Questions
Questions
1.{a(cd)^nb|n>=1}
2.{a(cd)^n>=1}U{b(cd)^n|n>=1}
3.{a(cd)^na|n>=0}U{a(cd)^nb|n>=0}U{b(cd)^na|n>=0}U{b(cd)^nb|n>=0}
4. {ac^nd^nb|n>=1}
Answer: 3
1.11101000
2.01111111
3.01001000
4. 00111111
Answer: 1
Answer: 2
Q4: A _________ registrar stores the intermediate arithmetic and logic results in it.
1.Address registrar
2. Program counter
3. Index registrar
4.Accumulator
Answer: 4
Q5: A class is a
1. Structure
2. Memory
3. Template
4. Function
Answer: 3
1. default constructor
2. parameterized constructor
3. none
4. overloading
Answer: 1
Answer: 3
Q8: A finite automata that will accept only string X of length n will have _________ many states
1.n
2. n/2
3. n+1
4. infinite
Answer: 3
Answer: 1
Answer: 2
Q11: A quadruple is a record structure with ______ fields.
1. 3
2. 4
3. 1
4. 2
Answer: 2
1. Zero addressing
2.Two-addressing
3.Indirect addressing
4. Index addressing
Answer: 1
Answer: 2
1. constant
2. non static
3. dynamic
4. static
Answer: 2
Q15: An LALR(1) parser for a grammar G can have shift-reduce (S-R) conflicts if and only if
Answer: 1
4. Secured Code
Answer: 3
Answer: 2
Answer: 2
1. integrated circuits
3. two-state systems
4. adapter cards
Answer: 2
1. {b^na^mc^p|n,m,p>=1}
2. {ba^nc|n>=0}
3. {ba^nc|n>=1}
Answer: 3
3. comparator
4. decoder
Answer: 4
Q22: Calculate the person months for a project that was completed in two months with two people
working on it.
1. 2
2. 4
3. 1
4. 8
Answer: 2
1. sizeof( int ) * 2
3. sizeof( int )
4. sizeof( float )
Answer: 3
Q24: class n{ int a=0;}obj; what will happen?
1. nothing
3. error
Answer: 2
1. deep copy
2. shallow copy
3. error
4. constructor
Answer: 2
1. error
2. 10
3. 1
4. 0
Answer: 1
1. 0
2. error
3. depends on compiler
4. 7
Answer: 2
Q28: Consider the regular language L = (111 + 11111)*. The minimum number of states in any DFA
1.3
2.5
3.8
4. 9
Answer: 4
Q29: Content of the program counter is added to the address part of the instruction in order to
2.register mode.
3. implied mode.
Answer: 2
Q30: Data Members of the base class that are marked private:
4. does exist in memory when the object of the derived class is created
Answer: 4
1. 1111
2.1101
3.1100
4.1110
Answer: 2
Q32: During a software development project two similar requirements defects were detected. One
was detected in the requirements phase, and the other during the implementation phase. Which of
1. There is no relationship between the phase in which a defect is discovered and its repair cost. .
2. The most expensive defect to correct is the one detected during the implementation phase.
3. The most expensive defect to correct is the one detected during the requirements phase.
Answer: 2
Q33: Effective software project management focuses on four P's which are
2. used in Windows OS
4. Indexed Allocation.
Answer: 2
1. helper
2. header
3. handy
4. helping
Answer: 2
1. type-1
2.type-3
3. type-0
4.type-2
Answer: 2
1.Boolean values
2.real integers
3. integers
4.whole numbers
Answer: 2
1. Use-case Diagram
2. Sequence Diagram
3. Class Diagram
4. Package Diagram
Answer: 1
Q40: Given an arbitrary non-deterministic finite automaton (NFA). with N states, the maximum
1.N^2
2.2N
3.2^N
4. N!
Answer: 2
Q41: Given the language L = {ab, aa, baa}, which of the following strings are in L*?
1) abaabaaabaa
2) aaaabaaaa
3) baaaaabaaaab
4) baaaaabaa
1.1, 2 and 3
2.2, 3 and 4
3.1, 2 and 4
4.1, 3 and 4
Answer: 3
1. not possible
3. constructor overriding
4. error
Answer: 2
Q43: How many DFAs exit with two state over the input alphabet (a,b)
1.16
2.26
3.32
4. 64
Answer: 4
Q44: How many possible outputs would a decoder have with a 6-bit binary input?
1. 16
2. 64
3. 128
4. 32
Answer: 2
Q45: How many select lines would be required for an 8-line-to-1-line multiplexer?
1. 2
2. 4
3. 3
4. 8
Answer: 3
1. three
2. four
3. five
4. six
Answer: 1
Q47: How many two state FA can be drawn over alphabet{0,1} which accepts(0+1)*
1.12
2.14
3.20
4. 15
Answer: 3
Q48: How will you free the allocated memory ?
1. delete(var-name);
2. dalloc(var-name);
3. free(var-name);
4. remove(var-name);
Answer: 3
1. for (; ; )
2. if (1)
3. break(0)
4. while(false)
Answer: 3
Q50: If a register containing binary data (11001100) is subjected to arithmetic shift left operation,
1. (10011000)
2.(11001100)
3.(1101100)
4.(10011001)
Answer: 1
Q51: If a university sets up web-based information system that faculty could access to record
1. intranet
2. ERP
3. extranet
4. CRM
Answer: 1
1.n+2
2.n+1
3.n
4. n-1
Answer: 2
1.n+2
2.n+1
3.n
4. n-1
Answer: 2
Q54: If there is a complete DFA M1 recognizing a language L1 and has m states out of which two
are final states then the machine M recognizing L1 complement will have _____________ final
states.
1.m+2
2.m
3.m-2
4. 2
Answer: 1
Q55: If X is the name of the class, what is the correct way to declare copy constructor of X?
1. X(class X* arg)
2. X(X& arg)
3. X(X* arg)
4. X(X arg)
Answer: 2
Q56: If you assign a default value to any variable in a function prototype's parameter list, then _____
1. all parameters to the left of that variable must have default values
2. all parameters to the right of that variable must have default values
3. all other parameters in the function prototype must have default values
Answer: 2
Q57: If you want to use a class to define objects in many different programs, you should define the
2. source
3. header
4. program
Answer: 3
4. No conversion is necessary
Answer: 2
Q59: In C++, dynamic memory allocation is accomplished with the operator ____
1. new
2. this
3. malloc
4. delete
Answer: 1
Q60: In C++, dynamic memory allocation is achieved with the operator _______
1. malloc()
2. delete
3. new
4. this
Answer: 3
Q61: In CMM, the life cycle activities of requirements analysis, design, code, and test are described
in
Answer: 1
1.9's complement
2. 2's complement
3.10's complement
4.1's complement
Answer: 2
Q63: In the types of Three-Address statements, copy statements of the form x := y means
Answer: 3
1. one for the primary functions and one for the auxiliary functions
2. one for the onlineexam.data and one for the private data
3. one for the void functions and one for the other functions
Answer: 4
Q65: Multiplication of a positive integer by a power of two can be replaced by left shift, which
executes faster on most machines. This is an example of
1. Useless Code
2. Strength Reduction
3. Induction Variable
4. Loop unwinding
Answer: 2
Q66: One can safely state that the output lines for a demultiplexer are under the direct control of the:
Answer: 1
1. Three arguments
2. Two arguments
3. No argument
4. One argument
Answer: 3
Answer: 4
Answer: 1
Answer: 2
1. inheritance
2. reusability
3. class
4. functions
Answer: 2
Q72: The Epsilon-Closure of any state q will contain the state ______________ irrespective of q.
1. p
2. Epsilon
3. q
4. Final State
Answer: 3
2. 0.0111
3. 0.0011
4. 0.1010
Answer: 0.0111
Q74: The call to the parameterized constructor of base class in the derived class
Answer: 4
Q75: The fundamental notions of software engineering does not account for ?
1. Software reuse
2. Software Security
3. Software Validation
4. Software processes
Answer: 3
3. Regular
4. Context-free
Answer: 4
Q77: The library function used to find the last occurrence of a character in a string is
1. strnstr()
2. strrchr()
3. laststr()
4. strstr()
Answer: 2
Answer: 2
1. private
2. protected
3. onlineexam./p>
4. mandatory to specify
Answer: 1
Q80: The minimum length for strings in the regular expression ( 10* + 001* )* is _________
1. Infinite
2. One
3. Zero
4. Two
Answer: 3
1. 10's Complement
2. 2's complement
3.Sign magnitude
4.I's complement
Answer: 2
Q82: The number of full and half-adders required to add 16-bit numbers is
4. 4 half-adders, 12 full-adders
Answer: 2
Q83: The number of states in a machine M recognizing L1UL2 will be __________________ where
1.m-n
2.m+n
3. m+n+1
4. n-m
Answer: 3
Q84: The number of states in a machine M recognizing L1UL2 will be __________________ where
1.m-n
2.m+n
3. m+n+1
4. n-m
Answer: 3
Q85: The number of states in DFA is -------- the number of states in NFA for the same Language.
1.Greater then
2. equal to
3.less then
Answer: 4
Q86: The processor 80386/80486 and the Pentium processor uses _____ bits address bus:
1.36
2.32
3.16
4. 64
Answer: 2
Q87: The set of all strings over the alphabet {a,b} (including epsilon} is denoted by
1.(a+b)^+
2.a^+b^+
3. a*b*
4.(a+b)*
Answer: 4
Q88: The set of fundamental assumptions about what products the organization should produce,
how and where it should produce them, and for whom they should be produced is
1. organizational culture.
2. behavioral model.
3. rational model.
4. agency theory.
Answer: 1
Q89: The set of fundamental assumptions about what products the organization should produce,
how and where it should produce them, and for whom they should be produced is
1. organizational culture.
2. behavioral model.
3. rational model.
4. agency theory.
Answer: 1
Q90: The special memory used to store the micro routines of a computer is ________.
1. Control table
2.Control store
3.Control mart
4. Control shop
Answer: 2
1. sequential circuits
2. complex circuits
3. combinational circuits
4. logic circuits
Answer: 1
Q92: The term m45 should be made up of at least _____ literals.
1. 6
2. 31
3. 4
4. 5
Answer: 1
Q93: The three key levels at which responsibility can be defined is at the ____,_______,____
Answer: nan
Q94: The while loop is referred to as a(n) _____ loop because the loop condition is tested at the
1. priming
2. pretest
3. initial
4. beginning
Answer: 2
Answer: 3
2. onlineexam.and private(private,protected,public)
Answer: 2
1. Actors
2. Objects
3. Data
4. Entities
Answer: 1
Q98: Variables inside parenthesis of functions declarations have _______ level access.
1. Local
2. Global
3. Module
4. Universal
Answer: 1
Answer: 2
Q100: WE RECEIVED "404 - PAGE NOT FOUND" MESSAGE, WHEN WE BROWSE THE WEB
PAGE. WHICH PROTOCOL PROVIDES THIS MESSAGE?
1.IGP
2. EGP
3.SNMP
4.ICMP
Answer: 3
Q101: What are the minimum number of 2-to-1 multiplexers required to generate a 2- input AND
1.1 and 2
2.1 and 3
3.1 and 1
4. 2 and 2
Answer: 1
Answer: 2
1. A Flip flop
2. A counter
Answer: 1
4. A flip flop
Answer: 1
Q105: What is the condition for setting the Overflow flag in status register?
Answer: 3
Q106: What is the maximum number of reduce moves that can be taken by a bottom-up parser for a
1. n/2
2. n-1
3. 2n-1
4. 2^n
Answer: 2
1. 50-20-30
2. 50-30-20
3. 30-40-30
4. 40-20-40
Answer: 4
1. no return type
2. int
3. void
4. float
Answer: 1
Q109: What is the status of the inputs S0, S1, and S2 of the 74151 eight-line multiplexer in order for
1. S0 = 1, S1 = 0, S2 = 1
2. S0 = 1, S1 = 1, S2 = 0
3. S0 = 0, S1 = 1, S2 = 0
4. S0 = 0, S1 = 0, S2 = 1
Answer: 1
Q110: What is true about constant member function of a class?
3. cannot modify values of its class data members which are mutable
Answer: 2
Q111: What will be the output of the following code #include void main() { int i; int a[3]=5; for
(i=2;i>=0;i--) { printf(?%d\n?,a[i]); } }
1. 0 0 5
2. 5 0 0
3. 5 garbage garbage
4. 5 null null
Answer: 1
2.Fetch cycle
3.Instruction cycle
Answer: 2
Q113: When FA M is given which recognizes language L and reverse of L is found by using M then
1.Two
2.Three
3.Only one
4. Any number
Answer: 3
Q114: When there is complete DFA with Five states out of which two are final states if F is modified
such that it recognizes complement of the original language then there will be at least
_________final states.
1.3
2.2
3.5
4. 7
Answer: 3
Q115: When there is more than one final state in the reduced FA, then its regular expression will
1. dot
2. binary +
3. star
4. unary +
Answer: 4
1. M1 OR M2
2. M1 AND M2
3. M2
4. M1
Answer: 2
Answer: 4
1. double funct(char x)
2. void funct();
3. char x();
Answer: 1
1.191.168.1.1/24
2.191.168.1.1/16
3.191.168.1.1/8
4. 191.168.1.1/4
Answer: 4
1. SMTPMP
2. IMAP
3. POP
4. SNMP
Answer: 4
Q121: Which of the following calls a function named displayName, passing it no actual arguments?
1. call displayName
2. call displayName ()
3. displayName
4. displayName()
Answer: 4
Q122: Which of the following conversion is not possible (algorithmically)?
4. nondeterministic TM to deterministic TM
Answer: 1
Q123: Which of the following derivations does a top-down parser use while parsing an input string?
1. Leftmost derivation
3. Rightmost derivation
Answer: 1
1. compare();
2. cmp();
3. stringcompare();
4. strcmp();
Answer: 4
Q125: Which of the following gives the memory address of a variable pointed to by pointer a?
1. a;
2. *a;
3. &a;
4. address(a);
Answer: 1
Q126: which of the following intermediate language can be used in intermediate code generation?
1. Quadraples
3. Triples
Answer: 2
Q127: Which of the following is a complete function?
2. int funct();
Answer: 4
Q128: Which of the following is a valid destructor of the class name "Country"
1. void ~Country()
3. int ~Country()
4. Country()
Answer: 4
Answer: 4
Q131: Which of the following is not a technology driver for an information system?
1. Collaborative technologies
3. Enterprise applications
4. Object technologies
Answer: 2
2. Friend Constructor
3. Default Constructor
4. Parametrized Constructor
Answer: 2
1. /*
2. //
3. <<
4. >>
Answer: 3
Q134: Which of the following is/are main parameters that you should use when computing the costs
Answer: 4
Q135: Which of the following language feature is not an access specifier in C++?
1. internal
2. protected
3. onlineexam./p> 4. private
Answer: 1
Q136: Which of the following regular expression denotes a language comprising of all possible
1. (aaa+ab+a)+(bbb+bb+a)
3.(aaa+bbb)*
4.(a+b+aa+bb+aba+bba)*
Answer: 2
1. r* s* = r* + s*
2. (r + s)* = (r*s*)*
3. (r + s)* = r* + s*
4. (r + s)* = r* s*
Answer: 4
4. static int a;
Answer: 2
Q139: Which of the following scheduling algorithm comes under preemptive scheduling?
1. FCFS
2. Round Robin
Answer: 2
Q140: Which of the following special symbol is allowed in a variable name?
1. _ (underscore)
2. - (hyphen)
3. | (pipeline)
4. * (asterisk)
Answer: 1
3. For R = R1R2 , L(R) is empty if and only if either L(R1) or L(R2) is empty.
4. If R = R1+ R2 , L(R) is empty if and only if both L(R1) and L(R2) are empty.
Answer: 3
1. If there is a PDA by acceptance state that accept L, then there is also a PDA by empty stack that
accept L
2. If there is a NPDA that accept L, then there is also a DPDA that accept L.
3. If there is a PDA by empty stack, then there is also a CFG G that accept L.
4. If there is a CFG G that accepts L, then there is also a PDA that accept L.
Answer: 1
4. For every non-deterministic Turing machine, there exists an equivalent deterministic Turing
machine.
Answer: 1
Q144: Which of the following suffices to convert an arbitrary CFG to an LL(1) grammar?
Q145: Which of the following ways are legal to access a class data member using this pointer?
1. this.x
2. *this.x
3. this->x
4. *this-x
Answer: 3. this->x
1. An LR(k) parser.
2. An LALR(k) parser
Answer: 4
Q147: Which one of the following is a valid project Key Performance Indicator (KPI)?
1. Master schedule.
2. Staff appraisals.
3. Management buy in.
4. Milestone achievement.
Answer: 4
Q148: Which one of the following is the correct way to declare a pure virtual function?
2. void Display(void) = 0;
Answer: 3
Q149: Which one of the following languages over alphabet {0,1} is described by the regular
expression:
(0+1)*0(0+1)*0(0+1)*?
2. The set of all strings that begin and end with either 0 or 1.
Q150: Which one of the following models is not suitable for accommodating any change?
2. RAD Model
3. Waterfall Model
4. Prototyping Model
Answer: 3
Q151: Which one of the following regular expressions over {0,1} denotes the set of all strings not
1.0*(11*0)*
2. 0*1*01
3.0*(10+1)*
4.0*1010*
Answer: 3
Q152: Which one of the following statements best defines the purpose of a Product Breakdown
Structure (PBS)?
1. To identify the health and safety strategies and procedures to be used on the project
2. To establish the extent of work required prior to project commissioning and the handover
3. To define how the products are produced by identifying derivations and dependencies
4. To define the hierarchy of deliverables that are required to be produced on the project
Answer: 4
Answer: 3
Q154: Write the regular expression to denote the language L over ? ={ a,b} such that all the string
1. a*b*
2. b*a*
3. (ab)*
4. (ba)*
Answer: 2
1.Von-Neuman architecture
2.RISC architecture
3.CISC architecture
4. Stack-organized architecture
Answer: 4
1.Octal code
2.Grey code
3.Binary code
4.Excess 3 code
Answer: 2
Q157: When used with an IC, what does the term "QUAD" indicate?
1.4 circuits
2.2 circuits
3.8 circuits
4.6 circuits
Answer: 1
1.1011
2.1111
3.0
4.1010
Answer: 1
Q159: Radix of binary number system is _____?
1.0
2.1
3.2
4.A&B
Answer: 3
1. is connected to Q
2.R is connected to Q
Answer: 4
Answer: 3
3.Temporary storage unit within the CPU having dedicated or general purpose use
Answer: 3
2.subtraction
3.multiplication
4.division
Answer: 3
Answer: 4
Q165: One operation that is not given by magnitude comparator
1.equal
2.less
3.greater
4.addition
Answer: 4
Q166: Automaton accepting the regular expression of any number of a ' s is:
1.a*
2.a
3.a*b*
4.abc
Answer: 1
Q167: Let L be a set accepted by a nondeterministic finite automaton. The number of states in
non-deterministic finite automaton is |Q|. The maximum number of states in equivalent finite
1.|Q|
2.2|Q|
Answer: 4
Q168: Number of final state require to accept Ph(phi) in minimal finite automata.
1.4
2.3
3.1
4.0
Answer: 4
Q169: The embedded c program is converted by cross compiler to
1.
the machine code corresponding to the processor of the PC used for application development
2.the machine code corresponding to a processor which is different from the processor of the PC
Answer: 2
1.(1*0)*1*
2.0 + (0 + 10)*
4.(0+1)*
Answer: 1
(1) For every non-deterministic Turing machine, there exists an equivalent deterministic Turing
machine.
(2) Turing recognizable languages are closed under union and complementation.
(3) Turing decidable languages are closed under intersection and complementation
(4) Turing recognizable languages are closed under union and intersection.
3.2 only
4.3 only
Answer: 3
1.
3.
4.
Answer: 2
Q173: What is the minimum number of states needed to a DFA over S= (a, b) which accept those
words from S such that the number of a is even and the number of b is divisible by three.
1.2 states
2.4 states
3.6 states
4.5 states
Answer: 3
L = ( x )* (x | y x ) ,
1.yx
2.xyx
3.x
4.x y x y x
Answer: 4
s---> as | bs| a | b
1.(a + b)
2.(a + b) (a + b)*
3.(a + b) (a + b)
4.(a + b) (a + b)(a + b) (a + b)
Answer: 2
1.Pumping Lemma
2.RE
3.MN Theorem
4.
Answer: 1
Q177: The minimum number of page frames that must be allocated to a running process in a virtual
Answer: 1
Q178: A computer has a 256 KByte, 4-way set associative, write back data cache with block size of
32 Bytes. The processor sends 32 bit addresses to the cache controller. Each cache tag directory
entry contains, in addition to address tag, 2 valid bits, 1 modified bit and 1 replacement bit. The size
1.11
2.14
3.27
4.16
Answer: 4
3.when it requests IO
4.None of mentioned
Answer: 1
Answer: 3
2.2
3.3
4.1
Answer: 3
X Y f(X,Y)
000
010
101
111
1.X
2.X+Y
3.X'Y'
4.Y
Answer: 1
Q183: Which of the following regular expression denotes a language comprising of all possible
1.(a+b+aa+bb+aba+bba)*
2.(aaa+bbb)*
4.(aaa+ab+a)+(bbb+bb+a)
Answer: 3
Answer: 3
Q185: Assume that a mergesort algorithm in the worst case takes 30 seconds for an input of size
64. Which of the following most closely approximates the maximum input size of a problem that can
be solved in 6 minutes?
Answer: 4
int main()
AI var=100;
printf("var=%d",var);
return 0;
1.var=100
2.var=AI
3.var=0
4.Error
Answer: 4
int main()
{
string myName="ABCDEFG";
printf("myName=%s (size=%d)",myName,sizeof(myName));
return 0;
1.myName=ABCDEFG(size=7)
2.Error
3.myName=ABCDEFG(size=4)
4.myName=ABCDEFG(size=8)
Answer: 3
int main()
AAA aaa=10;
BBB bbb=20;
CCC ccc=30;
DDD ddd=40;
printf("%d,%d,%d,%d",aaa,bbb,ccc,ddd);
return 0;
1.Error
2.10,10,10,10
3.10,20,30,40
4.AAA,BBB,CCC,DDD
Answer: 3
int main()
typedef struct
int empid;
int bsal;
}EMP;
EMP E={10012,15100};
printf("%d,%d",E.empid,E.bsal);
return 0;
}
Find the output
1.10012,15100
2.0,0
3.Error
4.10012,10012
Answer: A
void main()
for(var=0;var<=255;var++);
printf("%d ",var);
2.255
3.256
4.blank screen as output
Answer: 1
int main()
item |=MOBILE;
item |=LAPPY;
printf("Mobile, ");
printf("Lappy");
return 1;
}
1.I have purchased ...:
Answer: 2
int main()
char flag=0x0f;
printf("%d",flag);
return 0;
1.13
2.d
3.22
4.10
Answer: 1
Q194: #include <stdio.h>
int main()
int a=10;
int b=2;
int c;
printf("c= %d",c);
return 0;
1.c = 12
2.c = 10
3.c = 2
4.c = 0
Answer: 3
int main()
{
int a1=10,a2=20;
printf("%d...%d",FUN(a,1),FUN(a,2));
return 0;
1.Error
2.10...10
3.20...20
4.10...20
Answer: 4
int main()
int a=10,b=20,l=0;
l=LARGEST(a++,b++);
printf("a=%d,b=%d,largest=%d",a,b,l);
return 0;
}
Find the output
1.a=10,b=20,largest=20
2.a=11,b=21,largest=20
3.a=11,b=21,largest=21
4.a=11,b=22,largest=21
Answer: 4
int main()
#define MAX 20
printf("MAX=%d...",MAX);
return 0;
1.Error
2.MAx=100...
3.MAx=20...
4.MAX=10020
Answer: 3) 20
#define MAX 10
int main()
{ int array[MAX]={1,2,3},tally;
for(tally=0;tally< sizeof(array)/sizeof(int);tally+=1)
printf("%d ",*(tally+array));
return 0;
1.Error
2.1 3 4 5 6 7 8 9 10 11
3.1 2 3 0 0 0 0 0 0 0
4.0 0 0 0 0 0 0 0 0 0
Answer: 3)12300000
#define MAX 99
int main()
{
printf("%d...",MAX);
#undef MAX
printf("%d",MAX);
return 0;
1.99...0
2.99...99
3.Error
4.MAX...MAX
Answer: 3
int main()
printf("%s",TEXT);
return 0;
}
Find the output
1.IncludeHelp
2.TEXT
3.Error
4.TEXT IncludeHelp
Answer: 3) error
#define TRUE 1
int main()
if(TRUE)
printf("1");
printf("2");
else
printf("3");
printf("4");
return 0;
1.1
2.Error
3.2
4.12
Answer: 2)error
#define TRUE 1
int main()
int loop=10;
1.Hello
int main()
printf("%d",VAR1);
return 0;
1.VAR2+10
2.VAR1+20
3.Error
4.10
Answer: 3)error
struct student
char name[20];
}std;
strcpy(tempStd->name,"Thomas");
return tempStd->name;
int main()
strcpy(std.name,"Mike ");
printf("%s%s",std.name,fun(&std));
return 0;
1.Mike Thomas
2.Mike Mike
3.ThomasThomas
4.ThomasMike
Answer: 3
#include <string.h>
int main()
char s1[]="IncludeHelp";
char s2[10];
strncpy(s2,s1,5);
printf("%s",s2);
return 0;
1.Inclu
2.IncluGARBAGE_VALUE
3.Error
4.IncludeHelp
Answer: 1
#include <string.h>
int main()
char str1[]="IncludeHelp",str2[]=".Com";
printf("%s",str1+strlen(str2));
return 0;
1.IncludeHelp.Com
2.udeHelp
3.Error
4.IncludeHelp4
Answer: 2
#include <string.h>
int main()
char str[50]="IncludeHelp";
printf("%d...%d",strlen(str),sizeof(str));
return 0;
1.50...5011...50
2.11...50
3.11...11
4.50...11
Answer: 2
#include <string.h>
int main()
int val=0;
char str[]="IncludeHelp.Com";
val=strcmp(str,"includehelp.com");
printf("%d",val);
return 0;
1.0
2.1
3.-1
4.Error
Answer: -1
#define OFF 0
int a=11;
#endif
int main()
int b=22;
printf("%d...%d",a,b);
return 0;
1.11...22
2.Error
3.11...11
4.22...22
Answer: 1
Q210: #include <stdio.h>
int main()
char x=(char)(text+3);
printf("%c\n",x);
return 0;
1.Garbage
2.B
3.Error
4.Null
Answer: 3
int main()
printf("%c\n",x);
return 0;
1.Garbage
2.B
3.Error
4.Null
Answer: B
int main()
int anyVar=10;
printf("%d",10);
return 0;
2.10
4.No output
Answer: 10
int main()
int x=2.3;
printf("%d,%d\n",c1,c2);
return 0;
1.Error
2.2.3,2
3.2.3000000,2
4.2,2
Answer: 2,2
struct sample
int a;
}sample;
int main()
sample.a=100;
printf("%d",sample.a);
return 0;
1.0
2.100
3.ERROR
4.arning
Answer: 100
char* fun1(void)
char str[]="Hello";
return str;
char* fun2(void)
char *str="Hello";
return str;
int main()
printf("%s,%s",fun1(),fun2());
return 0;
1.ERROR
2.Hello,Hello
3.Hello,Garbage
4.Garbage,Hello
Answer: 4
char* strFun(void)
char *str="IncludeHelp";
return str;
int main()
char *x;
x=strFun();
return 0;
3.Error
4.No output
Answer: 2
int fooo(void)
num++;
return num;
int main()
int val;
val=fooo();
printf("step1: %d\n",val);
val=fooo();
printf("step2: %d\n",val);
val=fooo();
printf("step3: %d\n",val);
return 0;
1.step1: 1
step2: 1
step3: 1
2.step1: 1
step2: 2
step3: 3
3.step1: 0
step2: 0
step3: 0
4.ERROR
Answer: 2
int main()
#ifdef debug
printf("Start debugging...");
#endif
printf("IncludeHelp");
return 0;
1.Start debugging...IncludeHelp
2.IncludeHelp
3.Error
4.debug
Answer: 2
int main()
{ int a[5]={0x00,0x01,0x02,0x03,0x04},i;
i=4;
while(a[i])
printf("%02d ",*a+i);
--i;
return 0;
1.00 01 02 03 04
2.04 03 02 01 00
3.04 03 02 01
4.01 02 03 04
Answer: 3
int main()
{ int a[5]={1,2,3,4,5},b[5]={10,20,30,40,50},tally;
for(tally=0;tally< 5;++tally)
*(a+tally)=*(tally+a)+ *(b+tally);
for(tally=0;tally< 5;tally++)
printf("%d ",*(a+tally));
return 0;
1.1 2 3 4 5
2.10 20 30 40 50
3.11 22 33 44 55
4.Error
Answer: 3
Q221: #include <stdio.h>
int main()
printf("%d...%d",*array,*(array+3)* *array);
return 0;
1.Error
2.10...40
3.10...300
4.10...400
Answer: 4
int main()
printf("%c,%c,%c\n",*(x+tally)+1,x[tally]+1,*(tally+x)+1);
return 0;
}
Find the output
1.Error
2.A,A,A
B,B,B
C,C,C
D,D,D
E,E,E
3.B,B,B
C,C,C
D,D,D
E,E,E
F,F,F
4.E,E,E
D,D,D
C,C,C
B,B,B
A,A,A
Answer: 3
int main()
char result,str[]="\0IncludeHelp";
result=printf("%s",str);
if(result)
printf("TRUE");
else
printf("FALSE");
return 0;
1.\0IncludeHelpTRUE
2.\0IncludeHelpFALSE
3.Error
4.FALSE
Answer: 4
int main()
char str[8]="IncludeHelp";
printf("%s",str);
return 0;
}
Find the output
1.IncludeHelp
2.IncludeH
3.Error
4.No output
Answer: 3
int main()
char str[]="Hello%s%dFriends";
printf(str);
printf("\n");
printf("%s",str);
return 0;
1.HelloFriends
HelloFriends
2.Hello%s%dFriends
Hello%s%dFriends
3.Hello(null)0Friends
Hello%s%dFriends
4.Garbage value
Answer: 3
int main()
int a='7';
str[11]='c';
printf(str,a);
return 0;
1.value is = %d
2.value is = %c
3.value is = 55
4.value is = 7
Answer: 4
int main()
char X[10]={'A'},i;
printf("%d ",X[i]);
return 0;
1.A 0 0 0 0 0 0 0 0 0
2.A
3.A 32 32 32 32 32 32 32 32 32
4.Error
Answer: 1
Q228: #include <stdio.h>
int main()
char *str="IncludeHelp";
printf("%c\n",*&*str);
return 0;
1.Error
2.IncludeHelp
3.I
4.*I
Answer: 3
int main(){
float a=125.50;
int b=125.50;
char c='A';
printf("%d,%d,%d\n",sizeof(a),sizeof(b),sizeof(125.50));
printf("%d,%d\n",sizeof(c),sizeof(65));
return 0;
1.4, 4, 4
1, 4
2.4, 4, 8
1, 1
3.4, 4, 4
1, 1
4.4, 4, 8
1, 4
Answer: 4
int main()
printf("%s","Condition is true.");
else
printf("%s","Condition is false.");
return 0;
}
Find the output
1.Condition is True
2.Condition is False
3.No output
4.Error
Answer: 1
int main()
int a=10;
if(10L == a)
printf("10L");
else if(10==a)
printf("10");
else
printf("0");
return 0;
2.10L
3.10L10
4.Error
Answer: 2
int main()
int a=10;
if(a==10)
printf("Hello...");
break;
printf("Ok");
else
printf("Hii");
return 0;
2.Hello...OK
3.OK...
4.Error
Answer: 4
int main()
int a=15;
float b=1.234;
printf("%*f",a,b);
return 0;
1.1.234
2.1.234000
3. 1.234000
4.Error
Answer: 1.234
Q234: #include <stdio.h>
int main()
int i;
if(i*i > 30 )
goto lbl;
else
printf("%d",i);
lbl:
printf("IHelp ");
return 0;
3.1IHelp
4.Error
Answer: 1
int main()
int MAX=10;
int array[MAX];
return 0;
1.size of array is = 20
2.size of array is = 40
3.size of array is = 4
4.Error
int main()
{
int pn=100;
if(pn>20)
if(pn<20)
printf("Heyyyyy");
else
printf("Hiiiii");
return 0;
1.No output
2.Hiiiii
3.Heyyyyy
4.HeyyyyyHiiiii
Answer: 2
int main()
int var=100;
int var=200;
printf("%d...",var);
printf("%d",var);
return 0;
1.ERROR
2.200...200
3.100...100
4.200...100
Answer: 4
int main()
int var=250;
200+50;
"includehelp.com";
printf("%s\n","includehelp");
return 0;
}
Find the output
includehelp.com
includehelp
3.Error
Garbage
Answer: 2
int main()
int iVal;
char cVal;
iVal=50; cVal=65;
ptr=&iVal;
ptr=&cVal;
printf("value =%d,size= %d\n",*(char*)ptr,sizeof(ptr));
return 0;
1.Error
2.value =50,size= 4
value =65,size= 4
3.value =50,size= 4
value =65,size= 1
4.Garbage value
Answer: 2
int main()
int count=0;
var[++count]=++count;
for(count=0;count<5;count++)
printf("%d ",var[count]);
return 0;
1.0 1 0 0 0
2.0 2 0 0 0
3.0 0 2 0 0
4.0 0 0 0 0
Answer: 3
int main()
struct sample{
int a;
int b;
sample *s;
}t;
printf("%d,%d",sizeof(sample),sizeof(t.s));
return 0;
}
1.12, 12
2.12, 0
3.Error
4.12, 4
Answer: 3
int main()
struct std
char name[30];
int age;
};
}
Find the output
4.Error
Answer: 1
int main()
char str[10];
int a;
}har;
har h1,h2={"IHelp",10};
h1=h2;
h1.str[1]='h';
printf("%s,%d",h1.str,h1.a);
return 0;
}
Find the output
1.ERROR
2.IHelp, 10
3.IHelp, 0
4.Ihelp, 10
Answer: 4
int main()
union test
int i;
int j;
};
printf("%d,%d\n",var.i,var.j);
2.10,0
3.0,10
4.Error
Answer: 4
int main()
union values
int intVal;
char chrVal[2];i
};
val.chrVal[0]='A'; val.chrVal[1]='B';
printf("\n%c,%c,%d",val.chrVal[0],val.chrVal[1],val.intVal);
return 0;
2.A,B,16961
3.B,B,66
4.A,A,65
Answer: 2
int main()
union values
unsigned char a;
unsigned char b;
unsigned int c;
};
val.a=1;
val.b=2;
val.c=300;
printf("%d,%d,%d",val.a,val.b,val.c);
return 0;
}
Find the output
1.44,44,300
2.1,2,300
3.2,2,300
4.256,256,300
Answer: 1
int main()
void *ptr;
++ptr;
printf("%u",ptr);
return 0;
1.2004
2.2001
3.2000
4.ERROR
Answer: Answer is 1, B option seems most relevant
struct employee{
int empId;
char *name;
int age;
};
int main()
return 0;
4.Error
Answer: 3
void main()
int a=2;
switch(a)
printf("Message\n");
default:
printf("Default\n");
case 2:
printf("Case-2\n");
case 3:
printf("Case-3\n");
1.Case-2
2.Message
3.Message
Case-2
4.Case-2
Case-3
Exit from switch
Answer: 4
void main(){
int j;
for(j=0;j<=5;j+=2)
switch(j){
case 1:
staticVar++;
break;
case 2:
staticVar+=2;
case 4:
staticVar%=2;
j=-1;
continue;
default:
--staticVar;
continue;
printf("%d",staticVar);
}
Find the output
1.0
2.1
3.2
4.Error
Answer: 1)0
void main(){
int a=0;
a=5||2|1;
printf("%d",a);
1.2
2.1
3.0
4.8
Answer: 2)1
Q252: #include <stdio.h>
void main(){
int a=1;
switch(a/2)
case NULL:
printf("Case NULL\n");
break;
case 0:
printf("Case ZERO\n");
break;
default:
printf("DEFAULT\n");
break;
1.Case NULL
2.Case ZERO
3.Case DEFAULT
4.Error
Answer: 4
Q253: #include <stdio.h>
void main()
int a=2;
int b=a;
switch(b)
case a:
printf("Case-a\n"); break;
case 3:
printf("Case-3\n"); break;
default:
1.Case-2
3.Message
Case-2
4.Case-2
Case-3
void main()
int cnt=1;
while(cnt>=10)
printf("%d,",cnt);
cnt+=1;
printf("\n");
2.1,
4.11
Answer: 1
void main()
int i,j,charVal='A';
for(i=5;i>=1;i--)
for(j=0;j< i;j++)
printf("%c ",(charVal+j));
printf("\n");
1.A B C D E
ABCDE
ABCDE
ABCDE
ABCDE
2.A B C D
ABCD
ABCD
ABCD
3.A B C D
ABC
AB
4.A B C D E
ABCD
ABC
AB
Answer: 4.A B C D E
ABCD
ABC
AB
void main()
int i=1;
while (i<=5)
printf("%d",i);
if (i==5)
goto print;
i++;
fun()
print:
printf("includehelp.com");
1.Error
2.12345includehelp.com
3.1234includehelp.com
Answer: 1.Error
void main(){
int intVar=20,x;
x= ++intVar,intVar++,++intVar;
4.ERROR
void main()
int tally;
for(tally=0;tally<10;++tally)
printf("#");
if(tally>6)
continue;
printf("%d",tally);
}
Find the output
1.#0#1#2#3#4#5#6###
2.#0#1#2#3#4#5#6#7#8#9#10
3.#0#1#2#3#4#5##7#8#9#10
4.#0#1#2#3#4#5#
Answer: 1.#0#1#2#3#4#5#6###
void main(){
printf("%d",c);
1.34
2.290
3.Garbage value
4.Error
Answer: 1.34
void main()
char cnt=0;
for(;cnt++;printf("%d",cnt)) ;
printf("%d",cnt);
3.0
4.1
Answer: 4.1
#include <string.h>
int main()
{
char str[];
strcpy(str,"Hello");
printf("%s",str);
return 0;
1.Hello
2.Error
3.NULL
4.NO OUTPUT
Answer: 2.Error
Q262: #include
int main()
SUM(10,20);
return 0;
2.10,20
3.Error
4.sum=0
Answer: 1.sum=30
Q263: #include
int main()
char ch=10;
void *ptr=&ch;
printf("%d,%d",*(char*)ptr,++(*(char*)ptr));
return 0;
1.11, 11
2.10, 11
3.Error
4.10, 10
Answer: 1.11,11
Q264: #include
int main()
char ***pp;
pp=sptr;
++pp;
printf("%s",**++pp+2);
return 0;
1.BBBBB
2.CCCCC
3.BBB
4.Error
Answer: 3.BBB
Q265: #include
int main()
{
int a=10,b=2;
int *pa=&a,*pb=&b;
return 0;
1.5
2.5.0
3.ERROR
4.No output
Answer: 3.ERROR
Q266: #include
*ptr=100;
int main()
int num=50;
int *pp=#
fun(& *pp);
printf("%d,%d",num,*pp);
return 0;
1.100,100
2.50,50
3.50,100
Q267: #include
int main()
int val=0;
val=128/FUN(8);
printf("val=%d",val);
return 0;
2.12864
3.40
4.1
Q268: #include
int main ()
int **ptr=p;
ptr++;
1.43
2.140
3.89
4.78
Answer: 2.14
Q269: #include <stdio.h>
#define TRUE 1
int main()
switch(TRUE)
printf("Hello");
1.Hello
2.ERROR
3.No output
4.Garbage
Answer: 3. No output
enum numbers
};
void main()
printf("%d,%d,%d,%d,%d,%d,%d,%d,%d",zero,one,two,three,four,five,six,seven,eight);
}
1.0, 1, 2, 3, 3, 4, 5, 0, 1
2.0, 1, 2,3,3,1,2,3,4
3.0,1,2,3,3,1,2,3,4
4.0, 1, 2, 3, 3, 4, 5, 0, 9
Answer: 1.0,1,2,3,3,4,5,0,1
int main(){
char val=250;
int ans;
printf("%d",ans);
return 0;
1.-5
2.-6
3.0
4.6
Answer: 2.-6
int main()
float a,b;
a=3.0f;
b=4.0f;
printf("%.0f,%.1f,%.2f",a/b,a/b,a/b);
return 0;
Answer: 1.1,0.8,0.75
int main(){
float a;
(int)a= 10;
printf("value of a=%d",a);
return 0;
1.value of a=10
2.value of a=10.000000
3.value of a=0
4.L-Value required
int main()
int i=-1,j=-1,k=0,l=2,m;
m=i++&&j++&&k++||l++;
printf("%d %d %d %d %d",i,j,k,l,m);
return 0;
1.0 0 1 2 1
2.0 0 1 3 2
3.0 0 1 3 1
4.0 1 1 3 1
Answer: 3.0 0 1 3 1
int main()
int intVar=24;
printf("%d,%d",intVar,x);
return 0;
1.24, 24
2.24, 0
int main()
int ok=-100;
-100;
printf("%d",ok);
return 0;
1.0
2.-100
3.100
4.Error
Answer: 2.-100
int main()
int var;
var=- -10;
var=+ +10;
printf("value of var= %d\n",var);
return 0;
1.ERROR
value of var= 10
3.value of var= 10
value of var= 10
4.value of var= 10
value of var= 11
value of var= 10
int main(){
int x;
x=100,30,50;
printf("x=%d\n",x);
x=(100,30,50);
printf("x=%d\n",x);
return 0;
1.x=100
x=100
2.x=100
x=50
3.x=50
x=50
4.x=50
x=100
Answer: 2.x=100
x=50
void main()
int a=10;
switch(a){
case 5+5:
printf("Hello\n");
default:
printf("OK\n");
}
}
1.Hello
2.OK
3.Hello
OK
4.Error
Answer: 3. Hello OK
void main()
var+=2;
var++;
1.var : E, 69
2.var : E, 68
3.var : D, 69
4.var : D, 68
Answer: 1.var : E , 69
void main()
int a=2;
switch(a/2*1.5)
case 1:
printf("One...");
break;
case 2:
printf("Two...");
break;
default:
printf("Other...");
break;
2.Two...
3.Other...
4.Error
Answer: 4.Error
void main()
short a=2;
switch(a)
case 1L:
printf("One\n");
break;
case 2L:
printf("Two\n");
break;
default:
printf("Else\n");
break;
2.Two
3.Else
4.Error
Answer: 2.TWO
void main()
short day=2;
switch(day)
printf("%d nd",day);
break;
default:
printf("%d th",day);
break;
1.2 nd
2.22 nd
3.Error
4.2 nd
22 nd
Answer: 3.Error
int main(){
int a,b,c;
a=0x10; b=010;
c=a+b;
return 0;
1.Addition is = 20
2.Addition is = 24
3.Addition is = Garbage
4.Error
void main()
int x;
x= (printf("AA")||printf("BB"));
printf("%d",x);
printf("\n");
x= (printf("AA")&&printf("BB"));
printf("%d",x);
1.AABB1
AABB1
2.1
3.AABB1
AA1
4.AA1
AABB1
Answer: 4.AA1
AABB1
Q286: $a = array( null => 'a', true => 'b', false => 'c', 0 => 'd', 1 => 'e', '' => 'f' ); echo count($a), "\n";
Answer: 2.3
Q287: $a = array(); if ($a[1]) null; echo count($a), "\n"; What will be printed?
Answer: 1
Q288: What is the most common approach for the development of application system now?
1.Incremental development
2.Agile
3.Waterfall
1.RAW
2.CHAR
3.NUMERIC
4.VARCHAR
Answer: 1.RAW
1.infrastructure mode
2.ad-hoc mode
4.none
4.Can't predict
x = ~-y;
w = x = y = z;
q = a?b:c?d:e?f:g;
q = a?b:(c?d:(e?f:g));
2.x = a?b:(c?d:(e?f:g));
q = ~(-y); w = (x = (y = z));
q = a?b:(c?d:(e?f:g));
q = (c?d:(e?f:g));
q = a?b:(c?d:(e?f:g));
In order to check if the pattern matches with the string "text", the statement is
1.text==pattern
2.text.equals(pattern)
3.text.test(pattern)
4.pattern.test(text)
Answer: 4.pattern.test(text)
1.Partial Key
2.Candidate Key
3.Surrogate Key
4.Unique Key
Q295: ----------- is a built - in JavaScript function which can be used to execute another function after
Answer: 3.setTimeout ( )
1.alter
2.update
3.set
4.create
Answer: 1.alter
1.Constraints
2.Stored Procedure
3.Triggers
4.Cursors
Answer: 1.Constraints
1.very low
2.low
3.moderate
4.high
Answer: 4.high
Q299: 8086 microprocessor is interfaced to 8253 a programmable interval timer. The maximum
Answer: 1.216
1.User Interfaces
2.Web Services
4.Embedded Sofftware
Q301: 1. Graphical representation of the project, showing each task and activity as horizontal bar
whose length is proportion to time taken for a completion of that activity is called
3.Pert Chart
4.Time Line
Answer: 1.Gantt Chart
2.Defects are more likely to arise after software has been used often
Q303: 1. The 40-20-40 rule suggests that the least amount of development effort can be spent on
3.Coding
4.Testing
Answer: 3.Coding
Q304: 1. The prototyping model of software development is
Answer: 2
1.component analysis
2.requirements modification
3.system validation
4.system design
2.Requirements validation
3.System models
4.Architectural design
3.You find out what services are required from the system
4. none
Answer: 3
2. replacement systems are easily developed with full features that clients expected from the old
system
3. Customers can use prototypes and gain experience that informs their requirements for later
systems
Answer: 3
4.all
Answer: 4.all
Q310: 1. What is the type of software design that defines interfaces between system components?
1. architectural design
2.Interface Design
3. component Design
4.database design
Answer: 3
Q311: The size of the data count register of a DMA controller is 16 bits. The processor needs to
transfer a file of 29,154 kilobytes from disk to main memory. The memory is byte addressable. The
minimum number of times the DMA controller needs to get the control of the system bus from the
1.454
2.455
3.456
4.457
Answer: 3
Q312: For which of the following flip-flop the output clearly defined for all combinations of two
inputs?
3.J K flip-flop
4.T flip-flop
Answer: 3
1.Next State
2.Present State
3.Previous State
4.D State
Answer: 4
Q314: A computer system implements 8 kilobyte pages and a +32-bit physical address space. Each
page table entry contains a valid bit, a dirty bit, three permission bits, and the translation. If the
maximum size of the page table of a process is 24 megabytes, the length of the virtual address
1.33
2.35
3.34
4.36
Answer: 4
1.Mapping
2.Graphing
3.T-map
4.Karnaugh-Map
Answer: 4
Q316: A processor can support a maximum memory of 4 GB, where the memory is
word-addressable (a word consists of two bytes). The size of the address bus of the processor is at
2.31
3.32
4.33
Answer: 2
1.Indirect addressing
2.Two-addressing
3.Zero addressing
4.Index addressing
Answer: 3
Q318: A 4-way set-associative cache memory unit with a capacity of 16 KB is built using a block
size of 8 words. The word length is 32 bits. The size of the physical address space is 4 GB. The
number of bits for the TAG field is
1.19
2.20
3.21
4.22
Answer: 2
1.Encoder
2.Decoder
3.Comparator
Answer: 2
Q320: A Program Counter contains a number 825 and address part of the instruction contains the
number 24. The effective address in the relative address mode, when an instruction is read from the
memory is
1.849
2.850
3.801
4.802
Answer: 2
Answer: 4
Q322: Consider a 6-stage instruction pipeline, where all stages are perfectly balanced.Assume that
pipeline, the speedup achieved with respect to non-pipelined execution if 25% of the instructions
1.1
2.2
3.4
4.5
Answer: 3
Q323: Consider a join (relation algebra) between relations r(R)and s(S) using the nested loop
method. There are 3 buffers each of size equal to disk block size, out of which one buffer is
3.Join selection factor between r(R) and s(S) is more than 0.5
4.Join selection factor between r(R) and s(S) is less than 0.5.
Answer: 1
Q324: Consider a main memory system that consists of 8 memory modules attached to the system
bus, which is one word wide. When a write request is made, the bus is occupied for 100
nanoseconds (ns) by the data, address, and control signals. During the same 100 ns, and for 500 ns
thereafter, the addressed memory module executes one cycle accepting and storing the data. The
(internal) operation of different memory modules may overlap in time, but only one request can be
on the bus at any time. The maximum number of stores (of one word each) that can be initiated in 1
millisecond is
1.5535
2.65335
3.53892
4.10000
Answer: 4
Q325: Consider two processors P1 and P2 executing the same instruction set. Assume that under
identical conditions, for the same input, a program running on P2 takes 25% less time but incurs
20% more CPI (clock cycles per instruction) as compared to the program running on P1 If the clock
1.1.5
2.1.6
3.1.7
4.1.8
Answer: 2
Q326: Content of the program counter is added to the address part of the instruction in order to
4.implied mode
Answer: 1
Q327: How many address bits are needed to select all memory locations in the 16K x 1 RAM?
1.8
2.10
3.14
4.16
Answer: 3
Q328: If the associativity of a processor cache is doubled while keeping the capacity and block size
Answer: 4
Q329: If the main memory is of 8K bytes and the cache memory is of 2K words. It uses associative
1.11 bits
2.21 bits
3.16 bits
4.20 bits
Answer: 3
Q330: If two interrupts, one of higher priority and other of lower priority occur simultaneously, then
Answer: 2
1.binary sequence
2.gray code
3.binary variables
4.BCD code
Answer: 2
Answer: 3
1.X + Y + Z
2.XY + YZ
3. X + YZ
4.XZ + Y
Answer: 3
Q334: The 16-bit 2's complement representation of an integer is 1111 1111 1111 0101, its decimal
representation is
1.1
2.2
3.3
4.-11
Answer: 4
Q335: The addressing mode used in an instruction of the form ADD R1, R2 is _____.
1.Absolute
2.Indirect
3.Index
4.Register
Answer: 1
Q336: The capacity of a memory unit is defined by the number of words multiplied by the number of
bits/word. How many separate address and data lines are needed for a memory of 4 K x 16?
Answer: 4
Answer: 4
Q338: The Firmware are stored in read-only memory or ________ chips.
1.Flash memory
3.EEPROM
4.Random-access memory
Answer: 3
Q339: The performance of cache memory is frequently measured in terms of a quantity called
1.hit ratio
2.miss ratio
3.average ratio
4.ratio
Answer: 1
Q340: The smallest integer than can be represented by an 8-bit number in 2?s complement form is
1. -256
2.-128
3.-127
4.1
Answer: 2
Answer: 3
Q342: The rate at which a computer clock deviates from a perfect reference clock is called as
1.Clock rate
2.Clock speed
4.Transmission Bandwidth
Answer: 3
Q343: The width of the physical address on a machine is 40 bits. The width of the tag field in a 512
1.21
2.22
3.23
4.24
Answer: 4
Q344: To build a mod-19 counter the number of flip-flops required is
1.3
2.5
3.7
4.9
Answer: 2
1.69282
2.69272
3.69252
4. 69232
Answer: 1
Q346: What is the main difference between traps and interrupts?
Answer: 1
2.Fetch cycle
3.Instruction cycle
Answer: 2
Q348: Which amongst the following refers to Absolute addressing mode
1.move R1, R2
3.move LOC1, R2
4.move LOC2, R1
Answer: nan
Q349: Which level of RAID refers to disk mirroring with block striping?
1.RAID level 1
2.RAID level 2
3.RAID level 0
4.RAID level 3
Answer: 1
Q350: Which of the following logic expression is incorrect?
1.1 0 = 1
2.1 1 0 =1
3.1 1 1 = 1
4.1 1 = 0
Answer: 2
Q351: Which of the following paging algorithms is most likely to be used in a virtual memory
system?
1.FIFO
2.Second chance
Q352: Which one of the following connects high-speed high-bandwidth device to memory
1.expansion bus
2.PCI bus
3.SCSI bus
Answer: 2
1.Distributed parity
2.No Parity
Answer: 1
Q354: Which two RAID types use parity for data protection?
1.RAID 1
2.RAID 4
3.RAID 1+0
4.RAID 5
1.-10111
2.-10011
3.-10001
4.-11001
Answer: 3
Q356: The minimum number of NAND gates required to implement the Boolean function. A + AB' +
AB'C is equal to
1.Zero
2.1
3.4
4.7
Answer: 1
Q357: Which of the following boolean expressions is not logically equivalent to all of the rest ?
2.a (b + c) + cd
3.ab + ac + (cd)'
4.bd' + c'd' + ab + cd
Q358: Which of the following unit will choose to transform decimal number to binary code ?
1.Encoder
2.Decoder
3.Multiplexer
4.Counter
Answer: 1
Q359: If the associativity of a processor cache is doubled while keeping the capacity and block size
Answer: 4
Q360: The correspondence between the main memory blocks and those in the cache is given by
1.Hash function
2.Mapping function
3.Locale function
4.Assign function
Answer: 2
Q361: The stage delays in a 4-stage pipeline are 800, 500, 400 and 300 picoseconds. The first
stage (with delay 800 picoseconds) is replaced with a functionally equivalent design involving two
stages with respective delays 600 and 350 picoseconds. The throughput increase of the pipeline is
__________ percent.
1.33
2.34
3.35
4.32
Q362: What is the software that runs a computer, including scheduling tasks, managing storage,
1.driver
2.application suitex
3.operating system
4.bluetooth technology
Answer: 3
Q363: For an undirected graph with n vertices and e edges, the sum of the degree of each vertex
isequal to
1.2n
2.(2n-1)/2
3.2e
4.pow(e,2)/2
Answer: 3
1.higher-age
2.increase-age
3.max-age
4.lifetime
Answer: 3
1.Internal Style
2.Inline Style
3.External Style
4.Default
1.Web 1.0
2.Web 2.0
3.Web 3.0
4.Web 4.0
Q367: A priority queue is implemented as a Max-Heap. Initially, it has 5 elements. The level-order
traversal of the heap is: 10, 8, 5, 3, 2. Two new elements 1 and 7 are inserted into the heap in that
order. The level-order traversal of the heap after the insertion of the elements is:
1.10, 8, 7, 3, 2, 1, 5
2. 10, 8, 7, 2, 3, 1, 5
3.10, 8, 7, 1, 2, 3, 5
4.10, 8, 7, 5, 3, 2, 1
Answer: 4. 10, 8, 7, 3, 2, 1, 5
Q368: A binary tree in which if all its levels except possibly the last, have the maximum number of
nodes and all the nodes at the last level appear as far left as possible, is known as
2.AVL tree
3.threaded tree
Q369: A binary tree T has 20 leaves. The number of nodes in T having two children is
1.34
2.99
3.7
4.19
fork ();
fork ();
fork ();
1.3
2.4
3.7
4.8
Q372: An object of class A receives a message with an argument that is an instance of class B.
Identify the type of relationship between class A and Class B:
1.Generalization
2.Association
3.Aggregation
4.Realization
Answer: nan
Q373: Consider an undirected graph G where self-loops are not allowed. The vertex set of G is {(i,
j): 1 = i = 12, 1 = j = 12}. There is an edge between (a, b) and (c, d) if |a - c| = 1 and |b - d| = 1. The
1.505
2.506
3.507
4.508
Answer: 2. 506
Q374: Consider an undirected random graph of eight vertices. The probability that there is an edge
between a pair of vertices is 1/2 . What is the expected number of unordered cycles of length
three?
1.1/8
2.1
3.7
4.8
int f(int j)
int k;
if (i == j)
printf("something");
k = f(i);
return 0;
else return 0;
4.The function will exhaust the runtime stack or run into an infinite loop when j = 50.
Answer: 4. The function will exhaust the runtime stack or run into an infinite loop when j = 50
putchar (*a);
1.ABCD EFGH
2.ABCD
3.HGFE DCBA
4.DCBA
Answer: 4. DCBA
Q377: Consider the following New-order strategy for traversing a binary tree:
The New-order traversal of the expression tree corresponding to the reverse polish expression 3 4 *
5 - 2 ? 6 7 * 1 + - is given by:
1.+ - 1 6 7 * 2 ? 5 - 3 4 *
2.. - + 1 * 6 7 ? 2 - 5 * 3 4
3.- + 1 * 7 6 ? 2 - 5 * 4 3
4.. 1 7 6 * + 2 5 4 3 * - ? -
Answer: 3. - + 1 * 7 6 ^ 2 - 5 * 4 3
Q378: Consider the following program:
if (n <= 1) return 0;
int main()
printf("%d", f(a,5));
1.2
2.1
3.3
4.4
get (n-1)
get (n-3) ;
printf ("%d",n);
If get(6) function is being called in main () then how many times will the get() function be invoked
1.15
2.25
3.43
4.24
int count = 0;
while (num) {
count++;
num>>= 1;
return (count);
1.7
2.8
3.9
4.0
Answer: 2022-03-09 00:00:00
Q381: For the array (77 ,62,114,80,9,30,99), write the order of the elements after two passes using
1.80 30 62 114 77 9 99
2.114 30 62 77 9 99
3.9 114 30 62 77 80 99
4.9 30 62 77 80 99 114
Answer: nan
Q382: How can you make a list that lists the items with numbers?
1.<list>
2.<ol>
3.<dl>
4.<ul>
Answer: 2. <ol>
3."Hello World"
1.UDP
2.TCP
3.SMTP
4.POP
Answer: 2. TCP
1.isolated
2.complete
3.finite
4.strongly connected
Answer: 2. complete
Q386: In a connected graph, a bridge is an edge whose removal disconnects a graph. Which one of
3.Every edge of a clique with size 3 is a bridge (A clique is any compete sub graph of a graph)
Q387: In HTTP, which method gets the resource as specified in the URI
1.GET
2.POST
3.PUT
4.TRACE
Answer: 1. GET
elements. Assume that the insertion and deletion operations are carried out using REAR and
FRONT as array index variables, respectively. Initially, REAR = FRONT = 0. The conditions to
Q390: The following function computes the maximum value contained in an integer array
while (__________) {
else { b = b-1; }
return p[a];
1.a != n
2.b != 0
4.b != a
Answer: 4. b != a
1.<em>
2.<ins>
3.<mark>
4.<marquee>
Answer: 4. <marquee>
Q392: The number of ways in which the numbers 1, 2, 3, 4, 5, 6, 7 can be inserted in an empty
binary search tree, such that the resulting tree has height 6, is
1.63
2.64
3.65
4.66
Answer: 2. 64
1.<br>
2.<h>
3.<hr>
4.<h2>
Answer: 3. <hr>
Q395: To prevent any method from overriding, the method has to declared as,
1.static
2.const
3.final
4.extends
Answer: 3. final
Q396: Use of ________ allows for some processes to be waiting on I/O while another process
executes.
1.multiprogramming
2.multiuser interfacing
3.Random scheduling
Answer: 1. multiprogramming
var a = [1,,3,4,5];
1.5, undefined,undefined
2.5,3,undefined
3.5,0,undefined
4.5,null,undefined
Q401: What is the correct HTML for making a text input field?
1.<input type="text">
2.<textfield>
3.<input type="textfield">
4.<textinput type="text">
int i = 0;
i = i++ + i;
1.I = 0
2.I = 1
3.I = 2
4.I = 3
Answer: 2. I = 1
Q403: Which method is used to get the year of a date object in YYYY format in Javascript.
1.getYear()
2.getYYYY()
3.getFullYear()
4.get4Year()
Answer: 1. getYear()
Q404: Which of the following input controls that cannot be placed using <input> tag?
1.Text
2.Password
3.Submit
4.Textarea
Answer: 4. textarea
1.body:color=black
2.{body;color:black}
3.{body:color=black(body}
Q406: Which of the following asymptotic notation is the worst among all?
1. n + 9378
2. 2^ n-1
3.2^ n - 1
4.2n ? 1
Answer: nan
Q407: Which of the following is/are example(s) of stateful application layer protocols?
(i)HTTP
(ii)FTP
(iii)TCP
(iv)POP3
1. (i) and (ii) only
4.(iv) only
1.valign
2.bgcolor
3.align
4.rowspan
Answer: 3. align
Q409: Which of these methods has no restrictions on content size when a form is submitted.
1.GET
2.HEAD
3. POST
4.PUT
Answer: 3. POST
1.Google
2.Archie
3.AltaVista
4.WAIS
Answer: 3. AltaVista
Q411: While inserting the elements 71,65,84,69,67,83 in an empty binary search tree (BST) in the
1.45
2.67
3.34
4.78
Answer: 2. 67
Q412: A mailer that transforms a message body of an e-mail into a web page is called a
Q413: An incorrectly typed command will cause the operating system to display
1.a prompt
Q414: Choose the correct HTML to left-align the content inside a table cell
1. <tdleft>
2. <td leftalign>
3.<td valign="left">
4.<td align="left">
if(fork k( ) = = 0)
else
a= a ? 5;
Let u, v be the values printed by parent process and x, y be the values printed by child process.
1.u= x + 10 and v = y
2. u= x + 10 and v!= y
3. u + 10= x and v = y
int a, b, c = 0;
void prtFun(void);
main( )
prtFun( );
a + = 1;
prtFun( )
}
void prtFun(void)
int b=1;
a+=++b;
1.31
41
42
2.42
61
61
3.42
62
20
4.42
42
20
Answer: 3
Q417: Consider the following C program.
#include <stdio.h>
int f1 (void) ;
int f 2 (void) ;
int x = 10;
int main ()
int x=1;
x+=f1()+ f2()+f3()+f2() ;
printf("%d", x);
return 0;
1.434
2.230
3.43
4.432
Answer: 2. 230
if (n <= 1) return 0;
int main()
printf("%d", f(a,5));
1.1
2.2
3.3
4.4
Answer: 3.3
#include <iostream.h>
*y=x;
x=temp;
*z= x;
cout<<x<<*y<<*z<<temp;
int main() {
int i = 0;
i=i++ - ++i;
myFunction(i, j, &i);
return 0;
2. 3 2 3 3
Answer: 2. 3 2 3 3
Q420: If you don't want the frame windows to be resizeable, simply add what to the lines ?
1.save
2.dontresize
3.noresize
4.Delete
Answer: 3. noresize
1.BSD Unix
2.Windows
3.Linux
4.Mac
Q422: The preorder traversal sequence of a binary search tree is 30, 20, 10, 15, 25, 23, 39, 35,
42.Which one of the following is the postorder traversal sequence of the same tree?
1.10,20,15,23,25,35,42,39,30
2.15,10,25,23,20,42,35,39,30
3.15,20,10,23,25,42,35,39,30
4.15,10,23,25,20,35,42,39,30
Answer: 4.15,10,23,25,20,35,42,39,30
Q423: What will be the output of the following C program?
d++;
if(n>1) count(n-1);
void main(){
count(3);
1.3 1 2 2 1 3 4 4 4
2.3 1 2 1 1 1 2 2 2
3.3 1 2 2 1 3 4
4.3 1 2 1 1 1 2
Answer: 1. 3 1 2 2 1 3 4 4 4
Q424: Where in an HTML document is the correct place to refer to an external style sheet?
1.In the head section
1.CGI
2.HTML
3.JavaScript
4.CSS
Answer: 1. CGI
Q427: Which of the following in HTML is used to left align the content inside a table cell?
2.<tdleft>
3.<td leftalign>
Q428: Which one of the following statements is NOT correct about HTTP cookies?
1.A cookie is a piece of code that has the potential to compromise the security of an internet user
2.A cookie gains entry to the user's work area through an HTTP header
4.Cookies can be used to track the browsing pattern of a user at a particular site
if (n <= 1) return 0;
int main()
printf("%d", f(a,5));
1.1
2.2
3.3
4.4
Answer: 2022-03-03 00:00:00
Q430: Which of these methods has no restrictions on content size when a form is submitted.
1.GET
2.HEAD
3.POST
4.PUT
Answer: 3. POST
1.Stack
2.array
3.queue
4.linked list
Answer: 1.Stack
Q432: Consider the following:
temp=root->left;
while(temp->right!=NULL)
temp=temp->right;
return temp;
The above code snippet for a BST with the address of the root node in pointer 'root' returns
1.Inorder successor of the root 2.Maximum element in the right subtree of root
Q433: _____ is used to define a special CSS style for a group of HTML elements
1.Class attribute
2.name attribute
3.group attribute
4.id attribute
Q434: The _______ attribute defines the action to be performed when the form is submitted
1.method attribute
2.action attribute
3.onSubmit attribute
4.onClick attribute
a. Final Machine Implement able software for a product embeds in ROM or PROM as an image.
Bytes at each address must be defined for creating the ROM image
language
d. High level language is used for faster coding, use of data structure, data types for definitions and
declarations
R1(A); W1(A); R2(B); R2(A); R1(B); W2(A+B); W1(B); where R1 and W1 are read and write
operations of transaction T1 and R2 and W2 are read and write operations of transaction T2.
Answer: nan
1.switching algebra
2.arithmetic algebra
3.linear algebra
4.algebra
Answer: 1. Switching
1.generate code
Q439: Activities such as documentation and software configuration management are what kind of
process activities?
1.Primary
2.Validation
3.Design
4.supporting
Answer: 4. supporting
Q440: In incremental delivery the ________ services are typically delivered first
1.quickest to complete
2.highest-priority
3.cheapest
Answer: 2. highest-priority
Q441: In incremental development system structure tends to ______ as many new increments are
added.
1.degrade
2.improve
4.shrink
Answer: 1. degrade
__________________
2.to marketing
Q443: This software process model takes the fundamental activities of specification, development,
validation, and evolution and represents them as separate process phases such as requirements
specification, software design, implementation, testing, and so on
1.Incremental development
Q445: What is a type of software design that designs system data structures to be used in a
database?
1. architectural design
2. interface Design
3. component Design
4.Database design
Q446: What is based on the idea of developing an initial implementation, exposing this to user
comment and evolving it through several versions until an adequate system has been developed?
2.Incremental Development
1.Architectural design
2.Database design
3.Component design
4.Validation testing
1.Requirements Definition
4.System Validation
Q449: Which statement best describes a benefit of Incremental development over the waterfall
model
3.It is easier to get customer feedback on the development work that's been done
Answer: nan
Q450: ___________ adds to the costs of Software Development because it usually means that work
1.Picture quality
2.Production
3.Software speed
4.Change
Answer: 4 change
Q451: Which of the following serial protocol is used in the automotive industry
1.USB
2.SPI
3.I2C
4.CAN
Answer: 2. SPI
Q452: When two location map to the same location in the cache, it is termed as
1.Conflict miss
2.Compulsory miss
3.Capacity miss
4.Cold miss
1.Barrel Shifter
i. hard disk
1.i & ii
2.iii
3.i, ii & iv
4.iv
Q455: Choose the correct sequence of steps for developing embedded software
c. Reallocation of address
d. Locator sends the codes to device programmer for burning as ROM image in embedded system
ROM
2.b, a
3.b, a, c, d
4.only d
Answer: 3.b,a,c,d
Q456: Given the following structure template, choose the correct syntax for accessing the 5th
struct stud
int marks[6];
char sname[20];
char rno[10];
}s[10];
1.stud[2].marks[4]
2.stud[4].marks[2]
3.s[2].marks[4]
4.s[4].marks[2]
Answer: 3.s[2].marks[4]
1.a float
2.a double
Answer: 2. a double
1.Analyze results
2.Plan test
3.Release product
4.Conduct tests
Answer: 2. Plan test
Q459: A set of documents in which a given document can contain text, graphics video and audio
clips as well as embedded references to other documents world wide web pages are called as
---------------
1.Hypermedia message
2.Hypertext document
3.Hypermedia Documents
Q460: A software requirements specification (SRS) document should avoid discussing which one of
the following?
2.Non-functional requirements
3.Design specification
4.Interfaces with third party softwareKey
Q461: Consider a B+ tree in which the search Answer is 12 bytes long, block size is 1024
bytes,record pointer is 10 bytes long and block pointer is 8 bytes long. The maximum number of
keys that can be accommodated in each non-leaf node of the tree is ____
1.40
2.50
3.60
4.70
Answer: 2. 50
1.analysis, design,coding,testing
2.planning,analysis,design,coding
3.planning,analysis,coding,testing
Q463: For automatic objects, constructors and destructors are called each time the objects ___
3.are constructed
4.are destroyed
1.Trust
2.Competence
3.Decision-making
4.HardworkKey
Answer: 3
Q465: In which phase is Agile Modeling(AM) carried out
1.Analysis
2.Coding
3.Planning
4.TestingKey
Answer: nan
1.Machine language
2.Assembly language
4.Used nowhere
3.Spiral model
2. Nuclear Reactors
3.Power Utilities
4.Inventory Management
int main()
int x=20;
if(!(!x)&&x)
cout< else
x=10;
cout< return 0;
1.20
2.10
3.1
4.0
#include <iostream.h>
int main()
IntPtr A, B, C;
int D,E;
A = new int(3);
B = new int(6);
C = new int(9);
D = 10;
E = 20;
*A = *B;
B = &E;
D = (*B)++;
E= *C++ - *B--;
cout<<*A<<*B<<*C< return 0;
1.62010206
2.72010107
3.71020106
4.10720107
Q472: If a , b , c, are three nodes connected in sequence in a singly linked list, find the valid
statement that may help to change this list to a circular linked list?
1.a->next=c
2.b->next=c
3.a->next=c
4.c->next=b
Q473: Round Robin scheduling is the strategy of temporarily suspending a running process
1.After the CPU time slice expires
3.when it requests IO
4.when OS wait
Answer: nan
1.if there are more than two processes competing for that resource
2.if there are only two process completing for that resource
Q475: ______ OS pays more attention on the meeting of the time limits.
1.Distributed
2.Network
3.Real time
4.Desktop
Q476: Consider a software program that is artificially seeded with 100 faults. While testing this
program, 159 faults are detected, out of which 75 faults are from those artificially seeded faults.
Assuming that both are and seeded faults are of same nature and have same distribution, the
Consider a software program that is artificially seeded with 100 faults. While testing this program,
159 faults are detected, out of which 75 faults are from those artificially seeded faults. Assuming that
both are and seeded faults are of same nature and have same distribution, the estimated number of
Answer: 28
String s1 = ? VIT? ;
String s2 = ? VIT ? ;
1.s1 == s2
2.s1 = s2
3.s3 == s1
4.s3=s1
Answer: 1.s1==s2
Q478: Suppose T is a binary tree with 14 nodes. What is the minimum possible depth of T?
1.0
2.3
3.4
4.5
Answer: 2.3
Q479: The following HTML ________ element contains meta data which is not displayed inside the
document
1.<form>
2.<title>
3.<table>
4.<frame>
Answer: 2
Q480: To link your Web page to a style sheet, you must use the _____ tag
1.<STYLESHEET>
2.<STYLE>
3.<link>
4.<web>
Answer: 3.<link>
1.<ol>
2.<ul>
3.<dl>
4.Nested list
1.Bubble Sort
2.Merge Sort
3.Insertion Sort
4.
1.79n2+43n
2.65n3+34n
3.6*2n
4.5*2n
Answer: 2.65n3+34n
Q485: ___ bit in ICW1 indicates whether the 8259A is cascade mode or not
Answer: 4. SNGL=0
Q486: ____ messages are typically used for diagnostic or control purposes or generated in
Answer: 1.ICMP
Q487: _____ gives the number of bits that can be transmitted over a network in a fixed time period.
Q488: ______ cryptography refers to encryption methods in which both the sender and receiver
Answer: 1. Symmetric
Q489: ______ is responsible for the final encapsulation of higher-level messages into frames that
Answer: 1
Q490: _______ appends to the address a slash character and the decimal number of leading bits of
Answer: 1.CIDR
Q491: _______ is assigned to an organization by a global authority.
Answer: 4
1.Cartesian product
2.Difference
3.Intersection
4.Product
Q493: _______ should keep track of multiple file downloads requested by a particular FTP
application, or multiple telnet connections from a single terminal client, or web page retrievals from a
web server.
Answer: 1
Q494: ________ functions as a request-response protocol in the client-server computing model.
Answer: 1.HTTP
Q496: ________ scheduler selects the jobs from the pool of jobs and loads into the ready queue.
1.Long term
2.Short trem
3.Medium term
4.None of these
Answer: 1. Long term
4.Dispatcher
Q499: _________ is a high speed cache used to hold recently referenced page table entries as a
1.Best Fit
2.Worst Fit
3.First Fit
4.None of these
Answer: 1
Q501: _________ register keeps tracks of the instructions stored in program stored in memory.
2. XR (Index Register)
3.PC (Program Counter)
4. AC (Accumulator)
Answer: 3.PC
1.Replace the page that will not be used for a longest period of time
2.Replace the page that will not be used for a shortest period of time
3.Replace the page that will be used for a longest period of time
4.Replace the page that will be used for a shortest period of time
Answer: 1
Q503: __________ algorithm is used for the flow control of data between sender and receiver.
Answer: 4
Q504: ___________ programs automatically connects to web sites and download documents and
1.Web Servers
3.Stay Connected
4.Offline Browsers
Q505: ___________ signal prevent the microprocessor from reading the same data more than one
Answer: 2
Q506: ____________ function in PHP returns a list of response headers sent (or ready to send)
Answer: 2
Q507: ______________ is an initial version of a software system that is used to demonstrate
concepts, try out design options, and find out more about the problem and its possible solutions.
1.Prototype
2.Architectural Design
3.Subsystem
4.Module
Answer: 1
1.Process
2.Thread
4.Program Counter
Answer: 2
2.Optimization
3.Schema
4.Data
Answer: 1
Q510: A graphical HTML browser resident at a network client machine Q accesses a static HTML
webpage from a HTTP server S. The static HTML page has exactly one static embedded image
which is also at S. Assuming no caching, which one of the following is correct about the HTML
1.Q needs to send at least 2 HTTP requests to S, each necessarily in a separate TCP connection to
server S
2.Q needs to send at least 2 HTTP requests to S, but a single TCP connection to server S is
sufficient
3.A single HTTP request from Q to S is sufficient, and a single TCP connection between Q and S is
4.A single HTTP request from Q to S is sufficient, and this is possible without any TCP connection
between Q and S
Answer: 2
Q511: A 20-bit address bus can locate ________.
1.1,048,576 locations
2.2,097,152 locations
3.4,194,304 locations
4.8,388,608 locations
Answer: 1
Answer: 4
1.m
2.m + 1
3.m - 1
4.m/2
Answer: 1
Q514: A binary code that progresses such that only one bit changes between two successive codes
is:
Answer: 1
Q515: A certain 5-bit self-complementary code is used to represent the 10 decimal digits 0 through
9.
Given that (246) in decimal is represented as 00010 00100 00110 in this code, what is the
1.00110 00100 00010 2.00011 00111 00101 3.11001 11101 11011 4.11101 11011 11001
Answer: 2
Q516: A client process P needs to make a TCP connection to a server process S. Consider the
following situation: the server process S executes a socket(), a bind() and a listen() system call in
that order, following which it is preempted. Subsequently, the client process P executes a socket()
system call followed by connect() system call to connect to the server process S. The server
process has not executed any accept() system call. Which one of the following events could take
place?
1.connect () system call returns successfully
Answer: 3
Answer: 2
1.A ring counter has fewer flip-flops but requires more decoding circuitry 2.A ring counter has an
inverted feedback path 3.A Johnson counter has more flip-flops but less decoding circuitry 4.A
Answer: 4
Q520: A computer on a 10Mbps network is regulated by a token bucket. The token bucket is filled at
a rate of 2Mbps. It is initially filled to capacity with 16Megabits. What is the maximum duration for
1.1.6 seconds
2.2 seconds
3.5 seconds
4.8 seconds
Answer: 2
Q521: A data structure where elements can be added or removed at either end but not in the middle
Answer: 4
1.Mutation testing
2.Stress testing
Answer: 1
Q523: A grammar that produces more than one parse tree for some sentence is called
Answer: 1
Q524: A group of bits that tell the computer to perform a specific operation is known as____.
1.Instruction code
2. Micro-operation
3.Accumulator
4. Register
Answer: 1
Answer: 4
Q526: A language is represented by a regular expression (a)*(a+ba). Which of the following string
does not belong to the regular set represented by the above expression.
1.aaa
2.aba
3.ababa
4.aa
Answer: 3
3.stop incoming traffic from a specific IP address but allow outgoing traffic to same IP
4.block TCP traffic from a specific user on a specific IP address on multi-user system during 9:00PM
and 5:00AM
Answer: 4
Q528: A linear collection of data elements where the linear node is given by means of pointer is
called
1.Definite blocking
2.Starvation
3.Low priority
4.None of these
Answer: 2
Q530: A minimum state DFA accepting the language L={w/w belongs {0,1}*} number of 0s and 1s in
1.15 states
2.7 states
3.9 states
4.8 states
Answer: 1.15
Q531: A network that contains multiple hubs is most likely configured in which topology?
Answer: 2. Tree
Q532: A NFA converted to DFA has more than one final state.
1.True
2.False
3.may be true
4.always true
Answer: nan
1.Where each record in table A can have one or more matching records in table B
2.Where each record in table B can have one or more matching records in table A
Answer: 1.Where each record in table A can have one or more matching records in table B
1.can reduce the cost of using an information utility 2.allows communications channel to be shared
among more than one user 3.can reduce the cost of using an information utility and allows
communications channel to be shared among more than one user 4.is free
Answer: 2.allows communications channel to be shared among more than one user
Answer: 1
Q536: A parameterized constructor with all arguments initialized is same as
Q537: A periodic signal completes one cycle in 0.01 s. What is the frequency?
1.1 Hz
2.100 Hz
3.1 KHz
4.1 MHz
Answer: 2. 100 Hz
1.Many to many relationships between the tables that connect them 2.Network model between the
tables connect them 3.one to many relationship between the tables that connect them 4.Parent child
Answer: 4.Parent child relationship between the tables that connect them
Answer: nan
Q541: A relation R is said to be in 2NF when it does not have
1.Partial Dependencies
2.Transitive Dependencies
3.Multivalued Attributes
2.one that consists of two or more tables that are joined in some way
4.a database that is able to process tables, queries, forms, reports and macros
Answer: 4.a database that is able to process tables, queries, forms, reports and macros
1.attribute
2.degree
3.domain
4.tuple
Answer: 3.domain
1.Digital delay line 2.Serial to parallel conversion 3.All of these 4.Parallel to serial conversion
2.digital modulation
3.multiplexing
Answer: 3. multiplexing
1.Database
2.DBMS
3.Data Model
4.Data
Answer: 2. DBMS
1.Three-address Instruction
2. Two-address Instruction
3.One-address Instruction
4. Zero-address Instruction
Q549: A stakeholder is anyone who will purchase the completed software system under
development.
1.TRUE
2.False
3. 4.
Answer: 2.FALSE
1.Within the class definition 2.Outside the class definition 3.When the program is exeuted 4.Never
flip-flops
Q552: A system uses FIFO policy for page replacement. It has 4 page frames with no pages loaded
to begin with. The system first accesses 100 distinct pages in some order and accesses the same
100 pages but now in the reverse order how many page faults will occur?
1.196
2.192
3.197
4.195
Answer: 1. 196
1.Secondary key
2.Alternate key
3.Unique key
4.Primary key
Answer: 4. Primary key
4.none of these
Q555: A value that has no defined value is expressed in PHP with the following keyword:
Answer: 2. null
1.P contains the address of an element in DATA 2.P contain the DATA and the address of DATA
3.P can store only memory addresses 4.P points to the address of first element in DATA
Answer: 1.P contains the address of an element in DATA
1.P contains the address of an element in DATA 2.P contain the DATA and the address of DATA
3.P can store only memory addresses 4.P points to the address of first element in DATA
Q558: A view is a
1.virtual table
3.base table
4.super table
1.Disk stack
2.Removable disk
3.Flexible disk
4.None of these
Q560: A complete binary min-heap is made by including each integer in [1;1023] exactly once. The
depth of a node in the heap is the length of the path from the root of the heap to that node. Thus, the
1.7
2.8
3.9
4.10
Q561: Abstraction is
4.friend classes
Answer: nan
1. developer
2. end users
3. test team
4.systems engineers
1.ROM
2.SRAM
3.DRAM
4.ERAM
Answer: 2. SRAM
1.0023H
2.0024H
3.0033H
4.0099H
Answer: 2. 0024 H
NUMBER OF STEPS
1.SOLUTION & FINITE 2.PROBLEM & INFINITE 3.SOLUTION & INFINITE 4.PROBLEM & FINITE
Answer: 1. Star
Q569: All the modules of the system are integrated and tested as complete system in the case of
1.Bottom up testing
2.Top-down testing
3.Sandwich testing
4.Big-Bang testing
Q570: Among simple LR (SLR), canonical LR, and look-ahead LR (LALR), which of the following
pairs identify the method that is very easy to implement and the method that is the most powerful, in
that order?
1.SLR , LALR
2.CLR , LALR
3.SLR , CLR
4.SLR
1.0
2.1
3.2
4.3
Answer: 1. 0
1.Elimination of the data redundancy 2.Ability to associate related data 3.Increase security 4.All of
the options
1.relation
2.domain
3.functional dependency
4.single attribute
Answer: 1
Q574: An ethernet frame that is less than the IEEE 802.3 minimum length of 64 octets is called
1.short frame
2.runt frame
3.mini frame
4.man frame
1.DSR
2.AODV
3.ZRP
4.OLSV
Answer: 3. ZRP
1.Postfix notation 2.Syntax trees 3.Three address code 4.Postfix notation, Syntax trees and Three
address code
1.255.255.0.0
2.255.255.64.0
3.255.255.128.0
4.255.255.252.0
Answer: 4. 255.255.252.0
Q578: Any code inside a loop that always computes the same value can be moved before the loop.
This is called
Transformation
3.rules for when and how processes send and respond to messages
1.two levels
2.four levels
3.three levels
4.one level
1.->, %, +, =
2.=, +, %, ->
3.%, +, =, ->
4.%, ->, =, +
Q582: Assume that a table R with 1000 records is to be joined with another table S with 10000
records. What is the maximum number of records that would result in if we join R with S and the
1.1000
2.10000
3.1,00,00,000
4.11000
Answer: 4
Q583: Assume that we have constructor functions for both base class and derived class. Now
consider the declaration in main( ). Base * P = New Derived; in what sequence will the constructor
be called ?
1.Derived class constructor followed by Base class constructor. 2.Base class constructor followed by
derived class constructor. 3.Base class constructor will not be called. 4.Derived class constructor will
not be called.
Answer: 1. 32000H
Q585: Assume you would like to sort an array in ascending order by value while preserving key
associations. Which of the following PHP sorting functions would you use?
1.ksort( )
2.asort( )
3.krsort( )
4.sort( )
Answer: 2.asort()
Q586: Assuming today is Monday, 10 July 2000, what is returned by this statement: SELECT
1.17-JUL-00
2.10-JUL-00
3.31-DEC-00
4.31-JUL-00
Answer: 1.17-JUL-00
1.sorted linked list 2.sorted binary trees 3.sorted linear array 4.pointer array
1.inserting a '0' in user data stream to differentiate it with a flag 2.inserting a '0' in flag data stream to
avoid ambiguity 3.appending a nibble to the flag sequence 4.appending a nibble to the user data
stream
Q589: Bits can be send over guided and unguided media as analog signal using .........................
1.digital modulation
2.amplitude modulation
3.frequency modulation
4.phase modulation
1.true
2.false
3. 4.
Answer: 2. False
3.MAC protocols
necessary.
1.True
2.FALSE
3. 4.
Answer: 2.False
1.a number
2.underscore
3.None
4.an alphabet
4. None of these
Q595: Calculate the block number in free storage management of files system with number of bits
1.59
2.51
3.45
4.53
Answer: 1.59
Q596: Calculate the EAT(Effective access time) if 5 micro second is associative look-up time and
4.not defined
Q598: Change cannot be easily accommodated in most software systems, unless the system was
1.True
2.False
3. 4.
Answer: 1.True
Q599: Changes made to an information system to add the desired but not necessarily the
1.Preventative maintenance.
2.Adaptive maintenance.
3.Corrective maintenance.
4.Perfective maintenance.
Answer: 1.A
Q601: class n{ int a;}; how much memory the compiler allocates for this class
Q602: Class testing of object-oriented software is equivalent to unit testing for traditional software.
1.true
2.false
3. 4.
Answer: 1.true
Q603: Classes and components that exhibit functional, layer, or communicational cohesion are
1.true
2.false
3. 4.
Answer: 1.true
1.giving programming versatility to the user by providing facilities as pointers to memory counters for
loop control
4.All of these
Q606: Condition testing is a control structure testing technique where the criteria used to design test
Q608: Consider a binary tree T that has 200 leaf nodes. Then, the number of nodes in T that have
1.199 2.200 3.Any number between 0 and 199 4.Any number between 100 and 200
Answer: 1.199
Q609: Consider a DFA over = {a, b} accepting all strings which have number of a's divisible by 6
and number of b's divisible by 8. What is the minimum number of states that the DFA will have?
1.8
2.14
3.15
4.48
Answer: 4.48
Q610: Consider a hash table with 9 slots. The hash function is h(k) = k mod 9. The collisions are
resolved by chaining. The following 9 keys are inserted in the order: 5, 28, 19, 15, 20, 33, 12, 17, 10.
The maximum, minimum, and average chain lengths in the hash table, respectively, are
where the window size at the start of the slow start phase is 2 MSS and the threshold at the start of
the first transmission is 8 MSS. Assume that a time out occurs during the fifth transmission. Find the
1.8 MSS
2.14 MSS
3.7 MSS
4.12 MSS
Q612: Consider an undirected graph G with 100 nodes. The maximum number of edges to be
included is
Answer: 2.495
Q613: Consider S->SS|a what is the number of different derivation trees for aaaaa
1.5
2.3
3.14
4.7
Answer: 4.7
Q614: Consider the CFG with {S,A,B) as the non-terminal alphabet, {a,b) as the terminal alphabet, S
S --> aB S --> bA
B --> b A --> a
B --> bS A --> aS
1.aaaabb
2.aabbbb
3.aabbab
4.abbbba
Answer: 3.aabbab
Q615: Consider the data of previous question. Suppose that the sliding window protocol is used with
the sender window size of 2^i where is the number of bits identified in the previous question and
acknowledgments are always piggybacked. After sending 2^i frames, what is the minimum time the
sender will have to wait before starting transmission of the next frame? (Identify the closest choice
1.16ms
2.18ms
3.20ms
4.22ms
Answer: 3. 20 ms
Q616: Consider the DFAs M and N given above. The number of states in a minimal DFA that
1.0
2.1
3.2
4.3
Answer: 2.1
Answer: 4.3
if (i%2)
x += (4*j + 5*i);
y += (7 + 4*j);
struct {
short s [5]
union {
float y;
long z;
}u;
} t;
Assume that objects of the type short, float and long occupy 2 bytes, 4 bytes and 8 bytes,
considerations, is
int tmp;
tmp = x;
x= y;
y = tmp;
#include<stdio.h>
main()
j = j + 1;
x = u - t;
y = x * v;
x = y + w;
y = t - z;
y = x * y;
The minimum number of total variables required to convert the above code segment to static single
assignment form is
1.6
2.8
3.9
4.10
var a1 = [,,,];
0 in a2
1.true false
2.false true
3.true true
4.false true
Q624: Consider the following code snippet: var a = [1,2,3,4,5]; a.slice(0,3); What is the possible
function oddsums(n)
result.push(total);
return result;
oddsums(5);
1.Returns [1,4,9,16,25]
2. Returns [1,2,3,4,5]
3.Returns [3,6,9,12,15]
4.Returns [1,3,5,7,9]
Answer: 1.1
double f(double x)
Give a value q (to 2 decimals) such that f(q) will return q:_____.
Answer: 2. 1.732
var a = [];
a.unshift(1);
a.unshift(22);
a.shift();
a.unshift(3,[4,5]);
a.shift();
a.shift();
a.shift();
1.1
2.[4,5]
3.[3,4,5]
4.Exception
Answer: 1.1
if(a > b)
if(b > c)
s1;
else s2;
s2 will be executed if
3.a<=b
4.b>c
#include
main()
int i;
scanf(?%d?,pi);
printf(?%d\n?, i+5);
1.Compilation fails.
3.On execution, the value printed is 5 more than the address of variable i
4.On execution, the value printed is 5 more than the integer value entered
Answer: 4.On execution, the value printed is 5 more than the integer value entered
Q631: Consider the following statements for priority queue :
S1 : It is a data structure in which the intrinsic ordering of the elements does determine the result of
S2 : The elements of a priority queue may be complex structures that are ordered on one or several
fields.
1.Both S1 and S2 are incorrect 2.S1 is correct and S2 is incorrect 3.Both S1 and S2 are correct
Q632: Consider the following two sets of LR(1) items of an LR(1) grammar.
X -> c.X, $
X -> .cX, $
X -> .d, $
Which of the following statements related to merging of the two sets in the corresponding LALR
2.2 only
4.1,2,3,4
Answer: 4.1,2,3,4
Q633: Consider the following two sets of LR(1) items of an LR(1) grammar.
X -> c.X, $
X -> .cX, $
X -> .d, $
Which of the following statements related to merging of the two sets in the corresponding LALR
1.1 only
2.2 only
4.1,2,3,4
Answer: 4.1,2,3,4
S-CC
C-cC|d
The grammar is
1.LL(1)
Answer: 1.LL(1)
Q635: Consider the grammar with the following translation rules and E as the start symbol.
| T{ E.value = T.value }
| F{ T.value = F.value }
Compute E.value for the root of the parse tree for the expression: 2 # 3 & 5 # 6 & 4.
1.200
2.180
3.160
4.40
Answer: 3. 160
Let the number of states in SLR(1), LR(1) and LALR(1) parsers for the grammar be n1, n2 and n3
1.n1<n2<n3
2.n1=n3<n2
3.n1=n2=n3
4.n1>n2>n3
Answer: 2.n1=n3<n2
1. i = 1
2. j = 1
3. t1 = 5 * i
4. t2 = t1 + j
5. t3 = 4 * t2
6. t4 = t3
7. a[t4] = -1
8. j = j + 1
9. if j <= 5 goto(3)
10. i = i + 1
The number of nodes and edges in the control-flow-graph constructed for the above code,
respectively, are
1.5 and 7
2.6 and 7
3.5 and 2
4.7 and 8
Q638: Consider the join of a relation R with relation S. If R has m tuples and S has n tuples, then the
1.mn
2.m+n
3.(m+n)/2
4.2(m+n)
Answer: 1.mn
Q639: Consider the join of a relation R with relation S. If R has m tuples and S has n tuples, then the
2.m + n
3.(m + n) / 2
4.2(m + n)
Answer: 1.mn
Q640: Consider the regular language L = (111 + 11111)*. The minimum number of states in any
1.3
2.5
3.8
4.9
Answer: 4.9
1.2NF
2.3NF
3.BCNF
4.4NF
Answer: 1.2NF
S-TR
R - + T {print ('+');} R | e
Here num is a token that represents an integer and num.val represents the corresponding integer
value. For an input string '9 + 5 + 2', this translation scheme will print
1.9 + 5 + 2
2.9 5 + 2 +
3.9 5 2 + +
4.+ + 9 5 2
Answer: 2.9 5 + 2 +
Q643: Consider two strings A ='qpqrr' and B = 'pqprqrp'. Let x be the length of the LCS between A
and B and let y be the number of such longest common subsequences between A and B. Then x +
10y =
Answer: 2.34
1.values
2.distinct values
3.groups
4.columns
Answer: 1.values
1.Batch
2.Real Time
3.Multi-programming
4.network
Answer: 3.Multi-programming
1.Error
2.Table created
1.which is written in a language that is same as the source language. 2.that runs on one computer
but produces object code for different type of computer. 3.that generates object code for its host
machine. 4.which is written in a language that is different from the source language.
Answer: 2.that runs on one computer but produces object code for different type of computer
4.None
Q652: Currently there is no single standard file type that can be used to play audio using the audio
element consistently on all browsers. Which is the solution that the audio element provides to
1.Use JavaScript to determine the web browser in use 2.Use Adobe Flash to play the audio
3.Include multiple audio file formats in the src attribute 4.No Solution
Answer: nan
Q653: Data flow testing is a control structure testing technique where the criteria used to design test
4.programs are not dependent on both physical and logical attributes of data
Answer: 4.programs are not dependent on both physical and logical attributes of data
Q655: Data Members of the base class that are marked private:
1.does exist in memory when the object of the derived class is created 2.exist in memory when the
the derived class 3.are visible in the derived class 4.are directly accessible in the derived class
Answer: 2.exist in memory when the object of the derived class is created
Q656: Data Members of the base class that are marked private:
1.does exist in memory when the object of the derived class is created 2.exist in memory when the
the derived class 3.are visible in the derived class 4.are directly accessible in the derived class
Answer: 2.exist in memory when the object of the derived class is created the derived class
1. Physical file
2.Data Structure
3. Logical file
4.ALL
Answer: 4.ALL
Q658: DB, DW and DD directives are used to place data in particular location or to simplyallocate
space without preassigning anything to space. The DW and DD directories areused to generate
1.f ull address of labels 2.offsets of full address of labels and variables 3.full address of variables
4.offsets
2.allows the virtual address space to be a multiple of the physical memory size
Answer: 1.allows the virtual address space to be independent of the physical memory
3.minimizing redundancy
1.String instructions
2.Stack instructions.
3.Arithmetic instructions
4.Branch instructions
Answer: 1.String instructions
1.selection sort 2.merge sort 3.quick and merge sorts 4.indexed sequential search
Answer: 2.symmetric
Q667: During business process engineering, three different architectures are examined
3.
1.6
2.5
3.4
4.3
Answer: 1.6
1.Ultraviolet rays
2.infrared rays
1.pure ethernet
Q672: Everyone on the software team should be involved in the planning activity so that we can
4. begin design
2.Limited bandwidth
int main()
int tally=0;
for(;;)
if(tally==10)
break;
printf("%d ",++tally);
return 0;
1.0 1 2 3 4 5 6 7 8 9 10
3.1 2 3 4 5 6 7 8 9 10
4.1 2 3 4 5 6 7 8 9
Answer: 3.1 2 3 4 5 6 7 8 9 10
#include <stdio.h>
int main()
int x=65;
printf("%c\n",c);
return 0;
1.Error
2.65
3.A
4.NULL
Answer: 3.A
#include <stdio.h>
struct sample
int a=0;
char b='A';
float c=10.5;
};
int main()
struct sample s;
printf("%d,%c,%f",s.a,s.b,s.c);
return 0;
1.Error
2.0,A,10.5 3.0,A,10.500000
#include <stdio.h>
int main()
int a=100;
printf("%d\n"+1,a);
printf("Value is = %d"+3,a);
return 0;
1.Error
2.101,
Value is = 103
3.d
ue is = 100
4.100
100
#include <stdio.h>
int main()
{
int a=23;
;printf("%d",a);
return 0;
1.23
2.Error
3.;23;
4.;23
Answer: 1.23
#include <stdio.h>
void main()
++var;
printf("%c",var);
1.B
2.A
3.ERROR
4.66
Answer: 3.ERROR
#include <stdio.h>
void main()
int x=10;
x+=(x++)+(++x)+x;
printf("%d",x);
1.44
2.45
3.46
4.47
Answer: 2.45
#include <stdio.h>
void main()
{
int x=(20 || 40 ) && (10);
printf("x= %d",x);
1.x= 60
2.x= 70
3.x= 0
4.x= 1
Answer: 4.x= 1
#include <stdio.h>
void main()
char var=10;
printf("var is = %d",++var++);
3.12
Answer: 2. 0
1.For the given PS and NS what will be the inputs 2.For the given PS and NS what will be the
outputs 3.For the given PS and NS what will be the type of flip-flops 4.For the given PS and NS
Answer: 4.For the given PS and NS what will be the values of NS and PS respectively
Q687: Following can be used to implement a SOP function without changing it into minterms
Answer: 4.DeMUX
2.A field in a table that contains data that is also contained elsewhere in another table
Answer: 1.A field in a table that matches a key field in another table
Q691: Frames of 1000 bits are sent over a 10^6 bps duplex link between two hosts. The
propagation time is 25ms. Frames are to be transmitted into this link to maximally pack them in
transit (within the link). What is the minimum number of bits, i will be required to represent the
sequence numbers distinctly? Assume that no time gap needs to be given between transmission of
two frames.
1.i=2
2.i=3
3.i=4
4.i=5
Answer: 4.i=5
1.20
2.21
3.22
4.23
Answer: 2022-01-20 00:00:00
1.illumination and frequency 2.intensity and reflectance 3.illumination and radiance 4.illumination
and reflectance
Q694: Generally Dynamic RAM is used as main memory in a computer system as it______.
Answer: 4
Q696: Given a comma-separated list of values in a string, which function from the given list can
1.strstr( )
2.extract
3.explode( )
4.strtok( )
Answer: 3
Q697: Given a hash table T with 25 slots that stores 2000 elements, the load factor a for T is_____
Answer: 1
Q698: Given a variable $email containing the string [email protected], which of the following PHP
2. strstr($email, "@");
3.strchr($email, "@");
Answer: 4
Q699: Given an array that represents elements of arithmetic progression in order. It is also given
that one element is missing in the progression, the worst case time complexity to find the missing
Answer: 3
Answer: 1
Q701: Given the basic ER and relational models, which of the following is INCORRECT?
3.In a row of a relational table, an attribute can have more than one value
4.In a row of a relational table, an attribute can have exactly one value or a NULL value
Answer: 3
Q702: Given the Code segment CS = 1000H and the offset BX=0050H. Calculated physical address
is ----------
Answer: 2
Q703: Given the Extra segment ES = 52B9H and the offset BX=D470H. Calculated physical
address is ----------
Answer: 1
Q704: Given the frequency f=1.5MHZ for 8253 timer the value of time period T is
Answer: 2
Q705: Given the functional dependencies, {AB -> CDE and A -> E}, for relation schema R =
Answer: 3
Q706: Given the language L = {ab, aa, baa}, which of the following strings are in L*?
1) abaabaaabaa
2) aaaabaaaa
3) baaaaabaaaab
4) baaaaabaa
1.1, 2 and 3
2.1, 2 and 4
3.1, 3 and 4
4.2, 3 and 4
Answer: 2
1.DDL
2.TCL
3.DCL
4.DML
Answer: 3
1.coaxial cable
2.twisted pair cable
3.optical fiber
Answer: 3
1.Memory
2.Output
3.Peripherals
4.Input
Answer: 3
1.Using sizeof() 2.count() 3.Writing a user defined function and using array_search() 4.using sizeof()
and count()
Answer: 4
1.Using JavaScript 2.Using the 'text' attribute 3.Using the 'placeholder' element 4.Using the
'placeholder' attribute
Answer: 4
1.< input name= MyArray[]/> 2.< input ="MyArray[]" /> 3.< input name="MyArray[]" /> 4.< input
MyArray[] />
Answer: 3
1.One is not a method of the String object. 2.substr() takes three arguments, substring() only two.
3.Only one accepts a desired string length as an argument. 4.Besides the spelling, nothing.
Answer: 3
Q714: How do we access the value of 'd' later? $a = array( 'a', 3 => 'b', 1 => 'c', 'd' );
Answer: 4
1.Setting zero paddings and margins 2.By displaying our list as block elements 3.Using table cells
Answer: 2
Answer: 4
Q718: How do you get information from a form that is submitted using the "get" method?
Answer: 2
1.J = 0, K = 0
2.J = 0, K = 1
3.J = 1, K = 0
4.J = 1, K = 1
Answer: 4
Q720: How is the protection and security for an embedded system made?
1.Security chips
3.IPR
4.OTP
Answer: 3
Q721: How many assumptions have to meet for a rate monotonic scheduling?
1.3
2.4
3.5
4.6
Answer: 4
1.six
2.seven
3.eight
4.nine
Answer: 4
Q723: How many different states does a 3-bit asynchronous counter have?
1. 2 2. 4 3. 8 4.16
Answer: 3
1.10 2. 8 3. 5 4. 4
Answer: 4
Q725: How many flip-flops are required to make a MOD-32 binary counter?
1. 3 2. 4 3. 5 4. 6
Answer: 3
1.13 2. 5 3. 1 4. 0
Answer: 4
Q727: How many minimum states are required in a DFA to find whether a given binary string has
odd number of 0's or not, there can be any number of 1's.
1.1
2.2
3.3
4.4
Answer: 2
1. 2
2. n
3. 1
4. 0
Answer: 3
1. 1
2. 2
3. 6
4. 3
Answer: 3
1.Variable
2.1
3.0
4.Infinity
Answer: 2
Answer: 1
Answer: 1
Q733: How to create a memory without a name during the execution of the program?
Answer: 1
Answer: 2
Q735: How will you handle the overflow condition of a linked queue through code (note: new_node
Answer: 1
Q736: HTTP client requests by establishing a __________ connection to a particular port on the
server.
4.RIP
Answer: 2
1.40
2.28
3.24
4.20
Answer: 1
1.1
2.2
3.3
4.4
Answer: 4
Q739: Identify different segments in a program
1.only code segment 2.data and code segment 3.only data segment 4.data, code, stack and extra
segments
Answer: 4
Q740: Identify the accurate control word for operate counter 0, Read/Write LSB only, Mode 2, BCD
countdown.
Answer: 2
Q741: Identify the addressing mode for the instruction MOV AH,47H
1.Immediate addressing mode 2.Direct addressing mode 3.Based addressing mode 4.Indirect
addressing mode
Answer: 1
Q742: Identify the proper data direction and modes of operation of the 8255 ports if the control word
Answer: 3
Q743: If a class B network on the Internet has a subnet mask of 255.255.248.0, what is the
1.1024
2.1023
3.2046
4.2047
Answer: 3
Q744: If a class C is derived from class B, which is derived from class A, all through public
Answer: 4
Q745: If a constructor function is defined in private section of a class, then
1.The object cannot be created 2.Only its member functions and friends may declare objects of the
class 3.Only its friends may declare objects of the class 4.Only its member functions may declare
Answer: 1 and 2
Q746: If AL= 7FH and instruction ADD AL,1 is given, specify the contents of the six status flag
1.CF=0,PF=0,AF=1,ZF=0,SF=1,OF=1 2.CF=0,PF=1,AF=0,ZF=0,SF=1,OF=1
3.CF=0,PF=1,AF=1,ZF=O,SF=1,OF=1 4.CF=0,PF=0,AF=1,ZF=O,SF=1,OF=0
Answer: 1
Q747: If AL=C0H, Determine the content of the register AL after SAL AL,1 instruction is executed.
Answer: 2
Q748: If all page frames are initially empty, and a process is allocated 3 page frames in real memory
and references its pages in the order 1 2 3 2 4 5 2 3 2 4 1 and the page replacement is FIFO, the
2.7
3.8
4.9
Answer: 4
Q749: If all tasks must be executed in the same time-span, what type of cohesion is being
exhibited?
1.Functional Cohesion
2.Temporal Cohesion
3.Functional Cohesion
4.Sequential Cohesion
Answer: 2
Q750: If class A is friend of class B and if class B is friend of class C, which of the following is true?
1.Class C is friend of Class A 2.Class A is friend of Class C 3.Class A and Class C don't have any
Q751: If every requirement stated in the Software Requirement Specification (SRS) has only one
1.correct.
2. unambiguous.
3.consistent.
4.verifiable.
Answer: 2
Q752: If inspected in a browser, what will be the total width of the div in the following code snippet?
#container { width: 600px; border: 2px solid #CCCCCC; padding: 30px 20px; margin: 20px 10px
40px 10px;}
Answer: 1
2.context-free
3.context-sensitive
4. recursive
Answer: 4
1. n
2.n+1
3.n+2
4.n-1
Answer: 2
Q755: If p and q are assigned the values 2 and 3 respectively then the statement P = q++
Q756: If para1 is the DOM object for a paragraph, what is the correct syntax to change the text
4.para1.nodeValue="New Text";
Answer: 2
Q757: If the class name is X, what is the type of its "this" pointer?
Answer: 3
Q758: If the disk size is 2^30 bytes and block size is 2^12 bytes then find how many such blocks are
there?
1.2^42
2.2^18
3.2^360
4.2^30
Answer: 2
Q759: If the PIC outputs the type number of C8H, the CPU will retrive the vector stored in the
address --------------
Answer: nan
Q760: If the size of logical address space is 2 to the power of m, and a page size is 2 to the power
of n addressing units, then the high order _____ bits of a logical address designate the page
number, and the ____ low order bits designate the page offset.
1.m,n
2.n,m
3.m-n,m
4.m-n,n
Answer: 4
Q761: If there are n relations how many number of join conditions has to be applied to retrieve the
data from all the n relations?
1.N+1
2.N
3.N-1
Answer: 3
Q762: If we create a file by 'ifstream', then the default mode of the file is _________
Answer: 1
1.Y->Z
2.Z->Y
3.X->YZ
4.Doesn't hold
Answer: 3
1.True
2.False
3.Can't Say
4.Doesn't hold
Answer: 3
1.X --> Y
2.Y -->X
3.Y -->--> X
Answer: 2
Q766: If you have an empty queue and you insert characters 'r', 'a', 't' (in this order only), what is the
1.'r', 'a', 't' 2.'t', 'a', 'r' 3.'r', 't', 'a' 4.'t', 'r', 'a'
Answer: 1
1.multiplication
2.addition
3.subtraction
4.division
Answer: 1
1.Coprocessor is interfaced in MAX mode 2.Coprocessor is interfaced in MIN mode 3.I/O can be
Answer: 2
Q769: In 8086 microprocessor the following has the highest priority among all type interrupts
Answer: 3
1.TRAP
2.RST6.5
3.INTR
4.RST6.6
Answer: 1
1.always be evaluated
Answer: 2
float x = 2.17;
double y = 2.17;
Which of the following is correct way for printing these variables via printf.
Answer: 4
1.components are arranged hierarchically 2.there is no beginning and no end 3.forward and
backward traversal within the list is permitted 4.components are arranged from top to bottom
Answer: 2
4.dataflow analysis
Answer: 3
Q775: In a conceptual model for a university, which of the following could most appropriately be
2.Course prerequisites
Q776: In a connected graph, a bridge is an edge whose removal disconnects a graph. Which one of
1.A tree has no bridge 2.A bridge cannot be part of a simple cycle 3.Every edge of a clique with
size>=3 is a bridge (A clique is any complete subgraph of a graph) 4.A graph with bridges cannot
have a cycle
Answer: 4
Answer: 1
Q778: In a microprocessor, the service routine for a certain interrupt starts from a fixed location of
memory which cannot be externally set, but the interrupt can be delayed or rejected. Such
aninterrupt is
Answer: 3
Q779: In a network of LANs connected by bridges, packets are sent from one LAN to another
through intermediate bridges. Since more than one path may exist between two LANs, packets may
have to be routed through multiple bridges. Why is the spanning tree algorithm used for
bridge-routing?
Answer: 2
Q780: In a syntax directed translation schema ,if value of an attribute of a node is function of the
Answer: 2
Q781: In a token ring network the transmission speed is 10^7 bps and the propagation speed is 200
Answer: 3
1.segmentation and page tables are stored in the cache and do not add any substantial overhead
Answer: 1
Q783: In access lists and groups which one of the following is correct for the 'RWX' notation of the
1.111110001
2.110111001
3.001111110
4.001110111
Answer: 2
Q784: In an array representation of binary tree, the left child of i th node is located at
Answer: 4
Q785: In an array representation of binary tree, the right child of i th node is located at
1.(i-2)/2 2.(i-1)/2 3.2i+2 4.2i+1
Answer: 3
1.rectangle
2.ellipse
3.diamond box
4.circle
Answer: 1
1.rectangle
2.square
3.ellipse
4.triangle
Answer: 3
Q788: In any undirected graph, the sum of the degrees of all nodes is:
1.is twice number of edges 2.is always ODD 3.need not be even 4.must be even
Answer: 1
instruction is/are
1.Zero
2.One
3.Two
4.Three
Answer: 1
Answer: 3
1.To make sure that it is still complete binary tree 2.It is the easiest possible way 3.Because left and
right subtree might be missing 4.maximum value is contained by the root node
Answer: 2
1.not Null
2.Null
4.any value
Answer: 1
2.cannot be a customer
4. must be an outsider
Answer: 3
Q794: In context of OSI or TCP/IP computer network models, which of the following is false?
1.Major difference between LAN and WAN is that the later uses switching element 2.Network layer
is connection oriented 3.A repeater is used just to forward bits from one network to another one 4.A
Answer: 2
1.transpositional ciphers
2.substitution ciphers
Answer: 1
Q796: In Ethernet when Manchester encoding is used, the bit rate is:
4.Grows exponentially
Answer: 1
Q797: In FTP protocol, client contacts server using ____ as the transport protocol.
Answer: 1
Q798: In general tree to binary tree conversion, the two links of the binary tree node points to
1.two leaf nodes in the general tree 2.its right child and sibling in the genral tree 3.its left child and
sibling in the general tree 4.its left and right child in the general tree
Answer: 4
1.multiple HTTP requests are sent on a single TCP connection without waiting for the corresponding
responses
provide reasonably good response time and in general, to share system resources equitably. In
such situations, the scheduling algorithm that is most popularly applied is ________.
Answer: 3
Q801: In javascript, RegExp Object Method test() is used to search a string and returns _________
Answer: 1
the last element in the array 4.The item is the last element in the array or is not there at all
Answer: 4
1.120 Bytes
2.30 Bytes
3.23 Byte
4.35 Byte
Answer: 2
Q804: In max mode, control bus signal So,S1 and S2 are sent out in ____________ form
1.shared
2.decoded
3.encoded
4.unshared
Answer: 3
Q805: In mysql_fetch_array(),if two or more columns of the result have the same field names, what
action is taken?
Answer: 3
1.To delimit the handle 2.For all pair of terminals 3.For all pair of non terminals 4.Only for a certain
pair of terminals
Answer: 3
Q807: In PHP, array values are keyed by ______ values (called indexed arrays) or using ______
values (called associative arrays). Of course, these key methods can be combined as well.
1.Float, string
3.String, Boolean
4.Integer, String
Answer: 4
Q808: In PHP, which of the following function is used to insert content of one php file into another
Answer: 3
Q809: In Priority Scheduling a priority number (integer) is associated with each process. The CPU is
allocated to the process with the highest priority (smallest integer = highest priority). The problem of,
2.Aging
3.Mutual Exclusion
4.Semaphore
Answer: 2
Q810: In software engineering development, if there are no applicable theories, people often use
adhoc approach.
1.True
2.False
3. 4.
Answer: 1
Q811: In software quality assurance work there is no difference between software verification and
software validation.
1.true
2.false
3. 4.
Answer: 2
Q812: In the absolute the addressing mode
3.The register containing the address of the operand is specified inside the instruction
Answer: 2
1.view level
2.conceptual level
3.logical level
4.physical level
Answer: 1
Q814: In the context of abstract-syntax-tree (AST) and control-flow-graph (CFG), which one of the
following is True?
1.In both AST and CFG, let node N2 be the successor of node N1. In the input program, the code
corresponding to N2 is present after the code corresponding to N1 2.For any input program, neither
AST nor CFG will contain a cycle 3.Each node in AST and CFG corresponds to at most one
statement in the input program 4.The maximum number of successors of a node in an AST and a
Answer: 4
Answer: 4
Q816: In the following code snippet, what is the correct value of the left margin? margin: 10px 5px
20px 15px;
Q817: In the multi-programming environment, the main memory consisting of _________ number of
process.
2.only one
3.Greater than 50
Answer: 4
Answer: 1
Q819: In the operation read_item(x), what does x mean?
1.a file
2.a record
Answer: 4
Answer: 1
Q821: In the slow start phase of the TCP congestion control algorithm, the size of the congestion
window .....................
2.increases linearly
3.increases quadratically
4.increases exponentially
Answer: 4
Answer: 3
2.IP header
3.IP payload
Answer: 1
Q824: In what type of coupling, the complete data structure is passed from one module to another?
1.Control Coupling
2.Stamp Coupling
3.External Coupling
4.Content Coupling
Answer: 2
Q825: In which addressing mode the operand is given explicitly in the instruction
1.Absolute
2. Immediate
3. Indirect
4. Direct
Answer: 2
1.Class for which copy constructor is defined 2.Class for which two or more than two objects will be
created 3.Almost in every class 4.Class whose objects will be created dynamically
Answer: 4
Q827: In which mode FTP, the client initiates both the control and data connections.
1.active mode
2.passive mode
Q828: In which topology, if there are n devices in a network, each device has n-1 ports for cables?
Answer: 1
1.1978
2.1979
3.1977
4.1981
Answer: 1
Q830: In win-win negotiation, the customer's needs are met even though the developer's need may
not be.
1.TRUE
2.FALSE
3. 4.
Answer: 2
Answer: 1
2.all stations
Answer: 1
1.Floppy disk
2.Magnetic tape
3.Hard disk
4.CD
Answer: 3
2.Missing Values
int x,y;
x=(100,200);
y=100,200;
printf("x=%d,y=%d",x,y);
return 0;
1.x=100,y=200
2.x=200,y=200
3.ERROR
4.x=200,y=100
Answer: 4
4.None
Answer: 1
Answer: 2
It is necessary for this search algorithm to work that data collection should be
1.in sorted form and equally distributed 2.in sorted form and but not equally distributed 3.equally
Answer: 1
2.network layer
3.application layer
4.session layer
Answer: 2
1.External clock is to be provided 2.It is using Flip flops 3.It is more complex 4.Generally they
Answer: 4
1.True
2.False
3. 4.
Answer: 1. True
Q842: It would be ideal if all of computer science theories can be used in software engineering.
1.False
2.True
3. 4.
Answer: 1. False
Answer: 2
1.Cartesian Product
1.84-2-1
Answer: 2
Q846: Let G be a weighted connected undirected graph with distinct positive edge weights.If every
edge weight is increased by the same value, then which of the following statements is/are TRUE ?
P: Minimum spanning tree of G does not change. Q: Shortest path between any pair of vertices
1.P Only
2.Q Only
3.Neither P nor Q
4.Both P and Q
Answer: 1
Q847: Let E1 and E2 be two entities in an E/R diagram with simple single-valued attributes. R1 and
R2 are two relationships between E1 and E2, where R1 is one-to-many and R2 is many-to-many.
R1 and R2 do not have any attributes of their own. What is the minimum number of tables required
1.2
2.3
3.4
4.5
Q848: Let G be a graph with n vertices and m edges, What is the tightest upper bound on the
running time on Depth First Search of G? Assume that the graph is represented using adjacency
matrix
Answer: 4
Q849: Let G be the CFG, l be the number of left most derivations, r be the number of right most
derivations and P be the number of parse trees. Assume l , r and P are computed for a particular
string. For a given CFG 'G' and given string 'w', what is the relation between l , P , r ?
1.l=P=r
2.l<=P>=r
3.l>=P<=r
4.l<=P<=r
Answer: 1
Q850: Let G(x) be the generator polynomial used for CRC checking. What is the condition that
2.G(x) does not divide 1+x^k, for any k not exceeding the frame length
Answer: 3
Q851: Let L1 be a recursive language, and let L2 be a recursively enumerable but not a recursive
Answer: 2
Q852: Let P be a QuickSort Program to sort numbers in ascending order using the first element as
pivot, Let t1 and t2 be the number of comparisons made by P for the inputs {1, 2, 3, 4, 5} and {4, 1,
Answer: 2
Q853: Let T(n) be the function defined by T(n) = 1 and T(n) = 2T (n/2) + n,
Answer: 3
Q854: Let w be any string of length n is {0,1}*. Let L be the set of all substrings of w. What is the
1.n+1
2.n
3.n-1
4.2n+1
Answer: 1
1.Peephole optimization 2.DFA and Constant folding 3.Basic Code Analysis 4.Data flow analysis
Answer: 4
1.during normal execution. 2.during DMA accesses 3.during interrupt servicing. 4.during memory
accesses
Answer: 3
Q857: Logical addressing is used in _____ layer
Answer: 1
Q858: Loop testing is a control structure testing technique where the criteria used to design test
Answer: 3
Answer: 2
Q860: Manager salary details are hidden from the employee. This is
1.Conceptual level data hiding 2.Physical level data hiding 3.External level data hiding 4.None of
mentioned
Answer: 3
Q861: Many of the tasks from the generic task sets for analysis modeling and design can be
1.TRUE
2.FALSE
3. 4.
Answer: 1
Q862: Match all items in Group 1 with correct options from those given in Group 2.
Group 1 Group 2
Answer: 2
List-I List-II
Codes:
ABCD
(a) 2 3 1 4
(b) 2 1 4 3
(c) 2 4 1 3
(d) 2 3 4 1
1.a
2.b
3.c
4.d
Answer: 3
Answer: 4
2.Programmable Memory
3.Virtual Memory
4.Associative Memory
Answer: 4
Q866: Military vehicles on a battlefield with no existing infrastructure will deploy ............... network.
1.MANET
2. Cell Network
3.LAN
4.Wi-Fi
Answer: 1
Q867: Mode of communication in which transmission takes place in both directions, but only in one
Answer: 4
Q868: Modifying the software to match changes in the ever changing environment is called
1.adaptive maintenance
2.corrective maintenance
3.perfective maintenance
4.preventive maintenance
Answer: 1
Answer: 4
Answer: 1
Q871: Multiple object can be sent over a TCP connection between client and server in
1.persistent HTTP
2.nonpersistent HTTP
4.p-persistent HTTP
Answer: 1
Q872: Multiple variable declaration of same data type can be avoided by?
1.frame filter
2.packet filter
Answer: 2
Q874: Network models are complicated by physical keys, but the relation model is
1.Slower because it uses logical keys 2.Slower because it uses physical keys 3.Faster because it
Answer: 4
Q875: Network operating system that does not support symmetric multi-processing (SMP) is
1.Banyan (VINES) 2.Microsoft NT advanced server 3.SCO Unix 4.Novell Network 3.X
Answer: 4
Answer: 2
Answer: 3
Q878: Number of the times the instruction sequence below will loop before coming out of loop is,
Answer: 4
Answer: 4
Answer: 3
1.unit testing.
2.beta testing.
3.Stress testing.
4.mutation testing.
Answer: 4
Q882: One of the header fields in an IP datagram is the Time to Live (TTL) field. Which of the
Answer: 4
1.It becomes self-cached 2.It makes the HTML file modular 3.It restricts manipulation in the HTML
Answer: 4
3.increase the chances of reusing the machine-independent code optimizer in other compilers.
Answer: 3
1.reference parameter has to be returned 2.binary addition requires that 3.all overloading functions
Answer: 1
1.different names and different argument lists 2.different names and the same argument list 3.the
same name and different argument lists 4.the same name and the same argument list
Answer: 3
Q887: Overloading the function operator
1.usually make use of a constructor that takes arguments. 2.allows you to create objects that act
syntactically like functions. 3.requires a class with an overloaded operator. 4.requires a class with an
overloaded [ ] operator.
Answer: 4
Q888: Packets of the same session may be routed through different paths in:
Answer: 2
4.avoids deadlock
Answer: 1
Q890: Parallelism and concurrency is fully achieved in which of the following thread model
1.Many-to-one model
2.Many-to-many
3.one-to-one model
Answer: 1
Q891: Passing the request from one schema to another in DBMS architecture is called as _______
1.Mapping
2.Communication
3.Relational
4.network
Answer: 1
Answer: 3
1.true
2.false
3. 4.
Answer: 2
Answer: 4
1. int x[5];
2. int x[5]={1,2,3,4,5};
4. int x[];
1.1
2.2
3.3
4.4
Answer: 3
Answer: 4
Q897: Polymorphism reduces the effort required to extend an object system by
Answer: 2
Answer: 4
Answer: 2
#include<stdio.h>
struct Point {
int x, y, z; };
int main() {
return 0; }
1.Error
2.0 1 2
3.1 2 0
4.2 0 1
Answer: 4
#include <stdio.h>
void main()
int a=10,b=2,x=0;
x=a+b*a+10/2*a;
printf("value is =%d",x);
}
1.Value is =1250 2.Value is =80
3.Value is =125
4.Error
Answer: 2
Q902: Prim's algorithm is a method available for finding out the minimum cost of a spanning tree.
Answer: 3
1.true
2.false
3. 4.
Answer: 2
4. All of these
Answer: 1
Q905: Quantitative methods for assessing the quality of proposed architectural designs are readily
available.
1.TRUE
2.FALSE
3. 4.
Answer: 2
1.Relational Algebra
Answer: 1
Answer: 4
Answer: 2
Q909: Replace the page that has not be used for the longest period of time. This principle is
adopted by ____________
Answer: 4
Answer: 2
1.Client
2.Investor
3. Production team
4.Project manager
Answer: 4
Q912: Routine is not loaded until it is called. All routines are kept on disk in a relocatable load
format. The main program is loaded into memory & is executed. This type of loading is called
_________
Answer: 3
Q913: Routine is not loaded until it is called. All routines are kept on disk in a relocatable load
format. The main program is loaded into memory & is executed. This type of loading is called
_________
1.Static loading
2.Dynamic loading
3.Dynamic linking
4.Overlays
Answer: 3
Answer: 2
Q915: S -> aSa|bSb|a|b; The language generated by the above grammar over the alphabet {a,b} is
the set of
1.All palindromes
Answer: 2
Q916: Security testing attempts to verify that protection mechanisms built into a system protect it
2.false
3. 4.
Answer: 1
Q917: SELECT department_id, AVG(salary) FROM employees WHERE AVG(salary) > 8000
GROUP BY department_id
1.Displays the department ID along with the average salary of employees in each department if their
2.Displays a error
Answer: 2
1.Displays a error
2.Displays the department ID along with the number of employees in each department.
3.None of the options
Answer: 2
Q919: SELECT employee_id, last_name FROM employees WHERE salary = (SELECT MIN(salary)
1.Displays the employee_id and name of employees who gets minimum salary in their department
2.Error
Answer: 1
3.Error
2.the selection operation in relational algebra, except that select in SQL retains duplicates
4.the projection operation in relational algebra, except that select in SQL retains duplicates
Answer: 4
1.r1(x), w2( y )
2.r1(x), w1(x)
3.w1( y ), w2(x)
4.r1(x), w2(x)
Answer: 3
Q923: SELECT THE HIGHEST PRIORITY OPERATOR
Answer: 4
1.Vertical parser 2.top down and bottom up parser 3.Bottom up parser 4.Top down parser
Answer: 3
Q925: Simple network management protocol (SNMP) is implemented with a daughter board in
1.the nodes 2.the server 3.the hubs 4.a separate PC that managers the network
Answer: 3
Answer: 2
Q927: Software coupling is a sign of poor architectural design and can always be avoided in every
system.
1.True
2.False
3. 4.
Answer: 2
1.True
2.False
3. 4.
Answer: 1
Q929: Software engineers collaborate with customers to define which of the following?
Answer: 4
Q930: Software is a product and can be manufactured using the same technologies used for other
engineering artifacts.
1.True
2.False
3. 4.
Answer: 2. False
Q931: Software validation is achieved through a series of tests performed by the user once the
1.true
2.false
3. 4.
Answer: 2. False
Q932: Some code optimizations are carried out on the intermediate code because
3.the information from dataflow analysis cannot otherwise be used for optimization
4.the information from the front end cannot otherwise be used for optimization
Answer: 1. they enhance the portability of the compiler to other target processors
Q933: Some code optimizations are carried out on the intermediate code because
1.The information from data flow analysis cannot otherwise be used for optimization 2.They enhance
the portability of the complier to other target processors 3.The information from the front end cannot
otherwise be used for optimization 4.Program analysis is name accurate on intermediate code than
on machine code
Answer: 2. they enhance the portability of the compiler to other target processors
1.alloc() and memalloc() 2.malloc() and calloc() 3.memalloc() and faralloc() 4.malloc() and
memalloc()
3.transitive dependencies
4.inner join
2.Stress testing
3.Integrated testing
Q937: Station A needs to send a message consisting of 9 packets to Station B using a sliding
window (window size 3) and go-back-n error control strategy. All packets are ready and immediately
available for transmission. If every 5th packet that A transmits gets lost (but no acks from B ever get
lost), then what is the number of packets that A will transmit for sending the message to B?
1.12
2.14
3.16
4.18
Q938: Station A uses 32 byte packets to transmit messages to Station B using a sliding window
protocol. The round trip delay between A and B is 80 milliseconds and the bottleneck bandwidth on
the path between A and B is 128 kbps. What is the optimal window size that A should use?
1.20
2.40
3.160
4.320
Answer: 2. 40
Q939: Stress testing examines the pressures placed on the user during system use in extreme
environments
1.true
2.false
3. 4.
Answer: 2. false
elements. Assume that the insertion and deletion operation are carried out using REAR and FRONT
as array index variables, respectively. Initially, REAR = FRONT = 0. The conditions to detect queue
1.Full: (FRONT+1) mod n == REAR, empty: REAR == FRONT 2.Full: REAR == FRONT, empty:
(REAR+1) mod n == FRONT 3.Full: (REAR+1) mod n == FRONT, empty: (FRONT+1) mod n ==
elements. Assume that the insertion and deletion operation are carried out using REAR and FRONT
as array index variables, respectively. Initially, REAR = FRONT = 0. The conditions to detect queue
1.Full: (REAR+1) mod n == FRONT, empty: REAR == FRONT 2.Full: (REAR+1) mod n == FRONT,
empty: (FRONT+1) mod n == REAR 3.Full: REAR == FRONT, empty: (REAR+1) mod n == FRONT
Q943: Suppose P, Q, R, S, T are sorted sequences having lengths 20, 24, 30, 35, 50 respectively.
They are to be merged into a single sequence by merging together two sequences at a time, The
number of comparisons that will be needed in the worst case by the optimal algorithm for doing this
is ____
Answer: 3. 358
They are to be merged into a single sequence by merging together two sequences at a time. The
number of comparisons that will be needed in the worst case by the optimal algorithm for doing this
is ____
Q945: Suppose the round trip propagation delay for a 10 Mbps Ethernet having 48-bit jamming
1.94
2.416
3.464
4.512
Answer: 4. 512
Q946: Suppose x is dead, that is, never subsequently used, at the point where the statement x=y+z
appears in a basic block. Then this statement may be safely removed without changing the value of
4.Loop invarient
Which of the following data structures shall be most efficient for this operation?
1.True
2.False
3. 4.
Answer: 1. true
Q949: Synchronous counters eliminate the delay problems encountered with asynchronous (ripple)
1.input clock pulses are applied simultaneously to each stage 2.input clock pulses are applied only
to the first and last stages 3.input clock pulses are applied only to the last stage 4.input clock pulses
1.(i) only 2.(ii) only 3.Both (i) and (ii) 4.None of these
Answer: 3, both
Answer: 1. LR grammar
Answer: 1
Q953: System reactions to external events is depicted by
1.State diagram
2. Activity diagram
3.Usecase diagram
4. Sequence diagram
1.TRUE
2.FALSE
3. 4.
Answer: 2. false
Q955: The focus of validation testing is to uncover places that a user will be able to observe failure
1.true
2.false
3. 4.
Answer: 1. true
Q956: The job of the requirements engineer is to categorize all stakeholder information in a way that
1.True
2.False
3. 4.
Answer: 1. true
Q957: The --------is neither an input nor an output; it is an internal bit programmed via the PC4(Port
A) or PC2(Port B)bits
Answer: 3. INTE
Q958: The ........ instruction is used to specify the number of stop bits, data bits,parity bit, and baud
1.1 Kbyte
2.64 Kbyte
3.33 Kbyte
4.34 Kbyte
Answer: 2
Answer: 1
Q961: The 16-bit data segment value is 1000H and the offset is 2000H. calculated physical address
is -----
Answer: 3
Q962: The 16-bit stack segment value is 5D27H and the offset is 2C30H. calculated physical
address is -----
Answer: 3
Q963: The ___ bus controller device decodes the signals to produce the control bus signal
1.internal
2.data
3.external
4.address
Answer: 3
Q964: The ____ translates internet domain and host names to IP address.
Answer: 1
Q965: The _______ method of an Array object adds and/or removes elements from an array.
1.Slice
2.Reverse
3.Shift
4.Splice
Answer: 4
Q966: The ________ ensures that only one IC is active at a time to avoid a bus conflict caused by
two ICs writing different data to the same bus
Answer: 3
Answer: 4
1.Direct
2.Random
3.Sequential
4.None of these
Answer: 3
Q969: The address resolution protocol (ARP) is used for:
Answer: 4
1.redundancy
2.data dependence
3.multiple user
4.single user
Answer: 1
Answer: 1
1.base 64 encoding
2.base 32 encoding
3.base 16 encoding
4.base 8 encoding
Answer: 1
Q973: The average time required to reach a storage location in memory and obtain its contents is
called the
1.seek time
2.turnaround time
3.access time
4.transfer time
Answer: 3
1.Bucket Hash
2.Quad tree
3.B Tree
4.B+ Tree
Answer: 3
Q975: The best reason for using Independent software test teams is that
3.testers do not get involved with the project until testing begins
Answer: 2
3.send them to the design team and see if they have any concerns
Answer: 1
1.8
2.6
3.4
4.12
Answer: 2
Q978: The BIU prefetches the instruction from memory and store them in ________
1.queue
2.register
3.memory
4.stack
Answer: 1
Q979: The call to the parameterized constructor of base class in the derived class
1.ppears inside the definition of the derived class constructor 2.appears in the member initialization
list of the derived class constructor 3.appears inside the definition of the derived class 4.appears at
Q980: The call to the parameterized constructor of base class in the derived class
1.ppears inside the definition of the derived class constructor 2.appears in the member initialization
list of the derived class constructor 3.appears inside the definition of the derived class 4.appears at
Answer: 1
Q981: The combination of Sixteen adjacent squares in four variable K-map represent the function
equal to
Answer: 1
Answer: 3
Q983: The cyclomatic complexity metric provides the designer with information regarding the
number of
Answer: 4
Q984: The data structure required for Breadth First Traversal on a graph is
Answer: 4
1.NAME VALUE ADDRESS 2.BITS BYTES WORD 3.SIZE LIMITS RESTRICTIONS 4.TYPE SIZE
RANGE
Answer: 4
Q986: The decimal equivalent of hexadecimal number of 'A580' is
Answer: 2
Answer: 2
Q988: The degree sequence of a simple graph is the sequence of the degrees of the nodes in the
graph in decreasing order. Which of the following sequences can not be the degree sequence of
Answer: 4
Q989: The design process related to data structures and their representation is
1.Architectural design
2.Interface design
3.Component design
4.Database design
Answer: 2
1.A record form a hierarchical structure but a linear array does not 2.All of above 3.An array is
suitable for homogeneous data but the data items in a record may have different data type 4.In a
Answer: 3
Answer: 3
Q992: The efficient data structure to insert/delete a number in a stored set of numbers is
1.Queue 2.Linked list 3.Doubly linked list 4.Binary tree
Answer: 3
Answer: 1
Q994: The ESC instruction of 8086 may have two formats. In one of the formats, no memory
operand is used. Under this format, the number of external op-codes (for the co- processor) which
can be specified is
Answer: 1
Q995: The external system bus architecture is created using from ______ architecture
1.Pascal
2.Dennis Ritchie
3.Charles Babbage
4.Von Neumann
Answer: 1
Answer: 3
2.Basic bitmap
3.Reservation protocol
4.SAP
Answer: 2
Q998: The first processor to include Virtual memory in the Intel microprocessor familywas
Answer: 3
1.Referential Integrity Constraint 2.Check Constraint 3.Foreign Key Constraint 4.Entity Integrity
Constraint
Answer: 2
Q1000: The following SQL is which type of join: SELECT CUSTOMER_T. CUSTOMER_ID,
ORDER_T. CUSTOMER_ID, NAME, ORDER_ID FROM CUSTOMER_T,ORDER_T ;
1.Equi-join
2.Natural join
3.Outer join
4.Cartesian join
Answer: 4
Q1001: The formal methods model of software development makes use of mathematical methods to
1.
4.ALL
Answer: 4
Q1002: The function used to remove the leading spaces is
1.ltrim
2.lpad
3.rpad
4.rtrim
Answer: 1
Q1003: The goal of product engineering is to translate the customer's desire for a set of defined
1.TRUE
2.FALSE
3. 4.
Answer: 1
Q1004: The grammar A - AA | (A) | e is not suitable for predictive-parsing because the grammar is
1.ambiguous
2.left-recursive
3.right-recursive
4.an operator-grammar
Answer: nan
Answer: 3
Q1006: The Hardware mechanism that enables a device to notify the CPU is called __________.
1.Polling
2.Interrupt
3.Systems Call
4.None of these
Answer: 2
2.Thrashing
3.Context Switching
4.Working Set
Answer: 2
1.DMA Controller
2.Interrupt Controller
3.Keyboard controller
Answer: 1
Q1009: The IC 8251 A has ---------------------many pins
1.24
2.28
3.40
4.30
Answer: 2
1.24
2.28
3.34
4.40
Answer: 1
1.1
2.2
3.3
4.4
Answer: 3
1.20
2.30
3.40
4.10
Answer: 3
1.IC 8251A
2.IC8259
3.IC5255
4.IC 8254
Answer: 1
4.all of these
Answer: 1
1.accuracy
2.complexity
3. efficiency
4. quality
Answer: 4
Q1016: The Incremental Model is a result of combination of elements of which two models?
Answer: 3
3.The best approach to use for projects with large development teams.
Answer: 2
1.8 bit
2.16 bit
3.32 bit
4.4bit
Answer: 2
Q1019: The internal block diagram of 80286 contains ---- functional parts.
Answer: 2
Q1020: The interrupt cycle ends when the ........... instruction is executed
Answer: nan
Answer: 3
1.8 bits
2.4 bits
3.16 bits
4.32 bits
Answer: 32 bits
Q1024: The kernel keeps track of the state of each task by using a data structure called __
4.None of these
Q1025: The language accepted by a Pushdown Automation in which the stack is limited to 10 items
is best described as
1.Regular
2.context free
3.Recursive
Q1026: The language L= {0i21i | i>=0 } over the alphabet {0,1, 2} is:
1.not recursive
3. is a regular language
Q1027: The language that the computer can understand and execute is called ______
1.Machine language
2.Application software
3.System program
4.None of these
1.Regular language
Q1029: The length of the shortest string NOT in the language (over S = {a, b}) of the following
a*b*(ba)*a*
1.2
2.3
3.4
4.5
Answer: 3
Answer: History
Q1031: The levels of hierarchy in inheritance helps to handle
Answer: Complexity
Q1032: The lexical analysis for a modern language such as Java needs the power of which one of
4.Turing machine
Q1033: The library function used to find the last occurrence of a character in a string is
Answer: strchr()
Q1034: The linear sequential model of software development is
3.The best approach to use for projects with large development teams.
Q1035: The linear sequential model of software development is also known as the
2.Spiral model
3.Waterfall model
4.Incremental Model
Q1036: The load instruction is mostly used to designate a transfer from memory to a processor
register known as____.
1.Accumulator
2. Instruction Register
3. Program counter
Answer: Accumulator
1.detect problems in protocols 2.determine the type of switch used in a data link 3.determine the
Q1038: The maximum number of superkeys for the relation schema R(E,F,G,H) with E as the key is
1.7
2.8
3.9
4.6
Answer: 8
1.1000 bytes
2.1200 bytes
3.1300 bytes
4.1500 bytes
Q1040: The maximum window size for data transmission using the selective reject protocol with
1.2^n
2.2^(n-1)
3.2^n - 1
4.2^(n-2)
Answer: 2^(n-1)
Q1042: The mechanism that bring a page into memory only when it is needed is called ______
1.Segmentation
2.Fragmentation
3.Demand Paging
4.Page Replacement
Answer: Private
Q1044: The memory unit that communicates directly with the CPU is called the
1.main memory
2.Secondary memory
3. shared memory
4.auxiliary memory
1.memory
2.I /O device
3.processor
4.register
Answer: Memory
Q1046: The microprocessor determines whether the specified condition exists or not by testing the
______
1.carry flag
2.conditional flag
3.common flag
4.sign flag
Q1047: The minimum number of arithmetic operations required to evaluate the polynomial P(X) =
X^5 + 4X^3 + 6^X + 5 for a given value of X using only one temporary variable is.
Answer: 7
Q1048: The minimum number of arithmetic operations required to evaluate the polynomial
Answer: 7
Q1049: The minimum number of nodes in a binary tree of depth d (root at level 0) is
Answer: d+1
1.Hardware
2.Software
3.Firmware
4.Malware
Answer: Hardware
Q1051: The nature of collaboration is such that all system requirements are defined by consensus
2.FALSE
3. 4.
Answer: False
Q1052: The node type for document returns the value ---.
Answer: 9
Q1053: The number of auxiliary memory required for a Push Down Machine (PDM) to behave like a
1.0
2.2
3.4
4.1
Answer: False
Q1054: The number of clock pulses needed to shift one byte of data from input to the output of a
Answer: 16
Q1055: The number of components in a graph with n nodes and 1 edge are
Answer: n-1
Q1056: The number of components in a graph with n nodes and 1 edge are
Answer: n-1
Answer: 3
Q1058: The number of states in DFA is --------than the number of states in NFA for the same
Language.
1.Greater
2.less
3.greater equal
4.equal
Answer: Greater
1.3
2.10
3.26
4.21
Answer: 10
Answer: Traversal
1.software triggered strobe 2.Programmable one shot 3.Interrupt on terminal count 4.Square wave
rate generator
1.bit-by-bit delivery
2.channel coding
3.modulation
Q1064: The physical layer translates logical communication requests from the ______ into hardware
specific operations.
2.network layer
3.trasnport layer
4.application layer
Q1065: The pop() method of the array in javascript does which of the following task ?
1.decrements the total length by 1
Q1066: The portion of physical layer that interfaces with the media access control sublayer is called
Answer: ab + cd - *
1.AB + CD* E - *F *G / 2.AB + CD* E - F **G / 3.AB+ CD*E - FG /** 4.AB + CDE * - * F *G /
Which one of the following is the postorder traversal sequence of the same tree?
4.15,10,23,25,20,35,42,39,30
Answer: 15,10,23,25,20,35,42,39,30
1.reading
2.writing
3.storing
4.coding
Answer: Storing
Q1071: The processes that keep track of all mobile hosts visiting the area is .................
1.Home agent
2.Mobile agent
3.Foreign agent
4.User agent
Q1072: The project planner examines the statement of scope and extracts all important software
1.Association
2.Decomposition
3.Planning process
4.ALL
Answer: Decomposition
4.ALL
1.attribute
2.relation
3.degree
4.tuple
Answer: Tuple
1.may be different
2.must be different
3.must be same
Q1076: The relational model uses some unfamiliar terminology. A tuple is equivalence to a:
Answer: Record
Q1077: The removal of process from active contention of CPU and reintroduce them into memory
1.Interrupt
2.Swapping
3.Signal
4.Thread
Answer: Swapping
1.List should be small in number 2.List should be large in number 3.List should be sorted 4.No
restriction
Answer: 142
Q1080: The searching technique that takes O (1) time to find a data is
1. S < STBR
2. S > STBR
transformation
Q1085: The smallest finite automation which accepts the language {x | length of x is divisible by 3}
has :
1.2 states
2.3 states
3.4 states
4.5 states
Q1086: The space factor when determining the efficiency of algorithm is measured by
1.Counting the average memory needed by the algorithm 2.Counting the minimum memory needed
by the algorithm 3.Counting the maximum memory needed by the algorithm 4.Counting the
2.
3.Do not Include project risks evaluation during each iteration 4.Includes feasibility risks
Answer: 3.Do not Include project risks evaluation during each iteration
1.IBM
2.Barry Boehm
3. Pressman
4.Royce
Answer: 2.Barry Boehm
Q1090: The starting address for counter 0 of 8253 is 0038H, then port address for control word
register is
Answer: nan
Answer: 4.AC
Q1095: The switching method fixes the path from source to destination is _________
4.[EvalName.]eval(numeriC)
Answer: 2.[objectName.]eval(string)
1.detailed view
2.domain view
3.element view
4.world view
Answer: 4.world view
1.<=11Mbps
2.<=64Mbps
3.<=74Mbps
Answer: 1.<=11Mbps
Q1100: The tightest upper bound for the worst case performance of quicksort implemented on an
Answer: 3.O(n^2)
1.28
2.40
3.30
4.20
Answer: 2. 40
Q1104: The two statements that can be used to change the flow of control are
1.switch and do-while 2.if and while 3.if and switch 4.break and continue
Q1107: The value in AL=11011010 after the operation of CBW, the result is
Answer: nan
1.encoding
2.decoding
3.processing
4.calculations
Answer: 2.decoding
Q1110: The work products produced during requirement elicitation will vary depending on the
4.stakeholders needs
n*2^n elements is
Answer: 3.theta(n)
Q1112: The worst case running time to search for an element in a balanced in a binary search tree
Answer: 3.theta(n)
Q1113: There are n stations in a slotted LAN. Each station attempts to transmit with a probability p
in each time slot. What is the probability that only one station transmits in a given time slot?
1.(1-p)^(n-1)
2.np(1-p)^(n-1)
3.p(1-p)^(n-1)
4.1-(1-p)^(n-1)
Answer: 2.np(1-p)^(n-1)
Answer: 3.Datagram
1.binary image 2.high quality image 3.low quality image 4.enhanced image
Answer: 1.binary image
Answer: 2.reference
Q1118: To Delete an item from a Queue identify the correct set of statements
1.Q[REAR] = item; REAR ++ 2.item = Q[FRONT]; FRONT++ 3.item = Q[REAR]; FRONT ++ 4.item =
Q[FRONT]; REAR ++
Q1119: To determine the architectural style or combination of styles that best fits the proposed
1.algorithmic complexity
Q1120: To interface memory with the microprocessor, connect register the lines of the address bus
1.single
2.memory
3.multiple
4.triple
Answer: 2.memory
1.presetting all the flip-flops 2.clearing one flip-flop and presetting all the others 3.presetting one
flip-flop and clearing all the others 4.clearing all the flip-flops
1.True
2.false
3. 4.
Answer: 2. false
Q1123: Trigger is a
1.Statement that enables to start any DBMS 2.Statement that is executed by the user when
side effect of a modification to the database 4.Condition the system tests for the validity of the
database user
Answer: 3.Statement that is executed automatically by the system as a side effect of a modification
to the database
Q1124: Two computers C1 and C2 are configured as follows. C1 have IP address as 203.197.2.53
Q1125: Two sets of functional dependencies E and F are equivalent if E+ = F+ .This statement is
1.True
2.False
3.Cant Say
4.
Answer: 1.True
1.deleting database 2.modifying or adding record occurrences 3.revising the file structure
1.customers
2. experienced programmers
3.product users
4.project managers
Q1128: Using linked list node representation, inserting a node in general tree is performed efficently
1.not possible 2.by merging with an existing node 3.after introducing a new link 4.after converting to
binary tree
Q1129: Using the 8259A, the INT input of the 8086 can be expanded to accomodeate up to
Answer: 2. 64
Q1130: Usually a pure virtual function
1.Will be called only to delete an object 2.Is defined only in derived class 3.Will never be called
1.RAM
2.Cache Memory
3.Hard Disc
4. None of these
1.A5/2 cipher
2.b5/4 cipher
3.b5/6 cipher
4.b5/8 cipher
1.COMPACT DISK 2.HARD DISK 3.RANDOM ACCESS MEMORY 4.READ ONLY MEMORY
Q1134: What are the three Analysis models that depict software?
4.NONE
1.Risk monitoring
2.Risk planning
3.Risk analysis
4.Risk identification
Answer: 1
Q1136: What characteristic of RAM memory makes it not suitable for permanent storage?
1.too slow
2. unreliable
3.it is volatile
4.too bulky
Answer: 3
Q1137: What do the 'c' and 'v' in argv stands for?
1.'c' means argument count 'v' means argument vector 2.'c' means argument count 'v' means
argument vertex 3.'c' means argument configuration 'v' means argument visibility 4.'c' means
Answer: 1
1.Match one or more characters that are not open paranthesis 2.Match zero or more characters that
are open paranthesis 3.Match zero or more characters that are not open paranthesis 4.Match one or
Answer: 3
1.Used to convert a string to an array 2.Used to split a given string into the number of chunks
specified 3.Used to split a string by a string 4.Used to split string into two equal halves
Answer: 1
Answer: 3
Answer: 1
int (*ptr)[10];
1.ptr is array of pointers to 10 integers 2.ptr is a pointer to an array of 10 integers 3.ptr is an array of
Answer: 2
<?php
var_dump ($array);
?>
1.1 => 'b'
3.NULL
Answer: 3
Answer: 3
1.PHP continues to execute the script. 2.Results in a fatal error 3.Include_path is made use of 4.It
Answer: 3
Answer: 3
1.none of them 2.A master clock triggers all the flip-flops at a time 3.all the flip-flop are combined to
Answer: 4
1.block cipher
2.stream cipher
3.bit cipher
Answer: 1
1.Shifting the data in all flip-flops simultaneously 2.Loading data in two of the flip-flops 3.Loading
data in all flip-flops at the same time 4.Momentarily disabling the synchronous SET and RESET
inputs
Answer: 3
Answer: 2
Q1152: What is the code to start displaying the time when document loads?
= start;
Answer: 3
Q1153: What is the condition for resetting(s=0) the S flag in status register?
1.MSB of the result is One 2.MSB of the result is zero 3.LSB of the result is one 4.LSB of the result
is zero
Answer: 2
Q1154: What is the correct CSS syntax for making all the elements bold?
Answer: 1
Q1155: What is the correct way to connect to a MySQL database?
1.mysqli_db(host,username,password,dbname);
2.mysqli_connect(host,username,password,dbname);
3.mysqli_open(host,username,password,dbname);
4.mysqli_connect(,,)
Answer: 2
Answer: 3
Answer: 2
Q1158: What is the default size of a file set in upload_max_filesize ?
Answer: 2
1.They both behave the same. 2.Print can take multiple parameters where as echo cannot 3.Echo
can take multiple parameters where as print cannot 4.Print is a function where as echo is not.
Answer: 3
1.Attribute Match 2.Exact Value Match 3.Contains Value Match 4.Subcode Match
Answer: 3
Q1161: What is the highest normal form level satisfied by the following table design?
1.1 NF
2.2 NF
3.3 NF
4.BCNF
Answer: 2
Q1162: What is the maximum number of reduce moves that can be taken by a bottom-up parser for
a grammar with no epsilon- and unit-production (i.e., of type A -> ie and A -> a) to parse a string with
n tokens?
1.n/2
2.n-1
3.2n-1
4.2^n
Answer: 2
Q1163: What is the maximum size of data that the application layer can pass on to the TCP layer
below?
1.Any size
3.2^16 bytes
4.1500 bytes
Answer: 1
Q1164: What is the minimum number of NAND gates required to implement A + AB` + AB`C?
Answer: 1
1.Define pattern matching techniques 2.Define subpatterns within the complete pattern 3.Define
Answer: 2
1.Increase the memory accessibility 2.Increase the memory addressibility 3.easy to retrieve data
4.faster access
Answer: 2
Q1167: What is the normal order of activities in which traditional software testing is organized? a.
1.a, d, c, b
2.b, d, a, c
3.c, a, d, b
4. d, b, c, a
Answer: 3
1.Requirements Definition, System & Software Design, Implementation & Unit Testing, Integration &
2.Requirements Definition, Integration & System Testing, System & Software Design,
3.System & Software Design, Requirements Definition, Operation & Maintenance, Implementation &
4.Implementation & Unit Testing, Requirements Definition, System & Software Design, Integration &
1.10***24000
2.*****24000
3.24000*****
4.error
Answer: 2
int main()
structure hotel
int items;
strcpy(a.name, "TAJ");
a.items=10;
printf("%s", a.name);
return 0;}
1.empty string
2.TAJ
3.none
4.Error
Answer: 4
main (){
int x = 2, y = 5;
printf("z2");
1.z1z2
2.z1
3.Compilation error
4.none
Answer: 4
Q1172: What is the output of this C code?
#include<stdio.h>
int main()
int i, j;
return 0;
2.1 2 3 4
4.4 3 2 1
Answer: 3
#include<stdio.h>
int main()
{
char p;
p = (buf + 1)[5];
printf("%d\n", p);
return 0;
1.8
2.7
3.6
4.9
Answer: 4
#include <stdio.h>
void main()
int a=3,b=2;
a=a==b==0;
printf("%d,%d",a,b);
1.1,2
2.3,2
3.0,0
4.2,3
Answer: 1
Answer: 3
Q1176: What is the relationship between the priority of task and their period in RMS?
1. decreases
2.increases
3.remains unchanged
4.linear
Answer: 1
Q1177: What is the result of the following code snippet? window.location === document.location
Answer: 2
1.Find the last occurrence of the string within a string 2.Find the first occurrence of the string within a
string 3.Find both last and first occurence 4.Search for all occurrence within a string
Answer: 2
Answer: 1
Answer: 3
Q1181: What is the type of network in which the routers themselves are mobile?
3.Mobile Network
Answer: 2
Answer: 4
4.None
Answer: 2
Answer: 1
1.Read/Write. Creates a new file. Returns FALSE and an error if file already exists
2.Write only. Creates a new file. Returns TRUE and an error if file already exists
Answer: 1
Answer: 2
1.Relaional
2.Logical Schema
3.Conceptual Schema
4.External View
Answer: 1
Q1188: What library do you need in order to process images?
1.GD library
2.ZIP library
4.BOGUS library
Answer: 1
unsigned num;
4.Invalid declaration
Answer: 4
Q1190: What type of register would shift a complete binary number in one bit at a time and shift all
the stored bits out one bit at a time?
Answer: 4
#include <stdio.h>
int main()
int x=10,y=20;
if(x==y)
printf("%d\t%d",x,y);
return 0;
1.10 20
2.error
3.Prints nothing
Answer: 3
Q1192: What will be the output of the C program?
#include<stdio.h>
int main()
int i;
i = 64/square(4);
printf("%d",i);
return 0;
1.8
2.32
3.16
4.64
Answer: 4
#include<stdio.h>
#define x 1+2
int main()
int i;
i = x * x * x;
printf("%d",i);
}
1.8
2.9
3.27
4.7
Answer: 4
#include<stdio.h>
int main()
printf("%d", num);
return 0;
1.8
2.7
3.6
4.9
Answer: 1
Q1195: What will be the output of the following code?
#include"stdio.h"
void main()
int a[10];
1. Garbage value 0
2.0 0
Answer: 4
#include"stdio.h"
int main()
printf("%d", 0[arr]);
return 0;
}
1.0
2.1
3.6
4.10
Answer: 4
#include<stdio.h>
#include<string.h>
int main()
int i;
gets(str1);
gets(str2);
i = strcmp(str1, str2);
printf("%d\n", i);
return 0;
2.error
3.-1
4.0
Answer: 1
#include"stdio.h"
void main()
printf("%d", sizeof(arr)/sizeof(arr[0]));
1.4
2.7
3.6
4.5
Answer: 1
#include <stdio.h>
int main()
{
extern int ok;
printf("value of ok = %d",ok);
return 0;
1.Declaration Error
2.value of ok = 1000
3.value of ok = 0
4.Linking Error
Answer: 2
Answer: 3
2.Thrasing happens
3.Working set model developed
Answer: nan
1.Error Page 2.Remains in the same page 3.about:blank 4.Open the first page in the history
Answer: 2
<?php
$sum = 0;
$sum += $array[$array[$i]];
echo $sum;
?>
1.78
2.19
3.NULL
4.5
Answer: 1
Q1204: What would be the output of the below code fragment? var a = ["s","a","v","e"];
document.write(a.join(""));
Answer: 2
Q1205: When testing object-oriented software it is important to test each class operation separately
1.true
2.false
3. 4.
Answer: 2
Q1206: When a new row is inserted the constraints that can be violated are
1.Primary Key constraint
4.Domain Constraint
Answer: 1
Q1207: When a single item that triggers other data flow along one of many paths of a data flow
1. high coupling
2. poor modularity
3.transaction flow
4. transform flow
Answer: 3
Q1208: When displaying a web page, the application layer uses the
1.HTTP protocol
2.FTP protocol
3.SMTP protocol
4.IMAP Protocol
Answer: 1
Q1209: When operated in slave mode, the PIC outputs its type number only if the cascaded address
Answer: 4
Q1210: When the overall flow in a segment of a data flow diagram is largely sequential and follows
1. low coupling
2.good modularity
3. transaction flow
4. transform flow
Answer: 4
Q1211: When the pre-order and post-order traversal of a Binary Tree generates the same output,
Answer: 3
Q1212: When there are infinite distinguishable strings then there cannot be a -------------
1.automata
2.finite automata
3.regular expression
Answer: nan
Q1213: When there is an indefinite or an infinity value during an arithmetic value computation,
javascript
Answer: 3
Q1214: When used with the datalist element, what is the list attribute in HTML5 used to accomplish?
Answer: 2
1.M2
2.M1 and M2
3.M1
4.M1 or M2
Answer: nan
Q1216: when you were asked to design a relation, you come across a situation, where passport
number is to be included for the people. All the students wont be having passport. So what
1.Primary Key
2.Not Null
3.Default
4.Unique
Answer: 4
Q1217: Which of the following is shared between all of the threads in a process? Assume a kernel
1.Register values
2.File descriptors
3.Scheduler priority
4.Local variables
Answer: 2
Q1218: Which activity is concerned with identifying the task at the final embedded systems?
1.scheduling
3.high-level transformation
4.compilation
Answer: 2
Q1219: Which buffer is a parallel to serial converter that receives a parallel byte for conversion into
Answer: 1
Q1220: Which character function can be used to return a specified portion of a character string?
1.INSTR
2.SUBSTRING
3.SUBSTR
4.POS
Answer: 3
1.image-background:url('R4R_Logo.jpg') 2.background-image:url('R4R_Logo.jpg')
3.bg-image:url('R4R_Logo.jpg') 4.background-image:href('R4R_Logo.jpg')
Answer: 2
Q1222: Which Data structure is best suited for the UNDO operation in Windows
Answer: 3
1.External
2.Conceptual
3.Internal
4.Physical
Answer: 1
Q1224: Which date function is used to obtain the date of next Wednesday
1.NEXT_DAY
2.LAST_DAY
3.NEXT_DATE
Answer: nan
Q1225: Which design model is analogous to the detailed drawings of the access points and external
1.Architectural design
2.Component-level design
3.Data design
4.Interface design
Answer: 4
Answer: 3
Answer: 4
Answer: 4
Q1229: Which granularity level of testing checks the behavior of module cooperation?
1.Unit Testing
2.Integration Testing
3.Acceptance Testing
4.Regression Testing
Answer: 2
Q1230: Which header file should be included to use functions like malloc() and calloc()?
1.string.h 2.dos.h 3.memory.h 4.stdlib.h
Answer: 4
Q1231: Which Instruction word is used to specify the number of stop bits, data bits, parity bit and the
Answer: nan
2.The same query can be written in many ways, each with vastly different execution plans.
Answer: 1
2.Unsafe State
3.Safe Sequence
4.Resource sequence
Answer: nan
Q1234: Which is one of the most important stakeholder from the following ?
3.Managers
Answer: 4
Answer: 3
Q1236: Which is used to store critical pieces of data during subroutines and interrupts
1.Stack
2.Queue
3.Accumulator
4.Data register
Answer: 1
Answer: 2
Q1238: Which JavaScript function is most useful for finding errors?
Answer: 3
Q1239: Which level simulates the algorithms that are used within the embedded systems?
1.algorithmic level
2.switch level
3.gate level
4.circuit level
Answer: 1
Q1240: Which memory storage is widely used in PCs and Embedded Systems?
1.EEPROM
2.Flash memory
3.SRAM
4.DRAM
Answer: 4
Q1241: Which method bypasses the CPU for certain types of data transfer?
1.Software interrupts
2.Interrupt-driven I/O
3.Polled I/O
Answer: 4
Q1242: Which method is used for loading the driver in Java JDBC.
1.getDriver() method
2.class.forName()
3.createStatement()
4.getConnection()
Answer: nan
1.stringVariable.substring(subString)
2.stringVariable.find(subString)
3.stringVariable.indexOf(subString)
4.stringVariable.indexOf(charAt(0))
Answer: 3
Q1244: Which model can be selected if user is involved in all the phases of SDLC?
1.Waterfall Model
2.Prototyping Model
3.RAD Model
Answer: 3
Q1245: Which model depicts the profile of the end users of a computer system?
1.design model
2.implementation model
3. user model
4.client model
Q1246: Which multiple access technique is used by IEEE 802.11 standard for wireless LAN?
1.CDMA
2.CSMA/CA
3.ALOHA
4.CSMA/CD
Answer: 2. CSMA/CA
Q1247: Which of the below given sorting techniques has highest best-case runtime complexity?
Q1248: Which of the following (in file scope) leads to a compile-time error?
1.const int a=90; 2.const int f1() { return 100; } 3.int f2() const { return 200; } 4.const int f3( const int i)
{ return 300;}
Q1249: Which of the following activities is not one of the four things that need to be accomplished
Q1250: Which of the following addressing modes are suitable for program
1. Absolute addressing
2. Based addressing
3. Relative addressing
4. Indirect addressing
1.1 and 4
2.1 and 2
3.2 and 3
4.1,2 and 4
Q1251: Which of the following algorithm design technique is used in the quick sort algorithm?
graph
1.I and II
2.I and IV
Q1255: Which of the following attribute is needed for file upload via form?
1.enctype='multipart/form-data'
2.enctype='singlepart/data'
3.enctype='file'
4.enctype='form-data/file'
Answer: 1.enctype='multipart/form-data'
1.Column
2.1966_Invoices
3.Catch_#22
4.#Invoices
Answer: 2.1966_Invoices
1.Validating a form 2.Sending a form's contents by email 3.Storing the form's contents to a database
Q1259: Which of the following command words need to be programmed to operate a single PIC in
1.ICW1 and ICW2 2.ICW1, ICW2 and ICW4 3.ICW2 and ICW3 4.ICW1 and ICW4
Answer: nan
1.Statically typed language 2.Dynamically typed language 3.Both Statically and dynamically typed
Q1261: Which of the following describes a handle (as applicable to LR-parsing) appropriately?
1. It is the position in a sentential form where the next shift or reduce operation will occur
2.It is non-terminal whose production will be used for reduction in the next step
3.It is a production that may be used for reduction in a future step along with a position in the
sentential form where the next shift or reduce operation will occur
4. It is the production p that will be used for reduction in the next step along with a position in the
sentential form where the right hand side of the production may be found
Answer: 4. It is the production p that will be used for reduction in the next step along with a position
in the sentential form where the right hand side of the production may be found
Answer: 4.Transient
Q1263: Which of the following file access method needs a relative block number 'n'?
1.Contiguous allocation
2.Linked allocation
3.Direct access
4.Sequential access
Q1264: Which of the following function is used to terminate the script execution in PHP?
1.break()
2.quit()
3.die()
4.exit()
Answer: 4.exit()
Q1265: Which of the following function sets first n characters of a string to a given character?
Answer: 2.strnset()
Q1266: Which of the following grammar rules violate the requirements of an operator grammar ? P,
2. P-QsR
3. P-e
4. P-QtRr
2.1 only
Q1267: Which of the following helps in reducing the energy consumption of the embedded system?
1.emulator
2. debugger
3.simulator
4.compilers
Answer: 4.compilers
Q1268: which of the following intermediate language can be used in intermediate code generation?
1.Postfix notation and Three address code 2.Quadraples 3.Triples 4.Infix notation and two address
code
3.Cause-Effect Graphs
4.ALL
1.=
2.LIKE
3.BETWEEN
Answer: 1. =
Q1271: Which of the following is a dynamic model that shows how the system interacts with its
environment as it is used?
2.interaction model
3.environmental model
1.difficult to update
3.data redundancy
Q1274: Which of the following is a project scheduling method that can be applied to software
development?
1.PERT
2.CPM
3.CMM
1.X.25 level 2-ISO 2.Source routing and Domains Naming Usenet 3.X.25 packet land protocols
1.void * operator new(size_t size) { } 2.void * operator new () { } 3.void operator delete(void * ptr) { }
Answer: nan
1.void * operator new(size_t size) { } 2.void * operator new () { } 3.void operator delete(void * ptr) { }
Answer: nan
1.It is a class of which stream is an object. 2.Using cin, the data can be read from user's terminal.
3.It represents standard input. 4.It is an object of istream class.
4.ALL
Answer: 4. ALL
1.Cache memory
2.Secondary memory
3. Registers
4. RAM
Answer: 2.Secondary memory
1.Join
2.Semi-Join
3.Assignment
4.Project
Answer: 4.Project
1.Instruction cache
2.Instruction register
3.Instruction opcode
4.Translation-a-side buffer
1.atomicity
2.consistency
3.dirty read
4.durability
1.evaluations to be performed
Q1285: Which of the following is not a valid attribute of the INPUT tag?
1.TEXT 2.NAME 3.SIZE 4.MAXLENGTH
Answer: 1.TEXT
Answer: 3.&&&
Q1287: Which of the following is not an example of infrastructure components that may need to be
1.Communications components
2.Database components
3. Interface components
1.Specification delays
2.Product competition
3.Testing
4.Staff turnover
Answer: 3.Testing
1.Magnetic tape
2.Printer
3.VDU terminal
4. Assembler
Answer: 4. Assembler
Q1291: Which of the following is not one of Hooker's core principles of software engineering
practice?
4.
Answer: 3.Pareto principle (20% of any product requires 80% of the effort)
Q1292: Which of the following is not one of the principles of good coding?
1.Deleting files from the server 2.Redirect a visitor to another page 3.Set the value of the window
Answer: nan
1.File permissions
2.Program Counter
Answer: nan
. 2.They do not have return type. 3.They can not be inherited. 4.They can be virtual.
1.Functional Cohesion
2.Temporal Cohesion
3.Functional Cohesion
4.Sequential Cohesion
Q1297: Which of the following is the common method for connecting the peripheral to the
processor?
1. software
2. exception
3.external interrupts
4.internal interrupts
1.Control Coupling
2.Stamp Coupling
3.External Coupling
4.Content Coupling
Answer: 2
2.A relation R is in 3NF if every non-prime attribute of R is fully functionally dependent on every key
of R
Answer: 3
Answer: 1
Q1303: Which of the following is useful in traversing a given graph by breadth first search?
1.List
2.Queue
3.Set
4.Stack
Answer: 2
Q1304: Which of the following is valid reason for collecting customer feedback concerning delivered
software?
Answer: 2
1.Create
2.Drop
3.Alter
Answer: 4
L1 = {ambnanbm m, n >= 1}
L2 = {ambnambn m, n >= 1}
L3 = {ambn m = 2n + 1}
4.L1 only
Answer: 2
Q1307: Which of the following memory allocation scheme suffers from External fragmentation?
1.Segmentation
3.swapping
4.paging
Answer: 1
Q1308: Which of the following most certainly implies the need for an entire table to implement?
Answer: 2
Q1309: Which of the following name does not relate to stacks?
1.FIFO lists
2.LIFO list
3.Push-down lists
4.Piles
Answer: 1
Q1310: Which of the following operation is used if we are interested in only certain columns of a
table?
1.PROJECTION
2.SELECTION
3.UNION
4.JOIN
Answer: 1
Q1311: Which of the following operator can be overloaded through friend function?
1.->
2.=
3.( )
4.*
Answer: 2
Q1312: Which of the following operators has an associativity from Right to Left?
1.+=
2.==
3.<<
4.<=
Answer: 1
Q1313: Which of the following pattern is the basis of interaction management in many web-based
systems?
1.architecture
2.repository pattern
3.model-view-controller
1.RMS
2.EDF
3.LST
4.LL
Answer: 2
Answer: 2
Q1316: Which of the following problems is undecidable?
Answer: 1
Q1317: Which of the following process is concerned with analyzing the costs and benefits of
proposed changes?
1.Change management
2. Version management
3.System building
4.Release management
Answer: 1
Q1318: Which of the following processors uses big endian representation?
1.8086
2.ARM
3.PowerPC
4.Zilog Z80
Answer: 3
Q1319: Which of the following property allows you to specify an element's position with respect to
1.relative
2.fixed
3.static
4.absolute
Answer: 2
Q1320: Which of the following risk is the failure of a purchased component to perform as expected?
1.Product risk
2.Project risk
3.Business risk
4. Programming risk
Answer: 1
Q1321: Which of the following risks are derived from the organizational environment where the
1.People risks
2.Technology risks
3.Estimation risks
4. Organizational risks
Answer: 4
Q1322: Which of the following risks are derived from the software or hardware technologies that are
2.Technology risks
3.Estimation risks
4.Organizational risks
Answer: 2
Answer: 4
of bottom-up parsing.
1.I and II
2.I and IV
3.III and IV
Answer: 2
Q1326: Which of the following statements best describes the operation of a synchronous
up-/down-counter?
1.In general, the counter can be reversed at any point in its counting sequence.
2.The counter can be reversed, but must be reset before counting in the other direction.
3.The counter can count in either direction, but must continue in that direction once started.
4.The count sequence cannot be reversed, once it has begun, without first resetting the counter to
zero.
Answer: 1
1.It is a degree to which software running on one platform can easily be converted to run on another
platform.
2.It can be enhanced by using languages, OS' and tools that are universally available and
standardized.
3.The ability of the system to behave consistently in a user-acceptable manner when operating
4.It is a degree to which software running on one platform can easily be converted to run on another
platform as well as It can be enhanced by using languages, OS' and tools that are universally
Answer: 1
machine
Answer: 4
Q1329: Which of the following statements is NOT valid about operator overloading?
1.Overloaded operator must have at least one operand of its class type.
3.The overloaded operators follow the syntax rules of the original operator.
Answer: 4
Q1330: Which of the following statements is NOT valid about operator overloading?
1.Overloaded operator must have at least one operand of its class type.
3.The overloaded operators follow the syntax rules of the original operator.
1.Quadraples have some disadvantages over triples notation for an optimizing compiler
2.For optimizing compiler, moving a statement that defines a temporary value requires us to change
3.For optimizing compiler, triples notation has important benefit where statements are often moved
Answer: 2
2.An INPUT field of type password provides a masked field but no real security
4.A password INPUT field can only be included in a FORM that uses the get METHOD
Answer: 2
Q1333: Which of the following statements is/are TRUE for an undirected graph?P:Number of odd
2.Q Only
3.Both P and Q
4.Neither P nor Q
Answer: 1
Q1334: Which of the following statements is/are TRUE for an undirected graph?P:Number of odd
1.P Only
2.Q Only
3.Both P and Q
4.Neither P nor Q
Answer: 1
Q1335: Which of the following strategies means that the impact of the risk will be reduced?
1.Avoidance strategies
2.Minimization strategies
3.Contingency plans
4.ALL
Answer: 2
Q1336: Which of the following system calls results in the sending of SYN packets?
1.socket
2.bind
3.listen
4.connect
Answer: 4
Q1337: Which of the following task swapping method is a better choice in the embedded systems
design?
1.time slice
2.RMS
3.cooperative multitasking
4.pre-emptive
Answer: 4
Q1338: Which of the following term is best defined by the statement "The creation of a new codeline
1.Branching
2.Merging
3.Codeline
4.Mainline
Answer: 1
Q1339: Which of the following term is best defined by the statement: "Derive traceability information
2.Organizational restructuring
3. Requirements changes
4.None
Answer: 3
Q1340: Which of the following term is best defined by the statement: "The underlying technology on
1.Technology change
2.Product competition
3.Requirements change
4.None
Answer: 1
Q1341: Which of the following term is best defined by the statement: "There will be a change of
1.Staff turnover
2.Technology change
3.Management change
4.Product competition
Answer: 3
Q1342: Which of the following traits need to exist among the members of an agile software team?
1.Competence
2.Decision-making ability
4.ALL
Answer: 4
Q1343: Which of the following tree may have smaller elements in its left subtree and larger element
Answer: 4
Q1344: Which of the following uses a preemptive periodic scheduling algorithm?
1.Pre-emptive scheduling
2.RMS
3.LL
4.LST
Answer: 2
1.p {color:red;text-align:center};
2.p {color:red;text-align:center}
3.p {color:red;text-align:center;}
4.p (color:red;text-align:center;)
Answer: 3
Answer: 2
Q1347: Which of the regular expressions given below represent the following DFA?
I) 0*1(1+00*1)*
II) 0*1*1+11*0*1
III) (0+1)*1
4.I,II,III
Answer: 3
Answer: 3
Q1349: Which of these does not belong to the basic principles of good product design ?
1.Adequacy
2.Feasibility
3.Portability
4.Economy
Answer: 3
Q1350: Which of these framework activities is not normally associated with the user interface design
processes?
1.cost estimation
2.interface construction
3. interface validation
Answer: 1
4.Software engineering is concerned with the practicalities of developing and delivering useful
software
Answer: 3
1.Behavioral elements
2.Class-based elements
3.Data elements
4.Scenario-based elements
Answer: 3
Q1353: Which of these sets of HTML5 attributes can be used for form validation?
4.input, radio,checkbox
Answer: 1
1.8 4 -2 -1
2.4 8 1 2
3.4 4 3 -2
4.2 4 2 1
Answer: 2
Q1355: Which one of the following is currently the most popular data model?
1.Network Model
4.Relational Model
Answer: 4
Q1356: Which one of the file allocation scheme cannot be adopted for c
1.Linked allocation
4.Contiguous allocation
Answer: 3
Q1357: Which one of the following algorithm is not used in asymmetric-key cryptography?
1.RSA algorithm
2.diffie-hellman algorithm
Answer: 3
Q1358: Which one of the following allows a user at one site to establish a connection to another site
1.HTTP
2.FTP
3.telnet
Answer: 3
Q1359: Which one of the following correctly describes the meaning of 'namespace' feature in C++?
1.namespaces provide facilities for organizing the names in a program to avoid name clashes
2.Namespaces refer to space between the names in a program 3.Namespaces refer to the memory
space allocated for names used in a program 4.Namespaces refer to the space for names.
Answer: 1
Q1360: Which one of the following event is not possible in wireless LAN.
1.collision detection
Answer: 1
Q1361: Which one of the following is a cryptographic protocol used to secure HTTP connection?
Answer: 2
Q1362: Which one of the following is a requirement that fits in a developer's module ?
1.Availability
2.Testability
3. Usability
4.Flexibility
Answer: 2
Q1363: Which one of the following is an internet standard protocol for managing devices on IP
network?
Answer: 2
A basic block is a sequence of instructions where control enters the sequence at the beginning and
Answer: 4
Answer: 4
2.Design a model
3.Analysis
4.Documentation
Answer: 2
1.FAT
2.NTFS
3.FAT32
4.EXT
Answer: 4
Answer: 3
1.application layer protocols are used by both source and destination devices during a
communication session
2.application layer protocols implemented on the source and destination host must match
4.
Answer: 3
Q1370: Which one of the following is not the process of Deadlock Recovery?
1.Killing a process
2.Rollback to the previous state
3.Selecting a Victim
Answer: 4
Q1371: Which one of the following is not the responsibility of the DBA?
1.provide security
2.develop applications
Answer: 2
Q1372: Which one of the following is the recurrence equation for the worst case time complexity of
the Quicksort algorithm for sorting n>=2 numbers? In the recurrence equations given in the options
below, c is a constant.
Q1373: Which one of the following is the very first task executed by a session enabled page?
1.Delete the previous session 2.Start a new session 3.Check whether a valid session exists
Answer: 3
Q1374: Which one of the following is True at any valid state in shift-reduce parsing?
1.Viable prefixes appear only at the bottom of the stack and not inside
2.Viable prefixes appear only at the top of the stack and not inside
Answer: 3
Q1375: Which one of the following is used as the start frame delimeter in ethernet frame?
1.10101010
2.10101011
3.00000000
4.11111111
Answer: 2
Q1376: Which one of the following languages over the alphabet {0,1} is described by the regular
expression: (0+1)*0(0+1)*0(0+1)*?
4.The set of all strings that begin and end with either 0 or 1.
Answer: 3
Q1377: Which one of the following models is not suitable for accommodating any change?
3.RAD model
4.Waterfall Model
Answer: 4
Answer: 4
Q1379: Which one of the following protocol delivers/stores mail to reciever server?
Answer: 1
Q1380: Which one of the following regular expressions over {0, 1} denotes the set of all strings not
containing 100 as a substring (a) 0*(11)*0* (b) (0*1010)* (c) 0*1*010 (d) 0*(10)*01*
1.a and b
2.b and c
3.only c
4.only b
Answer: 3
2.A relation in which every key has only one attribute is in 2NF
3.A prime attribute can be transitively dependent on a key in a 3 NF relation.
Answer: 4
Answer: 2
Q1383: Which property is used to obtain browser vendor and version information?
Answer: 4
Q1384: Which protocol ensure that all nodes are treated fairly with respect to bandwidth allocation?
1.MAC
2.MACAW
3.BTMA
4.PRMA
Answer: 1
Q1385: Which protocol is a signalling communication protocol used for controlling multimedia
communication sessions?
Answer: 1
Answer: 1
Answer: 2
Q1388: Which segments of a seven-segment display would be active to display the decimal digit 2?
Answer: 3
Q1389: Which SQL functions is used to count the number of rows in a SQL query?
1.Sum
2.Count
3.Max
4.ALL
Answer: 2
1.goto xyz
2.int x = 20
Answer: 3
1.Standard form must consists of minterms 2.All standard form are canonical forms 3.Canonical
form can consist of a term with a literal missing 4.All canonical form are standard form
Answer: 4
2.schedule algorithm
3.pre-emption
4.time slice
Answer: 4
Q1393: Which transmission media has the highest transmission speed in a network?
1.coaxial cable
3.optical fiber
4.electrical cable
Answer: 3
Q1394: Which type of memory is suitable for low volume production of embedded systems?
1.Non-volatile
2.RAM
3.Volatile
4.ROM
Answer: 1
1.form
2.frame
3.table
4.anchor
Answer: 2
Q1396: While inserting the elements 71,65,84,69,67,83 in an empty binary search tree(BST)in the
Answer: 2
Q1397: Why 'critical section' is not imposed on file systems instead 'file locks' when more than one
1.Time consuming
3.we cannot satify the three conditions of mutual exclusion, progress and bounded waiting
Answer: 3
Answer: 1
Q1399: WiMAX provides
1.simplex communication
Answer: 3
Answer: 2
Answer: 1
1.radio waves
2.microwaves
3.infrared
Answer: 4
Q1403: With ----------- interrupts, the address of the ISR is fixed to reduce the latency
1. Strobe
2.Vectored
3.handshake
4.fixed
Answer: 2
Q1404: Write Through technique is used in which memory for updating the data _____.
1.Virtual memory
2. Main memory
3.Auxiliary memory
4.Cache memory
Answer: 4
Q1405: You can find the element you want to manipulate by ________ way?
Answer: 4
Q1406: You have an array of n elements, Suppose you implement quicksort by always choosing the
central element of the array as the pivot, Then the tightest upper bound for the worst case
performance is
Answer: 3
Q1407: You have to sort a list L consisting of a sorted list followed by a few "random"
elements.Which of the following sorting methods would be especially suitable for such a task?
Answer: 4
Q1408: You need to check the size of a file in PHP function. $size = X(filename); Which function will
1.filesize
2.size
3.sizeofFile
4.getSize
Answer: 1
1.Counters which indicate how long ago their associated pages have been referenced.
2.Registers which keep track of when the program was last accessed
Answer: 1
Q1410: nan
nan
Answer: nan
Q1411: nan
nan
Answer: nan
Q1412: nan
nan
Answer: nan
Q1413: nan
nan
Answer: nan
Q1414: nan
nan
Answer: nan
Q1415: nan
nan
Answer: nan
Q1416: nan
nan
Answer: nan
Q1417: nan
nan
Answer: nan
Q1418: nan
nan
Answer: nan
Q1419: nan
nan
Answer: nan
Q1420: nan
nan
Answer: nan
Q1421: nan
nan
Answer: nan
Q1422: nan
nan
Answer: nan
Q1423: nan
nan
Answer: nan
Q1424: nan
nan
Answer: nan
Q1425: nan
nan
Answer: nan
Q1426: nan
nan
Answer: nan
Q1427: nan
nan
Answer: nan
Q1428: nan
nan
Answer: nan
Q1429: nan
nan
Answer: nan
Q1430: nan
nan
Answer: nan