1. Any integer composed of 3n identical digits divisible by
(A) 2n (B) 3n (C) 5n (D)
7n
2. The circumference of the two concentric disks
is divided into 100 sections each. For the outer disk, 100 of the sections are
painted red and 100 of the sections are painted blue. For the inner disk, the
sections are painted red and blue in an arbitrary manner. It is possible to
align the two disks so that
(A)
100 or more
(B) 125 or more
(C) 150 or more
(D) 175 or more
of the sections on
the inner disks have their colours matched with the corresponding section on
outer disk.
3. The proposition ~ p Ú q is
equivalent to
(A)
p -> q
(B) q -> p
(C) p <--> q
(D) p v q
4. The absorption law in Boolean algebra say that
(A) X + X = X
(B) X . X = X
(C)
x + x . y = x
(D)
None of the above
5. The number of 1’s present in the binary
representation of
10 × 256 + 5 × 16 +
5 is
(A) 5 (B) 6
(C) 7 (D) 8
6. The hexadecimal number equivalent to (1762.46)8 is
(A) 3F2.89 (B) 3F2.98
(C) 2F3.89 (D) 2F3.98
7. (A + B) is equivalent to
(A) AB
(B) A☉B
(C) (A B)☉A
(D) (A☉B) A
8. A latch is constructed using two cross-coupled
(A) AND and OR gates
(B) AND gates
(C) NAND and NOR
gates
(D)
NAND gates
9. A multiplexer is a logic circuit that
(A) accepts one
input and gives several output
(B) accepts many
inputs and gives many output
(C)
accepts many inputs and gives one output
(D) accepts one
input and gives one output
10. 8-bit 1’s complement form of –77.25 is
(A) 01001101.0100
(B) 01001101.0010
(C)
10110010.1011
(D) 10110010.1101
11. From the point of view of the programmer, what
are the major advantages of using a high-level language rather than internal
machine code or assembly language ?
(A) Program
portability
(B)
Easy development
(C) Efficiency
(D) None of the
above
12. What features make C++ so powerful ?
(A) Easy
implementation
(B) Reusing old code
(C) Easy memory
management
(D)
All of the above
13. The goal of operator overloading is
(A)
to help the user of a class
(B) to help the
developer of a class
(C) to help define
friend function
(D) None of the
above
14. The scheme of which interpreter translates the
source program is known as
(A) Paragraph by
paragraph
(B) Instruction by
instruction
(C)
Line by line
(D) None of the
above
15. Portable program means
(A) Program with
wheels
(B) Independent from
its authors
(C)
Independent of platform
(D) None of the
above
16. Which of the following is the recovery
management technique in DDBMS ?
(A)
2PC (Two Phase Commit)
(B) Backup
(C) Immediate update
(D)
All of the above
17. Which of the following is the process by which
a user’s privileges ascertained ?
(A)
Authorization
(B) Authentication
(C) Access Control
(D)
None of these
18. The basic variants of time-stamp based method
of concurrency control are
(A) Total time
stamp-ordering
(B) Partial time
stamp-ordering
(C) Multiversion
Time stamp-ordering
(D)
All of the above
19. A transaction can include following basic
database access operations :
(A) Read_item(X)
(B) Write_item(X)
(C)
Both (A) and (B)
(D) None of these
20. Decomposition help in eliminating some of the
problems of bad design
(A) Redundancy
(B) Inconsistencies
(C) Anomalies
(D)
All of the above
21. The number of different trees with 8 nodes is
(A) 256 (B) 255 (C) 248
(D) None of these
Hint: (2^n)-n i.e (2^8)-8 = 256-8 = 248
Hint: (2^n)-n i.e (2^8)-8 = 256-8 = 248
22. Given a binary tree whose inorder and preorder
traversal are given by
Inorder : EICFBGDJHK
Preorder :
BCEIFDGHJK
The post order
traversal of the above binary tree is
(A)
I E FCGJ KHDB
(B) I E FC J GKHDB
(C) I E FCGKJ HDB
(D)
I E FCGJ KDBH
23. The number of disk accesses performed by
insertion operation in B-tree of height h is
(A) 0(1) (B) 0(1gh)
(C) 0(h) (D) None of these
24. Consider a hash table of size m = 10000 and the
hash function
h(k) = └m
(kA mod 1) ' ┘for A = ( √5 – 1)/ 2. The location to the key k =
123456 is
(A) 46 (B) 47 (C) 41
(D) 43
25. When the priority queue is represented by max
heap, the insertion and deletion of an element can be performed in (queue
containing n elements)
(A) q(n)
and q(1) respectively
(B) q(n)
and q(n) respectively
(C)
q(1) and q(1)
respectively
(D) None of the
above
26. A comparison of frequency division and time
division multiplexing system shows that
(A) FDM requires a
lower bandwidth, but TDM has greater noise immunity.
(B) FDM has greater
noise immunity and requires lower bandwidth than TDM.
(C)
FDM requires channel synchronization, while TDM has greater noise
immunity.
(D) FDM requires
more multiplex while TDM requires band pass filter.
27. If carrier modulated by a digital bit stream,
has one of the possible phase of 0, 90, 180 and 270 degrees, then modulation
called
(A) BPSK (B) QPSK
(C) QAM (D) MSK
28. Consider the following statement :
(i) The bandwidth of
the A.M., wave depends on the band width of the modulating signal.
(ii) The bandwidth
of the A.M., wave depends on the modulation index.
(iii) The bandwidth of the F.M, wave for all practical
purpose depends on the amplitude of the carrier.
Of these statements
the correct statements are
(A) (i, ii)
(B)
(i, iii)
(C) (ii, iii)
(D) All of the above
29. A smart modem can dial, hangup and answer incoming calls automatically. Can you tell who provides the appropriate instructions to the modem for this purpose ?
29. A smart modem can dial, hangup and answer incoming calls automatically. Can you tell who provides the appropriate instructions to the modem for this purpose ?
(A)
Communication software
(B) Error detection
protocols
(C) Link access
procedure (LAP)
(D)
Telecommunications
30. Which of the following switching techniques is
most suitable for interactive traffic ?
(A) Circuit
switching
(B) Message
switching
(C)
Packet switching
(D) All of the above
31. Object modules generated by assembler that
contains unresolved external references are resolved for two or more object
module by a/an
(A) Operating system
(B) Loader
(C)
Linker
(D) Compiler
32. A special software that is used to create a job
queue is called
(A) Drive
(B)
Spooler
(C) Interpreter
(D) Linkage editor
33. Which of the following permanent database that
has an entry for each terminal symbol ?
(A) Literal table
(B) Identifier table
(C)
Terminal table
(D)
Source table
34. In which way(s) a macroprocessor for assembly
language can be implemented ?
(A) Independent
two-pass processor
(B) Independent
one-pass processor
(C) Expand
macrocalls and substitute arguments
(D)
All of the above
35. Which of the following can be accessed by
transfer vector approach of linking ?
(A) External data
segments
(B)
External subroutine
(C) Data located in
other procedure
(D) All of the above
36. Block or Buffer caches are used to
(A) improve disk
performance
(B) handle
interrupts
(C) increase the
capacity of main memory
(D)
speed up main memory Read operations
37. A file organization component VSAM file is
(A) Relative records
data set
(B) Keyed sequential
data set
(C) Entry sequential
data set
(D)
All of the above
38. A relationship between processes such that each
has some part (critical section) which must not be executed while the critical
section of another is being executed, is known as
(A)
Semaphore
(B)
Mutual exclusion
(C) Multiprogramming
(D) Message passing
39. How many states can a process be in ?
(A) 3 (B) 4 (C) 2
(D) 5
40. Which command allows you to view your file 24
lines at a time ?
(A) More
(B) Cat (C) Pg (D) None of the above
41. Which one of the items listed below is not one
of the software engineering layers ?
(A) Process
(B)
Manufacturing
(C) Method
(D)
Tools
42. What is the first stage in program development
?
(A) Specification
and design
(B)
System Analysis
(C) Testing
(D) None of the
above
43. By means of a data flow diagram, the analyst
can detect
(A) Task duplication
(B) Unnecessary
delays
(C) Task overlapping
(D)
All of the above
44. Which of these are the 5 generic software
engineering framework activities ?
(A)
Communication, planning, modelling, construction, deployment
(B) Communication,
risk management, measurement, production, reviewing
(C) Analysis,
designing, programming, Debugging, maintenance
(D) Analysis,
planning, designing, programming, testing
45. Many causes of the software crisis can be
traced to mythology based on
(A) Management Myths
(B) Customer Myths
(C) Practitioner Myths
(D)
All of the above
46. Data warehousing refers to
(A) storing data
offline at a separate site
(B) backing up data
regularly
(C)
is related to data mining
(D) uses tape as
opposed to disk
47. Virtual memory is
(A) related to
virtual reality
(B) a form of ROM
(C)
a form of RAM
(D) None of the
above
48. “M-Commerce” refers to
(A) a myth which
does not exist in reality
(B) the ability of
business to reach potential customers wherever they are
(C) the ability to
have large capacity of memory storage dealing trade and commerce
(D)
None of the above
49. The principal electronic payment systems for
electronic commerce is
(A) Credit Card
(B) Digital Wallet
(C) Electronic
Cheque
(D)
All of the above
50. Which is the most valuable electronic commerce
to the individual customer in long run ?
(A) Business to
Customer
(B)
Business to Business
(C) Customer to
Customer
(D)
None of the above
No comments:
Post a Comment