Manipal Pyqs
Manipal Pyqs
intended solely for the use of students enrolled in courses affiliated with the university.
Distribution, reproduction, or sharing of these materials with any unauthorized individuals
or entities is strictly prohibited. Please treat these materials with the confidentiality they
deserve.
A) Process management
B) File management
C) Memory management
D) Network management
B) Round Robin
4. What is the main advantage of multilevel feedback queue scheduling over other scheduling
algorithms?
5. Which memory management scheme allows for the possibility of external fragmentation?
A) Paging
B) Segmentation
C) Virtual memory
D) Contiguous allocation
7. What is the purpose of the 'fork' system call in UNIXlike operating systems?
8. Which file system is widely used in UNIX and Linux operating systems?
A) NTFS
B) FAT32
C) Ext4
D) HFS+
Answer: C) Ext4
A) FIFO
B) Optimal
C) LRU
D) Clock
Answer: A) FIFO
11. Which synchronization primitive is used to protect critical sections of code in a multithreaded
environment?
A) Mutex
B) Semaphore
C) Barrier
D) Monitor
Answer: A) Mutex
12. What does the acronym 'DMA' stand for in the context of operating systems?
A) Ready
B) Running
C) Waiting
D) Completed
Answer: D) Completed
14. What is the primary purpose of the 'swapping' technique in memory management?
15. Which command is used to change the priority of a process in UNIXlike operating systems?
A) nice
B) ps
C) renice
D) kill
Answer: C) renice
16. What is the purpose of the 'spooling' technique in operating systems?
C) To prevent deadlock
A) Banker's algorithm
C) Dijkstra's algorithm
D) A algorithm
18. Which of the following is not a function of the shell in UNIXlike operating systems?
A) Process management
B) Input/output redirection
C) Memory management
D) Batch processing
B) Round Robin
D) Priority scheduling
Answer: C) It only loads the necessary pages into memory when required.
22. What does the term 'thrashing' refer to in the context of operating systems?
24. What is the main purpose of a page table in virtual memory systems?
B) It runs entirely in user space and does not require kernel privileges.
26. What is the primary purpose of the 'sync' command in UNIXlike operating systems?
28. In a paged memory management system, what is the size of the page table entry typically
dependent on?
29. Which of the following is not a state in the process state transition diagram?
A) Ready
B) Running
C) Sleeping
D) Blocked
Answer: C) Sleeping
30. What is the main purpose of the 'fork' and 'exec' combination of system calls in UNIXlike
operating systems?
33. Which of the following is not a common approach to handling deadlock in operating systems?
B) Prevention
C) Ignoring deadlocks
D) Avoidance
34. What is the main purpose of the 'inode' structure in UNIXlike file systems?
35. Which of the following statements about symmetric multiprocessing (SMP) systems is true?
A) Each processor is assigned a specific task to perform.
Answer: B) All processors share the same memory and I/O devices.
36. What is the primary purpose of the 'nice' command in UNIXlike operating systems?
37. Which of the following is not a type of file in UNIXlike operating systems?
A) Regular file
B) Directory file
D) Temporary file
38. What is the primary purpose of the 'truncate' system call in UNIXlike operating systems?
D) To rename a file
A) Superblock
B) Inode
C) Semaphore
D) Data block
Answer: C) Semaphore
40. What is the main purpose of the 'cron' utility in UNIXlike operating systems?
43. Which of the following is not a valid file permission in UNIXlike operating systems?
A) Read
B) Write
C) Execute
D) Share
Answer: D) Share
44. What is the primary purpose of the 'grep' command in UNIXlike operating systems?
B) It shares the same address space with other threads in the process.
Answer: B) It shares the same address space with other threads in the process.
46. What is the main purpose of the 'kill' command in UNIXlike operating systems?
A) To terminate a process
47. Which of the following is not a typical component of a process control block (PCB)?
A) Process state
B) Program counter
C) File permissions
D) CPU registers
50. What is the main purpose of the 'umask' command in UNIXlike operating systems?
52. What is the main purpose of the 'pwd' command in UNIXlike operating systems?
A) File naming
C) Process scheduling
D) File storage
54. What is the primary purpose of the 'nice' value in UNIXlike operating systems?
55. Which of the following is not a characteristic of a RealTime Operating System (RTOS)?
A) Predictability of behavior
D) Prioritybased scheduling
56. What is the primary purpose of the 'chmod' command in UNIXlike operating systems?
57. Which of the following is not a valid scheduling policy for realtime operating systems?
58. What is the primary purpose of the 'ldd' command in UNIXlike operating systems?
59. Which of the following is not a function of a file system buffer cache?
60. What is the main purpose of the 'fdisk' command in UNIXlike operating systems?
62. Which of the following is not a component of the process control block (PCB)?
A) Program counter
D) Process ID
63. What is the primary purpose of the 'pstree' command in UNIXlike operating systems?
A) Scalability
B) Fault tolerance
C) Centralized control
D) Transparency
65. What is the primary purpose of the 'mount' command in UNIXlike operating systems?
Answer: A) Semaphores are used to synchronize processes and avoid race conditions.
67. What is the main purpose of the 'nice' command in UNIXlike operating systems?
69. What is the main purpose of the 'mount' command in UNIXlike operating systems?
70. Which of the following is not a type of file in UNIXlike operating systems?
A) Regular file
C) Directory file
D) Archive file
Answer: D) Archive file
71. What is the main purpose of the 'sync' command in UNIXlike operating systems?
72. Which of the following is not a state in the process state transition diagram?
A) Waiting
B) Ready
C) Running
D) Blocked
Answer: A) Waiting
73. What is the primary purpose of the 'chown' command in UNIXlike operating systems?
A) Process management
B) File management
C) Network management
D) User management
75. What is the main purpose of the 'ps' command in UNIXlike operating systems?
76. Which of the following statements about a shell in UNIXlike operating systems is true?
77. What is the main purpose of the 'mkfs' command in UNIXlike operating systems?
78. Which of the following is not a characteristic of a RealTime Operating System (RTOS)?
B) Predictability of behavior
D) Prioritybased scheduling
79. What is the primary purpose of the 'kill' command in UNIXlike operating systems?
A) To terminate a process
82. What is the primary purpose of the 'chmod' command in UNIXlike operating systems?
83. Which of the following statements about segmentation in memory management is true?
84. What is the main purpose of the 'mkfifo' command in UNIXlike operating systems?
85. Which of the following is not a type of file in UNIXlike operating systems?
A) Regular file
B) Directory file
D) Temporary file
86. What is the primary purpose of the 'time' command in UNIXlike operating systems?
A) Process ID
B) Program counter
88. What is the main purpose of the 'fsck' command in UNIXlike operating systems?
A) Process management
B) File management
C) Network management
D) User management
90. What is the primary purpose of the 'dd' command in UNIXlike operating systems?
91. Which of the following statements about paging in memory management is true?
92. What is the main purpose of the 'rmdir' command in UNIXlike operating systems?
A) Scalability
B) Fault tolerance
C) Centralized control
D) Transparency
94. What is the primary purpose of the 'top' command in UNIXlike operating systems?
96. What is the main purpose of the 'renice' command in UNIXlike operating systems?
98. What is the main purpose of the 'umask' command in UNIXlike operating systems?
Answer: D) Process synchronization is achieved through the use of semaphores and mutexes.
100. What is the primary purpose of the 'find' command in UNIXlike operating systems?
A) 20 bytes
B) 24 bytes
C) 16 bytes
D) 32 bytes
Answer: A) 20 bytes
2. Which protocol is used to obtain the IP address of a host given its hostname?
A) ARP
B) DHCP
C) DNS
D) ICMP
Answer: C) DNS
A) Transport layer
B) Network layer
D) Session layer
B) UDP
C) FTP
D) SMTP
Answer: B) UDP
A) 0.0.0.0 to 255.255.255.255
B) 1.0.0.0 to 223.255.255.255
C) 1.0.0.0 to 255.255.255.255
D) 0.0.0.0 to 223.255.255.255
A) Collision detection
B) Common clock
C) Carrier sensing
D) Contention
A) 8 bits
B) 16 bits
C) 24 bits
D) 32 bits
Answer: C) 24 bits
9. Which error detection technique involves appending a redundant bit to the data?
A) Checksum
B) CRC
C) Hamming code
D) Parity bit
10. Which device operates at the Physical layer of the OSI model?
A) Switch
B) Router
C) Repeater
D) Bridge
Answer: C) Repeater
A) Establish a connection
B) Terminate a connection
C) Transmit data
D) Detect errors
A) Hierarchical addressing
B) Flat addressing
C) Broadcast addressing
D) Multicast addressing
A) Dijkstra's algorithm
B) BellmanFord algorithm
A) Connectionoriented
B) Unreliable
C) Low overhead
Answer: A) Connectionoriented
A) 1500 bytes
B) 1518 bytes
C) 1542 bytes
D) 1600 bytes
A) ARP
B) DNS
C) DHCP
D) ICMP
Answer: C) DHCP
19. What is the purpose of ARP (Address Resolution Protocol)?
21. Which field in the IPv4 header is used for packet fragmentation?
A) Fragment Offset
B) Identification
C) Time to Live
D) Flags
Answer: D) Flags
A) UDP
B) ICMP
C) TCP
D) ARP
Answer: C) TCP
23. In Ethernet, what is the purpose of the preamble and start frame delimiter?
A) 10.0.0.0 to 10.255.255.255
B) 172.16.0.0 to 172.31.255.255
C) 192.168.0.0 to 192.168.255.255
A) Mesh
B) Ring
C) Web
D) Star
Answer: C) Web
C) Translating IP addresses
28. Which protocol is used to obtain the MAC address of a device given its IP address?
A) ARP
B) DHCP
C) DNS
D) ICMP
Answer: A) ARP
A) Parity bit
B) Checksum
C) CRC
D) Hamming code
Answer: C) CRC
A) Classful addressing
B) Broadcast addressing
C) Multicast addressing
32. Which OSI layer is responsible for data encryption and decryption?
A) Transport layer
B) Network layer
D) Presentation layer
A) 24 bits
B) 32 bits
C) 48 bits
D) 64 bits
Answer: C) 48 bits
B) Framing
C) Logical addressing
B) To conserve IP addresses
C) To secure a network
A) ARP
B) DNS
C) DHCP
D) ICMP
Answer: C) DHCP
40. Which layer of the OSI model is responsible for endtoend communication between applications?
A) Transport layer
B) Network layer
C) Session layer
D) Presentation layer
43. Which of the following protocols is used for securely transmitting data over a network?
A) HTTP
B) FTP
C) SSH
D) SMTP
Answer: C) SSH
44. What is the purpose of the OSI (Open Systems Interconnection) model?
47. Which of the following protocols is used for sending email messages?
A) HTTP
B) SMTP
C) FTP
D) SNMP
Answer: B) SMTP
48. Which OSI layer is responsible for routing packets between different networks?
A) Network layer
D) Physical layer
50. Which of the following is not a type of network address translation (NAT)?
A) Static NAT
B) Dynamic NAT
D) Broadcast NAT
A) Unicast
B) Broadcast
C) Anycast
D) Multicast
Answer: C) Anycast
55. Which of the following protocols is used for securely accessing remote systems over a network?
A) FTP
B) Telnet
C) SSH
D) SNMP
Answer: C) SSH
56. Which OSI layer is responsible for ensuring that data is delivered errorfree and in the correct
order?
A) Transport layer
C) Network layer
D) Session layer
59. Which of the following protocols is used for dynamically routing packets between networks?
A) RIP
B) ARP
C) DNS
D) DHCP
Answer: A) RIP
C) Identifying IP addresses
61. Which of the following protocols operates at the data link layer of the OSI model?
A) TCP
B) IP
C) ARP
D) ICMP
Answer: C) ARP
A) Dedicated resources
C) Variable delay
D) Fixed bandwidth
Answer: C) Variable delay
63. Which of the following devices operates at the physical layer of the OSI model?
A) Router
B) Hub
C) Switch
D) Repeater
Answer: D) Repeater
A) FTP
B) Telnet
C) SSH
D) SNMP
Answer: C) SSH
67. In TCP/IP model, which layer is responsible for routing packets from source to destination?
A) Network layer
B) Transport layer
D) Physical layer
A) 128bit addresses
B) 64bit addresses
C) 32bit addresses
D) 16bit addresses
69. What does DHCP stand for in the context of computer networks?
70. Which of the following devices operates at the network layer of the OSI model?
A) Bridge
B) Switch
C) Router
D) Repeater
Answer: C) Router
71. What is the purpose of NAT (Network Address Translation) in computer networks?
A) HTTP
B) SMTP
C) FTP
D) SNMP
Answer: B) SMTP
C) Translating IP addresses
75. Which of the following protocols is used for file transfer over a network?
A) FTP
B) ICMP
C) UDP
D) DHCP
Answer: A) FTP
76. In TCP/IP model, which layer is responsible for error detection and correction?
A) Physical layer
C) Transport layer
D) Network layer
77. Which of the following is not a topological design for computer networks?
A) Star
B) Ring
C) Mesh
D) Bus
Answer: D) Bus
78. Which of the following devices operates at the transport layer of the OSI model?
A) Router
B) Switch
C) Bridge
D) Gateway
Answer: D) Gateway
79. Which of the following protocols is used for dynamic routing in computer networks?
A) RIP
B) ARP
C) DNS
D) SNMP
Answer: A) RIP
80. What is the purpose of VLAN (Virtual Local Area Network) in computer networks?
C) Translating IP addresses
A) Connectionoriented
C) Errorchecking mechanism
D) Connectionless
Answer: D) Connectionless
82. What does DNS stand for in the context of computer networks?
83. Which of the following devices operates at the application layer of the OSI model?
A) Router
B) Bridge
C) Switch
D) Proxy server
84. What is the purpose of ARP (Address Resolution Protocol) in computer networks?
86. Which of the following protocols is used for secure web browsing?
A) HTTP
B) HTTPS
C) FTP
D) Telnet
Answer: B) HTTPS
87. What is the role of ICMP (Internet Control Message Protocol) in computer networks?
88. In TCP/IP model, which layer is responsible for segmenting data into smaller packets?
A) Transport layer
B) Network layer
D) Physical layer
Answer: A) Transport layer
91. Which of the following protocols is used for remote terminal connection?
A) SSH
B) FTP
C) SMTP
D) SNMP
Answer: A) SSH
92. What does FTP stand for in the context of computer networks?
93. Which of the following devices operates at the session layer of the OSI model?
A) Bridge
B) Router
C) Gateway
A) Translating IP addresses
95. Which of the following protocols is used for remote file access?
A) SSH
B) FTP
C) SMTP
D) HTTP
Answer: B) FTP
A) Network layer
B) Transport layer
D) Physical layer
98. What does SMTP stand for in the context of computer networks?
99. Which of the following protocols is used for name resolution in computer networks?
A) FTP
B) DNS
C) SNMP
D) SMTP
Answer: B) DNS
a) Hierarchical
b) Network
c) Relational
d) ObjectOriented
Answer: d) ObjectOriented
4. Which normal form ensures that there are no partial dependencies in a relation?
d) To group rows that have the same values into summary rows
Answer: d) To group rows that have the same values into summary rows
6. Which type of join returns all rows from both tables, joining records where available?
a) Inner Join
b) Outer Join
c) Self Join
d) Cross Join
8. Which isolation level in database transactions provides the highest level of isolation?
a) Read Uncommitted
b) Read Committed
c) Repeatable Read
d) Serializable
Answer: d) Serializable
a) INSERT
b) UPDATE
c) MODIFY
d) ALTER
Answer: a) INSERT
a) MONEY
b) DECIMAL
c) NUMERIC
d) CHARACTER
Answer: d) CHARACTER
12. Which of the following is used to define the structure of the database, including tables,
columns, and constraints?
a) DML
b) DDL
c) DCL
d) TCL
Answer: b) DDL
14. Which SQL keyword is used to remove a table from the database?
a) DELETE
b) DROP
c) REMOVE
d) TRUNCATE
Answer: b) DROP
a) AVG
b) COUNT
c) SUM
d) MULTIPLY
Answer: d) MULTIPLY
18. Which SQL command is used to change the structure of an existing table?
a) MODIFY
b) CHANGE
c) ALTER
d) UPDATE
Answer: c) ALTER
21. In which normal form are all attributes dependent only on the primary key?
a) FETCH
b) SELECT
c) GET
d) LOAD
Answer: b) SELECT
23. Which type of join returns only the rows that have matching values in both tables?
a) Inner Join
b) Outer Join
c) Self Join
d) Cross Join
b) COPY TABLE
d) DUPLICATE TABLE
c) Views are stored as virtual tables based on the result of a SELECT query
d) Views cannot be updated
Answer: c) Views are stored as virtual tables based on the result of a SELECT query
a) UNIQUE
b) NULL
c) NOT
d) CHECK
Answer: c) NOT
28. Which SQL command is used to delete data from a database table?
a) REMOVE
b) DELETE
c) DROP
d) TRUNCATE
Answer: b) DELETE
a) INNER JOIN
b) OUTER JOIN
c) CROSS JOIN
d) SIDE JOIN
31. In database normalization, what is the process of removing redundant data called?
a) Denormalization
b) Normalization
c) Optimization
d) Decomposition
Answer: a) Denormalization
32. Which of the following SQL commands is used to add a new column to an existing table?
a) ADD COLUMN
b) ALTER COLUMN
c) MODIFY COLUMN
d) UPDATE COLUMN
a) <>
b) =
c) LIKE
d) BETWEEN
Answer: d) BETWEEN
database?
a) PUT
b) ALTER
c) MODIFY
d) UPDATE
Answer: d) UPDATE
37. Which of the following is not a valid SQL data manipulation command?
a) SELECT
b) INSERT
c) DELETE
d) CREATE
Answer: d) CREATE
a) AVG
b) MAX
c) MIN
d) COUNT()
Answer: d) COUNT()
b) A value of zero
b) REVOKE
c) REMOVE
d) UNGRANT
Answer: b) REVOKE
a) PRIMARY KEY
b) FOREIGN KEY
c) CONSTRAINT KEY
d) UNIQUE
a) ALLOW
b) GRANT
c) GIVE
d) ASSIGN
Answer: b) GRANT
45. What is the purpose of the EXISTS operator in SQL?
a) CREATE DATABASE
b) NEW DATABASE
c) ADD DATABASE
d) MAKE DATABASE
47. In SQL, which of the following is used to retrieve unique values from a column?
a) UNIQUE
b) DISTINCT
c) UNIQUEKEY
d) DISTINCTIVE
Answer: b) DISTINCT
a) CASCADE
b) SET NULL
c) NO ACTION
d) SET DEFAULT
Answer: c) NO ACTION
a) To perform calculations
a) ON
b) WHERE
c) USING
d) JOIN
Answer: d) JOIN
d) To group rows that have the same values into summary rows
Answer: d) To group rows that have the same values into summary rows
a) ADD
b) SUBTRACT
c) MULTIPLY
d) DIVIDE
Answer: a) ADD
55. Which of the following is not a valid SQL data definition command?
a) SELECT
b) CREATE
c) DROP
d) ALTER
Answer: a) SELECT
58. Which isolation level in database transactions provides the lowest level of isolation?
a) Read Uncommitted
b) Read Committed
c) Repeatable Read
d) Serializable
a) AVERAGE
b) MAXIMUM
c) MINIMUM
d) SUM
Answer: b) MAXIMUM
a) To return all rows from both tables, joining records where available
b) To return only the rows that have matching values in both tables
c) To return all rows from the left table, and the matched rows from the right table
d) To return all rows from the right table, and the matched rows from the left table
Answer: b) To return only the rows that have matching values in both tables
62. Which SQL command is used to remove a table from the database?
a) DELETE
b) DROP
c) REMOVE
d) TRUNCATE
Answer: b) DROP
a) !=
b) =
c) LIKE
d) BETWEEN
Answer: a) !=
a) FETCH
b) SELECT
c) GET
d) LOAD
Answer: b) SELECT
a) TEXT
b) INTEGER
c) DECIMAL
d) CHARACTER
Answer: d) CHARACTER
a) DENY
b) REVOKE
c) REMOVE
d) UNGRANT
Answer: b) REVOKE
70. Which of the following SQL commands is used to change the structure of an existing table?
a) MODIFY
b) CHANGE
c) ALTER
d) UPDATE
Answer: c) ALTER
71. What is the purpose of the SQL TRUNCATE statement?
72. Which SQL command is used to delete data from a database table?
a) REMOVE
b) DELETE
c) DROP
d) TRUNCATE
Answer: b) DELETE
a) To perform calculations
a) INSERT
b) UPDATE
c) MODIFY
d) ALTER
Answer: a) INSERT
76. Which of the following SQL commands is used to grant privileges to a user?
a) ALLOW
b) GRANT
c) GIVE
d) ASSIGN
Answer: b) GRANT
a) CREATE DATABASE
b) NEW DATABASE
c) ADD DATABASE
d) MAKE DATABASE
a) AVG
b) MAX
c) MIN
d) COUNT
Answer: d) COUNT
a) NEW TABLE
b) CREATE TABLE
c) MAKE TABLE
d) ADD TABLE
a) CASCADE
b) SET NULL
c) NO ACTION
d) SET DEFAULT
Answer: c) NO ACTION
a) PUT
b) ALTER
c) MODIFY
d) UPDATE
Answer: d) UPDATE
86. What is the purpose of the SQL LIKE operator?
a) !=
b) =
c) LIKE
d) BETWEEN
Answer: a) !=
a) DENY
b) REVOKE
c) REMOVE
d) UNGRANT
Answer: b) REVOKE
90. Which of the following SQL commands is used to change the structure of an existing table?
a) MODIFY
b) CHANGE
c) ALTER
d) UPDATE
Answer: c) ALTER
92. Which SQL command is used to delete data from a database table?
a) REMOVE
b) DELETE
c) DROP
d) TRUNCATE
Answer: b) DELETE
a) To perform calculations
a) INSERT
b) UPDATE
c) MODIFY
d) ALTER
Answer: a) INSERT
96. Which of the following SQL commands is used to grant privileges to a user?
a) ALLOW
b) GRANT
c) GIVE
d) ASSIGN
Answer: b) GRANT
a) CREATE DATABASE
b) NEW DATABASE
c) ADD DATABASE
d) MAKE DATABASE
a) AVG
b) MAX
c) MIN
d) COUNT
Answer: d) COUNT
Digital Logic
A) Byte
B) Bit
C) Nibble
D) Word
Answer: B) Bit
2. Which logic gate has output HIGH only when all inputs are LOW?
A) OR
B) NAND
C) XOR
D) AND
Answer: B) NAND
A) 1
B) 2
C) 3
D) 4
Answer: C) 3
A) 0
B) 1
C) 10
D) 11
Answer: D) 11
A) 2
B) 4
C) 8
D) 16
Answer: B) 4
A) AND
B) OR
C) NAND
D) XOR
Answer: D) XOR
8. How many twoinput multiplexers are needed to implement a function with 4 variables?
A) 1
B) 2
C) 3
D) 4
Answer: B) 2
A) Karnaugh Map
B) Key Map
C) Knuth Map
D) Kalmogorov Map
A) AB + A'B'
B) AB + A'B
C) AB' + A'B
D) AB' + A'B'
A) AND
B) OR
C) XOR
D) NAND
Answer: C) XOR
A) 10
B) 15
C) 17
D) 21
Answer: C) 17
13. How many rows and columns are in a 4variable Karnaugh map?
A) 2 rows, 4 columns
B) 4 rows, 4 columns
C) 8 rows, 8 columns
D) 16 rows, 16 columns
14. What is the output of an AND gate when one of its inputs is LOW and the other is HIGH?
A) LOW
B) HIGH
C) Indeterminate
D) Can't say
Answer: A) LOW
15. Which logic gate can be used to implement the Boolean expression (A AND B) OR (A AND C)?
A) OR
B) AND
C) XOR
D) NAND
Answer: B) AND
17. Which gate has the same truth table as an XOR gate?
A) NOR
B) NAND
C) AND
D) XNOR
Answer: D) XNOR
A) 73
B) 123
C) 133
D) 63
Answer: A) 73
19. How many input combinations are possible for an ninput multiplexer?
A) 2^n
B) n^2
C) 2n
D) n!
Answer: A) 2^n
A | B | Output
0|0|0
0|1|1
1|0|1
1|1|0
A) AND
B) OR
C) XOR
D) NAND
Answer: C) XOR
21. How many bits are required to represent 64 different values?
A) 4
B) 6
C) 8
D) 16
Answer: C) 8
B) Overflow condition
23. What is the simplified Boolean expression for the following Kmap?
0 |1 |1 |0
1 |0 |0 |1
A) A'B + AB'
B) A'B' + AB
C) A'B + AB'
D) A'B' + AB'
A) 101110
B) 110101
C) 111000
D) 100110
Answer: C) 111000
25. Which logic gate has the highest output voltage level?
A) AND
B) OR
C) NOT
D) XOR
Answer: C) NOT
A) 001110100111
B) 001110001110
C) 110010111
D) 111000010111
Answer: A) 001110100111
A) SR flipflop
B) D flipflop
C) JK flipflop
D) T flipflop
Answer: B) D flipflop
28. How many input combinations are possible for an 8to1 multiplexer?
A) 256
B) 128
C) 64
D) 32
Answer: A) 256
A) Johnson counter
B) Ripple counter
C) Ring counter
D) Both A and C
31. In a 3bit binary ripple counter, how many flipflops toggle with each clock pulse?
A) None
B) 1
C) 2
D) 3
Answer: B) 1
A) 57
B) 47
C) 37
D) 27
Answer: A) 57
A) NOR
B) NAND
C) XOR
D) XNOR
Answer: B) NAND
A) 6D
B) D6
C) 6B
D) B6
Answer: A) 6D
35. Which logic gate has the same output as the NOR gate?
A) AND
B) NAND
C) OR
D) XOR
Answer: B) NAND
36. In digital systems, what does the term 'Propagation Delay' refer to?
C) Time taken for the clock signal to propagate through the flipflops
Answer: A) Time taken for the output to change after an input change
A | B | Output
0|0|1
0|1|1
1|0|0
1|1|1
A) OR
B) AND
C) XOR
D) NAND
Answer: D) NAND
A) 123
B) 145
C) 123
D) 123
Answer: A) 123
A) AND
B) OR
C) XOR
D) NAND
Answer: C) XOR
A) Flipflop
B) Counter
C) Decoder
D) Register
Answer: C) Decoder
41. What is the output of an XOR gate if both inputs are HIGH?
A) HIGH
B) LOW
C) Indeterminate
D) Can't say
Answer: B) LOW
42. How many input combinations are possible for a 4bit binary number?
A) 8
B) 16
C) 32
D) 64
Answer: B) 16
A) Feedback
B) Memory
C) Clock
D) State
Answer: B) Memory
A) 4C
B) 4D
C) 3C
D) 3D
Answer: C) 3C
45. Which gate is equivalent to a series combination of AND and NOT gates?
A) OR
B) NAND
C) NOR
D) XOR
Answer: B) NAND
A) 4
B) 6
C) 8
D) 10
Answer: C) 8
A) 42
B) 54
C) 61
D) 65
Answer: A) 42
A) SR flipflop
B) D flipflop
C) JK flipflop
D) T flipflop
Answer: A) SR flipflop
A | B | Output
0|0|0
0|1|1
1|0|1
1|1|1
A) OR
B) AND
C) NAND
D) NOR
Answer: D) NOR
51. Which of the following is a characteristic of a combinational logic circuit?
A) Feedback
B) Memory
C) Clock
D) State
Answer: A) Feedback
A) 42
B) 38
C) 44
D) 40
Answer: A) 42
53. Which gate is represented by the following Boolean expression: (A'B) + (AB')?
A) NOR
B) NAND
C) XOR
D) XNOR
Answer: C) XOR
A) 2
B) 4
C) 6
D) 12
Answer: B) 4
A) 157
B) 167
C) 147
D) 137
Answer: B) 167
A) AND
B) OR
C) XOR
D) NAND
Answer: C) XOR
A) 110100
B) 111010
C) 101010
D) 101110
Answer: B) 111010
59. How many input combinations are possible for a 3input multiplexer?
A) 8
B) 4
C) 2
D) 6
Answer: A) 8
60. What is the result of subtracting the binary number 101 from 111?
A) 010
B) 001
C) 100
D) 011
Answer: C) 100
A) AND
B) NAND
C) NOR
D) XOR
Answer: C) NOR
62. What is the hexadecimal equivalent of the binary number 110101011?
A) DAB
B) DAD
C) DBB
D) DCB
Answer: A) DAB
A) OR
B) AND
C) XOR
D) NOR
Answer: C) XOR
A) 152
B) 256
C) 124
D) 254
Answer: C) 124
66. How many bits are required to represent 128 different values?
A) 6
B) 8
C) 10
D) 16
Answer: B) 8
A) AND
B) XOR
C) NAND
D) NOR
Answer: B) XOR
A) 50
B) 54
C) 62
D) 70
Answer: C) 62
A) NOR
B) NAND
C) XOR
D) XNOR
Answer: B) NAND
A) Johnson counter
B) Ripple counter
C) Ring counter
D) Both A and C
A) 110110
B) 1101110
C) 1110110
D) 1111010
Answer: D) 1111010
B) D flipflop
C) JK flipflop
D) T flipflop
Answer: A) SR flipflop
74. In a 3bit binary ripple counter, how many flipflops toggle with each clock pulse?
A) None
B) 1
C) 2
D) 3
Answer: B) 1
A) 73
B) 67
C) 63
D) 61
Answer: B) 67
```
A | B | Output
0|0|0
0|1|1
1|0|1
1|1|1
```
A) OR
B) AND
C) NAND
D) NOR
Answer: D) NOR
A) 4
B) 6
C) 8
D) 16
Answer: C) 8
A) 2D
B) 4D
C) 6D
D) 8D
Answer: C) 6D
79. Which gate is equivalent to a series combination of AND and NOT gates?
A) OR
B) NAND
C) NOR
D) XOR
Answer: B) NAND
80. How many input combinations are possible for a 5to1 multiplexer?
A) 8
B) 16
C) 32
D) 64
Answer: A) 8
81. What is the result of adding the binary numbers 1011 and 1110?
A) 11001
B) 11101
C) 10110
D) 11010
Answer: B) 11101
A) NOR
B) NAND
C) XOR
D) XNOR
Answer: A) NOR
83. In digital logic, what does a multiplexer do?
84. How many bits are required to represent 256 different values?
A) 6
B) 8
C) 10
D) 16
Answer: D) 16
A) 16
B) 18
C) 20
D) 22
Answer: C) 20
A) SR flipflop
B) D flipflop
C) JK flipflop
D) T flipflop
Answer: B) D flipflop
A) 0011110
B) 00111110
C) 11110
D) 111110
Answer: B) 00111110
```
A | B | Output
0|0|1
0|1|1
1|0|0
1|1|1
```
A) OR
B) AND
C) NAND
D) NOR
Answer: C) NAND
A) 76
B) 76
C) 76
D) 76
Answer: A) 76
A) AND
B) NAND
C) NOR
D) XOR
Answer: C) NOR
92. How many bits are required to represent 512 different values?
A) 6
B) 8
C) 10
D) 16
Answer: C) 10
A) 24
B) 27
C) 30
D) 33
Answer: B) 27
A) SR flipflop
B) D flipflop
C) JK flipflop
D) T flipflop
Answer: A) SR flipflop
A) 1011011
B) 1101101
C) 10110101
D) 11010101
Answer: D) 11010101
96. Which logic gate has the following truth table:
```
A | B | Output
0|0|0
0|1|1
1|0|1
1|1|1
```
A) OR
B) AND
C) NAND
D) NOR
Answer: D) NOR
A) 53
B) 53
C) 53
D) 53
Answer: A) 53
98. Which gate is equivalent to a series combination of AND and NOT gates?
A) OR
B) NAND
C) NOR
D) XOR
Answer: B) NAND
A) 4
B) 6
C) 8
D) 32
Answer: C) 8
COA
2. In a pipelined processor, which stage is responsible for fetching the next instruction?
A) Decode
B) Execute
C) Fetch
D) Memory
Answer: C) Fetch
4. Which addressing mode allows the programmer to directly specify the address of the operand in
the instruction?
A) Register indirect
B) Immediate
C) Absolute
D) Indexed
Answer: B) Immediate
A) Data hazard
B) Structural hazard
C) Branch hazard
D) Load hazard
A) JUMP
B) CALL
C) BRANCH
D) JMP
Answer: C) BRANCH
8. What is the purpose of the ALU in a CPU?
D) Decode instructions
A) Directmapped
B) Fully associative
C) Setassociative
D) Segmented mapping
12. What is the purpose of the Memory Management Unit (MMU) in a computer system?
A) Opcode
B) Address
C) Control signals
D) Operand
Answer: B) Address
14. Which cache mapping technique uses a comparison process to determine cache entry
placement?
A) Directmapped
B) Fully associative
C) Setassociative
D) Associativemapped
Answer: C) Setassociative
16. Which of the following is NOT a typical component of a computer system's I/O interface?
A) Interrupt controller
D) Input/Output ports
17. What is the primary function of the Arithmetic Logic Unit (ALU) in a CPU?
18. Which instruction format dedicates one or more bits to specify the addressing mode?
A) Register indirect
B) Immediate
C) Absolute
D) Indexed
Answer: D) Indexed
19. Which of the following cache replacement policies removes the block that has been unused for
the longest time?
D) Random Replacement
A) Compulsory miss
B) Capacity miss
C) Conflict miss
D) Consistency miss
21. What is the primary purpose of the branch prediction unit in a processor?
23. What is the primary purpose of the memory hierarchy in a computer system?
24. Which of the following cache organization schemes divides the cache into multiple sets?
A) Directmapped
B) Fully associative
C) Setassociative
D) Multilevel
Answer: C) Setassociative
26. What is the primary purpose of the clock signal in a computer system?
27. Which addressing mode allows the programmer to specify the operand indirectly using a
register?
A) Register indirect
B) Immediate
C) Absolute
D) Indexed
28. Which of the following cache write policies updates both the cache and the main memory on
every write operation?
A) Writethrough
B) Writeback
C) Writeallocate
D) Nowrite allocate
Answer: A) Writethrough
A) Data hazard
B) Structural hazard
C) Control hazard
D) Input/output hazard
A) Snooping
B) MESI
C) MOESI
D) MSI
Answer: A) Snooping
32. Which of the following cache replacement policies replaces the block that has been used the
least number of times?
D) Random Replacement
33. Which of the following is NOT a function of the memory management unit (MMU) in a
computer system?
B) Cache management
C) Memory protection
D) Address translation
34. Which cache mapping technique provides the fastest access time?
A) Directmapped
B) Fully associative
C) Setassociative
D) Associativemapped
35. What is the primary function of the branch target buffer (BTB) in a processor?
36. Which of the following cache write policies updates the cache on write operations but not the
main memory?
A) Writethrough
B) Writeback
C) Writeallocate
D) Nowrite allocate
Answer: B) Writeback
C) Expensive to implement
A) Compulsory miss
B) Capacity miss
C) Conflict miss
D) Consistency miss
39. Which cache organization scheme maps a block of main memory to a unique location in the
cache?
A) Directmapped
B) Fully associative
C) Setassociative
D) Multilevel
Answer: A) Directmapped
A) Opcode
B) Address
C) Control signals
D) Operand
Answer: B) Address
41. Which cache replacement policy removes the block that has been least recently accessed?
D) Random Replacement
42. Which of the following cache coherence protocols uses a broadcastbased approach?
A) Snooping
B) MESI
C) MOESI
D) MSI
Answer: A) Snooping
43. What is the primary function of the Translation Lookaside Buffer (TLB) in a computer system?
A) Writethrough
B) Writeback
C) Writeallocate
D) Nowrite allocate
Answer: A) Writethrough
45. Which cache organization scheme allows any block of main memory to be stored in any cache
location?
A) Directmapped
B) Fully associative
C) Setassociative
D) Multilevel
49. Which of the following cache coherence protocols maintains a directory of which processors
have copies of each memory block?
A) Snooping
B) MESI
C) MOESI
D) MSI
Answer: C) MOESI
50. Which cache organization scheme divides the cache into multiple sets, with each set containing
multiple cache lines?
A) Directmapped
B) Fully associative
C) Setassociative
D) Multilevel
Answer: C) Setassociative
51. Which of the following cache write policies updates the cache on write operations but not the
main memory?
A) Writethrough
B) Writeback
C) Writeallocate
D) Nowrite allocate
Answer: B) Writeback
52. Which cache organization scheme maps a block of main memory to a unique location in the
cache?
A) Directmapped
B) Fully associative
C) Setassociative
D) Multilevel
Answer: A) Directmapped
A) Opcode
B) Address
C) Control signals
D) Operand
Answer: B) Address
54. Which cache replacement policy removes the block that has been least recently accessed?
55. Which of the following cache coherence protocols uses a broadcastbased approach?
A) Snooping
B) MESI
C) MOESI
D) MSI
Answer: A) Snooping
56. What is the primary function of the Translation Lookaside Buffer (TLB) in a computer system?
57. Which of the following cache write policies requires updating both the cache and the main
memory on every write operation?
A) Writethrough
B) Writeback
C) Writeallocate
D) Nowrite allocate
Answer: A) Writethrough
58. Which cache organization scheme allows any block of main memory to be stored in any cache
location?
A) Directmapped
B) Fully associative
C) Setassociative
D) Multilevel
A) Snooping
B) MESI
C) MOESI
D) MSI
Answer: C) MOESI
63. Which cache organization scheme divides the cache into multiple sets, with each set containing
multiple cache lines?
A) Directmapped
B) Fully associative
C) Setassociative
D) Multilevel
Answer: C) Setassociative
64. Which cache replacement policy replaces the block that has been unused for the longest time?
D) Random Replacement
65. What is the primary function of the Translation Lookaside Buffer (TLB) in a computer system?
66. Which cache write policy updates both the cache and the main memory on every write
operation?
A) Writethrough
B) Writeback
C) Writeallocate
D) Nowrite allocate
Answer: A) Writethrough
67. Which cache organization scheme maps a block of main memory to a unique location in the
cache?
A) Directmapped
B) Fully associative
C) Setassociative
D) Multilevel
Answer: A) Directmapped
A) Opcode
B) Address
C) Control signals
D) Operand
Answer: B) Address
69. Which cache replacement policy removes the block that has been least recently accessed?
D) Random Replacement
A) Snooping
B) MESI
C) MOESI
D) MSI
Answer: A) Snooping
71. What is the primary function of the Translation Lookaside Buffer (TLB) in a computer system?
72. Which cache write policy updates the cache on write operations but not the main memory?
A) Writethrough
B) Writeback
C) Writeallocate
D) Nowrite allocate
Answer: B) Writeback
73. Which cache organization scheme allows any block of main memory to be stored in any cache
location?
A) Directmapped
B) Fully associative
C) Setassociative
D) Multilevel
77. Which cache coherence protocol maintains a directory of which processors have copies of each
memory block?
A) Snooping
B) MESI
C) MOESI
D) MSI
Answer: C) MOESI
78. Which cache organization scheme divides the cache into multiple sets, with each set containing
multiple cache lines?
A) Directmapped
B) Fully associative
C) Setassociative
D) Multilevel
Answer: C) Setassociative
79. Which cache replacement policy replaces the block that has been unused for the longest time?
D) Random Replacement
81. Which cache write policy updates both the cache and the main memory on every write
operation?
A) Writethrough
B) Writeback
C) Writeallocate
D) Nowrite allocate
Answer: A) Writethrough
82. Which cache organization scheme maps a block of main memory to a unique location in the
cache?
A) Directmapped
B) Fully associative
C) Setassociative
D) Multilevel
Answer: A) Directmapped
A) Opcode
B) Address
C) Control signals
D) Operand
Answer: B) Address
84. Which cache replacement policy removes the block that has been least recently accessed?
D) Random Replacement
A) Snooping
B) MESI
C) MOESI
D) MSI
Answer: A) Snooping
86. What is the primary function of the Translation Lookaside Buffer (TLB) in a computer system?
87. Which cache write policy updates the cache on write operations but not the main memory?
A) Writethrough
B) Writeback
C) Writeallocate
D) Nowrite allocate
Answer: B) Writeback
A) Snooping
B) MESI
C) MOESI
D) MSI
Answer: C) MOESI
92. Which cache organization scheme divides the cache into multiple sets, with each set containing
multiple cache lines?
A) Directmapped
B) Fully associative
C) Setassociative
D) Multilevel
Answer: C) Setassociative
93. Which cache replacement policy replaces the block that has been unused for the longest time?
D) Random Replacement
94. What is the primary function of the Translation Lookaside Buffer (TLB) in a computer system?
95. Which cache write policy updates both the cache and the main memory on every write
operation?
A) Writethrough
B) Writeback
C) Writeallocate
D) Nowrite allocate
Answer: A) Writethrough
96. Which cache organization scheme maps a block of main memory to a unique location in the
cache?
A) Directmapped
B) Fully associative
C) Setassociative
D) Multilevel
Answer: A) Directmapped
A) Opcode
B) Address
C) Control signals
D) Operand
Answer: B) Address
98. Which cache replacement policy removes the block that has been least recently accessed?
D) Random Replacement
A) Snooping
B) MESI
C) MOESI
D) MSI
Answer: A) Snooping
100. What is the primary purpose of the branch target buffer (BTB) in a processor?