1. A method of
providing security to transport e-mails is
Ans. PGP
2. A combinational
circuit is designed to take 4 bit input. The number from 0 to 9 are given as
input in the binary form. The circuit outputs ‘1’ if 5,6,7 or 9 are given
input.For all other numbers the circuit outputs ‘0’. The circuit is designed
only using AND, OR, NOT gates. What is the minimum number of gates required ?
Ans.
3
3. The MAC protocol
used in Ethernet is
Ans. CSMA/CD
4. The simplified form
of the Boolean expression (X+Y’+Z) (X+Y’+Z’) (X+Y+Z)
Ans.
X+Y’Z
5. Arrange the
following IP addresses in the order of Class A, Class B, Class C and Class D.
I. 193. 200. 151. 2
II. 189. 51. 21. 200
III. 225. 2. 2. 200
IV. 126. 8. 2. 200
Ans.
IV, II, I, III
6. Addressing modes of the
following 8085 instructions in the same order.
LDA, LXI, ADD r1, r2, MOV A,M
Ans. Direct, Immediate, Register,
Indirect
7. The concatenation of
two lists is to be performed in 0(1) time. Which of the following
implementation of a list should be used?
Ans. Circularly doubly linked list
8. Match the following
:
I. Non vectored interrupt 1. ISR
II. Non Maskable interrupt 2. RST2
III. Program for interrupt 3. TRAP
IV. Software Interrupt 4. INTR
I
II III IV
Ans.
4 3 1 2
9. Search algorithms
are Judged on the basis of
I. Completeness
II. Optimality
III. Time complexity
IV. Space complexity
(A) I and II
(B) I, II and III
(C) II, III and IV
Ans. All of the above
10. Choose the answer from the following
register(s) that store the address of a memory location.
I. Program counter
II. Accumulator
III. MAR
IV. BC Register pair
Ans. I and III are correct
11. If G be a complete
undirected graph on 6 vertices. If vertices of G are labeled then the number of
distinct cycles of length 4 in G is equal to
Ans. 90
12. The number of
vectored interrupts in 8085 is
Ans. 4
13. The Java compiler
translates source code into
Ans. Byte Code
14. Object-Modelling
Technique was proposed by
Ans. Rambaugh
15. The following
scheduling algorithm is inherently pre emptive
Ans. Round Robin
16. An Abstract Data
Type (ADT) is
Ans.
a data type for which only the operations defined on it can be used
17. In a paged memory
the page hit ratio is 0.35. The time required to access a page in secondary
memory is equal to 100 nsec. The time required to access a page in primary
memory is 10 nsec. The average time equired to access a page is
Ans.
68.5 nsec.
18. ______________
abstraction is a named sequence of instructions that has a specific and limited
function.
Ans.
Procedural
19. A process executes
the code
fork ( ) ;
fork ( ) ;
fork ( ) ;
fork ( ) ;
The total number of child processes
created is
Ans.
15
20. If A = { 0, 1 },
then the number of possible strings of length ‘n’ is
Ans. 2n
21. The overlay tree for
a program is given below. What will be the size of the physical memory
partition required to load and run the program?
Ans. 14KB
22. The complexity of
inter connection among modules is described by
Ans.
Coupling
23. A 1000 K byte memory
is managed using variable partitions but to compaction. It currently has two
partitions of sizes 200 K bytes and 340 K bytes respectively. The smallest
allocation request in K bytes that
could be denied is for
Ans. 461
24. The grammar
guaranteed by production rules
S->a SBc, CB->BC, aB ->aa is
Ans. an bn cn,
n>0
25. The following page
replacement algorithms suffer from Belady’s anomaly.
I. Optimal replacement
II. LRU
III. FIFO
IV. MRU
Ans.
I and III correct
26. Given the basic ER
and relational models, which of the following is INCORRECT?
A) An attribute of an entity can have
more than one value
(B) An attribute of an entity can be
composite
(C) In a row of a relational table,
an attribute can have more than one value
(D) In a row of a relational table,
an attribute can have exactly one value or a NULL value
Ans( C). In a row of a relational table, an attribute
can have more than one value
27. The algorithm used
for searching AND-OR graph is
Ans.
AO*
28. The PROJECT operator
of a relational algebra creates a new table that has always
Ans.
Same number of rows as the original table
29. The Natural Language
sentence will be represented in NLP with
I. ATN
II. RTN
III. FPL
IV. FRAMES
Ans.
I, II
30. The file
organization in which the physical location of a record is determined by a
Mathematical function that maps the key to address of the record is
Ans.
Hashed file organization
31. Consider the
following statements about the cyclomatic complexity of the control flow graph
of a program module. Which of these are TRUE ?
i. The cyclomatic complexity of a
module is equal to the maximum number of linearly independent circuits in the
graph.
ii. The cyclomatic complexity of a
module is the number of decisions on the module plus one. Where a ecision is
effectively any conditional statement in the module.
iii. The cyclomatic complexity can
also be used as a number of linearly independent paths that should be
tested during path coverage testing
Ans. i, ii and iii
32. Which of the sorting
algorithm is the slowest?
Ans.
Bubble sort
33. The approach used in
top-down analysis and design is
Ans.
to identify a top level function and then create a hierarchy of lower
level modules and components
34. Match the following:
I. Flow control 1. Token Bucket
II. Error control 2. Sliding window
III. Congestion control 3. Manchester encoding
IV. Synchronization 4. Parity bit
I
II III IV
Ans.
2 4 1 3
35. Slow start is a
technique used by the TCP to reduce
Ans. Number of time outs of segments
36. A B-Tree used as an
index for a large database table has four levels including root node. If a new
key is inserted in this index, then the maximum number of nodes that could be
newly created in the process are
Ans.
5
37. Consider the following
proportional statements
P1: ((A^B)->C)=((A->C)^(B->C))
P2:((AvB)->C)=((A->C)v(B->C))
Which one of the following are true?
(D) Both P1 and P2 are not
tautologies
38. What is difference
between a Java applet and a Java application ?
(A) An application can in general be
trusted whereas an applet can’t
(B) An applet must be executed in a
browser environment
(C) An applet is not able to access
the files of the computer it runs on
Ans.
All of the above
39. The following
machine will accept the String
Ans.
bab
40. Types of validation
testing
Ans.
Alpha and Beta Testing
41. Choose the correct
answer, the protocol which returns IP address.
I. ARP
II. RARP
III. HTTP
IV. DNS
Ans.
II and IV correct
42. Assuming P !=N which
of the following is TRUE ?
Ans.
NP – complete nP = φ
43. What is the
appropriate pairing of items in the two columns, listing various activities
encountered in a software life cycle ?
P. Requirements 1. Module capture Development and
Integration
Q. Design 2. Domain analysis
R. Implementation 3. Structural Behavioural Modelling
S. Maintenance 4. Performance Tuning
Ans. P – 2, Q – 3, R – 1, S – 4
44. In UNIX, when the
read system call encounters EOF, it returns
Ans. –1
45. Which of the
following regular expression identities are true ?
Ans.
(r’)1 = r
46. The message 11001001 is to be transmitted using
the CRC polynomial x3 + 1 to
protect it from errors. The message that should be transmitted is
Ans. 110010010011
47. _______________ is black box testing method.
Ans. Boundary value analysis
48. If the hamming distance is ‘m’ then the number
of errors that can be corrected is
Ans. Less than m/2
49. What is the maximum number of I/O devices that
can be interfaced to 8085 ?
Ans.
256
50. Compression Ratio is defined as
Ans.
compressed size/uncompressed size)
51. Neural Networks are models of
Ans. Biological nervous systems
Question No.’s 52 and 53
Disk
requests come to a disk drive for cylinders 10, 22, 20, 2, 40, 6 and 36 in that
order at a time when the disk drive is reading from cylinder 20. The seek time
is 6 ms per cylinder. The disk can be rotated either clockwise or counter
clockwise.
52. The total seek time if the disk arm scheduling
algorithm is first-cum-first served.
Ans.
876 msec.
53. If the scheduling algorithm is closest cylinder
next, then the total will be
Ans. 360 msec.
Question No.’s 54, 55 and 56
The
next three questions are based on Huffman’s coding for the symbol A with
probability 0.3, B with 0.15, C with 0.1, D with 0.25 and E with 0.2.
54. The minimum number of bits required to
represent B is
Ans.
3
55. The minimum number of bits required to
represent all the symbols together is
Ans. 12
56. The average code length of the given problem is
Ans.
2.25
57. Character Recognition is application of
Ans. Neural Networks
58. Inference Engine consists of
I.
Facts
II.
User Interface
III.
Search
IV.
Domain Expert
Ans. I, III
59. With regarding to exceptions following is TRUE
Ans. Raised by program and OS
60. Which of the following concurrency control
protocols ensure both conflict serializability and freedom from dead deadlock
I.
2 – phase locking
II.
Time-stamp ordering
Ans.
II only
61. The following system calls are related to file
operations in UNIX
I.
Signal
II.
Kill
III.
Seek
IV.
Unlink
Ans. III and IV correct
62. HTML (Hyper Text Markup Language) has language
elements which permit certain actions other than describing the structure of
the web document. Which one of the following actions is not supported by pure
HTML
(without any server or client side scripting) pages?
Ans. Display the client time as part of the page
63. Search engine is a ____________ agent.
Ans.
Intelligent
64. The commonly used UNIX commands like date, ls,
cut etc. are stored in
Ans. / bin and /usr/bin directory
65. ADO stands for
Ans. Active × Data Object
66. If f is a linear transformation from the plane
to the real numbers and if f(1, 1) = 1 and f(–1, 0) = 0 then f (3, 5) =
Ans.
9
67. Fuzzy Logic is proposed by
Ans. ZADEH
68. If the inorder and postorder traversal results
of a binary tree are A, C, B, F, E, D, G and A, B, C, E, G, D, F respectively.
Identify the root node of it.
Ans.
F
69. NLP includes problems
(A)
in which the objective function is linear but some constraints are not linear
(B)
in which the constraints are linear but the objective function is not linear
(C)
in which both the objective function and all the constraints are not linear
Ans. all of the above
70. Class C is inherited from Class A and Class B,
Class D is inherited from Class C Which of the following is true ?
I.
Class C inherits Class A attributes
II.
Class C inherits Class B attributes
III.
Class D inherits Class B attributes only
IV.
Class D inherits Class A attributes only
Ans. I, II
71. Which of the following is an assertion ?
Ans. P is true, P and Q are true and K or not (Q)
is true implies K is true
72. In 8085, the addressing mode used for LDAX rp
instruction is
Ans. Indirect
73. Given an arbitrary Non-deterministic Finite
Automation (NFA) with N states, the maximum number of states in an equivalent
minimized DFA is atleast
Ans.
N!
74. The maximum packet size of IPV4 is
Ans.
65535 bytes
75. Which of the following statements are TRUE
about an SQL query ?
P :
An SQL query can contain a HAVING clause even if it doesnot have a GROUP by
clause.
Q :
An SQL query can contain a HAVING clause only if it has GROUP by clause.
R :
All attributes used in the GROUP by clause must appear in the SELECT clause.
S :
Not all attributes used in the GROUP by clause need to appear in the SELECT
clause.
Ans. P and S
No comments:
Post a Comment