A successful man is one who can lay a firm foundation with the bricks others have thrown at him. It is not in the stars to hold our destiny but in ourselves.
1. The following deterministic finite automata recognizes:
2. Depth ion travels of the following directed graph is:
3. The maximum number of nodes in a binary tree of depth 10 is:
(A) 1024
(B) 210-1
(C) 1000
(D) None of the above
View/Hide Ans
Correct Answer is D
4. The regular expression given below describes:
r=(1+01)*(0+λ)
(A) Set of all string not containing ‘11’
(B) Set of all string not containing ‘00’
(C) Set of all string containing ‘01’
(D) Set of all string ending in ‘0’
View/Hide Ans
Correct Answer is D
5. Which of the following language is regular?
(A) L={anbn | ≥1}
(B) L={anbmcndm | n,m≥1}
(C) L={anbm | n,m≥1}
(D) L={anbmcn | n,m≥1}
View/Hide Ans
Correct Answer is C
6. 2’s complement of -100 is:
(A) 00011100
(B) 10011101
(C) 10011100
(D) 11100100
View/Hide Ans
Correct Answer is C
7. Which of the following expression remove hazard form: xy+zx’ ?
(A) xy+zx’
(B) xy+zx’
(C) xy+zx’+yz
(D) xy+zx’+wz
View/Hide Ans
Correct Answer is A
8. How many 1’s are present in the binary representation of (15x256+5x16+3)10:
(A) 8
(B) 9
(C) 10
(D) 11
View/Hide Ans
Correct Answer is A
9. If A ⊕ B=C, then
(A) A ⊕ C=B
(B) B ⊕ C=A
(C) A ⊕ B ⊕ C=1
(D) A ⊕ B ⊕ C=0
View/Hide Ans
Correct Answer is A,B,D
10. What is the maximum counting speed of a 4-bit binary counter which is composed of Flip-Flop with a propagation delay of 25ns?
(A) 1 MHz
(B) 10 MHz
(C) 100 MHz
(D) 4 MHz
View/Hide Ans
Correct Answer is B
11. The following loop in ‘C’:
    int i=0;
    while(i++<0) i--;
(A) will terminate
(B) will go into an infinite loop
(C) will give compilation erro
(D) will never be executed
View/Hide Ans
Correct Answer is B
12. In case of right shift bitwise operator in ‘C’ language, after shifting n bits, the left most n bits:
(A) are always filled with zeroes
(B) are always filled with ones
(C) are filled with zeroes or ones and is machine dependent
(D) none of the above
View/Hide Ans
Correct Answer is C
13. What keyword in class specification helps to hide data:
(A) Public
(B) Private
(C) Static
(D) Void
View/Hide Ans
Correct Answer is B
14. What is the output of the following ‘C’ program?
    main()
    {printf(“%x”,-1>>4);}
(A) ffff
(B) 0fff
(C) 0000
(D) fff0
View/Hide Ans
Correct Answer is A
15. Runtime polymorphism can be achieved by:
(A) Accessing virtual function through the pointer of the base class
(B) Accessing virtual function through the object
(C) The derived class
(D) None of these
View/Hide Ans
Correct Answer is A
16. Which of the following statements is wrong?
(A) 2-phase Locking Protocols suffer from deadlocks
(B) Time-Stamp Protocols suffer from more aborts
(C) Time-Stamp Protocols suffer from cascading roll back where as 2-Phase locking Protocol do not
(D) None of these
View/Hide Ans
Correct Answer is C
17. A recursive foreign key is a:
(A) references a relation
(B) references a table
(C) references its own relation
(D) references a foreign key
View/Hide Ans
Correct Answer is C
18. A sub class having more than one super class is called
(A) Category
(B) Classification
(C) Combination
(D) Partial Participation
View/Hide Ans
Correct Answer is A
19. A relation R={A,B,C,D,E,F} is given with following set of functional dependencies:
F={A→B,AD→C,B→F,A→E}. Which of the following is Candidate Key?
(A) A
(B) AC
(C) AD
(D) None of these
View/Hide Ans
Correct Answer is C
20. Which statement is false regarding data independence?
(A) Hierarchical data model suffers from data Independence
(B) Network model suffers from data Independence
(C) Relational model suffers only from logical data Independence
(D) Relational model suffers only from physical data Independence
View/Hide Ans
Correct Answer is C
21. The time required to find shortest path in a graph with n vertices and e edges is:
(A) O(e)
(B) O(n)
(C) O(e2)
(D) O(n2)
View/Hide Ans
Correct Answer is D
22. Pre order is also known as:
(A) Depth first order
(B) Breadth first order
(C) Topological order
(D) Linear order
View/Hide Ans
Correct Answer is A
23. The equivalent post fix express for d/(e+f) + b*c is:
(A) defbc/++
(B) def+/bc+*
(C) def+/bc*+
(D) None of these
View/Hide Ans
Correct Answer is C
24. Which algorithm has same average, worst case and best case time?
(A) Binary search
(B) Maximum of n numbers
(C) Quick sort
(D) Fibonacci search
View/Hide Ans
Correct Answer is B
25. Application of data structure in queue is:
(A) Strong Transmitter
(B) Polling
(C) Segmentation
(D) Modulation
View/Hide Ans
Correct Answer is B
26. In case of Bus/Tree topology signal balancing issue is overcome by:
(A) Strong Transmitter
(B) Polling
(C) Segmentation
(D) Modulation
View/Hide Ans
Correct Answer is C
27. Which of the following techniques are used to control data flow?
1. Windowing 2. Routing 3. RPCs 4. Buffering
(A) 1, 4
(B) 2, 3, 4
(C) 1, 3, 4
(D) 1, 2, 3, 4
View/Hide Ans
Correct Answer is A
28. TDM is ................
(A) A primary/secondary type protocol
(B) A peer/peer protocol
(C) A Non-priority peer/peer protocol
(D) A priority type protocol
View/Hide Ans
Correct Answer is C
29. What services does the Internet Layer provide?
1. Quality of service
2. Routing
3. Addressing
4. Connection-oriented delivery
5. Framing bits
(A) 1, 2, 3
(B) 2, 3, 4
(C) 1, 3, 4, 5
(D) 2, 3, 4, 5
View/Hide Ans
Correct Answer is A
30. Which of the following protocols is used to prevent looping?
(A) OSPF
(B) Spanning tree
(C) SRB
(D) Fragment free switching
View/Hide Ans
Correct Answer is B
31. The parsing technique that avoids back tracking is
(A) Top-down parsing
(B) Recursive-descent parsing
(C) Predictive
(D) Syntax tree
View/Hide Ans
Correct Answer is C
32. A Top-down Parse generates:
(A) Right-most derivation
(B) Right-most derivation in reverse
(C) Left-most derivation
(D) Left-most derivation in reverse
View/Hide Ans
Correct Answer is C
33. In an absolute loading scheme, which loader function is accomplished by programmer?
(A) Allocation
(B) Linking
(C) Reallocation
(D) Both (A) and (B)
View/Hide Ans
Correct Answer is D
34. Symbol table can be used for:
(A) Checking type compatibility
(B) Suppressing duplication of error message
(C) Storage allocation
(D) All of these above
View/Hide Ans
Correct Answer is D
35. Moving process from main memory to disk is called:
(A) Caching
(B) Termination
(C) Swapping
(D) Interruption
View/Hide Ans
Correct Answer is C
36. Part of a program where the shared memory is accessed and which should be executed indivisibly, is called:
(A) Semaphores
(B) Directory
(C) Critical Section
(D) Mutual exclusion
View/Hide Ans
Correct Answer is C
37. Windows is a .................. operating system.
(A) Non pre-emptive
(B) Pre-emptive
(C) Multi-user
(D) Real time
View/Hide Ans
Correct Answer is C
38. The “nice” command is used in Unix:
(A) to decrease the priority of a process
(B) to increase the priority of a process
(C) to get the highest priority
(D) nothing to do with the priorities
View/Hide Ans
Correct Answer is A,B
39. Which page replacement policy suffers from Belady’s anomaly?
(A) LRU
(B) LFU
(C) FIFO
(D) OPTIMAL
View/Hide Ans
Correct Answer is C
40. Cache memory is:
(A) High Speed Register
(B) Low-Speed RAM
(C) Non-Volatile RAM
(D) High-Speed RAM
View/Hide Ans
Correct Answer is D
41. Which of the following combination is preferred with respect to cohesion and coupling?
(A) low and low
(B) low and high
(C) high and low
(D) high and high
View/Hide Ans
Correct Answer is C
42. Difference between flow-chart and data-flow diagram is:
(A) there is no difference
(B) usage in high level design and low level design
(C) control flow and data flow
(D) used in application programs and system programs
View/Hide Ans
Correct Answer is C
43. Match the following:
Which of the following is true?
(a) Unit test
(i) Requirements
(b) System test
(ii) Design
(c) Validation test
(iii) Code
(d) Integration test
(iv) System Engineering
(A) (a-ii) (b-iii) (c-iv) (d-i)
(B) (a-i) (b-ii) (c-iv) (d-iii)
(C) (a-iii) (b-iv) (c-i) (d-ii)
(D) None of the above
View/Hide Ans
Correct Answer is D
44. Problems with waterfall model are:
1. Real projects rarely follow this model proposes
2. It is often difficult for the customer
3. Working model is available only in the end
4. Developers are delayed unnecessarily
Which of the following is true?
(A) 1 and 4 only
(B) 2 and 3 only
(C) 1, 2 and 3 only
(D) 1, 2, 3 and 4
View/Hide Ans
Correct Answer is D
45. Which one of the following is a object-oriented approaches:
(A) The Booch method
(B) The Rumbaugh method
(C) The Coad and Yomdon method
(D) All of the above
View/Hide Ans
Correct Answer is D
46. Which technical concept sets cellular apart from all preceding mobile/radio systems?
(A) FM-Transmission
(B) Duplex Functionality
(C) Frequency Reuse
(D) TDMA Technology
View/Hide Ans
Correct Answer is D
47. Wireless interconnections to the PSTN are also known as:
(A) Localities
(B) CLECs
(C) POPs
(D) IXCs
View/Hide Ans
Correct Answer is C
48. Dimensional modeling in Data mining refers to:
(A) view and interrogate data
(B) define structures and store data
(C) retrieve information only
(D) none of these
View/Hide Ans
Correct Answer is A
49. The U-NII(Unlicensed National Information Infrastructure) band operates at the ............. frequency.
(A) 2.4 GHz
(B) 33 MHz
(C) 5 GHz
(D) 16 GHz
View/Hide Ans
Correct Answer is C
50. Which digital radio technology employs an N=1 frequency-reuse plan?
(A) GSM
(B) TDMA
(C) D-AMPS
(D) CDMA
View/Hide Ans
Correct Answer is D
© 2022. All Rights Reserved | Copyright | Terms of Use & Privacy Policy