Professional Documents
Culture Documents
a. a byte b. a bit
a. Two b. Three
c. Seven d. Six
4. Which among the following is not part of the TCP header of a TCP/IP packet?
a. Bus b. Star
c. Ring d. Mesh
9. A sniffer is
10. A protocol used for secure sending of data over the internet is:
a. SMTP b. FTP
c. HTTPS d.TCP/IP
12. The _____ cipher recorders the plain text characters to create a cipher text?
a. Substitution b. Transposition
a. xy b. gcd(x,y)
14. ______ is the science and art of transforming message to make them secure and immure to
attack ?
a. Cryptography b. Cryptanalysis
c. O(N2) d. O(N)
18. The average time required to perform a successful sequential search for an element in aarray
with n elements:
a. n/2 b. (n+1)/2
c. (n-1)/2 d. 2n
19. How many nodes are there in full state space tree with n=6 ?
a. 65 b. 64
c. 63 d. 32
20. What do you call the selected keys in the quick sort method:
a. n2 b. n!
c. n(n+1)/2 d. 2n
22. Which of the following sorting methods will be the best if number of swappings done, is the
only measure of efficiency?
a. n b. n2
c. nlog(n) d. log(n)
26. In a depth-first traversel of a graph G with n vertices, k edges as marked as a tree edges. The
number of connected component in G is
a. k b. n-k-1
c. n-k d. k+1
27. A non-linear data structure from among the set given below is:
a. queue b. Stack
a. 25 b. 23
c. 15 d. 12
a. ! b. +
c. = d. ==
a. Cycle b. Duration
c. Iteration d. Test
32. Which of the following language paradigm allows the programmer to express algorithms
derived from a top-down design?
a. Logic b. Function
38. What characteristic of RAM memory makes it not suitable for permanent storage?
c. it is volatile d. unreliable
40. The OR, XOR and AND function can be performed by _____ of the computer in a CPU
a. CPU b. Register
c. ALU d. ALL
c. Clock d. None
42. Modem communicating using the V.32 bis standard operate at:
a. UNIVAC-I b. FLOW-MATIC
c. ENIAC d. INTEL
a. 10 bits b. 20 bits
c. 24 bits d. 36 bits
46. The interface chip used for data transmission between 8086 & 16-bit ADC is?
a. 8255 b. 8259
c. 8253 d. 8251
47. Which of the following interrupt is both level and edge sensitive ?
48. Which of the flag will be affected by the instruction INC AL, if AL=FFH?
53. A Collection of data that includes name , address, phone number etc. Of a person?
a. Field b. Record
c. Byte d. Character
a. 1NF b. 2NF
c. 3NF d. 4NF
a. || b. #
c. $ d. %
56. DML is used for
57. The memory which allocates space for DOS and application is called
59. Which of the following memory allocation scheme is subject to external fragmentation?
a. Segmentation b. Swapping
62. The technique of improving the priority of process waiting in queue for CPU allocation is
a. Starvation b. Ageing
c. Revocation d. Relocation
63. Memory bank experiencing too much contention from processor?
a. Fan-in b. Fan-out
c. Hot-spot d. Thrash
65. What do you call, “where the object hide their inner workings of their operations from the
outside world and from other objects ?
a. Polymorphism b. Generalization
c. Encapsulation d. Composition
a. Robustness b. Observability
c. Simplicity d. Operability
70. Let p be the risk probability. L be the loss, then Risk Exposure(RE) is computed as ?
a. RE=P+L b. RE=P/L
c. RE=2*P*L d. RE=P*L
a. (A+B).(B’+A’) b. A’B’+BA
c. AB+B’A’ d. (A+B’).(B’+A)
72. 8 4 2 1 is the :
73. A full adder circuit with x,y and z as input bits produces a output , the binary sum represented
by.
a. RTL b. CMOS
c. TTL d. IIL
c. Cells d. Speakers
a. 0111 b. 0101
c. 0100 d. 1011
77. What is universal gate?
a. AND b. NOR
c. XOR d. NOT
a.UFP*CAF b. UFP*FAC
c. UFP*Cost d. UFP*Productivity
80. When the inheritance is private, the private methods in base class are ______ in the derived
class (in C++).
a. inaccesible b. accesible
c. protected d. public