(A) 2n (B) 3n
(C) 5n (D) 7n
Ans: B
2. The
circumferences of the two concentric disks are divided into 100 sections each.
For the outer disk, 100 of the sections are painted red and 100 of the sections
are painted blue. For the inner disk, the sections are painted red and blue in
an arbitrary manner. It is possible to align the two disks so that
(A) 100 or more
(B) 125 or more
(C) 150 or more
(D) 175 or more
of the sections on the inner disks have their colours
matched with the corresponding section on outer disk.
Ans: A
3. The
proposition ~pÚq is equivalent to
(A) p®q (B) q®p
(C) p«q (D) pÚq
Ans: A
4. The
absorption law in Boolean algebra say that
(A) X + X = X
(B) X . X = X
(C) x + x . y = x
(D) None of the above
Ans: C
5. The number
of 1’s present in the binary representation of
10 × 256 + 5 × 16 + 5 is
(A) 5 (B) 6
(C) 7 (D) 8
Ans: B
6. The
hexadecimal number equivalent to (1762.46)8 is
(A) 3F2.89
(B) 3F2.98
(C) 2F3.89
(D) 2F3.98
Ans: B
7. (A +
B)(AB)’ is equivalent to
(A) AÅB (B) AʘB
(C)(AÅB)ʘA (D)(AʘB) ÅA
Ans: A
8. A latch is
constructed using two cross-coupled
(A) AND and OR gates
(B) AND gates
(C) NAND and NOR gates
(D) NAND gates
Ans: D
9. A
multiplexer is a logic circuit that
(A) accepts one input and gives several output
(B) accepts many inputs and gives many output
(C) accepts many inputs and gives one output
(D) accepts one input and gives one output
Ans: C
10. 8-bit 1’s
complement form of –77.25 is
(A) 01001101.0100
(B) 01001101.0010
(C) 10110010.1011
(D) 10110010.1101
Ans: C
11. From the
point of view of the programmer, what are the major advantages of using a
high-level language rather than internal machine code or assembly language ?
(A) Program portability
(B) Easy development
(C) Efficiency
(D) None of the above
Ans: B
12. What
features make C++ so powerful ?
(A) Easy implementation
(B) Reusing old code
(C) Easy memory management
(D) All of the above
Ans: D
13. The goal
of operator overloading is
(A) to help the user of a class
(B) to help the developer of a class
(C) to help define friend function
(D) None of the above
Ans: A
14. The scheme
of which interpreter translates the source program is known as
(A) Paragraph by paragraph
(B) Instruction by instruction
(C) Line by line
(D) None of the above
Ans: C
15. Portable
program means
(A) Program with wheels
(B) Independent from its authors
(C) Independent of platform
(D) None of the above
Ans: C
16. Which of
the following is the recovery management technique in DDBMS ?
(A) 2PC (Two Phase Commit)
(B) Backup
(C) Immediate update
(D) All of the above
Ans: D
17. Which of
the following is the process by which a user’s privileges ascertained ?
(A) Authorization (B)
Authentication
(C) Access Control (D)
None of these
Ans: A
18. The basic
variants of time-stampbased method of concurrency control are
(A) Total time stamp-ordering
(B) Partial time stamp ordering
(C) Multiversion Time stamp ordering
(D) All of the above
Ans: D
19. A
transaction can include following basic database access operations :
(A) Read_item(X)
(B) Write_item(X)
(C) Both (A) and (B)
(D) None of these
Ans: C
20. Decomposition
help in eliminating some of the problems of bad design
(A) Redundancy
(B) Inconsistencies
(C) Anomalies
(D) All of the above
Ans: D
21. The number
of different trees with 8 nodes is
(A) 256 (B) 255
(C) 248 (D) None
of these
Ans: C
22. Given a
binary tree whose inorder and preorder traversal are given by
Inorder :
EICFBGDJHK
Preorder : BCEIFDGHJK
The post order traversal of the above binary tree is
(A) IEFCGJKHDB
(B) IEFCJGKHDB
(C) IEFCGKJHDB
(D) IEFCGJKDBH
Ans: A
23. The number
of disk accesses performed by insertion operation in B-tree of height h is
(A) 0(1) (B) 0(1gh)
(C) 0(h) (D) None of these
Ans: C
24. Consider a
hash table of size m = 10000 and the hash function h(k) = ∟m(kA mod 1)'┘ for A
= (√5–1)/2. The location to the key k = 123456 is
(A) 46 (B)
47
(C) 41 (D)
43
Ans: C
25. When the
priority queue is represented by max heap, the insertion and deletion of an
element can be performed in (queue containing n elements)
(A) q(n) and q(1) respectively
(B) q(n) and q(n) respectively
(C) q(1) and q(1) respectively
(D) None of the above
Ans: C
26. A
comparison of frequency division and time division multiplexing system shows
that
(A) FDM requires a lower bandwidth, but TDM has greater
noise immunity.
(B) FDM has greater noise immunity and requires lower
bandwidth than TDM.
(C) FDM requires channel synchronization, while TDM
has greater noise immunity.
(D) FDM requires more multiplex while TDM requires
band pass filter.
Ans: C
27. If carrier
modulated by a digital bit stream, has one one of the possible phase of 0, 90,
180 and 270 degrees, then modulation called
(A) BPSK (B)
QPSK
(C) QAM (D) MSK
Ans: B
28. Consider
the following statement :
(i) The bandwidth of the A.M., wave depends on the
band width of the modulating signal.
(ii) The bandwidth of the A.M., wave depends on the
modulation index.
(iii) The bandwidth of the F.M, wave for all practical
purpose depends on the amplitude of the carrier. Of these statements the
correct statements are
(A) (i, ii)
(B) (i, iii)
(C) (ii, iii)
(D) All of the above
Ans: B
29. A smart
modem can dial, hangup and answer incoming calls automatically. Can you tell
who provides the appropriate instructions to the modem for this purpose ?
(A) Communication software
(B) Error detection protocols
(C) Link access procedure (LAP)
(D) Telecommunications
Ans: A
30. Which of
the following switching techniques is most suitable for interactive traffic ?
(A) Circuit switching
(B) Message switching
(C) Packet switching
(D) All of the above
Ans: C
31. Object
modules generated by assembler that contains unresolved external references are
resolved for two or more object module by a/an
(A) Operating system
(B) Loader
(C) Linker
(D) Compiler
Ans: C
32. A special
software that is used to create a job queue is called
(A) Drive (B)
Spooler
(C) Interpreter (D) Linkage editor
Ans: B
33. Which of
the following permanent database that has an entry for each terminal symbol ?
(A) Literal table
(B) Identifier table
(C) Terminal table
(D) Source table
Ans: C
34. In which
way(s) a macroprocessor for assembly language can be implemented ?
(A) Independent two-pass processor
(B) Independent one-pass processor
(C) Expand macrocalls and substitute arguments
(D) All of the above
Ans: D
35. Which of
the following can be accessed by transfer vector approach of linking ?
(A) External data segments
(B) External subroutine
(C) Data located in other procedure
(D) All of the above
Ans: B
36. Block or
Buffer caches are used to
(A) improve disk performance
(B) handle interrupts
(C) increase the capacity of main memory
(D) speed up main memory Read operations
Ans: D
37. A file
organization component VSAM file is
(A) Relative records data set
(B) Keyed sequential data set
(C) Entry sequential data set
(D) All of the above
Ans: D
38. A relationship
between processes such that each has some part (critical section) which must
not be executed while the critical section of another is being executed, is
known as
(A) Semaphore
(B) Mutual exclusion
(C) Multiprogramming
(D) Message passing
Ans: B
39. How many
states can a process be in ?
(A) 3 (B) 4
(C) 2 (D) 5
Ans: D
40. Which
command allows you to view your file 24 lines at a time ?
(A) More (B) Cat
(C) Pg (D) None of the above
Ans: A
41. Which one
of the items listed below is not one of the software engineering layers ?
(A) Process (B) Manufacturing
(C) Method (D) Tools
Ans: B
42. What is
the first stage in program development ?
(A) Specification and design
(B) System Analysis
(C) Testing
(D) None of the above
Ans: B
43. By means
of a data flow diagram, the analyst can detect
(A) Task duplication
(B) Unnecessary delays
(C) Task overlapping
(D) All of the above
Ans: D
44. Which of
these are the 5 generic software engineering framework activities ?
(A) Communication, planning, modelling, construction,
deployment
(B) Communication, risk management, measurement,
production, reviewing
(C) Analysis, designing, programming, Debugging,
maintenance
(D) Analysis, planning, designing, programming,
testing
Ans: A
45. Many
causes of the software crisis can be traced to mythology based on
(A) Management Myths
(B) Customer Myths
(C) Practitioner Myths
(D) All of the above
Ans: D
46. Data
warehousing refers to
(A) storing data offline at a separate site
(B) backing up data regularly
(C) is related to data mining
(D) uses tape as opposed to disk
Ans: C
47. Virtual
memory is
(A) related to virtual reality
(B) a form of ROM
(C) a form of RAM
(D) None of the above
Ans: C
48. “M-Commerce”
refers to
(A) a myth which does not exist in reality
(B) the ability of business to reach potential
customers wherever they are
(C) the ability to have large capacity of memory
storage dealing trade and commerce
(D) None of the above
Ans: D
49. The
principal electronic payment systems for electronic commerce is
(A) Credit Card (B) Digital Wallet
(C) Electronic Cheque (D) All of the above
Ans: D
50. Which is
the most valuable electronic commerce to the individual customer in long run ?
(A) Business to Customer
(B) Business to Business
(C) Customer to Customer
(D) None of the above
Ans: B
No comments:
Post a Comment