Tuesday 4 February 2014

HTET 2014 ANSWER KEY COMPUTER SCIENCE

HTET 2014 ANSWER KEY COMPUTER 
SCIENCE)[91-150] SET-C SECTION-D(COMPUTER SCIENCE)[91-150] SET-C 
www.Exam2014.in 

91) ............... function gives the total number of rows in a 
table. 
Ans. (4)Count 
92) Macros are run or executed from .............. menu. 
Ans.(1)Tools 
93) ................. function is used to read string. 
Ans.(4) gets() 
94) ................... keyword eliminates duplicate rows from 
the results of SELECT statement. 
Ans.(2) DISTINCT 
95)The multiple use of input or output operators in one 
statement is called................ . 
Ans.(3) Cascading 
96)Encapsulation is a way to implement .............. 
Ans.(3) Data Abstraction 
97) TCP connection is available at port ........ on HTTP. 
Ans.(1) 80 
98) A ................. is a pool of values from which the actual 
values appearing in a given column aredrawn. 
Ans.(2) Domain 
99)In ............ sorting smallest key is taken again and 
again in unsorted array. 
Ans.(4) Heap 
100) A numbered list can be created by .............. . 
Ans.(4) <ol> 
101) In ............ insertion & deletion takes place only at 
top. 
Ans.(4) Stack 
102) ............... is a way to bind the data & its associated 
functions together which allows them to be hidden. 
Ans. (3) Class 103) In SQL decimal data type, ................ indicates the 
number of significant digits the number is to have. 
Ans. (1) Precision 
104) A file which contains readymade styles that can be 
used in a presentation is called................ . 
Ans. (3) Wizard 
105) .................. are data items that never change the 
values during a program run. 
Ans. (3) Literals 
106) What is an Operating System? 
Ans. (4) System Software 
107)What is the last column in worksheet? 
Ans. (2) IV 
108) A Cpu's processing power is measured in ........... . 
Ans. (1) IPS 
109) ............ is not a type of formatting in MS-Word. 
Ans.(4) Line 
110) A ............. is a set of rules that are applicable for a 
network. 
Ans.(2) Protocol 
111) .................... shortcut key is used to insert a new 
slide in the document presentation. 
Ans.(1) CTRL+N 
112) .................. document acts as a contract between the 
developer and the customer. 
Ans.(4) None of These 
113) The number of attributes in a relation is called 
............. . 
Ans.(1) Degree 
114) ................ first proposed the process of 
normalization. 
Ans.(4) Edgar F. Codd 
115) .............. refer to names of variable, function, array 
and Class created by the programmer. 
Ans.(1) Identifier 
116) ................ generations of computers started the use 
of operating systems. Ans.(3) 3rd 
117) FTP is a ......... layer mechanism of TCP/IP. 
Ans.(1) Application 
118) ................... tag is used for adding comments. 
Ans.(2) // 
119) Ckt Diagram........ 
Ans. ? 
120) ...................... is not a physical tag. 
Ans.(4) None of these 
121) A ............ is a collection of data sent as a single 
message. 
Ans.(1) Datagram 
122) C++ was developed by ............ . 
Ans.(4) Bjarne Stroustrup 
123) When a user does not enter a value for a column, a 
value is automatically inserted in the field using ........... 
constraint. 
Ans.(4) Default 
124) ................ is an example of half duplex system. 
Ans.(4) Walkie-Talkie 
125) ................... command is used to move to a particular 
page number in a file. 
Ans.(3) go to 
126) A GUI is a ................ . 
Ans.(3) Software Interface 
127) ............... command gives virtual table with no data, 
but can be operated like any other table. 
Ans.(3) CREATE VIEW 
128) .............. generation of computers was rhe first to 
store instruction in their own memory. 
Ans.(1) 2nd 
129) When a function is defined inside a class, it is called 
........... . 
Ans.(2) Inline function 
130) ............... is a file that contains data about data. 
Ans.(3) Data Dictionary 131) A ....... operates at the highest layer of network 
abstraction. 
Ans.(1) Gateway 
132) The problem of variable delay in video conferencing 
is removed using .............. . 
Ans.(2) Timestamp 
133) The size of 1-D array with UB as upperbound and LB 
as lowerbound is given by ................... . 
Ans.(1) Array size(length)=UB-LB+1 
134) Which feature help to insert the contents of clipboard 
as text without any formatting. 
Ans.(1) Paste special 
135) Decimal Conversion of (11A.62) base 16 gives 
.......... . 
Ans.(4) (282.382) base 10 
136) Which of the following characters is used as a 
punctuator? 
Ans.(1) # 
137) What function display row data in a column & column 
data in row? 
Ans.(4) Transpose 
138) ............. is also called class interface. 
Ans.(1) Member Function 
139) ................... is an exit controlled loop. 
Ans.(1) do-while 
140) When two enteries about same data do not agree, 
the database is said to be ................ . 
Ans.(1) Inconsistent 
141) Two similar structures can have only .................... 
assignments. 
Ans.(2) = 
142) Overall System architecture is derived in ................. 
phase. 
Ans.(2) Design ? 
143) In CREATE TABLE SQL command, each table must 
have atleast .......... column. 
Ans.(4) 1 144) The requested files used by web are stored 
in................ memory. 
Ans.(3) Cache memory 
145) ............... is a universal gate. 
Ans.(3) NOR 
146) To introduce special effects in a slide show ............. 
is used. 
Ans.(3) Slide Transition 
147) Microprocessor based computers started in 
........................ generations. 
Ans.(4) 4th 
148) If every 'non-key' attribute is functionally dependent 
on primary "key", then the relation is in .............. . 
Ans.(2) 2NF 
149) A ............... uses physical addresses. 
Ans.(4) Bridges or may be gateway(3) 
150) The ability to modify the data structure and not have 
to change the program using data is called................. . 
Ans.(1) Data Independence

No comments:

Post a Comment