Compre QB
Compre QB
1 The special memory used to store the micro routines of a computer is ________. 1.
Control table
2.
Control store
2
3.
Control mart
4. Control shop
2 How many transistors does the 8086 have 1.29,000 2.10,000 3.129,000 4.110,000 1
3 Which of the following is a valid destructor of the class name "Country" 1. void ~Country()
2. int ~Country(Country obj)
4
3. int ~Country()
4. Country()
4 Which one of the following is not a step of requirement engineering? 1.
Elicitation
2.
Design a model
2
3.
Analysis
4.
Documentation
5 What are the minimum number of 2-to-1 multiplexers required to generate a 2- input 1.
AND gate and a 2-input Ex-OR gate? 1 and 2
2.
1 and 3
1
3.
1 and 1
4. 2 and 2
6 Magnitude comparator compares using operation of 1.
addition
2.
subtraction xnor1 x
3.
multiplication
4.
division
7 A 2 bit binary multiplier can be implemented using 1.
2 input ANDs only
2.
2 input X-ORs and 4-input AND gates only 2
2.
interrupt of higher priority
2
3.
both the interrupts
4.
none of the mentioned
11 What is an Accumulator? 1. A Flip flop
2. A counter
3
3. A Sequential Logic Circuit
4. A Combinational Logic Circuit
12 The correspondence between the main memory blocks and those in the cache is given by 1.
Hash function
2.
Mapping function
2
3.
Locale function
4.
Assign function
13 How many different states does a 3-bit asynchronous counter have? 1.2 2.4 3.8 4.16 3
14 Popular application of flip-flop are. 1.Shift registers 2.Transfer register 3.Counters 4.All of these 4
15 What type of register would shift a complete binary number in one bit at a time and shift 1.PIPO 2.PISO 3.SIPO 4.SISO
4
all the stored bits out one bit at a time?
16 A certain 5-bit self-complementary code is used to represent the 10 decimal digits 0 1.00110 00100 00010 2.00011 00111 00101 3.11001 11101 11011 4.11101 11011
through 9. 11001
4
Given that (246) in decimal is represented as 00010 00100 00110 in this code, what is the
representation for (375)?
17 How many flip-flops are required to make a MOD-32 binary counter? 1.3 2.4 3.5 4.6 3
18 To operate correctly, starting a ring counter requires 1.presetting all the flip-flops 2.clearing one flip-flop and presetting all the others 3.
1
presetting one flip-flop and clearing all the others 4.clearing all the flip-flops
19 Which one is not a self complementary code? 1.8 4 -2 -1
2.4 8 1 2
3
3.4 4 3 -2
4.2 4 2 1
20 An SR flip flop cannot accept the following input entry 1.
Both input zero
2.
zero at R and one at S
4
3.
zero at S and one at R
4.
Both inputs one
21 The advantage of DBMS over file systems is 1.
The advantage of
redundancy
2.
data dependence
DBMS over file
1
3.
multiple user
systems is 4.
single user
22 How many stages are there in process improvement? 1. three
2. four
4
3. five
4. six
23 Given the language L = {ab, aa, baa}, which of the following strings are in L*? 1.
1) abaabaaabaa 1, 2 and 3
2) aaaabaaaa
3) baaaaabaaaab 2.
4) baaaaabaa 2, 3 and 4
3
3.
1, 2 and 4
4.
1, 3 and 4
24 The decimal equivalent of hexadecimal number of ‘A580’ is 1.43286 2.42368 3.43288 4.48632 2
25 Using 10's complement 72532- 3250 is 1.
69282
2.
69272
1
3.
69252
4.
69232
26 X=1010100 and Y=1000011 using 1's complement Y-X is 1.
-10111
2.
-10011
3
3.
-10001
4.
-11001
27 cc 1.MUX 2.PLA 3.ROM 4.DeMUX 4
28 A comparison between ring and Johnson counters indicates that: 1.A ring counter has fewer flip-flops but requires more decoding circuitry 2.A ring
counter has an inverted feedback path 3.A Johnson counter has more flip-flops but 4
less decoding circuitry 4.A Johnson counter has an inverted feedback path
29 One application of a digital multiplexer is to facilitate: 1.data generation 2.serial-to-parallel conversion 3.data selector 4.parity checking 1
30 Flip-flop excitation tables shows that 1.For the given PS and NS what will be the inputs 2.For the given PS and NS what
will be the outputs 3.For the given PS and NS what will be the type of flip-flops 4. 4
For the given PS and NS what will be the values of NS and PS respectively
31 How is a J-K flip-flop made to toggle? 1.J = 0, K = 0 2.J = 0, K = 1 3.J = 1, K = 0 4.J = 1, K = 1 4
32 The combination of Sixteen adjacent squares in four variable K-map represent the 1.Four literal 2.One literal 3.Unity 4.Zero
3
function equal to
33 K-map follow following code for marking adjacent variables 1.84-2-1
2
2.Gray Code 3.2421 4.8421
34 The regular expression 0*(10*)* denotes the same set as 1.
(1*0)*1*
2.
0 + (0 + 10)*
1
3.
(0 + 1)* 10(0 + 1)*
4.
(0+1)*
35 The total number of pins for the IC 8255 is 1.
28
2.
40
2
3.
30
4.
20
36 The IC 8237 is a 1.
DMA Controller
2.
Interrupt Controller
1
3.
Keyboard controller
4.
Serial Interface Controller
37 IC 8237 has ------------------many pins 1.
40
2.
28
1
3.
24
4.
20
38 IC 8257 has --------------------many channels for data transfer 1.
1
2.
2
4
3.
3
4.
4
39 The MC 1488 is 1.
TTL to RS 232C Level converter
2.
RS-232 to TTL level converter
The MC 1488 is
1
3.
Bidirectional Level converter
4.
Unidirectional level converter
40 The IC Number for USART is -------------------------- 1.
IC 8251A
2.
IC8259
1
3.
IC5255
4.
IC 8254
41 The IC 8251 A has ---------------------many pins 1.
24
2.
28
3
3.
40
4.
30
42 What is the software that runs a computer, including scheduling tasks, managing storage, 1.
and handling communication with peripherals? driver
2.
application suitex
3
3.
operating system
4.
bluetooth technology
43 ------ is the minimal super key 1.
Partial Key
2.
Candidate Key
2
3.
Surrogate Key
4.
Unique Key
44 ODBC stands for 1.
Object Database Connectivity.
2.
Oral Database Connectivity.
4
3.
Oracle Database Connectivity.
4.
Open Database Connectivity.
45 How many bits are required to store one BCD digit? 1.1 2.2 3.3 4.4 4
46 STACK is also known as 1.LIFO 2.FILO 3.FIFO 4.LILO 1
47 WHICH NUMBER SYSTEM HAS A BASE OF 16 1.DECIMAL 2.OCTAL 3.HEXADECIMAL 4.BINARY 3
48 WHICH NUMBER SYSTEM HAS A BASE OF 2 1.BINARY 2.OCTAL 3.DECIMAL 4.HEXADECIMAL 1
49 which of these sets of logic gates are designated as universal gates 1.XOR , XNOR 2.NOR , NAND 3.AND,OR 4.NOT,AND 2
50 If a hexadecimal number needs to convert to binary, for each hexadecimal digit there will 1.1 2.2 3.4 4.8
3
be how many bits
51 1 Kilo bits is equal to 1.1000 bits 2.1024 bits 3.1012 bits 4.1008 bits 1
52 in digital system 1 byte is equal to ---------------bits 1.8 2.4 3.2 4.1 1
53 In boolean algebra A+A is ------------------- 1.A 2.2A 3.3A 4.4A 1
54 Octal number system has a base of 1.2 2.4 3.8 4.16 3
55 Multiplexer is a device which has 1.many input and one output 2.one input and many output 3.7 input 3 output 4.3 input
1
and 7 output
56 Demultiplexer is a device which has 1.3 input 4 output 2.4 input 3 output 3.one input and many outputs 4.7 input and 4
3
output
57 what is the Boolean expression for 2 input AND Gate 1.A+B 2.A.B 3.A-B 4.A/B 2
58 What is the Boolean expression for three input OR Gate 1.A+B+C 2.A+B-C 3.A-B-C 4.A.B.C 1
59 One's complement of 11001010 is 1.00001111 2.11110000 3.10101010 4.00110101 4
60 Convert the binary number (1111000011110000) to hexadecimal number 1.1010 2.F0F0 3.0F0F 4.5050 2
61 When will be the output of AND gate is high if there are three inputs A,B and C? 1.A=1, B=1,C=1 2.A=1,B=1,C=0 3.A=0,B=0,C=0 4.A=0,B=1,C=1 1
62 In Boolean algebra A+A’ is --------------- 1.A 2.0 3.B 4.1 1
63 In Boolean algebra AA’ is ------------------ 1.0 2.1 3.2 4.3 1
64 The decimal number (15) in binary is equal to ----------------- 1.1010 2.0101 3.1111 4.0001 3
65 What is the best case for linear search 1.O(n) 2.O(1) 3.O(log n) 4.O(2n) 2
66 What is the time complexity for insertion sort 1.O(log n) 2.O(n) 3.O(n^2) 4.O(1) 3
67 How do you check queue is full in array implementation 1.if(rear==size) 2.if(front==size) 3.if(rear==-1) 4.if(front==-1) 1
68 Let G be a graph with n vertices and m edges, What is the tightest upper bound on the 1.O(n) 2.O(m+n) 3.O(mn) 4.O(n^2)
running time on Depth First Search of G? Assume that the graph is represented using 4
adjacency matrix
69 In an E-R diagram attributes are represented by 1.
rectangle
2.
square
3
3.
ellipse
4.
triangle
70 A B-tree of order m has maximum of _____________ children 1.
m
2.
m+1
1
3.
m-1
4.
m/2
71 A linear collection of data elements where the linear node is given by means of pointer is 1.primitive list 2.node list 3.linked list 4.array
3
called
72 Which amongst the following refers to Absolute addressing mode 1.
move R1, R2
4.
I's complement
96 The binary value for 0.4375 is 1.
0.1111
2.
0.0111
2
3.
0.0011
4. 0.1010
97 In computers, subtraction is generally carried out by ______. 1.
9’s complement
2. 2’s complement
3. 2
10’s complement
4.
1’s complement
98 Floating point representation is used to store ______. 1.
Boolean values
2.
2
real integers
3. integers
4.
whole numbers
99 Ethernet in metropolitan area network (MAN) can be used as 1.
pure ethernet
2.
ethernet over SDH
4
3.
ethernet over MPLS
4.
combination of all of the above mentioned
100 A point-to-point protocol over ethernet is a network protocol for 1.
encapsulating PPP frames inside ethernet frames
2.
encapsulating ethernet frames inside PPP frames
1
3.
for security of ethernet frames
4.
for security of PPP frames
101 A set of possible data values is called 1.
attribute
2.
degree
4
3.
domain
4.
tuple
102 -24 is 2’s complement form is 1.
11101000
2.
01111111
1
3.
01001000
4. 00111111
103 Zero address instruction format is used for 1.
Von-Neuman architecture
2.
RISC architecture
4
3.
CISC architecture
4. Stack-organized architecture
104 Which of the following is correct for a gated D flip-flop? 1.
The output toggles if one of the inputs is held HIGH.
2.
Only one of the inputs can be HIGH at a time.
4
Which of the following is correct for a gated D
flip-flop? 3.
The output complement follows the input when enabled.
2.
R S type flip-flop
3
3.
J K flip-flop
4.
T flip-flop
108 What is an ALU? 1. A Combinational Logic Circuit
2. A Sequential Logic Circuit
2
3. A Combination of Combinational Circuit and Sequential Circuit
4. A flip flop
109 LOCK prefix is used most often 1.during normal execution. 2.during DMA accesses 3.during interrupt servicing. 4.
3
during memory accesses
110 Duality principle is used when SE is 1.square 2.symmetric 3.asymmetricd 4.translated 2
111 Decimal number 9 in Gray code is 1. 1111
2.
1101
3. 2
1100
4.
1110
112 Virtual memory is __________ 1. A type of memory used in super computers
2. An illusion of extremely large main memory
2
3. An extremely large main memory
4. An extremely large secondary memory
113 How many possible outputs would a decoder have with a 6-bit binary input? 1. 16
2. 64
2
3. 128
4. 32
114 What is the condition for setting the Overflow flag in status register? 1. Last two sum bits are different
2. Last two carrys are same
3
3. Last two sum bits are same
4. Last two carrys are different
115 When an instruction is read from the memory, it is called 1.
Memory Read cycle
2.
Fetch cycle
3
3.
Instruction cycle
4.
Memory write cycle
116 If a register containing binary data (11001100) is subjected to arithmetic shift left 1. (10011000)
operation, then the content of the register after 'ashl' shall be 2.
(11001100)
3. 1
(1101100)
4.
(10011001)
117 A Stack-organised Computer uses instruction of 1.
Zero addressing
2.
Two-addressing
1
3.
Indirect addressing
4. Index addressing
118 Content of the program counter is added to the address part of the instruction in order to 1.
obtain the effective address is called. index addressing mode.
2.
register mode. 4
3. implied mode.
4.
relative address mode.
119 A _________ registrar stores the intermediate arithmetic and logic results in it. 1.
Address registrar
2. Program counter
3. 4
Index registrar
A _________ registrar stores the intermediate
arithmetic and logic results in it.
4.
Accumulator
120 The processor 80386/80486 and the Pentium processor uses _____ bits address bus: 1.
36
2.
32
2
3.
16
4. 64
121 The number of full and half-adders required to add 16-bit numbers is 1.
8 half-adders, 8 full-adders
2.
1 half-adders, 15 full-adders
2
3.
16 half-adders, 0 full-adders
4. 4 half-adders, 12 full-adders
122 Two automata are equal when 1.
2.
4.
2.
191.168.1.1/16
2
3.
191.168.1.1/8
4.
191.168.1.1/4
156 WE RECEIVED “404 – PAGE NOT FOUND” MESSAGE, WHEN WE BROWSE THE 1.
WEB PAGE. WHICH PROTOCOL PROVIDES THIS MESSAGE? IGP
2. EGP
3. 4
SNMP
4.
ICMP
157 class n{ int a=0;}obj; what will happen? 1. nothing
2. initializes the data member with 0
3
3. error
4. initializes the object with 0
158 Identify the invalid statement from the following 1. for (; ; )
2. if (1)
3
3. break(0)
4. while(false)
159 A variable P is called pointer if 1.P contains the address of an element in DATA 2.P contain the DATA and the
address of DATA 3.P can store only memory addresses 4.P points to the address of 1
first element in DATA
160 SELECT THE HIGHEST PRIORITY OPERATOR 1.&& 2., 3.?: 4.++ 4
161 Which of the following function sets first n characters of a string to a given character? 1.strset() 2.strnset() 3.strinit() 4.strcset() 2
162 The library function used to find the last occurrence of a character in a string is 1.strnstr() 2.laststr() 3.strrchr() 4.strstr() 3
163 Which one of the following is a requirement that fits in a developer’s module ? 1.
Availability
2.
Testability
2
3.
Usability
4.
Flexibility
164 Consider the following function 1.1.723 2.1.732 3.0.732 4.1.733
double f(double x)
{
if (abs(x*x - 3) < 0.01) return x; 2
else return f(x/2 + 1.5/x);
}
Give a value q (to 2 decimals) such that f(q) will return q:_____.
165 Which header file should be included to use functions like malloc() and calloc()? 1.string.h 2.dos.h 3.memory.h 4.stdlib.h 4
166 Consider the following C declaration 1.10 bytes 2.18 bytes 3.22 bytes 4.14 bytes
struct {
short s [5]
union {
float y;
long z; 2
18
}u;
} t;
Assume that objects of the type short, float and long occupy 2 bytes, 4 bytes and 8 bytes,
respectively. The memory requirement for variable t, ignoring alignment
considerations, is
167 If a class C is derived from class B, which is derived from class A, all through public 1.protected and public data only in C and B 2.protected and public data only in C. 3.
4
inheritance, then a class C member function can access private data in A and B. 4.protected data in A and B.
168 class n{ int a;}; how much memory the compiler allocates for this class 1.0 2.2 3.depends on compiler 4.4 4
169 The two statements that can be used to change the flow of control are 1.switch and do-while 2.if and while 3.if and switch 4.break and continue 3
170 If p and q are assigned the values 2 and 3 respectively then the statement P = q++ 1.assigns a value 5 to p 2.assigns a value 3 to p 3.gives an error message 4.assigns a
2
value 4 to p
171 Creating additional function similar to template function is called 1.implicit specialization 2.explicit specialization 3.abstraction 4.template overriding 4
172 A parameterized constructor with all arguments initialized is same as 1.default constructor 2.parameterized constructor 3.overriding 4.overloading 1
173 Compile time polymorphism is 1.function overloading 2.template 3.function overriding 4.abstraction 1
174 Which of the following correctly describes C++ language? 1.Statically typed language 2.Dynamically typed language 3.Both Statically and
4
dynamically typed language 4.Type-less language
175 Routine is not loaded until it is called. All routines are kept on disk in a relocatable load 1.Static loading 2.Dynamic loading 3.Dynamic linking 4.Overlays
format. The main program is loaded into memory & is executed. This type of loading is 3
called _________
176 A static data member is given a value 1.Within the class definition 2.Outside the class definition 3.When the program is
2
exeuted 4.Never
177 which of the following is an incorrect definition inside a class ? 1.void * operator new(size_t size) { } 2.void * operator new () { } 3.void operator
4
delete(void * ptr) { } 4.int operator ++() { }
178 The stream insertion operator should be overloaded as 1.friend functions 2.member function 3.non member functions 4.static functions 4
179 Data Members of the base class that are marked private: 1.does exist in memory when the object of the derived class is created 2.exist in
memory when the object of the derived class is created
1
the derived class 3.are visible in the derived class 4.are directly accessible in the
derived class
180 The call to the parameterized constructor of base class in the derived class 1.ppears inside the definition of the derived class constructor 2.appears in the
member initialization list of the derived class constructor 3.appears inside the
1
definition of the derived class 4.appears at the statement where the derived class
object is created
181 Which of the following statements is NOT valid about operator overloading? 1.Overloaded operator must have at least one operand of its class type. 2.Only
existing operators can be overloaded. 3.The overloaded operators follow the syntax 4
rules of the original operator. 4.The arity of the operator can be changed
182 Which of the following statements are true in c++? 1.Class members are public by default. 2.Structures can not have functions as
Which of the following statements are true in c+ members. 3.Classes can not have data as public members. 4.Structures can have 1
+? functions
183 Which of these is incorrect ? 1.
Software engineering belongs to Computer science
2.
Software engineering is a part of more general form of System Engineering
3. 3
Computer science belongs to Software engineering
4.
Software engineering is concerned with the practicalities of developing and
delivering useful software
184 The Incremental Model is a result of combination of elements of which two models? 1.
Build & FIX Model & Waterfall Model
2.
Linear Model & RAD Model
3
3.
Linear Model & Prototyping Model
4.
Waterfall Model & RAD Model
185 Which one of the following models is not suitable for accommodating any change? 1.
Build & Fix Model
2.
Prototyping Model
4
3.
RAD model
4.
Waterfall Model
186 Which model can be selected if user is involved in all the phases of SDLC? 1.
Waterfall Model
2.
Prototyping Model
3
3.
RAD Model
4.
Prototyping Model and RAD model
187 Which is one of the most important stakeholder from the following ? 1.
Entry level personnel
2.
Middle level stakeholder
4
3.
Managers
4.
Users of the software
188 Which of these does not belong to the basic principles of good product design ? 1.
Adequacy
2.
Feasibility
4
3.
Portability
4.
Economy
189 The project planner examines the statement of scope and extracts all important software 1.
functions which is known as Association
2.
Decomposition
3
3.
Planning process
4.
ALL
190 66.6% risk is considered as 1.
very low
2.
low
4
3.
moderate
4.
high
191 Risk management is one of the most important jobs for a 1.
Client
2.
Investor
4
3.
Production team
4.
Project manager
192 Which of the following term is best defined by the statement: “The underlying technology 1.
on which the system is built is superseded by new technology.”? Technology change
2.
Product competition
1
3.
Requirements change
4.
None
193 What assess the risk and your plans for risk mitigation and revise these when you learn 1.
more about the risk? Risk monitoring
2.
Risk planning
1
3.
Risk analysis
4.
Risk identification
194 Which of the following risks are derived from the organizational environment where the 1.
software is being developed? People risks
2.
Technology risks
4
3.
Estimation risks
4.
Organizational risks
195 Which of the following risks are derived from the software or hardware technologies that 1.
are used to develop the system? Managerial risks
2.
Technology risks
2
Which of the following risks are derived from the 3.
software or hardware technologies that Estimation risks
are used to develop the system? 4.
Organizational risks
196 Which of the following term is best defined by the statement: “Derive traceability 1.
information to maximize information hiding in the design.”? Underestimated development time
2.
Organizational restructuring
3
3.
Requirements changes
4.
None
197 What is the maximum number of reduce moves that can be taken by a bottom-up parser 1. n/2
for a 2. n-1
2
3. 2n-1
4. 2^n
198 Which one of the following is a top-down parser? 1. An LR(k) parser.
2. An LALR(k) parser
4
3. Operator precedence parser.
4. Recursive descent parser.
199 Which of the following derivations does a top-down parser use while parsing an input 1. Leftmost derivation
string? The input is assumed to be scanned in left to right order. 2. Leftmost derivation traced out in reverse
1
3. Rightmost derivation
4. Rightmost derivation traced out in reverse
200 An LALR(1) parser for a grammar G can have shift-reduce (S-R) conflicts if and only if 1. The LR(1) parser for G has S-R conflicts.
2. The LR(0) parser for G has S-R conflicts.
1
3. The LALR(1) parser for G has reduce-reduce conflicts
4. The SLR(1) parser for G has S-R conflicts.
201 Multiplication of a positive integer by a power of two can be replaced by left shift, which 1. Useless Code
executes faster on most machines. This is an example of 2. Strength Reduction
2
3. Induction Variable
4. Loop unwinding
202 When we concatenate two languages L1 and L2 recognized by machine M1 and M2 we 1. M1 OR M2
obtain a machine with final state same as that of __________________ 2. M1 AND M2
2
3. M2
4. M1
203 The number of states in a machine M recognizing L1UL2 will be __________________ 1.
where n is the number of states in M1 and m is the number of states in M2 . m-n
2.
m+n
2
3.
m+n+1
4. n-m
204 If there is a complete DFA M1 recognizing a language L1 and has m states out of which 1.
two are final states then the machine M recognizing L1 complement will have m+2
_____________ final states.
2.
m
1
3.
m-2
4. 2
205 If M1 machine recognizing L with n states, then M2 recognizing L* constructed Using 1.
Thompson construction will have ------------- states. n+2
2.
n+1
2
3.
n
4. n-1
206 which of the following intermediate language can be used in intermediate code generation? 1. Quadraples
2. Postfix notation and Three address code
1, 3, 2
3. Triples
4. Infix notation and two address code
207 A finite automata that will accept only string X of length n will have _________ many 1.
states n
2. n/2 3
3. n+1
4. infinite
208 If a language is denoted by a regular expression 1.
L = ( x )* (x | y x ) , yx
then which of the following is not a legal string within L ? 2.
xyx
4
3.
x
4.
xyxyx
209 Number of final state require to accept Φ(phi) in minimal finite automata. 1.
4
2.
3
4
3.
1
4.
0
210 ----------------------------is used to check whether the language is not regular. 1.
Pumping Lemma
2.
RE
3. 1
MN Theorem
4.
3.
NFA and DFA have equal power
4.None
213 A language is represented by a regular expression (a)*(a+ba). Which of the following 1.
string does not belong to the regular set represented by the above expression. aaa
2.
aba
3
3.
ababa
4.
aa
214 The lexical analysis for a modern language such as Java needs the power of which one of 1.
the following machine models in a necessary and sufficient sense? Deterministic pushdown automata
2.
Finite state automata
2
3.
Non-deterministic pushdown automata
4.
Turing machine
215 A minimum state DFA accepting the language L={w/w belongs {0,1}*} number of 0s and 1s 1.
in w are divisible by 3 and 5, respectively} has 15 states
2.
7 states
1
3.
9 states
4.
8 states
216 Which of the following regular expression denotes a language comprising of all possible 1.
strings over ∑= {a,b} of length n where n is a multiple of 3? (a+b+aa+bb+aba+bba)*
2.
(aaa+bbb)*
3
3.
((a+b) (a+b) (a+b))*
4.
(aaa+ab+a)+(bbb+bb+a)
217 What is the minimum number of states needed to a DFA over Σ= (a, b) which accept those 1.
words from Σ such that the number of a is even and the number of b is divisible by three. 2 states
2.
4 states
3
3.
6 states
4.
5 states
218 Which of the following strategies means that the impact of the risk will be reduced? 1.
Avoidance strategies
2.
Minimization strategies
2
3.
Contingency plans
4.
ALL
219 Which of the following term is best defined by the statement: “There will be a change of 1.
organizational management with different priorities.”? Staff turnover
2.
Technology change
3
3.
Management change
4.
Product competition
220 Which of the following are decidable? 1.
I. Whether the intersection of two regular languages is infinite I and II
II. Whether a given context-free language is regular 2.
III. Whether two push-down automata accept the same language I and IV
2
IV. Whether a given grammar is context-free 3.
II and III
4.
I and III
221 Which of the following problems is undecidable? 1.
Membership problem for CFGs
2.
Ambiguity problem for CFGs.
2
3.
Finiteness problem for FSAs
4.
Equivalence problem for FSAs.
222 Which of the following problems is undecidable? 1.
Deciding if a given context-free grammar is ambiguous.
2.
Deciding if a given string is generated by a given context-free grammar
1
3.
Deciding if the language generated by a given context-free grammar is empty
4.
Deciding if the language generated by a given context-free grammar is finite.
223 S -> aSa|bSb|a|b; The language generated by the above grammar over the alphabet {a,b} is 1.
the set of All palindromes
2.
All odd length palindromes.
2
3.
Strings that begin and end with the same symbol
4.
All even length palindromes
224 Which directory implementation is used in most Operating System? 1. Two level directory structure
Which directory implementation is used in most 2. Acyclic directory structure
Operating System? 4
3. Single level directory structure
4. Tree directory structure
225 Which one of the following languages over the alphabet {0,1} is described by the regular 1.
expression: (0+1)*0(0+1)*0(0+1)*? The set of all strings containing the substring 00.
2.
The set of all strings containing at most two 0’s.
3
3.
The set of all strings containing at least two 0’s.
4.
The set of all strings that begin and end with either 0 or 1.
226 Which of the following scheduling algorithm comes under preemptive scheduling? 1. FCFS
2. Round Robin
2
3. Multilevel Queue Scheduling
4. Largest Job First
227 External Fragmentation of the file system 1. can be avoided by paging
2. occurs only if the file system is used improperly
4
3. can be removed by compaction
4.can be avoided by Segmentation
228 For purposes of behavior modeling a state is any 1.
consumer or producer of data.
2.
data object hierarchy.
3.
3
observable mode of behavior.
4.
A basic block is a sequence of instructions where control enters the sequence at the
beginning and exits at the end.
2.
4
Available expression analysis can be used for common subexpression elimination.
3.
Live variable analysis can be used for dead code elimination.
4.
x = 4 ∗ 5 => x = 20 is an example of common subexpression elimination.
239 One of the purposes of using intermediate code in compilers is to 1.
make parsing and semantic analysis simpler
2.
improve error recovery and error reporting
3. 3
increase the chances of reusing the machine-independent code optimizer in other
compilers.
4.
improve the register allocation.
240 A ring counter is same as. 1.up-down counter 2.parallel adder 3.shift register 4.ALU 3
241 A shift register can be used for. 1.Digital delay line 2.Serial to parallel conversion 3.All of these 4.Parallel to serial
4
conversion
242 A synchronous sequential circuit is made up of. 1.combinational gates 2.flip-flops 3.both flip-flops and latches 4.both combinational
4
gates and flip-flops
243 Count function in SQL returns the number of 1.
values
2.
distinct values
1
3.
groups
4.
columns
244 In what type of coupling, the complete data structure is passed from one module to 1.Control Coupling
another?
2.Stamp Coupling
2
3.External Coupling
4.Content Coupling
245 If all tasks must be executed in the same time-span, what type of cohesion is being 1.
exhibited? Functional Cohesion
2.
Temporal Cohesion
2
3.
Functional Cohesion
4.
Sequential Cohesion
246 Which of the following pattern is the basis of interaction management in many web-based 1.
systems? architecture
2.
repository pattern
3
3.
model-view-controller
4.
different operating system
247 Data Store Symbol in DFD represents a 1.
Physical file
2.
Data Structure
2
3.
Logical file
4.
ALL
248 How many diagrams are here in Unified Modelling Language? 1.
six
2.
seven
4
3.
eight
4.
nine
249 Which of the following is not considered as a risk in project management? 1.
Specification delays
2.
Product competition
4
3.
Testing
4.
Staff turnover
250 Interaction Diagram is a combined term for 1.
Sequence Diagram + Collaboration Diagram
2.
Activity Diagram + State Chart Diagram
1
3.
Deployment Diagram + Collaboration Diagram
4.
None
251 Which of the following is not a SQA plan for a project? 1.
evaluations to be performed
Which of the following is not a SQA plan for a 2.
project? amount of technical work
2
3.
audits and reviews to be performed
4.
documents to be produced by the SQA group
252 Which of the following process is concerned with analyzing the costs and benefits of 1.
proposed changes? Change management
2.
Version management
1
3.
System building
4.
Release management
253 Which of the following term is best defined by the statement “The creation of a new 1.
codeline from a version in an existing codeline”? Branching
2.
Merging
1
3.
Codeline
4.
Mainline
254 Which of the following is a project scheduling method that can be applied to software 1.
development? PERT
2.
CPM
4
3.
CMM
4.
both PERT and CPM
255 Which granularity level of testing checks the behavior of module cooperation? 1.
Unit Testing
2.
Integration Testing
2
3.
Acceptance Testing
4.
Regression Testing
256 Which of the following is a black box testing strategy? 1.
All Statements Coverage
2.
Control Structure Coverage
3
3.
Cause-Effect Graphs
4.
ALL
257 One of the fault base testing techniques is 1.
unit testing.
2.
beta testing.
4
3.
Stress testing.
4.
mutation testing.
258 Changes made to an information system to add the desired but not necessarily the 1.
required features is called Preventative maintenance.
2.
Adaptive maintenance.
4
3.
Corrective maintenance.
4.
Perfective maintenance.
259 If every requirement stated in the Software Requirement Specification (SRS) has only one 1.
interpretation, SRS is said to be correct.
2.
unambiguous.
2
3.
consistent.
4.
verifiable.
260 The importance of software design can be summarized in a single word 1.
accuracy
2.
complexity
3.
3
efficiency
4.
quality
261 Polymorphism reduces the effort required to extend an object system by 1.
Coupling objects together more tightly
2.
3. 4
4.
272 Which of the following command words need to be programmed to operate a single PIC in 1.ICW1 and ICW2 2.ICW1, ICW2 and ICW4 3.ICW2 and ICW3 4.ICW1 and ICW4
2
273
fully nested mode with an 8086 microprocessor
When operated in slave mode, the PIC outputs its type number only if the cascaded 1.ICW1 2.ICW2 3.ICW3 4.ICW4
1,2,4
4
address received on CAS0-CAS2 matches the address programmed in --------- bits D0-D2
274 The truth table 1.
X Y f(X,Y) X
000
010 2.
101 X+Y
1
111
3.
X'Y'
represents the Boolean function 4.
Y
275 Consider a main memory system that consists of 8 memory modules attached to the system 1.
bus, which is one word wide. When a write request is made, the bus is occupied for 100 5535
nanoseconds (ns) by the data, address, and control signals. During the same 100 ns, and for
500 ns thereafter, the addressed memory module executes one cycle accepting and storing 2.
the data. The (internal) operation of different memory modules may overlap in time, but 65335 4
only one request can be on the bus at any time. The maximum number of stores (of one 3.
word each) that can be initiated in 1 millisecond is 53892
4.
10000
276 Multiprogramming systems ______ 1.
Are easier to develop than single programming systems
2.
Execute each job faster
3
3.
Execute more jobs in the same time
4.
Are used only on large main frame computers
277 The performance of cache memory is frequently measured in terms of a quantity called 1.
hit ratio
2.
miss ratio 1
3.
average ratio
4.
ratio
278 Consider the following two sets of LR(1) items of an LR(1) grammar. 1.
X -> c.X, c/d 1 only
X -> .cX, c/d 2.
X -> .d, c/d 2 only
X -> c.X, $ 3.
X -> .cX, $ 1 and 4 only
X -> .d, $ 4. 4
Which of the following statements related to merging of the two sets in the corresponding 1,2,3,4
LALR parser is/are FALSE?
1. Cannot be merged since look aheads are different.
2. Can be merged but will result in S-R conflict.
3. Can be merged but will result in R-R conflict.
4. Cannot be merged since goto on c will lead to two different sets.
279 Which of the following statements are TRUE? 1.
I. There exist parsing algorithms for some programming languages I and II
whose complexities are less than O(n3). 2.
II. A programming language which allows recursion can be implemented I and IV
with static storage allocation. 3. 2
III. No L-attributed definition can be evaluated in The framework III and IV
of bottom-up parsing. 4.
IV. Code improving transformations can be performed at both source I, II and III
language and intermediate code level.
280 Which of the following describes a handle (as applicable to LR-parsing) appropriately? 1.
It is the position in a sentential form where the next shift or reduce operation will
occur
2.
It is non-terminal whose production will be used for reduction in the next step
3.
4
It is a production that may be used for reduction in a future step along with a position
in the sentential form where the next shift or reduce operation will occur
4.
It is the production p that will be used for reduction in the next step along with a
position in the sentential form where the right hand side of the production may be
found
281 The grammar A → AA | (A) | ε is not suitable for predictive-parsing because the grammar 1.
is ambiguous
2.
left-recursive
2
3.
right-recursive
4.
an operator-grammar
282 Consider the grammar 1.
S → (S) | a n1<n2<n3
Let the number of states in SLR(1), LR(1) and LALR(1) parsers for the grammar be n1, 2.
n2 and n3 respectively. The following relationship holds good n1=n3<n2
2
3.
n1=n2=n3
4.
n1>n2>n3
283 Which of the following grammar rules violate the requirements of an operator grammar ? 1.
P, Q, R are nonterminals, and r, s, t are terminals. 1 and 3 only
1. P → Q R 2.
2. P → Q s R 1 only
1
3. P → ε 3.
4. P → Q t R r 2 and 3 only
4.
1,2,3 and 4 only
284 Consider the grammar with the following translation rules and E as the start symbol. 1.
E → E1 # T { E.value = E1.value * T.value } 200
| T{ E.value = T.value } 2.
T → T1 & F { T.value = T1.value + F.value } 180
3
| F{ T.value = F.value } 3.
F → num { F.value = num.value } 160
Compute E.value for the root of the parse tree for the expression: 2 # 3 & 5 # 6 & 4. 4.
40
285 In a bottom-up evaluation of a syntax directed definition, inherited attributes can 1.
always be evaluated
2.
be evaluated only if the definition is L-attributed
2
3.
be evaluated only if the definition has synthesized attributes
4.
never be evaluated
Mode then
286 If the PIC outputs the type number of C8H, the CPU will retrive the vector stored in the 1.00320H - 00323H 2.00324H - 00327H 3.00223H - 00226H 4.00140H - 00143H
x
address --------------
287 Which Instruction word is used to specify the number of stop bits, data bits, parity bit and 1.Mode 2.Command followed by Mode 3.Command 4.Mode followed by command
Command
4
the baud rate clock factor for the 8251A USART
288 How many operating modes are available in 8253A. 1.1 2.2 3.6 4.3 3
289 What does microprocessor speed depends on 1.Clock 2.Address bus width 3.Data bus width 4.Size of register 2
290 Consider the grammar shown below. 1.
S→CC LL(1)
LL(1)
C→cC|d 2.
The grammar is SLR(1) but not LL(1)
1
3.
LALR(1) but not SLR(1)
4.
LR(1) but not LALR(1)
291 The interrupt cycle ends when the ........... instruction is executed 1.IRET 2.CALL 3.PUSH 4.POP 3
292 A 32-bit address bus allows access to a memory of capacity 1.1 GB 2.16 MB 3.64 MB 4.4 GB 4
293 Which design model is analogous to the detailed drawings of the access points and external 1.
utilities for a house? Architectural design
2.
Component-level design
4
3.
Data design
4.
Interface design
294 1. The 40-20-40 rule suggests that the least amount of development effort can be spent on 1.Estimation and planning 2.
Analysis and design
3.
3
Coding
4.
Testing
295 Consider the translation scheme shown below 1.
S→TR 9+5+2
R → + T {print ('+');} R | ε 2.
T → num {print (num.val);} 95+2+
2
Here num is a token that represents an integer and num.val represents the corresponding 3.
integer value. For an input string '9 + 5 + 2', this translation scheme will print 952++
4.
++952
296 In 8086 microprocessor one of the following statements is not true 1.Coprocessor is interfaced in MAX mode 2.Coprocessor is interfaced in MIN mode
2
3.I/O can be interfaced in MAX / MIN mode 4.Supports pipelining
297 Which one of the following is True at any valid state in shift-reduce parsing? 1.
Viable prefixes appear only at the bottom of the stack and not inside
2.
Viable prefixes appear only at the top of the stack and not inside
3
3.
The stack contains only a set of viable prefixes
4.
The stack never contains viable prefixes
298 Match the following: 1.
List-I List-II a
A. Lexical analysis 1. Graph coloring 2.
B. Parsing 2. DFA minimization b
C. Register allocation 3. Post-order traversal 3.
D. Expression evaluation 4. Production tree c
2
Codes: 4.
ABCD d
(a) 2 3 1 4
(b) 2 1 4 3
(c) 2 4 1 3
(d) 2 3 4 1
299 Among simple LR (SLR), canonical LR, and look-ahead LR (LALR), which of the 1.
following pairs identify the method that is very easy to implement and the method that is SLR , LALR
the most powerful, in that order? 2.
CLR , LALR
3
3.
SLR , CLR
4.
SLR
300 ___________ adds to the costs of Software Development because it usually means that 1.
work that has been completed has to be redone Picture quality
2.
Production
4
3.
Software speed
4.
Change
301 1. Graphical representation of the project, showing each task and activity as horizontal 1.Gantt Chart 2.
bar whose length is proportion to time taken for a completion of that activity is called Structure Chart
3.
1
Pert Chart
4.
Time Line
302 1. Software deteriorates rather than wears out because 1.
Software suffers from exposure to hostile environments
2.
Defects are more likely to arise after software has been used often
3
3.
Multiple change requests introduce errors in component interactions
4.
Software spare parts become harder to order
303 1. The prototyping model of software development is 1.
A reasonable approach when requirements are well defined
2.
A Useful approach when a customer cannot define requirements clearly
2
3.
The best approach to use projects with larger development teams
4.
A risky model that rarely produces a meaningful product
304 A professional software engineer must: 1.
be loyal to the organization
2.
build trust from customers
4
3.
socialize with customers
4.
be loyal to the organization and build trust from customers
305 The status that cannot be operated by direct instructions is 1.Z 2.Cy 3.P 4.AC 4
306 Consider the CFG with {S,A,B) as the non-terminal alphabet, {a,b) as the terminal 1.
alphabet, S as the start symbol and the following set of production rules aaaabb
S --> aB S --> bA 2.
B --> b A --> a aabbbb
3
aabbab
B --> bS A --> aS 3.
B --> aBB A --> bAA aabbab
Which of the following strings is generated by the grammar? 4.
abbbba
307 The first processor to include Virtual memory in the Intel microprocessor familywas 1.Pentium 2.80486 3.80286 4.80386 3
308 Generic process models are: 1.
waterfall, componet-based, iterative
2.
waterfall, structural, component-based
4
3.
sequential, waterfall, iterative
4.
component-based, object-oriented, iterative
309 It is ok to have a single ideal approach to develop a software. 1.
True
2. 2
False
3. 4.
310 The language L= {0i21i | i≥0 } over the alphabet {0,1, 2} is: 1.
not recursive
The language L= {0i21i | i≥0 } over the alphabet 2.
{0,1, 2} is: is recursive and is a deterministic CFL
2
3.
is a regular language
4.
is not a deterministic CFL but a CFL
311 In mysql_fetch_array(),if two or more columns of the result have the same field names, 1.
what action is taken? the first column will take precedence
2.
the column is skipped
3
3.
the last column will take precedence
4.
an error is thrown.
312 Which of the following attribute is needed for file upload via form? 1.
enctype='multipart/form-data'
2.
enctype='singlepart/data'
1
3.
enctype='file'
4.
enctype='form-data/file'
313 What library do you need in order to process images? 1.
GD library
2.
ZIP library
1
3.
Win32 API library
4.
BOGUS library
314 You need to check the size of a file in PHP function. $size = X(filename); Which function 1.
will suitably replace 'X'? filesize
2.
size
1
3.
sizeofFile
4.
getSize
315 Which of the following function is used to terminate the script execution in PHP? 1.
break()
2.
quit()
3
3.
die()
4.
exit()
316 Which method is used to search for a substring? 1.
stringVariable.substring(subString)
2.
stringVariable.find(subString)
3
3.
stringVariable.indexOf(subString)
4.
stringVariable.indexOf(charAt(0))
317 Which is the correct way to write a JavaScript array? 1.
var txt = new Array(1:"tim",2:"kim",3:"jim")
2.
var txt = new Array:1=("tim")2=("kim")3=("jim")
3
3.
var txt = new Array("tim","kim","jim")
4.
var txt = new Array="tim","kim","jim"
318 The _______ method of an Array object adds and/or removes elements from an array. 1.
Slice
2.
Reverse
4
3.
Shift
4.
Splice
319 Consider the following code: var a = []; a.unshift(1); a.unshift(22); a.shift(); a.unshift(3, 1.1 2.[4,5] 3.[3,4,5] 4.Exception
1
[4,5]); a.shift(); a.shift(); a.shift(); The final output for the shift() is
320 What does /[^(]* regular expression indicate ? 1.Match one or more characters that are not open paranthesis 2.Match zero or more
characters that are open paranthesis 3.Match zero or more characters that are not open 2
paranthesis 4.Match one or more characters that are open paranthesis
321 What gets printed? $str = 'a\\b\n'; echo $str; 1.ab(newline) 2.a\b(newline) 3.a\b\n 4.a\\b(newline) 3
322 What is the strpos() function used for? 1.Find the last occurrence of the string within a string 2.Find the first occurrence of
the string within a string 3.Find both last and first occurence 4.Search for all 2
occurrence within a string
323 The simplest image processing technique is 1.coordinates transformation 2.intensity transformation 3.spatial transformation 4.
1
domain transformation
324 First derivative approximation says that values of constant intensities must be 1.1 2.0 3.positive 4.negative 2
325 If inspected in a browser, what will be the total width of the div in the following code
snippet? #container { width: 600px; border: 2px solid #CCCCCC; padding: 30px 20px;
1.664px 2.660px 3.644px 4.600px
664 1
margin: 20px 10px 40px 10px;}
326 Which of the following is not a valid attribute of the INPUT tag? 1.TEXT 2.NAME 3.SIZE 4.MAXLENGTH 4
327 Which of these sets of HTML5 attributes can be used for form validation? 1.required, pattern, min and max 2.auto, fixed, number 3.number, text, currency 4.
1
input, radio,checkbox
328 Which item is an example of a physical network address? 1.IP address 2.MAC address 3.Workstation name 4.www.proprofs.com 2
329 What is the following style an example of? img[alt~="Pie"] 1.Attribute Match 2.Exact Value Match 3.Contains Value Match 4.Subcode Match 3
330 What is the correct CSS syntax for making all the elements bold? 1.p {font-weight:bold;} 2.p style="text-size:bold" 3.p {text-size:bold} 4.p style="
1
font-size:bold">
331 How can you specify default text in an input field? 1.Using JavaScript 2.Using the 'text' attribute 3.Using the 'placeholder' element 4.
4
Using the 'placeholder' attribute
332 The language {am bn Cm+n | m, n ≥ 1} is 1.
Regular language
2.
context free but not regular
2
The language {am bn Cm+n | m, n ≥ 1} is 3.
context sensitive but not context free
4.
type-0 but not context sensitive
333 The language accepted by a Pushdown Automation in which the stack is limited to 10 1.
items is best described as Regular
2.
context free
1
3.
Recursive
4.
Deterministic context free
334 Currently there is no single standard file type that can be used to play audio using the 1.Use JavaScript to determine the web browser in use 2.Use Adobe Flash to play the
audio element consistently on all browsers. Which is the solution that the audio element audio 3.Include multiple audio file formats in the src attribute 4.No Solution 1 x
provides to resolve this conflict?
335 Which of the following statements is true? 1.An INPUT field of type password provides excellent security 2.An INPUT field of
type password provides a masked field but no real security 3.A maximum length can
4
not be set for a password field 4.A password INPUT field can only be included in a
FORM that uses the get METHOD
336 How do we prevent margins, borders and padding from overlapping? 1.Setting zero paddings and margins 2.By displaying our list as block elements 3.
2
Using table cells 4.By displaying our list as inline elements
337 Which of the following ways below is correct to write a CSS? 1.p {color:red;text-align:center}; 2.p {color:red;text-align:center} 3.p {color:red;text-
3
align:center;} 4.p (color:red;text-align:center;)
338 Which of the following explains cookies nature? 1.Non Volatile 2.Volatile 3.Intransient 4.Transient 4
339 Consider the following code snippet: var a = [1,2,3,4,5]; a.slice(0,3); What is the possible
output for the above code snippet?
1.Returns [1,2,3] 2.Returns [4,5] 3.Returns [1,2,3,4] 4.Returns [1,2,3,4,5]
1,2,3 1
340 Which property is used to obtain browser vendor and version information? 1.modal 2.version 3.browser 4.navigator 4
341 What is the result of the following code snippet? window.location === document.location 1.False 2.True 3.0 4.1 2
342 The length property belongs to which of the following objects? 1.Window 2.Element 3.History 4.Document 2
343 ----------- is a built - in JavaScript function which can be used to execute another function 1.Timeout( ) 2.TimeInterval( ) 3.setTimeout ( ) 4.All of the above
3
after a given time interval.
344 How do substring() and substr() differ? 1.One is not a method of the String object. 2.substr() takes three arguments,
substring() only two. 3.Only one accepts a desired string length as an argument. 4. 3
Besides the spelling, nothing.
345 What is the most essential purpose of paranthesis in regular expressions? 1.Define pattern matching techniques 2.Define subpatterns within the complete
2
pattern 3.Define portion of strings in the regular expression 4.All of the mentioned
346 Which of the following languages are context-free? 1.L1 and L2 only 2.
L1 = {ambnanbm ⎪ m, n ≥ 1} L1 and L3 only
L2 = {ambnambn ⎪ m, n ≥ 1} 3.
2
L3 = {ambn ⎪ m = 2n + 1} L3 only
4.
L1 only
347 Which of the following is not possible using PHP? 1.Deleting files from the server 2.Redirect a visitor to another page 3.Set the value of
4
the window statusbar 4.Obtain the IP address of a Visitor
348 Which one of the following is the very first task executed by a session enabled page? 1.Delete the previous session 2.Start a new session 3.Check whether a valid session
3
exists 4.Handle the session
349 What would be the output of the below code fragment? var a = ["s","a","v","e"]; 1.Undefined 2.save 3.vase 4.S
2
document.write(a.join(""));
350 The ___________ property specifies the stack order of an element 1.d-index 2.s-index 3.x-index 4.z-index 4
Relative
351 Which of the following property allows you to specify an element’s position with respect to 1.relative 2.fixed 3.static 4.absolute
1
the browser window?
352 Internet Explorer uses ....................... property to create transparent images. 1.-moz-opacity:x 2.filter: alpha(opacity=x) 3.filter: beta(opacity=x) 4.-IE-opac:y 2
Para1.Value
353 If para1 is the DOM object for a paragraph, what is the correct syntax to change the text 1."New Text"? 2.para1.value="New Text"; 3.para1.firstChild.nodeValue= "New
2
within the paragraph? Text"; 4.para1.nodeValue="New Text";
354 The syntax of Eval is ___________ 1.[objectName.]eval(numeriC) 2.[objectName.]eval(string) 3.[EvalName.]eval
2
(string) 4.[EvalName.]eval(numeriC)
355 Join is equal to 1.
Cartesian Product
2.
Combination of Union and Cartesian product
3
3.
Combination of selection and Cartesian product
4.
Combination of intersection and Cartesian product
356 Which of the following statement is false? 1. For R = R1*, L(R) is empty if and only if L(R1) is empty
2. For R = (R1), L(R) is empty if and only if L(R1) is empty
1
3. For R = R1R2 , L(R) is empty if and only if either L(R1) or L(R2) is empty.
4. If R = R1+ R2 , L(R) is empty if and only if both L(R1) and L(R2) are empty.
357 The system having memory elements are called. 1. sequential circuits
2. complex circuits
1
3. combinational circuits
4. logic circuits
358 The ESC instruction of 8086 may have two formats. In one of the formats, no memory 1.64 2.128 3.256 4.512
operand is used. Under this format, the number of external op-codes (for the co- 2
processor) which can be specified is
359 DB, DW and DD directives are used to place data in particular location or to 1.f ull address of labels 2.offsets of full address of labels and variables 3.full address
simplyallocate space without preassigning anything to space. The DW and DD directories of variables 4.offsets 2
areused to generate
360 In a microprocessor, the service routine for a certain interrupt starts from a fixed location 1.maskable and non-vectored 2.non-maskable and vectored 3.maskable and vectored
of memory which cannot be externally set, but the interrupt can be delayed or rejected. 4.non-maskable and non-vectored 3
Such aninterrupt is
361 The --------is neither an input nor an output; it is an internal bit programmed via the PC4 1.IFB 2.INTR 3.INTE 4.NMI
3
(Port A) or PC2(Port B)bits
362 Functions that combines to produce ƒ(x,y) 1.illumination and frequency 2.intensity and reflectance 3.illumination and radiance
4
4.illumination and reflectance
363 ___ bit in ICW1 indicates whether the 8259A is cascade mode or not 1.LTIM=0 2.LTIM=1 3.SNGL=1 4.SNGL=0 4
364 Number of the times the instruction sequence below will loop before coming out of loop is, 1.255 2.01 3.00 4.256
MOV AL, 00h A1: INC AL JNZ A1 256 4
theta(n)
365 The worst case running time to search for an element in a balanced binary search tree with 1.theta(n log n) 2.theta(n*2^n) 3.theta(n) 4.theta(log n)
3
n*2^n elements is
216
366 8086 microprocessor is interfaced to 8253 a programmable interval timer. The maximum 1.216 2.28 3.210 4.220
1
number by which the clock frequency on one of the timers is divided by
367 ___________ signal prevent the microprocessor from reading the same data more than one 1.pipelining 2.handshaking 3.controlling 4.signaling 2
368 Which buffer is a parallel to serial converter that receives a parallel byte for conversion 1.Transmit buffer 2.Receive buffer 3.Data bus buffer 4.Modem control
1
into a serial signal and further transmission onto the communication channel.
369 How to create a Date object in JavaScript? 1.dateObjectName = new Date([parameters]) 2.dateObjectName.new Date
([parameters]) 3.dateObjectName := new Date([parameters]) 4.dateObjectName Date 1
([parameters])
370 What is the code to start displaying the time when document loads? 1.onload = displayTime; 2.window. = displayTime; 3.window.onload = displayTime;
3
4.window.onload = start;
371 Identify the accurate control word for operate counter 0, Read/Write LSB only, Mode 2, 1.00010111B 2.0001X111B 3.00010101B 4.00110111B
2
BCD countdown.
372 To determine the architectural style or combination of styles that best fits the proposed 1.
system, requirements engineering is used to uncover algorithmic complexity
2.
characteristics and constraints
2
3.
control and data
4.
design patterns
373 In a BCD-to-seven-segment converter, why must a code converter be utilized? 1. to convert the 4-bit BCD into Gray code
2. to convert the 4-bit BCD into 7-bit code
2
3. to convert the 4-bit BCD into 10-bit code
4. No conversion is necessary
374 The ........ instruction is used to specify the number of stop bits, data bits,parity bit, and 1.bit set/reset 2.Mode 3.Command 4.Code
2
baud rate clock factor for the 8251 UART
375 Using the 8259A, the INT input of the 8086 can be expanded to accomodeate up to 1.60 2.64 3.16 4.32
2
--------------- prioritized interrupt inputs
376 Which element is used to draw graphics images on a web page? 1.script 2.audio 3.embed 4.canvas 4
377 One of the main advantage of using src attribute is 1.It becomes self-cached 2.It makes the HTML file modular 3.It restricts
4
manipulation in the HTML file 4.It simplifies the HTML files
378 How do you get information from a form that is submitted using the "get" method? 1.Request.QueryString; 2.$_GET[]; 3.Request.Form; 4.$_POST[]; 2
379 What does explode function in php do 1.Used to convert a string to an array 2.Used to split a given string into the number of
chunks specified 3.Used to split a string by a string 4.Used to split string into two 1
equal halves
380 Which command we use to set an image on background? 1.image-background:url('R4R_Logo.jpg') 2.background-image:url('R4R_Logo.jpg')
2
3.bg-image:url('R4R_Logo.jpg') 4.background-image:href('R4R_Logo.jpg')
381 Let L be a set accepted by a nondeterministic finite automaton. The number of states in 1.
non-deterministic finite automaton is |Q|. The maximum number of states in equivalent |Q|
finite automaton that accepts L is 2.
2|Q|
4
3.
2 raise to power |Q|*1
4.
2 raise to power |Q|
382 If AL= 7FH and instruction ADD AL,1 is given, specify the contents of the six status flag 1.CF=0,PF=0,AF=1,ZF=0,SF=1,OF=1
001010
. 2.CF=0,PF=1,AF=0,ZF=0,SF=1,OF=1
4
3.CF=0,PF=1,AF=1,ZF=O,SF=1,OF=1
4.CF=0,PF=0,AF=1,ZF=O,SF=1,OF=0
383 The starting address for counter 0 of 8253 is 0038H, then port address for control word 1.44H 2.49H 3.42H 4.46H
3
register is
384 The counters of 8253 can be operated in -------- modes of operation. 1.4 2.3 3.6 4.5 3
385 The other name for MODE 0 in 8253 timer is 1.software triggered strobe 2.Programmable one shot 3.Interrupt on terminal count 4.
3
Square wave rate generator
386 Given the frequency f=1.5MHZ for 8253 timer the value of time period T is 1.10ms 2.0.66us 3.1ms 4.100ms 2
387 The number of counters available in internal block diagram of 8253 is 1.2 2.1 3.3 4.4 3
388 The internal block diagram of 80286 contains ---- functional parts. 1.6 2.4 3.2 4.8 2
389 The 16-bit stack segment value is 5D27H and the offset is 2C30H. calculated physical
address is -----
1.5FFEOH 2.5FAE0H 3.5FEA0H 4.12500H
5FEA0H 3
390 Given the Extra segment ES = 52B9H and the offset BX=D470H. Calculated physical 1.60000H 2.70000H 3.11000H 4.11050H
4
address is ----------
391 Identify the addressing mode for the instruction MOV AH,47H 1.Immediate addressing mode 2.Direct addressing mode 3.Based addressing mode 4.
2
Indirect addressing mode
392 The 16-bit data segment value is 1000H and the offset is 2000H. calculated physical 1.10000H 2.11000H 3.12000H 4.12500H
3
address is -----
393 Given the Code segment CS = 1000H and the offset BX=0050H. Calculated physical 1.10000H 2.10050H 3.11050H 4.11000H
2
address is ----------
394 If AL=C0H, Determine the content of the register AL after SAL AL,1 instruction is 1.E0H 2.80H 3.0CH 4.0EH
2
executed.
395 Assume the base address of CS is 3000H and IP is 2000H. Calculate the memory address. 1.32000H 2.3000H 3.30000H 4.2000H 1
396 Identify different segments in a program 1.only code segment 2.data and code segment 3.only data segment 4.data, code, stack
4
and extra segments
397 what is the need of segmenting the memory in 8086 1.Increase the memory accessibility 2.Increase the memory addressibility 3.easy to
2
retrieve data 4.faster access
398 How many select lines would be required for an 8-line-to-1-line multiplexer? 1. 2
2. 4
3
3. 3
4. 8
399 The value in AL=11011010 after the operation of CBW, the result is 1.AX=1101 1010 1111 1111 2.AX=1101 1010 0000 0000
3
. 3.AX=1111 1111 1101 1010 4.AX=0000 0000 1101 1010
400 Given CF=0, BX=00111011 01110101 ROR BX,1. The result is 1.CF=1 BX=10011101 10111010 2.CF=1 BX=10100111 01101110 3.CF=0
1
BX=01001110 11011101 4.CF=0 BX=01010011 10110111
401 Consider 2 scenarios: 1.
C1: For DFA (ϕ, Ʃ, δ, qo, F), Both are true
if F = ϕ, then L = Ʃ* 2.
C2: For NFA (ϕ, Ʃ, δ, qo, F), Both are False
if F = ϕ, then L = Ʃ* 3. 3
Where F = Final states set C1 is true, C2 is false
ϕ = Total states set 4.
C1 is false, C2 is true
Choose the correct option ?
402 Which of the following paging algorithms is most likely to be used in a virtual memory 1.
system? FIFO
2.
Second chance 3
3.
Least Recently Used
4.
Least Frequently Used
403 One can safely state that the output lines for a demultiplexer are under the direct control 1. input data select lines
of the: One can safely state that the output lines for a 2. the internal OR gate
demultiplexer are under the direct control 3. the internal AND gates
1
of the: 4. Input data line
404 What is the main difference between traps and interrupts? 1.
How they are initiated
2.
The kind of code that’s used to handle them 1
3.
Whether or not the scheduler is called
4.
How the operating system returns from them
405 Having more than one constructor in a class is 1. not possible
2. compile time polymorphism
3
3. constructor overriding
4. error
406 FAT file system is 1. Indexed Allocation and used in Windows OS
2. used in Windows OS
1
3. about storage in RAM
4. Indexed Allocation.
407 Quantitative methods for assessing the quality of proposed architectural designs are 1.
readily available. TRUE
2. 2
FALSE
3. 4.
408 Which of the following is a complete function? 1. void funct(int) { printf(?Hello"); }
2. int funct();
4
3. void funct(x) { printf(?Hello"); }
4. int funct(int x) { return x=x+1; }
409 IF Y is a subset of X then 1.
X --> Y
2.
Y -->X
2
3.
Y -->--> X
4.
X is a sub set of Y
410 Overloading the function operator 1.usually make use of a constructor that takes arguments. 2.allows you to create
objects that act syntactically like functions. 3.requires a class with an overloaded 3
operator. 4.requires a class with an overloaded [ ] operator.
411 The node type for document returns the value ---. 1.2 2.9 3.3 4.8 4
412 Which of the following is NOT a valid PHP comparison operator? 1.!= 2.>= 3.&&& 4.=== 3
4
413 $a = array( null => 'a', true => 'b', false => 'c', 0 => 'd', 1 => 'e', '' => 'f' ); echo count($a), 1.2 2.3 3.4 4.5
2
"\n"; What will be printed?
414 $a = array(); if ($a[1]) null; echo count($a), "\n"; What will be printed? 1.0 2.1 3.2 4.Code wont work 1
415 How do we access the value of 'd' later? $a = array( 'a', 3 => 'b', 1 => 'c', 'd' ); 1.$a[0] 2.$a[1] 3.$a[2] 4.$a[4] 4
416 A major problem with priority scheduling is _________. 1.
Definite blocking
2.
Starvation
2
3.
Low priority
4.
None of these
417 Buffering is useful because 1.
It makes it seem like there’s more memory in the computer
2.
It reduces the number of memory copies required
4
3.
It allows all device drivers to use the same code
4.
It allows devices and thee CPU to operate asynchronously
418 When the overall flow in a segment of a data flow diagram is largely sequential and follows 1.
straight-line paths, _________ is present.
low coupling
2.
good modularity
3. 3
transaction flow
4.
transform flow
419 What is the difference between echo and print? 1.They both behave the same. 2.Print can take multiple parameters where as echo
cannot 3.Echo can take multiple parameters where as print cannot 4.Print is a 3
function where as echo is not.
420 How many flip-flops are required to construct a mod10 counter? 1.10 2.8 3.5 4.4 4
421 It is difficult to design asynhronous sequential circuit because. 1.External clock is to be provided 2.It is using Flip flops 3.It is more complex 4.
4
Generally they involve stability problem
422 Memory elements in clocked sequential circuits are called. 1.latches 2.gates 3.signals 4.flipflop 4
423 How can we count the number of elements in an array? 1.Using sizeof() 2.count() 3.Writing a user defined function and using array_search()
4
4.using sizeof() and count()
424 How do I create PHP arrays in a HTML ? 1.< input name= MyArray[]/> 2.< input ="MyArray[]" /> 3.< input name="MyArray
3
[]" /> 4.< input MyArray[] />
425 What is the default size of a file set in upload_max_filesize ? 1.1 MB 2.2 MB 3.2.5 MB 4.3 MB 2
426 What happens if no file path is given in include() function? 1.PHP continues to execute the script. 2.Results in a fatal error 3.Include_path is
3
made use of 4.It haults the script.
427 What is the default execution time set in set_time_limit()? 1.20 secs 2.30 secs 3.40 secs 4.50 secs 2
428 When the pre-order and post-order traversal of a Binary Tree generates the same output,
the tree can have maximum
1.Three nodes 2.Two nodes 3.One node 4.Any number of nodes
one 3
429 Drop SQL clause 1.
Drops only the values from the table
2.
drops structure of the table along with values
2
3.
Drop SQL clause None of the options
4.
changes the structure of the table
430 The function used to remove the leading spaces is 1.
ltrim
2.
lpad
1
3.
rpad
4.
rtrim
431 ____________ function in PHP returns a list of response headers sent (or ready to send) 1.header() 2.headers_list() 3.header_sent() 4.header_send() 2
432 _________ is a high speed cache used to hold recently referenced page table entries as a 1.
part of paged virtual memory Translation Look-aside buffer
2.
Inverse page table
1
3.
Segmented page table
4.
Hierarchical page table
433 Synchronous counters eliminate the delay problems encountered with asynchronous 1.input clock pulses are applied simultaneously to each stage 2.input clock pulses are
(ripple) counters because the. applied only to the first and last stages 3.input clock pulses are applied only to the 4
last stage 4.input clock pulses are not used to activate any of the counter stages
434 SR Flip flop can be converted to T-type flip-flop if ? 1. is connected to Q
2.R is connected to Q
4
3.Both S and R are shortend
437 What is asynchronous counter. 1.none of them 2.A master clock triggers all the flip-flops at a time 3.all the flip-flop
4
are combined to common clock 4.each flip-flop has it own clock
438 Given the language L = {ab, aa, baa}, which of the following strings are in L*? 1.
1) abaabaaabaa 1, 2 and 3
2) aaaabaaaa 2.
3) baaaaabaaaab 1, 2 and 4
2
4) baaaaabaa 3.
1, 3 and 4
4.
2, 3 and 4
439 The Hardware mechanism that enables a device to notify the CPU is called __________. 1.
Polling
2.
Interrupt
2
3.
Systems Call
4.
None of these
440 In the running state 1.
only the process which has control of the processor is found
2.
all the processes waiting for I/O to be completed are found
1
3.
all the processes waiting for the processor are found
4.
everything in these options are found
441 In the context of object-oriented software engineering a component contains 1.
attributes and operations
2.
4
3.
4.
a set of collaborating classes
442 What is meant by parallel-loading the register? 1.Shifting the data in all flip-flops simultaneously 2.Loading data in two of the flip-
flops 3.Loading data in all flip-flops at the same time 4.Momentarily disabling the 3
synchronous SET and RESET inputs
443 What is the condition for resetting(s=0) the S flag in status register? 1.MSB of the result is One 2.MSB of the result is zero 3.LSB of the result is one 4.
2
LSB of the result is zero
444 Let w be any string of length n is {0,1}*. Let L be the set of all substrings of w. What is the 1.
minimum number of states in a non-deterministic finite automaton that accepts L? n+1
2.
n
1
3.
n-1
4.
2n+1
445 Which one of the following is FALSE? 1.
There is unique minimal DFA for every regular language
2.
Every NFA can be converted to an equivalent PDA
4
3.
Complement of every context-free language is recursive
4.
Every nondeterministic PDA can be converted to an equivalent deterministic PDA
446 Classes and components that exhibit functional, layer, or communicational cohesion are 1.
relatively easy to implement, test, and maintain. true
2. 1
false
3. 4.
447 Which of the following statements is false? 1.
Every NFA can be converted to an equivalent DFA
2.
Every non-deterministic Turing machine can be converted to an equivalent
deterministic Turing machine 4
3.
Every regular language is also a context-free language
4.
Every subset of a recursively enumerable set is recursive
448 In PHP, which of the following function is used to insert content of one php file into 1.include[] 2.#include() 3.include() 4.#include{}
3
another php file before server executes it
449 The kernel keeps track of the state of each task by using a data structure called __ 1.
Process control block
2.
Process Status Word
1
3.
Memory control block
4.
None of these
450 The major source of data for other systems are: 1.
Electronic Switching System
2. Transaction Processing Systems 2
3. Decision Support System
4. Management Information System
451 Consider an undirected random graph of eight vertices. The probability that there is an 1.
edge between a pair of vertices is ½. What is the expected number of unordered cycles of 1/8
length three? 2.
1
3
3.
7
4.
8
452 What type of declaration is this: 1.
unsigned num; num is unsigned integer
2.
num is unsigned float
4
3.
num is unsigned character
4.
Invalid declaration
453 Which of the following statements best describes the operation of a synchronous up-/down- 1.In general, the counter can be reversed at any point in its counting sequence. 2.The
counter? counter can be reversed, but must be reset before counting in the other direction. 3.
The counter can count in either direction, but must continue in that direction once 1
started. 4.The count sequence cannot be reversed, once it has begun, without first
resetting the counter to zero.
454 Which segments of a seven-segment display would be active to display the decimal digit 2? 1.a, c, d, f, and g 2.a, b, c, d, and g 3.a, b, d, e, and g 4.a, b, c, d, e, and f 3
455 In the absolute the addressing mode 1.
The operand is inside the instruction
2.
The address of the operand is inside the instruction
1
3.
The register containing the address of the operand is specified inside the instruction
4.
The location of the operand is implicit
456 Which of the following addressing modes are suitable for program 1.
relocation at run time? 1 and 4
1. Absolute addressing 2.
2. Based addressing 1 and 2
4
3. Relative addressing 3.
4. Indirect addressing 2 and 3
4.
1,2 and 4
457 What is the minimum number of NAND gates required to implement A + AB` + AB`C? 1.0 2.1 3.2 4.3 1
458 Which of the following is TRUE? 1.
Every subset of a regular set is regular.
2.
Every finite subset of a non-regular set is regular.
1
3.
Every finite subset of a non-regular set is regular.
4.
Infinite union of finite sets is regular.
459 Which of the following is not a form of memory ? 1.
Instruction cache
2.
Instruction register
3
3.
Instruction opcode
4.
Translation-a-side buffer
460 Which JavaScript function is most useful for finding errors? 1.Confirm 2.Prompt 3.Debug 4.Alert 3
461 JavaScript RegExp Object has modifier 'i' to __________ 1.Perform case-sensitive matching 2.Perform case-insensitive matching 3.Perform
2
both case-sensitive & case-insensitive matching 4.None of the these
462 You can find the element you want to manipulate by ________ way? 1.getElementById() 2.getElementsByTagName() 3.getElementsByClassName() 4.All
4
of the these
463 _________ does the job of allocating a process to the processor. 1.
Long term scheduler
2.
Short term scheduler (CPU Scheduler)
4
3.
Medium term scheduler
4.
Dispatcher
The length of the
shortest
464 The length of the shortest string NOT in the language (over Σ = {a, b}) of the following 1.
regular expression is ______________. 2
a*b*(ba)*a* 2.
3
2
3.
4
4.
5
465 Consider the regular language L = (111 + 11111)*. The minimum number of states in any 1.
DFA accepting this languages is: 3
2.
5
4
3.
8
4.
9
466 The smallest finite automation which accepts the language {x | length of x is divisible by 3} 1.
has : 2 states
2.
3 states
3
3.
4 states
4.
5 states
467 The DMA controller has _______ registers 1.
4
2.
2
3
3.
3
4.
1
468 The rate at which a computer clock deviates from a perfect reference clock is called as 1.
Clock rate
2.
Clock speed
3
3.
clock drift rate
4.
Transmission Bandwidth
469 Consider a join (relation algebra) between relations r(R)and s(S) using the nested loop 1.
method. There are 3 buffers each of size equal to disk block size, out of which one buffer is Relation r(R) is in the outer loop.
reserved for intermediate results. Assuming size(r(R))
2.
Relation s(S) is in the outer loop. 1
3.
Join selection factor between r(R) and s(S) is more than 0.5
4.
Join selection factor between r(R) and s(S) is less than 0.5.
470 Consider a DFA over ∑ = {a, b} accepting all strings which have number of a’s divisible by 1.
6 and number of b’s divisible by 8. What is the minimum number of states that the DFA 8
will have? 2.
14
4
3.
15
4.
48
471 How many minimum states are required in a DFA to find whether a given binary string 1.
has odd number of 0's or not, there can be any number of 1's. 1
2.
2
2
3.
3
4.
4
472 A Stack-organized Computer uses instruction of 1.
Indirect addressing
2.
Two-addressing 3
3.
Zero addressing
4.
Index addressing
473 A graphical display of the fundamental products in a truth-table is known as 1.
Mapping
2.
Graphing 4
3.
T-map
4.
Karnaugh-Map
474 What is the maximum number of reduce moves that can be taken by a bottom-up parser 1.
for a grammar with no epsilon- and unit-production (i.e., of type A -> є and A -> a) to n/2
parse a string with n tokens? 2.
n-1
2
3.
2n-1
4.
2^n
475 Consider the following two sets of LR(1) items of an LR(1) grammar. 1.
X -> c.X, c/d 1 only
X -> .cX, c/d 2.
X -> .d, c/d 2 only
X -> c.X, $ 3.
X -> .cX, $ 3 and 4 only
X -> .d, $ 4. 4
Which of the following statements related to merging of the two sets in the corresponding 1,2,3,4
LALR parser is/are FALSE?
1. Cannot be merged since look aheads are different.
2. Can be merged but will result in S-R conflict.
3. Can be merged but will result in R-R conflict.
4. Cannot be merged since goto on c will lead to two different sets.
476 Consider a 6-stage instruction pipeline, where all stages are perfectly balanced.Assume 1.
that there is no cycle-time overhead of pipelining. When an application is executing on this 1
6-stage pipeline, the speedup achieved with respect to non-pipelined execution if 25% of 2.
the instructions incur 2 pipeline stall cycles is 2 3
3.
4
4.5
477 Which of these contains an executable statement? 1.// var a = 0; // var b = 0; 2./* var a = 0; // var b = 0; */ 3./* var a = 0; */ var b = 0; 4.
3
// var a = 0; /* var b = 0; */
478 ________ scheduler selects the jobs from the pool of jobs and loads into the ready queue. 1.
Long term
2.
Short trem
1
3.
Medium term
4.
None of these
479 Automaton accepting the regular expression of any number of a ' s is: 1.
a*
2.
a
1
3.
a*b*
4.
abc
480 The minimum number of page frames that must be allocated to a running process in a 1.
virtual memory environment is determined by the instruction set architecture
2.
page size
1
3.
physical memory size
4.
number of processes in memory
481 Finite automata recognizes --------grammars 1.
type-1
2.
type-3 2
3. type-0
4.
type-2
482 The main difference between JK and RS flip-flop is that? 1.
JK flip-flop does not need a clock pulse
2.
there is feedback in JK flip-flop
3
3.
JK flip-flop accepts both inputs as 1
4.
JK flip-flop is acronym of junction cathode multivibrator
483 Radix of binary number system is _____? 1.
0
2.
1 2 3
3.
2
4.
A&B
484 Which of the following is minimum error code? 1.Octal code
2.Grey code
2
3.Binary code
4.
Excess 3 code
485 When used with an IC, what does the term "QUAD" indicate? 1.
4 circuits
2.
2 circuits
1
3.
8 circuits
4.
6 circuits
486 _________ register keeps tracks of the instructions stored in program stored in memory. 1.
AR (Address Register)
2.
XR (Index Register)
3
3.
PC (Program Counter)
4.
AC (Accumulator)
487 The language is L={0p1q0r | p,q,r ³ 0 , p ¹ r} is 1. Context-sensitive but not context-free
2. Recursive but not Context-free
4
3. Regular
4. Context-free
488 Write Through technique is used in which memory for updating the data _____. 1.
Virtual memory
2.
Main memory
4
3.
Auxiliary memory
4.
Cache memory
489
Which of the
Which of the following is not hardware: 1.
Magnetic tape
following is not 2.
Printer
4
hardware:
3.
VDU terminal
4.
Assembler
490 Multiple choice examination answer sheets can be evaluated automatically by 1.
Optical Mark Reader
2.
Optical Character Reader
3.
1
Magnetic tape reader
4.
Magnetic ink character reader.
491 Which of the following would cause quickest access 1.
direct access from a magnetic tape
2.
direct access from a hard disk
2
3.
direct access from a floppy disk
4.
direct access from a cassette tape
492 The process of retaining data for future use is called 1.
reading
2.
writing
3
3.
storing
4.
coding
493 Magnetic tapes are good storage media for 1.
backup and low volume data
2.
backup and high volume data
2
3.
storing original but low volume data
4.
storing original but high volume data
494 What characteristic of RAM memory makes it not suitable for permanent storage? 1.
too slow
2.
unreliable
3
3.
it is volatile
4.
too bulky
495 The average time required to reach a storage location in memory and obtain its contents is 1.
called the seek time
2.
turnaround time
3
3.
access time
4.
transfer time
496 Which of the following is lowest in memory hierarchy? 1.
Cache memory
2.
Secondary memory
3
3.
Registers
4.
RAM
497 One operation that is not given by magnitude comparator 1.
equal
2.
less 2
3.
greater
4.
addition
498 An unambiguous grammar has 1. Exactly one leftmost derivation for a string w
2. Two-address Instruction
3.One-address Instruction
4. Zero-address Instruction
500 Which directory implementation is used in most of the Operating Systems? 1.
Single level directory structure
2.
Two level directory structure
3
3.
Tree directory structure
4.
Acyclic directory structure
501 The memory unit that communicates directly with the CPU is called the 1.
main memory
2.
Secondary memory
1
3.
shared memory
4.
auxiliary memory
502 In which addressing mode the operand is given explicitly in the instruction 1.
Absolute
2.
Immediate
2
3.
Indirect
4.
Direct
503 Resource locking ________. 1.
Allows multiple tasks to simultaneously use resource
2.
Forces only one task to use any resource at any time
2
3.
Can easily cause a dead lock condition
4.
Is not used for disk drives
504 The load instruction is mostly used to designate a transfer from memory to a processor 1.
register known as____. Accumulator
2.
Instruction Register
1
3.
Program counter
4.
Memory address Register
505 A group of bits that tell the computer to perform a specific operation is known as____. 1.
Instruction code
2.
Micro-operation
1
3.
Accumulator
4.
Register
506 Memory unit accessed by content is called______ 1.
Read only memory
2.
Programmable Memory
4
3.
Virtual Memory
4.
Associative Memory
507 PSW is saved in stack when there is a _____. 1.
interrupt recognized
2.
execution of RST instruction
1
3.
Execution of CALL instruction
4.
All of these
508 In a connected graph, a bridge is an edge whose removal disconnects a graph. Which one 1.
of the following statements is true? A tree has no bridges
2.
A bridge cannot be part of a simple cycle
3. 4
Every edge of a clique with size 3 is a bridge (A clique is any compete sub graph of a
graph)
4.
A graph with bridges cannot have a cycle
509 Software coupling is a sign of poor architectural design and can always be avoided in every 1.
system. True
2. 2
False
3. 4.
510 Generally Dynamic RAM is used as main memory in a computer system as it______. 1.
Consumes less power
2.
has higher speed
2
3.
has lower cell density
4.
needs refreshing circuitry
511 Cache memory acts between_______. 1.
CPU and RAM
2.
RAM and ROM
1
3.
CPU and Hard Disk
4.
None of these
512 Which of the following is not the attribute of FCB? 1.
File permissions
2.
Program Counter
4
3.
Access Control List
4.
Pointers to file control blocks
513 ALE stands for ___________ 1.
implementation model
3
3.
user model
4.
client model
515 Given an arbitrary non-deterministic finite automaton (NFA). with N states, the maximum 1.
number of states in an equivalent minimized DFA is at least. N^2
2.
2N
3
3.
2^N
4. N!
516 In 8086, Example for Non maskable interrupts are ________. 1.
TRAP
2.
RST6.5
1
3.
INTR
4.
RST6.6
517 Address line for TRAP is? 1.
0023H
2.
0024H
2
3.
0033H
4.
0099H
518 Access time is faster for _________. 1.
ROM
2.
SRAM
2
3.
DRAM
4.
ERAM
519 Which of these framework activities is not normally associated with the user interface 1.
design processes? cost estimation
2.
interface construction
3. 3
interface validation
4.
experienced programmers
2
3.
product users
4.
project managers
527 An optimizing compiler 1. Is optimized to occupy less space
2. Optimized the code
2
3. Is optimized to take less time for execution
4. Secured Code
528 The external system bus architecture is created using from ______ architecture 1.
Pascal
2.
Dennis Ritchie
4
3.
Charles Babbage
4.
Von Neumann
529 Most software continues to be custom built because 1.
Component reuse is common in the software world.
2.
3.
Software is easier to build without using someone else's components
4.
Off-the-shelf software components are unavailable in many application domains.
530 A binary tree in which if all its levels except possibly the last, have the maximum number 1.
of nodes and all the nodes at the last level appear as far left as possible, is known as full binary tree
2.
AVL tree
1
3.
threaded tree
4.
complete binary tree
531 Class testing of object-oriented software is equivalent to unit testing for traditional 1.
software. true
2. 1 x
false
3. 4.
532 Performance testing is only important for real-time or embedded systems. 1.
true
2. 2 x
false
3. 4.
533 Which statement does not require semicolon? 1.
goto xyz
2.
int x = 20
3
3.
#define MAX 100
4.
do {... }while(count<=100)
534 Stress testing examines the pressures placed on the user during system use in extreme 1.
environments true
2. 2 x
false
3. 4.
535 Program flow graphs are identical to program flowcharts. 1.
true
2. 2
false
3. 4.
536 When testing object-oriented software it is important to test each class operation 1.
separately as part of the unit testing process. true
2. 2 x
false
3. 4.
537 If L and L' are recursively enumerable, then L is 1.
regular
2.
context-free
4
3.
context-sensitive
4.
recursive
Let L1 be a recursive language, and let L2 be a
recursively enumerable but not a recursive
language. Which one of the following is TRUE?
538 Let L1 be a recursive language, and let L2 be a recursively enumerable but not a recursive 1.
language. Which one of the following is TRUE? L1' is recursive and L2' is recursively enumerable
L1' --> Complement of L1 2.
L2' --> Complement of L2 L1' is recursive and L2' is not recursively enumerable
2
3.
L1' and L2' are recursively enumerable
4.
L1' is recursively enumerable and L2' is recursive
539 Which of the following is true? 1.
The complement of a recursive language is recursive.
2.
The complement of a recursively enumerable language is recursively enumerable
1
3.
The complement of a recursive language is either recursive or recursively enumerable
4.
The complement of a context-free language is context-free
540 Boolean algebra is also called 1.
switching algebra
2.
arithmetic algebra
1
3.
linear algebra
4.
algebra
541 A quadruple is a record structure with ______ fields. 1. 3
2. 4
2
3. 1
4. 2
542 In the types of Three-Address statements, copy statements of the form x := y means 1. The value of x is assigned to y or the value of y is assigned t o x.
2. The value of x is assigned to y and the value of y is assigned t o x.
3
3. The value of y is assigned to x.
4. The value of x is assigned to y.
543 The set of all strings over the alphabet {a,b} (including epsilon} is denoted by 1.
(a+b)^+
2.
a^+b^+ 4
3. a*b*
4.
(a+b)*
544 Which one of the following languages over alphabet {0,1} is described by the regular 1.
expression: The set of all strings containing at least two 0’s
(0+1)*0(0+1)*0(0+1)*?
2. The set of all strings that begin and end with either 0 or 1.
3. 1
The set of all strings containing at most two 0’s.
4.
The set of all strings containing the substring 00.
545 The focus of validation testing is to uncover places that a user will be able to observe 1.
failure of the software to conform to its requirements. true
2. 1 x
false
3. 4.
546 How many DFAs exit with two state over the input alphabet (a,b) 1.
16
2.
26
4
3.
32
4. 64
547 Which one of the following regular expressions over {0,1} denotes the set of all strings not 1.
containing 100 as a substring? 0*(11*0)*
2. 0*1*01
3. 1234 x
0*(10+1)*
4.
0*1010*
548 Software validation is achieved through a series of tests performed by the user once the 1.
software is deployed in his or her work environment. true
2. 2
false
3. 4.
549 Consider a schedule S1 given below; 1.
R1(A); W1(A); R2(B); R2(A); R1(B); W2(A+B); W1(B); where R1 and W1 are read and S1 is a serializable schedule
write operations of transaction T1 and R2 and W2 are read and write operations of 2.
transaction T2. A deadlock will occur if 2PL is used
4
Which of the following is correct regarding schedule S1? 3.
S1 is a conflict serializable schedule
4.
S1 is a view serializable schedule
550 Which of the following operation is used if we are interested in only certain columns of a 1.
table? PROJECTION
2.
SELECTION
1
3.
UNION
4.
JOIN
551 Divide and conquire mechanism is used in 1.selection sort 2.merge sort 3.quick and merge sorts 4.indexed sequential search 3
552 To Delete an item from a Queue identify the correct set of statements 1.Q[REAR] = item; REAR ++ 2.item = Q[FRONT]; FRONT++ 3.item = Q[REAR];
2
FRONT ++ 4.item = Q[FRONT]; REAR ++
553 If there are n relations how many number of join conditions has to be applied to retrieve 1.
the data from all the n relations? N+1
If there are n relations how many 2.
number of join conditions has to be N
3
applied to retrieve 3.
the data from all the n relations? N-1
4.
A Number in the range 0 toN.
554 In access lists and groups which one of the following is correct for the 'RWX' notation of 1.
the order 'group, owner, public' 111110001
2.
110111001
2
3.
001111110
4.
001110111
555 Which of the following statement is false? 1. If there is a PDA by acceptance state that accept L, then there is also a PDA by
empty stack that accept L
2. If there is a NPDA that accept L, then there is also a DPDA that accept L. x
3. If there is a PDA by empty stack, then there is also a CFG G that accept L.
4. If there is a CFG G that accepts L, then there is also a PDA that accept L.
556 Mode of communication in which transmission takes place in both directions, but only in 1.simplex 2.four wired 3.full duplex 4.half-duplex
4
one direction at a time is called________________
557 Which of the following statements is true? 1.Quadraples have some disadvantages over triples notation for an optimizing
compiler 2.For optimizing compiler, moving a statement that defines a temporary
value requires us to change all references to that statements. It is an overhead for
2
triples notation 3.For optimizing compiler, triples notation has important benefit
where statements are often moved around as it incurs no movements or change 4.All
the statements are false
558 The addressing mode used in an instruction of the form ADD R1, R2 is _____. 1.
Absolute
2.
Indirect 3
3.
Index
4.
Register
559 A binary tree T has 20 leaves. The number of nodes in T having two children is 1.
34
2.
99
4
3.
7
4.
19
560 Which of the following asymptotic notation is the worst among all? 1.
n + 9378
2.
2^ n-1
2
3.
2^ n - 1
4.
2n ? 1
561 When there is complete DFA with Five states out of which two are final states if F is 1.
modified such that it recognizes complement of the original language then there will be at 3
least _________final states.
2.
2
5
3.
5
4. 7
562 How many address bits are needed to select all memory locations in the 16K × 1 RAM? 1.
8
2.
10
3
3.
14
4.
16
563 Bit stuffing refers to 1.inserting a '0' in user data stream to differentiate it with a flag 2.inserting a '0' in
flag data stream to avoid ambiguity 3.appending a nibble to the flag sequence 4. 1
appending a nibble to the user data stream
564 Which one of these is characteristic of RAID 5? 1.
Distributed parity
2.
No Parity
1
3.
All parity in a single disk
4.
Double Parity
565 The set of fundamental assumptions about what products the organization should produce, 1. organizational culture.
how and where it should produce them, and for whom they should be produced is 2. behavioral model.
1
3. rational model.
4. agency theory.
566 The set of fundamental assumptions about what products the organization should produce, 1. organizational culture.
how and where it should produce them, and for whom they should be produced is 2. behavioral model.
1
3. rational model.
4. agency theory.
567 A network that contains multiple hubs is most likely configured in which topology? 1.Mesh 2.Tree 3.Bus 4.Star 2
568 Which one of the following models is not suitable for accommodating any change? 1. Build & Fix Model
2. RAD Model
3
3. Waterfall Model
4. Prototyping Model
569 Content of the program counter is added to the address part of the instruction in order to 1.
obtain the effective address is called relative address mode.
2.
n+1
2
3.
n
4. n-1
575 Which one of the following uses 8B/6T encoding scheme 1.100 Base-T1 2.100 Base-T4 3.100 Base TX 4.100 Base-FX 2
576 A packet switching network 1.can reduce the cost of using an information utility 2.allows communications
channel to be shared among more than one user 3.can reduce the cost of using an
3
information utility and allows communications channel to be shared among more
than one user 4.is free
577 The main purpose of a data link content monitor is to 1.detect problems in protocols 2.determine the type of switch used in a data link 3.
1
determine the flow of data 4.determine the type of switching used in data link
578 Which of the following is a wrong example of network layer 1.X.25 level 2-ISO 2.Source routing and Domains Naming Usenet 3.X.25 packet
1
land protocols (PLP-ISO) 4.Internet protocol (I/P) ARPA NET
579 Logical addressing is used in _____ layer 1.Network 2.Transport 3.Physical 4.Session 1
580 ________ functions as a request-response protocol in the client-server computing model. 1.HTTP 2.IP 3.TCP 4.UDP 1
581 In context of OSI or TCP/IP computer network models, which of the following is false? 1.Major difference between LAN and WAN is that the later uses switching element
2.Network layer is connection oriented 3.A repeater is used just to forward bits from 2
one network to another one 4.A gateway is used to connect incompatible networks
582 All devices/host connect to a central switch in _____ topology. 1.Star 2.Ring 3.Bus 4.Tree 1
583 Calculate the person months for a project that was completed in two months with two 1. 2
people working on it. 2. 4
3. 1
4 2
4. 8
584 When FA M is given which recognizes language L and reverse of L is found by using M 1.
then there can be ___________Final states Two
2.
Three
3
3.
Only one
4. Any number
585 Who owns the Project Management Plan (PMP)? 1. The project team.
2. The chief executive.
3
3. The project manager.
4. The project support office.
586 The number of states in a machine M recognizing L1UL2 will be __________________ 1.
where n is the number of states in M1 and m is the number of states in M2 . m-n
2.
m+n
2
3.
m+n+1
4. n-m
587 A Program Counter contains a number 825 and address part of the instruction contains 1.
the number 24. The effective address in the relative address mode, when an instruction is 849
read from the memory is
2.
850
2
3.
801
4.
802
588 How many two state FA can be drawn over alphabet{0,1} which accepts(0+1)* 1.
12
2.
14
3
3.
20
4. 15
When there is more than one final
state in the reduced FA, then its
regular expression will
contain _________ operator surely
589 When there is more than one final state in the reduced FA, then its regular expression will 1. dot
contain _________ operator surely 2. binary +
4
3. star
4. unary +
590 When an instruction is read from the memory, it is called 1.
Memory Read cycle
2.
Fetch cycle
3
3.
Instruction cycle
4.
Memory write cycle
591 A data structure where elements can be added or removed at either end but not in the 1.linked lists 2.Stacks 3.Queues 4.Deque
4
middle
592 The Epsilon-Closure of any state q will contain the state ______________ irrespective of q. 1. p
2. Epsilon
3
3. q
4. Final State
593 The minimum length for strings in the regular expression ( 10* + 001* )* is _________ 1. Infinite
2. One
3
3. Zero
4. Two
594 A variable P is called pointer if 1.P contains the address of an element in DATA 2.P contain the DATA and the
address of DATA 3.P can store only memory addresses 4.P points to the address of 1
first element in DATA
595 Which of the following regular expression denotes a language comprising of all possible 1. (aaa+ab+a)+(bbb+bb+a)
strings over {a,b} of length n where n is a multiple of 3? 2.
((a+b) (a+b) (a+b))*
3. 2
(aaa+bbb)*
4.
(a+b+aa+bb+aba+bba)*
596 Let G(x) be the generator polynomial used for CRC checking. What is the condition that 1.
should be satisfied by G(x) to detect odd number of bits in error? G(x) contains more than two terms
2.
G(x) does not divide 1+x^k, for any k not exceeding the frame length
3
3.
1+x is a factor of G(x)
4.
G(x) has an odd number of terms.
597 What is the data structures used to perform recursion? 1.list 2.queue 3.stack 4.Tree 3
598 The restriction while using the binary search is ? 1.List should be small in number 2.List should be large in number 3.List should be
3
sorted 4.No restriction
599 Which Data structure is best suited for the UNDO operation in Windows 1.Both Stack and Queues 2.Queues 3.Stack 4.Arrays 3
600 Which of the following logic expression is incorrect? 1.
1⊕0=1
2.
1 ⊕ 1 ⊕ 0 =1
2
3.
1⊕1⊕1=1
4.
1⊕1=0
601 Effective software project management focuses on four P's which are 1. people, product, process, project
2. people, product, performance, process
1
3. people, performance, payoff, product
4. people, process, payoff, product
602 The difference between linear array and a record is 1.A record form a hierarchical structure but a linear array does not 2.All of above 3.
An array is suitable for homogeneous data but the data items in a record may have
3
different data type 4.In a record, there may not be a natural ordering in opposed to
linear array
603 Consider the regular language L = (111 + 11111)*. The minimum number of states in any 1.
DFA accepting the language is 3
2.
5
4
3.
8
4. 9
604 The postfix expression for * + a b - c d is? 1.ab + cd - * 2.ab + cd * - 3.ab + - cd * 4.ab cd + - * 1
605 What is the recommended distribution of effort for a software project? 1. 50-20-30
2. 50-30-20
4
3. 30-40-30
4. 40-20-40
606 Which of the following algorithm design technique is used in the quick sort algorithm? 1.Greedy method 2.Backtracking 3.Divide and conquer 4.Dynamic programming 3
607 State the acronym of POMA in software project management 1. Project Organization Monitoring Adopting
2. Planning Origanizing Monitoring Adjusting
2
3. project oriented maintenance and administration
4. Project Orientation Mapping Adjusting
608 You have to sort a list L consisting of a sorted list followed by a few “random” elements. 1.Bubble sort 2.Selection sort 3.Quick sort 4.Insertion sort
4
Which of the following sorting methods would be especially suitable for such a task?
609 Which one of the following connects high-speed high-bandwidth device to memory 1.
subsystem and CPU. expansion bus
2.
PCI bus 1
3.
SCSI bus
4.
none of the mentioned
610 Which one of the following statements best defines the purpose of a Product Breakdown 1. To identify the health and safety strategies and procedures to be used on the
Structure (PBS)? project
Which one of the following statements 2. To establish the extent of work required prior to project commissioning and the
best defines the purpose of a Product handover
4
3. To define how the products are produced by identifying derivations and
Breakdown dependencies
Structure (PBS)? 4. To define the hierarchy of deliverables that are required to be produced on the
project
611 Simplified form of the boolean expression (X + Y + XY) (X + Z) is 1.
X+Y+Z
2.
XY + YZ
3
3.
X + YZ
4.
XZ + Y
612 Specify the 2 library functions to dynamically allocate memory? 1. malloc() and calloc()
2. malloc() and memalloc()
1
3. alloc() and memalloc()
4. memalloc() and faralloc()
613 During a software development project two similar requirements defects were detected. 1. There is no relationship between the phase in which a defect is discovered and its
One was detected in the requirements phase, and the other during the implementation repair cost. .
phase. Which of the following statements is mostly likely to be true? 2. The most expensive defect to correct is the one detected during the implementation
phase. 2
3. The most expensive defect to correct is the one detected during the requirements
phase.
4. The cost of fixing either defect will usually be similar.
614 An unambiguous grammar has 1. Exactly one leftmost derivation for a string w
4. nondeterministic TM to deterministic TM
623 The minimum number of arithmetic operations required to evaluate the polynomial P(X) 1.6 2.7 3.8 4.9
2
=X^5+4X^3+6^X+5 for a given value of X using only one temporary variable.
624 Write the regular expression to denote the language L over ? ={ a,b} such that all the 1. a*b*
string do not contain the substring “ ab”. 2. b*a*
24 x
3. (ab)*
4. (ba)*
625 How many nodes in a tree have no ancestors. 1.2 2.n 3.1 4.0 3
626 Which of the following regular expression identities are true? 1. r* s* = r* + s*
2. (r + s)* = (r*s*)*
2
3. (r + s)* = r* + s*
4. (r + s)* = r* s*
627 The number of components in a graph with n nodes and 1 edge are 1.n 2.n-2 3.n-1 4.n-3 3
628 The number of components in a graph with n nodes and 1 edge are 1.n 2.n-2 3.n-1 4.n-3 3
629 Consider two strings A ='qpqrr' and B = 'pqprqrp'. Let x be the length of the LCS 1.42 2.34 3.32 4.30
between A and B and let y be the number of such longest common subsequences between A
and B. Then x + 10y = 34 2
630 A grammar that produces more than one parse tree for some sentence is called 1.Ambiguous 2.Irregular 3.Regular 4.Unambiguous 1
631 Pee hole optimization 1.Local optimization 2.Loop optimization 3.Constant folding 4.Data flow analysis 3
632 Using linked list node representation, inserting a node in general tree is performed 1.not possible 2.by merging with an existing node 3.after introducing a new link 4.
2
efficently after converting to binary tree
merging
633 The 16-bit 2’s complement representation of an integer is 1111 1111 1111 0101, its decimal 1.
representation is 1
2.
2
4
3.
3
4.
-11
634 The cyclomatic complexity metric provides the designer with information regarding the 1.
number of cycles in the program
2.
errors in the program
3.
4
independent logic paths in the program
4.
statements in the program
635 In operator precedence parsing , precedence relations are defoned 1.To delimit the handle 2.For all pair of terminals 3.For all pair of non terminals 4.
3
Only for a certain pair of terminals
636 If the associativity of a processor cache is doubled while keeping the capacity and block 1.
size unchanged, which one of the following is guaranteed to be NOT affected? Width of tag comparator
2.
Width of set index decoder
4
3.
Width of way selection multiplexer
4.
Width of processor to main memory data bus
637 An intermediate code form is 1.Postfix notation 2.Syntax trees 3.Three address code 4.Postfix notation, Syntax
4
trees and Three address code
638 Relocating bits used by relocating loader are specified by 1.Relocating loader itself 2.Linker 3.Assembler 4.Macro processor 2
639 The tightest upper bound for the worst case performance of quicksort implemented on an 1.T(n! logn) 2.O(n logn) 3.O(n^2) 4.O(n^3)
3
array of n elements by always chosing the pivot as the central element is
640 Synthesized attribute can be easily simulated by a 1.LR grammar 2.Ambiguous grammar 3.LL grammar 4.LF grammer 1
641 Any code inside a loop that always computes the same value can be moved before the loop. 1.Loop invariant computation 2.Interchange of statements 3.inducation variable 4.
1
This is called Algebraic Transformation
642 which of the following intermediate language can be used in intermediate code generation? 1.Postfix notation and Three address code 2.Quadraples 3.Triples 4.Infix notation and
132 x
two address code
643 Postorder Tree travsersal is recursive 1.LDR 2.LRD 3.DLR 4.DRL 2
644 In the context of abstract-syntax-tree (AST) and control-flow-graph (CFG), which one of 1.In both AST and CFG, let node N2 be the successor of node N1. In the input
the following is True? program, the code corresponding to N2 is present after the code corresponding to N1
2.For any input program, neither AST nor CFG will contain a cycle 3.Each node in
4
AST and CFG corresponds to at most one statement in the input program 4.The
maximum number of successors of a node in an AST and a CFG depends on the
input program
645 In an array representation of binary tree, the left child of i th node is located at 1.2i+2 2.(i-1)/2 3.(i-2)/2 4.2i+1 4
646 In an array representation of binary tree, the right child of i th node is located at 1.(i-2)/2 2.(i-1)/2 3.2i+2 4.2i+1 3
647 Local and loop optimization in turn provide motivation for 1.Peephole optimization 2.DFA and Constant folding 3.Basic Code Analysis 4.Data
flow analysis 4
.
648 In a syntax directed translation schema ,if value of an attribute of a node is function of the 1.Inherited attributes 2.Synthesized attributes 3.Canonical atrributes 4.Derived
2
values of the attributes of its children , then it is called atrributes
649 Minterms are arranged in map in a sequence of 1.
binary sequence
2.
gray code 2
3.
binary variables
4.
BCD code
650 Suppose a circular queue of capacity (n – 1) elements is implemented with an array of n 1.Full: (FRONT+1) mod n == REAR, empty: REAR == FRONT
elements. Assume that the insertion and deletion operation are carried out using REAR 2.Full: REAR == FRONT, empty: (REAR+1) mod n == FRONT
4
and FRONT as array index variables, respectively. Initially, REAR = FRONT = 0. The 3.Full: (REAR+1) mod n == FRONT, empty: (FRONT+1) mod n == REAR
conditions to detect queue full and queue empty are 4.Full: (REAR+1) mod n == FRONT, empty: REAR == FRONT
651 Condition testing is a control structure testing technique where the criteria used to design 1.
test cases is that they
rely on basis path testing
2.
1
exercise the logical conditions in a program module
3.
select test paths based on the locations and uses of variables
4.
focus on testing the validity of loop constructs
652 A friend function to a class A cannot access 1. the data members of the derived class of A.
2. public data members and member functions.
1
3. protected data members and member functions.
4. private data members and member functions.
653 Which one of the following is the recurrence equation for the worst case time complexity of 1.T(n)=2T(n/2)+cn 2.T(n)=T(n–1)+T(0)+cn 3.T(n)=T(n/2)+cn 4.T(n)=2T(n–2)+cn
the Quicksort algorithm for sorting n>=2 numbers? In the recurrence equations given in 1
the options below, c is a constant.
654 Waterfall model of software development is also termed as 1.
The linear sequential model
2.
Fountain model
1
3.
Spiral model
4.
Concurrent development model
655 Which searching technique is better, if unsorted array is given as input 1.Radix search 2.Linear search 3.Binary search 4.Indexd sequential search 2
656 What will be the output of the following code #include void main() { int i; int a[3]=5; for 1. 0 0 5
(i=2;i>=0;i--) { printf(?%d\n?,a[i]); } } 2. 5 0 0
3
3. 5 garbage garbage
4. 5 null null
657 Which of the following tree may have smaller elements in its left subtree and larger 1.B+ Tree 2.AVL Tree 3.Binary tree 4.Binary search Tree
4
element in its right subtree
658 Variables inside parenthesis of functions declarations have _______ level access. 1. Local
2. Global
1
3. Module
4. Universal
659 Which of the following statements is/are TRUE for an undirected graph?P:Number of odd 1.P Only 2.Q Only 3.Both P and Q 4.Neither P nor Q
1
degree vertices is even,Q: Sum of degrees of all vertices is even
660 What is the worst case for Selection sort 1.O(log n) 2.O(2n) 3.O(n) 4.O(n^2) 4
661 Consider a software program that is artificially seeded with 100 faults. While testing this 1.
program, 159 faults are detected, out of which 75 faults are from those artificially seeded 121
faults. Assuming that both are and seeded faults are of same nature and have same 2.
distribution, the estimated number of undetected real fault is 175
4
3.
432
4.
428
662 System reactions to external events is depicted by 1.
State diagram
2.
Activity diagram
1
3.
Usecase diagram
4.
Sequence diagram
663 The postfix form of the expression (A+ B)*(C*D- E)*F / G is 1.AB + CD* E - *F *G / 2.AB + CD* E - F **G / 3.AB+ CD*E - FG /** 4.AB +
3
CDE * - * F *G /
664 Consider the following array of elements. {89,19,50,17,12,15,2,5,7,11,6,9,100}.The 1.4 2.2 3.5 4.3
4
minimum number of interchanges needed to convert it into a max-heap is
665 Extreme Programming process model includes framework activities such as 1.
analysis, design,coding,testing
2.
planning,analysis,design,coding
4
3.
planning,analysis,coding,testing
4.
planning, design, coding, testing
666 Which of the following algorithm is used to find the shortest path between two nodes in 1.Dijiktra's algorithm 2.Prim's algorithm 3.Kruskal's algorithm 4.Merge algorithm
1
graph
667 Which of the following case does not exist in complexity theory? 1.Average case 2.Worst case 3.Best case 4.Null case 4
668 Important capability needed for an agile software developer is 1.
Trust
2.
Competence
3
3.
Decision-making
4.
HardworkKey
669 Which of the following is the insertion operator? 1. /*
2. //
4
3. <<
4. >>
670 Given an array that represents elements of arithmetic progression in order. It is also given 1.theta(n) 2.theta(nLogn) 3.theta(Logn) 4.theta(1)
that one element is missing in the progression, the worst case time complexity to find the 3
missing element efficiently is:
671 Overloading involves writing two or more functions with ________ 1.different names and different argument lists 2.different names and the same
argument list 3.the same name and different argument lists 4.the same name and the 4
same argument list
672 In which phase is Agile Modeling(AM) carried out 1.
Analysis
2.
Coding
3
3.
Planning
4.
TestingKey
673 If you assign a default value to any variable in a function prototype's parameter list, then 1. all parameters to the left of that variable must have default values
_____ 2. all parameters to the right of that variable must have default values
2
3. all other parameters in the function prototype must have default values
4. no other parameters in that prototype can have default values
674 The operation of processing each element in the list is known as 1.Sorting 2.Merging 3.Inserting 4.Traversal 4
675 What does the following declaration mean? 1. ptr is array of pointers to 10 integers
int (*ptr)[10];
int (*ptr)[10]; 2. ptr is a pointer to an array of 10 integers
2
3. ptr is an array of 10 integers
4. ptr is an pointer to array
676 Register renaming is done is pipelined processors 1.
As an alternative to register allocation at compile time
2.
For efficient access to function parameters and local variables
3
3.
To handle certain kinds of hazards
4.
As part of address translation
677 Which of the following calls a function named displayName, passing it no actual 1. call displayName
arguments? 2. call displayName ()
4
3. displayName
4. displayName()
678 Consider a binary tree T that has 200 leaf nodes. Then, the number of nodes in T that have 1.199 2.200 3.Any number between 0 and 199 4.Any number between 100 and 200
1
exactly two children are _________.
679 The preorder traversal sequence of a binary search tree is 30,20,10,15,25,23,39,35,42. 1.10,20,15,23,25,35,42,39,30 2.15,10,25,23,20,42,35,39,30
4
Which one of the following is the postorder traversal sequence of the same tree? 3.15,20,10,23,25,42,35,39,30 4.15,10,23,25,20,35,42,39,30
680 If you want to use a class to define objects in many different programs, you should define 1. text
the class in a C++ _____ file 2. source
3
3. header
4. program
681 A software requirements specification (SRS) document should avoid discussing which one 1.
of the following? User interface issues
2.
Non-functional requirements 1
3.
Design specification
4.Interfaces with third party softwareKey
682 How will you free the allocated memory ? 1. delete(var-name);
2. dalloc(var-name);
3
3. free(var-name);
4. remove(var-name);
683 Binary search algorithm can not be applied to 1.sorted linked list 2.sorted binary trees 3.sorted linear array 4.pointer array 4
684 ____________ is the 1st step in the testing process 1.
Analyze results
2.
Plan test
2
3.
Release product
4.
Conduct tests
685 Files whose names end in .h are called _____ files 1. helper
2. header
2
3. handy
4. helping
686 Overloading involves writing two or more functions with ________ 1. different names and different argument lists
2. different names and the same argument list
4
3. the same name and the same argument list
4. the same name and different argument lists
687 The situation when in a linked list START=NULL is 1.overflow 2.underflow 3.housefull 4.saturated 2
688 Which of the following is not a Life-critical System? 1.
Fire Dispatch Systems
2.
Nuclear Reactors
4
3.
Power Utilities
4.
Inventory Management
689 Which of the following name does not relate to stacks? 1.FIFO lists 2.LIFO list 3.Push-down lists 4.Piles 1
690 Two access specifiers in C++ are 1. void and free
2. public and private
2
3. int and double
4. formal and informal
691 BCD to seven segment is a 1. encoder
2. carry look ahead
1
3. comparator
4. decoder
692 This is a software development process model 1.waterfall model 2.
Incremental model
3.
4
Boehm's Spiral model
4.
all
693 The degree sequence of a simple graph is the sequence of the degrees of the nodes in the 1.IV only 2.III and IV 3.I and II 4.II and IV
graph in decreasing order. Which of the following sequences can not be the degree
4
sequence of any graph?I. 7, 6, 5, 4, 4, 3, 2, 1 II. 6, 6, 6, 6, 3, 3, 2, 2 III. 7, 6, 6, 4, 4, 3, 2, 2 IV.
8, 7, 7, 6, 4, 2, 1, 1
694 The smallest element of an array’s index is called its 1.lower bound 2.range
1
D. extract 3.upper bound 4.ion
695 The space factor when determining the efficiency of algorithm is measured by 1.Counting the average memory needed by the algorithm 2.Counting the minimum
memory needed by the algorithm 3.Counting the maximum memory needed by the 3
algorithm 4.Counting the maximum disk space needed by the algorithm
696 The time complexity to build a heap with a list of n numbers is 1.O(n logn) 2.O(n) 3.O(log n) 4.O(n2) 2
697 1. What is the type of software design that defines interfaces between system components? 1.
architectural design
2.
Interface Design
2
3.
component Design
4.
database design
698 Consider the following statements for priority queue : 1.Both S1 and S2 are incorrect 2.S1 is correct and S2 is incorrect 3.Both S1 and S2
S1 : It is a data structure in which the intrinsic ordering of the elements does determine are correct 4.S1 is incorrect and S2 is correct
the result of its basic operations.
4
S2 : The elements of a priority queue may be complex structures that are ordered on one
or several fields.
Which of the following is correct?
699 The library function used to find the last occurrence of a character in a string is 1. strnstr()
2. strrchr()
2
3. laststr()
4. strstr()
700 Suppose you want to delete the name that occurs before 'Vellore' in an alphabetical listing. 1.Circular linked list 2.Dequeue 3.Linked list 4.Doubly linked list
2
Which of the following data structures shall be most efficient for this operation?
701 The efficient data structure to insert/delete a number in a stored set of numbers is 1.Queue 2.Linked list 3.Doubly linked list 4.Binary tree 2
702 What is a type of software design that designs system data structures to be used in a 1.
database? architectural design
2.
interface Design
4
3.
component Design
4.
Database design
703 Prim's algorithm is a method available for finding out the minimum cost of a spanning 1.O(1) 2.O(n*n) 3.O(n logn) 4.O(n)
tree. 3
Its time complexity is given by:
704 Which activity most easily lends itself to incremental design? 1.
User Interfaces
2.
Web Services
3
3.
Enterprise resource planning
4.
Embedded Sofftware
705 The minimum number of NAND gates required to implement the Boolean function. A + 1.
AB' + AB'C is equal to Zero
2.
1
1
3.
4
4.
7
706 Skewed binary trees can be efficiently represented using 1.Arrays 2.Linked lists 3.Stacks 4.Queues 2
707 Acceptance tests are normally conducted by the 1.
developer
2.
end users
2
3.
test team
4.
systems engineers
708 The best reason for using Independent software test teams is that 1.software developers do not need to do any testing
4.
d, b, c, a
712 Consider two processors P1 and P2 executing the same instruction set. Assume that under 1.
identical conditions, for the same input, a program running on P2 takes 25% less time but 1.5
incurs 20% more CPI (clock cycles per instruction) as compared to the program running 2.
on P1 If the clock frequency of P1 is 1GHz, then the clock frequency of P2 (in GHz) is 1.6
2
3.
1.7
4.
1.8
713 A circuit that converts n inputs to 2^n outputs is called 1.
Encoder
2.
Decoder
1
3.
Comparator
4.
Carry Look Ahead
714 Which level of RAID refers to disk mirroring with block striping? 1.
RAID level 1
2.
RAID level 2
1
3.
RAID level 0
4.
RAID level 3
715 To build a mod-19 counter the number of flip-flops required is 1.
3
2.
5
2
3.
7
4.
9
716 The smallest integer than can be represented by an 8-bit number in 2?s complement form 1.
is -256
2.
-128
2
3.
-127
4.
1
717 If the associativity of a processor cache is doubled while keeping the capacity and block 1.Width of tag comparator
size unchanged, which one of the following is guaranteed to be NOT affected?
2.
4
11 address, 8 data lines
3.
12 address, 12 data lines
4.
12 address, 16 data lines
722 Suppose a circular queue of capacity (n ? 1) elements is implemented with an array of n 1.
elements. Assume that the insertion and deletion operations are carried out using REAR full: (REAR+1) mod n==FRONT
and FRONT as array index variables, respectively. Initially, REAR = FRONT = 0. The empty: REAR ==FRONT
conditions to detect queue full and queue empty are 2.
(REAR) mod n==FRONT
empty: REAR ==FRONT
1
3.
(REAR+1) mod n==Rear
empty: REAR ==FRONT
4.
full: (FRONT+1) mod n==FRONT
empty: REAR ==FRONT
723 A one to many relationship (of table A to Table B) is 1.Where each record in table A can have one or more matching records in table B
2.Where each record in table B can have one or more matching records in table A
1
3.Where each record in Table B is required to have a match in table A
2.one that consists of two or more tables that are joined in some way
4
3.one that consists of two or more tables
4.a database that is able to process tables, queries, forms, reports and macros
741 Desirable properties of relational database design include 1.All of the options
2.conceptual level
1
3.logical level
4.physical level
744 ______________is a logical unit of access to a DBMS 1.Transaction
2.Optimization
1
3.Schema
4.Data
745 The RDBMS terminology for a row is 1.attribute
2.relation
he RDBMS terminology for a row 3.degree
is 4
4.tuple
746 An Entity from an ER diagram can be represented in the relational model by a 1.relation
2.domain
1
3.functional dependency
4.single attribute
747 Which one of the following is not the responsibility of the DBA? 1.provide security
2.develop applications
2
3.periodically tunes the database
o(n^2)
792 You have an array of n elements, Suppose you implement quicksort by always choosing 1.O(log n) 2.O(n) 3.O(n^2) 4.O(1)
the central element of the array as the pivot, Then the tightest upper bound for the worst 3
case performance is
793 Architecture of the database can be viewed as 1.
two levels
2.
four levels
3
3.
three levels
4.
one level
794 Suppose P, Q, R, S, T are sorted sequences having lengths 20, 24, 30, 35, 50 respectively. 1.672 2.740 3.358 4.354
They are to be merged into a single sequence by merging together two sequences at a time,
3
The number of comparisons that will be needed in the worst case by the optimal algorithm
for doing this is ____
795 Let P be a QuickSort Program to sort numbers in ascending order using the first element 1.t1=5 2.t1>t2 3.t1<t2< span="" style="box-sizing: border-box;"> </t2<>4.t1=t2
as pivot, Let t1 and t2 be the number of comparisons made by P for the inputs {1, 2, 3, 4, 5} 2
and {4, 1, 5, 3, 2} respectively,Which one of the following holds?
796 If the disk size is 2^30 bytes and block size is 2^12 bytes then find how many such blocks 1.
are there? 2^42
2.
2^18
2
3.
2^360
4.
2^30
797 Which of the following file access method needs a relative block number 'n'? 1.
Contiguous allocation
2.
Linked allocation
3
3.
Direct access
4.
Sequential access
798 In case of entity integrity, the primary key may be 1.not Null
2.Null
1
2.
(2n-1)/2
3
3.2e
4.
pow(e,2)/2
817 Which character function can be used to return a specified portion of a character string? 1.
INSTR
2.
SUBSTRING
3
3.
SUBSTR
4.
POS
818 The UNION SQL clause can be used with… 1.
none of the options
2.
the SELECT clause only
2
3.
the UPDATE clause only
4.
the DELETE and UPDATE clauses
819 Which is a major problem with SQL? 1.
SQL cannot support object-orientation
2.
The same query can be written in many ways, each with vastly different execution
plans. 2
3.
SQL syntax is too difficult for non-computer professionals to use
4.
SQL creates excessive locks within the database
820 Which SQL functions is used to count the number of rows in a SQL query? 1.
Sum
2.
Count
2
3.
Max
4.
ALL
821 The SQL BETWEEN operator 1.
Specifies a range to test
2.
specifies between which tables the data is present
1
3.
specifies the columns between which columns the data is present
4.
None of the options
822 Which date function is used to obtain the date of next Wednesday 1.
NEXT_DAY
2.
LAST_DAY
3
3.
NEXT_DATE
4.
All of the options
823 Insert into Emp(101, ‘XXX’) gives the following error 1.
missing Select keyword
2.
Missing Values
2
3.
both of the errors
4.
No of the errors
824 The following SQL is which type of join: SELECT CUSTOMER_T. CUSTOMER_ID, 1.
ORDER_T. CUSTOMER_ID, NAME, ORDER_ID FROM CUSTOMER_T,ORDER_T ; Equi-join
2.
Natural join
4
3.
Outer join
4.
Cartesian join
825 Which of the following can be a valid column name? 1.
Column
2.
1966_Invoices
3
3.
Catch_#22
4.
#Invoices
826 Which one of the following regular expressions over {0, 1} denotes the set of all strings not 1.
containing 100 as a substring (a) 0*(11)*0* (b) (0*1010)* (c) 0*1*010 (d) 0*(10)*01* a and b
2.
b and c
14 x
3.
only c
4.
only b
827 The number of states in DFA is --------than the number of states in NFA for the same 1.
Language. Greater
2.
less
2
3.
greater equal
4.
equal
828 In a virtual memory environment 1.
segmentation and page tables are stored in the cache and do not add any substantial
overhead
2.
slow down the computer system considerable 1
3.
segmentation and page tables are stored in the RAM
4.
only page table is stored in cache
829 When there are infinite distinguishable strings then there cannot be a ------------- 1.
automata
2.
finite automata
2
3.
regular expression
4.
both finite automata and regular expression
830 A NFA converted to DFA has more than one final state. 1.
True
2.
False
1
3.
may be true
4.
always true
831 If M1 machine recognizing L with n states, then M2 recognizing L* constructed Using 1.
Thompson construction will have ------------- states. n
2.
n+1
2
3.
n+2
4.
n-1
832 When we concatenate two languages L1 and L2 recognized by machine M1 and M2 we 1.
obtain a machine with final state same as that of __________________ M2
2.
M1 and M2
2
3.
M1
4.
M1 or M2
833 The intersection of CFL and regular language 1.
Is always regular and context free
2.
Is always regular
3
3.
Is always context free
4.
Need not be regular
834 Consider S->SS|a what is the number of different derivation trees for aaaaa 1.
5
2.
3
3
3.
14
4.
7
835 Which is not part of the waterfall method? 1.
Requirements Definition
2.
System and Software Design
4
3.
Implementation and Unit Testing
4.
System Validation
836 What is based on the idea of developing an initial implementation, exposing this to user 1.
comment and evolving it through several versions until an adequate system has been The Waterfall Method
developed? 2.
Incremental Development
2
3.
Reuse-oriented Software Engineering
4.
Implementation And Unit Testing
837 If all page frames are initially empty, and a process is allocated 3 page frames in real 1.
memory and references its pages in the order 1 2 3 2 4 5 2 3 2 4 1 and the page replacement 10
is FIFO, the total number of page faults caused by the process will be __________ 2.
7
4
3.
8
4.
9
838 This software process model takes the fundamental activities of specification, development, 1.
validation, and evolution and represents them as separate process phases such as Incremental development
requirements specification, software design, implementation, testing, and so on 2.
The waterfall model
2
3.
Reuse-oriented software engineering
4.
Boehm's spiral model
839 Which statement best describes a benefit of Incremental development over the waterfall 1.
model It is possible to gather more of the requirements up front
2.
Time to market is faster because there is less overhead
3
3.
It is easier to get customer feedback on the development work that’s been done
4.
It is easier to reuse existing components.
840 _________ memory management scheme will produce least fragement 1.
Best Fit
2.
Worst Fit
1
3.
First Fit
4.
None of these
841 Replace the page that has not be used for the longest period of time. This principle is 1.
adopted by ____________ FIFO Page replacement algorithm
2.
Optimal Page replacement algorithm
4
3.
Round robin scheduling algorithm
4.
LRU Page replacement algoorithm
842 In incremental development system structure tends to ______ as many new increments are 1.
added. degrade
2.
improve
1
3.
develop its own AI
4.
shrink
843 A computer on a 10Mbps network is regulated by a token bucket. The token bucket is 1.
filled at a rate of 2Mbps. It is initially filled to capacity with 16Megabits. What is the 1.6 seconds
maximum duration for which the computer can transmit at the full 10Mbps? 2.
2 seconds
2
3.
5 seconds
4.
8 seconds
844 In incremental delivery the ________ services are typically delivered first 1.
quickest to complete
2.
highest-priority
2
3.
cheapest
4.
most fun to code
845 A page fault occurs 1.
when the page is not in the main memory
2.
when the page is in the cache memory
1
3.
when the process enters the blocked state
4.
when the process is in the ready state
846 Which of the following system calls results in the sending of SYN packets? 1.
socket
2.
bind
4
3.
listen
4.
connect
847 In the slow start phase of the TCP congestion control algorithm, the size of the congestion 1.
window ..................... does not increase
2.
increases linearly
4
3.
increases quadratically
4.
increases exponentially
848 If a class B network on the Internet has a subnet mask of 255.255.248.0, what is the 1.
maximum number of hosts per subnet? 1024
2.
1023
3
3.
2046
4.
2047
849 Software specifications are intended to communicate the system needs 1.
__________________ of the developers to the clients
2.
to marketing
3
3.
of the clients to the developers
4.
to the general public
850 Activities such as documentation and software configuration management are what kind 1.
of process activities? Primary
2.
Validation
4
3.
Design
4.
supporting
851 An organization has a class B network and wishes to form subnets for 64 departments. The 1.
subnet mask would be: 255.255.0.0
2.
255.255.64.0
4
3.
255.255.128.0
4.
255.255.252.0
852 What is a software process model? 1.
A simplified representation of a software process
2.
A presentation put together in Powerpoint
1
3.
A work flow model of the software’s components
4.
A prototype of the final software product
853 Routine is not loaded until it is called. All routines are kept on disk in a relocatable load 1.
format. The main program is loaded into memory & is executed. This type of loading is Static loading
called _________ 2.
Dynamic loading
3
3.
Dynamic linking
4.
Overlays
854 The result evaluating the postfix expression (10 5 + 60 6 / * 8 –) is 1.284 2.142 3.213 4.71 2
855 Packets of the same session may be routed through different paths in: 1.
TCP, but not UDP
2.
TCP and UDP
2
3.
UDP, but not TCP
4.
Neither TCP nor UDP
856 The address resolution protocol (ARP) is used for: 1.
Finding the IP address using DNS
2.
Finding the IP address of the default gateway
4
3.
Finding the IP address that corresponds to a MAC address
4.
Finding the MAC address that corresponds to an IP address
857 The removal of process from active contention of CPU and reintroduce them into memory 1.
later is known as ____________ Interrupt
2.
Swapping
2
3.
Signal
4.
Thread
858 Paging _________ 1.
solves the memory fragmentation problem
2.
allows modular programming
1
3.
allows structured programming
4.
avoids deadlock
859 Which of the following memory allocation scheme suffers from External fragmentation? 1.
Segmentation
2.
Pure Demand Paging
1
3.
swapping
4.
paging
860 One of the header fields in an IP datagram is the Time to Live (TTL) field. Which of the 1.
following statements best explains the need for this field? It can be used to priortize packets
2.
It can be used to reduce delays
4
3.
It can be used to optimize throughput
4.
It can be used to prevent packet looping
861 A system uses FIFO policy for page replacement. It has 4 page frames with no pages 1.
loaded to begin with. The system first accesses 100 distinct pages in some order and 196
accesses the same 100 pages but now in the reverse order how many page faults will occur? 2.
192
1
3.
197
4.
195
862 What will be the status of a computer during storage compaction 1.
High paging activity
2.
Thrasing happens
4
3.
Working set model developed
4.
It will sit idle
863 A layer-4 firewall cannot 1.
block HTTP traffic during 9:00PM and 5:00AM
2.
block all ICMP traffic
3. 1
stop incoming traffic from a specific IP address but allow outgoing traffic to same IP
4.
block TCP traffic from a specific user on a specific IP address on multi-user system
during 9:00PM and 5:00AM
864 Consider an instance of TCP’s Additive Increase Multiplicative Decrease(AIMD) 1.
algorithm where the window size at the start of the slow start phase is 2 MSS and the 8 MSS
threshold at the start of the first transmission is 8 MSS. Assume that a time out occurs 2.
during the fifth transmission. Find the congestion window size at the end of the tenth 14 MSS
3
transmission. 3.
7 MSS
4.
12 MSS
865 The MMU (Memory Management Unit) is a 1.
Hardware
2.
Software
1
3.
Firmware
4.
Malware
866 Which of the following is true? 1.
Segmentation is faster than paging
2.
Paging is faster than segmentation
2
3.
Pages are unequal sized pieces
4.
Segments are equal sized pieces
867 Which question no longer concerns the modern software engineer? 1.
Why does computer hardware cost so much?
2.
Why does software take a long time to finish?
1
3.
Why does it cost so much to develop a piece of software?
4.
Why can't software errors be removed from products prior to delivery?
868 Today the increased power of the personal computer has brought about an abandonment 1.
of the practice of team development of software True
2. 1
false
3. 4.
869 Software is a product and can be manufactured using the same technologies used for other 1.
engineering artifacts. True
2. 2
False
3. 4.
870 Change cannot be easily accommodated in most software systems, unless the system was 1.
designed with change in mind. True
2. 1
False
3. 4.
871 The linear sequential model of software development is 1.
A reasonable approach when requirements are well defined.
2.
A good approach when a working program is required quickly.
1
3.
The linear sequential model of The best approach to use for projects with large development teams.
software development is 4.
An old fashioned model that cannot be used in a modern context.
872 The linear sequential model of software development is also known as the 1.
Classical life cycle model
2.
Spiral model
3
3.
Waterfall model
4.
Incremental Model
873 Data Members of the base class that are marked private: 1.does exist in memory when the object of the derived class is created 2.exist in
memory when the object of the derived class is created
4
the derived class 3.are visible in the derived class 4.are directly accessible in the
derived class
874 The incremental model of software development is 1.
A reasonable approach when requirements are well defined.
2.
A good approach when a working core product is required quickly.
2
3.
The best approach to use for projects with large development teams.
4.
A revolutionary model that is not used for commercial products.
875 The rapid application development model is 1.
Another name for component-based development.
2.
Another name for component-based development.
3
3.
A high speed adaptation of the linear sequential model.
4.
ALL
876 Given the code 1.
String s1 = ? VIT? ; s1 == s2
String s2 = ? VIT ? ; 2.
String s3 = new String ( s1); s1 = s2
13
Which of the following would equate to true? 3.
s3 == s1
4.
s3=s1
877 ____________ is referred to as Static Web 1.
Web 1.0
2.
Web 2.0
1
3.
Web 3.0
4.
Web 4.0
878 How do you write "Hello World" in PHP? 1.
using System.out.println
2.
using Document.Write("Hello World")
4
3.
"Hello World"
4.
using echo("Hello World")
879 What does JSP stand for? 1.
Java Scripting Pages
2.
Java Service Pages
3
3.
Java Server Pages
4.
Java Script Program
880 What are the parameters of the service method? 1.
ServletRequest and ServletResponse
2.
HttpServletRequest and HttpServletResponse
2
3.
HttRequest and HttpResponse
4.
Request and Response
881 Which of these methods has no restrictions on content size when a form is submitted. 1.
GET
2.
HEAD
3
3.
POST
4.
PUT
882 The following function computes the maximum value contained in an integer array 1.
p[ ] of size n (n >= 1). a != n
int max(int *p, int n) { 2.
int a=0, b=n-1; b != 0
while (__________) { 3.
if (p[a] <= p[b]) { a = a+1; } b > (a+1) 4
else { b = b-1; } 4.
} b != a
return p[a];
}
The missing loop condition is
883 Consider the following recursive C function. 1.
Void get (int n) 15
{if (n<1) return; 2.
get (n-1) 25
2
get (n-3) ; 3.
printf ("%d",n); 43
If get(6) function is being called in main () then how many times will the get() function be 4.
invoked before returning to the main ( ) ? 24
884 Which of the following is/are example(s) of stateful application layer protocols? 1.
(i)HTTP (i) and (ii) only
(ii)FTP 2.
(iii)TCP (ii) and (iii) only
3
(iv)POP3 3.
(ii) and (iv) only
4.
(iv) only
885 What will be the output of the following C program? 1.
void count(int n){ 312213444
static int d=1;
printf("%d ", n); 2.
printf("%d ", d); 312111222
d++; 3.
1
if(n>1) count(n-1); 3122134
printf("%d ", d);
} 4.
void main(){ 3121112
count(3);
}
886 Consider the following program: 1.
int f(int *p, int n) 1
{ 2.
if (n <= 1) return 0; 2
else return max ( f (p+1, n-1),p[0]-p[1]); 3.
} 3
3
int main() 4.
{ 4
int a[] = {3,5,2,6,4};
printf("%d", f(a,5));
}
The value printed by this program is
887 To prevent any method from overriding, the method has to declared as, 1.
static
2.
const
3
3.
final
4.
extends
888 A Search engine can serve as 1.
both as a server and a client
2.
As Client always
1
3.
As Server always
4.
Neither client nor server
889 Consider the function func shown below: 1.
int func(int num) { 7
int count = 0; 2.
while (num) { 8
count++; 3.
3
num>>= 1; 9
} 4.
return (count); 0
}
The value returned by func(435)is
890 Which one is the first search engine in internet? 1.
Google
2.
Archie
2
3.
AltaVista
4.
WAIS
891 Sockets originate from 1.
BSD Unix
2.
Windows
1
3.
Linux
4.
Mac
892 What will be printed as the output of the following program? 1.
public class testincr I=0
{ 2.
public static void main(String args[]) I=1
{ 3.
2
int i = 0; I=2
i = i++ + i; 4.
System.out.println(" I = " +i); I=3
}
}
893 Which transmission media has the highest transmission speed in a network? 1.
coaxial cable
2.
twisted pair cable
3
3.
optical fiber
4.
electrical cable
894 Bits can be send over guided and unguided media as analog signal using ......................... 1.
digital modulation
2.
amplitude modulation
Bits can be send over guided and unguided 1
media as analog signal using ..................... 3.
frequency modulation
4.
phase modulation
895 An object of class A receives a message with an argument that is an instance of class B. 1.
Identify the type of relationship between class A and Class B: Generalization
2.
Association
1
3.
Aggregation
4.
Realization
896 A graphical HTML browser resident at a network client machine Q accesses a static 1.
HTML webpage from a HTTP server S. The static HTML page has exactly one static Q needs to send at least 2 HTTP requests to S, each necessarily in a separate TCP
embedded image which is also at S. Assuming no caching, which one of the following is connection to server S
correct about the HTML webpage loading (including the embedded image)? 2.
Q needs to send at least 2 HTTP requests to S, but a single TCP connection to server
S is sufficient
2
3.
A single HTTP request from Q to S is sufficient, and a single TCP connection
between Q and S is necessary for this
4.
A single HTTP request from Q to S is sufficient, and this is possible without any TCP
connection between Q and S
897 Consider the following function written the C programming language. 1.
void foo (char * a ) { ABCD EFGH
if (* a & & * a ! =' ' ){
putchar (*a); 2.
} ABCD
} 1
} 3.
The output of the above function on input 'ABCD EFGH' is HGFE DCBA
4.
DCBA
898 Given the following structure template, choose the correct syntax for accessing the 5th 1.
subject marks of the 3rd student: stud[2].marks[4]
struct stud
{ 2.
int marks[6]; stud[4].marks[2]
3
char sname[20];
char rno[10]; 3.
}s[10]; s[2].marks[4]
4.
s[4].marks[2]
899 The portion of physical layer that interfaces with the media access control sublayer is 1.
called physical signalling sublayer
2.
physical data sublayer
1
3.
physical address sublayer
4.
none of the mentioned
900 Consider the following program: 1.
int f(int *p, int n) 2
{ 2.
if (n <= 1) return 0; 1
else return max ( f (p+1, n-1),p[0]-p[1]); 3.
} 3
3
int main() 4.
{ 4
int a[] = {3,5,2,6,4};
printf("%d", f(a,5));
}
The value printed by this program is
901 Physical layer provides 1.
mechanical specifications of electrical connectors and cables
2.
electrical specification of transmission line signal level
4
3.
specification for IR over optical fiber
4.
all of the mentioned
902 The physical layer is responsible for 1.
line coding
2.
channel coding
4
3.
modulation
4.
all of the mentioned
903 Calculate the EAT(Effective access time) if 5 micro second is associative look-up time and 1.
0.80 is the hit-ratio in paging hardware with TLB 6.2 micro second
2.
7.8 micro second
3
3.
2.2 micro second
4.
3.2 micro second
904 In asynchronous serial communication the physical layer provides 1.start and stop signalling
2.flow control
3
3.both (a) and (b)
2. 4
Develop defect free computer-based systems
3.
Verify the correctness of computer-based systems
4.
ALL
907 Which is not related to deadlock avoidance? 1.
Safe State
2.
Unsafe State
3
3.
Safe Sequence
4.
Resource sequence
908 The ____ translates internet domain and host names to IP address. 1.
domain name system
2.
routing information protocol
1
3.
network time protocol
4.
internet relay chat
909 Application layer protocol defines 1.
types of messages exchanged
2.
message format, syntax and semantics
4
3.
rules for when and how processes send and respond to messages
4.
all of the mentioned
910 Which of the following traits need to exist among the members of an agile software team? 1.
Competence
2.
Decision-making ability
3.
4
Mutual trust and respect
4.
ALL
911 Which one of the following allows a user at one site to establish a connection to another site 1.
and then pass keystrokes from local host to remote host? HTTP
2.
FTP
3
3.
telnet
4.
none of the mentioned
912 A single channel is shared by multiple signals by 1.
analog modulation
2.
digital modulation
3
3.
multiplexing
4.
none of the mentioned
913 Wireless transmission can be done via 1.
radio waves
2.
microwaves
4
3.
infrared
4.
all of the mentioned
914 Which one of the following is not the process of Deadlock Recovery? 1.
Killing a process
2.
Rollback to the previous state
4
3.
Selecting a Victim
4.
Delaying the process
915 Which of the following is not one of Hooker's core principles of software engineering 1.
practice? All design should be as simple as possible, but no simpler
2.
A software system exists only to provide value to its users.
3. 3
Pareto principle (20% of any product requires 80% of the effort)
4.
begin design
918 When displaying a web page, the application layer uses the 1.
HTTP protocol
2.
FTP protocol
1
3.
SMTP protocol
4.
IMAP Protocol
919 Which one of the following protocol delivers/stores mail to reciever server? 1.
simple mail transfer protocol
2.
post office protocol
1
3.
internet mail access protocol
4.
hypertext transfer protocol
920 The ASCII encoding of binary data is called 1.
base 64 encoding
2.
base 32 encoding
1
3.
base 16 encoding
4.
base 8 encoding
921 Which protocol is a signalling communication protocol used for controlling multimedia 1.
communication sessions? session initiation protocol
2.
session modelling protocol
1
3.
session maintenance protocol
4.
none of the mentioned
922 Which one of the following is not an application layer protocol? 1.
media gateway protocol
2.
dynamic host configuration protocol
3
3.
resource reservation protocol
4.
session initiation protocol
923 If the size of logical address space is 2 to the power of m, and a page size is 2 to the power 1.
of n addressing units, then the high order _____ bits of a logical address designate the page m,n
number, and the ____ low order bits designate the page offset. 2.
n,m
4
3.
m-n,m
4.
m-n,n
924 Which of the following activities is not one of the four things that need to be accomplished 1.
by the generic planning task set?
Develop overall project strategy
2.
4
Identify the functionality to deliver in each software increment
3.
Create a detailed schedule for the complete software project
4.
2.
1
class.forName()
3.
createStatement()
4.
getConnection()
928 Which of the following input controls that cannot be placed using <input> tag? 1.
Text
2.
Password
Which of the following input controls 3.
4
that cannot be placed using <input> tag? Submit
4.
Textarea
929 Which of the following in HTML is used to left align the content inside a table cell? 1.
<td raligh = "left" >
2.
<tdleft>
4
3.
<td leftalign>
4.
<td align = "left">
930 WiMAX provides 1.
simplex communication
2.
half duplex communication
2
3.
full duplex communication
4.
none of the mentioned
931 WiMAX uses the 1.
orthogonal frequency division multiplexing
2.
time division multiplexing
1
3.
space division multiplexing
4.
all of the mentioned
932 Which of the following operators has an associativity from Right to Left? 1.+= 2.== 3.<< 4.<= 3
933 ElGamal encryption system is 1.
symmetric key encryption algorithm
2.
asymmetric key encryption algorithm
2
3.
not an encryption algorithm
4.
none of the mentioned
934 WHICH OF THE BELOW IS NOT AN EMAIL PROTOCOL? 1. SMTPMP
2. IMAP
4
3. POP
4. SNMP
935 Which of the following statements explains portabililty in non-functional requirements? 1.
It is a degree to which software running on one platform can easily be converted to
run on another platform.
2.
It can be enhanced by using languages, OS’ and tools that are universally available
and standardized.
3. 1
The ability of the system to behave consistently in a user-acceptable manner when
operating within the environment for which the system was intended.
4.
It is a degree to which software running on one platform can easily be converted to
run on another platform as well as It can be enhanced by using languages, OS’ and
tools that are universally available and standardized.
936 The spiral model was originally proposed by 1.
IBM
2.
Barry Boehm
2
3.
Pressman
4.
Royce
937 Which of the following risk is the failure of a purchased component to perform as 1.
expected? Product risk
2.
Project risk
1
3.
Business risk
4.
Programming risk
938 Which of the following suffices to convert an arbitrary CFG to an LL(1) grammar? 1. Removing left recursion alone
2. Factoring the grammar alone
4
3. Removing left recursion and factoring the grammar
4. Removing left recursion, left factoring and ambiguity of the grammar
939 The CFG 1.
s---> as | bs| a | b (a + b)
is equivalent to regular expression 2.
(a + b) (a + b)*
2
3.
(a + b) (a + b)
4.
(a + b) (a + b)(a + b) (a + b)
940 The grammar S → aSa | bS | c is 1.
LL(1) but not LR(1)
2.
LR(1)but not LR(1)
3
3.
Both LL(1)and LR(1)
4.
Neither LL(1)nor LR(1)
941 Consider the following C code segment. 1.
for (i = 0, i<n; i++) The code contains loop invariant computation
{ 2.
for (j=0; j<n; j++) There is scope of common sub-expression elimination in this code
{ 3.
if (i%2) There is scope of strength reduction in this code
{ 4.
4
x += (4*j + 5*i); There is scope of dead code elimination in this code
y += (7 + 4*j);
}
}
}
4.
bd' + c'd' + ab + cd
948 The size of the data count register of a DMA controller is 16 bits. The processor needs to 1.
transfer a file of 29,154 kilobytes from disk to main memory. The memory is byte 454
addressable. The minimum number of times the DMA controller needs to get the control
of the system bus from the processor to transfer the file from the disk to main memory is 2.
455 3
3.
456
4.
457
949 How do we submit form data without a Sumbit button? 1.Using header() function 2.Using Javascript 3.Using fdf_set_submit_form_action()
4
fucntion 4.using header() and javascript
950 When a single item that triggers other data flow along one of many paths of a data flow 1.
diagram, ________ characterizes the information flow.
high coupling
2.
poor modularity 1
3.
transaction flow
4.
transform flow
951 The embedded c program is converted by cross compiler to 1.
the machine code corresponding to the processor of the PC used for application
development
2.
2
the machine code corresponding to a processor which is different from the processor
of the PC used for application development
3.
the machine code for all the microcontrollers
4.
assemble code of the PC used for application development
952 In Assembly language programming, minimum number of operands required for an 1.
instruction is/are Zero
2.
One
1
3.
Two
4.
Three
953 A 4-way set-associative cache memory unit with a capacity of 16 KB is built using a block 1.
size of 8 words. The word length is 32 bits. The size of the physical address space is 4 GB. 19
The number of bits for the TAG field is 2.
20
2
3.
21
4.
22
954 baa*c denotes the set 1. {b^na^mc^p|n,m,p>=1}
2. {ba^nc|n>=0}
3
3. {ba^nc|n>=1}
4. {w|w is a string of a,b,c}
955 Functional requirements of a system is modelled using 1. Use-case Diagram
2. Sequence Diagram
1
3. Class Diagram
4. Package Diagram
956 If the main memory is of 8K bytes and the cache memory is of 2K words. It uses 1.
associative mapping. Then each word of cache memory shall be_____. 11 bits
2.
21 bits
3
3.
16 bits
4.
20 bits
957 The width of the physical address on a machine is 40 bits. The width of the tag field in a 1.
512 KB 8-way set associative cache is ______ bits 21
2.22
4
3.
23
4.
24
958 In software quality assurance work there is no difference between software verification 1.
and software validation. true
2. 2
false
3. 4.
959 The Firmware are stored in read-only memory or ________ chips. 1.
Flash memory
2.
Dynamic random access memory
3
3.
EEPROM
4.
Random-access memory
960 (a+b)(cd)*(a+b) denotes the following set 1.
{a(cd)^nb|n>=1}
2.
{a(cd)^n>=1}U{b(cd)^n|n>=1}
3
3.
{a(cd)^na|n>=0}U{a(cd)^nb|n>=0}U{b(cd)^na|n>=0}U{b(cd)^nb|n>=0}
4. {ac^nd^nb|n>=1}
961 Which of the following statements is/are TRUE for an undirected graph?P:Number of odd 1.P Only 2.Q Only 3.Both P and Q 4.Neither P nor Q
1
degree vertices is even,Q: Sum of degrees of all vertices is even
962 Which of the following is useful in traversing a given graph by breadth first search? 1.List 2.Queue 3.Set 4.Stack 2
963 In excitation table of D flipflop next state is equal to 1.
Next State
2.
Present State
3. 4
Previous State
4.
D State
964 The fundamental notions of software engineering does not account for ? 1. Software reuse
2. Software Security
3
3. Software Validation
4. Software processes
965 Which of the following is not a technology driver for an information system? 1. Collaborative technologies
2. Knowledge asset management
2
3. Enterprise applications
4. Object technologies
966 In linear search algorithm the Worst case occurs when 1.The item is somewhere in the middle of the array 2.The item is not in the array at
all 3.The item is the last element in the array 4.The item is the last element in the 4
array or is not there at all
967 Which is not a proper prototype? 1. double funct(char x)
2. void funct();
1
3. char x();
4. intfunct(char x, char y);
968 Suppose P, Q, R, S, T are sorted sequences having lengths 20,24,30,35,50 respectively. 1.368 2.338 3.348 4.358
They are to be merged into a single sequence by merging together two sequences at a time.
4
The number of comparisons that will be needed in the worst case by the optimal algorithm
for doing this is ____
969 The searching technique that takes O (1) time to find a data is 1.Binary Search 2.Linear Search 3.Tree Search 4.Hashing 4
970 Suppose x is dead, that is, never subsequently used, at the point where the statement x=y+z 1.Common subexpression elimination 2.Dead code elimination 3.Renaming
appears in a basic block. Then this statement may be safely removed without changing the temporary variables 4.Loop invarient 2
value of the basic block. This transformation is known as __________________ .
971 Shift reduce parsers are 1.Vertical parser 2.top down and bottom up parser 3.Bottom up parser 4.Top down
3
parser
972 Cross-compiler is a compiler 1.which is written in a language that is same as the source language. 2.that runs on
one computer but produces object code for different type of computer. 3.that
2
generates object code for its host machine. 4.which is written in a language that is
different from the source language.
973 While inserting the elements 71,65,84,69,67,83 in an empty binary search tree(BST)in the 1.65 2.67 3.83 4.69
2
sequence shown, the element in the lowest level is
974 Given a hash table T with 25 slots that stores 2000 elements, the load factor a for T is_____ 1.80 2.0.0125 3.8000 4.1.25 2
975 Many programmers separate a class into two files: _____ 1. one for the primary functions and one for the auxiliary functions
2. one for the public data and one for the private data
4
3. one for the void functions and one for the other functions
4. one for the declarations and one for the implementations
976 In a connected graph, a bridge is an edge whose removal disconnects a graph. Which one 1.A tree has no bridge 2.A bridge cannot be part of a simple cycle 3.Every edge of a
of the following statements is True? clique with size>=3 is a bridge (A clique is any complete subgraph of a graph) 4.A 4
graph with bridges cannot have a cycle
977 Network models are complicated by physical keys, but the relation model is 1.Slower because it uses logical keys 2.Slower because it uses physical keys 3.Faster
4
because it uses physical keys 4.Faster because it uses logical keys
978 Trigger is a 1.Statement that enables to start any DBMS 2.Statement that is executed by the user
when debugging an application program 3.Statement that is executed automatically
3
by the system as a side effect of a modification to the database 4.Condition the
system tests for the validity of the database user
979 Normalisation of database is used to 1.Minimise Errors 2.Improve Security 3.Eliminate redundancy 4.Improve security 3
980 Given the basic ER and relational models, which of the following is INCORRECT? 1.
An attributes of an entity can have more that one value
2.
An attribute of an entity can be composite
3. 3
In a row of a relational table, an attribute can have more than one value
4.
In a row of a relational table, an attribute can have exactly one value or a NULL
value
981 Foreign Key is 1.
A field in a table that matches a key field in another table
2.
A field in a table that contains data that is also contained elsewhere in another table
1
3.
A key that consists of more than one field
4.
A field in a table that has the same name as a key field in another table
982 In a conceptual model for a university, which of the following could most appropriately be 1.
represented via a recursive relationship? Student credit hours
2.
Course prerequisites
2
3.
Parking sticker assignments
4.
Final exam schedules
983 Which of the following most certainly implies the need for an entire table to implement? 1.
A binary relationship
2.
A ternary relationship
4
3.
A recursive relationship
4.
An identifying relationship
984 _______ produces the relation that has attributes of R1 and R2 1.
Cartesian product
2.
Difference
1
3.
Intersection
4.
Product
985 A relation R is said to be in 2NF when it does not have 1.
Partial Dependencies
2.
Transitive Dependencies
1
3.
Multivalued Attributes
4.
Both Partial dependencies and Multivalued Dependencies
986 Two sets of functional dependencies E and F are equivalent if E+ = F+ .This statement is 1.
True
2.
False 1
3.
Cant Say
4.
987 Cartesian product in relational algebra is 1.
a Unary operator
2.
a Binary operator
2
3.
a Ternary operator
4.
not defined
988 How will you handle the overflow condition of a linked queue through code(note: 1.if(rear==size) 2.if(new_node==0) 3.if(front==size) 4.if(new_node==null)
1
new_node is a newly created node in a memory)
989 What is NOT part of the design process 1.
Architectural design
2.
Database design
4
3.
Component design
4.
Validation testing
990 Which of the following is not a part/product of requirements engineering? 1.
Feasibility study
2.
Requirements validation
4
3.
System models
4.
Architectural design
991 The number of auxiliary memory required for a Push Down Machine (PDM) to behave 1.
like a Finite State Machine (FSM) is 0
2.
2
1
3.
4
4.
1
992 In reuse-oriented software engineering the last stage is _________. 1.
component analysis
2.
requirements modification
3
3.
system validation
4.
system design
993 Thrashing occurs ________ 1.
when excessive swapping takes place
2.
when you thrash your computer
1
3.
whenever deadlock occurs
4.
when no swapping takes place
994 #include 1.
int main () 43
{ 2.
static int a[]={10, 20, 30 40, 50}; 140
static int *p[]= {a, a+3, a+4, a+1, a+2}; 3.
2
int **ptr=p; 89
ptr++; 4.
printf ("%d%d", ptr p, **ptr); 78
}
The output of the program is __________
995 In CMM, the life cycle activities of requirements analysis, design, code, and test are 1. Software Product Engineering
described in 2. Software Quality Assurance
1
3. Software Subcontract Management
4. Software Quality Management
996 A set of documents in which a given document can contain text, graphics video and audio 1.
clips as well as embedded references to other documents world wide web pages are called Hypermedia message
as 2.
--------------- Hypertext document
3
3.
Hypermedia Documents
4.
Path rectangular grid of Pixels
997 Which of the following is not one of the principles of good coding? 1.
Create unit tests before you begin coding
2.
4
3.
4.
Write self-documenting code, not program documentation
998 Mnemonic codes and variable names are used in 1.
Machine language
2.
Assembly language
2
3.
high level language
4.
Used nowhere
999 Consider the following statements 1.
var text = "testing: 1, 2, 3"; // Sample text text==pattern
var pattern = /\d+/g // Matches all instances of one or more digits 2.
In order to check if the pattern matches with the string “text”, the statement is text.equals(pattern)
4
3.
text.test(pattern)
4.
pattern.test(text)
1000 Consider the following javascript statements 1.
x = ~-y; x = ~(-y); w = (x = (y = z));
w = x = y = z; q = a?b:(c?d:(e?f:g));
q = a?b:c?d:e?f:g; 2.
The above code snippet is equivalent to: x = a?b:(c?d:(e?f:g));
q = ~(-y); w = (x = (y = z));
4
3.
x = (x = (y = z));w = ~(-y);
q = a?b:(c?d:(e?f:g));
4.
x = ~(-y); w = (x = (y = z));
q = (c?d:(e?f:g));
1001 The javascript statement a===b refers to 1.
Both a and b are equal in value, type and reference address
2.
Both a and b are equal in value
3
3.
Both a and b are equal in value and type
4.
There is no such statement
1002 Which of these methods has no restrictions on content size when a form is submitted. 1.
GET
2.
HEAD
3
3.
POST
4.
PUT
1003 Consider the following program: 1.
int f(int *p, int n) 1
{ 2.
if (n <= 1) return 0; 2
else return max ( f (p+1, n-1),p[0]-p[1]); 3.
} 3
3
int main() 4.
{ 4
int a[] = {3,5,2,6,4};
printf("%d", f(a,5));
}
The value printed by this program is
1004 The while loop is referred to as a(n) _____ loop because the loop condition is tested at the 1. priming
beginning of the loop 2. pretest
2
3. initial
4. beginning
1005 The word case used in the switch statement represents a 1. global variable in the C++ language
The word case used in the switch statement 2. function in the C++ language
represents a 3. keyword in the C++ language
3
4. data type in the C++ language
1006 Teams using agile software practices never create models. 1.
TRUE
2. 2
FALSE
3. 4.
1007 In HTTP pipelining 1.
multiple HTTP requests are sent on a single TCP connection without waiting for the
corresponding responses
2.
multiple HTTP requests can not be sent on a single TCP connection 1
3.
multiple HTTP requests are sent in a queue on a single TCP connection
4.
none of the mentioned
1008 HTTP client requests by establishing a __________ connection to a particular port on the 1.
server. user datagram protocol
2.
transmission control protocol
2
3.
broader gateway protocol
4.
RIP
1009 FTP server listens for connection on port number 1.
20
2.
21
2
3.
22
4.
23
1010 In FTP protocol, client contacts server using ____ as the transport protocol. 1.
transmission control protocol
2.
user datagram protocol
1
3.
datagram congestion control protocol
4.
stream control transmission protocol
1011 Arrange the operators according to their precedence: +, %, ->, = 1.
->, %, +, =
2.
=, +, %, ->
1
3.
%, +, =, ->
4.
%, ->, =, +
1012 The file transfer protocol is built on 1.
data centric architecture
2.
service oriented architecture
3
3.
client server architecture
4.
peer to peer architecture
1013 Which one of the following is used as the start frame delimeter in ethernet frame? 1.
10101010
2.
10101011
2
3.
00000000
4.
11111111
1014 The entity relationship diagram 1.
depicts relationships between data objects
2.
depicts functions that transform the data flow
1
3.
indicates how data are transformed by the system
4.
indicates system reactions to external events
1015 Which of the following is not an example of infrastructure components that may need to be 1.
integrated into the software architecture? Communications components
2.
Database components
3.
2
Interface components
4.
Memory management components
1016 Pick an incorrect declaration: 1.
1. int x[5]; 1
2. int x[5]={1,2,3,4,5}; 2.
3. int x[5] = {1,2} 2
4
4. int x[]; 3.
3
4.
4
1017 Which one of the following correctly describes the meaning of 'namespace' feature in C++? 1.namespaces provide facilities for organizing the names in a program to avoid name
clashes 2.Namespaces refer to space between the names in a program 3.Namespaces
1
refer to the memory space allocated for names used in a program 4.Namespaces refer
to the space for names.
1018 Which of the following is false for cin? 1.It is a class of which stream is an object. 2.Using cin, the data can be read from
1
user's terminal. 3.It represents standard input. 4.It is an object of istream class.
1019 The members of a class, by default, are 1.private 2.protected 3.public 4.mandatory to specify 3
1020 Which of the following statements is NOT valid about operator overloading? 1.Overloaded operator must have at least one operand of its class type. 2.Only
existing operators can be overloaded. 3.The overloaded operators follow the syntax 3
rules of the original operator. 4.The arity of the operator can be changed
1021 If the class name is X, what is the type of its "this" pointer? 1.X* 2.const X* const 3.X& 4.X* const 3
1022 If a constructor function is defined in private section of a class, then 1.The object cannot be created 2.Only its member functions and friends may declare
objects of the class 3.Only its friends may declare objects of the class 4.Only its 2
member functions may declare objects of the class
1023 Which of the following operator can be overloaded through friend function? 1.-> 2.= 3.( ) 4.* 4
1024 Many of the tasks from the generic task sets for analysis modeling and design can be 1.
conducted in parallel with one another. TRUE
2. 1
FALSE
3. 4.
1025 The system engineering process usually begins with the 1.
detailed view
2.
domain view
3.
1
element view
4.
world view
1026 A process executes the code 1.
fork (); 3
fork (); 2.
fork (); 4
3
The total number of child processes created is 3.
7
4.
8
1027 If class A is friend of class B and if class B is friend of class C, which of the following is 1.Class C is friend of Class A 2.Class A is friend of Class C 3.Class A and Class C
4
true? don’t have any friend relationship 4.Class A and Class C are mutual friends
1028 By following modern system engineering practices simulation of reactive systems is no 1.
longer necessary.
True
2
2.
FALSE
3. 4.
1029 Which of the following (in file scope) leads to a compile-time error? 1.const int a=90; 2.const int f1() { return 100; } 3.int f2() const { return 200; } 4.
3
const int f3( const int i) { return 300;}
1030 The default copy constructor performs 1.Deep Copy 2.Shallow Copy 3.Soft Copy 4.Hard Copy 2
1031 which of the following is an incorrect definition inside a class ? 1.void * operator new(size_t size) { } 2.void * operator new () { } 3.void operator
2
delete(void * ptr) { } 4.int operator ++() { }
1032 Which is the correct CSS syntax? 1.
body:color=black
2.
{body;color:black}
4
3.
{body:color=black(body}
4.
body {color: black}
1033 To link your Web page to a style sheet, you must use the _____ tag 1.
<STYLESHEET>
2.
<STYLE>
3
3.
<link>
4.
<web>
1034 What does the following bit of JavaScript print out? 1.
var a = [1,,3,4,5]; 5, undefined,undefined
console.log([a[4], a[1], a[5]]);
2.
5,3,undefined
1
3.
5,0,undefined
4.
5,null,undefined
1035 Usually a pure virtual function 1.Will be called only to delete an object 2.Is defined only in derived class 3.Will
2
never be called 4.Has complete function body
1036 Which of the following is not the characteristic of constructor? 1.They should be declared in the public section.
4
. 2.They do not have return type. 3.They can not be inherited. 4.They can be virtual.
1037 How many instances of an abstract class can be created? 1.13 2.5 3.1 4.0 4
1038 What will be the result of the expression 13 & 25 1.25 2.38 3.9 4.12 3
1039 In which case is it mandatory to provide a destructor in a class? 1.Class for which copy constructor is defined 2.Class for which two or more than two
objects will be created 3.Almost in every class 4.Class whose objects will be created 4
dynamically
1040 If we create a file by ‘ifstream’, then the default mode of the file is _________ 1.ios :: out 2.ios :: in 3.ios :: app 4.ios :: binary 1
1041 overloading + operator requires return type as object because, 1.reference parameter has to be returned 2.binary addition requires that 3.all
3
overloading functions require that 4.chain of additions
1042 To create an alias Objects have to be passed by 1.address 2.reference 3.value 4.field by field 2
1043 During business process engineering, three different architectures are examined 1.
applications, data, technology infrastructure
2.
communications, organization, financial infrastructure
3.
1
network, database, reporting structure
4.
3.
element software architecture
4.time required for system simulation
1048 The best way to conduct a requirements validation review is to 1.
examine the system model for errors
2.
have the customer look over the requirements
4
3.
send them to the design team and see if they have any concerns
4.
use a checklist of questions to examine each requirement
1049 A stakeholder is anyone who will purchase the completed software system under 1.
development. TRUE
2. 2
False
3. 4.
1050 The job of the requirements engineer is to categorize all stakeholder information in a way 1.
that allows decision makers to choose an internally consistent set of requirements. True
2. 1
False
3. 4.
1051 The nature of collaboration is such that all system requirements are defined by consensus 1.
of a committee of customers and developers. TRUE
2. 2
FALSE
3. 4.
1052 High speed ethernet works on 1.
coaxial cable
2.
twisted pair cable
3
3.
optical fiber
4.
none of the mentioned
1053 Which of these will create a shuffled list? 1.
<ol>
2.
<ul>
1
3.
<dl>
4.
Nested list
1054 <h2 style="color:blue">I am Blue</h2> is ____ way of styling HTML elements 1.
Internal Style
2.
Inline Style
2
3.
External Style
4.
Default
1055 In collaborative requirements gathering, the facilitator 1.
cannot be a member of the software team
2.
cannot be a customer
3.
3
controls and facilitates the process
4.
must be an outsider
1056 The maximum size of payload field in ethernet frame is 1.
1000 bytes
2.
1200 bytes
4
3.
1300 bytes
4.
1500 bytes
1057 What is interframe gap? 1.
idle time between frames
2.
idle time between frame bits
What is interframe gap? 3.
1
idle time between packets
4.
none of the mentioned
1058 The following HTML element helps making animated text 1.
<em>
2.
<ins>
4
3.
<mark>
4.
<marquee>
1059 The work products produced during requirement elicitation will vary depending on the 1.
2.
size of the product being built
2
3.
4.
stakeholders needs
1060 What is cell padding? 1.
Used to separate cell walls from their contents
2.
Used to set space between cells
2
3.
Used to provide width to a cell
4.
Used to merge two cells
1061 What is the correct HTML for making a text input field? 1.
<input type="text">
2.
<textfield>
1
3.
<input type="textfield">
4.
<textinput type="text">
1062 HTTP is implemented over 1.
UDP
2.
TCP
2
3.
SMTP
4.
POP
1063 An ethernet frame that is less than the IEEE 802.3 minimum length of 64 octets is called 1.short frame
2.runt frame
2
3.mini frame
4.man frame
1064 In win-win negotiation, the customer's needs are met even though the developer's need 1.
may not be. TRUE
2. 2
FALSE
3. 4.
1065 Consider the following program in C language: 1.
#include Compilation fails.
main() 2.
{ Execution results in a run-time error.
int i; 3.
3
int *pi = &i; On execution, the value printed is 5 more than the address of variable i
scanf(?%d?,pi); 4.
printf(?%d\n?, i+5); On execution, the value printed is 5 more than the integer value entered
}
Which one of the following statements is TRUE?
1066 _____ is used to define a special CSS style for a group of HTML elements 1.
Class attribute
2.
name attribute
1
3.
group attribute
4.
id attribute
1067 Which of these is a stand alone tag? 1.
form
2.
frame
2
3.
table
4.
anchor
1068 The following HTML element is used to display horizontal line 1.
<br>
2.
<h>
The following HTML element is used to display 3.
3
horizontal line <hr>
4.
<h2>
1069 The _______ attribute defines the action to be performed when the form is submitted 1.
method attribute
2.
action attribute
2
3.
onSubmit attribute
4.
onClick attribute
1070 Which attribute is used to extend the lifetime of a cookie? 1.
higher-age
2.
increase-age
3
3.
max-age
4.
lifetime
1071 How can you make a list that lists the items with numbers? 1.
<list>
2.
<ol>
2
3.
<dl>
4.
<ul>
1072 Which method is used to get the year of a date object in YYYY format in Javascript. 1.
getYear()
2.
getYYYY()
1
3.
getFullYear()
4.
get4Year()
1073 Which one of the following is a cryptographic protocol used to secure HTTP connection? 1.
Stream Control Transmission Protocol (SCTP).
2.
Transport Layer Security (TSL).
2
3.
Explicit Congestion Notification (ECN).
4.
Resource Reservation Protocol.
1074 In HTTP, which method gets the resource as specified in the URI 1.
GET
2.
POST
3
3.
PUT
4.
TRACE
1075 Which of these is not a valid attribute of <tr> element? 1.
valign
2.
bgcolor
4
3.
align
4.
rowspan
1076 Java package is a grouping mechanism with the purpose of 1.
Providing the library for the Java program
2.
Controlling the visibility of the classes, interfaces and methods
2
3.
Replacing header file used in C/C++
4.
An application framework
1077 Consider the C function given below. 1.
int f(int j) The function returns 0 for all values of j.
{
static int i = 50; 2.
int k; The function prints the string something for all values of j.
if (i == j)
{ 3.
4
printf("something"); The function returns 0 when j = 50.
k = f(i);
return 0; 4.
} The function will exhaust the runtime stack or run into an infinite loop when j = 50.
else return 0;
}
Which one of the following is TRUE?
1078 Use of ________ allows for some processes to be waiting on I/O while another process 1.
executes. multiprogramming
2.
multiuser interfacing
1
3.
Random scheduling
4.
Variable cpu cycles
1079 ______ OS pays more attention on the meeting of the time limits. 1.
Distributed
2.
Network
3
3.
Real time
4.
Desktop
1080 The purpose of a TLB is 1.
The purpose of a
To cache page translation information
2.
TLB is
To cache frequently used data
2
3.
To hold register values while a process is waiting to be run
4.
To hold the start and length of the page table
1081 For automatic objects, constructors and destructors are called each time the objects ___ 1.
enter and leave scope
2.
inherit parent class
1
3.
are constructed
4.
are destroyed
1082 Which of the following statement is correct about destructors? 1.
A destructor has void return type.
2.
A destructor has integer return type.
3
3.
A destructor has no return type.
4.
A destructors return type is always same as that of main()
1083 Given a variable $email containing the string [email protected], which of the following 1.
PHP statements would extract the string example.com? substr($email, strpos($email, "@"));
2.
strstr($email, "@");
4
3.
strchr($email, "@");
4.
substr($email, strpos($email, "@")+1);
1084 Consider the code snippet given below 1.
var count = [1,,3]; The omitted value takes “undefined”
What is the observation made?
2.
This results in an error
1
3.
This results in an exception
4.
Can't predict
1085 Consider the following code snippet 1.
var a1 = [,,,]; true false
var a2 = new Array(3); 2.
0 in a1 false true
1
0 in a2 3.
Result of Javascript is: true true
4.
false true
1086 The pop() method of the array in javascript does which of the following task ? 1.
decrements the total length by 1
2.
increments the total length by 1
1
3.
prints the first element but no effect on the length
4.
don't return the value of deleted element
1087 When there is an indefinite or an infinity value during an arithmetic value computation, 1.
javascript Prints an exception error
2.
Prints an overflow error
3
3.
Displays “Infinity”
4.
Prints the value as such
1088 Given a comma-separated list of values in a string, which function from the given list can 1.
create an array of each individual value with a single call in PHP? strstr( )
2.
extract
3
3.
explode( )
4.
strtok( )
1089 In PHP, array values are keyed by ______ values (called indexed arrays) or using ______ 1.
values (called associative arrays). Of course, these key methods can be combined as well. Float, string
2.
Positive number, negative number
4
3.
String, Boolean
4.
Integer, String
1090 What will the following script output? 1.
78
<?php 2.
$array = array (1, 2, 3, 5, 8, 13, 21, 34, 55); 19
$sum = 0; 3.
1
for ($i = 0; $i < 5; $i++) { NULL
$sum += $array[$array[$i]]; 4.
} 5
echo $sum;
?>
1091 What elements will the following script output? 1.
1 => 'b'
<?php 2.
$array = array (true => 'a', 1 => 'b'); True => 'a', a => 'b'
3
var_dump ($array); 3.
?> NULL
4.
0 => 'a', 1 => 'b'
1092 Assume you would like to sort an array in ascending order by value while preserving key 1.
associations. Which of the following PHP sorting functions would you use? ksort( )
2.
asort( )
2
3.
krsort( )
4.
sort( )
1093 If a university sets up web-based information system that faculty could access to record 1. intranet
student grades and to advise students, that would be an example of an 2. ERP
1
3. extranet
4. CRM
1094 Which of the following gives the memory address of a variable pointed to by pointer a? 1. a;
2. *a;
3
3. &a;
4. address(a);
1095 A default constructor is one that 1. that takes all default arguments
2. have to be called explictly
1
3. gets called automatically
4. does take many parameters
1096 A constructor without any arguments is 1. default constructor
2. parameterized constructor
1
3. none
4. overloading
1097 Which of the following functions compares two strings? 1. compare();
2. cmp();
4
3. stringcompare();
4. strcmp();
1098 A class is a 1. Structure
2. Memory
3
3. Template
4. Function
1099 class n{ public: int *a;}o,p; assigning o=p is called? 1. deep copy
2. shallow copy
2
3. error
4. constructor
1100 Templates improve 1. inheritance
2. reusability
2
3. class
4. functions
1101 Access to private data is 1. Restricted to methods of the same class
2. Restricted to methods of other classes
1
3. Available to methods of the same class and other classes
4. Not an issue because the program will not compile
1102 A priority queue is implemented as a Max-Heap. Initially, it has 5 elements. The level- 1.
order traversal of the heap is: 10, 8, 5, 3, 2. Two new elements 1 and 7 are inserted into the 10, 8, 7, 3, 2, 1, 5
heap in that order. The level-order traversal of the heap after the insertion of the elements 2.
is: 10, 8, 7, 2, 3, 1, 5
1
3.
10, 8, 7, 1, 2, 3, 5
4.
10, 8, 7, 5, 3, 2, 1
1103 For the array (77 ,62,114,80,9,30,99), write the order of the elements after two passes using 1.
the Radix sort 80 30 62 114 77 9 99
2.
114 30 62 77 9 99
3
3.
9 114 30 62 77 80 99
4.
9 30 62 77 80 99 114
1104 Consider a B+ tree in which the search Answer is 12 bytes long, block size is 1024 bytes, 1.
record pointer is 10 bytes long and block pointer is 8 bytes long. The maximum number of 40
keys that can be accommodated in each non-leaf node of the tree is ____ 2.
50
2
3.
60
4.
70
1105 The number of ways in which the numbers 1, 2, 3, 4, 5, 6, 7 can be inserted in an empty 1.
binary search tree, such that the resulting tree has height 6, is 63
2.
64
2
3.
65
4.
66
1106 What is the maximum size of data that the application layer can pass on to the TCP layer 1.
below? Any size
2.
2^16 bytes-size of TCP header
1
3.
2^16 bytes
4.
1500 bytes
1107 Consider an undirected graph G where self-loops are not allowed. The vertex set of G is 1.
{(i, j): 1 = i = 12, 1 = j = 12}. There is an edge between (a, b) and (c, d) if |a - c| = 1 and |b - 505
d| = 1. The number of edges in this graph is 2.
506
2
3.
507
4.
508
1108 Consider the following New-order strategy for traversing a binary tree: 1.
1)Visit the root; +-167*2?5-34*
2)Visit the right subtree using New-order; 2.
3)Visit the left subtree using New-order; .-+1*67?2-5*34
3
The New-order traversal of the expression tree corresponding to the reverse polish 3.
expression 3 4 * 5 - 2 ? 6 7 * 1 + - is given by: -+1*76?2-5*43
4.
.176*+2543*-?-
1109 A complete binary min-heap is made by including each integer in [1;1023] exactly once. 1.
The depth of a node in the heap is the length of the path from the root of the heap to that 7
node. Thus, the root is at depth 0. The maximum depth at which integer 9 can appear is 2.
8
2
3.
9
4.
10
1110 _________ has a dedicated communication path between stations 1.Circuit switching 2.Frame relay 3.Packet switching 4.ATM 1
1111 What is the order of the stages in the waterfall mode? 1.
Requirements Definition, System & Software Design, Implementation & Unit
Testing, Integration & System Testing, Operation & Maintenance.
2.
Requirements Definition, Integration & System Testing, System & Software Design,
Implementation & Unit Testing, Operation & Maintenance.
1
3.
System & Software Design, Requirements Definition, Operation & Maintenance,
Implementation & Unit Testing, Integration & System Testing.
4.
Implementation & Unit Testing, Requirements Definition, System & Software
Design, Integration & System Testing, Operation & Maintenance.
1112 ______________ is an initial version of a software system that is used to demonstrate 1.
concepts, try out design options, and find out more about the problem and its possible Prototype
solutions. 2.
Architectural Design
1
3.
Subsystem
4.
Module
1113 ____ messages are typically used for diagnostic or control purposes or generated in 1.ICMP 2.TCP 3.UDP 4.IP
1
response to errors in IP operations.
1114 _______ appends to the address a slash character and the decimal number of leading bits 1.CIDR 2.TCP 3.UDP 4.IP
1
of the routing prefix.
1115 __________ algorithm is used for the flow control of data between sender and receiver. 1.Dijkstra 2.RIP 3.Leaky bucket 4.Go Back N 4
1116 ______ cryptography refers to encryption methods in which both the sender and receiver 1.Symmetric 2.Asymmetric 3.Ceaser key 4.Asymmetric key
1
share the same key.
1117 ______ is responsible for the final encapsulation of higher-level messages into frames that 1.Data link layer 2.Network layer 3.Application layer 4.Session layer
1
are sent over the network using the physical layer.
1118 The switching method fixes the path from source to destination is _________ 1.circuit switching 2.Message Switching 3.Packet switching 4.Frame Relay 1
1119 There is no connection setup phase in __________ 1.Frame relay 2.Virtual Circuit Switching 3.Datagram 4.ATM 3
1120 Which of these is not an element of an object-oriented analysis model? 1.
Behavioral elements
2.
Class-based elements
4
3.
Data elements
4.
Scenario-based elements
1121 _____ gives the number of bits that can be transmitted over a network in a fixed time 1.Latency 2.Jitter 3.Bandwidth 4.Delay
3
period.
1122 Overloading a prefix increment operator by means of a member function takes 1. Three arguments
2. Two arguments
3
3. No argument
4. One argument
1123 _______ is assigned to an organization by a global authority. 1.Subnet ID 2.Supernet ID 3.Host ID 4.Network ID 4
1124 _______ should keep track of multiple file downloads requested by a particular FTP 1.Transport layer 2.Application layer 3.Presentation layer 4.Session layer
application, or multiple telnet connections from a single terminal client, or web page 1
retrievals from a web server.
1125 Which of the following ways are legal to access a class data member using this pointer? 1. this.x
2. *this.x
3
3. this->x
4. *this-x
1126 Class ____ IP addresses are used for large organizations 1.A 2.B 3.D 4.C 1
1127 Which one of the following is the correct way to declare a pure virtual function? 1. virtual void Display(void){0};
2. void Display(void) = 0;
3
3. virtual void Display(void) = 0;
4. virtual void Display = 0;
1128 Simple network management protocol (SNMP) is implemented with a daughter board in 1.the nodes 2.the server 3.the hubs 4.a separate PC that managers the network 3
1129 which of the following is an incorrect definition inside a class ? 1. void * operator new () { }
2. int operator ++() { }
2
3. void operator delete(void * ptr) { }
4. void * operator new(size_t size) { }
1130 Which of the following results in a compile-time error? 1. int f2() { static int i; i++; return i; }
2. int f3( static int i) { return 300;}
3
3. static int f1() { return 100; }
4. static int a;
1131 A view is a 1.
virtual table
2.
subset of the table
1
3.
base table
4.
super table
1132 The state diagram 1.
depicts relationships between data objects
2.
depicts functions that transform the data flow
1
3.
indicates how data are transformed by the system
4.
indicates system reactions to external events
1133 Passing the request from one schema to another in DBMS architecture is called as _______ 1.
Mapping
2.
Communication
1
3.
Relational
4.
network
1134 If every node u in G adjacent to every other node v in G, A graph is said to be 1.
isolated
2.
complete
2
3.
finite
4.
strongly connected
1135 The BIU contains FIFO register of size __________ bytes 1.
8
2.
6
2
3.
4
4.
12
1136 The BIU prefetches the instruction from memory and store them in ________ 1.
queue
2.
register
1
3.
memory
4.
stack
1137 The 1 MB byte of memory can be divided into ______ segment 1.
1 Kbyte
2.
64 Kbyte
2
3.
33 Kbyte
4.
34 Kbyte
1138 The IP is ________ bits in length 1.
8 bits
2.
4 bits
4
3.
16 bits
4.
32 bits
1139 IMUL source is a signed _________ 1.
multiplication
2.
addition
1
3.
subtraction
4.
division
1140 The microprocessor determines whether the specified condition exists or not by testing the 1.
______ carry flag
2.
conditional flag
2
3.
common flag
4.
sign flag
1141 In max mode, control bus signal So,S1 and S2 are sent out in ____________ form 1.
shared
2.
decoded
3
3.
encoded
4.
unshared
1142 The ___ bus controller device decodes the signals to produce the control bus signal 1.
internal
2.
data
3
3.
external
4.
address
1143 To interface memory with the microprocessor, connect register the lines of the address bus 1.
must be added to address lines of the _______ chip. single
2.
memory
2
3.
multiple
4.
triple
1144 In which year, 8086 was introduced? 1.
1978
2.
1979
1
3.
1977
4.
1981
1145 Data flow testing is a control structure testing technique where the criteria used to design 1.
test cases is that they
rely on basis path testing
2.
3.
select test paths based on the locations and uses of variables
4.
4.
2.
4
having k1 << k2, the reaction system can be approximated as 3.
4.
1150 Rain drops fall from a great height under gravity. Select the only correct statement from 1.
the following? Their velocity go on increasing until they hit the earth with the same velocity
2.
Their velocity go on increasing until they hit the earth with the same velocity, but
final velocities of different drops are different. 4
3.
They fall with a terminal velocity which is the same for every drop
4.
They fall with terminal velocities which are different for drops of different size.
1151 The crushing energy required to create new surface is given by 1.
Ficks’ law
2.
Rittingers’s law
2
3.
Fouriers’s law
4.
Kopp’s law
1152 For transportation of grain, asphalt, crushed coal, ashes, gravel and sand to a short 1.
distance we may use a Screw conveyor
2.
Ribbon conveyor
1
3.
Flight conveyor
4.
Slat conveyor
1153 1.
3
2.
4
3.
5
4.
6
1154 ______________datastructure used in pushdown automata. 1.
Stack
2.
array
1
3.
queue
4.
linked list
1155 Where in an HTML document is the correct place to refer to an external style sheet? 1.
In the section
2.
In the section
4
3.
At the end of the document
4.
At the top of the document
1156 Pick the odd one out. 1.[] 2.() 3.:: 4.~ 3
1. error
error
1157 class n{ public: int a;}
obj; obj.a=10; cout << a;<obj.a;< p="" style="box-sizing: border-box;"></obj.a;<> 2. 10
1
3. 1
4. 0
1158 Which of the regular expressions given below represent the following DFA? 1.
I) 0*1(1+00*1)* I and II only
II) 0*1*1+11*0*1 2.
III) (0+1)*1 I and III only
3
3.
II and III only
4.
I,II,III
1159 Consider the DFAs M and N given above. The number of states in a minimal DFA that 1.
accepts the language L(M) ∩ L(N) is __________. 0
2.
1
1
3.
2
4.
3
1160 What is data encryption standard (DES)? 1.
block cipher
2.
stream cipher
1
3.
bit cipher
4.
none of the mentioned
1161 The physical layer concerns with 1.
bit-by-bit delivery
2.
process to process delivery
1
3.
application to application delivery
4.
Hop by hop delivery
1162 The maximum window size for data transmission using the selective reject protocol with n- 1.
bit frame sequence numbers is: 2^n
2.
2^(n-1)
2
3.
2^n – 1
4.
2^(n-2)
1163 ElGamal encryption system is: 1.
symmetric key encryption algorithm
2.
asymmetric key encryption algorithm
2
3.
not an encryption algorithm
4.
none of the mentioned
1164 Network operating system that does not support symmetric multi-processing (SMP) is 1.Banyan (VINES) 2.Microsoft NT advanced server 3.SCO Unix 4.Novell Network
4
3.X
1165 The topology with highest reliability is ......................... 1.ring topology 2.star topology 3.bus topology 4.mesh topology 4
1166 In which topology, if there are n devices in a network, each device has n-1 ports for cables? 1.Mesh 2.Star 3.Ring 4.Bus 1
1167 Frames of 1000 bits are sent over a 10^6 bps duplex link between two hosts. The 1.
propagation time is 25ms. Frames are to be transmitted into this link to maximally pack i=2
them in transit (within the link). What is the minimum number of bits, i will be required to 2.
represent the sequence numbers distinctly? Assume that no time gap needs to be given i=3
4
between transmission of two frames. 3.
i=4
4.
i=5
1168 Station A needs to send a message consisting of 9 packets to Station B using a sliding 1.
window (window size 3) and go-back-n error control strategy. All packets are ready and 12
immediately available for transmission. If every 5th packet that A transmits gets lost (but 2.
no acks from B ever get lost), then what is the number of packets that A will transmit for 14
3
sending the message to B? 3.
16
4.
18
1169 Suppose the round trip propagation delay for a 10 Mbps Ethernet having 48-bit jamming 1.
signal is 46.4 micro sec. The minimum frame size is: 94
2.
416
4
3.
464
4.
512
1170 In a network of LANs connected by bridges, packets are sent from one LAN to another 1.
through intermediate bridges. Since more than one path may exist between two LANs, For shortest path routing between LANs
packets may have to be routed through multiple bridges. Why is the spanning tree 2.
algorithm used for bridge-routing? For avoiding loops in the routing paths
2
3.
For fault tolerance
4.
For minimizing collisions
1171 Which one of the following is an internet standard protocol for managing devices on IP 1.
network? dynamic host configuration protocol
2.
simple network management protocol
2
3.
internet message access protocol
4.
media gateway protocol
1172 In wireless distribution system 1.
multiple access point are inter-connected with each other
2.
there is no access point
1
3.
only one access point exists
4.
none of the mentioned
1173 What is WPA? 1.
wi-fi protected access
2.
wired protected access
1
3.
return 0;
}
Find the output
1175 It would be ideal if all of computer science theories can be used in software engineering. 1.
False
2. 2
True
3. 4.
1176 Consider the following: 1.Inorder successor of the root 2.
Maximum element in the right subtree of root
3.
Minimum element in the right subtree of root
temp=root->left; 4.
while(temp->right!=NULL) Inorder predecessor of the root
temp=temp->right;
return temp;
4
The above code snippet for a BST with the address of the root node in pointer ‘root’
returns
1177 Let G be a weighted connected undirected graph with distinct positive edge weights.If 1.
every edge weight is increased by the same value, then which of the following statements P Only
is/are TRUE ? P: Minimum spanning tree of G does not change. Q: Shortest path between
any pair of vertices does not change
2. 1
Q Only
3.
Neither P nor Q
4.
Both P and Q
1178 Which multiple access technique is used by IEEE 802.11 standard for wireless LAN? 1.
CDMA
2.
CSMA/CA
2
3.
ALOHA
4.
CSMA/CD
1179 Assume that a table R with 1000 records is to be joined with another table S with 10000 1.
records. What is the maximum number of records that would result in if we join R with S 1000
and the equi-join attribute of S is the primary key? 2.
10000
1
3.
1,00,00,000
4.
11000
1180 The maximum number of superkeys for the relation schema R(E,F,G,H) with E as the key 1.
is 7
2.
8
2
3.
9
4.
6
1181 The best index for exact match query is 1.
Bucket Hash
2.
Quad tree
1
3.
B Tree
4.
B+ Tree
1182 The use of traceability tables helps to 1.
debug programs following the detection of run-time errors
2.
determine the performance of algorithm implementations 3
3.
identify, control, and track requirements changes
4.Analyze design changes
1183 The spiral model of software development 1.
Ends with the delivery of the software product
2.
3.Do not Include project risks evaluation during each iteration 4.Includes feasibility
risks
Evolutionary
1184 Evolutionary software process models 1.
Are not iterative in nature
2.
software process Can easily accommodate product requirements changes
3.
2
models
Generally produce throwaway systems
4.
Are not specific to applications
1185 An activity is said to be critical if slack time is equal to 1.
0
2.
1
1
3.
2
4.
3
1186 The preorder traversal sequence of a binary search tree is 30, 20, 10, 15, 25, 23, 39, 35, 42. 1.
Which one of the following is the postorder traversal sequence of the same tree? 10,20,15,23,25,35,42,39,30
2.
15,10,25,23,20,42,35,39,30
4
3.
15,20,10,23,25,42,35,39,30
4.
15,10,23,25,20,35,42,39,30
1187 Assume that we have constructor functions for both base class and derived class. Now 1.Derived class constructor followed by Base class constructor. 2.Base class
consider the declaration in main( ). Base * P = New Derived; in what sequence will the constructor followed by derived class constructor. 3.Base class constructor will not 2
constructor be called ? be called. 4.Derived class constructor will not be called.
1188 Which of these is asymptotically bigger? 1.
79n2+43n
2.
65n3+34n
2
3.
6*2n
4.
5*2n
1189 If a , b , c, are three nodes connected in sequence in a singly linked list, find the valid 1.
statement that may help to change this list to a circular linked list? a->next=c
2.
b->next=c
4
3.
a->next=c
4.
c->next=b
1190 class n{ public: int a=7;}p,q; cout<< n.a;<a;< p="" style="box-sizing: border-box;"></a; 1. 0
<> 2. error
2
3. depends on compiler
4. 7
1191 By default, any real number in C is treated as ____ 1.
a float
2.
a double
1
3.
a long double
4.
depends on the memory model
1192 With a single resource, deadlock occurs ___________ 1.
if there are more than two processes competing for that resource
2.
if there are only two process completing for that resource
1
3.
if there is a single process competing for that resource
4.
it never occur in this case
1193 Consider the following javascript code snippet : 1.
var a = []; 1
a.unshift(1); 2.
a.unshift(22); [4,5]
a.shift(); 3.
1
a.unshift(3,[4,5]); [3,4,5]
a.shift(); 4.
a.shift(); Exception
a.shift();
The final output for the shift() is
1194 Consider the following C program. 1.
#include <stdio.h> 434
int f1 (void) ; 2.
int f 2 (void) ; 230
int x = 10; 3.
int main () 43
{ 4.
int x=1; 432
2
x+=f1()+ f2()+f3()+f2() ;
printf("%d", x);
return 0;
}
int f1(){int x=25; x++; return x;}
int f2(){static int x =50; x++;return x;}
int f3(){x*=10; return x};
The output of the program is_________.
1195 Consider the following C code segment: 1.
int a, b, c = 0; 31
void prtFun(void); 41
main( ) 42
{ static int a = 1; /* Line 1 */ 2.
prtFun( ); 42
a + = 1; 61
prtFun( ) 61
printf("\n %d %d", a, b); 3.
} 42 4
void prtFun(void) 62
{ static int a=2; /* Line 2 */ 20
int b=1; 4.
a+=++b; 42
printf("\n %d %d", a, b); 42
} 20
What output will be generated by the given code segment if:
Line 1 is replaced by auto int a = 1;
Line 2 is replaced by register int a = 2;
1196 Consider the following code snippet 1.
function oddsums(n) Returns [1,4,9,16,25]
{ 2.
let total = 0, result=[]; Returns [1,2,3,4,5]
for(let x = 1; x <= n; x++) 3.
{ Returns [3,6,9,12,15]
let odd = 2*x-1; 4.
1
total += odd; Returns [1,3,5,7,9]
result.push(total);
}
return result;
}
What would be the output if
oddsums(5);
1197 An incorrectly typed command will cause the operating system to display 1.
a prompt
2.
an error message
2
3.
a question mark
4.
causes exception
1198 Round Robin scheduling is the strategy of temporarily suspending a running process 1.
After the CPU time slice expires
2.
to allow starving processes to run
1
3.
when it requests IO
4.
when OS wait
1199 Which one of the following statements is NOT correct about HTTP cookies? 1.
A cookie is a piece of code that has the potential to compromise the security of an
internet user
2.
A cookie gains entry to the user's work area through an HTTP header 1
3.
A cookie has an expiry date and time
4.
Cookies can be used to track the browsing pattern of a user at a particular site
1200 Find the output of the following program? 1.
62010206
#include <iostream.h>
using namespace std; 2.
typedef int * IntPtr; 72010107
int main()
72010107
{ 3.
IntPtr A, B, C; 71020106
int D,E;
A = new int(3); 4.
B = new int(6); 10720107
2
C = new int(9);
D = 10;
E = 20;
*A = *B;
B = &E;
D = (*B)++;
*C= (*A)++ * (*B)--;
E= *C++ - *B--;
cout<<*A<<*B<<*C<<d<<e;
return 0;
}</d<<e;
1201 Find the output of the following program? 1.
3332
#include <iostream.h> 2.
using namespace std; 3233
3.
void myFunction(int& x, int* y, int* z) { 3232
static int temp=1; 4.
temp += (temp + temp) - 1; 3133
x += *(y++ + *z)+ temp - ++temp;
*y=x;
x=temp;
*z= x;
cout<<x<<*y<<*z<<temp;<x<<*y<<*z<<temp; 3
int main() {
int i = 0;
int j[] = {0, 1, 2, 3, 4, 5, 6, 7, 8, 9};
i=i++ - ++i;
myFunction(i, j, &i);
return 0;
}
</x<<*y<<*z<<temp;
1202 Choose the correct HTML to left-align the content inside a table cell 1.
<tdleft>
2.
<td leftalign>
4
3.
<td valign="left">
4.
<td align="left">
1203 Which of these is Server side technology? 1.
CGI
2.
HTML
3
3.
JavaScript
4.
CSS
1204 Which of the following is included in the head section of HTML 1.
title,body,form and script
2.
title,meta tag,script and CSS
2
3.
title , meta tag,css and form
4.
title, body,script and CSS
1205 #include < stdio.h > 1.
int main() 10012,12100
{ 2.
typedef struct 0,0
{ 3.
int empid; Error
int bsal; 4.
1
}EMP; 10012,10012
EMP E={10012,15100};
printf("%d,%d",E.empid,E.bsal);
return 0;
}
3
3.
Temporary storage unit within the CPU having dedicated or general purpose use
ptr=&cVal;
printf("value =%d,size= %d\n",*(char*)ptr,sizeof(ptr));
return 0;
}
printf("\n%c,%c,%d",val.chrVal[0],val.chrVal[1],val.intVal);
return 0;
}
int main()
{
strcpy(std.name,"Mike ");
printf("%s%s",std.name,fun(&std));
return 0;
}
printf("%d,%d",sizeof(sample),sizeof(t.s));
return 0;
}
printf("%d,%d,%d",val.a,val.b,val.c);
return 0;
}
return 0;
}
return 0;
}
3.
Developers can not identify changes to incorporate into next increment
4.Delivery schedule can't be revised to reflect changes
1272 #include <stdio.h> 1.
int main() A000000000
{ 2.
char X[10]={'A'},i; A
for(i=0; i<10; i++) 3.
4
printf("%d ",X[i]); A 32 32 32 32 32 32 32 32 32
return 0; 4.
} Error
return 0;
}
Find the output
1277 #include <stdio.h> 1.
Garbage
int main() 2.
{ B
char *text="Hi Babs."; 3.
Error
char x=(char)(text+3); 4. 4
Null
printf("%c\n",x);
return 0;
}
Find the output
1278 #include <stdio.h> 1.
void main(){ 0
static int staticVar; 2.
int j; 1
for(j=0;j<=5;j+=2) 3.
switch(j){ 2
case 1: 4.
staticVar++; Error
break;
case 2:
staticVar+=2;
case 4: 1
staticVar%=2;
j=-1;
continue;
default:
--staticVar;
continue;
}
printf("%d",staticVar);
}
return 0;
}
1280 Find the output: 1.
#include <stdio.h> Error
int main() 2.
{ 101,
int a=100; Value is = 103
printf("%d\n"+1,a); 3. 3
printf("Value is = %d"+3,a); d
return 0; ue is = 100
} 4.
100
100
1281 What will be the output? 1.
#include <stdio.h> Declaration Error
int main() 2.
{ value of ok = 1000
extern int ok; 3. 2
printf("value of ok = %d",ok); value of ok = 0
return 0; 4.
} Linking Error
extern int ok=1000;
1282 Find the output: 1.
#include <stdio.h> 23
int main() 2.
{ Error
int a=23; 3.
1
; ;23;
;printf("%d",a); 4.
; ;23
return 0;
}
1283 #include <stdio.h> 1.
Error
int main() 2.
{ 2.3,2
int x=2.3; 3.
const char c1=(float)x; 2.3000000,2
const char c2=(int)x; 4. 2
2,2
printf("%d,%d\n",c1,c2);
return 0;
}
Find the output
1284 #include <stdio.h> 1.
int main() 24, 24
{ 2.
int intVar=24; 24, 0
static int x=intVar; 3.
3
printf("%d,%d",intVar,x); Error: Illegal Initialization
return 0; 4.
} Run time error
}
return 0;
}
return 0;
}
Find the output.
1294 #include <stdio.h> 1.
I have purchased ...:
#define MOBILE 0x01 2.
#define LAPPY 0x02 I have purchased ...:Mobile, Lappy
3.
int main() I have purchased ...:Mobile,
{ 4.
unsigned char item=0x00; I have purchased ...:Lappy
item |=MOBILE;
item |=LAPPY;
2
printf("I have purchased ...:");
if(item & MOBILE){
printf("Mobile, ");
}
if(item & LAPPY){
printf("Lappy");
}
return 1;
}
1295 #include <stdio.h> 1.
13
int main() 2.
{ d
char flag=0x0f; 3.
22
1
flag &= ~0x02; 4.
printf("%d",flag); 10
return 0;
}
Predict the Output.
1296 #include <stdio.h> 1.
int main() Hello...
{ 2.
int a=10; Hello...OK
if(a==10) 3.
{ OK...
printf("Hello..."); 4.
break; Error
printf("Ok"); 4
}
else
{
printf("Hii");
}
return 0;
}
Find the output.
1297 Find the output: 1.
#include <stdio.h> B
void main() 2.
{ A
3
const char var='A'; 3.
++var; ERROR
printf("%c",var); 4.
} 66
1298 #include <stdio.h> 1.
int main() No output
{ 2.
int pn=100; Hiiiii
if(pn>20) 3.
if(pn<20) Heyyyyy
printf("Heyyyyy"); 4. 2
else HeyyyyyHiiiii
printf("Hiiiii");
return 0;
}
1328 The stage delays in a 4-stage pipeline are 800, 500, 400 and 300 picoseconds. The first stage 1.
(with delay 800 picoseconds) is replaced with a functionally equivalent design involving 33
two stages with respective delays 600 and 350 picoseconds. The throughput increase of the 2.
pipeline is __________ percent. 34
1
33
3.
35
4.
32
1329 Adding 1001 and 0010 gives 1.
1011
2.
1111
1
3.
0
4.
1010
1330 A wireless network interface controller can work in 1.
infrastructure mode
2.
ad-hoc mode
3
3.
both infrastructure and ad-hoc mode
4.
none
1331 Multiple object can be sent over a TCP connection between client and server in 1.
persistent HTTP
2.
nonpersistent HTTP
1
3.
both persistent HTTP and nonpersistent HTTP
4.
p-persistent HTTP
1332 What are the three Analysis models that depict software? 1.
architecture, interface, component
2.
cost, risk, schedule
1
3.
Information, function, behavior
4.
NONE
1333 Software prototyping helps to 1.
generate code
2.
provide thorough testing
2
3.
explore possible software solutions
4.
collect initial software requirements
1334 What is the most common approach for the development of application system now? 1.
Incremental development
2.
Agile
1
3.
Waterfall
4.
None of the options
1335 The design process related to data structures and their representation is 1.
Architectural design
2.
Interface design
4
3.
Component design
4.
Database design
1336 The segment number S is legal if 1.
S < STBR
2.
S > STBR
3
3.
S < STLR
4.
S > STLR
1337 Which of the following is example of in-place algorithm? 1.
Bubble Sort
2.
Which of the following is example of in-place Merge Sort 3
algorithm? 3.
Insertion Sort
4.
1338 Which one of the following is not correct? 1.
application layer protocols are used by both source and destination devices during a
communication session
2.
application layer protocols implemented on the source and destination host must 3
match
3.
both the options
4.
1339 In 8086 microprocessor the following has the highest priority among all type interrupts 1.TYPE 255 2.DIV 0 3.NMI 4.OVER FLOW 3
1340 Assume that a mergesort algorithm in the worst case takes 30 seconds for an input of size
64. Which of the following most closely approximates the maximum input size of a
1.256 2.2048 3.1024 4.512
512 4
problem that can be solved in 6 minutes?
1341 A primary key, if combined with a foreign key creates 1.Many to many relationships between the tables that connect them 2.Network model
between the tables connect them 3.one to many relationship between the tables that 4
connect them 4.Parent child relationship between the tables that connect them
1342 In wireless network an extended service set is a set of 1.
connected basic service sets
2.
all stations
1
3.
all access points
4.
all nodes
1343 In binary heap, whenever the root is removed then the 1.To make sure that it is still complete binary tree 2.It is the easiest possible way 3.
rightmost element of last level is replaced by the root. Why? Because left and right subtree might be missing 4.maximum value is contained by the 1
root node
1344 Which of the following algorithm is Minimum Spanning Tree in graph 1.Dijiktra's algorithm 2.AVL Tree algorithm 3.Kruskal's algorithm 4.Merge
3
algorithm
1345 If X->Y and X->Z then 1.
Y->Z
2.
Z->Y
3
3.
X->YZ
4.
Doesn't hold
1346 If x--> y then y --> x. This statement is 1.
True
2.
False
3
3.
Can't Say
4.
Doesn't hold
1347 Given the functional dependencies, {AB -> CDE and A -> E}, for relation schema R = (A,B, 1.
C,D,E) we can infer the following: A is a key for R
2.
BE is a key for R
3
3.
AB is a key for R
4.
B is a key for R
1348 What kind of schema it is? 1.Relaional
Student(sid, sname, dob, address, pincode) 2.Logical Schema
1
3.Conceptual Schema
4.External View
1349 Which one of the following is currently the most popular data model? 1.Network Model
2.Object Model 3.Notation Model 4
4.Relational Model
1350 Updating a database means 1.deleting database 2.modifying or adding record occurrences 3.revising the file
2
structure 4.reorganizing the database
1351 In Ethernet when Manchester encoding is used, the bit rate is: 1.
Half the baud rate.
2.
Twice the baud rate.
1
3.
Same as the baud rate.
4.
Grows exponentially
1352 In interactive environments such as time-sharing systems, the primary requirement is to 1.
provide reasonably good response time and in general, to share system resources Shortest Remaining Time Next (SRTN) Scheduling
equitably. In such situations, the scheduling algorithm that is most popularly applied is 2.
________. Priorities Based Preemptive Scheduling
3
3.
Round Robin Scheduling
4.
First Come First Serve
1353 A computer has a 256 KByte, 4-way set associative, write back data cache with block size 1.
of 32 Bytes. The processor sends 32 bit addresses to the cache controller. Each cache tag 11
directory entry contains, in addition to address tag, 2 valid bits, 1 modified bit and 1
replacement bit. The size of the cache tag directory is 2.
14 4
3.
27
4.
16
1354 ___________ programs automatically connects to web sites and download documents and 1.
save them to local drive Web Servers
2.
Web Downloading Utilities
2
3.
Stay Connected
4.
Offline Browsers
1355 What is the purpose of $_SESSION[]? 1.
Used to register a global variable
2.
Used to initialize a session
3
3.
Used to store variables of the current session
4.
Used to initialize a cookie
1356 What is the correct way to connect to a MySQL database? 1.mysqli_db(host,username,password,dbname);
2.mysqli_connect(host,username,password,dbname);
2
3.mysqli_open(host,username,password,dbname);
4.
mysqli_connect(,,)
1357 What does parseFloat(9+10) evaluates to in JavaScript? 1.19 2.910 3.9109 4.91 1
1358 What will happen if the first argument of open() is omitted? 1.Error Page 2.Remains in the same page 3.about:blank 4.Open the first page in the
3
history
1359 Which of the following can't be done with client-side JavaScript? 1.Validating a form 2.Sending a form's contents by email 3.Storing the form's
3
contents to a database file on the server 4.Testing the form
1360 In javascript, RegExp Object Method test() is used to search a string and returns 1.true or false 2.found value 3.index 4.Matched or not matched
1
_________
1361 Let G be the CFG, l be the number of left most derivations, r be the number of right most 1.
derivations and P be the number of parse trees. Assume l , r and P are computed for a l=P=r
particular string. For a given CFG ‘G’ and given string ‘w’, what is the relation between l , 2.
P,r? l<=P>=r
1
3.
l>=P<=r
4.
l<=P<=r
1362 A value that has no defined value is expressed in PHP with the following keyword: 1.undef 2.null 3.Cant Define 4.There is no such concept in PHP 2
1363 The Document object is which part of the object? 1.Tree 2.System 3.Window 4.Screen 3
1364 #include <stdio.h> 1.
void main() Hello
{ 2.
int a=10; OK
switch(a){ 3.
case 5+5: Hello
3
printf("Hello\n"); OK
default: 4.
printf("OK\n"); Error
}
}
Find the output
1365 #include <iostream.h> 1.
using namespace std; 20
int main() 2.
{ 10
int x=20; 3.
if(!(!x)&&x) 1
cout<<x; 4.
else 0
{ 1
x=10;
cout<<x;
return 0;
}</x;
</x;
}
1366 The recognizing capabilities of NDFSM and DFSM 1.
may be different
2.
must be different
3
3.
must be same
4.
none of the mentioned
1367 Pre-emptive scheduling is the strategy of temporarily suspending a running process 1.
before the CPU time slice expires
2.
to allow starving processes to run 1
3.
when it requests IO
4.
None of mentioned
1368 1. Software Specification is the process where 1.
you decide what software you will use to program
2.
you develop a prototype and show it to the client
3
3.
You find out what services are required from the system
4.
none
1369 1. What is an advantage of incremental delivery? 1.
everything is coded at once, so the customer receives the full product
2.
replacement systems are easily developed with full features that clients expected
from the old system
3
3.
Customers can use prototypes and gain experience that informs their requirements
for later systems
4.
none of the mentioned
1370 Manager salary details are hidden from the employee. This is 1.Conceptual level data hiding 2.Physical level data hiding 3.External level data
1
hiding 4.None of mentioned
1371 SELECT last_name, SYSDATE-hire_date FROM employees; 1.
Displays number of days an employee has worked in the company.
2.
Displays number of months an employee has worked in the company.
1
3.
Error
4.
None of the mentioned
1372 The number of states in DFA is -------- the number of states in NFA for the same 1.
Language. Greater then
2. equal to
3. 3
less then
4.
greater then or equal to
1373 The access method used for magnetic tape is_________ 1.
Direct
2.
Random
3
3.
Sequential
4.
None of these
1374 The language that the computer can understand and execute is called ______ 1.
Machine language
2.
Application software
1
3.
System program
4.
None of these
1375 Syntax for creating a RegExp object: (i). var txt=new RegExp(pattern,modifiers); (ii). var 1.(i) only 2.(ii) only 3.Both (i) and (ii) 4.None of these
3
txt=/pattern/modifiers; Which of the above mentioned syntax is correct?
1376 A tree sturctured file directory system 1.
allows easy storage and retrieval of file names
2.
is not essential when we have millions of files
1
3.
is a much debated unnecessary feature
4.
none of these
1377 Information retrieval is faster from 1.
Floppy disk
2.
Magnetic tape
3
3.
Hard disk
4.
CD
1378 A Winchester disk is a 1.
Disk stack
2.
Removable disk
1
3.
Flexible disk
4.
None of these
1379 Computers use addressing mode techniques for _____________________. 1.
giving programming versatility to the user by providing facilities as pointers to
memory counters for loop control
2.
to reduce no. of bits in the field of instruction 4
3.
specifying rules for modifying or interpreting address field of the instruction
4.
All of these
1380 The idea of cache memory is based 1.
on the property of locality of reference
2.
on the heuristic 90-10 rule
1
3.
on the fact that references generally tend to cluster
4.
all of these
1381 ‘Aging registers’ are _______. 1.
Counters which indicate how long ago their associated pages have been referenced.
2.
Registers which keep track of when the program was last accessed
1
3.
Counters to keep track of last accessed instruction
4.
Counters to keep track of the latest data structures referred
1382 Virtual memory is the portion of _______. 1.
RAM
2.
Cache Memory
3
3.
Hard Disc
4.
None of these
1383 Butyl rubber is a copolymer of – 1.
1-butene with a small amount of isobutene,
2.
isobutene with a small amount of 2-methylbutadiene (isoprene)
2
3.
butadiene with a small amount of propylene,
4.
1-butene with a small amount of butadiene,
1384 What is Vinegar ? 1.
dilute solution of acetic acid
2.
double distilled alcohol
1 x
3.
2.
x
3.
4.
1414 The phenomenon occuring during pumping of a liquid solution containing dissolved gases, 1.
which may come out of the solution giving rise to gas pockets, is termed as evaporation
2.
cavitation
2
3.
sublimation
4.
stripping
1415 The softness or hardness of a grinding wheel depends upon the type & amount of bonding 1.
material used. For general purpose cutter grinding __________ grinding wheel is normally hard
used. 2.
soft
4
3.
silicon carbide
4.
aluminium oxide
1416 Fog is an example of colloidal system of 1.
solid dispersed in gas.
2.
solid dispersed in liquid.
3
3.
liquid dispersed in gas.
4.
gas dispersed in liquid.
1417 Evaporative cooling process employs a combination of cooling and humidification in which 1.sensible heat is added. 2.sensible heat is removed and the latent heat is added. 3.
2
the latent heat is removed. 4.sensible heat is added and latent heat is removed
1418 For nearly isothermal operation involving large reaction time in a liquid-phase reaction, 1.
the most suitable reactor is a __________ reactor. stirred tank
2.
tubular flow
1
3.
batch
4.
fixed bed
1419 In a reversible chemical reaction having two reactants in equilibrium, if the concentration 1.
of the reactants are doubled, then the equilibrium constant will remain the same
2.
become one fourth
1
3.
be halved
4.
also be. doubled
1420 For the liquid phase zero order irreversible reaction A B, the conversion of A in a CSTR is 1.
found to be 0.3 at a space velocity of 0.1min-1 . What will be the conversion for a PFR with 0.15
a space velocity of 0.2 min-1? Assume that all the other operating conditions are the same 2.
for CSTR and PFR. 0.30
3
3.
0.60
4.
0.90
1421 In Langmuir treatment of adsorption, 1.
whole surface of the catalyst does not have the same activity for adsorption and there
is attraction between the adsorbed molecule.
2.
whole surface of the catalyst is essentially uniform and the adsorbed molecule has no
2
effect on the rate of adsorption per site.
3.
all the adsorption does not take place by the same mechanism.
4.
extent of adsorption is more than one complete monomolecular layer on the surface.
1422 A particle A of diameter 10 microns settles in an oil of specific gravity 0.9 and viscosity 10 1.
poise under Stoke's law. A particle B with diameter 20 microns settling in the same oil will same as that of A.
have a settling velocity 2.
one fourth as that of A.
2
3.
twice as that of A
4.
four times as that of A.
1423 A centrifugal pump is used to pump water through a horizontal distance of 150 m, and 1.
then raised to an overhead tank 10 m above. The pipe is smooth with an I.D of 50 mm. 10 m
What head (m of water) must the pump generate at its exit (E) to deliver water at a flow 2.
rate of 0.001 m3/s? The Fanning friction factor, f is 0.0062. 11 m
2
3.
20 m
4.
22 m
1424 Which of the following is a detergent ? 1.
Benzene hexachloride
2.
Cellulose nitrate
2 x
3.
Polyvinyl chloride
4.
Alkyl benzene sulfonate
1425 Foot valves are provided in the suction line of a centrifugal pump to 1.
avoid priming, every time we start the pump.
2.
remove the contaminant present in the liquid.
1
3.
minimise the fluctuation in discharge.
4.
control the liquid discharge.
1426 Presence of __________ in a dry gaseous fuel does not contribute to its calorific value. 1.
sulphur
2.
2
oxygen
3.
hydrogen
4.
carbon
1427 It takes 6 hours to dry a wet solid from 50% moisture content to the critical moisture 1.
content of 15%. How much longer it will take to dry the solid to 10% moisture content, 15 min
under the same drying conditions? (The equilibrium moisture content of the solid is 5%). 2.
51 min
3
3.
71 min
4.
94 min
1428 In extractive distillation, solvent is 1.
added to alter the relative volatility of the mixture.
2.
of high volatility.
1
3.
present in overhead stream.
4.
of high viscosity to give high tray efficiency.
1429 Which of the following is the most commonly used leaching solvent in vegetable oil 1.
industry ? Phenol
2.
hexane
2
3.
Furfurol
4.
Liquid SO2
1430 Mechanism of moisture removal in case of freeze drying of food stuff is by 1.
evaporation
2.
dehydration
4
3.
adsorption
4.
sublimation
1431 Pulverised coal passing through 200 mesh screen has a diameter of 0.074 mm (74 micron). 1.
The same passing through 50 mesh screen will have a dia of __________ mm. 0.007
2.
0.03
x
3.
50
4.
0.014
1432 Three material A, B and C of equal thick-nes and of thermal conductivity of 20, 40 & 60 1.
kcal/hr. m. °C respectively are joined together. The temperature outside of A and C are 70
30°C and 100°C respectively. The interface between B and C will be at a temperature of 2.
__________ °C. 90
1
3.
60
4.
50
1433 The equation, (NSt x N2/3Pr) = f/2, is the __________ analogy. 1.
Colburn
2.
Reynolds
1
3.
Prandtl
4.
Reynolds Transport
1434 In a co-current double pipe heat exchanger used for condensing saturated steam over the 1.
inner tube, if the entrance and exit conditions of the coolant are interchanged, then the increase
rate of condensation will 2.
decrease
3
3.
remain unchanged
4.
either increase or decrease; depends on the coolant flow rate
1435 The thermal boundary layer at NPr > 1 1.
is thicker than hydrodynamic boundary layer.
2.
is thinner than hydrodynamic boundary layer.
2
3.
and the hydrodynamic boundary layer are identical.
4.
disappears.
1436 The units of resistance to heat transfer is 1.
J.m-2.K-1
2.
J.m-1.K-1
4
3.
W.m-2.K-1
4.
W-1m2K
1437 The overall heat transfer co-efficient for a shell and tube heat exchanger for clean surfaces 1.
is U0 = 400 W/m2.K. The fouling factor after one year of operation is found to be hd0 = 1200W/m2.K
2000 W/m2.K. The overall heat transfer co-efficient at this time is 2.
894 W/m2.K
3
3.
333 W/m2.K
4.
287 W/m2.K
1438 In the Tayler standard screen series, the ratio of the actual mesh dimension of any screen 1.
to that of the next smaller screen is 1
2.
1.41
x
3.
1.71
4.
2
1439 In a ball mill most of the reduction is done by 1.
slow compression
2.
cutting
4
3.
attrition
4.
impact
1440 The percentage available chlorine in a good commercial sample of bleaching powder is 1.
15 to 17 %,
2.
35 to 37 %,
2
3.
53 to 56 %,
4.
69 to 71.5%
1441 Which of the following is an important reinforcing agent for various elastomers ? 1.
sodium sulfate,
2.
barium carbonate
4 x
3.
sodium sesquisilicate,
4.
carbon black
1442 The membranes employed in the membrane-cell (for chlorine and caustic soda production) 1.
are basically perfluorinated polymers with occasional sulfonate and/or carboxylate groups,
2.
nylon 6, 6,
3.
polyvinyl acetate,
4.
high density polyethylene,
1443 Which of the following is polysaccharide? 1.
Sucrose
2.
Starch
2
3.
Glucose
4.
Fructose
1444 A chemostat has a liquid volume of 2 litres and is being fed at a rate of 4 litres per hour. 1.
Dilution rate for this reactor will be 2 litres
2.
2 litres per hour
4
3.
2 h-1
4.
4 litres per hour
1445 What is its percentage humidity ? Vapour pressure of water at 200C is 17.5 mm Hg. 1.
80.38
What is its percentage humidity ? Vapour 2.
80
pressure of water at 200C is 17.5 mm Hg. 3.
3 x
79.62
4.
78.51
1446 An aqueous solution of 2.45% by weight H2SO4 has a specific gravity of 1.011. The 1.
composition expressed in normality is 0.2528
2.
0.2000
4
3.
0.500
4.
0.5055
1447 Cavitation will not occur if the sum of the velocity and pressure heads at the suction is 1.
much larger than the vapour pressure of the liquid
2.
zero
x
3.
much smaller than the vapour pressure of the liquid
4.
equal to the vapour pressure of the liquid.