Comprehensive Exam Answer Keys
Comprehensive Exam Answer Keys
1.
2.
4
1 1.0
3.
4.
1.
{a(cd)^nb|n>=1}
2.
{a(cd)^n>=1}U{b(cd)^n|n>=1}
(a+b)(cd)*(a+b) denotes the following set
2 3.0
3.
{a(cd)^na|n>=0}U{a(cd)^nb|n>=0}U{b(cd)^na|n>=0}U{b(cd)^nb|n>=0}
4. {ac^nd^nb|n>=1}
1.
11101000
2.
01111111
-24 is 2’s complement form is
3 1.0
3.
01001000
4. 00111111
1.
2.
4.
1.
Address registrar
2. Program counter
3.
A _________ registrar stores the intermediate arithmetic and logic results in it.
5 4.0
Index registrar
4.
Accumulator
S.NO. Questions Choices Answers
1. Structure
2. Memory
6 A class is a 3.0
3. Template
4. Function
1. default constructor
2. parameterized constructor
7 A constructor without any arguments is 1.0
3. none
4. overloading
1.
n
2. n/2
A finite automata that will accept only string X of length n will have _________ many states
9 3.0
3. n+1
4. infinite
1. 3
2. 4
12 A quadruple is a record structure with ______ fields. 2.0
3. 1
4. 2
1.
Zero addressing
2.
A Stack-organised Computer uses instruction of Two-addressing
13 1.0
3.
Indirect addressing
4. Index addressing
1. constant
2. non static
15 All member functions are _____ to it's class by default 4.0
3. dynamic
4. static
4. Secured Code
S.NO. Questions Choices Answers
1. Exactly one leftmost derivation for a string w
1. integrated circuits
4. adapter cards
1. {b^na^mc^p|n,m,p>=1}
2. {ba^nc|n>=0}
21 baa*c denotes the set 1.0
3. {ba^nc|n>=1}
1. encoder
4. decoder
1. 2
2. 4
Calculate the person months for a project that was completed in two months with two people
23 3.0
working on it. 3. 1
4. 8
1. sizeof( int ) * 2
4. sizeof( float )
1. nothing
1. deep copy
2. shallow copy
26 class n{ public: int *a;}o,p; assigning o=p is called? 2.0
3. error
4. constructor
1. error
2. error
28 class n{ public: int a=7;}p,q; cout<< n.a; 3. depends on compiler 2.0
4. 7
1.
3
2.
Consider the regular language L = (111 + 11111)*. The minimum number of states in any DFA 5
29 accepting the language is 4.0
3.
8
4. 9
1.
index addressing mode.
2.
Content of the program counter is added to the address part of the instruction in order to obtain the register mode.
30 effective address is called. 4.0
3. implied mode.
4.
relative address mode.
31 Data Members of the base class that are marked private: 3. exist in memory when the object of the derived class is created 4.0
the derived class
4. does exist in memory when the object of the derived class is created
1. 1111
2.
1101
3.
Decimal number 9 in Gray code is
32 2.0
1100
4.
1110
2. The most expensive defect to correct is the one detected during the
During a software development project two similar requirements defects were detected. One was implementation phase.
33 detected in the requirements phase, and the other during the implementation phase. Which of the 2.0
following statements is mostly likely to be true? 3. The most expensive defect to correct is the one detected during the
requirements phase.
2. used in Windows OS
35 FAT file system is 1.0
3. about storage in RAM
4. Indexed Allocation.
1. helper
2. header
36 Files whose names end in .h are called _____ files 2.0
3. handy
4. helping
S.NO. Questions Choices Answers
1.
type-1
2.
type-3
Finite automata recognizes --------grammars
37 2.0
3. type-0
4.
type-2
1.
Boolean values
2.
Floating point representation is used to store ______. real integers
38 2.0
3. integers
4.
whole numbers
1. Use-case Diagram
2. Sequence Diagram
40 Functional requirements of a system is modelled using 1.0
3. Class Diagram
4. Package Diagram
1.
N^2
2.
Given an arbitrary non-deterministic finite automaton (NFA). with N states, the maximum number 2N
41 of states in an equivalent minimized DFA is at least. 3.0
3.
2^N
4. N!
1.
1, 2 and 3
Given the language L = {ab, aa, baa}, which of the following strings are in L*? 2.
1) abaabaaabaa 2, 3 and 4
2) aaaabaaaa
42 3) baaaaabaaaab 3. 3.0
4) baaaaabaa 1, 2 and 4
4.
1, 3 and 4
1. not possible
4. error
1.
16
2.
26
How many DFAs exit with two state over the input alphabet (a,b)
44 4.0
3.
32
4. 64
1. 16
2. 64
45 How many possible outputs would a decoder have with a 6-bit binary input? 2.0
3. 128
4. 32
S.NO. Questions Choices Answers
1. 2
2. 4
46 How many select lines would be required for an 8-line-to-1-line multiplexer? 3.0
3. 3
4. 8
1. three
2. four
47 How many stages are there in process improvement? 1.0
3. five
4. six
1.
12
2.
14
How many two state FA can be drawn over alphabet{0,1} which accepts(0+1)*
48 3.0
3.
20
4. 15
1. delete(var-name);
2. dalloc(var-name);
49 How will you free the allocated memory ? 3.0
3. free(var-name);
4. remove(var-name);
1. for (; ; )
2. if (1)
50 Identify the invalid statement from the following 3.0
3. break(0)
4. while(false)
1. (10011000)
2.
(11001100)
If a register containing binary data (11001100) is subjected to arithmetic shift left operation, then
51 the content of the register after 'ashl' shall be 3. 1.0
(1101100)
4.
(10011001)
1. intranet
2. ERP
If a university sets up web-based information system that faculty could access to record student
52 1.0
grades and to advise students, that would be an example of an 3. extranet
4. CRM
1.
n+2
2.
If M1 machine recognizing L with n states, then M2 recognizing L* constructed Using Thompson n+1
53 construction will have ------------- states. 2.0
3.
n
4. n-1
1.
n+2
2.
If M1 machine recognizing L with n states, then M2 recognizing L* constructed Using Thompson n+1
54 construction will have ------------- states. 2.0
3.
n
4. n-1
1.
m+2
2.
If there is a complete DFA M1 recognizing a language L1 and has m states out of which two are
final states then the machine M recognizing L1 complement will have _____________ final m
55 1.0
states.
3.
m-2
4. 2
S.NO. Questions Choices Answers
1. X(class X* arg)
2. X(X& arg)
56 If X is the name of the class, what is the correct way to declare copy constructor of X? 2.0
3. X(X* arg)
4. X(X arg)
1. all parameters to the left of that variable must have default values
2. all parameters to the right of that variable must have default values
57 If you assign a default value to any variable in a function prototype's parameter list, then _____ 3. all other parameters in the function prototype must have default values 2.0
1. text
2. source
If you want to use a class to define objects in many different programs, you should define the class
58 3.0
in a C++ _____ file 3. header
4. program
4. No conversion is necessary
1. new
2. this
60 In C++, dynamic memory allocation is accomplished with the operator ____ 1.0
3. malloc
4. delete
1. malloc()
2. delete
61 In C++, dynamic memory allocation is achieved with the operator _______ 3.0
3. new
4. this
1.
9’s complement
2. 2’s complement
4.
1’s complement
1. one for the primary functions and one for the auxiliary functions
2. one for the public data and one for the private data
65 Many programmers separate a class into two files: _____ 4.0
3. one for the void functions and one for the other functions
2. Strength Reduction
Multiplication of a positive integer by a power of two can be replaced by left shift, which executes
66 2.0
faster on most machines. This is an example of 3. Induction Variable
4. Loop unwinding
S.NO. Questions Choices Answers
1. input data select lines
1. Three arguments
2. Two arguments
68 Overloading a prefix increment operator by means of a member function takes 3.0
3. No argument
4. One argument
1. inheritance
2. reusability
72 Templates improve 2.0
3. class
4. functions
1. p
2. Epsilon
73 The Epsilon-Closure of any state q will contain the state ______________ irrespective of q. 3.0
3. q
4. Final State
1.
0.1111
2.
0.0111
74 The binary value for 0.4375 is 2.0
3.
0.0011
4. 0.1010
75 The call to the parameterized constructor of base class in the derived class 3. appears at the statement where the derived class object is created 2.0
1. Software reuse
2. Software Security
76 The fundamental notions of software engineering does not account for ? 3.0
3. Software Validation
4. Software processes
S.NO. Questions Choices Answers
1. Context-sensitive but not context-free
p q r
The language is L={0 1 0 | p,q,r ³ 0 , p ¹ r} is 3. Regular
77 4.0
4. Context-free
1. strnstr()
2. strrchr()
78 The library function used to find the last occurrence of a character in a string is 2.0
3. laststr()
4. strstr()
1.
79 The major source of data for other systems are: 2. Transaction Processing Systems 2.0
3. Decision Support System
1. private
2. protected
80 The members of a class in c++ by default, are 1.0
3. public
4. mandatory to specify
1. Infinite
2. One
81 The minimum length for strings in the regular expression ( 10* + 001* )* is _________ 3.0
3. Zero
4. Two
1. 10's Complement
2. 2's complement
3.
82 The negative numbers in the binary system can be represented by 2.0
Sign magnitude
4.
I's complement
1.
8 half-adders, 8 full-adders
2.
1 half-adders, 15 full-adders
The number of full and half-adders required to add 16-bit numbers is
83 2.0
3.
16 half-adders, 0 full-adders
4. 4 half-adders, 12 full-adders
1.
m-n
2.
The number of states in a machine M recognizing L1UL2 will be __________________ where n m+n
84 is the number of states in M1 and m is the number of states in M2 . 2.0
3.
m+n+1
4. n-m
S.NO. Questions Choices Answers
1.
m-n
2.
The number of states in a machine M recognizing L1UL2 will be __________________ where n m+n
85 is the number of states in M1 and m is the number of states in M2 . 2.0
3.
m+n+1
4. n-m
1.
Greater then
2. equal to
86 The number of states in DFA is -------- the number of states in NFA for the same Language. 3. 3.0
less then
4.
greater then or equal to
1.
36
2.
The processor 80386/80486 and the Pentium processor uses _____ bits address bus: 32
87 2.0
3.
16
4. 64
1.
(a+b)^+
2.
a^+b^+
88 The set of all strings over the alphabet {a,b} (including epsilon} is denoted by 4.0
3. a*b*
4.
(a+b)*
1. organizational culture.
2. behavioral model.
The set of fundamental assumptions about what products the organization should produce, how
89 1.0
and where it should produce them, and for whom they should be produced is 3. rational model.
4. agency theory.
1. organizational culture.
2. behavioral model.
The set of fundamental assumptions about what products the organization should produce, how
90 1.0
and where it should produce them, and for whom they should be produced is 3. rational model.
4. agency theory.
1.
Control table
2.
The special memory used to store the micro routines of a computer is ________. Control store
91 2.0
3.
Control mart
4. Control shop
1. sequential circuits
2. complex circuits
92 The system having memory elements are called. 1.0
3. combinational circuits
4. logic circuits
S.NO. Questions Choices Answers
1. 6
2. 31
93 The term m45 should be made up of at least _____ literals. 1.0
3. 4
4. 5
94 The three key levels at which responsibility can be defined is at the ____,_______,____ 3. Project, Activity, WBS 4.0
1. priming
2. pretest
The while loop is referred to as a(n) _____ loop because the loop condition is tested at the
95 2.0
beginning of the loop 3. initial
4. beginning
1. Actors
2. Objects
98 Usecase analysis focuses upon 1.0
3. Data
4. Entities
1. Local
2. Global
99 Variables inside parenthesis of functions declarations have _______ level access. 1.0
3. Module
4. Universal
1.
IGP
2. EGP
WE RECEIVED “404 – PAGE NOT FOUND” MESSAGE, WHEN WE BROWSE THE 3.
101 WEB PAGE. WHICH PROTOCOL PROVIDES THIS MESSAGE? 4.0
SNMP
4.
ICMP
S.NO. Questions Choices Answers
1.
1 and 2
2.
What are the minimum number of 2-to-1 multiplexers required to generate a 2- input AND 1 and 3
gate and a 2-input Ex-OR gate?
102 1.0
3.
1 and 1
4. 2 and 2
1. A Flip flop
2. A counter
104 What is an Accumulator? 3.0
3. A Sequential Logic Circuit
4. A flip flop
1. n/2
2. n-1
107 What is the maximum number of reduce moves that can be taken by a bottom-up parser for a 2.0
3. 2n-1
4. 2^n
1. 50-20-30
2. 50-30-20
108 What is the recommended distribution of effort for a software project? 4.0
3. 30-40-30
4. 40-20-40
1. no return type
2. int
109 What is the return type of the conversion operator function? 3. void 1.0
4. float
1. S0 = 1, S1 = 0, S2 = 1
2. S0 = 1, S1 = 1, S2 = 0
110 What is the status of the inputs S0, S1, and S2 of the 74151 eight-line multiplexer in order for the 1.0
output Y to be a copy of input I5? 3. S0 = 0, S1 = 1, S2 = 0
4. S0 = 0, S1 = 0, S2 = 1
2. 5 0 0
112 What will be the output of the following code #include void main() { int i; int a[3]=5; for
3.0
(i=2;i>=0;i--) { printf(?%d\n?,a[i]); } } 3. 5 garbage garbage
4. 5 null null
1.
Memory Read cycle
2.
Fetch cycle
113 When an instruction is read from the memory, it is called 3.0
3.
Instruction cycle
4.
Memory write cycle
1.
Two
2.
When FA M is given which recognizes language L and reverse of L is found by using M then Three
114 there can be ___________Final states 3.0
3.
Only one
4. Any number
1.
3
2.
When there is complete DFA with Five states out of which two are final states if F is modified
2
115 such that it recognizes complement of the original language then there will be at least
3.0
_________final states. 3.
5
4. 7
1. dot
2. binary +
116 When there is more than one final state in the reduced FA, then its regular expression will contain
4.0
_________ operator surely 3. star
4. unary +
1. M1 OR M2
2. M1 AND M2
When we concatenate two languages L1 and L2 recognized by machine M1 and M2 we obtain a
2.0
117 machine with final state same as that of __________________ 3. M2
4. M1
1. double funct(char x)
2. void funct();
119 Which is not a proper prototype? 1.0
3. char x();
1.
191.168.1.1/24
2.
191.168.1.1/16
191.168.1.1/8
4.
191.168.1.1/4
S.NO. Questions Choices Answers
1. SMTPMP
2. IMAP
121 WHICH OF THE BELOW IS NOT AN EMAIL PROTOCOL? 4.0
3. POP
4. SNMP
1. call displayName
2. call displayName ()
122 Which of the following calls a function named displayName, passing it no actual arguments? 4.0
3. displayName
4. displayName()
4. nondeterministic TM to deterministic TM
1. Leftmost derivation
1. compare();
2. cmp();
125 Which of the following functions compares two strings? 4.0
3. stringcompare();
4. strcmp();
1. a;
2. *a;
126 Which of the following gives the memory address of a variable pointed to by pointer a? 1.0
3. &a;
4. address(a);
1. Quadraples
2. int funct();
128 Which of the following is a complete function? 4.0
3. void funct(x) { printf(?Hello"); }
1. void ~Country()
4. Country()
2.
3.
1. Collaborative technologies
4. Object technologies
1. Copy Constructor
2. Friend Constructor
133 Which of the following is not a type of constructor? 2.0
3. Default Constructor
4. Parametrized Constructor
1. /*
2. //
134 Which of the following is the insertion operator? 3.0
3. <<
4. >>
1. internal
2. protected
136 Which of the following language feature is not an access specifier in C++? 1.0
3. public
4. private
1. (aaa+ab+a)+(bbb+bb+a)
2.
((a+b) (a+b) (a+b))*
Which of the following regular expression denotes a language comprising of all possible strings
137 over {a,b} of length n where n is a multiple of 3? 3. 2.0
(aaa+bbb)*
4.
(a+b+aa+bb+aba+bba)*
1. r* s* = r* + s*
2. (r + s)* = (r*s*)*
4. (r + s)* = r* s*
4. static int a;
S.NO. Questions Choices Answers
1. FCFS
2. Round Robin
140 Which of the following scheduling algorithm comes under preemptive scheduling? 2.0
3. Multilevel Queue Scheduling
1. _ (underscore)
2. - (hyphen)
141 Which of the following special symbol is allowed in a variable name? 1.0
3. | (pipeline)
4. * (asterisk)
4. If R = R1+ R2 , L(R) is empty if and only if both L(R1) and L(R2) are
empty.
4. If there is a CFG G that accepts L, then there is also a PDA that accept
L.
1. this.x
2. *this.x
146 Which of the following ways are legal to access a class data member using this pointer? 3.0
3. this->x
4. *this-x
1. An LR(k) parser.
2. An LALR(k) parser
147 Which one of the following is a top-down parser? 4.0
3. Operator precedence parser.
2. Staff appraisals.
148 Which one of the following is a valid project Key Performance Indicator (KPI)? 4.0
3. Management buy in.
4. Milestone achievement.
2. void Display(void) = 0;
149 Which one of the following is the correct way to declare a pure virtual function? 3.0
3. virtual void Display(void) = 0;
1.
The set of all strings containing at least two 0’s
2. The set of all strings that begin and end with either 0 or 1.
Which one of the following languages over alphabet {0,1} is described by the regular expression:
150 (0+1)*0(0+1)*0(0+1)*? 3. 1.0
The set of all strings containing at most two 0’s.
4.
The set of all strings containing the substring 00.
2. RAD Model
151 Which one of the following models is not suitable for accommodating any change? 3.0
3. Waterfall Model
4. Prototyping Model
1.
0*(11*0)*
2. 0*1*01
Which one of the following regular expressions over {0,1} denotes the set of all strings not
3.
152 containing 100 as a substring? 1234.0
0*(10+1)*
4.
0*1010*
1. a*b*
Write the regular expression to denote the language L over ? ={ a,b} such that all the string do not 2. b*a*
155 contain the substring “ ab”. 24.0
3. (ab)*
4. (ba)*
1.
Von-Neuman architecture
2.
RISC architecture
156 Zero address instruction format is used for 4.0
3.
CISC architecture
4. Stack-organized architecture
S.NO. Questions Choices Answers
1.
Steeper
2.
Flatter
157 In a slab under steady state conduction if the thermal conductivity increases along the thickness, the 1.0
temperature gradient along the direction will become 3.
Constant
4.
mixed pattern
1.
2 sec
2.
The temperature of a gas stream is to be measured by a thermocouple whose junction can be
3 10 sec
approximated as 1-mm-dia sphere. The properties of the junction are k = 35 W/m °C, ρ = 8500 kg/m ,
158 and Cp = 320 J/kg °C, and the convection heat transfer coefficient between the junction and the gas is h = 3. 3.0
2
210 W/m °C. The time taken by the thermocouple to read 99 percent of the initial temperature
difference 28 sec
4.
63 sec
1.
increase
2.
decrease
159 Assuming flow to be laminar, if the diameter of the pipe is halved, then the pressure drop will 1.0
3.
remain same
4.
be quadrupled
1.
ML-1T-1
2.
-1
MLT
160 Dimension of absolute viscosity is 1.0
3.
-1
ML T
4.
MLT
1.Octal code
2.Grey code
Excess 3 code
1.
4 circuits
2.
2 circuits
When used with an IC, what does the term "QUAD" indicate?
162 1.0
3.
8 circuits
4.
6 circuits
S.NO. Questions Choices Answers
1.
1011
2.
1111
163 Adding 1001 and 0010 gives 1.0
3.
4.
1010
1.
2.
1
164 Radix of binary number system is _____? 3.0
3.
4.
A&B
1. is connected to Q
2.R is connected to Q
165 SR Flip flop can be converted to T-type flip-flop if ? 4.0
3.Both S and R are shortend
1.
2.
4.
3.
Register is a --------------------
167 Temporary storage unit within the CPU having dedicated or general 3.0
purpose use
1.
addition
2.
multiplication
4.
division
S.NO. Questions Choices Answers
1.
2.
3.
4.
1.
equal
2.
less
170 One operation that is not given by magnitude comparator 4.0
3.
greater
4.
addition
1.
a*
2.
a
171 Automaton accepting the regular expression of any number of a ' s is: 1.0
3.
a*b*
4.
abc
1.
|Q|
2.
Let L be a set accepted by a nondeterministic finite automaton. The number of states in non- 2|Q|
172 deterministic finite automaton is |Q|. The maximum number of states in equivalent finite 4.0
automaton that accepts L is 3.
2 raise to power |Q|*1
4.
1.
2.
3
173 Number of final state require to accept Φ(phi) in minimal finite automata. 4.0
3.
4.
0
S.NO. Questions Choices Answers
1.
2.
174 The embedded c program is converted by cross compiler to 2.0
the machine code corresponding to a processor which is different from
the processor of the PC used for application development
3.
4.
1.
(1*0)*1*
2.
0 + (0 + 10)*
175 The regular expression 0*(10*)* denotes the same set as 1.0
3.
4.
(0+1)*
1.
1 and 4 only
2.
Which of the following statements is/are FALSE?
(1) For every non-deterministic Turing machine, there exists an equivalent deterministic Turing 1 and 3 only
176 machine. 3.0
(2) Turing recognizable languages are closed under union and complementation. 3.
(3) Turing decidable languages are closed under intersection and complementation
(4) Turing recognizable languages are closed under union and intersection. 2 only
4.
3 only
1.
2.
4.
2 states
2.
4 states
178 What is the minimum number of states needed to a DFA over Σ= (a, b) which accept those words
3.0
from Σ such that the number of a is even and the number of b is divisible by three. 3.
6 states
4.
5 states
1.
yx
2.
4.
xyxyx
1.
(a + b)
2.
The CFG (a + b) (a + b)*
180 s---> as | bs| a | b 2.0
3.
is equivalent to regular expression
(a + b) (a + b)
4.
(a + b) (a + b)(a + b) (a + b)
1.
Pumping Lemma
2.
RE
3.
181 ----------------------------is used to check whether the language is not regular. 1.0
MN Theorem
4.
1.
2.
The minimum number of page frames that must be allocated to a running process in a virtual page size
182 memory environment is determined by 1.0
3.
4.
11
A computer has a 256 KByte, 4-way set associative, write back data cache with block size of 32
Bytes. The processor sends 32 bit addresses to the cache controller. Each cache tag directory entry 2.
183 contains, in addition to address tag, 2 valid bits, 1 modified bit and 1 replacement bit. The size of 14 4.0
the cache tag directory is
3.
27
4.
16
1.
2.
184 Pre-emptive scheduling is the strategy of temporarily suspending a running process to allow starving processes to run 1.0
3.
when it requests IO
4.
None of mentioned
1.
2.
4.
1.
2.
4.
1.
X
The truth table
X Y f(X,Y)
0 0 0 2.
0 1 0
1 0 1 X+Y
187 1 1 1 1.0
represents the Boolean function
3.
X'Y'
4.
Y
S.NO. Questions Choices Answers
1.
(a+b+aa+bb+aba+bba)*
2.
(aaa+bbb)*
188 Which of the following regular expression denotes a language comprising of all possible 3. 3.0
strings over ∑= {a,b} of length n where n is a multiple of 3?
((a+b) (a+b) (a+b))*
4.
(aaa+ab+a)+(bbb+bb+a)
3. 3.0
189 Which of the following statement is true?
NFA and DFA have equal power
4.None
190 Assume that a mergesort algorithm in the worst case takes 30 seconds for an input of size 64. 1.256 2.2048 3.1024 4.512 4.0
Which of the following most closely approximates the maximum input size of a problem that can
be solved in 6 minutes?
1.
2.
4.
1.
var=100
#include < stdio.h >
int main()
2.
{
typedef auto int AI; var=AI
AI var=100;
192 4.0
printf("var=%d",var); 3.
return 0;
} var=0
Error
1.
myName=ABCDEFG(size=7)
#include < stdio.h >
int main()
2.
{
typedef char* string; Error
string myName="ABCDEFG";
193 4.0
printf("myName=%s (size=%d)",myName,sizeof(myName)); 3.
return 0;
} myName=ABCDEFG(size=4)
myName=ABCDEFG(size=8)
10012,10012
Find the output
1.
0 1 2 ... 255
#include < stdio.h >
void main() 2.
{ unsigned char var=0;
for(var=0;var<=255;var++); 255
{
196 1.0
printf("%d ",var); 3.
}
} 256
#include <stdio.h>
#define MOBILE 0x01
1.
#define LAPPY 0x02
int main() I have purchased ...:
{ 2.
unsigned char item=0x00;
item |=MOBILE; I have purchased ...:Mobile, Lappy
197 item |=LAPPY; 3. 2.0
printf("I have purchased ...:");
if(item & MOBILE){ I have purchased ...:Mobile,
printf("Mobile, ");
} 4.
if(item & LAPPY){
printf("Lappy"); I have purchased ...:Lappy
}
return 1;
}
1.
#include <stdio.h> 13
int main() 2.
{
char flag=0x0f; d
198 flag &= ~0x02; 1.0
printf("%d",flag); 3.
return 0; 22
}
4.
Predict the Output.
10
1.
#include <stdio.h>
c = 12
int main()
{ 2.
int a=10;
int b=2; c = 10
int c;
199 3.0
c=(a & b); 3.
printf("c= %d",c);
c=2
return 0;
} 4.
Find the output.
c=0
S.NO. Questions Choices Answers
1.
10...20
1.
#include <stdio.h>
a=10,b=20,largest=20
#define LARGEST(x,y) (x>=y)?x:y
int main() 2.
{
int a=10,b=20,l=0; a=11,b=21,largest=20
l=LARGEST(a++,b++);
201 4.0
3.
printf("a=%d,b=%d,largest=%d",a,b,l);
return 0; a=11,b=21,largest=21
}
4.
Find the output
a=11,b=22,largest=21
1.
Error
#include <stdio.h>
#define MAX 100
2.
int main()
{ MAx=100...
202 #define MAX 20 3.0
printf("MAX=%d...",MAX); 3.
return 0;
} MAx=20...
MAX=10020
1.
Error
#include <stdio.h>
2.
#define MAX 10
int main()
1 3 4 5 6 7 8 9 10 11
{ int array[MAX]={1,2,3},tally;
203 for(tally=0;tally< sizeof(array)/sizeof(int);tally+=1) 3. 3.0
printf("%d ",*(tally+array));
return 0; 1230000000
}
Find the output 4.
0000000000
1.
1.
IncludeHelp
#include <stdio.h>
#define TEXT IncludeHelp 2.
int main()
{ TEXT
205 printf("%s",TEXT); 3.0
return 0; 3.
} Error
TEXT IncludeHelp
S.NO. Questions Choices Answers
#include <stdio.h> 1.
#define TRUE 1
int main() 1
{ 2.
if(TRUE)
printf("1"); Error
printf("2");
206 2.0
else 3.
printf("3");
printf("4"); 2
return 0;
} 4.
12
Find the output.
1.
Hello
#include <stdio.h>
#define TRUE 1 2.
int main()
{ Hello Hello Hello Hello ... (infinite times)
207 int loop=10; 4.0
while(printf("Hello ") && loop--); 3.
}
Hello (10 times)
Find the output 4.
1.
#include <stdio.h>
#include < string.h >
struct student 1.
{
char name[20]; Mike Thomas
}std;
char * fun(struct student *tempStd) 2.
{
strcpy(tempStd->name,"Thomas"); Mike Mike
209 return tempStd->name; 3.0
3.
}
ThomasThomas
int main()
{ 4.
strcpy(std.name,"Mike ");
printf("%s%s",std.name,fun(&std)); ThomasMike
return 0;
}
IncludeHelp4
1.
50...5011...50
#include <stdio.h>
#include <string.h> 2.
int main()
{ 11...50
char str[50]="IncludeHelp";
212 printf("%d...%d",strlen(str),sizeof(str)); 3. 2.0
return 0;
} 11...11
50...11
1.
#include <stdio.h>
#include <string.h> 0
int main()
{ 2.
int val=0;
char str[]="IncludeHelp.Com"; 1
213 3.0
val=strcmp(str,"includehelp.com"); 3.
printf("%d",val);
-1
return 0;
} 4.
#include <stdio.h> 1.
1.
#include <stdio.h>
Garbage
int main()
{ 2.
char *text="Hi Babs.";
B
216 char x=(char)(text[3]); 2.0
3.
printf("%c\n",x);
Error
return 0;
4.
}
Find the output Null
S.NO. Questions Choices Answers
1.
int main() 2.
{
int anyVar=10; 10
217 printf("%d",10); 2.0
return 0; 3.
}
Run Time error
extern int anyVar;
4.
Find the output
No output
1.
#include <stdio.h>
Error
int main()
{ 2.
int x=2.3;
const char c1=(float)x; 2.3,2
218 const char c2=(int)x; 2.0
3.
printf("%d,%d\n",c1,c2); 2.3000000,2
return 0; 4.
}
Find the output 2,2
#include <stdio.h> 1.
struct sample 0
{
int a; 2.
}sample;
100
219 int main() 2.0
{ 3.
sample.a=100; ERROR
printf("%d",sample.a);
return 0; 4.
}
arning
Find the output
#include <stdio.h>
char* fun1(void)
{
char str[]="Hello"; 1.
return str;
ERROR
}
2.
char* fun2(void)
{ Hello,Hello
220 char *str="Hello"; 4.0
return str; 3.
}
int main() Hello,Garbage
{
printf("%s,%s",fun1(),fun2()); 4.
return 0;
Garbage,Hello
}
step1: 1
#include <stdio.h>
int fooo(void) step2: 1
{
static int num=0; step3: 1
num++;
2.
return num;
}
step1: 1
int main()
{ step2: 2
int val;
222 2.0
val=fooo(); step3: 3
printf("step1: %d\n",val);
val=fooo(); 3.
printf("step2: %d\n",val);
val=fooo(); step1: 0
printf("step3: %d\n",val);
step2: 0
return 0;
} step3: 0
ERROR
1.
#include <stdio.h> 1.
int main()
00 01 02 03 04
{ int a[5]={0x00,0x01,0x02,0x03,0x04},i;
i=4; 2.
while(a[i])
{ 04 03 02 01 00
printf("%02d ",*a+i);
224 3.0
--i; 3.
}
return 0; 04 03 02 01
}
4.
Find the output
01 02 03 04
#include <stdio.h> 1.
int main()
12345
{ int a[5]={1,2,3,4,5},b[5]={10,20,30,40,50},tally;
2.
for(tally=0;tally< 5;++tally)
*(a+tally)=*(tally+a)+ *(b+tally); 10 20 30 40 50
225 3.0
for(tally=0;tally< 5;tally++) 3.
printf("%d ",*(a+tally));
11 22 33 44 55
return 0;
} 4.
Error
Find the output
1.
Error
#include <stdio.h>
2.
int main()
{ static int array[]={10,20,30,40,50}; 10...40
printf("%d...%d",*array,*(array+3)* *array);
226 4.0
return 0; 3.
}
10...300
Find the output
4.
10...400
S.NO. Questions Choices Answers
1.
Error
2.
A,A,A
B,B,B
C,C,C
D,D,D
E,E,E
#include <stdio.h>
int main() 3.
{ static int x[]={'A','B','C','D','E'},tally;
B,B,B
for(tally=0;tally< sizeof(x)/sizeof(int) ; tally+=1)
227 printf("%c,%c,%c\n",*(x+tally)+1,x[tally]+1,*(tally+x)+1); C,C,C 3.0
return 0;
} D,D,D
F,F,F
4.
E,E,E
D,D,D
C,C,C
B,B,B
A,A,A
1.
#include <stdio.h>
int main() \0IncludeHelpTRUE
{
char result,str[]="\0IncludeHelp"; 2.
result=printf("%s",str);
if(result) \0IncludeHelpFALSE
228 printf("TRUE"); 4.0
else 3.
printf("FALSE");
Error
return 0;
} 4.
1.
IncludeHelp
#include <stdio.h>
int main() 2.
{
char str[8]="IncludeHelp"; IncludeH
229 printf("%s",str); 3.0
3.
return 0;
} Error
No output
1.
HelloFriends
HelloFriends
#include <stdio.h>
int main() 2.
{
char str[]="Hello%s%dFriends"; Hello%s%dFriends
printf(str);
230 printf("\n"); Hello%s%dFriends 3.0
printf("%s",str);
3.
return 0;
} Hello(null)0Friends
4.
Garbage value
S.NO. Questions Choices Answers
1.
1.
A000000000
#include <stdio.h>
int main() 2.
{
char X[10]={'A'},i; A
for(i=0; i<10; i++)
232 4.0
printf("%d ",X[i]); 3.
return 0;
} A 32 32 32 32 32 32 32 32 32
4.
Find the output
Error
1.
Error
#include <stdio.h>
int main() 2.
{
char *str="IncludeHelp"; IncludeHelp
233 printf("%c\n",*&*str); 3.0
return 0; 3.
} I
*I
1.
4, 4, 4
1, 4
#include <stdio.h>
2.
int main(){
float a=125.50; 4, 4, 8
int b=125.50;
char c='A'; 1, 1
234 4.0
printf("%d,%d,%d\n",sizeof(a),sizeof(b),sizeof(125.50)); 3.
printf("%d,%d\n",sizeof(c),sizeof(65));
return 0; 4, 4, 4
}
1, 1
What will be the output on a 32 bit compiler.
4.
4, 4, 8
1, 4
1.
#include <stdio.h>
int main() 1.
{
int a=10; Hello...
if(a==10)
{ 2.
printf("Hello...");
break; Hello...OK
237 printf("Ok"); 4.0
} 3.
else
{ OK...
printf("Hii");
} 4.
return 0;
} Error
Find the output.
1.
Error
#include <stdio.h>
int main()
{ 1.
int i;
0IHelp 1IHelp 2IHelp 3IHelp 4IHelp
for(i=0; i< 5; i++)
{ 2.
if(i*i > 30 )
goto lbl; 0IHelp 1IHelp 2IHelp 4IHelp
else
239 1.0
printf("%d",i); 3.
lbl:
printf("IHelp "); 1IHelp
} 4.
return 0;
Error
}
Error
S.NO. Questions Choices Answers
1.
#include <stdio.h>
int main() No output
{
int pn=100; 2.
if(pn>20)
if(pn<20) Hiiiii
241 printf("Heyyyyy"); 2.0
else 3.
printf("Hiiiii");
Heyyyyy
return 0;
} 4.
1.
#include <stdio.h>
int main() ERROR
{
int var=100; 2.
{
int var=200; 200...200
242 printf("%d...",var); 4.0
} 3.
printf("%d",var);
100...100
return 0;
} 4.
1.
Garbage
#include <stdio.h> 1.
int main()
{ Error
int iVal;
char cVal; 2.
void *ptr; // void pointer
iVal=50; cVal=65; value =50,size= 4
#include <stdio.h> 1.
int main()
01000
{
static int var[5];
2.
int count=0;
02000
var[++count]=++count;
245 3.0
for(count=0;count<5;count++) 3.
printf("%d ",var[count]);
00200
return 0;
} 4.
00000
Find the output
S.NO. Questions Choices Answers
#include <stdio.h> 1.
int main()
{ 12, 12
struct sample{ 2.
int a;
int b; 12, 0
sample *s;
246 4.0
}t; 3.
printf("%d,%d",sizeof(sample),sizeof(t.s)); Error
return 0;
} 4.
12, 4
Find the output
#include <stdio.h> 1.
int main()
{ Name: Mike, Age: 26
struct std
{ 2.
char name[30];
int age; Name: Garbage, Age: Garbage
247 }; 1.0
3.
struct std s1={"Mike",26};
struct std s2=s1; Name: Null, Age: 26
printf("Name: %s, Age: %d\n",s2.name,s2.age); 4.
}
Error
Find the output
#include <stdio.h>
1.
int main()
{ ERROR
typedef struct tag{
char str[10]; 2.
int a;
}har; IHelp, 10
#include <stdio.h> 1.
int main()
10,10
{
union test 2.
{
int i; 10,0
int j;
249 4.0
}; 3.
Error
Find the output
#include <stdio.h>
int main() 1.
{
union values A,B,0
{
int intVal; 2.
char chrVal[2];i
}; A,B,16961
250 2.0
3.
union values val;
val.chrVal[0]='A'; val.chrVal[1]='B'; B,B,66
printf("\n%c,%c,%d",val.chrVal[0],val.chrVal[1],val.intVal); 4.
return 0;
} A,A,65
2004
#include <stdio.h>
int main() 2.
{
void *ptr; 2001
++ptr;
252 2.0
printf("%u",ptr); 3.
return 0;
} 2000
ERROR
#include <stdio.h> 1.
struct employee{
int empId; Id: 3, Age: 24, Name: Mike
char *name;
int age; 2.
};
int main() Id: 3, Age: 23, Name: Mike
253 { 3.0
3.
struct employee emp []={ {1,"Mike",24}, {2,"AAA",24}, {3,"BBB",25}, {4,"CCC",30} };
Id: 3, Age: 30, Name: AAA
printf("Id : %d, Age : %d, Name : %s", emp[2].empId,3[emp].age,(*(emp+1)).name);
return 0; 4.
}
Error
Find the output
1.
#include <stdio.h> Case-2
void main()
{ 2.
int a=2;
switch(a) Message
{
printf("Message\n"); 3.
default:
254 printf("Default\n"); Message 4.0
case 2:
Case-2
printf("Case-2\n");
case 3: 4.
printf("Case-3\n");
} Case-2
printf("Exit from switch\n");
} Case-3
Find the output
Exit from switch
S.NO. Questions Choices Answers
#include <stdio.h>
void main(){
static int staticVar;
int j;
for(j=0;j<=5;j+=2) 1.
switch(j){
case 1: 0
staticVar++;
break; 2.
case 2:
staticVar+=2; 1
255 case 4: 1.0
3.
staticVar%=2;
j=-1; 2
continue;
default: 4.
--staticVar;
continue; Error
}
printf("%d",staticVar);
}
2
#include <stdio.h>
void main(){ 2.
int a=0;
1
a=5||2|1;
256 printf("%d",a); 3. 2.0
}
0
Find the output.
4.
#include <stdio.h>
void main(){
int a=1; 1.
switch(a/2)
Case NULL
{
case NULL: 2.
printf("Case NULL\n");
break; Case ZERO
case 0:
257 4.0
printf("Case ZERO\n"); 3.
break;
default: Case DEFAULT
printf("DEFAULT\n");
break; 4.
}
Error
}
1.
ABCDE
ABCDE
ABCDE
ABCDE
ABCDE
2.
4.
ABCDE
ABCD
ABC
AB
#include <stdio.h>
void main()
{ 1.
int i=1;
Error
while (i<=5)
{ 2.
printf("%d",i);
if (i==5) 12345includehelp.com
goto print;
261 i++; 3. 1.0
}
} 1234includehelp.com
fun()
{ 4.
print:
1includehelp.com 2includehelp.com 3includehelp.com 4includehelp.com
printf("includehelp.com");
5includehelp.com
}
4.ERROR
S.NO. Questions Choices Answers
#include <stdio.h> 1.
void main()
{ #0#1#2#3#4#5#6###
int tally;
2.
for(tally=0;tally<10;++tally)
{ #0#1#2#3#4#5#6#7#8#9#10
printf("#");
263 if(tally>6) 3. 1.0
continue;
printf("%d",tally); #0#1#2#3#4#5##7#8#9#10
}
} 4.
1.
34
#include <stdio.h> 2.
void main(){
unsigned char c=290; 290
264 printf("%d",c); 1.0
3.
}
Garbage value
Find the output
4.
Error
1.
0 1 2 ... infinity
#include <stdio.h>
void main() 2.
{
char cnt=0; 1 2 2 ... 127
265 for(;cnt++;printf("%d",cnt)) ; 4.0
printf("%d",cnt); 3.
} 0
1.
1.
sum=30
#include
2.
#define SUM(x,y) int s; s=x+y; printf("sum=%d\n",s);
int main() 10,20
267 { 3. 1.0
SUM(10,20);
return 0;
Error
}
4.
Find the output
sum=0
1.
11, 11
#include
int main()
2.
{
char ch=10; 10, 11
void *ptr=&ch;
268 1.0
printf("%d,%d",*(char*)ptr,++(*(char*)ptr)); 3.
return 0;
} Error
10, 10
S.NO. Questions Choices Answers
#include 1.
int main()
{ BBBBB
char *str []={"AAAAA","BBBBB","CCCCC","DDDDD"}; 2.
char **sptr []={str+3,str+2,str+1,str};
char ***pp; CCCCC
269 3.0
pp=sptr; 3.
++pp;
printf("%s",**++pp+2); BBB
return 0;
} 4.
Error
Find the output
1.
#include 5
int main()
2.
{
int a=10,b=2; 5.0
int *pa=&a,*pb=&b;
270 1.0
printf("value = %d", *pa/*pb); 3.
return 0;
} ERROR
No output
#include 1.
void fun(int *ptr)
{ 100,100
*ptr=100;
} 2.
int main()
{ 50,50
271 int num=50; 3.0
3.
int *pp=#
fun(& *pp);
50,100
printf("%d,%d",num,*pp);
return 0; 4.
}
Error in function calling
Find the output
1.
#include
#define FUN(x) x*x 2
int main()
{ 2.
int val=0;
12864
272 val=128/FUN(8); 2.0
printf("val=%d",val); 3.
return 0;
} 40
1
1.
43
#include
int main () 2.
{
static int a[]={10, 20, 30 40, 50}; 140
273 static int *p[]= {a, a+3, a+4, a+1, a+2}; 2.0
int **ptr=p; 3.
ptr++;
printf ("%d%d", ptr p, **ptr); 89
}
The output of the program is __________ 4.
78
1.
Hello
#include <stdio.h>
#define TRUE 1 2.
int main()
{ ERROR
switch(TRUE)
274 3.0
{ 3.
printf("Hello");
} No output
}
Find the output 4.
Garbage
S.NO. Questions Choices Answers
1.
#include <stdio.h> 0, 1, 2, 3, 3, 4, 5, 0, 1
enum numbers
{ 2.
zero, one, two, three , four=3,five,six,seven=0,eight
}; 0, 1, 2,3,3,1,2,3,4
275 void main()
1.0
{3.
printf("%d,%d,%d,%d,%d,%d,%d,%d,%d",zero,one,two,three,four,five,six,seven,eight);
0,1,2,3,3,1,2,3,4
}
4.
What will be the output.
0, 1, 2, 3, 3, 4, 5, 0, 9
1.
-5
#include <stdio.h>
int main(){ 2.
char val=250;
int ans; -6
276 ans= val+ !val + ~val + ++val; 2.0
printf("%d",ans); 3.
return 0;
0
}
Find the output. 4.
1.
1.
value of a=10
#include <stdio.h>
2.
int main(){
float a; value of a=10.000000
(int)a= 10; 4.0
278
printf("value of a=%d",a); 3.
return 0;
} value of a=0
Find the output
4.
L-Value required
1.
00121
#include <stdio.h>
int main()
2.
{
int i=-1,j=-1,k=0,l=2,m; 00132
m=i++&&j++&&k++||l++; 3.0
279
printf("%d %d %d %d %d",i,j,k,l,m); 3.
return 0;
} 00131
01131
1.
24, 24
#include <stdio.h>
int main() 2.
{
int intVar=24; 24, 0
static int x=intVar; 3.0
280
printf("%d,%d",intVar,x); 3.
return 0;
} Error: Illegal Initialization
#include <stdio.h> 0
int main()
{ 2.
int ok=-100;
-100
-100;
281 printf("%d",ok); 2.0
3.
return 0;
} 100
Error
1.
ERROR
#include <stdio.h> 2.
int main()
value of var= -10
{
int var; value of var= 10
var=- -10;
printf("value of var= %d\n",var); 3.
282 var=+ +10; 3.0
printf("value of var= %d\n",var); value of var= 10
return 0;
} value of var= 10
value of var= 10
value of var= 11
1.
x=100
x=100
#include <stdio.h> 2.
int main(){
x=100
int x;
x=100,30,50; x=50
printf("x=%d\n",x);
283 2.0
x=(100,30,50); 3.
printf("x=%d\n",x);
return 0; x=50
}
Find the output x=50
4.
x=50
x=100
1.
Error
1.
var : D, 68
S.NO. Questions Choices Answers
#include <stdio.h>
void main()
{ 1.
int a=2;
switch(a/2*1.5) One...
{
case 1: 2.
printf("One...");
break; Two...
286 case 2: 4.0
3.
printf("Two...");
break; Other...
default:
printf("Other..."); 4.
break;
} Error
}
1.
1.
AABB1
AABB1
#include <stdio.h>
void main() 2.
{
int x; 1
x= (printf("AA")||printf("BB"));
printf("%d",x); 1
290 printf("\n"); 4.0
3.
x= (printf("AA")&&printf("BB"));
AABB1
printf("%d",x);
} AA1
AA1
AABB1
S.NO. Questions Choices Answers
291 $a = array( null => 'a', true => 'b', false => 'c', 0 => 'd', 1 => 'e', '' => 'f' ); echo count($a), "\n"; 1.2 2.3 3.4 4.5 2.0
What will be printed?
292 $a = array(); if ($a[1]) null; echo count($a), "\n"; What will be printed? 1.0 2.1 3.2 4.Code wont work 1.0
1.
Incremental development
2.
Agile
293 What is the most common approach for the development of application system now? 1.0
3.
Waterfall
4.
1.
RAW
2.
CHAR
294 ........ data type can store unstructured data 1.0
3.
NUMERIC
4.
VARCHAR
1.
infrastructure mode
2.
ad-hoc mode
295 A wireless network interface controller can work in 3.0
3.
4.
none
1.
2.
4.
Can't predict
1.
x = ~(-y); w = (x = (y = z));
q = a?b:(c?d:(e?f:g));
2.
Consider the following javascript statements x = a?b:(c?d:(e?f:g));
x = ~-y; q = ~(-y); w = (x = (y = z));
297 w = x = y = z; 3. 4.0
q = a?b:c?d:e?f:g;
x = (x = (y = z));w = ~(-y);
The above code snippet is equivalent to:
q = a?b:(c?d:(e?f:g));
4.
x = ~(-y); w = (x = (y = z));
q = (c?d:(e?f:g));
S.NO. Questions Choices Answers
1.
text==pattern
2.
Consider the following statements
text.equals(pattern)
298 var text = "testing: 1, 2, 3"; // Sample text 4.0
var pattern = /\d+/g // Matches all instances of one or more digits 3.
In order to check if the pattern matches with the string “text”, the statement is text.test(pattern)
4.
pattern.test(text)
1.
Partial Key
2.
Candidate Key
Surrogate Key
4.
Unique Key
----------- is a built - in JavaScript function which can be used to execute another function after a
300 given time interval. 1.Timeout( ) 2.TimeInterval( ) 3.setTimeout ( ) 4.All of the above 3.0
1.
alter
2.
update
301 .......... command can be used to modify a column in a table 1.0
3.
set
4.
create
1.
Constraints
2.
Stored Procedure
302 .………………… is preferred method for enforcing data integrity 1.0
3.
Triggers
4.
Cursors
1.
very low
2.
low
303 66.6% risk is considered as 4.0
3.
moderate
4.
high
304 8086 microprocessor is interfaced to 8253 a programmable interval timer. The maximum number 1.216 2.28 3.210 4.220 1.0
by which the clock frequency on one of the timers is divided by
S.NO. Questions Choices Answers
1.
User Interfaces
2.
Web Services
305 Which activity most easily lends itself to incremental design? 3. 3.0
4.
Embedded Sofftware
1.Gantt Chart 2.
Structure Chart
3.
1. Graphical representation of the project, showing each task and activity as horizontal bar whose
306 length is proportion to time taken for a completion of that activity is called Pert Chart 1.0
4.
Time Line
1.
2.
Defects are more likely to arise after software has been used
often
3071. Software deteriorates rather than wears out because 3.0
3.
4.
3.
3081. The 40-20-40 rule suggests that the least amount of development effort can be spent on 3.0
Coding
4.
Testing
1.
2.
4.
1.
component analysis
2.
requirements modification
system validation
4.
system design
S.NO. Questions Choices Answers
1.
Feasibility study
2.
Requirements validation
311 Which of the following is not a part/product of requirements engineering? 3. 4.0
System models
4.
Architectural design
1.
2.
You find out what services are required from the system
4.
none
1.
2.
4.
1.waterfall model 2.
Incremental model
3.
3141. This is a software development process model Boehm's Spiral model 4.0
4.
all
1.
architectural design
2.
Interface Design
1. What is the type of software design that defines interfaces between system
315 2.0
components? 3.
component Design
4.
database design
1.
454
The size of the data count register of a DMA controller is 16 bits. The processor needs to transfer a 2.
file of 29,154 kilobytes from disk to main memory. The memory is byte addressable. The
316 minimum number of times the DMA controller needs to get the control of the system bus from the 455 3.0
processor to transfer the file from the disk to main memory is
3.
456
4.
457
S.NO. Questions Choices Answers
1.
D type flip-flop
2.
R S type flip-flop
For which of the following flip-flop the output clearly defined for all combinations of two inputs?
317 3.0
3.
J K flip-flop
4.
T flip-flop
1.
Next State
2.
Present State
In excitation table of D flipflop next state is equal to
318 3. 4.0
Previous State
4.
D State
1.
33
2.
A computer system implements 8 kilobyte pages and a +32-bit physical address space. Each page
table entry contains a valid bit, a dirty bit, three permission bits, and the translation. If the 35
319 maximum size of the page table of a process is 24 megabytes, the length of the virtual address 4.0
supported by the system is _________ bits. 3.
34
4.
36
1.
Mapping
2.
A graphical display of the fundamental products in a truth-table is known as
Graphing
320 4.0
3.
T-map
4.
Karnaugh-Map
1.
30
2.
A processor can support a maximum memory of 4 GB, where the memory is word-addressable (a
word consists of two bytes). The size of the address bus of the processor is at least __________ 31
321 bits 2.0
3.
32
4.
33
S.NO. Questions Choices Answers
1.
Indirect addressing
2.
A Stack-organized Computer uses instruction of
Two-addressing
322 3.0
3.
Zero addressing
4.
Index addressing
1.
19
2.
A 4-way set-associative cache memory unit with a capacity of 16 KB is built using a block size of
8 words. The word length is 32 bits. The size of the physical address space is 4 GB. The number of 20
323 bits for the TAG field is 3. 2.0
21
4.
22
1.
Encoder
2.
Decoder
A circuit that converts n inputs to 2^n outputs is called
324 1.0
3.
Comparator
4.
1.
849
2.
A Program Counter contains a number 825 and address part of the instruction contains the number 850
24. The effective address in the relative address mode, when an instruction is read from the
325 memory is 2.0
3.
801
4.
802
1.
2.
4.
Consider a 6-stage instruction pipeline, where all stages are perfectly balanced.Assume that there 2.
is no cycle-time overhead of pipelining. When an application is executing on this 6-stage pipeline, 2
the speedup achieved with respect to non-pipelined execution if 25% of the instructions incur 2
327 pipeline stall cycles is 3. 3.0
4.5
1.
Consider a join (relation algebra) between relations r(R)and s(S) using the nested loop method. 2.
There are 3 buffers each of size equal to disk block size, out of which one buffer is reserved for
Relation s(S) is in the outer loop.
328 intermediate results. Assuming size(r(R)) 1.0
3.
Join selection factor between r(R) and s(S) is more than 0.5
4.
Join selection factor between r(R) and s(S) is less than 0.5.
1.
5535
Consider a main memory system that consists of 8 memory modules attached to the system bus,
which is one word wide. When a write request is made, the bus is occupied for 100 nanoseconds
(ns) by the data, address, and control signals. During the same 100 ns, and for 500 ns thereafter, 2.
the addressed memory module executes one cycle accepting and storing the data. The (internal)
329 operation of different memory modules may overlap in time, but only one request can be on the bus 65335 4.0
at any time. The maximum number of stores (of one word each) that can be initiated in 1
3.
millisecond is
53892
4.
10000
1.
1.5
Consider two processors P1 and P2 executing the same instruction set. Assume that under identical 2.
conditions, for the same input, a program running on P2 takes 25% less time but incurs 20% more 1.6
330 CPI (clock cycles per instruction) as compared to the program running on P1 If the clock 2.0
frequency of P1 is 1GHz, then the clock frequency of P2 (in GHz) is 3.
1.7
4.
1.8
1.
2.
Content of the program counter is added to the address part of the instruction in order to obtain the
331 effective address is called index addressing mode. 1.0
3.
register mode
4.
implied mode
S.NO. Questions Choices Answers
1.
2.
10
How many address bits are needed to select all memory locations in the 16K × 1 RAM?
332 3.0
3.
14
4.
16
1.
2.
If the associativity of a processor cache is doubled while keeping the capacity and block size Width of set index decoder
333 unchanged, which one of the following is guaranteed to be NOT affected? 4.0
3.
4.
1.
11 bits
2.
If the main memory is of 8K bytes and the cache memory is of 2K words. It uses associative 21 bits
334 mapping. Then each word of cache memory shall be_____. 3.0
3.
16 bits
4.
20 bits
1.
2.
4.
1.
binary sequence
2.
Minterms are arranged in map in a sequence of
336 gray code 2.0
3.
binary variables
4.
BCD code
S.NO. Questions Choices Answers
1.
2.
4.
1.
X+Y+Z
2.
XY + YZ
X + YZ
4.
XZ + Y
1.
2.
The 16-bit 2’s complement representation of an integer is 1111 1111 1111 0101, its decimal 2
339 representation is 4.0
3.
4.
-11
1.
Absolute
2.
Indirect
The addressing mode used in an instruction of the form ADD R1, R2 is _____.
340 3. 3.0
Index
4.
Register
1.
2.
The capacity of a memory unit is defined by the number of words multiplied by the number of 11 address, 8 data lines
341 bits/word. How many separate address and data lines are needed for a memory of 4 K × 16? 4.0
3.
4.
2.
4.
1.
Flash memory
2.
The Firmware are stored in read-only memory or ________ chips. Dynamic random access memory
343 3.0
3.
EEPROM
4.
Random-access memory
1.
hit ratio
2.
The performance of cache memory is frequently measured in terms of a quantity called
344 miss ratio 1.0
3.
average ratio
4.
ratio
1.
-256
2.
The smallest integer than can be represented by an 8-bit number in 2?s complement form is -128
345 2.0
3.
-127
4.
1.
2.
4.
Clock rate
2.
Clock speed
The rate at which a computer clock deviates from a perfect reference clock is called as
347 3.0
3.
4.
Transmission Bandwidth
1.
21
2.22
The width of the physical address on a machine is 40 bits. The width of the tag field in a 512 KB 8 -
348 way set associative cache is ______ bits 4.0
3.
23
4.
24
1.
2.
5
To build a mod-19 counter the number of flip-flops required is
349 2.0
3.
4.
1.
69282
2.
69272
69252
4.
69232
1.
2.
What is the main difference between traps and interrupts?
The kind of code that’s used to handle them 1.0
351
3.
4.
2.
Instruction cycle
4.
move R1, R2
2.
3.
move LOC1, R2
4.
move LOC2, R1
1.
RAID level 1
2.
RAID level 2
Which level of RAID refers to disk mirroring with block striping?
354 1.0
3.
RAID level 0
4.
RAID level 3
1.
1⊕0=1
2.
1 ⊕ 1 ⊕ 0 =1
Which of the following logic expression is incorrect?
355 2.0
3.
1⊕1⊕1=1
4.
1⊕1=0
1.
FIFO
2.
Which of the following paging algorithms is most likely to be used in a virtual memory system?
356 Second chance 3.0
3.
4.
expansion bus
2.
Which one of the following connects high-speed high-bandwidth device to memory subsystem and
3.
SCSI bus
4.
1.
Distributed parity
2.
No Parity
Which one of these is characteristic of RAID 5?
1.0
358
3.
4.
Double Parity
1.
RAID 1
2.
Which two RAID types use parity for data protection? RAID 4
4.0
359
3.
RAID 1+0
4.
RAID 5
1.
-10111
2.
-10011
X=1010100 and Y=1000011 using 1's complement Y-X is
3.0
360
3.
-10001
4.
-11001
1.
Zero
2.
The minimum number of NAND gates required to implement the Boolean function. A + AB' + 1
1.0
361 AB'C is equal to 3.
4.
7
S.NO. Questions Choices Answers
1.
ab + (cd)' + cd + bd'
2.
a (b + c) + cd
3.
Which of the following boolean expressions is not logically equivalent to all of the rest ?
362 3.0
ab + ac + (cd)'
4.
bd' + c'd' + ab + cd
1.
Encoder
2.
Decoder
Which of the following unit will choose to transform decimal number to binary code ?
363 1.0
3.
Multiplexer
4.
Counter
1.
Hash function
2.
Mapping function
The correspondence between the main memory blocks and those in the cache is given by
365 3. 2.0
Locale function
4.
Assign function
1.
33
The stage delays in a 4-stage pipeline are 800, 500, 400 and 300 picoseconds. The first stage (with 2.
delay 800 picoseconds) is replaced with a functionally equivalent design involving two stages with 34
366 respective delays 600 and 350 picoseconds. The throughput increase of the pipeline is __________
1.0
percent. 3.
35
4.
32
1.
driver
2.
What is the software that runs a computer, including scheduling tasks, managing storage, and application suitex
3.
367 handling communication with peripherals? 3.0
operating system
4.
bluetooth technology
S.NO. Questions Choices Answers
1.2n
2.
(2n-1)/2
368 For an undirected graph with n vertices and e edges, the sum of the degree of each vertex isequal 3.0
3.2e
to
4.
pow(e,2)/2
1.
higher-age
2.
increase-age
369 Which attribute is used to extend the lifetime of a cookie? 3. 3.0
max-age
4.
lifetime
1.
Internal Style
2.
Inline Style
370 <h2 style="color:blue">I am Blue</h2> is ____ way of styling HTML elements 3. 2.0
External Style
4.
Default
1.
Web 1.0
2.
Web 2.0
Web 3.0
4.
Web 4.0
1.
10, 8, 7, 3, 2, 1, 5
2.
10, 8, 7, 2, 3, 1, 5
A priority queue is implemented as a Max-Heap. Initially, it has 5 elements. The level-order
372 traversal of the heap is: 10, 8, 5, 3, 2. Two new elements 1 and 7 are inserted into the heap in that 3. 1.0
order. The level-order traversal of the heap after the insertion of the elements is:
10, 8, 7, 1, 2, 3, 5
4.
10, 8, 7, 5, 3, 2, 1
1.
threaded tree
4.
34
2.
99
4.0
374 A binary tree T has 20 leaves. The number of nodes in T having two children is 3.
4.
19
1.
2.
A process executes the code
4
fork ();
375 fork (); 3. 3.0
fork ();
The total number of child processes created is 7
4.
1.
2.
As Client always
376 A Search engine can serve as 1.0
3.
As Server always
4.
Generalization
2.
Association
377 An object of class A receives a message with an argument that is an instance of class B. Identify 1.0
the type of relationship between class A and Class B: 3.
Aggregation
4.
Realization
1.
505
2.
Consider an undirected graph G where self-loops are not allowed. The vertex set of G is {(i, j): 1 = 506
378 i = 12, 1 = j = 12}. There is an edge between (a, b) and (c, d) if |a - c| = 1 and |b - d| = 1. The 3. 2.0
number of edges in this graph is
507
4.
508
1.
1/8
2.
1
Consider an undirected random graph of eight vertices. The probability that there is an edge
379 between a pair of vertices is ½. What is the expected number of unordered cycles of length 3. 3.0
three?
7
4.
8
S.NO. Questions Choices Answers
1.
1.
ABCD EFGH
4.
DCBA
1.
+-167*2?5-34*
2.
Consider the following New-order strategy for traversing a binary tree:
1)Visit the root; .-+1*67?2-5*34
382 2)Visit the right subtree using New-order; 3.0
3)Visit the left subtree using New-order; 3.
The New-order traversal of the expression tree corresponding to the reverse polish expression 3 4 * - + 1 * 7 6 ? 2 - 5 * 4 3
5 - 2 ? 6 7 * 1 + - is given by:
4.
.176*+2543*-?-
1.
1.
15
Consider the following recursive C function.
Void get (int n) 2.
{if (n<1) return;
get (n-1) 25
384 get (n-3) ; 2.0
3.
printf ("%d",n);
If get(6) function is being called in main () then how many times will the get() function be invoked 43
before returning to the main ( ) ?
4.
24
S.NO. Questions Choices Answers
1.
7
Consider the function func shown below:
int func(int num) { 2.
int count = 0;
while (num) { 8
385 count++; 3.0
num>>= 1; 3.
}
9
return (count);
} 4.
The value returned by func(435)is
0
1.
80 30 62 114 77 9 99
2.
114 30 62 77 9 99
386 For the array (77 ,62,114,80,9,30,99), write the order of the elements after two passes using the 3. 2.0
Radix sort
9 114 30 62 77 80 99
4.
9 30 62 77 80 99 114
1.
<list>
2.
<ol>
2.0
387 How can you make a list that lists the items with numbers? 3.
<dl>
4.
<ul>
1.
using System.out.println
2.
4.0
388 How do you write "Hello World" in PHP? 3.
"Hello World"
4.
1.
UDP
2.
TCP
2.0
389 HTTP is implemented over 3.
SMTP
4.
POP
1.
isolated
2.
complete
2.0
390 If every node u in G adjacent to every other node v in G, A graph is said to be 3.
finite
4.
strongly connected
S.NO. Questions Choices Answers
1.
GET
2.
POST
392 In HTTP, which method gets the resource as specified in the URI 3. 3.0
PUT
4.
TRACE
1.
2.
4.
An application framework
1.
The following function computes the maximum value contained in an integer array a != n
p[ ] of size n (n >= 1).
2.
int max(int *p, int n) {
int a=0, b=n-1; b != 0
while (__________) {
395 if (p[a] <= p[b]) { a = a+1; } 3. 4.0
else { b = b-1; }
} b > (a+1)
return p[a];
} 4.
The missing loop condition is
b != a
1.
<em>
2.
<ins>
396 The following HTML element helps making animated text 3. 4.0
<mark>
4.
<marquee>
S.NO. Questions Choices Answers
1.
63
2.
64
397 The number of ways in which the numbers 1, 2, 3, 4, 5, 6, 7 can be inserted in an empty binary 2.0
3.
search tree, such that the resulting tree has height 6, is
65
4.
66
1.
2.
1.
<br>
2.
<h>
399 The following HTML element is used to display horizontal line 3. 3.0
<hr>
4.
<h2>
1.
static
2.
400 To prevent any method from overriding, the method has to declared as, const 3.0
3.
final
4.
extends
1.
multiprogramming
2.
multiuser interfacing
401 Use of ________ allows for some processes to be waiting on I/O while another process executes. 3. 1.0
Random scheduling
4.
1.
2.
4.
1.
5, undefined,undefined
2.
4.
5,null,undefined
1.
2.
4.
<input type="text">
2.
<textfield>
1.0
406 What is the correct HTML for making a text input field? 3.
<input type="textfield">
4.
<textinput type="text">
1.
I=0
What will be printed as the output of the following program?
public class testincr 2.
{
public static void main(String args[]) I=1
407 { 3. 2.0
int i = 0;
i = i++ + i; I=2
System.out.println(" I = " +i);
} 4.
}
I=3
S.NO. Questions Choices Answers
1.
getYear()
2.
getYYYY()
1.0
408 Which method is used to get the year of a date object in YYYY format in Javascript. 3.
getFullYear()
4.
get4Year()
1.
Text
2.
Password
4.0
409 Which of the following input controls that cannot be placed using <input> tag? 3.
Submit
4.
Textarea
1.
body:color=black
2.
{body;color:black}
4.0
410 Which is the correct CSS syntax?
3.
{body:color=black(body}
4.
n + 9378
2.
2^ n-1
2.0
411 Which of the following asymptotic notation is the worst among all? 3.
2^ n - 1
4.
2n ? 1
1.
(iv) only
1.
valign
2.
bgcolor
4.0
413 Which of these is not a valid attribute of <tr> element? 3.
align
4.
rowspan
S.NO. Questions Choices Answers
1.
GET
2.
HEAD
Which of these methods has no restrictions on content size when a form is submitted.
414 3.0
3.
POST
4.
PUT
1.
2.
Archie
415 Which one is the first search engine in internet? 2.0
3.
AltaVista
4.
WAIS
1.
45
2.
67
416 While inserting the elements 71,65,84,69,67,83 in an empty binary search tree (BST) in the 3. 2.0
sequence shown, the element in the lowest level is
34
4.
78
1.
2.
4.
1.
a prompt
2.
an error message
2.0
418 An incorrectly typed command will cause the operating system to display 3.
a question mark
4.
causes exception
1.
<tdleft>
2.
<td leftalign>
4.0
419 Choose the correct HTML to left-align the content inside a table cell 3.
<td valign="left">
4.
<td align="left">
S.NO. Questions Choices Answers
1.
#include <iostream.h>
using namespace std;
1.
void myFunction(int& x, int* y, int* z) {
static int temp=1; 3332
temp += (temp + temp) - 1;
2.
x += *(y++ + *z)+ temp - ++temp;
*y=x; 3233
x=temp;
424 *z= x; 3. gar3
cout<<x<<*y<<*z<<temp;
} 3232
int main() { 4.
int i = 0;
int j[] = {0, 1, 2, 3, 4, 5, 6, 7, 8, 9}; 3133
i=i++ - ++i;
myFunction(i, j, &i);
return 0;
}
1.
save
2.
dontresize
3.0
425 If you don’t want the frame windows to be resizeable, simply add what to the lines ? 3.
noresize
4.
Delete
1.
BSD Unix
2.
Windows
1.0
426 Sockets originate from 3.
Linux
4.
Mac
1.
10,20,15,23,25,35,42,39,30
2.
15,10,25,23,20,42,35,39,30
427 The preorder traversal sequence of a binary search tree is 30, 20, 10, 15, 25, 23, 39, 35, 42.Which 3. 4.0
one of the following is the postorder traversal sequence of the same tree?
15,20,10,23,25,42,35,39,30
4.
15,10,23,25,20,35,42,39,30
1.
What will be the output of the following C program?
void count(int n){ 312213444
static int d=1;
printf("%d ", n);
printf("%d ", d); 2.
d++;
312111222
428 if(n>1) count(n-1); 1.0
printf("%d ", d); 3.
}
3122134
void main(){
count(3);
} 4.
3121112
S.NO. Questions Choices Answers
1.
In the section
2.
In the section
429 Where in an HTML document is the correct place to refer to an external style sheet? head
3.
4.
At the top of the document
1.
2.
1.
CGI
2.
HTML
JavaScript
4.
CSS
1.
<tdleft>
432 Which of the following in HTML is used to left align the content inside a table cell? 4.0
3.
<td leftalign>
4.
2.
A cookie gains entry to the user's work area through an HTTP header
433 Which one of the following statements is NOT correct about HTTP cookies? 1.0
3.
GET
2.
HEAD
3.0
435 Which of these methods has no restrictions on content size when a form is submitted. 3.
POST
4.
PUT
1.
Stack
2.
queue
4.
linked list
The above code snippet for a BST with the address of the root node in pointer ‘root’ returns
1.
Class attribute
2.
name attribute
438 _____ is used to define a special CSS style for a group of HTML elements 3. 1.0
group attribute
4.
id attribute
1.
method attribute
2.
action attribute
439 The _______ attribute defines the action to be performed when the form is submitted 2.0
3.
onSubmit attribute
4.
onClick attribute
1.
S1 is a serializable schedule
Which of the following is correct regarding schedule S1? S1 is a conflict serializable schedule
4.
switching algebra
2.
arithmetic algebra
Boolean algebra is also called
441 1.0
3.
linear algebra
4.
algebra
1.
generate code
2.
4.
1.
Primary
2.
Validation
443 Activities such as documentation and software configuration management are what
4.0
kind of process activities? 3.
Design
4.
supporting
1.
quickest to complete
2.
highest-priority
444 In incremental delivery the ________ services are typically delivered first 2.0
3.
cheapest
4.
1.
degrade
2.
improve
445 In incremental development system structure tends to ______ as many new
1.0
increments are added. 3.
4.
shrink
S.NO. Questions Choices Answers
1.
2.
to marketing
446 Software specifications are intended to communicate the system needs 3.0
__________________ 3.
4.
1.
Incremental development
2.
This software process model takes the fundamental activities of specification, The waterfall model
development, validation, and evolution and represents them as separate process
447 phases such as requirements specification, software design, implementation, 3. 2.0
testing, and so on
Reuse-oriented software engineering
4.
1.
2.
4.
1.
architectural design
2.
interface Design
449 What is a type of software design that designs system data structures to be used 4.0
in a database? 3.
component Design
4.
Database design
1.
2.
What is based on the idea of developing an initial implementation, exposing this Incremental Development
450 to user comment and evolving it through several versions until an adequate system 3. 2.0
has been developed?
Reuse-oriented Software Engineering
4.
1.
Architectural design
2.
Database design
451 What is NOT part of the design process 3. 4.0
Component design
4.
Validation testing
S.NO. Questions Choices Answers
1.
Requirements Definition
2.
4.
System Validation
1.
2.
4.
1.
Picture quality
2.
Production
454 ___________ adds to the costs of Software Development because it usually means that work that 4.0
has been completed has to be redone 3.
Software speed
4.
Change
1.
Given the following structure template, choose the correct syntax for accessing the 5th subject marks of the 3rd student:
stud[2].marks[4]
struct stud
{
2.
int marks[6];
455 stud[4].marks[2] 3.0
char sname[20];
3.
char rno[10];
s[2].marks[4]
}s[10];
4.
s[4].marks[2]
1.
a float
2.
a double
456 By default, any real number in C is treated as ____ 1.0
3.
a long double
4.
Analyze results
2.
Plan test
457 ____________ is the 1st step in the testing process 2.0
3.
Release product
4.
Conduct tests
S.NO. Questions Choices Answers
1.
Hypermedia message
2.
A set of documents in which a given document can contain text, graphics video and Hypertext document
458 audio clips as well as embedded references to other documents world wide web
pages are called as 3. 3.0
---------------
Hypermedia Documents
4.
1.
2.
A software requirements specification (SRS) document should avoid discussing
1.0
459 which one of the following? Non-functional requirements
3.
Design specification
40
2.
Consider a B+ tree in which the search Answer is 12 bytes long, block size is 1024 50
460 bytes,record pointer is 10 bytes long and block pointer is 8 bytes long. The
3. 2.0
maximum number of keys that can be accommodated in each non-leaf node of the
tree is ____
60
4.
70
1.
analysis, design,coding,testing
2.
planning,analysis,design,coding
461 Extreme Programming process model includes framework activities such as 4.0
3.
planning,analysis,coding,testing
4.
1.
2.
are constructed
4.
are destroyed
1.
Trust
2.
Competence
463 Important capability needed for an agile software developer is 3.0
3.
Decision-making
4.
HardworkKey
S.NO. Questions Choices Answers
1.
Analysis
2.
Coding
464 In which phase is Agile Modeling(AM) carried out 3.0
3.
Planning
4.
TestingKey
1.
Machine language
2.
Assembly language
465 Mnemonic codes and variable names are used in 2.0
3.
4.
Used nowhere
1.
2.
Fountain model
466 Waterfall model of software development is also termed as 3. 1.0
Spiral model
4.
1.
2.
Nuclear Reactors
467 Which of the following is not a Life-critical System? 4.0
3.
Power Utilities
4.
Inventory Management
1.
2.
4.
1.
#include <iostream.h>
using namespace std; 20
int main()
{ 2.
int x=20;
if(!(!x)&&x) 10
469 cout< else 1.0
3.
{
x=10; 1
cout< return 0;
} 4.
} 0
S.NO. Questions Choices Answers
#include <iostream.h>
using namespace std; 1.
typedef int * IntPtr;
int main() 62010206
{
IntPtr A, B, C;
2.
int D,E;
A = new int(3); 72010107
470 B = new int(6); 2.0
C = new int(9);
D = 10; 3.
E = 20;
*A = *B; 71020106
B = &E;
D = (*B)++;
*C= (*A)++ * (*B)--; 4.
E= *C++ - *B--;
cout<<*A<<*B<<*C< return 0; 10720107
}
1.
a->next=c
2.
b->next=c
471 If a , b , c, are three nodes connected in sequence in a singly linked list, find the valid statement 4.0
that may help to change this list to a circular linked list? 3.
a->next=c
4.
c->next=b
1.
2.
when it requests IO
4.
when OS wait
1.
if there are more than two processes competing for that resource
2.
4.
1.
Distributed
2.
Network
474 ______ OS pays more attention on the meeting of the time limits. 3. 3.0
Real time
4.
Desktop
S.NO. Questions Choices Answers
1.
121
2.
Consider a software program that is artificially seeded with 100 faults. While testing this program, 175
475 159 faults are detected, out of which 75 faults are from those artificially seeded faults. Assuming 4.0
that both are and seeded faults are of same nature and have same distribution, the estimated 3.
number of undetected real fault is
432
4.
428
1.
s1 == s2
2.
Given the code
String s1 = ? VIT? ; s1 = s2
476 String s2 = ? VIT ? ; 13.0
String s3 = new String ( s1); 3.
Which of the following would equate to true?
s3 == s1
4.
s3=s1
1.
2.
3
477 Suppose T is a binary tree with 14 nodes. What is the minimum possible depth of T? 2.0
3.
4.
1.
<form>
2.
<title>
478 The following HTML ________ element contains meta data which is not displayed inside the 2.0
document 3.
<table>
4.
<frame>
1.
<STYLESHEET>
2.
<STYLE>
479 To link your Web page to a style sheet, you must use the _____ tag 3.0
3.
<link>
4.
<web>
1.
<ol>
2.
<ul>
480 Which of these will create a shuffled list? 1.0
3.
<dl>
4.
Nested list
S.NO. Questions Choices Answers
1.
2.
4.
1.
Bubble Sort
2.
Merge Sort
482 Which of the following is example of in-place algorithm? 3. 3.0
Insertion Sort
4.
1.
79n2+43n
2.
65n3+34n
483 Which of these is asymptotically bigger? 2.0
3.
6*2n
4.
5*2n
484 ___ bit in ICW1 indicates whether the 8259A is cascade mode or not 1.LTIM=0 2.LTIM=1 3.SNGL=1 4.SNGL=0 4.0
____ messages are typically used for diagnostic or control purposes or generated in response to
485 errors in IP operations. 1.ICMP 2.TCP 3.UDP 4.IP 1.0
486 _____ gives the number of bits that can be transmitted over a network in a fixed time period. 1.Latency 2.Jitter 3.Bandwidth 4.Delay 3.0
487 ______ cryptography refers to encryption methods in which both the sender and receiver share the 1.Symmetric 2.Asymmetric 3.Ceaser key 4.Asymmetric key 1.0
same key.
488 ______ is responsible for the final encapsulation of higher-level messages into frames that are sent 1.Data link layer 2.Network layer 3.Application layer 4.Session layer 1.0
over the network using the physical layer.
489 _______ appends to the address a slash character and the decimal number of leading bits of the 1.CIDR 2.TCP 3.UDP 4.IP 1.0
routing prefix.
490 _______ is assigned to an organization by a global authority. 1.Subnet ID 2.Supernet ID 3.Host ID 4.Network ID 4.0
1.
Cartesian product
2.
Difference
491 _______ produces the relation that has attributes of R1 and R2 1.0
3.
Intersection
4.
Product
492 _______ should keep track of multiple file downloads requested by a particular FTP application, or 1.Transport layer 2.Application layer 3.Presentation layer 4.Session layer
1.0 multiple telnet connections from a single terminal client, or web page retrievals from a web server.
493 ________ functions as a request-response protocol in the client-server computing model. 1.HTTP 2.IP 3.TCP 4.UDP 1.0
1.
2.
4.
Long term
2.
Short trem
495 ________ scheduler selects the jobs from the pool of jobs and loads into the ready queue. 1.0
3.
Medium term
4.
None of these
1.
2.
4.
Dispatcher
497 _________ has a dedicated communication path between stations 1.Circuit switching 2.Frame relay 3.Packet switching 4.ATM 1.0
1.
2.
4.
1.
Best Fit
2.
Worst Fit
499 1.0
3.
_________ memory management scheme will produce least fragement
First Fit
4.
None of these
1.
AR (Address Register)
2.
XR (Index Register)
500 _________ register keeps tracks of the instructions stored in program stored in memory. 3.0
3.
PC (Program Counter)
4.
AC (Accumulator)
1.
Replace the page that will not be used for a longest period of time
2.
Replace the page that will not be used for a shortest period of time
501 _________ states that it is Optimal Replacement algorithm 1.0
3.
Replace the page that will be used for a longest period of time
4.
Replace the page that will be used for a shortest period of time
502 __________ algorithm is used for the flow control of data between sender and receiver. 1.Dijkstra 2.RIP 3.Leaky bucket 4.Go Back N 4.0
S.NO. Questions Choices Answers
1.
Web Servers
2.
Stay Connected
4.
Offline Browsers
504 ___________ signal prevent the microprocessor from reading the same data more than one 1.pipelining 2.handshaking 3.controlling 4.signaling 2.0
505 ____________ function in PHP returns a list of response headers sent (or ready to send) 1.header() 2.headers_list() 3.header_sent() 4.header_send() 2.0
1.
Prototype
2.
______________ is an initial version of a software system that is used to demonstrate concepts, try Architectural Design
506 out design options, and find out more about the problem and its possible solutions. 1.0
3.
Subsystem
4.
Module
1.
Process
2.
Thread
507 ________________ is a basic unit of CPU utilization 2.0
3.
4.
Program Counter
1.Transaction
2.Optimization
508 ______________is a logical unit of access to a DBMS 1.0
3.Schema
4.Data
1.
4.
1,048,576 locations
2.
2,097,152 locations
510 A 20-bit address bus can locate ________. 1.0
3.
4,194,304 locations
4.
8,388,608 locations
511 A 32-bit address bus allows access to a memory of capacity 1.1 GB 2.16 MB 3.64 MB 4.4 GB 4.0
S.NO. Questions Choices Answers
1.
2.
m+1
512 A B-tree of order m has maximum of _____________ children 1.0
3.
m-1
4.
m/2
513 A binary code that progresses such that only one bit changes between two successive codes is: 1.Gray code 2.excess-3 code 3.8421 code 4.nine's-complement code 1.0
A certain 5-bit self-complementary code is used to represent the 10 decimal digits 0 through 9.
1.00110 00100 00010 2.00011 00111 00101 3.11001 11101 11011
514 Given that (246) in decimal is represented as 00010 00100 00110 in this code, what is the 4.0
4.11101 11011 11001
representation for (375)?
1.
2.
A client process P needs to make a TCP connection to a server process S. Consider the following
situation: the server process S executes a socket(), a bind() and a listen() system call in that order, connect () system call blocks
515 following which it is preempted. Subsequently, the client process P executes a socket() system call 3. 3.0
followed by connect() system call to connect to the server process S. The server process has not
executed any accept() system call. Which one of the following events could take place? connect () system call returns an error
4.
1.
2.
4.
517 A collection of unused memory reserved for dynamic allocation is called 1.Heap 2.Static 3.array 4.stack dynamic 1.0
1.A ring counter has fewer flip-flops but requires more decoding
circuitry 2.A ring counter has an inverted feedback path 3.A Johnson
518 A comparison between ring and Johnson counters indicates that: counter has more flip-flops but less decoding circuitry 4.A Johnson 4.0
counter has an inverted feedback path
1.
1.6 seconds
2.
A computer on a 10Mbps network is regulated by a token bucket. The token bucket is filled at a 2 seconds
519 rate of 2Mbps. It is initially filled to capacity with 16Megabits. What is the maximum duration for 3. 2.0
which the computer can transmit at the full 10Mbps?
5 seconds
4.
8 seconds
520 A data structure where elements can be added or removed at either end but not in the middle 1.linked lists 2.Stacks 3.Queues 4.Deque 4.0
1.
Mutation testing
2.
Stress testing
521 A fault simulation testing technique is 1.0
3.
4.
522 A grammar that produces more than one parse tree for some sentence is called 1.Ambiguous 2.Irregular 3.Regular 4.Unambiguous 1.0
S.NO. Questions Choices Answers
1.
Instruction code
2.
Micro-operation
523 A group of bits that tell the computer to perform a specific operation is known as____. 1.0
3.
Accumulator
4.
Register
524 A J-K flip-flop is in a "no change" condition when ________. 1.J = 1, K = 1 2.J = 1, K = 0 3.J = 0, K = 1 4.J = 0, K = 0 4.0
1.
aaa
2.
aba
525 A language is represented by a regular expression (a)*(a+ba). Which of the following string does 3.0
not belong to the regular set represented by the above expression. 3.
ababa
4.
aa
1.
2.
3.
526 A layer-4 firewall cannot 1.0
stop incoming traffic from a specific IP address but allow outgoing
traffic to same IP
4.
527 A linear collection of data elements where the linear node is given by means of pointer is called 1.primitive list 2.node list 3.linked list 4.array 3.0
1.
Definite blocking
2.
Starvation
528 A major problem with priority scheduling is _________. 2.0
3.
Low priority
4.
None of these
1.
15 states
2.
7 states
529 A minimum state DFA accepting the language L={w/w belongs {0,1}*} number of 0s and 1s in w 1.0
are divisible by 3 and 5, respectively} has 3.
9 states
4.
8 states
530 A network that contains multiple hubs is most likely configured in which topology? 1.Mesh 2.Tree 3.Bus 4.Star 2.0
S.NO. Questions Choices Answers
1.
True
2.
False
531 A NFA converted to DFA has more than one final state. 1.0
3.
may be true
4.
always true
1.Where each record in table A can have one or more matching records
in table B
2.Where each record in table B can have one or more matching records
532 A one to many relationship (of table A to Table B) is in table A 1.0
3.Where each record in Table B is required to have a match in table A
2.
4.
2.
4.
2.
4.
Partial Dependencies
2.
Transitive Dependencies
539 A relation R is said to be in 2NF when it does not have 1.0
3.
Multivalued Attributes
4.
2.one that consists of two or more tables that are joined in some way
540 A relational database is 3.one that consists of two or more tables 4.0
4.a database that is able to process tables, queries, forms, reports and
macros
541 A ring counter is same as. 1.up-down counter 2.parallel adder 3.shift register 4.ALU 3.0
1.
attribute
2.
degree
542 A set of possible data values is called 4.0
3.
domain
4.
tuple
analog modulation
2.
digital modulation
544 A single channel is shared by multiple signals by 3.0
3.
multiplexing
4.
1.Database
2.DBMS
545 A software package designed to store and manage databases 2.0
3.Data Model
4.Data
1.Three-address Instruction
2. Two-address Instruction
4. Zero-address Instruction
1.
TRUE
False
3. 4.
1.Within the class definition 2.Outside the class definition 3.When the
548 A static data member is given a value 2.0
program is exeuted 4.Never
1.combinational gates 2.flip-flops 3.both flip-flops and latches 4.both
549 A synchronous sequential circuit is made up of. 4.0
combinational gates and flip-flops
S.NO. Questions Choices Answers
1.
196
2.
A system uses FIFO policy for page replacement. It has 4 page frames with no pages loaded to 192
550 begin with. The system first accesses 100 distinct pages in some order and accesses the same 100 1.0
3.
pages but now in the reverse order how many page faults will occur?
197
4.
195
1.
Secondary key
2.
Alternate key
551 A table can have only one 4.0
3.
Unique key
4.
Primary key
1.
2.
4.
none of these
553 A value that has no defined value is expressed in PHP with the following keyword: 1.undef 2.null 3.Cant Define 4.There is no such concept in PHP 2.0
1.P contains the address of an element in DATA 2.P contain the DATA
554 A variable P is called pointer if and the address of DATA 3.P can store only memory addresses 4.P 1.0
points to the address of first element in DATA
1.P contains the address of an element in DATA 2.P contain the DATA
555 A variable P is called pointer if and the address of DATA 3.P can store only memory addresses 4.P 1.0
points to the address of first element in DATA
1.
virtual table
2.
base table
4.
super table
1.
Disk stack
2.
Removable disk
557 A Winchester disk is a 1.0
3.
Flexible disk
4.
None of these
S.NO. Questions Choices Answers
1.
2.
A complete binary min-heap is made by including each integer in [1;1023] exactly once. The 8
558 depth of a node in the heap is the length of the path from the root of the heap to that node. Thus, 2.0
3.
the root is at depth 0. The maximum depth at which integer 9 can appear is
9
4.
10
559 Abstraction is 1.Having public members 2.having private member and public function 2.0
3.friend function 4.friend classes
1.
developer
2.
end users
560 2.0 3. 2.0
test team
4.
systems engineers
1.
ROM
2.
SRAM
561 Access time is faster for _________. 2.0
3.
DRAM
4.
ERAM
0023H
2.
0024H
563 Address line for TRAP is? 2.0
3.
0033H
4.
0099H
1.
2.
4.
565 ALGORITHM HAS THE ________________ TO THE PROBLEM IN _______________ 1.SOLUTION & FINITE 2.PROBLEM & INFINITE 3.SOLUTION & 1.0
NUMBER OF STEPS INFINITE 4.PROBLEM & FINITE
566 All devices/host connect to a central switch in _____ topology. 1.Star 2.Ring 3.Bus 4.Tree 1.0
1.
Bottom up testing
2.
Top-down testing
567 All the modules of the system are integrated and tested as complete system in the case of 4.0
3.
Sandwich testing
4.
Big-Bang testing
S.NO. Questions Choices Answers
1.
SLR , LALR
2.
CLR , LALR
568 Among simple LR (SLR), canonical LR, and look-ahead LR (LALR), which of the following pairs identify the 3.0
method that is very easy to implement and the method that is the most powerful, in that order? 3.
SLR , CLR
4.
SLR
1.
2.
1
569 An activity is said to be critical if slack time is equal to 1.0
3.
4.
2.domain
571 An Entity from an ER diagram can be represented in the relational model by a 1.0
3.functional dependency
4.single attribute
1.short frame
2.runt frame
572 An ethernet frame that is less than the IEEE 802.3 minimum length of 64 octets is called 2.0
3.mini frame
4.man frame
573 An intermediate code form is 1.Postfix notation 2.Syntax trees 3.Three address code 4.Postfix notation, 4.0
Syntax trees and Three address code
1.
255.255.0.0
2.
255.255.64.0
574 An organization has a class B network and wishes to form subnets for 64 departments. The subnet 4.0
mask would be: 3.
255.255.128.0
4.
255.255.252.0
575 Any code inside a loop that always computes the same value can be moved before the loop. This is 1.Loop invariant computation 2.Interchange of statements 3.inducation 1.0
called variable 4.Algebraic Transformation
1.
2.
rules for when and how processes send and respond to messages
4.
two levels
2.
four levels
577 Architecture of the database can be viewed as 3.0
3.
three levels
4.
one level
1.
->, %, +, =
2.
=, +, %, ->
578 Arrange the operators according to their precedence: +, %, ->, = 1.0
3.
%, +, =, ->
4.
%, ->, =, +
1.
1000
2.
Assume that a table R with 1000 records is to be joined with another table S with 10000 records. 10000
579 What is the maximum number of records that would result in if we join R with S and the equi-join 3. 1.0
attribute of S is the primary key?
1,00,00,000
4.
11000
ksort( )
2.
asort( )
582 Assume you would like to sort an array in ascending order by value while preserving key 2.0
associations. Which of the following PHP sorting functions would you use? 3.
krsort( )
4.
sort( )
1.
17-JUL-00
2.
10-JUL-00
583 Assuming today is , 10 July 2000, what is returned by this statement: SELECT 4.0
to_char(Last_DAY(sysdate), 'DD-MON-RR') FROM dual; 3.
31-DEC-00
4.
31-JUL-00
1.sorted linked list 2.sorted binary trees 3.sorted linear array 4.pointer
584 Binary search algorithm can not be applied to 4.0
array
1.inserting a '0' in user data stream to differentiate it with a flag
585 Bit stuffing refers to 2.inserting a '0' in flag data stream to avoid ambiguity 3.appending a 1.0
nibble to the flag sequence 4.appending a nibble to the user data stream
S.NO. Questions Choices Answers
1.
digital modulation
2.
amplitude modulation
586 Bits can be send over guided and unguided media as analog signal using ......................... 1.0
3.
frequency modulation
4.
phase modulation
1.
true
false
3. 4.
1.
2.0
True
By following modern system engineering practices simulation of reactive systems is no longer 2.
588 necessary. 2.0
FALSE
3. 4.
1.
2.
4.
None of these
1.
59
2.
Calculate the block number in free storage management of files system with number of bits per 51
590 word is 8, the bit vector is 1.0
3.
0001101010101, offset of first 1 bit is 3
45
4.
53
1.
2.
4.
1.
a Unary operator
2.
a Binary operator
592 Cartesian product in relational algebra is 2.0
3.
a Ternary operator
4.
not defined
S.NO. Questions Choices Answers
1.
True
Change cannot be easily accommodated in most software systems, unless the system was designed
593 with change in mind. 2. 1.0
False
3. 4.
1.
Preventative maintenance.
2.
Changes made to an information system to add the desired but not necessarily the Adaptive maintenance.
Corrective maintenance.
4.
Perfective maintenance.
595 Class ____ IP addresses are used for large organizations 1.A 2.B 3.D 4.C 1.0
596 class n{ int a;}; how much memory the compiler allocates for this class 1.0 2.2 3.depends on compiler 4.4 4.0
1.
true
false
3. 4.
1.
true
Classes and components that exhibit functional, layer, or communicational cohesion are relatively
598 easy to implement, test, and maintain. 2. 1.0
false
3. 4.
599 Compile time polymorphism is 1.function overloading 2.template 3.function overriding 4.abstraction 1.0
1.
2.
4.
All of these
1.
1.0
rely on basis path testing
2.
exercise the logical conditions in a program module
Condition testing is a control structure testing technique where the criteria used to design test cases 3.
601 1.0
is that they
select test paths based on the locations and uses of variables
4.
1.
Consider 2 scenarios:
Both are true
4.
Choose the correct option ?
C1 is false, C2 is true
603 Consider a binary tree T that has 200 leaf nodes. Then, the number of nodes in T that have exactly 1.199 2.200 3.Any number between 0 and 199 4.Any number between 1.0
two children are _________. 100 and 200
S.NO. Questions Choices Answers
1.
2.
14
604 Consider a DFA over ∑ = {a, b} accepting all strings which have number of a’s divisible by 6 and number of b’s
4.0
divisible by 8. What is the minimum number of states that the DFA will have? 3.
15
4.
48
Consider a hash table with 9 slots. The hash function is h(k) = k mod 9. The collisions are resolved
605 by chaining. The following 9 keys are inserted in the order: 5, 28, 19, 15, 20, 33, 12, 17, 10. The 1.3, 3, and 3 2.3, 0, and 1 3.4, 0, and 1 4.3, 0, and 2 2.0
maximum, minimum, and average chain lengths in the hash table, respectively, are
1.
8 MSS
2.
Consider an instance of TCP’s Additive Increase Multiplicative Decrease(AIMD) algorithm where 14 MSS
606 the window size at the start of the slow start phase is 2 MSS and the threshold at the start of the
3.0
first transmission is 8 MSS. Assume that a time out occurs during the fifth transmission. Find the 3.
congestion window size at the end of the tenth transmission.
7 MSS
4.
12 MSS
607 Consider an undirected graph G with 100 nodes. The maximum number of edges to be included is 1.2451 2.4950 3.9900 4.4851 4.0
1.
2.
3
608 Consider S->SS|a what is the number of different derivation trees for aaaaa 3.0
3.
14
4.
1.
aaaabb
Consider the CFG with {S,A,B) as the non-terminal alphabet, {a,b) as the terminal alphabet, S as the start
2.
symbol and the following set of production rules
S --> aB S --> bA
aabbbb
609 B --> b A --> a 3.0
B --> bS A --> aS
3.
B --> aBB A --> bAA
aabbab
Which of the following strings is generated by the grammar?
4.
abbbba
1.
16ms
2.
Consider the data of previous question. Suppose that the sliding window protocol is used with the 18ms
sender window size of 2^i where is the number of bits identified in the previous question and
610 acknowledgments are always piggybacked. After sending 2^i frames, what is the minimum time 3.0
the sender will have to wait before starting transmission of the next frame? (Identify the closest 3.
choice ignoring the frame processing time). 20ms
4.
22ms
S.NO. Questions Choices Answers
1.
2.
1
Consider the DFAs M and N given above. The number of states in a minimal DFA that accepts the
611 language L(M) ∩ L(N) is __________. 3. 1.0
2
4.
612 Consider the following array of elements. {89,19,50,17,12,15,2,5,7,11,6,9,100}.The minimum 1.4 2.2 3.5 4.3 4.0
number of interchanges needed to convert it into a max-heap is
6
Consider the following code segment.
2.
x = u - t;
y = x * v; 8
x = y + w;
615 y = t - z; 3. 4.0
y = x * y;
9
The minimum number of total variables required to convert the above code segment to static single
assignment form is 4.
10
1.
true false
false true
617 Consider the following code snippet: var a = [1,2,3,4,5]; a.slice(0,3); What is the possible output 1.Returns [1,2,3] 2.Returns [4,5] 3.Returns [1,2,3,4] 4.Returns 1.0
for the above code snippet? [1,2,3,4,5]
Returns [1,3,5,7,9]
oddsums(5);
619 Consider the following code: var a = []; a.unshift(1); a.unshift(22); a.shift(); a.unshift(3,[4,5]); 1.1 2.[4,5] 3.[3,4,5] 4.Exception 1.0
a.shift(); a.shift(); a.shift(); The final output for the shift() is
S.NO. Questions Choices Answers
Consider the following function
double f(double x)
{
620 if (abs(x*x - 3) < 0.01) return x; 1.1.723 2.1.732 3.0.732 4.1.733 2.0
else return f(x/2 + 1.5/x);
}
Give a value q (to 2 decimals) such that f(q) will return q:_____.
1.
1
Consider the following javascript code snippet :
2.
var a = [];
a.unshift(1); [4,5]
a.unshift(22);
621 a.shift(); 1.0
a.unshift(3,[4,5]); 3.
a.shift();
a.shift(); [3,4,5]
a.shift();
4.
The final output for the shift() is
Exception
1.
LL(1)
2.
Consider the grammar shown below.
SLR(1) but not LL(1)
S → C C
626 1.0
C → c C | d 3.
4.
200
Consider the grammar with the following translation rules and E as the start symbol.
2.
E → E1 # T { E.value = E1.value * T.value }
| T{ E.value = T.value }
180
627 T → T1 & F { T.value = T1.value + F.value } 3.0
| F{ T.value = F.value }
3.
F → num { F.value = num.value }
160
Compute E.value for the root of the parse tree for the expression: 2 # 3 & 5 # 6 & 4.
4.
40
1.
n1<n2<n3
2.
Consider the grammar
n1=n3<n2
S → (S) | a
628 2.0
Let the number of states in SLR(1), LR(1) and LALR(1) parsers for the grammar be n1, n2 and n3 3.
respectively. The following relationship holds good
n1=n2=n3
4.
n1>n2>n3
1. i = 1 5 and 7
2. j = 1
3. t1 = 5 * i 2.
4. t2 = t1 + j
5. t3 = 4 * t2 6 and 7
629 6. t4 = t3 2.0
7. a[t4] = –1
3.
8. j = j + 1
9. if j <= 5 goto(3)
5 and 2
10. i = i + 1
11. if i < 5 goto(2)
4.
The number of nodes and edges in the control-flow-graph constructed for the above code, respectively, are
7 and 8
1.
mn
2.
m+n
630 Consider the join of a relation R with relation S. If R has m tuples and S has n tuples, then the 1.0
maximum size of join is: 3.
(m+n)/2
4.
2(m+n)
1.
mn
2.
m+n
631 Consider the join of a relation R with relation S. If R has m tuples and S has n tuples, then the 1.0
maximum size of join is: 3.
(m + n) / 2
4.
2(m + n)
1.
2.
5
632 Consider the regular language L = (111 + 11111)*. The minimum number of states in any DFA accepting this 4.0
languages is: 3.
4.
9
S.NO. Questions Choices Answers
1.
2NF
2.
4.
4NF
1.
9+5+2
Here num is a token that represents an integer and num.val represents the corresponding integer value. For an 952++
input string '9 + 5 + 2', this translation scheme will print
4.
++952
635 Consider two strings A ='qpqrr' and B = 'pqprqrp'. Let x be the length of the LCS between A and B 1.42 2.34 3.32 4.30 2.0
and let y be the number of such longest common subsequences between A and B. Then x + 10y =
1.
values
2.
distinct values
636 Count function in SQL returns the number of 1.0
3.
groups
4.
columns
1.
Batch
2.
Real Time
637 CPU Scheduling is the basis of _________ operating system 2.0
3.
Multi-programming
4.
network
1.
Error
2.
Table created
638 create table student_$( id number(4), namee varchar2(10)); reponse would be 2.0
3.
4.
639 Creating additional function similar to template function is called 1.implicit specialization 2.explicit specialization 3.abstraction 4.template 4.0
overriding
1.which is written in a language that is same as the source language.
2.that runs on one computer but produces object code for different type
640 Cross-compiler is a compiler of computer. 3.that generates object code for its host machine. 4.which is 2.0
written in a language that is different from the source language.
S.NO. Questions Choices Answers
1.
2.
4.
1.
2.
4.
None
Currently there is no single standard file type that can be used to play audio using the audio 1.Use JavaScript to determine the web browser in use 2.Use Adobe
643 element consistently on all browsers. Which is the solution that the audio element provides to Flash to play the audio 3.Include multiple audio file formats in the src
resolve this conflict? attribute 4.No Solution
1.
rely on basis path testing
2.
exercise the logical conditions in a program module
644 1.0 3. 1.0
4.
focus on testing the validity of loop constructs
1.
2.
4.
1.does exist in memory when the object of the derived class is created
2.exist in memory when the object of the derived class is created
646 Data Members of the base class that are marked private: 2.0
the derived class 3.are visible in the derived class 4.are directly
accessible in the derived class
1.does exist in memory when the object of the derived class is created
2.exist in memory when the object of the derived class is created
647 Data Members of the base class that are marked private: the derived class 3.are visible in the derived class 4.are directly 2.0
accessible in the derived class
1.
Physical file
2.
Data Structure
648 Data Store Symbol in DFD represents a 2.0
3.
Logical file
4.
ALL
649 DB, DW and DD directives are used to place data in particular location or to simplyallocate space 1.f ull address of labels 2.offsets of full address of labels and variables 2.0
without preassigning anything to space. The DW and DD directories areused to generate 3.full address of variables 4.offsets
S.NO. Questions Choices Answers
1.
2.
4.
1.
2.
4.
1.
String instructions
2.
Stack instructions.
Arithmetic instructions
4.
Branch instructions
2.
4.
1.
2.
4.
657 Duality principle is used when SE is 1.square 2.symmetric 3.asymmetricd 4.translated 2.0
S.NO. Questions Choices Answers
1.
2.
communications, organization, financial infrastructure
658 1.0 1.0
3.
4.
systems, requirements, data structure
1.6
2.5
659 Each counter of IC 8254 can work in --------------differnt modes of operation 1.0
3.4
4.3
1.
2.
4.
1.
Ultraviolet rays
2.
infrared rays
661 EPROM is generally erased by using 1.0
3.
12 V electrical pulse
4.
24 V electrical pulse
1.
pure ethernet
2.
4.
1.
reduce the granularity of the plan
2.
4.
begin design
1.
2.
4.
0 1 2 3 4 5 6 7 8 9 10
#include < stdio.h > 2.
int main()
{ 0 1 2 3 ... infinte times
int tally=0;
666 for(;;) 3. 3.0
{
if(tally==10) 1 2 3 4 5 6 7 8 9 10
break;
4.
printf("%d ",++tally);
} 123456789
return 0;
}
1.
Find the output
Error
#include <stdio.h>
2.
int main() 65
667 { 3.0
int x=65; 3.
const unsigned char c=(int)x;
A
printf("%c\n",c);
4.
return 0;
} NULL
1.
#include <stdio.h>
struct sample Error
{
2.0,A,10.5 3.
int a=0;
668 char b='A'; 0,A,10.500000 1.0
float c=10.5;
}; 4.
int main()
{ No Error, No Output
struct sample s;
printf("%d,%c,%f",s.a,s.b,s.c);
return 0;
}
1.
Error
2.
100
100
S.NO. Questions Choices Answers
1.
23
Find the output:
2.
#include <stdio.h>
int main() Error
1.
B
Find the output: 2.
#include <stdio.h>
A
void main()
671 { 3. 3.0
const char var='A';
++var; ERROR
printf("%c",var);
} 4.
66
1.
44
FIND THE OUTPUT: 2.
#include <stdio.h>
45
void main()
672 { 3. 2.0
int x=10;
x+=(x++)+(++x)+x; 46
printf("%d",x);
} 4.
47
1.
x= 60
#include <stdio.h> x= 70
673 void main() 4.0
{ 3.
int x=(20 || 40 ) && (10);
x= 0
printf("x= %d",x);
} 4.
x= 1
1.
675 First derivative approximation says that values of constant intensities must be 1.1 2.0 3.positive 4.negative 2.0
1.For the given PS and NS what will be the inputs 2.For the given PS
676 Flip-flop excitation tables shows that and NS what will be the outputs 3.For the given PS and NS what will be 4.0
the type of flip-flops 4.For the given PS and NS what will be the values
of NS and PS respectively
677 Following can be used to implement a SOP function without changing it into minterms 1.MUX 2.PLA 3.ROM 4.DeMUX 4.0
S.NO. Questions Choices Answers
1.
2.
prototyping model
678 For a well understood data processing application it is best to use 1.0
3.
4.
1.
3.0
2.
2.
4.
A field in a table that has the same name as a key field in another table
1.
i=2
2.
Frames of 1000 bits are sent over a 10^6 bps duplex link between two hosts. The propagation time i=3
681 is 25ms. Frames are to be transmitted into this link to maximally pack them in transit (within the 4.0
link). What is the minimum number of bits, i will be required to represent the sequence numbers 3.
distinctly? Assume that no time gap needs to be given between transmission of two frames.
i=4
4.
i=5
1.
20
2.
21
682 FTP server listens for connection on port number 3. 2.0
22
4.
23
2.
4.
2.
4.
1.
strstr( )
2.
extract
686 Given a comma-separated list of values in a string, which function from the given list can create an 3.0
array of each individual value with a single call in PHP? 3.
explode( )
4.
strtok( )
687 Given a hash table T with 25 slots that stores 2000 elements, the load factor a for T is_____ 1.80 2.0.0125 3.8000 4.1.25 2.0
1.
2.
strstr($email, "@");
688 Given a variable $email containing the string [email protected], which of the following PHP 4.0
statements would extract the string example.com? 3.
strchr($email, "@");
4.
2.
691 Given the basic ER and relational models, which of the following is INCORRECT? 3. 3.0
In a row of a relational table, an attribute can have more than one value
4.
692 Given the Code segment CS = 1000H and the offset BX=0050H. Calculated physical address is --- 1.10000H 2.10050H 3.11050H 4.11000H 2.0
-------
693 Given the Extra segment ES = 52B9H and the offset BX=D470H. Calculated physical address is -- 1.60000H 2.70000H 3.11000H 4.11050H 4.0
--------
694 Given the frequency f=1.5MHZ for 8253 timer the value of time period T is 1.10ms 2.0.66us 3.1ms 4.100ms 2.0
1.
A is a key for R
2.
BE is a key for R
695 Given the functional dependencies, {AB -> CDE and A -> E}, for relation schema R = 3.0
(A,B,C,D,E) we can infer the following: 3.
AB is a key for R
4.
B is a key for R
S.NO. Questions Choices Answers
1.
1, 2 and 3
2.
Given the language L = {ab, aa, baa}, which of the following strings are in L*?
1, 2 and 4
1) abaabaaabaa
696 2.0
2) aaaabaaaa 3.
3) baaaaabaaaab
4) baaaaabaa 1, 3 and 4
4.
2, 3 and 4
1.
DDL
2.
TCL
DCL
4.
DML
1.
coaxial cable
2.
optical fiber
4.
six
2.
seven
710 How many diagrams are here in Unified Modelling Language? 4.0
3.
eight
4.
nine
711 How many different states does a 3-bit asynchronous counter have? 1.2 2.4 3.8 4.16 3.0
712 How many flip-flops are required to construct a mod10 counter? 1.10 2.8 3.5 4.4 4.0
713 How many flip-flops are required to make a MOD-32 binary counter? 1.3 2.4 3.5 4.6 3.0
714 How many instances of an abstract class can be created? 1.13 2.5 3.1 4.0 4.0
S.NO. Questions Choices Answers
1.
2.
2
715 How many minimum states are required in a DFA to find whether a given binary string has odd number of 0's 2.0
or not, there can be any number of 1's. 3.
4.
716 How many nodes in a tree have no ancestors. 1.2 2.n 3.1 4.0 3.0
717 How many operating modes are available in 8253A. 1.1 2.2 3.6 4.3 3.0
718 How many transistors does the 8086 have 1.29,000 2.10,000 3.129,000 4.110,000 1.0
1.dateObjectName = new Date([parameters]) 2.dateObjectName.new
719 How to create a Date object in JavaScript? Date([parameters]) 3.dateObjectName := new Date([parameters]) 1.0
4.dateObjectName Date([parameters])
720 How to create a memory without a name during the execution of the program? 1.malloc() 2.Queue 3.stack 4.list 1.0
721 How will you free the allocated memory ? 1.remove(var-name); 2.free(var-name); 3.delete(var-name); 4.dalloc(var- 2.0
name);
722 How will you handle the overflow condition of a linked queue through code(note: new_node is a 1.if(rear==size) 2.if(new_node==0) 3.if(front==size) 1.0
newly created node in a memory) 4.if(new_node==null)
1.
2.
4.
RIP
1.
40
2.
28
724 IC 8237 has ------------------many pins 1.0
3.
24
4.
20
1.
2.
2
725 IC 8257 has --------------------many channels for data transfer 3. 4.0
4.
1.only code segment 2.data and code segment 3.only data segment
726 Identify different segments in a program 4.0
4.data, code, stack and extra segments
727 Identify the accurate control word for operate counter 0, Read/Write LSB only, Mode 2, BCD 1.00010111B 2.0001X111B 3.00010101B 4.00110111B 2.0
countdown.
1.Immediate addressing mode 2.Direct addressing mode 3.Based
728 Identify the addressing mode for the instruction MOV AH,47H 2.0
addressing mode 4.Indirect addressing mode
729 Identify the proper data direction and modes of operation of the 8255 ports if the control word 1.Port A as output 2.Port C lower as output 3.Port C upper as input 3.0
written into it is 9BH. 4.Port B as output
S.NO. Questions Choices Answers
1.
1024
2.
1023
730 If a class B network on the Internet has a subnet mask of 255.255.248.0, what is the maximum 3.0
number of hosts per subnet? 3.
2046
4.
2047
731 If a class C is derived from class B, which is derived from class A, all through public inheritance, 1.protected and public data only in C and B 2.protected and public data 4.0
then a class C member function can access only in C. 3.private data in A and B. 4.protected data in A and B.
1.The object cannot be created 2.Only its member functions and friends
732 If a constructor function is defined in private section of a class, then may declare objects of the class 3.Only its friends may declare objects of 2.0
the class 4.Only its member functions may declare objects of the class
1.CF=0,PF=0,AF=1,ZF=0,SF=1,OF=1
. 2.CF=0,PF=1,AF=0,ZF=0,SF=1,OF=1
733 If AL= 7FH and instruction ADD AL,1 is given, specify the contents of the six status flag 4.0
3.CF=0,PF=1,AF=1,ZF=O,SF=1,OF=1
4.CF=0,PF=0,AF=1,ZF=O,SF=1,OF=0
734 If AL=C0H, Determine the content of the register AL after SAL AL,1 instruction is executed. 1.E0H 2.80H 3.0CH 4.0EH 2.0
1.
10
2.
If all page frames are initially empty, and a process is allocated 3 page frames in real memory and 7
735 references its pages in the order 1 2 3 2 4 5 2 3 2 4 1 and the page replacement is FIFO, the total 4.0
3.
number of page faults caused by the process will be __________
8
4.
1.
Functional Cohesion
2.
Temporal Cohesion
736 If all tasks must be executed in the same time-span, what type of cohesion is being exhibited? 2.0
3.
Functional Cohesion
4.
Sequential Cohesion
1.
correct.
2.
If every requirement stated in the Software Requirement Specification (SRS) has only one unambiguous.
738 interpretation, SRS is said to be 2.0
3.
consistent.
4.
verifiable.
If inspected in a browser, what will be the total width of the div in the following code snippet?
739 #container { width: 600px; border: 2px solid #CCCCCC; padding: 30px 20px; margin: 20px 10px 1.664px 2.660px 3.644px 4.600px 1.0
40px 10px;}
1.
regular
2.
context-free
740 If L and L' are recursively enumerable, then L is 4.0
3.
context-sensitive
4.
recursive
S.NO. Questions Choices Answers
1.
2.
n+1
741 If M1 machine recognizing L with n states, then M2 recognizing L* constructed Using Thompson 3. 2.0
construction will have ------------- states.
n+2
4.
n-1
742 If p and q are assigned the values 2 and 3 respectively then the statement P = q++ 1.assigns a value 5 to p 2.assigns a value 3 to p 3.gives an error message 2.0
4.assigns a value 4 to p
If para1 is the DOM object for a paragraph, what is the correct syntax to change the text within the 1."New Text"? 2.para1.value="New Text";
743 paragraph? 3.para1.firstChild.nodeValue= "New Text"; 4.para1.nodeValue="New 2.0
Text";
744 If the class name is X, what is the type of its "this" pointer? 1.X* 2.const X* const 3.X& 4.X* const 3.0
1.
2^42
2.
2^18
If the disk size is 2^30 bytes and block size is 2^12 bytes then find how many such blocks are
745 there? 3. 2.0
2^360
4.
2^30
746 If the PIC outputs the type number of C8H, the CPU will retrive the vector stored in the address --- 1.00320H - 00323H 2.00324H - 00327H 3.00223H - 00226H 4.00140H
----------- - 00143H
1.
m,n
2.
If the size of logical address space is 2 to the power of m, and a page size is 2 to the n,m
power of n addressing units, then the high order _____ bits of a logical address designate
747 3. 4.0
the page number, and the ____ low order bits designate the page offset.
m-n,m
4.
m-n,n
1.
N+1
2.
N
748 If there are n relations how many number of join conditions has to be applied to retrieve the data 3.0
from all the n relations? 3.
N-1
4.
749 If we create a file by ‘ifstream’, then the default mode of the file is _________ 1.ios :: out 2.ios :: in 3.ios :: app 4.ios :: binary 1.0
1.
Y->Z
2.
Z->Y
750 If X->Y and X->Z then 3.0
3.
X->YZ
4.
Doesn't hold
S.NO. Questions Choices Answers
1.
True
2.
False
751 If x--> y then y --> x. This statement is 3.0
3.
Can't Say
4.
Doesn't hold
1.
X --> Y
2.
Y -->X
752 IF Y is a subset of X then 2.0
3.
Y -->--> X
4.
X is a sub set of Y
753 If you have an empty queue and you insert characters ‘r’, ‘a’, ‘t’ (in this order only), what is the 1.‘r’, ‘a’, ‘t’ 2.‘t’, ‘a’, ‘r’ 3.‘r’, ‘t’, ‘a’ 4.‘t’, ‘r’, ‘a’ 1.0
order of the characters when you dequeue all the elements?
1.
multiplication
2.
addition
754 IMUL source is a signed _________ 1.0
3.
subtraction
4.
division
TRAP
2.
RST6.5
757 In 8086, Example for Non maskable interrupts are ________. 1.0
3.
INTR
4.
RST6.6
1.
always be evaluated
2.
4.
never be evaluated
2.
4.
dataflow analysis
1.
2.
Course prerequisites
761 In a conceptual model for a university, which of the following could most appropriately be 2.0
represented via a recursive relationship? 3.
4.
1.A tree has no bridge 2.A bridge cannot be part of a simple cycle
762 In a connected graph, a bridge is an edge whose removal disconnects a graph. Which one of the 3.Every edge of a clique with size>=3 is a bridge (A clique is any 4.0
following statements is True? complete subgraph of a graph) 4.A graph with bridges cannot have a
cycle
1.
2.
4.
In a microprocessor, the service routine for a certain interrupt starts from a fixed location
1.maskable and non-vectored 2.non-maskable and vectored 3.maskable
764 of memory which cannot be externally set, but the interrupt can be delayed or rejected. Such 3.0
and vectored 4.non-maskable and non-vectored
aninterrupt is
1.
2.
In a network of LANs connected by bridges, packets are sent from one LAN to another through For avoiding loops in the routing paths
765 intermediate bridges. Since more than one path may exist between two LANs, packets may have to 3. 2.0
be routed through multiple bridges. Why is the spanning tree algorithm used for bridge-routing?
For fault tolerance
4.
766 In a syntax directed translation schema ,if value of an attribute of a node is function of the values of 1.Inherited attributes 2.Synthesized attributes 3.Canonical atrributes 2.0
the attributes of its children , then it is called 4.Derived atrributes
1.
2.
4.
50 metres of cable.
S.NO. Questions Choices Answers
1.
segmentation and page tables are stored in the cache and do not add any
substantial overhead
2.
4.
1.
111110001
2.
110111001
769 In access lists and groups which one of the following is correct for the 'RWX' notation of the order 2.0
'group, owner, public' 3.
001111110
4.
001110111
770 In an array representation of binary tree, the left child of i th node is located at 1.2i+2 2.(i-1)/2 3.(i-2)/2 4.2i+1 4.0
771 In an array representation of binary tree, the right child of i th node is located at 1.(i-2)/2 2.(i-1)/2 3.2i+2 4.2i+1 3.0
1.
rectangle
2.
ellipse
772 In an E-R diagram an entity set is represent by a 1.0
3.
diamond box
4.
circle
1.
rectangle
2.
square
773 In an E-R diagram attributes are represented by 3.0
3.
ellipse
4.
triangle
1.is twice number of edges 2.is always ODD 3.need not be even 4.must
774 In any undirected graph, the sum of the degrees of all nodes is: 1.0
be even
1.
Zero
2.
One
775 In Assembly language programming, minimum number of operands required for an instruction 1.0
is/are 3.
Two
4.
Three
2.flow control
776 In asynchronous serial communication the physical layer provides 3.0
3.both (a) and (b)
1.To make sure that it is still complete binary tree 2.It is the easiest
In binary heap, whenever the root is removed then the
777 rightmost element of last level is replaced by the root. Why? possible way 3.Because left and right subtree might be missing 1.0
4.maximum value is contained by the root node
S.NO. Questions Choices Answers
1.not Null
2.Null
778 In case of entity integrity, the primary key may be 1.0
3.a foreign key
4.any value
1.
2.
3.
controls and facilitates the process
4.
must be an outsider
1.Major difference between LAN and WAN is that the later uses
780 In context of OSI or TCP/IP computer network models, which of the following is false? switching element 2.Network layer is connection oriented 3.A repeater is 2.0
used just to forward bits from one network to another one 4.A gateway is
used to connect incompatible networks
1.
transpositional ciphers
2.
substitution ciphers
781 In cryptography, the order of the letters in a message is rearranged by 1.0
3.
4.
2.
4.
Grows exponentially
1.
2.
4.
1.two leaf nodes in the general tree 2.its right child and sibling in the
784 In general tree to binary tree conversion, the two links of the binary tree node points to genral tree 3.its left child and sibling in the general tree 4.its left and 4.0
right child in the general tree
1.
2.
4.
2.
In interactive environments such as time-sharing systems, the primary requirement is to provide Priorities Based Preemptive Scheduling
786 reasonably good response time and in general, to share system resources equitably. In such 3.0
3.
situations, the scheduling algorithm that is most popularly applied is ________.
Round Robin Scheduling
4.
787 In javascript, RegExp Object Method test() is used to search a string and returns _________ 1.true or false 2.found value 3.index 4.Matched or not matched 1.0
1.The item is somewhere in the middle of the array 2.The item is not in
788 In linear search algorithm the Worst case occurs when the array at all 3.The item is the last element in the array 4.The item is 4.0
the last element in the array or is not there at all
1.
shared
2.
decoded
789 In max mode, control bus signal So,S1 and S2 are sent out in ____________ form 3.0
3.
encoded
4.
unshared
1.
2.
4.
an error is thrown.
1.To delimit the handle 2.For all pair of terminals 3.For all pair of non
791 In operator precedence parsing , precedence relations are defoned 3.0
terminals 4.Only for a certain pair of terminals
1.
Float, string
2.
String, Boolean
4.
Integer, String
793 In PHP, which of the following function is used to insert content of one php file into another php 1.include[] 2.#include() 3.include() 4.#include{} 3.0
file before server executes it
1.
2.
In Priority Scheduling a priority number (integer) is associated with each process. The CPU is Aging
794 allocated to the process with the highest priority (smallest integer = highest priority). The problem 3. 2.0
of, Starvation ? low priority processes may never execute, is resolved by __________.
Mutual Exclusion
4.
Semaphore
1.
True
In software engineering development, if there are no applicable theories, people often use adhoc
795 approach. 2. 1.0
False
3. 4.
S.NO. Questions Choices Answers
1.
true
false
3. 4.
1.
2.
The register containing the address of the operand is specified inside the
instruction
4.
1.view level
2.conceptual level
798 In the architecture of a database system external level is the 1.0
3.logical level
4.physical level
1.In both AST and CFG, let node N2 be the successor of node N1. In the
input program, the code corresponding to N2 is present after the code
799 In the context of abstract-syntax-tree (AST) and control-flow-graph (CFG), which one of the corresponding to N1 2.For any input program, neither AST nor CFG will 4.0
following is True? contain a cycle 3.Each node in AST and CFG corresponds to at most one
statement in the input program 4.The maximum number of successors of
a node in an AST and a CFG depends on the input program
800 In the context of object-oriented software engineering a component contains 4.0 4.0
801 In the following code snippet, what is the correct value of the left margin? margin: 10px 5px 20px 1.10px 2.5px 3.20px 4.15px 4.0
15px;
1.
2.
only one
802 In the multi-programming environment, the main memory consisting of _________ number of 4.0
process. 3.
Greater than 50
4.
1.
2.
4.
a file
2.
a record
804 In the operation read_item(x), what does x mean? 4.0
3.
a disk block
4.
2.
4.
1.
2.
increases linearly
806 In the slow start phase of the TCP congestion control algorithm, the size of the congestion window 4.0
..................... 3.
increases quadratically
4.
increases exponentially
1.
2.
In every loop
4.
entire IP packet
2.
IP header
808 In tunnel mode IPsec protects the 1.0
3.
IP payload
4.
1.Control Coupling
2.Stamp Coupling
809 In what type of coupling, the complete data structure is passed from one module to another? 2.0
3.External Coupling
4.Content Coupling
1.
Absolute
2.
Immediate
810 In which addressing mode the operand is given explicitly in the instruction 2.0
3.
Indirect
4.
Direct
1.Class for which copy constructor is defined 2.Class for which two or
811 In which case is it mandatory to provide a destructor in a class? more than two objects will be created 3.Almost in every class 4.Class 4.0
whose objects will be created dynamically
S.NO. Questions Choices Answers
1.
active mode
2.
passive mode
812 In which mode FTP, the client initiates both the control and data connections. 2.0
3.
4.
813 In which topology, if there are n devices in a network, each device has n-1 ports for cables? 1.Mesh 2.Star 3.Ring 4.Bus 1.0
1.
1978
2.
1979
814 In which year, 8086 was introduced? 1.0
3.
1977
4.
1981
1.
TRUE
FALSE
3. 4.
1.
2.
4.
1.
2.
all stations
817 In wireless network an extended service set is a set of 1.0
3.
4.
all nodes
1.
Floppy disk
2.
Magnetic tape
818 Information retrieval is faster from 3.0
3.
Hard disk
4.
CD
S.NO. Questions Choices Answers
1.
2.
Missing Values
819 Insert into Emp(101, ‘XXX’) gives the following error 2.0
3.
4.
No of the errors
1.
x=(100,200); x=200,y=200
820 y=100,200; 4.0
3.
printf("x=%d,y=%d",x,y); ERROR
return 0; 4.
}
Find the output x=200,y=100
1.
2.
4.
None
transport layer
2.
network layer
824 IPSec is designed to provide the security at the 2.0
3.
application layer
4.
session layer
True
False
3. 4.
1.
False
827 It would be ideal if all of computer science theories can be used in software engineering. 2. 2.0
True
3. 4.
Cartesian Product
2.
4.
1.84-2-1
830 K-map follow following code for marking adjacent variables 2.0
2.Gray Code 3.2421 4.8421
1.
P Only
Let G be a weighted connected undirected graph with distinct positive edge weights.If every edge 2.
weight is increased by the same value, then which of the following statements is/are TRUE ?
831 P: Minimum spanning tree of G does not change. Q: Shortest path between any pair of vertices Q Only 1.0
does not change 3.
Neither P nor Q
4.
Both P and Q
1.
2.
Let E1 and E2 be two entities in an E/R diagram with simple single-valued attributes. R1 and R2 3
832 are two relationships between E1 and E2, where R1 is one-to-many and R2 is many-to-many. R1 2.0
and R2 do not have any attributes of their own. What is the minimum number of tables required to 3.
represent this situation in the relational model?
4
4.
Let G be a graph with n vertices and m edges, What is the tightest upper bound on the running time
833 on Depth First Search of G? Assume that the graph is represented using adjacency matrix 1.O(n) 2.O(m+n) 3.O(mn) 4.O(n^2) 4.0
1.
l=P=r
2.
Let G be the CFG, l be the number of left most derivations, r be the number of right most l<=P>=r
834 derivations and P be the number of parse trees. Assume l , r and P are computed for a particular 1.0
3.
string. For a given CFG ‘G’ and given string ‘w’, what is the relation between l , P , r ?
l>=P<=r
4.
l<=P<=r
1.
2.
G(x) does not divide 1+x^k, for any k not exceeding the frame length
835 Let G(x) be the generator polynomial used for CRC checking. What is the condition that should be 3.0
satisfied by G(x) to detect odd number of bits in error? 3.
4.
2.
Let L1 be a recursive language, and let L2 be a recursively enumerable but not a recursive language. Which
L1' is recursive and L2' is not recursively enumerable
836 one of the following is TRUE? 2.0
3.
L1' --> Complement of L1
L2' --> Complement of L2
L1' and L2' are recursively enumerable
4.
Let P be a QuickSort Program to sort numbers in ascending order using the first element as pivot,
837 Let t1 and t2 be the number of comparisons made by P for the inputs {1, 2, 3, 4, 5} and {4, 1, 5, 3, 1.t1=5 2.t1>t2 3.t1 4.t1=t2 2.0
2} respectively,Which one of the following holds?
838 Let T(n) be the function defined by T(n) = 1 and T(n) = 2T (n/2) + n, 1.T(n) = O(n) 2.T(n) = O(log2n) 3.T(n) = O( n) 4.T(n) = O(n2) 3.0
which of the following is TRUE ?
1.
n+1
2.
n
839 Let w be any string of length n is {0,1}*. Let L be the set of all substrings of w. What is the minimum number of 1.0
states in a non-deterministic finite automaton that accepts L? 3.
n-1
4.
2n+1
2.
3.
select test paths based on the locations and uses of variables
4.
focus on testing the validity of loop constructs
1.
2.
4.
TRUE
FALSE
3. 4.
S.NO. Questions Choices Answers
1.
2.
Match all items in Group 1 with correct options from those given in Group 2.
4.
1.
Match the following:
a
List-I List-II
A. Lexical analysis 1. Graph coloring 2.
B. Parsing 2. DFA minimization
C. Register allocation 3. Post-order traversal b
848 D. Expression evaluation 4. Production tree 2.0
3.
Codes:
A B C D c
(a) 2 3 1 4
(b) 2 1 4 3 4.
(c) 2 4 1 3
(d) 2 3 4 1 d
849 Memory elements in clocked sequential circuits are called. 1.latches 2.gates 3.signals 4.flipflop 4.0
1.
2.
Programmable Memory
850 Memory unit accessed by content is called______ 4.0
3.
Virtual Memory
4.
Associative Memory
851 Mode of communication in which transmission takes place in both directions, but only in one 1.simplex 2.four wired 3.full duplex 4.half-duplex 4.0
direction at a time is called________________
1.
adaptive maintenance
2.
corrective maintenance
852 Modifying the software to match changes in the ever changing environment is called 1.0
3.
perfective maintenance
4.
preventive maintenance
1.
2.
4.0
Reusable components are too expensive to use.
3.
853 Most software continues to be custom built because 1.0
Software is easier to build without using someone else's components
4.
2.
854 Multiple choice examination answer sheets can be evaluated automatically by 3. 1.0
4.
1.
persistent HTTP
2.
nonpersistent HTTP
855 Multiple object can be sent over a TCP connection between client and server in 3. 1.0
4.
p-persistent HTTP
856 Multiple variable declaration of same data type can be avoided by? 1.array 2.identifiers 3.functions 4.Pointer 1.0
1.
frame filter
2.
packet filter
857 Network layer firewall works as a 2.0
3.
4.
2.
4.
unit testing.
2.
beta testing.
865 One of the fault base testing techniques is 4.0
3.
Stress testing.
4.
mutation testing.
S.NO. Questions Choices Answers
1.
2.
4.
867 One of the main advantage of using src attribute is 1.It becomes self-cached 2.It makes the HTML file modular 3.It restricts 4.0
manipulation in the HTML file 4.It simplifies the HTML files
1.
2.
4.
2.
4.
1.
2.
4.
avoids deadlock
1.
Many-to-one model
2.
Many-to-many
874 Parallelism and concurrency is fully achieved in which of the following thread model 1.0
3.
one-to-one model
4.
Mapping
2.
Communication
875 Passing the request from one schema to another in DBMS architecture is called as _______ 1.0
3.
Relational
4.
network
876 Pee hole optimization 1.Local optimization 2.Loop optimization 3.Constant folding 4.Data flow 3.0
analysis
1.
true
false
3. 4.
1.
2.
4.
1.
1. int x[5]; 2
4. int x[]; 4.
880 Pick the odd one out. 1.[] 2.() 3.:: 4.~ 3.0
1.
2.
2.0
881 Polymorphism reduces the effort required to extend an object system by enabling a number of different operations to share the same name. 4.0
3.
making objects more dependent on one another
4.
removing the barriers imposed by encapsulation.
882 Popular application of flip-flop are. 1.Shift registers 2.Transfer register 3.Counters 4.All of these 4.0
883 Postorder Tree travsersal is recursive 1.LDR 2.LRD 3.DLR 4.DRL 2.0
1.Value is =1250 2.
PREDICT THE OUTPUT: Value is =80
#include <stdio.h> 3.
void main()
884 { Value is =125 2.0
int a=10,b=2,x=0;
x=a+b*a+10/2*a; 4.
printf("value is =%d",x);
} Error
885 Prim's algorithm is a method available for finding out the minimum cost of a spanning tree. 1.O(1) 2.O(n*n) 3.O(n logn) 4.O(n) 3.0
Its time complexity is given by:
1.
true
false
3. 4.
S.NO. Questions Choices Answers
1.
interrupt recognized
2.
4.
All of these
1.
TRUE
Quantitative methods for assessing the quality of proposed architectural designs are readily
888 available. 2. 2.0
FALSE
3. 4.
1.
Relational Algebra
2.
4.
2.
4.
1.
2.
4.
1.
Client
2.
Investor
894 Risk management is one of the most important jobs for a 4.0
3.
Production team
4.
Project manager
895 Routine is not loaded until it is called. All routines are kept on disk in a relocatable load format. 1.Static loading 2.Dynamic loading 3.Dynamic linking 4.Overlays 3.0
The main program is loaded into memory & is executed. This type of loading is called _________
S.NO. Questions Choices Answers
1.
Static loading
2.
Dynamic loading
Routine is not loaded until it is called. All routines are kept on disk in a relocatable load format.
896 The main program is loaded into memory & is executed. This type of loading is called _________ 3. 3.0
Dynamic linking
4.
Overlays
All palindromes
2.
4.
1.
true
false
3. 4.
1.
2.
SELECT department_id, AVG(salary) FROM employees WHERE AVG(salary) > 8000 GROUP Displays a error
900 BY department_id 2.0
3.
4.
1.
Displays a error
2.
4.
1.
2.
SELECT employee_id, last_name FROM employees WHERE salary = (SELECT MIN(salary) Error
902 FROM employees GROUP BY department_id); 1.0
3.
4.
2.
Error
4.
1.
2.
4.
1.
r1(x), w2( y )
2.
r1(x), w1(x)
905 Select the conflicting operation: 3.0
3.
w1( y ), w2(x)
4.
r1(x), w2(x)
906 SELECT THE HIGHEST PRIORITY OPERATOR 1.&& 2., 3.?: 4.++ 4.0
1.Vertical parser 2.top down and bottom up parser 3.Bottom up parser
907 Shift reduce parsers are 3.0
4.Top down parser
1.the nodes 2.the server 3.the hubs 4.a separate PC that managers the
908 Simple network management protocol (SNMP) is implemented with a daughter board in 3.0
network
909 Skewed binary trees can be efficiently represented using 1.Arrays 2.Linked lists 3.Stacks 4.Queues 2.0
1.
True
910 2.0 2. 1.0
False
3. 4.
1.
True
False
3. 4.
1.Customer visible usage scenarios
2.
ALL
1.
True
Software is a product and can be manufactured using the same technologies used for other
913 engineering artifacts. 2. 2.0
False
3. 4.
S.NO. Questions Choices Answers
1.
true
Software validation is achieved through a series of tests performed by the user once the software is
914 deployed in his or her work environment. 2. 2.0
false
3. 4.
1.
2.
915 Some code optimizations are carried out on the intermediate code because 3. 1.0
4.
the information from the front end cannot otherwise be used for
optimization
1.The information from data flow analysis cannot otherwise be used for
optimization 2.They enhance the portability of the complier to other
916 Some code optimizations are carried out on the intermediate code because target processors 3.The information from the front end cannot otherwise 2.0
be used for optimization 4.Program analysis is name accurate on
intermediate code than on machine code
1.alloc() and memalloc() 2.malloc() and calloc() 3.memalloc() and
917 Specify the 2 library functions to dynamically allocate memory? 2.0
faralloc() 4.malloc() and memalloc()
1.
2.
transitive dependencies
4.
inner join
1.
2.
Stress testing
919 SRS is also known as specification of 4.0
3.
Integrated testing
4.
1.
12
2.
Station A needs to send a message consisting of 9 packets to Station B using a sliding window 14
920 (window size 3) and go-back-n error control strategy. All packets are ready and immediately 3.0
available for transmission. If every 5th packet that A transmits gets lost (but no acks from B ever 3.
get lost), then what is the number of packets that A will transmit for sending the message to B?
16
4.
18
S.NO. Questions Choices Answers
1.
20
2.
Station A uses 32 byte packets to transmit messages to Station B using a sliding window protocol. 40
921 The round trip delay between A and B is 80 milliseconds and the bottleneck bandwidth on the path 3. 2.0
between A and B is 128 kbps. What is the optimal window size that A should use?
160
4.
320
1.
true
false
3. 4.
923 String length is found by the condition 1.str[i]!=NULL 2.str[i]!=sizeof(str) 3.str[i]>='\0' 4.str[i]!='\0' 4.0
Suppose a circular queue of capacity (n – 1) elements is implemented with an array of n elements. 1.Full: (FRONT+1) mod n == REAR, empty: REAR == FRONT 2.Full:
924 Assume that the insertion and deletion operation are carried out using REAR and FRONT as array REAR == FRONT, empty: (REAR+1) mod n == FRONT 3.Full: 4.0
index variables, respectively. Initially, REAR = FRONT = 0. The conditions to detect queue full (REAR+1) mod n == FRONT, empty: (FRONT+1) mod n == REAR
and queue empty are 4.Full: (REAR+1) mod n == FRONT, empty: REAR == FRONT
Suppose a circular queue of capacity (n – 1) elements is implemented with an array of n elements. 1.Full: (REAR+1) mod n == FRONT, empty: REAR == FRONT 2.Full:
925 Assume that the insertion and deletion operation are carried out using REAR and FRONT as array (REAR+1) mod n == FRONT, empty: (FRONT+1) mod n == REAR 1.0
index variables, respectively. Initially, REAR = FRONT = 0. The conditions to detect queue full 3.Full: REAR == FRONT, empty: (REAR+1) mod n == FRONT 4.Full:
and queue empty are (FRONT+1) mod n == REAR, empty: REAR == FRONT
Suppose P, Q, R, S, T are sorted sequences having lengths 20, 24, 30, 35, 50 respectively. They
926 are to be merged into a single sequence by merging together two sequences at a time, The number 1.672 2.740 3.358 4.354 3.0
of comparisons that will be needed in the worst case by the optimal algorithm for doing this is
____
Suppose P, Q, R, S, T are sorted sequences having lengths 20,24,30,35,50 respectively. They are
927 to be merged into a single sequence by merging together two sequences at a time. The number of 1.368 2.338 3.348 4.358 4.0
comparisons that will be needed in the worst case by the optimal algorithm for doing this is ____
1.
94
2.
416
928 Suppose the round trip propagation delay for a 10 Mbps Ethernet having 48-bit jamming signal is 4.0
46.4 micro sec. The minimum frame size is: 3.
464
4.
512
Suppose x is dead, that is, never subsequently used, at the point where the statement x=y+z
1.Common subexpression elimination 2.Dead code elimination
929 appears in a basic block. Then this statement may be safely removed without changing the value of 3.Renaming temporary variables 4.Loop invarient 2.0
the basic block. This transformation is known as __________________ .
930 Suppose you want to delete the name that occurs before 'Vellore' in an alphabetical listing. 1.Circular linked list 2.Dequeue 3.Linked list 4.Doubly linked list 2.0
Which of the following data structures shall be most efficient for this operation?
1.
True
False
3. 4.
1.input clock pulses are applied simultaneously to each stage 2.input
932 Synchronous counters eliminate the delay problems encountered with asynchronous (ripple) clock pulses are applied only to the first and last stages 3.input clock 4.0
counters because the. pulses are applied only to the last stage 4.input clock pulses are not used
to activate any of the counter stages
933 Syntax for creating a RegExp object: (i). var txt=new RegExp(pattern,modifiers); (ii). var 1.(i) only 2.(ii) only 3.Both (i) and (ii) 4.None of these 3.0
txt=/pattern/modifiers; Which of the above mentioned syntax is correct?
934 Synthesized attribute can be easily simulated by a 1.LR grammar 2.Ambiguous grammar 3.LL grammar 4.LF grammer 1.0
1.
2.
4.
State diagram
2.
Activity diagram
Usecase diagram
4.
Sequence diagram
1.
TRUE
FALSE
3. 4.
1.
true
false
3. 4.
1.
True
False
3. 4.
940 The --------is neither an input nor an output; it is an internal bit programmed via the PC4(Port A) or 1.IFB 2.INTR 3.INTE 4.NMI 3.0
PC2(Port B)bits
941 The ........ instruction is used to specify the number of stop bits, data bits,parity bit, and baud rate 1.bit set/reset 2.Mode 3.Command 4.Code 2.0
clock factor for the 8251 UART
1.
1 Kbyte
2.
64 Kbyte
942 The 1 MB byte of memory can be divided into ______ segment 2.0
3.
33 Kbyte
4.
34 Kbyte
1.
2.
4.
The 16-bit data segment value is 1000H and the offset is 2000H. calculated physical address is ----
944 - 1.10000H 2.11000H 3.12000H 4.12500H 3.0
945 The 16-bit stack segment value is 5D27H and the offset is 2C30H. calculated physical address is -- 1.5FFEOH 2.5FAE0H 3.5FEA0H 4.12500H 3.0
---
S.NO. Questions Choices Answers
1.
internal
2.
data
946 The ___ bus controller device decodes the signals to produce the control bus signal 3.0
3.
external
4.
address
1.
2.
4.
1.
Slice
2.
Reverse
948 The _______ method of an Array object adds and/or removes elements from an array. 4.0
3.
Shift
4.
Splice
949 The ________ ensures that only one IC is active at a time to avoid a bus conflict caused by two ICs 1.control bus 2.control instructions 3.address decoder 4.CPU 3.0
writing different data to the same bus
950 The ___________ property specifies the stack order of an element 1.d-index 2.s-index 3.x-index 4.z-index 4.0
1.
Direct
2.
Random
951 The access method used for magnetic tape is_________ 3.0
3.
Sequential
4.
None of these
1.
2.
4.
redundancy
2.
data dependence
953 The advantage of DBMS over file systems is 1.0
3.
multiple user
4.
single user
S.NO. Questions Choices Answers
1.
2.
954 1.0 1.0
data, documentation, hardware, software
3.
data, hardware, software, procedures
4.documentation, hardware, people, procedures
1.
base 64 encoding
2.
base 32 encoding
955 The ASCII encoding of binary data is called 1.0
3.
base 16 encoding
4.
base 8 encoding
1.
seek time
2.
turnaround time
956 The average time required to reach a storage location in memory and obtain its contents is called 3.0
the 3.
access time
4.
transfer time
1.
Bucket Hash
2.
Quad tree
957 The best index for exact match query is 1.0
3.
B Tree
4.
B+ Tree
1.software developers do not need to do any testing
1.
2.
send them to the design team and see if they have any concerns
4.
1.
2.
6
960 The BIU contains FIFO register of size __________ bytes 2.0
3.
4.
12
S.NO. Questions Choices Answers
1.
queue
2.
register
961 The BIU prefetches the instruction from memory and store them in ________ 1.0
3.
memory
4.
stack
2.
966 The cyclomatic complexity metric provides the designer with information regarding the number of errors in the program 4.0
3.
3.0
independent logic paths in the program
4.
967 The data structure required for Breadth First Traversal on a graph is 1.tree 2.array 3.stack 4.queue 4.0
968 THE DATA TYPE IS ALL ABOUT 1.NAME VALUE ADDRESS 2.BITS BYTES WORD 3.SIZE LIMITS 4.0
RESTRICTIONS 4.TYPE SIZE RANGE
969 The decimal equivalent of hexadecimal number of ‘A580’ is 1.43286 2.42368 3.43288 4.48632 2.0
970 The default copy constructor performs 1.Deep Copy 2.Shallow Copy 3.Soft Copy 4.Hard Copy 2.0
The degree sequence of a simple graph is the sequence of the degrees of the nodes in the graph in
971 decreasing order. Which of the following sequences can not be the degree sequence of any graph? 1.IV only 2.III and IV 3.I and II 4.II and IV 4.0
I. 7, 6, 5, 4, 4, 3, 2, 1 II. 6, 6, 6, 6, 3, 3, 2, 2 III. 7, 6, 6, 4, 4, 3, 2, 2 IV. 8, 7, 7, 6, 4, 2, 1, 1
1.
Architectural design
2.
Interface design
972 The design process related to data structures and their representation is 4.0
3.
Component design
4.
Database design
1.A record form a hierarchical structure but a linear array does not 2.All
973 The difference between linear array and a record is of above 3.An array is suitable for homogeneous data but the data items 3.0
in a record may have different data type 4.In a record, there may not be a
natural ordering in opposed to linear array
974 The Document object is which part of the object? 1.Tree 2.System 3.Window 4.Screen 3.0
975 The efficient data structure to insert/delete a number in a stored set of numbers is 1.Queue 2.Linked list 3.Doubly linked list 4.Binary tree 2.0
1.
2.
4.
The ESC instruction of 8086 may have two formats. In one of the formats, no memory operand is
977 used. Under this format, the number of external op-codes (for the co- processor) which can be 1.64 2.128 3.256 4.512 2.0
specified is
S.NO. Questions Choices Answers
1.
Pascal
2.
Dennis Ritchie
978 The external system bus architecture is created using from ______ architecture 4.0
3.
Charles Babbage
4.
Von Neumann
1.
2.
4.
980 The first processor to include Virtual memory in the Intel microprocessor familywas 1.Pentium 2.80486 3.80286 4.80386 3.0
1.Referential Integrity Constraint 2.Check Constraint 3.Foreign Key
981 The following is not a Relational Model Constraint 1.0
Constraint 4.Entity Integrity Constraint
1.
Equi-join
2.
Natural join
982 The following SQL is which type of join: SELECT CUSTOMER_T. CUSTOMER_ID, 4.0
ORDER_T. CUSTOMER_ID, NAME, ORDER_ID FROM CUSTOMER_T,ORDER_T ; 3.
Outer join
4.
Cartesian join
1.
Define the specification for computer-based system
2.
4.
ALL
1.
ltrim
2.
lpad
rpad
4.
rtrim
1.
TRUE
The goal of product engineering is to translate the customer's desire for a set of defined capabilities
985 into a working product. 2. 1.0
FALSE
3. 4.
S.NO. Questions Choices Answers
1.
ambiguous
2.
left-recursive
986 The grammar A → AA | (A) | ε is not suitable for predictive-parsing because the grammar is 2.0
3.
right-recursive
4.
an operator-grammar
1.
2.
4.
1.
Polling
2.
Interrupt
988 The Hardware mechanism that enables a device to notify the CPU is called __________. 2.0
3.
Systems Call
4.
None of these
1.
2.
Thrashing
989 The high paging activity is called ________ 2.0
3.
Context Switching
4.
Working Set
1.
DMA Controller
2.
Interrupt Controller
990 The IC 8237 is a 1.0
3.
Keyboard controller
4.
1.
24
2.
28
991 The IC 8251 A has ---------------------many pins 3.0
3.
40
4.
30
S.NO. Questions Choices Answers
1.
24
2.
28
992 The IC 8254 has ---------------------many pins 1.0
3.
34
4.
40
1.
2.
2
993 The IC 8254 has ----------------many 16 bit counters 3.0
3.
4.
1.
20
2.
30
994 The IC 8279 has ----------------------many pins 4.0
3.
40
4.
10
1.
IC 8251A
2.
IC8259
995 The IC Number for USART is -------------------------- 1.0
3.
IC5255
4.
IC 8254
1.
2.
4.
all of these
1.
accuracy
2.
997 The importance of software design can be summarized in a single word complexity 3.0
3.
4.0
efficiency
4.
quality
S.NO. Questions Choices Answers
1.
2.
4.
1.
2.
The best approach to use for projects with large development teams.
4.
1.
8 bit
2.
16 bit
1000 The intel 8086 microprocessor is a _______ processor 2.0
3.
32 bit
4.
4bit
1001 The internal block diagram of 80286 contains ---- functional parts. 1.6 2.4 3.2 4.8 2.0
1002 The interrupt cycle ends when the ........... instruction is executed 1.IRET 2.CALL 3.PUSH 4.POP 3.0
1.
2.
Is always regular
1003 The intersection of CFL and regular language 3.0
3.
4.
1.
8 bits
2.
4 bits
1004 The IP is ________ bits in length 4.0
3.
16 bits
4.
32 bits
1.
2.
4.
2.
4.
None of these
1.
Regular
2.
context free
1007 The language accepted by a Pushdown Automation in which the stack is limited to 10 items is best described 1.0
as 3.
Recursive
4.
1.
not recursive
2.
is a regular language
4.
1.
Machine language
2.
Application software
1009 The language that the computer can understand and execute is called ______ 1.0
3.
System program
4.
None of these
1.
Regular language
2.
4.
1.
2.
The length of the shortest string NOT in the language (over Σ = {a, b}) of the following regular expression is 3
1011 ______________. 2.0
3.
a*b*(ba)*a*
4
4.
1012 The length property belongs to which of the following objects? 1.Window 2.Element 3.History 4.Document 2.0
1013 The levels of hierarchy in inheritance helps to handle 1.flexibility 2.complexity 3.detailed information 4.security 4.0
S.NO. Questions Choices Answers
1.
2.
The lexical analysis for a modern language such as Java needs the power of which one of the Finite state automata
1014 following machine models in a necessary and sufficient sense? 2.0
3.
4.
Turing machine
1015 The library function used to find the last occurrence of a character in a string is 1.strnstr() 2.laststr() 3.strrchr() 4.strstr() 3.0
1.
2.
The best approach to use for projects with large development teams.
4.
1.
2.
Spiral model
1017 The linear sequential model of software development is also known as the 3. 3.0
Waterfall model
4.
Incremental Model
1.
Accumulator
2.
Instruction Register
1018 The load instruction is mostly used to designate a transfer from memory to a processor register 1.0
known as____. 3.
Program counter
4.
2.
8
1020 The maximum number of superkeys for the relation schema R(E,F,G,H) with E as the key is 2.0
3.
4.
6
S.NO. Questions Choices Answers
1.
1000 bytes
2.
1200 bytes
1021 The maximum size of payload field in ethernet frame is 4.0
3.
1300 bytes
4.
1500 bytes
1.
2^n
2.
The maximum window size for data transmission using the selective reject protocol with n-bit 2^(n-1)
1022 frame sequence numbers is: 2.0
3.
2^n – 1
4.
2^(n-2)
1.
2.
4.
1.
Segmentation
2.
Fragmentation
1024 The mechanism that bring a page into memory only when it is needed is called ______ 3.0
3.
Demand Paging
4.
Page Replacement
1025 The members of a class, by default, are 1.private 2.protected 3.public 4.mandatory to specify 3.0
1.
main memory
2.
Secondary memory
1026 The memory unit that communicates directly with the CPU is called the 1.0
3.
shared memory
4.
auxiliary memory
1.
memory
2.
I /O device
1027 The microprocessor can read/write 16 bit data from or to ________ 1.0
3.
processor
4.
register
S.NO. Questions Choices Answers
1.
carry flag
2.
conditional flag
1028 The microprocessor determines whether the specified condition exists or not by testing the 2.0
______ 3.
common flag
4.
sign flag
1029 The minimum number of arithmetic operations required to evaluate the polynomial P(X) = X^5 + 1.6 2.9 3.8 4.7 4.0
4X^3 + 6^X + 5 for a given value of X using only one temporary variable is.
1030 The minimum number of arithmetic operations required to evaluate the polynomial 1.6 2.7 3.8 4.9 2.0
P(X)=X^5+4X^3+6^X+5 for a given value of X using only one temporary variable.
1031 The minimum number of nodes in a binary tree of depth d (root at level 0) is 1.2d - 1 2.d + 1 3.2d + 1 - 1 4.d 2.0
1.
Hardware
2.
Software
1032 1.0
3.
The MMU (Memory Management Unit) is a
Firmware
4.
Malware
1.
TRUE
The nature of collaboration is such that all system requirements are defined by consensus of a
1033 committee of customers and developers. 2. 2.0
FALSE
3. 4.
1034 The node type for document returns the value ---. 1.2 2.9 3.3 4.8 4.0
1.
2.
2
1035 The number of auxiliary memory required for a Push Down Machine (PDM) to behave like a Finite 1.0
State Machine (FSM) is 3.
4.
1036 The number of clock pulses needed to shift one byte of data from input to the output of a 4 -bit shift 1.10 2.12 3.16 4.32 3.0
register is.
1037 The number of components in a graph with n nodes and 1 edge are 1.n 2.n-2 3.n-1 4.n-3 3.0
1038 The number of components in a graph with n nodes and 1 edge are 1.n 2.n-2 3.n-1 4.n-3 3.0
1039 The number of counters available in internal block diagram of 8253 is 1.2 2.1 3.3 4.4 3.0
1.
Greater
2.
less
1040 The number of states in DFA is --------than the number of states in NFA for the same Language. 2.0
3.
greater equal
4.
equal
bit-by-bit delivery
2.
4.
1.
line coding
2.
channel coding
1045 The physical layer is responsible for 4.0
3.
modulation
4.
1.
2.
network layer
1046 The physical layer translates logical communication requests from the ______ into hardware 1.0
specific operations. 3.
trasnport layer
4.
application layer
1.
2.
4.
1.
2.
4.
1049 The postfix expression for * + a b - c d is? 1.ab + cd - * 2.ab + cd * - 3.ab + - cd * 4.ab cd + - * 1.0
1050 The postfix form of the expression (A+ B)*(C*D- E)*F / G is 1.AB + CD* E - *F *G / 2.AB + CD* E - F **G / 3.AB+ CD*E - FG /** 3.0
4.AB + CDE * - * F *G /
1051 The preorder traversal sequence of a binary search tree is 30,20,10,15,25,23,39,35,42. Which one 1.10,20,15,23,25,35,42,39,30 2.15,10,25,23,20,42,35,39,30 4.0
of the following is the postorder traversal sequence of the same tree? 3.15,20,10,23,25,42,35,39,30 4.15,10,23,25,20,35,42,39,30
S.NO. Questions Choices Answers
1.
reading
2.
writing
1052 The process of retaining data for future use is called 3.0
3.
storing
4.
coding
1.
Association
2.
The project planner examines the statement of scope and extracts all important software functions Decomposition
1053 which is known as 3.0
3.
Planning process
4.
ALL
1.
2.
4.
ALL
1.attribute
2.relation
1055 The RDBMS terminology for a row is 4.0
3.degree
4.tuple
1.
may be different
2.
must be different
1056 The recognizing capabilities of NDFSM and DFSM 3.0
3.
must be same
4.
1057 The relational model uses some unfamiliar terminology. A tuple is equivalence to a: 1.record 2.field 3.file 4.database 1.0
1.
Interrupt
2.
Swapping
1058 The removal of process from active contention of CPU and reintroduce them into memory later is 2.0
known as ____________ 3.
Signal
4.
Thread
1059 The restriction while using the binary search is ? 1.List should be small in number 2.List should be large in number 3.List 3.0
should be sorted 4.No restriction
1060 The result evaluating the postfix expression (10 5 + 60 6 / * 8 –) is 1.284 2.142 3.213 4.71 2.0
1061 The searching technique that takes O (1) time to find a data is 1.Binary Search 2.Linear Search 3.Tree Search 4.Hashing 4.0
S.NO. Questions Choices Answers
1.
S < STBR
2.
S > STBR
1062 The segment number S is legal if 3.0
3.
S < STLR
4.
S > STLR
2 states
2.
3 states
1066 The smallest finite automation which accepts the language {x | length of x is divisible by 3} has : 3.0
3.
4 states
4.
5 states
IBM
2.
Barry Boehm
1069 The spiral model was originally proposed by 2.0
3.
Pressman
4.
Royce
1.
2.
4.
1071 The starting address for counter 0 of 8253 is 0038H, then port address for control word register is 1.44H 2.49H 3.42H 4.46H 3.0
S.NO. Questions Choices Answers
1.
2.
4.
1073 The status that cannot be operated by direct instructions is 1.Z 2.Cy 3.P 4.AC 4.0
1.friend functions 2.member function 3.non member functions 4.static
1074 The stream insertion operator should be overloaded as 4.0
functions
1.friend functions 2.member function 3.non member functions 4.static
1075 The stream insertion operator should be overloaded as 4.0
functions
1.circuit switching 2.Message Switching 3.Packet switching 4.Frame
1076 The switching method fixes the path from source to destination is _________ 1.0
Relay
1.[objectName.]eval(numeriC) 2.[objectName.]eval(string) 3.
1077 The syntax of Eval is ___________ 2.0
[EvalName.]eval(string) 4.[EvalName.]eval(numeriC)
1.
detailed view
2.
domain view
1078 The system engineering process usually begins with the 1.0
3.
4.0
element view
4.
world view
1.
2.
1079 1.0 implementation of each allocated system 3.0
3.
28
2.
40
The total number of pins for the IC 8255 is
1083 2.0
3.
30
4.
20
1.switch and do-while 2.if and while 3.if and switch 4.break and
1084 The two statements that can be used to change the flow of control are 3.0
continue
1.
2.
4.
2.
1086 The use of traceability tables helps to determine the performance of algorithm implementations 3.0
3.
2.
4.
1.
encoding
2.
decoding
1089 The work of EU is ________ 2.0
3.
processing
4.
calculations
1.
size of the budget
2.
stakeholders needs
1091 The worst case running time to search for an element in a balanced binary search tree with n*2^n 1.theta(n log n) 2.theta(n*2^n) 3.theta(n) 4.theta(log n) 3.0
elements is
1092 The worst case running time to search for an element in a balanced in a binary search tree with 1.theta(n log n) 2.theta(n*2^n) 3.theta(n) 4.theta(log n) 3.0
n*2^n elements is
1.
(1-p)^(n-1)
2.
np(1-p)^(n-1)
1093 There are n stations in a slotted LAN. Each station attempts to transmit with a probability p in each 2.0
time slot. What is the probability that only one station transmits in a given time slot? 3.
p(1-p)^(n-1)
4.
1-(1-p)^(n-1)
1094 There is no connection setup phase in __________ 1.Frame relay 2.Virtual Circuit Switching 3.Datagram 4.ATM 3.0
1.
2.
4.
algorithmic complexity
2.
4.
design patterns
1.
single
2.
memory
To interface memory with the microprocessor, connect register the lines of the address bus
1100 must be added to address lines of the _______ chip. 3. 2.0
multiple
4.
triple
1.presetting all the flip-flops 2.clearing one flip-flop and presetting all
1101 To operate correctly, starting a ring counter requires the others 3.presetting one flip-flop and clearing all the others 4.clearing 3.0
all the flip-flops
1.
True
Today the increased power of the personal computer has brought about an abandonment of the
1102 practice of team development of software 2. 2.0
false
3. 4.
1.Statement that enables to start any DBMS 2.Statement that is executed
by the user when debugging an application program 3.Statement that is
1103 Trigger is a executed automatically by the system as a side effect of a modification to 3.0
the database 4.Condition the system tests for the validity of the database
user
1.
2.
4.
1.
True
2.
1105 Two sets of functional dependencies E and F are equivalent if E+ = F+ .This statement is False 1.0
3.
Cant Say
4.
1106 Updating a database means 1.deleting database 2.modifying or adding record occurrences 3.revising 2.0
the file structure 4.reorganizing the database
S.NO. Questions Choices Answers
1.
customers
2.
3.0
experienced programmers
1107 Usability questionnaires are most meaningful to the interface designers when completed by 3. 3.0
product users
4.
project managers
RAM
2.
Cache Memory
1111 Virtual memory is the portion of _______. 3.0
3.
Hard Disc
4.
None of these
1.
A5/2 cipher
2.
b5/4 cipher
1112 Voice privacy in GSM cellular telephone protocol is provided by 1.0
3.
b5/6 cipher
4.
b5/8 cipher
1113 VOLATILE MEMORY IS ________________ ? 1.COMPACT DISK 2.HARD DISK 3.RANDOM ACCESS MEMORY 3.0
4.READ ONLY MEMORY
1.
2.
4.
NONE
1.
Risk monitoring
2.
What assess the risk and your plans for risk mitigation and revise these when you learn more about Risk planning
1115 the risk? 1.0
3.
Risk analysis
4.
Risk identification
S.NO. Questions Choices Answers
1.
too slow
2.
unreliable
1116 What characteristic of RAM memory makes it not suitable for permanent storage? 3.0
3.
it is volatile
4.
too bulky
1.'c' means argument count 'v' means argument vector 2.'c' means
argument count 'v' means argument vertex 3.'c' means argument
1117 What do the 'c' and 'v' in argv stands for? configuration 'v' means argument visibility 4.'c' means argument control 4.0
'v' means argument vector
1.Match one or more characters that are not open paranthesis 2.Match
zero or more characters that are open paranthesis 3.Match zero or more
1118 What does /[^(]* regular expression indicate ? characters that are not open paranthesis 4.Match one or more characters 3.0
that are open paranthesis
1.Used to convert a string to an array 2.Used to split a given string into
1119 What does explode function in php do the number of chunks specified 3.Used to split a string by a string 4.Used 1.0
to split string into two equal halves
1120 What does microprocessor speed depends on 1.Clock 2.Address bus width 3.Data bus width 4.Size of register 3.0
1121 What does parseFloat(9+10) evaluates to in JavaScript? 1.19 2.910 3.9109 4.91 1.0
1122 What does the following declaration mean? 1.ptr is array of pointers to 10 integers 2.ptr is a pointer to an array of 10 2.0
int (*ptr)[10]; integers 3.ptr is an array of 10 integers 4.ptr is an pointer to array
1.
1 => 'b'
2.
What elements will the following script output?
True => 'a', a => 'b'
1123 <?php 3.0
$array = array (true => 'a', 1 => 'b'); 3.
var_dump ($array);
?> NULL
4.
1124 What gets printed? $str = 'a\\b\n'; echo $str; 1.ab(newline) 2.a\b(newline) 3.a\b\n 4.a\\b(newline) 3.0
1.PHP continues to execute the script. 2.Results in a fatal error
1125 What happens if no file path is given in include() function? 3.0
3.Include_path is made use of 4.It haults the script.
1.
2.
4.
1.none of them 2.A master clock triggers all the flip-flops at a time 3.all
1127 What is asynchronous counter. the flip-flop are combined to common clock 4.each flip-flop has it own 4.0
clock
1.
block cipher
2.
stream cipher
1128 What is data encryption standard (DES)? 1.0
3.
bit cipher
4.
2.
4.
2.mysqli_connect(host,username,password,dbname);
3.mysqli_open(host,username,password,dbname);
1135 What is the correct way to connect to a MySQL database? 2.0
4.
mysqli_connect(,,)
1136 What is the data structures used to perform recursion? 1.list 2.queue 3.stack 4.Tree 3.0
1137 What is the default execution time set in set_time_limit()? 1.20 secs 2.30 secs 3.40 secs 4.50 secs 2.0
1138 What is the default size of a file set in upload_max_filesize ? 1.1 MB 2.2 MB 3.2.5 MB 4.3 MB 2.0
1.They both behave the same. 2.Print can take multiple parameters where
1139 What is the difference between echo and print? as echo cannot 3.Echo can take multiple parameters where as print 3.0
cannot 4.Print is a function where as echo is not.
1.Attribute Match 2.Exact Value Match 3.Contains Value Match
1140 What is the following style an example of? img[alt~="Pie"] 3.0
4.Subcode Match
1.
1 NF
2.
2 NF
What is the highest normal form level satisfied by the following table design? R=
1141 {A1,A2,A3,A4,A4} F={A1-> A3, A3->A4}Key ={A1,A2} 3. 2.0
3 NF
4.
BCNF
1.
n/2
2.
n-1
1142 What is the maximum number of reduce moves that can be taken by a bottom-up parser for a grammar with no 2.0
epsilon- and unit-production (i.e., of type A -> є and A -> a) to parse a string with n tokens? 3.
2n-1
4.
2^n
1.
Any size
2.
2^16 bytes
4.
1500 bytes
1144 What is the minimum number of NAND gates required to implement A + AB` + AB`C? 1.0 2.1 3.2 4.3 1.0
1.Define pattern matching techniques 2.Define subpatterns within the
1145 What is the most essential purpose of paranthesis in regular expressions? complete pattern 3.Define portion of strings in the regular expression 2.0
4.All of the mentioned
S.NO. Questions Choices Answers
1146 what is the need of segmenting the memory in 8086 1.Increase the memory accessibility 2.Increase the memory addressibility 2.0
3.easy to retrieve data 4.faster access
1.
a, d, c, b
2.
1147 What is the normal order of activities in which traditional software testing is organized? a. b, d, a, c 3.0
integration testing b. system testing c. unit testing d.validation testing
3.
3.0
c, a, d, b
4.
d, b, c, a
1.
2.
1148 What is the order of the stages in the waterfall mode? 3. 1.0
System & Software Design, Requirements Definition, Operation &
Maintenance, Implementation & Unit Testing, Integration & System
Testing.
4.
1.
10***24000
2.
*****24000
1149 what is the output for the following function? LPAD(salary,10,'*') 2.0
3.
24000*****
4.
error
1.
1,2
What is the output? 2.
#include <stdio.h> 3,2
void main()
1150 { 3. 1.0
int a=3,b=2;
a=a==b==0; 0,0
printf("%d,%d",a,b);
} 4.
2,3
1.
2.
4.
1152 What is the result of the following code snippet? window.location === document.location 1.False 2.True 3.0 4.1 2.0
1.Find the last occurrence of the string within a string 2.Find the first
1153 What is the strpos() function used for? occurrence of the string within a string 3.Find both last and first 2.0
occurence 4.Search for all occurrence within a string
1154 What is the time complexity for binary search 1.O(log n) 2.O(n^2) 3.O(1) 4.O(2n) 1.0
1155 What is the time complexity for insertion sort 1.O(log n) 2.O(n) 3.O(n^2) 4.O(1) 3.0
1156 What is the worst case for Selection sort 1.O(log n) 2.O(2n) 3.O(n) 4.O(n^2) 4.0
S.NO. Questions Choices Answers
1.
2.
4.
None
1.
2.
4.
1.
2.
Write only. Creates a new file. Returns TRUE and an error if file already
1159 What is x+ mode in fopen() used for? exists 1.0
3.
4.
1160 What keyword covers unhandled possibilities? 1.other 2.default 3.contingency 4.all 2.0
1.Relaional
What kind of schema it is?
2.Logical Schema
1161 Student(sid, sname, dob, address, pincode) 1.0
3.Conceptual Schema
4.External View
1.
GD library
2.
ZIP library
1162 What library do you need in order to process images? 1.0
3.
4.
BOGUS library
1.
2.
4.
Invalid declaration
1164 What type of register would shift a complete binary number in one bit at a time and shift all the 1.PIPO 2.PISO 3.SIPO 4.SISO 3.0
stored bits out one bit at a time?
S.NO. Questions Choices Answers
1.
Declaration Error
What will be the output?
#include <stdio.h> 2.
int main()
{ value of ok = 1000
1165 extern int ok; 2.0
printf("value of ok = %d",ok); 3.
return 0;
value of ok = 0
}
extern int ok=1000; 4.
Linking Error
1166 What will be the result of the expression 13 & 25 1.25 2.38 3.9 4.12 3.0
1.
2.
Thrasing happens
1167 What will be the status of a computer during storage compaction 4.0
3.
4.
1168 What will happen if the first argument of open() is omitted? 1.Error Page 2.Remains in the same page 3.about:blank 4.Open the first 3.0
page in the history
1.
78
What will the following script output?
2.
<?php
$array = array (1, 2, 3, 5, 8, 13, 21, 34, 55); 19
1169 $sum = 0; 1.0
for ($i = 0; $i < 5; $i++) { 3.
$sum += $array[$array[$i]];
} NULL
echo $sum;
?> 4.
1170 What would be the output of the below code fragment? var a = ["s","a","v","e"]; 1.Undefined 2.save 3.vase 4.S 2.0
document.write(a.join(""));
1.
true
false
3. 4.
1.
2.
1172 When a new row is inserted the constraints that can be violated are 3. 1.0
4.
Domain Constraint
1.
3.0
high coupling
2.
poor modularity
When a single item that triggers other data flow along one of many paths of a data flow diagram,
3.
1173 ________ characterizes the information flow. 3.0
transaction flow
4.
transform flow
S.NO. Questions Choices Answers
1.
HTTP protocol
2.
FTP protocol
1174 When displaying a web page, the application layer uses the 1.0
3.
SMTP protocol
4.
IMAP Protocol
1175 When operated in slave mode, the PIC outputs its type number only if the cascaded address 1.ICW1 2.ICW2 3.ICW3 4.ICW4 4.0
received on CAS0-CAS2 matches the address programmed in --------- bits D0-D2
1.
4.0
low coupling
2.
1176 When the overall flow in a segment of a data flow diagram is largely sequential and follows good modularity 4.0
straight-line paths, _________ is present.
3.
transaction flow
4.
transform flow
1177 When the pre-order and post-order traversal of a Binary Tree generates the same output, the tree 1.Three nodes 2.Two nodes 3.One node 4.Any number of nodes 3.0
can have maximum
1.
automata
2.
finite automata
1178 When there are infinite distinguishable strings then there cannot be a ------------- 2.0
3.
regular expression
4.
1.
2.
1179 When there is an indefinite or an infinity value during an arithmetic value computation, javascript 3. 3.0
Displays “Infinity”
4.
M2
2.
M1 and M2
1181 When we concatenate two languages L1 and L2 recognized by machine M1 and M2 we obtain a 2.0
machine with final state same as that of __________________ 3.
M1
4.
M1 or M2
1.
Primary Key
2.
when you were asked to design a relation, you come across a situation, where passport number is Not Null
1182 to be included for the people. All the students wont be having passport. So what constraint you 4.0
3.
would be using?
Default
4.
Unique
S.NO. Questions Choices Answers
1.
Register values
2.
File descriptors
1183 Which of the following is shared between all of the threads in a process? Assume a kernel level 2.0
thread implementation 3.
Scheduler priority
4.
Local variables
1184 Which buffer is a parallel to serial converter that receives a parallel byte for conversion into a 1.Transmit buffer 2.Receive buffer 3.Data bus buffer 4.Modem control 1.0
serial signal and further transmission onto the communication channel.
1.
INSTR
2.
SUBSTRING
1185 Which character function can be used to return a specified portion of a character string? 3.0
3.
SUBSTR
4.
POS
1.image-background:url('R4R_Logo.jpg') 2.background-
1186 Which command we use to set an image on background? image:url('R4R_Logo.jpg') 3.bg-image:url('R4R_Logo.jpg') 2.0
4.background-image:href('R4R_Logo.jpg')
1187 Which Data structure is best suited for the UNDO operation in Windows 1.Both Stack and Queues 2.Queues 3.Stack 4.Arrays 3.0
1.
External
2.
Conceptual
1188 Which database level is closest to the users? 1.0
3.
Internal
4.
Physical
1.
NEXT_DAY
2.
LAST_DAY
1189 Which date function is used to obtain the date of next Wednesday 3.0
3.
NEXT_DATE
4.
1.
Architectural design
2.
Component-level design
1190 4.0 3.0
3.
Data design
4.
Interface design
S.NO. Questions Choices Answers
1.
2.
4.
1.
2.
4.
1193 Which element is used to draw graphics images on a web page? 1.script 2.audio 3.embed 4.canvas 4.0
1.
Unit Testing
2.
Integration Testing
1194 Which granularity level of testing checks the behavior of module cooperation? 2.0
3.
Acceptance Testing
4.
Regression Testing
1195 Which header file should be included to use functions like malloc() and calloc()? 1.string.h 2.dos.h 3.memory.h 4.stdlib.h 4.0
1196 Which Instruction word is used to specify the number of stop bits, data bits, parity bit and the baud 1.Mode 2.Command followed by Mode 3.Command 4.Mode followed 4.0
rate clock factor for the 8251A USART by command
1.
2.
The same query can be written in many ways, each with vastly different
execution plans.
1197 Which is a major problem with SQL? 2.0
3.
4.
1.
Safe State
2.
Unsafe State
1198 Which is not related to deadlock avoidance? 3.0
3.
Safe Sequence
4.
Resource sequence
S.NO. Questions Choices Answers
1.
2.
Managers
4.
1.
2.
4.
1.
Stack
2.
Queue
1201 Which is used to store critical pieces of data during subroutines and interrupts 1.0
3.
Accumulator
4.
Data register
1202 Which item is an example of a physical network address? 1.IP address 2.MAC address 3.Workstation name 4.www.proprofs.com 2.0
1203 Which JavaScript function is most useful for finding errors? 1.Confirm 2.Prompt 3.Debug 4.Alert 3.0
1.
Software interrupts
2.
Interrupt-driven I/O
1204 Which method bypasses the CPU for certain types of data transfer? 4.0
3.
Polled I/O
4.
1.
getDriver() method
2.
class.forName()
1205 Which method is used for loading the driver in Java JDBC. 3. 2.0
createStatement()
4.
getConnection()
1.
stringVariable.substring(subString)
2.
stringVariable.find(subString)
1206 Which method is used to search for a substring? 3.0
3.
stringVariable.indexOf(subString)
4.
stringVariable.indexOf(charAt(0))
S.NO. Questions Choices Answers
1.
Waterfall Model
2.
Prototyping Model
1207 Which model can be selected if user is involved in all the phases of SDLC? 3.0
3.
RAD Model
4.
1.
design model
2.
implementation model
1208 3.0 2.0
3.
user model
4.
client model
1.
CDMA
2.
CSMA/CA
1209 Which multiple access technique is used by IEEE 802.11 standard for wireless LAN? 2.0
3.
ALOHA
4.
CSMA/CD
1210 Which of the below given sorting techniques has highest best-case runtime complexity? 1.bubble sort 2.insertion sort 3.quick sort 4.selection sort 4.0
1.const int a=90; 2.const int f1() { return 100; } 3.int f2() const { return
1211 Which of the following (in file scope) leads to a compile-time error? 3.0
200; } 4.const int f3( const int i) { return 300;}
1.
3.0
Develop overall project strategy
2.
1212 Which of the following activities is not one of the four things that need to be accomplished by the Identify the functionality to deliver in each software increment 3.0
generic planning task set? 3.
4.
Devise a means of tracking progress on a regular basis
1.
1 and 4
1,2 and 4
I and II
Which of the following are decidable?
2.
I. Whether the intersection of two regular languages is infinite
I and IV
II. Whether a given context-free language is regular
1217 2.0
3.
III. Whether two push-down automata accept the same language
II and III
IV. Whether a given grammar is context-free
4.
I and III
1.
enctype='multipart/form-data'
2.
enctype='singlepart/data'
1218 Which of the following attribute is needed for file upload via form? 1.0
3.
enctype='file'
4.
enctype='form-data/file'
1.
Column
2.
1966_Invoices
1219 Which of the following can be a valid column name? 3.0
3.
Catch_#22
4.
#Invoices
1.Validating a form 2.Sending a form's contents by email 3.Storing the
1220 Which of the following can't be done with client-side JavaScript? 3.0
form's contents to a database file on the server 4.Testing the form
1221 Which of the following case does not exist in complexity theory? 1.Average case 2.Worst case 3.Best case 4.Null case 4.0
1222 Which of the following command words need to be programmed to operate a single PIC in fully 1.ICW1 and ICW2 2.ICW1, ICW2 and ICW4 3.ICW2 and ICW3 2.0
nested mode with an 8086 microprocessor 4.ICW1 and ICW4
1.Statically typed language 2.Dynamically typed language 3.Both
1223 Which of the following correctly describes C++ language? 4.0
Statically and dynamically typed language 4.Type-less language
1.
2.
3.
1224 Which of the following describes a handle (as applicable to LR-parsing) appropriately? 4.0
It is a production that may be used for reduction in a future step along
with a position in the sentential form where the next shift or reduce
operation will occur
4.
It is the production p that will be used for reduction in the next step
along with a position in the sentential form where the right hand side of
the production may be found
1225 Which of the following explains cookies nature? 1.Non Volatile 2.Volatile 3.Intransient 4.Transient 4.0
1.
Contiguous allocation
2.
Linked allocation
1226 Which of the following file access method needs a relative block number 'n'? 3.0
3.
Direct access
4.
Sequential access
S.NO. Questions Choices Answers
1.
break()
2.
quit()
1227 Which of the following function is used to terminate the script execution in PHP? 3.0
3.
die()
4.
exit()
1228 Which of the following function sets first n characters of a string to a given character? 1.strset() 2.strnset() 3.strinit() 4.strcset() 2.0
1.
1 and 3 only
Which of the following grammar rules violate the requirements of an operator grammar ? P, Q, R are
2.
nonterminals, and r, s, t are terminals.
1 only
1229 1. P → Q R 1.0
2. P → Q s R
3.
3. P → ε
2 and 3 only
4. P → Q t R r
4.
1230 which of the following intermediate language can be used in intermediate code generation? 1.Postfix notation and Three address code 2.Quadraples 3.Triples 4.Infix 1.0
notation and two address code
1.
2.
Cause-Effect Graphs
4.
ALL
1.
2.
LIKE
1232 Which of the following is a comparison operator in SQL? 1.0
3.
BETWEEN
4.
1.
2.
Which of the following is a dynamic model that shows how the system interacts with its interaction model
1233 environment as it is used? 2.0
3.
environmental model
4.
2.
4.
1.
difficult to update
2.
data redundancy
4.
1.
PERT
2.
Which of the following is a project scheduling method that can be applied to software CPM
1236 development? 4.0
3.
CMM
4.
2.
4.
ALL
1.
Cache memory
2.
Secondary memory
Registers
4.
RAM
S.NO. Questions Choices Answers
1.
Join
2.
Semi-Join
1243 Which of the following is not a binary operator in relational algebra? 4.0
3.
Assignment
4.
Project
1.
Instruction cache
2.
Instruction register
1244 Which of the following is not a form of memory ? 3.0
3.
Instruction opcode
4.
Translation-a-side buffer
1.
atomicity
2.
consistency
1245 Which of the following is not a property of a transaction? 4.0
3.
dirty read
4.
durability
1.
evaluations to be performed
2.
4.
1247 Which of the following is not a valid attribute of the INPUT tag? 1.TEXT 2.NAME 3.SIZE 4.MAXLENGTH 4.0
1248 Which of the following is NOT a valid PHP comparison operator? 1.!= 2.>= 3.&&& 4.=== 3.0
1.
Communications components
2.
1249 Which of the following is not an example of infrastructure components that may need to be Database components 2.0
integrated into the software architecture?
3.
4.0
Interface components
4.
1250 Which of the following is not characteristics of a relational database model 1.Complex logical relationships 2.Treelike structure 3.Tables 4.Records 2.0
1.
Specification delays
2.
Product competition
1251 Which of the following is not considered as a risk in project management? 3.0
3.
Testing
4.
Staff turnover
S.NO. Questions Choices Answers
1.
Magnetic tape
2.
Printer
1252 Which of the following is not hardware: 4.0
3.
VDU terminal
4.
Assembler
1.
2.
4.
3.0
Remember that you produce others will consume
1.
2.
3.0
Create a visual layout that aids understanding
1254 Which of the following is not one of the principles of good coding? 3. 4.0
Keep variable names short so that code is compact
4.
1255 Which of the following is not possible using PHP? 1.Deleting files from the server 2.Redirect a visitor to another page 3.Set 4.0
the value of the window statusbar 4.Obtain the IP address of a Visitor
1.
File permissions
2.
Program Counter
1256 Which of the following is not the attribute of FCB? 4.0
3.
4.
Functional Cohesion
2.
Temporal Cohesion
1258 Which of the following is the best type of module cohesion? 3.0
3.
Functional Cohesion
4.
Sequential Cohesion
1.
Control Coupling
2.
Stamp Coupling
1259 Which of the following is the worst type of module coupling? 3.0
3.
External Coupling
4.
Content Coupling
S.NO. Questions Choices Answers
1.
2.
4.
1.
2.
4.
1.
2.
4.
1.
2.
4.
1264 Which of the following is useful in traversing a given graph by breadth first search? 1.List 2.Queue 3.Set 4.Stack 2.0
1.
2.
2.0
1265 Which of the following is valid reason for collecting customer feedback concerning delivered Delivery schedule can be revised to reflect changes 2.0
software? 3.
Create
2.
Drop
1266 Which of the following is/are the DDL statements? 3. 4.0
Alter
4.
L1 and L3 only
Which of the following languages are context-free?
3.
1267 L1 = {ambnanbm m, n ≥ 1} 2.0
L2 = {ambnambn m, n ≥ 1}
L3 only
L3 = {ambn m = 2n + 1}
4.
L1 only
1.
Segmentation
2.
swapping
4.
paging
1.
A binary relationship
2.
A ternary relationship
1269 Which of the following most certainly implies the need for an entire table to implement? 2.0
3.
A recursive relationship
4.
An identifying relationship
1270 Which of the following name does not relate to stacks? 1.FIFO lists 2.LIFO list 3.Push-down lists 4.Piles 1.0
1.
PROJECTION
2.
SELECTION
1271 Which of the following operation is used if we are interested in only certain columns of a table? 1.0
3.
UNION
4.
JOIN
1272 Which of the following operator can be overloaded through friend function? 1.-> 2.= 3.( ) 4.* 4.0
1273 Which of the following operators has an associativity from Right to Left? 1.+= 2.== 3.<< 4.<= 3.0
1.
architecture
2.
Which of the following pattern is the basis of interaction management in many web-based repository pattern
1274 systems? 3.0
3.
model-view-controller
4.
2.
4.
2.
3.
1276 Which of the following problems is undecidable? 1.0
Deciding if the language generated by a given context-free grammar is
empty
4.
1.
Change management
2.
Which of the following process is concerned with analyzing the costs and benefits of proposed Version management
1277 changes? 1.0
3.
System building
4.
Release management
1278 Which of the following property allows you to specify an element’s position with respect to the 1.relative 2.fixed 3.static 4.absolute 1.0
browser window?
1.
Product risk
2.
Project risk
1279 Which of the following risk is the failure of a purchased component to perform as expected? 3. 1.0
Business risk
4.
Programming risk
1.
People risks
2.
Which of the following risks are derived from the organizational environment where the software Technology risks
1280 is being developed? 4.0
3.
Estimation risks
4.
Organizational risks
1.
Managerial risks
2.
Which of the following risks are derived from the software or hardware technologies that are used Technology risks
1281 to develop the system? 2.0
3.
Estimation risks
4.
Organizational risks
I and II
Which of the following statements are TRUE?
2.
I. There exist parsing algorithms for some programming languages
whose complexities are less than O(n3). I and IV
1284 II. A programming language which allows recursion can be implemented 2.0
with static storage allocation. 3.
III. No L-attributed definition can be evaluated in The framework
of bottom-up parsing. III and IV
IV. Code improving transformations can be performed at both source
language and intermediate code level. 4.
I, II and III
1.In general, the counter can be reversed at any point in its counting
sequence. 2.The counter can be reversed, but must be reset before
1285 Which of the following statements best describes the operation of a synchronous up-/down- counting in the other direction. 3.The counter can count in either 1.0
counter? direction, but must continue in that direction once started. 4.The count
sequence cannot be reversed, once it has begun, without first resetting
the counter to zero.
1.
2.
It can be enhanced by using languages, OS’ and tools that are universally
available and standardized.
3.
1286 Which of the following statements explains portabililty in non-functional requirements? 1.0
The ability of the system to behave consistently in a user-acceptable
manner when operating within the environment for which the system
was intended.
4.
1.
2.
4.
1.Overloaded operator must have at least one operand of its class type.
1288 Which of the following statements is NOT valid about operator overloading? 2.Only existing operators can be overloaded. 3.The overloaded operators 3.0
follow the syntax rules of the original operator. 4.The arity of the
operator can be changed
1.Overloaded operator must have at least one operand of its class type.
1289 Which of the following statements is NOT valid about operator overloading? 2.Only existing operators can be overloaded. 3.The overloaded operators 4.0
follow the syntax rules of the original operator. 4.The arity of the
operator can be changed
1.An INPUT field of type password provides excellent security 2.An
INPUT field of type password provides a masked field but no real
1290 Which of the following statements is true? security 3.A maximum length can not be set for a password field 4.A 4.0
password INPUT field can only be included in a FORM that uses the get
METHOD
1.Quadraples have some disadvantages over triples notation for an
optimizing compiler 2.For optimizing compiler, moving a statement that
defines a temporary value requires us to change all references to that
1291 Which of the following statements is true? statements. It is an overhead for triples notation 3.For optimizing 2.0
compiler, triples notation has important benefit where statements are
often moved around as it incurs no movements or change 4.All the
statements are false
1292 Which of the following statements is/are TRUE for an undirected graph?P:Number of odd degree 1.P Only 2.Q Only 3.Both P and Q 4.Neither P nor Q 1.0
vertices is even,Q: Sum of degrees of all vertices is even
1293 Which of the following statements is/are TRUE for an undirected graph?P:Number of odd degree 1.P Only 2.Q Only 3.Both P and Q 4.Neither P nor Q 1.0
vertices is even,Q: Sum of degrees of all vertices is even
S.NO. Questions Choices Answers
1.
Avoidance strategies
2.
Minimization strategies
Which of the following strategies means that the impact of the risk will be reduced?
1294 3. 2.0
Contingency plans
4.
ALL
1.
socket
2.
bind
1295 Which of the following system calls results in the sending of SYN packets? 4.0
3.
listen
4.
connect
1.
Branching
2.
Merging
1296 Which of the following term is best defined by the statement “The creation of a new codeline from 1.0
a version in an existing codeline”? 3.
Codeline
4.
Mainline
1.
2.
Which of the following term is best defined by the statement: “Derive traceability information to Organizational restructuring
1297 maximize information hiding in the design.”? 3.0
3.
Requirements changes
4.
None
1.
Technology change
2.
Which of the following term is best defined by the statement: “The underlying technology on Product competition
1298 which the system is built is superseded by new technology.”? 1.0
3.
Requirements change
4.
None
1.
Staff turnover
2.
Which of the following term is best defined by the statement: “There will be a change of Technology change
1299 organizational management with different priorities.”? 3.0
3.
Management change
4.
Product competition
S.NO. Questions Choices Answers
1.
Competence
2.
Decision-making ability
1300 Which of the following traits need to exist among the members of an agile software team? 4.0
3.
4.0
Mutual trust and respect
4.
ALL
1301 Which of the following tree may have smaller elements in its left subtree and larger element in its 1.B+ Tree 2.AVL Tree 3.Binary tree 4.Binary search Tree 4.0
right subtree
1.p {color:red;text-align:center}; 2.p {color:red;text-align:center} 3.p
1302 Which of the following ways below is correct to write a CSS? 3.0
{color:red;text-align:center;} 4.p (color:red;text-align:center;)
1.
2.
4.
1.
I and II only
2.
Which of the regular expressions given below represent the following DFA? I and III only
1304 I) 0*1(1+00*1)* 3. 3.0
II) 0*1*1+11*0*1
III) (0+1)*1
II and III only
4.
I,II,III
1305 Which of these contains an executable statement? 1.// var a = 0; // var b = 0; 2./* var a = 0; // var b = 0; */ 3./* var a = 0; */ 3.0
var b = 0; 4.// var a = 0; /* var b = 0; */
1.
Adequacy
2.
Feasibility
1306 Which of these does not belong to the basic principles of good product design ? 3. 4.0
Portability
4.
Economy
1.
cost estimation
2.
1.0
1307 Which of these framework activities is not normally associated with the user interface design interface construction 3.0
processes? 3.
interface validation
4.
user and task analysis
S.NO. Questions Choices Answers
1.
2.
4.
1.
Behavioral elements
2.
Class-based elements
1309 Which of these is not an element of an object-oriented analysis model? 4.0
3.
Data elements
4.
Scenario-based elements
1.required, pattern, min and max 2.auto, fixed, number 3.number, text,
1310 Which of these sets of HTML5 attributes can be used for form validation? 1.0
currency 4.input, radio,checkbox
1311 Which one is not a self complementary code? 1.8 4 -2 -1 2.4 8 1 2 3.4 4 3 -2 4.2 4 2 1 3.0
1.Network Model
1312 Which one of the following is currently the most popular data model? 2.Object Model 3.Notation Model 4.0
4.Relational Model
1.
Linked allocation
2.
4.
Contiguous allocation
1.
RSA algorithm
2.
diffie-hellman algorithm
1314 Which one of the following algorithm is not used in asymmetric-key cryptography? 3.0
3.
4.
ECC
1.
HTTP
2.
FTP
1315 Which one of the following allows a user at one site to establish a connection to another site and 3.0
then pass keystrokes from local host to remote host? 3.
telnet
4.
collision detection
2.
4.
1.
2.
4.
1.
Availability
2.
Testability
1319 Which one of the following is a requirement that fits in a developer’s module ? 2.0
3.
Usability
4.
Flexibility
1.
2.
4.
1.
2.
3.
4.
2.
4.
1.
Elicitation
2.
Design a model
1323 Which one of the following is not a step of requirement engineering? 2.0
3.
Analysis
4.
Documentation
1.
FAT
2.
NTFS
1324 Which one of the following is not a windows file system? 4.0
3.
FAT32
4.
EXT
1.
2.
4.
1.
2.
1326 Which one of the following is not correct? application layer protocols implemented on the source and destination 3.0
host must match
3.
4.
1.
Killing a process
2.
4.
2.develop applications
1328 Which one of the following is not the responsibility of the DBA? 2.0
3.periodically tunes the database
Which one of the following is the recurrence equation for the worst case time complexity of the
1.T(n)=2T(n/2)+cn 2.T(n)=T(n–1)+T(0)+cn 3.T(n)=T(n/2)+cn
1329 Quicksort algorithm for sorting n>=2 numbers? In the recurrence equations given in the options 1.0
4.T(n)=2T(n–2)+cn
below, c is a constant.
1.Delete the previous session 2.Start a new session 3.Check whether a
1330 Which one of the following is the very first task executed by a session enabled page? 3.0
valid session exists 4.Handle the session
1.
Viable prefixes appear only at the bottom of the stack and not inside
2.
Viable prefixes appear only at the top of the stack and not inside
1331 Which one of the following is True at any valid state in shift-reduce parsing? 3.0
3.
4.
1.
10101010
2.
10101011
1332 Which one of the following is used as the start frame delimeter in ethernet frame? 2.0
3.
00000000
4.
11111111
1.
2.
4.
The set of all strings that begin and end with either 0 or 1.
1.
2.
Prototyping Model
1334 Which one of the following models is not suitable for accommodating any change? 3. 4.0
RAD model
4.
Waterfall Model
1.
2.
4.
2.
4.
1.
a and b
2.
b and c
1337 Which one of the following regular expressions over {0, 1} denotes the set of all strings not 14.0
containing 100 as a substring (a) 0*(11)*0* (b) (0*1010)* (c) 0*1*010 (d) 0*(10)*01* 3.
only c
4.
only b
1.
2.
3.
1338 Which one of the following statements if FALSE? 4.0
A prime attribute can be transitively dependent on a key in a 3 NF
relation.
4.
1339 Which one of the following uses 8B/6T encoding scheme 1.100 Base-T1 2.100 Base-T4 3.100 Base TX 4.100 Base-FX 2.0
1340 Which property is used to obtain browser vendor and version information? 1.modal 2.version 3.browser 4.navigator 4.0
1.
2.
4.
1.
2.
4.
Sum
2.
Count
1345 Which SQL functions is used to count the number of rows in a SQL query? 2.0
3.
Max
4.
ALL
1.
goto xyz
2.
int x = 20
1346 Which statement does not require semicolon? 3.0
3.
4.
do {... }while(count<=100)
1.Standard form must consists of minterms 2.All standard form are
1347 Which statement is true: canonical forms 3.Canonical form can consist of a term with a literal 1.0
missing 4.All canonical form are standard form
1.
coaxial cable
2.
optical fiber
4.
electrical cable
1.
form
2.
frame
1349 Which of these is a stand alone tag? 2.0
3.
table
4.
anchor
1350 While inserting the elements 71,65,84,69,67,83 in an empty binary search tree(BST)in the 1.65 2.67 3.83 4.69 2.0
sequence shown, the element in the lowest level is
1.
Time consuming
2.
4.
2.
4.
1.
simplex communication
2.
4.
1.
2.
4.
1.
2.
4.
1.
radio waves
2.
microwaves
1356 Wireless transmission can be done via 4.0
3.
infrared
4.
1.
Virtual memory
2.
Main memory
1357 Write Through technique is used in which memory for updating the data _____. 4.0
3.
Auxiliary memory
4.
Cache memory
1.getElementById() 2.getElementsByTagName()
1358 You can find the element you want to manipulate by ________ way? 4.0
3.getElementsByClassName() 4.All of the these
S.NO. Questions Choices Answers
1359 You have an array of n elements, Suppose you implement quicksort by always choosing the central 1.O(log n) 2.O(n) 3.O(n^2) 4.O(1) 3.0
element of the array as the pivot, Then the tightest upper bound for the worst case performance is
1360 You have to sort a list L consisting of a sorted list followed by a few “random” elements.Which of 1.Bubble sort 2.Selection sort 3.Quick sort 4.Insertion sort 4.0
the following sorting methods would be especially suitable for such a task?
1.
filesize
2.
size
1361 You need to check the size of a file in PHP function. $size = X(filename); Which function will 1.0
suitably replace 'X'? 3.
sizeofFile
4.
getSize
1.
Counters which indicate how long ago their associated pages have been
referenced.
2.
Registers which keep track of when the program was last accessed
1362 ‘Aging registers’ are _______. 1.0
3.
4.