1. In a memory, the minimum time delay between the initiation of successive memory operations is : cycle time
2. The first Operating System used in Microprocessor based system was : CP/M
3. The Boolean expression A(B+C)+AB+AC is independent of the Boolean variable : B
4. A byte addressable computer has memory capacity of 4096 KB and can perform 64 operations. An instruction involving 3 memory operands and one operator needs :
72 bits
5. Which addressing mode used in an instruction of the form ADD X, Y : Absolute
6. The addressing mode used in the stack related instruction PUSH B is : Register indirect
7. Parallel printers use : Centronics interface
8. An assembler that runs on one machine, but generating code for another machine is called : Cross assembler
9. A computer with a 32 bit wide data bus implements its memory using 8 K x 8 static RAM chips. The smallest memory that this computer can have is : 32 KB
10. To construct a binary Mod-N counter, the number of flip-flops needs is : Log2N
11. The total number of possible ordered trees using 3 nodes A,B,C is : 12
12. The binary search algorithm is of order : log n
13. The minimum number of edges in a connected cyclic graph on N vertices is : N
14. The execution time of a recursive algorithm is given as ; T(n)=c+T(n-1), if n>1 =d, if n≤1. The order of the algorithm is : n
15. Assuming 2 sorted lists of sizes ‘S1 ’ and ‘S2’, the worst case number of comparisons needed by the merge sort algorithm is : S1+S2 -1
16. If an M x N matrix is stored in column major form, the index calculation required to access the (i, j)th entry is : M .(j-1)+i
17. Four different algorithms L1, L2, L3 and L4 with orders of log(n), log{log(n)}, n log(n) and n/log(n) respectively have been proposed to solve a specified problem.
Which of these is the best one : L2
18. The principle of locality of reference is cited to justify the usage of : Cache memory
19. On a particular system, using Quick sort, if it takes 100 msec to sort 1000 records, time taken to sort 100 records will be : 6.7msec
20. In traversing a tree using Breadth First Search, the data structure used is : Queue
21. In a data base, the column of a table is referred to as the : Attribute
22. The part of a program which accesses a shared resource and which should be executed indivisibly is called : Critical section
23. In a database design, if every non-key attribute is functionally dependent on the primary key, then the relation will be in : Third normal form
24. An attribute of one table matching the primary key of another table is known as : Foreign Key
25. Given the functional dependencies X →Y; Y→Z; X →W and Z →AB, which of the following does not hold good : W → Z
26. SQL stands for ------------ Query Language : Structured
27. In SQL databases, the memory area used for internal processing is called : Cursor
28. The number of relationships in which an entity can appear in an E-R diagram is called its : Cardinality
29. The process of analyzing, archived data to obtain tactical and strategic information is often called : Data mining
30. If a relation is in Boyce-Codd normal form, then it is also in : 3rd Normal form
31. RAID is a standard used in the design of : Disk Memory
32. In an OS, the process of buffering data intended for a peripheral device, onto a disk area, for later bulk transfer is known as : Spooling
33. Kernel in Operating System is : A set of primitive functions upon which OS functions are built.
34. Which of the following scheduling policy is most suited for a time sharing OS : Round Robin
35. For real time OS, which of the following is the most suitable scheduling scheme : Preemptive
36. In a paged memory, access times of primary and secondary memories are 10ns and 100ns respectively. If the average access time is 23.5 nsec, hit ratio is : .85
37. The size of the virtual memory depends on the size of : Address bus
38. Three processes A, B, C have peak time demands of 3, 4, 6 resource units respectively of a particular type. What is the minimum number of resources to be provided
to ensure that deadlock never occurs : 11
39. A computer has 8 MB in main memory, 128 KB cache with block size of 4KB. If direct mapping scheme is used, how many different main memory blocks can map into
a given physical cache block : 64
40. The technique that allows only one user to work with a file at a particular time is called : Locking
41. The UNIX operating system was first installed in : PDP/7
42. MS-DOS makes use of a hardware ROM containing device drivers called : BIOS
43. In UNIX, which of the following system calls transform an executable binary file into a process : Exec
44. Berkeley UNIX is popularly known as : BSD Unix
45. In UNIX, ‘grep’ program is used for implementing : Filters
46. TSR software refers to : Terminate and Stay Resident
47. Unix and MS-DOS file system differ in the following feature : Mounted file systems
48. In DOS, file allocation is carried out using : FAT
49. In UNIX ‘link’ refers to : New directory entry pointing to an existing file
50. For implementing recursion in a programming language, its compiler uses the following data structure extensively : Stack
51. In a hypothetical language, assume that all arithmetic operators have equal precedence and associate to the left. The expression 6x3-2-1x2 evaluates to : 18
52. Which of the following instructions is redundant (can be implemented by other conventional ones) : Clear x
53. BNF is a meta language for : Specifying a context free grammar
54. In JAVA language, what will be result of evaluating the expression 25 & 13 : 9
55. In JAVA , after execution of the following statements, the values of x, m, and n will be :
int x, m, n;
m=10;
n=15;
x=++m +n++; : x=26, m=11,n=16
56. What will be the output of the following JAVA code :
byte x=64, y;
y=(byte)(x<<2);
system.out.println(y); : 0
57. Hot Java is a : Web browser
58. Which of the following typecasts result in loss of information : float to int
59. JAVA toolkit package containing classes that implement platform independent GUI is : AWT
60. The JAVA language was originally called : OAK
61. A program Graph has ‘start’ and ‘end’ nodes. The total number of paths from start to end is equivalent to the -----------set of test data required to test the software
: minimum
62. In a Program Graph, ‘X’ is an if-then-else node. If the number of paths from start node to X is ‘p’ number of paths from if part to end node is ‘q’ and from else part
to end node is ’r’, the total number of possible paths through X is : P(q+r)
63. The quality of a software which causes it to continue to operate despite application of invalid input is called : Robustness
64. A program P calls 2 subprograms P1 and P2. If P1 can fail 50% of the times and P2, 40% of the times, P can fail -----------of the times : 70%
65. Consider a Program Graph (PG) with statements as nodes and control as edges. Which of the following is not true for any PG : Always acyclic
66. In program design, if the number of conditions in a decision table is ‘n’, the maximum number of rules(columns) possible is : 2n
67. In Data Flow Diagrams(DFD), the procedure of expanding a process in the DFD into a set of equivalent smaller processes is called : levelling
68. In programming languages, literal means : String Constant
69. In Object Oriented Software Design, which of the following is not true : An object can belong to 2 classes
70. Consider the program segment comprising of 3 statements :
y=x+y;
x=y-x
y=y-x where x and y are integers. Execution of these 3 statements do the following : Swap the contents of x and y
71. What will be the output of execution of the following statements in C :
for (i=3;i<15;i+=3)
{printf(“% d”, i);
++i;
} : 3 7 11
72. In C, puts (arg V[0]; prints the : File name of executable code file
73. Who is credited with the creation of WWW : Tim Berners-Lee
74. Which of the following is not a web browser : HTML
75. MIME is associated with the following : E mail
76. The mode of communication in which transmission can be bidirectional. But in only one direction at a time is called : Half Duplex
77. Error detection at the data link layer is achieved using : CRC codes
78. In Serial communication, start and stop bits are used for : Synchronization
79. In a transmitter, the unmodulated signal is known as : Baseband signal
80. In a computer network, routing issues are handled in : Network Layer
81. In a computer network, functions of dialog management and synchronization are taken care of in the : Session’s layer
82. Which of the following topologies has the highest reliability : Mesh
83. In data communications, bauds signify ---------- rate : Signaling
84. ADSL is abbreviation for : Asymmetric Digital Subscriber Line
85. The topmost layer in the ISO model that needs to be implemented in an intermediate node is the -----------layer : Network
86. VPN denotes a : Virtual Private Network
87. Data rate of a ring network is 20Mbps and signal propagates at 200m/µsec. The number of bits that can be placed on the channel of length 200km is : 20000bits
88. The frequency range over which coaxial cables are typically used is : 106 to 108 Hz
89. In internet, the well known port 21 refers to the application : FTP
90. The maximum data rate possible through a noise free 4 kHz binary channel is : 8000 bps
91. The transparency provided in a distributed system where users cannot tell how many copies of a resource exist is termed as : Replication transparency
92. Which of the following configurations can be said to be tightly coupled : Shared memory multiprocessors
93. In distributed systems, RPC stands for : Remote Procedure Call
94. Assume there are 4 file servers each with a 0.95 chance of being up at any instant. Probability of at least one being available is : 1-(.05)4
95. Which of the following category of classification of multiple computer systems is not generally used in practice : MISD
96. In a distributed system, to ensure that concurrent transactions do not interfere with each other, the transactions must have the following specific property :
Serializability
97. Translation Lookaside Buffer(TLB) is also called : Associative Memory
98. In Internet Standards Terminology, RFC refers to : Request For Comments
99. Which of the following denotes a network management protocol in an internet : SNMP
100. IEEE 802.11 is an IEEE standard for : Wireless LAN
Disclaimer : E & OE
The informations furnished here is based on various media like Newspaper, Radio, Television & web. Make sure that the answers are correct.
No comments:
Post a Comment