mcqs all computer

Upload: qamar-nangraj

Post on 02-Mar-2016

111 views

Category:

Documents


1 download

DESCRIPTION

computer mcqs

TRANSCRIPT

  • 1) Which of the following is considered a broad band communicationchannel ?a. coaxial cableb. fiber optics cablec. microwave circuitsd. all of above

    Answer = D2) Which of the following does not allow multiple uses or devices to shareone communication line?

    a. doubleplexerb. multiplexerc. concentratord. controller

    Answer = A3) Which of the following is required to communicate between two computers ?

    a. communications softwareb. protocolc. communication hardwared. all of above including access to transmission medium

    Answer = D4) Which of the following is an advantage to using fiber optics datatransmission ?

    a. resistance to data theftb. fast data transmission ratec. low noise leveld. all of above

    5) The interactive transmission of data within a time sharing system may be best suited to ?a. simplex linesb. half-duplex linesc. full duplex linesd. biflex-lines

    Answer = B6) The optical fiber trans-Atlantic cable TAT-14 includes a section from Bude, Cornwall toTucker ton, New Jersey. Determine the propagation delay if the route length is 6,254 km. ?

    a. 31.98 msb. 3.198 ms.c. 31.27 msd. 312.7 ms

    Answer = C7) Manchester encoding is principally designed to ?

    a. ensure that the line remains unbalanced.b. have more than one symbol per bit period.

  • c. increase the bandwidth of a signal transmitted on the mediumd. ensure that a transition occurs in the center of each bit period.

    Answer = D8) A router ?

    a. forwards a packet to all outgoing links.b. forwards a packet to all outgoing links, except the link upon which the packet originatedc. forwards a packet to the next free outgoing linkd. determines on which outgoing link a packet is to be forwarded.

    Answer = D9) Telephone systems may be classified as ?

    a. simplex and symmetrical.b. duplex and asymmetrical.c. simplex and asymmetrical.d. duplex and symmetrical.

    Answer = D10) Which of the following signal is not standard RS-232-C signal ?

    a. VDRb. RTSc. CTSd. DSR

    Answer =A

    1) Which of the following is not a type of Computer Network?a. Local Area Network (LAN)b. Personal Area Network (PAN)c. Remote Area Network (RAN)d. Metropolitan Area Network (MAN)

    Answer = cExplanation: The Types of Computer Networks are LAN, MAN, PAN, WAN, CAN but RANRemote Area Network is not a type of CN.2) Full Form of NIC?

    a. New Internet Connectionb. Network Interface Cardc. Network Interface Connectiond. Net Interface Card

    Answer =BExplanation: NIC is Network Interface Card Which is Used to Connect Computer to a Network.

  • 3) Which of the following are type of Twisted Pair Cable?a. Coaxial Cableb. Shielded Twisted Pair (STP)c. Unshielded Twisted Pair (UTP)d. Only B and C

    Answer = DExplanation:STP and UTP are type of Twisted Pair Cable which are mostly used in all Networks.4) _________ Supports Data Rate Upto 1000 Mbps Gigabyte Ethernet.

    a. CAT 1b. Thinnetc. CAT 5d. CAT 5e

    Answer = DExplanation: CAT 5e is also Know As 1000 Mbps Gigabyte Ethernet and Supports Data RateUpto 1000 Mbps.5) Which Color Coding of Cable is used to Connect Similar Devices?

    a. Straight Cableb. Cross Over Cablec. Serial Cabled. All of Above.

    Answer = BExplanation: Cross Over Color Coding of UTP Cable is Used to connect Similar Devices like HUBto HUB, PC to PC, Switch To Switch.6) HUB is a _________ Device and Switch is a ________ Device.

    a. Unicast, Multicastb. Malticast, Unicastc. Broadcast, Unicastd. None of Above

    Answer = CExplanation: Hub is a Broadcasting Device and Switch is a Unicasting Device because Switchhave Memory Element to Store MAC Address.7) Switch is a Device of _________ Layer of OSI Model.

    a. Network Layerb. Data Link Layerc. Application Layerd. Session Layer

    Answer = BExplanation: Switches Operate On The Second Layer of OSI Model That is Data Link Layer.

  • 8) Star Topology is Based On a Central Device that can be __________ ?a. HUBb. Switchc. Only Ad. Both A and B

    Answer = DExplanation: HUB and Switch are used in Star Type Networks.9) TCP/IP is also well known as _______.

    a. OSI Modelb. TCP Modelc. DOD Modeld. Network Model

    Answer = CExplanation: TCP/IP Model is also known as DOD model.10) IPX/SPX is used in ______________.

    a. Novell's Netware Networkb. Mac - Macintoshc. Appled. Microsoft

    Answer = AExplanation: IPX/SPX - Internet Packet Exchanger/SequencedPackage Exchanger is used inNovell's Netware Network.

  • 1) The collection of communication lines and routers is calleda. LANb. MANc. WANd. Communication Subnet

    Answer = D2) In the IEEE standards 802.5 standard is also called ?

    a. Ethernetb. Token Busc. Wireless Token Area Networkd. Token Ring

    Answer = DExplanation: In the IEEE standards 802.5 standard is also called Token Ring3) _________ have a single communication channel that is shared by all the users on thenetwork. ?

    a. Point-to-Pointb. Broadcast Networkc. Protocold. PAN

    Answer = BExplanation: Broadcast Network Have Single Communication channel.4)A Wireless Access Point Behaves in a similar manner to that of a master-slave operation ?

    a. Trueb. False

    Answer = True5) Which of the following is an advantage to using fiber optics data transmission?

    a. resistance to data theftb. fast data transmission ratec. low noise leveld. all of above

    Answer = D

    6) Which of the following is required to communicate between two computers?a. communications softwareb. protocol

  • c. communication hardwared. all of above including access to transmission medium

    Answer = D7) Which of the following types of channels moves data relatively slowly?

    a. wide band channelb. voice band channelc. narrow band channeld. all of above

    Answer = C8) A protocol is a set of rules governing a time sequence of events that must take place ?

    a. between peersb. between an interfacec. between modemsd. across an interface

    Answer = A9) Which of the following transmission systems provide the highest data rate to in individualdevice?

    a. computer busb. telephone linesc. voice and moded. lease lines

    Answer = A10) Communiction circuits that transmit data in both directions but not at the same time areoperating in

    a. a simplex modeb. a half duplex modec. a full duplex moded. an asynchronous mode

    Answer = B

    1) The area of coverage of satellite radio beam is known as... ?a. Footprintb. Circular polarizationc. Beam widthd. Identitye. None of Above

  • Answer = AExplanation:No explanation for this question.2) Coaxial cable has conductors with ?

    a. Equal resistanceb. The same diameterc. Both A and Bd. A common axise. None of these

    Answer = DExplanation: Coaxial cables has two type of conductors one is inner and other is outer that hascommon axis.3) What protects the coaxial cable from noise ?

    a. Inner conductorb. Outer conductorc. Diameter of cabled. Insulating material

    Answer = BExplanation:The outer conductor is covered in protective plastic sheath. This shieldingof coaxial cable give it a good combination of high bandwidth and excellent noise immunity.4) Error detection at the data link level is achieved by ?

    a. Bit stuffingb. Hamming codesc. Cyclic Redundancy codesd. Equalizatione. None of above

    Answer = AExplanation:Bit stuffing also known as positive justification is the insertion of non-informationbits into data.5) MAN refers to ?

    a. Mega Area Networkb. Metropolitan Area Networkc. Mini Area Networkd. Medium Area Network

    Answer = BExplanation: A metropolitan area network covers a city. The best example is the cabletelevision network available in cities.6) Which of the following layer is not in OSI model ?

  • a. physical layerb. internet layerc. network layerd. transport layer

    Answer =BExplanation: The OSI model has total 7 layers out of which internet layer is not a part of OSImodel.7) Nyquist Theorem to calculate data rate is ?

    a. 2H log2 V bits/secb. H log2 V bits/secc. Hlog2 (1+S/N)d. 2H log2 (1+s/n)

    Answer = AExplanation:No explanation8) Copper wire is an example of ?

    a. Guided Transmission Mediab. Unguided Transmission Mediac. Group Mediad. None of these

    Answer = AExplanation:Copper wires comes under the Guided Media. Coaxialcables consist of thestiff copper wire as a core.9) Iridium and Dysprosium projects, proposed by Motorola are related to ?

    a. Geosynchronous satelliteb. Wavelengthc. Low orbit satellited. ISDN

    Answer = CExplanation:Moving down in altitude, we come to LEO satellites. Due to their rapid motion,large numbers of them are needed for a complete system.10) Which of the following is a type of fragmentation ?

    a. Transparentb. Non transparentc. Both A and Bd. None of these

    Answer = CExplanation:Fragmentation is used to break up the packets into fragments. It is of two types :Transparent and Non transparent.

  • 1) Collection of interconnected networks sometimes called ?a. Internetb. Wireless networkc. Mobile Networkd. None of these

    Answer = AExplanation: Internet is not a single network but network of networks.2) Which of the following is wrong example of network layer ?

    a. X.25 Level 2-ISOb. Source Routing and Domain Naming Usenetc. Internet Protocol(IP) - ARPANETd. X-25 Packet Level Prrotocol (PLP) - ISOe. None of these

    Answer = AExplanation: X.25 is an ITU - T standard that specifies an interface between a host system anda packet switching network.3) Mobile computers and personal digital assistant (PDAs) are theexamples of ?

    a. Radio broadcastingb. Wireless networkc. Geosynchronousd. LAN

    Answer = BExplanation: Personal Digital Assistant also known as palmtop computers is a mobile devicethat functions as the personal information manager, mostly access internet through Wi - Fi orwireless wide area network4) ATM (Asynchronous Transfer Mode) is fundamentally a....... technology?

    a. Circuit switchingb. Packet switchingc. Narrow bandd. None of these

    Answer = BExplanation:ATM is a cell switching and multiplexing technology that combines the features ofcircuit switching with packet switching. Like X.25 and frame relay ATM defines the interactionbetween the user equipment and network.5) Which of the following is a variation of Frequency DivisionMultiplexing (FDM) ?

    a. Time Division Multiplexing(TDM)b. Pulse Code Multiplexing(PCM)c. Wavelength Division Multiplexing(WDM)

  • d. None of theseAnswer = CExplanation:The WDM is commonly applied on the optical carrier while FDM is applied on theradio carrier. Since wavelength and frequency are tied together through a simple directlyinverserelationship, the two terms actually describe the same concept.6) One security method is encryption. But encryption does nothing to keep digital pests andhackers out. To accomplish this goal, we need ?

    a. Routerb. Bridgesc. Hubsd. Firewalls

    Answer = DExplanation: Main objective of firewall is to control the incoming and outgoing network trafficby analyzing the data packets and determining whether it should be allowed through or not,based on a predetermined rule set.7) HTTP refers to ?

    a. Hyper Text Transfer Protocolb. Hyper Text Transmission Protocolc. Hyper Text Tie Protocold. None of these

    Answer = AExplanation:No explanation8) Why was the OSI developed ?

    a. Manufacturers disliked the TCP/IP protocolb. The rate of data transfer was increasing exponentiallyc. Standards were needed to allow any two systems to communicated. None of these

    Answer = CExplanation:OSI was an effort to standardize the networking that was started in 19779) Auto dialing allows ?

    a. You to dial up phone numbers by typing them on the keyboardb. A personal computer to answer incoming calls without human assistancec. Both A and Bd. None of above

    Answer = AExplanation:Auto dialer is an electronic device or software that automatically dialsthe telephone numbers.

  • 10) Sending a file from your personal computer's primary memory or disk to anothercomputer is called ?

    a. uploadingb. hang onc. logging ond. downloadinge. None of these

    Answer = AExplanation: Uploading refers to sending data from local system to remote system such asserver or client.

    1) BSC is a ?a. Character Oriented Protocolb. Bit Oriented Protocolc. Full duplex protocold. Half duplex protocole. A and D

    Answer = EExplanation: BSC stands for Binary synchronous Communication. It is a character oriented protocolby IBM's that interpret a transmission frame as a character and usually contain one byte.2) Which of the following are non - polling system ?

    a. TDMAb. Stop & waitc. Xon/Xoffd. Continuous ARQe. A and C

    Answer = EExplanation: No Explanation3) Adaptive or dynamic directory used in packet routing changes?

    a. within each user sessionb. with each user sessionc. at system generation time onlyd. Both A and B

    4) The parameter which gives the probability of the transport layer itself spontaneouslyterminating a connection due to internal problem is called?

    a. protectionb. resiliencec. option negotiationd. transfer failure

  • Answer = BExplanation: Resilience is the ability to provide and maintain an acceptable level of service in theface of faults and challenges to normal operation.5) What is the main purpose of a data link content monitor ?

    a. to detect problems in protocolsb. to determine the type of switchingc. to determine the type of transmission used in data linkd. to determine the flow of data

    Answer = AExplanation: No Explanation6) Which of the following is an example of bounded media ?

    a. Wave guideb. Coaxial Cablec. Fiber optic cabled. All of above

    Answer = DExplanation: Bounded media is also calles the wired media or guided media.7) ICMPv6 includes ......?

    a. RARPb. ARPc. ICMPd. B and C

    Answer = DExplanation: Internet control message protocol includes ABP and ICMP both.8) IPv6 has ...... bit address ?

    a. 32b. 64c. 128d. variable

    Answer = CExplanation: IPv6 addresses have a size of 128 bits. Therefore, IPv6 has a vastly enlarged addressspace compared to IPv4.9) What is the main difference between DDCMP and SDLC ?

    a. DDCMP does not need special hardware to final the beginning of amessageb. DDCMP has a message headerc. SDLC has a IP addressd. SDLC does not use CPC

    Answer = AExplanation: HDLC (High-Level Data Link Control) is communication protocol and SDLC(Synchronous Data Link Control) is data link protocols.

  • 10) Number of bits per symbol used in Baudot code is ?a. 7b. 8c. 5d. 9

    Answer = CExplanation: Baudot code is a character set that preceded the more sophisticated character setEBCDIC

    1)Which protocol working at the Transport layer provides a connectionless servicebetween hosts?

    a. IPb. ARPc. TCPd. UDP

    Answer = DExplanation: User Datagram Protocol is used at the Transport layer to provide a connectionlessservice.2) Which protocol works at the Transport layer and provides virtual circuits between hosts?

    a. IPb. ARPc. TCPd. UDP

    Answer = CExplanation: Transmission Control Protocol sets up a virtual circuit before transmitting anydata. This creates a reliable session and is known as a connection-oriented session.3) Which protocol works at the Internet layer and provides a connection service betweenhosts?

    a. IPb. ARPc. TCPd. UDP

    Answer = AExplanation: Internet Protocol is used to address hosts and route packets through theinternetwork. The question does not refer to a connection-oriented service, which is differentfrom a plain connection service.4) If a host broadcasts a frame that includes a source and destination hardware address, andits purpose is to assign IP addresses to itself, which protocol at the Network layer does thehost use?

    a. RARP

  • b. ARPAc. ICMPd. TCPe. IPX

    Answer = AExplanation: Reverse ARP is used to find an IP address from a known hardware address.5) If a router interface is congested, which protocol in the IP suite is used to tell neighborrouters?

    a. RARPb. ARPc. ICMPd. IPe. TCP

    Answer = CExplanation: Internet Control Message Protocol (ICMP) is used to send redirects back to anoriginating router.6) What is the valid host range the IP address 172.16.10.22 255.255.255.240 is a part of?

    a. 172.16.10.20 through 172.16.10.22b. 172.16.10.1 through 172.16.10.255c. 172.16.10.16 through 172.16.10.23d. 172.16.10.17 through 172.16.10.31e. 172.16.10.17 through 172.16.10.30

    Answer = EExplanation: First start by using the 256 mask, which in this case is 256240=16. The firstsubnet is 16; the second subnet is 32. This host must be in the 16 subnet; the broadcastaddress is 31 and the valid host range is 1730.7) What range of addresses can be used in the first octet of a Class B network address?

    a. 1-126b. 1-127c. 128-190d. 128-191e. 129-192f. 192-220

    Answer = DExplanation: A Class B network is defined in the first octet with thenumbers 128191.8) What range of addresses can be used in the first octet of a Class C address?

    a. 1-127b. 129-192c. 203-234d. 192-223

    Answer = DExplanation: A Class C network is defined in the first octet with thenumbers 192-223.

  • 9) How many bytes is an Ethernet address?a. 3b. 4c. 5d. 6e. 7f. 8g. 16

    Answer = DExplanation: An Ethernet (MAC) address is 6 bytes long (48 bits).10) What protocol is used to find the hardware address of a local device?

    a. RARPb. ARPc. IPd. ICMPe. BootP

    Answer = BExplanation: Address Resolution Protocol (ARP) is used to find the hardware address from aknown IP address.

    1) Manchester code is a ?

    a. Bi- Polar codeb. non return to zero codec. polar coded. B and C

    Answer = DExplanation:No Explanation2) How many OSI layers are covered in the X.25 standard ?

    a. threeb. twoc. sevend. sixe. None of above

    Answer = AExplanation:The three layer are : Physical, Data Link, Network.

  • 3) The receive equalizer reduce delay distortions using ?a. tapped delay linesb. gearshiftc. descramblerd. difference enginee. None of above

    Answer = AExplanation: No Explanation4) In communication satellite, multiple repeaters are known as ?

    a. detectorb. modulatorc. stationsd. transponderse. None of above

    Answer = DExplanation: A communications satellite's transponder, is the series of interconnected unitswhich form a communications channel between the receiving and the transmitting antennas.5) In OSI network architecture, the dialogue control and token management areresponsibilities of ?

    a. Session layerb. network layerc. transport layerd. Data link layere. None of above

    Answer = AExplanation: No Explanation6) The geostationary satellite used for communication system ?

    a. rotates with earthb. remains stationery relative to the earthc. is positioned over equatord. All of above

    Answer = DExplanation: A geosynchronous satellite is a satellite in geosynchronous orbit, with an orbitalperiod the same as the Earth's rotation period. Such a satellite returns to the same position inthe sky after each sidereal day, and over the course of a day traces out a path in the sky that istypically some form of analemma. A special case of geosynchronous satellite isthe geostationary satellite, which has a geostationary orbit a circular geosynchronous orbitdirectly above the Earth's equator7) Radio communication frequencies ranges from?

    a. 3 KHz to 300 KHzb. 3 KHz to 300 GHz

  • c. 300 KHz to 3 GHzd. 3 KHz to 3,000 GHz

    Answer = BExplanation: Radio frequency (RF) is a rate of oscillation in the range of about 3 kHz to300 GHz, which corresponds to the frequency of radio waves, and the alternating currentswhich carry radio signals.8) The frequency ranges from 300 KHz to 3 MHz is used for ?

    a. AM radio transmissionb. TV transmissionc. FM radio transmissiond. Microwave communication, satellite and radere. None of above

    Answer = AExplanation: No Explanation9) Establishing a virtual connection is functionally equivalent to ?

    a. Connecting as virtual memoryb. Physically connecting a DTE and DCEc. Placing a telephone call prior to a conversationd. Placing a modem prior to a conversatione. None of above

    Answer = CExplanation: No Explanation10) Which of the following is a function of e-mail system ?

    a. Compositionb. Transferc. Reportingd. All of above

    Answer = DExplanation: No Explanation

    1) A network that requires human intervention of route signals is called a ?a. Bus networkb. Ring netwkorkc. Star networkd. T-switched networke. None of above

    Answer = DExplanation: No Explanation

  • 2) Which layer functions as liaison between user support layers andnetwork support layers ?a. network layerb. physical layerc. transport layerd. session layer

    Answer = CExplanation: Transport Layer functions as liaison between user support layers(Application, Presentation and Session) and network support layers (Network, Data Link andPhysical)3) If digital data rate of 9600 bps is encoded using 8-level phase shift keying method, themodulation rate is?

    a. 1200 bandsb. 3200 bandsc. 4800 bandsd. 9600 bandse. None of above

    Answer = C

    4) Maximum data rate of a channel for a noiseless 3-KHz binarychannel is?a. 3000 bpsb. 6000 bpsc. 1500 bpsd. None of above

    Answer = B

    5) If the bit string 0111101111101111110 is subjected to bit stuffingfor the flag string01111110, the output string is ?

    a. 011110111110011111010b. 01111011111011111100c. 01111011111011111010d. 0111101111101111110

    Answer = A

    6) Which of the following is not a standard RS-232C signal ?a. RTS

  • b. CTSc. DSRd. VDR

    Answer = D

    7) In Ethernet CSMS/CD the special bit sequence transmitted by the media access managementfor collision handling is called as ?

    a. preambleb. postamblec. jamd. None of above

    Answer = C8) HDLC is ?

    a. bit orientedb. Code transparentc. Code dependentd. None of abovee. A and B

    Answer = D9) Which of the following are non-polling system ?

    a. TDMAb. stop & waitc. Xon/Xoffd. Continuous ARQe. A and C

    Answer = E10) Adaptive or dynamic directory used in packet routing changes ?

    a. within each user sessionb. with each user sessionc. at system generation times onlyd. Both A and B

    Answer = A

    1) Which of the following is a congestion control algorithm?

  • a. The leaky bucketb. Token bucketc. Resource Respondez sil vous plait protocold. All of above

    Answer = D2) Which of the following is a function of e-mail system ?

    a. Mosaicb. Netscapec. Internet Explorerd. All of above

    Answer = D3) Demodulation is the process of ?

    a. converting digital signals to analog signalsb. converting analog signals to digital signalsc. dividing the high-speed signals into frequency bandsd. combining many low speed signals into one high speed channele. None of above

    Answer = B4) Bulletin board system ?

    a. is a public access message systemb. converts digital signals to analog signalsc. is a modem capable of accepting commandsd. converts digital signals to analog signalse. None of above

    Answer = A5) An information utility can offer a user ?

    a. instant bonds and stock quotationsb. news stories from wire servicesc. Complete airline schedules for all domestic flightsd. All of abovee. None of above

    Answer = D6) A network that requires human intervention of route signals is called a ?

    a. bus networkb. ring networkc. star network

  • d. T- switched networke. None of above

    Answer = D7) In OSI network architecture, the dialogue control and token management areresponsibilities of ?

    a. session layerb. network layerc. transport layerd. data link layere. none of above

    Answer = A8) What is the main function of transport layer ?

    a. node to node deliveryb. process to process message deliveryc. synchronizationd. updating and maintenance of routing tables

    Answer = B9) Which of the following is an important characteristics of LAN ?

    a. application independent interfaceb. low cost access for low bandwidth channelsc. unlimited expansiond. parallel transmissione. None of above

    Answer = A10) To deliver a message to the correct application program running on a host, the .... addressmust be consulted ?

    a. portb. physicalc. IPd. None

    Answer = A

    1) Collection of interconnected networks sometimes called ?a. Internetb. Wireless network

  • c. Mobile Networkd. None of these

    Answer = AExplanation: Internet is not a single network but network of networks.2) Which of the following is wrong example of network layer ?

    a. X.25 Level 2-ISOb. Source Routing and Domain Naming Usenetc. Internet Protocol(IP) - ARPANETd. X-25 Packet Level Prrotocol (PLP) - ISOe. None of these

    Answer = AExplanation: X.25 is an ITU - T standard that specifies an interface between a host system anda packet switching network.3) Mobile computers and personal digital assistant (PDAs) are theexamples of ?

    a. Radio broadcastingb. Wireless networkc. Geosynchronousd. LAN

    Answer = BExplanation: Personal Digital Assistant also known as palmtop computers is a mobile devicethat functions as the personal information manager, mostly access internet through Wi - Fi orwireless wide area network4) ATM (Asynchronous Transfer Mode) is fundamentally a....... technology?

    a. Circuit switchingb. Packet switchingc. Narrow bandd. None of these

    Answer = BExplanation:ATM is a cell switching and multiplexing technology that combines the features ofcircuit switching with packet switching. Like X.25 and frame relay ATM defines the interactionbetween the user equipment and network.5) Which of the following is a variation of Frequency DivisionMultiplexing (FDM) ?

    a. Time Division Multiplexing(TDM)b. Pulse Code Multiplexing(PCM)c. Wavelength Division Multiplexing(WDM)d. None of these

    Answer = CExplanation:The WDM is commonly applied on the optical carrier while FDM is applied on the

  • radio carrier. Since wavelength and frequency are tied together through a simple directlyinverserelationship, the two terms actually describe the same concept.6) One security method is encryption. But encryption does nothing to keep digital pests andhackers out. To accomplish this goal, we need ?

    a. Routerb. Bridgesc. Hubsd. Firewalls

    Answer = DExplanation: Main objective of firewall is to control the incoming and outgoing network trafficby analyzing the data packets and determining whether it should be allowed through or not,based on a predetermined rule set.7) HTTP refers to ?

    a. Hyper Text Transfer Protocolb. Hyper Text Transmission Protocolc. Hyper Text Tie Protocold. None of these

    Answer = AExplanation:No explanation8) Why was the OSI developed ?

    a. Manufacturers disliked the TCP/IP protocolb. The rate of data transfer was increasing exponentiallyc. Standards were needed to allow any two systems to communicated. None of these

    Answer = CExplanation:OSI was an effort to standardize the networking that was started in 19779) Auto dialing allows ?

    a. You to dial up phone numbers by typing them on the keyboardb. A personal computer to answer incoming calls without human assistancec. Both A and Bd. None of above

    Answer = AExplanation:Auto dialer is an electronic device or software that automatically dialsthe telephone numbers.10) Sending a file from your personal computer's primary memory or disk to anothercomputer is called ?

    a. uploadingb. hang on

  • c. logging ond. downloadinge. None of these

    Answer = AExplanation: Uploading refers to sending data from local system to remote system such asserver or client.

    1) The area of coverage of satellite radio beam is known as... ?a. Footprintb. Circular polarizationc. Beam widthd. Identitye. None of Above

    Answer = AExplanation:No explanation for this question.2) Coaxial cable has conductors with ?

    a. Equal resistanceb. The same diameterc. Both A and Bd. A common axise. None of these

    Answer = DExplanation: Coaxial cables has two type of conductors one is inner and other is outer that hascommon axis.3) What protects the coaxial cable from noise ?

    a. Inner conductorb. Outer conductorc. Diameter of cabled. Insulating material

    Answer = BExplanation:The outer conductor is covered in protective plastic sheath. This shieldingof coaxial cable give it a good combination of high bandwidth and excellent noise immunity.4) Error detection at the data link level is achieved by ?

    a. Bit stuffingb. Hamming codesc. Cyclic Redundancy codesd. Equalization

  • e. None of aboveAnswer = AExplanation:Bit stuffing also known as positive justification is the insertion of non-informationbits into data.5) MAN refers to ?

    a. Mega Area Networkb. Metropolitan Area Networkc. Mini Area Networkd. Medium Area Network

    Answer = BExplanation: A metropolitan area network covers a city. The best example is the cabletelevision network available in cities.6) Which of the following layer is not in OSI model ?

    a. physical layerb. internet layerc. network layerd. transport layer

    Answer =BExplanation: The OSI model has total 7 layers out of which internet layer is not a part of OSImodel.7) Nyquist Theorem to calculate data rate is ?

    a. 2H log2 V bits/secb. H log2 V bits/secc. Hlog2 (1+S/N)d. 2H log2 (1+s/n)

    Answer = A

    8) Copper wire is an example of ?a. Guided Transmission Mediab. Unguided Transmission Mediac. Group Mediad. None of these

    Answer = AExplanation:Copper wires comes under the Guided Media. Coaxial cables consist of thestiff copper wire as a core.9) Iridium and Dysprosium projects, proposed by Motorola are related to ?

    a. Geosynchronous satellite

  • b. Wavelengthc. Low orbit satellited. ISDN

    Answer = CExplanation:Moving down in altitude, we come to LEO satellites. Due to their rapid motion,large numbers of them are needed for a complete system.10) Which of the following is a type of fragmentation ?

    a. Transparentb. Non transparentc. Both A and Bd. None of these

    Answer = CExplanation:Fragmentation is used to break up the packets into fragments. It is of two types :Transparent and Non transparent.

    1) The collection of communication lines and routers is calleda. LANb. MANc. WANd. Communication Subnet

    Answer = D2) In the IEEE standards 802.5 standard is also called ?

    a. Ethernetb. Token Busc. Wireless Token Area Networkd. Token Ring

    Answer = DExplanation: In the IEEE standards 802.5 standard is also called Token Ring3) _________ have a single communication channel that is shared by all the users on thenetwork. ?

    a. Point-to-Pointb. Broadcast Networkc. Protocold. PAN

    Answer = BExplanation: Broadcast Network Have Single Communication channel.

  • 4)A Wireless Access Point Behaves in a similar manner to that of a master-slave operation ?a. Trueb. False

    Answer = True5) Which of the following is an advantage to using fiber optics data transmission?

    a. resistance to data theftb. fast data transmission ratec. low noise leveld. all of above

    Answer = D

    6) Which of the following is required to communicate between two computers?a. communications softwareb. protocolc. communication hardwared. all of above including access to transmission medium

    Answer = D7) Which of the following types of channels moves data relatively slowly?

    a. wide band channelb. voice band channelc. narrow band channeld. all of above

    Answer = C8) A protocol is a set of rules governing a time sequence of events that must take place ?

    a. between peersb. between an interfacec. between modemsd. across an interface

    Answer = A9) Which of the following transmission systems provide the highest data rate to in individualdevice?

    a. computer busb. telephone linesc. voice and moded. lease lines

  • Answer = A10) Communiction circuits that transmit data in both directions but not at the same time areoperating in

    a. a simplex modeb. a half duplex modec. a full duplex moded. an asynchronous mode

    Answer = B

  • 1) Spiral Model was developed by?a. Bev Littlewoodb. Berry Bohemc. Roger Pressmand. Victor Bisili

    Answer = BExplanation: Spiral model was developed by Berry Bohem in 1986 in his article "A Spiral Modelof Software Development and Enhancement"2) Which model is popular for students small projects ?

    a. Waterfall Modelb. Spiral Modelc. Quick and Fix modeld. Prototyping Model

    Answer = AExplanation: No Explanation3) Which is not a software life cycle model?

    a. Spiral Modelb. Waterfall Modelc. Prototyping Modeld. Capability maturity Model

    Answer = DExplanation:Capability maturity model is not a software life cycle model4) Project risk factor is considered in ?

    a. Spiral Modelb. Waterfall Modelc. Prototyping Modeld. Iterative enhancement Model

    Answer = AExplanation:Aim of Risk analysis phase in the spiral model is to eliminate the high riskproblems before they threaten the project operation or cost.5) SDLC stands for ?

    a. Software design life cycleb. Software development life cyclec. System design life cycled. System development life cycle

    Answer = BExplanation:Full form of SDLC is software development life cycle.

  • 6) Build and Fix model has?a. 3 Phasesb. 1 Phasesc. 2 Phasesd. 4 Phases

    Answer = CExplanation:Build and fix model has 2 phases one is " build " and other is " fix " .7) SRS stands for ?

    a. Software requirement specificationb. Software requirement solutionc. System requirement specificationd. None of Above

    Answer = AExplanation: SRS acts as a contract between the developer and the user.8) Waterfall model is not suitable for ?

    a. Small Projectsb. Complex Projectsc. Accommodating changed. None of Above

    Answer = CExplanation:Waterfall model does not accommodate any change that's why this model is usedin those situations where requirements are well understood.9) RAD stands for ?

    a. Rapid Application Developmentb. Relative Application Developmentc. Ready Application Developmentd. Repeated Application Development

    Answer =A

    10) RAD Model was purposed by ?a. IBMb. Motorolac. Microsoftd. Lucent Technologies

    Answer =AExplanation:RAD Model was purposed by IBM in 1980s through the book of James Martinentitles "Rapid Application Development"

  • 1) Software engineering aims at developing ?a. Reliable Softwareb. Cost Effective Softwarec. Reliable and cost effective Softwared. None Of Above

    Answer = CExplanation:Software engineering is the process that aims at developing the software's thatare Reliable and cost effective as well.2) A good specification should be ?

    a. Unambiguousb. Distinctly Specificc. Functionald. All of Above

    Answer = DExplanation:A good specification should have all the qualities such as unambiguos, distinctlyspecific and functional.3) Which of the following is a tool in design phase ?

    a. Abstractionb. Refinementc. Information Hidingd. All of Above

    Answer = D4) Information hiding is to hide from user, details ?

    a. that are relevant to himb. that are not relevant to himc. that may be maliciously handled by himd. that are confidential

    Answer = CExplanation:Information hiding is just the process of making inaccessible certain details thathave no effect on the other parts of the program.5) Which of the following comments about object oriented design ofsoftware, is not true ?

    a. Objects inherit the properties of classb. Classes are defined based on the attributes of objectsc. an object can belong to two classesd. classes are always different

    Answer = CExplanation:An object can not belong to two classes.

  • 6) Design phase includes?a. data, architectural and procedural design onlyb. architectural, procedural and interface design onlyc. data, architectural and interface design onlyd. data, architectural, interface and procedural design

    Answer = DExplanation:Design phase included the design of whole softwareincluding data, architectural,interface and procedural design.7) To completely write the program in FORTRAN and rewrite the 1% code in assemblylanguage, if the project needs 13 days, the team consists of ?

    a. 13 programmersb. 10 programmersc. 8 programmersd. 100/13 programmers

    Answer = CExplanation: Writing the whole program in FORTRAN takes 100 man-day, remaining 1% coderequires 4 man-day. If it is completed in 13 days then 104/13 = 8 programmers it required.8) If 99% of the program is written in FORTRAN and the remaining 1% in assembly language,the percentage increase in the programmingtime compared to writing the entire program inFORTRAN and rewriting the 1% in assembly language is ?

    a. 10b. 5c. 13d. 8

    Answer = BExplanation:The first case takes 99+10=109 man-day. The second case require 100+4=104man-day. Percentage = (109-104)*100/100 = 59) If the entire program is written in FORTRAN, the percentage increase in the execution time,compared to writing the entireprogram in FORTRAN and rewriting the 1% in assemblylanguage is ?

    a. 0.9b. 0.8c. 8d. 9

    Answer = BExplanation:Let the first case takes 100 units of time to execute. Second case will take 99+(1/5) units of time. As the 1% coding in assembly language will take 1/5 units of time. Hencethe required percentage = 0.8*100/100 = 0.8.

  • 10) If 99% of the program is written in FORTRAN and the remaining 1% in assembly languagethe percentage increase in the execution time, compared to writing the 1% in assemblylanguage is ?

    a. 0.9b. 0.1c. 1

    Answer = DExplanation:In both cases the final program will have the same 99% of code in FORTRAN andthe remaining 1% in assembly language. Hence the execution time will remain same.

    1) White box testing, a software testing technique is sometimes called ?a. Basic pathb. Graph Testingc. Dataflowd. Glass box testing

    Answer = DExplanation: White box testing also named as clear box testing, transparent testing, glass boxtesting and structural testing. It is a method in which the internal structure of application istested.2) Black box testing sometimes called ?

    a. Data Flow testingb. Loop Testingc. Behavioral Testingd. Graph Based Testing

    Answer = CExplanation: Black box testing is a method that tests for the functionality of an application.3) Which of the following is a type of testing ?

    a. Recovery Testingb. Security Testingc. Stress Testingd. All of above

    Answer = DExplanation: Recovery testing is a method for testing how well asoftware can recover fromcrashes. Security testing ensures that thesoftware protects the data and performs its allfunctions. Stress testing determines the robustness of software.4) The objective of testing is ?

    a. Debugging

  • b. To uncover errorsc. To gain modularityd. To analyze system

    Answer = BExplanation: The main objecting of testing is to make the softwareerror free.5) ...... is a black box testing method ?

    a. Boundary value analysisb. Basic path testingc. Code path analysisd. None of above

    Answer = AExplanation:In boundary value analysis, we choose an input from test cases from anequivalence class such that the input lies on the edge of equivalence class.6) Structured programming codes includes ?

    a. sequencingb. alterationc. iterationd. multiple exit from loopse. only A, B and C

    Answer = EExplanation:These three constructs are sufficient to program any algorithm. Moreover, as faras possible single entry single exit control constructs are used.7) An important aspect of coding is ?

    a. Readabilityb. Productivityc. To use as small memory space as possibled. brevity

    Answer = AExplanation:Readability and understandability as a clear objective of coding activity can itselfhelp in producing software that is more maintainable.8) Data structure suitable for the application is discussed in ?

    a. data designb. architectural designc. procedural designd. interface design

    Answer = AExplanation: Data design is the first and most important design activity, where the main issueis to select the appropriate data structure.

  • 9) In object oriented design of software , objects have ?a. attributes and names onlyb. operations and names onlyc. attributes, name and operationsd. None of above

    Answer = CExplanation: The objects contains attributes, names and operations as well.10) Function oriented metrics were first proposed by ?

    a. Johnb. Gaffneyc. Albrechtd. Basili

    Answer = CExplanation:Albrecht suggests a measure called Function point, which are derives using aempirical relationship based on the countable measures of software information domain.

    1) Given a source code with 10 operators includes 6 unique operators, and 6 operand including2 unique operands. The program volume is ?

    a. 48b. 120c. 720d. insufficient data

    Answer = AExplanation: No Explanation2) In the system conceps, term organization ?

    a. implies structure and orderb. refers to the manner in which each component fuctions with other components of the systemc. refers to the holism of systemd. means that part of the computer system depend on one another

    Answer = AExplanation: No Explanation3) In the system concepts, the term integration ?

    a. implies structure and orderb. refers to the manner in which each component functions with other components of the systemc. means that parts of computer system depends on one anotherd. refers to the holism of systems

    Answer = D

  • 4) Project indicator enables a software project manager to ?a. assess the status of an ongoing projectb. track potential risksc. uncover problem araes before they " go critical "d. All of above

    Answer = D5) Once object oriented programming has been accomplished, unit testing is applied for eachclass. Class tests includes ?

    a. Fault based testingb. Random testingc. Partition tetingd. All of above

    Answer = D6) ............ Developed a set of software quality factors that has been given the acronym FURPS- Functinality, Usability, Reliability, performance, Supportability ?

    a. Hewlett - Packardb. Rambaughc. Boochd. Jacobson

    Answer = A7) In system design, we do following ?

    a. Hardware design after softwareb. Software design after hardwarec. Parallel hardware and software designd. No hardware design needed

    Answer = C8) The document listing all procedures and regulations that generally govern an organizationis the ?

    a. Personal poling bankb. Organizing manualc. Administration policy manuald. Procedure log

    Answer = B9) A turnkey package includes ?

    a. Softwareb. Hardware

  • c. Traningd. All of above

    Answer = D10) Detailed design is expressed by ?

    a. CSPECb. PSPECc. MINI SPECd. Code SPEC

    Answer = C

    1) In functional decomposition, the data flow diagram ?a. is ignoredb. is partitioned according to the closeness of the datagram and storage itemsc. is partitioned according to the logical closeness of the actigramd. Both A and Ce. None of above

    Answer = C

    2) Which of the following is done in order a data in phase 1 of the system development lifecycle ?

    a. Reviewing policies and proceduresb. Using questionnaires to contact surveysc. Conducting Interviewsd. All of abovee. None of above

    Answer = D

    3) A graphic representation of an information system is called ?a. Flow chartb. Pictogramc. Data flow diagramd. Histograme. None of above

    Answer = C

    4) To avoid errors in transcription and transposition, during data entry the system analyst

  • should ?a. Provide for a check digitb. Provide for a hash totalsc. Provide batch totalsd. All of above

    Answer = D

    5) In the system concepts, the term integration ?a. implies structure and orderb. refers to the manner in which each component functions with other component of the systemc. means that part of the computer system depend on one anotherd. refers to the holism of systeme. None of above

    Answer = DExplanation: system integration is the bringing together of the component subsystems intoone system and ensuring that the subsystems function together as a system. In informationtechnology, systems integration is the process of linking together different computingsystems and software applications physically or functionally, to act as a coordinated whole6) RAD is a linear sequential software development process model. RAD is an acronym for ?

    a. Rapid Application Developmentb. Rapid Action Developmentc. Rough Application Developmentd. Rough Action Development

    Answer = AExplanation: Rapid application development (RAD) is a software development methodologythat uses minimal planning in favor of rapid prototyping. The "planning" of softwaredeveloped using RAD is interleaved with writing the software itself7) In risk analysis of spiral model, which of the following risk includes ?

    a. Technicalb. Managementc. Both A and Bd. None of these

    Answer = C

    8) The model remains operative until the software is retired ?a. Waterfallb. Incremental

  • c. Spirald. None of these

    Answer = CExplanation: The spiral model is based on continuous refinement of key products forrequirements definition and analysis, system andsoftware design, and implementation (thecode). At each iteration around the cycle, the products are extensions of an earlier product.This model uses many of the same phases as the waterfall model, in essentially the same order,separated by planning, risk assessment, and the building of prototypes and simulations9) A quantitative measure of the degree to which a system, component, or process posses agiven attribute ?

    a. Measureb. Measurementc. Metricd. None of these

    Answer = C

    10) RAD is not appropriate when ?a. Fast finding already doneb. Technical risks are highc. Testing is not neededd. None of above

    Answer = BExplanation: RAD model may not be useful for large, unique or highly complex projects.Thismethod cannot be a success if the team is not sufficiently motivated and nor is unable to workcohesively together.

    1) Round Robin algorithm is essentially the preemptive version of ?a. FIFOb. Shortest Job Firstc. Shortest Remainingd. Longest time first

    Answer = aExplanation: In round robin algorithm time slices are assigned to the processes in equalportion and in circular order.2) A page fault occurs ?

    a. when the page is not in the memoryb. when the page is in the memoryc. when the process enters the blocked state

  • d. when the process is in the ready stateAnswer = aExplanation: A page fault occurs when a process accesses a page that has been mapped intothe address space, but is not loaded into the physical memory.3) Which of the following will determine your choice of systemssoftware for your computer?

    a. Is the applications software you want to use compatible with it ?b. Is it expensive ?c. Is it compatible with your hardware ?d. Both 1 and 3

    Answer = DExplanation: The choice of the software should be compatible with the hardware and shouldnot be expensive enough.4) What is a shell ? ?

    a. It is a hardware componentb. It is a command interpreterc. It is a part in compilerd. It is a tool in CPU scheduling.

    Answer = BExplanation: A Shell is the command line interpreter that provides the traditional userinterface for the UNIX operating system. Users direct the operation of the computer byentering commands as text for a command line interpreter to execute or by creating textscripts of one or more such commands.5) Routine is not loaded until it is called. All routines are kept on disk in a relocatable loadformat. The main program is loaded into memory & is executed. This type of loading iscalled... ?

    a. Static loadingb. Dynamic loadingc. Dynamic linkingd. Overlays

    Answer = CExplanation: Dynamic linking provides the facility to load or unload routines at runtime6) In the blocked state ?

    a. the processes waiting for I/O are foundb. the process which is running is foundc. the processes waiting for the processor are foundd. none of the above

    Answer = AExplanation: All the processes that are waiting for the completion of some event such as I/Ooperation or a signal are in Blocked state.7) What is the memory from 1K - 640K called ?

  • a. Extended Memoryb. Normal Memoryc. Low Memoryd. Conventional Memory

    Answer = D8) Virtual memory is ..... ?

    a. An extremely large main memoryb. An extremely large secondary memoryc. An illusion of extremely large main memoryd. A type of memory used in super computers.

    Answer = CExplanation: Virtual memory allows a program to be designed as though there is only one kindof memory, "virtual" memory, which behaves like directly addressable read/write memory(RAM).9) Which is not the state of the process ?

    a. Blockedb. Runningc. Readyd. Privileged

    Answer = D10) The number of processes completed per unit time is known as.... ?

    a. Outputb. Throughputc. Efficiencyd. Capacity

    Answer = BExplanation: Throughput is the amount of data transfer from one place to another. It ismeasured in Kbps, Gbps, Mbps

    1) Which of the following file name extension suggests that the file is Backup copy of anotherfile ?

    a. TXTb. COMc. BASd. BAK

    Answer = DExplanation: BAK extension is used for the backup files however the extension should beremoved before opening the file to open it correctly. Eg : "myfile.doc.bak"should be renamedwith "myfile.doc".

  • 2) FIFO scheduling is.....a. Preemptive Schedulingb. Non Preemptive Schedulingc. Deadline Schedulingd. Fair share scheduling

    Answer = BExplanation: In the non preemptive scheduling the CPU can not take back from the process towhich it is assigned, until it completes its execution3)Switching the CPU to another Process requires to save state of the old process and loadingnew process state is called as ...

    a. Process Blockingb. Context Switchc. Time Sharingd. None of the above

    Answer = BExplanation: The old state of the process can be saved through the concept of contextswitching.4)The Banker's algorithm is used

    a. to prevent deadlock in operating systemsb. to detect deadlock in operating systemsc. to rectify a deadlocked stated. none of the above

    Answer = AExplanation: In an operating system, a deadlock is a situation which occurs when a processenters a waiting state because a resourcerequested by it is being held by another waitingprocess, which in turn is waiting for another resource. If a process is unable to change its stateindefinitely because the resources requested by it are being used by other waiting process,then the system is said to be in a deadlock.5)A thread

    a. is a lightweight process where the context switching is lowb. is a lightweight process where the context switching is highc. is used to speed up pagingd. none of the above

    Answer = A6) A tree structured file directory system

    a. allows easy storage and retrieval of file namesb. is a much debated unnecessary featurec. is not essential when we have millions of filesd. none of the above

    Answer = AExplanation: It is easy to access anything if it is in hierarchical structure.

  • 7) Full Form Of PCBa. Program Control Blockb. Process Control Blockc. Process Communication Blockd. None of the above

    Answer = BExplanation: It is also called the Task Controlling Block or Task Struct that contains theinformation needed to manage a particular process8)The mechanism that bring a page into memory only when it is needed is called....?

    a. Segmentationb. Fragmentationc. Demand Pagingd. Page Replacement

    Answer = CExplanation: Under the concept of demand paging , the page is brought into the memory onlywhen it is needed9) Which technique was introduced because a single job could not keep both the CPU and theI/O devices busy?

    a. Time-sharingb. Spoolingc. Preemptive schedulingd. Multiprogramming

    Answer = DExplanation: Through Multiprogramming multiple processes gets executed at a same time10) Which directory implementation is used in most Operating System ?

    a. Single level directory structureb. Two level directory structurec. Tree directory structured. Acyclic directory structure

    Answer = C

    1)Virtual memory is ?a. Extremely large main memoryb. Extremely large secondary memoryc. An illusion of an extremely large memoryd. A type of memory used in super computers

    Answer = CExplanation: Virtual memory is a feature of Operating System that enables a process to use amemory independent of other processes.

  • 2) Spatial locality refers to the problem that once a location is referenced ?a. It will not be referenced againb. It will be referenced againc. A nearby location will be referenced soond. None of Above

    Answer = BExplanation: Spatial locality or locality of reference stats that the same value or related valueis going to be referenced again.3) Which of the following is an example of SPOOLED device?

    a. The terminal used to enter the input data for a program being executedb. The secondary memory device in a virtual memory systemc. A line printer used to print the output of number of job'sd. None of above

    Answer = CExplanation:Line printer used to print the output of number of job's is an example of printspooling. In print spooling documents are loaded into the buffer and then the printer pullsthen off the buffer at its own rate.4) Page fault occurs when ?

    a. The page in corrupted by application softwareb. The page is in main memoryc. The page is not in main memoryd. One tries to divide number by 0

    Answer = CExplanation:Page fault occurs when the page that is not in the main memory is tried to beaccessed.5) Overlays is ?

    a. A part of Operating Systemb. A specific memory locationc. A single contiguous memory that was used in the olden days for running large programs by

    swappingd. Overloading the system with many user files

    Answer = CExplanation: An overlay is when a process replaces itself with the code of another program.

    6) Determine the number of page faults when references to pages occurs in the order1,2,4,5,2,1,2,4. Assume that the main memory can accommodate 3 pages and the mainmemory already has the pages 1 and 2. With page 1 having been brought earlier that page2(Assume LRU algorithm is used) ?

  • a. 3b. 5c. 4d. None

    Answer = CExplanation:As the reference string is 1,2,4,5,2,1,2,4 so if LRU page replacement algorithm isused then there will be 4 page faults.7) Concurrent processed are processed that ?

    a. Do not overlap in timeb. Overlap in timec. Are executed by processor at the same timed. None of Above

    Answer = BExplanation:Concurrent means something that executed at the same time ad something else.8) The rage replacement policy that sometimes leads to more page faults when the size of thememory is increased is ?

    a. FIFOb. LRUc. no such policy existsd. None of Above

    Answer = AExplanation:If the size of memory is increased and FIFO page replacement algorithm is usedthen there will be more page faults.9) The only transition that is initiated by the user process itself is ?

    a. blockb. dispatchc. wake upd. None of Above

    Answer = A10) Working set(r,k) at an instance of time t, is a set of ?

    a. k future references that operating system will makeb. Future references that the operating system will make in the next 'k' time unitsc. k references with high frequencyd. Pages that have been referenced in the last k time units

    Answer = D

  • 1) In UNIX the status of the process may be ?a. runningb. orphanc. sleepingd. zombiee. All of above

    Answer = EExplanation:No Explanation2) Which of the following processes has a PID I ?

    a. Kernelb. UNIXc. hiltd. shell

    Answer = CExplanation:No Explanation3) The PID of kernel process is ?

    a. undefinedb. 0c. 1d. 3

    Answer = BExplanation: No Explanation4) Which of the following command is not a cursor movementcommand ?

    a. nb. ac. $d. je. None of above

    Answer = BExplanation:No Explanation5) The Commands used to compare the files is known as ?

    a. compb. duc. cmpd. ccpe. None

    Answer = C

  • 6) Which of the following command is used with vi editor to delete asingle character ?a. zb. yc. ad. xe. None of above

    Answer = D7) Which command is used with vi editor to move the cursor one row up ?

    a. ib. jc. hd. ke. None of above

    Answer = D8) Which command is used with the vi editor to move the cursor to the left ?

    a. ib. kc. jd. he. None of above

    Answer = D9) Which command is used with the vi editor to save file and remain in the editing mode ?

    a. :qb. q!c. :wd. :xe. None of above

    Answer = C10) Which command is used to extract specific columns from the file ?

    a. catb. grepc. cutd. pastee. None of above

    Answer = C

  • 1) PMTLR is acronym for ?a. Page Map Table Limit Registerb. Page Memory Table With Limit Registerc. Both A and Bd. None of these

    Answer = A

    2) Paging is ?a. Virtual memoryb. Memory management schemec. Allocation of memoryd. Deadlock prevention scheme

    Answer = BExplanation: paging is one of the memory-management schemes by which a computer canstore and retrieve data from secondary storage for use in main memory.3) Chaining and indexing are the strategies of ?

    a. Contiguous allocationb. Non - Contiguous allocationc. Partition allocationd. Static allocation

    Answer = BExplanation: Chaining and Indexing are Non Contiguous Allocation strategies that containspointes to the memory locations.

    4) Which of the following scheduler is in charge of handling the swapped out process ?a. short termb. long termc. medium termd. none of these

    Answer = AExplanation: The short-term scheduler (also known as the CPU scheduler) decides which of theready, in-memory processes are to be executed (allocated a CPU) next following a clockinterrupt, an IO interrupt, an operating system call or another form of signal.5) Round robin scheduling algorithm falls under the category of ?

    a. Preemptive schedulingb. Non preemptive schedulingc. sometimes preemptive sometimes non preemptive

  • d. None of theseAnswer = AExplanation: Round-robin (RR) is one of the simplest schedulingalgorithms for processes in anoperating system. As the term is generally used, time slices are assigned to each process inequal portions and in circular order, handling all processes without priority.In orderto schedule processes fairly, a round-robin scheduler generally employs time-sharing, givingeach job a time slot or quantum (its allowance of CPU time), and interrupting the job if it isnot completed by then. So it falls under preemptivescheduling.6) Only the process executing the critical section is allowed access to the shared variable, allother processes should prevented from doing so until the completion of the critical section.This is often referred to as ?

    a. Mutual exclusionb. Semaphoresc. Deadlockd. Interprocess communication

    Answer = AExplanation: N/A7) Partition Description Table (PDT) collect the ?

    a. Current Partition Statusb. Attributesc. Both A and Bd. None of these

    Answer = CExplanation: n/a8) Belady's Anomaly is a behavior of which page replacement algorithm ?

    a. FIFOb. Optimalc. Circular FIFOd. LRU

    Answer = AExplanation: Bldy's anomaly proves that it is possible to have more page faultswhen increasing the number of page frames while using the First in First Out (FIFO) pagereplacement algorithm.9) Which of the following is an operating system call ?

    a. CREATEb. LINKc. SYSTEMd. All of these

  • Answer = DExplanation: N/A10) The reference bit is used for the purpose of ?

    a. Improving MRU algorithmb. Implementing LRU page replacement algorithmc. Checking of the page table entry is in cache memoryd. Checking to see if parameters are passed to a procedure by value or by address

    Answer = AExplanation: N/A

  • 1) A shift register can be used for ?a. Serial to parallel conversionb. Parallel to serial conversionc. Digital delay lined. All of the abovee. None of the above

    Answer = DExplanation:Shift registers can have both parallel and serial inputs. These are often configuredas serial - in - parallel- out or parallel - in - serial - out.2) Semiconductor memory is-

    a. Somewhat large than the magnetic core memoryb. A non-volatile memoryc. Somewhat slower than magnetic core memoryd. All of abovee. None of these

    Answer = BExplanation: Semiconductor memory is an electronic storage deviceoften used as computermemory. Examples of semiconductormemory is: ROM, flash memory, magnetoresistiverandom-access memory (MRAM)3) Which of the following is a universal gate ?

    a. ANDb. EX-ORc. ORd. NAND

    Answer = DExplanation: NAND is the universal gate as using this gate we can have all other gates likeAND, OR, EX-OR, NOT.4) The logic 1 in positive logic system is represented by ?

    a. Zero voltageb. Lower voltage levelc. Higher voltage leveld. Negative voltagee. None of the above

    Answer = CExplanation:The logic 1 is represented by higher voltage while 0 is represented as low voltage.5) Which function -positive logic is equivalent to OR function in negative logic?

    a. NOTb. ORc. ANDd. NOR

  • e. None of the aboveAnswer = CExplanation: AND function performs performs as OR in negative logic.

    6) Which of the following logic expressions is wrong ?a. 1+0=1b. 1+1=0c. 1+0+1=1d. 1+1+1=1e. None of the above

    Answer = CExplanation: 1+0 = 1 again this result is added to 1 as 1+1 which is equal to 0 with carry 1 butnot equal to 1.7) A Combination logic circuit that is used when it is desired to send data from two or moresource through a single transmission line is known as-

    a. Decoderb. Encoderc. Multiplexerd. De multiplexere. None of the above

    Answer = CExplanation:Multiplexer is a device that selects one of the analog or digital input and send itthrough single transmission line.8) The m-bit parallel adder consists of-

    a. (m+1) full addersb. m/2 full addersc. m-1 full addersd. m full adderse. None of the above

    Answer = DExplanation:No explanation9) A logic circuit which is used to change a BCD number into an equivalentdecimal number is-

    a. Decoderb. Encoderc. Multiplexerd. Code convertere. None of the above

  • Answer = AExplanation:Decoder is used to convert the BCD numbers into decimal.10) Which of the following property is true in context of Well Formed Formula(WFF) ?

    a. Each letter is a termb. If x and y are terms then x = y is a formulac. If P is a formula then 7p is a formulad. All of above

    Answer = BExplanation:No explanation for this question.

    1) Half adder is an example of ?

    a. Combinational Circuitsb. Sequential Circuitsc. Asynchronous Circuitsd. None of these

    Answer = AExplanation: Combinational circuits are the circuits whose output depends on the inputs of thesame instant of time.2) In JK flip flop same input, i.e at a particular time or during a clock pulse, the output willoscillate back and forth between 0 and 1. At the end of the clock pulse the value of output Q isuncertain. The situation is referred to as ?

    a. Conversion conditionb. Race around conditionc. Lock out stated. None of these

    Answer = BExplanation:A race around condition is a flaw in an electronic system or process whereby theoutput and result of the process is unexpectedly dependent on the sequence or timing ofother events.3) In a JK flip flop, if j=k, the resulting flip flop is referred to as ?

    a. D flip flopb. T flip flopc. S-R flip flopd. None of these

    Answer = CExplanation: In JK flip flop if both the inputs are same then the flip flop behaves like SR flipflop.

  • 4) Master slave flip flop is also referred to as ?a. Level triggered flip flopb. Pulse triggered flip flopc. Edge triggered flip flopd. None of these

    Answer = BExplanation:The term pulse triggered means the data is entered on the rising edge of the clockpulse, but the output does not reflect the change until the falling edge of clock pulse.5) Fetch and decode cycle is required in ?

    a. Direct addressingb. Immediate addressingc. Indirect addressingd. None of above

    Answer = BExplanation:Fetch and decode cycle is required in Immediate addressing because it stores theoperand directly on which the operation is performed.6) Valid bit in each cache is associated with ?

    a. Each memory byte in cacheb. Each memory word in cachec. One bit with the all memory wordsd. None of above

    Answer = AExplanation:No explanation7) In J-K flip flop the function K=J is used to realize ?

    a. D flip flopb. S-R flip flopc. T flip flopd. Master slave flip flop

    Answer = DExplanation: T flip flop allows the same inputs. So if in JK flip flop J = K then it will work asT flip flop.8) An encoder has 2n input lines and ..... output lines ?

    a. 2b. nc. 2*nd. n*n

  • Answer = BExplanation:No Explanation.9) ASCII code for alphabet character requires ..... bits ?

    a. 16b. 15c. 8d. 7

    Answer = DExplanation:No explanation

    1) What is the hexadecimal equivalent of a binary number 10101111 ?a. AFb. 9Ec. 8Cd. All of abovee. None of above

    Answer = AExplanation:No Explanation2) A NOR gate recognizes only the input word whose bits are ?

    a. 0's and 1'sb. 1'sc. 0'sd. 0's or 1'se. None of above

    Answer = CExplanation: No Explanation3) The operation which is commutative but not associative is ?

    a. ANDb. ORc. EX-ORd. NAND

    Answer = DExplanation: No Explanation4) All digital circuits can be realized using only ?

    a. EX-OR gatesb. Half addersc. Multiplexersd. OR gates

  • Answer = BExplanation: No Explanation5) The XOR gates are ideal for testing parity because even parity words produces a ...... outputand odd parity word produces a ....... output ?

    a. low, highb. high, lowc. odd, evend. even, odde. None of above

    Answer = AExplanation: No Explanation6) Flip flop output is always ?

    a. Complementaryb. Independent of each otherc. the samed. same as inputse. None of above

    Answer = AExplanation: No Explanation7) A half adder adds ..... bits ?

    a. 16b. 10c. 8d. 2e. None of above

    Answer = DExplanation:No Explanation8) How many flip - flop circuits are needed to divide by 16 ?

    a. Twob. Fourc. Eightd. Sixteen

    Answer = CExplanation: No Explanation9) A flip flop is a ..... elements that stores a 216 binary digits as a low or high voltage ?

    a. chipb. busc. I/Od. memorye. None of above

  • Answer = DExplanation: No Explanation10) A positive AND gate is also a negative ?

    a. NAND gateb. AND gatec. NOR gated. OR gatee. None of these

    Answer = DExplanation: No Explanation

    1) Which of the following is a minimum error code ?a. Octal codeb. Binary codec. Gray coded. Excess-3 code

    Answer = CExplanation: No Explanation2) In a positive edge triggered JK flip flop, a low J and low K produces ?

    a. High stateb. Low statec. toggle stated. no change

    Answer = DExplanation: In JK Flip Flop if J = K = 0 then it holds its current state. There will be no change.3) Negative numbers can't be represented in ?

    a. signed magnitude formb. 1's complement formc. 2's complement formd. None of above

    Answer = DExplanation: No Explanation4) Which of the following architecture is not suitable for realising SIMD ?

    a. Vector processorb. Array processorc. Von Neumannd. All of above

  • Answer = CExplanation: No Explanation5) The XOR operator + is ?

    a. commutativeb. associativec. distributive over AND operatord. A and B

    Answer = DExplanation: As A + B = B + A and A + ( B + C) = (A + B ) + C

    Hence it is commutative and associative.6) The binary equivalent of the Gray code 11100 is..... ?

    a. 10111b. 00111c. 01011d. 10101

    Answer = AExplanation: The rule for changing the Gray code to binary is that first bit remains the sameand the next bit is obtained by adding the first LSB of binary to the second LSB of Gray codeand so on... So the answer of the question is 10111.7) An assembler that runs on one machine but produces machine code for another machine iscalled ?

    a. simulatorb. emulatorc. cross assemblerd. boot strap loader

    Answer = CExplanation: Cross assembler is an assembler which runs on one type of processor andproduces machine code for another.8) Which of the following unit can be used to measure the speed of a computer ?

    a. SYPSb. MIPSc. BAUDd. FLOPSe. B and D

    Answer = EExplanation: MIPS measures the execution speed of computers CPU but not the whole system.FLOPS is a measure of computer'sperformance especially in the field of scientific calculationsthat makes heavy use of floating point calculations.

  • 9) Which of the following logic families is well suited for high speed operations?a. TTLb. ECLc. MOSd. CMOS

    Answer = BExplanation: ECL is used for high speed applications because of its price and power demands.10) Which of the following comments about half adder are true?

    a. It adds 2 bitsb. It is called so because a full adder involves two half addersc. It does half the work of full adderd. It needs two inputs and generates two outputse. A, B and D

    Answer = EExplanation: No Explanation

    1) The term sum - of - product in Boolean algebra means ?a. The AND function of several OR functionsb. The OR function of several AND functionsc. The OR function of several OR functiond. The AND function of several AND functions

    Answer = BExplanation: Sum-Of-Products expressions lend themselves well to implementation as a set ofAND gates (products) feeding into a single OR gate (sum).2) The fan out capability of a digital building block can be defined as ?

    a. The number of inputs that one output can transmit tob. The amount of cooling required for fanning the hear outc. The number of inputs that can transmit to one inputd. The maximum power dissipation that the unit can stande. None of above

    Answer = A

    3) The ALE line of an 8085 microprocessor is used to ?a. Execute an RST by hardwareb. Executes the instruction supplied by external device through the INTA signalc. Executes an instruction from memory location 20 Hd. Executes a NOP

  • Answer = AExplanation: ALE is address latch enable. the lower order address remains only for asingle T satate then ths data is latched and the lower order address bus stores thedata.4) The cost for storing a bit is minimum in ?

    a. Cacheb. Registerc. RAMd. Magnetic tape

    Answer = DExplanation: N/A5) The index register in a digital computer is used for ?

    a. Pointing to the stack addressb. Indirect addressingc. Keeping track of number of times a loop is executedd. Address modification

    Answer = DExplanation: An index register in a computer's CPU is a processorregister used for modifyingoperand addresses during the run of a program, typically for doing vector/array operations.6) After reset the CPU begins execution from the memory location ?

    a. 0000Hb. 0001Hc. FFEFHd. 8000H

    Answer = AExplanation: N/A7) A single register to clear the lower four bits of the accumulator in 8085 assembly languageis ?

    a. XRI 0FHb. ANI FOHc. XRI FOHd. ANI OFH

    Answer = BExplanation: ANI FOH ANDs the accumulator with immediate. F leaves the high nibblewhatever it is, 0 clears the lower nibble8) If the total number of states in the fetching and execution phases of an 8085 instruction isknown to be 7; the number of machine cycles is ?

  • a. 0b. 1c. 2d. 3

    Answer = C

    9) Von Neumann architecture is ?a. SISDb. SIMDc. MIMDd. MISD

    Answer = AExplanation: In computing, SISD (single instruction, single data) is a term referring to acomputer architecture in which a single processor, a uniprocessor, executes asingle instruction stream, to operate on data stored in a single memory. This corresponds tothe von Neumann architecture.10) A typical application of MIMD is?

    a. railway reservationb. weather forecastingc. matrix multiplicationd. All of above

    Answer = AExplanation: MIMD (multiple instruction, multiple data) is a technique employed to achieveparallelism.

    1) The.... is ultraviolet light erasable and electricityprogrammable.This allows the user tocreate and store until programs and data are perfected. ?

    a. EPROMb. PROMc. ROMd. RAM

    Answer = AExplanation: N/A2) What table shows the electrical status of digital circuits output for everypossible combination of electrical states in the inputs ?

    a. Function Tableb. Truth Tablec. Routing Tabled. ASCII Table

  • Answer = AExplanation: No Explanation3) The gray code for decimal 7 is ?

    a. 0111b. 1011c. 0100d. 0101

    Answer = CExplanation: First convert decimal seven to binary that is 0111 thenconvert it into gray code.4) Which of the following electronic component are not found in ordinary ICs?

    a. Diodesb. Transistorsc. Resistorsd. Inductors

    Answer = DExplanation: Inductor is a passive two terminal electronic componentthat stores energy inits magnetic field5) Choose the correct statements ?

    a. Bus is a group of information carrying wiresb. Bus is needed to achieve reasonable speed of operationc. Bus can carry data or addressd. A bus can be shared by more that one devicee. All of above

    Answer = EExplanation: A bus have all the four features.6) If the memory access takes 20 ns with cache and 110 ns without it,then the hit ratio (cacheuses 10 as memory) is ?

    a. 93 %b. 90 %c. 87 %d. 88 %

    Answer = BExplanation: If we find what we want in the cache then it is called Hit otherwise it is miss.7) Any instruction should have at least ?

    a. 2 operandsb. 1 operandc. 3 operandsd. None of above

    Answer = DExplanation: An instruction can be without operand also.

  • 8) The number of clock cycles necessary to complete 1 fetch cycle in 8085 is ?a. 3 or 4b. 4 or 5c. 4 or 6d. 3 or 5

    Answer = CExplanation: No Explanation9) Motorola's 68040 is comparable to ?

    a. 8085b. 80286c. 80386d. 80486

    Answer = DExplanation: Motorola 68040 is a microprocessor released in 1970. It is called as oh - four -oh or oh forty10) The addressing mode used in the instruction PUSH B ?

    a. Directb. Registerc. Register Indirectd. Immediate

    Answer = CExplanation:In register indirect addressing mode the operand is found from the memory whoseaddress is fetched from the register in theinstruction code.

    1) On receiving an interrupt from an I/O device, the CPU ?a. halts for a predetermined timeb. hands over control of address bus and data bus to the interrupting device.c. branches off to the interrupt service routine immediatelyd. branches off to the interrupt service routine after the completion of the current instruction.

    Answer = D2) To get boolean expression in the product of sum form from a given Karnaugh map?

    a. don't care condition should not be presentb. don't care conditions if present should be takes as zerosc. one should cover all the 0's present and complement the resultingexpression.d. one should cover all the 1'a present and complement the resultingexpression.

    Answer = C3) The reduced form of the boolean expression (A + B)(A + C) is ?

    a. AB + ACb. AC + B

  • c. A + B + Cd. A + BC

    Answer = D4) Name the cache also known as internal cache ?

    a. L1 cacheb. L2 cachec. L3 cached. L4 cache

    Answer = AExplanation:L1 cache is also known as internal cache and it resides in the CPU. L2 is known assecondary cache and it is within the motherboard.5) Which of the following is not a CPU register ?

    a. Memory control registerb. Memory data registerc. Memory buffer registerd. Instruction register

    Answer = AExplanation: There is no MCR in the CPU6) The main task of memory address register is?

    a. stores the address of next location in the main memoryb. stores the address of next location in cache memoryc. stores the address of next location in secondary memoryd. stores the address of output device to which the data is sent

    Answer = AExplanation: No Explanation7) Which register indicates whether the data register holds the data to be transferred or not ?

    a. MARb. MBRc. MDRd. Status register

    Answer = DExplanation: No Explanation8) Which of the following operation represents the machine cycle?

    a. Fetch - Execute - Decode - Storeb. Execute - Decode - Store - Fetchc. Decode - Fetch - Store - Executed. Fetch - Decode -Execute - Store

    Answer = DExplanation: In Fetch phase the instruction is brought into the computer, in Decode phase

  • the instruction in divided into different parts, in Execute phase the decoded instruction is executedby the CPU and finally the result sent to the output device or main memory.9) The decoding phase of instruction cycle is also known as ?

    a. Translatingb. Interpretingc. Analyzingd. Breaking

    Answer =BExplanation: Decoding phase is also known as interpreting as theinstruction in interpreted todetermine two key attribute of the instruction, the opcode and the operand.10) Cache memory is used to transfer data between?

    a. Main memory and secondary memoryb. Processor and main memoryc. Processor and secondary memoryd. Processor and output device

    Answer = BExplanation: Cache is always placed between the main memory and processor in thecomputer system.

    1) Which memory stores the data permanently ?a. Primary memoryb. Secondary memoryc. Cache memoryd. Registers

    Answer = BExplanation: Secondary memory stores the data permanently until we remove it.2) Which of the following is the cheapest type of memory?

    a. Secondary memoryb. Primary memoryc. Cache memoryd. ROM

    Answer = AExplanation: Secondary memory is the cheapest form because it cannot process the data throughthe CPU directly. The data must be brought into the primary memory form execution. Thereforesecondary memory is the form of slowest memory.3) Which of the following is auxiliary memory of the computer system ?

    a. ROMb. SRAMc. Cache memoryd. Magnetic tape

  • Answer = AExplanation:ROM is the secondary memory which stores the data permanently also known asauxiliary memory.4) What does IBG stands for ?

    a. Intra byte gapsb. Inter block gapsc. Inter bit gapsd. Intra block gaps

    Answer = BExplanation:Inter block gaps is the space between the two consecutive physical blocks of memory.5) On what type of ROM data can be written only once ?

    a. PROMb. EPROMc. EEPROMd. EROM

    Answer = AExplanation:In Programmable Read Only Memory once the data is written it remains there forever.6) In optical storage system which medium is used for reading and recording data ?

    a. Laser lightb. Black lightc. High energy visible lightd. Ultraviolet light

    Answer = AExplanation: Optical storage system use the laser light to retrieve as well as to record the data.7) Which is known as solid state memory ?

    a. Parallel serial busb. Universal parallel busc. Universal serial busd. Universal computer bus

    Answer = CExplanation:No Explanation8) In MO system which of the following temperature is used as a recording medium ?

    a. Room temperatureb. Curie temperaturec. Neel temperatured. Boiling point temperature

    Answer = BExplanation:Curie temperature is used for recording data in Magneto Optical system.Curie temperature is the temperature at which the material loses its magnetic properties and abovethis temperature the material becomes paramagnetic.

  • 9) The amount of space available in the computer system for holding the data is called?a. Storage spaceb. Storage areac. Storage capacityd. Storage address

    Answer = AExplanation: No Explanation10) Which of the following is not a type of magnetic storage system ?

    a. Magnetic tapeb. Floppy diskc. Compact diskd. Hard disk

    Answer = CExplanation: Compact disk is the optical storage system not the magnetic storage system.

    1) Computer use thousands of flip flops. To coordinate the overall action, a common signalcalled the ..... is sent to each flip - flop.?

    a. latchb. masterc. clockd. slavee. None of above

    Answer = CExplanation: To coordinate the overall action, a square wave signal called the clock is sent toeach flip flop. This signal prevents the flip flop from changing states until the right time.2) Which of the following flip flop is free from race around condition ?

    a. SR flip flopb. T flip flopc. Master slave flip flopd. All of above

    Answer = CExplanation: Toggling more that once during a clock cycle is called racing. JK master slave flipflop avoids racing.3) Which logic family dissipates the minimum power ?

    a. DTLb. ECLc. TTLd. CMOSe. None of above

  • Answer = DExplanation: CMOS dissipates low power. Typically the static power dissipation is 10 nw per gatewhich is due to the flow of leakage currents.4) The functional capacity of SSI devices is ?

    a. 1 to 11 gatesb. 12 to 99 gatesc. 100 to 10,000 gatesd. More than 10,000 gatese. None of above

    Answer = AExplanation: No Explanation5) What advantage do ICs have over discrete devices due to their greater complexity ?

    a. Smaller sizeb. Higher Reliabilityc. Lower costd. All of above

    Answer =DExplanation: ICs can also combine analog and digital circuits on a single chip to create functionssuch as A/D converters and D/A converters. Such circuits offer smaller size and lower cost, but mustcarefully account for signal interference.6) A subtractor is usually not present in computer because ?

    a. It is expensiveb. It is not possible to design itc. The adder will take care of subtractiond. None of above

    Answer = CExplanation: A subtractor can be designed using the same approach as that of an adder.7) A chip having 150 gates will be classified as ?

    a. SSIb. MSIc. LSId. VLSI

    Answer = CExplanation: Latent semantic indexing (LSI) is an indexing and retrieval method that uses amathematical technique called Singular value decomposition (SVD) to identify patterns inthe relationships between the terms and concepts contained in an unstructured collection of text.8) Pseudo instructions are ?

    a. assembler directiveb. instruction in any program that have no corresponding machine codeinstructionc. instruction in any program whose presence or absence will not change the output for any inputd. None of above

  • Answer = AExplanation: Pseudo instructions are simply the assembly instructionsthat do not have a directmachine language equivalent.9) Programming in a language that actually controls the path of signals or data within thecomputer is called ?

    a. micro programmingb. system programmingc. assembly programmingd. machine language programming

    Answer = AExplanation:No Explanation10) Which of the following is not typically found in the status registerof micro processor ?

    a. overflowb. zero resultc. negative resultd. none of above

    Answer = DExplanation: A status register or flag register is a collection of flag bits for a processor. Thestatus register is a hardware register which contains information about the state of the processor

    1) The advantage of single bus over a multi bus is ?a. low costb. flexibility in attaching peripheral devicesc. high operating speedd. A and B

    Answer = DExplanation: However single bus costs low and it is easy to attachperipheral devices in single busbut multibus architecture have a greatadvantage in speed and of course, willaffect performance also2) In serial communication, an extra clock is needed ?

    a. to synchronize the devicesb. for programmed baud rate controlc. to make efficient use of RS-232d. None of above

    Answer = BExplanation: No Explanation3) In which of the following instruction bus idle situation occurs ?

    a. EIb. DAD rpc. INX H

  • d. DAAAnswer = B4) The addressing used in an instruction of the form ADD X Y is?

    a. absoluteb. immediatec. indirectd. index

    Answer = AExplanation: The effective address for an absolute instruction address is the address parameter itselfwith no modifications.5) The speed imbalance between memory access and CPU operation can be reduced by ?

    a. cache memoryb. memory interleavingc. reducing the size of memoryd. A and B

    Answer = D6) Which of the following does not need extra hardware for DRAM refreshing ?

    a. 8085b. Motorola - 6800c. Z - 80d. None of these

    Answer = CExplanation: No Explanation7) The first operating system used in micro processor is ?

    a. Zenixb. DOSc. CPIMd. Multics

    Answer = CExplanation: No Explanation8) Instead of counting with binary number a ring counter uses words that havea single high..... ?

    a. bytesb. gatec. bitd. chip

    Answer = CExplanation: No Explanation

  • 9) The memory cell of a dynamic RAM is simpler and smaller that the memory cell of a ......RAM ?

    a. volatileb. semiconductorc. staticd. bipolare. None of above

    Answer =CExplanation: No Explanation10) A multiplexer with a 4 bit data select input is a ?

    a. 4 : 1 multiplexerb. 16 : 1 multiplexerc. 2 : 1 multiplexerd. 8 : 1 multiplexer

    Answer = DExplanation: No Explanation

  • 1) The average search time of hashing with linear probing will be less if the load factor ?a. is far less than oneb. equals onec. is far greater than oned. None of above

    Answer = A2) The complexity of binary search algorithm is ?

    a. nb. nlognc. lognd. n2

    Answer = D3) The postfix equivalent of the prefix * + ab - cd is ?

    a. ab + cd - *b. abcd + - *c. ab + cd * -d. ab + - cd *

    Answer = A4)The linked list implementation of sparse matrices is superior to the generalized dopevector method because it is?

    a. Conceptually easierb. Completely dynamicc. Efficient in accessing an entryd. Efficient if the sparse matrix is a band matrixe. A and B

    Answer = E5) Sparse matrix have ?

    a. many zero entriesb. many non-zero entriesc. higher dimensiond. none of above

    Answer = AExplanation: A sparse matrix is a matrix populated primarily with zeros6) Which of the following algorithm solves the all pair shortest pathproblem ?

    a. Dijkstra's algorithmb. Floyd's algorithm

  • c. Prim's algorithmd. Warshall's algorithm

    Answer = BExplanation: The FloydWarshall algorithm (also known as Floyd's algorithm, RoyWarshallalgorithm, RoyFloyd algorithm, or the WFI algorithm) is a graph analysis algorithm for findingshortest paths in a weighted graph (with positive or negative edge weights) and also for findingtransitive closure of a relation R.

    7) As part of maintenance work, you are entrusted with the work of rearranging the librarybooks in a shelf in proper order, at the end of each day. The ideal choice will be ?

    a. Bubble sortb. Insertion sortc. Selection sortd. Heap sort

    Answer = BExplanation:N/A8) The way a card game player arranges his cards as he picks them up one by one, is anexample of ?

    a. bubble sortb. selection sortc. insertion sortd. merge sort

    Answer = CExplanation: He scans throught the rest of the cards and pick the one with least value and places itnext to the point till which he has already sorted the cards9) The average successful search time for sequential search on 'n' items is ?

    a. n/2b. (n - 1)/2c. (n + 2)/2d. log(n) + 1

    Answer = CExplanation:N/A10) Linked lists are suitable for which of the following problems ?

    a. Insertion sortb. Binary searchc. Radix sortd. Polynomial manipulation

    Answer = BExplanation: Through Linked list binary search can be performed efficiently.

  • 1) If the sequence of operations - push(1), push(2), pop, push(1), push(2), pop, pop, pop,push(2), pop are performed on a stack, the sequence of popped out values are ?

    a. 2, 2, 1, 1, 2b. 2, 2, 1, 2, 2c. 2, 1, 2, 2, 1d. 2, 1, 2, 2, 2

    Answer = AExplanation: The elements are popped from the top of the stack.2) Queue can be used to implement ?

    a. radix sortb. quick sortc. recursiond. depth first search

    Answer = AExplanation: A simple version of an LSD radix sort can be achieved using queues as buckets.3) A machine took 200 sec to sort 200 names, using bubble sort. In 800 sec, it canapproximately sort ?

    a. 400 namesb. 800 namesc. 750 namesd. 800 names

    Answer = AExplanation:For sorting 200 names bubble sort makes 200 x 199/2 = 19900 comparisons. The timeneeded for 1 comparison is 200 sec. In 800 sec it can make 80,000 comparisons. We have to fine n,such that n(n - 1)/2 = 80,000. From this n is approximately 400.4) A machine needs a minimum of 100 sec to sort 1000 names by quick sort.The minimumtime needed to sort 100 n