Académique Documents
Professionnel Documents
Culture Documents
Ans: Regular
Ans: Private
8. What is an Accumulator?
Ans: A register in cpu to temporary hold the intermediate arithmetic and logic data
9. Given an arbitrary non-deterministic finite automaton (NFA). with N states, the maximum number
of states in an equivalent minimized DFA is at least.
Ans: 2^N
14. Given the language L = {ab, aa, baa}, which of the following strings are in L*?
1) abaabaaabaa
2) aaaabaaaa
3) baaaaabaaaab
4) baaaaabaa
Ans: 1 , 2 & 4
15. Which of the following scheduling algorithm comes under preemptive scheduling?
Ans: 3
17. First derivative approximation says that values of constant intensities must be
Ans: 0
A. int funct();
E. None of these
Answer: Option B
19. Some code optimizations are carried out on the intermediate code because
Ans: program analysis is more accurate on intermediate code than on machine code
Ans: Possible
22.One can safely state that the output lines for a demultiplexer are under the direct control of the:
26. What is the maximum number of reduce moves that can be taken by a bottom-up parser for a
grammar with no epsilon- and unit-production (i.e., of type A -> є and A -> a) to parse a string with n
tokens?
Ans: n-1
28. The type of Interpolation where for each new location the intensity of the immediate pixel is
assigned is ___________
Ans: 1NF
31. The term m45 should be made up of at least _____ literals. (y'w'+yw+xyz'+x'y'z' - 10 literals)
Ans:
32. A friend function to a class A cannot access: (Friend function is used to access private member
function of a class in other class)
Ans:
Ans: mapping
35. Which of the following derivations does a top-down parser use while parsing an input string? The
input is assumed to be scanned in left to right order.
36. What will be the output of the following code #include void main() { int i; int a[3]=5; for (i=2;i>=0;i-
-) { printf(?%d\n?,a[i]); } }
Ans: Error 0 0 5
Ans: Parent-Child relation ship between the tables that connect them
38. Network models are complicated by physical keys, but the relation model is
39. An LALR(1) parser for a grammar G can have shift-reduce (S-R) conflicts if and only if
Ans: the LR(1) parser for G has S-R conflicts
40. Images quantised with insufficient brightness levels will lead to the occurrence of ____________
42. In C++, dynamic memory allocation is achieved with the operator ______
Ans: new
43. Multiplication of a positive integer by a power of two can be replaced by left shift, which executes
faster on most machines. This is an example of
44. If the inner region of the object is textured then approach we use is
Ans: similarity
Ans: non-redundant, consistency, data is integrated and can be accessed by multiple programs
46. Register is a ?
Ans: Temporary storage unit within the CPU having dedicated or general purpose use
49. Variables inside parenthesis of functions declarations have _______ level access.
Ans: Local
50. When we concatenate two languages L1 and L2 recognized by machine M1 and M2 we obtain a
machine with final state same as that of __________________
Ans:
52. For which of the following flip-flop the output clearly defined for all combinations of two inputs?
Ans: <<
Ans:
56. Manager salary details are hidden from the employee. This is
58.Trigger is a
Ans:automatic giving of an action. A special kind of stored procedure that automatically executes
when an event occurs in the database server
59.Image compression is
60.If there is a complete DFA M1 recognizing a language L1 and has m states out of which two are
final states then the machine M recognizing L1 complement will have _____________ final states.
62.If you assign a default value to any variable in a function prototype's parameter list, then _____
Ans: all parameters to the right of that variable must have default values
Ans: 2
65.If M1 machine recognizing L with n states, then M2 recognizing L* constructed Using Thompson
construction will have ------------- states.
Ans: 3
int (*ptr)[10];
69.Which of the following intermediate language can be used in intermediate code generation?
70.Which of the following calls a function named displayName, passing it no actual arguments?
Ans: Display Name();
Ans: positive
Ans: Record
74.When used with an IC, what does the term "QUAD" indicate?
Ans: 4 instances
75.If you want to use a class to define objects in many different programs, you should define the
class in a C++ _____ file
76.Additive rule:
77.A finite automata that will accept only string X of length n will have _________ many states
Ans: one for the declarations and one for the implementations
Ans: 1011
85.The CFG
s---> as | bs| a | b
Ans: Binary data ( picture signals (frames) that are represented by binary data (bits))
A. equal
B. less
C. greater
D. addition
D
Ans: Header
91.If a language is denoted by a regular expression
L = ( x )* (x | y x ) ,
Ans: DBMS
Ans: 0
94.Which one of the following is currently the most popular data model?
Ans: DBMS/RDBMS
Ans: Binary
103.What is an ALU?
104.In which technique which is used to determine changes between two images ?
mage differencing
105.Let L be a set accepted by a nondeterministic finite automaton. The number of states in non-
deterministic finite automaton is |Q|. The maximum number of states in equivalent finite
automaton that accepts L is
2^N.
D. view level
1101
109.The library function used to find the last occurrence of a character in a string is
strchr
110.What is the minimum number of states needed to a DFA over Σ= (a, b) which accept those
words from
Σ such that the number of a is even and the number of b is divisible by three.
111. ______________is a logical unit of access to a DBMS
transaction
112. .............should be serious consideration prior to the use of derivatives in applications where
noise is likely to be present.
Image smoothing
113. A pixel p at coordinate (x,y)has four horizontal and vertical neighbors whose coordinates are
given by:
114.
(1) For every non-deterministic Turing machine, there exists an equivalent deterministic Turing
machine.
(2) Turing recognizable languages are closed under union and complementation.
(3) Turing decidable languages are closed under intersection and complementation
(4) Turing recognizable languages are closed under union and intersection.
2 only
115.
record or tuple
116.
___________ programs automatically connects to web sites and download documents and save
them to local drive
117.
118.
String s1 = ? VIT? ;
String s2 = ? VIT ? ;
(A) s1 == s2
(B) s1 = s2
(C) s3 == s1
(D) s1.equals(s2)
(E) s3.equals(s1)
• (A), (D) & (E)
119.
121.
How many possible outputs would a decoder have with a 6-bit binary input?
64
122.
A Turing machine that accepts every string of the language and does not accept
123.
124.
125.
126.
127.
What is the condition for setting the Overflow flag in status register?
128.
129.
130.
What is the status of the inputs S0, S1, and S2 of the 74151 eight-line multiplexer in order for the
output Y to be a copy of input I5?
131.
132.
133.
The mechanism that bring a page into memory only when it is needed is called _____________
133.
The mechanism that bring a page into memory only when it is needed is called _____________
134.
135.
What does JSP stand for?
136.
Given the basic ER and relational models, which of the following is INCORRECT?
137.
138.
139.
140.
141.
142.
143.
144.
146.
Which of these methods has no restrictions on content size when a form is submitted.
147.
148.
The following function computes the maximum value contained in an integer array
while (__________) {
else { b = b-1; }
return p[a];
}
The missing loop condition is
149.
If a register containing binary data (11001100) is subjected to arithmetic shift left operation, then the
content of the register after 'ashl' shall be
150.
First derivative approximation says that values along the ramp must be
151.
152.
Let E1 and E2 be two entities in an E/R diagram with simple single-valued attributes. R1 and R2 are
two relationships between E1 and E2, where R1 is one-to-many and R2 is many-to-many. R1 and
R2 do not have any attributes of their own. What is the minimum number of tables required to
represent this situation in the relational model?
get (n-1)
get (n-3) ;
printf ("%d",n);
If get(6) function is being called in main () then how many times will the get() function be
invoked before returning to the main ( ) ?
156.Which of the following regular expression denotes a language comprising of all possible strings
over ∑= {a,b} of length n where n is a multiple of 3?
157.Select operation in SQL is equivalent to
Ans: DCL
161.A language is represented by a regular expression (a)*(a+ba). Which of the following string
does not belong to the regular set represented by the above expression.
162.
(i)HTTP
(ii)FTP
(iii)TCP
(iv)POP3
Answer: (C)
163.
166)
#include <stdio.h> int
main (){
static int a[]={10, 20, 30, 40, 50}; static int
*p[]= {a, a+3, a+4, a+1, a+2}; int **ptr=p;
ptr++;
Ans - Returns a memory address (if all the syntax errors are ignored)
0x60106840
167) The lexical analysis for a modern language such as Java needs the power of
which one of the following machine models in a necessary and sufficient sense?
Ans - Changing the physical storage without affecting the external view of the data
Ans - 3 1 2 2 1 3 4 4 4
171) A minimum state DFA accepting the language L={w/w belongs {0,1}*} number of
0s and 1s in w are divisible by 3 and 5, respectively} has
Ans - 15 states
http://www.geeksforgeeks.org/wp-content/uploads/gq/2013/10/gatecs2013.15.png
173.
175) Consider the following program: int f(int *p, int n){
if (n <= 1) return 0;
{
int a[] = {3,5,2,6,4};
printf("%d", f(a,5));
Ans - 3
176) Standard rate of showing frames in a video per second are Ans - higher than 50 Hz through 90 Hz
Ans - Constraints
Ans - http://www.geeksforgeeks.org/gate-gate-cs-2012-question-24/
(A) 1, 2, 3, 4
(B) 1, 2
(C) 2, 3, 4
(D) 3, 4
Answer: (D)
179.
Which of the following problems are decidable?
Ans - s = L - 1 - r, where
181) To prevent any method from overriding, the method has to declared as,
Ans - final
182) -24 is 2’s complement form is
Ans -11101000
Ans - Different
Ans -
Ans -
#include
int main ()
{
int x=1;
x+=f1()+ f2()+f3()+f2() ;
printf("%d", x);
return 0;
int f2(){static int x =50; x++;return x;} int f3(){x*=10; return x};
Ans - 230
Ans - https://gateoverflow.in/87123/gate1989-3-iii
2 and 4 mostly 2
191) A _________ registrar stores the intermediate arithmetic and logic results in it.
192) The principle tools used in image processing for a broad spectrum of applications Ans - Spatial
filtering
193) The special memory used to store the micro routines of a computer is ________. Ans - Control store
Ans - 2
Ans - External
196) Repeated
197) Consider the function func shown below: int func(int num) {
int count = 0;
while (num) {
count++; num>>= 1;
}
return (count);
198)
intmain()
{char sl [7]="1234",*p;
p=sl+2;
*p='0';
printf ("%s",sl)
}
What will be printed by the program?
Ans - 1204
200) S -> aSa|bSb|a|b; The language generated by the above grammar over the alphabet {a,b} is the set
of
Ans - The strings accepted by language are {a, b, aaa, bbb, aba, bab, ..}. All of these strings are odd
length palindromes.
Ans - Raw
202) The processor 80386/80486 and the Pentium processor uses _____ bits address bus: Ans - 32
Ans - Archie
204) What is the complement of the language accepted by the NFA shown below?
Ans - B
Ans - The Q output is either SET or RESET as soon as the D input goes HIGH or LOW.
207) A table can have only one
208) When a new row is inserted the constraints that can be violated are
Ans - Berkely
210) A deterministic finite automation (DFA)D with alphabet {a,b} is given below
Which of the following finite state machines is a valid minimal DFA which accepts the same language as
D?
Ans -
212) What type of register would shift a complete binary number in one bit at a time and shift all the
stored bits out one bit at a time?
Ans - SISO
int i = 0;
Ans - I =1
216) The number of full and half-adders required to add 16-bit numbers is
Ans - 1 half-adder, 15 full-adders
217) Which one of the following languages over the alphabet {0,1} is described by the regular
expression: (0+1)*0(0+1)*0(0+1)*?
class B. Identify the type of relationship between class A and Class B: Ans -
220) What are the minimum number of 2-to-1 multiplexers required to generate a 2- input AND
gate and a 2-input Ex-OR gate?
Ans - 1 and 2
221.
Dynamic range of imaging system is a ratio where the upper limit is determined by
222.
Consider the languages L1 = phi and L2 = {a}. Which one of the following represents L1 L2 * U L1*
223.
The number of tokens in the following C statement is (GATE 2000)
224.
A graphical HTML browser resident at a network client machine Q accesses a static HTML
webpage from a HTTP server S. The static HTML page has exactly one static embedded image
which is also at S. Assuming no caching, which one of the following is correct about the HTML
webpage loading (including the embedded image)?
221 . Dynamic range of imaging system is a ratio where the upper limit is determined by : Saturation
222. Consider the languages L1 = \phi and L2 = {a}. Which one of the following represents L1 L2* U L1* : A
224.A graphical HTML browser resident at a network client machine Q accesses a static HTML webpage from a HTTP server S. The static HTML page has exactly one static
embedded image which is also at S. Assuming no caching, which one of the following is correct about the HTML webpage loading (including the embedded image)?
Q needs to send at least 2 HTTP requests to S, but a single TCP connection to server S is
sufficient
225. A 2 bit binary multiplier can be implemented using :
227.
Foreign Key is
228.
In a conceptual model for a university, which of the following could most appropriately be
represented via a recursive relationship?
229. In a compiler, keywords of a language are recognized during : the lexical analysis of
the program
main()
int i;
int*pi = &i;
scanf("%d",pi);
printf("%d\n", i+5);
On execution, the value printed is 5 more than the integer value entered.
233. Which of the following most certainly implies the need for an entire table to implement?
: A ternary relationship
234.
#include
int main()
int x=20;
if(!(!x)&&x)
cout<<x;
else
x=10;
cout<<x;
return 0;
}
}
236. For the grammar below, a partial LL(1) parsing table is also presented along with the grammar.
Entries that need to be filled are indicated as E1, E2, and E3. is the empty string, $ indicates end of
input, and, | separates alternate right hand sides of productions.
(A)
FIRST(A)={a,b,ε}=FIRST(B)
FOLLOW(A)={a,b}
FOLLOW(B)={a,b,$}
putchar (*a);
240. The grammar S → aSa | bS | c is : Both LL(1)and LR(1) ( LR(1) is more powerful than
LL(1))
243. Match all items in Group 1 with correct options from those given in Group 2.
Group 1 Group 2
244. Which of the following is a problem of file management system? : depends on options
245. A shift register can be used for. : Shift registers are commonly used in converters that
translate parallel data to serial data, or vice-versa. Shift registers can also function as delay
circuits and digital pulse extenders.
246. Smoothing filters are mostly used in : blurring and noise reduction
247. A set of documents in which a given document can contain text, graphics video and
audio clips as well as embedded references to other documents world wide web pages are
called as : Website
x = u - t;
y = x * v;
x = y + w;
y = t - z;
y = x * y;
The minimum number of total variables required to convert the above code segment to static single
assignment form is : 10
250.A Consider we are extracting an 8 bit plane from an 8bit image. Then which two bit plane contain the most significant information : Plane 8 and Plane 7
251. A synchronous sequential circuit is made up of. : from combinational logic and some storage elements.
Answer : s[2].marks[4]
1. i = 1
2. j = 1
3. t1 = 5 * i
4. t2 = t1 + j
5. t3 = 4 * t2
6. t4 = t3
7. a[t4] = –1
8. j = j + 1
9. if j <= 5 goto(3)
10. i = i + 1
The number of nodes and edges in the control-flow-graph constructed for the above code,
respectively, are
Answer : 6 and 7
259. How many different states does a 3-bit asynchronous counter have? : 8
261. f there are n relations how many number of join conditions has to be applied to retrieve
the data from all the n relations? : n-1
if (n <= 1) return 0;
int main()
{
printf("%d", f(a,5));
264. Which relational algebra query will return employees (i.e., EmpID) who work on all
projects? : depends on options
266.
main()
int i;
scanf("%d",pi);
printf("%d\n", i+5);
(A) they enhance the portability of the compiler to other target processors
268. _______ produces the relation that has attributes of R1 and R2 : External join
269. Which method is used for loading the driver in Java JDBC. : registerDriver() method or
- Class.forName()
270. First derivative approximation says that values of constant intensities must be : 0
271. How many flip-flops are required to make a MOD-32 binary counter? 5
Options unavailable
274. Which of the following operation is used if we are interested in only certain columns of a table?
Project
increase the chances of reusing the machine-independent code optimizer in other compilers
276.
Which of the following input controls that cannot be placed using <input> tag?
277.
It is difficult to design asynhronous sequential circuit because.
278.
Which of the following statements related to merging of the two sets in the corresponding LALR parser
is/are FALSE?
279.
Join is equal to
280.
281.
282.
Which of the following in HTML is used to left align the content inside a table cell?
283.
Popular application of flip-flop are.
284.
#include <stdio.h>
int main()
{
int a=10;
int b=2;
int c;
return 0;
}
285.
290.
#include <stdio.h>
int main()
{
unsigned char item=0x00;
item |=MOBILE;
item |=LAPPY;
return 1;
}
291.
292.
(A) It is the position in a sentential form where the next shift or reduce operation will occur
(B) It is non-terminal whose production will be used for reduction in the next step
(C) It is a production that may be used for reduction in a future step along with a position in the sentential
form where the next shift or reduce operation will occur
(D) It is the production p that will be used for reduction in the next step along with a position in the
sentential form where the right hand side of the production may be found
Answer: (D)
293.
The grammar A → AA | (A) | ε is not suitable for predictive-parsing because the grammar is
(A) ambiguous
(B) left-recursive
(C) right-recursive
(D) an operator-grammar
Answer: (B)
294.
295.
#include <stdio.h>
int main()
{
char flag=0x0f;
return 0;
}
296.
297.
298.
The harmonic mean filter works well for...........but fails for pepper noise. : salt noise
299.
Let the number of states in SLR(1), LR(1) and LALR(1) parsers for the grammar be n1, n2 and n3
respectively. The following relationship holds good
300.
301.
#include <stdio.h>
int main()
int a=10;
if(a==10)
printf("Hello...");
break;
printf("Ok");
else
printf("Hii");
}
return 0;
302.
The number of clock pulses needed to shift one byte of data from input to the output of a 4-bit shift
register is.
303.
304.
#include
int main()
printf("%s","Condition is true.");
else
printf("%s","Condition is false.");
return 0;
305.
Which of the following grammar rules violate the requirements of an operator grammar ? P, Q, R are
nonterminals, and r, s, t are terminals.
1. P→QR
2. P→QsR
3. P→ε
4. P→QtRr
306.
307.
308.
Consider the grammar with the following translation rules and E as the start symbol.
| T{ E.value = T.value }
| F{ T.value = F.value }
Compute E.value for the root of the parse tree for the expression: 2 # 3 & 5 # 6 & 4.
309.
310.
In _______ image we notice that the components of histogram are concentrated on the low side on
intensity scale.
311.
#include
#define TRUE 1
int main()
if(TRUE)
printf("1");
printf("2");
else
printf("3");
printf("4");
return 0;
312.
313.
314.
315.
#include <stdio.h>
int main()
int pn=100;
if(pn>20)
if(pn<20)
printf("Heyyyyy");
else
printf("Hiiiii");
return 0;
316.
317.
The type of Histogram Processing in which pixels are modified based on the intensity distribution of
the image is called _______________.
318.
IF Y is a subset of X then
319.
What type of register would shift a complete binary number in one bit at a time and shift all the
stored bits out one bit at a time?
320.
321.
#include
int main()
{
int a=10;
if(10L == a)
printf("10L");
else if(10==a)
printf("10");
else
printf("0");
return 0;
322.
S→CC
C→cC|d
The grammar is
323.
324.
R → + T {print ('+');} R | ε
Here num is a token that represents an integer and num.val represents the corresponding integer value.
For an input string '9 + 5 + 2', this translation scheme will print
325.
326.
#include
void main(){
printf("%d",c);
327.
Which of the following statements best describes the operation of a synchronous up-/down-counter?
328.
Which one of the following is True at any valid state in shift-reduce parsing?
329.
330.
331.
#include <stdio.h>
void main(){
int a=0;
a=5||2|1;
printf("%d",a);
332.
Which segments of a seven-segment display would be active to display the decimal digit 2?
333.
List-I List-II
A. Lexical analysis 1. Graph coloring
B. Parsing 2. DFA minimization
C. Register allocation 3. Post-order traversal
D. Expression evaluation 4. Production tree
Codes:
ABCD
(a) 2 3 1 4
(b) 2 1 4 3
(c) 2 4 1 3
(d) 2 3 4 1
334.
#include
int main(){
float a=125.50;
int b=125.50;
char c='A';
printf("%d,%d,%d\n",sizeof(a),sizeof(b),sizeof(125.50));
printf("%d,%d\n",sizeof(c),sizeof(65));
return 0;
335.
What is the minimum number of NAND gates required to implement A + AB` + AB`C?
336.
337.
What is the highest normal form level satisfied by the following table design? R={A1,A2,A3,A4,A4}
F={A1-> A3, A3->A4}Key ={A1,A2}
338.
Among simple LR (SLR), canonical LR, and look-ahead LR (LALR), which of the following pairs identify
the method that is very easy to implement and the method that is the most powerful, in that order?
339.
340.
#include
int main()
int ok=-100;
-100;
printf("%d",ok);
return 0;
341.
A certain 5-bit self-complementary code is used to represent the 10 decimal digits 0 through 9.
Given that (246) in decimal is represented as 00010 00100 00110 in this code, what is the
representation for (375)?
342.
343.
344.
345.
#include
enum numbers
};
void main()
printf("%d,%d,%d,%d,%d,%d,%d,%d,%d",zero,one,two,three,four,five,six,seven,eight);
346.
347.
Consider the following Syntax Directed Translation Scheme (SDTS), with non-terminals {S, A} and
348.
349.
350.
An engineer is tasked to verify a software release for a mission critical system. The plan is for the
release of software for verification to occur on a Monday, with verification complete the following
Friday. The release turns out not to be available until Thursday. The best route for the engineer is to:
351.
Given the functional dependencies, {AB -> CDE and A -> E}, for relation schema R = (A,B,C,D,E)
we can infer the following:
352.
#include <stdio.h>
int main(){
int a,b,c;
a=0x10; b=010;
c=a+b;
return 0;
353.
#include
int main()
int var=250;
200+50;
"includehelp.com";
printf("%s\n","includehelp");
return 0;
}
Find the output
354.
355.
356.
The set of fundamental assumptions about what products the organization should produce, how and
where it should produce them, and for whom they should be produced is
357.
358.
359.
The set of fundamental assumptions about what products the organization should produce, how and
where it should produce them, and for whom they should be produced is
360.
#include
int main()
int a=100;
printf("%d\n"+1,a);
printf("Value is = %d"+3,a);
return 0;
361.
362.
Consider the CFG with {S,A,B) as the non-terminal alphabet, {a,b) as the terminal alphabet, S as the start
symbol and the following set of production rules
S --> aB S --> bA
B --> b A --> a
B --> bS A --> aS
B --> aBB A --> bAA
363.
#include <stdio.h>
int main()
printf("value of ok = %d",ok);
return 0;
}
364.
365.
366.
367.
In CMM, the life cycle activities of requirements analysis, design, code, and test are described in
368.
369.
370.
#include <stdio.h>
int main()
int a=23;
;printf("%d",a);
;
return 0;
371.
Which of the following is/are main parameters that you should use when computing the costs of a
software development project?
372.
373.
Following can be used to implement a SOP function without changing it into minterms
374.
Which one of the following models is not suitable for accommodating any change?
375.
#include
int main()
int intVar=24;
printf("%d,%d",intVar,x);
return 0;
376.
377.
378.
The language accepted by a Pushdown Automation in which the stack is limited to 10 items is best
described as
379.
#include <stdio.h>
int main()
int a=15;
float b=1.234;
printf("%*f",a,b);
return 0;
380.
381.
382.
The three key levels at which responsibility can be defined is at the ____,_______,____
383.
384.
385.
#include <stdio.h>
int main()
float a,b;
a=3.0f;
b=4.0f;
printf("%.0f,%.1f,%.2f",a/b,a/b,a/b);
return 0;
}
386.
Consider the NPDA 〈 Q = {q0, q1, q2}, Σ = {0, 1}, Γ = {0, 1, ⊥}, δ, q0, ⊥, F = {q2}〉 , where (as per usual
convention) Q is the set of states, Σ is the input alphabet, Γ is stack alphabet, δ is the state transition
function, q0 is the initial state, ⊥ is the initial stack symbol, and F is the set of accepting states, The state
387.
388.
389.
An engineer is tasked to verify a software release for a mission critical system. The plan is for the
release of software for verification to occur on a Monday, with verification complete the following
Friday. The release turns out not to be available until Thursday. The best route for the engineer is to:
390.
391.
L2 = {ambnambn ⎪ m, n ≥ 1}
L3 = {ambn ⎪ m = 2n + 1}
392.
unsigned num;
393.
394.
395.
396.
Which one of the following is a valid project Key Performance Indicator (KPI)?
397.
Let G be the CFG, l be the number of left most derivations, r be the number of right most derivations and
P be the number of parse trees. Assume l , r and P are computed for a particular string. For a given CFG
‘G’ and given string ‘w’, what is the relation between l , P , r ?
398.
The combination of Sixteen adjacent squares in four variable K-map represent the function equal to
399.
400.
Find the output:
#include <stdio.h>
void main()
++var;
printf("%c",var);
401.
Calculate the person months for a project that was completed in two months with two people working
on it.
402.
Consider 2 scenarios:
403.
Consider the join of a relation R with relation S. If R has m tuples and S has n tuples, then the
maximum size of join is:
404.
Given the language L = {ab, aa, baa}, which of the following strings are in L*?
1) abaabaaabaa
2) aaaabaaaa
3) baaaaabaaaab
4) baaaaabaa
405.
#include <stdio.h>
void main()
int x=10;
x+=(x++)+(++x)+x;
printf("%d",x);
406.
407.
408.
#include <stdio.h>
void main()
int a=10,b=2,x=0;
x=a+b*a+10/2*a;
printf("value is =%d",x);
409.
410.
Consider the set of strings on {0,1} in which, every substring of 3 symbols has at most two zeros. For
example, 001110 and 011001 are in the language, but 100010 is not. All strings of length less than 3 are
also in the language. A partially completed DFA that accepts this language is shown below.
412.
413.
The IC 8237 is a
414.
415.
#include <stdio.h>
void main()
var+=2;
var++;
416.
SELECT department_id, COUNT(last_name) FROM employees;
417.
418.
SELECT department_id, AVG(salary) FROM employees WHERE AVG(salary) > 8000 GROUP BY
department_id
419.
Let w be any string of length n is {0,1}*. Let L be the set of all substrings of w. What is the minimum
number of states in a non-deterministic finite automaton that accepts L?
420.
421.
422.
#include <stdio.h>
void main()
char var=10;
printf("var is = %d",++var++);
423.
425.
426.
#include <stdio.h>
void main()
printf("x= %d",x);
427.
428.
429.
The MC 1488 is
430.
431.
#include <stdio.h>
void main()
int x;
x= (printf("AA")||printf("BB"));
printf("%d",x);
printf("\n");
x= (printf("AA")&&printf("BB"));
printf("%d",x);
432.
433.
434.
435.
436.
#include <stdio.h>
void main()
int a=3,b=2;
a=a==b==0;
printf("%d,%d",a,b);
}
437.
438.
439.
when you were asked to design a relation, you come across a situation, where passport number is to
be included for the people. All the students wont be having passport. So what constraint you would
be using?
440.
#include <stdio.h>
void main(){
int intVar=20,x;
x= ++intVar,intVar++,++intVar;
441.
Which one of the following statements best defines the purpose of a Product Breakdown Structure
(PBS)?
442.
444.
445.
#include <stdio.h>
int main(){
char val=250;
int ans;
printf("%d",ans);
return 0;
446.
447.
449.
During a software development project two similar requirements defects were detected. One was
detected in the requirements phase, and the other during the implementation phase. Which of the
following statements is mostly likely to be true?
450.
451.
#include <stdio.h>
int main(){
float a;
(int)a= 10;
printf("value of a=%d",a);
return 0;
452.
With SQL, how can you insert "Olsen" as the "LastName" in the "Persons" table?
453.
454.
455.
456.
Consider a software program that is artificially seeded with 100 faults. While testing this
program, 159 faults are detected, out of which 75 faults are from those artificially seeded faults.
Assuming that both are and seeded faults are of same nature and have same distribution, the
estimated number of undetected real fault is
457.
#include <stdio.h>
int main(){
int x;
x=100,30,50;
printf("x=%d\n",x);
x=(100,30,50);
printf("x=%d\n",x);
return 0;
458.
Which character function can be used to return a specified portion of a character string?
459.
460.
#include <stdio.h>
int main()
int i=-1,j=-1,k=0,l=2,m;
m=i++&&j++&&k++||l++;
printf("%d %d %d %d %d",i,j,k,l,m);
return 0;
461.
462.
463.
Which of the regular expressions given below represent the following DFA?
I) 0*1(1+00*1)*
II) 0*1*1+11*0*1
III) (0+1)*1
464.
465.
466.
#include <stdio.h>
int main()
int var;
var=- -10;
var=+ +10;
return 0;
468.
469.
470.
The length of the shortest string NOT in the language (over Σ = {a, b}) of the following regular expression
is ______________.
a*b*(ba)*a*
471.
#include <stdio.h>
int main()
int x,y;
x=(100,200);
y=100,200;
printf("x=%d,y=%d",x,y);
return 0;
473.
474.
475.
Consider the regular language L = (111 + 11111)*. The minimum number of states in any DFA accepting
this languages is:
476.
477.
Important capability needed for an agile software developer is
478.
Which SQL functions is used to count the number of rows in a SQL query?
479.
The smallest finite automation which accepts the language {x | length of x is divisible by 3} has :
480.
481.
#include <stdio.h>
int main()
int x=65;
printf("%c\n",c);
return 0;
482.
A binary code that progresses such that only one bit changes between two successive codes is:
483.
Consider a DFA over ∑ = {a, b} accepting all strings which have number of a’s divisible by 6 and number of
b’s divisible by 8. What is the minimum number of states that the DFA will have?
484.
485.
#include <stdio.h>
int main()
int x=2.3;
printf("%d,%d\n",c1,c2);
return 0;
486.
A software requirements specification (SRS) document should avoid discussing which one of the
following?
487.
In a BCD-to-seven-segment converter, why must a code converter be utilized?
488.
489.
#include <stdio.h>
int main()
char x=(char)(text[3]);
printf("%c\n",x);
return 0;
490.
491.
492.
How many minimum states are required in a DFA to find whether a given binary string has odd number of
0's or not, there can be any number of 1's.
493.
494.
#include <stdio.h>
int main()
int x=65;
printf("%c\n",c);
return 0;
495.
Consider the DFAs M and N given above. The number of states in a minimal DFA that accepts the
496.
One can safely state that the output lines for a demultiplexer are under the direct control of the:
498.
499.
#include <stdio.h>
int main()
char x=(char)(text+3);
printf("%c\n",x);
return 0;
500.
Identify the proper data direction and modes of operation of the 8255 ports if the control word written
into it is 9BH.
501.
What is the maximum number of reduce moves that can be taken by a bottom-up parser for a grammar
with no epsilon- and unit-production (i.e., of type A -> є and A -> a) to parse a string with n tokens?
502.
Insert into Emp(101, ‘XXX’) gives the following error
503.
504.
#include <stdio.h>
void main()
int a=10;
switch(a){
case 5+5:
printf("Hello\n");
default:
printf("OK\n");
505.
The following SQL is which type of join: SELECT CUSTOMER_T. CUSTOMER_ID, ORDER_T.
CUSTOMER_ID, NAME, ORDER_ID FROM CUSTOMER_T,ORDER_T ;
506.
Which of the following statements related to merging of the two sets in the corresponding LALR parser
is/are FALSE?
507.
Which of the following command words need to be programmed to operate a single PIC in fully
nested mode with an 8086 microprocessor
508.
509.
510.
#include <stdio.h>
void main()
int a=2;
switch(a)
printf("Message\n");
default:
printf("Default\n");
case 2:
printf("Case-2\n");
case 3:
printf("Case-3\n");
511.
512.
When operated in slave mode, the PIC outputs its type number only if the cascaded address
received on CAS0-CAS2 matches the address programmed in --------- bits D0-D2
513.
514.
#include <stdio.h>
void main()
int a=2;
int b=a;
switch(b)
case a:
printf("Case-a\n"); break;
case 3:
printf("Case-3\n"); break;
default:
515.
If the PIC outputs the type number of C8H, the CPU will retrive the vector stored in the address ------
--------
516.
517.
Which of the following is shared between all of the threads in a process? Assume a kernel level
thread implementation
518.
Let L1 be a recursive language, and let L2 be a recursively enumerable but not a recursive language.
Which one of the following is TRUE?
520.
#include <stdio.h>
void main()
short day=2;
switch(day)
printf("%d nd",day);
break;
default:
printf("%d th",day);
break;
521.
Which Instruction word is used to specify the number of stop bits, data bits, parity bit and the baud
rate clock factor for the 8251A USART
522.
523.
The interrupt cycle ends when the ........... instruction is executed
524.
525.
#include <stdio.h>
void main()
short a=2;
switch(a)
case 1L:
printf("One\n");
break;
case 2L:
printf("Two\n");
break;
default:
printf("Else\n");
break;
526.
528.
#include <stdio.h>
void main(){
int j;
for(j=0;j<=5;j+=2)
switch(j){
case 1:
staticVar++;
break;
case 2:
staticVar+=2;
case 4:
staticVar%=2;
j=-1;
continue;
default:
--staticVar;
continue;
printf("%d",staticVar);
}
Find the output
529.
530.
531.
532.
533.
Use of ________ allows for some processes to be waiting on I/O while another process executes.
535.
536.
#include <stdio.h>
void main()
int a=2;
switch(a/2*1.5)
case 1:
printf("One...");
break;
case 2:
printf("Two...");
break;
default:
printf("Other...");
break;
537.
538.
#include <stdio.h>
void main(){
int a=1;
switch(a/2)
case NULL:
printf("Case NULL\n");
break;
case 0:
printf("Case ZERO\n");
break;
default:
printf("DEFAULT\n");
break;
539.
540.
541.
The ________ ensures that only one IC is active at a time to avoid a bus conflict caused by two ICs
writing different data to the same bus
542.
An optimizing compiler
543.
544.
#include <stdio.h>
int main()
{
int i;
if(i*i > 30 )
goto lbl;
else
printf("%d",i);
lbl:
printf("IHelp ");
return 0;
545.
546.
547.
548.
549.
A view is a
550.
#include <stdio.h>
#define TRUE 1
int main()
switch(TRUE)
printf("Hello");
551.
The set of all strings over the alphabet {a,b} (including epsilon} is denoted by
552.
553.
554.
Which one of the following languages over alphabet {0,1} is described by the regular expression:
(0+1)*0(0+1)*0(0+1)*?
555.
556.
557.
void main()
for(var=0;var<=255;var++);
printf("%d ",var);
558.
559.
Passing the request from one schema to another in DBMS architecture is called as _______
560.
How many DFAs exit with two state over the input alphabet (a,b)
561.
#include <stdio.h>
void main()
char cnt=0;
for(;cnt++;printf("%d",cnt)) ;
printf("%d",cnt);
562.
563.
The first processor to include Virtual memory in the Intel microprocessor familywas
564.
565.
#include <stdio.h>
void main()
int i=1;
while (i<=5)
{
printf("%d",i);
if (i==5)
goto print;
i++;
fun()
print:
printf("includehelp.com");
566.
The maximum number of superkeys for the relation schema R(E,F,G,H) with E as the key is
567.
Which one of the following regular expressions over {0,1} denotes the set of all strings not containing
100 as a substring?
568.
Assume that a table R with 1000 records is to be joined with another table S with 10000 records.
What is the maximum number of records that would result in if we join R with S and the equi-
join attribute of S is the primary key?
569.
The number of states in DFA is --------than the number of states in NFA for the same Language.
570.
int main()
int tally=0;
for(;;)
if(tally==10)
break;
printf("%d ",++tally);
return 0;
571.
The ESC instruction of 8086 may have two formats. In one of the formats, no memory operand is
used. Under this format, the number of external op-codes (for the co- processor) which can be
specified is
572.
#include <stdio.h>
void main()
int tally;
for(tally=0;tally<10;++tally)
printf("#");
if(tally>6)
continue;
printf("%d",tally);
574.
DB, DW and DD directives are used to place data in particular location or to simplyallocate space
without preassigning anything to space. The DW and DD directories areused to generate
575.
576.
R1(A); W1(A); R2(B); R2(A); R1(B); W2(A+B); W1(B); where R1 and W1 are read and write
operations of transaction T1 and R2 and W2 are read and write operations of transaction T2.
Which of the following is correct regarding schedule S1?
577.
578.
When FA M is given which recognizes language L and reverse of L is found by using M then there
can be ___________Final states
579.
580.
#include <stdio.h>
void main()
int i,j,charVal='A';
for(i=5;i>=1;i--)
for(j=0;j< i;j++)
printf("%c ",(charVal+j));
printf("\n");
}
Identify the output
581.
In a microprocessor, the service routine for a certain interrupt starts from a fixed location of memory
which cannot be externally set, but the interrupt can be delayed or rejected. Such aninterrupt is
582.
The Hardware mechanism that enables a device to notify the CPU is called __________.
583.
584.
#include <stdio.h>
void main()
int cnt=1;
while(cnt>=10)
printf("%d,",cnt);
cnt+=1;
printf("\n");
585.
When there is complete DFA with Five states out of which two are final states if F is modified such
that it recognizes complement of the original language then there will be at least _________final
states.
586.
587.
The --------is neither an input nor an output; it is an internal bit programmed via the PC4(Port A) or
PC2(Port B)bits
588.
The kernel keeps track of the state of each task by using a data structure called __
589.
590.
591.
___ bit in ICW1 indicates whether the 8259A is cascade mode or not
592.
#include
#define TRUE 1
int main()
int loop=10;
while(printf("Hello ") && loop--);
593.
Number of the times the instruction sequence below will loop before coming out of loop is, MOV AL,
00h A1: INC AL JNZ A1
594.
What is the most common approach for the development of application system
now?
595.
596.
How many two state FA can be drawn over alphabet{0,1} which accepts(0+1)*
597.
#include <stdio.h>
int main()
int count=0;
var[++count]=++count;
for(count=0;count<5;count++)
printf("%d ",var[count]);
return 0;
598.
Which of the following four activities that may be a part of the design
process for information systems is where you design the system data
structures and how these are to be represented?
599.
600.
601.
#include <stdio.h>
int main()
int MAX=10;
int array[MAX];
return 0;
}
Find the output
602.
8086 microprocessor is interfaced to 8253 a programmable interval timer. The maximum number by
which the clock frequency on one of the timers is divided by
603.
When there is more than one final state in the reduced FA, then its regular expression will contain
_________ operator surely
604.
605.
606.
#include <stdio.h>
#define MAX 10
int main()
{ int array[MAX]={1,2,3},tally;
for(tally=0;tally< sizeof(array)/sizeof(int);tally+=1)
printf("%d ",*(tally+array));
return 0;
607.
#include <stdio.h>
int main()
printf("%c,%c,%c\n",*(x+tally)+1,x[tally]+1,*(tally+x)+1);
return 0;
609.
610.
n 8086 microprocessor the following has the highest priority among all type interrupts
611.
In Priority Scheduling a priority number (integer) is associated with each process. The CPU is
allocated to the process with the highest priority (smallest integer = highest priority). The problem of,
Starvation ? low priority processes may never execute, is resolved by __________.
612.
A data structure where elements can be added or removed at either end but not in the middle
613.
614.
___________ signal prevent the microprocessor from reading the same data more than one
616.
The Epsilon-Closure of any state q will contain the state ______________ irrespective of q.
617.
#include <stdio.h>
int main()
printf("%d...%d",*array,*(array+3)* *array);
return 0;
618.
619.
Which buffer is a parallel to serial converter that receives a parallel byte for conversion into a serial
signal and further transmission onto the communication channel.
620.
621.
The Epsilon-Closure of any state q will contain the state ______________ irrespective of q.
622.
#include <stdio.h>
int main()
{ int a[5]={1,2,3,4,5},b[5]={10,20,30,40,50},tally;
for(tally=0;tally< 5;++tally)
*(a+tally)=*(tally+a)+ *(b+tally);
for(tally=0;tally< 5;tally++)
printf("%d ",*(a+tally));
return 0;
623.
The minimum length for strings in the regular expression ( 10* + 001* )* is _________
624.
Identify the accurate control word for operate counter 0, Read/Write LSB only, Mode 2, BCD
countdown.
625.
________ scheduler selects the jobs from the pool of jobs and loads into the ready queue.
626.
#include <stdio.h>
int main()
{ int a[5]={0x00,0x01,0x02,0x03,0x04},i;
i=4;
while(a[i])
printf("%02d ",*a+i);
--i;
return 0;
627.
______________ is an initial version of a software system that is used to demonstrate concepts, try
out design options, and find out more about the problem and its possible solutions.
628.
____ messages are typically used for diagnostic or control purposes or generated in response to
errors in IP operations.
629.
630.
631.
#include <stdio.h>
int main()
{
char X[10]={'A'},i;
printf("%d ",X[i]);
return 0;
632.
The ........ instruction is used to specify the number of stop bits, data bits,parity bit, and baud rate
clock factor for the 8251 UART
633.
Using the 8259A, the INT input of the 8086 can be expanded to accomodeate up to ---------------
prioritized interrupt inputs
634.
Which of the following regular expression denotes a language comprising of all possible strings over
{a,b} of length n where n is a multiple of 3?
635.
_______ appends to the address a slash character and the decimal number of leading bits of the
routing prefix.
636.
1. int x[5];
2. int x[5]={1,2,3,4,5};
637.
638.
__________ algorithm is used for the flow control of data between sender and receiver.
639.
640.
Which one of the following correctly describes the meaning of 'namespace' feature in C++?
641.
If AL= 7FH and instruction ADD AL,1 is given, specify the contents of the six status flag
642.
643.
644.
Consider the regular language L = (111 + 11111)*. The minimum number of states in any DFA
accepting the language is
645.
______ cryptography refers to encryption methods in which both the sender and receiver share the
same key.
646.
The starting address for counter 0 of 8253 is 0038H, then port address for control word register is
647.
A tree sturctured file directory system
648.
649.
Which one of the file allocation scheme cannot be adopted for dynamic storage allocation
650.
651.
652.
______ is responsible for the final encapsulation of higher-level messages into frames that are sent
over the network using the physical layer.
653.
654.
The switching method fixes the path from source to destination is _________
655.
656.
Calculate the block number in free storage management of files system with number of bits per word
is 8, the bit vector is
657.
Which of the following algorithm design technique is used in the quick sort algorithm?
658.
Which of the following is useful in traversing a given graph by breadth first search?
659.
660.
661.
662.
Given the frequency f=1.5MHZ for 8253 timer the value of time period T is
663.
664.
665.
The minimum number of arithmetic operations required to evaluate the polynomial P(X) = X^5 +
4X^3 + 6^X + 5 for a given value of X using only one temporary variable.
666.
667.
In access lists and groups which one of the following is correct for the 'RWX' notation of the order
'group, owner, public'
668.
You have to sort a list L consisting of a sorted list followed by a few “random” elements.Which of the
following sorting methods would be especially suitable for such a task?
669.
The call to the parameterized constructor of base class in the derived class
671.
672.
673.
Why 'critical section' is not imposed on file systems instead 'file locks' when more than one process
tries to access the file?
674.
675.
676.
The 16-bit stack segment value is 5D27H and the offset is 2C30H. calculated physical address is ----
-
677.
678.
679.
680.
Given the Extra segment ES = 52B9H and the offset BX=D470H. Calculated physical address is -----
-----
681.
682.
683.
684.
685.
If the disk size is 2^30 bytes and block size is 2^12 bytes then find how many such blocks are there?
686.
Which of the following statements is/are TRUE for an undirected graph?P:Number of odd degree
vertices is even,Q: Sum of degrees of all vertices is even
687.
688.
689.
The 16-bit data segment value is 1000H and the offset is 2000H. calculated physical address is -----
690.
691.
Which of the following file access method needs a relative block number 'n'?
692.
Which of these is not an element of an object-oriented analysis model?
693.
Given the Code segment CS = 1000H and the offset BX=0050H. Calculated physical address is -----
-----
694.
695.
696.
697.
_____ gives the number of bits that can be transmitted over a network in a fixed time period.
698.
699.
700.
Parallelism and concurrency is fully achieved in which of the following thread model
701.
702.
If AL=C0H, Determine the content of the register AL after SAL AL,1 instruction is executed.
703.
704.
Assume the base address of CS is 3000H and IP is 2000H. Calculate the memory address.
705.
_______ should keep track of multiple file downloads requested by a particular FTP application, or
multiple telnet connections from a single terminal client, or web page retrievals from a web server.
706.
707.
Which Data structure is best suited for the UNDO operation in Windows
708.
709.
710.
711.
712.
713.
714.
715.
716.
718.
_________ is a high speed cache used to hold recently referenced page table entries a part of
paged virtual memory
719.
720.
721.
722.
723.
724.
725.
726.
Which one of the following is the correct way to declare a pure virtual function?
727.
728.
Mode of communication in which transmission takes place in both directions, but only in one
direction at a time is called.........................
729.
730.
If all page frames are initially empty, and a process is allocated 3 page frames in real memory and
references its pages in the order 1 2 3 2 4 5 2 3 2 4 1 and the page replacement is FIFO, the total
number of page faults caused by the process will be __________
731.
If you have an empty queue and you insert characters ‘r’, ‘a’, ‘t’ (in this order only), what is the order
of the characters when you dequeue all the elements?
732.
733.
734.
735.
Network operating system that does not support symmetric multi-processing (SMP) is
736.
738.
739.
Replace the page that has not be used for the longest period of time. This principle is adopted by
____________
740.
741.
1. Absolute addressing
2. Based addressing
3. Relative addressing
4. Indirect addressing
742.
If class A is friend of class B and if class B is friend of class C, which of the following is true?
743.
Which of the following conversion is not possible (algorithmically)?
744.
745.
746.
747.
748.
749.
The language that the computer can understand and execute is called ______
750.
In which topology, if there are n devices in a network, each device has n-1 ports for cables?
751.
Routine is not loaded until it is called. All routines are kept on disk in a relocatable load format. The
main program is loaded into memory & is executed. This type of loading is called _________
752.
753.
A network that contains multiple hubs is most likely configured in which topology?
754.
Write the regular expression to denote the language L over ? ={ a,b} such that all the string do not
contain the substring “ ab”.
755.
756.
757.
The mechanism that bring a page into memory only when it is needed is called ______
758.
759.
A Winchester disk is a
760.
761.
762.
In context of OSI or TCP/IP computer network models, which of the following is false?
763.
764.
Function templates can accept
765.
766.
767.
768.
769.
770.
The removal of process from active contention of CPU and reintroduce them into memory later is
known as ____________
771.
772.
773.
775.
If we create a file by ‘ifstream’, then the default mode of the file is _________
776.
Paging _________
777.
778.
Assume that we have constructor functions for both base class and derived class. Now consider the
declaration in main( ). Base * P = New Derived; in what sequence will the constructor be called ?
779.
780.
Which of the following memory allocation scheme suffers from External fragmentation?
781.
782.
783.
784.
Consider two strings A ='qpqrr' and B = 'pqprqrp'. Let x be the length of the LCS between A and B
and let y be the number of such longest common subsequences between A and B. Then x + 10y =
785.
Logical addressing is used in _____ layer
786.
A system uses FIFO policy for page replacement. It has 4 page frames with no pages loaded to
begin with. The system first accesses 100 distinct pages in some order and accesses the same 100
pages but now in the reverse order how many page faults will occur?
787.
788.
789.
A grammar that produces more than one parse tree for some sentence is called
790.
791.
792.
793.
794.
795.
797.
798.
Let G(x) be the generator polynomial used for CRC checking. What is the condition that should be
satisfied by G(x) to detect odd number of bits in error?
799.
Using linked list node representation, inserting a node in general tree is performed efficently
800.
801.
Templates improve
802.
What characteristic of RAM memory makes it not suitable for permanent storage?
803.
Frames of 1000 bits are sent over a 10^6 bps duplex link between two hosts. The propagation time
is 25ms. Frames are to be transmitted into this link to maximally pack them in transit (within the link).
What is the minimum number of bits, i will be required to represent the sequence numbers distinctly?
Assume that no time gap needs to be given between transmission of two frames.
804.
Suppose P, Q, R, S, T are sorted sequences having lengths 20,24,30,35,50 respectively. They are
to be merged into a single sequence by merging together two sequences at a time. The number of
comparisons that will be needed in the worst case by the optimal algorithm for doing this is ____
805.
Computers use addressing mode techniques for _____________________.
806.
Calculate the EAT(Effective access time) if 5 micro second is associative look-up time and 0.80 is
the hit-ratio in paging hardware with TLB
807.
808.
Consider the data of previous question. Suppose that the sliding window protocol is used with the
sender window size of 2^i where is the number of bits identified in the previous question and
acknowledgments are always piggybacked. After sending 2^i frames, what is the minimum time the
sender will have to wait before starting transmission of the next frame? (Identify the closest choice
ignoring the frame processing time).
809.
The average time required to reach a storage location in memory and obtain its contents is called
the
810.
811.
812.
In general tree to binary tree conversion, the two links of the binary tree node points to
813.
Abstraction is
814.
Station A uses 32 byte packets to transmit messages to Station B using a sliding window protocol.
The round trip delay between A and B is 80 milliseconds and the bottleneck bandwidth on the path
between A and B is 128 kbps. What is the optimal window size that A should use?
815.
816.
817.
818.
819.
820.
821.
Two computers C1 and C2 are configured as follows. C1 have IP address as 203.197.2.53 and
netmask 255.255.128.0. C2 have IP address as 203.197.75.201 and netmask 255.255.192.0. Which
one of the following statements is true?
822.
823.
824.
If the size of logical address space is 2 to the power of m, and a page size is 2 to the power of n
addressing units, then the high order _____ bits of a logical address designate the page number,
and the ____ low order bits designate the page offset.
825.
826.
Station A needs to send a message consisting of 9 packets to Station B using a sliding window
(window size 3) and go-back-n error control strategy. All packets are ready and immediately
available for transmission. If every 5th packet that A transmits gets lost (but no acks from B ever get
lost), then what is the number of packets that A will transmit for sending the message to B?
A. 16 [http://www.geeksforgeeks.org/gate-gate-cs-2006-question-46/]
827.
In Assembly language programming, minimum number of operands required for an instruction is/are
A. 0
828.
The memory unit that communicates directly with the CPU is called the
829.
The levels of hierarchy in inheritance helps to handle
830.
The tightest upper bound for the worst case performance of quicksort implemented on an array of n
elements by always chosing the pivot as the central element is
A. O(n^2)
831.
In Ethernet when Manchester encoding is used, the bit rate is:
832.
Run time polymorphism is achieved by ______
A. Virtual Functions
833.
Synthesized attribute can be easily simulated by a
A. LR Grammar
834.
In which addressing mode the operand is given explicitly in the instruction
A. Immediate mode.
835.
There are n stations in a slotted LAN. Each station attempts to transmit with a probability p in each
time slot. What is the probability that only one station transmits in a given time slot?
A. np(1-p)^(n-1) [http://www.geeksforgeeks.org/computer-networks-set-9/]
836.
A property which is not true for classes is that they
837.
A stack organized computer has
A. Zero addressing.
838.
Any code inside a loop that always computes the same value can be moved before the loop. This is
called
839.
In a token ring network the transmission speed is 10^7 bps and the propagation speed is 200
metres/micro second. The 1-bit delay in this network is equivalent to:
840.
Overloading involves writing two or more functions with ________
A. the same name and different argument lists.
841.
What is the maximum size of data that the application layer can pass on to the TCP layer below?
842. The searching technique that takes O (1) time to find a data is
A. Hashing.
843.
The load instruction is mostly used to designate a transfer from memory to a processor register
known as____.
A. Accumulator.
844.
Usually a pure virtual function
A. –depends on options—
845.
A client process P needs to make a TCP connection to a server process S. Consider the following
situation: the server process S executes a socket(), a bind() and a listen() system call in that order,
following which it is preempted. Subsequently, the client process P executes a socket() system call
followed by connect() system call to connect to the server process S. The server process has not
executed any accept() system call. Which one of the following events could take place?
846. A group of bits that tell the computer to perform a specific operation is known as____.
A. Instruction code.
847.
Suppose x is dead, that is, never subsequently used, at the point where the statement x=y+z
appears in a basic block. Then this statement may be safely removed without changing the value of
the basic block. This transformation is known as __________________ .
848.
A computer on a 10Mbps network is regulated by a token bucket. The token bucket is filled at a rate
of 2Mbps. It is initially filled to capacity with 16Megabits. What is the maximum duration for which the
computer can transmit at the full 10Mbps?
A. 2 seconds
849.
which of the following intermediate language can be used in intermediate code generation?
A. Counters which indicate how long ago their associated pages have been
referenced.
851.
#include <stdio.h>
#include <string.h>
int main()
{
int val=0;
char str[]="IncludeHelp.Com";
val=strcmp(str,"includehelp.com");
printf("%d",val);
return 0;
}
A. -1
852.
Which of the following system calls results in the sending of SYN packets?
A. connect
853.
Postorder Tree travsersal is recursive
A. depends on options
854.
#include <stdio.h>
#include <string.h>
int main()
{
char str[];
strcpy(str,"Hello");
printf("%s",str);
return 0;
}
Find the output
A. Error
855.
Memory unit accessed by content is called______
A. Associative memory.
856.
_________ register keeps tracks of the instructions stored in program stored in memory.
A. PC program counter
857.
#include <stdio.h>
int main()
{
char str[8]="IncludeHelp";
printf("%s",str);
return 0;
}
A. Error
858.
In the context of abstract-syntax-tree (AST) and control-flow-graph (CFG), which one of the following
is True?
A. The maximum number of successors of a node in an AST and a CFG depends on the input
program
859.
In the slow start phase of the TCP congestion control algorithm, the size of the congestion window
.....................
860.
If a class B network on the Internet has a subnet mask of 255.255.248.0, what is the maximum
number of hosts per subnet?
A. 2046
861.
In an array representation of binary tree, the left child of i th node is located at
#include <stdio.h>
#include <string.h>
int main()
{
char str1[]="IncludeHelp",str2[]=".Com";
printf("%s",str1+strlen(str2));
return 0;
}
A. udeHelp
863.
PSW is saved in stack when there is a _____.
864.
A priority queue is implemented as a Max-Heap. Initially, it has 5 elements. The level-order traversal
of the heap is: 10, 8, 5, 3, 2. Two new elements 1 and 7 are inserted into the heap in that order. The
level-order traversal of the heap after the insertion of the elements is:
A. 10, 8, 7, 3, 2, 1, 5 [http://www.geeksforgeeks.org/gate-gate-cs-2014-set-2-question-22/]
865.
The main memory in a Personal Computer (PC) is made of_____.
866. Suppose the round trip propagation delay for a 10 Mbps Ethernet having 48-bit jamming signal
is 46.4 ms. The minimum frame size is:
867.
#include <stdio.h>
int main()
{
char str[]="Hello%s%dFriends";
printf(str);
printf("\n");
printf("%s",str);
return 0;
}
A. Hello(null)0Friends
Hello%s%dFriends [http://www.includehelp.com/c-programs/c-strings-aptitude-questions-and-answers.aspx]
868.
Shift reduce parsers are
A. dpends on options
869.
#include <stdio.h>
int main()
{
char str[]="value is =%d";
int a='7';
str[11]='c';
printf(str,a);
return 0;
}
A. value is 7
870. An organization has a class B network and wishes to form subnets for 64 departments. The
subnet mask would be:
A> 255.255.252.0
871.
Virtual memory consists of _______.
A. SRAM.
872.
#include <stdio.h>
int main()
{
char result,str[]="\0IncludeHelp";
result=printf("%s",str);
if(result)
printf("TRUE");
else
printf("FALSE");
return 0;
}
A. FALSE
873.
Generally Dynamic RAM is used as main memory in a computer system as it______.
874. In an array representation of binary tree, the right child of i th node is located at
A. 2*i+2
875.
Packets of the same session may be routed through different paths in:
876.
Write Through technique is used in which memory for updating the data _____.
A. Cache memory.
877.
#include <stdio.h>
#include <string.h>
int main()
{
char s1[]="IncludeHelp";
char s2[10];
strncpy(s2,s1,5);
printf("%s",s2);
return 0;
}
A. IncluGARBAGE_VALUE
879.
The address resolution protocol (ARP) is used for:
A. depends on options
880.
The maximum window size for data transmission using the selective reject protocol with n-bit frame
sequence numbers is:
A> 2^(n-1)
IMP links:
1. http://mcqhelp.blogspot.in/
2. http://www.includehelp.com/c-programs/c-strings-aptitude-questions-and-answers.aspx
3. https://gateoverflow.in/
881.
#include <stdio.h>
#include <string.h>
int main()
char str[50]="IncludeHelp";
printf("%d...%d",strlen(str),sizeof(str));
return 0;
882.
The worst case running time to search for an element in a balanced in a binary search tree with
n*2^n elements is
883.
884.
In a syntax directed translation schema ,if value of an attribute of a node is function of the values of
the attributes of its children , then it is called
885.
#include <stdio.h>
struct sample
int a=0;
char b='A';
float c=10.5;
};
int main()
{
struct sample s;
printf("%d,%c,%f",s.a,s.b,s.c);
886.
In a network of LANs connected by bridges, packets are sent from one LAN to another through
intermediate bridges. Since more than one path may exist between two LANs, packets may have to
be routed through multiple bridges. Why is the spanning tree algorithm used for bridge-routing?
887.
X Y f(X,Y)
0 0 0
0 1 0
1 0 1
1 1 1
888.
One of the header fields in an IP datagram is the Time to Live (TTL) field. Which of the following
statements best explains the need for this field?
889.
890.
#include <stdio.h>
int main()
struct sample{
int a;
int b;
sample *s;
}t;
printf("%d,%d",sizeof(sample),sizeof(t.s));
return 0;
891.
Consider a main memory system that consists of 8 memory modules attached to the system bus,
which is one word wide. When a write request is made, the bus is occupied for 100 nanoseconds
(ns) by the data, address, and control signals. During the same 100 ns, and for 500 ns thereafter,
the addressed memory module executes one cycle accepting and storing the data. The (internal)
operation of different memory modules may overlap in time, but only one request can be on the
bus at any time. The maximum number of stores (of one word each) that can be initiated in 1
millisecond is
892.
#include <stdio.h>
struct student
char name[20];
}std;
strcpy(tempStd->name,"Thomas");
return tempStd->name;
int main()
strcpy(std.name,"Mike ");
printf("%s%s",std.name,fun(&std));
return 0;
894.
A layer-4 firewall ( a device that can look at all protocol headers up to the transport layer) cannot
895.
896.
#include <stdio.h>
struct sample
int a;
}sample;
int main()
sample.a=100;
printf("%d",sample.a);
return 0;
897.
Skewed binary trees can be efficiently represented using
898.
899.
Consider an instance of TCP’s Additive Increase Multiplicative Decrease(AIMD) algorithm where the
window size at the start of the slow start phase is 2 MSS and the threshold at the start of the first
transmission is 8 MSS. Assume that a time out occurs during the fifth transmission. Find the
congestion window size at the end of the tenth transmission.
900.
901.
Cross-compiler is a compiler
902.
903.
#include <stdio.h>
struct employee{
int empId;
char *name;
int age;
};
int main()
{
struct employee emp []={ {1,"Mike",24}, {2,"AAA",24}, {3,"BBB",25},
{4,"CCC",30} };
return 0;
904.
905.
#include <stdio.h>
int main()
union values
int intVal;
char chrVal[2];i
};
val.chrVal[0]='A'; val.chrVal[1]='B';
printf("\n%c,%c,%d",val.chrVal[0],val.chrVal[1],val.intVal);
return 0;
906.
What is the software that runs a computer, including scheduling tasks, managing storage, and
handling communication with peripherals?
907.
Which of the following statements is/are TRUE for an undirected graph?P:Number of odd degree
vertices is even,Q: Sum of degrees of all vertices is even
908.
Which of the following paging algorithms is most likely to be used in a virtual memory system?
909.
#include <stdio.h>
int main()
union values
unsigned char a;
unsigned char b;
unsigned int c;
};
union values val;
val.a=1;
val.b=2;
val.c=300;
printf("%d,%d,%d",val.a,val.b,val.c);
return 0;
910.
Bits can be send over guided and unguided media as analog signal using .........................
911.
Which one of the following is the recurrence equation for the worst case time complexity of the
Quicksort algorithm for sorting n>=2 numbers? In the recurrence equations given in the options
below, c is a constant.
912.
The portion of physical layer that interfaces with the media access control sublayer is called
913.
914.
#include <stdio.h>
int main()
{
char str[10];
int a;
}har;
har h1,h2={"IHelp",10};
h1=h2;
h1.str[1]='h';
printf("%s,%d",h1.str,h1.a);
return 0;
915.
916.
917.
#include <stdio.h>
int main()
{
struct std
char name[30];
int age;
};
918.
919.
920.
#include <stdio.h>
int main()
union test
int i;
int j;
};
printf("%d,%d\n",var.i,var.j);
921.
Consider a join (relation algebra) between relations r(R)and s(S) using the nested loop method.
There are 3 buffers each of size equal to disk block size, out of which one buffer is reserved for
intermediate results. Assuming size(r(R))
922.
923.
924.
If two interrupts, one of higher priority and other of lower priority occur simultaneously, then the
service provided is for
925.
#include <stdio.h>
int main()
#ifdef debug
printf("Start debugging...");
#endif
printf("IncludeHelp");
return 0;
926.
While inserting the elements 71,65,84,69,67,83 in an empty binary search tree(BST)in the sequence
shown, the element in the lowest level is
927.
928.
The physical layer translates logical communication requests from the ______ into hardware specific
operations.
929.
#include <stdio.h>
int main()
#define MAX 20
printf("MAX=%d...",MAX);
return 0;
}
Find the output
930.
Given a hash table T with 25 slots that stores 2000 elements, the load factor a for T is_____
931.
A 4-way set-associative cache memory unit with a capacity of 16 KB is built using a block size
of 8 words. The word length is 32 bits. The size of the physical address space is 4 GB. The
number of bits for the TAG field is
932.
933.
934.
The stage delays in a 4-stage pipeline are 800, 500, 400 and 300 picoseconds. The first stage
(with delay 800 picoseconds) is replaced with a functionally equivalent design involving two
stages with respective delays 600 and 350 picoseconds. The throughput increase of the pipeline
is percent.
935.
#include <stdio.h>
int main()
int val=0;
val=128/FUN(8);
printf("val=%d",val);
return 0;
936.
#include <stdio.h>
#define FUN(x,y)
x##yint main()
{int a1=10,a2=20
;printf("%d...%d",FUN(a,1),FUN(a,2));
return 0;}
ANS – 20
940. Which of the following tree may have smaller elements in its
left subtree and larger element in its right subtree
#include <stdio.h>
#define LARGEST(x,y)
(x>=y)?x:y
int main(){
int a=10,b=20,l=0;
l=LARGEST(a++,b++);
printf("a=%d,b=%d,largest=%d",a,b,l);
return 0;}
Ans - a=11,b=22,largest=21
942. The ____ translates internet domain and host names to IP address.
943. The addressing mode used in an instruction of the form ADD R1, R2 is _____.
Ans. Index
944.
#include <stdio.h>
int a=11;#endif
int main()
{ int b=22;
printf("%d...%d",a,b);
return 0;}
945. Which one of the following allows a user at one site to establish a
connection to another site and then pass keystrokes from local host to remote
host?
Ans. Telnet
Ans- 3
947. How many address bits are needed to select all memory locations in the 16K ×
1 RAM?
Ans. 14
948. Which of the following algorithm is used to find the shortest path between
two nodes in graph
950.
#include <stdio.h>
int main(){
printf("%s",TEXT);
return 0;}
951. If the main memory is of 8K bytes and the cache memory is of 2K words. It
uses associative mapping. Then each word of cache memory shall be_____.
Ans. 16 bits
952. Which one of the following protocol delivers/stores mail to receiver server?
953. Which of the following case does not exist in complexity theory?
954.
#include <stdio.h>
int main(){
printf("%d",VAR1);
return 0;}
955. The width of the physical address on a machine is 40 bits. The width of the
tag field in a 512 KB 8-way set associative cache is ______ bits
Ans. 24
#define SUM(x,y)
int s; s=x+y;
printf("sum=%d\n",s);
int main(){
SUM(10,20);
return 0;}
Ans. O(log n)
Distributed parity
Ans. Traversal
#define MAX 99
return 0;}
Ans. MAX= I
962. The correspondence between the main memory blocks and those in the cache is
given by
963. Which one of the following is an internet standard protocol for managing devices on IP
network?
965.
#include <stdio.h>
int main()
{ int var=100; {
} printf("%d",var);
return 0;}
Ans. 200…100
967. Consider a binary tree T that has 200 leaf nodes. Then, the number of nodes
in T that have exactly two children are _________.
Ans. 199
969. Content of the program counter is added to the address part of the
instruction in order to obtain the effective address is called
971.
#include <stdio.h>
char* fun1(void){
char str[]="Hello";
return str;}
char* fun2(void){
char *str="Hello";
return str;}
int main()
{ printf("%s,%s",fun1(),fun2());
return 0;}
972.
#include <stdio.h>
printf("step3: %d\n",val);
return 0;}
Ans. step1: 1
step2: 2
step3: 3
973. Which one of the following is not correct?
Ans. BIOS
977. Let G be a graph with n vertices and m edges. What is the tightest upper
bound on the running time on Depth First Search of G? Assume that the graph is
represented using adjacency matrix.
Ans. O(n2)
978. When displaying a web page, the application layer uses the
int main(){
int anyVar=10;
printf("%d",10);
return 0;}
Ans. 10
980. A Program Counter contains a number 825 and address part of the instruction
contains the number 24. The effective address in the relative address mode, when
an instruction is read from the memory is
Ans. 849
981. The situation when in a linked list START=NULL is
Ans. Underflow
982. Multiple object can be sent over a TCP connection between client and server
in
983.
#include <stdio.h>
int main(){
char *str="IncludeHelp";
printf("%c\n",*&*str);
return 0;}
Ans. I
987.
#include <stdio.h>
int main(){
return 0;}
Ans.
value =50,size= 4
value =65,size= 4
int main(){
return 0;}
Ans. BBB
991.
The rate at which a computer clock deviates from a perfect reference clock is called as
993.
#include <stdio.h>
char* strFun(void)
char *str="IncludeHelp";
return str;
int main()
char *x;
x=strFun();
return 0;
994.
In HTTP pipelining
995.
Assume that a mergesort algorithm in the worst case takes 30 seconds for an input of size 64.
Which of the following most closely approximates the maximum input size of a problem that can be
solved in 6 minutes?
996.
The degree sequence of a simple graph is the sequence of the degrees of the nodes in the graph in
decreasing order. Which of the following sequences can not be the degree sequence of any graph?I.
7, 6, 5, 4, 4, 3, 2, 1 II. 6, 6, 6, 6, 3, 3, 2, 2 III. 7, 6, 6, 4, 4, 3, 2, 2 IV. 8, 7, 7, 6, 4, 2, 1, 1
997.
Ans: accumulator
998.
#include <stdio.h>
int main()
void *ptr;
++ptr;
printf("%u",ptr);
return 0;
Ans:Error
999.
In FTP protocol, client contacts server using ____ as the transport protocol.
1001.
1002.
#include <stdio.h>
int main()
char ch=10;
void *ptr=&ch;
printf("%d,%d",*(char*)ptr,++(*(char*)ptr));
return 0;
Ans:11,11
1003.
1004.
#include <stdio.h>
int main()
int a=10,b=2;
int *pa=&a,*pb=&b;
return 0;
Ans:error
1005.
In which mode FTP, the client initiates both the control and data connections.
1006.
1007.
Which one of the following connects high-speed high-bandwidth device to memory subsystem
and CPU.
1008.
1009.
1010.
1011.
#include <stdio.h>
*ptr=100;
int main()
int num=50;
int *pp=#
fun(& *pp);
printf("%d,%d",num,*pp);
return 0;
Ans:100,100
1012.
S1 : It is a data structure in which the intrinsic ordering of the elements does determine the result of
its basic operations.
S2 : The elements of a priority queue may be complex structures that are ordered on one or several
fields.
int main()
AAA aaa=10;
BBB bbb=20;
CCC ccc=30;
DDD ddd=40;
printf("%d,%d,%d,%d",aaa,bbb,ccc,ddd);
return 0;
Ans:10 20 30 40
1014.
Which one of the following is used as the start frame delimeter in ethernet frame?
1015.
1016.
What is autonegotiation?
1017.
#include < stdio.h >
int main()
AI var=100;
printf("var=%d",var);
return 0;
Ans error
1018.
1019.
Suppose you want to delete the name that occurs before 'Vellore' in an alphabetical listing.
Which of the following data structures shall be most efficient for this operation?
1020.
1021.
1022.
Ethernet in metropolitan area network (MAN) can be used as
1023.
int main()
string myName="ABCDEFG";
printf("myName=%s (size=%d)",myName,sizeof(myName));
return 0;
1024.
1025.
int main()
typedef struct
int empid;
int bsal;
}EMP;
EMP E={10012,15100};
printf("%d,%d",E.empid,E.bsal);
return 0;
1026.
1027.
In any undirected graph, the sum of the degrees of all nodes is:
1028.
1029.
_____ is used to define a special CSS style for a group of HTML elements
1030.
1031.
Prim's algorithm is a method available for finding out the minimum cost of a spanning tree.
1032.
The 16-bit 2’s complement representation of an integer is 1111 1111 1111 0101, its decimal
representation is
1033.
1034.
Which of the below given sorting techniques has highest best-case runtime complexity?
1035.
1036.
1037.
If the associativity of a processor cache is doubled while keeping the capacity and block size
unchanged, which one of the following is guaranteed to be NOT affected?
1039.
1040.
A mailer that transforms a message body of an e-mail into a web page is called a
1041.
A computer system implements 8 kilobyte pages and a +32-bit physical address space. Each
page table entry contains a valid bit, a dirty bit, three permission bits, and the translation. If the
maximum size of the page table of a process is 24 megabytes, the length of the virtual address
supported by the system is _________ bits.
1043.
An ethernet frame that is less than the IEEE 802.3 minimum length of 64 octets is called
Ans:RUN frame
1044.
1045.
Consider two processors P1 and P2 executing the same instruction set. Assume that under
identical conditions, for the same input, a program running on P2 takes 25% less time but
incurs 20% more CPI (clock cycles per instruction) as compared to the program running
on P1 If the clock frequency of P1 is 1GHz, then the clock frequency of P2 (in GHz) is
Ans:
CPU TIME (T) = No. of Instructions( I ) x No. of Cycles Per Instruction (c) x Cycle Time (t)
OR
CPU TIME (T) =
No.ofInstructions(I)×No.ofCyclesPerInstruction(c)Clockfrequency(f) No.ofInstructions(I)×No.ofCyclesPerInstructio
n(c)Clockfrequency(f)
→T=Ic×CPI×F− 1→T=Ic×CPI×F− 1
→T×FCPI=Ic→T×FCPI=Ic
P1 & P2 executing same instruction set So, No. of Instructions same for both = I1 = I2 = I
1046.
If you don’t want the frame windows to be resizeable, simply add what to the lines ?
Ans:no resize
1047.
Which multiple access technique is used by IEEE 802.11 standard for wireless LAN?
Ans:CSMA/CA
1048.
A circuit that converts n inputs to 2^n outputs is called
Ans: decoder
1049.
What is the correct HTML for making a text input field?
Ans: Textarea tag
1050.
Interpolation search is an improved variant of binary search.
Ans: True
1051.
It is necessary for this search algorithm to work that data collection should be
1052.
A wireless network interface controller can work in
Top of Form
1053.
What is cell padding?
1054.
Consider an undirected graph G with 100 nodes. The maximum number of edges to be included in
Ans is C by formula (n-1)(n-2)/2 =99x98/2=4851 (graph should be simple i.e having no parallel
RARARAID1
1055.
1056
Where in an HTML document is the correct place to refer to an external style sheet?
1057.
1058.
In wireless network an extended service set is a set of
Ans:are logical units of one or more basic service sets on the same logical network segment
1059.
Let T(n) be the function defined by T(n) = 1 and T(n) = 2T (n/2) + n,
which of the following is TRUE ?
1060.
The smallest integer than can be represented by an 8-bit number in 2?s complement form
is
Ans: -128
1061.
How to create a memory without a name during the execution of the program?
Ans:
1062.
The following HTML ________ element contains meta data which is not displayed inside the
document
Ans:<meta>tag
1063.
________ is commonly used in wireless LAN.
Ans:Wireless routers
1064.
Consider a 6-stage instruction pipeline, where all stages are perfectly balanced.Assume that there
is no cycle-time overhead of pipelining. When an application is executing on this 6-stage
pipeline, the speedup achieved with respect to non-pipelined execution if 25% of the instructions
incur 2 pipeline stall cycles is
Ans: For a non-pipelined execution on the 6-stage pipeline it will take 6 cycles for one instruction to
finish execution.
For a pipelined execution , it will take 1 cycle for each instruction to execute , in addition to that , 2
additional cycles for 25% of the instructions.
Hence , the average time to execute an instruction in this = (1+25100∗2)
=1.5
Hence , speedup = (6/1.5) = 4
ANSWER : 4
1065.
Which one of the following event is not possible in
wireless LAN.
Ans:inline style
Ans:O(1)
Ans: standard network protocol that adds security to Wi-Fi and other 802.11 wireless networks.
Ans:Karnaugh Map
1071. How will you handle the overflow condition of a linked queue through code(note: new_node is a
newly created node in a memory)
Ans: Transient
Ans:O(logn)
1074.
Ans: Wi-Fi Protected Access (WPA) is a security standard for users of computing devices equipped
with wireless internet connections
1077. If the associativity of a processor cache is doubled while keeping the capacity and
block size unchanged, which one of the following is guaranteed to be NOT affected?
1078. Consider a hash table with 9 slots. The hash function is h(k) = k mod 9. The collisions are
resolved by chaining. The following 9 keys are inserted in the order: 5, 28, 19, 15, 20, 33, 12, 17, 10. The
maximum, minimum, and average chain lengths in the hash table, respectively, are
1080. The _______ attribute defines the action to be performed when the form is submitted
Ans: The main difference between a JK flip-flop and an SR flip-flop is that in the JK flip-flop,
both inputs can be HIGH. When both the J and K inputs are HIGH, the Q output is toggled, which
means that the output alternates between HIGH and LOW. Thereby the invalid condition which
occurs in the SR flipflop is eliminated.
1082. The data structure required for Breadth First Traversal on a graph is
Ans:Queue
1083.
WiMAX provides
1084.
WiMAX uses the
1085.
Which of the following unit will choose to transform decimal number to binary code ?
Ans:
Encoder
1086.
What is the time complexity for insertion sort
Ans: O(n)
1087.
Which of these will create a shuffled list?
Ans:
1088.
How do you check queue is full in array implementation
Ans: Queue will be full when (count == size)
1089.
Which one of the following modulation scheme is supported by WiMAX?
Ans: binary phase shift keying modulation and quadrature phase shift keying modulation
1090.
Which attribute is used to extend the lifetime of a cookie?
Ans: max-age
1091.
A processor can support a maximum memory of 4 GB, where the memory is word-addressable (a
word consists of two bytes). The size of the address bus of the processor is at least __________
bits
1092.
1093.
Which of the following boolean expressions is not logically equivalent to all of the rest ?
1094.
1095.
Which of the following algorithm is Minimum Spanning Tree in graph
1096.
asymmetric-key cryptography?
1097.
How can you make a list that lists the items with numbers?
1098.
You have an array of n elements, Suppose you implement quicksort by always choosing the central
element of the array as the pivot, Then the tightest upper bound for the worst case performance is
1099.
The minimum number of NAND gates required to implement the Boolean function. A + AB' +
AB'C is equal to
1100.
1101.
The size of the data count register of a DMA controller is 16 bits. The processor needs to transfer
a file of 29,154 kilobytes from disk to main memory. The memory is byte addressable. The
minimum number of times the DMA controller needs to get the control of the system bus from
the processor to transfer the file from the disk to main memory is
1102.
Suppose P, Q, R, S, T are sorted sequences having lengths 20, 24, 30, 35, 50 respectively. They
are to be merged into a single sequence by merging together two sequences at a time, The number
of comparisons that will be needed in the worst case by the optimal algorithm for doing this is ____
1103.
Which method is used to get the year of a date object in YYYY format in Javascript.
1104.
Let G be a graph with n vertices and m edges, What is the tightest upper bound on the running time
on Depth First Search of G? Assume that the graph is represented using adjacency matrix
1105.
1106.
The minimum number of page frames that must be allocated to a running process in a virtual
memory environment is determined by
1107.
Which one of the following is a cryptographic protocol used to secure HTTP connection?
1108.
Cryptanalysis is used
1109.
A computer has a 256 KByte, 4-way set associative, write back data cache with block size of 32
Bytes. The processor sends 32 bit addresses to the cache controller. Each cache tag directory
entry contains, in addition to address tag, 2 valid bits, 1 modified bit and 1 replacement bit. The
size of the cache tag directory is
1110.
1111.
Let G be a graph with n vertices and m edges, What is the tightest upper bound on the running time
on Depth First Search of G? Assume that the graph is represented using adjacency matrix
1112.
Which one of the following is a cryptographic protocol used to secure HTTP connection?
1113.
The capacity of a memory unit is defined by the number of words multiplied by the number of
bits/word. How many separate address and data lines are needed for a memory of 4 K × 16?
1114.
Let P be a QuickSort Program to sort numbers in ascending order using the first element as pivot,
Let t1 and t2 be the number of comparisons made by P for the inputs {1, 2, 3, 4, 5} and {4, 1, 5, 3, 2}
respectively,Which one of the following holds?
1115.
1116.
1117.
A priority queue is implemented as a Max-Heap. Initially, it has 5 elements. The level-order traversal
of the heap is: 10, 8, 5, 3, 2. Two new elements 1 and 7 are inserted into the heap in that order. The
level-order traversal of the heap after the insertion of the elements is:
1119.
1120.
1121.
The worst case running time to search for an element in a balanced in a binary search tree with
n*2^n elements is
1122.
1123.
1124.
1125.
#include
*y=x;
x=temp;
*z= x;
cout<<x<<*y<<*z<<temp;
}
int main() {
int i = 0;
i=i++ - ++i;
myFunction(i, j, &i);
return 0;
1126.
1127.
The pre-order and post order traversal of a Binary Tree generates the same output. The tree can
have maximum
1128.
#include
IntPtr A, B, C;
int D,E;
A = new int(3);
B = new int(6);
C = new int(9);
D = 10;
E = 20;
*A = *B;
B = &E;
D = (*B)++;
E= *C++ - *B--;
cout<<*A<<*B<<*C< return 0;
1129.
IPSec is designed to provide the security at the
1130.
A linear collection of data elements where the linear node is given by means of pointer is called
1131.
1132.
1133.
1134.
1135.
1136.
To link your Web page to a style sheet, you must use the _____ tag
1137.
1138.
The BIU prefetches the instruction from memory and store them in ________
1139.
While inserting the elements 71,65,84,69,67,83 in an empty binary search tree (BST) in the
sequence shown, the element in the lowest level is
1140.
Suppose T is a binary tree with 14 nodes. What is the minimum possible depth of T?
1141.
fork ();
fork ();
fork ();
1142.
1143.
What is a Software ?
1144.
if(fork k( ) = = 0)
else
{
a= a ? 5;
Let u, v be the values printed by parent process and x, y be the values printed by child process.
Which one of the following is true?
1145.
1146.
For an undirected graph with n vertices and e edges, the sum of the degree of each
vertex isequal to
1147.
1148.
var a = [1,,3,4,5];
1149.
1150.
Which one of the following regular expressions over {0, 1} denotes the set of all strings not
containing 100 as a substring (a) 0*(11)*0* (b) (0*1010)* (c) 0*1*010 (d) 0*(10)*01*
1151.
IMUL source is a signed _________
1152.
1153.
The number of states in DFA is --------than the number of states in NFA for the same Language.
1154.
Which one of the following statements is NOT correct about HTTP cookies?
1155.
The microprocessor determines whether the specified condition exists or not by testing the
______
1156.
int f(int j)
int k;
if (i == j)
printf("something");
k = f(i);
return 0;
}
else return 0;
1157.
1158.
In max mode, control bus signal So,S1 and S2 are sent out in ____________ form
1159.
1160.
The ___ bus controller device decodes the signals to produce the control bus signal
1161.
Which one of the following models is not suitable for accommodating any change?
1162.
1163.
When there are infinite distinguishable strings then there cannot be a -------------
1164.
To interface memory with the microprocessor, connect register the lines of the address bus
1166.
Which model can be selected if user is involved in all the phases of SDLC?
1167.
1168.
1169.
1170.
1171.
1172.
When there is complete DFA with Five states out of which two are final states if F is modified such
that it recognizes complement of the original language then there will be at least _________final
states.
1173.
For automatic objects, constructors and destructors are called each time the objects
1174.
1175.
1176.
1177.
1178.
1179.
1180.
1181.
1182.
Address line for TRAP is?
1183.
1184.
1185.
Consider S->SS|a what is the number of different derivation trees for aaaaa
1186.
Which of these does not belong to the basic principles of good product design ?
1187.
var a1 = [,,,];
var a2 = new Array(3);
0 in a1
0 in a2
1188.
The pop() method of the array in javascript does which of the following task ?
1189.
The project planner examines the statement of scope and extracts all important software functions
which is known as
1190.
The number of auxiliary memory required for a Push Down Machine (PDM) to behave like a Finite
State Machine (FSM) is
1191.
Which method bypasses the CPU for certain types of data transfer?
1192.
1193.
1194.
1195.
var a = [];
a.unshift(1);
a.unshift(22);
a.shift();
a.unshift(3,[4,5]);
a.shift();
a.shift();
a.shift();
1196.
In order to check if the pattern matches with the string “text”, the
statement is
1197.
If a , b , c, are three nodes connected in sequence in a singly linked list, what is the statement to
be added to change this into a circular linked list?
1198.
1199.
An independent relationship must exist between the attribute that can be measured and the external
quality attribute.
1200.
1201.
1202.
For the array (77 ,62,114,80,9,30,99), write the order of the elements after two passes using the
Radix sort
1203.
1204.
Which of the following risk is the failure of a purchased component to perform as expected?
1205.
1206.
1207.
When there is an indefinite or an infinity value during an arithmetic value computation, javascript
1208.
Which is used to store critical pieces of data during subroutines and interrupts
1209.
Which of the following term is best defined by the statement: “The underlying technology on which
the system is built is superseded by new technology.”?
1210.
Consider a B+ tree in which the search Answer is 12 bytes long, block size is 1024 bytes,record pointer is
10 bytes long and block pointer is 8 bytes long. The maximum number of keys that can be
accommodated in each non-leaf node of the tree is ____
1211.
The javascript statement a===b refers to
1212.
The external system bus architecture is created using from ______ architecture
1213.
What assess the risk and your plans for risk mitigation and revise these when you learn more about
the risk?
1214.
The number of ways in which the numbers 1, 2, 3, 4, 5, 6, 7 can be inserted in an empty binary
search tree, such that the resulting tree has height 6, is
1215.
function oddsums(n)
{
let total = 0, result=[];
for(let x = 1; x <= n; x++)
{
let odd = 2*x-1;
total += odd;
result.push(total);
}
return result;
}
oddsums(5);
1216.
Given a variable $email containing the string user@example.com, which of the following PHP
statements would extract the string example.com?
1217.
Which of the following risks are derived from the organizational environment where the software is
being developed?
1218.
The preorder traversal sequence of a binary search tree is 30, 20, 10, 15, 25, 23, 39, 35,
42.Which one of the following is the postorder traversal sequence of the same tree?
1219.
Consider an undirected graph G where self-loops are not allowed. The vertex set of G is {(i, j): 1
= i = 12, 1 = j = 12}. There is an edge between (a, b) and (c, d) if |a - c| = 1 and |b - d| = 1. The
number of edges in this graph is
1220.
Which of the following risks are derived from the software or hardware technologies that are used to
develop the system?
1221.
Given a comma-separated list of values in a string, which function from the given list can create an
array of each individual value with a single call in PHP?
1222.
Which of the following term is best defined by the statement: “Derive traceability information to
maximize information hiding in the design.”?
1223.
The New-order traversal of the expression tree corresponding to the reverse polish expression 3 4
* 5 - 2 ? 6 7 * 1 + - is given by:
1224.
In PHP, array values are keyed by ______ values (called indexed arrays) or using ______ values
(called associative arrays). Of course, these key methods can be combined as well.
1225.
<?php
$sum = 0;
$sum += $array[$array[$i]];
echo $sum;
?>
1226.
A complete binary min-heap is made by including each integer in [1;1023] exactly once. The depth
of a node in the heap is the length of the path from the root of the heap to that node. Thus, the root
is at depth 0. The maximum depth at which integer 9 can appear is
1227.
Which of the following strategies means that the impact of the risk will be reduced?
1228.
Risk management is now recognized as one of the most important project management tasks.
1229.
<?php
var_dump ($array);
?>
1230.
Let G be a weighted connected undirected graph with distinct positive edge weights.If
every edge weight is increased by the same value, then which of the following
statements is/are TRUE ? P: Minimum spanning tree of G does not change. Q: Shortest path
between any pair of vertices does not change
1231.
Which of the following term is best defined by the statement: “There will be a change of
organizational management with different priorities.”?
1232.
Assume you would like to sort an array in ascending order by value while preserving key
associations. Which of the following PHP sorting functions would you use?
1233.
1234.
Which of the following is a dynamic model that shows how the system interacts with its environment
as it is used?
1235.
Consider an undirected random graph of eight vertices. The probability that there is an edge
between a pair of vertices is ½. What is the expected number of unordered cycles of length
three?
1236.
In a connected graph, a bridge is an edge whose removal disconnects a graph. Which one of the
following statements is true?
1237.
1238.
1239.
A binary tree in which if all its levels except possibly the last, have the maximum number of
nodes and all the nodes at the last level appear as far left as possible, is known as
1240.
Which of these methods has no restrictions on content size when a form is submitted.
1241.
if (n <= 1) return 0;
int main()
printf("%d", f(a,5));
1242.
1243.
A binary tree T has 20 leaves. The number of nodes in T having two children is
1244.
1245.
int a, b, c = 0;
void prtFun(void);
main( )
prtFun( );
a + = 1;
prtFun( )
printf(?\n %d %d ?, a, b);
void prtFun(void)
int b=1;
a+=++b;
printf(?\n %d %d ?, a, b);
1246.
1247.
#include
int f1 (void) ;
int f 2 void ;
int x 10;
int main ()
int x=1;
x+=f1()+ f2()+f3()+f2() ;
printf("%d", x);
return 0;
1248.
In what type of coupling, the complete data structure is passed from one module to another?
1249.
1250.
1251.
The while loop is referred to as a(n) _____ loop because the loop condition is tested at the beginning
of the loop
1252.
If all tasks must be executed in the same time-span, what type of cohesion is being exhibited?
1253.
temp=root->left;
while(temp->right!=NULL)
temp=temp->right;
return temp;
The above code snippet for a BST with the address of the root node in pointer ‘root’
returns
1254.
Which of the following pattern is the basis of interaction management in many web-based systems?
1256.
1257.
1258.
If a university sets up web-based information system that faculty could access to record student
grades and to advise students, that would be an example of an
1259.
1260.
1261.
1262.
1263.
1264.
Which of the following gives the memory address of a variable pointed to by pointer a?
1265.
1266.
1267.
If a class C is derived from class B, which is derived from class A, all through public inheritance, then
a class C member function can access
1268.
1269.
1270.
Which of the following process is concerned with analyzing the costs and benefits of proposed
changes?
1271.
1272.
Which of the following term is best defined by the statement “The creation of a new codeline from a
version in an existing codeline”?
1273.
1274.
Which of the following is a project scheduling method that can be applied to software development?
1275.
class n{ int a;}; how much memory the compiler allocates for this class
1276.
1277.
1278.
1279.
A class is a
1280.
1281.
1282.
1283.
Compile time polymorphism is
1284.
Changes made to an information system to add the desired but not necessarily the
1285.
Abstraction is
1286.
All the modules of the system are integrated and tested as complete system in the case of
1287.
1288.
1289.
If every requirement stated in the Software Requirement Specification (SRS) has only one
interpretation, SRS is said to be
1290.
1291.
1293.
Templates improve
1294.
1295.
A COCOMO model is
1296.
1297.
1298.
1299.
1300.
Modifying the software to match changes in the ever changing environment is called
1301.
1. The 40-20-40 rule suggests that the least amount of development effort can be spent on
1303.
1304.
___________ adds to the costs of Software Development because it usually means that work that
has been completed has to be redone
1305.
Assume that we have constructor functions for both base class and derived class. Now consider the
declaration in main( ). Base * P = New Derived; in what sequence will the constructor be called ?
1306.
1. Graphical representation of the project, showing each task and activity as horizontal bar
whose length is proportion to time taken for a completion of that activity is called
1307.
1308.
1309.
1310.
1311.
Which of the following ways are legal to access a class data member using this pointer?
1312.
1313.
Which one of the following is the correct way to declare a pure virtual function?
1310.
1311.
Which of the following ways are legal to access a class data member using this pointer?
1312.
1313.
Which one of the following is the correct way to declare a pure virtual function?
1314.
1315.
1316.
If class A is friend of class B and if class B is friend of class C, which of the following is true?
1317.
1318.
Which of the following (in file scope) leads to a compile-time error?
1319.
It would be ideal if all of computer science theories can be used in software engineering.
1320.
1321.
1322.
In software engineering development, if there are no applicable theories, people often use adhoc
approach.
1323.
1324.
1325.
1326.
1327.
1328.
Today the increased power of the personal computer has brought about an abandonment of the
practice of team development of software
1329.
1330.
1331.
Software is a product and can be manufactured using the same technologies used for other
engineering artifacts.
1332.
1333.
1334.
The call to the parameterized constructor of base class in the derived class
1335.
Change cannot be easily accommodated in most software systems, unless the system was
designed with change in mind.
1336.
1337.
1338.
If the class name is X, what is the type of its "this" pointer?
1339.
1340.
1341.
1342.
1343.
1344.
1345.
1346.
1347.
1348.
Which of the following is not a type of constructor?
1349.
The formal methods model of software development makes use of mathematical methods to
1350.
Which of the following traits need to exist among the members of an agile software team?
1351.
1352.
Which one of the following correctly describes the meaning of 'namespace' feature in C++?
1353.
Which of the following is not one of Hooker's core principles of software engineering practice?
1354.
If X is the name of the class, what is the correct way to declare copy constructor of X?
1355.
Softwar
e
enginee
rs
collabor
ate with
custom
ers to
define
which
of the
followin
g?
1356.
Eve
ryo
ne
on
the
soft
war
e
tea
m
sho
uld
be
invo
lved
in
the
plan
ning
acti
vity
so
that
we
can
1357.
int (*ptr)[10];
1358.
1359.
Which of the following activities is not one of the four things that need to be accomplished by the
generic planning task set?
1360.
1361.
1362.
1363.
1364.
1365.
1366.
1367.
Ma
ny
of
the
task
s
fro
m
the
gen
eric
task
sets
for
anal
ysis
mo
deli
ng
and
desi
gn
can
be
con
duct
ed
in
par
allel
with
one
ano
ther
.
1368.
1369.
Which of the following are valid reasons for collecting customer feedback concerning delivered
software?
1370.
1371.
Specify the 2 library functions to dynamically allocate memory?
1372.
1373.
1374.
1375.
During
busines
s
process
enginee
ring,
three
different
architect
ures are
examine
d
1376.
1377.
The goal of product engineering is to translate the customer's desire for a set of defined capabilities
into a working product.
1378.
1379.
WE RECEIVED “404 – PAGE NOT FOUND” MESSAGE, WHEN WE BROWSE THE WEB PAGE.
WHICH PROTOCOL PROVIDES THIS MESSAGE?
1380.
1381.
1382.
1383.
1384.
1385.
1386.
A
stak
ehol
der
is
any
one
who
will
pur
cha
se
the
com
plet
ed
soft
war
e
syst
em
und
er
dev
elop
me
nt.
1387.
1388.
The
job
of
the
req
uire
me
nts
engi
nee
r is
to
cate
gori
ze
all
stak
ehol
der
info
rma
tion
in a
way
that
allo
ws
deci
sion
mak
ers
to
cho
ose
an
inte
rnall
y
con
sist
ent
set
of
req
uire
me
nts.
1389.
1390.
Which of the following function sets first n characters of a string to a given character?
1391.
The nature of collaboration is such that all system requirements are defined by consensus of a
committee of customers and developers.
1392.
The library function used to find the last occurrence of a character in a string is
1393.
1394.
double f(double x)
Give a value q (to 2 decimals) such that f(q) will return q:_____.
1395.
The
wor
k
pro
duct
s
pro
duc
ed
duri
ng
req
uire
me
nt
elici
tatio
n
will
vary
dep
endi
ng
on
the
1396.
In
win-
win
neg
otiat
ion,
the
cust
om
er's
nee
ds
are
met
eve
n
tho
ugh
the
dev
elop
er's
nee
d
may
not
be.
1397.
Which header file should be included to use functions like malloc() and calloc()?
1398.
In
req
uire
me
nts
vali
dati
on
the
req
uire
me
nts
mo
del
is
revi
ewe
d to
ens
ure
its
tech
nica
l
feas
ibilit
y.
1399.
struct {
short s [5]
union {
float y;
long z;
}u;
} t;
Assume that objects of the type short, float and long occupy 2 bytes, 4 bytes and 8 bytes,
respectively. The memory requirement for variable t, ignoring alignment
considerations, is
1400.
1401.
If a class C is derived from class B, which is derived from class A, all through public inheritance, then
a class C member function can access
1402.
class n{ int a;}; how much memory the compiler allocates for this class
1403.
1404.
1405.
1406.
The two statements that can be used to change the flow of control are
1407.
Whi
ch
desi
gn
mo
del
is
anal
ogo
us
to
the
det
aile
d
dra
win
gs
of
the
acc
ess
poin
ts
and
exte
rnal
utilit
ies
for
a
hou
se?
1408.
To determine the architectural style or combination of styles that best fits the proposed system,
requirements engineering is used to uncover
1409.
If p and q are assigned the values 2 and 3 respectively then the statement P = q++
1410.
1411.
Which of the following is not an example of infrastructure components that may need to be
integrated into the software architecture?
1412.
Quantitative methods for assessing the quality of proposed architectural designs are readily
available.
1413.
1414.
When the overall flow in a segment of a data flow diagram is largely sequential and follows straight-
line paths, _________ is present.
1415.
1416.
1417.
When a single item that triggers other data flow along one of many paths of a data flow diagram,
________ characterizes the information flow.
1418.
1419.
1420.
Classes and components that exhibit functional, layer, or communicational cohesion are relatively
easy to implement, test, and maintain.
1421.
1422.
Soft
war
e
cou
plin
g is
a
sign
of
poo
r
arc
hite
ctur
al
desi
gn
and
can
alw
ays
be
avoi
ded
in
eve
ry
syst
em.
1423.
1424.
Which model
depicts the
profile of the end
users of a
computer
system?
1425.
1426.
Routine is not loaded until it is called. All routines are kept on disk in a relocatable load format. The
main program is loaded into memory & is executed. This type of loading is called _________
1427.
Which of these framework activities is not normally associated with the user interface design
processes?
1428.
1429.
Usability questionnaires are most meaningful to the interface designers when completed by
1430.
1431.
In
soft
war
e
qual
ity
ass
ura
nce
wor
k
ther
e is
no
diffe
ren
ce
bet
wee
n
soft
war
e
verif
icati
on
and
soft
war
e
vali
dati
on.
1432.
1433.
1434.
What is the normal order of activities in which traditional software testing is organized? a.
integration testing b. system testing c. unit testing d.validation testing
1435.
1436.
1437.
Cla
ss
testi
ng
of
obje
ct-
orie
nte
d
soft
war
e is
equi
vale
nt
to
unit
testi
ng
for
trad
ition
al
soft
war
e.
1438.
Wh
en
testi
ng
obje
ct-
orie
nte
d
soft
war
e it
is
imp
orta
nt
to
test
eac
h
clas
s
ope
rati
on
sep
arat
ely
as
part
of
the
unit
testi
ng
pro
ces
s.
1439.
1440.
The
focu
s of
vali
dati
on
testi
ng
is to
unc
ove
r
plac
es
that
a
use
r
will
be
able
to
obs
erv
e
failu
re
of
the
soft
war
e to
conf
orm
to
its
req
uire
me
nts.
1441.
1442.
The call to the parameterized constructor of base class in the derived class
1443.
Software validation is achieved through a series of tests performed by the user once the software is
deployed in his or her work environment.
1444.
1446.
1447.
Sec
urity
testi
ng
atte
mpt
s to
verif
y
that
prot
ecti
on
mec
hani
sms
built
into
a
syst
em
prot
ect
it
fro
m
imp
rop
er
pen
etra
tion
1448.
Stre
ss
testi
ng
exa
min
es
the
pre
ssur
es
plac
ed
on
the
use
r
duri
ng
syst
em
use
in
extr
em
e
envi
ron
me
nts
1449.
1450.
Performance
testing is only
important for
real-time or
embedded
systems.
1451.
1452.
1453.
1454.
In mysql_fetch_array(),if two or more columns of the result have the same field names, what action
is taken?
1455.
The cyclomatic complexity metric provides the designer with information regarding the number of
1456.
Condition testing is a control structure testing technique where the criteria used to design test cases
is that they
1457.
Which of the following attribute is needed for file upload via form?
1458.
1459.
Dat
a
flow
testi
ng
is a
cont
rol
stru
ctur
e
testi
ng
tech
niqu
e
whe
re
the
crite
ria
use
d to
desi
gn
test
cas
es
is
that
they
1460.
1461.
Loo
p
testi
ng
is a
cont
rol
stru
ctur
e
testi
ng
tech
niqu
e
whe
re
the
crite
ria
use
d to
desi
gn
test
cas
es
is
that
they
1462.
Boundary value
analysis can only be
used to do white-box
testing.
1463.
You need to check the size of a file in PHP function. $size = X(filename); Which function will suitably
replace 'X'?
1464.
1465.
Which of the following function is used to terminate the script execution in PHP?
1466.
1468.
The _______ method of an Array object adds and/or removes elements from an array.
1469.
1470.
Consider the following code: var a = []; a.unshift(1); a.unshift(22); a.shift(); a.unshift(3,[4,5]); a.shift();
a.shift(); a.shift(); The final output for the shift() is
1471.
1472.
1473.
1474.
In the following code snippet, what is the correct value of the left margin? margin: 10px 5px 20px
15px;
1475.
If inspected in a browser, what will be the total width of the div in the following code snippet?
#container { width: 600px; border: 2px solid #CCCCCC; padding: 30px 20px; margin: 20px 10px
40px 10px;}
1476.
1477.
Which of these sets of HTML5 attributes can be used for form validation?
1478.
Which item is an example of a physical network address?
1479.
When used with the datalist element, what is the list attribute in HTML5 used to accomplish?
1480.
1481.
What is the correct CSS syntax for making all the elements bold?
1482.
1483.
Currently there is no single standard file type that can be used to play audio using the audio element
consistently on all browsers. Which is the solution that the audio element provides to resolve this
conflict?
1484.
1485.
1486.
1487.
1488.
Consider the following code snippet: var a = [1,2,3,4,5]; a.slice(0,3); What is the possible output for
the above code snippet?
1489.
1490.
Which property is used to obtain browser vendor and version information?
1491.
What is the result of the following code snippet? window.location === document.location
1492.
1493.
1494.
1495.
----------- is a built - in JavaScript function which can be used to execute another function after a
given time interval.
1496.
1497.
In javascript, RegExp Object Method test() is used to search a string and returns _________
1498.
1499.
1500.
Which one of the following is the very first task executed by a session enabled page?
1501.
What would be the output of the below code fragment? var a = ["s","a","v","e"];
document.write(a.join(""));
1502.
Which of the following property allows you to specify an element’s position with respect to the
browser window?
1504.
1505.
If para1 is the DOM object for a paragraph, what is the correct syntax to change the text within the
paragraph?
1506.
1507.
1508.
What is the code to start displaying the time when document loads?
1509.
1510.
1511.
In PHP, which of the following function is used to insert content of one php file into another php file
before server executes it
1512.
How do you get information from a form that is submitted using the "get" method?
1513.
1514.
A value that has no defined value is expressed in PHP with the following keyword:
1516.
1517.
1518.
You can find the element you want to manipulate by ________ way?
1519.
1520.
1521.
Syntax for creating a RegExp object: (i). var txt=new RegExp(pattern,modifiers); (ii). var
txt=/pattern/modifiers; Which of the above mentioned syntax will correct?
1522.
1523.
1524.
$a = array( null => 'a', true => 'b', false => 'c', 0 => 'd', 1 => 'e', '' => 'f' ); echo count($a), "\n"; What
will be printed?
1525.
1526.
How do we access the value of 'd' later? $a = array( 'a', 3 => 'b', 1 => 'c', 'd' );
1527.
What is the difference between echo and print?
1528.
1529.
1530.
1531.
1532.
1533.
1533.
1534.
____________ function in PHP returns a list of response headers sent (or ready to send)
Consider the following recursive C function. Void get (int n)
{if (n<1)
return;
get (n-1)
get (n-3) ;
printf ("%d",n);
If get(6) function is being called in main ()
then how many times will the get() function be invoked before returning
to the main ( ) ?
33.
#include
int main ()
{
static int a[]={10, 20, 30 40, 50};
static int
*p[]= {a, a+3, a+4, a+1, a+2}; int **ptr=p;
ptr++;
printf ("%d%d", ptr
p, **ptr);
}
The output of the program is __________
35.
Consider the following program: int f(int *p, int n)
{
if (n <= 1) return
0;
else return max ( f (p+1, n-1),p[0]-p[1]); }
int main()
{
int a[] = {3,5,2,6,4};
printf("%d", f(a,5));
}
The value printed by this
program is
37.
To prevent any method from overriding, the method has to declared as,
38.
Consider the function func shown below: int func(int num) {
int count
= 0;
while (num) {
count++; num>>= 1;
}
return (count);
}
The value returned by func(435)is
41.
A set of documents in which a given document can contain text, graphics video
and audio clips as well as embedded references to other documents world
wide web pages are called as
---------------
51.
Given the following structure template, choose the correct syntax
for accessing the 5th subject marks of the 3rd student:
struct stud {
int marks[6]; char sname[20]; char rno[10];
}s[10];
52.
Consider the following program: int f(int *p, int n)
{
if (n <= 1) return
0;
else return max ( f (p+1, n-1),p[0]-p[1]); }
int main()
{
int a[] = {3,5,2,6,4};
printf("%d", f(a,5));
}
The value printed by this
program is
54.
#include <stdio.h>
int main()
{
int a=10;
int b=2;
int c;
c=(a & b);
printf("c= %d",c);
return 0;
Find the output.
}
59.
#include <stdio.h>
#define MOBILE 0x01
#define LAPPY 0x02
int main() {
unsigned char item=0x00;
item |=MOBILE;
item |=LAPPY;
printf("I have purchased ...:"); if(item & MOBILE){
printf("Mobile, ");
}
if(item & LAPPY){
printf("Lappy");
}
return 1;
60.
#include <stdio.h>
int main()
{
char flag=0x0f;
flag &= ~0x02;
printf("%d",flag);
return 0;
Predict the output.
}
61.
#include <stdio.h> int main()
{
printf("Hello...");
break;
printf("Ok");
} else {
printf("Hii");
}
return 0; }
{
if( (-100 && 100)||(20 && -20) )
printf("%s","Condition is true.");
else
printf("%s","Condition is false."); return 0;
}
Find the output
63.
if(TRUE)
printf("1");
printf("2");
else
printf("3");
printf("4"); return 0;
}
Find the output.
64.
#include <stdio.h> int main()
{
printf("10");
else
printf("0"); return 0;
void
main(){
unsigned char
printf("%d",c);
}
Find the output.
68.
}
#include
int
main(){
float
char
a=125.50;
c=290;
int
=125.50;
c='A';
printf("%d,%d,%d\n",sizeof(a),sizeof(b),sizeof(125.50));
printf("%d,%d\n",sizeof(c),sizeof(65));
return
0;
#include
int
main()
#include
};
int
-100;
return
ok=-100;
printf("%d",ok);
numbers
0;
enum
void
main()
printf("%d,%d,%d,%d,%d,%d,%d,%d,%d",zero,one,two,three,four,five,six,s
even,eight);
}
Find the output.
72.
{
74.
{
#include
int
main()
#include
int
var=250;
"includehelp.com";
printf("%s\n","includehelp");
return
0;
int
main()
int
a=100;
printf("%d\n"+1,a);
printf("Value is = %d"+3,a);
return
0;
int
main()
extern
int
ok;
printf("value of ok = %d",ok);
return
extern i
ok=100
n
t 0;
#include <stdio.h>
0;
int
main()
int
a=23;
;printf("%d",a);
;
return
0;
#include
int
main()
int
intVar=24;
static
int
x=intVar;
printf("%d,%d",intVar,x);
return
0;
int
main()
int
a=15;
float
b=1.234;
printf("%*f",a,b);
return
0;
int
main()
int
a=15;
float
b=1.234;
printf("%*f",a,b);
return
0;
Predict the output?
#include <stdio.h>
int
main()
float
a,b;
a=3.0f;
b=4.0f;
printf("%.0f,%.1f,%.2f",a/b,a/b,a/b);
return
0;
76.
{
77.
{
77.
{
78.
{
}
79.
What type of declaration is this:
#include <stdio.h>
void
main()
const
#include <stdio.h>
char
var='A';
++var;
printf("%c",var);
void
main()
int
x=10;
x+=(x++)+(++x)+x;
printf("%d",x);
#include <stdio.h>
void
main()
int
a=10,b=2,x=0;
x=a+b*a+10/2*a;
printf("value is =%d",x);
#include <stdio.h>
void
main()
unsigned short
var='B';
var+=2;
var++;
void
main()
char
var=10;
printf("var is = %d",++var++);
unsigned num;
84.
}
#include <stdio.h>
void
main()
int
int
void
main()
x;
x= (printf("AA")||printf("BB"));
printf("%d",x);
printf("\n");
x= (printf("AA")&&printf("BB"));
printf("%d",x);
Find the output
#include <stdio.h>
void
main()
int
a=3,b=2;
a=a==b==0;
printf("%d,%d",a,b);
86.
Find the output:
}
87.
{
89.
}
90.
}
#include <stdio.h>
void
main(){
int
intVar=20,x;
x= ++intVar,intVar++,++intVar;
printf("Value of intVar=%d, x=%d",intVar,x);
Find the output
#include <stdio.h>
int
main(){
char
val=250;
int
ans;
return
0;
}
Find the output
95.
{
#include <stdio.h>
int
main(){
float
(int)a= 10;
return
#include <stdio.h>
int
a;
printf("value of a=%d",a);
x=100,30,50;
0;
int
main(){
x;
printf("x=%d\n",x);
x=(100,30,50);
printf("x=%d\n",x);
return
#include <stdio.h>
0;
int
main()
int
i=-1,j=-1,k=0,l=2,m;
m=i++&&j++&&k++||l++;
printf("%d %d %d %d %d",i,j,k,l,m);
return
#include <stdio.h>
0;
int
main()
int
var;
var=- -10;
return
#include <stdio.h>
0;
int
main()
int
x,y;
x=(100,200);
y=100,200;
printf("x=%d,y=%d",x,y);
0
return ;
98.
#include <stdio.h>
{
i
main
n
()
t
int
x=65;
const
unsigned char
printf("%c\n",c);
c=(int)x;
0
return ;
i
main
n
()
t
int
x=2.3;
const const
char char
c1=(float)x;
c2=(int)x;
printf("%d,%d\n",c1,c2);
0
return ;
i
main
n
()
t
char
char
*text="Hi Babs.";
x=(char)(text[3]);
printf("%c\n",x);
return
100.
#include <stdio.h>
{
int
0
return ;
main
i
()
n
t
char
return
x=65;
const
unsigned char
printf("%c\n",c);
*text="Hi Babs.";
c=(int)x;
char
x=(char)(text+3);
printf("%c\n",x);
#include <stdio.h>
0;
void
main()
int
main()
int
a=10;
switch(a){
case
default:
#include <stdio.h>
void
a=2;
switch(a)
5+5:
printf("Hello\n");
printf("OK\n");
printf("Message\n");
default:
case
case
printf("Default\n");
2:
printf("Case-2\n");
3:
printf("Case-3\n");
printf("Exit from switch\n");
#include <stdio.h>
void
a=2;
int int
b=a;
main()
switch(b)
main()
case
default:
a:
printf("Case-a\n"); break;
case
3:
printf("Case-3\n"); break;
printf("No option\n"); break;
printf("Exit from switch");
#include <stdio.h>
void
short
switch(day)
day=2;
short
case
break;
default:
break;
#include <stdio.h>
switch(a)
a=2;
case
case
default:
2: || case
printf("%d nd",day);
printf("%d th",day);
1L:
printf("One\n");
break;
2L:
printf("Two\n");
break;
22:
void
main()
#include <stdio.h>
printf("Else\n");
main(){
static
case
case
int
default:
staticVar;
int
j;
for(j=0;j<=5;j+=2)
switch(j){
case
1:
staticVar++;
break;
2:
staticVar+=2;
4:
staticVar%=2;
j=-1;
continue;
--staticVar;
continue;
printf("%d",staticVar);
void
main()
int
a=2;
switch(a/2*1.5)
{
case
}
void
main(){
int
a=1;
switch(a/2)
break;
1:
printf("One...");
break;
case
default:
2:
printf("Two...");
break;
printf("Other...");
break;
case
case
NULL:
printf("Case NULL\n");
break;
0:
default:
printf("Case ZERO\n");
break;
printf("DEFAULT\n");
break;
int
main()
int
lbl:
i;
if(i*i > 30 )
goto
lbl;
else
printf("%d",i);
printf("IHelp ");
}
return
Find the output
#define TRUE 1
0;
#include <stdio.h>
int
main()
switch(TRUE)
{
printf("Hello");
}
void
main()
{ unsigned char
var=0;
for(var=0;var<=255;var++);
{
printf("%d ",var);
110.
{
111.
{
}
112.
}
fun()
116.
{
#include <stdio.h>
void
char
main()
cnt=0;
for(;cnt++;printf("%d",cnt)) ;
printf("%d",cnt);
#include <stdio.h>
void
main()
int
print:
i=1;
while
if
i++;
(i<=5)
printf("%d",i);
(i==5)
goto
printf("includehelp.com");
#include < stdio.h >
print;
int
main()
int
for(;;)
tally=0;
if(tally==10)
#include <stdio.h>
break;
printf("%d ",++tally);
return
0;
void
main()
int
tally;
for(tally=0;tally<10;++tally)
{
printf("#");
if(tally>6)
void
main()
int i,j,charVal='A
';
for(i=5;i>=1;i--)
{
for(j=0;j< i;j++)
}
printf("%c ",(charVal+j));
printf("\n");
Identify the output
#include <stdio.h>
void
main()
int
cnt=1;
while(cnt>=10)
{
printf("%d,",cnt);
cnt+=1;
#define TRUE 1
int
main()
int
loop=10;
continue;
printf("%d",tally);
}
int
main()
117.
{
118.
{
119.
{ }
120.
{
static
int
int
main()
int int
return
main()
MAX=10;
array[MAX];
0;
int
main()
{ int
array[MAX]={1,2,3},tally;
for(tally=0;tally< sizeof(array)/sizeof(int);tally+=1)
printf("%d ",*(tally+array));
return
0;
#include <stdio.h>
int
{ static
return
int
count=0;
int
var[5];
var[++count]=++count;
for(count=0;count<5;count++)
printf("%d ",var[count]);
return
0;
x[]={'A','B','C','D','E'},tally;
for(tally=0;tally< sizeof(x)/sizeof(int) ; tally+=1)
printf("%c,%c,%c\n",*(x+tally)+1,x[tally]+1,*(tally+x)+1);
return
0;
#include <stdio.h>
int
main()
{ static
int
array[]={10,20,30,40,50};
printf("%d...%d",*array,*(array+3)* *array);
0;
121.
{
122.
}
123.
}
124.
}
125.
#include <stdio.h>
int
main()
{ int
0
return ;
int
main()
{ int
return
a[5]={1,2,3,4,5},b[5]={10,20,30,40,50},tally;
for(tally=0;tally< 5;++tally)
*(a+tally)=*(tally+a)+ *(b+tally);
for(tally=0;tally< 5;tally++)
printf("%d ",*(a+tally));
a[5]={0x00,0x01,0x02,0x03,0x04},i;
i=4;
while(a[i])
printf("%02d ",*a+i);
--i;
0;
int
main()
char
X[10]={'A'},i;
for(i=0; i<10; i++)
printf("%d ",X[i]);
return
0;
126.
}
127.
{
1. int x[5];
2. int x[5]={1,2,3,4,5};
3. int x[5] = {1,2}
4. int x[];
129.
Which one of the following correctly describes the meaning of
'namespace' feature in C++?
130.
Which of the following language feature is not an access specifier
in C++?
138.
If the class name is X, what is the type of its "this" pointer?
139.
If a constructor function is defined in private section of a class,
then
140.
The stream insertion operator should be overloaded as
141.
class A { int a; static float b; } ; What is the size of class A?
142.
Data Members of the base class that are marked private:
143.
Which of the following (in file scope) leads to a compile-time error?
144.
The default copy constructor performs
145.
which of the following is an incorrect definition inside a class ?
146.
Which one of the following is the correct way to declare a pure
virtual function?
147.
Usually a pure virtual function
148.
Which of the following operator can be overloaded through friend
function?
149.
If class A is friend of class B and if class B is friend of class C,
which of the following is true?
156.
If we create a file by ‘ifstream’, then the default mode of the file is
_________
157.
Assume that we have constructor functions for both base class
and derived class. Now consider the declaration in main( ). Base * P =
New Derived; in what sequence will the constructor be called ?
158.
class n{ public: int *a;}o,p; assigning o=p is called?
159.
overloading + operator requires return type as object because,
160.
To create an alias Objects have to be passed by
161.
Templates improve
162.
Creating additional function similar to template function is called
163.
Compile time polymorphism is
164. Abstraction is
165.
Pick the odd one out.
166.
A collection of unused memory reserved for dynamic allocation is
called
167.
The levels of hierarchy in inheritance helps to handle
168.
Run time polymorphism is achieved by ______
169.
A property which is not true for classes is that they
int
main()
int v
al=0;
char
str[]="IncludeHelp.Com";
val=strcmp(str,"includehelp.com");
printf("%d",val);
return
#include <stdio.h>
#include <string.h>
0;
i
main
n
()
t
char
str[];
strcpy(str,"Hello");
printf("%s",str);
return
#include <stdio.h>
int
0;
main()
char
str[8]="IncludeHelp";
printf("%s",str);
return
#include <stdio.h>
#include <string.h>
int
0;
main()
char
str1[]="IncludeHelp",str2[]=".Com";
printf("%s",str1+strlen(str2));
return
#include <stdio.h>
int
main()
0;
char
str[]="Hello%s%dFriends";
printf(str);
printf("\n");
printf("%s",str);
return
#include <stdio.h>
int
main()
int a
str[11]='c';
0;
char
str[]="value is =%d";
='7';
printf(str,a);
return
#include <stdio.h>
0;
int
main()
char
result,str[]="\0IncludeHelp";
result=printf("%s",str);
if(result)
else
return
printf("TRUE");
printf("FALSE");
#include <stdio.h>
#include <string.h>
0;
int
main()
char char
s1[]="IncludeHelp";
s2[10];
strncpy(s2,s1,5);
printf("%s",s2);
return
#include <stdio.h>
#include <string.h>
int
main()
0;
char
str[50]="IncludeHelp";
printf("%d...%d",strlen(str),sizeof(str));
return
0;
struct
};
float
sample
int a=
0;
char b
='A';
c=10.5;
int
main()
struct
sample s;
printf("%d,%c,%f",s.a,s.b,s.c);
return
0;
#include <stdio.h>
int
main()
struct s
ample{
int int
a; b;
sample *s;
}t;
printf("%d,%d",sizeof(sample),sizeof(t.s));
return
0;
char
name[20];
}std;
char
* fun(struct
student *tempStd)
strcpy(tempStd->name,"Thomas");
return
tempStd->name;
181.
Find the output
{
182.
{
183.
{
{ }
i
main
n
()
t
{
}
stru samp
ct le
}sample;
strcpy(std.name,"Mike ");
printf("%s%s",std.name,fun(&std));
return
0;
int
a;
i
main
n
()
t
sample.a=100;
printf("%d",sample.a);
return
0;
#include <stdio.h>
struct em
int e
ployee{
mpId;
char
*name;
};
int a
ge;
int
main()
return
#include <stdio.h>
0;
int
main()
union
};
union
int
values
char
intVal;
chrVal[2];i
values val;
val.chrVal[0]='A'; val.chrVal[1]='B';
printf("\n%c,%c,%d",val.chrVal[0],val.chrVal[1],val.intVal);
return
#include <stdio.h>
int
main()
0;
union
};
union
values
unsigned char
unsigned char
unsigned int
a; b;
c;
val.a=1;
val.b=2;
val.c=300;
return
#include <stdio.h>
values val;
printf("%d,%d,%d",val.a,val.b,val.c);
0;
int
main()
typedef s
}har;
int a
truct
tag{
char
str[10];
har h1,h2={"IHelp",10};
h1=h2;
h1.str[1]='h';
printf("%s,%d",h1.str,h1.a);
return
#include <stdio.h>
struct
char
int a
0;
int
main()
std
name[30];
ge;
};
#include <stdio.h>
int
main()
union
test
};
int int
i; j;
union
test var=10;
printf("%d,%d\n",var.i,var.j);
#include <stdio.h>
int
#endif
main()
#ifdef debug
printf("Start debugging...");
printf("IncludeHelp");
return
return
#include <stdio.h>
#define MAX 100
int
main()
#define MAX 20
#include <stdio.h>
#define FUN(x) x*x
0;
printf("MAX=%d...",MAX);
0;
int
int
struct
struct
main()
std s1={"Mike",26};
std s2=s1;
val=128/FUN(8);
printf("val=%d",val);
return
0;
int
main()
int
a1=10,a2=20;
printf("%d...%d",FUN(a,1),FUN(a,2));
return
0;
int
main()
int
a=10,b=20,l=0;
l=LARGEST(a++,b++);
printf("a=%d,b=%d,largest=%d",a,b,l);
return
#define OFF 0
int
0;
a=11;
i
main
n
()
t
int
b=22;
printf("%d...%d",a,b);
return
0;
int
main()
printf("%s",TEXT);
return
0;
194.
{
195.
{
196.
{
197.
{ }
printf("%d",VAR1);
return
0;
int
main()
SUM(10,20);
return
0;
#include <stdio.h>
#define MAX 99
int
main()
printf("%d...",MAX);
#undef MAX
printf("%d",MAX);
return
int
main()
int
var=100;
int
var=200;
printf("%d...",var);
}
printf("%d",var);
return
0;
199.
{ }
200.
{
201.
{
202.
{ }
char* fun2(void)
{
} {
} {
#include <stdio.h>
char* fun1(void)
char
return
char
return
i
main
n
()
t
i
fooo(voi
n
d)
t
static
num++;
str[]="Hello";
str;
*str="Hello";
str;
printf("%s,%s",fun1(),fun2());
return
0;
int
num=0;
return
num;
i
main
n
()
t
int
val;
val=fooo();
printf("step1: %d\n",val);
val=fooo();
printf("step2: %d\n",val);
val=fooo();
printf("step3: %d\n",val);
return
0;
i
main
n
()
t
int
anyVar=10;
printf("%d",10);
return
0;
i
exte anyVa
n
rn r;
t
int
main()
char
*str="IncludeHelp";
printf("%c\n",*&*str);
return
0;
int
main()
int
iVal;
char void
cVal;
return 0;
int
main()
char
char
char
*str []={"AAAAA","BBBBB","CCCCC","DDDDD"};
**sptr []={str+3,str+2,str+1,str};
++pp;
return
***pp;
pp=sptr;
printf("%s",**++pp+2);
0;
Find the output
#include <stdio.h>
char* strFun(void)
char
*str="IncludeHelp";
return
str;
i
main
n
()
t
205.
{
206.
{
207.
{
208.
{
} {
char
*x;
x=strFun();
printf("str value = %s",x);
return
} {
#include <stdio.h>
int
main()
void
++ptr;
*ptr;
printf("%u",ptr);
return
#include <stdio.h>
int
0;
main()
char void
return
ch=10;
*ptr=&ch;
printf("%d,%d",*(char*)ptr,++(*(char*)ptr));
#include <stdio.h>
int
main()
0;
int int
return
a=10,b=2;
*pa=&a,*pb=&b;
printf("value = %d", *pa/*pb);
#include <stdio.h>
void
fun(int
*ptr=100;
i
main
n
()
t
int int
*pp=#
fun(& *pp);
0;
0;
num=50;
*ptr)
printf("%d,%d",num,*pp);
return
int
main()
typedef
AAA aaa=10;
BBB bbb=20;
CCC ccc=30;
DDD ddd=40;
int
AAA,BBB,CCC,DDD;
printf("%d,%d,%d,%d",aaa,bbb,ccc,ddd);
return
0;
main()
typedef
AI var=100;
auto int
printf("var=%d",var);
AI;
return
int
main()
typedef
char* string;
string myName="ABCDEFG";
printf("myName=%s (size=%d)",myName,sizeof(myName));
return
0;
main()
typedef
}EMP;
int int
struct
empid;
bsal;
EMP E={10012,15100};
printf("%d,%d",E.empid,E.bsal);
return
0;
217. 218.
The _______ attribute defines the action to be performed when the form
is submitted
231.
233.
How can you make a list that lists the items with numbers?
235.
Which method is used to get the year of a date object in YYYY format
in Javascript.
236.
#include
using namespace std; typedef int * IntPtr;
int main()
{
IntPtr A, B, C; int D,E;
A = new int(3); B = new int(6); C = new
int(9); D = 10;
E = 20;
*A = *B;
B = &E;
D = (*B)++;
*C= (*A)++ * (*B)--;
E=
*C++ - *B--; cout<<*A<<*B<<*C<<d<<e;
return 0; }</d<<e;
243.
To link your Web page to a style sheet, you must use the _____ tag
245.
A process executes the code fork ();
fork ();
fork ();
The total number of child processes created is
246.
Consider the C function given below. int f(int j)
{
static int i = 50;
int k;
if (i == j)
{
printf("something");
k = f(i);
return 0;
}
else
return 0;
}
Which one of the following is TRUE?
250.
252.
253.
For automatic objects, constructors and destructors are called each time the
objects ___
253.
For automatic objects, constructors and destructors are called each time the
objects ___
254.
var a = [];
a.unshift(1);
a.unshift(22);
a.shift();
a.unshift(3,[4,5]);
a.shift();
a.shift();
a.shift();
The final output for the shift() is
function oddsums(n)
{
let total = 0, result=[];
for(let x = 1; x <= n; x++)
{
let odd = 2*x-1;
total += odd;
result.push(total);
}
return result;
}
266.
In PHP, array values are keyed by ______ values (called indexed
arrays) or using ______ values (called associative arrays). Of course,
these key methods can be combined as well.
269.
Consider the following program: int f(int *p, int n)
{
if (n <= 1) return
0;
else return max ( f (p+1, n-1),p[0]-p[1]); }
int main()
{
int a[] = {3,5,2,6,4};
printf("%d", f(a,5));
}
The value printed by this
program is
274.
280.
Multiple variable declaration of same data type can be avoided by?
281.
Run time polymorphism is achieved by ______
282.
Which of the following gives the memory address of a variable
pointed to by pointer a?
283.
If a class C is derived from class B, which is derived from class A,
all through public inheritance, then a class C member function can
access
284.
A default constructor is one that
285.
A constructor without any arguments is
286.
Which of the following functions compares two strings?
287.
class n{ int a;}; how much memory the compiler allocates for this
class
289. A class is a
292. Abstraction is
305.
Which of the following ways are legal to access a class data
member using this pointer?
306.
Which one of the following is the correct way to declare a pure
virtual function?
307.
Which of the following operator can be overloaded through friend
function?
309. Which of the following (in file scope) leads to a compile-time error?
327.
If X is the name of the class, what is the correct way to declare
copy constructor of X?
328.
What does the following declaration mean? int (*ptr)[10];
class n{ int a=0;}obj; what will happen?
341.
Identify the invalid
statement from the following
342.
A variable P is called pointer
if
343.
SELECT THE HIGHEST PRIORITY OPERATOR
344.
Which
of the following operators has an associativity from Right to
Left?
345.
Which of the following function sets first n characters of a
string to a given character? 346.
The library function used to find the
last occurrence of a character in a string is
347.
Consider the following function double f(double x)
{
if (abs(x*x - 3) <
0.01) return x; else return f(x/2 + 1.5/x);
}
Give a value q (to 2 decimals) such that f(q) will return q:_____.
348.
Which header file should be included to use functions like malloc()
and calloc()? 349.
Consider the following C declaration struct {
short s [5]
union {
float y;
long z;
}u;
} t;
Assume that objects of the type short, float and
long occupy 2 bytes, 4 bytes and 8 bytes, respectively. The memory
requirement for variable t, ignoring alignment
considerations, is 350.
If a class C is derived from class B, which is derived from class A, all
through public inheritance, then a class C member function can access
351.
class n{ int a;}; how much memory the compiler allocates for this class
352.
Overloading the function operator
353.
The two statements that can be used to change the flow of control are
354.
355.
357.
A property which is not true for classes is that they
358.
The levels of hierarchy in inheritance helps to handle
359.
367.
which of the following is an incorrect definition inside a class ?
368.
371.
The call to the parameterized constructor of base class in the derived
class
372.
376.
388.
389.
What does /[^(]* regular expression indicate ?
390.
393.
If inspected in a browser, what will be the total width of the div in the
following code snippet? #container { width: 600px; border: 2px solid
#CCCCCC; padding: 30px 20px; margin: 20px 10px 40px 10px;}
394.
Which of the following is not a valid attribute of the INPUT
tag?
395.
Which of these sets of HTML5 attributes can be used for
form validation?
396.
Which item is an example of a physical network
address?
397.
When used with the datalist element, what is the list
attribute in HTML5 used to accomplish?
398.
What is the following style an example of?
img[alt~="Pie"]
399.
What is the correct CSS syntax for making all the
elements bold? 400.
How can you specify default text in an input
field?
401.
Currently there is no single standard file type that can be used to play
audio using the audio element consistently on all browsers. Which is the
solution that the audio element provides to resolve this conflict?
402.
403.
How do we prevent margins, borders and padding from overlapping?
404.
409.
What is the result of the following code snippet? window.location ===
document.location
410.
The length property belongs to which of the following objects?
411.
What will happen if the first argument of open() is omitted?
412.
426.
What is the code to start displaying the time when document loads?
427.
430.
How do you get information from a form that is submitted using the
"get" method? 431.
What does explode function in php do
432.
Which
command we use to set an image on background?
433.
A value that
has no defined value is expressed in PHP with the following keyword:
434.
Which JavaScript function is most useful for finding
errors?
435.
JavaScript RegExp Object has modifier 'i' to
__________
436.
You can find the element you want to manipulate by
________ way?
437.
The Document object is which part of the
object?
438.
The node type for document returns the value ---.
439.
Syntax for creating a RegExp object: (i). var txt=new
RegExp(pattern,modifiers); (ii). var txt=/pattern/modifiers; Which of the
above mentioned syntax will correct?
440.
Which of these contains an executable statement?
441.
Which of the following is NOT a valid PHP comparison operator?
442.
$a = array( null => 'a', true => 'b', false => 'c', 0 => 'd', 1 => 'e', '' => 'f' );
echo count($a), "\n"; What will be printed?
443.
Answer: Choice D
Introduction to Artificial Intelligence
2. What is state space?
A. The whole problem
B. Representing your problem with variable and
parameter C. Your Definition to a problem
D.
AspacewhereYouknowthesolution.
Answer: Choice B
Introduction to Artificial Intelligence
A. Depth-First Search
Answer: Choice A
Introduction to Artificial Intelligence
4. A* algorithm is based on
A. Depth-First Search B. Breadth-First Search C. Best-First Search
D.
HillClimbing
Answer: Choice C
Introduction to Artificial Intelligence
Answer: Choice B
Introduction to Artificial Intelligence
Answer: Choice A
Answer: Choice A
Introduction to Artificial Intelligence
Answer: Choice D
Introduction to Artificial Intelligence
Answer: Choice C
Introduction to Artificial Intelligence
Answer: Choice B
Introduction to Artificial Intelligence
Answer: Choice C
Introduction to Artificial Intelligence
Answer: Choice A
Introduction to Artificial Intelligence
13. Inductive learning involves finding a
A. Consistent Hypothesis B. Inconsistent Hypothesis C. Regular
Hypothesis
D. EstimatedHypothesis.
Answer: Choice A
Introduction to Artificial Intelligence
Answer: Choice C
Introduction to Artificial Intelligence
Answer: Choice B
Introduction to Artificial Intelligence
Answer: A
The object oriented paradigm
Answer: A
The object oriented paradigm
Answer: D
The object oriented paradigm
Answer: C
The object oriented paradigm
Answer: C
The object oriented paradigm
Answer: C
The object oriented paradigm
Answer: A
Answer: B
The object oriented paradigm
Answer: A
The object oriented paradigm
Answer: C
The object oriented paradigm
Answer: C
The object oriented paradigm
Answer: B
The object oriented paradigm
Answer: B
The object oriented paradigm
Answer: C
Answer: x’ = x*sx, y’ = y * sy
Computer Graphics
Answer: Shearing
Computer Graphics
Answer: Six
Computer Graphics
Answer: rotation
Computer Graphics
Answer: Four
Computer Graphics
Computer Graphics
Answer: Secondary
Computer Graphics
Answer: Empty
Computer Graphics
Answer: Shades
Computer Graphics
48. Blue and green combined you will get _______ color.
A. Cyan
B. Magenta C. Yellow D. White
Answer: Cyan
Computer Graphics
Answer: Second
Computer Graphics
51. The environment map is defined over the surface of an
enclosing universe
A. environment array
B. enclosing universe
C. reflection mapping
D.
environmentmapping
52. Blue and red combined you will get ________ color.
A. Cyan
B. Magenta C. Yellow D. White
Answer: Magenta
Computer Graphics
Answer: A
MULTI CORE SYSTEMS PROGRAMMING
Answer: B
MULTI CORE SYSTEMS PROGRAMMING
Answer: D
MULTI CORE SYSTEMS PROGRAMMING
Answer: B
MULTI CORE SYSTEMS PROGRAMMING
58. 6) Multi-core processor is finding increasing deployment
in __________________
Answer: A
MULTI CORE SYSTEMS PROGRAMMING
Answer: C
MULTI CORE SYSTEMS PROGRAMMING
Answer: D
MULTI CORE SYSTEMS PROGRAMMING
D. Jobscheduling
Answer: B
MULTI CORE SYSTEMS PROGRAMMING
Answer: A
MULTI CORE SYSTEMS PROGRAMMING
Answer: C
MULTI CORE SYSTEMS PROGRAMMING
Answer: D
MULTI CORE SYSTEMS PROGRAMMING
Answer: B
MULTI CORE SYSTEMS PROGRAMMING
Answer: C
MULTI CORE SYSTEMS PROGRAMMING
Answer: B
MULTIMEDIA SYSTEMS AND ALGORITHMS
Answer: A
MULTIMEDIA SYSTEMS AND ALGORITHMS
Answer: C
MULTIMEDIA SYSTEMS AND ALGORITHMS
Answer: C
MULTIMEDIA SYSTEMS AND ALGORITHMS
Answer: D
MULTIMEDIA SYSTEMS AND ALGORITHMS
Answer: B
MULTIMEDIA SYSTEMS AND ALGORITHMS
Answer: D
Answer: C
MULTIMEDIA SYSTEMS AND ALGORITHMS
Answer: D
MULTIMEDIA SYSTEMS AND ALGORITHMS
Answer: C
MULTIMEDIA SYSTEMS AND ALGORITHMS
Answer: A
MULTIMEDIA SYSTEMS AND ALGORITHMS
79. ----------------- checks whether the request can be
guaranteed or not
A. Requestor
B. Resource manager C. Resource reservation D.
Resourcescheduling
Answer: B
MULTIMEDIA SYSTEMS AND ALGORITHMS
Answer: C
MULTIMEDIA SYSTEMS AND ALGORITHMS
Answer: A
MULTIMEDIA SYSTEMS AND ALGORITHMS
D.
Answer: A
Computer Architecture and Organization
Answer: C
Computer Architecture and Organization
Answer: A
Computer Architecture and Organization
Answer: A
Computer Architecture and Organization
Answer: B
Computer Architecture and Organization
Answer: D
Computer Architecture and Organization
Answer: B
Computer Architecture and Organization
Answer: B
Computer Architecture and Organization
Answer: B
Computer Architecture and Organization
Answer: A
Computer Architecture and Organization
Answer: C
Computer Architecture and Organization
D.
Answer: A
Computer Architecture and Organization
Answer: D
Computer Architecture and Organization
97. The DMA transfer takes place between magnetic disk and
memory is takes place in any one of the following method
A. burst transfer
B. cycle stealing
C. program initiated I/O D. BothAandB
Answer: D
Computer Architecture and Organization
Answer: D
Digital Logic
Answer: A
Digital Logic
Answer: A
Digital Logic
Answer: B
Digital Logic
102. 5. For the given message 111100 identify the Odd and
even parity
A. a)1&0 B.b) 1&1 C. c)0&0 D. d)0&1
Answer: A
Digital Logic
Answer: A
Digital Logic
104. 7. To design the full adder using multiplexer, determine
the number of input lines, size of Decoder and number of
multiplexers used
A. a.2, 2x4, 1 B. b.4,2x4,2 C. c.3,3x8,2 D. d.3,2x4,1
Answer: B
Digital Logic
Answer: B/C
Digital Logic
Answer: A
Digital Logic
Answer: A
Digital Logic
Answer: A
Digital Logic
109. 12. The content of the 4-bit shift register is initially 1101.
The register is shifted six times to the right, with the serial
input being 101101. What is the content of the register at the
end of the shifting process?
A. A. 1011 B. B. 1101 C. C. 1110 D. D.0111
Answer: A
Digital Logic
Answer: D
Digital Logic
Answer: A
Digital Logic
Answer: C
Digital Logic
Answer: Ageing
OPERATING SYSTEMS
Answer: Process
OPERATING SYSTEMS
Answer: FIFO
OPERATING SYSTEMS
Answer: Swapping
OPERATING SYSTEMS
Answer: Round-Robin.
OPERATING SYSTEMS
C. 77 D. None
Answer: 3245
Scripting Languages
Answer: I,n,d,i,a
Scripting Languages
C. G,o,o,d,% D. Error
Answer: G,o,o,d,%
Scripting Languages
Answer: error
Scripting Languages
Answer: paradigm
Scripting Languages
Answer: 78
Scripting Languages
Answer: None
Scripting Languages
B. FALSE
C. D.
Answer: FALSE
Scripting Languages
B. FALSE
C. D.
Answer: FALSE
Scripting Languages
Answer: call
Scripting Languages
140. VBScript does not support early binding – True/False
A. TRUE
B. FALSE
C. D.
Answer: TRUE
Scripting Languages
142. What's the default setting for the expires attribute of the
document.cookie property?
A. The duration of the browser session.
B. The duration the current
document stays loaded C. Twenty-four hours from the time the cookie is set.
D. Thereisnodefaultsetting
Answer: C
Algorithm Design and Analysis
Answer: D
Algorithm Design and Analysis
Answer: D
Algorithm Design and Analysis
Answer: B
Algorithm Design and Analysis
Answer: A
Algorithm Design and Analysis
Answer: C
Algorithm Design and Analysis
Answer: B
Algorithm Design and Analysis
Answer: B
Answer: A
Algorithm Design and Analysis
Answer: B
Algorithm Design and Analysis
Answer: A
Algorithm Design and Analysis
Answer: C
Algorithm Design and Analysis
Answer: C
Algorithm Design and Analysis
Answer: C
Algorithm Design and Analysis
Answer: B
Algorithm Design and Analysis
158. Which of the following data type can be used for storing
a floating
A. int
B. long int
C. double
D. unsignedchar
Answer: C
C Programming
Answer:
C Programming
B. 2.5
C. 0
D.
Answer: B
C Programming
Answer: C
C Programming
Answer: B
C Programming
Answer: A
C Programming
Answer: A
C Programming
165.
A. B. C. D.
Answer:
C Programming
166.
A. B. C. D.
Answer:
C Programming
Answer: A
C Programming
168.
A. B. C. D.
Answer:
C Programming
Answer: A
C Programming
170.
A. B. C. D.
Answer:
C Programming
Answer: C
C Programming
Answer:
C Programming
174. {
A. B. C. D.
Answer:
C Programming
175. NUM++;
A. B. C. D.
Answer:
C Programming
Answer:
C Programming
177. return 0;
A. B. C. D.
Answer:
C Programming
Answer:
C Programming
179. int i = 5;
A. Structured programming language B. Object Oriented Programming
C.
Compilation error
D. none
Answer: C
C Programming
180. if(i = 5)
A. B. C. D.
Answer:
C Programming
181. {
A. B. C. D.
Answer:
C Programming
Answer:
C Programming
183. }
A. B. C. D.
Answer:
C Programming
184. else
A. B. C. D.
Answer:
C Programming
185. {
A. B. C. D.
Answer:
C Programming
Answer:
C Programming
187. }
A. B. C. D.
Answer:
C Programming
188.
A. B. C. D.
Answer:
C Programming
Answer:
C Programming
Answer: B
C Programming
191. i = i / 2;
A. B. C. D.
Answer:
C Programming
192. i = i % 2; return 0}
A. B. C. D.
Answer:
C Programming
Answer: A
C Programming
194.
A. B. C. D.
Answer:
C Programming
195.
A. B. C.
D.
Answer:
C Programming
196.
A. B. C. D.
Answer:
C Programming
197.
A. B. C. D.
Answer:
C Programming
198.
A. B. C. D.
Answer:
C Programming
199.
A. B. C. D.
Answer:
C Programming
Answer: D
C Programming
Answer:
C Programming
202.
A. B. C.
D.
Answer:
C Programming
Answer: D
C Programming
Answer:
C Programming
205. printf(“%d,%d,%d,%d”,b,a++,a,++a);
A. B. C. D.
Answer:
C Programming
Answer:
C Programming
207.
A. B. C. D.
Answer:
C Programming
Answer: C
C Programming
209. {if(x>0)
A. B. C. D.
Answer:
C Programming
210. Funct(--x);
A. B. C. D.
Answer:
C Programming
211. printf(“%d”,x);
A. B. C. D.
Answer:
C Programming
212. }
A. B. C. D.
Answer:
C Programming
Answer:
C Programming
214. {
A. B. C. D.
Answer:
C Programming
215. Funct(5);
A. B. C. D.
Answer:
C Programming
Answer:
C Programming
217.
A. B. C. D.
Answer:
C Programming
218.
A. B. C. D.
Answer:
C Programming
Answer: A
C Programming
Answer: D
Computer Architecture and Organization
Answer: C
Computer Architecture and Organization
Answer: A
Computer Architecture and Organization
Answer: C
Computer Architecture and Organization
Answer: A
Computer Architecture and Organization
Answer:
Computer Architecture and Organization
226. Word 30 contains 50
A. B. C. D.
Answer:
Answer:
Computer Architecture and Organization
Answer:
Computer Architecture and Organization
Answer: B
Computer Architecture and Organization
230. The common fields found in instruction formats are:
A. opcode field, address field, mode field
B. opcode field, operand field,
address field, mode field,
C. opcode field, address field, next address field,
mode field. D. opcodefield,addressfield1,addressfield1,modefield,
Answer: A
Computer Architecture and Organization
Answer: B
Computer Architecture and Organization
232. If a number has k-bits(k is even), how many bits will its
square-root have?
A. K-1 B. K/2 C. K D. k-2
Answer: B
Computer Architecture and Organization
Answer: B
Computer Architecture and Organization
Answer: A
Computer Architecture and Organization
Answer: B
Computer Architecture and Organization
Answer: B
237.
A. (11100110)2
B. (10011000)2
C. (10011000)2
D. (01100110)2
Answer: A
Computer Architecture and Organization
Answer:
Computer Architecture and Organization
Answer: A
Computer Architecture and Organization
Answer: A
Computer Networks
Answer: D
Computer Networks
Answer: B
Computer Networks
Answer: B
Computer Networks
Answer: C
Computer Networks
Answer: B
Computer Networks
Answer: C
Computer Networks
Answer: B
Computer Networks
Answer: D
Computer Networks
Answer: C
Computer Networks
Answer: C
Computer Networks
Answer: B
Computer Networks
252. A logical network that consisits of two or more physical
networks?
A. Networking
B. Internetworking C. LAN
D. WAN
Answer: B
Computer Networks
Answer: D
Computer Networks
Answer: D
Computer Networks
Answer: C
Computer Networks
Answer: A
Computer Networks
Answer: C
Computer Networks
Answer: B
Computer Networks
Answer: D
Computer Networks
Answer: A
Computer Networks
Answer: A
Computer Networks
Answer: D
Computer Networks
263. In UNI total length of VPI + VCI is
A. 24 bits B. 22 bits C. 20 bits D. 26bits
Answer: A
Computer Networks
C. Class C D. ClassD
Answer: A
Computer Networks
Answer: C
Computer Networks
Answer: C
Computer Networks
267. Those port numbers are only used for the duration of a
single communication between client and server, so they are
indeed short-lived
A. Ephernal Port Numbers
B. Fixed Port Numbers
C. Well Known Port
Numbers D. DynamicPortNumbers
Answer: A
Computer Networks
Answer: B
Computer Networks
Answer: C
Computer Networks
Answer: software
Computer organization and design
Answer: Modem
Computer organization and design
Answer: RAID
Computer organization and design
Answer: 64K
Answer: b)2
Computer Programming and Problem Solving
286. #include<stdio.h> #include<conio.h> int main() { int
sum = 0; int i=1; while(i <= 20) { if((i%2) == 1) { ++i; continue;
} sum = sum + i; ++i; } printf("%d",sum); getch(); return 0; }
A. Sum of even numbers from 1 to 20 B. Sum of odd numbers from 1 to 20 C.
Sum of first 20 natural numbers
D. Error
Answer: b) a[0]=2,a[1]=1,a[2]=0,a[3]=0,
Computer Programming and Problem Solving
288. If S has got an ascii value 83 and s has an ascii value 115.
The strcmp function on these two strings
strcmp(“Sam”,”sam”) returns
A. -1
B. 1
C. 0
D. Error
Answer: -1
Computer Programming and Problem Solving
Answer: c) Computer
Computer Programming and Problem Solving
Answer: c)10 10
Computer Programming and Problem Solving
Answer: a)0
Computer Programming and Problem Solving
Answer: a)error
Computer Programming and Problem Solving
Answer: b)3
Computer Programming and Problem Solving
D. d)19
Answer: d)19
Computer Programming and Problem Solving
Answer: a)11
Computer Programming and Problem Solving
300. The _______ is the physical path over which a message
travels.
A. Protocol
B. Medium
C. Signal
D. Alltheabove
Answer: Medium
Data Communication
Answer: Message
Data Communication
Answer: Reliability
Data Communication
Answer: Security
Data Communication
304. Which topology requires a central controller or hub?
A. Mesh B. Star C. Bus D. Ring
Answer: Star
Data Communication
Answer: Bus
Data Communication
Answer: Simplex
Data Communication
Answer: Simplex
Data Communication
Answer: point-to-point
Data Communication
Answer: Multipoint
Data Communication
Answer: full-duplex
Data Communication
Answer: IMPs
Data Communication
Answer: ARPANET
Data Communication
Answer: FCC
Data Communication
Answer: Forums
Data Communication
A. 2d
B. 2d–1+1 C. 2d+1+1 D. 2d+1
Answer: a
Data Structures and Algorithm
Answer: b
Data Structures and Algorithm
Answer: a
Data Structures and Algorithm
Answer: a
Data Structures and Algorithm
Answer: b
Data Structures and Algorithm
Answer: a
Data Structures and Algorithm
Answer: d
Data Structures and Algorithm
Answer: b
Data Structures and Algorithm
323. A machine took 200 sec to sort 200 names, using bubble
sort. In 800secs, it can approximately sort how many names.
[Hint: No. of comparisons bubble sort makes for n items]
A. 800 aprox B. 600 aprox C. 500 aprox D. 400aprox
Answer: d
Data Structures and Algorithm
Answer: a
Answer: b
Data Structures and Algorithm
Answer: d
Data Structures and Algorithm
Answer: b
Data Structures and Algorithm
A. Inorder predecessor
Answer: d
Data Structures and Algorithm
Answer: c
Data Structures and Algorithm
Answer: A
Database Systems
Answer: B
Database Systems
Answer: D
Database Systems
Answer: B
Database Systems
Answer: A
Database Systems
Answer: A
Database Systems
Answer: C
Database Systems
Answer: A
Database Systems
Answer: C
Database Systems
Answer: A
Database Systems
Answer: D
Database Systems
342. In a relation
A. Ordering of rows is immaterial B. No two rows are identical
C. (A) and (B)
both are true
D. Noneofthese.
Answer: C
Database Systems
Answer: D
Database Systems
Answer: D
Database Systems
Answer: B
Database Systems
Answer: D
Database Management System
Answer: B
Database Management System
Answer: C
Database Management System
349. In case of entity integrity, the primary key may be
A. not Null
B. Null
C. both Null & not Null D. anyvalue
Answer: A
Database Management System
Answer: A
Database Management System
Answer: A
Database Management System
D. alloftheabove
Answer: A
Database Management System
Answer: A
Database Management System
354. Which are the two ways in which entities can participate
in a relationship?
A. Passive and active B. Total and partial
C. Simple and Complex D.
Alloftheabove
Answer: B
Database Management System
Answer: A
Database Management System
Answer: A
Database Management System
Answer: B
Database Management System
358. _________ is a virtual table that draws its data from the
result of an SQL SELECT statement
A. View
B. Synonym C. Sequence D. Transaction
Answer: A
Database Management System
Answer: A
Database Management System
Answer: C
Database Management System
Answer: Reflex
Database Systems
Answer: modify
Database Systems
Answer: multimedia
Database Systems
Database Systems
Answer: look-up
Database Systems
Answer: A
Digital Logic
Answer: D
Digital Logic
Answer: D
Digital Logic
D.
Answer: C
Digital Logic
Answer: A
Digital Logic
Answer: A
Digital Logic
Answer: C
Digital Logic
Answer: A
Digital Logic
Answer: B
Digital Logic
386. =
A. A (x-or) B (x-nor) C B. A (x-nor) B (x-nor) C C. A (x-nor) B (x-or) C D.
Alltheabove
Answer: B
Digital Logic
Answer: B
Digital Logic
Answer: C
Digital Logic
Answer: D
Digital Logic
Answer: A
Digital Logic
Answer: C
Digital Image Processing
392.
A. B. C. D.
Answer:
Digital Image Processing
Answer: A
Digital Image Processing
394.
A. B. C. D.
Answer:
Digital Image Processing
Answer: C
Digital Image Processing
396.
A. B.
C. D.
Answer:
Digital Image Processing
Answer: A
Digital Image Processing
398.
A. B. C. D.
Answer:
Digital Image Processing
Answer: D
Digital Image Processing
400.
A. B. C. D.
Answer:
Digital Image Processing
Answer: B
Digital Image Processing
402.
A. B. C. D.
Answer:
Digital Image Processing
404.
A. B. C. D.
Answer:
Digital Image Processing
Answer: B
Digital Image Processing
406.
A. B. C. D.
Answer:
Digital Image Processing
408.
A. B. C. D.
Answer:
Digital Image Processing
Answer: A
Digital Image Processing
410.
A. B. C. D.
Answer:
Digital Image Processing
412.
A. B. C. D.
Answer:
Digital Image Processing
Answer: D
Digital Image Processing
414.
A. B. C. D.
Answer:
Digital Image Processing
Answer: A
Digital Image Processing
416.
A. B. C. D.
Answer:
Digital Image Processing
Answer: C
Digital Image Processing
418.
A. B. C. D.
Answer:
Digital Image Processing
Answer: C
Digital Image Processing
Answer: B
Data warehousing and Data mining
Answer: A
Data warehousing and Data mining
Answer: B
Data warehousing and Data mining
Answer: B
Data warehousing and Data mining
Answer: B
Data warehousing and Data mining
Answer: C
Data warehousing and Data mining
Answer: A
Data warehousing and Data mining
Answer: C
Data warehousing and Data mining
Answer: A
Data warehousing and Data mining
430. Which of the following issue is considered before
investing in Data Mining?
A. Functionality
Answer: D
Data warehousing and Data mining
Answer: D
Data warehousing and Data mining
Answer: D
Data warehousing and Data mining
D. DWH
Answer: A
Data warehousing and Data mining
Answer: B
Data warehousing and Data mining
Answer: A
Data Structures and Algorithms
Answer: B
Data Structures and Algorithms
Answer: D
Data Structures and Algorithms
Answer: C
Data Structures and Algorithms
Answer: A
Data Structures and Algorithms
Answer: C
Data Structures and Algorithms
Answer: D
Data Structures and Algorithms
Answer: B
Data Structures and Algorithms
444. consider an undirected graph 'G' with 'n' vertices and 'e'
edges. What is the time taken by 'DFS' if the graph is
represented by adjacency matrix and adjacency list
A. O(n2),O(n) B. O(n2),O(e) C. O(e),O(n2) D. O(e+n),O(e)
Answer: B
Data Structures and Algorithms
Answer: B
Data Structures and Algorithms
A. 6,4
B. 6,4,5 C. 6,9 D. 2,3,9
Answer: D
Data Structures and Algorithms
Answer: D
Data Structures and Algorithms
Answer: B
Data Structures and Algorithms
449. A complete binary tree with the property that the value
each node is atleast as large as the values at its children is
called
A. Binary search tree
B. AVL tree
C. completely balanced tree D. Heap
Answer: D
Data Structures and Algorithms
Answer: (A)
Data Structures and alogrithm
451. the___________.
A. B. C. D.
Answer:
Data Structures and alogrithm
452.
A. B. C. D.
Answer:
Data Structures and alogrithm
453.
A. B. C. D.
Answer:
Data Structures and alogrithm
455.
A. B. C. D.
Answer:
Data Structures and alogrithm
456.
A. B. C. D.
Answer:
Data Structures and alogrithm
457.
A. B. C. D.
Answer:
Data Structures and alogrithm
Answer: (D)
Data Structures and alogrithm
459.
A. B. C. D.
Answer:
Data Structures and alogrithm
460.
A. B. C. D.
Answer:
Data Structures and alogrithm
Answer: ( C )
Data Structures and alogrithm
462.
A. B. C. D.
Answer:
Data Structures and alogrithm
463.
A. B. C. D.
Answer:
Data Structures and alogrithm
464.
A. B. C. D.
Answer:
Data Structures and alogrithm
Answer: (B)
Data Structures and alogrithm
Answer:
Answer:
Data Structures and alogrithm
Answer:
Data Structures and alogrithm
470.
A. B. C. D.
Answer:
Data Structures and alogrithm
471.
A. B. C. D.
Answer:
Data Structures and alogrithm
472.
A. B. C. D.
Answer:
Data Structures and alogrithm
Answer: (A)
Answer:
Data Structures and alogrithm
Answer:
Data Structures and alogrithm
476. queue = _______; L, M, N, ___, ___
A. B. C. D.
Answer:
Data Structures and alogrithm
Answer:
Data Structures and alogrithm
478.
A. B. C. D.
Answer:
Data Structures and alogrithm
479.
A. B. C. D.
Answer:
Data Structures and alogrithm
480.
A. B. C. D.
Answer:
Data Structures and alogrithm
481.
A. B. C. D.
Answer:
Data Structures and alogrithm
Answer: (A)
Data Structures and alogrithm
Answer:
Data Structures and alogrithm
484.
A. B. C. D.
Answer:
Data Structures and alogrithm
485.
A. B. C. D.
Answer:
Data Structures and alogrithm
486.
A. B. C. D.
Answer:
Data Structures and alogrithm
Answer: (D)
488.
A. B. C. D.
Answer:
Data Structures and alogrithm
489.
A. B. C. D.
Answer:
Data Structures and alogrithm
490.
A. B. C. D.
Answer:
Data Structures and alogrithm
491.
A. B. C. D.
Answer:
Data Structures and alogrithm
Answer: (C)
Data Structures and alogrithm
493. P = 4x3+3x2-15x+45 is
A. B. C. D.
Answer:
Data Structures and alogrithm
494.
A. B. C. D.
Answer:
495.
A. B. C. D.
Answer:
Data Structures and alogrithm
496.
A. B. C. D.
Answer:
Data Structures and alogrithm
Answer: Ans:C
Data Structures and alogrithm
C. D.
Answer:
Data Structures and alogrithm
499.
A. B. C. D.
Answer:
Data Structures and alogrithm
500.
A. B. C. D.
Answer:
Data Structures and alogrithm
501.
A. B. C. D.
Answer:
Answer: Ans:C
Data Structures and alogrithm
503.
A. B. C. D.
Answer:
Data Structures and alogrithm
504.
A. B. C. D.
Answer:
Data Structures and alogrithm
505.
A. B.
C. D.
Answer:
Data Structures and alogrithm
Answer: Ans:A
Data Structures and alogrithm
507.
A. B. C. D.
Answer:
Data Structures and alogrithm
508.
A. B. C. D.
Answer:
509.
A. B. C. D.
Answer:
Data Structures and alogrithm
Answer: Ans:D
Data Structures and alogrithm
Answer:
Data Structures and alogrithm
512.
A. B. C. D.
Answer:
Data Structures and alogrithm
513.
A. B. C. D.
Answer:
Data Structures and alogrithm
514.
A. B. C. D.
Answer:
Data Structures and alogrithm
Answer: Ans:B
Data Structures and alogrithm
516. A K gives
A. B. C. D.
Answer:
Data Structures and alogrithm
517.
A. B. C. D.
Answer:
Data Structures and alogrithm
518.
A. B. C. D.
Answer:
Data Structures and alogrithm
519.
A. B. C. D.
Answer:
Data Structures and alogrithm
Answer: Ans:A
Data Structures and alogrithm
Answer:
Data Structures and alogrithm
Answer: b
Programming Fundamentals
Answer: d
Programming Fundamentals
Answer: b
Programming Fundamentals
Answer: c
Programming Fundamentals
526. 5.What is the fuctionality of push_back
A. make the object to attain original value B. Decrease the value by 1
C.
Increase the value by one
D. Deleteanitem.
Answer: c
Programming Fundamentals
Answer: c
Programming Fundamentals
Answer: TRUE
Programming Fundamentals
D. partofthelanguagefordescribinggrammars.
Answer: b
Programming Fundamentals
Answer: d
Programming Fundamentals
Answer: c
Programming Fundamentals
Answer: c
Programming Fundamentals
Answer: d
Programming Fundamentals
Answer: c
Programming Fundamentals
Answer: b
Programming Fundamentals
Answer: FALSE
Programming Fundamentals
Answer: a,d
Human Computer Interaction
D. D.agroupofusabilityexpertsreviewsauserinterfaceaccordingtoasmallseto
fgeneral
principles.
Answer: d
Human Computer Interaction
Answer: a,c
Answer: a,b,d
Human Computer Interaction
Answer: b,c,d
Human Computer Interaction
Answer: d
Human Computer Interaction
D. requiresafullyfunctionalprototype.
Answer: b
Human Computer Interaction
Answer: b
Human Computer Interaction
Answer: d
Human Computer Interaction
Answer: c
Answer: d
Human Computer Interaction
Answer: c
Human Computer Interaction
Answer: d
Human Computer Interaction
Answer: d
Human Computer Interaction
551. You drag a folder to make a copy of its contents. An
animation appears on the screen, showing files moving from
one folder to another. This is an example of which of the
following
A. (a) visibility
B. (b) mapping
C. (c) an affordance D. (d)feedback
Answer: d
Human Computer Interaction
Answer: d
Human Computer Interaction
Answer: b
Human Computer Interaction
Answer: d
Human Computer Interaction
Answer: d
Human Computer Interaction
Answer: b/c
Human Computer Interaction
D. Alloftheabovestatementsaretrue.
Answer: c
Human Computer Interaction
Answer: d
Human Computer Interaction
D. Alloftheabovemakeuseofquasi-modes.
Answer: b
Answer: d
Human Computer Interaction
Answer: a
Human Computer Interaction
Answer: a
Human Computer Interaction
Answer: a&d
Human Computer Interaction
Answer: a,c,d
Human Computer Interaction
Answer: b,d
Human Computer Interaction
Answer: a,c
Human Computer Interaction
Answer: malware
Information Security
Answer: IP spoofing
Information Security
570. A hacker that changes or forges information in an
electronic resource, is engaging in __________.
A. denial of service B. sniffing
C. terrorism
D. datadiddling
Answer: Session
Information Security
572. Which of the following will not protect you from spam?
A. spam blockers B. e-mail rules
C. popup blocker D. filters
Answer: spoofing
Information Security
Answer: Prohibition
Information Security
Answer: Macro-virus
Information Security
Answer: RAID
Information Security
581. Which of the following is capable of altering its form in
order to avoid discovery by certain virus detection programs?
A. Trojan
B. Stealth virus.
C. Polymorphic virus D. Logicbomb
Answer: restore
Information Security
Answer: A
Internet and Web Programming
Answer: B
Internet and Web Programming
Answer: A
Internet and Web Programming
586. In CSS, you have the following options for changing line-
height?
A. number, length, %
B. normal, number, length, % C. normal, number,
length
D. numberandlengthonly
Answer: B
Internet and Web Programming
Answer: B
Internet and Web Programming
Answer: C
Internet and Web Programming
Answer: C
Internet and Web Programming
B. substr() takes three arguments, substring() only two
C. Only one accepts a
desired string length as an argument D. Besidesthespelling,nothing
Answer: C
Internet and Web Programming
Answer: B
Internet and Web Programming
Answer: C
Internet and Web Programming
Answer: C
594. A script is a
A. Program or sequence of instructions that is interpreted or carried out by
processor directly
D. Noneofabove
Answer: B
Internet and Web Programming
Answer: B
Internet and Web Programming
Answer: C
Internet and Web Programming
Answer: C
Internet and Web Programming
598. How do you display a border like this? The top border =
10 pixels The bottom border = 5 pixels The left border = 20
pixels The right border = 1pixel
A. border-width: 10px 1px 5px 20px B. border-width: 10px 5px 20px 1px C.
border-width: 5px 20px 10px 1px D. border-width:10px20px5px1px
Answer: A
Internet and Web Programming
Answer: D
Internet and Web Programming
Answer: B
Internet and Web Programming
601. There are many ____ images that exist on the Web that
you can freely use on your Web sites.
A. public-domain B. commercial C. registered
D. copyrighted
Answer: A
Internet and Web Programming
Answer: C
Internet and Web Programming
Answer: B
Internet and Web Programming
Answer: C
Internet and Web Programming
605. Which of the following is NOT a type of popup box ?
A. Alert
B. Confirm C. Radio D. Text
Answer: D
Internet and Web Programming
Answer: B
Answer: B
Internet and Web Programming
Answer: B
Internet and Web Programming
609. How do you get information from a form that is
submitted using the "get" method?
A. Request.QueryString; B. $_GET[];
C. Request.Form;
D. $_POST[];
Answer: B
Internet and Web Programming
Answer: A
Internet and Web Programming
Answer: B
Internet and Web Programming
Answer: C
Internet and Web Programming
Answer: action
614. In CSS, How do you make a list that list that lists its
items with squares
A. type: square
B. list-style-type: square C. list-type:square
D. style-
list:square
615.
A. B. C. D.
Answer:
Internet and Web Programming
616.
A. B. C. D.
Answer:
Internet and Web Programming
617. What is the correct CSS syntax for making all the <p>
elements bold
Answer: p{font-weight:bold}
Internet and Web Programming
Answer: a {text-decoration:none}
Internet and Web Programming
Answer: bye
Internet and Web Programming
620.
A. B. C. D.
Answer:
Internet and Web Programming
621.
A. B. C. D.
Answer:
Internet and Web Programming
622.
A. B. C. D.
Answer:
Internet and Web Programming
623.
A. B. C. D.
Answer:
Internet and Web Programming
624. A variable $word is set to “WELCOME TO VIT”, which of
the following php script returns in title
case________________
A. echo ucwords($word)
B. echo ucwords(strtolower($word)) C. echo
ucfirst($word)
D. echoucfirst(strtolower($word))
Answer: 23
Internet and Web Programming
626.
A. B. C. D.
Answer:
Internet and Web Programming
627.
A. B. C.
D.
Answer:
Internet and Web Programming
628.
A. B. C. D.
Answer:
Internet and Web Programming
Answer: post
Internet and Web Programming
630.
A. B. C. D.
Answer:
632.
A. B. C. D.
Answer:
Internet and Web Programming
Answer: $_ask
Internet and Web Programming
Answer: 1, 4, 2, 3, 5
Internet and Web Programming
637.
A. B. C. D.
Answer:
Internet and Web Programming
638.
A. B. C. D.
Answer:
Internet and Web Programming
639.
A. B. C. D.
Answer:
Internet and Web Programming
642.
A. B. C. D.
Answer:
Internet and Web Programming
643.
A. B. C. D.
Answer:
Internet and Web Programming
D. 05D2Fh
Answer: a
Microprocessor and Interfacing
645.
A. B. C. D.
Answer:
Microprocessor and Interfacing
Answer: c
Microprocessor and Interfacing
647.
A. B. C. D.
Answer:
648.
A. B. C. D.
Answer:
Microprocessor and Interfacing
649. (3) Compute the average memory access time from the
following information:
A. B. C. D.
Answer:
Microprocessor and Interfacing
650. RAM access time = 80ns / cache access time =10ns / hit
ratio = 0.92
A. 122ns
C. 21ns
D. 0.92*80ns
Answer: b
Microprocessor and Interfacing
651.
A. B. C. D.
Answer:
Microprocessor and Interfacing
652.
A. B. C. D.
Answer:
Microprocessor and Interfacing
Answer:
Microprocessor and Interfacing
654.
A. Relative
B. Based indexed C. Immediate
D. register
Answer: b
Microprocessor and Interfacing
655.
A. B. C. D.
Answer:
Microprocessor and Interfacing
Answer: a
Microprocessor and Interfacing
657.
A. B. C. D.
Answer:
Microprocessor and Interfacing
658.
A. B. C. D.
Answer:
Microprocessor and Interfacing
Answer: b
Microprocessor and Interfacing
660.
A. B. C. D.
Answer:
Microprocessor and Interfacing
661. (7) How many times does the NOP instruction execute in
the following sequence?
A. B. C.
D.
Answer:
Microprocessor and Interfacing
662.
A. B. C. D.
Answer:
Microprocessor and Interfacing
663.
A. B. C. D.
Answer:
Microprocessor and Interfacing
Answer: a
Answer:
Microprocessor and Interfacing
Answer:
Microprocessor and Interfacing
Answer:
Microprocessor and Interfacing
Answer:
Microprocessor and Interfacing
669. POP CX
A. B. C. D.
Answer:
Microprocessor and Interfacing
Answer:
Microprocessor and Interfacing
671.
A. B. C. D.
Answer:
Microprocessor and Interfacing
672. (8) Which interrupt is recognized first? NMI or single
step?
A. NMI
B. Single Step
C. D.
Answer: a
Microprocessor and Interfacing
673.
A. B. C. D.
Answer:
Microprocessor and Interfacing
674.
A. 20and16 B. 16and22 C. 16and20 D. 12and21
Answer: a
Microprocessor and Interfacing
676.
A. B. C. D.
Answer:
Microprocessor and Interfacing
Answer: d
Microprocessor and Interfacing
678.
A. B. C. D.
Answer:
Microprocessor and Interfacing
679.
A. B. C. D.
Answer:
Microprocessor and Interfacing
680. (11) What interrupts are disabled by writing 10100001
into OCW1?
A. IR7,IR5,IR0 B. IR6andIR4 C. IR1
D. IR2
Answer: a
Microprocessor and Interfacing
681.
A. B. C. D.
Answer:
Microprocessor and Interfacing
682.
A. B. C. D.
Answer:
Microprocessor and Interfacing
Answer:
Microprocessor and Interfacing
684.
A. B. C. D.
Answer:
Microprocessor and Interfacing
685.
A. B. C. D.
Answer:
Answer: a
Microprocessor and Interfacing
Answer:
Microprocessor and Interfacing
Answer:
Microprocessor and Interfacing
Answer:
Microprocessor and Interfacing
691.
A. B. C. D.
Answer:
Microprocessor and Interfacing
692.
A. B. C. D.
Answer:
Microprocessor and Interfacing
693.
A. B. C. D.
Answer:
Microprocessor and Interfacing
Answer: b
Microprocessor and Interfacing
695.
A. B. C. D.
Answer:
Microprocessor and Interfacing
696.
A. B. C. D.
Answer:
Microprocessor and Interfacing
697. (14) After the following sequence of operations contents
of AX is --- ------------
A. B. C. D.
Answer:
Microprocessor and Interfacing
Answer:
Microprocessor and Interfacing
Answer: c
Answer:
Microprocessor and Interfacing
701. POP BX
A. B. C. D.
Answer:
Microprocessor and Interfacing
702. POP AX
A. B. C. D.
Answer:
Microprocessor and Interfacing
Answer:
Microprocessor and Interfacing
704.
A. B. C. D.
Answer:
Microprocessor and Interfacing
705.
A. B. C. D.
Answer:
Microprocessor and Interfacing
706. (15) The following sequence of instructions is used to
compute ----- -------------
A. B. C. D.
Answer:
707. PUSH X
A. B. C. D.
Answer:
Microprocessor and Interfacing
708. PUSH Y
A. X-Y B. Y-X C. Y-AX D. X-BX
Answer: b
Microprocessor and Interfacing
709. POP AX
A. B. C. D.
Answer:
Microprocessor and Interfacing
C. 15 D. 64
Answer: D
Microprocessor and Interfacing
711.
A. B. C. D.
Answer:
Microprocessor and Interfacing
712.
A. B. C. D.
Answer:
Microprocessor and Interfacing
713.
A. B. C. D.
Answer:
Answer: A
Microprocessor and Interfacing
715.
A. B. C. D.
Answer:
Microprocessor and Interfacing
716.
A. B. C. D.
Answer:
Microprocessor and Interfacing
717.
A. B. C. D.
Answer:
Microprocessor and Interfacing
Answer: B
Microprocessor and Interfacing
Answer: B
Microprocessor and Interfacing
Answer: C
Microprocessor and Interfacing
Answer: D
Microprocessor and Interfacing
722. Given that the bl register contains ‘B’, the effect of the
following instruction or bl, 0010 0000 is to
A. clear bl
B. store ‘b’ in bl
C. store 0010 0000 in bl D. leaveblunchanged
Answer: D
Microprocessor and Interfacing
A. near
Answer: A
Microprocessor and Interfacing
724. Number of the times the instruction sequence below will
loop before coming out of loop is MOV AL, 00h A1: INC AL
JNZ A1
A. 0 B. 1 C. 255 D. 256
Answer: D
Microprocessor and Interfacing
Answer: A
Microprocessor and Interfacing
Answer: C
Microprocessor and Interfacing
Answer: C
Microprocessor and Interfacing
728. Which pins are general purpose I/O pins during mode-2
operation of the 82C55?
A. PA0–PA7 B. PB0-PB7 C. PC3-PC7 D. PC0-PC2
Answer: A
Microprocessor and Interfacing
Answer: A
Microprocessor and Interfacing
Answer: D
Microprocessor and Interfacing
C. D. Poisondistribution
Answer: 20
Modelling and Simulation
Answer: 0.65
Answer: Loader
Operating Systems
Operating Systems
Answer: Diskcopy
Operating Systems
755. What is the state of processor, when a process is waiting
for some event to occur?
A. Ready State B. Blocked State C. Active State D. RunningState
Answer: Dmesg
Operating Systems
Answer: /var/log/lastlog
Operating Systems
Answer: /var/log/utmp
Operating Systems
D. none
Answer: working-set
Operating Systems
Answer: D
Programming Fundamentals
Answer: D
Programming Fundamentals
Answer: A
Programming Fundamentals
Answer: A
Programming Fundamentals
Answer: D
Programming Fundamentals
Answer: D
Programming Fundamentals
Answer: D
Programming Fundamentals
Answer: B
Programming Fundamentals
D. Allofabove
Answer: D
Programming Fundamentals
Answer: B
Programming Fundamentals
Answer: C
Programming Fundamentals
Answer: D
Programming Fundamentals
Answer: B
Programming Fundamentals
Answer: D
Programming Fundamentals
776. The automated tool used for lexical analysis phase (a)
LEX (b) FLEX (c ) BISON (d) YACC
A. (a) and (b) B. (b)and(c) C. (a) and (d) D. (c)and(d)
Answer: A
Programming Language Translators
777. For the given grammar S--> uBDz B--> Bv | w D-->EF E-->
y | E--> x | the FOLLOW(B) is
A. {v,x,y,z} B. {x,y,z} C. {x,y}
D. {y,z}
Answer: A
Programming Language Translators
Answer: C
Programming Language Translators
Answer: A
Programming Language Translators
Answer: A
Programming Language Translators
Answer: C
Programming Language Translators
B. FALSE
C. D.
Answer: B
Programming Language Translators
Answer: D
Programming Language Translators
Answer: C
Programming Language Translators
Answer: C
Answer: A
Programming Language Translators
Answer: A
Programming Language Translators
B. inherited
C. skewed
D.
Answer: A
Programming Language Translators
Answer: A
Programming Language Translators
Answer: D
Programming Language Translators
Answer: Choice D
Hardware/Software Codesign
Answer: Choice B
Hardware/Software Codesign
Answer: Choice A
Hardware/Software Codesign
Answer: Choice D
Hardware/Software Codesign
Answer: Choice D
Hardware/Software Codesign
Answer: Choice B
Hardware/Software Codesign
Answer: Choice D
Hardware/Software Codesign
D. Softwareinterrupt.
Answer: Choice C
Hardware/Software Codesign
800. 10.The ASCII code for letter A is
A. 1100011 B. 1000001 C. 1111111 D. 10011
Answer: Choice B
Hardware/Software Codesign
Answer: Choice C
Hardware/Software Codesign
Answer: Choice D
Hardware/Software Codesign
Answer: Choice B
Hardware/Software Codesign
Answer: Choice C
Hardware/Software Codesign
Answer: Choice A
Hardware/Software Codesign
Answer: Choice A
Software Practice and Testing
Answer: A, C and D
Software Practice and Testing
Answer: D, A, C,B
Software Practice and Testing
Answer: Choice D
Software Practice and Testing
Answer:
Software Practice and Testing
811. it on to Speed 1, second press to Speed 2 and the third
press turns it off.
A. B. C. D.
Answer:
Software Practice and Testing
812.
A. B. C. D.
Answer:
Software Practice and Testing
813.
A. B. C. D.
Answer:
Software Practice and Testing
814.
A. B. C. D.
Answer:
Software Practice and Testing
815.
A. B. C. D.
Answer:
Software Practice and Testing
816.
A. B. C. D.
Answer:
Software Practice and Testing
817.
A. B. C. D.
Answer:
Software Practice and Testing
818.
A. B. C. D.
Answer:
Software Practice and Testing
819.
A. B. C. D.
Answer:
Software Practice and Testing
820.
A. B. C. D.
Answer:
Software Practice and Testing
821.
A. B. C. D.
Answer:
Software Practice and Testing
Answer: Choice A
Software Practice and Testing
Answer: Choice A
Software Practice and Testing
Answer: choice D
Software Practice and Testing
825.
A. B. C. D.
Answer:
Software Practice and Testing
Answer: Choice D
Answer: Choice B
Software Practice and Testing
Answer:
Software Practice and Testing
Answer:
Software Practice and Testing
Answer:
Software Practice and Testing
833. 11. A Person who documents all the issues, problems and
open points that were identified during a forfal review
A. Moderator B. Author
C. Scriber
D. Manager
Answer: Choice C
Answer: Choice A
Software Practice and Testing
Answer: Choice B
Software Practice and Testing
D.
Answer:
Software Practice and Testing
Answer: Choice B
Software Practice and Testing
839.
A. criteria specified in test planning B. test execution
C. are needed
D.
reportforstakeholders
Answer:
Software Practice and Testing
Computer Networks
Answer: ARPANET
Computer Networks
Answer: TCP/IP
Computer Networks
Answer: LAN
Computer Networks
Answer: Modem
Computer Networks
Answer: ITU-T
Computer Networks
Answer: Semantics
Computer Networks
Answer: Assembly
Bioinformatics
Answer: Homology
Bioinformatics
Answer: HL7
Bioinformatics
Answer: LVG
Bioinformatics
A. Opthalmology
Answer: 135, 54
Bioinformatics
Answer: W
Bioinformatics
Answer: Telemedicine
Bioinformatics
Answer: C
EMBEDDED SYSTEMS
Answer: C
EMBEDDED SYSTEMS
Answer: D
EMBEDDED SYSTEMS
Answer: A
EMBEDDED SYSTEMS
Answer: C
EMBEDDED SYSTEMS
Answer: A
EMBEDDED SYSTEMS
873. A--------is a strategy for determining when to perform
certain power management operations.
A. Predictive shutdown
B. Power management policy C. Scheduling
Policies
D. Noneofthese
Answer: B
EMBEDDED SYSTEMS
Answer: C
EMBEDDED SYSTEMS
Answer: D
EMBEDDED SYSTEMS
Answer: A
EMBEDDED SYSTEMS
Answer: B
EMBEDDED SYSTEMS
Answer: A
EMBEDDED SYSTEMS
Answer: D
EMBEDDED SYSTEMS
880. Main components of an embedded system are
A. Hardware
B. Main application software C. RTOS
D. AlltheAbove
Answer: D
EMBEDDED SYSTEMS
Answer: D
EMBEDDED SYSTEMS
Answer: D
EMBEDDED SYSTEMS
Answer: D
EMBEDDED SYSTEMS
884. Examples for small scale embedded systems.
A. Washing or cooking system B. Router, a hub and a gateway C.
Entertainment systems
D. Signaltrackingsystems
Answer: A
EMBEDDED SYSTEMS
Answer: B
EMBEDDED SYSTEMS
Answer: C
EMBEDDED SYSTEMS
Answer: D
EMBEDDED SYSTEMS
888. CPCI stands for
Answer: A
EMBEDDED SYSTEMS
Answer: D
EMBEDDED SYSTEMS
Answer: D
EMBEDDED SYSTEMS
Answer: A
EMBEDDED SYSTEMS
Answer: B
EMBEDDED SYSTEMS
Answer: C
EMBEDDED SYSTEMS
Answer: A
EMBEDDED SYSTEMS
Answer: B
The Object Oriented Paradigm
Answer: C
The Object Oriented Paradigm
Answer: D
The Object Oriented Paradigm
Answer: C
The Object Oriented Paradigm
Answer: D
The Object Oriented Paradigm
Answer: A
Answer: B
The Object Oriented Paradigm
B. All lines beginning with two slash signs are considered comments.
D. Allthethree
Answer: B
The Object Oriented Paradigm
Answer: C
The Object Oriented Paradigm
Answer: A
The Object Oriented Paradigm
906. There is a unique function in C++ program by where all
C++ programs start their execution
A. Start( ) B. Begin( ) C. Main( ) D. Output()
Answer: C
The Object Oriented Paradigm
Answer: D
The Object Oriented Paradigm
Answer: D
Answer: C
The Object Oriented Paradigm
910. Finite automata recognizes --------grammars
A. type-1 B. type-2 C. type-3 D. type-0
Answer: type-3
Theory of Computation
Answer: 15 states
Theory of Computation
Answer: n+2
Theory of Computation
Answer:
{a(cd)^na|n>=0}U{a(cd)^nb|n>=0}U{b(cd)^na|n>=0
}U{b(cd)^nb|n>=0}
Theory of Computation
D. 0*1*01
Answer: 0*(10+1)*
Theory of Computation
Answer: parser
Theory of Computation
917. consider a language L for which there exists a Turing
machine T, that accepts every word in L and either rejects or
loops for every word that is not in L. The language L is
A. NP hard
B. NP Complete
C. recursive
D. recursivelyenumerable
Theory of Computation
Answer: complementation
Theory of Computation
Answer: 14
Theory of Computation
A. 3 B. 5 C. 9 D. 8
Answer: 9
Theory of Computation
Answer: {(ab,abb),(ba,aaa),(aa,a)
Theory of Computation
B. p-1
C. logp
D.
Answer: A
Parallel Algorithms
B. Spatial
C. None
D.
Answer: A
Parallel Algorithms
B. Output Dependency
C. Anti Dependency
D.
Answer: C
Parallel Algorithms
B. 40
C. 40.09
D.
Answer: B
Parallel Algorithms
B. Static Network
C. Hypercube
D.
Answer: A
Parallel Algorithms
B. Bus
C. Crossbar
D.
Answer: C
Parallel Algorithms
B. Ø(n)
C. Ø(log n)
D.
Answer: A
Parallel Algorithms
C. both A&B D.
Answer: A
Parallel Algorithms
Answer: A
Parallel Algorithms
B. 4
C. 1
D.
Answer: A
Parallel Algorithms
B. Ø(dN)
C. Ø(d(N+1))
D.
Answer: A
Parallel Algorithms
B. KxJ
C. IxK
D.
Answer: C
Parallel Algorithms
B. 4
C. 6
D.
Answer: B
Parallel Algorithms
B. Network Topology
C. Load Sharing
D.
Answer: C
Parallel Algorithms
B. omp_get_maxthreads()
C. omp_get_threadid()
D.
Answer: A
Parallel Algorithms
Answer: D
Software Engineerring
941. What are all the possible risks could be occur in software
development.
A. People ,Product, Technical B. Product, Process, Technical C. Process,
Design, Technical D. Noneoftheabove
Answer: A
Software Engineerring
D. noneoftheabove
Answer: A
Software Engineerring
Answer: A
Software Engineerring
Answer: D
Software Engineerring
Answer: B
Software Engineerring
Answer: C
Software Engineerring
Answer: B
Software Engineerring
Answer: A
Software Engineerring
950. _____________ is composed of data structures and /or
data elements.
A. Data flow
B. Data element C. Data structure D. DataDictionary
Answer: A
Software Engineerring
Answer: C
Software Engineerring
A. a ,d,b,c
Answer: C
Software Engineerring
Answer: B
Software Engineerring
Answer: D
Software Engineerring
Answer: b
Operating Systems
Answer: b
Operating Systems
Answer: b
Operating Systems
A. bypassing storage
Answer: c
Operating Systems
960. Before the jobs are brought to the RAM, they are stored
in
A. cache
B. RAM pool
C. secondary disk D. jobpoolindisk
Answer: d
Operating Systems
Answer: b
Operating Systems
Answer: c
Operating Systems
Answer: b
Operating Systems
A. UI
Answer: a
Operating Systems
Answer: c
Operating Systems
Answer: a
Operating Systems
Operating Systems
Answer: c
Operating Systems
Answer: B
Algorithm Design and Analysis
Answer: D
Algorithm Design and Analysis
973. In a partial derivation tree, every leaf has a label from
A. the set of terminals and lambda
B. the set of nonterminals, terminals and
lambda C. the set of nonterminals and lambda
D. noneoftheabove
Answer: B
Algorithm Design and Analysis
Answer: B
Algorithm Design and Analysis
Answer: B
Algorithm Design and Analysis
Answer: A
Algorithm Design and Analysis
Answer: C
Algorithm Design and Analysis
Answer: A
Algorithm Design and Analysis
Answer: A
Algorithm Design and Analysis
Answer: D
Algorithm Design and Analysis
983. Let us say that for a given problem all four types of
randomized algorithm can be applied. Which one is the most
reliable?
A. Numerical algorithm B. Monte-Carlo algorithm C. Las Vegas algorithm D.
Sherwoodalgorithm
Answer: D
Algorithm Design and Analysis
984. If two line segments, P1P2, P3P4 are there, and only
endpoint P3 is on the line segment P1P2, then which is true ?
A. cross product of P1P3 and P1P4 will give opposite signs B. cross product of
P1P3 and P1P4 will give different signs C. the boundary box for each line
segment may not overlap D. noneoftheabove
Answer: B
Algorithm Design and Analysis
Answer: C
Algorithm Design and Analysis
A. Quality
B. Q,u,a,l,i,t,y,P,o,i,n,t,T,e,c,h,n,o,l,o,g,i,e,s C.
Qualiyt,Point,Technologies
D. QualityPointTechnologies
Answer: c
Scripting Languages
Answer: a
Scripting Languages
Answer: a
Scripting Languages
Answer: c
Scripting Languages
Answer: c
Scripting Languages
Answer: a
Scripting Languages
Answer: c
Scripting Languages
Answer: d
Scripting Languages
Answer: b
Scripting Languages
Answer: a
Scripting Languages
D. None
Answer: b
Scripting Languages
Answer: b
Scripting Languages
Answer: d
Scripting Languages
Answer: a
Scripting Languages
Answer: b
Scripting Languages
Answer: A,B,D
Soft Computing
Answer: ART
Soft Computing
Answer: Perceptron
Soft Computing
Answer: A,B,C
Soft Computing
D. alltheabove
Answer: A
Soft Computing
Answer: C
Soft Computing
Answer: B
Soft Computing
Answer: D
Soft Computing
Answer: A
Soft Computing
B. Yes
C. D.
Answer: B
Soft Computing
D. >=0and<1
Answer: D
Soft Computing
Answer: C
Soft Computing
Answer: c
Software Engineering
Answer: d
Software Engineering
A. will likely drop later in the project as kinks are worked out. B. will remain the
same.
C. will likely increase as the project progresses .
D.
cannotbepredictedatthispoint.
Answer: c
Software Engineering
1020. During a software development project two similar
requirements defects were detected. One was detected in
the requirements phase, and the other during the
implementation phase. Which of the following statements is
mostly likely to be true?
A. The most expensive defect to correct is the one detected during the
requirements phase.
B. The most expensive defect to correct is the one detected during the
implementation
phase.
D. Thereisnorelationshipbetweenthephaseinwhichadefectisdiscoveredandi
tsrepair
cost. .
Answer: b
Software Engineering
Answer: a
Software Engineering
1022. Which of the following do NOT affect the accuracy of
the reliability estimate during statistical testing? I. The
validity of the usage profile. II. The number of test cases
executed. III. The programming language used to implement
the code. IV. The cyclomatic complexity of the code.
A. I and II only. B. II and III only. C. III and IV only. D. IandIIIonly.
Answer: c
Software Engineering
Answer: c
Software Engineering
Answer: c
Software Engineering
Answer: c
Software Engineering
Answer: c
Software Engineering
D. asoftwareprojectmanagementtechniquefordistributingtestresponsibilit
ywithina project
Answer: b
Software Engineering
Answer: b
Software Engineering
Answer: a
Software Engineering
Answer: d
Software Engineering
Answer: d
Software Engineering
Answer: A
Database Design
Answer: B
Database Design
Answer: C
Database Design
Answer: B
Database Design
Answer: B
Database Design
1038. If no multivalued attributes exist in a relation, then the
relation is in what normal form?
A. First normal form
B. Second normal form C. Third normal form D.
Fourthnormalform
Answer: A
Database Design
Answer: B
Database Design
Answer: A
Database Design
Answer: C
Database Design
Answer: D
Database Design
Answer: A
Database Design
Answer: A
Database Design
Answer: A
Database Design
C. Sites may not be aware of each other and may provide only limited
facilities for
cooperation in transaction processing
D. Allsiteshaveidenticalsoftware
Answer: D
DataBase Design
Answer: A
DataBase Design
Answer: B
DataBase Design
D. Maximizethetotalcostoftimerequiredtoexecuteaquery.
Answer: D
DataBase Design
Answer: A
DataBase Design
Answer: C
DataBase Design
Answer: A
DataBase Design
D. alltheabove
Answer: D
DataBase Design
Answer: D
DataBase Design
Answer: A
DataBase Design
Answer: A
DataBase Design
Answer: B
DataBase Design
Answer: C
DataBase Design
1060. Place Update Recovery Information is
A. Necessary to store info about database state changes, inorder to
recover back.
B. Every time an update is made, the old stable storage page, called
shadow page is left
intact and a new page with the updated data item
values is written into the stable
database.
C. Makes sense to permit the operation of the partition that contains the
primary site, since it
manages the lock.
D. Incaseofnonreplicateddatabases,thisinvolvestheintegrationofthevoting
principle
with commit protocols.
Answer: A
DataBase Design
B. Index does not contains the references to all the component objects of a
composite
object
D. theobjecttowhichitisapplied,andtheargumentsareallco-located.
Answer: A
DataBase Design
1062. Removal of left recursion is necessary because
A. it cacuses recursive decent parser to loop forever B. it generates an
ambiguous grammar
C. botha&b
D. noneofthese
Answer: a
Programming Language Translators
Answer: c
Programming Language Translators
Answer: a
Programming Language Translators
Answer: c
Programming Language Translators
D. S'→ε Answer: d
Programming Language Translators
Answer: a
Programming Language Translators
Answer: d
Programming Language Translators
Answer: c
Programming Language Translators
Answer: d
Programming Language Translators
Answer: c
Programming Language Translators
Answer: d
Programming Language Translators
Answer: b
Programming Language Translators
Answer: d
Programming Language Translators
Answer: c
Programming Language Translators
Answer: c
Programming Language Translators
Answer: C
Coputer programming and problem solving
1078. #include<stdio.h>
A. B. C. D.
Answer:
Coputer programming and problem solving
Answer:
Coputer programming and problem solving
Answer:
Coputer programming and problem solving
Answer:
Coputer programming and problem solving
Answer:
Coputer programming and problem solving
Answer:
Coputer programming and problem solving
1084.
A. B. C. D.
Answer:
Coputer programming and problem solving
Answer:
Coputer programming and problem solving
1086. x+=2;
A. B. C. D.
Answer:
Coputer programming and problem solving
1087. y+=3;}
A.
B. C. D.
Answer:
Coputer programming and problem solving
1088.
A. B. C. D.
Answer:
Coputer programming and problem solving
Answer: A
Coputer programming and problem solving
1091. int j;
A. B. C. D.
Answer:
Coputer programming and problem solving
1092. for(j=0;j<6;j++)
A. B. C. D.
Answer:
Coputer programming and problem solving
1093. cout<<a[j];
A. B. C. D.
Answer:
Coputer programming and problem solving
1094.
A.
B. C. D.
Answer:
Coputer programming and problem solving
Answer: C
Coputer programming and problem solving
Answer:
Coputer programming and problem solving
1097. cout<<sizeof(ch)<<endl;
A. B. C. D.
Answer:
1098.
A. B. C. D.
Answer:
Coputer programming and problem solving
1099. Binary Search algorithm cannot be applied to
A. Sorted linked list B. Sorted binary trees C. Sorted linear array D.
Pointerarray
Answer: A
Coputer programming and problem solving
1100.
A. B. C. D.
Answer:
Coputer programming and problem solving
B. P points to the address of first element in Data C. P can store only memory
addresses
D. PcontainDataandaddressofData
Answer: A
Coputer programming and problem solving
1102.
A. B. C. D.
Answer:
Coputer programming and problem solving
1103. Syntax of the programming language is
A. the form of its expressions, statements and program units
B. meaning of
those statements, expressions and program units C. Bothaandb
D.
Neitheranorb
Answer: A
Coputer programming and problem solving
1104.
A. B. C. D.
Answer:
1105.
A. B. C. D.
Answer:
Coputer programming and problem solving
Answer: D
Coputer programming and problem solving
Answer:
Coputer programming and problem solving
1108. printf("%d,%d,%d,%d",b,a++,a,++a);
A.
B. C. D.
Answer:
Coputer programming and problem solving
1109.
A. B. C. D.
Answer:
Coputer programming and problem solving
Answer:
Coputer programming and problem solving
1111.
A. B. C. D.
Answer:
Answer: D
Coputer programming and problem solving
1113.
A. B. C. D.
Answer:
Coputer programming and problem solving
1114.
A. B. C. D.
Answer:
Coputer programming and problem solving
1115. Code:
A. z=1.00
B. z=0.00 C. z=2.00 D. z=1.50
Answer: A
Coputer programming and problem solving
1116.
A. B. C. D.
Answer:
Coputer programming and problem solving
1117. int i = 4;
A. B. C. D.
Answer:
Coputer programming and problem solving
1118. int x = 6;
A. B. C. D.
Answer:
1119. double z;
A. B. C. D.
Answer:
Coputer programming and problem solving
1120. z = x / i;
A. B. C. D.
Answer:
Coputer programming and problem solving
Answer:
Coputer programming and problem solving
1122.
A.
B. C. D.
Answer:
Coputer programming and problem solving
Answer:
Coputer programming and problem solving
1124.
A. B. C. D.
Answer:
Coputer programming and problem solving
Answer: C
1126.
A. B. C. D.
Answer:
Coputer programming and problem solving
Answer: C
Coputer programming and problem solving
1128.
A. B. C. D.
Answer:
Coputer programming and problem solving
1129.
A.
B. C. D.
Answer:
Coputer programming and problem solving
Answer: B
Coputer programming and problem solving
1131.
A. B. C. D.
Answer:
Coputer programming and problem solving
1132. int a=10,b,c,d;
A. B. C. D.
Answer:
1133. a=b=c=d=15;
A. B. C. D.
Answer:
Coputer programming and problem solving
1134. printf("%d",a);
A. B. C. D.
Answer:
Coputer programming and problem solving
1135.
A. B. C. D.
Answer:
Coputer programming and problem solving
B. .AND. C. @@ D. ||
Answer: A
Coputer programming and problem solving
1137.
A. B. C. D.
Answer:
Coputer programming and problem solving
1138.
A. B. C. D.
Answer:
Coputer programming and problem solving
1139. Code:
A. 3 B. 0 C. 1 D. 2
Answer: D
1140.
A. B. C. D.
Answer:
Coputer programming and problem solving
1141. x = 3, counter = 0;
A. B. C. D.
Answer:
Coputer programming and problem solving
Answer:
Coputer programming and problem solving
1143. {
A.
B. C. D.
Answer:
Coputer programming and problem solving
1144. ++counter;
A. B. C. D.
Answer:
Coputer programming and problem solving
1145. x--;
A. B. C. D.
Answer:
Coputer programming and problem solving
1146. }
A. B. C. D.
Answer:
1147.
A. B. C. D.
Answer:
Coputer programming and problem solving
1148. Referring to the sample code above, what value will the
variable counter have when completed?
A. B. C. D.
Answer:
Coputer programming and problem solving
1149.
A. B. C. D.
Answer:
Coputer programming and problem solving
1150.
A. B. C. D.
Answer:
Coputer programming and problem solving
Answer: D
Coputer programming and problem solving
1152.
A. B. C. D.
Answer:
Coputer programming and problem solving
Answer:
Coputer programming and problem solving
1154. if(a==10)
A. B. C. D.
Answer:
Coputer programming and problem solving
1155. {
A. B. C. D.
Answer:
Coputer programming and problem solving
Answer:
Coputer programming and problem solving
1157. else
A.
B. C. D.
Answer:
Coputer programming and problem solving
Answer:
Coputer programming and problem solving
1159. }
A. B. C. D.
Answer:
Coputer programming and problem solving
Answer: A
Answer: B
Data Base Design
Answer: A
Data Base Design
1164. The PROJECT command will create new table that has
A. more fields than the original table B. more rows than the original table C.
both (a) and (b)
D. allthefieldsofmastertable
Answer: D
Data Base Design
Answer: C
Data Base Design
Answer: A
Data Base Design
Answer: B
Data Base Design
Answer: B
Data Base Design
D. Developalogicaldatabasedesignthatreflectstheactualdatarequirementst
hatexistin
the forms and reports of an information system.
Answer: B
Data Base Design
Answer: A
Answer: D
Data Base Design
Answer: A
Data Base Design
Answer: D
Data Base Design
A. adding the primary key of A as a foreign key of B B. adding the primary key
of B as a foreign key of A C. combining the two entities into one relation
D.
eitheraorb
Answer: D
Data Base Design
Answer: C
Digital Logic
Answer: A
Digital Logic
Answer: D
Digital Logic
Answer: D
Digital Logic
1179. The output of logic gate is ‘1’ when all its input are at
logic ‘0’ . The gate is either
A. a NAND or an EX-OR gate B. aNORoranEX-NORgate C. an OR or an EX-
NOR gate D. anANDoranEX-ORgate
Answer: B
Digital Logic
Answer: D
Digital Logic
Answer: D
Digital Logic
Answer: C
Digital Logic
1183. A Binary with n digits all of which are unity has the
value
A. n2-1 B. 2n-1 C. 2n
D. 2n-1
Answer: B
Digital Logic
Answer: B
Digital Logic
Answer: B
Digital Logic
1186. Assign the proper odd parity bit to the code 111001 in
MSB
A. 111001 B. 1111001 C. 1110011 D. 1110010
Answer: A
Digital Logic
Answer: B
Digital Logic
A. 101010111
Answer: B
Digital Logic
Answer: A
Digital Logic
Answer: D
Computer Architecture and Organization
Answer: C
Computer Architecture and Organization
Answer: C
Computer Architecture and Organization
1193. What is the value of exponent bias for IEEE 754 double
precision format?
A. 1023 B. 1024 C. 127 D. 1000
Answer: A
Computer Architecture and Organization
Answer: D
1195. If a number has k-bits(k is even), how many bits will its
square-root have?
A. K-1 B. K/2 C. k D. k-2
Answer: B
Computer Architecture and Organization
Answer: D
Computer Architecture and Organization
Answer: B
Computer Architecture and Organization
D. alltheabove
Answer: C
Computer Architecture and Organization
Answer: A
Computer Architecture and Organization
Answer: B
Computer Architecture and Organization
Answer: C
Answer: B
Computer Architecture and Organization
Answer: C
Computer Architecture and Organization
Answer: D
Computer Architecture and Organization
Answer: A
Computer Architecture and Organization
Answer: C
Computer Architecture and Organization
1207. Identify the Type of IEEE format for the flowing point
numbers having the sign bit=1, the exponent field=15, and
the significand (mantissa)=112
A. Half
B. Single C. Double D. Quad
Answer: D
Computer Architecture and Organization
Answer: B
Computer Architecture and Organization
Answer: D
Computer Architecture and Organization
Answer: C
Computer Architecture and Organization
1211. Which one of the following statement is wrong
A. “Multiple memory accesses” is a disadvantage of Indirect addressing mode
B. Stack addressing mode has limited applicability
C. Immediate addressing
mode has limited operand magnitude
D.
RegisterIndirectaddressingmodehaslimitedaddressspace
Answer: D
Computer Architecture and Organization
Answer: A
Computer Architecture and Organization
D. Noneoftheabove
Answer: C
Computer Architecture and Organization
Answer: B
Computer Architecture and Organization
Answer: D
Computer Architecture and Organization
Answer: B
Computer Architecture and Organization
Answer: D
Computer Architecture and Organization
Answer: A
Computer Architecture and Organization
Answer: C
Computer Architecture and Organization
Answer: C
Computer Architecture and Organization
Answer: D
Computer Architecture and Organization
Answer: D
Computer Architecture and Organization
D. alinker
Answer: A
Computer Architecture and Organization
Answer: A
Computer Architecture and Organization
Answer: B
Computer Architecture and Organization
Answer: A
Answer: A
Computer Architecture and Organization
Answer: A
Computer Architecture and Organization
Answer: D
Answer: B
Computer Architecture and Organization
Answer: A
Computer Architecture and Organization
1233. The common fields found in instruction formats are:
A. opcode field,address field,mode field
B. opcode field, operand field,
address field, mode field,
C. opcode field, address field, next address field,
mode field D. opcodefield,addressfield1,addressfield1,modefield,
Answer: A
Computer Architecture and Organization
B. data that has been transferred from memory C. the address of a memory
location
D. aninstructionthathasbeentransferredfrom
Answer: C
Computer Architecture and Organization
Answer: B
Computer Architecture and Organization
Answer: D
Computer Architecture and Organization
Answer: C
Computer Architecture and Organization
Answer: A
Computer Architecture and Organization
Answer: B
Computer Architecture and Organization
1240. For the instruction MOV R1, (2000) calculate the
effective address __________ and the content of R1
__________
A. 2000, M (2000)
B. M (2000), 2000
C. 2000, M(2000
D.
M(2000),M(M(2000))
Answer: D
Computer Architecture and Organization
Answer: D
Computer Architecture and Organization
Answer: B
Computer Architecture and Organization
Answer: D
Computer Architecture and Organization
D. Addressfield
Answer: B
Computer Architecture and Organization
Answer: A
Computer Architecture and Organization
Answer: D
Computer Architecture and Organization
1247. Von Neumann machine follows _____________
instruction format
A. Zero Address B. One Address C. Two Address D. ThreeAddress
Answer: B
Answer: C
Computer Architecture and Organization
Answer: B
Computer Architecture and Organization
A. 20
B. 40 C. 30 D. 10
Answer: A
Computer Architecture and Organization
Answer: C
Computer Architecture and Organization
1253. The DIV M(X) instruction in IAS has the dividend in the
register
A. AC
B. PC
C. MQ
D. Noneoftheabove
Answer: A
Computer Architecture and Organization
Answer: C
Computer Architecture and Organization
Answer: A
Computer Architecture and Organization
Answer: D
Computer Architecture and Organization
1258. If you were to add the instruction ADD R1, R2, R3 to the
IAS instruction set, what changes will you make to the
datapath?
A. Add an additional input to the ALU which takes operands from a register
file B. Add a register file
C. Connect the output of ALU to register file
D.
Addanadditionaladder
Answer: C
Computer Architecture and Organization
Answer: A
Computer Architecture and Organization
Answer:
Computer Architecture and Organization
Answer: C
Computer Architecture and Organization
Answer: D
Computer Architecture and Organization
1264. The DIV M(X) instruction in the IAS machine stores the
quotient in the register and the remainder in the register
A. AC, MQ B. MQ,AC C. AC,IR
D. MDR,MQ
Answer: B
Computer Architecture and Organization
Answer: A
Computer Architecture and Organization
Answer: C
Computer Architecture and Organization
Answer: C
Computer Architecture and Organization
Answer: D
Computer Architecture and Organization
Answer: D
Data Warehousing and Data Mining
Answer: D
Answer: C
Data Warehousing and Data Mining
Answer: B
Data Warehousing and Data Mining
Answer: A
Data Warehousing and Data Mining
Answer: B
Data Warehousing and Data Mining
1275. Confidence measures the __________ of the rules
A. Certainity B. Utility
C. Simplicity D. Novelty
Answer: A
Data Warehousing and Data Mining
Answer: D
Data Warehousing and Data Mining
Answer: B
Answer: C
Data Warehousing and Data Mining
Answer: A
Data Warehousing and Data Mining
Answer: A
Data Warehousing and Data Mining
C. 81 D. 24
Answer: B
Data Warehousing and Data Mining
Answer: C
Data Warehousing and Data Mining
Answer: C
Internet and Web Programming
Answer: B
Internet and Web Programming
1286. Choose the correct HTML tag for the largest heading
A. <h1>
B. <head>
C. <h6>
D. <heading>
Answer: A
Internet and Web Programming
1287. What is the correct HTML tag for inserting a line break?
A. <br/>
B. <break /> C. <lb />
D. <hr/>
Answer: A
Internet and Web Programming
Answer: A
Internet and Web Programming
Answer: B
Internet and Web Programming
Answer: A
Internet and Web Programming
Answer: B
Internet and Web Programming
Answer: C
Internet and Web Programming
Answer: A
Internet and Web Programming
Answer: D
1295. How can you make a list that lists the items with
numbers?
A. <dl> B. <list> C. <ul> D. <ol>
Answer: D
Internet and Web Programming
1296. What is the correct HTML for making a text input field?
A. <input type="text" />
B. <textinput type="text" /> C. <input
type="textfield" /> D. <textfield>
Answer: A
Internet and Web Programming
Answer: D
Internet and Web Programming
Answer: B
Internet and Web Programming
Answer: A
Internet and Web Programming
1301. How do you specify the width and height of the video
tag in HTML5
A. <video width="300" height="400"></video> B. <video w="300"
h="400"></video>
C. <video length="300" h="400"></video>
D.
<video"300x400"></video>
Answer: A
Answer: A
Internet and Web Programming
Answer: C
Soft Computing
Answer: A
Soft Computing
D. cannotsay
Answer: C
Soft Computing
Answer: A
Soft Computing
Answer: B
Soft Computing
Answer: A
Soft Computing
Answer: A
Soft Computing
Answer: A
Soft Computing
Answer: C
Soft Computing
Answer: D
Soft Computing
Answer: B
Soft Computing
Answer: B
Soft Computing
Answer: B
Soft Computing
Answer: C
Soft Computing
Answer: D
Soft Computing
Answer: c
Theory of Computation
Answer: b
Theory of Computation
Answer: c
Theory of Computation
Answer: b
Theory of Computation
Answer:
Theory of Computation
1323.
A. B. C. D.
Answer:
Theory of Computation
1324. I. Recursive languages are closed under
complementation
A. I only B. IandII C. IandIII D. IIandIII
Answer: b
Theory of Computation
Answer:
Theory of Computation
Answer:
Theory of Computation
Answer:
Theory of Computation
1328. 6.Consider the following language
A. CFL but not regular
B. CSL but not CFL
C. regular
D.
type0languagebutnottype1
Answer: b
Theory of Computation
1329. L = {anbncndn|n ≥ 1}
A. B. C. D.
Answer:
Theory of Computation
1330. L is
A. B. C. D.
Answer:
Theory of Computation
Answer: c
Theory of Computation
Answer: b
Theory of Computation
1333.
A. B. C. D.
Answer:
Theory of Computation
Answer: c
Theory of Computation
1336.
A. A→aA|a
Answer:
Theory of Computation
1337.
A. B→Bc|c B. B→cB|c C. B → bBc|bc D. B→Bc|ε
Answer:
Theory of Computation
1338.
A. C → aCc|bD|b B.
C.
D. C→aCc|ε|bD
Answer:
Theory of Computation
1339.
A. D→bD|b B.
C.
D. D→bD|b|ε
Answer:
Theory of Computation
1340.
A. B. C. D.
Answer:
Theory of Computation
Answer: b
Theory of Computation
1342.
A. B. C. D.
Answer:
Theory of Computation
Answer: b
Theory of Computation
1344.
A. B. C. D.
Answer:
Theory of Computation
1345. I. G is ambiguous
A. B. C. D.
Answer:
Theory of Computation
1346. II. G produces all strings with equal number of a’s and
b’s
A. B. C.
D.
Answer:
Theory of Computation
Answer:
Theory of Computation
1349.
A. B. C. D.
Answer:
Theory of Computation
Answer: b
Theory of Computation
1351.
A. B. C. D.
Answer:
Theory of Computation
Answer: d
Theory of Computation
1353.
A.
B. C. D.
Answer:
Theory of Computation
D. noneoftheabove
Answer: b
Theory of Computation
Answer: C
ProgrammingFundamentals
D. ABoolean
Answer: A
ProgrammingFundamentals
Answer: a,c
ProgrammingFundamentals
Answer: c
ProgrammingFundamentals
Answer: b
ProgrammingFundamentals
1361. 7. What type of error will the following generate?
Choose more than one answer, if necessary. int *x;*x=100;
A. compilation error
B. logical error
C. no compilation error D.
nologicalerror
Answer: b,c
ProgrammingFundamentals
Answer: c
ProgrammingFundamentals
Answer: a
ProgrammingFundamentals
Answer: a
ProgrammingFundamentals
Answer: d
ProgrammingFundamentals
Answer: b
ProgrammingFundamentals
Answer: c
ProgrammingFundamentals
C. D.
Answer: b
ProgrammingFundamentals
Answer: b
Soft Computing
Answer: b
Soft Computing
Answer: d
Soft Computing
Answer: d
Soft Computing
D. Thereisnobesttechniquethatwouldperformforallproblems
Answer: a
Soft Computing
Answer: d
Soft Computing
Answer: c
Soft Computing
Answer: d
Soft Computing
Answer: c
Soft Computing
Answer: d
Soft Computing
Answer: 2^N
Theory of Computation
Answer: n+1
Theory of Computation
A. type-1
Answer: type-3
Theory of Computation
1387. Consider the following two statements: S1: { 0^2n | n >=
l} is a regu1ar language} S2: { 0^m 0^n 0^(m+n) | m >= 1 and n
>= 2} is a regu1ar language Which of the following
statements is correct?
A. Only S1 is correct
B. Only S2 is correct
C. Both S1 and S2 are correct D.
NoneofS1andS2iscorrect
Answer: 15 states
Theory of Computation
D. equal
Answer: Greater
Theory of Computation
1390. Which of the following statement is true?
A. NFA is more powerful than DFA B. DFA is more powerful than NFA C. NFA
and DFA have equal power D. Allthearetrue
Answer: L^+ = { }
Theory of Computation
Theory of Computation
Answer: star
Theory of Computation
1396. A NFA converted to DFA has more than one final state.
A. TRUE B. FALSE
Answer: n+2
Theory of Computation
Answer: C
Computer Networks
Answer: B
Computer Networks
1401. Star Topology is Based On a Central Device that can be
__________ ?
A. HUB
B. Switch
C. Only A
D. BothAandB
Answer: A
Computer Networks
Answer: C
Computer Networks
Answer: C
Computer Networks
Answer: C
Computer Networks
1405. Radio communication frequencies ranges from?
A. 3KHzto300KHz B. 3KHzto300GHz C. 300KHzto3GHz D. 3KHzto3,000GHz
Answer: B
Computer Networks
Answer: B
Computer Networks
Answer: A
Computer Networks
Answer: B
Computer Networks
1409. _________ have a single communication channel that is
shared by all the users on the network. ?
A. Point-to-Point
B. Broadcast Network C. Protocol
D. PAN
Answer: B
Computer Networks
Answer: D
Computer Networks
Answer: A
Computer Networks
A. between peers
Answer: A
Computer Networks
Answer: C
Embedded Systems
Answer: A
Embedded Systems
Answer: A,B,C
Embedded Systems
Answer: C
Embedded Systems
Answer: A
Embedded Systems
Answer: C
Embedded Systems
Answer: B
Embedded Systems
Answer: D
Embedded Systems
Answer: D
Embedded Systems
Answer: D
Embedded Systems
Answer: A
Embedded Systems
Answer: B
Embedded Systems
Answer: A
Embedded Systems
B. FALSE
C. D.
Answer: B
Embedded Systems
Answer: /* Comment */
Object Oriented Paradigm
D. '(singlequote)
Answer: ; (semi-colon)
Object Oriented Paradigm
Answer: { }
Object Oriented Paradigm
Answer: Spaces
Object Oriented Paradigm
Answer: main()
Answer: real
Object Oriented Paradigm
Answer: Private
Object Oriented Paradigm
B. The first one is a character constant x and second one is the string literal
x
D. Noneofthese
Answer: pretest
Object Oriented Paradigm
Answer: displayName();
Object Oriented Paradigm
Answer: return
Object Oriented Paradigm
1442. Which of the following is an access specifier?
A. protected B. safe
C. particular D. shielded
Answer: protected
Object Oriented Paradigm
Answer: * / % + - =
Answer: C
Programming language translator
Answer: C
Programming language translator
Answer: A
Programming language translator
C. operand D. mnemonicoperation
Answer: B
Programming language translator
Answer: D
Programming language translator
Answer: C
Programming language translator
Answer: A
Programming language translator
Answer: B
Programming language translator
Answer: C
Programming language translator
Answer: C
Answer: B
Programming language translator
Answer: C
Programming language translator
Answer: C
Programming language translator
1457. Consider the following statements S1:In dominator
tree, in which
the initial node is the root ,and each node d Dominates only
its ancestors in the tree S2: In terms of the dom relations, the
immediate m has the property that if d! =n and d dom m
Choose the correct option
A. S1 and S2 true B. S1 true
C. S2 true
D. None
Answer: C
Programming language translator
Answer: B
Programming language translator
Answer: C
Information Security
1460. In the right setting a thief will steal your information by
simply watching what you type
A. snagging
Answer: D
Information Security
Answer: A
Information Security
Answer: B
Information Security
Answer: A
Information Security
Answer: D
Information Security
Answer: C
Information Security
Answer: C
Information Security
Answer: B
Information Security
Answer: C
Information Security
1470. Which of the following will not protect you from spam?
A. spam blockers B. e-mail rules
C. popup blocker
D. filters
Answer: C
Information Security
Answer: B
Information Security
Answer: C
Information Security
Answer: B
Information Security