1. AVA = A is called:
(A) Identity
law
(B) De Morgan’s law
(C) Idempotant
law
(D) Complement law
Ans C
2. If f (x) =x+1 and g(x)=x+3 then f 0 f 0 f 0 f
is :
(A) g (B) g+1 (C) g4 (D) None of the
above
Ans B
(Hints:-
fofof(x)=fofof(x+1)=fof(x+2)=f(x+3)=x+4=x+3+1=g+1)
3. The context-free languages are closed for :
(i)
Intersection
(ii) Union
(iii)
Complementation
(iv) Kleene Star
then
(A) (i) and
(iv)
(B) (i) and (iii)
(C) (ii) and (iv)
(D) (ii)
and (iii)
Ans D
4. The following lists are the degrees of all
the vertices of a graph :
(i) 1, 2, 3, 4, 5 (ii) 3, 4, 5, 6, 7
(iii) 1, 4, 5, 8, 6 (iv) 3, 4, 5, 6
then
(A) (i) and (ii)
(B) (iii)
and (iv)
(C) (iii) and
(ii)
(D) (ii) and (iv)
(Hints:-No. of odd degree must be even)
Ans B
5. If Im denotes the set of integers modulo m,
then the following are fields with respect to the operations of addition modulo
m and multiplication modulo m :
(i) Z23
(ii) Z29
(iii)
Z31
(iv) Z33
Then
(A) (i)
only
(B) (i) and (ii) only
(C) (i),
(ii) and (iii) only
(D) (i), (ii), (iii) and (iv)
Ans C
6. An example of a binary number which is equal
to its 2’s complement is :
(A) 1100
(B) 1001
(C) 1000
(D) 1111
Ans C
7. When a tri-state logic device is in the third
state, then :
(A) it draws low
current
(B) it does not draw any current
(C) it draws very high current
(D) it
presents a low impedance
Ans D
8. An example of a connective which is not
associative is :
(A)
AND
(B) OR
(C) EX-OR
(D) NAND
Ans D
9. Essential hazards may occur in :
(A) Combinational logic circuits
(B) Synchronous sequential logic circuits
(C) Asynchronous sequential logic circuits
working in the fundamental mode
(D) Asynchronous
sequential logic circuits working in the pulse mode
Ans D
10. The characteristic equation of a T flip-flop
is :
(A) Qn+1=TQn + T Qn
(B) Qn+1=T+Qn
(C) Qn+1=TQn
(D)Qn+1=T'Qn
The symbols used have the usual meaning.
Ans A
11. Suppose x and y are two Integer Variables
having values 0 X 5AB6 and 0 X 61CD respectively. The result (in hex) of
applying bitwise operator and to x and y will be :
(A) 0 X
5089
(B) 0 X 4084
(C) 0 X
78A4
(D) 0 X 3AD1
(Hints:-0 X 5AB6 AND 0 X 61CD=0 X 4084 since 00=0, 01=0, 10=0, 11=1 )
Ans B
12. Consider the following statements,
Int i=4, j=3, k=0;
k=++i - --j + i++ - --j +j++; What will be the
values of i, j and k after
the statement.
(A) 7, 2,
8
(B) 5, 2, 10
(C) 6,
2, 8
(D) 4, 2, 8
(Hints:- Using Stack concept u solve it)
Ans C
13. What is the value of the arithmetic
expression (Written in C)
2*3/4 - 3/4* 2
(A) 0
(B) 1
(C) 1.5
(D) None of the above
(Hints: Follow Operator Precedence rule)
Ans B
14. A function object :
(A) is
an instance of a class for which operator ( ) is a member function.
(B) is an instance of a class for which operator
a --> is a member function.
(C) is a pointer to any function
(D) is a member function of a class
Ans A
15. Polymorphism means :
(A) A template function
(B) Runtime
type identification within a class hierarchy
(C) Another name for operator overloading
(D) Virtual inheritance
Ans B
16. The E-R model is expressed in terms of :
(i) Entities
(ii) The relationship among entities
(iii) The attributes of the entities
Then
(A) (i)
and (iii)
(B) (i) and (ii)
(C) (ii) and (iii) (D) None
of the above
Ans A
17. Specialization is a ........... process.
(A) Top
- down
(B) Bottom -Up
(C) Both (A) and
(B)
(D) None of the above
Ans A
18. The completeness constraint has rules :
(A) Supertype,
Subtype
(B)Total specialization, Partial specialization
(C) Specialization,
Generalization
(D) All of the above
Ans B
19. The entity type on which the __________ type
depends is called the identifying owner.
(A) Strong entity
(B) Relationship
(C) Weak
entity
(D) E - R
Ans C
20. Match the following :
(i) 1
NF
(a) Transitive dependencies eliminated
(ii) 2 NF
(b) Multivalued attribute
removed
(iii)3
NF
(c) Contains no partial functional dependencies
(iv) 4 NF
(d) Contains no join dependency
(A) i-a,
ii-c, iii-b, iv-d
(B) i-d, ii-c, iii-a,
iv-b
(C) i-d, ii-c, iii-b, iv-a
(D) i-a, ii-b, iii-c, iv-d
Ans A
21. What item is at the root after the following
sequence of insertions into an empty splay
tree :
1, 11, 3, 10, 8, 4, 6, 5, 7, 9, 2, ?
(A) 1
(B) 2
(C)
4
(D) 8
(Hints: Last node inserted is always the root of
the splay tree)
Ans B
22. Suppose we are implementing quadratic
probing with a Hash function, Hash (y)=X
mode 100. If an element with key 4594 is
inserted and the first three locations attempted are already occupied, then the
next cell that will be tried is :
(A)
2
(B) 3
(C) 9
(D) 97
Ans D
23. Weighted graph :
(A) Is a bi-directional graph
(B) Is directed graph
(C) Is
graph in which number associated with arc
(D) Eliminates table method
Ans C
24. What operation is supported in constant time
by the doubly linked list, but not by the singly linked list ?
(A)
Advance
(B) Backup
(C)
First
(D) Retrieve
Ans D
25. How much extra space is used by heapsort ?
(A) O
(1)
(B) O (Log n)
(C) O
(n)
(D) O (n2)
Ans A
26. Error control is needed at the transport
layer because of potential error occurring __________.
(A) from transmission line
noise (B) in router
(C) from out of sequency delivery
(D) from packet losses
Ans B
27. Making sure that all the data packets of a
message are delivered to the destination is _________ control.
(A) Error
(B) Loss
(C) Sequence
(D) Duplication
Ans A
28. Which transport class should be used with a
perfect network layer ?
(A) TP0 and
TP2
(B) TP1 and TP3
(C) TP0, TP1,
TP3
(D) TP0, TP1, TP2, TP3, TP4
Ans D
29. Which transport class should be used with
residual-error network layer ?
(A) TP0,
TP2
(B) TP1, TP3
(C) TP1, TP3, TP4
(D) TP0, TP1, TP2, TP3, TP4
Ans B
30. Virtual circuit is associated with a
__________ service.
(A) Connectionless
(B) Error-free
(C) Segmentation
(D) Connection-oriented
Ans A
31. Which activity is not included in the first
pass of two pass assemblers ?
(A) Build the symbol table
(B) Construct
the intermediate code
(C) Separate mnemonic opcode and operand fields
(D) None of the above
Ans B
32. Which of the following is not collision
resolution technique?
(A) Hash
addressing
(B) Chaining
(C) Both (A) and
(B)
(D) Indexing
Ans D
33. Code optimization is responsibility of :
(A) Application
programmer
(B) System programmer
(C)Operating system
(D) All of the above
Ans A
34. Which activity is included in the first pass
of two pass assemblers ?
(A) Build
the symbol table
(B) Construct the intermediate code
(C) Separate mnemonic opcode and operand fields
(D) None of these
Ans A
35. In two pass assembler the symbol table is
used to store :
(A) Label and
value
(B) Only value
(C) Mnemonic
(D) Memory
Location
Ans D
36. Semaphores are used to :
(A) Synchronise
critical resources to prevent deadlock
(B) Synchronise critical resources to prevent
contention
(C) Do I/o
(D) Facilitate memory management
Ans A
37. In which of the following storage
replacement strategies, is a program placed in the largest available hole in
the memory ?
(A) Best
fit
(B) First fit
(C) Worst
fit
(D) Buddy
Ans C
38. Remote computing system involves the use of
timesharing systems and :
(A) Real
time processing
(B) Batch processing
(C)
Multiprocessing
(D) All of the above
Ans A
39. Non modifiable procedures are called
(A) Serially useable
procedures
(B) Concurrent procedures
(C) Reentrant
procedures
(D) Topdown procedures
Ans C
40. Match the following
(a) Disk
scheduling
(1) Round robin
(b) Batch
processing
(2) Scan
(c) Time
sharing
(3) LIFO
(d) Interrupt processing
(4) FIFO
(A) a-3, b-4, c-2, d-1
(B) a-4, b-3, c-2, d-1
(C) a-2,
b-4, c-1, d-3
(D) a-3, b-4, c-1, d-2
Ans C
41. The main objective of designing various
modules of a software system is :
(A) To decrease the cohesion and to increase the
coupling
(B) To
increase the cohesion and to decrease the coupling
(C) To increase the coupling only
(D) To increase the cohesion only
Ans B
42. Three essential components of a software
project plan are :
(A) Team structure, Quality assurance plans,
Cost estimation
(B) Cost
estimation, Time estimation, Quality assurance plan
(C) Cost estimation, Time estimation, Personnel
estimation
(D) Cost estimation, Personnel estimation, Team
structure
Ans B
43. Reliability of software is dependent on :
(A) Number of errors present in software
(B) Documentation
(C) Testing
suties
(D) Development Processes
Ans C
44. In transform analysis, input portion is
called :
(A) Afferent
branch
(B) Efferent branch
(C) Central Transform
(D) None of the above
Ans A
45. The Function Point (FP) metric is :
(A) Calculated from user requirements
(B) Calculated from Lines of code
(C) Calculated
from softwar’s complexity assessment
(D) None of the above
Ans C
46. Data Mining can be used as _________ Tool.
(A) Software
(B) Hardware
(C)
Research
(D) Process
Ans A
47. The processing speeds of pipeline segments
are usually :
(A) Equal
(B) Unequal
(C)
Greater (D)
None of these
Ans A
48. The cost of a parallel processing is
primarily determined by :
(A) Time complexity
(B) Switching complexity
(C) Circuit
complexity
(D) None of the above
Ans C
49. A data warehouse is always _________.
(A) Subject
oriented
(B) Object oriented
(C) Program
oriented (D)
Compiler oriented
Ans B
50. The term 'hacker' was originally associated
with :
(A) A computer program
(B) Virus
(C) Computer
professionals who solved complex computer problems.
(D) All of the above
Ans C
No comments:
Post a Comment