Cse Test 2
Cse Test 2
com
BRANCH: COMPUTER SCIENCE 7. Multicasting delivers the content to
TIME: 1 hour ___________
MARKS: 100 a) a single client
O/S:- b) all clients, regardless whether they
1. RPC provides a (an) _____ on the client want the content or not
side, a separate one for each remote c) a group of receivers who indicate
procedure. they wish to receive the content
a) stub d) none of the mentioned
b) identifier 8. RTSP stands for ___________
c) name a) Real Time Streaming Policy
d) process identifier b) Real Time Streaming Protocol
2. What is stub? c) Real Time Systems Protocol
a) transmits the message to the server d) Read Time Streaming Policy
where the server side stub receives the 9. HTTP is __________
message and invokes procedure on the a) a stateful protocol
server side b) a stateless protocol
b) packs the parameters into a form c) a protocol that maintains the status of
transmittable over the network its connection with the client
c) locates the port on the server d) a stateless protocol that does not
d) all of the mentioned maintain the status of its connection
3. What is the full form of RMI? with the client
a) Remote Memory Installation 10. RTSP includes which of the following
b) Remote Memory Invocation states?
c) Remote Method Installation a) SETUP
d) Remote Method Invocation b) PLAY
4. . The three general methods for c) PAUSE
delivering content from a server to a d) All of the mentioned
client across a network are ___________ 11. Which of the following are forms of
a) unicasting malicious attack?
b) multicasting a) Theft of information
c) broadcasting b) Modification of data
d) all of the mentioned c) Wiping of information
5. Unicasting delivers the content to d) All of the mentioned
___________ 12. What are the common security threats?
a) a single client a) File Shredding
b) all clients, regardless whether they b) File sharing and permission
want the content or not c) File corrupting
c) a group of receivers who indicate d) File integrity
they wish to receive the content 13. From the following, which is not a
d) none of the mentioned common file permission?
6. Broadcasting delivers the content to a) Write
___________ b) Execute
a) a single client c) Stop
b) all clients, regardless whether they d) Read
want the content or not 14. Which of the following is a good
c) a group of receivers who indicate practice?
they wish to receive the content a) Give full permission for remote
d) none of the mentioned transferring
1st Floor, Balkishun Complex, Near Rajeev Nagar Over bridge, Patna-24, 9931160839, 9319327527
STUDY ENGINEERS [GATE | PSU | JE | SEMESTER] www.studyengineers.com
b) Grant read only permission b) Control line
c) Grant limited permission to specified c) Address line
account d) None of the mentioned
d) Give both read and write permission 21. The return address from the interrupt-
but not execute service routine is stored on the
___________
C.O.A:- a) System heap
15. In memory-mapped I/O ____________ b) Processor register
a) The I/O devices and the memory c) Processor stack
share the same address space d) Memory
b) The I/O devices have a separate 22. The signal sent to the device from the
address space processor to the device after receiving
c) The memory and I/O devices have an an interrupt is ___________
associated address space a) Interrupt-acknowledge
d) A part of the memory is specifically b) Return signal
set aside for the I/O operation c) Service signal
16. The usual BUS structure used to connect d) Permission signal
the I/O devices is ___________ 23. When the process is returned after an
a) Star BUS structure interrupt service ______ should be loaded
b) Multiple BUS structure again.
c) Single BUS structure i) Register contents
d) Node to Node BUS structure ii) Condition codes
17. In intel’s IA-32 architecture there is a iii) Stack contents
separate 16 bit address space for the iv) Return addresses
I/O devices. a) i, iv
a) False b) ii, iii and iv
b) True c) iii, iv
18. The advantage of I/O mapped devices to d) i, ii
memory mapped is ___________ 24. The time between the receiver of an
a) The former offers faster transfer of interrupt and its service is ______
data a) Interrupt delay
b) The devices connected using I/O b) Interrupt latency
mapping have a bigger buffer space c) Cycle time
c) The devices have to deal with fewer d) Switching time
address lines 25. Interrupts form an important part of
d) No advantage as such _____ systems.
19. The system is notified of a read or write a) Batch processing
operation by ___________ b) Multitasking
a) Appending an extra bit of the address c) Real-time processing
b) Enabling the read or write bits of the d) Multi-user
devices 26. A single Interrupt line can be used to
c) Raising an appropriate interrupt service n different devices.
signal a) True
d) Sending a special signal along the b) False
BUS 27. . The DMA differs from the interrupt
20. The interrupt-request line is a part of mode by __________
the ___________ a) The involvement of the processor for
a) Data line the operation
1st Floor, Balkishun Complex, Near Rajeev Nagar Over bridge, Patna-24, 9931160839, 9319327527
STUDY ENGINEERS [GATE | PSU | JE | SEMESTER] www.studyengineers.com
b) The method of accessing the I/O 34. In precedence of set operators, the
devices expression is evaluated from
c) The amount of data transfer possible a) Left to left
d) None of the mentioned b) Left to right
28. The DMA transfers are performed by a c) Right to left
control circuit called as __________ d) From user specification
a) Device interface 35. hich of the following is not outer join?
b) DMA controller a) Left outer join
c) Data controller b) Right outer join
d) Overlooker c) Full outer join
d) All of the mentioned
DATA BASE MANAGEMENT SYSTEM:- 36. Aggregate functions are functions that
29. Relational Algebra is a __________ query take a ___________ as input and return a
language that takes two relations as single value.
input and produces another relation as a) Collection of values
an output of the query. b) Single value
a) Relational c) Aggregate value
b) Structural d) Both Collection of values & Single
c) Procedural value
d) Fundamental 37. SELECT __________
30. Which of the following is a fundamental FROM instructor
operation in relational algebra? WHERE dept name= ’Comp. Sci.’;
a) Set intersection
b) Natural join Which of the following should be used
c) Assignment to find the mean of the salary ?
d) None of the mentioned a) Mean(salary)
31. Which of the following is used to denote b) Avg(salary)
the selection operation in relational c) Sum(salary)
algebra? d) Count(salary)
a) Pi (Greek) 38. The phrase “greater than at least one” is
b) Sigma (Greek) represented in SQL by _____
c) Lambda (Greek) a) < all
d) Omega (Greek) b) < some
32. For select operation the ________ appear c) > all
in the subscript and the ___________ d) > some
argument appears in the paranthesis
after the sigma. DATA STRUCTURE USING C:-
a) Predicates, relation
39. 1. What is a bit array?
b) Relation, Predicates
a) Data structure for representing
c) Operation, Predicates
arrays of records
d) Relation, Operation
b) Data structure that compactly stores
33. The ___________ operation, denoted by −,
bits
allows us to find tuples that are in one
c) An array in which most of the
relation but are not in another.
elements have the same value
a) Union
d) Array in which elements are not
b) Set-difference
present in continuous locations
c) Difference
d) Intersection
1st Floor, Balkishun Complex, Near Rajeev Nagar Over bridge, Patna-24, 9931160839, 9319327527
STUDY ENGINEERS [GATE | PSU | JE | SEMESTER] www.studyengineers.com
40. Which of the following bitwise a) Finding the number of 1 bit in a bit
operations will you use to set a array
particular bit to 1? b) Finding the number of 0 bit in a bit
a) OR array
b) AND c) Finding the sum of bits in a bit array
c) XOR d) Finding the average number of 1’s
d) NOR and 0’s in bit arrays
41. Which of the following bitwise 47. Which one of the following operations
operations will you use to set a returns the first occurrence of bit 1 in
particular bit to 0? bit arrays?
a) OR a) Find First Zero
b) AND b) Find First One
c) XOR c) Counting lead Zeroes
d) NAND d) Counting lead One
42. Which of the following bitwise 48. Which of these operators have the
operations will you use to toggle a highest order of precedence?
particular bit? a) ‘(‘ and ‘)’
a) OR b) ‘*’ and ‘/’
b) AND c) ‘~’ and ‘^’
c) XOR d) ‘+’ and ‘-‘
d) NOT
43. Which of the following is not an C LANGUAGE:-
advantage of bit array? 49. What will be the output of the following
a) Exploit bit level parallelism C code?
b) Maximal use of data cache
c) Can be stored and manipulated in the 1. #include <stdio.h>
register set for long periods of time 2. int main()
d) Accessing Individual Elements is easy 3. {
44. Which of the following is not a 4. enum {ORANGE = 5, MANGO, BAN
disadvantage of bit array? ANA = 4, PEACH};
a) Without compression, they might 5. printf("PEACH = %d\n", PEACH);
become sparse 6. }
b) Accessing individual bits is expensive a) PEACH = 3
c) Compressing bit array to byte/word b) PEACH = 4
array, the machine also has to support c) PEACH = 5
byte/word addressing d) PEACH = 6
d) Storing and Manipulating in the 50. What will be the output of the following
register set for long periods of time C code?
45. Which of the following is/are not
applications of bit arrays? 1. #include <stdio.h>
a) Used by the Linux kernel 2. int main()
b) For the allocation of memory pages 3. {
c) Bloom filter 4. printf("C programming %s", "Clas
d) Implementation of Vectors and s by\n%s Sanfoundry", "WOW");
Matrices 5. }
46. . What does Hamming a)
weight/population count mean in Bit C programming Class by
arrays?
1st Floor, Balkishun Complex, Near Rajeev Nagar Over bridge, Patna-24, 9931160839, 9319327527
STUDY ENGINEERS [GATE | PSU | JE | SEMESTER] www.studyengineers.com
WOW Sanfoundry 54. What will be the output of the following
C code?
b) C programming Class by\n%s 1. #include <stdio.h>
Sanfoundry 2. #include <string.h>
c) 3. int main()
C programming Class by 4. {
5. char *str = "x";
6. char c = 'x';
%s Sanfoundry
7. char ary[1];
8. ary[0] = c;
d) Compilation error
9. printf("%d %d", strlen(str), strlen
51. In the following code snippet, character (ary));
pointer str holds a reference to the 10. return 0;
string ___________ 11. }
a) 1 1
char *str = "Sanfoundry.com\0" "trainin
b) 2 1
g classes";
c) 2 2
a) Sanfoundry.com d) 1 (undefined value)
b) Sanfoundry.com\0training classes
55. What will be the output of the following
c) Sanfoundry.comtraining classes
C code?
d) Invalid declaration
1. #include <stdio.h>
52. What will be the output of the following
2. int main()
C code?
3. {
1. #include <stdio.h> 4. j = 10;
2. #define a 10 5. printf("%d\n", j++);
3. int main() 6. return 0;
4. { 7. }
5. const int a = 5; a) 10
6. printf("a = %d\n", a); b) 11
7. } c) Compile time error
a=5 d) 0
b) a = 10
56. Will the following C code compile
c) Compilation error
without any error?
d) Runtime error
1. #include <stdio.h>
53. What will be the output of the following
2. int main()
C code?
3. {
#include <stdio.h> 4. int k;
int main() 5. {
{ 6. int k;
int var = 010; 7. for (k = 0; k < 10; k++);
printf("%d", var); 8. }
} 9. }
a) 2 a) Yes
b) 8 b) No
c) 9 c) Depends on the compiler
d) 10
1st Floor, Balkishun Complex, Near Rajeev Nagar Over bridge, Patna-24, 9931160839, 9319327527
STUDY ENGINEERS [GATE | PSU | JE | SEMESTER] www.studyengineers.com
d) Depends on the C standard c) 0
implemented by compilers d) Varies
57. Which of the following declaration is not 61. What will be the output of the following
supported by C? C code?
a) String str;
1. #include <stdio.h>
b) char *str;
2. void main()
c) float str = 3e2;
3. {
d) Both String str; & float str = 3e2;
4. int x = 1, z = 3;
58. What will be the output of the following 5. int y = x << 3;
C code? 6. printf(" %d\n", y);
7. }
1. #include <stdio.h>
a) -2147483648
2. int main()
b) -1
3. {
c) Run time error
4. int i = -3;
d) 8
5. int k = i % 2;
6. printf("%d\n", k); 62. What will be the final value of j in the
7. } following C code?
a) Compile time error
1. #include <stdio.h>
b) -1
2. int main()
c) 1
3. {
d) Implementation defined
4. int i = 0, j = 0;
59. What will be the output of the following 5. if (i && (j = i + 10))
C code? 6. //do something
7. ;
1. #include <stdio.h>
8. }
2. void main()
a) 0
3. {
b) 10
4. int x = 1, y = 0, z = 5;
c) Depends on the compiler
5. int a = x && y || z++;
d) Depends on language standard
6. printf("%d", z);
7. } 63. What will be the output of the following
a) 6 C code?
b) 5
1. #include <stdio.h>
c) 0
2. int main()
d) Varies
3. {
60. What will be the output of the following 4. int i = 1;
C code? 5. if (i++ && (i == 1))
6. printf("Yes\n");
1. #include <stdio.h>
7. else
2. void main()
8. printf("No\n");
3. {
9. }
4. int x = 1, y = 0, z = 5;
a) Yes
5. int a = x && y && z++;
b) No
6. printf("%d", z);
c) Depends on the compiler
7. }
d) Depends on the standard
a) 6
b) 5 DE:-
1st Floor, Balkishun Complex, Near Rajeev Nagar Over bridge, Patna-24, 9931160839, 9319327527
STUDY ENGINEERS [GATE | PSU | JE | SEMESTER] www.studyengineers.com
64. The expression for Absorption law is b) AB + AB’ + A’B
given by _________ c) BA + BA’ + A’B’
a) A + AB = A d) AB’ + A’B + A’B’
b) A + AB = B
72. Maxterm is the sum of __________ of the
c) AB + AA’ = A
corresponding Minterm with its literal
d) A + B = B + A
complemented.
65. According to boolean law: A + 1 = ? a) Terms
a) 1 b) Words
b) A c) Numbers
c) 0 d) Nibble
d) A’
73. There are _____________ Minterms for 3
66. DeMorgan’s theorem states that _________ variables (a, b, c).
a) (AB)’ = A’ + B’ a) 0
b) (A + B)’ = A’ * B b) 2
c) A’ + B’ = A’B’ c) 8
d) (AB)’ = A’ + B d) 1
67. Complement of the expression A’B + CD’ C++:-
is _________
74. What happens if the following program
a) (A’ + B)(C’ + D)
is executed in C and C++?
b) (A + B’)(C’ + D)
c) (A’ + B)(C’ + D) #include<stdio.h>
d) (A + B’)(C + D’) int main()
{
68. The boolean function A + BC is a
foo();
reduced form of ____________
}
a) AB + BC
int foo()
b) (A + B)(A + C)
{
c) A’B + AB’C
printf("Hello");
d) (A + C)B
return 0;
69. The logical sum of two or more logical }
product terms is called __________
a) Error in both C and C++
a) SOP
b) Warning in both C and C++
b) POS
c) Error in C++ but Warning in C
c) OR operation
d) Error in C but Warning in C++
d) NAND operation
75. What happens if the following program
70. A product term containing all K
is executed in C and C++?
variables of the function in either
complemented or uncomplemented #include <stdio.h>
form is called a __________ int main(void)
a) Minterm {
b) Maxterm int new = 5;
c) Midterm printf("%d", new);
d) ∑ term }
71. The canonical sum of product form of a) Error in both C and C++
the function y(A,B) = A + B is __________ b) A successful run in both C and C++
a) AB + BB + A’A c) Error in C and successful execution in
1st Floor, Balkishun Complex, Near Rajeev Nagar Over bridge, Patna-24, 9931160839, 9319327527
STUDY ENGINEERS [GATE | PSU | JE | SEMESTER] www.studyengineers.com
C++ _____________
d) Error in C++ and successful execution a) Internet
in C b) Botnet
c) Telnet
76. What happens if the following program
d) D-net
is executed in C and C++?
80. Which of the following is a form of DoS
#include <stdio.h> attack?
void main() a) Vulnerability attack
{ b) Bandwidth flooding
printf("Hello World"); c) Connection flooding
} d) All of the mentioned
81. The DoS attack, in which the attacker
a) Error in both C and C++
establishes a large number of half-open
b) Successful run in both C and C++
or fully open TCP connections at the
c) Error in C and successful execution in
target host is ________
C++
a) Vulnerability attack
d) Error in C++ and successful execution
b) Bandwidth flooding
in C
c) Connection flooding
77. What happens if the following program d) UDP flooding
is executed in C and C++? 82. The DoS attack, in which the attacker
sends deluge of packets to the targeted
#include <stdio.h>
void func() host is ________
a) Vulnerability attack
{
printf("Hello"); b) Bandwidth flooding
c) Connection flooding
}
void main() d) UDP flooding
{ 83. 5. Packet sniffers involve ____________
func(); a) Active receiver
b) Passive receiver
func(2);
} c) Legal receiver
d) Partially-active receiver
a) Error in both C and C++
84. Sniffers can be prevented by using
b) Outputs Hello twice in both C and
C++ _______________
a) Wired environment
c) Error in C and Outputs Hello twice in
C++ b) WiFi
c) Ethernet LAN
d) Error in C++ and Outputs Hello twice
in C d) Switched network
78. Which of the following feature is not 85. Firewalls are often configured to block
___________
provided by C?
a) Pointers a) UDP traffic
b) TCP traffic
b) Structures
c) References c) Sensitive traffic
d) Best-effort traffic
d) Functions
86. In a network, If P is the only packet
IWT:-
being transmitted and there was no
79. The attacker using a network of earlier transmission, which of the
compromised devices is known as following delays could be zero?
1st Floor, Balkishun Complex, Near Rajeev Nagar Over bridge, Patna-24, 9931160839, 9319327527
STUDY ENGINEERS [GATE | PSU | JE | SEMESTER] www.studyengineers.com
a) Propagation delay 93. Home Access is provided by __________
b) Queuing delay a) DSL
c) Transmission delay b) FTTP
d) Processing delay c) Cable
d) All of the mentioned
87. . The application layer protocol used by
a Telnet application is ________ 94. Which of the following factors affect
a) Telnet transmission rate in DSL?
b) FTP a) The gauge of the twisted-pair line
c) HTTP b) Degree of electrical interfernece
d) SMTP c) Shadow fading
d) The gauge of the twisted-pair line and
88. _______ allows you to connect and login
degree of electrical interference
to a remote computer
a) Telnet 95. The number of layers in ISO OSI
b) FTP reference model is __________
c) HTTP a) 5
d) SMTP b) 7
Which of the following statements can
DCN:-
be associated with OSI model?
89. Which of this is not a constituent of a) A structured way to discuss and
residential telephone line? easier update system components
a) A high-speed downstream channel b) One layer may duplicate lower layer
b) A medium-speed downstream functionality
channel c) Functionality at one layer no way
c) A low-speed downstream channel requires information from another layer
d) An ultra-high speed downstream d) It is an application specific network
channel modeld) 10
90. DSL telcos provide which of the 96. Application layer is implemented in
following services? ____________
a) Wired phone access a) End system
b) ISP b) NIC
c) Wired phone access and ISP c) Ethernet
d) Network routing and ISP d) Packet transport
91. HFC contains _______ 97. Transport layer is implemented in
a) Fibre cable ______________
b) Coaxial cable a) End system
c) A combination of Fibre cable and b) NIC
Coaxial cable c) Ethernet
d) Twisted Pair Cable d) Signal transmission
92. Among the optical-distribution 98. In OSI model, when data is sent from
architectures that are essentially device A to device B, the 5th layer to
switched ethernet is __________ receive data at B is _________
a) AON a) Application layer
b) PON b) Transport layer
c) NON c) Link layer
d) MON d) Session layer
1st Floor, Balkishun Complex, Near Rajeev Nagar Over bridge, Patna-24, 9931160839, 9319327527
STUDY ENGINEERS [GATE | PSU | JE | SEMESTER] www.studyengineers.com
99. In the OSI model, as a data packet moves
from the lower to the upper layers,
headers are _______
a) Added
b) Removed
c) Rearranged
d) Randomized
100. Which of the following
statements can be associated with OSI
model?
a) A structured way to discuss and
easier update system components
b) One layer may duplicate lower layer
functionality
c) Functionality at one layer no way
requires information from another layer
d) It is an application specific network
model
1st Floor, Balkishun Complex, Near Rajeev Nagar Over bridge, Patna-24, 9931160839, 9319327527