Vous êtes sur la page 1sur 763

1.

Finite automata recognizes --------grammars

Ans: Regular

2. The system having memory elements are called.

Ans: Sequential Logic System/Flip Flops/Wasn't able to find

3. Sets in morphology are referred to as image's

Ans: Dilation/Translation and Reflection

4. The major source of data for other systems are:

Ans: Transaction Processing System

5. All member functions are _____ to it's class by default

Ans: Private

6. An unambiguous grammar has

Ans: Only one leftmost derivation and parse Tree

7. Thresholding function in contrast stretching creates

Ans: Binary Image

8. What is an Accumulator?

Ans: A register in cpu to temporary hold the intermediate arithmetic and logic data
9. Given an arbitrary non-deterministic finite automaton (NFA). with N states, the maximum number
of states in an equivalent minimized DFA is at least.

Ans: 2^N

10. Having more than one constructor in a class is

Ans: Constructor Overloading/Possible

11.In a BCD-to-seven-segment converter, why must a code converter be utilized?

Ans: To convert 4-bit bcd into 7 bit code

12. Which directory implementation is used in most Operating System?

Ans: Tree Structure

13. The simplest image processing technique is

Ans: intensity transformation

14. Given the language L = {ab, aa, baa}, which of the following strings are in L*?

1) abaabaaabaa

2) aaaabaaaa

3) baaaaabaaaab

4) baaaaabaa

Ans: 1 , 2 & 4

15. Which of the following scheduling algorithm comes under preemptive scheduling?

Ans: Round Robin/Shortest Remaining Time First


16. How many select lines would be required for an 8-line-to-1-line multiplexer?

Ans: 3

17. First derivative approximation says that values of constant intensities must be

Ans: 0

18. Which of the following is a complete function?

A. int funct();

B. int funct(int x) { return x=x+1; }

C. void funct(int) { printf(“Hello");

D. void funct(x) { printf(“Hello"); }

E. None of these

Answer: Option B

19. Some code optimizations are carried out on the intermediate code because

Ans: program analysis is more accurate on intermediate code than on machine code

20. Overloading the function operator

Ans: Possible

21. External Fragmentation of the file system

22.One can safely state that the output lines for a demultiplexer are under the direct control of the:

Ans: input data select lines


23. Functions that combines to produce ƒ(x,y)

Ans: illuminance and reflectance

24. Reflection and translation of the image objects are based on

Ans: Structuring Element

25. The following is not a Relational Model Constraint(Domain,Referential Entity,Key)

26. What is the maximum number of reduce moves that can be taken by a bottom-up parser for a
grammar with no epsilon- and unit-production (i.e., of type A -> є and A -> a) to parse a string with n
tokens?

Ans: n-1

27. A property which is not true for classes is that they

Ans: bring together all aspects of an entity in one place.

28. The type of Interpolation where for each new location the intensity of the immediate pixel is
assigned is ___________

Ans: Nearest Neighbour Interpolation

29. Which one of the following is a top-down parser?

Ans: Recursive Descent Parser

30. Relations produced from an E - R model will always be in

Ans: 1NF

31. The term m45 should be made up of at least _____ literals. (y'w'+yw+xyz'+x'y'z' - 10 literals)
Ans:

32. A friend function to a class A cannot access: (Friend function is used to access private member
function of a class in other class)

Ans:

33. ASCII, EBCDIC, and Unicode are examples of -----------------

Ans: Data Represention/Character Representation

34. Transforming the difference between adjacent pixels is called

Ans: mapping

35. Which of the following derivations does a top-down parser use while parsing an input string? The
input is assumed to be scanned in left to right order.

Ans: Leftmost derivation

36. What will be the output of the following code #include void main() { int i; int a[3]=5; for (i=2;i>=0;i-
-) { printf(?%d\n?,a[i]); } }

Ans: Error 0 0 5

37. A primary key, if combined with a foreign key creates

Ans: Parent-Child relation ship between the tables that connect them

38. Network models are complicated by physical keys, but the relation model is

Ans: faster because it uses logical keys

39. An LALR(1) parser for a grammar G can have shift-reduce (S-R) conflicts if and only if
Ans: the LR(1) parser for G has S-R conflicts

40. Images quantised with insufficient brightness levels will lead to the occurrence of ____________

Ans: False Contours

41. SR Flip flop can be converted to T-type flip-flop if ?

Ans: S and R are connected to Q and Q' respectively

42. In C++, dynamic memory allocation is achieved with the operator ______

Ans: new

43. Multiplication of a positive integer by a power of two can be replaced by left shift, which executes
faster on most machines. This is an example of

Ans: Bit manipulation

44. If the inner region of the object is textured then approach we use is

Ans: similarity

45. An advantage of the database approach is

Ans: non-redundant, consistency, data is integrated and can be accessed by multiple programs

46. Register is a ?

Ans: Temporary storage unit within the CPU having dedicated or general purpose use

47. Which is not a proper prototype?

Ans: double funct(char x)


48. Intensity can be converted to color transformation by assigning colors to

Ans: intensity levels

49. Variables inside parenthesis of functions declarations have _______ level access.

Ans: Local

50. When we concatenate two languages L1 and L2 recognized by machine M1 and M2 we obtain a
machine with final state same as that of __________________

Ans:

51. Which of the following is not characteristics of a relational database model

Ans: treelike structure

52. For which of the following flip-flop the output clearly defined for all combinations of two inputs?

Ans: JK Flip FLop

53. Salt and pepper noise also referred to the term

Ans: spike noise

54. Which of the following is the insertion operator?

Ans: <<

55.The number of states in a machine M recognizing L1UL2 will be __________________ where n


is the number of states in M1 and m is the number of states in M2 .

Ans:
56. Manager salary details are hidden from the employee. This is

Ans:External-level data hiding

57. An SR flip flop cannot accept the following input entry

Ans: Both are high

58.Trigger is a

Ans:automatic giving of an action. A special kind of stored procedure that automatically executes
when an event occurs in the database server

59.Image compression is

Ans. Reducing image size.

60.If there is a complete DFA M1 recognizing a language L1 and has m states out of which two are
final states then the machine M recognizing L1 complement will have _____________ final states.

61.The main difference between JK and RS flip-flop is that?


Ans: The main difference between a JK flip-flop and an SR flip-flop is that in the JK flip-flop,
both inputs can be HIGH. When both the J and K inputs are HIGH, the Q output is toggled,
which means that the output alternates between HIGH and LOW. Thereby the invalid condition
which occurs in the SR flipflop is eliminated.

62.If you assign a default value to any variable in a function prototype's parameter list, then _____

Ans: all parameters to the right of that variable must have default values

63.Radix of binary number system is _____?

Ans: 2

64.Normalisation of database is used to

Ans: Remove anomalies.

65.If M1 machine recognizing L with n states, then M2 recognizing L* constructed Using Thompson
construction will have ------------- states.

Ans: 3

66. Bipolar impulse noise is also called

Salt and pepper

67.What does the following declaration mean?

int (*ptr)[10];

Array of Pointer of size 10 to integer

68.Which of the following is minimum error code?

Ans: Gray Code

69.Which of the following intermediate language can be used in intermediate code generation?

Ans: ? (any machine independent code)

70.Which of the following calls a function named displayName, passing it no actual arguments?
Ans: Display Name();

71.Updating a database means

Ans: Modifying and adding record occurences.

72.For...................value of Q, the Contra harmonic mean filter eliminates pepper noise.

Ans: positive

73.The relational model uses some unfamiliar terminology. A tuple is equivalence to a:

Ans: Record

74.When used with an IC, what does the term "QUAD" indicate?

Ans: 4 instances

75.If you want to use a class to define objects in many different programs, you should define the
class in a C++ _____ file

Ans: header file.

76.Additive rule:

Ans: P(A or B) = P(A) + P(B)

77.A finite automata that will accept only string X of length n will have _________ many states

78.PDF in image processing is called

Probability density function

79.Which of the following suffices to convert an arbitrary CFG to an LL(1) grammar?

Ans: None of the above.

80.Many programmers separate a class into two files: _____

Ans: one for the declarations and one for the implementations

81.Adding 1001 and 0010 gives output of

Ans: 1011

82.A relational database is


83.How will you free the allocated memory ?

Ans: Delete as free();

84.Desirable properties of relational database design include

Dependency Preservation, Lossless-Join Decomposition

85.The CFG

s---> as | bs| a | b

is equivalent to regular expression

86.Digital video is sequence of

Ans: Binary data ( picture signals (frames) that are represented by binary data (bits))

87.One operation that is not given by magnitude comparator

A. equal
B. less
C. greater
D. addition
D

88.Magnitude comparator compares using operation of

89.Dilation-Morphological image operation technique is used to

probing and expanding the shapes contained in the input image.

90.Files whose names end in .h are called _____ files

Ans: Header
91.If a language is denoted by a regular expression

L = ( x )* (x | y x ) ,

then which of the following is not a legal string within L ?

92.A software package designed to store and manage databases

Ans: DBMS

93.Number of final state require to accept Φ(phi) in minimal finite automata.

Ans: 0

94.Which one of the following is currently the most popular data model?

Ans: DBMS/RDBMS

95.Boolean algebra is also called

Ans: Binary

96.Which image processing technique is used to eliminate electronic noise by mathematical


process?

Ans: Frame Averaging

97.Overloading involves writing two or more functions with ________

Ans: same name and different parameters

98.What kind of schema it is?

Student(sid, sname, dob, address, pincode)

99.Usually a pure virtual function


100.BCD to seven segment is a

101.For edge detection we use

Sobel, Canny, Prewitt, Roberts,

102.----------------------------is used to check whether the language is not regular.

103.What is an ALU?

Ans: Arithematic logic Unit

104.In which technique which is used to determine changes between two images ?

mage differencing

105.Let L be a set accepted by a nondeterministic finite automaton. The number of states in non-
deterministic finite automaton is |Q|. The maximum number of states in equivalent finite
automaton that accepts L is

2^N.

106.Two access specifiers in C++ are

Public, protected, private

107.In the architecture of a database system external level is the

D. view level

108.Decimal number 9 in Gray code is

1101

109.The library function used to find the last occurrence of a character in a string is

strchr

110.What is the minimum number of states needed to a DFA over Σ= (a, b) which accept those
words from

Σ such that the number of a is even and the number of b is divisible by three.
111. ______________is a logical unit of access to a DBMS

transaction

112. .............should be serious consideration prior to the use of derivatives in applications where
noise is likely to be present.

Image smoothing

113. A pixel p at coordinate (x,y)has four horizontal and vertical neighbors whose coordinates are
given by:

(x+1, y), (x-1, y), (x, y+1), (x ,y-1)

114.

Which of the following statements is/are FALSE?

(1) For every non-deterministic Turing machine, there exists an equivalent deterministic Turing
machine.

(2) Turing recognizable languages are closed under union and complementation.

(3) Turing decidable languages are closed under intersection and complementation

(4) Turing recognizable languages are closed under union and intersection.

2 only

115.

The RDBMS terminology for a row is

record or tuple

116.
___________ programs automatically connects to web sites and download documents and save
them to local drive

Web Downloading Utilities

117.

Virtual memory is __________

An illusion of extremely large main memory

118.

Given the code

String s1 = ? VIT? ;

String s2 = ? VIT ? ;

String s3 = new String ( s1);

Which of the following would equate to true?

(A) s1 == s2
(B) s1 = s2
(C) s3 == s1
(D) s1.equals(s2)
(E) s3.equals(s1)
• (A), (D) & (E)

119.

A one to many relationship (of table A to Table B) is

120. The most common example of 2D interpolation is image

121.
How many possible outputs would a decoder have with a 6-bit binary input?

64

122.

A Turing machine that accepts every string of the language and does not accept

strings that are not in the language is called as,

123.

____________ is referred to as Static Web

124.

.______________datastructure used in pushdown automata.

125.

Power law transformation is useful in

126.

An Entity from an ER diagram can be represented in the relational model by a

127.

What is the condition for setting the Overflow flag in status register?
128.

How do you write "Hello World" in PHP?

129.

Automaton accepting the regular expression of any number of a ' s is:

130.

What is the status of the inputs S0, S1, and S2 of the 74151 eight-line multiplexer in order for the
output Y to be a copy of input I5?

131.

The correction of power law response is called

132.

Which one of the following is not the responsibility of the DBA?

133.

The mechanism that bring a page into memory only when it is needed is called _____________

133.

The mechanism that bring a page into memory only when it is needed is called _____________

134.

Two automata are equal when

135.
What does JSP stand for?

136.

Given the basic ER and relational models, which of the following is INCORRECT?

137.

In the formula g(x,y) = T[ƒ(x,y)], T is the

138.

The negative numbers in the binary system can be represented by

139.

The embedded c program is converted by cross compiler to

140.

Which of the following is TRUE?

141.

Wavelet series equation is the sum of

142.

What are the parameters of the service method?

143.

A MRA stands for

144.

The regular expression 0*(10*)* denotes the same set as


145.

Which one of the following statements if FALSE?

146.

Which of these methods has no restrictions on content size when a form is submitted.

147.

When an instruction is read from the memory, it is called

148.

The following function computes the maximum value contained in an integer array

p[ ] of size n (n >= 1).

int max(int *p, int n) {

int a=0, b=n-1;

while (__________) {

if (p[a] <= p[b]) { a = a+1; }

else { b = b-1; }

return p[a];

}
The missing loop condition is

149.

If a register containing binary data (11001100) is subjected to arithmetic shift left operation, then the
content of the register after 'ashl' shall be

150.

First derivative approximation says that values along the ramp must be

151.

Which of the following statement is true?

152.

Let E1 and E2 be two entities in an E/R diagram with simple single-valued attributes. R1 and R2 are
two relationships between E1 and E2, where R1 is one-to-many and R2 is many-to-many. R1 and
R2 do not have any attributes of their own. What is the minimum number of tables required to
represent this situation in the relational model?

153.The binary value for 0.4375 is

154.Consider the following recursive C function.

Void get (int n)

{if (n<1) return;

get (n-1)

get (n-3) ;

printf ("%d",n);

If get(6) function is being called in main () then how many times will the get() function be
invoked before returning to the main ( ) ?

155.The principle energy source for images

156.Which of the following regular expression denotes a language comprising of all possible strings
over ∑= {a,b} of length n where n is a multiple of 3?
157.Select operation in SQL is equivalent to

158.Grant and revoke are ....... statements.

Ans: DCL

159.In computers, subtraction is generally carried out by ______.

160.Purpose of Pseudo color processing

161.A language is represented by a regular expression (a)*(a+ba). Which of the following string
does not belong to the regular set represented by the above expression.

162.

Which of the following is/are example(s) of stateful application layer protocols?

(i)HTTP

(ii)FTP

(iii)TCP

(iv)POP3

(A) (i) and (ii) only

(B) (ii) and (iii) only

(C) (ii) and (iv) only

(D) (iv) only

Answer: (C)
163.

Floating point representation is used to store ______.

Ans: Real integers.

164........... command can be used to modify a column in a table

Ans: ALTER TABLE command

165.Adding primary colors to form

166)
#include <stdio.h> int
main (){
static int a[]={10, 20, 30, 40, 50}; static int
*p[]= {a, a+3, a+4, a+1, a+2}; int **ptr=p;
ptr++;

printf ("%d%d", ptr p, **ptr);


}

Ans - Returns a memory address (if all the syntax errors are ignored)
0x60106840

167) The lexical analysis for a modern language such as Java needs the power of
which one of the following machine models in a necessary and sufficient sense?

Ans - Finite state automata

168) Data independence means

Ans - Changing the physical storage without affecting the external view of the data

169) A Stack-organised Computer uses instruction


of Ans - Zero addressing
170)
void
count(int n){
static int d=1;
printf("%d ",
n);
printf("%d ", d);
D++;
if(n>1) count(n-1);
printf("%d ", d);
}
void main(){
count(3);
}

Ans - 3 1 2 2 1 3 4 4 4

171) A minimum state DFA accepting the language L={w/w belongs {0,1}*} number of
0s and 1s in w are divisible by 3 and 5, respectively} has

Ans - 15 states

172) Formula pr = n/MN represents the


Ans -

173) Which of the following is/are undecidable?

http://www.geeksforgeeks.org/wp-content/uploads/gq/2013/10/gatecs2013.15.png

Ans - option 2 and 3

173.

Which of the following is/are undecidable?


174) Content of the program counter is added to the address part of the instruction in order

to obtain the effective address is called. Ans - Relative address mode

175) Consider the following program: int f(int *p, int n){

if (n <= 1) return 0;

else return max ( f (p+1, n-1),p[0]-p[1]);} int main()

{
int a[] = {3,5,2,6,4};

printf("%d", f(a,5));

The value printed by this program is

Ans - 3

176) Standard rate of showing frames in a video per second are Ans - higher than 50 Hz through 90 Hz

177) DCL stands for


Ans - Data Control Language

178) ...................... is preferred method for enforcing data integrity

Ans - Constraints

179) Which of the following problems are decidable?

Ans - http://www.geeksforgeeks.org/gate-gate-cs-2012-question-24/

(A) 1, 2, 3, 4
(B) 1, 2
(C) 2, 3, 4
(D) 3, 4

Answer: (D)

179.
Which of the following problems are decidable?

180) Negative of the image having intensity values [0,L-1] is expressed by

Ans - s = L - 1 - r, where

181) To prevent any method from overriding, the method has to declared as,

Ans - final
182) -24 is 2’s complement form is

Ans -11101000

183) In the sense of predicate two regions of the image must be

Ans - Different

184) Which of the following is not a binary operator in relational algebra?

Ans -

185) Search engine can serve as

Ans - Interface between user and large scattered databases

186) Zero address instruction format is used for


Ans - when an address is not needed to specify the location of the operand, as in repetitive
addressing

187) Which of the following are decidable?

I. Whether the intersection of two regular languages is infinite

II. Whether a given context-free language is regular

III. Whether two push-down automata accept the same language

IV. Whether a given grammar is context-free Ans - I and IV

188) Which of the following is/are the DDL statements?

Ans -

189) Consider the following C program.

#include

int f1 (void) ; int f 2 void ; int x 10;

int main ()
{

int x=1;

x+=f1()+ f2()+f3()+f2() ;

printf("%d", x);

return 0;

int f1(){int x=25; x++; return x;}

int f2(){static int x =50; x++;return x;} int f3(){x*=10; return x};

The output of the program is_________.

Ans - 230

190) Which of the following problems is undecidable?

Ans - https://gateoverflow.in/87123/gate1989-3-iii

2 and 4 mostly 2

191) A _________ registrar stores the intermediate arithmetic and logic results in it.

Ans - Accumulator register

192) The principle tools used in image processing for a broad spectrum of applications Ans - Spatial
filtering
193) The special memory used to store the micro routines of a computer is ________. Ans - Control store

194) A No of gray levels in an image are in power of

Ans - 2

195) Which database level is closest to the users?

Ans - External

196) Repeated

197) Consider the function func shown below: int func(int num) {

int count = 0;

while (num) {

count++; num>>= 1;
}

return (count);

The value returned by func(435)is Ans - 9

198)

Consider the following C program segment. #include

intmain()

{char sl [7]="1234",*p;

p=sl+2;

*p='0';

printf ("%s",sl)

}
What will be printed by the program?

Ans - 1204

199) Second derivatives are zero at points on Ans - Inflection point

200) S -> aSa|bSb|a|b; The language generated by the above grammar over the alphabet {a,b} is the set
of

Ans - The strings accepted by language are {a, b, aaa, bbb, aba, bab, ..}. All of these strings are odd
length palindromes.

201) ...... data type can store unstructured data

Ans - Raw

202) The processor 80386/80486 and the Pentium processor uses _____ bits address bus: Ans - 32

203) Which one is the first search engine in internet?

Ans - Archie

204) What is the complement of the language accepted by the NFA shown below?

Ans - B

205) The sum of cosines and sines coefficient multiplied is

Ans - Fourier series

206) Which of the following is correct for a gated D flip-flop?

Ans - The Q output is either SET or RESET as soon as the D input goes HIGH or LOW.
207) A table can have only one

Ans - Primary key

208) When a new row is inserted the constraints that can be violated are

Ans - Unique constraint

209) Sockets originate from

Ans - Berkely

210) A deterministic finite automation (DFA)D with alphabet {a,b} is given below

Which of the following finite state machines is a valid minimal DFA which accepts the same language as
D?

Ans -

211) An image is characerized by Ans -

212) What type of register would shift a complete binary number in one bit at a time and shift all the
stored bits out one bit at a time?

Ans - SISO

213) Digitizing the coordinate values is called Ans - Sampling

214) Which of the following is not a property of a transaction? Ans -


215) What will be printed as the output of the following program? public class testincr

public static void main(String args[])

int i = 0;

i = i++ + i; System.out.println(" I = " +i); }

Ans - I =1

216) The number of full and half-adders required to add 16-bit numbers is
Ans - 1 half-adder, 15 full-adders

217) Which one of the following languages over the alphabet {0,1} is described by the regular
expression: (0+1)*0(0+1)*0(0+1)*?

Ans - The set of all strings containing at least two 0’s.

218) The advantage of DBMS over file systems is Ans -

● No redundant data – Redundancy removed by data normalization

● Data Consistency and Integrity – data normalization takes care of it too


● Secure – Each user has a different set of access
● Privacy – Limited access
● Easy access to data
● Easy recovery
● Flexible
219) An object of class A receives a message with an argument that is an
instance of

class B. Identify the type of relationship between class A and Class B: Ans -

220) What are the minimum number of 2-to-1 multiplexers required to generate a 2- input AND
gate and a 2-input Ex-OR gate?

Ans - 1 and 2
221.

Dynamic range of imaging system is a ratio where the upper limit is determined by

222.

Consider the languages L1 = phi and L2 = {a}. Which one of the following represents L1 L2 * U L1*

223.
The number of tokens in the following C statement is (GATE 2000)

printf("i = %d, &i = %x", i, &i);

224.

A graphical HTML browser resident at a network client machine Q accesses a static HTML
webpage from a HTTP server S. The static HTML page has exactly one static embedded image
which is also at S. Assuming no caching, which one of the following is correct about the HTML
webpage loading (including the embedded image)?

221 . Dynamic range of imaging system is a ratio where the upper limit is determined by : Saturation

222. Consider the languages L1 = \phi and L2 = {a}. Which one of the following represents L1 L2* U L1* : A

223.The number of tokens in the following C statement is (GATE 2000) : 10

printf("i = %d, &i = %x", i,&i);

224.A graphical HTML browser resident at a network client machine Q accesses a static HTML webpage from a HTTP server S. The static HTML page has exactly one static
embedded image which is also at S. Assuming no caching, which one of the following is correct about the HTML webpage loading (including the embedded image)?

Q needs to send at least 2 HTTP requests to S, but a single TCP connection to server S is
sufficient
225. A 2 bit binary multiplier can be implemented using :

Two 2 inputs NORs and one XNOR gate

226.Histogram Equalisation is mainly used for :__Image Enhancement__.

227.

Foreign Key is

228.

In a conceptual model for a university, which of the following could most appropriately be
represented via a recursive relationship?

229. In a compiler, keywords of a language are recognized during : the lexical analysis of
the program

230. VOLATILE MEMORY IS ________________ ?

231. Histogram Equalisation is mainly used for :__Image Enhancement__.

232 .#include <stdio.h>

main()

int i;

int*pi = &i;

scanf("%d",pi);
printf("%d\n", i+5);

On execution, the value printed is 5 more than the integer value entered.

233. Which of the following most certainly implies the need for an entire table to implement?
: A ternary relationship

234.

#include

using namespace std;

int main()

int x=20;

if(!(!x)&&x)

cout<<x;

else

x=10;

cout<<x;

return 0;

}
}

235. A J-K flip-flop is in a "no change" condition when : J = 0, K = 0

236. For the grammar below, a partial LL(1) parsing table is also presented along with the grammar.
Entries that need to be filled are indicated as E1, E2, and E3. is the empty string, $ indicates end of
input, and, | separates alternate right hand sides of productions.

(A)

FIRST(A)={a,b,ε}=FIRST(B)
FOLLOW(A)={a,b}
FOLLOW(B)={a,b,$}

237. The simple way to compression is removing : Spatial Redundancy.


238. void foo (char * a ) {

if (* a & & * a ! =' ' ){

putchar (*a);

The output of the above function on input 'ABCD EFGH' is : ‘D’


239. For finding lines at angle 45 we use mask of values : [2 -1 -1; -1 2 -1; -1 -1 2]

240. The grammar S → aSa | bS | c is : Both LL(1)and LR(1) ( LR(1) is more powerful than
LL(1))

241. A set of possible data values is called : Domain

242. A ring counter is same as. : Johnson Counter

243. Match all items in Group 1 with correct options from those given in Group 2.

Group 1 Group 2

P. Regular expression 1. Syntax analysis

Q. Pushdown automata 2. Code generation

R. Dataflow analysis 3. Lexical analysis

S. Register allocation 4. Code optimization

(B) P-3, Q-1, R-4, S-2

244. Which of the following is a problem of file management system? : depends on options

245. A shift register can be used for. : Shift registers are commonly used in converters that
translate parallel data to serial data, or vice-versa. Shift registers can also function as delay
circuits and digital pulse extenders.

246. Smoothing filters are mostly used in : blurring and noise reduction
247. A set of documents in which a given document can contain text, graphics video and
audio clips as well as embedded references to other documents world wide web pages are
called as : Website

248. Consider the following code segment.

x = u - t;

y = x * v;

x = y + w;

y = t - z;

y = x * y;

The minimum number of total variables required to convert the above code segment to static single
assignment form is : 10

249. Foreign key can be null : True

250.A Consider we are extracting an 8 bit plane from an 8bit image. Then which two bit plane contain the most significant information : Plane 8 and Plane 7
251. A synchronous sequential circuit is made up of. : from combinational logic and some storage elements.

252. Given the following structure template, choo


struct stud
{
int marks[6];
char sname[20];
char rno[10];
}s[10];
se the correct syntax for accessing the 5th subject marks of the 3rd student:

Answer : s[2].marks[4]

253 . Consider the following C code segment:


int a, b, c = 0;
void prtFun(void);
main( )
{ static int a = 1; /* Line 1 */
prtFun( );
a + = 1;
prtFun( )
printf(?\n %d %d ?, a, b);
}
void prtFun(void)
{ static int a=2; /* Line 2 */
int b=1;
a+=++b;
printf(?\n %d %d ?, a, b);
}
What output will be generated by the given code segment if:
Line 1 is replaced by auto int a = 1;
Line 2 is replaced by register int a = 2;
Answer : 42
42
20
254 . Convolution of two functions means rotating one function at angle of : 180*

255. How is a J-K flip-flop made to toggle? J = 1 , K = 1

256. ------ is the minimal super key: Primary key

257. Consider the intermediate code given below:

1. i = 1

2. j = 1

3. t1 = 5 * i

4. t2 = t1 + j

5. t3 = 4 * t2

6. t4 = t3

7. a[t4] = –1

8. j = j + 1
9. if j <= 5 goto(3)

10. i = i + 1

11. if i < 5 goto(2)

The number of nodes and edges in the control-flow-graph constructed for the above code,
respectively, are
Answer : 6 and 7

258 : Options unavailable

259. How many different states does a 3-bit asynchronous counter have? : 8

260. continuous image is digitised at _______ points. : sampling

261. f there are n relations how many number of join conditions has to be applied to retrieve
the data from all the n relations? : n-1

262.Consider the following program:

int f(int *p, int n)

if (n <= 1) return 0;

else return max ( f (p+1, n-1),p[0]-p[1]);

int main()
{

int a[] = {3,5,2,6,4};

printf("%d", f(a,5));

The value printed by this program is : 3

263. Principal sensing categories in eyes : cones

264. Which relational algebra query will return employees (i.e., EmpID) who work on all
projects? : depends on options

265. How many flip-flops are required to construct a mod10 counter? : 4

266.

Consider the following program in C language:

main()

int i;

int *pi = &i;

scanf("%d",pi);

printf("%d\n", i+5);

Which one of the following statements is TRUE?


267. Some code optimizations are carried out on the intermediate code because

(A) they enhance the portability of the compiler to other target processors

268. _______ produces the relation that has attributes of R1 and R2 : External join

269. Which method is used for loading the driver in Java JDBC. : registerDriver() method or

- Class.forName()

270. First derivative approximation says that values of constant intensities must be : 0

271. How many flip-flops are required to make a MOD-32 binary counter? 5

272.Which one of the following is FALSE?

Options unavailable

273. Every run length pair introduce new : Intensity

274. Which of the following operation is used if we are interested in only certain columns of a table?
Project

275. One of the purposes of using intermediate code in compilers is to :

increase the chances of reusing the machine-independent code optimizer in other compilers

276.

Which of the following input controls that cannot be placed using <input> tag?

277.
It is difficult to design asynhronous sequential circuit because.

278.

Consider the following two sets of LR(1) items of an LR(1) grammar.

X -> c.X, c/d


X -> .cX, c/d
X -> .d, c/d
X -> c.X, $
X -> .cX, $
X -> .d, $

Which of the following statements related to merging of the two sets in the corresponding LALR parser
is/are FALSE?

1. Cannot be merged since look aheads are different.


2. Can be merged but will result in S-R conflict.
3. Can be merged but will result in R-R conflict.
4. Cannot be merged since goto on c will lead to two different sets.

279.

Join is equal to

Ans:Combination of projection and Cartesian product

280.

Duality principle is used when SE is:symmetric

281.

Memory elements in clocked sequential circuits are called : flip flops

282.

Which of the following in HTML is used to left align the content inside a table cell?

283.
Popular application of flip-flop are.

284.

#include <stdio.h>

int main()
{
int a=10;
int b=2;
int c;

c=(a & b);


printf("c= %d",c);

return 0;
}

Find the output.

285.

A Steps for converting an analog image to digital

290.

#include <stdio.h>

#define MOBILE 0x01


#define LAPPY 0x02

int main()
{
unsigned char item=0x00;

item |=MOBILE;
item |=LAPPY;

printf("I have purchased ...:");


if(item & MOBILE){
printf("Mobile, ");
}
if(item & LAPPY){
printf("Lappy");
}

return 1;
}

291.

Select the conflicting operation:

292.

Which of the following describes a handle (as applicable to LR-parsing) appropriately?

(A) It is the position in a sentential form where the next shift or reduce operation will occur

(B) It is non-terminal whose production will be used for reduction in the next step

(C) It is a production that may be used for reduction in a future step along with a position in the sentential
form where the next shift or reduce operation will occur

(D) It is the production p that will be used for reduction in the next step along with a position in the
sentential form where the right hand side of the production may be found

Answer: (D)

293.

The grammar A → AA | (A) | ε is not suitable for predictive-parsing because the grammar is

(A) ambiguous

(B) left-recursive
(C) right-recursive

(D) an operator-grammar

Answer: (B)

294.

In the operation read_item(x), what does x mean?

295.

#include <stdio.h>

int main()
{
char flag=0x0f;

flag &= ~0x02;


printf("%d",flag);

return 0;
}

Predict the output.

296.

Fourier spectrum of noise is constant, the noise usually: White noise

297.

The clock signals are used in sequential logic circuits to

To synchronize events to the various parts of the system

298.

The harmonic mean filter works well for...........but fails for pepper noise. : salt noise

299.

Consider the grammar


S → (S) | a

Let the number of states in SLR(1), LR(1) and LALR(1) parsers for the grammar be n1, n2 and n3
respectively. The following relationship holds good

300.

Consider the relation R1(employee_name, project_name, dependent_name). If {{employee_name --


>-> project_name}, {employee_name -->-> dependent_name}}, what is the highest normal form it
satisfies?

301.

#include <stdio.h>

int main()

int a=10;

if(a==10)

printf("Hello...");

break;

printf("Ok");

else

printf("Hii");

}
return 0;

Find the output.

302.

The number of clock pulses needed to shift one byte of data from input to the output of a 4-bit shift
register is.

303.

If x--> y then y --> x. This statement is

304.

#include

int main()

if( (-100 && 100)||(20 && -20) )

printf("%s","Condition is true.");

else

printf("%s","Condition is false.");

return 0;

Find the output

305.

Which of the following grammar rules violate the requirements of an operator grammar ? P, Q, R are
nonterminals, and r, s, t are terminals.
1. P→QR

2. P→QsR

3. P→ε

4. P→QtRr

306.

If the pixels can not be reconstructed without error mapping is said to be

307.

What is asynchronous counter.

308.

Consider the grammar with the following translation rules and E as the start symbol.

E → E1 # T { E.value = E1.value * T.value }

| T{ E.value = T.value }

T → T1 & F { T.value = T1.value + F.value }

| F{ T.value = F.value }

F → num { F.value = num.value }

Compute E.value for the root of the parse tree for the expression: 2 # 3 & 5 # 6 & 4.

309.

What is meant by parallel-loading the register?

310.

In _______ image we notice that the components of histogram are concentrated on the low side on
intensity scale.

311.

#include

#define TRUE 1
int main()

if(TRUE)

printf("1");

printf("2");

else

printf("3");

printf("4");

return 0;

Find the output.

312.

A relation R is said to be in 2NF when it does not have

313.

Two sets of functional dependencies E and F are equivalent if E+ = F+ .This statement is

314.

In a bottom-up evaluation of a syntax directed definition, inherited attributes can

315.

#include <stdio.h>

int main()

int pn=100;
if(pn>20)

if(pn<20)

printf("Heyyyyy");

else

printf("Hiiiii");

return 0;

Find the output.

316.

What is the condition for resetting(s=0) the S flag in status register?

317.

The type of Histogram Processing in which pixels are modified based on the intensity distribution of
the image is called _______________.

318.

IF Y is a subset of X then

319.

What type of register would shift a complete binary number in one bit at a time and shift all the
stored bits out one bit at a time?

320.

An image is considered to be a function of a(x,y) where a represents

321.

#include

int main()
{

int a=10;

if(10L == a)

printf("10L");

else if(10==a)

printf("10");

else

printf("0");

return 0;

Find the output.

322.

Consider the grammar shown below.

S→CC

C→cC|d

The grammar is

323.

Spurious tuples are formed because of

324.

Consider the translation scheme shown below


S→TR

R → + T {print ('+');} R | ε

T → num {print (num.val);}

Here num is a token that represents an integer and num.val represents the corresponding integer value.
For an input string '9 + 5 + 2', this translation scheme will print

325.

Discontinuity based segmentation can be done by

326.

#include

void main(){

unsigned char c=290;

printf("%d",c);

Find the output

327.

Which of the following statements best describes the operation of a synchronous up-/down-counter?

328.

Which one of the following is True at any valid state in shift-reduce parsing?

329.

Query Tree uses

330.

Nearest neighbor interpolation method produces

331.
#include <stdio.h>

void main(){

int a=0;

a=5||2|1;

printf("%d",a);

Find the output.

332.

Which segments of a seven-segment display would be active to display the decimal digit 2?

333.

Match the following:

List-I List-II
A. Lexical analysis 1. Graph coloring
B. Parsing 2. DFA minimization
C. Register allocation 3. Post-order traversal
D. Expression evaluation 4. Production tree

Codes:
ABCD
(a) 2 3 1 4
(b) 2 1 4 3
(c) 2 4 1 3
(d) 2 3 4 1

334.

#include

int main(){
float a=125.50;

int b=125.50;

char c='A';

printf("%d,%d,%d\n",sizeof(a),sizeof(b),sizeof(125.50));

printf("%d,%d\n",sizeof(c),sizeof(65));

return 0;

What will be the output on a 32 bit compiler.

335.

What is the minimum number of NAND gates required to implement A + AB` + AB`C?

336.

In a 7 bit gray level image, the negative of gray level 50 is

337.

What is the highest normal form level satisfied by the following table design? R={A1,A2,A3,A4,A4}
F={A1-> A3, A3->A4}Key ={A1,A2}

338.

Among simple LR (SLR), canonical LR, and look-ahead LR (LALR), which of the following pairs identify
the method that is very easy to implement and the method that is the most powerful, in that order?

339.

If X->Y and X->Z then

340.

#include
int main()

int ok=-100;

-100;

printf("%d",ok);

return 0;

Find the output.

341.

A certain 5-bit self-complementary code is used to represent the 10 decimal digits 0 through 9.

Given that (246) in decimal is represented as 00010 00100 00110 in this code, what is the
representation for (375)?

342.

Discontinuity approach of segmentation depends upon

343.

Discontinuity approach of segmentation depends upon

344.

X->Y, XY->Z infers X->Z

345.

#include

enum numbers

zero, one, two, three , four=3,five,six,seven=0,eight

};
void main()

printf("%d,%d,%d,%d,%d,%d,%d,%d,%d",zero,one,two,three,four,five,six,seven,eight);

What will be the output.

346.

How many flip-flops are required to make a MOD-32 binary counter?

347.

Consider the following Syntax Directed Translation Scheme (SDTS), with non-terminals {S, A} and

terminals {a, b}}. Using the above SDTS, the output


printed by a bottom-up parser, for the input aab is

348.

To operate correctly, starting a ring counter requires

349.
350.

An engineer is tasked to verify a software release for a mission critical system. The plan is for the
release of software for verification to occur on a Monday, with verification complete the following
Friday. The release turns out not to be available until Thursday. The best route for the engineer is to:

351.

Given the functional dependencies, {AB -> CDE and A -> E}, for relation schema R = (A,B,C,D,E)
we can infer the following:
352.

#include <stdio.h>

int main(){

int a,b,c;

a=0x10; b=010;

c=a+b;

printf("\nAddition is= %d",c);

return 0;

Find the output.

353.

#include

int main()

int var=250;

printf("value of var = %d\n",var);

200+50;

"includehelp.com";

printf("%s\n","includehelp");

return 0;

}
Find the output

354.

Cartesian product in relational algebra is

355.

Consider the following languages.

Which one of the following statements is FALSE?

356.

The set of fundamental assumptions about what products the organization should produce, how and
where it should produce them, and for whom they should be produced is

357.

ASCII, EBCDIC, and Unicode are examples of ---------------

358.

DML is provided for

359.

The set of fundamental assumptions about what products the organization should produce, how and
where it should produce them, and for whom they should be produced is

360.

Find the output:

#include
int main()

int a=100;

printf("%d\n"+1,a);

printf("Value is = %d"+3,a);

return 0;

361.

Represent the decimal number 937.25 to Excess-4 form

362.

Consider the CFG with {S,A,B) as the non-terminal alphabet, {a,b) as the terminal alphabet, S as the start
symbol and the following set of production rules

S --> aB S --> bA
B --> b A --> a
B --> bS A --> aS
B --> aBB A --> bAA

Which of the following strings is generated by the grammar?

363.

What will be the output?

#include <stdio.h>

int main()

extern int ok;

printf("value of ok = %d",ok);

return 0;
}

extern int ok=1000;

364.

The language L= {0i21i | i≥0 } over the alphabet {0,1, 2} is:

365.

ODBC stands for

366.

Which one is not a self complementary code?

367.

In CMM, the life cycle activities of requirements analysis, design, code, and test are described in

368.

The decimal equivalent of hexadecimal number of ‘A580’ is

369.

Architecture of the database can be viewed as

370.

Find the output:

#include <stdio.h>

int main()

int a=23;

;printf("%d",a);

;
return 0;

371.

Which of the following is/are main parameters that you should use when computing the costs of a
software development project?

372.

373.

Following can be used to implement a SOP function without changing it into minterms

374.

Which one of the following models is not suitable for accommodating any change?

375.

#include
int main()

int intVar=24;

static int x=intVar;

printf("%d,%d",intVar,x);

return 0;

Find the output of this program, (program name is: static_ec.c)

376.

The language {am bn Cm+n | m, n ≥ 1} is

377.

In case of entity integrity, the primary key may be

378.

The language accepted by a Pushdown Automation in which the stack is limited to 10 items is best
described as

379.

#include <stdio.h>

int main()

int a=15;

float b=1.234;

printf("%*f",a,b);
return 0;

Predict the output?

380.

In an E-R diagram attributes are represented by

381.

A comparison between ring and Johnson counters indicates that:

382.

The three key levels at which responsibility can be defined is at the ____,_______,____

383.

In an E-R diagram an entity set is represent by a

384.

Usecase analysis focuses upon

385.

#include <stdio.h>

int main()

float a,b;

a=3.0f;

b=4.0f;

printf("%.0f,%.1f,%.2f",a/b,a/b,a/b);

return 0;
}

Find the output.

386.

Consider the NPDA 〈 Q = {q0, q1, q2}, Σ = {0, 1}, Γ = {0, 1, ⊥}, δ, q0, ⊥, F = {q2}〉 , where (as per usual
convention) Q is the set of states, Σ is the input alphabet, Γ is stack alphabet, δ is the state transition
function, q0 is the initial state, ⊥ is the initial stack symbol, and F is the set of accepting states, The state

transition is as follows: Which one of


the following sequences must follow the string 101100 so that the overall string is accepted by the
automaton?

387.

One application of a digital multiplexer is to facilitate:

388.

Flip-flop excitation tables shows that

389.

An engineer is tasked to verify a software release for a mission critical system. The plan is for the
release of software for verification to occur on a Monday, with verification complete the following
Friday. The release turns out not to be available until Thursday. The best route for the engineer is to:

390.

Count function in SQL returns the number of

391.

Which of the following languages are context-free?


L1 = {ambnanbm ⎪ m, n ≥ 1}

L2 = {ambnambn ⎪ m, n ≥ 1}

L3 = {ambn ⎪ m = 2n + 1}

392.

What type of declaration is this:

unsigned num;

393.

Which of the following is a legal expression in SQL?

394.

Which statement does not require semicolon?

395.

How is a J-K flip-flop made to toggle?

396.

Which one of the following is a valid project Key Performance Indicator (KPI)?

397.

Let G be the CFG, l be the number of left most derivations, r be the number of right most derivations and
P be the number of parse trees. Assume l , r and P are computed for a particular string. For a given CFG
‘G’ and given string ‘w’, what is the relation between l , P , r ?

398.

The combination of Sixteen adjacent squares in four variable K-map represent the function equal to

399.

Which of the following is a comparison operator in SQL?

400.
Find the output:

#include <stdio.h>

void main()

const char var='A';

++var;

printf("%c",var);

401.

Calculate the person months for a project that was completed in two months with two people working
on it.

402.

Consider 2 scenarios:

C1: For DFA (ϕ, Ʃ, δ, qo, F),


if F = ϕ, then L = Ʃ*
C2: For NFA (ϕ, Ʃ, δ, qo, F),
if F = ϕ, then L = Ʃ*
Where F = Final states set
ϕ = Total states set

Choose the correct option ?

403.

Consider the join of a relation R with relation S. If R has m tuples and S has n tuples, then the
maximum size of join is:

404.
Given the language L = {ab, aa, baa}, which of the following strings are in L*?

1) abaabaaabaa
2) aaaabaaaa
3) baaaaabaaaab
4) baaaaabaa

405.

FIND THE OUTPUT:

#include <stdio.h>

void main()

int x=10;

x+=(x++)+(++x)+x;

printf("%d",x);

406.

Functional requirements of a system is modelled using

407.

K-map follow following code for marking adjacent variables

408.

PREDICT THE OUTPUT:

#include <stdio.h>

void main()

int a=10,b=2,x=0;
x=a+b*a+10/2*a;

printf("value is =%d",x);

409.

The total number of pins for the IC 8255 is

410.

Consider the set of strings on {0,1} in which, every substring of 3 symbols has at most two zeros. For
example, 001110 and 011001 are in the language, but 100010 is not. All strings of length less than 3 are
also in the language. A partially completed DFA that accepts this language is shown below.

The missing arcs in the DFA are


411.

A B-tree of order m has maximum of _____________ children

412.

Who owns the Project Management Plan (PMP)?

413.

The IC 8237 is a

414.

Definition of a language L with alphabet {a} is given as following.

L={ | k>0, and n is a positive integer constant}

What is the minimum number of states needed in DFA to recognize L?

415.

#include <stdio.h>

void main()

unsigned short var='B';

var+=2;

var++;

printf("var : %c , %d ", var,var);

Find the output

416.
SELECT department_id, COUNT(last_name) FROM employees;

417.

How many stages are there in process improvement?

418.

SELECT department_id, AVG(salary) FROM employees WHERE AVG(salary) > 8000 GROUP BY
department_id

419.

Let w be any string of length n is {0,1}*. Let L be the set of all substrings of w. What is the minimum
number of states in a non-deterministic finite automaton that accepts L?

420.

IC 8237 has ------------------many pins

421.

Effective software project management focuses on four P's which are

422.

Find the output:

#include <stdio.h>

void main()

char var=10;

printf("var is = %d",++var++);

423.

Which one of the following is FALSE?


424.

IC 8257 has --------------------many channels for data transfer

425.

what is the output for the following function? LPAD(salary,10,'*')

426.

Find the output:

#include <stdio.h>

void main()

int x=(20 || 40 ) && (10);

printf("x= %d",x);

427.

What is the recommended distribution of effort for a software project?

428.
429.

The MC 1488 is

430.

SELECT last_name, SYSDATE-hire_date FROM employees;

431.

#include <stdio.h>

void main()

int x;

x= (printf("AA")||printf("BB"));

printf("%d",x);

printf("\n");
x= (printf("AA")&&printf("BB"));

printf("%d",x);

Find the output

432.

State the acronym of POMA in software project management

433.

SELECT employee_id, last_name FROM employees WHERE salary = (SELECT MIN(salary)


FROM employees GROUP BY department_id);

434.

The IC Number for USART is --------------------------

435.

Which of the following statements is false?

436.

What is the output?

#include <stdio.h>

void main()

int a=3,b=2;

a=a==b==0;

printf("%d,%d",a,b);

}
437.

The fundamental notions of software engineering does not account for ?

438.

The IC 8251 A has ---------------------many pins

439.

when you were asked to design a relation, you come across a situation, where passport number is to
be included for the people. All the students wont be having passport. So what constraint you would
be using?

440.

#include <stdio.h>

void main(){

int intVar=20,x;

x= ++intVar,intVar++,++intVar;

printf("Value of intVar=%d, x=%d",intVar,x);

Find the output

441.

Which one of the following statements best defines the purpose of a Product Breakdown Structure
(PBS)?

442.

Which of the following are regular sets?


443.

Which of the following is TRUE?

444.

The IC 8279 has ----------------------many pins

445.

#include <stdio.h>

int main(){

char val=250;

int ans;

ans= val+ !val + ~val + ++val;

printf("%d",ans);

return 0;

Find the output.

446.

Which of the following is not a technology driver for an information system?

447.

create table student_$( id number(4), namee varchar2(10)); reponse would be


448.

Which of the following languages is regular?

449.

During a software development project two similar requirements defects were detected. One was
detected in the requirements phase, and the other during the implementation phase. Which of the
following statements is mostly likely to be true?

450.

The IC 8254 has ---------------------many pins

451.

#include <stdio.h>

int main(){

float a;

(int)a= 10;

printf("value of a=%d",a);

return 0;

Find the output

452.

With SQL, how can you insert "Olsen" as the "LastName" in the "Persons" table?

453.
454.

The IC 8254 has ----------------many 16 bit counters

455.

Assuming today is , 10 July 2000, what is returned by this statement: SELECT


to_char(Last_DAY(sysdate), 'DD-MON-RR') FROM dual;

456.

Consider a software program that is artificially seeded with 100 faults. While testing this
program, 159 faults are detected, out of which 75 faults are from those artificially seeded faults.
Assuming that both are and seeded faults are of same nature and have same distribution, the
estimated number of undetected real fault is

457.

#include <stdio.h>

int main(){

int x;

x=100,30,50;

printf("x=%d\n",x);

x=(100,30,50);

printf("x=%d\n",x);
return 0;

Find the output

458.

Which character function can be used to return a specified portion of a character string?

459.

Each counter of IC 8254 can work in --------------differnt modes of operation

460.

#include <stdio.h>

int main()

int i=-1,j=-1,k=0,l=2,m;

m=i++&&j++&&k++||l++;

printf("%d %d %d %d %d",i,j,k,l,m);

return 0;

Find the output

461.

System reactions to external events is depicted by

462.
463.

Which of the regular expressions given below represent the following DFA?

I) 0*1(1+00*1)*
II) 0*1*1+11*0*1
III) (0+1)*1

464.

The difference between the Drop SQL clauses is:

465.

Waterfall model of software development is also termed as

466.

NOR Gate does NOT follow


467.

#include <stdio.h>

int main()

int var;

var=- -10;

printf("value of var= %d\n",var);

var=+ +10;

printf("value of var= %d\n",var);

return 0;

Find the output

468.

Which statement is true:

469.

Extreme Programming process model includes framework activities such as

470.

The length of the shortest string NOT in the language (over Σ = {a, b}) of the following regular expression
is ______________.

a*b*(ba)*a*

471.

The UNION SQL clause can be used with…


472.

#include <stdio.h>

int main()

int x,y;

x=(100,200);

y=100,200;

printf("x=%d,y=%d",x,y);

return 0;

Find the output

473.

The clock signals are used in sequential logic circuits to

474.

Arrange the operators according to their precedence: +, %, ->, =

475.

Consider the regular language L = (111 + 11111)*. The minimum number of states in any DFA accepting
this languages is:

476.

Which is a major problem with SQL?

477.
Important capability needed for an agile software developer is

478.

Which SQL functions is used to count the number of rows in a SQL query?

479.

The smallest finite automation which accepts the language {x | length of x is divisible by 3} has :

480.

In which phase is Agile Modeling(AM) carried out

481.

Find the output

#include <stdio.h>

int main()

int x=65;

const unsigned char c=(int)x;

printf("%c\n",c);

return 0;

482.

A binary code that progresses such that only one bit changes between two successive codes is:
483.

Consider a DFA over ∑ = {a, b} accepting all strings which have number of a’s divisible by 6 and number of
b’s divisible by 8. What is the minimum number of states that the DFA will have?

484.

The SQL BETWEEN operator

485.

#include <stdio.h>

int main()

int x=2.3;

const char c1=(float)x;

const char c2=(int)x;

printf("%d,%d\n",c1,c2);

return 0;

Find the output

486.

A software requirements specification (SRS) document should avoid discussing which one of the
following?

487.
In a BCD-to-seven-segment converter, why must a code converter be utilized?

488.

____________ is the 1st step in the testing process

489.

#include <stdio.h>

int main()

char *text="Hi Babs.";

char x=(char)(text[3]);

printf("%c\n",x);

return 0;

Find the output

490.

How many select lines would be required for an 8-line-to-1-line multiplexer?

491.

The function used to remove the leading spaces

492.

How many minimum states are required in a DFA to find whether a given binary string has odd number of
0's or not, there can be any number of 1's.
493.

Which of the following is not a Life-critical System?

494.

#include <stdio.h>

int main()

int x=65;

const unsigned char c=(int)x;

printf("%c\n",c);

return 0;

Find the output

495.

Consider the DFAs M and N given above. The number of states in a minimal DFA that accepts the

language L(M) ∩ L(N) is __________.

496.

Which date function is used to obtain the date of next Wednesday


497.

One can safely state that the output lines for a demultiplexer are under the direct control of the:

498.

1. This is a software development process model

499.

#include <stdio.h>

int main()

char *text="Hi Babs.";

char x=(char)(text+3);

printf("%c\n",x);

return 0;

Find the output

500.

Identify the proper data direction and modes of operation of the 8255 ports if the control word written
into it is 9BH.

501.

What is the maximum number of reduce moves that can be taken by a bottom-up parser for a grammar
with no epsilon- and unit-production (i.e., of type A -> є and A -> a) to parse a string with n tokens?

502.
Insert into Emp(101, ‘XXX’) gives the following error

503.

1. Software Specification is the process where

504.

#include <stdio.h>

void main()

int a=10;

switch(a){

case 5+5:

printf("Hello\n");

default:

printf("OK\n");

Find the output

505.

The following SQL is which type of join: SELECT CUSTOMER_T. CUSTOMER_ID, ORDER_T.
CUSTOMER_ID, NAME, ORDER_ID FROM CUSTOMER_T,ORDER_T ;

506.

Consider the following two sets of LR(1) items of an LR(1) grammar.

X -> c.X, c/d


X -> .cX, c/d
X -> .d, c/d
X -> c.X, $
X -> .cX, $
X -> .d, $

Which of the following statements related to merging of the two sets in the corresponding LALR parser
is/are FALSE?

1. Cannot be merged since look aheads are different.


2. Can be merged but will result in S-R conflict.
3. Can be merged but will result in R-R conflict.
4. Cannot be merged since goto on c will lead to two different sets.

507.

Which of the following command words need to be programmed to operate a single PIC in fully
nested mode with an 8086 microprocessor

508.

1. What is the type of software design that defines interfaces between


system components?

509.

Which of the following can be a valid column name?

510.

#include <stdio.h>

void main()

int a=2;

switch(a)

printf("Message\n");

default:
printf("Default\n");

case 2:

printf("Case-2\n");

case 3:

printf("Case-3\n");

printf("Exit from switch\n");

Find the output

511.

Which of the following is true for the language

512.

When operated in slave mode, the PIC outputs its type number only if the cascaded address
received on CAS0-CAS2 matches the address programmed in --------- bits D0-D2

513.

If L and L' are recursively enumerable, then L is

514.

#include <stdio.h>

void main()

int a=2;

int b=a;
switch(b)

case a:

printf("Case-a\n"); break;

case 3:

printf("Case-3\n"); break;

default:

printf("No option\n"); break;

printf("Exit from switch");

Find the output

515.

If the PIC outputs the type number of C8H, the CPU will retrive the vector stored in the address ------
--------

516.

What is a type of software design that designs system data structures to be


used in a database?

517.

Which of the following is shared between all of the threads in a process? Assume a kernel level
thread implementation

518.

Let L1 be a recursive language, and let L2 be a recursively enumerable but not a recursive language.
Which one of the following is TRUE?

L1' --> Complement of L1


L2' --> Complement of L2
519.

1. What is an advantage of incremental delivery?

520.

#include <stdio.h>

void main()

short day=2;

switch(day)

case 2: || case 22:

printf("%d nd",day);

break;

default:

printf("%d th",day);

break;

Find the output

521.

Which Instruction word is used to specify the number of stop bits, data bits, parity bit and the baud
rate clock factor for the 8251A USART

522.

Round Robin scheduling is the strategy of temporarily suspending a running process

523.
The interrupt cycle ends when the ........... instruction is executed

524.

Which of the following is true?

525.

#include <stdio.h>

void main()

short a=2;

switch(a)

case 1L:

printf("One\n");

break;

case 2L:

printf("Two\n");

break;

default:

printf("Else\n");

break;

Find the output

526.

An incorrectly typed command will cause the operating system to display


527.

Which activity most easily lends itself to incremental design?

528.

#include <stdio.h>

void main(){

static int staticVar;

int j;

for(j=0;j<=5;j+=2)

switch(j){

case 1:

staticVar++;

break;

case 2:

staticVar+=2;

case 4:

staticVar%=2;

j=-1;

continue;

default:

--staticVar;

continue;

printf("%d",staticVar);

}
Find the output

529.

System prototypes allow users

530.

A 32-bit address bus allows access to a memory of capacity

531.

With a single resource, deadlock occurs,

532.

baa*c denotes the set

533.

Use of ________ allows for some processes to be waiting on I/O while another process executes.

In 8086 microprocessor one of the following statements is not true

535.

A quadruple is a record structure with ______ fields.

536.

#include <stdio.h>

void main()

int a=2;

switch(a/2*1.5)

case 1:
printf("One...");

break;

case 2:

printf("Two...");

break;

default:

printf("Other...");

break;

Find the output

537.

Software prototyping helps

538.

#include <stdio.h>

void main(){

int a=1;

switch(a/2)

case NULL:

printf("Case NULL\n");

break;

case 0:
printf("Case ZERO\n");

break;

default:

printf("DEFAULT\n");

break;

Find the output

539.

______ OS pays more attention on the meeting of the time limits.

540.

What is NOT part of the design process

541.

The ________ ensures that only one IC is active at a time to avoid a bus conflict caused by two ICs
writing different data to the same bus

542.

An optimizing compiler

543.

The purpose of a TLB is

544.

#include <stdio.h>

int main()

{
int i;

for(i=0; i< 5; i++)

if(i*i > 30 )

goto lbl;

else

printf("%d",i);

lbl:

printf("IHelp ");

return 0;

Find the output

545.

How many operating modes are available in 8253A.

546.

Which of the following is not a part/product of requirements engineering?

547.

In the types of Three-Address statements, copy statements of the form x := y means

548.

What does microprocessor speed depends on

549.
A view is a

550.

#include <stdio.h>

#define TRUE 1

int main()

switch(TRUE)

printf("Hello");

Find the output

551.

The set of all strings over the alphabet {a,b} (including epsilon} is denoted by

552.

What takes the fundamental process activities of specification, development,


validation, and evolution and represents them as separate process phases such
as requirements specification, software design, implementation testing, and
so on?

553.

What is based on the idea of developing an initial implementation, exposing


this to user comment and evolving it through several versions until an
adequate system has been developed?

554.

Which one of the following languages over alphabet {0,1} is described by the regular expression:
(0+1)*0(0+1)*0(0+1)*?

555.

The best index for exact match query is

556.

The status that cannot be operated by direct instructions is

557.

#include < stdio.h >

void main()

{ unsigned char var=0;

for(var=0;var<=255;var++);

printf("%d ",var);

Find the output

558.

Which is not part of the waterfall method?

559.

Passing the request from one schema to another in DBMS architecture is called as _______

560.

How many DFAs exit with two state over the input alphabet (a,b)
561.

#include <stdio.h>

void main()

char cnt=0;

for(;cnt++;printf("%d",cnt)) ;

printf("%d",cnt);

Find the output

562.

How many trANSWERistors does the 8086 have

563.

The first processor to include Virtual memory in the Intel microprocessor familywas

564.

This software process model takes the fundamental activities of


specification, development, validation, and evolution and represents them as
separate process phases such as requirements specification, software design,
implementation, testing, and so on

565.

#include <stdio.h>

void main()

int i=1;

while (i<=5)
{

printf("%d",i);

if (i==5)

goto print;

i++;

fun()

print:

printf("includehelp.com");

Find the output

566.

The maximum number of superkeys for the relation schema R(E,F,G,H) with E as the key is

567.

Which one of the following regular expressions over {0,1} denotes the set of all strings not containing
100 as a substring?

568.

Assume that a table R with 1000 records is to be joined with another table S with 10000 records.
What is the maximum number of records that would result in if we join R with S and the equi-
join attribute of S is the primary key?
569.

The number of states in DFA is --------than the number of states in NFA for the same Language.

570.

Find the output

#include < stdio.h >

int main()

int tally=0;

for(;;)

if(tally==10)

break;

printf("%d ",++tally);

return 0;

571.

The ESC instruction of 8086 may have two formats. In one of the formats, no memory operand is
used. Under this format, the number of external op-codes (for the co- processor) which can be
specified is

572.

Which statement best describes a benefit of Incremental development over the


waterfall model
573.

#include <stdio.h>

void main()

int tally;

for(tally=0;tally<10;++tally)

printf("#");

if(tally>6)

continue;

printf("%d",tally);

Find the output

574.

DB, DW and DD directives are used to place data in particular location or to simplyallocate space
without preassigning anything to space. The DW and DD directories areused to generate

575.

In incremental development system structure tends to ______ as many new


increments are added.

576.

Consider a schedule S1 given below;

R1(A); W1(A); R2(B); R2(A); R1(B); W2(A+B); W1(B); where R1 and W1 are read and write
operations of transaction T1 and R2 and W2 are read and write operations of transaction T2.
Which of the following is correct regarding schedule S1?

577.

If M1 machine recognizing L with n states, then M2 recognizing L* constructed Using Thompson


construction will have ------------- states.

578.

When FA M is given which recognizes language L and reverse of L is found by using M then there
can be ___________Final states

579.

In reuse-oriented software engineering the last stage is _________.

580.

#include <stdio.h>

void main()

int i,j,charVal='A';

for(i=5;i>=1;i--)

for(j=0;j< i;j++)

printf("%c ",(charVal+j));

printf("\n");

}
Identify the output

581.

In a microprocessor, the service routine for a certain interrupt starts from a fixed location of memory
which cannot be externally set, but the interrupt can be delayed or rejected. Such aninterrupt is

582.

The Hardware mechanism that enables a device to notify the CPU is called __________.

583.

In incremental delivery the ________ services are typically delivered first

584.

#include <stdio.h>

void main()

int cnt=1;

while(cnt>=10)

printf("%d,",cnt);

cnt+=1;

printf("\nAfter loop cnt=%d",cnt);

printf("\n");

Find the output

585.
When there is complete DFA with Five states out of which two are final states if F is modified such
that it recognizes complement of the original language then there will be at least _________final
states.

586.

In the running state

587.

The --------is neither an input nor an output; it is an internal bit programmed via the PC4(Port A) or
PC2(Port B)bits

588.

The kernel keeps track of the state of each task by using a data structure called __

589.

The number of states in a machine M recognizing L1UL2 will be __________________ where n is


the number of states in M1 and m is the number of states in M2 .

590.

Software specifications are intended to communicate the system needs


__________________

591.

___ bit in ICW1 indicates whether the 8259A is cascade mode or not

592.

#include

#define TRUE 1

int main()

int loop=10;
while(printf("Hello ") && loop--);

Find the output

593.

Number of the times the instruction sequence below will loop before coming out of loop is, MOV AL,
00h A1: INC AL JNZ A1

594.

What is the most common approach for the development of application system
now?

595.

_________ does the job of allocating a process to the processor.

596.

How many two state FA can be drawn over alphabet{0,1} which accepts(0+1)*

597.

#include <stdio.h>

int main()

static int var[5];

int count=0;

var[++count]=++count;

for(count=0;count<5;count++)

printf("%d ",var[count]);
return 0;

Find the output

598.

Which of the following four activities that may be a part of the design
process for information systems is where you design the system data
structures and how these are to be represented?

599.

In interactive environments such as time-sharing systems, the primary requirement is to provide


reasonably good response time and in general, to share system resources equitably. In such
situations, the scheduling algorithm that is most popularly applied is ________.

600.

(a+b)(cd)*(a+b) denotes the following set

601.

#include <stdio.h>

int main()

int MAX=10;

int array[MAX];

printf("size of array is = %d",sizeof(array);

return 0;

}
Find the output

602.

8086 microprocessor is interfaced to 8253 a programmable interval timer. The maximum number by
which the clock frequency on one of the timers is divided by

603.

When there is more than one final state in the reduced FA, then its regular expression will contain
_________ operator surely

604.

What is a software process model?

605.

LOCK prefix is used most often

606.

#include <stdio.h>

#define MAX 10

int main()

{ int array[MAX]={1,2,3},tally;

for(tally=0;tally< sizeof(array)/sizeof(int);tally+=1)

printf("%d ",*(tally+array));

return 0;

Find the output

607.

In the multi-programming environment, the main memory consisting of _________ number of


process.
608.

#include <stdio.h>

int main()

{ static int x[]={'A','B','C','D','E'},tally;

for(tally=0;tally< sizeof(x)/sizeof(int) ; tally+=1)

printf("%c,%c,%c\n",*(x+tally)+1,x[tally]+1,*(tally+x)+1);

return 0;

Find the output

609.

Activities such as documentation and software configuration management are


what kind of process activities?

610.

n 8086 microprocessor the following has the highest priority among all type interrupts

611.

In Priority Scheduling a priority number (integer) is associated with each process. The CPU is
allocated to the process with the highest priority (smallest integer = highest priority). The problem of,
Starvation ? low priority processes may never execute, is resolved by __________.

612.

A data structure where elements can be added or removed at either end but not in the middle

613.

CPU Scheduling is the basis of _________ operating system

614.

_________ has a dedicated communication path between stations


615.

___________ signal prevent the microprocessor from reading the same data more than one

616.

The Epsilon-Closure of any state q will contain the state ______________ irrespective of q.

617.

#include <stdio.h>

int main()

{ static int array[]={10,20,30,40,50};

printf("%d...%d",*array,*(array+3)* *array);

return 0;

Find the output

618.

A major problem with priority scheduling is _________.

619.

Which buffer is a parallel to serial converter that receives a parallel byte for conversion into a serial
signal and further transmission onto the communication channel.

620.

What is the order of the stages in the waterfall mode?

621.

The Epsilon-Closure of any state q will contain the state ______________ irrespective of q.

622.

#include <stdio.h>
int main()

{ int a[5]={1,2,3,4,5},b[5]={10,20,30,40,50},tally;

for(tally=0;tally< 5;++tally)

*(a+tally)=*(tally+a)+ *(b+tally);

for(tally=0;tally< 5;tally++)

printf("%d ",*(a+tally));

return 0;

Find the output

623.

The minimum length for strings in the regular expression ( 10* + 001* )* is _________

624.

Identify the accurate control word for operate counter 0, Read/Write LSB only, Mode 2, BCD
countdown.

625.

________ scheduler selects the jobs from the pool of jobs and loads into the ready queue.

626.

#include <stdio.h>

int main()

{ int a[5]={0x00,0x01,0x02,0x03,0x04},i;
i=4;

while(a[i])

printf("%02d ",*a+i);

--i;

return 0;

Find the output

627.

______________ is an initial version of a software system that is used to demonstrate concepts, try
out design options, and find out more about the problem and its possible solutions.

628.

____ messages are typically used for diagnostic or control purposes or generated in response to
errors in IP operations.

629.

A variable P is called pointer if

630.

Which directory implementation is used in most of the Operating Systems?

631.

#include <stdio.h>

int main()

{
char X[10]={'A'},i;

for(i=0; i<10; i++)

printf("%d ",X[i]);

return 0;

Find the output

632.

The ........ instruction is used to specify the number of stop bits, data bits,parity bit, and baud rate
clock factor for the 8251 UART

633.

Using the 8259A, the INT input of the 8086 can be expanded to accomodeate up to ---------------
prioritized interrupt inputs

634.

Which of the following regular expression denotes a language comprising of all possible strings over
{a,b} of length n where n is a multiple of 3?

635.

_______ appends to the address a slash character and the decimal number of leading bits of the
routing prefix.

636.

Pick an incorrect declaration:

1. int x[5];

2. int x[5]={1,2,3,4,5};

3. int x[5] = {1,2}


4. int x[];

637.

Resource locking ________.

638.

__________ algorithm is used for the flow control of data between sender and receiver.

639.

The difference between linear array and a record is

640.

Which one of the following correctly describes the meaning of 'namespace' feature in C++?

641.

If AL= 7FH and instruction ADD AL,1 is given, specify the contents of the six status flag

642.

Which of the following is not the attribute of FCB?

643.

Which of the following language feature is not an access specifier in C++?

644.

Consider the regular language L = (111 + 11111)*. The minimum number of states in any DFA
accepting the language is

645.

______ cryptography refers to encryption methods in which both the sender and receiver share the
same key.

646.

The starting address for counter 0 of 8253 is 0038H, then port address for control word register is

647.
A tree sturctured file directory system

648.

The postfix expression for * + a b - c d is?

649.

Which one of the file allocation scheme cannot be adopted for dynamic storage allocation

650.

Which of the following is not a type of constructor?

651.

The counters of 8253 can be operated in -------- modes of operation.

652.

______ is responsible for the final encapsulation of higher-level messages into frames that are sent
over the network using the physical layer.

653.

The other name for MODE 0 in 8253 timer is

654.

The switching method fixes the path from source to destination is _________

655.

In C++, dynamic memory allocation is accomplished with the operator ____

656.

Calculate the block number in free storage management of files system with number of bits per word
is 8, the bit vector is

0001101010101, offset of first 1 bit is 3

657.

Which of the following algorithm design technique is used in the quick sort algorithm?

658.
Which of the following is useful in traversing a given graph by breadth first search?

659.

Which of the following is false for cin?

660.

Which directory implementation method creates more dangling pointers?

661.

There is no connection setup phase in __________

662.

Given the frequency f=1.5MHZ for 8253 timer the value of time period T is

663.

The members of a class, by default, are

664.

The number of counters available in internal block diagram of 8253 is

665.

The minimum number of arithmetic operations required to evaluate the polynomial P(X) = X^5 +
4X^3 + 6^X + 5 for a given value of X using only one temporary variable.

666.

An activity is said to be critical if slack time is equal to

667.

In access lists and groups which one of the following is correct for the 'RWX' notation of the order
'group, owner, public'

668.

You have to sort a list L consisting of a sorted list followed by a few “random” elements.Which of the
following sorting methods would be especially suitable for such a task?

669.

Which one of the following is not a windows file system?


670.

The call to the parameterized constructor of base class in the derived class

671.

The internal block diagram of 80286 contains ---- functional parts.

672.

Evolutionary software process models

673.

Why 'critical section' is not imposed on file systems instead 'file locks' when more than one process
tries to access the file?

674.

The spiral model of software development

675.

Which of the following statements is NOT valid about operator overloading?

676.

The 16-bit stack segment value is 5D27H and the offset is 2C30H. calculated physical address is ----
-

677.

FAT file system is

678.

The virtual file system provides us the following

679.

What is the return type of the conversion operator function?

680.

Given the Extra segment ES = 52B9H and the offset BX=D470H. Calculated physical address is -----
-----
681.

The best way to conduct a requirements validation review is to

682.

Specify the 2 library functions to dynamically allocate memory?

683.

The use of traceability tables helps to

684.

Identify the addressing mode for the instruction MOV AH,47H

685.

If the disk size is 2^30 bytes and block size is 2^12 bytes then find how many such blocks are there?

686.

Which of the following statements is/are TRUE for an undirected graph?P:Number of odd degree
vertices is even,Q: Sum of degrees of all vertices is even

687.

If the class name is X, what is the type of its "this" pointer?

688.

If a constructor function is defined in private section of a class, then

689.

The 16-bit data segment value is 1000H and the offset is 2000H. calculated physical address is -----

690.

To Delete an item from a Queue identify the correct set of statements

691.

Which of the following file access method needs a relative block number 'n'?

692.
Which of these is not an element of an object-oriented analysis model?

693.

Given the Code segment CS = 1000H and the offset BX=0050H. Calculated physical address is -----
-----

694.

What is the data structures used to perform recursion?

695.

________________ is a basic unit of CPU utilization

696.

The stream insertion operator should be overloaded as

697.

_____ gives the number of bits that can be transmitted over a network in a fixed time period.

698.

class A { int a; static float b; } ; What is the size of class A?

699.

The restriction while using the binary search is ?

700.

Parallelism and concurrency is fully achieved in which of the following thread model

701.

_______ is assigned to an organization by a global authority.

702.

If AL=C0H, Determine the content of the register AL after SAL AL,1 instruction is executed.

703.

The high paging activity is called ________

704.
Assume the base address of CS is 3000H and IP is 2000H. Calculate the memory address.

705.

_______ should keep track of multiple file downloads requested by a particular FTP application, or
multiple telnet connections from a single terminal client, or web page retrievals from a web server.

706.

Data Members of the base class that are marked private:

707.

Which Data structure is best suited for the UNDO operation in Windows

708.

Class ____ IP addresses are used for large organizations

709.

Virtual memory is __________

710.

In linear search algorithm the Worst case occurs when

711.

Identify different segments in a program

712.

Which of the following (in file scope) leads to a compile-time error?

713.

The default copy constructor performs

714.

what is the need of segmenting the memory in 8086

715.

Simple network management protocol (SNMP) is implemented with a daughter board in

716.

An unambiguous grammar has


717.

_________ states that Optimal Replacement algorithm

718.

_________ is a high speed cache used to hold recently referenced page table entries a part of
paged virtual memory

719.

The value in AL=11011010 after the operation of CBW, the result is

720.

The entity relationship diagram

721.

Which of the following statements about queues is incorrect?

722.

which of the following is an incorrect definition inside a class ?

723.

The state diagram

724.

Which of the following statements is/are FALSE?

725.

In a virtual memory environment

726.

Which one of the following is the correct way to declare a pure virtual function?
727.

Given CF=0, BX=00111011 01110101 ROR BX,1. The result is

728.

Mode of communication in which transmission takes place in both directions, but only in one
direction at a time is called.........................

729.

Usually a pure virtual function

730.

If all page frames are initially empty, and a process is allocated 3 page frames in real memory and
references its pages in the order 1 2 3 2 4 5 2 3 2 4 1 and the page replacement is FIFO, the total
number of page faults caused by the process will be __________

731.

If you have an empty queue and you insert characters ‘r’, ‘a’, ‘t’ (in this order only), what is the order
of the characters when you dequeue all the elements?

732.

Which of the following is not a form of memory ?

733.

_________ memory management scheme will produce least fragement

734.

In the absolute the addressing mode

735.

Network operating system that does not support symmetric multi-processing (SMP) is

736.

Which of the following operator can be overloaded through friend function?


737.

Which of the following statement is false?

738.

The topology with highest reliability is .........................

739.

Replace the page that has not be used for the longest period of time. This principle is adopted by
____________

740.

The language is L={0p1q0r | p,q,r ³ 0 , p ¹ r} is

741.

Which of the following addressing modes are suitable for program

relocation at run time?

1. Absolute addressing

2. Based addressing

3. Relative addressing

4. Indirect addressing

742.

If class A is friend of class B and if class B is friend of class C, which of the following is true?

743.
Which of the following conversion is not possible (algorithmically)?

744.

Which of the following is not the characteristic of constructor?

745.

The access method used for magnetic tape is_________

746.

A page fault occurs

747.

Bit stuffing refers to

748.

The minimum number of arithmetic operations required to evaluate the polynomial


P(X)=X^5+4X^3+6^X+5 for a given value of X using only one temporary variable.

749.

The language that the computer can understand and execute is called ______

750.

In which topology, if there are n devices in a network, each device has n-1 ports for cables?

751.

Routine is not loaded until it is called. All routines are kept on disk in a relocatable load format. The
main program is loaded into memory & is executed. This type of loading is called _________

752.

A static data member is given a value

753.

A network that contains multiple hubs is most likely configured in which topology?
754.

Write the regular expression to denote the language L over ? ={ a,b} such that all the string do not
contain the substring “ ab”.

755.

How many instances of an abstract class can be created?

756.

Information retrieval is faster from

757.

The mechanism that bring a page into memory only when it is needed is called ______

758.

What will be the result of the expression 13 & 25

759.

A Winchester disk is a

760.

How many nodes in a tree have no ancestors.

761.

Demand paged memory allocation

762.

In context of OSI or TCP/IP computer network models, which of the following is false?

763.

Which of the following is not hardware:

764.
Function templates can accept

765.

Thrashing occurs ________

766.

Which one of the following uses 8B/6T encoding scheme

767.

Which of the following regular expression identities are true?

768.

A packet switching network

769.

Multiple choice examination answer sheets can be evaluated automatically by

770.

The removal of process from active contention of CPU and reintroduce them into memory later is
known as ____________

771.

The number of components in a graph with n nodes and 1 edge are

772.

In which case is it mandatory to provide a destructor in a class?

773.

Which of the following statement is false?


774.

The main purpose of a data link content monitor is to

775.

If we create a file by ‘ifstream’, then the default mode of the file is _________

776.

Paging _________

777.

Which of the following would cause quickest access

778.

Assume that we have constructor functions for both base class and derived class. Now consider the
declaration in main( ). Base * P = New Derived; in what sequence will the constructor be called ?

779.

The number of components in a graph with n nodes and 1 edge are

780.

Which of the following memory allocation scheme suffers from External fragmentation?

781.

The process of retaining data for future use is called

782.

Which of the following is a wrong example of network layer

783.

class n{ public: int *a;}o,p; assigning o=p is called?

784.

Consider two strings A ='qpqrr' and B = 'pqprqrp'. Let x be the length of the LCS between A and B
and let y be the number of such longest common subsequences between A and B. Then x + 10y =

785.
Logical addressing is used in _____ layer

786.

A system uses FIFO policy for page replacement. It has 4 page frames with no pages loaded to
begin with. The system first accesses 100 distinct pages in some order and accesses the same 100
pages but now in the reverse order how many page faults will occur?

787.

Magnetic tapes are good storage media for

788.

The MMU (Memory Management Unit) is a

789.

A grammar that produces more than one parse tree for some sentence is called

790.

overloading + operator requires return type as object because,

791.

Floating point representation is used to store

792.

________ functions as a request-response protocol in the client-server computing model.

793.

In computers, subtraction is generally carried out by

794.

Pee hole optimization

795.

All devices/host connect to a central switch in _____ topology


796.

Which of the following is true?

797.

To create an alias Objects have to be passed by

798.

Let G(x) be the generator polynomial used for CRC checking. What is the condition that should be
satisfied by G(x) to detect odd number of bits in error?

799.

Using linked list node representation, inserting a node in general tree is performed efficently

800.

What will be the status of a computer during storage compaction

801.

Templates improve

802.

What characteristic of RAM memory makes it not suitable for permanent storage?

803.

Frames of 1000 bits are sent over a 10^6 bps duplex link between two hosts. The propagation time
is 25ms. Frames are to be transmitted into this link to maximally pack them in transit (within the link).
What is the minimum number of bits, i will be required to represent the sequence numbers distinctly?
Assume that no time gap needs to be given between transmission of two frames.

804.

Suppose P, Q, R, S, T are sorted sequences having lengths 20,24,30,35,50 respectively. They are
to be merged into a single sequence by merging together two sequences at a time. The number of
comparisons that will be needed in the worst case by the optimal algorithm for doing this is ____

805.
Computers use addressing mode techniques for _____________________.

806.

Calculate the EAT(Effective access time) if 5 micro second is associative look-up time and 0.80 is
the hit-ratio in paging hardware with TLB

807.

Creating additional function similar to template function is called

808.

Consider the data of previous question. Suppose that the sliding window protocol is used with the
sender window size of 2^i where is the number of bits identified in the previous question and
acknowledgments are always piggybacked. After sending 2^i frames, what is the minimum time the
sender will have to wait before starting transmission of the next frame? (Identify the closest choice
ignoring the frame processing time).

809.

The average time required to reach a storage location in memory and obtain its contents is called
the

810.

Compile time polymorphism is

811.

The segment number s is legal if

812.

In general tree to binary tree conversion, the two links of the binary tree node points to

813.

Abstraction is

814.

Station A uses 32 byte packets to transmit messages to Station B using a sliding window protocol.
The round trip delay between A and B is 80 milliseconds and the bottleneck bandwidth on the path
between A and B is 128 kbps. What is the optimal window size that A should use?
815.

Which is not related to deadlock avoidance?

816.

The idea of cache memory is based

817.

In operator precedence parsing , precedence relations are defoned

818.

Which one of the following is not the process of Deadlock Recovery?

819.

Pick the odd one out.

820.

An intermediate code form is

821.

Two computers C1 and C2 are configured as follows. C1 have IP address as 203.197.2.53 and
netmask 255.255.128.0. C2 have IP address as 203.197.75.201 and netmask 255.255.192.0. Which
one of the following statements is true?

822.

Which of the following is lowest in memory hierarchy?

823.

A collection of unused memory reserved for dynamic allocation is called

824.

If the size of logical address space is 2 to the power of m, and a page size is 2 to the power of n
addressing units, then the high order _____ bits of a logical address designate the page number,
and the ____ low order bits designate the page offset.
825.

Relocating bits used by relocating loader are specified by

826.
Station A needs to send a message consisting of 9 packets to Station B using a sliding window
(window size 3) and go-back-n error control strategy. All packets are ready and immediately
available for transmission. If every 5th packet that A transmits gets lost (but no acks from B ever get
lost), then what is the number of packets that A will transmit for sending the message to B?

A. 16 [http://www.geeksforgeeks.org/gate-gate-cs-2006-question-46/]

827.
In Assembly language programming, minimum number of operands required for an instruction is/are

A. 0

828.
The memory unit that communicates directly with the CPU is called the

A. Main memory [http://www.siteforinfotech.com/2013/12/computer-organization-architecture-


objective-questions.html]

829.
The levels of hierarchy in inheritance helps to handle

A. –Could be many thing, depending on the options---

830.
The tightest upper bound for the worst case performance of quicksort implemented on an array of n
elements by always chosing the pivot as the central element is
A. O(n^2)

831.
In Ethernet when Manchester encoding is used, the bit rate is:

A. Half the baud rate.

832.
Run time polymorphism is achieved by ______

A. Virtual Functions

833.
Synthesized attribute can be easily simulated by a

A. LR Grammar

834.
In which addressing mode the operand is given explicitly in the instruction

A. Immediate mode.

835.
There are n stations in a slotted LAN. Each station attempts to transmit with a probability p in each
time slot. What is the probability that only one station transmits in a given time slot?
A. np(1-p)^(n-1) [http://www.geeksforgeeks.org/computer-networks-set-9/]

836.
A property which is not true for classes is that they

A. answer depends on options

837.
A stack organized computer has

A. Zero addressing.

838.
Any code inside a loop that always computes the same value can be moved before the loop. This is
called

A. Loop invariant code.

839.
In a token ring network the transmission speed is 10^7 bps and the propagation speed is 200
metres/micro second. The 1-bit delay in this network is equivalent to:

A. 20 metres of cable [http://www.geeksforgeeks.org/computer-networks-set-9/]

840.
Overloading involves writing two or more functions with ________
A. the same name and different argument lists.

841.
What is the maximum size of data that the application layer can pass on to the TCP layer below?

A. Any size [http://www.geeksforgeeks.org/computer-networks-set-8/]

842. The searching technique that takes O (1) time to find a data is

A. Hashing.

843.
The load instruction is mostly used to designate a transfer from memory to a processor register
known as____.

A. Accumulator.

844.
Usually a pure virtual function

A. –depends on options—

845.
A client process P needs to make a TCP connection to a server process S. Consider the following
situation: the server process S executes a socket(), a bind() and a listen() system call in that order,
following which it is preempted. Subsequently, the client process P executes a socket() system call
followed by connect() system call to connect to the server process S. The server process has not
executed any accept() system call. Which one of the following events could take place?

A. connect()connect() system call returns an error

846. A group of bits that tell the computer to perform a specific operation is known as____.

A. Instruction code.

847.
Suppose x is dead, that is, never subsequently used, at the point where the statement x=y+z
appears in a basic block. Then this statement may be safely removed without changing the value of
the basic block. This transformation is known as __________________ .

A. Structure preserving transformation.

848.
A computer on a 10Mbps network is regulated by a token bucket. The token bucket is filled at a rate
of 2Mbps. It is initially filled to capacity with 16Megabits. What is the maximum duration for which the
computer can transmit at the full 10Mbps?

A. 2 seconds

849.
which of the following intermediate language can be used in intermediate code generation?

A. postfix/syntax tree/3 address code


950. Aging registers’ are _______.

A. Counters which indicate how long ago their associated pages have been

referenced.

851.
#include <stdio.h>
#include <string.h>
int main()
{
int val=0;
char str[]="IncludeHelp.Com";

val=strcmp(str,"includehelp.com");
printf("%d",val);
return 0;
}

Find the output

A. -1

852.
Which of the following system calls results in the sending of SYN packets?

A. connect

853.
Postorder Tree travsersal is recursive

A. depends on options

854.
#include <stdio.h>
#include <string.h>
int main()
{
char str[];
strcpy(str,"Hello");
printf("%s",str);
return 0;
}
Find the output

A. Error

855.
Memory unit accessed by content is called______

A. Associative memory.

856.
_________ register keeps tracks of the instructions stored in program stored in memory.

A. PC program counter

857.
#include <stdio.h>
int main()
{
char str[8]="IncludeHelp";
printf("%s",str);
return 0;
}

Find the output

A. Error

858.
In the context of abstract-syntax-tree (AST) and control-flow-graph (CFG), which one of the following
is True?

A. The maximum number of successors of a node in an AST and a CFG depends on the input
program

859.
In the slow start phase of the TCP congestion control algorithm, the size of the congestion window
.....................

A> increases exponentially.

860.
If a class B network on the Internet has a subnet mask of 255.255.248.0, what is the maximum
number of hosts per subnet?

A. 2046

861.
In an array representation of binary tree, the left child of i th node is located at

#include <stdio.h>
#include <string.h>
int main()
{
char str1[]="IncludeHelp",str2[]=".Com";
printf("%s",str1+strlen(str2));
return 0;
}

Find the output

A. udeHelp
863.
PSW is saved in stack when there is a _____.

A. Interrupt recognized [http://mcqhelp.blogspot.in/]

864.
A priority queue is implemented as a Max-Heap. Initially, it has 5 elements. The level-order traversal
of the heap is: 10, 8, 5, 3, 2. Two new elements 1 and 7 are inserted into the heap in that order. The
level-order traversal of the heap after the insertion of the elements is:

A. 10, 8, 7, 3, 2, 1, 5 [http://www.geeksforgeeks.org/gate-gate-cs-2014-set-2-question-22/]

865.
The main memory in a Personal Computer (PC) is made of_____.

A. Both cache and RAM.

866. Suppose the round trip propagation delay for a 10 Mbps Ethernet having 48-bit jamming signal
is 46.4 ms. The minimum frame size is:

A. 512 bits [https://gateoverflow.in/1397/gate2005-74]

867.
#include <stdio.h>
int main()
{
char str[]="Hello%s%dFriends";
printf(str);
printf("\n");
printf("%s",str);
return 0;
}

Find the output

A. Hello(null)0Friends

Hello%s%dFriends [http://www.includehelp.com/c-programs/c-strings-aptitude-questions-and-answers.aspx]

868.
Shift reduce parsers are

A. dpends on options

869.
#include <stdio.h>
int main()
{
char str[]="value is =%d";
int a='7';
str[11]='c';
printf(str,a);
return 0;
}

Find the output

A. value is 7

870. An organization has a class B network and wishes to form subnets for 64 departments. The
subnet mask would be:
A> 255.255.252.0

871.
Virtual memory consists of _______.

A. SRAM.

872.
#include <stdio.h>
int main()
{
char result,str[]="\0IncludeHelp";
result=printf("%s",str);
if(result)
printf("TRUE");
else
printf("FALSE");
return 0;
}

Find the output

A. FALSE

873.
Generally Dynamic RAM is used as main memory in a computer system as it______.

A. Has higher speed.

874. In an array representation of binary tree, the right child of i th node is located at

A. 2*i+2
875.
Packets of the same session may be routed through different paths in:

A. TCP and UDP

876.
Write Through technique is used in which memory for updating the data _____.

A. Cache memory.

877.
#include <stdio.h>
#include <string.h>
int main()
{
char s1[]="IncludeHelp";
char s2[10];

strncpy(s2,s1,5);
printf("%s",s2);
return 0;
}

Find the output

A. IncluGARBAGE_VALUE

878. Local and loop optimization in turn provide motivation for

A. data flow analysis

879.
The address resolution protocol (ARP) is used for:

A. depends on options

880.
The maximum window size for data transmission using the selective reject protocol with n-bit frame
sequence numbers is:

A> 2^(n-1)

IMP links:

1. http://mcqhelp.blogspot.in/

2. http://www.includehelp.com/c-programs/c-strings-aptitude-questions-and-answers.aspx

3. https://gateoverflow.in/

4. geeks for geeks sets and gate qa

881.

#include <stdio.h>

#include <string.h>

int main()

char str[50]="IncludeHelp";

printf("%d...%d",strlen(str),sizeof(str));
return 0;

Find the output

882.

The worst case running time to search for an element in a balanced in a binary search tree with
n*2^n elements is

883.

Cache memory acts between_______.

884.

In a syntax directed translation schema ,if value of an attribute of a node is function of the values of
the attributes of its children , then it is called

885.

Find the output

#include <stdio.h>

struct sample

int a=0;

char b='A';

float c=10.5;

};

int main()

{
struct sample s;

printf("%d,%c,%f",s.a,s.b,s.c);

886.

In a network of LANs connected by bridges, packets are sent from one LAN to another through
intermediate bridges. Since more than one path may exist between two LANs, packets may have to
be routed through multiple bridges. Why is the spanning tree algorithm used for bridge-routing?

887.

The truth table

X Y f(X,Y)

0 0 0

0 1 0

1 0 1

1 1 1

represents the Boolean function

888.

One of the header fields in an IP datagram is the Time to Live (TTL) field. Which of the following
statements best explains the need for this field?
889.

Suppose a circular queue of capacity (n – 1) elements is implemented with an array of n elements.


Assume that the insertion and deletion operation are carried out using REAR and FRONT as array
index variables, respectively. Initially, REAR = FRONT = 0. The conditions to detect queue full and
queue empty are

890.

#include <stdio.h>

int main()

struct sample{

int a;

int b;

sample *s;

}t;

printf("%d,%d",sizeof(sample),sizeof(t.s));

return 0;

Find the output

891.

Consider a main memory system that consists of 8 memory modules attached to the system bus,
which is one word wide. When a write request is made, the bus is occupied for 100 nanoseconds
(ns) by the data, address, and control signals. During the same 100 ns, and for 500 ns thereafter,
the addressed memory module executes one cycle accepting and storing the data. The (internal)
operation of different memory modules may overlap in time, but only one request can be on the
bus at any time. The maximum number of stores (of one word each) that can be initiated in 1
millisecond is
892.

#include <stdio.h>

#include < string.h >

struct student

char name[20];

}std;

char * fun(struct student *tempStd)

strcpy(tempStd->name,"Thomas");

return tempStd->name;

int main()

strcpy(std.name,"Mike ");

printf("%s%s",std.name,fun(&std));

return 0;

Find the output


893.

Which of the following statements is true?

894.

A layer-4 firewall ( a device that can look at all protocol headers up to the transport layer) cannot

895.

Pre-emptive scheduling is the strategy of temporarily suspending a running process

896.

#include <stdio.h>

struct sample

int a;

}sample;

int main()

sample.a=100;

printf("%d",sample.a);

return 0;

Find the output

897.
Skewed binary trees can be efficiently represented using

898.

Multiprogramming systems ______

899.

Consider an instance of TCP’s Additive Increase Multiplicative Decrease(AIMD) algorithm where the
window size at the start of the slow start phase is 2 MSS and the threshold at the start of the first
transmission is 8 MSS. Assume that a time out occurs during the fifth transmission. Find the
congestion window size at the end of the tenth transmission.

900.

The performance of cache memory is frequently measured in terms of a quantity called

901.

Cross-compiler is a compiler

902.

The physical layer concerns with

903.

#include <stdio.h>

struct employee{

int empId;

char *name;

int age;

};

int main()

{
struct employee emp []={ {1,"Mike",24}, {2,"AAA",24}, {3,"BBB",25},
{4,"CCC",30} };

printf("Id : %d, Age : %d, Name : %s",


emp[2].empId,3[emp].age,(*(emp+1)).name);

return 0;

Find the output

904.

Which transmission media has the highest transmission speed in a network?

905.

#include <stdio.h>

int main()

union values

int intVal;

char chrVal[2];i

};

union values val;

val.chrVal[0]='A'; val.chrVal[1]='B';

printf("\n%c,%c,%d",val.chrVal[0],val.chrVal[1],val.intVal);
return 0;

Find the output

906.

What is the software that runs a computer, including scheduling tasks, managing storage, and
handling communication with peripherals?

907.

Which of the following statements is/are TRUE for an undirected graph?P:Number of odd degree
vertices is even,Q: Sum of degrees of all vertices is even

908.

Which of the following paging algorithms is most likely to be used in a virtual memory system?

909.

#include <stdio.h>

int main()

union values

unsigned char a;

unsigned char b;

unsigned int c;

};
union values val;

val.a=1;

val.b=2;

val.c=300;

printf("%d,%d,%d",val.a,val.b,val.c);

return 0;

Find the output

910.

Bits can be send over guided and unguided media as analog signal using .........................

911.

Which one of the following is the recurrence equation for the worst case time complexity of the
Quicksort algorithm for sorting n>=2 numbers? In the recurrence equations given in the options
below, c is a constant.

912.

The portion of physical layer that interfaces with the media access control sublayer is called

913.

Divide and conquire mechanism is used in

914.

#include <stdio.h>

int main()
{

typedef struct tag{

char str[10];

int a;

}har;

har h1,h2={"IHelp",10};

h1=h2;

h1.str[1]='h';

printf("%s,%d",h1.str,h1.a);

return 0;

Find the output

915.

What is the main difference between traps and interrupts?

916.

Buffering is useful because

917.

#include <stdio.h>

int main()
{

struct std

char name[30];

int age;

};

struct std s1={"Mike",26};

struct std s2=s1;

printf("Name: %s, Age: %d\n",s2.name,s2.age);

Find the output

918.

The result evaluating the postfix expression (10 5 + 60 6 / * 8 –) is

919.

Physical layer provides

920.

#include <stdio.h>

int main()

union test

int i;
int j;

};

union test var=10;

printf("%d,%d\n",var.i,var.j);

Find the output

921.

Consider a join (relation algebra) between relations r(R)and s(S) using the nested loop method.
There are 3 buffers each of size equal to disk block size, out of which one buffer is reserved for
intermediate results. Assuming size(r(R))

922.

What is the worst case for Selection sort

923.

In asynchronous serial communication the physical layer provides

924.

If two interrupts, one of higher priority and other of lower priority occur simultaneously, then the
service provided is for

925.

#include <stdio.h>

int main()

#ifdef debug
printf("Start debugging...");

#endif

printf("IncludeHelp");

return 0;

Find the output

926.

While inserting the elements 71,65,84,69,67,83 in an empty binary search tree(BST)in the sequence
shown, the element in the lowest level is

927.

The physical layer is responsible for

928.

The physical layer translates logical communication requests from the ______ into hardware specific
operations.

929.

#include <stdio.h>

#define MAX 100

int main()

#define MAX 20

printf("MAX=%d...",MAX);

return 0;

}
Find the output

930.

Given a hash table T with 25 slots that stores 2000 elements, the load factor a for T is_____

931.

A 4-way set-associative cache memory unit with a capacity of 16 KB is built using a block size
of 8 words. The word length is 32 bits. The size of the physical address space is 4 GB. The
number of bits for the TAG field is

932.

A single channel is shared by multiple signals by

933.

Which searching technique is better, if unsorted array is given as input

934.

The stage delays in a 4-stage pipeline are 800, 500, 400 and 300 picoseconds. The first stage
(with delay 800 picoseconds) is replaced with a functionally equivalent design involving two
stages with respective delays 600 and 350 picoseconds. The throughput increase of the pipeline
is percent.

935.

#include <stdio.h>

#define FUN(x) x*x

int main()

int val=0;
val=128/FUN(8);

printf("val=%d",val);

return 0;

Find the output

936.

#include <stdio.h>

#define FUN(x,y)

x##yint main()

{int a1=10,a2=20

;printf("%d...%d",FUN(a,1),FUN(a,2));

return 0;}

Find the output.

ANS – 20

937.The postfix form of the expression (A+ B)*(C*D- E)*F / G is

Ans - AB+ CD*E - FG /**

938. Wireless transmission can be done via

Ans – all of the above

939. Which amongst the following refers to Absolute addressing mode

Ans – depends on options

940. Which of the following tree may have smaller elements in its
left subtree and larger element in its right subtree

Ans – depends on options


941.

#include <stdio.h>

#define LARGEST(x,y)

(x>=y)?x:y

int main(){

int a=10,b=20,l=0;

l=LARGEST(a++,b++);

printf("a=%d,b=%d,largest=%d",a,b,l);

return 0;}

Find the output

Ans - a=11,b=22,largest=21

942. The ____ translates internet domain and host names to IP address.

Ans . Domain Name System

943. The addressing mode used in an instruction of the form ADD R1, R2 is _____.

Ans. Index

944.

#include <stdio.h>

#define OFF 0#if debug == OFF

int a=11;#endif

int main()

{ int b=22;

printf("%d...%d",a,b);

return 0;}

Find the output


Ans. 11…22

945. Which one of the following allows a user at one site to establish a
connection to another site and then pass keystrokes from local host to remote
host?

Ans. Telnet

946. Consider the following array of elements.


{89,19,50,17,12,15,2,5,7,11,6,9,100}.The minimum number of interchanges needed to
convert it into a max-heap is

Ans- 3

947. How many address bits are needed to select all memory locations in the 16K ×
1 RAM?

Ans. 14

948. Which of the following algorithm is used to find the shortest path between
two nodes in graph

Ans. Dijkstra’s Algorithm

949. Application layer protocol defines

Ans. All of the above mentioned.

950.

#include <stdio.h>

#define TEXT IncludeHelp

int main(){

printf("%s",TEXT);

return 0;}

Find the output

Ans. Error : 'IncludeHelp' undeclared identifier.

951. If the main memory is of 8K bytes and the cache memory is of 2K words. It
uses associative mapping. Then each word of cache memory shall be_____.

Ans. 16 bits
952. Which one of the following protocol delivers/stores mail to receiver server?

Ans. simple mail transfer protocol

953. Which of the following case does not exist in complexity theory?

Ans. NULL case

954.

#include <stdio.h>

#define VAR1 VAR2+10

#define VAR2 VAR1+20

int main(){

printf("%d",VAR1);

return 0;}

Find the output

Ans. Error : 'VAR1' undeclared identifier.

955. The width of the physical address on a machine is 40 bits. The width of the
tag field in a 512 KB 8-way set associative cache is ______ bits

Ans. 24

956. #include <stdio.h>

#define SUM(x,y)

int s; s=x+y;

printf("sum=%d\n",s);

int main(){

SUM(10,20);

return 0;}

Find the output


Ans. Sum =30

957. Given an array that represents elements of arithmetic progression in order.


It is also given that one element is missing in the progression, the worst case
time complexity to find the missing element efficiently is:

Ans. O(log n)

958. The ASCII encoding of binary data is called

Ans. base 64 encoding

959. Which one of these is characteristic of RAID 5?

Distributed parity

960. The operation of proessing each element in the list is known a

Ans. Traversal

961. #include <stdio.h>

#define MAX 99

int main(){ printf("%d...",MAX);

#undef MAX I printf("%d",MAX); //value of I is the ans as it is missing in the


question

return 0;}

Find the output

Ans. MAX= I

962. The correspondence between the main memory blocks and those in the cache is
given by

Ans. Mapping function

963. Which one of the following is an internet standard protocol for managing devices on IP
network?

Ans. simple newtwork management protocol

964. The DMA controller has _______ registers


Ans. 3

965.

#include <stdio.h>

int main()

{ int var=100; {

int var=200; printf("%d...",var);

} printf("%d",var);

return 0;}

Find the output

Ans. 200…100

966. Which one of the following is not an application layer protocol?

Ans. resource reservation protocol

967. Consider a binary tree T that has 200 leaf nodes. Then, the number of nodes
in T that have exactly two children are _________.

Ans. 199

968. Which protocol is a signalling communication protocol used for controlling


multimedia communication sessions?

Ans. session initiation protocol

969. Content of the program counter is added to the address part of the
instruction in order to obtain the effective address is called

Ans. Relative Address Mode

970. The preorder traversal sequence of a binary search tree is


30,20,10,15,25,23,39,35,42. Which one of the following is the postorder traversal
sequence of the same tree?

Ans. 15, 10, 23, 25, 20, 35, 42, 39, 30

971.
#include <stdio.h>

char* fun1(void){

char str[]="Hello";

return str;}

char* fun2(void){

char *str="Hello";

return str;}

int main()

{ printf("%s,%s",fun1(),fun2());

return 0;}

Find the output

Ans. Garbage, Hello

972.

#include <stdio.h>

int fooo(void){ static int num=0; num++;

return num;}int main(){ int val; val=fooo();

printf("step1: %d\n",val); val=fooo();

printf("step2: %d\n",val); val=fooo();

printf("step3: %d\n",val);

return 0;}

Find the output

Ans. step1: 1

step2: 2

step3: 3
973. Which one of the following is not correct?

Ans. – depends on options

974. Binary search algorithm can not be applied to

Ans. Pointer array

975. The data-in register of I/O port is

Ans. read by host to get input

976. The Firmware are stored in read-only memory or ________ chips.

Ans. BIOS

977. Let G be a graph with n vertices and m edges. What is the tightest upper
bound on the running time on Depth First Search of G? Assume that the graph is
represented using adjacency matrix.

Ans. O(n2)

978. When displaying a web page, the application layer uses the

Ans. HTTP protocol

979. #include <stdio.h>

int main(){

int anyVar=10;

printf("%d",10);

return 0;}

extern int anyVar;

Find the output

Ans. 10

980. A Program Counter contains a number 825 and address part of the instruction
contains the number 24. The effective address in the relative address mode, when
an instruction is read from the memory is

Ans. 849
981. The situation when in a linked list START=NULL is

Ans. Underflow

982. Multiple object can be sent over a TCP connection between client and server
in

Ans. persistent HTTP

983.

#include <stdio.h>

int main(){

char *str="IncludeHelp";

printf("%c\n",*&*str);

return 0;}

Ans. I

984. Which of the following name does not relate to stacks?

Ans. FIFO Lists

985. When an instruction is read from the memory, it is called

Ans. Instruction Cycle

986. In the network HTTP resources are located by

Ans. uniform resource identifier

987.

#include <stdio.h>

int main(){

int iVal; char cVal; void *ptr; // void pointer

iVal=50; cVal=65; ptr=&iVal;

printf("value =%d,size= %d\n",*(int*)ptr,sizeof(ptr));


ptr=&cVal;

printf("value =%d,size= %d\n",*(char*)ptr,sizeof(ptr));

return 0;}

Find the output

Ans.

value =50,size= 4

value =65,size= 4

988. In a connected graph, a bridge is an edge whose removal disconnects a graph.


Which one of the following statements is True?

Ans. A bridge cannot be part of a simple cycle

989. HTTP client requests by establishing a __________ connection to a particular


port on the server.

Ans. transmission control protocol

990. #include <stdio.h>

int main(){

char *str []={"AAAAA","BBBBB","CCCCC","DDDDD"};

char **sptr []={str+3,str+2,str+1,str}; char ***pp; pp=sptr; ++pp;


printf("%s",**++pp+2);

return 0;}

Find the output

Ans. BBB

991.

A Stack-organized Computer uses instruction of

Ans - zero addressing


992.

The rate at which a computer clock deviates from a perfect reference clock is called as

993.

#include <stdio.h>

char* strFun(void)

char *str="IncludeHelp";

return str;

int main()

char *x;

x=strFun();

printf("str value = %s",x);

return 0;

Find the output

Str value = IncludeHelp

994.

In HTTP pipelining

995.
Assume that a mergesort algorithm in the worst case takes 30 seconds for an input of size 64.
Which of the following most closely approximates the maximum input size of a problem that can be
solved in 6 minutes?

996.

The degree sequence of a simple graph is the sequence of the degrees of the nodes in the graph in
decreasing order. Which of the following sequences can not be the degree sequence of any graph?I.
7, 6, 5, 4, 4, 3, 2, 1 II. 6, 6, 6, 6, 3, 3, 2, 2 III. 7, 6, 6, 4, 4, 3, 2, 2 IV. 8, 7, 7, 6, 4, 2, 1, 1

997.

The load instruction is mostly used to designate a transfer from memory to a

processor register known as

Ans: accumulator

998.

#include <stdio.h>

int main()

void *ptr;

++ptr;

printf("%u",ptr);

return 0;

Find the output

Ans:Error

999.

FTP server listens for connection on port number


1000.

In FTP protocol, client contacts server using ____ as the transport protocol.

1001.

In excitation table of D flipflop next state is equal to

1002.

#include <stdio.h>

int main()

char ch=10;

void *ptr=&ch;

printf("%d,%d",*(char*)ptr,++(*(char*)ptr));

return 0;

Find the output

Ans:11,11

1003.

The smallest element of an array’s index is called its

1004.

#include <stdio.h>

int main()

int a=10,b=2;
int *pa=&a,*pb=&b;

printf("value = %d", *pa/*pb);

return 0;

Find the output

Ans:error

1005.

In which mode FTP, the client initiates both the control and data connections.

1006.

The space factor when determining the efficiency of algorithm is measured by

Ans: space complexity

1007.

Which one of the following connects high-speed high-bandwidth device to memory subsystem
and CPU.

1008.

The file transfer protocol is built on

1009.

Simplified form of the boolean expression (X + Y + XY) (X + Z) is

1010.

The time complexity to build a heap with a list of n numbers is


Ans: O(nlogn)

1011.

#include <stdio.h>

void fun(int *ptr)

*ptr=100;

int main()

int num=50;

int *pp=#

fun(& *pp);

printf("%d,%d",num,*pp);

return 0;

Find the output

Ans:100,100

1012.

Consider the following statements for priority queue :

S1 : It is a data structure in which the intrinsic ordering of the elements does determine the result of
its basic operations.

S2 : The elements of a priority queue may be complex structures that are ordered on one or several
fields.

Which of the following is correct?


1013.

#include < stdio.h >

int main()

typedef int AAA,BBB,CCC,DDD;

AAA aaa=10;

BBB bbb=20;

CCC ccc=30;

DDD ddd=40;

printf("%d,%d,%d,%d",aaa,bbb,ccc,ddd);

return 0;

Find the output

Ans:10 20 30 40

1014.

Which one of the following is used as the start frame delimeter in ethernet frame?

1015.

A graphical display of the fundamental products in a truth-table is known as

1016.

What is autonegotiation?

1017.
#include < stdio.h >

int main()

typedef auto int AI;

AI var=100;

printf("var=%d",var);

return 0;

Find the output

Ans error

1018.

Which of the following logic expression is incorrect?

1019.

Suppose you want to delete the name that occurs before 'Vellore' in an alphabetical listing.

Which of the following data structures shall be most efficient for this operation?

1020.

The efficient data structure to insert/delete a number in a stored set of numbers is

1021.

Using 10's complement 72532- 3250 is

1022.
Ethernet in metropolitan area network (MAN) can be used as

1023.

#include < stdio.h >

int main()

typedef char* string;

string myName="ABCDEFG";

printf("myName=%s (size=%d)",myName,sizeof(myName));

return 0;

Find the output

Ans: myName=ABCDEFG (size=8)

1024.

Which two RAID types use parity for data protection?

1025.

#include < stdio.h >

int main()

typedef struct

int empid;
int bsal;

}EMP;

EMP E={10012,15100};

printf("%d,%d",E.empid,E.bsal);

return 0;

Find the output

1026.

A point-to-point protocol over ethernet is a network protocol for

1027.

In any undirected graph, the sum of the degrees of all nodes is:

1028.

X=1010100 and Y=1000011 using 1's complement Y-X is

1029.

_____ is used to define a special CSS style for a group of HTML elements

1030.

High speed ethernet works on

1031.

Prim's algorithm is a method available for finding out the minimum cost of a spanning tree.

Its time complexity is given by:

1032.
The 16-bit 2’s complement representation of an integer is 1111 1111 1111 0101, its decimal
representation is

1033.

The maximum size of payload field in ethernet frame is

1034.

Which of the below given sorting techniques has highest best-case runtime complexity?

1035.

Which of these is a stand alone tag?

1036.

In binary heap, whenever the root is removed then the

rightmost element of last level is replaced by the root. Why?

1037.

Which of the following is included in the head section of HTML

If the associativity of a processor cache is doubled while keeping the capacity and block size
unchanged, which one of the following is guaranteed to be NOT affected?

1039.

What is interframe gap?

1040.

A mailer that transforms a message body of an e-mail into a web page is called a

1041.

In a circular linked list


1042.

A computer system implements 8 kilobyte pages and a +32-bit physical address space. Each
page table entry contains a valid bit, a dirty bit, three permission bits, and the translation. If the
maximum size of the page table of a process is 24 megabytes, the length of the virtual address
supported by the system is _________ bits.

1043.
An ethernet frame that is less than the IEEE 802.3 minimum length of 64 octets is called

Ans:RUN frame

1044.

The minimum number of nodes in a binary tree of depth d (root at level 0) is


Ans: d+1

1045.
Consider two processors P1 and P2 executing the same instruction set. Assume that under
identical conditions, for the same input, a program running on P2 takes 25% less time but
incurs 20% more CPI (clock cycles per instruction) as compared to the program running
on P1 If the clock frequency of P1 is 1GHz, then the clock frequency of P2 (in GHz) is

Ans:

CPU TIME (T) = No. of Instructions( I ) x No. of Cycles Per Instruction (c) x Cycle Time (t)
OR
CPU TIME (T) =
No.ofInstructions(I)×No.ofCyclesPerInstruction(c)Clockfrequency(f) No.ofInstructions(I)×No.ofCyclesPerInstructio
n(c)Clockfrequency(f)
→T=Ic×CPI×F− 1→T=Ic×CPI×F− 1
→T×FCPI=Ic→T×FCPI=Ic
P1 & P2 executing same instruction set So, No. of Instructions same for both = I1 = I2 = I

If P1 takes T1 time →→ T2 = 0.75 x T1 →→ T2T1T2T1 = 0.75


If P1 incurs C1 clock cycles per instruction →→ C2 = 1.2 x C1 →C2C1→C2C1 = 1.2
Since I is same for both →(f1×T1)c1=(f2×T2)c2→(f1×T1)c1=(f2×T2)c2 and f1 = 1 GHz
→→ F2 =(C2C1)×(T1T2)×F1(C2C1)×(T1T2)×F1 = 1.2×1GHz0.751.2×1GHz0.75 = 1.6 GHz
Hence,the clock frequency of P2 is = 1.6 GHz.

1046.
If you don’t want the frame windows to be resizeable, simply add what to the lines ?
Ans:no resize

1047.
Which multiple access technique is used by IEEE 802.11 standard for wireless LAN?

Ans:CSMA/CA

1048.
A circuit that converts n inputs to 2^n outputs is called
Ans: decoder

1049.
What is the correct HTML for making a text input field?
Ans: Textarea tag

1050.
Interpolation search is an improved variant of binary search.
Ans: True

1051.

It is necessary for this search algorithm to work that data collection should be

Ans: sorted form and equally distributed.

1052.
A wireless network interface controller can work in

Ans: infrastructure mode and ad-hoc mode

Top of Form
1053.
What is cell padding?

Ans: give your tables a little extra space.

1054.
Consider an undirected graph G with 100 nodes. The maximum number of edges to be included in
Ans is C by formula (n-1)(n-2)/2 =99x98/2=4851 (graph should be simple i.e having no parallel
RARARAID1
1055.

Which level of RAID refers to disk mirroring with block striping?


Ans:RAID1

1056

Where in an HTML document is the correct place to refer to an external style sheet?

In the <head> section


At the top of the document
At the end of the document
In the <body> section

1057.

To build a mod-19 counter the number of flip-flops required is


Ans :5

1058.
In wireless network an extended service set is a set of

Ans:are logical units of one or more basic service sets on the same logical network segment

1059.
Let T(n) be the function defined by T(n) = 1 and T(n) = 2T (n/2) + n,
which of the following is TRUE ?

1060.
The smallest integer than can be represented by an 8-bit number in 2?s complement form
is

Ans: -128

1061.
How to create a memory without a name during the execution of the program?
Ans:

1062.
The following HTML ________ element contains meta data which is not displayed inside the
document
Ans:<meta>tag

1063.
________ is commonly used in wireless LAN.

Ans:Wireless routers

1064.
Consider a 6-stage instruction pipeline, where all stages are perfectly balanced.Assume that there
is no cycle-time overhead of pipelining. When an application is executing on this 6-stage
pipeline, the speedup achieved with respect to non-pipelined execution if 25% of the instructions
incur 2 pipeline stall cycles is

Ans: For a non-pipelined execution on the 6-stage pipeline it will take 6 cycles for one instruction to
finish execution.
For a pipelined execution , it will take 1 cycle for each instruction to execute , in addition to that , 2
additional cycles for 25% of the instructions.
Hence , the average time to execute an instruction in this = (1+25100∗2)
=1.5
Hence , speedup = (6/1.5) = 4
ANSWER : 4

1065.
Which one of the following event is not possible in

wireless LAN.

Ans: a) collision detection

1066. <h2 style="color:blue">I am Blue</h2> is ____ way of styling HTML elements

Ans:inline style

1067. What is the best case for linear search

Ans:O(1)

1068. What is Wired Equivalent Privacy(WEP)?

Ans: standard network protocol that adds security to Wi-Fi and other 802.11 wireless networks.

The following HTML element helps making animated text


Ans: @keyframes

1070. Minterms are arranged in map in a sequence of

Ans:Karnaugh Map

1071. How will you handle the overflow condition of a linked queue through code(note: new_node is a
newly created node in a memory)

1072. Which of the following explains Cookies nature?

Ans: Transient

1073. What is the time complexity for binary search

Ans:O(logn)

1074.

Register renaming is done is pipelined processors

Ans: to handle certain kinds of hazards

1075. What is WPA?

Ans: Wi-Fi Protected Access (WPA) is a security standard for users of computing devices equipped
with wireless internet connections

1076. WiMAX stands for

Ans: WorldWide Interoperability for Microwave Access

1077. If the associativity of a processor cache is doubled while keeping the capacity and
block size unchanged, which one of the following is guaranteed to be NOT affected?

Ans: Width of processor to main memory data bus

1078. Consider a hash table with 9 slots. The hash function is h(k) = k mod 9. The collisions are
resolved by chaining. The following 9 keys are inserted in the order: 5, 28, 19, 15, 20, 33, 12, 17, 10. The
maximum, minimum, and average chain lengths in the hash table, respectively, are

Ans: the shortest path from W to every vertex in the graph.


1079. The following HTML element is used to display horizontal line

Ans: <hr> element

1080. The _______ attribute defines the action to be performed when the form is submitted

Ans: action Attribute

1081. The main difference between JK and RS flip-flop is that

Ans: The main difference between a JK flip-flop and an SR flip-flop is that in the JK flip-flop,
both inputs can be HIGH. When both the J and K inputs are HIGH, the Q output is toggled, which
means that the output alternates between HIGH and LOW. Thereby the invalid condition which
occurs in the SR flipflop is eliminated.

1082. The data structure required for Breadth First Traversal on a graph is

Ans:Queue

1083.
WiMAX provides

Ans: full duplex communication

1084.
WiMAX uses the

Ans. orthogonal frequency division multiplexing

1085.
Which of the following unit will choose to transform decimal number to binary code ?

Ans:

Encoder

1086.
What is the time complexity for insertion sort
Ans: O(n)

1087.
Which of these will create a shuffled list?
Ans:

1088.
How do you check queue is full in array implementation
Ans: Queue will be full when (count == size)

1089.
Which one of the following modulation scheme is supported by WiMAX?

Ans: binary phase shift keying modulation and quadrature phase shift keying modulation

and quadrature amplitude modulation

1090.
Which attribute is used to extend the lifetime of a cookie?

Ans: max-age

1091.

A processor can support a maximum memory of 4 GB, where the memory is word-addressable (a
word consists of two bytes). The size of the address bus of the processor is at least __________
bits

1092.

Which of these is Server side technology?

1093.

Which of the following boolean expressions is not logically equivalent to all of the rest ?

1094.

WiMAX MAC layer provides an interface between

1095.
Which of the following algorithm is Minimum Spanning Tree in graph

1096.

Which one of the following algorithm is not used in

asymmetric-key cryptography?

1097.

How can you make a list that lists the items with numbers?

1098.

You have an array of n elements, Suppose you implement quicksort by always choosing the central
element of the array as the pivot, Then the tightest upper bound for the worst case performance is

1099.

The minimum number of NAND gates required to implement the Boolean function. A + AB' +
AB'C is equal to

1100.

In cryptography, the order of the letters in a message is rearranged by

1101.

The size of the data count register of a DMA controller is 16 bits. The processor needs to transfer
a file of 29,154 kilobytes from disk to main memory. The memory is byte addressable. The
minimum number of times the DMA controller needs to get the control of the system bus from
the processor to transfer the file from the disk to main memory is

1102.

Suppose P, Q, R, S, T are sorted sequences having lengths 20, 24, 30, 35, 50 respectively. They
are to be merged into a single sequence by merging together two sequences at a time, The number
of comparisons that will be needed in the worst case by the optimal algorithm for doing this is ____

1103.

Which method is used to get the year of a date object in YYYY format in Javascript.
1104.

Let G be a graph with n vertices and m edges, What is the tightest upper bound on the running time
on Depth First Search of G? Assume that the graph is represented using adjacency matrix

1105.

What is data encryption standard (DES)?

1106.

The minimum number of page frames that must be allocated to a running process in a virtual
memory environment is determined by

1107.

Which one of the following is a cryptographic protocol used to secure HTTP connection?

1108.

Cryptanalysis is used

1109.

A computer has a 256 KByte, 4-way set associative, write back data cache with block size of 32
Bytes. The processor sends 32 bit addresses to the cache controller. Each cache tag directory
entry contains, in addition to address tag, 2 valid bits, 1 modified bit and 1 replacement bit. The
size of the cache tag directory is

1110.

Choose the correct HTML to left-align the content inside a tablecell

1111.

Let G be a graph with n vertices and m edges, What is the tightest upper bound on the running time
on Depth First Search of G? Assume that the graph is represented using adjacency matrix
1112.

Which one of the following is a cryptographic protocol used to secure HTTP connection?

1113.

The capacity of a memory unit is defined by the number of words multiplied by the number of
bits/word. How many separate address and data lines are needed for a memory of 4 K × 16?

1114.

Let P be a QuickSort Program to sort numbers in ascending order using the first element as pivot,
Let t1 and t2 be the number of comparisons made by P for the inputs {1, 2, 3, 4, 5} and {4, 1, 5, 3, 2}
respectively,Which one of the following holds?

1115.

In HTTP, which method gets the resource as specified in the URI

1116.

The intel 8086 microprocessor is a _______ processor

1117.

Which of these is not a valid attribute of <tr> element?

A priority queue is implemented as a Max-Heap. Initially, it has 5 elements. The level-order traversal
of the heap is: 10, 8, 5, 3, 2. Two new elements 1 and 7 are inserted into the heap in that order. The
level-order traversal of the heap after the insertion of the elements is:

1119.

Voice privacy in GSM cellular telephone protocol is provided by

1120.

The microprocessor can read/write 16 bit data from or to ________

1121.

The worst case running time to search for an element in a balanced in a binary search tree with
n*2^n elements is
1122.

ElGamal encryption system is

1123.

Java package is a grouping mechanism with the purpose of

1124.

Cryptographic hash function takes an arbitrary block of data and returns

1125.

Find the output of the following program?

#include

using namespace std;

void myFunction(int& x, int* y, int* z) {

static int temp=1;

temp += (temp + temp) - 1;

x += *(y++ + *z)+ temp - ++temp;

*y=x;

x=temp;

*z= x;

cout<<x<<*y<<*z<<temp;
}

int main() {

int i = 0;

int j[] = {0, 1, 2, 3, 4, 5, 6, 7, 8, 9};

i=i++ - ++i;

myFunction(i, j, &i);

return 0;

1126.

The work of EU is ________

1127.

The pre-order and post order traversal of a Binary Tree generates the same output. The tree can
have maximum

1128.

Find the output of the following program?

#include

using namespace std;

typedef int * IntPtr;


int main()

IntPtr A, B, C;

int D,E;

A = new int(3);

B = new int(6);

C = new int(9);

D = 10;

E = 20;

*A = *B;

B = &E;

D = (*B)++;

*C= (*A)++ * (*B)--;

E= *C++ - *B--;

cout<<*A<<*B<<*C< return 0;

1129.
IPSec is designed to provide the security at the

1130.

A linear collection of data elements where the linear node is given by means of pointer is called

1131.

The 16 bit flag of 8086 microprocessor is responsible to indicate ___________

1132.

Suppose a circular queue of capacity (n – 1) elements is implemented with an array of n elements.


Assume that the insertion and deletion operation are carried out using REAR and FRONT as array
index variables, respectively. Initially, REAR = FRONT = 0. The conditions to detect queue full and
queue empty are

1133.

Which is the correct CSS syntax?

1134.

The BIU contains FIFO register of size __________ bytes

1135.

In tunnel mode IPsec protects the

1136.

To link your Web page to a style sheet, you must use the _____ tag

1137.

Network layer firewall works as a

1138.

The BIU prefetches the instruction from memory and store them in ________

1139.
While inserting the elements 71,65,84,69,67,83 in an empty binary search tree (BST) in the
sequence shown, the element in the lowest level is

1140.

Suppose T is a binary tree with 14 nodes. What is the minimum possible depth of T?

1141.

A process executes the code

fork ();

fork ();

fork ();

The total number of child processes created is

1142.

The 1 MB byte of memory can be divided into ______ segment

1143.

What is a Software ?

1144.

Consider the below code fragment:

if(fork k( ) = = 0)

a= a+5; printf(?%d, %d \n?, a, &a);

else

{
a= a ? 5;

printf(?%d %d \n?, 0, &a);

Let u, v be the values printed by parent process and x, y be the values printed by child process.
Which one of the following is true?

1145.

The IP is ________ bits in length

1146.

For an undirected graph with n vertices and e edges, the sum of the degree of each
vertex isequal to

1147.

Which of these is incorrect ?

1148.

What does the following bit of JavaScript print out?

var a = [1,,3,4,5];

console.log([a[4], a[1], a[5]]);

1149.

The Incremental Model is a result of combination of elements of which two models?

1150.

Which one of the following regular expressions over {0, 1} denotes the set of all strings not
containing 100 as a substring (a) 0*(11)*0* (b) (0*1010)* (c) 0*1*010 (d) 0*(10)*01*

1151.
IMUL source is a signed _________

1152.

The spiral model was originally proposed by

1153.

The number of states in DFA is --------than the number of states in NFA for the same Language.

1154.

Which one of the following statements is NOT correct about HTTP cookies?

1155.

The microprocessor determines whether the specified condition exists or not by testing the

______

1156.

Consider the C function given below.

int f(int j)

static int i = 50;

int k;

if (i == j)

printf("something");

k = f(i);

return 0;
}

else return 0;

Which one of the following is TRUE?

1157.

The recognizing capabilities of NDFSM and DFSM

1158.

In max mode, control bus signal So,S1 and S2 are sent out in ____________ form

1159.

Spiral Model has user involvement in all its phases.

1160.

The ___ bus controller device decodes the signals to produce the control bus signal

1161.

Which one of the following models is not suitable for accommodating any change?

1162.

HTTP is implemented over

1163.

When there are infinite distinguishable strings then there cannot be a -------------

1164.

To interface memory with the microprocessor, connect register the lines of the address bus

must be added to address lines of the _______ chip.


1165.

A NFA converted to DFA has more than one final state.

1166.

Which model can be selected if user is involved in all the phases of SDLC?

1167.

Mnemonic codes and variable names are used in

1168.

If M1 machine recognizing L with n states, then M2 recognizing L* constructed Using Thompson


construction will have ------------- states.

1169.

Functional requirements capture the intended behavior of the system.

1170.

In which year, 8086 was introduced?

1171.

By default, any real number in C is treated asChoicesA

1172.

When there is complete DFA with Five states out of which two are final states if F is modified such
that it recognizes complement of the original language then there will be at least _________final
states.

1173.

For automatic objects, constructors and destructors are called each time the objects
1174.

ALE stands for ___________

1175.

Which one of the following is a requirement that fits in a developer’s module ?

1176.

Which of the following statements explains portabililty in non-functional requirements?

1177.

Which of the following statement is correct about destructors?

1178.

In 8086, Example for Non maskable interrupts are ________.

1179.

When we concatenate two languages L1 and L2 recognized by machine M1 and M2 we obtain a


machine with final state same as that of __________________

1180.

Consider the code snippet given below

var count = [1,,3];

What is the observation made?

1181.

The intersection of CFL and regular language

1182.
Address line for TRAP is?

1183.

Which is one of the most important stakeholder from the following ?

1184.

Access time is faster for _________.

1185.

Consider S->SS|a what is the number of different derivation trees for aaaaa

1186.

Which of these does not belong to the basic principles of good product design ?

1187.

Consider the following code snippet

var a1 = [,,,];
var a2 = new Array(3);
0 in a1
0 in a2

Result of Javascript is:

1188.

The pop() method of the array in javascript does which of the following task ?

1189.

The project planner examines the statement of scope and extracts all important software functions
which is known as

1190.
The number of auxiliary memory required for a Push Down Machine (PDM) to behave like a Finite
State Machine (FSM) is

1191.

Which method bypasses the CPU for certain types of data transfer?

1192.

A 20-bit address bus can locate ________.

1193.

A priority queue is implemented as a Max-Heap. Initially, it has 5 elements. The level-order


traversal of the heap is: 10, 8, 5, 3, 2. Two new elements 1 and 7 are inserted into the heap in that
order. The level-order traversal of the heap after the insertion of the elements is:

1194.

66.6% risk is considered as

1195.

Consider the following javascript code snippet :

var a = [];
a.unshift(1);
a.unshift(22);
a.shift();
a.unshift(3,[4,5]);
a.shift();
a.shift();
a.shift();

The final output for the shift() is

1196.

Consider the following statements


var text = "testing: 1, 2, 3"; // Sample text
var pattern = /\d+/g // Matches all instances of one or more digits

In order to check if the pattern matches with the string “text”, the
statement is

1197.

If a , b , c, are three nodes connected in sequence in a singly linked list, what is the statement to
be added to change this into a circular linked list?

1198.

In a DMA write operation the data is transferred

1199.

An independent relationship must exist between the attribute that can be measured and the external
quality attribute.

1200.

Risk management is one of the most important jobs for a

1201.

Direction flag is used with

1202.

For the array (77 ,62,114,80,9,30,99), write the order of the elements after two passes using the
Radix sort

1203.

Consider the following javascript statements


x = ~-y;
w = x = y = z;
q = a?b:c?d:e?f:g;

The above code snippet is equivalent to:

1204.

Which of the following risk is the failure of a purchased component to perform as expected?

1205.

Which of these is asymptotically bigger?

1206.

EPROM is generally erased by using

1207.

When there is an indefinite or an infinity value during an arithmetic value computation, javascript

1208.

Which is used to store critical pieces of data during subroutines and interrupts

1209.

Which of the following term is best defined by the statement: “The underlying technology on which
the system is built is superseded by new technology.”?

1210.

Consider a B+ tree in which the search Answer is 12 bytes long, block size is 1024 bytes,record pointer is
10 bytes long and block pointer is 8 bytes long. The maximum number of keys that can be
accommodated in each non-leaf node of the tree is ____

1211.
The javascript statement a===b refers to

1212.

The external system bus architecture is created using from ______ architecture

1213.

What assess the risk and your plans for risk mitigation and revise these when you learn more about
the risk?

1214.

The number of ways in which the numbers 1, 2, 3, 4, 5, 6, 7 can be inserted in an empty binary
search tree, such that the resulting tree has height 6, is

1215.

Consider the following code snippet

function oddsums(n)
{
let total = 0, result=[];
for(let x = 1; x <= n; x++)
{
let odd = 2*x-1;
total += odd;
result.push(total);
}
return result;
}

What would be the output if

oddsums(5);

1216.
Given a variable $email containing the string user@example.com, which of the following PHP
statements would extract the string example.com?

1217.

Which of the following risks are derived from the organizational environment where the software is
being developed?

1218.

The preorder traversal sequence of a binary search tree is 30, 20, 10, 15, 25, 23, 39, 35,
42.Which one of the following is the postorder traversal sequence of the same tree?

1219.

Consider an undirected graph G where self-loops are not allowed. The vertex set of G is {(i, j): 1
= i = 12, 1 = j = 12}. There is an edge between (a, b) and (c, d) if |a - c| = 1 and |b - d| = 1. The
number of edges in this graph is

1220.

Which of the following risks are derived from the software or hardware technologies that are used to
develop the system?

1221.

Given a comma-separated list of values in a string, which function from the given list can create an
array of each individual value with a single call in PHP?

1222.

Which of the following term is best defined by the statement: “Derive traceability information to
maximize information hiding in the design.”?

1223.

Consider the following New-order strategy for traversing a binary tree:

1)Visit the root;


2)Visit the right subtree using New-order;

3)Visit the left subtree using New-order;

The New-order traversal of the expression tree corresponding to the reverse polish expression 3 4
* 5 - 2 ? 6 7 * 1 + - is given by:

1224.

In PHP, array values are keyed by ______ values (called indexed arrays) or using ______ values
(called associative arrays). Of course, these key methods can be combined as well.

1225.

What will the following script output?

<?php

$array = array (1, 2, 3, 5, 8, 13, 21, 34, 55);

$sum = 0;

for ($i = 0; $i < 5; $i++) {

$sum += $array[$array[$i]];

echo $sum;

?>

1226.

A complete binary min-heap is made by including each integer in [1;1023] exactly once. The depth
of a node in the heap is the length of the path from the root of the heap to that node. Thus, the root
is at depth 0. The maximum depth at which integer 9 can appear is
1227.

Which of the following strategies means that the impact of the risk will be reduced?

1228.

Risk management is now recognized as one of the most important project management tasks.

1229.

What elements will the following script output?

<?php

$array = array (true => 'a', 1 => 'b');

var_dump ($array);

?>

1230.

Let G be a weighted connected undirected graph with distinct positive edge weights.If
every edge weight is increased by the same value, then which of the following
statements is/are TRUE ? P: Minimum spanning tree of G does not change. Q: Shortest path
between any pair of vertices does not change

1231.
Which of the following term is best defined by the statement: “There will be a change of
organizational management with different priorities.”?

1232.

Assume you would like to sort an array in ascending order by value while preserving key
associations. Which of the following PHP sorting functions would you use?

1233.

If every node u in G adjacent to every other node v in G, A graph is said to be

1234.

Which of the following is a dynamic model that shows how the system interacts with its environment
as it is used?

1235.

Consider an undirected random graph of eight vertices. The probability that there is an edge
between a pair of vertices is ½. What is the expected number of unordered cycles of length
three?

1236.

In a connected graph, a bridge is an edge whose removal disconnects a graph. Which one of the
following statements is true?

1237.

Which of the following is golden rule for interface design?

1238.

_______________ is a measure of the degree of interdependence between modules.

1239.
A binary tree in which if all its levels except possibly the last, have the maximum number of
nodes and all the nodes at the last level appear as far left as possible, is known as

1240.

Which of these methods has no restrictions on content size when a form is submitted.

1241.

Consider the following program:

int f(int *p, int n)

if (n <= 1) return 0;

else return max ( f (p+1, n-1),p[0]-p[1]);

int main()

int a[] = {3,5,2,6,4};

printf("%d", f(a,5));

The value printed by this program is

1242.

Which of the following is the worst type of module coupling?

1243.

A binary tree T has 20 leaves. The number of nodes in T having two children is
1244.

Which of the following asymptotic notation is the worst among all?

1245.

Consider the following C code segment:

int a, b, c = 0;

void prtFun(void);

main( )

{ static int a = 1; /* Line 1 */

prtFun( );

a + = 1;

prtFun( )

printf(?\n %d %d ?, a, b);

void prtFun(void)

{ static int a=2; /* Line 2 */

int b=1;

a+=++b;

printf(?\n %d %d ?, a, b);

What output will be generated by the given code segment if:

Line 1 is replaced by auto int a = 1;


Line 2 is replaced by register int a = 2;

1246.

Which of the following is the best type of module cohesion?

1247.

Consider the following C program.

#include

int f1 (void) ;

int f 2 void ;

int x 10;

int main ()

int x=1;

x+=f1()+ f2()+f3()+f2() ;

printf("%d", x);

return 0;

int f1(){int x=25; x++; return x;}

int f2(){static int x =50; x++;return x;}

int f3(){x*=10; return x};

The output of the program is_________.

1248.
In what type of coupling, the complete data structure is passed from one module to another?

1249.

Which of the following is example of in-place algorithm?

1250.

Suppose a circular queue of capacity (n ? 1) elements is implemented with an array of n


elements. Assume that the insertion and deletion operations are carried out using REAR and
FRONT as array index variables, respectively. Initially, REAR = FRONT = 0. The conditions to
detect queue full and queue empty are

1251.

The while loop is referred to as a(n) _____ loop because the loop condition is tested at the beginning
of the loop

1252.

If all tasks must be executed in the same time-span, what type of cohesion is being exhibited?

1253.

temp=root->left;

while(temp->right!=NULL)

temp=temp->right;

return temp;

The above code snippet for a BST with the address of the root node in pointer ‘root’
returns

1254.

The word case used in the switch statement represents a


1255.

Which of the following pattern is the basis of interaction management in many web-based systems?

1256.

A DFD is always accompanied by a data dictionary.

1257.

Which of the following special symbol allowed in a variable name?

1258.

If a university sets up web-based information system that faculty could access to record student
grades and to advise students, that would be an example of an

1259.

Data Store Symbol in DFD represents a

1260.

Multiple variable declaration of same data type can be avoided by?

1261.

Which of the following diagram is time oriented?Collaboration

1262.

Run time polymorphism is achieved by ______

1263.

How many diagrams are here in Unified Modelling Language?

1264.

Which of the following gives the memory address of a variable pointed to by pointer a?
1265.

Which of the following is not considered as a risk in project management?

1266.

Interaction Diagram is a combined term for

1267.

If a class C is derived from class B, which is derived from class A, all through public inheritance, then
a class C member function can access

1268.

Which of the following is not a SQA plan for a project?

1269.

A default constructor is one that

1270.

Which of the following process is concerned with analyzing the costs and benefits of proposed
changes?

1271.

A constructor without any arguments is

1272.

Which of the following term is best defined by the statement “The creation of a new codeline from a
version in an existing codeline”?

1273.

Which of the following functions compares two strings?

1274.
Which of the following is a project scheduling method that can be applied to software development?

1275.

class n{ int a;}; how much memory the compiler allocates for this class

1276.

Identify the disadvantage of Spiral Model.

1277.

class n{ public: int a;}

obj; obj.a=10; cout

1278.

Which granularity level of testing checks the behavior of module cooperation?

1279.

A class is a

1280.

The levels of hierarchy in inheritance helps to handle

1281.

Which of the following is a black box testing strategy?

1282.

One of the fault base testing techniques is

1283.
Compile time polymorphism is

1284.

Changes made to an information system to add the desired but not necessarily the

required features is called

1285.

Abstraction is

1286.

All the modules of the system are integrated and tested as complete system in the case of

1287.

class n{ public: int a=7;}p,q; cout<

1288.

class n{ public: int *a;}o,p; assigning o=p is called?

1289.

If every requirement stated in the Software Requirement Specification (SRS) has only one
interpretation, SRS is said to be

1290.

A fault simulation testing technique is

1291.

To create an alias Objects have to be passed by


1292.

SRS is also known as specification of

1293.

Templates improve

1294.

Access to private data is

1295.

A COCOMO model is

1296.

In the spiral model ‘risk analysis’ is performed

1297.

Function templates can accept

1298.

How many instances of an abstract class can be created?

1299.

For a well understood data processing application it is best to use

1300.

Modifying the software to match changes in the ever changing environment is called

1301.

Function templates can accept


1302.

1. The 40-20-40 rule suggests that the least amount of development effort can be spent on

1303.

If we create a file by , then the default mode of the file is _________

1304.

___________ adds to the costs of Software Development because it usually means that work that
has been completed has to be redone

1305.

Assume that we have constructor functions for both base class and derived class. Now consider the
declaration in main( ). Base * P = New Derived; in what sequence will the constructor be called ?

1306.

1. Graphical representation of the project, showing each task and activity as horizontal bar
whose length is proportion to time taken for a completion of that activity is called

1307.

Overloading a prefix increment operator by means of a member function takes

1308.

1. Software deteriorates rather than wears out because

1309.

Which of the following is not the characteristic of constructor?

1310.

1. The prototyping model of software development is

1311.

Which of the following ways are legal to access a class data member using this pointer?
1312.

A professional software engineer must:

1313.

Which one of the following is the correct way to declare a pure virtual function?

1310.

1. The prototyping model of software development is

1311.

Which of the following ways are legal to access a class data member using this pointer?

1312.

A professional software engineer must:

1313.

Which one of the following is the correct way to declare a pure virtual function?

1314.

Generic process models are:

1315.

Which of the following operator can be overloaded through friend function?

1316.

If class A is friend of class B and if class B is friend of class C, which of the following is true?

1317.

It is ok to have a single ideal approach to develop a software.

1318.
Which of the following (in file scope) leads to a compile-time error?

1319.

It would be ideal if all of computer science theories can be used in software engineering.

1320.

Symantec Antivirus is a customized product.

1321.

which of the following is an incorrect definition inside a class ?

1322.

In software engineering development, if there are no applicable theories, people often use adhoc
approach.

1323.

Which of the following results in a compile-time error?

1324.

Software engineering includes system engineering.

1325.

If a constructor function is defined in private section of a class, then

1326.

Which of the following is a valid destructor of the class name "Country"

1327.

Which question no longer concerns the modern software engineer?

1328.
Today the increased power of the personal computer has brought about an abandonment of the
practice of team development of software

1329.

class A { int a; static float b; } ; What is the size of class A?

1330.

Data Members of the base class that are marked private:

1331.

Software is a product and can be manufactured using the same technologies used for other
engineering artifacts.

1332.

What is true about constant member function of a class?

1333.

Most software continues to be custom built because

1334.

The call to the parameterized constructor of base class in the derived class

1335.

Change cannot be easily accommodated in most software systems, unless the system was
designed with change in mind.

1336.

What is the return type of the conversion operator function?

1337.

The linear sequential model of software development is

1338.
If the class name is X, what is the type of its "this" pointer?

1339.

The linear sequential model of software development is also known as the

1340.

The incremental model of software development is

1341.

All member functions are _____ to it's class by default

1342.

The rapid application development model is

1343.

In C++, dynamic memory allocation is accomplished with the operator ____

1344.

Evolutionary software process models

1345.

Which of the following is false for cin?

1346.

The spiral model of software development

1347.

The members of a class in c++ by default, are

1348.
Which of the following is not a type of constructor?

1349.

The formal methods model of software development makes use of mathematical methods to

1350.

Which of the following traits need to exist among the members of an agile software team?

1351.

Which of the following language feature is not an access specifier in C++?

1352.

Which one of the following correctly describes the meaning of 'namespace' feature in C++?

1353.

Which of the following is not one of Hooker's core principles of software engineering practice?

1354.

If X is the name of the class, what is the correct way to declare copy constructor of X?

1355.

Softwar
e
enginee
rs
collabor
ate with
custom
ers to
define
which
of the
followin
g?

1356.

Eve
ryo
ne
on
the
soft
war
e
tea
m
sho
uld
be
invo
lved
in
the
plan
ning
acti
vity
so
that
we
can

1357.

What does the following declaration mean?

int (*ptr)[10];

1358.

How will you free the allocated memory ?

1359.
Which of the following activities is not one of the four things that need to be accomplished by the
generic planning task set?

1360.

What do the 'c' and 'v' in argv stands for?

1361.

Analysis models depict


software in which three
representations?

1362.

Teams using agile software


practices never create models.

1363.

ALGORITHM HAS THE ________________ TO THE PROBLEM IN _______________ NUMBER


OF STEPS

1364.

Which of the following is not one of the principles of good coding?

1365.

THE DATA TYPE IS ALL ABOUT

1366.

Multiple variable declaration of same data type can be avoided by?

1367.

Ma
ny
of
the
task
s
fro
m
the
gen
eric
task
sets
for
anal
ysis
mo
deli
ng
and
desi
gn
can
be
con
duct
ed
in
par
allel
with
one
ano
ther
.

1368.

String length is found by the condition

1369.

Which of the following are valid reasons for collecting customer feedback concerning delivered
software?

1370.

The system engineering process usually begins with the

1371.
Specify the 2 library functions to dynamically allocate memory?

1372.

By following modern system engineering practices simulation of reactive systems is no longer


necessary.

1373.

What keyword covers unhandled possibilities?

1374.

WHICH OF THE BELOW IS NOT AN EMAIL PROTOCOL?

1375.

During
busines
s
process
enginee
ring,
three
different
architect
ures are
examine
d

1376.

WHICH OF THE BELOW IS CALLED CLASSLESS ADDRESS?

1377.

The goal of product engineering is to translate the customer's desire for a set of defined capabilities
into a working product.

1378.

The architecture components for


product engineering are

1379.

WE RECEIVED “404 – PAGE NOT FOUND” MESSAGE, WHEN WE BROWSE THE WEB PAGE.
WHICH PROTOCOL PROVIDES THIS MESSAGE?

1380.

The system specification describes the

1381.

class n{ int a=0;}obj; what will happen?

1382.

Identify the invalid statement from the following

1383.

The best way to conduct a


requirements validation
review is to

1384.

A variable P is called pointer if

1385.

The use of traceability tables helps to

1386.

A
stak
ehol
der
is
any
one
who
will
pur
cha
se
the
com
plet
ed
soft
war
e
syst
em
und
er
dev
elop
me
nt.

1387.

SELECT THE HIGHEST PRIORITY OPERATOR

1388.

The
job
of
the
req
uire
me
nts
engi
nee
r is
to
cate
gori
ze
all
stak
ehol
der
info
rma
tion
in a
way
that
allo
ws
deci
sion
mak
ers
to
cho
ose
an
inte
rnall
y
con
sist
ent
set
of
req
uire
me
nts.

1389.

Which of the following operators has an associativity from Right to Left?

1390.

Which of the following function sets first n characters of a string to a given character?

1391.

The nature of collaboration is such that all system requirements are defined by consensus of a
committee of customers and developers.
1392.

The library function used to find the last occurrence of a character in a string is

1393.

In collaborative requirements gathering,


the facilitato

1394.

Consider the following function

double f(double x)

if (abs(x*x - 3) < 0.01) return x;

else return f(x/2 + 1.5/x);

Give a value q (to 2 decimals) such that f(q) will return q:_____.

1395.

The
wor
k
pro
duct
s
pro
duc
ed
duri
ng
req
uire
me
nt
elici
tatio
n
will
vary
dep
endi
ng
on
the

1396.

In
win-
win
neg
otiat
ion,
the
cust
om
er's
nee
ds
are
met
eve
n
tho
ugh
the
dev
elop
er's
nee
d
may
not
be.

1397.

Which header file should be included to use functions like malloc() and calloc()?

1398.
In
req
uire
me
nts
vali
dati
on
the
req
uire
me
nts
mo
del
is
revi
ewe
d to
ens
ure
its
tech
nica
l
feas
ibilit
y.

1399.

Consider the following C declaration

struct {

short s [5]

union {

float y;

long z;

}u;
} t;

Assume that objects of the type short, float and long occupy 2 bytes, 4 bytes and 8 bytes,
respectively. The memory requirement for variable t, ignoring alignment

considerations, is

1400.

For purposes of behavior modeling a state is any

1401.

If a class C is derived from class B, which is derived from class A, all through public inheritance, then
a class C member function can access

1402.

class n{ int a;}; how much memory the compiler allocates for this class

1403.

The importance of software design can be summarized in a single word

1404.

Polymorphism reduces the effort required to extend an object system by

1405.

Overloading the function operator

1406.

The two statements that can be used to change the flow of control are

1407.

Whi
ch
desi
gn
mo
del
is
anal
ogo
us
to
the
det
aile
d
dra
win
gs
of
the
acc
ess
poin
ts
and
exte
rnal
utilit
ies
for
a
hou
se?

1408.

To determine the architectural style or combination of styles that best fits the proposed system,
requirements engineering is used to uncover

1409.

If p and q are assigned the values 2 and 3 respectively then the statement P = q++

1410.

Usually a pure virtual function

1411.

Which of the following is not an example of infrastructure components that may need to be
integrated into the software architecture?

1412.
Quantitative methods for assessing the quality of proposed architectural designs are readily
available.

1413.

Run time polymorphism is achieved by ______

1414.

When the overall flow in a segment of a data flow diagram is largely sequential and follows straight-
line paths, _________ is present.

1415.

A property which is not true for classes is that they

1416.

The levels of hierarchy in inheritance helps to handle

1417.

When a single item that triggers other data flow along one of many paths of a data flow diagram,
________ characterizes the information flow.

1418.

In the context of object-oriented software engineering a component contains

1419.

Creating additional function similar to template function is called

1420.

Classes and components that exhibit functional, layer, or communicational cohesion are relatively
easy to implement, test, and maintain.

1421.

A parameterized constructor with all arguments initialized is same as

1422.
Soft
war
e
cou
plin
g is
a
sign
of
poo
r
arc
hite
ctur
al
desi
gn
and
can
alw
ays
be
avoi
ded
in
eve
ry
syst
em.

1423.

Compile time polymorphism is

1424.

Which model
depicts the
profile of the end
users of a
computer
system?

1425.

Which of the following correctly describes C++ language?

1426.

Routine is not loaded until it is called. All routines are kept on disk in a relocatable load format. The
main program is loaded into memory & is executed. This type of loading is called _________

1427.

Which of these framework activities is not normally associated with the user interface design
processes?

1428.

Which of the following is not the characteristic of constructor?

1429.

Usability questionnaires are most meaningful to the interface designers when completed by

1430.

A static data member is given a value

1431.

In
soft
war
e
qual
ity
ass
ura
nce
wor
k
ther
e is
no
diffe
ren
ce
bet
wee
n
soft
war
e
verif
icati
on
and
soft
war
e
vali
dati
on.

1432.

The best reason for


using Independent
software test teams is
that

1433.

Which of the following (in file scope) leads to a compile-time error?

1434.

What is the normal order of activities in which traditional software testing is organized? a.
integration testing b. system testing c. unit testing d.validation testing

1435.

which of the following is an incorrect definition inside a class ?

1436.

If a constructor function is defined in private section of a class, then

1437.
Cla
ss
testi
ng
of
obje
ct-
orie
nte
d
soft
war
e is
equi
vale
nt
to
unit
testi
ng
for
trad
ition
al
soft
war
e.

1438.

Wh
en
testi
ng
obje
ct-
orie
nte
d
soft
war
e it
is
imp
orta
nt
to
test
eac
h
clas
s
ope
rati
on
sep
arat
ely
as
part
of
the
unit
testi
ng
pro
ces
s.

1439.

The stream insertion operator should be overloaded as

1440.

The
focu
s of
vali
dati
on
testi
ng
is to
unc
ove
r
plac
es
that
a
use
r
will
be
able
to
obs
erv
e
failu
re
of
the
soft
war
e to
conf
orm
to
its
req
uire
me
nts.

1441.

Data Members of the base class that are marked private:

1442.

The call to the parameterized constructor of base class in the derived class

1443.

Software validation is achieved through a series of tests performed by the user once the software is
deployed in his or her work environment.

1444.

Acceptance tests are normally conducted by


the
1445.

Which of the following statements is NOT valid about operator overloading?

1446.

What is the return type of the conversion operator function?

1447.

Sec
urity
testi
ng
atte
mpt
s to
verif
y
that
prot
ecti
on
mec
hani
sms
built
into
a
syst
em
prot
ect
it
fro
m
imp
rop
er
pen
etra
tion

1448.
Stre
ss
testi
ng
exa
min
es
the
pre
ssur
es
plac
ed
on
the
use
r
duri
ng
syst
em
use
in
extr
em
e
envi
ron
me
nts

1449.

If the class name is X, what is the type of its "this" pointer?

1450.

Performance
testing is only
important for
real-time or
embedded
systems.
1451.

Which of the following statements are true in c++?

1452.

Program flow graphs are identical to program flowcharts.

1453.

What is the purpose of $_SESSION[]?

1454.

In mysql_fetch_array(),if two or more columns of the result have the same field names, what action
is taken?

1455.

The cyclomatic complexity metric provides the designer with information regarding the number of

1456.

Condition testing is a control structure testing technique where the criteria used to design test cases
is that they

1457.

Which of the following attribute is needed for file upload via form?

1458.

What library do you need in order to process images?

1459.

Dat
a
flow
testi
ng
is a
cont
rol
stru
ctur
e
testi
ng
tech
niqu
e
whe
re
the
crite
ria
use
d to
desi
gn
test
cas
es
is
that
they

1460.

What is the correct way to connect to a MySQL database?

1461.

Loo
p
testi
ng
is a
cont
rol
stru
ctur
e
testi
ng
tech
niqu
e
whe
re
the
crite
ria
use
d to
desi
gn
test
cas
es
is
that
they

1462.

Boundary value
analysis can only be
used to do white-box
testing.

1463.

You need to check the size of a file in PHP function. $size = X(filename); Which function will suitably
replace 'X'?

1464.

What is x+ mode in fopen() used for?

1465.

Which of the following function is used to terminate the script execution in PHP?

1466.

Which method is used to search for a substring?


1467.

Which is the correct way to write a JavaScript array?

1468.

The _______ method of an Array object adds and/or removes elements from an array.

1469.

What does parseFloat(9+10) evaluates to in JavaScript?

1470.

Consider the following code: var a = []; a.unshift(1); a.unshift(22); a.shift(); a.unshift(3,[4,5]); a.shift();
a.shift(); a.shift(); The final output for the shift() is

1471.

What does /[^(]* regular expression indicate ?

1472.

What gets printed? $str = 'a\\b\n'; echo $str;

1473.

What is the strpos() function used for?

1474.

In the following code snippet, what is the correct value of the left margin? margin: 10px 5px 20px
15px;

1475.

If inspected in a browser, what will be the total width of the div in the following code snippet?
#container { width: 600px; border: 2px solid #CCCCCC; padding: 30px 20px; margin: 20px 10px
40px 10px;}

1476.

Which of the following is not a valid attribute of the INPUT tag?

1477.

Which of these sets of HTML5 attributes can be used for form validation?

1478.
Which item is an example of a physical network address?

1479.

When used with the datalist element, what is the list attribute in HTML5 used to accomplish?

1480.

What is the following style an example of? img[alt~="Pie"]

1481.

What is the correct CSS syntax for making all the elements bold?

1482.

How can you specify default text in an input field?

1483.

Currently there is no single standard file type that can be used to play audio using the audio element
consistently on all browsers. Which is the solution that the audio element provides to resolve this
conflict?

1484.

Which of the following statements is true?

1485.

How do we prevent margins, borders and padding from overlapping?

1486.

Which of the following ways below is correct to write a CSS?

1487.

Which of the following explains cookies nature?

1488.

Consider the following code snippet: var a = [1,2,3,4,5]; a.slice(0,3); What is the possible output for
the above code snippet?

1489.

What does /[^(]* regular expression indicate?

1490.
Which property is used to obtain browser vendor and version information?

1491.

What is the result of the following code snippet? window.location === document.location

1492.

The length property belongs to which of the following objects?

1493.

What will happen if the first argument of open() is omitted?

1494.

Which of the following can't be done with client-side JavaScript?

1495.

----------- is a built - in JavaScript function which can be used to execute another function after a
given time interval.

1496.

How do substring() and substr() differ?

1497.

In javascript, RegExp Object Method test() is used to search a string and returns _________

1498.

What is the most essential purpose of paranthesis in regular expressions?

1499.

Which of the following is not possible using PHP?

1500.

Which one of the following is the very first task executed by a session enabled page?

1501.

What would be the output of the below code fragment? var a = ["s","a","v","e"];
document.write(a.join(""));

1502.

The ___________ property specifies the stack order of an element


1503.

Which of the following property allows you to specify an element’s position with respect to the
browser window?

1504.

Internet Explorer uses ....................... property to create transparent images.

1505.

If para1 is the DOM object for a paragraph, what is the correct syntax to change the text within the
paragraph?

1506.

The syntax of Eval is ___________

1507.

How to create a Date object in JavaScript?

1508.

What is the code to start displaying the time when document loads?

1509.

Which element is used to draw graphics images on a web page?

1510.

One of the main advantage of using src attribute is

1511.

In PHP, which of the following function is used to insert content of one php file into another php file
before server executes it

1512.

How do you get information from a form that is submitted using the "get" method?

1513.

What does explode function in php do

1514.

Which command we use to set an image on background?


1515.

A value that has no defined value is expressed in PHP with the following keyword:

1516.

Which JavaScript function is most useful for finding errors?

1517.

JavaScript RegExp Object has modifier 'i' to __________

1518.

You can find the element you want to manipulate by ________ way?

1519.

The Document object is which part of the object?

1520.

The node type for document returns the value ---.

1521.

Syntax for creating a RegExp object: (i). var txt=new RegExp(pattern,modifiers); (ii). var
txt=/pattern/modifiers; Which of the above mentioned syntax will correct?

1522.

Which of these contains an executable statement?

1523.

Which of the following is NOT a valid PHP comparison operator?

1524.

$a = array( null => 'a', true => 'b', false => 'c', 0 => 'd', 1 => 'e', '' => 'f' ); echo count($a), "\n"; What
will be printed?

1525.

$a = array(); if ($a[1]) null; echo count($a), "\n"; What will be printed?

1526.

How do we access the value of 'd' later? $a = array( 'a', 3 => 'b', 1 => 'c', 'd' );

1527.
What is the difference between echo and print?

1528.

How do we submit form data without a Sumbit button?

1529.

How can we count the number of elements in an array?

1530.

How do I create PHP arrays in a HTML ?

1531.

What is the default size of a file set in upload_max_filesize ?

1532.

What happens if no file path is given in include() function?

1533.

What is the default execution time set in set_time_limit()?

1533.

What is the default execution time set in set_time_limit()?

1534.

____________ function in PHP returns a list of response headers sent (or ready to send)

1.
 Finite automata recognizes --------grammars


2.
 All member functions are _____ to it's class by default

3.
 Having more than one constructor in a class is


4.
 Which of the following is a complete function?
5.
 Overloading the function operator

6.
 A property which is not true for classes is that they


7.
 A friend function to a class A cannot access
8.
What will be the output of the following code #include void main() { int i;
int a[3]=5; for (i=2;i>=0;i--) { printf(?%d\n?,a[i]); } }
9.
 In C++, dynamic memory allocation is achieved with the operator
_______
10.
 Which is not a proper prototype?
11.
 Variables inside parenthesis of functions declarations have
_______ level access.

12.
 Which of the following is the insertion operator?


13.
 If you assign a default value to any variable in a function prototype's
parameter list, then _____

14.
 What does the following declaration mean? int (*ptr)[10];


15.
 Which of the following calls a function named displayName, passing
it no actual arguments?

16.
 If you want to use a class to define objects in many different


programs, you should define the class in a C++ _____ file
17.
 Many programmers separate a class into two files: _____

18.
 How will you free the allocated memory ?


19.
 Files whose names end in .h are called _____ files
20.
 Overloading involves writing two or more functions with ________
21.
 Usually a pure virtual function
22.
 Two access specifiers in C++ are
23.
 The library function used to find the last occurrence of a character in
a string is
24.
 ___________ programs automatically connects to web sites and
download documents and save them to local drive
25.
Given the code
 String s1 = ? VIT? ;
 String s2 = ? VIT ? ;
 String s3 =
new String ( s1);
 Which of the following would equate to true?
25.

Given the code
 String s1 = ? VIT? ;
 String s2 = ? VIT ? ;
 String s3 =


new String ( s1);
 Which of the following would equate to true?
26.

____________ is referred to as Static Web


27.

How do you write "Hello World" in PHP?


28.

What does JSP stand for?


29.

What are the parameters of the service method?


30.

Which of these methods has no restrictions on content size when a form


is submitted.
31.

The following function computes the maximum value contained in an


integer array p[ ] of size n (n >= 1).
 int max(int *p, int n) {
 int a=0,
b=n-1;
while (__________) {
 if (p[a] <= p[b]) { a = a+1; } else { b = b-1; }
}
 return p[a];
 }
 The missing loop condition is
32.

Consider the following recursive C function. Void get (int n)
 {if (n<1)
return;
 get (n-1)
get (n-3) ;
 printf ("%d",n);
 If get(6) function is being called in main ()
then how many times will the get() function be invoked before returning
to the main ( ) ?
33.

Which of the following is/are example(s) of stateful application layer


protocols? (i)HTTP
 (ii)FTP
 (iii)TCP
(iv)POP3
34.

#include
 int main ()
 {
 static int a[]={10, 20, 30 40, 50};
 static int
*p[]= {a, a+3, a+4, a+1, a+2}; int **ptr=p;
 ptr++;
 printf ("%d%d", ptr
p, **ptr);
 }
 The output of the program is __________
35.

What will be the output of the following C program? void count(int


n){
 static int d=1;
 printf("%d ", n);
printf("%d ", d); d++;
 if(n>1) count(n-1); printf("%d ", d);
}
 void main(){ count(3);
 }
36.

Consider the following program: int f(int *p, int n)
 {
 if (n <= 1) return
0;
else return max ( f (p+1, n-1),p[0]-p[1]); }
 int main()
 {
int a[] = {3,5,2,6,4};
 printf("%d", f(a,5));
 }
 The value printed by this
program is
37.

To prevent any method from overriding, the method has to declared as,
38.

A Search engine can serve as


39.

Consider the following C program. #include
 int f1 (void) ;
 int f 2 void


;
int x 10;
 int main ()
 {
 int x=1;
 x+=f1()+ f2()+f3()+f2()
;
 printf("%d", x);
 return 0;
 }
 int f1(){int x=25; x++; return x;}
 int
f2(){static int x =50; x++;return x;} int f3(){x*=10; return x};
 The
output of the program is_________.
40.

Consider the function func shown below: int func(int num) {
 int count
= 0;
 while (num) {
count++; num>>= 1;
 }
 return (count);
}
 The value returned by func(435)is
41.

Consider the following C program segment. #include
 intmain()
 {char


sl [7]="1234",*p;
p=sl+2;
 *p='0';
 printf ("%s",sl)
 }
 What will be printed by the
program?
42.

Which one is the first search engine in internet?


43.

Sockets originate from


44.
What will be printed as the output of the following program? public
class testincr
 {
 public static void main(String args[])
{
 int i = 0;
 i = i++ + i; System.out.println(" I = " +i); }
 }
45.

An object of class A receives a message with an argument that is an


instance of class B. Identify the type of relationship between class A and
Class B:
46.

A graphical HTML browser resident at a network client machine Q


accesses a static HTML webpage from a HTTP server S. The static
HTML page has exactly one static embedded image which is also at S.
Assuming no caching, which one of the following is correct about the
HTML webpage loading (including the embedded image)?
47.

Consider the following program in C language:


#include main()
 {
 int i;
int *pi = &i; scanf(?%d?,pi); printf(?%d\n?, i+5); }
Which one of the following statements is TRUE?
48.

#include
 using namespace std; int main()
 {
 int x=20; if(!(!x)&&x)


cout<<x;
else {
x=10; cout<<x;
return 0; }
}
49.

Consider the following function written the C programming language.


void foo (char * a ) {
 if (* a & & * a ! =' ' ){
 putchar (*a);
}
 }
 }
 The output of the above function on input 'ABCD EFGH' is
50.

A set of documents in which a given document can contain text, graphics video
and audio clips as well as embedded references to other documents world
wide web pages are called as
 ---------------

51.
Given the following structure template, choose the correct syntax
for accessing the 5th subject marks of the 3rd student:

struct stud {
int marks[6]; char sname[20]; char rno[10];
}s[10];
52.

Consider the following C code segment: int a, b, c = 0;
 void


prtFun(void);
 main( )
{ static int a = 1; /* Line 1 */ prtFun( );
 a + = 1;
 prtFun( )
printf(?\n %d %d ?, a, b);
 }
 void prtFun(void)
 { static int a=2; /*
Line 2 */ int b=1;
a+=++b;
 printf(?\n %d %d ?, a, b);
 }
 What output will be generated
by the given code segment if: Line 1 is replaced by auto int a = 1;
 Line
2 is replaced by register int a = 2;
53.

Consider the following program: int f(int *p, int n)
 {
 if (n <= 1) return
0;
else return max ( f (p+1, n-1),p[0]-p[1]); }
 int main()
 {
int a[] = {3,5,2,6,4};
 printf("%d", f(a,5));
 }
 The value printed by this
program is
54.

Consider the following program in C language:


main()
 {
 int i;
 int *pi = &i; scanf("%d",pi); printf("%d\n", i+5); }
Which one of the following statements is TRUE?
55.

Which method is used for loading the driver in Java JDBC.


56.

Which of the following input controls that cannot be placed using


<input> tag?
57.

Which of the following in HTML is used to left align the content


inside a table cell?
58.

#include <stdio.h>
int main()
{
int a=10;
int b=2;
int c;
c=(a & b);
printf("c= %d",c);
return 0;
Find the output.
}

59.

#include <stdio.h>
#define MOBILE 0x01
#define LAPPY 0x02
int main() {
unsigned char item=0x00;
item |=MOBILE;
item |=LAPPY;
printf("I have purchased ...:"); if(item & MOBILE){
printf("Mobile, ");

}
if(item & LAPPY){
printf("Lappy");
}
 return 1;

60.

#include <stdio.h>
int main()
{
char flag=0x0f;
flag &= ~0x02;
printf("%d",flag);
return 0;
Predict the output.
}

61.
#include <stdio.h> int main()
 {

int a=10; if(a==10) {

printf("Hello...");
break;
printf("Ok");
} else {

printf("Hii");
}
return 0; }

Find the output.


62.
#include int main()

{
if( (-100 && 100)||(20 && -20) )
printf("%s","Condition is true.");
else
printf("%s","Condition is false."); return 0;

}
Find the output
63.

#include #define TRUE 1 int main()
 {

if(TRUE)
printf("1");
printf("2");
else
printf("3");
printf("4"); return 0;

}
Find the output.
64.
#include <stdio.h> int main()
 {

int pn=100; if(pn>20)


if(pn<20)
printf("Heyyyyy");
else
printf("Hiiiii");
return 0; }

Find the output.


65.
#include int main() {

int a=10; if(10L == a)

printf("10L"); else if(10==a)

printf("10");
else
printf("0"); return 0;

Find the output.


66.
#include

void

main(){

unsigned char
printf("%d",c);

Find the output


67.
#include <stdio.h> void main(){

int a=0; a=5||2|1; printf("%d",a);

}
Find the output.
68.
}

#include

int

main(){

float

char

a=125.50;

c=290;

int

=125.50;

c='A';

printf("%d,%d,%d\n",sizeof(a),sizeof(b),sizeof(125.50));

printf("%d,%d\n",sizeof(c),sizeof(65));

return

0;

What will be the output on a 32 bit compiler.


69.
{

Find the output.


70.
{

#include

int

main()

#include

};

int

-100;

return

ok=-100;

printf("%d",ok);

numbers

0;

enum

zero, one, two, three , four=3,five,six,seven=0,eight

void

main()

printf("%d,%d,%d,%d,%d,%d,%d,%d,%d",zero,one,two,three,four,five,six,s
even,eight);

What will be the output.


71.
#include <stdio.h> int main(){

int a,b,c;
 a=0x10; b=010;
 c=a+b;
 printf("\nAddition is=


%d",c); return 0;

}
Find the output.
72.
{

Find the output


73.
 Find the output:
{

74.
{

75.
 Find the output:


{

#include

int

main()

#include

int

var=250;

printf("value of var = %d\n",var);


200+50;

"includehelp.com";
printf("%s\n","includehelp");

return

0;

int

main()

int

a=100;

printf("%d\n"+1,a);
printf("Value is = %d"+3,a);

return

0;

What will be the output?


#include <stdio.h>

int

main()

extern

int

ok;

printf("value of ok = %d",ok);

return

extern i
ok=100
n
t 0;

#include <stdio.h>
0;

int

main()

int

a=23;

;printf("%d",a);
;

return

0;

#include

int

main()

int

intVar=24;

static

int

x=intVar;

printf("%d,%d",intVar,x);

return
0;

Find the output of this program, (program name is: static_ec.c)


#include <stdio.h>

int

main()

int

a=15;

float

b=1.234;

printf("%*f",a,b);

return

0;

Predict the output?


#include <stdio.h>

int

main()

int

a=15;

float

b=1.234;

printf("%*f",a,b);

return

0;
Predict the output?
#include <stdio.h>

int

main()

float

a,b;

a=3.0f;
b=4.0f;
printf("%.0f,%.1f,%.2f",a/b,a/b,a/b);

return

0;

Find the output.

76.
{

77.
{

77.
{

78.
{

}
79.
 What type of declaration is this:

#include <stdio.h>

void

main()

const

#include <stdio.h>
char

var='A';

++var;

printf("%c",var);

void

main()

int

x=10;

x+=(x++)+(++x)+x;
printf("%d",x);
#include <stdio.h>

void

main()

int

a=10,b=2,x=0;
x=a+b*a+10/2*a;
printf("value is =%d",x);
#include <stdio.h>

void

main()

unsigned short
var='B';

var+=2;

var++;

printf("var : %c , %d ", var,var);


Find the output
#include <stdio.h>

void

main()

char

var=10;

printf("var is = %d",++var++);
unsigned num;

80.
 Which statement does not require semicolon?

81.
 Find the output:


}

82.
 FIND THE OUTPUT:


}

83.
 PREDICT THE OUTPUT:


}

84.
}

85.
 Find the output:


}

#include <stdio.h>

void

main()

int

int

x=(20 || 40 ) && (10);


printf("x= %d",x);
#include <stdio.h>

void

main()

x;

x= (printf("AA")||printf("BB"));
printf("%d",x);
printf("\n");
x= (printf("AA")&&printf("BB"));
printf("%d",x);
Find the output
#include <stdio.h>

void

main()
int

a=3,b=2;

a=a==b==0;

printf("%d,%d",a,b);
86.
 Find the output:
}

87.
{

88.
 What is the output?


{

89.
}

90.
}

#include <stdio.h>

void

main(){

int

intVar=20,x;
x= ++intVar,intVar++,++intVar;
printf("Value of intVar=%d, x=%d",intVar,x);
Find the output
#include <stdio.h>
int

main(){

char

val=250;

int

ans;

ans= val+ !val + ~val + ++val;


printf("%d",ans);

return

0;

Find the output.


91.
}

Find the output


92.
}

Find the output


93.
{

Find the output


94.
{

}
Find the output
95.
{

#include <stdio.h>

int

main(){

float

(int)a= 10;

return

#include <stdio.h>
int

a;

printf("value of a=%d",a);

x=100,30,50;
0;

int

main(){

x;

printf("x=%d\n",x);
x=(100,30,50);
printf("x=%d\n",x);

return

#include <stdio.h>
0;
int

main()

int

i=-1,j=-1,k=0,l=2,m;
m=i++&&j++&&k++||l++;
printf("%d %d %d %d %d",i,j,k,l,m);

return

#include <stdio.h>
0;

int

main()

int

var;

var=- -10;

printf("value of var= %d\n",var);


var=+ +10;

printf("value of var= %d\n",var);

return

#include <stdio.h>
0;

int

main()

int
x,y;

x=(100,200);
y=100,200;

printf("x=%d,y=%d",x,y);
0
return ;

Find the output


96.
 Arrange the operators according to their precedence: +, %, ->, =

97.
 Find the output


#include <stdio.h>
{

98.
#include <stdio.h>
{

Find the output


99.
#include <stdio.h>
{

i
main
n
()
t

int

x=65;
const

unsigned char
printf("%c\n",c);
c=(int)x;

0
return ;

i
main
n
()
t

int

x=2.3;

const const

char char

c1=(float)x;

c2=(int)x;

printf("%d,%d\n",c1,c2);
0
return ;

i
main
n
()
t

char

char

*text="Hi Babs.";
x=(char)(text[3]);
printf("%c\n",x);

return

Find the output


0;

100.
#include <stdio.h>
{

Find the output


101.
#include <stdio.h>
{

Find the output


102.
}

Find the output


103.
i
main
n
()
t

int

0
return ;

main
i
()
n
t

char

return

x=65;

const

unsigned char
printf("%c\n",c);
*text="Hi Babs.";
c=(int)x;

char

x=(char)(text+3);
printf("%c\n",x);

#include <stdio.h>
0;

void

main()

int

main()

int

a=10;
switch(a){

case

default:

#include <stdio.h>
void

a=2;

switch(a)

5+5:

printf("Hello\n");
printf("OK\n");
printf("Message\n");
default:

case

case

printf("Default\n");
2:

printf("Case-2\n");
3:

printf("Case-3\n");
printf("Exit from switch\n");

Find the output


104.
{

#include <stdio.h>
void

a=2;
int int
b=a;

main()

switch(b)

Find the output


105.
{

Find the output


106.
{

main()

case

default:

a:

printf("Case-a\n"); break;

case

3:

printf("Case-3\n"); break;
printf("No option\n"); break;
printf("Exit from switch");
#include <stdio.h>
void

short

switch(day)

day=2;

short

case

break;

default:

break;

#include <stdio.h>
switch(a)

a=2;

case

case

default:

2: || case

printf("%d nd",day);
printf("%d th",day);
1L:

printf("One\n");
break;
2L:

printf("Two\n");
break;

22:

void

main()

#include <stdio.h>
printf("Else\n");

Find the output


107.
#include <stdio.h>
void

main(){

static

case

case

int

default:

staticVar;

int

j;

for(j=0;j<=5;j+=2)
switch(j){
case

1:

staticVar++;
break;

2:

staticVar+=2;
4:

staticVar%=2;
j=-1;

continue;

--staticVar;
continue;

printf("%d",staticVar);

Find the output


108.
{

void

main()

int

a=2;

switch(a/2*1.5)
{

case
}

Find the output


109.
#include <stdio.h>

void

main(){

int

a=1;

switch(a/2)

break;

1:

printf("One...");
break;

case

default:

2:

printf("Two...");
break;

printf("Other...");
break;

case

case

NULL:

printf("Case NULL\n");
break;

0:

default:

printf("Case ZERO\n");
break;

printf("DEFAULT\n");
break;

Find the output


#include <stdio.h>

int

main()

int

lbl:

i;

for(i=0; i< 5; i++)


{

if(i*i > 30 )

goto

lbl;

else

printf("%d",i);
printf("IHelp ");
}

return
Find the output
#define TRUE 1
0;

#include <stdio.h>

int

main()

switch(TRUE)
{

printf("Hello");
}

Find the output


#include < stdio.h >

void

main()

{ unsigned char
var=0;

for(var=0;var<=255;var++);
{

printf("%d ",var);

110.
{

111.
{

}
112.
}

Find the output


113.
{

Find the output


114.
{

fun()

Find the output


115.
 Find the output
{

116.
{

#include <stdio.h>

void

char

main()
cnt=0;

for(;cnt++;printf("%d",cnt)) ;
printf("%d",cnt);
#include <stdio.h>

void

main()

int

print:

i=1;

while

if

i++;

(i<=5)

printf("%d",i);

(i==5)

goto

printf("includehelp.com");
#include < stdio.h >
print;

int

main()
int

for(;;)

tally=0;

if(tally==10)

#include <stdio.h>
break;

printf("%d ",++tally);

return

0;

void

main()

int

tally;

for(tally=0;tally<10;++tally)
{

printf("#");
if(tally>6)

Find the output


#include <stdio.h>

void

main()

int i,j,charVal='A
';
for(i=5;i>=1;i--)
{
for(j=0;j< i;j++)
}

printf("%c ",(charVal+j));
printf("\n");
Identify the output
#include <stdio.h>

void

main()

int

cnt=1;

while(cnt>=10)
{

printf("%d,",cnt);
cnt+=1;

printf("\nAfter loop cnt=%d",cnt);


printf("\n");
Find the output
Find the output
#include

#define TRUE 1

int

main()

int

loop=10;

continue;

printf("%d",tally);
}

while(printf("Hello ") && loop--);


#include <stdio.h>

int

main()

117.
{

118.
{

119.
{ }

120.
{

static

int

Find the output


#include <stdio.h>

int

main()

int int

return

main()
MAX=10;

array[MAX];

printf("size of array is = %d",sizeof(array);

0;

Find the output


Find the output
Find the output
Find the output
#include <stdio.h>
#define MAX 10

int

main()

{ int

array[MAX]={1,2,3},tally;
for(tally=0;tally< sizeof(array)/sizeof(int);tally+=1)
printf("%d ",*(tally+array));

return

0;

#include <stdio.h>

int

{ static

return

int

count=0;

int

var[5];
var[++count]=++count;
for(count=0;count<5;count++)
printf("%d ",var[count]);

return

0;

x[]={'A','B','C','D','E'},tally;
for(tally=0;tally< sizeof(x)/sizeof(int) ; tally+=1)
printf("%c,%c,%c\n",*(x+tally)+1,x[tally]+1,*(tally+x)+1);

return

0;

#include <stdio.h>

int

main()

{ static

int

array[]={10,20,30,40,50};
printf("%d...%d",*array,*(array+3)* *array);

0;

121.
{

122.
}

123.
}

124.
}

125.

#include <stdio.h>

int

main()

{ int

0
return ;

Find the output


#include <stdio.h>

int

main()

{ int

return

a[5]={1,2,3,4,5},b[5]={10,20,30,40,50},tally;
for(tally=0;tally< 5;++tally)
*(a+tally)=*(tally+a)+ *(b+tally);
for(tally=0;tally< 5;tally++)
printf("%d ",*(a+tally));
a[5]={0x00,0x01,0x02,0x03,0x04},i;
i=4;

while(a[i])

printf("%02d ",*a+i);
--i;

0;

Find the output


#include <stdio.h>

int

main()

char

X[10]={'A'},i;
for(i=0; i<10; i++)
printf("%d ",X[i]);

return

0;

Find the output

126.
}

127.
{

128.
 Pick an incorrect declaration:

1. int x[5];
2. int x[5]={1,2,3,4,5};
3. int x[5] = {1,2}
4. int x[];
129.
 Which one of the following correctly describes the meaning of
'namespace' feature in C++?
130.
 Which of the following language feature is not an access specifier
in C++?

131.
 Which of the following is not a type of constructor?

132.
 In C++, dynamic memory allocation is accomplished with the


operator ____
133.
 Which of the following is false for cin?

134.
 The members of a class, by default, are


135.
 The call to the parameterized constructor of base class in the
derived class

136.
 Which of the following statements is NOT valid about operator


overloading?
137.
 What is the return type of the conversion operator function?

138.
 If the class name is X, what is the type of its "this" pointer?
139.
 If a constructor function is defined in private section of a class,
then
140.
 The stream insertion operator should be overloaded as
141.
 class A { int a; static float b; } ; What is the size of class A?

142.
 Data Members of the base class that are marked private:
143.
 Which of the following (in file scope) leads to a compile-time error?
144.
 The default copy constructor performs
145.
 which of the following is an incorrect definition inside a class ?
146.
 Which one of the following is the correct way to declare a pure
virtual function?
147.
 Usually a pure virtual function
148.
 Which of the following operator can be overloaded through friend
function?
149.
 If class A is friend of class B and if class B is friend of class C,
which of the following is true?

150.
 Which of the following is not the characteristic of constructor?


151.
 A static data member is given a value

152.
 How many instances of an abstract class can be created?

153.
 What will be the result of the expression 13 & 25


154.
 Function templates can accept

155.
 In which case is it mandatory to provide a destructor in a class?

156.
 If we create a file by ‘ifstream’, then the default mode of the file is
_________
157.
 Assume that we have constructor functions for both base class
and derived class. Now consider the declaration in main( ). Base * P =
New Derived; in what sequence will the constructor be called ?
158.
 class n{ public: int *a;}o,p; assigning o=p is called?
159.
 overloading + operator requires return type as object because,
160.
 To create an alias Objects have to be passed by
161.
 Templates improve
162.
 Creating additional function similar to template function is called
163.
 Compile time polymorphism is
164. Abstraction is
165.
 Pick the odd one out.
166.
 A collection of unused memory reserved for dynamic allocation is
called
167.
 The levels of hierarchy in inheritance helps to handle
168.
 Run time polymorphism is achieved by ______
169.
 A property which is not true for classes is that they

170.
 Overloading involves writing two or more functions with ________

171.
 Usually a pure virtual function


172.
{

Find the output


173.
{

Find the output


174.
{

Find the output


175.
{

Find the output


176.
#include <stdio.h>
#include <string.h>

int

main()

int v

al=0;

char

str[]="IncludeHelp.Com";
val=strcmp(str,"includehelp.com");
printf("%d",val);

return

#include <stdio.h>
#include <string.h>
0;

i
main
n
()
t

char

str[];

strcpy(str,"Hello");
printf("%s",str);

return

#include <stdio.h>
int

0;

main()
char

str[8]="IncludeHelp";
printf("%s",str);

return

#include <stdio.h>
#include <string.h>
int

0;

main()

char

str1[]="IncludeHelp",str2[]=".Com";
printf("%s",str1+strlen(str2));

return

#include <stdio.h>
int

main()

0;

Find the output


177.
{

Find the output


178.
{

Find the output


179.
{

Find the output


180.

char

str[]="Hello%s%dFriends";
printf(str);
printf("\n");
printf("%s",str);

return

#include <stdio.h>

int

main()

int a

str[11]='c';
0;

char

str[]="value is =%d";

='7';

printf(str,a);
return

#include <stdio.h>
0;

int

main()

char

result,str[]="\0IncludeHelp";
result=printf("%s",str);
if(result)

else

return

printf("TRUE");
printf("FALSE");

#include <stdio.h>
#include <string.h>
0;

int

main()

char char

s1[]="IncludeHelp";

s2[10];

strncpy(s2,s1,5);
printf("%s",s2);

return
#include <stdio.h>
#include <string.h>
int

main()

0;

char

str[50]="IncludeHelp";
printf("%d...%d",strlen(str),sizeof(str));

return

0;

Find the output


#include <stdio.h>

struct

};

float

sample

int a=

0;

char b

='A';

c=10.5;
int

main()

struct

sample s;

printf("%d,%c,%f",s.a,s.b,s.c);

return

0;

#include <stdio.h>

int

main()

struct s

ample{

int int

a; b;

sample *s;

}t;

printf("%d,%d",sizeof(sample),sizeof(t.s));

return

0;

Find the output


#include <stdio.h>
#include < string.h >
stru stude
ct nt

char

name[20];

}std;

char

* fun(struct

student *tempStd)
strcpy(tempStd->name,"Thomas");

return

tempStd->name;
181.
 Find the output
{

182.
{

183.
{

{ }

i
main
n
()
t

{
}

Find the output


184.
#include <stdio.h>
{

stru samp
ct le

}sample;

strcpy(std.name,"Mike ");
printf("%s%s",std.name,fun(&std));

return

0;

int

a;

i
main
n
()
t

sample.a=100;
printf("%d",sample.a);

return

0;

Find the output


185.
{

Find the output


186.
{

#include <stdio.h>

struct em

int e

ployee{

mpId;

char

*name;

};

int a

ge;

int

main()

employee emp []={ {1,"Mike",24}, {2,"AAA",24}, {3,"BBB",25}, {4,"CCC",30}


struct
};

printf("Id : %d, Age : %d, Name : %s",


emp[2].empId,3[emp].age,(*(emp+1)).name);

return
#include <stdio.h>
0;

int

main()

union

};

union

int

values

char

intVal;

chrVal[2];i

values val;

val.chrVal[0]='A'; val.chrVal[1]='B';
printf("\n%c,%c,%d",val.chrVal[0],val.chrVal[1],val.intVal);

return

Find the output


187.
{

#include <stdio.h>

int
main()

0;

union

};

union

values

unsigned char
unsigned char
unsigned int

a; b;

c;

val.a=1;
val.b=2;
val.c=300;

return

Find the output


188.
{

#include <stdio.h>
values val;

printf("%d,%d,%d",val.a,val.b,val.c);

0;
int

main()

typedef s

}har;

int a

truct

tag{

char

str[10];

har h1,h2={"IHelp",10};
h1=h2;

h1.str[1]='h';
printf("%s,%d",h1.str,h1.a);

return

Find the output


189.
{

#include <stdio.h>

struct

char
int a

0;

int

main()

std

name[30];

ge;

};

Find the output


190.
{

Find the output


191.
{

Find the output


192.
{

Find the output


193.
{

#include <stdio.h>
int

main()

union

test

};

int int

i; j;

union

test var=10;

printf("%d,%d\n",var.i,var.j);

#include <stdio.h>

int

#endif

main()

#ifdef debug

printf("Start debugging...");
printf("IncludeHelp");

return

return

#include <stdio.h>
#define MAX 100

int
main()

#define MAX 20

#include <stdio.h>
#define FUN(x) x*x
0;

printf("MAX=%d...",MAX);

0;

int

int

struct
struct
main()

std s1={"Mike",26};
std s2=s1;

printf("Name: %s, Age: %d\n",s2.name,s2.age);


val=0;

val=128/FUN(8);
printf("val=%d",val);

return

0;

Find the output


#include <stdio.h>
#define FUN(x,y) x##y

int

main()

int

a1=10,a2=20;
printf("%d...%d",FUN(a,1),FUN(a,2));
return

0;

Find the output


#include <stdio.h>
#define LARGEST(x,y) (x>=y)?x:y

int

main()

int

a=10,b=20,l=0;
l=LARGEST(a++,b++);
printf("a=%d,b=%d,largest=%d",a,b,l);

Find the output


#include <stdio.h>
#endif

return

#define OFF 0

int

0;

#if debug == OFF

a=11;

i
main
n
()
t

int

b=22;

printf("%d...%d",a,b);

return
0;

Find the output


#include <stdio.h>
#define TEXT IncludeHelp

int

main()

printf("%s",TEXT);

return

0;

194.
{

195.
{

196.
{

197.
{ }

Find the output


#include <stdio.h>
#define VAR1 VAR2+10
#define VAR2 VAR1+20
i main
n ()
t

printf("%d",VAR1);

return

0;

Find the output


#include <stdio.h>
Find the output
#define SUM(x,y) int s; s=x+y; printf("sum=%d\n",s);

int

main()

SUM(10,20);

return

0;

#include <stdio.h>
#define MAX 99

int

main()

printf("%d...",MAX);
#undef MAX

printf("%d",MAX);

return

Find the output


#include <stdio.h>
0;

int

main()
int

var=100;

int

var=200;

printf("%d...",var);
}

printf("%d",var);

return

0;

Find the output


198.
{ }

199.
{ }

200.
{

201.
{

202.
{ }

char* fun2(void)
{

} {

Find the output


203.
#include <stdio.h>
{

} {

Find the output


204.
#include <stdio.h>
{

#include <stdio.h>
char* fun1(void)

char

return

char

return

i
main
n
()
t

i
fooo(voi
n
d)
t

static
num++;

str[]="Hello";

str;

*str="Hello";

str;

printf("%s,%s",fun1(),fun2());

return

0;

int

num=0;

return

num;

i
main
n
()
t

int

val;

val=fooo();

printf("step1: %d\n",val);
val=fooo();

printf("step2: %d\n",val);
val=fooo();

printf("step3: %d\n",val);

return
0;

i
main
n
()
t

int

anyVar=10;

printf("%d",10);

return

0;

i
exte anyVa
n
rn r;
t

Find the output


#include <stdio.h>

int

main()

char

*str="IncludeHelp";
printf("%c\n",*&*str);

return

0;

Find the output


#include <stdio.h>

int

main()
int

iVal;

char void

cVal;

*ptr; // void pointer


iVal=50; cVal=65;
ptr=&iVal;

printf("value =%d,size= %d\n",*(int*)ptr,sizeof(ptr));


ptr=&cVal;

printf("value =%d,size= %d\n",*(char*)ptr,sizeof(ptr));

return 0;

Find the output


#include <stdio.h>

int

main()

char
char
char
*str []={"AAAAA","BBBBB","CCCCC","DDDDD"};

**sptr []={str+3,str+2,str+1,str};

++pp;

return

***pp;

pp=sptr;

printf("%s",**++pp+2);

0;
Find the output
#include <stdio.h>
char* strFun(void)

char

*str="IncludeHelp";

return

str;

i
main
n
()
t

205.
{

206.
{

207.
{

208.
{

} {

char

*x;

x=strFun();
printf("str value = %s",x);

return

Find the output


209.
{

Find the output


210.
{

Find the output


211.
{

Find the output


212.
{

} {

#include <stdio.h>

int

main()

void

++ptr;

*ptr;
printf("%u",ptr);

return

#include <stdio.h>
int

0;

main()

char void

return

ch=10;

*ptr=&ch;

printf("%d,%d",*(char*)ptr,++(*(char*)ptr));

#include <stdio.h>

int

main()

0;

int int

return

a=10,b=2;

*pa=&a,*pb=&b;
printf("value = %d", *pa/*pb);

#include <stdio.h>

void
fun(int

*ptr=100;

i
main
n
()
t

int int

*pp=#

fun(& *pp);

0;

0;

num=50;

*ptr)

printf("%d,%d",num,*pp);
return

Find the output


213.
{

Find the output Find the output 214.


{

Find the output


215.
{
}

Find the output


216.
{

#include < stdio.h >


0;

int

main()

typedef

AAA aaa=10;
BBB bbb=20;
CCC ccc=30;
DDD ddd=40;
int

AAA,BBB,CCC,DDD;
printf("%d,%d,%d,%d",aaa,bbb,ccc,ddd);

return

#include < stdio.h >


int

0;

main()

typedef

AI var=100;

auto int

printf("var=%d",var);
AI;
return

#include < stdio.h >


0;

int

main()

typedef

char* string;
string myName="ABCDEFG";
printf("myName=%s (size=%d)",myName,sizeof(myName));

return

#include < stdio.h >


int

0;

main()

typedef

}EMP;

int int

struct

empid;

bsal;

EMP E={10012,15100};
printf("%d,%d",E.empid,E.bsal);
return

0;

Find the output


_____ is used to define a special CSS style for a group of HTML
elements

217. 218.

Which of these is a stand alone tag? 219.

Which of the following is included in the head section of HTML


220.

A mailer that transforms a message body of an e-mail into a web


page is called a
221.

If you don’t want the frame windows to be resizeable, simply add


what to the lines ?
222.

What is the correct HTML for making a text input field?


223.

What is cell padding?


224.

Where in an HTML document is the correct place to refer to an external


style sheet?
225.
The following HTML ________ element contains meta data which is
not displayed inside the document
226.

<h2 style="color:blue">I am Blue</h2> is ____ way of styling HTML


elements
227.

The following HTML element helps making animated text


228. 229.

The following HTML element is used to display horizontal line


230.

The _______ attribute defines the action to be performed when the form
is submitted
231.

Which of these will create a shuffled list?


232.

233.

Which of these is Server side technology?


Which of the following explains Cookies nature?
Which attribute is used to extend the lifetime of a cookie?
234.

How can you make a list that lists the items with numbers?
235.

Which method is used to get the year of a date object in YYYY format
in Javascript.
236.

Which one of the following is a cryptographic protocol used to secure


HTTP connection?
237.

Choose the correct HTML to left-align the content inside a tablecell


238.

In HTTP, which method gets the resource as specified in the URI


239.

Which of these is not a valid attribute of <tr> element?


240.

Java package is a grouping mechanism with the purpose of


241.

Find the output of the following program?


#include
 using namespace std;
 void myFunction(int& x, int* y, int* z)
{ static int temp=1;
 temp += (temp + temp) - 1;
 x += *(y++ + *z)+
temp - ++temp; *y=x;
 x=temp;
 *z= x;
 cout<<x<<*y<<*z<<temp;
}
int main() {
 int i = 0;
 int j[] = {0, 1, 2, 3, 4, 5, 6, 7, 8, 9}; i=i++ -
++i;
 myFunction(i, j, &i);
 return 0;
 }
242.
 Find the output of the following program?

#include
using namespace std; typedef int * IntPtr;
 int main()
 {
IntPtr A, B, C; int D,E;
 A = new int(3); B = new int(6); C = new
int(9); D = 10;
E = 20;
 *A = *B;
 B = &E;
 D = (*B)++;
 *C= (*A)++ * (*B)--;
 E=
*C++ - *B--; cout<<*A<<*B<<*C<<d<<e;
return 0; }</d<<e;
243.

Which is the correct CSS syntax?


244.

To link your Web page to a style sheet, you must use the _____ tag
245.

A process executes the code fork ();
 fork ();
 fork ();
The total number of child processes created is
246.

Consider the below code fragment: if(fork k( ) = = 0)
 {
 a= a+5;


printf(?%d, %d \n?, a, &a); }
else
 {
 a= a ? 5;
 printf(?%d %d \n?, 0, &a);
 }
 Let u, v be the values
printed by parent process and x, y be the values printed by child process.
Which one of the following is true?
247.

What does the following bit of JavaScript print out? var a =


[1,,3,4,5];
 console.log([a[4], a[1], a[5]]);
248.

Which one of the following statements is NOT correct about HTTP


cookies?
249.

Consider the C function given below. int f(int j)
 {
 static int i = 50;
int k;
 if (i == j)
 {
 printf("something");
 k = f(i);
 return 0;
 }
 else
return 0;
 }
 Which one of the following is TRUE?
250.

HTTP is implemented over


251.

Mnemonic codes and variable names are used in

252.

By default, any real number in C is treated asChoicesA

253.

For automatic objects, constructors and destructors are called each time the
objects ___

253.

For automatic objects, constructors and destructors are called each time the
objects ___

254.

Which of the following statement is correct about destructors?

255.
 Consider the code snippet given below

var count = [1,,3];


What is the observation made?

256.
 Consider the following code snippet


var a1 = [,,,];
var a2 = new Array(3);
0 in a1
0 in a2

Result of Javascript is:


257.
 The pop() method of the array in javascript does which of the
following task ?

258.
 Consider the following javascript code snippet :

var a = [];
a.unshift(1);
a.unshift(22);
a.shift();
a.unshift(3,[4,5]);
a.shift();
a.shift();
a.shift();
The final output for the shift() is

259.
 Consider the following statements

var text = "testing: 1, 2, 3"; // Sample text
 var pattern =


/\d+/g // Matches all instances of one or more digits
 In order
to check if the pattern matches with the string “text”, the
statement is

260.
 Consider the following javascript statements

x = ~-y;
 w = x = y = z;
 q = a?b:c?d:e?f:g;
 The above code


snippet is equivalent to:
261.
 When there is an indefinite or an infinity value during an arithmetic
value computation, javascript
262.
 The javascript statement a===b refers to
263.
 Consider the following code snippet

function oddsums(n)
{
let total = 0, result=[];
for(let x = 1; x <= n; x++)
{
let odd = 2*x-1;
total += odd;
result.push(total);
}

return result;
}

What would be the output if


oddsums(5);

264.
 Given a variable $email containing the string user@example.com,


which of the following PHP statements would extract the string
example.com?
265.
 Given a comma-separated list of values in a string, which function
from the given list can create an array of each individual value with a
single call in PHP?

266.
 In PHP, array values are keyed by ______ values (called indexed
arrays) or using ______ values (called associative arrays). Of course,
these key methods can be combined as well.

267.
 What will the following script output?


<?php
 $array = array (1, 2, 3, 5, 8, 13, 21, 34, 55); $sum = 0;
 for ($i =
0; $i < 5; $i++) {
 $sum += $array[$array[$i]];
 }
 echo $sum;
 ?>
268.
What elements will the following script output?
<?php
 $array = array (true => 'a', 1 => 'b'); var_dump ($array);
 ?>
269.
 Assume you would like to sort an array in ascending order by
value while preserving key associations. Which of the following PHP
sorting functions would you use?

269.

If every node u in G adjacent to every other node v in G, A graph is said


to be
270.

Consider an undirected random graph of eight vertices. The probability


that there is an edge between a pair of vertices is 1⁄2. What is the
expected number of unordered cycles of length three?
272.

Which of these methods has no restrictions on content size when a form


is submitted.
273.

Consider the following program: int f(int *p, int n)
 {
 if (n <= 1) return
0;
else return max ( f (p+1, n-1),p[0]-p[1]); }
 int main()
 {
int a[] = {3,5,2,6,4};
 printf("%d", f(a,5));
 }
 The value printed by this
program is
274.

Consider the following C code segment: int a, b, c = 0;
 void


prtFun(void);
 main( )
{ static int a = 1; /* Line 1 */ prtFun( );
 a + = 1;
 prtFun( )
printf(?\n %d %d ?, a, b);
 }
 void prtFun(void)
 { static int a=2; /*
Line 2 */
int b=1;
 a+=++b;
 printf(?\n %d %d ?, a, b);
 }
 What output will be
generated by the given code segment if: Line 1 is replaced by auto int a
= 1;
 Line 2 is replaced by register int a = 2;
275.

Consider the following C program. #include
 int f1 (void) ;
 int f 2 void


;
int x 10;
 int main ()
 {
 int x=1;
 x+=f1()+ f2()+f3()+f2()
;
 printf("%d", x);
 return 0;
 }
 int f1(){int x=25; x++; return x;}
 int
f2(){static int x =50; x++;return x;} int f3(){x*=10; return x};
 The
output of the program is_________.
276.
 The while loop is referred to as a(n) _____ loop because the loop
condition is tested at the beginning of the loop

277.
 The word case used in the switch statement represents a


278.
 Which of the following special symbol allowed in a variable name?

279.
 If a university sets up web-based information system that faculty


could access to record student grades and to advise students, that
would be an example of an

280.
 Multiple variable declaration of same data type can be avoided by?
281.
 Run time polymorphism is achieved by ______
282.
 Which of the following gives the memory address of a variable
pointed to by pointer a?
283.
 If a class C is derived from class B, which is derived from class A,
all through public inheritance, then a class C member function can
access
284.
 A default constructor is one that
285.
 A constructor without any arguments is
286.
 Which of the following functions compares two strings?
287.
 class n{ int a;}; how much memory the compiler allocates for this
class

288.
 class n{ public: int a;}

obj; obj.a=10; cout<obj.a;< p="" style="box-sizing: border-


box;"></obj.a;<>

289.
 A class is a

290.
 The levels of hierarchy in inheritance helps to handle


291.
 Compile time polymorphism is

292. Abstraction is

293.
 class n{ public: int a=7;}p,q; cout<<a;< p="" style="box-sizing:


border-box;"></a;<>
294.
 class n{ public: int *a;}o,p; assigning o=p is called?
295.
 To create an alias Objects have to be passed by
296.
 Templates improve
297.

Access to private data is


298.
 Function templates can accept
299.
 How many instances of an abstract class can be created?

300.
 Function templates can accept


301.
 If we create a file by , then the default mode of the file is
_________
302.
 Assume that we have constructor functions for both base class
and derived class. Now consider the declaration in main( ). Base * P =
New Derived; in what sequence will the constructor be called ?
303.
 Overloading a prefix increment operator by means of a member
function takes
304.
 Which of the following is not the characteristic of constructor?

305.
 Which of the following ways are legal to access a class data
member using this pointer?
306.
 Which one of the following is the correct way to declare a pure
virtual function?
307.
 Which of the following operator can be overloaded through friend
function?

308.
 If class A is friend of class B and if class B is friend of class C,


which of the following is true?

309.
 Which of the following (in file scope) leads to a compile-time error?

310.
 which of the following is an incorrect definition inside a class ?


311.
 Which of the following results in a compile-time error?
312.
 If a constructor function is defined in private section of a class,
then
313.
 Which of the following is a valid destructor of the class name
"Country"
314.
 class A { int a; static float b; } ; What is the size of class A?
315.
 Data Members of the base class that are marked private:
316.
 What is true about constant member function of a class?
317.
 The call to the parameterized constructor of base class in the
derived class
318.
 What is the return type of the conversion operator function?
319.
 If the class name is X, what is the type of its "this" pointer?
320.
 All member functions are _____ to it's class by default
321.
 In C++, dynamic memory allocation is accomplished with the
operator ____

322.
 Which of the following is false for cin?

323.
 The members of a class in c++ by default, are


324.
 Which of the following is not a type of constructor?

325.
 Which of the following language feature is not an access specifier


in C++?
326.
 Which one of the following correctly describes the meaning of
'namespace' feature in C++?

327.
 If X is the name of the class, what is the correct way to declare
copy constructor of X?
328.
 What does the following declaration mean? int (*ptr)[10];

329.
 How will you free the allocated memory ?


330.
 What do the 'c' and 'v' in argv stands for?
331.
 ALGORITHM HAS THE ________________ TO THE PROBLEM
IN _______________ NUMBER OF STEPS
332.
 THE DATA TYPE IS ALL ABOUT
333.
 Multiple variable declaration of same data type can be avoided by?
334.
 String length is found by the condition
335.
 Specify the 2 library functions to dynamically allocate memory?
336.
 What keyword covers unhandled possibilities?
337.
 WHICH OF THE BELOW IS NOT AN EMAIL PROTOCOL? 338.
WHICH OF THE BELOW IS CALLED CLASSLESS ADDRESS? 339.
340.

WE RECEIVED “404 – PAGE NOT FOUND” MESSAGE, WHEN WE


BROWSE THE WEB PAGE. WHICH PROTOCOL PROVIDES THIS
MESSAGE?

class n{ int a=0;}obj; what will happen?
 341.
 Identify the invalid
statement from the following
 342.
 A variable P is called pointer
if
 343.
 SELECT THE HIGHEST PRIORITY OPERATOR
 344.
 Which
of the following operators has an associativity from Right to
Left?
 345.
 Which of the following function sets first n characters of a
string to a given character? 346.
 The library function used to find the
last occurrence of a character in a string is
 347.
Consider the following function double f(double x)
 {
 if (abs(x*x - 3) <
0.01) return x; else return f(x/2 + 1.5/x);

}
 Give a value q (to 2 decimals) such that f(q) will return q:_____.
348.
 Which header file should be included to use functions like malloc()
and calloc()? 349.
Consider the following C declaration struct {
 short s [5]
 union {
float y;
 long z;
 }u;
 } t;
 Assume that objects of the type short, float and
long occupy 2 bytes, 4 bytes and 8 bytes, respectively. The memory
requirement for variable t, ignoring alignment
considerations, is 350.
If a class C is derived from class B, which is derived from class A, all
through public inheritance, then a class C member function can access
351.
class n{ int a;}; how much memory the compiler allocates for this class
352.
Overloading the function operator
353.
The two statements that can be used to change the flow of control are

354.

If p and q are assigned the values 2 and 3 respectively then the


statement P = q++

355.

Usually a pure virtual function


356.

Run time polymorphism is achieved by ______

357.
A property which is not true for classes is that they
358.
The levels of hierarchy in inheritance helps to handle
359.

Creating additional function similar to template function is called


360.
A parameterized constructor with all arguments initialized is same as
361.
Compile time polymorphism is
362.
Which of the following correctly describes C++ language?
363.
Routine is not loaded until it is called. All routines are kept on disk in a
relocatable load format. The main program is loaded into memory & is
executed. This type of loading is called _________
364.
 Which of the following is not the characteristic of constructor? 365.

A static data member is given a value


366.

Which of the following (in file scope) leads to a compile-time error?

367.
which of the following is an incorrect definition inside a class ?

368.

If a constructor function is defined in private section of a class, then


369.
The stream insertion operator should be overloaded as
370.
Data Members of the base class that are marked private:

371.
The call to the parameterized constructor of base class in the derived
class
372.

Which of the following statements is NOT valid about operator


overloading?
373.
What is the return type of the conversion operator function?
374.
If the class name is X, what is the type of its "this" pointer?
375.
Which of the following statements are true in c++?

376.

What is the purpose of $_SESSION[]?


377.

In mysql_fetch_array(),if two or more columns of the result have the


same field names, what action is taken?
378.
 Which of the following attribute is needed for file upload via form?
379.
 What library do you need in order to process images?
 380.

What is the correct way to connect to a MySQL database? 381.


You need to check the size of a file in PHP function. $size = X(filename);
Which function will suitably replace 'X'?
382.
What is x+ mode in fopen() used for?
383.

Which of the following function is used to terminate the script execution


in PHP?
384.

Which method is used to search for a substring?


385.
Which is the correct way to write a JavaScript array?
386.
The _______ method of an Array object adds and/or removes elements
from an array.
387.
What does parseFloat(9+10) evaluates to in JavaScript?

388.

Consider the following code: var a = []; a.unshift(1); a.unshift(22);


a.shift(); a.unshift(3,[4,5]); a.shift(); a.shift(); a.shift(); The final output for
the shift() is

389.
What does /[^(]* regular expression indicate ?

390.

What gets printed? $str = 'a\\b\n'; echo $str;


391.
What is the strpos() function used for?
392.
In the following code snippet, what is the correct value of the left margin?
margin: 10px 5px 20px 15px;

393.
If inspected in a browser, what will be the total width of the div in the
following code snippet? #container { width: 600px; border: 2px solid
#CCCCCC; padding: 30px 20px; margin: 20px 10px 40px 10px;}
394.
Which of the following is not a valid attribute of the INPUT
tag?
 395.
 Which of these sets of HTML5 attributes can be used for
form validation?
 396.
 Which item is an example of a physical network
address?
 397.
 When used with the datalist element, what is the list
attribute in HTML5 used to accomplish?
398.
 What is the following style an example of?
img[alt~="Pie"]
 399.
 What is the correct CSS syntax for making all the
elements bold? 400.
 How can you specify default text in an input
field?
 401.
Currently there is no single standard file type that can be used to play
audio using the audio element consistently on all browsers. Which is the
solution that the audio element provides to resolve this conflict?
402.

Which of the following statements is true?

403.
How do we prevent margins, borders and padding from overlapping?

404.

Which of the following ways below is correct to write a CSS?


405.
Which of the following explains cookies nature?
406.
Consider the following code snippet: var a = [1,2,3,4,5]; a.slice(0,3);
What is the possible output for the above code snippet?
407.
 What does /[^(]* regular expression indicate? 408.
Which property is used to obtain browser vendor and version
information?

409.
What is the result of the following code snippet? window.location ===
document.location
410.
The length property belongs to which of the following objects?
411.
What will happen if the first argument of open() is omitted?

412.

Which of the following can't be done with client-side JavaScript?


413.

----------- is a built - in JavaScript function which can be used to execute


another function after a given time interval.
414.
 How do substring() and substr() differ?

415.
 In javascript, RegExp Object Method test() is used to search a


string and returns _________
416.
 What is the most essential purpose of paranthesis in regular
expressions?

417.
 Which of the following is not possible using PHP?


418.
 Which one of the following is the very first task executed by a
session enabled page?
419.
 What would be the output of the below code fragment? var a =
["s","a","v","e"]; document.write(a.join(""));
420.
 The ___________ property specifies the stack order of an element
421.
Which of the following property allows you to specify an element’s
position with respect to the browser window?
422.
Internet Explorer uses ....................... property to create transparent
images.
423.
If para1 is the DOM object for a paragraph, what is the correct syntax to
change the text within the paragraph?
424.

The syntax of Eval is ___________


425.

How to create a Date object in JavaScript?

426.
What is the code to start displaying the time when document loads?

427.

Which element is used to draw graphics images on a web page?


428.
One of the main advantage of using src attribute is
429.
In PHP, which of the following function is used to insert content of one
php file into another php file before server executes it

430.
 How do you get information from a form that is submitted using the
"get" method? 431.
 What does explode function in php do
 432.
 Which
command we use to set an image on background?
 433.
 A value that
has no defined value is expressed in PHP with the following keyword:
434.
 Which JavaScript function is most useful for finding
errors?
 435.
 JavaScript RegExp Object has modifier 'i' to
__________
 436.
 You can find the element you want to manipulate by
________ way?
 437.
 The Document object is which part of the
object?
 438.
 The node type for document returns the value ---.
 439.
Syntax for creating a RegExp object: (i). var txt=new
RegExp(pattern,modifiers); (ii). var txt=/pattern/modifiers; Which of the
above mentioned syntax will correct?
440.
Which of these contains an executable statement?

441.
Which of the following is NOT a valid PHP comparison operator?

442.

$a = array( null => 'a', true => 'b', false => 'c', 0 => 'd', 1 => 'e', '' => 'f' );
echo count($a), "\n"; What will be printed?

443.

$a = array(); if ($a[1]) null; echo count($a), "\n"; What will be printed?


444.
How do we access the value of 'd' later? $a = array( 'a', 3 => 'b', 1 => 'c',
'd' );
445.
What is the difference between echo and print?
446.
How do we submit form data without a Sumbit button?
447.
How can we count the number of elements in an array?
448.
How do I create PHP arrays in a HTML ?
449.
What is the default size of a file set in upload_max_filesize ?
449.
 What is the default size of a file set in upload_max_filesize ?
450.
 What happens if no file path is given in include() function?
451.
 What is the default execution time set in set_time_limit()?

452.
 ____________ function in PHP returns a list of response headers


sent (or ready to send)

Cracking the Comprehensive Exam 'Allo,


'Allo!
Always a pleasure serving you. All the Best!
1. Which is not the commonly used programming language
for AI?
A. PROLOG B. Java
 C. LISP
 D. Perl

Answer: Choice D
Introduction to Artificial Intelligence
2. What is state space?
A. The whole problem
 B. Representing your problem with variable and
parameter C. Your Definition to a problem
 D.
AspacewhereYouknowthesolution.

Answer: Choice B
Introduction to Artificial Intelligence

3. Which search method takes less memory?

A. Depth-First Search

B. Breadth-First Search C. Linear Search
 D. OptimalSearch

Answer: Choice A
Introduction to Artificial Intelligence

4. A* algorithm is based on
A. Depth-First Search B. Breadth-First Search C. Best-First Search
 D.
HillClimbing

Answer: Choice C
Introduction to Artificial Intelligence

5. Which is the best way to go for Game playing problem?


A. Linear Approach
 B. Heuristic Approach C. Random Approach D.
StratifiedApproach

Answer: Choice B
Introduction to Artificial Intelligence

6. How do you represent “All dogs have tails”.


A. ۷x: dog(x)àhastail(x) B. ۷x: dog(x)àhastail(y) C. ۷x: dog(y)àhastail(x) D.
۷x:dog(x)àhasàtail(x)

Answer: Choice A

Introduction to Artificial Intelligence

7. Which is not a property of representation of knowledge?


A. Representational Verification Adequacy B. Representational Adequacy
 C.
Inferential Adequacy
 D. InferentialAdequacy

Answer: Choice A
Introduction to Artificial Intelligence

8. Which is not a type of First Order Logic (FOL) Sentence?


A. Atomic Sentences
 B. Complex Sentences C. Quantified Sentences D.
QualitySentences

Answer: Choice D
Introduction to Artificial Intelligence

9. A plan that describe how to take actions in levels of


increasing refinement and specificity is
A. Problem-Solving B. Planning
 C. Hierarchical Plan D. Inheritance

Answer: Choice C
Introduction to Artificial Intelligence

10. Partial order planning involves


A. Searching over possible situations
 B. Searching over the space of possible
plans C. Searching the whole problem at once
 D. Searchingthebest

Answer: Choice B
Introduction to Artificial Intelligence

11. Uncertainty arises in the wumpus world because the


agent’s sensors give only
A. Full & Global information
 B. Partial & Global Information C. Partial & local
Information D. Full&localinformation

Answer: Choice C
Introduction to Artificial Intelligence

12. In an Unsupervised learning


A. Specific output values are not given B. No specific Inputs are given
 C. Both
inputs and outputs are given D. Neitherinputsnoroutputsaregiven.

Answer: Choice A
Introduction to Artificial Intelligence
13. Inductive learning involves finding a
A. Consistent Hypothesis B. Inconsistent Hypothesis C. Regular
Hypothesis
 D. EstimatedHypothesis.

Answer: Choice A
Introduction to Artificial Intelligence

14. If a hypothesis says it should be positive, but in fact it is


negative, we call it
A. Consistent Hypothesis
 B. A false negative hypothesis C. A false positive
hypothesis D. Aspecializedhypothesis

Answer: Choice C
Introduction to Artificial Intelligence

15. Neural Networks are complex -----------------------with


many parameters.
A. Linear Functions
 B. Non Linear Functions C. Discrete Functions
 D.
ExponentialFunctions

Answer: Choice B
Introduction to Artificial Intelligence

16. SMALLTALK comes under __________________


A. Object oriented programming B. procedural programming
 C. Logical
programming
 D. ImperativeProgramming
Answer: A
The object oriented paradigm

17. LISP stands for ________________________


A. List Processing
 B. List procession
 C. List Programming
 D.
Linkedprogramming

Answer: A
The object oriented paradigm

18. Let g(x) ≡ x * x. h(x) ≡ 2 * x, i(x) ≡ x / 2. Then the


construction is [g, h, i](10) = ?
A. [100, 20, 5] B. [100, 10, 2] C. [100, 20, 1] D. [100,20,2]

Answer: A
The object oriented paradigm

19. Programming paradigm helps us in __________________


design
A. functional
 B. object
 C. Procedural
 D. Programminglanguage

Answer: D
The object oriented paradigm

20. friend functions are called _________


A. With a reference of a object
 B. With a reference of a structure instance C.
None of the options
D. Withareferenceofaclass

Answer: C
The object oriented paradigm

21. calling a method from an object is often referred


as____________
A. OBJECT CREATION
 B. OBJECT INSTANTIATION C. MESSAGE
PASSING
 D. MESSAGERETRIVAL

Answer: C
The object oriented paradigm

22. Interpretor is used to ___________________


A. Only compile
 B. Only for execution
 C. Both for execution & compilation
D. Noneoftheoptions

Answer: C
The object oriented paradigm

23. Static scoping is identified by _____________________


A. Spatial
 B. Time
 C. Execution D. Debug

Answer: A

The object oriented paradigm


24. Activation record of a program helps
in___________________
A. compilation
 B. execution
 C. identify error
 D. Noneoftheoptions

Answer: B
The object oriented paradigm

25. Local offset in activation record


means___________________
A. Used to identify a variable address B. Used to identify a function address C.
Used to identify a object address D. Usedtoidentifyapointeraddress

Answer: A
The object oriented paradigm

26. Static depth of a function is identified by


its__________________-
A. Calling sequence
 B. Compiling sequence C. Nesting level
 D.
Noneoftheoptions

Answer: C
The object oriented paradigm

27. Valid strings for the Regular Expression (0 | 1)* 011 is


A. 10101 B. 100001 C. 111011 D. 111000

Answer: C
The object oriented paradigm

28. Epsilon transitions are not permitted in


A. NFA
 B. DFA
 C. NFA&DFA
 D. Noneoftheoptions

Answer: B
The object oriented paradigm

29. ________takes a string from a source code as input and


validates against _____ and answers whether the input string
is valid or not.
A. Token & Lexeme
 B. Finite Automaton & Regular Expression C. Sentinel &
Token
 D. Inputstring&token

Answer: B
The object oriented paradigm

30. Platform independence is supported in java by


_______________
A. Byte code
 B. Virtual machine C. A&B
 D. onlyA

Answer: C

The object oriented paradigm

31. The screen must be refreshed at the rate of ____ frames


per second.
A. 40 B. 50 C. 60 D. 70
Answer: 60
Computer Graphics

32. 2D scaling equation is


A. x’=x*sx,y’=y*sy B. x’=x+sx,y’=y+sy C. x’=x–sx,y’=y–sy D. x’=x*sy,y’=y*sx

Answer: x’ = x*sx, y’ = y * sy
Computer Graphics

33. The basic 2D transformations are


A. Scaling, Reflection, Shearing B. Scaling, Rotation, Reflection C. Scaling,
Rotation, Translation D. Scaling,Translation,Shearing

Answer: Scaling, Rotation, Translation


Computer Graphics

34. In which transformation the shape and size of the object


is changed
A. Translation B. Rotation C. Scaling
 D. Shearing

Answer: Shearing
Computer Graphics

35. Stereoscopic viewing is also a component in ___________


system
A. Display
 B. Audio
 C. Virtual-reality
 D. Noneoftheabove
Answer: Virtual-Reality
Computer Graphics

36. Space ball provides _____ degree of freedom


A. Two B. Three C. Four D. Six

Answer: Six
Computer Graphics

37. In which transformation object is moved in circular path


A. Translation B. Rotation C. Shearing D. Scaling

Answer: rotation
Computer Graphics

38. Z-buffer method is also known as


A. Back-Face Detection B. Scan -Line Method
 C. Depth-Sorting Method D.
Depth-BufferMethod

Answer: Depth-Buffer method


Computer Graphics

39. Which method use linked list to represent surfaces?


A. Painter’s algorithm
 B. A-Buffer Method
 C. Z-Buffer Method
 D. Depth-
SortingMethod

Answer: A-Buffer Method


Computer Graphics

40. Which Method is called as hidden-line detection


methods.
A. Ray casting method B. Scan line method C. BSP-tree Method D.
Noneoftheabove

Answer: None of the above


Computer Graphics

41. The two types of parallel Projections are


A. Axonometric and Isometric Projections B. Orthographic and Oblique
Projections C. Cabinet and Cavalier Projections
 D. ElevationandPlainview

Answer: Orthographic and Oblique Projections


Computer Graphics

42. _________ method for solving the hidden-surface


problem is often referred to as Painter’s Algorithm .
A. Back-Face Detection B. Scan -Line Method
 C. Depth-Sorting Method D.
Depth-BufferMethod

Answer: Depth-Sorting Method


Computer Graphics

43. In the Area subdivision method given one square is


divided into ______ equal squares
A. Four
 B. Eight C. Twelve D. Sixteen

Answer: Four
Computer Graphics

44. A fast and simple method for rendering an object with


polygon surfaces is ______________
A. Constant-intensity shading B. Gouraud Shading
 C. Phong Shading
 D.
FastPhongShading

Answer: Constant-intensity shading

Computer Graphics

45. Reflection and refraction rays are referred to as


__________ rays.
A. Reflected B. Refracted C. Secondary D. Binary

Answer: Secondary
Computer Graphics

46. If no surface are intersected by a pixel ray, the ray-tracing


tree is _________
A. Empty
 B. Full
 C. binary tree
 D. Completebinarytree

Answer: Empty
Computer Graphics

47. The artist adds a black pigment to produce different


________ of that color.
A. Shades B. tints
 C. Tones D. model

Answer: Shades
Computer Graphics

48. Blue and green combined you will get _______ color.
A. Cyan
 B. Magenta C. Yellow D. White

Answer: Cyan
Computer Graphics

49. The combination of light reflections from various surfaces


to produce a uniform illumination called the
________________
A. Diffuse reflection B. Specular reflection C. Ambient Light
 D. Lightsources

Answer: Ambient Light


Computer Graphics

50. In fast phong shading the Taylor-series expansion and


retain terms upto ______ degree in x and y.
A. First
 B. Second C. Third D. Fourth

Answer: Second
Computer Graphics
51. The environment map is defined over the surface of an
enclosing universe
A. environment array
 B. enclosing universe
 C. reflection mapping
 D.
environmentmapping

Answer: enclosing universe


Computer Graphics

52. Blue and red combined you will get ________ color.
A. Cyan
 B. Magenta C. Yellow D. White

Answer: Magenta
Computer Graphics

53. 1) Multi-core processors plays a central role in driving


important advancements in _______________
A. PC Security
 B. Resource allocation
 C. Digital media computing D.
Locatorsychronization

Answer: A
MULTI CORE SYSTEMS PROGRAMMING

54. 2) Multicore design offers enhancement in


_________________
A. System resources
 B. System tools
 C. System performance D.
Systemattributes
Answer: C

MULTI CORE SYSTEMS PROGRAMMING

55. 3) A multi-core processor implements


_________________in a single physical package.
A. multithreading
 B. multiprocessing C. multiprogramming D. multitasking

Answer: B
MULTI CORE SYSTEMS PROGRAMMING

56. 4) __________________ is the term which is used


generally to refer multi-core microprocessors that are
manufactured on the same integrated circuit
A. Embeded systems
 B. Digital signal processors C. System-on-a-chip
 D.
Multi-chipmodule

Answer: D
MULTI CORE SYSTEMS PROGRAMMING

57. 5) When it is not feasible to construct a System-on-a-Chip


for a particular application ___________________ is an
alternative
A. Multi chip
 B. System in Package C. Package on Package D. Microchip

Answer: B
MULTI CORE SYSTEMS PROGRAMMING
58. 6) Multi-core processor is finding increasing deployment
in __________________

A. Artifical intelligent devices B. Page mapping
 C. Packet switching
 D.


Mmemorymapping

Answer: A
MULTI CORE SYSTEMS PROGRAMMING

59. 7) The abstraction provided by ________________ to each


virtual machine running over it is that of a 100% dedicated
CPU and memory address space.
A. Instruction set
 B. Physical memory C. Virtualization
 D. Indirectionlayer

Answer: C
MULTI CORE SYSTEMS PROGRAMMING

60. 8) Embedded virtualization also makes possible


_______________ and the ability to enable legacy software to
run in a multicore operation
A. Direct addressing
 B. Segmentation
 C. Addressing mapping D.
Securepartitioning

Answer: D
MULTI CORE SYSTEMS PROGRAMMING

61. 9) In multiprocessor machines, __________________ are


an efficient way for application developers to utilize the
parallelism of the hardware.
A. Paging
 B. Multiple threads C. Virtual memory

D. Jobscheduling

Answer: B
MULTI CORE SYSTEMS PROGRAMMING

62. 10) The kernel is aware of each ______________ as a


scheduled entity and it can take the advantage of multiple
processors.
A. Thread
 B. Data flow
 C. Fuction extension D. Interface

Answer: A
MULTI CORE SYSTEMS PROGRAMMING

63. 11) ____________ should be optimized for tightly coupled


operation of multiple control flows within a process.
A. Thread Management B. Harmonization
 C. Mutual exclusion
 D.
Kernelthreads

Answer: C
MULTI CORE SYSTEMS PROGRAMMING

64. 12) When the program requests a block of memory,


____________must allocate that block out of the larger
blocks it has received from the operating system
A. Process manager B. Program manager C. Kernal manager D.
Memorymanager

Answer: D
MULTI CORE SYSTEMS PROGRAMMING

65. 13) The additional time taken by the memory manager


while the program is running is to be considered as
_______________
A. Memory Overhead
 B. CPU overhead
 C. Process overhead
 D.
Interactivepausetimes

Answer: B
MULTI CORE SYSTEMS PROGRAMMING

66. 14) Many programs give up memory, but attempt to


access it later and crash or behave randomly. This condition is
known as________________
A. External fragmentation B. Memory leak
 C. Premature free
 D.
Poorlocalityofreference

Answer: C
MULTI CORE SYSTEMS PROGRAMMING

67. 15) ____________ has become the standard means of


reasoning about the correctness of concurrent objects
A. Linearizability B. Flexibility
 C. Reusability D. Scalability
Answer: A

MULTI CORE SYSTEMS PROGRAMMING

68. The data rate of a PCM-coded stereo-audio signal with a


sampling rate of 44.1 KHz and sampling size of 8 bits.
A. 176,400 bytes/sec B. 88, 200 bytes/sec C. 715600 bits/sec D. 70050bits/sec

Answer: B
MULTIMEDIA SYSTEMS AND ALGORITHMS

69. MPEG compression method is


A. Weakly regular data stream B. Irregular data stream
 C. Strongly regular
data stream D. Noneoftheabove

Answer: A
MULTIMEDIA SYSTEMS AND ALGORITHMS

70. In a CDROM the sector address is stored in


A. PCA
 B. Lead in C. PMA
 D. Leadout

Answer: C
MULTIMEDIA SYSTEMS AND ALGORITHMS

71. A data stream that can be found in cooperative


application with shared windows
A. Strongly periodic data stream B. Weakly periodic data stream
C. aperiodic data stream D. Noneoftheabove

Answer: C
MULTIMEDIA SYSTEMS AND ALGORITHMS

72. -------------------- marks the variants of a phone


A. Fundamental frequency B. morph
 C. vowels
 D. allophones

Answer: D
MULTIMEDIA SYSTEMS AND ALGORITHMS

73. In a CDROM the 8-bit data is converted to


A. 12-bit modulations B. 14-bit modulations C. 16-bit modulations D. 24-
bitmodulations

Answer: B
MULTIMEDIA SYSTEMS AND ALGORITHMS

74. In JPEG compression AC coefficients are encoded by


A. AC-AC-1
 B. Quantization matrix C. Entropy encoding D. Zigzagordering

Answer: D

MULTIMEDIA SYSTEMS AND ALGORITHMS

75. For each subband in audio encoding the noise level is


calculated using
A. FFT
 B. zigzag ordering
 C. Psychoacoustic model D. PCM

Answer: C
MULTIMEDIA SYSTEMS AND ALGORITHMS

76. ------------------------- compression is specifically designed


for video telecommunication applications
A. MPEG B. JPEG C. DVI
 D. H.261

Answer: D
MULTIMEDIA SYSTEMS AND ALGORITHMS

77. MPEG supports only


A. interleaved video
 B. all kinds of video
 C. non interlaced video D.
noneoftheabove

Answer: C
MULTIMEDIA SYSTEMS AND ALGORITHMS

78. ................................ aborts all task that cannot meet their


deadline anymore

A. EDF
 B. RM
 C. Pre-emptive
 D. nonpre-emptive

Answer: A
MULTIMEDIA SYSTEMS AND ALGORITHMS
79. ----------------- checks whether the request can be
guaranteed or not
A. Requestor
 B. Resource manager C. Resource reservation D.
Resourcescheduling

Answer: B
MULTIMEDIA SYSTEMS AND ALGORITHMS

80. Textural and Numerical content is which type of datatype


A. Raw data type
 B. Registered data type C. Descriptive data type D.
noneoftheabove

Answer: C
MULTIMEDIA SYSTEMS AND ALGORITHMS

81. ---------------describes all operations allowed on the


document
A. Manipulation model B. Representation model C. Presentation model D.
noneoftheabove

Answer: A
MULTIMEDIA SYSTEMS AND ALGORITHMS

82. The position of one object may influence the motion of


another in
A. Full Explicit control
 B. Procedural Control
 C. Constraint based systems D.
Trackingliveaction
Answer: B
MULTIMEDIA SYSTEMS AND ALGORITHMS

83. Assembly language


A. uses alphabetic codes in place of binary numbers used in machine
language 


B. is the easiest language to write programs 


C. need not be translated into machine language 


D.

Answer: A
Computer Architecture and Organization

84. ___register keeps track of the instructions stored in


program stored in memory
A. AR (Address Register) B. XR (Index Register)
 C. PC (Program Counter) D.
AC(Accumulator)

Answer: C
Computer Architecture and Organization

85. Von Neumann architecture is


A. SISD B. SIMD C. MIMD D. MISD

Answer: A
Computer Architecture and Organization

86. In Assembly language programming, minimum number


of operands required for an instruction is/are
A. Zero.
 B. One.
 C. Two.
 D. Both(B)&(C).

Answer: A
Computer Architecture and Organization

87. In which addressing mode the operand is given explicitly


in the instruction
A. Absolute. B. Immediate. C. Indirect.
 D. Direct.

Answer: B
Computer Architecture and Organization

88. A stack organized computer has


A. Three-address Instruction B. Three-address Instruction C. Three-address
Instruction D. Zero-addressInstruction.

Answer: D
Computer Architecture and Organization

89. A data movement instruction will


A. modify the status register
 B. modify the stack pointer
 C. modify the
program counter
 D. .transferdatafromonelocationtoanother
Answer: D
Computer Architecture and Organization

90. Which register example hold the instruction itself?


A. . Program Counter B. Instruction Register C. Control Unit
 D. ALU

Answer: B
Computer Architecture and Organization

91. What are important aspects of the von Neumann


architecture?
A. Instruction are data
 B. memory for programs and data C. Inventted in
Germany
 D. Usesaprogramcounter

Answer: B
Computer Architecture and Organization

92. Which of the following would cause quickest acess


A. direct access from a magnetic tape B. direct access from a hard disk
 C.
direct access from a floppy disk
 D. directaccessfromacassettetape

Answer: B
Computer Architecture and Organization

93. The Device which converts instructions into the binary


form that is understood by the computer and supply to the
computer is known as --- ----
A. Input
 B. output
 C. automatic D. memory

Answer: A
Computer Architecture and Organization

94. Laptop PCs are also known as __________Computers


A. Mainframe B. Super
 C. Notebook D. personal

Answer: C
Computer Architecture and Organization

95. daisy wheel is a type of --- ?


A. printer
 B. storage device C. pointing device

D.

Answer: A
Computer Architecture and Organization

96. Data transfer to and from peripherals may be handed in


any one following three possible modes.
A. Programmed initiated B. Interrupt-initiated I/O C. Direct memory access D.
Alltheabove

Answer: D
Computer Architecture and Organization

97. The DMA transfer takes place between magnetic disk and
memory is takes place in any one of the following method
A. burst transfer
 B. cycle stealing
 C. program initiated I/O D. BothAandB

Answer: D
Computer Architecture and Organization

98. 1. Represent the decimal number 937.25 to BCD form


A. a. 100000110111.101
 B. b. 100100010111.011
 C. c.
100100110110.00110101 D. d.100100110111.00100101

Answer: D

Digital Logic

99. 2. Write the next four numbers in the hex counting


sequence E9A,E9B,E9C,E9D, _ , _ , _,
A. a)E9E,E9F,EA0,EA1 


B. b) E9E , E9F, E100, E101 


C. c) E9E , E9F, E00, E01 


D. d) None of the above 


Answer: A
Digital Logic

100. 3. Apply duality principle for the given equation


ab’+c+0.d’(1+e)
A. a) (a+b’)c(1+d’+0.e) B. b) (a+b)’c(0+d’+1.e) C. c) (ab’)c(1+d’+1.e) D.
d)(ab’)c(1+d’+0.e)

Answer: A
Digital Logic

101. 4. What is x if (1A5)16 = (1141)x?


A. a)5 B. b)7 C. c)8 D. d)9

Answer: B
Digital Logic

102. 5. For the given message 111100 identify the Odd and
even parity
A. a)1&0 B.b) 1&1 C. c)0&0 D. d)0&1

Answer: A
Digital Logic

103. 6. A Magnitude Comparator is designed to compare the


magnitude of two 2-bit numbers, A (A1A0) and B (B1B0). The
output of circuit is F (A>B). What is the SOP form of F?
A. a. A1B1’ + A1A0B1B0’ + A1’A0B1’B0’ B. b. A1B1’ + A1A0B0’ + A0B1’B0’
 C. c.
A1B1’ + A1B1B0’ + A0B1’B0’
 D. d.A1B1’+A1A0B0’+A1’A0B1’

Answer: A
Digital Logic
104. 7. To design the full adder using multiplexer, determine
the number of input lines, size of Decoder and number of
multiplexers used
A. a.2, 2x4, 1 B. b.4,2x4,2 C. c.3,3x8,2 D. d.3,2x4,1

Answer: B
Digital Logic

105. 8. The circuit of 3 bit odd parity generator has a


combination of
A. a. 2 x-or gates
 B. b. X-or followed by x-nor C. c. X-nor followed by x-or D.
d.2x-norgates

Answer: B/C
Digital Logic

106. 9. PLA is used to implement the Boolean function in the


form of
A. a. Standard form
 B. b. Canonical form
 C. c. Only sop
 D.
d.Onlysumofminterms

Answer: A
Digital Logic

107. 10.How many links will be broken at input of AND gates


to implement a half adder using PLA of size 2x3x1
A. a. 2,2,2 B. b. 3,3,3 C. c. 1,2,3 D. d.2,2,1

Answer: A
Digital Logic

108. 11 Given the function G(A,B,C) = Σ (1,3) + d(4,5,6,7).


What is the minimum number of gate that can be used to
implement this function?
A. a.0
 B. b.1
 C. c.2
 D. d.3,2x4,1

Answer: A

Digital Logic

109. 12. The content of the 4-bit shift register is initially 1101.
The register is shifted six times to the right, with the serial
input being 101101. What is the content of the register at the
end of the shifting process?
A. A. 1011 B. B. 1101 C. C. 1110 D. D.0111

Answer: A
Digital Logic

110. 13 . A comparison between ring and Johnson counters


indicates that:
A. a. A ring counter has fewer flip-flops but requires more decoding circuitry B.
b. A ring counter has an inverted feedback path
 C. c. A Johnson counter has
more flip-flops but less decoding circuitry
 D.
d.AJohnsoncounterhasaninvertedfeedbackpath

Answer: D
Digital Logic

111. 14. Circuit output functions and flip-flop input functions


can be obtained from
A. a. Excitation and output tables B. b. State and excitation tables C. c. State
and output tables
 D. d.Stateandoutputtables

Answer: A
Digital Logic

112. 15.5. On the fifth clock pulse, a 4-bit Johnson sequence is


Q0 = 0, Q1 = 1, Q2 = 1, and Q3 = 1. On the sixth clock pulse,
the sequence is ________.
A. a.Q0=1,Q1=0,Q2=0,Q3=0 B. b.Q0=1,Q1=1,Q2=1,Q3=0 C.
c.Q0=0,Q1=0,Q2=1,Q3=1 D. d.Q0=0,Q1=0,Q2=0,Q3=1

Answer: C
Digital Logic

113. Interval between the time of submission and completion


of the job is called
A. Waiting time
 B. Turnaround time C. Throughput
 D. Responsetime

Answer: Turnaround time


OPERATING SYSTEMS

114. ___________ is a technique of improving the priority of


process waiting in Queue for CPU allocation
A. Starvation B. Revocation C. Ageing
 D. Relocation

Answer: Ageing
OPERATING SYSTEMS

115. A program in execution is called


A. Procedure B. Instruction C. Process D. Function

Answer: Process
OPERATING SYSTEMS

116. In which of the following page replacement policies


Balady’s anomaly occurs?
A. LRU B. NRU C. LFU D. FIFO

Answer: FIFO
OPERATING SYSTEMS

117. The total time to prepare a disk drive mechanism for a


block of data to be read from is its
A. latency
 B. latency plus transmission time
 C. latency plus seek time
 D.
latencyplusseektimeplustransmissiontime

Answer: latency plus seek time


OPERATING SYSTEMS

118. A set of techniques that allow to execute a program


which is not entirely in memory is called
A. demand paging
 B. auxiliary memory C. virtual memory
 D.
secondarymemory

Answer: virtual memory


OPERATING SYSTEMS

119. Jobs which are admitted to the system for processing is


called
A. long-term scheduling
 B. short-term scheduling
 C. medium-term
scheduling D. queuing

Answer: long-term scheduling


OPERATING SYSTEMS

120. Locality of reference implies that the page reference


being made by a process
A. will always be to one of the pages existing in memory.
 B. is likely to be the
one of the pages used in the last few page references. C. will always be to the
page used in the previous page reference.
 D. willalwaysleadtoapagefault.

Answer: is likely to be the one of the pages used in


the last few page references.
OPERATING SYSTEMS
121. ___________ is a technique of temporarily removing
inactive programs from the memory of computer system
A. Swapping B. Spooling C. Semaphore D. Scheduler

Answer: Swapping

OPERATING SYSTEMS

122. A critical section is a program segment


A. which should run in a certain specified amount of time.
 B. which avoids
deadlocks.
 C. where shared resources are accessed.
 D.
whichmustbeenclosedbyapairofsemaphoreoperations,PandV.

Answer: where shared resources are accessed.


OPERATING SYSTEMS

123. Which scheduling policy is most suitable for a time-


shared operating system
A. Elevator.
 B. Shortest-job First.
 C. First-Come-First-Serve. D. Round-
Robin.

Answer: Round-Robin.
OPERATING SYSTEMS

124. Program ‘preemption’ is


A. forced de allocation of the CPU from a program which is executing on the
CPU. B. release of CPU by the program after completing its task.
 C. forced
allotment of CPU by a program to itself.
 D.
aprogramterminatingitselfduetodetectionofanerror.
Answer: forced de allocation of the CPU from a
program which is executing on the CPU.
OPERATING SYSTEMS

125. The term ‘page traffic’ describes


A. number of pages in memory at a given instant
 B. number of papers
required to be brought in at a given page request. C. the movement of pages
in and out of memory.
 D.
numberofpagesofexecutingprogramsloadedinmemory.

Answer: the movement of pages in and out of


memory.
OPERATING SYSTEMS

126. The “turn-around” time of a user job is the


A. time since its submission to the time its results become available.
 B. total
time taken to execute the job.
 C. time duration for which the CPU is allotted
to the job.
 D.
timetakenforthejobtomovefromassemblyphasetocompletionphase.

Answer: total time taken to execute the job.


OPERATING SYSTEMS

127. Memory utilization factor shall be computed as follows


A. memory in use/allocated memory.
 B. memory in use/total memory
connected.
 C. memory allocated/free existing memory.
 D.
memorycommitted/totalmemoryavailable.
Answer: memory in use/total memory connected.
OPERATING SYSTEMS

128. What would be the output of the following: <script


type="text/javascript"> x=3+'2'; y=4+"5"; document.write(x +
y); </script>
A. 15 B. 3245

C. 77
 D. None

Answer: 3245
Scripting Languages

129. <script type="text/javascript" language="javascript"> var


a = "India"; var result = a.split(""); document.write(result);
</script>
A. India B. India C. I,n,d,i,a D. None

Answer: I,n,d,i,a
Scripting Languages

130. What happens to the following code: <html> <script


language="javascript"> function f1() { document.write("In
f1();"); function f2() { document.write("In f2();"); } } </script>
<input type="button" value= "click" onClick="f1();"> </html>
A. no output B. In f1();
 C. In f1();Inf2(); D. None
Answer: In f1();
Scripting Languages

131. <html> <script language="javascript"> function x() { var


s= "Good 100%"; var pattern = /\D/g; var output=
s.match(pattern); document.write(output); } </script> <input
type="button" value= "click" onClick="x();"> <html>
A. Good % B. 1,0,0

C. G,o,o,d,% D. Error

Answer: G,o,o,d,%
Scripting Languages

132. <script Xlanguage="javascript"> var a="VIT Vellore";


alert(a.charAt(a.length()-1)); </script>
A. e
 B. erroe C. r
 D. None

Answer: error
Scripting Languages

133. Syntax for creating a RegExp object: (a). var txt=new


RegExp(pattern,attributes); (b). var txt=/pattern/attributes;
Which of the above mentioned syntax will correct?
A. a) only
 B. (b) only
 C. Both (a) and (b) D. None

Answer: Both (a) and (b)


Scripting Languages

134. <script language="javascript"> var arr= new Array();


arr[0] = "Javascript"; arr[1]="supports" arr[2]="object
oriented" arr[3] = "paradigm"; document.write(arr[0,1,2,3]);
</script> What is the output?
A. Error
 B. Javascript
 C. Javascript supports object oriented paradigm D.
paradigm

Answer: paradigm
Scripting Languages

135. <script language="javascript"> function demo() {


document.write(2+5+'8'); } </script> <input type="button"
value= "click" onClick="demo();"> What will be the result?
A. 15 B. 78 C. 258 D. Error

Answer: 78
Scripting Languages

136. How to assign a function to a variable with the


JavaScript Function constructor ? a) var
f=Function("x","y","return x+y"); b) var f=Function(x,y){ return
x+y;} c) var f= new Function("x", "y", "return x + y");
A. a) only
 B. (c) only
 C. Both (a) and (c) D. None

Answer: None
Scripting Languages

137. In JavaScript, Window.prompt() method return true or


false value ?
A. TRUE 


B. FALSE 


C. D.

Answer: FALSE
Scripting Languages

138. The following statement does not declares dynamic


array in VBscript. Dim Names()
A. TRUE 


B. FALSE 


C. D.

Answer: FALSE
Scripting Languages

139. In Vbscript, one can invoke the function with and


without the______________ keyword
A. B. C. D.

Answer: call
Scripting Languages
140. VBScript does not support early binding – True/False
A. TRUE 


B. FALSE 


C. D.

Answer: TRUE
Scripting Languages

141. ______________Statement forces explicit declaration of


all variables in a Vbscript
A. B. C. D.

Answer: option explicit


Scripting Languages

142. What's the default setting for the expires attribute of the
document.cookie property?
A. The duration of the browser session.
 B. The duration the current
document stays loaded C. Twenty-four hours from the time the cookie is set.
D. Thereisnodefaultsetting

Answer: The duration of the browser session.


Scripting Languages

143. A language is represented by a regular expression (a)*(a


+ ba). Which of the following string does not belong to the
regular set represented by the above expression.
A. aaa B. aba C. abab D. aa

Answer: C
Algorithm Design and Analysis

144. A language L is accepted by a FSA if it is


A. CFL
 B. CSL
 C. Recursive D. Regular

Answer: D
Algorithm Design and Analysis

145. To generate a Counter Automaton we need......


A. Need multi tape TM
 B. Need Multi head TM
 C. Need Multi tape and multi
head TM D. SingleTapeandHeadTM

Answer: D
Algorithm Design and Analysis

146. Which of the following statements is false?


A. The halting problem for Turing machines is undecidable
 B. Determining
whether a context-free grammar is ambiguous is undecidable
 C. Given two
arbitrary context-free grammar, G1 and G2, it is undecidable with L(G1) =
L(G2) D.
GiventworegulargrammarsG1andG2,itisundecidablewhetherL(G1)=L(G2)

Answer: B
Algorithm Design and Analysis

147. Consider three decision problems P1, P2 and P3. It is


known that P1 is decidable and P2 is undecidable. Which one
of the following is TRUE?
A. P3 is decidable if P1 is reducible to P3
 B. P3 is undecidable if P3 is reducible
to P2
 C. P3 is undecidable if P2 is reducible to P3
 D.
P3isdecidableifP3isreducibletoP2’scomplement

Answer: A
Algorithm Design and Analysis

148. Consider three problems P1, P2 and P3. It is known that


P1 has polynomial time solution and P2 is NP-complete and
P3 is in NP. Which one of the following is true?
A. P3 has polynomial time solution if P1 is polynomial time reducible to P3 B.
P3 is NP complete if P3 is polynomial time reducible to P2
 C. P3 is NP
complete if P2 is reducible to P3
 D.
P3haspolynomialtimecomplexityandP3isreducibletoP2

Answer: C
Algorithm Design and Analysis

149. Which of the following statement is false?


A. Divide and Conquer is independent
 B. Dynamic programming is
dependent C. Dynamic programming is independent D. Noneoftheabove

Answer: B
Algorithm Design and Analysis

150. Aggregate analysis determines the............... T(n) on the


total cost of a sequence of n operations.
A. Lower bound B. upper bound C. Middle bound D. None.

Answer: B

Algorithm Design and Analysis

151. Dynamic programming divides problems into a number


of conflicting objective functions
A. decision stages.
 B. unrelated constraints. C. policies.
 D. noneoftheabove

Answer: A
Algorithm Design and Analysis

152. The ________ cipher reorders the plaintext characters to


create a ciphertext.
A. Substitution
 B. Transposition
 C. either (a) or (b) D. neither(a)nor(b)

Answer: B
Algorithm Design and Analysis

153. Jarvi's March algorithm uses _________ approach


A. Rational Sweep
 B. Divide and Conquer C. Top down
 D. BottomUp

Answer: A
Algorithm Design and Analysis

154. The first step in developing a parallel algorithm is to


decompose the
problem into tasks that can be executed.........
A. serially
 B. Consecutively C. Concurrently D. None

Answer: C
Algorithm Design and Analysis

155. Achieving mutual exclusion,


A. is only required in distributed systems, and also for single-processor
systems; B. enhance the performance;
 C. is necessary for a process to read or
write certain shared data;
 D. noneoftheabove.

Answer: C
Algorithm Design and Analysis

156. In the analysis of Randomized Quick sort, what is Pr(Xij =


1)? Assume that i ≠ j
A. Pr(Xij=1)=1/(|j−i|+1) B. Pr(Xij=1)=1/(j+i)
 C. Pr(Xij=1)=2/(|j−i|+1) D.
Pr(Xij=1)=2/(j+i)

Answer: C
Algorithm Design and Analysis

157. Minimum-path search is a(n) _____ problem


A. Non optimization
 B. optimization
 C. behavior-of-program; D.
Interactivecomputation

Answer: B
Algorithm Design and Analysis

158. Which of the following data type can be used for storing
a floating
A. int
 B. long int
 C. double
 D. unsignedchar

Answer: C
C Programming

159. point constant?


A. B. C. D.

Answer:
C Programming

160. What is the result of running the following code


snippet?float result; result = 5/2; printf("%.1f",result);
A. 2


B. 2.5 


C. 0


D.
Answer: B

C Programming

161. Output of running the following code snippet is int i; for (


i = 0; i < 3; i++ ) { if(i == 2) { printf("%d\t",i); } }
A.0 1 2 3 B.0 1 2
 C. 2
 D. none

Answer: C
C Programming

162. What is the result of running the following code snippet


if(0) printf("The Sun rises in the East"); else printf("The Sun
rises in the West");
A. The Sun rises in the East B. The Sun rises in the West C. Compilation
Error
 D. none

Answer: B
C Programming

163. ____________ is a symbolic language


A. Assembly language B. COBOL
 C. FORTRAN
 D. BASIC

Answer: A
C Programming

164. __________ in machine language tells the computer


what function to perform
A. Opcode
 B. OperationID C. both
 D. none

Answer: A
C Programming

165.
A. B. C. D.

Answer:
C Programming

166.
A. B. C. D.

Answer:
C Programming

167. The conversion specifier for printing an integer in


hexadecimal number using printf is
A. %x B. %d C. %ld D. %hx

Answer: A
C Programming

168.
A. B. C. D.

Answer:
C Programming

169. The following C statement causes an infinite loop


(true/false):while (1);
A. TRUE B. FALSE C.
 D.

Answer: A
C Programming

170.
A. B. C. D.

Answer:
C Programming

171. Output of following statement is:


A. 5
 B. 6
 C. Compilation error D. none

Answer: C
C Programming

172. #define NUM 5


A. B. C. D.
Answer:
C Programming

173. int main()


A. B. C. D.

Answer:
C Programming

174. {
A. B. C. D.

Answer:
C Programming

175. NUM++;
A. B. C. D.

Answer:
C Programming

176. printf("%d", NUM);


A. B. C. D.

Answer:
C Programming
177. return 0;
A. B. C. D.

Answer:
C Programming

178. Output of the following statement is


A. B. C. D.

Answer:
C Programming

179. int i = 5;
A. Structured programming language B. Object Oriented Programming
 C.
Compilation error
 D. none

Answer: C
C Programming

180. if(i = 5)
A. B. C. D.

Answer:
C Programming

181. {
A. B. C. D.
Answer:
C Programming

182. puts("Structured programming language");


A. B. C. D.

Answer:
C Programming

183. }
A. B. C. D.

Answer:
C Programming

184. else
A. B. C. D.

Answer:
C Programming

185. {
A. B. C. D.
Answer:
C Programming

186. puts("Object oriented programming language");


A. B. C. D.

Answer:
C Programming

187. }
A. B. C. D.

Answer:
C Programming

188.
A. B. C. D.

Answer:
C Programming

189. What is the value of variable ‘i’ after running the


following statements?
A. B. C. D.

Answer:
C Programming

190. int main( ){ i = 10;


A. 0 B. 1 C. 2 D. 2.5

Answer: B
C Programming

191. i = i / 2;
A. B. C. D.

Answer:

C Programming

192. i = i % 2; return 0}
A. B. C. D.

Answer:
C Programming

193. void *ptr; mystruct myArray[10]; ptr=myArray; Which of


the following is the correct way to increment the variable
"ptr"?
A. ptr=ptr+sizeof(mystruct) B. ptr+(int)ptr
 C. ptr+sizeof(myArray)
 D.
ptr+sizeof(ptr)

Answer: A
C Programming

194.
A. B. C. D.

Answer:
C Programming

195.
A. B. C.

D.

Answer:
C Programming

196.
A. B. C. D.

Answer:
C Programming

197.
A. B. C. D.

Answer:
C Programming
198.
A. B. C. D.

Answer:

C Programming

199.
A. B. C. D.

Answer:
C Programming

200. int testarray[3][2][2] = {1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12};


A. 3 B. 5 C. 7 D. 11

Answer: D
C Programming

201. What value does testarray[2][1][0] in the sample code


above contain?
A. B. C. D.

Answer:
C Programming

202.
A. B. C.

D.

Answer:
C Programming

203. int a=10,b;


A. 12,10,11,13
 B. 22,10,11,13
 C. 12,11,12,11
 D. 22,13,13,13,13

Answer: D
C Programming

204. b=a++ + ++a;


A. B. C. D.

Answer:
C Programming

205. printf(“%d,%d,%d,%d”,b,a++,a,++a);
A. B. C. D.

Answer:

C Programming

206. what will be the output when following code is executed


A. B. C. D.

Answer:
C Programming

207.
A. B. C. D.

Answer:
C Programming

208. . void Funct(int x)


A. 1,2,3,4,5,5 B. 4,3,2,1,0,0 C. 0,0,1,2,3,4 D. 5,4,3,2,1,0

Answer: C
C Programming

209. {if(x>0)
A. B. C. D.

Answer:
C Programming

210. Funct(--x);
A. B. C. D.

Answer:
C Programming

211. printf(“%d”,x);
A. B. C. D.

Answer:
C Programming

212. }
A. B. C. D.

Answer:
C Programming

213. int main()


A. B. C. D.

Answer:
C Programming

214. {
A. B. C. D.

Answer:
C Programming

215. Funct(5);
A. B. C. D.

Answer:
C Programming

216. return 0;}


A. B. C. D.

Answer:
C Programming

217.
A. B. C. D.

Answer:
C Programming

218.
A. B. C. D.

Answer:
C Programming

219. . How is a variable accessed from another file?


A. The global variable is referenced via the extern specifier B. The global
variable is referenced via the auto specifier. C. The global variable is
referenced via the pointer specifier. D.
Theglobalvariableisreferencedviatheextspecifier.

Answer: A
C Programming

220. Which of the statement is false with respect to Virtual


memory and Cache?
A. The Size of processor address determines the size of Virtual memory B.
Virtual memory can be classified as pages and segments
 C. Virtual memory
replacement is controlled by OS
 D.
ReplacementoncachemisscontrolledbyOS

Answer: D
Computer Architecture and Organization

221. The capacity of a memory is defined by the number of


words multiplied by the number of bits/word. How many
separate address and data lines are needed for a memory of
4K*16?
A. 10 address,16 data lines B. 11 address,8 data lines C. 12 address ,16 data
lines D. 12address,12datalines

Answer: C
Computer Architecture and Organization

222. Which of the following is true?


A. Unless enabled, a CPU will not be able to process interrupts
 B. Loop
Instructions cannot be interrupted till they complete
 C. A processor check for
interrupts before they executing a new instruction D.
Onlyleveltriggeredinterruptsarepossibleonmicroprocessors

Answer: A
Computer Architecture and Organization

223. Which of the following is not a form of memory


A. Instruction cache B. Instruction register

C. Instruction Opcode
 D. Translationlookasidebuffer

Answer: C
Computer Architecture and Organization

224. -----------------Access method, Cylce time is same for all


blocks of memory.
A. Random Access
 B. Sequential Access
 C. Direct Access
 D.
SemiRandomAccess

Answer: A
Computer Architecture and Organization

225. Assume Word 20 contains 40


A. B. C. D.

Answer:
Computer Architecture and Organization
226. Word 30 contains 50
A. B. C. D.

Answer:

Computer Architecture and Organization

227. Word 40 contains 60


A. B. C. D.

Answer:
Computer Architecture and Organization

228. Word 50 contains 70


A. B. C. D.

Answer:
Computer Architecture and Organization

229. Which of the following instructions does not, Load 60


into the Accumulator?
A. Load immediate 60 B. Load Direct 30
 C. Load indirect 20
 D. BothA)&C)

Answer: B
Computer Architecture and Organization
230. The common fields found in instruction formats are:
A. opcode field, address field, mode field
 B. opcode field, operand field,
address field, mode field,
 C. opcode field, address field, next address field,
mode field. D. opcodefield,addressfield1,addressfield1,modefield,

Answer: A
Computer Architecture and Organization

231. What is the range of numbers for n-bits if negative


numbers are represented in two's complement format?
A. (-2n–1to2n–1) B. (-2n-1 to 2n-1-1) C. (0 to 2n-1)
 D. (-2nto2n-1-1)

Answer: B
Computer Architecture and Organization

232. If a number has k-bits(k is even), how many bits will its
square-root have?
A. K-1 B. K/2 C. K D. k-2

Answer: B
Computer Architecture and Organization

233. Floating point numbers are typically packet in to a


computer datum as the sign bit, the exponent field, and the
significand (mantissa) , from left to right. Specify the the
fields IEEE double formats.
A. 1,8,23 B. 1,11,52 C. 1,5,10
D. 1,5,112

Answer: B
Computer Architecture and Organization

234. What is the access type of cache memories?


A. Associative B. Direct
 C. Random
 D. Sequential

Answer: A
Computer Architecture and Organization

235. Cycle Stealing is used in


A. Interrupt based data transfer B. DMA based data transfer
 C. Polled mode
data transfer
 D. Noneofthese

Answer: B
Computer Architecture and Organization

236. Data transfer rate for Random access Memory is


A. TN=TA+N/R
 B. 1/cycle time
 C. Access time + minimum time between two
consequetive access operation D. accesstime+cycletime

Answer: B

Computer Architecture and Organization

237.
A. (11100110)2 


B. (10011000)2 


C. (10011000)2 


D. (01100110)2 


Answer: A
Computer Architecture and Organization

238. If a register containing data (11001100)2 is subjected to


arithmetic shift right operation, then the content of the
register after one arithmetic shift right shall be
A. B. C. D.

Answer:
Computer Architecture and Organization

239. PAL circuit consists of


A. Fixed OR and programmable AND logic
 B. Programmable OR and Fixed
AND logic
 C. Fixed OR and fixed AND logic
 D.
ProgrammableORandProgrammableANDlogic

Answer: A
Computer Architecture and Organization

240. the main difference between the variuos 802.11


standards is the
A. data transfer rate
 B. maximum allowable cable length
C. simplicity of installation D. collisiondetectionrate

Answer: A
Computer Networks

241. what is the default subnet mask for a class C network?


A. 127.0.0.0
 B. 255.0.0.0
 C. 255.255.0.0 D. 255.255.255.0

Answer: D
Computer Networks

242. when you ping the loopback address, a packet is sent


wher?
A. on the network
 B. down through the layers of the IP architecture and then
up the layres again C. across the wire
 D. throughtheloopbackdongle

Answer: B
Computer Networks

243. In CRC there is no error if the remainder at the receiver is


___
A. equal to the remainder at the sender B. zero
 C. non zero
 D.
thequotientatthesender

Answer: B
Computer Networks

244. what type of network device allows you to share your


connection to the internet with other computer in your
home?
A. ethernet card B. NIC
 C. router
 D. Cat5

Answer: C
Computer Networks

245. Frequency of failure and network recovery time after a


failure are measures of the ___ of a network
A. performance B. reliability
 C. security
 D. feasibility

Answer: B
Computer Networks

246. The Hamming distance between 100 and 001 is


A. 0 B. 1 C. 2 D. 3

Answer: C
Computer Networks

247. In CSMA, the vulnerable period is equal to


A. 1 frame transmission time B. one way propagation time C. 2 frame
transmission times D. roundtriptime

Answer: B
Computer Networks

248. How long is an IPv6 address?


A. 32 bits
 B. 128 bytes C. 64 bits
 D. 128bits

Answer: D
Computer Networks

249. which protocol does ping use?


A. TCP B. ARP C. ICMP D. BootP

Answer: C
Computer Networks

250. What does router do in a network?


A. forwards a packet to all outgoing links
 B. forwards a packet to the next
free outgoing link
 C. determines on which outgoing linka packet is to be
forwarded D. frowardsapackettoalloutgoinglinksexcepttheorginatedlink

Answer: C
Computer Networks

251. Linear topology is also called?


A. Star topology B. Bus topology C. Ring topology D. Meshtopology

Answer: B
Computer Networks
252. A logical network that consisits of two or more physical
networks?
A. Networking
 B. Internetworking C. LAN
 D. WAN

Answer: B
Computer Networks

253. UDP has which of the following characteristics?


A. Three way handshake for connection establishment B. connection state at
the server
 C. regulated send rate
 D. checksumforerrordetection

Answer: D
Computer Networks

254. which of the following is not provided by TCP?

A. reliable, in order data delivery

B. flow control
 C. congestion control
 D. minimumbandwidthguarntees

Answer: D
Computer Networks

255. Every node has a point to point connection to every


other node in the network
A. Bus B. Star C. Mesh D. Ring

Answer: C
Computer Networks

256. Which of the following is the functionality of Physical


Layer
A. Type of Encoding B. Encryption
 C. Mail Services
 D. Logicaladdress

Answer: A
Computer Networks

257. Which multiplexing method is common for multiplexing


optical signals to allow the multiplex- ing of signals with a
very high frequency
A. FDM B. TDM C. WDM D. FHSS

Answer: C
Computer Networks

258. A need for end-to-end addressing during the setup and


teardown phases to make the corresponding entry in the
switching table
A. Datagram
 B. Vitual Circuit
 C. Ciruit Switching D. ATM

Answer: B
Computer Networks

259. It is the number of differences between correspond bits


between two words
A. CRC
 B. LRC
 C. Checksum value D. Hammingdistance

Answer: D
Computer Networks

260. Character-oriented protocols use a method to be able to


carry an 8- bit pattern that is same as the flag
A. Byte-Stuffing B. Bit - Stuffing C. Flow Control D. ErrorControl

Answer: A

Computer Networks

261. A random access method, nwhere no station is superior


to another station and none is assigned the control over
another
A. Aloha
 B. Reservation
 C. Token Passing D. Channelization

Answer: A
Computer Networks

262. A device which can raise bandwidth and can seperate


collision domain
A. Router B. Gateway C. Brouter D. Bridge

Answer: D
Computer Networks
263. In UNI total length of VPI + VCI is
A. 24 bits B. 22 bits C. 20 bits D. 26bits

Answer: A
Computer Networks

264. What type of address is this 127.240.103.125


A. Class A B. Class B

C. Class C D. ClassD

Answer: A
Computer Networks

265. IPv6 normally provides a connectionless service, but it


can provide a connection - oriented service if uses which of
the following
A. Service Type
 B. Checksum
 C. Flow label
 D. FragmentationOffset

Answer: C
Computer Networks

266. Which of the following is a Intra Domain Protocol


A. OSPF B. IGMP C. RIP D. TCP

Answer: C
Computer Networks
267. Those port numbers are only used for the duration of a
single communication between client and server, so they are
indeed short-lived
A. Ephernal Port Numbers
 B. Fixed Port Numbers
 C. Well Known Port
Numbers D. DynamicPortNumbers

Answer: A
Computer Networks

268. Which con-gestion control policies try to alleviate the


effects of congestion
A. Open Loop Congestion Control
 B. Closed Loop Congestion Control
 C.
Forward Explicit Congestion Control D. BackwardExplicitCongestionControl

Answer: B
Computer Networks

269. Which technology allows an organization to use the


global Internet yet safely maintain private internal
communication
A. Firewall
 B. Kerbros
 C. Vitual Private Network D. FrameRelay

Answer: C
Computer Networks

270. A complete microcomputer system consists of


A. microprocessor
 B. memory
 C. Peripheral equipment D. Alloftheabove

Answer: All of the above


Computer organization and design

271. Pipelining strategy is called implement


A. instruction execution
 B. instruction prefetch
 C. instruction decoding
 D.
instructionmanipulation

Answer: instruction prefetch


Computer organization and design

272. Interrupts which are initiated by an instruction are


A. internal B. external C. hardware D. software

Answer: software
Computer organization and design

273. A timing sharing system imply


A. more than one processor in the system B. more than one processor in the
system C. more than one memory in the system D. Noneoftheabove

Answer: more than one processor in the system


Computer organization and design

274. The performance of a processor can be measured using


A. Clocks period
 B. Cycles per Instruction C. Throughput
 D. Alloftheabove
Answer: All of the above
Computer organization and design

275. Which of the following is not a state of the instruction


cycle
A. Operand address calculation B. Data write back
 C. Instruction fetch
 D.
Instructionfetch

Answer: Data write back


Computer organization and design

276. Which of the following is a bus arbitration scheme?


A. Round-robin
 B. First come first serve C. Priority
 D. Alloftheabove

Answer: All of the above


Computer organization and design

277. When is a cache block is written into the main memory


A. Every cycle
 B. Dirty bit is set
 C. Valid bit is not set D. Noneoftheabove

Answer: Dirty bit is set


Computer organization and design

278. Which of the following is a example for a communication


I/O?
A. Monitor

B. Mouse C. Modem D. USB

Answer: Modem
Computer organization and design

279. Memory access in RISC architecture is limited to


instructions
A. CALL and RET B. PUSH and POP C. STA and LDA D. MOVandJMP

Answer: STA and LDA


Computer organization and design

280. Redundancy is a built-in feature here


A. Serial I/O tapes B. RAID
 C. Optical disks D. Magneticdisks

Answer: RAID
Computer organization and design

281. Microprocessor 8085 can address location upto


A. 32K B. 128K C. 64K D. 1M

Answer: 64K

Computer organization and design


282. A microporgram is sequencer perform the operation
A. execute
 B. read and execute C. read and write
 D. executeandwrite

Answer: read and execute


Computer organization and design

283. RAID level 0 is primarily used in applications where


A. Cost is a priority
 B. Area is a priority
 C. Reliability is a priority D.
Alloftheabove

Answer: Cost is a priority


Computer organization and design

284. How often/how is data written into the ROM


A. Anytime/when required
 B. Before use – by microprogramming C. During
manufacturing
 D. Alloftheabove

Answer: During manufacturing


Computer organization and design

285. int main() { int i; int a[3]={1,2,3}; int


*b[3]={&a[0],&a[1],&a[2]}; printf("%d",*b[1]); }

A. a)address of a[1] B. b)2
 C. c)3
 D. d)CompilerError

Answer: b)2
Computer Programming and Problem Solving
286. #include<stdio.h> #include<conio.h> int main() { int
sum = 0; int i=1; while(i <= 20) { if((i%2) == 1) { ++i; continue;
} sum = sum + i; ++i; } printf("%d",sum); getch(); return 0; }
A. Sum of even numbers from 1 to 20 B. Sum of odd numbers from 1 to 20 C.
Sum of first 20 natural numbers
 D. Error

Answer: Sum of even numbers from 1 to 20


Computer Programming and Problem Solving

287. Initialization of the array int a[4]={2,1} will assign


A. a) a[0]=2,a[1]=0,a[2]=2,a[3]=0
 B. b) a[0]=2,a[1]=1,a[2]=0,a[3]=0,
 C. c)
a[0]=2,a[1]=1,a[2]=garbage,a[3]=garbage value D.
d)a[0]=2,a[1]=2,a[2]=2,a[3]=garbagevalue

Answer: b) a[0]=2,a[1]=1,a[2]=0,a[3]=0,
Computer Programming and Problem Solving

288. If S has got an ascii value 83 and s has an ascii value 115.
The strcmp function on these two strings
strcmp(“Sam”,”sam”) returns
A. -1
 B. 1
 C. 0
 D. Error

Answer: -1
Computer Programming and Problem Solving

289. There are two arrays int a[3]={1,2,3} and b[3]={2,4,6}


What will be the output of the following statement? a=b;
A. a) the values of array a get assigned to b B. b) the values of array b get
assigned to a C. c) there is a compilation error
 D.
d)thevaluesofaandbareswapped.

Answer: c) there is a compilation error


Computer Programming and Problem Solving

290. Which array technique the following program represents


if n is the size of the array for(i=0;i<=n/2;i++) { t=a[i]; a[i]=a[n-
i]; a[n-i]=t; }
A. a) Array counting
 B. b) Array order reversal
 C. c) Finding the maximum
number in a array D. d)Arraysorting

Answer: a) Array order reversal


Computer Programming and Problem Solving

291. What will be output of this program (the input is -


Computer Programming)? #include<stdio.h>
#include<conio.h> #include<string.h> int main() { char
name[20]; printf("Enter your name"); scanf("%s",name);
printf("%s",name); getch(); }
A. a) compilation error
 B. b) computer programming C. c) Computer
 D.
d)Programming

Answer: c) Computer
Computer Programming and Problem Solving

292. int main() { float a[]={1,2,3}; printf("%d",sizeof(a)); }


A. a)Compiler Error B. b)12 Bytes
 C. c)4 Bytes
 D. d)RunTimeError

Answer: b)12 Bytes


Computer Programming and Problem Solving

293. int a=10; printf("%d &i",a,10);


A. a)error B. b)10
 C. c)10 10 D. d)None

Answer: c)10 10
Computer Programming and Problem Solving

294. int a = 4, b = 7,c; c = a = = b; printf("%d",c);


A. a)0
 B. b)error
 C. c)1
 D. d)GarbageValue

Answer: a)0
Computer Programming and Problem Solving

295. void main() { printf("hello"); main(); } What will be the


output of the
above code?
A. a)1
 B. b)2
 C. c)Infinite number of times D. d)noneofthese

Answer: c)Infinite number of times


Computer Programming and Problem Solving

296. int main() { int a = 2; switch(a) { case 1:


printf("goodbye"); break; case 2: continue; case 3:
printf("bye"); } }
A. a)error
 B. b)goodbye
 C. c)bye
 D. d)byegoodbye

Answer: a)error
Computer Programming and Problem Solving

297. int i=1,k=i-- +2; printf("%d",k);


A. a)Error B. b)3
 C. c)2
 D. d)1

Answer: b)3
Computer Programming and Problem Solving

298. What will be the output of following statements ? char


x[ ] = "hello hi"; printf("%d%d",sizeof(*x),sizeof(x));
A. a)88 B. b)18 C. c)29

D. d)19

Answer: d)19
Computer Programming and Problem Solving

299. int a=11,b=6,c=9,d,x; d= (a >(x=(c>b?c:b))?a:x);


printf("%d",d); what is the output of the above code?
A. a)11 B. b)6
 C. c)9
 D. d)error

Answer: a)11
Computer Programming and Problem Solving
300. The _______ is the physical path over which a message
travels.
A. Protocol
 B. Medium
 C. Signal
 D. Alltheabove

Answer: Medium
Data Communication

301. The information to be communicated in a data


communications system is the _______.
A. Medium
 B. Protocol
 C. Message
 D. Transmission

Answer: Message

Data Communication

302. Frequency of failure and network recovery time after a


failure are measures of the _______ of a network
A. Performance B. Reliability
 C. Security
 D. Feasibility

Answer: Reliability
Data Communication

303. An unauthorized user is a network _______ issue


A. Performance B. Reliability
 C. Security
 D. Alltheabove

Answer: Security
Data Communication
304. Which topology requires a central controller or hub?
A. Mesh B. Star C. Bus D. Ring

Answer: Star
Data Communication

305. Which topology requires a multipoint connection?


A. Mesh B. Star C. Bus D. Ring

Answer: Bus
Data Communication

306. Communication between a computer and a keyboard


involves ______________ transmission
A. simplex
 B. half-duplex C. full-duplex D. automatic

Answer: Simplex
Data Communication

307. A television broadcast is an example of _______


transmission
A. simplex
 B. half-duplex C. full-duplex D. automatic

Answer: Simplex
Data Communication

308. A _______ connection provides a dedicated link between


two devices.
A. point-to-point B. multipoint
 C. primary
 D. secondary

Answer: point-to-point
Data Communication

309. In a _______ connection, more than two devices can


share a single link
A. point-to-point B. multipoint
 C. primary
 D. secondary

Answer: Multipoint
Data Communication

310. In _______ transmission, the channel capacity is shared


by both communicating devices at all times
A. simplex
 B. half-duplex C. full-duplex D. half-simplex

Answer: full-duplex
Data Communication

311. In the original ARPANET, _______ were directly


connected together
A. IMPs
 B. host computers C. networks
 D. routers

Answer: IMPs
Data Communication

312. This was the first networ


A. CSNET
 B. NSFNET C. ANSNET D. ARPANET

Answer: ARPANET
Data Communication

313. Which organization has authority over interstate and


international commerce in the communications field?
A. ITU-T B. IEEE C. FCC D. ISOC

Answer: FCC
Data Communication

314. _______ are special-interest groups that quickly test,


evaluate, and standardize new technologies.
A. Forums
 B. Regulatory agencies
 C. Standards organizations D.
Alloftheabove

Answer: Forums
Data Communication

315. The number of leaf nodes in a complete binary tree of


depth d is

A. 2d
B. 2d–1+1 C. 2d+1+1 D. 2d+1

Answer: a
Data Structures and Algorithm

316. The number of interchanges required to sort 5, 1, 6, 2 4


in ascending order using Bubble Sort is
A. 6 B. 5 C. 7 D. 8

Answer: b
Data Structures and Algorithm

317. If there are 17 elements in an array, how many maximum


comparisons are required to search an element using binary
search?
A. 5 B. 4 C. 3 D. 2

Answer: a
Data Structures and Algorithm

318. A hash function f defined as f(key) = key mod 7, with


linear probing, is used to insert the keys
37,38,72,48,98,11,56,into a table indexed from 0 to 6. 11 will
be stored in the location
A. 5 B. 4 C. 3 D. 2

Answer: a
Data Structures and Algorithm

319. The result of evaluating the postfix expression 5, 4, 6, +,


*, 4, 9, 3, /, +, * is
A. 600 B. 350 C. 588 D. 650

Answer: b
Data Structures and Algorithm

320. If h is any hashing function and is used to hash n keys in


to a table of size m, where n<=m, the expected number of
collisions involving a particular key x is :
A. <1 B. <m C. <n D. <n/2

Answer: a
Data Structures and Algorithm

321. A graph with n vertices will definitely have a parallel


edge or self loop of the total number of edges are
A. >n
 B. >n+1
 C. >(n+1)/2 D. >n(n-1)/2

Answer: d
Data Structures and Algorithm

322. An algorithm is made up of two independent time


complexities f (n) and g (n). Then the complexities of the
algorithm is in the order of
A. f(n) x g(n)
 B. Max (f(n),g(n)) C. Min (f(n),g(n)) D. f(n)+g(n)

Answer: b
Data Structures and Algorithm

323. A machine took 200 sec to sort 200 names, using bubble
sort. In 800secs, it can approximately sort how many names.
[Hint: No. of comparisons bubble sort makes for n items]
A. 800 aprox B. 600 aprox C. 500 aprox D. 400aprox

Answer: d
Data Structures and Algorithm

324. The average number of comparisons performed by the


merge sort algorithm,in merging two sorted lists of length 2
is
A. 8/3 B. 8/7 C. 11/7 D. 11/6

Answer: a

Data Structures and Algorithm

325. There are four different algorithms A1,A2,A3 and A4 to


solve a given problem with the order log(n), loglog(n), nlog(n)
,n/log(n) respectively. Which is the best algorithm?
A. A1 B. A2 C. A3 D. A4

Answer: b
Data Structures and Algorithm

326. Which of the following are not a valid queue application


A. Printing jobs in printer
 B. Line at Ticket counter
 C. Evaluating Math
Expression D. Telephonecall

Answer: d
Data Structures and Algorithm

327. What is the minimum number of queues needed to


implement a priority queue
A. 1 B. 2 C. 3 D. 4

Answer: b
Data Structures and Algorithm

328. If node having 2 children is deleted from a binary tree, it


is replaced by its

A. Inorder predecessor

B. preorder predecessor C. post predecessor
 D. Inordersuccessor

Answer: d
Data Structures and Algorithm

329. If a node in BST has two children, then Inorder


predecessor has
A. no left child B. no right child C. two children D. nochild
Answer: b
Data Structures and Algorithm

330. The time required to delete a node x from doubly liked


list having n node is
A. O(n)
 B. O(log n) C. O(1)
 D. O(nlogn)

Answer: c
Data Structures and Algorithm

331. In the relational modes, cardinality is termed as:


A. Number of tuples.
 B. Number of attributes. C. Number of tables.
 D.
Numberofconstraints.

Answer: A
Database Systems

332. Relational calculus is a


A. Procedural language.
 B. Non- Procedural language. C. Data definition
language. D. Highlevellanguage.

Answer: B
Database Systems

333. In the architecture of a database system external level is


the
A. physical level. B. logical level.
 C. conceptual level D. viewlevel.

Answer: D
Database Systems

334. An entity set that does not have sufficient attributes to


form a primary key is a
A. strong entity set. B. weak entity set. C. simple entity set. D.
primaryentityset.

Answer: B
Database Systems

335. In tuple relational calculus P1 ®P2 is equivalent to


A. ¬P1ÚP2 B. P1ÚP2 C. P1ÙP2 D. P1Ù¬P2

Answer: A
Database Systems

336. The database environment has all of the following


components except:
A. users.
 B. separate files.
 C. database.
 D. databaseadministrator.

Answer: A
Database Systems

337. A subschema expresses


A. the logical view. B. the physical view. C. the external view. D. alloftheabove.

Answer: C
Database Systems

338. SET concept is used in :


A. Network Model
 B. Hierarchical Model C. Relational Model D. Noneofthese

Answer: A
Database Systems

339. Relational Algebra is


A. Data Definition Language B. Meta Language
 C. Procedural query
Language D. Noneoftheabove

Answer: C
Database Systems

340. _______ produces the relation that has attributes of R1


and R2
A. Cartesian product B. Difference
 C. Intersection
 D. Product

Answer: A
Database Systems

341. DBMS helps achieve


A. Data independence
 B. Centralized control of data C. Neither (A) nor
(B)
 D. both(A)and(B)

Answer: D
Database Systems

342. In a relation
A. Ordering of rows is immaterial B. No two rows are identical
 C. (A) and (B)
both are true
 D. Noneofthese.

Answer: C
Database Systems

343. Which of the following operations need the participating


relations to be union compatible?
A. UNION
 B. INTERSECTION C. DIFFERENCE D. Alloftheabove

Answer: D
Database Systems

344. Which of the following is an advantage of view?


A. Data security
 B. Derived columns
 C. Hiding of complex queries D.
Alloftheabove

Answer: D
Database Systems

345. The users who use easy-to-use menu are called


A. Sophisticated end users. B. Naïve users.
 C. Stand-alone users.
 D.
Casualendusers.

Answer: B
Database Systems

346. ODBC stands for


A. Object Database Connectivity B. Oral Database Connectivity C. Oracle
Database Connectivity D. OpenDatabaseConnectivity

Answer: D
Database Management System

347. An entity set that does not have sufficient attributes to


form a primary key is a
A. strong entity set B. weak entity set C. simple entity set D. primaryentityset

Answer: B
Database Management System

348. In an E-R diagram attributes are represented by


A. rectangle B. square C. ellipse
 D. triangle

Answer: C
Database Management System
349. In case of entity integrity, the primary key may be
A. not Null
 B. Null
 C. both Null & not Null D. anyvalue

Answer: A
Database Management System

350. In tuple relational calculus P 1 P2 is equivalent to


A. P1vP2 B. P1vP2 C. P1^P2 D. P1^P2

Answer: A
Database Management System

351. A logical schema


A. is the entire database
 B. is a standard way of organizing information into
accessible parts C. describes how data is actually stored on disk
 D.
both(A)and(C)

Answer: A
Database Management System

352. The method in which records are physically stored in a


specified order according to a key field in each record is
A. hash
 B. direct
 C. sequential

D. alloftheabove

Answer: A
Database Management System

353. The statement in SQL which allows to change the


definition of a table is
A. Alter
 B. Update C. Create D. select

Answer: A
Database Management System

354. Which are the two ways in which entities can participate
in a relationship?
A. Passive and active B. Total and partial
 C. Simple and Complex D.
Alloftheabove

Answer: B
Database Management System

355. Using Relational Algebra the query that finds customers,


who have a balance of over 1000 is
A. P Customer_name( s balance >1000(Deposit)) B. s Customer_name( P
balance >1000(Deposit)) C. P Customer_name( s balance >1000(Borrow)) D.
sCustomer_name(Pbalance>1000(Borrow))

Answer: A
Database Management System

356. _________ data type can store unstructured data


A. RAW
 B. CHAR
 C. NUMERIC D. VARCHAR

Answer: A
Database Management System

357. A table joined with itself is called


A. Join
 B. Self Join C. Outer Join D. EquiJoin

Answer: B
Database Management System

358. _________ is a virtual table that draws its data from the
result of an SQL SELECT statement
A. View
 B. Synonym C. Sequence D. Transaction

Answer: A
Database Management System

359. A B-tree of order m has maximum of _____________


children
A. m B. m+1 C. m-1 D. m/2

Answer: A
Database Management System

360. To delete a particular column in a relation the command


used is:
A. UPDATE B. DROP C. ALTER D. DELETE

Answer: C
Database Management System

361. The highest level in the hierarchy of data organization is


called
A. data bank B. data base C. data file
 D. datarecord

Answer: data file


Database Systems

362. An audit trail


A. is used to make backup copies
 B. can be used to restore lost
information
 C. is the recorded history of operations performed on a file D.
None

Answer: can be used to restore lost information


Database Systems

363. Which of the following is not a relational database


A. Dbase IV
 B. 4th Dimension C. FoxPro
 D. Reflex

Answer: Reflex
Database Systems

364. A top-to-bottom relationship among the items in a


database is established by a
A. hierarchical schema B. network schema
 C. relational schema D.
Alltheabove

Answer: hierarchical schema


Database Systems

365. Data security threats include


A. hardware failure
 B. privacy invasion
 C. fraudulent manipulation of data
D. Alloftheabove

Answer: privacy invasion


Database Systems

366. A command that lets you change one or more fields in a


record is
A. insert
 B. modify
 C. lookup
 D. noneofabove

Answer: modify
Database Systems

367. This is an open standard application programming


interface (API) for accessing a database
A. Universal Data Access
 B. Open Database Connectivity C. Topic Map Query
Language D. OpenData-LinkInterface

Answer: Open Database Connectivity


Database Systems

368. This is a standard interactive and programming


language for getting information from and updating a
database
A. dynamic data exchange
 B. Structured Query Language C. ASCII
 D.
Erlangprogramminglanguage

Answer: Structured Query Language


Database Systems

369. Report generators are used to


A. store data input by a user
 B. retrieve information from files C. answer
queries
 D. bothbandc

Answer: answer queries


Database Systems

370. Batch processing is appropriate if


A. large computer system is available
 B. only a small computer system is
available C. only a few transactions are involved
 D. noneoftheabove

Answer: none of the above


Database Systems

371. Which is the make given to the database management


system which is able to handle full text data, image data,
audio and video?
A. full media
 B. graphics media C. multimedia
 D. hypertext

Answer: multimedia
Database Systems

372. A file produced by a spreadsheet


A. is generally stored on disk in an ASCII text fromat B.
canbeusedasisbytheDBMS
 C. bothaandb
 D. noneoftheabove

Answer: is generally stored on disk in an ASCII text


fromat

Database Systems

373. Primitive operations common to all record management


system include
A. print
 B. sort
 C. look-up
 D. allofabove

Answer: look-up
Database Systems

374. What process does the technical term normalization


describe?
A. Creating tables from an ER diagram
 B. Creating larger tables from smaller
tables
 C. Expressing a database's design in terms of set theory D.
Breakinglargertablesintosmallertables
Answer: Breaking larger tables into smaller tables
Database Systems

375. To what does the term normal form refer?


A. A stage in a process that breaks up large tables into smaller, more efficient
tables B. A standard database included with most RDBMSs
 C. A standard
table included with most RDBMSs
 D.
AmethodologyforrepresentingtablesinanERdiagram

Answer: A stage in a process that breaks up large


tables into smaller, more efficient tables
Database Systems

376. Given an unknown base Y, and given that for a particular


number X, (X)Y = (Z)10, what is (100000 * X)Y in base 10? (
“*” is the multiply operation)

A. Z*Y5
 B. 100000Z
 C. log Y100000*Z
 D. Notenoughinformationtotell

Answer: A
Digital Logic

377. In a 4-variable Boolean function, what are the minterms


that differ from m10 by one literal?
A. m0, m5, m7, m15 B. m4, m8, m6, m14 C. m0, m2, m8, m11 D.
m2,m8,m11,m14

Answer: D
Digital Logic

378. A certain 5-bit self-complementary code is used to


represent the 10 decimal digits 0 through 9. Given that
(246)10 is represented as 00010 00100 00110 in this code,
what is the representation for (375)10?
A. 00110 00100 00010 B. 00011 00111 00101 C. 11101 11011 11001 D.
110011110111011

Answer: D
Digital Logic

379. If one input to the circuit consisting of a cascade of 20


EX-OR is X and the other is 1 , then what is the final EX-OR
gate Output.
A. 0 B. 1 C. X

D.

Answer: C
Digital Logic

380. A certain four-variable Boolean function contains 9


minterms. At least how many product terms and at most how
many product terms are there in the minimal sum-of-
products expression for this function?
A. At least zero and at most 9. B. Atleast1andatmost9.
 C.
Atleast2andatmost8.
 D. Atleast2andatmost9.
Answer: C
Digital Logic

381. Write the next four numbers in the hex counting


sequence E9A,E9B,E9C,E9D, _ , _ , _,
A. E9E,E9F,EA0,EA1 B. E9E , E9F, E100, E101 C. E9E , E9F, E00, E01 D.
Noneoftheabove

Answer: A
Digital Logic

382. For Boolean algebra Associativity is a:


A. Theorem B. Postulate C. Expression D. Identity

Answer: A
Digital Logic

383. In the expression A(A+B) , by writing the first term A as


A+0, the expression is best simplified as
A. A+AB B. AB C. A
 D. A+B

Answer: C
Digital Logic

384. Which statement is true:


A. All canonical form are standard form
 B. All standard form are canonical
forms
 C. Standard form must consists of minterms
 D.
Canonicalformcanconsistofatermwithaliteralmissing

Answer: A
Digital Logic

385. What is x if (1A5)16 = (1141)x?


A. 5 B. 7 C. 8 D. 9

Answer: B
Digital Logic

386. =
A. A (x-or) B (x-nor) C B. A (x-nor) B (x-nor) C C. A (x-nor) B (x-or) C D.
Alltheabove

Answer: B
Digital Logic

387. To implement a 4 bit binary to 5 bit BCD converter using


ROM, the size of ROM, decoder inside ROM and number of
OR gates will be
A. 16x5, 1x5, 4 B. 16x5, 4x16, 5 C. 32x4, 5x32, 4 D. 32x4,1x4,5

Answer: B
Digital Logic

388. How many 4-bit parallel adders would be required to add


two binary numbers each representing decimal numbers up
to 300?
A. 1 B. 2 C. 3 D. 4

Answer: C
Digital Logic

389. How many possible state assignments would be there


for 5 states?
A. 3
 B. 8C3 C. 8P3 D. 8P5

Answer: D
Digital Logic

390. In the sequential circuit, the output is


A. Independent on the clock pulse
 B.
 C. Dependent of the +ve edge
triggering of the clock pulse D. Dependentofthe–
veedgetriggeringoftheclockpulse

Answer: A
Digital Logic

391. The image formation process can be summarized as


A. image=noise*object function+psf B. image=psf*image function+noise C.
Image=psf*object function+noise D. Noneoftheabove

Answer: C
Digital Image Processing

392.
A. B. C. D.

Answer:
Digital Image Processing

393. The key problem in which 99% of cases where image


processing techniques either fail or further image processing
is required to achieve the required result is
A. noise
 B. sampling
 C. quantization D. metrics

Answer: A
Digital Image Processing

394.
A. B. C. D.

Answer:
Digital Image Processing

395. An alternative edge enhancement filter to the Laplacian-


based approaches is the
A. median filter
 B. smoothening filter C. unsharp mask filter D. bandpassfilter

Answer: C
Digital Image Processing

396.
A. B.

C. D.

Answer:
Digital Image Processing

397. Fourier transform operates on the


A. frequency space B. real space
 C. fourier space
 D. timespace

Answer: A
Digital Image Processing

398.
A. B. C. D.

Answer:
Digital Image Processing

399. The process of breaking down a periodic signal as a sum


of sine and cosine function is called
A. fourier breakage
 B. fourier partition
 C. fourier division
 D.
fourierdecomposition

Answer: D
Digital Image Processing

400.
A. B. C. D.

Answer:
Digital Image Processing

401. PSNR refers to


A. Progressive signal to noise ratio B. Peak signal to noise ratio
 C. Perceptual
signal to noise ratio D. Noneoftheabove

Answer: B
Digital Image Processing

402.
A. B. C. D.

Answer:
Digital Image Processing

403. A key assumption in deriving the least-squares


estimators given by equation

A. g(x,y)-f(x,y)**h(x,y)=0 B. g(x,y)+f(x,y)**h(x,y)=0 C. g(x,y)+f(x,y)*h(x,y)=0 D.


g(x,y)-f(x,y)*h(x,y)=0
Answer: A
Digital Image Processing

404.
A. B. C. D.

Answer:
Digital Image Processing

405. A rectangular array of pixels containing the values either


1 or 0 is called as
A. pixel structures
 B. structuring element C. neighbourhood pixel D.
noneoftheabove

Answer: B
Digital Image Processing

406.
A. B. C. D.

Answer:
Digital Image Processing

407. The positions where a certain pattern occurs in the input


image is indicated by the
A. laplace transform
 B. wavlet transform
 C. fourier transform
 D. hit-or-
misstransform
Answer: D
Digital Image Processing

408.
A. B. C. D.

Answer:
Digital Image Processing

409. The representation of a 2-D boundary as a 1-D function


is the
A. signature
 B. transformation C. sampling
 D. quantization

Answer: A
Digital Image Processing

410.
A. B. C. D.

Answer:
Digital Image Processing

411. measures the attempt to capture characteristics of the


intensity fluctuations between groups of neighbouring pixels,
sometimes to which the human eye is very sensitive.
A. feature
 B. roughness
 C. texture
 D. noneoftheabove
Answer: C
Digital Image Processing

412.
A. B. C. D.

Answer:
Digital Image Processing

413. An approach to segmentation in which pixels are


grouped into larger regions based on their similarity
according to predefined similarity is

A. region segmentation B. region splitting
 C. region transform
 D.


regiongrowing

Answer: D
Digital Image Processing

414.
A. B. C. D.

Answer:
Digital Image Processing

415. A process in which an expert human user assigns


examples to specific classes based on selected and salient
properties is called
A. class labelling
 B. supervised labelling C. unsupervised labeling D.
objectlabelling

Answer: A
Digital Image Processing

416.
A. B. C. D.

Answer:
Digital Image Processing

417. An instance of something serving as a typical example or


standard for other things of the same category is a
A. classifier B. pixel
 C. prototype D. object

Answer: C
Digital Image Processing

418.
A. B. C. D.

Answer:
Digital Image Processing

419. A conceptually simple structure for representing


imagesat more tha one resolution is the
A. image cube
 B. image pyramid
 C. image cone
 D. noneoftheabove

Answer: C
Digital Image Processing

420. Data by itself is not useful unless


A. It is massive
 B. It is processed to obtain information C. It is collected from
diverse sources D. Itisproperlystated

Answer: B
Data warehousing and Data mining

421. In a hospital information system the following type of


information is tactical
A. Opening a new children’s’ ward
 B. Data on births and deaths
 C. Preparing
patients’ bill
 D. BuyinganexpensivediagnosticsystemsuchasCATscan

Answer: A
Data warehousing and Data mining

422. The quality of information which does not hide any


unpleasant information is known as
A. Complete
 B. Trustworthy
 C. Relevant
 D. Noneoftheabove

Answer: B
Data warehousing and Data mining

423. Every record stored in a Master file has a key field


because
A. it is the most important field
 B. it acts as a unique identification of record

C. it is the key to the database D. itisaveryconcisefield

Answer: B
Data warehousing and Data mining

424. A management information system is one which


A. is required by all managers of an organization
 B. processes data to yield
information of value in tactical management C. provides operational
information
 D. allowsbettermanagementoforganizations

Answer: B
Data warehousing and Data mining

425. Data mining is used to aid in


A. operational management
 B. analyzing past decision made by managers C.
detecting patterns in operational data
 D. retrievingarchivaldata

Answer: C
Data warehousing and Data mining

426. Data mining requires


A. large quantities of operational data stored over a period of time B. lots of
tactical data
 C. several tape drives to store archival data
 D.
largemainframecomputers
Answer: A

Data warehousing and Data mining

427. Data mining can not be done if


A. operational data has not been archived
 B. earlier management decisions
are not available C. the organization is large
 D.
allprocessinghadbeenonlybatchprocessing

Answer: A
Data warehousing and Data mining

428. Decision support systems are used for


A. Management decision making
 B. Providing tactical information to
management C. Providing strategic information to management D.
Betteroperationofanorganization

Answer: C
Data warehousing and Data mining

429. Which is the right approach of Data Mining?


A. Infrastructure, exploration, analysis, interpretation, exploitation B.
Infrastructure, exploration, analysis, exploitation, interpretation C.
Infrastructure, analysis, exploration, interpretation, exploitation D.
Infrastructure,analysis,exploration,exploitation,interpretation

Answer: A
Data warehousing and Data mining
430. Which of the following issue is considered before
investing in Data Mining?

A. Functionality

B. Vendor consideration C. Compatibility
 D. Alloftheabove

Answer: D
Data warehousing and Data mining

431. The automated, prospective analyses offered by data


mining move beyond the analyses of past events provided by
_____________ tools typical of decision support systems.
A. Introspective B. Intuitive
 C. Reminiscent D. Retrospective

Answer: D
Data warehousing and Data mining

432. During business hours, most ______ systems should


probably not use parallel execution.
A. OLAP
 B. DSS
 C. Data Mining D. OLTP

Answer: D
Data warehousing and Data mining

433. Data mining evolve as a mechanism to cater the


limitations of ________ systems to deal massive data sets
with high dimensionality, new data types, multiple
heterogeneous data resources etc.
A. OLTP B. OLAP C. DSS

D. DWH

Answer: A
Data warehousing and Data mining

434. The term DSS refer to __________.


A. Data Supply System
 B. Decision Support System C. Deducted Services
System D. Noneoftheabove

Answer: B
Data warehousing and Data mining

435. The time required to insert an element in a stack with


linked implementation is
A. O(1)
 B. O(log2 n) C. O(n)
 D. O(nlog2n)

Answer: A
Data Structures and Algorithms

436. A list of integers is read in , one at a time and a binary


search tree is constructed.Next the tree is traversed and the
integers are printed. Which traversal result in a printout
which duplicated the original order of the list of integers.
A. preorder
 B. postorder
 C. inorder
 D. Noneoftheabove
Answer: D
Data Structures and Algorithms

437. which of the following is a tabular listing of contents of


certain registers and memory locations at different times
during the execution of a program
A. loop program
 B. program trace
 C. sub routine program D.
bytesortingprogram

Answer: B
Data Structures and Algorithms

438. which of the following types of expressions doenot


require precedence rule for evaluaed?
A. Full parenthesised infix expression
 B. prefix expression
 C. partially
parenthesized infix expression D. morethanoneofthese

Answer: D
Data Structures and Algorithms

439. which of the following is not correct?


A. f(n)=O(f(n))
 B. c*f(n)=O(f(n)) for constant 'c' C.
O(f(n)+g(n))=(f(n))+O(g(n))
 D. O[f(n)2]=O(f(n))2

Answer: C
Data Structures and Algorithms

440. consider the following tree.If the post order traversal


gives ab-cd*+ then label of the nodes 1,2,3,..... Will be
A. "+,-,*,a,b,c,d" B. "a,-,b,+,c,*,d" C. "a,b,c,d,-,*,+" D. "-,a,b,+,*,c,d"

Answer: A
Data Structures and Algorithms

441. The running time of an algorithm T(n) , where n is the


input size given by T(n)= 8T(n/2) +q n if n>1 = p if n=1 where
p,q,are constants.The order of the algorithm is
A. n2 B. nn C. n3 D. n

Answer: C
Data Structures and Algorithms

442. The number of edges in a regular graph of degree 'd' and


'n' vertices is
A. maximum of n,d B. n+d
 C. nd
 D. nd/2

Answer: D
Data Structures and Algorithms

443. If hashing function is the remiander on division, then


clustering is more likely to occur if the storage space is
divided in to 40 sections than
41. Thisconclusion is
A. More likely to be false B. more likely to be true C. always true
 D.
alwaysfalse

Answer: B
Data Structures and Algorithms

444. consider an undirected graph 'G' with 'n' vertices and 'e'
edges. What is the time taken by 'DFS' if the graph is
represented by adjacency matrix and adjacency list
A. O(n2),O(n) B. O(n2),O(e) C. O(e),O(n2) D. O(e+n),O(e)

Answer: B
Data Structures and Algorithms

445. A strictly binary tree with 10 leaves


A. cannot have more than 19 nodes B. has exactly 19 nodes
 C. has exactly 17
nodes
 D. cannothavemorethan17nodes

Answer: B
Data Structures and Algorithms

446. In evaluating the arthimetic expression 2*3-(4+5), using


stacks to evaluate its equivalent postfix form , which of the
following stack configuration is not possible?

A. 6,4
B. 6,4,5 C. 6,9 D. 2,3,9

Answer: D
Data Structures and Algorithms

447. Number of possible binary trees with 3 nodes is


A. 12 B. 13 C. 14 D. 15

Answer: D
Data Structures and Algorithms

448. The expression which access the (i,j)th entry of a mxn


matrix stored in column major form is
A. nx(i-1)+j B. mx(j-1)+i C. mx(n-j)+j D. nx(m-i)+j

Answer: B
Data Structures and Algorithms

449. A complete binary tree with the property that the value
each node is atleast as large as the values at its children is
called
A. Binary search tree
 B. AVL tree
 C. completely balanced tree D. Heap

Answer: D
Data Structures and Algorithms

450. A characteristic of the data that binary search uses but


the linear search ignores is
A. (A) Order of the elements of the list. B. (B) Length of the list.
 C. (C)
Maximum value in list.
 D. (D)Typeofelementsofthelist.

Answer: (A)
Data Structures and alogrithm

451. the___________.
A. B. C. D.

Answer:
Data Structures and alogrithm

452.
A. B. C. D.

Answer:
Data Structures and alogrithm

453.
A. B. C. D.

Answer:
Data Structures and alogrithm

454. How many nodes in a tree have no ancestors.


A. (A)0 B. (B)1 C. (C)2 D. (D)n
Answer: (B)
Data Structures and alogrithm

455.
A. B. C. D.

Answer:
Data Structures and alogrithm

456.
A. B. C. D.

Answer:
Data Structures and alogrithm

457.
A. B. C. D.

Answer:
Data Structures and alogrithm

458. Which of the following sorting algorithm is stable


A. (A) Insertion sort. B. (B) Bubble sort. C. (C) Quick sort
 D. (D)Heapsort

Answer: (D)
Data Structures and alogrithm
459.
A. B. C. D.

Answer:
Data Structures and alogrithm

460.
A. B. C. D.

Answer:
Data Structures and alogrithm

461. The time required to delete a node x from a doubly


linked list having n nodes is
A. (A)O(n)
 B. (B)O(logn) C. (C)O(1)
 D. (D)O(nlogn)

Answer: ( C )
Data Structures and alogrithm

462.
A. B. C. D.

Answer:
Data Structures and alogrithm

463.
A. B. C. D.
Answer:
Data Structures and alogrithm

464.
A. B. C. D.

Answer:
Data Structures and alogrithm

465. Ackerman’s function is defined on the non-negative


integers as follows
A. (A) 4. B. (B) 5. C. (C) 6. D. (D)7.

Answer: (B)
Data Structures and alogrithm

466. a (m,n) = n+1 if m=0


A. B. C. D.

Answer:

Data Structures and alogrithm

467. = a (m-1, 1) if m≠ 0, n=0


A. B. C. D.
Answer:
Data Structures and alogrithm

468. = a (m-1, a(m, n-1)) if m≠ 0, n ≠ 0


A. B. C. D.

Answer:
Data Structures and alogrithm

469. The value of a (1, 3) is


A. B. C. D.

Answer:
Data Structures and alogrithm

470.
A. B. C. D.

Answer:
Data Structures and alogrithm

471.
A. B. C. D.

Answer:
Data Structures and alogrithm
472.
A. B. C. D.

Answer:
Data Structures and alogrithm

473. Let the following circular queue can accommodate


maximum six elements with the
A. (A)front=2rear=5 B. (B)front=3rear=5 C. (C)front=3rear=4 D.
(D)front=2rear=4

Answer: (A)

Data Structures and alogrithm

474. following data


A. queue = ______; L, M, N, O, ___ B. queue=L,M,N,O,___
 C. queue = ______;
L, M, N, O, ___ D. queue=L,M,N,O,___

Answer:
Data Structures and alogrithm

475. front = 2 rear = 4


A. B. C. D.

Answer:
Data Structures and alogrithm
476. queue = _______; L, M, N, ___, ___
A. B. C. D.

Answer:
Data Structures and alogrithm

477. What will happen after ADD O operation takes place?


A. B. C. D.

Answer:
Data Structures and alogrithm

478.
A. B. C. D.

Answer:
Data Structures and alogrithm

479.
A. B. C. D.

Answer:
Data Structures and alogrithm

480.
A. B. C. D.
Answer:
Data Structures and alogrithm

481.
A. B. C. D.

Answer:
Data Structures and alogrithm

482. A graph with n vertices will definitely have a parallel


edge or self loop if the total number of
A. (A) greater than n–1
 B. (B) less than n(n–1)
 C. (C) greater than n(n–1)/2 D.
(D)lessthann/2

Answer: (A)
Data Structures and alogrithm

483. edges are


A. B. C. D.

Answer:
Data Structures and alogrithm

484.
A. B. C. D.
Answer:
Data Structures and alogrithm

485.
A. B. C. D.

Answer:
Data Structures and alogrithm

486.
A. B. C. D.

Answer:
Data Structures and alogrithm

487. The total number of companions required to merge 4


sorted files containing 15, 3, 9 and 8 records into a single
sorted file is
A. (A) 66
 B. (B) 39
 C. (C) 15
 D. (D)noneabove

Answer: (D)

Data Structures and alogrithm

488.
A. B. C. D.
Answer:
Data Structures and alogrithm

489.
A. B. C. D.

Answer:
Data Structures and alogrithm

490.
A. B. C. D.

Answer:
Data Structures and alogrithm

491.
A. B. C. D.

Answer:
Data Structures and alogrithm

492. . The minimum number of multiplications and additions


required to evaluate the polynomial
A. (A)6&3 B. (B)4&2 C. (C)3&3 D.(D) 8&3

Answer: (C)
Data Structures and alogrithm

493. P = 4x3+3x2-15x+45 is
A. B. C. D.

Answer:
Data Structures and alogrithm

494.
A. B. C. D.

Answer:

Data Structures and alogrithm

495.
A. B. C. D.

Answer:
Data Structures and alogrithm

496.
A. B. C. D.

Answer:
Data Structures and alogrithm

497. An undirected graph G with n vertices and e edges is


represented by adjacency list.
A. (A)O(n)
 B. (B)O(e) C. (C) O (e+n) D. (D)O(e2)

Answer: Ans:C
Data Structures and alogrithm

498. What is the time required to generate all the connected


components?
A. B.

C. D.

Answer:
Data Structures and alogrithm

499.
A. B. C. D.

Answer:
Data Structures and alogrithm

500.
A. B. C. D.

Answer:
Data Structures and alogrithm

501.
A. B. C. D.
Answer:

Data Structures and alogrithm

502. . A full binary tree with n leaves contains


A. (A) n nodes.
 B. (B) n log2 nodes. C. (C) 2n –1 nodes. D. (D)n2nodes.

Answer: Ans:C
Data Structures and alogrithm

503.
A. B. C. D.

Answer:
Data Structures and alogrithm

504.
A. B. C. D.

Answer:
Data Structures and alogrithm

505.
A. B.

C. D.
Answer:
Data Structures and alogrithm

506. The complexity of multiplying two matrices of order


m*n and n*p is
A. (A) mnp B. (B) mp C. (C) mn D. (D)np

Answer: Ans:A
Data Structures and alogrithm

507.
A. B. C. D.

Answer:
Data Structures and alogrithm

508.
A. B. C. D.

Answer:

Data Structures and alogrithm

509.
A. B. C. D.

Answer:
Data Structures and alogrithm

510. You have to sort a list L consisting of a sorted list


followed by a few “random” elements.
A. (A) Bubble sort B. (B) Selection sort C. (C) Quick sort
 D. (D)Insertionsort

Answer: Ans:D
Data Structures and alogrithm

511. Which of the following sorting methods would be


especially suitable for such a task?
A. B. C. D.

Answer:
Data Structures and alogrithm

512.
A. B. C. D.

Answer:
Data Structures and alogrithm

513.
A. B. C. D.

Answer:
Data Structures and alogrithm
514.
A. B. C. D.

Answer:
Data Structures and alogrithm

515. Let A be an adjacency matrix of a graph G. The ij th entry


in the matrix
A. (A) The number of paths of length K from vertex Vi to vertex Vj. B. (B)
Shortest path of K edges from vertex Vi to vertex Vj.
 C. (C) Length of a
Eulerian path from vertex Vi to vertex Vj.
 D.
(D)LengthofaHamiltoniancyclefromvertexVitovertexVj.

Answer: Ans:B
Data Structures and alogrithm

516. A K gives
A. B. C. D.

Answer:
Data Structures and alogrithm

517.
A. B. C. D.

Answer:
Data Structures and alogrithm
518.
A. B. C. D.

Answer:
Data Structures and alogrithm

519.
A. B. C. D.

Answer:
Data Structures and alogrithm

520. If h is any hashing function and is used to hash n keys in


to a table of size m, where n<=m,
A. (A) less than 1. B. (B) less than n. C. (C) less than m. D. (D)lessthann/2.

Answer: Ans:A
Data Structures and alogrithm

521. the expected number of collisions involving a particular


key x is :
A. B. C. D.

Answer:
Data Structures and alogrithm

522. 1.In divide and conquer recursion reffers to


A. Conquer
 B. divide
 C. routines
 D. subproblem

Answer: b
Programming Fundamentals

523. 2.Use of Driver Routine


A. Test the validity of base B. call recursive routines C. c.none of the above
 D.
d.a&b

Answer: d
Programming Fundamentals

524. 3.Narrate the use of bookkeeping


A. solve without recrusion
 B. .track of pending recursive calls. C. to call
function
 D. Deletetherecursivecalls.

Answer: b
Programming Fundamentals

525. 4.Method which should not alter the values of object by


function.
A. call by refrence
 B. call by vale
 C. call by constant refrence D.
callbyconstantvalue.

Answer: c
Programming Fundamentals
526. 5.What is the fuctionality of push_back
A. make the object to attain original value B. Decrease the value by 1
 C.
Increase the value by one
 D. Deleteanitem.

Answer: c
Programming Fundamentals

527. 6. s .c-str ( ) deals with


A. length of the string B. pointer reference
 C. primitive of the string D.
assingningfunctions.

Answer: c
Programming Fundamentals

528. 7.Generic exception class is the mother of all exception


say TRUR OR FALSE
A. B. C. D.

Answer: TRUE
Programming Fundamentals

529. 8.Semantics deals with


A. to create well-formed sentences (or programs) in the language. 


B. the meaning of syntactically valid strings in a language. 


C. issues such as ease of implementation, efficiency in application, and


programming 
 methodology 


D. partofthelanguagefordescribinggrammars. 

Answer: b
Programming Fundamentals

530. 9. phrase-structur e syntax that explains how --------------


are arranged into programs
A. semantics B. language C. symbols D. tokens.

Answer: d
Programming Fundamentals

531. 10.Which of the following is Semantic errors.


A. variable that has not been initialized is accessed.
 B. read command is
executed when the input file is empty C. Above all
 D. Noneofabove.

Answer: c
Programming Fundamentals

532. 11.%2f relates


A. used to represent float numbers.
 B. Display only 2 numbers
 C. display
two digits after decimal point. D. dividewithhundred.

Answer: c

Programming Fundamentals

533. 12syntax for condition operation is


A. Condition:result 1:result 2; B. Condition?result 1,result 2; C. Condition:result
1? result 2; D. condition?result1:result2;

Answer: d
Programming Fundamentals

534. 13.Do-While loop relates for


A. no.of repetition is known in advance.
 B. no.of.repetition are unkown .
 C.
loop to be executed atleast once regards the code. D. needwhenconditionfails.

Answer: c
Programming Fundamentals

535. 14.Continue keyword refers


A. skip the next loop
 B. bypass the loop
 C. execute loops even condition
fails D. noneoftheabove

Answer: b
Programming Fundamentals

536. 15.sorting refers to arrangement say true or false.


A. B. C. D.

Answer: FALSE
Programming Fundamentals

537. Which of the following are recognised kinds of


prototypes
A. A. Interactive sketches B. B. Conceptual models. C. C. Beta versions
 D.
D.Papermock-ups.

Answer: a,d
Human Computer Interaction

538. . In a heuristic evaluation:


A. A. a group of usability experts judges an interface with a detailed
checklist of guidelines. 


B. B. a group of test users conducts a formal experiment 


C. C. a group of psychologists administers a questionnaire 


D. D.agroupofusabilityexpertsreviewsauserinterfaceaccordingtoasmallseto
fgeneral 
 principles. 


Answer: d
Human Computer Interaction

539. Valid reasons for usability testing are:


A. More often than not, intuitions are wrong.
 B. . Designers believe users
follow illogical paths.
 C. . Experience changes ones perception of the world.
D. .Testingperformanceunderuserstressisimportant.

Answer: a,c

Human Computer Interaction


540. Thinking aloud testing:
A. slows down the user by about 17%. B. cannot provide performance data. C. .
cannot provide process data.
 D. .isaformativeevaluationmethod.

Answer: a,b,d
Human Computer Interaction

541. Regarding a formal experiment:


A. Process data are collected.
 B. Objective measurements are made.
 C. A
larger number of test users is needed. D.
.Afullyimplementedsystemisrequired.

Answer: b,c,d
Human Computer Interaction

542. Post-test questionnaires (conducted after a usability


test) are particularly useful for measuring
A. safety.
 B. efficiency.
 C. learnability.
 D. usersatisfaction

Answer: d
Human Computer Interaction

543. A pluralistic walkthrough


A. ) is usually conducted at the end of the development process. B. is often
conducted with low-fidelity designs.
 C. requires having several alternate
designs.

D. requiresafullyfunctionalprototype.
Answer: b
Human Computer Interaction

544. . Providing accelerators (e.g. keyboard shortcuts) mostly


addresses
A. utility.
 B. efficiency.
 C. ) learnability.
 D. attitude(orlikeability).

Answer: b
Human Computer Interaction

545. A method that does not require human participants


serving as test users is the
A. usability test.
 B. pluralistic walkthrough. C. Rubin’s comparison test. D.
heuristicevaluation

Answer: d
Human Computer Interaction

546. The cognitive walkthrough mainly evaluates a product's


A. utility.
 B. efficiency. C. learnability. D. likeability..

Answer: c

Human Computer Interaction

547. The basic requirements of HCI are


A. Knowledge about the interplay among users
 B. ) tasks,task contexts
 C.
ITand the environments in which the systems are used D. alltheabove

Answer: d
Human Computer Interaction

548. . Complex tasks that require human, system, and task


interaction are supported by a)ecommerce b) Web systems
A. A only
 B. b only
 C. aandb
 D. neitheranorb

Answer: c
Human Computer Interaction

549. The "task" among the human, computer leads to


performance and well-being.
A. FALSE
 B. TRUE
 C. always true D. alwaysfalse

Answer: d
Human Computer Interaction

550. An icon of a file folder, which users can drop files on in


order to move them into the folder, is an example of which of
the following:

A. (a) the “recognition rather than recall” principle B. (b) direct


manipulation
 C. (c) a metaphor
 D. (d)alloftheabove

Answer: d
Human Computer Interaction
551. You drag a folder to make a copy of its contents. An
animation appears on the screen, showing files moving from
one folder to another. This is an example of which of the
following
A. (a) visibility
 B. (b) mapping
 C. (c) an affordance D. (d)feedback

Answer: d
Human Computer Interaction

552. Which of the following fields is not an influence on HCI?


A. (a) ergonomics
 B. (b) cognitive psychology
 C. c) computer science
 D.
(d)alloftheaboveareaninfluenceonHCI

Answer: d
Human Computer Interaction

553. Scripting (the ability to record and play back


programmable sequences of actions) is an example of:
A. speaking the user's language
 B. allowing the user model to grow
 C. the
“recognition rather than recall” principle D. amodeintheuserinterfacedesign

Answer: b
Human Computer Interaction

554. An icon of a file folder, which users can drop files on in


order to move them into the folder, is an example of which of
the following:
A. (a) the “recognition rather than recall” principle B. (b) direct
manipulation
 C. (c) a metaphor
 D. (d)alloftheabove

Answer: d
Human Computer Interaction

555. You drag a folder to make a copy of its contents. An


animation appears on the screen, showing files moving from
one folder to another. This is an example of which of the
following
A. (a) visibility
 B. (b) mapping
 C. (c) an affordance D. (d)feedback

Answer: d
Human Computer Interaction

556. Your new sound card is packaged in a plastic anti-static


bag. The bag is sealed with a yellow sticker with a written
warning not to expose the card to static electricity. The
sticker is an example of:
A. (a) perceptual constraint B. (b) cultural constraint
 C. (c) physical constraint
D. (d)logicalconstraint

Answer: b/c
Human Computer Interaction

557. . Which of the following statements is false?


A. Norman's logical constraints are one way to implement Nielsen's
principle of error prevention 


B. The help and documentation called for by Nielsen's usability principle


form part of Norman's defnition of the system image. 


C. Norman's principle of feedback is one way to implement Nielsen's


principle of “recognition rather than recall”. 


D. Alloftheabovestatementsaretrue. 


Answer: c
Human Computer Interaction

558. Which of the following statements is true?


A. (a) Violating Norman's feedback principle interferes with the fourth
stage
 B. (b) There is no ethical way to collect data about people without their
informed consent C. (c) Structured interviews are less likely to miss salient
details than un-structured ones. D. (d)Alloftheabovestatementsarefalse.

Answer: d
Human Computer Interaction

559. Which of the following gestures makes use of a quasi-


mode?
A. Selecting one of the commands (draw, spray paint, etc.) in the tool
palette of a paint program 


B. Using the Ctrl-V shortcut to paste text. 


C. Clicking a link in a web browser. 


D. Alloftheabovemakeuseofquasi-modes. 

Answer: b

Human Computer Interaction

560. Unlike traditional observation, guided observation:


A. sets strict guidelines for session activities
 B. reduces error introduced by
the experimenter C. sets strict guidelines for session lengths
 D.
includessomeinteractionwithparticipants

Answer: d
Human Computer Interaction

561. The Num Lock key found on many keyboards, which


enables the user to use the number functions of the numeric
kerpad rather than the cursor control functions, indicates
which of the following features is present:
A. a)amode
 B. (b) a quasi-mode
 C. c) a physical constraint D.
(d)alogicalconstraint

Answer: a
Human Computer Interaction

562. . As we have used the terms in this course, what is the


relationship between tasks, actions, and goals?
A. (a) a task is composed of goals and actions to accomplish those goals B. (b)
an action rei_es a task into a goal
 C. c) a goal is composed of a set of actions
that accomplish a task
 D. d)noneoftheabove
Answer: d/c
Human Computer Interaction

563. Affordances are:


A. A. possibilities for using an object or interface
 B. B. the costs of buying
user interface components C. C. the completion times for a typical task.
 D.
D.classifiedintorealandperceivedaffordances

Answer: a
Human Computer Interaction

564. Which of these are attributes of usability?


A. A. Learnability
 B. B. Usefulness.
 C. C. Generalisability
 D.
D.Subjectivesatisfaction

Answer: a&d
Human Computer Interaction

565. How do you get to know the user in the usability


engineering lifecycle?
A. A. Draw up a user profile.
 B. B. Run a thinking aloud test
 C. C. Assume
the role of an apprentice learning from the master craftsman D.
D.Observerepresentativeusers.

Answer: a,c,d
Human Computer Interaction

566. Concerning competitive analysis, it is true that:


A. A. two groups of usability testers compare their results for the same
interface. B. B. it is used for usability benchmarking
 C. C. it is an online
comparision of data transfer rates
 D. D.competingsystemsareanalysed

Answer: b,d
Human Computer Interaction

567. A persona in the context of goal-oriented interaction


design:
A. A. is used to role-play through an interface design. B. B. is a real person.
 C.
C. represents a particular type of user.
 D. D.shouldrepresentanaverageuser.

Answer: a,c
Human Computer Interaction

568. The phrase __________ describes viruses, worms, Trojan


horse attack applets, and attack scripts.
A. malware B. spam
 C. phish
 D. virus

Answer: malware
Information Security

569. Hackers often gain entry to a network be pretending to


be at a legitimate computer.
A. spoofing B. forging
 C. IP spoofing D. IDtheft

Answer: IP spoofing
Information Security
570. A hacker that changes or forges information in an
electronic resource, is engaging in __________.
A. denial of service B. sniffing
 C. terrorism
 D. datadiddling

Answer: data diddling


Information Security

571. __________cookies are also known as transient cookies.


A. Third-party B. First-party C. Session
 D. Persistent

Answer: Session
Information Security

572. Which of the following will not protect you from spam?
A. spam blockers B. e-mail rules
 C. popup blocker D. filters

Answer: popup blocker


Information Security

573. In the right setting a thief will steal your information by


simply watching what you type.
A. snagging B. spying

C. social engineering D. shouldersurfing


Answer: shoulder surfing
Information Security

574. A hacker contacts you my phone or email and attempts


to acquire your password.
A. spoofing B. spoofing C. spamming D. bugging

Answer: spoofing
Information Security

575. The __________ prevents unlawful access to voice


communications by wire.
A. Electronic Communications Privacy Act B. Freedom of Information Act
 C.
USA Patriot Act
 D. PrivacyActof1974

Answer: Electronic Communications Privacy Act


Information Security

576. If configured correctly, the __________ will prevent


interaction with your computer after a specified time period
A. firewall
 B. filter
 C. screen saver D. popupblocker

Answer: screen saver


Information Security

577. A security measure to stop unauthorized access to


documents is:
A. business continuity/disaster recovery. B. backup/restore
 C. physical access
restrictions
 D. networkaccesscontrol

Answer: network access control


Information Security

578. Which of the following is not an accepted approach to


controlling a computer-based information system?
A. Recovery. B. Obfuscation C. Deterrence D. Prohibition

Answer: Prohibition
Information Security

579. This type of virus is activated when a user runs an


applications such as a wordprocessor or spreadsheet.
A. E-mail virus B. Trojan virus C. Macro-virus D. Worm

Answer: Macro-virus
Information Security

580. In order to prevent any damage being caused to data by


the failure of a storage device, such as a hard disk drive,
which of the following would you be most likely to use?
A. RAID
 B. TSR program.
 C. Backup site
 D. Incrementalbackup.

Answer: RAID
Information Security
581. Which of the following is capable of altering its form in
order to avoid discovery by certain virus detection programs?
A. Trojan
 B. Stealth virus.
 C. Polymorphic virus D. Logicbomb

Answer: Stealth virus.


Information Security

582. To recover files from a backup, you perform a


__________.
A. restore B. scan
 C. unerase D. copy

Answer: restore
Information Security

583. What is the return value of this substr function? <?php


$rest = substr("abcdef", -1); $rest = substr("abcdef", 0, -1); ?>

A. f,abcde B. a,fedcb C. b,abcdef D. a,abcde

Answer: A
Internet and Web Programming

584. What is the strpos() function used for in PHP?


A. Find the last occurrence of the string within a string B. Find the first
occurrence of the string within a string C. Bothaandb
 D.
Searchforalloccurrencewithinastring

Answer: B
Internet and Web Programming

585. What does explode do?


A. Used to convert a string to an array.
 B. Used to split a given string into the
number of chunks specified C. Used to split a string by a string
 D.
Usedtosplitstringintotwoequalhalves

Answer: A
Internet and Web Programming

586. In CSS, you have the following options for changing line-
height?
A. number, length, %
 B. normal, number, length, % C. normal, number,
length
 D. numberandlengthonly

Answer: B
Internet and Web Programming

587. Which command we use to set an image on background?


A. image-background:url('R4R_Logo.jpg') B. background-
image:url('R4R_Logo.jpg') C. bg-image:url('R4R_Logo.jpg')
 D. background-
image:href('R4R_Logo.jpg')

Answer: B
Internet and Web Programming

588. How do you add a background color for all <h1>


elements?
A. h1.all {background-color:#FFFFFF} B. all.h1 {background-color:#FFFFFF} C.
h1 {background-color:#FFFFFF}
 D. Noneoftheabove

Answer: C
Internet and Web Programming

589. How do you locate the first X in a string txt?


A. txt.find('X');
 B. txt.locate('X'); C. txt.indexOf('X'); D. txt.countTo('X');

Answer: C
Internet and Web Programming

590. How do substring() and substr() differ?

A. One is not a method of the String object

B. substr() takes three arguments, substring() only two
 C. Only one accepts a
desired string length as an argument D. Besidesthespelling,nothing

Answer: C
Internet and Web Programming

591. What is the correct way to include the file "time.inc”?


A. <?php include_file("time.inc"); ?> B. <?php require("time.inc"); ?>
 C. <%
include file="time.inc" %>
 D. <!--includefile="time.inc"-->

Answer: B
Internet and Web Programming

592. What is the purpose of the basename function?


A. Returns last accessed time of the file
 B. Returns first accessed time of the
file
 C. Strips of the path and returns the file name
 D.
Stripsofthepathandreturnsthefoldername

Answer: C
Internet and Web Programming

593. What is the purpose of $_SESSION []?


A. Used to register a global variable
 B. Used to initialize a session
 C. Used to
store variables of the current session D. Noneoftheabove

Answer: C

Internet and Web Programming

594. A script is a
A. Program or sequence of instructions that is interpreted or carried out by
processor directly 


B. Program or sequence of instruction that is interpreted or carried out by


another program 


C. Program or sequence of instruction that is interpreted or carried out by


web server only 


D. Noneofabove 


Answer: B
Internet and Web Programming

595. In PHP, Which method is used to getting browser


properties
A. $_SERVER ['HTTP_USER_AGENT'] B. $_SERVER ['PHP_SELF']
 C.
$_SERVER ['SERVER_NAME']
 D. $_SERVER['HTTP_VARIENT']

Answer: B
Internet and Web Programming

596. How much storage space does DATETIME require?


A. 4 bytes B. 2 bytes C. 8 bytes D. 1byte

Answer: C
Internet and Web Programming

597. <script language="javascript"> function x() { var s=


"Good 100%";
var pattern = /\D/g; var output= s.match(pattern);
document.write(output); } </script>
A. Good % B. 1,0,0
 C. G,o,o,d,% D. Error

Answer: C
Internet and Web Programming

598. How do you display a border like this? The top border =
10 pixels The bottom border = 5 pixels The left border = 20
pixels The right border = 1pixel
A. border-width: 10px 1px 5px 20px B. border-width: 10px 5px 20px 1px C.
border-width: 5px 20px 10px 1px D. border-width:10px20px5px1px

Answer: A
Internet and Web Programming

599. How do you display hyperlinks without an underline?


A. a {text-decoration:no underline} B. a {underline:none}
 C. a {decoration:no
underline}
 D. a{text-decoration:none}

Answer: D
Internet and Web Programming

600. Defining clickable sub-areas on an image is called?


A. image linking B. image mapping

C. multiple linking D. imageselection

Answer: B
Internet and Web Programming

601. There are many ____ images that exist on the Web that
you can freely use on your Web sites.
A. public-domain B. commercial C. registered
 D. copyrighted

Answer: A
Internet and Web Programming

602. If a browser has Javascript turned off it will


A. ignore all <script> and <noscript> tags
 B. display the content of <script>
tags
 C. display the content of <noscript> tags
 D.
displaythecontentof<script>and<noscript>tags

Answer: C
Internet and Web Programming

603. <html><head><script type="text/javascript"


language="javascript"> var qpt= new Array(); qpt[0] =
"WebDevelopment"; qpt[1]="ApplicationDevelopment"
qpt[2]="Testing" qpt[3] = "QualityPointTechnologies";
document.write(qpt[0,1,2,3]); </script></head></html> Show
the answer?
A. Error
 B. QualityPointTechnologies C. WebDevelopment
 D. Testing

Answer: B
Internet and Web Programming

604. <html> <head> <script type="text/javascript"> var qpt =


"Quality Point Technologies"; var result = qpt.split(" ");
document.write(result); </script> </head> </html> Show the
answer?
A. Quality
 B. Q,u,a,l,i,t,y,P,o,i,n,t,T,e,c,h,n,o,l,o,g,i,e,s C.
Quality,Point,Technologies
 D. QualityPointTechnologies

Answer: C
Internet and Web Programming
605. Which of the following is NOT a type of popup box ?
A. Alert
 B. Confirm C. Radio D. Text

Answer: D
Internet and Web Programming

606. How do you read the first character in a string ?


A. stringName.charAt(0);
 B. stringName.substring(1); C.
stringName.charAt(1);
 D. stringName.charAt(2);

Answer: B

Internet and Web Programming

607. Which method is used to search for a substring ?


A. stringVariable.indexOf(charAt(0)) B. stringVariable.substring(subString) C.
stringVariable.find(subString)
 D. stringVariable.indexOf(subString)

Answer: B
Internet and Web Programming

608. What is the correct way to connect to a MySQL


database?
A. mysql_open("localhost");
 B. mysql_connect("localhost"); C.
connect_mysql("localhost"); D. dbopen("localhost");

Answer: B
Internet and Web Programming
609. How do you get information from a form that is
submitted using the "get" method?
A. Request.QueryString; B. $_GET[];
 C. Request.Form;
 D. $_POST[];

Answer: B
Internet and Web Programming

610. <link rel=stylesheet href="whatever.css"


type="text/css"> is used for adding CSS to the entire site ?

A. Yes - if present on all pages in the site.

B. Only if written in the <body>-section of the page. C. no
 D. error

Answer: A
Internet and Web Programming

611. What is the correct HTML for referring to an external


style sheet?
A. <stylesheet>mystyle.css
 B. <link rel="stylesheet" type="text/css"
href="mystyle.css"> C. <style src="mystyle.css">
 D. none

Answer: B
Internet and Web Programming

612. What is the correct way to open the file "time.txt" as


readable?
A. open("time.txt");
 B. open("time.txt","read"); C. fopen("time.txt","r");
 D.
fopen("time.txt","r+");

Answer: C
Internet and Web Programming

613. Which attribute specify where to send a form in HTML


A. Method B. input C. output D. action

Answer: action

Internet and Web Programming

614. In CSS, How do you make a list that list that lists its
items with squares
A. type: square
 B. list-style-type: square C. list-type:square
 D. style-
list:square

Answer: list-style-type: square


Internet and Web Programming

615.
A. B. C. D.

Answer:
Internet and Web Programming

616.
A. B. C. D.
Answer:
Internet and Web Programming

617. What is the correct CSS syntax for making all the <p>
elements bold

A. p{text-size:bold}
 B. p{font-weight:bold}
 C. <p style="font-size:bold"> D.


<pstyle="text-size:bold">

Answer: p{font-weight:bold}
Internet and Web Programming

618. How do you display hyperlinks without an underline in


HTML
A. a {text-decoration:no underline} B. a {underline:none}
 C. a {decoration:no
underline}
 D. a{text-decoration:none}

Answer: a {text-decoration:none}
Internet and Web Programming

619. <html><head><script language="javascript">


qpt=((45%2)==0)? "hello" : "bye"; document.write(qpt);
</script></head></html> Show the answer?
A. hello
 B. bye
 C. Error in string handling D. Noneoftheabove

Answer: bye
Internet and Web Programming
620.
A. B. C. D.

Answer:
Internet and Web Programming

621.
A. B. C. D.

Answer:
Internet and Web Programming

622.
A. B. C. D.

Answer:
Internet and Web Programming

623.
A. B. C. D.

Answer:
Internet and Web Programming
624. A variable $word is set to “WELCOME TO VIT”, which of
the following php script returns in title
case________________
A. echo ucwords($word)
 B. echo ucwords(strtolower($word)) C. echo
ucfirst($word)
 D. echoucfirst(strtolower($word))

Answer: echo ucwords(strtolower($word))


Internet and Web Programming

625. The following piece of php script will output <?php


$n1=016;$n2=9; $n=$n1+$n2; print($n); ?>
A. 23 B. 25 C. 23 D. none

Answer: 23
Internet and Web Programming

626.
A. B. C. D.

Answer:
Internet and Web Programming

627.
A. B. C.

D.
Answer:
Internet and Web Programming

628.
A. B. C. D.

Answer:
Internet and Web Programming

629. Which of the following method is suitable when you


need to send larger form submissions
A. Get
 B. Post
 C. Both Get and Post D. none

Answer: post
Internet and Web Programming

630.
A. B. C. D.

Answer:

Internet and Web Programming

631. Which of the following is not true


A. PHP can be used to develop web applications B. PHP makes a website
dynamic
 C. PHP applications can not be compiled
 D.
PHPcannotbeembeddedintohtml
Answer: PHP can not be embedded into html
Internet and Web Programming

632.
A. B. C. D.

Answer:
Internet and Web Programming

633. Which of the following variables is not a predefined


variable in PHP
A. $_get
 B. $_ask
 C. $_request D. $_post

Answer: $_ask
Internet and Web Programming

634. Which of the following command is valid in MYSQL


A. show tables B. show column

C. show column from Table D. None

Answer: show tables


Internet and Web Programming

635. Which parameter of PHP mail function contains the BCC,


CC address
A. To
 B. From C. Header D. Sub
Answer: Header
Internet and Web Programming

636. Study following steps and determine the correct order


(1) Open a connection to MySql server (2) Execute the SQL
query (3) Fetch the data from query (4) Select database (5)
Close Connection
A. 1,4,2,3,5 B. 4,1,2,3,5 C. 1,5,4,2,1 D. 1,4,3,2,5

Answer: 1, 4, 2, 3, 5
Internet and Web Programming

637.
A. B. C. D.

Answer:
Internet and Web Programming

638.
A. B. C. D.

Answer:
Internet and Web Programming

639.
A. B. C. D.
Answer:
Internet and Web Programming

640. In mail($param2, $param2, $param3, $param4), the


$param3 contains
A. The message B. The recipient C. The header D. Thesubject

Answer: The message


Internet and Web Programming

641. What is a frameset


A. A set of different pages grouped together in frames B. A set of different
pages grouped together in frames C. One page that is split up over different
pages
 D. Asetofpageslinkedtoeachotherwithhyperlinks

Answer: One page that is split up over different


pages
Internet and Web Programming

642.
A. B. C. D.

Answer:
Internet and Web Programming

643.
A. B. C. D.
Answer:
Internet and Web Programming

644. (1) Assume CS=03E0h and IP=1F20h, from what address


is the next instruction fetched?
A. 05D20h B. 12345h C. 23456h

D. 05D2Fh

Answer: a
Microprocessor and Interfacing

645.
A. B. C. D.

Answer:
Microprocessor and Interfacing

646. (2) The Pentium uses the following technique to


maintain a steady flow of instructions into pipelines?
A. Priority Inversion B. Recursion
 C. Branch Prediction D. Noneoftheabove

Answer: c
Microprocessor and Interfacing

647.
A. B. C. D.
Answer:

Microprocessor and Interfacing

648.
A. B. C. D.

Answer:
Microprocessor and Interfacing

649. (3) Compute the average memory access time from the
following information:
A. B. C. D.

Answer:
Microprocessor and Interfacing

650. RAM access time = 80ns / cache access time =10ns / hit
ratio = 0.92
A. 122ns 


B. 0.92(10ns) + (1-0.92) (90ns) 


C. 21ns 


D. 0.92*80ns 


Answer: b
Microprocessor and Interfacing

651.
A. B. C. D.

Answer:
Microprocessor and Interfacing

652.
A. B. C. D.

Answer:
Microprocessor and Interfacing

653. (4) The instruction MOV [BP+SI] , AH is an example of ---


--- addressing mode
A. B. C. D.

Answer:
Microprocessor and Interfacing

654.
A. Relative
 B. Based indexed C. Immediate
 D. register

Answer: b
Microprocessor and Interfacing

655.
A. B. C. D.

Answer:
Microprocessor and Interfacing

656. (5) The result of IMUL CL if AL contains 20h and CL


contains 80h is ---------
A. F000h B. 4096h C. 1234h D. 4069h

Answer: a
Microprocessor and Interfacing

657.
A. B. C. D.

Answer:
Microprocessor and Interfacing

658.
A. B. C. D.

Answer:
Microprocessor and Interfacing

659. (6) The result of NEG AX is ------------if AX contains


FFECh
A. 0024h B. 0014h C. 0041h D. 0023h

Answer: b
Microprocessor and Interfacing

660.
A. B. C. D.

Answer:
Microprocessor and Interfacing

661. (7) How many times does the NOP instruction execute in
the following sequence?
A. B. C.

D.

Answer:
Microprocessor and Interfacing

662.
A. B. C. D.

Answer:
Microprocessor and Interfacing

663.
A. B. C. D.

Answer:
Microprocessor and Interfacing

664. MOV CX, 02h


A. 8 B. 80 C. 12 D. 11

Answer: a

Microprocessor and Interfacing

665. XYZ :PUSH CX


A. B. C. D.

Answer:
Microprocessor and Interfacing

666. MOV CX, 04h


A. B. C. D.

Answer:
Microprocessor and Interfacing

667. ABC: NOP


A. B. C. D.

Answer:
Microprocessor and Interfacing

668. LOOP ABC


A. B. C. D.

Answer:
Microprocessor and Interfacing

669. POP CX
A. B. C. D.

Answer:
Microprocessor and Interfacing

670. LOOP XYZ


A. B. C. D.

Answer:
Microprocessor and Interfacing

671.
A. B. C. D.

Answer:
Microprocessor and Interfacing
672. (8) Which interrupt is recognized first? NMI or single
step?
A. NMI 


B. Single Step 


C. D.

Answer: a
Microprocessor and Interfacing

673.
A. B. C. D.

Answer:
Microprocessor and Interfacing

674.
A. 20and16 B. 16and22 C. 16and20 D. 12and21

Answer: a
Microprocessor and Interfacing

675. (9) The 8086 has ----------address lines and -------------


data lines?
A. B. C. D.
Answer:
Microprocessor and Interfacing

676.
A. B. C. D.

Answer:
Microprocessor and Interfacing

677. (10) ----------------is the IC number of USART?


A. IC 8255 B. IC8257 C. IC8259 D. IC8251

Answer: d
Microprocessor and Interfacing

678.
A. B. C. D.

Answer:
Microprocessor and Interfacing

679.
A. B. C. D.

Answer:
Microprocessor and Interfacing
680. (11) What interrupts are disabled by writing 10100001
into OCW1?
A. IR7,IR5,IR0 B. IR6andIR4 C. IR1
 D. IR2

Answer: a
Microprocessor and Interfacing

681.
A. B. C. D.

Answer:
Microprocessor and Interfacing

682.
A. B. C. D.

Answer:
Microprocessor and Interfacing

683. (12) The sequence of instructions will store -----------in


DL when it exits the loop.
A. B. C. D.

Answer:
Microprocessor and Interfacing
684.
A. B. C. D.

Answer:
Microprocessor and Interfacing

685.
A. B. C. D.

Answer:

Microprocessor and Interfacing

686. MOV DL,00h


A. 9 B. 10 C. 11 D. 12

Answer: a
Microprocessor and Interfacing

687. MOV CL,01h


A. B. C. D.

Answer:
Microprocessor and Interfacing

688. MOV CX,09h


A. B. C. D.
Answer:
Microprocessor and Interfacing

689. Next:ADD DL,01h


A. B. C. D.

Answer:
Microprocessor and Interfacing

690. LOOP Next


A. B. C. D.

Answer:
Microprocessor and Interfacing

691.
A. B. C. D.

Answer:
Microprocessor and Interfacing

692.
A. B. C. D.

Answer:
Microprocessor and Interfacing
693.
A. B. C. D.

Answer:
Microprocessor and Interfacing

694. (13) The use of indexing or base addressing does not


increase the instruction execution.
A. TRUE B. FALSE C.
 D.

Answer: b
Microprocessor and Interfacing

695.
A. B. C. D.

Answer:
Microprocessor and Interfacing

696.
A. B. C. D.

Answer:
Microprocessor and Interfacing
697. (14) After the following sequence of operations contents
of AX is --- ------------
A. B. C. D.

Answer:
Microprocessor and Interfacing

698. PUSH AX; AX contains 20h


A. B. C. D.

Answer:
Microprocessor and Interfacing

699. PUSH BX; BX contains 24h


A. 22h B. 24h C. 20h D. 04h

Answer: c

Microprocessor and Interfacing

700. MOV AX, 22h


A. B. C. D.

Answer:
Microprocessor and Interfacing

701. POP BX
A. B. C. D.
Answer:
Microprocessor and Interfacing

702. POP AX
A. B. C. D.

Answer:
Microprocessor and Interfacing

703. MOV BX, 2Ah


A. B. C. D.

Answer:
Microprocessor and Interfacing

704.
A. B. C. D.

Answer:
Microprocessor and Interfacing

705.
A. B. C. D.

Answer:
Microprocessor and Interfacing
706. (15) The following sequence of instructions is used to
compute ----- -------------
A. B. C. D.

Answer:

Microprocessor and Interfacing

707. PUSH X
A. B. C. D.

Answer:
Microprocessor and Interfacing

708. PUSH Y
A. X-Y B. Y-X C. Y-AX D. X-BX

Answer: b
Microprocessor and Interfacing

709. POP AX
A. B. C. D.

Answer:
Microprocessor and Interfacing

710. 8086 is interfaced to two 8259s (Programmable interrupt


controllers). If 8259s are in master slave configuration the
number of interrupts available to the 8086 microprocessor is
A. 8 B. 16

C. 15 D. 64

Answer: D
Microprocessor and Interfacing

711.
A. B. C. D.

Answer:
Microprocessor and Interfacing

712.
A. B. C. D.

Answer:
Microprocessor and Interfacing

713.
A. B. C. D.

Answer:

Microprocessor and Interfacing


714. 8086 microprocessor is interfaced to 8253 a
programmable interval timer. The maximum number by
which the clock frequency on one of the timers is divided by
A. 216 B. 28 C. 210 D. 220

Answer: A
Microprocessor and Interfacing

715.
A. B. C. D.

Answer:
Microprocessor and Interfacing

716.
A. B. C. D.

Answer:
Microprocessor and Interfacing

717.
A. B. C. D.

Answer:
Microprocessor and Interfacing

718. . Give the control word address if port C lower bit is to be


configured as input Port, port A as an output port in mode 0
and port B is not used in I/O mode?
A. 80 B. 81 C. 87 D. 7

Answer: B
Microprocessor and Interfacing

719. If the programmable counter timer 8254 is set in mode 1


and is to be used to count six events, the output will remain
at logic 0 for _____ number of counts
A. 5
 B. 6
 C. 0
 D. Noneoftheabove

Answer: B
Microprocessor and Interfacing

720. Conversion of the +1000 decimal number into signed


binary word results
A. 0000 0011 1110 1000 B. 1111 1100 0001 1000

C. 1000 0011 1110 1000 D. 0111110000011000

Answer: C
Microprocessor and Interfacing

721. The 8255 Programmable Peripheral Interface isused as


described below. (i)An A/D converter is interfaced to a
icroprocessor through an 8255. The conversion is initiated by
a signal from the 8255 on Port C. A signal on Port C causes
data to be stored into Port A. (ii) Two computers exchange
data using a pair of 8255s.Port A works as a bidirectional data
port supported by appropriate handshaking signals. The
appropriate modes of operation of the 8255 for (i) and (ii)
would be
A. Mode 0 for (i) and Mode 1 for (ii) B. Mode 1 for (i) and Mode 2 for (ii) C.
Mode 2 for (i) and Mode 0 for (ii) D. Mode2for(i)andMode1for(ii)

Answer: D
Microprocessor and Interfacing

722. Given that the bl register contains ‘B’, the effect of the
following instruction or bl, 0010 0000 is to
A. clear bl
 B. store ‘b’ in bl
 C. store 0010 0000 in bl D. leaveblunchanged

Answer: D
Microprocessor and Interfacing

723. Which type of JMP instruction assembles if the distance


is 0020 h bytes

A. near

B. far C. short D. long

Answer: A
Microprocessor and Interfacing
724. Number of the times the instruction sequence below will
loop before coming out of loop is MOV AL, 00h A1: INC AL
JNZ A1
A. 0 B. 1 C. 255 D. 256

Answer: D
Microprocessor and Interfacing

725. What will be the contents of register AL after the


following has been executed MOV BL, 8C MOV AL, 7E ADD
AL, BL
A. 0A and carry flag is set B. 0A and carry flag is reset C. 6A and carry flag is set
D. 6Aandcarryflagisreset

Answer: A
Microprocessor and Interfacing

726. Ready pin of a microprocessor is used


A. to indicate that the microprocessor is ready to receive inputs. B. to indicate
that the microprocessor is ready to receive outputs. C. to introduce wait
states.
 D. toprovidedirectmemoryaccess.

Answer: C
Microprocessor and Interfacing

727. LOCK prefix is used most often


A. during normal execution. B. during DMA accesses
 C. during interrupt
servicing. D. duringmemoryaccesses.

Answer: C
Microprocessor and Interfacing

728. Which pins are general purpose I/O pins during mode-2
operation of the 82C55?
A. PA0–PA7 B. PB0-PB7 C. PC3-PC7 D. PC0-PC2

Answer: A
Microprocessor and Interfacing

729. The no. of address lines required to address a memory of


size 32 K is
A. 15 lines B. 16 lines C. 18 lines D. 14lines

Answer: A
Microprocessor and Interfacing

730. 8088 microprocessor has


A. 16 bit data bus
 B. 4 byte pre-fetch queue C. 7 byte pre-fetch queue D.
16bitaddressbus

Answer: D
Microprocessor and Interfacing

731. What is the advantage of modeling and simulation.


A. Better understanding of the system
 B. Experimenting new or unknown
situation
 C. Employ system approach to problem solving D. Alltheabove.

Answer: All the above.


Modelling and Simulation

732. Systems in which the changes are predominantly


smooth are called __________
A. Discrete System
 B. Continuous system C. Dynamic system
 D.
Staticsystem

Answer: Continuous system


Modelling and Simulation

733. When we should not go for simulations (i) To experiment


with new designs or policies prior to implementation. (ii) To
verify analytic solutions. (iii) If the simulation costs exceeds
savings. (iv) If the resources or time are not available.

A. Bothiandii B. Both i and iii C. Both iii and iv D. onlyi.

Answer: Both iii and iv


Modelling and Simulation

734. The term ___________ is used to describe activities and


events in the environment that affect the system.
A. Endogenous System B. Exogenous System C. Closed System
 D.
opensystem
Answer: Exogenous System
Modelling and Simulation

735. Monte-Carlo simulation is otherwise called as


A. Mathematical Model B. Dynamic Model
 C. Static Model
 D.
DeterministicModel

Answer: Static Model


Modelling and Simulation

736. A system for which there is exogenous activity and event


is said to be
A. Endogenous System B. Exogenous System C. Closed System
 D.
opensystem

Answer: open system


Modelling and Simulation

737. _______________ Model represents systems as they


change over time.
A. Static Model
 B. Dynamic model.
 C. Deterministic Model D.
StochasticModel

Answer: Dynamic model.


Modelling and Simulation

738. _____________ refers to customer actions while in a


queue waiting for service to begin.
A. FIFO
 B. Queue behavior
 C. Queue discipline D. Noneoftheabove.

Answer: Queue discipline


Modelling and Simulation

739. In a single channel Queue (i) the calling population is


infinite (ii) the calling population is finite (iii) if a unit leaves
the calling population and joins the waiting line there is no
change in the arrival rate of other units that may need
service. (iv) if a unit leaves the calling population and joins the
waiting line there is a change in the arrival rate of other units
that may need service.
A. Iandiii B. iandiv C. ii and iii D. iiandiv

Answer: I and iii


Modelling and Simulation

740. which test Uses the Kolmogorov-Smirnov or the chi-


square test to compare the distribution of the set of numbers
generated to a uniform distribution.
A. Frequency test.
 B. Autocorrelation test. C. Gap test
 D. Pokertest

Answer: Frequency test.


Modelling and Simulation

741. Consider a random variable X that is uniformly


distributed on the interval [a, b]. A reasonable guess for
generating X is given by
A. X=a+(a-b) B. a+(b-a)R
 C. X=a+(b+a)R D. X=a-(b-a)

Answer: a +(b - a)R


Modelling and Simulation

742. which distribution technique Models the number of


independent events that occur in a fixed amount of time or
space .
A. Binomial Distribution 


B. Negative Bi nomial Distribution 


C.
 D. Poisondistribution

Answer: Normal Distribution.


Modelling and Simulation

743. Which model contains no Random variables .


A. Static Model
 B. Dynamic Model
 C. Deterministic Model D.
StochasticModel

Answer: Deterministic Model


Modelling and Simulation

744. The average waiting time for a customer is 2.8minutes.


The total time for customers to wait in the queue is 56
minutes find the total number of customers standing in the
queue.
A. 156 B. 157 C. 20 D. 24

Answer: 20
Modelling and Simulation

745. The Number of customers who are waiting in the queue


is 13 and the total number of customers is 20. Find out the
pro ability of waiting time of each customer.
A. 53 B. 0.2 C. 0.5 D. 0.65

Answer: 0.65

Modelling and Simulation

746. A computer cannot boot if it does not have the


A. Compiler B. Loader
 C. Assembler D. Interpreter

Answer: Loader
Operating Systems

747. In real time computing, priority inheritance protocol


doesn’t accomplish one of the following issues
A. Occurrence of deadlock B. Priority inversion
 C. Preempt the resources D.
Assigningtheresources

Answer: Occurrence of deadlock


Operating Systems

748. Disadvantage of Spin lock is


A. Avoid overhead from rescheduling B. Do not acquire lock
 C. Do not
support atomic operations D. Requirere-scheduling

Answer: Do not acquire lock


Operating Systems

749. Which of the following CPU scheduling criteria must be


reduced
A. Waiting time B. Throughput
 C. Response time D. Bothaandc

Answer: Both a and c


Operating Systems

750. Part of program, where the shared memory is accessed


and which should be executed indivisibly is called
A. semaphores
 B. directory
 C. critical section D. mutualexclusion

Answer: critical section


Operating Systems

751. What are the possible approaches to deadlock recovery?


A. Avoiding mutual Exclusion B. Avoid Hold and Wait
 C. Preemption
 D.
AvoidCircularWait
Answer: Preemption
Operating Systems

752. All details regarding the physical page frames are


maintained in a data structure called ____________.
A. Frame table
 B. Page table
 C. Free frame list
 D. Sparseaddressspace

Answer: Frame table

Operating Systems

753. Function of the syntax phase scheduler is.............


A. Allocate CPU time to process from ready queue
 B. Decides which process
should enter into the ready queue
 C. Swaps the process from the main
memory to secondary memory D.
dispatchtasksaccordingtoexecutioncharacteristics

Answer: Allocate CPU time to process from ready


queue
Operating Systems

754. While running DOS on a PC, which command would be


used to duplicate entire diskette?
A. `Diskcopy B. Extend C. DiskPart D. Fdisk

Answer: Diskcopy
Operating Systems
755. What is the state of processor, when a process is waiting
for some event to occur?
A. Ready State B. Blocked State C. Active State D. RunningState

Answer: Blocked State


Operating Systems

756. What command will you use to review boot messages?


A. fdisk
 B. Dmesg C. Deloldos D. dblspace

Answer: Dmesg
Operating Systems

757. You have been assigned the task of determining if there


are any user accounts defined on your system that have not
been used during the last three months. Which log file should
you examine to determine this information?
A. /var/log/wtmp
 B. /var/log/lastlog
 C. /var/log/utmp
 D. /var/log/messages

Answer: /var/log/lastlog
Operating Systems

758. Which log contains information on currently logged in


users?
A. /var/log/utmp
 B. /var/log/wtmp
 C. /var/log/lastlog
 D. /var/log/messages

Answer: /var/log/utmp
Operating Systems

759. An ----------- uniquely identifies a process and provides


address- space protection for that process.
A. Address-space identifier B. Port number
 C. IP address

D. none

Answer: Address-space identifier


Operating Systems

760. In working-set model the set of pages in the most recent


page references is called the -----------.
A. Page table
 B. Page table Descripter C. working-set
 D. none

Answer: working-set
Operating Systems

761. What is a difference between a declaration and a


definition of a variable?
A. Both can occur multiple times, but a declaration must occur first. B. There is
no difference between them.
 C. A definition occurs once, but a declaration
may occur many times. D.
Adeclarationoccursonce,butadefinitionmayoccurmanytimes.

Answer: D
Programming Fundamentals

762. "My salary was increased by 15%!". Select the statement


which will EXACTLY reproduce the line of text above.
A. printf("⧵"My salary was increased by 15/%⧵!⧵"⧵n"); B. printf("My salary was
increased by 15%!⧵n");
 C. printf("My salary was increased by 15'%'!⧵n");
 D.
printf("⧵"Mysalarywasincreasedby15%%!⧵"⧵n");

Answer: D
Programming Fundamentals

763. what will be the output when following code is executed


int a=10,b; b=a++ + ++a; printf("%d,%d,%d,%d",b,a++,a,++a);
A. 22,13,13,13 B. 12,10,11,13 C. 22,10,11,13 D. 22,11,11,11

Answer: A
Programming Fundamentals

764. Which one of the following provides conceptual support


for function calls?
A. The system stack
 B. The data segment
 C. The processor's registers D.
Theheap

Answer: A
Programming Fundamentals

765. The time factor when determining the efficiency of


algorithm is measured by
A. Counting microseconds
 B. Counting the number of key operations C.
Counting the number of statements
 D. Countingthekilobytesofalgorithm
Answer: B
Programming Fundamentals

766. The Worst case occur in linear search algorithm when


A. Item is somewhere in the middle of the array
 B. Item is the last element in
the array
 C. Item is not in the array at all
 D.
Itemisthelastelementinthearrayorisnotthereatall

Answer: D
Programming Fundamentals

767. The complexity of merge sort algorithm is


A. O(n)
 B. O(logn) C. O(n2)
 D. O(nlogn)

Answer: D
Programming Fundamentals

768. Which of the following data structure is not linear data


structure
A. arrays
 B. linked list
 C. stack
 D. noneoftheanswers

Answer: D
Programming Fundamentals

769. Linked lists are best suited


A. for relatively permanent collections of data
 B. for the size of the structure
and the data in the structure are constantly changing C. for both of above
situation
 D. fornoneofabovesituation

Answer: B
Programming Fundamentals

770. The difference between linear array and a record is


A. An array is suitable for homogeneous data but the data items in a record
may have different data type 


B. In a record, there may not be a natural ordering in opposed to linear


array. 


C. A record form a hierarchical structure but a lienear array does not 


D. Allofabove 


Answer: D
Programming Fundamentals

771. Which data structure allows deleting data elements from


front and inserting at rear?
A. Stacks
 B. Queues
 C. Dequeues
 D. Binarysearchtree

Answer: B
Programming Fundamentals

772. Which of the following sorting algorithm is of divide-and-


conquer type?
A. Bubble sort
 B. Insertion sort
 C. Quick sort
 D. Alloftheanswers

Answer: C

Programming Fundamentals

773. In event-driven programming an event is generated by:


A. the system.
 B. a user’s action.
 C. the program itself. D. Alloftheanswers

Answer: D
Programming Fundamentals

774. An Exception is another name for a:


A. compile time error B. runtime error
 C. logic error
 D. syntaxerror

Answer: B
Programming Fundamentals

775. With every use of a memory allocation function, what


function should be used to release allocated memory which is
no longer needed?
A. unalloc() B. dealloc() C. release() D. free()

Answer: D
Programming Fundamentals

776. The automated tool used for lexical analysis phase (a)
LEX (b) FLEX (c ) BISON (d) YACC
A. (a) and (b) B. (b)and(c) C. (a) and (d) D. (c)and(d)

Answer: A
Programming Language Translators

777. For the given grammar S--> uBDz B--> Bv | w D-->EF E-->
y | E--> x | the FOLLOW(B) is
A. {v,x,y,z} B. {x,y,z} C. {x,y}
 D. {y,z}

Answer: A
Programming Language Translators

778. Type checking is done which phase of the compiler (a)


Lexical (b) syntax (c ) semantic (d) intermediate code
generation
A. (a) B. (b) C. (c) D. (d)

Answer: C
Programming Language Translators

779. Let a grammar G be S-->Aa | bAc | Bc | bBa For the viable


prefixes b and bd the grammar will have
A. reduce- reduce conflict B. Shift-reduce conflict
 C. both
 D. noconflicts

Answer: A
Programming Language Translators

780. The interdependencies between the synthesized


attribute and inherited attribute is given by (a) dependency
graph (b) directed acyclic graph (c ) syntax tree (d) postfix
notation
A. (a) B. (b) C. (c) D. (d)

Answer: A
Programming Language Translators

781. The use of control stack in an activation record is to keep


track of (a) static and dynamic link (b) information about the
identifiers (c ) live procedure activations (d) actual paramters
in the function
A. (a) and (b)
 B. (c)and(d) C. all the above D. (a)and(d)

Answer: C
Programming Language Translators

782. All the optimization techniques should be carried out


only after the code generation phase
A. TRUE 


B. FALSE 


C. D.
Answer: B
Programming Language Translators

783. The given grammar is S--> Aa | bAc | dc | bda A-->d


A. not LL(1)
 B. not SLR(1)
 C. LL(1) but not SLR(1)
 D. notLL(1)andnotSLR(1)

Answer: D
Programming Language Translators

784. After elimintating the common subexpression in a


syntax tree the resultant becomes
A. postfix notation
 B. dependency graph
 C. directed acyclic graph D.
threeaddresscode

Answer: C
Programming Language Translators

785. While desining the code generator which of the


following factors should be considered (a) memory
managment (b) input to the code generator (c ) instruction
selection (d) target program
A. (a) and (b)
 B. (b)and(c)
 C. all the above D. (a),(b)and(d)

Answer: C

Programming Language Translators

786. Scanning of the source program is done in which phase


of the compiler
A. Lexical
 B. semantic
 C. syntax
 D. codegeneration

Answer: A
Programming Language Translators

787. A parser which is a variant of top-down parsing without


backtracking is
A. recursive descent
 B. operator precedence C. LL(1)
 D. LALR(1)

Answer: A
Programming Language Translators

788. In syntax directed translation if the value of attribute


depends on the children node then the attribute is
A. synthesized 


B. inherited 


C. skewed 


D.

Answer: A
Programming Language Translators

789. The intermediate code can be represented by (a) 3AC (b)


syntax tree (c) DAG
A. (a) and (b)

B. (c) C. (a) D. (b)

Answer: A
Programming Language Translators

790. If the length of the string w is n, then the number of


prefixes and suffixes will be always be
A. n+1, n B. n,n
 C. n, n+1 D. n+1,n+1

Answer: D
Programming Language Translators

791. 1. Hardware/Software Codesign deals with


A. the cooperative design of hardware and software components
 B. the
unification of currently separate hardware and software paths C. the
movement of functionality between hardware and software D. alloftheabove

Answer: Choice D
Hardware/Software Codesign

792. 2. _______________ means meeting system-level


objectives by exploiting the synergism of hardware and
software through their concurrent design.
A. Hardware/software co-design B. Embedded system
 C. Computer
Architechture
 D. DegreeofProgrammability
Answer: Choice A
Hardware/Software Codesign

793. 3. Expand the term CFSM


A. Co-design Final State Machine B. Co-design Finite State Machine C. Co-
design Finite State Mapping D. Co-designFinalStateMapping

Answer: Choice B
Hardware/Software Codesign

794. 4.Drawback of solving Mixed Intergar Linear


Programming(MILP) to solve the partitioning problem is,
A. It requires high computation time
 B. it requires less computational speed
C. it requires less meomory space
 D. Noneoftheabove

Answer: Choice A
Hardware/Software Codesign

795. 5.Goal of Hardware/Software Codesign is


A. to shorten the time-to-market
 B. reducing the design effort
 C. reducing
the cost of the product D. alloftheabove

Answer: Choice D

Hardware/Software Codesign

796. 6.Hardware/Software Codesign includes


A. Partitioning
 B. Cosynthesis
 C. Cosimulation D. alloftheabove

Answer: Choice D
Hardware/Software Codesign

797. 7.The method for updating the main memory as soon as


a word is removed from the Cache is called
A. Write-through B. write-back
 C. protected write D. cache-write

Answer: Choice B
Hardware/Software Codesign

798. 8. Expand the term FPGA


A. Field Programmable Gate Alignment
 B. Flexible Programmable Gate
Arrays
 C. Flexible Programmable Gate Alignment D.
FieldProgrammableGateArrays

Answer: Choice D
Hardware/Software Codesign

799. 9.Stack overflow causes


A. Hardware interrupt. B. External interrupt. C. Internal interrupt.

D. Softwareinterrupt.

Answer: Choice C
Hardware/Software Codesign
800. 10.The ASCII code for letter A is
A. 1100011 B. 1000001 C. 1111111 D. 10011

Answer: Choice B
Hardware/Software Codesign

801. 11.Which of the following technology can give high


speed RAM?
A. TTL
 B. CMOS C. ECL D. NMOS

Answer: Choice C
Hardware/Software Codesign

802. 12.Pipeline implement


A. fetch instruction B. decode instruction C. calculate operand D.
Alloftheabove

Answer: Choice D

Hardware/Software Codesign

803. 13.COMET (COdesign METhodology) Hardware-


Software Codesign which uses________________ as the
software and hardware description of an embedded system
A. Java and VHDL B. C and VHDL
 C. Pascal and VHDL D. basicandVHDL

Answer: Choice B
Hardware/Software Codesign

804. 14. Hardware/Software Partitioning Using the


____________ System
A. COSMOS
 B. COSYMA
 C. LYCOS
 D. Alltheabove

Answer: Choice C
Hardware/Software Codesign

805. 15. the term ASIP stands for


A. Application Specific Instruction processors B. Architechture Specific
Instruction processors C. Application Specific Instruction programs
 D.
ArchitechtureSpecificInstructionprograms

Answer: Choice A
Hardware/Software Codesign

806. 1. Methodologies adopted while performing


Maintenance Testing are

A. Breadth Test and Depth Test

B. Retesting
 C. Confirmation Testing D. SanityTesting

Answer: Choice A
Software Practice and Testing

807. 2. Which of the following is true about Formal Review or


Inspection
A. Led by Trained Moderator
 B. No Pre Meeting Preparations
 C. Formal
Follow up process
 D. MainObjectiveistofinddefects

Answer: A, C and D
Software Practice and Testing

808. 3. Arrange the Phases of formal review process


mentioned below in the correct order
A. Review Meeting and Individual preparation B. Followup
 C. Rework
 D.
Planningandkickoff

Answer: D, A, C,B
Software Practice and Testing

809. 4. Consider the following state transition diagram of a


two-speed hair dryer,
A. C,B,A B. A,C,B C. B,C,A D. A,B,C

Answer: Choice D
Software Practice and Testing

810. which is operated by pressing its one button. The first


press of the button turns
A. B. C. D.

Answer:
Software Practice and Testing
811. it on to Speed 1, second press to Speed 2 and the third
press turns it off.
A. B. C. D.

Answer:
Software Practice and Testing

812.
A. B. C. D.

Answer:
Software Practice and Testing

813.
A. B. C. D.

Answer:
Software Practice and Testing

814.
A. B. C. D.

Answer:
Software Practice and Testing

815.
A. B. C. D.
Answer:
Software Practice and Testing

816.
A. B. C. D.

Answer:
Software Practice and Testing

817.
A. B. C. D.

Answer:
Software Practice and Testing

818.
A. B. C. D.

Answer:
Software Practice and Testing

819.
A. B. C. D.

Answer:
Software Practice and Testing
820.
A. B. C. D.

Answer:
Software Practice and Testing

821.
A. B. C. D.

Answer:
Software Practice and Testing

822. 5. White Box Techniques are also called as


A. Structural testing
 B. Design Based Testing
 C. Error Guessing Technique
D. ExperirncebasedTechnique

Answer: Choice A
Software Practice and Testing

823. 6. Exhaustive Testing is


A. Is impractical but possible
 B. Is practically possible
 C. Is impractical and
impossible D. NoneoftheAbove

Answer: Choice A
Software Practice and Testing

824. 7. Which of the following is not a part of the Test


Implementation and Execution Phase
A. Creating test suites from test cases
 B. Executing test cases either manually
or by using test executiontools C. Comparing actual results
 D.
DesigningtheTests

Answer: choice D
Software Practice and Testing

825.
A. B. C. D.

Answer:
Software Practice and Testing

826. 8. Which of the following techniques is NOT a White box


technique?
A. Statement Testing and Coverage B. Decision Testing and Coverage C.
Condition coverage
 D. Boundaryvalueanalysis

Answer: Choice D

Software Practice and Testing

827. 9. A Project risk includes which of the following


A. Organizational Factors
 B. Poor Software characteristics
 C. Error Prone
software delivered
 D. Softwarethatdoesnotperformitsintendedfunctions
Answer: Choice A
Software Practice and Testing

828. 10. In a risk-based approach the risks identified may be


used to
A. bisTrue;a,c,dareFalse
 B. a,b,c are true and d is false
 C.
bandcareTrue;a,dareFalse D. b,cdareTrue;aisfalse

Answer: Choice B
Software Practice and Testing

829. a. Determine the test technique to be employed


A. B. C. D.

Answer:
Software Practice and Testing

830. b. Determine the extent of testing to be carried out


A. B. C. D.

Answer:
Software Practice and Testing

831. c. Prioritize testing in an attempt to find critical defects


A. B. C. D.
Answer:
Software Practice and Testing

832. d. Determine the cost of the project


A. B. C. D.

Answer:
Software Practice and Testing

833. 11. A Person who documents all the issues, problems and
open points that were identified during a forfal review
A. Moderator B. Author
 C. Scriber
 D. Manager

Answer: Choice C

Software Practice and Testing

834. 12. Which of the following is a Key Characteristics of


Walk Through
A. Scenario , Dry Run , Peer Group B. Pre Meeting Preparations
 C. Formal
Follow Up Process
 D. IncludingMetrics

Answer: Choice A
Software Practice and Testing

835. 13. What can not be found through static analysis?


A. the use of a variable before it has been defined B. unreachable code
 C.
memory leaks
 D. arrayboundviolations
Answer: Choice C
Software Practice and Testing

836. 14. A Type of functional Testing, which investigates the


functions relating
A. Recovery Testing
 B. Security Testing
 C. Functionality Testing D.
PerformanceTesting

Answer: Choice B
Software Practice and Testing

837. to detection of threats, such as virus from malicious


outsider is
A. B. C.

D.

Answer:
Software Practice and Testing

838. 15. Which of the following is not a major task of Exit


criteria?
A. Checking test logs against the exit B. Logging the outcome of
 C. Assessing
if more tests
 D. Writingatestsummary

Answer: Choice B
Software Practice and Testing
839.
A. criteria specified in test planning B. test execution
 C. are needed
 D.
reportforstakeholders

Answer:
Software Practice and Testing

840. In OSI network architecture, the dialogue control and


token management are responsibility of
A. session layer B. network layer C. transport layer D. datalinklayer

Answer: session layer

Computer Networks

841. Which of the following communication modes support


two-way traffic but in only one direction at a time?
A. simplex
 B. half duplex
 C. three-quarters duplex D. fullduplex

Answer: half duplex


Computer Networks

842. Which of the following is an advantage to using fiber


optics data transmission?
A. resistance to data theft
 B. fast data transmission rate C. low noise
level
 D. allofabove
Answer: all of above
Computer Networks

843. This was the first network.


A. CSNET
 B. NSFNET C. ARPANET D. ANSNET

Answer: ARPANET
Computer Networks

844. ...................is the protocol suite for the current Internet.


A. TCP/IP B. NCP C. UNIX D. ACM

Answer: TCP/IP
Computer Networks

845. A _______ is a data communication system within a


building, plant, or campus, or between nearby buildings.
A. MAN
 B. LAN
 C. WAN
 D. noneoftheabove

Answer: LAN
Computer Networks

846. Which of the following is not a transmission medium?


A. telephone lines
 B. coaxial cables
 C. Modem
 D. microwavesystems

Answer: Modem
Computer Networks

847. Which of the following is required to communicate


between two computers?
A. communications software
 B. Protocol
 C. communication hardware
 D.
allofaboveincludingaccesstotransmissionmedium

Answer: all of above including access to


transmission medium
Computer Networks

848. Which organization has authority over interstate and


international commerce in the communications field?
A. ITU-T B. IEEE C. FCC D. ISOC

Answer: ITU-T
Computer Networks

849. ________ defines how a particular pattern to be


interpreted, and what action is to be taken based on that
interpretation.
A. Semantics
 B. Syntax
 C. Timing
 D. Noneoftheabove

Answer: Semantics
Computer Networks

850. Primary structure protein is related to


A. Assembly B. Folding
 C. Packing D. Interaction

Answer: Assembly

Bioinformatics

851. Binding sites are found in


A. Primary structure protein
 B. Secondary structure protein C. Tertiary
structure protein
 D. Quaternarystructureprotein

Answer: Secondary structure protein


Bioinformatics

852. Window filtering is done in


A. Dynamic programming B. Global alignment
 C. Dot Matrix
 D.
Localalignment

Answer: Dot Matrix


Bioinformatics

853. “Descent from a common ancestor” is a statement of


A. Analogy B. Similarity C. Alignment D. Homology

Answer: Homology
Bioinformatics

854. Edit distance is also called as


A. Grossberg’s distance B. Darwin’s distance
 C. Mendel’s distance
D. Leveinstein’sdistance

Answer: Leveinstein’s distance


Bioinformatics

855. CGC BEST FIT program is for


A. Local alignment
 B. Dot Matrix
 C. Global alignment
 D.
Dynamicprogramming

Answer: Local alignment


Bioinformatics

856. Which of the following Scoring matrices are widely used


in sequence alignments?
A. PAM260,BLOSSOM62 B. PAM250,BLOSSUM60 C. PAM252, BLOSSOM62
D. PAM250,BLOSSUM62

Answer: PAM250, BLOSSUM62


Bioinformatics

857. The expansion of BLAST is


A. BLossum Alignment Search Technique B. Basic Local Alignment Search
Technique C. BLossum Alignment Search Technique D.
BasesLoopalignmentSearchTechnique

Answer: Basic Local Alignment Search Technique


Bioinformatics

858. "Maximum good for the maximum people for the


maximum time" relates to
A. Principlism theory B. Deontology theory C. Utilitarianism theory D.
Virtueethics

Answer: Utilitarianism theory


Bioinformatics

859. Arden Syntax V2.7 is a standard produced by


A. HL7
 B. Telemedecine C. UMLS
 D. ICD-10

Answer: HL7
Bioinformatics

860. Lexical tool used for generating lexical variants in UMLS


is
A. NORM
 B. WORDIND C. LVG
 D. UMLS-LEX

Answer: LVG
Bioinformatics

861. which department of Telemedicine uses Otoscope

A. Opthalmology

B. Pathology C. ENT
 D. Deramtology


Answer: ENT
Bioinformatics

862. How many semantic types and semantic relationships


are available in semantic network of UMLS
A. 135, 54 B. 145, 45 C. 155, 55 D. 165,45

Answer: 135, 54
Bioinformatics

863. Write the one letter code of Tryptophan Amino acid


A. P B. T C. W D. Z

Answer: W
Bioinformatics

864. AMD 3000 Dispatch case is an equipment of


A. HL7
 B. UMLS
 C. NCBI
 D. Telemedicine

Answer: Telemedicine
Bioinformatics

865. Microcontrollers most often have parallel I/O as ----------


----and serial I/O as-----------feature.
A. Built in & Peripheral
 B. Synchronous & Asynchronous C. Peripheral & Built
in
 D. Synchronous&Builtin
Answer: A
EMBEDDED SYSTEMS

866. ALE/PROG pin is also the program pulse input during


A. Memory Read
 B. Memory Write
 C. Flash Programming D.
DeviceExecution

Answer: C
EMBEDDED SYSTEMS

867. Priority interrupts eliminates --------------------signal


A. INT0/INT1 B. Data/Ready C. Busy/Wait D. Read/Write

Answer: C
EMBEDDED SYSTEMS

868. A-------------is a technique for reordering instructions


across several loop iterations to reduce pipeline bubbles.

A. Operator Scheduling B. Dead Code Elimination C. Frame Pointer
 D.


SoftwarePipelining

Answer: D
EMBEDDED SYSTEMS

869. Which allows a program to be stitched together out of


several smaller pieces.
A. Entry Point B. Linker
 C. Parser
 D. LoopFusion
Answer: B
EMBEDDED SYSTEMS

870. In logic analyzer, a timing mode uses an -----------clock


that is fast enough to take ----------samples per clock period
in a typical system.
A. Internal,Several B. External,One
 C. Internal,One
 D. External,Several

Answer: A
EMBEDDED SYSTEMS

871. A--------------Communication allows the process to


continue execution after sending the communication.
A. Message Passing B. Blocking
 C. Non Blocking
 D. Alltheabove

Answer: C
EMBEDDED SYSTEMS

872. The ---------------------for a process is defined as the


instant during execution at which the task has the largest
response time.
A. Critical instant
 B. CPU utilization
 C. Unrolled Schedule
 D.
SchedulingOverhead

Answer: A
EMBEDDED SYSTEMS
873. A--------is a strategy for determining when to perform
certain power management operations.
A. Predictive shutdown
 B. Power management policy C. Scheduling
Policies
 D. Noneofthese

Answer: B
EMBEDDED SYSTEMS

874. In CAN terminology, a logical 1 on the bus is called--------


and a logical 0 is --------------
A. CSMA CA/CSMA CD
 B. Stack Pointer, Frame Pointer C.
Recessive,Dominant
 D. DataFrames,ControlFrames

Answer: C

EMBEDDED SYSTEMS

875. An----------is used as the basis for the network


management services provided by the Simple Network
Management Protocol(SNMP).
A. TCP B. HTTP C. SMTP D. UDP

Answer: D
EMBEDDED SYSTEMS

876. In I2C, a start is signaled by leaving the -----------and


sending a 1 to 0 transition on ---------------
A. SCL high and SDL
 B. SDL high and SCL
 C. Both SDL and SCL high D.
BothB&C

Answer: A
EMBEDDED SYSTEMS

877. A-----------Port allows A/D registers to be read and


written and a --- ------input tells when to start the next
conversion.
A. Control, Serial
 B. Data,Clock
 C. Address,Counter D. SFR,Timer

Answer: B
EMBEDDED SYSTEMS

878. The -------------bus supports CPUs, memories, and


peripherals integrated in a system-on-silicon.
A. AMBA
 B. Peripheral C. BothA&B D. USB

Answer: A
EMBEDDED SYSTEMS

879. 8051 has-----number of register banks with----bits and --


-bytes of general-puropose data memory.
A. 36, 8, 128 B. 4,8,128 C. 8,18,80 D. 4,8,80

Answer: D
EMBEDDED SYSTEMS
880. Main components of an embedded system are
A. Hardware
 B. Main application software C. RTOS
 D. AlltheAbove

Answer: D
EMBEDDED SYSTEMS

881. Types of embedded system are


A. Small scale embedded systems B. Medium scale embedded systems

C. Sophisticated embedded systems D. AlltheAbove

Answer: D
EMBEDDED SYSTEMS

882. DSP used in embedded systems are


A. TMS320Cxx B. SHARC
 C. 5600xx
 D. AlltheAbove

Answer: D
EMBEDDED SYSTEMS

883. Software’s used for the detailed designing of an


embedded systems are
A. Final machine implement able software for a product B. Assembly
language
 C. High level language
 D. AlltheAbove

Answer: D
EMBEDDED SYSTEMS
884. Examples for small scale embedded systems.
A. Washing or cooking system B. Router, a hub and a gateway C.
Entertainment systems
 D. Signaltrackingsystems

Answer: A

EMBEDDED SYSTEMS

885. Examples for medium scale embedded systems


A. Stepper motor controllers for a robotic syste B. Banking systems
 C.
Multitasking toys
 D. ACVM

Answer: B
EMBEDDED SYSTEMS

886. Examples for sophisticated embedded systems


A. Signal tracking systems B. Entertainment systems C. Security products
 D.
ACVM

Answer: C
EMBEDDED SYSTEMS

887. HDLC stands for


A. Higher Data Link
 B. Higher Data Link Control
 C. High Data Level
control
 D. HighLevelDataLinkControl

Answer: D
EMBEDDED SYSTEMS
888. CPCI stands for

A. Compact peripheral component Interfaces.

B. Central peripheral component Interfaces. C. Compact peripheral central


Interfaces.
 D. CompactphysicalcomponentInterfaces.

Answer: A
EMBEDDED SYSTEMS

889. Header files used in ‘C’ language in embedded system


A. stdio.h B. stdlib.h C. timer.h D. syslib.h

Answer: D
EMBEDDED SYSTEMS

890. Important terms of RTOS are


A. Scheduler
 B. Shared data C. Reentrancy D. AlltheAbove

Answer: D
EMBEDDED SYSTEMS

891. Interrupt service functions supported by Vx Works


A. intVectGet() B. intvect()
 C. intsetvect() D. interrupt()

Answer: A
EMBEDDED SYSTEMS

892. Task service functions supported by MUCOS


A. void OSEnter()
 B. void OSIntEnter(void) C. OSIntEnter(void)
 D.
voidOsin(void)

Answer: B
EMBEDDED SYSTEMS

893. Alternative systems in RTOS for responding a hardware


source call
A. Indirect call to ISR
 B. Interrupt source call
 C. Direct call to ISR by an
interrupt source D. Noalternatecall

Answer: C
EMBEDDED SYSTEMS

894. Two standards of USB


A. USB1.1&USB2.0 B. USB1.0&USB1.1 C. USB2.0&USB2.1 D. USB2.1&USB1.1

Answer: A
EMBEDDED SYSTEMS

895. A programming language is strongly typed if


_____________ .

A. type errors are always detected

B. it supports coercion
 C. it supports abstract data types D. None


Answer: A
The Object Oriented Paradigm

896. Binding a variable to a type in C language takes place at


___________________ time.
A. language implementation B. compile
 C. load
 D. languagedesign

Answer: B
The Object Oriented Paradigm

897. Deriving two or more new classes from a single base


classes is ____________ .
A. Single Inheritance
 B. Multiple Inheritance
 C. Hierarchical Inheritance D.
MultilevelInheritance

Answer: C
The Object Oriented Paradigm

898. Redefining a base class function in the subclass with the


same signature is _________ .
A. inheritance
 B. Overloading
 C. Dynamic binding D. Overriding

Answer: D
The Object Oriented Paradigm

899. OOP promotes a way of programming that allows


programmers to think in terms of _______ .
A. Data
 B. Procedures C. Objects
 D. Messages

Answer: C
The Object Oriented Paradigm

900. Mechanism of hiding the implementation details of an


object and there fore hides its complexity.
A. Message passing B. Deligation
 C. Polymorphism
 D. Encapsulation

Answer: D
The Object Oriented Paradigm

901. The lifetime of a variable is


____________________________.
A. the time during which it is bound to a particular memory cell B. the range of
statements over which it is visible
 C. the range of statements inside the block
where it is declared D. None

Answer: A

The Object Oriented Paradigm

902. Which of the following is not a correct variable type in


C++?
A. float B. real
 C. int
 D. double

Answer: B
The Object Oriented Paradigm

903. Identify the correct statement in C++.


A. Programmer can use comments to include short explanations within the
source code itself. 


B. All lines beginning with two slash signs are considered comments. 


C. Comments very important effect on the behaviour of the program 


D. Allthethree 


Answer: B
The Object Oriented Paradigm

904. The directives for the preprocessors in C++ begin with


A. mpersand symbol (&) B. Two Slashes (//)
 C. Hash Symbol (#)
 D.
Lessthansymbol(<)

Answer: C
The Object Oriented Paradigm

905. The file iostream in C++ includes


A. The declarations of the basic standard input-output library. B. The streams
of includes and outputs of program effect.

C. Both of these D. Noneofthese

Answer: A
The Object Oriented Paradigm
906. There is a unique function in C++ program by where all
C++ programs start their execution
A. Start( ) B. Begin( ) C. Main( ) D. Output()

Answer: C
The Object Oriented Paradigm

907. Identify which of the following is false.


A. cout represents the standard output stream in c++. B. cout is declared in the
iostream standard file
 C. cout is declared within the std namespace
 D.
Noneofabove

Answer: D
The Object Oriented Paradigm

908. Which of the following can not be used as identifiers?


A. Letters
 B. Underscores C. Digits
 D. Spaces

Answer: D

The Object Oriented Paradigm

909. How many times is a do while loop guaranteed to loop?


A. 0
 B. Infinitely C. 1
 D. Variable

Answer: C
The Object Oriented Paradigm
910. Finite automata recognizes --------grammars
A. type-1 B. type-2 C. type-3 D. type-0

Answer: type-3
Theory of Computation

911. A minimum state DFA accepting the language L={w/w


belongs {0,1}*} number of 0s and 1s in w are divisible by 3 and
5, respectively} has
A. 15 states B. 7 states C. 9 states D. 8states

Answer: 15 states
Theory of Computation

912. Which of the following statement is true?


A. NFA is more powerful than DFA B. DFA is more powerful than NFA C. NFA
and DFA have equal power D. Allthearetrue

Answer: NFA and DFA have equal power


Theory of Computation

913. If M1 machine recognizing L with n states, then M2


recognizing L* constructed Using Thompson construction
will have ------------- states.
A. n B. n+1 C. n+2 D. n-1

Answer: n+2
Theory of Computation

914. (a+b)(cd)*(a+b) denotes the following set


A. {a(cd)^nb|n>=1}
 B. {a(cd)^n>=1}U{b(cd)^n|n>=1}
 C.
{a(cd)^na|n>=0}U{a(cd)^nb|n>=0}U{b(cd)^na|n>=0}U{b(cd)^nb|n>=0} D.
{ac^nd^nb|n>=1}

Answer:
{a(cd)^na|n>=0}U{a(cd)^nb|n>=0}U{b(cd)^na|n>=0
}U{b(cd)^nb|n>=0}
Theory of Computation

915. Which one of the following regular expressions over {0,1}


denotes the set of all strings not containing 100 as a
substring?
A. 0*(11*0)* B. 0*1010* C. 0*(10+1)*

D. 0*1*01

Answer: 0*(10+1)*
Theory of Computation

916. The concept of grammar is much used in this part of the


compiler
A. lexical analysis
 B. parser
 C. code generation D. codeoptimization

Answer: parser
Theory of Computation
917. consider a language L for which there exists a Turing
machine T, that accepts every word in L and either rejects or
loops for every word that is not in L. The language L is
A. NP hard
 B. NP Complete
 C. recursive
 D. recursivelyenumerable

Answer: recursively enumerable


Theory of Computation

918. Which of the following conversion is not possible?


A. regular grammar to contextfree grammar B. NFSA to FSA
 C.
nondeterminstic PDA to deterministic PDA D.
nondeterminsticTMtodeterministicTM

Answer: nondeterminstic PDA to deterministic


PDA

Theory of Computation

919. which one of the following statement is FALSE?


A. context-free languages are closed under union
 B. context-free languages
are closed under concatenation C. context-free languages are closed under
intersection
 D. context-freelanguagesareclosedunderkleeneclosure

Answer: context-free languages are closed under


intersection
Theory of Computation
920. Recursively enumerable languages are not closed under
A. union
 B. homomorphism C. complementation D. concatenation

Answer: complementation
Theory of Computation

921. Consider S->SS|a what is the number of different


derivation trees for aaaaa
A. 3 B. 5 C. 7 D. 14

Answer: 14
Theory of Computation

922. consider the regular language L=(111+11111)* The


minimum number of syayes in any DFA accepting the
language is

A. 3 B. 5 C. 9 D. 8

Answer: 9
Theory of Computation

923. Which of the following instances of the post


correspondence problem has a viable sequence(a solution)?
A. {(b,bb),(bb,bab),(bab,abb),(abb,babb)} B. {(ab,aba),(baa,aa),(aba,baa)}
 C.
{(ab,abb),(ba,aaa),(aa,a)
 D. Alltheoptionsarewrong

Answer: {(ab,abb),(ba,aaa),(aa,a)
Theory of Computation

924. It is undecidable, whether


A. an arbitary TM has 15 states
 B. an arbitary TM halts after 10 steps
 C. an
arbitary TM ever prints a specific letter D.
anarbitaryTMacceptsastringwin5steps

Answer: an arbitary TM ever prints a specific letter


Theory of Computation

925. 1. The diameter for connectivity in completely


connected network is
A. 1


B. p-1 


C. logp 


D.

Answer: A
Parallel Algorithms

926. 2. Which of the following parallelism technique need


equal memory cycles
A. Temporal 


B. Spatial 


C. None 

D.

Answer: A
Parallel Algorithms

927. 3. X=A+B; D=X*T . Identify the type of Dependency


A. Reductions 


B. Output Dependency 


C. Anti Dependency 


D.

Answer: C
Parallel Algorithms

928. 4. Calculate the cost of communication for number of


processors =4; parallel processing time=10 ns
A. 45.5 


B. 40 


C. 40.09 


D.

Answer: B
Parallel Algorithms

929. 5. Distributed Memory Systems are


A. Dynamic Network 


B. Static Network 


C. Hypercube 


D.

Answer: A
Parallel Algorithms

930. 6. ------------------------ have excellent performance


scalability
A. Hypercube 


B. Bus 


C. Crossbar 


D.

Answer: C
Parallel Algorithms

931. 7.In PRAM, every Processor has ------------------ time


access to every memory location
A. Ø(1) 


B. Ø(n) 


C. Ø(log n) 


D.
Answer: A
Parallel Algorithms

932. 8.which of the following is a shared address space based.


----------- --------------------
A. UMA B. NUMA

C. both A&B D.

Answer: A
Parallel Algorithms

933. 9. In PRAM, Multiple processors write simultaneously to


a memory location using
A. Common CW Arbitrary CW B.
 C. Combining CW
 D.

Answer: A
Parallel Algorithms

934. 10.Pointer Jumping given 10 elements determine the


running time -- ---------------------
A. 3


B. 4


C. 1


D.
Answer: A
Parallel Algorithms

935. 11. In Hypersort, Each processor sorts it’s N items


independently using
A. Ø(NlogN) 


B. Ø(dN) 


C. Ø(d(N+1)) 


D.

Answer: A
Parallel Algorithms

936. 12. The no of processors required in parallel matrix


multiplication for I x J ,J x K matrices are,
A. IxJ 


B. KxJ


C. IxK 


D.

Answer: C
Parallel Algorithms

937. 13 Given 25% of parallel algorithm is performed


sequentially calculate maximum speedup
A. 0.25 


B. 4


C. 6


D.

Answer: B
Parallel Algorithms

938. 14 The potential problem in Divide and Conquer


Algorithms is
A. Communication 


B. Network Topology 


C. Load Sharing 


D.

Answer: C
Parallel Algorithms

939. 15 InOpenMP,write the construct for getting no. of


processors
A. omp_get_num_threads() 


B. omp_get_maxthreads() 

C. omp_get_threadid() 


D.

Answer: A
Parallel Algorithms

940. Reliability means


A. Ease with which software can be adapted for use in different contexts B.
Prevention of unauthorized access
 C. The ability of the software to integrate
with existing systems.
 D. Noneoftheabove

Answer: D
Software Engineerring

941. What are all the possible risks could be occur in software
development.
A. People ,Product, Technical B. Product, Process, Technical C. Process,
Design, Technical D. Noneoftheabove

Answer: A
Software Engineerring

942. RUP model is explains


A. OOAD with UML B. UML with OOAD C. UML only

D. noneoftheabove

Answer: A
Software Engineerring

943. ______________ Phase answers the question: How to


meet the user needs?
A. Design
 B. Analysis
 C. Coding
 D. Noneoftheabove

Answer: A
Software Engineerring

944. Requirements are stable but not clear, this situation


which process model will be most suitable one?
A. Water Fall Model B. Prototype Model C. Spiral Model
 D. Noneoftheabove

Answer: D
Software Engineerring

945. __________ means to check if the task has been


executed correctly.
A. Testing
 B. Verification C. Unit Testing D. Validation

Answer: B

Software Engineerring

946. Quality is defined


A. Fitness for purpose
 B. Zero defects
 C. Customer Satisfaction D.
Alltheabove
Answer: D
Software Engineerring

947. ____________ associated with every instance of the first


entity there will be at least one instance of the second entity
A. cardinality B. attribute C. mandatory D. optionally

Answer: C
Software Engineerring

948. Identify the relationship for the given statement


,Teacher can guide any number of students but at least she
/he should guide one student.
A. many to many ,optionally B. one to many , mandatory C. one to one
,mandatory D. manytoone,optionally

Answer: B
Software Engineerring

949. The output of the requirements engineering phase is


______________
A. Software Requirement Specification B. Software Design Specification
 C.
Detailed Design Specification
 D. Noneoftheabove.

Answer: A
Software Engineerring
950. _____________ is composed of data structures and /or
data elements.
A. Data flow
 B. Data element C. Data structure D. DataDictionary

Answer: A
Software Engineerring

951. _____________ is composed of data elements or other


data structures.
A. Data flow
 B. Data element C. Data structure D. DataDictionary

Answer: C
Software Engineerring

952. Match the following DFD - a)To model state changes of


the system , ERD - b) Process and their interaction ,STD – c)
To model complex decision ,DT&DT – d) data and their
relationship

A. a ,d,b,c

B. d,b,a,c C. b,d,a,c D. b,d,c,a

Answer: C
Software Engineerring

953. _____________ helps to ensure completeness of the


design
A. DFD
 B. ERD
 C. Data Dictionary D. Alloftheabove.

Answer: B
Software Engineerring

954. Who is not a stake holder of ATM Banking System.


A. Administrator B. customer
 C. Bank Client D. developer

Answer: D
Software Engineerring

955. Virtual memory is


A. a portion of RAM
 B. a portion of HDD used as RAM C. non existing
memory
 D. Volatilememory

Answer: b

Operating Systems

956. The initial program that runs on a system is


A. loader program
 B. bootstrap program C. system program D. noneofthese

Answer: b
Operating Systems

957. Monitor call will be initiated by


A. software B. hardware C. frimware D. cpu
Answer: a
Operating Systems

958. SCSI is a standard for


A. communication B. data transfer C. storage
 D. execution

Answer: b
Operating Systems

959. Direct Memory Access is a way of

A. bypassing storage

B. using RAM
 C. bypassing CPU
 D. usinghighspeedbus

Answer: c
Operating Systems

960. Before the jobs are brought to the RAM, they are stored
in
A. cache
 B. RAM pool
 C. secondary disk D. jobpoolindisk

Answer: d
Operating Systems

961. A software generated interrupt caused by error is called


A. interrupt error B. processing error C. trap
 D. OSerror
Answer: c
Operating Systems

962. The lowest level of abstraction of hardware to be


controlled by applications is provided by
A. system calls B. kernal
 C. API
 D. noneofthese

Answer: b
Operating Systems

963. Memory mapped file is a method of


A. file management
 B. memory management C. IPC
 D. API

Answer: c
Operating Systems

964. the OS that runs on processor with rigid time


requirements is
A. open source B. realtime
 C. online
 D. client/server

Answer: b
Operating Systems

965. An user interface where the input given as commands


A. CLI
 B. GUI
 C. UI
 D. batchinterface
Answer: a
Operating Systems

966. The topmost layer of a layered OS is

A. UI

B. hardware C. software D. kernel

Answer: a
Operating Systems

967. A memory that is dynamically assigned for the process is


called
A. Stack
 B. static
 C. heap
 D. dynamic

Answer: c
Operating Systems

968. The information associated with the process is


contained in
A. task control bloack B. process block
 C. data block
 D. programcounter

Answer: a
Operating Systems

969. Which scheduler is called a long term scheduler


A. cpu
 B. memory C. I/O
 D. Job
Answer: d

Operating Systems

970. Context switching is done by


A. memory B. I/O
 C. CPU
 D. data

Answer: c
Operating Systems

971. Which of the following statement is true regarding


equivalent grammars?
A. both of them must have same production rules and same alphabet
(terminal symbols B. they may have different set of production rules but same
alphabet (terminal symbols) C. both of them must have same production rules
but different alphabet
 D.
theymayhavedifferentsetofproductionrulesanddifferentalphabet

Answer: B
Algorithm Design and Analysis

972. Which one falls under a Primitive Regular Expression ?


A. +
 B. union
 C. bracket D. aterminal

Answer: D
Algorithm Design and Analysis
973. In a partial derivation tree, every leaf has a label from
A. the set of terminals and lambda
 B. the set of nonterminals, terminals and
lambda C. the set of nonterminals and lambda
 D. noneoftheabove

Answer: B
Algorithm Design and Analysis

974. Let Σ = {a, b, c, d, e}. The number of strings in Σ* of


length 4 such that no symbol is used more than once in a
string is
A. 360 B. 120 C. 35 D. 36

Answer: B
Algorithm Design and Analysis

975. Which of these is a true statement?


A. Dynamic programming approach can be applied to any problem
 B.
Optimal solutions provided by backtracking and dynamic progr. can be
different
 C. All sub problems in a dynamic programming approach will be
used more than once D.
Dynamicprogrammingdoesmorecomputationsthandivideandconquer

Answer: B
Algorithm Design and Analysis

976. In matrix chain problem by dynamic programming


approach, the value of k, which signifies the order of the
parentheses,
A. has the range from 1 to n-1 B. hastherangefrom2ton C.
hsstherangefrom1ton D. hastherangefrom1ton/2

Answer: A
Algorithm Design and Analysis

977. While generating the sequence for a binary counter of


length k bits, the maximum actual cost possible (including
reset and set) after a single call to increment function, is
A. k-2 B. k-1 C. k D. k+1

Answer: C
Algorithm Design and Analysis

978. Which of these algorithms is poly time?


A. Reducibility Function / Algorithm used in NPC
 B. General Longest
Common Subsequence problem C. 3-CNF Problem
 D. noneoftheabove

Answer: A
Algorithm Design and Analysis

979. A malicious person has intercepted a cipher in the


network and wants to crack it thinking that it was encrypted
by mono alphabetic cipher. How many combinations he/she
must use?
A. 26!
 B. 26
 C. 48 bit key D. kmod26
Answer: A
Algorithm Design and Analysis

980. If a problem can be solved by both dynamic


programming and backtracking, which of these statements is
true?
A. backtracking method always finishes equal or later than dynamic
programming B. backtracking method always finishes equal or faster than
dynamic programming C. backtracking method and dynamic programming
always takes equal time
 D. can’tsay

Answer: A
Algorithm Design and Analysis

981. If we put the amortized cost of set to be 0 and reset to


be 2, how many times do we violate the positive credit rule of
accounting method for the binary counter of 3 bits?
A. 0 B. 1 C. 6 D. 7

Answer: D
Algorithm Design and Analysis

982. In matrix chain problem by dynamic programming


approach, in order to fill up the entry in the (i,j) location of the
cost matrix, the number of possible k values to be considered
are ,
A. j
 B. j-i+2 C. j-i+1 D. j-i
Answer: D

Algorithm Design and Analysis

983. Let us say that for a given problem all four types of
randomized algorithm can be applied. Which one is the most
reliable?
A. Numerical algorithm B. Monte-Carlo algorithm C. Las Vegas algorithm D.
Sherwoodalgorithm

Answer: D
Algorithm Design and Analysis

984. If two line segments, P1P2, P3P4 are there, and only
endpoint P3 is on the line segment P1P2, then which is true ?
A. cross product of P1P3 and P1P4 will give opposite signs B. cross product of
P1P3 and P1P4 will give different signs C. the boundary box for each line
segment may not overlap D. noneoftheabove

Answer: B
Algorithm Design and Analysis

985. In order to generate p processors, from the first active


processor, in PRAM model, the number of activation steps
required are
A. p-1
 B. floor(log p) C. ceiling (log p) D. p/2

Answer: C
Algorithm Design and Analysis

986. <script type="text/javascript" language="javascript">


var qpt = "Qualiyt Point Technologies"; var result = qpt.split("
"); document.write(result); </script>

A. Quality
 B. Q,u,a,l,i,t,y,P,o,i,n,t,T,e,c,h,n,o,l,o,g,i,e,s C.
Qualiyt,Point,Technologies
 D. QualityPointTechnologies

Answer: c
Scripting Languages

987. <script type="text/javascript"> x=4+"4";


document.write(x); </script>
A. 44
 B. 8
 C. 4
 D. ErrorOutput

Answer: a
Scripting Languages

988. Which of the following is true?


A. If onKeyDown returns false, the key-press event is cancelled. B. If
onKeyPress returns false, the key-down event is cancelled. C. If onKeyDown
returns false, the key-up event is cancelled.
 D.
IfonKeyPressreturnsfalse,thekey-upeventiscanceled.

Answer: a
Scripting Languages

989. Which best explains getSelection()?


A. Returns the VALUE of a selected OPTION
 B. Returns document.URL of
the window in focus. C. Returns the value of cursor-selected text
 D.
ReturnstheVALUEofacheckedradioinput.

Answer: c
Scripting Languages

990. <script language="javascript"> function x() { var s=


"Good 100%"; var pattern = /\D/g; var output=
s.match(pattern); document.write(output); } </script>
A. Good % B. 1,0,0
 C. G,o,o,d,% D. Error

Answer: c
Scripting Languages

991. Scripting language are


A. High Level Programming language
 B. Assembly Level programming
language C. Machine level programming language D. Noneoftheabove

Answer: a
Scripting Languages

992. <script language="javascript"> var qpt="QUALITY


POINT TECHNOLOGIES"; alert(qpt.charAt(qpt.length-1));
</script>
A. P
 B. E
 C. S
 D. Error

Answer: c
Scripting Languages

993. Choose the client-side JavaScript object:


A. Database B. Cursor
 C. Client
 D. FileUpLoad

Answer: d
Scripting Languages

994. <script language="javascript"> function x(z,t) {


alert(x.length); } </script> output: ?
A. Error B. 2
 C. 1
 D. 3

Answer: b
Scripting Languages

995. What is mean by "this" keyword in javascript?


A. It refers current object
 B. It referes previous object
 C. It is variable which
contains value D. Noneoftheabove

Answer: a
Scripting Languages

996. Math. round(-20.51)=?


A. 20 B. -21 C. 19

D. None
Answer: b
Scripting Languages

997. <script language="javascript"> function x() { var s =


"Quality 100%! {[!!"; var pattern = /\w/g; var output =
s.match(pattern); document.write(output); } </script>
A. %,!,{,[,!,!
 B. Q,u,a,l,i,t,y,1,0,0 C. Quality 100
 D. Error

Answer: b
Scripting Languages

998. <script language="javascript"> function x() {


document.write(2+5+"8"); } </script>
A. 258 B. Error C. 7
 D. 78

Answer: d
Scripting Languages

999. In Javascript, Which of the following method is used to


evaluate the regular expression?
A. eval(2*(3+5))
 B. evaluate(2*(3+5)) C. evalu(2*(3+5))
 D. Noneoftheabove

Answer: a
Scripting Languages

1000. <script type="text/javascript" language="javascript">


qpt= ((45%2)==0)? "hello" : "bye"; document.write(qpt);
</script>
A. hello
 B. bye
 C. Error in string handling D. Noneoftheabove

Answer: b
Scripting Languages

1001. How does soft computing differ from Hard Computing


A. imprecision B. uncertanity C. crisp
 D. Partialtruth

Answer: A,B,D
Soft Computing

1002. which of the ANN architecture achievies stability and


plasticity
A. Perceptron B. ART
 C. reccurent
 D. maxicanHat

Answer: ART
Soft Computing

1003. which of the following learning rule comes under


Supervised learning
A. Hebb
 B. Competative net C. Perceptron
 D. alltheabove

Answer: Perceptron
Soft Computing

1004. what is threshold value


A. it amplifies the signal B. weight adjustment C. inhibit/excibit
 D.
fireornotfire

Answer: fire/not fire


Soft Computing

1005. which of the following problem are linear seperable


A. AND
 B. OR
 C. ANDNOT D. XOR

Answer: A,B,C
Soft Computing

1006. Associative memory


A. Content addressable B. address addressable C. pattern addressable

D. alltheabove

Answer: A
Soft Computing

1007. hamming distance


A. distance between two neuron
 B. difference between the two input C.
number of mismatch components D. measuretoanalysisthestability

Answer: C
Soft Computing

1008. which of the following are Unsupervised learning


network
A. ART
 B. LVQ
 C. SOM
 D. noneofthese

Answer: all the above (choice E)


Soft Computing

1009. Union between two Fuzzy set can be found by


A. min
 B. max
 C. min-max D. max-min

Answer: B

Soft Computing

1010. Fuzzy Relation can be obtained by


A. min
 B. max
 C. min-max D. max-min

Answer: D
Soft Computing

1011. which of the following relation satisfies tolerance


A. ponints on a map is connected by a road to
 B. people is brother of
 C.
positive integer, for some k equals to 10k times D. peoplehassameparents

Answer: A
Soft Computing

1012. Can a tolerance relation be converted to equivalance


relation
A. No 


B. Yes 


C. D.

Answer: B
Soft Computing

1013. What is sub normal Fuzzy Set? Fuzzy set having


membership value between-------------------
A. >=0and<=1 B. >0and<=1 C. >0and<1

D. >=0and<1

Answer: D
Soft Computing

1014. which one of the following is fuzzification method


A. intution
 B. Genetic Algorithm C. inductive reasoning D. noneofthese

Answer: all the above (choice E)


Soft Computing

1015. In a lamda-cuts of Fuzzy sets if the lamda value is


reduced, the number of elements in the fuzzy set
A. decreases
 B. cannot predicit
 C. increases
 D. variesaccordingtosuituation
Answer: C
Soft Computing

1016. the primary work of Fuzzy Inference System is


A. optimization
 B. parallel processing C. decision making D. patternmatching

Answer: C

Soft Computing

1017. Software configuration management involves


identifying the configuration of the software:
A. prior to the beginning of the lifecycle.
 B. at the beginning of the lifecycle
only.
 C. at predefined points of time during the lifecycle. D.
attheendofthelifecycleonly.

Answer: c
Software Engineering

1018. An engineer is developing a web presentation layer for


a mission critical project. The technology chosen for the
presentation layer is making it difficult to implement the user
interface design. The engineer reads about a new technology
for creating the type of web interface the project needs. It is
decided that a rapid prototype will be created to perform an
initial evaluation of the new technology. Which of the
following criteria is the LEAST important when doing the
prototype?
A. Exercising the entire breadth of functionality B. Simulating the operational
environment
 C. Exercising critical functionality
 D.
Steppingthroughsourcewithadebugger

Answer: d
Software Engineering

1019. A technical lead is working on an iterative lifecycle


project that is creating a well understood application using a
technology the team has experience with. The project has 10
major use cases to implement; two have just been delivered
on schedule in the first iteration. At the request of the project
manager, who is concerned about the amount of effort being
spent fixing defects, the lead has collected some data on
quality performance during the first iteration. The data shows
that planned reviews of requirements and design are not
occurring. It shows that 22 defects are being detected during
unit and system testing per 100 SLOC. The lead is asked to
predict the defect trend for the project going forward. They
calculate that with no changes in process the defect rate:

A. will likely drop later in the project as kinks are worked out. B. will remain the
same.
 C. will likely increase as the project progresses .
 D.
cannotbepredictedatthispoint.

Answer: c
Software Engineering
1020. During a software development project two similar
requirements defects were detected. One was detected in
the requirements phase, and the other during the
implementation phase. Which of the following statements is
mostly likely to be true?
A. The most expensive defect to correct is the one detected during the
requirements phase. 


B. The most expensive defect to correct is the one detected during the
implementation 
 phase. 


C. The cost of fixing either defect will usually be similar. 


D. Thereisnorelationshipbetweenthephaseinwhichadefectisdiscoveredandi
tsrepair 
 cost. . 


Answer: b
Software Engineering

1021. An engineer is tasked to verify a software release for a


mission critical system. The plan is for the release of software
for verification to occur on a Monday, with verification
complete the following Friday. The release turns out not to
be available until Thursday. The best route for the engineer is
to:
A. verify release criteria regardless of time line. B. do whatever testing they
can by Friday.
 C. volunteer to work the weekend.
 D. relaxreleasecriteria.

Answer: a
Software Engineering
1022. Which of the following do NOT affect the accuracy of
the reliability estimate during statistical testing? I. The
validity of the usage profile. II. The number of test cases
executed. III. The programming language used to implement
the code. IV. The cyclomatic complexity of the code.
A. I and II only. B. II and III only. C. III and IV only. D. IandIIIonly.

Answer: c
Software Engineering

1023. A new engineer has been assigned to a project team.


The current project is 1 month into construction, and another
6 months of construction are expected. The engineer
discovers that the only design document is an overview of the
logical architecture. There are over 70 source code files, most
over 600 lines long, residing in a single folder. It is very
difficult to follow the module design of the system, but there
appears to be functionality redundantly coded among the
files shared between files. The best steps for improvement
would be to: I. Combine files together to reduce the number
of files II. Rework files to group functionality together III. Use
folders to group related files together IV. Change
programming languages
A. IandII B. IandIII C. II and III D. IIandIV

Answer: c
Software Engineering

1024. In Structured Design, why are afferent and efferent


flows identified when performing Transform Analysis?
A. The flows represent data internal to the system.
 B. The flows are limited
by the physical constraints of the devices.
 C. The system design should be
independent of the format of the data. D.
Thesystemperformancedependsmainlyonthetimeoftheflows.

Answer: c
Software Engineering

1025. Paul has drafted a software project management plan.


Which of the following items should be discussed in this plan?
I. Schedule II. Budget III. Requirements IV. Staffing
A. I, III, IV only B. I, II, III only C. I, II, IV only D. I,II,III,IV

Answer: c
Software Engineering

1026. Quality assurance may be applied to: I. Requirements


II. Design III. Code IV. Testing
A. IandIIonly
 B. I, II, and III only C. I, II, III, and IV D. IV only

Answer: c
Software Engineering

1027. Equivalence partitioning is:


A. a modular programming technique where the application domain is sub-
divided into similarly sized functional areas 


B. a black box testing technique that divides the input domain of a


program into classes of data from which test cases can be derived 


C. an object oriented design technique for improving program structure by


replacing inheritance with delegation 


D. asoftwareprojectmanagementtechniquefordistributingtestresponsibilit
ywithina project 


Answer: b
Software Engineering

1028. You are a requirements engineer working on a project


to develop a new racing game. Your organization has
experience in developing educational games, but this genre is
new. In order to gain market share in the gaming market your
organization needs to deliver a next generation product.
Several features are planned, which require hardware that is
itself under development. You have access to the hardware,
which introduces some risk. Thankfully, the development
schedule is much longer than that of typical game
development projects. In order to maximize user satisfaction,
your organization can pay local high school students to play
the game while it is in development. The company is re-
examining the lifecycle development model to be used for
this product. Which of the following life cycle models will
enable you to leverage user feedback during the
development of the game I. Waterfall II. Spiral III.
Evolutionary IV. Code- and-Fix
A. III and IV B. II and III C. IandIV D. IIandIV

Answer: b
Software Engineering

1029. UML notations that can be used to model the hardware


and software elements of a system are
A. Activity diagrams, class diagrams and Deployment diagrams
 B. Activity
diagrams, class diagrams and Use-Case diagrams
 C. Sequence diagrams,
class diagrams and Deployment diagrams
 D.
Colloborationdiagrams,classdiagramsandDeploymentdiagrams

Answer: a

Software Engineering

1030. The state diagram


A. depicts relationships between data objects
 B. depicts functions that
transform the data flow
 C. indicates how data are transformed by the system
D. indicatessystemreactionstoexternalevents

Answer: d
Software Engineering

1031. The testing technique that requires devising test cases


to exercise the internal logic of a software module is called
A. behavioral testing B. black-box testing C. grey-box testing D. white-
boxtesting

Answer: d
Software Engineering

1032. The entity integrity rule states that


A. no primary key attribute may be null
 B. no primary key can be
composite
 C. no primary key may be unique
 D.
noprimarykeymaybeequaltoavalueinaforeignkey

Answer: A
Database Design

1033. When mapping a many-to-many unary relationship into


a relation which of the following is true
A. One relation is created
 B. Two relations are created.

C. Three relations are created. D. Fourrelationsarecreated.

Answer: B
Database Design

1034. If no multivalued attributes exist and no partial


dependencies exist in a relation, then the relation is in what
normal form?
A. First normal form
 B. Second normal form C. Third normal form D.
Fourthnormalform
Answer: B
Database Design

1035. A foreign key is which of the following?


A. Any attribute
 B. The same thing as a primary key
 C. An attribute that
serves as the primary key of another relation D.
Anattributethatservesnopurpose

Answer: C
Database Design

1036. A transitive dependency is which of the following?


A. A functional dependency between two or more key attributes.
 B. A
functional dependency between two or more nonkey attributes. C. A relation
that is in first normal form.
 D. Arelationthatisinsecondnormalform.

Answer: B

Database Design

1037. When mapping a multivalued attribute into a relation


which of the following is true?
A. One relation is created. B. Two relation is created. C. three relation is
created. D. Fourrelationiscreated.

Answer: B
Database Design
1038. If no multivalued attributes exist in a relation, then the
relation is in what normal form?
A. First normal form
 B. Second normal form C. Third normal form D.
Fourthnormalform

Answer: A
Database Design

1039. A primary key is which of the following?


A. Any attribute
 B. An attribute that uniquely identifies each row
 C. An
attribute that uniquely identifies each column D. Aderivedattribute

Answer: B
Database Design

1040. The relational model consists of:


A. data in the form of tables.
 B. data redundancy.
 C. operations using non-
SQL languages. D. unorganizeddata.

Answer: A
Database Design

1041. When mapping a binary many-to-many relationship


into a relation which of the following is true?
A. One relation is created. B. Two relation is created. C. Three relation is
created. D. Fourrelationiscreated.
Answer: C
Database Design

1042. A relation has which of the following properties?


A. Each row is not unique.
 B. Attributes can have the same name within a
given table. C. Each relation has a unique name.
 D.
Theorderofthecolumnsissignificant.

Answer: C
Database Design

1043. When mapping a ternary relationship with an


associative entity into a relation which of the following is
true?
A. One relation is created. B. Two relation is created. C. Three relation is
created. D. Fourrelationiscreated.

Answer: D
Database Design

1044. When mapping a regular entity into a relation which of


the following is true?
A. One relation is created. B. Two relation is created. C. Three relation is
created. D. Fourrelationiscreated.

Answer: A
Database Design

1045. When mapping a supertype/subtype relationship which


of the following is true?
A. The supertype primary key is assigned to each subtype.
 B. The subtype
primary key is assigned to each supertype.
 C. There is no link between the
supertype/subtype entities.
 D.
Thereisnoprimarykey/foreignkeyrelationshipbetweenasupertype/subtype.

Answer: A
Database Design

1046. Relations are


A. two-dimensional tables. B. three-dimensional tables. C. four-dimensional
tables. D. five-dimensionaltables.

Answer: A

Database Design

1047. In homogeneous distributed database


A. Difference in software is a major problem for transaction processing 


B. Difference in schema is a major problem for query processing 


C. Sites may not be aware of each other and may provide only limited
facilities for 
 cooperation in transaction processing 


D. Allsiteshaveidenticalsoftware 


Answer: D
DataBase Design

1048. If you use a user-defined routine as part of the


fragmentation expression, that information is recorded in
A. sysfragexprudrdep. B. sysprocauth
 C. sysprocbody
 D. sysprocedures

Answer: A
DataBase Design

1049. Specify which of the following is not a Predefined


constraints
A. Unique Key
 B. Null Attribute
 C. Foreign key
 D. Functionaldependency

Answer: B
DataBase Design

1050. The following is not an objective of distributed query


processing

A. translate a high-level language query on a single logically distributed


database (as seen by

the users) into low-level language queries on physically distributed local


databases.

B. reduce the response time of a distributed query 


C. select an efficient execution strategy for the execution of a distributed


query that 
 minimizes the consumption of computing resources. 


D. Maximizethetotalcostoftimerequiredtoexecuteaquery. 

Answer: D
DataBase Design

1051. In the above table ‘Book’,Write the relational operation


to Select from the relation “Book” all the books whose year
of publication is 1992.
A. σ Yr-pub=1992(Book) B. σ Yr-pub=Book(1992) C. Π Yr-pub, 1992(Book) D.
ΠYr-pub,Book(1992)

Answer: A
DataBase Design

1052. R-S represents


A. R-S=S-R
 B. SetofelementsinSbutnotinR C. SetofelementsinRbutnotinS D.
R=S

Answer: C
DataBase Design

1053. Out of the 2 queries X and Y,which query follows SQL


optimization technique X. SELECT name FROM employee
WHERE (salary, age ) = (SELECT MAX (salary), MAX (age)
FROM employee_details) AND dept = 'Electronics'; Y.
SELECT name FROM employee WHERE salary = (SELECT
MAX(salary) FROM employee_details) AND age = (SELECT
MAX(age) FROM employee_details) AND emp_dept =
'Electronics';
A. X
 B. Y
 C. XandY D. None

Answer: A
DataBase Design

1054. Which of the following is the condition for Direct join


ordering of two relation/fragments located at different sites
A. Move the smaller relation to the other site 


B. We have to estimate the size of R and S 


C. Direct join ordering of queries involving more than two relations is


substantially more 
 Complex 


D. alltheabove 


Answer: D
DataBase Design

1055. Which of the following are query optimization


algorithms
A. INGRES
 B. System R
 C. Hill Climbing D. Alltheabove

Answer: D
DataBase Design

1056. When a transaction sequence is initiated it must


continue through all succeeding SQL statements until:
A. The Program is Abnormally Terminated (Rollback) B. A Rollback Statement
is not Reached
 C. The End of the Program is not Reached (Commit) D.
ENDStatementisreached

Answer: A
DataBase Design

1057. Transaction log


A. Keeps track of all transactions that update the database
 B. Does not keep
track of Names of objects/tables affected by the transaction C. Not Used for
recovery in case of a Rollback
 D. alltheabove

Answer: A
DataBase Design

1058. Serial Execution of transaction means that


A. There is Concurrency Control Problems
 B. the transactions are performed
one after another.
 C. Serial Execution will leave the database in an
inconsistent state D. Thereisinteractionbetweentransactions

Answer: B
DataBase Design

1059. Site(System) Failures in distributed DBMS


A. Partial Failure indicates the failure of all sites.
 B. Incorrect input data
 C.
Always assumed to result in the loss of main memory contents.
 D.
Referstothefailuresofthesecondarystoragedevicesthatstorethedatabase.

Answer: C
DataBase Design
1060. Place Update Recovery Information is
A. Necessary to store info about database state changes, inorder to
recover back. 


B. Every time an update is made, the old stable storage page, called
shadow page is left 
 intact and a new page with the updated data item
values is written into the stable 
 database. 


C. Makes sense to permit the operation of the partition that contains the
primary site, since it 
 manages the lock. 


D. Incaseofnonreplicateddatabases,thisinvolvestheintegrationofthevoting
principle 
 with commit protocols. 


Answer: A
DataBase Design

1061. Path partitioning means


A. Can be represented as a hierarchy of nodes forming a structural index. 


B. Index does not contains the references to all the component objects of a
composite 
 object 


C. to improve the performance of user queries and applications by reducing


the irrelevant 
 data access. 


D. theobjecttowhichitisapplied,andtheargumentsareallco-located. 


Answer: A
DataBase Design
1062. Removal of left recursion is necessary because
A. it cacuses recursive decent parser to loop forever B. it generates an
ambiguous grammar
 C. botha&b
 D. noneofthese

Answer: a
Programming Language Translators

1063. A parse tree showing attribute value at each node is


called
A. concrete tree
 B. syntex tree
 C. Annotated parse tree D. botha&b

Answer: c
Programming Language Translators

1064. the role of predictive parsing is


A. to construct a top-down parser never backtracks
 B. to construct a top-
down parser backtracks
 C. to construct a bottom up parser that never
backtracks D. noneofthese

Answer: a
Programming Language Translators

1065. if we construct parsing table for above grammar,the


parsing table entry[S',e]
A. S'→ε
 B. S'→eS
 C. S'→ε S'→eS D. noneofthese

Answer: c
Programming Language Translators

1066. parsing table entry [S',$] will contain,


A. S'→eS B. S→iEtss C. S'→a

D. S'→ε Answer: d
Programming Language Translators

1067. which of the following is true regarding LL(1) grammar?


A. no ambiguous or left rcursive grammar can be LL(1)
 B. no ambiguous but
left recursive grammar can be LL(1) C. no left recursive but ambiguous
grammar can be LL(1) D. bothambiguousandleftrecursivegrammarcanbeLL(1)

Answer: a
Programming Language Translators

1068. Whish of the following checks are include with in static


checking?
A. type checks
 B. flow checks
 C. uniqueness checks D. allofthese

Answer: d
Programming Language Translators

1069. if an array variable and a function variable are added


together,which type of static will be generated?
A. name related checks B. uniqueness checks C. type checks
 D. noneofthese

Answer: c
Programming Language Translators

1070. if an error is detected within a ststement,the type


assigned to the statement is,
A. type constructor B. type expression C. error type
 D. typeerror

Answer: d
Programming Language Translators

1071. if conversion from one type to another type is done


automatically by the compiler then,it is called
A. implicit conversion B. coercions
 C. botha&b
 D. noneofthese

Answer: c
Programming Language Translators

1072. system programs such as compilers are designed so


that they are
A. recursive
 B. serially usable C. non-reusable D. re-enterable

Answer: d
Programming Language Translators

1073. All data objects in FORTRAN language cant be


allocated
A. dynamically B. statically
 C. globally
 D. bothaandb

Answer: b
Programming Language Translators

1074. the output of the code generator is target program that


includes
A. absolute machine language B. relocatable machine language C. assembly
language
 D. allofthese

Answer: d
Programming Language Translators

1075. replacement of an expensive operation by a cheaper


one is termed as
A. reduction in strength
 B. code motion
 C. loop in variant computation D.
noneofthese

Answer: c
Programming Language Translators

1076. a basic block can be analyzed by


A. flow graph
 B. a graph with cycles C. aDAG
 D. noneofthese

Answer: c
Programming Language Translators

1077. What is the output of the following program?


A. 14,24 B. 11,21 C. 10,20 D. Error

Answer: C
Coputer programming and problem solving

1078. #include<stdio.h>
A. B. C. D.

Answer:
Coputer programming and problem solving

1079. void swap(int&, int&);


A. B. C. D.

Answer:
Coputer programming and problem solving

1080. int main(){


A. B. C. D.

Answer:
Coputer programming and problem solving

1081. int a = 10,b=20;


A. B. C. D.

Answer:
Coputer programming and problem solving

1082. swap (a++,b++);


A. B. C. D.

Answer:
Coputer programming and problem solving

1083. printf("\n%d,%d\t",a, b);}


A. B. C. D.

Answer:
Coputer programming and problem solving

1084.
A. B. C. D.

Answer:
Coputer programming and problem solving

1085. void swap(int& x, int& y){


A. B. C. D.

Answer:
Coputer programming and problem solving

1086. x+=2;
A. B. C. D.

Answer:
Coputer programming and problem solving

1087. y+=3;}

A.

B. C. D.

Answer:
Coputer programming and problem solving

1088.
A. B. C. D.

Answer:
Coputer programming and problem solving

1089. What is the output of the following program segment?


A. 123000
 B. 123456
 C. junk data display D. Error

Answer: A
Coputer programming and problem solving

1090. int a[6]={1,2,3};


A. B. C. D.
Answer:

Coputer programming and problem solving

1091. int j;
A. B. C. D.

Answer:
Coputer programming and problem solving

1092. for(j=0;j<6;j++)
A. B. C. D.

Answer:
Coputer programming and problem solving

1093. cout<<a[j];
A. B. C. D.

Answer:
Coputer programming and problem solving

1094.

A.

B. C. D.
Answer:
Coputer programming and problem solving

1095. What is the output of the following program segment?


A. Error B. 0
 C. 4
 D. 5

Answer: C
Coputer programming and problem solving

1096. char* ch="\0123\0";


A. B. C. D.

Answer:
Coputer programming and problem solving

1097. cout<<sizeof(ch)<<endl;
A. B. C. D.

Answer:

Coputer programming and problem solving

1098.
A. B. C. D.

Answer:
Coputer programming and problem solving
1099. Binary Search algorithm cannot be applied to
A. Sorted linked list B. Sorted binary trees C. Sorted linear array D.
Pointerarray

Answer: A
Coputer programming and problem solving

1100.
A. B. C. D.

Answer:
Coputer programming and problem solving

1101. A variable P is called pointer if

A. P contains address of an element in Data

B. P points to the address of first element in Data C. P can store only memory
addresses
 D. PcontainDataandaddressofData

Answer: A
Coputer programming and problem solving

1102.
A. B. C. D.

Answer:
Coputer programming and problem solving
1103. Syntax of the programming language is
A. the form of its expressions, statements and program units
 B. meaning of
those statements, expressions and program units C. Bothaandb
 D.
Neitheranorb

Answer: A
Coputer programming and problem solving

1104.
A. B. C. D.

Answer:

Coputer programming and problem solving

1105.
A. B. C. D.

Answer:
Coputer programming and problem solving

1106. int a=10,b;


A. 22,11,11,11 B. 12,10,11,13 C. 22,10,11,13 D. 22,13,13,13

Answer: D
Coputer programming and problem solving

1107. b=a++ + ++a;


A. B. C. D.

Answer:
Coputer programming and problem solving

1108. printf("%d,%d,%d,%d",b,a++,a,++a);

A.

B. C. D.

Answer:
Coputer programming and problem solving

1109.
A. B. C. D.

Answer:
Coputer programming and problem solving

1110. what will be the output when following code is


executed
A. B. C. D.

Answer:
Coputer programming and problem solving

1111.
A. B. C. D.
Answer:

Coputer programming and problem solving

1112. Which programming language does not need


Translator?
A. Middle Level
 B. High Level
 C. Assembly Level D. MachineLevel

Answer: D
Coputer programming and problem solving

1113.
A. B. C. D.

Answer:
Coputer programming and problem solving

1114.
A. B. C. D.

Answer:
Coputer programming and problem solving

1115. Code:

A. z=1.00
B. z=0.00 C. z=2.00 D. z=1.50

Answer: A
Coputer programming and problem solving

1116.
A. B. C. D.

Answer:
Coputer programming and problem solving

1117. int i = 4;
A. B. C. D.

Answer:
Coputer programming and problem solving

1118. int x = 6;
A. B. C. D.

Answer:

Coputer programming and problem solving

1119. double z;
A. B. C. D.

Answer:
Coputer programming and problem solving

1120. z = x / i;
A. B. C. D.

Answer:
Coputer programming and problem solving

1121. printf("z=%.2f\n", z);


A. B. C. D.

Answer:
Coputer programming and problem solving

1122.

A.

B. C. D.

Answer:
Coputer programming and problem solving

1123. What will print when the sample code above is


executed?
A. B. C. D.

Answer:
Coputer programming and problem solving
1124.
A. B. C. D.

Answer:
Coputer programming and problem solving

1125. Which one of the following variable names is NOT


valid?
A. __s B. s__ C. 1__ D. __1

Answer: C

Coputer programming and problem solving

1126.
A. B. C. D.

Answer:
Coputer programming and problem solving

1127. Which of the following statements is true about


variables?
A. Value of variable will never change
 B. Value of the variables will change
during loading of the program
 C. Value of the variables will change during
Execution of the program D.
Valueofthevariableswillchangeduringcompailingoftheprogram

Answer: C
Coputer programming and problem solving

1128.
A. B. C. D.

Answer:
Coputer programming and problem solving

1129.

A.

B. C. D.

Answer:
Coputer programming and problem solving

1130. what is the output for the following code?


A. 10 B. 15 C. 25 D. Error

Answer: B
Coputer programming and problem solving

1131.
A. B. C. D.

Answer:
Coputer programming and problem solving
1132. int a=10,b,c,d;
A. B. C. D.

Answer:

Coputer programming and problem solving

1133. a=b=c=d=15;
A. B. C. D.

Answer:
Coputer programming and problem solving

1134. printf("%d",a);
A. B. C. D.

Answer:
Coputer programming and problem solving

1135.
A. B. C. D.

Answer:
Coputer programming and problem solving

1136. In a C expression, how is a logical AND represented?


A. &&

B. .AND. C. @@ D. ||

Answer: A
Coputer programming and problem solving

1137.
A. B. C. D.

Answer:
Coputer programming and problem solving

1138.
A. B. C. D.

Answer:
Coputer programming and problem solving

1139. Code:
A. 3 B. 0 C. 1 D. 2

Answer: D

Coputer programming and problem solving

1140.
A. B. C. D.

Answer:
Coputer programming and problem solving

1141. x = 3, counter = 0;
A. B. C. D.

Answer:
Coputer programming and problem solving

1142. while ((x-1))


A. B. C. D.

Answer:
Coputer programming and problem solving

1143. {

A.

B. C. D.

Answer:
Coputer programming and problem solving

1144. ++counter;
A. B. C. D.
Answer:
Coputer programming and problem solving

1145. x--;
A. B. C. D.

Answer:
Coputer programming and problem solving

1146. }
A. B. C. D.

Answer:

Coputer programming and problem solving

1147.
A. B. C. D.

Answer:
Coputer programming and problem solving

1148. Referring to the sample code above, what value will the
variable counter have when completed?
A. B. C. D.

Answer:
Coputer programming and problem solving

1149.
A. B. C. D.

Answer:
Coputer programming and problem solving

1150.
A. B. C. D.

Answer:
Coputer programming and problem solving

1151. what is the output for the following statements?


A. Ais10
 B. Aisnot10 C. no output D. Error

Answer: D
Coputer programming and problem solving

1152.
A. B. C. D.

Answer:
Coputer programming and problem solving

1153. float a=10.0;


A. B. C. D.

Answer:
Coputer programming and problem solving

1154. if(a==10)
A. B. C. D.

Answer:
Coputer programming and problem solving

1155. {
A. B. C. D.

Answer:
Coputer programming and problem solving

1156. printf("A is 10");


A. B. C. D.

Answer:
Coputer programming and problem solving

1157. else

A.
B. C. D.

Answer:
Coputer programming and problem solving

1158. printf("A is not 10");


A. B. C. D.

Answer:
Coputer programming and problem solving

1159. }
A. B. C. D.

Answer:
Coputer programming and problem solving

1160. Which of the following is not a logical data-base


structure?
A. chain
 B. relational C. network D. tree

Answer: A

Data Base Design

1161. The data dictionary tells the DBMS


A. what files are in the database
 B. what attribute are possessed by the data
C. what these files contain
 D. Alloftheabove
Answer: D
Data Base Design

1162. An-owner-member set in the CODASYL specifications


may have
A. only one member but many member occurrence
 B. only one owner but
many owner occurrences
 C. more than one member but only one occurrence
per member D. Alloftheabove

Answer: B
Data Base Design

1163. A top-to-bottom relationship among the items in a


database is established by a
A. Hierarchical schema B. Network schema
 C. Relational schema D.
Alloftheabove

Answer: A
Data Base Design

1164. The PROJECT command will create new table that has
A. more fields than the original table B. more rows than the original table C.
both (a) and (b)
 D. allthefieldsofmastertable

Answer: D
Data Base Design

1165. In a _____ a parent record type can be linked to one or


more "child" record types, but a child record type can have
only one parent.
A. Network database
 B. Relational database C. Hierarchical database D.
Distributeddatabase

Answer: C
Data Base Design

1166. Which of the following is not a relational database?


A. Reflex
 B. dBASE IV
 C. 4th Dimension D. FoxPro

Answer: A
Data Base Design

1167. Which of the following is true of a network structure?


A. It is a physical representation of the data
 B. It allows a many-to-many
relationship
 C. It is conceptually simple
 D.
twillbethedominantdatabaseofthefuture

Answer: B
Data Base Design

1168. Sort/report generators


A. are faster than index/report generators
 B. require more disk space than
index/report generators C. do not need to sort before generating a report
 D.
both(a)and(b)

Answer: B
Data Base Design

1169. Which of the following is not associated with database


design?
A. Structure the data in stable structures that are not likely to change over
time and that have minimal redundancy 


B. The preparation of a final conceptual model and the implementation of


the database. 


C. Develop a logical database design from which we can do physical


database design. 


D. Developalogicaldatabasedesignthatreflectstheactualdatarequirementst
hatexistin 
 the forms and reports of an information system. 


Answer: B
Data Base Design

1170. When each nonprimary key attribute is identified by the


whole key, the relation is said to be in at least:
A. second normal form B. third normal form
 C. fourth normal form D.
fifthnormalform

Answer: A

Data Base Design

1171. A functional dependency between two (or more)


nonprimary key attributes in a relation defines a:
A. weak dependency
 B. partial dependency
 C. simple dependency D.
transitivedependency

Answer: D
Data Base Design

1172. The primary deliverable from logical database design is:


A. normalized relations
 B. design specifications
 C. an updated baseline
project plan
 D. alistofalternativedesignstrategies

Answer: A
Data Base Design

1173. The following are steps to transforming an E-R diagram


into normalized relations and then merging all the relations
into one final, consolidated set of relations except for:
A. represent entities
 B. represent relationships C. normalize the relations D.
denormalizetherelations

Answer: D
Data Base Design

1174. For a unary one-to-one relationship between two


entities A and B, the relationship is represented by:

A. adding the primary key of A as a foreign key of B B. adding the primary key
of B as a foreign key of A C. combining the two entities into one relation
 D.
eitheraorb

Answer: D
Data Base Design

1175. Convert from binary to octal (11010111110.0011) 2


A. (3386.24)8 B. (4276.14)8 C. (3276.148)8 D. (3312.24)8

Answer: C
Digital Logic

1176. The range of numbers which can be stored in a 8 bit


register is
A. -128 to +127
 B. -128 to +128
 C. -999999 to +999999 D. Noneofthese

Answer: A
Digital Logic

1177. To find the Complement of a function which law is


used?
A. Commutative law B. Distributive law C. Duality
 D. DeMorgansLaw

Answer: D
Digital Logic

1178. Which one is a self complementary code?


A. Excess 3 code B. 8 4 2 1
 C. Reflected code D. 2421

Answer: D
Digital Logic

1179. The output of logic gate is ‘1’ when all its input are at
logic ‘0’ . The gate is either
A. a NAND or an EX-OR gate B. aNORoranEX-NORgate C. an OR or an EX-
NOR gate D. anANDoranEX-ORgate

Answer: B
Digital Logic

1180. Theorem Absorption is state as


A. x+x’y=x B. x+xy=x’ C. x+x’y’=x D. x+xy=x

Answer: D
Digital Logic

1181. Which of the following is not typically found in status


register of a microprocessor

A. Overflow
 B. Zero result
 C. Negative result D. Noneofthese

Answer: D
Digital Logic

1182. Duality of an expression is obtained by


A. interchanging 0 and 1
 B. interchanging AND & OR
 C. bothaandb
 D.
bycomplementingthevariables

Answer: C
Digital Logic

1183. A Binary with n digits all of which are unity has the
value
A. n2-1 B. 2n-1 C. 2n
 D. 2n-1

Answer: B
Digital Logic

1184. How is a J-K flip-flop made to toggle


A. How is a J-K flip-flop made to toggle B. when the gate is HIGH
 C. both of
the above
 D. neitheroftheabove

Answer: B
Digital Logic

1185. Express Y = (A+B+C ) (A+ B C )(A+B+C) in maxterm


designation
A. Y= M4M6M7 B. Y= M0M1M3 C. Y= m4m6m7 D. m0m1m3

Answer: B
Digital Logic

1186. Assign the proper odd parity bit to the code 111001 in
MSB
A. 111001 B. 1111001 C. 1110011 D. 1110010
Answer: A
Digital Logic

1187. Identify the form of the given function F = (AB+CD)


(A’B’+C’D’)
A. Standard Form
 B. Sum of Minterms
 C. Product of Maxterms D.
Nonstandardform

Answer: B
Digital Logic

1188. 2’s Complement of 0101010111 will be

A. 101010111

B. 1010101001 C. 10101011111 D. 1010100011

Answer: B
Digital Logic

1189. Write the next four numbers in the hex counting


sequence E9A,E9B,E9C,E9D, _ , _ , _,
A. E9E,E9F,EA0,EA1 B. E9E , E9F, E100, E101 C. E9E , E9F, E00, E01 D.
Noneoftheabove

Answer: A
Digital Logic

1190. You need at least bits to represent 32 in two's


complement format
A. 4 B. 5 C. 6 D. 7

Answer: D
Computer Architecture and Organization

1191. In two's complement addition, if the last two carry bits


are not the same, what does it indicate?
A. carry
 B. negative result C. overflow
 D. underflow

Answer: C
Computer Architecture and Organization

1192. If the subtraction of two numbers results in a carry,


what does this indicate? Assume the numbers are
represented in sign-magnitude form.
A. Overflow
 B. negative result C. Positive result D. carry

Answer: C
Computer Architecture and Organization

1193. What is the value of exponent bias for IEEE 754 double
precision format?
A. 1023 B. 1024 C. 127 D. 1000

Answer: A
Computer Architecture and Organization

1194. In booth's multiplication algorithm, if QnQn+1= 10,


what operation will you perform?
A. Right shift AQQn+1
 B. Left shift AQQn+1
 C. Add A and Multiplier, and
then right shift AQQn+1 D. SubtractMultiplierfromAandrightshiftAQQn+1

Answer: D

Computer Architecture and Organization

1195. If a number has k-bits(k is even), how many bits will its
square-root have?
A. K-1 B. K/2 C. k D. k-2

Answer: B
Computer Architecture and Organization

1196. In number representation, 1111 in memory represents -


1.
A. unsigned integers B. one’s complement C. sign-and-magnitude D.
two’scomplement

Answer: D
Computer Architecture and Organization

1197. Random access memories are useful in applications


where
A. Data consists of numbers
 B. Short access time is required
 C. Each stored
word is processed differently
 D.
Datanaturallyneedstoflowinandoutinserialform

Answer: B
Computer Architecture and Organization

1198. when the overflow do not occur in fixed point addition?


A. when the signs of addend and augend are same
 B. 2's complement
addition
 C. when the signs of addend and augend are different

D. alltheabove

Answer: C
Computer Architecture and Organization

1199. when the overflow do not occur in fixed point


subtraction?
A. when the signs of addend and augend are same
 B. 2's complement
subtraction
 C. when the signs of addend and augend are different D.
alltheabove

Answer: A
Computer Architecture and Organization

1200. when Qn and Qn+1 = 01 then the action taken is


A. subtract multiplicand from partial product B. add multiplicand to partial
product
 C. arithmetic shift right
 D. logicalshiftright

Answer: B
Computer Architecture and Organization

1201. when do we restore the partial remainder in signed-


magnitude division?
A. when partial remainder is greater than divisor B. when partial remainder is
equal to the divisor C. when partial remainder is less than the divisor D.
noneoftheabove

Answer: C

Computer Architecture and Organization

1202. To reduce the exponent value by 2, the radix point is


moved to wards
A. left by 2 bits B. right by 2 bits C. leftby1bit D. rightby1bit

Answer: B
Computer Architecture and Organization

1203. ........................... number of unsigned numbers can be


generated using 4 bits
A. 4 B. 8 C. 16 D. 20

Answer: C
Computer Architecture and Organization

1204. Binary Multiplication algorithm is also called


as...............
A. Lattice multiplication algorithm B. Long multiplication algorithm
 C. Sunzi
multiplication algorithm D. Peasantmultiplicationalgorithm

Answer: D
Computer Architecture and Organization

1205. Name the algorithm which is used for singed


multiplication using 2’s Complement

A. Booth's
 B. Von Nuemann
 C. Charles Babbage D. Ada

Answer: A
Computer Architecture and Organization

1206. The speed of floating-point operations is an important


measure of performance for computers in many application
domains. It is measured in FLOPS
A. MIPS B. FIPS C. FLOPS D. FOPS

Answer: C
Computer Architecture and Organization

1207. Identify the Type of IEEE format for the flowing point
numbers having the sign bit=1, the exponent field=15, and
the significand (mantissa)=112
A. Half
 B. Single C. Double D. Quad

Answer: D
Computer Architecture and Organization

1208. Match the following P. Sequential access i. Flopy Disc


Q. Direct access ii. RAM R. Random access iii. Magnetic Tape
S. Associative access iv. Cache Memory

A. P-ii, Q-iii, R-i, S-iv

B. P-iii, Q-iii, R-i, S-iv C. P-ii, Q-ii, R-iii, S-iv D. P-i,Q-ii,R-iii,S-iv

Answer: B
Computer Architecture and Organization

1209. Charles Babbage started Difference engine in1821 but


failed its test in 1833, Why?
A. Lack of funds
 B. Lack of Resources
 C. Lack Enouragement
 D.
LackofMemoryTechnology

Answer: D
Computer Architecture and Organization

1210. Compute the memory traffic for the following Code


fragment,Assume that opcode occupy one byte, address
occupies two bytes, data values occupy two bytes and word
length is one byte LOAD A,B SUB A,C MPY A,D
A. 15 B. 20 C. 3 D. 21

Answer: C
Computer Architecture and Organization
1211. Which one of the following statement is wrong
A. “Multiple memory accesses” is a disadvantage of Indirect addressing mode
B. Stack addressing mode has limited applicability
 C. Immediate addressing
mode has limited operand magnitude
 D.
RegisterIndirectaddressingmodehaslimitedaddressspace

Answer: D
Computer Architecture and Organization

1212. Which of the following justification is correct if an one


word instruction opcode length is 4 bit and address field is 12
bits length.
A. The number of instruction of processor is 16 and total memory capacity is
1MB B. The number of instruction of processor is 32 and total memory
capacity is 4MB C. The word legth is 16 bit and total memory capacity is
1KB
 D.
Thenumberofinstructionofprocessoris32andtotalmemorycapacityis8KB

Answer: A
Computer Architecture and Organization

1213. Differentiate between implicit and Immdiate


Addressing modes
A. Immediate addressing mode instruction contians no address field and
implied addressing mode no opcode field 


B. Implied addressing mode instruction contians no address field and


Immediate addressing mode contains no opcode field 

C. Implied addressing mode instruction contians no address field and
Immediate addressing mode contains 2's complement value in its
address field 


D. Noneoftheabove 


Answer: C
Computer Architecture and Organization

1214. In IAS computer ,IAS stands for:


A. Indian administrative services B. Institute for Advanced Studies C. Institute
of Arts & Science
 D. Noneoftheabove

Answer: B
Computer Architecture and Organization

1215. In IAS Computer..................Register employed to


temporarily hold the right –hand instruction from a word in
memory
A. MBR B. MAR C. IR
 D. IBR

Answer: D
Computer Architecture and Organization

1216. In IAS computer for a multiplication operation result ,


the Most Significant 40 bits will be in .........register and least
significant 40 bits will be in ............register.
A. AC, MBR B. MBR,MQ C. AC,MQ D. MQ,AC
Answer: C
Computer Architecture and Organization

1217. Source and result operands can be stored in one of


.......areas
A. 2 B. 3 C. 5 D. 7

Answer: B
Computer Architecture and Organization

1218. The address where data is available is part of the


instruction is called as .........addressing mode
A. Implied
 B. Immediate C. Indirect
 D. Direct

Answer: D
Computer Architecture and Organization

1219. Compute Number of memory accesses for executing a


4-address instruction if wordlength is 3 byte, opcode is 1byte,
and operand address/operand is 3 byte.
A. 7 B. 10 C. 9 D. 5

Answer: A
Computer Architecture and Organization

1220. Match the following 1. MOV 2000,R1 A. Implied


Addressing Mode 2. MVI 01, R2 B. Indirect Addressing Mode
3. MOV (2000), R1 C. Direct Addressing Mode 4. DEC D.
Immediate Addressing Mode
A. 1-A,2-B,3-C,4-D B. 1-C,2-A,3-C,4-D C. 1-C,2-D,3-B,4-A D. 1-D,2-C,3-B,4-A

Answer: C
Computer Architecture and Organization

1221. In Relative Addressing mode, The Effective


Address(EA)=
A. PC+AC
 B. AC+2's Complement value C. PC+2's Complement value D.
MBR+PC

Answer: C
Computer Architecture and Organization

1222. Which one of the following is correct sequence of


Instruction Cycle 1. Instruction Fetch 2. Operand Address
Calculation for Computation 3. Operand Fetch 4. Intruction
Decode 5. next Instruction address calculation 6. Operand
Address Calulation for store 7. Operand Store 8. Instruction
Execution
A. 1-2-5-3-4-6-7-8 B. 1-4-2-3-5-6-8-7 C. 1-2-3-4-5-6-7-8 D. 1-4-2-3-8-6-7-5

Answer: D
Computer Architecture and Organization

1223. The memory of IAS consists of


A. 1000 storage locations, 30 bit words B. 8000 storage locations, 40 bit words
C. 2000 storage locations, 80 bit words D. a.1000storagelocations,40bitwords

Answer: D
Computer Architecture and Organization

1224. An assembly language program is translated to


machine code by
A. an assembler B. a compiler
 C. an interpreter

D. alinker

Answer: A
Computer Architecture and Organization

1225. What is Op-code?


A. The instruction that is to be executed
 B. The value in which an operation
acts upon C. A mnemonic that defines a data size
 D.
Thecompiledassemblycode

Answer: A
Computer Architecture and Organization

1226. The von Neumann bottleneck is due to


A. mismatch in speed between secondary and primary storage B. mismatch in
speed between the CPU and primary storage C. slow speed I/O devices
 D.
Slowclockspeed

Answer: B
Computer Architecture and Organization

1227. Perform the logic AND, XOR with binary strings


10011100 and 10101010
A. AND= 10001000 XOR= 00110110
 B. AND= 10111000 XOR= 00110110
 C.
AND= 10011000 XOR= 00110111
 D. a) AND=10001011XOR=00111110

Answer: A

Computer Architecture and Organization

1228. The CPU deals with each instruction in a cycle. The


sequence of instructions to carry out one machine instruction
is called the instruction or machine cycle. The first action is to
fetch the instruction from memory and then the program
counter is updated (reset). The other three phases of the
machine cycle in the correct order are:
A. Decode the instruction; Execute the instruction; Transfer the data B.
Decode the instruction; Transfer the data; Execute the instruction C. Execute
the instruction; Decode the instruction; Transfer the data D.
Transferthedata;Executetheinstruction;Decodetheinstruction

Answer: A
Computer Architecture and Organization

1229. An instruction stored at location 300 with its address


field at location 301. The address field has the value 400. A
processor register R1 contains the number 200. Evaluate the
effective address if the addressing mode of the instruction is
(a) relative (b) index with R1 as the index register.
A. 702, 600 B. 400,600 C. 400, 700 D. 700,200

Answer: A
Computer Architecture and Organization

1230. A data movement instruction will


A. modify the status register
 B. modify the stack pointer
 C. modify the
program counter
 D. transferdatafromonelocationtoanother

Answer: D

Computer Architecture and Organization

1231. Which register example hold the instruction itself?


A. . Program Counter B. Instruction Register C. Control Unit
 D.
ArithmeticLogicUnit

Answer: B
Computer Architecture and Organization

1232. Name the addressing mode where the data is directly


available as an operand
A. immediate B. relative
 C. direct
 D. indirect

Answer: A
Computer Architecture and Organization
1233. The common fields found in instruction formats are:
A. opcode field,address field,mode field
 B. opcode field, operand field,
address field, mode field,
 C. opcode field, address field, next address field,
mode field D. opcodefield,addressfield1,addressfield1,modefield,

Answer: A
Computer Architecture and Organization

1234. The memory address register is used to store

A. data to be transferred to memory

B. data that has been transferred from memory C. the address of a memory
location
 D. aninstructionthathasbeentransferredfrom

Answer: C
Computer Architecture and Organization

1235. What are important aspects of the von Neumann


architecture?
A. Instruction are data
 B. Separate memory for programs and data C.
invented in Germany
 D. Usesaprogramcounter

Answer: B
Computer Architecture and Organization

1236. When creating a subroutine in assembly, what needs to


be handled?
A. Passing parameters to the subroutine
 B. Returning values from the
subroutine
 C. Returning to the proper location when the subroutine is
finished D. Alloftheabove

Answer: D
Computer Architecture and Organization

1237. According to the von Neumann model, stored in


memory.
A. only data are
 B. only programs are
 C. data and programs are D.
noneoftheabove

Answer: C
Computer Architecture and Organization

1238. If the memory address space is 64 MB and the word


size is 8 bits, then bits are needed to access each word.
A. 26 B. 24 C. 28 D. 32

Answer: A
Computer Architecture and Organization

1239. Which data structure is used for the subroutine?


A. Queue B. Stack C. Array D. List

Answer: B
Computer Architecture and Organization
1240. For the instruction MOV R1, (2000) calculate the
effective address __________ and the content of R1
__________
A. 2000, M (2000)
 B. M (2000), 2000
 C. 2000, M(2000
 D.
M(2000),M(M(2000))

Answer: D
Computer Architecture and Organization

1241. The address of memory location containing the


instruction code
for next instruction is stored in _________________.
A. IBR B. MAR C. IR
 D. PC

Answer: D
Computer Architecture and Organization

1242. __________languages are also known as assembly


languages.
A. Machine B. Symbolic C. High-level D. Natural

Answer: B
Computer Architecture and Organization

1243. The three steps in the running of a program on a


computer are performed in this specific order
A. Fetch, execute, and decode B. decode, execute, and fetch C. Decode, fetch,
and execute D. fetch,decode,andexecute

Answer: D
Computer Architecture and Organization

1244. The purposes of IBR register in von Neumann


architecture is to hold _____________
A. Left Instruction B. Right Instruction C. Opcode

D. Addressfield

Answer: B
Computer Architecture and Organization

1245. Segment Pointer is a register to hold the


__________________
A. Address
 B. Data
 C. both Address & Data D. Condition

Answer: A
Computer Architecture and Organization

1246. In the von Neumann model, the subsystem serves as a


manager of the other subsystems.
A. ALU
 B. input/output C. memory
 D. controlunit

Answer: D
Computer Architecture and Organization
1247. Von Neumann machine follows _____________
instruction format
A. Zero Address B. One Address C. Two Address D. ThreeAddress

Answer: B

Computer Architecture and Organization

1248. . Load (R1) +” , Identify the addressing mode.


A. Register Indirect
 B. Pre Auto Increment C. Post Auto Increment D.
IndexRegister

Answer: C
Computer Architecture and Organization

1249. Give the last instruction in the


subroutine.______________________
A. Call
 B. Return C. Skip D. Jump

Answer: B
Computer Architecture and Organization

1250. In a Division operation result, the quotient will be in


________register and Remainder will
be_________________register.
A. AC&MBR B. AC&MQ C. MQ&AC D. MQ&IR
Answer: C
Computer Architecture and Organization

1251. IAS machine supports __________ bit instruction.

A. 20

B. 40 C. 30 D. 10

Answer: A
Computer Architecture and Organization

1252. The IAS machine is a address machine


A. 4 B. 0 C. 1 D. 3

Answer: C
Computer Architecture and Organization

1253. The DIV M(X) instruction in IAS has the dividend in the
register
A. AC
 B. PC
 C. MQ
 D. Noneoftheabove

Answer: A
Computer Architecture and Organization

1254. If a machine supports 256 unique instructions, the


width of the opcode field is
A. 256 B. 8 C. 16 D. 4
Answer: B
Computer Architecture and Organization

1255. What type of instruction is JUMP M(X), where X is the


address of a memory location?
A. Logical
 B. Arithmetic C. Control
 D. Load

Answer: C
Computer Architecture and Organization

1256. What is the function of the IBR register?


A. To save the right instruction
 B. To save the opcode of the instruction
 C.
To save the left instruction
 D. Tosavetheaddressfieldoftheinstruction

Answer: A
Computer Architecture and Organization

1257. What is the addressing mode used in the instruction


ADD R1, R2, [R3], which adds the contents of registers R2 and
that pointed by R3 and stores the result in R1?
A. Direct B. Register C. Implied D. Indirect

Answer: D
Computer Architecture and Organization
1258. If you were to add the instruction ADD R1, R2, R3 to the
IAS instruction set, what changes will you make to the
datapath?
A. Add an additional input to the ALU which takes operands from a register
file B. Add a register file
 C. Connect the output of ALU to register file
 D.
Addanadditionaladder

Answer: A,B &C


Computer Architecture and Organization

1259. What is the addressing mode used in the instruction


BEQ R1, R2, Offset, which compares the contents of registers
R1 and R2 and if they are equal, transfers program control to
PC+offset
A. Immediate B. Direct
 C. PC -Relative D. Indexed

Answer: C
Computer Architecture and Organization

1260. What is the addressing mode used in the instruction


ADD for the stack-organised machine?
A. Implied B. Direct C. Register D. Indirect

Answer: A
Computer Architecture and Organization

1261. Write a program to evaluate the expression (a+b)/c for


a 0-address machine
A. B. C. D.

Answer:
Computer Architecture and Organization

1262. If a machine has a unified memory of 256 bytes which is


byte addressable, what would be the size of the PC register?
Assume each instruction is of one byte.
A. 16 bits B. 32 bits C. 8bits
 D. 256bits

Answer: C
Computer Architecture and Organization

1263. What is the addressing mode used in the instruction IN


10h which is used to read the input from an input device into
accumulator?
A. Immediate B. Relative C. Indirect
 D. Direct

Answer: D
Computer Architecture and Organization

1264. The DIV M(X) instruction in the IAS machine stores the
quotient in the register and the remainder in the register
A. AC, MQ B. MQ,AC C. AC,IR

D. MDR,MQ
Answer: B
Computer Architecture and Organization

1265. What is the use of the base indexed addressing mode?


A. To make the program re-locatable
 B. To reduce the size of the
program
 C. To reduce the size of individual instructions D.
Toaccessmemorylocations

Answer: A
Computer Architecture and Organization

1266. Match the following 1. MOV 2000,R1 A. Implied


Addressing Mode 2. MVI 01, R2 B. Indirect Addressing Mode
3. MOV (2000), R1 C. Direct Addressing Mode 4. DEC D.
Immediate Addressing Mode
A. 1-A,2-B,3-C,4-D B. 1-C,2-A,3-C,4-D C. 1-C,2-D,3-B,4-A D. 1-D,2-C,3-B,4-A

Answer: C
Computer Architecture and Organization

1267. In Relative Addressing mode, The Effective


Address(EA)=
A. PC+AC
 B. AC+2's Complement value C. PC+2's Complement value D.
MBR+PC

Answer: C
Computer Architecture and Organization

1268. Which one of the following is correct sequence of


Instruction Cycle 1. Instruction Fetch 2. Operand Address
Calculation for Computation 3. Operand Fetch 4. Intruction
Decode 5. next Instruction address calculation 6. Operand
Address Calulation for store 7. Operand Store 8. Instruction
Execution
A. 1-2-5-3-4-6-7-8 B. 1-4-2-3-5-6-8-7 C. 1-2-3-4-5-6-7-8 D. 1-4-2-3-8-6-7-5

Answer: D
Computer Architecture and Organization

1269. DMQL is used in


A. Data Warehouse
 B. Data Mining
 C. Concept Hierarchy D.
Alltheofthechoices

Answer: D
Data Warehousing and Data Mining

1270. Data Mining algorithms are applied on


A. Relational Database B. Time Series Database C. Spatial Database
 D.
Alltheofthechoices

Answer: D

Data Warehousing and Data Mining

1271. Missing data are handled in


A. Data Transformation B. Data Integration
 C. Data Cleaning
 D.
DataReduction

Answer: C
Data Warehousing and Data Mining

1272. Find out which of the following technique is used for


'Predicting whether today is a rainy day or not based on
humidity and temperature'.
A. Prediction
 B. Classification C. Clustering
 D. Association

Answer: B
Data Warehousing and Data Mining

1273. One of the supervised learning technique is


A. Prediction
 B. Association C. Clustering
 D. Discrimination

Answer: A
Data Warehousing and Data Mining

1274. Relative grading in grade calculation is an example of


A. Set Grouping Hierarchy
 B. Rule Based Hierarchy
 C. Operation Derived
Hierarchy D. SchemaHierarchy

Answer: B
Data Warehousing and Data Mining
1275. Confidence measures the __________ of the rules
A. Certainity B. Utility
 C. Simplicity D. Novelty

Answer: A
Data Warehousing and Data Mining

1276. Redundant patterns are removed with the help of the


following measure estimation
A. Certainity B. Utility
 C. Simplicity D. Novelty

Answer: D
Data Warehousing and Data Mining

1277. Pattern Evaluation is a term appropriate to which of the


following
A. Concept Hierarchy B. Measures
 C. Data Warehouse D. BarChart

Answer: B

Data Warehousing and Data Mining

1278. One of the Association algorithm is


A. K Means
 B. Naïve Bayesian C. FP Tree
 D. Regression

Answer: C
Data Warehousing and Data Mining

1279. Which of the following is an representation of


'Knowledge Base'
A. Concept Hierarchy B. Star Schema
 C. Bar Chart
 D. DataWarehouse

Answer: A
Data Warehousing and Data Mining

1280. In a Data Warehouse which of the following is a very


rare operation?
A. Update B. Read
 C. Retrieve D. Rollup

Answer: A
Data Warehousing and Data Mining

1281. If there are 4 dimensions in a Data Warehouse, then the


possible number of cuboids are
A. 4 B. 16

C. 81 D. 24

Answer: B
Data Warehousing and Data Mining

1282. A system has space constraints but has an efficient


processor. Which of the following algorithm would you
suggest for this system to perform Association technique?
A. FP growth
 B. Apriori
 C. K Means
 D. NaïveBayesian
Answer: A
Data Warehousing and Data Mining

1283. You are asked to design a Data Warehouse for a


University and most of the operations are retrieval from all of
the dimension tables. The Data Warehouse should perform
fast. What is the schema would you use for this scenario?
A. Snow Flake Schema B. ER Schema
 C. Star Schema
 D. FactConstellation

Answer: C
Data Warehousing and Data Mining

1284. What does HTML stand for


A. Home Tool Markup Language
 B. Hyperlinks and Text Markup Language C.
Hyper Text Markup
 D. Language

Answer: C
Internet and Web Programming

1285. Who is making the Web standards?


A. Microsoft
 B. The World Wide Web Consortium C. Mozilla
 D. Google

Answer: B
Internet and Web Programming

1286. Choose the correct HTML tag for the largest heading
A. <h1>
 B. <head>
 C. <h6>
 D. <heading>

Answer: A
Internet and Web Programming

1287. What is the correct HTML tag for inserting a line break?
A. <br/>
 B. <break /> C. <lb />
 D. <hr/>

Answer: A
Internet and Web Programming

1288. What is the preferred way for adding a background


color in HTML?
A. <body style="background-color:yellow"> B. <body
background="yellow">
 C. <body background-color="yellow">
 D.
<background>yellow</background>

Answer: A
Internet and Web Programming

1289. Choose the correct HTML tag to make a text bold


A. <bold> B. <b>
 C. <weight> D. <font>

Answer: B
Internet and Web Programming

1290. Choose the correct HTML tag to make a text italic


A. <i>
 B. <italic> C. <style> D. <emph>

Answer: A
Internet and Web Programming

1291. What is the correct HTML for creating a hyperlink?


A. <a url="http://www.anthoniraja.com">anthoniraja.com</a>
 B. <a
href="http://www.anthoniraja.com">anthoniraja</a>
 C. <a
name="http://www.anthoniraja.com">anthoniraja.com</a> D.
<a>http://www.anthoniraja.com</a>

Answer: B
Internet and Web Programming

1292. How can you open a link in a new browser window?


A. <a href=http://www.anthoniraja.com" new>
 B. <a
href="http://www.anthoniraja.com" target="new"> C. <a
href="http://www.anthoniraja.com" target="_blank"> D.
href="http://www.anthoniraja.com"target="_">

Answer: C
Internet and Web Programming

1293. Which of these tags are all <table> tags?


A. <table><tr><td>
 B. <table><head><tfoot> C. <table><tr><tt>
 D.
<thead><body><tr>

Answer: A
Internet and Web Programming

1294. Choose the correct HTML to left-align the content


inside a tablecell
A. <td leftalign>
 B. <tdleft>
 C. <td valign="left"> D. <tdalign="left">

Answer: D

Internet and Web Programming

1295. How can you make a list that lists the items with
numbers?
A. <dl> B. <list> C. <ul> D. <ol>

Answer: D
Internet and Web Programming

1296. What is the correct HTML for making a text input field?
A. <input type="text" />
 B. <textinput type="text" /> C. <input
type="textfield" /> D. <textfield>

Answer: A
Internet and Web Programming

1297. What is the correct HTML for inserting an image?


A. <image src="image.gif" alt="MyImage" /> B. <img src="image.gif"
alt="MyImage" /> C. <img href="image.gif" alt="MyImage" /> D.
<imgalt="MyImage">image.gif</img>
Answer: B
Internet and Web Programming

1298. Which one is not HTML5 input type?


A. email B. url
 C. search D. list

Answer: D
Internet and Web Programming

1299. Which tag is used to group inline-elements in HTML5?


A. <div>
 B. <span> C. <inline> D. <section>

Answer: B
Internet and Web Programming

1300. What is the correct HTML5 Docukment type syntax?


A. <!DOCTYPE html>
 B. <html doctype="http://www.w3.org/2004/html5"> C.
<html doctype="http://www.w3.org/2000/xhtml"> D. <!DOCTYPEhtml5>

Answer: A
Internet and Web Programming

1301. How do you specify the width and height of the video
tag in HTML5
A. <video width="300" height="400"></video> B. <video w="300"
h="400"></video>
 C. <video length="300" h="400"></video>
 D.
<video"300x400"></video>

Answer: A

Internet and Web Programming

1302. Find the Hexadecimal Value of "IndianRed" Color


A. #CD5C5C B. #CDCCCC C. #CD555C D. #CA5C5C

Answer: A
Internet and Web Programming

1303. The Fuzzy Set differs from crisp set by


A. Demorgan's
 B. Associative property
 C. Excluded Middle Axiom D.
Alltheabove

Answer: C
Soft Computing

1304. The error signal generator in Supervised learning


algorithm takes the input as
A. Actual output and Desired Output
 B. Actual output and reinforcement
signal C. Actual output only
 D. NoneoftheOptionsGiven

Answer: A
Soft Computing

1305. The cardinality of the fuzzy set is


A. 1
 B. N
 C. Infinity

D. cannotsay

Answer: C
Soft Computing

1306. For Disjunctive system of rules ,the aggregated output


is found by
A. Union
 B. Intersection
 C. difference
 D. NoneoftheOptionsGiven

Answer: A
Soft Computing

1307. Genetic Algorithm is


A. Calculus based Search Algorithm
 B. Random Guided Search Algorithm
 C.
Random Undirected Search Algorithm D. RandomizedAlgorithm

Answer: B
Soft Computing

1308. The process of obtaining the overall consequent from


the indivisual consequents contributed by each rule in the
rule base is known as
A. Aggregation of fuzzy rules B. Composition of fuzzy rules C. Conjunction
 D.
Disjunction

Answer: A
Soft Computing

1309. Which AI System will continue to analyze a problem


until it finds the best solution
A. Genetic Algorithm B. Neural Network C. Intelligent Agent D. ExpertSystem

Answer: A
Soft Computing

1310. Hard C means is used to classify data in


A. Crisp Sense
 B. Fuzzy Sense
 C. Both Supervised and Unsupervised D.
NoneoftheOptionsGiven

Answer: A
Soft Computing

1311. Weight adjustment takes place in


A. Supervised Learning Only
 B. Unsupervised Learning Only
 C. Both
Supervised and Unsupervised D. NeitherSupervisednorunsupervised

Answer: C
Soft Computing

1312. Which among these are defuzzification methods


A. last maxima
 B. weighted Average
 C. Centroid Sum
 D.
Alloftheoptionsgiven

Answer: D
Soft Computing

1313. Proximity relation satisfies


A. Symmetric,reflexive and transitive B. refexive and symmetric
 C. reflexive
nad transitive
 D. Symmetricandrefexive

Answer: B
Soft Computing

1314. Fuzzy Logic has Values


A. 1and0
 B. between 1 and 0
 C. true or false
 D. Alloftheoptionsgiven

Answer: B
Soft Computing

1315. Fuzzy Set as


A. Crisp boundary
 B. Vague Boundary
 C. Certain Boundary
 D.
NoneoftheOptionsGiven

Answer: B
Soft Computing

1316. Belongingness of the object in fuzzy set is defined by


A. Boolean Value
 B. relation
 C. membership function D.
Alloftheoptionsgiven

Answer: C
Soft Computing

1317. Fuzzification Methods are


A. Intuition
 B. Inference
 C. Rank Ordering
 D. Alloftheoptionsgiven

Answer: D
Soft Computing

1318. 1.Which of the following conversion is not possible


(algorithmically)?
A. regular grammar to context-free grammar B. nondeterministic FSA to
deterministic FSA C. nondeterministic PDA to deterministic PDA D.
nondeterministicTMtodeterministicTM

Answer: c
Theory of Computation

1319. 2.Which of the following regular expression identity is


true?
A. r(*)=r*
 B. (r*s*)* = (r + s)* C. (r+s)*=r*+s* D. r*s*=r*+s*

Answer: b
Theory of Computation

1320. 3.Which of the following regular expressions denotes a


language comprising of all possible strings over Σ = {a, b} of
length n where n is a multiple of 3.
A. (a+b+aa+bb+aba+bba)* B. (aaa + bbb)*
 C. ((a+b)(a+b)(a+b))*
 D.
(aaa+ab+a)+(bbb+bb+a)

Answer: c
Theory of Computation

1321. 4.Can a DFSA simulate a NFSA


A. .No
 B. Yes
 C. sometimes
 D. dependsonNFA

Answer: b
Theory of Computation

1322. 5.Consider the following statements


A. B. C. D.

Answer:
Theory of Computation

1323.
A. B. C. D.

Answer:
Theory of Computation
1324. I. Recursive languages are closed under
complementation
A. I only B. IandII C. IandIII D. IIandIII

Answer: b
Theory of Computation

1325. II. Recursively enumerable languages are closed under


union
A. B. C. D.

Answer:
Theory of Computation

1326. III. Recursively enumerable languages are closed under


complementation
A. B. C. D.

Answer:
Theory of Computation

1327. Which of the above statement are TRUE?


A. B. C. D.

Answer:
Theory of Computation
1328. 6.Consider the following language
A. CFL but not regular
 B. CSL but not CFL
 C. regular
 D.
type0languagebutnottype1

Answer: b
Theory of Computation

1329. L = {anbncndn|n ≥ 1}
A. B. C. D.

Answer:
Theory of Computation

1330. L is
A. B. C. D.

Answer:
Theory of Computation

1331. 7.Consider three decision problems P1, P2 and P3. It is


known that P1 is decidable and P2 is undecidable. Which one
of the following is TRUE?
A. P3 is decidable if P1 is reducible to P3
 B. P3 is undecidable if P3 is reducible
to P2
 C. P3 is undecidable if P2 is reducible to P3
 D.
P3isdecidableifP3isreducibletoP2’scomplement

Answer: c
Theory of Computation

1332. 8.Which one is of the following is not decidable?


A. given a Turing machine M, a string s, and an integer k, M accepts s with k
steps B. equivalence of two given Turing machines
 C. language accepted by a
given DFSA is nonempty
 D. languagegeneratedbyaCFGisnonempty

Answer: b

Theory of Computation

1333.
A. B. C. D.

Answer:
Theory of Computation

1334. 9.Which of the following instances of the post


correspondence problem has a viable sequence (a solution)?
A. {(b, bb), (bb, bab), (bab, abb), (abb, babb)} B. {(ab, aba), (baa, aa), (aba,
baa)}
 C. {(ab, abb), (ba, aaa), (aa, a)}
 D. noneoftheabove

Answer: c
Theory of Computation

1335. 10.Which one of the following grammar generates L =


{ai bj ck|i ≠ k, i, j, k ≥ 1}
A. a.S→AC|CB B. b.S→aS|aA C. c.S→AB
 D. d.S→AC|CB
Answer: a
Theory of Computation

1336.

A. A→aA|a

B. A→bA|bB C. A → aAb|ab D. A→aA|ε

Answer:
Theory of Computation

1337.
A. B→Bc|c B. B→cB|c C. B → bBc|bc D. B→Bc|ε

Answer:
Theory of Computation

1338.
A. C → aCc|bD|b B.
 C.
 D. C→aCc|ε|bD

Answer:
Theory of Computation

1339.
A. D→bD|b B.
 C.
 D. D→bD|b|ε

Answer:
Theory of Computation

1340.
A. B. C. D.

Answer:
Theory of Computation

1341. 11.Let S be a NP–complete problem and Q and R be


two other problems not known to be in NP. Q is polynomial
time reducible to S and S is polynomial time reducible to R.
Which one of the following statements is TRUE?
A. R is NP complete B. RisNPhard
 C. Q is NP complete D. QisNPhard

Answer: b
Theory of Computation

1342.
A. B. C. D.

Answer:
Theory of Computation

1343. 12.Consider the following statements about the


context-free grammar G = {S → SS, S → ab, S → ba, S → c}
A. I only
 B. I and III only C. II and III only D. I,IIandIII

Answer: b
Theory of Computation

1344.
A. B. C. D.

Answer:
Theory of Computation

1345. I. G is ambiguous
A. B. C. D.

Answer:
Theory of Computation

1346. II. G produces all strings with equal number of a’s and
b’s
A. B. C.

D.

Answer:
Theory of Computation

1347. III. G can be accepted by a deterministic PDA


A. B. C. D.
Answer:
Theory of Computation

1348. 13.Which combination below expresses all the true


statements about G?
A. B. C. D.

Answer:
Theory of Computation

1349.
A. B. C. D.

Answer:

Theory of Computation

1350. Let Σ = {0, 1}, L1 = Σ* and L2 = {0n 1n|n ≥ 1} then the


languages L1 ∪ L2 and L2 are respectively
A. regular, regular
 B. regular, not regular
 C. not regular, regular
 D.
notregular,notregular

Answer: b
Theory of Computation

1351.
A. B. C. D.
Answer:
Theory of Computation

1352. 14.Which of the following statements is false?


A. The halting problem for Turing machines is undecidable
 B. determining
whether a context-free grammar is ambiguous is un-decidable
 C. given two
arbitrary context-free grammar, G1 and G2, it is undecidable with L(G1) =
L(G2) D.
giventworegulargrammarsG1andG2,itisundecidablewhetherL(G1)=L(G2)

Answer: d
Theory of Computation

1353.

A.

B. C. D.

Answer:
Theory of Computation

1354. 15.Define for a CFL L, init (L) = {u | uv ∊ L for some v ∊


{0, 1}*}. In other words init (L) is the set of prefixes of L. Let L
= {w|w ∊ {0, 1}+, w has equal number of 0’s and 1’s}. Then init
(L) is
A. the set of all binary strings with unequal number of 0’s and 1’s 


B. the set of all binary stings including ε 



C. the set of all binary strings with exactly one more 0 than the number of
1’s or one more 1 
 than the number of 0’s. 


D. noneoftheabove 


Answer: b
Theory of Computation

1355. 1. If the depth of a tree is 3 levels, then what is the Size


of the Tree?
A. 3 B. 4 C. 8 D. 12

Answer: C
ProgrammingFundamentals

1356. A linked list index is ____ that represents the position of


a node in a linked list.
A. An Integer B. A Variable C. A character

D. ABoolean

Answer: A
ProgrammingFundamentals

1357. 3. Which among the following can be solved using


Divide-and- Conquer strategies?
A. Merge Sort
 B. Linear Search C. Binary Search D. Insertionsort
Answer: a,d
ProgrammingFundamentals

1358. 4. What are the suitable operations of Priority Queues


(Heaps)?
A. delMin B. delAll C. Insert D. delLast

Answer: a,c
ProgrammingFundamentals

1359. 5. Identify the storage type of variables whose lifetime


begin with the evaluation of a specific statement or
expression and ends either at an explicit deallocation
statement or at program termination.
A. Static storage
 B. Local storage
 C. Dynamic Storage D.
PermanentStorage

Answer: c
ProgrammingFundamentals

1360. 6. Which of the following are correct on int (*a)[35] ?


A. declares an array of 35 pointers to ints B. declares a pointer to an array of 35
ints C. such a proposition does not exist
 D. 1and2

Answer: b
ProgrammingFundamentals
1361. 7. What type of error will the following generate?
Choose more than one answer, if necessary. int *x;*x=100;
A. compilation error
 B. logical error
 C. no compilation error D.
nologicalerror

Answer: b,c
ProgrammingFundamentals

1362. 8. Which among the following checks for an empty


stack?
A. int isempty (stack *s) { if (s->top == 100) return 1; else return (0); } B. int
isempty (stack *top) {if (top == 0) return (1); else return (0);}
 C. int isempty
(stack *top) { if (top == NULL) return (1); Else return (0); } D. Alloftheabove

Answer: c
ProgrammingFundamentals

1363. 9. Which of the following is true about a Binary Search


Tree?
A. All the elements of the left subtree of x are < x B. All the elements of the left
subtree of x are > x C. Both
 D. None

Answer: a
ProgrammingFundamentals

1364. 10. Which traversal algorithm uses recursion?


A. Breadth First Search B. Depth First Search C. Root First Search
 D.
LinearSearch

Answer: a
ProgrammingFundamentals

1365. 11. If a node in a data structure has multiple


predecessors and multiple successors, it is
A. Stack
 B. Linked list C. Tree
 D. Graph

Answer: d
ProgrammingFundamentals

1366. 12. Which data structure has applications in modeling


city map, social networks, state machines etc.,?
A. Tree
 B. Graph
 C. Binary Search Tree
 D. BalancedBinarySearchTree

Answer: b
ProgrammingFundamentals

1367. 13. Which among the following represents information


of its neighbours?
A. Adjacency List
 B. Adjacency Node C. Adjacency Matrix D. Alloftheabove

Answer: c
ProgrammingFundamentals

1368. 14. State true or false:


A. A tree is a graph with cycles. 


B. A graph is connected only if it has a spanning tree 


C. D.

Answer: a - false ; b - true


ProgrammingFundamentals

1369. 15. Which of the following is a two-dimensional array?


A. array anarray[20][20]; B. int anarray[20][20]; C. int array[20, 20];
 D.
chararray[20];

Answer: b

ProgrammingFundamentals

1370. Backpropagation is the most popular neural network


training technique for many practical problems. The main
reason is:
A. Since there are no hidden layers it converges faster than other
techniques
 B. Less computational expensive when compared to other
supervised learning techniques C. aandb
 D. noneoftheabove

Answer: b
Soft Computing

1371. Which of the following closely associates artificial


neural networks and biological neural systems
A. Processing element receives many signals
 B. Processing elements sums
the weighted inputs C. Fault tolerance
 D. alltheabove

Answer: b
Soft Computing

1372. Which of the following is false about fuzzy systems?


A. Fuzzy systems cannot be interpreted
 B. Fuzzy systems always require
expert knowledge
 C. Fuzzy logic helps to make decisions from imprecise data
D. Noneoftheabove

Answer: d
Soft Computing

1373. What learning rate should be used for backpropagation


training?
A. Low learning rate (0.01-0.09) to ensure convergence B. High learning rate
(0.6-0.90) for faster convergence

C. Moderate learning rate (0.05-0.25) to ensure convergence and prevent


oscillation D. Itcouldbedecidedonlybyatrialanderrorapproach

Answer: d
Soft Computing

1374. For a given problem which learning method could be


the most complicated to understand
A. Supervised learning
 B. Unsupervised learning
 C. All the above
 D.
Hybridlearningtechniques
Answer: d
Soft Computing

1375. Which of the following you would suggest as the best


technique for preconditioning the training data?
A. Normalize the data by dividing with a norm to make the Euclidian length
of the vector equal to 1. 


B. Standardizing the data sets by subtracting a measure of location and


dividing by a measure of scale 


C. Raw data is enough to train the network 


D. Thereisnobesttechniquethatwouldperformforallproblems 


Answer: a
Soft Computing

1376. Performance of neural networks for a particular


application will depend on
A. Architecture of the neural network B. Learning algorithm
 C. Initialization
of weights
 D. alltheabove

Answer: d
Soft Computing

1377. A bias in a neural network is


A. A connection weight from a neuron with a constant activation value B. A
weight that can be learned like other weights
 C. To improve learning and
faster convergence
 D. Noneoftheabove

Answer: c
Soft Computing

1378. Compared to other optimization techniques an


important feature of evolutionary computation is
A. Possibility of hybridization with other techniques B. Solution to difficult
problems
 C. Conceptual simplicity
 D. Populationbasedcollectivesearch

Answer: d
Soft Computing

1379. Which coding is most suitable for representing a multi


period job scheduling problem using a simple genetic
algorithm?
A. Binary encoding
 B. Real value representation C. Permutation
encoding
 D. Noneoftheabove

Answer: c

Soft Computing

1380. The basic difference between genetic algorithm and


evolutionary programming is
A. Data representation
 B. Reproduction operators C. Selection methods
 D.
aandb
Answer: c
Soft Computing

1381. Chose an application where evolutionary technique


might not give good results
A. Multi-objective optimization problem B. Financial forecasting problem
 C.
Timetabling problem
 D. noneoftheabove

Answer: d
Soft Computing

1382. Given the language L = {ab, aa, baa}, which of the


following strings are in L*?
A. abaabaaabaa, aaaabaaaa, baaaaabaaaab B. aaaabaaaa, baaaaabaaaab,
baaaaabaa C. abaabaaabaa, aaaabaaaa, baaaaabaa
 D.
abaabaaabaa,baaaaabaa,abaabaaabaa

Answer: abaabaaabaa, aaaabaaaa, baaaaabaa


Theory of Computation

1383. Given an arbitrary non-deterministic finite automaton


(NFA). with N
states, the maximum number of states in an equivalent
minimized DFA is at least.
A. N^2 B. 2^N C. 2N D. N!

Answer: 2^N
Theory of Computation

1384. Definition of a language L with alphabet {a} is given as


following. L= { a^nk | k > 0, and n is a positive integer
constant} What is the minimum number of states needed in a
DFA to recognize L?
A. k+1 B. n+1 C. 2^n+1 D. 2^k+1

Answer: n+1
Theory of Computation

1385. The lexical analysis for a modern language such as Java


needs the power of which one of the following machine
models in a necessary and sufficient sense?
A. Finite state automata
 B. Deterministic pushdown automata
 C. Non-
deterministic pushdown automata D. Turingmachine

Answer: Finite state automata


Theory of Computation

1386. Finite automata recognizes --------grammars

A. type-1

B. type-2 C. type-3 D. type-0

Answer: type-3
Theory of Computation
1387. Consider the following two statements: S1: { 0^2n | n >=
l} is a regu1ar language} S2: { 0^m 0^n 0^(m+n) | m >= 1 and n
>= 2} is a regu1ar language Which of the following
statements is correct?
A. Only S1 is correct
 B. Only S2 is correct
 C. Both S1 and S2 are correct D.
NoneofS1andS2iscorrect

Answer: Both S1 and S2 are correct


Theory of Computation

1388. A minimum state DFA accepting the language L={w/w


belongs {0,1}*} number of 0s and 1s in w are divisible by 3 and
5, respectively} has
A. 15 states B. 7 states C. 9 states D. 8states

Answer: 15 states
Theory of Computation

1389. The number of states in DFA is --------than the number


of states in NFA for the same Language.
A. Greater
 B. less
 C. greater equal

D. equal

Answer: Greater
Theory of Computation
1390. Which of the following statement is true?
A. NFA is more powerful than DFA B. DFA is more powerful than NFA C. NFA
and DFA have equal power D. Allthearetrue

Answer: NFA and DFA have equal power


Theory of Computation

1391. Let L = {Epsilon} (i.e., L consist the empty string only).


Then L^+ =?
A. L^+={}
 B. L^+ = {Epsilon } C. can not be defined D. noneofthem

Answer: L^+ = { }
Theory of Computation

1392. Finite automata --------------- memory


A. No auxiliary memory B. Finite
 C. Infinite
 D. none

Answer: No auxiliary memory

Theory of Computation

1393. The recognizing capabilities of NDFSM and DFSM


A. may be different B. must be different C. must be same
 D. noneoftheabove

Answer: must be same


Theory of Computation
1394. When a state in a FA has self loop its regular expression
will have - ------------
A. dot
 B. star
 C. binary+ D. uniary+

Answer: star
Theory of Computation

1395. When there are infinite distinguishable strings then


there cannot be a -------------
A. automata
 B. finite automata
 C. regular expression
 D.
bothfiniteautomataandregularexpression

Answer: both finite automata and regular


expression
Theory of Computation

1396. A NFA converted to DFA has more than one final state.
A. TRUE B. FALSE

C. may be true D. alwaystrue

Answer: may be true


Theory of Computation

1397. The basic limitation of FSM is that


A. it sometimes fails to recognize grammars that are regular B. it sometimes
recognized grammars that are not regular
 C. it cannot remember arbitrary
large amounts of information D. allofthecommentsaretrue

Answer: it cannot remember arbitrary large


amounts of information
Theory of Computation

1398. If M1 machine recognizing L with n states, then M2


recognizing L* constructed Using Thompson construction
will have ------------- states.
A. n B. n+1 C. n+2 D. n-1

Answer: n+2
Theory of Computation

1399. Which of the following is a variation of Frequency


Division Multiplexing (FDM) ?
A. TDM
 B. PCM
 C. WDM
 D. Noneofthese

Answer: C
Computer Networks

1400. Switch is a Device of _________ Layer of OSI Model.


A. Network Layer
 B. Data Link Layer C. Application Layer D. SessionLayer

Answer: B
Computer Networks
1401. Star Topology is Based On a Central Device that can be
__________ ?
A. HUB
 B. Switch
 C. Only A
 D. BothAandB

Answer: A
Computer Networks

1402. TCP/IP is also well known as _______.


A. OSI Model
 B. TCP Model
 C. DOD Model
 D. NetworkModel

Answer: C
Computer Networks

1403. Which layer functions as liaison between user support


layers and network support layers ?

A. network layer B. physical layer C. transport layer D. sessionlayer

Answer: C
Computer Networks

1404. Which protocol works at the Transport layer and


provides virtual circuits between hosts?
A. IP B. ARP C. TCP D. UDP

Answer: C
Computer Networks
1405. Radio communication frequencies ranges from?
A. 3KHzto300KHz B. 3KHzto300GHz C. 300KHzto3GHz D. 3KHzto3,000GHz

Answer: B
Computer Networks

1406. What is the main function of transport layer ?


A. node to node delivery
 B. process to process message delivery
 C.
synchronization
 D. updatingandmaintenanceofroutingtables

Answer: B
Computer Networks

1407. To deliver a message to the correct application


program running on a host, the .... address must be consulted
?
A. port
 B. physical C. IP
 D. None

Answer: A
Computer Networks

1408. ATM (Asynchronous Transfer Mode) is fundamentally


a....... technology?
A. Circuit switching B. Packet switching C. Narrow band
 D. Noneofthese

Answer: B
Computer Networks
1409. _________ have a single communication channel that is
shared by all the users on the network. ?
A. Point-to-Point
 B. Broadcast Network C. Protocol
 D. PAN

Answer: B

Computer Networks

1410. Which of the following is required to communicate


between two computers?
A. communications software
 B. protocol
 C. communication hardware
 D.
allofaboveincludingaccesstotransmissionmedium

Answer: D
Computer Networks

1411. Which of the following transmission systems provide


the highest data rate to in individual device?
A. computer bus B. telephone lines C. voice and mode D. leaselines

Answer: A
Computer Networks

1412. Communication circuits that transmit data in both


directions but not at the same time are operating in
A. simplex mode
 B. half duplex mode
 C. a full duplex mode
 D.
anasynchronousmode
Answer: B
Computer Networks

1413. A protocol is a set of rules governing a time sequence of


events that must take place ?

A. between peers

B. between an interface C. between modems
 D. acrossaninterface

Answer: A
Computer Networks

1414. The variability of memory access time can be increased


by
A. CPU
 B. Main memory C. Cache memory D. none

Answer: C
Embedded Systems

1415. Identify the true statement


A. SRAM is faster than DRAM
 B. SRAM consumes less power than DRAMS C.
RAM values must be periodically refreshed D. none

Answer: A
Embedded Systems

1416. Pick out the traits of embedded system


A. power constrained
 B. highly reliable
 C. diversified processors and OS D.
costinsensitive

Answer: A,B,C

Embedded Systems

1417. Which of the following below are examples of


peripherals?
A. USB
 B. Networks
 C. Timers
 D. Alltheabove

Answer: C
Embedded Systems

1418. Pick out an example for peripheral from the following?


A. Peripherals
 B. Processors
 C. OS
 D. Microcontrollers

Answer: A
Embedded Systems

1419. Which is/are the most commonly used debugging


tool(s) for application code?
A. Simulator
 B. Emulator
 C. Bothaandb D. JUnit

Answer: C
Embedded Systems

1420. With ----------- interrupts, the address of the ISR is


provided by the peripheral to reduce the latency

A. Strobe
 B. Vectored C. handshake D. fixed

Answer: B
Embedded Systems

1421. Which of the following serial protocol is used in


automotive industry?
A. USB B. SPI C. I2C D. CAN

Answer: D
Embedded Systems

1422. Which are the add-on features of ARM over RISC?


A. Barrel Shifter
 B. Auto inc and dec instructions
 C. Load / Store Multiple
data and instruction bytes D. Alltheabove

Answer: D
Embedded Systems

1423. A context switch involves


A. Saving the address space of a process
 B. Switching between two different
processes C. Saving the registers of a process
 D. Alloftheabove

Answer: D
Embedded Systems

1424. Which of the following can cause a negative


instruction-cache effect?
A. Function in-lining
 B. Aligned/packed data structures C. Induction
variables
 D. Deadcodeelimination

Answer: A
Embedded Systems

1425. Real-Time systems


A. must be embedded
 B. respond to external events in a timely fashion C.
can never tolerate missed deadlines
 D. requireakernel

Answer: B
Embedded Systems

1426. An automated teller machine would be classified as


what type of real-time system:
A. soft
 B. hard
 C. medium D. none

Answer: A
Embedded Systems

1427. Response time is the total time:


A. it takes to convert analog to digital in a digital display thermometer
 B. it
takes to resolve a number flight simulation game
 C. between seeing a
stimulus and finally acting according to that stimulus D. aprocessorisutilized
Answer: C
Embedded Systems

1428. In non-preemptive scheduling, release of the CPU is


determined by the kernel:
A. TRUE 


B. FALSE 


C. D.

Answer: B
Embedded Systems

1429. Which of the following is a correct comment?


A. */ Comments */ B. ** Comment ** C. /* Comment */ D. {Comment}

Answer: /* Comment */
Object Oriented Paradigm

1430. What punctuation ends most lines of C++ code?


A. . (dot)
 B. ; (semi-colon) C. : (colon)

D. '(singlequote)

Answer: ; (semi-colon)
Object Oriented Paradigm

1431. What punctuation is used to signal the beginning and


end of code blocks in C?
A. {}
 B. ->and<-
 C. BEGIN and END D. (and)

Answer: { }
Object Oriented Paradigm

1432. Which of the following can not be used as identifiers?


A. Letters
 B. Digits
 C. Underscores D. Spaces

Answer: Spaces
Object Oriented Paradigm

1433. What is the only function all C++ programs must


contain?
A. start()
 B. system() C. main()
 D. program()

Answer: main()

Object Oriented Paradigm

1434. Which of the following is not a correct variable type?


A. float B. real
 C. int
 D. double

Answer: real
Object Oriented Paradigm

1435. By default fields in a C++ class are


A. Public
 B. Private
 C. void
 D. Protected

Answer: Private
Object Oriented Paradigm

1436. The difference between x and ‘x’ is


A. The first one refers to a variable whose identifier is x and the second one
refers to the character constant x 


B. The first one is a character constant x and second one is the string literal
x


C. Both are same 


D. Noneofthese 


Answer: The first one refers to a variable whose


identifier is x and the second one refers to the
character constant x
Object Oriented Paradigm

1437. The directives for the preprocessors begin with


A. Ampersand symbol (&) B. Two Slashes (//)
 C. Number Sign (#)
 D.
Lessthansymbol(<)

Answer: Number Sign (#)


Object Oriented Paradigm

1438. The while loop is referred to as a _____ loop because


the loop condition is tested at the beginning of the loop
A. beginning B. pretest C. priming D. initial

Answer: pretest
Object Oriented Paradigm

1439. Which of the following calls a function named


displayName, passing it no actual arguments?
A. displayName();
 B. displayName;
 C. call displayName (); D.
calldisplayName;

Answer: displayName();
Object Oriented Paradigm

1440. Two access specifiers in C++ are


A. int and double
 B. public and private C. void and free
 D.
formalandinformal

Answer: public and private


Object Oriented Paradigm

1441. The last statement in a function is often a _____


A. finish
 B. return
 C. goodbye
 D. endfunction

Answer: return
Object Oriented Paradigm
1442. Which of the following is an access specifier?
A. protected B. safe
 C. particular D. shielded

Answer: protected
Object Oriented Paradigm

1443. Which of the following is the correct order of evaluation


for the expression? z = x + y * z / 4 % 2 - 1
A. *%/-+= B. /*%-+= C. */%+-= D. =*/%+-

Answer: * / % + - =

Object Oriented Paradigm

1444. The translator used by second generation language is?


A. compiler B. interpreter C. assembler D. linker

Answer: C
Programming language translator

1445. The first Indian analog computer was implemented by


Indian stastical Institute of Culcutta in
A. 1947 B. 1956 C. 1953 D. 1961

Answer: C
Programming language translator

1446. Analysis which determines the meaning of a statement


once its grammatical structure becomes known is termed as
A. Semantic analysis B. Syntax analysis C. Lexical analysis D. Generalanalysis

Answer: A
Programming language translator

1447. Symbolic names can be associated with


A. Information
 B. data or instruction

C. operand
 D. mnemonicoperation

Answer: B
Programming language translator

1448. Any given transition graph has equivalent


A. Regular Expression B. DFSM
 C. NFSM
 D. Alloftheabove

Answer: D
Programming language translator

1449. Which sentence can be generated by S-->aS | bA ,A->d |


ccA
A. bccddd B. abbbd C. aabccd D. ababccd

Answer: C
Programming language translator

1450. A shift reduce parser carries out the actions specified


within braces immediately after redicing with the
corresponding rule of grammar S-->xxW { print “1”} S-->y {
print “2” } S-->Sz { print “3” } What is the translation of
xxxxyzz using the SDT scheme described by the above rules
A. 23131 B. 11233 C. 11231 D. 33211

Answer: A
Programming language translator

1451. Which of the following is the most powerful parsing


method?
A. LL(1) B. CLR C. SLR D. LALR

Answer: B
Programming language translator

1452. Consider a program P that consists of two source


modules M1 and M2 contained in two different files. If M1
contains a reference to a function defined in M2 the
reference will be resolved at
A. Edit time
 B. Compile time C. Link time
 D. Loadtime

Answer: C
Programming language translator

1453. A basic block can be analyzed by


A. Flow graph
 B. A graph with cycles C. DAG
 D. Alloftheabove

Answer: C

Programming language translator

1454. Access time is minimum for accessing the symbol table


which uses
A. Search tree B. Hash table C. List
 D. Stack

Answer: B
Programming language translator

1455. Replacement of an expensive operation by a cheaper


one is termed as
A. reduction in strength
 B. code motion
 C. loop-in variant computation D.
None

Answer: C
Programming language translator

1456. Consider the C code fragment prometheus( ) { int x,


*p=&x; } Above code has the problem that is called
A. Dead variable
 B. Dead assignment C. Pointer aliasing
 D.
Illegaluseofpointer

Answer: C
Programming language translator
1457. Consider the following statements S1:In dominator
tree, in which
the initial node is the root ,and each node d Dominates only
its ancestors in the tree S2: In terms of the dom relations, the
immediate m has the property that if d! =n and d dom m
Choose the correct option
A. S1 and S2 true B. S1 true
 C. S2 true
 D. None

Answer: C
Programming language translator

1458. Consider the following statement if(exp) statement 1


else statement 2 Which one of the following describe the
above statement
A. Redgular grammar
 B. Context free grammar
 C. BothAandB
 D.
Contextsensitivegrammar

Answer: B
Programming language translator

1459. A __________ is anything that can cause harm


A. Vulnerability B. phish
 C. threat
 D. spoof

Answer: C
Information Security
1460. In the right setting a thief will steal your information by
simply watching what you type

A. snagging

B. spying
 C. social engineering D. shouldersurfing

Answer: D
Information Security

1461. A __________ is a small program embedded inside of a


GIF image.
A. web bug
 B. cookie
 C. spyware application D. spam

Answer: A
Information Security

1462. A hacker contacts you my phone or email and attempts


to acquire your password.
A. spoofing B. phishing C. spamming D. bugging

Answer: B
Information Security

1463. This power protection device includes a battery that


provides a few minutes of power.
A. surge suppressor B. line conditioner C. generator
 D. UPS
Answer: D
Information Security

1464. The phrase __________ describes viruses worms Trojan


horse attack applets and attack scripts.
A. malware B. spam
 C. phish
 D. virus

Answer: A
Information Security

1465. A hacker that changes or forges information in an


electronic resource is engaging in __________.
A. denial of service B. sniffing
 C. terrorism
 D. datadiddling

Answer: D
Information Security

1466. Hackers often gain entry to a network be pretending to


be at a legitimate computer.
A. spoofing B. forging
 C. IP spoofing D. IDtheft

Answer: C

Information Security

1467. The __________ of a threat measures its potential


impact on a system.
A. vulnerabilities
 B. countermeasures C. degree of harm D. susceptibility

Answer: C
Information Security

1468. The power level drops below 120V.


A. brownout B. spike
 C. blackout D. surge

Answer: B
Information Security

1469. __________cookies are also known as transient


cookies.
A. Third-party B. First-party C. Session
 D. Persistent

Answer: C
Information Security

1470. Which of the following will not protect you from spam?
A. spam blockers B. e-mail rules
 C. popup blocker

D. filters

Answer: C
Information Security

1471. A __________s main purpose is to prohibit


unauthorized access to your computer via the Internet.
A. popup blocker B. firewall
 C. spyware blocker D. spamassassin

Answer: B
Information Security

1472. To read the system messages and warnings access the


__________ in Windows.
A. system manager B. control panel
 C. event viewer
 D. messagescreen

Answer: C
Information Security

1473. Before discarding a financial document you should


__________.
A. copy it B. shred it C. file it
 D. postit

Answer: B

Information Security

Scripted with at Sir C V Raman Block

Vous aimerez peut-être aussi