CPET 21 CompSc Set2
CPET 21 CompSc Set2
(IT)] Set-02
1. Which is used and known as a high speed buffer, existing with almost each processor?
a) Primary
b) Secondary
c) Cache
d) RAM
2. EA stands for?
a) Effective address
b) Effective absolute
c) Effective Add
d) End address
3. Hazards in pipelined stages are of
a) Two types
b) Three types
c) Four types
d) Five types
4. Which register is a memory pointer?
a) Source index
b) Instruction register
c) Stack pointer
d) Program counter
5. A pipeline is like
a)An automobile assembly line
b) house pipeline
c) both a and b
d) A gas line
6. Data hazards occur when
a) Greater performance loss
b) Pipeline changes the order of read/write access to operands
c) Some functional unit is not fully pipelined
d) Machine size is limited
7. Anti-dependence corresponds to _______ hazard?
a) RAW
b) WAR
c) WAW
d) None of the above
8. When multiple-instructions are overlapped during execution of program, then function
performed is called
a) Multitasking
b) Multiprogramming
c) Hardwired control
d) Pipelining
9. An instruction that does no operation for changing state is known as
a) Nope
b) No
c) No-op
d) Nop
10. Number of instructions being executed defines the
a) Instruction count
b) Hit time
c) Clock rate
d) All above
11. SIMD represents an organization that ______________.
a) refers to a computer system capable of processing several programs at the same time.
b) represents organization of single computer containing a control unit, processor unit and a
memory unit.
c) includes many processing units under the supervision of a common control unit
d) none of the above.
12. In access control in a protection derivation, visibility modes will change as follows:
(a) private, public and protected become protected
(b)only public becomes protected
( c) public and protected becomes protected
(d) only private becomes protected
18. Consider the following statements char *ptr; ptr=”hello”; cout<<*ptr; what will be
printed?
(a) first letter
(b) entire string
(c ) It is a syntax error
(d)last letter
21. A pointer
(a) implicitly points to an object
(b) can be explicitly used in a class
( c) can be used to return an object
(d)All of the above
A. 1 B. 3 C. 2 D. 5
A. 0 B. 1 C. -1 D. none of these
29. int main()
{
Int x,a,b; a=5,b=6;
x=!a&&b;
printf("%d",x);
return 0;
}
What will be printed when the above sample code is executed?
A. 0 B. 1 C. 2 D. None of these
30.
What will be the output?
int main()
{
int a=3, b=5, c=2;
x = (a>b) ?( (a>c) ? a : c ) : ((b>c) ? b : c);
printf("%d",x);
return 0;
}
32. The number of transactions executed in a given amount of time is called __________.
a) utilization b) throughput c) response time d) concurrency
time
34. Every view serializable schedule that is not conflict serializable has
a) clear writes b) blind writes c) blind rights d) no writes
43. The optimal solution to the following fractional knapsack problem instance is:
A. 35 B. 28.2 C. 31 D. 31.5
A. All successors of a visited node before any successors of any of those successors
B. A single path of the graph as far it can go
C. Graph using shortest path
D. None of these
46. To implement Dijkstra’s shortest path algorithm on unweighted graphs so that it runs in
linear time, the data structure to be used is:
A. Queue
B. Stack
C. Heap
D. B-Tree
47. Given a directed graph where weight of every edge is same, we can efficiently find
shortest path from a given source to destination using:
49. Time Complexity of Breadth First Search is? (V – number of vertices, E – number of
edges)
a) O(V + E)
b) O(V)
c) O(E)
d) O(V*E)
a) Is planar
b) Contains a circuit
c) Minimally connected
d) Completely connected
59. Controlling access to a network by analyzing the incoming and outgoing packets is
called
A. IP Filtering
B. Data Filtering
C. Packet Filtering
D. Firewall Filtering
60. The management of data flow between computers or devices or between nodes in a
network is called
A. Flow control
B. Data Control
C. Data Management
D. Flow Management
61. Which data communication method is used to transmit the data over a serial
communication link?
A. Simplex
B. Half-duplex
C. Full duplex
D. All of above
65. Two cards are drawn at random from a pack of 52 cards. The probability of these two
being aces is:
a) 1/26
b) 1/221
c) ½
d) none of those
Extra Question:
71. In quick sort, the number of partitions into which the file of size n is divided by a selected
record is
a. n
b. n - 1
c. 2
d. None of the above