Bharat Electronics Computer-Science-Engineering-CS Contributed by Anju updated on May 2019

                                  BEL-CSE Solved Sample Questions


1. A ________ is a stored program that is attached to a table or a view.
A. pseudofile
B. embedded SELECT statement
C. trigger
D. None of the above is correct.


2. The DROP TABLE statement:
A. deletes the table structure only.
B. deletes the table structure along with the table data.
C. works whether or not referential integrity constraints would be violated.
D. is not an SQL statement.


3. SQL views can be used to hide:
A. columns and rows only.
B. complicated SQL syntax only.
C. both of the above can be hidden by an SQL view.
D. None of the above is correct.

4. To update an SQL view, the DBMS must be able to associate the column(s) to be updated with:
A. a particular column in a particular underlying table.
B. a particular column in a particular row.
C. a particular row in a particular underlying table.
D. None of the above is correct.

5. What standard, protocol or language was generalized to become a standard protocol for sending messages of any type, using any protocol?


6. Which of the following statements is not true about XML Schemas:
A. They are used to define the content and structure of data.
B. They define a set of symbols and the relationships of those symbols.
C. They are themselves XML documents.
D. They have their own syntax.


7. With XML:
A. views are not limited to one multi-valued path only.
B. documents can automatically be generated from database data only.
C. database data can automatically be extracted from XML documents only.
D. With XML, all of the above are true.


8. To eliminate definition duplication, XML Schemas define:
A. an intersection table.
B. global elements.
C. a normalized definition table.
D. None of the above is correct.


9. XML Schemas consist of:
A. properties and methods.
B. elements and attributes.
C. structure and data.
D. tables and relationships.


10. How long is an IPv6 address?
A. 32 bits
B. 128 bytes
C. 64 bits
D. 128 bits


11. What flavor of Network Address Translation can be used to have one IP address allow many users to connect to the global Internet?
B. Static
C. Dynamic 


12. What command is used to create a backup configuration?
A. copy running backup
B. copy running-config startup-config
C. config mem
D. wr mem


13. What protocol does PPP use to identify the Network layer protocol?


14. Which is a reserved word in the Java programming language?
A. method 
B. native
C. subclasses 
D. reference
E. array


15. Which is a valid keyword in java?
A. interface 
B. string
C. Float 
D. unsigned