Vous êtes sur la page 1sur 31

Communication Related Question:

1. Amplitude modulation is the process of

a. superimposing a low frequency on a high frequency


b. superimposing a high frequency on a low frequency
c. carrier interruption
d. frequency shift and phase shift

2. Indicate the false statement. The need for modulation can best be exemplified by the following.

a. Antenna lengths will be approximately λ/4 long


b. An antenna in the standard broadcast AM band is 16,000 ft
c. All sound is concentrated from 20 Hz to 20 kHz
d. A message is composed of unpredictable variations in both amplitude and frequency

3. With an IP address of 100, you currently have 80 subnets. What subnet mask should you use to
maximize the number of available hosts?

a. 224

b. 240

c. 248

d. 252

4. The process of sending and receiving started as early as

a. the middle 1930s


b. 1850
c. the beginning of the twentieth century
d. the 1840s

5. The modulation index of an AM wave is changed from 0 to 1. The transmitted power is

a. unchanged
b. halved
c. doubled
d. increase by 50 percent

6. Frames from one LAN can be transmitted to another LAN via the device
A. Router

B. Bridge

C. Repeater

D. Modem

7. The difference between phase and frequency modulation

a. is purely theoretical because they are the same in practice


b. is too great to make the two system compatible
c. lies in the poorer audio response of phase modulation
d. lies in the different definitions of the modulation index

8. In CRC there is no error if the remainder at the receiver is _____.

A. equal to the remainder at the sender

B. zero

C. nonzero

D. the quotient at the sender

9. Full duplex operation

a. requires two pairs of cables


b. can transfer data in both directions at once
c. requires modems at both ends of the circuit
d. all of the above

10. Which of the following device is used to connect two systems, especially if the systems use
different protocols?

A. hub

B. bridge

C. gateway
D. repeater

11. Which of the following antennas is best excited from a waveguide?

a. Biconical
b. Horn
c. Helical
d. Discone

12. How many hosts are attached to each of the local area networks at your site?

A. 128

B. 254

C. 256

D. 64

a. Good bandwidth
b. Parasitic elements
c. Folded dipole
d. High gain

14. Digital signals


a. do not provide a continuous set of values
b. represent values as discrete steps
c. can utilize decimal or binary systems
d. all of the above

Database related question:

15. The following are components of a database except ________ .


A. user data
B. metadata
C. reports
D. indexes

16. SQL stands for ________ .


A. Structured Query Language
B. Sequential Query Language
C. Structured Question Language
D. Sequential Question Language
17. The following are functions of a DBMS except ________ .

A. creating and processing forms


B. creating databases
C. processing data
D. administrating databases

18. The SQL WHERE clause:

A. limits the column data that are returned.


B. limits the row data are returned.
C. Both A and B are correct.
D. Neither A nor B are correct.

19. SQL data definition commands make up a(n) ________ .

A. DDL
B. DML
C. HTML
D. XML

20. The SQL keyword(s) ________ is used with wildcards.

A. LIKE only
B. IN only
C. NOT IN only
D. IN and NOT IN

21. Which of the following is the correct order of keywords for SQL SELECT statements?

A. SELECT, FROM, WHERE


B. FROM, WHERE, SELECT
C. WHERE, FROM,SELECT
D. SELECT,WHERE,FROM

22. Which of the following are the five built-in functions provided by SQL?

A. COUNT, SUM, AVG, MAX, MIN


B. SUM, AVG, MIN, MAX, MULT
C. SUM, AVG, MULT, DIV, MIN
D. SUM, AVG, MIN, MAX, NAME
23. To remove duplicate rows from the results of an SQL SELECT statement, the ________ qualifier
specified must be included.

A. ONLY
B. UNIQUE
C. DISTINCT
D. SINGLE

24. SQL query and modification commands make up a(n) ________ .


A. DDL
B. DML
C. HTML
D. XML

25. The SQL keyword BETWEEN is used:

A. for ranges.
B. to limit the columns displayed.
C. as a wildcard.
D. None of the above is correct.

26. Row is synonymous with the term:

A. record.
B. relation.
C. column.
D. field.

27. The primary key is selected from the:

A. composite keys.
B. determinants.
C. candidate keys.
D. foreign keys.

28. A relation is considered a:

A. Column.
B. one-dimensional table.
C. two-dimensional table.
D. three-dimensional table.

29. What type of join is needed when you wish to include rows that do not have matching values?

A. Equi-join
B. Natural join
C. Outer join
D. All of the above.
30. What type of join is needed when you wish to return rows that do have matching values?

A. Equi-join
B. Natural join
C. Outer join
D. All of the above.

31. Which of the following is one of the basic approaches for joining tables?
A. Subqueries
B. Union Join
C. Natural join
D. All of the above

OS Related Question

32. Which of the following refers to the associative memory?

A. the address of the data is generated by the CPU


B. the address of the data is supplied by the users
C. there is no need for an address i.e. the data is used as an address
D. the data are accessed sequentially

33. To avoid the race condition, the number of processes that may be simultaneously inside their
critical section is

A. 8
B. 1
C. 16
D. 0

34. Process is

A. program in High level language kept on disk


B. contents of main memory
C. a program in execution
D. a job in secondary memory

35. Which of the following systems software does the job of merging the records from two files into
one?

A. Security software
B. Utility program
C. Networking software
D. Documentation system

36. Thrashing

A. is a natural consequence of virtual memory systems


B. can always be avoided by swapping
C. always occurs on large computers
D. can be caused by poor paging algorithms

37. Which command is used to sort the lines of data in a file in reverse order

A. sort
B. sh
C. st
D. sort –r
38. Which command is used to display the top of the file?

A. cat
B. head
C. more
D. grep

39. What hardware architectures are not supported by Red Hat?

A. SPARC
B. IBM-compatible
C. Alpha
D. Macintosh

40. What does FSF stand for?

A. Free Software File


B. File Server First
C. First Serve First
D. Free Software Foundation

41. The part of machine level instruction, which tells the central processor what has to be done, is

A. Operation code
B. Address
C. Locator
D. Flip-Flop

42. Addressing structure

A. defines the fundamental method of determining effective operand addresses


B. are variations in the use of fundamental addressing structures, or some associated actions which
are related to addressing.
C. performs indicated operations on two fast registers of the machine and leave the result in one of
the registers.
D. all of the above

43. The Memory Buffer Register (MBR)

A. is a hardware memory device which denotes the location of the current instruction being
executed.
B. is a group of electrical circuits (hardware), that performs the intent of instructions fetched from
memory.
C. contains the address of the memory location that is to be read from or stored into.
D. contains a copy of the designated memory location specified by the MAR after a "read" or the
new contents of the memory prior to a "write".

44. The memory allocation scheme subject to "external" fragmentation is

A. segmentation
B. swapping
C. pure demand paging
D. multiple contiguous fixed partitions

45. What is the name of the operating system for the laptop computer called MacLite?

A. Windows
B. DOS
C. MS-DOS
D. OZ

46. Which of the following are(is) Language Processor(s)

A. assembles
B. compilers
C. interpreters
D. All of the above

47. The FIFO algorithm

A. executes first the job that last entered the queue


B. executes first the job that first entered the queue
C. execute first the job that has been in the queue the longest
D. executes first the job with the least processor needs

IT security:

48. Which of the following is an anti-virus program


A. Norton
B. K7
C. Quick heal
D. All of these

49. All of the following are examples of real security and privacy threats except:
A. Hackers
B. Virus
C. Spam
D. Worm

50. Trojan horses are very similar to virus in the matter that they are computer programs that
replicate copies of themselves
A. True
B. False

51. Viruses are __________.


A. Man made
B. Naturally occur
C. Machine made
D. All of the above
52. Firewall is a type of ____________.
A. Virus
B. Security threat
C. Worm
D. None of the above

53. Unsolicited commercial email is known as ____________.


A. Spam
B. Malware
C. Virus
D. Spyware

54. Which of the following is not an external threat to a computer or a computer network
A. Ignorance
B. Trojan horses
C. Adware
D. Crackers

55. Which of the following is a class of computer threat


A. Phishing
B. Soliciting
C. DoS attacks
D. Stalking

56. When a person is harrassed repeatedly by being followed, called or be written to he / she is a
target of
A. Bullying
B. Stalking
C. Identity theft
D. Phishing

57. A lincense allows a user to use copyrighted material.


A. True
B. False

58. It is a program or hardware device that filters the information coming through an internet
connection to a network or computer system.
A. Anti virus
B. Cookies
C. Firewall
D. Cyber safety

59. It allow a visited website to store its own information about a user on the user’s computer.
A. Spam
B. Cookies
C. Malware
D. Adware

Networking:

60. How many digits of the DNIC (Data Network Identification Code) identify the country?
A. first three
B. first four
C. first five
D. first six

61. A station in a network forwards incoming packets by placing them on its shortest output queue.
What routing algorithm is being used?

A. hot potato routing


B. flooding
C. static routing
D. delta routing

62. Frames from one LAN can be transmitted to another LAN via the device

A. Router
B. Bridge
C. Repeater
D. Modem

63. You have a class A network address 10.0.0.0 with 40 subnets, but are required to add 60 new
subnets very soon. You would like to still allow for the largest possible number of host IDs per
subnet. Which subnet mask should you assign?

A. 255.240.0.0
B. 255.248.0.0
C. 255.252.0.0
D. 255.254.0.0

64. What are the most commonly used transmission speeds in BPS used in data communication?

A. 300
B. 1200
C. 2400
D. 9600

65. Which of the following is used for modulation and demodulation?

A. modem
B. protocols
C. gateway
D. multiplexer

66. Which of the following is not a disadvantage of wireless LAN?

A. Slower data transmission


B. higher error rate
C. interference of transmissions from different computers
D. All of the above
67. The Internet Control Message Protocol (ICMP)

A. allows gateways to send error a control messages to other gateways or hosts


B. provides communication between the Internet Protocol Software on one machine and the
Internet Protocol Software on another
C. reports error conditions to the original source, the source must relate errors to individual
application programs and take action to correct the problem
D. All of the above

68. A modem is connected in between a telephone line and a

A. network
B. computer
C. communication adapter
D. serial port

69. Which utility is an all-purpose tool for troubleshooting TCP/IP problems?

A. NBTSTAT
B. Netstat
C. PING
D. Hostname

70. With an IP address of 201.142.23.12, what is your default subnet mask?

A. 0.0.0.0
B. 255.0.0.0
C. 255.255.0.0
D. 255.255.255.0

71. IEEE project 802 divides the data link layer into an upper _____ sublayer and a lower _____
sublayer.

A. HDLC, PDU
B. PDU, HDLC
C. MAC, LLC
D. LLC, MAC

72. A medium access control technique for multiple access transmission media is

A. Aloha
B. Amplitude
C. Angle modulation
D. Attenuation

73. Which of the following TCP/IP protocol is used for remote terminal connection service?

A. TELNET
B. FTP
C. RARP
D. UDP
74. Which of the following transmission systems provides the highest data rate to an individual
device

A. Computer bus
B. Telephone lines
C. Voice band modem
D. leased lines

75. Which of the following connectivity devices is used to extend a network on a purely mechanical
basis?

A. Gateway
B. Switch
C. Router
D. Active hub

Computer Fundamental:

76. Which of the following languages is more suited to a structured program?

A. PL/1
B. FORTRAN
C. BASIC
D. PASCAL

77. The brain of any computer system is

A. ALU
B. Memory
C. CPU
D. Control unit

78. Which of the following computer language is used for artificial intelligence?

A. FORTRAN
B. PROLOG
C. C
D. COBOL

79. A computer program that converts assembly language to machine language is

A. Compiler
B. Interpreter
C. Assembler
D. Comparator

80. The time for which a piece of equipment operates is called

A. Seek time
B. Effective time
C. Access time
D. Real time

81. Which access method is used for obtaining a record from a cassette tape?

A. Direct
B. Sequential
C. Random
D. All of the above

82. A program component that allows structuring of a program in an unusual way is known as

A. Correlation
B. Coroutine
C. Diagonalization
D. Quene

83. A single packet on a data link is known as

A. Path
B. Frame
C. Block
D. Group

84. The process of communicating with a file from a terminal is

A. Interactive
B. Interrogation
C. Heuristic
D. All of the above

85. A common boundary between two systems is called

A. Interdiction
B. Interface
C. Surface
D. None of the above
86.Apply DeMorgan’s theorems to each expression:

( A+ B) Ć´ D́+ E+ F́

´ D́) EF
a)( A+ B́+C b)( Á B́+C+ D) É F ´ + D)( E+ F́)
c)( ABC ´ + D́)EF
c) ( A+ BC

87.On the fifth clock pulse, a 4-bit Johnson sequence is Q0 = 0, Q1 = 1, Q2 = 1, and Q3 = 1. On the
sixth clock pulse, the sequence is ________.

a) Q0 = 1, Q1 = 0, Q2 = 0, Q3 = 0

b) Q0 = 1, Q1 = 1, Q2 = 1, Q3 = 0

c) Q0 = 0, Q1 = 0, Q2 = 1, Q3 = 1

d) Q0 = 0, Q1 = 0, Q2 = 0, Q3 = 1

88. Which of the following is an invalid BCD code?

a) 0011

b) 1101

c) 0101

d) 1001

89. What is the major advantage of the J-K flip-flop over the S-R flip-flop?

a) The J-K flip-flop is much faster.

b) The J-K flip-flop does not have propagation delay problems.

c) The J-K flip-flop has a toggle state.

d) The J-K flip-flop has two outputs.


90.

a
10011110
)

b
01211110
)

c) 000100000100

d
001000001000
)

91 How many inputs of a four-input AND gate must be HIGH in order for the output of the logic gate
to go HIGH?

a) any one of the inputs

b) any two of the inputs

c) any three of the inputs

d) all four inputs

92. In the decimal numbering system, what is the MSD?

A. The middle digit of a stream of numbers

B. The digit to the right of the decimal point

C. The last digit on the right

D. The digit with the most weight


93. Which of the following is a semiconductor memory?

A. RAM

B. MAR

C. CD-ROM

D. CD

94. Convert the fractional decimal number 6.75 to binary.

A. 0111.1100

B. 0110.1010

C. 0110.1100

D. 0110.0110

95.

From the truth table below, determine the standard SOP expression.

A.

B.

C
.
D
.

96. Which statement below best describes a Karnaugh map?

A. A Karnaugh map can be used to replace Boolean rules.

B. The Karnaugh map eliminates the need for using NAND and NOR gates.

C. Variable complements can be eliminated by using Karnaugh maps.

D. Karnaugh maps provide a cookbook approach to simplifying Boolean expressions.

97. What is one disadvantage of an S-R flip-flop?

A. It has no enable input.

B. It has an invalid state.

C. It has no clock input.

D. It has only a single output.

98. The circuit given below fails to function; the inputs are checked with a logic probe and the
following indications are obtained: CLK, J1, J2, J3, K1, K2, and K3 are pulsing. Q and   are
HIGH.   and PRE are LOW. What could be causing the problem?

A. There is no problem.
B. The clock should be held HIGH.

C
The PRE is stuck LOW.
.

D
The CLR is stuck HIGH.
.

99. The 2's complement of 11100111 is ________.

A. 11100110

B. 00011001

C. 00011000

D. 00011010

100. Convert the binary number 1100 to Gray code.

A. 0011

B. 1010

C. 1100

D. 1001

101. Which of the following function sets first n characters of a string to a given character?

A. strinit()

B. strnset()

C. strset()

D. strcset()

102. When double is converted to float, then the value is?

a) Truncated
b) Rounded

c) Depends on the compiler

d) Depends on the standard

103. Suppose that you would like to create an instance of a new Map that has an iteration order
that is the same as the iteration order of an existing instance of a Map. Which concrete
implementation of the Map interface should be used for the new instance?

A. TreeMap

B. HashMap

C. LinkedHashMap

D. The answer depends on the implementation of the existing instance.

104. Which interface does java.util.Hashtable implement?

A. Java.util.Map

B. Java.util.List

C. Java.util.HashTable

D. Java.util.Collection

105.

What will be the output of the program?


public class Test
{
public static void leftshift(int i, int j)
{
i <<= j;
}
public static void main(String args[])
{
int i = 4, j = 2;
leftshift(i, j);
System.out.printIn(i);
}
}
A. 2

B. 4

C
8
.

D
16
.

106.

What will be the output of the program?


class Test
{
public static void main(String [] args)
{
int x= 0;
int y= 0;
for (int z = 0; z < 5; z++)
{
if (( ++x > 2 ) || (++y > 2))
{
x++;
}
}
System.out.println(x + " " + y);
}
}

A. 53

B. 82

C
83
.

D
85
.

107.

What will be the output of the program?


class SSBool
{
public static void main(String [] args)
{
boolean b1 = true;
boolean b2 = false;
boolean b3 = true;
if ( b1 & b2 | b2 & b3 | b2 ) /* Line 8 */
System.out.print("ok ");
if ( b1 & b2 | b2 & b3 | b2 | b1 ) /*Line 10*/
System.out.println("dokey");
}
}

A. ok

B. dokey

C
ok dokey
.

D
No output is produced
.

E. Compilation error

108.

What will be the output of the program?


class BitShift
{
public static void main(String [] args)
{
int x = 0x80000000;
System.out.print(x + " and ");
x = x >>> 31;
System.out.println(x);
}
}

A. -2147483648 and 1

B. 0x80000000 and 0x00000001

C
-2147483648 and -1
.

D
1 and -2147483648
.

109. Which two are valid constructors for Thread?

1. Thread(Runnable r, String name)


2. Thread()
3. Thread(int priority)
4. Thread(Runnable r, ThreadGroup g)
5. Thread(Runnable r, int priority)
A. 1 and 3

B. 2 and 4

C. 1 and 2

D. 2 and 5

110. Which of the following will not directly cause a thread to stop?

A. notify()

B. wait()

C. InputStream access

D. sleep()

111. What does the following declaration mean?

int (*ptr)[10];

A. ptr is array of pointers to 10 integers

B. ptr is a pointer to an array of 10 integers

C. ptr is an array of 10 integers

D. ptr is an pointer to array

112. In which order do the following gets evaluated?

1. Relational

2. Arithmetic

3. Logical

4. Assignment

A. 2134

B. 1234

C. 4321
D. 3214

113. How will you free the allocated memory ?

A. remove(var-name);

B. free(var-name);

C. delete(var-name);

D. dalloc(var-name);

114. We want to round off x, a float, to an int value, The correct way to do is

A. y = (int)(x + 0.5)

B. y = int(x + 0.5)

C. y = (int)x + 0.5

D. y = (int)((int)x + 0.5)

115. Which of the following are unary operators in C?

1. !

2. sizeof

3. ~

4. &&

A. 1, 2

B. 1, 3

C. 2, 4

D. 1, 2, 3
116. Binary search tree has best case run-time complexity of Ο(log n). What could the worst case?

A . Ο(n)

B . Ο(n2 )

C . Ο(n3 )

D . None of the above

117. The Θ notation in asymptotic evaluation represents −

A . Base case

B . Average case

C . Worst case

D . NULL case

118. The postfix form of the expression (A+ B)*(C*D- E)*F / G is?

a) AB+ CD*E – FG /**

b) AB + CD* E – F **G /

c) AB + CD* E – *F *G /

d) AB + CDE * – * F *G /

119. A queue is a ?

a) FIFO (First In First Out) list

b) LIFO (Last In First Out) list

c) Ordered array
d) Linear tree

120. In a stack, if a user tries to remove an element from empty stack it is called _________

a) Underflow

b) Empty collection

c) Overflow

d) Garbage Collection

121. How do you initialize an array in C?

a) int arr[3] = (1,2,3);

b) int arr(3) = {1,2,3};

c) int arr[3] = {1,2,3};

d) int arr(3) = (1,2,3);

122. When does the ArrayIndexOutOfBoundsException occur?

a) Compile-time

b) Run-time

c) Not an error

d) None of the mentioned

123. Which of these best describes an array?

a) A data structure that shows a hierarchical behavior

b) Container of objects of similar types

c) Container of objects of mixed types

d) All of the mentioned


124. What is the time complexity of enqueue operation?

a) O(logn)

b) O(nlogn)

c) O(n)

d) O(1)

125. Which of the following is not a fibonnaci number?

a) 8

b) 21

c) 55

d) 14

126. Which of the following application makes use of a circular linked list?

a) Undo operation in a text editor

b) Recursive function calls

c) Allocating CPU to resources

d) All of the mentioned

127. Which of the following properties does a simple graph not hold?

a) Must be connected

b) Must be unweighted

c) Must have no loops or multiple edges

d) All of the mentioned


128. Which of the following is a disadvantage of linear search?

a) Requires more space

b) Greater time complexities compared to other searching algorithms

c) Not easy to understand

d) All of the mentioned

129. What is a dequeue?

a) A queue with insert/delete defined for both front and rear ends of the queue

b) A queue implemented with a doubly linked list

c) A queue implemented with both singly and doubly linked lists

d) None of the mentioned

130. Matrix A when multiplied with Matrix C gives the Identity matrix I, what is C?

a) Identity matrix

b) Inverse of A

c) Square of A

d) Transpose of A

131. If a, b, c, d are distinct prime numbers with a as smallest prime then a * b * c * d is a:

a) Odd number

b) Even number

c) Prime number

d) None of the mentioned.


132. What is the worst case complexity of binary search using recursion?

a) O(nlogn)

b) O(logn)

c) O(n)

d) O(n2)

133. If a problem can be broken into subproblems which are reused several times, the problem
possesses ____________ property.

a) Overlapping subproblems

b) Optimal substructure

c) Memoization

d) Greedy

134. In recursion, the condition for which the function will stop calling itself is ____________

a) Best case

b) Worst case

c) Base case

d) There is no such condition

135. If A[x+3][y+5] represents an adjacency matrix, which of these could be the value of x and y.

a) x=5, y=3

b) x=3, y=5

c) x=3, y=3

d) x=5, y=5
136. What can be the applications of Breadth First Search?

a) Finding shortest path between two nodes

b) Finding bipartiteness of a graph

c) GPS navigation system

d) All of the mentioned

137. Which of the following recursive formula can be used to find the factorial of a number?

a) fact(n) = n * fact(n)

b) fact(n) = n * fact(n+1)

c) fact(n) = n * fact(n-1)

d) fact(n) = n * fact(1)

138. Which of the following two sets are disjoint?

a) {1, 3, 5} and {1, 3, 6}

b) {1, 2, 3} and {1, 2, 3}

c) {1, 3, 5} and {2, 3, 4}

d) {1, 3, 5} and {2, 4, 6}

139. __________ comparisons required to sort the list 1, 2, 3…….n using insertion sort.

a) (n2 + n + 2) / 2

b) (n3 + n – 2) / 2

c) (n2 + n – 2) / 2

d) (n2 – n – 2) / 2
140. What is a randomized QuickSort?

a) The leftmost element is chosen as the pivot

b) The rightmost element is chosen as the pivot

c) Any element in the array is chosen as the pivot

d) A random number is generated which is used as the pivot

141. In Depth First Search, how many times a node is visited?

a) Once

b) Twice

c) Equivalent to number of indegree of the node

d) None of the mentioned

142. In dynamic programming, the technique of storing the previously calculated values is called
___________

a) Saving value property

b) Storing value property

c) Memorization

d) Mapping

143. The lcm of 3 and 21 is ________ if gcd(3,21)=3.

a) 3

b) 12

c) 21

d) 42
144. The quotient and remainder when -1 is divided by 3 is

a) -1 and -1

b) -1 and 2

c) 1 and 2

d) -1 and -2

145. The value of 52003 mod 7 is

a) 3

b) 4

c) 8

d) 9

Vous aimerez peut-être aussi