Compre Xm1
Compre Xm1
1.
A. Pass by value
2.
A. Pass by reference
3.
A. Pass by pointer
4.
A. All the above
#include
using namespace std;
class base
{
int val1, val2;
public:
int get()
{
val1 = 100;
val2 = 300;
}
friend float mean(base ob);
};
float mean(base ob)
{
return float(ob.val1 + ob.val2)/2;
}
int main()
{
base obj;
obj.get();
cout << mean(obj);
return 0;
}
1.
200
2.
150
3.
100
4.
300
When a class serves as base class for many derived classes, the situation is called
1.
Polymorphism
2.
Hierarchical inheritance
3.
Hybrid inheritance
4.
Multipath inheritance
When two or more classes serve as base class for a derived class, the situation is known as
1.
polymorphism
2.
encapsulation
3.
hierarchical inheritance
4.
multiple inheritance
1.
cannot be assigned a value
2.
can only be used in static functions
3.
cannot be defined in a Union
4.
can be accessed outside the class
1.
cannot be assigned a value
2.
can only be used in static functions
3.
cannot be defined in a Union
4.
can be accessed outside the class
.................... member variable is initialized to zero when the first object of its class is created where no other
initialization is permitted.
1.
friend
2.
static
3.
onlineexam./span>
4.
private
A ................... member function can only be called by another function that is member of it's class.
1.
friend
2.
static
3.
onlineexam./span>
4.
private
A member function can be called by using its name inside another function of the same class, which is known
as ............ of member function.
1.
sub function
2.
sub member
3.
nesting
4.
sibling
In C++, the declaration of functions and variables are collectively called .......
1.
class members
2.
function members
3.
object members
4.
member variable
/////////////////////////////////////////////////////////////////////////////////////////////////////////
11.Only the ...................... can have access to the private members and private functions.
1.
data functions
2.
inline functions
3.
member functions
4.
member variables
12.The binding of data and functions together into a single class-type variable is referred to as
1.
Encapsulation
2.
Inheritance
3.
Polymorphism
4.
Dynamic binding
13.The variables declared inside the class are known as data members and functions are known as
1.
data functions
2.
inline functions
3.
member functions
4.
member variables
1.
data function
2.
inline function
3.
member function
4.
member variable
15.Which of the following statements about member functions are True or False.
i) A member function can call another member function directly with using the dot operator.
ii) Member function can access the private data of the class
1.
i-True, ii-True
2.
i-False, ii-True
3.
i-True, ii-False
4.
i-True, ii-True
16................. can be invoked like a normal function without the help of any object.
1.
constant member function
2.
private member function
3.
static member function
4.
friend function
17.A .............. can only be called by another function that is member of its class.
1.
constant member function
2.
private member function
3.
static member function
4.
friend function
18.A ................. can have access to only other static members declared in the same class.
1.
constant member function
2.
private member function
3.
static member function
4.
friend function
19.A ........................., although not a member function, has full access rights to the private members of the class.
1.
constant member function
2.
private member function
3.
static member function
4.
friend function
20.A static member function can be called using the ..................... instead of its objects.
1.
variable name
2.
function name
3.
Class name
4.object name
///////////////////////////////////////////////////////////////////////////////////////////////////////////
21.If a member function does not alter any data in the class, that may be declared as ....................
1.
constant member function
2.
private member function
3.
static member function
4.
friend function
22.State whether the following statements are True or False about the characteristics of static data members.
i) Only one copy of static member is created for the entire class and is shared by all the objects of that class, no
matter how many objects are created.
ii) Static member variable is visible only within the class, but its lifetime is the entire
1.
i-True, ii-True
2.
i-False, ii-True
3.
i-True, ii-False
4.
i-True, ii-True
23.Static variables are associated with the class itself rather than with any class object, they are also known
as ................
1.
class variables
2.
object variables
3.
function variables
4.
internal variables
24.Static variables are like ..................... as they are declared in a class declaration and defined in the source file.
1.
inline member function
2.
non inline member function
3.
static member function
4.
dynamic member function
25.While using an object as a function argument, a copy of the entire object is passed to the function in ..............
method
1.
pass-by-value
2.
pass-by-reference
3.
pass-by-variable
4.
pass-by-function
26.Function overloading and Operator overloading are the types in compile time polymorphism? (T/F)
1.
True
2.
False
3. 4.
1.
offer more specific objects than its derived classes 45%
2.
correspond to something in the rest world 0%
3.
behave badly when the chops are down 0%
4.
be a generalized version of its derived classes 56%
1.
An abstract base class can have pure virtual destructor 43%
2.
An abstract base class can have only virtual destructor 0%
3.
An abstract base class can have non virtual destructor 29%
4.
An abstract base class cannot have destructor 29%
29.If a base class member access is public, and an inherited class accesses specifier is private, which of the
following statement is true ?
1.
The base class member can be accessed by derived class objects 43%
2.
The base class members cannot be accessed by the derived class members 29%
3.
The derived class members can be accessed by the base class objects 0%
4.
None of above
1.
Inheritance is deriving new class from existing class 10%
2.
In an inheritance, all data and function members of base class are derived by derived class 46%
3.
We can specify which data and function members of base class will be inherited by derived class 19%
4.
We can add new functions to derived class without recompiling the base class 28%
///////////////////////////////////////////////////////////////////////////////////////////////////////////
31.A function that changes the state of the cout object is called _______?
1.
a Member function
2.
an Adjuster function
3.
a Manipulator function
4.
an Operator function
1.
A first-in-first-out approach.
2.
The dot operator.
3.
A member name.
4.
An index number.
1.
Bitwise OR operator ( | )
2.
Logical OR operator ( || )
3.
Bitwise AND operator (& )
4.
Logical AND operator ( && )
34.The following statement where T is true and F is false,T && T || F && T _______ .
1.
is true
2.
is false
3.
is wrong
4.
Not applicable in C language
1.
A pointer to a structure.
2.
A reference to a structure.
3.
A copy of a structure.
4.
Nothing
36.To hide a data member from the program, you must declare the data member in the _______ section of the class.
1.
Protected
2.
Confidential
3.
Hidden
4.
Private
1.
Polymorphism
2.
Inheritance
3.
Encapsulation
4.
Data hiding
38.Which of the following formulas can be used to generate random integers between 1 and 10?
1.
1 + rand() % (10 - 1 + 1).
2.
1 + (10 - 1 + 1) % rand().
3.
10 + rand() % (10 - 1 + 1).
4.
10 + rand() % (10 + 1).
39.Which of the following will store the number 320000 as a Float number?
1.
CounPop = (float) 3.2e5;
2.
CounPop = (float) 3.2e6;
3.
CounPop = (float) .32e5;
4.
CounPop = (float) .32e7;
40.A class can serve as base class for many derived classes
1.
True
2.
FalsE
//////////////////////////////////////////////////////////////////////////////////////////////////////////
41.Which of the following relation between A.M., G.M. and H.M. holds?
3.
(ANS OPTION 3 )
1.
Mean
2.
Median
3.
Mode
4.
Geometric Mean
2.
Female population of a country
3.
Population of real numbers between 0 and 100
4.
Students of the world
44.A and B play 10 games of chess of which A won 5 games, B won 3 games and 2 games ended in a draw. The
probability of B winning a game in future is
1.
1/2
2.
3/10
3.
1/5
4.
2/5
1.
Equality of variances of the effects
2.
Equality of means of the effects
3.
Equality of errors of the factors
4.
Equality of median of the effects
46.A dice is tossed, If X is the random variable denote the number on the dice, the expected value of X is
1.
1/6
2.
7/2
3.
7/6
4.
1
47.The decision whether a test of hypothesis is one tailed or two tailed, depends on
1.
Null hypothesis
2.
Sample size
3.
Level of significance
4.
Alternative hypothesis
48.#include <iostream>
using namespace std;
int main()
{
const char* p = "12345";
const char **q = &p;
*q = "abcde";
const char *s = ++p;
p = "XYZWVU";
cout << *++s;
return 0;
}
1.
Compiler Error
2.
c
3.
b
4.
Garbage Value
49.#include <stdio.h>
int main()
int *p = ary + 3;
printf("%d\n", p[-2]);
1.
1
2.
2
3.
run time error
4.
Some garbage value
50.#include <stdio.h>
void main()
1.
run time error
2.
hh
3.
he
4.
hl
///////////////////////////////////////////////////////////////////////////////////////////////////////////
51.#include <stdio.h>
void main()
char *s = "hello";
char *p = s;
printf("%p\t%p", p, s);
1.
Different address is printed
2.
Same address is printed
3.
run time error
4.
no address is printed
52.#include
void main()
int *p = a;
printf("%p\t%p", p, a);
#include <iostream>
void print(int i)
cout << i;
void print(double f)
cout << f;
int main(void)
print(5);
print(500.263);
return 0;
1.
5500.263
2.
500.263
3.
500.2635
4.
500.3
54. A CONSTRUCTOR THAT ACCEPTS __________ PARAMETERS IS CALLED THE DEFAULT CONSTRUCTOR
1.
ONE
2.
TWO
3.
THREE
4.
NO
55.A DESTRUCTOR IS USED TO DESTROY THE OBJECTS THAT HAVE BEEN CREATED BY A ....................
1.
OBJECT
2.
CLASS
3.
FUNCTION
4.
CONSTRUCTOR
1.
x+xy=x
2.
(x+y)=xy
3.
xy+y=x
4.
x+y=y
#include<iostream>
int main()
Empty obj;
return 0;
}
1.
A non-zero value
2.
Zero
3.
Compile time Error
4.
Runtime Error
58.In any ways, Non-member function can have access to the private data of the class
1.
Virtual function
2.
Static function
3.
Friend function
4.
None
59. In OOP terminology, an object's member variables are often called as _________ and its member functions are
sometimes referred to as _________.
1.
Values, morals
2.
Data, activities
3.
Activities, behaviors
4.
Attributes, methods
1.
Virtual memory
2.
Cache memory
3.
Heap memory
4.
Stack
///////////////////////////////////////////////////////////////////////////////////////////////////////////
1.
Very long functions that can hardly run
2.
One function containing another one or more functions inside it.
3.
Two or more functions with the same name but different number of parameters or type.
4.
Very long functions that can run easily.
#include
return X + Y;
return X + Y;
int main()
return 0;
1.
11 12.1
2.
12.1 11
3.
11 12
4.
Compile time error
#include
{
return (a * b);
return (a / b);
int main()
int x = 5, y = 2;
return 0;
1.
10.0 5.0
2.
5.0 2.5
3.
10.0 5
4.
10 2.5
#include <iostream>
class GFG
public:
GFG()
} g;
int main()
{
return 0;
1.
Hi from GFG
2.
You are in Main
3.
You are in Main. Hi from GFG.
4.
Hi from GFG. You are in Main.
#include <iostream>
class sample
private:
int x,y;
};
1.
onlineexam. void sample(){}
2.
onlineexam. void sample(){ x=0; y=0;}
3.
onlineexam. void sample(int a,int b){ x=a; y=b;}
4.
Both 1 and 2
#include <iostream>
class Test
public:
int i;
void get();
};
void Test::get()
std::cin >> i;
int main()
t.get();
::t.get();
return 0;
1.
Compiler Error: Cannot have two objects with same class name
2.
Compiler Error in Line "::t.get();"
3.
Runtime Error
4.
Compile and run succesfully
67.(x*y)z=x(y*z) is the
1.
commutative property
2.
inverse property
3.
associative property
4.
Identity element
1.
ER Diagram
2.
Column
3.
Relationship
4.
Attribute
1.
DDL Analyzer
2.
Query Interpreter
3.
Database Engine
4.
None of the these
70........ is a condition specified on a database schema and restricts the data that can be stored in an instance of the
database.
1.
Key Constraint
2.
Check Constraint
3.
Foreign key constraint
4.
Integrity constraint
//////////////////////////////////////////////////////////////////////////////////////////////////////
71........ is a specific concurrency problem wherein two transactions depend on each other for something.
1.
phantom read problem
2.
transaction read problem
3.
deadlock
4.
locking
1.
locking
2.
transaction monitor
3.
transaction serializability
4.
two phase commit
1.
two phase locking
2.
two phase commit
3.
transaction locking
4.
checkpoints
74. .............. would only be an effective choice in a environment in which many disk errors occur.
1.
RAID Level 0
2.
RAID Level 1
3.
RAID Level 2
4.
RAID Level 3
75. ................. is not a true member of RAID family, because it does not include redundancy to improve performace.
1.
RAID Level 0
2.
RAID Level 1
3.
RAID Level 2
4.
RAID Level 3
76. .................... PROVIDES THE FLEXIBILITY OF USING DIFFERENT FORMAT OF DATA AT RUN TIME
DEPENDING UPON THE SITUATION.
1.
DYNAMIC INITIALIZATION
2.
RUN TIME INITIALIZATION
3.
STATIC INITIALIZATION
4.
VARIABLE INITIALIZATION
77. ..................... specifies the actions needed to remove the drawbacks in the current design of database.
1.
1 NF
2.
2 NF
3.
3 NF
4.
Normalform
78. 3428 is the decimal value for which of the following binary-coded decimal (BCD) groupings?
1.
1101000100100000
2.
11010000101000
3.
011010010000010
4.
110100001101010
1.
2inputs
2.
3inputs
3.
4inputs
4.
5inputs
1.
1 output
2.
3 outputs
3.
4 outputs
4.
2 ouput
///////////////////////////////////////////////////////////////////////////////////////////////////////////
82. If a higher priority process arrives and wants service, the memory manager can swap out the lower priority
process to execute the higher priority process. When the higher priority process finishes, the lower priority process is
swapped back in and continues execution. This variant of swapping is sometimes called :
1.
priority swapping
2.
pull out, push in
3.
roll out, roll in
4.
None of these
2.
CPU
3.
PCI
4.
none of the mentioned
1.
1&0
2.
-1 & 1
3.
0 & -1
4.
0.5
1.
single threaded
2.
multithreaded
3.
both (a) and (b)
4.
none of the mentioned
1.
each process is blocked and will remain so forever
2.
each process is terminated
3.
all processes are trying to kill each other
4.
none of the mentioned
87. In Unix, Which system call creates the new process?
1.
fork
2.
create
3.
new
4.
none of the mentioned
1.
have to be of a fixed size
2.
have to be a variable size
3.
can be fixed or variable sized
4.
None of these
89. semaphore :
1.
is a binary mutex
2.
must be accessed from only one process
3.
can be accessed from multiple processes
4.
None of these
1.
hardware for a system
2.
special program for a system
3.
integer variable
4.
None of these
//////////////////////////////////////////////////////////////////////////////////////////////////////
2.
first two threads of the process
3.
all threads within the process
4.
no thread within the process
92. The link between two processes P and Q to send and receive messages is called :
1.
communication link
2.
message-passing link
3.
synchronization link
4.
All of these
1.
base address of each page in physical memory
2.
page offset
3.
page size
4.
none of the mentioned
1.
Mutex & Duplex
2.
Binary & Counting
3.
Counting & Signal
4.
decimal & Integer
95. When high priority task is indirectly preempted by medium priority task effectively inverting the relative priority of
the two tasks, the scenario is called
1.
priority inversion
2.
priority removal
3.
priority exchange
4.
priority modification
1.
running
2.
parsing
3.
ready
4.
blocked
1.
physical address
2.
absolute address
3.
logical address
4.
none of the mentioned
1.
shared data structures
2.
procedures that operate on shared data structure
3.
synchronization between concurrent procedure invocation
4.
all of the mentioned
99. A mutex is :
1.
is a binary mutex
2.
must be accessed from only one process
3.
can be accessed from multiple processes
4.
None of these
1.normal exit
2.fatal error
3.killed by another process
4.all of the mentioned
//////////////////////////////////////////////////////////////////////////////////////////////////////
1.
other threads in the another process can also read from that file
2.
other threads in the same process can also read from that file
3.
any other thread can not read from that file
4.
all of the mentioned
1.
there is another process R to handle and pass on the messages between P and Q
2.
there is another machine between the two processes to help communication
3.
there is a mailbox to help communication between P and Q
4.
None of these
1.
hardware level
2.
software level
3.
both (a) and (b)
4.
none of the mentioned
1.
logical address
2.
absolute address
3.
physical address
4.
relative address
1.
wait
2.
Stop & Signal
CHECK IT ONCE WHEN YOU READ!
3.
Both (a) & (b)
4.
Wait & Hold
1.
communication within the process
2.
communication between two process
3.
communication between two threads of same process
4.
none of the mentioned
1.
when process is scheduled to run after some execution
2.
when process is unable to run until some task has been completed
3.
when process is using the CPU
4.
none of the mentioned
109. if (fork() == 0)
{ a = a + 5; printf("%d,%d\n", a, &a); }
Let u, v be the values printed by the parent process, and x, y be the values printed by the child process. Which one of
the following is TRUE?
1. u = x + 10 and v = y
2. u = x + 10 and v != y
3.u + 10 = x and v = y
4. u + 10 = x and v != y
1.
To cache page translation information
2.
To cache frequently used data
3.
To hold register values while a process is waiting to be run
4.
To hold the start and length of the page table
//////////////////////////////////////////////////////////////////////////////////////////////////////////
111.The OS of a computer may periodically collect all the free memory space to form contiguous block of free space.
This is called
1.
Concatenation
2.
. Garbage collection
3.
Collision
4.
Dynamic Memory Allocation
1.
Virtual page number
2.
Physical page number
3.
Dirty bit
4.
Reference bit
1.
Zero bytes.
2.
One byte.
3.
Three bytes.
4.
Four bytes.
1.
One
2.
Two
3.
Three
4.
Unlimited
2.
A number sign (#).
3.
An asterisk (*).
4.
A null character.
116.Which other keywords are also used to declare the class other than class?
1.
struct
2.
union
3.
object
4.
both (a) and (b)
class sample
private:
int a, b;
public:
void test()
{
a = 100;
b = 200;
};
int main()
sample e;
e.test();
return 0;
}
1.
295
2.
100
3.
300
4.
200
1.
When a base class is privately inherited,onlineexam.members of the base class become private members of the
derived class 31%
2.
When a base class is onlineexam.y inherited,onlineexam.members of the base class becomes onlineexam.members
of derived class 8%
3.
When a base class is privately inherited, a private member of base class becomes private member of derived
class 31%
4.
When a base class is onlineexam.y inherited protected members of base class becomes protected members of
derived class 31%
119.Which feature allows you to create a Derived class that inherits properties from more than one Base class?
1.
Multilevel Inheritance.
2.
Multiple Inheritance.
3.
Hybrid Inheritance.
4.
Hierarchical Inheritance.
1.
OBJECT IS DECLARED
2.
OBJECT IS USED
3.
CLASS IS DECLARED
4.
CLASS IS USED
////////////////////////////////////////////////////////////////////////////////////////////////////////
1.
Declares an object of class Rectangle
2.
Assigns the value of *BoxPtr to the object Rectangle
3.
Declares a Rectangle pointer object called BoxPtr
4.
Is illegal in C++
1.
DEFINE VARIABLES
2.
ALLOCATE VARIABLES
3.
INITIALIZE VARIABLES
4.
INITIALIZE OBJECT
1.
EITHER PASS-BY-VALUE OR PASS-BY-REFERENCE
2.
ONLY PASS-BY-VALUE
3.
ONLY PASS-BY-REFERENCE
4.
ONLY PASS BY ADDRESS
1.
Define data members and member functions, then assign a class name
2.
Declare private and onlineexam.variables, prototype functions, then write code
3.
Write the main() function, then determine which classes are needed
4.
Identify objects, then define objects' attributes, behaviors, and relationships
1.
A POINTER TO THE CLASS
2.
AN OBJECT OF THE CLASS
3.
A STATUS CODE INDICATING WHETHER THE CLASS IS DESTROYED PROPERLY
4.
DESTRUCOTRS DO NOT RETURN VALUE
1.
RETURN ZERO VALUE
2.
RETURN NULL
3.
GENERATE ERROR
4.
RETURN NO VALUE
1.
All objects of a class share all data members of class
2.
Objects of a class do not share non-static members. Every object has its own copy.
3.
Objects of a class do not share codes of non-static methods, they have their own copy
4.
None of the above
1.
Type
2.
No. of Arguments
3.
Type of arguments
4.
All the above
29.Let A and B be two events with P(A) = 0.25 and P(B) = 0.5. The probability of both occurring together is 0.14.
Then the probability of both A and B not happening is
1.
0.39
2.
0.25
3.
0.11
4.
0.61
30.Mean and variance of a binomial distribution are 8 and 4, respectively. Then, P(X = 1) is equal to
1.1/2 POWER 12
2.
3.
4.
////////////////////////////////////////////////////////////////////////////////////////////////////
31.The average time required to reach a storage location in memory and obtain its contents is called the
1.
seek time
2.
turnaround time
3.
access time
4.
transfer time
1.
loading multiple routines dynamically
2.
loading a routine only when it is called
3.
loading multiple routines randomly
4.
None of these
1.
Insertion
2.
Deletion
3.
Modification
4.
Alteration
34.____ means that the data used during the execution of a transaction cannot be used by a
1.
Consistency
2.
Atomicity
3.
Durability
4.
Isolation
35._____ is the concept in which a process is copied into main memory from the secondary memory according to the
requirement.
1.
Paging
2.
Demand paging
3.
Segmentation
4.
Swapping
36.______ controller sends the command placed into it, via messages to the _____ controller.
1.
Host, host
2.
Disk, disk
3.
Host, disk
4.
Disk, host
1.
Composite
2.
simple
3.
Multi-valued
4.
Single valued
38._______ specifies the maximum number of relationship instances that an entity can participate.
1.
Range
2.
Domain
3.
Cardinality
4.
Ceiling
39._______ specifies the set of values that can be assigned to the attribute.
1.
Block
2.
Relation
3.
Structure
4.
Domain
1.
Complex
2.
Unique
3.
Characters
4.
Key
///////////////////////////////////////////////////////////////////////////////////////////////////////////
1.
Relation
2.
Domain
3.
Attribute
4.
Entity
1.
first fit, best fit, worst fit
2.
best fit, first fit, worst fit
3.
worst fit, best fit, first fit
4.
None of these
43.__________ states that only valid data will be written to the database.
1.
Consistency
2.
Atomicity
3.
Durability
4.
Isolation
44.__________ USED TO MAKE A COPY OF ONE CLASS OBJECT FROM ANOTHER CLASS OBJECT OF THE
SAME CLASS TYPE.
1.
CONSTRUCTOR
2.
COPY CONSTRUCTOR
3.
DESTRUCTOR
4.
DEFAULT DESTRUCTOR
45.___________ may take place only when there is some minimum amount(or) no space left in free storage list.
1.
Memory management
2.
Garbage collection
3.
Recycle bin
4.
Storage management
1.
List
2.
Tree
3.
Graph
4.
Edge
1.
Domain
2.
Relation
3.
Set
4.
Schema
48.________is very useful in situation when data need to stored and then retrieved in reverse order.
1.
Stack
2.
Queue
3.
List
4.
Linked List
1.
Stack[top]
2.
stack[0]
3.
List[top]
4.
Linked list
1.
2 select lines
2.
3 select lines
3.
4 select lines
4.
5 select lines
///////////////////////////////////////////////////////////////////////////////////////////////////////////
1.
Guard
2.
Sentinel
3.
End pointer
4.
Last pointer
52.A _____________ is a linear list in which insertions and deletions are made to from either end of the structure
1.
circular queue
2.
random of queue
3.
priority queue
4.
double ended queue
1.
offer more specific objects than its derived classes
2.
correspond to something in the rest world
3.
behave badly when the chops are down
4.
be a generalized version of its derived classes
1.
serial
2.
parallel
3.
sequence
4.
both a and b
55.A binary search tree whose left subtree and right subtree differ in height by atmost 1 is called __
1.
Lemma Tree
2.
Redblack Tree
3.
AVL Tree
4.
Balanced Binary Tree
56.A binary search tree whose left subtree and rightsubtree differ in hight by at most 1 unit is called
1.
Red Black Tree
2.
Lemma Tree
3.
AVL Tree
4.
Balanced Binary Tree
57.A binary tree can be converted into its mirror image by traversing in ___
1.
Inorder
2.
Preorder
3.
Postorder
4.
Laplace transform
58.A certain 5-bit self-complementary code is used to represent the 10 decimal digits 0 through 9. Given that (246)10
is represented as 00010 00100 00110 in this code, what is the representation for (375)10?
1.
00110 00100 00010
2.
00011 00111 00101
3.
11101 11011 11001
4.
11001 11101 11011
1.
encoder
2.
decoder
3.
comparator
4.
carry look ahead
1.
ALL CONSTRUCTORS THAT ARE NEEDED
2.
ONLY THE DEFAULT CONSTRUCTOR
3.
A DESTRUCTOR FOR EACH CONSTRUCTOR
4.
ALL THE PREVIOUS ANSWERS ARE INCORRECT
///////////////////////////////////////////////////////////////////////////////////////////////////////
61.A class can inherit properties from more than one class which is known as ..........inheritance.
1.
single
2.
multiple
3.
multilevel
4.
hierarchical
62.A correct output is achieved from a master-slave J-K flip-flop only if its inputs are stable while the:
1.
clock is LOW
2.
slave is transferring
3.
flip-flop is reset
4.
clock is HIGH
63.A CPU generates 32-bit virtual addresses. The page size is 4 KB. The processor has a translation look-aside
buffer (TLB) which can hold a total of 128 page table entries and is 4-way set associative. The minimum size of the
TLB tag is:
1.
11 bits
2.
13 bits
3.
15 bits
4.
20 bits
1.
names of all fields in all files
2.
data types of all fields in all files
3.
width of all fields in all files
4.
all of the above
65.A data structure where elements can be added or removed at either end but not in the middle is called
1.
linked lists
2.
stacks
3.
queues
4.
dequeue
A linear list in which the last node points to the first node is ______________
1.singly linked list
2.doubly linked list
3.arrays
4.none of the above
A linear list in which the pointer points only to the successive node is ____________
1.singly linked list
2.circular linked list
3.doubly linked list
4.none of the above
A measure of linear association of a variable say, with number of other variables is known as
1.Partial correlation
2.Multiple correlation
3.Simple Correlation
4.Auto correlation
A multilevel page table is preferred in comparison to a single level page table for translating virtual address to
physical address because :
1.it reduces the memory access time to read or write a memory location
2.it helps to reduce the size of page table needed to implement the virtual address space of a process
3.it is required by the translation look aside buffer
4.it helps to reduce the number of page faults in page replacement algorithms
A pointer in which a pointer variable contains the address of a variable that has already been allocated
1.Null pointer
2.Generic pointer
3.Dangling pointer
4.wild pointer
A positive edge-triggered D flip-flop will store a 1 when ________.
1.the D input is HIGH and the clock transitions from HIGH to LOW
2.the D input is HIGH and the clock transitions from LOW to HIGH
3.the D input is HIGH and the clock is LOW
4.the D input is HIGH and the clock is HIGH
A positive edge-triggered J-K flip-flop is used to produce a two-phase clock. However, when the circuit is operated it
produces erratic results. Close examination with a scope reveals the presence of glitches. What causes the glitches,
and how might the problem be corrected?
1.The PRESET and CLEAR terminals may have been left floating; they should be properly terminated if not being
used.
2.The problem is caused by a race condition between the J and K inputs; an inverter should be inserted in one of the
terminals to correct the problem.
3.A race condition exists between the Q and Q outputs to the AND gate; the AND gate should be replaced with a
NAND gate.
4.A race condition exists between the clock and the outputs of the flip-flop feeding the AND gate; replace the
flip-flop with a negative edge-triggered J-K Flip-Flop.
A process is thrashing if
1.it is spending more time paging than executing
2.it is spending less time paging than executing
3.page fault occurs
4.swapping cannot take place
A queue is a,
1.FIFO (First In First Out) list.
2.LIFO (Last In First Out) list.
3.Ordered array.
4.Linear tree.
1.Static, still
2.Static, dynamic
3. Live, dead
4.None of these
A system program that combines the separately compiled modules of a program into a form suitable for execution
1.assembler
2.linking loader
3.cross compiler
4.load and go
A system uses FIFO policy for page replacement. It has 4 page frames with no pages loaded to begin with. The
system first accesses 100 distinct pages in some order and then accesses the same 100 pages but now in the
reverse order. How many page faults will occur?
1.196
2.192
3.197
4.195
1.functional dependency
2.transitive dependency
3.NF
4.BCNF
A table on the many side of a one to many or many to many relationship must:
1.Be in Second Normal Form (2NF)
2.Be in Third Normal Form (3NF)
3.Have a single attribute key
4.Have a composite key
A three digit decimal number requires ________ for representation in the conventional BCD format.
1.3 bits
2.6 bits
3.12 bits
4.24 bits
A variant of the linked list in which none of the node contains NULL pointer is?
1.Singly linked list
2.Doubly linked list
3.circular linked list
4.None
A weak entity type always has a ______ participation constraint with respect to its identifying relationships.
1.Partial
2.Total
3.Overlap
4.Disjoint
Access time of a binary search tree may go worse in terms of time complexity upto
1.n pow 2
2.(n log n)
3.n
4.1
Addressing structure
1.defines the fundamental method of determining effective operand addresses
2.are variations in the use of fundamental addressing structures, or some associated actions which are related to
addressing.
3.performs indicated operations on two fast registers of the machine and leave the result in one of the registers.
4.all of the above
After the crash of a disk containing the database, which of the following tools will need to be used for recovery?
1.Database backup
2.Log
3.Checkpoint table
4.All of the above
After the nodes are prepared, the distributed transaction is said to be ......
1. in-doubt
2.in-prepared
3.prepared transaction
4.in-node
An entity set that does not have sufficient attributes to form a primary key is a
1.Strong entity set.
2.Weak entity set.
3.Simple entity set.
4.Primary entity set.
An invalid condition in the operation of an active-HIGH input S-R latch occurs when ________.
1. HIGHs are applied simultaneously to both inputs S and R
2. LOWs are applied simultaneously to both inputs S and R
3. a LOW is applied to the S input while a HIGH is applied to the R input
4.a HIGH is applied to the S input while a LOW is applied to the R input
Array is basically
1.Collection of numbers only
2.Collection of ascii values only
3.Collection of Homogeneous data types
4.Collection of Heterogeneous data types
As disks have relatively low transfer rates and relatively high latency rates, disk schedulers must reduce latency times
to :
1.Ensure high bandwidth
2.Ensure low bandwidth
3.Make sure data is transferred
4.Reduce data transfer speeds
As the bank audit transaction reads Mary's savings balance, $100, Mary transfers $50 to her checking, making it
$250, and the audit transaction completes with the combined value of $350 in both accounts. This is called:
1.An uncommitted dependency
2.An incorrect summary
3.A lost update
4.A data entry error
Assume that an integer and a pointer each takes 4 bytes. Also, assume that there is no alignment in objects. Predict
the output following program.
#include<iostream>
using namespace std;
class Test
{
static int x;
int *ptr;
int y;
};
int main()
{
Test t;
cout << sizeof(t) << " ";
cout << sizeof(Test *);
1.12 4
2.12 12
3.8 4
4.8 8
Assume that the size of char is 1 byte and negatives are stored in 2's complement form
#include<stdio.h>
int main()
{
char c = 125;
c = c+10;
printf("%d", c);
return 0;
}
1.135
2.+INF
3.-121
4.-8
Avoid relations that contain matching attributes that are not ____ combinations
1.foreign key, primary Key
2.Null value, primary key
3.foreign key, Candidate Key
4.Candidate key, primary Key
1. 4.Carry out BCD subtraction for (68) – (61) using 10’s complement method.
1.00000111
2.01110000
3.100000111
4.011111000
Closure of Y is denoted as
1.Y*
2.Y->X
3.Y+
4.None of the above
Consider a directed line(->) from the relationship set advisor to both entity sets instructor and student. This indicates
_________ cardinality
1.One to many
2.One to one
3.Many to many
4.Many to one
Consider a schema R(A, B, C, D) and functional dependencies A -> B and C -> D. Then the decomposition of R into
R1 (A, B) and R2(C, D) is
1.dependency preserving and lossless join
2.lossless join but not dependency preserving
3.dependency preserving but not lossless join
4.not dependency preserving and not lossless join
Consider a weight balanced tree such that, the number of nodes in the left sub tree is at least half and at most twice
the number of nodes in the right sub tree. The maximum possible height (number of nodes on the path from the root
to the farthest leaf) of such a tree on k nodes can be described as
1.log2 n
2.log4/3 n
3.log3 n
4.log3/2 n
Consider an implementation of unsorted doubly linked list. Suppose it has its representation with a head pointer and
tail pointer. Given the representation, which of the following operation can be implemented in O(1) time?
i) Insertion at the front of the linked list
ii) Insertion at the end of the linked list
iii) Deletion of the front node of the linked list
iv) Deletion of the end node of the linked list
1.I and II
2.I and III
3.I,II and III
4.I,II,III and IV
Consider linked list is used to implement the Stack then which of the following node is considered as Top of the
Stack ?
1.Any Node
2.Last Node
3.First Node
4.Middle Node
Consider money is transferred from (1)account-A to account-B and (2) account-B to account-A.
Which of the following form a transaction ?
1.Only 1
2.Only 2
3.Both 1 and 2 individually
4.Either 1 or 2
Consider the following combinational function block involving four Boolean variables x, y, a, b where x, a, b are inputs
and y is the output.
f (x, y, a, b)
{
if (x is 1) y = a;
else y = b;
}
Which one of the following digital logic blocks is the most suitable for implementing this function?
Full adder
Priority encoder
Multiplexer
Flip-flop
Consider the following linked list and following linked list representation -
10--->12---->15---->25---->30---->36
struct node {
int data;
struct node *next;
}*start = NULL;
what will be the value of following statement ?
start->next->next->next->data
1.12
2.30
3.15
4.25
1.O(1)
2.O(n-1)
3.O(n)
4.O(2n)
Consider the usual algorithm for determining whether a sequence of parentheses is balanced.Suppose that you run
the algorithm on a sequence that contains 2 left parentheses and 3 right parentheses (in some order).The maximum
number of parentheses that appear on the stack AT ANY ONE TIME during the computation?
1.1
2.2
3.3
4.4 and above
Consider the virtual page reference string 1, 2, 3, 2, 4, 1, 3, 2, 4, 1. On a demand paged virtual memory system
running on a computer system that main memory size of 3 pages frames which are initially empty. Let LRU, FIFO and
OPTIMAL denote the number of page faults under the corresponding page replacements policy. Then
1.OPTIMAL < LRU < FIFO
2.OPTIMAL < FIFO < LRU
3.OPTIMAL = LRU
4.OPTIMAL = FIFO
const member function does not allow to modify/alter value of any data member of the class.
1.False
2.True
3.None
4.Error
CONSTRUCTORS CANNOT BE INHERITED, THROUGH A DERIVED CLASS CAN CALL THE ...................
CONSTRUCTOR.
1.BASE CLASS
2.DERIVED CLASS
3.VOID CLASS
4.DEFAULT CLASS
counter and gate delays are negligible. If the counter starts at 0, then it cycles through the following sequence:
1.0,3,4
2.0,3,4,5
3.0,1,2,3,4
4.0,1,2,3,4,5
Customer(customer_id,ono,dop)
Here the customer_id is ______ and customer is a _
1.Relations, Attribute
2.Attributes, Relation
3.Tuple, Relation
4.Tuple, Attributes
Deadlocks are possible only when one of the transactions wants to obtain a(n) ____ lock on a data item.
1.binary
2.exclusive
3.shared
4.complete
Decoder is a
1.combinational circuit
2.sequential circuit
3.complex circuit
4.gate
Deletion of a node in linked list involves keeping track of address of node which comes immediately
1.after the node that is to be deleted
2.before the node that is to be deleted
3.after the middle node
4.none of the above
DESTRUCTOR HAS THE SAME NAME AS THE CONSTRUCTOR AND ITS PRECEDED BY
1.!
2.?
3.~
4.$
Determine output:
void main()
{
int c = - -2;
printf("c=%d", c);
}
1.1
2.-2
3.2
4.Error
Determine the output frequency for a frequency division circuit that contains 12 flip-flops with an input clock frequency
of 20.48 MHz.
1.10.24 kHz
2.5 kHz
3.30.24 kHz
4.15 kHz
1.decimal
2.octal
3.binary
4.hexadecimal
Dynamic loading is :
1.loading multiple routines dynamically
2.loading a routine only when it is called
3. loading multiple routines randomly
4.None of these
Electric digital systems uses signals that have 2 distinct values and circuit elements having
1.One stable state
2.Two stable states
3.Three stable states
4.Four stable states
Empdt1(empcode, name, street, city, state,pincode).For any pincode, there is only one city and state. Also, for given
street, city and state, there is just one pincode. In normalization terms, empdt1 is a relation in
1.1 NF only
2.2 NF and hence also in 1 NF
3.3NF and hence also in 2NF and 1NF
4.BCNF and hence also in 3NF, 2NF and 1NF
Entity Relationship model consists of collection of basic objects called _________ and relationship among these
objects.
1.functions
2.models
3.entities
4.None of these
For an S-R flip-flop to be set or reset, the respective input must be:
1.installed with steering diodes
2.in parallel with a limiting resistor
3.LOW
4.HIGH
For larger page tables, they are kept in main memory and a __________ points to the page table.
1.page table base register
2.page table base pointer
3.page table register pointer
4.page table base
Form of dependency in which set of attributes that are neither a subset of any of keys nor candidate key is classified
as
1.transitive dependency
2.full functional dependency
3.partial dependency
4.prime functional dependency
Functional Dependencies are the types of constraints that are based on______
Functions are used to
1.Provide modularity to code
2.increases number of lines
3. Does not do the same work
4. Used only for mathematical calculation
Given an empty AVL tree, how would you construct AVL tree when a set of numbers are given without performing any
rotations?
1.just build the tree with the given input
2.find the median of the set of elements given, make it as root and construct the tree
3.use trial and error
4.use dynamic programming to build the tree
Grouped data are diagrammatically presented by : 1.Bar diagram 2.Histogram 3.Simple graph 4.Pictogram
Half-adders have a major limitation in that they cannot
1.Accept a carry bit from a present stage
2.Accept a carry bit from a next stage
3.Accept a carry bit from a previous stage
4.None of the Mentioned
Here is an infix expression: 4 + 3*(6*3-12). Suppose that we are using the usual stack algorithm to convert the
expression from infix to postfix notation.The maximum number of symbols that will appear on the stack AT ONE TIME
during the conversion of this expression?
1. 1
2.2
3.3
4.4
How can you ensure that an inline function isn't inlined for a particular function call for function foo?
1.unline x();
2.noexpand x();
3.x();
4.This is not possible on a case-by-case basis
How many 3-to-8 line decoders with an enable input are needed to construct a 6-to-64 line decoder without using any
other logic gates?
1.7
2.8
3.9
4.10
How many AND, OR and EXOR gates are required for the configuration of full adder
1.1, 2, 2
2.2, 1, 2
3.3, 1, 2
4.4, 0, 1
How many bits would be required to encode decimal numbers 0 to 9999 in straight binary codes.
1.12
2.14
3.16
4.18
How many entries would a truth table for a four-input NAND gate have?
1.2
2.8
3.16
4.32
How many gates would be required to implement the following Boolean expression before simplification? XY + X(X +
Z) + Y(X + Z)
1.1
2.2
3.4
4.5
How many pulses are needed to change the contents of a 8-bit up counter from 10101100 to 00100111
1.134
How many queues are needed to implement a stack?
1.1
2.2
3.3
4.4
Identify the data structure which allows deletions at both ends of the list but insertion at only one end.
1.Input restricted dequeue
2.Output restricted queue
3.Priority queues
4.Stack
If a 3-input AND gate has eight input possibilities, how many of those possibilities will result in a HIGH output?
1.1
2. 2
3.3
4.4
If a 3-input NOR gate has eight input possibilities, how many of those possibilities will result in a HIGH output?
1.1
2.2
3.7
4.8
If a database server is referenced in a distributed transaction, the value of its commit point strength determines which
role it plays in the .........
1.two phase commit
2.two phase locking
3.transaction locking
4checkpoints
If a node having two children is deleted from a binray tree, it is replaced by its ___
1.Preorder Predecessor
2.Preorder Successor
3.Inorder Predecessor
4.Inorder Successor
If a signal passing through a gate is inhibited by sending a LOW into one of the inputs, and the output is HIGH, the
gate is a(n):
1.AND
2.NAND
3.OR
4.NOT
If a transaction obtains a shared lock on a row, it means that the transaction wants to ..... that row.
1.write
2.insert
3.execute
4.read
If a transaction obtains an exclusive lock on a row, it means that the transaction wants to ....... that row.
1.select
2.update
3.view
4.Read
If any anomalies are present make sure that programs that ____ the database will operate correctly
1.Insert
2.Delete
3.Update
4.Alter
If both inputs of an S-R flip-flop are low, what will happen when the clock goes HIGH?
1.An invalid state will exist.
2.No change will occur in the output.
3.The output will toggle.
4.The output will reset.
If several requests have different deadlines that are relaticely close together, then using the SCAN – EDF algorithm :
1.The SCAN ordering will service the requests in that batch
2.The EDF ordering will service the requests in that batch
3.The FCFS ordering will service the requests in that batch
4.None of these
If the variables x and y are not linearly related, then the correlation between x and y is: 1.0 2.-1 3.1 4.0.5
If there are 32 segments, each of size 1Kb, then the logical address should have :
1.13 bits
2.14 bits
3.15 bits
4.16 bits
If two inputs are active on a priority encoder, which will be coded on the output?
1. the higher value
2.the lower value
3.both of the inputs
4.neither of the inputs
If we choose Prim's Algorithm for uniquely weighted spanning tree instead of Kruskal's Algorithm, the
1.we'll get a different spanning tree.
2.we'll get the same spanning tree.
3.spanning will have less edges.
4.spanning will not cover all vertices.
If we perform xor operation of same operand then what is the status condition that is getting affected?
1.zero
2.Sign
3.Carry
4.overflow
If Y subset-of X, then
1.Y -> X
2.X -> Y
3.XY -> Y
4.None of the above
COMPREHENSIVE EXAM-ANSWERS
PG 100-150
If a transaction obtains an exclusive lock on a row, it means that the transaction wants to ....... that row.
1.select
2.update
3.view
4.Read
1.edge-triggered
2.toggle triggered
3.clock triggered
4.noise triggered
If any anomalies are present make sure that programs that ____ the database will operate correctly
1.Insert
2.Delete
3.Update
4.Alter
1.A ? C.
2.B ? C.
4.C is a determinant.
If both inputs of an S-R flip-flop are low, what will happen when the clock goes HIGH?
2.E is covered by F
3.F is covered by E
4.Fplus is covered by E
1.cannot be done
2.must be done
4.can be done
If several requests have different deadlines that are relaticely close together, then using the SCAN – EDF
algorithm :
1.
The SCAN ordering will service the requests in that batch
2.
The EDF ordering will service the requests in that batch
3.
The FCFS ordering will service the requests in that batch
4.
None of these
1.
the server runs a new process
2.
the server goes to another thread pool
3.
the server demands for a new pool creation
4.
the server waits until one becomes free
If the variables x and y are not linearly related, then the correlation between x and y is:
1.0
2.-1
3.1
4.0.5
If there are 32 segments, each of size 1Kb, then the logical address should have :
1.13 bits
2.14 bits
3.15 bits
4.16 bits
If two inputs are active on a priority encoder, which will be coded on the output?
1.
the higher value
2.
the lower value
3.
both of the inputs
4.
neither of the inputs
If we choose Prim's Algorithm for uniquely weighted spanning tree instead of Kruskal's Algorithm, then
1.
we'll get a different spanning tree.
2.
we'll get the same spanning tree.
3.
spanning will have less edges.
4.
spanning will not cover all vertices.
If we perform xor operation of same operand then what is the status condition that is getting affected?
1.
zero
2.
Sign
3.
Carry
4.
overflow
1.
3
2.
4
3.
2
4.
6
If Y subset-of X, then
1.
Y -> X
2.
X -> Y
3.
XY -> Y
4.
None of the above
If you have an empty queue and you insert characters ‘r’, ‘a’, ‘t’ (in this order only), what is the order of the
characters when you dequeue all the elements?
1.
‘r’, ‘a’, ‘t’
2.
‘t’, ‘a’, ‘r’
3.
‘r’, ‘t’, ‘a’
4.
‘t’, ‘r’, ‘a’
If you were collecting and storing information about your music collection, an album would be considered a(n)
_____.
1.
Relation
2.
Entity
3.
Instance
4.
Attribute
If and are the two regression coefficients of variables X and Y , then the value of the correlation coefficient
is
1.
1/3
2.
1/9
3.
-1/3
4.
-1/9
1.
transaction control
2.
chained transaction
3.
nested transaction
4.
calling transaction
In ................... policy, when the last track has been visited in one direction, the arm is returned to the opposite
end of the disk and the scan begins again.
1.
Last in first out
2.
Shortest service time first
3.
SCAN
4.
Circular SCAN
In .................... inheritance, the base classes are constructed in the order in which they appear in the
deceleration of the derived class.
1.
multipath
2.
multiple
3.
multilevel
4.
hierarchical
1.
multipath
2.
multiple
3.
multilevel
4.
hierarchical
In 2NF
1.
No functional dependencies exist.
2.
No multivalued dependencies exist.
3.
No partial functional dependencies exist
4.
No partial multivalued dependencies exist.
1.
Magnetic disks
2.
Electrical disks
3.
Assemblies
4.
Cylinders
1.
Fixed partitioning
2.
Simple Paging
3.
Virtual memory paging
4.
Simple segmentation
In ___________, there is an inefficient use of processor due to the need for compaction to counter external
fragmentation.
1.
Fixed partitioning
2.
Dynamic partitioning
3.
Virtual memory paging
4.
Simple segmentation
1.
Single Linked List
2.
Doubly linked list
3.
Circular linked list
4.
All the option
1.
External node
2.
Exterior node
3.
Outer node
4.
Outside node
1.
r=r+1
2.
r=(r+1)% [QUEUE_SIZE – 1]
3.
r=(r+1)% QUEUE_SIZE
4.
r=(r-1)% QUEUE_SIZE
1.
null
2.
front
3.
rear
4.
rear-1
1.
Two variable term
2.
single variable term
3.
Three variable term
4.
four variable term
In a full binary tree if number of internal nodes is I, then number of leaves L are?
1.
L = 2I
2.
L=I+1
3.
L=I–1
4.
L = 2I – 1
In a linked list the ____________ field contains the address of next element in the list.
1.
Link field
2.
Next element field
3.
Start field
4.
Info field
In a paged memory, the page hit ratio is 0.35. The required to access a page in secondary memory is equal to
100 ns. The time required to access a page in primary memory is 10 ns. The average time required to access a
page is :
1.
3.0 ns
2.
68.0 ns
3.
68.5 ns
4.
78.5 ns
1.
front, rear end
2.
only at rear end
3.
only at front end
4.
any position
In a queue, the initial values of front pointer f rear pointer r should be ……. and ………. respectively.
1.
0 and 1
2.
0 and -1
3.
-1 and 0
4.
1 and 0
1.
Tuples
2.
Attributes
3.
Tables
4.
Rows
In a stack the command to access nth element from top of the stack s will be _______
1.
S[Top –n]
2.
S[Top +n]
3.
S[top-n-1]
4.
None of the above
In a three variable K-Map with minterms of variables x, y, and z an Octet will represent
1.
x
2.
x’
3.
z
4.
1
1.
shrinking phase
2.
growing phase
3.
running phase
4.
initial phase
1.
shrinking phase
2.
growing phase
3.
running phase
4.
initial phase
In a(n) ____ backup of the database, only the last modifications to the database are copied.
1.
full
2.
incomplete
3.
differential
4.
transaction log
1.
rectangle.
2.
ellipse
3.
diamond box
4.
circle.
1.
Entity sets
2.
Attributes
3.
Database
4.
Tables
1.
I and II
2.
I and III
3.
II and III
4.
II and IV
In an operating system a utility which lets the users issue and execute commands from the keyboard is called:
1.
Terminal Handler
2.
Command Interpreter
3.
Kernel
4.
None of the above
In an operating system a utility which lets the users issue and execute commands from the keyboard is called:
1.
Terminal Handler
2.
Command Interpreter
3.
Kernel
4.
None of the above
In an SR latch made by cross-coupling two NAND gates, if both S and R inputs are set to 0, then it will result in
1.
Q = 0, Q' = 1
Q = 1, Q' = 0
Q = 1, Q' = 1
Indeterminate states
In Augmentation Inference rule If X -> Y, then XZ ->
1.
ZX
2.
YZ
3.
YX
4.
None of the above
In C++, const qualifier can be applied to 1) Member functions of a class 2) Function arguments 3) To a class
data member which is declared as static 4) Reference variables
1.
Only 1, 2 and 3
2.
Only 1, 2 and 4
3.
All
4.
Only 1, 3
1.True
2.False
3.Choose either true or false
4.Neither true nor false
In case of operator overloading, operator function must be ______ . 1. Static member functions 2. Non- static
member functions 3.Friend Functions
1.
Only 2
2.
Only 1, 3
3.
Only 2 , 3
4.
All 1 , 2, 3
1.
One pointer
2.
Two pointer
3.
Three pointer
4.
None
1.
XY -> Y
2.
X -> YZ
3.
YZ -> X
4.
None of the above
In doubly linked lists, traversal can be performed?
1.
Only in forward direction
2.
Only in reverse direction
3.
In both directions
4.
None
1.
Oval
2.
Single line
3.
Double line
4.
Arrow
1.
oldest page is chosen
2.
newest page is chosen
3.
random page is chosen
4.
none of the mentioned
1.
the number of partitions
2.
the CPU utilization
3.
the memory size
4.
All of these
2.
primary key
3.
key
4.
None
1.
x.x’=0
2.
x + x’ = 1
3.
x+0=x
4.
(x’)’ = x
1.
The item is somewhere in the middle of the array
2.
The item is not in the array at all
3.
The item is the last element in the array
4.
The item is the last element in the array or is not there at all
1.
filter
2.
records
3.
blocks
4.
numbers
1.
4,5
2.
2,3
3.
5,6
4.
7,8
In order to keep track of current topmost element of the stack we need to maintain one variable.
1.
True
2.
False
3.
Partially Correct
4.
None of the above.
In paging the user provides only ________, which is partitioned by the hardware into ________ and ______.
1.
one address, page number, offset
2.
one offset, page number, address
3.
page number, offset, address
4.
None of these
1.
WX -> Z
2.
WY -> X
3.
Y->Z
4.
None of the above
1.
Attributes of common
2.
Tuple of common
3.
Tuple of distinct
4.
Attributes of distinct
In SCAN – EDF, requests with the same deadlines are ordered according to :
1.
SCAN policy
2.
EDF policy
3.
FCFS policy
4.
FIFO policy
In the ............, one transaction inserts a row in the table while the other transaction is half way through its
browsing of table.
1.
transaction read problem
2.
one way read problem
3.
serial read problem
4.
phantom read problem
In the ..................... scheme, two different parity calculations are carried out an stored in separate blocks on
different disks.
1.
RAID Level 4
2.
RAID Level 5
3.
RAID Level 6
4.
RAID Level 3
1.
First
2.
Second
3.
Third
4.
Fourth
1.
First
2.
Second
3.
Third
4.
Fourth
In the expression A(A+B), by writing the first term A as A+0, the expression is best simplified as
1.
A+AB
2.
AB
3.
A
4.
A+B
1.
2
2.
3
3.
4
4.
5
1.
a1
2.
a2
3.
a3
4.
None of the above
1.
The input is already sorted
2.
A large file has to be sorted
3.
Large values need to be sorted with small keys
4.
Small values need to be sorted with large keys
1.
F={D->A, B->D}
2.
F={B->A, D->A}
3.
Both A and B
4.
None of the above
In the multiprogramming environment, the main memory consist of ________________ number of process?
1.
>100
2.
only one
3.
>50
4.
More than one
1.
Pop
2.
Evaluation
3.
Create
4.
Push
In the stack, if user try to remove an element from the empty stack then it called as ___________.
1.
Empty Collection
2.
Stack Underflow
3.
Stack Overflow
4.
Garbage Collection
In the worst case, the number of comparisons needed to search a singly linked list of length n for a given
element is
1.
O(log 2 n)
2.
O(n/2)
3.
O(log 2 n – 1)
4.
O(n)
In two phase commit, .......... coordinates the synchronization of the commit or rollback operations.
1.
database manager
2.
central coordinator
3.
participants
4.
concurrency control manager
1.
shrinking phase
2.
growing phase
3.
running phase
4.
initial phase
In which Access method , Cycle time is Same for all the blocks of memory
1.
Random Access
2.
Sequential Access
3.
Direct Access
4.
Semi Random Access
1.
Subtraction
2.
Addition
3.
Multiplication
4.
Both addition and subtraction
In which traversal we process all of a vertex's descendants before we move to an adjacent vertex.
1.
Depth Limited
2.
Depth First
3.
Breadth First
4.
With first
Indexing the _____________ element in the list is not possible in linked lists
1.
middle
2.
first
3.
last
4.
any where in between
1.
int data type size
2.
int value= marks[2]
3.
marks[9] = 30
4.
marks[30]=0
1.
0101
2.
0110
3.
0111
4.
1001
Is a pile in which items are added at one end and removed from the other.
1.
Stack
2.
Queue
3.
List
4.
None
1.
Any mandatory participation constraint in a many-to-one relationship
2.
Any mandatory participation constraint in a many-to-many relationship
3.
A one-to-one relationship
4.
A many-to-one relationship
1.
a member function
2.
a global function
3.
class
4.
a member function, a global function and a class
1.
Query the database with SQL
2.
Special hardware devices
3.
Slower overall processing
4.
It is not possible to detect deadlocks
1.
User mode
2.
Privileged mode
3.
Monitor mode.
4.
Mode
Latches constructed with NOR and NAND gates tend to remain in the latched condition due to which
configuration feature?
1.
cross coupling
2.
gate impedance
3.
low input voltages
4.
asynchronous operation
1.
A XOR B
2.
A AND B
3.
A OR B
4.
A EXNOR B
Let k = 2n. A circuit is built by giving the output of an n-bit binary counter as input to an n-to-2n bit decoder.
This circuit is equivalent to a
1.
2.
3.
k-bit ring counter
4.
k-bit Johnson counter.
Let the following circular queue can accommodate maximum six elements with the
1.
front = 2 rear = 5 queue = ______; L, M, N, O, ___
2.
front = 3 rear = 5 queue = L, M, N, O, ___
3.
front = 3 rear = 4 queue = ______; L, M, N, O, ___
4.
front = 2 rear = 4 queue = L, M, N, O, ___
1.
Static
2.
Dynamic
3.
Compile Time
4.
None of these
1.
for relatively permanent collections of data.
2.
for the size of the structure and the data in the structure are constantly changing.
3.
data structure
4.
for none of above situation
2.
Radix sort
3.
Polynomial manipulation
4.
Binary search
1.successor node
2.predecessor node
3.head node
4.last node
Locks placed by command are called ________
1.
implicit locks
2.
explicit locks
3.
exclusive locks
4.
shared locks
1.
after database has been physically damaged
2.
after some individual transaction has failed
3.
after inconsistent transaction has been identified
4.
after a system crash
1.
Dot operator
2.
Scope resolution operator
3.
Stream insertion operator
4.
Extraction operator
Memory
1.
is a device that performs a sequence of operations specified by instructions in memory.
2.
is the device where information is stored
3.
is a sequence of instructions
4.
is typically characterized by interactive processing and time-slicing of the CPU's time to allow quick response to
each user.
1.
Sign-magnitude
2.
one's complement
3.
Unsigned
4.
two's complement
1.
stack pointer
2.
cache
3.
accumulator
4.
disk buffer
Memory management technique in which system stores and retrieves data from secondary storage for use in
main memory is called
1.
Fragmentation
2.
Paging
3.
Mapping
4.
none of the mentioned
1.
0
2.
1
3.
A
4.
A’
1.
Binary sequence
2.
Gray code
3.
Binary variables
4.
BCD code
Modification schema of oracle database in one level without affecting the schema in high level is called as
_______
1.
Data Migration
2.
Data Isolation
3.
Data Independence
4.
Data Abstraction
1.
decimal-to-hexadecimal
2.
single input, multiple outputs
3.
ac to dc
4.
odd parity to even parity
Multimedia systems require _________ scheduling to ensure critical tasks will be serviced within timing
deadlines.
1.
Soft real time
2.
Hard real time
3.
Normal
4.
None of these
Multiple inheritance leaves room for a derived class to have _______ members.
1.
dynamic
2.
Private
3.
onlineexam.br>
4.
ambiguous
1.
encoder
2.
decoder
3.
both
4.
neither
1.
()
2.
{}
3.
<>
4.
“”
1.
Background
2.
Orphan
3.
Zombie
4.
Novel
1.Front
2.Rear
3.Middle
4.Both Front and Rear
On a positive edge-triggered S-R flip-flop, the outputs reflect the input condition when ________.
1.
the clock pulse is LOW
2.
the clock pulse is HIGH
3.
the clock pulse transitions from LOW to HIGH
4.
the clock pulse transitions from HIGH to LOW
1.
data generation
2.
serial-to-parallel conversion
3.
parity checking
4.
data selector
2.
Stack requires dynamic memory but queues do not
3.
Queues use two ends of the structures but stacks use only one
4.
Stacks use two ends of the structure but queues use only one
1.
AND
2.
NAND
3.
OR
4.
NOT
1.
each process
2.
each thread
3.
each instruction
4.
each address
Operating system is
1.
Hardware
2.
Software
3.
Firmware
4.
Middleware
Operating System maintains the page table for
1.
each process
2.
each thread
3.
each instruction
4.
each address
#include<stdio.h>
int main()
float x = 0.1;
if ( x == 0.1 )
printf("IF");
else if (x == 0.1f)
printf("ELSE IF");
else
printf("ELSE");
1.
ELSE IF
2.
IF
3.
ELSE
4.
None
Output will be a LOW for any case when one or more inputs are zero for a(n):
1. AND
2.NAND
3.OR
4.NOT
1.
Database Instance
2.
Database Abstraction
3.
Database Schema
4.
None of these
1.
virtual functions does not give the ability to write a templated function.
2.
virtual functions does not give the ability to rewrite a templated function.
3.
virtual functions does give the ability to write a templated function.
4.
none
1.
Primary Key
2.
Super Key
3.
Candidate Key
4.
Foreign Key
Pointer is pointing to the first element of the Node then time require to Insert Element to second position is
__________.
1.
O(n)
2.
O(1)
3.
O(2n)
4.
O(3n)
class B: public A
{
public:
B() : y (0) {}
private:
int y;
};
void show()
{
A a;
B b;
cout << "The default value of A::x = " << a.x << " ";
cout << "The default value of B::y = " << b.y;
}
1.
Compiler Error in show() because x is protected in class A
2.
Compiler Error in show() because y is private in class b
3.
The default value of A::x = 0 The default value of B::y = 0
4.
Compiler Dependent
include<iostream>
class Test
{
protected:
int x;
public:
void fun() const { cout << "fun() const " << endl; }
};
int main()
Test t1 (10);
t1.fun();
t2.fun();
return 0;
1.
Compiler Error
2.
fun()
3.
fun() const
4.
Const fun()
#include <stdio.h>
int main()
float c = 5.0;
1.
Temperature in Fahrenheit is 41.00
2.
Temperature in Fahrenheit is 37.00
3.
Temperature in Fahrenheit is 0.00
4.
Compiler Error
1.
Productivity
2.
Security
3.
Reliability
4.
Integrity
1.
Wasted storage space
2.
Problems understanding meaning
3.
Both A and B
4.
None of the above
Process is
1.
program in High level language kept on disk
2.
contents of main memory
3.
a program in execution
4.
a job in secondary memory
Process of removing an element from the stack is called as __________.
1.
Push
2.
Pop
3.
Create
4.
Enter
1.
hardware level
2.
software level
3.
both (a) and (b)
4.
none of the mentioned
1.
logical address
2.
absolute address
3.
physical address
4.
relative address
Property of normalization of relations which guarantees that functional dependencies are represented in
separate relations after decomposition is classified as
1.
nonadditive join property
2.
independency reservation property
3.
dependency preservation property
4.
additive join property
push() and pop() functions are found in ______________
1.
Queue
2.
List
3.
Stack
4.
Tree
1.Pop
2.Crash
3.Create
4.Overflow
putchar(c) function/macro always outputs character c to the:
1.
screen
2.
standard output
3.
depends on the compiler
4.
depends on the standard
1.
quick sort
2.
merge sort
3.
heap sort
4.
insertion sort
1.
radix sort
2.
quick sort
3.
recursion
4.
depth first search
Queue follows_______________
1.
LIFO
2.
FIFO
3.
LILO
4.
Array
1.
Brute Force technique
2.
Divide and conquer
3.
Greedy algorithm
4.
Dynamic programming
1.
BCD code
2.
Binary code
3.
ASCII code
4.
Gray Code
1.
ALL CONSTRUCTOR HAVE THE SAME NAME
2.
THE NAME OF CONSTRUCTORS MATCHES THE NAME OF THE CLASS
3.
CONSTRUCTORS CAN HAVE ANY NUMBER OF PARAMETERS OF ANY TYPE
4.
ALL THE ANSWERS ARE CORRECT
1.
data file
2.
data record.
3.
menu.
4.
bank.
1.
Polymorphism
2.
Encapsulation
3.
Inheritance
4.
None
1.
Update the transaction
2.
Recover from transaction failure
3.
Retrieve old records
4.
Repeat a transaction
2.
Decoder
3.
Encoder
4.
Demultiplexer
1.
record.
2.
relation.
3.
column.
4.
field.
Rule which states that addition of same attributes to right side and left side will results in other valid
dependency is classified as
1.
referential rule
2.
inferential rule
3.
augmentation rule
4.
reflexive rule
1.
memory management unit
2.
CPU
3.
PCI
4.
none of the mentioned
2.
CPU
3.
PCI
4.
none of the mentioned
Select the canonical sum-of-products representation of the following function: f(x,y,z) = xy’ + y(x+z)
1.
f(x,y,z) = xy’ + xy + yz
2.
f(x,y,z) = x + yz
3.
f(x,y,z) = xy’z + xy’z’ + xyz + x’yz + xyz’
4.
f(x,y,z) = (x + y + z).(x + y + z’).(x + y’ + z)
1.
Lower seek times
2.
Lower bandwidth
3.
Higher seek time
4.
Higher bandwidth
1.
latch
2.
flip-flop
3.
counters
4.
memory
1.
Object-oriented
2.
Non-Procedural
3.
Declarative
4.
Procedural
1.FIFO
2.LIFO
3.LILO
4.None of the above
State true or false. i) Stack may be empty also in some cases ii) Stack follows FIFO concept.
1.
True, True
2.
True, False
3.
False, True
4.
False, False
State true or false. i) The degree of root node is always zero. ii) Nodes that are not root and not leaf are called
as internal nodes.
1. True, True
2.True, False
3.False, True
4. False, False
STATE WHETHER THE FOLLOWING STATEMENTS ABOUT THE CONSTRUCTOR ARE TRUE OR FALSE.
II) CONSTRUCTORS ARE INVOKED AUTOMATICALLY WHEN THE OBJECTS ARE CREATED.
1.
TRUE, TRUE
2.
TRUE, FALSE
3.
FALSE,TRUE
4.FALSE,FALSE
Storing natural joins of base relations leads to
1.
insert anomalies
2.
select anomalies
3.
delete anomalies
4.
update anomalies
struct node {
int data;
}*start = NULL;
Consider the above representation and predict what will be printed on the screen by following statement ?
start->next->data
1.
None of these
2.
Access the “data” field of 2nd node
3.
Access the “data” field of 3rd node
4.
Access the “data” field of 1st node
Structure is basically
1.
Collection of numbers only
2.
Collection of ascii values only
3.
Collection of Homogeneous data types
4.
Collection of Hetrogeneous data types
Subtraction of binary numbers can be done conveniently with
1.
high cost circuit
2.
low cost circuits
3.
complements
4.
borrows
1.
NOT gates
2.
OR gates
3.
AND gates
4.
XOR gates
Supervisor state is
1.
never used
2.
entered by programs when they enter the processor
3.
required to perform any I/O
4.
only allowed to the operating system
Suppose a circular queue of capacity (n – 1) elements is implemented with an array of n elements. Assume that
the insertion and deletion operation are carried out using REAR and FRONT as array index variables,
respectively. Initially, REAR = FRONT = 0. The conditions to detect queue full and queue empty are
1.
Full: (REAR+1) mod n == FRONT, empty: REAR == FRONT
2.
Full: (REAR+1) mod n == FRONT, empty: (FRONT+1) mod n == REAR
3.
Full: REAR == FRONT, empty: (REAR+1) mod n == FRONT
4.
Full: (FRONT+1) mod n == REAR, empty: REAR == FRONT
Suppose each set is represented as a linked list with elements in arbitrary order. Which of the operations
among union, intersection, membership, cardinality will be the slowest?
1.
union only
2.
intersection, membership
3.
membership, cardinality
4.
union, intersection
Suppose only one multiplexer and one inverter are allowed to be used to implement any Boolean function of n
variables. What is the minimum size of the multiplexer needed?
1.
2n line to 1 line
2n+1 line to 1 line
2n-1 line to 1 line
2n-2 line to 1 line
1.
primary memory
2.
secondary memory
3.
CPU
4.
none of the mentioned
1.
motherboard
2.
keyboard
3.
monitor
4.
backing store
Tables in second normal form (2NF):
1.
Eliminate all hidden dependencies
2.
Eliminate the possibility of a insertion anomalies
3.
Have a composite key
4.
Have all non key fields depend on the whole primary key
1.
Eliminate all hidden dependencies
2.
Eliminate the possibility of a insertion anomalies
3.
ave a composite key
4.
Have all non key fields depend on the whole primary key
1.
SCAN
2.
C-SCAN
3.
N-Step SCAN
4.
Both A and B
The ................ inherits some or all of the properties of the ........... class.
1.
base, derived
2.
derived, base
3.
derived, initial
4.
base, final
The .................. policy is to select the disk I/O request that requires the least movement of the disk arm from
its current position.
1.
Last in first out
2.
Shortest service time first
3.
Priority by process
4.
Random scheduling
1.
programmer
2.
system architect
3.
system designer
4.
None of these
1.
memory manager
2.
CPU
3.
CPU manager
4.
User
1.
stack pointer
2.
page table base register
3.
page register
4.
program counter
The address of a page table in memory is pointed by
1.
stack pointer
2.
page table base register
3.
page register
4.
program counter
1.
the lock is obtained only after the transaction has processed.
2.
the lock is obtained before the transaction has processed.
3.
the lock never needs to be obtained
4.
transactions that are best suited are those with a lot of activity
1.
Alphabets to access
2.
named key to access
3.
named value to access
4.
index to access
1.
When Item is somewhere in the middle of the array
2.
When Item is not in the array at all
3.
When Item is the last element in the array
4.
When Item is the last element in the array or is not there at all
1.
OR gate
2.
AND gate
3.
inverter
4.
comparator
1.
0011101
2.
0110101
3.
1101001
4.
0101011
The binary-coded decimal (BCD) system can be used to represent each of the 10 decimal digits as:
1.
4-bit binary code
2.
8-bit binary code
3.
16-bit binary code
4.
ASCII code
The Boolean expression for a 3-input AND gate is ________.
1.
X=A+B
2.
X=A+B+C
3.
X = ABC
4.
X = A + BC
1.
X=A+B
2.
X=A+B+C
3.
X = ABC
4.
X = A + BC
The candidate keys that are not selected as the Primary key are known as _______.
1.
super key
2.
alternate keys
3.
secondary key
4.
foreign key
The cin is
1.
An object
2.
A class
3.
A function
4.
A package
1.
O(n)
2.
O(n log n)
3.
O(log n)
4.
O(log 2n)
1.
CREATES AN OBJECT FROM ANY OBJECT
2.
CREATES AN OBJECT FROM AN OBJECT OF THE SAME CLASS
3.
CREATES AN OBJECT THAT IS A POINTER TO THE COPIED OBJECT
4.
ALL THE PREVIOUS ANSWERS ARE INCORRECT
The data structure required to check whether the parenthesis in an expression are balanced is ____________
1.
Stack
2.
Queue
3.
Tree
4.
Array
1) The arrays have one of the following
1. Alphabets to access
2. named key to access
3. named value to access
4. index to access
4) The basic logic gate whose output is the complement of the input is the:
1. OR gate
2. AND gate
3. inverter
4. comparator
6) The binary-coded decimal (BCD) system can be used to represent each of the 10 decimal digits as:
1. 4-bit binary code
2. 8-bit binary code
3. 16-bit binary code
4. ASCII code
7) The Boolean expression for a 3-input AND gate is ________.
1. X = A + B
2. X = A + B + C
3. X = ABC
4. X = A + BC
9) The candidate keys that are not selected as the Primary key are known as _______.
1. super key
2. alternate keys
3. secondary key
4. foreign key
13) The data structure required to check whether the parenthesis in an expression are balanced is
____________
1. Stack
2. Queue
3. Tree
4. Array
20) The different classes of relations created by the technique for preventing modification anomalies are
called:
1. normal forms.
2. referential integrity constraints
3. functional dependencies.
4. None of the above is correct.
21) The disadvantage of moving all process to one end of memory and all holes to the other direction,
producing one large hole of available memory is :
1. the cost incurred
2. the memory used
3. the CPU used
4. All of these
29) The following C function takes a singly linked list as input argument. It modifies the list by moving the
last element to the front of the list and returns the modified list. Some part of the code left blank. typedef
struct node { int value; struct node* next; }Node; Node* move_to_front(Node* head) { Node* p, *q;
if((head==NULL) || (head->next==NULL)) return head; q=NULL; p=head; while(p->next != NULL) { q=p;
p=p->next; } return head; } Choose the correct alternative to replace the blank line
1. q=NULL; p->next=head; head =p ;
2. q->next=NULL; head =p; p->next = head;
3. head=p; p->next=q; q->next=NULL;
4. q->next=NULL; p->next=head; head=p;
30) The following C Function takes a singly- linked list of integers as a parameter and rearranges the
elements of the lists. The function is called with the list containing the integers 1,2,3,4,5,6,7 in the given
order. What will be the contents of the list after the function completes execution? struct node{ int value;
struct node* next; }; void rearrange (struct node* list) { struct node *p,q; int temp; if (! List || ! list->next)
return; p->list; q=list->next; while(q) { temp=p->value; p->value=q->value; q->value=temp;p=q->next;
q=p?p->next:0; } }
1. 1, 2, 3, 4, 5, 6, 7
2. 2, 1, 4, 3, 6, 5, 7
3. 1, 3, 2, 5, 4, 7, 6
4. 2, 3, 4, 5, 6, 7, 1
31) The following function reverse() is supposed to reverse a singly linked list. There is one line missing at
the end of the function. struct node { int data; struct node* next; }; /* head_ref is a double pointer which
points to head (or start) pointer of linked list */ static void reverse(struct node** head_ref) { struct node*
prev = NULL; struct node* current = *head_ref; struct node* next; while (current != NULL) { next = current-
>next; current->next = prev; prev = current; current = next; } /ADD A STATEMENT HERE/ } What should
be added in place of "/ADD A STATEMENT HERE/", so that the function correctly reverses a linked list.
1. *head_ref = prev;
2. *head_ref = current;
3. *head_ref = next;
4. *head_ref = NULL;
32) The following is a data structure that organizes data similar to a line in the supermarket, where the first
one in line is the first one out.
1. Queue linked list
2. Stacks linked list
3. Both Queue and Stack Linked List
4. Neither of Queue and Stack Linked List
33) The following is a linear list in which insertions and deletions are made to from either end of the
structure. 1. Circular queue
2. random of queue
3. priority
4. dequeue
34) The following is not the operation that can be performed on queue.
1. Insertion
2. Deletion
3. Retrieval
4. Traversal
35) The following postfix expression with single digit operands is evaluated using a stack 8 2 3 ^ / 2 3 * + 5
1 * - 1.6,1
2. 5,7
3.3,2
4. 1,6
36) The format identifier ‘%i’ is also used for _____ data type?
1. char
2. int
3. float
4. double
37) The format used to present the logic output for the various combinations of logic inputs to a gate is
called a(n):
1. Boolean constant
2. Boolean variable
3. truth table
4. input logic function
38) The friend functions and the member functions of a friend class can directly access the ...................
data.
1. private and protected
2. private and onlineexam.br>
3. protected and onlineexam.br>
4. private, protected and onlineexam.br>
43) The given array is arr = {1,2,3,4,5}. (bubble sort is implemented with a flag variable)The number of
iterations in selection sort and bubble sort respectively are,
1. 5 and 4
2. 1 and 4
3. 0 and 4
4. 4 and 1
44) The given array is arr = {1,2,4,3}. Bubble sort is used to sort the array elements. How many iterations
will be done to sort the array with improvised version?
1. 4
2. 2
3. 1
4. 0
45) The given array is arr = {1,2,4,3}. Bubble sort is used to sort the array elements. How many iterations
will be done to sort the array?
1. 4
2. 2
3. 1
4. 0
46) The given array is arr = {2,3,4,1,6}. What are the pivots that are returned as a result of subsequent
partitioning?
1. 1 and 3
2. 3 and 1
3. 2 and 6
4. 6 and 2
47) The given array is arr = {2,6,1}. What are the pivots that are returned as a result of subsequent
partitioning? 1. 1 and 6
2. 6 and 1
3. 2 and 6
4. None of the mentioned
48) The given array is arr = {3,4,5,2,1}. The number of iterations in bubble sort and selection sort
respectively are, 1. 5 and 4
2. 4 and 5
3. 2 and 4
4. 2 and 5
49) The global coordinator forgets about the transaction phase is called .........
1. Prepare phase
2. Commit phase
3. Forget phase
4. Global phase
50) The heads of the magnetic disk are attached to a _____ that moves all the heads as a unit.
1. Spindle
2. Disk arm
3. Track
4. None of these
52) The hybrid algorithm that combines EDF with SCAN algorithm is known as :
1. EDS
2. SDF
3. SCAN-EDF
4. None of these
53) The IC 74138 is
1. Decoder
2. OR Gate
3. 1:8 Dmux
4. Encoder
57) The K-Map for following function will have F(w,x,y,z) = ∑ (0,1,2,4,5,6,8,9,12,13,14)
1. 2 pairs, 1 Quad, 0 Octet
2. 2 pairs, 2 Quad, 1 Octet.
3. 1 pair, 2 Quad, 1 Octet
4. 0 pair, 2 Quad, 1 Octet
59) The language used in application programs to request data from the DBMS is referred to as the
1. DDL
2. DML
3. VDL
4. SDL
61) The logic gate that will have HIGH or "1" at its output when any one (or more) of its inputs is HIGH is
a(n):
1. OR gate
2. AND gate
3. NOR gate
4. NOT operation
65) The NAND logic gate is the same as the operation of the ________ gate with an inverter connected to
the output.
1. OR
2. AND
3. NAND
4. none of the above
66) The node where the distributed transaction originates is called the .......
1. local coordinator
2. starting coordinator
3. global coordinator
4. originating node
67) The NOR logic gate is the same as the operation of the ________ gate with an inverter connected to
the output.
1.OR
2.AND
3.NAND
4.none of the above
69) The number of binary trees with 3 nodes which when traversed in post order gives the sequence A,B,C
is ? 1.3
2.4
3.5
4.6
71) The number of the threads in the pool can be decided on factors such as :
1. number of CPUs in the system
2. amount of physical memory
3. expected number of concurrent client requests
4. All of these
71) The operating system keeps a small table containing information about all open files called :
1. System table
2. Open-file table
3. File table
4. Directory table
72) The operation of processing each element in the list is known as _____________
1. sorting
2. merging
3. inserting
4. traversal
73) The Oracle RDBMS uses the ____ statement to declare a new transaction start and its properties.
1. BEGIN
2. SET TRANSACTION
3. BEGIN TRANSACTION
4. COMMIT
77) The output of an AND gate with three inputs, A, B, and C, is HIGH when ________.
1. A = 1, B = 1, C = 0
2. A = 0, B = 0, C = 0
3. A = 1, B = 1, C = 1
4. A = 1, B = 0, C = 1
78) The output of an OR gate with three inputs, A, B, and C, is LOW when ________
1. A = 0, B = 0, C = 0
2. A = 0, B = 0, C = 1
3. A = 0, B = 1, C = 1
4. all of the above
79) The output of logic gate is ‘1’ when all its inputs are at logic ‘0’. The gate is either
1.a NAND or an EX-OR gate
2.a NOR or an EX- NOR gate
3.an OR or an EX-NOR gate
4.an AND or an EX-OR gate
82) The part of machine level instruction, which tells the central processor what has to be done, is
1. Operation code
2. Address
3. Locator
4. Flip-Flop
83) The partial key attribute is underlined with a ______ line.
1. Single
2. Shaded
3. Dotted
4. Double
84) The phenomenon of interpreting unwanted signals on J and K while Cp (clock pulse) is HIGH is called
________.
1. parity error checking
2. ones catching
3. digital discrimination
4. digital filtering
85) The post order traversal of a binary tree is DEBFCA. The pre order traversal is ___
1. ABFCDE
2. ADBFEC
3. ABDECF
4. ABDCEF
87) The pre-order and post-order of a Binary tree generates same output. Here, the tree can have
maximum of 1.Two Nodes
2.One Node
3.Three Nodes
4.No restrictions in number of nodes
90) The priority of a process will ______________ if the scheduler assigns it a static priority.
1. Change
2. Remain unchanged
3. Depends on the operating system
4. None of these
98) The relational model uses some unfamiliar terminology. A tuple is equivalent to a :
1. Record
2. Field
3. File
4. Database
99) The relationship in which an entity type participates more than once is a _____ relationship.
1. Recursive
2. Iterative
3. Enumerated
4. Implied
102) The set of tracks that are at one arm position make up ___________.
1. Magnetic disks
2. Electrical disks
3. Assemblies
4. Cylinders
103) The situation in which a transaction holds a data item and waits for the release of data item held by
some other transaction, which in turn waits for another transaction, is called .......
1. serialiable schedule
2. process waiting
3. concurrency
4. deadlock
107) The strategy of allowing processes that are logically runnable to be temporarily suspended is called
1. preemptive scheduling
2. non preemptive scheduling
3. shortest job first
4. first come first served
113) The time taken for the desired sector to rotate to the disk head is called :
1. Positioning time
2. Random access time
3. Seek time
4. Rotational latency
114) The time taken to move the disk arm to the desired cylinder is called the :
1. Positioning time
2. Random access time
3. Seek time
4. Rotational latency
115) The transaction wants to edit the data item is called as .......
1. Exclusive Mode
2. Shared Mode
3. Inclusive Mode
4. Unshared Mode
118) The value obtained in the function is given back to main by using ________ keyword?
1.return
2.static
3.new
4.volatile
119) The way a particular application views the data from the database that the application uses is a
1. module.
2. relational model.
3. schema.
4. sub schema.
120) To avoid the race condition, the number of processes that may be simultaneously inside their critical
section is
1. 8
2. 1
3. 16
4. 0
121) To Delete an item from a Queue identify the correct set of statements
1. Q[REAR] = item; REAR ++
2. item = Q[FRONT]; FRONT++
3. item = Q[REAR]; FRONT ++
4. item = Q[FRONT]; REAR ++
126) Transaction .......... ensures that the transaction are being executed successfully.
1. concurrency
2. consistency
3. serialisability
4. non serialiasability
131) User push 1 element in the stack with already five elements and whose maximum stack size is 5 then
stack becomes ___________.
1. Underflow
2. Overflow
3. Userflow
4. Crash
135) What control signals may be necessary to operate a 1-line-to-16 line decoder?
1. flasher circuit control signa
2. a LOW on all gate enable inputs
3. input from a hexadecimal counter
4. a HIGH on all gate enable circuits
139) WHAT HAPPENS WHEN A CLASS WITH PARAMETERIZED CONSTRUCTORS AND HAVING NO
DEFAULT CONSTRUCTOR IS USED IN A PROGRAM AND WE CREATE AN OBJECT THAT NEEDS A
ZERO-ARGUMENT CONSTRUCTOR?
1. COMPILE-TIME ERROR
2. PREPROCESSING ERROR
3. RUNTIME ERROR
4. RUNTIME EXCEPTION
140) What is a 'tuple'?
1.Another name for a table in an RDBMS
2.A row or record in a database table.
3.An attribute attached to a record.
4.Another name for the key linking different tables in a database.
154) What is the advantage of bubble sort over other sorting techniques?
1.It is faster
2.Consumes less memory
3.Detects whether the input is already sorted
4.All the choice
155) What is the advantage of selection sort over other sorting techniques?
1. It requires no additional storage space
2. It is scalable
3. It works best for inputs which are already sorted
4. It is faster than any other sorting technique
161) What is the best case efficiency of bubble sort in the improvised version?
1. O(nlogn)
2. O(logn)
3. O(n)
4. O(n2)
162) What is the condition for a tree to be weight balanced. where a is factor and n is a node?
1. weight[n.left] >= a*weight[n] and weight[n.right] >= a*weight[n].
2. weight[n.left] >= a*weight[n.right] and weight[n.right] >= a*weight[n].
3. weight[n.left] >= a*weight[n.left] and weight[n.right] >= a*weight[n].
4. weight[n] is a non zero
164) What is the difference between binary coding and binary-coded decimal?
1. BCD is pure binary.
2. Binary coding has a decimal format.
3. BCD has no decimal format.
4. Binary coding is pure binary.
166) What is the final value of j in the below code? #include int main() { int i = 0, j = 0; if (i && (j = i + 10))
//do something ; }
1. 0
2. 10
3. Depends on the compiler
4. Depends on language standard
168) What is the index number of the last element of an array with 29 elements?
1. 29
2. 28
3. 0
4. Programmer-defined
171) What is the minimum number of gates required to implement the Boolean function (AB+C)if we have
to use only 2-input NOR gates?
1. 2
2. 3
3. 4
4. 5
172) What is the minimum number of NAND gates required to implement a 2-input EXCLUSIVE-OR
function without using any other logic gate?
1. 3
2. 4
3. 5
4. 6
173) What is the most efficient way to assign or print out arrays?
1. loops
2. functions
3. pointers
4. Enum
174) What is the name given to the organized collection of software that controls the overall operation of a
computer?
1. Working system
2. Peripheral system
3. Operating system
4. Controlling system
175) What is the output of following function for start pointing to first node of following linked list? 1->2->3-
>4->5->6 void fun(struct node* start) { if(start == NULL) return; printf("%d ", start->data); if(start->next !=
NULL ) fun(start->next->next); printf("%d ", start->data); }
1.1 4 6 6 4 1
2.1 3 5 1 3 5
3.1 2 3 5
4.1 3 5 5 3 1
176) What is the output of the following #include int const s=9;int main(){ std::cout << s; return 0; }
1. 0
2. 9
3. Compile time Error
4. Runtime Error
177) What is the output of the following program? #include using namespace std; class Box { double width;
public: friend void printWidth( Box box ); void setWidth( double wid ); }; void Box::setWidth( double wid ) {
width = wid; } void printWidth( Box box ) { box.width = box.width * 2; cout << "Width of box : " << box.width
<< endl; } int main( ) { Box box; box.setWidth(10.0); printWidth( box ); return 0; }
1. 40
2. 5
3. 10
4. 20
178) What is the output of the following program? #include using namespace std; class sample { int width,
height; public: void set_values (int, int); int area () {return (width * height);} friend sample duplicate
(sample); }; void sample::set_values (int a, int b) { width = a; height = b; } sample duplicate (sample
rectparam) { sample rectres; rectres.width = rectparam.width * 2; rectres.height = rectparam.height * 2;
return (rectres); } int main () { sample rect, rectb; rect.set_values (2, 3); rectb = duplicate (rect); cout <<
rectb.area(); return 0; }
1. 20
2. 16
3. 24
4. None
179) What is the output of this C code? #include void main() { int x = 0, y = 2, z = 3; int a = x & y | z;
printf("%d", a); }
1. 3
2. 0
3. 2
4. Run time error
180) What is the output of this C code? #include void main() { int x = 1, y = 0, z = 5; int a = x && y && z++;
printf("%d", z); }
1. 6
2. 5
3. 0
4. Varies
181) What is the output of this C code? #include void main() { int x = 1, z = 3; int y = x << 3; printf(" %d\n",
y); }
1. -2147483648
2. -1
3. Run time error
4. 8
(200-252)
#include <stdio.h>
void main()
{
int x = 1, y = 0, z = 5;
int a = x && y && z++;
printf("%d", z);
}
1.6
2.5
3.0
4.Varies
#include <stdio.h>
void main()
{
int x = 1, z = 3;
int y = x << 3;
printf(" %d\n", y);
}
1.-2147483648
2.-1
4.8
#include <stdio.h>
int main()
{
int x = 1, y = 0, z = 3;
x > y ? printf("%d", z) : return z;
}
1.3
2.1
void main()
{
int x = 1, y = 0, z = 5;
int a = x && y || z++;
printf("%d", z);
}
1.6
2.5
3.0
4.Varies
1.40
2.10
3.5
4.20
1.200
2.150
3.100
4.300
#include <iostream>
using namespace std;
class sample
{
int width, height;
public:
void set_values (int, int);
int area () {return (width * height);}
friend sample duplicate (sample);
};
void sample::set_values (int a, int b)
{
width = a;
height = b;
}
sample duplicate (sample rectparam)
{
sample rectres;
rectres.width = rectparam.width * 2;
rectres.height = rectparam.height * 2;
return (rectres);
}
int main ()
{
sample rect, rectb;
rect.set_values (2, 3);
rectb = duplicate (rect);
cout << rectb.area();
return 0;
}
1.20
2.16
3.24
4.None
1.24
2.35
3.16
4.36
1.5
2.6
3.Error
4.None
1.ab+cd–*
2.ab+*cd–
3.abc+*–
4.ab+*c-d
1.*+ab–cd
2.+ab*-cd
3.abc+*–
4.+*ab-cd
12.What is the scope of the variable declared in the user defined function?
1.whole program
3.None
4.All
1.4 Bytes
2.8 Bytes
3.Depends on the system/compiler
4.Cannot be determined.
14.What is the status of the inputs S0, S1, and S2 of the 74151 eight-line multiplexer in order for the
output Y to be a copy of input I5?
1.S0 = 0, S1 = 1, S2 = 0
2.S0 = 0, S1 = 0, S2 = 1
3.S0 = 1, S1 = 1, S2 = 0
4.S0 = 1, S1 = 0, S2 = 1
2.friend class;
3.friend class
4.None
1.class name
4.None
1.O(nlogn)
2.O(logn)
3.O(n)
4.O(1)
1.O(nlogn)
2.O(logn)
3.O(n)
4.O(n2) - n square
1.O(nlogn)
2.O(logn)
3.O(n)
4.O(n2)
25.What is the worst case complexity of selection sort?
1.O(nlogn)
2.O(logn)
3.O(n)
4.O(n2)
4.It's the indication to the compiler that the function is member function
27.What term is used to refer to a specific record in your music database; for instance; information
stored about a specific album?
1.Relation
2.Instance
3.Table
4.Column
28.What type of operation can use for the following one: 0.0=0, 0.1=1,1.0=1,1.1=0
1.addition
2.Subtraction
3.A and B
29.What will be the order of execution of base class constructors in the following method of
inheritance. class A: public B, public C {....};
30.What will be the order of execution of base class constructors in the following method of
inheritance. class A: public B, virtual public C {....};
#include <iostream>
using namespace std;
class Sand
{
public: Sand()
{
cout << "Sand ";
}
~Sand()
{
cout << "~Sand ";
}
};
A.Sand
B.~Sand
C.Sand ~Sand
D.COMPILER ERROR
32.What will be the postfix expression for following infix expression A/B^C-D?
1.AB/^CD-
2.AB^/CD-
3.ABC^/D-
4.ABC/^D-
3.None
1.The values of those variables are passed to the function so that it can manipulate them.
2.The location of variable in memory is passed to the function so that it can use the same memory
area for its processing.
3.The function declaration should contain ampersand (& in its type declaration)
4.The values of those variables are can not be passed to the function.
35.What would be the asymptotic time complexity to add a node at the end of singly linked list,
if the pointer is initially pointing to the head of the list?
1.O(1)
2.O(n)
3.θ (n)
4.θ(1)
36.What would be the asymptotic time complexity to insert an element at the second position in the
linked list?
1.O(1)
2.O(n)
3.O(n2)
4.None
2.Consistency checking
3.Rollback of transaction
4.Locking of data
39.When a member function is defined outside of the class declaration, the function name must be
qualified with the:
2.ROLLBACK
3.QUIT
4.EXIT
41.When a program tries to access a page that is mapped in address space but not loaded in physical
memory, then
1.assign values
43.When high priority task is indirectly preempted by medium priority task effectively inverting the
relative priority of the two tasks, the scenario is called
1.priority inversion
2.priority removal
3.priority exchange
4.priority modification
44.When our function doesn't need to return anything means what will be the return type of the
function?
2.Blank Space
1.Zero
2.One
3.Two
4.None
46.When the body of a member function is defined inside a class declaration, it is said to be
1. Virtual
2.Friend
3.Static
4.Inline
1.Disk crash
2.Head crash
3.Magnetic damage
4.All of these
48.When the memory allocated to a process is slightly larger than the process, then :
1.write-through
2.deferred write
3.immediate write
4.unbuffered
50.When the value of an attribute A is obtained from the value of an attribute B, then the attribute A
is called _______.
1.Composite
2.Stored
3.Derived
4.Retrieved
51.When the values in one or more attributes being used as a foreign key must exist in another set of
one or more attributes in another table, we have created a(n):
1.transitive dependency.
2.insertion anomaly.
4.normal form.
52.When using SQL*Plus, Oracle commands, column names, table names and all other database
elements:
1.stack is empty
2.stack is full
1.stack is empty
2.stack is full
55.When we perform A - B where the value of A and B are 5 and 10, which of the status condition gets
affected?
1.zero
2.Sign
3.Carry
4.overflow
2.Subtraction
3.complement
1.-> operator
2.<> operator
3.:: operator
4.& operator
1.user-defined function
2.main function
3.void function
4.none
59.Which systems typically allows to replace failed disks without stopping access to the system?
1.RAM
2.RMAN
3.RAD
4.RAID
60.Which algorithm chooses the page that has not been used for the longest period of time whenever
the page required to be replaced?
61.Which are the fundamental inputs assigned or configured in the full adder circuit ?
62.Which code maintains the decimal number system even after the manipulation
1.BCD
2.Ascii
3.Excess-3
4.Hexadecimal
1.Branch
2.Queue
3.Tree
4.Stack
1.Branch
2.Queue
3.Tree
4.Stack
65.Which data structure is used in breadth first search of a graph to hold nodes?
1.Stack
2.queue
3.Tree
4.Array
66.Which data type is most suitable for storing a number 65000 in a 32-bit system?
1.short
2.int
3.long
4.double
1.Array
2.Tree
3.Stack
4.Queue
1.1NF
2.2NF
3.3NF
4.4NF
69.Which forms has a relation that possesses data about an individual entity:
Which forms simplifies and ensures that there is minimal data aggregates and repetitive groups:
4.none
70.Which is a block of Recovery Manager (RMAN) job commands that is stored in the recovery catalog?
1.recovery procedure
2.recovery block
3.stored block
4.stored script
71.Which is a bottom-up approach to database design that design by examining the relationship
between attributes:
Which is more effective while calling the functions?
1.call by value
2.call by reference
3.call by pointer
4.none
1.FIRST
2.AVAIL
3.TOP
4.REAR
73.Which is true?
1.Function calls
1.firend
2.friend
3.classfriend
4.myfriend
76.Which method of combination circuit implementation is widely adopted with maximum output
functions and minimum requirement of ICs
1.Multiplexer Method
2.Decoder Method
3.Encoder Method
77.Which of the following accesses a variable var in structure, where b is pointer to structure
1.b->var
2.b.var
3.b-var
4.b>var
78.Which of the following addressing modes, facilitates access to an operand whose location is
defined relative to the beginning of the data structure in which it appears?
1.ascending
2.sorting
3.index
4.indirect
2.Underflow of Stack
3.Garbage Collection
4.Overflow of Stack
1.NOT gate
2.OR gate
3.AND gate
4.NAND gate
81.Which of the following are correct syntax to send an array as a parameter to function:
1.func(&array);
2.func(array)
3.func(*array);
4.func(array[size]);
82.Which of the following are correct syntaxes to send an array as a parameter to function:
1.func(&array);
2.func();
3.func(*array);
4.func(array[size]);
1.1 and 2
2.1 and 3
3.1, 2 and 3
4.2, 3 and 4
2.
char *string; scanf(“%s”, string);
4.None
85.Which of the following are loaded into main memory when the computer is booted?
3.utility programs
1.assembles
2.compilers
3.interpreters
87.Which of the following best describes how to construct a 1-line to 8-line demultiplexer from a 3-
line to 8-line decoder:
1.Another structure
2.Function
3.Array
4.int array
1.Avail=Top
2.NULL=AVAIL
3.Avail=Null
4.Avail=Max stack
91.Which of the following consists of the various applications and database that play a role in a
backup and recovery strategy?
92.Which of the following correctly accesses the seventh element stored in foo, an array with 100
elements?
1.foo[6]
2.foo[7]
3.foo(7)
4.foo
1.int anarray[10];
2.int anarray;
3.anarray{10};
4.array anarray[10];
94.Which of the following data structures is best suited for efficient implementation of priority
queues?
1.Arrays
2.Linked Lists
3.Heaps
4.Stacks
95.Which of the following deals with soft errors, such as power failures?
1.system recovery
2.failure recovery
3.database recovery
4.media recovery
1.(A + B)(C + D)
2.(A)B(CD)
3.AB(CD)
4.AB + CD
97.Which of the following fields in a student file can be used as a primary key?
1.class
3.GPA
4.Major
1.allocate space in memory for the programs and resolve symbolic references between object decks
2.adjust all address dependent locations, such as address constants, to correspond to the allocated
space.
2.AND
3.NOR
4.NAND
100.Which of the following gives the memory address of the first element in array foo, an array with
100 elements?
1.&foo
2.foo[2]
3.&foo[2]
4.foo[1]
101.Which of the following gives the memory address of the first element in array?
1.array[0];
2.array[1];
3.array(2);
4.array;
1.Atomicity
2.Durability
3.Isolation
1.Network Maintenance
2.Routine Maintenance
3.Schema Definition
1.Inheritance
2.Polymorphism
3.Data abstraction
4.Data encapsulation
105.Which of the following indicates the maximum number of entities that can be involved in a
relationship?
1.Minimum cardinality
2.Maximum cardinality
3.ERD
4.None
1.Entity-Relationship model
1.A group of SQL statements consisting of one read and one write operation
1.array anarray[20][20];
2.int anarray[20][20];
4.char array[20];
3.inline:void foo() {}
4.None
1.Web Browser
2.Text Editor
4.all of above
1.Filter
2.Security
3.Scalability
4.Recovery
1.0011
2.1101
3.0101
4.1001
3.Query Language
1.When a base class is privately inherited,onlineexam.members of the base class become private
members of the derived class
3.When a base class is privately inherited,a private member of base class becomes private member
of derived class
4.When a base class is onlineexam.y inherited protected members of base class becomes protected
members of derived class
1.RAID level 1
2.RAID level 2
3.RAID level 3
4.RAID level 4
1.OR
2.NOT
3.AND
4.FOR
1.Physical Level
2.Critical Level
3.Logical Level
4.View Level
1.Partially aborted
2.Committed
3.Aborted
4.Partially committed
1.Transaction Manager
2.Logical Manager
3.Buffer Manager
4.File Manager
1.short int x;
2.signed short x;
3.short x;
4.unsigned short;
1.Hold time
4. Set up time
1.Kernel
2.Shell
3.Application programs
4.Critical Section
1.s1 = &s2;
2.s1 = s2;
3.(*s1).number = 10;
4.None
129.Which of the following is not the required condition for binary search algorithm?
2.There should be the direct access to the middle element in any sublist
1.Ordinary queue
3.Circular queue
4.Priority queue
1.in-place algorithm
132.Which of the following is the preferred way to recover a database after a transaction in progress
terminates abnormally?
1.Rollback
2.Rollforward
4.Reprocess transactions
3.When overlays are used, the size of a process is not limited to the size of the physical memory
4.Overlays are used whenever the physical address space is smaller than the logical address space
1.In push operation, if new nodes are inserted at the beginning of linked list, then in pop operation,
nodes must be removed from end.
2.In push operation, if new nodes are inserted at the end, then in pop operation, nodes must be
removed from the beginning.
1.In push operation, if new nodes are inserted at the beginning of linked list, then in pop operation,
nodes must be removed from end.
2.In push operation, if new nodes are inserted at the end, then in pop operation, nodes must be
removed from the beginning.
4.Both 1 and 2
1.we do not perform push operation if compiler fails to create a new node.
2.In push operation, if new nodes are inserted at the end, then in pop operation, nodes must be
removed from the beginning.
4.Both 1 and 2
4.none of above
1.:
2.)
3.;
4.None
2.In an inheritance, all data and function members of base class are derived by derived class
3.We can specify which data and function members of base class will be inherited by derived class
4.We can add new functions to derived class without recompiling the base class
1.External level
2.Conceptual level
3.Internal level
4.Logical level
142.Which of the following logical operations is represented by the + sign in Boolean algebra?
1.inversion
2.AND
3.OR
4.NOT
143.Which of the following operations is performed more efficiently by doubly linked list than by
singly linked list?
1.->
2.=
3.()
4.*
145.Which of the following operator functions cannot be global, i.e., must be a member function.
1.new
2.delete
3.Converstion Operator
4.None
1.+
2.*
3./
4.%
147.Which of the following operators should be preferred to overload as a global function rather than
a member method?
1.Postfix ++
2.Comparison Operator
4.Prefix++
2.All except 2
3.All except 1
150.Which of the following relationships represents the dual of the Boolean property: x + x'y = x + y
Choose the best.
2.x(x' + y) = xy
3.x(1 + x') + y = xy
4.x'(xy') = x'y'
151.Which of the following represents number of output lines for decoder with 4 input lines?
1.15
2.16
3.17
4.18
2.struct
3.void
4.None
1.Physical Schema
2.Sub-Schema
3.None of these
4.Logical Schema
154.Which of the following searching techniques do not require the data to be in sorted form
1.Binary Search
2.Interpolation Search
3.Linear Search
4.Exhaustive Search
2.DESTRUCTOR HAS THE SAME NAME AS THAT OF THE CLASS WITH A TILDE SYMBOL AT THE
BEGINNING.
3.BOTH A AND B.
4.DESTRUCTOR HAS THE SAME NAME AS THE FIRST MEMBER FUNCTION OF THE CLASS.
2.data elements in linked list need not be stored in adjacent space in memory
4.linked lists are collection of the nodes that contain information part and next pointer
2.stack can be implemented in either static allocation and nor dynamic allocation
3.stack can be implemented only in static allocation and not in dynamic allocation
4.stack can be implemented in dynamic allocation
158.Which of the following statements about linked list data structure is/are TRUE?
1.Addition and deletion of an item to/ from the linked list require modification of the existing
pointers
2.The linked list pointers do not provide an efficient way to search an item in the linked list
4.The linked list data structure provides an efficient way to find kth element in the list
3. IT CAN BE VIRTUAL
5. IT BEARS SAME NAME AS THAT OF THE CLASS AND PRECEDES LAMBDA SIGN.
1.Only 2, 3, 5
2.Only 2, 3, 4
3.Only 2, 4, 5
4.Only 3,4,5
4.An exclusive lock on data item X is granted even if a shared lock is already held on X
1.Disk recovery
2.Dish shadowing
3.Shadow paging
4.Crash recovery
2.When data is transferred asynchronously (data not necessarily received at same rate as sent)
between two processes
3.Load Balancing
1.PUSH
2.POP
3.Recursion
4.Array
1.physical address
2.absolute address
3.logical address
4.none of the mentioned
1.struct foo
2.int foo
3.foo var
4.foo
1.Add new
2.Insert new
3.Add record
4.Insert into
1.Dot
2.Comma
3.Dollar
4.None
While overloading binary operators using member function, it requires ___ argument/s.
1.Zero
2.One
3.Two
4.Three
173.Who is responsible for keeping database in consistent state despite system failure?
1.End User
2.Content Developer
3.Transaction Manager
4.Storage Manager
4.Demultiplexer
176.Why is the Gray code more practical to use when coding the position of a rotating shaft?
1.1
2.0
3.error
1.modularity
2.locality
3.globalization
4.random access
181.Write the output of the following #include <iostream.h>int main(){ const int x; x = 10;
printf("%d", x); return 0;}
1.0
2.10
4.Runtime Error
class Test
{
int x;
};
int main()
{
Test t;
cout << t.x;
return 0;
}
1.0
4.1
class B {
private:
int b;
public:
B():b(0) { }
friend void A::show(A& x, B& y);
};
int main() {
A a;
B b;
a.show(a,b);
return 0;
}
1.Compiler Error
2.A::a=10 B::b=0
3.A::a=0 B::b=0
4.None
184.X+0=0+X =X is an example of
1.commutative property
2.inverse property
3.associative property
4.Identity element
185.…………defines the structure of a relation which consists of a fixed set of attribute-domain pairs.
1.Instance
2.Schema
3.Program
4.Super Key