Vous êtes sur la page 1sur 19

1.

The smallest integer that can be represented by an 8-bit number in 2s complement form is
(A) -256
(B) -128
(C) -127
(D) 0

2. The transport layer protocols used for real time multimedia, file transfer, DNS and email,
respectively are
(A) TCP, UDP, UDP and TCP
(B) UDP, TCP, TCP and UDP
(C) UDP, TCP, UDP and TCP
(D) TCP, UDP, TCP and UDP

3. Which one of the following expressions does NOT represent exclusive NOR of x and y?
(A) xy+x'y'
(B) xy'
(C) x'y
(D) x'y'

4. Which of the following statements is/are TRUE for undirected graphs?


P: Number of odd degree vertices is even.
Q: Sum of degrees of all vertices is even.
(A) P only
(B) Q only
(C) Both P and Q
(D) Neither P nor Q

5. Consider a hard disk with 16 recording surfaces (0-15) having 16384 cylinders (0-16383) and
each cylinder contains 64 sectors (0-63). Data storage capacity in each sector is 512 bytes. Data
are organized cylinder-wise and the addressing format is . A file of size 42797 KB is stored in
the disk and the starting disk location of the file is . What is the cylinder number of the last sector
of the file, if it is stored in a contiguous manner?
(A) 1281
(B) 1282
(C) 1283
(D) 1284

6. Consider the following function:


int unknown(int n)
{ int i, j,
k=0;
for (i=n/2; i<=n; i++)
for (j=2; j<=n; j=j*2)
k = k + n/2;
return (k);
}
The return value of the function is
(A) (n 2 )
(B) (n 2 log n)
(C) (n 3 )
(D) (n 3 logn)

7. The preorder traversal sequence of a binary search tree is 30, 20, 10, 15, 25, 23, 39, 35, 42.
Which one of the following is the postorder traversal sequence of the same tree?
(A) 10, 20, 15, 23, 25, 35, 42, 39, 30
(B) 15, 10, 25, 23, 20, 42, 35, 39, 30
(C) 15, 20, 10, 23, 25, 42, 35, 39, 30
(D) 15, 10, 23, 25, 20, 35, 42, 39, 30

Statement for linked question (8-9)


Relation R has eight attributes ABCDEFGH. Fields of R contain only atomic values.
F={CHG, ABC, BCFH, EA, FEG} is a set of functional dependencies (FDs) so that
F + is exactly the set of FDs that hold for R.

8. How many candidate keys does the relation R have?


(A) 3 (B) 4 (C) 5 (D) 6

9. The relation R is
(A) in 1NF, but not in 2NF.
(B) in 2NF, but not in 3NF.
(C) in 3NF, but not in BCNF.
(D) in BCNF

10. An example of a binary number which is equal to its 2s complement is :


(A) 1100 (B) 1001
(C) 1000 (D) 1111

11. An example of a connective which is not associative is :


(A) AND (B) OR
(C) EX-OR (D) NAND

12. Match the following :


(i) 2 NF (a) Transitive dependencies eliminated
(ii) 3 NF (b) Multivalued attribute removed
(iii) 4 NF (c) Contains no partial functional dependencies
(iv) 5 NF (d) Contains no join dependency
(A) i-a, ii-c, iii-b, iv-d (B) i-d, ii-c, iii-a, iv-b
(C) i-d, ii-c, iii-b, iv-a (D) i-a, ii-b, iii-c, iv-d

13. A function object :


(A) is an instance of a class for which operator ( ) is a member function.
(B) is an instance of a class for which operator is a member function.
(C) is a pointer to any function
(D) is a member function of a class

14. Polymorphism means :


(E) A template function
(F) Runtime type identification within a class hierarchy
(G) Another name for operator overloading
(H) Virtual inheritance

15. What item is at the root after the following sequence of insertions into an empty splay tree :
1, 11, 3, 10, 8, 4, 6, 5, 7, 9, 2, ?
(A) 1 (B) 2
(C) 4 (D) 8

16. Suppose we are implementing quadratic probing with a Hash function, Hash (y)5X mode
100. If an element with key 4594 is inserted and the first three locations attempted are
already occupied, then the next cell that will be tried is :
(A) 2 (B) 3
(C) 9 (D) 97
17. Semaphores are used to :
(A) Synchronise critical resources to prevent deadlock
(B) Synchronise critical resources to prevent contention
(C) Do I/o
(D) Facilitate memory management

18. In which of the following storage replacement strategies, is a program placed in the largest
available hole in the memory ?
First
(A) Best fit (B) fit
(C) Worst fit (D) Buddy

19. Which transport class should be used with residual-error network layer ?
(A) TP0, TP2 (B) TP1, TP3
(C) TP1, TP3, TP4 (D) TP0, TP1, TP2, TP3, TP4

20. Virtual circuit is associated with a __________ service.


(A) Connectionless (B) Error-free
(C) Segmentation (D) Connection-oriented

21. Three essential components of a software project plan are :


(A) Team structure, Quality assurance plans, Cost estimation
(B) Cost estimation, Time estimation, Quality assurance plan
(C) Cost estimation, Time estimation, Personnel estimation
(D) Cost estimation, Personnel estimation, Team structure

22. The Function Point (FP) metric is :


a. Calculated from user requirements
b. Calculated from Lines of code
c. Calculated from softwares complexity assessment
d. None of the above

23. Data Mining can be used as _________ Tool.


(A) Software (B) Hardware
(C) Research (D) Process

24. T is a graph with n vertices. T is connected and has exactly n-1 edges, then :
(A) T is a tree
(B) T contains no cycles
(C) Every pairs of vertices in T is connected by exactly one path
(D) All of these

25. Consider the following circuit :

to make it a Tautology the should be :


(A) NAND gate (B) AND gate (C) OR gate (D) EX-OR gate

26. In a relational schema, each tuple is divided in fields called :


(A) Relations (B) Domains (C) Queries (D) All the above

27. What will be the value of i for the following expression :


int i511, i53 ;
i15(f >3) ? i & 2:5 ;
(A) 2 (B) 5 (C) 13 (D) 12
28. Consider the graph, which of the following is a valid topological sorting ?
(A) ABCD (B) BACD (C) BADC (D) ABDC

29. The lower degree of cohesion is :


(A) logical cohesion (B) coincidential cohesion
(C) procedural cohesion (D) communicational cohesion

30. A sum of products expression can be implemented with __________ logic gates.
(A) AND OR (B) NAND OR
(C) AND NOT (D) OR AND

31. The characteristic equation of the D flip-flop is :


(A) Q=D' (B) Q=D (C) Q=1 (D) Q=0

32. int arr[ ]={1, 2, 3, 4}


int count;
incr( ) {return ++count;}
main( )
{
arr[count++]=incr( );
printf(arr[count]=%d\n,
arr[count]);
}
The value printed by the above program is :
(A) 1 (B) 2 (C) 3 (D) 4

33. The declaration unsigned u indicates :


(A) u is an unsigned character
(B) u is an unsigned integer
(C) u is a character
(D) u is a string

34. In DBMS, deferred update means :


(A) All the updates are done first but the entries are made in the log file later
(B) All the log files entries are made first but the actual updates are done later
(C) Every update is done first followed by a writing on the log file
(D) Changes in the views are deferred till a query asks for a view

35. Which of the following tools is not required during system analysis phase of system
development life cycle ?
(A) Case tool (B) RAD tool
(C) Reverse engineering (D) None of these

36. Two phase protocol in a database management system is :


(A) a concurrency mechanism that is not deadlock free
(B) a recovery protocol used for restoring a database after a crash
(C) Any update to the system log done in 2-phases
(D) not effective in Database

37. Which algorithm has same average, worst case and best case time ?
(A) Binary search (B) Maximum of n number
(C) Quick sort (D) Fibonacci search

38. The network 198.78.41.0 is a :


(A) Class A Network (B) Class B Network
(C) Class C Network (D) Class D Network

39. The subnet mask 255.255.255.192


(A) Extends the network portion to 16 bits
(B) Extends the network portion to 26 bits
(C) Extends the network portion to 36 bits
(D) Has no effect on the network portion of an IP address
40. A compiler for a high level language that runs on one machine and produces code for a
different machine is called :
(A) Optimizing (B) One pass compiler
(C) Cross compiler (D) Multipass compiler

41. ____________ is one of pre-emptive scheduling algorithm.


(A) Shortest-Job-first (B) Round-robin
(C) Priority based (D) Shortest-Job-next

42. In a object oriented software design, Inheritance is a kind of __________ .


(A) relationship (B) module
(C) testing (D) optimization
43. The hexadecimal number equivalent to (1762.46)8 is

(A) 3F2.89

(B) 3F2.98

(C) 2F3.89

(D) 2F3.98

44. Match the following :


List I List II
a. Physical layer i. Allow resources to network access
b. Datalink layer ii. Move packets from one destination to other
c. Network layer iii. Process to process message delivery
d. Transport layer iv. Transmission of bit stream
e. Application layer v. Formation of frames

Codes :

a b c d e

(A) iv v ii iii i
(B) v iv i ii iii
(C) i iii ii v iv
(D) i ii iv iii v

45. Main ( )
{ char *str = abcde; printf
(%c, *str);
printf (%c, *str++);
printf (%c, *(str++));
printf (%s, str);}
The output of the above C code will be :
(A) a a c b c d e (B) a a c c c d e
(C) a a b c d e (D) None of these

46. A static variable is one :


(A) Which cannot be initialized
(B) Which is initialized once at the commencement of execution and cannot be changed
at runtime
(C) Which retains its value throughout the life of the program
(D) Which is the same as an automatic variable but is placed at the head of a program

47. Runtime polymorphism can be achieved by :


(E) Accessing virtual function through the pointer of the base class
(F) Accessing virtual function through the object
(G) The derived class
(H) None of these

48. A primary key for an entity is :


(I) a candidate key
(J) any attribute
(K) a unique attribute
(L) a superkey

49. A copy constructor is invoked when :


(A) a function returns by value (B) an argument is passed by value
(C) a function returns by reference (D) none of the above

50. Match the following :


(a) Garbage 1. Java
collection
in
(b) Nameless 2. generic
object programming
(c) Template 3. defines a
support class
(d) A forward 4. member
reference function
(e) Derived 5. within a
class statement
inherits
from base
class
Codes :
(a) (b) (c) (d) (e)
(A) 1 5 4 2 3
(B) 1 5 2 3 4
(C) 5 1 2 3 4
(D) 5 4 3 1 2
51. While (87) printf(computer); The above C statement will
(A) print computer 87 times
(B) print computer 0 times
(C) print computer 1 times
(D) print computer infinite times
52. When we pass an array as an argument to a function, what actually gets passed ?
a. Address of the array
b. Values of the elements of the array
c. Base address of the array
d. Number of elements of the array

53. A friend function can be used to


(E) avoid arguments between classes.
(F) allow access to classes whose source code is unavailable.
(G) allow one class to access an unrelated class.
(H) None of the above

54. Which of the following is the correct value returned to the operating system upon the
successful completion of a program ?
a. 0
b. 1
c. 1
d. Program do not return a value

55. A computer program selects an integer in the set {k : 1 k 10,00,000} at random and
prints out the result. This process is repeated 1 million times. What is the probability that the
value k = 1 appears in the printout atleast once ?

(A) 0.5 (B) 0.704

(C) 0.632121 (D) 0.68

56. Which of the following is not a member of class ?


(A) Static function (B) Friend function
(C) Const function (D) Virtual function

57. Which of the following differentiates between overloaded functions and overridden
functions ?
(A) Overloading is a dynamic or runtime binding and overridden is a static or compile
time binding.
(B) Overloading is a static or compile time binding and overriding is dynamic or
runtime binding.
(C) Redefining a function in a friend class is called overloading, while redefining a
function in a derived class is called as overridden function.
(D) Redefining a function in a derived class is called function overloading, while
redefining a function in a friend class is called function overriding.

58. Debugger is a program that


(E) allows to examine and modify the contents of registers
(F) does not allow execution of a segment of program
(G) allows to set breakpoints, execute a segment of program and display contents of
register
(H) All of the above

59. Which of the following is incorrect in C++ ?


(1) When we write overloaded function we must code the function for each usage.
(2) When we write function template we code the function only once.
(3) It is difficult to debug macros
(4) Templates are more efficient than macros

60. When the inheritance is private, the private methods in base class are __________ in the
derived class (in C++).
(1) inaccessible (2) accessible (3) protected (4) public

61. A half-adder is also known as :


(A) AND Circuit (B) NAND Circuit
(C) NOR Circuit (D) EX-OR Circuit

62. Consider the following sequence of instructions :


a5a b, b5a b, a5b a This Sequence
(A) retains the value of the a and b
(B) complements the value of a and b
(C) swap a and b
(D) negates values of a and b

63. In the indirect addressing scheme, the second part of an instruction contains :
(A) the operand in decimal form
(B) the address of the location where the value of the operand is stored
(C) the address of the location where the address of the operand is stored
(D) the operand in an encoded form

64. When a function is recursively called, all automatic variables :


(A) are initialized during each execution of the function
(B) are retained from the last execution
(C) are maintained in a stack
(D) are ignored

65. In order to build a MOD - 18 counter, the minimum number of flip flops needed is equal to :
(A) 18 (B) 9
(C) 5 (D) 4

66. An example of a tautology is :


(A) x v y (B) x v (~y)
(C) x v (~x) (D) (x5>y)v(x<5y)

67. If four 4 input multiplexers drive a 4 input multiplexer, we get a :


(A) 16 input MUX (B) 8 input MUX
(C) 4 input MUX (D) 2 input MUX

68. The simplified form of the Boolean expression (X + Y + XY) (X + Z) is


X + Y + ZX + Y (B) XY
(A) YZ (C) X + YZ (D) XZ + Y

69. A chip having 150 gates will be classified as


(A) SSI (B) MSI
(C) LSI (D) VLSI
70. Negative numbers cannot be represented in
(A) signed magnitude form
(B) 1s complement form
(C) 2s complement form
(D) none of the above

71. If an integer needs two bytes of storage, then the maximum value of unsigned integer is
(E) 216 1
(F) 215 1
(G) 216
(H) 215
72. Interrupts which are initiated by an instruction are
a. Internal
b. External
c. Hardware
d. Software

73. . A complete microcomputer system consists of

(A) Microprocessor

(B) Memory

(C) Peripheral equipment

(D) All of the above

74. Match the following IC families with their basic circuits :


a. TTL 1. NAND
b. ECL 2. NOR
c. CMOS 3. Inverter
Code :
a b c
(A) 1 2 3
(B) 3 2 1
(C) 2 3 1
(D) 2 1 3

75. Which of the following statement is false ?

(I) Every tree is a bipertite graph

(J) A tree contains a cycle

(K) A tree with n nodes contains n-1 edges

(L) A tree is a connected graph

76. In the balanced binary tree given below, how many nodes will become unbalanced when a
node is inserted as a child of the node g ?
(A) 1 (B) 3 (C) 7 (D) 8

77. T is a graph with n vertices. T is connected and has exactly n-1 edges, then :

(E) T is a tree

(F) T contains no cycles

(G) Every pairs of vertices in T is connected by exactly one path

(H) All of these

78. The initial configuration of quaue is a, b, c, d. a is at the front. To get the configuration d, c,
b, a how many deletions and additions required :

(A) 2 deletions, 3 additions (B) 3 deletions, 2 additions


(C) 3 deletions, 4 additions (D) 3 deletions, 3 additions

79. Which of the following does not define a tree ?

(I) A tree is a connected acyclic graph.

(J) A tree is a connected graph with n21 edges where n is the number of vertices in the
graph.

(K) A tree is an acyclic graph with n21 edges where n is the number of vertices in the
graph.

(L) A tree is a graph with no cycles.

80. Which of the following is true for a sorted list with n elements ?

(A) Insertion in a sorted array takes constant time.

(B) Insertion in a sorted linear linked list takes constant time.

(C) Searching for a key in a sorted array can be done in O(log n) time.
(D) Searching for a key in a sorted linear linked list can be done in O(log n) time

81. At a hill station, the parking lot is one long drive way snaking up a hill side. Cars drive in
and park right behind the car in front of them, one behind another. A car cant leave until all the
cars in front of it have left. Is the parking lot more like

(A) An array (B) A stack (C) A queue (D) A linked list

82. With regard to linked list, which of the following statement is false ?

(A) An algorithm to search for an element in a singly linked list requires 0(n) operations
in the worst case.

(B) An algorithm for deleting the first element in a singly linked list requires 0(n)
operations in the worst case.

(C) An algorithm for finding the maximum value in a circular linked list requires 0(n)
operations.

(D) An algorithm for deleting the middle node of a circular linked list requires 0(n)
operations.

83. B + tree are preferred to binary tree in database because

(E) Disk capacities are greater than memory capacities

(F) Disk access much slower than memory access

(G) Disk data transfer rates are much less than memory data transfer rate

(H) Disk are more reliable than memory

84. Leaves of which of the following trees are at the same level ?

a. Binary tree

b. B-tree

c. AVL-tree

d. Expression tree

85. Consider the following statements for priority queue :

S1 : It is a data structure in which the intrinsic ordering of the elements does determine the
result of its basic operations.

S2 : The elements of a priority queue may be complex structures that are ordered on one or
several fields.
Which of the following is correct ?

a. Both S1 and S2 are incorrect.

b. S1 is correct and S2 is incorrect.

c. S1 is incorrect and S2 is correct.

d. Both S1 and S2 are correct.

86. Consider the graph given below as :

Which one of the following graph is isomorphic to the above graph ?

(A)

(B)

(C)

(D)

87. A full binary tree with n leaves contains


(A) n nodes (B) log2 n nodes

(C) 2n 1 nodes (D) 2n nodes

88. To determine the efficiency of an algorithm the time factor is measured by :

(1) Counting micro seconds (2) Counting number of key operations


(3) Counting number of statements (4) Counting kilobytes of algorithm

89. Bankers algorithm is for.


(A) Dead lock Prevention (B) Dead lock Avoidance
(C) Dead lock Detection (D) Dead lock creation

90. Which is the correct definition of a valid process transition in an operating system ?
(A) Wake up : Ready Running
(B) Dispatch : Ready Running
(C) Block : Ready Running
(D) Timer run out : Ready Blocked

91. A page fault __________ .


A. is an error in specific page
B. is an access to the page not currently in main memory
C. occurs when a page program accesses a page of memory
D. is reference to the page which belongs to another program

92. Loading operating system from secondary memory to primary memory is called
____________ .
(A) Compiling (B) Booting
(C) Refreshing (D) Reassembling

93. The nice command is used in Unix :


(A) to decrease the priority of a process.
(B) to increase the priority of a process.
(C) to get the highest priority.
(D) nothing to do with the priorities.

94. An example of a distributed OS is :


(A) Amoeba (B) UNIX
(C) MS-DOS (D) MULTICS

95. Suppose it takes 100 ns to access a page table and 20 ns to access associative memory with a
90% hit rate, the average access time equals :
(A) 20 ns (B) 28 ns (C) 90 ns (D) 100 ns

.96. A special software that is used to create a job queue is called


A. Drive
B. Spooler
C. Interpreter
D. Linkage editor
97. Consider the following page trace :
4,3, 2, 1, 4, 3, 5, 4, 3, 2, 1, 5
Percentage of page fault that would occur if FIFO page replacement algorithm is used with
number of frames for the JOB m = 4 will be
(E) 8
(F) 9
(G) 10
(H) 12

98. Given memory partitions of 100 K, 500 K, 200 K, 300 K and 600 K (in order) and processes
of 212 K, 417 K, 112 K, and 426 K (in order), using the first-fit algorithm, in which partition
would the process requiring 426 K be placed ?
(I) 500 K
(J) 200 K
(K) 300 K
(L) 600 K

99. Match the following :


(a) Unit test (i) Requirements
(b) System test (ii) Design
(c) Validation test (iii) Code
(d) Integration test (iv) System Engineering
Which of the following is true :
(a) (b) (c) (d)
(A) (ii) (iii) (iv) (i)
(B) (i) (ii) (iv) (iii)
(C) (iii) (iv) (i) (ii)
(D) None of the above

100. Which of following file retrieval methods use hypermedia ?


(A) HTML (B) Veronica (C) WAIS (D) HTTP

101. Bluetooth technology uses the transmission media.


(A) Radio links (B) Microwave links
(C) VSAT communication (D) Optical fiber links

102. Device on one network can communicate with devices on another network via a
Utility
(A) Hub/Switch (B) server
(C) File server (D) Gateway

103. What does the URL need to access documents ?


I. Path name
II. Host name
III. DNS
IV. Retrieval method
V. Server port number
(A) I, II, III (B) I, III, V
(C) I, II, IV (D) III, IV, V

104. COCOMO model is used for :


(A) product quality estimation (B) product complexity estimation
(C) product cost estimation (D) all of the above

105. The baud rate is

(A) always equal to the bit transfer rate

(B) equal to twice the bandwidth of an ideal channel


(C) not equal to the signalling rate

(D) equal to half of the bandwidth of an ideal channel

106. Hub is a term used with


(A) A Star Networks
(B) A Ring Networks
(C) A Router
(D) A Bridge

107. Which of the following is/are restriction(s) in classless addressing ?


(1) The number of addresses needs to be a power of 2.
(2) The mask needs to be included in the address to define the block.
(3) The starting address must be divisible by the number of addresses in the block.
(4) All of the above

108. Which one of these are not software maintenance activity ?


(A) Error correction
(B) Adaptation
(C) Implementation of Enhancement
(D) Establishing scope

109. For a data entry project for office staff who have never used computers before (user
interface and user-friendliness are extremely important), one will use
A Spiral model
B Component based model
C Prototyping
D Waterfall model

110. Reliability of software is directly dependent on

(E) quality of the design

(F) number of errors present

(G) software engineers experience

(H) user requirement

Vous aimerez peut-être aussi