1.
The postfix expression AB + CD – *
can be
evaluated using a
(Ans.) stack
(B) tree
(C) queue
(D) linked
list
2.
The post order traversal of a binary
tree is
DEBFCA. Find out the preorder
traversal.
(A) ABFCDE
(B) ADBFEC
(Ans.) ABDECF
(D) None of
the above
3.
The branch logic that provides making
capabilities
in the control unit is known
as
(Ans.)
Controlled transfer
(B)
Conditional transfer
(C)
Unconditional transfer
(D) None of
the above
4.
The number of colours required to
properly
colour the vertices of every
planer graph
is
(Ans.) 2
(B) 3
(C) 4
(D) 5
5.
Networks that use different
technologies
can be connected by
using
(A) Packets
(B) Switches
(C) Bridges
(Ans.) Routers
6.
Both hosts and routers are TCP/IP
protocol
software. However, routers do
not use
protocol from all layers. The
layer for
which protocol software is not
needed by a
router is
(Ans.) Layer –
5 (Application)
(B) Layer – 1
(Physical)
(C) Layer – 3
(Internet)
(D) Layer – 2
(Network Interface)
7.
In multiuser database if two users wish
to update the
same record at the same
time, they are
prevented from doing so
by
(A) Jamming
(B) Password
(C)
Documentation
(Ans.) Record
lock
8.
A binary search tree is a binary tree :
(A) All items
in the left subtree are
less than root
(B) All items
in the right subtree are
greater than
or equal to the root
(C) Each
subtree is itself a binary
search tree
(Ans.) All of
the above
9.
What deletes the entire file except the
file structure
?
(A) ERASE
(B) DELETE
(Ans.) ZAP
(D) PACK
10.
Which command is the fastest among
the following
?
(A) COPY TO
<NEW FILE>
(Ans.) COPY
STRUCTURE TO <NEW
FILE>
(C) COPY FILE
<FILE 1> <FILE 2>
(D) COPY TO
MFILE-DAT
DELIMITED
11.
B+ tree are preferred to binary tree in
Database
because
(A) Disk
capacity are greater than
memory
capacities
(Ans.) Disk
access is much slower than
memory access
(C) Disk data
transfer rates are much
less than
memory data transfer
rate
(D) Disks are
more reliable than
memory
12.
A Transaction Manager is which of the
following ?
(A) Maintains
a log of transactions
(B) Maintains
before and after
database
images
(C) Maintains
appropriate concurrency
control
(Ans.) All of
the above
13.
Leaves of which of the following trees
are at the
same level ?
(A) Binary
tree
(Ans.) B-tree
(C) AVL-tree
(D) Expression
tree
14.
Which of the following TCP/IP
Internet
protocol is diskless machine
uses to obtain
its IP address from a
server ?
(A) RAP
(B) RIP
(Ans.) ARP
(D) X.25
15.
Decryption and encryption of data are
the responsibility
of which of the
following
layer ?
(A) Physical
layer
(B) Data Link
layer
(Ans.)
Presentation layer
(D) Session
layer
16.
In which circuit switching, delivery of
data is
delayed because data must be
stored and
retrieved from RAM ?
(A) Space
division
(Ans.) Time
division
(C) Virtual
(D) Packet
17.
In which Routing Method do all the
routers have a
common database ?
(A) Distance
vector
(Ans.) Link
state
(C) Link
vector
(D) Dijkestra
method
18.
Page Shift Keying (PSK) Method is
used to
modulate digital signal at
9600 bps using
16 level. Find the line
signals and
speed (i.e. modulation
rate).
(Ans.) 2400
bauds (B) 1200 bauds
(C) 4800 bauds
(D) 9600 bauds
19.
The station to hub distance in which it
is 2000
metres.
(A) 100 Base-Tx
(Ans.) 100
Base-Fx
(C) 100 Base-T4
(D) 100 Base-T1
20.
Main aim of software engineering is to
produce
(A) program
(B) software
(C) within
budget
(Ans.)
software within budget in the
given schedule
21.
Key process areas of CMM level 4 are
also
classified by a process which is
(A) CMM level
2
(B) CMM level
3
(Ans.) CMM
level 5
(D) All of the
above
22.
Validation means
(A) are we
building the product right
(Ans.) are we
building the right product
(C)
verification of fields
(D) None of
the above
23.
If a process is under statistical control,
then it is
(A)
Maintainable
(B) Measurable
(Ans.)
Predictable
(D) Verifiable
24.
In a function oriented design, we
(A) minimize
cohesion and maximize
coupling
(Ans.)
maximize cohesion and minimize
coupling
(C) maximize
cohesion and
maximize
coupling
(D) minimize
cohesion and minimize
coupling
25.
Which of the following metric does not
depend on the
programming language
used ?
(A) Line of
code
(Ans.)
Function count
(C) Member of
token
(D) All of the
above
26.
A / B+ tree index is to be
built on the
name attribute
of the relation
STUDENT.
Assume that all students
names are of
length 8 bytes, disk block
are of size
512 bytes and index
pointers are
of size 4 bytes. Given this
scenario what
would be the best choice
of the degree
(i.e. the number of
pointers per
node) of the B+ tree ?
(Ans.) 16 (B)
42
(C) 43 (D) 44
27.
The Inorder traversal of the tree will
yield a sorted
listing of elements of
tree in
(A) Binary
tree
(Ans.) Binary
search tree
(C) Heaps
(D) None of
the above
28.
Mobile IP provides two basic
functions.
(A) Route
discovery and registration
(Ans.) Agent
discovery and registration
(C) IP binding
and registration
(D) None of
the above
29.
Pre-emptive scheduling is the strategy
of temporarily
suspending a gunning
process
(Ans.) before
the CPU time slice expires
(B) to allow
starving processes to run
(C) when it
requests I/O
(D) to avoid
collision
30.
In round robin CPU scheduling as time
quantum is
increased the average turn
around time
(A) increases
(B) decreases
(C) remains
constant
(Ans.) varies
irregularly
31.
Resources are allocated to the process
on
non-sharable basis is
(Ans.) mutual
exclusion
(B) hold and
wait
(C) no
pre-emption
(D) circular
wait
32.
Cached and interleaved memories are
ways of
speeding up memory access
between CPU’s
and slower RAM.
Which memory
models are best suited
(i.e. improves
the performance most)
for which
programs ?
(i) Cached
memory is best suited for
small loops.
(ii)
Interleaved memory is best
suited for
small loops
(iii)
Interleaved memory is best
suited for
large sequential code.
(iv) Cached
memory is best suited for
large
sequential code.
(A) (i) and
(ii) are true.
(Ans.) (i) and
(iii) are true.
(C) (iv) and
(ii) are true.
(D) (iv) and
(iii) are true.
33.
Consider the following page trace :
4,3, 2, 1, 4,
3, 5, 4, 3, 2, 1, 5
Percentage of
page fault that would
occur if FIFO
page replacement
algorithm is
used with number of
frames for the
JOB m = 4 will be
(A) 8
(B) 9
(Ans.) 10
(D) 12
34.
Check sum used along with each
packet
computes the sum of the data,
where data is
treated as a sequence of
(A) Integer
(Ans.)
Character
(C) Real
numbers
(D) Bits
35.
If an integer needs two bytes of
storage, then
the maximum value of a
signed integer
is
(A) 216
– 1
(Ans.) 215
– 1
(C) 216
(D) 215
36.
Which of the following logic families
is well suited
for high-speed operations ?
(A) TTL
(Ans.) ECL
(C) MOS
(D) CMOS
37.
Interrupts which are initiated by an
instruction
are
(A) Internal
(B) External
(Ans.)
Hardware
(D) Software
38.
printf(“%c”, 100);
(A) prints 100
(Ans.) prints
ASCII equivalent of 100
(C) prints
garbage
(D) none of
the above
39.
For the transmission of the signal,
Bluetooth
wireless technology uses
(A) time
division multiplexing
(B) frequency
division multiplexing
(Ans.) time division
duplex
(D) frequency
division duplex
40.
Consider the following statements :
I. Recursive
languages are closed
under
complementation.
II.
Recursively enumerable languages
are closed
under union.
III.
Recursively enumerable languages
are closed
under complementation.
Which of the
above statements are true ?
(A) I only
(Ans.) I and
II
(C) I and III
(D) II and III
41.
What is the routing algorithm used by
RIP and IGRP ?
(A) OSPF
(B) Link-state
(C) Dynamic
(Ans.)
Dijkestra vector
42.
Identify the incorrect statement :
(A) The
overall strategy drives the
E-Commerce
data warehousing
strategy.
(B) Data
warehousing in an
E-Commerce
environment should
be done in a
classical manner.
(C) E-Commerce
opens up an
entirely new
world of web
server.
(Ans.)
E-Commerce security threats can
be grouped
into three major
categories.
43.
Reliability of software is directly
dependent on
(A) quality of
the design
(Ans.) number
of errors present
(C) software
engineers experience
(D) user
requirement
44.
______ is not an E-Commerce
application.
(A) House
banking
(B) Buying
stocks
(C) Conducting
an auction
(Ans.)
Evaluating an employee
45.
______ is a satellite based tracking
system that
enables the determination
of person’s
position.
(A) Bluetooth
(B) WAP
(C) Short
Message Service
(Ans.) Global
Positioning System
46.
A complete microcomputer system
consists of
(A)
Microprocessor
(B) Memory
(C) Peripheral
equipment
(Ans.) All of
the above
47.
Where does a computer add and
compare data ?
(A) Hard disk
(B) Floppy disk
(Ans.) CPU
chip
(D) Memory
chip
48.
Pipelining strategy is called implement
(A)
instruction execution
(Ans.)
instruction prefetch
(C)
instruction decoding
(D)
instruction manipulation
49.
Which of the following data structure
is linear type
?
(A) Strings
(B) Lists
(C) Queues
(Ans.) All of
the above
50.
To represent hierarchical relationship
between
elements, which data structure
is suitable ?
(A) Dequeue
(B) Priority
(Ans.) Tree
(D) All of the
above