AImerge
AImerge
N
Mathematical FoundationCA-1.4(254104) S
1) An ordered collection of objects are called ______ B
A.Relation
B.Set
C.Function
D.Proposition
3) The set ‘A’ of odd positive numbers less than 10 can show by ______ D
A.{1, 2, 3}
B.{1, 5, 7, 9, 11}
C.{1, 2, 5, 9}
D.{1, 3, 5, 7, 9}
1 P.T.O.
7) Which of the following two sets are equal? C
A. A = {1, 2} and B = {1}
B. A = {1, 2} and B = {1, 2, 3}
C. A = {1, 2, 3} and B = {2, 1, 3}
D. A = {1, 2, 4} and B = {1, 2, 3}
12) The intersection of the sets {1, 2, 5,6} and { 2,3,4,5 6} is the set _____________ C
A.{1, 2 , 4}
B.{3, 5, 6}
C.{2, 5 ,6 }
D.{1,2,3,4,5, 6}
2
13) Two sets are called disjoint if there _____________ is the empty set. C
A.Union
B.Difference
C.Intersection
D.Complement
14) The difference of the B-A, where A= {1, 2, 3, 4} and B= {1, 2, 4, 5} is? B
A.{1}
B.{5}
C.{3}
D.{2}
15) What is complement of the set A _______ C
A.A – B
B.U – A
C.A – U
D.B – A
16) Which is the symbol for null set ? D
A. Ʃ
B. µ
C. ˄
D. ᶲ
17) Let Ai = {i, i+1, i+2, …..}. Then set {n, n+1, n+2, n+3, …..} is the _________ of the set B
Ai.
A.Union
B.Intersection
C.Set Difference
D.Disjoint
A B
A. Equal sets
B. Overlapping sets
C. Disjoint sets
D. None
3 P.T.O.
19) In this diagram A and B are------ D
A B
A. Equal sets
B. Disjoint sets
C. Both A & B
D. None
20) Complement of a set B in denoted by A
A. B'
B. B °
C. {B}
D. B²
21) What is the set difference of set A with null set is __________ A
A.A
B.null
C.U
D.B
22) Let the set A is {1, 2, 3} and B is {2, 3, 4 ,8}. Then the total number of elements in (A U B
B) is?
A.4
B.5
C.6
D.7
23) Let the set A is {1, 2 } and B is {2, 3, 5 }. Then the total number of elements in (A ∩ B) A
is?
A.1
B.2
C.3
D.4
24) Let A be set of all prime numbers, B be the set of all even prime numbers, C be the set of D
all odd prime numbers, then which of the following is true?
A.A ≡ B U C
B.B is a singleton set.
C.A ≡ C U {2}
D.All of the mentioned
4
25) If A has 3 elements B has 7 elements then the minimum and maximum number of B
elements in A U B are ____________
A.3, 7
B.7, 10
C.3, 10
D.None of the mentioned
26) Two sets A and B contains ‘a’ and ‘b’ elements respectively. If power set of A contains 16 A
more elements than that of B, value of ‘b’ and ‘a’ are _______
A.4, 5
B.6, 7
C.2, 3
D.None of the mentioned
27) Let A be {11, 22, 23, 44}, U be set of all natural numbers, then U-A’(complement of A.is C
given by set.
A.{11,22,33, 44, 55, 66, ….}
B.{55, 66, 77, 88, 99, ……}
C.{11, 22, 33, 44 }
D.All of the mentioned
Answer: c
28) Which sets are not empty? D
A.{x: x is a even prime greater than 3}
B.{x : x is a multiple of 2 and is odd}
C.{x: x is an even number and x+3 is even}
D.{ x: x is a prime number less than 5 and is odd}
29) In a disjunction, even if one of the statements is false, the whole disjunction is still... C
A. False
B. Negated
C. True
D. Both true and false
5 P.T.O.
30) Consider the statement form p ⇒ q where p = “If Ram is Puja’s father then Puja isniece” B
and q = “Shyam is Ram’s brother.” Which of the following statements is equivalent to this
statement?
A.If Shyam is Ram’s Brother, then Ram is Puja’s father and Puja is not Shyam’sniece.
B. If Shyam is not Ram’s Brother, then Ram is Puja’s father and Puja is not Shyam’s
niece.
C.If Shyam is not Ram’s Brother, then Ram is Puja’s father or Puja is Shyam’s niece.
D.If Shyam is Ram’s Brother, then Ram is Puja’s father and Puja is Shyam’s niece.
31) The compound propositions p and q are called logically equivalent if ________ is a A
tautology.
A. p ↔ q
B. p → q
C. ¬ (p ∨ q)
D. ¬p ∨ ¬q
6
37) (p → q) ∧ (p → r) is logically equivalent to ________ A
A.p → (q ∧ r)
B.p → (q ∨ r)
C.p ∧ (q ∨ r)
D.p ∨ (q ∧ r)
38) P → (Q → R) is equivalent to A
a)(P ^Q)-> R
b)(P v Q)->R
c)(P v Q)-> ˥R
d)None of these
41) Let Q(x) be the statement “x < 5.” What is the truth value of the quantification ∀xQ(x), B
having domains as real numbers.
A. True
B. False
42) Determine the truth value of ∀n(n + 1 > n) if the domain consists of all real numbers. A
A.True
B.False
43) A biconditional is symbolized like this… B
A. pvq
B. p↔ q
C. p*q
D. p˄q
44) Let R (x) denote the statement “x > 2.” What is the truth value of the quantification A
∃xR(x), having domain as real numbers?
A.True
B.False
7 P.T.O.
45) The symbolization for a conjunction is... B
A. p → q
B. p ˄ q
C. p v q
D. ~ p
46) In a truth table for a two-variable argument, the first guide column has the following truth A
values:
A. T, T, F, F
B. F, F, T, T
C. T, F, T, F
D. T, F, F, F
50) ”Everyone wants to learn cosmology.” This argument may be true for which domains? C
A.All students in your cosmology class
B.All the cosmology learning students in the world
C.Both of the mentioned
D.None of the mentioned
51) Number of ways in which 7 girls & 7 boys can be arranged such that no two boys and no C
two girls are together is
A. 12!(2!)2
B. 7! 8!
C. 2(7!)2
D. None of these
8
52) A _______ is an arrangement of outcomes in which the order does not matter A
A. Permutation
B. Combination
C. Both A & B
D. None of the above
53) How many substrings (of all lengths inclusive) can be formed from a character string of D
length 8? (Assume all characters to be distinct)
A.14
B.21
C.54
D.37
54) A _______ is a grouping of outcomes in which the order does not matter B
E. Permutation
F. Combination
G. Both A & B
H. None of the above
55) What is formula of Combinations? B
A. nCr= n!/ (n-r)!
B. nCr = n!/ r! (n-r)!
C. Both A & B
D. None of the above
56) Let M be a sequence of 9 distinct integers sorted in ascending order. How many distinct A
pairs of sequences, N and O are there such that i) each are sorted in ascending order, ii) N
has 5 and O has 4 elements, and iii) the result of merging N and O gives that sequence?
A.84
B.35
C.194
D.138
57) The number of ordered triplets (a, b, c), a, b, c Є N, such that a + b + c <= 20 is D
A. Less than 100
B. Less than 1000
C. Equal to 1000
D. More than 1000
58) A polygon has 44 diagonals. The number of its sides is B
A. 10
B. 11
C. 12
D. 13
9 P.T.O.
59) The number of ways in which a mixed doubles tennis game can be arranged between 10 A
players consisting of 6 men and 4 women is
A. 180
B. 90
C. 48
D. 12
60) The number of zeroes at the end of (127)! is A
A. 31
B. 30
C. 0
D. 10
61) Matrix obtained by changing rows and columns is called B
A. rectangular matrix
B. transpose
C. symmetric
D. none
62) Generally the elements of a matrix are denoted by D
A. numbers
B. capital letters
C. small letters
D. both A and C
63) A symmetric matrix is a one in which? C
A.All diagonal elements are zero
B.All diagonal elements are 1
C.A = AT
D.A = -AT
66) If for a square matrix A and B,null matrix O, AB = O implies A=O and B=O. B
A.True
B.False
10
67) B
11 P.T.O.
73) The functions expressed in form of ratios and form of quotient of polynomials are A
A. rational functions
B. irrational functions
C. quotient function
D. ratio function
75) A function is a relation from a set of inputs to a set of possible outputs where each input is
related to exactly one output is called.
A. One to one function
B. One to many function
C. Many to one function
D. Many to many function
76) function is a relation from a set of inputs to a set of possible outputs where each input is
related to exactly one output is called.
A. One to one function
B. One to many function
C. Many to one function
D. Many to many function
12
80) May possibly come out of a function is called the B
A. Domain
B. Codomain
C. Range
D. None of the above
13 P.T.O.
88) The Cartesian system is also called as B
A.Circular coordinate system
B. Rectangular coordinate system
C. Spherical coordinate system
D. Space coordinate system
93) If the coordinates of a point are (10, 0), then it lies in: B
A. X-axis
B. Y-axis
C. At origin
D. Between x-axis and y-axis
94) If the coordinates of a point are (0, -4), then line parallel to : A
A. X-axis
B. Y-axis
C. At origin
D. Between x-axis and y-axis
95) If y coordinate of a point is zero, then the point lies on: D
A. First quadrant
B. Second quadrant
C. X-axis
D. Y-axis
**********
15 P.T.O.
Question Bank of A
N
CA-1.5 Essentials of Web Design(254105) S
A) <LL> B) <DD>
C) <DL> D) <DS>
8) Which of the following tag is used to define options in a drop-down selection list? D
A) <select> B) <list>
C) <dropdown> D) <option>
9) How can you open a link in a new browser window? B
A) < a href = "url" target = "new">
B) <a href = "url" target= "_blank">
C) <a href = "url".new>
D) <a href = "url" target ="open">
1 P.T.O.
10) Select the correct HTML syntax for creating a text area? C
A) <input type="textarea">
B) <input type="textbox">
C) <textarea>
D) None of the above
11) Which tag inserts a line horizontally on web page? A
A) < hr > B) <Line> C) < line irection "Horizontal"> D) <tr>
16) Which of the following element is responsible for making the text italic in HTML? A
A) <i> B) <italic> C) <it> D) <pre>
17) Apart from <b> tag, what other tag makes text bold ? B
A) <fat> B) <strong>
C) <black> D) <emp>
18) which of the following tag is used to mark a begining of paragraph ? C
A) <TD> B) <br> C) <P> D) <TR>
2
19) Which is the correct way to comment out something in HTML? B
A) Using ## and #B) Using <!-- and -->
C) Using </-- and -/->D) Using <!-- and -!>
26) Which of the following tag is used to make the underlined text? C
A) <i> B) <ul> C) <u> D) <pre>
27) Which CSS property is used to control the text size of an element ? A
A) font-size B) text-size C) font-style D) text-style
28) Markup tags tell the web browser B
3 P.T.O.
29) Which of the following is used to merge rows in the table? C
A) colB) colspanC) rowspanD) row
30) What is the correct HTML tag for inserting a line break ? B
A) <lb> B) <br> C) <break> D) <newline>
31) In HTML5, which of the following tag is used to initialize the document type? D
A) <Doctype HTML>B) <\Doctype html>
C) <Doctype>D) <!DOCTYPE html>
32) Which of the following element is responsible for making the text bold in HTML? C
A) <pre> B) <a> C) <b> D) <br>
34) Which tags can be used to display the audio and video? C
A) <audio>
B) <video>
C) both A) & B)
D) none of the above
4
39) What Tag Is used To add an image to HTML Page? B
A) Picture B) Img
C) Src D) Image
41) Which of the following attributes of text box control allow to limit the maximum C
character?
A) size B) len C) maxlength D) all of these
44) Which of the following is the correct way to create a list using the lowercase letters? B
A) <ol alpha = "a" >
B) <ol type = "a">
C) <ol letter = "a">
D) None of the above
45) Which of the following tag is used to add rows in the table? C
A) <td> and </td>
B) <th> and </th>
C) <tr> and </tr>
D) None of the above
5 P.T.O.
46) Which of the following is used to merge columns in the table? B
A) col
B) colspan
C) rowspan
D) row
47) Which of the following attribute is used to provide a unique name to an element? B
A) class B) id
C) type D) None of the above
49) Which of the following tag is used to add column headings in the table? B
A) <td> and </td>
B) <th> and </th>
C) <tr> and </tr>
D) None of the above
50) Main container for <TR>, <TD> and <TH> is A
A) <TABLE> B) <GROUP>
C) <DATA> D) All of these
6
54) Correct HTML to left align the content inside a table cell is C
A) <tdleft> B) <td raligh = "left" >
C) <td align = "left"> D) <td leftalign>
55) Which of the following is the correct way to start an ordered list with the count of D
numeric value 4?
A) <ol type = "1" initial = "4">
B) <ol type = "1" begin = "4">
C) <ol type = "1" num = "4">
D) <ol type = "1" start = "4">
58) Which of the following tag is used to add column in the table? A
A) <td> and </td>
B) <th> and </th>
C) <tr> and </tr>
D) None of the above
59) An HTML program is saved by using the ____ extension. B
A) .ht
B) .html
C) .hml
D) None of the above
60) Which of the following is an attribute of <Table> tag? C
A) SRC
B) LINK
C) CELLPADDING
D) BOLD
7 P.T.O.
61) Which of the following is not a valid CSS unit? C
A) ptB) pxC) pixD) cm
62) The body tag usually used after B
A) Title tag B) HEAD tag
C) EM tag D) FORM tag
63) Increasing Cell padding means?
A) increase softness of your site
B) increase space between cell
C) increase the distance between cell and content
D) none of the above
8
68) HTML Links Are Defined With <a> Tag And Address Is Specified By Attribute A
A) Href
B) Hlink
C) Src
D) Src-link
69) Which of the following is / are the state of the links in CSS? D
A) a:visited
B) a:hover
C) a:active
D) All of the above.
9 P.T.O.
76) What does vlink attribute mean? A
A) visited link
B) virtual link
C) very good link
D) active link
77) Which of the following is a correct character entity for "copyright" symbol? A
A) ©
B) Ccopy;
C) ©right;
D) &c;
78) Which of the following is an attribute related to font tag? D
A) size B) face C) color D) All of the above
79) If we want to use a nice looking green dotted border around an image, which css property C
will we use?
A) border-color B) border-decoration
C) border-style D) border-line
80) When we write <imgsrc="img.png">, what "img.png" inside double quote implies? C
A) element B) attribute
C) value D) operator
10
84) If we want define style for an unique element, then which css selector will we use ? A
A) Id B) text C) class D) name
85) _________ selectors, which are used to specify a group of elements B
A) id B) class C) tag D) None of the above
86) Where in an HTML document is the correct place to refer to an external stylesheet? A
A) <head> B)Body C) <form> D) <script>
87) Which tag is used to define internal style sheet C
A) <script > B) <head> C) <style> D) <form>
88) Which tag supports CSS code between its opening and closing tag? C
A) < div > ... < /div >
B) <css> ... < /css>
C) < style > ... < /style >
D) < link > ... < /link >
90) Which CSS property lets you adjust the size of the text? B
A) text-size
B) font-size
C) display-size
D) None of the given.
91) Which of the following selector matches all elements of a type? B
A) The Type Selector
B) The Universal Selector
C) The Descendant Selector
D) The Class Selector
92) How can you make a bulleted list with numbers? D
A) <dl> B) <ul> C) <list> D. <ol>
11 P.T.O.
93) Which of the attribute is used to add video controls like play , pause and volume in video B
A) autoplay B) Controls C) Video Ctrl D) Play
94) Which of the following property is used to control the space between the border and C
content in a table?
A) border B) margin C) padding D) resize
95) Which of the following uses of the tag is correct? A
A) < link rel="stylesheet" href="css/my_styles.css" >
B) < link rel="stylesheet" src="css/my_styles.css" >
C) < link rel="css" >
D) < link href="css/my_styles.css" >
96) What is CSS? C
A) Used to customize a page for each user
B) A subset of HTML
C) Used to control what a page looks like
D) None of the given.
97) Which CSS property allows you to control the spacing between html items? C
A) spacingB) paddingC) marginD) None of the given.
98) If you wanted to move a banner to the right instead of the left, which of these would you B
set?
A )margin-bottom: B) margin-left: C) margin-top: D) margin-right:
99) HTML stands for? A
A) Hyper Text Markup Language
B) High Text Markup Language
C) Hyper Tabular Markup Language
D) None of these
**********
12
Question Bank of A
N
CA-5.1 Web UI Design(254501) S
4) Choose the correct JavaScript syntax to change the content of the following HTML code. C
A)document.getElement (“test").innerHTML = "I am a test";
B)document.getId (“test") = "I am a test";
C)document.getElementById (“test").innerHTML = "I am a test";
D)documents.getElementByIds (“test").innerHTML = I am a test;
5) JavaScript is ____________language C
A) Programming B) Application C) Scripting D) system
6) Which of them is not the looping structures in JavaScript? C
A) forB) whileC)forwhichD)dowhile
7) With jQuery, look at the following selector: $("div"). What does it select? A
A) All div elements
B) The first div element
C) The last div element
D) none of above
1 P.T.O.
8) The speed options can be applied to which jQuery functions? B
A) css and ajax
B) show and fadeIn
C) toggleCss
D) All of the above
9) Which property is used to specify the key type when pressed? A
A) keyCodeB) keyTypeC) keyNameD) keyProperty
2
17) Which of the following is not the property of screen objects in JavaScript? B
A)AvailHeightB)ColorsDepthC)AvailWidthD)ColorDepth
18) $(“span.intro”). What does it select? D
A) The first span element with class=”intro”
B) The first span element with id=”intro”
C) All span elements with id=”intro”
D) All span elements with class=”intro”
23) $(“P”).action() C
What type of selector is used in the above jQuery syntax?
A)id selectorB)class selector
C)element selectorD)value selector
25) Which jQuery method is used to set one or more style properties for selected elements? A
A)css() B) html() C) style()D) animate()
3 P.T.O.
26) What does the <noscript> tag do? A
A) Enclose text to be displayed by non-JavaScript browsers.
B) Prevents scripts on the page from executing.
C) Describes certain low-budget movies.
D) None of the above
27) ______ tag is an extension to HTML that can enclose any number of JavaScript A
statements.
A)<SCRIPT>B)<BODY>C)<HEAD>D)<TITLE>
28) JavaScript is interpreted by _________ A
A) ClientB) ServerC) ObjectD) None of the above
29) Which jQuery method is used to hide selected elements? B
A) hidden() B) hide() C) visible(false) D) display(none)
30) Which of the following are not key event properties? A
A) Code keyB) Alt KeyC) Ctrl KeyD) Shift Key
31) How do you read the first character in a string? A
A) data.charAt(0);
B) data.slice(1)
C) data.substr(0);
D) data.charAt(1);
32) Which of the following attribute can hold the JavaScript version? A
A) LANGUAGEB) SCRIPTC) VERSIOND) None of the above
33) What is the correct syntax for referring to an external script called "abc.js"? C
A)<script href=" abc.js"> B)<script name=" abc.js">
C)<script src=" abc.js"> D) None of the above
4
35) With jQuery, look at the following selector: $("div.intro"). What does it select? C
A) The first div element with class="intro"
B) The first div element with id="intro"
C) All div elements with class="intro"
D) All div elements with id="intro"
36) Which statement is true? B
A) All the statements are true
B) All XML elements must have a closing tag
C) All XML elements must be lower case
D) All XML documents must have a DTD
5 P.T.O.
41) Which of the following Attribute is used to include External JS code inside your HTML A
Document
A) srcB) extC) scriptD) link
49) Which among the following is not a property of the Location object? C
A) protocolB) hostC) hosteeD) hostname
6
50) How to write your own plug-in using jquery? A
A)jQuery.fn.methodName = methodDefinition;
B)jQuery.Stylesheet= methodDefinition;
C)jQuery.functions.method = methodDefinition;
D)jQuery.Stylesheet.function = methodDefinition;
51) In an array object, what is the key of the first value? A
A) 0B) 2C) 1D) -1
53) The type that specifies what kind of event occurred is ____________ A
A) event typeB) even target
C) both event type and even targetD) interface
54) The focus and blur events are also part of _________ C
A) Element eventsB) Handler events
C) Window eventsD) Scroll events
55) $(‘.temp’).action() B
What type of selector is used in the above jQuery syntax?
A)id selectorB)class selector
C)name selectorD)value selector
56) jQuery code to set the background color of all span elements to blue? C
A) $(“span”).style(“background-color”,”blue”);
B) $(“span”).manipulate(“background-color”,”blue”);
C) $(“span”).css(“background-color”,”blue”);
D) $(“span”).layout(“background-color”,”blue”);
57) Which jQuery method is used to switch between adding/removing one or more classes (for D
CSS) from selected elements?
A) toggleClass()B) switch()
C) altClass()D) switchClass()
7 P.T.O.
58) What are the various speed options? A
A) The words "slow" and "fast" as well as integers for the milliseconds
B) Only the words "slow", "fast", and "medium"
C) All of the above
D) None of the above
8
67) Which of the following is not a Jquery UI interaction D
A) DraggableB) SortableC) ResizableD) Viewable
68) What does XML stand for? B
A) eXtra Modern Link
B) eXtensibleMarkup Language
C) Example Markup Language
D) X-Markup Language
70) Which of the following is/are the sources of Content Distribution Network(CDN) for D
jQuery.
A) jQuery CDNB) Microsoft CDN
C) Google CDND) All of the above
9 P.T.O.
75) When is the mouseout event fired? A
A) When mouse is no longer over an element
B) When mouse is over an element
C) When mouse is hovered
D) When mouse is clicked
76) What does DTD stand for? B
A) Direct Type Definition
B) Document Type Definition
C) Do The Dance
D) Dynamic Type Definition
79) Which jQuery function is used to prevent code from running, before the document is C
finished loading?
A) $(document).load()B) $(document).ready()
C) $(body).onload()D) $(body).unload()
80) Which of the following Node object property returns the node immediately before a node? A
A) previousSiblingB) textContentC) indexD) localName
82) If you want to stop your jQuery for a few milliseconds, which function do you use? D
A) stop()B) pause()C) slowdown()D) delay()
83) Which event is fired when a document and all of its external resources are fully loaded B
and displayed to the user?
A) WindowB) LoadC) ElementD) Handler
10
84) Load remote data using HTTP GET A
A) $.get(url,data,callback,type)
B) $.ajax(options)
C) $.post(url,data,callback,type)
D) $.getScript(url,callback)
85) The URL property belongs to which of the following object? A
A) DocumentB) ElementC) LocationD) Event
87) The properties that specify the position and button state of the mouse are _________ A
A) clientX and client B) clientY and clientX
C) altKey and ctrlKeyD) metaKey and shiftKey
90) jQuery is a A
A) JavaScript Library. B)JavaScript Language
C)JavaScript Method D) PHP Method
91) Which is the object on which the event occurred or with which the event is associated? B
A) event typeB) event target
C) both event type and even targetD) interface
92) Which of the following event fires when the form element loses the focus: <button>, B
<input>, <label>, <select>, <textarea>?
A) onfocusB) onblurC) onclickD) ondblclick
11 P.T.O.
93) Xslt stands for A
A)eXtensible Stylesheet Language transformation
B)eXtra Stylesheet Language transform
C)eXtended Style Language transformation
D)eX Stylesheet Language transform
94) Which of the following way can be used to indicate the LANGUAGE attribute? C
A) <LANGUAGE="JavaScriptVersion">
B) <SCRIPT LANGUAGE="JavaScriptVersion">
C) <SCRIPT LANGUAGE="JavaScriptVersion"> JavaScript statements…</SCRIPT>
D) <SCRIPT LANGUAGE="JavaScriptVersion"!> JavaScript statements…</SCRIPT>
99) $(“*”).action() D
What type of selector is used in the above jQuery syntax?
A)id selectorB)class selector
C)name selectorD)Universal selector
100) DOM is ________ B
A) Duplicate object modeB) Document object model
C) Doc Object modellingD) none of the above
**********
12
Sr. Question Bank of ANS
No.
CA 5.2 Theoretical Computer Science(254502)
1) Which of the following is true? b)
a) Every subset of a regular set is regular
b) Every finite subset of non-regular set is regular
c) The union of two non-regular set is not regular
d) Infinite union of finite set is regular
2) If L1 = {x | x is a palindrome in (0 + 1)*} a)
L2 = {letter (letter + digit)* };
L3 = (0n 1n 2n | n > 1}
L4 = {ambnam+n | m, n > 1}
then which of the following statement is correct ?
a) L1 is context free language and L3 is context sensitive language
b) L2 is a regular set and L4 is not a context free language
c) Both L1 and L2 are regular sets
d) Both L3 and L4 are context-sensitive languages
3) L = {aP | p ; } is prime is b)
a) regular
b) not regular
c) accepted by DFA
d) accepted by PDA
4) Regular expression are a)
a) Type 0 language
b) Type 1 language
c) Type 2 language
d) Type 3 language
5) Which of the technique can be used to prove that a language is non regular? c)
a) Ardens theorem
b) Ogden’s Lemma
c) Pumping Lemma
d) None of the mentioned
1 P.T.O.
6) Following context free grammar a)
S —> aB | bA
A —>b | aS | bAA
B —> b | bS | aBB
generates strings of terminals that have
a) equal number of a's and b's
b) odd number of a's and odd number b's
c) even number of a's and even number of b's
d) d. odd number of a's and even number of a's
7) Which of the following is not true? b)
a. Power of deterministic automata is equivalent to power of non-deterministic
automata.
b. Power of deterministic pushdown automata is equivalent to power of non-
deterministic pushdown automata.
c. Power of deterministic Turing machine is equivalent to power of non-
deterministic Turing machine.
d. All the above
8) Identify the language which is not context - free. b.
a. L = {ωωR|ωϵ{0,1}*}
b. L = {a^nb^n|n≥0}
c. L = {ωω|ωϵ{0,1}*}
d. L = {a^nb^mc^md^n | n, m≥0 }
9) The context-free languages are closed for: c.
2
10) Grammars that can be translated to DFAs: a.
a. Right linear grammar
b. Left linear grammar
c. Generic grammar
d. All of these
11) The language accepted by a Push down Automata:
c.
a. Type0
b. Type1
c. Type2
d. Type3
12) Consider the following two languages:
c.
3 P.T.O.
13) Palindromes can't be recognized by any FSM because d
G1 : S → SbS | a
G2 : S → aB | ab, A→GAB | a, B→ABb | b
4
17) The set A={ 0^n 1^n 2^n | n=1, 2, 3, ......... } is an example of a grammar that is: a.
a. Context sensitive
b. Context free
c. Regular
d. None of the above
18) Regular expression a / b denotes the set c.
a. {a}
b. { ∈ , a, b }
c. {a, b}
d. { ab }
19) Which of the following is true? b)
a) Every subset of a regular set is regular
b) Every finite subset of non-regular set is regular
c) The union of two non-regular set is not regular
d) Infinite union of finite set is regular
20) A push down automaton employs ________ data structure. d)
a) Queue
b) Linked List
c) Hash Table
d) Stack
21) State true or false: a)
Statement: The operations of PDA never work on elements, other than the top.
a) true
b) false
22) Which of the operations are eligible in PDA? a)
a) Push
b) Delete
c) Insert
d) Find
5 P.T.O.
23) Write the regular expression to denote the language L over ? = { a,b} such that all b)
the string do not contain the substring “ ab”.
a) a*b*
b) b*a*
c) (ab)*
d) (ba)*
24) The following move of a PDA is on the basis of: c)
a) Present state
b) Input Symbol
c) Both (a) and (b)
d) None of the mentioned
25) Which of the following was not a part of Chomsky hierarchy?
a) Context sensitive grammar c)
b) Unrestricted grammar
c) Recursive grammar
d) None of the mentioned
26) Assume the R is a relation on a set A, aRb is partially ordered such that a and b are d)
_____________
a) reflexive
b) transitive
c) symmetric
d) reflexive and transitive
27) Recognize the CFL for the given CFG. a.
S-> aB| bA,
A-> a|aS|bAA,
B-> b|bS|aBB
6
29) In Moore machine, output is produced over the change of: a.
a) states
b)transitions
c) Both
d) None of the mentioned
30) FSM shown in the figure c.
a. all strings
b. no string
c. ε- alone
d. none of these
31) Which of the following is a correct statement? a.
a) Moore machine has no accepting states
b) Mealy machine has accepting states
c) We can convert Mealy to Moore but not vice versa
d) All of the mentioned
32) In mealy machine, the O/P depends upon? c.
a) State
b) Previous State
c) State and Input
d) Only Input
33) Which of the given are correct? c.
a) Moore machine has 6-tuples
b) Mealy machine has 6-tuples
c) Both Mealy and Moore has 6-tuples
d) None of the mentioned
34) The major difference between Mealy and Moore machine is about: a.
a) Output Variations
b) Input Variations
c) Both
d) None of the mentioned
7 P.T.O.
35) Mealy and Moore machine can be categorized as: b.
a) Inducers
b) Transducers
c) Turing Machines
d) Linearly Bounder Automata
36) Which one among the following is true? d.
A mealy machine
a) produces a language
b) produces a grammar
c) can be converted to NFA
d) has less circuit delays
37) When are 2 finite states equivalent? c.
a) Same number of transitions
b) Same number of states
c) Same number of states as well as transitions
d) Both are final states
38) What does the following figure most correctly represents? c.
8
39) Regular expression corresponding to the state diagram given in the figure is a.
9 P.T.O.
42) Given: b.
L= {xϵ∑= {0,1} |x=0n1n for n>=1}; Can there be a DFA possible for the
language?
a) Yes
b) No
43) There are ________ tuples in finite state machine. b.
a) 4
b) 5
c) 6
d) unlimited
44) Transition function maps. d.
a) Σ * Q -> Σ
b) Q * Q -> Σ
c) Σ * Σ -> Q
d) Q * Σ -> Q
45) Consider the regular expression 0 * (10 *) which is similar to the same set as d.
a. 0 + (0 + 10) *
b. (0 +1) * 10 (0 + 1) *
c. (1 * 0) * 1*
d. None of the above
46) Finite automata requires minimum _______ number of stacks. b.
a. 1
b. 0
c. 2
d. None of the mentioned
47) Which one of the following is true for the language {am bn c m+n I m, n≥1}? b.
a. It is context-free but not regular
b. It is regular
c. It is type-0 but not context-sensitive
d. It is context-sensitive but not context-free
48) Regular expression for all strings starts with ab and ends with bba is. c.
a. aba*b*bba
b. ab(ab)*bba
c. ab(a+b)*bba
d. All of the mentioned
10
49) The basic limitation of finite automata is that a.
a. It can’t remember arbitrary large amount of information.
b. It sometimes recognize grammar that are not regular.
c. It sometimes fails to recognize regular grammar.
d. All of the mentioned
50) Predict the number of transitions required to automate the following language a.
using only 3 states:
L= {w | w ends with 00}
a. 3
b. 2
c. 4
d. Cannot be said
51) Reverse of a DFA can be formed by c.
a. using PDA
b. making final state as non-final
c. making final as starting state and starting state as final state
d. None of the mentioned
52) Concatenation of R with Ф outputs: b.
a) R
b) Ф
c) R.Ф
d) None of the mentioned
53) Simplify the following regular expression: a.
ε+1*(011) *(1*(011) *) *
a. (1+011) *
b. (1*(011) *)
c. (1+(011) *) *
d. (1011) *
54) P, O, R be regular expression over ∑, P is not ε, then b.
R=Q + RP has a unique solution:
a) Q*P
b) QP*
c) Q*P*
d) (P*O*) *
11 P.T.O.
55) If two finite state machines are equivalent, they should have the same number of d.
a. states
b. edges
c. states and edges
d. none of these
56) The difference between number of states with regular expression (a + b) and (a + a.
b) * is:
a) 1
b) 2
c) 3
d) 0
57) In order to represent a regular expression, the first step to create the transition a.
diagram is:
a) Create the NFA using Null moves
b) Null moves are not acceptable, thus should not be used
c) Predict the number of states to be used in order to construct the Regular
expression
d) None of the mentioned
58) Regular Expression denote precisely the ________ of Regular Language. a.
a) Class
b) Power Set
c) Super Set
d) None of the mentioned
59) Relate the following statement: b.
Statement: All sufficiently long words in a regular language can have a middle
section of words repeated a number of times to produce a new word which also
lies within the same language.
a) Turing Machine
b) Pumping Lemma
c) Arden’s theorem
d) None of the mentioned
60) While applying Pumping lemma over a language, we consider a string w that c.
belong to L and fragment it into _________ parts.
a) 2
b) 5
c) 3
d) 6
12
61) If we select a string w such that w∈L, and w=xyz. Which of the following portions b.
cannot be an empty string?
a) x
b) y
c) z
d) all of the mentioned
62) There exists a language L. We define a string w such that w∈L and w=xyz and |w| a.
>=n for some constant integer n.What can be the maximum length of the substring
xy i.e. |xy|<=?
a) n
b) |y|
c) |x|
d) none of the mentioned
63) Answer in accordance to the third and last statement in pumping lemma: d.
For all _______ xyiz ∈L
a) i>0
b) i<0
c) i<=0
d) i>=0
64) Let w be a string and fragmented by three variable x, y, and z as per pumping a.
lemma. What does these variables represent?
a) string count
b) string
c) both (a) and (b)
d) none of the mentioned
65) Regular expression (a | b ) (a | b) denotes the set d.
a. { a, b, ab, aa }
b. { a, b, ba, bb }
c. { a, b }
d. { aa, ab, ba, bb }
66) The language of balanced paranthesis is b.
a) regular
b) non regular
c) may be regular
d) none of the mentioned
13 P.T.O.
67) The entity which generate Language is termed as: c.
a) Automata
b) Tokens
c) Grammar
d) Data
68) Production Rule: aAb->agb belongs to which of the following category? c.
a) Regular Language
b) Context free Language
c) Context Sensitive Language
d) Recursively Ennumerable Language
69) The Grammar can be defined as: G=(V, ∑, p, S) b.
In the given definition, what does S represents?
a) Accepting State
b) Starting Variable
c) Sensitive Grammar
d) None of these
70) Which among the following cannot be accepted by a regular grammar? d.
a) L is a set of numbers divisible by 2
b) L is a set of binary complement
c) L is a set of string with odd number of 0
d) L is a set of 0n1n
71) Which is not the correct statement(s) ? b.
(i) Every context sensitive language is recursive.
(ii) There is a recursive language that is not context sensitive.
a. (i) is true, (ii) is false
b. (i) is true and (ii) is true
c. (i) is false, (ii) is false
d. (i) is false and (ii) is true
72) Which of the following statement is correct? a.
a. All Regular grammar are context free but not vice versa
b. All context free grammar are regular grammar but not vice versa
c. Regular grammar and context free grammar are the same entity
d. None of the mentioned
73) Are ambiguous grammar context free? a.
a. Yes
b. No
14
74) A->aA| a| b b.
The number of steps to form aab:
a. 2
b. 3
c. 4
d. 5
75) Which of the following the given language belongs to? d
L={ambmcm| m>=1}
a) Context free language
b) Regular language
c) Both (a) and (b)
d) None of the mentioned
76) Which among the following is the correct option for the given grammar? a
G->X111|G1,X->X0|00
a) {0a1b|a=2,b=3}
b) {0a1b|a=1,b=5}
c) {0a1b|a=b}
d) More than one of the mentioned is correct
77) Which one of the following is not a Greibach Normal form grammar? c.
(i) S ->a|bA|aA|bB
A->a
B->b
(ii) S->a|aA|AB
A->a
B->b
(iii) S->a|A|aA
A->a
a. (i) and (ii)
b. (i) and (iii)
c. (ii) and (iii)
d. (i), (ii) and (iii)
15 P.T.O.
78) Which of the following statement is false in context of tree terminology? a.
a. Root with no children is called a leaf
b. A node can have three children
c. Root has no parent
d. Trees are collection of nodes, with a parent child relationship
79) For the expression E*(E) where * and brackets are the operation, number of nodes b.
in the respective parse tree are:
a. 6
b. 7
c. 5
d. 2
80) The number of leaves in a parse tree with expression E*(E) where * and () are a.
operators
a. 5
b. 2
c. 4
d. 3
81) Context sensitive language can be recognized by a: d.
a. Finite state machine
b. Deterministic finite automata
c. Non-deterministic finite automata
d. Linear bounded automata
82) __________ is the acyclic graphical representation of a grammar. c.
a. Binary tree
b. Oct tree
c. Parse tree
d. None of the mentioned
83) Which of the following is false for a grammar G in Chomsky Normal Form: d.
a. G has no useless symbols
b. G has no unit productions
c. G has no epsilon productions
d. None of the mentioned
84) A CFG is ambiguous if b.
a. It has more than one rightmost derivations
b. It has more than one leftmost derivations
c. No parse tree can be generated for the CFG
d. None of the mentioned
16
85) A null production can be referred to as: a.
a. String
b. Symbol
c. Word
d. All of the mentioned
86) NPDA stands for a.
a. Non-Deterministic Push Down Automata
b. Null-Push Down Automata
c. Nested Push Down Automata
d. All of the mentioned
87) The format: A->aB refers to which of the following? b.
a. Chomsky Normal Form
b. Greibach Normal Form
c. Backus Naur Form
d. None of the mentioned
88) Which of the production rule can be accepted by Chomsky grammar? d.
a) A->BC
b) A->a
c) S->e
d) All of the mentioned
89) Every grammar in Chomsky Normal Form is: c.
a) regular
b) context sensitive
c) context free
d) all of the mentioned
90) Let G be a grammar: S->AB|e, A->a, B->b a
Is the given grammar in CNF?
a) Yes
b) No
91) Given grammar G: a
(1)S->AS
(2)S->AAS
(3)A->SA
(4)A->aa
Which of the following productions denies the format of Chomsky Normal Form?
a) 2,4
b) 1,3
c) 1, 2, 3, 4
d) 2, 3, 4
17 P.T.O.
92) Which of the following grammars are in Chomsky Normal Form: a.
a) S->AB|BC|CD, A->0, B->1, C->2, D->3
b) S->AB, S->BCA|0|1|2|3
c) S->ABa, A->aab, B->Ac
d) All of the mentioned
93) The variable which produces an epsilon is called: b.
a) empty variable
b) nullable
c) terminal
d) all of the mentioned
94) Let G=(V, T, P, S) be a CFG such that _____________. Then there exists an c.
equivalent grammar G’ having no e productions.
a) e ∈ L(G)
b) w ∉ L(G)
c) e ∉ L(G)
d) w ∈ L(G)
95) Which among the following is the format of unit production? a
a) A->B
b) A->b
c) B->Aa
d) None of the mentioned
96) Given Grammar G: c
S->aA
A->a| A
B->B
The number of productions to be removed immediately as Unit productions:
a) 0
b) 1
c) 2
d) 3
97) Given grammar: b
S->aA
A->a
A->B
B-> A
B->bb
Which of the following is the production of B after simplification by removal of
unit productions?
a) A
b) bb
c) aA
d) A| bb
18
98) Given Grammar: S->A, A->aA, A->e, B->bA d
Which among the following productions are Useless productions?
a) S->A
b) A->aA
c) A->e
d) B->bA
99) Let G be a grammar. When the production in G satisfy certain restrictions, then G c.
is said to be in ___________.
a) restricted form
b) parsed form
c) normal form
d) all of the mentioned
100) The DFA shown below accepts the set of all strings over {0, 1} that a.
a. End with 00
b. End with 0
c. Begin either with 0 or 1
d. Contain the substring 00
**********
19 P.T.O.
Question Bank of A
CA 5.4 Computer Graphics(254504) N
S
1) Which devices provides positional information to the graphics system ? D
A. Input devices
B. Output devices
C. Pointing devices
D. Both a and c
2) The number of pixels stored in the frame buffer of a graphics system is known as D
A. Resolution
B. Depth
C. Resolution
D. Only a
3) In graphical system, the array of pixels in the picture are stored in A
A. Memory
B. Frame buffer
C. Processor
D. All of the mentioned
4) Heat supplied to the cathode by directing a current through a coil of wire is called C
A. Electron gun
B. Electron beam
C. Filament
D. Anode and cathode
5) The maximum number of points that can be displayed without overlap on a CRT is B
referred as
A. Picture
B. Resolution
C. Persistence
D. Neither b nor c
6) ________ stores the picture information as a charge distribution behind the B
phosphor-coated screen.
A. Cathode ray tube
B. Direct-view storage tube
C. Flat panel displays
D. 3D viewing device
7) GUI means – B
A. Graphical user interaction
B. Graphical user interface
C. Graphical uniform interaction
D. None of the above
1 P.T.O.
8) Any CRT based display must be refreshing at least _______ times a second B
A. 20
B. 30
C. 40
D. 10
9) The resolution of Raster scan display is A
A. Low
B. High
C. Medium
D. None
10) A shadow mask CRT has ________ phosphor color dots at each pixel position A
A. 1
B. 2
C. 3
D. None of the above
11) LCD means C
A. Liquid chrome data
B. Liquid crystal data
C. Liquid crystal displays
D. None of the above
12) Which of the adapter does not support all points’ addressable display? D
A. VGA
B. CGA
C. MGA
D. EGA
13) We can align the electric gun with the help of C
A. shadow mask
B. resolution
C. pixel
D. refresh
14) In which system, the Shadow mask methods are commonly used A
A. Raster-scan system
B. Random-scan system
C. Only b
D. Both a and b
15) The process of digitizing a given picture definition into a set of pixel-intensity for C
storage in the frame buffer is called
A. Rasterization
B. Encoding
C. Scan conversion
D. True color system
2
16) The primary output device in a graphics system is_________ B
A. Scanner
B. Video monitor
C. Neither a nor b
D. Printer
17) On a black and white system with one bit per pixel, the frame buffer is commonly C
called as
A. Pix map
B. Multi map
C. Bitmap
D. All of the mentioned
18) Which of the following device is not the input device? C
A. Trackball and space ball
B. Data glove
C. Only d
D. Impact printers
19) DSVT stands for C
A. Digital View Storing Table
B. Digital Visual Storage Tube
C. Direct View Storage Tube
D. Digital View Storage Tube
20) Which equation is correct about line segment- B
A. x=yc+m
B. y=mx+c
C. y=mc+x
D. None of the above
21) On raster system, lines are plotted with C
A. Lines
B. Dots
C. Pixels
D. None of the mentioned
22) DDA stands for- D
A. Digital Data analyser
B. Digital Direct analysis
C. Digit Distinct analysis
D. Digital Differential analyser
23) Which of the following method is fastest pixel position calculating method B
A. Bresenham’s algorithm
B. DDA algorithm
C. Midpoint algorithm
D. None of the above
3 P.T.O.
24) An accurate and efficient raster line-generating algorithm is D
A. DDA algorithm
B. Mid-point algorithm
C. Parallel line algorithm
D. Bresenham’s line algorithm
25) In Bresenham’s line algorithm, if the distances d1 < d2 then decision parameter Pk C
is______
A. Positive
B. Equal
C. Negative
D. Option a or c
26) If the boundary is specified in a single color, and if the algorithm proceeds pixel by B
pixel until the boundary color is encountered is called
A. Scan-line fill algorithm
B. Boundary-fill algorithm
C. Flood-fill algorithm
D. Parallel curve algorithm
27) If we want to recolor an area that is not defined within a single color boundary is C
known as
A. Boundary-fill algorithm
B. Parallel curve algorithm
C. Flood-fill algorithm
D. Only b
28) A translation is applied to an object by A
A. Repositioning it along with straight line path
B. Repositioning it along with circular path
C. Only b
D. All of the mentioned
29) We translate a two-dimensional point by adding D
A. Translation distances
B. Translation difference
C. X and Y
D. Only a
30) The translation distances (dx, dy) is called as C
A. Translation vector
B. Shift vector
C. Both a and b
D. Neither a nor b
31) In 2D-translation, a point (x, y) can move to the new position (x’, y’) by using the B
equation
A. x’=x+dx and y’=y+dx
B. x’=x+dx and y’=y+dy
C. X’=x+dy and Y’=y+dx
D. X’=x-dx and y’=y-dy
4
32) The two-dimensional translation equation in the matrix form is A
A. P’=P+T
B. P’=P-T
C. P’=P*T
D. P’=p
33) _________ is a rigid body transformation that moves objects without deformation. C
A. Rotation
B. Scaling
C. Translation
D. All of the mentioned
34) A straight line segment is translated by applying the transformation equation A
A. P’=P+T
B. Dx and Dy
C. P’=P+P
D. Only c
35) The basic geometric transformations are D
A. Translation
B. Rotation
C. Scaling
D. All of the mentioned
36) Which is not polygon filling algorithm? D
A. Flood fill
B. Scanline fill
C. Boundary fill
D. Heap fill
37) A two dimensional rotation is applied to an object by B
A. Repositioning it along with straight line path
B. Repositioning it along with circular path
C. Any of the mentioned
D. None of the above
5 P.T.O.
40) The two-dimensional rotation equation in the matrix form is B
A. P’=P+T
B. P’=R*P
C. P’=P*P
D. P’=R+P
41) An ellipse can also be rotated about its center coordinates by rotating B
A. End points
B. Major and minor axes
C. Only a
D. None
42) The transformation that is used to alter the size of an object is A
A. Scaling
B. Rotation
C. Translation
D. Reflection
43) The two-dimensional scaling equation in the matrix form is B
A. P’=P+T
B. P’=S*P
C. P’=P*R
D. P’=R+S
44) If the scaling factors values sx and sy are assigned to the same value then B
A. Uniform rotation is produced
B. Uniform scaling is produced
C. Scaling cannot be done
D. Scaling can be done or cannot be done
45) If the scaling factors values sx and sy are assigned to unequal values then C
A. Uniform rotation is produced
B. Uniform scaling is produced
C. Differential scaling is produced
D. Scaling cannot be done
46) The matrix representation for scaling in homogeneous coordinates is A
A. P’=S*P
B. P’=R*P
C. P’=dx+dy
D. P’=S*S
47) What is the use of homogeneous coordinates and matrix representation? A
A. To treat all 3 transformations in a consistent way
B. To scale
C. To rotate
D. To shear the object
6
48) If point are expressed in homogeneous coordinates then the pair of (x, y) is D
represented as
A. (x’, y’, z’)
B. (x, y, z)
C. (x’, y’, w)
D. (x’, y’, w)
49) For 2D transformation the value of third coordinate i.e. w=? A
A. 1
B. 0
C. -1
D. Any value
50) If two pure reflections about a line passing through the origin are applied A
successively the result is ___________________
A. Pure rotation
B. Quarter rotation
C. Half rotation
D. True reflection
51) Which of the following represents shearing? D
A. (x, y) → (x+a, y+b)
B. (x, y) → (ax, by)
C. (x, y) → (x cos(θ)+y sin(θ), -x sin(θ)+y cos(θ))
D. (x, y) → (x+ay, y+bx)
52) Which of this is compulsory for 2D reflection? C
A. Reflection plane.
B. Origin
C. Reflection axis
D. Co-ordinate axis.
53) A view is selected by specifying a sub-area of the __________ picture area. B
A. half
B. total
C. full
D. quarter
54) Image formed by reflection through a plane mirror is_______________ B
A. of same size
B. same orientation
C. virtual
D. is at same distance from the mirror
55) Which of the following represents shearing? D
A. (x, y) → (x+a, y+b)
B. (x, y) → (ax, by)
C. (x, y) → (x cos(θ)+y sin(θ), -x sin(θ)+y cos(θ))
D. (x, y) → (x+ay, y+bx)
7 P.T.O.
56) Shearing is also termed as ________________ D
A. Selecting
B. Sorting
C. Scaling
D. Skewing
57) Any convenient co-ordinate system or Cartesian co-ordinates which can be used to D
define the picture is called ___________
A. spherical co-ordinates
B. vector co-ordinates
C. viewport co-ordinates
D. world co-ordinates
58) Which of the following co-ordinates are NOT used in 2d viewing transformation? C
A. modeling co-ordinates
B. viewing co-ordinates
C. vector co-ordinates
D. device co-ordinates
59) The process of elimination of parts of a scene outside a window or a viewport is C
called _____________
A. cutting
B. plucking
C. clipping
D. editing
60) Which equation is correct about translation B
A. X' = Dx + X
Y' = Dx + Y
B. X' = Dx + X
Y' = Dy + Y
C. X' = Dy + X
Y' = Dy + Y
D. X' = Dx +Y
Y' = Dy + X
61) Which approaches are used for determine whether a particular point is inside or c
outside of polygon
A. Even odd method
B. Winding number method
C. Both a &b
D. None of these
62) The selection and separation of a part of text or image for further operation are D
called as
A. Translation
B. shear
C. Rotation
D. Clipping
8
63) Reflection about the line Y=X is equivalent to ________, followed by an B
anticlockwise rotation 90 ̊.
A. Reflection about y-axis
B. Reflection about x-axis
C. Reflection about origin
D. None of these
64) Two consecutive rotation transformations are always__________. A
A. Additive
B. Subtractive
C. Multiplicative
D. None of these
65) Reflection about the line Y=X is equivalent to ________, followed by a B
anticlockwise rotation 90 ̊.
A. Reflection about y-axis
B. Reflection about x-axis
C. Reflection about origin
D. None of these
66) After performing Y-shear transformation we got A(2,5),B(4,11),C(2,7).If the B
constant value is 2 then original coordinates will be___________.
A. A(2,5),B(4,11),C(2,7)
B. A(2,1),B(4,3),C(2,3)
C. A(4,1),B(10,3),C(4,3)
D. A(5,11),B(3,4),C(3,2)
67) If the resultant object is given along with the set of transformations applied on it, D
then to find the original object we
have to use___________.
A. Affine transformation
B. Reverse transformation
C. Normal transformation
D. Inverse transformation
68) A point (x, y) becomes (-x, y) in__________, transformation. B
A. Reflection at X axis
B. Reflection at Y axis
C. Reflection at origin
D. Reflection about line Y=X
69) In Y-shear transformation point (x,y) becomes_______. C
A. x+yb, xa+y
B. x+yb, y
C. x, xa+y
D. None of these
70) Is shear transformation can be formed by scaling and rotation A
A. TRUE
B. FALSE
C. Not always
D. None of these
9 P.T.O.
71) Cohen Sutherland algorithm is _________ algorithm B
A. Polygon clipping
B. Line clipping
C. Point clipping
D. None of these
72) Cyrus –Back algorithms is ____________ algorithm C
A. Polygon clipping
B. Point clipping
C. Line clipping
D. None of these
73) Which of the following is polygon clipping algorithm C
A. Cohen Sutherland algorithm
B. Cyrus-beck algorithm
C. Sutherland Hodgman algorithm
D. None of these
74) A line with endpoints codes as 0000 and 0100 is? A
A. Partially invisible
B. Completely visible
C. Completely invisible
D. Trivially invisible
75) Some common clipping includes D
A. Curve clipping
B. Polygon clipping
C. Point clipping
D. All of the above
76) The process of mapping a world window in world coordinates system to viewport A
are called
A. Transformation Viewing
B. Viewport
C. Clipping window
D. Screen coordinates system
77) Which approaches are used for determine whether a particular point is inside or C
outside of
A. polygon
B. Even odd method
C. Winding number method
D. Both a &b
E. None of these
10
78) P' = R * P where B
′ cos − sin 0
′ ′
= ′ = sin cos 0 =
1 0 0 1
Such homogeneous transformation is called
A. homogeneous Translation
B. homogeneous Rotation
C. Homogeneous Scaling
D. None of the above
79) Addition transformation are C
A. Shear
B. Reflection
C. both a &b
D. None of the above
80) The rectangle portion of the interface window that defines where the image will A
actually appear are called
A. View port
B. Transformation viewing
C. Clipping window
D. Screen coordinate system
81) Coordinates of window are knows as B
A. Screen coordinates
B. World coordinates
C. Device coordinates
D. Cartesian coordinates
82) For a point to be clipped, which of the following conditions must be satisfied by C
the point?
A. xwmin < x < xwmax
B. xwmin = x = xwmax
C. xwmin > x > xwmax
D. ywmin = y = ywmax
83) Which of the following is NOT a type of clipping algorithm used on the raster D
system?
A. line clipping
B. point clipping
C. area clipping
D. solid clipping
84) For a point to be clipped, which of the following conditions must be satisfied by B
the point?
A. ywmin < y < ywmax
B. ywmin > y > ywmax
C. ywmin = y = ywmax
D. xwmin < x < xwmax
11 P.T.O.
85) Which type of clipping is used to clip character strings? A
A. text clipping
B. line clipping
C. sentence clipping
D. word clipping
86) What is the name of the space in which the image is displayed? B
A. World co-ordinate system
B. Screen co-ordinate system
C. World window
D. Interface window
87) What is the rectangle in the world defining the region that is to be displayed? C
A. World co-ordinate system
B. Screen co-ordinate system
C. World window
D. Interface window
88) The process of mapping a world window in World Coordinates to the Viewport is A
called Viewing transformation.
A. True
B. False
89) By changing the dimensions of the viewport, the _________ and ___________ of C
the objects being displayed can be manipulated.
A. Number of pixels and image quality
B. X co-ordinate and Y co-ordinate
C. Size and proportions
D. All of these
90) Cohen-Sutherland clipping is an example of _________________ C
A. polygon clipping
B. text clipping
C. line clipping
D. curve clipping
91) The Cohen-Sutherland algorithm divides the region into _____ number of spaces. D
A. 8
B. 6
C. 7
D. 9
92) The Cohen–Sutherland algorithm can be only be used on a rectangular clip A
window.
A. True
B. False
93) The 4-bit code of top-left region of the window is ____________ B
A. 1001
B. 1100
C. 0101
D. 1010
12
94) If the logical AND of the endpoint codes is NOT zero, the line can be trivially B
accepted.
A. True
B. False
95) Liang–Barsky algorithm is a __________ clipping algorithm. C
A. circle
B. text
C. line
D. pixel
96) The ideas of the Liang-Barsky algorithm are the same with which algorithm? A
A. Cyrus Beck algorithm
B. Liam-Chopsky algorithm
C. Cohen Sutherland algorithm
D. All have the same
97) The Liang-Barsky algorithm is more efficient than the Cohen Sutherland A
algorithm.
A. True
B. False
98) Which type of arithmetic is used in Liang Barsky algorithm? B
A. simple arithmetic operations
B. floating point arithmetic
C. fixed point arithmetic
D. logarithmic operations
99) . How many edges of the clipping are/is present in 2D? D
A. 1
B. 2
C. 3
D. 4
100)The scale factor of viewport transformation for x co-ordinate is ________ A
A. Sx = (svmax – svmin)/ (swmax – swmin)
B. Sx = (svmax – svmin)/ (swmax + swmin)
C. Sx = (svmin – svmax)/ (swmax – swmin)
D. Sx = (svmax + svmin)/ (swmax – swmin)
**********
13 P.T.O.
Question Bank of ANS
CA 7.1 Design and Analysis of Algorithms(254701)
ou are given a knapsack that can carry a maximum weight of 60. There
e 4 items with weights {20, 30, 40, 70} and values {70, 80, 90, 200}.
hat is the maximum value of the items you can carry using the
apsack? a
160
200
170
90
e 0-1 Knapsack problem can be solved using Greedy algorithm.
True b
False
hen a top-down approach of dynamic programming is applied to a
oblem, it usually _____________
Decreases both, the time complexity and the space complexity b
Decreases the time complexity and increases the space complexity
ncreases the time complexity and decreases the space complexity
ncreases both, the time complexity and the space complexity
hat is a subset sum problem? b
finding a subset of a set that has sum of elements equal to a given
mber
checking for the presence of a subset that has sum of elements equal to
iven number and printing true or false based on the result
inding the sum of elements present in a set
finding the sum of all the subsets of a set
hich of the following is not true about subset sum problem? d
the recursive solution has a time complexity of O(2n)
there is no known solution that takes polynomial time
he recursive solution is slower than dynamic programming solution
the dynamic programming solution has a time complexity of O(n log n)
hich of the following algorithm can be used to solve the Hamiltonian path a
oblem efficiently?
branch and bound
terative improvement
divide and conquer
greedy algorithm
hich of the following is false about Prim’s algorithm? b
It is a greedy algorithm
It constructs MST by selecting edges in increasing order of their weights
t never accepts cycles in the MST
It can be implemented using the Fibonacci heap
oose the correct answer for the followingstatements:
e theory of NP–completeness provides a method of obtaining a polynomial
e for NPalgorithms.
NP-complete problem areNP-Hard. a
is FALSE and II is TRUE
is TRUE and II is FALSE
Both are TRUE
Both are FALSE
e upper bound on the time complexity of the nondeterministic sorting
orithm is
O(n) a
O(n log n)
O(1)
( log n)
cursive algorithms are basedon
Divideand conquer approach
Top-down approach C
Bottom-up approach
Hierarchical approach
w do you determine the cost of a spanningtree?
By the sum of the costs of the edges of the tree
By the sum of the costs of the edges and vertices of the tree a
By the sum of the costs of the vertices of the tree
By the sum of the costs of the edges of the graph
me the node which has been generated but none of its children nodes have
en generated in state space tree of backtrackingmethod.
Dead node b
Live node
-Node
StateNode
w many nodes are there in a full state space tree with n = 6?
5
4 c
3
2
om the following chose the one which belongs to the algorithm paradigm
er than to which others from the following belongsto.
Minimum & Maximum problem.
Knapsack problem b
election problem.
Merge sort.
1 P.T.O.
6) The ability for a system of instructions to simulate a Turing Machine is a)
called _________
a) Turing Completeness
b) Simulation
c) Turing Halting
d) None of the mentioned
7) Which of the problems are unsolvable? c)
a) Halting problem
b) Boolean Satisfiability problem
c) Both (a) and (b)
d) None of the mentioned
8) If d is not defined on the current state and the current tape symbol, then b)
the machine ______
a) does not halts
b) halts
c) goes into loop forever
d) none of the mentioned
9) A language L is said to be ____________ if there is a turing machine M b)
such that L(M)=L and M halts at every point.
a) Turing acceptable
b) decidable
c) undecidable
d) none of the mentioned
10) The language accepted by a turing machine is called ____________ c)
a) Recursive Ennumerable
b) Recursive
c) Both (a) and (b)
d) None of the mentioned
11) Recursive languages are also known as: a)
a) decidable
b) undecidable
c) sometimes decidable
d) none of the mentioned
12) Let G be a grammar: S->AB|e, A->a, B->b a)
Is the given grammar in CNF?
a) Yes
b) No
2
13) Given grammar G: a)
(1)S->AS
(2)S->AAS
(3)A->SA
(4)A->aa
Which of the following productions denies the format of Chomsky
Normal Form?
a) 2,4
b) 1,3
c) 1, 2, 3, 4
d) 2, 3, 4
14) Which of the technique can be used to prove that a language is non b.
regular?
a) Ardens theorem
b) Pumping Lemma
c) Ogden’s Lemma
d) None of the mentioned
15) If L is DFA-regular, L’ is b.
a) Non regular
b) DFA-regular
c) Non-finite
d) None of the mentioned
16) All the regular languages can have one or more of the following d.
descriptions:
i) DFA ii) NFA iii) e-NFA iv) Regular Expressions
Which of the following are correct?
a) i, ii, iv
b) i, ii, iii
c) i, iv
d) i, ii, iii, iv
3 P.T.O.
17) L is a regular Language if and only If the set of __________ classes of a.
IL is finite.
a) Equivalence
b) Reflexive
c) Myhill
d) Nerode
18) According to the rice’s theorem, If P is a non trivial property, Lp is : c.
a) infinite
b) decidable
c) undecidable
d) none of the mentioned
19) Given grammar: b)
S->aA
A->a
A->B
B-> A
B->bb
Which of the following is the production of B after simplification by
removal of unit productions?
a) A
b) bb
c) aA
d) A| bb
20) RR* can be expressed in which of the forms: a.
a) R+
b) R-
c) R+ U R-
d) R
21) Let G be a grammar. When the production in G satisfy certain c)
restrictions, then G is said to be in ___________.
a) restricted form
b) parsed form
c) normal form
d) all of the mentioned
4
22) The number of leaves in a parse tree with expression E*(E) where * a) 5
and () are operators
a) 5
b) 2
c) 4
d) 3
23) A grammar with more than one parse tree is called: b)
a) Unambiguous
b) Ambiguous
c) Regular
d) None of the mentioned
24) If L1 and L2 are regular sets then intersection of these two will be a.
a) Regular
b) Non Regular
c) Recursive
d) Non Recursive
25) Which of the following is false for a grammar G in Chomsky Normal d)
Form:
a) G has no useless symbols
b) G has no unit productions
c) G has no epsilon productions
d) None of the mentioned
26) A CFG is ambiguous if b)
a) It has more than one rightmost derivations
b) It has more than one leftmost derivations
c) No parse tree can be generated for the CFG
d) None of the mentioned
27) A null production can be referred to as: a) String
a) String
b) Symbol
c) Word
d) All of the mentioned
5 P.T.O.
28) Which of the following is incorrect according to rice theorem? c.
Let S be a set of language hat is non trivial:
a) there exists a TM that recognizes the language in S
b) there exists a TM that recognizes the language not in S
c) both (a) and (b)
d) none of the mentioned
29) The format: A->aB refers to which of the following? b)
a) Chomsky Normal Form
b) Greibach Normal Form
c) Backus Naur Form
d) None of the mentioned
30) Which of the production rule can be accepted by Chomsky grammar? d)
a) A->BC
b) A->a
c) S->e
d) All of the mentioned
31) The entity which generate Language is termed as: c.
a) Automata
b) Tokens
c) Grammar
d) Data
32) Which among the following cannot be accepted by a regular grammar? d)
a) L is a set of numbers divisible by 2
b) L is a set of binary complement
c) L is a set of string with odd number of 0
d) L is a set of 0n1n
33) The minimum number of productions required to produce a language c) 5
consisting of palindrome strings over ∑={a,b} is
a) 3
b) 7
c) 5
d) 6
34) Which of the following statement is correct? a
a) All Regular grammar are context free but not vice versa
b) All context free grammar are regular grammar but not vice versa
c) Regular grammar and context free grammar are the same entity
d) None of the mentioned
6
35) Are ambiguous grammar context free? a)
a) Yes
b) No
36) A->aA| a| b b)
The number of steps to form aab:
a) 2
b) 3
c) 4
d) 5
37) Which of the following the given language belongs to? d)
L={ambmcm| m>=1}
a) Context free language
b) Regular language
c) Both (a) and (b)
d) None of the mentioned
38) Which among the following is the correct option for the given a)
grammar?
G->X111|G1,X->X0|00
a) {0a1b|a=2,b=3}
b) {0a1b|a=1,b=5}
c) {0a1b|a=b}
d) More than one of the mentioned is correct
39) A grammar G=(V, T, P, S) is __________ if every production taken one b)
of the two forms:
B->aC
B->a
a) Ambiguous
b) Regular
c) Non Regular
d) None of the mentioned
40) Which of the following statement is false in context of tree a)
terminology?
a) Root with no children is called a leaf
b) A node can have three children
c) Root has no parent
d) Trees are collection of nodes, with a parent child relationship
7 P.T.O.
41) "CFG" stands for _________ b.
a)Context Free Graph
b)Context Free Grammar
c)Context Finite Graph
d)Context Finite Grammar
42) While applying Pumping lemma over a language, we consider a string c)
w that belong to L and fragment it into _________ parts.
a) 2
b) 5
c) 3
d) 6
43) If we select a string w such that w∈L, and w=xyz. Which of the b)
following portions cannot be an empty string?
a) x
b) y
c) z
d) all of the mentioned
44) There exists a language L. We define a string w such that w∈L and a)
w=xyz and |w| >=n for some constant integer n.What can be the
maximum length of the substring xy i.e. |xy|<=?
a) n
b) |y|
c) |x|
d) none of the mentioned
45) Answer in accordance to the third and last statement in pumping d)
lemma:
For all _______ xyiz ∈L
a) i>0
b) i<0
c) i<=0
d) i>=0
46) Let w be a string and fragmented by three variable x, y, and z as per a)
pumping lemma. What does these variables represent?
a) string count
b) string
c) both (a) and (b)
d) none of the mentioned
8
47) Which kind of proof is used to prove the regularity of a language? a.
a) Proof by contradiction
b) Direct proof
c) Proof by induction
d) None of the mentioned
48) A turing machine operates over: b.
a) finite memory tape
b) infinite memory tape
c) depends on the algorithm
d) none of the mentioned
49) The entity which generate Language is termed as: c
a) Automata
b) Tokens
c) Grammar
d) Data
50) Production Rule: aAb->agb belongs to which of the following category? c
a) Regular Language
b) Context free Language
c) Context Sensitive Language
d) Recursively Ennumerable Language
51) The Grammar can be defined as: G=(V, ∑, p, S) b
In the given definition, what does S represents?
a) Accepting State
b) Starting Variable
c) Sensitive Grammar
d) None of these
52) ___________ States are called the halt states. a.
9 P.T.O.
53) Reverse of a DFA can be formed by c)
a) using PDA
b) making final state as non-final
c) making final as starting state and starting state as final state
d) None of the mentioned
54) Concatenation of R with Ф outputs: b)
a) R
b) Ф
c) R.Ф
d) None of the mentioned
55) Simplify the following regular expression: a
ε+1*(011) *(1*(011) *) *
a) (1+011) *
b) (1*(011) *)
c) (1+(011) *) *
d) (1011) *
56) P, O, R be regular expression over ∑, P is not ε, then b
R=Q + RP has a unique solution:
a) Q*P
b) QP*
c) Q*P*
d) (P*O*) *
57) Arden’s theorem is true for: c
a) More than one initial states
b) Null transitions
c) Non-null transitions
d) None of the mentioned
58) The difference between number of states with regular expression (a + b) a
and (a + b) * is:
a) 1
b) 2
c) 3
d) 0
10
59) The PDA is called non-deterministic PDA when there are more than one c.
out going edges from……… state
a)START or READ
b)POP or REJECT
c)READ or POP
d)PUSH or POP
60) Regular Expression denote precisely the ________ of Regular a
Language.
a) Class
b) Power Set
c) Super Set
d) None of the mentioned
61) Relate the following statement: b
Statement: All sufficiently long words in a regular language can have a
middle section of words repeated a number of times to produce a new
word which also lies within the same language.
a) Turing Machine
b) Pumping Lemma
c) Arden’s theorem
d) None of the mentioned
62) Can a DFA recognize a palindrome number? b.
a) Yes
b) No
c) Yes, with input alphabet as ∑*
d) Can’t be determined
63) Which of the following is not an example of finite state machine d.
system?
a) Control Mechanism of an elevator
b) Combinational Locks
c) Traffic Lights
d) Digital Watches
11 P.T.O.
64) Given: b.
L= {xϵ∑= {0,1} |x=0n1n for n>=1}; Can there be a DFA possible for
the language?
a) Yes
b) No
65) The symbols that can’t be replaced by anything are called ---------------- b.
a)Productions
b)Terminals
c)Non-terminals
d)All of above
66) Transition function maps. d.
a) Σ * Q -> Σ
b) Q * Q -> Σ
c) Σ * Σ -> Q
d) Q * Σ -> Q
67) Number of states require to accept string ends with 10. a.
a) 3
b) 2
c) 1
d) can’t be represented.
68) The grammatical rules are often called_____________ a.
a)Productions
b)Terminals
c)Non-terminals
d)None of given
69) The language generated by __________ is called Context Free c.
Language (CFL).
a)FA
b)TG
c)CFG
d)TGT
12
70) The production of the form no terminal → Λ is said to be null a.
production.
a)TRUE
b)FALSE
71) The basic limitation of finite automata is that a.
a) It can’t remember arbitrary large amount of information.
b) It sometimes recognize grammar that are not regular.
c) It sometimes fails to recognize regular grammar.
d) All of the mentioned
72) The productions of the form nonterminal → one nonterminal, is called b.
_________
a)Null production
b)Unit production
c)Null able production
d)None of given
73) Which of the following is a correct statement? a.
a) Moore machine has no accepting states
b) Mealy machine has accepting states
c) We can convert Mealy to Moore but not vice versa
d) All of the mentioned
74) In mealy machine, the O/P depends upon? c.
a) State
b) Previous State
c) State and Input
d) Only Input
75) Which of the given are correct? c.
a) Moore machine has 6-tuples
b) Mealy machine has 6-tuples
c) Both Mealy and Moore has 6-tuples
d) None of the mentioned
76) The major difference between Mealy and Moore machine is about: a.
a) Output Variations
b) Input Variations
c) Both
d) None of the mentioned
13 P.T.O.
77) Mealy and Moore machine can be categorized as: b.
a) Inducers
b) Transducers
c) Turing Machines
d) Linearly Bounder Automata
78) Which one among the following is true? d.
A mealy machine
a) produces a language
b) produces a grammar
c) can be converted to NFA
d) has less circuit delays
79) CNF is stands for c.
a)Context Normal Form
b)Complete Normal Form
c)Chomsky Normal Form
d)Compared Null Form
80) What does the following figure most correctly represents? c.
14
81) Which of the following will not be accepted by the following DFA? a.
a) ababaabaa
b) abbbaa
c) abbbaabb
d) abbaabbaa
82) “One language can be expressed by more than one FA”. This statement a.
is ______
a)True
b)False
c)Sometimes true & sometimes false
d)None of these
83) The part of an FA, where the input string is placed before it is run, is c.
called _______
a)State
b)Transition
c)Input Tape
d)Output Tape
84) Which of the operations are eligible in PDA? a
a) Push
b) Delete
c) Insert
d) Find
15 P.T.O.
85) A string is accepted by a PDA when c.
a) Stack is empty
b) Acceptance state
c) Both (a) and (b)
d) None of the mentioned
86) The following move of a PDA is on the basis of: c.
a) Present state
b) Input Symbol
c) Both (a) and (b)
d) None of the mentioned
87) Which of the following was not a part of Chomsky hierarchy?
a) Context sensitive grammar c.
b) Unrestricted grammar
c) Recursive grammar
d) None of the mentioned
88) Assume the R is a relation on a set A, aRb is partially ordered such that d.
a and b are _____________
a) reflexive
b) transitive
c) symmetric
d) reflexive and transitive
89) Which of the following is a not a part of 5-tuple finite automata? c.
a) Input alphabet
b) Transition function
c) Output Alphabet
d) Initial State
16
92) Myhill Nerode theorem is consisting of the followings,
a)L partitions Σ into distinct classes.
d.
17 P.T.O.
95) To obtain a string of n Terminals from a given Chomsky normal form a.
grammar, the number of productions to be used is:
a. 2n−1
b. 2n
c. n+1
d. n^2
96) A turing machine that is able to simulate other turing machines: b.
a) Nested Turing machines
b) Universal Turing machine
c) Counter machine
d) None of the mentioned
97) Context sensitive language can be recognized by a: d.
a. Finite state machine
b. Deterministic finite automata
c. Non-deterministic finite automata
d. Linear bounded automata
98) The set A={ 0^n 1^n 2^n | n=1, 2, 3, ......... } is an example of a a.
grammar that is:
a. Context sensitive
b. Context free
c. Regular
d. None of the above
99) Which of the following is not a regular expression? b.
a) [(a+b)*-(aa+bb)]*
b) [(0+1)-(0b+a1)*(a+b)]*
c) (01+11+10)*
d) (1+2+0)*(1+2)*
18
100)Following context free grammar a
S —> aB | bA
A —>b | aS | bAA
B —> b | bS | aBB
generates strings of terminals that have
a) equal number of a's and b's
b) odd number of a's and odd number b's
c) even number of a's and even number of b's
d) d. odd number of a's and even number of a's
**********
19 P.T.O.
Question Bank of ANS
1 P.T.O.
A constructive approach in which no commitment is made unless it is necessary to do so
is ___________
8) a) Least commitment approach A
b) Most commitment approach
c) Nonlinear planning
d) Opportunistic planning
What is the extraction of the meaning of utterance?
a) Syntactic
9) b) Semantic B
c) Pragmatic
d) None of the mentione
What is meant by compositional semantics?
a) Determining the meaning
10) b) Logical connectives A
c) Semantics
d) None of the mentioned
What can’t be done in the semantic interpretation?
a) Logical term
11) b) Complete logical sentence C
c) Both Logical term & Complete logical sentence
d) None of the mentioned
which is used to mediate between syntax and semantics?
a) Form
12) b) Intermediate form B
c) Grammer
d) All of the mentioned
What kind of interpretation is done by adding context-dependant information?
a) Semantic
13) b) Syntactic C
c) Pragmatic
d) None of the mentioned
How many issues are available in describing degree of belief?
a) 1
14) b) 2 B
c) 3
d) 4
2
What is used for probability theory sentences?
a) Conditional logic
15) b) Logic C
c) Extension of propositional logic
d) None of the mentioned
Where does the dependance of experience is reflected in prior probability sentences?
a) Syntactic distinction
16) b) Semantic distinction À
c) Both Syntactic & Semantic distinction
d) None of the mentioned
Where does the degree of belief is applied?
a) Propositions
17) b) Literals A
c) Variables
d) Statements
How many formal languages are used for stating propositions?
a) 1
18) b) 2 B
c) 3
d) 4
What is the basic element of a language?
a) Literal
19) b) Variable C
c) Random variable
d) All of the mentioned
Which is the complete specification of the state of the world?
a) Atomic event
20) b) Complex event A
c) Simple event
d) None of the mentioned
Which variable cannot be written in entire distribution as a table?
a) Discrete
21) b) Continuous B
c) Both Discrete & Continuous
d) None of the mentioned
3 P.T.O.
What is meant by probability density function?
a) Probability distributions
22) b) Continuous variable D
c) Discrete variable
d) Probability distributions for Continuous variables
How many terms are required for building a bayes model?
a) 1
23) b) 2 C
c) 3
d) 4
What is needed to make probabilistic systems feasible in the world?
a) Reliability
24) b) Crucial robustness B
c) Feasibility
d) None of the mentioned
What does the bayesian network provides?
a) Complete description of the domain
25) b) Partial description of the domain A
c) Complete description of the problem
d) None of the mentioned
To which does the local structure is associated?
a) Hybrid
26) b) Dependant C
c) Linear
d) None of the mentioned
What is the consequence between a node and its predecessors while creating bayesian
network?
27) a) Functionally dependent C
b) Dependant
c) Conditionally independent
d) Both Conditionally dependant & Dependant
The values of the set membership is represented by ___________
a) Discrete Set
28) b) Degree of truth B
c) Probabilities
d) Both Degree of truth & Probabilities
4
____________ are algorithms that learn from their more complex environments (hence
eco) to generalize, approximate and simplify solution logic.
29) a) Fuzzy Relational DB C
b) Ecorithms
c) Fuzzy Set
d) None of the mentioned
What will take place as the agent observes its interactions with the world?
a) Learning
30) b) Hearing A
c) Perceiving
d) Speech
Which is used for utility functions in game playing algorithm?
a) Linear polynomial
31) b) Weighted polynomial D
c) Polynomial
d) Linear weighted polynomial
What takes input as an object described by a set of attributes?
a) Tree
32) b) Graph D
c) Decision graph
d) Decision tree
How the decision tree reaches its decision?
a) Single test
33) b) Two test C
c) Sequence of test
d) No test
Which algorithm are in more similar to backward chaining algorithm?
a) Depth-first search algorithm
34) b) Breadth-first search algorithm A
c) Hill-climbing search algorithm
d) All of the mentioned
What form of negation does the prolog allows?
a) Negation as failure
35) b) Proposition A
c) Substitution
d) Negation as success
5 P.T.O.
Which is omitted in prolog unification algorithm?
a) Variable check
36) b) Occur check B
c) Proposition check
d) Both Occur & Proposition check
There exists two way to infer using semantic networks in which knowledge is represented
as Frames.
37) 1) Intersection Search A
2) Inheritance Search
a) True
b) False
How many functions are available in the unification and lifting process?
a) 1
38) b) 2 D
c) 3
d) 4
How the buckets are stored in predicate indexing?
a) Lists
39) b) Stack C
c) Hashes
d) None of the mentioned
Rational agent is the one who always does the right thing.
40) a) True A
b) False
What is Artificial intelligence?
a) Putting your intelligence into Computer
41) b) Programming with your own intelligence C
c) Making a Machine intelligent
d) Putting more memory into Computer
Artificial Intelligence has its expansion in the following application.
a) Planning and Scheduling
42) b) Game Playing D
c) Robotics
d) All of the above
6
The characteristics of the computer system capable of thinking, reasoning and learning is
known is
43) a) machine intelligence C
b) human intelligence
c) artificial intelligence
d) virtual intelligence
Which of the following search belongs to totally ordered plan search?
a) Forward state-space search
44) b) Hill-climbing search A
c) Depth-first search
d) Breadth-first search
Which cannot be taken as advantage for totally ordered plan search?
a) Composition
45) b) State search C
c) Problem decomposition
d) None of the mentioned
In which of the following situations might a blind search be acceptable?
a) real-life situation
46) b) complex game C
c) small search space
d) all of the mentioned
Which search method takes less memory?
a) Depth-First Search
47) b) Breadth-First search A
c) Optimal search
d) Linear Search
A heuristic is a way of trying __________
a) To discover something or an idea embedded in a program
48) b) To search and measure how far a node in a search tree seems to be from a goal D
c) To compare two nodes in a search tree to see if one is better than the other is
d) All of the mentioned
Which of the following, is a component of an expert system?
a) inference engine
49) b) knowledge base D
c) user interface
d) all of the mentioned
7 P.T.O.
What is state space?
a) The whole problem
50) b) Your Definition to a problem D
c) Problem you design
d) Representing your problem with variable and parameter
A search algorithm takes _________ as an input and returns ________ as an output.
a) Input, output
51) b) Problem, solution B
c) Solution, problem
d) Parameters, sequence of actions
A problem in a search space is defined by one of these state.
a) Initial state
52) b) Last state A
c) Intermediate state
d) All of the mentioned
The Set of actions for a problem in a state space is formulated by a ___________
a) Intermediate states
53) b) Initial state C
c) Successor function, which takes current action and returns next immediate state
d) None of the mentioned
The process of removing detail from a given state representation is called ______
a) Extraction
54) b) Abstraction B
c) Information Retrieval
d) Mining of data
What are taken into account of state-space search?
a) Postconditions
55) b) Preconditions D
c) Effects
d) Both Preconditions & Effects
Fuzzy Set theory defines fuzzy operators. Choose the fuzzy operators from the following.
a) AND
56) b) OR D
c) NOT
d) All of the mentioned
8
______________ is/are the way/s to represent uncertainty.
a) Fuzzy Logic
57) b) Probability D
c) Entropy
d) All of the mentioned
There exist only two types of quantifiers, Universal Quantification and Existential
58) Quantification. A
a) True
b) False
A _________ is used to demonstrate, on a purely syntactic basis, that one formula is a
logical consequence of another formula)
59) a) Deductive Systems A
b) Inductive Systems
c) Reasoning with Knowledge Based Systems
d) Search Based Systems
First Order Logic is also known as ___________
a) First Order Predicate Calculus
60) b) Quantification Theory D
c) Lower Order Calculus
d) All of the mentioned
Which is used to compute the truth of any sentence?
a) Semantics of propositional logic
61) b) Alpha-beta pruning A
c) First-order logic
d) Both Semantics of propositional logic & Alpha-beta pruning
Which are needed to compute the logical inference algorithm?
a) Logical equivalence
62) b) Validity D
c) Satisfiability
d) All of the mentioned
Which form is called as a conjunction of disjunction of literals?
a) Conjunctive normal form
63) b) Disjunctive normal form A
c) Normal form
d) All of the mentioned
9 P.T.O.
Which is also called single inference rule?
a) Reference
64) b) Resolution B
c) Reform
d) None of the mentioned
What is the condition of literals in variables?
a) Existentially quantified
65) b) Universally quantified B
c) Quantified
d) None of the mentioned
What is meant by factoring?
a) Removal of redundant variable
66) b) Removal of redundant literal B
c) Addition of redundant literal
d) Addition of redundant variable
When the resolution is called as refutation-complete?
a) Sentence is satisfiable
67) b) Sentence is unsatisfiable B
c) Sentence remains the same
d) None of the mentioned
Which closely resembles propositional definite clause?
a) Resolution
68) b) Inference D
c) Conjunction
d) First-order definite clauses
The room temperature is hot. Here the hot (use of linguistic variable is used) can be
represented by _______
69) a) Fuzzy Set A
b) Crisp Set
c) Fuzzy & Crisp Set
d) None of the mentioned
What is the form of Fuzzy logic?
a) Two-valued logic
70) b) Crisp set logic C
c) Many-valued logic
d) Binary set logic
10
How the bayesian network can be used to answer any query?
a) Full distribution
71) b) Joint distribution B
c) Partial distribution
d) All of the mentioned
Where does the bayes rule can be used?
a) Solving queries
72) b) Increasing complexity D
c) Decreasing complexity
d) Answering probabilistic query
Which algorithm takes two sentences and returns a unifier?
a) Inference
73) b) Hill-climbing search D
c) Depth-first search
d) Unify algorithm
Which process makes different logical expression looks identical?
a) Lifting
74) b) Unification B
c) Inference process
d) None of the mentioned
Frames in artificial intelligence is derived from semantic nets.
75) a) True A
b) False
Which of the following elements constitutes the frame structure?
a) Facts or Data
76) b) Procedures and default values A
c) Frame names
d) Frame reference in hierarchy
Semantic Network represents _____________
a) Syntactic relation between concepts
77) b) Semantic relations between concepts B
c) All of the mentioned
d) None of the mentioned
Graph used to represent semantic network is _____________
a) Undirected graph
78) b) Directed graph B
c) Directed Acyclic graph (DAG)
d) Directed complete graph
11 P.T.O.
What are Semantic Networks?
a) A way of representing knowledge
79) b) Data Structure A
c) Data Type
d) None of the mentioned
A Horn clause is a clause with _______ positive literal.
a) At least one
80) b) At most one B
c) None
d) All
Forward chaining systems are _____________ where as backward chaining systems are
___________
81) a) Goal-driven, goal-driven C
b) Goal-driven, data-driven
c) Data-driven, goal-driven
d) Data-driven, data-driven
In a backward chaining system you start with the initial facts, and keep using the rules to
82) draw new conclusions (or take certain actions) given those facts. B
a) True
b) False
Translate the following statement into FOL.
“For every a, if a is a PhD student, then a has a master degree”
83) a) ∀ a PhD(a) -> Master(a) A
b) ∃ a PhD(a) -> Master(a)
c) A is true, B is true
d) A is false, B is false
Which among the following could the Existential instantiation of ∃x Crown(x) ^
OnHead(x, Johnny)?
84) a) Crown(John) ^ OnHead(John, Jonny) A
b) Crown(y) ^ OnHead(y, y, x)
c) Crown(x) ^ OnHead(x, Jonny)
d) None of the mentioned
Which of the following is not the style of inference?
a) Forward Chaining
85) b) Backward Chaining D
c) Resolution Refutation
d) Modus Pones
12
An inference algorithm that derives only entailed sentences is called sound or truth-
86) preserving. A
a) True
b) False
Which is not a property of representation of knowledge?
a) Representational Verification
87) b) Representational Adequacy A
c) Inferential Adequacy
d) Inferential Efficiency
‘α |= β ‘(to mean that the sentence α entails the sentence β) if and only if, in every model
in which α is _____ β is also _____
88) a) True, true A
b) True, false
c) False, true
d) False, false
A) Knowledge base (KB) is consists of set of statements.
B) Inference is deriving a new sentence from the KB)
Choose the correct option.
89) a) A is true, B is true A
b) A is false, B is false
c) A is true, B is false
d) A is false, B is true
What is the term used for describing the judgmental or commonsense part of problem
solving?
90) a) Heuristic A
b) Critical
c) Value based
d) Analytical
What was originally called the "imitation game" by its creator?
a)The Turing Test
91) b)LISP A
c)The Logic Theorist
d)Cybernetics
A)M. turing developed a technique for determining whether a computer could or could
not demonstrate the artificial Intelligence,, Presently, this technique is called
92) a)Turing Test A
b)Algorithm
c)Boolean Algebra
d)Logarithm
13 P.T.O.
How is Fuzzy Logic different from conventional control methods?
a)IF and THEN Approach
93) b)FOR Approach A
c)WHILE Approach
d)DO Approach
Where does the degree of belief are applied?
a)Propositions
94) b)Literals A
c)Variables
d)Statements
Which variable cannot be written in entire distribution as a table?
a)Discrete
95) b)Continuous B
c)Both a & b
d)None of the mentioned
Where does the Bayes rule can be used?
a)Solving queries
96) b)Increasing complexity D
c)Decreasing complexity
d)Answering probabilistic query
What is the process of associating an FOL expression with a phrase?
a)Interpretation
97) b)Augument reality C
c)Semantic interpretation
d)Augument interpretation
What is the major component/components for measuring the performance of problem
solving?
98) a) Completeness D
b) Optimality
c) Time and Space complexity
d) All of the mentioned
A production rule consists of ____________
a) A set of Rule
99) b) A sequence of steps C
c) Set of Rule & sequence of steps
d) Arbitrary representation to problem
14
Which is the best way to go for Game playing problem?
a) Linear approach
100)b) Heuristic approach (Some knowledge is stored) B
c) Random approach
d) An Optimal approach
15 P.T.O.
Question Bank of ANS
A. javax.ejb.NoSuchEntityException B
B. java.ejb.EJBException
C. java.ejb.RemoveException
D. javax.ejb.DuplicateKeyException
C) scan()
D) read()
3) Which JSP block is used define class-wide variables and functions in the
generated class file?
A. scriplets
D
B. expression
C. element
D. declarations
A. date
A
B. request
C. out
D. pagecontext
1 P.T.O.
5) Which of these exceptions is thrown in cases when the file specified for writing is
not found?
A) IOException
C
B) FileException
C) FileNotFoundException
D) FileInputException
6) An Enterprise JavaBeans can be deployed in _______
A. J2EE server
D
B. Weblogic
C. Web sphere
D. All of the above
2
9) Consider the following HTML page code: < html >< body >< a
href='/servlet/HelloServlet' >POST< /a >< /body >< /html > Which method of
HelloServIet will be invoked when the hyperlink is clicked?
A. doGet A
B. doPost
C. doHref
D. servicePost
A. Java.beans.SimpleBeanInfo
B
B. Java.beans.Introspector
C. Java.awt.*
D. None of the above
11) Which of the elements defined within the taglib element of taglib descriptor file are
required
A. uri B
B. jsp-version
C. display-name
D. None
12) Name the element within the tag element that defines the tag class that
implements the functionality of tag
Which element of tag defines the tag class that implements the tag’s functionality?
A. tag D
B. tag-uri
C. tag-name
D. tag-class
3 P.T.O.
13) What does setAutoCommit(false) do?
A. declarations
B
B. scriptlets
C. directives
D. None of the above
16) Which of the following statements are true about locating or using the home
interface of a session bean
4
17) Which of the following statements about Java Threads is correct?
A. sessionRemoved
B
B. sessionDestroyed
C. sessionReCreated
D. sessionReplaced
20) Sites using HTTPS that is HTTP plus SSL(Secure Sockets Layer ) can be identified by
A. There is no way one can detect that site uses HTTPS protocol
B
B. The URL of the website begins with https: instead of http
C. The URL of the website begins with ssl: instead of http
D. The URL of the website begins with shttp
5 P.T.O.
21) An object which implements the interfaces java.rmi.Remote and
java.io.Serializable is being sent as a method parameter from one JVM to
another. How would it be sent by RMI?
22) In the JMS, message producers and message consumers are created by which of
the following objects?
A. Connection Factories D
B. Message Listeners
C. Connections
D. Sessions
6
25) Which of the following statement is false regarding the exceptions in JDBC
26) JDBC-ODBC Bridge does not work with Microsoft J++, because it does not
support
A) Mail Server
B) Applet viewer C
7 P.T.O.
29) Name the class that includes the getSession method that is used to get the
HttpSession object
A. HttpServletRequest A
B. HttpServletResponse
C. SessionContext
D. SessionConfig
30) The EJB timer service is used for timing notifications. It can be used with
31) In JDBC ……… imports all Java classes concerned with database connectivity.
A) javax.sql.*
B) java.mysql.* C
C) java.sql.*
D) com.*
32) Which of the following classes can catch all exceptions which cannot be caught?
A) RuntimeException
B) Error B
C) Exception
D) ParentException
33) How can I use JDBC to create a database?
8
34) JSP embeds in ……… in …………
A) Servlet, HTML
B) HTML, Java D
C) HTML, Servlet
D) Java, HTML
35) Which page directive attribute allows you to take care of possible thread conflicts?
A. session
D
B. extends
C. buffer
D. IsThreadSafe
36) In the Model View Controller architecture of an enterprise application, which of the
following can be 'best suited' as the Controller?
A. Servlets D
B. Java Server Page
C. Session Bean
D. Option 1 and Option 3
A) add()
B) addElement() B
C) AddElement()
D) set()
38) How constructor can be used for a servlet?
A) Initialization
B) Constructor function C
C) Initialization and Constructor function
D) Setup() method
9 P.T.O.
39) What is the difference between servlets and applets?
i. Servlets execute on Server; Applets execute on browser
ii. Servlets have no GUI; Applet has GUI
iii. Servlets creates static web pages; Applets creates dynamic web pages
iv. Servlets can handle only a single request; Applet can handle multiple requests B
A) i, ii, iii are correct
B) i, ii are correct
C) i, iii are correct
D) i, ii, iii, iv are correct
40) The …… and ….. classes are abstract classes that support reading and writing of
byte streams.
A) reader, writer
B
B) inputstream, outputstream
C) objectinputstream, objectoutputstream
D) none
A) Map
B) Enumeration B
C) HashMap
D) Hashtable
42) Which method is used to get three-letter abbreviation for locale’s country in
servlets?
A) Request.getISO3Country()
A
B) Locale.getISO3Country()
C) Response.getISO3Country()
D) Local.retrieveISO3Country()
10
43) Which of the following code retrieves the body of the request as binary data?
A) DataInputStream data = new InputStream()
B) DataInputStream data = response.getInputStream() C
C) DataInputStream data = request.getInputStream()
D) DataInputStream data = request.fetchInputStream()
45) Java support RMI. What does this RMI stand for?
A) Random Memory Interface
B) Remote Method Invocation B
C) Random Method Invocation
D) Remote Memory Interface
46) How is the dynamic interception of requests and responses to transform the
information done?
A) servlet container
D
B) servlet config
C) servlet context
D) servlet filter
A) Stack
B) Hashtable D
C) Vector
D) All of the mentioned
11 P.T.O.
48) Which are the session tracking techniques?
i. URL rewriting
ii. Using session object
iii. Using response object
iv. Using hidden fields
v. Using cookies B
vi. Using servlet object
A) i, ii, iii, vi
B) i, ii, iv, v
C) i, vi, iii, v
D) i, ii, iii, v
12
52) Which of the following leads to high network traffic?
A) URL rewriting
B) Hidden form fields A
C) SSL sessions
D) Cookies
54) Which of these methods is used to insert value and its key?
A) put()
B) set() A
C) insertElement()
D) addElement()
55) Which function is used to do session invalidate?
A) session.discontinue()
B) session.falsify() D
C) session.disconnect()
D) session.invalidate()
56) Which method creates unique fields in the HTML which are not shown to the
user?
A) User authentication
C
B) URL writing
C) HTML Hidden field
D) HTML invisible field
13 P.T.O.
57) Which object is used by spring for authentication?
A) ContextHolder
B) SecurityHolder D
C) AnonymousHolder
D) SecurityContextHolder
58) Which page directive should be used in JSP to generate a PDF page?
A) contentType
B) generatePdf A
C) typePDF
D) contentPDF
59) ------tag must be used to send data from JSP to included JSP.
A) Using <%jsp:page> tag
B) Using <%jsp:useBean> tag D
C) Using <%jsp:import> tag
D) Using <%jsp:param> tag
14
62) Which one is the correct order of phases in JSP life cycle?
A) Initialization, Cleanup, Compilation, Execution
B) Initialization, Compilation, Cleanup, Execution C
C) Compilation, Initialization, Execution, Cleanup
D) Cleanup, Compilation, Initialization, Execution
63) Which JDBC driver Type(s) can be used in either applet or servlet code?
15 P.T.O.
67) Which one of the following is correct for directive in JSP?
A) <%@directive%>
B) <%!directive%> A
C) <%directive%>
D) <%=directive%>
A) HashMap
B) Hashtable D
C) EnumMap
D) Vector
70) A JSP is transformed into a(n):
A) Java applet
B) Java servlet B
C) Either 1 or 2 above
D) Neither 1 nor 2 above
16
72) What programming language(s) or scripting language(s) does Java Server Pages
(JSP) support?
A) VBScript only
C
B) Jscript only
C) Java only
D) All of the above are supported
A) page directive
B) command directive B
C) taglib directive
D) include directive
76) Which of the below is not a javascript framework for UI?
A) Vaadin
B) AngularJS D
C) KendoUI
D) Springcore
17 P.T.O.
77) Which of these is a process of writing the state of an object to a byte stream?
A) Serialization
B) Externalization A
C) File Filtering
D) All of the mentioned
78) Which of these processes occur automatically by the java runtime system?
A) Serialization
B) Garbage collection A
C) File Filtering
D) All of the mentioned
79) DataOutput interface is extended by------------
A) ObjectOutput
B) Externalization A
C) Serializable
D) ObjectInput
80) Which of these is a method of ObjectOutput interface used to finalize the output
state so that any buffers are cleared?
A) clear()
B
B) flush()
C) fflush()
D) close()
81) What servlet processor was developed by Apache Foundation and Sun?
A) Apache Tomcat
B) Apache Web server A
18
82) What type of protocol is HTTP?
A) stateless
B) stateful A
C) transfer protocol
D) information protocol
83) Which of these standard collection classes implements a dynamic array?
A) AbstractList
B) LinkedList C
C) ArrayList
D) AbstractSet
84) Which of these classes can generate an array which can increase and decrease in
size automatically?
A) ArrayList()
A
B) DynamicList()
C) LinkedList()
D) MallocList()
85) How can we take input text from user in HTML page?
A) input tag
B) inoutBufferedReader tag A
C) meta tag
D) scanner tag
86) Which of these methods can be used to increase the capacity of ArrayList object
manually?
A) Capacity()
D
B) increaseCapacity()
C) increasecapacity()
D) ensureCapacity()
19 P.T.O.
87) ---------function of ArrayList class is used to getcurrent size.
A) index()
B) length() C
C) size()
D) capacity()
88) How can we connect to database in a web application?
A) try
B) finally C
C) thrown
D) catch
91) --------keyword need be utilized to monitor an exception.
A) throw
B) finally C
C) try
D) catch
20
92) Which of these keywords must be used to handle the exception thrown by try
block in some rational manner?
A) try
D
B) finally
C) throw
D) catch
93) How are java web applications packaged?
A) jar
B) war D
C) zip
D) both jar and war
94) To manually throw an exception --------keyword is used.
A) throw
B) finally A
C) try
D) catch
95) What is multithreaded programming?
A) Integer
B) Float A
C) double
D) long
21 P.T.O.
97) In the web application, servlet resides in-------
A) client
B) applet D
C) tomcat
D) server
98) How many copies of a JSP page can be in memory at a time?
A) One
B) Two A
C) Three
D) Unlimited
99) What is true about threading?
**********
22
Question Bank of ANS
CA-7.5 ADBMS(254705)
1) In a _______ clustering index, the index record contains the search-key value and a pointer to B
the first data record with that search-key value and the rest of the records will be in the
sequential pointers.
A) SparseB) DenseC) StraightD) Continuous
2) A key that consists of more than one attribute to uniquely identify rows in a table is called A
A) Composite key
B) Candidate key
C) Primary key
D) Foreign key
3) Which one is true about clustered index? B
A) Clustered index is not associated with table
B) Clustered index is built by default on unique key columns
C) Clustered index is not built on unique key columns
D) None of the mentioned
4) When the __________ the backup site takes over processing and becomes the primary. C
A) Secondary fails
B) Backup recovers
C) Primary fails
D) None of the mentioned
5) In hierarchical model, data is organized into C
A) logical structure
B) physical structure
C) tree like structure
D) none of them
6) FDBS stands for_____ A
A) Federated database system
B) Featured database system
C) First database system
D) none of the above
7) D
A heterogeneous distributed database is which of the following?
A) The same DBMS is used at each location and data are not distributed across all nodes.
B) The same DBMS is used at each location and data are distributed across all nodes.
C) A different DBMS is used at each location and data are not distributed across all nodes.
D) A different DBMS is used at each location and data are distributed across all nodes.
1 P.T.O.
8) DDL stands for ________ A
A) data definition language
B) data description language
C) data definition list
D) none of the above
9) WAL stands for _______ B
A) Write After Logging
B) Write Ahead Logging
C) Watch After Logging
D) none of the above
10) The _______operation performs a set union of two “similarly structured” tables A
A) Union
B) Join
C) Product
D) Intersect
11) Using which language can a user request information from a database? A
A) Query
B) Relational
C) Structural
D) Compiler
12) In Oracle, the end of the transaction is recorded in the ……………………….. files. C
A) Data
B) Control
C) Redo Log
D) Password
13) For each attribute of a relation, there is a set of permitted values, called the ________ of that C
attribute.
A) Set
B) Relation
C) Domain
D) Schema
2
15) What is DES ? B
A) Data Entity standard
B) Data Encryption Standard
C) Direct Encryption Standard
D) All of the above
16) Which of the following is /are Security Issues? D
A) Legal and ethical issues B) Policy issues
C) System-related issues D) All of the above
17) Data items grouped together for storage purposes are called a : A
A) record
B) title
C) list
D) string
18) Which of the different ways for handling recovery? D
A) Steal/No-Force (Undo/Redo)
B) Steal/Force (Undo/No-redo)
C) No-Steal/No-Force (Redo/No-undo)
D) All of the above
19) The_____ operation allows the combining of two relations by merging pairs of tuples, one from B
each relation, into a single tuple.
A) Select
B) Join
C) Union
D) Intersection
20) Storage devices like magnetic disk comes under B
A) Volatile storage
B) Non-volatile storage
C) Stable storage
D) Dynamic storage
21) The term _______ is used to refer to a row. C
A) AttributeB) Field C) TupleD) Instance
22) _____________provides enterprise-wide connectivity solutions in distributed, heterogeneous B
computing environments
A) Online new server
B) Oracle Net Services
C) Online Net Solutions
D) none of the above
3 P.T.O.
23) ARIES uses a ___________ to identify log records, and stores it in database pages. B
A) Log sequence number
B) Log number
C) Lock number
D) Sequence
24) An abstraction concept for building composite object from their component object is called : C
A) Specialization
B) Normalization
C) Aggregation
D) Generalization
25) An active database allows users to make the following changes to triggers D
4
31) The disk controller uses ________ at each sector to ensure that the data is not corrupted on data A
retrieval.
A) Checksum
B) Unit drive
C) Read disk
D) Readsum
32) Which one of the following design is both software and hardware independent ? C
A) Logical
B) Physical
C) Conceptual
D) None of the above
33) DML stands for ________
A
A) data manipulation language
B) data mutation language
C) data master list
D) none of the above
34) Remote backup system must be _________ with the primary site. A
A) Synchronised
B) Separated
C) Connected
D) Detached but related
35) The term attribute refers to a ___________ of a table. B
A) Record
B) Column
C) Tuple
D) Key
5 P.T.O.
38) A schema describes : D
A) Record Relationship
B) Data Elements
C) Record and files
D) All of the above
39) In B+ tree the node which points to another node is called D
A) Leaf node
B) External node
C) Final node
D) Internal node
40) _____________ refers to the correctness and completeness of the data in a database? B
A) Data security
B) Data integrity
C) Data constraint
D) Data independence
6
45) Which of following are the properties of entities ? C
A) Groups
B) Table
C) Attributes
D) Switchboards
46) Which one is lowest level data model ? A
A) physical data model
B) logical data model
C) external data model
D) none of the above
47) RAID is __________________ C
A) Redundant Arrays of Inexpensive Display
B) Redundant Arrays of expensive Disks
C) Redundant Arrays of Inexpensive Disks
D) none of the above
48) Course(course_id,sec_id,semester) B
Here the course_id,sec_id and semester are __________ and course is a _________
A) Relations, Attribute
B) Attributes, Relation
C) Tuple, Relation
D) Tuple, Attributes
49) Which of the following is/are Types of multimedia data? D
A) Graphics
B) Image
C) Animation
D) All of the above
50) The database may become unavailable for use due to ______ D
A) Transaction Failure
B) System Failure
C) Media Failure
D) All of the above
7 P.T.O.
51) A hash function must meet ________ criteria. B
A) Two
B) Three
C) Four
D) None of the mentioned
52) In ordered indices the file containing the records is sequentially ordered, a ___________ is an A
index whose search key also defines the sequential order of the file.
A) Clustered index
B) Structured index
C) Unstructured index
D) Nonclustered index
53) In Oracle Database ………………….. Contain the data dictionary and user created data. A
A) Data Files
B) Control Files
C) Redo Log Files
D) Password Files
54) Which of the following is not an advantage of B-Tree Index Files C
A) Lack of redundant storage
B) Some searches are faster
C) Leaf and non-leaf nodes are of different size
D) All of the above
55) An organization comprising a database system usually includes a person called as ____________ B
A) system administrator.B)database administrator
C)office administrator D) oracleadministrator
56) The time to process the remote backup can be reduced by D
A) Flags
B) Breakpoints
C) Redo points
D) Checkpoints
57) Which of the following Problems to be considered in tuning: D
A) How to avoid excessive lock contention?
B) How to minimize overhead of logging and unnecessary dumping of data?
C) How to optimize buffer size and scheduling of processes?
D) All of the above
8
58) The _______ is that part of main memory available for storage of copies of disk blocks. A
A) Buffer
B) Catalog
C) Storage
D) Secondary storage
59) A data model is : C
A) Used to describe structure of a database
B) Set of basic operations on the database
C) Both [A] and [B]
D) None of the above
60) For a transaction to be durable, its changes need to be written to ________ storage. C
A) Volatile storage
B) Non-volatile storage
C) Stable storage
D) Dynamic storage
61) Which of the following Operations can be performed on Files D
A) Open
B) Read
C) Delete
D) All of the above
63) Object which is distinguishable from other objects by specific set of attributes is called as A
___________.
A) Entity
B) None of these
C) Attributes
D) Classes
64) For correct behaviour during recovery, undo and redo operation must be C
A) Commutative
B) Associative
C) Idempotent
D) Distributive
9 P.T.O.
65) If any tampering with the database is suspected, a database _______is performed. A
A) audit
B) Rollback
C) Lock
D) none of the above
66) Which of the following is/are Threats to databases D
A) Loss of integrity
B) Loss of availability
C) Loss of confidentiality
D) All of the above
67) The process of saving information onto secondary storage devices is referred to as C
A) Backing up
B) Restoring
C) Writing
D) Reading
68) Which of the following is not a level of data abstraction? B
A) Physical Level
B) Critical Level
C) Logical Level
D) View Level
69) A data dictionary is a special file that contains? D
A) The names of all fields in all files
B) The data types of all fields in all files
C) The widths of all fields in all files
D) All of the mentioned
70) The ……………………… consists of the memory components of Oracle and various D
background processes.
A) Oracle Parameter
B) Oracle Profile
C) Oracle Process
D) Oracle Instance
71) A logical description of some portion of database that is required by a user to perform task is B
called as
A) System View
B) User View
C) Logical View
D) Data View
10
72) Which of the following is not a Schema? C
A) Database Schema
B) Physical Schema
C) Critical Schema
D) Logical Schema
73) _________enables you to configure Oracle Net Services A
A) Oracle Net Manager
B) Online net manager
C) Both A) and B)
D) none of the above
74) Which of the following is a physical storage media? D
A) Tape Storage
B) Optical Storage
C) Flash memory
D) All of the mentioned
75) A ________ is a pictorial depiction of the schema of a database that shows the relations in the A
database, their attributes, and primary keys and foreign keys.
A) Schema diagram
B) Relational algebra
C) Database diagram
D) Schema flow
76) A relational database consists of a collection of A
A) Tables
B) Fields
C) Records
D) Keys
77) Data Models in DBMS are classified into ______ categories. B
A) 5 B) 3 C) 2 D) 4
78) Which one of the following is not an object-based logical model ? C
A) The binary model
B) The entity-relational model
C) The infological model
D) None of these
79) In a __________ index, an index entry appears for only some of the search-key values. A
A) Dense
B) Sparse
C) Straight
D) Continuous
11 P.T.O.
80) Which of the following is/are type of hashing C
A) Internal Hashing
B) External Hashing
C) Both A) and B)
D) none of the above
81) In magnetic disk ________ stores information on a sector magnetically as reversals of the D
direction of magnetization of the magnetic material.
A) Read–write head
B) Read-assemble head
C) Head–disk assemblies
D) Disk arm
82) _________ is the time from when a read or write request is issued to when data transfer begins. A
A) Access time
B) Average seek time
C) Seek time
D) Rotational latency time
83) Which of the following is /are Countermeasures for DB security? D
A) access control
B) inference control
C) flow control
D) All of the above
84) C
Data about data is normally termed as :
A) directory
B) Data abnk
C) MetaData
D) none of the above
85) What is RBAC in Database Security? A
A) Role-based access control
B) Rule-based access command
C) Role-based active control
D) none of the above
12
86) Database __________ which is the logical design of the database, and the database _______ D
which is a snapshot of the data in the database at a given instant in time.
A) Instance, Schema
B) Relation, Schema
C) Relation, Domain
D) Schema, Instance
13 P.T.O.
93) Collection of information stored in a database at a particular moment is : A
A) view
B) schema
C) instance
D) none of the above
94) Key value pairs is usually seen in A
A) Hash tables
B) Heaps
C) Both Hash tables and Heaps
D) Skip list
95) One of the following is a valid record-based data model : B
A) Object-oriented model
B) Relational model
C) Entity-relationship model
D) None of the above
96) Which of the following is not a type of index D
A) primary index
B) Dense Index
C) Sparse Index
D) High Index
97) Manager’s salary details are hidden from the employee. This is : A
A) Conceptual level data hiding
B) Physical level data hiding
C) External level data hiding
D) None of these
98) A technique for direct search is D
A) Binary Search
B) Linear Search
C) Tree Search
D) Hashing
99) The method in which records are physically stored in a specified order according to a key field A
in each record is
A) Hash
B) Direct.
C) Sequential
D) All of the above.
14
100) The property that uniquely defines each row in a table is called the: C
A) Identifier
B) Index
C) Primary key
D) Symmetric key
**********
15 P.T.O.
Question Bank of ANS
1 P.T.O.
6)
Which from the following represents the correct project cycle?
A) Planning→Initiating→Executing→Closing
B) Planning→Executing→Initiating→Closing C
C) Initiating→Planning→Executing→Closing
D) Initiating→Executing→Planning→Closing
7)
A horizontal bar chart that shows project tasks against a calendar is known as
A) Gantt chart
B) goal A
C) milestone
D) PERT chart
2
12)
In which phase of the project management, scope of the work is defined?
A) Executing C
B) Planning
C) Initiating
D) Closing
13)
How the project work will be carried out, monitored, and controlled? These
questions are answered in which phase of the project management?
A) Initiating B
B) Planning
C) Executing
D) Closing
14) The key way for a project manager to promote optimum team performance in
project teams whose members are not collocated is to—
A) Build trust
A
B) Establish a reward and recognition system
C) Obtain the support of the functional managers in the other locations
D) Exercise his or her right to control all aspects of the project
15)
The review of the successes and the mistakes is normally held during _____ phase.
A) Initiation
B) planning D
C) execution
D) closure
16) The process each manager follows during the life of a project is known as
A) Project Management
B) Manager life cycle C
C) Project Management Life Cycle
D) All of the mentioned
3 P.T.O.
17) Which of the following is/are main parameters that you should use when
computing the costs of a software development project?
A) Travel and training costs
D
B) hardware and software costs
C) effort costs (the costs of paying software engineers and managers)
D) all of the mentioned
18) Quality planning is the process of developing a quality plan for
A) team
B) project manager D
C) customers
D) project
19) Which of the following is not correct about initial phase of a project?
4
22)
What is one of the most important skills a project manager can have?
A) Negotiation skills C
B) Influencing skills
C) Communication skills
D) Problem Solving skills
23)
Which of the following contracts should you use for projects that have a degree of
uncertainty and require a large investment early in the project life cycle?
B
A) Fixed Price
B) Cost Reimbursable
C) lump Sum
D) Unit Price
24)
A Project manager would find team development the most difficult in which form
of organization?
A
A) Weak Matrix Organization
B) Balanced Matrix Organization
C) Projectized Organization
D) Tight Matrix Organization
25) Software systems are likely to be subject to a high degree of ________.
A) Performance
B) Change B
C) Time
D) Strength
26) In case of product-driven projects, the objectives of the project are defined in terms
of ___________.
A) Functional requirements only
C
B) Resource and non-functional requirements
C) Functional and quality requirements
D) Resource requirements only
5 P.T.O.
27) Quality requirements consist of__________.
A) Reliability.
B) Ease of using the system. D
C) Response time.
D) All the above.
28) Which of the following is tabular illustration of the anticipated risks in a project?
A) Time Table
B) Assessment Table C
C) Risk Table
D) Round Table
29) Two team members on your project often disagree. You need a conflict resolution
method that provides a long-term resolution. You decide to use which one of the
following approaches?
A) Confronting
C
B) Problem solving
C) Collaborating
D) Smoothing
30) In order to carry out a successful strategic assessment of a potential project there
should be strategic plan clearly defining the organization's _________.
A) Objectives
A
B) Rules
C) Conditions
D) Ideas
6
31) Which one of the following statements best describes a project?
7 P.T.O.
36) Which of the following is the reason that software is delivered late?
A) Changing customer requirements that are not reflected in schedule changes
B) Technical difficulties that could not have been foreseen in advance D
C) Human difficulties that could not have been foreseen in advance
D) All of the mentioned
37) Which of the following is an activity that distributes estimated effort across the
planned project duration by allocating the effort to specific software engineering
tasks?
A) Software Macroscopic schedule B
B) Software Project scheduling
C) Software Detailed schedule
D) None of the mentioned
38) Every task that is scheduled should be assigned to a specific team member is
termed as
A) Compartmentalization
C
B) Defined milestones
C) Defined responsibilities
D) Defined outcomes
39) The main objective for investing money, time in the event is to increase —
A) Quality
B) Morale C
C) Team performance
D) Individual performance
40) What is a collection of software engineering work tasks, milestones, and
deliverables that must be accomplished to complete a particular project?
A) Task set
A
B) Degree of milestone
C) Adaptation criteria
D) All of the mentioned
41) Ensuring that no more than the allocated numbers of people are allocated at any
given time in Software Scheduling is known as
A) Time Allocation
B
B) Effort Validation
C) Defined Milestone
D) Effort Distribution
8
42) Which of the following is not an adaptation criteria for software projects?
A) Size of the project
B) Customers Complaints B
C) Project staff
D) Mission criticality
43) The primary result of effective team development is—
A) External feedback
B) Collection B
C) Smoothing over of team conflicts by the project manager
D) Performance appraisals
9 P.T.O.
47) The costs that include the salaries and other employment costs of the staff involved
in the development project and all associated costs are____________.
A) Operational cost.
B
B) Development cost.
C) Setup cost
D) Direct cost.
48) Long term or benefits that are considered very difficult to quantify is called
_______.
A) Direct benefits
D
B) Assessable benefits.
C) Indirect benefits.
D) Intangible benefits
49) The availability of staff and experience will be under ___________.
A) Process uncertainty.
B) Product uncertainty. C
C) Resource uncertainty.
D) Profit uncertainty.
50) PERT analysis is based on
A) Deadlines exist.
B) Independent activities. B
C) Too many workers may be required.
D) Costly delay
10
52) The specific work performance in CPM is called as
A) Activity
B) Event A
C) Dummy
D) Contract.
53) The critical path
A) Connector
B) Event D
C) Node
D) All the above.
56) While scheduling a project by CPM
11 P.T.O.
57) An important aim of a post-project review is to:
12
62) A planning phase for an engineering component generated 80 engineering
drawings. The QA team randomly selected 8 drawings for inspection. This
exercise can BEST be described as example of:
A) Inspection
B
B) Statistical Sampling
C) Flowcharting
D) Control Charting
63) Which one of the following is captured in the Work Breakdown Structure (WBS)?
13 P.T.O.
66) During which stage of Risk planning is risks prioritized based on probability and
impact?
A) Identify Risks
C
B) Plan Risk responses
C) Perform Qualitative risk analysis
D) Perform Quantitative risk analysis
67) The objective of ________ is to avoid or minimize the adverse effects of
unforeseen events is called
A) Risk management.
A
B) Risk maintenance.
C) Risk taking.
D) Risky job.
68) ________ = risk likelihood x risk impact.
A) Risk estimate.
B) Risk expenditure. D
C) Risk identification
D) Risk exposure.
69) The impact of some risks can be transferred away from the project by _______.
A) Risk analysis.
B) Risk control. C
C) Risk transfer.
D) Risk evaluation.
70) A ________ is any item or person required for the execution of the project.
A) Risk.
B) Allocation. D
C) Activity.
D) Resource
14
71) Controlling the changes in the project might disturb
A) Project scope
B) Stage cost D
C) The progress of the project
D) All of these
72) Cost schedule of an activity plan is represented as
A) Sequence of steps.
B) Descending steps. A
C) Ascending steps.
D) Reverse steps
73) The process of Control Procurements belongs to
15 P.T.O.
76) Which one of the following statements best defines procurement?
A) A technique to establish the best approach for obtaining the resources for the
project.
B) A group of interrelated resources and activities that transform inputs into
outputs. D
C) The description of the purpose, form and components to support delivery of a
product.
D) The process by which products and services required for the project are
acquired.
77) Which is next step in change control process, once a change has been demanded?
A) Project sponsor.
B) Risk owner. A
C) Steering group
D) Project manager.
80) When a project has completed the handover and closure phase:
16
81) A main aspect of managing a project includes
A) Performance control
D
B) Managing relationships and interfaces
C) Funding management
D) All of these
17 P.T.O.
86)
The tools and techniques used in the process of Plan Procurement Management
includes all but
A) Make-or-buy analysis
C
B) Market Research
C) Bidder Conferences
D) Expert Judgment
87) Following is (are) the tool(s) for changing a process
D) Contract completion
89)
The inputs utilized in the process of Conduct Procurements comprises all
excluding
A) Seller Proposals
B
B) Agreements
18
90)
The component of the project management plan that describes how a project team
will acquire goods and services from outside the performing organization is called
C) Procurement Documents
A) Project manager.
B
B) Program manager.
C) Program coordinator.
D) Project expediter.
93) Two types of change management are
A) Low
B) High A
C) Zero
D) Any of the above
19 P.T.O.
95) A change agent-------
A) Supports change
B) Helps implement change B
C) Initiates change
D) Opposes change
96) The three stages of the change process are:
A) By middle managers
B) After extensive consultation D
C) Bottom up
D) Top down
98) Five dimensions that must be managed on a project
A) Quality
B) Cost D
C) Time
D) All of these
20
100) The probability of completing the project can be estimated based upon the ____.
**********
21 P.T.O.
Question Bank of ANS
5) _________________ is the code mixed with the HTML and asp controls called? a.
a. inline code
b. bar code
c. both 1 & 2
d. both a and b
1 P.T.O.
6) d.
We can manage states in asp.net application using
a. Session Objects
b. Application Objects
c. Viewstate
d. All of the above
7) a.
Attribute must be set on a validator control for the validation to work.
a. ControlToValidate
b. ControlToBind
c. ValidateControl
d. Validate
a. Load
b. Init
c. Import
2
10) c.
File extension used for ASP.NET Page.
a. .Web
b. .ASP
c. .ASPX
d. None of the above
11) d.
How do you get information from a form that is submitted using the "post"
method?
a. Request.QueryString
b. Response.writeln
c. Response.write
d. Request.Form
3 P.T.O.
14) a
Which of the following authentication is best suited for a corporate network?
a. Windows
b. Form
c. User
d. All
15) a.
By default, code written with the Debug class is stripped out of release builds.
a. Yes
b. No
16) b.
The .NET Framework provides a runtime environment called..... ?
a. RMT
b. CLR
c. RCT
d. RC
17) b.
Find the term: The .NET framework which provides automatic memory
management using a technique called ______________ ?
a) Serialization
b) Garbage Collection
c) Assemblies
d) Overriding
4
18) d.
Which of the following denote ways to manage state in an ASP.Net Application?
a. Session objects
b. Application objects
c. ViewState
d. All the Above
19) b.
What is the base class from which all Web forms inherit?
a. Master Page
b. Page Class
c. Session Class
d. None of the Above
5 P.T.O.
22) a.
The type of code found in Code-Behind class is ________ ?
a. Server-side code
b. Client-side code
c. Both A. and B.
d. None of the above
23) b.
To add a custom control to a Web form we have to register with.
a. TagPrefix
b. Name space of the dll that is referenced
c. Assemblyname
d. All of the above
24) Which of the following Session Mode Serialization is not required to store the a.
data?
a. InProc
b. SQLServer
c. StateServer
d. None of the above
25) Syntax for closing and opening the connection in ADO.net is _______________ c.
a) sqlConn.Open() and sqlConn.close()
b) sqlConn.open() and sqlConn.Close()
c) sqlConn.Open() and sqlConn.Close()
d) none of the mentioned
26) __________object is used to fill a DataSet/DataTable with query results in c.
ADO.net.
a) DataReader
b) Dataset
c) DataAdapter
d) DataTables
6
27) a.
Which of these data source controls do not implement Caching?
a. LinqDataSource
b. ObjectDataSource
c. SqlDataSource
d. XmlDataSource
28) b.
How to implement authentication via web.config?
a. Include the authentication element.
b. Include the authorization element.
c. Include the identity element.
d. Include the deny element.
29) In a SQL Statement while working with SqlCommand it returns a single value, at a.
that time .................... method of Command Object will be used.
a. ExecuteScalar
b. ExecuteReader
c. ExecuteNonQuery
d. None of the above
30) d.
Which one of the following namespaces contains the definition for IdbConnection?
a. System.Data.Interfaces
b. System.Data.Common
c. System.Data
d. System.Data.Connection
7 P.T.O.
31) d.
Which one of the following namespaces contains the definition for IdbConnection?
a. System.Data.Interfaces
b. System.Data.Common
c. System.Data
d. System.Data.Connection
32) c.
Select the control which does not have any visible interface.
a. Datalist
b. DropdownList
c. Repeater
d. Datagrid
a. Flexible deployment
b. Cross-platform
c. Command-line tools
d. All of the above
34) b.
What's the difference between Response.Write() andResponse.Output.Write()?
a. Response.Output.Write() allows you to flush output
b. Response.Output.Write() allows you to buffer output
c. Response.Output.Write() allows you to write formatted output
d. Response.Output.Write() allows you to stream output
8
35) Which file contains settings for all .NET application types, such as Windows, b.
Console, ClassLibrary, and Web applications?
a. Web.config
b. Machine.config
c. Global.asax
d. All of the above
36) a.
Which method do you invoke on the Data Adapter control to load your generated
dataset?
a. Fill( )
b. ExecuteQuery( )
c. Read( )
d. None
9 P.T.O.
39) a.
Which of the following can be used to add alternating color scheme in a Repeater
control?
a. AlternatingItemTemplate
b. DataSource
c. ColorValidator
d. None of the Above
40) a.
Suppose one wants to modify a SOAP message in a SOAP extension then how this
can be achieved. Choose the correct option from below:
a. One must override the method ReceiveMessage
b. One must override the method InitializeMethod
c. Both A. and B.
d. One must override the method ProcessMessage
41) d.
How many classes can a single .NET DLL contain?
a. One
b. Two
c. None
d. Many
10
43) b.
Which of the following allow writing formatted output?
a. Response.Write()
b. Response.Output.Write()
c. Both A. and B.
d. None of the Above
44) What property contains the actual error message returned by SQL Server? d.
1. SqlException.Source
2. SqlException.Message
3. SqlError.Class
4. SqlError.Message
a. 1, 2
b. 1, 2, 3
c. 1, 3
d. 2, 4
45) c.
In ASP.NET the < authorization > section contain which of the following
elements?
a. < deny >
b. < allow >
c. Both A. and B.
d. None of the Above
11 P.T.O.
46) a.
In .NET the operation of reading metadata and using its contents is known as
______?
a. Reflection
b. Enumeration
c. Binding
d. Serialization
49) b.
What attributes do you use to hide a public .Net class from COM?
a. DLLImport Attributes
b. ComVisible attributes
c. COM Interop
d. All
12
50) What datatype is returned when calling the ExecuteScalar method of a command b.
object?
a. System.Int32
b. Object
c. No. of effected records
d. None of the above
51) Which of the following constitutes the .NET Framework? b.
ASP.NET Applications
CLR
Framework Class Library
WinForm Applications
Windows Services
a. 1, 2
b. 2, 3
c. 3, 4
d. 2, 5
13 P.T.O.
53) Which control is required of every AJAX page to manage the JavaScript files sent b.
to the client and the communication between client and server?
a. UpdatePanel
b. ScriptManager
c. AsyncPostBackTrigger
d. None of the above.
54) Which control can be used to update only the portion of the page? a.
a. UpdatePanel
b. ScriptManager
c. AsyncPostBackTrigger
d. None of the above.
55) Which protocol is used to transfer files frtom localhost to remote host? b.
a. HTTP
b. FTP
c. TCP
d. UDP
56) Which of the following directive is used to link an assembly to a page or user c.
control?
a. @Page
b. @Import
c. @Assembly
d. @Reference
57) If you want that command object should returns XML data then which method of c.
Command Object will be used?
a. getXMLData
b. getXML
c. ExecuteXMLReader
d. None of the above.
14
58) The method applied to change the styles of the elements in a ASP.NET webpage c.
is called
a. master page
b. child page
c. cascading style sheets
d. UTF-8
59) Which of the following web server control display static text that can change at c.
runtime?
a. Hyperlink
b. Textbox
c. Label
d. None of these above
61) Which of the following server control shows data in a tabular format and allows b.
sorting, paging, edit, delete each record?
a. ListBox
b. GridView
c. Repeater
d. None of these above
62) Which of the following webserver control used as container for other server b.
controls in a ASP.NET webpage?
a. PlaceHolder
b. Panel
c. Table
d. ImageMap
15 P.T.O.
63) By using which of the following web server control data can be retrieved from a b.
relational database?
a. ObjectDataSource
b. SqlDataSource
c. AccessDataSource
d. XmlDataSource
66) Which of the following validation control is used to ensure that an user does not a.
skip a form entity field?
a. RequiredFieldValidator
b. CompareValidator
c. RangeValidator
d. RegularExpressionValidator
67) Which type of validation is used to check an email address entered by the user is d.
matches to email pattern?
a. RangeValidator
b. CustomValidator
c. ValidationSummary
d. RegularExpressionValidator
16
68) Using CustomValidator server control c.
a. a developer can compell users to fill all the required fields
b. a developer can sreate pop up menu
c. a developer can write custom validation function as needed
d. none of these above
70) Which commands are used to specify settings of an .aspx file? b.s
a. Class
b. Directives
c. Events
d. Validation
71) Choose the correct option about Master Page and Theme. d.
a. A Master Page enables you to share content across multiple pages in a website
and A Theme enables you to control the appearance of the content.
b. Theme enables you to share content across multiple pages in a website and A
Master Page enables you to control the appearance of the content.
c. App_Themes folder contains skin files.
d. Option A and C are correct.
17 P.T.O.
73) At which level Theme can be applied? d.
a. Page level
b. Site level (through the Web.config file)
c. Individual control level
d. All of the above.
81) If you want to access a web service method, which attribute it must have? a.
a. [WebMethod]
b. [PageMetod]
c. [Web.Service]
d. [WebSupport]
19 P.T.O.
85) In which Event you can set the value of a Theme? d.
a. Page_Load
b. Page_Render
c. Page_PreRender
d. Page_PreInit
86) If you are using Webparts in your web page then which control is necessary? b.
a. WebpartController
b. WebPartmanager
c. WebpartZone
d. None of the above
87) ______________ is the DataType return in IsPostback property. b.
a. bit
b. boolean
c. int
d. object
89) If you must use a user name and password to connect to a database, where should b
you store the sensitive information?
a. Compiled in the application
b. In an encrypted application configuration file
c. In a resource file deployed with the application
d. In the registry
90) Which of the following is the default authentication mode for IIS? a.
a. Anonymous
b. Windows
c. Basic Authentication
d. None
20
91) If any user has disabled cookies in their browsers, what can you do to enable them c.
to use forms authentication?
a. Set BoweserCookieEnabled=true;
b. Set cookieless=true;
c. Use the AutoDetect setting of the cookieless attribute.
d. None of the above.
94) What are the types of Web Server Button Controls that can be created? c.
a. Only Submit buttons
b. Only Command buttons
c. Submit and command buttons
d. None of the above.
95) What is the name of the Page object’s property that determines if a Web page is d.
being requested without data being submitted to server?
a. IsCallback
b. IsReusable
c. IsValid
d. IsPostBack
21 P.T.O.
96) ______________ is the DataType return in IsPostback property. b.
a. bit
b. boolean
c. int
d. object
97) If you are using user control in ASP.NET page which directory will be used? a.
a. Register
b. Assembly
c. Implements
d. Aspx
98) Debug class is available in which namespace? c.
a. System.Debug
b. System.Data
c. System.Diagnostics
d. None of the above
100) Which SqlCommand execution returns the number of effected records in the a.
table?
a. ExecuteNonQuery
b. ExecuteReader
c. ExecuteXmlReader
d. ExecuteScalar
**********
22
Question Bank of
ANS
CA-8.3 Network Programming (254803)
What is Concurrent server?
a. Handle one request at a time
1) b. Handle multiple request at a time b
c. Not handle any request
d. None of the above
Abbreviate SMTP
a. Simple Mail Transport Protocol
2) b. Single Mail Transfer Protocol c
c. Simple Mail Transfer Protocol
d. Single Mail Transport Protocol
In specific, if the systems use separate protocols, which one of the following devices is
used to link two systems?
a. Repeater b
3)
b. Gateway
c. Bridge
d. Hub
Which of the following system call is used for opening a file?
a) read
4) b) write c
c) open
d) close
Which of the following is/are the components of sendmail?
A. Mail user agent(MUA)
5) B. Mail transfer agent(MTA) d
C. Mail delivery agent(MDA)
D. All of the above
What is User Agents in SMTP
a. It acts as a Mail Box
6) b. It prepares the message, encloses it in an envelope b
c. It transfers the mail across the internet
d. It sends and receives the message
Find the following call never returns an error?
7) a) open b) fork d
c) ioctl d) getpid
For reading input, which of the following system call is used?
8) a) write b) rd c
c) read d) change
Which of the following are not system calls?
a. close
9) b. getc b
c. bind
d. connect
1 P.T.O.
Which of the following mode is used for opening a file in both reading and writing?
a) O_RDONLY
10) b) O_WRONLY c
c) O_RDWR
d) O_WDR
Open system call returns the file descriptor as ___
a) int
11) b) float d
c) double
d) char
IPv6 has _______ -bit
a. 32
12) b.64 c
c.128
d. variable
DHCP is the abbreviation of
a. Dynamic Host Configuration Protocol
13) b. Dynamic Host Control Protocol a
c. Dynamic Hyper Control Protocol
d. Dynamic Hyper Configuration Protocol
............ is limited to 7-bit ASCII text, with a maximum line length of 1000 characters.
A. SMTP
14) B. MIME a
C. POP
D. MTA
Can a multi-user chat application be developed using UDP protocol?
15) a. Yes a
b. No
Which of the following class does not provide getInputStream() method?
a. Socket
16) b.DatagramSocket b
c. URLConnection
d. None of the above
Which of the following object is required at both ends for TCP/IP based
communication?
a. InetAddress d
17)
b. ServerSocket
c. DatagramSocket
d. Socket
How many versions available of IP?
a. 6 version
18) b. 4 version c
c. 2 version
d. 1 version
2
Which is the type of socket?
a. Datagram
19) b. Stream d
c. Raw
d. All the above
Who provide us internet?
a. TCP
20) b. HTTP c
c. ISP
d. FTP
DNS is an acronym for ______________.
(a) Domain Name Security
21) (b) Domain Number System d
(c) Document Name System
(d) Domain Name System
What is a Zone in DNS?
a. A set of distinct but non-contiguous portions of the domain name space managed by
multiple administrators
b. A distinct, contiguous portion of the domain name space managed by multiple
22) administrators d
c. A set of distinct but non-contiguous portions of the domain name space managed by a
single administrator
d. A distinct, contiguous portion of the domain name space managed by a single
administrator
The applications of the Client and Server Model are
23) a.World Wide Web b.Network Printing d
c.Email d.All of the above
In a_____________name space, each name is made of several parts.
a. Flat
24) b. Organized c
c. Hierarchical
d. None of the above
A_________________is a subtree of domain name space.
a. Label
25) b. Domain b
c. Name
d. None of the above
_____________________is a technology that creates and handle dynamic document.
a. CGI
26) b. GIC a
c. HTPP
d. WWW
3 P.T.O.
TCP process may not write and read data at the same speed. So we need __________
for storage.
a) Packets b
27)
b) Buffers
c) Segments
d) Stacks
To achieve reliable transport in TCP, ___________ is used to check the safe and
sound arrival of data.
a) Packet d
28)
b) Buffer
c) Segment
d) Acknowledgment
What is the size of MAC Address?
a. 16-bits
29) b. 32-bits c
C. 48-bits
d. 64-bits
…………………….. is responsible for converting the higher level protocol addresses
(IP addresses) to physical network addresses.
a) Address Resolution Protocol (ARP) a
30)
b) Reverse Address Resolution Protocol (RARP)
c) Bootstrap Protocol (BOOTP)
d) Internet Control Message Protocol (ICMP)
If exec is called immediately after forking,
a) The program specified in the parameter to exec will replace the entire process
31) b All the threads will be duplicated a
c) All the threads may be duplicated
d) None of the mentioned
Which of the following services use TCP?
DHCP
SMTP
HTTP
TFTP
32) FTP b
a. 1 and 2
b. 2, 3 and 5
c. 1, 2 and 4
d. 1, 3 and 4
4
You want to implement a mechanism that automates the IP configuration, including
IP address, subnet mask, default gateway, and DNS information. Which protocol will
you use to accomplish this?
33) a. SMTP d
b. SNMP
c. ARP
d. DHCP
Which of the following is private IP address?
a. 12.0.0.1
34) b. 168.172.19.39 d
c. 172.15.14.36
d. 192.168.24.43
Which of the following allows a router to respond to an ARP request that is intended
for a remote host?
a. Gateway DP c
35)
b. Reverse ARP (RARP)
c. Proxy ARP
d. Inverse ARP (IARP)
Which class of IP address provides a maximum of only 254 host addresses per
network ID?
a. Class A b
36)
b. Class C
c. Class B
d. Class D
What is the address range of a Class B network address in binary?
A. 01xxxxxx
37) B. 0xxxxxxx c
C. 10xxxxxx
D. 110xxxxx
Return value of the UDP port “Chargen” is _______
a) String of characters
38) b) String of integers a
c) Array of characters with integers
d) Array of zero’s and one’s
Which of the following is not a mechanism that DHCP supports for IP address
allocation?
a) Automatic allocation b
39)
b) Static allocation
c) Dynamic allocation
d) Manual allocation
The name of the protocol which provides virtual terminal in TCP/IP model is.
a) FTP
40) b) SMTP d
c) HTTP
d) Telnet
5 P.T.O.
In a/an ............ of DNS resolver, the queried name server can return the best answer it
currently has back to the DNS resolver.
a. Recursive queries b
41)
b. Iterative queries
c. Reverse queries
d. Inverse queries
Central Computer which is powerful than other computers in the network is called
as __________. b
42)
a.Client b.Server
c.Hub d.Switch
Machine that places the request to access the data is generally called as __________.
43) a. Server Machine b. Client Machine b
c. Request Machine d. None of the above
File transfer protocol (FTP) is built on _________architecture
44) a.Peer to peer b.Client server b
c.Both a and b d.None of the above
The first line of HTTP request message is called ____.
45) a.Request line b.Header line a
c.Status line d.Entery line
The main reason for transition from IPv4 to IPv6 is _________
a) Huge number of systems on the internet
46) b) Very low number of system on the internet a
c) Providing standard address
d) To provide faster internet
RPC is a _________
a) asynchronous operation
47) b) synchronous operation b
c) time independent operation
d) channel specific operation
Which of the following protocols is used for WWW ?
A. ftp
48) B. http b
C. w3
D. all of the above
RPC (remote procedure call) is used to
a.Establish a server on remote machine that can respond to queries
49) b.Retrieve information by calling a query c
c.Both a and b
d.None of the above
The WWW today is a _______ client-server service, in which a client using a browser
can access a service using a server. c
50)
a.Limited b.Vast
c.Distributed d.None of the above
6
In remote procedure call, the client program must be bound with a small library
procedure called ................... d
51)
a.Server stub b.Marshalling
c.Client hub d.Client stub
Which of the following is an example of a client-server model?
52) a.FTP b.DNS d
c.TELNET d.All of the above
Which 2 protocols are used in the Transport layer of the TCP/IP model?
53) a) UDP and HTTP b) TCP and UDP b
c) HTTP and TCP d) ICMP and HTTP
Which of the protocol is not used in the network layer of the TCP/IP model?
54) a) ICMP b) IP d
c) IGMP d) HTTP
Which of the following allows a router to respond to an ARP request that is intended
for a remote host? c
55)
a.Gateway DP b. ReverseARP (RARP)
b.Proxy ARP d.Inverse ARP (IARP)
Which class of IP address provides a maximum of only 254 host addresses per
network ID? c
56)
a. Class A b. Class B
c. Class C d. Class D
If you use either Telnet or FTP, which is the highest layer you are using to transmit
data? d
57)
a. Transport b.Presentation
c.Session d. Application
Which of the following protocols uses both TCP and UDP?
58) a.FTP b.SMTP d
c.Telnet d.DNS
What layer in the TCP/IP stack is equivalent to the Transport layer of the OSI
model? b
59)
a) Application b) Host to host
c) Internet d) Network Access
Which of the following is not the layer of TCP/IP protocol?
60) a. Physical layer b. link layer b
c. network layer d. transport layer.
To use the services of UDP, we need ……… socket addresses.
61) a. four b. two b
c. three d. four
………. is responsible for converting the higher-level protocol address (IP addresses)
to physical network addresses.
a. Internet Protocol(IP) c
62)
b. Internet Control Message Protocol(ICMP)
c. Address Resolution Protocol(ARP)
d. Bootstrap Protocol(BOOTP)
7 P.T.O.
Remote Procedure Calls are used ____________
a) for communication between two processes remotely different from each other on the
same system c
63)
b) for communication between two processes on the same system
c) for communication between two processes on separate systems
d) none of the mentioned
To differentiate the many network services a system supports ______ are used.
64) a) Variables b) Sockets c
c) Ports d) Service names
What is stub?
a) transmits the message to the server where the server side stub receives the message and
invokes procedure on the server side d
65)
b) packs the parameters into a form transmittable over the network
c) locates the port on the server
d) all of the mentioned
A remote procedure call is _______
a) inter-process communication
66) b) a single process a
c) a single thread
d) a single stream
Which of these packages contains classes and interfaces for networking?
67) a) java.io b) java.util c
c) java.net d) java.network
NFS is……..
a) Filesystems
68) b) Operating systems d
c) Transport protocols
d) File access protocols
NFS stands for….
a) Null File System
69) b) New File System c
c) Network File System
d) Netware File Server
A _________ directory is mounted over a directory of a _______ file system.
a) local, remote
70) b) remote, local d
c) local, local
d) none of the mentioned
The _________ becomes the name of the root of the newly mounted directory.
71) a) root of the previous directory b) local directory b
c) remote directory itself d) none of the mentioned
Application layer sends & receives data for particular applications using Hyper Text
Transfer Protocol (HTTP), and Simple Mail Transfer Protocol (SMTP). a
72)
a) True
b) False
8
Which class is given wrong here ?
a. CLASS A = 1 to 126
b. CLASS B = 128 to 191 c
73)
c. CLASS C = 192 to 220
d. CLASS D = 224 to 239 (Multicasting)
9 P.T.O.
Which is true for TCP connections?
A. TCP connection is a message stream, but it does not preserve message boundaries
B. TCP connection is byte stream and it preserves message boundaries c
83) C. TCP connection is byte stream and it does not preserve message boundaries
D. TCP connection is message stream which preserves message boundaries
10
______________ Protocol defines how messages are formatted and transmitted, and
what actions Web servers and browsers should take in response to various
commands.
90) (a) FTP c
(b) TCP/IP
(c) HTTP
(d) SMTP
What is User Agents in SMTP
a. It acts as a Mail Box
91) b. It prepares the message, encloses it in an envelope b
c. It transfers the mail across the internet
d. It sends and receives the message
The term IPv4 stands for?
a. Internet Protocol Version 4
92) b. Internet Programming Version 4 a
c. International Programming Version 4
d. None of these
An RPC (remote procedure call) is initiated by the
93) a.Server b. Both (a) and (b) c
c.Client d.None of the mentioned
Which software prevents the external access to a system?
a. Firewall
94) b. Gateway a
c. Router
d. Virus checker
An RPC application requires
a.Specific protocol for client server communication
95) b.A client program d
c.A server program
d.All of the above
The number of layers in ISO OSI reference model is __________
a. 5
96) b. 7 b
c. 6
d. 10
The length of an IPv6 address is?
a. 32 bits
97) b. 64 bits d
c. 128 bits
d. 256 bits
What is the default port of SMTP?
98) a. 85 b. 70 c
c. 25 d. 50
11 P.T.O.
When the mail server sends mail to other mail servers it becomes ___ ?
a. SMTP client
99) b. SMTP server a
c. Peer
d. Master
In a …………………, the kernel can execute on any processor, and typically each
processor does self-scheduling from the pool of available processes or threads.
a) master/slave a
100)
b) symmetric multiprocessor
c) cluster
d) SIMD
12
Question Bank of A
CA 8 .4 Advanced Computer Graphics(254804) N
S
1) Which of the following is the Computer Graphics application- d
a. Statistical Representation
b. Image Formation
c. Information Retrieval
d. Computation Physics
2) Hardwar pipeline consists of __________phase. c
a. Circuits
b. Ports
c. Computations
d. Discs
3) Which of the following is computational Phase- a
a. Rasterization
b. Vectorization
c. Segmentation
d. Transition
4) The quality of Image depends on – a
a. No. of Pixels used by image
b. No. of lines used by image
c. No. of resolution used by image
d. None of these
5) Types of Computer Graphics are- b
a. Scalar and raster
b. Vector and raster
c. Vector and scalar
d. None of these
6) Components of iterative computer graphics are d
a. A light pen
b. Display unit
c. Bank of switches
d. All of the above
7) Computer Graphics models are commonly used for making- d
a. Television show
b. Motion Pictures
c. Music Videos
d. All of the above
1 P.T.O.
8) Graphics programs are those which creates- b
a. Images
b. Pictures
c. Designs
d. All of the above
9) The process of determining the appropriate pixels for representing picture or b
graphics object is known as
a. animation
b. Rasterization
c. Both a & b
d. representation
10) A World- coordinate area selected for display is called is b
a. Graphics
b. Window
c. GUI
d. None of the above
11) Solid pattern in random scan display is _________ to fill b
a. Easy
b. Difficult
c. Not fill
d. None of the above
12) In beam penetration method of color CRT, two layer phosphor coated are- a
a. Red and blue
b. Red and green
c. Blue and green
d. None of the above
13) LCD is an _____ b
a. Emissive
b. Non Emissive
c. Expensive
d. None
14) A technique by which the vertical and/or horizontal scan frequency of video a
signal can be changed for Different purpose and application is called
a. scan conversion
b. Polygon filling
c. Two dimensional graphics
d. Antialiasing
15) DSVT stands for c
a. Digital View Storing Table
b. Digital Visual Storage Tube
c. Direct View Storage Tube
d. Digital View Storage Tube
2 P.T.O.
16) Sequencing and display of a set of images to create a visual change effect is a
called
a. Computer animation
b. Computer graphics
c. Computer Videography
d. Computer image terminals
17) Which of the following are Computer graphics coordinates systems – c
a. Two Dimensional Co-ordinates System
b. Three Dimensional Co-ordinates System
c. Both a and b
d. None of the above
18) Each image used in sequence by video is said to be c
a. Entity
b. Instance
c. Frame
d. Block
19) Line consists of how many number of coordinates c
a. 2
b. 3
c. 4
d. None
20) Which is reflection about origin b
a. x' = x , y' = -y
b. x' = -x , y' = -y
c. x' = x , y' = y
d. x' = -x , y' = y
21) “The boundary is specified in a single color, and the algorithm proceeds pixel by b
pixel until the boundary color is encountered “- These statement defines which of
the following algorithm
a. Scan-fill algorithm
b. Boundary-fill algorithm
c. Entire fill algorithm
d. Slide curve algorithm
22) The Process of colouring the area of polygon is called b
a. Polygon flow
b. Polygon filling
c. Aliasing
d. None of these
3 P.T.O.
23) Moving, Resizing ,changing direction of an object refer as d
a. Translation
b. Rotation
c. Scaling
d. Transformation
24) Consider point (x,y), moving the point to(x’,y’) by adding some value dx,dy is a
called
a. Translation
b. Rotation
c. Scaling
d. None
25) Consider point (x,y ),rotating point about origin by angle theta is called as b
a. Translation
b. Rotation
c. Scaling
d. None
26) Which is reflection about x-axis b
a. x' = x , y' = -y
b. x' = -x , y' = -y
c. x' = x , y' = y
d. x' = -x , y' = y
4 P.T.O.
30) which of the following is/are line clipping algorithm c
a. Cohen sutherland algorithm
b. Cyrus-beck algorithm
c. Both a & b
d. None of these
31) Cohen Sutherland algorithm is _________ algorithm b
a. Polygon clipping
b. Line clipping
c. Point clipping
d. None of these
32) Cyrus –Back algorithms is ____________ algorithm c
a. Polygon clipping
b. Point clipping
c. Line clipping
d. None of these
33) A line with endpoints codes as 0000 and 0100 is ? a
a. Partially invisible
b. Completely visible
c. Completely invisible
d. Trivially invisible
34) Some common clipping includes d
a. Curve clipping
b. Polygon clipping
c. Point clipping
d. All of the above
35) The process of mapping a world window in world coordinates system to a
viewport are called
a. Trasformation Viewing
b. Viewport
c. Clipping window
d. Screen coordinates system
36) Which approaches are used for determine whether a particular point is inside or c
outside of polygon
a. Even odd method
b. Winding number method
c. Both a &b
d. None of these
5 P.T.O.
37) The selection and separation of a part of text or image for further operation are d
called as
a. Translation
b. shear
c. Rotation
d. Clipping
38) All the hidden surface algorithms employees image space approach except d
a. Depth sort method
b. Scan line method
c. Depth buffer method
d. Back face removal
39) The first viewing parameter we Must consider is the? b
a. view reference plane
b. view reference point
c. viewing window
d. Shifting vector
40) Region code of point within the window is a
a. 0000
b. 0001
c. 1000
d. 1111
41) The _____________ algorithms divide 2D space into 9 regions of which only the a
middle parts(viewport) is visible.
a. Cohen Sutherland algorithm
b. liangBarsky
c. SutherlangHodgman
d. None of these
42) A Bezier curve is a polynomial of degree ___________the no of control points b
used
a. One more than
b. One less than
c. Two less than
d. None of these
43) Bezier spline always passes through a
a. First and second control point
b. Does not pass from First and second control point
c. Both a & b
d. None of these
6 P.T.O.
44) The Bezier curve obtained from the four control points is called a b
a. Square Bezier curve
b. Cubic Bezier curve
c. Hectare Bezier curve
d. Rectangle Bezier curve
45) The orthographic projection that show more than one side of an object are called b
a. Axonometric projection
b. Isometric projection
c. Both a & b
d. None of these
46) The projection that can be viewed as the projection that has a centre of projection b
at a finite distance from the plane of projection are called
a. Parallel projection
b. Perspective projection
c. Isometric projection
d. None of these
47) The shape of a Bezier curve primarily depends upon the a
a. Position of control points
b. Distance of control points
c. Position of control panel
d. None of these
48) The no of control points in a Bezier curve ensures the b
a. Jaggies of curve
b. Smoothness of curve
c. Straightness of curve
d. None of these
49) What is Shearing is also termed as a
a. Skewing
b. Translating
c. Moving
d. None of the above
50) The method which is based on the principle of checking the visibility point at b
each pixel position on the projection plane are called
a. Object-space methods
b. Image-space methods
c. Both a & b
d. None of these
7 P.T.O.
51) Which surface algorithm is based on perspective depth ? b
a. Depth comparison
b. Z-buffer or depth-buffer algorithm
c. subdivision method
d. back-face removal
52) A fast and simple method for rendering an object with polygon surface is c
a. Constant-intensity shading
b. Flat shading
c. Both a & b
d. None of these
53) Which one is not the neighbour of a pixel (x,y) in 4 -connected method ? d
a. (x,y+1)
b. (x+1,y+1)
c. (x,y-1)
d. none of these
54) Various curve functions are useful in ________________________. a
a. Object modeling
b. Graphics applications
c. Animation path specifications
d. All of the given
55) The best hidden surface removal algorithm is ? c
a. Depth buffer
b. Area subdivision
c. Depends on the application
d. painters
56) Engineering drawing commonly applies ? a
a. orthographic projection
b. oblique projection
c. perspective projection
d. none of the above
57) Back face removal is an example of ? c
a. combination of both
b. image space method
c. object space method
d. none of the above
58) Oblique projection with an angle of 45 degree to the horizontal plane is called as b
a. Cabinet projection
b. Cavalier projection
c. Isometric projection
d. None of these
8 P.T.O.
59) A transformation that slants the shape of objects is called the_____________ b
a. reflection
b. shear transformation
c. translation
d. none of these
60) The region code of a point is 1001. The point is in the .................region of b
window.
a. Top right
b. Top left
c. Bottom left
d. Bottom right
61) The equation for describing surface of 3D plane are a
a. Ax+ By+ Cz+ D= 0
b. Ax+ By+ Cz = 0
c. Ax+ By+ D= 0
d. Ax+ By+ Cz+ D= 1
62) The Bezier curve obtained from the four control points is called a b
a. Square Bezier curve
b. Cubic Bezier curve
c. Hectare Bezier curve
d. Rectangle Bezier curve
63) The shape of a Bezier curve primarily depends upon the a
a. Position of control points
b. Distance of control points
c. Position of control panel
d. None of these
64) More the control points of a Bezier curve,________ quality of the curve a
a. Higher
b. Lower
c. Bad
d. None of these
65) ______is a flexible strip that is used to produce smooth curve using a set of point a
a. Spline
b. Scan-line method
c. Depth-sorting method
d. None of these
66) The equation for describing surface of 3D plane are a
a. Ax+ By+ Cz+ D= 0
b. Ax+ By+ Cz = 0
c. Ax+ By+ D= 0
d. Ax+ By+ Cz+ D= 1
9 P.T.O.
67) The array are used with scan line coherence algorithm are c
a. For intensity value
b. For depth value
c. Both a & b
d. None of these
68) The painter algorithm were developed on a
a. 1972 by Newell
b. 1972 by Evans
c. 1974 by Cat mull
d. None of these
69) The painter algorithm are also called c
a. Depth sort algorithm
b. Priority algorithm
c. Both a & b
d. None of these
70) The painter algorithm are based on the property of b
a. Polygon
b. Frame buffer
c. Depth buffer
d. None of these
71) What is x-shear? d
a. x’=x+ shx. y , y’=y
b. x’=x+ shx. x , y’=y
c. y’=x+ shx.y , x’=x
d. y’=y+ shy. x , x’=x
72) What is y-shear? a
a. x’=x+ shx. y , y’=y
b. x’=x+ shx. x , y’=y
c. y’=x+ shx. y , x’=x
d. y’=y+ shy. x , x’=x
73) How many steps required for composite transformation c
a. One
b. Two
c. Three
d. None of the above
74) The scan line coherence algorithm was developed by d
a. Wylie
b. Evans
c. Cat mull
d. Both a & b
10 P.T.O.
75) What is true for an rotate an object about an arbitrary point? b
a. Rotate it about the origin , Translate point to the origin
b. Translate point to the origin, Rotate it about the origin , translate the
center of rotation back where it belonge
c. Translate point to the origin, Scale it about the origin , translate the center
of rotation back where it belonge
d. None of the above
76) A many sided figure is termed as b
a. Square
b. Polygon
c. Rectangle
d. None
77) Ray-tracing is an extension of b
a. Ray calling
b. Ray casting
c. Ray sampling
d. Ray coherence
78) Scan lines are used to scan from a
a. Top to bottom
b. Bottom to top
c. Both a & b
d. None of these
80) The anti - aliasing technique which allows shift of 1/4,1/2 and 3/4 of a pixel d
diameter enabling a closer path of a line is ?
a. Filtering
b. Pixel phasing
c. Sampling technique
d. Intensity compensation
81) The amount of light emitted by the phosphor coating depends on the? a
a. Number of electrons striking the screen
b. Speed of electrons striking the screen
c. Distance from the cathode to the screen
d. None of above
11 P.T.O.
82) Lower persistence phosphorus is used in a
a. Animation
b. Simple object
c. Complex object
d. All of these
83) Higher persistence phosphorus needs _________ refresh rate a
a. Lower
b. Higher
c. Medium
d. None of these
84) Phosphorus are of various types depending on c
a. Color
b. Persistence
c. both a & b
d. none of these
85) The subtractive color model use the concept of a
a. Printing ink
b. Light to display color
c. Printing line
d. None of these
86) A fast and simple method for rendering an object with polygon surface is c
a. Constant-intensity shading
b. Flat shading
c. Both a & b
d. None of these
87) The basic parameter to curved attributes are? d
a. Width
b. Color
c. Type
d. All of above
88) Raster curves of various widths can be displayed using? d
a. Horizontal and vertical spans
b. Vertical spans
c. Horizontal spans
d. Horizontal or vertical spans
89) If the magnitude of the curve slope is lesser than 1, then? b
a. We can plot horizontal spans
b. We can plot vertical spans
c. Both A & B
d. None of above
12 P.T.O.
90) If the slope magnitude is 1, then circles, ellipse and other curves will appear? c
a. Rough
b. Big
c. Thinnest
d. Thick
91) One of the method for displaying thick curves is? b
a. Curve cap
b. Curve slope
c. Curve width
d. None of above
92) The function of the pixel mask is? a
a. To display dashes and inter dash spaces according to the slope
b. To display curved attributes
c. To display the thick curves
d. None of above
93) The curves displayed with a rectangular pen will be? a
a. Thicker and magnitude slope is 1
b. Thicker and magnitude slope >1
c. Thinner
d. None of above
94) Choose the correct representation of Hyperbola? a
a. − = 1
b. − =1
c. − =1
d. None of these
95) ______is a flexible strip that is used to produce smooth curve using a set of point. a
a. Spline
b. Scan-line Method
c. Depth Sorting Method
d. None of above
96) The types of spline curve are C
a. Open spline
b. Closed spline
c. Both a & b
d. None of these
97) Which of following the light or reflection types d
a) Specular
b) Diffuse
c) Ambient
d) All of the above
13 P.T.O.
98) Phong shading algorithm interpolates the Phong shading algorithm interpolates the a
normals and compute lighting during
a) rasterization
b) Vectorization
c) Segmentation
d) Transition
99) Final illumination of a point (Vertex) d
a) Ambient
b) Diffuse
c) Specular
d) None of these
100) Gouraud Shading can be done using b
a) Goolge
b) OpenGL
c) Raster
d) None of the above
**********
14 P.T.O.
Question Bank of A
N
CA-8.5 Optimization Algorithms(254805)
S
1. Operations Research was known as an ability to win a war without really going in to a D
A. Battlefield
B. Fighting
C. War
D. Both A andB
2. Who defined Operations Research as an aid for the executive in marketing his A
decisions by providing him with the quantitative information based on the scientific
method of analysis?
A. C. Kitte
B. H.M. Wagner
C. E.L. Arnoff
D. None of the above
3. Which of the following is not required in LPP formulation? A
A. Write the hole problem
B. Defining the decision variable
C. Writing constraints
D. Applying nonnegative constraints
4. Which of the following use for LP to find optimal use of D
A. Money
B. Manpower
C. Machine
D. All the above
5. Operations Research helps in refining the _________ of the result but doesn’t give a B
perfect solution.
A. Clarity
B. Quality
C. Both A and B
D. Decisions
1 P.T.O.
7. Which of the following techniques or tools of Operations Research? D
A. Queuing Theory
B. Inventory Control Models
C. Network analysis
D. All of the above
8. Which of the following typical Applications/Scope of Operations Research D
A. Finance, Budgeting and Investments
B. Purchasing, Procurement and Exploration
C. Production Management
D. All of the above
9. Which of the following techniques or tools of Operations Research? D
A. Replacement Problems
B. Sequencing
C. Integer Programming
D. All of the above
10. Which of the following techniques or tools of Operations Research? D
A. Assignment Problems
B. Transportation Problems
C. Decision Theory and Games Theory.
D. All of the above
11. Which of the following techniques or tools of Operations Research? D
A. Dynamic Programming
B. Simulation
C. Symbolic Logic
D. All of the above
12. Which of the following techniques or tools of Operations Research? D
A. Symbolic Logic
B. Goal-programming
C. Markov Analysis
D. All of the above
13. Which are not advantages of Operations Research? D
A. Better Decision
B. Better System
C. Better Control
D. None of the above
2
15. Which is not Marketing operational research role? C
i. Product selection, timing, etc.
ii. Advertising media, budget allocation.
iii. Number of salesman required.
iv. Selection of product mix.
A. Only i
B. Both i , ii
C. All i, ii ,iii , iv
D. None of the above
3 P.T.O.
22. In simplex method , if constraint is of type less than equal to than we add _____ A
A. Slack Variable
B. Surplus Variable
C. Artificial Variable
D. None of the above
23. Each LPP is connected with another LPP is called ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ B
A. Primal
B. Dual
C. Non‐linear programming
D. None of the above
24. Operations Research approach is B
A. Multi‐disciplinary
B. Scientific
C. Initiative
D. All of the above
25. Decision variables are D
A. Scientific
B. Initiative
C. Multi-disciplinary
D. None of the above
26. The quantitative approach to decision analysis is B
A. Logical approach
B. Rational approach
C. Scientific approach
D. All of the above
27. What is being considered as one of the most versatile management tools? B
A. Electronic Computers
B. Linear Programming
C. Computer Programming
D. None of the above
28. A maximized objective function having _______ function A
A. Profit
B. Active
C. Passive
D. None of the above
29. A LPP solved which kind of resource allocation problems? D
A. Production planning & scheduling
B. Assignment Problem
C. Game theory
D. All of the above
4
30. The following primal having how many dual constraints A
Maximum P: 12x + 13y
Subject to: 5x + 2y <= 140
3x+ 6y <= 190
where x ,y >=0
A. Two
B. Three
C. Four
D. None of the above
31. The following primal having how many dual constraints A
Minimum P: 15x + 13y
Subject to: 5x + 12y >= 60
30x + 60y >= 90
x + 2y <= 40
where x ,y >=0
A. Two
B. Three
C. Four
D. None of the above
32. Is every optimal solution is feasible solution? A
A. Yes
B. No
33. What is dual of any primal who’s having objective function Minimize? A
A. Maximize
B. Minimize
C. Both A & B
D. None of the above
34. Maximum P: 2x + 3y D
Subject to: 6x + 2y <= 12
4x + 2y <= 16
Where x ,y >=0
A. Multiple Optimal Solutions
B. Infeasible Solution
C. Unbounded Solution
D. Redundant Constraint
35. LPP infeasible solution goes to D
A. First Quadrant
B. First and Second Quadrant
C. Second Quadrant
D. None of the above
36. Each feasible basic solution must satisfy
A. Negativity Constraint
B. Basic Constraint
C. Non-negativity Constraint
D. Common Constraint
5 P.T.O.
37. The objective function Minimized C = 2x + y with respect to the feasible region at which D
point it gives minimum cost?
A. (3,2)
B. (5,0)
C. (2,4)
D. (0,7)
38. The linear function in LPP having C
A. Decision variable
B. Constraints
C. Objective Function
D. Nonnegative constraints
39. Maximum P: 2x + 3y B
Subject to: 6x + 2y <= 12
4x + 2y >= 16
Where x ,y >=0
A. Multiple Optimal Solutions
B. Infeasible Solution
C. Unbounded Solution
D. Redundant Constraint
40. In simplex method key column is also called A
A. Pivot Column
B. Plan Column
C. Both A & B
D. None of the above
42. The objective function Maximized P = 3x + 4y with respect to the feasible region at which D
point it gives maximum Profit?
A. (0,2)
B. (3,0)
C. (4,2)
D. (2,4)
43. Intersection of key row and key column is also called C
A. Pivot Element
B. Key Element
C. Both A & B
D. None of the above
44. In two phase method phase the phase1 start with _____ B
A. If solution is feasible
B. If solution is infeasible
C. If solution is unbounded
D. None of the above
6
45. Variables are unrestricted in nature means what? C
A. Variable values are positive
B. Variable values are negative
C. Both A & B
D. None of the above
46. What is degenerate solution in transportation problem? A
A. Number of stone square less than required stone square
B. Number of stone square greater than required stone square
C. Number of water square less than required water square
D. Number of water square greater than required water square
47. In minimization cases , _______ are assigned to the artificial variables as their coefficients B
in the objective function
A. +m
B. –m
C. 0
D. None of the above
48. What is unbalanced transportation problem? C
A. Total number of stone square less than total number water square
B. Total number of water square less than total number stone square
C. Total supply is not equal to total demand
D. None of the above
49. In Transportation Problem, the initial solution can be generated how many ways C
A. One
B. Two
C. Three
D. None of the above
50. The purpose of the stepping-stone method is to C
A. Develop the initial solution to the transportation problem.
B. Determine whether a given solution is feasible or not.
C. Assist one in moving from an initial feasible solution to the optimal solution.
D. Identify the relevant costs in a transportation problem
51. When total supply is equal to total demand in a transportation problem, the problem is said B
to be 1.
A. Degenerate
B. Balanced
C. Unbalanced
D. None of the above
52. Which method is used for solving LPP in a finite number of stages? D
A. Simplex algorithm
B. Simplex variable
C. M method
D. Simplex method
7 P.T.O.
54. Which of the following is a not special case in transportation problem? D
A. Unbalanced transportation problem
B. Maximized transportation problem
C. Prohibited routes transportation problem
D. None of the above
55. Which of the following is a special case in transportation problem? C
A. Modified Distribution Method
B. Stepping stone
C. Maximization Objective
D. Travelling salesman
56. In VAM to a profit maximization problem, row and column penalties are determined by: C
A. Finding the largest unit cost in each row or column.
B. Finding the smallest unit cost in each row or column.
C. Finding the difference between the two lowest unit costs in each row and column.
D. Finding the difference between the two highest unit costs in each row and column.
57. What is the size of matrix in assignment problems? C
A. m x n
B. n x m
C. n x n
D. None of the above
58. What is CPA? D
A. Critical Power Analysis.
B. Critical Payment Analysis.
C. Critical Path Algorithm
D. Critical Path Analysis
59. In network not contain more than one critical path exist? B
A. Yes
B. No
60. PERT ffsd B
A. (a+4m+b)/3
B. (a+4m+b)/6
C. (a+4c+2b)/d
D. None of the above
61. The LCM requires that we start allocating units to shipping routes in the: C
A. Lower right corner of the table.
B. Upper right corner of the table.
C. Highest costly cell of the table.
D. Upper left-hand corner of the table.
62. Which of the following is not used to come up with a solution to the transportation D
problem?
A. MODI method
B. northwest corner method
C. stepping-stone method
D. Hungarian method
8
63. Which of the following is a float time A
A. Total Float
B. Frequency Float
C. Activity Float
D. Parallel Float
64. Which of the following is a zero-sum game? B
A. Prisoners' dilemma
B. Chess
C. A cartel member's decision regarding whether or not to cheat
D. All of the above
65. To represent event in a network diagram used. B
A. Arrows
B. Circles
C. Squares
D. Rectangles
66. A common assumption about the players in a game is that D
A. neither player knows the payoff matrix.
B. the players have different information about the payoff matrix.
C. only one of the players pursues a rational strategy.
D. the specific identity of the players is irrelevant to the play of the game.
67. In a zero-sum game, A
A. what one player wins, the other loses.
B. the sum of each player’s winnings if the game is played many times must be zero.
C. the game is fair—each person has an equal chance of winning.
D. long-run profits must be zero.
68. Which of the following is not game type? D
A. Nonzero-sum game.
B. zero-sum game
C. Both A & B
D. None of the above
10
82. A play of the game occurs when each player has chosen B
A. Player
B. Strategy
C. Both A & B
D. None of the above
83. A game with two players, where a gain of one player equals the loss to the other is known C
A. Multiple person zero sum game
B. One person zero sum game
C. Two person zero sum game
D. Three player
84. In game theory which following problem cannot solved using graphical method? C
A. 2 x n
B. m x 2
C. m x n
D. None of the above
85. In game theory which following problem can be solved using graphical method? A
A. 2 x n
B. 3 x 4
C. m x n
D. All of the above
86. What is column Dominance? B
A. If all the elements of a Column-i< = Column-j, then the Column-i is dominated by
the Column-j and it is removed from the matrix.
B. If all the elements of a Column-i> = Column-j, then the Column-i is dominated by
the Column-j and it is removed from the matrix.
C. If all the elements of a Column-i< = Column-j, then the Column-j is dominated by
the Column-j and it is removed from the matrix.
D. None of the above
87. PERT analysis is based on D
A. optimistic time
B. pessimistic time
C. most likely time
D. all the above.
88. In which phase is optimization done and how does that phase also checks for optimality C
conditions?
A. Phase III
B. Phase I
C. Phase II
D. None of the above
89. Which of these statements about the stepping-stone method is best? A
A. Only squares containing assigned shipments can be used to trace a path back to an
empty square.
B. An improvement index that is a net positive means that the initial solution can be
improved.
C. A dummy source and destination must be added if the number of rows plus
columns minus 1 is not equal to the number of filled squares.
D. Only empty squares can be used to trace a path back to a square containing an
assigned shipment.
11 P.T.O.
90. Dual simplex method solve for which type of objective B
A. Maximize
B. Minimize
C. Both A & B
D. None of the above
91. The difference between the maximum time available and the actual time needed to C
perform an activity is known as _________
A. Free float
B. Independent float
C. Total float
D. Half float
94. An Algebraic Method used to solve ___ which type of payoff matrix A
A. 2 x 2
B. 2 x n
C. m x 2
D. m x n
95. The queuing theory is used to ______ D
A. Analyze computer
B. Telecommunication systems / Traffic systems
C. Logistic/ Manufacturing systems.
D. All of the above
96. The total cost of a queuing system is typically calculated as the C
A. waiting cost.
B. service cost.
C. sum of waiting cost and service cost.
D. difference of the waiting cost and service cost.
97. The case in which a customer joins a queue but then leaves before being served is A
called
A. balking.
B. reneging.
C. first-in, first-out.
D. finite queue length.
12
98. Which are elements of Queuing System D
i. Arrival/Input Process
ii. Waiting Process
iii. Queuing/Service Discipline
iv. Customer Behaviors
v. Service Facility/ Mechanism
vi. System Output
A. i iii, iv , v , vi
B. i , ii, iv , vi
C. i , ii, iii, iv, vi
D. i , ii, iii, iv , v , vi
99. What is SIRO B
A. Scientific in Research Order (SIRO)
B. Service in Random Order (SIRO)
C. Scientific in Research Operation (SIRO)
D. None of the above
100. In most basic queuing models, the size of the arrival population is assumed to be A
____________.
A. infinite
B. finite
C. constant
D. all of the above
13 P.T.O.
Question Bank of
ANS
CA 1.3 Programming using C(254103)
C Language developed at?
A. AT & T's Bell Laboratories of USA in 1972
1) B. AT & T's Bell Laboratories of USA in 1970 A
C. Sun Microsystems in 1973
D. Cambridge University in 1972
For 16-bit compiler allowable range for integer constants is ______?
A. -3.4e38 to 3.4e38
2) B. -32767 to 32768 C
C. -32768 to 32767
D. -32668 to 3266
C programs are converted into machine language with the help of
A. An Editor
3) B. A compiler B
C. An operating system
D. None of the above
A C variable cannot start with
A. An alphabet
4) B. A number D
C. A special symbol other than underscore
D. both (b) and (c)
Which of the following is allowed in a C Arithmetic instruction
A. []
5) B.{} C
C. ()
D. None of the above
Which of the following shows the correct hierarchy of arithmetic operations in
C
A./+*- D
6)
B.*-/+
C.+-/*
D.*/+-
What is an array?
A. An array is a collection of variables that are of the dissimilar data type.
7) B. An array is a collection of variables that are of the same data type. B
C. An array is not a collection of variables that are of the same data type.
D. None of the above.
9. What is right way to Initialization array?
A. intnum[6] = { 2, 4, 12, 5, 45, 5 } ;
8) B. intn{} = { 2, 4, 12, 5, 45, 5 } ; A
C. intn{6} = { 2, 4, 12 } ;
D. intn(6) = { 2, 4, 12, 5, 45, 5 };
1 P.T.O.
An array elements are always stored in _________ memory locations.
A. Sequential
9) B. Random A
C. Sequential and Random
D. None of the above
What is the right way to access value of structure variable book{ price, page }?
A. printf("%d%d", book.price, book.page);
10) B. printf("%d%d", price.book, page.book); A
C. printf("%d%d", price::book, page::book);
D. printf("%d%d", price->book, page->book);
Which keyword can be used for coming out of recursion?
A. break
B. return B
11)
C. exit
D. Both (a) and (b)
2
Which operators are known as Ternary Operator?
A. ::, ?
17) B.?,: B
C.?,;;
D. None of the above
In switch statement, each case instance value must be _______?
A. Constant
18) B. Variable A
C. Special Symbol
D. None of the above
What is the work of break keyword?
A. Halt execution of program
19) B. Restart execution of program C
C. Exit from loop or switch statement
D. None of the above
For the below definition what is the data type of ‘PI’
#define PI 3.141
A - Its float C
20)
B - Its double
C - There is no type associated with PI, as it’s just a text substitution
D - Syntax error, semi colon is missing with the definition of PI
The statement printf("%c", 100); will print?
A. prints 100
21) B. print garbage C
C. prints ASCII equivalent of 100
D. None of the above
The _______ memory allocation function modifies the previous allocated
space.
A. calloc D
22)
B. free
C. malloc
D. realloc
The following code ‘for(;;)’ represents an infinite loop. It can be terminated
by.
23) A. break A
B. exit(0)
C. abort()
D. All of the mentioned
Which is the correct syntax to declare constant pointer?
A. int *constconstPtr;
24) B. *int constant constPtr; D
C. constint *constPtr;
D. A and C both
3 P.T.O.
What will be the output of the following program ?
void main()
{
int a = 2;
switch(a)
{
case 1:
printf("goodbye"); break;
case 2:
25) continue; A
case 3:
printf("bye");
}
}
A)error
B)goodbye
C)bye
D)byegoodby
What is the use of getchar()?
void main()
{
if(printf("cquestionbank"))
printf("I know c");
else C
28)
printf("I know c++");
}
A) I know c
B) I know c++
C) cquestionbankI know c
D) cquestionbankI know c++
4
What will be output if you will compile and execute the following c code?
#define message "union is power of c"
void main()
{
clrscr();
printf("%s",message);
29) getch(); A
}
A) union is power of c
B) union is Power of c
C) Compiler error
D) None of these
Bitwise operators can operate upon?
#include <stdio.h>
void main()
{
char *s = "hello";
char *p = s; B
31)
printf("%p\t%p", p, s);
}
5 P.T.O.
What is the output of the following code?
main()
{
int x = 5;
if(x=5)
{
if(x=5) break;
32) printf("Hello"); A
}
printf("Hi");
}
A - Compile error
B - Hi
C - HelloHi
D - Compiler warning
What is the built in library function to adjust the allocated dynamic memory
size.
A - malloc B
33)
B - calloc
C - realloc
D –resize
A) break B
35)
B) return
C) exit
D) both break and return
6
A character variable can at a time store ?
A. 1 character A
36)
B. 8 charactCr
C. 254 character
D. None of above
Which of the following is false in C ?
A. stdio.h A
39)
B. iostream.h
C. string.h
D. pre-processor
Null macro is ?
(A) 0 time
(B) 1 time
(C) Compilation Error
(D) Infinite times
7 P.T.O.
How many times CppBuzz.com is printed on console?
int main()
{
int a = 0;
while(a++)
{
printf("CppBuzz.com");
42) } A
return 0;
}
8
What is sizeof() in C?
(A) Operator
49) (B) Function B
(C) Macro
(D) None of these
What is the output of following code?
int main()
{
int a = 5;
int b = 10;
int c = a+b;
50) printf("%i",c); B
}
(A) 0
(B) 15
(C) Undefined i
(D) Any other Compiler Error
Which of the following ways are correct to include header file in C program?
(A) #include<stdio.h>
51) (B) #include"stdio.h" D
(C) # stdio.h
(D) Both A & B
Will compiler produce any compilation error if same header file is included
two times?
52) B
(A) Yes
(B) No
How does the string is stored in the memory?
A) Contiguous
53) B) Non-contiguous A
C) Null
D) sequence
What is the output of the following code?
#include "stdio.h"
int a = 20;
int main()
{
int a = 10;
printf("%d", a); C
54)
return 0;
}
(A) 20
(B) Ambiguity Error
(C) 10
(D) 0
9 P.T.O.
What is the output of the following code?
#include "stdio.h"
int main()
{
int a = 10, b = 20;
if(a=b)
{
printf("Easy");
}
else A
55)
{
printf("Hard");
}
return 0;
}
(A) Easy
(B) Hard
(C) EasyHard
(D) Error in program
Does this program get compiled successfully?
#include stdio.h
int main()
{
printf("CppBuzz.com");
return 0; B
56)
}
(A) Yes
(B) No
(C) Depend on processor
(D) Error in program
The format identifier ‘%i’ is also used for _____ data type.
A) char
57) B) int B
C) float
D) double
Which of the following is a logical AND operator?
A) !
58) B) && B
C) ||
D) &
10
Prototype of a function means _____
A. Name of Function C
59) B. Output of Function
C. Declaration of Function
D. Input of a Function
Name the loop that executes at least once.
A. For C
60) B. If
C. do-while
D. while
What is a null pointer?
A) Semicolon ; A
63)
B) Colon :
C) Period . (dot symbol)
D) None of the above.
Types of Integers are.?
A) short
64) B) int D
C) long
D) All the above
Which of the following cannot be a structure member?
a) Another structure
65) b) Function B
c) Array
d) None of the mentioned
Which of the following correctly shows the hierarchy of arithmetic operations in
C?
66) A. / + * - D
B. * - / +
C. + - / *
D. / * + -
11 P.T.O.
What characters are allowed in a C function name identifier? B
A) Alphabets, Numbers, %, $, _
67) B) Alphabets, Numbers, Underscore ( _ )
C) Alphabets, Numbers, dollar $
D) Alphabets, Numbers, %
Arguments passed to a function in C language are called ___ arguments.
A) Formal arguments
68) B) Actual Arguments B
C) Definite Arguments
D) Ideal Arguments
Arguments received by a function in C language are called ___ arguments.
A) Definite arguments
69) B) Formal arguments B
C) Actual arguments
D) Ideal arguments
Choose a non Library C function below.
A) printf()
70) B) scanf() D
C) fprintf()
D) printf2()
What is the dimension of the C array int ary[10][5].?
A) 1
71) B) 2 B
C) 5
D) 10
What is the dimension of the below C Array.
int ary[]={1,3,5,7};
A) 1 A
72)
B) 2
C) 3
D) 5
Array of Arrays is also called.
A) Multi Data Array
73) B) Multi Size Array C
C) Multi Dimensional Array
D) Multi Byte Array
What is the minimum number of functions to be present in a C Program.
A) 1
74) B) 2 A
C) 3
D) 4
How do you accept a Multi Word Input in C Language.
A) SCANF
75) B) GETS C
C) GETC
D) FINDS
12
Processor Directive in C language starts with.?
A) $ symbol (DOLLAR)
76) B) @ symbol (At The Rate) D
C) & symbol (Ampersand)
D) # symbol (HASH)
What is the abbreviation of C STDIO in stdio.h.?
A) Standard Input Output
77) B) String Terminating Operations Input Output A
C) Store Input Output
D) None of the above
If the two strings are identical, then strcmp() function returns
A) -1
78) B) 1 C
C) 0
D) Yes
A pointer pointing to a memory location of the variable even after deletion of
the variable is known as _____
80) A) strnchar() D
B) strchar()
C) strrchar()
D) strrchr()
What is the output of this program?
#include <iostream>
using namespace std;
int main()
{
printf("value is = %d", (10 ++)); C
81)
return 0;
}
a) 10
b) 11
c) Compile time error
d) run time error
In C Programming strcmp() function is used for
84) A.strinit() B
B.strnset()
C.strset()
D.strcset()
How will you free the allocated memory ?
A. remove(var-name); B
85)
B. free(var-name);
C. delete(var-name);
D. dalloc(var-name);
What will happen if in a C program you assign a value to an array element
whose subscript exceeds the size of array?
A. The element will be set to 0. C
86)
B. The compiler would report an error.
C. The program may crash if some important data gets overwritten.
D. The array size would appropriately grow.
What is the maximum length of a C String.
A) 32 characters
87) B) 64 characters D
C) 256 characters
D) None of the above
C programming : Match the following:
a. calloc( ) ------- i. Frees previouslyallocated space.
b. free( ) ----------- ii. Modifiespreviouslyallocated space.
c. malloc( ) ------- iii. Allocates spacefor array.
d. realloc( ) ------- iv. Allocatesrequested size ofspace. A
88)
A. a-iii, b-i, c –iv, d -ii
B. a-iii, b-ii, c –i, d -iv
C. a-iii, b-iv, c –i, d -ii
D. a-iv, b-ii, c –iii, d -i
A pointer pointing to a memory location of the variable even after deletion of
the variable is known as _____
89) A. far pointer B
B. dangling pointer
C. null pointer
D. void pointer
14
How will you print \n on the screen?
A)printf("\n");
90) B)echo "\\n"; D
C)printf('\n');
D)printf("\\n");
The Default Parameter Passing Mechanism is called as
A. Call by Value
91) B. Call by Reference A
C. Call by Address
D. Call by Name
Which operator connects the structure name to its member name?
a) –
92) b) <- C
c) .
d) Both <- and .
Array index always start from (C programming)
a. 0 A
93)
b. 1
c. 2
d. 3
C programming: Which is not a storage class?
a. Auto B
94)
b. Struct
c. Typedef
d. Static
What is printed when the sample code is executed?
int y[4] = {6, 7, 8, 9};
int *ptr = y + 2;
printf("%d\n", ptr[ 1 ] );
95) D
A) 6
B) 7
C) 8
D) 9
Which of the following operator can be used to access value at address stored
in a pointer variable?
96) A. * A
B. #
C. &&
D. @
22. Which one of the following sentences is true?
A. The body of a while loop is executed at least once.
97) B. The body of a do ... while loop is executed at least once. B
C. The body of a do ... while loop is executed zero or more times.
D. A for loop can never be used in place of a while loop.
15 P.T.O.
perror( ) function used to ?
A. Work same as printf()
98) B. prints the error message specified by the compiler B
C. prints the garbage value assigned by the compiler
D. None of the above
signed and unsigned representation is available for.?
A) short, int, long, char
99) B) float, double, long double C
C) A & B
D) None of the above
C programming: To use the function tolower(), which of the following header
file should be used
a. string.h C
100)
b. conio.h
c. ctype.h
d. None of the mentioned
**********
16
CA-305 Java Programming A
N
S
1) Which class allows parsing of command line arguments? B
a) Args
b) JCommander
c) Command Line
d) Input
2) Which of the following is not a Java features? C
a)Dynamic
b)Architecture Neutral
c)Use of pointers
d)Object-oriented
3) How do we pass command line argument in Eclipse? A
a) Arguments tab
b) Variable tab
c) Cannot pass command line argument in eclipse
d) Environment variable tab
4) Which package contains the Random class? A
a)java.util package
b)java.lang package
c)java.awt package
d)java.io package
5) Can command line arguments be converted into int automatically if required? B
a) Yes
b) No
c) Compiler Dependent
d) Only ASCII characters can be converted
6) Which of the following is an immediate subclass of the Panel class? A
a)Applet class
b)Window class
c)Frame class
d)Dialog class
7) Which of these is a correct statement about args in the following line of code? C
a) args is a String
b) args is a Character
c) args is an array of String
d) args in an array of Character
1 P.T.O.
8) Which of these data types is used to store command line arguments? C
a) Array
b) Stack
c) String
d) Integer
9) Which keyword is used for accessing the features of a package? B
a)package
b)import
c)extends
d)export
10) How many threads can be executed at a time? B
a)Only one thread
b)Multiple threads
c)Only main (main() method) thread
d)Two threads
11) Which of these selection statements test only for equality? B
a) if
b) switch
c) if & switch
d) none of the mentioned
12) Which of these keywords is used to define interfaces in Java? A
a) class
b) Interface
c) cls
d) var
13) Which of the following can be operands of arithmetic operators? D
a) Numeric
b) Boolean
c) Characters
d) Both Numeric & Characters
14) Which of the following is not OOPS concept in Java? D
a) Inheritance
b) Encapsulation
c) Polymorphism
d) Compilation
2
15) What will be the output of the following Java program? D
class Output
{
static void main(String args[])
{
int x , y = 1;
x = 10;
if(x != 10 && x / 0 == 0)
System.out.println(y);
else
System.out.println(++y);
}
}
a) 1
b) 2
c) Runtime Error
d) Compilation Error
16) Which of these can be used to differentiate two or more methods having the D
same name?
a) Parameters data type
b) Number of parameters
c) Return type of method
d) All of the mentioned
17) What is the process of defining more than one method in a class differentiated B
by parameters?
a) Function overriding
b) Function overloading
c) Function doubling
d) None of the mentioned
18) Which of the following statements are incorrect? B
a) String is a class
b) Strings in java are mutable
c) Every string is an object of class String
d) Java defines a peer class of String, called StringBuffer, which allows string
to be altered
19) Which of these method of String class can be used to test to strings for D
equality?
a) isequal()
b) isequals()
c) equal()
d) equals()
3 P.T.O.
20) Which of these keywords is used to refer to member of base class from a B
subclass?
a) upper
b) super
c) this
d) none of the mentioned
21) String in Java is a? A
a) class
b) object
c) variable
d) character array
22) What will be the output of the following Java program? C
class access
{
static int x;
void increment()
{
x++;
}
}
class static_use
{
public static void main(String args[])
{
access obj1 = new access();
access obj2 = new access();
obj1.x = 0;
obj1.increment();
obj2.increment();
System.out.println(obj1.x + " " + obj2.x);
}
}
a) 1 2
b) 1 1
c) 2 2
d) Compilation Error
23) Which of these methods must be made static? A
a) main()
b) delete()
c) run()
d) finalize()
4
24) Which of the following statements are incorrect? A
a) Variables declared as final occupy memory
b) final variable must be initialized at the time of declaration
c) Arrays in java are implemented as an object
d) All arrays contain an attribute-length which contains the number of
elements stored in the array
25) Which of these cannot be declared static? B
a) class
b) object
c) variable
d) method
26) Which of these keywords is used to prevent content of a variable from being A
modified?
a) final
b) last
c) constant
d) static
27) Arrays in Java are implemented as? B
a) class
b) object
c) variable
d) none of the mentioned
28) Which component is responsible for converting bytecode into machine specific A
code?
a) JVM
b) JDK
c) JIT
d) JRE
29) Which is the modifier when there is none mentioned explicitly? D
a) protected
b) private
c) public
d) default
30) Which of these values is returned by read() method is end of file (EOF) is C
encountered?
a) 0
b) 1
c) -1
d) Null
5 P.T.O.
31) What is true about a break? B
a) Break stops the execution of entire program
b) Break halts the execution and forces the control out of the loop
c) Break forces the control out of the loop and starts the execution of next iteration
d) Break halts the execution of the loop for certain time frame
32) How can a protected modifier be accessed? C
a) accessible only within the class
b) accessible only within package
c) accessible within package and outside the package but through inheritance
only
d) accessible by all
33) Which of these method of String class can be used to test to strings for equality? D
a) isequal()
b) isequals()
c) equal()
d) equals()
34) What is the process by which we can control what parts of a program can C
access the members of a class?
a) Polymorphism
b) Abstraction
c) Encapsulation
d) Recursion
35) Which of these packages contains all the classes and methods required for even D
handling in Java?
a) java.applet
b) java.awt
c) java.event
d) java.awt.event
36) What is the process of defining a method in terms of itself, that is a method D
that calls itself?
a) Polymorphism
b) Abstraction
c) Encapsulation
d) Recursion
37) Which of this keyword can be used in a subclass to call the constructor of A
superclass?
a) super
b) this
c) extent
d) extends
6
38) Which of these can be overloaded? C
a) Methods
b) Constructors
c) All of the mentioned
d) None of the mentioned
39) Which of these methods is used to write() into a file? C
a) put()
b) putFile()
c) write()
d) writeFile()
40) Which exception is thrown when java is out of memory? C
a) MemoryFullException
b) MemoryOutOfBoundsException
c) OutOfMemoryError
d) MemoryError
41) Which of these keywords can be used to prevent Method overriding? D
a) static
b) constant
c) protected
d) final
42) Which of the following has the highest memory requirement? C
a) Heap
b) Stack
c) JVM
d) Class
43) What is the return type of Constructors? D
a) int
b) float
c) void
d) none of the mentioned
44) What would be the behaviour if this() and super() used in a method? C
a) Runtime error
b) Throws exception
c) compile time error
d) Runs successfully
45) Which class is used to generate random number? C
a) java.lang.Object
b) java.util.randomNumber
c) java.util.Random
d) java.util.Object
7 P.T.O.
46) Which of the following is a method having same name as that of its class? D
a) finalize
b) delete
c) class
d) constructor
47) When does Exceptions in Java arises in code sequence? A
a) Run Time
b) Compilation Time
c) Can Occur Any Time
d) None of the mentioned
48) What is the return type of Constructors? D
a) int
b) float
c) void
d) none of the mentioned
49) Which of the following is a method having same name as that of its class? D
a) finalize
b) delete
c) class
d) constructor
50) What will be the output of the following Java program? D
class Output
{
public static void main(String args[])
{
final int a=10,b=20;
while(a<b)
{
System.out.println("Hello");
}
System.out.println("World");
}
}
a) Hello
b) run time error
c) Hello world
d) compile time error
8
51) Which method can be defined only once in a program? A
a) main method
b) finalize method
c) static method
d) private method
52) Which of this statement is incorrect? B
a) switch statement is more efficient than a set of nested ifs
b) two case constants in the same switch can have identical values
c) switch statement can only test for equality, whereas if statement can
evaluate any type of boolean expression
d) it is possible to create a nested switch statements
53) What will be the output of the following Java program? B
class comma_operator
{
public static void main(String args[])
{
int sum = 0;
for (int i = 0, j = 0; i < 5 & j < 5; ++i, j = i + 1)
sum += i;
System.out.println(sum);
}
}
a) 5
b) 6
c) 14
d) compilation error
54) Which of these keywords must be used to monitor for exceptions? A
a) try
b) finally
c) throw
d) catch
55) Which of these access specifiers can be used for an interface? C
a) private
b) Protected
c) Public
d) All of the mentioned
9 P.T.O.
56) Which of the following loops will execute the body of loop even when condition A
controlling the loop is initially false?
a) do-while
b) while
c) for
d) none of the mentioned
57) Which of these keywords is used by a class to use an interface defined previously? C
a) import
b) Import
c) implements
d) Implements
58) Which of these selection statements test only for equality? B
a) if
b) switch
c) if & switch
d) none of the mentioned
59) Which of these keywords is used to define interfaces in Java? A
a) interface
b) Interface
c) intf
d) Intf
60) Decrement operator, −−, decreases the value of variable by what number? A
a) 1
b) 2
c) 3
d) 4
61) Which of the following option leads to the portability and security of Java? A
a)Bytecode is executed by JVM
b)The applet makes the Java code secure and portable
c)Use of exception handling
d)Dynamic binding between objects
62) Which of the following is true about the anonymous inner class? D
a)It has only methods
b)Objects can't be created
c)It has a fixed class name
d)It has no class name
63) What do you mean by nameless objects? D
a)An object created by using the new keyword.
b)An object of a superclass created in the subclass.
c)An object without having any name but having a reference.
d)An object that has no reference.
10
64) Which option is false about the final keyword? A
a)A final method cannot be overridden in its subclasses.
b)A final class cannot be extended.
c)A final class cannot extend other classes.
d)A final method can be inherited.
65) Which of these classes are the direct subclasses of the Throwable class? C
a) RuntimeException and Error class
b) Exception and VirtualMachineError class
c) Error and Exception class
d) IOException and VirtualMachineError class
66) Which of these operators is used to allocate memory for an object? C
a) malloc
b) alloc
c) new
d) give
67) Which of these data types is used to store command line arguments? C
a) Array
b) Stack
c) String
d) Integer
68) Which of these method of String class is used to obtain character at specified D
index?
a) char()
b) Charat()
c) charat()
d) charAt()
69) Which component is responsible to optimize bytecode to machine code? C
a) JVM
b) JDK
c) JIT
d) JRE
70) Which concept of Java is a way of converting real world objects in terms of class? C
a) Polymorphism
b) Encapsulation
c) Abstraction
d) Inheritance
71) Which of these keywords is used to manually throw an exception? C
a) try
b) finally
c) throw
d) catch
11 P.T.O.
72) Which of these class is super class of all the events? A
a) EventObject
b) EventClass
c) ActionEvent
d) ItemEvent
73) Which of these methods is a part of Abstract Window Toolkit (AWT) ? B
a) display()
b) paint()
c) drawString()
d) transient()
74) Which of the following is the correct way of implementing an interface A by class B
B?
a) class B extends A{}
b) class B implements A{}
c) class B imports A{}
d) None of the mentioned
75) Arrays in Java are implemented as? B
a) class
b) object
c) variable
d) none of the mentioned
76) Which of these is supported by method overriding in Java? C
a) Abstraction
b) Encapsulation
c) Polymorphism
d) None of the mentioned
77) Which of these is necessary to specify at time of array initialization? A
a) Row
b) Column
c) Both Row and Column
d) None of the mentioned
78) Which of the following statements are incorrect? B
a) String is a class
b) Strings in java are mutable
c) Every string is an object of class String
d) Java defines a peer class of String, called StringBuffer, which allows string to
be altered
79) Which of these cannot be declared static? B
a) class
b) object
c) variable
d) method
12
80) Which of these functions is called to display the output of an applet? B
a) display()
b) paint()
c) displayApplet()
d) PrintApplet()
81)
82) What is the process of defining more than one method in a class differentiated by B
parameters?
a) Function overriding
b) Function overloading
c) Function doubling
d) None of the mentioned
83) Which of these methods must be made static? A
a) main()
b) delete()
c) run()
d) finalize()
84) Which of these are selection statements in Java? A
a) if()
b) for()
c) continue
d) break
85) Which of these keywords must be used to handle the exception thrown by try D
block in some rational manner?
a) try
b) finally
c) throw
d) catch
86) Which of these operators is used to allocate memory for an object? C
a) malloc
b) alloc
c) new
d) give
87) What is the process of defining more than one method in a class differentiated B
by method signature?
a) Function overriding
b) Function overloading
c) Function doubling
d) None of the mentioned
13 P.T.O.
88) Which of the following is a method having same name as that of it’s class? D
a) finalize
b) delete
c) class
d) constructor
89) Which of this statement is incorrect? D
a) All object of a class are allotted memory for the all the variables defined in
the class
b) If a function is defined public it can be accessed by object of other class by
inheritation
c) main() method must be made public
d) All object of a class are allotted memory for the methods defined in the
class
90) Which annotation is used to represent command line input and assigned to D
correct data type?
a) @Input
b) @Variable
c) @Command Line
d) @Parameter
91) What is the use of @syntax? B
a) Allows multiple parameters to be passed
b) Allows one to put all your options into a file and pass this file as a
parameter
c) Allows one to pass only one parameter
d) Allows one to pass one file containing only one parameter
92) What would be the output of the following code snippet if variable a=10? D
if(a<=0)
{
if(a==0)
{
System.out.println("1 ");
}
else
{
System.out.println("2 ");
}
}
System.out.println("3 ");
a) 1 2
b) 2 3
c) 1 3
d) 3
14
93) What is true about a break? B
a) Break stops the execution of entire program
b) Break halts the execution and forces the control out of the loop
c) Break forces the control out of the loop and starts the execution of next
iteration
d) Break halts the execution of the loop for certain time frame
94) What is true about do statement? A
a) do statement executes the code of a loop at least once
b) do statement does not get execute if condition is not matched in the first
iteration
c) do statement checks the condition at the beginning of the loop
d) do statement executes the code more than once always
95) Which of the following is used with the switch statement? C
a) Continue
b) Exit
c) break
d) do
96) Which of the following is not a decision making statement? D
a) if
b) if-else
c) switch
d) do-while
97) Which of the following is not a valid flow control statement? A
a) exit()
b) break
c) continue
d) return
98) In order to restrict a variable of a class from inheriting to subclass, how B
variable should be declared?
a) Protected
b) Private
c) Public
d) Static
99) Which of the following is used for implementing inheritance through an D
interface?
a) inherited
b) using
c) extends
d) implements
15 P.T.O.
100) What would be the result if a class extends two interfaces and both have a B
method with same name and signature? Lets assume that the class is not
implementing that method.
a) Runtime error
b) Compile time error
c) Code runs successfully
d) First called method is executed successfully
**********
16
QNo. MCA CA-302 Design and Analysis of Algorithm (312251) (251312) ANS
Which of the following is incorrect?
Algorithms can be represented:
A) as pseudo codes
1 B) as syntax B
C) as programs
D) as flowcharts
The number of edges from the root to the node is called __________ of the
tree.
A) Height
16 B
B) Depth
C) Length
D) Width
What is a full binary tree?
A) Each node has exactly zero or two children
17 B) Each node has exactly two children B
C) All the leaves are at the same level
D) Each node has exactly one or two children
What is a complete binary tree?
A) Each node has exactly zero or two children
B) A binary tree, which is completely filled, with the possible exception of the
18 bottom level, which is filled from right to left C
C) A binary tree, which is completely filled, with the possible exception of
the bottom level, which is filled from left to right
D) A tree In which all nodes have degree 2
Which of the following properties does a simple graph not hold?
A) Must be connected
19 B) Must be unweighted A
C) Must have no loops or multiple edges
D) Must have no multiple edges
For a given graph G having v vertices and e edges which is connected and has
no cycles, which of the following statements is true?
A) v=e
20 B) v = e+1 B
C) v + 1 = e
D) v = e-1
What will be the position of 5, when a max heap is constructed on the input
elements 5, 70, 45, 7, 12, 15, 13, 65, 30, 25?
A) 5 will be at root
26 B
B) 5 will be at last level
C) 5 will be at second level
D) 5 can be anywhere in heap
What is the worst case time complexity of merge sort?
A) O(n log n)
B) O(n2)
27 A
C) O(n2 log n)
D) O(n log n2)
Kruskal’s algorithm is best suited for the sparse graphs than the prim’s
algorithm.
32 A
A) True
B) False
Which of the following is false about Prim’s algorithm?
A) It is a greedy algorithm
33 B) It constructs MST by selecting edges in increasing order of their weights B
C) It never accepts cycles in the MST
D) It can be implemented using the Fibonacci heap
Every graph has only one minimum spanning tree.
34 A) True B
B) False
Consider a complete graph G with 4 vertices. The graph G has ____ spanning
trees.
A) 15
35 B) 8 C
C) 16
D) 13
What will be the chromatic number for a complete graph having n vertices?
A) 0
B) 1
59 C
C) n
D) n!
The Data structure used in standard implementation of Depth First Search is?
A) Stack
B) Queue
67 A
C) Linked List
D) Tree
Algorithm is a ________________.
A) Processing of problem
93 B) Step by Step method to solve a problem B
C) Graphical method
D) None of the above
Algorithm should have _______________ or more output.
A) Zero
B) One
94 B
C) Two
D) Three
QUE.
QUESTION ANS
NO.
Arden’s theorem is true for:
1. (A) More than one initial states (B) Null transitions C
(C) Non-null transitions (D) None of the mentioned
Regular expression for all strings starts with ab and ends with bba is.
25.
(A) aba*b*bba (B) ab(ab)*bba C
(C) ab(a+b)*bba (D) All of the mentioned
A Language L may not be accepted by a Turing Machine if:
(A) It it is recursively ennumerable
26. (B) It is recursive B
(C) L can be ennumerated by some turing machine
(D) None of the mentioned
Which of the technique can be used to prove that a language is non regular?
27.
(A) Arden’s theorem (B) Pumping Lemma B
(C) Ogden’s Lemma (D) None of the mentioned
Languages of a automata is
(A) If it is accepted by automata
47.
(B) If it halts A
(C) If automata touch final state in its life time
(D) All language are language of automata
Statement 1: A Finite automata can be represented graphically; Statement 2:
The nodes can be its states; Statement 3: The edges or arcs can be used for
transitions
Hint: Nodes and Edges are for trees and forests too.
48.
Which of the following make the correct combination? D
(A) Statement 1 is false but Statement 2 and 3 are correct
(B) Statement 1 and 2 are correct while 3 is wrong
(C) None of the mentioned statements are correct
(D) All of the mentioned
Moore Machine is an application of:
49.
(A) Finite automata without input (B) Finite automata with output B
(C) Non- Finite automata with output (D) None of the mentioned
Which of the following is a correct statement?
(A) Moore machine has no accepting states
50.
(B) Mealy machine has accepting states A
(C) We can convert Mealy to Moore but not vice versa
(D) All of the mentioned
The productions
E—>E+E
E—>E—E
E-->E*E
E —> E / E
E —> id
58. (A) Generate an inherently ambiguous language C
(B) Generate an ambiguous language but not inherently so
(C) Are unambiguous
(D) Can generate all possible fixed length valid computation for carrying
out addition, subtraction, multiplication and division, which can be
expressed in one expression
Regular grammar is
93. (A) Context free grammar (B) Non context free grammar A
(C) English grammar (D) None of the mentioned
Which among the following is the correct option for the given grammar?
G->X111|G1,X->X0|00
(A) {0a1b|a=2,b=3}
94. A
(B) {0a1b|a=1,b=5}
(C) {0a1b|a=b}
(D) More than one of the mentioned is correct
The format: A->aB refers to which of the following?
95. (A) Chomsky Normal Form (B) Greibach Normal Form B
(C) Backus Naur Form (D) None of the mentioned
If L1 and L2 are context free languages, which of the following is context free?
(A) L1*
96. (B) L2UL1 D
(C) L1.L2
(D) All of the mentioned
The Tuples for NDFA
97. (A) Q, ∑,,δ,q0,F (B) Q,q0,F,δ A
(C) Θ,Q,q0,F,δ (D) F,Q,Δ,q0, δ
Consider G=({S,A,B,E}, {a,b,c},P,S), where P consists of S →AB, A →a, B
→b and E →c.
98. B
Number of productions in P’ after removal of useless symbols:
(A) 4 (B) 3 (C) 2 (D) 5
L={0i1j2k | j>i+k}
Which of the following satisfies the language?
(A) 0111100
99. A
(B) 011100
(C) 0001100
(D) 0101010
If R = ((1, 1), (3, 1), (2, 3), (4, 2)), then which of the following represents R2,
where R2 is R composite R?
100. D
(A) ((1, 1), (3, 1), (2, 3), (4, 2)) (B) f(1, 1), (9, 1), (4, 9), (16, 4))
(C) 1(1, 3), (3, 3), (3, 4), (3, 2)) (D) ((1, 1), (2, 1), (4, 3), (3, 1))
CA 304 Artificial Intelligence MCQs
Sr.No Questions Answer
.
1 What is Artificial intelligence? C
A. Putting your intelligence into Computer
B. Programming with your own intelligence
C. Making a Machine intelligent
D. Playing a Game
2 Which of the following is not an application of AI? D
A. Intelligent Robots
B. Handwriting Recognition
C. Speech Recognition
D. Content mining
3 Which of the following definitions correctly defines the State-space in an A
AI system?
A. A state space can be defined as the collection of all the problem states
B. A state space is a state which exists in environment which is in outer
space
C .A state space is the total space available for the agent in the state
D. All of the above
4 A* algorithm is based on C
A. Breadth-First-Search
B. Depth-First –Search
C. Best-First-Search
D. Hill climbing.
5 How do you represent “All dogs have tails”. A
A. ٧x: dog(x)->hastail(x)
B. ٧x: dog(x)->hastail(y)
C. ٧x: dog(y)->hastail(x)
D. ٧x: dog(x)->has->tail(x)
6 Which search method takes less memory? A
A. Depth-First Search
B. Breadth-First search
C. Both (a) and (b)
D. Optimal search
7 What is state space? D
A. The whole problem
B. Your Definition to a problem
C. Problem you design
D. Representing your problem with variable and parameter
a space where You know the solution.
8 Which is not a property of representation of knowledge? A
A. Representational Verification
B. Representational Adequacy
C. Inferential Adequacy
D. Inferential Efficiency
9 A production rule consists of C
A. A set of Rule
B. A sequence of steps
C. Both (a) and (b)
D. Arbitrary representation to problem
10 Which of the following is also called First order Logic? D
A. Lower Order Calculus
B. First Order Predicate Calculus
C. Quantification Theory
D. All of these
11 Single inference rule also called… A
A. Resolution
B. Reference
C. Reference
D. None of these
12 Which of the following are the example of the intelligent agents… D
A. robot
B. human
C. Autonomous Spacecraft
D. All of these
13 Important AI Techniques are
A. Search D
B. Use of knowledge
C. Abstraction
D. All of the above
14 In Travel salesman problem, If there are N cities, then the number of A
different paths among them is ………
A. 1.2….(N-1) or (N-1)!= N!
B. (N-1)!
C. N!-2
D. None of the above
15 Which search method takes less memory? A
A. Depth-First Search
B. Breadth-First search
C. Optimal search
D. Linear Search
16 Treatment chosen by doctor for a patient for a disease is based on C
A. Only current symptoms
B. Current symptoms plus some knowledge from the textbooks
C. Current symptoms plus some knowledge from the textbooks plus
experience
D. All of the mentioned
17 Which is not Familiar Connectives in First Order Logic? D
A. and
B. iff
C. or
D. not
18 The truth values of traditional set theory is and that of fuzzy set is A
A. Either 0 or 1, between 0 & 1
B. Between 0 & 1, either 0 or 1
C. Between 0 & 1, between 0 & 1
D. Either 0 or 1, either 0 or 1
19 ________ is/are the way/s to represent uncertainty. D
A. Fuzzy Logic
B. Probability
C. Entropy
D. All of the mentioned
20 What does the Bayesian network provides? A
A. Complete description of the domain
B. Partial description of the domain
C. Complete description of the problem
D. None of the mentioned
21 What is the goal of artificial intelligence? C
A. To solve real-world problems
B. To solve artificial problems
C. To explain various sorts of intelligence
D. To extract scientific causes
22 Which is true regarding BFS (Breadth First Search)? B
A. BFS will get trapped exploring a single path
B. The entire tree so far been generated must be stored in BFS
C. BFS is not guaranteed to find a solution if exists
D. BFS is nothing but Binary First Search
QUE.
QUESTION ANS
NO.
A data warehouse is which of the following?
A. Many-to-many
2 B. One-to-one C
C. One-to-many
D. All of the above.
A. Once created, the data marts will keep on being updated from the data
warehouse at periodic times
4 A
B. Once created, the data marts will directly receive their new data from the
operational databases
C. The data marts are different groups of tables in the data warehouse
D.A data mart becomes a data warehouse when it reaches a critical size
The following technology is not well-suited for data mining:
A. Functionality
8 D
B. Vendor consideration
C. Compatibility
D. All of the above
Cluster is?
A. This takes only two values. In general, these values will be 0 and 1
and they can be coded as one bit.
10 C
B. The natural environment of a certain species
C. Systems that can be used without knowledge of internal operations
D. None of these
A. Complete
11 B. Consistent A
C. Constant
D. None of these
Data mining is
A. Complete
13 B
B. Consistent
C. Constant
D. None of these
A. Dotted rectangle
15 B. Diamond C
C. Doubly outlined rectangle
D. None of these
OLAP stands for
17 a) Multidimensional A
b) Single dimensional
c) Measured
d) Dimensional
What do data warehouses support?
a) OLAP
18 A
b) OLTP
c) OLAP and OLTP
d) Operational databases
The full form of OLAP is
a) SMTOP
20 b) OLTP B
c) FTP
d) OLAP
What is noise?
a) component of a network
24 b) context of KDD and data mining B
c) aspects of a data warehouse
d) None of these
26 A. Data Mining. B
B. Data Warehousing.
C. Web Mining.
D. Text Mining.
The data Warehouse is__________.
A. read only.
27 A
B. write only.
C. read write only.
D. none.
Expansion for DSS in DW is__________.
A. 1-2 years.
30 D
B. 3-4years.
C. 5-6 years.
D. 5-10 years.
The data is stored, retrieved & updated in ____________.
A. OLAP.
31 B. OLTP. B
C. SMTP.
D. FTP.
A. Relational data.
32 B. Operational data. C
C. Metadata.
D. Informational data.
A. Data warehouse.
33 B
B. Data mining.
C. Datamarts.
D. Metadata.
35 A. Oracle. D
B. DBZ.
C. Informix.
D. Redbrick.
A. Mushy metadata.
36 A
B. Differential metadata.
C. Data warehouse.
D. Data mining.
37 A. Informational. B
B. Operational.
C. Both informational and operational.
D. Flat.
A. one.
38 B. two. A
C. three.
D. four.
A. 30-60 days.
39 B. 60-90 days. B
C. 90-120 days.
D. 120-150 days.
A. time.
40 A
B. cost.
C. frequency.
D. quality.
Data can be updated in _____environment.
A. data warehouse.
41 C
B. data mining.
C. operational.
D. informational.
A. OLTP
42 D
B. files
C. RDBMS
D. data warehouse
43 A. normalized. C
B. informational.
C. summary.
D. denormalized.
44 A. one. A
B. two.
C. three.
D. four.
A. monoatomic data.
45 C
B. diatomic data.
C. atomic data.
D. multiatomic data.
A data warehouse is _____________.
A. a process to reject data from the data warehouse and to create the necessary
indexes.
B. a process to load the data in the data warehouse and to create the necessary
47 B
indexes.
C. a process to upgrade the quality of data after it is moved into a data
warehouse.
D. a process to upgrade the quality of data before it is moved into a data
warehouse.
A. many-to-many.
48 B. one-to-one. C
C. one-to-many.
D. many-to-one.
A. completely demoralized.
49 C
B. partially demoralized.
C. completely normalized.
D. partially normalized.
A. Once created, the data marts will keep on being updated from the data
warehouse at periodic times
52 B. Once created, the data marts will directly receive their new data from the A
operational databases
C. The data marts are different groups of tables in the data warehouse
D. A data mart becomes a data warehouse when it reaches a critical size
A. DBMS.
B. RDBMS.
54 C. Sybase. B
D. SQL Server.
A. A column
B. A row
57 D
C. An attribute
D. A relation
A. DBMS.
B. RDBMS.
60 C. Sybase. B
D. SQL Server.
The time horizon in Data warehouse is usually __________.
A. 1-2 years.
61 D
B. 3-4years.
C. 5-6 years.
D. 5-10 years.
The data is stored, retrieved & updated in ____________.
A. OLAP.
62 B
B. OLTP.
C. SMTP.
D. FTP.
____________predicts future trends & behaviors, allowing business
managers to make proactive, Knowledge-driven decisions.
63 A. Data warehouse. B
B. Data mining.
C. Datamarts.
D. Metadata.
__________ is the heart of the warehouse.
A. Oracle.
65 D
B. DBZ.
C. Informix.
D. Redbrick.
________________defines the structure of the data held in operational
databases and used by operational applications.
66 A. User-level metadata. C
B. Data warehouse metadata.
C. Operational metadata.
D. Data mining metadata
_________maps the core warehouse metadata to business concepts,
familiar and useful to end users.
68 A. Mushy metadata. A
B. Differential metadata.
C. Data warehouse.
D. Data mining
The star schema is composed of __________ fact table.
A. one.
69 A
B. two.
C. three.
D. four.
The time horizon in operational environment is ___________.
A. 30-60 days.
70 B
B. 60-90 days.
C. 90-120 days.
D. 120-150 days.
The key used in operational environment may not have an element
of__________.
71 A. time. A
B. cost.
C. frequency.
D. quality.
Data can be updated in _____environment.
A. data warehouse.
72 C
B. data mining.
C. operational.
D. informational.
Record cannot be updated in _____________.
A. OLTP
73 D
B. files
C. RDBMS
D. data warehouse
The source of all data warehouse data is the____________.
A. operational environment.
74 A
B. informal environment.
C. formal environment.
D. technology environment.
Data redundancy between the environments results in less than
____________percent.
75 A. one. A
B. two.
C. three.
D. four.
Fact tables are ___________.
A. completely demoralized.
76 B. partially demoralized. C
C. completely normalized.
D. partially normalized.
_______________ is the goal of data mining.
A. root node.
80 B
B. decision tree.
C. siblings.
D. branches.
The main organizational justification for implementing a data warehouse
is to provide ______.
A. DBMS.
82 B
B. RDBMS.
C. Sybase.
D. SQL Server
Source data from the warehouse comes from _______________.
A. ODS.
83 A
B. TDS.
C. MDDB.
D. ORDBMS.
________________ is a data transformation process.
A. Comparison.
84 D
B. Projection.
C. Selection.
D. Filtering.
The technology area associated with CRM is _______________.
A. specialization.
85 C
B. generalization.
C. personalization.
D. summarization.
MDDB stands for ___________.
A. Digital directory.
87 C
B. Repository.
C. Information directory.
D. Data dictionary.
___________ is data collected from natural systems.
A. MRI scan.
88 A
B. ODS data.
C. Statistical data.
D. Historical data.
____________ are some popular OLAP tools.
A. Metacube, Informix.
89 A
B. Oracle Express, Essbase.
C. HOLAP.
D. MOLAP.
Capability of data mining is to build ___________ models.
A. retrospective.
90 C
B. interrogative.
C. predictive.
D. imperative.
Strategic value of data mining is ______________.
A. cost-sensitive.
91 C
B. work-sensitive.
C. time-sensitive.
D. technical-sensitive.
The terms equality and roll up are associated with ____________.
A. OLAP.
92 C
B. visualization.
C. data mart.
D. decision tree.
Exceptional reporting in data warehousing is otherwise called as
__________.
93 A. exception. B
B. alerts.
C. errors.
D. bugs.
____________ is a metadata repository.
A. Analysis.
95 D
B. Study.
C. Design.
D. Information collection.
Removing duplicate records is a process called _____________.
A. recovery.
96 B
B. data cleaning.
C. data cleansing.
D. data pruning.
How many components are there in a data warehouse?
A. two.
97 D
B. three.
C. four.
D. five.
Metadata contains atleast _________.
A. Classification.
100 C
B. Regression.
C. Sequence discovery.
D. Association rules.
CA 301 Internet Computing - I (HTML,PHP and MYSQL) MCQs
Sr.No. Questions Answer
1 The attribute of form tag is C
A. Method
B. Action
C. Both A & B
D. None of these
2 Which of these tags are all <table> tags? B
A. <table><head><tfoot>
B. <table><tr><td>
C. <table><tr><tt>
D. <thead><body><tr>
3 Which is the correct CSS syntax? D
A. body:color=black
B. {body;color:black}
C. {body:color=black(body}
D. body {color: black}
4 Which CSS property sets a background image for an element? D
A. background
B. background - attachment
C. background - color
D. background - image
5 Which HTML tag is used to define an internal style sheet? A
A.<style>
B.<css>
C.<script>
D. None
6 Where in an HTML document is the correct place to refer to an external B
style sheet?
A. At the end of the document
B. In the <head> section
C. At the top of the document
D. In the <body> section
7 How do you make a list that lists its items with squares? D
A. list-type: square
B. type: square
C. type: 2
D.list-style-type: square
8 <SCRIPT> … </SCRIPT> tag can be placed within ________ C
a. Header
b. Body
c. both A and B
d. none of the above
9 Marquee is a tag in HTML to C
a. mark the list of items to maintain in queue
b. Mark the text so that it is hidden in browser
c. Display text with scrolling effect
d. None of above
10 In CSS what does “color:blue” can be called as B
A. Selector
B. Declaration
C. Rule
D. Value
11 What should be the correct syntax to write a PHP code? C
A. < php >
B < ? php ?>
C. <? ?>
D. <?php ?>
12 How should we add a single line comment in our PHP code? C
i) /?
ii) //
iii) #
iv) /* */
A.Only ii)
B.i), iii) and iv)
C. ii), iii) and iv)
D. Both ii) and iv)
13 What will be the output of the following PHP code? A
<?php
$num = "1";
$num1 = "2";
print $num+$num1;
?>
A. 3
B. 1+2
C. Error
D. 12
14 PHP’s numerically indexed array begin with position ___________ C
A. 1
B. 2
C. 0
D. -1
15 Which of the following PHP function will return true if a variable is an B
array or false if it is not an array?
A. this_array()
B. is_array()
C. do_array()
D. in_array()
16 Which one of the following PHP functions can be used to find files? A
A. glob()
B. file()
C. fold()
D. get_file()
17 Which of the following is used to get information sent via get method in A
PHP?
A. $_GET
B. $GET
C. $GETREQUEST
D.None of these
18 Which of the following method returns a formatted string representing a C
date?
A. time()
B. getdate()
C. date()
D. None of the above
19 Which of the following function returns the number of characters in a D
string variable?
A. count($variable)
B. len($variable)
C. strcount($variable)
D. strlen($variable)
20 Which variable is used to collect form data sent with both the GET and D
POST methods?
A. $BOTH
B. $_BOTH
C. $REQUEST
D. $_REQUEST
21 A cookie is created with which function. B
A.cookie()
B.setcookie()
C.cookieset()
D.createcookie()
22 To destroy the session, use A
A.session_destroy()
B.$destroy()
C.#destroy()
D.destroy_session()
23 The is a super global variable that returns the filename of the currently A
executing script.
A.$_SERVER["PHP_SELF"]
B.#_SERVER["SELF_PHP"]
C.$_SERVER["SELF"]
D.$_SERVER["PHP"]
24 Which of the following is not true? D
A.PHP can be used to develop web applications.
B.PHP makes a website dynamic
C.PHP applications can not be compile
D.PHP can not be embedded into html.
25 Which one of the following keyword is used in conjunction with C
an Exception object?
A. throws
B. exception
C. throw
D. final
26 Which is the Concatenation Operator in PHP? A
A. Dot (.)
B. Plus (+)
C. Ampersand (&)
D. Percentage (%)
27 What does fopen() function do in PHP? B
A. It used to open folders in PHP
B. It used to open files in PHP
C. It used to open Remote Computer
D. It used to open Remote Server
28 Which one of the following statements instantiates the mysqli class? B
A. $mysqli = new mysqli()
B. $mysqli = new mysqli()
C. $mysqli->new.mysqli()
D. mysqli->new.mysqli()
29 Which one of the following methods is responsible for sending the A
query to the database?
A. query()
B. send_query()
C. sendquery()
D. query_send()
30 Which one of the following statement can be used to select the D
database?
$mysqli=select_db(‘databasename’);
mysqli=select_db(‘databasename’);
mysqli->select_db(‘databasename’);
$mysqli->select_db(‘databasename’);
31 The updated mysql extension released with PHP 5 is typically referred C
to as
A.MySQL
B.mysql
C.mysqli
D.mysqly
32 PHP is a ____________ language? C
A. user-side scripting
B. client-side scripting
C. server-side scripting
D. Both B and C
33 Which statement will output $lfc on the screen? A
A. echo "$lfc";
B. echo "$$lfc";
C. echo "/$lfc";
D. echo "$lfc;";
34 PHP can create, open, read, write, delete, and close files on the server. A
A. True
B. False
C. PHP can only create, open and close files on the server
D. PHP can read, write and delete files on the server
35 PHP can send and receive cookies? A
A. True
B. False
C. PHP older version can not send and receive cookies but new
version can.
D. PHP new version can not send and receive cookies but old version
can
36 The PHP syntax is most similar to: C
A. VBScript
B. JavaScript
C. Perl and C
D. All of the above
37 Which one is not a data type in PHP? D
A. Resources
B. Objects
C. Null
D. Void
38 Which function returns an array consisting of associative key/value C
pairs?
A. count()
B. array_count()
C. array_count_values()
D. count_values()
39 As compared to associative arrays vector arrays are much A
A. Faster
B. Slower
C. Stable
D. None of the above
40 What is the description of Error level E_ERROR? A
A. Fatal run-time error
B. Near-fatal error
C. Compile-time error
D. Fatal Compile-time error