The more you lose yourself in something bigger than yourself, the more energy you will have.
1. The number of integers between 1 and 250 that are divisible by 2, 5 and 7 is
(A) 2
(B) 3
(C) 5
(D) 8
View/Hide Ans
Correct Answer is B
2. An undirected graph possesses an eulerian circuit if and only if it is connected and its vertices are
(A) all of even degree
(B) all of odd degree
(C) of any degree
(D) even in number
View/Hide Ans
Correct Answer is A
3. A partially ordered set is said to be a lattice if every two elements in the set have
(A) a unique least upper bound
(B) a unique greatest lower bound
(C) both (A) and (B)
(D) none of the above
View/Hide Ans
Correct Answer is C
4. The minimum number of edges in a connected graph with ‘n’ vertices is equal to
(A) n(n–1)
(B) n(n–1)/2
(C) n2
(D) n–1
View/Hide Ans
Correct Answer is D
5. Consider the problem of connecting 19 lamps to a single electric outlet by using extension cords each of which has four outlets. The number of extension cords required is
(A) 4
(B) 5
(C) 6
(D) 7
View/Hide Ans
Correct Answer is C
6. The decimal number equivalent of (4057.06)8 is
(A) 2095.75
(B) 2095.075
(C) 2095.937
(D) 2095.0937
View/Hide Ans
Correct Answer is D
7. AB+(A+B)’ is equivalent to
(A) A ⊕ B
(B) A Θ B
(C) (A ⊕ B) Θ A
(D) (A Θ B) ⊕ A
View/Hide Ans
Correct Answer is B
8. An astable multivibrator has
(A) one stable state
(B) two stable state
(C) no stable state
(D) none of these
View/Hide Ans
Correct Answer is C
9. 12-bit 2’s complement of –73.75 is
(A) 01001001.1100
(B) 11001001.1100
(C) 10110110.0100
(D) 10110110.1100
View/Hide Ans
Correct Answer is C
10. Encoding of data bits 0011 into 7-bit even Parity Hamming Code is
(A) 0011110
(B) 0101110
(C) 0010110
(D) 0011100
View/Hide Ans
Correct Answer is A
11. How many of the following declarations are correct ?
int z = 7.0;
double void = 0.000;
short array [2] = {0, 1, 2};
char c = “\n”;
(A) None
(B) One is correct
(C) Two are correct
(D) All four are correct
View/Hide Ans
Correct Answer is C
12. The value of the following expression (13/4*3)%5+1 is
(A) 5.75
(B) 2.95
(C) 1.4875
(D) 5
View/Hide Ans
Correct Answer is A
13. Which one of the following will set the value of y to 5 if x has the value 3, but not otherwise ?
(A) if (x = 3) y = 5
(B) if x = = 3 (y = 5)
(C) if (x = = 3); y = 5
(D) if (x = = 3) y = 5
View/Hide Ans
Correct Answer is D
14. Which one of the following sentences is true ?
(A) The body of a while loop is executed at least once.
(B) The body of a do … while loop is executed at least once.
(C) The body of a do … while loop is executed zero or more times
(D) A for loop can never be used in place of a while loop.
View/Hide Ans
Correct Answer is B
15. “Black” refers in the “Black-box” testing means
(A) Characters of the movie “Black”
(B) I – O is hidden
(C) Design is hidden
(D) Users are hidden
View/Hide Ans
Correct Answer is C
16. In generalisation, the differences between members of an entity is
(A) maximized
(B) minimized
(C) both (A) & (B)
(D) None of these
View/Hide Ans
Correct Answer is A
17. The dependency preservation decomposition is a property to decompose database schema D, in which each functional dependency X→Y specified in F,
(A) appeared directly in one of the relation schemas Ri in the decomposed D.
(B) could be inferred from dependencies that appear in some Ri.
(C) both (A) and (B)
(D) None of these
View/Hide Ans
Correct Answer is C
18. Which of the following is an optimistic concurrency control method ?
(A) Validation based
(B) Time stamp ordering
(C) Lock-based
(D) None of these
View/Hide Ans
Correct Answer is A
19. Optical storage is a
(A) high-speed direct access storage device.
(B) low-speed direct access storage device.
(C) medium-speed direct access storage device.
(D) high-speed sequential access storage device.
View/Hide Ans
Correct Answer is C
20. Which of the following is the process by which a user’s access to physical data in the application is limited, based on his privileges ?
(A) Authorization
(B) Authentication
(C) Access Control
(D) All of these
View/Hide Ans
Correct Answer is C
21. What is the maximum number of nodes in a B-tree of order 10 of depth 3 (root at depth 0) ?
(A) 111
(B) 999
(C) 9999
(D) None of the above
View/Hide Ans
Correct Answer is D
22. A binary tree with 27 nodes has …………. null branches.
(A) 54
(B) 27
(C) 26
(D) None of the above
View/Hide Ans
Correct Answer is D
23. The time complexity to build a heap of n elements is
(A) O(1)
(B) O(lgn)
(C) O(n)
(D) O(nlgn)
View/Hide Ans
Correct Answer is D
24. Linear probing suffers from a problem known as
(A) Secondary clustering
(B) Primary clustering
(C) Both (A) and (B)
(D) None of these
View/Hide Ans
Correct Answer is B
25. Which of the following can be the sequence of nodes examined in binary search tree while searching for key 88 ?
(A) 90, 40, 65, 50, 88
(B) 90, 110, 80, 85, 88
(C) 190, 60, 90, 85, 88
(D) 65, 140, 80, 70, 88
View/Hide Ans
Correct Answer is C
26. Frequency shift keying is used mostly in
(A) Radio transmissio
(B) Telegraphy
(C) Telephone
(D) None of the above
View/Hide Ans
Correct Answer is B
27. The baud rate is
(A) always equal to the bit transfer rate
(B) equal to twice the bandwidth of an ideal channel
(C) not equal to the signalling rate
(D) equal to half of the bandwidth of an ideal channel
View/Hide Ans
Correct Answer is B
28. How much bandwidth is there in 1 micron of spectrum at a wavelength of 1 micron?
(A) 300 MHz
(B) 3 GHz
(C) 300 THz
(D) 30 KHz
View/Hide Ans
Correct Answer is C
29. Which of the following file transfer protocols use TCP and establishes two virtual circuits between the local and remote server ?
(A) FTP
(B) TFTP
(C) TELNET
(D) NFS
View/Hide Ans
Correct Answer is A
30. The threshold effect in demodulator is
(A) exhibited by all demodulator, when the input signal to noise ratio is low.
(B) the rapid fall on output signal to noise ratio when the input signal to noise ratio fall below a particular value.
(C) the property exhibited by all A.M. suppressed carrier coherent demodulator.
(D) the property exhibited by correlation receiver
View/Hide Ans
Correct Answer is B
31. Object code is the output of ……………
(A) Operating System
(B) Compiler or Assembler
(C) only Assembler
(D) only Compiler
View/Hide Ans
Correct Answer is B
32. ‘Macro’ in an assembly level program is …………..
(A) sub program
(B) a complete program
(C) a hardware portion
(D) relative coding
View/Hide Ans
Correct Answer is A
33. Grammar of the programming is checked at …………… phase of compiler.
(A) semantic analysis
(B) code generation
(C) syntax analysis
(D) code optimization
View/Hide Ans
Correct Answer is C
34. The register or main memory location which contains the effective address of the operand is known as
(A) pointer
(B) special location
(C) indexed register
(D) None of the above
View/Hide Ans
Correct Answer is A
35. Macro-processors are ………….
(A) Hardware
(B) Compiler
(C) Registers
(D) None of the above
View/Hide Ans
Correct Answer is B
36. The dynamic allocation of storage areas with VSAM files is accomplished by
(A) Hashing
(B) Control splits
(C) Overflow areas
(D) Relative recoding
View/Hide Ans
Correct Answer is B
37. Which of the following command the file names in multiple columns?
(A) IS–X
(B) IS
(C) IS–1
(D) IS–f–X
View/Hide Ans
Correct Answer is B
38. WINDOWS is a …………… operating.
(A) Real time
(B) Multi-user
(C) Preemptive
(D) Non-preemptive
View/Hide Ans
Correct Answer is C
39. Page making process from main memory to disk is called
(A) Interruption
(B) Termination
(C) Swapping
(D) None of the above
View/Hide Ans
Correct Answer is C
40. A Dead-lock in an Operating System is
(A) Desirable process
(B) Undesirable process
(C) Definite waiting process
(D) All of the above
View/Hide Ans
Correct Answer is C
41. Prototyping is used to
(A) test the software as an end product
(B) expand design details
(C) refine and establish requirements gathering
(D) None of the above
View/Hide Ans
Correct Answer is C
42. Which one of these are not software maintenance activity ?
(A) Error correction
(B) Adaptation
(C) Implementation of Enhancement
(D) Establishing scope
View/Hide Ans
Correct Answer is D
43. The system specification is the first deliverable in the computer system engineering process which does not include
(A) Functional Description
(B) Cost
(C) Schedule
(D) Technical Analysis
View/Hide Ans
Correct Answer is A
44. The COCOMO model was introduced in the book title “Software Engineering Economics” authored by
(A) Abraham Silberschatz
(B) Barry Boehm
(C) C.J. Date
(D) D.E. Knuth
View/Hide Ans
Correct Answer is B
45. The Warnier diagram enables analyst
(A) to represent information hierarchy in a compact manner
(B) to further identify requirement
(C) to estimate the total cost involved
(D) None of the above
View/Hide Ans
Correct Answer is A
46. A data mart may contain
(A) summarised data
(B) de-normalized data
(C) aggregate departmental data
(D) All of the above
View/Hide Ans
Correct Answer is D
47. Data mining is
(A) the process of extracting valid, previously unknown, comprehensible and actionable information from large databases and using it to make crucial business decisions.
(B) a tool that allows end users direct access and manipulation of data from within data warehousing environment without the intervention of customised programming activity.
(C) a tool that helps end users extract useful business information from large database.
(D) All of the above
View/Hide Ans
Correct Answer is A
48. E-Choupal refers to
(A) calling meeting of Surpanches electronically
(B) conducting Panchayat meeting using latest electronic gadgets.
(C) providing window of information to villagers and farmers in NIC network.
(D) None of the above
View/Hide Ans
Correct Answer is C
49. The basic concepts of ethics in information society is/are
(A) Responsibility
(B) Accountability
(C) Liability
(D) All of the above
View/Hide Ans
Correct Answer is D
50. One of the distinguished features of super-computer over other category of computer
(A) parallel processing
(B) highest accuracy level
(C) more speed
(D) more capacity
View/Hide Ans
Correct Answer is C
© 2022. All Rights Reserved | Copyright | Terms of Use & Privacy Policy