A. R
is reflective and hence a partial order
B. R
is reflective and hence an equivalence relation
C. R
is not reflective and hence not an equivalence relation
D. None
of the Above
2.
Pigeonhole principle states that A→B and
|A|>|B| then
A. F
is not onto
B. F
is not one to one
C. F
is neither one – one nor onto
D. F
may be one – one
3.
If a pair of dice is thrown then the
probability of getting a total of 5 or 11 is
A. 1/18
B. 1/9
C. 1/6
D. 1/5
4.
Which of the following conversion is not
possible (Algorithmically)?
A. Regular
grammar to context – free grammar
B. Non
deterministic FSA to Deterministic FSA
C. Non
deterministic PDA to Deterministic PDA
D. Non
deterministic TM to Deterministic TM
5.
Recursively enumerable language are not
closed under
A. Union
B. Intersection
C. Complementation
D. Concatenation
7.
Interval between the time of submission
and completion of the job is called
A. Waiting
time
B. Turnaround
Time
C. Throughput
D. Response
Time
8.
Consider the statement, either -2≤x≤-1
or 1≤x≤2*. The negation of the statement is
A. x<-2
or 2<x or -1<x<1
B. x<-z
or 2<x
C. -1<x<1
D. -2<x<2
10.
Which logic family combines the
advantage of CMOS and TTL?
A. BiCMOS
B. TTL/CMOS
C. ECL
D. TTL/MOS
11.
Null Character needs a space of
A. Zero
bytes
B. One
byte
C. Three
byte
D. Four
byte
12.
What is the result of the expression
(1and 2)+(3/4)?
A. 1
B. 2
C. 3
D. 0
13.
The correct way to round off a floating
number x to an integer value is
A. y=(int)(x+0.5)
B. y=int(x+0.5)
C. y=(int)x+0.5)
D. y=(int)((int)x+0.5)
14.
A pointer to the base class can hold
address of
A. Only
base class object
B. Only
derived class object
C. Base
class objects as well as derived class object
D. None
of these
15.
Which feature in OOP allows reusing
code?
A. Polymorphism
B. Network
Schema
C. Relational
Schema
D. Database
Schema
16.
A top-to-bottom relationship among the
items in a database is established by a
A. Hierarchical
Schema
B. Network
Schema
C. Relational
Schema
D. Database
Schema
17.
The weak entities and their identifying
relationship in the ER diagram are represented by
A. Oval
Shape with double line
B. Rectangle
shape with double line
C. Square
shape with double line
D. Diamond
shape with double line
18.
In ODBC, a data source that is local to
a single computer is called a
A. System
data source
B. File
data source
C. User
data source
D. SQL
text file
19.
The physical location of a record is
determined by a mathematical formula that transforms a file key into a record
location is
A. B-Tree
file
B. Hashed
file
C. Indexed
file
D. Sequential
file
20.
In SQL, Which of the following is not a
data definition language commands?
A. RENAME
B. REVOKE
C. GRANT
D. UPDATE
21.
Which of the sorting algorithm has the
worst complexity of n log n?
A. Heap
sort
B. Quick
sort
C. Insertion
sort
D. Selection
sort
22.
The postfix equivalent of the prefix
*+ab-cd is
A. ab-cd-*
B. abcd+-*
C. ab+cd*-
D. ab+-cd*
23.
The depth of a complete binary tree with
‘n’ nodes is (log is to the base two)
A. Log(n+1)-1
B. Log(n)
C. Lon(n-1)+1
D. Log(n)+1
24.
The complexity of merge sort algorithm
is
A. O(n)
B. O(n2)
C. O(log
n) D
D. O(n
log n)
25.
Let G be a graph with 100 vertices numbered
1 to 100. Two vertices I and j are adjacent If |i-j|=8 or |i-j|-12. The number
of connected components in G is
A. 4
B. 8
C. 12
D. 25
26.
Class B IP address has ………………. Network
addresses and …………….. Host addresses
A. 214,216-2
B. 216,214-2
C. 27-2,224-2
D. 224,27-2
27.
In a fiber optical cable, the
transmitted power is 400MW and the receiver power is 200MW then the attenuation
of the signal is
A. 2dB
B. 3
dB
C. 6
dB
D. 8
Db
28.
The wavelength of 1000MHz waves are
A. 0.3
Meter
B. 3.0
Meter
C. 30
Meter
D. 300
Meter
29.
The key size which is not applicable in
AES algorithm is
A. 64
B. 128
C. 192
D. 256
30.
TCP port 79 is for
A. Telnet
B. Finger
protocol
C. SNA
gateway
D. DNS
31.
Assembly language programs are written
using
A. Hex
code
B. Mnemonics
C. ASCII
code
D. Binary
language
32.
How many memory locations are required
to store the instructions LXIH,800H in an 8085 Assembly language program?
A. 1
B. 2
C. 3
D. 4
33.
Which one of the following is not a type
of Assembler?
A. One
pass
B. Two
pass
C. Three
pass
D. Load
and Go
34.
The output from YACC is
A. LALR
Parser
B. LLLR
Parser
C. LLAR
Parser
D. LRLR
Parser
35.
Predictive parsers can be?
A. Recursive
B. Constructive
C. Non
Recursive
D. Non
Constructive
36.
Which one of the following is not true?
A. Kernel
is the program that constitutes the central core of the operating system
B. Kernel
is the first part of operating system to load into memory during booting
kernel is made of various modules which cannot be loaded in running operating system
kernel is made of various modules which cannot be loaded in running operating system
C. Kernel
remain in the memory during the entire computer session
37.
By operating system, the resource
management can be done via
A. Time
division Multiplexing
B. Space
division Multiplexing
C. Both
(A) and (B)
D. None
of the above
38.
In Unix, which system call creates the
new process?
A. Fork
B. Create
C. New
D. None
of the mentioned
39.
What is the ready state of a process?
A. When
process is scheduled to run after some execution
B. When
process is unable to run until some task has been completed
C. When
process is using the CPU
D. None
of the mentioned
40.
The banker’s algorithm is used
A. To
rectify deadlock
B. To
detect deadlock
C. To
prevent deadlock
D. To
solve deadlock
41.
Which of the following software
lifecycle model is characterized by sequential execution of project phases?
A. Waterfall
model
B. Spiral
Model
C. Rapid
Application Development (RAD) Model
D. Agile
Model
42.
What is the final outcome of the
requirement analysis and specification phase?
A. Drawing
the data flow diagram
B. The
SRS Diagram
C. Coding
the project
D. The
user manual
43.
Which of the following is the drawback
of Linear Sequential Model?
A. Time
Consuming
B. Changes
can cause confusion
C. Both
(A) and (B)
D. None
of the above
44.
Which of the following model put much
more emphasis on testing?
A. Waterfall
Model
B. Agile
Model
C. Rapid
Application development model
D. V-V
model
45.
In V Model, why test cases are created
before code?
A. To
gain the confidence in the system
C. To
meet Project deadline
D. TO
prevent propagation of defect in next level
46.
E-Commerce infrastructure
A. Web
Servers
B. E-Catalogs
C. Network
D. All
of these
47.
Which one of the following authentication
method is used by SSH?
A. Public
key
B. Host
based
C. Password
D. All
of the above
48.
FDDI is a
A. Ring
Network
B. Star
Network
C. Mesh
Network
D. All
of these
49.
Network cable lies on …………. Layer
A. Application
B. Network
C. Physical
D. Data
Link
50.
Which is the method is used for
classification in data mining?
A. Descriptive
pattern
B. Associations
C. Decision
Tree Classifiers
D. Regression
ANSWER KEY:-
ANSWER KEY:-
Q.No |
Ans |
Q.No |
Ans |
Q.No |
Ans |
Q.No |
Ans |
Q.No |
Ans |
1 |
D |
11 |
B |
21 |
A |
31 |
B |
41 |
A |
2 |
B |
12 |
D |
22 |
A |
32 |
B |
42 |
B |
3 |
C |
13 |
A |
23 |
A |
33 |
C |
43 |
A |
4 |
C |
14 |
C |
24 |
D |
34 |
A |
44 |
D |
5 |
C |
15 |
B |
25 |
A |
35 |
A |
45 |
D |
6 |
A |
16 |
A |
26 |
A |
36 |
C |
46 |
D |
7 |
B |
17 |
D |
27 |
B |
37 |
C |
47 |
D |
8 |
A |
18 |
A |
28 |
A |
38 |
A |
48 |
A |
9 |
A |
19 |
B |
29 |
A |
39 |
A |
49 |
C |
10 |
A |
20 |
D |
30 |
B |
40 |
C |
50 |
C |
No comments:
Post a Comment