connected in that
network.

3.4 (a) Advantages of Network Operating System :


It has stable and centralized servers that can handle
security concerns well.
Integration of new technologies and hardware up-
gradation is easier.
Server access is possible remotely from different
locations and types of systems.
3.4 (b) Disadvantages of Network Operating System :
Most operations could only be performed through a
central location.
3.3 (a) Advantages of Distributed Operating System It repairs regular maintenance and updating.
Failure of one will not affect the other network In this type of Operating System, the failure of any
communication as all systems are independent from node in a system affects the whole system.
each other. 3.4 (c) Example of Network Operating System :
Increased data exchange speed and reduced load on Microsoft Windows Server 2003, Microsoft Windows
the host computer. Server 2008, UNIX, Linux, Mac OS X, Novell Netware
Since resource are being shared computation is highly and BSD, etc.
fast and durable. 3.5 Real time Operating System :
These systems are easily scalable as many system can A real time Operating System is defined as a data
be easily added to the network. processing system in which the time interval required to
process and respond to inputs is so small that it controls
3.3 (b) Disadvantages of Distributed Operating
the environment. The time taken by the system to
System :
respond to an input and display of required updated
A single system failure might not affect the entire information is termed as the response time. Real time
communication but the failure of the main network systems are used when there are time requirements on
can crash it. the operation of processor or the flow of data and real
Languages used to establish distributed Operating time Operating System can be used as a control device in
Systems are not well established. a dedicated application.
It is not readily available as it is very expensive and There are two types of Real-time Operating System –
complex. (i) Hard Real-time System : These Operating Systems
3.3 (c) Example of Distributed Operating System : are meant for applications where time constraints are
LOCUS, MICROS, IRIX, DYNIX, AIX, Solaris, very strict and even the shortest possible delay is not
Mach, OSF/1 etc. acceptable. These systems are built for saving life
3.4 Network Operating System : like automatic parachutes or airbags which are
These systems run on a server and provide the required to be readily available in case of any
capability to manage data, users, groups, security, accident. Virtual memory is rarely found in these
applications and other networking functions. These types systems.
Computer Organization and Operating System 130 YCT
(ii) Soft Real-time System : They have a less strict time MS-DOS.SYS : It is another hidden and read only
constraint and critical tasks are given priority above system file that is executed immediately after the
others until they are completed and have limited execution of IO.SYS file is finished. MS-DOS.SYS
utility. acts as the kernel of MS-DOS. It is responsible for
3.5 (a) Advantages of Real-time Operating System : managing the memory, processors and the
It provides more output from all the resources as there input/output devices of the computer system.
is maximum utilization of systems. CONFIG.SYS : It is a system file that is used to
These Operating Systems focus more on running configure various hardware components of the
applications than those in the queue. computer system so that they can be used by the
It provides the best management of memory various applications.
allocation. COMMAND.COM : It is the command interpreter
Due to the small size of programs, they can be used in that is used to read and interpret the various command
embedded systems. issued by the users.
3.5 (b) Disadvantages of Real-time Operating System AUTOEXEC.BAT : It is a batch file consisting of a
Very few tasks run at the same time in order to avoid list of commands that is executed automatically as the
errors. computer system starts up.
It needs specific interrupts signals and device drivers 4.1.1 Commands of MS-DOS :
to respond earliest to interrupts. The various commands of MS-DOS can be
In such systems we cannot set thread priority as these categories as :
systems cannot switch tasks easily. (i) Internal Commands : Internal commands are
3.5 (c) Example of Real-time Operating System : those commands that are stored in the command
interpreter of MS-DOS. These commands get
Scientific experiments, medical imaging system,
automatically loaded into the memory when a computer
industrial control systems, weapon systems, Robots, air
system is started.
traffic control systems, MTOS, Lynx, RTX, etc.
DIR : The DIR command is used to display the
4. Popular Operating System :
names of files and subdirectories present in a directory
To date, many Operating System have been
along with their size in bytes and the date and time of
developed that suit different requirements of the users.
last modification performed.
Some of these Operating Systems became quite popular
while others did not do well. The following are some of COPY : The COPY command is used to a file from
one location to another on the computer system.
the popular Operating System.
TYPE : The TYPE command is used to view the
4.1 MS-DOS :
contents of an existing file.
MS-DOS was developed and introduced by
MD : The MD command is used to create a new
Microsoft in 1981. It is a single user and single tasking
Operating System developed for personal computers. directory at the specified location in the computer
system. MD stands for make directory and it is also
MS-DOS was specifically designed for the family of
Intel 8086 Microprocessors. This Operating System known as the MKDIR command.
provides a command line user interface, which means CD : The CD command is used to move from one
that a user needs type a command at the command line directory to another specified directory on the computer
for performing a specific task. The CLI (Command Line system. CD stands for change directory and it is also
Interface) of MS-DOS is more commonly known as known as CHDIR command.
DOS prompt. The user interface of MS-DOS is very RD : The RD command is used to remove an empty
simple to use but not very user friendly because of its. directory from the computer system. RD stands for
Non-graphical nature, The command prompt, of MS- remove directory and it is also known as RMDIR
DOS only allowed the execution of the files with the command.
extensions .com (Command files), BAT (Batch files) and DEL : The DEL command is used to delete one or
.exe (Executable files). The structure of MS-DOS more files from the computer system. DEL stands for
comprises the following programs : delete and it is similar to ERASE command.
IO.SYS : It is an important hidden and read only DATE : The DATE command is used to display the
system file of MS-DOS that is used to start the current date stored in the computer system.
computer system. It is also responsible for the TIME : The TIME command is used to display the
efficient management and allocation of the hardware current time.
resources through the use of appropriate device CLS : The CLS command is used to clear the screen
drivers. of the command prompt Windows.
Computer Organization and Operating System 131 YCT
(ii) External Commands : External commands are CALL : The CALL command is used to call a batch
those commands, which are stored an a disk and are not program at the command prompt. It is also used to call or
in the command interpreter. These commands have an execute one batch program from another in such a
extension of .Com, .Exe or .Bat and are less frequently manner that the first batch program is not interrupted.
used as compared to the internal commands. ECHO : The ECHO command is used to display or
ATTRIB : ATTRIB is used to display the attributes print a message on the command prompt. It is also used
of a file and change these attributes, if required. A file to turn on or off the display of the batch file commands
can have any of the four attributes, i.e. read-only, system, on the command prompt.
archive or hidden. 4.2 UNIX :
CACLS : The CACLS command is used to display UNIX is an Operating System that allows several users
the Access Control List (ACLs) of the specified file. An to perform a number of tasks simultaneously. The first
ACL is a list that provides information to a computer version of UNIX was introduced during the 1970’s.
system about the user access rights pertaining to a file. however, since then, it is in constant development phase
EDIT : The EDIT command is used to create, open for further improving it functionality. UNIX Operating
or edit a particular file. It helps in creating a new file in System provides a GUI that enables its users to work in a
the specified directory and also enables us to open and more convenient environment. UNIX is most suitable for
edit the contents of an existing file. the computers that are connected to a Local Area
Network (LAN) for perfuming scientific and business
TREE : The TREE command is used to view the
related operations. It can also be implemented on
files and subdirectories of the current directory in the
personal computers.
form of a tree. It helps view the structure of the current
directory in an easier way. The following are the core components of the UNIX
Operating System.
DELTREE : The DELTREE command is used to
Kernel : It is the central part of the UNIX Operating
delete a directory and all the files present in that
System that manages and controls the communication
directory permanently from the computer system. It
between the various hardware and software components
remove a directory from the computer system along with
of the computer system. The other major functions
its files and subdirectories.
performed by the kernel and are process management,
CHKDSK : The CHKDSK command is used to memory management and device management.
check the status of hard disk drives on the computer
Shell : It is the user interface of the UNIX Operating
system for errors. If there are any errors on the disk then
System that acts as an intermediary between the user and
it helps in correcting those errors. We should run this
the kernel of the Operating System. Shell is the only
command frequently in order to detect any errors on the program in UNIX Operating System that takes the
disk. commands issued by the users and interprets them in an
COMP : The COMP command is used to compare efficient manner to produce the desired result.
two existing files. Files and Processes : The UNIX Operating System
FIND : The FIND command is used to search and arranges everything in terms of files and process. The
display a string of characters in the specified file. The directory in this Operating System is also considered as a
string to be searched is placed inside double quotes. file that is used to house other files within it. The process
HELP : The HELP command is used to display is usually a program executed under the UNIX Operating
information related to various commands in MS-DOS. System. Several processes can be executed
(iii) Batch Commands : Batch commands are used simultaneously in this Operating System and are
to execute a sequence of commands in MS-DOS. The identified by a unique Process Identifier (PID) assigned
sequence of commands, which could be internal or to them.
external are store in a file called batch file. A batch file is
stored with .Bat extension.
@ : The @ command is used to hide the display of a
batch command on the screen and display only the output
produced by the batch command.
% DIGIT : The % DIGIT command is used to
specify the batch parameters, which can be instantiated
by the user at the time of execution of the batch
command. These parameters are in the form of digits
ranging from 0 to 9 where %0 represents the batch
command itself.

Computer Organization and Operating System 132 YCT


The following are some of the significant features of Name of
Date of
UNIX Operating System. Operating Significant Features
Release
It allows multiple users to work simultaneously. System
It allows the execution of several program and Windows August, 32 Bit File System.
processes at the same time to ensure efficient 95 1995 Multitasking.
utilization of the processor. Object Linking and
It implements the concept of virtual memory in an Embedding (OLE).
efficient manner. This feature enables the UNIX Plug and Play.
Operating System to execute a program whose size is Optimized memory
management.
larger than the main memory of the computer system.
Windows June, 1998 32 Bit data link
4.3 LINUX :
98 control (DLC)
Linux is an open-source Operating System like other protocol.
Operating Systems such as Microsoft Windows. Apple, Improved GUI.
Mac OS, iOS, Google Android etc. An Operating System Improved online
is software that enables the communication between communication
computer hardware and software. The Linux Operating through various tools.
System was developed by Linux Torvalds in 1991, which Such as outlook
sprouted as an idea to improve the UNIX Operating express, personal web
System. He suggested improvements but was rejected by server and web
UNIX designers. Therefore, he thought of launching an publishing wizard.
Operating System, designed in a way that could be Multiple display
modified by its users. Linux is a freeware and has many support.
different versions each with different look and feel e.g Windows update.
Ubuntu, Mint, Fedora, Debian etc. Windows February, More reliable against
2000 2000 application failure.
Improved Windows
explorer.
Secure file system
using encryption.
Microsoft management
console (MMC).
Improved maintenance
operations.
Windows September, System restoration
ME 2000 against failure.
4.4 Windows : Universal plug and
Microsoft has provided many Operating Systems to play.
cater the needs of different users. Microsoft is a well Automatic updates.
known name in the development of Operating System as Image preview.
well as various software applications. Initially, Microsoft Windows October, Attractive desktop and
introduced Windows1.x, Windows2.x and Windows386 XP 2001 user interface.
Operating Systems. However, these Operating Systems System restore.
locked certain desirable features, such as networking and Windows firewall.
interactive users interface. Microsoft continued to work Files and settings
transfer wizard.
towards developing an Operating System that met the
Windows April, 2003 Enhanced Internet
desirable features of users and come up with a new
Server Information Service
Operating System in the year 1993. Which was known as
2003 (ITS).
Windows NT 3.1. This Operating System was specially
Enhanced Microsoft
designed for the advanced users performing various Message Queuing
business and scientific operations. After the release of (MSMQ).
Windows NT 3.1, several other Operating Systems user Enhanced active
introduced by Microsoft in the successive years with directory support.
their own unique features. Watchdog timer.
Computer Organization and Operating System 133 YCT
Windows November, Multilingual User task view.
Vista 2006 interface. Tablet mode.
Enhanced search Enhanced Action
engine. Center.
Enhanced internet Universal Apps.
explorer. Windows October, 5G supported.
Enhanced Windows 11 2021 Enhanced Cortana.
media player. Microsoft edge with IE
Enhanced Windows mode replaces the
update. internet explorer 1.1.
Windows system S mode available.
assessment tool. Wallet is removed.
Windows 7 October, Libraries to improve Android Apps
2009 file access and supported.
organization. Improved Touch
Action center for keyboard.
system maintenance 2. Functions of an Operating System :
backups, and troubles
Some typical Operating System functions may
hooting.
include managing memory, files, processes, I/O system
Improved networking
and devices, security etc.
via home group.
Following are the main functions of Operating
Device stage for
System.
recognizing USB
devices faster.
Quick Desktop view
button.
Windows 8 October, Simplified Desktop for
2012 increased speed.
Start menu has been
replaced. 2.1 Memory Management :
Improved security. Memory management refer to management of
Enhanced search bar. primary memory or Main Memory. Main Memory is a
Ribbon and Quick large array of words or bytes where each word or byte
access toolbar in has its own address.
office 2007.
An Operating System does the following activities
Windows Reader is a
for memory management –
native PDF reader.
Keeps tracks of primary memory, what part of it is in
Windows October, Add start Button to the
use and by which program.
8.1 2013 desktop.
Deciding which process will get how much memory
Boot directly to the
and when especially in a multiprogramming
Desktop.
environment.
Allows Snap start
Allocating the memory when a process request it to do
screen apps.
so.
Enhanced automatically
Windows update. de-allocates the memory when a process no longer
needs it or has been terminated.
Windows July, 2015 Enhanced New start
10 menu. 2.2 Process Management
Voice-controlled Process is the execution of a program that performs
digital assistant the actions specified in that program It can be defined as
Cortana integration. an execution unit where a program runs. The operating
Microsoft edge web system helps you to create, schedule and terminates the
browser. processes which is used by CPU. A process created by
Multiple desktops and main process is called child process.
Computer Organization and Operating System 134 YCT
Process operations can be easily controlled with the • Keeps tracks of all devices. Program responsible for
help of PCB (Process Control Block). You can consider this task is known as the I/O controller.
it as the brain of process which contains all the crucial • Decides which process gets the device when and for
information related to processing like Process id,
how much time.
priority, state, CPU register etc.
• Allocates and De-allocates the devices.
Process Architecture–
2.5 Input/Output Management :
Stack
What output will come from the input given by the
Heap user, the Operating System runs this program. This
Here, is an architecture of the
process Data management involves coordinating various input and
Text output devices. It assigns the functions of those devices
where one or more applications are executed.
Process
2.6 Secondary Storage Management :
Stack– Stack stores temporary data like function
System have several levels of storage which
parameters, return addresses and local variables.
includes primary storage, secondary storage, and cache
Heap– Allocates memory, which may be processed
storage. Instructions and data must be stored in primary
during its run time.
storage or cache so that a running program can reference
Data– It contains the variable
it.
Text– Text section includes the current activity which is
represented by the value of the program counter. 2.7 Security :
Process Control blocks– (PCB) It is a data The Operating System used password protection to
structure that is maintained by the operating system for protect user data and similar other techniques. It also
every process. PCB should be identified by integer prevents unauthorized access to programs and user data.
Process ID (PID). It helps you to store all the information Computer security is a very important aspect of any
required to keep track of all the running processes. Operating System. The reliability of an Operating
It is also accountable for storing the content of processor System is determined by how much better security it
registers, they are saved when the process moves from provides us. Modem Operating System use a firewall for
the running state and then returns back to it. The security. A firewall is a security system that monitors
information is quickly updated in the PCB by the OS as every activity happening in the computer and blocks that
soon as process make the state transitions. activity in case of any threat.
Process States– 2.8 Command Interpretation :
Command interpreter is one of the part of Operating
System which reads the commands that use users types
in at a terminal, interprets, them and translate them into a
detailed sets of instructions that the computer hardware
can understands. It varies widely from one OS to other
OS. Every OS must provide command interpreter for its
operation.
2.9 Networking :
A distributed system is a group of processors which
2.3 File Management : do not share memory hardware devices or a clock. The
A file system is made up into directories form for processors communicate with one another through the
improving its efficiency and better usage. These types of network.
directories may contain another sub directories and files.
2.10 Communication Management :
It monitors all activates related to where all information
is saved, user access setting, all status of each file, and Coordination and assignment of compilers,
more. So this type of process is known as ‘file system’. interpreters and another software resources of the various
The Operating System keeps records of the status and users of the computer systems.
locations of files. 2.11 Job Accounting :
2.4 Device Management : Operating System keeps track of time and resources
An Operating System manages devices used by various tasks and users, this information can be
communication via their respective drivers. It does the used to track resource usage for a particular user or
following activities for device management. group of users.
Computer Organization and Operating System 135 YCT
Process Management Process Schedulers–Operating system uses
following schedulers for process scheduling.
A program in execution is called a process. In order
Long Term Scheduler– This scheduler is known as
to accomplish its task process needs the computer
job scheduler. It select the process from pool which is
resources. There may exist more than one process in the
located in secondary memory and keeps them in ready
system which may require the same resource at the same
queue in primary memory. It controls the degree of
time. Therefore operating system has to manage all the
processes and the resource in a convenient and efficient multi-programming. The purpose of long scheduler is to
way. Some resources may need to executed by one process select the mix of CPU bound & Input/Output bound
at one time to maintain the consistency otherwise the processes among the job present in the pool.
system can become inconsistent and deadlock may occur. Short Term Scheduler– Short term schedulers is
Operating system has to perform the following also known as CPU scheduler. It chooses one job from
function regarding the process management: ready queue and dispatch it to CPU for execution. If
1. Scheduling processes and threads on the CPU selected job require long CPU burst time then other job
2. Creating and deleting both user and system processes in ready queue have to wait for a long time this problem
is known as starvation.
3. Suspending & Resuming process
4. Providing mechanism for process synchronization Medium Term Scheduler– Some process needs
Input/Output operation. So they are put into suspended
5. Providing mechanism for process communication
state or swapped out queue medium term scheduler take
Attribute of Process– To create the PCB of process
care of swapped out processes. It removes the process
following attribute of process is required.
from running state to make room for the other processes.
1. Process ID
Such processes are swapped out processes and this
2. Program counter (PC)
procedure is called swapping. Medium term scheduler is
3. Process state responsible for suspending & resuming the processes.
4. Priority
Various Time Related to Process–
5. General purpose registers
6. List of open files
7. List of open devices
8. Accounting information
When execution switch from one process to another
process, this event is known as content switching. All the
information of a process which is stored in PCB will be Completion time – Arrival time = Waiting time + Burst
saved. It is depicted in following figure. time
Process1 Turnaround time = Completion time – Arrival time
Waiting time = Turnaround time – Burst time
Scheduling and Performance Criteria– There are
various algorithm which are used by operating system to
schedule the processes on the processor in an efficient
way. Purpose of scheduling algorithm is as follows.
I. Maximum CPU Utilization
II. Fare Allocation of CPU
III. Maximum Troughput
IV. Minimum Turnaround Time
V. Minimum Waiting Time
VI. Minimum Response Time
Scheduling Algorithm– Scheduling algorithm can
be divided into two parts:
1. Preemptive Scheduling
2. Non-preemptive Scheduling
Process can be categorized as follow– In Preemptive scheduling algorithm CPU can be
1. CPU bound taken away, when a priority jobs come in the queue then
2. Input/Output bound CPU can be taken away. Basically this type of algorithm
3. Interactive is related to real time operating system.

Computer Organization and Operating System 136 YCT


In non-preemptive algorithm, CUP cannot be taken process is cooperating if it can affect or be affected by
away. process is a cooperative process.
There are following algorithms which can be used to Advantage of cooperating process is as fallows:
schedule the jobs. 1. Information Sharing– Several users may be
1. First Come First Serve– It is non-preemptive interested in same piece of information
scheduling algorithm. Process with minimum arrival 2. Computation Speed-up– If we want that any
time will get the CPU first. Here component utilization is task run faster. We break this task into subtask, each of
low and system throughput is also low. Here shorter jobs which will be executing in parallel with others.
may suffer considerable turnaround delays and waiting 3. Modularity– Dividing the system function into
time when CPU has been allocated to longer burst time. separate process or threads.
2. Round Robin– There a quantum of 10-100 4. Convenience– Even an individual user may have
millisecond is allocated to process. As the time slice get many task on which to work at one time. Processes can
exhausted, process goes to end of ready queue to await communicate by passing information to each other via
the next allocation. It is preemptive scheduling. shared memory or message passing.
3. Shortest Job First (SJF)– SJF may be In shared memory model they do so by entering &
implemented in non-preemptive or preemptive manner. retrieving data from a single block of physical memory
When this algorithm works then it searches the shortest that designated as shared by all of them each process has
CPU burst time. STF scheduling is an optimal scheduling direct access to this block of memory.
algorithm is terms of minimizing average waiting time of In message passing processes communicated by
given set of processes. sending & receiving packets of information called
Consider a situation where shorter jobs comes in messages. These messages may be communicated
system continuously and system is implementing STF indirectly or directly. Indirect message passing is done
scheduling algorithm then larger job not getting the CPU via a mail box and direct message passing is done via a
and its waiting time will increase. This situation is link between the two communicating processes. Message
known as starvation. passing is useful for exchanging smaller amount of data.
Priority Bases Scheduling– Process Synchronization–
Here priority of job will be consider in allocating the In order to cooperate several processes must
processor. Here priority is assigned to each process and communicate and synchronize. If several processes
scheduler always picks the highest priority process from accessing some piece of data and outcome depends on
ready queue. Equal priority process will be treated as particular order of execution of processes. This is known
FCFS basis. Here low priority process is blocked by as race condition.
higher priority process this blockage problem is solved Consider n processes executing in a system and each
by aging priority in this the priority of a process is process have some piece of code known as critical
gradually increases that wait in the system for a long section. These code can be accessed by only one process
time finally process will get the CPU for execution. at any time. If one process in executing in its critical
section, no other process can enter the critical section.
Multilevel Queue Scheduling– Here processes are
repeat
grouped according to their characteristic. For example
interactive process are placed in foreground & batch entry section
processes are placed in background could be considered critical section
as two types of processes, because their response time exit section
requirement is different. Multiqueue scheduling remainder section
algorithm partition the queue into separate queues. Each Until false
queue has its separate scheduling algorithm. Interactive Semaphore– A semaphore is an integer variable that is
queue might be scheduling by round robin and batch accessed only through two standard atomic operation
queue will fallow FCFS. wait and signal. Operations were originally termed P
Interprocess Communication– Concurrent process (For wait) and V (For signal).
executing in the operating system may be independent Classical definition of wait is
process or cooperating process. A process is independent wait (s)
if it cannot effect or affected by another process {
executing in the system. Any process that does not share while (s < = 0)
any data with any other process is independent. A {
Computer Organization and Operating System 137 YCT
/* do nothing letter as legal file names. Many operating system support
} two part file names with the two-port file name with the
s = s–1; two ports separated by a period the first post is called
} primary file name and second part is called secondary or
signal (s) extension file name.
{ File Structure– File can be structured in any of
s = s+1; several ways. three common possibilities are depicted
} • Is an unstructured sequence of bytes
Example– Critical section for n process shared variables, • Record sequence
semaphore mutex • Tree structure
mutex = 1 First file organization system is implemented by
process P2 UNIX operating system. In record sequence model, file
do is sequence of fixed length record. It is implemented by
{ cp/m operating system. In tree structure a file, consist of
tree of records not necessarily all the some length, each
wait (mutex)
containing a key field in a fixed position in the record.
critical section
Directories– Operating system keep the track of
signal (mutex)
files, file systems normally have directories or folders
remainder section
which in many system are themselves are files.
}
Directory Structure–
while (True)
Single Level Directory System– Simplest form of
Deadlock– Two or more processes are waiting directory system is having are directory contain all the
indefinitely for an event that can because one of the files which is called the root directory. It is used on
waiting processes. personal computer which is used by only one user. But
Example– Let two processes P0 & P1 each accessing the problem arises when multiple users create their
two s and q set to value 1: directories, where the name of directory may coincide
resulting to problem.
Important aspects of single level directory.
• All files are contained in same directory
• Easy to support and understand
• Have significant limitations in terms of
• Large number of files
• Ability of support different users

Suppose that P0 execute wait (s) and then P1 execute


wait (q). It must wait until P1 execute signal (q).
Similarly when P1 execute wait (s). It must wait until P0
execute signal (s) since these signal operation cannot be Disk Space Management–
executed P0 and P1 are deadlocked. The space of disk which is not used by files are
Types of Algorithm– known as free disk space. When a new file is created,
1. Divide and Conquer Algorithm free disk space is searched & allocated the new file.
2. Dynamic Programming Algorithm Deletion of file causes its disk space is added to free
3. Greedy Algorithm space list. There are two methods to manage the free disk
4. Backtracking Algorithm blacks.
5. Randomized Algorithm Linked list
6. Brute Force Algorithm
Finding & Processing File
File– File are an abstract mechanism exact rules for
the file naming vary from system to system, but all
current operating system allows string of one to eight
Computer Organization and Operating System 138 YCT
Linked list of free blocks. In this method, link list is
used to denote free block the figure block number IV,
VI, XI, X, XII, XIV, XVI, XXII are free blocks.
Bitmap– Bot map is used to assign the status of
blocks. 0 denotes the free disk space & 1 denote the
Allocated block. Let us take the above example, in the
It allows sharing of directories and files several times on
above figure record IV, VI, IX, X, XII, XV, XVI,
the tree structure. Example Unix.
XXVIII denote the free block by bit map vector. It is
Disk Allocation Method–
denoted as 1110101100101010111111011. It is bit map
of free block. There are three method of disk allocation
(A) Two Level Directory– Each user has its own 1. contiguous
user file directory. (UFD). The UFD have similar 2. linked
structure but each list only the files. Created by the single 3. indexed
user when user searches the target file. System master each method has some advantages and disadvantages:
file directory is searched. Here searching is most Contiguous Allocation– Contiguous allocation
efficient since only one user's directory is searched. means file will be stored in contiguous location of
secondary storage. As the file size is fit in adjacent
location of free space. File is allocated we have two
strategies for allocation of file.
First Fit– Here we search the free holes. So they are
fit size of file then search steps.
Best Fit– There we search the smallest hole which
satisfy the file request. Here first fit is faster compare to
best fit.
Tree Structured Directory– These allocation technique suffer from external
• The directory structure is a fragmentation, when file is allocated to a empty whole
• True with arbitrary height some empty space remain. These empty space are collect
• Users may create their own subdirectories and they form a large space. These techniques-are known
as compaction.
• Issues
Linked Allocation– Here file is linked allocation of
• Efficient searching, grouping
disk blocks. Disk blocks are scattered the whole disc.
• Current directory notion/change directory (absolute)
Some memory space is required to point to next location
• Directory semantics of block main disadvantage of this technique is that of
one pointer is damaged then file cannot be recovered.
Directory entry contains a pointer to starting and ending
file block. In linked allocation, better utilization of
memory. It does not suffer from external fragmentation,
here free block can be utilized for file block request.
Disadvantage of this method is that it does not support
direct access. Memory is required to store pointers over
Acydic Graph Directory heads. It is slower than contiguous allocation.
In tree model one file cannot appear in more than Indexed Allocation– In this scheme, a special block
one directory. This is possible by making directory an known as index block contains the pointer to all the
acyclic graph. Two or more directory entries can point to blocks occupied by a file indexed allocation sales the
some sub-directory of file. In the following figure there direct access problem. Here pointers are brought into one
is no cycle in structure. location called as index block.
Computer Organization and Operating System 139 YCT
• Charles Babbage, a processor of mathematics of the
Cambridge university made some worthwhile efforts
towards Automatic computing. He is also considered
to be the father of modern computer. In 1922 he
presented a working model of his concept with the
help of an automatic mechanical computing machine.
He named the Automatic mechanical computing
machine as difference engine.
• In 1923, Babbage made it more automatic by
providing the feature of printing the Tabulated result.
Babbage did not stop here and Started working on
developing the analytical engine. The analytical
engine was considered as completely automatic
general Purpose programmable digital computer.
disadvantage of this method in terms of memory • In 1937, An American mathematician, Howard Aiken
utilization. Pointer overhead are greater than linked desined MARK1 and completed it in the year 1944.
allocation. For every small file the indexed allocation • The Electronic numerical integrator and calculator
would keep one entire block for pointer. (ENIAC) was another general purpose electronic
Operations of File– The context of files are defined digital computer developed at Moore school of
by its content who is creating the file. The various engineering of university at Pennsylvania by John
operation which can be implemented on file such as read, Ecker, John Mauchly and their Team in year 1946.
write, open and close etc are called file operation. These • In 1949, another electronic computer that used the
operation are performed by the user by using the binary number system for representing and processing
command provided by the operating system. Common values was introduced. This computer was known as
operation are as below- Electronic Discrete variable Automatic computer
1. Create() (EDVAC). EDVAC was the first computer that
2. Open() worked on the Principle of stored program. It was
3. Write() invented by John Eckert and John Mauchly and
4. Read() considered as successor of ENIAC.
5. Seek() • Electronic Delay storage automatic calculator
6. Delete() (EDSAC) was another early British electronic
computer developed by maurice wilkes and his team
7. Truncate()
at the university of combridge mathematical
8. Close()
laboratory in 1949.
9. Append() Generation of Computers– The history of
10. Copy() computer development is often discussed in terms of
11. Move() different generation of computer.
Important Facts First Generation Computer– First generation
computers were employed during the period 1940-1956
• An abacus was also known as counting frame and
These computer is used the Vacuum tubes technology for
become popular among the people in Asia minor
Calculation as well as for storage & control purposes.
around 5000 years back.
• Some Examples of first generation computers are
• Napier bones was developed by John Napier in year ENIAC, EDVAC, EDSAC and UNIVAC.
1617. This device was specially designed for the
• The functioning of these computers depend an the
multiplication and quotient of number.
Machine Language. A Machine Language is a
• The idea of using bones to carry out the multiplication language in which all values are represented in the
of number was modified by Edmond Gunter in 1620 form of 0'S and 1'S. Therefore these computer were not
to produce a device known as Slide Rule. easy to Program.
• Pascal lines was a calculator developed by Blaise • They were generally designed as special purpose
Pascal in 1642. It was also known as a numerical computers. Therefore these computers were not very
wheel calculator. Flexible in running different types of application.
Computer Organization and Operating System 140 YCT
Second Generation Computer– Generation Computer. Some of improvement made
• Second Generation computer were employed during during this generation of computers are as follows:
the period 1956-1963 The main characteristic of these • Development of parallel processor
computer was the use of transistors in place of • Development of optical disk Technology
vacuum tubes in building the basic logic circuits. • Invention of Internet & Its different services
• Some example of second generation computers are • The User of these computer find it very comfortable to
PDP-8, IBM 1401 & BM 7090. use them because of several additional multimedia
• They were easy to program because of assembly features.
language. • They are versatile for Communications & Resource
• They are more reliable as compared to first sharing. In these Generation Artificial intelligence
Corporation computers and hence did not require clove lap new Concepts due to sophisticated.
maintenance at regular intervals of time. • MS-DOS is an operating system that uses Command
Third Generation Computers– Line Interface (CLI) for interacting with the end users.
• The third Generation computer were employed during It was developed in 1980 by Microsoft (MS)
the period 1964-1975. the major characteristic feature Corporation for IBM personal computers.
of third generation computer system was the use of • Command can be defined as an instruction provided
Integrated circuit (ICs), The IC Technology was also by a user in order to perform some specific task on the
known as micro electronics Technology. The first IC computer system.
was developed by Jock kilby and Robert Noyee in the • Linux is a community of open-source Unix like
year 1958. operating systems that are based on the Linux Kernel.
• Some examples of third Generation Computer are • Linux was initially released by Linus Torvalds on
NCR 365, B 6500, IBM 370, PDPII and CDC 7600. September 17, 1991. It is a free and open-source
• They used high-level languages, A high-level operating system and the source code can be modified
language is a computer programming language that is and distributed to anyone commercially or non-
independent of machine details. commercially under the GNU General Public License.
• They were able to execute any type of application • Some of the popular Linux distributions are: MX
such as business and scientific applications. Hence the Linux, Manjaro, Linux Mint, elementary, Ubuntu,
third Generation computer were also considered as Debian, Solus, Fedora, Open SusE, Deepin, Red Hat
general purpose computers. Enterpirse, Linux.
Fourth Generation– • The file systems supported by Linux are as follows:
Fourth Generation computer were employed during xfs, ramfs, vfat, cranfsm, ext3, ext4, ext2, ext1, ufs,
1975-1989. The invention of large scale integration (LSI) autofs, devpts, ntfs.
Technology and very large scale integration (VLSI) • MS-DOS was a single-user and single tasking
Technology led to development of fourth generation operating system, which meant that only one program
computer. could be run at a time by a single user.
In LSI & VLSI Technologies led to development of • Kernel is the central part of the UNIX operating
microprocessor which become the major characteristic system that manages and controls the communication
feature of the fourth generation computer. between the various hardware and software
A microprocessor incorporate various component of a components.
computer-such as CPU memory and input/output (I/O) • Shell is the user interface of the UNIX operating
controls on to single chip. system that acts as an intermediary between the user
Fifth Generation Computer– and the Kernel of the operating system.
Fifth Generation computer are based on ultra large scale • Unix is an operating system that is truly the base of all
integration (ULSI) Technology that allows almost ten operating systems like Ubuntu, Solaris etc. It was
million electronic components to be fabricated on one developed in the 1970s by Ken Thompson, Dennis
small chip. Ritchie and others in the AT & T Laboratories.
This technology enhances the power and speed of the • Different version of Unix are AIS, HP-UX, BSD, Iris
microprocessor the chips & capacity of primary and etc.
secondary storage Device. Fifth generation computer are • The file systems supported by UNIX are as follows:
faster, cheaper and more efficient Compared to fourth zfs, js, hfx, gps, xfs, vxfs.

Computer Organization and Operating System 141 YCT


Important Questions Asked in Previous Years Examinations
1. Cache memory is used to transfer the data 9. Which of the following memories must be
between? refreshed many times per second?
(a) Main memory and secondary memory (a) Static RAM
(b) Processor and input device (b) Dynamic RAM
(c) Processor and output device (c) EPROM
(d) ROM
(d) Main memory and Processor
10. An 8085 microprocessor based system uses a
2. Combination of 16 bits is called? 4k×8 bit RAM whose Starting address is
(a) Word AAooH. The Address of last Byte in the is
(b) nibble RAM is?
(c) Memory Block (a) 0FFFH
(d) byte (b) 1000H
3. The first instructor of bootstrap loader (c) B9FFH
program of an operating system is stored in? (d) BA00H
(a) RAM  M + N×0 
11. In X =   , how many one-address
(b) Hard disk  P×Q 
(c) BIOS instruction are required to evaluate it?
(d) None (a) 4
4. –––––– is the fastest to read from and write to (b) 6
than the other kind of storage in a computer? (c) 8
(a) Floppy disk (d) 10
(b) Hard disk 12. The errors that can be pointed out by compiler
are?
(c) CD-Rom
(a) Syntax errors
(d) RAM
(b) Internal errors
5. Which of the following is not true about cache (c) Semantic error
memory? (d) Logical error
(a) Faster memory than RAM 13. Principle of locality is used in?
(b) Volatile memory (a) Registers
(c) Smaller in size than RAM (b) DMA
(d) Sequential access memory (c) Cache memory
6. A––––––Stores such instructions that are (d) Interrupt
required to start a computer? 14. The size of display of monitor is measured
(a) ROM (a) Square
(b) RAM (b) Spherical
(c) Motherboard (c) Diagonally
(d) Virtically
(d) PROM
15. Which of the following is not a variety of monitor
7. A Small test file created by a website that is
(a) CRT
stored in the user's computer temporarily for
(b) LED
the session is called?
(c) HDML
(a) Malware (d) LCD
(b) Bug 16. Resolution is a characteristic of?
(c) Cookie (a) Input device
(d) Cache (b) Joystick
8. The communication between the component in (c) Display device
a microcomputer. Tokes place via the address (d) Storage Device
and ––––– ? 17. Full form of PDP is?
(a) I/O Bus (a) Power on play
(b) Data Bus (b) Power Digital Paint
(c) Address Bus (c) Plasma Display panel
(d) Control lines (d) Plasma display panel
Computer Organization and Operating System 142 YCT
18. Which of the following are not weighted codes? 27. What is meaning of cycle IPO in computer
(a) Roman Number System system
(b) Decimal Number System (a) Input Process output
(c) Binary Number System (b) Input Point output
(d) All of the above (c) Inline process output
19. Minimum time delay between the initiations of (d) In process out
two independent dent memory operations is 28. Which part of CPU coordinate the Task?
called (a) control unit
(a) Access time (b) Memory
(b) Cycle time (c) Arithmetic Logic Unit
(c) Transfer rote (d) None of these
(d) Latency time 29. Who which is associated with the development
20. Which one is First virus to appear in India? of Pentium chip
(a) C-Brain (a) Nandan Nilekani
(b) Mical Anjelo Virus (b) C. Kumer Patel
(c) Columbus (c) Sabeer Bhatia
(d) Mac Bug (d) Vinod Dham
21. Famous computer Pakman is made for which 30. Which of following is page fault?
particular Area (a) Page fault occurs when a program accesses a
(a) Sport page of another program
(b) Constriction Area (b) Page fault occur when a program accesses a
page in main memory
(c) Banking
(c) Page fault occurs when there is an error in
(d) Weather forecasting
particular page
22. Which one brought the first laptop computer in (d) Page fault occurs when a program accesses
world market? page which is not present in main memory
(a) Hewlett-Packard 31. Any instruction should have at least?
(b) Infosys (a) 2 Operand
(c) Lucent (b) 1 Operand
(d) Epson. (c) 3 Operand
23. In which city first AI based computer was (d) None of above
installed? 32. Which of the following is an essential data
(a) Bombay transfer technique?
(b) Pune (a) MMA
(c) Jodhpur (b) DMA
(d) Delhi (c) CAD
24. Which country has Largest number of (d) CAM
computer? 33. RISC Stand for
(a) Japan (a) Reduce instruction set computer
(b) Russia (b) Risk instruction sequential compilation
(c) U.S.A (c) Risk instruction source compiler
(d) India (d) None of above
25. Which are is first bilingual computer 34. In which of following term the performance of
developed in India cache memory is measured?
(a) PARAM (a) Chat Ratio
(b) Budh (b) Hit Ratio
(c) Siddhartha (c) Copy Ratio
(d) Mahaveer (d) Data Ratio
26. In which India city first computerized Railway 35. Which of the following is the function of
Reservation system started control unit in the CPU
(a) Chennai (a) It stores program instruction
(b) Calcutta (b) It decode program instruction
(c) Mumbai (c) It performs logic operations
(d) New Delhi (d) None of Above
Computer Organization and Operating System 143 YCT
36. CISC stands for 45. The average time required to reach a storage
(a) Complex instruction set computer location in memory & optain its contents is
(b) Complex instruction sequential compilation called the
(c) Complex instruction sequential compiler (a) Seek time
(d) None of the Above (b) Turn around time
37. Which of the following computer Register (c) Access time
collects the result of computation (d) Transfer time
(a) Accumulator 46. The idea of cache memory is based
(b) Instruction pointer (a) On the property of locality of reference
(c) Storage Revision (b) On the heuristic 90 to 10 rule
(d) None of Above (c) On the fact that references generally Tend to
38. Which of following is circuit board on which cluster
chips and processor are placed (d) All of the Above
(a) Master circuit
47. Which of the following is lowest in memory
(b) Motherboard
hierarchy
(c) Big board
(a) Cache memory
(d) Non of Above
(b) Secondary memory
39. Which of following is a combinational logic
(c) Register
circuit that has 2n input line and a single output
line (d) RAM
(a) Multiplexer 48. Von Neumann architecture is
(b) Demultiplexer (a) SISD
(c) Encoder (b) SIMD
(d) Decoder (c) MIMD
40. SIMD represent on organization that–––––? (d) MISD
(a) Refer to computer system capable of 49. Cache memory acts between
Processing several Programs of the some time (a) CPU & RAM
(b) Represent organization of single computer (b) RAM & ROM
containing a control unit, processor unit and (c) CPU & Hard disk
memory (d) None & these
(c) Includes many processing units under the
50. Program always deal with
supervision of common control unit
(a) Logical address
(d) None of the Above
(b) Absolute address
41. In computer, subtraction is generally carried
out by? (c) Physical address
(a) 1's complement (d) Relative address
(b) 10'S complement 51. Memory management technique in which
(c) 2's Complement system stores & retrieves data from secondary
(d) 9's complement storage for the use in main memory is called
42. Assembly language (a) Fragmentation
(a) Uses alphabetic code in place of binary (b) Paging
number used in machine Language (c) Mapping
(b) Is the easiest language to write program (d) None of the mentioned
(c) Need not be translated into machine language 52. Run time mapping from virtual to physical
(d) None of there address is done by
43. Floating point representation is used to store (a) Memory management unit
(a) Boolean Valens (b) CPU
(b) Whole numbers (c) PCI
(c) Real integers (d) None of mentioned
(d) Integers 53. Which one of the following is the address
44. Circuit used to store one bit of data is known as generated by the CPU?
(a) Register (a) Physical address
(b) Encoder (b) Absolute adders
(c) Decoder (c) Logical address
(d) Flip-flop (d) None of the mentioned
Computer Organization and Operating System 144 YCT
54. A memory buffer used to accommodate a speed 62. Modern computers follow a set of instructions
differential is called to perform any task. These instructions can be
(a) Stack pointer better known as.
(b) Cache (a) Commands (b) Programs
(c) Accumulator (c) Language (d) Guidelines
(d) disk buffer RRB NTPC 25.01.2021 (Shift-II) Stage Ist
55. When more than one processes are running 63. Which of the following not known as
concurrently on a system peripheral of computer?
(a) Batch system (a) Mouse (b) Keyboard
(c) Printer (d) Hard drive
(b) Real time system
RRB NTPC 04.04.2016 (Shift-2) stage 1st
(c) Multiprogramming system
64. Operating system of any computer work as a
(d) Multiprocessing system.
software interface between system user and
56. Which memory unit has lowest access time? which of the following?
(a) Cache (a) Hardware (b) Peripheral
(b) Register (c) Memory (d) Screen
(c) Magnetic Disk RRB J.E.(14.12.2014,GREEN PAPER)
(d) Main memory 65. Computer follow a simple principal (GIGO),
57. Fragmentation is which mean is-
(a) Dividing the secondary memory into equal (a) Garbage in Garbage out
sized fragments (b) Garbage input great output
(b) Dividing the main memory into equal size (c) Great input Great output
fragment (d) Great instruction Great output
(c) Fragment of memory words used in page RRB SSE (21.12.2014)
(d) Fragments of memory words unused in a page 66. Who was one of the founders of American
58. Virtual memory is computer Sun Microsystems later acquired by
(a) An extremely large main memory Oracle ?
(b) An extremely large secondary memory (a) Satya Nadella (b) Sabeer Bhatia
(c) An illusion of an extremely large memory (c) Vinod Khosla (d) Sunder Pichai
(d) A type of memory used in super computer RRB NTPC 20.01.12021 (Shift-II) Stage Ist
67. 'Pen Drive' was invented by IBM in the year.....
59. A time sharing system imply
(a) 1990 (b) 1988
(a) More than one processor in the system
(c) 2003 (d) 1998
(b) More than one program in memory
RRB NTPC 23.07.2021 (Shift-II) Stage Ist
(c) More than one memory in the system
68. Who among the following is known as the
(d) None of Above 'father of Indian Supercomputers'?
60. What are the peripheral devices? (a) Jayant Narlikar (b) RA Mashelkar
(a) Those that connect computer to the internet (c) Nandan Nilkeni (d) Vijay Bhatkar
(b) Those that help in calculation RRB NTPC 22.02.2021 (Shift-I) Stage Ist
(c) These devices help in storing and analysing 69. Who is remembered for giving the theory of
data programmable computer?
(d) These are internal or external device that (a) Charles Babbage (b) JohnTucker
connect directly to a computer but do not (c) Bill Gates (d) Steve Jobs
contribute to the computer's primary functions RRB NTPC 04.04.2016 (Shift-II) Stage-Ist
RRB NTPC 23.02.2021 (Shift-I) Stage Ist 70. Who was the designer of macintosh computer?
61. Which one of the following statements is (a) McDonalds (b) Microsoft
correct about a computer? (c) Apple (d) IBM
(a) A computer is composed of only software RRB NTPC 04.04.2016 (Shift-II) Stage-Ist
(b) A computer can organize all information on 71. What is the context of word “Digitalization”?
its own (a) For changing analog signal into digital signal
(c) A computer is composed of only hardware (b) For changing digital signal into analog signal
(d) An electronic device that stores, retrieves and (c) Uses of analog form of electricity
processes data (d) A form of physical quantities
RRB NTPC 18.01.2021 (Shift-I) Stage Ist RRB SSE 21.12.2014 (Set-09) Yellow Paper
Computer Organization and Operating System 145 YCT
72. Full form of ICR is- (d) Write once, read many
(a) Intelligent character recognition RRB NTPC 08.04.2021 (Shift-I) Stage Ist
(b) Information and communication 83. 10 nibbles are equal to _________ bits.
(c) Integrated computer research (a) 60 (b) 80
(d) Institute for cyber research (c) 20 (d) 40
RRB NTPC 19.01.2017(Shift-I) Stage-Ist RRB NTPC 15.03.2021 (Shift-I) Stage Ist
73. Which of the following device work as an input 84. 1 EB is equal to -
as well as output device? (a) 1024 TB (b) 1024 GB
(a) Joystick (b) Mouse (c) 1024 MB (d) 1024 PB
(c) Modem (d) Printer RRB NTPC 03.03.2021 (Shift-II) Stage Ist
RRB SSE 21.12.2014 (Set-08, Green Paper) 85. Which of the following is an example of non -
74. What is the name of the device used to connect volatile memory?
computer for communication through (a) VLSI (b) ROM
telephone lines? (c) RAM (d) LSI
(a) Hub (b) Switch RRB NTPC 21.01.2021 (Shift-I) Stage Ist
(c) Repeater (d) Modem 86. Full form of MMU is-
RRB NTPC 27.04.2016 (Shift-III) Stage-Ist (a) Machine memory unit
75. The term 'byte' was coined by: (b) Memory management unit
(a) Larry Page (b) Werner Buchholz (c) Main memory unit
(c) Vint Cerf (d) Steve Jobs (d) Machine management unit
RRB NTPC 15.03.2021 (Shift-II) Stage Ist RRB NTPC 16.04.2016 (Shift-II) Stage-Ist
76. Which type of storage device is a Hard Disc? 87. High speed memory which is used in
(a) Off-line storage (b) Tertiary storage supercomputer Known as-
(c) Primary storage (d) Secondary storage (a) Cache (b) RAM
(c) BIOS (d) Hard disc
RRB NTPC 19.01.2021 (Shift-I) Stage Ist
88. Use of cache memory in computer system
77. Google Drive, Sky Drive and Dropbox are
increases-
perfect examples of:
(a) Available memory space for program
(a) Internet computing
(b) Available memory speed for data
(b) Virtual drives
(c) Available speed for increasing memory
(c) Virtual reality
access
(d) Cloud storage services (d) Addressing range of CPU
RRB NTPC 22.02.2021 (Shift-II) Stage Ist RRB SSE 21.12.2014 (Set-09, Yellow Paper)
78. 1 Peta Byte is equal to: 89. Which technology is used in compact disc-
(a) 1024 MB (b) 1024 TB (a) Electric (b) Laser
(c) 1024 GB (d) 1024 KB (c) Electromagnetic (d) Aeronautics
RRB NTPC 02.03.2021 (Shift-I) Stage Ist RRB NTPC 29.03.2016 (Shift-I) Stage-Ist
79. The process of taking out stored results out of 90. RAM is used as short term memory because-
physical memory of computers is known as: (a) It is variable
(a) output process (b) programming (b) It is more expensive
(c) processing (d) input process (c) It has low capacity
RRB NTPC 28.12.2020 (Shift-II) Stage Ist (d) It is programmable
80. ROM is composed of: RRB J.E. (Set-02, 14.12.2014,Red Paper)
(a) Photoelectric cells (b) Magnetic tapes 91. Which one of the written option is not a second
(c) Semiconductors (d) Integrated circuits storage device?
RRB NTPC 07.04.2021 (Shift-II) Stage Ist (a) RAM (b) Magnetic App
81. Which of the following is NOT a part of (c) USB Drives (d) Floppy Disk
auxiliary memories in a Computer system? RRB NTPC 18.04.2016 (Shift-III) Stage-Ist
(a) Magnetic tapes (b) PROM 92. What is the full form of RAM related to
(c) CD-ROM (d) Floppy storage in computer?
RRB NTPC 28.12.2020 (Shift-II) Stage Ist (a) Random Access Memory
82. What does WORM stand for? (b) Real Access to Memory
(a) World open, receive many (c) Randomly Available Memory
(b) Wireless once, receive many (d) Random Access Memory
(c) Write others, read me RRB NTPC 04.04.2016 (Shift-I) Stage-Ist
Computer Organization and Operating System 146 YCT
93. The part of computer where data and 101. The degree of Multiprogramming is controlled
instructions are Stored is known as- by:
(a) Register unit (b) Restrainer (a) CPU Scheduler
(c) Memory unit (d) CPU (b) Long-term Scheduler
RRB SSE (21.12.2014. Set-09) Yellow Paper (c) Context Switching
94. A semiconductor has read only memory is- (d) Medium term Scheduler
(a) A set of flip flop memory element NIELIT Scientists-B 04.12.2016 (CS)
(b) A connected logic circuit 102. The maximum combined length of the
(c) A sequential circuit with gates and flip flop command-line arguments including the spaces
(d) None of the above between adjacent arguments is:
RRB J.E. (14.12.2014, Yellow Paper) (a) 128 characters
95. By the use of ASCII coding ,the English (b) 256 characters
alphabet and symbol binary code has been (c) 67 characters
fixed which determines the code for almost all (d) It may vary from one operating system to
languages of the world and also determines one another
million symbols what is this new standard NIELIT Scientists-B 04.12.2016 (CS)
called- 103. How many wires are threaded through the
(a) CCS cores in a coincident-current core memory ?
(b) Unicode (a) 2 (b) 3
(c) Standard CCS code (c) 4 (d) 6
(d) Universal CCS code NIELIT Scientists-B 22.07.2017 (CS)
RRB J.E. (14.12.2014, Green Paper) 104. Which of the following standard C library
96. Which of the following is not a word shape in functions will always invoke a system call when
computer manufacturing? executed from a single-threaded process in a
(a) 64 bits (b) 8 bits UNIX/Linux operating system?
(c) 16 bits (d) 28 bits (a) exit (b) malloc
DMRC J.E. 18.02.2017 (c) sleep (d) strlen
97. To change the command prompt in UNIX, One GATE 2021 (Shift-I)
can use 105. For the real- time operating system, which of
(a) grep (b) Is the following is the most suitable scheduling
(c) ps1 (d) pwd scheme?
(a) Round robin
UPPSC LT GRADE 29.07.2018
(b) First come first serve
98. The data blocks of a very large file in UNIX file
system are system are allocated using (c) Pre- emptive
(a) contiguous allocation (d) Random scheduling
(b) linked allocation ISRO Scientist/Engineer 2016 (July)
(c) indexed allocation 106. Which of the following UNIX command allows
(d) an extension of indexed allocation scheduling a program to be executed at the
specified time?
UPPSC LT GRADE 29.07.2018
(a) cron (b) nice
99. In memory management, fragmentation
problem is caused by creation of (c) date and time (d) schedule
(a) large number of processes ISRO Scientist/Engineer 2011
(b) large number of small free holes 107. If the page size in a 32-bit machine is 4K bytes
(c) large number of free holes then the size of page table is
(d) large number of waiting processes (a) 1 M bytes (b) 2 M bytes
BPSC Asstt. Prof. 21.09.2021 (c) 4 M bytes (d) 4 K bytes
100. Suppose two jobs, each of which needs 10 min ISRO Scientist/Engineer 2011
of CPU time, start simultaneously. Assume 108. Which is the correct definition of a valid
50% I/O wait time. process transition in an operating system?
How long will it take for both to complete if (a) Wake up: ready → running
they run sequentially? (b) Dispatch: ready → running
(a) 10 (b) 20 (c) Block: ready → running
(c) 30 (d) 40 (d) Timer runout: → ready → running
ISRO Scientist/Engineer 2015 ISRO Scientist/Engineer 2009
Computer Organization and Operating System 147 YCT
109. The primary purpose of an operating system is (c) To hold register values while a process is
(a) To make most efficient use of the computer waiting to be run
hardware (d) To hold the start and length of page table
(b) To allow people to use the computer TNPSC 2016 (Degree) P-II
(c) To keep systems programmers employed 117. Which of these is incorrect in context of real
(d) To make computers easier to use time operating system?
ISRO Scientist/Engineer 2009 (a) Permits creation of multiple process within
application
110. The Linux command "mknod myfifo b 4 16"
(b) Permits principles to be assigned to the
(a) will create a character device if the user is
processes
root
(c) Doesn't allow programmer to define interrupts
(b) Will create a named pipe FIFO if the user is in interrupt processing routines
root
(d) Provides fault tolerance and graceful
(c) Will create a block device if the user is root degradation capabilities
(d) None of the above TNPSC 2016 (Degree) P-II
ISRO Scientist/Engineer 2017 (May) 118. Which of the following operating systems has
111. Which of the following concurrency control fork () and exec () system calls?
protocol ensures both conflict serializability (a) Unix (b) Windows
and free from deadlock? (c) Mac-OS (d) Solaris
(a) Time stamp ordering (b) 2 Phase locking APPSC Poly. Lect. 13.03.2020
(c) Both (a) and (b) (d) None of the above 119. In UNIX operating system chmod 654 stands
ISRO Scientist/Engineer 2017 (May) for
112. Identify the correct order in which a server (a) rw---r- (b) r-r-r--
process must invoke the function calls accept, (c) r-rw-r-- (d) rw-rw-r--
bind, listen, and recv according to UNIX socket Punjab State Civil Supplies Corp. Ltd. 13.11.2011
API. 120. The following operating system is used as a
(a) listen, accept, bind, recv control device in dedicated applications :
(b) bind, listen, accept, recv (a) Real-time system
(c) bind, accept, listen, recv (b) Time-sharing system
(d) accept, listen, bind, recv (c) Multiprogramming system
GATE 2015 (Shift-II) (d) Handheld system
113. Which of the following statement is False in Karnataka PSC Comp. Sci. Teacher 16.10.2017
operating system? 121. Which of the following is a virtual machine
(a) The shortest job first (SJF) scheduling technology now owned by Oracle that can run
algorithm minimizes the average turn around various operating systems?
time (a) Vmachines (b) VirtualBox
(b) Thrashing leads to under utilized the (c) ThoughtPolice (d) None of the above
performance of CPU GPSC Asstt. Prof. 30.06.2016
(c) Internal fragmentation can be eliminated by 122. Network operating system runs on ______
segmentation and paging (a) server
(d) Semaphore value depends on number of (b) every system in the network
resources to be shared (c) Both (a) and (b)
RPSC Lect. 2014 (d) none of the above
114. Linux makes use of .......... page table structure. GPSC Asstt. Prof. 30.06.2016
(a) Single level (b) Two level 123. The technique used for protecting a critical
section in Linux is
(c) Three level (d) Hashed
(a) Lock Step (b) Program lock
TNPSC 2016 (Degree) P-II
(c) Spinlock (d) Setlock
115. Deep kernel modification is required in ...........
GPSC Asstt. Manager 13.12.2020 (IT)
virtualization.
124. In Unix. which of the following symbols is used
(a) Full (b) Para in command line to run a process in
(c) Host-based (d) ISA based background?
TNPSC 2016 (Degree) P-II (a) & (b) 
116. The purpose of a TLB is: (c) * (d) #
(a) To cache page translation information (e) @
(b) To cache frequently used data CGPSC Asstt. Prof. 2014 (CS)
Computer Organization and Operating System 148 YCT
125. Which of the following is not a valid Unix (c) sorts the lines of the file1 in ascending order
system call for files manipulation? after skipping content upto I in each line
(a) exit ( ) (b) open ( ) (d) sorts the lines of the file1 in descending order
(c) read ( ) (d) write ( ) after skipping content upto I in each line
(e) close ( ) APPSC Lect. 2017 (Degree College) (CS)
CGPSC Asstt. Prof. 2014 (CS) 130. In Unix, chmod command is used to_____.
126. An example of a memory management system (a) List files
call in UNIX is (b) List processes
(a) fork (b) mmap (c) Change file permissions
(c) sigaction (d) execve (d) Change system password
APPSC Lect. Degree College 07.06.2017 (CS) APPSC Lect. Degree College 16.09.2020
127. The OS of a computer may periodically collect 131. Usually which of the following is not done by
all free memory space to form contiguous an OS ?
blocks of free space. This is called as : (a) Power on Self Test (POST)
(a) Concatenation (b) Resource management
(b) Garbage collection (c) Error handling
(c) Collision (d) Encryption
(d) Dynamic Memory Allocation RPSC ACF FRO 23.02.2021 (Comp. App./Sci.)
(e) Platform independence 132. Which is not a system call in Unix ?
CGPSC Asstt. Prof. 2014 (IT) (a) Sleep( ) (b) Fork( )
128. Which of the following strategy is adopted to (c) Set Timer( ) (d) Chmod( )
deal with deadlocks that have occurred in RPSC ACF FRO 23.02.2021 (Comp. App./Sci.)
operating system?
133. Match the following Operating System entry ?
(a) Prevention
A. Threads 1. Processor
(b) avoidance
B. Virtual Address space 2. Interrupt
(c) detection and recovery
C. File System 3. Hard Disk Drive
(d) ignore the problem
D. Signal 4. Main Memory
APPSC Lect. 2017 (Degree College) (CS)
129. The effect of executing the UNIX command A B C D
'sort -t\I +1 file1' is..... (a) 1 4 3 2
(a) sorts the lines of the file1 in ascending order (b) 4 3 1 2
and place I as delimiter (c) 2 3 4 1
(b) sorts the lines of the file1 in descending order (d) 1 3 4 2
and place I as delimiter RPSC ACF FRO 23.02.2021 (Comp. App./Sci.)

ANSWER KEY
1. (d) 2. (a) 3. (c) 4. (d) 5. (d) 6. (a) 7. (c) 8. (b) 9. (b) 10. (c)
11. (c) 12. (a) 13. (c) 14. (c) 15. (c) 16. (c) 17. (c) 18. (a) 19. (b) 20. (a)
21. (a) 22. (d) 23. (c) 24. (c) 25. (c) 26. (d) 27. (a) 28. (a) 29. (d) 30. (d)
31. (b) 32. (b) 33. (a) 34. (b) 35. (b) 36. (a) 37. (a) 38. (b) 39. (a) 40. (c)
41. (c) 42. (a) 43. (c) 44. (d) 45. (c) 46. (a) 47. (d) 48. (a) 49. (a) 50. (a)
51. (b) 52. (a) 53. (c) 54. (b) 55. (c) 56. (b) 57. (b) 58. (c) 59. (b) 60. (d)
61. (d) 62. (b) 63. (d) 64. (a) 65. (a) 66. (c) 67. (d) 68. (d) 69. (a) 70. (c)
71. (a) 72. (a) 73. (c) 74. (d) 75. (b) 76. (d) 77. (d) 78. (b) 79. (a) 80. (d)
81. (b) 82. (d) 83. (d) 84. (d) 85. (b) 86. (b) 87. (a) 88. (c) 89. (b) 90. (a)
91. (a) 92. (a) 93. (c) 94. (b) 95. (b) 96. (d) 97. (c) 98. (d) 99. (c) 100. (d)
101. (b) 102. (d) 103. (a) 104. (a, c) 105. (c) 106. (a) 107. (c) 108. (b) 109. (a) 110. (c)
111. (a) 112. (b) 113. (c) 114. (c) 115. (b) 116. (a) 117. (c) 118. (a) 119. (d) 120. (a)
121. (b) 122. (a) 123. (c) 124. (a) 125. (a) 126. (b) 127. (b) 128. (c) 129. (c) 130. (c)
131. (d) 132. (c) 133. (a)

Computer Organization and Operating System 149 YCT


06.
COMMUNICATION & NETWORK CONCEPT
Switches : It is a networking device that groups all
Introduction to Computer Network the devices on the network to transfer the data to
Computer network is a group of computers another device. It sends the message to the device to
connected with each other through wires, optical fibers which it belongs.
or optical links so that various devices can interact with Cables and Connectors : Cable is a transmission
other through a network. The purpose of having media that transmits the communication signals.
computer network is to send and receive data, stored in There are three types of cable as – Twisted pair
other devices over the network. These devices are often cable, Coaxial cable, Fiber optic cable.
referred as nodes. Router : Router is used to connect the LAN to the
There are five basic components of computer network. internet and connect multiple computers to the
internet.
Modem : Modem connects the computer to the
internet over the existing telephone line.
Features of Computer network :
Communication Speed : Network provides us
Message : This is data that is transferred from communication over the network at a fast speed,
one device to another on a computer network. where we can do video conferencing, email,
Sender : Sender is a device that sends data to messaging etc.
another device connected to a network. File Sharing : Computer Network a file sharing is a
Receiver : Receiver is a device that expects data major advantage. It is used to share files from one
from other devices on the network. device to another device through the network.
Transmission Media : To transfer data from one Backup and Roll-back is Easy : Since the files are
device to another we need a medium like wire, cable stored in the main server which is centrally located.
radio waves etc. Therefore it’s easy to take the backup from the main
Protocol : A protocol is a set of rules that govern server.
data communication without a protocol. Software and Hardware Sharing : We can install
the applications on the main server and access any
Component of Computer Network : where through the network. So we do not need to
install the software on every machine.
Security : Network allows the security by ensuring
that the user has the right to access the certain files
and application.
Computer Network Architecture :
Network architecture generally refers to design of
computer network or communications all of
computers in network.
It is basically defined and described as physical and
logical design of software, hardware, protocols, and
NIC (Network Interface Card) Network interface
media of data transmission.
card is device that helps computer to communicate
The two type of network architectures are used :
with another device. The NIC contains the hardware
Peer-to-Peer Network :
addresses, the data-link layer protocol use this
Peer-to-Peer network in all the computer are linked
address to indentify the system over the network so
together with equal privilege and responsibilities for
that it transfers the data to correct device address.
processing the data. This type of network is useful
Hub : Hub is a central device that divides a network for small environments usually up to 10 computers.
connection into multiple devices. When a computer Special permissions are assigned to each computer
sends a request to the Hub, then hub distributes the for sharing the resources, but this can lead to a
request to all interconnected computers. problem if the computer with the resource is down.
Communication & Network Concept 150 YCT
Here if one computer stop working but other Personal Area Network (PAN) Personal area
computer will not stop working because all network is a network arranged within an individual
computer connected each other. person, typically within a range of 10 meters. This
Client/Server Network : It is consists of two kind of network is used for connecting the computer
computers. Client computer and server computer. devices of personal use is know as personal area
The client computer simply sends request to the network.
server computer, server execute the request and send Thomas Zimmerman was the first research scientist
response to client computer. to bring the idea of the personal area network.
It is also known as the client server architecture. Personal computer devices that are used to develop
This architecture is a two tier architecture, which is the personal area network are the laptop, mobile
divided into two layers. phone, media player and play stations.
The first layers located on the clients desktop and There are two type of personal area network –
second layer is data base management layer located (i) Wireless personal area network which is used to
on the server machine. wireless connection, low range network example –
wi-fi, Bluetooth.
(ii) Wired personal area network is created by using
the USB.
Metropolitan Area Network (MAN) A
metropolitan area network is a network that covers a
A client/server network has a dedicated server that larger geographic area by interconnecting a different
improve the overall performance of the whole LAN to form a larger network. The geographical
system and also increase the speed of the sharing area covered by MAN is comparatively larger than
resources. It requires a dedicated network LAN but smaller than WAN.
administrator to manage all the resources. MAN is generally owned by private organizations
Computer Network Types : and connected with the help of optical fibers, copper
A computer network is mainly four types : wires etc.
Local Area Network (LAN) Local area network is Government agencies use MAN to connect the
used in small area such as building, Office, which is citizens and private industries.
connected to each other. LAN is used for connecting MAN is used in communication between the bank in
two or more personal computers through a a city, Air Line Reservation, and also used for
communication medium such as twisted pair, communication in the military. The most common
coaxial cable etc. and the data is transferred at an example of MAN is cable TV network within a city
as show in Figure.
extremely faster rate in local area network.
Each hosts in a LAN has an identifier, an address
that uniquely defines the hosts in the LAN. A packet
sent by a host to another host carries both the source
host and the destination host address.
In the past, LAN network were connected through a
common cable, which meant that a packet sent from
one host to another was received by all host. But
today, most LAN use a smart connecting switch,
which is able to recognize the destination address of
the packet and guide the packet to its destination
without sending it to all other hosts.
Communication & Network Concept 151 YCT
• Wide Area Network (WAN): WAN is a group of some disadvantages of hierarchical topology
computers that are connected in a large area such as difficult to troubleshoot the problem, devices
entire country etc., WAN is generally used for required for broadband transmission are very costly
connecting two or more LANs through some and failure in main bus cable damage the overall
medium such as leased telephone lines, microwaves, network.
etc.
A wide area network provides a large geographical
area. Suppose if the branch of our office is in a
different city then we can connect with them through
WAN. Which we can connect with another branch.
WAN is not limited to single location, but it spans
over a large geographical area through a telephone
line, fiber optic cable or satellite links.

Bus Topology : Bus topology is all the nodes


connected to the single cable know as a backbone
cable. When a node communicates with the other
nodes in the network, it simply sends a message to
the common bus. It transmits the data from one end
to another in a single direction.
Therefore the initial cost of installation is low
WAN network has more security issues as compared because bus topology nodes are directly connected
to LAN and MAN network and WAN network to the cable without passing through a hub. Coaxial
needs firewall & antivirus for protect from virus. or twisted pair cables are mainly used in bus-based
Network Topology : networks that support up to 10 mbps and
Network topology refers to the arrangement of configuration of a bus topology is quite simpler as
computers connected in a network through some compared to other topology.
physical medium such as cable, optical fiber etc.
Topology defines the structure of the network of
how all the component are interconnected to each
other.
The various types of network topology.
Hierarchical Topology : The hierarchical topology
is also knows as tree topology. Which is divided into
different levels connected with the help of twisted
Star Topology : In the star topology all nodes are
pair, coaxial cable, or fiber optics. This type of
connected to a common device known as hub.
topology is arranged in form of a tree structure in
which top level contains parent node (root node). Nodes are connected with the help of twisted pair,
Which is connected with the child nodes in the coaxial cable or optical fiber.
second level of hierarchy with the point to point Star topology is an arrangement of the network in
link. The second level nodes are connected to the which every node is connected to the central hub, or
third level nodes. Which in turn are connected to the a central computer. The central computer is known
fourth level nodes and so on. Except the top-level as a server and the peripheral devices attached to the
node each level node has a parent node. server know as clients. When a node wants to send
The number of point-to-point links in the the messages to the intended node. Each node in the
hierarchical type of topology is generally one less network is connected with a point-to-point link to
than the total number of nodes in structure. the centralized hub.
The hierarchical topology is symmetrical, having a Star topology is most popular topology in network
fixed branching factor associated with each node. implementation and easy error deletion and
Tree topology is mainly used to provide broadband correction, if the failure of one computer does not
transmission, we can add new device to the existing affect the other computers in the network. It
network and easily managed and maintained. But supports a bandwidth of approx 100 mbps.
Communication & Network Concept 152 YCT
Some disadvantages of start topology like – if the Mesh topology is divided into two categories :
central hub or switch goes down. Then all the (i) Fully connected mesh topology.
connected node will not be able to communicate (ii) Partially connected mesh topology.
with each other, some time cable routing becomes In a fully connected mesh topology each computer is
difficult, when a significant amount of routing is connected to all the available computer in the
required. network and partially connected mesh topology, but
certain computers are connected to those. Computers
with which they communicate frequently.

It is very expensive to implement and difficult to


configure and install.
Ring Topology : In the ring topology the node are Hybrid Topology : The hybrid topology is the
connected in the form of a ring with help of twisted combination of the multiple topology. The hybrid
pair. Each node is connected directly to the other topology is created two different network topology
two nodes in the network. Ring topology is like a are inter connected.
bus topology. The node which wants to send a
If two ring topology are connected the resultant
message first, passes the message to its consecutive
topology is not the hybrid topology but two or more
node in the network. Data is transmitted in the
different-different topology are connected (ring
clockwise direction from one node to another.
topology connected to the bus topology) then result
Each node has an equal to access other nodes in the topology is called the hybrid topology.
network. Addition of new nodes does note degrade
The hybrid topology is more effective as it uses
the performance of the network and easy to
multiple topology and contains the best and efficient
configure and install, but it is relatively expensive to
features of the combined topology from constructed.
construct the ring topology. It failure of one node in
the ring topology affects the other nodes in the ring.

Mesh Topology :
Network Transmission Modes :
Which data is transmitted from one device to
In mesh topology each computer is connected to
another device is known as transmission or
every other computer in point-to-point mode. There
communication mode, each communication channel
are multiple paths from one computer to another
has a direction associated with it, and transmission
computer. It does not contain the switch, hub or any
media provide the direction. It is defined in the
central computer, which acts as a central point of
physical layer.
communication. Mesh topology is mainly used for
‘WAN’ implementations where communication There are three types of transmission mode :
failures are a critical concern. Mesh topology can be (i) Simplex mode (ii) Half-duplex mode
formed by using the formula Number of cables = (n (iii) Full-duplex mode
*(n – 1))/2, when n is the number of node that (i) Simplex Mode : In simplex mode, the
represent the network. communication is unidirectional, the data flow in
Communication & Network Concept 153 YCT
one direction. A device can only send the data but OSI Model : OSI stands for open system
cannot receive it or it can receive the data but cannot interconnection. It is an open standard for
send the data. establishing communication between systems. OSI
Keyboards and traditional monitors are example of is a reference model that describes how information
simplex device the keyboard can only introduce from a software application in one computer moves
input; the monitor can only accept output. Simplex through a physical medium to the software
mode can use the entire capacity of the channel to application in another computer.
send data in one direction. OSI model was developed by the international
The simplex mode is used in the business filed as Organization for standardization (ISO) in 1984, and
sales that do not require any corresponding reply. it is now considered as an architectural model for the
inter-computer communications.
This model consists of seven layers and each layer
performs a particular network function and each
layer is self-contained. So that task assigned to each
(ii) Half-duplex Mode : In half-duplex mode, each
layer can be performed independently.
station can both transmit and receive but not at the
same time when one device is sending data then
other device only can receive a walkie-talkie is an
example of the half-duplex mode in Walkie-talkie if
one party speaks and another party can listeners.
After a pause the other speaks and first party listen
in half-duplex mode. When one device is sending
the data. Then another has to wait, this cause the
delay in sending the data at the right time.

The model upper layers mainly deals with the


(iii) Full-duplex Mode : In full-duplex mode (also
application related issues and they are implemented
called duplex) both stations can transmit and receive
only in the software an upper layer refers to the layer
simultaneously. In this mode data flow in both
just above another layer and the lower layer of the
directions.
OSI model deals with the data transport issues, data
Full-duplex mode has two simplex channels one link layer and the physical layer are implemented in
channel has traffic moving in one direction and hardware and software.
another channel has traffic flowing in the opposite
Application Layer : The application layer provides
direction.
an interface. Through, which user can communicate
The most common example of full-duplex mode is and transfer data on the network.
telephone network, where to people are
Presentation Layers : They presentation layer
communicating with each other by telephone line,
ensures the translation of characters from the
both can talk and listen at the same time.
original format in the host system to the format of
the receiving system. It also adds encryption and
decryption features. Data compression is handled at
this layer.
Session Layer : The session layer manages the
Networks Layers/Models communication between the computers on the
The networking model describes the architecture, network. This layer is responsible for notifying the
components, and design used to establish errors. Which may have occurred in the above
communication between the source and destination layers. Inclusion of this layer enables maintaining
system. Aliases for network models include protocol sessions during browsing and helps with
stacks. Protocol suites, network stacks, and network implementing Authentication. Authorization
protocols. There are 2 predominant models Synchronization and Dialog control.
available. Transport Layer : The transport layer is
(i) Open systems interconnection (OSI) model responsible for the delivery of packets in a proper
(ii) Transmission control protocol/internet protocol sequence, it also provides proper rectification of
(TCP/IP) model. error and manages the flow of packets over the
Communication & Network Concept 154 YCT
network. Transport layer enables the following in the OSI model, that is application layer,
services Reliability, Flow-control, Congestion presentation layer, and the session layer.
control, Multiplexing and De-multiplexing. It also The application layer is responsible for managing all
ensures that data is properly delivered at the the user interface requirements. Many of the
destination or not. protocols such as Telnet, FTP, SMTP, DNS, NFS,
Network Layer : The network layer is responsible LPD and DHCP work on this layers.
for identifying the ways. Which is data transmitted Transport Layer : This layer is the same as the
over the network from one device to another device. one mentioned in the OSI model. Transmission
The network layer directs the packets to the control protocol (TCP) is used in this model. TCP
destination device based on the IP address of device. ensures reliability and helps avoids congestion in
It detects the errors, which occur during the networks. The transport layer is responsible for the
transmission of packets. delivery of packets or data grams, and it also hides
This layer is also responsible for breaking the large the packet routing details from the upper layer.
size packets into smaller packets when the device is The transport layer allows detection and
unable to accepts the packets due to their large size. correction of errors and helps to achieve end-to-end
Data Link Layer : Data link layer main communication between devices. The transport layer
responsibility of the ensuring flow the reading of connects the application layer to the network layer
physical addresses. This layer specifies the action. through two protocols TCP and UDP.
Which must be performed to maintain the network Network Layer : The network layer is also known
communication. It collects the packets to form as internetworking layer or IP layer. It contains three
frames, which are transmitted over the network it protocols that perform different function.
also finds out and then corrects the errors. Which (i) Internet Protocol (IP)
occur during the transmission of packets. (ii) Internet Control Message Protocol (ICMP)
Physical Layer : The physical layer describe all the (iii) Address Resolution Protocol (ARP)
physical requirements for the transmission of data, (i) Internet Protocol (IP): IP is a connectionless
between devices on a network. Physical layer can protocols that is responsible for the delivery of
specify the layout of pins, hub and cable. Network packets.
topology comes under this layer. This layer defines (ii) Internet Control Message Protocol (ICMP) The
the relation between a single device and the ICMP protocol is responsible for reporting errors,
transmission medium. sending, errors messages and controlling the flow of
TCP/IP : TCP/IP stands for transmission control packets.
protocol/internet protocol model. The TCP/IP model (iii) Address Resolution Protocol (ARP) It is
was initially developed by “US” Defence Advanced responsible for determining the Media Access
Research Projects Agency (DARPA). This model is Control (MAC) address corresponding to an IP
also known as the internet reference model or DoD address.
(Department of Defence) model. It consists of four Physical Layer : The physical layer is responsible
layers. for collecting packets so that the frames, which are
The protocol is define in the IETF (Request for transmitted on the network, can be formed. It
comments) EFC 791 and 793 many of the layers that performs all the functions required to transmit the
we see in the OSI model are not available in the data on the network and determines the ways for
TCP/IP model. accessing the medium through which data will be
TCP/IP model uses TCP in the transport layer and IP transmitted.
used in the network layer. Networking Devices
This hardware devices which are employed for
establishing a connection of Fax Machines,
Computers, Printers and other electronic equipment
with that of the network are termed as network
devices.
These devices can be either intra or interconnected
type. Few of the devices are connected on the
devices such as RJ45 connector and NIC cards,
while few devices are installed on the devices like
Application Layer : In the TCP/IP model the switches, gateway, router and others. Lets discuss all
application layer encompasses the first three layers the networking devices in briefly.
Communication & Network Concept 155 YCT
Repeater : A repeater Operates at the physical layer. Switch : A switch is multiport bridge with buffer
Its job is to regenerate the signal over the same and a design that can boost its efficiency (a large
network before the signal becomes too weak or number of ports implyless traffic) and performance.
corrupted so as to extend the length to which the A switch is a data link layer device, that can perform
signal can be transmitted over the same network. error checking before forwarding data in other
Important point to be noted about repeaters is that words, the switch divides the collision domain of
they do not amplify the signal. When the signal hosts, but broadcast domain remains the same.
becomes weak, they copy the signal bit-by-bit and Routers : Data can be forwarded and filtered based
regenerate it at the original strength. on a logical address by using a connective device
Hub : Hub is basically a multiport repeater, which called a router. A router is a device like a IP
connects multiple wires coming from different addresses. The router is mainly a network layer
branches, for example– the connector in start device, normally connect LAN’s and WAN’s
topology which connects different stations. together and have a dynamically updating routing
Hubs cannot filter data, so data packets are sent to table based on which they make decisions on routing
all connected devices. Also, they do not have the the data packets.
intelligence to find out the best path for data packets Gateway : A gateway, as the name suggests, is a
which leads to inefficiencies and wastage. passage to connect two network together that may
Type of Hub : work upon different networking models. They
(i) Active Hub : These are the hubs that have their basically work as the messenger agents it, that take
own power supply and can clean, boosts, and relay data from one system, interpret it, and transfer it to
the signal along with the network. It serves both as a another system. Gateway are also called protocol
repeater as well as a wiring center. These are used to converters and can operate at any network layer.
extend the maximum distance between nodes. Gateways are generally more complex switches or
(ii) Intelligent Hub : It works like active hubs and routers. Gateway is also called a protocol converter.
includes remote management capabilities. They also Brouter : It also known as the bridging router, it is
provide flexible data rates to network devices. It also a device that combines features of both bridge and
enables an administrator to monitor the traffic router. It can work either at the data link layer or a
passing through the hub and to configure each port network layer.
in the hub. • NIC: NIC stands for network interface card is a
(iii) Passive Hub : These are the hubs that collect network adapter that is used to connect the computer
wiring from nodes and power supply from the active to the network. It is installed in the computer to
hub. These hubs relay signals on to the network establish a LAN.
without cleaning and boosting them and can't be
used to extend the distance between nodes. Fundamentals of Mobile
Bridge : A bridge, operates at the data link layer. A Communication
bridge is a repeater with add on functionality of Mobile communication is the use of technology that
filtering content by reading the MAC addresses of allow us to communicate with others in different
sources and destination. It is also used for locations without use of any physical connection
interconnecting two LANS working on the same connections (wires or cables). Mobile
protocol. communication makes our life easier, and it saves
Types of Bridges : time and effort.
(i) Transparent Bridges : These are the bridges in A mobile phone (also called mobile cellular
which the stations are completely unaware of the network, cell phone) is an example of mobile
bridge’s existence i.e. whether or not a bridges is communication (wireless communication). It is an
added or deleted from the network, reconfiguration electric device used for full duplex two ways radio
of the stations is unnecessary. telecommunication over a cellular network of base
These bridges make use of two process i.e. bridge stations know as cells site.
forwarding and bridge learning.
Generations of Wireless communication :
(ii) Source Routing Bridges : In these bridges routing
A. 1G : This is first generation of wireless telephone
operation is performed by the source station and the
technology, mobile telecommunications, which was
frame specifies which route to follow. The host can
discover the frame by sending a special frame called launched in Japan by NTT in 1979. The first cellular
the discovery frame. Which spreads through the systems used analog signals. It used FDD scheme
entire network using all possible paths to the and typically allocated bandwidth of 25 mhz and it’s
destination. speed is 24kbps. 1G low sound quality with small
Communication & Network Concept 156 YCT
coverage area an no roaming support between Features of Mobile Communication :
various operator. High Capacity Load Balancing : Each wired or
B. 2G : This is the second generation of mobile wireless infrastructure must incorporate high
telecommunication was launched in Finland 1991. It capacity load balancing means, when one access
is analog to digital, the second generation supported point is overloaded the system will actively shift
voice and SMS both communication. It supported all users from one access point to another depending on
4 sectors of wireless industry namely digital cellular, the capacity which is available.
mobile data, PCS (Personal Communication Scalability : The wireless networks have the ability
Service), WLAN. The later versions of this to start small if necessary but expand in terms of
generation which were called 2.5G using GPRS coverage and capacity as needed. Without having to
(General Packet Radio Service) and 2.75G using overhaul or build an entirely new network.
EDGE (Enhanced data rates for GSM Evolution) Network Management System : Hundreds or even
network. It provides better quality and capacity. thousands of access points. Firewall, switches,
C. 3G : This is the third generation of mobile managed power and various other components. The
telecommunication was introduced in early 2000s. wireless networks have a smarter way of managing
The transmission of data was increased up to 2 the entire network from a centralized point.
Mbps which allows you to sending or receiving Advantages of Mobile Communication :
large email messages. There are following advantage of mobile
The main difference between 2G and 3G is the used communication.
of packet switching rather than circuit switching for Flexibility : Wireless communication enables the
data transmission. It allow faster communication, people to communicate with each other regardless of
video conferencing and 3D gaming. But it was location.
costly and high bandwidth and also need expensive Speed : improvements can also be seen in speed, the
3G phones. network connectivity or the accessibility was much
D. 4G : 4G is the fourth generation of mobile improved in accuracy and speed.
telecommunication which was appeared in 2010. It Cost Effectiveness : In wireless communication
was based on LTE (Long Term Evolution) and LTE there is no need of any physical infrastructure (wires
advanced standards. This communication services or cables) or maintenance practice. Hence the cost is
like video calling, real time language translation and reduced.
video voice mail.
Global Positioning System (GPS)
It was capable of providing 100 Mbps to 1 Gbps
Global positioning system widely known as GPS
internet speed.
have a great importance since the days of world War
The basic term used to describe 4G technology is II. A GPS system consists of a network of 24
MAGIC where – orbiting satellites called NAVSTAR (Navigation
M - Mobile Multimedia System with Time and Ranging) and placed in space
A - Anytime anywhere in six different orbital paths with four satellites in
G - global mobility support each orbital plane and covering the entire earth
I - Integrated wireless solution under their signal beams.
C - customized personal services The first GPS satellite was launched in February
But it use more battery. Implementation and 1978. The satellites signals can be received
expensive equipment are required. anywhere and at any time in the world.
E. 5G: 5G is the fifth generation wireless connection The GPS is based on well known concept called the
which will be probably implemented by 2020 or triangulation technique.
even some years earlier. Machine to machine
communication can be possible in 5G.
5G will be able to performs internet of things (IoT)
for smart home and smart city, connected cars etc.
This generation will be based on lower cost, low
battery consumption and lower latency than 4G
equipment.
There will be much faster transmission rate of data
to the previous versions. The speed of 5G will be 1
Gbps.
Communication & Network Concept 157 YCT
GPS is also helping to save lives many police, fire Virtual shops where you may buy anything you
and emergency medical service units are using GPS want and need without leaving your house,
receivers to determine to the location of a police car, Hundreds and thousands of newsgroups and
a fire truck, or an ambulance nearest to an service that keeps you updated with every tick
emergency, enabling the quickest possible response of the clock, the internet is a source of the most
in death or life situations. recent news.
Introduction to Internet Disadvantages of the internet :
Spending too much time on the internet is
A network is group of one or extra computer
hazardous for the young generations health and
systems which are related through a couple of
leads to obesity.
channels for the motive of sending and receiving
records or data in a shared environment. Children who use the internet develop an
addiction, which is quite dangerous.
Internet is a group of computer systems related from
all around the world. The internet protocol suite is a It is now quite easy to decipher some one’s chat
framework defined through the internet standards. or email messages thanks to the hacking
community.
The internet is a global computer network that
connects various devices and sends a lot of Data Communication
information and media. It uses an internet protocol
Communication is a process or act in which we can
(IP) and transport control protocol (TCP) based
send or receive interconnected collection of
packet routing network. TCP and IP work together
autonomous means no computer can start, stop or
to ensure that data transmission across the internet is
control another computer. Data communication
consistent and dependable, regardless of the device
refers to the transmission of this digital data between
or location. Data is delivered across the internet in
two or more computers and a computer network or
the form of messages and packets.
data network is a telecommunications network that
IP is a set of rules that control how data is
allows computer to exchange data.
transmitted from one computer to another computer
over the internet and TCP is used with IP to ensure Data Communication Channels :
that data is transferred in a secure and reliable Communication Channels are the medium that
manner. connects two or more workstations. Workstations
History of Internet : can be connected by either wired media or wireless
media. It is also known as a transmission medium.
The ARPANET (Later renamed the internet)
We can group the communication media into two
established a successful link between the university
of California, Los Angeles and the Stanford categories.
Research Institute on October 29, 1969. (A) Guided media transmission
In year 1991 a user friendly internet interface (B) Unguided media transmission
was developed. Delphi was the first national A. Guided Media Transmission : In this transmission
commercial online service to offer internet medium, the physical link is created using wires or
connectively in July 1992. cables between two or more computers or devices,
Wi-Fi was first introduced in 1997. The year is and then the data is transmitted using these cable in
1998 and windows 98 is released. Smartphone use is terms of signals. Type of guided media transmission:
widespread in 2007. The 4G network is launched in (i) Twisted Pair Cable : It is used most common
2009 now day internet is used by 3 billion people. form of wire used in communication in a
By 2030 there are expected to be 7.5 billion internet twisted pair cable, two identical wires are
users and 500 billion devices linked to the internet. wrapped together in a double helix.
Advantages of the Internet : The twisting of the wire reduces the crosstalk. It
It is the best source of a wide range of is known as the leaking of a signal from one
information. There is no better place to conduct wire to another due to which signal can corrupt
research than the internet. and can cause network errors.
Online gaming, talking, browsing, music and The twisting protects the wire from internal
TV are quickly becoming the most popular way crosstalk as well as external forms of signal
to pass the time. interference.
Communication & Network Concept 158 YCT
Unshielded Twisted Pair (UTP) It is used in the transmitter and the receiver, both use
computer and telephones widely as the name antennas to radiate and capture the radio signal.
suggest, there is no external shielding so it does not Infrared : It is short-distance communication
protect from external interference it is cheaper than and can pass through any object. It is generally
STP. used in TV remotes, wireless mouse etc.
Shielded Twisted Pair (STP) It offers greater
Important Facts
protection from crosstalk due to shield. Due
shielding it protects from external interference. It is ● The portion of physical layer that interfaces with the
heavier and costlier compare to UTP. media access control sublayer is called physical
(ii) Coaxial Cable : It consists of solid wire core that is signaling sublayer.
surrounded by one or more foil or wire shields. The ● In the communication of two processes, an endpoint
inner core of the coaxial cable carries ground. It is for communication is called socket.
widely used for television signals and also used by ● HTTP protocols may be used for accessing world
large corporations in building security systems. data wide web.
transmission of this coaxial cable is better but it is ● Web pages are created in a language called HTML.
expensive as compared to twisted pair. ● Amplitude shift keying technique is used for
(iii) Optical Fibers : Optical fibers is an important transmitting digital signal.
technology. It transmits large amounts of data at ● Resource sharing, improving reliability and
very high speeds due to which it is widely used in availability and enhancing performance are
internet cables. It carries data as a light that travels advantages of computer networks.
inside a thin glass fiber. The fiber optic cable is ● A network spreading in different geographical
made up to three pieces. locations is known as WAN.
1. Core : Core is the piece through which light travels. ● The secured socket layer (SSL) is used in
It is generally created using glass or plastic. presentation layer.
2. Cladding : It is the covering of the core and reflects ● SSL protocol is generally used to encrypt data
the light back to the core. between web browser and web server.
3. Sheath : It is the protective covering that protects ● The media access control sublayer resides in data
fiber cable from the environment. link layer.
B. Unguided Media Transmission : The ● Secure Electronic Transaction (SET) is a
unguided transmission media is a transmission communications protocol standard for securing credit
card transactions over the internet.
mode in which the signals are propagated from
one device to another device wirelessly. Signals ● A gateway can forward packets across different
can wave through the air. Water, or vacuum. It networks that may also use different protocols.
is generally used to transmit signals in all ● In symmetric key cryptography, for encrypting and
direction unguided media is further divided into decrypting the message, the key is same.
various parts : ● In early ARPANET, distance vector routing method
Microwave : Microwave offers communication was used.
without the use of cables. Microwave signals ● Ethernet encoding ( 8B10B) has the highest
are just like radio and television signals. It is redundancy.
used in a long-distance communication. ● An Ethernet hub functions as a repeater.
Microwave transmission consists of a ● Cyclic redundancy check techniques is based on
transmitter, receiver and atmosphere. In binary division.
microwave communication, there are parabolic ● The length of an IPv6 address is 128 bits.
antennas that are mounted on the towers to send ● Switch is not a network edge device while PC ,
a beam to another antenna. The higher tower, server and Smartphone are network edge device.
greater the range. ● Application layer protocol defines the types of
Radio wave : When communication is carried message exchanged, rules for when and how
out by radio frequencies, then it is termed radio processes send and respond to messages and message
transmission. It offers mobility. It is consists of format, syntax and semantics as well.
Communication & Network Concept 159 YCT
● The medium is the physical path over a message ● Error correction can be done by using Hamming
travels. code.
● A set of rules that governs the data communication is ● Multiplexer is a device that combines transmission
known as protocol. from various I/O devices into one line.
● Bluetooth is an example of personal area network. ● In communication satellite, multiple repeaters are
● ARP finds the MAC address from IP address. known to transponders.
● The structure of format of data is called syntax. ● 'Communication protocol' means set of rules to
● ARPANET is the first network. communicate data from one machine to another
machine.
● HTTP and SMTP protocols can use multiple TCP
● A network using message switching technique is
connections between the same client and the server.
called a store and forward network.
● E-mail uses SMTP as application layer protocol while
● File server is a specialised computer system which is
TCP and UDP are two transport layer protocols.
used to store files received from various client
SMTP uses TCP as transport layer protocol because
machines.
TCP is reliable.
● Encryption is a technique to provide privacy of data.
● In the IPv4 addressing format, the number of
● When a DNS server accepts and uses incorrect
networks allowed under class C address is 2^21.
information from a host that has no authority giving
● The protocol data unit ( PDU) for the application
that information, then it is called DNS spoofing.
layer in the Internet stack is message.
● Bit stuffing refers to inserting a '0' in user stream to
● IP address consists of 4 parts separated by dots.
differentiate it with a flag.
● Domain name matching to IP address is performed by ● Dynamic routing protocol enable routers to
DNS. dynamically discover and maintain routes, distribute
● 'Internet' is an example of WAN. routing updates to other routers and reach agreement
● If a computer network cable is broken , then whole with other routers about the network topology.
network goes down in ring topology. ● Lightweight directory access protocol is used for
● Mesh topology is one of the most reliable topology. authentication.
● Hierarchical topology is used to establish a network ● DHCP network protocol allows hosts to dynamically
which is also known as tree network. get a unique IP number on each bootup.
● Twisted pair wire has minimum transmission speed. ● The IEEE standard for Wi- Max technology is IEEE
● TCP/ IP is an example of communication protocol, 802.16
networking protocol and data transfer protocol. ● Use of IPSEC in tunnel mode results in IP packet
● In a computer network router ,hub switch are with same header.
connecting devices. ● In networking, UTP stands for unshielded twisted
● Link state is routing algorithm used by OSPF routing pair.
protocol. ● SHA-1 is a message digest function.
● Block cipher is data encryption standard (DES). ● Advanced Encryption standard (AES) is based on
● On packet switching internet works. symmetric key algorithm.
● X.21 is a network access standard for connecting ● Distributed parity is the characteristic of RAID 5.
stations to a circuit switch network. ● IPsec protocol suite designed by IETF to provide
security for a packet at the internet layer.
● Token ring is connection free protocol.
● Physical topology of FDDI is ring.
● Encryption and decryption provide secrecy, or
● SMTP protocol is used for transferring electronic
confidentiality, but not integrity.
mail message from one machine to another machine.
● The term UPnP protocol is a short form for universal
● Security services such as access control,
plug and play.
connectionless integrity and rejection of replayed
● The noise due to random behavior of charge carriers packets are provided by IPSec.
is shot noise. ● Reflection attack is a method of attacking a
● Ethernet card is responsible for network challenge-response authentication system that uses
communication in a computer system. the same protocol in the both directions.
Communication & Network Concept 160 YCT
● An ATM cell has the payload field of 48 bytes. ● The secret key between members needs to be created
● Manchester Encoding, the data bit is represented by as a session key when two members contact KDC.
both 0 and 1 as transition in the middle of bit period. ● Network layer firewall works as a packet filter.
● A bridge is used to interconnect two networks at data ● In cryptography, the order of the letters in a message
link layer. is rearranged by transpositional ciphers.
● In TCP/IP, network layer and transport layer provides ● Many packets present in the subnet degrades the
only connectionless,both connectionless and performance which leads to congestion.
connection- oriented. ● In tunel mode IPSec protects the entire IP packet.
● In selective repeat, the error free frames received ● When a packet is lost in transit, it should be handled
following an erroneous frame are buffered and only by sequence control.
the oldest unacknowledged frame is retransmitted by ● In serial communication, start and stop bits are used
the sender. for synchronization.
● In point to point protocol (PPP), network layer option ● The DMA transfers are performed by a control circuit
are negotiated using dynamic host control protocol. called as DMA controller.
● In pure ALOHA, the sender starts transmitting the ● UDP socket is connection less socket.
data as soon as it has data to send. ● RARP is used to obtain the IP address of a host based
● Distance vector routing algorithm suffers from count- on its physical address.
to- infinity problem. ● In multicasting communication, the destination
● In link state routing distance vector routing is address in each packet is the same for all duplicates.
employed to distribute the link state packets. ● A router must have at least 2 NICs.
● BiSYNC is the character oriented protocol. ● I/O devices is not a consumable resources.
● nmap is an open source port scanner used to ● In OSI model, network layer is between data link
determine open ports and basic vulnerabilities on the
layer and transport layer.
network.
● SMTP protocols uses port number 25.
● 1000Base-T is a four- wire Gigabit Ethernet
● If a packet has arrived with an M bit value of 0,then
implementation.
this is the last fragment.
● TCP is connection- oriented while UDP is connection
● The wireless application protocol (WAP) aims to
less.
ensure interoperability among service providers.
● A RTP packet is encapsulated in a UDP user
● In a LAN network every system is identified by IP
datagram.
address.
● In real - time video conference,data from the server is
● The transport layer protocols used for real time
multicast to the client site.
multimedia, files transfer, DNS and Email
● Routers communicate with each other and forward
respectively are UDP, TCP, UDP and TCP.
the packets based on IP address.
● Md5sum can be used for digital fingerprint of a file.
● The DES algorithm has a key length of 64 bits.
● Hub creates big collision domain and one large
● Analysis Engine and Alert database are the
broadcast domain.
components of intrusion detection system.
● 16 bits are in header checksum of IPv4 datagram
● DNS uses UDP as the transport protocol.
format.
● The protocol used by TCP for connection
● Pharming attack involves change in DNS entries so
establishment is three way handshake.
that users are directed to invalid site.
● ISDN is an example of circuit switched network.
● The encryption and compression are done by
● SMTP provides a basic electronic mail transport
presentation layer.
facility.
● WiMax belongs to 802.16 IEEE family.
● Transport layer protocol deals with process to process
communication. ● HTML is the scripting technologies which is not used
● Default gateway is used for handling the request for at server site.
route which is not present in routing table. ● Fibre distribution data interface (FDDI) does not
● Cell Relay is also known as ATM. support transmission media.

Communication & Network Concept 161 YCT


● In TCP/IP protocol suite destination port number is ● The DNS maps the IP addresses to a hierarchy of
not part of the IP header. domain names.
● The amount of uncertainty in a system of symbol is ● SSL is not responsible for error detection &
called entropy. correction.
● Poll/select line discipline requires address to identify ● Silly window syndrome is related to degrade in TCP
the packet recipient. performance.
● TCP/IP model doesn't consist of session layer. ● Application frameworks provide a means for creating
● BGP routing protocol is used Dijkstra algorithm SaaS hosted application using IDE.
during it's execution. ● TCP groups a number of bytes together into a packet
● Any electronic device on a network is called a node. called segment.
● Network interface card installs in a PC and allows the ● Communication offered by TCP is full- duplex.
PC to connect to a network. ● The packet sent by node to the source to inform it of
● The network area within which data packets originate congestion is called choke.
and collide is called a collision domain. ● User datagram protocol is called connection less
● WEP security solutions uses the same key for both because all UDP packets are treated independently by
encryption and authentication. transport layer.
● A communication device that combines transmission ● Control of users' access to network resources through
from several I/O devices into one line is a charges is the main responsibility of accounting
multiplexer.
management.
● TCP/IP application layer corresonds to the OSI
● Open shortest path first (OSPF) is also called as link
models to three layers.
state protocol.
● NFS applications allows a user to access and change
● Frame relay doesn't provide flow or error control,
remote files without actual transfer.
they must be provided by the upper level protocol.
● The data unit in the TCP/IP layer called a frame.
● The instrument that can be used to find the location of
● The full form of PING is Packet Internet Groper.
a cable short is termed as TDR.
● Devices on one network can communicate with
● Two network switches that do not support MDI-X
devices on another network via a gateway.
need to be connected via copper cabling. The cabling
● An SSID is used for identifying the WLAN on a
method that needs to be used is crossover.
WLAN.
● TPM is an acronym for trusted platform module.
● DNS can obtain the IP address of host if its domain
● The method used for transmitting IPv6 traffic over
name is known and vice versa.
IPv4 network is tunneling.
● CSMA stands for career sense multiple access.
● ICANN is the name of internet corporation for
● A remote batch- processing operation in which data is
assigned names & numbers to different domains.
solely input to a central computer would require a
simplex lines. ● To host a website, web server is required.
● Application layer of the OSI determines the interface ● DNS servers translates web addresses or host name to
of the system with the user. IP address.
● The slwest transmission speeds are in twisted pair ● RS- 232 is a standard that applies to serial port.
wire. ● IEEE 802.11 stands for wireless LAN.
● The standard suit of protocols used by the internet, ● RIP stands for routing information protocol.
intranets, extranets and some other networks is ● The network layer concerns with packets.
TCP/IP protocol. ● Frames from one LAN can be transmitted to another
● Modem is used for modulation and demodulation. LAN via bridges.
● DHCP server can greatly reduce TCP/IP ● Head- end device terminates VPNs at a primary
configuration problems. location.
● Transport, session, presentation and application layers ● VPN design guide in SDM can be used to assist in
of the OSI reference model are host- to- host layers. choosing a VPN.
Communication & Network Concept 162 YCT
Important Questions Asked in Previous Years Examinations
1. The portion of physical layer that interfaces 10. Which of the following is a communications
with the media access control sublayer is called protocol standard for securing credit card
_____ transactions over the Internet?
(a) physical signaling sublayer (a) Secure Electronic Transaction (SET)
(b) physical data sublayer (b) File Transfer Protocol (FTP)
(c) physical address sublayer (c) Post Office Protocol (POP)
(d) physical transport sublayer (d) Hypertext Transfer Protocol (HTTP)
GPSC Asstt. Prof. 30.06.2016 APPSC Lect. Degree College 16.09.2020
2. In the communication of two processes, an 11. A______ can forward packets across different
endpoint for communication is called : networks that may also use different protocols:
(a) Socket (b) Pipe (a) repeater (b) bridge
(c) Port (d) Remote procedure call (c) router (d) gate way
Karnataka PSC Comp. Sci. Teacher 16.10.2017 TRB Poly. Lect. 2017
3. Which of the following protocols may be used 12. In symmetric key cryptography, for encrypting
for accessing world wide Web? and decrypting the message, the key is
(a) HTTP (b) SMTP (a) private (b) public
(c) SLIP (d) None of the above (c) different (d) same
UPPSC LT GRADE 29.07.2018 RPSC ACF & FRO 23.02.2021 (CS)
4. Web pages are created in a language called 13. In early ARPANET, which routing method was
(a) SLIP (b) HTML used
(c) HTTP (d) WWW (a) Distance vector routing
UPPSC LT GRADE 29.07.2018 (b) Link state routing
5. Which of the following techniques is used for (c) Least cost routing
transmitting digitial signal? (d) Flooding
(a) Amplitude modulation RPSC ACF FRO 23.02.2021 (Comp. App./Sci.)
(b) Frequency modulation 14. Which of the 'following Ethernet encoding has
(c) Pulse code modulation the highest redundancy'
(d) Amplitude shift keying (a) 1B2B (b) 4B5B
UPPSC LT GRADE 29.07.2018 (c) 5B6B (d) 8B10B
6. Which of the following is an advantage of RPSC ACF FRO 23.02.2021 (Comp. App./Sci.)
computer networks? 15. An Ethernet hub
(a) Resource sharing (a) functions as a repeater
(b) Improving reliability and availability (b) connects to a digital PBX
(c) Enhancing performacnce (c) connects to a token- ring network
(d) All of the above (d) function as a gateway
UPPSC LT GRADE 29.07.2018 ISRO Scientist/Engineer 2007
7. A network spreading in different geographical 16. Which of the following error detection
locations is known as techniques is based on binary division?
(a) LAN (b) WAN (a) Checksum
(c) Both (a) and (b) (d) None of the above (b) Cyclic Redundancy Check (CRC)
UPPSC LT GRADE 29.07.2018 (c) Simple parity check
8. In which layer of network architecture, the (d) Two- dimensional parity check
secured socket layer (SSL) is used? UPPCL AE 18.05.2016
(a) Physical layer (b) Session layer 17. The length of an IPv6 address is:
(c) Application layer (d) Presentation layer (a) 16 bits (b) 32 bits
UPPSC LT GRADE 29.07.2018 (c) 64 bits (d) 128 bits
9. The media access control sublayer resides in APPSC Poly. Lect. 13.03.2020
which OSI layer? 18. Which of this is not a network edge device?
(a) Transport (b) Network (a) PC (b) Server
(c) Physical (d) Data link (c) Smartphone (d) Switch
UPPSC LT GRADE 29.07.2018 NIELIT Scientists-B 04.12.2016 (CS)
Communication & Network Concept 163 YCT
19. Application layer protocol defines: 28. In the IPv4 addressing format, the number of
(a) types of messages exchanged networks allowed under class C addresses is
(b) rules for when and how processes send and (a) 214 (b) 27
respond to messages (c) 221 (d) 224
(c) message format, syntax and semantics GATE 2012
(d) all of above 29. The protocol data unit (PDU) for the
NIELIT Scientists-B 04.12.2016 (CS) application layer in the Internet stack is
20. The _____ is the physical path over which a (a) Segment (b) Datagram
message travels. (c) Message (d) Frame
(a) Path (b) Protocol GATE 2012
(c) Route (d) Medium 30. IP address consists of _____ parts separated by
NIELIT Scientists-B 04.12.2016 (CS) dots
(a) 2 (b) 3
21. A set of rules that governs data
communication: (c) 4 (d) 1
(a) Rule (b) Medium MPPSC State Forest Service Examination 2014
(c) Link (d) Protocol 31. Domain name matching to IP address is
performed by
NIELIT Scientists-B 04.12.2016 (CS)
(a) Electronic mail (b) URL
22. Bluetooth is an example of:
(c) DNS (d) FTP
(a) local area network
MPPSC State Forest Service Examination 2014
(b) virtual private network
32. ‘Internet’ is an example of
(c) personal area network
(a) LAN (b) MAN
(d) none of the mentioned above
(c) WAN (d) None of these
NIELIT Scientists-B 04.12.2016 (CS)
MPPSC State Forest Service Examination 2014
NIELIT Scientists-B 04.12.2016 (IT)
33. If a computer network cable is broken whole
23. Which protocol finds the MAC address from network goes down in ____ topology
IP address? (a) Star (b) Ring
(a) SMTP (b) ICMP (c) Mesh (d) All options are correct
(c) ARP (d) RARP
MPPSC State Forest Service Examination 2014
NIELIT Scientists-B 04.12.2016 (CS) 34. Which of the following is a most reliable
24. The structure of format of data is called: topology?
(a) Syntax (b) Struct (a) Bus (b) Star
(c) Semantic (d) none of the above (c) Ring (d) Mesh
NIELIT Scientists-B 04.12.2016 (IT) MPPSC State Forest Service Examination 2014
25. The first Network: 35. Hierarchical topology is used to establish a
(a) ARPANET (b) NFSNET network which is also known as
(c) CNNET (d) ASAPNET (a) Bus network (b) Star network
NIELIT Scientists-B 04.12.2016 (IT) (c) Tree network (d) Mesh network
26. In one of the pairs of protocols given below, MPPSC State Forest Service Examination 2014
both the protocols can use multiple TCP 36. MAN stands for
connections between the same client and the (a) Machine Area Network
server. Which one is that? (b) Metropolitan Area Network
(a) HTTP, FTP (b) HTTP, TELNET (c) Metropolitan Asynchronous Network
(c) FTP, SMTP (d) HTTP, SMTP (d) Machine asynchronous Network
GATE 2015 (Shift-I) MPPSC State Forest Service Examination 2014
27. Which of the following transport layer 37. Which of the following has minimum
protocols is used to support electronic mail? transmission speed?
(a) SMTP (b) IP (a) Twisted pair wire (b) Fiber optic cable
(c) TCP (d) UDP (c) Coaxial cable (d) Microwave
GATE 2012 MPPSC State Forest Service Examination 2014
Communication & Network Concept 164 YCT
38. TCP/IP is an example of 47. The noise due to random behavior of charge
(a) Communication protocol carriers is:
(b) Networking protocol (a) Partition noise (b) Industrial noise
(c) Data transfer protocol (c) Shot noise (d) Flicker noise
(d) All options are correct NIELIT Scientists-B 04.12.2016 (IT)
MPPSC State Forest Service Examination 2014 48. Which of the following component is
39. In a computer network, which of the following responsible for network communication in a
is a connecting device? computer system?
(a) Router (b) Hub (a) UPS (b) Ethernet card
(c) Switch (d) All options are correct (c) SVGA card (d) SMPS
MPPSC State Forest Service Examination 2014 MPPSC State Forest Service Examination 2014
40. What is routing algorithm used by OSPF 49. Error correction can be done by using
routing protocol? (a) Hamming code
(a) Distance vector (b) Flooding (b) CRC
(c) Path vector (d) Link state (c) Framing
ISRO Scientist/Engineer 2014 (d) Two dimensional parity check
41. What is data encryption standard (DES)? MPPSC State Forest Service Examination 2014
(a) Block cipher (b) Stream cipher 50. _____ is a device that combines transmission
from various I/O devices into one line
(c) Bit cipher (d) None of the above
(a) Modifier (b) Multiplexer
UPPSC LT GRADE 29.07.2018
(c) Concentrator (d) Gateway
42. On what type of switching does internet work?
MPPSC State Forest Service Examination 2014
(a) Circuit (b) Bit
51. In communication satellite, multiple repeaters
(c) Packet (d) Line
are known as
UPPSC LT GRADE 29.07.2018 (a) Detector (b) Modulator
43. X.21 is (c) Stations (d) Transponders
(a) a method of determining which device has MPPSC State Forest Service Examination 2014
access to the transmission medium at any 52. ‘Communication protocol’ means
time
(a) Data transformation
(b) a method access control technique or multiple (b) Set of rules to communicate data from one
access transmission media machine to another machine
(c) very common but oriented at linked protocol (c) Transmission signals
issued to ISO
(d) None of these
(d) a network access standard for connecting
MPPSC State Forest Service Examination 2014
stations to a circuit switch network
53. A network using____ technique is called a
UPPSC LT GRADE 29.07.2018 store and forward network
44. Which of the following is contention free (a) Circuit switching
protocol ? (b) Message switching
(a) Pure Aloha (b) Ethernet (c) Packet switching
(c) Non-persistent CSMA (d) token Ring (d) Both (Circuit switching) and (Message
RPSC VPITI 2018 (CS) switching)
45. Encryption and decryption provide secrecy, or MPPSC State Forest Service Examination 2014
confidentiality, but not 54. File server is a _____ which is used to store
(a) Authentication (b) Integrity files received from various client machines
(c) Frames (d) All of these (a) Specialized computer system
RPSC ACF & FRO 23.02.2021 (CS) (b) Modem
46. The term UPnP protocol is a short form for: (c) Router
(a) Uniform Plug and Play (d) Transponder
(b) Unit Plug and Play MPPSC State Forest Service Examination 2014
(c) Useful Plug and Play 55. Encryption is a technique
(d) Universal Plug and Play (a) To design conceptual schema
APPSC Poly. Lect. 13.03.2020 (b) To translate global data
Communication & Network Concept 165 YCT
(c) To provide privacy of data 64. Use of IPSEC in tunnel mode results in
(d) To update database (a) IP packet with same header
MPPSC State Forest Service Examination 2014 (b) IP packet with new header
56. When a DNS server accepts and uses incorrect (c) IP packet without header
information from a host that has no authority (d) No changes in IP packet
giving that information, then it is called
ISRO Scientist/Engineer 2009
(a) DNS lookup
(b) DNS hijacking 65. In networking, UTP stands for
(c) DNS spoofing (a) Unshielded T- connector port
(d) None of the mentioned (b) Unshielded twisted pair
ISRO Scientist/Engineer 2016 (July) (c) Unshielded terminating pair
57. Bit stuffing refers to (d) Unshielded transmission process
(a) Inserting a '0' in user stream to differentiate it ISRO Scientist/Engineer 2009
with a flag 66. The address resolution protocol (ARP) is used
(b) Inserting a '0' in flag stream to avoid for
ambiguity (a) Finding the IP address from the DNS
(c) appending a nibble to the flag sequence (b) Finding the IP address of the default gateway
(d) Appending a nibble to the user data stream
(c) Finding the IP address that corresponds to a
ISRO Scientist/Engineer 2016 (July) MAC address
58. Dynamic routing protocol enable routers to:
(d) Finding the MAC address that corresponds to
(a) Dynamically discover and maintain routes
an IP address
(b) distribute routing updates to other routers
ISRO Scientist/Engineer 2009
(c) Reach agreement with other routers about the
network topology 67. SHA-1 is a
(d) All of the above (a) Encryption algorithm
ISRO Scientist/Engineer 2016 (July) (b) Decryption algorithm
59. Lightweight Directory Access Protocol is used (c) Key exchange algorithm
for (d) Message digest function.
(a) Routing the packets ISRO Scientist/Engineer 2009
(b) Authentication 68. Advanced Encryption Standard (AES) is based
(c) Obtaining IP address on
(d) Domain name resolving (a) Asymmetric key algorithm
ISRO Scientist/Engineer 2011 (b) Symmetric key algorithm
60. In which layer of network architecture, the (c) Public key algorithm
secured socket layer (SSL) is used?
(d) Key exchange
(a) physical layer (b) session layer
ISRO Scientist/Engineer 2009
(c) application layer (d) presentation layer
ISRO Scientist/Engineer 2011 69. Which one of these is characteristic of RAID 5?
61. Which network protocol allows hosts to (a) Dedicated parity
dynamically get a unique IP number on each (b) Double parity
bootup? (c) Hamming code parity
(a) DHCP (b) BOOTP (d) Distributed parity
(c) RARP (d) ARP ISRO Scientist/Engineer 2017 (May)
ISRO Scientist/Engineer 2016 (July) 70. which protocol suite designed by IETF to
62. The IEEE standard for Wi-Max technology is provide security for a packet at the Internet
(a) IEEE 802.16 (b) IEEE 802.36 layer?
(c) IEEE 812.16 (d) IEEE 806.16 (a) IPsec (b) NetSec
ISRO Scientist/Engineer 2011 (c) PacketSec (d) SSL
63. The network protocol which is used to get
ISRO Scientist/Engineer 2017 (May)
MAC address of a node by providing IP
address is 71. Physical topology of FDDI is?
(a) SMTP (b) ARP (a) Bus (b) Ring
(c) RIP (d) BOOTP (c) Star (d) None of the above
ISRO Scientist/Engineer 2011 ISRO Scientist/Engineer 2017 (May)
Communication & Network Concept 166 YCT
72. In networking terminology UTP means (d) Both 0 and 1 as No transition in the middle of
(a) Uniquitous Teflon port bit period
(b) Uniformly terminating port RPSC VPITI 2014 (IT)
(c) Unshielded twisted pair 79. A……… is used to interconnect two networks
(d) Unshielded T-connector port at data link layer
ISRO Scientist/Engineer 2017 (May) (a) Hub (b) Repeater
73. Which of the following protocol is used for (c) Bridge (d) Router
transferring electronic mail messages from one RPSC VPITI 2014 (IT)
machine to another? 80. In TCP/IP, network layer and transport layer
(a) TELENET (b) FTP provides……….Services respectively
(c) SNMP (d) SMTP (a) Only connectionless, Both Connectionless
ISRO Scientist/Engineer 2017 (May) and Connection Oriented
74. Match with the suitable one: (b) Both connectionless and Connection
Oriented, Only connectionless
List-I List-II
(c) Connectionless, Connection Oriented
(A) Multicast group 1. Distance vector
(d) Connection Oriented, Connectionless
membership routing
RPSC VPITI 2014 (IT)
(B) Interior gateway 2. IGMP
81. In…………., the error free frames received
protocol
following an erroneous frame are buffered and
(C) Exterior 3. OSPF only the oldest unacknowledged frame is
gateway protocol retransmitted by the sender.
(D) RIP 4. BGP (a) Go Back N
(b) Selective Repeat
(a) A-2, B-3, C-4, D-1 (b) A-2, B-4, C-3, D-1 (c) One bit Sliding Window Protocol
(c) A-3, B-4, C-1, D-2 (d) A-3, B-1, C-4, D-2 (d) All the above
ISRO Scientist/Engineer 2017 (May) RPSC VPITI 2014 (IT)
75. Which security service is not provided by 82. In point-to-Point Protocol (PPP), network layer
IPSec option are negotiated using
(a) Access control (a) Link Control Protocol
(b) Connectionless integrity (b) Dynamic Host Control Protocol
(c) Use authentication (c) Internet Protocol
(d) Rejection of replayed packets (d) Network Control Protocol
RPSC VPITI 2014 (IT) RPSC VPITI 2014 (IT)
76. …………. is a method of attacking a challenge- 83. In………., the sender starts transmitting the
response authentication system that uses the data as soon as it has data to send.
same protocol in both directions. (a) Pure ALOHA (b) slotted ALOHA
(a) Replay attack (c) persistent CSMA (d) Nopersistent CSMA
(b) Denial of Service Attack RPSC VPITI 2014 (IT)
(c) Masquerading 84. ………………routing algorithm suffers from
(d) Reflection Attack count-to-infinity problem
RPSC VPITI 2014 (IT) (a) Link State
77. An ATM cell has the payload field of (b) Flooding
(a) 53 bytes (b) 48 bytes (c) Distance Vector
(c) 64 bytes (d) 56 bytes (d) Reverse Path Forwarding
RPSC VPITI 2014 (IT) RPSC VPITI 2014 (IT)
78. Manchester Encoding, the data bit is 85. In Link State Routing,……………is employed
represented by to distribute the link state packets.
(a) 0 as high, 1 as low (a) Broadcasting
(b) Both 0 and 1 as transition in the middle of bit (b) Hierarchical Routing
period (c) Distance Vector Routing
(c) 0 as transition at the beginning of bit period, 1 (d) Flooding
as no transition RPSC VPITI 2014 (IT)
Communication & Network Concept 167 YCT
86. Which of the following is the character 96. Identify the components of intrusion detection
oriented protocol system :
(a) SDLC (b) HDLC (a) Analysis Engine (b) Alert Database
(c) BiSYNC (d) LAPB (c) Both (1) and (2) (d) None
RPSC Lect. 2014 RPSC VPITI 2018 (IT)
87. An open source port scanner used to determine 97. Which of the following uses UDP as the
open ports and basic vulnerabilities on the transport protocol?
network is:
(a) HTTP (b) SMTP
(a) nmap (b) netfind
(c) Telnet (d) DNS
(c) nslookup (d) nbtstat
RPSC VPITI 2018 (IT)
RPSC Lect. 2014
88. Which of the following is a four-wire Gigabit 98. The protocol used by TCP for connection
Ethernet implementation? establishment is
(a) 1000Base-SX (b) 1000Base-LX (a) Three way handshake
(c) 1000Base-T (d) 1000Base-CX (b) One way handshake
RPSC Lect. 2014 (c) Two way handshake
89. Which protocol is used to configure host (d) None
computers automatically for obtaining IP? RPSC VPITI 2018 (IT)
(a) DNS (b) HDLC 99. ISDN is an example of _______ network.
(c) ICMP (d) DHCP (a) Circuit switched
RPSC Lect. 2014 (b) Packet switched
90. Which statement is true for TCP and UDP (c) Electric switch
protocols?
(d) None
(a) TCP is connection-less and UDP is
RPSC VPITI 2018 (IT)
connection oriented
(b) TCP is unreliable and UDP is connection- 100. ______ provides a basic electronic mail
oriented transport facility.
(c) TCP is unreliable and UDP is reliable (a) TELNET (b) SNMP
(d) TCP is connection oriented and UDP is (c) SMTP (d) UDP
connection less RPSC VPITI 2018 (IT)
RPSC Lect. 2014 101. Transport layer protocol deals with
91. Which protocol is generally used to encrypt (a) Application to application communication
data between web browser and web servers? (b) Process to process communication
(a) IPSec (b) SSL (c) Node to Node communication
(c) PPTP (d) Digital Signature (d) None of above
RPSC Lect. 2014 RPSC VPITI 2018 (IT)
92. A RTP packet is encapsulated in ______
102. Default gateway is used for handling the
(a) a UDP user datagram (b) A TCP segment
request for route which is not present in
(c) an IP datagram (d) None of the above
(a) Topology table
RPSC Lect. 2014
(b) Routing table
93. In a real- time video conference, data from the
server is ____ to the client sites. (c) Neighbhour table
(a) Unicast (b) Multicast (d) Use for finding best path
(c) Broadcast (d) None of the above RPSC VPITI 2018 (IT)
RPSC Lect. 2014 103. Cell Relay, also known as
94. Routers communicate with each other and (a) ISDN (b) X.25
forward the packets base on _______ (c) ATM (d) Frame Relay
(a) MAC (b) IP Address RPSC VPITI 2018 (IT)
(c) Host name (d) Neighbour table 104. The secret key between members needs to be
RPSC VPITI 2018 (IT) created as a ______ key when two members
95. The DES algorithm has a key length of contact KDC.
(a) 128 bits (b) 32 bits (a) Public (b) Session
(c) 64 bits (d) 16 bits (c) Complimentary (d) None of these
RPSC VPITI 2018 (IT) RPSC VPITI 2018 (IT)
Communication & Network Concept 168 YCT
105. Network layer firewall works as a (a) Unicasting (b) Multicasting
(a) frame filter (c) Multiple unicasting (d) Broad casting
(b) packet filter TRB Poly. Lect. 2017
(c) both frame filter and packet filter 115. A router must have at least_____ NICs.
(d) None (a) 3 (b) 4
RPSC VPITI 2018 (IT) (c) 2 (d) 5
106. In cryptography, the order of the letters in a TRB Poly. Lect. 2017
message is rearranged by 116. Which one of the following is not a consumable
(a) transpositional ciphers resources?
(b) substitution ciphers (a) Interrupts (b) Signals
(c) both (a) and (b) (c) I/O devices (d) Messages
(d) None TRB Poly. Lect. 2017
RPSC VPITI 2018 (IT) 117. Which of the following OSI layers is between
107. Many packets present in the subnet degrades Data link layer and Transport layer?
the performance which leads to (a) Network layer (b) Session layer
(a) Congestion (b) Digestion (c) Presentation layer (d) Physical layer
(c) Ingestion (d) None UPPCL AE 18.05.2016
RPSC VPITI 2018 (IT) 118. Which of the following protocols uses port
108. In tunel mode IPsec protects the number 25?
(a) Entire IP packet (b) IP header (a) HTTP (b) POP3
(c) IP payload (d) None (c) FTP (d) SMTP
RPSC VPITI 2018 (IT) UPPCL AE 18.05.2016
109. When a packet is lost in transit, it should be 119. A packet has arrived with an M bit value of 0.
handled by ________ . Which of the following statements is true?
(a) error control (b) loss control (a) This is the first fragment
(c) sequence control (d) duplication control (b) This the last fragment
RPSC VPITI 2018 (IT) (c) This is the middle fragment
110. In serial communication, start and stop bits are (d) This is a fragmented packet
used for APPSC Poly. Lect. 13.03.2020
(a) Synchronization (b) Error detection 120. The Wireless Application Protocol (WAP) is :
(c) Error correction (d) None (a) A product of W 3C-World Wide Web
RPSC VPITI 2018 (IT) Consortium
111. The DMA transfers are performed by a (b) A data link layer of the OSI model
Control Circuit called as (c) Aims to ensure Interoperability among
(a) Device interface (b) DMA controller service providers
(c) Data controller (d) Overlooker (d) Incurs high overheads of protocol stack
RPSC VPITI 2018 (IT) UPSC Senior Scientific Officer Grade-II 16.07.2017
112. UDP socket is: 121. The transport layer protocols used for real
(a) Connection oriented socket time multimedia, file transfer, DNS and E-mail
(b) Connectionless socket respectively are
(c) Multicast socket (a) TCP, UCP, UDP and TCP
(d) Connection oriented and multicast socket (b) TCP, UDP, TCP and UDP
(c) UDP, TCP, UDP and TCP
TNPSC 2016 (Degree) P-II
(d) UDP, TCP, TCP and UDP
113. ______ is used to obtain the IP address of a
UPSC Senior Scientific Officer Grade-II 16.07.2017
host based on its physical address.
122. In a LAN network every system is identified by
(a) RARP (b) IPV6
(a) Name
(c) TFTP (d) TELNET
(b) MAC Address
TRB Poly. Lect. 2017
(c) IP Address
114. In which kind of communication, the
destination address in each packet is the same (d) Serial number given by manufacturer
for all duplicates? UPSC Senior Scientific Officer Grade-II 16.07.2017

Communication & Network Concept 169 YCT


123. Which of the following can be used for digital 133. The amount of uncertainty in a system of
fingerprint of a file? symbol is called:
(a) Netstart (b) Cryptcat (a) Bandwidth (b) Entropy
(c) Md5sum (d) All of these (c) Loss (d) Quantum
UPSC Senior Scientific Officer Grade-II 16.07.2017 Punjab PSC Lect. 2016 (IT)
124. Which is the most reliable topology 134. Poll/select line discipline requires.............. to
(a) Ring topology (b) Star topology identify the packet recipient?
(c) Mesh topology (d) Bus topology (a) Timer (b) Buffer
UPPCL AE 2014 (c) Address (d) Dedicated line
125. Which device creates big collision domain and Punjab PSC Lect. 2016 (IT)
one large broadcast domain 135. What is the destination address of a frame
(a) Switch (b) Bridge containing an ARP request?
(c) Router (d) Hub (a) A broadcast IP address.
UPPCL AE 2014 (b) A broadcast MAC address.
126. How many bits are in Header Checksum of (c) The default getaway IP address.
IPv4 datagram format (d) The default getaway MAC address.
(a) 16 (b) 2 Punjab PSC Network Engineer 21.06.2014
(c) 4 (d) 8 136. In OSI network architecture, the routing is
UPPCL AE 2014 performed by:
127. Which attack involves change in DNS entries (a) network layer (b) data link layer
so that users are directed to invalid site (c) transport layer (d) session layer
(a) Phishing (b) Masquerade Punjab PSC Network Engineer 21.06.2014
(c) Worm (d) Pharming 137. TCP-IP Model does not consist of following
UPPCL AE 2014 layers:
128. The encryption and compression are done by (a) Application layer (b) Physical layer
which layer (c) Session layer (d) Data link layer
(a) Session Layer (b) Application layer Punjab PSC Network Engineer 21.06.2014
(c) Transport Layer (d) Presentation Layer 138. BGP Routing Protocol is used following
UPPCL AE 2014 algorithm during it's execution:
129. To which IEEE family does WiMAX belong (a) Bellman Ford Algorithm
(a) 802.14 (b) 802.13 (b) Insertion Sort Algorithm
(c) 802.16 (d) 802.11 (c) Dijkstra Algorithm
UPPCL AE 2014 (d) Kruskal Algorithm
130. The scripting technologies not used at server Punjab PSC Network Engineer 21.06.2014
site is 139. Any electronic device on a network is called a:
(a) JSP (b) ASP (a) Node. (b) Hub.
(c) HTML (d) PHP (c) Router. (d) Cable.
UPPCL AE 2014 Punjab PSC Network Engineer 21.06.2014
131. Fibre distribution data interface (FDDI) does 140. Which piece of equipment installs in a PC and
not support which of the following allows the PC to connect to a network?
(a) data encoding/decoding (a) Hub.
(b) transmission media (b) Access Router.
(c) fault tolerant transmission (c) Graphic Accelerator Card
(d) media access control (d) Network Interface Card.
UPPCL AE 2014 Punjab PSC Network Engineer 21.06.2014
132. In the TCP/IP Protocol suite which one of the 141. The network area within which data packets
following is NOT part of the IP header? originate and collide is called a ......... ?
(a) Fragment Offset (a) Network segment
(b) Source IP address (b) Collision segment
(c) Destination IP address (c) Network domain
(d) Destination port number (d) Collision domain
RPSC ACF & FRO 23.02.2021 (CS) Punjab PSC Network Engineer 21.06.2014
Communication & Network Concept 170 YCT
142. Which of the following security solutions uses 151. DNS can obtain the .......... of host if its domain
the same key for both encryption and name is known and vice versa.
authentication? (a) Station address (b) IP address
(a) wpa (b) wpa 2 (c) Port address (d) Checksum
(c) WEP (d) 802.11i Punjab PSC Network Engineer 21.06.2014
Punjab PSC Network Engineer 21.06.2014 152. CSMA stands for:
143. A communication device that combines (a) Carrier Sense Multiple Access
transmissions from several I/O devices into one (b) Carrier Switch Multiple Access
line is a: (c) Carrier Switch Medium Access
(a) Concentrator (b) Modifier (d) Control Sense Multiple Access.
(c) Multiplexer (d) Adder Punjab PSC Network Engineer 21.06.2014
Punjab PSC Network Engineer 21.06.2014 153. A remote batch-processing operation in which
144. TCP/IP .......... layer corresponds to the OSI data is solely input to a central computer would
models to three layers. require a:
(a) Application (b) Presentation (a) telegraph line (b) simplex lines
(c) mixedband channel (d) All of the options
(c) Session (d) Transport
Punjab PSC Network Engineer 21.06.2014
Punjab PSC Network Engineer 21.06.2014
154. Which of the transport layer protocols is
145. Which of the following applications allows a
connectionless?
user to access and change remote files without
(a) UDP (b) TCP
actual transfer?
(c) FTP (d) SMTP
(a) DNS (b) FTP
Punjab PSC Network Engineer 21.06.2014
(c) NFS (d) Telnet
155. Which layers of the OSI determines the
Punjab PSC Network Engineer 21.06.2014 interface of the system with the user?
146. The data unit in the TCP/IP layer called a (a) Network (b) Application
......... (c) Data link (d) Session
(a) Message (b) Segment Punjab PSC Network Engineer 21.06.2014
(c) Datagram (d) Frame 156. The slowest transmission speeds are those of:
Punjab PSC Network Engineer 21.06.2014 (a) twisted-pair wire (b) coaxial cable
147. What is the full form of PING? (c) fiber-optic cable (d) Copper cable
(a) Packet Internet Groper Punjab PSC Network Engineer 21.06.2014
(b) Protocol Internet Groper 157. The standard suit of protocols used by the
(c) Packet Intranet Gateway Internet, Intranets, extranets and some other
(d) Protocol Internet Gateway networks.
Punjab PSC Network Engineer 21.06.2014 (a) TCP/IP (b) Protocol
148. Which of the following OSI layers correspond (c) Open system (d) Internet work processor
to TCP/IP's application layer? Punjab PSC Network Engineer 21.06.2014
(a) Application (b) Presentation 158. What can greatly reduce TCP/IP configuration
(c) Session (d) All of the options problems?
Punjab PSC Network Engineer 21.06.2014 (a) WINS Server (b) WINS Proxy
149. Devices on one network can communicate with (c) DHCP Server (d) PDC
devices on another network via a ......... . Punjab PSC Network Engineer 21.06.2014
(a) File Server (b) Router 159. Which of the following is used for modulation
and demodulation?
(c) Printer Server (d) Gateway
(a) Modem (b) Protocols
Punjab PSC Network Engineer 21.06.2014
(c) Gateway (d) Multiplexer
150. What is an SSID used for on a WLAN?
Punjab PSC Network Engineer 21.06.2014
(a) To secure the WLAN
160. Frames from one LAN can be transmitted to
(b) To manage the WLAN settings another LAN via the device:
(c) To identify the WLAN (a) Router (b) Bridge
(d) To configure the WLAN AP (c) Repeater (d) Switch
Punjab PSC Network Engineer 21.06.2014 Punjab PSC Network Engineer 21.06.2014
Communication & Network Concept 171 YCT
161. What terminates VPNs at a primary location? 171. IPv6 address is___________ bits long.
(a) Router (b) ASA (a) 16 (b) 32
(c) Head-end device (d) Software client (c) 64 (d) 128
Punjab PSC Network Engineer 21.06.2014 Punjab State Civil Supplies Corp. Ltd. 13.11.2011
162. What wizard in SDM can be used to assist in 172. Which layers of the OSI reference model are
choosing a VPN? host-to host layers?
(a) VPN Design Guide (a) Transport, session presentation, application
(b) IPSec Wizard (b) Session, presentation, application
(c) VPN Recommendation Guide (c) Datalink, transport, presentation, application
(d) IPSec Guide (d) Physical, datalink, network, transport
Punjab PSC Network Engineer 21.06.2014 ISRO Scientist/Engineer 2015
163. The network layer concerns with: 173. The DNS maps the IP addresses to
(a) bits (b) frames (a) A binary address as strings
(c) packets (d) none of the options (b) An alphanumeric address
Punjab PSC Network Engineer 21.06.2014 (c) A hierarchy of domain names
164. Which one of the following is not a function of (d) A hexadecimal address
network layer? ISRO Scientist/Engineer 2015
(a) routing (b) inter-networking 174. SSL is not responsible for
(c) congestion control (d) none of the options (a) Mutual authentication of client & server
Punjab PSC Network Engineer 21.06.2014 (b) Secret communication
165. RIP stands for: (c) Data integrity protection
(a) Routing Information Protocol (d) Error detection & correction
(b) Route Internet Protocol ISRO Scientist/Engineer 2007
(c) Router Information Protocol 175. Silly window Syndrome is related to
(d) Route Intranet Protocol (a) Error during transmission
Punjab PSC Network Engineer 21.06.2014 (b) File transfer protocol
166. IEEE 802.11 stands for: (c) Degrade in TCP performance
(a) Wireless LAN (b) Wired LAN (d) Interface problem
(c) Bluetooth technology (d) Wi-MAX ISRO Scientist/Engineer 2007
Punjab PSC Network Engineer 21.06.2014 176. Application frameworks provide a means for
167. RS- 232 is a standard that applies to? creating _______ hosted application using iDE.
(a) Parallel port (b) Serial port (a) PaaS (b) SaaS
(c) Game port (d) All of above (c) CaaS (d) All of the above
Punjab State Civil Supplies Corp. Ltd. 13.11.2011 GPSC Asstt. Prof. 30.06.2016
168. DNS servers translates web addresses or host 177. TCP groups a number of bytes together into a
name to: packet called ______
(a) MAC address (b) FTP address (a) Packet (b) Buffer
(c) IP address (d) Host Name (c) Segment (d) Stack
Punjab State Civil Supplies Corp. Ltd. 13.11.2011 GPSC Asstt. Prof. 30.06.2016
169. To host a web site which of following is 178. Communication offered by TCP is _____
required? (a) Full-duplex (b) Half-duplex
(a) Web Server (b) Exchange Server (c) Semi-duplex (d) Byte by byte
(c) Mail Server (d) Database Server GPSC Asstt. Prof. 30.06.2016
Punjab State Civil Supplies Corp. Ltd. 13.11.2011 179. The packet sent by node to the source to inform
170. ICANN is: it of congestion is called ______
(a) Name of internet corporation for assigned (a) Explicit (b) Discard
names & numbers to different domains (c) Choke (d) Backpressure
(b) Organization for setting up rules to operate GPSC Asstt. Prof. 30.06.2016
Internet 180. User datagram protocol is called connectionless
(c) Organization to provide security to services because ______
(d) For making network administration more (a) All UDP packets are treated independently by
manageable transport layer
Punjab State Civil Supplies Corp. Ltd. 13.11.2011 (b) It sends data as a stream of related packets
Communication & Network Concept 172 YCT
(c) It is received in the same order as sent order 184. The instrument that can be used to find the
(d) It sends data very quickly location of a cable short is termed as
GPSC Asstt. Prof. 30.06.2016 (a) Multimeter (b) CSU/DSU
181. Control of users' access to network resources (c) Protocol analyzer (d) TDR
through charges is the main responsibility of GPSC Asstt. Manager 13.12.2020 (IT)
________
185. Two network switches that do not support
(a) Reactive Fault Management
MDI-X need to be connected via copper
(b) Reconfigured Fault Management
cabling. The cabling method that needs to be
(c) Accounting Management
used is
(d) Security Management
(a) Straight (b) Rollover
GPSC Asstt. Prof. 30.06.2016
182. Open Shortest Path First (OSPF) is also called (c) Crossover (d) Loopback
as _____ GPSC Asstt. Manager 13.12.2020 (IT)
(a) Link state protocol 186. TPM is an acronym for
(b) Error-correction protocol (a) Trusted Platform Mode
(c) Routing information protocol (b) Trusted Platform Module
(d) Border gateway protocol (c) Trusted Privacy Module
GPSC Asstt. Prof. 30.06.2016 (d) True Platform Module
183. Frame Relay does not provide flow or error
GPSC Asstt. Manager 13.12.2020 (IT)
control, they must be provided by the _____
187. The method used for transmitting IPV6 traffic
(a) Lower Level Protocol
over a IPV4 network is
(b) highest level protocol
(c) Upper Level Protocol (a) Subnetting (b) Tunneling
(d) Lowest level protocol (c) Supernetting (d) Contracting
GPSC Asstt. Prof. 30.06.2016 GPSC Asstt. Manager 13.12.2020 (IT)

ANSWER KEY
1. (a) 2. (a) 3. (a) 4. (b) 5. (d) 6. (d) 7. (b) 8. (d) 9. (d) 10. (a)
11. (d) 12. (d) 13. (a) 14. (d) 15. (a) 16. (b) 17. (d) 18. (d) 19. (d) 20. (d)
21. (d) 22. (c) 23. (c) 24. (a) 25. (a) 26. (d) 27. (c) 28. (c) 29. (c) 30. (c)
31. (c) 32. (c) 33. (b) 34. (d) 35. (c) 36. (b) 37. (a) 38. (d) 39. (d) 40. (d)
41. (a) 42. (c) 43. (d) 44. (d) 45. (b) 46. (d) 47. (c) 48. (b) 49. (a) 50. (b)
51. (d) 52. (b) 53. (b) 54. (a) 55. (c) 56. (c) 57. (a) 58. (d) 59. (b) 60. (d)
61. (a) 62. (a) 63. (b) 64. (b) 65. (b) 66. (d) 67. (d) 68. (b) 69. (d) 70. (a)
71. (b) 72. (c) 73. (d) 74. (a) 75. (c) 76. (d) 77. (b) 78. (b) 79. (c) 80. (a)
81. (b) 82. (b) 83. (a) 84. (c) 85. (d) 86. (c) 87. (a) 88. (c) 89. (d) 90. (d)
91. (b) 92. (a) 93. (b) 94. (b) 95. (c) 96. (c) 97. (d) 98. (a) 99. (a) 100. (c)
101. (b) 102. (b) 103. (c) 104. (b) 105. (b) 106. (a) 107. (a) 108. (a) 109. (c) 110. (a)
111. (b) 112. (b) 113. (a) 114. (b) 115. (c) 116. (c) 117. (a) 118. (d) 119. (b) 120. (c)
121. (c) 122. (c) 123. (c) 124. (c) 125. (d) 126. (a) 127. (d) 128. (d) 129. (c) 130. (c)
131. (b) 132. (d) 133. (b) 134. (c) 135. (b) 136. (a) 137. (c) 138. (c) 139. (a) 140. (d)
141. (d) 142. (c) 143. (c) 144. (a) 145. (c) 146. (d) 147. (a) 148. (d) 149. (d) 150. (c)
151. (b) 152. (a) 153. (b) 154. (a) 155. (b) 156. (a) 157. (a) 158. (c) 159. (a) 160. (b)
161. (c) 162. (a) 163. (c) 164. (d) 165. (a) 166. (a) 167. (b) 168. (c) 169. (a) 170.(a)
171. (d) 172. (a) 173. (c) 174. (d) 175. (c) 176. (b) 177. (c) 178. (a) 179. (c) 180.(a)
181. (c) 182. (a) 183. (c) 184. (d) 185. (c) 186. (b) 187. (b)

Communication & Network Concept 173 YCT


07.
NETWORK SECURITY AND
MALICIOUS ATTACKS
Network Security Authentication and Authorization:
(i) Authentication– Authentication is a process of
The security provided to the computer and network
verifying or identifying user or information with its help
to protect against unauthorized access and risk is called the identity of the data or user is verified.
network or computer security. Network or computer can There are several methods of authentication:
be kept secure by using some process or software– (i) Username and Password
(i) Antivirus (ii) Biometrics
(ii) Firewall (iii) OTP (One time password)
(iii) Authentication and Authorization (ii) Authorization– Authorization is to verify the
(iv) Cryptography rights of the user. This process is done after
Protecting computer systems from viruses authentication. In authorization the rights of the user are
checked.
and malicious Attacks–
Cryptography:
A malicious attack is an attempt to forcefully access
Cryptography is a technique through which
someone's computer using computer viruses, phishing or information and communication are kept secure. In this,
other techniques like spamming, social media etc. it is coded in such a way that only the recipient can
Computer virus is a type of malicious computer understand the data or message.
program of software that can damage and destroy The word cryptography is derived from the Greek
computer files. word Kryptos and Graphene. Krypto means hidden and
Following some security practices can help you Graphene means- writing.
reduce the risks and protect computer systems from In cryptography, the data or message is converted
viruses and malicious attacks- into an unreadable secret code called cipher text and this
data can be read only by those who have the secret key to
Antivirus decrypt it. Decrypted data is called plain text.
Antivirus is a software tool that is used to detect and Cryptography is completed in two process:
remove or prevent malicious software (malware). (i) Encryption
Antivirus software protects your computer from malware (ii) Decryption
and cyber criminals (hackers). It is used to remove and
repair malicious web pages, files, software applications
etc.
We can protect our computer system by installing
and using antivirus from malicious software like (i) Encryption– The process of converting data
malware viruses and hackers etc. Antivirus software plain text into cipher text is called encryption. This is a
prevents, detects & removes malicious software (like technique whose code cannot be easily understood by an
worms, virus) from a side variety of threats, cyber unauthorized person because a key is needed to decrypt
criminals. it.
Some of the main antivirus software are– (ii) Decryption– Converting cipher text back to
(i) Norton plain text is called decryption.
(ii) McAfee Types of Cryptography– There are two types of
cryptography:
(iii) AVG
(a) Symmetric Cryptography– In this type of
(iv) Quick Heal
cryptography, the same key is used to encryption
(v) PANDA and decryption of data.
(vi) Microsoft Security Essentials (b) Asymmetric Cryptography– In this cryptography,
(vii) Avast public key is used for encryption and private key is
(viii) Avira used for decryption.
Network Security and Malicious Attacks 174 YCT
Keep Software Updated: • Source or destination based blocking of incoming
Install software patches on your computer so network traffic firewalls block the incoming traffic by
attackers do not take advantages of known looking into the source of the traffic.
vulnerabilities. Consider enabling automatic updates, • Outgoing network traffic can be blocked based on the
when available. source or destination that means firewalls can also
Avoid Using Public Wi-Fi : filter data between your internal network and internet.
Unsecured Public Wi-Fi may allow an attacker to • Block network traffic based on content.
intercept your device's network traffic and gain access to (ii) Preventing Hacks– Firewalls keep hackers out of
your personal information. your data, emails, computer system and other
sensitive information.
Backup and Restoring Data :
(iii) Promotes Privacy– Having a firewall keeps the data
Any data that you want to protect against loss or
safe and builds an environment of privacy that is
damage can be unsaved as backup data. The meaning of
trustworthy and a system without a firewall is
backup is to make a copy of lost data. Backup means
accepting every connection into the network from
"You keep a copy of your data or information in a
anyone.
location other than the original" so that if the data is
Type of Firewall:
deleted or corrupted from the original source the data can
be retrieved (recovered) again from the data kept at that A firewall is usually classified in two types–
other location. (i) Packet Filter Firewall
Restoring data is the process of copying backup data (ii) Proxy Based Firewall
from secondary storage and restoring it to its original (i) Packet Filter Firewall– It is used as a packet
location or new location. filter. It can forward or block packets based on the
information in the network layer and transport layer.
Firewall :
A packet filtering firewall can block particular host
A firewall is a network security device that prevents
from accessing the Network.
unauthorized access to personal data on your computer
These type of firewall monitors network traffic and
from outsiders by filtering network traffic. Along with
filters incoming packets based on configured security
blocking unwanted traffic it also protects your computer
from getting infected by blocking malicious software. rules.
They also monitor outgoing and incoming packets.
This firewall is also known as a static firewall. These
types of firewalls do not prevent web based attacks.
(ii) Proxy Firewall– A proxy firewall sometimes
called an application gateway, which stands between the
two computer. Customer computer and the corporation
computer. A proxy firewall filters or operate at the
application layer.
There are some other firewalls
• Stateful inspection Firewalls
Firewall also prevents the virus from a system to
another system. It acts as a wall between the computer • Next-Generation Firewalls
and the network/internet or in other word we can say a • Circuit Level Gateways
firewall typically establishes a barrier between a trusted • Cloud Firewall
network and untrusted network, such as the internet. Advantages of Network Firewall
Utility of Firewalls (1) Halt Hacking
(i) Monitoring Network Traffic– Monitoring of (2) Stop Viruses
network traffic involves the following security (3) Better Security
measures– (4) Increasing Privacy

Network Security and Malicious Attacks 175 YCT


Network attack There are some different type of malware–
(1) Computer Virus
Hacker and its Type :
(2) WORM
Hacker are those person, who have good knowledge
(3) Trojan Horse
in the world of computer science. Who are well versed in
(4) Back Door
computer programming and network. Hacker can control
(5) Spyware
anyone's computer system through internet even by
(6) Adware
sitting remotely, such as access data, stealing data,
1. Computer Virus– A computer virus is a type of
deleting data etc.
malicious computer program that can damage and
Types of Hackers–
destroy computer files or data.
(1) White Hat Hacker/Ethical Hacker
It is a special type of code or program created by
(2) Black Hat Hackers programmers. Through a computer virus the data of any
(3) Gray Hat Hackers computer can be stolen, destroyed and the computer can
(4) Red Hat Hackers be taken under its control. It can reduce the capacity of
1. White Hat Hacker– White Hat Hackers are the system disc by entering the boot sector. Virus is
known as Ethical Hackers. Ethical Hackers do hacking transmitted to the computer through internet, pen derive,
only after getting permission by the owner of the system storage disc etc.
with good motives. They do completely legal work only. Computer virus is divided into different type:
This type of Hackers are employed by businesses and (a) Boot Sector Virus– It is a type of virus that
government agencies as data security analysts, security infects the boot sector or the master boot record (MBR)
specialists etc. of the hard disc.
2. Black Hat Hacker– These type of hacker use It infects the file that starts the operating system. It
their ability to perform illegal tasks. Such as stealing or spreads through removable media.
tampering with personal information and data of a (b) File Infector Virus– This virus is also known as
company or person's website or their computer. parasitic virus, it is associated with program files, such as
These type of hackers are criminals of cyber .com or .exe file. The main source of this virus are the
crime and they have a malicious motive and goal to game, world processor.
make money by stealing funds from online bank (c) Multipartite Virus– This type of virus can
accounts, stealing secret and data etc. infect both the boot sector and executable file. If this
type of virus attacks your system then your system is at
3. Grey Hat Hacker– Grey hat hackers are a blend
increased risk of cyber threat, that is data may be lost or
of both black hat and white hat activities.
breach and misuse.
Often, grey hat hackers will look for vulnerabilities
(d) Macro Virus– It is associated with an
in a system without the owner's permission or
application such as MS word or excel. This virus starts
knowledge. If issues are found they will repeat them to
running automatically as soon as the application is
the owner. However this type of hacking is still
opened.
considered illegal because the hacker did not receive
2. WORM– Worm is a type of malware, which
permission from the owner prior to attempting to attack
spreads from one computer to another by making a copy
the system.
of itself and occupies the memory.
4. Red Hat Hacker– These types of hackers work to 3. Trojan Horse– A Trojan horse is a malware
prevent government agencies, top secret centers and program that looks like other software or programs such
cybercrime. These hackers are a combination of both as games etc. but its effects are terrible when run it. It
black and white hat. can be used by a hacker to break the password or access
Malicious Software : Malware & Virus the data of hard disc.
Malware– Malware is a malicious software or Trojan horse spreads through downloading software
program designed to damage computer servers or from website or legimate looking emails and files
networks without the knowledge of a computer user. attached to emails.

Network Security and Malicious Attacks 176 YCT


4. Back Door– Back door is a type of malware like (4) Maintaining Access
a Trojan. It is used by the attacker to gain unauthorized (5) Clearing Track
remote access to the PC.
5. Spyware– Spyware is a type of malware program
that steals data by sending it to the user's system without
his knowledge.
It monitors your computer when it is connected to
the internet and your (user) system is completely under
the control of the hacker.
It monitors user's activity on internet and transmits
that information in the background to someone else.
6. Adware– This is a type of advertising malware
software or program, which will suddenly appear in the 1. Reconnaissance– This is the first step of
form of pop-up window (in the form of a text message) Hacking, also known as the footprint or information
or banner and ask you to click, but after clicking this gathering phase. This is the preparatory phase where we
malware starts downloading. collect as much information as possible about the target.
Before launching an attack, the attacker collects all the
necessary information about the target footprint collects
data from TCP, UDP, IP and Host Network Area.
There are two types of foot printing:
Spam : (i) Active
Spam is unsolicited e-mail or message sent through (ii) Passive
the internet. It is difficult to identify the sender of spam
(i) Active– Directly interacting with the target to gather
because it is anonymous. It is mostly used for
information about target directly using Nmap tool to
advertising.
scam.
Hacking : (ii) Passive–Trying to collect information without
Hacking is the process of gaining unauthorized directly accessing the target in anyway.
access to computer network security systems for some 2. Scanning– This is the second phase of hacking.
legal or illegal purpose. This process is done by a hacker. In this phase hackers try to find different ways to get
Hackers do some hacking by making or using information of system such as information of user's
software programs like malware, virus, worm and by account, IP address etc.
transmitting it to the user's. In this phase, three types of scanning are involved:
Ethical Hacking : (i) Port scanning
Ethical hacking involves hackers who do hack into a (ii) Vulnerability scanning
system with prior permission to find out vulnerabilities (iii) Network mapping
so that they can be fixed before a person with malicious 3. Gaining Access– In this phase, Hackers gains
intent find them. This procedure is called ethical access to the system, applications network and escalates
hacking. Ethical hacking is completely legal. their user privileges to control the system connected to it.
Phases of Ethical Hacking– In this phase, hacker will connect to the network. This
To find such vulnerabilities, ethical hackers will allow hacker to launch more powerful attacks and
undertake several phases of the ethical hacking get more accurate information.
methodology. 4. Maintain Access– Once a hacker has gained
These phases are– access, they want to keep that access for future
(1) Reconnaissance exploitation and attacks. Here, the hacker secure access
(2) Scanning to the organizations Rootkits and Trojans and uses it to
(3) Gaining Access launch additional attacks on the network.

Network Security and Malicious Attacks 177 YCT


5. Clearing Tracks– Once the hacker gains access, Important Facts
they cover their tracks to escape the security personal.
• Creeper is a first computer virus.
1. Threat– A cyber security threat is a malicious act • Brain is a first boot sector virus for MS DOS (PC).
that seeks to damage data, steal data etc. • Malware is a Malicious Software.
2. Salami Attack– It is financial crimes. • Phishing is a fraudulent attempts to obtain bank
3. Multipartite Virus– Hybrid of program virus and details such as credit/debit card and password details.
boot sector virus. • Firewall can be a software program or a hardware
device that filters all data packets coming through the
4. Plagiarism– Stealing the ideas or creations of
internet network.
others. • Cross site scripting attack allows attacker's to inject
5. Polymorphic Virus– It is a form of malware that client side script into web pages.
"Mutates" as it propagates to make is more difficult • The main purpose of the Data Protection Act is to
to detect and block. protect personal privacy.
6. Deep Inspection Firewall– It makes filtering • A Malware that secretly collects information about
users without their consent is called spyware.
decisions based on application payload.
• Virtual Private Network (VPN) allows remote
7. Trojan-Horse– Legimate programs that allow workers to have secure access to their organization's
unauthorized access. network while using a public telecommunication
8. Denial-of-Service Attack– An attempt to slow infrastructure, such as the internet.
down or stop a computer system or network by • Possible security threat are information destruction,
information alteration, information release.
flooding the system with requests for information.
• Packet filters firewall works in the network layer of
9. Piracy– Piracy refers to unauthorized duplication of
OSI Model.
copyrighted content that is the sold at substantially
• State full Firewall and stateless firewall enumerates
lower prices. the two subcategories of the standard network layer
10. Public Key– In public key, two keys are used for firewall.
encryption and decryption. • Identity theft is the impersonation by as thief of
someone's identity for purpose of economic/social
11. Private Key– Same key is used for encryption and
gain.
decryption.
• Firewall is a software or Hardware used to isolate a
12. Firewall– It is hardware or software used to isolate private network form a public network.
a private network from public network. • SHA1 and MD5 are used to generate a message
13. Cybercrime– Crime that involves a computer and digest by the network security protocols.
networks. • A packet filtering firewall can block some hosts from
accessing the network.
14. Avalanche Effect– A small change in either the
• IEEE 1394 (FireWire) is an interface standard for a
plain text or the key producing a significant change
serial bus for high-speed communications and real-
in the cipher text. time data transfer.
15. Substitution and Transposition– Generally used for • RSA Algorithm and Diffle-Hellman algorithm are
transforming plain text to cipher text. asymmetric algorithm.
16. DES– Data Encryption Standard (DES) encryption • Click Fraud is a type of cybercrime that occurs in
pay-per-click (PPC) online advertising.
algorithms is based on the Feistel structure.
• DES and public Key algorithm are combined to
17. SSL – Secure Socket Layer
speed up encrypted message transmission and to
18. Brute Force Attack– Try to determine the key by ensure higher security by using different key for each
attempting all possible keys. transmission.
Network Security and Malicious Attacks 178 YCT
Important Questions Asked in Previous Years Examinations
1. First computer virus is 14. Viruses can enter to computer as an
(a) Creeper (b) Sasser attachment of
(c) Blaster (d) I Love You (a) Images (b) Audio/Video files
2. The first boot sector virus for MS-DOS (PC) (c) Downloads (d) All of these
(a) Creeper (b) Brain 15. What are types of malware?
(c) Blaster (d) Sasser (a) Caterpillars (b) WORM
3. McAfee is a example of _____ (c) Lions (d) Horses
(a) Quick Heal (b) Malware UPPSC Computer Asst. 23.08.2020
(c) Virus (d) Antivirus 16. The technique by which data is converted into
4. Malware is a type of _____ an encrypted form so that is cannot be easily
(a) Malicious software (b) Antivirus understood by an unauthorized person is
(c) Beware (d) Illegal ware called–
5. A person who hacks a computer is called? (a) Encryption (b) Modulation
(a) Hacker (b) Cracker (c) Decryption (d) Demodulation
(c) Human ware (d) Spyware 17. A malware that secretly collects information
6. Hackers who help to find bugs and about users without their consent is called:
vulnerabilities in a system with the permission (a) Spyware (b) Virus
of the owner of a computer system and do not
(c) Boot ware (d) Adware
intend to cause any harm to the system:
(a) Black Hat Hackers (b) White Hat Hackers UPPCL Accountant 10.02.2018
(c) Grey Hat Hackers (d) Red Hat Hackers 18. The deadlock- avoidance schemes like the
7. Such hackers who do cyber crime to gain banker's algorithm would lead to
financial profit are their main motive: (a) Increase overhead
(a) Black Hat Hackers (b) White Hat Hackers (b) Increase system throughput
(c) Grey Hat Hackers (d) Red Hat Hackers (c) More concurrent use of resources
8. Fraudulent attempts to obtain bank details (d) All of these
such as credit/debit card and password details RPSC ACF FRO 23.02.2021 (Comp. App./Sci.)
(a) phishing (b) spoofing 19. Which type of virus attaches with exe files and
(c) Hacking (d) Cracking the resulting infected exe file attacks other exe
9. ____ is software that helps a computer to detect files and infects them?
and avoid viruses UPPCL JE 2019 (Batch-2)
(a) Malware (b) Adware (a) Parasitic Virus
(c) Antivirus (d) Both (a) and (b) (b) Boot Sector Virus
10. ______ can be a software program or a (c) Stealth Virus
hardware device that filters all data packets (d) Memory Resident Virus
coming through the internet network:
20. Which mechanism is used by the computer
(a) Antivirus (b) Firewall
virus 'WORM' to duplicate itself?
(c) Cookies (d) Malware
(a) Swap (b) Increment
11. Process of converting plain text to unreadable
(c) Spawn (d) Swarm
text (cipher text) is:
(a) Decryption (b) Encryption 21. Computer virus affects
(c) Network security (d) Information Hiding (a) Software (b) Hardware
12. A program that copies itself: (c) Computer language (d) None of the above
(a) WORM (b) Trojan Horse 22. Computer virus is:
(c) Virus (d) BOMB (a) A chemical substance that attacks silicon
13. Which of the following is not a stand-alone (b) A micro-organism that destroys integrated
program? circuits
(a) Trojan (b) WORM (c) data that the computer cannot handle
(c) Virus (d) Spyware (d) A special type of computer program
UPPSC Computer Asst. 23.08.2020 SSC Section off. Exam 2007
Network Security and Malicious Attacks 179 YCT
23. Computer virus is 33. Viruses that run at the passage of time or on a
(a) a computer program that can copy itself particular date are called
(b) a virus that the health of humans (a) boot sector virus (b) time bomb
(c) both of the above (c) worm (d) none of these
(d) None of the above SBI (PO) 2008
MPPSC (Pre) G.S. Ist Paper 2012 34. The virus usually comes from the floppy disc
24. A computer virus is a left in the floppy disc drive.
(a) Hardware (b) software (a) Trojan horse (b) boot sector
(c) Bacteria (d) Freeware (c) script (d) logic bomb
RRB JE 2014 35. Which of the following category of viruses does
25. Computer virus is not replicate themselves?
(a) Malicious program (b) Useful program (a) worms (b) trojan horses
(c) Firewall (d) None of these (c) boot sector viruses (d) macro viruses
26. A type of cybercrime that occurs in pay per RRB JE Bhopal Paper-I (Shift-II), 28.08.2015
click online advertising when a person, 36. Which of the following is not a 'overwrite'
automated script of computer program virus?
imitates a legitimate user of a web browser (a) Trj. Reboot (b) Meve
clicking on an ad, for the purpose of generating (c) Way (d) Trivial.88.D
charge per click without having actual interest
RRB SSE (Shift-III) 01.09.2015
in the targets of the ad's link
37. Which of the following categories of viruses
(a) Phishing (b) Zombie
normally infect executable code, such as .com
(c) Click fraud (d) None of these
and .exe files.
RPSC VPITI 2014 (IT) (a) File infector viruses
27. Which of following is an antivirus?
(b) Boot sector viruses
(a) Code Red (b) Melissa
(c) Master boot record viruses
(c) Crypto Locker (d) Dr. Web
(d) Macro viruses
28. What is the other name for crackers, the
RRB JE (Shift-III) 28.08.2015
malicious hackers who infiltrate secure systems
38. What is the primary goal of an Ethical Hacker?
in order to steal information or cause image?
(a) Avoiding detection
(a) Black hats (b) Infliterer
(c) Pirates (d) Digital rouges (b) Testing security controls
29. Which of the following is not an antivirus (c) Resolving security vulnerabilities
software. (d) Determining return on investment for security
(a) Avira (b) Kaspersky measures
(c) McAfee (d) Firefox 39. What is the first phase of hacking?
30. One of the computer viruses that attracted (a) Maintaining access (b) Gaining access
widespread public attention was designed to (c) Reconnaissance (d) Scanning
infect MS DOS on 6 March 1992. The name of 40. Hacking for a cause is called
virus is: (a) Hacktivism (b) Black-hat hacking
(a) Brain (b) Catch me if you can (c) Active hacking (d) Activism
(c) Micalangilo (d) Friday the thirteenth 41. Abuse messaging system to send unsolicited is
31. Which of the following viruses generally found ______?
in the hard disk's root directory, but it keeps (a) Phishing (b) Firewall
on changing location? (c) Adware (d) Spam
(a) Trj. Reboot (b) Vienna 42. What is the system designed to prevent
(c) Way (d) Trival.88.D unauthorized access to or from a private
RRB JE (Shift-I) 02.09.2015 network called as ___
32. Which of the following viruses spreads via (a) Firewall (b) Digital
malicious emails (c) Biotech (d) Computer scam
(a) Trj-Reboot (b) Vienna 43. Packet filtering firewalls are vulnerable to ____
(c) Js. Fortnight (d) Trivial.88.D (a) Hardware vulnerabilities (b) Phishing
RRB SSE (Shift-II) 02.09.2015 (c) MiTm (d) Spoofing
Network Security and Malicious Attacks 180 YCT
44. _____ firewalls are a combination of other 53. Which of the following Malicious Software
three types of firewalls. creates new processes in an infinite loop?
(a) Stateful multilayer inspection (a) Boot Sector Virus
(b) Circuit level gateway (b) Memory Resident Virus
(c) Packet filtering (c) Stealth Virus
(d) Application level gateway (d) Fork Bomb
45. Advantage of stateful multilayer inspection
UPPCL-JE 31-01-2019 (Batch -01)
firewall is
54. Anti-virus software must be regularly updated
(a) complex internal architecture
else-
(b) large to manage but efficient
(a) New viruses wouldn't be recognized
(c) costlier but easy to understand
(b) None of these
(d) small to manage
(c) Software will become corrupt
46. Packet filtering firewall are:
(d) Both of these
(a) First generation firewalls
UPPCL Accountant 10-02-2018
(b) Second generation firewalls
(c) Third generation firewalls 55. Verification of a login name and password is
known as
(d) Fourth generation firewalls
(a) Configuration (b) Accessibility
47. Application layer firewalls are
(c) Authentication (d) logging in
(a) First generation firewalls
(b) Second generation firewalls UPPCL TG-2 26.06.2016
(c) Third generation firewalls 56. Which of the following types of attack allows
(d) Fourth generation firewalls attackers to inject client side script into web
pages?
48. Which of the following refers to stealing one's
idea or invention of others and use it for their (a) Cross Client Scripting
own benefits (b) Cross Site Scripting
(a) Piracy (c) Cross Server Scripting
(b) Plagiarism (d) Cross Sort Scripting
(c) Intellectual property rights UPPCL JE 2019 (Batch-01)
(d) All of the above 57. We categorise cyber-crimes in two ways, that is
49. Which of the following is not an example of _____.
Malware? (a) crime committed in i) the real world and ii)
(a) Worm (b) Trajan Horse the computer world
(c) Virus (d) Browser (b) crime committed through i) the WWW and
50. Which of the following is the cyber security ii) the internet
goals. (c) crime committed in i) cyberspace and ii) the
(a) Protect the confidentiality of data real world
(b) Promote the availability of data for authorized (d) crime committed where i) a computer is a
users target and ii) where a computer is a weapon
(c) Preserve the integrity of data UPPCL ARO 13-09-2018
(d) all above 58. A malware that secretly collects information
51. Which of the following is not a valid category about users without their consent is called -
of computer viruses? (a) Spyware (b) Virus
(a) Macro viruses (c) Bootware (d) Adware
(b) Trojans UPPCL Accountant 10-02-2018
(c) Memory resident viruses 59. Which of the following allows remote workers to
(d) Interrupts have secure access to their organization's
RRB SSE (Shift-II), 01.09.2015 network while using a public telecommunication
52. Which of the following malwares is used by an infrastructure, such as the Internet?
attacker to get unauthorized remote access to a (a) Intrusion detection system
PC by exploiting security vulnerabilities? (b) VPN
(a) logic bomb (b) back door (c) Wingate
(c) Poverty (d) Self-replicating (d) Shoulder surfing
UPPCL JE 2019 (Batch-01) UPP Computer Operator 21-12-2018 (Batch-02)
Network Security and Malicious Attacks 181 YCT
60. Which of the following is possible security threat? 68. Which of the following is not a factor in
(a) Information destruction choosing a firewall?
(b) Information alteration (a) The applications that your network uses
(c) Information release (b) Information in your security policy
(d) All of the above (c) How much traffic will pass through the firewall
UPPSC LT GRADE 29.07.2018 (d) Security audit measures in place
61. Salami attack is for Punjab PSC Network Engineer 21.06.2014
(a) website defacement 69. Which of the following types of firewall works
in the network layer of the OSI Model?
(b) controlling the website
(a) Packet filters
(c) financial crimes
(b) Application gateways
(d) Internet time theft
(c) Circuit level gateways
UPPSC LT GRADE 29.07.2018
(d) Both application level and circuit level gateways
62. What is multipartite virus?
APPSC Lect. Degree College 16.09.2020
(a) Hybrid of macro virus and stealth virus
70. Which of the following options correctly
(b) Hybrid of virus and worms enumerates the two subcategories of the
(c) Hybrid of ActiveX and Java control standard network layer firewall?
(d) Hybrid of program virus and boot sector virus (a) Bit-oriented firewall and byte-oriented
UPPSC LT GRADE 29.07.2018 firewall
63. The main purpose of the Data Protection Act is to (b) State full firewall and stateless firewall
(a) protect personal privacy (c) Frame firewall and packet firewall
(b) prevent viruses (d) Static firewall and dynamic firewall
(c) increase the security of computer systems APPSC Lect. Degree College 16.09.2020
(d) reduce project failures 71. Which of the following is not correct?
UPPSC LT GRADE 29.07.2018 (a) Platform security demands data decryption
64. Which of the following represents stealing the (b) Platform security demands strict password
ideas or stealing the creations of others? policies
(a) Plagiarism (c) Platform security demands fault tolerant
external firewalls
(b) Intellectual Property Rights
(d) Platform security demands system trust
(c) Piracy
certificate
(d) All of the above
TNPSC 2016 (Degree) P-II
UPPSC LT GRADE 29.07.2018 72. Trojan-Horse programs:
65. ________ monitors user’s activity on Internet
(a) Are legitimate programs that allow
and transmits that information in the unauthorized access
background to someone else.
(b) Are hacker programs that do not show up on
(a) Malware (b) Spyware the system
(c) Adware (d) None of the above (c) Are really do not work usually
UPPSC LT GRADE 29.07.2018 (d) Are usually immediately discovered
66. A portion of the polymorphic virus, generally TNPSC 2016 (Degree) P-II
called a ______, creates a random encryption 73. A Trojan horse is a:
key to encrypt the remainder of the virus. (a) Special password that is built into the system
(a) polymorphic engine (b) multiple engine firmware
(c) mutual engine (d) mutation engine (b) Computer virus that spreads through email
UPPSC LT GRADE 29.07.2018 (c) Program that does something beyond its
67. Which of the following makes filtering apparent purpose
decisions based on application payload? (d) Program that shut down if its initial condition
(a) Packet filter are not met
(b) deep inspection firewall TNPSC 2016 (Degree) P-II
(c) reverse proxy 74. Spam is:
(d) stateful packet inspection firewall (a) antivirus (b) unsolicited e-mail
TRB Poly. Lect. 2017 (c) Firewall (d) Hardware device
Network Security and Malicious Attacks 182 YCT
75. Identity theft is the (c) Bit independence effect
(a) impersonation by a thief of someone with a (d) Avalanche effect
large bank account UPSC Poly Lect. 10.03.2019
(b) impersonation by a thief of someone with 83. Using public key cryptography, X adds a
computer skills digital signatures o to a message M, encrypts
(c) impersonation by a thief of someone with Mσ and sends it to Y, where it is decrypted.
good credit
(d) Impersonation by as thief of someone's Which one of the following sequence of keys is
identity for purpose of economic/social gain use for operations?
Punjab State Civil Supplies Corp. Ltd. 13.11.2011 (a) Encryption: Xs private key followed by Y’s
76. An attempt to slow down or stop a computer private key. Decryption: X’s public key
system or network by flooding the system with followed by Y’s public key
requests for information is called a (b) Encryption: X’s private key followed by Y’s
(a) virus public key; Decryption: X’s public key
(b) worm followed by Y’s private key
(c) denial-of-service attack (c) Encryption: X’s private key followed by Y’s
(d) Trojan horse public key; Decryption: Y’s private key
Punjab State Civil Supplies Corp. Ltd. 13.11.2011 followed by X’s public key
77. Which of the following would best fit the (d) Encryption: X’s public key followed by Y’s
following description - Software in copied and private key, Decryption: Y’s private key
given to a friend without the permission of the ISRO Scientist/Engineer 17.12.2017
copyright owner? 84. Which of the following are used to generate a
(a) freeware (b) piracy message digest by the network security
(c) shareware (d) public domain protocols?
Punjab State Civil Supplies Corp. Ltd. 13.11.2011 (P) SHA-256
78. The private key in public key encryption is (Q) AES
used for (R) DES
(a) encryption (b) hashing (S) MD5
(c) decryption (d) encryption and hashing (a) P and S only (b) P and Q only
APPSC Lect. Degree College 07.06.2017 (CS) (c) R and S only (d) P and R only
79. Public key encryption makes use of ISRO Scientist/Engineer 17.12.2017
(a) one key (b) two keys 85. Which of the following operations are generally
(c) hash function (d) All the given options used for transforming plain text to cipher text?
APPSC Lect. Degree College 07.06.2017 (CS) (a) substitution
80. a firewall is (b) transposition
(a) an established network performance reference (c) substitution and transposition
point (d) normalisation
(b) software or hardware used to isolate a private APPSC Lect. 2017 (Degree College) (CS)
network from a public network 86. A packet filtering firewall can
(c) a virus that infects macros (a) deny certain users from accessing a service
(d) a predefined encryption key used to encrypt
(b) block worms and viruses from entering the
and decrypt data transmissions
network
APPSC Lect. Degree College 07.06.2017 (CS)
(c) disallow some files from being accessed
81. It is a program of hardware device that filters
through FTP
the information coming through an internet
(d) block some hosts from accessing the network
connection to a network or computer system.
(a) anti virus (b) Cookies ISRO Scientist/Engineer 2013
(c) Firewall (d) Cyber safety 87. Which of the following encryption algorithms
is based on the Fiestal structure?
TANGEDCO AE 2018
(a) Advanced Encryption Standard
82. A small change in either the plaintext or the
key producing a significant change in the (b) RSA public key cryptographic algorithm
ciphertext is called: (c) Data Encryption Standard
(a) Feistel effect (d) RCA
(b) Claude Shannon effect ISRO Scientist/Engineer 2013
Network Security and Malicious Attacks 183 YCT
88. IEEE 1394 is related to (a)
Dictionary attack
(a) RS-232 (b) USB (b)
Man in middle attack
(c) Firewire (d) PCI (c)
Brute force attack
ISRO Scientist/Engineer 2013 (d)
Timing attack
89. With respect to security, SSL stands for: APPSC Lect. Degree College 16.09.2020
(a) Secure Service Layer 95. What is one advantage of setting up a DMZ
(b) Synchronous Socket Layer (Demilitarized Zone) with two firewalls?
(c) Secure Socket Layer (a) You can control where traffic goes in the
(d) Synchronous Service Layer three networks
APPSC Lect. Degree College 16.09.2020 (b) You can do stateful packet filtering
90. The art and science of concealing the messages (c) You can do load balancing
to introduce secrecy in information security is (d) Improve network performance
recognized as : ISRO Scientist/Engineer 22.04.2018
(a) Scientometrics (b) Cryptography 96. Which one of the following algorithm is not
(c) Biography (d) Information forensics used in asymmetric key cryptography?
APPSC Lect. Degree College 16.09.2020 (a) RSA Algorithm
91. The encryption process where same keys are (b) Diffie-Hellman Algorithm
used for encrypting and decrypting the (c) Electronic Code Book Algorithm
information is known as _____ encryption.
(d) None of the above
(a) Symmetric Key (b) Asymmetric Key
ISRO Scientist/Engineer 22.04.2018
(c) Linear (d) Tertiary Key
97. Which of the following is a cybercrime
APPSC Lect. Degree College 16.09.2020
(a) Hacking
92. Which of the following is NOT an example of
(b) Worm attack
symmetric key encryption?
(c) Virus attack
(a) Digital encryption standard (DES)
(b) Triple-DES (3DES) (d) All of them
(c) RSA RPSC VPITI 2014 (IT)
(d) BLOWFISH 98. DES and public key algorithm are combined
APPSC Lect. Degree College 16.09.2020 (i) to speed up encrypted message
93. A process whereby a message is encoded in a transmission
format that cannot be read or understood by (ii) to ensure higher security by using different
an eavesdropper is called: key for each transmission
(a) Steganography (b) Encryption (iii) as a combination is always better than
(c) Decryption (d) Multiplexing individual system
APPSC Lect. Degree College 16.09.2020 (iv) As it is required in e-commerce
94. In which of the following cases, does the (a) (i) and (ii) (b) (ii) and (iii)
attacker try to determine the key by attempting (c) (iii) and (iv) (d) (i) and (iv)
all possible keys? RPSC ACF & FRO 23.02.2021 (CS)

ANSWER KEY
1. (a) 2. (b) 3. (d) 4. (a) 5. (a) 6. (b) 7. (a) 8. (a) 9. (c) 10. (b)
11. (b) 12. (a) 13. (c) 14. (d) 15. (b) 16. (a) 17. (a) 18. (d) 19. (a) 20. (c)
21. (a) 22. (d) 23. (a) 24. (b) 25. (a) 26. (c) 27. (d) 28. (a) 29. (d) 30. (c)
31. (b) 32. (c) 33. (b) 34. (b) 35. (b) 36. (b) 37. (a) 38. (c) 39. (c) 40. (a)
41. (d) 42. (a) 43. (d) 44. (a) 45. (a) 46. (a) 47. (c) 48. (d) 49. (d) 50. (d)
51. (d) 52 (b) 53. (d) 54. (a) 55. (c) 56. (b) 57. (d) 58. (a) 59. (b) 60. (d)
61. (c) 62. (d) 63. (a) 64. (a) 65. (b) 66. (d) 67. (b) 68. (b) 69. (a) 70. (b)
71. (c) 72. (a) 73. (b) 74. (b) 75. (d) 76. (c) 77. (b) 78. (b) 79. (b) 80. (b)
81. (c) 82. (d) 83. (c) 84. (a) 85. (c) 86. (d) 87. (c) 88. (c) 89. (c) 90. (b)
91. (a) 92. (c) 93. (b) 94. (c) 95. (c) 96. (c) 97. (d) 98. (a)

Network Security and Malicious Attacks 184 YCT


08.
DATABASE MANAGEMENT SYSTEM
User– DB administrator, System developer & End users.
An Overview of the Database Database Application– Database application such as
Management Personal, Departmental, Enterprise and Internal.
A database is a collection of related data organised DBMS– Software such as MySQL, Oracle etc.
in a way that data can be easily accessed, managed and Database– Collection of logical data.
updated. Any piece of information can be a data. For Characteristics of DBMS–
example- Name of our college, institutions etc or in other • Uses a digital repository established on a server to
words, database is a place where related piece of store and manage the information.
information is stored and various operations are • Provides a clear and logical view of the process
performed on it.
Database– • It contains automatic backup and recovery procedures.
• The database is a collection of interrelated data • Reduce the complex relationship between data.
which is used to retrive, insert and delete the data • Help in support manipulation and processing of data.
more efficiently. Advantages of DBMS–
• It is used to organize the data in the form of a table, • Controlling data redundancy
schema, views and reports etc. • Elimination of inconsistency
For example– The college database organizes the • Better services to the users
data about the admin, staff, students and faculty etc. • Better flexibility
History of DBMS–
• Integrity is improved
• Database management system is software that is
used to manage the database. • Standards can be enforced
• DBMS also provides protection and securing to • Security can be improved
database and maintains data consistency in case of • Easy to retrieval of data
multiple users. Examples of DBMS are SQL server, • Reduce development time and maintenance need
MySQL, Oracle, Sybase, Microsoft Access and IBM • Segregation of application program
DB2 etc. Disadvantages of DBMS
• The first general purpose DBMS was developed by • Data redundancy and inconsistency
Charles Bachman in early 1960's. Edgar Codd
proposed a new data representation technique known • Difficulty in accessing data
as relational model. • Data Isolation
• DBMS allows users the following tasks– • Concurrent data anomalies
Data Definition– Used for creation, modification • Security problems
and removal of definition. • Integrity problems
Data Updating– Used for insertion, modification • Automicity problems
and deletion of actual data. • Complexity & costly
Data Retrieval– Used to retrieve the data from the • Large in size
database.
DBMS systems can be used extensively in the
User Administration– Used for registering and
monitoring users, maintain data integrity, enforcing following fields–
data security, performance monitoring, concurrency Transportation, Banking, Sales, Manufacturing,
control and recovering information corrupted by Education, Human resources etc.
unexpected failure. Architecture of DBMS
Components of Database System
It can be divided into four components– Database architecture can be seen as a single tier or
multi-tier. But logically, it is of two types, 2 tier
architecture and 3-tier architecture–

Database Management System 185 YCT


1. Tier Architecture– Here, the database is directly • RDBMS is a special system software that is used to
available to the user and any changes brought will manage the organization, storage, access, security and
directly affect the database itself. Generally it is integrity of data.
used for development of logical application. • It is a set of applications and features that allow. IT
2. Tier Architecture– It is same as basic client-server professionals and others to develop, edit, administer
and applications on the client end can directly and interact with relational database.
communicate with the database at the server side.
And API's, such a as ODBC, JDBC are used for this • The term "relational database" was invented by E.F.
interaction. Codd at IBM in 1970. He introduced the term in his
seminal paper "A Relational Model of Data for Large
• User interfaces and application programs are run on
the client side and server-side is responsible for Shared Data Banks".
providing functions such as query processing and • A relational DBMS stores information in a set of
transaction management. 'tables' and each of which has a unique identifier or
• And to communicate with the dbms, client side 'primary key'.
application builds a connection with the server side. • RDBMS is the organization of data stored in rows &
columns. Tuples are the rows of the records in the
given table and attributes are the columns headers of
the table.
Table– In RDBMS, a table is a collection of data
elements which is organised in terms of rows and
columns. It is also said to be a convenient representation
of relations.
Field– A table consists of many records (row) and
each record can be broken into several small-small
entities which is known as fields. In the below given
table Roll No., Name, Age, Gender represent Fields.

3-Tier Architecture–

• It contains another layer between the client and server


and her client can't directly interact with the server.
Record (Tuple)– A single entry in a table is called a
• The application on the client-end communicates with
record or row. It represents set of related data in a table.
an application server which further communicates
It is also called as tuple.
with the database system. This is generally used in
case of large web application. For example
• The full form of DBA is database administrator who 1 Suraj 21 Male
designs, implements, administers and monitors data Column– A column is a vertical entity in a table that
management systems and also ensures design, contains all information associated with a specific field
consistency, quality and security. in a particular table.
For example–
Relational Database
Name
Management System (RDBMS) Suraj
• A relational database management system (RDBMS) Rani
is a database management system (dbms) that is based
Tapasya
on the relational model which was introduced by E.F.
Codd of IBM's san Jose Research laboratory. Ravi

Database Management System 186 YCT


Null Value– A null value is the term used to There are some components of an E-R diagram.
represent a missing value and in a table it appears to be Entities– It is a real-world things which can be a
blank. person place or a concept etc. It is shown by a rectangle.
SQL Constraints– Constraints are basically used to Each entity has one of its attributes as a primary key
specify rules for the data in a table. It limits the type of which can define it uniquely and such an entity is known
data in a table and ensures the accuracy and reliability of as strong entity. And entities which cannot be defined
data in a table. uniquely is known as weak entity.
• If there occurs any violation between constraints and For examples– In school management system there
data action, then the action get aborted. There are can be Teachers, students, courses building, department
some integrity constraints which is commonly used in which are entities.
SQL (Structured query language). Strong Entity type is represented by rectangle
Not Null– It ensures column not be Null value. symbol while weak entity is represented by double
Unique– It ensures all the values to be different in a rectangle.
column. Student
Primary Key– Primary key is a combination of a Note– Entities along with attributes are called entity type
NOT NULL and UNIQUE. It identifies each row in a or schema.
table. Attributes– Properties of an entity or relationship
Foreign Key– It prevents action that ends links type is called as attribute. It is represented by an
between the tables. oval.
Check– It ensures that the values in a column For example– The entity car may have some
satisfies a specific condition. properties such as car-no, price, color etc.
Default– This sets a default value for a column if no (i) Simple Attributes– It is divided into two parts. An
value is specified. attributes composed of simple component with an
Create Index– It is used to create and retrieve data independent existence.
from the database. For example– Designation of an staff & salary.
Data Integrity– 'Data Integrity' refers to the
accuracy and consistency of data stored in a database or
rbdms.
Following categories of data integrity are there in
each RDBMS.
Entity Integrity– There must not be duplicate rows Composite Attributes– It is divided into many
in a table. parts.
Domain Integrity– It enforces valid entries for a An attribute composed of multiple component and
given column by restricting the type, format or the range each component has its own independent existence.
of values. For example– Name of a student can be divided
Referential Integrity– It ensures that the rows not further into First_name, Middle_name and
to be deleted which are used by other records. Last_name
User-Defined Integrity– It enforces some specific
business rules that do not fall into entity, domain or
referential integrity.
Database Normalization– It is a database schema
design technique by which an existing schema is
modified to minimize redundancy and dependency of
data. (ii) Single Valued– It is an attribute that holds a single
• In database normalization the word normalization and value for each occurrence of entity type.
normal form refers to the structure of a database and Example– Each branch has single valued attributes
normalization increases clarity in organizing data in is known as branch_no
database.
• Database normalization was developed by IBM
researcher E. F. Codd in the 1970s.
• Database normalization is obtained by following a set
of rules called 'forms' in creating the database.
ER Diagram– ER is a graphical representation of Multi Valued Attributes– It is an attributes that
the logical structure of the database. In this model real- holds multiple values for each occurrence of an
world problems are represented in a pictorial form to entity type. For example– Each staff members has
make understand the stakeholders. multiple mobile numbers
Database Management System 187 YCT
Database Design .

• In dbms, the database design is a collection of


processes that facilitate the designing, development,
implementation and maintenance of data.
• It helps in maintaining and improving data
(iii) Derived Attributes– The value of this attribute are consistency.
derived from some other attributes. This is done • The main objective of database design in DBMS are
mainly because the value for such attribute keeps on to produce logical and physical designs models of
changing and it is shown by dashed oval. the proposed database system.
Example– The value of age attribute is derived from Database Development Life Cycle–
the DOB (date of birth)
Age

Relationships– It is a set of meaningful relationship


among several entities.
• To indicate the diamond symbol for relationships • It has number of development life cycle which are
among the several entities it is read from left to followed during the development of database
right. system.
For example- Branch has a staff • It is not essential to follow the cycle in order and is
very simple. It does not require many steps.
Requirement Analysis
• Planning– Concerned with planning of entire
There are three types of relationships that exit
database life cycle.
between two entities.
One to One Relationship– In this relationship each • System Definition– Defines the scope and
record of one table is related to only one record of boundaries of the proposed database system.
the other table. Database Designing
For example– If there are two entities 'person' and Logical Model– Concerned with developing a database
'passport' therefore, each person can have only one model as per requirement and the entire design is
passport and each passport belongs to only one done on paper rather physical implementation.
person. Implementation
• Data Conversion and Loading– Concerned with
importing and converting data from old system into
the new database.
One to Many Relationship– The following • Testing– It checks the database against the
example showcases this relationship that requirement specifications and identify errors in
newly implemented system.
Manipulating Data .

1 student can opt for many courses but a course can • Manipulation of data is the modification of
only have 1 student, this is how it is. information to make it easer to read and more
Many to One Relationship– When more than one structured.
instances of an entity is associated with a single
instance of another entity then it is called many to •DML (Data Manipulation Language) is used to
one relationship. For example- Many students can manipulate data and it is a programming language
study in a single college but a student cannot study which helps in modifying data such as adding,
in many colleges at the same time. removing and altering databases.
•Data manipulation is a key feature for business
operations and optimization. Steps involved in Data
Manipulation
Many to Many Relationship– Followings are the steps in the data manipulation–
1. There must be some possible data to create a
database which is generated from the data sources.
The above diagram represents that one student can 2. Knowledge of restructuring and reorganization is
enroll for more than one courses and a course can required which is done with the manipulation of
have more than 1 students enrolled in it. data.
Database Management System 188 YCT
3. In this step then we need to import a database and • ease of use for developers
create it to start working with data. • lightning fast queries
4. Then we can edit, delete, merge or combine our
Types of NoSQL Databases
information with the help of data manipulation.
Document Databases: it stores data in documents
5. And at the end, analysis of data becomes easy at the similar to JSON (JavaScript Object Notation) objects.
time of manipulating data. Each document contains pairs of fields and values. The
Why to use data manipulation? values can typically be a variety of types including things
• To improve the growth of any business and like strings, numbers, booleans, arrays, or objects.
organization. Graph Databases: it stores data in nodes and
• Helps in organising raw data in a structured way edges. Nodes typically store information about people,
which boosts productivity, trend analysis, cutting places, and things, while edges store information about
cost and analyzing customer behaviour etc. the relationships between the nodes.
• DML-Data Manipulation Language in SQL Wide-column: it stores data in tables, rows, and
With the help of DML command we can easily dynamic columns.
access, store, modify, update and delete the existing Key-value Databases: These are a simpler type of
records from the database. database where each item contains keys and values.
Followings are the DML commands in SQL Various Factors to Use NoSQL:-
(i) SELECT Command– This command shows the ● Fast-paced agile development
records of the specified table and it also shows the ● Storage of structured and semi-structured data
particular record of a particular column by using the ● Huge volumes of data
clause WHERE. ● Requirements for scale-out architecture
Syntax– ● Modern application paradigms like microservices
and real-time streaming
Datatypes in MongoDB
• To retrieve the data from all the columns of the String- It is used to store data and it must be UTF 8
table, following SELECT commands is used- valid in mongodb.
SELECT * FROM table_Name; Integer- it stores numeric value and It can be 32 bit
INSERT Command– It allows users to insert data in or 64 bit depending on the server.
database tables. Double- it stores floating point values.
Syntax– INSERT INTO table_name (Col_name1, Arrays- it is used to store a list or multiple values
Col_name2, .....Col_NameN) into a single key.
VALUES(Val_1, Val_2, Val_3 ...... Val_N) Object- it is used to store a list or multiple values
into a single key.
UPDATE Command– It allows users to update or
Null- It is used to store null values.
modify the existing data in database tables.
Date-It stores the current date or time in unix time
Syntax– UPDATE table_name SET [Col_name1 =
format.
Value_1 .... Col_name N = Value_N] WHERE
MongoDB Compass-
CONDITION;
• It is based on GUI therefore ,it is also called as
DELETE Command– It allows user to remove single or
mongoDB GUI.
multiple existing records from the database tables.
• It allows users to analyze the content of their stored
Syntax–
data without any prior knowledge of MongoDB
DELETE FROM table_Name WHERE conditions query syntax. It is an open source.
NoSql database .
Components of the BI System
NoSQL Database is nothing but mongoDB. It is MongoDB Database: it is used to store data.
used to refer to a non-SQL or non relational BI Connector: It translates the SQLqueries and provides
a relational schema between BI tool and MongoDB.
database.Database doesn't use tables for storing
data. It is generally used to store big data and real- ODBC Data Source Name (DSN): It holds the
connection and authorization configuration data.
time web applications.
BI Tool: This tool is used for visualization and analysis
Followings are the advantages of NoSQL database-
of data.
• supports query language. Java MongoDB Connectivity-
• provides fast performance. It includes the following steps to connect with the
• provides horizontal scalability mongoDB database.
• flexible schemas 1. Create a Maven Project
Database Management System 189 YCT
2. Add dependency to POM file MongoDB Logical Operator
3. Create Java File $and- It works as a logical AND operation on an array.
4. Build Dependency to load JAR The array should be of one or more expressions and
5. Enter into Mongo Shell chooses the documents that satisfy all the expressions in
Php MongoDB Connectivity- the array.
• Php provides a mongodb driver to connect with the Syntax-
mongoDB database. { $and: [ { <exp1> }, { <exp2> }, ....]}
• It performs database operations by using PHP. $not- The $not operator works as a logical NOT on the
specified expression and chooses the documents that are
It includes the following steps to connect with the
not related to the expression.
mongoDB database.
Syntax-
1. Installing Driver
{ field: { $not: { <operator-expression> } } }
2. Edit php.ini File
$or- It works as a logical OR operation on an array of
3. Install mongo-php library
two or more expressions and chooses documents that
4. Create Php Script meet the expectation at least one of the expressions.
5. Execute Php Script Syntax-
6. Enter into Mongo Shell { $or: [ { <exp_1> }, { <exp_2> }, ... , { <exp_n> } ] }
Python MongoDB Connectivity $type- The type operator chooses documents where the
pymongo driver is installed to create connection between value of the field is an instance of the specified BSON
Python programming language and MongoDB database. type.
It includes the following steps: Syntax-
1. Install Driver { field: { $type: <BSON type> } }
2. Create Python File $jsonSchema- It matches the documents that satisfy the
3. Execute Python Script specified JSON Schema.
4. Enter into Mongo Shell Syntax-
5. Check Databases { $jsonSchema: <JSON schema object> }
6. Check Collection limit() Method in mongoDB–
7. Access records limit() method is used to limit the fields of document.
MongoDB Query and Projection Operator Syntax-
It includes comparison, logical, element, evaluation, db.COLLECTION_NAME.find().limit(NUMBER)
larray, bitwise, and comment operators. skip() method in mongoDB–
MongoDB Comparison Operators It is used to skip the documents and . It is used with
$eq- refers to equality condition find() and limit() methods.
Syntax- { <field> : { $eq: <value> } } Syntax-
$gt- it selects a document where the value of the field is db.COLLECTION_NAME.find().limit(NUMBER).skip(
greater than the specified value. NUMBER)
Syntax- { field: { $gt: value } } sort() method– sort() method is used to sort the
$gte- It selects the documents where the field value is documents in the collection.
greater than or equal to a specified value. Syntax-
Syntax- db.COLLECTION_NAME.find().sort({KEY:1})
{ field: { $gte: value } } MongoDB Create Database– mongoDB doesn't have a
$in- Choose the documents where the value of a field create database command.In SQL we used to create a
equals any value in the specified array. table and insert value manually but in mongoDB it
Syntax- creates automatically.
{ filed: { $in: [ <value1>, <value2>, ……] } } Drop Database– This command is used to drop a
$lt- The $lt operator opt for the documents where the database. It also deletes the associated data files and it
value of the field is less than the specified value. operates on the current database.
Syntax- Syntax–
{ field: { $lt: value } } db.dropDatabase()
$lte- It chooses the documents where the field value is 7.0 SQL
less than or equal to a specified value. • SQL is a short-form of the structured query language.
Syntax- • SQL is a standard language for storing, manipulating
{ field: { $lte: value } } and retrieving data in databases.
Database Management System 190 YCT
History of SQL:- Syntax-
• A Relational Model of Data for Large Shared Data IS NULL
Banks" was a paper which was published by the great SELECT column_names
computer scientist "E.F. Codd" in 1970. FROM table_name
• The IBM researchers Raymond Boyce and Donald WHERE column_name IS NULL;
Chamberlin developed the SEQUEL (Structured Syntax-
English Query Language) after learning from the IS NOT NULL
paper given by E.F. Codd. They both developed the
SELECT col_names
SQL at the San Jose Research laboratory of IBM
Corporation in 1970. FROM table_name
• SQL became a standard of the American National WHERE col_name IS NOT NULL;
Standards Institute (ANSI) in 1986, and of the AND, OR and NOT Operators–
International Organization for Standardization (ISO) • The WHERE clause can be combined with AND, OR,
in 1987 and NOT operators while the AND and OR operators
SQL SELECT Statement– It is used to select data from are used to filter records based on more than one
a database. condition.
Syntax- • The AND operator shows a record if all the conditions
SELECT col1, col2, ... separated by AND are TRUE.
FROM table_name; • The OR operator shows a record if any of the
SELECT DISTINCT statement- It is used to return conditions separated by OR is TRUE.
only distinct values. Inside a table, a column often • The NOT operator shows a record if the condition(s)
contains many duplicate values; and sometimes we only is NOT TRUE.
want to list the distinct values.
Syntax-
Syntax-
AND
SELECT DISTINCT col1, col2, ...
SELECT col1, col2, ...
FROM table_name;
FROM table_name
WHERE Clause-
WHERE condition1 AND condition2 AND condition3
• It is used to filter records and It is used to extract only
…;
those records that fulfill a specified condition.
Syntax-
• The WHERE clause is not only used in SELECT
statements, it is also used in UPDATE, DELETE, etc OR
Syntax- SELECT col1, col2, ...
SELECT col1, col2,... FROM table_name
FROM table_name WHERE condition1 OR condition2 OR condition3 ...;
WHERE condition; Syntax- NOT
SELECT UNIQUE- SELECT column1, column2, ...
• There is no difference between DISTINCT and FROM table_name
UNIQUE. WHERE NOT condition;
• SELECT UNIQUE statement is used to retrieve a ORDER BY Keyword
unique or distinct element from the table. • It is used to sort the result-set in ascending or
Syntax- descending order.
SELECT UNIQUE column_name • It sorts the records in ascending order by default. To
FROM table_name; sort the records in descending order, use the DESC
SELECT SUM- t is also known as SQL SUM() keyword.
function. And It is used in a SQL query to return the Syntax-
summed value of an expression. ORDER BY
Syntax- SELECT col1, col2, ...
SELECT SUM (exp) FROM table_name
FROM tables ORDER BY column1, column2, ... ASC|DESC;
WHERE conditions; INSERT INTO Statement- It is used to insert new
NULL Value- A field with a NULL value is a field with records in a table.
no value. And It is not possible to test for NULL values
Syntax-
with comparison operators, such as =, <, or <>.
INSERT INTO table_name (col1, col2, col3, ...)
Therefore,we will have to use the IS NULL and IS NOT
NULL operators instead. VALUES (val1, val2, val3, ...);
Database Management System 191 YCT
UPDATE Statement- • INNER JOIN: it returns records that have matching
• The UPDATE statement is used to modify the existing values in both tables
records in a table. • LEFT OUTER JOIN: it returns all records from the
• The WHERE clause specifies which record(s) that left table, and the matched records from the right table
should be updated. If we omit the WHERE clause, all • RIGHT OUTER JOIN: it returns all records from
records in the table will be updated. the right table, and the matched records from the left
Syntax- table
UPDATE table_name • FULL OUTER JOIN: it returns all records when
SET col1 = val1, col2 = val2, ... there is a match in either left or right table
WHERE condition; Cartesian Join or Cross Join–
DELETE Statement– If cross join is used to combine two different tables, then
• The DELETE statement is used to delete existing we will get the Cartesian product of the sets of rows from
records in a table. the joined table and when each row of the first table is
• The WHERE clause specifies which record(s) should combined with each row from the second table, then it is
be deleted. If we omit the WHERE clause, all records known as Cartesian join or cross join.
in the table will be deleted.
Syntax- Self Join– It is a regular join, but the table is joined with
DELETE FROM table_name WHERE condition; itself.
MIN() function–It returns the smallest value of the Syntax-
selected column. SELECT col_name(s)
Syntax- FROM table1 T1, table1 T2
SELECT MIN(col_name) WHERE condition;
FROM table_name EQUI JOIN–
WHERE condition; • EQUI JOIN performs a JOIN against equality or
MAX() Function–It returns the largest value of the matching column(s) values of the associated tables.
selected column. An equal sign (=) is used as comparison operator in
Syntax- the where clause to refer equality.
SELECT MAX(col_name) • We can also perform EQUI JOIN by using JOIN
FROM table_name keyword followed by ON keyword and then
specifying names of the columns along with their
WHERE condition;
associated tables to check equality.
LIKE Operator–
Syntax-
The LIKE operator is used in a WHERE clause to search
SELECT col_list
for a specified pattern in a column.
FROM t1, t2....
Syntax-
WHERE t1.col_name =
SELECT col1, col2, ...
t2.col_name;
FROM table_name
Or
WHERE columnN LIKE pattern;
SELECT *
COUNT() Function– It returns the number of rows that
matches a specified criterion. FROM table1
Syntax- JOIN table2
SELECT COUNT(col_name) [ON (join_condition)]
FROM table_name Natural Join– NATURAL JOIN is a type of EQUI
JOIN and is structured in such a way that, columns with
WHERE condition;
the same name of associated tables will appear once
AVG() Function– The AVG() function returns the
only.
average value of a numeric column.
Syntax-
Syntax-
SELECT *
SELECT AVG(col_name)
FROM table_name FROM table1
WHERE condition; NATURAL JOIN table2;
JOIN- It is clause that is used to combine rows ofrom CREATE DATABASE Statement– It is statement
two or more tables, based on a related column between used to create a new SQL database.
them. Syntax-
There are different types of the JOINs in SQL:- CREATE DATABASE database_name;
Database Management System 192 YCT
DROP DATABASE- It is statement used to drop an PRIMARY KEY– The PRIMARY KEY constraint
existing SQL database. uniquely identifies each record in a table. Primary keys
Syntax- must contain UNIQUE values, and cannot contain NULL
DROP DATABASE database_name; values. A table can have only ONE primary key; and in
BACKUP– It is used in SQL Server to create a full back the table, this primary key can consist of single or
up of an existing SQL database. multiple columns (fields).
Syntax- FOREIGN KEY Constraint–
BACKUP DATABASE database_name • The FOREIGN KEY constraint is used to prevent
TO DISK = 'filepath'; actions that would destroy links between tables.
CREATE TABLE Statement– The CREATE TABLE • A FOREIGN KEY is a field in one table, that refers
statement is used to create a new table in a database. to the PRIMARY KEY in another table.
• The table with the foreign key is called the child table,
Syntax-
and the table with the primary key is called the
CREATE TABLE table_name ( referenced or parent table.
col1 datatype, CREATE INDEX Statement– It is used to create
col2 datatype, indexes in tables. Indexes are used to retrieve data from
col3 datatype, the database more quickly than otherwise.
.... Syntax-
); CREATE INDEX index_name
ON table_name (col1, col2, ...);
DROP TABLE- It is used to drop an existing table in a Dense Index– The dense index contains an index record
database. for every search key value in the data file. It makes
Syntax- searching faster.In a dense index, the number of records
DROP TABLE table_name; in the index table is same as the number of records in the
main table. It requires more space to store index record
ALTER TABLE Statement–
itself. The index records have the search key and a
• It is used to add, delete, or modify columns in an pointer to the actual record on the disk.
existing table. CREATE VIEW Statement–
• It is also used to add and drop various constraints on A view is a virtual table based on the result-set of an
an existing table. SQL statement. It contains rows and columns, just like a
Syntax- real table. The fields in a view are fields from one or
ALTER TABLE table_name more real tables in the database.
ADD col_name datatype; Syntax-
ALTER TABLE-DROP COLUMN– It is used to CREATE VIEW view_name AS
delete a column in a table. SELECT col1, col2, ...
Syntax- FROM table_name
ALTER TABLE table_name WHERE condition;
DROP COLUMN col_name; Updating a View– A view can be updated with the
ALTERTABLE-ALTER/MODIFY COLUMN– It is CREATE OR REPLACE VIEW statement.
used to change the data type of a column in a table. Syntax-
Syntax- CREATE OR REPLACE VIEW view_name AS
ALTER TABLE table_name SELECT col1, col2, ...
ALTER COLUMN col_name datatype; FROM table_name
Constraints– It is specified when the table is created WHERE condition;
with the CREATE TABLE statement, or after the table is Dropping a View– A view can be deleted with the
created with the ALTER TABLE statement. DROP VIEW statement.
Syntax- Syntax-
CREATE TABLE table_name ( DROP VIEW view_name;
col1 datatype constraint, Facts Table– The fact table is a primary table in the
col2 datatype constraint, dimensional model. It also contains measurement, metric
and quantitative information.
col3 datatype constraint,
Transaction Fact Table– The transaction fact table is a
.... basic approach to operate the businesses. These fact
); tables represent an event that occurs at the primary point.
NOT NULL Constraint– The NOT NULL constraint A line exists in the fact table for the customer or product
enforces a column to NOT accept NULL values.By when the transaction takes place. Fact tables are
default, a column can hold NULL values. completely normalized.
Database Management System 193 YCT
Triggers in SQL– A trigger is a set of SQL statements of a diagram which is known as entity relationship
that reside in system memory with unique names. It is a diagram.
specialized category of stored procedure that is called • An E-R model is a design or blue print of a database
automatically when a database server event occurs. Each
that can later be implemented as a database.
trigger is always associated with a table.
Syntax- • A data model is a collection of conceptual tools for
CREATE TRIGGER schema.trigger_name describing data, data relationship, data semantics and
ON table_name consistency constraints.
AFTER {INSERT, UPDATE, DELETE} • Data flow is described by means of DFDs as studied
[NOT FOR REPLICATION] earlier and represented in algebraic form.
AS • The difference (–) operation removes common tuples
{Statements} from the first relation that is known as commutative
Benefits of Triggers– Generating some derived column
and associative operation.
values automatically
• Relational algebra is a procedural language which
• Enforcing referential integrity
takes instances of relations as input and yields
• Synchronous replication of tables
instances of relations as output.
• Imposing security authorizations
• Preventing invalid transactions • A recursive relationship is a relationship between an
TRUNCATE– It removes all the values from the table entity and itself.
permanently. This command cannot delete the particular • Cardinality in an ER diagram is a relationship between
record because it is not used with the WHERE clause. two entity sets.
Syntax- • In a dataflow diagram, a circle/bubble represents
TRUNCATE TABLE Table_Name; process.
EXCEPT– The EXCEPT clause in SQL is widely used
• Key constraints states that the value of foreign key
to filter records from more than one table.
it retrieves all rows from the first SELECT query while must be unique for each records.
deleting redundant rows from the second. • In dbms, there are three levels of abstractions logical
Syntax- physical and view level.
SELECT col_lists from table_name1 • Related fields in a database are grouped to form a data
EXCEPT record.
SELECT col_lists from table_name2;
• If attribute of relation schema R is member of some
Important Facts .
candidate key then this type of attributes are classified
• LIKE operator is used to perform the pattern as prime attribute.
matching. • 'AS' clause is used in SQL for rename operation.
• In RDBMS, different classes of relationship are • A table joined with itself is called as self join.
created using normal forms technique to prevent • In functional dependency between two sets of
modification anomalies and 3NF normal from is
attributes A and B then set of attributes A of database
considered enough for database design.
is classified as left hand side.
• Second Normal form (2NF) disallows partial
• If there is more than one key for relation schema in
functional dependency.
dbms then each key in relation schema classified as
• Fifth normal form (5 NF) is also called as project join candidate key. The primary key is selected from the
normal form.
candidate key.
• If a relation is in 2NF and 3NF forms, then prime
• Normalization form which is based on transitive
attribute is functionally independent of all non-prime
dependency is classified as third normal form. The
attributes.
process of analyzing relation schemas to achieve
• In a relational database table a row is called as tuple. minimal redundancy and insertion or update
• Tables, records and complex logical relationships are anomalies is classified as normalization of data. SQL
characteristic of relational DBMS. is developed to support relational database and it
• E-R model is not record based data model and it provides controlling access to database, facility for
describes the structure of a database with the help of integrity constraints and query on database files.
Database Management System 194 YCT
• Transaction in a database should be atomic, durable from the operational environment to the data
and consistent. warehouse.
• The full form of DDL in SQL is data definition • In second normal form partial dependency get
language. DML commands of SQL allows deletion of removed.
tuples from tables. Create table, Alter and Drop are a • Centralized database is best for security and
DDL command of SQL. management.
• Natural join operator of relational algebra joins two • A virtual relation composed of columns form one or
tables at a time. more related relations is called a view. A view of a
• The goal of normalization is to eliminate insertion database that appears to an application program is
anomaly deletion anomaly and update anomaly. known as subschema.
• In ACID properties of transaction 'A' stands for • Armstrong's inference rule does not determine mutual
atomicity, 'C' stands for consistency, 'I' stands for dependency.
isolation and 'D' stands for durability. These are the • Project operation is used to extract specified columns
four properties in ACID that maintain the integrity of from a table.
data.
• In case the indices values are larger, index is created
• ER diagram can be transformed to tables.
for these values of the index and this is called
• A database file must ensure data consistency and data multilevel index.
integrity both.
• Designers use de-normalization to tune the
• If a relation contains atomic values of the attributes, performance of systems to support time-critical
then the relation. operations.
• A relational database is a set of tuples and a database
• Domain constraints, functional dependency and
always requires secondary storage device.
referential integrity are special forms of assertion.
• A weak entity set is a entity set whose existence
• Mapping ordinations.
depends on another strong entity set.
• Domain constraints, functional dependency and
• Under keyword is used in SQL to achieve inheritance.
referential integrity are special forms of assertion.
• A functional dependency is a relationship between
• Mapping cardinality express the number of entities to
attributes.
which another entity can be associated via a
• Outer join operator is used to retain the unmatched
relationship set.
rows of relations when they joined.
• Data model view of reports editor depicts the
• Entity types that do have key attributes of their own
structural representation of the data used in report
are called weak entity types.
definition.
• Address is an example of a composite attribute.
• Query acts as a data source for the reports definition.
• Logical design describes an abstract or conceptual
• Entity integrity constraint states that no primary key
design of the database.
value can be null.
• ADO is a simple object model that is easier to
• A super key for an entity consist of one or more
understand and use than OLE DB and is frequently
attributes.
used for database applications.
• Data dictionary contains name, width and data type • A primary key for an entity is a unique attributes.
etc. • Horizontal fragmentation is based on SELECT
• For a relation the number of tuples is called operation in relational algebra.
cardinality. • Min-Max normalization is a data transformation
• SQL provides special aggregate functions such as technique.
count() min() and sum() etc. • A relation in a relational database can have only one
• The content of the data dictionary is metadata and it primary key.
contains at least the structure of the data, the • BIRCH is balanced item set reducing and clustering
algorithms used for summarization and the mapping using hierarchies.
Database Management System 195 YCT
• The phenomenon in which a single transaction failure • The load and index is a process to load the data in the
leads to a series of transaction rollbacks is called data warehouse and to create the necessary indexes.
cascading rollback. • Alter table is used to include integrity constraints in an
• The database must not contain any unmatched foreign existing relation.
key values and this property is called as referential • OLAP stands for online analytical processing. The
integrity. data is stored, retrieved and updated in OLTP (online
• User's view in a database is also called as external transactional processing).
view. • Visualisation is the technique used for discovering
• Update, insertion and deletion are database anomaly. patterns in database at the beginning of data mining
• Secondary index is also known as dense index. processes.
• Double lines, double rectangles and dashed ellipses • SELECT is not a DDL statement. Weak entities are
are valid component of a E-R diagram. double rectangles which is a correct notation in ER
• Set difference, rename and cartesian product are diagram.
fundamental operation in the relational algebra. • Domain is the RDBMS terminology for a set of legal
• Referential integrity constraint can be enforced by values that an attribute can have.
designing foreign key with respect to primary key of • An entity s a distinct real world item in an application.
another table. • The change made by one transaction are not visible to
• A database can be inconsistent due to redundancy. others till the commit point, this property is called
• Conceptual design of the database is done with the isolation.
help of data models. • NULL, Check and unique is an integrity constraints.
• Primary means of searching the records from database • Database schema, which is the logical design of the
is called as primary key. Subschema can be created database and the database instance which is a snapshot
using create view. of the data in the database at a given instant in time.
• SQL is a non-procedural query language. And in • Management of metadata information is done by
dbms, data about data is stored in data dictionary. logical file system and a locked file can be accessed
• A culstering index is defined on the fields which are by only one user.
of type non-key and ordering. • Data mining refers to analyzing large databases to find
• Trigger is statement that is executed automatically by useful patterns.
the system as a side effect of a modification to the • Conn's rule of high-level update rule states that the
database. RDBMS support insertion, updation and deletion at a
• 'Second normal form' is based on the concept of 'Full table level.
functional dependency'. • Minimal super key is candidate key.
• The purpose of 'foreign key' in a table is to ensure null • Authorization is the process by which the user's
and domain integrity. privileges are ascertained in database.
• If several concurrent transactions are executed over • The values of the attribute should be present in the
the same data set and the second transaction updates domain and a domain is a set of values permitted.
the database before the first transaction is finished, the • Table in second normal form (2NF) eliminates all
isolation property is violated and the database is no hidden dependency domain constraints, functional
longer consistent. dependency and referential integrity are special terms
• Referential integrity constraints is a special type of of assertion.
integrity constraint that relates two relations & • Selection operations are commutative and natural join
maintains consistency across the relations. operations are associative.
• The DROP TABLE statement deletes the table • Distinct is the keyword used to eliminate duplicate
structure along with the table data. rows from the query result.
• Business metadata contains information that gives • The overall logical structure of a database can be
users an easy to understand perspective of the expressed graphically by entity relationship model.
information stored in the data warehouse. • The relation schema describes set of field.
Database Management System 196 YCT
Important Questions Asked in Previous Years Examinations
1. What is DBMS? 11. Who developed the first general purpose
(a) any organised piece of information DBMS?
(b) database (a) Charles Bachman (b) Edgar codd
(c) meta data (c) Francis Bacon (d) William Drebbel
(d) non-organised data. 12. Duplication of data is known as-
2. DBMS is a type of- (a) Redundancy (b) Consistency
(a) program (b) software (c) Data security (d) Data integrity
(c) spyware (d) malware 13. Which of the following is true about database
3. Which is not a fundamental operation in the being an organised collection of?
relational algebra ? (a) Data (b) Attributes
(a) natural join (b) cartesian product (c) Records (d) Views
(c) set difference (d) rename 14. Which of the following is correct full form of
RPSC VPITI 2018 (CS) RDBMS?
4. Which of the following is not an example of (a) Relational database management system
DBMS? (b) Relative database management system
(a) SQL server (b) MySQL (c) Rotational database manageable service
(c) Microsoft outlook (d) Microsoft Access (d) Regional database management system
UPPCL ARO Official paper I 18/02/2018 Shift-I 15. The term "relational database" was invented
5. What type of database can not be stored in a by.
database software? (a) E.F. Codd (b) Charles Bachman
(a) Any form of image, text, audio or video files (c) Steve Woznaik (d) Ronald Wayne
(b) Any inaccessible data 16. A relational DBMS stores information in a set
(c) Any organised and updated data of-
(d) Any releted piece of information. (a) Table (b) Key
6. In which of the following forms data can be (c) Row (d) Horizontal
stored in the database management system? 17. Which of the following is used to refer for a
(a) Image (b) Graph 'row'?
(c) Audio (d) Table (a) Attribute (b) Tuple
7. A data can be stored in the format of- (c) Field (d) Column
(a) Table (b) Schema 18. What does attribute mean in a particular
table?
(c) Views and reports (d) All of the above
(a) Record (b) Column
8. Which one of the following is a disadvantage of
(c) Key (d) Tuple
database management system?
19. An absent value in a particular field
(a) Data redundancy
represents-
(b) Elimination of inconsistency
(a) Empty value (b) Absent value
(c) Flexibility
(c) Null value (d) New value
(d) Security improvement
20. Which of the following is not an integrity
9. Which of the following is an advantage of constraint?
database management system? (a) PRIMARY KEY (b) FOREIGN KEY
(a) Reduce development time (c) CHECK (d) NULL
(b) Complexity 21. Which one of the following does prevent action
(c) Costly that ends links between the tables?
(d) large is size (a) foreign Key (b) primary Key
10. What does the mean of user administration in (c) check constraint (d) default
dbms? 22. 'Data integrity' refers to
(a) Registering users (a) accuracy and consistency
(b) Performance monitoring (b) prevents users from the changing the data
(c) Maintaining data integrity (c) ensures duplicate records
(d) All of the above (d) allow access to data
Database Management System 197 YCT
23. Primary Key is a combination of- 35. Which of the following model is concerned with
(a) NOT NULL & UNIQUE developing a database model as per
(b) FOREIGN KEY & CHECK requirement and the entire design is completed
(c) DEFAULT & CREATE on paper rather physical implementation?
(d) UNIQUE (a) Physical model (b) Logical model
24. Which of the following does ensure all the (c) Schematic model (d) Sigma model
values to be different in a column? 36. With reference to data manipulation which of
(a) PRIMARY KEY (b) CHECK the following statement is correct?
(c) NOT NULL (d) UNIQUE 1. To improve the growth of any business and
organisations
25. What is the function of constraints?
2. It helps in organising raw data in a
(a) Ensuring accuracy and reliability
structured way
(b) Ensuring deletion of data
3. It doesn't help in organising raw data
(c) Ensuring creation of data
4. DML is used to manipulate data and it helps
(d) None of the able in modifying data.
26. A single entry in a table is called- (a) 1 ,2 & 3 (b) 2 & 4
(a) column (b) null value (c) 1 & 3 (d) 1,2 & 4
(c) attributes (d) row or record 37. Which command does allow users to insert
27. Database normalization was developed by- data in database tables?
(a) Charles Bachman (b) Franeic Bacon (a) Update (b) Insert
(c) E.F. codd (d) William Drebbel (c) Put data (d) Delete
28. Which of the following does enforce valid 38. Which command does allow a user to remove
entries for a given column? single or multiple existing records from
(a) Entity integrity database tables?
(b) user-defined integrity (a) Delete (b) Remove
(c) Domain integrity (c) Destroy (d) Select & delete
(d) Referential integrity 39. Which of the following is not part of database
29. A constraints which ensures, a value in a development life cycle?
column to be satisfied a specific conditions- (a) Requirement analysis
(a) DEAAULT (b) PRIMARY KEY (b) Database designing
(c) FOREIGN KEY (d) CHECK (c) Implementation
30. How many types of database architecture are, (d) Structured data
there logically? 40. Which of the following is used to specify rules
(a) 3 (b) 2 for the data in a table?
(c) 4 (d) 5 (a) Column (b) Record
31. Which of the following enforces valid entry for (c) Protocol (d) Constraints
a given column by restricting the type, format 41. Which of the following is not advantages of
or the range of values. NoSQL?
(a) Referential integrity (a) Supports query language
(b) Data integrity (b) Provides horizontal scalability
(c) Domain integrity (c) Flexible schemas
(d) Entity integrity (d) Ease of use for non-developers
32. Which is not a valid join in SQL ? 42. Which of the following is type of NoSQL
(a) left outer join (b) partial outer join database?
(c) full outer join (d) natural full outer join (a) Document database (b) Graph database
RPSC VPITI 2018 (CS) (c) Key value database (d) All of the above
33. An attributes composed of simple components 43. Which of the following databases store data in
with an independent existence is called- nodes and edges?
(a) Composite attributes (b) Simple attributes (a) Graph (b) Document
(c) Derived attributes (d) Single attributes (c) Wide-column (d) Key-value
34. In which relationship each record of one table 44. In NoSQL, which method is used to sort the
is related to only one record of the other table? documents in the collection?
(a) One to many (b) One to one (a) Select() (b) Sort()
(c) Many to one (d) Many to many (c) Opt() (d) Skip()
Database Management System 198 YCT
45. Which of the following command is used to 57. Which of the following is used to perform a
delete the associated data files and it operates JOIN against equality or matching column(s)
on the correct database? values of the associated table?
(a) Truncate (b) Drop (a) Full outer join (b) Equi join
(c) Delete (d) Remove (c) Self join (d) Product join
46. Which of the following is standard language for 58. Natural Join is a type of
storing, manipulating and retrieving data in (a) Equi join (b) Self join
databases? (c) Inner join (d) Select join
(a) C++ (b) Java 59. Which of the following in SQL server is used
(c) SQL (d) ADA to create a full back up of an existing SQL
47. "A relational model of data for large shared database?
data banks" was a paper which was published (a) BACKUP (b) ROLLUP
by the great computer scientist "E.F. Codd" in- (c) DROP (d) REVERSE
(a) 1970 (b) 1972 60. Which of the following is a set of SQL statements
(c) 1975 (d) 1977 that reside in system memory with unique
48. In which laboratory of IBM SQL was names?
developed? (a) Triggers (b) Foreign key
(a) Son Josh research (b) San Jose research (c) Primary key (d) Constraints
(c) Brainly research (d) ANSI 61. Which operator perform the pattern
49. In which year did SQL become a standard of matching?
ANSI and of the ISO ? (a) As operator (b) LIKE Operator
(a) 1986&1987 (b) 1988&1999 (c) SELECT Operator (d) None of above
(c) 2001& 2004 (d) 1986& 1988 Punjab State Civil Supplies Corp. Ltd. 13.11.2011
50. Which clause in SQL is used to filter records 62. Which of the following is NOT a characteristic
and extract only those records that full fil a of relational DBMS?
specified condition? (a) tables
(a) SELECT (b) WHERE (b) tree-like structures
(c) UNIQUE (d) NULL (c) complex logical relationships
51. The keywords in SQL which is used to sort the (d) records
result-set in ascending or descending order? RPSC Lect. 2011
(a) Select by (b) Order by 63. Which normal form is considered adequate for
(c) Order to (d) Order for database design?
52. Which of the following statement in SQL is (a) 3NF (b) 2NF
used to modify the existing records in a table? (c) 1NF (d) 4NF
(a) DELETE (b) UPDATE
RPSC Lect. 2011
(c) UPDATION (d) RE NEW
64. In RDBMS, different classes of relations are
53. Which of the following function in SQL is used created using ______ technique to prevent
to return the smallest value of the selected modification anomalies.
column?
(a) functional dependencies
(a) MAX() (b) MIN()
(b) data integrity
(c) COUNT() (d) AVG()
(c) referential intergrity
54. Which of the following function in SQL is used
(d) normal forms
to return the largest value of the selected
column? UPPSC LT GRADE 29.07.2018
(a) MIN() (b) MAX() 65. Which of the following is not is recordbased
data model?
(c) LARGEST () (d) SMALLEST ()
(a) Relational model
55. The function in SQL that is used to return the
number of rows that matches a specified (b) Hierarchical model
criterion is . (c) E-R model
(a) RETURN () (b) COUNT() (d) Network model
(c) MAX() (d) MIN() UPPSC LT GRADE 29.07.2018
56. Cartesian join is also known as 66. A data model is a collection of conceptual tools
(a) Self join (b) Inner join for describing
(c) Cross join (d) Triplate join (a) data and data relationship
Database Management System 199 YCT
(b) data semantics and consistency constraints 74. A recursive relationship is a relationship
(c) data, data relationship, data semantics and between an entity and...............
consistency constraints (a) itself (b) a subtype entity
(d) None of the above (c) an archetype entity (d) an instance entity
UPPSC LT GRADE 29.07.2018 Punjab PSC Lect. 2016 (IT)
67. The difference (-) operation removes common 75. Key constraint states that:
tuples from the first relation. This operation is (a) the value of primary key can not be Null
(a) commutative and associative (b) the value of foreign key can not be Null
(b) non-commutative and associative (c) the value of primary key must be unique for
(c) commutative and non-associative each records
(d) non-commutative and non-associative (d) the value of foreign key must be unique for
UPPSC LT GRADE 29.07.2018 each records
68. Fifth normal form is also called :- (e) the value of foreign key can be Null
(a) Protect-join normal form CGPSC Asstt. Prof. 2014 (IT)
(b) Process-join normal form
(c) Project-join normal form 76.
(d) None of these
RPSC VPIITI 2012 (CS)
Weight is a in the above ER diagram :
69. Second normal form disallows
(a) entity (b) relation
(a) Full functional dependency
(c) context (d) attribute
(b) Partial functional dependency
(c) Transitive functional dependency RPSC ACF FRO 23.02.2021 (Comp. App./Sci.)
(d) Non- trivial Multivalued dependency 77. In a data flow diagram, a circle/bubble
represents
TANGEDCO AE 2018
(a) Data flow (b) External entity
70. If a relation is in 2NF and 3NF forms, then
(c) Data store (d) Process
(a) no non-prime attribute is functionally
dependent on other non-prime attributes RPSC ACF FRO 23.02.2021 (Comp. App./Sci.)
(b) no non-prime attribute is functionally 78. What is cardinality in an ER diagram ?
dependent on the prime attributes (a) Relationship between two data stores.
(c) all attributes are functionally independent (b) Relationship between two entity sets.
(d) prime attribute is functionally independent of (c) Relationship between two attributes.
all non-prime attributes (d) Relationship between two processes.
APPSC Lect. Degree College 07.06.2017 (CS) RPSC ACF FRO 23.02.2021 (Comp. App./Sci.)
71. Which normal form is considered adequate for 79. A table joined with itself is called
relational database design? (a) Join (b) Self Join
(a) 2 NF (b) 3 NF (c) Outer Join (d) Equi Join
(c) 4 NF (d) BCNF NIELIT Scientists-B 22.07.2017 (IT)
APPSC Lect. Degree College 07.06.2017 (CS) 80. Consider the join of a relation R with relation S
72. A table on the many side of a one to many or If R has m tuples and S has n tuples, then the
many to many relationship must: maximum size of join is
(a) Be in Second Normal Form (2NF) (a) mn (b) m+n
(b) Be in Third Normal Form (3NF) (c) (m+n)/2 (d) 2(m+n)
(c) Have a single attribute key NIELIT Scientists-B 22.07.2017 (IT)
(d) Have a composite key 81. ‘AS’ clause is used in SQL for
GPSC Asstt. Prof. 30.06.2016 (a) Selection operation (b) Rename operation
73. Which of the following is a procedural (c) Join operation (d) projection operation
language? NIELIT Scientists-B 22.07.2017 (IT)
(a) tuple relational calculus 82. Related fields in a database are grouped to
(b) domain relational calculus form a
(c) relational algebra (a) data file (b) data record
(d) None of these (c) menu (d) bank
RPSC ACF & FRO 23.02.2021 (CS) NIELIT Scientists-B 22.07.2017 (IT)
Database Management System 200 YCT
83. If attribute of relation schema R is member of 92. DML commands of SQL allows
some candidate key then this type of attributes (a) Deletion of tuples from table(s)
are classified as: (b) Definition of table(s)
(a) atomic attribute (b) candidate attribute (c) Creation of views
(c) nonprime attribute (d) prime attribute (d) None of these
NIELIT Scientists-B 04.12.2016 (CS) MPPSC State Forest Service Examination 2014
84. In functional dependency between two sets of 93. Transaction in a database should be
attributes A and B then set of attributes A of (a) Atomic (b) Durable
database is classified as:
(c) Consistent (d) All options are correct
(a) top right side (b) down left side
MPPSC State Forest Service Examination 2014
(c) left hand side (d) right hand side
94. Natural join operator of relational Algebra,
NIELIT Scientists-B 04.12.2016 (CS)
joins _____ tables at a time
85. The primary key is selected from the:
(a) Three (b) Four
(a) Composite keys. (b) Determinants
(c) Two (d) Five
(c) Candidate keys. (d) Foreign keys.
MPPSC State Forest Service Examination 2014
NIELIT Scientists-B 04.12.2016 (CS)
95. Which of the following is not a Set operator in
86. Normalization form which is based on
SQL?
transitive dependency is classified as:
(a) Like (b) Union
(a) first normal form (b) second normal form
(c) Intersection (d) Minus
(c) fourth normal form (d) third normal form
MPPSC State Forest Service Examination 2014
NIELIT Scientists-B 04.12.2016 (CS)
96. A relation is in 4NF if it is in 3NF and contains
87. If there is more than one key for relation
(a) No multi-valued dependency
schema in DBMS then each key in relation
schema is classified as: (b) No non prime attribute is transitively
(a) prime key (b) super key dependent on the key
(c) candidate key (d) primary key (c) Non lossy decomposition
NIELIT Scientists-B 04.12.2016 (IT) (d) Every non key attributes is fully dependent on
the primary key
88. Process of analyzing relation schemas to
achieve minimal redundancy and insertion or MPPSC State Forest Service Examination 2014
update anomalies is classified as: 97. Full form of DDL in SQL is
(a) normalization of data (a) Data directed language
(b) denomination of data (b) Data definition language
(c) isolation of data (c) Data density language
(d) de-normalization of data (d) None of these
NIELIT Scientists-B 04.12.2016 (IT) MPPSC State Forest Service Examination 2014
89. SQL is developed to support 98. A database can be inconsistent due to
(a) Hierarchical database (a) Atomicity (b) Redundancy
(b) Relational database (c) Efficiency (d) All options are correct
(c) Network database MPPSC State Forest Service Examination 2014
(d) A simple data file 99. In order to have multi-valued dependency on
MPPSC State Forest Service Examination 2014 the table, it must have
90. SQL provides (a) Only one attribute
(a) Controlling access to database (b) NULL or one attribute
(b) Providing facility for integrity constraints (c) Two or more attributes
(c) Query on database files (d) Less than two attributes
(d) All options are correct MPPSC State Forest Service Examination 2014
MPPSC State Forest Service Examination 2014 100. The goal of normalization is to eliminate
91. Which of the following is not a DDL command (a) Insertion anamoly
of SQL? (b) Deletion anamoly
(a) Create table (b) Alter (c) Update anamoly
(c) Drop (d) Insert (d) All options are correct
MPPSC State Forest Service Examination 2014 MPPSC State Forest Service Examination 2014
Database Management System 201 YCT
101. “NOT NULL” keyword in SQL is used 110. Conceptual design of the data base is done with
(a) As constraint the help of
(b) When value is unknown (a) Data marts (b) Data models
(c) When value is missed during insertion (c) DFD (d) Flowchart
MPPSC State Forest Service Examination 2014
(d) All options are correct
111. Primary means of searching the records from
MPPSC State Forest Service Examination 2014 database is called as
102. A relation contains atomic values of the (a) Candidate Key (b) Primary Key
attributes, then relation is said to be in (c) Foreign key (d) alternate Key
(a) 1 NF (b) 2NF MPPSC State Forest Service Examination 2014
(c) 3NF (d) 4NF 112. Trigger is
MPPSC State Forest Service Examination 2014 (a) Statement that enables to start any DBMS
103. In ACID properties of transactions processing, (b) Statement that is executed by the user when
‘C’ stands for debugging an application program
(c) the condition that the system tests for the
(a) Consistency (b) Cordinality
validity of the database user
(c) Conefirmity (d) None of these (d) Statement that is executed automatically by
MPPSC State Forest Service Examination 2014 the system as a side effect of a modification
104. A database file must ensure following to the database
properties ISRO Scientist/Engineer 2016 (July)
(a) Data consistency 113. Which 'Normal Form' is based on the concept
(b) Data integrity of 'full functional dependency' is
(c) Both (Data consistency) and (Data integrity) (a) First Normal Form
(b) Second Normal Form
(d) None of these
(c) Third Normal Form
MPPSC State Forest Service Examination 2014 (d) Fourth Normal Form
105. A relational database is a ISRO Scientist/Engineer 2011
(a) Set of tuples 114. Purpose of 'Foreign Key' in a table is to ensure
(b) Set of nodes in tree form (a) Null integrity
(c) Set of nodes in hierarchical form (b) Referential integrity
(d) None of these (c) Domain integrity
MPPSC State Forest Service Examination 2014 (d) Null & Domain integrity
ISRO Scientist/Engineer 2009
106. In DBMS, Network model is based on
115. If several concurrent transactions are executed
(a) Linked list (b) Graph over the same data set and the second transaction
(c) Tree (d) Queue updates the database before the first transaction
MPPSC State Forest Service Examination 2014 is finished, the____ property is violated and the
107. A database always requires database is no longer consistent.
(a) Secondary storage device (a) Atomicity (b) consistency
(b) Only primary storage device (c) isolation (d) Durability
(c) DMA controller RPSC VPITI 2014 (IT)
116. Which of the following protocols ensures
(d) None of these
conflict serializability and safety from
MPPSC State Forest Service Examination 2014 deadlocks?
108. E-R diagram can be transformed to (a) Two- phase locking protocol
(a) Objects and classes (b) Tables (b) Time- stamp ordering protocol
(c) Arrays (d) None of these (c) Graph based protocol
MPPSC State Forest Service Examination 2014 (d) Both Two- phase locking protocol and Time-
109. A weak entity set is a stamp ordering protorcol
(a) Entity set whose existence depends on RPSC VPITI 2014 (IT)
117. If a transaction is performed in a database and
another weak entity set
committed, the changes are taken to the
(b) Entity set whose existence depends on
previous state of transaction by
another strong entity set (a) Flashback
(c) Entity set whose existence dependency does (b) Rollback
not matter (c) Both Flashback and Rollback
(d) None of these (d) Cannot be done
MPPSC State Forest Service Examination 2014 RPSC VPITI 2014 (IT)
Database Management System 202 YCT
118. …….is a special type of integrity constraint 126. In order to maintain the consistency during
that relates two relations & maintains transactions databases provides
consistency across the relations. (a) Commit (b) Atomic
(a) Entity Integrity constraints (c) Flashback (d) Rollback
(b) Referential Integrity Constraints RPSC Lect. 2014
(c) Domain Integrity Constraints 127. Which is the technique used for discovering
(d) Key Constraints patterns in dataset at the beginning of data
RPSC VPITI 2014 (IT) mining processes?
119. The DROP TABLE statement: (a) Kohenen map (b) Visualisation
(a) Deletes the table structure only (c) OLAP (d) SQL
(b) Deletes the table structure along with the RPSC VPITI 2018 (IT)
table data 128. Which one of following is a correct notation in
(c) works whether or not referential integrity ER diagrams?
constraints would be violated (a) Entities are oval
(d) is not an SQL statement
(b) Relationships are rectangles.
RPSC VPITI 2014 (IT)
(c) Attributes are diamonds
120. The_____ contains information that gives users
(d) Weak entities are double rectangles.
an easy-to- understand perspective of the
information stored in the data warehouse. RPSC VPITI 2018 (IT)
(a) business metadata. (b) technical metadata . 129. What is the RDBMS terminology for a set of
(c) operational metadata. (d) financial metadata. legal values that an attribute can have?
RPSC VPITI 2014 (IT) (a) Tuple (b) Relation
121. The load and index is _____. (c) Attribute (d) Domain
(a) a process to upgrade the quality of data before RPSC VPITI 2018 (IT)
it is moved into a data warehouse. 130. An entity is:
(b) a process to upgrade the quality of data after (a) A collection of items in an application
it is moved into a data warehouse. (b) A distinct real world item in an application
(c) a process to reject data from the data warehouse (c) An inanimate object in an application
and to create the necessary indexes. (d) A data structure in DBMS
(d) a process to load the data in the data warehouse TNPSC 2016 (Degree) P-II
and to create the necessary indexes. 131. The changes made by one transaction are not
RPSC VPITI 2014 (IT) visible to others till the commit point, this
122. To include integrity constraint in an existing property is called:
relation use: (a) Automicity (b) Consistency
(a) Create table (b) Modify table (c) Isolation (d) Durability
(c) Alter table (d) Drop table TNPSC 2016 (Degree) P-II
RPSC VPITI 2014 (IT) 132. Which of the following is not a integrity
123. In the daily running of the business which of constraints?
the following information systems are used? (a) Not null (b) Positive
(a) Operational planning systems.
(c) Unique (d) Check
(b) Transaction Processing systems (TPS).
TNPSC 2016 (Degree) P-II
(c) Process control system.
133. Database .........., which is the logical design of
(d) Office automation system (OAS).
the database and the database ........., which is a
RPSC VPITI 2014 (IT)
snapshot of the data in the database at a given
124. Which is not a valid component of a E-R
instant in time:
diagram ?
(a) Instance, schema (b) Schema, Relation
(a) dashed lines (b) double lines
(c) Domain, Relation (d) Schema, Instance
(c) double rectangles (d) dashed ellipses
RPSC VPITI 2018 (CS) TNPSC 2016 (Degree) P-II
RPSC Lect. 2014 134. A locked file can be?
125. The data is stored, retrieved and updated (a) Accessed by only one user
in……….. (b) Modified by users with correct password
(a) OLAP (b) OLTP (c) Is used to hide sensitive information
(c) Online processing (d) POP3 (d) Both (b) and (c)
RPSC Lect. 2014 TNPSC 2016 (Degree) P-II
Database Management System 203 YCT
135. Management of metadata information is done (c) Assertion
by: (d) Referential constraint
(a) File-organisation module TNPSC 2016 (Degree) P-II
(b) Logical file system 144. Selection operations are ......... and natural join
(c) Basic file system operations are ........ .
(d) Application programs (a) Commutative, Associative
TNPSC 2016 (Degree) P-II (b) Associative, commutative
136. Data mining refers to: (c) Associative, associative
(a) Retrieving a record from a large database (d) Commutative, commutative
(b) Retrieving similar records from a large TNPSC 2016 (Degree) P-II
database 145. ......... is the keyword used to eliminate
(c) To find out whether a particular pattern exists duplicate rows from the query result:
among the records (a) No duplicate (b) Unique
(d) Analyzing large databases to find useful (c) Distinct (d) Primary
patterns TNPSC 2016 (Degree) P-II
TNPSC 2016 (Degree) P-II 146. ALL or NONE refers:
137. Minimal super key is: (a) Consistency (b) Isolation
(a) Candidate key (b) Primary key (c) Durability (d) Atomicity
(c) Referential key (d) Foreign key TRB Poly. Lect. 2017
TNPSC 2016 (Degree) P-II 147. Inheritance achieved by the keyword is SQL is:
138. Which of the following conn's rule states that (a) of (b) sub
the RDBMS support insertion, updation and (c) under (d) from
deletion at a table level:
TRB Poly. Lect. 2017
(a) High-level update rule
148. A functional dependency is a relationship
(b) Guaranteed access rule
between:
(c) Non-subversion rule
(a) tables (b) attributes
(d) View updating rule
(c) rows (d) relations
TNPSC 2016 (Degree) P-II
TRB Poly. Lect. 2017
139. Which of the following is the process by which
the user's privileges are ascertained in 149. ______ operator is used to retain the
database? unmatched rows of relations when they joined.
(a) Authentication (b) Authorization (a) Outer join (b) Inner join
(c) Access control (d) Login (c) Natural join (d) Self Join
TNPSC 2016 (Degree) P-II TRB Poly. Lect. 2017
140. OLAP stands for: 150. Entity types that do have key attributes of
(a) Online Analysis and processing their own are called:
(b) Online Analytical Processing (a) Identifying relationship
(c) One time Analysis and Processing (b) Strong entity types
(d) One time Analytical Processing (c) Identifying owner
TNPSC 2016 (Degree) P-II (d) Weak entity types
141. For each attribute of a relations there is a set of UPPCL AE 18.05.2016
permitted values, called the .......... that 151. The conceptual organization of the entire
attribute. database, as viewed by the database
(a) Domain (b) Relation administrator, relates to
(c) Set (d) Schema (a) schema (b) sub-schema
TNPSC 2016 (Degree) P-II (c) DML (d) DDL
142. Table in second normal form (2NF): APPSC Poly. Lect. 13.03.2020
(a) Eliminates all hidden dependencing 152. Which of the following options is an example of
(b) Eliminates the possibility of a insertion a composite attribute?
anomalies (a) Address (b) Age
(c) Has a composite key (c) First name (d) DOB
(d) Has all non key field, depends on the whole APPSC Poly. Lect. 13.03.2020
primary key
153. A minimal (irreducible) super key in a
TNPSC 2016 (Degree) P-II
relational database is:
143. Domain constraints, functional dependency
and referential integrity are special terms of: (a) Candidate key (b) Primary key
(a) Foreign key (c) Secondary key (d) Foreign key
(b) Primary key APPSC Poly. Lect. 13.03.2020
Database Management System 204 YCT
154. Which of he following options describes an 164. In which normal form partial dependency
abstract or conceptual design of the database? removed?
(a) Modular design (b) Physical design (a) First normal form
(c) Logical design (d) Mapped design (b) Second normal form
APPSC Poly. Lect. 13.03.2020 (c) Third normal form
155. The simple object model that is frequently used (d) BCNF
for database applications and which is easier to RPSC ACF & FRO 23.02.2021 (CS)
understand and use than OLEDB is : 165. Which of the following creates a virtual
(a) ADO (b) ASP relation for storing the query?
(c) XML (d) ODBC (a) Function (b) View
UPSC Senior Scientific Officer Grade-II 16.07.2017 (c) Procedure (d) None of these
156. Joining a table with itself is called RPSC ACF & FRO 23.02.2021 (CS)
(a) Self Join (b) Equi Join 166. Which of the join operation do not preserve
(c) Outer Join (d) Join non matched tuples?
UPPCL AE 2014 (a) Left Outer join (b) Right Outer Join
157. Data dictionary contains (c) Inner Join (d) full outer join
(i) name (ii) width (iii) data type RPSC ACF & FRO 23.02.2021 (CS)
(a) i and ii (b) ii and iii 167. To sort the results of a query use:
(c) i and iii (d) i, ii and iii (a) SORT BY (b) GROUP BY
UPPCL AE 2014 (c) ORDER BY (d) None of the above
158. Duplicate rows are eliminated using Punjab PSC Lect. 2016 (IT)
(a) ELIMINATE (b) NODUPLICATE 168. The SQL WHERE clause:
(c) DISTINCT (d) UNIQUE (a) limits the column data that are returned
UPPCL AE 2014 (b) limits the row data are returned
159. For a relation the number of tuples is called (c) Both (a) and (b) are correct
(a) Degree (b) Cardinality (d) Neither A nor B are correct
(c) Columns (d) Rows Punjab PSC Lect. 2016 (IT)
169. Centralized database:
UPPCL AE 2014
(a) Is best for security and management.
160. SQL provides a number of special aggregate
functions. Which of the following is not (b) Has all or part of the database copied at 2 or
included in SQL? more computers.
(a) Count (b) Median (c) Is dispersed among multiple computer
systems.
(c) Min (d) Sum
(d) Has problem of keeping all up to date data.
RPSC ACF & FRO 23.02.2021 (CS)
Punjab PSC Network Engineer 21.06.2014
161. The data can be stored, retrieved and updated
170. A virtual relation composed of columns from
in:
one or more related relations is called a/an:
(a) OLAP (b) OLTP
(a) Index (b) View
(c) SMTP (d) FTP
(c) Relational map (d) Base table
RPSC ACF & FRO 23.02.2021 (CS)
Punjab State Civil Supplies Corp. Ltd. 13.11.2011
162. Metadata contains at least:
171. Which process in database design has as a
(a) The structure of the data. purpose the elimination of data redundancy
(b) the algorithms used for summarization and the avoidance of update anomalies?
(c) the mapping from the operational (a) Hierarchical representation
environment to the data warehouse. (b) Normalization
(d) All of these (c) Data warehousing
RPSC ACF & FRO 23.02.2021 (CS) (d) Entity relationship modeling
163. The content of the data dictionary is Punjab State Civil Supplies Corp. Ltd. 13.11.2011
(a) DML Commands 172. A view of a database that appears to an
(b) DDL Commands application program is known as
(c) Indexes to user data (a) Schema (b) Subschema
(d) Metadata (c) Virtual table (d) None of these
RPSC ACF & FRO 23.02.2021 (CS) ISRO Scientist/Engineer 2007
Database Management System 205 YCT
173. Armstrong's inference rule doesn't determine 182. Weak entity in the following ER diagram is
(a) Reflexivity (b) Augmentation
(c) Transitivity (d) Mutual dependency
ISRO Scientist/Engineer 2007
174. Which operation is used to extract specified
columns from a table?
(a) Project (b) Join
(c) Extract (d) Substitute
(a) Loan
ISRO Scientist/Engineer 2007 (b) Loan payment
175. In case the indices values are larger, index is (c) Payment
created for these values of the index. This is (d) Both Loan payment and payment
called RPSC VPITI 2018 (CS)
(a) Pointed index (b) Sequential index 183. Domain constraints, functional dependency
(c) Multilevel index (d) Multiple index and referential integrity are special forms of
_____
GPSC Asstt. Prof. 30.06.2016 (a) Foreign key (b) Primary key
176. Which is a join condition contains an equality (c) Assertion (d) Referential constraints
operator: GPSC Asstt. Prof. 30.06.2016
(a) Equijoins (b) Cartesian 184. _______ express the number of entities to
(c) Both (a) and (b) (d) None of the above which another entity can be associated via a
GPSC Asstt. Prof. 30.06.2016 relationship set.
(a) Mapping Cardinality
177. Which operation is/are allowed in a join view: (b) Relational Cardinality
(a) UPDATE (b) INSERT (c) Participation Constraints
(c) DELETE (d) Any of the above (d) None of the above
GPSC Asstt. Prof. 30.06.2016 GPSC Asstt. Prof. 30.06.2016
178. Which of the join operations do not preserve 185. In an enterprise structure, a Legal Entity is
non matched tuples? (a) Same as Enterprise
(b) Part of an Enterprise
(a) Left outer join (b) Right outer join
(c) Refers to Legal Department
(c) Inner join (d) Natural join (d) None of the above
GPSC Asstt. Prof. 30.06.2016 GPSC Asstt. Manager 13.12.2020 (IT)
179. In SQL the statement select * from R, S is 186. Which view of reports editor depicts the
equivalent to structural representation of the data used in
(a) Select * from R natural join S report definition?
(a) Web source view
(b) Select * from R cross join S
(b) Paper design view
(c) Select * from R union join S (c) Data Model view
(d) Select * from R inner join S (d) Paper parameter view
GPSC Asstt. Prof. 30.06.2016 GPSC Asstt. Manager 13.12.2020 (IT)
180. Designers use which of the following to tune the 187. Which of the following acts as a data source for
performance of systems to support time-critical the reports definition?
(a) Database columns (b) Parameters
operations?
(c) Query (d) Group
(a) De-normalization GPSC Asstt. Manager 13.12.2020 (IT)
(b) Redundant optimization 188. The set of permitted values of an attribute is
(c) Optimization called
(d) Realization (a) Tuple (b) Column
GPSC Asstt. Prof. 30.06.2016 (c) Domain (d) Table
GPSC Asstt. Manager 13.12.2020 (IT)
181. ______ can help us detect poor E-R design.
189. What is true about the INSERT statement in
(a) Database Design Process
Oracle SQL?
(b) E-R Design Process (a) An INSERT statement can be used only if a
(c) Relational scheme constraint is placed on the table
(d) Functional dependencies (b) An INSERT statement can never insert a row
GPSC Asstt. Prof. 30.06.2016 that violates a constraint
Database Management System 206 YCT
(c) An INSERT statement can override any (b) Columns used for joining can have same or
constraint put on the table different name
(d) An INSERT statement cannot be used if a (c) Columns used for joining must have different
constraint is placed on the table names
GPSC Asstt. Manager 13.12.2020 (IT) (d) A column is not required for joining
190. Computer table has CompId, Make, Model and GPSC Asstt. Manager 13.12.2020 (IT)
MYear attributes. Which of the following 196. Which join is to be used between two tables A
statement will not execute successfully? and B when the resultant table needs rows
(a) SELECT * FROM Computer ORDER BY from A and B that matches the condition and
Make rows from A that does not match the condition.
(b) SELECT CompId FROM Computer ORDER (a) OUTER JOIN (b) CROSS JOIN
BY Make (c) INNER JOIN (d) SELF JOIN
(c) SELECT CompId FROM Computer ORDER
GPSC Asstt. Manager 13.12.2020 (IT)
BY 2
197. The degree (or arity) of a database relation is
(d) SELECT * FROM Computer ORDER BY 1
the number of _____ in its relation schema.
GPSC Asstt. Manager 13.12.2020 (IT)
(a) attributes (b) tuples
191. In which of the following circumstances a
(c) entities (d) primary keys
GROUP BY clause is mandatory?
(e) foreign keys
(a) SELECT query having only one aggregate
function CGPSC Asstt. Prof. 2014 (CS)
(b) SELECT query having two aggregate 198. Entity integrity constraint states that:
functions (a) no candidate key value can be null
(c) SELECT query having one aggregate (b) no foreign key value can be null
function along with other columns (c) Primary key values can't be duplicate
(d) SELECT query having only two columns (d) No primary key value can be null
GPSC Asstt. Manager 13.12.2020 (IT) (e) foreign key values can't be duplicate
192. Which of the following is true? CGPSC Asstt. Prof. 2014 (CS)
(a) Selection, projection union, difference, and 199. A superkey for an entity consists of
Cartesian product are independent. (a) one attribute only
(b) Selection, projection, intersection, difference, (b) atleast two attributes
and Cartesian product are independent. (c) at most two attributes
(c) Selection, projection, union, division, and (d) one or more attributes
Cartesian product are independent. APPSC Lect. Degree College 07.06.2017 (CS)
(d) Natural Join, selection, projection, Division 200. Which of the following sets of keywords
are independent. constitutes a mapping in SQL?
GPSC Asstt. Manager 13.12.2020 (IT) (a) SELECT, FROM, TABLE
193. Choose the right option for the Query below: (b) SELECT, FROM, WHERE
SELECT MAX(AVG(Salary)) FROM Employee
(c) CONNECT, TABLE, CREATE
(a) Displays Maximum Average Salary of
(d) SELECT, TABLE, INSERT
Employees
APPSC Lect. Degree College 07.06.2017 (CS)
(b) Error
201. A primary key for an entity is
(c) Displays Average Salary of Employees
(a) A candidate key
(d) Displays Average and Maximum Salary of
Employees (b) Any attribute
GPSC Asstt. Manager 13.12.2020 (IT) (c) A unique attribute
194. Which Join is equivalent to Cartesian Join? (d) A super key
(a) INNER JOIN (b) OUTER JOIN APPSC Lect. Degree College 07.06.2017 (CS)
(c) CROSS JOIN (d) NATURAL JOIN 202. Aggregate functions in SQL are
GPSC Asstt. Manager 13.12.2020 (IT) (a) GREATEST, LEAST and ABS
195. Which of the following conditions has to be (b) SUM, COUNT AND AVG
satisfied for INNER JOIN to work? (c) UPPER, LOWER AND LENGTH
(a) Columns used for joining must have same (d) SQRT, POWE AND MOD
name APPSC Lect. Degree College 07.06.2017 (CS)
Database Management System 207 YCT
203. Horizontal fragmentation is based on 210. Which of the join operations do not preserve
_________ operation in relational algebra. non matched tuples :-
(a) Select (b) Project (a) Left outer join (b) Right outer join
(c) Join (d) Division (c) Inner join (d) Natural join
TANGEDCO AE 2018 RPSC VPIITI 2012 (CS)
204. Min- Max normalization is a ______ technique 211. The entity integrity rule requires that
(a) Data cleaning (a) All primary key entries are unique
(b) Data integration (b) A part of the key may be null
(c) Data transformation (c) Foreign key values do not reference primary
(d) Outlier mining key values
TANGEDCO AE 2018 (d) Duplicate object values are allowed
205. A relation in a relational database can TSPSC Manager 2015
have_____ primary key (s). 212. The referential integrity rule requires that
(a) any number of (a) Every null foreign key value must reference
(b) a maximum of four an existing primary key value.
(c) only one (b) It makes it possible for an attribute to have a
(d) at least two corresponding value.
TANGEDCO AE 2018 (c) Every non- null foreign key value must
206. BIRCH is: reference and existing primary key value.
(a) Balanced Iterative Reducing and (d) It makes it possible to delete a row in one
Characterization using Hierarchies table whose primary key does not have a
(b) Balanced Iterative Repartitioning and matching foreign key value in another table.
Clustering using Hierarchies TSPSC Manager 2015
(c) Balanced Iterative Reducing and 213. Fact tables are which of the following?
Computation using Hierarchies (a) Completely denormalized
(d) Balanced Iterative Reducing and Clustering (b) Partially denormalized
using Hierarchies (c) Completely normalized
(e) Balanced Item set Reducing and Clustering (d) Partially normalized
using Hierarchies APPSC Lect. Degree College 07.06.2017 (CS)
CGPSC Asstt. Prof. 2014 (IT) 214. The content of the database cannot be modified
207. The phenomenon in which a single transaction using the operation
failure leads to a series of transaction rollbacks (a) Deletion (b) Insertion
is called: (c) Updating (d) Selection
(a) Concurrent rollback (b) Continuous rollback RPSC ACF FRO 23.02.2021 (Comp. App./Sci.)
(c) Cascading rollback (d) Conflict rollback 215. The key chosen by database designer as
(e) Control rollback principal means of identifying entities within
CGPSC Asstt. Prof. 2014 (IT) an entity set, is
208. An entity set which may not have sufficient (a) Candidate key (b) Super key
attributes to form a primary key is termed as: (c) Foreign key (d) primary key
(a) Relationship set (b) Strong entity set RPSC ACF FRO 23.02.2021 (Comp. App./Sci.)
(c) Redundant set (d) Trivial entity set 216. The database must not contain any unmatched
(e) Weak entity set foreign key values. This property is known as
CGPSC Asstt. Prof. 2014 (IT) (a) Entity integrity
209. Constraint that ensures that a value appearing (b) Atomicity
in one relation for a given set of attributes also (c) Referential integrity
appears for a certain set of attributes in (d) Consistency
another relation is: RPSC ACF FRO 23.02.2021 (Comp. App./Sci.)
(a) Domain constraint 217. User's view in a database is also called
(b) Unique constraint (a) External view
(c) Key constraint (b) Conceptual view
(d) Referential Integrity constraint (c) Internal view
(e) Entity integrity constraint (d) Contextual view
CGPSC Asstt. Prof. 2014 (IT) RPSC ACF FRO 23.02.2021 (Comp. App./Sci.)
Database Management System 208 YCT
218. Which is not a database anomaly ? 221. Which one of the following statement is correct
(a) Update anomaly about keys in databases ?
(b) Create anomaly (a) A super key is also a candidate key.
(c) Insertion anomaly (b) A primary key is also a candidate key.
(d) Deletion anomaly (c) A primary key is also a minimal key.
RPSC ACF FRO 23.02.2021 (Comp. App./Sci.) (d) A minimal super key is a candidate key.
219. Which of the following is dense index? RPSC VPITI 2018 (CS)
(a) Primary index 222. Which term is used to describe user's view of
data item types and record types?
(b) Clusters index
(a) schema (b) view
(c) Secondary index
(c) subschema (d) instance
(d) Secondary non key index
RPSC VPITI 2018 (CS)
ISRO Scientist/Engineer 22.04.2018
223. The ______ are used to model a system's
220. Which of the following is not a Unified behavior in response to internal and external
Modeling Language (UML) diagram ? events.
(a) Class diagram (a) Activity diagrams
(b) Deployment diagram (b) Data flow diagrams
(c) Sequence diagram (c) E-R diagrams
(d) Star diagram (d) State diagrams
RPSC VPITI 2018 (CS) RPSC VPITI 2018 (CS)

ANSWER KEY
1. (a) 2. (b) 3. (a) 4. (c) 5. (b) 6. (d) 7. (d) 8. (a) 9. (a) 10. (d)
11. (a) 12. (a) 13. (a) 14. (a) 15. (a) 16. (a) 17. (b) 18. (b) 19. (c) 20. (d)
21. (a) 22. (a) 23. (b) 24. (d) 25. (a) 26. (d) 27. (c) 28. (c) 29. (d) 30. (b)
31. (c) 32. (a) 33. (b) 34. (b) 35. (b) 36. (d) 37. (b) 38. (a) 39. (d) 40. (d)
41. (d) 42. (d) 43. (a) 44. (b) 45. (b) 46. (c) 47. (a) 48. (b) 49. (a) 50. (b)
51. (b) 52. (b) 53. (b) 54. (b) 55. (b) 56. (c) 57. (b) 58. (a) 59. (a) 60. (a)
61. (b) 62. (b) 63. (a) 64. (d) 65. (c) 66. (c) 67. (a) 68. (c) 69. (b) 70. (d)
71. (b) 72. (d) 73. (c) 74. (a) 75. (c) 76. (d) 77. (d) 78. (b) 79. (b) 80. (a)
81. (b) 82. (b) 83. (d) 84. (c) 85. (c) 86. (d) 87. (c) 88. (a) 89. (b) 90. (d)
91. (d) 92. (a) 93. (d) 94. (c) 95. (a) 96. (a) 97. (b) 98. (b) 99. (c) 100. (d)
101. (d) 102. (a) 103. (a) 104. (c) 105. (a) 106. (b) 107. (a) 108. (b) 109. (b) 110. (b)
111. (b) 112. (d) 113. (b) 114. (d) 115. (c) 116. (b) 117. (d) 118. (b) 119. (b) 120. (a)
121. (d) 122. (c) 123. (b) 124. (a) 125. (b) 126. (d) 127. (b) 128. (d) 129. (d) 130. (b)
131. (c) 132. (b) 133. (d) 134. (a) 135. (b) 136. (d) 137. (a) 138. (a) 139. (b) 140. (b)
141. (a) 142. (a) 143. (c) 144. (a) 145. (c) 146. (d) 147. (c) 148. (b) 149. (a) 150. (d)
151. (a) 152. (a) 153. (a) 154. (c) 155. (a) 156. (a) 157. (d) 158. (c) 159. (b) 160. (b)
161. (b) 162. (d) 163. (d) 164. (b) 165. (b) 166. (c) 167. (c) 168. (b) 169. (a) 170. (b)
171. (b) 172. (b) 173. (d) 174. (a) 175. (c) 176. (a) 177. (d) 178. (c) 179. (b) 180. (a)
181. (d) 182. (c) 183. (c) 184. (a) 185. (b) 186. (c) 187. (c) 188. (c) 189. (b) 190. (c)
191. (c) 192. (a) 193. (b) 194. (c) 195. (b) 196. (a) 197. (a) 198. (d) 199. (d) 200. (b)
201. (c) 202. (b) 203. (a) 204. (c) 205. (c) 206. (d) 207. (c) 208. (e) 209. (d) 210. (c)
211. (a) 212. (c) 213. (c) 214. (d) 215. (d) 216. (c) 217. (a) 218. (b) 119. (c) 220. (d)
221. (b) 222. (c) 223. (d)

Database Management System 209 YCT


09.
SYSTEM ANALYSIS AND DESIGN
Dynamic System Models– It shows an on-going,
Introduction .

constant changing status of the system.


• The system development life cycle (SDLC) is the Elements of a System:-The following diagram
process of determining how an information system demonstrates the element of a system.
(IS) can support business needs, designing the system,
building it and delivering it to users.
• System development is a systematic process which
includes phases like planning, analysis, design,
deployment and maintenance
System Analysis–
• The study of system analysis is conducted to study the Input– The information as a input is given to system
system and identify its objective. for the processing.
• In other words, we can say, It is a kind of problem Output– It is the outcome of the processing.
solving techniques which improves the system and Processor–It is the part of a system which transmits
ensures all the components to function efficiently. input into output.
System design– Control– It controls the pattern of activities to
govern input, processing and output
• A system design is the process of defining elements of
a system such as module, architecture components, Feedback– It provides the control in a dynamic
system and positive feedback is routine in nature that
their interfaces and data for a system based on the
encourages the performances of the system whereas
specified requirements.
negative feedback is informational in nature which
• It is a process of defining, developing and designing provides the controller with information for action.
systems which satisfies the specific needs and Environment– It ensure how a system must work.
requirements of a business or organization. Boundaries Interface– A system must have
• It is a process where a planning is done about a new boundaries to ensure its sphere of influence and control.
business system by replacing the old system.
• It is important to understand the specific requirement
Requirement Gathering and
of users and that is why before planning, we need to Feasibility Analysis
understand the old system thoroughly and find out Requirement determination– It is an important
how computer can be used in best way to operate features of a new system that includes processing or
efficiently capturing of data, controlling the activities of business,
• The primary objective of system analysis is to focus producing information and supporting the management
on how to accomplish the objective of the system. or in other words we can say it is a simply a statement of
System Model: what the system must do or what characteristics it
requires to have.
• A system model represents of a system and its
environment. • It involves to study the existing system and gathering
information or details to identify what are the
There are some types of system model-
requirements, how it functions and where
Schematic Models- It is a 2-D chart which shows improvement is necessary.
system elements and their linkages. Here, different types
Following are the major activities in requirement
of arrows are used to display information flow, material determination–
flow and information feedback as well.
Requirement Anticipation- It tells the features of
Flow System Models-It displays the orderly flow of system based on prior experience that include certain
the material, energy and information that hold the system problems or features. It also suggest for the requirement
together. Program evaluation and review technique is of new system if necessary.
used to abstract a real world system model form. Requirement Investigation– The study of current
Static System Models–The gantt chart provides a system and documentation of its features are conducted
static picture of an activity time relationship and for further analysis. Here, the analysts describe about the
represent one pair of relationship such as activity-time or features of system with the help of prototyping, finding
cost quantity. techniques and computer assisted tools.
System Analysis and Design 210 YCT
Information gathering techniques Benefits
There are many information gathering techniques • Provides valuable information in low cost and less
Interviewing–Here, system analyst gathers time.
information from individuals or groups with the help of • Accessible with internet
interview conduction. The success of interview can • Work as forerunner in primary research.
depend on the skill of analysts. The interview can be Joint Application Development (JAD)
conducted into two ways-
• It is an information gathering technique that allows
Structured Interview– It consists of standard
the project team, users and management to work
questions where users have to respond either in objective
together to identify the requirements for the system.
(Close) or descriptive (open) format.
• IBM developed the JAD technique in the late 1970s,
Unstructured Interview– Here, the system analyst
and it is often the most useful method for collecting
can conduct normal question- answer session to find out
information from the users.
the basic information about the system.
• JAD is a structured process in which 10 to 20 users
Benefits of Interviewing–
meet under the direction of a facilitator skilled in JAD
• To gather qualitative information about system techniques.
• Validation of the information by cross-checking • A facilitator is a person who conducts meeting
• Becomes easy to find key problems by seeking agenda and guides the discussion, but does not join in
opinions. the discussion as a participant.
• Bridges gaps in misunderstanding and reduce further Feasibility Analysis
problems. Feasibility analysis guides the organization in
Questionnaires– With the help of this method, an determining whether to proceed with the project and it
analysts gathers information about the issues found in the identifies the important risks associated with the project
system. that must be managed if the project is approved.
It is also of two types– • It is considered as preliminary investigation which
Open-ended Questionnaires– It consists of helps the management to take decision about whether
questions that can be easily and correctly interpreted. study of system is feasible for development or not.
They find out the problems and lead to a specific
direction of answer.
Closed-ended Questionnaires– It contains the
questions that are used when the system analyst
effectively list all the possible responses.
Benefits of Questionnaires–
• More reliable and provides high confidentiality of
honest responses.
• Effective in surveying interests, attitudes and beliefs
of users
• Useful in determining the overall opinion before Economic Feasibility– It is determined by identifying
giving any specific direction to the system project. costs and benefits associated with the system, assigning
Observation– values to them, calculating futures cash flows, and
measuring the financial worthiness of the project. As a
• By this method, the information is collected by
result of this analysis, the financial opportunities and
noticing and observing the people object and events.
risks of the project can be understood.
• The system analyst go for visit in organization to
Technical Feasibility–
observe the working of current system and to get to
• Technical feasibility analysis is in essence, a technical
know the requirements of the system.
risk analysis that strives to answer the question "Can
Benefits of Observation–
we build it" Many risks can endanger the successful
• Produces more accurate and reliable data completion of the project.
• Produces all the aspect of documentation that are • It helps organizations to determine whether the
incomplete and outdated. technical resources meet capacity and technical team
Background Reading (Secondary Research) is capable of converting the ideas into working
• In this method the information is gathered by systems.
accessing the gleaned information. • It also involves the evaluation of the hardware,
• Previous gathered information is provided to marketer software and other technical requirements of the
by any internal or external source. proposed system.
System Analysis and Design 211 YCT
Operational Feasibility– Source of Sink (External Entity)
• Operational feasibility involves undertaking a study to Function– It is a source of system inputs or sink of
analyze and determine whether and how well the system outputs.
organization's need can be met by completing the
project Symbol →
• It also examines how a project plan satisfies the
requirements identified in the requirements analysis Data Store
phase of system development. Function– It is repository of data, the arrow heads
• It also ensures that the computer resources and indicate net outputs and net inputs to store.
network architecture of candidate system are Types of Data flow diagram–
workable, or not. The data flow diagram is of two types-
Schedule Feasibility– Logical DFD and
Schedule Feasibility is defined as the likelihood of a Physical DFD
project being completed within its scheduled time frame. Logical DFD- It focuses on the system and flow of
If the project has a high likelihood of completion by the data in the system.
desired due the date, then the schedule feasibility is Physical DFD It denotes how the data flow is
considered to be high implemented in the system.
• It ensures that a project can be completed before the Data Dictionary– It is a file or a set of files that
project or technology becomes obsolete or includes a database's metadata. The data dictionary hold
unnecessary. records about other object in the database such as data
• `Schedule feasibility is also referred to as time ownership, data relationships to other objects, and other,
visibility and proper evaluation at this step can also data
help to avoid unpredictable or extra costs. • It also contains name, width and data type etc.
• The data dictionary is an essential component of any
Structured Analysis .
relational database
Structured Analysis is a development method that Importance of Data Dictionary-
allows the analyst to understand the system and its It plays vital role in software development processes
activities in a logical way. It is a systematic approach, because of the following reasons
which uses graphical tools that analyze and refine the 1. It provides the analyst with a means to determine the
objectives of an existing system and develop a new definition of different data structure in terms of their
system specification which can be easily understandable component elements.
by user. 2. It provides a standard terminology for all relevant data
It has following attributes– for use by the engineers working in a project.
Data Flow Diagram Decision Tree
• A data flow diagram is a conventional visual • It is the most powerful and popular tool for
representation of information within a system. It can classification and prediction.
be manual, automated or a combination of both. • It is a flowchart such as tree structure where each
• The primary objective of a DFD is to show the scope internal node denotes a test on an attribute, each
and boundaries of a system as a whole branch represents an outcome of the test and each leaf
node (terminal node) holds a class label.
• The DFD is also known as data flow graph or bubble
chart.
Following are the name, function and symbol for a DFD.
Data Flow–
Function– It is used to connect processes to each other
and indicates direction of data flow

Decision Table-
Symbol → It is a brief visual representation for specifying
Process which actions to perform depending on given conditions.
Function– It performs some transformation of input • It is also known as a cause-effect table because it is a
data to yield output data best way to settle with different combination inputs
with their corresponding outputs.
• The information represented in decision tables can
Symbol → also be represented as decision trees and in
programming language it can be used as if-else or
switch case statements as well.
System Analysis and Design 212 YCT
Pseudocode– Cohesion– It is a measure of the degree to which the
It is an informal way of programming description elements of the module are functionally related. It is the
that does not require any strict programming language degree to which all elements directed towards
syntax or underlying technology considerations. It is performing a single task are contained in the component.
used for creating an outline or a rough draft of a It is basically internal glue that keeps the module
program. together. A good software design has high cohesion.
System designers write pseudocode to ensure that Structure Chart
programmers understand a software project's • A structure chart is used in structured programming to
requirements and align code accordingly. arrange the program modules in a tree structure and
Structured English– each module is displayed by a box, which contains the
It is similar to a programming language such as module name.
Pascal and it does not have strict syntax rules like • It represents hierarchical structure of module and it
programming language. breaks down the entire system into lowest functional
Example Customer authentication in the online shopping modules.
environment. 1. Module– Shows the process and it is of three types
Enter Cust_Name Control Module– It branches to more than one sub
SEEK Cust_Name in Cust_Name_DB file module.
IF Cust_Name found THEN Sub Module– It is a part (child) of another module.
call procedure USER_PASSWORD_AUTHETICATE() Library Module– They are reusable and invokes
ELSE from any module.
PRINT error message 2. Conditional Call– It shows that control module can
Call procedure NEW_customer_req() select any of the sub module on the basis of certain
END IF condition.
Types of System Design–
Logical Design– It is used to represent the data Control
flow, input and output of the system. Module
For example– Entity Relationship diagram (ERD)
Physical Design– In ensures
1. How users add information to the system and how the
system represents information back to user.
2. How the data is modelled and stored within the Sub Sub
system. Module Module
3. How data moves through the system and how data is 3. Hoop Module– It shows the repetitive execution of
validated, secured and transformed because it flows module by the sub model and a curved arrow
through and out of the system. denotes loop in the module.
Architectural Design–
It is used to describe the views models, behavior
and structure of the system. etc.
Structured Design .

• Structure design is a systematic methodology to


determine design specification of software
• It is a conceptualization of problem into many well- 4. Data Flow– It denotes the flow of data between the
organized elements of solution and is concerned with modules and it is represented by directed arrow with
the solution design. empty circle at the end.
• It is based on 'divide and conquer' strategy where
problems are broken into many small- small problems
and each small problem is individually solved until
the whole problem get solved.
• It helps designer a lot to identify and concentrate on
the problem more accurately. 5. Control Flow– It denotes the flow of control
Coupling & Cohesion between the module.
Coupling–It is the measure of the degree of 6. Physical Storage– Here, all the information are
interdependence between modules. A good software stored.
design has low coupling arrangements. Physical storage
System Analysis and Design 213 YCT
Transaction Analysis– Such types of structure Conditional line–It is drawn with a diamond and
chart are designed for the systems which receives an includes modules that are invoked on the basis of some
input which can be transformed by a sequence of condition
operations which can be carried out by one module. Purpose– Communicates that subordinate modules
Transform Analysis- These types of structure chart are invoked by the control module based on some
explains a system that processes a number of different condition.
types of transactions.
Program Flow Chart
• Program flow chart helps in defining the problems in a Symbol →
systematic and logical way.
• A flow chart is a graphical representation of various Data Couple– It contains an arrow and an empty
logical steps of a program. circle. It can be passed up or down and has a direction
• The program flow chart is a data flow that displays the that is denoted by the arrow.
data flow while writing a program or algorithm. Purpose– It communicates that data are being
passed from one module to another
• Program flow charts improve the condition and
efficiency of work and help in forming a relationship
between various elements to explain the data flow.
Structure Flow Chart
Control Couple– It contains an arrow and a filled-
• It is an important technique that helps the analyst
in-circle. It also has a direction that is represented by the
design the program for the new system.
arrow.
• It shows all the components of the code that must be
Purpose– Communicates that a message or a system
included in a program at a high level, arranged in a flag is being passed from one module to another.
hierarchical format that implies sequence, selection
and iteration.
• The components are usually read from top to bottom,
left to right, and they are numbered by a hierarchical An off-page Connector– It is denoted by the
numbering scheme in which lower level have an hexagon and has a title. It is used when the diagram is
additional level of numbering. too large to fit everything on the same page.
• A structure flow chart is composed of modules that Purpose– It identifies when parts of the diagram are
work together to form a program. continued on another page of the structure chart.
• The modules are depicted by a rectangle and
connected by lines which represent the passing of
control.
• A control module is a higher-level components that it Symbol →
calls and controls are considered subordinate note
modules. An-on-page connector– It is represented by the
Following are the structured flow chart elements– circle and has a title. It is used when the diagram is too
Module– Every module has a number, numec etc. large to fit everything in the same spot on a page.
Purpose– Denotes a logical piece of the program. Purpose– It identifies when parts of the diagram are
Library module It has a number, name and multiple continued somewhere else on the same page of the
instances within a diagram. structure chart
Purpose It denotes a logical piece of the program
that is repeated within the structure chart. Symbol →
Loop– A loop is drawn with a curved arrow and is
placed around lines of one or more modules that are
HIPO Documentation:- The full form of HIPO is
repeated.
hierarchical input process output. It is a combination of
Purpose– It communicates that a module is get
two organized method to analyze the system and provide
repeated. the means of documentations.
• HIPO model was developed by IBM in year 1978. It
Symbol → represent the hierarchy of modules in the software
system
System Analysis and Design 214 YCT
• System analyst uses HIPO diagram in order to obtain Some fundamental concepts of object-oriented
high-level view of system functions and it world are–
decomposes functions into sub functions in a Object– It represents an entity and basic building
hierarchical manner. block.
• HIPO diagrams are good for documentation purposes Class– It is a blue print of an object.
and their graphical representation makes it easier for Abstraction– It represents the behavior of an real
designers and managers to get the pictorial idea of the world entity.
system structure. Inheritance– It is a mechanism to create new
It also depicts the functions performed by system. classes from the existing ones.
Encapsulation– It is the process of binding the data
Object-oriented Modeling using UML together and hiding them from the outside world.
• An object-oriented system is made up of interacting Polymorphism– Polymorphism is the ability of any
objects that maintain their own local state and provide data to be processed in more than one form. It defines the
operation on that state. mechanism to exists in different forms
• The representation of the state is private and cannot be
accessed directly from outside the object. Testing .

• Object-oriented design processes involve designing Software Testing–


object classes and the relationships between these • Software testing is a process, to evaluate the
classes. functionality of a software application with an intent
• And these classes define the objects in the system and to find whether the developed software met the
their interaction. specified requirements or not and to identify the
• And when the design is realized as an executing defects to ensure that the product is defect-free in
program, the object are created dynamically from order to produce a quality product.
these class definitions. • Software testing is a process of software analysis and
• Object-oriented system become easy to change than defect detecting or we can say in other words "Testing
developed system using functional approaches. is the process of executing a program with intention of
• Objects can have data and operations to manipulate finding error".
the data and they may therefore be understood and • It is a process of identifying the correctness of
modified as stand-alone entities. software by considering its all attributes (such as
To develop a system design from concept to detailed, reliability, scalability, portability, reusability and
object-oriented design, these are various things that are usability) and evaluating the execution of software
required to do– components to get the software bugs or errors or
(i) Understand and define the context and external defects.
interactions with the system. Types of Software Testing:-
(ii) Designing the system architecture There are two types of software testing–
(iii) Identifying the principal objects in the system. Manual testing & Automation testing
(iv) Developing design models and
(v) Specifying interfaces.
• UML stands for Unified Modeling Language. It is a
standard language to specify, visualizing and
documenting the artifacts of software systems.
• Unified modeling language is different from other
common programming languages like C, C++, JAVA
etc. It is a pictorial language that is used to make
software blueprints.
• An unified modeling language is also described as the
successor of object-oriented analysis and design.
• A class explains an object and they form a hierarchy
which can be represented in the form of inheritance
and classes.
• Objects are the real-world entities which exists around
the basic concepts of OOPs such as abstraction ,
encapsulation, inheritance and polymorphism using
UML.
• Therefore, it becomes essential to learn OOPs before
UML.
System Analysis and Design 215 YCT
Manual Testing– It is the practice of testing of an • It is the last phase of testing after functional,
application manually to find defects and bugs. Test cases integration and system testing is over.
are executed manually, by a human without any support • It is a type of black box testing where two or more
from tools or scripts. end-users get involved.
It is further divided into three types of testing- • It does not focus on spelling errors, cosmetic errors or
White Box Testing– system testing.
• It is based on knowledge of the internal logic of an Non-functional Testing–
application's code and includes tests such as coverage
• It is defined to check non-functional, aspects (such as
of code statement, branches, paths, conditions etc.
performance, usability, reliability etc) of a software
• In white box testing, code are visible for the testers application
therefore, it is also known as clear box testing, glass
• It is basically designed to test the readiness of a
box testing, open box testing, transparent testing and
system as per non-functional parameters that cannot
code-based testing etc.
be addressed by functional testing.
Black Box Testing–
• It may have several other software testing such as–
• Black box testing is a method of software testing that
verifies the functionality of an application without Compatibility Testing–
having specific knowledge of the application's code or It is a type of software testing that checks whether
internal code structure. the software is capable of running on different hardware,
operating systems, applications, network environments
• Black box testing is based on requirements and
functionality or specifications. or mobile devices etc.
Performance Testing–
• Black box testing is also called as behavioral testing.
It is a software testing process used for testing the
It is of two types–
speed, response time, scalability, reliability seat ability
Functional Testing– It is based on functional
and resource usage of a software application under
requirements of a system and it is performed by a
particular workload.
software tester.
It consists of several other software testing's such as- • It is a subset of performance engineering and also
called as "Perf Testing"
Unit Testing–
• It is a type of testing where individual units or • The primary objective of performance testing is to
components of a software are tested. Here, the purpose identify and eliminate the performance bottlenecks in
is to validate that each unit of the software code the software application.
performs as expected. Types of performance testing are–
• The unit testing is conducted during the development • Load testing
(coding phase) of an application. • Stress testing
• Unit tests isolate a section of code and verify its • Volume testing
correctness. It can be an individual function, method, • Scalability testing
procedure, module or object as well. • Endurance testing
Integration Testing– Usability Testing–
• It is a type of testing where software modules are • It is also known as user experience testing (UET).
integrated logically and tested as a group
• It is a testing method for measuring how easy and
• It focuses on checking data communication amongst user-friendly a software application is.
these modules. Therefore, it is also called as 'I & T'
• Usability testing is recommended during the initial
(integration and testing), 'string testing' or thread testing.
phase of SDLC that provides more visibility on the
System Testing–
expectations of the users.
• It is a level of testing which validates the complete
• Usability testing determines whether an application is
and fully integrated software product.
useful, findable, accessible usable and desirable or
• It is a series of different tests whose sales purpose is to
not.
exercise the full computer based system etc.
• It consists of the following phases–
• The primary objective of system testing is to evaluate
the end to end system specifications.
User Acceptance Testing–
• It is a type of testing done by the end user or the client Scalability Testing
to verify or accept the software system before moving • It is a non-functional testing method that measures
the software application to the production performance of a system or network when the number
environment. of user requests are scaled up or down.
System Analysis and Design 216 YCT
• It ensures that system can handle projected increase in • The main purpose of smoke testing is to reject a
user traffic, data volume, transaction counts frequency software application with defects so that QA team
etc. may not waste time testing broken software
• The idea behind scalability testing is to measure at application.
what point the application stops scaling and identify Gorilla Testing
the reason behind it. • It is a software testing technique which focuses on
heavily testing of one particular module
Gray Box Testing–
• It is performed by quality assurance teams.
• It is combination of black box and white box testing
Alpha Testing
methods- testing a piece of software against its
• It is a type of software testing that is performed to
specification but using some knowledge of its internal identify bugs before releasing the software products to
workings. the real user or public.
• It is performed by either development or testing • It is also called as acceptance testing and it is done
teams. early on.
Maintenance Testing– Maintenance testing is a test Beta Testing
that is performed to either identify equipment Beta testing is the final testing before releasing
problems or to confirm that repair measures have been application for commercial purpose. It is generally
effective. performed by end-users or others.
Regression Testing Software Requirement Specification
• Regression testing is defined as a type of software • SRS is a document that describes what the software
testing to confirm that a recent program or code will do and how it will be expected to perform the
changes has not adversely affected the existing task.
features. • Software requirement specification also depicts the
functionality the product required to fulfill all
• It ensures that the old code still works once the latest
stakeholders needs.
code changes are done.
• SRS provides a complete picture of the entire project.
2. Automation Testing– Automation Testing is a • SRS is plan of action and keeps all the teams- from
software testing technique that performs using special development to maintenance on the same page.
automated testing software tools to execute a test case • Software requirement specification provides dept
suite. details than a system requirements specification.
Some Other Important Testing– Followings are the outline that must be during software
Ad-hoc testing– requirement specifications–
• It is done randomly and an unplanned activity which • Defining the purpose of products.
does not follow any documentation and test design • Description of product what is going to be built.
techniques to create test cases. • Providing specific requirement in details.
• It is an informal or unstructured software testing type • Deliver for approval.
that aims to break the testing process to find out Software Implementation and
possible defects or bugs at an early stage.
Basic Path Testing– Maintenance
• Basic path testing is a software box testing method in Software Implementation:
which test cases are defined based on flows or logical • Software implementation is the process of integrating
paths that can be taken through the program. an application into an organization's flow.
• It is a hybrid method of branch testing and path testing • It is used during the adoption of new application for
methods. project management, supply chain management and
• It helps to determine all the faults lying within a piece enterprise resource planning.
of code. • Software implementation is also performed when the
development team updates an existing application.
Big Bang Testing
Followings are the Elements of a Successful Software
It integrates individual program modules only when
Implementation–
everything is ready and performed by the testing teams. 1. Defining the organization's requirement.
Smoke Testing 2. Selecting the application
• Smoke testing is a software testing technique that is 3. Installing the application
performed post software build to verify that the 4. Configuring features.
critical functionalities of software are working fine. 5. Customizing features
• It is performed before any detailed functional or 6. Integrating with existing system
regression tests are executed. 7. Training employees.
System Analysis and Design 217 YCT
Software Maintenance– • It is often referred to as the linear and sequential
• Software maintenance is the general process of model or Stage-gate model for the flow of activities in
changing a system after it has been delivered. this model.
• The changes made to the software may be changes to • In this model, the software development activities
correct coding errors, more extensive changes to move to the next phase only after the activities in the
correct design errors, or significant enhancements to current phase are over.
correct specification errors or accommodate new • The waterfall model can be expanded into the v-
requirements. process model and this expansion is done by
• Changes are implemented by modifying existing expanding the testing process into different types of
system components and, where necessary, by adding testing which check the executable code against the
new components to the system. products of each of the activities in the project life
Different types of software maintenance are– cycle leading up to the coding.
Fault Repairs– Coding errors are usually relatively
cheap to correct, design errors are more expensive
because they may involve rewriting several program
components. Requirement errors are the most expensive
to repair because of the extensive system redesign which
may be necessary.
Environmental Adaptation (Adaptive Maintenance)
• This type of maintenance is required when some
aspect of the system's environmental such as
hardware, the platform operating system or other
support software changes.
• This application system must be modified to adapt it
to cope with these environmental changes.
Functionality Addition (Perfective Maintenance)
• This type of maintenance is required when the system
requirements change in response to business or
organizational change. Advantages of Waterfall Model–
• The scale of the changes required to the software is • Simple and easy to understand and use.
often much greater than for the other types of
maintenance. • Easy to manage due to the rigidity of the model
• In water fall model, phases are processed and
Other Software Development Approaches completed one at a time and it does not overlap.
Software development methodologies play a vital Disadvantages of Waterfall Model–
role in developing software system. In waterfall model, once an application is in the testing
• The main goal of it is to provide smooth software phase, it becomes very difficult to go back and change
development as per the requirement of project. something that was not well- thought out in the concept
• It is a framework that is used to structure, plan and phase.
control the process development of an information • High amount of risks and uncertainties.
system.
• It is not a good model for complex and object-oriented
Types of Software Development Approaches.
projects.
There are several types of software development
approaches. • Not apt for the projects where requirements are at a
moderate to high risk of changing.
Waterfall Model–
Spiral Model–
• Waterfall model is the 'Classical' model of system
development which is also known as one-shot or once- Spiral model is a risk-driven controlled prototyping
through model. approach that develops prototypes early in the
development process to specifically address risk areas
• There is a sequence of activities working from top to
bottom. followed by an assessment of prototyping results and
further determination of risk areas to prototype.
• The diagram given below displays some arrows
pointing upwards and backwards which indicates that • Areas which are prototyped frequently include user
a later stage may show the need for some extra work requirements and algorithm performance
at an earlier stage, but this can be the exception rather • Prototyping continues until high-risk areas are
than the rule. resolved and mitigated to an acceptable level.
System Analysis and Design 218 YCT
• In spiral model, during each iteration, the system is • In incremental model, each module passes through the
explored at greater depth and more detail is added. requirements design, implementation and testing
• Spiral model is appropriate for exploratory projects phases.
that are working in an unfamiliar domain or with
unproven technical approaches
• In spiral model, the iterative nature allows for
knowledge gained during early passes to inform
subsequent passes.
• It requires low up-front commitment.
• Following diagram demonstrates the spiral model

Advantages–
• More flexible & less costly to change scope and
requirements.
• Early to test and debug during iterations.
• Initial delivery cost is minimal.
Disadvantages-
• It requires clear and completes definition of the entire
system before breaking down and building
incrementally.
• Total cost can be high.
• It requires good planning and design.
Generic Process Model–
Advantage of Spiral Model– • The generic process model is an abstraction of the
software development process and it specifies the
• The risk management feature is one of the best
stages and order of a process.
development characteristics of the spiral model.
• It establishes the foundation for a complete software
• It is suitable for intricate and extensive projects. process by identifying a small number of framework
• Replacements and other demands for projects activities.
requirement in the spiral model are docile.
• It also includes a set of umbrella activities that are
• The early estimation cost of the project can be applicable across the entire software processes.
computed in the spiral model.
• A generic process framework for software
Disadvantage of Spiral Model– development encompasses five activities which have
• The spiral model is difficult to use since the volume of been mentioned in the below diagram.
documentation required in its initial stage is vast.
• Developing a spiral model is very expensive and small
projects may find it difficult to use.
• The spiral model depends on risk analysis and without
a highly experienced team developing this project is
impossible.
• It is not user-friendly especially for projects with an
unambiguous SRS. Software Prototyping–
Incremental Model– • This is one way in which we can buy knowledge and
• It determines the user needs and defines the overall reduce uncertainty.
architecture, but then delivers the system in a series of • A prototype is working model of one or more aspects
increments (software builds). of the projected system.
• In incremental model, multiple development cycles • It is constructed and tested quickly and inexpensively
take place to make the life cycle a "Multi-waterfall" in order to test out assumptions.
cycle. It is classified as–
• The cycles are get divided into smaller and more Throw-away Prototypes
easily managed modules. • It tests out some ideas and is then discarded when the
• It is a type of software development model such as V- true development of the operational system is
model, Agile model etc. commenced.
System Analysis and Design 219 YCT
• It can be developed using different software or • It predicts the efforts required for the software project.
hardware environment. • It depends on the number of lines of code for software
Evolutionary Prototypes– product development.
• It is developed and modified until it is finally in a state • It also estimates or predicts the required number of
where it can become the operational system. man-months (MM) for the full development of
• In this case, the standards which are used to develop software products.
the software have to be carefully considered. Software Development Life Cycle–
Rapid Application Development– • It is a process that produces software with the highest
• RAD is model which is also sometimes referred to as quality and lowest cost in the shortest time possible.
the rapid prototyping model. • It provides a well-structured flow of phases that help
• RAD has the features of both the prototyping and the an organization to quickly produce high- quality
incremental delivery models. software that is well-tested and ready for production
Major Objectives of RAD are– use.
• To decrease the time taken and the cost incurred to SDLC Six Phases– that has been given in the below
diagram.
develop software systems.
• To limit the costs of accommodating change requests
by incorporating them as early as possible before large
investments have been made on development and
testing.
Agile Model–
• It is also a type of incremental model and used for
time critical applications.
• Software is developed in incremental, rapid cycles and
this results in small incremental releases with each
release building on previous functionality.
Important Facts
• Each release is here thoroughly tested to ensure that
.

the quality of software is maintained. • Software project management comprises of a number


Advantages– of activities that contains project planning, project
estimation and scope management
• Face to face communication/conversation
• Program evaluation review technique (PERT) is a
• Close, daily cooperation between business people and
project management tool that provides a graphical
developers.
representation of a project's timeline and it can be
• Regular adaptation to changing circumstances. used to track the tasks of a project, when the
• Customers satisfaction by rapid, continuous delivery estimation of task time is fairly uncertain.
of useful of software. • The extent to which the software can continue to
Disadvantages– operate correctly despite the introduction of invalid
• Difficult to assess the effort required at the beginning inputs is called as robustness.
of the software development life cycle. • In software maintenance tackling the changes in the
• Lack of emphasis on the required designing and hardware or software environment where the software
documentation. work, is adaptive maintenance.
Software Cost Estimation– • Planning is a life-cycle concern.
• It is a process to predict or estimate the approximate • Communication planning becomes increasingly
cost of the software project before the development important in a virtual team environment.
gets started. • Top-down design does not require loop in variants.
• It explains the approximate requirements of efforts, • Waterfall model is simplest model in software
development time and resources to complete the development.
software project.
• A major defect in waterfall model in software
• It is very important processes to start development for development is that a trial version is available only at
software by considering all internal & external cost the end of the project.
factors. • Abstraction, generic and information hiding are
COCOMO Model (Algorithmic Model)– software engineering concepts that support Ada
• The full form for COCOMO is constructive cost language.
model. • Stage model prototyping is used to refine and establish
• It is mainly used for software cost estimation. requirements gathering.
System Analysis and Design 220 YCT
• The defect rate for six sigma is 3.4 defects per million • Characteristics of software are–
lines of code. It is developed or engineered and not manufactured in
• The chargeback scheme where the IT costs are defined the classical sense, it can be custom built or custom
in measurable events, transactions and functions that built and software does not "wear out".
are relevant to the business and outside the IT • RAD software process model stands for Rapid
organizations are resource or usage based, allocation Application Development
based and activity based costing. • Functional requirements, non-functional requirements
• The constructive cost model (COCOMO) model does and goal of implementation are desired in a good
not address the area of Mid architecture-state model. software requirement specification (SRS) document.
• The rational unified process correct sequence of four • Interoperability is the testing to ensure the WebApp
discrete phases in the software process is inception, properly interfaces with other applications or
elaboration, construction and transition. database.
• Mean Time Between Failure (MTBF) is the predicted • Line of code (LOC) of the product comes under direct
elapsed time between inherent failures of a measures.
mechanical or electronic system, during normal • Software requirement specification (SRS) is also
system operation. known as specification of black box testing.
• It is calculated as the arithmetic mean time between • In the context of modular software design, the
failures of a system. combination of high cohesion and low coupling is
desirable.
MTBF =
( Down time − Uptime )
• In the spiral model of software development, the
( Number of Failures ) primary determinant in selecting activities in each
iteration is risk.
• MTTR or Mean time to recovery is a software term
that measures the time period between a service being • Configuration management is concerned with
detected as "down" to a state of being "available" from controlling changes to the source code, controlling
a user's perspective. documentation charges and maintaining versions of
software.
Total Maintainance time • Black Box software testing method focuses on the
MTTR =
Number of repairs functional requirement of the software.
• A context model of a software system can be shown
• A simple measure of reliability is MTBF
by drawing a LEVEL-0 DFD.
Where MTBF = MTTF + MTTR • Activities which ensure that the software that has been
• The availability of the software with MTBF & MTTR built is traceable to customer requirement is covered
 MTBF  as part of modeling.
is given by availability =   × 100
 MTBF + MTTR  • A testing method, which is normally used as the
acceptance test for a software system, is integration
• Design specification checking and feasibility study is
testing.
not a valid step of requirement definition.
• Software life cycle model are spiral model,
• Software maintenance model are corrective
prototyping model and water fall model. Capability
maintenance, adaptive maintenance and perfective
maturity model (CMM) is a methodology to develop
maintenance. and refine an organization's software development
• If A is the total items consumed per year, P is the process.
procurement cost per order and C is annual inventory • The UML 2.0 diagrams such as use case diagram,
carrying cost per item, then the most economic activity diagram and state machine diagram capture
ordering quantity (EOQ) is equal to (2AP/C)1/2. behavioral aspects of a system.
• File conversion, user training and new changes to the • Dashed ellipse symbol denote derived attributes in ER
system belong to implementation phase of SDLC. model.
• Project risk factor is considered in spiral model. Brain • A software requirements specification (SRS)document
storming is related to application development should avoid discussing design specification.
strategies. • The incremental model is a result of combination of
• An approach which is very simple in its philophy elements of two models linear model and prototyping
where basically all the modules are constructed and model.
tested independently of each other and when they are • A key concept of quality control is that all work
finished, they are all put together at same time is Big- products have measurable specification for process
Bang strategy. outputs.
System Analysis and Design 221 YCT
• The correct order of activities corresponding to • The benefits of smoke testing are the quality of the
software testing are unit, integration, system and end product is improved, error diagnosis and
validation. correction are simplified and integration risk is
• RAD and prototyping models will not be able to give maximized.
the desired outcome if user's participation is not • The process of changing the software in such a way
involved. that it does not change external behaviour of the code
• Statistical testing is a software testing process in but improves the internal structure is called as
which the objective is to measure the reliability of the refactoring.
software rather than to discover software faults. • The attribute of software that measures software
• Specification phase of SDLC statistically, belongs to quality in terms of its process speed, response time
the maximum percentage of errors. and resource consumption is performance.
• The purpose of using capability maturity model • Agile methods of software development involve rapid
(CMM) is quality assurance accreditation. delivery of software, accept changing requirement and
there is a customer involvement.
• Maintenance phase of SDLC is most effected during
• In maintenance testing additional new tests may be
costly faults is introduced.
required apart from re-test and regression test and it
• Quality costs may be divided into costs associated
needs careful risk and impact analysis as its scope is
with prevention, appraisal and failure.
difficult. The correct order of conducting tests are
• Boundary value analysis in done through black box verification, unit testing, integration testing. System
testing. testing and then acceptance testing.
• The linear sequential model is an alternative name for • Condition coverage is white box-testing, boundary
water fall model. analysis and data equivalence partitioning is black-box
• The Booch Method, the Jacbson method and the testing while decision coverage is white-box testing.
Rumbaugh method are object-oriented software • The capability maturity model (CMM) level 5 defines
engineering analysis method. optimizing work processes in software development
• Create virtual machine, delete virtual machine and organization.
migrate virtual machine are function of hypervisor • Block-box testing is also called behavioral testing.
management software. • Glass box testing is also known as white-box testing
• The value of method inheritance factor provides an or structural test.
indication of the impact of inheritance on the object- • Graph-based testing, comparison testing and
oriented software. equivalence partitioning are black-box testing.
• An independently deliverable piece of functionality • Mc call's quality factors are characterised using three
providing access to its services through interface is aspects name them operation, revision and transition
called software component. approaches such as PSL/PSA, prototyping and
• Efficiency, reliability and stability is a non-functional structural analysis are used in software requirement.
requirement. • Logical design, conceptual design, planning and
• As per the distribution of maintenance effort, analysis are the steps of design process.
perfective maintenance has consumed maximum • Debugging is the part of defect analysis, defect
share. resolution and defect identification.
• Operating system, Database management system and • Construction and transition is applicable for unified
compilers are the example of infrastructure software. process.
• The use of 4GT without design will cause the • A software requirement specification (SRS) document
difficulties in quality, maintainability and customer should avoid discussing design specification.
acceptance. • The final form of testing COTs software is Beta
• The primary objective of formal technical reviews is testing.
to find errors. • COCOMO (Constructive cost model) is used to
• Basic path testing method enables the test case estimate effort and duration based on the size of the
designer to derive a logical complexity measures. software.
System Analysis and Design 222 YCT
• The ability of the system to handle incorrect inputs is • The major drawback of using RAD model are highly
called as robustness. specialized & skilled developers/designers are
• Stress testing, system testing and boundary value required and it increase reusability of components.
testing are validation activities. • The disadvantages of spiral model are high amount of
• White Box-testing can be started after installation. risk analysis, strong approval and documentation
• Live data items would not come under configuration control and additional functionality can be added at a
management of software. later date.
• Testing activity which is performed to expose defects • Extreme programming (XP) and Agile unified process
in the interfaces and in the interaction between (AUP) are agile software.
integrated components is integration level testing. • A graphical technique for finding if changes and
• Security testing is a type of functions testing which variation in metrics data are meaningful is called as
investigates the function relating to deflection of control chart.
threats such as virus from malicious outsiders. • Structural model in system modeling depicts the static
• A document called work break down structure is nature of the system.
created by decomposing the project scope into • The UML supports event-based modeling using state
smaller, more manageable elements. chart diagrams.
• The conditions immediately outside the software • Function-related metrics is related to the overall
system is called the environment. functionality of the delivered software.
• Coupling is a qualitative indication of the degree to • Estimation by analogy is application when other
which a module is connected to other modules and projects in the same analogy application domain have
outside world. been completed.
• The spiral of software development included project • Model preferred to create client/server application is
risks evaluation during each iteration. concurrent model.
• Life cycle of a process includes the states such as • Integration testing aims to identify interface errors.
New, Ready, Running, Waiting and terminated. • Prototyping model allows refining the requirements.
• Alpha and Beta testing are forms of acceptance • The approach of software testing is to design test
testing. cases to analyze the output of the software.
• For a software project, the spiral model was employed • Beta testing is carried out by users.
and it will stop when the software product is retired. • Regression testing is primarily related to maintenance
• Initial repeatable and optimized are maturity level as testing.
per capability maturity model. • Acceptance testing is done by customers.
• In UML diagram of a class state is represented as an
• Software configuration management is used to
attribute.
manage changes in the software.
• Rayleigh model is used for software reliability.
• An incremental process model delivers an operational
• To execute all loops at their boundaries and within product in each increment.
their operational bounds is an example of while-box
• The change control process starts with a change
texting.
request.
• Use case, class diagram and swimlane diagram are
• Use cases define the interactions between user and
UML diagram.
system.
• Early design stage model of COCOMO states that
• Quality metrics on reliability of the software include
once requirements have been stabilized, the basic
mean time between failures.
software architecture has been established.
• FP-Based Estimation and COCOMO use empirically • Beta testing is conducted at one or more customer
derived formulas to predict effort as a function of sites by the end-user of the software.
LOC or FP. • Black-box testing of software testing that examines
• Quick design, prototype refinement and engineer the functionality of an application without peering into
product are phases of prototyping model. its internal structures or workings.
System Analysis and Design 223 YCT
• A software engineer must design the modules with the • Data flow based testing are used for selection of test
goal of high cohesion and low coupling. cases during structural testing.
• "Spiral model is an incremental model" and it will • Top-down approach is generally applied for module
continue until the system retires. design phase while developing new software.
• Enforced disciplined approach is an advantage of • Data coupling has the weakest coupling.
waterfall modal.
• Mutation testing methods uses fault simulation
• The early prototyping model, the early design model technique.
and the post-architectural model are COCOMO-I
• The evolutionary software development model are
MODEL.
incremental model, WINWIN spiral model and
• Waterfall model is not suitable for accommodating
concurrent development model.
project.
• A client/server application should be developed
• Actual programming of software code is done during
preferably using incremental model.
the development and documentation step in the SDLC.
Regression testing is primarily related to maintenance • Valid category of software measurement metric are
testing. size-oriented metrics, function-oriented metrics and
• Exploratory decomposition techniques is used to extended function point metrics.
decompose problems whose underlying computations • Maintenance is the last phase in waterfall model.
correspond to a search of a space for solutions. • Functional requirement are I/O format, storage
• The period of time within which systems, applications structure and timing and synchronizations.
or functions must be recovered after an outage is • The lower degree of cohesion is kind of coincidental
recovery time objective. cohesion.
• Capability maturity model in software engineering is a • Technique used for finding a solution for optimizing
technique which is used to improve the software the given objective under certain constraint is called
process.
linear programming.
• A model which enables the developer to apply the
• Productivity, quality, efficiency and portability are a
prototyping at any stage in evolution of the product
process metric.
and which addresses the risks associated with software
development is risk. • Burn-in, burn-out useful life and wear out are the
• Unit testing is essentially a set of path test performed phases of "bathtub curve" of hardware reliability.
to examine the many different paths through the • Repeatable term is a level name in the capability
modules. maturity model.
• In software engineering, acceptance testing is also • Spiral model begins with customer communication.
known as Beta testing. • Alpha testing is done at developer's end.
• Cohesion is a qualitative indications of the degree to • Unit testing is not a non-functional testing. Non-
which a module focuses on just one thing. functional testing are load testing, performance testing
• Cyclomatic complexity is related to while-box testing and reliability testing.
method.
• STLC is related to V Model.
• Prototyping software development process in not
• The full form of STLC is software testing life cycle. It
necessarily useful for developing software for
is a sequence of specific actions performed during the
automating an existing manual system for a client.
testing process to ensure that the software quality
• The characteristics of a good software requirement
objectives are met. The STLC includes both
specification are completeness, verifiability and
verification and validation.
modifiability.
• In software development, UML diagrams are used • Risk Exposure (RE) is computed if P and L
during requirement analysis, system/module design corresponds to risk probability and loss respectively
and system integration. and it is given by RE = P×L
• A recognized software project type under COCOMO • (4n + 1) test cases a boundary value analysis yields for
model are embedded, semidetached and organic. a function of two various.
System Analysis and Design 224 YCT
Important Questions Asked in Previous Years Examinations
1. Which of the following is a kind of problem (c) hierarchy input processing output
solving techniques that improves the system (d) hierarchical input output process
and ensures all the components to function 10. In which year was HIPO model developed?
efficiently? (a) 1980 (b) 1979
(a) System Analysis (b) System Design (c) 1978 (d) 1990
(c) System Model (d) System testing 11. Which of the following testing is known as user
2. Which of the following is a process of defining experience testing?
elements of a system such as module, (a) Scalability testing
architecture components, their interfaces and (b) Usability testing
data for a system based on the specified (c) Compatibility testing
requirements? (d) Ad-hoc testing
(a) System Analysis (b) System Design 12. A testing which is done randomly and does not
(c) System Model (d) System defining follow any documentation and test design
3. Which of the following model is a 2D chart that techniques to create test cases is called as:
shows system elements and their linkages? (a) Ad-hoc testing
(a) Schematic model (b) Flow system model (b) Basic path testing
(c) Static model (d) Dynamic model (c) Big Bang testing
4. Which of the following is not element of a (d) User acceptance testing
system? 13. A software testing in which test cases are
(a) Input/output (b) Processor defined based on flows or logical paths that can
(c) Control & Feedback (d) Processing be taken through program is called
5. Which element of system does control the (a) Basic path testing
pattern of activities to govern input, processing (a) Big Bang testing
and output? (c) Non- functional testing
(a) Processor (b) Software (d) Performance testing
(c) Control (d) Feedback 14. Which of the following testing is the final
6. Which of the following is an information testing before releasing application for
gathering technique that allows the project commercial purposes?
team, users and management to work together (a) Alpha testing (b) Beta testing
to identify the requirements for the system? (c) Regression testing (d) Smoke testing
(a) Joint application development 15. A software testing techniques which focuses on
(b) Feasibility study heavily testing of one particular module is
known as
(c) Operational feasibility
(a) Alpha testing (b) Beta testing
(d) Technical feasibility
(c) Gorilla testing (d) Glass testing
7. Which of the following is the measure of the
16. Which of the following testing does ensure the
degree of interdependence between modules?
old code still works once the latest code changes
(a) Cohesion (b) Coupling
are done?
(c) Both (d) None of these (a) Alpha testing (b) Gorilla testing
8. Which of the following does denote the flow of (c) Smoke testing (d) Regression testing
data between the modules and represented by
17. Which of the following statement is correct
directed arrow with empty circle at the end? regarding software requirement specification
(a) Control flow (SRS)?
(b) Data flow (i) SRS is a document that describes what the
(c) Structured flow software will do and how it will be
(d) All of the above expected to perform the task.
9. The full form of HIPO is- (ii) Software requirement specification also
(a) hierarchical input/output process depicts the functionality of the product
(b) hierarchical input process output required to fulfill all stakeholders needs.
System Analysis and Design 225 YCT
(iii) It doesn't provide complete picture of the 24. Which of the following can not be
entire project. disadvantages of waterfall model?
(iv) It provides the depth details than a system (a) It might have high amount of risks and
requirements specification. uncertainties.
(a) (i) & (ii) (b) (i) (ii) & (iii) (b) It is apt for the projects where requirements
(c) (i) (ii) & (iv) (d) All of the above are at a moderate to high risk of changing.
18. Which of the following is not a type of software (c) It is not a good model for complex and
maintenance? object- oriented projects.
(a) Fault repairs (d) Once an application is in the testing phase, it
(b) Adaptive maintenance becomes very difficult to go back and change
(c) Perfective maintenance something.
(d) Corrective maintenance 25. In which model at the time of each iteration,
19. Which of the following statement is not true the system is explored at greater depth and
about Software Development Life Cycle? more details is added?
(a) It is a process that produces software with the (a) Waterfall model
highest quality and lowest cost in the shortest (b) Spiral model
time possible. (c) Generic process model
(b) It provides a well- structured flow of phases (d) Integration model
that help an organisation to quickly produce 26. Which of the following is also known as
high quality software. algorithmic model?
(c) It is well- tested and ready for production use. (a) Spiral model
(d) It is a process that produces software with the (b) Incremental model
highest quality and lowest cost in the shortest (c) COCOMO model
time possible. (d) Waterfall model
20. Which of the following model is used to 27. Which of the following can be used to track the
determine the user needs and defines the tasks of a project, when the estimation of task
overall architecture, but delivers the system in time is fairly uncertain?
a series of increment? (a) Decision table (b) Case tools
(a) Spiral model (c) DFD (d) PERT
(b) Incremental model UPPSC LT GRADE 29.07.2018
(c) Software development model 28. Software project management comprises of a
(d) Waterfall model number of activities, which contains:
21. The risk management feature is one of the best (a) Project planning
development characteristics of the …………. (b) Project estimation
(a) Waterfall model (c) Scope management
(b) Incremental model (d) All mentioned above
(c) Spiral model NIELIT Scientists-B 04.12.2016 (CS)
(d) Generic Model 29. The extent to which the software can continue
22. Which of the following model is often referred to operate correctly despite the introduction of
to as the linear or stage- gate model? invalid inputs is called as
(a) Incremental model (a) Reliability (b) Robustness
(b) Spiral model (c) Fault tolerance (d) Portability
(c) Generic Model ISRO Scientist/Engineer 2016 (July)
(d) Waterfall model 30. In software maintenance tackling the changes
23. Which of the following model is a risk- driven in the hardware or software environment
controlled prototyping approach that develops where the software works, is
prototypes early in the development process? (a) Corrective maintenance
(a) Spiral model (b) Perfective maintenance
(b) Waterfall model (c) Adaptive maintenance
(c) Joint application development (d) Preventive maintenance
(d) COCOMO model ISRO Scientist/Engineer 2017 (May)
System Analysis and Design 226 YCT
31. Which of the following is a life-cycle concern? (c) Information hiding
(a) Testing (b) Portability (d) All the given options
(c) Programming (d) Planning APPSC Lect. Degree College 07.06.2017 (CS)
Punjab PSC Lect. 2016 (IT) 38. Stage model Prototyping is used to
32. Which of the following becomes increasingly (a) test the software as an end product
important in a virtual team environment ? (b) expand design details
(a) Requirements engineering
(c) refine and establish requirements gathering
(b) Communication planning
(d) None of the given options
(c) Formal Procurements Closure
APPSC Lect. Degree College 07.06.2017 (CS)
(d) Network diagramming
39. What is the availability of the software with
Punjab State Civil Supplies Corp. Ltd. 13.11.2011
following reliability figures
33. Top-down design does not require
(a) step-wise refinement (b) loop in variants Mean Time Between Failures (MTBF) is 20
days
(c) flow charting (d) modularity
APPSC Lect. Degree College 07.06.2017 (CS) Mean Time To Repair (MTTR) is 20 hours
34. Which model is simplest model in software (a) 90% (b) 96%
development? (c) 24% (d) 50%
(a) Waterfall model ISRO Scientist/Engineer 2020
(b) Prototyping model 40. What is the defect rate for Six sigma?
(c) Iterative model (a) 1.0 defect per million lines of code
(d) None of the given options (b) 1.4 defects per million lines of code
APPSC Lect. Degree College 07.06.2017 (CS) (c) 3.0 defect per million lines of code
35. A major defect in waterfall model in software (d) 3.4 defects per million lines of code
development is that ISRO Scientist/Engineer 2020
(a) the documentation is difficult 41. The chargeback scheme where the IT costs are
(b) a blunder at any stage can be disastrous defined in measurable events, transactions and
(c) a trial version is available only at the end of functions that are relevant to the business and
the project outside the IT organization is:
(d) the maintenance of the software is difficult (a) Resource or usage based
APPSC Lect. Degree College 07.06.2017 (CS)
(b) Allocation based
36. What is the appropriate pairing of items in the
(c) Activity based costing
two columns listing various activities
(d) Product or service based
encountered in a software cycle?
UPSC Poly Lect. 10.03.2019
P Requirements 1. Module
Capture development and 42. The Constructive Cost Model (COCOMO)
Integration model does not address the area of
Q Design 2. Domain Analysis (a) Application composition model
(b) Early design stage model
R Implementation 3. Structural and
Behavioral Modeling (c) Post architecture
S Maintenance 4. Performance Tuning (d) Mid architecture-stage model
(a) P–3, Q–2, R–4, S–1 RPSC ACF FRO 23.02.2021 (Comp. App./Sci.)
(b) P–2, Q–3, R–1, S–4 43. The Rational Unified Process correct sequence
(c) P–3, Q–2, R–1, S–4 of four discrete phases in the software process
(d) P–2, Q–3, R–4, S–1 is
APPSC Lect. Degree College 07.06.2017 (CS) (a) Inception, Elaboration, Construction, Transition.
37. Which of the following software engineering (b) Elaboration, Construction, Inception, Transition.
concepts does Ada language support? (c) Construction, Inception, Elaboration, Transition.
(a) Abstraction (d) Construction, Transition, Inception, Elaboration.
(b) Generic RPSC ACF FRO 23.02.2021 (Comp. App./Sci.)
System Analysis and Design 227 YCT
44. If A is the total items consumed per year, P is (c) Writing the creative brief
the procurement cost per order and C is annual (d) All of the above
inventory carrying cost per item, then the most UPPSC LT GRADE 29.07.2018
economic ordering quantity (EOQ) is equal to: 51. An approach which is very simple in its
1 philosophy where basically all the modules are
(a) (A. P/C)2 (b) ( 2A P / C ) 2 constructed and tested independently of each
(c) 2A P / C (d) A2 P/C other and when they are finished, they are all
put together at same time is:
(e) A. P/C
(a) Top-Down strategy
CGPSC Asstt. Prof. 2014 (Comp. App.)
(b) Bottom-Up strategy
45. Which is not a valid tool for Software Quality (c) Big-Bang strategy
Assurance (SQA) ? (d) Breadth-First strategy
(a) Inspection UPSC Poly Lect. 10.03.2019
(b) Auditing 52. What are the characteristics of software?
(c) Mean Time Between Failure (MTBF) (a) Software is developed or engineered; it is not
(d) Technical Review manufactured in the classical sense.
RPSC VPITI 2018 (CS) (b) Software can be custom built or custom build.
46. Which is not a valid step of requirement (c) Software doesn't "wear out"
definition ? (d) All mentioned above
(a) Requirements gathering (elicitation) NIELIT Scientists-B 04.12.2016 (CS)
(b) Analyse and model the requirements 53. RAD Software process model sands for:
(c) Design specification checking and feasibility (a) Rapid Application Development.
study. (b) Rapid Application Design.
(d) Review and validate SRS and get (c) Relative Application Development.
confirmation from users (d) Recent Application Development.
RPSC VPITI 2018 (CS) NIELIT Scientists-B 04.12.2016 (CS)
54. What is the appropriate pairing of items in the
47. Which one is not a software maintenance
two columns listing various activities
model ?
encountered in a software life cycle?
(a) Corrective maintenance
P. Requirements Capture 1. Module
(b) Effective maintenance Development
(c) Adaptive maintenance and Integration
(d) Perfective maintenance Q. Design 2. Domain Analysis
RPSC VPITI 2018 (CS) R. Implementation 3. Structural and
48. Which of the following activities does not Behavioral
belong to implementation phase of SDLC? Marketing
(a) Program testing S. Maintenance 4. Performance
(b) File conversion tuning
(c) User training (a) P-3, Q-2, R-4, S-1 (b) P-2, Q-3, R-1, S-4
(d) New changes to the system (c) P-3, Q-2, R-1, S-4 (d) P-2, Q-3, R-4, S-1
UPPSC LT GRADE 29.07.2018 NIELIT Scientists-B 22.07.2017 (CS)
49. Project risk factor is considered in 55. What is the testing to ensure the WebApp
properly interfaces with other applications or
(a) waterfall model
databases?
(b) prototyping model (a) Compatibility (b) Interoperability
(c) spiral model (c) Performance (d) Security
(d) iterative enhancement model NIELIT Scientists-B 04.12.2016 (IT)
UPPSC LT GRADE 29.07.2018 56. Software Requirement Specification (SRS) is
50. What is related to application development also known as specification of:
strategies? (a) White box testing (b) Integrated testing
(a) Brainstorming (c) Acceptance testing (d) Black box testing
(b) Technical planning NIELIT Scientists-B 04.12.2016 (IT)
System Analysis and Design 228 YCT
57. Which of the following is not defined in a good (c) Functional Requirement of the software
Software Requirement Specification (SRS) (d) Independent paths of the software
document? ISRO Scientist/Engineer 2011
(a) Functional Requirement. 64. A context model of a software system can be
(b) Goals of implementation. shown by drawing a
(c) Nonfunctional Requirement. (a) LEVEL-0 DFD (b) LEVEL-1 DFD
(d) Algorithm for software implementation (c) LEVEL-2 DFD (d) LEVEL-3 DFD
NIELIT Scientists-B 04.12.2016 (IT) ISRO Scientist/Engineer 2011
58. Match the following: 65. Activities which ensure that the software that
(P) Condition coverage (i) Black-box testing has been built, is traceable to customer
(Q) Equivalence class (ii) System testing requirement is covered as part of
partitioning (a) Verification (b) Validation
(R) Volume testing (iii) White-box testing (c) Maintenance (d) Modeling
(S) Alpha testing (iv) Performance testing ISRO Scientist/Engineer 2009
(a) P-ii, Q-iii, R-i, S-iv (b) P-iii, Q-iv, R-ii, S-i 66. A Testing method, which is normally used as
(c) P-iii, Q-i, R-iv, S-ii (d) P-iii, Q-i, R-ii, S-iv the acceptance test for a software system, is
GATE 2015 (Shift-I) (a) Regression Testing (b) Integration Testing
59. In the context of modular software design, (c) Unit Testing (d) System Testing
which one of the following combinations is
ISRO Scientist/Engineer 2009
desirable?
67. In the context of modular software design,
(a) High cohesion and high coupling
which one of the following combinations is
(b) High cohesion and low coupling
desirable?
(c) Low cohesion and high coupling
(a) High cohesion and high coupling
(d) Low cohesion and low coupling
(b) High cohesion and low coupling
GATE 2014 (Shift-III)
(c) Low cohesion and high coupling
60. In the spiral model of software development,
(d) Low cohesion and low coupling
the primary determinant in selecting activities
in each iteration is ISRO Scientist/Engineer 2017 (May)
(a) Iteration size 68. Which of the following is not a life cycle model?
(b) Cost (a) Spiral model
(c) Adopted process such as Rational Unified (b) Prototyping model
Process of Extreme Programming (c) Waterfall model
(d) Risk (d) Capability maturity model
ISRO Scientist/Engineer 2016 (July) ISRO Scientist/Engineer 2017 (May)
61. Which one of the following is a functional 69. Capability Maturity Model (CMM) is a
requirement? methodology to
(a) Maintainability (b) Portability (a) develop and refine an organization's software
(c) Robustness (d) None of the mentioned development process
ISRO Scientist/Engineer 2016 (July) (b) develop the software
62. Configuration management is not concerned (c) test the software
with (d) all of the above
(a) Controlling changes to the source code ISRO Scientist/Engineer 2017 (May)
(b) Choice of hardware configuration for an 70. Which of the following UML 2.0 diagrams
application capture behavioural aspects of a system?
(c) Controlling documentation charges (a) Use Case Diagram, Object Diagram, Activity
(d) Maintaining versions of software Diagram and State Machine Diagram
ISRO Scientist/Engineer 2016 (July) (b) Use Case diagram, Activity Diagram, and
63. Black Box software testing method focuses on the State Machine Diagram
(a) Boundary condition of the software (c) Object Diagram, Communication Diagram,
(b) Control Structure of the software Timing Diagram, and Interaction diagram
System Analysis and Design 229 YCT
(d) Object Diagram, Composite Structure Diagram, 78. The incremental Model is a result of
Package Diagram, and Deployment Diagram combination of elements of which two models?
ISRO Scientist/Engineer 2017 (May) (a) Build & Fix Model and Waterfall Model
71. Estimation of software development effort for (b) Linear Model and RAD Model
organic software in basic COCOMO is (c) Linear Model and Prototyping Model
(a) E = 2.0 (KLOC)1.05 PM (d) Waterfall model and RAD Model
(b) E = 3.4 (KLOC)1.06 PM RPSC VPITI 2014 (IT)
(c) E = 2.4 (KLOC)1.05 PM 79. Find out the correct order of activities
(d) E = 2.4 (KLOC)1.07 PM corresponding to software testing
(a) Unit, integration, system, validation
ISRO Scientist/Engineer 2017 (May)
(b) system, integration, unit, validation
72. A software requirements specification (SRS)
(c) unit, integration, validation, system
document should avoid discussing which one of
(d) none of these
the following ?
RPSC VPITI 2014 (IT)
(a) User interface issues
80. Which two of the following models will not be
(b) Non-functional requirements
able to give the desired outcome if user's
(c) Design specification participation is not involved?
(d) Interfaces with third party software (a) Waterfall and spiral
GATE 2015 (Shift-II) (b) RAD and Spiral
73. Which symbol denote derived attributes in ER (c) RAD and Waterfall
Model? (d) RAD and Prototyping
(a) Double ellipse RPSC VPITI 2014 (IT)
(b) Dashed ellipse 81. Statistical testing is a software testing process
(c) Squared ellipse in which the objective is to measure the…….. of
(d) Ellipse with attribute name underlined the software rather than to discover software
ISRO Scientist/Engineer 2017 (May) faults.
74. In which testing all the modules of the system (a) availability (b) reliability
are tested and integrated as complete system (c) reusability (d) all of these
(a) Bottom up testing (b) Top- down testing RPSC VPITI 2014 (IT)
(c) Sandwich testing (d) Big-Bang testing 82. Which phase of SDLC statistically, belongs to
the maximum percentage of errors
RPSC VPITI 2014 (IT)
(a) Design
75. …….model couples the iterative nature of the
(b) Implementation and Coding
prototyping with the controlled and systematic
(c) Specification
aspects of the linear sequential model.
(d) Testing
(a) Spiral
RPSC Lect. 2014
(b) Rapid Application Development (RAD)
83. The purpose of using Capability Maturity
(c) Iterative Development
Model (CMM) is?
(d) Incremental Development (a) Inventory control
RPSC VPITI 2014 (IT) (b) Production control
76. How Risk Exposure (RE) is computed if P and (c) Quality assurance accreditation
L corresponds to risk probability and loss (d) None of the above
respectively RPSC Lect. 2014
(a) RE= P/L (b) RE= P+L 84. Which model of software development is best
(c) RE= P*L (d) RE= 2*P*L suited if requirements are easily
RPSC VPITI 2014 (IT) understandable and defined?
77. How many test cases a boundary value analysis (a) Waterfall model
yields for a function of two variables. (b) Prototyping model
(a) 4n+3 (b) 4n+1 (c) Iterative enhancement model
(c) n+4 (d) None of these (d) Spring model
RPSC VPITI 2014 (IT) RPSC Lect. 2014
System Analysis and Design 230 YCT
85. What are characteristic required for a good (b) Spiral model
Software Requirement Specification (SRS)? (c) Incremental process model
(a) Correctness (b) Completeness (d) Generic model
(c) Consistency (d) All of the above RPSC VPITI 2018 (IT)
RPSC Lect. 2014 94. A key concept of quality control is that all work
86. Which phase of SDLC is most effected during, products
Costly faults is introduced? (a) are delivered on time and under budget
(a) Analysis (b) Design (b) have complete documentation
(c) Coding (d) Maintenance (c) have measureable specification for process
RPSC Lect. 2014 outputs
87. Quality costs may be divided into costs (d) are thoroughly tested before delivery to the
associated with prevention, appraisal and customer
(a) failure (b) compliant RPSC VPITI 2014 (IT)
(c) control (d) normalization 95. Which of the following is not good test
RPSC VPITI 2018 (IT) characteristics?
88. Boundary value analysis is done through (a) A good test has a high probability of finding
(a) White box testing (b) Black box testing an error.
(c) Regression testing (d) Conditional testing (b) A good test is redundant.
RPSC VPITI 2018 (IT) (c) A good test should be best of breed.
89. The linear sequential model is an alternative (d) A good test should be neither too simple nor
name for too complex.
(a) Waterfall model (b) Spiral model TRB Poly. Lect. 2017
(c) Prototype model (d) RAD model 96. The value of ______ provides an indication of
RPSC VPITI 2018 (IT) the impact of inheritance on the object oriented
90. Which is not an object oriented Software software.
Engineering Analysis method? (a) Method inheritance factor
(a) The Booch Method (b) Coupling factor
(b) The Jacbson Method (c) Cohensive factor
(c) The Rumbaugh Method (d) Cpmplexity metrics
(d) The Rj-jindale Method TRB Poly. Lect. 2017
RPSC VPITI 2018 (IT) 97. An Independently deliverable piece of
91. Integration testing in the small functionality providing access to its services
(a) Tests the individual components that have through interface is called:
been developed. (a) Software measurement
(b) Only uses components that form part of the (b) Software composition
line system. (c) Software maintenance
(c) Tests interactions between modulus or (d) Software component
subsystems. TRB Poly. Lect. 2017
(d) Tests interfaces to other systems. 98. Which one of the following is not a non-
RPSC VPITI 2018 (IT) functional requirement?
92. The first step in software development life cycle (a) efficiency (b) reliability
(a) Software Requirement Specification (c) product features (d) stability
(b) System Design TRB Poly. Lect. 2017
(c) System Testing 99. As per the distribution of maintenance effort,
(d) None which type of maintenance has consumed
RPSC VPITI 2018 (IT) maximum share?
93. Which of the following is not a software (a) Adaptive (b) Corrective
engineering paradigm? (c) Perfective (d) Preventive
(a) Waterfall model TRB Poly. Lect. 2017
System Analysis and Design 231 YCT
100. Which one of the following is not a 106. Which of the following is NOT a benefit of
infrastructure software? smoke testing?
(a) Operating system (a) Integration risk is maximised
(b) Database Management System (b) The quality of the end product is improved
(c) Compilers (c) Error diagnosis and correction are simplified
(d) Result Management System (d) Progress is easier to assess
TRB Poly. Lect. 2017 APPSC Poly. Lect. 13.03.2020
101. The use of 4 GT without____ will cause the 107. Which of the following is NOT true about the
difficulties in quality, maintainability and waterfall model?
customer acceptance. (a) It is a classic life cycle model
(a) data structure (b) testing (b) It is linear model
(c) design (d) information gathering (c) It is a phased model
TRB Poly. Lect. 2017 (d) It supports backtracking
102. The primary objective of formal technical
APPSC Poly. Lect. 13.03.2020
reviews is to:
108. CMMI is a short form for which of the
(a) fix errors (b) find errors
following?
(c) clear errors (d) modify errors
(a) Capability Maturity Model Integration
TRB Poly. Lect. 2017
(b) Code Maturity Model Integration
103. _____ testing method enables the test case
(c) Custom Maturity Model Integration
designer to derive a logical complexity
measure. (d) Capability Mode Maturity Integration
(a) Control structure testing APPSC Poly. Lect. 13.03.2020
(b) Basic path testing 109. The process of changing the software in such a
(c) Orthogonal array testing way that it does not change external behaviour
(d) Scenario- based testing of the code but improves the internal structure
is known as:
TRB Poly. Lect. 2017
(a) Refactoring (b) Rechanging
104. What is the appropriate pairing of items in the
two columns that list various activities (c) Redesigning (d) Factoring
encountered in a Software life cycle? APPSC Poly. Lect. 13.03.2020
P. Requirement Capture 1. Module Development 110. The attribute of software that measures
and Integration software quality in terms of its process speed,
response time and resource consumption is:
Q. Design 2. Domain Analysis
(a) Performance (b) Usability
R. Implementation 3. Structural and
(c) Adaptability (d) Reliability
Behavioural
Modeling APPSC Poly. Lect. 13.03.2020
111. Which of the following is NOT true about agile
S. Maintenance 4. Performance Tuning
methods of software development?
(a) P-3, Q-2, R-4, S-1 (b) P-2, Q-3, R-1, S-4
(a) They involve rapid delivery of software
(c) P-3, Q-2, R-1, S-4 (d) P-2, Q-3, R-4, S-1
(b) There is a customer involvement
APPSC Poly. Lect. 13.03.2020
(c) They are complex
105. Which of the following option is NOT a part of
(d) They accept changing requirement
regression suite?
(a) A representative sample of tests that will APPSC Poly. Lect. 13.03.2020
exercise all software functions 112. Consider the following test processes :
(b) Additional tests that focus on software functions 1. Acceptance testing
that are likely to be affected by the change 2. System testing
(c) Tests that focus on the software components 3. Verification
that have been changed 4. Unit testing
(d) Only those tests that do not address one or 5. Integration testing
more classes of errors Which is the correct order of conducting, these
APPSC Poly. Lect. 13.03.2020 tests?
System Analysis and Design 232 YCT
(a) 3, 4, 5, 2 and 1 (b) 4, 3, 5, 2 and 1 119. Which of the following is not a step of design
(c) 3, 2, 5, 4 and 1 (d) 4, 2, 5, 3 and 1 process
UPSC Senior Scientific Officer Grade-II 16.07.2017 (a) Logical design
113. Consider the following statements : (b) Conceptual design
1. Condition coverage is Black-Box testing (c) Planning and analysis
2. Boundary analysis is Black-Box testing (d) Testing
3. Decision coverage is White-Box testing UPPCL AE 2014
4. Data Equivalence partitioning is Black-Box 120. Debugging is not a part of which of the
testing following
(a) Defect analysis (b) Defect resolution
Which of the above statements are correct?
(c) Testing (d) Defect identification
(a) 2, 3 and 4 (b) 1, 2 and 4
UPPCL AE 2014
(c) 1, 2 and 3 (d) 1, 3 and 4
121. Which of the phases is not applicable for the
UPSC Senior Scientific Officer Grade-II 16.07.2017
unified process?
114. The Capability Maturity Model (CMM) level 5
(i) Inspection, (ii) Elaboration
defines :
(iii) Construction (iv) Transition
(a) Initial mature work process in software
(a) (i), (ii) and (iii) (b) (i), (ii) and (iv)
development organization
(c) (ii) and (iii) (d) (i) and (ii)
(b) Managed work processes in software
UPPCL AE 2014
development organization
122. A software Requirements Specification (SRS)
(c) Optimizing work processes in software
document should avoid discussing which one
development organization of the following?
(d) Repeatable work process in software (a) User Interface issues
development organization (b) Non- functional requirements
UPSC Senior Scientific Officer Grade-II 16.07.2017 (c) Design specification
115. Black box testing is also called (d) Interfaces with third party software
(a) Data flow testing (b) Loop testing RPSC ACF & FRO 23.02.2021 (CS)
(c) Behavioral testing (d) Graph based testing 123. Which one is not right in the reference of Black
UPSC Senior Scientific Officer Grade-II 16.07.2017 Box Testing?
116. Which of the following is not a black box (a) Internal workings of an application are not
testing? required.
(a) Glass box testing (b) Also know as clear box/ structural testing.
(b) Equivalence partitioning (c) This can only be done by trial and error
(c) Graph-Based testing method.
(d) Comparison testing (d) Also known as closed box/ data driven
UPPCL AE 2014 testing.
RPSC ACF & FRO 23.02.2021 (CS)
117. Mc Call's quality factors are characterised
using three aspects name them 124. The final form of testing COTS soft ware is?
(a) Unit (b) Integration
(a) Processes, revision, transition
(c) Alpha (d) Beta
(b) Management, Operation, transition
RPSC ACF & FRO 23.02.2021 (CS)
(c) Operation, revision, transition
125. Match the following:
(d) Management, Operation, revision
A. Maintainability (i) Must be usable by the
UPPCL AE 2014 users for which it was
118. In software requirement which approach is not designed
used in analysis model.
B. Dependability (ii) Ability to meet the
(a) PSL/PSA changing needs of
(b) Prototyping customers
(c) Analysis patterns C. Efficiency (iii) Optimal use of resources
(d) Structural analysis D. Acceptability (iv) Ability to withstand the
UPPCL AE 2014 events of system failure
System Analysis and Design 233 YCT
Matches: 131. White box testing can be started
A B C D (a) After SRS creation
(a) (ii) (i) (iv) (iii) (b) After installation
(b) (ii) (iv) (iii) (i) (c) After Programming
(b) (i) (iv) (iii) (ii) (d) Anytime in SDLC
(d) (ii) (i) (iii) (iv) Punjab State Civil Supplies Corp. Ltd. 13.11.2011
RPSC ACF & FRO 23.02.2021 (CS) 132. Which of the following items would not come
126. The system design process does not include under Configuration Management of
(a) modularity (b) cohesion Software?
(c) coupling (d) None of these (a) live data
RPSC ACF & FRO 23.02.2021 (CS) (b) test documentation
127. COCOMO (Constructive Cost Model) is used (c) operating systems
to estimate (d) user requirement document
(a) effort and duration based on the size of the Punjab State Civil Supplies Corp. Ltd. 13.11.2011
software 133. Testing activity which is performed to expose
(b) size and duration based on the effort of the defects in the interfaces and in the interaction
software between integrated components is :-
(c) effort and cost based on the duration of the (a) System Level Testing
software (b) Integration Level Testing
(d) size, effort and duration based on the cost of (c) Unit Level Testing
the software (d) Component Testing
RPSC ACF & FRO 23.02.2021 (CS) Punjab State Civil Supplies Corp. Ltd. 13.11.2011
128. The ability of the system to handle incorrect 134. A Type of functional Testing, which investigates
inputs is called as the function relating to deflection of threats, such
(a) Accuracy (b) Reliability as virus from malicious outsiders.
(c) Correctness (d) Robustness (a) Security Testing
RPSC ACF & FRO 23.02.2021 (CS) (b) Recovery Testing
129. Which of the following are validation activities: (c) Performance Testing
(i) Code Review (d) Functionality Testing
(ii) Stress Testing Punjab State Civil Supplies Corp. Ltd. 13.11.2011
(iii) System Testing 135. A document called _____________ is created
(iv) Document Verification by decomposing the project scope into smaller,
(v) Boundary Value Testing more manageable elements.
(a) (i), (v) (b) (i), (iv) (a) Scope Statement
(c) (ii), (iii), (v) (d) All of these (b) Network Logic Diagram
RPSC ACF & FRO 23.02.2021 (CS) (c) Work Breakdown Structure
130. The coupling between different modules of a (d) Requested Change
software is categorized as follows: Punjab State Civil Supplies Corp. Ltd. 13.11.2011
I. Content coupling 136. Which should be included in a Requirements
II. Common coupling management plan?
III. Control coupling (a) The document should trace requirements to
IV. Stamp coupling project scope/WBS deliverables.
V. Data coupling (b) It should describe how requirements activities
Coupling between modules can be ranked in will be planned, tracked, and reported.
the order of strongest (least desirable) to (c) It should trace high-level requirements to
weakest (most desirable) as follows: more detailed requirements.
(a) I-II-III-IV-V (b) V-IV-III-II-I (d) It should trace requirements to business
(c) I, III-V-II-IV (d) IV-II-V-III-I needs, opportunities, goals, and objectives.
Punjab PSC Lect. 2016 (IT) Punjab State Civil Supplies Corp. Ltd. 13.11.2011
System Analysis and Design 234 YCT
137. The conditions immediately outside the 144. In UML diagram of a class
software system is called (a) state of object cannot be represented
(a) the boundary (b) state in irrelevant
(b) the graphical user interface (c) state is represented as an attribute
(c) the environment (d) state is represented as a result of an operation
(d) None of the Above ISRO Scientist/Engineer 2007
Punjab State Civil Supplies Corp. Ltd. 13.11.2011 145. Which of the following models is used for
138. Coupling is a qualitative indication of the software reliability?
degree to which a module (a) Waterfall (b) Musa
(a) Can be written more compactly (c) COCOMO (d) Rayleigh
(b) Is connected to other modules and outside ISRO Scientist/Engineer 2007
world 146. To execute all loops at their boundaries and
(c) Is table to complete its function in a timely within their operational bounds is an example of
manner (a) Black Box Testing (b) alpha Testing
(d) Focuses on Just one thing (c) Recover testing (d) white Box testing
Punjab State Civil Supplies Corp. Ltd. 13.11.2011 ISRO Scientist/Engineer 2007
139. The spiral model of software development 147. Which of the following is not a UML
(a) Ends with delivery of software product DIAGRAM?
(b) Is more chaotic than incremental model (a) Use Case
(c) Includes project risks evaluation during each (b) Class Diagram
iteration (c) Analysis Diagram
(d) Risky model that rarely produces a (d) Swimlane Diagram
meaningful product ISRO Scientist/Engineer 2007
Punjab State Civil Supplies Corp. Ltd. 13.11.2011 148. Which version of COCOMO states that once
140. Life cycle of a process includes the following requirements have been stabilized, the basic
software architecture has been established?
states:
(a) Early design stage model
(a) Newborn, Ready, Running, Waiting and
Terminated (b) Post-architecture-stage model
(c) Application composition model
(b) Initiated, Ready, Running, Waiting and Halted
(d) All of the above
(c) New, Ready, Running, Blocked and Terminated
GPSC Asstt. Prof. 30.06.2016
(d) New, Ready, Running waiting and terminated
149. A 66.6% risk is considered as
Karnataka PSC Comp. Sci. Teacher 16.10.2017
(a) very low (b) low
141. Alpha and beta testing are forms of
(c) moderate (d) high
(a) Acceptance testing (b) Integration testing
GPSC Asstt. Prof. 30.06.2016
(c) System testing (d) Unit testing
150. Which of the following uses empirically derived
ISRO Scientist/Engineer 2015 formulas to predict effort as a function of LOC
142. For a software project, the spiral model was or FP?
employed. When will the spiral stop? (a) FP-Based Estimation
(a) When the software product is retired (b) Process-Based Estimation
(b) When the software product is released after (c) COCOMO
Beta testing (d) Both (a) and (c)
(c) When the risk analysis is completed GPSC Asstt. Prof. 30.06.2016
(d) After completing five loops 151. Which one of the following is not a phase of
ISRO Scientist/Engineer 2014 Prototyping Model?
143. Which of the following is not a maturity level (a) Quick Design
as per Capability Maturity Model? (b) Coding
(a) Initial (b) Measurable (c) Prototype Refinement
(c) Repeatable (d) Optimized (d) Engineer Product
ISRO Scientist/Engineer 2014 GPSC Asstt. Prof. 30.06.2016
System Analysis and Design 235 YCT
152. What is the major drawback of using RAD (c) Size-related metrics
Model? (d) None of the above
(a) Highly specialized & skilled developers/ GPSC Asstt. Prof. 30.06.2016
designers are required 160. Which technique is applicable when other
(b) Increase reusability of components projects in the same analogy application
(c) Encourages customer/client feedback domain have been completed?
(d) Both (a) and (b) (a) Algorithmic cost modeling
GPSC Asstt. Prof. 30.06.2016 (b) Expert Judgement
153. Identify the disadvantage of Spiral Model. (c) Estimation by analogy
(a) Doesn't work well for smaller projects (d) Parkinson's law
(b) High amount of risk analysis GPSC Asstt. Prof. 30.06.2016
(c) Strong approval and documentation control 161. Model preferred to create client/server
(d) Additional Functionality can be added at a applications is
later date (a) WINWIN Spiral Model
GPSC Asstt. Prof. 30.06.2016 (b) Spiral Model
154. Which one of the following is not agile method? (c) Concurrent Model
(a) XP (b) 4GT (d) Incremental Model
(c) AUP (d) All of the above GPSC Asstt. Prof. 30.06.2016
GPSC Asstt. Prof. 30.06.2016 162. Integration testing aims to identify:
155. Which of the following does not apply to agility (a) SRS errors (b) Analysis errors
to a software process?
(c) Interface errors (d) Design errors
(a) Uses incremental product delivery strategy
(e) Semantic errors
(b) Only essential work products are produced
CGPSC Asstt. Prof. 2014 (CS)
(c) Eliminate the use of project planning and
163. Which of the following software development
testing
models allows refining the requirements?
(d) All of the above
(a) Waterfall model
GPSC Asstt. Prof. 30.06.2016
(b) Incremental model
156. A graphical technique for finding if changes
(c) spiral model
and variation in metrics data are meaningful is
known as (d) Prototyping model
(a) DRE (Defect Removal Efficiency) (e) Rapid application development model
(b) Function points analysis CGPSC Asstt. Prof. 2014 (CS)
(c) Control Chart 164. The process of software modifications to match
(d) All of the above changes in the ever changing environment is
termed as:
GPSC Asstt. Prof. 30.06.2016
157. Which model in system modelling depicts the (a) Assertive maintenance
static nature of the system? (b) Corrective maintenance
(a) Behavioral Model (b) Context Model (c) Adaptive maintenance
(c) Data Model (d) Structural Model (d) Perfective maintenance
GPSC Asstt. Prof. 30.06.2016 (e) Preventive maintenance
158. The UML supports event-based modeling using CGPSC Asstt. Prof. 2014 (CS)
______ diagrams. 165. The approach to software testing is to design
(a) Deployment (b) Collaboration test cases to
(c) State chart (d) All of the above (a) break the software
GPSC Asstt. Prof. 30.06.2016 (b) understand the software
159. What is related to the overall functionality of (c) analyze the design of sub processes in the
the delivered software? software
(a) Function-related metrics (d) analyze the output of the software
(b) Product-related metrics APPSC Lect. Degree College 07.06.2017 (CS)
System Analysis and Design 236 YCT
166. In a software project, COCOMO (Constructive 174. Use cases
Cost Model) is used to estimate (a) define the interactions between user and
(a) effort, cost and schedule based on the size of system
the software (b) brings out cases of usage by the system
(b) size and duration based on the effort of the (c) defines details of the system behavior
software (d) defines interactions between modules
(c) effort and cost based on the duration of the
TANGEDCO AE 2018
software
175. Quality metrics on reliability of the software
(d) size, effort and duration based on the cost of
include
the software
(a) average time taken to execute a function
APPSC Lect. Degree College 07.06.2017 (CS)
167. Beta testing is carried out by (b) mean time between failures
(a) users (c) number of words in the documentation
(b) developers (d) number of lines of code
(c) managers TANGEDCO AE 2018
(d) None of the given options 176. Which testing is conducted at one or more
APPSC Lect. Degree College 07.06.2017 (CS) customer sites by the end-user of the software?
168. Regression testing is primarily related to (a) Alpha testing (b) Beta testing
(a) functional testing (c) Gamma testing (d) Delta testing
(b) data flow testing (e) Sigma testing
(c) development testing CGPSC Asstt. Prof. 2014 (IT)
(d) maintenance testing 177. The COCOMO model is a:
APPSC Lect. Degree College 07.06.2017 (CS) (a) Common Cost Estimation Model
169. Acceptance testing is done by (b) Complete Cost Estimation Model
(a) developers (c) Constructive Cost Estimation Model
(b) customers (d) Comprehensive Cost Estimation Model
(c) testers (e) Cash Cost Estimation Model
(d) None of the given options CGPSC Asstt. Prof. 2014 (IT)
APPSC Lect. Degree College 07.06.2017 (CS)
178. Name the method of software testing that
170. The COCOMO model is examines the functionality of an application
(a) an analysis model (b) a design model without peering into its internal structures or
(c) a cost model (d) a testing model workings:
TANGEDCO AE 2018 (a) White box testing (b) Black box testing
171. Software configuration management is used
(c) Grey box testing (d) Basic path testing
(a) to manage different software systems
(e) Code path analysis
(b) to manage changes in the software
CGPSC Asstt. Prof. 2014 (IT)
(c) To manage interactions between software
179. In DFDs, an entity is represented by:
(d) to manage setting up software
(a) Rectangle (b) Arrow
TANGEDCO AE 2018
(c) Oval (d) Triangle
172. An incremental process model
(e) Diamond
(a) increments the process in each cycle
(b) delivers one completed product CGPSC Asstt. Prof. 2014 (IT)
(c) Delivers an operational product in each 180. A software engineer must design the modules:
increment (a) with the goal of low cohesion and low coupling
(d) increments changes to the model in each cycle (b) with the goal of high cohesion and high
TANGEDCO AE 2018 coupling
173. The change control process starts with (c) with the goal of high cohesion and low coupling
(a) a test case (b) a design feature (d) with the goal of low cohesion and high coupling
(c) a specification (d) a change request (e) with the goal of no cohesion and low coupling
TANGEDCO AE 2018 CGPSC Asstt. Prof. 2014 (IT)
System Analysis and Design 237 YCT
181. "Spiral model is an incremental model". How the process of determining whether a fully
long the spiral will continue? developed system conforms to its requirements
(a) Until the system (or software) retires specification. Which of the following is correct?
(b) up to β-testing (a) I
(c) When rest analysis is completed (b) II
(d) None of these (c) Both are correct
RPSC VPIITI 2012 (CS) (d) None of the statement are correct
182. What does CASE Tool mean :- RPSC VPIITI 2012 (CS)
(a) Tools used for analysis and design only 188. Actual programming of software code is done
(b) Any computer based tool for software during the_____ step in the SDLC.
planning, development and evolution (a) Maintenance and evaluation
(c) Any tool used for case study only (b) Design
(d) Tools for testing the software (c) analysis
RPSC VPIITI 2012 (CS) (d) Development and Documentation
183. Which of the following is an advantage of RPSC VPIITI 2012 (CS)
waterfall model? 189. Identify the correct statement with respect to
(a) The model assume stage rigidity Evolutionary development
(b) Enforced disciplined approach (a) Evolutionary development usually has two
flavors; exploratory development and throw-
(c) The model makes no allowance for prototyping
away prototyping
(d) Relegating maintenance is limited to minor
(b) Very large projects are usually done using
changes
evolutionary development based approach
RPSC VPIITI 2012 (CS)
(c) It facilitates easy project management, through
184. Which of the following is not a COCOMO-I the high volume of documentation it generates
MODEL ?
(d) Sometimes the construction of a throw-away
(a) The early prototyping model prototype is not followed by a re- implementation
(b) The early design model of the software system using a more
(c) The early testing model RPSC VPIITI 2012 (CS)
(d) The post-architectural model 190. Regression testing is primarily related to
RPSC VPIITI 2012 (CS) (a) Functional testing
185. Waterfall model is not suitable for :- (b) Development testing
(a) Complex project (c) Data flow testing
(b) Small project (d) Maintenance testing
(c) Accommodating project ISRO Scientist/Engineer 2020
(d) None of these 191. Which one of the following decomposition
RPSC VPIITI 2012 (CS) techniques is used to decompose problems
186. The following are the two main approaches to whose underlying computations correspond to
designing black box test cases :- a search of a space for solutions?
(a) Equivalence class partitioning and Coincident (a) Recursive decomposition
object analysis (b) Data decomposition
(b) Equivalence class partitioning and Boundary (c) Exploratory decomposition
value analysis (d) Speculative decomposition
(c) Boundary value analysis and partitioning UPSC Poly Lect. 10.03.2019
analysis 192. The period of time within which systems,
(d) None of these applications or functions must be recovered
RPSC VPIITI 2012 (CS) after an outage is:
187. Consider the following statements with respect (a) Mean Time to Recover
to coding phase: I. Verification: It is the (b) Recovery Time Objective
process of determining whether the output of (c) Recovery Point Objective
one phase of software development conforms to (d) Mean Time Return Failure
that of its previous phase II. Velidation: It is UPSC Poly Lect. 10.03.2019
System Analysis and Design 238 YCT
193. A model which enables the developer to apply 200. Consider the following :
the prototyping at any stage in evolution of the A. Condition p. Black box testing
product and which addresses the risks Coverage
associated with software development is: B. Equivalence Class q. System testing
(a) Spiral model (b) Prototype model partitioning
(c) Water fall model (d) V-shape model C. Volume Testing r. White box texting
UPSC Poly Lect. 10.03.2019 D. Beta Testing s. Performance testing
194. The primary determinant in selecting activities Matching A, B, C, D in the same order gives.
in each iteration of the spiral model of software (a) r, p, s, q (b) p, r, q, s
development is: (c) s, r, q, p (d) q, r, s, p
(a) Cost (b) Iteration size ISRO Scientist/Engineer 17.12.2017
(c) Constraints (d) Risk 201. Which of the following software development
UPSC Poly Lect. 10.03.2019 process is not necessarily useful for developing
195. Which one of the following testing is essentially software for automating an existing manual
a set of path test performed to examine the system for a client?
many different paths through the modules? (a) Prototyping (b) Iterative enhancement
(a) Integration testing (b) Unit testing (c) Spiral model (d) Waterfall model
(c) Function testing (d) System testing APPSC Lect. 2017 (Degree College) (CS)
UPSC Poly Lect. 10.03.2019 202. Which of the follwing is NOT the characteristic
196. What is the disadvantage of spiral model? of a good software Requirement Specification?
(a) It is inefficient for smaller projects (a) Completeness (b) verifiability
(c) modifiability (d) short size of code
(b) High amount of risk analysis
APPSC Lect. 2017 (Degree College) (CS)
(c) Strong approval and documentation control
203. Which of the following is NOT a recognized
(d) Additional functionalities can be added later
software project type under COCOMO model?
TSPSC Manager 2015
(a) embedded (b) semidetached
197. In software engineering, acceptance testing is (c) detached (d) organic
also known as
APPSC Lect. 2017 (Degree College) (CS)
(a) black-box testing
204. In software development, UML diagrams are
(b) white box testing used during.....
(c) Alpha testing (a) requirements analysis
(d) Beta testing (b) system/module design
TSPSC Manager 2015 (c) system integration
198. Cohesion is a qualitative indication of the (d) All the given options
degree to which a module APPSC Lect. 2017 (Degree College) (CS)
(a) can be written more compactly 205. Which of the following techniques are used for
(b) focuses on just one thing selection of test cases during structural testing?
(c) is able to complete its function in a timely (a) Data flow based testing
manner (b) equivalence class partitioning
(d) is connected to other modules and the outside (c) cause-effect graphing
world (d) boundary value analysis
TSPSC Manager 2015 APPSC Lect. 2017 (Degree College) (CS)
199. Cyclamatic complexity is related to which of 206. Match the following
the following testing method? P) Waterfall model (a) Specifications can
(a) White-box be developed
(b) Black-box testing Incrementally
(c) White- box and black-box testing Q) Evolutionary model (b) Requirements
(d) Functional-test compromises are
TSPSC Manager 2015 inevitable
System Analysis and Design 239 YCT
R) Component based (c) Explicitly addressing (c) Module-oriented metrics
model the problem of Risk (d) Extended function point metrics
during development APPSC Lect. Degree College 16.09.2020
S) Spiral Model (d) Inflexible 214. Match the following:
Partitioning (a) White-box testing (1) Behavioural testing
of the Project into (b) Black-box testing (2) Glass-box testing
stages (c) Basic path testing (3) Cyclomatic
(a) P-a, Q-b, R-c, S-d (b) P-d, Q-a, R-b, S-c complexity
(c) P-d, Q-c, R-a, S-b (d) P-c, Q-a, R-b, S-d (a) a - 1, b - 2, c - 3 (b) a - 2, b - 1, c - 3
APPSC Lect. 2017 (Degree College) (CS) (c) a - 3, b - 2, c - 1 (d) a - 3, b - 1, c - 2
207. Which of the following approaches is generally APPSC Lect. Degree College 16.09.2020
applied for module design phase while 215. Which is not a type of coupling in software
developing new software? Engineering ?
(a) top-down approach (a) Data coupling (b) Stamp coupling
(b) Bottom-up approach (c) Context coupling (d) Content coupling
(c) centre fringing RPSC ACF FRO 23.02.2021 (Comp. App./Sci.)
(d) depends on the size of software 216. Which is not a type of testing ?
APPSC Lect. 2017 (Degree College) (CS) (a) Proper testing (b) Unit testing
208. Which of the following type of coupling has the (c) Integration testing (d) System testing
weakest coupling? RPSC ACF FRO 23.02.2021 (Comp. App./Sci.)
(a) Pathological coupling (b) Control coupling 217. Which is the last phase in waterfall model ?
(c) Data coupling (d) massage coupling (a) Testing (b) Maintenance
ISRO Scientist/Engineer 2013 (c) Coding (d) Design
209. Which of the following testing methods uses RPSC ACF FRO 23.02.2021 (Comp. App./Sci.)
fault simulation technique? 218. Which is not a functional requirement ?
(a) unit testing (b) beta testing (a) I/O format
(c) beta testing (d) mutation testing (b) Reliability
ISRO Scientist/Engineer 2013 (c) Storage structure
210. Which of the following is NOT an evolutionary (d) Timing and Synchronization
software development model?
RPSC ACF FRO 23.02.2021 (Comp. App./Sci.)
(a) Incremental model
219. The lower degree of cohesion is kind of
(b) WINWIN spiral model
(a) Logical Cohesion
(c) Concurrent development model
(b) Coincidental Cohesion
(d) RAD model
(c) Procedural Cohesion
APPSC Lect. Degree College 16.09.2020
(d) Communicational Cohesion
211. In software engineering, which of the following
ISRO Scientist/Engineer 22.04.2018
is NOT a valid type of change that is
encountered during support phase? 220. Technique used for finding a solution for
(a) Correction (b) Adoption optimizing the given objective (such as profit
(c) Prevention (d) Avoidance maximization or cost minimization) under
certain constraints is called-
APPSC Lect. Degree College 16.09.2020
(a) Quailing Theory (b) Waiting Line
212. A client/server application should be developed
preferably using _______ model. (c) Linear Programming (d) Graph Theory
(a) Spiral (b) WINWIN spiral (e) Maxima
(c) Incremental (d) Concurrent CGPSC Asstt. Prof. 2014 (Comp. App.)
APPSC Lect. Degree College 16.09.2020 221. Which of the following is not a process metric?
213. Which of the following is NOT a valid category (a) Productivity (b) Functionality
of software measurement metric? (c) Quality (d) Efficiency
(a) Size-oriented metrics (e) Portability
(b) Function-oriented metrics CGPSC Asstt. Prof. 2014 (Comp. App.)
System Analysis and Design 240 YCT
222. Which one is not a phase of "bathtub curve" of (b) Unknown requirement
hardware reliability? (c) Undreamt requirement
(a) Burn-in (b) Wear-out (d) Complex requirement
(c) Test-out (d) Useful life (e) Functional requirement
(e) Burn-out CGPSC Asstt. Prof. 2014 (Comp. App.)
CGPSC Asstt. Prof. 2014 (Comp. App.) 226. Alpha testing is done at
223. Which one of the following term is a level name (a) User's end
in the Capability Maturity Model? (b) Developer's end
(a) Ad hoc (b) Repeatable (c) User's and Developer's end
(c) Reusable (d) Organized (d) Client's end
(e) Systemized RPSC VPITI 2018 (CS)
CGPSC Asstt. Prof. 2014 (Comp. App.) 227. Which of the following is not a Non-functional
224. Spiral model begins with: testing ?
(a) Design (a) Performance testing
(b) Risk analysis (b) Unit testing
(c) Coding (c) Load testing
(d) Customer communication (d) Reliability testing
(e) Analysis RPSC VPITI 2018 (CS)
CGPSC Asstt. Prof. 2014 (Comp. App.) 228. STLC is related to which model?
225. Which one of the following is not a valid type of (a) Waterfall Model (b) RAD Model
requirement? (c) V Model (d) Spiral Model
(a) Known requirement RPSC VPITI 2018 (CS)

ANSWER KEY
1. (a) 2. (b) 3. (a) 4. (d) 5. (c) 6. (a) 7. (b) 8. (b) 9. (b) 10. (c)
11. (b) 12. (a) 13. (a) 14. (b) 15. (c) 16. (d) 17. (c) 18. (d) 19. (d) 20. (b)
21. (c) 22. (d) 23. (a) 24. (b) 25. (b) 26. (c) 27. (d) 28. (d) 29. (b) 30. (c)
31. (d) 32. (b) 33. (b) 34. (a) 35. (c) 36. (b) 37. (d) 38. (c) 39. (b) 40. (d)
41. (d) 42. (d) 43. (a) 44. (b) 45. (c) 46. (c) 47. (b) 48. (a) 49. (c) 50. (a)
51. (c) 52. (d) 53. (a) 54. (b) 55. (b) 56. (d) 57. (d) 58. (d) 59. (b) 60. (d)
61. (d) 62. (b) 63. (c) 64. (a) 65. (d) 66. (b) 67. (b) 68. (d) 69. (a) 70. (b)
71. (c) 72. (c) 73. (b) 74. (d) 75. (a) 76. (c) 77. (b) 78. (c) 79. (a) 80. (d)
81. (b) 82. (c) 83. (c) 84. (a) 85. (d) 86. (d) 87. (a) 88. (b) 89. (a) 90. (d)
91. (c) 92. (a) 93. (d) 94. (c) 95. (b) 96. (a) 97. (d) 98. (c) 99. (c) 100. (d)
101. (c) 102. (b) 103. (b) 104. (b) 105. (d) 106. (a) 107. (d) 108. (a) 109. (a) 110. (a)
111. (c) 112. (a) 113. (a) 114. (c) 115. (c) 116. (a) 117. (c) 118. (c) 119. (d) 120. (c)
121. (a) 122. (c) 123. (b) 124. (d) 125. (b) 126. (d) 127. (a) 128. (d) 129. (c) 130. (a)
131. (b) 132. (a) 133. (b) 134. (a) 135. (c) 136. (b) 137. (c) 138. (b) 139. (c) 140. (d)
141. (a) 142. (a) 143. (b) 144. (c) 145. (d) 146. (d) 147. (c) 148. (a) 149. (d) 150. (d)
151. (b) 152. (d) 153. (a) 154. (b) 155. (c) 156. (c) 157. (d) 158. (c) 159. (a) 160. (c)
161. (c) 162. (c) 163. (d) 164. (c) 165. (d) 166. (a) 167. (a) 168. (d) 169. (b) 170. (c)
171. (b) 172. (c) 173. (d) 174. (a) 175. (b) 176. (b) 177. (c) 178. (b) 179. (a) 180. (c)
181. (a) 182. (b) 183. (b) 184. (c) 185. (c) 186. (b) 187. (c) 188. (d) 189. (a) 190. (d)
191. (c) 192. (b) 193. (a) 194. (d) 195. (b) 196. (a) 197. (d) 198. (b) 199. (a) 200. (a)
201. (a) 202. (d) 203. (c) 204. (d) 205. (a) 206. (b) 207. (a) 208. (c) 209. (d) 210. (d)
211. (d) 212. (d) 213. (c) 214. (b) 215. (c) 216. (a) 217. (b) 218. (b) 219. (b) 220. (c)
221. (b) 222. (c) 223. (b) 224. (d) 225. (d) 226. (b) 227. (b) 228. (c)

System Analysis and Design 241 YCT


10.
INTERNET OF THINGS AND
ITS APPLICATION
Hospital– The wide importance of internet of things
Introduction to IoT .

in the hospital and health sector, along with keeping a


The full name of IoT is internet of things. Internet of database of hospital equipment and data, as well as a
things (IoT) is a set of devices that are connected via the record of patient symptoms and reports.
internet. IoT is a network of physical objects available on Smart City– With the help of internet of things,
the internet that is embedded with sensors, software and everyday problems like- water, electricity supply, traffic,
other technologies, so that other devices available on the crime and environment related problems can be solved.
internet can be connected, and data can be exchanged. Features of the internet of things–
IoT devices are being used every day in our daily Connectivity– Connectivity means establishing a
life such as- smart phones, TV, lights, AC, doors, cars good connection between all the devices from IoT
etc. are used by IoT sensors. Amazon Echo, ring door platform to IoT, which can be server or cloud.
bell and nest thermostat were all a part of internet of
Analyzing– After connecting IoT devices the data
things (IoT).
collected in the device is analyzed in real time and used
Understanding IoT with an example if a person
to build business intelligence.
wants that the "AC" of his room should be turned on
Artificial Intelligence– IoT technology comes with
before reaching his home and he gets his room cold as
a combination of hardware and software that makes IoT
soon as he reaches at home then he did so through
devices state-of-the-art, allowing the devices to output
internet of things. Same can be done, if your "AC"
intelligently in a particular situation.
remains on while leaving the house, then with the help of
IoT, you can also turn it off. Advantages of IoT
How internet of things (IoT) works? Easy Access– With the help of IoT we can access
Internet of things is a networking technology. To use information very easily, like using Google maps, we can
it have general knowledge of the internet and computer. find the location and distance of any place.
Any person can connect their electronic devices together Communications– In IoT the equipment
with the help of internet in IoT. It can be used only if the communicates with each other which is called machine-
IP address of your mobile and device is the same. to-machine communication. Through this
The devices are interconnected via WiFi or communication remains transparent, which improves the
Bluetooth and data is exchanged between them through a quality of the results.
wireless technology. The connected devices send and Speed– The data transfer speed of IoT device is very
receive signals through the binary method (0,1). high, so that any task can be completed at a very fast
Main application of internet of things– speed.
Smart Home– With the help of smart home IoT Cost Reduction– The use of IoT in business reduces
application, we can connect home appliances with help costs. The IoT world is used for the maintenance of
of smart phone or sensor with help of this, we can turn goods and equipment, which reduces the cost of
"ON" and "OFF" the light and "AC" of the house before equipment maintenance.
coming to the house. The door fan, light etc. of the house Automation– Through the IoT, we can achieve
can be managed through IoT. automation, automating the work in any business
Wearable devices– All those devices that can be increases the quality of service human presence less.
wear such as smart clothes, smart watch, smart shoes etc Disadvantage of IoT–
all devices some under the internet of things. It is useful Security and Privacy– The main disadvantage of
for fitness health and entertainment. IoT is its security and privacy because all the devices are
Example- Samsung, Apple or Google Company's connected to the internet, so that these devices can be
smart watches. hacked. Hackers can steal money by hacking the user's
Agriculture– With the help of internet of things photo, email, password and even bank account.
weather can be predicted. We can also predicted the Complexity– It is very difficult to design, develop
availability and requirement of foods, cereals and fruits and maintain any technology in IoT.
through the IoT. Farmers can find out their soil moisture, Dependency–Nowadays we have become dependent
acidity level, the presence of nutrients, temperature level on IoT for most of the work. Online shopping to online
and many more. banking everything is now being done sitting at home.
Internet of things and its Application 242 YCT
We can do all the work through mobile, Which has but that, does have some organizational proper files that
incrased the dependence of human beings on it. Children make it easier to analyze. Example of Semi-structured
have become addicted to this technology which is very data is a data represented in an XMC file.
dangerous. <employee> <name> Amit </name> <gender> male
Job Shortage– With the advent of IoT there has </gender> <salary> 8000 </salary>
been a decrease in jobs because the work done by </employee>
humans, is now being done by machine, automation has </employee> <name>Vivek</name> <gender> male
increased through IoT, which has reduced jobs. </gender> <salary> 5500 </salary>
History of IoT– The creation of smart networks by </employee>
interconnecting modern equipment was started in 1982 at Characteristics of Big Data–
Carnegie Mellon University. With this, a coke vending Volume– Volume is the most important feature of
machine was created in the University which could tell Big Data, because it is named Big Data after it. When the
about the bottles kept inside the machine. Whether it was data is analyzed then its size is the most important,
cold or not and also able to give stock information. But through this we can know how much size the data is.
the father of the term internet of things is considered to Generally the size of Big Data in Terabytes and Petabytes.
be the honorable "Kevin Ashton".
Variety– Variation refers to heterogeneous sources
Those who worked at Procter and Gambler used the and the nature of data, both structured and un-structured.
word IoT in 1999 from this word the internet of things Unstructured camp for something. Variety deals with the
was formed of this task. He also recommended RFID- storage, mining and analysis of data.
Radio Frequency Identification Technology which could
Velocity– The term velocity refers to the speed of
give computers the ability to manage different devices.
data generation. The speed at which data flows through
What is data .
business processes, application logs, network and social
media sites, sensor mobile devices etc. The flow of data
When data is presented to an electronic machine or
to any person in such a way that it is easy to is massive and continuous.
communicate, interpret, process then those data is called Advantages and Disadvantages of Big data
data. Data is represented with the help of characters for Advantages of Big data–
example- alphabet (a-z, A-Z), number (0, 9) or a special • Big data analysis helps in understanding and targeting
character (@ , ! , #, $, %, *, +, = ) etc. The quantities, customers. It helps in optimizing business processes.
characters or symbols on which operations are performed • It helps in improving science and research.
by a computer which may be stored and transmitted in • It improves healthcare and public health with
the form of electrical signals and recorded on magnetic, availability of patient records.
optical or mechanical recording media they are called • It helps in financial trading, sports, polling
data. security/law enforcement etc.
What is Big Data– Big data is also a type of data • Any one can access vast information via survey and
but with a large size. It is term used to describe a
deliver answer of any query.
collection of data, which is large in size and is increasing
Disadvantages of Big Data–
over time.
Types of Big Data– There are mainly three type of • Traditional storage can cost lot of money to store big
Big Data– data.
Structured– Any data that can be stored, • Lots of big data is unstructured form.
transmitted and processed in a fixed format an • Big data analysis violates principles of privacy.
"Employee" table in a database is example of structured • Big data analysis is not useful in short run. It needs to
data. be analyzed for longer duration to leverage its
Like– benefits.
Employee ID Employee Name Gender • Big data analysis results are misleading sometimes.
Applications of Big Data– Healthcare is a field in
1001 Rahul male
which a lot of data is generated, earlier this data could
1002 Amit male not be used in the health sector. But now using this data
1003 Vikash male to find out the symptoms of a disease, to correct a
Unstructured– Any data without any order or disease. Big data has been used to do much more and in
structure is know as unstructured data. In addition to the coming time, big data will also be used to make
being large unstructured poses a number of challenges in medicine for "Corona" virus.
terms of its processing for example- the results returned Government– Big data analytics has proved to be
by Google Search. very useful in the government sector. It contributed in
Semi Structured– Semi-structured data is the re-election of Barack Obama in 2012 and it was also
information that does not reside in a relational database very helpful for the BJP of 2019.
Internet of things and its Application 243 YCT
The Government of India used many techniques to The work of data analysis is not limited to drawing
know what voters think about the work of the conclusion to make better decision for the company.
government and at the some time uses big data to Rather they can also do other tasks like machine
improve policies. learning, data architect, data modeler etc. in which they
Social Media– The data of social media is very get to explore new algorithms and new aspects, which
much and any company can be successful by analyzing are related to data analysis.
its data. Social media provides us important real-time Type of big data Analytics– Big data Analytics is
information and also tells the trends in the market. mainly defined in four types–
People share their information through social media Descriptive Analytics– It is the first stage of data
and by analyzing those information. They can reach their processing in which the previous data is extracted from
business and products to the people of needy places. the raw data and the data is prepared for the next
Cyber Security & Intelligence– The security of processing. That is, through this the performance report
computer networks is being improved by analyzing big of the business last year can be extracted and accordingly
data. the further strategy can be made.
Security agency collects and analyzes data from This type of analytics analyzes incoming data in real
social media and satellite. So that their short comings are time for insights about future outlook.
discovered and be make better. Prescriptive Analytics– The most useful analytics
technique is prescriptive analytics suggests the best
Architecture of Big Data– To analyze the data in
solution out of many choices. Prescriptive analytics adds
big data is mainly divided into 4 layers, their main
the task of manipulating the future, providing advice on
function is to analyze the data and divide it into different
the possible results and results that key business metrics
component.
are likely to maximize.
Sources Layer– The main function of the big data
Predictive Analytics– Predictive analytics is most
source layer is used to find out about the source of the
commonly used. It envisions a situation as to what could
data and what is the format of the data. Such as- a data
happen in that situation?
structured or unstructured, and also to find out the
It used past data to predict the future so "Predictive
volume and velocity of the source layer. Decision
Analytics Visualizes Future Events".
making for all these tasks is the main function of this
Diagnostic Analytics– This technique is used when
layer.
we want to know why something is happening, that it is
Data Managing and Store Layer– The function of involves asking questions, why did it happen?
the data managing and store layer is to preserve the data
Diagnostic analytics looks for the root cause of a
in its correct format.
problem. It analyzes past performance to determine what
So that it can be analyzed and converted for happened and why.
example- an image file is being uploading and it has to
be stored in the Hadoop Distributed File System (HDFS), What is Cloud .

then this layer to convert the data according to that file Cloud is interconnected networks of services
system. designed to provide computer resources. In this you can
Analysis Layer– The function of the analysis layer work according to your need, it is a huge network. You
in big data is use to the information gathered from the do not even know about how it brings data in front of
source layer and the store layer to create algorithms and you. Cloud computing is a collection of licensed services
present the information that can be accessed using that are provided by different vendors.
existing tools. This information is used to create What is Cloud Computing– Cloud computing is
advertising and business intelligent methods. the technology in which various types of services are
Consumption Layer– The main function of the provided using the internet. These services can be
consumption layer is to observe the information provided anything such as software or storage space provided on
by the analysis layer and convert it into business the server or any other service.
intelligence report. Which is used by companies to Cloud computing means providing any kind of
design and present the product in the market compared to computing services on the demand of the user through
their competitors. the internet. If understood in simple language in this
Big Data Analytics–- Big data analytics defines the technology the user is provided with the facility of data
method of analyzing huge amounts of big data. Big data storage on a server of the internet. Buy purchasing space
analytics is a process by which large sets of data are on the cloud, the user can save his data on it and can
collected and analyzed to detect hidden patterns and access his data from anywhere in the world through the
useful information. Organization use this information to internet.
improve their business. More decision efficient, Cloud Computing History– The beginning of
operations by big data analytics can lead to higher profits cloud computing, a company named Salesforce thanked
and happier customers. to provide the service to the peoples of its website. It was
Internet of things and its Application 244 YCT
only after this that it came to know how important it can Disadvantages of Cloud Computing– When you
prove to be in the coming times. After many years this use cloud you must have internet connection, so that user
field gained momentum and by coming in the 21st can access his cloud account. Cloud can not be used
century many giant companies like Amazon, Google and without internet.
Microsoft started providing their services in the field of • The cloud is fully infrastructure and manage by the
cloud computing. cloud provider, so that the cloud provider can
Features of Cloud Computing discontinue your services at any time.
Resources Pooling– Resource pooling is one of the
• Many cloud provider company's limit the bandwidth.
essential features of cloud computing. Resource pooling
means that a cloud service provider can share resources If you want to increase your bandwidth then you will
among multiple clients, each providing a different set of have to pay for it separately.
services according to their needs. • A high speed internet connection is required to access
It is a multi-client strategy that can applied to data the cloud. If you have an internet connection but the
storage, processing and bandwidth-delivered services. speed is slow then you will not be able to use the
The administration process of allocating resources in cloud.
real-time does not conflict with the client's experience. How Cloud Computing Works– In cloud
On-demand Self-Service– It is one of the important computing there can be many server i.e. computers on
and essential features of cloud computing. This enables which a particular type of software is installed, it can be
the client to continuously monitor server uptime, one or more.
capabilities and allocated network storage.
Cloud computing basically works on dual layers
This is a fundamental feature of cloud computing
technology to manage the servers. There is a separate
and a customer can also control the computing
layer called backend and second layer which is used by
capabilities according to their needs.
client is called frontend.
Easy Maintenances– This is one of the best cloud
features. Servers are easily maintained and downtime is Similarly the server setup for a complete cloud
minimum or sometimes zero. computing is done by combining both the backend and
Cloud computing powered resources often undergo frontend.
several updates to optimize their capabilities and Type of Cloud Computing– Cloud computing is
potential. divided on the basis of two different method.
Security– Data security is one of the best features of A. On the basis of deployment.
cloud computing. cloud services make a copy of the B. Depending on the service provided by the cloud.
stored data to prevent any kind of data loss. A. Following are the types of cloud computing on
If one server loss data by any chance, the copied the basis of deployment–
version is restored from the other server. This feature
1. Public Cloud– Public cloud available to
handy when multiple users are working on a particular
file in real-time and file suddenly gets corrupted. everyone and it is managed by the service
Cost Savings– Using web-based services eliminates provider. Public cloud services are sometimes
the need for large expenditures on implementing and free or charged very little for them.
maintaining the hardware. Cloud services work on a pay- Amazon web services (AWS), Microsoft Azure
as-you-go subscription model. ware all example of public cloud computing. In
Advantages and Disadvantages of Cloud Computing– this type of cloud the infrastructure is hosted by
Advantages of Cloud Computing–Cloud other service providers and which are later
applications improve collaboration by allowing groups of made public.
people to quickly and easily share information in the 2. Private Cloud– Private cloud will provide the
cloud via shared storage. infrastructure to only one organizations or
• On cloud you can provide unlimited storage capacity company, whether managed internally or by a
which you can customize according to your need can third party and hosted either internally or
increase or decrease. externally.
• Data security on the cloud is a huge benefit. Cloud 3. Hybrid Cloud– Hybrid cloud is a combination
provides facilities to provide a lot of security for data of public and private cloud, many company use
security to protect data. public cloud for their database as well as use a
• In cloud computing organization, the maintenance private cloud to store sensitive application.
cost of computer hardware and software is reduced. 4. Community Cloud– In community cloud
Thereby reducing the cost of the organization. computing, there is sharing of data between
• You can access the cloud from anywhere and can take such organization that have similar goals and
facility of all the services that the cloud provides. For who together form a community. Only members
this you just need to have internet. of that community can use this services.
Internet of things and its Application 245 YCT
B. There are following types of cloud computing to manipulate the objects present in the world and
based on the service provided by the cloud– navigate through it, so that he can feel his presence in
1. Iaas (Infrastructure as a Service) – In this that object and can also do action-reaction. To create
type of service, the computing power, storage, virtual reality special types of glasses are presented on
software, network power and all other control of the glass as well as the user has to wear fiber hand gloves
the cloud is with the user. This service is from which he controls the actions. Like - playing a car
basically used for business. The biggest race game on a computer. We get involved in the game
example of this is VPS (Virtual Private Server) in such a way that we are actually driving the car, but in
in which you get computing power along with reality it does not happen thus virtual reality given an
software and network. impression of reality.
2. Pass (Platform as a Service)– In pass the user Characteristics of Virtual Reality–
gets only one platform which can be either Believable– You feel like you're in the virtual world
storage or computing power. In this things do through what you see and hear.
not control completely only the cloud provider Full Immersive– As you move your head around
can control them. Example of this are Gmail, with the VR headset on, what you see changes as well,
Yahoo, Rediff etc. just as it world in real life.
3. Saas (Software as a Service)– In saas you get Computer-generated– VR world are usually
only one software hosted on remote server, created with complex 3D computer graphics that change
which is used for a specific task. These type of in real time as we move.
services are mostly used in small business for Interactive– You can interact with and move the
example- Google Docs, Website etc. different objects in the scene.
Uses of Cloud Computing– Internet Technology– The internet is a network of
File Storage– Generally users use cloud computing global system interconnected with computers that
to store, manage and share their files in remotely hosted connect any computer in the world through routers and
system. Examples are Google drive and drop box. servers. In other words, the connection established
Website Hosting– Cloud hosting is used to host any between two computers through TCP/IP protocol to
websites in addition to hosting your website. Cloud host exchange information is called internet. Internet is the
provide also provide their own computing resources. largest network in the world.
Backup and Recovery– Businesses and History of Internet– The first workable prototype
organizations usually backup their data a storage device, of the internet came in the late 1960s with the creation of
but its not very effective. Such as loss or damage to the ARPANET, or the Advanced Research Projects Agency
device, that is you can easily back up your data in cloud Network. Originally funded by the U.S. Department of
base backup, in this way it is also easy to recover data. defense, ARPANET used packet switching to allow
Test and Development– Cloud computing also play multiple computers to communicate on a single network.
a good role in the testing and development of any The internet is a vast network that connects computers all
software and network. Cloud services help to check over the world. Through the internet, people can share
whether your software is running smoothly or there is no information and communicate form anywhere with an
error in it. internet connection.
Example of Cloud Computing– Protocol– A protocol is a set of rule that govern the
YouTube– YouTube is famous video sharing process of exchanging information. The standard protocols
platform, in which millions of videos are uploaded daily used for this purpose are TCP, IP, FTP, UDP etc.
in such a situation. YouTube uses cloud computing to TCP/IP– TCP stands for transmission control
store so many videos. protocol and IP stands for internet protocol. Internet
Facebook– Facebook is famous social media protocol suite commonly known as TCP/IP. IP handles
platform which on the millions of people profile and lot datagram routing while TCP handles higher level
of data are available to store it facebook also uses cloud functions such as segmentation, reconnection and error
computing. detection. It is a collection of communication protocols.
Emails– All the companies providing email services There are four layers in TCP/IP.
such as Gmail, Rediff, Yahoo and all the companies Application Layer
providing online storage such as drop box, yadex, media Transport Layer
fire mega etc. all uses cloud computing.
Internet Layer
Virtual Reality Network Interface Layer
Virtual Reality is a computer device used to create (i) Application Layer Protocol– The application layer
an imaginary world. The world created in virtual reality serves as the top 3 layer (application, presentation,
makes the user feel the presence of the world that in session) of the OSI model. It is responsible for node-
which he is. Virtual reality makes the user feel the ability to-node communication and user interface.
Internet of things and its Application 246 YCT
(ii) Transport Layer Protocol– This is the third layer switches and hubs together form a metropolitan area
from the bottom. It is responsible for all types of network. Government agencies use MAN to connect
data transfer. It establishes connection oriented and with citizens and private industries.
connectionless communication. In this layer TCP
and UDP protocols are included. TCP is a
connection based and reliable protocol whereas UDP
is connectionless protocol.
(iii) Internet Layer Protocol– This protocol is
responsible for routing. Its purpose is to follow a set
of protocols to deliver data packets to the destination
as per the information contained in the packet
header. The main function of this layer is to send IP
address, routing and avoiding traffic.
(iv) Network Interface Layer Protocol– This is the
bottom layer of the TCP/IP model and contains the
physical and datalink layers of the OSI model. It WAN (Wide Area Network)– A wide area network
recognizes the characteristics of the protocol, is a type of network that transmits voice, data, image and
hardware and media used for communication. video across a geographic area. It is a group of local area
networks. It connects different cities, states or countries.
FTP–File Transfer Protocol (FTP) is a standard
Example- connects districts and all state headquarters.
communication protocol used to transmit files between Internet is also a type of wide area network, it is spread
computers over the internet. FTP is an application layer all over the world.
protocol that transfer files between local and remote file Data communication is done with the help of hubs,
systems. switches, fiber optics, modems and routers etc. and
UDP–User Datagram Protocol (UDP) is a widely technologies like ATM, ISDN, MPLS, frame relay are
used transport protocol. It is faster than TCP but it is less used to transfer data through the internet.
reliable. It is used to transmit small size data packets.
These small sized data packets is known as datagram.
HTTP–HTTP stands for Hypertext Transfer
Protocol. HTTP is used to transfer data over the web. It
is an application layer protocol that allows users to
communicate data over the world wide web (www).
LAN (Local Area Network)– A Local Area
Network is a network used within a very small
geographical area (about 1 km) such as a home, school,
computer lab, office building etc. within a group. It is
used to connect network and computer accessories. In Search Engines– A search engines is a software that
this communication, devices like hubs, switches are searches the desired information, web pages, images etc.
used. The hub, switch and router are connected to an from the database of the internet and displays the results
Ethernet cable via an RJ45 port. to the user on the browser. The search engine searches
any web page on the basis of its title, key words or any
phrase located on that page. The results displayed on a
search are often arranged in a list according to the most
frequently visited pages.
Some of the popular search engines are as follows–
(i) Google
(ii) Yahoo
(iii) Ask.com
(iv) Bing
(v) Duck Duck Go
MAN (Metropolitan Area Network)– MAN is the (i) Google– Google is a famous search engine, which
extended form of LAN which covers a large was created by Sergey Brin and Larry Page, two
geographical area like city or town. The data transfer rate Ph.D students of (Stanford University California).
in MAN is in Mbps. In MAN, different LANs are Initially its name was BACKRUB, later in 1997 it
connected to each other through a telephone exchange was renamed as Google. Initially it was made for
line. It can be extended up to 30-40 km. Routers, ranking.
Internet of things and its Application 247 YCT
(ii) Yahoo– Yahoo is a search engine, started in 1994 by associated webpages and posting content to these web
Jerry Yang and David Fillo at Stanford University. pages online. The content meant for web publishing can
But it was registered in 1995. include text, videos, digital images, artwork and other
(iii) Ask.com– It is a question-answer based e-business forms of media. Web publishing comprises of personal,
and web search engine. Ask browser toolbar is an business and community websites in addition to e-books
extension that displays as a separate bar on the and blogs. Publishers must possess a web server, a web
browser window. It was created in 1996 in publishing software and an internet connection to carry
California by Garrett Gruener and David Warthen. out web publishing. Web publishing is also known as
(iv) Bing– It was launched by Microsoft on 3 June 2009 online publishing.
as a web search engine. These are the 5 steps to publish your website
(v) Duck Duck Go– Duck Duck Go (also abbreviated 1. Prepare your website content– The structure and
as DDG) is an internet search engine that layout of a web design converges around content.
emphasizes on protecting searchers privacy and The communication of ideas informs everything
avoiding the filter bubble of personalized search from navigation to the arrangement of writing and
results. visuals. When you don't work with the actual text
Introduction to online & offline messaging– If a and images, your design is only an approximation.
person is active over a messaging tool and able to accept Go over your content are make sure that it's in great
the messages, it is termed as online message and if the shape before you place a single element in your
person is not available and the message is left to view design. Optimize your content for SEO and having
when the person is back, it is termed as offline message. SEO in place makes the content you are working
Instant messaging technology is a type of online with even more accurate.
message allowing real-time text transmission over the 2. Design and build your website– This is the biggest
internet or another computer network. Messages are step in this process. There are many way to arrange
typically transmitted between two or more parties, who your pages with a layout.
are all connected on a common network. Instead of using • Select appropriate typography
mobile or Wi-Fi data like popular messaging apps such • Create a user experience
as Whatsapp. The offline messaging apps create a peer-
• Develop a consistent and usable user interface
to-peer bluetooth mesh network or Wi-Fi direct-based
3. Find Web Hosting– When looking for hosting you
network on your phone eliminating the need for mobile
need to consider the speed, reliability, level of
data services. The network uses these nodes to transfer
security as well as the ease of scalability to
data across devices.
accommodate future traffic growth.
World Wide Web Browsers– The World Wide
4. Do a quality assurance audit– Your website is
Web was the first web browser invented by Team
Berners Lee in 1990. The World Wide Web is known as done, you found web hosting and you are ready to
the Web. It is a large group of interconnected put it out into the world. Before you hit the publish
information (web pages) through hyper links, which can button make sure to do a thorough QA before going
be accessed on the internet with the help of a web live. The process of creating a website can be a long
browser. The World Wide Web is a system that one, with many changes and edits that may have
interconnects the information gathered in many happened along the way.
computers with the help of hyper text documents and • Proofread the content
hyper text transfer protocol (http). It is used to send these • Check the spelling
information from one place to another. Which exchanges • Do a grammar check
data with the help of hyper links.
• Check all the text
Web Page– Each page stored on the World Wide
• Optimize images
Web (WWW) is called a webpage, which is created
using HTML (Hyper Text Markup Language). Web • Follow proper semantic structure
pages are stored on web servers and can contain a large • Test links and integrations
amount of information, including text, graphics, audio, 5. Publish your website with a domain name– A
video and hyperlinks. domain host provides a domain name like
Hyperlink– A hyperlink is that part of HTML text www.yourdomainname.com that visitors can use to
in which the address of another page or webpage is find you. A domain name is an identification string
given. On clicking the hyperlink, the computer shows us that defines a realm of administrative autonomy,
the page or webpage. authority or control within the internet. Domain
Web Publishing– Web publishing is the process of names are used in various networking contexts and
publishing original content on the internet. The process for application specific naming and addressing
includes building and uploading websites, updating the purposes.
Internet of things and its Application 248 YCT
Basic Knowledge HTML, XML and Scripts visual imagery in order to make the website more
HTML (Hyper Text Markup Language)– Hyper visually appealing and easy to use.
text markup language (HTML) is the standard markup Developing a web page involves designing and
language for web page documents to be displayed in web implementing the part that your readers see and interact
browsers. Which is used to give the structure of the with, known as the front end, as well as the programming
webpage and its content. The structure of the web page is and database element of the page, known as the back
created using paragraphs, lists, images and data tables. end. Web design has numerous components that work
HTML allows creating and structuring sections, together to create the finished experience of a website,
headings, links, paragraphs and more in a webpage using including graphic design, user experience design,
various tags and elements. interface design, search engine optimization (SEO) and
<!DOCTYPE html>– All HTML documents must content creation. These elements determine how a
start with a <!DOCTYPE html> declaration. The website looks, feels and works on various devices.
declaration is not an HTML tag. It is an information to Website Maintenance– Website maintenance is the
the browser about what document type to expect. practice of monitoring your websites overall health and
like– HTML5 declaration <!DOCTYPE html> performance. Keeping a website up-to-date it is crucial to
<html>– This is the root element of an HTML page ensure it's working at full capacity, engaging and
called the start tag. This is the first tag of an HTML retaining site visitors. There are a number of tasks
document. required to properly check and maintain a website,
including updating security software and plugins, adding
<head>– This element contains the meta data of the
fresh content, increasing new and returning traffic and
HTML page.
meeting the satisfaction of your site users. Website
<title>– This element is for the title of the HTML maintenance can impact your business first impressions,
page which is shown in the title bar of the browser or in SEO strategy, security and sales. Whether you are a
the tab of the web page. business owner or starting a blog, you will want to make
<body>– This is the container for all the visible sure that when people and search engines land on your
content or information that defines the body of the site. They will immediately see the benefits of your sites
document. This tag is required for every HTML offerings or risk losing them. This means that your
document and should only use once in the whole HTML ability to retain online interest lies primarily in your
document. website maintenance.
XML (Extensible Markup Language)– Extensible HTML Tools– HTML tools prove to be a great help
Markup Language (XML) is a markup language and a when it comes to step up their workflow and perform
file format for storing, transmitting and reconstructing repetitive tasks. These tools are blessed with all the
arbitrary data. It defines a set of rules for encoding richness and power that help webmasters to augment the
documents in a format that is both human-readable and value of their work and improve the usability of their
machine-readable. XML is one of the most widely used web designs. They are compelling enough to build
formats for sharing structured information, between beautiful and responsive website in the quickest possible
programs, between people, between computer and manner. The majority of HTML5 tools is available for
people, both locally and across networks. If you are free and they are popular because they take less time and
already familiar with HTML, you can see that XML is efforts to fabricate a commendable website. Using
very similar. HTML5 tools, developers can easily incorporate eye-
Scripts– In computer programming, a script is a catching animation effects, video, fonts and graphics to
program or sequence of instructions that is interpreted or their websites. You can pick any one of them to manage
carried out by another program rather than by the and build the code for your website.
computer processor (as a compiled program). As with 1. Font Dragr
scripts in general, scripting language are mostly used to 2. HTML5 Maker
automate processes at the application level. At the 3. HTML Kickstart
command line or through a web server, they are able to 4. Initializer
execute programs running on a web server and display 5. Liveweave
the appropriate results to the users. 6. Adobe Edge Animate
Every computer user uses scripts of some kind, 7. Modernizr
even if they are not aware of it. Scripts are sometimes 8. CrossWalk
used to customize and automate repeated tasks and 9. Online 3D sketch
control overall computer functions. 10. Patternizer
Creation & Maintenance of websites 1. Font Dragr– Font dragr is all what you need to
Website Creation– Web design is a web preview custom web fonts in the browser. It's a very
development process for creating a website that focuses simple tool that comes with a drag and drop
on aesthetic factors like layout, user interface and other interface allowing you to drop your typeface,
Internet of things and its Application 249 YCT
scalable vector graphics and web open fonts on the generate impressive patterns that are sure to please
web page to test all of them instantly. Use font dragr your website visitors.
to instantly load your font and know whether it's Multimedia and Graphics– Computer graphics are
appropriate or not. picture and films created using computers. Multimedia is
2. HTML5 Maker– Animation make a dynamic visual content that uses a combination of different content
impact on the appearance of a website and HTML5 forms such as text, audio, images, animations, video and
maker is a richly different take on this aspect. Being interactive content.
the finest online animation tool, HTML5 maker Multimedia– The word multi and media are
makes it easy for developers to add interactive combined to form the word multimedia. That is many
content to their website with the help of HTML, types of media (hardware/software) used for
CSS and Javascript. communication of information. Multimedia is a
3. HTML kickstart– HTML kickstart is a set of representation of information in an attractive and
HTML, CSS, JQuery elements and layouts that interactive manner with the use of a combination of text,
together help you to start your HTML5 venture audio, video, graphics and animation. In other words, we
while saving you a lot of precious time and efforts. can say that multimedia is a computerized method of
4. Initializer– Initializer is a high-end HTML5 tool presenting information combining textual data, audio,
and template generator to help you kick start your video, graphics and animations.
next HTML5 boilerplate project quickly. It's nice Component of Multimedia
tool for developing impressive and customizable Text– All multimedia productions contain some
template to suit your project needs. amount of text. The text can be in a variety of fonts and
5. Liveweave– Liveweave is yet another exemplary sizes to match the multimedia softwares professional
HTML5 tool that comes packed with context presentation.
sensitive auto completion for both HTML and CSS. Graphics– Graphics make the multimedia
The tool provides you a playground to play around application attractive. In many circumstances, people
different codes and tag elements to structure your dislike reading big amounts of material on computers. As
project. Liveweave is a highly sough-after tool a result, pictures are more frequently used than words to
among front-end developers as it helps them clarify concepts, offer background information and so
generate HTML and CSS tags automatically. on. Graphics are at the heart of any multimedia
6. Adobe Edge Animate– Adobe edge animate is a presentation.
compelling tool for HTML5 developers for creating Audio– A multimedia application may require the
interactive HTML animations. If you are a part of use of speech, music and sound effects. These are called
digital publishing, web or advertisement then adobe audio or sound element of multimedia. Sound is the most
edge animation will surely appease you. serious aspect of multimedia, delivering the joy of music,
7. Modernizr– Modernizr is an advanced open source special effects and other forms of entertainment. Speech
javascript library that allows designers to create is also a perfect way for teaching. Computer stores the
pleasurable website experiences on the basis of sound in digital form. Therefore the sound used in
visitors browser. Using this tool, you can easily multimedia application is digital audio.
detect whether the current browser supports CSS3 Video– The term video refers to the moving picture,
and HTML5 features. This way you can make your accompanied by sound such as a picture in television.
website suitable as per the browser. Video element of multimedia application gives a lot of
8. CrossWalk–Create cutting-edge HTML5 information in small duration of time. Digital video is
applications using crosswalk. In its bare bones, useful in multimedia application for showing real life
crosswalk is a web runtime tool that comes complete objects. Digital video files can be stored like any other
with outstanding features of a modern browser. files in the computer and the quality of the video can still
Crosswalk is a tool that deserves your attention for be maintained. The digital video clips can be edited
constructing interactive mobile applications. easily.
9. Online 3D Sketch– Online 3D sketch is a Animation– Animation is a process of making a
remarkable tool that makes the process of creating static image look like it is moving. An animation is just a
sketches and drawings absolutely fun and easy. It's a continuous series of still images that are displayed in a
free online tool that allows developers to create and sequence. The animation can be used effectively for
share their drawing experiences among their friends attracting attention. Animation also makes a presentation
and team members while encouraging their valuable light and attractive. Animation is very popular in
feedbacks. multimedia application.
10. Patternizer– As the name suggests, patternizer is a Graphics– A graphic is an image or visual
tool that enables developers to develop inspiring representation of an object. Therefore, computer graphics
patterns for their website. The tool is available for are simple images displayed on a computer screen.
free and allows you to integrate clean codes to Graphics are often contrasted with text, which is
Internet of things and its Application 250 YCT
comprised of characters, such as numbers and letters, • Microphone, Speakers
rather than images. • A stable internet connection
Computer graphics are separated into two different • A computer or conference phone
categories– raster graphics and vector graphics.
• Video conferencing software
Raster Graphics– Raster graphics represents image Video Conferencing Protocols– Internet
by bitmaps stored in computer memory and displayed on communication simply means communication between
a screen composed of tiny pixels. Each pixel is two or many users over the internet or the WWW (World
represented by one or more memory bits. Also known as Wide Web). The communication can be in the form of
bitmaps and one bit per pixel suffices for black and white texting, sharing information, videos, audios, ideas, video
images, while four bits per pixel specify a 16 step gray chatting etc.
scale image. Some protocols of video conferencing are–
Vector Graphics– Whereas raster graphics depend
on pixels vector graphics use path made from a
mathematical formula. The formula also known as
vectors, tells the path its shape, color and if there is one
its border. Vector graphics are computer images created
using a sequence of commands or mathematical
statements that place lines and shapes in a two-
dimensional or three-dimensional space. 1. Video Conferencing Protocol H.323–
• Designed by ITU (International
Voice Mail and Video Conferencing–
Telecommunication Union)
Voice Mail– Voicemail is a computerized system
• Computer language used is binary
that allows callers to leave a message. A voicemail is an
electronically stored voice message that is left by a caller • Provides multimedia communication over a
to be retrieved later by the intended recipient. Callers variety of networks.
leave short messages that are stored on digital media. It • It is quite complex, possibilities of delay.
is stored on the service providers server, in a space • Multipoint Control Unit (MCU), gateway,
reserved for the user called a mailbox. Voicemail has the gatekeeper (optional) and the terminal are some
same characteristics of email, except that the messages functioning components.
are voices instead of text. Voicemail comes with features 2. SIP (Session Initiation Protocol)–
like a user interface to enable selecting, playing and • Designed by IETF (Internet Engineering Task
managing of messages. Voicemail message receive from Force)
many callers at the same time and broadcast voice • Computer Language used is ASCII
messages to send to more than one person at the same • Highly Flexible and Simple
time. • User-Agent and Network server are two major
Video Conferencing– Video conferencing is live, functioning components.
visual connection between two or more remote parties • Used to establish, modify and terminate
over the internet that simulates a face to face meeting. multimedia sessions or calls
With a strong internet connection, the participants can • Resembles HTTP protocol
see, hear and talk to each other in real time, no matter • Works with both IPv4 and IPv6.
where in the world they are. Video conferencing is Introduction to e-commerce– E-commerce
important because it joins people who would not (electronic commerce) is the buying and selling of goods
normally be able to form a face to face connection. This and services or the transmitting of funds or data, over the
technology is particularly convenient for business users internet. E-commerce is also known as electronic
in different cities or even different countries because it commerce or internet commerce. There are no physical
saves time, expenses and hassles associated with market places and the entire process of marketing and
business travel. Uses of video conferencing include selling of goods, takes place online or electronically.
holding routine meetings, negotiating business deals and Online stores like Amazon, Flipkart, Shopify, Myntra,
interviewing job candidates. Ebay, Olx are example of e-commerce websites. These
When a video conference is held for informal business transactions occur either as business-to-business
purposes, it is called a video call or video chat. (B2B), business-to-consumer (B2C), consumer-to-
Components of video conferencing– consumer (C2C) or consumer-to-business (C2B). The
terms e-commerce and e-business are often used
• Video Camera or Webcam
interchangeably. The term e-tail is also sometimes used
• Display device (computer monitor, television, in reference to the transactional process that make up
projector or laptop) online retail shopping.
Internet of things and its Application 251 YCT
Types of E-commerce Models– Electronic Intranet– An intranet is a private network that can
commerce (e-commerce) can be classified into four main only be accessed by authorized users. Some intranet are
categories. The basis for this simple classification is the limited to a specific local area network (LAN), while
parties that are involved in the transactions. So the four others can be accessed from remote locations over the
basic e-commerce models are as follow. internet.
1. Business-to-Business (B2B) Email– The history of modern internet email
2. Business-to-Consumer (B2C) services reaches back to early ARPANET, with
3. Consumer-to-Consumer (C2C) standards for encoding email messages published as
4. Consumer-to-Business (C2B) early as 1973. Ray Tomlinson is credited as the inventor
of networked email in 1971, he developed the first
1. Business-to-Business (B2B)– Business to Business
system able to send mail between users on different hosts
e-commerce refers to the electronic exchange of
across the ARPANET, using the @ sign to link the user
products, services or information between
name with a destination server. Electronic mail (e-mail
businesses. Here the companies are doing business
or email) is a method of exchanging messages (mail)
with each other. The final consumer is not involved.
between people using electronic devices. A world wide
So the online transaction only involve the
e-mail network allows people to exchange e-mail
manufactures, wholesalers, retailers etc.
messages very quickly.
2. Business-to-Consumer (B2C)– Business to Email Spam– Email spam, also referred to as junk
Consumer is the retail part of e-commerce on the email or simply spam is unsolicited messages sent in
internet. It is when businesses sell products, services bulk by email (Spamming).
or information directly to consumers. The consumer
SMTP– The Simple Mail Transfer Protocol (SMTP)
can browse their website and look at products,
is an internet standard communication protocol for
pictures, read reviews. Then they place their order electronic mail transmission. Mail servers and other
and the company ships the goods directly to them. message transfer agents use SMTP to send and receive
Popular examples are Amazon, Flipkart etc. mail messages.
3. Consumer-to-Consumer (C2C)– Consumer to FTP– The File Transfer Protocol (FTP) is a standard
Consumer is a type of e-commerce in which communication protocol used for the transfer of
consumers trade products, services and information computer files from a server to a client on a computer
with each other online. These transactions are network. FTP is design for sending files to a server on
generally conducted through a third party that the internet.
provides an online platform on which the EPS File– EPS (Encapsulated Post Script) is
transactions are carried out. Consumer to consumer perhaps the most common vector image format. It is the
are direct contact with each other. It helps people standard interchange format in the print industry. EPS
sell their personal good and assets directly to an files also contain bitmap data, retaining individual
interested party. Usually, goods traded are car, coding on colour and size. This means the image retains
bikes, electronics etc. and the example of this model its resolution regardless of scale.
is OLX, Quikr etc. RGB Model– The main purpose of the RGB colour
4. Consumer-to-Business (C2B)– This is the opposite model is for the sensing, representation and display of
of the traditional commerce model of B2C. images in electronic systems, such as televisions and
Consumer to Business is a type of e-commerce in computers though it has also been used in conventional
which consumers make their products and services photography.
available online for companies to bid on and B2G– Business-To-Government (B2G), also known
purchase. A popular example of C2B platform is a as Business-To-Administration (B2A), refers to trade
market that sales royalty-free photographs, images, between the business sector as a supplier and a
media and design elements, such as istock. government body as a customer.
Important Facts ARP– The Address Resolution Protocol (ARP) is a
communication protocol used for discovering the link
HTTPS– Hypertext Transfer Protocol Secure is an
layer address, such as a MAC address, associated with a
extension of the Hypertext Transfer Protocol. It is used given internet layer address, typically an IPv4 address.
for secure communication over a computer network and This mapping is a critical function in the internet
is widely used on the internet. protocol suite.
IP Address– An Internet Protocol address (IP IPv6– Internet Protocol Version (IPv6) is the most
address) is a numerical label assigned to each device recent version of the Internet Protocol (IP). All IPv6
connected to a computer network that uses the internet addresses are 128 bits long, written as 8 sections of 16
protocol for communication. bits each.
Internet of things and its Application 252 YCT
Important Questions Asked in Previous Years Examinations
1. AMQP stands for– 13. Which of the following is not a TCP/IP layer?
(a) Advanced Mass Query Protocol (a) Application Layer (b) Transport Layer
(b) Advanced Message Queuing Protocol (c) Network Layer (d) Data Link Layer
(c) Add-on Message Query Protocol 14. Which of the following communication medium
(d) Add-on Message Queuing Protocol supports highest data rate?
2. What does IDE stand for? (a) Ethernet (b) Bluetooth
(a) In Deep Environment (c) Optical Fibre (d) Wi-Fi
(b) Integrated Development Environment 15. The IIoT stands for–
(c) Internal Deep Escape (a) Indepth Internet of Things
(d) IDLE (b) Innovative Internet of Things
3. Which is not a characteristic of TCP/IP Model? (c) Information Internet of Things
(a) Connection-oriented protocol. (d) Industrial Internet of Things
(b) Implements flow control
16. What are the challenges in IoT?
(c) Support for a flexible architecture
(d) Unreliable (a) Energy Consumption (b) Security
4. Which of the following things can have an (c) Network Congestion (d) All the above
effect on the development of an individual's 17. ________ tags, devices, smart phones useful in
personality? identification.
(a) physical and mental capabilities (a) IETF 6LoWPAN
(b) health and physical appearance (b) IEFT CoAP
(c) skin color and gender (c) RFID/NFC
(d) all of the above (d) IEEE 802.15.4LoWPAN
5. The huge number of devices connected to the 18. Which protocol interacts asynchronously over
IoT to communicate automatically. It is called– UDP?
(a) Bot to Bot (B2B) (a) HMTP (b) CoAP
(b) Machine to Machine (M2M) (c) MQTT (d) TCP/IP
(c) Skynet 19. WSN stands for _____.
(d) InterCloud (a) Wired Sensor Network
6. IoT security management includes– (b) Wireless Sensor Network
(a) Protocol abstraction (c) Wired Service Network
(b) Simple and fast installation (d) Wireless Service Network
(c) Security with hardware
20. Which of the following design is a high level
(d) Data storage
7. IoT data scalability includes _____. design without any detail?
(a) Protocol abstraction (a) Logical Design (b) Physical Design
(b) Simple and fast installation (c) Both (a) and (b) (d) None of the these
(c) Security with hardware 21. Which one of the technologies is not a
(d) Data storage technology of software IoT system?
8. Which protocol is used to link all the devices in (a) M2M (b) Data Collection
the IoT? (c) Device Integration (d) Real time Analytics
(a) TCP/IP (b) Network 22. What is a private key?
(c) UDP (d) HTTP (a) A key on your key chain
9. ______ supports low energy radio operation. (b) A key not to be given to the public
(a) IETF 6LoWPAN (b) IEFT CoAP (c) A key that opens a secret door
(c) RFID/NFC (d) Bluetooth (d) A key given to the public
10. MQTT stands for– 23. Communication is a non stop _____.
(a) Mass Query Telemetry Transport (a) Process (b) Paper
(b) Message Queuing Telemetry Transport (c)Programme (d) Plan
(c) Message Query Text Transport
24. Full form of OSI Model.
(d) Mass Queuing Text Transport
(a) Option systems Interconnection
11. What is the microcontroller used in Arduino
UNO? (b) Output systems Interconnection
(a) ATmega328P (b) ATmega2560 (c) Open system Interconnection
(c) ATmega32114 (d) AT91SAM3x8E (d) None of these
12. What does GPIO stands for? 25. _______ is an open light-weight easy to
(a) General Purpose Inner Outer implement messaging protocol for M2M
(b) General Purpose Input/Output communication.
(c) General Purpose Intersected Old (a) XMPP (Extensible Messaging and Presence
(d) General Purpose Input Outpur Protocol)
Internet of things and its Application 253 YCT
(b) MQTT (Message Queuing Telementry (a) 20 MHz (b) 16 MHz
Transport) (c) 6 MHz (d) 10 MHz
(c) AMQP (Advance Message Queuing Protocol) 41. Which one of the following protocol is mainly
(d) HTTP (Hypertext Transfer Protocol) used for home automation?
26. Who is the real creator of Bitcoin? (a) Bluetooth protocol (b) X-10 protocol
(a) Santoshi Nakamoto (b) Jeff Bezos (c) MQTT (d) Zigbee protocol
(c) Jerry Yang (d) Paul Allen 42. Which transport layer protocol is used by
27. Which is the seventh layer of OSI model? DHCP?
(a) Physical layer (b) Presentation layer (a) RSVP (b) TCP
(c) Application layer (d) Data Link layer (c) DCCP (d) UDP
28. Which of the following is not a part of IoT 43. Which of the following is not weakness of IoT?
applications? (a) Communication attacks
(a) Smart city (b) Connected Cars (b) Life cycle attack
(c) Home automation (d) Television (c) Physical attack
29. Arduino is a prototype based on an ---- to use? (d) Cost reduction
(a) Hardware (b) Software 44. End-to-end connection is established by ______
(c) Both (a) and (b) (d) None of the above protocol of the TCP/IP suite.
30. Which of the following is not element of IoT? (a) IP (b) UDP
(a) Data Cloud (b) System Security (c) TCP (d) All of these
(c) User interface (d) People 45. The RISC Stands for ______.
31. Full form of SIG is _____. (a) Reduced Instruction Set Computer
(a) Special Interface Group (b) Revise Instruction Set Computer
(b) Special Interest Group (c) Reduced Instrument Set Computer
(c) Standard Interface Group (d) Reduced Instrument Setting Computer
(d) None of these 46. A program that is used to view websites is
32. To secure your data in IoT devices. called a:
(a) Keep changing your password (a) Browser (b) Web viewer
(b) Keep updated your device (c) Spreadsheet (d) Word processor
(c) Reduce your use of Cloud Technology 47. TCP/IP is a:
(d) All of above (a) Network Hardware (b) Network Software
33. Which layer of the OSI model does data (c) Protocol (d) None of these
compression? 48. Which IP address is reserved for loop back or
(a) Network (b) Data link local host:
(c) Physical (d) Presentation (a) 192.168.0.0 (b) 127.0.0.0
34. Which of the following electronic components (c) 127.0.0.1 (d) None of these
stores electric charge? 49. The size of the IPv4 is:
(a) Resistor (b) Capacitor (a) 16 bits (b) 32 bits
(c) LED (d) Relay (c) 64 bits (d) 128 bits
35. Li-Fi technology is base on _____ for high 50. Who provide us internet:
speed data transmission. (a) TCP (b) ISP
(a) VLC (Visible Light Communication) (c) FTP (d) HTTP
(b) Wi-Fi 51. Which is not the search engine:
(c) Cellular Network (a) Altavista.com (b) Google.com
(d) Twisted Pair Cables (c) Yahoo.com (d) Facebook.com
36. PubNub ……….. publishes and subscribes in 52. What protocol does www use:
order to send and receive message. (a) HTTP (b) FTP
(a) Network (b) Account (c) WBC (d) MTP
(c) Portal (d) Keys 53. In computer FTP stands for
37. Arduino in an _____ plateform. (a) file transfer protocol (b) finding telepath
(a) Open-source (b) Close source (c) finish tele program (d) file transfer process
(c) Adware (d) All of the above 54. Bluetooth is a technology that connected
38. Which type of cable has glass center core? devices in a small area:
(a) UTP (b) Fiber-optic (a) VLAN (b) Wireless LAN
(c) STP (d) Coaxial (c) Wired LAN (d) None of the above
39. The CISC stand for ______. 55. The Word Wide Web (www) is the largest:
(a) Computer Instruction Set Compliment (a) LAN (b) MAN
(b) Complete Instruction Set Components (c) WAN (d) All of these
(c) Computer Indexed Set Componets 56. Computer network over a large area such as a
(d) Complex Instruction Set computer city:
40. What is the minimum operating frequency of (a) LAN (b) WLAN
the Arduino UNO broad? (c) PAN (d) MAN
Internet of things and its Application 254 YCT
57. What is the acronym MAN stands for: 71. TCP/IP is an example of
(a) Magnetic Access Network (a) communication protocol
(b) Multi-Area Network (b) networking protocol
(c) Metropolitan Area Network (c) data transfer protocol
(d) Multi-Access Net (d) all of the above
58. How many layers are present in the TCP/IP 72. The network protocol which is used to get
reference model? MAC address of a node by providing IP
(a) 6 (b) 7 address is
(c) 5 (d) 4 (a) SMTP (b) ARP
59. The packets of data that is transported by IP is (c) RIP (d) BOOTP
called: 73. The address resolution protocol (ARP) is used
(a) datagrams (b) frames for
(c) segments (d) encapsulate message (a) Finding the IP address from the DNS
60. Arrange the search engines by there (b) Finding the IP address of the default gateway
(c) Finding the IP address that corresponds to a
popularity:
MAC address
1. Bing 2. Yahoo 3. Ask 4. Goolge
(d) Finding the MAC address that corresponds to
(a) 4321 (b) 4312
a IP address
(c) 4231 (d) 4213
74. An example of an internet search engine is
61. SEO stands for: (a) Windows (b) Linux
(a) Search Entry Optimization (c) Yahoo (d) MS Word
(b) Search Engine Optimization 75. What is the name of the software that allows us
(c) Search Engine Operation to browse through web pages called:
(d) None of the above (a) Browser (b) Mail client
62. Website is a collection of (c) FTP client (d) Messenger
(a) Webpage (b) HTML page 76. Buying and selling goods over the internet is
(c) Both (a) and (b) (d) HTTP page called:
63. Which is a client program that acts as an (a) Hyper-marketing (b) E-commerce
interface between user and World Wide Web. (c) Cyber-selling (d) Euro-conversion
(a) Web browser (b) HTML 77. Which of the following e-commerce company
(c) URL (d) OS has launched shopsy, an app that allows
64. A multimedia file Indians to start online shops for free.
(a) is same as any other regular file (a) Amazon (b) Snapdeal
(b) must be accessed at specific rate (c) Filpkart (d) Paytm
(c) stored on remote server cannot be delivered to 78. Which segment do Flipkart, Amazon, eBay etc.
client belong to:
(d) none of the mentioned (a) B2G (b) C2C
65. In which type of streaming multimedia file is (c) B2B (d) B2C
delivered to the client but not shared? 79. Which of the following is TRUE only for XML
(a) real-time streaming but not for HTML:
(b) progressive download (a) It is derived from SGML
(c) compression (b) It describes content and layout
(d) none of the mentioned (c) It allows user defined tags
66. The graphics can be (d) It is restricted only to be used with web
(a) Drawing (b) Photograph, movies browsers
(c) Simulation (d) All of these 80. Which network has the highest speed of data
67. The component of interactive computer transfer:
(a) MAN (b) WAN
graphics are:
(c) LAN (d) SAN
(a) A light pen (b) Display unit
81. Which of the following protocols may be used
(c) Bank of switches (d) All of these for accessing World Wide Web?
68. Several graphics image file formats that are (a) HTTP (b) SMTP
used by most of graphics system are (c) SLIP (d) None of the above
(a) GIF (b) JPEG 82. A network spreading in different geographical
(c) TIFF (d) All of these location is known as
69. The length of on IPv6 address is: (a) LAN (b) WAN
(a) 16 bits (b) 32 bits (c) Both (a) and (b) (d) None of the above
(c) 64 bits (d) 128 bits 83. A set of rules that governs data
70. Internet is an example of: communication:
(a) LAN (b) MAN (a) Rule (b) Medium
(c) WAN (d) None of these (c) Link (d) Protocol
Internet of things and its Application 255 YCT
84. What is the scope of e-commerce business 98. Graphics programs are those that create
platform like Flipkart, Amazon etc. (a) Designs (b) Pictures
(a) Virtual (b) National (c) Images (d) All of the above
(c) Local (d) Global 99. Video conferencing is used for:
85. Used for video conferencing: (a) Business (b) Education
(a) Zoom (b) Skype (c) Health (d) All of the above
(c) Both (a) & (b) (d) None of these 100. Vector graphics is composed of
86. ____ is used to store the data within the (a) Pixels (b) Palette
document on the server. (c) Paths (d) None of these
(a) XML (b) DHTML 101. Raster graphics are composed of
(c) HTML (d) CGI (a) Paths (b) Pixels
87. Which language is case sensitive? (c) Palette (d) None of these
(a) HTML (b) XML 102. The quality of an image depends on
(c) Both (a) & (b) (d) None of the above (a) No of resolution used by image
(b) No. of pixel used by image
88. What does XML stands for:
(c) No. of line used by image
(a) Extra Modern Link
(d) None
(b) Extensible Markup Language
103. EPS image file format is used for
(c) Example Markup Language
(a) Vector graphics (b) Bitmap
(d) X-Markup Language (c) Both (a) & (b) (d) None of these
89. A proper scripting language is a 104. EPS means
(a) High level programming language (a) Encapsulated Post Script
(b) Assembly level programming language (b) Entire Post Script
(c) Machine level programming language (c) Entire Post Scale
(d) Low level programming language (d) None of these
90. Which tag tells browser where the page starts 105. RGB model are used for
and stops: (a) Printing (b) Computer display
(a) <html> (b) <body> (c) Painting (d) None of these
(c) <head> (d) <title> 106. E-mail stands for
91. Types of computer graphics are (a) Electronic man
(a) scalar and raster (b) vector and raster (b) Electromagnetic mail
(c) vector and scalar (d) none of these (c) Engine mail
92. The GIF format is much ____ to be (d) Electronic mail
downloaded or uploaded over the www. 107. An unsolicited email message sent to many
(a) slower (b) faster recipients at once is
(c) medium (d) none of these (a) Inbox (b) Virus
93. Once a file is saved in JPEG format some data (c) Spam (d) Attack
is lost 108. Write the correct sequence of HTML tags to
(a) Temporarily (b) Permanently design a webpage?
(c) Both (a) & (b) (d) None (a) HTML, Head, Title, Body
94. What is a method of communication between (b) HTML, Title, Body, Head
two persons with personal computers who are (c) Title, HTML, Head, Body
both connected online through the internet? (d) Head, Title, HTML, Body
(a) E-Groups 109. The first network that planted the seeds of
(b) Audio Visual Conference internet was
(c) Multimedia Conference (a) ARPANET (b) NSFNET
(d) Audio-Video Conference (c) VNET (d) INET
95. What is an electronic communication network (UPPCL TG-2 26.06.2016)
110. ..............is a global system of interconnected
for the interconnection of computers to access
governmental, academic, corporate, public, and
different websites.
private computer networks.
(a) Wi-Fi (b) Bluetooth (a) Intranet (b) Internet
(c) Internet (d) Broadband (c) Extranet (d) Darknet
96. Which one of the following telephonic (SSC 10+2 CHSL 31.01.17, 1.15 pm)
conferencing with a radio link is very popular 111. Internet, initially started as–
throughout the world? (a) TCP/IP experiment
(a) TPS (b) Telepresence (b) Network for the defence force of America
(c) Video conference (d) Video teletext (c) Group of research scientists of bell Lab
97. Voice Mail is called (d) Contribution was done by all the above
(a) Voice sequence (b) Voice message institutions
(c) Both (a) & (b) (d) None of these (RRB JE-2014)
Internet of things and its Application 256 YCT
112. Which of the following is not a web browser? 124. Flipkart is an example of which type of website?
(a) Chrome (b) Firefox (a) Celebrity website
(c) Safari (d) Linux (b) Forum Website
(SSC 10+2 CHSL 27.01.17, 10 am) (c) E-commerce website
113. Internet Explorer is a (d) Social networking website
(a) Web browser (UPPCL TG2 11-11-2016)
(b) Web search engine 125. What is e-commerce?
(c) Hypertext transfer protocol (a) Buying and selling of computer products
(d) Web data store (b) Buying and selling of products and services
(RRB JE (Shift-II), 29.8.2015) not found in stores
114. Which of the following options displays the (c) Buying and selling of intermational goods
name of the web page in an Internet Explorer (d) Buying and selling of products and services
browser? over the internet
(a) Address bar (b) Menu bar (UPPCL TG-2 26.06.2016)
(c) Status bar (d) Title bar 126. Which of the following is a tiny digital camera
UPPCL JE 31-01-2019 (Batch-02) generally used in video chats or video
115. To view information on the web you must have a conferencing?
(a) Cable modem (b) Web browser (a) Joystick (b) Light pen
(c) Domain name server (d) Hypertext viewer (c) Web camera (d) MICR
(UPPCL TG-2 26.06.2016) (AHC RO-2016)
116. Client-side scripting generally refers to the 127. HTTP stands for –
class of computer programs on the web that (a) Hyper Text Transmission Protocol
are executed client-side by (b) Hyper Text Transfer Program
(a) web browser (b) web server (c) Hyper Text Transfer Protocol
(c) website (d) URL (d) Hyper Text Transmission Program
(UPPCL RO/ARO-2014) (RRB SSE Secundrabad (Shift-I), 01.09.2015)
117. Who invented E-Mail? 128. Which of the following is an application
(a) Tim Berners-Lee (b) James Gosling protocol?
(c) Vinton Cerf (d) Ray Tomlinson (a) HTTP (b) TCP
(SSC 10+2 CHSL 15.01.17, 4.15 pm) (c) IP (d) UDP
118. World Wide Web was invented by………. (SSC CGL (TIER-1) 27-08-2016, 10am)
(a) John Barber (b) Tim Berners-Lee 129. SMTP in computer science stands for?
(c) Alan Blumlein (d) David Brewster (a) Simple Markup Transfer Protocol
(SSC 10+2 CHSL 24.01.17, 4.15 pm) (b) Systems Mail Transfer Protocol
119. The process of publishing original content on (c) Simple Mail Transfer Protocol
the Internet is called (d) Systems Memory Transfer Protocol
(a) Community publishing (UPPCL RO/ARO-2014)
(b) Digital publishing 130. Which Network protocol is used to send email?
(c) Web publishing (a) FTP (b) SSH
(d) Desktop publishing (c) POP 3 (d) SMTP
UPPCL ARO-18.02.2018 (RRB SSE Bilaspur Yellow paper, 21.12.2014)
120. Links that lead to another webpage are called- 131. Which of the following is not an e–mail
(a) Hyperlinks (b) HTTP Links protocol ?
(c) Embedded Links (d) URL (a) POP (b) IMAP
UPPCL Accountant 10-02-2018 (c) SMTP (d) FTP
121. A program that serves requested HTML files (RRB JE (Shift-2), 27.8.2015)
and page is 132. In HTTP, P stands for–
(a) Web address (b) Web page (a) Pattern (b) Protocol
(c) Web server (d) Home page (c) Program (d) Policy
(UPPCL RO/ARO-2014) RRB NTPC 28.01.2021 (Shift-II) Stage Ist
122. Files can be safely transferred using Internet 133. The internet works by using a protocol called
through- TCP/IP. What is the full form of TCP/IP?
(a) FTP (b) SMTP (a) Transmission Control Protocol/Internet
(c) TCP/IP (d) HTTP Protocol
UPPCL Accountant 10-02-2018 (b) Tele Computer Protocol/Internet Protocol
123. Mozilla Firefox, Google Chrome, Opera etc. (c) Temporary Computer Protocol/Internet
are the example of _______. Protocol
(a) Railway services (b) Web browsers (d) Transmission Computer Programme/Internet
(c) Search engine (d) Email services Protocol
UPPCL APS Exam-18.02.2018 RRB NTPC 16.01.2021 (Shift-II) Stage Ist
Internet of things and its Application 257 YCT
134. _______ is a communication protocol. 140. In reference to computers what is the meaning
(a) HTP (b) CP of LAN?
(c) TP (d) HTTP (a) Largest Area Network
RRB NTPC 09.01.2021 (Shift-I) Stage Ist (b) Local Area Network
135. Which of the following is an advantage of (c) Legal Area Network
LAN? ? (d) Longest Area Network
(a) automatic pricing of data RRB NTPC Stage-Ist, , 28.03.2016 (Shift-III)
(b) sharing peripherals 141. What is the address given to the computer
(c) saving up data connected to a network is called?
(d) backing up data (a) System address (b) S.Y.SI.D
RRB NTPC 23.02.2021 (Shift-I) Stage Ist (c) Process id (d) IP address
136. An organization has a private network for RRB J.E. (14.12.2014, Green Paper)
exclusive use by its employees- 142. Which of the following is NOT an internet
(a) Internet (b) Intranet browser?
(c) LAN (d) Network interface (a) Panda (b) Safari
RRB NTPC Stage-Ist, , 29.04.2016 (Set-II) (c) Firefox (d) Chrome
137. Which of the following is the largest network in RRB NTPC 27.02.2021 (Shift-II) Stage Ist
terms of area? 143. What is the meaning of letter 's' in 'https'
(a) MAN (b) WAN Protocol ?
(c) INTRANET (d) INTERNET (a) Scale (b) Save
RRB NTPC Stage-Ist, 27.04.2016 (Shift-I) (c) Software (d) Secure
138. Transmission of which of the following RRB NTPC 11.03.2021 (Shift-II) Stage Ist
network topologies has the highest speed? 144. Which is the world’s oldest web browser?
(a) LAN (a) World Wide Web (b) Mosaic
(b) WAN (c) Opera (d) Netscape
(c) MAN RRB NTPC Stage-Ist, , 12.04.2016 (Shift-I)
(d) LAN and WAN have equal transmission 145. Whenever we open the internet, we see
speed. ourselves by creating ‘www’. What is the full
RRB NTPC Stage-Ist, , 29.04.2016 (Shift-II) form of WWW?
139. What is the extension of TCP in relation to (a) World Wide Web (b) World Wide Word
computer system? (c) World Wise Web (d) None of the above
(a) Transmission control protocol RRB J.E. (14.12.2014,Red Ppaer)
(b) Transfer call plan 146. Webpages are created using….
(c) Transfer control process (a) HTTP (b) URL
(d) Transmission call protocol (c) HTML (d) FTP
RRB NTPC Stage-Ist, , 16.04.2016 (Shift-III) RRB NTPC Stage-Ist, , 31.03.2016 (Shift-III)

ANSWER KEY
1. (b) 2. (b) 3. (d) 4. (d) 5. (b) 6. (c) 7. (d) 8. (a) 9. (d) 10. (b)
11. (a) 12. (b) 13. (d) 14. (c) 15. (d) 16. (d) 17. (c) 18. (b) 19. (b) 20. (a)
21. (a) 22. (b) 23. (a) 24. (c) 25. (b) 26. (c) 27. (a) 28. (d) 29. (c) 30. (d)
31. (b) 32. (d) 33. (d) 34. (b) 35. (a) 36. (d) 37. (a) 38. (b) 39. (d) 40. (b)
41. (b) 42. (d) 43. (d) 44. (c) 45. (a) 46. (a) 47. (c) 48. (c) 49. (b) 50. (b)
51. (d) 52. (a) 53. (a) 54. (b) 55. (c) 56. (d) 57. (c) 58. (d) 59. (a) 60. (d)
61. (b) 62. (a) 63. (a) 64. (b) 65. (a) 66. (d) 67. (d) 68. (d) 69. (d) 70. (c)
71. (d) 72. (b) 73. (d) 74. (c) 75. (a) 76. (b) 77. (c) 78. (d) 79. (c) 80. (c)
81. (a) 82. (b) 83. (d) 84. (d) 85. (c) 86. (a) 87. (b) 88. (b) 89. (a) 90. (a)
91. (b) 92. (b) 93. (b) 94. (d) 95. (c) 96. (c) 97. (b) 98. (d) 99. (d) 100. (c)
101. (b) 102. (b) 103. (c) 104. (a) 105. (b) 106. (d) 107. (c) 108. (a) 109. (a) 110. (b)
111. (b) 112. (d) 113. (a) 114. (d) 115. (b) 116. (a) 117. (d) 118. (b) 119. (c) 120. (a)
121. (b) 122. (a) 123. (b) 124. (c) 125. (d) 126. (c) 127. (c) 128. (a) 129. (c) 130. (d)
131. (d) 132. (b) 133. (a) 134. (d) 135. (b) 136. (b) 137.(d) 138. (a) 139.(a) 140.(b)
141.(d) 142. (a) 143. (d) 144. (a) 145. (a) 146. (c)

Internet of things and its Application 258 YCT


11.
MAJOR DEVELOPMENTS IN IT
(a) Infrastructure as a service (IaaS)– It is usually the
Introduction .
most famous service model. It provides the
Today's information technology is the fastest fundamental infrastructure of data storage drives,
growing industry and its structure with change a lot in virtual servers, operating systems and networks. It is
the coming times. It is bringing very quick revolutionary an ideal option for small and medium size business
changes in the various fields like Medical, (or organizations). It is an outsourced and paid
Entertainment, Education, Business marketing etc. and it service. It is accessible as private, public or hybrid.
will be an more booms in the coming years.
(b) Platform as a service– In PaaS, the service
What are the current trends in Information
providers deploy the infrastructure and the software
Technology?
framework while the organizations/users/businesses
Information technology is growing so fast that in
can develop and execute their applications. The
every coming day it is leaving behind the old one.
different types of web application can be created
Following as some recent developments in the field of
very fast and very easily by using this service.
information technology.
(c) Software as a service (SaaS)– In SaaS, the service
1. Automation– Automation is the way of describing
providers deploy the software over the internet for
the various technologies that are used to minimize
the different users/business that paid for this through
human intervention in the production of different
types of goods and services. To achieve this various subscription or any other way. It is the best option
decision criteria, relationship between the sub- for short term projects.
processes and related actions are determined and 3. Internet of Things– The internet of things means a
then feed into the machine. It improves the speed, network of billions of things (or physical devices)
reliability and efficiency of production. It is embedded with various type of technologies like
estimated that automation will grow more in the sensors, software etc. to make them capable of
coming years. transferring and receiving the data and instructions
2. Cloud Computing– Cloud computing is the on- to or from the other devices and system over the
demand delivery of different types of computing internet. So any physical device (or electronics
services over the cloud (i.e. internet) like storage, device) that can be connected to the internet to send,
software, servers, databases, analytics, networking receive and controlled information can be used as an
and intelligence. Normally this word is used to IoT device.
express the data centers accessible over the internet 4. Edge Computing– Edge computing is a prototype
to the users. Cloud storage and sharing is a very in of a distributed computing (or distributed
demand trend that many organizations acquired. information technology architecture) that makes it
The cloud environments (cloud deployment models) possible to access the data and services at the
are three types. locations where it is required so that the response
(i) Public Cloud– It is owned by an outsourced cloud time can be improved as well as can save bandwidth
provider and it is accessible to many types of users also. IN simple words, we can say it as an
(businesses or organizations) by using the internet. architecture that helps in running the little number of
(ii) Private Cloud– This type of cloud is limited to a processes in the cloud and then shift them to the
single organization or business. It gives a more local places like a user's computer an edge server, or
controlled environment to access the resources. It any IoT devices.
provides higher security to the resources. 5. Artificial Intelligence– Artificial Intelligence is a
(iii) Hybrid Cloud– It is a combination of both public broad branch of computer science that is used to
and private clouds and it is a decent option for the make machines smart (i.e. that can carry out the
organization that looking for the advantages of both tasks that commonly needed human intelligence).
types of clouds. 6. Machine Learning– Machine learning is a branch
Cloud computing has three types of service models. of computer science and artificial intelligence. It
(a) Infrastructure as a service deals with the use of algorithms and data to emulate
(b) Platform as a service human learning behaviour. These algorithm improve
(c) Software as a service automatically by using the experience and the data.
Major Developments in IT 259 YCT
There are lots of services that are possible due to specific goal. This permits the machines and the
machine learning like search engines, software agents to find out the ideal behaviour
recommendations systems, voice assistants, social automatically within a particular condition so the
media feeds and many more. Machine learning can performance can be maximized.
be classified into the following categories. 7. Deep Learning– Deep learning also known as deep
• Supervised machine learning neural networks or neural learning is a subset of
• Unsupervised machine learning machine learning i.e, it is also a form of artificial
• Reinforcement machine learning intelligence as machine learning. In simple word, we
• Supervised machine learning– The data is labeled can say that deep learning is an AI function that
to advise the machine precisely what patterns if imitates the human brain's working to detect objects,
should search for example, when you watch any speech recognition, language translation and also is
video on YouTube. You advise the algorithm to a decision making.
show you similar video also. 8. Virtual Reality– It is the use of computer
• Unsupervised machine learning– There is neither technology to generate a simulated environment
classified nor labeled data, the machine just searches (including many senses like vision, touch, hearing
for patterns by itself. The machine does not find out and smell as well) that enables users to interact with
the right output or pattern but if can find out the the 3D worlds. By using VR technology we can
hidden patterns or structures by using the labeled experience the virtual world or environment like the
dataset. real one. To perceive such as environment, we have
• Reinforcement machine learning– It is a trial and to use a special device known as a virtual reality
error method of learning by a machine to reach a headset or helmet.

Important Questions Asked in Previous Years Examinations


1. Which represents the expression of size and (c) Reliability
form of particular thinking? (d) AaaS
(a) Data (b) Information 7. What is edge computing role in cloud
(c) Both (a) and (b) (d) None of these computing?
2. Which of the following has the characteristic of (a) They are the same
information. (b) Edge computing is the cloud's silver living or
(a) Timelines (b) Purpose the edge of the cloud
(c) Mode (d) All of these (c) Edge computing could act as an alternative to
3. Computing the information is based on cloud computing
preliminary investigation of. (d) They are unrelated
(a) Shainnan (b) Weever 8. What issue is common is many edge computing
(c) Shainnen & Weever (d) None of these challenges?
4. Which of the following is an essential concept (a) Bandwidth
related to cloud? (b) Latency
(a) Reliability (c) Network security
(b) Abstraction (d) Network traffic
(c) Productivity 9. How can software defined networking (SDN)
(d) All of the mentioned work with edge computing?
5. In which one of the following a strategy record (a) Edge computing only works in a software
or document is created respectively to the defined network.
events conditions to user may face while (b) SDN can streamline how edge computing
applying cloud computing mode. processes data.
(a) Cloud computing value preposition (c) They don't work well together.
(b) Cloud computing strategy planning (d) They are the same.
(c) Planning phase 10. Why should anyone care about edge
(d) Business Architecture Development computing?
6. Which one of the following is related to the (a) It can alleviate latency issues
services provided by cloud? (b) It can ease network congestion
(a) Sourcing (c) It can bolster bandwidth for IoT devices
(b) Ownership (d) All of the above
Major Developments in IT 260 YCT
11. Machine learning is a field of AI consisting of 19. It is a mediated environment which creates the
learning algorithms that ____ sensation in a user of being present in a
(a) Executing some task (physical) surrounding.
(b) Over time with experience (a) WWW (b) HMD
(c) Improve their performance (c) VR (d) GUI
(d) All of the above 20. A type of VR environment in which subjects
12. Machine learning algorithms build a machine are visually isolated from the real environment.
based on sample data known as _____ (a) Immersive
(a) Training data (b) Semi Immersive
(b) Transfer data (c) Non immersive
(c) Data training (d) Augmented
(d) None of above
21. Application of machine learning methods to
13. What are the three types of machine learning? large database is called
(a) Supervised learning
(a) Data Mining
(b) Unsupervised learning
(b) Artificial Intelligence
(c) Reinforcement learning
(c) Big Data Computing
(d) All of the above
(d) Internet of Things
14. Real time decisions Game AI learning tasks,
skill acquisition and Robot Navigation are 22. In what type of learning labelled training data
application of ___ is used.
(a) Reinforcement learning (a) unsupervised learning
(b) Supervised learning (b) supervised learning
(c) Unsupervised learning (c) reinforcement learning
(d) None of the above (d) active learning
15. How many layers deep learning algorithm are 23. What characterize unlabelled examples in
constructed? machine learning?
(a) 2 (b) 3 (a) there is no prior knowledge
(c) 4 (d) 5 (b) there is no confusing knowledge
16. Which of the following is limitations of deep (c) there is prior knowledge
learning? (d) there is plenty of confusing knowledge
(a) Data labeling 24. Compared to humans machines.
(b) Obtain huge training datasets (a) Can make more complex decisions based on
(c) None of the above unexpected circumstances
(d) Both (a) and (b) (b) Can work in harsher environment
17. Which of the following deep learning models
(c) Make fewer errors
uses back propagation?
(d) (a) and (c)
(a) Convolutional Neural Network
(b) Multilayer perception Network 25. What is true about machine learning?
(c) Recurrent Neural Network (a) machine learning is the field of computer
(d) All of the above science
18. For an image classification task which of the (b) ML is a type of artificial intelligence that
following deep learning algorithm is best extract patterns out of raw data by using an
suited? algorithm or method
(a) Recurrent Neural Network (c) The main focus of ML is to allow computer
(b) Multi Layer Perception systems learn from experience without being
(c) Convolution Neural Network explicitly programmed or human intervention.
(d) None of the these (d) All of the above

ANSWER KEY
1. (b) 2. (d) 3. (c) 4. (b) 5. (b) 6. (a) 7. (c) 8. (d) 9. (b) 10. (d)
11. (d) 12. (a) 13. (d) 14. (a) 15. (b) 16. (d) 17. (c) 18. (c) 19. (c) 20. (a)
21. (a) 22. (b) 23. (d) 24. (d) 25. (d)

Major Developments in IT 261 YCT


12.
PEDAGOGY OF COMPUTER SCIENCE
"Nano Technology is knocking at our doors. We Computer Science Teaching at Different Levels in
should be aware of the trends of technology and nurture Schools–
our young minds." Primary Level
Dr. A.P.J. Abdul Kalam • At primary levels, the computer is being used to
UNIT-I : Aims and Objectives of Teaching display the lessons in the form of Rhymes, Games and
Computer Sciences Browsing and Interactive mode.
Pedagogy of Computer Science– Computer science • Simple software applications like MS Paint are taught.
is an integral part of our lives, shaping virtually Secondary Level
everything from the objects around us to the ways in • At the secondary level, computer skills are developed.
which we communicate, travel , work and play. • The application software like MS Word, Excel and
Purpose of Teaching Computer Science– The Power Point are taught.
purpose of computer science teaching in school is: Higher Secondary Level
• To enable the student to grasp the basic knowledge • At a higher secondary level, computer science
needed from further study of computer science and teaching is at a high level.
the related technology and • The programming skill-based curriculum is introduced
• To understand its application. at this level.
Aims and Objectives of Teaching Computer Science– The languages like C, C++ and Visual Basic and the
The teaching of computer science should aim to web language like HTML are in the higher secondary
1. Provide fundamental knowledge to the students. curriculum.
2. Develop in them the skill of thinking and analyzing. The Place of Computer Science in School
3. Inculcate proficiency in reasoning and synthesizing. Curriculum–The 5 reasons for computer science
4. Create interest and scientific attitudes. courses to be taught at present are:
5. Develop communicative skills and soft skills. 1. To use electronic gadgets in all fields.
2. To be on part with ever-increasing societal needs
6. Help the students apply their knowledge in learning and expectations.
activities. 3. To become equipped for new business and industries
7. Help the students attain the thinking process. dimensions.
8. Make the student attain the skills of initiatives. 4. To be competent for local and global competitions.
9. Make the students associate the knowledge in real 5. Working with finance.
time application. Computer Science Teaching in Relation to other
10. Build team spirit. School Subjects
11. Help the students attain the skill of problem-solving. Computer Science and Chemistry–
12. Provide them vocational skills. • Nuclear magnetic resonance, mass, infra-red and ultra-
13. Inculcate citizenship and love for the society and violet spectrometry all depend on computers to control
Nation. the sensitive equipment and obtain and record detailed
14. Promote local and global understanding. measurements.
Need for Teaching Computer Science– The use of • It is obvious that computers are important in taking
computers is inevitable and it has become a necessary measurements but they can also be used to predict
electronic gadget in every individual's life. By measurements.
introducing computer science in the school curriculum, • There is some very powerful software available for
we can confidently challenge that the educational predicting the physical properties of compounds.
industries be fixed on to the global standards. • Bonds lengths, melting points, vibrational frequencies
Bloom's Taxonomy of Educational Objectives– and properties such as solubility can be predicted
Objectives are the specific and precise behavioural using dedicated software based on theories known.
outcome of teaching a topic. The main objectives of • Software like this can help you to 'design' a molecule
teaching computer science must ensure a better match to the specific needs of the chemist.
between the industry's requirements and outputs of the • Without the software, it would take hours of
education sector emphasizing the quality needs. calculations to predict the properties.
Knowledge acquisition, adaptation and utility are the Computer Science and Physics–
prime slogans of the present learning society. Hence • Computers have great influence in the field of physics.
learning computers from the school is the need of the • Starting from atom energy to Astronomy, the
hour. Whole human processes can be divided into three computer has a deep influence.
levels as follows: • Finding weather reports, moments of particles and
1. Cognitive Domain (Activities related to head) their functions can be monitors through computers.
2. Affective Domain (Activities related to the heart) • Research in the field of physics is enhanced and
3. Psycho-Motor Domain (Activities related to hand) sophisticated by computer and its applications.
On the basis of these three Domains, B.S. Bloom • Computers are used in Mechanical engineering
and his associates divided educational objectives and through CAD, CAM, ANSYS and CATIA as
there were six objectives for each domain. designing and analyzing software.
Pedagogy 262 YCT
Computer Science and Biology– • It contained approximately 18500 vacuum tubes,
• The use of computer technology has greatly enhanced 70000 resistors and 10000 capacitors and weighed
the medical field. about 30 tones.
• This is particularly so in hospital environments where • It also consumed a large amount of electrical power,
reliability and quality are critical factors. considerable space and a large amount of money.
• Many computer applications, such as patient Second Generation Computers–
information systems, monitoring and control systems • In this generation, the large bulky vacuum tubes were
and diagnostic systems have been used to enhance replaced with the much smaller transistors.
healthcare.
Computer Science and Social Science– The computer • The transistors were not only smaller in size but also
is used to review the past with documentary evidence. more reliable and consumed less energy, besides
• The books and all other old documents are being reducing the size of the computers considerably.
digitalized using computers. • Also, second generation computers used high level
• Moreover, it helps to develop new dimensions of programming languages.
maps and it is useful in finding natural resources using Third Generation Computers–
satellites, Receivers and Sensors. • The third generation of computers began in 1960, after
• The computer has great influence in developing the invention of an integrated circuit or chip.
Global Positioning System (GPS) • This chip was a one quarter inch square piece of
Computer Science and Language material on which thousands of electronic circuits
• Computer science is used to develop software in (replacements for vacuum tubes, transistors, resistors,
languages. and capacitors) could be implanted.
• Computer spread languages throughout the world. • This is considered to be the backbone of today's
UNIT II : Hardware and Software of Computers modern electronic computers.
What is Computer? Fourth Generation Computers–
A computer is a device, which can compute. It is an • This generation of computers was characterized by the
electronic device, which works under a set of instructions development of a microprocessor or a microchip in
automatically accepts the supplied data, processes and 1970.
analyzes the data and produces the information.
• The first fully electronic computers, introduced in the • Approximately 70,000 or more vacuum tube
1940s' were huge machines that required teams of equivalents or transistors could be embedded in a
people to operate. But now days we have the most single chip of this kind.
advanced machines which perform a number of • They were very powerful in terms of the speed of
calculations within a fraction of time. processing and memory.
How does computer works? • They were otherwise known as "computers on a chip".
Computers work through an interaction of Hardware and Fifth Generation Computers–
Software. • The fifth generation computers of the 1990s was much
Hardware– Hardware refers to the parts of a computer faster and more powerful.
that we can see and touch, including the case and • Therefore, this generation of computer is
everything inside it. The most important piece of characterized by "Artificial Intelligence."
hardware is a ting rectangular chip inside the computer Because of the rapid growth of technological
called the Central Processing Unit (CPU), or advancements in computers, no one can predict what the
microprocessor.
future will bring. It is certain that computers will
• It is the "brain" of your computer the part that
translates instructions and performs calculations. continue to evolve and will bring about significant
• Hardware items such as your monitor, keyboard, changes in our lives in the future.
mouse, printer and other components are often called Types of Computers–
hardware devices or devices. • Analog • Digital
Software– • Hybrid Computers • Super Computers
• Software refers to the instructions or programs that tell • Mainframe Computer • Minicomputer
the hardware what to do. • Workstation • Personal Computer
• A word processing program that we can use to write • Notebook Computer • Laptop Computer
letters on your computer is a type of software. Computer Network– A computer network is an
• The operating system is software that manages our interconnection of various computer systems located in
computer and the devices connected to it. different places. In a computer network, two or more
• Two well-known operating systems are Windows and computers are linked together with medium and data
Macintosh operating systems. communication devices for the purpose of
History of Computers– The history of computer communicating data and sharing resources.
development is often in reference to the different Benefits of Network–
generations of computing devices. Each of the five 1. File Sharing
generations of computers is characterized by a major 2. Printer/Peripheral Sharing
technological development that fundamentally changed
the way computers operate. 3. Internet Connection Sharing
First Generation Computers– 4. Multi-Player Games
• The first electronic computer came into use at the end 5. Internet Telephone Service
of the II World War. 6. Home Entertainment
Pedagogy 263 YCT
Types of Networks– • Research and Planning Applications– Computers
There are many different types of networks. However, are used in various research and planning applications
from an end user's point of view there are three basic such as test item analysis, project planning and
types: evaluation, budget forecasting the feasibility of
1. Local Area Network opening new courses etc.
2. Wide Area Network UNIT-III : Micro Teaching
3. Metropolitan Area Network Micro-teaching is one of the most important
Computer Virus– developments in the field of teaching practice. It is
• A computer virus is a program that is able to copy originated at Stanford University in 1963.
itself when it is run. Basically, micro-teaching is a 'scaled-down teaching
• In addition to copying itself, a computer virus can also encounter' in which a teacher teaches a small unit to a
execute instructions that cause harm. For this reason, group of 5 to 10 students for a small period of 5 to 10
computer viruses affect security. minutes and one teaching skill is practiced during the
• Computer viruses are created for a cause, sometimes teaching.
they are created to spread political messages and they Micro-teaching is a new training design for pupils-
are also created to hack some system files. teachers which provide an opportunity to practice one
• Computer viruses are spread in many ways. Some of teaching skill at a time and with information about their
the types of spreading are email, removable hardware, performance immediately after completion of their
downloading and so on. lesson.
The Various Uses of Computers– "Allen (1966) defines micro-teaching as a 'scaled
A computer is used in all human life. The most important down teaching encounter in class size and class time'."
areas have been given as follows. "According to the Encyclopedia of Education (Ed.
1. Routine Job Handling Deighton), "Micro-Teaching is a real, constructed, scaled
2. Traffic Control down teaching encounter which is used for teacher
3. Electronic Money training, curriculum development and research."
4. Industrial Application Microteaching is a teacher training technique for
5. Trade learning teaching skills. It employs a real teaching
6. Scientific Research situation for developing skills and helps to get deeper
knowledge regarding the art of teaching.
7. Medicine
Principles of Micro-Teaching
8. Space Science 1. Principle of one Skill at a Time
9. Publication 2. Principle of Limited contents
10. Communications 3. Principle of Practice
11. Education 4. Principle of experimentation
Uses of Computers in Schools 5. Principle of Immediate Feedback
• Administrative uses– Many educational institutions 6. Principle of Evaluation
computerize nearly all their operations from mailing 7. Principle of Continuity
labels to staff payroll. 8. Principle of Individualized Training
• Office Applications– In the offices, computers are Phases of Micro-Teaching
used in the filing, typing/word processing, preparing 1. Knowledge Acquisition Phase
to mail for dispatch and making labels of addresses. 2. Skill Acquisition Phase
• Library Applications– In the library, computers are 3. Transfer Phase of Micro-Teaching
used for retrieval of bibliographic information, Teaching Skills–
cataloging, circulation, purchasing of books, journals Teaching is considered science as well as art. An
etc. searching books, and charging fines from effective teacher employs certain teaching skills to
students. Also, databases can be prepared for the general calculative learning situations in his classroom.
different users of the library. "A teaching skill is defined as set of teachers
• Financial Applications– Computers are used for behaviour and activities which are especially effective in
making budgets, auditing, accounts bringing about desirable behavioral changes or skills
receivable/payable, general ledger, purchase order among teachers and pupil teachers."
generation, salary schedule analysis and maintenance Allen and Ryans (1969), have prepared and
of students fees records etc. suggested a list of the following fourteen teaching skills.
• Student Applications– Computers are used to make a 1. Stimulus variation
time table for students, report cards, grade 2. Set induction
3. Closure
information, maintenance of attendance, students
4. Silence and non-verbal cues
health and demographic records, result processing, fee 5. Reinforcement of student
statements, railway concessions cards, bio-data of 6. Asking question participation
students etc. 7. Probing questions
• Personnel Applications– Computers are used to 8. Divergent question
prepare payrolls of workers, maintenance personnel 9. Attending behavior
records staff assignments, leave records of teachers, 10. Illustrating
health records, tax information and reporting, issuing 11. Lecturing
circular to teaching and non-teaching staff- 12. Higher-Order Questions
maintaining bio-data of teachers and non-teaching 13. Planned repetition
staff. 14. Communication completeness
Pedagogy 264 YCT
UNIT-IV : Instructional Methods • In this method, the school curriculum and contents of
Unit Plan– A unit plan is basically a list or series of studies are considered from the pupils point of view.
lesson plans designed around a specific topic, project, • It also illustrates the problem-solving method.
content etc. and among other reasons that apply for • It is a pupil-centered method.
planning in general, it is important for teachers to design • The students work out problems selected by
one because a great deal of learning is directly correlated themselves, investigate them and solve them in groups
to teachers' planning and preparation. or individually
Components in a Unit Plan– • The teacher act as a guide and instructor.
1. Unit Title & Subject Area "A project is a problematic act carried to completion
2. Communicative Competence Components in its natural setting" – Stevenson
3. Classroom/Level "It is a unit of activity in which pupils are made
4. Unit Rationale responsible for planning and purposing" – Parker
5. Goals 5. Analytic Method
6. Objectives • Analysis means breaking up of subject matter.
7. Content • It starts from unknown to known facts.
8. Learning Activities • This method helps to break the complex problem into
9. List of Sources simpler ones.
10. List of Materials • The students by this method develop the ability to
11. Assessment attack upon the problem and analyze it into a simpler
12. Explanation of how the unit plan addresses a form.
particular student profile.
Lesson Plan Writing in Computer Science– • The spirit of investigation and critical reasoning is
In education, it is necessary to plan a lesson developed by this method.
scientifically. In the teaching of computer science, • It increases individual thinking
writing a lesson plan is very important. • New facts are discovered by the objective approach of
A lesson plan is an instructional outline prepared by students.
the teacher in order to import systematic and planned 6. Synthetic Method
information to the students in the class. • It binds different known facts into unknown facts.
Herbartian Lesson Plan– It is an ancient method of • It leads from known to unknown facts.
lesson-plan. This method is used from past times but 7. Scientific Method or Problem Solving Method
today its use is also not less. In most training institutions • Any method of solving a problem systematically and
Herbartian lesson-plan is used. scientifically may be called scientific.
Herbartian five-step for Making a Lesson Plan • Scientific method refers to a technique for
are– investigating phenomena, acquiring new knowledge or
1. Preparation correcting and integrating previous knowledge.
2. Presentation • A scientific method consists of the collection of data
3. Comparison and Abstraction through observation and experimentation and the
4. Generalization formulation and testing of hypotheses.
5. Application 8. The Inductive Approach
Methods of Teaching Computer Science– The various • This method requires the study and careful
methods of teaching Computer Science are as follows examination of particular facts to deduce a general
• Lecture principle.
• Demonstration • Pupils are actively engaged in thinking for themselves
• Lecture-demonstration and discovered new rules, generalization etc.
• Project method • The students draw generalization from particular
• Analytic method principles from observed rules and from instances.
• Problem-solving Steps involved in the inductive method are–
• Scientific method i. Sensing the problem
• Synthetic method ii. Analyzing the situation
1. Lecture Method– Lecture means teaching a lesson in iii. Organizing information
the form of speech or talk. The teacher delivers a iv. Framing solution
lecture on a particular topic and the students keep v. Eliminating
listening in an idle manner. vi. Verification
2. Demonstration Method– In this method, the spoken 9. The Deductive Approach
word is supplemented with a demonstration using It suggests the verification of general principles, rules,
varied aids resulting in auditory and visual learning. definitions already learned.
3. Lecture-Demonstration Method– It should be noted that this method has two functions
• This method of teaching is sometimes also referred to to perform–
as lecture-cum-Demonstration method. 1. Drawing inferences from general principles studied.
• This lecture-demonstration method is used by 2. Explaining particular facts with the help of general
computer science teachers for imparting computer principles, laws etc.
science education in the class room. Steps of the Deductive Method–
4. Project Method– i. Understanding the problem
• This method is based on the principle of learning by ii. Collecting information
doing and learning by living. iii. Reviewing
Pedagogy 265 YCT
iv. Drawing inferences • Visual Aids- Objects, Picture, Map, Figure, Chart,
v. Verification Posters, Model, Bulletin Board, Flannel Boards,
10. Programmed Learning Globe, Graph or Any other type of Graphics such as
• Programmed learning is an educational innovation and diagrams, Cut-outs, cartoons etc.
auto instructional device. • Audio- Radio, Tape Recorder, Teaching Machine.
• It has been coined from principles of operant learning • Visual- Projector, Epidiascope, Film Strips, Motion
by B. F. Skinner. Picture etc.
• It is also named programmed instruction and Audio-Visual- Films, Television, Video, Cassettes etc.
instructional technology. Visual Material Aids- Use of Charts.
Principles of Programmed Learning Interactive Whiteboard
• Principle of small steps • An Interactive whiteboard is a touch-sensitive screen
• Principle of active responding that works in conjunction with a computer and a
• Principle of immediate confirmation projector.
• Principle of self-pacing • It is a presentation device that interfaces with a
• Principle of evaluation computer.
Computer Assisted Instruction • The computer images are displayed on the board by a
Computer assisted instruction is a method of using digital projector, where they can be seen and
computer technology in teaching and learning. manipulated.
Computer-Assisted instruction (CAI) is an
interactive instructional technique whereby a computer is Powerpoint Presentation–
used to present the instructional material and monitor the • Powerpoint can be an effective tool to present material
learning that takes place. in the classroom and encourages student learning.
Computer-Managed Instruction • Powerpoint can be used to project visuals which
Computer-managed instruction is an instructional would otherwise be difficult to bring to class.
strategy whereby the computer is used to provide UNIT-VI : Latest Trends in Information
learning objectives, learning resources and assessment of Technology
learner performance. Multimedia– The term multimedia by definition
It refers to the use of a computer system to manage means 'more than are media'.
information about learner performance and learning "According to Hofstetter (2001), Multimedia is the
resources options. use of computer to present and combine text, graphics,
UNIT-V : Instructional Aids audio and video with links and tools that let the user
Instructional Aids in the Teaching of Computer navigate, interact, create and communicate."
Science– Meaning of the term instructional material or Desktop Publishing– Desktop publishing is the
teaching aid use and importance of instructional material process of preparing documents for printing via special page
or teaching aid in Computer-Science-Guiding principles layout software known as desktop publishing software.
for the effective use of audio visual aids– Internet–The internet has revolutionized
Audio Visual Aids– communication methods on the world. Sitting at a work
Audio visual aids are sensitive tools used in teaching station or a PC, one can get any kind of information one
and as avenues for learning. These are planned wants.
educational materials that appeal to the senses of the • The latest technological advances have enabled it to
people and quicken learning facilities for clear
be used as a business tool as well, with the result that
understanding.
According to Kinder S. James– "Audio visual aids companies are today spending a considerable amount
are any device which can be used to make the learning of money on internet research.
experience more concrete, more realistic and more The internet is a system that lets computers all over
dynamic." the world to communicate with each other. The internet
According to K.P. Neeraja– An audio visual aids is is a network of networks that connects computers all
an instructional devices in which the message can be over the world.
heard as well as seen." E-Learning–
Characteristics of Instructional Aids or Audio- • E-learning can encompass a wide variety of online
Visual Aids– J.K. Davies has suggested the following initiatives.
five characteristics of Audio-Visual Aids: • E-learning is the use of electronic media (computers,
• Audio-Visual Aids help in developing perception. tablets or phones) to educate or train learners.
• It helps in developing understanding. Virtual learning–
• It enables the pupils to acquire correct knowledge. A virtual learning environment is a set of teaching and
• Audio-Visual Aids help in the transfer of training. learning tools designed to enhance a students learning
• These are helpful in acquiring knowledge and experience by including computers and the internet in the
providing reinforcement. learning process.
• Audio-Visual Aids help in developing retention. Web-Based Learning–
Instructional Aids Used in Teaching– The Web-Based Learning encompasses all educational
Instructional Aids used in teaching can be classified in interventions that make use of the internet (or a local
the following ways: internet). There are currently three broad classifications
• Traditional Aids- Blackboard/Chalkboard, Books, or configurations within Web-Based Learning: tutorials,
Periodicals. online discussion groups and virtual patients.
Pedagogy 266 YCT
Tele-conferencing– regular time intervals right from the beginning of the
• The term teleconferencing refers to electronic meetings academic session and employing suitable remedial
that involve people who are at physically different measures for enhancing their learning performance. CCE
sites. is the modern method of evaluating all the prime
• The telecommunication technology system allows dimensions of a student's personality that of how much
meeting participants to interact with one another he has been throughout.
without travelling to the same location. New scheme of Evaluation–
Audio Conferencing– As a part of this new system, Students marks will be
Audio conferencing is the use of voice communication replaced by grades which will be evaluated through a
equipments to establish an audio link between series of curricular and extra-curricular evaluations along
geographically dispersed persons, one that allows them with academics. The aim is to reduce the workload on
to conduct a conference. students and to improve the overall skill and ability of
Video Conferencing– the student by means of evaluation of other activities.
• Video conferencing is the use of television equipment Grades are awarded to students based on work
to link geographically dispersed conference experience skills, dexterity, innovation, steadiness,
participants. teamwork, public speaking, behaviour etc. to evaluate
• The equipment provides both sound and picture. and present an overall measure of the students ability.
• With video conferencing, participants can see and hear This helps the students who are not good in academics
each other. to show their talent in other fields such as arts,
humanities, sports, music, athletics etc.
UNIT-VII : Evaluation in Computer Science Techniques and Tools of Evaluation
Introduction– Evaluation is integrated with the • Questionnaire
whole test of education and its purpose is to improve
instruction and not merely to measure its achievements. • Rating scale
It exercises a great influence on the pupil's study habits, • Observation Method
the teacher's methods of instruction and thus helps not • Interview Method
only to measure educational achievements but also to • Inventory
improve it. • Assignment
Purposes of Evaluation– Achievement Test–
• To provide for the collection of evidence which will Scholastic achievement tests constitute an important tool
show the degree to which the pupils are progressing for evaluation. It is necessary for the teacher to know
towards curricular goals. how far the pupils have attained in a particular subject
• To permit teachers and supervisors to evaluate the area. In the school evaluation program, various forms of
effectiveness of curricular experiences, activities and achievement tests are used to measure the
instructional methods. accomplishment of the pupils.
• To make provision for guiding the growth of individual "Any test that measures the attainments or
accomplishments of an individual after a period of
pupils to diagnose their weaknesses and strengths, to training or learning is called an achievement test."
point out areas where remedial measures are desirable. – Downie
• To provide a basis for modification of the curriculum "An achievement test is a test designed to measure a
or for the introduction of experiences to meet the person's knowledge, skills, understanding etc, in a given
needs of the individuals and groups of pupils. field taught in a school." –Goods' Dictionary
• To motivate pupils towards better attainment and An achievement test is an instrument designed to
growth. measure the accomplishment of the students in a
Types of Evaluation specified area of learning, after a period of instruction.
Formative Evaluation– A formative test is Preparation of Achievement Test
constructed to evaluate each unit. Such tests are used to The important steps envisaged in the preparation of a
make teaching-learning more effective and to give good teacher made test are as under.
students the opportunity to get mastery over the content 1. Planning the test
matter. Here, more emphasis is laid on the achievement 2. Preparation of a design
rather than objectives. 3. Designing the test items
"Formative evaluation occurs over a period of time and 4. Reviewing and editing
monitors student progress. –Wiersma and Jurs" 5. Arranging the items
Summative Evaluation– 6. Providing directions
A summative test is given to students at the end of 7. Preparing the scoring key and marking scheme
the year to measure the educational attainments and 8. Administering the test and scoring
achievement of and to determine the grade or division or 9. Evaluating the test
certificate for the individual learner. It provides a complete Online Examinations
picture of the progress of the learner individually and aims • Online examination helps the students for appearing
at the total evaluation of the learner. the exam online.
"Summative evaluation is done at the conclusion of • Its mission is to offer a quick and easy way to appear
instruction and measures the extent to which students the exam and it also provides the result immediately
have attained the desired outcomes." after the exam.
–W. Wiersma & S.G. Gurs • Through partnerships with boards that are conducting
Continuous and Comprehensive Evaluation– the multiple-choice type examination it can provide
CCE helps in improving Students performance by special advantages to the students that can't be found
identifying his/her learning difficulties and abilities at anywhere else.
Pedagogy 267 YCT
Important Questions Asked in Previous Years Examinations
1. The method & practice especially as an 13. Documents converted to _____ can be
academic subject or theoretical concept– published to the web.
(a) Analysis (b) Subject-expert (a) Doc file (b) Http
(c) Pedagogy (d) Expertise (c) Machine (d) HTML
2. _______ prepares students to take the role of a 14. The computer that is not considered as a
developer by expanding their knowledge of portable computer is
programming and in designing of the web page (a) Laptop computer (b) Mini computer
and applying the same documentaries for uses. (c) Notebook computer (d) None of these
(a) Designing of web 15. Part of computer that has a physical structure
(b) Designing of program is called
(c) Programming (a) Hardware (b) Software
(d) Computer & Data analysis (c) Motherboard (d) None of these
3. Which of the following is not the element of 16. Output unit
internet? (a) It accepts the results produced by the
(a) Email (b) Chatting computer
(c) Furniture (d) Search Engines (b) It supplies the converted result to the user
4. Skill that all pupils must learn if they are to be (c) It converts these results to human acceptable
ready for the work place & able to participate form
effectively in the digital worlds (d) all of the above
(a) Computer Interaction 17. Which of the following is knowledge is known
(b) Computational Thinking's as microcomputer.
(c) Computer Science (a) Desktop (b) Laptop
(d) Computer Teachers (c) Palmtop (d) All of the above
5. The components that process data are located 18. ALU stands for
in the? (a) Arithmetic & Logic Unit
(a) Input devices (b) Output devices (b) Allegoristic & Logic Unit
(c) System unit (d) Storage component (c) Application & Logic Unit
6. The CPU and memory are located on the? (d) Analogy & Logic Unit
(a) Expansion board (b) Motherboard 19. What is computer?
(c) Storage device (d) Output device (a) An electronic device
7. Teaching of computer science is done at (b) An information device
(a) Primary level (b) Secondary level (c) An educational device
(c) Middle level (d) All of the above (d) None of these
8. What are the aims of teaching Computer 20. Character printers are also called
Science. (a) Serial printers (b) Line printers
(a) To provide theoretical knowledge of the (c) Page printers (d) Impact printers
terminologies used in computer science 21. DNP stands for
education. (a) Dot Matrix Printers
(b) To make aware the students with the criteria (b) Digital Menology Printers
& methodologies being used in the functional (c) Digital Matrix Printers
of the computers. (d) Digital Monitoring Printers
(c) Both (a) & (b) 22. Dot matrix and Daisywheel printers are
(d) None of these example of
9. Types of general Aims & Objectives (a) Non impact printers (b) Dot printers
(a) Knowledge (b) Application (c) Impact printers (d) Noisy printers
(c) Analysis (d) All of the above 23. What is known as secondary storage media?
10. When Blooms Taxonomy of educational (a) OCR (b) Magnetic Tape
objectives was proposed? (c) MICR (d) Magnetic Disc
(a) 1956 (b) 1957 24. Most popular processing for tests
(c) 1955 (d) 1959 (a) OCR (b) OMR
11. Central processing unit has (c) MICR (d) BCR
(a) Memory 25. Advantages of magnetic tape
(b) ALU (Arithmetic & Logic Unit) (a) Storage capacity (b) Cheap
(c) Control Unit (c) Reusable (d) All of the above
(d) All of the above 26. OCR stands for
12. ______ are graphical objects used to represent (a) Optical Character Reader
commonly used application. (b) Optional Code
(a) GUI (b) Windows (c) Optical Character Recognition
(c) Application (d) Icons (d) Optical Code Recognition
Pedagogy 268 YCT
27. BCR stands for (a) Inductive Approach
(a) Bar Code Reader (b) Heuristic Method
(b) Bar Character Reader (c) Critical Pedagogy
(c) Bar Code Recognition (d) Deductive Approach
(d) Bar Character Recognition 40. Pedagogy is a Greek word which literally
28. MICR stands for means
(a) Magnetic INK Code Recognition (a) To understand the child
(b) Magnetic INK Character (b) To guide the child
(c) Magnetic INK Code Reader (c) To educate the child
(d) Magnetic INK Character Reader (d) To lead the child
29. Barcode reader or scanner is called 41. Which one of the following is not an example of
(a) Point of sale (b) Point of scanner software?
(c) Both 1 & 2 (d) None of these (a) MS Word (b) Windows
30. Devices required to store and execute the (c) Monitor (d) MS Paint
software is called? 42. CU stands for ____
(a) Hardware (b) Software (a) Compressed Unit (b) Computer Unit
(c) Reliability (d) Instructions (c) Control Unit (d) None of these
31. The ability to use learnt material in a new 43. Which part is known as backbone of the
situation by the child making use of his computer?
previous knowledge to solve the problem is (a) CPU (b) Hardware
called (c) Software (d) Keyboard
(a) Analysis (b) Synthesis
44. A microprocessor is _____
(c) Application (d) Knowledge
(a) A combined unit of monitor and keyboard.
32. According to Bloom's taxonomy which option
(b) A combined unit of ALU and CU.
is incorrect for the preparation of objective
(c) A combined unit of CPU and UPS
based questions?
(a) Analysis (b) Evaluation (d) None of these
(c) Self actualization (d) Application 45. Which of the following is required to run MS
33. Which of the following is an example of higher- Paint?
order of cognitive learning outcome? (a) Application software
(a) Learning of facts and their sequences (b) System software
(b) Learning roles and action sequences (c) Multimedia software
(c) Learning of concepts and abstractions (d) None of these
(d) Learning of awareness and valuing 46. ______ is the brain of the computer.
34. This domain deals with the emotions, attitudes (a) Monitor (b) Software
and interests of the students (c) CPU (d) Keyboard
(a) Affective (b) Cognitive 47. ______ is the set of instructions.
(c) Psychomotor (d) Developmental (a) Hardware (b) Application software
35. In cognitive process, constructing meaning (c) System software (d) Both (b) and (c)
from instructional messages refers to which of 48. A computer virus is a:
the following? (a) Hardware (b) Software
(a) Understand (b) Analyse (c) Bacteria (d) Freeware
(c) Remember (d) Evaluate 49. Who is known by the name of crackers in the
36. Which level of the cognitive domain would the context of computer security?
following question relate to? "Would frequent (a) Black Hat Hackers (b) White Hat Hackers
washing of hands result in a reduction in the (c) Elite Hackers (d) Script Kiddie
incidence of diarrhoeal diseases?" 50. Which of the following terms is just the
(a) Comprehending (b) Applying collection of networks that can be joined
(c) Analyzing (d) Evaluation together?
37. Pedagogy is concerned with? (a) Intranet (b) Extranet
(a) Aims (b) Content (c) Internet (d) LAN
(c) Evaluation (d) Teaching methods 51. Micro-teaching is
38. Which of the following learning strategies are (a) Scaled down teaching
not developed by B. S. Bloom? (b) Effective teaching
(a) Division of contents into units (c) Evaluation teaching
(b) Diagnose the learning difficulties (d) Real teaching
(c) Attain mastery level by teachers 52. Which step is prominent in the syntax of
(d) Administering unit test teaching model of memory level and
39. A teaching approach which attempts to help understanding level?
students to question and challenge domination (a) Planning (b) Exploration
and the beliefs and practices that dominate (c) Generalization (d) Presentation
Pedagogy 269 YCT
53. Morrison has described five steps in his 62. Which of the following method provides the
teaching model at understanding level which proof of the problem?
are (a) Project method
I. Presentation (b) Analytic method
II. Exploration (c) Inductive method
III. Organisation (d) Synthetic method
IV. Assimilation 63. Which one of the following happenings in the
V. Recitation classroom is an activity?
The correct sequence is (a) Children engaged in exploration
(a) I, II, III, IV, V (b) II, I, IV, III, V (b) Teacher explaining how to do sums
(c) IV, V, III, I, II (d) II, I, III, IV, V (c) Children reciting counting in form of rhymes
54. Total time taken in Indian Model of Micro (d) Children copying from blackboard
Teaching is 64. Which of the following activities is best suited
(a) 30 minute (b) 40 minute for the development of spatial understanding
(c) 36 minute (d) 45 minute among children?
(a) Drawing the top view of a bottle
55. In which of the following skill, testing of
(b) Locating cities on a map
previous knowledge comes?
(c) Noting the time of moon rise
(a) Skill of demonstration
(d) Representing numbers on a number line
(b) Skill of introduction 65. Which one of the following methods is most
(c) Skill of stimulus variation suitable for teaching mathematics at upper
(d) Skill of closure primary level?
56. If a teacher finds a problematic child in the (a) Demonstration method
class, what should he does? (b) Lecture method
(a) send the child back to home immediately (c) Activity-Based learning
(b) ignore the child (d) Problem-solving method
(c) Punish the child 66. Out of the following, which of the teaching
(d) Provide counseling to the child methods in mathematics is difficult to use in a
57. You have a mixed class of boys and girls. formal classroom situation?
Which method would you adopt to improve co- (a) Inductive (b) Deductive
operation between them? (c) Project (d) Analytic
(a) Asking parents to discuss equality 67. Which of the following is the best method of
(b) Talking about equality in lessons teach geometry?
(c) Setting tasks which have to be done together (a) Play method
(d) Making boys and girls share a bench (b) Drill method
58. _____ is a very detailed and specific plan (c) Formula-based method
consisting of intended learning outcomes, (d) Display method
description of teaching-learning strategies and 68. Which of the following methods of teaching will
activities and actual tool for assessment of encourage indirect learning?
learning outcome. (a) Lecturing with examples
(a) Unit plan (b) Yearly plan (b) Team teaching
(c) Lesson plan (d) Both (a) and (c) (c) Demonstration on a subject
59. _____ is a file, folder, pocket, or space allocated (d) Collaborative projects
for each child where actual work done by a 69. Match the following methods of teaching with
child, over a period of time. their meaning.
(a) Diary (b) Anecdotal record List-I List-II
(c) Teacher's Handbook (d) Portfolio A. Oral presentation of 1. Brainstorming
60. Which of the following is not a democratic information, principles,
teaching strategy? concepts, ideas about
(a) Problem solving (b) Project a topic
(c) Discovery (d) Demonstration B. Sharing experiences, 2. Project
61. Identify the skills needed by present day ideas and attitudes
teachers to make classroom teaching more C. Generating as many 3. Lecture
efficient. ideas without judging
I. knowledge of technology them
II. Use of technology in classroom transactions D. A whole-hearted 4. Collaboration
III. Knowledge of students needs purposeful activity
IV. Content Mastery proceeding in a social
(a) I and III (b) II and III environment.
(c) II, III and IV (d) II and IV 5. Discussion
Pedagogy 270 YCT
A B C D (b) Teaching becomes active in teaching
(a) 1 2 3 4 (c) Teaching becomes effective
(b) 3 5 1 2 (d) All of the above
(c) 5 4 3 2 79. The selection of teaching aid depends largely
(d) 3 4 1 2 on the ______
70. Match the elements in list-I with that of List-II (a) age of students
and choose the correct alternative. (b) interests of students
List-I List-II (c) age and motivation of students
A. Lecturing 1. Working in groups (d) educational level and age of students
B. Project method 2. Small steps with 80. Which of the following is not a physical facility
feedback provided by the state schools?
C. Heuristic Method 3. Economical and (a) Room size (b) Drinking water
time-saving (c) Seating arrangements (d) Smart boards
D. Programmed 4. Prof. Armstrong 81. Learning across multiple contexts through
learning social and content interactions using personal
A B C D electronic devices is called
(a) 3 1 2 4 (a) Co-operative learning (b) Team learning
(b) 3 1 4 2 (c) M-learning (d) E-learning
(c) 2 3 4 1 82. The pedagogy which involves productive
(d) 1 3 2 4 learning and finding new solutions to problems,
71. Identify media resources that may be helpful in where manipulation of existing information
the teaching-learning process.
and creation of real-world products are
(a) Newspaper (b) Picture
possible with ICT, is called
(c) Exhibitions (d) All of the above
(a) Collaborative pedagogy
72. Which of the following types of learning
(b) Creative pedagogy
materials are in the form of real objects or
ideals that make the concepts very clear? (c) Integrative pedagogy
(a) Visual material (d) Evaluative pedagogy
(b) Surrounding environment 83. Given below are two statements: One is labeled
(c) Information and Communication Technology as Assertion (A) and the other is labeled as
(d) Tactile material Reason (R).
73. Most effective teaching aid is Assertion (A) : The use of ICT has a great
(a) non-projected (b) direct experience potential for optimizing learning outcomes.
(c) projected (d) None of these Reason (R) : ICT promotes scope for variety,
74. ______ are models used to explain the process flexibility and attractiveness.
involved. In the light of the above statements, choose the
(a) Working models (b) Replica models correct answer from the options given below:
(c) Specimens (d) Photographs (a) Both A and R true and R is the correct
75. Which of the following is NOT an audio-visual explanation of A
aid used by a teacher in classroom for teaching- (b) Both A and R are true but R is NOT the
learning process? correct explanation of A
(a) Television (c) A is true but R is false
(b) Films (d) A is false but R is true
(c) Computer assisted instruction 84. ______ proposed that learning can happen by
(d) Graphs observing others.
76. What is most important while writing on (a) Gardener (b) Albert Bandura
blackboard? (c) Chomasky (d) Jerome Brunner
(a) Good writing 85. Find out correct sequence of technology based
(b) Clarity in writing growth of learning pattern.
(c) Writing in big letters (a) 'M-learning' – 'U-learning' – 'E-learning'
(d) Writing in small letters (b) 'E-learning' – 'M-learning' – 'U-learning'
77. The use of teaching aids is justified on the (c) 'T-learning' – 'E-learning' – 'M-learning'
grounds of: (d) 'U-learning' – 'M-learning' – 'E-learning'
(a) Attracting students attention in the classroom. 86. Which of the following is/are major issues
(b) Minimizing indiscipline problems in the arising out of the growing reliance on
classroom. information technology?
(c) Optimizing learning outcomes of students. 1. Profitability 2. Security threats
(d) Effective engagement of students in learning 3. Privacy concerns
tasks Choose the correct option:
78. By using audio-visual teaching aids: (a) 1 and 2 only (b) 1 and 3 only
(a) Students become active in classroom learning (c) 2 and 3 only (d) 1, 2 and 3
Pedagogy 271 YCT
87. Information Technology (IT) Act 2000 came 95. A college teacher conducts a quiz session with a
into force on? view to accelerate the tempo of motivational
(a) 17 October 2000 (b) 9 June 2000 participation. This will form part of which type
(c) 1 June 2000 (d) 1 October 2000 of evaluation?
88. Which of the following is Doordarshan's (a) Summative evaluation
educational television channel? (b) Criterion based evaluation
(a) Gurukul (b) Gyan Bharati (c) Formative evaluation
(c) Gyan Darshan (d) Vidya (d) Diagnostic evaluation
89. Who is known as the father of modern media 96. Which one of the following assessment
education. procedures is conducted during an in progress
(a) Edger Dale (b) Flanders teaching-learning session?
(c) Erikson (d) Charles Babbage (a) Summative
90. Method used to transfer information to far off (b) Formative
places instantly is called (c) Norm-referenced
(a) Data (d) Criterion-referenced
(b) Information technology 97. The purpose of the evaluation is
(c) Language (a) to label children as slow learner and gifted
(d) Tele communication children
91. As per CBSE, the test which is designed to (b) to identify children who need remediation
proved a measure of performance that is (c) to diagnose learning difficulties and problem
compared with pre-specified level of areas
accomplishment is known as: (d) to provide feedback on the extent to which we
(a) prognostic test have been successful in imparting education
(b) norm reference test for a productive life.
(c) criterion-reference test 98. In _____ the role of measurement is to provide
(d) standardised test an overview or achievement across a number of
92. Continuous, comprehensive and scholastic skills.
evaluation means: (a) Formative evaluation
(a) Scholastic evaluation of students (b) Summative evaluation
(b) Physical evaluation of students (c) Diagnostic evaluation
(c) Evaluation of students through continuous (d) None of the above
examination 99. Which of the following is not the limitation of
(d) Evaluation of overall development of students an achievement test?
through continuous evaluation (a) Scores in the achievement test may not be the
93. Which of the following is the least important exact measure of achievement.
function of grading system of evaluation? (b) Factors like standard of teaching, completion
(a) It gives information about students academic of curriculum may not be measured
progress (c) It is good for critical examination of the
(b) It is used for administrative purposes content and the methods of teaching
(c) It provides short term goals (d) Achievement scores of students differ in
(d) It helps in developing an evaluation system similar types of achievement tests.
94. Evaluation is a continuous process, which 100. The most important step of teaching learning
involves system which includes observing, testing and
(a) Learner (b) Curriculum assessing is called
(c) Teaching objectives (d) All of the above (a) Leading (b) Evaluating
(c) Planning (d) Organising

ANSWER KEY
1. (c) 2. (a) 3. (c) 4. (b) 5. (c) 6. (b) 7. (d) 8. (c) 9. (d) 10. (a)
11. (d) 12. (d) 13. (d) 14. (b) 15. (a) 16. (d) 17. (d) 18. (a) 19. (a) 20. (a)
21. (a) 22. (c) 23. (b) 24. (b) 25. (d) 26. (a) 27. (a) 28. (b) 29. (a) 30. (a)
31. (c) 32. (c) 33. (c) 34. (a) 35. (a) 36. (b) 37. (d) 38. (c) 39. (c) 40. (d)
41. (c) 42. (c) 43. (c) 44. (b) 45. (a) 46. (c) 47. (d) 48. (b) 49. (a) 50. (a)
51. (a) 52. (d) 53. (b) 54. (c) 55. (b) 56. (d) 57. (c) 58. (d) 59. (d) 60. (d)
61. (c) 62. (d) 63. (a) 64. (a) 65. (d) 66. (c) 67. (d) 68. (d) 69. (d) 70. (b)
71. (d) 72. (d) 73. (b) 74. (a) 75. (d) 76. (a) 77. (c) 78. (d) 79. (d) 80. (d)
81. (c) 82. (b) 83. (a) 84. (b) 85. (b) 86. (c) 87. (a) 88. (c) 89. (a) 90. (d)
91. (c) 92. (d) 93. (b) 94. (d) 95. (d) 96. (b) 97. (d) 98. (b) 99. (c) 100. (b)

Pedagogy 272 YCT

You might also like