QUESTION
QUESTION
QUESTION
2. Indicate the false statement. The need for modulation can best be exemplified by the following.
3. With an IP address of 100, you currently have 80 subnets. What subnet mask should you use to
maximize the number of available hosts?
a. 224
b. 240
c. 248
d. 252
a. unchanged
b. halved
c. doubled
d. increase by 50 percent
6. Frames from one LAN can be transmitted to another LAN via the device
A. Router
B. Bridge
C. Repeater
D. Modem
B. zero
C. nonzero
10. Which of the following device is used to connect two systems, especially if the systems use
different protocols?
A. hub
B. bridge
C. gateway
D. repeater
a. Biconical
b. Horn
c. Helical
d. Discone
12. How many hosts are attached to each of the local area networks at your site?
A. 128
B. 254
C. 256
D. 64
a. Good bandwidth
b. Parasitic elements
c. Folded dipole
d. High gain
A. DDL
B. DML
C. HTML
D. XML
A. LIKE only
B. IN only
C. NOT IN only
D. IN and NOT IN
21. Which of the following is the correct order of keywords for SQL SELECT statements?
22. Which of the following are the five built-in functions provided by SQL?
A. ONLY
B. UNIQUE
C. DISTINCT
D. SINGLE
A. for ranges.
B. to limit the columns displayed.
C. as a wildcard.
D. None of the above is correct.
A. record.
B. relation.
C. column.
D. field.
A. composite keys.
B. determinants.
C. candidate keys.
D. foreign keys.
A. Column.
B. one-dimensional table.
C. two-dimensional table.
D. three-dimensional table.
29. What type of join is needed when you wish to include rows that do not have matching values?
A. Equi-join
B. Natural join
C. Outer join
D. All of the above.
30. What type of join is needed when you wish to return rows that do have matching values?
A. Equi-join
B. Natural join
C. Outer join
D. All of the above.
31. Which of the following is one of the basic approaches for joining tables?
A. Subqueries
B. Union Join
C. Natural join
D. All of the above
OS Related Question
33. To avoid the race condition, the number of processes that may be simultaneously inside their
critical section is
A. 8
B. 1
C. 16
D. 0
34. Process is
35. Which of the following systems software does the job of merging the records from two files into
one?
A. Security software
B. Utility program
C. Networking software
D. Documentation system
36. Thrashing
37. Which command is used to sort the lines of data in a file in reverse order
A. sort
B. sh
C. st
D. sort –r
38. Which command is used to display the top of the file?
A. cat
B. head
C. more
D. grep
A. SPARC
B. IBM-compatible
C. Alpha
D. Macintosh
41. The part of machine level instruction, which tells the central processor what has to be done, is
A. Operation code
B. Address
C. Locator
D. Flip-Flop
A. is a hardware memory device which denotes the location of the current instruction being
executed.
B. is a group of electrical circuits (hardware), that performs the intent of instructions fetched from
memory.
C. contains the address of the memory location that is to be read from or stored into.
D. contains a copy of the designated memory location specified by the MAR after a "read" or the
new contents of the memory prior to a "write".
A. segmentation
B. swapping
C. pure demand paging
D. multiple contiguous fixed partitions
45. What is the name of the operating system for the laptop computer called MacLite?
A. Windows
B. DOS
C. MS-DOS
D. OZ
A. assembles
B. compilers
C. interpreters
D. All of the above
IT security:
49. All of the following are examples of real security and privacy threats except:
A. Hackers
B. Virus
C. Spam
D. Worm
50. Trojan horses are very similar to virus in the matter that they are computer programs that
replicate copies of themselves
A. True
B. False
54. Which of the following is not an external threat to a computer or a computer network
A. Ignorance
B. Trojan horses
C. Adware
D. Crackers
56. When a person is harrassed repeatedly by being followed, called or be written to he / she is a
target of
A. Bullying
B. Stalking
C. Identity theft
D. Phishing
58. It is a program or hardware device that filters the information coming through an internet
connection to a network or computer system.
A. Anti virus
B. Cookies
C. Firewall
D. Cyber safety
59. It allow a visited website to store its own information about a user on the user’s computer.
A. Spam
B. Cookies
C. Malware
D. Adware
Networking:
60. How many digits of the DNIC (Data Network Identification Code) identify the country?
A. first three
B. first four
C. first five
D. first six
61. A station in a network forwards incoming packets by placing them on its shortest output queue.
What routing algorithm is being used?
62. Frames from one LAN can be transmitted to another LAN via the device
A. Router
B. Bridge
C. Repeater
D. Modem
63. You have a class A network address 10.0.0.0 with 40 subnets, but are required to add 60 new
subnets very soon. You would like to still allow for the largest possible number of host IDs per
subnet. Which subnet mask should you assign?
A. 255.240.0.0
B. 255.248.0.0
C. 255.252.0.0
D. 255.254.0.0
64. What are the most commonly used transmission speeds in BPS used in data communication?
A. 300
B. 1200
C. 2400
D. 9600
A. modem
B. protocols
C. gateway
D. multiplexer
A. network
B. computer
C. communication adapter
D. serial port
A. NBTSTAT
B. Netstat
C. PING
D. Hostname
A. 0.0.0.0
B. 255.0.0.0
C. 255.255.0.0
D. 255.255.255.0
71. IEEE project 802 divides the data link layer into an upper _____ sublayer and a lower _____
sublayer.
A. HDLC, PDU
B. PDU, HDLC
C. MAC, LLC
D. LLC, MAC
72. A medium access control technique for multiple access transmission media is
A. Aloha
B. Amplitude
C. Angle modulation
D. Attenuation
73. Which of the following TCP/IP protocol is used for remote terminal connection service?
A. TELNET
B. FTP
C. RARP
D. UDP
74. Which of the following transmission systems provides the highest data rate to an individual
device
A. Computer bus
B. Telephone lines
C. Voice band modem
D. leased lines
75. Which of the following connectivity devices is used to extend a network on a purely mechanical
basis?
A. Gateway
B. Switch
C. Router
D. Active hub
Computer Fundamental:
A. PL/1
B. FORTRAN
C. BASIC
D. PASCAL
A. ALU
B. Memory
C. CPU
D. Control unit
78. Which of the following computer language is used for artificial intelligence?
A. FORTRAN
B. PROLOG
C. C
D. COBOL
A. Compiler
B. Interpreter
C. Assembler
D. Comparator
A. Seek time
B. Effective time
C. Access time
D. Real time
81. Which access method is used for obtaining a record from a cassette tape?
A. Direct
B. Sequential
C. Random
D. All of the above
82. A program component that allows structuring of a program in an unusual way is known as
A. Correlation
B. Coroutine
C. Diagonalization
D. Quene
A. Path
B. Frame
C. Block
D. Group
A. Interactive
B. Interrogation
C. Heuristic
D. All of the above
A. Interdiction
B. Interface
C. Surface
D. None of the above
86.Apply DeMorgan’s theorems to each expression:
( A+ B) Ć´ D́+ E+ F́
´ D́) EF
a)( A+ B́+C b)( Á B́+C+ D) É F ´ + D)( E+ F́)
c)( ABC ´ + D́)EF
c) ( A+ BC
87.On the fifth clock pulse, a 4-bit Johnson sequence is Q0 = 0, Q1 = 1, Q2 = 1, and Q3 = 1. On the
sixth clock pulse, the sequence is ________.
a) Q0 = 1, Q1 = 0, Q2 = 0, Q3 = 0
b) Q0 = 1, Q1 = 1, Q2 = 1, Q3 = 0
c) Q0 = 0, Q1 = 0, Q2 = 1, Q3 = 1
d) Q0 = 0, Q1 = 0, Q2 = 0, Q3 = 1
a) 0011
b) 1101
c) 0101
d) 1001
89. What is the major advantage of the J-K flip-flop over the S-R flip-flop?
a
10011110
)
b
01211110
)
c) 000100000100
d
001000001000
)
91 How many inputs of a four-input AND gate must be HIGH in order for the output of the logic gate
to go HIGH?
A. RAM
B. MAR
C. CD-ROM
D. CD
A. 0111.1100
B. 0110.1010
C. 0110.1100
D. 0110.0110
95.
From the truth table below, determine the standard SOP expression.
A.
B.
C
.
D
.
B. The Karnaugh map eliminates the need for using NAND and NOR gates.
98. The circuit given below fails to function; the inputs are checked with a logic probe and the
following indications are obtained: CLK, J1, J2, J3, K1, K2, and K3 are pulsing. Q and are
HIGH. and PRE are LOW. What could be causing the problem?
A. There is no problem.
B. The clock should be held HIGH.
C
The PRE is stuck LOW.
.
D
The CLR is stuck HIGH.
.
A. 11100110
B. 00011001
C. 00011000
D. 00011010
A. 0011
B. 1010
C. 1100
D. 1001
101. Which of the following function sets first n characters of a string to a given character?
A. strinit()
B. strnset()
C. strset()
D. strcset()
a) Truncated
b) Rounded
103. Suppose that you would like to create an instance of a new Map that has an iteration order
that is the same as the iteration order of an existing instance of a Map. Which concrete
implementation of the Map interface should be used for the new instance?
A. TreeMap
B. HashMap
C. LinkedHashMap
A. Java.util.Map
B. Java.util.List
C. Java.util.HashTable
D. Java.util.Collection
105.
B. 4
C
8
.
D
16
.
106.
A. 53
B. 82
C
83
.
D
85
.
107.
A. ok
B. dokey
C
ok dokey
.
D
No output is produced
.
E. Compilation error
108.
A. -2147483648 and 1
C
-2147483648 and -1
.
D
1 and -2147483648
.
B. 2 and 4
C. 1 and 2
D. 2 and 5
110. Which of the following will not directly cause a thread to stop?
A. notify()
B. wait()
C. InputStream access
D. sleep()
int (*ptr)[10];
1. Relational
2. Arithmetic
3. Logical
4. Assignment
A. 2134
B. 1234
C. 4321
D. 3214
A. remove(var-name);
B. free(var-name);
C. delete(var-name);
D. dalloc(var-name);
114. We want to round off x, a float, to an int value, The correct way to do is
A. y = (int)(x + 0.5)
B. y = int(x + 0.5)
C. y = (int)x + 0.5
D. y = (int)((int)x + 0.5)
1. !
2. sizeof
3. ~
4. &&
A. 1, 2
B. 1, 3
C. 2, 4
D. 1, 2, 3
116. Binary search tree has best case run-time complexity of Ο(log n). What could the worst case?
A . Ο(n)
B . Ο(n2 )
C . Ο(n3 )
A . Base case
B . Average case
C . Worst case
D . NULL case
118. The postfix form of the expression (A+ B)*(C*D- E)*F / G is?
b) AB + CD* E – F **G /
c) AB + CD* E – *F *G /
d) AB + CDE * – * F *G /
119. A queue is a ?
c) Ordered array
d) Linear tree
120. In a stack, if a user tries to remove an element from empty stack it is called _________
a) Underflow
b) Empty collection
c) Overflow
d) Garbage Collection
a) Compile-time
b) Run-time
c) Not an error
a) O(logn)
b) O(nlogn)
c) O(n)
d) O(1)
a) 8
b) 21
c) 55
d) 14
126. Which of the following application makes use of a circular linked list?
127. Which of the following properties does a simple graph not hold?
a) Must be connected
b) Must be unweighted
a) A queue with insert/delete defined for both front and rear ends of the queue
130. Matrix A when multiplied with Matrix C gives the Identity matrix I, what is C?
a) Identity matrix
b) Inverse of A
c) Square of A
d) Transpose of A
a) Odd number
b) Even number
c) Prime number
a) O(nlogn)
b) O(logn)
c) O(n)
d) O(n2)
133. If a problem can be broken into subproblems which are reused several times, the problem
possesses ____________ property.
a) Overlapping subproblems
b) Optimal substructure
c) Memoization
d) Greedy
134. In recursion, the condition for which the function will stop calling itself is ____________
a) Best case
b) Worst case
c) Base case
135. If A[x+3][y+5] represents an adjacency matrix, which of these could be the value of x and y.
a) x=5, y=3
b) x=3, y=5
c) x=3, y=3
d) x=5, y=5
136. What can be the applications of Breadth First Search?
137. Which of the following recursive formula can be used to find the factorial of a number?
a) fact(n) = n * fact(n)
b) fact(n) = n * fact(n+1)
c) fact(n) = n * fact(n-1)
d) fact(n) = n * fact(1)
139. __________ comparisons required to sort the list 1, 2, 3…….n using insertion sort.
a) (n2 + n + 2) / 2
b) (n3 + n – 2) / 2
c) (n2 + n – 2) / 2
d) (n2 – n – 2) / 2
140. What is a randomized QuickSort?
a) Once
b) Twice
142. In dynamic programming, the technique of storing the previously calculated values is called
___________
c) Memorization
d) Mapping
a) 3
b) 12
c) 21
d) 42
144. The quotient and remainder when -1 is divided by 3 is
a) -1 and -1
b) -1 and 2
c) 1 and 2
d) -1 and -2
a) 3
b) 4
c) 8
d) 9