Search Topics....

Saturday, December 31, 2011

Farewell to 2011 & Welcome 2012

Wish You & Yours a Very Happier and Prosperous New Year...

Sunday, December 25, 2011

A piece of technology could help a new generation discover how to program computers.

Friday, December 23, 2011

What is Google Doodle ?

The holiday Google Doodle has arrived. Call it an early Christmas present -- complete with interactive flashing lights and the tune “Jingle Bell"

Thursday, December 8, 2011

What is Geotagging ?

Geotagging (also written as GeoTagging) is the process of adding geographical identification metadata to various media such as a geotagged photograph or video, websites, SMS messages, QR Codes or RSS feeds and is a form of geospatial metadata. These data usually consist of latitude and longitude coordinates, though they can also include altitude, bearing, distance, accuracy data, and place names.

Geotagging can help users find a wide variety of location-specific information.

Monday, December 5, 2011

Quiz on Information Technology

Posted: 04 Dec 2011 08:24 PM PST
1. Java programming language developed by
A. James Gosling

2. Java is initially called as
A. Oak

3. JVM stands for
A. Java Virtual Machine

4. After compilation of Java Code we get
A. Byte Code

5. Java is most popular web development tool because of its
A. Platform Independence
Posted: 04 Dec 2011 07:38 PM PST
1. Linux OS developed by
A. Linus Torvald ( Finland )

2. Debian , Fedora and  Suse are
A. Linux Distributions

3. eg.s of Linux Desktop environment are

4. Image Retouching and editing tool in Linux

5.Founder of GNU Project
A. Richard Stallman

More >> 
Posted: 04 Dec 2011 07:14 PM PST
1. Founders of Apple Computer , Inc
A. Steve Jobs , Steve Wozniak , Ronald Wayne

2.Apple Computer , Inc is established on
A. April1, 1976

3. Head Quarter is located at
A. Cupertino, California

4. First PC introduced by Apple
A. Apple I

5. C.E.O of Apple Computers
A. Tim Cook

More >>
Posted: 04 Dec 2011 05:27 PM PST
1. First Super Computer designed by
A. Seymour Cray

2.Fastest Super Computer in the world
A. K Computer ( Fujitsu , Japan )

3. Processing techniques used in Super Computer
A. Parallel Processing

4. Speed of Super Computer is measured in
A. FLOPS(FLoating Point Operations Per Second)

5. worlds fastest supercomputer K Computer at
A. 10.51 peta FLOPS

Saturday, December 3, 2011

IT Quiz Questions 2011 - 12

Posted: 03 Dec 2011 05:48 AM PST
1. What W3C stands for?

A.World Wide Web Consortium

2. Director of W3C ?

A.Tim Berners-Lee

3. Inventor of WWW?

A. Tim Berners Lee

4. Software used for viewing webpages are called ?

A. Web Browser

5. Name the Browser developed by Apple ?

A . Safari

IT Quiz for School Students
Posted: 03 Dec 2011 05:22 AM PST domain went online in ..?
2.Which year Google acquired ?
A. Feb 2003
3. Google advertisement program ?
A. Adwords
4. Google ads publisher program ?
A. Adsense
5. Search algorithm employed in google search engine ?
A. Page Rank Algorithm
Posted: 02 Dec 2011 05:47 PM PST
1. Mobile operating system developed by google?
A. Android

2. What the word 'Wiki' Stands in Wikipedia?
A. Quick

3. Who is the father of computer Science?
A. Alen Turing

4. Award known as 'Nobel Prize ' in Computer Science
A. Turing Award

5. Founder of Wiki Leaks
A. Julian Asange.

6. New Operating System from Apple
A. Lion

7. Father of Artificial Intelligence?
A. John Mcarthy

8. Bing is the search engine developed by
A. Microsoft

9. In Which year first email was sent ?
A. 1971

10. Who invented Difference Engine
A. Charles Babbage

Wednesday, November 23, 2011

Cloud Computing Vs Grid Computing

Cloud computing

Cloud computing is the use of a 3rd party service(Web Services) to perform computing needs. Here Cloud depicts Internet . With cloud computing, companies can scale up to massive capacities in an instant without having to invest in new infrastructure. Cloud computing is benefit to small and medium-sized businesses. Basically consumers use what they need on the Internet and pay only for what they use.

Cloud computing incorporates infrastructure as a service (IaaS), platform as a service (PaaS) and software as a service (SaaS) as well as Web 2.0

Cloud computing eliminates the costs and complexity of buying, configuring, and managing the hardware and software needed to build and deploy applications, these applications are delivered as a service over the Internet (the cloud).
  • Amazon Web Services (AWS) – AWS delivers a set of services that together form a reliable, scalable platform ‘in the cloud’. These pay-as-you-use cloud computing services include Amazon S3, Amazon EC2, Amazon SimpleDB, Amazon SQS, Amazon FPS, and others.
  • – Delivers businesses over the internet using the software as a service model.
  • Google Apps - Software-as-a-service for business email, information sharing and security

Grid computing

Grid computing is a form of distributed computing whereby resources of many computers in a network is used at the same time, to solve a single problem. Grid systems are designed for collaborative sharing of resources. It can also be thought of as distributed and large-scale cluster computing.

Cloud Computing Vs Grid Computing

The only differentiating factor between the two is the method it adopts for computing the tasks within their individual environments. In grid computing, a single big task is split into multiple smaller tasks which are further distributed to different computing machines. Upon completion of these smaller tasks, they are sent back to the primary machine which in return offers a single output.

Whereas a cloud computing architecture is intended to enable users to use difference services without the need for investment in the underlying architecture. Though, grid too offers similar facility for computing power, but cloud computing isn’t restricted to just that.

Monday, November 21, 2011


The much awaited India’s ultra low cost Aakash tablet is finally here and is creating ripples all around. Datawind launches Ubislate 7 in India as Aakash. DataWind Ltd, the leading developer of wireless web access products and services has come up with Aakash tablet.

Saturday, October 8, 2011

India launches world’s cheapest $35 tablet PC meant for students

Aakash UbiSlate 7 Specs:

•         Hardware:

–        Processor: 366 Mhz with Graphics accelerator and HD Video processor

–        Memory (RAM): 256MB RAM / Storage (Internal): 2GB Flash

–        Storage (External): 2GB to 32GB Supported

–        Peripherals (USB2.0 ports, number):  1 Standard USB port

–        Audio out: 3.5mm jack / Audio in: 3.5mm jack

–        Display and Resolution: 7” display with 800×480 pixel resolution

–        Input Devices: Resistive touch screen

–        Connectivity and Networking: WiFi IEEE 802.11 a/b/g

–        Power and Battery: Up to 180 minutes on battery.  AC adapter 200-240 volt range.

•         Software:

–        OS: Android 2.2

–        Document Rendering

•         Supported Document formats: DOC, DOCX, PPT, PPTX, XLS, XLSX, ODT, ODP

•         PDF viewer, Text editor

–        Multimedia and Image Display

•         Image viewer supported formats: PNG, JPG, BMP and GIF

•         Supported audio formats: MP3, AAC, AC3, WAV, WMA

•         Supported video formats: MPEG2, MPEG4, AVI, FLV

–        Communication and Internet

•         Web browser – Standards Compliance:  xHTML 1.1 compliant, JavaScript 1.8 compliant

•         Separate application for online YouTube video

•         Safety and other standards compliance

–        CE certification / RoHS certification

Other: Additional Web Browser: UbiSurfer-Browser with compression/acceleration and IE8 rendering.

PSC Published Answer key of HSST Computer Science Exam : 98/2011

Finally Kerala PSC published the provisional keys for HSST Computer Science Exam : 98/2011. You can access it from

Compare it with the answer keys consolidated from this blog readers at

Best Wishes

Friday, October 7, 2011

Direct PhD at JNU, New Delhi, Last Date: 14th October, 2011

Application Forms and Prospectus can be obtained through Post by sending a request along with crossed Bank Draft for Rs. 300/- drawn in favour of Jawaharlal Nehru University payable at New Delhi along with a self-addressed (unstamped) envelope of minimum size of 30 x 25 cm with the words "Direct Admission to PhD Programme" inscribed on it to the Section Officer (Admissions), Room No. 28, Administrative Block, Jawaharlal Nehru University, New Delhi - 110067.

Application Forms and Prospectus will also be available at the Counter in the Administrative Block of the University on cash payment of Rs. 200/- per set from 10.00 a.m. to 1.00 p.m. and 2.00 p.m. to 4.00 p.m. on working days (Monday to Friday) during the following period: From 1st September to 14th October, 2011School of Computer & Systems Sciences
The School of Computer & Systems Sciences was established way back in 1975. It is one of the foremost institutions to start teaching and research programmes in the broad areas of computer science. The School has established itself as one of the most prestigious institutions in the area of computer education in the country. The School offers programmes of instruction and research leading to degree of MCA, M.Tech.(M.Phil.) and Ph.D. It attracts best of the students from all over the country. Every year around ten thousand students including applicants from the neighbouring SAARC countries, appear for the MCA and M.Tech. entrance examination. The popularity of the courses offered can be judged from the excellent (100%) placement of successful students in the best of the companies in the field of Computer Science and Information Technology. The graduates from the School have been placed in companies such as IBM, CSC, TCS, Flextronics, Siemens, HP, Parot Systems, CSG, Accenture, Cadence, Genpact, etc. The School has also trained students from foreign universities in the field of Computer Science.
The School continues to be at the forefront of offering interdisciplinary courses - a goal in JNU's charter. The School has the following specialized laboratories where M.Tech./M.Phil., Ph.D. students are actively engaged in research: Artificial Intelligence & Software Engineering, Data Communication and Networks, Microprocessor and Operating Systems, Multimedia & Modelling, Natural Language Processing, Parallel Processing and Distributed Computing, Systems Software.
THRUST AREAS: Computer Graphics, Databases, Data Mining, Data Warehousing, Knowledge Engineering, Mobile Networks, Modelling and Simulation, Natural Language Processing, Optimization Theory, Parallel and Distributed Computing.
(i) Direct Admission to Ph.D. Programme
Course Work - The selected candidates are required to take a minimum of six courses (including the seminar course of 3 credits) within first two consecutive semesters.
Successful completion of course-work is pre-requisite for confirmation in the Ph.D. programme. Due to the structure of the course work, admission to Direct Ph.D. programme is considered only in the Monsoon Semester.
(ii) M.Phil./Ph.D. and M.Tech/Ph.D. (Computer Science & Technology)
Category-I (through entrance examination): Candidates must appear in the written examination conducted by the University. Based on the written test, short-listed candidates will have to appear in the interview. Admission is offered to candidates, finally selected on the basis of their performance in the written test and the interview.
Each student aiming to obtain an M.Phil./Ph.D. or M.Tech./Ph.D should clearly mention the stream, viz M.Phil/Ph.D. or M.Tech./Ph.D. in the application form. No change-over from one stream to another will be allowed after the confirmation of the admission.
Category II (NET Qualified candidates) : Candidates who have qualified for Junior Research Fellowship through CSIR/UGC National Eligibility Test (NET) examination are eligible to apply separately in the prescribed form under this category. Candidates shall have to appear for an interview and their selection will depend on their performance in the interview. Candidates who have appeared in the CSIR/UGC NET examination but results awaited may also apply under this category. However, such candidates will be interviewed upon submission of a valid proof of having qualified for or awarded the JRF certificate at the time of interview. Moreover, only candidates with valid proof of JRF qualification would be provided permissible travelling allowance for attending interview. Please note that candidates who have been awarded "Lecturership" in the CSIR/UGC examination are not eligible and will not be interviewed.
Duration of Course: The course work shall be completed within first two consecutive semesters and the dissertation in the subsequent third and fourth semesters.
Credit Requirements: No student admitted to the programme shall be eligible for the award of M.Tech. degree unless he/she secures 50 credits in all out of which at least 30 credits shall be for course work, 5 credits for seminar and 15 credits for the dissertation. In some cases, if the students complete the course work with the CGPA of 6.5 or more the students may be permitted to register directly for Ph.D. without submitting an M.Tech. dissertation.
(iii) MCA (Master of Computer Applications)
Students are admitted to the MCA programme each year on the basis of their performance in the written test conducted by the University.
This three-year programme is designed to provide necessary theoretical background and practical experience in Computer Science and Applications to meet the growing manpower requirements in automatic computing.
SCHOLARSHIPS: Scholarships of the value of Rs.600/- per month will be awarded during the fifth and sixth semesters to those students of MCA programme who have met the prescribed grades/courses requirements.
(i) Direct Admission to Ph.D. Programme
The candidates interested in research in Parallel and Distributed Systems, Mobile Computing, NLP & Mobile Ad hoc Network, Databases, Data mining, Data Warehousing, Software Engineering, Scientific Computing/ Parallel Computing/Grid Computing, Support Vector Machine Methods, Neural Networks,Wireless Adhoc/Sensor Networks, Service Oriented Architecture, will be considered for Diret admission to Ph.D. progrmme this year.
Only those candidates shall be considered for Direct admission to the Ph. D. Programme who have —
a) obtained 2 years M.Tech./M.Phil degree of a recognized University/Research Institution, (except those who joined M.Tech. on or before 2002-2003) with minimum Final Grade Point Average (FGPA) of 6.00 in 10 point scale/comparable standard where the grading is based on system other than 10 point scale. The candidates who have obtained M.Tech./M.Phil. degree from a University/Institution where dissertation is not graded or grading is not on 10-point scale, are required to forward a copy of their M.Tech./M.Phil. dissertation along with the Application Form for the purpose of assessment of their credentials; OR
(b) at least 2 years research experience in reputed institutions with research publication(s) comparable to M.Tech./M.Phil. standard. In addition, they should have obtained Master's Degree with FGPA of 6.00 in the 10 point scale/comparable standard or equivalent percentage.
(ii) M.Phil./Ph.D. and M.Tech./Ph.D.:Master's degree in Computer Science or Mathematics or Statistics or Operational Research or in any branch of Science or Bachelor's degree in any branch of Engineering or Master of Computer Applications (MCA) with at least 55% marks.
(iii) M.C.A.: Bachelor's degree in any discipline with adequate competence in Mathematics under 10+2+3 pattern of education with at least 55% marks.

Courtesy : JNU Website

Tuesday, October 4, 2011

UGC NET Application : Important dates

i) Last date for Applying On-Line :  25-10-2011

ii) Last date for receiving the printout of online Application Form (2 copies), Attendance Slip (one copy) and Admission Card (one copy) at the respective test centre opted by the candidate (with fee receipt & category certificate(s) ) : 31-10-2011

Sunday, October 2, 2011

Friday, September 30, 2011

PSC Trainer Questions on Computer Science

Q? : When a key is pressed on the keyboard,which standard is used for converting the keystroke into the corresponding bits

Sunday, September 18, 2011

Consolidated Answer key of HSST Computer Science

See the Consolidated Answer key of HSST Computer Science after reviewing all the comments we have received.

Consolidated Answer key of HSST Computer Science

Best Wishes

Saturday, September 17, 2011

What is Hot Swapping ?

Q? : _______ is a powder used in laser printers to form the images on a paper [ computer gk ]
Answer: toner

Q? : Worms and Trojan Horses are examples of : [ computer gk ]
Answer: malware

Q? : Who invented the Computer [ PSC Computer GK ]

Q? : Which of the following is first generation of computer :
Answer: EDSAC

Q? : Which command lists files in MS-DOS ? [ Computer , Quiz ]
Answer: dir

Q? : What is the internet TLD of France [ Computer GK Internet ]]
Answer: .fr

Q? : What is the capacity of a standard PC floppy ? [ Computer , Quiz ]
Answer: 1.44 MB

Q? : What does PHP stands for [ Computer Abbreviation HSST GK ]
Answer: Hypertext Preprocessor

Q? : What does Google means [ Computer GK ]
Answer: 1 followed by 100 zeros

Q? : What does FTP stands for ? [ Computer Abbreviation HSST GK ]
Answer: File Transfer Protocol

Q? : What does ADSL stands for ? [ Computer Abbreviation HSST GK ]
Answer: Asymmetric Digital Subscriber Line

Q? : URL stands for : [ Computer Quiz ]
Answer: Uniform Resource Locator

Q? : The utility which can be used to clean the windows registry is: [ Computer GK ]
Answer: Regedit

Q? : The utility which can be used to clean the windows registry is : [ computer gk ]
Answer: regedit

Q? : The TTL field is inside the ____ header [ computer gk ]
Answer: IP

Q? : The port number used by the HTTP protocol is [ Computer GK ]
Answer: 80

Q? : The port number used by the HTTP protocol is : [ computer gk ]
Answer: 80

Q? : The port number used by SMTP is : [ computer gk ]
Answer: 25

Q? : The name Andy Bechtolsheim associated with [ Computer GK ]
Answer: Google

Q? : The Laser printer was invented at : [ computer gk ]
Answer: Xerox

See More....

Tuesday, September 13, 2011

Protect Your Mail Account / Facebook Account with Two Factor Authentication

Two-factor authentication is a security process in which the user provides two means of identification. Inputting a verification code when you log in, in addition to your normal password. How to activate two factor autentication for your mail Account. See the below link it will guide you through the rest of the process.

Monday, September 12, 2011


Q? : Who was the Congress President when India attained Independence ? [ JUNIOR LAB ASSISTANT EXAM ]
Answer: J.B. Kripalani

Q? : Which Indian city is called the Silicon valley of India [ Q: LAB Assistant ( HSE )]
Answer: Bangalore

Q? : Where is Sardar Vallabhbhai Patel Police Academy situated ?
Answer: Hyderabad

Q? : what does "APJ" stands for in "APJ ABDUL KALAM" ?
Answer: Avul Pakir Jainulabdeen

Q? : The signature on the one rupee currency notes in India belongs to [ Q: LAB Assistant ( HSE )]
Answer: Secretary , Ministry of Finance

Answer: Rigveda

Q? : The National Chemical Laboratory (India) is located in
Answer: Pune

Q? : The Macmohan line is the international border between : [ JUNIOR LAB ASSISTANT EXAM ]
Answer: India and China


Q? : The first Malayalm film which got National Award [ Q: LAB Assistant ( HSE )]
Answer: Neelakkuyil

Answer: Vallabha Bhai Patel

Answer: STAPES


Q? : Navy day is celebrated on [ Q: LAB Assistant ( HSE )]
Answer: December 4

Answer: 1921


Answer: Vallabh Bhai Patel

Q? : Kerala kalamandalam was established by [ Q: LAB Assistant ( HSE )]
Answer: Vallathol

Answer: 1919

Answer: MAY 1

Why PSC not publishing the answer keys of HSST Computer Science exam held on 01/09/2011 ?

We all are eagerly waiting for PSC Answer key of HSST Computer Science Exam.. PSC published the answer keys of exams held after hsst computer science exam. See the below link.
Why this Delay ? 

Thursday, September 8, 2011

See the Beauty of AJAX

What is Ajax ?
Asynchronous JavaScript and XML or Ajax for short is new web development technique used for the development of most interactive website. Ajax helps you in making your web application more interactive by retrieving small amount of data from web server and then showing it on your application. You can do all these things without refreshing your page.

Why the term Asynchronous ?
This is the key. In standard Web applications, the interaction between the customer and the server is synchronous. This means that one has to happen after the other. If a customer clicks a link, the request is sent to the server, which then sends the results back.

With Ajax, the JavaScript that is loaded when the page loads handles most of the basic tasks such as data validation and manipulation, as well as display rendering the Ajax engine handles without a trip to the server. At the same time that it is making display changes for the customer, it is sending data back and forth to the server. But the data transfer is not dependent upon actions of the customer.

I used Ajax in PSCTrainer Search
See the website , to know how the questions loaded while just key in data with out any delay..

Best Wishes

Wednesday, September 7, 2011

Why we are not getting NET in Computer Science?

For the last several years we all are struggling to get NET in Computer Science .But only few of us cleared the exam....What may be the possible causes...I think the following

1. Lack of good preparation.
2. Non availability of good guidance in this subject
3. Difficulty in the prescribed syllabi.
4.Not enough resources.
5.Question pattern..

Please have a comment on this subject and suggest some remedies ..

Do we need a community for UGC Coaching ???

Tuesday, September 6, 2011

Data Base Administrators (DBAs) : 47 Vacancies @ BEL

Bharat Electronics Limited (BEL), a Navratana company and India’s premier professional electronics company, requires engineers on contract basis for one years for its smart card division in Maharashtra region :  
  1. Data Base Administrators (DBAs) for Data Entry Centre  :  28 posts
  2. Sr. Data Base Administrators (Sr. DBAs) for Data Entry Centre  :  07 posts
  3. Data Base Administrators (DBAs) for Registrar BME packets consolidation :  01 post
  4. Tehsil Level Data Base Administrators (TDBAs) for BME  :  09 posts
  5. Tehsil Level Data Base Administrators (DDBAs) for BME :  02 posts

Walk-In-Interview :  Registration for Walk-In-Interview will be on 10th September 2011 between 8.00 am to 10.00 am at BEL Officer’s Club, BEL Housing Colony, Aundh Camp P.O, Aundh, Pune – 411027 (Near Rakshak Society/ ESI Hospital)Please view  for more information and application form is available at 

Sunday, September 4, 2011

Who is a great teacher ?

“The mediocre teacher tells. The good teacher explains. The superior teacher demonstrates. The great teacher inspires.”

Friday, September 2, 2011

HSST Exam Solved Paper 2011 : Possible Answer Keys

Compiled by

1. In C language an user defined header is identified by the inclusion :
(A) # include "test.h"
(B) # include < test.h >
(C) include "test.h"
(D)None of these

2. Number of locations that could be addressed by a microprocessor with 12 address lines is :
(B) 64K
(C) 4096
(D) 2048

3. Number of bit width of any memory chip is :
(A) 16
(B) 64
(C) 32
(D) 8

4. The command that lists the last few lines from a file name "file"
(A) tail file
(B) end file
(C) grep file
(D) cat file -last25

5. The percentage of time that a computer system is not available for use is :
(A) Down Time
(B) Seek Time
(C) Delay Time
(D) Access Time

6. By the thread of the same process, sharing is not allowed in :
(A) queue
(B) message
(C) stack
(D) address space

7. How to declare an interface class in C++ ?
(A) by declare all methods pure virtual in a class
(B) make all metods abstract in a class
(C) declare the class as interface
(D) none of the above

8. Which device translates between data formats ?
(A) Hub
(B) Switch
(C) Bridge(D) Gateways

9. In a relation is in BCNF then it is in :
(A) 2NF
(B) 3NF
(C) 1NF
(D) 1NF and 2NF

10. Minimum Hamming distance method is used for correction of :
(A)syntactic error
(B) semantic errors
(C) algorithm errors
(D) programming errors.

11. Full Binary tree with n leaves contain
(A)n nodes
(B)2n-1 nodes
(C)n-1 nodes
(D)log n nodes

12. What is not possible in a thread?

13. The margin of a word document can be displayed on the horizontal or vertical ruler with the mouse and the :

FONT SIZE button

14. The 2's complement of the binary value 10 is

15. The property that OOPs will permit the same operation to be carried out differently, based on the object
(C)function overloading
(D)data abstraction

16. The IP address is named as
(A)Loopback address
(B)IP address in a standard network
(C)LAN server address
(D)Default router address

17. The Virtual Memory is located logically:
(A) in the CPU
(B) in main Memory
(C) in between CPU and primary memory 
(D) in the Hard disk

18. The Banker's algorithm in resource allocation deals with':
(A) Dead lock prevention
(B) Dead lock recovery
(C) Dead lock avoidance
(D) Mutual exclusion

19. Thrashing occurs in:
(A) large computers
(B) a natural consequence of the virtual memory system
(C) can always be avoided by swapping
(D) poor paging algorithm

20. Compilers can identify:
(A) syntax errors
(B) semantic errors
(C) logical errors
(D) mathematical errors

21. What was the first Scientific Computer Programming Language?

22. Which is the first Object Oriented Language?

23. Producer consumer problem is example for application of:
(A) Monitors
(B) For Monitors, Semaphores and Event counters
(C) Semaphores
(D) Event counters

24. What was the data transmission method in which bi-directional data flow is allowed?
(A) Simplex
(B) Duplex
(C) Analog
(D) Single side mode

25. Yahoo was developed by :
(A) Dennis Ritchie and Ken Thompson
(B) Vint Cerf and Robert Kahn
(C) David Filo and Jerry Yang
(D) Steve Case and Jeff Bezos

26.Resolution of Video display unit does not depend on:
(A) Raster scan rate
(B) Band width
(C) Vertical and horizontal Scans
(D) Screen size

27.Resolution of Video display unit does not depend on:
(A) Raster scan rate
(B) Band width
(C) Vertical and horizontal Scans
(D) Screen size

28. The true statement for parallel transmission is :
(A) simultaneous transmission of all bits
(B) speed is specified in bps
(C) slower than serial
(D) micro computers use this

29. Gray code for the decimal number 7 is :
(A) 0111
(B) 0100
(C) 0101

30. Evaluate the pre-fix expression -*63-41 will result in :
(A) 25
(B) 23
(C) 15
(D) 12

3l. Error correction in the data link layer is achieved by :
(A) Equalization
(B)Cyclic redundancy codes
(C) Hamming codes
(D) Bit stuffing

32. The system program that set up executable program in RAM, ready for execution is :
(A) Loader 
(B) Linker
(C) Linkage editor
(D) Compiler ,

33. File transfer protocol that uses UDP is :

34. To check the presence of a computer in the network, ,use the command:
(A) ping
(B) cmd
(C) check
(D) ipconflg

35. In cryptology the code STUDYING is written as RUTEXJMH, then the code for OTHER is :

36. The Number of the equivalent relations of the set {1,2,3,4} is : "
(A) 4
(B) 15
(C) 16
(D) 24

37. Which of the sets are empty?
(A) { x : x = / x}
(B) {x:x=x}
(D) {x:x =/ xx}
(C) {x:x=/x2}

38. In any undirected graph, the sum of the degrees of all nodes is :
(A) must be even
(B) is always ODD
(C) need not be even
(D) is twice number of edges

39. An undirected graph is Eulerian if and only if all vertices of G are of the sum of the degrees of all nodes is :
(A) Same degree
(B) ODD degree
(C) Need not be ODD
(D) Is twice number of edges

40. An undirected graph G has n vertices n - 1 edges then G is :
(A) Cyclic
(B) Addition of edge will make it cyclic
(C) Eulerian
(D) Is a Tree

41.Graph having every pair of vertices connected is called :
(A) Cycle graph
(B) Complete graph
(C) Peterson graph
(D) Is a Tree

42. The Eigen vectors of a real symmetric matrix corresponding to different Eigen values are:
(A) Orthogonal matrix
(B) Singular matrix
(C) Non-singular matrix
(D) Inverse matrix

43. The system of equations 4x + 6y = 8, 3x + 2y = 1, 7x + 8y = 9 has:
(A) only one solution
(B) infinite solutions
(C) two solutions
(D) none of these

44. The Eigen values of the square matrix are:
(A) positive
(B) imaginary
(C) real
(D) negative

45. The Equations will have:
(A) no unique solution
(B) only one solution
(C) has only two solutions
(D) has infinite

46.Which is fastest ?

47.Which is commutative but not associative?

48. Which is Universal gate?

49. How many NAND gates are needed to perform X . Y ?
(A) 3
(B) 4
(C) 2
(D) 1

50. Which is non-volatile?

51. Which is the access method to take data from tape memory?
(A) Direct
(B) Sequential
(C) Parallel
(D) Serial

52. The cycle time for a memory system is :
(A) access time
(B) longer than access time
(C) less than access time
(D) sub multiple of access time

53. How many RAM chips are needed to generate the (256K X 1 bit)?
(A) 8
(B) 12
(C) 32
(D) 64

54. T flip-flops are generally used for:
(A) counter
(B) delay switch
(C) counter and frequency divider
(D) decoder

55. Register used as working area in CPU is:
(A) Program counter
(B) Stack,
(C) Instruction register
(D) Accumulator

56. A microprocessor can be :
(A) Programmable
(B) Non Programmable
(C) Micro programmable
(D) All of the above

57. Which is 16 bit microprocessor?
(A) Z 80
(B) Motorola 6800
(C) Intel 8086
(D) Intel 80486
58. "n" flip-flops will divide the frequency into a factor of :

(A) n
(B) 1/n
(C) 2 to the power of' n '
(D) log(n)

59. 8 2 4 1 is the :
(A) BCD code
(B) Gray code
(C) Excess -3 code
(D) ASCII code

60. (1001000010011001) base 2; equivalent in base 16 is :
(A) 9899
(B) 9989
(C) 8999
(D) 9999

61.Which is a programmable interval timer?(A) 8253
(B) NE 555
(C) 8275
(D) 8251

62. Negative number cannot be represented in:
(A) Signed magnitude form
(B) 1's complement form
(C) 2's complement form
(D) None of the above forms

63.Which of the following interrupt is both level and edge sensitive?(A) RST 5.5
(D) RST 7.5

64. What is a BUFFER?
(A) Convert input data to output
(B) CPU stores program counter
(C) An Interphase between CPU and peripheral
(D) Convert program to EXE form

65. By default any real numb~r in C is represented as :
(A) a float
(B) a double
(C) a long double
 (D) long float

66. Integer division in "C" program results in :
(A)  Truncation
(B) Rounding
(C) Overflow
(D) None of above

67.The function sprintf() works like printf(), but operates on:(A) data in a file
(B) stderr
(C) stdin
(D) string

68. The function exit( ) causes an exit from:
(A) from loop .
(B) from the block
(C) from the function
(D) from program

69. The complexity of linear search algorithm of an array of n elements is :
(A) 0 log(n)
(B) 0 (n)
(C) Onlog(n)
(D) O(nXn)

70. How many elements can array A (-1..m ,1..m) have?
(A) mXm
(B)(m + l)(m + 1)
(C) mX(m-1)
(D)((m - n)Xn)

71. Which is useful to implement quick sort?
(A) List
(B) Set
(C) Stack
(D) Queue

72. Recursively enumerable languages are closed under:
(A) Union
(B) Intersection
(C) Complementation 
(D) Concatenation

73. The Grammar that produce more than one Parse tree for same sentence is :
(A) Ambiguous
(B) Unambiguous
(C) Complementation
(D) Concatenation Intersection

74. The number of the external states of a Turing Machine should be at least:
(A) 1 
(B) 2
(C) 3
(D) 4

75. Give name of the database in the general model of a compiler:
(A) Literal table
(B) Terminal table
(D) Productions

76. A file is :
(A) an abstract data type
(B) logical storage unit
(C)usually non volatile
(D) volatile

77. What property of the files prevent sharing of files and directories?
(A)Tree Structure
(B) One level.structure
(C) Two level structure
(D) Length

78. E-R modeling technique is :
(A) Tree structure
(B) Top-down method
(C) Bottom-up method
(D) Right-left approach

79. Data items stored as grouped items is :
(A) Record
(B) List
(C) Strings
(D) Title list

80. Data items are fragmented, replicated and propagated in :

Note : DDBMS - Distributed Database Management System

8l. In data manipulation the first element of T[5] is :
(A) T[l]
(B) T[O]
(C) T[5]
(D) T[3]

82 . Processed data is called:
(A) Data base
(B) File
(C) Information
(D) Sample

83 . Which factor of coding is most important?
(A) Productivity
(B) Cost
(C) Readability
(D) Less memory usage

84. Main container for < TR > < TD > and < TH > is':
(A)< TABLE >
(B)< GROUP >
(C)< DATA >

85. Which of the following is the non-polling system?
(A) Stop and wait
(B) Daisy chain

86.   What is the working Principle of a Digital Computer?
(A) De Morgan's Principle
(B) Len's Principle
(C) Von Neumann's Principle
(D) Euler's Principle

87.  Give the unique name of the combination of Analog and Digital Computer
(A) Cray XMP 120 Computer
(B) Param 2000 Computer
(C) IBM 320 Computer
(D) Hybrid Computer

88. Why RAM is kept near to the Processor in a Digital Computer?
(A) Reduce the cost
(B) Get maximum speed
(C) To minimize memory access time
(D) Increase frequency

89. Who designed the First Digital computer using the Binary system?
(A) Blaise Pascal
(B) Agutha Ada
(C) Isaac Newton
(D) Dr. Sakunthala Devi

90. Give the name of the first Operating system for Personal Computers:
(B)Windows 3.2
(C) CP/M 
(D) Disk Operating System

91. Which of the following preposition is a tautology?
(A) pvq->p
(B) p->(q->p)
(C) pv(q->p )
(D) None of these

92. p -> q -> r is equivalent to :
(A) p -> q -> r
(B) p ->( q -> r)
(C) pv(q-> r)
(D) None of These

93. Why do we go for Normalization of Data Bases?
(A) To avoid the repetitions
(B) To prevent fragmentation
(C) Avoid redundancy
(D) To prevent replication

Note : Redundancy means duplication / repetition of data so both A and B are correct

94. Name the component carrying the ALU and Control Unit in Digital Computer:
(A) Microprocessors
(B) Nano chips
(D) Hybrid Computer
95. Give the name of the Linear list in which elements can be added at ends but not in the /middle: 
(A) Array 
(B) Queue 
(C) Tree 
(D) Circular Queue

96.The switching sed in First generation computer were :
(A) Transistors 
(B) SSI chips
(C) VLSI Ghips  
(D) Vacuum Tubes 

97. The automaton accepting the regular expression of any number of a's is :
(A) a* 
(C) (a/b)* 
98.Flip-flop is the basic structure of the device

(A) Hard disk 
(B) Memory
(C) Cells 
(D) Speakers 

99. In C language data type of "3" is :
(A) an integer
(B) a word
(C) a character 
(D) a digit

100.very node "a" in a graph G is adjacent to every node "b" in G, then the graph is ; 
(A) Isolated graph 
(B) Connected graph 
(C) Eulerian graph 
(D) Complete graph 

Compiled by
Possible answers are given in blue color...if any mistake comment on this post