1. Which of
the following data structure is Non-linear type ?
(A) Strings (B)
Lists
(C) Stacks (D)
None of the above
Ans: D
2. The total
number of comparisons in a bubble sort is
(A) 0(log n)
(B) 0(n log n)
(C) 0(n)
(D) None of the above
Ans: B
3. Which of
the following is a bad example of recursion ?
(A) Factorial (B)
Fibonacci numbers
(C) Tower of Hanai (D)
Tree traversal
Ans: B
4. Domain and
Range of the function
Y = –√(–2x + 3) is
(A) x≥3/2, y≥0
(B) x>3/2, y≤0
(C) x≥3/2, y≤0
(D) x≤3/2, y≤0
Ans: D
5. Maximum
number of edges in a n-Node undirected graph without self loop is
(A) n2 (B) n(n – 1)
(C) n(n + 1) (D)
n(n – 1)/2
Ans: D
6. A hash
table has space for 75 records, then the probability of collision before the
table is 6% full.
(A) .25 (B)
.20
(C) .35 (D)
.30
Ans: B
Explanation:
On .75th
insertion probability of collision = 1/75
On 1.5th
insertion probability of collision = 2/75
On 2.25th insertion probability of collision
= 3/75
On 3th insertion probability of collision =
4/75
On 3.75th insertion probability of
collision = 5/75
So the required probability is 1+2+3+4+5/75 = .20
7. BCC in the
internet refers to
(A) Black carbon copy
(B) Blind carbon copy
(C) Blank carbon copy
(D) Beautiful carbon copy
Ans: B
8. Hub is a
term used with
(A) A Star Networks
(B) A Ring Networks
(C) A Router
(D) A Bridge
Ans: A
9. The amount
of uncertainty in a system of symbol is called
(A) Bandwidth (B)
Entropy
(C) Loss (D)
Quantum
Ans: B
10. Which of
the following network access standard disassembler is used for connection
station to a packet switched network ?
(A) X.3 (B)
X.21
(C) X.25 (D)
X.75
Ans: C
11. A station
in a network in a network forward incoming packets by placing them on its shortest
output queue. What routing algorithm is being used ?
(A) Hot potato routing
(B) Flooding
(C) Static routing
(D) Delta routing
Ans: A
12. Start and
stop bits are used in serial communications for
(A) Error detection
(B) Error correction
(C) Synchronization
(D) Slowing down the communication
Ans: C
13. For a data
entry project for office staff who have never used computers before (user
interface and user-friendliness are extremely important), one will use
(A) Spiral model
(B) Component based model
(C) Prototyping
(D) Waterfall model
Ans: C
14. An SRS
(A) establishes the basis for agreement between client
and the
supplier.
(B) provides a reference for validation of the final
product.
(C) is a prerequisite to high quality software.
(D) all of the above.
Ans: D
15. McCabe’s
cyclomatic metric V(G) of a graph G with n vertices, e edges and p connected
component is
(A) e
(B) n
(C) e – n + p
(D) e – n + 2p
Ans: C
16. Emergency
fixes known as patches are result of
(A) adaptive maintenance
(B) perfective maintenance
(C) corrective maintenance
(D) none of the above
Ans: C
17. Design
recovery from source code is done during
(A) reverse engineering
(B) re-engineering
(C) reuse
(D) all of the above
Ans: D
18. Following
is used to demonstrate that the new release of software still performs the old
one did by rerunning the old tests :
(A) Functional testing
(B) Path testing
(C) Stress testing
(D) Regression testing
Ans: D
19. The post
order traversal of a binary tree is DEBFCA. Find out the preorder traversal.
(A) ABFCDE (B)
ADBFEC
(C) ABDECF (D)
ABDCEF
Ans: C
20. B + tree
are preferred to binary tree in database because
(A) Disk capacities are greater than memory capacities
(B) Disk access much slower than memory access
(C) Disk data transfer rates are much less than memory
data transfer rate
(D) Disk are more reliable than memory
Ans: B
21. What
deletes the entire file except the file structure ?
(A) ERASE
(B) DELETE
(C) ZAP
(D) PACK
Ans: C
22. Which
command classes text file, which has been created using “SET ALTERNATIVE”
<FILE NAME> “Command” ?
(A) SET ALTERNATE OFF
(B) CLOSE DATABASE
(C) CLOSE ALTERNATE
(D) CLEAR ALL
Ans: A
23. Data
security threats include
(A) privacy invasion
(B) hardware failure
(C) fraudulent manipulation of data
(D) encryption and decryption
Ans: C
24. Which of
the following statements is true, when structure of database file with 20
records is modified ?
(A) ? EOF ( ) Prints T
(B) ? BOF ( ) Prints F
(C) ? BOF ( ) Prints T
(D) ? EOF ( ) Prints F
Ans: A
25. The SQL
Expression
Select distinct T. branch name from branch T, branch S
where T. assets > S. assets and S. branch-city = DELHI, finds the name of
(A) all branches that have greater asset than any
branch located in DELHI.
(B) all branches that have greater assets than
allocated in DELHI.
(C) the branch that has the greatest asset in DELHI.
(D) any branch that has greater asset than any branch
located in DELHI.
Ans: A
26. Dijkestra
banking algorithm in an operating system, solves the problem of
(A) deadlock avoidance (B)
deadlock recovery
(C) mutual exclusion (D)
context switching
Ans: A
27. The
multiuser operating system, 20 requests are made to use a particular resource
per hour, on an average the probability that no request are made in 45 minutes
is
(A) e-15 (B) e-5
(C) 1 – e-5 (D) 1 – e-10
Ans: A
28. On
receiving an interrupt from an I/O device, the CPU
(A) halts for predetermined time.
(B) branches off to the interrupt service routine
after completion of the current instruction
(C) branches off to the interrupt service routine
immediately.
(D) hands over control of address bus and data bus to
the interrupting device.
Ans: B
29. The
maximum amount of information that is available in one portion of the disk
access arm for a removal disk pack (without further movement of the arm with
multiple heads)
(A) a plate of data
(B) a cylinder of data
(C) a track of data
(D) a block of data
Ans: B
30. Consider a
logical address space of 8 pages of 1024 words mapped with memory of 32 frames.
How many bits are there in the physical address ?
(A) 9 bits (B)
11 bits
(C) 13 bits (D)
15 bits
Ans: D
31. CPU does
not perform the operation
(A) data transfer
(B) logic operation
(C) arithmetic operation
(D) all of the above
Ans: D
32. A chip
having 150 gates will be classified as
(A) SSI (B)
MSI
(C) LSI (D)
VLSI
Ans: B
33. If an
integer needs two bytes of storage, then the maximum value of unsigned integer
is
(A) 216 – 1
(B) 215 – 1
(C) 216
(D) 215
Ans: A
34. Negative
numbers cannot be represented in
(A) signed magnitude form
(B) 1’s complement form
(C) 2’s complement form
(D) none of the above
Ans: D
35. The
cellular frequency reuse factor for the cluster size N is
(A) N (B) N2
(C) 1/N (D)
1/N2
Ans: C
36. X – = Y +
1 means
(A) X = X – Y + 1
(B) X = –X – Y – 1
(C) X = –X + Y + 1
(D) = X – Y – 1
Ans: A
37. Handoff is
the mechanism that
(A) transfer an ongoing call from one base station to
another
(B) initiating a new call
(C) dropping an ongoing call
(D) none of above
Ans: A
38. Which one
of the following statement is false ?
(A) Context-free languages are closed under union.
(B) Context-free languages are closed under
concatenation.
(C) Context-free languages are closed under
intersection.
(D) Context-free languages are closed under Kleene
closure.
Ans: D
39. All of the
following are examples of real security and privacy risks except
(A) Hackers
(B) Spam
(C) Viruses
(D) Identify theft
Ans: B
40. Identify
the incorrect statement :
(A) The ATM adoption layer is not service dependent.
(B) Logical connections in ATM are referred to as
virtual channel connections.
(C) ATM is streamlined protocol with minimal error and
flow control capabilities
(D) ATM is also known as cell delays.
Ans: A
41. Software
risk estimation involves following two tasks :
(A) Risk magnitude and risk impact
(B) Risk probability and risk impact
(C) Risk maintenance and risk impact
(D) Risk development and risk impact
Ans: B
42. The number
of bits required for an IPV6 address is
(A) 16 (B)
32
(C) 64 (D)
128
Ans: D
43. The
proposition ~qvp is equivalent to
(A) p→q (B)
q→p
(C) p↔q (D)
p˅q
Ans: B
44. Enterprise
Resource Planning (ERP)
(A) has existed for over a decade.
(B) does not integrate well with the functional areas
other than operations.
(C) is inexpensive to implement.
(D) automate and integrates the majority of business
processes.
Ans: D
45. Which of
the following is false concerning Enterprise Resource Planning (ERP) ?
(A) It attempts to automate and integrate the majority
of business processes.
(B) It shares common data and practices across the
enterprise.
(C) It is inexpensive to implement.
(D) It provides and access information in a real-time
environment.
Ans: C
46. To
compare, overlay or cross analyze to maps in GIS
(A) both maps must be in digital form
(B) both maps must be at the same equivalent scale.
(C) both maps must be on the same coordinate system
(D) All of the above
Ans: D
47. Web Mining
is not used in which of the following areas ?
(A) Information filtering
(B) Crime fighting on the internet
(C) Online transaction processing
(D) Click stream analysis.
Ans: B
48. A
telephone conference call is an example of which type of communications ?
(A) same time / same place
(B) same time / different place
(C) different time / different place
(D) different time / same place
Ans: B
49. What is
the probability of choosing correctly an unknown integer between 0 and 9 with 3
chances ?
(A) 963/1000
(B) 973/1000
(C) 983/1000
(D) 953/1000
Ans: A
50. The number
of nodes in a complete binary tree of height h (with roots at level 0) is equal
to
(A) 20 + 21 + ….. 2h
(B) 20 + 21 + ….. 2h-1
(C) 20 + 21 + ….. 2h+1
(D) 21 + ….. 2h+1
Ans: A
No comments:
Post a Comment