PROFESSIONAL KNOWLEDGE (IT)
===================================================
1. Computer read which type code I
(1 Ans.) binary code (2) English letter (3) character
(4) integer
(5) None of these
2. Hamming distance is’
(1 Ans.) a theoretical way of measuring errors
(2) a technique for assigning codes to a set of items known to occur with a given probability
(3) a technique for optimizing the intermediate code
(4) All of the above
(5) None of these
3. To find the shortest-path in a weighted graph or network, which of the following algp-rithm is
not used?
(1 Ans.) Warshall’s algorithm
(2) Dijkastra algorithm
(3) Kruskal algorithm
(4) All of the above
(5) None of these
4. The page replacement policy that some times leads to more page faults when the size of the
memory is increased, is
(1 Ans.) FIFO
(2) LRU
(3) MRU
(4) Optimal
(5) None of these
5. The PPP replaced.............
(1) HDLC
(2) OSPF
(3 Ans.) SLIP
(4) PAP
(5) None of these
6. The gate whose output is low if and only if all inputs are high, is
(1 Ans.) NAND
(2) AND
(3) OR
(4) All of these
(5) None of these
7. The ABC bank has implemented WLAN in its network when two or more devices in the network
send data at the same time to another device, the network faces the media access problem.
Which algorithm should the network administrator use to resolve the problem?
(1 Ans.) CSMA/CA
(2) CSMA/CD
(3) SSID Cloaking
(4) MAC Address Filtering
(5) None of these
8. Virtual functions allows you to
(1) create an array of type pointer to base class that can hold pointers to derived classes
(2 Ans.) use the same function call to execute member functions of objects from different classes.
(3) create function that have no body.
(4) group objects of different classes so they can all be accessed by the same function code.
(5) None of these
9. Communication circuits that transmit data in both directions but not at the same time are
operating in :
(1) a simplex mode
(2 Ans.) a half duplex mode
(3) a full duplex mode
(4) an asynchronous mode
(5) None of these
10. Critical section is a program segment
(1) which should run in a certain specified amount of time
(2) which avoids deadlock
(3 Ans.) where shared resources are accessed
(4) which must be endorsed by pair of semaphore operation P and V
(5) None of these
11. A Recurrence Relation
(1) Fibonacci sequence of numbers are type of Recurrence relation
(2) It is called difference equation when two terms will be used interchangeably.
(3) Numeric function is ref-ered to as the solution of the recurrence relation
(4 Ans.) All of the above
(5) None of these
12. Non planar graph with minimum number of vertices have
(1) 9 edges, 6 vertices
(2) 6 edges, 4 vertices
(3) 10 edges, 5 vertices
(4 Ans.) 9 edges, 5 vertices
(5) None of these
13. A language is regular if and only if it is accepted by a finite automation’.
(1 Ans.) The given statement is true
(2) The given statement is false
(3) The given statement is partially true
(4) Sometimes true, sometimes false(5) None of these
14. Which of the following have Fastest speed
(1 Ans.) FDDI ring
(2) None of these
(3) LAN
(4) token bus
(5) ring
15. .................modifies source code and/or data in an effort to make it amenable to future changes.
(1) Reverse engineering
(2 Ans.) Software restructuring
(3) Forward engineering
(4) Software maintenance
(5) None of these
16. Once object oriented programming has been accomplished, unit testing is applied for each
class. Class tests include-
(1) Fault-based testing
(2) Random testing
(3) Partition testing
(4 Ans.) All of the above (5) None of these
17. There are occasions when it does not matter if the function produces 0 or 1 for a given minterm.
Minterms that may produce either 0 or 1 for the function are said to be
(1) Careless conditions
(2 Ans.) Don’t care condition
(3) Maxterm condition
(4) None of these
(5) Minterm condition
18. All the vertices of a walk except very first and very last vertex, is called-
(1 Ans.) Internal vertices
(2) External vertices
(3) Intermediate vertices
(4) Adjacent vertices
(5) None of these
19. The library* files’ that come with C are
(1) Text editor for program development
(2) the compiler and linear
(3) program examples
(4 Ans.) files that contain functions which carry out various commonly used operations and calcula
tions
(5) None of these
20. Which of the follwing are valid characters constant?
(1) ‘in’
(2) ‘11’
(3) ‘10’
(4 Ans.) all of the above (5) None of these
21. In problem analysis, what is to be done?
(1) Structure information
(2 Ans.) Data flow diagram and data dictionary
(3) Structured analysis & prototyping
(4) All of the above
(5) None of these
22. Which of the following is a phase of RAD model?
(1) Business modeling
(2) Data modeling
(3) Application generation
(4 Ans.) All of the above (5) None of these
23. A comment
(1) is a note that can be put into the source code
(2) is ignored by the compiler
(3) starts with the/* character pair (4 Ans.) All of the above (5) None of the above
24. Which of the following is not relevant to networking
(1) low end stand along hubs
(2) stackable hubs
(3) meshnetwork
(4 Ans.) bus hubs
(5) None of these
25. In C++, a function contained within a class is called a-
(1) In built function
(2) User defined function
(3 Ans.) Member function
(4) All of these
(5) None of these
26. A template can be used to create a family of-
(1) Classes
(2) Functions
(3 Ans.) Class and function
(4) All of these
(5) None of these
27. Context free grammar is
(1) A compiler
(2 Ans.) A language generator
(3) A regular expression
(4) All of these
(5) None of these
28. Chaining and Indexing are the starategies of
(1) Contiguous allocation
(2 Ans.) Non-contiguous allocation
(3) Partition allocation
(4) None of these
(5) Static allocation
29. The POST is a series of......... tests.
(1 Ans.) 14
(2) 13
(3) 12
(4) 11
(5) None of these
30. A path in graph G, which contains every vertex of G once and only once?
(1) Eular tour
(2 Ans.) Hamiltonian path
(3) None of these
(4) Eular trail
(5) Hamailtonian tour
31. A tree structured file directory system:
(1 Ans.) allows easy storage and retrieval of file names
(2) is a much debated unnecessary feature
(3) is not essential when we have millions of files
(4) All of the above
(5) None of these
32. The scope resolution operater usually
(1 Ans.) Specifies a particular class
(2) one base class and more than one derived class
(3) resolve ambiguities
(4) All of the above (5) None of these
33. ‘Person’ is
(1) Object
(2 Ans.) Class
(3) Attribute
(4) Structure
(5) None of these
34. Zero has two representations in
(1) 1’s complement
(2 Ans.) sign magnitude
(3) 2'scomplement
(4) All of the above (5) None of these
35. Which are. not property of Binary relations
(1) reflexive relation, symmetric relation, anti symmetrical relation
(2) reflexive, transitive, equivalence relations
(3) transitive, partial ordering relation, symmetric
(4 Ans.) reflexive, partial, chain relation
(5) None of these
36. Which of the following are loaded into main memory when the computer is booted?
(1 Ans.) Internal Command instructions (2) External Command Instructions
(3) Utility programs
(4) Word Processing Instruction
(5) None of these
37. A relation is said to be in INF if:
(1) there is no duplication of data
(2 Ans.) there are no composite attributes in the relation
(3) there are only a few composite attributes
(4) all attributes are of uniform type
(5) None of these
38. Which is false
(1) QBE is based on domain relational calculus.
(2) QUEL is based on tuple relational calculus.
(3) Datalog is based on logical programming language
(4 Ans.) All of the above
(5) None of these
39. The number of flip-flops required in a modulo N counter is
(1) log2(N)+l
(2) Ilog2(N)]
(3 Ans.) [log2(N)l
(4)log2(N-l)
(5) None of these
40. A linker is given object modules for a set of programs that were compiled separately. What
information need not be included in the object module?
(1) Object module
(2) Relocation bits
(3) names and locations of all external symbols defined in the object module
(4 Ans.) Absoulte address of internal symbols
(5) None of these
41. Clipping
(1) It identifies those portion of a picture that are either inside or outside of specified region of
space is referred to as clipping algorithm
(2) There are five types of clipping
(3) Point clipping, Line clipping, Area clipping, Curve clipping Text clipping are examples of
clipping
(4 Ans.) All of the above
(5) None of these
42. In operand
(1) data to be operated
(2) Operand include 8 bit 16 bit data an internal resigters, a memory location
(3) It include also 8 bit or 16 bit address
(4 Ans.) All of the above (5) None of these
43. The PPP frame consists of .............. fields.
(1 Ans.) 7
(2) 5
(3) 6
(4) 8
(5) None of these
44. The ‘end’ manipulator?
(1) appends null character to the stream and flushes it.
(2) causes the next output to be on new line
(3 Ans.) just flushes the stream
(4) All of the above (5) None of these
45. The minimum number of inter chnges needed to convert the array
89, 19, 40, 17, 12, 10, 2, 5, 7, 11,6, 9,70 into heap with maximum element at the root is
(1) 0
(2) 1
(3 Ans.) 2
(4) 3
(5) None of these
46. Which of the following does not form part of an ATM ?
(1) Processor, Card Reader and Printer
(2) Customer Interface. Panel
(3 Ans.) Key Board
(4) Dispenser and Depositor
(5) All of the above.
47. An important application of cryptography, used in computerized commercial and financial
transaction-
(1) Data mining (2) Data warehousing
(3 Ans.) Digital signature
(5) None of these
(4) Media convergence
48. White Box testing, a software testing technique is sometimes called-
(1) Basis path
(2) Graph testing (3) Data flow
(4 Ans.) Glass box testing
(5) None of these
49. Which normal form is considered adequate for normal relational database design?
(1) 5NF
(2) 4NF
(3 Ans.) 3NF
(4) None of these
(5) 2NF
50. In a circular linked list, insertion of a record involves modification of
(1) One pointer
(2 Ans.) two pointer
(3) Multiple pointer
(4) no pointer
(5) None of these
===================================================
1. Computer read which type code I
(1 Ans.) binary code (2) English letter (3) character
(4) integer
(5) None of these
2. Hamming distance is’
(1 Ans.) a theoretical way of measuring errors
(2) a technique for assigning codes to a set of items known to occur with a given probability
(3) a technique for optimizing the intermediate code
(4) All of the above
(5) None of these
3. To find the shortest-path in a weighted graph or network, which of the following algp-rithm is
not used?
(1 Ans.) Warshall’s algorithm
(2) Dijkastra algorithm
(3) Kruskal algorithm
(4) All of the above
(5) None of these
4. The page replacement policy that some times leads to more page faults when the size of the
memory is increased, is
(1 Ans.) FIFO
(2) LRU
(3) MRU
(4) Optimal
(5) None of these
5. The PPP replaced.............
(1) HDLC
(2) OSPF
(3 Ans.) SLIP
(4) PAP
(5) None of these
6. The gate whose output is low if and only if all inputs are high, is
(1 Ans.) NAND
(2) AND
(3) OR
(4) All of these
(5) None of these
7. The ABC bank has implemented WLAN in its network when two or more devices in the network
send data at the same time to another device, the network faces the media access problem.
Which algorithm should the network administrator use to resolve the problem?
(1 Ans.) CSMA/CA
(2) CSMA/CD
(3) SSID Cloaking
(4) MAC Address Filtering
(5) None of these
8. Virtual functions allows you to
(1) create an array of type pointer to base class that can hold pointers to derived classes
(2 Ans.) use the same function call to execute member functions of objects from different classes.
(3) create function that have no body.
(4) group objects of different classes so they can all be accessed by the same function code.
(5) None of these
9. Communication circuits that transmit data in both directions but not at the same time are
operating in :
(1) a simplex mode
(2 Ans.) a half duplex mode
(3) a full duplex mode
(4) an asynchronous mode
(5) None of these
10. Critical section is a program segment
(1) which should run in a certain specified amount of time
(2) which avoids deadlock
(3 Ans.) where shared resources are accessed
(4) which must be endorsed by pair of semaphore operation P and V
(5) None of these
11. A Recurrence Relation
(1) Fibonacci sequence of numbers are type of Recurrence relation
(2) It is called difference equation when two terms will be used interchangeably.
(3) Numeric function is ref-ered to as the solution of the recurrence relation
(4 Ans.) All of the above
(5) None of these
12. Non planar graph with minimum number of vertices have
(1) 9 edges, 6 vertices
(2) 6 edges, 4 vertices
(3) 10 edges, 5 vertices
(4 Ans.) 9 edges, 5 vertices
(5) None of these
13. A language is regular if and only if it is accepted by a finite automation’.
(1 Ans.) The given statement is true
(2) The given statement is false
(3) The given statement is partially true
(4) Sometimes true, sometimes false(5) None of these
14. Which of the following have Fastest speed
(1 Ans.) FDDI ring
(2) None of these
(3) LAN
(4) token bus
(5) ring
15. .................modifies source code and/or data in an effort to make it amenable to future changes.
(1) Reverse engineering
(2 Ans.) Software restructuring
(3) Forward engineering
(4) Software maintenance
(5) None of these
16. Once object oriented programming has been accomplished, unit testing is applied for each
class. Class tests include-
(1) Fault-based testing
(2) Random testing
(3) Partition testing
(4 Ans.) All of the above (5) None of these
17. There are occasions when it does not matter if the function produces 0 or 1 for a given minterm.
Minterms that may produce either 0 or 1 for the function are said to be
(1) Careless conditions
(2 Ans.) Don’t care condition
(3) Maxterm condition
(4) None of these
(5) Minterm condition
18. All the vertices of a walk except very first and very last vertex, is called-
(1 Ans.) Internal vertices
(2) External vertices
(3) Intermediate vertices
(4) Adjacent vertices
(5) None of these
19. The library* files’ that come with C are
(1) Text editor for program development
(2) the compiler and linear
(3) program examples
(4 Ans.) files that contain functions which carry out various commonly used operations and calcula
tions
(5) None of these
20. Which of the follwing are valid characters constant?
(1) ‘in’
(2) ‘11’
(3) ‘10’
(4 Ans.) all of the above (5) None of these
21. In problem analysis, what is to be done?
(1) Structure information
(2 Ans.) Data flow diagram and data dictionary
(3) Structured analysis & prototyping
(4) All of the above
(5) None of these
22. Which of the following is a phase of RAD model?
(1) Business modeling
(2) Data modeling
(3) Application generation
(4 Ans.) All of the above (5) None of these
23. A comment
(1) is a note that can be put into the source code
(2) is ignored by the compiler
(3) starts with the/* character pair (4 Ans.) All of the above (5) None of the above
24. Which of the following is not relevant to networking
(1) low end stand along hubs
(2) stackable hubs
(3) meshnetwork
(4 Ans.) bus hubs
(5) None of these
25. In C++, a function contained within a class is called a-
(1) In built function
(2) User defined function
(3 Ans.) Member function
(4) All of these
(5) None of these
26. A template can be used to create a family of-
(1) Classes
(2) Functions
(3 Ans.) Class and function
(4) All of these
(5) None of these
27. Context free grammar is
(1) A compiler
(2 Ans.) A language generator
(3) A regular expression
(4) All of these
(5) None of these
28. Chaining and Indexing are the starategies of
(1) Contiguous allocation
(2 Ans.) Non-contiguous allocation
(3) Partition allocation
(4) None of these
(5) Static allocation
29. The POST is a series of......... tests.
(1 Ans.) 14
(2) 13
(3) 12
(4) 11
(5) None of these
30. A path in graph G, which contains every vertex of G once and only once?
(1) Eular tour
(2 Ans.) Hamiltonian path
(3) None of these
(4) Eular trail
(5) Hamailtonian tour
31. A tree structured file directory system:
(1 Ans.) allows easy storage and retrieval of file names
(2) is a much debated unnecessary feature
(3) is not essential when we have millions of files
(4) All of the above
(5) None of these
32. The scope resolution operater usually
(1 Ans.) Specifies a particular class
(2) one base class and more than one derived class
(3) resolve ambiguities
(4) All of the above (5) None of these
33. ‘Person’ is
(1) Object
(2 Ans.) Class
(3) Attribute
(4) Structure
(5) None of these
34. Zero has two representations in
(1) 1’s complement
(2 Ans.) sign magnitude
(3) 2'scomplement
(4) All of the above (5) None of these
35. Which are. not property of Binary relations
(1) reflexive relation, symmetric relation, anti symmetrical relation
(2) reflexive, transitive, equivalence relations
(3) transitive, partial ordering relation, symmetric
(4 Ans.) reflexive, partial, chain relation
(5) None of these
36. Which of the following are loaded into main memory when the computer is booted?
(1 Ans.) Internal Command instructions (2) External Command Instructions
(3) Utility programs
(4) Word Processing Instruction
(5) None of these
37. A relation is said to be in INF if:
(1) there is no duplication of data
(2 Ans.) there are no composite attributes in the relation
(3) there are only a few composite attributes
(4) all attributes are of uniform type
(5) None of these
38. Which is false
(1) QBE is based on domain relational calculus.
(2) QUEL is based on tuple relational calculus.
(3) Datalog is based on logical programming language
(4 Ans.) All of the above
(5) None of these
39. The number of flip-flops required in a modulo N counter is
(1) log2(N)+l
(2) Ilog2(N)]
(3 Ans.) [log2(N)l
(4)log2(N-l)
(5) None of these
40. A linker is given object modules for a set of programs that were compiled separately. What
information need not be included in the object module?
(1) Object module
(2) Relocation bits
(3) names and locations of all external symbols defined in the object module
(4 Ans.) Absoulte address of internal symbols
(5) None of these
41. Clipping
(1) It identifies those portion of a picture that are either inside or outside of specified region of
space is referred to as clipping algorithm
(2) There are five types of clipping
(3) Point clipping, Line clipping, Area clipping, Curve clipping Text clipping are examples of
clipping
(4 Ans.) All of the above
(5) None of these
42. In operand
(1) data to be operated
(2) Operand include 8 bit 16 bit data an internal resigters, a memory location
(3) It include also 8 bit or 16 bit address
(4 Ans.) All of the above (5) None of these
43. The PPP frame consists of .............. fields.
(1 Ans.) 7
(2) 5
(3) 6
(4) 8
(5) None of these
44. The ‘end’ manipulator?
(1) appends null character to the stream and flushes it.
(2) causes the next output to be on new line
(3 Ans.) just flushes the stream
(4) All of the above (5) None of these
45. The minimum number of inter chnges needed to convert the array
89, 19, 40, 17, 12, 10, 2, 5, 7, 11,6, 9,70 into heap with maximum element at the root is
(1) 0
(2) 1
(3 Ans.) 2
(4) 3
(5) None of these
46. Which of the following does not form part of an ATM ?
(1) Processor, Card Reader and Printer
(2) Customer Interface. Panel
(3 Ans.) Key Board
(4) Dispenser and Depositor
(5) All of the above.
47. An important application of cryptography, used in computerized commercial and financial
transaction-
(1) Data mining (2) Data warehousing
(3 Ans.) Digital signature
(5) None of these
(4) Media convergence
48. White Box testing, a software testing technique is sometimes called-
(1) Basis path
(2) Graph testing (3) Data flow
(4 Ans.) Glass box testing
(5) None of these
49. Which normal form is considered adequate for normal relational database design?
(1) 5NF
(2) 4NF
(3 Ans.) 3NF
(4) None of these
(5) 2NF
50. In a circular linked list, insertion of a record involves modification of
(1) One pointer
(2 Ans.) two pointer
(3) Multiple pointer
(4) no pointer
(5) None of these
No comments:
Post a Comment