1. The postfix expression AB + CD – * can be evaluated using a
(A) stack
(B) tree
(C) queue
(D) linked list
2. The post order traversal of a binary tree is DEBFCA. Find out the pre-order traversal.
(A) ABFCDE
(B) ADBFEC
(C) ABDECF
(D) None of the above
(A) stack
(B) tree
(C) queue
(D) linked list
2. The post order traversal of a binary tree is DEBFCA. Find out the pre-order traversal.
(A) ABFCDE
(B) ADBFEC
(C) ABDECF
(D) None of the above
3.
The branch logic
that provides making capabilities in the control unit is known as
(A)
Controlled
transfer
(B)
Conditional transfer
(C)
Unconditional transfer
(D)
None of the above
4.
The number of
colours required to properly colour the vertices of every planer graph is
(A)
2
(B)
3
(C)
4
(D)
5

5.
Networks that use
different technologies can be connected by using
(A)
Packets
(B)
Switches
(C)
Bridges
(D)
Routers
6.
Both hosts and
routers are TCP/IP protocol software. However, routers do not use protocol from
all layers. The layer for which protocol software is not needed by a router is
(A)
Layer – 5
(Application)
(B)
Layer – 1 (Physical)
(C)
Layer – 3 (Internet)
(D)
Layer – 2 (Network
Interface)
7.
In multiuser
database if two users wish to update the same record at the same time, they are
prevented from doing so by
(A)
Jamming
(B)
Password
(C)
Documentation
(D)
Record lock
8.
A binary search
tree is a binary tree :
(A)
All items in the left
subtree are less than root
(B)
All items in the right
subtree are greater than or equal to the root
(C)
Each subtree
is itself a binary search tree
(D)
All of the above
9.
What deletes the
entire file except the file structure ?
(A)
ERASE
(B)
DELETE
(C)
ZAP
(D)
PACK
10.
Which command is
the fastest among the following ?
(A)
COPY TO <NEW
FILE>
(B)
COPY
STRUCTURE TO <NEW FILE>
(C)
COPY
FILE <FILE 1> <FILE 2>
(D)
COPY TO MFILE-DAT
DELIMITED
11.
B+ tree are
preferred to binary tree in Database because
(A)
Disk capacity are
greater than memory capacities
(B)
Disk access
is much slower than memory access
(C)
Disk data transfer
rates are much less than memory data transfer rate
(D)
Disks are more reliable
than memory
12.
A Transaction
Manager is which of the following ?
(A)
Maintains a log of
transactions
(B)
Maintains before and
after database images
(C)
Maintains appropriate
concurrency control
(D)
All of the
above
13.
Leaves of which of
the following trees are at the same level ?
(A)
Binary tree
(B)
B-tree
(C)
AVL-tree
(D)
Expression tree
14.
Which of the
following TCP/IP Internet protocol is diskless machine uses to obtain its IP
address from a server ?
(A)
RAP
(B)
RIP
(C)
ARP
(D)
X.25
15.
Decryption and
encryption of data are the responsibility of which of the following layer ?
(A)
Physical layer
(B)
Data Link layer
(C)
Presentation
layer
(D)
Session layer
16.
In which circuit
switching, delivery of data is delayed because data must be stored and
retrieved from RAM ?
(A)
Space division
(B)
Time division
(C)
Virtual
(D)
Packet
17.In which Routing Method do all the routers have a common database ?
(A) Distance vector
(B) Link state
(C) Link vector
(D) Dijkestra method
(A) Distance vector
(B) Link state
(C) Link vector
(D) Dijkestra method
18. Page Shift Keying (PSK) Method is used to modulate digital signal at 9600 bps using 16 level. Find the line signals and speed (i.e. modulation rate).
(A) 2400 bauds(B) 1200 bauds
( C) 4800 bauds
(D) 9600 bauds
19. The station to hub distance in which it is 2000 metres.
(A) 100 Base-Tx
(B) 100 Base-Fx
(C) 100 Base-T4
(A) 100 Base-Tx
(B) 100 Base-Fx
(C) 100 Base-T4
(D) 100 Base-T1
20.Main aim of software engineering is to produce
(A) program
(B) software
(C) within budget
(D) software within budget in the given schedule
21. Key process areas of CMM level 4 are also classified by a process which is
(A) CMM level 2
(B) CMM level 3
(C) CMM level 5
(D) All of the above
(A) CMM level 2
(B) CMM level 3
(C) CMM level 5
(D) All of the above
22. Validation means
(A) are we building the product right
(B) are we building the right product
(C) verification of fields
(D) None of the above
(A) are we building the product right
(B) are we building the right product
(C) verification of fields
(D) None of the above
23. If a process is under statistical control, then it is
(A) Maintainable
(B) Measurable
(C) Predictable
(D) Verifiable
(A) Maintainable
(B) Measurable
(C) Predictable
(D) Verifiable
24. In a function oriented design, we
(A) minimize cohesion and maximize coupling
(B) maximize cohesion and minimize coupling
(C) maximize cohesion and maximize coupling
(D) minimize cohesion and minimize coupling
(A) minimize cohesion and maximize coupling
(B) maximize cohesion and minimize coupling
(C) maximize cohesion and maximize coupling
(D) minimize cohesion and minimize coupling
(A) Line of code
(B) Function count
(C) Member of token
(D) All of the above
26. A/B+ tree index is to be built on the name attribute of the relation
STUDENT. Assume that all students names are of length 8 bytes, disk
block are of size 512 bytes and index pointers are of size 4 bytes.
Given this scenario what would be the best choice of the degree (i.e.
the number of pointers per node) of the B+ tree ?
(A) 16
(B) 42
(C) 43
(D) 44
(A) 16
(B) 42
(C) 43
(D) 44
27.
The Inorder
traversal of the tree will yield a sorted listing of elements of tree in
(A)
Binary tree
(B)
Binary search
tree
(C)
Heaps
(D)
None of the above
28.
Mobile IP provides
two basic functions.
(A)
Route discovery and
registration
(B)
Agent discovery
and registration
(C)
IP binding and
registration
(D)
None of the above
29.
Pre-emptive
scheduling is the strategy of temporarily suspending a gunning process
(A)
before the
CPU time slice expires
(B)
to allow starving
processes to run
(C)
when it requests I/O
(D)
to avoid collision
30.
In round robin CPU
scheduling as time quantum is increased the average turn around time
(A)
increases
(B)
decreases
(C)
remains constant
(D)
varies irregularly
31.
Resources are
allocated to the process on non-sharable basis is
(A)
mutual
exclusion
(B)
hold and wait
(C)
no pre-emption
(D)
circular wait
32.
Cached and
interleaved memories are ways of speeding up memory access between CPU’s and
slower RAM. Which memory models are best suited (i.e. improves the performance
most) for which programs ?
(i)
Cached memory is best
suited for small loops.
(ii)
Interleaved memory is
best suited for small loops
(iii)
Interleaved memory is
best suited for large sequential code.
(iv)
Cached memory is best
suited for large sequential code.
(A)
(i) and (ii) are true.
(B)
(i) and (iii)
are true.
(C)
(iv) and (ii) are true.
(D)
(iv) and (iii) are
true.
33. Consider the following page trace :
4,3, 2, 1, 4, 3, 5,
4, 3, 2, 1, 5
Percentage of page fault
that would occur if FIFO page replacement algorithm is used with number of
frames for the JOB m = 4 will be
(A)
8
(B)
9
(C)
10
(D)
12
34.
Check sum used
along with each packet computes the sum of the data, where data is treated as a
sequence of
(A)
Integer
(B)
Character
(C)
Real numbers
35.
If an integer needs
two bytes of storage, then the maximum value of a signed integer is
(A)
216 – 1
(B)
215 – 1
(C)
216
(D)
215
36.
Which
of the following logic families is well suited for high-speed operations ?
(A)
TTL
(B)
ECL
(C)
MOS
(D)
CMOS
37.
Interrupts which
are initiated by an instruction are
(A)
Internal
(B)
External
(C)
Hardware
(D)
Software
38.
printf(“%c”, 100);
(A)
prints 100
(B)
prints ASCII
equivalent of 100
(C)
prints garbage
(D)
none of the above
39.
For the
transmission of the signal, Bluetooth wireless technology uses
(A)
time division
multiplexing
(B)
frequency division
multiplexing
(C)
time division
duplex
(D)
frequency division
duplex
40.
Consider the
following statements :
I.
Recursive languages are
closed under complementation.
II.
Recursively
enumerable languages are closed under union.
III.
Recursively
enumerable languages are closed under complementation.
Which of the above statements are true ?
(A)
I only
(B)
I and II
(C)
I and III
(D)
II and III
41.
What is the routing
algorithm used by RIP and IGRP ?
(A)
OSPF
(B)
Link-state
(C)
Dynamic
(D)
Dijkestra vector
42.
Identify the
incorrect statement :
(A)
The overall strategy
drives the E-Commerce data warehousing strategy.
(B)
Data warehousing in an
E-Commerce environment should be done in a classical manner.
(C)
E-Commerce opens up an
entirely new world of web server.
(D)
E-Commerce
security threats can be grouped into
three major categories.
43.
Reliability of
software is directly dependent on
(A)
quality of the design
(B)
number of
errors present
(C)
software engineers
experience
(D)
user requirement
44.
______ is not an
E-Commerce application.
(A)
House banking
(B)
Buying stocks
(C)
Conducting an auction
(D)
Evaluating an
employee
45.
______ is a
satellite based tracking system that enables the determination of person’s
position.
(A)
Bluetooth
(B)
WAP
(C)
Short Message Service
(D)
Global
Positioning System
46.
A complete
microcomputer system consists of
(A)
Microprocessor
(B)
Memory
(C)
Peripheral equipment
(D)
All of the
above
47.
Where does a computer
add and compare data ?
(A)
Hard disk
(B)
Floppy disk
(C)
CPU chip
(D)
Memory chip
48.
Pipelining strategy
is called implement
(A)
instruction execution
(B)
instruction
prefetch
(C)
instruction decoding
(D)
instruction
manipulation
49.
Which of the
following data structure is linear type ?
(A)
Strings
(B)
Lists
(C)
Queues
(D)
All of the
above
50.
To represent
hierarchical relationship between elements, which data structure is suitable ?
(A)
Dequeue
(B)
Priority
(C)
Tree
(D)
All of the above
No comments:
Post a Comment