Custom Search

WHATSAPP GROUP QUESTIONFORALL

HELLO FRIENDS, FOR JOINING THE WHATSAPP GROUP OF QUESTIONFORALL JUST SEND YOUR DETAILS TO questionforall@gmail.com

Showing posts with label Computer Science/Computer Application Questions. Show all posts
Showing posts with label Computer Science/Computer Application Questions. Show all posts

Thursday, 15 February 2018

SOLVED PAPER OF HIGHER SECONDARY SCHOOL TEACHER-COMPUTER SCIENCE-2018

SOLVED PAPER OF HIGHER SECONDARY SCHOOL TEACHER-COMPUTER SCIENCE-KERALA HIGHER SECONDARY EDUCATION –EXAM HELD ON 01.02.2018.



























1. #define AND &&
#define OR !!
#define LE <=
#define GE >=
main()
{
char ch=‘D’ :
if ((ch GE 65 AND ch LE 90) OR (ch GE 97 AND ch LE 122))
printf(“alphabet”);
else
printf(“not an alphabets”):
}
(A) Compilation error (B) Not an alphabet
(C) Alphabet (D) None of the above

Ans: (C) Alphabet

2. main()
{
static char * s[] = {“ice”, “green”, “core”, “please”}:
static char **ptr[] = {s+3, s+2, s+1,s}:
char ***p=ptr;
printf(“%s\n”, **++p);
printf(“%s\n”, *--*++p+3);
printf(“%s\n”, *p[–2]+3);
printf(“%s\n”,p[–1][–1]+1);
}
(A) ice        (B) core         (C) please (D) None
      plea              ase                 core
       gr                reen                   gr

  Ans:(B).

3. main()
{
int k=35,z;
K=func1(k=func1(k=func1(k)));
printf(“k=%d”,k);
}
Funct1(k)
int k:
{
K++;
return(k):
}
(A) 35 (B) 37 (C) 38 (D) 40

Ans: (C)38

4. main ()
{
int j=1;
while (j<=255);
printf(“%c%d\n”, j,j);
j++;
}
}
(A) 255 (B) 255, 255 (C) No output (D) 256

Ans: (C)No output.

5. main()
{
int a=500, b=100,c;
if (!a>=400)
b=300;
c=200;
printf(“b=%d c=%d”,b,c);
}
(A) b=100, c=400 (B) b=100, c=300
(C) b=100, c=200 (D) None of the above
Ans: (C)

6. Multiple inheritance in java can be achieved by :
(A) interface (B) polymorphism (C) abstraction (D) encapsulation
Ans: (A)

7. Which is the base class of all classes in java ?
(A) system.lang (B) class.object (C) java.lang.object (D) none of the above

Ans: (C).

8. class output
{
public static void main (string args[ ])
{ string Buffer sb=new string Buffer (“Hello”);
Sb.delete (0,2);
system.out.println(c);
}
(A) He (B) Hel (C) lo (D) llo
Ans: (D).

9. Which of the interface contain all the method used for handling thread related operations in
java ?
(A) Runnable interface (B) Math interface
(C) System interface (D) Thread handling interface
Ans: (D)

10. Which of the package contains abstract keyword ?
(A) java.lang (B) java.util (C) java.io (D) java.system

Ans: (A)

11. A member function which initializes data member of an object in :
(A) Destructor (B) Constructor (C) Inline function (D) Friend function
Ans: (B).

12. A C++ key word, which, when used inside a member function of a class, represents a pointer
to the particular class object that invoked it :
(A) * (B) this (C) ? (D) None
Ans: (B).

13. Which of the following is a non linear data structure ?
(A) Tree (B) Array
(C) Linked list (D) None of the above
Ans: (A).

14. Which of the following is NOT a method for performing amortized analysis of algorithms ?
(A) Aggregate method (B) Accounting method
(C) Potential method (D) None of the above
Ans: (D).

15. 0-1 Knapsack problem can be solved by :
(A) Greedy method (B) Dynamic programming method
(C) Divide and conquer method (D) None of the above
Ans: (B).

16. Which is NOT a collision resolution technique in Hashing ?
(A) Chaining (B) Linear probing
(C) Quadratic Probing (D) None of the above
Ans: (D).

17. If any NP complete problem is in P class, then :
(A) P=NP (B) P!=NP
(C) P=NP (D) None of the above
Ans: (A).

18. Which of the following problem is NOT NP-complete ?
(A) Hamiltonian cycle problem (B) Clique problem
(C) Travelling-salesman problem (D) None of the above
Ans: (D).

19. The running time of Kruska’ls algorithm for a graph G=(V, E) for finding
Minimum–spanning–tree is :
(A) O(E log2 V) (B) O(E+V log2 V)
(C) O(E2) (D) O(V2)
Ans: (A).

20. The data structure used in breadth–first–search (BST) is :
(A) Stack (B) Queue
(C) B–Tree (D) None of the above
Ans: (B).

21. Strassen’s algorithm for multiplying n×n matrices runs in :
(A) O(n2) time (B) O(n3) time (C) O(2n) time (D) O(n2.81) time
Ans: (D).

22. The postfix representation of the expression (a+b*c)+((d*e+f)*g) is :
(A) abc*+de*f+g*+ (B) ab+c*de*f+g+*
(C) ab+c*de*f+g*+ (D) abc*+def*+g*+
Ans: (A)

23. The worst case time complexity of merge sort is :
(A) O(n2) (B) O(n log n) (C) O(n3) (D) O(2n)
Ans: (B).

24. A set of n>=0 disjoint trees :
(A) Tree (B) Forest (C) B Tree (D) All of the above
Ans: (B).

25. Which of the following is a linear data structures ?
(A) Array (B) Linked list
(C) Both (A) and (B) (D) None of the above
Ans: (C).

26. The worst case time complexity of Quick sort is :
(A) O(n2) (B) O(n log n) (C) O(n3) (D) O(2n)
Ans: (A).

27. Which of the following data structure is frequently used to implement priority queue ?
(A) Stack (B) Heap
(C) Treap (D) None of the above
Ans: (B).

28. A list in which contain nodes of different types :
(A) Homogenous list (B) Heterogeneous list
(C) Doubly linked list (D) None of the above
Ans: (B).

29. An ordered list in which insertion and deletion of nodes are made at one end ?
(A) Deque (B) Queue
(C) Stack (D) None of the above
Ans: (C).

30. A matrix whose most of the elements are zeroes :
(A) sparse matrix (B) dense matrix
(C) square matrix (D) none of the above
Ans: (A).

31. Which of the following is a self balancing binary search tree ?
(A) B– Tree (B) AVL Tree
(C) B+ Tree (D) None of the above
Ans: (B).

32. A network with bandwidth of 10 Mbps can pass only an average of 12000 frames per minute
with each frame carrying an average of 10,000 bits. What is the throughput of this
network ?
(A) 22 Mbps (B) 2 Mbps (C) 10 Mbps (D) 100 Mbps
Ans: (B)

33. A system is using NRZ-l to transfer 10-Mbps data. What is the average signal rate ?
(A) 500 Kbaud (B) 1000 MHz (C) 500 MHz (D) 1000 Kbaud
Ans: (A).

34. What is the minimum required bandwidth to send data at 1-Mbps rate using Manchester
Encoding ?
(A) 10 MHz (B) 2 MHz (C) 5 MHz (D) 1 MHz
Ans: (D)

35. To send 3 bits data at a time at a bit rate of 3 Mbps with a carrier frequency of 10 MHz
calculate the baud rate and bandwidth :
(A) 10 Mbaud and 10 MHz (B) 2 Mbaud and 2 MHz
(C) 1 Mbaud and 8 MHz (D) None of these
Ans: (C).

36. Eight channels each with a 100-kHz bandwidth are to be multiplexed together. What is the
minimum bandwidth of the link if there is a need for a guard band of 10 kHz between
channels to prevent interference ?
(A) 540 kHz (B) 870 kHz (C) 1020 kHz (D) 1080 kHz
Ans: (B)

37. The digital multiplexing technique for combining several low-rate channels into high-rate
one :
(A) TDM (B) FDM (C) CDM (D) none of these
Ans: (A)

38. RG-59 category cables are used for :
(A) Telephone (B) LAN
(C) Cable TV networks (D) None of these
Ans: (C).

39. The bit oriented protocol for communication over point to point and multipoint links is :
(A) HDLC (B) Stop and wait protocol
(C) PPP (D) PAP
Ans: (A).

40. The service not provided by PPP is :
(A) network address configuration (B) authentication
(C) flow control (D) none of these
Ans: (C).

41. Encryption is done at :
(A) Presentation Layer (B) Application Layer
(C) Session Layer (D) Transport Layer
Ans: (A).

42. One channel carries all transmissions simultaneously in :
(A) TDMA (B) CDMA (C) FDMA (D) PDMA
Ans: (B).

43. The IEEE standard for Wifi is :
(A) 802.4 (B) 802.1 (C) 802.2 (D) 802.11
Ans: D.

44. An example for cell switched network is :
(A) SONET (B) ATM (C) UPSR (D) None of these
Ans: (B).

45. GSM is a digital cellular phone system using :
(A) TDMA and packet switching (B) CDMA and packet switching
(C) TDMA and FDMA (D) FDMA and CDMA
Ans: (C).

46. UDP is a :
(A) Connectionless unreliable protocol
(B) Reliable and connection oriented protocol
(C) Connectionless reliable protocol
(D) Connection oriented unreliable protocol
Ans: (A).

47. SCTP is a __________ layer protocol.
(A) Session Layer (B) Application Layer
(C) DLL (D) Transport Layer
Ans: (D).

48. The result which operation contains all pairs of tuples from the two relations, regardless of
whether their attribute values match ?
(A) Join (B) Cartesian product
(C) Intersection (D) Set difference
Ans: (B).

49. The most commonly used operation in relational algebra for projecting a set of tuple from a
relation is :
(A) Join (B) Projection (C) Select (D) Union
Ans: (C).

50. For each attribute of a relation, there is a set of permitted values, called the __________ of
that attribute.
(A) Domain (B) Relation (C) Set (D) Schema
Ans: (A).

51. Managers salary details are hidden from employees. This is :
(A) Conceptual level data hiding (B) Physical level data hiding
(C) External level data hiding (D) None of these
Ans: (C).

52. In SR flip-flop, if S=R=1 then Q(t+1) will be :
(A) Q(t) (B) 0
(C) 1 (D) indeterminate state
Ans: (D).

53. If an encoder has 2n (or less) input lines. Then output line is :
(A) n/2 (B) n (C) 2n (D) n-1
Ans: (B).

54. The 10’s complements of 13250 is :
(A) 86740 (B) 86750 (C) 97850 (D) 97859
Ans: (B).

55. DeMorgan’s theorem says that a NOR gate is equivalent to __________ gate.
(A) Bubbled XOR (B) Bubbled AND (C) NOR (D) Bubbled NOR
Ans: (B).

56. AB+B((B+C')+B'C) can be simplified to :
(A) AB+BC (B) B+BC
(C) B+C (D) None of the above
Ans: (C).

57. The self complementing unweighted code is :
(A) 8421 (B) 2421 (C) Excess 3 (D) Gray code
Ans: (B).

58. In 8086 microprocessor the following has the highest priority among all the type of
interrupt :
(A) NM 1 (B) type 255 (C) over flow (D) Div 0
Ans: (A).

59. Which among the following is the maximum mod signal in 8085 ?
(A) DT/R' (B) HOLD (C) ALE (D) LOCK
Ans: (D).

60. INT2 in 8086 is :
(A) Single step interrupt (B) Non maskable interrupt
(C) Division by zero interrupt (D) Overflow interrupt
Ans: (B).

61. Which among the following is the programmable DMA controller in 8086 ?
(A) 8259 (B) 8257 (C) 8251 (D) 8250
Ans: (D).

62. In cyclomatic complexity, if E is the number of edges and N is the number of nodes, V(G), for
a flow graph is defined as :
(A) E-N+2 (B) E-N-1 (C) E+N-2 (D) E+N-1
Ans: (A).

63. Which among the following is the risk driven process model ?
(A) Prototyping (B) Spiral model
(C) Component based development (D) Waterfall model
Ans: (B).

64. Which testing method is normally used as the acceptance test for a software system ?
(A) Unit testing (B) Integration testing
(C) Functional testing (D) Regression testing
Ans: (B).

65. Application like Banking and Reservation require which type of operating system :
(A) Hard real time (B) Soft real time
(C) Real time (D) Time sharing
Ans: (B).

66. Preemptive scheduling is the strategy of temporally suspending a running process :
(A) To avoid collision (B) When it request i/o
(C) Before the CPU time slice expires (D) None of the above
Ans: (C).

67. Time for the disk, rotate to the start of the desired sector is known as :
(A) Seek time (B) Transfer time (C) Latency time (D) Access time
Ans: (C).

68. Mutual exclusion problem occurs between :
(A) Process that share resources
(B) Process use not the same resources
(C) Two disjoint process that do not interact
(D) None of the above
Ans: (A).

69. PNG stands for :
(A) Packet network graphics (B) Portable network graphics
(C) Protocol for network graphic (D) None of the above
Ans: (B)

70. The maintenance activity to find and fix error during operation of error is :
(A) adaptive maintenance (B) corrective maintenance
(C) perfective maintenance (D) preventive maintenance
Ans: (B).

71. Which method uses small increments with minimum planning and iterations are short time
frames ?
(A) Water fall model (B) Spiral model
(C) Agile model (D) Prototype model
Ans:(B).

72. Telnet is a :
(A) Remote login (B) Television network
(C) Network of telephone (D) None of the above
Ans: (A).

73. Trends to outsource IT functions t other countries is known as :
(A) Outer outsourcing (B) External outsourcing
(C) Foreign outsourcing (D) Offshore outsourcing
Ans: (D).

74. Which of the following method of channelization are used for mobile data internet
working ?
(A) Time division multiple access (B) Frequency division multiple access
(C) Code division multiple access (D) All of the above
Ans: (D).

75. Honey pot is an example for :
(A) Security auditing software (B) Encryption-decryption software
(C) Intrusion-detection software (D) Virus
Ans: (C).

76. ‘Hibernate’ in Windows XP/Windows 7 means :
(A) Shutdown the computer without closing the running application
(B) Shutdown the computer terminating all running applications
(C) Restart the computer
(D) Restart the computer in safe mode
Ans: (A).

77. The UNIX Shell is :
(A) A command line interpreter (B) Set of user commands
(C) A GUI interface (D) All of the above
Ans: (A).

78. If every non key attribute is functionally depend on primary key, then the relation will be :
(A) First normal form (B) Second normal form
(C) Third normal form (D) Fourth normal form
Ans: (C).

79. An attribute of one table is matching the primary key of another table, is known as :
(A) Secondary key (B) Foreign key
(C) Candidate key (D) Composite key
Ans: (B).

80. In relational model, tuple is equivalent to :
(A) Record (B) Table (C) File (D) Field
Ans: (A).

81. Who among the following leaders is not associated with the formation of the Congress Socialist
Party in 1934 ?
(A) Sardar Vallabhai Patel (B) Jayaprakash Narayanan
(C) Achyuth Patwardhan (D) R.M. Lohya
Ans: (A).

82. The code name “Operation Barbarosa” is associated with the following countries in the Second
World War :
(A) England and France (B) France and Germany
(C) Germany and Soviet Union (D) U.S.A. and Japan
Ans: (C).

83. Who among the following is the author of “Prince of the folly” ?
(A) Erasmus (B) Machiavelly (C) Thomas More (D) Boccassio
Ans: (A).

84. Which of the following social reformer of Kerala founded the “Sadhu Jana Sangam” ?
(A) Mannath Padmanabhan (B) Vagbhatanantha
(C) Ayyankali (D) Pandit Karuppan
Ans: (C).

85. Which National leader of India is nicknamed as “Prince of workers” ?
(A) Dadabhai Naoroji (B) Gopalakrishna Gokhale
(C) Bal Gangadhara Tilak (D) Surendra Natha Bannarjee
Ans: (B).

86. “New India” is the Newspaper published by :
(A) Mahatma Gandhi (B) Annie Beasant
(C) Syed Ahammed Khan (D) Lala Lajpath Rai
Ans: (B).

87. The Indian Independence Act Passed by the British Parliament in :
(A) August 14, 1947 (B) July 1, 1947
(C) February 12, 1947 (D) July 18, 1947
Ans: (D).

88. Which social reformer of Kerala started the weekly “Prabhodakam” ?
(A) Mannath Padmanabhan (B) Muhammed Abdul Rahman
(C) Kesari Balakrishna Pillai (D) Swadeshabhimani Ramakrishna Pillai
Ans: (C).

89. Which of the following state of India is called the “Botanist paradise” ?
(A) Assam (B) Kashmir
(C) Sikkim (D) Arunachal Pradesh
Ans: (C).

90. Who among the following ruler built the famous “Charminar” ?
(A) Firus Shah Tuglak (B) Shahjahan
(C) Aurangazeb (D) Quli Qutub Shah
Ans: (D).

91. Which among the following is India’s National river ?
(A) Indus (B) Ganga (C) Brahmaputhra (D) Narmada
Ans: (B).

92. Swaraj Party was the outcome of which of the following incident ?
(A) Chauri-Chaura (B) Quit India
(C) Simon Commision (D) Bardoli Satyagraha
Ans: (A).

93. Who is called the “Lincoln of Kerala” ?
(A) Pandit Karuppan (B) Dr. Palpu
(C) Sahodharan Ayyappan (D) Poikayil Yohannan
Ans: (A).

94. In the constitution of India article 32 deals with :
(A) Writ (B) Equal pay for equal work
(C) Panchayath raj system (D) Uniform civil code
Ans: (A).

 95. “Panmana Asramam” is related to :
(A) Kumarasenan (B) Chattambi Swamikal
(C) Vagbadanandhan (D) Vaikunda Swamikal
Ans: (B).

96. Who among the following is the President of Karachi Session of INC in 1931 ?
(A) Sardar Vallabhai Patel (B) Mothilal Nehru
(C) Jawaharlal Nehru (D) Annie Besant
Ans: (A).

97. Which among the following year the famous Malayalam historical novel “Martandavarma”
published ?
(A) 1901 (B) 1906 (C) 1891 (D) 1896
Ans: (C).

98. In which of the following year last Mamankam was held at Thirunavaya ?
(A) 1775 (B) 1780 (C) 1792 (D) 1802
Ans: (A).

99. Which ruler of Cochin started “Thrissur Pooram” ?
(A) Swathi Thirunal (B) Marthanda Varma
(C) Sakthan Thampuran (D) Sree Chithira Thiruna
Ans: (C).

100. Who among the following raised the slogan “Inquilab Zindabad” for the first time ?
(A) Surya Sen (B) Bhagat Singh
(C) V.D. Savarkar (D) Chandrasekhar Azad
Ans: (B).

Sunday, 4 August 2013

SOLVED PAPER OF JUNIOR MANAGER (INFORMATION MANAGEMENT) IN THE KERALA STATE CIVIL SUPPLIES CORPORATION LTD

SOLVED PAPER OF JUNIOR MANAGER (INFORMATION MANAGEMENT) IN THE KERALA STATE CIVIL SUPPLIES CORPORATION LTD
DATE OF TEST-17-04-2013.




1.    Which of the following is not a combinational circuit?
(A) Comparator    (B) Multiplexer    (C) Adder    (D) Counter.
Ans: Counter.

2.    The number of select inputs required to design a full adder using decoder is :
3.

3.    If Data input(D) , Select inputs(S0 & S1) and enable input (EN) of an active low output 1:4 demultiplexer, are all LOW, then its output will be:
All are high.

4.    If 

output of a D Flip Flop is connected to its Data input(D) , we get:







Ans:Counter.


 
5.    A 12 KHz signal is applied to the CLK input of a 3-bit asynchronous counter, then  the frequency of signal at the last stage output is :
1.5 KHz.

6.    Select the data type which cannot be checked in switch-case statement :
Float.

7.    Which of the following is not a logical operator?
(A) &         (B) &&         (C) ||         (D) None of these.
Ans: &.

8.    Write the output of the following program segment:
char *s1=“abc”, *s2=“abd”, printf (“%d”, strcmp(s1, s2));
0.

9.    Type of class that allows only one subject of it to be created:
Singleton class.

10.    Select the type of function which is not the member of class:
(A) Static function    (B) Friend Function    (C) Const Function    (D) Virtual Function.
Ans: Friend Function.

11.    Choose the correct statement:
(A) A constructor is called at the time of use of a class
(B) A constructor is called at the time of use of an object
(C) A constructor is called at the time of declaration of a class
(D) A constructor is called at the time of declaration of an object.
Ans: A constructor is called at the time of declaration of an object.

12.    Which of the following approach is adapted by C++?
(A) Top-down    (B) Bottom-up        (C) Right-left        (D) Left-right.
Ans: (B) Bottom-up.

13.    The correct class of the object  cout is :
ostream.

14.    Which of the following problem causes an exception?
(A) A run-time error.         (B) A problem in calling function
(C) Missing semicolon in statement in main ()    (D) A Syntax error.
Ans: (A) A run-time error.

15.    Data members available only in the class hierarchy chain is :
Protected data members.

16.    Which of the following is a fixed table?
(A) Opcode table     (B) Symbol table    (C) Argument table    (D) Literal table
Ans: Opcode table.

17.    Which of the following is not a RISC machine?
(A) SPARC    (B) Cray T3E    (C) Intel 80 x 86    (D) Power PC.
Ans: (C) Intel 80 x 86.

18.    A Bootstrap loader is an example of :
Absolute loader.

19.    Parser is used for :
Syntax analysis.

20.    LTORG is used for:
Placing literal pool at the very next location.

21.    Which of the following is the meta model?
(A) Water fall model    (B) Prototyping model   
(C) RAD model    (D) Spiral model
Ans: (D) Spiral model.

22.    A system testing carried out by the test team within the developing organization is :
Alpha testing.

23.    In which level of SEI Capability Maturity Model both product and process metrices are defined:
Managed level.

24.    Constructive Cost Model for software cost estimation is introduced by :
B.Boehm.

25.    Set of activities for identifying, organizing and controlling modifications to the software being built by the programming team are called:
Software Configuration Management.

26.    A syntax directed definition that uses synthesized attributes exclusively is said to be:
S-attributed definition.

27.    Information needed by a single execution of a procedure is managed using a contiguous block of storage called:
Activation Record.

28.    The output of Lexical Analyzer is called:
Tokens.

29.    Which of the following is a Top down parser?
(A)Predictive parser    (B) Operator precedence parser
(C) Shift Reduce parser    (D) LR parser.
Ans: Predictive parser.

30.    Which of the following is not a code optimization technique?
(A) Dead code elimination    (B) Code motion   
(C) Copy propagation    (D) Back patching.
Ans: (D) Back patching.

31.    Which of the following is an approach to implementing Dynamic scope in storage allocation?
(A) Deep access    (B) Block access    (C) Access path    (D) None of the above.
Ans:  Deep Access.

32.    Which of the following is used to specify the syntactic structure of formal languages?
(A) Regular Grammar        (B) Context Sensitive Grammar   
(C) Context Free Grammar    (D) All of the above.
Ans: Context Free Grammar.

33.    The CYK parsing algorithm uses:
Bottom up parsing.

34.    Which of the following is a Parser generator tool?
(A) Lex    (B) Yacc    (C)Both (A) and (B)    (D) None of these.
Ans: Yacc.

35.    Externally defined symbols are resolved by:
Linker.

36.    The process identifier of a null process:
0.

37.    The instruction used to accomplish the effects of P and V in a dominant way in modern hardware:
Test and Set.

38.    VAD in memory management stands for:
Virtual Address Descriptor.

39.    Kernel object that will periodically signal your process that a given amount of time has elapsed:
Waitable timer.

40.    The two phase locking protocol ensures:
Serializability.

41.    A CPU register that is loaded with the length of a block of memory containing a program:
Limit Register.

42.    The process of splitting of data into equal size partition over multiple disks:
Data Stripping.

43.    The linear formula for I/O seek time, with n tracks and startup time s, where m is a constant depends on disk drive:
Ts= m*n+s.

44.    The situation where two or more processes are reading or writing some shared data and the result depends on who run precisely when is called:
Race condition.

45.    Two dimensional chart that plots the activity of a unit  on the Y-axis versus the time on the X- axis:
Gantt Chart.

46.    Which of the following is true about the time complexity O(n)?
(A) There are n number of statements in the algorithm.
(B)Computation time taken by the algorithm is proportional to n.
(C) Computation time taken by the algorithm is less than n seconds
(D) All of the above.
Ans: (B) Computation time taken by the algorithm is proportional to n.

47.    Which algorithm is used to search a given text for a particular keyword pattern and record the number of times the keyword or pattern is found?
Boyer Moore Algorithm.

48.    The general strategy in external sorting is to begin by sorting small batches of records from a file in internal memory. These small batches are commonly called:
(A) Run Lists    (B) Initial Runs    (C) Initial strings    (D) All of the above.
Ans: (D) All of the above.

49.    Worst case efficiency of sequential search algorithm is :
O(n).

50.    Determine an upper bound on the recurrence T(n)=2T([n/2])+n:
T(n)=O(n log n).

51.    Average case complexity of a quick sort algorithm is :
O(n log n).

52.    Recursive algorithms are based on :
Top-down approach.

53.    The number of null branches for a binary tree with n nodes is:
n+1.

54.    The complexity of Greedy algorithm for scheduling jobs with deadlines and profits:
O(n).

55.    In a Max-heap algorithm, for every node i other than root:

56.    CPU register that holds the address of the instructions to be executed next:
Program counter.

57.    The DMA transfer technique where the transfer of one word data at a time:
Cycle stealing.

58.    What command is used to reset a MODEM when using the AT Command Set?
ATZ.

59.    Which of the following is a parallel communication standard?
(A) CAT 5    (B) RS 232    (C) RS 232 C        (D) None of the above.

Ans: (D) None of the above.

60.    Which of the following displays time-space flow of data through the pipeline?
(A) Performance Chart    (B) Datapath   
(C) Reservation Table        (D) None of the above.
Ans: Reservation Table.

61.    In Inkjet technology the droplets of ink are deflected by :
Multi directional nozzles.

62.    Number of clock cycles required to process N tasks in a K stage pipelined processor:
K+N-1.

63.    The type of pipeline hazard created when the datapath hardware in the pipeline cannot support all of the overlapped instructions:
Structural hazard.

64.    Cache performance can be measured in terms of average access time using the formula:
Hit time + miss rate * miss penalty.

65.    Which of the following statement is wrong?
(A) Statically scheduled superscalar processors use out-of –order execution.
(B) Superscalar processors issue varying number of instructions per clock.
(C) VLIW processors issue fixed number of instructions per clock.
(D) Multiple issue processors allow multiple instructions to issue in a clock cycle.
Ans: Statically scheduled superscalar processors use out-of –order execution.

66.    Which type of cable run is most often associated with fibre optic cable?
Backbone cable.

67.    The type of connector used with twisted-pair networking cable in most business LANs:
RJ-45.

68.    What characteristic of UTP cable helps to reduce the effects of interference?
The twisting of the wires in the cable.

69.    Which data communications standard provided broadband access in a wireless network?
Wimax.

70.    Which of the following is a characteristic of single-mode fiber-optic cable?
Generally uses lasers as the light source.

71.    Which of the physical topologies has the least likelihood of having a collision?
Mesh.

72.    What do you call a wireless access point that improves cellular reception inside a home or office building?
Femtocell.

73.    What layer of OSI does the encryption/decryption?
Presentation Layer.

74.    What is the default port number of DNS?
53.

75.    Which of the following networks uses software to establish a secure channel on the Internet for transmitting data?
(A) Secure Virtual Channel.    (B) Secure Public Network.   
(C) Virtual Public Network.    (D) Virtual Private Network.
Virtual Private Network.

76.    All the following hidden surface algorithms employ image space approach except?
(A) Back face removal    (B) Depth buffer removal
(D) Scan line method        (D) All of the above.
Ans: Back face removal.

77.    Random scan monitors are also referred to as:
(A) Vector display    (B) Stroke writing display
(C) Calligraphic display    (D) All of the above.
Ans: All of the above.

78.    Which of the following is not a video file extension?
(A) MP4    (B) JPG    (C) OT    (D) AVI
Ans: JPG.

79.    DAT is an acronym for:
Digital Audio Tape.

80.    In a rule-based system, procedural domain knowledge is in the form of :
Production Rules.

81.    An AI technique that allows computers to understand associations and relationships between objects and events is called:
Pattern matching.

82.    Command used in SQL to remove an index from the database:
DROP INDEX.

83.    Which of the following is not a logical database structure?
(A) Relational    (B) Network    (C) Tree    (D) Chain.
Ans: Chain.

84.    The process of cleaning junk data is called:
Data purging.

85.    URL stands for:
Uniform Resource Locator.

86.    The logic statement ‘For all A there is no B such that p(A, B) is true’ can be expressed in predicate form as:

87.    Context Free Grammar is also called:
Type 2 grammar.

88.    Recursive languages can be recognized using:
Turing Machine.

89.    Which of the following languages cannot be generated by the grammar?
G= ({S}, {a, b}, S, P) where


(A)





(B) a    (C) ab    (D) aabb
Ans: (A).

90.    The language

is :
CFL but not Regular.

91.    In which part of Compiler, the concept of FSA is used?
Lexical analysis.

92.    Languages that can be recognized by FSA is called:
Regular languages.

93.    Languages of Type 1 grammars can be recognized  using:
Linear Bounded Automata.

94.    Which of the following languages over {0, 1, 2} is accepted by a deterministic PDA?















95.    If the start symbol S of a given CFG G is useless, then L(G) is :
Empty.

96.    Decimal  equivalent of the signed binary number 11110101 in 1’s complement form is :
-10.

97.    Minimum number of AND gates required to implement the Boolean expression:
ABC’ +AB’C +A’BC is
 Ans: 2.

98.    Looping on a K-map always results in the elimination of :
Variables within the loop that appear in both complemented and uncomplemented form.

99.    In Boolean algebra, x+xy =x is called:
Absorption Law.

100.    The minimized SOP form of the logic function

 

is :
Y’ + X.Z’.

















Custom Search