1. A 2MB
PCM(pulse code modulation) has
a) 32 channels
b) 30 voice channels & 1 signaling channel.
c) 31 voice channels & 1 signaling channel.
d) 32 channels out of which 30 voice channels, 1 signaling channel,
& 1 Synchronization channel.
Ans: (c)
2. Time taken for 1 satellite hop in voice communication is
a) 1/2 second
b) 1 seconds
c) 4 seconds
d) 2 seconds
Ans: (a)
3. Max number of satellite hops allowed in voice communication is :
a) only one
b) more than one
c) two hops
d) four hops
Ans: (c)
4. What is the max.decimal number that can be accommodate in a byte.
a) 128
b) 256
c) 255
d) 512
Ans: (c)
5. Conditional results after execution of an instruction in a micro processor
is stored in
a) register
b) accumulator
c) flag register
d) flag register part of PSW(Program Status Word)
Ans: (d)
6. Frequency at which VOICE is sampled is
a) 4 Khz
b) 8 Khz
c) 16 Khz
d) 64 Khz
Ans: (a)
7. Line of Sight is
a) Straight Line
b) Parabolic
c) Tx& Rx should be visible to each other
d) none
Ans: (c)
8. Purpose of PC (Program Counter) in a Micro Processor is
a) To store address of TOS (Top of Stack)
b) To store address of next instruction to be executed.
c) Count the number of instructions.
d) To store base address of the stack.
Ans: (b)
9. What action is taken when the processor under execution is interrupted by a non-mask able interrupt?
a) Processor serves the interrupt request after completing the execution of the
current instruction.
b) Processor serves the interrupt request after completing the current task.
c) Processor serves the interrupt request immediately.
d) Processor serving the interrupt request depends upon the priority of the current
task under execution.
Ans: (a)
10. The status of the Kernel is
a) task
b) process
c) not defined.
d) None of the above.
Ans: (b)
11. To send a data packet using datagram, connection will be established
a) before data transmission.
b) Connection is not established before data transmission.
c) No connection is required.
d) None of the above.
Ans: (c)
12. Word alignment is
a) aligning the address to the next word boundary of the machine.
b) Aligning to even boundary.
c) Aligning to word boundary.
d) None of the above.
Ans: (a)
13. When a 'C' function call is made, the order in which parameters passed to the function are pushed into
the stack is
a) left to right
b) right to left
c) bigger variables are moved first than the smaller variables.
d) Smaller variables are moved first than the bigger ones.
e) None of the above.
Ans: (b)
14. What is the type of signaling used between two exchanges?
a) inband
b) common channel signaling
c) any of the above
d) none of the above.
Ans: (a)
15.Buffering is
a) the process of temporarily storing the data to allow for small variation in device speeds
b) a method to reduce cross talks
c) storage of data within transmitting medium until the receiver is ready
to receive.
d) a method to reduce routing overhead.
Ans: (a)
16. Memory allocation of variables declared in a program is
a) allocated in RAM.
b) Allocated in ROM.
c) allocated on stack.
d) Assigned to registers.
Ans: (c)
17. A software that allows a personal computer to pretend as a computer terminal is
a) terminal adapter
b) bulletin board
c) modem
d) terminal emulation
Ans: (d)
18. Find the output of the following program
int *p,*q;
p=(int *)1000;
q=(int *)2000;
printf("%d",(q-p));
Ans: 500
19. Which addressing mode is used in the following statements:
(a) MVI B, 55
(b) MOV B,A
(c) MOV M,A
Ans. (a) immediate addressing mode.
(b) Register Addressing Mode
(c) Direct addressing mode
20. RS-232C standard is used in _____________.
Ans. Serial I/O
21. Memory. Management in Operating Systems is done by
a) Memory Management Unit
b) Memory management software of the Operating System
c) Kernel
Ans: (b)
22. What is done for a Push operation?
Ans: SP is decremented and then the value is stored.
23. Binary equivalent of 52
Ans. 110100
24. Hexadecimal equivalent of 3452
Ans. 72A
25. Explain Just In Time Concept?
Ans. Elimination of waste by purchasing manufacturing exactly when needed
26. A good way of unit testing s/w program is
Ans. User test
27. OOT uses
Ans. Encapsulated of detect methods
28.EDI useful in
Ans. Electronic Transmission
29. MRPII different from MRP
Ans. Modular version of man redundant initials
30.Hard disk time for R/W head to move to correct sector
Ans. Latency Time
31. The percentage of times a page number bound in associate register is called
Ans. Bit ratio
32. Expand MODEM
Ans. Modulator and Demodulator
33. RDBMS file system can be defined as
Ans. Interrelated
34. Super Key is
Ans. Primary key and Attribute
35. Windows 95 supports
(a) Multi-user
(b) n tasks
(c) Both
(d) None
Ans. (a)
36.In the command scanf, h is used for
Ans. Short int
37.A process is defined as
Ans. Program in execution
38.A thread is
Ans. Detachable unit of executable code)
39.What is the advantage of Win NT over Win 95
Ans. Robust and secure
40.How is memory management done in Win95
Ans. Through paging and segmentation
41.What is meant by polymorphism
Ans. Redefinition of a base class method in a derived class
42.What is the essential feature of inheritance
Ans. All properties of existing class are derived
43.What does the protocol FTP do
Ans. Transfer a file b/w stations with user authentication
44.In the transport layer ,TCP is what type of protocol
Ans. Connection oriented
45.Why is a gateway used
Ans. To connect incompatible networks
46.How is linked list implemented
Ans. By referential structures
47.What method is used in Win95 in multitasking
Ans. Non preemptive check
48.What is a semaphore
Ans. A method synchronization of multiple processes
49.What is the precedence order from high to low ,of the symbols ( ) ++ /
Ans.( ) , ++, /
50.Preorder of A*(B+C)/D-G
Ans.*+ABC/-DG
51.What is the efficiency of merge sort
Ans. O(n log n)
52.In which layer are routers used
Ans.In network layer
53.Which of the following sorting algorithm has average sorting behavior -- Bubble sort,mergesort,heap
sort,exchange sort
Ans. Heap sort
54.In binary search tree which traversal is used for getting ascending order values--Inorder
,postorder,preorder
Ans.Inorder
55.What are device drivers used for
Ans.To provide software for enabling the hardware
56.What is fork command in unix
Ans. System call used to create process
57.What is make command in unix
Ans. Used for creation of more than one file
58.In unix .profile contains
Ans. Start up program
59.In unix 'ls 'stores contents in
Ans.inode block
60. Which of the following involves context switch,
(a) system call
(b) priviliged instruction
(c) floating poitnt exception
(d) all the above
(e) none of the above
Ans: (a)
61. In OST, terminal emulation is done in
(a) sessions layer
(b) application layer
(c) presentation layer
(d) transport layer
Ans: (b)
62. For 1 MB memory, the number of address lines required,
(a)11
(b)16
(c)22
(d) 24
Ans. (b)
63. Semaphore is used for
(a) synchronization
(b) dead-lock avoidence
(c) box
(d) none
Ans. (a)
64. Which holds true for the following statement
class c: public A, public B
a) 2 member in class A, B should not have same name
b) 2 member in class A, C should not have same name
c) both
d) none
Ans. (a)
65.Preprocessor.. does not do which one of the following
(a) macro
(b) conditional complication
(c) in type checking
(d) including load file
Ans. (c)
66. Piggy backing is a technique for
a) Flow control
b) Sequence
c) Acknowledgement
d) retransmission
Ans. (c)
67. Which is not a memory management scheme?
a) buddy system
b) swapping
c) monitors
d) paging
Ans : c
68. There was a circuit given using three NAND gates with two inputs and one output.
Find the output.
a) OR
b) AND
c) XOR
d) NOT
Ans. (a)
69.I integrated check value(ICV) are used as:
Ans. The client computes the ICV and then compares it with the senders value.
70. When applets are downloaded from web sites , a byte verifier performs _________?
Ans. Status check.
71. An IP/IPX packet received by a computer using... having IP/IPX both
how the packet is handled.
Ans. Read the, field in the packet header with to send IP or IPX protocol.
72. The UNIX shell ....
a) does not come with the rest of the system
b) forms the interface between the user and the kernal
c) does not give any scope for programming
d) deos not allow calling one program from with in another
e) all of the above
Ans. (b)
73. In UNIX a files i-node ......?
Ans. Is a data structure that defines all specifications of a file like the file size,
number of lines to a file, permissions etc.
74. The very first process created by the kernel that runs till the kernel
process is halts is
a) init
b) getty
c) both (a) and (b)
d) none of these
Ans. (a)
75. In the process table entry for the kernel process, the process id value is
(a) 0
(b) 1
(c) 2
(d) 255
(e) it does not have a process table entry
Ans. (a)
76. Which of the following API is used to hide a window
a) ShowWindow
b) EnableWindow
c) MoveWindow
d) SetWindowPlacement
e) None of the above
Ans. (a)
77. Which function is the entry point for a DLL in MS Windows 3.1
a) Main
b) Winmain
c) Dllmain
d) Libmain
e) None
Ans. (b)
78. The standard source for standard input, standard output and standard error is
a) the terminal
b) /dev/null
c) /usr/you/input, /usr/you/output/, /usr/you/error respectively
d) None
Ans. (a)
79. The redirection operators > and >>
a) do the same function
b) differ : > overwrites, while >> appends
c) differ : > is used for input while >> is used for output
d) differ : > write to any file while >> write only to standard output
e) None of these
Ans. (b)
80. The command grep first second third /usr/you/myfile
a) prints lines containing the words first, second or third from the
file /usr/you/myfile
b) searches for lines containing the pattern first in the files
second, third, and /usr/you/myfile and prints them
c) searches the files /usr/you/myfiel and third for lines containing the
words first or second and prints them
d) replaces the word first with the word second in the files third
and /usr/you/myfile
e) None of the above
Ans. (b)
81. You are creating a Index on EMPNO column in the EMPLOYEE table.
Which statement will you use?
a) CREATE INdEXemp_empno_idx ON employee, empno;
b) CREATE INdEXemp_empno_idx FOR employee, empno;
c) CREATE INdEXemp_empno_idx ON employee(empno);
d) CREATE emp_empno_idxINdEX ON employee(empno);
Ans. c
82. Which program construct must return a value?
a) Package
b) Function
c) Anonymous block
d) Stored Procedure
e) Application Procedure
Ans. b
83. Which Statement would you use to remove the EMPLOYEE_Id_PK PRIMARY KEY
constraint and all depending constraints fromthe EMPLOYEE table?
a) ALTER TABLE employee dROP PRIMARY KEY CASCAdE;
b) ALTER TABLE employee dELETE PRIMARY KEY CASCAdE;
c) MOdIFY TABLE employee dROP CONSTRAINT employee_id_pkCASCAdE;
d) ALTER TABLE employee dROP PRIMARY KEY employee_id_pkCASCAdE;
e) MOdIFY TABLE employee dELETE PRIMARY KEY employee_id_pkCASCAdE;
Ans. a
84. Which three commands cause a transaction to end? (Chosse three)
a) ALTER
b) GRANT
c) DELETE
d) INSERT
e) UPdATE
f) ROLLBACK
Ans. a ,b ,f
85. Under which circumstance should you create an index on a table?
a) The table is small.
b) The table is updated frequently.
c) A columns values are static and contain a narrow range of values
d) Two columns are consistently used in the WHERE clause join condition of SELECT
statements.
Ans.d
86. What was the first name given to Java Programming Language.
a) Oak - Java
b) Small Talk
c) Oak
d) None
Ans.a
a) 32 channels
b) 30 voice channels & 1 signaling channel.
c) 31 voice channels & 1 signaling channel.
d) 32 channels out of which 30 voice channels, 1 signaling channel,
& 1 Synchronization channel.
Ans: (c)
2. Time taken for 1 satellite hop in voice communication is
a) 1/2 second
b) 1 seconds
c) 4 seconds
d) 2 seconds
Ans: (a)
3. Max number of satellite hops allowed in voice communication is :
a) only one
b) more than one
c) two hops
d) four hops
Ans: (c)
4. What is the max.decimal number that can be accommodate in a byte.
a) 128
b) 256
c) 255
d) 512
Ans: (c)
5. Conditional results after execution of an instruction in a micro processor
is stored in
a) register
b) accumulator
c) flag register
d) flag register part of PSW(Program Status Word)
Ans: (d)
6. Frequency at which VOICE is sampled is
a) 4 Khz
b) 8 Khz
c) 16 Khz
d) 64 Khz
Ans: (a)
7. Line of Sight is
a) Straight Line
b) Parabolic
c) Tx& Rx should be visible to each other
d) none
Ans: (c)
8. Purpose of PC (Program Counter) in a Micro Processor is
a) To store address of TOS (Top of Stack)
b) To store address of next instruction to be executed.
c) Count the number of instructions.
d) To store base address of the stack.
Ans: (b)
9. What action is taken when the processor under execution is interrupted by a non-mask able interrupt?
a) Processor serves the interrupt request after completing the execution of the
current instruction.
b) Processor serves the interrupt request after completing the current task.
c) Processor serves the interrupt request immediately.
d) Processor serving the interrupt request depends upon the priority of the current
task under execution.
Ans: (a)
10. The status of the Kernel is
a) task
b) process
c) not defined.
d) None of the above.
Ans: (b)
11. To send a data packet using datagram, connection will be established
a) before data transmission.
b) Connection is not established before data transmission.
c) No connection is required.
d) None of the above.
Ans: (c)
12. Word alignment is
a) aligning the address to the next word boundary of the machine.
b) Aligning to even boundary.
c) Aligning to word boundary.
d) None of the above.
Ans: (a)
13. When a 'C' function call is made, the order in which parameters passed to the function are pushed into
the stack is
a) left to right
b) right to left
c) bigger variables are moved first than the smaller variables.
d) Smaller variables are moved first than the bigger ones.
e) None of the above.
Ans: (b)
14. What is the type of signaling used between two exchanges?
a) inband
b) common channel signaling
c) any of the above
d) none of the above.
Ans: (a)
15.Buffering is
a) the process of temporarily storing the data to allow for small variation in device speeds
b) a method to reduce cross talks
c) storage of data within transmitting medium until the receiver is ready
to receive.
d) a method to reduce routing overhead.
Ans: (a)
16. Memory allocation of variables declared in a program is
a) allocated in RAM.
b) Allocated in ROM.
c) allocated on stack.
d) Assigned to registers.
Ans: (c)
17. A software that allows a personal computer to pretend as a computer terminal is
a) terminal adapter
b) bulletin board
c) modem
d) terminal emulation
Ans: (d)
18. Find the output of the following program
int *p,*q;
p=(int *)1000;
q=(int *)2000;
printf("%d",(q-p));
Ans: 500
19. Which addressing mode is used in the following statements:
(a) MVI B, 55
(b) MOV B,A
(c) MOV M,A
Ans. (a) immediate addressing mode.
(b) Register Addressing Mode
(c) Direct addressing mode
20. RS-232C standard is used in _____________.
Ans. Serial I/O
21. Memory. Management in Operating Systems is done by
a) Memory Management Unit
b) Memory management software of the Operating System
c) Kernel
Ans: (b)
22. What is done for a Push operation?
Ans: SP is decremented and then the value is stored.
23. Binary equivalent of 52
Ans. 110100
24. Hexadecimal equivalent of 3452
Ans. 72A
25. Explain Just In Time Concept?
Ans. Elimination of waste by purchasing manufacturing exactly when needed
26. A good way of unit testing s/w program is
Ans. User test
27. OOT uses
Ans. Encapsulated of detect methods
28.EDI useful in
Ans. Electronic Transmission
29. MRPII different from MRP
Ans. Modular version of man redundant initials
30.Hard disk time for R/W head to move to correct sector
Ans. Latency Time
31. The percentage of times a page number bound in associate register is called
Ans. Bit ratio
32. Expand MODEM
Ans. Modulator and Demodulator
33. RDBMS file system can be defined as
Ans. Interrelated
34. Super Key is
Ans. Primary key and Attribute
35. Windows 95 supports
(a) Multi-user
(b) n tasks
(c) Both
(d) None
Ans. (a)
36.In the command scanf, h is used for
Ans. Short int
37.A process is defined as
Ans. Program in execution
38.A thread is
Ans. Detachable unit of executable code)
39.What is the advantage of Win NT over Win 95
Ans. Robust and secure
40.How is memory management done in Win95
Ans. Through paging and segmentation
41.What is meant by polymorphism
Ans. Redefinition of a base class method in a derived class
42.What is the essential feature of inheritance
Ans. All properties of existing class are derived
43.What does the protocol FTP do
Ans. Transfer a file b/w stations with user authentication
44.In the transport layer ,TCP is what type of protocol
Ans. Connection oriented
45.Why is a gateway used
Ans. To connect incompatible networks
46.How is linked list implemented
Ans. By referential structures
47.What method is used in Win95 in multitasking
Ans. Non preemptive check
48.What is a semaphore
Ans. A method synchronization of multiple processes
49.What is the precedence order from high to low ,of the symbols ( ) ++ /
Ans.( ) , ++, /
50.Preorder of A*(B+C)/D-G
Ans.*+ABC/-DG
51.What is the efficiency of merge sort
Ans. O(n log n)
52.In which layer are routers used
Ans.In network layer
53.Which of the following sorting algorithm has average sorting behavior -- Bubble sort,mergesort,heap
sort,exchange sort
Ans. Heap sort
54.In binary search tree which traversal is used for getting ascending order values--Inorder
,postorder,preorder
Ans.Inorder
55.What are device drivers used for
Ans.To provide software for enabling the hardware
56.What is fork command in unix
Ans. System call used to create process
57.What is make command in unix
Ans. Used for creation of more than one file
58.In unix .profile contains
Ans. Start up program
59.In unix 'ls 'stores contents in
Ans.inode block
60. Which of the following involves context switch,
(a) system call
(b) priviliged instruction
(c) floating poitnt exception
(d) all the above
(e) none of the above
Ans: (a)
61. In OST, terminal emulation is done in
(a) sessions layer
(b) application layer
(c) presentation layer
(d) transport layer
Ans: (b)
62. For 1 MB memory, the number of address lines required,
(a)11
(b)16
(c)22
(d) 24
Ans. (b)
63. Semaphore is used for
(a) synchronization
(b) dead-lock avoidence
(c) box
(d) none
Ans. (a)
64. Which holds true for the following statement
class c: public A, public B
a) 2 member in class A, B should not have same name
b) 2 member in class A, C should not have same name
c) both
d) none
Ans. (a)
65.Preprocessor.. does not do which one of the following
(a) macro
(b) conditional complication
(c) in type checking
(d) including load file
Ans. (c)
66. Piggy backing is a technique for
a) Flow control
b) Sequence
c) Acknowledgement
d) retransmission
Ans. (c)
67. Which is not a memory management scheme?
a) buddy system
b) swapping
c) monitors
d) paging
Ans : c
68. There was a circuit given using three NAND gates with two inputs and one output.
Find the output.
a) OR
b) AND
c) XOR
d) NOT
Ans. (a)
69.I integrated check value(ICV) are used as:
Ans. The client computes the ICV and then compares it with the senders value.
70. When applets are downloaded from web sites , a byte verifier performs _________?
Ans. Status check.
71. An IP/IPX packet received by a computer using... having IP/IPX both
how the packet is handled.
Ans. Read the, field in the packet header with to send IP or IPX protocol.
72. The UNIX shell ....
a) does not come with the rest of the system
b) forms the interface between the user and the kernal
c) does not give any scope for programming
d) deos not allow calling one program from with in another
e) all of the above
Ans. (b)
73. In UNIX a files i-node ......?
Ans. Is a data structure that defines all specifications of a file like the file size,
number of lines to a file, permissions etc.
74. The very first process created by the kernel that runs till the kernel
process is halts is
a) init
b) getty
c) both (a) and (b)
d) none of these
Ans. (a)
75. In the process table entry for the kernel process, the process id value is
(a) 0
(b) 1
(c) 2
(d) 255
(e) it does not have a process table entry
Ans. (a)
76. Which of the following API is used to hide a window
a) ShowWindow
b) EnableWindow
c) MoveWindow
d) SetWindowPlacement
e) None of the above
Ans. (a)
77. Which function is the entry point for a DLL in MS Windows 3.1
a) Main
b) Winmain
c) Dllmain
d) Libmain
e) None
Ans. (b)
78. The standard source for standard input, standard output and standard error is
a) the terminal
b) /dev/null
c) /usr/you/input, /usr/you/output/, /usr/you/error respectively
d) None
Ans. (a)
79. The redirection operators > and >>
a) do the same function
b) differ : > overwrites, while >> appends
c) differ : > is used for input while >> is used for output
d) differ : > write to any file while >> write only to standard output
e) None of these
Ans. (b)
80. The command grep first second third /usr/you/myfile
a) prints lines containing the words first, second or third from the
file /usr/you/myfile
b) searches for lines containing the pattern first in the files
second, third, and /usr/you/myfile and prints them
c) searches the files /usr/you/myfiel and third for lines containing the
words first or second and prints them
d) replaces the word first with the word second in the files third
and /usr/you/myfile
e) None of the above
Ans. (b)
81. You are creating a Index on EMPNO column in the EMPLOYEE table.
Which statement will you use?
a) CREATE INdEXemp_empno_idx ON employee, empno;
b) CREATE INdEXemp_empno_idx FOR employee, empno;
c) CREATE INdEXemp_empno_idx ON employee(empno);
d) CREATE emp_empno_idxINdEX ON employee(empno);
Ans. c
82. Which program construct must return a value?
a) Package
b) Function
c) Anonymous block
d) Stored Procedure
e) Application Procedure
Ans. b
83. Which Statement would you use to remove the EMPLOYEE_Id_PK PRIMARY KEY
constraint and all depending constraints fromthe EMPLOYEE table?
a) ALTER TABLE employee dROP PRIMARY KEY CASCAdE;
b) ALTER TABLE employee dELETE PRIMARY KEY CASCAdE;
c) MOdIFY TABLE employee dROP CONSTRAINT employee_id_pkCASCAdE;
d) ALTER TABLE employee dROP PRIMARY KEY employee_id_pkCASCAdE;
e) MOdIFY TABLE employee dELETE PRIMARY KEY employee_id_pkCASCAdE;
Ans. a
84. Which three commands cause a transaction to end? (Chosse three)
a) ALTER
b) GRANT
c) DELETE
d) INSERT
e) UPdATE
f) ROLLBACK
Ans. a ,b ,f
85. Under which circumstance should you create an index on a table?
a) The table is small.
b) The table is updated frequently.
c) A columns values are static and contain a narrow range of values
d) Two columns are consistently used in the WHERE clause join condition of SELECT
statements.
Ans.d
86. What was the first name given to Java Programming Language.
a) Oak - Java
b) Small Talk
c) Oak
d) None
Ans.a
Q1. When
data and acknowledgement are sent in the same frame, this is called as
(A) Piggy packing
(B) Piggy backing
(C) Back packing
(D) Good packing
ANS-(B)
2. Encryption and Decryption is the responsibility of Layer.
(A) Physical
(B) Network
(C) Application
(D) Datalink
ANS-(C)
3. An analog signal carries 4 bits in each signal unit. If 1000 signal units are sent per second, then baud rate and bit rate of the signal are and
(A) 4000 bauds \ sec & 1000 bps
(B) 2000 bauds \ sec & 1000 bps
(C) 1000 bauds \ sec & 500 bps
(D) 1000 bauds \ sec & 4000 bps
ANS-(D)
4. The VLF and LF bauds use propagation for communication.
(A) Ground
(B) Sky
(C) Line of sight
(D) Space
ANS-(A)
5. Using the RSA public key crypto system, if p = 13, q = 31 and d = 7, then the value of e is
(A) 101
(B) 103
(C) 105
(D) 107
ANS-(B)
6. FAN IN of a component A is defined as
(A) Number of components that can call or pass control to component A.
(B) Number of components that are called by component A.
(C) Number of components related to component A.
(D) Number of components dependent on component A.
ANS-(A)
7. The relationship of data elements in a module is called
(A) Coupling
(B) Modularity
(C) Cohesion
(D) Granularity
ANS-(C)
8. Software Configuration Management is the discipline for systematically controlling
(A) the changes due to the evolution of work products as the project proceeds.
(B) the changes due to defects (bugs) being found and then fixed.
(C) the changes due to requirement changes
(D) all of the above
ANS-(D)
9. Which one of the following is not a step of requirement engineering ?
(A) Requirement elicitation
(B) Requirement analysts
(C) Requirement design
(D) Requirement documentation
ANS-(C)
10. Testing of software with actual data and in actual environment is called
(A) Alpha testing
(B) Beta testing
(C) Regression testing
(D) None of the above
ANS-(B)
11. The student marks should not be greater than 100. This is
(A) Integrity constraint(B) Referential constraint
(C) Over-defined constraint
(D) Feasible constraint
ANS-(A)
12. GO BOTTOM and SKTP-3 commands are given one after another in a database file of 30 records. It shifts the control to
(A) 28th record
(B) 27th record
(C) 3rd record
(D) 4th record
ANS-(A)
13. An ER Model includes
I. An ER diagram portraying entity types.
II. Attributes for each entity type
III. Relationships among entity types.
IV. Semantic integrity constraints that reflects the business rules about data not captured in the ER diagram.
(A) I, II, III & IV
(B) I&IV
(C) I, II & IV
(D) I & III
ANS-(A)
14. Based on the cardinality ratio and participation associated with a relationship type, choose either the Foreign Key Design, the Cross Referencing Design or Mutual Referencing Design.
(A) Entity
(B) Constraints
(C) Rules
(D) Keys
ANS-(B)
15. Data Integrity control uses
(A) Upper and lower limits on numeric data.
(B) Passwords to prohibit unauthorised access to files.
(C) Data dictionary to keep the data
(D) Data dictionary to find last access of data
ANS-(B)
16. What does the following declaration mean ?
int (*ptr) [10];
(A) ptr is an array of pointers of 10 integers.
(B) ptr is a pointer to an array of 10 integers.
(C) ptr is an array of 10 integers.
(D) none of the above.
ANS-(B)
17. Which of the following has compilation error in C ?
(A) int n = 32 ;
(B) char ch = 65 ;
(C) float f= (float) 3.2;
(D) none of the above
ANS-(D)
18. Which of the following operators can not be overloaded in C+ + ?
(A) *
(B) + =
(C) = =
(D) ::
ANS-(D)
19. allows to create classes which are derived from other classes, so that they automatically include some of its "parent's" members, plus its own members.
(A) Overloading
(B) Inheritance
(C) Polymorphism
(D) Encapsulation
ANS-(B)
20. The correct way to round off a floating number x to an integer value is
(A) y = (int)(x + 0.5)
(B) y = int (x + 0.5)
(C) y = (int)x+ 0.5
(D) y = (int)((int)x + 0.5)
ANS-(A)
21. What is the value of the postfix expression ?
a b c d + - * (where a = 8, b = 4, c = 2 and d = 5)
(A) -3/8
(B) -8/3
(C) 24
(D) -24
ANS-(D)
22. If the queue is implemented with a linked list, keeping track of a front pointer and a rear pointer, which of these pointers will change during an insertion into a non-empty queue ?
(A) Neither of the pointers change
(B) Only front pointer changes
(C) Only rear pointer changes
(D) Both of the pointers changes
ANS-(C)
23. _________ is often used to prove the correctness of a recursive function.
(A) Diagonaliization
(B) Communitivity
(C) Mathematical Induction
(D) Matrix Multiplication
ANS-(C)
24. For any B-tree of minimum degree t > 2, every node other than the root must have atleast _________ keys and every node can have at, most ________ keys.
(A) t-1,2t+1
(B) t+1,2t+1
(C) t-1,2t-1
(D) t+1,2t-1
ANS-(C)
25. Given two sorted list of size 'm' and 'n' respectively. The number of comparison needed in the worst case
by the merge sort algorithm will be
(A) m x n
(B) max (m, n)
(C) min (m, n)
(D) m + n - 1
ANS-(D)
26. Given the following statements :
S1 : SLR uses follow information to guide reductions. In case of LR and LALR parsers, the look-aheads are associated with the items and they make use of the left context available to the parser.
S2 : LR grammar is a larger subclass of context free grammar as compared to that SLR and LALR grammars.
Which of the following is true ?
(A) S1 is not correct and S2 is not correct.
(B) S1 is not correct and S2 is correct.
(C) S1 is correct and S2 is not correct.
(D) S1 is correct and S2 is correct.
ANS-(D)
27. The context free grammar for the language
L={anbm|n≤m+3,n≥0.m≥0}is
(A) S→aaaA; A→aAb|B, B→Bb | λ,
(B) S → aaaA|λ, A ->aAb | B, B→ Bb|λ
(C) S→aaaA | aa A |λ , A ->aAb | B|λ, B→ Bb|λ
(D) S→aaaA | aa A | aA |λ , A → aAb | B, B→ Bb | λ
ANS-(D)
28. Given the following statements :
S1 : If L is a regular language then the language {uv | u Є L, v Є LR} is also regular.
S2 : L = {wwR }is regular language.
Which of the following is true ?
(A) S1 is not correct and S2 is not correct.
(B) S1 is not correct and S2 is correct.
(C) S1 is correct and S2 is not correct.
(D) S1 is correct and S2 is correct.
ANS-(C)
29. The process of assigning load addresses to the various parts of the program and adjusting the code and data in the program to reflect the assigned addresses is called ____________
(A) Symbol resolution
(B) Parsing
(C) Assembly
(D) Relocation
ANS-(D)
30. Which of the following derivations does a top-down parser use while parsing an input string ? The input is scanned from left to right.
(A) Leftmost derivation
(B) Leftmost derivation traced out in reverse
(C) Rightmost derivation traced out in reverse
(D) Rightmost derivation
ANS-(A)
31. The dual of a Boolean expression is obtained by interchanging
(A) Boolean sums and Boolean products
(B) Boolean sums and Boolean products or interchanging 0's and 1 's
(C) Boolean sums and Boolean products and interchanging 0's & 1's
(D) Interchanging 0's and 1's
ANS-(C)
32. Given that (292) 10 = (1204)x in some number system x. The base x of that number system is
(A) 2
(B) 8
(C) 10
(D) None of the above
ANS-(D)
32. Given that (292) 10 = (1204)x in some number system x. The base x of that number system is
(A) 2
(B) 8
(C) 10
(D) None of the above
ANS-(D)
34. Let P(m, n) be the statement
"m divides n" where the universe of discourse for both the variables is the set of
positive integer.Determine the truth values of each of the following propositions:
I: VmVnP(m,n),
II. ƎmVn P(m, n)
(A) Both I and II are true
(B) Both I and II are false
(C) I - false & II - true
(D) I - true & II - false
ANS-(C)
35. Big - 0 estimate for
f(x) = (x + 1) log(x^2 + 1) + 3x^2 is given as
(A) O(xlogx)
(B) O(x^2)
(C) O(x^3)
(D) O(x^2 logx)
ANS-(B)
36. How many edges are there in a forest of t-trees containing a total of n vertices ?
(A) n+1
(B) n-t
(C) n*t
(D) nt
ANS-(B)
37. Let f and g be the functions from the set of integers to the set integers defined by
f(x) = 2x + 3 and g(x) = 3x + 2
Then the composition of f and g and g and f is given as
(A) 6x + 7, 6x + 11
(B) 6x + 11, 6x + 7
(C) 5x + 5, 5x + 5
(D) None of the above
ANS-(A)
Composition of f and g is gof = g(f(x))
38. If n and r are non-negative integers and n > r, then p(n + 1, r) equals to
(A) P(n,r)(n + 1) / (n + 1 - r)
(B) P(n,r)(n+1) / (n - 1 + r)
(C) p(n,r)(n-l) / (n + 1 - r)
(D) p(n,r)(n + l) / (n + 1 + r)
ANS-(A)
39. A graph is non-planar if and only if it contains a subgraphhomomorphic to
(A) K3,2 or K5
(B) K3,3 and K6
(C) K3,3 or K5
(D) K2,3 and K5
ANS-(C)
40. Which of the following statements are true ?
I. A circuit that adds two bits, producing a sum bit and a carry bit is called half adder.
II. A circuit that adds two bits, producing a sum bit and a carry bit is called full adder.
III. A circuit that adds two bits and a carry bit producing a sum bit and a carry bit is called full adder.
IV. A device that accepts the value of a Boolean variable as input and produces its complement is called an inverter.
(A) I & II
(B) II & III
(C) I,II,III
(D) I,III & IV
ANS-(D)
41 Active X controls are Pentium binary programs that can be embedded in ____________
(A) Word pages
(B) URL pages
(C) Script pages
(D) Web pages
ANS-(D)
42. Match the following :
List-I List - II
a. Wireless Application Environment i. HTTP
b. Wireless Transaction Protocol ii. IP
c. Wireless Datagram Protocol iii Scripts
d. Wireless iv. UDP
Codes :
a b c d
(A) ii iv i iii
(B) iv iii ii i
(C) iv iii i ii
(D) iii i iv ii
ANS-(D)
43. Which of the following is widely used inside the telephone system for long-haul data traffic ?
(A) ISDN
(B) ATM
(C) Frame Relay
(D) ISTN
ANS-(B)
44. The document standards for EDI were first developed by large business house during the 1970s and are now under the control of the following standard organisation :
(A) ISO
(B) ANSI
(C) ITU-T
(D) IEEE
ANS-(B)
45. Electronic Data Interchange Software consists of the following four layers :
(A) Business application, Internal format conversion, Network translator, EDI envelope
(B) Business application, Internal format conversion, EDI translator, EDI envelope
(C) Application layer, Transport layer, EDI translator, EDI envelope
(D) Application layer, Transport layer, IP layer, EDI envelope
ANS-(B)
46. Consider a preemptive priority based scheduling algorithm based on dynamically changing priority.
Larger priority number implies higher priority. When the process is waiting for CPU in the ready queue
(but not yet started execution), its priority changes at a rate a = 2. When it starts running, its priority changes at a rate b = 1. All the processes are assigned priority value 0 when they enter ready queue. Assume that the following processes want to execute :
Process Arrival Service
ID Time Time
PI 0 4
P2 1 1
P3 2 2
P4 3 1
The time quantum q = 1. When two processes want to join ready queue simultaneously, the process which has not executed recently is given priority. The finish time of processes PI, P2, P3 and P4 will respectively be
(A) 4, 5, 7 and 8
(B) 8, 2, 7 and 5
(C) 2, 5, 7 and 8
(D) 8, 2, 5 and 7
ANS-(B)
47. The virtual address generated by a CPU is 32 bits. The Translation Look-aside Buffer (TLB) can hold
total 64 page table entries and a 4-way set associative (i.e. with 4- cache lines in the set). The page size
is 4 KB. The minimum size of TLB tag is
(A) 12 bits
(B) 15 bits
(C) 16 bits
(D) 20 bits
ANS-(C)
48. Consider a disk queue with request for input/output to block on cylinders
98, 183, 37, 122, 14, 124, 65, 67
in that order. Assume that disk head is initially positioned at cylinder 53 and moving towards cylinder number 0. The total number of head movements using Shortest Seek Time First (SSTF) and SCAN algorithms are respectively
(A) 236 and 252 cylinders
(B) 640 and 236 cylinders
(C) 235 and 640 cylinders
(D) 235 and 252 cylinders
ANS-(A)
If we solve it we get SSTF- 236 but when SCAN doesn't move 252 cylinder.
49. How much space will be required to store the bit map of a 1.3 GB disk with 512 bytes block size ?
(A) 332.8 KB
(B) 83.6 KB
(C) 266.2 KB
(D) 256.6 KB
ANS-(A)
50. Linux operating system uses
(A) Affinity Scheduling
(B) Fair Preemptive Scheduling
(C) Hand Shaking
(D) Highest Penalty Ratio Next
ANS-(B)
(A) Piggy packing
(B) Piggy backing
(C) Back packing
(D) Good packing
ANS-(B)
2. Encryption and Decryption is the responsibility of Layer.
(A) Physical
(B) Network
(C) Application
(D) Datalink
ANS-(C)
3. An analog signal carries 4 bits in each signal unit. If 1000 signal units are sent per second, then baud rate and bit rate of the signal are and
(A) 4000 bauds \ sec & 1000 bps
(B) 2000 bauds \ sec & 1000 bps
(C) 1000 bauds \ sec & 500 bps
(D) 1000 bauds \ sec & 4000 bps
ANS-(D)
4. The VLF and LF bauds use propagation for communication.
(A) Ground
(B) Sky
(C) Line of sight
(D) Space
ANS-(A)
5. Using the RSA public key crypto system, if p = 13, q = 31 and d = 7, then the value of e is
(A) 101
(B) 103
(C) 105
(D) 107
ANS-(B)
6. FAN IN of a component A is defined as
(A) Number of components that can call or pass control to component A.
(B) Number of components that are called by component A.
(C) Number of components related to component A.
(D) Number of components dependent on component A.
ANS-(A)
7. The relationship of data elements in a module is called
(A) Coupling
(B) Modularity
(C) Cohesion
(D) Granularity
ANS-(C)
8. Software Configuration Management is the discipline for systematically controlling
(A) the changes due to the evolution of work products as the project proceeds.
(B) the changes due to defects (bugs) being found and then fixed.
(C) the changes due to requirement changes
(D) all of the above
ANS-(D)
9. Which one of the following is not a step of requirement engineering ?
(A) Requirement elicitation
(B) Requirement analysts
(C) Requirement design
(D) Requirement documentation
ANS-(C)
10. Testing of software with actual data and in actual environment is called
(A) Alpha testing
(B) Beta testing
(C) Regression testing
(D) None of the above
ANS-(B)
11. The student marks should not be greater than 100. This is
(A) Integrity constraint(B) Referential constraint
(C) Over-defined constraint
(D) Feasible constraint
ANS-(A)
12. GO BOTTOM and SKTP-3 commands are given one after another in a database file of 30 records. It shifts the control to
(A) 28th record
(B) 27th record
(C) 3rd record
(D) 4th record
ANS-(A)
13. An ER Model includes
I. An ER diagram portraying entity types.
II. Attributes for each entity type
III. Relationships among entity types.
IV. Semantic integrity constraints that reflects the business rules about data not captured in the ER diagram.
(A) I, II, III & IV
(B) I&IV
(C) I, II & IV
(D) I & III
ANS-(A)
14. Based on the cardinality ratio and participation associated with a relationship type, choose either the Foreign Key Design, the Cross Referencing Design or Mutual Referencing Design.
(A) Entity
(B) Constraints
(C) Rules
(D) Keys
ANS-(B)
15. Data Integrity control uses
(A) Upper and lower limits on numeric data.
(B) Passwords to prohibit unauthorised access to files.
(C) Data dictionary to keep the data
(D) Data dictionary to find last access of data
ANS-(B)
16. What does the following declaration mean ?
int (*ptr) [10];
(A) ptr is an array of pointers of 10 integers.
(B) ptr is a pointer to an array of 10 integers.
(C) ptr is an array of 10 integers.
(D) none of the above.
ANS-(B)
17. Which of the following has compilation error in C ?
(A) int n = 32 ;
(B) char ch = 65 ;
(C) float f= (float) 3.2;
(D) none of the above
ANS-(D)
18. Which of the following operators can not be overloaded in C+ + ?
(A) *
(B) + =
(C) = =
(D) ::
ANS-(D)
19. allows to create classes which are derived from other classes, so that they automatically include some of its "parent's" members, plus its own members.
(A) Overloading
(B) Inheritance
(C) Polymorphism
(D) Encapsulation
ANS-(B)
20. The correct way to round off a floating number x to an integer value is
(A) y = (int)(x + 0.5)
(B) y = int (x + 0.5)
(C) y = (int)x+ 0.5
(D) y = (int)((int)x + 0.5)
ANS-(A)
21. What is the value of the postfix expression ?
a b c d + - * (where a = 8, b = 4, c = 2 and d = 5)
(A) -3/8
(B) -8/3
(C) 24
(D) -24
ANS-(D)
22. If the queue is implemented with a linked list, keeping track of a front pointer and a rear pointer, which of these pointers will change during an insertion into a non-empty queue ?
(A) Neither of the pointers change
(B) Only front pointer changes
(C) Only rear pointer changes
(D) Both of the pointers changes
ANS-(C)
23. _________ is often used to prove the correctness of a recursive function.
(A) Diagonaliization
(B) Communitivity
(C) Mathematical Induction
(D) Matrix Multiplication
ANS-(C)
24. For any B-tree of minimum degree t > 2, every node other than the root must have atleast _________ keys and every node can have at, most ________ keys.
(A) t-1,2t+1
(B) t+1,2t+1
(C) t-1,2t-1
(D) t+1,2t-1
ANS-(C)
25. Given two sorted list of size 'm' and 'n' respectively. The number of comparison needed in the worst case
by the merge sort algorithm will be
(A) m x n
(B) max (m, n)
(C) min (m, n)
(D) m + n - 1
ANS-(D)
26. Given the following statements :
S1 : SLR uses follow information to guide reductions. In case of LR and LALR parsers, the look-aheads are associated with the items and they make use of the left context available to the parser.
S2 : LR grammar is a larger subclass of context free grammar as compared to that SLR and LALR grammars.
Which of the following is true ?
(A) S1 is not correct and S2 is not correct.
(B) S1 is not correct and S2 is correct.
(C) S1 is correct and S2 is not correct.
(D) S1 is correct and S2 is correct.
ANS-(D)
27. The context free grammar for the language
L={anbm|n≤m+3,n≥0.m≥0}is
(A) S→aaaA; A→aAb|B, B→Bb | λ,
(B) S → aaaA|λ, A ->aAb | B, B→ Bb|λ
(C) S→aaaA | aa A |λ , A ->aAb | B|λ, B→ Bb|λ
(D) S→aaaA | aa A | aA |λ , A → aAb | B, B→ Bb | λ
ANS-(D)
28. Given the following statements :
S1 : If L is a regular language then the language {uv | u Є L, v Є LR} is also regular.
S2 : L = {wwR }is regular language.
Which of the following is true ?
(A) S1 is not correct and S2 is not correct.
(B) S1 is not correct and S2 is correct.
(C) S1 is correct and S2 is not correct.
(D) S1 is correct and S2 is correct.
ANS-(C)
29. The process of assigning load addresses to the various parts of the program and adjusting the code and data in the program to reflect the assigned addresses is called ____________
(A) Symbol resolution
(B) Parsing
(C) Assembly
(D) Relocation
ANS-(D)
30. Which of the following derivations does a top-down parser use while parsing an input string ? The input is scanned from left to right.
(A) Leftmost derivation
(B) Leftmost derivation traced out in reverse
(C) Rightmost derivation traced out in reverse
(D) Rightmost derivation
ANS-(A)
31. The dual of a Boolean expression is obtained by interchanging
(A) Boolean sums and Boolean products
(B) Boolean sums and Boolean products or interchanging 0's and 1 's
(C) Boolean sums and Boolean products and interchanging 0's & 1's
(D) Interchanging 0's and 1's
ANS-(C)
32. Given that (292) 10 = (1204)x in some number system x. The base x of that number system is
(A) 2
(B) 8
(C) 10
(D) None of the above
ANS-(D)
32. Given that (292) 10 = (1204)x in some number system x. The base x of that number system is
(A) 2
(B) 8
(C) 10
(D) None of the above
ANS-(D)
34. Let P(m, n) be the statement
"m divides n" where the universe of discourse for both the variables is the set of
positive integer.Determine the truth values of each of the following propositions:
I: VmVnP(m,n),
II. ƎmVn P(m, n)
(A) Both I and II are true
(B) Both I and II are false
(C) I - false & II - true
(D) I - true & II - false
ANS-(C)
35. Big - 0 estimate for
f(x) = (x + 1) log(x^2 + 1) + 3x^2 is given as
(A) O(xlogx)
(B) O(x^2)
(C) O(x^3)
(D) O(x^2 logx)
ANS-(B)
36. How many edges are there in a forest of t-trees containing a total of n vertices ?
(A) n+1
(B) n-t
(C) n*t
(D) nt
ANS-(B)
37. Let f and g be the functions from the set of integers to the set integers defined by
f(x) = 2x + 3 and g(x) = 3x + 2
Then the composition of f and g and g and f is given as
(A) 6x + 7, 6x + 11
(B) 6x + 11, 6x + 7
(C) 5x + 5, 5x + 5
(D) None of the above
ANS-(A)
Composition of f and g is gof = g(f(x))
38. If n and r are non-negative integers and n > r, then p(n + 1, r) equals to
(A) P(n,r)(n + 1) / (n + 1 - r)
(B) P(n,r)(n+1) / (n - 1 + r)
(C) p(n,r)(n-l) / (n + 1 - r)
(D) p(n,r)(n + l) / (n + 1 + r)
ANS-(A)
39. A graph is non-planar if and only if it contains a subgraphhomomorphic to
(A) K3,2 or K5
(B) K3,3 and K6
(C) K3,3 or K5
(D) K2,3 and K5
ANS-(C)
40. Which of the following statements are true ?
I. A circuit that adds two bits, producing a sum bit and a carry bit is called half adder.
II. A circuit that adds two bits, producing a sum bit and a carry bit is called full adder.
III. A circuit that adds two bits and a carry bit producing a sum bit and a carry bit is called full adder.
IV. A device that accepts the value of a Boolean variable as input and produces its complement is called an inverter.
(A) I & II
(B) II & III
(C) I,II,III
(D) I,III & IV
ANS-(D)
41 Active X controls are Pentium binary programs that can be embedded in ____________
(A) Word pages
(B) URL pages
(C) Script pages
(D) Web pages
ANS-(D)
42. Match the following :
List-I List - II
a. Wireless Application Environment i. HTTP
b. Wireless Transaction Protocol ii. IP
c. Wireless Datagram Protocol iii Scripts
d. Wireless iv. UDP
Codes :
a b c d
(A) ii iv i iii
(B) iv iii ii i
(C) iv iii i ii
(D) iii i iv ii
ANS-(D)
43. Which of the following is widely used inside the telephone system for long-haul data traffic ?
(A) ISDN
(B) ATM
(C) Frame Relay
(D) ISTN
ANS-(B)
44. The document standards for EDI were first developed by large business house during the 1970s and are now under the control of the following standard organisation :
(A) ISO
(B) ANSI
(C) ITU-T
(D) IEEE
ANS-(B)
45. Electronic Data Interchange Software consists of the following four layers :
(A) Business application, Internal format conversion, Network translator, EDI envelope
(B) Business application, Internal format conversion, EDI translator, EDI envelope
(C) Application layer, Transport layer, EDI translator, EDI envelope
(D) Application layer, Transport layer, IP layer, EDI envelope
ANS-(B)
46. Consider a preemptive priority based scheduling algorithm based on dynamically changing priority.
Larger priority number implies higher priority. When the process is waiting for CPU in the ready queue
(but not yet started execution), its priority changes at a rate a = 2. When it starts running, its priority changes at a rate b = 1. All the processes are assigned priority value 0 when they enter ready queue. Assume that the following processes want to execute :
Process Arrival Service
ID Time Time
PI 0 4
P2 1 1
P3 2 2
P4 3 1
The time quantum q = 1. When two processes want to join ready queue simultaneously, the process which has not executed recently is given priority. The finish time of processes PI, P2, P3 and P4 will respectively be
(A) 4, 5, 7 and 8
(B) 8, 2, 7 and 5
(C) 2, 5, 7 and 8
(D) 8, 2, 5 and 7
ANS-(B)
47. The virtual address generated by a CPU is 32 bits. The Translation Look-aside Buffer (TLB) can hold
total 64 page table entries and a 4-way set associative (i.e. with 4- cache lines in the set). The page size
is 4 KB. The minimum size of TLB tag is
(A) 12 bits
(B) 15 bits
(C) 16 bits
(D) 20 bits
ANS-(C)
48. Consider a disk queue with request for input/output to block on cylinders
98, 183, 37, 122, 14, 124, 65, 67
in that order. Assume that disk head is initially positioned at cylinder 53 and moving towards cylinder number 0. The total number of head movements using Shortest Seek Time First (SSTF) and SCAN algorithms are respectively
(A) 236 and 252 cylinders
(B) 640 and 236 cylinders
(C) 235 and 640 cylinders
(D) 235 and 252 cylinders
ANS-(A)
If we solve it we get SSTF- 236 but when SCAN doesn't move 252 cylinder.
49. How much space will be required to store the bit map of a 1.3 GB disk with 512 bytes block size ?
(A) 332.8 KB
(B) 83.6 KB
(C) 266.2 KB
(D) 256.6 KB
ANS-(A)
50. Linux operating system uses
(A) Affinity Scheduling
(B) Fair Preemptive Scheduling
(C) Hand Shaking
(D) Highest Penalty Ratio Next
ANS-(B)
1. If the
primal Linear Programming problem has unbounded solution,then it’s dual problem
will have
(A) feasible solution
(B) alternative solution
(C) no feasible solution at all
(D) no bounded solution at all
ANS (C)
2. Given the problem to maximize f(x),X=(x1,x2,...xn) subject to m number of inequity constraints
gi(x)<=bi,i=1,2.....,m
Including the non-negativity constraints x>= 0.
Which one of the following conditions is a Kuhn-Tucker necessary condition for a local maxima at x?
(A) L(X,λ,S) / Xj = 0,j = 1,2,...m
(B) λ[gi(X)-bi]=0,j = 1,2,...m
(C) gi(X)<=bi, i = 1,2...m
(D) All of the above
Ans (D)
3. The following linear programming problem has
Max Z = x1 + x2
Subject to
x1 - x2 >= 0
3x1 - x2 <= -3
x1 >= 0,x2 >= 0
(A) Feasible solution
(B) No feasible solution
(C) Unbounded solution
(D) Single point as solution
Ans (B)
4. Given a flow graph with 10 nodes. 13 edges and one connected components, the number of regions and the number of predicate(decision) nodes in the flow graph will be
(A) 4,5
(B) 5,4
(C) 3,1
(D) 13,8
ANS-(B)
5. Function points can be calculated by
(A) UFP*CAF
(B) UFP*FAC
(C) UFP*Cost
(D) UFP*Productivity
ANS-(A)
UFP is Unadjusted Function Point
CAF is Complixity Adjustment Factor Function Point FP = UFP*CAF
6. Match the following:
List-I List-II
a. Data coupling i. Module A and Module B have shared data
b. Stampcoupling ii. Dependency between modules is based on the fact they communicate by only passing of data.
c. Common coupling iii. When complete data structure is passed from one module to another.
d. Content coupling iv.When the control is passed from one module to the middle of another.
Codes:
a b c d
(A) iii ii i iv
(B) ii iii i iv
(C) ii iii iv i
(D) iii ii iv i
ANS-(B)
7. A process which defines a series of tasks that have the following four primary objectives is known as
1. to identify all items that collectively defines the software configuration.
2. to manage changes to one or more of these items.
3. to facilitate the construction of different versions of an application.
4. to ensure that software quality is maintained as the configuration evolves over time.
(A) Software Quality Management Process
(B) Software Configuration Management Process
(C) Software Version Management Process
(D) Software Change Management Process
ANS-(B)
8. One weakness of boundary value analysis and equivalent partitioning is
(A) they are not effective.
(B) they do not explore combinations of input circumstances.
(C) they explore combinations of input circumstances
(D) none of the above
ANS-(B)
9. Which one of the following is not a software myth?
(A) Once we write the program and get it to work, our job is done.
(B) Project requirement continually change, but change can be easily accommodated because software is flexible.
(C) If we get behind schedule, we can add more programmers and catch up.
(D) If an organization does not understand how to control software project internally, it will invariably struggle when it outsources software projects.
ANS-(D)
10. Match the following with respect to relationship between objects and classes:
List-I List-II
a. State diagram i. Useful for both abstract modeling and for designing actual program.
b. Object diagram ii. Describes object classes.
c. Class diagram iii. Useful for documenting test cases.
d. Instance diagram iv. Describing the behavior of a single class of object.
Codes:
a b c d
(A) iv i ii iii
(B) ii iii iv i
(C) iii iv ii i
(D) ii iv i iii
ANS-(A)
11. Match the following style rules for reusability:
List-I List-II
a. Keep methods coherent i. Write a method to get the last element of a list.
b. Keep methods small ii. Maintain parallel structure when possible.
c. Keep methods consistent iii. Breaking a method into smaller parts.
d. Provide uniform coverage iv. Perform a single function or a group of closely related function.
Codes:
a b c d
(A) iv iii ii i
(B) ii i iv iii
(C) iii iv ii i
(D) ii iii iv i
ANS-(A)
12. Which is the protocol for performing RPCs between applications in a language and system independent way?
(A) Hyper Text Transmission Protocol (HTTP)
(B) Simple Network Management Protocol (SNMP)
(C) Simple Object Access Protocol (SOAP)
(D) Simple Mail Transfer Protocol (SMTP)
ANS-(C)
13. The document that is used by XSLT to indicate, how to transform the element of the XML document to another format is
(A) HTML page
(B) DOC type procedure
(C) Style sheet
(D) Store procedure
ANS-(C)
14. Which of the following concepts means adding new concept to a program as it runs?
(A) Data hiding
(B) Dynamic loading
(C) Dynamic typing
(D) Dynamic binding
ANS-(B)
15. Which of the following correctly describes overloading of functions?
(A) Virtual polymorphism
(B) Transient polymorphism
(C) Ad-hoc polymorphism
(D) Pseudo polymorphism
ANS-(C)
16. Match the following with respect to programming languages:
List-I List-II
a. Structured Language i. JAVA
b. Non-structured Language ii. BASIC
c. Object oriented Programming Language iii. PASCAL
d. Interpreted Programming Language iv. FORTRAN
Codes:
a b c d
(A) iii iv i ii
(B) iv iii ii i
(C) ii iv i iii
(D) ii iii iv i
ANS-(A)
17. The compiler converts all operands upto the type of the largest operand is called
(A) Type Promotion
(B) Type Evaluation
(C) Type Conversion
(D) Type Declaration
ANS-(A)
18. C++ actually support the following two complete dynamic system
(A) one defined by C++ and the other not defined by C.
(B) one defined by C and one specific to C++.
(C) Both are specific to C++
(D) Both of them are improvements of C.
ANS-(B)
This question is incomplete. Here word "allocation" is missing.
19. Important advantage of using new and delete operation in C++ is
(A) Allocation of memory
(B) Frees the memory previously allocated
(C) Initialization of memory easily
(D) Allocation of memory and frees the memory previously allocated.
ANS- (D)
20. Match the following control strategies of prolog:
List-I List-II
a. Forward movement i. Variable can be done with a constant, another variable or a function
b. Unification ii. The entire conjunctive goal is executed.
c. Deep backtracking iii. Previous sub goal to find alternative solutions.
d. Shallow backtracking iv. Choose sub goal with possible unifier.
Codes:
a b c d
(A) iv i ii iii
(B) ii iv i iii
(C) iii i iv ii
(D) ii iii iv i
ANS-(A)
21. Given the following statements.
S1 : The grammars S ->asb | bsa | ss | a and S ->asb | bsa | a are not equivalent
S2: The grammars S ->ss | sss | asb | bsa | λ and S->ss | asb | bsa | λ are equvalent
Which one of the following is true?
(A) S1 is correct and S2 is not correct.
(B) Both S1 & S2 are correct
(C) S1 is not correct & S2 is correct
(D) Both S1 & S2 are not correct
Ans (B)
22. What are the final value of Q1 and Q0 after 4 clock cycles, if initial values are 00 in the sequential circuit shown below
(A) 11
(B) 10
(C) 01
(D) 00
ANS-(D)
23. High level knowledge which relates to the use of sentences in different contexts and how the context affect the meaning of the sentences?
(A) Morphological
(B) Syntactic
(C) Semantic
(D) Pragmatic
ANS-(D)
24. The objective of ___________ procedure is to discover at least one ________ that causes two literals to match
(A) unification, validation
(B) unification, substitution
(C) substitution, unification
(D) minimax, maximax
ANS-(B)
25. If h* represents an estimate of the cost of getting from the current node N to the goal and h represents actual cost of getting from current node to the goal node, then A* algorithm gives an optimal solution if
(A) h* us equal to h
(B) h* overestimates h
(C) h* underestimates h
(D) none of these
ANS- (C)
26. The mean-end analysis process centersaround the detection of difference between the current state and the goal state. Once such a difference is isolated, an operator that can reduce the difference must be found. But perhaps that operator can not be applied to the current state. So a sub-problem of getting to a state in which it can be applied is set up. The kind of backward chaining in which operators are selected and then sub goals are set up to established the precondition of operators is called
(A) backward planning
(B) goal stack planning
(C) operator subgoaling
(D) operator overloading
ANS-(C)
27. In alpha-beta pruning, ______ is used to cut off the search at maximizing level only and _______ is used to cut off the search at minimizing level only.
(A) alpha,beta
(B) beta,alpha
(C) alpha,alpha
(D) beta,beta
ANS-(B)
28. If A and B are two fuzzy sets with membership functions
µA(X) ={0.2,0.5,0.6,0.1,0.9}
µB(X)={0.1,0.5,0.2,0.7,0.8}
then the value of µA^B will be
(A) {0.2,0.5,0.6,0.7,0.9}
(B) {0.2,0.5,0.2,0.1,0.8}
(C) {0.1,0.5,0.6,0.1,0.8}
(D) {0.1,0.5,0.2,0.1,0.9}
Ans (D)
29. The height of h(A) of a fuzzy set A is defined as
h(A) = sup A(X)
The the fuzzy set A is called normal when
(A) h(A) = 0
(B) h(A) < 0
(C) h(A) = 1
(D) h(A) < 1
Ans (C)
30. An artificial neurons received n inputs x1,x2,...,xn with weights w1,w2,...,wn attached to the input links. The weighted sum _______ is computed to be passed on to a non-linear filter φ called activation function to release the output.
(A) Σ wi
(B) Σ xi
(C) Σ wi + Σ xi
(D) Σ wi . Σ xi
Ans (D)
31. Consider the formula in image processing
Rd = 1 - (1/Cr) where Cr = N1 / N2
Cr is called as compression ration N1 and N2 denotes the number of information
Carrying units into two data sets that represents the same information. In this situation Rd is called as relative ______ of the first data set
(A) Data compression
(B) Data redundancy
(C) Data Relation
(D) Data representation
Ans (D)
32. Find the false statement:
(A) In Modern Cryptography symmetric key algorithms use same key
both for Encryption and Decryption.
(B) The Symmetric cipher DES(Data Encryption Standard) was widely
used in the industry for security product.
(C) The AES(Advanced Encryption Standard) cryptosystem allows variable
Key lengths of size 56 bits and 124 bits.
(D)Public key algorithms use two different keys for Encryption and Decryption.
ANS-(C)
33. The message 11001001 is to be transmitted using the CRC
Polynomial x3+1 to protect it from errors. The message that should be
Transmitted is
(A) 110010011001
(B) 11001001
(C) 110010011001001
(D) 11001001011
ANS-(D)
34. _____________ comparisons are necessary in the worst case to
find both the maximum and minimum of n numbers.
(A) 2n-2
(B) n + floor(lg n) - 2
(C) floor(3n/2) - 2
(D)2 lg n – 2
ANS-(C)
35. Let A and B be two n x n matrices. The efficient algorithm to
Multiply the two matrices has the time complexity
(A) O(n3)
(B) O(n2.81)
(C) O(n2.67)
(D) O(n2)
ANS-(B)
36. The recurrence relation T(n)=mT(n/2)tan2 is satisfied by
(A) O(n2)
(B) O(nlg m)
(C) O(n2 lg n)
(D) O(n lg n)
ANS-(B)
This is wrong question.If in this question 'tan' is replaced by '+a'
then the solution is (B)
37. The longest common subsequence of the sequence
X=<A,B,C,B,D,A,B> and Y=<B,D,C,A,B,A> has length
(A) 2
(B) 3
(C) 4
(D) 5
ANS-(C)
38. Assuming there are n keys and each keys is in the range [0,m-1]
The run time of bucket sort is
(A) O(n)
(B) O(n lgn)
(C) O(n lgm)
(D) O(n+m)
ANS-(D)
39. A __________ complete subgraph and a________
subset of vertices of a graph G=(V,E) are a clique and a vertex
cover respectively.
(A) minimal, maximal
(B) minimal, minimal
(C) maximal, maximal
(D) maximal, minimal
ANS-(D)
40. Pumping lemma of the context-free languages states:
Let L be an infinite context free language . Then there exist some positive integer m such that w ξ L with |w|>=m can be decomposed as
w=uvxy Z with |vxy| ________________ and |vy| _______ such that uv2xy2 Z ξ L for all Z = 0,1,2,...
(A) <= m, <=1
(B) <=m, >= 1
(C) >=m, <=1
(D) >=m, >=1
Ans (B)
42. Given the following statements:
S1: Every context-sensitive language L is recursive.
S2: There exists a recursive language that is not context sensitive.
Which statement is correct?
(A) S1 is not correct and S2 is not correct.
(B) S1 is not correct and S2 is correct.
(C) S1 is correct and S2 is not correct.
(D) S1 is correct and S2 is correct.
ANS-(D)
42. Given the following statements:
S1: Every context-sensitive language L is recursive.
S2: There exists a recursive language that is not context sensitive.
Which statement is correct?
(A) S1 is not correct and S2 is not correct.
(B) S1 is not correct and S2 is correct.
(C) S1 is correct and S2 is not correct.
(D) S1 is correct and S2 is correct.
ANS-(D)
43. What is the bit rate for transmitting uncompressed 800x600 pixel color frames with 8 bits/pixel at 40 frames/second?
Ans. 153.6 Mbps
44. In IPv 4, the IP address 200.200.200.200 belongs to
(A) Class A
(B) Class B
(C) Class C
(D) Class D
ANS-(C)
45. Which layer of OSI reference model is responsible for decomposition of message and generation of sequence numbers to ensure correct re-composition from end to end the network?
(A) Physical
(B) Data-link
(C) Transport
(D) Application
ANS-(C)
46. A client-server system uses a satellite network, with the satellite at a height of 40,000 kms. What is the best-case delay in responses to a request? (Note that the speed of light in air is 3,00,000 km/second).
(A) 133.33 m sec
(B) 266.67 m sec
(C) 400.00 m sec
(D) 533.33 m sec
ANS-(D)
47. The start and stop bits are used in serial communication for
(A) error detection
(B) error correction
(C) synchronization
(D) slowing down the communication.
ANS-(C)
48. ______________ is a type of transmission impairment in which the signal looses strength due to the resistance of the transmission medium
(A) Attenuation
(B) Distortion
(C) Noise
(D) Decibel
ANS-(A)
49. Match the following:
List-I List-II
a. Indexed Addressing i. is not used when an operand is moved from memory into a register or from a register to memory.
b. Direct Addressing ii. Memory address is computed by adding up two registers plus an (optional) offset.
c. Register Addressing iii. Addressing memory by giving a register plus a content offset.
d. Base-Indexed Addressing iv. can only be used to access global variables whose address is known at compile time.
Codes:
a b c d
(A) ii i iv Iii
(B) ii iv i Iii
(C) iii iv i ii
(D) iii i iv ii
ANS-(C)
50. Which of the following is a design criteria for instruction formats?
(A) The size of instructions
(B) The numbers of bits in the address fields
(C) The sufficient space in the instruction format to express all the operations desired.
(D) All of these
ANS-(D)
51. Synchronization is achieved by a timing device called a ________ which generates a periodic train of _________.
(A) clock generator, clock pulse
(B) master generator, clock pulse
(C) generator, clock
(D) master clock generator, clock pulse
ANS-(D)
52. Serial access memories are useful in applications where
(A) Data consists of numbers
(B) Short access time is required.
(C) Each stored word is processed differently.
(D) None of these
ANS-(D)
53. What will be the output of the following logic diagram
(A) x OR y
(B) x AND y
(C) x NOR y
(D) x XNOR y
ANS-(C)
54. The essential difference between traps and interrupt is
(A) traps are asynchronous and interrupt are synchronous with the program
(B) traps are synchronous and interrupt are asynchronous with the program
(C) traps are synchronous and interrupt are asynchronous with the I/O devices.
(D) None of these.
ANS-(B)
55. Consider the following ER diagram
The minimum number of tables required to represents M,N,P,R1,R2 is
(A) 2
(B) 3
(C) 4
(D) 5
ANS-(A)
56. Consider the following schemas:
Branch = (Branch_name, Assets, Branch_city)
Customer = (Customer-name, Bank-name,Customer-city)
Borrow = (Branch-name, loan-number, customer-name, Balance)
Deposit = (Branch-name, Account-number, Customer-name, Balance)
Using relational Algebra, the query that finds customers who have balance
More than 10,000 is ________
(A) πcustomer-name(σbalance> 10000(Deposit))
(B) σcustomer-name(σbalance> 10000(Deposit))
(C) πcustomer-name(σbalance> 10000(Borrow))
(D)σcustomer-name(σbalance> 10000(Deposit))
ANS-(A)
57. Find the false statement:
(A) The relationship construct known as the weak relationship
type was defined by Dey, Storey & Barron (1999).
(B) A weak relationship occurs when two relationship types are
linked by either Event-Precedent sequence or Condition-Precedent
sequence
(C) Conceptual model is not accurate representation of
"Universe of interest".
(D) Ternary, Quaternary and Quintary relationships are shown
through a series of application scenario's and vignette's
ANS-(C)
58. Consider the table
Student(stuid, name, course, marks).
Which one of the following two queries is correct to find the
highest marks student in course 5?
Q.1. Select S.stuid
From student S
Where not exists
(select * from student e where
e course='5' and e marks >= s
marks)
Q.2. Select S.stu.id
From student S
Where s.marks> any
(select distinct marks from
student S where s.couse = 5)
(A) Q.1
(B) Q.2
(C) Both Q.1 and Q.2
(D) Neither Q.1 nor Q.2
ANS-(B)
59. Armstrong (1974) proposed systematic approach to derive
functional dependencies. Match the following w.r.t. functional dependencies.
Codes:
a b c d
(A) iii ii iv i
(B) i iii iv ii
(C) ii i iii iv
(D) iv iii i ii
ANS-(D)
60. Match the following
List I List II
(a) Secondary Index (i) Functional dependency
(b) Non-procedural Query (ii) B-tree
(c) Closure set Attribute (iii) Relational Algebraic Operation
(d) Natural Join (iv) Domain Calculus
Codes:
(a) (b) (c) (d)
(A) i ii iv iii
(B) ii i iv iii
(C) i iii iv ii
(D) ii iv i iii
ANS-(D)
61. Which of the following is not true with respect to a trackball and/or spaceball
I. A trackball is a two dimensional positioning device while as a spaceball provides six degree of freedom
II. Unlike the trackball a spaceball does not actually move.
III. A trackball is a three dimensional positioning device while as a spaceball provides six degree of freedom.
(A) I &II
(B) II & III
(C) II only
(D) III only
ANS-(D)
62. Which of the following statement(s) is(are) true?
I. Two successive translations are additive.
II. Two successive rotations are additive.
III. Two successive scaling operations multiplicative.
(A) I and II
(B) I and III
(C) II and III
(D) All of above.
ANS-(D)
63. Given below are three basic rules:
I. Squash and Stretch
II. Slow-in and Slow out
III. To stage the action properly
These rules are applied in case of
(A) Rendering
(B) Morphing
(C) Animation
(D) All of above
ANS-(C)
64. Which of the following points lies on the same side as the origin, with reference to the line
3x+7y=2 ?
(A) (3,0)
(B) (1,0)
(C) (0.5,0.5)
(D) (0.5,0)
ANS-(D)
Put the value of x and y in the equation 3x+7y
if 3x+7y <2 then it lies on the same side of origin
else if 3x+7y > 2 it does not lies on the same side of origin
65. The transformation matrix required for conversion of CMY color model to RGB color model is given as
ANS- (C)
66. What step shall be required to rotate an object about the point P1 and its placement such that what was at P1 is now reduced and is at P2.
I. Translate P1 to origin
II. Scale as required
III. Rotate
IV. Translate to the final position P2.
(A) I,II and III
(B) II,III and IV
(C) I,III and IV
(D) All of the above
ANS-(D)
67. In Unix, how do you check that two given strings a and b are equal
(A) test $a -eq $b
(B) test $a -equal $b
(C) test $a=$b
(D) sh -C test $a==$b
ANS-(C)
68. In windows 2000 operating system all the processor-dependent code is isolated in a dynamic link library called
(A) NTFS file system
(B) Hardware Abstraction layer
(C) Microkernel
(D) Process Manager
ANS-(B)
69. To place a sound into a word document, following feature of windows is used
(A) Clip board
(B) Task switching
(C) C Win App
(D) OLE
ANS-(D)
70. Translation Look-aside Buffer(TLB) is
(A) a cache-memory in which item to be searched is compared
one-by-one with the keys.
(B) a cache-memory in which item to be searched is compared
with all the keys simultaneously.
(C) an associative memory in which item to be searched is compared
one-by-one with the keys.
(D) an associative memory in which item to be searched is compared
with all the keys simultaneously.
ANS-(D)
71. Simplest way of deadlock recovery is
(A) Roll back
(B) Preempt resource
(C) Lock one of these processes
(D) Kill one of the processes
ANS-(D)
72. The directory structure used in Unix file system is called
(A) Hierarchical directory
(B) Tree structure directory
(C) Directed acyclic graph
(D) Graph structured directory
ANS-(C)
73. Which statement is not true about process 0 in the Unix operating system?
(A) Process 0 is called init process.
(B) Process 0 is not created by fork system call.
(C) After forking process 1, process 0 becomes swapper process.
(D) Process 0 is a special process created when system boots.
ANS-(A)
74. Which one of the following commands would return process_id of sleep command?
(A) Sleep 1 and echo $?
(B) Sleep 1 and echo $#
(C) Sleep 1 and echo $x
(D) Sleep 1 and echo $!
ANS-(D)
75. Possible thread states in Windows 2000 operating system include:
(A) Ready,running and waiting
(B) Ready, standby, running, waiting, transition and terminated.
(C) Ready, running, waiting, transition and terminated
(D) Standby, running, transition and terminated.
ANS-(B)
(A) feasible solution
(B) alternative solution
(C) no feasible solution at all
(D) no bounded solution at all
ANS (C)
2. Given the problem to maximize f(x),X=(x1,x2,...xn) subject to m number of inequity constraints
gi(x)<=bi,i=1,2.....,m
Including the non-negativity constraints x>= 0.
Which one of the following conditions is a Kuhn-Tucker necessary condition for a local maxima at x?
(A) L(X,λ,S) / Xj = 0,j = 1,2,...m
(B) λ[gi(X)-bi]=0,j = 1,2,...m
(C) gi(X)<=bi, i = 1,2...m
(D) All of the above
Ans (D)
3. The following linear programming problem has
Max Z = x1 + x2
Subject to
x1 - x2 >= 0
3x1 - x2 <= -3
x1 >= 0,x2 >= 0
(A) Feasible solution
(B) No feasible solution
(C) Unbounded solution
(D) Single point as solution
Ans (B)
4. Given a flow graph with 10 nodes. 13 edges and one connected components, the number of regions and the number of predicate(decision) nodes in the flow graph will be
(A) 4,5
(B) 5,4
(C) 3,1
(D) 13,8
ANS-(B)
5. Function points can be calculated by
(A) UFP*CAF
(B) UFP*FAC
(C) UFP*Cost
(D) UFP*Productivity
ANS-(A)
UFP is Unadjusted Function Point
CAF is Complixity Adjustment Factor Function Point FP = UFP*CAF
6. Match the following:
List-I List-II
a. Data coupling i. Module A and Module B have shared data
b. Stampcoupling ii. Dependency between modules is based on the fact they communicate by only passing of data.
c. Common coupling iii. When complete data structure is passed from one module to another.
d. Content coupling iv.When the control is passed from one module to the middle of another.
Codes:
a b c d
(A) iii ii i iv
(B) ii iii i iv
(C) ii iii iv i
(D) iii ii iv i
ANS-(B)
7. A process which defines a series of tasks that have the following four primary objectives is known as
1. to identify all items that collectively defines the software configuration.
2. to manage changes to one or more of these items.
3. to facilitate the construction of different versions of an application.
4. to ensure that software quality is maintained as the configuration evolves over time.
(A) Software Quality Management Process
(B) Software Configuration Management Process
(C) Software Version Management Process
(D) Software Change Management Process
ANS-(B)
8. One weakness of boundary value analysis and equivalent partitioning is
(A) they are not effective.
(B) they do not explore combinations of input circumstances.
(C) they explore combinations of input circumstances
(D) none of the above
ANS-(B)
9. Which one of the following is not a software myth?
(A) Once we write the program and get it to work, our job is done.
(B) Project requirement continually change, but change can be easily accommodated because software is flexible.
(C) If we get behind schedule, we can add more programmers and catch up.
(D) If an organization does not understand how to control software project internally, it will invariably struggle when it outsources software projects.
ANS-(D)
10. Match the following with respect to relationship between objects and classes:
List-I List-II
a. State diagram i. Useful for both abstract modeling and for designing actual program.
b. Object diagram ii. Describes object classes.
c. Class diagram iii. Useful for documenting test cases.
d. Instance diagram iv. Describing the behavior of a single class of object.
Codes:
a b c d
(A) iv i ii iii
(B) ii iii iv i
(C) iii iv ii i
(D) ii iv i iii
ANS-(A)
11. Match the following style rules for reusability:
List-I List-II
a. Keep methods coherent i. Write a method to get the last element of a list.
b. Keep methods small ii. Maintain parallel structure when possible.
c. Keep methods consistent iii. Breaking a method into smaller parts.
d. Provide uniform coverage iv. Perform a single function or a group of closely related function.
Codes:
a b c d
(A) iv iii ii i
(B) ii i iv iii
(C) iii iv ii i
(D) ii iii iv i
ANS-(A)
12. Which is the protocol for performing RPCs between applications in a language and system independent way?
(A) Hyper Text Transmission Protocol (HTTP)
(B) Simple Network Management Protocol (SNMP)
(C) Simple Object Access Protocol (SOAP)
(D) Simple Mail Transfer Protocol (SMTP)
ANS-(C)
13. The document that is used by XSLT to indicate, how to transform the element of the XML document to another format is
(A) HTML page
(B) DOC type procedure
(C) Style sheet
(D) Store procedure
ANS-(C)
14. Which of the following concepts means adding new concept to a program as it runs?
(A) Data hiding
(B) Dynamic loading
(C) Dynamic typing
(D) Dynamic binding
ANS-(B)
15. Which of the following correctly describes overloading of functions?
(A) Virtual polymorphism
(B) Transient polymorphism
(C) Ad-hoc polymorphism
(D) Pseudo polymorphism
ANS-(C)
16. Match the following with respect to programming languages:
List-I List-II
a. Structured Language i. JAVA
b. Non-structured Language ii. BASIC
c. Object oriented Programming Language iii. PASCAL
d. Interpreted Programming Language iv. FORTRAN
Codes:
a b c d
(A) iii iv i ii
(B) iv iii ii i
(C) ii iv i iii
(D) ii iii iv i
ANS-(A)
17. The compiler converts all operands upto the type of the largest operand is called
(A) Type Promotion
(B) Type Evaluation
(C) Type Conversion
(D) Type Declaration
ANS-(A)
18. C++ actually support the following two complete dynamic system
(A) one defined by C++ and the other not defined by C.
(B) one defined by C and one specific to C++.
(C) Both are specific to C++
(D) Both of them are improvements of C.
ANS-(B)
This question is incomplete. Here word "allocation" is missing.
19. Important advantage of using new and delete operation in C++ is
(A) Allocation of memory
(B) Frees the memory previously allocated
(C) Initialization of memory easily
(D) Allocation of memory and frees the memory previously allocated.
ANS- (D)
20. Match the following control strategies of prolog:
List-I List-II
a. Forward movement i. Variable can be done with a constant, another variable or a function
b. Unification ii. The entire conjunctive goal is executed.
c. Deep backtracking iii. Previous sub goal to find alternative solutions.
d. Shallow backtracking iv. Choose sub goal with possible unifier.
Codes:
a b c d
(A) iv i ii iii
(B) ii iv i iii
(C) iii i iv ii
(D) ii iii iv i
ANS-(A)
21. Given the following statements.
S1 : The grammars S ->asb | bsa | ss | a and S ->asb | bsa | a are not equivalent
S2: The grammars S ->ss | sss | asb | bsa | λ and S->ss | asb | bsa | λ are equvalent
Which one of the following is true?
(A) S1 is correct and S2 is not correct.
(B) Both S1 & S2 are correct
(C) S1 is not correct & S2 is correct
(D) Both S1 & S2 are not correct
Ans (B)
22. What are the final value of Q1 and Q0 after 4 clock cycles, if initial values are 00 in the sequential circuit shown below
(A) 11
(B) 10
(C) 01
(D) 00
ANS-(D)
23. High level knowledge which relates to the use of sentences in different contexts and how the context affect the meaning of the sentences?
(A) Morphological
(B) Syntactic
(C) Semantic
(D) Pragmatic
ANS-(D)
24. The objective of ___________ procedure is to discover at least one ________ that causes two literals to match
(A) unification, validation
(B) unification, substitution
(C) substitution, unification
(D) minimax, maximax
ANS-(B)
25. If h* represents an estimate of the cost of getting from the current node N to the goal and h represents actual cost of getting from current node to the goal node, then A* algorithm gives an optimal solution if
(A) h* us equal to h
(B) h* overestimates h
(C) h* underestimates h
(D) none of these
ANS- (C)
26. The mean-end analysis process centersaround the detection of difference between the current state and the goal state. Once such a difference is isolated, an operator that can reduce the difference must be found. But perhaps that operator can not be applied to the current state. So a sub-problem of getting to a state in which it can be applied is set up. The kind of backward chaining in which operators are selected and then sub goals are set up to established the precondition of operators is called
(A) backward planning
(B) goal stack planning
(C) operator subgoaling
(D) operator overloading
ANS-(C)
27. In alpha-beta pruning, ______ is used to cut off the search at maximizing level only and _______ is used to cut off the search at minimizing level only.
(A) alpha,beta
(B) beta,alpha
(C) alpha,alpha
(D) beta,beta
ANS-(B)
28. If A and B are two fuzzy sets with membership functions
µA(X) ={0.2,0.5,0.6,0.1,0.9}
µB(X)={0.1,0.5,0.2,0.7,0.8}
then the value of µA^B will be
(A) {0.2,0.5,0.6,0.7,0.9}
(B) {0.2,0.5,0.2,0.1,0.8}
(C) {0.1,0.5,0.6,0.1,0.8}
(D) {0.1,0.5,0.2,0.1,0.9}
Ans (D)
29. The height of h(A) of a fuzzy set A is defined as
h(A) = sup A(X)
The the fuzzy set A is called normal when
(A) h(A) = 0
(B) h(A) < 0
(C) h(A) = 1
(D) h(A) < 1
Ans (C)
30. An artificial neurons received n inputs x1,x2,...,xn with weights w1,w2,...,wn attached to the input links. The weighted sum _______ is computed to be passed on to a non-linear filter φ called activation function to release the output.
(A) Σ wi
(B) Σ xi
(C) Σ wi + Σ xi
(D) Σ wi . Σ xi
Ans (D)
31. Consider the formula in image processing
Rd = 1 - (1/Cr) where Cr = N1 / N2
Cr is called as compression ration N1 and N2 denotes the number of information
Carrying units into two data sets that represents the same information. In this situation Rd is called as relative ______ of the first data set
(A) Data compression
(B) Data redundancy
(C) Data Relation
(D) Data representation
Ans (D)
32. Find the false statement:
(A) In Modern Cryptography symmetric key algorithms use same key
both for Encryption and Decryption.
(B) The Symmetric cipher DES(Data Encryption Standard) was widely
used in the industry for security product.
(C) The AES(Advanced Encryption Standard) cryptosystem allows variable
Key lengths of size 56 bits and 124 bits.
(D)Public key algorithms use two different keys for Encryption and Decryption.
ANS-(C)
33. The message 11001001 is to be transmitted using the CRC
Polynomial x3+1 to protect it from errors. The message that should be
Transmitted is
(A) 110010011001
(B) 11001001
(C) 110010011001001
(D) 11001001011
ANS-(D)
34. _____________ comparisons are necessary in the worst case to
find both the maximum and minimum of n numbers.
(A) 2n-2
(B) n + floor(lg n) - 2
(C) floor(3n/2) - 2
(D)2 lg n – 2
ANS-(C)
35. Let A and B be two n x n matrices. The efficient algorithm to
Multiply the two matrices has the time complexity
(A) O(n3)
(B) O(n2.81)
(C) O(n2.67)
(D) O(n2)
ANS-(B)
36. The recurrence relation T(n)=mT(n/2)tan2 is satisfied by
(A) O(n2)
(B) O(nlg m)
(C) O(n2 lg n)
(D) O(n lg n)
ANS-(B)
This is wrong question.If in this question 'tan' is replaced by '+a'
then the solution is (B)
37. The longest common subsequence of the sequence
X=<A,B,C,B,D,A,B> and Y=<B,D,C,A,B,A> has length
(A) 2
(B) 3
(C) 4
(D) 5
ANS-(C)
38. Assuming there are n keys and each keys is in the range [0,m-1]
The run time of bucket sort is
(A) O(n)
(B) O(n lgn)
(C) O(n lgm)
(D) O(n+m)
ANS-(D)
39. A __________ complete subgraph and a________
subset of vertices of a graph G=(V,E) are a clique and a vertex
cover respectively.
(A) minimal, maximal
(B) minimal, minimal
(C) maximal, maximal
(D) maximal, minimal
ANS-(D)
40. Pumping lemma of the context-free languages states:
Let L be an infinite context free language . Then there exist some positive integer m such that w ξ L with |w|>=m can be decomposed as
w=uvxy Z with |vxy| ________________ and |vy| _______ such that uv2xy2 Z ξ L for all Z = 0,1,2,...
(A) <= m, <=1
(B) <=m, >= 1
(C) >=m, <=1
(D) >=m, >=1
Ans (B)
42. Given the following statements:
S1: Every context-sensitive language L is recursive.
S2: There exists a recursive language that is not context sensitive.
Which statement is correct?
(A) S1 is not correct and S2 is not correct.
(B) S1 is not correct and S2 is correct.
(C) S1 is correct and S2 is not correct.
(D) S1 is correct and S2 is correct.
ANS-(D)
42. Given the following statements:
S1: Every context-sensitive language L is recursive.
S2: There exists a recursive language that is not context sensitive.
Which statement is correct?
(A) S1 is not correct and S2 is not correct.
(B) S1 is not correct and S2 is correct.
(C) S1 is correct and S2 is not correct.
(D) S1 is correct and S2 is correct.
ANS-(D)
43. What is the bit rate for transmitting uncompressed 800x600 pixel color frames with 8 bits/pixel at 40 frames/second?
Ans. 153.6 Mbps
44. In IPv 4, the IP address 200.200.200.200 belongs to
(A) Class A
(B) Class B
(C) Class C
(D) Class D
ANS-(C)
45. Which layer of OSI reference model is responsible for decomposition of message and generation of sequence numbers to ensure correct re-composition from end to end the network?
(A) Physical
(B) Data-link
(C) Transport
(D) Application
ANS-(C)
46. A client-server system uses a satellite network, with the satellite at a height of 40,000 kms. What is the best-case delay in responses to a request? (Note that the speed of light in air is 3,00,000 km/second).
(A) 133.33 m sec
(B) 266.67 m sec
(C) 400.00 m sec
(D) 533.33 m sec
ANS-(D)
47. The start and stop bits are used in serial communication for
(A) error detection
(B) error correction
(C) synchronization
(D) slowing down the communication.
ANS-(C)
48. ______________ is a type of transmission impairment in which the signal looses strength due to the resistance of the transmission medium
(A) Attenuation
(B) Distortion
(C) Noise
(D) Decibel
ANS-(A)
49. Match the following:
List-I List-II
a. Indexed Addressing i. is not used when an operand is moved from memory into a register or from a register to memory.
b. Direct Addressing ii. Memory address is computed by adding up two registers plus an (optional) offset.
c. Register Addressing iii. Addressing memory by giving a register plus a content offset.
d. Base-Indexed Addressing iv. can only be used to access global variables whose address is known at compile time.
Codes:
a b c d
(A) ii i iv Iii
(B) ii iv i Iii
(C) iii iv i ii
(D) iii i iv ii
ANS-(C)
50. Which of the following is a design criteria for instruction formats?
(A) The size of instructions
(B) The numbers of bits in the address fields
(C) The sufficient space in the instruction format to express all the operations desired.
(D) All of these
ANS-(D)
51. Synchronization is achieved by a timing device called a ________ which generates a periodic train of _________.
(A) clock generator, clock pulse
(B) master generator, clock pulse
(C) generator, clock
(D) master clock generator, clock pulse
ANS-(D)
52. Serial access memories are useful in applications where
(A) Data consists of numbers
(B) Short access time is required.
(C) Each stored word is processed differently.
(D) None of these
ANS-(D)
53. What will be the output of the following logic diagram
(A) x OR y
(B) x AND y
(C) x NOR y
(D) x XNOR y
ANS-(C)
54. The essential difference between traps and interrupt is
(A) traps are asynchronous and interrupt are synchronous with the program
(B) traps are synchronous and interrupt are asynchronous with the program
(C) traps are synchronous and interrupt are asynchronous with the I/O devices.
(D) None of these.
ANS-(B)
55. Consider the following ER diagram
The minimum number of tables required to represents M,N,P,R1,R2 is
(A) 2
(B) 3
(C) 4
(D) 5
ANS-(A)
56. Consider the following schemas:
Branch = (Branch_name, Assets, Branch_city)
Customer = (Customer-name, Bank-name,Customer-city)
Borrow = (Branch-name, loan-number, customer-name, Balance)
Deposit = (Branch-name, Account-number, Customer-name, Balance)
Using relational Algebra, the query that finds customers who have balance
More than 10,000 is ________
(A) πcustomer-name(σbalance> 10000(Deposit))
(B) σcustomer-name(σbalance> 10000(Deposit))
(C) πcustomer-name(σbalance> 10000(Borrow))
(D)σcustomer-name(σbalance> 10000(Deposit))
ANS-(A)
57. Find the false statement:
(A) The relationship construct known as the weak relationship
type was defined by Dey, Storey & Barron (1999).
(B) A weak relationship occurs when two relationship types are
linked by either Event-Precedent sequence or Condition-Precedent
sequence
(C) Conceptual model is not accurate representation of
"Universe of interest".
(D) Ternary, Quaternary and Quintary relationships are shown
through a series of application scenario's and vignette's
ANS-(C)
58. Consider the table
Student(stuid, name, course, marks).
Which one of the following two queries is correct to find the
highest marks student in course 5?
Q.1. Select S.stuid
From student S
Where not exists
(select * from student e where
e course='5' and e marks >= s
marks)
Q.2. Select S.stu.id
From student S
Where s.marks> any
(select distinct marks from
student S where s.couse = 5)
(A) Q.1
(B) Q.2
(C) Both Q.1 and Q.2
(D) Neither Q.1 nor Q.2
ANS-(B)
59. Armstrong (1974) proposed systematic approach to derive
functional dependencies. Match the following w.r.t. functional dependencies.
Codes:
a b c d
(A) iii ii iv i
(B) i iii iv ii
(C) ii i iii iv
(D) iv iii i ii
ANS-(D)
60. Match the following
List I List II
(a) Secondary Index (i) Functional dependency
(b) Non-procedural Query (ii) B-tree
(c) Closure set Attribute (iii) Relational Algebraic Operation
(d) Natural Join (iv) Domain Calculus
Codes:
(a) (b) (c) (d)
(A) i ii iv iii
(B) ii i iv iii
(C) i iii iv ii
(D) ii iv i iii
ANS-(D)
61. Which of the following is not true with respect to a trackball and/or spaceball
I. A trackball is a two dimensional positioning device while as a spaceball provides six degree of freedom
II. Unlike the trackball a spaceball does not actually move.
III. A trackball is a three dimensional positioning device while as a spaceball provides six degree of freedom.
(A) I &II
(B) II & III
(C) II only
(D) III only
ANS-(D)
62. Which of the following statement(s) is(are) true?
I. Two successive translations are additive.
II. Two successive rotations are additive.
III. Two successive scaling operations multiplicative.
(A) I and II
(B) I and III
(C) II and III
(D) All of above.
ANS-(D)
63. Given below are three basic rules:
I. Squash and Stretch
II. Slow-in and Slow out
III. To stage the action properly
These rules are applied in case of
(A) Rendering
(B) Morphing
(C) Animation
(D) All of above
ANS-(C)
64. Which of the following points lies on the same side as the origin, with reference to the line
3x+7y=2 ?
(A) (3,0)
(B) (1,0)
(C) (0.5,0.5)
(D) (0.5,0)
ANS-(D)
Put the value of x and y in the equation 3x+7y
if 3x+7y <2 then it lies on the same side of origin
else if 3x+7y > 2 it does not lies on the same side of origin
65. The transformation matrix required for conversion of CMY color model to RGB color model is given as
ANS- (C)
66. What step shall be required to rotate an object about the point P1 and its placement such that what was at P1 is now reduced and is at P2.
I. Translate P1 to origin
II. Scale as required
III. Rotate
IV. Translate to the final position P2.
(A) I,II and III
(B) II,III and IV
(C) I,III and IV
(D) All of the above
ANS-(D)
67. In Unix, how do you check that two given strings a and b are equal
(A) test $a -eq $b
(B) test $a -equal $b
(C) test $a=$b
(D) sh -C test $a==$b
ANS-(C)
68. In windows 2000 operating system all the processor-dependent code is isolated in a dynamic link library called
(A) NTFS file system
(B) Hardware Abstraction layer
(C) Microkernel
(D) Process Manager
ANS-(B)
69. To place a sound into a word document, following feature of windows is used
(A) Clip board
(B) Task switching
(C) C Win App
(D) OLE
ANS-(D)
70. Translation Look-aside Buffer(TLB) is
(A) a cache-memory in which item to be searched is compared
one-by-one with the keys.
(B) a cache-memory in which item to be searched is compared
with all the keys simultaneously.
(C) an associative memory in which item to be searched is compared
one-by-one with the keys.
(D) an associative memory in which item to be searched is compared
with all the keys simultaneously.
ANS-(D)
71. Simplest way of deadlock recovery is
(A) Roll back
(B) Preempt resource
(C) Lock one of these processes
(D) Kill one of the processes
ANS-(D)
72. The directory structure used in Unix file system is called
(A) Hierarchical directory
(B) Tree structure directory
(C) Directed acyclic graph
(D) Graph structured directory
ANS-(C)
73. Which statement is not true about process 0 in the Unix operating system?
(A) Process 0 is called init process.
(B) Process 0 is not created by fork system call.
(C) After forking process 1, process 0 becomes swapper process.
(D) Process 0 is a special process created when system boots.
ANS-(A)
74. Which one of the following commands would return process_id of sleep command?
(A) Sleep 1 and echo $?
(B) Sleep 1 and echo $#
(C) Sleep 1 and echo $x
(D) Sleep 1 and echo $!
ANS-(D)
75. Possible thread states in Windows 2000 operating system include:
(A) Ready,running and waiting
(B) Ready, standby, running, waiting, transition and terminated.
(C) Ready, running, waiting, transition and terminated
(D) Standby, running, transition and terminated.
ANS-(B)
1. A 2MB PCM(pulse code
modulation) has
a) 32 channels
b) 30 voice channels & 1
signaling channel.
c) 31 voice channels & 1
signaling channel.
d) 32 channels out of which 30
voice channels, 1 signaling channel,
& 1 Synchronization channel.
Ans: (c)
2. Time taken for 1 satellite hop
in voice communication is
a) 1/2 second
b) 1 seconds
c) 4 seconds
d) 2 seconds
Ans: (a)
3. Max number of satellite hops
allowed in voice communication is :
a) only one
b) more than one
c) two hops
d) four hops
Ans: (c)
4. What is the max.decimal number
that can be accommodate in a byte.
a) 128
b) 256
c) 255
d) 512
Ans: (c)
5. Conditional results after
execution of an instruction in a micro processor
is stored in
a) register
b) accumulator
c) flag register
d) flag register part of
PSW(Program Status Word)
Ans: (d)
6. Frequency at which VOICE is
sampled is
a) 4 Khz
b) 8 Khz
c) 16 Khz
d) 64 Khz
Ans: (a)
7. Line of Sight is
a) Straight Line
b) Parabolic
c) Tx& Rx should be visible
to each other
d) none
Ans: (c)
8. Purpose of PC (Program
Counter) in a Micro Processor is
a) To store address of TOS (Top
of Stack)
b) To store address of next
instruction to be executed.
c) Count the number of
instructions.
d) To store base address of the
stack.
Ans: (b)
9. What action is taken when the
processor under execution is interrupted by
a non-mask able interrupt?
a) Processor serves the interrupt
request after completing the execution of the
current instruction.
b) Processor serves the interrupt
request after completing the current task.
c) Processor serves the interrupt
request immediately.
d) Processor serving the interrupt
request depends upon the priority of the current
task under execution.
Ans: (a)
10. The status of the Kernel is
a) task
b) process
c) not defined.
d) None of the above.
Ans: (b)
11. To send a data packet using
datagram, connection will be established
a) before data transmission.
b) Connection is not established
before data transmission.
c) No connection is required.
d) None of the above.
Ans: (c)
12. Word alignment is
a) aligning the address to the
next word boundary of the machine.
b) Aligning to even boundary.
c) Aligning to word boundary.
d) None of the above.
Ans: (a)
13. When a 'C' function call is
made, the order in which parameters passed to the function are pushed into the
stack is
a) left to right
b) right to left
c) bigger variables are moved
first than the smaller variables.
d) Smaller variables are moved
first than the bigger ones.
e) None of the above.
Ans: (b)
14. What is the type of signaling
used between two exchanges?
a) inband
b) common channel signaling
c) any of the above
d) none of the above.
Ans: (a)
15.Buffering is
a) the process of temporarily
storing the data to allow for small variation in device speeds
b) a method to reduce cross talks
c) storage of data within
transmitting medium until the receiver is ready
to receive.
d) a method to reduce routing
overhead.
Ans: (a)
16. Memory allocation of
variables declared in a program is
a) allocated in RAM.
b) Allocated in ROM.
c) allocated on stack.
d) Assigned to registers.
Ans: (c)
17. A software that allows a
personal computer to pretend as a computer terminal is
a) terminal adapter
b) bulletin board
c) modem
d) terminal emulation
Ans: (d)
18. Find the output of the
following program
int *p,*q;
p=(int *)1000;
q=(int *)2000;
printf("%d",(q-p));
Ans: 500
19. Which addressing mode is used
in the following statements:
(a) MVI B, 55
(b) MOV B,A
(c) MOV M,A
Ans. (a) immediate addressing
mode.
(b) Register Addressing Mode
(c) Direct addressing mode
20. RS-232C standard is used in
_____________.
Ans. Serial I/O
21. Memory. Management in
Operating Systems is done by
a) Memory Management Unit
b) Memory management software of
the Operating System
c) Kernel
Ans: (b)
22. What is done for a Push
operation?
Ans: SP is decremented and then
the value is stored.
23. Binary equivalent of 52
Ans. 110100
24. Hexadecimal equivalent of 3452
Ans. 72A
25. Explain Just In Time Concept?
Ans. Elimination of waste by purchasing
manufacturing exactly when needed
26. A good way of unit testing
s/w program is
Ans. User test
27. OOT uses
Ans. Encapsulated of detect methods
28.EDI useful in
Ans. Electronic Transmission
29. MRPII different from MRP
Ans. Modular version of man redundant initials
30. Hard disk time for R/W head
to move to correct sector
Ans. Latency Time
31. The percentage of times a
page number bound in associate register is called
Ans. Bit ratio
32. Expand MODEM
Ans. Modulator and Demodulator
33. RDBMS file system can be
defined as
Ans. Interrelated
34. Super Key is
Ans. Primary key and Attribute
35. Windows 95 supports
(a) Multi-user
(b) n tasks
(c) Both
(d) None
Ans. (a)
36.In the command scanf, h is used for
Ans. Short int
37.A process is defined as
Ans. Program in execution
38.A thread is
Ans. Detachable unit of
executable code)
39.What is the advantage of Win
NT over Win 95
Ans. Robust and secure
40.How is memory management done
in Win95
Ans. Through paging and
segmentation
41.What is meant by polymorphism
Ans. Redefinition of a base class
method in a derived class
42.What is the essential feature
of inheritance
Ans. All properties of existing
class are derived
43.What does the protocol FTP do
Ans. Transfer a file b/w stations
with user authentication
44.In the transport layer ,TCP is
what type of protocol
Ans. Connection oriented
45.Why is a gateway used
Ans. To connect incompatible
networks
46.How is linked list implemented
Ans. By referential structures
47.What method is used in Win95
in multitasking
Ans. Non preemptive check
48.What is a semaphore
Ans. A method synchronization of
multiple processes
49.What is the precedence order
from high to low ,of the symbols ( ) ++ /
Ans.( ) , ++, /
50.Preorder of A*(B+C)/D-G
Ans.*+ABC/-DG
51.What is the efficiency of
merge sort
Ans. O(n log n)
52.In which layer are routers
used
Ans.In network layer
53.Which of the following sorting
algorithm has average sorting behavior -- Bubble
sort,mergesort,heapsort,exchange sort
Ans. Heap sort
54.In binary search tree which
traversal is used for getting ascending order values--Inorder
,postorder,preorder
Ans.Inorder
55.What are device drivers used
for
Ans.To provide software for
enabling the hardware
56.What is fork command in unix
Ans. System call used to create process
57.What is make command in unix
Ans. Used for creation of more than one file
58.Inunix .profile contains
Ans. Start up program
59.Inunix 'ls 'stores contents in
Ans.inode block
60. Which of the following involves context
switch,
(a) system call
(b) priviliged instruction
(c) floatingpoitnt exception
(d) all the above
(e) none of the above
Ans: (a)
61. In OST, terminal emulation is
done in
(a) sessions layer
(b) application layer
(c) presentation layer
(d) transport layer
Ans: (b)
62. For 1 MB memory, the number of address lines required,
(a)11
(b)16
(c)22
(d) 24
Ans. (b)
63. Semaphore is used for
(a) synchronization
(b) dead-lock avoidence
(c) box
(d) none
Ans. (a)
64. Which holds true for the
following statement
class c: public A, public B
a) 2 member in class A, B should
not have same name
b) 2 member in class A, C should
not have same name
c) both
d) none
Ans. (a)
65.Preprocessor.. does not do
which one of the following
(a) macro
(b) conditional complication
(c) in type checking
(d) including load file
Ans. (c)
66. Piggy backing is a technique
for
a) Flow control
b) Sequence
c) Acknowledgement
d) retransmission
Ans. (c)
67. Which is not a memory
management scheme?
a) buddy system
b) swapping
c) monitors
d) paging
Ans : c
68. There was a circuit given
using three NAND gates with two inputs and one output.
Find the output.
a) OR
b) AND
c) XOR
d) NOT
Ans. (a)
69.I integrated check value(ICV)
are used as:
Ans. The client computes the ICV
and then compares it with the senders value.
70. When applets are downloaded
from web sites , a byte verifier performs _________?
Ans. Status check.
71. An IP/IPX packet received by
a computer using... having IP/IPX both
how the packet is handled.
Ans. Read the, field in the
packet header with to send IP or IPX protocol.
72. The UNIX shell ....
a) does not come with the rest of
the system
b) forms the interface between
the user and the kernal
c) does not give any scope for
programming
d) deos not allow calling one
program from with in another
e) all of the above
Ans. (b)
73. In UNIX a files i-node
......?
Ans. Is a data structure that
defines all specifications of a file like the file size,
number of lines to a file,
permissions etc.
74. The very first process
created by the kernel that runs till the kernel
process is halts is
a) init
b) getty
c) both (a) and (b)
d) none of these
Ans. (a)
75. In the process table entry
for the kernel process, the process id value is
(a) 0
(b) 1
(c) 2
(d) 255
(e) it does not have a process
table entry
Ans. (a)
76. Which of the following API is
used to hide a window
a) ShowWindow
b) EnableWindow
c) MoveWindow
d) SetWindowPlacement
e) None of the above
Ans. (a)
77. Which function is the entry
point for a DLL in MS Windows 3.1
a) Main
b) Winmain
c) Dllmain
d) Libmain
e) None
Ans. (b)
78. The standard source for
standard input, standard output and standard error is
a) the terminal
b) /dev/null
c) /usr/you/input,
/usr/you/output/, /usr/you/error respectively
d) None
Ans. (a)
79. The redirection operators
> and >>
a) do the same function
b) differ : > overwrites,
while >> appends
c) differ : > is used for
input while >> is used for output
d) differ : > write to any
file while >> write only to standard output
e) None of these
Ans. (b)
80. The command grep first second
third /usr/you/myfile
a) prints lines containing the
words first, second or third from the
file /usr/you/myfile
b) searches for lines containing
the pattern first in the files
second, third, and
/usr/you/myfile and prints them
c) searches the files
/usr/you/myfiel and third for lines containing the
words first or second and prints
them
d) replaces the word first with
the word second in the files third
and /usr/you/myfile
e) None of the above
Ans. (b)
81. You are creating a Index on
EMPNO column in the EMPLOYEE table.
Which statement will you use?
a) CREATE INdEXemp_empno_idx ON
employee, empno;
b) CREATE INdEXemp_empno_idx FOR
employee, empno;
c) CREATE INdEXemp_empno_idx ON
employee(empno);
d) CREATE emp_empno_idxINdEX ON
employee(empno);
Ans. c
82. Which program construct must
return a value?
a) Package
b) Function
c) Anonymous block
d) Stored Procedure
e) Application Procedure
Ans. b
83. Which Statement would you use
to remove the EMPLOYEE_Id_PK PRIMARY KEY
constraint and all depending
constraints fromthe EMPLOYEE table?
a) ALTER TABLE employee dROP
PRIMARY KEY CASCAdE;
b) ALTER TABLE employee dELETE
PRIMARY KEY CASCAdE;
c) MOdIFY TABLE employee dROP
CONSTRAINT employee_id_pkCASCAdE;
d) ALTER TABLE employee dROP
PRIMARY KEY employee_id_pkCASCAdE;
e) MOdIFY TABLE employee dELETE
PRIMARY KEY employee_id_pkCASCAdE;
Ans. a
84. Which three commands cause a
transaction to end? (Chosse three)
a) ALTER
b) GRANT
c) DELETE
d) INSERT
e) UPdATE
f) ROLLBACK
Ans. a ,b ,f
85. Under which circumstance
should you create an index on a table?
a) The table is small.
b) The table is updated
frequently.
c) A columns values are static
and contain a narrow range of values
d) Two columns are consistently
used in the WHERE clause join condition of SELECT
statements.
Ans.d
86. What was the first name given
to Java Programming Language.
a) Oak - Java
b) Small Talk
c) Oak
d) None
Ans.a
INDIA
|
|
January
9
|
PravasiyaBharatiya
Divas
|
January
12
|
National
Youth Day
|
January
15
|
Army
Day
|
January
25
|
Tourism
Day
|
January
26
|
Republic
Day
|
January
30
|
Martyrs'
Day
|
February
28
|
National
Science Day
|
March 3
|
National
Defence Day
|
March 4
|
National
Security Day
|
March
16
|
National
Vaccination Day
|
April 5
|
National
Maritime Day
|
May 11
|
National
Technology Day
|
July 26
|
Kargil
Victory Day
|
August
9
|
Quit
India Day
|
August
15
|
Independence
Day
|
August
20
|
Sadbhavna
Divas
|
August
29
|
National
Sports Day
|
September
5
|
Teachers'
Day; Sanskrit Day
|
October
2
|
Gandhi
Jayanthi
|
October
8
|
Indian
Air Force Day
|
October
10
|
National
Postal Day
|
November
14
|
Children’s
Day
|
November
26
|
Law Day
|
December
4
|
Navy
Day
|
December
7
|
Flag
Day
|
December
18
|
Minorities
Rights Day
|
December
14
|
National
Energy Conservation Day
|
December
23
|
Farmers
Day
|
INTERNATIONAL
|
|
January
10
|
World
Laughter Day
|
January
26
|
International
Customs Day
|
January
30
|
World
Leprosy Eradication Day
|
March 8
|
International
Women’s Day; International Literacy Day
|
March
15
|
World
Disabled Day; World Consumer Rights Day
|
March
19
|
World
Disabled Day
|
March
21
|
World
Forestry Day; International Day for the Elimination of Racial Discrimination.
|
March
22
|
World
Day for Water
|
March
23
|
World
Meteorological Day
|
March
24
|
World
TB Day
|
April 7
|
World
Health Day
|
April
17
|
World
Haemophilia Day
|
April
18
|
World
Heritage Day
|
April
22
|
Earth
Day
|
April
23
|
World
Book and Copyright Day
|
May 1
|
International
Labour Day
|
May 3
|
Press
Freedom Day, International Energy Day
|
May 8
|
World
Red Cross Day
|
May 12
|
International
Nurses Day
|
May 15
|
International
Day of the Family
|
May 17
|
World
Telecom Day
|
May 24
|
Commonwealth
Day
|
May 31
|
Anti-tobacco
Day
|
June 5
|
World
Environment Day
|
July 1
|
Doctor's
Day
|
July 11
|
World
Population Day
|
August
6
|
Hiroshima
Day
|
August
9
|
Nagasaki
Day
|
August
12
|
International
Youth Day
|
August
19
|
World
Photography Day
|
September
8
|
World
Literary Day
|
September
15
|
International
Day of Democracy
|
September
16
|
World
Ozone Day
|
September
26
|
Day of
the Deaf
|
September
27
|
World
Tourism Day
|
October
1
|
International
Day for the Elderly
|
October
2
|
International
Non-violence Day; World Wetlands Day
|
October
3
|
World
Habitat Day
|
October
4
|
World
Animal Welfare Day
|
October
9
|
World
Postal Day
|
October
10
|
World
Mental Health Day
|
October
12
|
World Sight
Day
|
October
16
|
World
Food Day
|
October
17
|
International
Poverty Eradication Day
|
October
24
|
United
Nations Day
|
October
30
|
World
Thrift Day
|
November
14
|
Diabetes
Day
|
December
1
|
World
AIDS Day
|
December
10
|
Human
Rights Day
|
December
11
|
UNICEF
Day
|
1.‘www’ stands for - world wide
web
2.A hard disk is divided into tracks which is further subdivided into - Sectors
3.A computer program that translates a program statement by statement into
machine language is called a/an
- Interpreter
4.A Gigabyte is equal to - 1024 Megabytes
5.A Compiler is a software which converts - high level language to machine
language
6.Virtual memory is - an illusion of extremely large main memory
7.The phrase ‘tragedy of commons’ is -in the context of degradation of
renewable free access resources
8.Kyoto Protocol is related to - Climate change
9.Which of the following is a source of emissions leading to the eventual
formation of surface ozone as a pollutant ?
(A) Transport sector
10.The smog in cities in India mainly consists of -Oxides of nitrogen and
unburnt hydrocarbons
11.Which of the following types of natural hazards have the highest potential
to cause damage to humans ?
(A) Droughts and Floods
12.The percentage share of renewable energy sources in the power production in
India is around
(A) 10-12%
13.In which of the following categories the enrolment of students in higher
education in 2010-11 was beyond the percentage of seats reserved ?
(A) OBC students
14. Which one of the following statements is not correct about the University
Grants Commission (UGC) ?
(A) It receives funds from State Governments in respect of State Universities.
15. Consider the statement which is followed by two arguments (I) and (II) :
Statement : Should India switch over to a two party system ?
Arguments : (I) Yes, it will lead to stability of Government.
(II) No, it will limit the choice of voters.
(A) Both the arguments are strong.
16.Consider the statement which is followed by two arguments (I) and (II) :
Statement : Should persons with criminal background be banned from contesting
elections ?
Arguments : (I) Yes, it will decriminalise politics.
(II) No, it will encourage the ruling party to file frivolous cases against
their political opponents.
(A) Only argument (I) is strong.
17.. Which of the following statement(s) is/are correct about a Judge of the
Supreme Court of India ?
1. A Judge of the Supreme Court is appointed by the President of India.
2. He holds office during the pleasure of the President.
3. He can be suspended, pending an inquiry.
4. He can be removed for proven misbehaviour or incapacity.
Select the correct answer from the codes given below :
Codes :
(A) 1 and 4
18. In the warrant of precedence, the Speaker of the LokSabha comes next
only to
(A) The Prime Minister
19.The black-board can be utilised best by a teacher for
(A) writing the important and notable points
20. Nowadays the most effective mode of learning is
(A) e-learning & blended learning
21.At the primary school stage, most of the teachers should be women because
they
(A) can deal with children with love and affection
22.Which one is the highest order of learning ?
(A) Conditioned-reflex learning
23.A person can enjoy teaching as a profession when he
(A) commands respect from students
24. “A diagram speaks more than 1000 words.”The statement means that the
teacher should
(A) use teaching aids in the class
25.A research paper
(A) contains peer-reviewed original research or evaluation of research
conducted by others
26.Which one of the following belongs to the category of good ‘research ethics’
?
(A) Conducting a review of the literature that acknowledges the contributions
of other people in the relevant field or relevant prior work.
27.Which of the following sampling methods is not based on probability ?
(A) Quota Sampling
28.Which one of the following references is written as per Modern Language Association
(MLA) format ?
(A) Hall, Donald. Fundamentals of Electronics.
New Delhi : Prentice Hall of India, 2005
29.A workshop is
(A) a brief intensive course for a small group emphasizing the
development of a skill or technique for solving a specific problem.
30.A working hypothesis is
(A) a provisionally accepted hypothesis for further research.
31.Read the following passage carefully and answer the questions (31 to 36) :
The TajMahal has become one of the world’s best known monuments. This domed
white
marble structure is situated on a high plinth at the southern end of a
four-quartered garden,
evoking the gardens of paradise, enclosed within walls measuring 305 by 549
metres. Outside
the walls, in an area known as Mumtazabad, were living quarters for attendants,
markets, serais
and other structures built by local merchants and nobles. The tomb complex and
the other
imperial structures of Mumtazabad were maintained by the income of thirty
villages given
specifically for the tomb’s support. The name TajMahal is unknown in Mughal
chronicles, but
it is used by contemporary Europeans in India, suggesting that this was the
tomb’s popular
name. In contemporary texts, it is generally called simply the Illuminated Tomb
(Rauza-i-
Munavvara).
MumtazMahal died shortly after delivering her fourteenth child in 1631. The
Mughal
court was then residing in Burhanpur. Her remains were temporarily buried by
the grief-
stricken emperor in a spacious garden known as Zainabad on the bank of the
river Tapti. Six
months later her body was transported to Agra, where it was interred in land
chosen for the
mausoleum. This land, situated south of the Mughal city on the bank of the
Jamuna, had
belonged to the Kachhwaha rajas since the time of Raja Man Singh and was
purchased from
the then current raja, Jai Singh. Although contemporary chronicles indicate Jai
Singh’s willing
cooperation in this exchange, extant farmans (imperial commands) indicate that
the final price
was not settled until almost two years after the mausoleum’s commencement. Jai
Singh’s
further cooperation was insured by imperial orders issued between 1632 and 1637
demanding
that he provide stone masons and carts to transport marble from the mines at
Makrana, within
his “ancestral domain”, to Agra where both the TajMahal and Shah Jahan’s
additions to the
Agra fort were constructed concurrently.
Work on the mausoleum was commenced early in 1632. Inscriptional evidence
indicates
much of the tomb was completed by 1636. By 1643, when Shah Jahan most lavishly
celebrated
the ‘Urs ceremony for MumtazMahal’, the entire complex was virtually complete.
------------------------------------------------------------------------------------------------
31. Marble stone used for the construction of the TajMahal was brought from the
ancestral
domain of Raja Jai Singh. The name of the place where mines of marble is
(A) Makrana.
32.The popular name TajMahal was given by
(A) European travellers.
33.Point out the true statement from the following :
(A) The TajMahal is surrounded by a four-quartered garden known as ChahrBagh.
34.In the contemporary texts the TajMahal is known
(A) Rauza-i-Munavvara
35.The construction of the TajMahal was completed between the period
(A) 1632 – 1643 A.D.
36.The documents indicating the ownership of land, where the TajMahal was
built, known as
(A) Farman
---------------------------------------------------------------------------------------------
37.In the process of communication, which one of the following is in the
chronological order ?
(A) Communicator, Message, Medium, Receiver, Effect
38.Bengal Gazette, the first Newspaper in India was started in 1780 by
(A) James Augustus Hicky
39.Press censorship in India was imposed during the tenure of the Prime
Minister
(A) Indira Gandhi
40.Communication via New media such as computers, teleshopping, internet and
mobile telephony is termed as
(A)) Interactive communication
41.Classroom communication of teacher rests on the principle of
(A)) Edutainment
42.________ is important when a teacher communicates with his/her student.
(A) Empathy
43.In a certain code GALIB is represented by HBMJC. TIGER will be represented
by
(A) UJHFS
44.In a certain cricket tournament 45 matches were played. Each team played
once against each of the other
teams. The number of teams participated in the tournament is
(A) 10
45.The missing number in the series 40, 120, 60, 180, 90, ?, 135 is
(A) 270 (40x3=120, 120/2=60, 60x3=180, 180/2=90, 90x3=270, 270/2=135)
46.The odd numbers from 1 to 45 which are exactly divisible by 3 are arranged
in an ascending order. The number at 6th position is
(A) 33
47. The mean of four numbers a, b, c, d is 100. If c = 70, then the mean of the
remaining numbers is
(A) 110
48.If the radius of a circle is increased by 50%, the perimeter of the circle
will increase by
(A) 50%
49.If the statement ‘some men are honest’ is false, which among the following
statements will be true.
Choose the correct code given below :
(i) All men are honest.
(ii) No men are honest.
(iii) Some men are not honest.
(iv) All men are dishonest.
Codes :
(A) (ii), (iii) and (iv)
50.Choose the proper alternative given in the codes to replace the question
mark.
Bee – Honey, Cow – Milk, Teacher – ?
(A) Wisdom
51.P is the father of R and S is the son of Q and T is the brother of P. If R
is the sister of S, how is Q related to T ?
(A) Sister-in-law
52.A definition put forward to resolve a dispute by influencing attitudes or
stirring emotions is called
(A)Persuasive
53.Which of the codes given below contains only the correct statements ?
Statements :
(i) Venn diagram is a clear methodof notation.
(ii) Venn diagram is the most directmethod of testing the validity of
categorical syllogisms.
(iii) In Venn diagram method the premises and the conclusion of a categorical
syllogism is diagrammed.
(iv) In Venn diagram method the three overlapping circles are drawn for testing
a categorical syllogism.
Codes :
(A) (i), (ii) & (iv)
54.Inductive reasoning presupposes
(A) uniformity in human nature
UGC NET june-13 PAPER-III
1.The Software Maturity Index
(SMI) is defined as SMI = [Mf – (Fa + Fc + Fd)] / M Where Mf = the number of
modules in the current release. Fa = the number of modules in the current
release that have been added. Fc = the number of modules in the current release
that have been changed. Fd = the number of modules in the current release that
have been deleted. The product begins to stabilize when
(A) SMI approaches 1
2.Match the following :
(A)
a. Watson-Felix model - Cost estimation
b. Quick-Fix model - Maintenence
c.Putnam resource allocation model-Project planning
d.Logarithmetic-Poisson Model - Failure intensity
3.__________ is a process model that removes defects before they can
precipitate serious hazards.
(A) Cleanroom software engineering
4.Equivalence partitioning is a __________ method that divides the input domain
of a program into classes of data from which test cases can be derived.
(A) Black-box testing
5.The following three golden rules :
(i) Place the user in control
(ii) Reduce the user’s memory load
(iii) Make the interface consistent are for
(A) Good interface design
6.Software safety is a __________ activity that focuses on the identification
and assessment of potential hazards that may affect software negatively and
cause an entire system to fail.
(A) Software quality assurance
7.The “PROJECT” operator of a relational algebra creates a new table that has
always
(A) Same number of rows as the original table
8.The employee information of an Organization is stored in the relation :
Employee (name, sex, salary,deptname) Consider the following SQL query
Select deptname from Employee Where sex = ‘M’
group by deptname
having avg (salary) > {select avg (salary) from Employee}
Output of the given query corresponds to
(A) Average salary of male employees in a department is more than average
salary of the organization.
9.For a database relation R(a, b, c, d) where the domains of a, b, c, d include
only the atomic values. The functional dependency a → c, b → d holds in the
following relation
(A) In 1NF not in 2NF
10. Match the following :
a. RAID 0 i. Bit interleaved parity
b. RAID 1 ii. Non redundant stripping
c. RAID 2 iii. Mirrored disks
d. RAID 3 iv. Error correcting codes
11.The golden ratio φ and its conjugate– φ both satisfy the equation
(A) x2 – x – 1 = 0
12.The solution of recurrence relation, T(n) = 2T(floor ( n)) + logn is
(A) O(logn log logn)
13.In any n-element heap, the number of nodes of height h is
(A) less than equal to n/[2to the power of h + 1]
14.A data file of 1,00,000 characters
contains only the characters g-l, with
the frequencies as indicated in table :
g
h i j k l
Frequency 45 13 12 16 9 5
in thousand using the variable-length code by Huffman codes, the file can be
encoded with
(A) 2,24,000 bits
15.A vertex cover of an undirected graph G(V, E) is a subset V1 ⊆ V vertices such that
(A) If (u, v) ∈ E then u ∈ V1 or v ∈ V1
16.In a fully connected mesh network with n devices, there are ________
physical channels to link all devices.
(A) n(n–1)/2
17.The baud rate of a signal is 600 baud/second. If each signal unit carries 6
bits, then the bit rate of a signal is ________.
(A) 3600
18. Match the following :
(A)
a. Data link
-Node to node delivery
b. Network layer -Routing layer
c. Transport layer -Flow layer control
d. Application
-Mail services
19.An image is 1024∗800 pixels with 3 bytes/pixel. Assume
the image is uncompressed. How long does it take to transmit it over a 10-Mbps
Ethernet ?
(A) 1.966 seconds
20.The ________ measures the relative strengths of two signals or a signal at
two different points.
(A) decibel
21.Which one of the following media is multidrop ?
(A) Thick Coaxial cable
22.What is the baud rate of the standard 10 Mbps Ethernet ?
(A) 20 megabaud
23.At any iteration of simplex method, if Δj (Zj – Cj) corresponding to
any non-basic variable Xj is obtained as zero, the solution
under the test is
(A) Alternative solution
24.A basic feasible solution to a m-origin, n-destination transportation
problem is said to be _________ if the number of positive allocations are less
than m + n – 1.
(A) degenerate
25.he total transportation cost in an initial basic feasible solution to the
following transportation problem using Vogel’s Approximation method is
W1
W2 W3
W4 W5
Supply
F1 4
2 3
2
6 8
F2 5
4
5 2
1 12
F3 6
5 4
7 3
14
Demand 4
4 6
8 8
(A) 80
26.An actor in an animation is a small program invoked _______ per frame to
determine the characteristics of some object in the animation.
(A) once
27.Bresenham line drawing algorithm is attractive because it uses
(A) Integer arithmetic only
28.The refresh rate above which a picture stops flickering and fuses into a
steady image is called _________.
(A) Critical fusion frequency
29.In homogenous coordinate system (x, y, z) the points with z = 0 are called
(A) Point at infinity
30.If 40 black lines interleaved with 40 white lines can be distinguished
across one inch, the resolution is
(A) 40 line-pairs per inch
31.Images tend to be very large collection of data. The size of memory required
for a 1024 by 1024 image in which the colour of each pixel is represented by a
n-bit number, (in an 8 bit machines) is
(A) n / 8 MB
32.Arrays in C language can have _________ with reference to memory
representation.
(A)only one subscript
33.Refer the points as listed below :
(a) What are the precedence rules ?
(b) What are the associativity rules ?
(c) What is the order of operand evaluation ?
(d) Are there restrictions on operand evaluation side effects ?
Which of the above must be considered as primary design issues for arithmetic
expressions ?
(A) (a), (b), (c) and (d)
34.Horn clauses are special kinds of propositions which can be described as
(A) A single atomic proposition on left side or an empty left side.
35.Which of the following is/are the fundamental semantic model(s) of parameter
passing ?
(A) all of the above
36.The grammar with production rules S → aSb |SS|λ generates language L given
by :
(A) L = {w∈{a, b}* | na(w) = nb(w)and na(v) ≥ nb(v) where v is any prefix of w}
37.A pushdown automation M = (Q, Σ,Γ, δ, q0, z, F) is set to be deterministic
subject to which of the following condition(s), for every q ∈ Q, a ∈ Σ ∪ {λ} and b ∈ Γ
(s1) δ(q, a, b) contains at most one element
(s2) if δ(q, λ, b) is not empty then δ(q, c, b) must be empty for every c∈Σ
(A) Both s1 and s2
38.For every context free grammar (G) there exists an algorithm that passes any
w ∈ L(G) in number of steps proportional to
(A) |w|3
39.Match the following :
(A)
a. Context sensitive language - Recursive language
b. Regular grammar
- Deterministic finite automation
c. Context free grammar - Pushdown
automation
d. Unrestricted grammar - Recursive
enumerable
40.The statements s1 and s2 are given as :
s1 : Context sensitive languages are closed under intersection, concatenation,
substitution and inverse homomorphism.
s2 : Context free languages are closed under complementation, substitution and
homomorphism.
Which of the following is correct statement ?
(A) s1 is correct and s2 is not correct.
41.Which one of the following is not an addressing mode ?
(A) Relative indexed
42.Computers can have instruction formats with
(A) zero address, one address, two address and three address instructions
43.Which is not a typical program control instruction ?
(A) SHL
44.Interrupt which arises from illegal orerroneous use of an instruction or
data is
(A) Internal interrupt
45.The simplified function in product of sums of Boolean function F(W, X, Y, Z)
= Σ(0, 1, 2, 5, 8, 9, 10) is
(A) (W' + X') (Y' + Z') (X' + Z)
46.Match the following :
(A)
a. TTL -Evolution of
“diode-transistor-logic”
b. ECL -High speed digital
circuits
c. MOS -High component
density
d. CMOS -Low power
consumption
47.Match the following :
(A)
a. Foreign keys
-Referential integrity
b. Private key
-Domain constraint
c. Event control action model -Trigger
d. Data security
-Encryption
48.When an array is passed as a parameter to a function which of the following
statements is correct ?
(A) The function can change values in the original array.
49.Suppose you want to delete the name that occurs before “Vivek” in an
alphabetical listing. Which of the following data structures shall be most
efficient for this operation ?
(A) Doubly linked list
50.What will be the output of the
following segment of the program ?
main()
{
char *s = “hello world”;
int i = 7;
printf(“%, *s”, i, s);
}
(A)%, *s
51.Trace the error :
void main( )
{
int *b, &a;
*b = 20
printf(“%d, %d”, a, *b)
}
(A) Syntax error
52.Match the following :
a. calloc( ) -Allocates space for array
b. free( ) -Frees previously allocated
space
c. malloc( ) -Allocates requested size of space
d. realloc( ) -Modifies previously allocated space
53.Binary symmetric channel uses
(A) Half duplex protocol
54.Hamming distance between 100101000110 and 110111101101 is
(A) 6
55.Given code word 1110001010 is to be transmitted with even parity check bit.
The encoded word to be transmitted for this code is
(A) 11100010101
56.The number of distinct binary images which can be generated from a given
binary image of right M × N are
(A) 2to the power of MN
57.If f(x, y) is a digital image, then x, y and amplitude values of f are
(A) Finite
58.Consider the following processes with time slice of 4 milliseconds (I/O
requests are ignored) :
Process A
B
C D
Arrival time 0
1 2 3
CPU cycle
8 4
9 5
The average turn around time of these processes will be
(A) 18.25 milliseconds
59.A job has four pages A, B, C, D and the main memory has two page frames
only. The job needs to process its pages in following order :
ABACABDBACD
Assuming that a page interrupt occurs when a new page is brought in the main
memory, irrespective of whether the page is swapped out or not. The number of
page interrupts in FIFO and LRU page replacement algorithms are
(A) 9 and 8
60.Suppose S and Q are two semaphores
initialized to 1. P1 and P2 are two
processes which are sharing resources.
P1 has statements P2 has statements
wait(S) ; wait(Q) ;
wait(Q) ; wait(S) ;
critical- critical-
section 1; section 2;
signal(S) ; signal(Q) ;
signal(Q) ; signal(S) ;
Their execution may sometimes lead
to an undesirable situation called
(A) Deadlock
61.An operating system using banker’s algorithm for deadlock avoidance has ten
dedicated devices (of same type) and has three processes P1, P2 and P3 with
maximum resource requirements of 4, 5 and 8 respectively. There are two states
of allocation of devices as follows :
State 1 Processes P1 P2 P3
Devices
allocated 2
3 4
State 2 Processes P1 P2 P3
Devices
allocated 0
2 4
Which of the following is correct ?
(A) State 1 is unsafe and state 2 is safe.
62.Let the time taken to switch between user mode and kernel mode of execution
be T1 while time taken to switch between two user processes be T2. Which of the
following is correct ?
(A) T1 < T2
63.Working set model is used in memory management to implement the concept of
(A) Principal of Locality
64.A UNIX file system has 1 KB block size and 4-byte disk addresses. What is
the maximum file size if the inode contains ten direct block entries, one
single indirect block entry, one double indirect block entry and one triple
indirect block entry ?
(A) 16 GB
65.A thread is usually defined as a light weight process because an Operating
System (OS) maintains smaller data structure for a thread than for a process.
In relation to this, which of the following statement is correct ?
(A) OS maintains only CPU registers for each thread
66.The versions of windows operating system like windows XP and window Vista
uses following file system :
(1) FAT-16
(2) FAT-32
(3) NTFS (NT File System)
(A) All of the above
67.Which one of the following is a correct implementation of the meta-predicate
“not” in PROLOG (Here G represents a goal) ?
(A) not(G):– call(G), !, fail. not(G).
68.Which one of the following is not an informed search technique ?
(A) Depth first search
69.If we convert ∃u ∀v ∀x ∃y (P(f(u),v, x, y) → Q(u,v,y)) to ∀v ∀x (P(f(a),v, x, g(v,x)) → Q(a,v,g(v,x))) This process is known as
(A) Skolemization
70.Given two jugs of capacities 5 litres and 3 litres with no measuring markers
on them. Assume that there is endless supply of water. Then the minimum number
of states to measure 4 litres water will be
(A) 7
71.The map colouring problem can be solved using which of the following
technique ?
(A) Constraint satisfaction
72.Which of the following is a knowledge representation technique used to
represent knowledge about stereotype situation ?
(A) Scripts
73.If A and B are two fuzzy sets with membership functions μA(x) = {0.6, 0.5,
0.1, 0.7, 0.8} μB(x) = {0.9, 0.2, 0.6, 0.8, 0.5} ––––– Then the value of μA∪ B(x) will be
(A){0.1, 0.5, 0.4, 0.2, 0.2}
74.A fuzzy set A on R is ________ iff A(λx1 + (1 – λ)x2) ≥ min [A(x1),A(x2)]
for all x1, x2 ∈ R and all λ ∈ [0, 1],
where min denotes the minimumoperator.
(A) Convex
ugc net june-13 paper-ii
1.COCOMO stands for
(A) COnstructiveCOstMOdel
2.Match the following :
a. Good quality i. Program does not fail for a specified time in a given
environment
b. Correctness ii. Meets the functional requirements
c. Predictable iii. Meets both functional and non-functional
requirements
d. Reliable iv. Process is under statistical
control
Codes :
a b c d
(A) iii ii iv i
3.While estimating the cost of software, Lines Of Code (LOC) and Function
Points (FP) are used to measure which one of the following ?
(A) Size of software
4.A good software design must have
(C) Low module coupling, High module cohesion
5.Cyclometric complexity of a flow graph G with n vertices and e edges is
(A) V(G) = e–n+2
6.When the following code is executed what will be the value of x and y ?
int x = 1, y = 0;
y = x++;
(A) 2,1
7.How many values can be held by an array A(–1,m;1,m) ?
(A) m(m+2)
8.What is the result of the expression
(1&2)+(3/4) ?
(A) 0
9.How many times the word ‘print’ shall be printed by the following program
segment ?
for (i=1, i<2,i++)
for (j=1,j<2,j++)
for(k=1,k<2,k++)
printf("print/n")
(A) 8
10.Which of the following is not a type of Database Management System ?
(A) Sequential
11.Manager’s salary details are to be hidden from Employee Table. This
Technique is called as
(A)External level Datahiding
12.A Network Schema
(A) permits many to many relationship
13.Which normal form is considered as adequate for usual database design ?
(A) 3NF
14.If D1,D2, .. ..Dn are domains in a relational model, then the relation is a
table, which is a subset of
(A)D1×D2× ... ×Dn
15.Which of the following addresses is used to deliver a message to the correct
application program running on a host ?
(A) Port
16.In ________ substitution, a character in the plaintext is always changed to
the same character in the ciphertext, regardless of its position in the text.
(A) polyalphabetic
17.In classful addressing, the IP address 190.255.254.254 belongs to
(A) Class B
18.In hierarchical routing with 4800 routers, what region and cluster sizes
should be chosen to minimize the size of the routing table for a three- layer
hierarchy ?
(A) 15 clusters, 16 regions and 20 routers
19.In IPv4 header, the ______ field is needed to allow the destination host to
determine which datagram a newly arrived fragments belongs to.
(A) identification
20.Given L1=L(a*baa*) and L2=L(ab*). The regular expression corresponding to
language L3 = L1/L2 (right quotient) is given by
(A) a*ba*
21.Given the production rules of a grammar G1 as S1 → AB | aaB A → a | AaB→b
and the production rules of a grammar G2 as
S2 → aS2bS2 | bS2aS2 | λ Which of the following is correct statement ?
(A) G1 is ambiguous and G2 is ambiguous.
22.Given a grammar : S1 → Sc, S → SA | A, A → aSb | ab, there is a rightmost
derivation S1 ⇒ Sc ⇒ SAC ⇒SaSbc Thus, SaSbc is a right sentential form, and its handle is
(A) aSb
23.The equivalent production rules corresponding to the production rules S →
Sα1 |Sα2 | β1 | β2 is
(A) S → β1 | β2 | β1A | β2A,
A → α1A | α2A | λ
24.Given a Non-deterministic Finite Automation (NFA) with states p and r as
initial and final states respectively and transition table as given below :
a b
p – q
q r s
r r s
s r s
The minimum number of states required in Deterministic Finite Automation (DFA)
equivalent to NFA is
(A) 3
25.Which is the correct statement(s) for Non Recursive predictive parser ?
S1 : First(α) = {t| α ⇒* tβ for some string β} ⇒*tβ
S2 : Follow(X)={ a| S⇒*αXaβ some strings α and β}
(A) Both statements S1 and S2 correct.
26.Given an open address hash table with load factor α < 1, the expected
number of probes in a successful search is
(B) Atmost 1/α in 1/1– α
27.For a B-tree of height h and degree t,the total CPU time used to insert a
node is
(A) O(th)
28.The time complexity to build a heap with a list of n numbers is
(A) O(n)
29.The value of postfix expression :
8 3 4 + – 3 8 2 / + * 2 $ 3 + is
(A) 52
30.Consider the following statements for priority queue :
S1 : It is a data structure in which the intrinsic ordering of the elements
does determine the result of its basic operations.
S2 : The elements of a priority queue may be complex structures that are
ordered on one or several fields.
(A) Both S1 and S2 are correct
31.Repository of information gathered from multiple sources, storing under
unified scheme at a single site is called as
(A)Data warehousing
32.The task of correcting and pre processing data is called as
(A) Data cleaning
33.Using data p=3, q=11, n=pq, d=7 in RSA algorithm find the cipher text of the
given plain text SUZANNE
(A) BUTAEEZ
34.The relation “divides” on a set of positive integers is ________.
(A) Anti symmetric and transitive
35.Give as good a big–O estimate as possible for the following functions :
(nlogn+n2)(n3+2)and(n!+2n)(n3+log(n2+1))
(A) O(n5) & O(n3* n!)
36.A test contains 100 true/false questions. How many different ways can a
student answer the questions on the test, if the answer may be left blank also.
(A) 3 to the power of 100
37.Which of the following connected simple graph has exactly one spanning tree
?
Complete graph
Hamiltonian graph
Euler graph
(A) None of the above
38.How many edges must be removed to produce the spanning forest of a graph
with N vertices, M edges and C connected components ?
(A)M–N+C
39.Which of the following shall be a compound proposition involving the
propositions p, q and r, that is true when exactly two of the p, q and r are
true and is false otherwise ?
(C) (p ∧ q ∧⎤ r) ∨ ( p ∧⎤ q ∧ r) ∨ (⎤ p ∧ q ∧ r)
40.The truth value of the statements :
∃!xP(x) → ∃xP(x) and ∃!x⎤ P(x) → ⎤∀xP(x), (where the notation ∃!xP(x) denotes the proposition “There exists a unique x such that P(x)
is true”) are :
(A) True and True
41.How many different Boolean functions of degree 4 are there ?
(A) 2 to the power of 16
42.A Boolean operator s is defined as follows :
1 s 1 = 1, 1 s 0 = 0, 0 s 1 = 0 and 0s0=1 What will be the truth value of the
expression (x s y) s z = x s (y s z) ?
(A)Always true
43.Which one of the following is decimal value of a signed binary number
1101010, if it is in 2’s complement form ?
(A) – 22
44.A set of processors P1, P2, ......, Pk can execute in parallel if
Bernstein’s conditions are satisfied on a pairwise
basis; that is P1 || P2 || P3 || ..... || Pk if and only if
:
(A) Pi || Pj for all i ≠ j
45.When a mobile telephone physically moves from one to another cell, the base
station transfers ownership to the cell getting strongest signal. This process
is known as _______.
(A) handoff
46.A virtual memory based memory management algorithm partially swaps out a
process. This is an example of
(A) medium term scheduling
47.Assuming that the disk head is located initially at 32, find the number of
disk moves required with FCFS if the disk queue of I/O block requests are 98,
37, 14, 124, 65, 67 :
(A)321
48.Let the page fault service time be 10 millisecond(ms) in a computer with
average memory access time being 20 nanosecond(ns). If one page fault is
generated for every 106 memory accesses, what is the effective access time for
memory ?
(A) 30 ns
49.Consider the following UNIX command : sort <in> temp; head – 30
<temp; rm temp Which of the following functions shall be performed by
this command ?
(A) Sort, taking the input from “in” and writing the output to “temp” then
prints 30 lines from temp on terminal. Finally “temp” is removed.
50.The mv command changes
(A) the directory entry
COMPUTER SCIENCE AND APPLICATIONS
1.
The postfix expression AB + CD – *
can
be evaluated using a
(Ans.)
stack
(B)
tree
(C)
queue
(D)
linked list
2.
The post order traversal of a binary
tree
is DEBFCA. Find out the preorder
traversal.
(A)
ABFCDE
(B)
ADBFEC
(Ans.)
ABDECF
(D)
None of the above
3.
The branch logic that provides making
capabilities
in the control unit is known
as
(Ans.)
Controlled transfer
(B)
Conditional transfer
(C)
Unconditional transfer
(D)
None of the above
4.
The number of colours required to
properly
colour the vertices of every
planer
graph is
(Ans.)
2
(B)
3
(C)
4
(D)
5
5.
Networks that use different
technologies
can be connected by
using
(A)
Packets
(B)
Switches
(C)
Bridges
(Ans.)
Routers
6.
Both hosts and routers are TCP/IP
protocol
software. However, routers do
not
use protocol from all layers. The
layer
for which protocol software is not
needed
by a router is
(Ans.)
Layer – 5 (Application)
(B)
Layer – 1 (Physical)
(C)
Layer – 3 (Internet)
(D)
Layer – 2 (Network Interface)
7.
In multiuser database if two users wish
to
update the same record at the same
time,
they are prevented from doing so
by
(A)
Jamming
(B)
Password
(C)
Documentation
(Ans.)
Record lock
8.
A binary search tree is a binary tree :
(A)
All items in the left subtree are
less
than root
(B)
All items in the right subtree are
greater
than or equal to the root
(C)
Each subtree is itself a binary
search
tree
(Ans.)
All of the above
9.
What deletes the entire file except the
file
structure ?
(A)
ERASE
(B)
DELETE
(Ans.)
ZAP
(D)
PACK
10.
Which command is the fastest among
the
following ?
(A)
COPY TO <NEW FILE>
(Ans.)
COPY STRUCTURE TO <NEW
FILE>
(C)
COPY FILE <FILE 1><FILE 2>
(D)
COPY TO MFILE-DAT
DELIMITED
11.
B+ tree are preferred to binary tree in
Database
because
(A)
Disk capacity are greater than
memory
capacities
(Ans.)
Disk access is much slower than
memory
access
(C)
Disk data transfer rates are much
less
than memory data transfer
rate
(D)
Disks are more reliable than
memory
12.
A Transaction Manager is which of the
following
?
(A)
Maintains a log of transactions
(B)
Maintains before and after
database
images
(C)
Maintains appropriate concurrency
control
(Ans.)
All of the above
13.
Leaves of which of the following trees
are
at the same level ?
(A)
Binary tree
(Ans.)
B-tree
(C)
AVL-tree
(D)
Expression tree
14.
Which of the following TCP/IP
Internet
protocol is diskless machine
uses
to obtain its IP address from a
server
?
(A)
RAP
(B)
RIP
(Ans.)
ARP
(D)
X.25
15.
Decryption and encryption of data are
the
responsibility of which of the
following
layer ?
(A)
Physical layer
(B)
Data Link layer
(Ans.)
Presentation layer
(D)
Session layer
16.
In which circuit switching, delivery of
data
is delayed because data must be
stored
and retrieved from RAM ?
(A)
Space division
(Ans.)
Time division
(C)
Virtual
(D)
Packet
17.
In which Routing Method do all the
routers
have a common database ?
(A)
Distance vector
(Ans.)
Link state
(C)
Link vector
(D)
Dijkestra method
18.
Page Shift Keying (PSK) Method is
used
to modulate digital signal at
9600
bps using 16 level. Find the line
signals
and speed (i.e. modulation
rate).
(Ans.)
2400 bauds (B) 1200 bauds
(C)
4800 bauds (D) 9600 bauds
19.
The station to hub distance in which it
is
2000 metres.
(A)
100 Base-Tx
(Ans.)
100 Base-Fx
(C)
100 Base-T4
(D)
100 Base-T1
20.
Main aim of software engineering is to
produce
(A)
program
(B)
software
(C)
within budget
(Ans.)
software within budget in the
given
schedule
21.
Key process areas of CMM level 4 are
also
classified by a process which is
(A)
CMM level 2
(B)
CMM level 3
(Ans.)
CMM level 5
(D)
All of the above
22.
Validation means
(A)
are we building the product right
(Ans.)
are we building the right product
(C)
verification of fields
(D)
None of the above
23.
If a process is under statistical control,
then
it is
(A)
Maintainable
(B)
Measurable
(Ans.)
Predictable
(D)
Verifiable
24.
In a function oriented design, we
(A)
minimize cohesion and maximize
coupling
(Ans.)
maximize cohesion and minimize
coupling
(C)
maximize cohesion and
maximize
coupling
(D)
minimize cohesion and minimize
coupling
25.
Which of the following metric does not
depend
on the programming language
used
?
(A)
Line of code
(Ans.)
Function count
(C)
Member of token
(D)
All of the above
26.
A / B+ tree index is to be built on the
name
attribute of the relation
STUDENT.
Assume that all students
names
are of length 8 bytes, disk block
are
of size 512 bytes and index
pointers
are of size 4 bytes. Given this
scenario
what would be the best choice
of
the degree (i.e. the number of
pointers
per node) of the B+ tree ?
(Ans.)
16 (B) 42
(C)
43 (D) 44
27.
The Inorder traversal of the tree will
yield
a sorted listing of elements of
tree
in
(A)
Binary tree
(Ans.)
Binary search tree
(C)
Heaps
(D)
None of the above
28.
Mobile IP provides two basic
functions.
(A)
Route discovery and registration
(Ans.)
Agent discovery and registration
(C)
IP binding and registration
(D)
None of the above
29.
Pre-emptive scheduling is the strategy
of
temporarily suspending a gunning
process
(Ans.)
before the CPU time slice expires
(B)
to allow starving processes to run
(C)
when it requests I/O
(D)
to avoid collision
30.
In round robin CPU scheduling as time
quantum
is increased the average turn
around
time
(A)
increases
(B)
decreases
(C)
remains constant
(Ans.)
varies irregularly
31.
Resources are allocated to the process
on
non-sharable basis is
(Ans.)
mutual exclusion
(B)
hold and wait
(C)
no pre-emption
(D)
circular wait
32.
Cached and interleaved memories are
ways
of speeding up memory access
between
CPU’s and slower RAM.
Which
memory models are best suited
(i.e.
improves the performance most)
for
which programs ?
(i)
Cached memory is best suited for
small
loops.
(ii)
Interleaved memory is best
suited
for small loops
(iii)
Interleaved memory is best
suited
for large sequential code.
(iv)
Cached memory is best suited for
large
sequential code.
(A)
(i) and (ii) are true.
(Ans.)
(i) and (iii) are true.
(C)
(iv) and (ii) are true.
(D)
(iv) and (iii) are true.
33.
Consider the following page trace :
4,3,
2, 1, 4, 3, 5, 4, 3, 2, 1, 5
Percentage
of page fault that would
occur
if FIFO page replacement
algorithm
is used with number of
frames
for the JOB m = 4 will be
(A)
8
(B)
9
(Ans.)
10
(D)
12
34.
Check sum used along with each
packet
computes the sum of the data,
where
data is treated as a sequence of
(A)
Integer
(Ans.)
Character
(C)
Real numbers
(D)
Bits
35.
If an integer needs two bytes of
storage,
then the maximum value of a
signed
integer is
(A)
216 – 1
(Ans.)
215 – 1
(C)
216
(D)
215
36.
Which of the following logic families
is
well suited for high-speed operations ?
(A)
TTL
(Ans.)
ECL
(C)
MOS
(D)
CMOS
37.
Interrupts which are initiated by an
instruction
are
(A)
Internal
(B)
External
(Ans.)
Hardware
(D)
Software
38.
printf(“%c”, 100);
(A)
prints 100
(Ans.)
prints ASCII equivalent of 100
(C)
prints garbage
(D)
none of the above
39.
For the transmission of the signal,
Bluetooth
wireless technology uses
(A)
time division multiplexing
(B)
frequency division multiplexing
(Ans.)
time division duplex
(D)
frequency division duplex
40.
Consider the following statements :
I.
Recursive languages are closed
under
complementation.
II.
Recursively enumerable languages
are
closed under union.
III.
Recursively enumerable languages
are
closed under complementation.
Which
of the above statements are true ?
(A)
I only
(Ans.)
I and II
(C)
I and III
(D)
II and III
41.
What is the routing algorithm used by
RIP
and IGRP ?
(A)
OSPF
(B)
Link-state
(C)
Dynamic
(Ans.)Dijkestra
vector
42.
Identify the incorrect statement :
(A)
The overall strategy drives the
E-Commerce
data warehousing
strategy.
(B)
Data warehousing in an
E-Commerce
environment should
be
done in a classical manner.
(C)
E-Commerce opens up an
entirely
new world of web
server.
(Ans.)
E-Commerce security threats can
be
grouped into three major
categories.
43.
Reliability of software is directly
dependent
on
(A)
quality of the design
(Ans.)
number of errors present
(C)
software engineers experience
(D)
user requirement
44.
______ is not an E-Commerce
application.
(A)
House banking
(B)
Buying stocks
(C)
Conducting an auction
(Ans.)
Evaluating an employee
45.
______ is a satellite based tracking
system
that enables the determination
of
person’s position.
(A)
Bluetooth
(B)
WAP
(C)
Short Message Service
(Ans.)
Global Positioning System
46.
A complete microcomputer system
consists
of
(A)
Microprocessor
(B)
Memory
(C)
Peripheral equipment
(Ans.)
All of the above
47.
Where does a computer add and
compare
data ?
(A)
Hard disk
(B)
Floppy disk
(Ans.)
CPU chip
(D)
Memory chip
48.
Pipelining strategy is called implement
(A)
instruction execution
(Ans.)
instruction prefetch
(C)
instruction decoding
(D)
instruction manipulation
49.
Which of the following data structure
is
linear type ?
(A)
Strings
(B)
Lists
(C)
Queues
(Ans.)
All of the above
50.
To represent hierarchical relationship
between
elements, which data structure
is
suitable ?
(A)
Dequeue
(B)
Priority
(Ans.)
Tree
(D)
All of the above
Computer Science & Computer Applications Questions and Answers
1.
A method of providing security to transport
e-mails is
Ans.
PGP
2.
A combinational circuit is designed to take
4 bit input. The number from 0 to 9 are given as input in the binary form. The
circuit outputs ‘1’ if 5,6,7 or 9 are given input.For all other numbers the
circuit outputs ‘0’. The circuit is designed only using AND, OR, NOT gates.
What is the minimum number of gates required ?
Ans. 3
3.
The MAC protocol used in Ethernet is
Ans.
CSMA/CD
4.
The simplified form of the Boolean
expression (X+Y’+Z) (X+Y’+Z’) (X+Y+Z)
Ans. X+Y’Z
5.
Arrange the following IP addresses in the
order of Class A, Class B, Class C and Class D.
I.
193. 200. 151. 2
II.
189. 51. 21. 200
III.
225. 2. 2. 200
IV.
126. 8. 2. 200
Ans. IV, II, I, III
6.
Addressing modes of the following 8085
instructions in the same order.
LDA,
LXI, ADD r1, r2, MOV A,M
Ans.
Direct, Immediate, Register, Indirect
7.
The concatenation of two lists is to be
performed in 0(1) time. Which of the following implementation of a list should
be used?
Ans. Circularly doubly linked list
8.
Match the following :
I.
Non vectored interrupt 1. ISR
II.
Non Maskableinterrupt 2. RST2
III.
Program for interrupt 3. TRAP
IV.
Software Interrupt 4. INTR
I
II III IV
Ans.4 3
1 2
9.
Search algorithms are Judged on the basis of
I.
Completeness
II.
Optimality
III.
Time complexity
IV.
Space complexity
(A)
I and II
(B)
I, II and III
(C)
II, III and IV
Ans. All of the above
10. Choose
the answer from the following register(s) that store the address of a memory
location.
I.
Program counter
II.
Accumulator
III.
MAR
IV.
BC Register pair
Ans. I and III are correct
11.
If G be a complete undirected graph on 6
vertices. If vertices of G are labeled then the number of distinct cycles of
length 4 in G is equal to
Ans. 90
12.
The number of vectored interrupts in 8085 is
Ans. 4
13.
The Java compiler translates source code
into
Ans. Byte Code
14.
Object-Modelling Technique was proposed by
Ans.Rambaugh
15.
The following scheduling algorithm is inherently
pre emptive
Ans. Round Robin
16.
An Abstract Data Type (ADT) is
Ans.a
data type for which only the operations defined on it can be used
17.
In a paged memory the page hit ratio is
0.35. The time required to access a page in secondary memory is equal to 100
nsec. The time required to access a page in primary memory is 10 nsec. The
average time equired to access a page is
Ans.68.5
nsec.
18.
______________ abstraction is a named
sequence of instructions that has a specific and limited function.
Ans. Procedural
19.
A process executes the code
fork
( ) ;
fork
( ) ;
fork
( ) ;
fork
( ) ;
The
total number of child processes created is
Ans. 15
20.
If A = { 0, 1 }, then the number of possible
strings of length ‘n’ is
Ans.
2n
21.
The overlay tree for a program is given
below. What will be the size of the physical memory partition required to load
and run the program?
Ans.
14KB
22.
The complexity of inter connection among
modules is described by
Ans. Coupling
23.
A 1000 K byte memory is managed using
variable partitions but to compaction. It currently has two partitions of sizes
200 K bytes and 340 K bytes respectively. The smallest allocation request in K
bytes that
could
be denied is for
Ans.
461
24.
The grammar guaranteed by production rules
S->a
SBc, CB->BC, aB ->aa is
Ans.
anbncn, n>0
25.
The following page replacement algorithms
suffer from Belady’s anomaly.
I.
Optimal replacement
II.
LRU
III.
FIFO
IV.
MRU
Ans. I and III correct
26.
Given the basic ER and relational models,
which of the following is INCORRECT?
A)
An attribute of an entity can have more than one value
(B)
An attribute of an entity can be composite
(C)
In a row of a relational table, an attribute can have more than one value
(D)
In a row of a relational table, an attribute can have exactly one value or a
NULL value
Ans(
C). In a row of a relational table, an
attribute can have more than one value
27.
The algorithm used for searching AND-OR
graph is
Ans. AO*
28.
The PROJECT operator of a relational algebra
creates a new table that has always
Ans. Same number of rows as the original table
29.
The Natural Language sentence will be
represented in NLP with
I.
ATN
II.
RTN
III.
FPL
IV.
FRAMES
Ans. I, II
30.
The file organization in which the physical
location of a record is determined by a Mathematical function that maps the key
to address of the record is
Ans. Hashed file organization
31.
Consider the following statements about the
cyclomatic complexity of the control flow graph of a program module. Which of
these are TRUE ?
i.
The cyclomatic complexity of a module is equal to the maximum number of
linearly independent circuits in the graph.
ii.
The cyclomatic complexity of a module is the number of decisions on the module
plus one. Where aecision is effectively any conditional statement in the
module.
iii.
The cyclomatic complexity can also be used as a number of linearly independent
paths that should be
tested
during path coverage testing
Ans.
i, ii and iii
32.
Which of the sorting algorithm is the
slowest?
Ans. Bubble sort
33.
The approach used in top-down analysis and
design is
Ans.to
identify a top level function and then create a hierarchy of lower level modules
and components
34.
Match the following:
I.
Flow control 1. Token Bucket
II.
Error control 2. Sliding window
III.
Congestion control 3. Manchester
encoding
IV.
Synchronization 4. Parity bit
I
II III IV
Ans. 2
4 1 3
35.
Slow start is a technique used by the TCP to
reduce
Ans.
Number of time outs of segments
36.
A B-Tree used as an index for a large
database table has four levels including root node. If a new key is inserted in
this index, then the maximum number of nodes that could be newly created in the
process are
Ans. 5
37.
Consider the following proportional
statements
P1:
((A^B)->C)=((A->C)^(B->C))
P2:((AvB)->C)=((A->C)v(B->C))
Which
one of the following are true?
(D)
Both P1 and P2 are not tautologies
38.
What is difference between a Java applet and
a Java application ?
(A)
An application can in general be trusted whereas an applet can’t
(B)
An applet must be executed in a browser environment
(C)
An applet is not able to access the files of the computer it runs on
Ans. All of the above
39.
The following machine will accept the String
Ans.bab
40.
Types of validation testing
Ans. Alpha and Beta Testing
41.
Choose the correct answer, the protocol
which returns IP address.
I.
ARP
II.
RARP
III.
HTTP
IV.
DNS
Ans. II and IV correct
42.
Assuming P !=N which of the following is
TRUE ?
Ans. NP – complete nP = φ
43.
What is the appropriate pairing of items in
the two columns, listing various activities encountered in a software life
cycle ?
P.
Requirements 1. Module capture
Development and Integration
Q.
Design 2. Domain analysis
R.
Implementation 3. Structural
Behavioural Modelling
S.
Maintenance 4. Performance Tuning
Ans.
P – 2, Q – 3, R – 1, S – 4
44.
In UNIX, when the read system call
encounters EOF, it returns
Ans. –1
45.
Which of the following regular expression
identities are true ?
Ans. (r’)1 = r
46. The message 11001001 is to be transmitted using
the CRC polynomial x3 + 1 to protect it from errors. The message that should be
transmitted is
Ans.
110010010011
47. _______________ is black box testing method.
Ans.
Boundary value analysis
48. If the hamming distance is ‘m’ then the number
of errors that can be corrected is
Ans.
Less than m/2
49. What is the maximum number of I/O devices that
can be interfaced to 8085 ?
Ans. 256
50. Compression Ratio is defined as
Ans. compressed size/uncompressed size)
51. Neural Networks are models of
Ans.
Biological nervous systems
Question No.’s 52 and 53
Disk requests come to a disk drive for
cylinders 10, 22, 20, 2, 40, 6 and 36 in that order at a time when the disk drive
is reading from cylinder 20. The seek time is 6 ms per cylinder. The disk can
be rotated either clockwise or counter clockwise.
52. The total seek time if the disk arm scheduling
algorithm is first-cum-first served.
Ans. 876 msec.
53. If the scheduling algorithm is closest cylinder
next, then the total will be
Ans.360 msec.
Question No.’s 54, 55 and 56
The next three questions are based on Huffman’s
coding for the symbol A with probability 0.3, B with 0.15, C with 0.1, D with
0.25 and E with 0.2.
54. The minimum number of bits required to
represent B is
Ans. 3
55. The minimum number of bits required to
represent all the symbols together is
Ans.
12
56. The average code length of the given problem is
Ans. 2.25
57. Character Recognition is application of
Ans.
Neural Networks
58. Inference Engine consists of
I. Facts
II. User Interface
III. Search
IV. Domain Expert
Ans. I,
III
59. With regarding to exceptions following is TRUE
Ans.
Raised by program and OS
60. Which of the following concurrency control
protocols ensure both conflict serializability and freedom from dead deadlock
I. 2 – phase locking
II. Time-stamp ordering
Ans. II only
61. The following system calls are related to file
operations in UNIX
I. Signal
II. Kill
III. Seek
IV. Unlink
Ans. III
and IV correct
62. HTML (Hyper Text Markup Language) has language
elements which permit certain actions other than describing the structure of
the web document. Which one of the following actions is not supported by pure
HTML (without any server or client side
scripting) pages?
Ans.
Display the client time as part of the page
63. Search engine is a ____________ agent.
Ans. Intelligent
64. The commonly used UNIX commands like date, ls,
cut etc. are stored in
Ans. /
bin and /usr/bin directory
65. ADO stands for
Ans.
Active × Data Object
66. If f is a linear transformation from the plane
to the real numbers and if f(1, 1) = 1 and f(–1, 0) = 0 then f (3, 5) =
Ans. 9
67. Fuzzy Logic is proposed by
Ans.
ZADEH
68. If the inorder and postorder traversal results
of a binary tree are A, C, B, F, E, D, G and A, B, C, E, G, D, F respectively.
Identify the root node of it.
Ans. F
69. NLP includes problems
(A) in which the objective function is linear
but some constraints are not linear
(B) in which the constraints are linear but the
objective function is not linear
(C) in which both the objective function and
all the constraints are not linear
Ans.all of the above
70. Class C is inherited from Class A and Class B,
Class D is inherited from Class C Which of the following is true ?
I. Class C inherits Class A attributes
II. Class C inherits Class B attributes
III. Class D inherits Class B attributes only
IV. Class D inherits Class A attributes only
Ans. I,
II
71. Which of the following is an assertion ?
Ans. P
is true, P and Q are true and K or not (Q) is true implies K is true
72. In 8085, the addressing mode used for LDAX rp
instruction is
Ans.
Indirect
73. Given an arbitrary Non-deterministic Finite
Automation (NFA) with N states, the maximum number of states in an equivalent
minimized DFA is atleast
Ans. N!
74. The maximum packet size of IPV4 is
Ans. 65535 bytes
75. Which of the following statements are TRUE
about an SQL query ?
P : An SQL query can contain a HAVING clause
even if it doesnot have a GROUP by clause.
Q : An SQL query can contain a HAVING clause
only if it has GROUP by clause.
R : All attributes used in the GROUP by clause
must appear in the SELECT clause.
S : Not all attributes used in the GROUP by
clause need to appear in the SELECT clause.
Ans. P
and S
1. Function
overloading is done at
Ans.
Compile time
2. OLAP
is an acronym for
Ans.
Online Analytical Processing
3.
Architectural design involves in SE
Ans. DFD-
Data Flow Diagrams
4. An EDP
auditor must be an expert in
Ans.
Computerised Business Systems
5. If no
exception is thrown
Ans. All
catch blocks coded will be bypassed
6.
Consider the following pseudo-code :
IF ((A
> B) AND (C > D)) THEN
A = A + 1
B = B + 1
ENDIF
The
cyclomatic complexity of the pseudo-code is
Ans. 3
7. Which
of the following testing methods is normally used as the acceptance test for a
software system ?
Ans.
Functional testing
8. Match
the following
I. The
beginning of the function code 1. (
)
II. The
preprocessor directive always starts with 2. &
III. The
symbol for the address operator 3. {
IV. The
name of a function s ends with 4. #
I
II III IV
Ans. 3
4 2 1
9. Match
the following :
1. Data
Link Layer i. The lowest layer whose
function is to activate, deactivate and maintain the circuit between DTE and DCE
2.
Physical Layer ii. Perform routing
3.
Presentation iii. Detection and Layer
recovery of errors in the transmitted data
4.
Network Layer iv. Provides syntax for
the data
Ans. 1 –
iii, 2 – i, 3 – iv, 4 – ii
10. Match
the following :
I. 0 (log
n) 1. Heap sort
II. 0
(n) 2. DFS
III. 0 (n
log n) 3. Binary search
IV. 0 (n2) 4. Bubble sort
Ans. I –
3, II – 2, III – 1, IV – 4
11. The string accepted by the following
finite
Automaton
where
a, b are alphabets, q0, q1, and q2 are states and q2 is final state
Ans.ab
(a + b)*
12. What is the maximum number of different
Boolean functions involving n Boolean variables ?
Ans. 22n
Choose
the category of following SQL operations INSERT, DELETE and UPDATE
Ans. DML
14. Let G be a simple graph all of whose
vertices have degree 3 and |E| = 2 |V| - 3 what can be said
about G ?
(A) G has ‘6’ vertices and 9 edges
15. Which of the following graph is
isomorphic to given below graph ?
16. Consider the join of a relation R with a
relation S. If R has m tuples and S has n tuples, then the maximum and minimum
sizes of the join respectively are
Ans.mn and 0
17. Assertion A : The technique of
building new classes from the existing classes is called polymorphism.
Reason R : Polymorphism requires postponement of
binding of a function call to the member function until runtime.
Ans. Only (R) is true and (A) is false
18. Suppose a tree has d1 vertices of degree
1, 2 vertices of degree 2, 4 vertices of degree 3 and 3 vertices of degree 4
then d1 value is
Ans. 12
19. A Binary Search Tree (BST) stores values
on the range 37 to 573. Consider the following sequence of keys
i.
81, 537, 102, 439, 285, 376, 305
ii.
52, 97, 121, 195, 242, 381, 472
iii.
142, 248, 520, 386, 345, 270, 307
iv.
550, 149, 507, 395, 463, 402, 270
Which of the following statements is TRUE ?
Ans.ii
is an inorder sequence of some BST where 121 is the root and 52 in a leaf
20. Assertion A : Implicit type
conversion in C++ can lead to errors keeping into the program, if adequate care
is not taken.
Reason R : Use of explicit type conversion is
recommend in mixed mode expression.
Ans. Both (A) and (R) are true and (R) is the
reason for (A)
21. If X is a Boolean variable, then among
following what are the statements true according to Idempotent law ?
I.
X + X = X
II.
X . X = X
III.
X . 1 = X
IV.
X + 1 = 1
Ans. I and II are correct
22. Exterior Gateway Protocol is
Ans.
To exchange routing information between gateway hosts
23. Find the following statements in the context
of software testing are TRUE or FALSE
S1
: Statement coverage cannot guarantee execution of loops in a program under
test.
S2
: Use of independent path testing criterion guarantees execution of each loop
in a program under test
more
than once.
Ans. True, False
24. Match the following :
I.
To add 2 bits 1. Full adder
II.
To add 3 bits 2. Left shift by 1 bit
III.
To multiply by 2 3. Right shift by 1 bit
IV.
To divide by 2 4. Half adder
I
II III IV
Ans. 4 1
2 3
25. A medium access control technique for
multiple access transmission media is
Ans. ALOHA
26. In a software project, COCOMO
(Constructive Cost Model) is used to estimate
Ans. Effort and duration based on the size of the
software
27. The gray code for decimal 7 is
Ans. 1011
28. Error detection at the data link level is
achieved by
Ans. Cyclic redundancy codes
29. In Unix, the file descriptor returned by
open system call is of type
Ans. Integer
30. The string 1101 does not belong to the
set represented by
Ans. (10)* (01)* (00 + 11)*
31. Which of the following tool is known as
‘parser’ generator ?
Ans.
YAAC
32. The task of the Lexical Analysis phase is
(A)
To parse the source program into the basic elements or tokens of the language
(B)
To build a literal table and an identifiertable
(C)
To build a uniform symbol table
Ans. All of the above
33. Match the following :
I.
The processes ID 1. grep
II.
Editor 2. ps
III.
Searching in files 3. cat
IV.
Printing a file 4. vi
I
II III IV
Ans.2 4
1 3
34. Consider this C code to swap two integers
and these five statements:
void
swap (int * px, int * py)
{
*
px = *px – *py ;
*py
= *px + *py;
*px
= *py – *px;
}
S1
: Will generate a compilation error
S2
: May generate a segmentation fault at runtime depending on the arguments
passed
S3
: Correctly implement the swap procedure for all input pointers referring to
integers stored in memory
locations
accessible to the process
S4
: Implements the swap procedure correctly for some but not all valid input
pointers.
S5
: May add or subtract integers and pointers.
Ans. S2 and S3
35. A compiler for a high level language that
runs on one machine and produces code for a different machine is called
Ans. Cross compiler
36. Match the following :
I.
Deadlock avoidance 1. Shortest job
first algorithm
II.
CPU scheduling 2. LRU algorithm
III.
Mutual exclusion 3. Banker’s
algorithm
IV.
Page replacement 4. Peterson’s
algorithm
I
II III IV
Ans. 3
1 4 2
37. Match the following:
P.
Regular expression 1. Syntax analysis
Q.
Pushdown automata 2. Code generation
R.
Dataflow analysis 3. Lexical analysis
S.
Register allocation 4. Code optimization
Ans. P – 3, Q – 1, R – 4, S – 2
38. Reasoning with uncertain knowledge can be
dealt with
Ans. Non-monotonic reasoning
39. Which of the following eliminates
transitive dependency?
Ans. BCNF
40. Electronic credit cards can be in
(A)
Unencrypted
(B)
Encrypted
Ans. Both A and B
41. Consider the following two statements
i.
A Hash function is an injective function which is often used for computing
digital signature
ii.
An encryption technique DES performs a permutation on the elements of its input
alphabet Which of the following is valid for the above two statements?
Ans. Both are true
42. Select A, B, C from loan table
consisting
of fields A, B, C, D, E, F
óABC(loan)
43. The number of flipflops required in a
decade counter is
Ans.
4
44. Which of the following is a non-linear
data structure?
i.
Stack ii. Queue
iii.
Tree iv. Graph
v.
Doubly linked list
Ans.
iii&iv
45. Consider the following statements :
P
: A page fault occurs when the required page is not available in the main
memory.
Q
: There exists a situation that, there is no space available in the main
memory.
Which
of the following is true ?‘
Ans. Both P and Q are true, and Q is also a reason
for P
46. Which of the following propositions is a
tautology ?
Ans.pv∨(p->q)
47. Fense Register is used for
Ans. File protection
48. SQL stands for
(A)
Structured Query Language
49. Active X control can be added to a
webpage by using
Ans.
< OBJECT> tag
50. Consider 4 processes P1, P2, P3 and P4 Process Arrival time Time units required
P1
0 5
P2
1 7
P3
3 4
P4
4 6
Find
the completion order of the 4 processes if round robin policy applies (round
robin with the quantum
of
2 time units)
Ans.
P3P1P4P2
COMPUTER SCIENCE AND APPLICATIONS QUESTION AND ANSWERS
COMPUTER SCIENCE AND APPLICATIONS QUESTIONS AND ANSWERS
1. The following features are needed to implement top down parsing
a. Source string maker
b. Prediction making mechanism
c. Matching and Backtracking mechanism
Ans. All of the above.
2. A macro definition consists of
a. A macro prototype statement
b. One or more model statements
c. Macro pre-processor statements
Ans. All of the above.
3. The main reason to encrypt a file is to
Ans. Secure it for transmission.
4.Which of the following is not a key piece of information, stored in single page table entry, assuming pure paging and virtual memory
Ans. A reference for the disk block that stores the page.
5. A UNIX device drive is
Ans. Structured into two halves called top half and bottom half.
6.The following is not a layer of IO management module
a.PICOS(Physical Input Output Control System)
b.LICOS(Logical Input Output Control System)
c. FS(File System)
Ans. MCS (Management Control System).
7. Which amongst the following is not a valid page replacement policy?
a. LRU Policy (Least Recently Used)
b.FIFO Policy (First in first out)
c.Optimal page replacement policy
Ans. RU policy (Recently Used)
8.An assembly language is a
Ans. Low level programming language.
9. TII stands for
Ans. Table of incomplete instruction.
10.An analysis, which determines the syntactic structure of the source statement, is called
Ans. Syntax analysis.
11. Action implementing instruction's meaning are actually carried out by
Ans. instruction execution.
12. The field containing a segment index or an internal index is called
Ans. Target datum.
13. A program in execution is called
Ans. Porcess.
14.Jobs which are admitted to the system processing is called
Ans. long-term scheduling.
15.A set of techniques that allow to execute a program which is not entirely in memory is called
Ans. Virtual memory.
16.SSTF stands for
Ans. Shortest-Seek-Time-First.
17. Before proceeding with its execution, each process must acquire all the resources it needs is called
Ans. hold and wait.
18. Virtual memory is
Ans. used in all major commercial operating systems.
19.Relocation bits used by relocating loader are specified by
Ans. Assembler or Translator.
20.Resolution of externally defined symbols is performed by
Ans. Linker.
21.Relocatable programs
Ans. Can be loaded almost anywhere in memory
22.page stealing
Ans. is taking page frames other working sets.
23. The total time to prepare a disk drive mechanism for a block of data to be read from its
Ans. Latency plus seek time.
24. To avoid race condition, the maximum number of processes that may be simultaneously inside the critical section is
Ans. One.
25.The memory allocation scheme subject to "external" fragmentation is
Ans. Segmentation.
26.Page fault frequency in an operating system is reduced when the
Ans. locally of references is applicable to the process.
27.In which of the following page replacement pliciesBalady'sanomly occurs?
Ans. FIFO (First in First Out)
28.Which of the following are language processors?
a. Assemblers
b. Compiler
c. Interpreter
Ans. All of the above.
29. Virtual memory can be implemented with
Ans. Segmentation, Paging
30.Recognition of basic syntatic constructs through reductions, this task is performed by
Ans. Syntax analysis.
31. A Grammar for a programming language is a formal description of
Ans. Structure.
32.Swapping is a technique of temporarily removing inactive programs from the memory of computer system.
33. Ageing is a technique of improving the priority of process waiting in Queue for CPU allocation.
34.Latency Time is the required by a sector to reach below read/write head.
35. Which of the following is most general phase structured grammar?
a.Regular
b.Context-Free
Ans. Context- Sensitive.
36. File record length
Ans. Should be chosen to match the data characteristics.
37. A public key encryption system
Ans. Allows only the correct receiver to decode the data.
1. The following features are needed to implement top down parsing
a. Source string maker
b. Prediction making mechanism
c. Matching and Backtracking mechanism
Ans. All of the above.
2. A macro definition consists of
a. A macro prototype statement
b. One or more model statements
c. Macro pre-processor statements
Ans. All of the above.
3. The main reason to encrypt a file is to
Ans. Secure it for transmission.
4.Which of the following is not a key piece of information, stored in single page table entry, assuming pure paging and virtual memory
Ans. A reference for the disk block that stores the page.
5. A UNIX device drive is
Ans. Structured into two halves called top half and bottom half.
6.The following is not a layer of IO management module
a.PICOS(Physical Input Output Control System)
b.LICOS(Logical Input Output Control System)
c. FS(File System)
Ans. MCS (Management Control System).
7. Which amongst the following is not a valid page replacement policy?
a. LRU Policy (Least Recently Used)
b.FIFO Policy (First in first out)
c.Optimal page replacement policy
Ans. RU policy (Recently Used)
8.An assembly language is a
Ans. Low level programming language.
9. TII stands for
Ans. Table of incomplete instruction.
10.An analysis, which determines the syntactic structure of the source statement, is called
Ans. Syntax analysis.
11. Action implementing instruction's meaning are actually carried out by
Ans. instruction execution.
12. The field containing a segment index or an internal index is called
Ans. Target datum.
13. A program in execution is called
Ans. Porcess.
14.Jobs which are admitted to the system processing is called
Ans. long-term scheduling.
15.A set of techniques that allow to execute a program which is not entirely in memory is called
Ans. Virtual memory.
16.SSTF stands for
Ans. Shortest-Seek-Time-First.
17. Before proceeding with its execution, each process must acquire all the resources it needs is called
Ans. hold and wait.
18. Virtual memory is
Ans. used in all major commercial operating systems.
19.Relocation bits used by relocating loader are specified by
Ans. Assembler or Translator.
20.Resolution of externally defined symbols is performed by
Ans. Linker.
21.Relocatable programs
Ans. Can be loaded almost anywhere in memory
22.page stealing
Ans. is taking page frames other working sets.
23. The total time to prepare a disk drive mechanism for a block of data to be read from its
Ans. Latency plus seek time.
24. To avoid race condition, the maximum number of processes that may be simultaneously inside the critical section is
Ans. One.
25.The memory allocation scheme subject to "external" fragmentation is
Ans. Segmentation.
26.Page fault frequency in an operating system is reduced when the
Ans. locally of references is applicable to the process.
27.In which of the following page replacement pliciesBalady'sanomly occurs?
Ans. FIFO (First in First Out)
28.Which of the following are language processors?
a. Assemblers
b. Compiler
c. Interpreter
Ans. All of the above.
29. Virtual memory can be implemented with
Ans. Segmentation, Paging
30.Recognition of basic syntatic constructs through reductions, this task is performed by
Ans. Syntax analysis.
31. A Grammar for a programming language is a formal description of
Ans. Structure.
32.Swapping is a technique of temporarily removing inactive programs from the memory of computer system.
33. Ageing is a technique of improving the priority of process waiting in Queue for CPU allocation.
34.Latency Time is the required by a sector to reach below read/write head.
35. Which of the following is most general phase structured grammar?
a.Regular
b.Context-Free
Ans. Context- Sensitive.
36. File record length
Ans. Should be chosen to match the data characteristics.
37. A public key encryption system
Ans. Allows only the correct receiver to decode the data.
COMPUTER SCIENCE AND APPLICATIONS
1. Translator for low level
programming language were termed as
Ans. Assembler.
2. Analysis which determines the
meaning of a statement once its grammatical structure becomes known is termed
as
Ans. Semantic analysis.
3. Load address for the first
word of the program is called
Ans. load address origin.
4. Symbolic name can be
associated with
Ans. data or instruction.
5. The translator which perform
macro expansion is called
Ans. a Macro pre-processor.
6. Shell is the exclusivefeature
of
Ans.UNIX.
7. A program in execution is
called
Ans. Process.
8. Interval between the time of
submission and completion of the job is called
Ans. Turnaround time.
9. A schedular which selects
processes from secondary storage device is called
Ans. Medium term schedular.
10. The scheduling in which CPU
is allocated to the process with least CPU-burst time is called
Ans. Shortest job first
Scheduling.
11. The term 'page traffic'
descries
Ans. the movement of pages in and
out of memory.
12. The "turn-around"
time of a user job is the
Ans. total time taken to execute
the job.
13. The following can be used as
a criterion for classification of data structures used in language processing
Ans.Nature of a data structure,
Purpose of a data structure, Lifetime of data structure.
14. Memory utilization factor
shall be computed as follows
Ans.memory in use/total memory
connected.
15. Program
"preemption" is
Ans. forced de allocation of the
CPU from a program which is executing on the CPU.
16. An assembler is
Ans. machine dependent.
17. Which of the following is not
a fundamental process state
Ans. blocked state
18.'LRU' page replacement plicy
is
Ans. Least Recently Used.
19. Which of the following is
true?
Ans.Block cipher technique is an
encryption technique and b. Stream cipher technique is an encryption technique
20. Which of the following
approaches do not require knowledge of the system state?
a. deadlock detection
b. deadlock prevention
c. deadlock avoidance
Ans.None of the above.
21. Program generation activity
aims at
Ans.Automatic generation of
program
22. Which among the following is
not an advantage of Distributed systems?
a.Incremental growth
b. resource sharing
c.none of the above
Ans. Reliability.
23.An imperative staement
indicates an action to be performed during execution of assembled program
24. Which of the loader is executed when a system is first
turned on or restarted
Ans. Bootstrap loader.
25. Poor response time is usually
caused by
a.process busy
b.high I/O rates
c.high paging rates
Ans.Any of the above.
26."Throughput" of a
system is Number of programs processed by it per unit time
27.The "blocking
factor" of a file is The number of logical records in one physical record.
28.which of these is a component
of a process precedence sequence?
a.process name
b.sequence operator ';'
c. concurrency operator '.'
Ans. all of the above
29.Which among the following is
vallid syntax of the Forkand Join primitive?
Ans. Fork<label>
join<var>
30.Nested Macro calls are
expanded using the
Ans. LIFO - Last In First Out
31.A parser which is a variant of
top-down parsing without backtracking is
Ans. Recursive Descend.
32. The expansion of nested macro
calls follows
Ans. LIFO rule.
33.In a two-pass assembler, the
task of the Pass II is to
Ans. synthesize the target
program.
34.A linker program
Ans. links the program with other
programs needed for its execution
35.Which scheduling policy is
most suitable for a time-shared operating system
Ans. Round-Robin
36.A critical section is a
program segment where shared resources are accessed.
37.An operating system contains 3
user processes each require 2 units of resource R.
The minimum number of units of R
such that no deadlocks will ever arise is 4.
38.Locality of reference implies
that the page reference being made by a process
Ans. is likely to be the one of
the pages used in the last few page references.
39.Which of these is not a part
of Synthesis phase
Ans. Perform LC processing
40.The syntax of the assembler
directive EQU is
Ans. <symbol> EQU
<address space>
What is
Normalization?
Normalization is the process of efficiently organizing
data in a database. There are two goals of the
normalization process: eliminating redundant data
(for example, storing the same data in more than one
table) and ensuring data dependencies make sense
(only storing related data in a table). Both of these
are worthy goals as they reduce the amount of space
a database consumes and ensure that data is
logically stored.
The Normal Forms:
The database community has developed a series of
guidelines for ensuring that databases are
normalized. These are referred to as normal forms
and are numbered from one (the lowest form of
normalization, referred to as first normal form or 1NF)
through five (fifth normal form or 5NF). In practical
applications, you'll often see 1NF, 2NF, and 3NF along with the occasional 4NF. Fifth normal form
is very rarely seen and won't be discussed in this article.
Before we begin our discussion of the normal forms, it's important to point out that they are
guidelines and guidelines only. Occasionally, it becomes necessary to stray from them to meet
practical business requirements. However, when variations take place, it's extremely important
to evaluate any possible ramifications they could have on your system and account for possible
inconsistencies. That said, let's explore the normal forms.
First Normal Form (1NF)
First normal form (1NF) sets the very basic rules for an organized database:
For more details, read Put t ing your Database in First Normal Form
Second Normal Form (2NF)
Second normal form (2NF) further addresses the
concept of removing duplicative data:
Eliminate duplicative columns from the same table.
Create separate tables for each group of related data and identify each row with a unique
column or set of columns (the primary key).
of a table and place them in separate tables.
Create relationships between these new tables and
their predecessors through the use of foreign keys.
Third Normal Form (3NF)
Third normal form (3NF) goes one large step further:
Meet all the requirements of the second normal form.
Remove columns that are not dependent upon the primary key.
Boyce-Codd Normal Form (BCNF or 3.5NF)
The Boyce-Codd Normal Form, also referred to as the "third and half (3.5) normal form", adds
one more requirement:
Meet all the requirements of the third normal form.
Every determinant must be a candidate key.
Fourth Normal Form (4 NF)
Finally, fourth normal form (4NF) has one additional requirement:
Meet all the requirements of the third normal form.
A relation is in 4NF if it has no multi-valued dependencies.
Remember, these normalization guidelines are cumulative. For a database to be in 2NF, it must
first fulfill all the criteria of a 1NF database.
Meet all the requirements of the first normal form.
Remove subsets of data that apply to multiple rows
Normalization is the process of efficiently organizing
data in a database. There are two goals of the
normalization process: eliminating redundant data
(for example, storing the same data in more than one
table) and ensuring data dependencies make sense
(only storing related data in a table). Both of these
are worthy goals as they reduce the amount of space
a database consumes and ensure that data is
logically stored.
The Normal Forms:
The database community has developed a series of
guidelines for ensuring that databases are
normalized. These are referred to as normal forms
and are numbered from one (the lowest form of
normalization, referred to as first normal form or 1NF)
through five (fifth normal form or 5NF). In practical
applications, you'll often see 1NF, 2NF, and 3NF along with the occasional 4NF. Fifth normal form
is very rarely seen and won't be discussed in this article.
Before we begin our discussion of the normal forms, it's important to point out that they are
guidelines and guidelines only. Occasionally, it becomes necessary to stray from them to meet
practical business requirements. However, when variations take place, it's extremely important
to evaluate any possible ramifications they could have on your system and account for possible
inconsistencies. That said, let's explore the normal forms.
First Normal Form (1NF)
First normal form (1NF) sets the very basic rules for an organized database:
For more details, read Put t ing your Database in First Normal Form
Second Normal Form (2NF)
Second normal form (2NF) further addresses the
concept of removing duplicative data:
Eliminate duplicative columns from the same table.
Create separate tables for each group of related data and identify each row with a unique
column or set of columns (the primary key).
of a table and place them in separate tables.
Create relationships between these new tables and
their predecessors through the use of foreign keys.
Third Normal Form (3NF)
Third normal form (3NF) goes one large step further:
Meet all the requirements of the second normal form.
Remove columns that are not dependent upon the primary key.
Boyce-Codd Normal Form (BCNF or 3.5NF)
The Boyce-Codd Normal Form, also referred to as the "third and half (3.5) normal form", adds
one more requirement:
Meet all the requirements of the third normal form.
Every determinant must be a candidate key.
Fourth Normal Form (4 NF)
Finally, fourth normal form (4NF) has one additional requirement:
Meet all the requirements of the third normal form.
A relation is in 4NF if it has no multi-valued dependencies.
Remember, these normalization guidelines are cumulative. For a database to be in 2NF, it must
first fulfill all the criteria of a 1NF database.
Meet all the requirements of the first normal form.
Remove subsets of data that apply to multiple rows