31. The performance of the network is often evaluated by which of the following two networking metrics?

(a) Speedup and accuracy

(b) Throughput and delay

(c) Speedup and delay

(d) Throughput and accuracy

Answer: (b)

32. A sine wave is offset 1/6 cycle with respect to time 0. Its phase will be nearly:

(a) 1.05 rad

(b) 0.79 rad

(c) 0.52 rad

(d) 0.26 rad

Answer: (a)

33. If a periodic signal is decomposed into 5 sine waves with frequencies of 100 Hz, 300 Hz, 500 Hz, 700 Hz and 900 Hz, its bandwidth will be:

(a) 800 Hz

(b) 700 Hz

(c) 600 Hz

(d) 500 Hz

Answer: (a)

34. A network with bandwidth of 10 Mbps can pass only an average of 12,000 frames per minute with each frame carrying an average of 10,000 bits. The throughput of this network will be:

(a) 2 Mbps

(b) 4 Mbps

(c) 6 Mbps

(d) 8 Mbps

Answer: (a)

35. Assume the distance between the sender and the receiver is 12,000 km , the bandwidth of the network is 1 Mbps and that light travels at 
. The propagation time and the transmission time to transmit 5-MB message (an image), will be respectively:

(a) 40 ms and 30 𝑠

(b) 50 ms and 30 𝑠

(c) 40 ms and 40 𝑠

(d) 50 ms and 40 𝑠

Answer: (d)

36. What is MTTF in redundancy for data storage in disks?

(a) Middle-time-training-failure

(b) Mean-time-to-failure

(c) Mean-time-training-failure

(d) Middle-training -to-failure

Answer: (b)

37. The advantage of using DBMS is that it offers data independence which is achieved through:

(a) Data abstraction

(b) Exceptional handling

(c) Data hiding

(d) Transaction

Answer: (a)

38. A weak entity can be identified only by considering some of its attributes in conjunction with the:

(a) Total participation

(b) Primary key of another entity

(c) Independent entity

(d) All the attributes of the strong entity

Answer: (b)

39. Which of the following are the limitations for creating, using and managing decision-support system in a database management system?

1. Lack of analytical sophistication

2. Database layout limitations

3. Inability to handle or process large amounts of data


(a) 1 and 2 only

(b) 1 and 3 only

(c) 2 and 3 only

(d) 1, 2 and 3

Answer: (d)

40. The method of accessing the data which uses the search key value transformation to support the efficient retrieval of data entries is known as:

(a) Hash-based indexing

(b) Sequential indexing

(c) Random indexing

(d) Direct indexing

Answer: (a)