Search Topics....

Friday, June 26, 2009

PSC Questions asked for EDP Manager 2009

1. In a memory, the minimum time delay between the initiation of successive memory operations is : cycle time

2. The first Operating System used in Microprocessor based system was : CP/M

3. The Boolean expression A(B+C)+AB+AC is independent of the Boolean variable : B

4. A byte addressable computer has memory capacity of 4096 KB and can perform 64 operations. An instruction involving 3 memory operands and one operator needs :
72 bits

5. Which addressing mode used in an instruction of the form ADD X, Y : Absolute

6. The addressing mode used in the stack related instruction PUSH B is : Register indirect

7. Parallel printers use : Centronics interface

8. An assembler that runs on one machine, but generating code for another machine is called : Cross assembler

9. A computer with a 32 bit wide data bus implements its memory using 8 K x 8 static RAM chips. The smallest memory that this computer can have is : 32 KB

10. To construct a binary Mod-N counter, the number of flip-flops needs is : Log2N

11. The total number of possible ordered trees using 3 nodes A,B,C is : 12

12. The binary search algorithm is of order : log n

13. The minimum number of edges in a connected cyclic graph on N vertices is : N

14. The execution time of a recursive algorithm is given as ; T(n)=c+T(n-1), if n>1 =d, if n≤1. The order of the algorithm is : n

15. Assuming 2 sorted lists of sizes ‘S1 ’ and ‘S2’, the worst case number of comparisons needed by the merge sort algorithm is : S1+S2 -1

16. If an M x N matrix is stored in column major form, the index calculation required to access the (i, j)th entry is : M .(j-1)+i

17. Four different algorithms L1, L2, L3 and L4 with orders of log(n), log{log(n)}, n log(n) and n/log(n) respectively have been proposed to solve a specified problem.

Which of these is the best one : L2

18. The principle of locality of reference is cited to justify the usage of : Cache memory

19. On a particular system, using Quick sort, if it takes 100 msec to sort 1000 records, time taken to sort 100 records will be : 6.7msec

20. In traversing a tree using Breadth First Search, the data structure used is : Queue

21. In a data base, the column of a table is referred to as the : Attribute

22. The part of a program which accesses a shared resource and which should be executed indivisibly is called : Critical section

23. In a database design, if every non-key attribute is functionally dependent on the primary key, then the relation will be in : Third normal form

24. An attribute of one table matching the primary key of another table is known as : Foreign Key

25. Given the functional dependencies X →Y; Y→Z; X →W and Z →AB, which of the following does not hold good : W → Z

26. SQL stands for ------------ Query Language : Structured

27. In SQL databases, the memory area used for internal processing is called : Cursor

28. The number of relationships in which an entity can appear in an E-R diagram is called its : Cardinality

29. The process of analyzing, archived data to obtain tactical and strategic information is often called : Data mining

30. If a relation is in Boyce-Codd normal form, then it is also in : 3rd Normal form

31. RAID is a standard used in the design of : Disk Memory

32. In an OS, the process of buffering data intended for a peripheral device, onto a disk area, for later bulk transfer is known as : Spooling

33. Kernel in Operating System is : A set of primitive functions upon which OS functions are built.

34. Which of the following scheduling policy is most suited for a time sharing OS : Round Robin

35. For real time OS, which of the following is the most suitable scheduling scheme : Preemptive

36. In a paged memory, access times of primary and secondary memories are 10ns and 100ns respectively. If the average access time is 23.5 nsec, hit ratio is : .85

37. The size of the virtual memory depends on the size of : Address bus

38. Three processes A, B, C have peak time demands of 3, 4, 6 resource units respectively of a particular type. What is the minimum number of resources to be provided

to ensure that deadlock never occurs : 11

39. A computer has 8 MB in main memory, 128 KB cache with block size of 4KB. If direct mapping scheme is used, how many different main memory blocks can map into

a given physical cache block : 64

40. The technique that allows only one user to work with a file at a particular time is called : Locking

41. The UNIX operating system was first installed in : PDP/7

42. MS-DOS makes use of a hardware ROM containing device drivers called : BIOS

43. In UNIX, which of the following system calls transform an executable binary file into a process : Exec

44. Berkeley UNIX is popularly known as : BSD Unix

45. In UNIX, ‘grep’ program is used for implementing : Filters

46. TSR software refers to : Terminate and Stay Resident

47. Unix and MS-DOS file system differ in the following feature : Mounted file systems

48. In DOS, file allocation is carried out using : FAT

49. In UNIX ‘link’ refers to : New directory entry pointing to an existing file

50. For implementing recursion in a programming language, its compiler uses the following data structure extensively : Stack

51. In a hypothetical language, assume that all arithmetic operators have equal precedence and associate to the left. The expression 6x3-2-1x2 evaluates to : 18

52. Which of the following instructions is redundant (can be implemented by other conventional ones) : Clear x

53. BNF is a meta language for : Specifying a context free grammar

54. In JAVA language, what will be result of evaluating the expression 25 & 13 : 9

55. In JAVA , after execution of the following statements, the values of x, m, and n will be :
int x, m, n;
x=++m +n++; : x=26, m=11,n=16

56. What will be the output of the following JAVA code :

byte x=64, y;
system.out.println(y); : 0

57. Hot Java is a : Web browser

58. Which of the following typecasts result in loss of information : float to int

59. JAVA toolkit package containing classes that implement platform independent GUI is : AWT

60. The JAVA language was originally called : OAK

61. A program Graph has ‘start’ and ‘end’ nodes. The total number of paths from start to end is equivalent to the -----------set of test data required to test the software

: minimum

62. In a Program Graph, ‘X’ is an if-then-else node. If the number of paths from start node to X is ‘p’ number of paths from if part to end node is ‘q’ and from else part

to end node is ’r’, the total number of possible paths through X is : P(q+r)

63. The quality of a software which causes it to continue to operate despite application of invalid input is called : Robustness

64. A program P calls 2 subprograms P1 and P2. If P1 can fail 50% of the times and P2, 40% of the times, P can fail -----------of the times : 70%

65. Consider a Program Graph (PG) with statements as nodes and control as edges. Which of the following is not true for any PG : Always acyclic

66. In program design, if the number of conditions in a decision table is ‘n’, the maximum number of rules(columns) possible is : 2n

67. In Data Flow Diagrams(DFD), the procedure of expanding a process in the DFD into a set of equivalent smaller processes is called : levelling

68. In programming languages, literal means : String Constant

69. In Object Oriented Software Design, which of the following is not true : An object can belong to 2 classes

70. Consider the program segment comprising of 3 statements :
y=y-x where x and y are integers. Execution of these 3 statements do the following : Swap the contents of x and y

71. What will be the output of execution of the following statements in C :
for (i=3;i<15;i+=3)
{printf(“% d”, i);
} : 3 7 11

72. In C, puts (arg V[0]; prints the : File name of executable code file

73. Who is credited with the creation of WWW : Tim Berners-Lee

74. Which of the following is not a web browser : HTML

75. MIME is associated with the following : E mail

76. The mode of communication in which transmission can be bidirectional. But in only one direction at a time is called : Half Duplex

77. Error detection at the data link layer is achieved using : CRC codes

78. In Serial communication, start and stop bits are used for : Synchronization

79. In a transmitter, the unmodulated signal is known as : Baseband signal

80. In a computer network, routing issues are handled in : Network Layer

81. In a computer network, functions of dialog management and synchronization are taken care of in the : Session’s layer

82. Which of the following topologies has the highest reliability : Mesh

83. In data communications, bauds signify ---------- rate : Signaling

84. ADSL is abbreviation for : Asymmetric Digital Subscriber Line

85. The topmost layer in the ISO model that needs to be implemented in an intermediate node is the -----------layer : Network

86. VPN denotes a : Virtual Private Network

87. Data rate of a ring network is 20Mbps and signal propagates at 200m/┬Ásec. The number of bits that can be placed on the channel of length 200km is : 20000bits

88. The frequency range over which coaxial cables are typically used is : 106 to 108 Hz

89. In internet, the well known port 21 refers to the application : FTP

90. The maximum data rate possible through a noise free 4 kHz binary channel is : 8000 bps

91. The transparency provided in a distributed system where users cannot tell how many copies of a resource exist is termed as : Replication transparency

92. Which of the following configurations can be said to be tightly coupled : Shared memory multiprocessors

93. In distributed systems, RPC stands for : Remote Procedure Call

94. Assume there are 4 file servers each with a 0.95 chance of being up at any instant. Probability of at least one being available is : 1-(.05)4

95. Which of the following category of classification of multiple computer systems is not generally used in practice : MISD

96. In a distributed system, to ensure that concurrent transactions do not interfere with each other, the transactions must have the following specific property :


97. Translation Lookaside Buffer(TLB) is also called : Associative Memory

98. In Internet Standards Terminology, RFC refers to : Request For Comments

99. Which of the following denotes a network management protocol in an internet : SNMP

100. IEEE 802.11 is an IEEE standard for : Wireless LAN

Disclaimer : E & OE
The informations furnished here is based on various media like Newspaper, Radio, Television & web. Make sure that the answers are correct.

No comments: