PREVIOUS QUESTION PAPER OF HIGHER SECONDARY SCHOOL TEACHER (SENIOR), IN COMPUTER SCIENCE/COMPUTER APPLICATION IN THE KERALA HIGHER SECONDARY EDUCATION DEPARTMENT
1. The size of an ATM cell is ---------- bytes.
(a) 25 (b) 32 (c) 53 (d) 64
2. “Stored program concept is attributed to :
(a)Ken Thompson (b) Dennis Ritchie (c) Von Neumann (d) Edsger Dijkstra
3. In a UNIX system, the macro htons is used to :
(a) Convert a short number from host to network order
(b) Convert a long number from host to network order
(c) Convert a short number from network to host order
(d) Convert a long number from network to host order
4. The cache which is on the same chip as the processor is called :
(a) L1 (b) L2 (c)L3 (d)None of these
5. Which level of RAID uses mirroring to achieve redundancy?
(a) 0 (b)1 (c)2 (d)3
6. Which IEEE standard is refers to fast Ethernet?
(a) 802.1 (b) 802.3b (c) 802.3u (d) 802.12
7. The new generation Intel processor with the IA-64 architecture is called :
(a) Itanium (b) Pentium 4 (c) Athlon (d)Xeon
8. A MAC address is ---------bytes long:
(a)4 (b)6 (c)8 (d)12
9. RARP is used to convert:
(a) IP address to MAC address (b) MAC address to IP address
(c) IP address to port number (d) Port number to IP address
10. Which among the following is an NP-Complete problem?
(a)3SAT Problem (b) Traveling Salesman
(d) Graph 3-coloring (d) All of the above
11. The solution to the count-to-infinity problem in which a router never advertises the cost of a destination to its neighbour N, if N is the next hop to that destination, is called :
(a) Triggered update (b) Source tracing (c) Split-horizon (d) Path vector
12. A compiler which runs on one machine and produces target code for another is called a :
(a)Bootstrapping compiler (b) Just-in-time compiler
(c)Cross compiler (d) Optimizing compiler
13. Which among the following is an interior routing protocol ?
(A)OSPF (b)EGP (c)BGP (d)NNTP
14. The maximum length (in bytes) of an IP packet:
(a)255 (b)1023 (c)32767 (d)65535
15. Which among the following is not a type of HTTP request ?
(a)GET (b)HEAD (c)RELEASE (d)POST
16. Which among the following is not a real time operating system ?
(a)RT-Linux (b)VxWorks (c) Solaris (d)Lynx
17. What is returned by a fork() call to the child process ?
(a)0 (b)Process-id-pf parent (c)Process-id of child (d)-1
18. The degree of multiprogramming is controlled primarily by ?
(a)Short-term scheduler (b)Medium-term scheduler
(c)Long-term scheduler (d) Disk scheduler
19. Which of the following is a high-level synchronization concept ?
(a)Interrupt (b)Semaphore (c)Mutex (d)Monitor
20. Paging solves the problem of:
(a)Thrashing (b)Page faults (c)Internal fragmentation (d)External fragmentation
21. For some page –replacement algorithms, the page-fault rate may increase as the number of allocated frames increases. This is known as :
(a)Thrashing (b)Swapping (c)Belady’s anomaly (d)Fragmentation
22. The Unix incode contains-------pointers to data blocks and -----pointers to indirect blocks.
(a)10,3 (b)10,5 (c)12,3 (d)15,5
23. Which of the following disk scheduling algorithms may result instarvation?
(a)FCFS (b)Shortest-seek-time-first (c)SCAN (d)C-SCAN
24. An RPC uses------------to execute a routine on a remote system.
(a)FTP (b)TFTP (c)TCP (d)UDP
25. ‘Location transparency’ in distributed systems means that :
(a) Name of the file does not reveal any hint of its physical storage location
(b) Name of the file does not need to be changed when the storage location changes
(c) The storage location can be understood from the name of the file
(d) Name of the file will change if the storage location changes
26. The BSD version of UNIX was developed by :
(a)Bell Labs (b)MIT (c)University of Berkeley (d) Sun Microsystems
27. An example of a file system whose contents are not actually stored anywhere, but are computed on demand is :
(a)NTFS (b)NFS (c)proc (d)ext3
28. Which among the following is a type of top-down parsing ?
(a)Predictive parsing (b)Shift-reduce parsing
(c)Operator precedence parsing (d) LR parsing
29. If r and s are regular expressions denoting languages L(r) and L(s), then (r)|(s) is a regular expression denoting :
(a)L(r) U L(s) (b)L(r) L(s) (c){E} (d) L(rs)
30. What will the following program fragment output?
Integer i=new integer (5);
Integer j=new Integer (5);
If (i==j)System.out.println(“Equal”);
else System.out.println(“Not equal”);
(a)Equal
(b)Not Equal
(c) Equal
Not equal
(d) The program doesn’t compile= = can’t be used with references
31. A grammar with the property that no production right side has two adjacent non-terminals is called:
(a) Context-free grammar (b) Context sensitive grammar
(d) Operator Grammar (d) Regular grammar
32. Yacc is a :
(a) Lexical analyzer generator (b) Parser generator
(b)Macro preprocessor (d) Code optimizer
33. ----------uses an FAT for file allocation.
(a)OS/2 (b) Linux (c) Unix (d)Solaris
34. Which among the following is true of LL (1) grammar?
(a)ambiguous (b)not ambiguous (d)sometimes ambiguous (d)left-recursive
35. Apple Computer’s version of the high-performance serial bus used to connect devices to the personal computer is :
(a)Fire Wire (b) High-Performance Parallel Interface
(c) Parallel sysplex (d) iLINK
36. Which among the following is a set of ANSI parallel interfaces that allow personal computers to communicate with peripheral hardware?
(a) UPnP (b) SCSI (c) ISRC (d) ASPI
37. Which among the following is false?
(a)A relation scheme can be in Third Normal Form but not in Boyce-Codd Normal Form (BCNF)
(b)Every BCNF relation scheme is in Third Normal Form.
(c) BCNF provides freedom from insertion and deletion anomalies.
(d) If a relation scheme has partial dependencies, it is in Second Normal Form.
38. A foreign key imposes a specific kind of integrity to related tables. What is the name of this integrity?
(a) Schema (b) Referential (c) Expatriate (d) Data
39. Which among the following is a high-bandwidth interface between a computer and a hard disk or a tape device? The latest version of this interface supports RAID.
(a) Intelligent Peripheral interface (b) Small Computer System Interface
(c) RS-232C (d) Centronics parallel interface
40. The-------consists of individual user views of portions of the database.
(a)User-level Schema (b) Internal-level Schema
(c)External-level Schema (d) Conceptual –level schema
41. An attribute that is used as a linkage from records in one table to a record in another table is specified as the----------
(a)Pointer field(b)Foreign Key (c)Secondary Key (d)Primary Key
42. Data is stored on computer systems in files. The two basic file types are :
(a) Master and Database (b)Master and Transaction
(c) Transaction and DBMS (d)Master File and Accounts Receivable File
43. Which of the following statements in not true with respect to the characeristics of the Master and the Transaction files ?
(a)A transaction files contain records that hold the details of daily events affecting an attribute of the master file
(b)A master file should only contain data that are of a permanent or semi-permanent nature
(c) A transaction file is similar to a ledger in a manual accounting system
(d) Records in the transaction file are used to update some of the data in the master file.
44. Which of the following cannot be blank (Null) ?
(a) Foreign Key (b)Secondary Key (c)Primary Key (d)Connecting Key
45. Every DBMS provides for the three basic functions of creating, modifying and querying the database. Sets of commands (languages) exist to perform each of the three functions. Select the option that matches the order of the languages to the order of the functions: querying, creating and modifying the database.
(a)DQL,DDL,DML (b)DML, DDL,DQL
(c) DDL,DQL,DML (d)DML,DQL,DML
46. Third normal form is a tem used to describe :
(a)a database that is well structured
(b)a model that has been through three revisions.
(c) a table that has three columns
(d)a package containing the three levels of schema
47. A plug-and –play interface that allows you to add a new device such as a scanner or printer to your computer without having to add an adapter card or even having turn the computer off is :
(a) Audio/Modem Riser (b)Universal Serial Bus
(c) PCMCIA Card (d)Virtual deice driver
48. The microchip that controls a computer’s interface to its attached serial devices is :
(a)Virtual Device driver
(b)Universal Asynchronous Receiver/Transmitter
(c)Serial presence detect
(d)Bus master
49. Anomalies can occur in a poorly designed database. One type of anomaly occurs when the removal of a record in the customer table inadvertently removes information about sales. What is the name of this anomaly ?
(a)Erase anomaly (b)Delete anomaly
(c)Update anomaly (d)Insert anomaly
50. “Get me the date attribute of the third tuple in the sales order relation”. What is being requested ?
(a)The person wants the value in the date field of the third table that is related to sales order
(b)The person wants the value in the date field in the third row of the sales order item table.
(c)The person wants the value in the date field of the third record inthe sales order table.
(d)The person wants the value in the date field of the third sales order that is related to the sales order item table.
51. The file-oriented approach to data storage creates a set of files for each application program. The database approach combines all of the files in a database and lets the application programs get the data that they needs through a DBMS. Which of the following statements is correct?
(a) The database approach separates the logical view of data from the physical view
(b) The database approach reduces the amount of redundancy in an organization
(c) The database approach views data as an organizational resource that should be managed by the organization rather than by individual departments.
(d) All of the above are correct
52. When is the TTL field in an IP packet decremented?
(a) Each time the packet is forwarded
(b) Once every second
(c) When a packet reached destination
(d) When a packet is discarded.
53. Which protocol is used to carry error messages from the metwork to an IP source ?
(a)FTP (b)TFTP (c)ICMP (d)UDP
54. In which cache mapping method is it possible to load each main memory block to any line of the cache ?
(a)Direct Mapping (b) Associative mapping
(c)Set-associative mapping (d)None of the above
55. The capacity of a double-sided dual- layer DVD-ROM is :
(a)660MB (b)4.7GB (c) 8.5GB (d)17 GB
56. Which among the following chips is aProgrammable Peripheral Interface ?
(a)82C55A (b)82C59A (c)82C53 (D)8257A
57. Which among the folowwing is a little-endian machine ?
(a)DEC Alpha (b)IBM System 370 (c)Sun SPARC (d)Motorola 680x0
58. Hexadecimal equivalent of the decimal number 204.125 is :
(a)BD.201 (b)CC.201 (d)CC.1A (d)CC.2
59. Decimal equivalent of the binary number 11100.101 is :
(a)28.575 (b)28.625 (c)28.75 (d)28.875
60. Which of the following is TRUE about the switch statement in Java ?
(a) A default sends execution immediately to the end of the switch statement
(b) A break sends execution immediately to the end of the switch statement
(c) A case sends execution immediately to the end of the switch statement
(d) A break sends execution immediately to the end of the next case.
61. Among these Java expressions, which is of type String ?
(a) “0” (b)”ab”+”cd” (c)’0’ (d) (a) and (b)
62. Which among the following is false ?
(a) No LR(1) grammar can be ambiguous
(b) Every LL(1) grammar is an LR(1) grammar
(c) The regular expressions (a/b)* and (a*/b*)* are equivalent.
(d) Not all grammars can be converted to an equivalent operator grammar
63. The interface of a class refers to :
(a) the list of all of the fields and methods of the class
(b) the list of all of the public fields and public methods of the class
(c) the list of all of the private fields and public methods of the class
(d) the list of all of the private fields and private methods of the class
64. Consider the following Java code fragement.
Rectangle r1=new Rectangle();
R1.setColor(Color.blue);
Rectangle r2=r1;
R2.setColor(Color.red);
After the above code is executed, what are the colors of r1 and r2 (in this order) ?
(a)Color.blue, Color.red (b)Color.blue, Color.blue
(c)Color.blue, Color.red (d)Color.red, Color.blue
65. What is the type and value of the following Java expression?
-4+1/2+2*-3+5.0
(a) int -5 (b)double -4.5 (c)int -4 (d)double -5.0
66. Consider the two Java methods(within the same class):
Public int foo(int a, String s)
{ s=”Yellow”;a=a+2;return a;)}
Public void bar()
{ int a =3;
String s=”Blue”;
A=foo(a,s); System.out.println(“a=”+a+”s=”+s);}
What is printed?
(a) a=3 s=Blue
(b) a=5 s=Yellow
(c) a=3 s=Yellow
(d) a=5 s=Blue
67. Using De Morgan’s law, how would you rewrite the following:
Conditional statement? (i.e. rewrite the statement using && instead of || )
(c!=’n’ && z+2<=5)
(a) !(c!=’n’ || z+2<=5) (b) !(c= =’n’ || z+2>=5)
(c) !(c!=’n’ || z+2<5) (d) !(c==’n’ || z+2>5)
68. IEEE 802.11 standard is known as :
(a)CSMA/CA (b)CSMA/CD (c)Bluetooth (d)Token bus
69. Which of the following protocols is used to share the same IP address among different computers (as long as they are not simultaneously active)?
(a)NFS (b)DHCP (c)TFTP (d)SNMP
70. Ipc6 uses ----------bit addresses.
(a)32 (b)64 (c)128 (d)256
71. Consider the following Java class definition:
Public class Myclass{
private int value;
public void setValue(int i){/*code*/}
//Other methods…}
The method setValue assigns the value of i to the instances field value. What could you write for the implementation of setValue?
(a) value=I; (b)this.value=I; (c)value= = I; (d) (a) and (b)
72. Consider the following truth table for a logical operator “implies”:
P Q P implies Q
T T T
T F F
F T T
F F T
Which of the following java conditional expressions would reproduce the above truth table ?
(a) P || Q (b) (!P) &&(!Q) (c)(!P) || Q (d)P && (!Q)
73. Which among the following involves modifying your computer so that the microprocessor runs faster than the manufacturer-specified speed ?
(a) thrashing (b)debouncing (c)stepping (d)overclocking
74. Which was the first processor to be shipped with a 1 gigahertz clock speed ?
(a)Athlon (b)BeOS (c)Crusoe (d)Pentium
75. Which among the following involve the continuous and somewhat overlapped movement of instructions to the processor?
(a) flow control (b)cyclic redundancy checking
(c) inverse multiplexing (d) pipelining
76. The data path and physical interface between the processor and the L1 and L2 memory is called :
(a)Backlink (b)Backside bus (c)CardBus (d)Virtual memory
77. A group of microchips designed to work as a unit to perform one or more related functions is called :
(a)Biochip (b)Bus (c)Chipset (d)Diode
78. On a PC the keyboard and mouse are connected through ----------interface.
(a)QWERTY (b)Serial (c)TWAIN (d)Parallel
79. An interconnection system between a microprocessor and attached devices in which expansion slots are spaced closely for high speed operation is :
(a)Peripheral Component Interconnect (b)Input/Output Supervisor
(c) Jumper block (d)12C bus
80. A term for technologies in which human neural activity or states would effectively be an input peripheral for a computer is :
(a)Machine vision (b)Wearable computer
(c)Artificial intelligence (d)Brain-Machine interface
81. Which among the following is a boot loader ?
(a)LILO (b)MBR (c)FAT (d)POST
82. Which among the following is the fastest sorting method ?
(a)Heapsort (b)Insertion sort (c)Selection sort (d)Bubble Sort
83. Who developed the concept of semaphores ?
(a)Dekker (b)Tanenbaum (c)Kruskal (d)Dijkstra
84. Which among the following is not object oriented ?
(a)Java (b)Smalltalk (c)Delphi (d)LISP
85. Which among the following is used for file sharing among different platforms ?
(a)NTFS (b)FAT (c)ext3 (d)SAMBA
86. Which among the foillowing SQL commands is a projection operation ?
(a)INSERT (b)SELECT (c)DELETE (d)CREATE
87. Which among the following is a clipping algorithm ?
(a)Kruskal’s (b)Cohen-Sutherland (c)Dijkstra’s (d)Prim’s
88. Which is not a comparison based sort ?
(a)Radix Sort (b)Quick sort (c) Heap Sort (d)Merge Sort
89. The worst case time of Quick sort is ?
(a)O(n log n) (b)O(n2) (c)O(n2 log n) (d)O(n2)
90. The port number used by SMTP is :
(a)21 (b)23 (c)25 (d)80
91. Which among the following problems is undecidable ?
(a) Given a grammar G and a string w, to determine whether w is in L(G)
(b) Given a grammar G1 and G2, to determine whether L(G1)=L(G2)
(c) For an arbitrary grammar G, to determine whether L(G) is empty.
(d) All of the above.
92. Which algorithm is used to form a minimum spanning tree ?
(a)Prim’s algorithm (b)Strassen’s algorithm
(c)Dijkstra’s algorithm (d)Stirling’s formula
93. In linux, the daemon which runs user programs at periodic scheduled times is :
(a) named (b)Ipd (c)crond (d)gated
94. Which of the following is a screen, attached externally to a monitor, that plugs into a serial or Universal Serial Bus(USB) port or a bus card installed inside the computer ?
(a) digiboard (b)patch panel (c)Source-route transparent bridging
(d)touch screen
95. The designation for an electronics standard for connecting devices to your personal computer is :
(a) Universal Serial Bus (b)IEEE 1394
(c) Universal Plug and Play (d) Attachment unit interface
96. In a Java program, you read the following statement that compiles and executes:
Cookie cookie=new Cookie(“chocolate chips”);
What can you conclude?
(a)Cookie is the name of the class
(b)Cookie is a primitive type variable
(c) The Cookie class must have a constructor that has one formal parameter of type String
(d) (a) and (c)
97. You are programming a game of dice in Java. You need to generate a random integer that can be 1,2,3,4,5 or 6.
Which of the following expression would you select ?
(a)math.random( )*6 (b)((int)Math.random( ))*6+1
(c) (int)(Math.random( )*6) +1 (d) (int)(Math.random( )+6)
98. Which among the following is not an e-mail protocol ?
(a)POP3 (b)SMTP (c) IMAP (d)SNMP
99. In linux, what does runlevel 6 of init do ?
(a)reboot (b)single-user mode (c)multi-user mode (d)shutdown
100. Which among the following products is a proxy server?
(a)Squid (b)Apache (c)Pine (d)IIS
************************************************
SOLVED PAPER OF SYSTEM MANAGER/EDP MANAGER IN KERALA PUBLIC SERVICE COMMISSION
Category Number 161/2009 held in 03-04-2009
1. In a memory, the minimum time delay between the initiation of successive memory operations is:
cycle time
2. The first Operating System used in Microprocessor based system was:
CP/M
3. The Boolean expression A(B+C)+AB+AC is independent of the Boolean variable:
B
4. A byte addressable computer has memory capacity of 4096 KB and can perform 64 operations. An instruction involving 3 memory operands and one operator needs:
72 bits
5. Which addressing mode used in an instruction of the form ADD X, Y?
Absolute
6. The addressing mode used in the stack related instruction PUSH B is:
Register indirect
7. Parallel printers use:
Centronics interface
8. An assembler that runs on one machine, but generating code for another machine is called:
Cross assembler
9. A computer with a 32 bit wide data bus implements its memory using 8 K x 8 static RAM chips. The smallest memory that this computer can have is:
32 KB
10. To construct a binary Mod-N counter, the number of flip-flops needs is:
Log2N
11. The total number of possible ordered trees using 3 nodes A,B,C is :
12
12. The binary search algorithm is of order:
log n
13. The minimum number of edges in a connected cyclic graph on N vertices is :
N
14. The execution time of a recursive algorithm is given as:
T(n)=c+T(n-1), if n>1
=d, if n≤1
The order of the algorithm is :
n
15. Assuming 2 sorted lists of sizes ‘S1 ’ and ‘S2’, the worst case number of comparisons needed by the merge sort algorithm is :
S1+S2 -1
16. If an M x N matrix is stored in column major form, the index calculation required to access the (i, j)th entry is :
M .(j-1)+i
17. Four different algorithms L1, L2, L3 and L4 with orders of log(n), log{log(n)}, n log(n) and n/log(n) respectively have been proposed to solve a specified problem. Which of these is the best one?
L2
18. The principle of locality of reference is cited to justify the usage of :
Cache memory
19. On a particular system, using Quick sort, if it takes 100 msec to sort 1000 records, time taken to sort 100 records will be :
6.7msec
20. In traversing a tree using Breadth First Search, the data structure used is :
Queue
21. In a data base, the column of a table is referred to as the :
Attribute
22. The part of a program which accesses a shared resource and which should be executed indivisibly is called :
Critical section
23. In a database design, if every non-key attribute is functionally dependent on the primary key, then the relation will be in :
Third normal form
24. An attribute of one table matching the primary key of another table is known as :
Foreign Key
25. Given the functional dependencies X →Y; Y→Z; X →W and Z →AB, which of the following does not hold good ?
W → Z
26. SQL stands for --------------Query Language.
Structured
27. In SQL databases, the memory area used for internal processing is called?
Cursor
28. The number of relationships in which an entity can appear in an E-R diagram is called its:
Cardinality
29. The process of analyzing, archived data to obtain tactical and strategic information is often called?
Data mining
30. If a relation is in Boyce-Codd normal form, then it is also in?
3rd Normal form
31. RAID is a standard used in the design of?
Disk Memory
32. In an OS, the process of buffering data intended for a peripheral device, onto a disk area, for later bulk transfer is known as :
Spooling
33. Kernel in Operating System is :
A set of primitive functions upon which OS functions are built.
34. Which of the following scheduling policy is most suited for a time sharing OS?
Round Robin
35. For real time OS, which of the following is the most suitable scheduling scheme ?
Preemptive
36. In a paged memory, access times of primary and secondary memories are 10ns and 100ns respectively. If the average access time is 23.5 nsec, hit ratio is :
.85
37. The size of the virtual memory depends on the size of :
Address bus
38. Three processes A, B, C have peak time demands of 3, 4, 6 resource units respectively of a particular type. What is the minimum number of resources to be provided to ensure that deadlock never occurs?
11
39. A computer has 8 MB in main memory, 128 KB cache with block size of 4KB. If direct mapping scheme is used, how many different main memory blocks can map into a given physical cache block?
64
40. The technique that allows only one user to work with a file at a particular time is called :
Locking
41. The UNIX operating system was first installed in :
PDP/7
42. MS-DOS makes use of a hardware ROM containing device drivers called :
BIOS
43. In UNIX, which of the following system calls transform an executable binary file into a process?
Exec
44. Berkeley UNIX is popularly known as?
BSD Unix
45. In UNIX, ‘grep’ program is used for implementing :
Filters
46. TSR software refers to:
Terminate and Stay Resident
47. Unix and MS-DOS file system differ in the following feature:
Mounted file systems
48. In DOS, file allocation is carried out using?
FAT
49. In UNIX ‘link’ refers to :
New directory entry pointing to an existing file
50. For implementing recursion in a programming language, its compiler uses the following data structure extensively:
Stack
51. In a hypothetical language, assume that all arithmetic operators have equal precedence and associate to the left. The expression 6x3-2-1x2 evaluates to :
30
52. Which of the following instructions is redundant (can be implemented by other conventional ones) ?
Clear x
53. BNF is a meta language for :
Specifying a context free grammar
54. In JAVA language, what will be result of evaluating the expression 25 & 13?
9
55. In JAVA , after execution of the following statements, the values of x, m, and n will be :
int x, m, n;
m=10; n=15;
x=++m +n++;
x=26, m=11,n=16
56. What will be the output of the following JAVA code?
byte x=64, y;
y=(byte)(x<<2);
system.out.println(y);
0
57. Hot Java is a:
Web browser
58. Which of the following typecasts result in loss of information?
float to int
59. JAVA toolkit package containing classes that implement platform independent GUI is :
AWT
60. The JAVA language was originally called:
OAK
61. A program Graph has ‘start’ and ‘end’ nodes. The total number of paths from start to end is equivalent to the -----------set of test data required to test the software.
minimum
62. In a Program Graph, ‘X’ is an if-then-else node. If the number of paths from start node to X is ‘p’ number of paths from if part to end node is ‘q’ and from else part to end node is ’r’, the total number of possible paths through X is :
P(q+r)
63. The quality of a software which causes it to continue to operate despite application of invalid input is called:
Robustness
64. A program P calls 2 subprograms P1 and P2. If P1 can fail 50% of the times and P2, 40% of the times, P can fail -----------of the times.
70%
65. Consider a Program Graph (PG) with statements as nodes and control as edges. Which of the following is not true for any PG?
Always acyclic
66. In program design, if the number of conditions in a decision table is ‘n’, the maximum number of rules(columns) possible is :
2n
67. In Data Flow Diagrams(DFD), the procedure of expanding a process in the DFD into a set of equivalent smaller processes is called:
levelling
68. In programming languages, literal means:
String Constant
69. In Object Oriented Software Design, which of the following is not true?
An object can belong to 2 classes
70. Consider the program segment comprising of 3 statements:
y=x+y;
x=y-x
y=y-x where x and y are integers. Execution of these 3 statements do the following ?
Swap the contents of x and y
71. What will be the output of execution of the following statements in C?
for (i=3;i<15;i+=3)
{printf(“% d”, i);
++i;
}
3 7 11
72. In C, puts (arg V[0]; prints the :
File name of executable code file
73. Who is credited with the creation of WWW?
Tim Berners-Lee
74. Which of the following is not a web browser?
(a)Lynx (b)Mosaic (c)Netscape Navigator (d)HTML
HTML
75. MIME is associated with the following :
E mail
76. The mode of communication in which transmission can be bidirectional. But in only one direction at a time is called:
Half Duplex
77. Error detection at the data link layer is achieved using?
CRC codes
78. In Serial communication, start and stop bits are used for ?
Synchronization
79. In a transmitter, the unmodulated signal is known as?
Baseband signal
80. In a computer network, routing issues are handled in?
Network Layer
81. In a computer network, functions of dialog management and synchronization are taken care of in the :
Session’s layer
82. Which of the following topologies has the highest reliability?
(a)Star (b)Bus (c)Ring (d)Mesh
Mesh
83. In data communications, bauds signify ---------- rate?
Signaling
84. ADSL is abbreviation for :
Asymmetric Digital Subscriber Line
85. The topmost layer in the ISO model that needs to be implemented in an intermediate node is the -----------layer.
Network
86. VPN denotes a :
Virtual Private Network
87. Data rate of a ring network is 20Mbps and signal propagates at 200m/µsec. The number of bits that can be placed on the channel of length 200km is :
20000bits
88. The frequency range over which coaxial cables are typically used is :
106 to 108 Hz
89. In internet, the well known port 21 refers to the application?
FTP
90. The maximum data rate possible through a noise free 4 kHz binary channel is :
8000 bps
91. The transparency provided in a distributed system where users cannot tell how many copies of a resource exist is termed as :
Replication transparency
92. Which of the following configurations can be said to be tightly coupled?
(a)Multicomputers (b) Workstations on a LAN
(c)Hypercubes (d) Shared memory multiprocessors
Shared memory multiprocessors
93. In distributed systems, RPC stands for?
Remote Procedure Call
94. Assume there are 4 file servers each with a 0.95 chance of being up at any instant. Probability of at least one being available is :
1-(.05)4
95. Which of the following category of classification of multiple computer systems is not generally used in practice?
(a)MISD (b)SISD (c)MIMD (d)SIMD
MISD
96. In a distributed system, to ensure that concurrent transactions do not interfere with each other, the transactions must have the following specific property:
Serializability
97. Translation Lookaside Buffer(TLB) is also called :
Associative Memory
98. In Internet Standards Terminology, RFC refers to:
Request For Comments
99. Which of the following denotes a network management protocol in an internet?
(a)SNMP (b)SMTP (c)ICMP (d)TCP
100. IEEE 802.11 is an IEEE standard for?
Wireless LAN
No comments:
Post a Comment