Custom Search



Friday, 17 April 2009



Category Number 161/2009 held in 03-04-2009

1. In a memory, the minimum time delay between the initiation of successive memory operations is:

cycle time

2. The first Operating System used in Microprocessor based system was:


3. The Boolean expression A(B+C)+AB+AC is independent of the Boolean variable:

4. A byte addressable computer has memory capacity of 4096 KB and can perform 64 operations. An instruction involving 3 memory operands and one operator needs:
72 bits

5. Which addressing mode used in an instruction of the form ADD X, Y?

6. The addressing mode used in the stack related instruction PUSH B is:
Register indirect

7. Parallel printers use:
Centronics interface

8. An assembler that runs on one machine, but generating code for another machine is called:
Cross assembler

9. A computer with a 32 bit wide data bus implements its memory using 8 K x 8 static RAM chips. The smallest memory that this computer can have is:
32 KB

10. To construct a binary Mod-N counter, the number of flip-flops needs is:

11. The total number of possible ordered trees using 3 nodes A,B,C is :

12. The binary search algorithm is of order:
log n

13. The minimum number of edges in a connected cyclic graph on N vertices is :

14. The execution time of a recursive algorithm is given as:
T(n)=c+T(n-1), if n>1
=d, if n≤1
The order of the algorithm is :

15. Assuming 2 sorted lists of sizes ‘S1 ’ and ‘S2’, the worst case number of comparisons needed by the merge sort algorithm is :

S1+S2 -1

16. If an M x N matrix is stored in column major form, the index calculation required to access the (i, j)th entry is :

M .(j-1)+i

17. Four different algorithms L1, L2, L3 and L4 with orders of log(n), log{log(n)}, n log(n) and n/log(n) respectively have been proposed to solve a specified problem. Which of these is the best one?


18. The principle of locality of reference is cited to justify the usage of :

Cache memory

19. On a particular system, using Quick sort, if it takes 100 msec to sort 1000 records, time taken to sort 100 records will be :


20. In traversing a tree using Breadth First Search, the data structure used is :


21. In a data base, the column of a table is referred to as the :


22. The part of a program which accesses a shared resource and which should be executed indivisibly is called :

Critical section.

23. In a database design, if every non-key attribute is functionally dependent on the primary key, then the relation will be in :

Third normal form

 24. An attribute of one table matching the primary key of another table is known as :

Foreign Key

25. Given the functional dependencies X →Y; Y→Z; X →W and Z →AB, which of the following does not hold good ?
W → Z

26. SQL stands for --------------Query Language.


27. In SQL databases, the memory area used for internal processing is called?


28. The number of relationships in which an entity can appear in an E-R diagram is called its:


29. The process of analyzing, archived data to obtain tactical and strategic information is often called?

Data mining

30. If a relation is in Boyce-Codd normal form, then it is also in?

3rd Normal form

31. RAID is a standard used in the design of?

Disk Memory

32. In an OS, the process of buffering data intended for a peripheral device, onto a disk area, for later bulk transfer is known as :


33. Kernel in Operating System is :

A set of primitive functions upon which OS functions are built.

34. Which of the following scheduling policy is most suited for a time sharing OS?

Round Robin

35. For real time OS, which of the following is the most suitable scheduling scheme ?


36. In a paged memory, access times of primary and secondary memories are 10ns and 100ns respectively. If the average access time is 23.5 nsec, hit ratio is :


37. The size of the virtual memory depends on the size of :

Address bus

38. Three processes A, B, C have peak time demands of 3, 4, 6 resource units respectively of a particular type. What is the minimum number of resources to be provided to ensure that deadlock never occurs?


39. A computer has 8 MB in main memory, 128 KB cache with block size of 4KB. If direct mapping scheme is used, how many different main memory blocks can map into a given physical cache block?


40. The technique that allows only one user to work with a file at a particular time is called :


41. The UNIX operating system was first installed in :


42. MS-DOS makes use of a hardware ROM containing device drivers called :


43. In UNIX, which of the following system calls transform an executable binary file into a process?


44. Berkeley UNIX is popularly known as?

BSD Unix

45. In UNIX, ‘grep’ program is used for implementing :


46. TSR software refers to:

Terminate and Stay Resident

47. Unix and MS-DOS file system differ in the following feature:

Mounted file systems

48. In DOS, file allocation is carried out using?


49. In UNIX ‘link’ refers to :

New directory entry pointing to an existing file

50. For implementing recursion in a programming language, its compiler uses the following data structure extensively:


51. In a hypothetical language, assume that all arithmetic operators have equal precedence and associate to the left. The expression 6x3-2-1x2 evaluates to :


52. Which of the following instructions is redundant (can be implemented by other conventional ones) ?

Clear x

53. BNF is a meta language for :

Specifying a context free grammar

54. In JAVA language, what will be result of evaluating the expression 25 & 13?


55. In JAVA , after execution of the following statements, the values of x, m, and n will be :

int x, m, n;

m=10; n=15;

x=++m +n++;

x=26, m=11,n=16

56. What will be the output of the following JAVA code?

byte x=64, y;

y=(byte)(x<<2 br=""> system.out.println(y);


57. Hot Java is a:
Web browser

58. Which of the following typecasts result in loss of information?
float to int

59. JAVA toolkit package containing classes that implement platform independent GUI is :

60. The JAVA language was originally called:

61. A program Graph has ‘start’ and ‘end’ nodes. The total number of paths from start to end is equivalent to the -----------set of test data required to test the software.

62. In a Program Graph, ‘X’ is an if-then-else node. If the number of paths from start node to X is ‘p’ number of paths from if part to end node is ‘q’ and from else part to end node is ’r’, the total number of possible paths through X is :

63. The quality of a software which causes it to continue to operate despite application of invalid input is called:

64. A program P calls 2 subprograms P1 and P2. If P1 can fail 50% of the times and P2, 40% of the times, P can fail -----------of the times.

65. Consider a Program Graph (PG) with statements as nodes and control as edges. Which of the following is not true for any PG?
Always acyclic

66. In program design, if the number of conditions in a decision table is ‘n’, the maximum number of rules(columns) possible is :

67. In Data Flow Diagrams(DFD), the procedure of expanding a process in the DFD into a set of equivalent smaller processes is called:

68. In programming languages, literal means:
String Constant

69. In Object Oriented Software Design, which of the following is not true?
An object can belong to 2 classes

70. Consider the program segment comprising of 3 statements:
y=y-x where x and y are integers. Execution of these 3 statements do the following ?
Swap the contents of x and y

71. What will be the output of execution of the following statements in C?
for (i=3;i<15 br="" i=""> {printf(“% d”, i);
3 7 11

72. In C, puts (arg V[0]; prints the :
File name of executable code file

73. Who is credited with the creation of WWW?
Tim Berners-Lee

74. Which of the following is not a web browser?
(a)Lynx (b)Mosaic (c)Netscape Navigator (d)HTML

75. MIME is associated with the following :
E mail

76. The mode of communication in which transmission can be bidirectional. But in only one direction at a time is called:
Half Duplex

77. Error detection at the data link layer is achieved using?
CRC codes

78. In Serial communication, start and stop bits are used for ?

79. In a transmitter, the unmodulated signal is known as?
Baseband signal

80. In a computer network, routing issues are handled in?
Network Layer

81. In a computer network, functions of dialog management and synchronization are taken care of in the :
Session’s layer

82. Which of the following topologies has the highest reliability?
(a)Star (b)Bus (c)Ring (d)Mesh

83. In data communications, bauds signify ---------- rate?

84. ADSL is abbreviation for :
Asymmetric Digital Subscriber Line

85. The topmost layer in the ISO model that needs to be implemented in an intermediate node is the -----------layer.

86. VPN denotes a :
Virtual Private Network

87. Data rate of a ring network is 20Mbps and signal propagates at 200m/µsec. The number of bits that can be placed on the channel of length 200km is :

88. The frequency range over which coaxial cables are typically used is :
106 to 108 Hz

89. In internet, the well known port 21 refers to the application?

90. The maximum data rate possible through a noise free 4 kHz binary channel is :
8000 bps

91. The transparency provided in a distributed system where users cannot tell how many copies of a resource exist is termed as :
Replication transparency

92. Which of the following configurations can be said to be tightly coupled?
(a)Multicomputers (b) Workstations on a LAN
(c)Hypercubes (d) Shared memory multiprocessors
Shared memory multiprocessors

93. In distributed systems, RPC stands for?
Remote Procedure Call

94. Assume there are 4 file servers each with a 0.95 chance of being up at any instant. Probability of at least one being available is :

95. Which of the following category of classification of multiple computer systems is not generally used in practice?

96. In a distributed system, to ensure that concurrent transactions do not interfere with each other, the transactions must have the following specific property:

97. Translation Lookaside Buffer(TLB) is also called :
Associative Memory

98. In Internet Standards Terminology, RFC refers to:
Request For Comments

99. Which of the following denotes a network management protocol in an internet?
(a)SNMP (b)SMTP (c)ICMP (d)TCP

100. IEEE 802.11 is an IEEE standard for?
Wireless LAN
Custom Search