Comprehensive Exam Computer Science - 2017

Description

ThirdYear Third Year Quiz on Comprehensive Exam Computer Science - 2017, created by Faheem Ahmed on 09/03/2017.
Faheem Ahmed
Quiz by Faheem Ahmed, updated more than 1 year ago
Faheem Ahmed
Created by Faheem Ahmed over 7 years ago
736
3

Resource summary

Question 1

Question
Given a binary tree whose inorder and preorder traversal are given by Inorder : EICFBGDJHK Preorder : BCEIFDGHJK The post order traversal of the above binary tree is
Answer
  • IEFCGJKHDB
  • IEFCJGKHDB
  • IEFCGKJHDB
  • IEFCGJKDBH

Question 2

Question
An all-pairs shortest-paths problem is efficiently solved using
Answer
  • Dijkstra' algorithm
  • Bellman-Ford algorithm
  • Kruskal Algorithm
  • Floyd-Warshall algorithm

Question 3

Question
Consider the Breshenham’s circle generation algorithm for plotting a circle with centre (0,0) and radius ‘r’ units in first quadrant. If the current point is (x1,y1) and decision parameter is pi then what will be the next point (xi+1,yi+1) and updated decision parameter pi+1 for pi ≥ 0
Answer
  • xi+1 = xi + 1 yi+1 = yi pi+1 = pi + 4xi + 6
  • xi+1 = xi + 1 yi+1 = yi - 1 pi+1 = pi + 4(xi - yi) + 10
  • xi+1 = xi yi+1 = yi - 1 pi+1 = pi + 4(xi - yi) + 6
  • xi+1 = xi - 1 yi+1 = yi pi+1 = pi + 4xi + 10

Question 4

Question
A point P(5,1) is rotated by 900 about a pivot point (2,2). What is the coordinate of new transformed point P’ ?
Answer
  • (3,5)
  • (5,3)
  • (2,4)
  • (1,5)

Question 5

Question
Consider a triangle A(0, 0), B(1, 1), C(5, 2). The triangle has to be rotated by an angle of 450 about the point P(-1, -1). What shall be the coordinates of the new triangle?
Answer
  • A'=(1, √2-1), B'=(-1, 2√2-1), C'=(3√2-1, (9/2)√2-1)
  • A'=(1, √2-1), B'=(2√2-1, -1), C'=(3√2-1, (9/2)√2-1)
  • A'=(-1, √2-1), B'=(-1, 2√2-1), C'=(3√2-1, (9/2)√2-1)
  • A'=(√2-1, -1), B'=(-1, 2√2-1), C'=(3√2-1, (9/2)√2-1)

Question 6

Question
Let R be the rectangular window against which the lines are to be clipped using 2D Sutherland-Cohen line clipping algorithm. The rectangular window has lower left-hand corner at (-5,1) and upper right-hand corner at (3,7). Consider the following three lines for clipping with the given end point co-ordinates: Line AB: A(-6,2) and B(-1,8) Line CD: C(-1,5) and D(4,8) Line EF: E(-2,3) and F(1,2) Which of the following line(s) is/are candidate for clipping?
Answer
  • AB
  • CD
  • EF
  • AB and CD

Question 7

Question
The Boolean expression x' y' z + y z + x z is equivalent to
Answer
  • x
  • y
  • z
  • x+y+z

Question 8

Question
Match the following: (a) Huffman codes (i) O(n2) (b) Optimal polygon triangulation (ii) θ(n3) (c) Activity selection problem (iii) O(nlgn) (d) Quicksort (iv) θ(n) Codes: (a) (b) (c) (d)
Answer
  • (i) (ii) (iv) (iii)
  • (i) (iv) (ii) (iii)
  • (iii) (ii) (iv) (i)
  • (iii) (iv) (ii) (i)

Question 9

Question
Which of the following is asymptotically smaller?
Answer
  • lg(lg*n)
  • lg*(lg n)
  • lg(n!)
  • lg*(n!)

Question 10

Question
Suppose that we have numbers between 1 and 1000 in a binary search tree and want to search for the number 364. Which of the following sequences could not be the sequence of nodes examined?
Answer
  • 925, 221, 912, 245, 899, 259, 363, 364
  • 3, 400, 388, 220, 267, 383, 382, 279, 364
  • 926, 203, 912, 241, 913, 246, 364
  • 3, 253, 402, 399, 331, 345, 398, 364

Question 11

Question
Which of the following statement is correct?
Answer
  • Aggregation is a strong type of association between two classes with full ownership.
  • Aggregation is a strong type of association between two classes with partial ownership.
  • Aggregation is a weak type of association between two classes with partial ownership.
  • Aggregation is a weak type of association between two classes with full ownership.

Question 12

Question
When one object reference variable is assigned to another object reference variable then
Answer
  • a copy of the object is created.
  • a copy of the reference is created.
  • a copy of the reference is not created.
  • it is illegal to assign one object reference variable to another object reference variable.

Question 13

Question
Software safety is quality assurance activity that focuses on hazards that
Answer
  • affect the reliability of a software component
  • may cause an entire system to fail.
  • may result from user input errors.
  • prevent profitable marketing of the final product

Question 14

Question
Which of the following sets represent five stages defined by Capability Maturity Model (CMM) in increasing order of maturity?
Answer
  • Initial, Defined, Repeatable, Managed, Optimized.
  • Initial, Repeatable, Defined, Managed, Optimized.
  • Initial, Defined, Managed, Repeatable, Optimized.
  • Initial, Repeatable, Managed, Defined, Optimized.

Question 15

Question
Which design metric is used to measure the compactness of the program in terms of lines of code?
Answer
  • Consistency
  • Conciseness
  • Efficiency
  • Accuracy

Question 16

Question
What is resolution of 4k UHD
Answer
  • 480*720
  • 720*1020
  • 1024*768
  • 4096*2160

Question 17

Question
What are the two main types of access control lists (ACLs)? 1. Standard 2. IEEE 3. Extended 4. Specialized
Answer
  • 1 and 3
  • 2 and 4
  • 3 and 4
  • 1 and 2

Question 18

Question
What is the name of the views that allow to organize the position of the graphical components on the active screen in Android?
Answer
  • frames
  • containers
  • layouts
  • grids

Question 19

Question
Which of the following services use TCP? 1. DHCP 2. SMTP 3. HTTP 4. TFTP 5. FTP
Answer
  • 1 and 2
  • 2, 3 and 5
  • 1, 2 and 4
  • 1, 3 and 4

Question 20

Question
What is the default subnet mask for a class C network?
Answer
  • 127.0.0.1
  • 255.0.0.0
  • 255.255.0.0
  • 255.255.255.0
  • None of the above

Question 21

Question
Which of the following TCP/IP protocol is used for transferring electronic mail messages from one machine to another?
Answer
  • FTP
  • SNMP
  • SMTP
  • RPC
  • None of the above

Question 22

Question
What part of 192.168.10.51 is the Network ID, assuming a default subnet mask?
Answer
  • 192
  • 192.168
  • 192.168.10
  • 51

Question 23

Question
Which WAN encapsulations can be configured on an asynchronous serial connection? 1. PPP 2. ATM 3. HDLC 4. SDLC 5. Frame Relay
Answer
  • 1 and 2
  • 2 and 4
  • 3, 4 and 5
  • All of the above

Question 24

Question
Which layer 1 devices can be used to enlarge the area covered by a single LAN segment? 1. Switch 2. NIC 3. Hub 4. Repeater 5. RJ45 transceiver
Answer
  • 1 only
  • 1 and 3
  • 3 and 4
  • 5 only

Question 25

Question
Routers operate at layer _____. LAN switches operate at layer _____. Ethernet hubs operate at layer _____. Word processing operates at layer _____.
Answer
  • 3, 3, 1, 7
  • 3, 2, 1, none
  • 3, 2, 1, 7
  • 3, 3, 2, none

Question 26

Question
A Process Control Block(PCB) does not contain which of the following
Answer
  • Program Counter
  • Process State
  • I/O status information
  • bootstrap program

Question 27

Question
With round robin scheduling algorithm in a time shared system,
Answer
  • using very large time slices converts it into First come First served scheduling algorithm
  • using very small time slices converts it into First come First served scheduling algorithm
  • using extremely small time slices increases performance
  • using very small time slices converts it into Shortest Job First algorithm

Question 28

Question
The following three conditions must be satisfied to solve the critical section problem : (choose three)
Answer
  • Aging
  • Mutual Exclusion
  • Deadlock
  • Progress
  • Bounded Waiting

Question 29

Question
Each request requires that the system consider the __________, _____________, ____________ to decide whether the current request can be satisfied or must wait to avoid a future possible deadlock. (choose three)
Answer
  • resources currently available
  • processes that have previously been in the system
  • resources currently allocated to each process
  • future requests and releases of each process

Question 30

Question
The main memory accommodates : (choose two)
Answer
  • operating system
  • CPU
  • user processes
  • All of these

Question 31

Question
Linux uses a time-sharing algorithm
Answer
  • to pair preemptive scheduling between multiple processes
  • for tasks where absolute priorities are more important than fairness
  • both (a) and (b)
  • none of the mentioned

Question 32

Question
In CRC there is no error if the remainder at the receiver is _____.
Answer
  • equal to the remainder at the sender
  • zero
  • nonzero
  • the quotient at the sender

Question 33

Question
What is Pending Intent in android?
Answer
  • It is a kind of an intent
  • It is used to pass the data between activities
  • It will fire at a future point of time.
  • None of the Above

Question 34

Question
Which one of the following statements is NOT correct about HTTP cookies?
Answer
  • A cookie is a piece of code that has the potential to compromise the security of an internet user
  • A cookie gains entry to the user‟s work area through an HTTP header
  • A cookie has an expiry date and time
  • Cookies can be used to track the browsing pattern of a user at a particular site

Question 35

Question
The minimum number of JK flip-flops required to construct a synchronous counter with the count sequence (0,0, 1, 1, 2, 2, 3, 3, 0, 0,.......) is ___________.
Answer
  • 1
  • 2
  • 3
  • 4
  • 8

Question 36

Question
Consider six memory partitions of sizes 200 KB, 400 KB, 600 KB, 500 KB, 300 KB and 250 KB, where KB refers to kilobyte. These partitions need to be allotted to four processes of sizes 357 KB, 210KB, 468 KB and 491 KB in that order. If the best fit algorithm is used, which partitions are NOT allotted to any process?
Answer
  • 200KB and 300 KB
  • 200KB and 250 KB
  • 250KB and 300 KB
  • 300KB and 400 KB

Question 37

Question
How many address lines are needed to address each memory location in a 2048 x 4 memory chip?
Answer
  • 10
  • 11
  • 8
  • 16

Question 38

Question
Identify the correct order in which the following actions take place in an interaction between a web browser and a web server. 1. The web browser requests a webpage using HTTP. 2. The web browser establishes a TCP connection with the web server. 3. The web server sends the requested webpage using HTTP. 4. The web browser resolves the domain name using DNS.
Answer
  • 4,2,1,3
  • 1,2,3,4
  • 4,1,2,3
  • 2,4,1,3

Question 39

Question
Assume that there are 3 page frames which are initially empty. If the page reference string 1, 2, 3, 4, 2, 1, 5, 3, 2, 4, 6, the number of page faults using the optimal replacement policy is ___________
Answer
  • 5
  • 6
  • 7
  • 8

Question 40

Question
Mnemonic a memory trick is used in which of the following language?
Answer
  • Machine language
  • Assembly language
  • High level language
  • None of above

Question 41

Question
The smallest integer than can be represented by an 8-bit number in 2’s complement form is
Answer
  • - 256
  • - 127
  • - 128
  • 0

Question 42

Question
A process executes the code fork (); fork (); fork (); The total number of child processes created is -------------.
Answer
  • 5
  • 6
  • 7
  • 8
  • 4

Question 43

Question
Which of the following provides access to the uploaded file in the temporary directory on the web server?
Answer
  • $_FILES['file']['tmp_name']
  • $_FILES['file']['name']
  • $_FILES['file']['size']
  • $_FILES['file']['type']

Question 44

Question
An instruction cycle is made up of
Answer
  • One or more execute cycle
  • One or more fetch cycles
  • One opcode and one execute cycle
  • One fetch cycle and one or more execute cycle

Question 45

Question
Which of the following method can be used to create a MySql database using PHP?
Answer
  • mysql_connect()
  • mysql_query()
  • mysql_close()
  • None of the above

Question 46

Question
When determining the efficiency of algorithm, the space factor is measured by
Answer
  • Counting the maximum memory needed by the algorithm
  • Counting the minimum memory needed by the algorithm
  • Counting the average memory needed by the algorithm
  • Counting the maximum disk space needed by the algorithm

Question 47

Question
Which of the following is not a valid rule for XOR
Answer
  • 0 XOR 0 =0
  • 1 XOR 1 = 1
  • 1 XOR 0 = 1
  • B XOR B = 0

Question 48

Question
Linked lists are best suited
Answer
  • for relatively permanent collections of data
  • for the size of the structure and the data in the structure are constantly changing
  • for both of above situation
  • for none of above situation

Question 49

Question
In linear search algorithm the Worst case occurs when
Answer
  • The item is somewhere in the middle of the array
  • The item is not in the array at all
  • The item is the last element in the array
  • The item is the last element in the array or is not there at all

Question 50

Question
For an algorithm the complexity of the average case is
Answer
  • Much more complicated to analyze than that of worst case
  • Much more simpler to analyze than that of worst case
  • Sometimes more complicated and some other times simpler than that of worst case
  • None or above

Question 51

Question
Which of the following data structure is linear data structure?
Answer
  • Trees
  • Graphs
  • Arrays
  • None of above

Question 52

Question
The elements of an array are stored successively in memory cells because
Answer
  • by this way computer can keep track only the address of the first element and the addresses of other elements can be calculated
  • the architecture of computer memory does not allow arrays to store other than serially
  • both of above
  • none of above

Question 53

Question
Which of the following data structure is not linear data structure?
Answer
  • Arrays
  • Linked lists
  • Both of above
  • None of above

Question 54

Question
The Average case occur in linear search algorithm
Answer
  • When Item is somewhere in the middle of the array
  • When Item is not in the array at all
  • When Item is the last element in the array
  • When Item is the last element in the array or is not there at all

Question 55

Question
Which of the following case does not exist in complexity theory
Answer
  • Best case
  • Worst case
  • Average case
  • Null case

Question 56

Question
The operation of processing each element in the list is known as
Answer
  • Sorting
  • Merging
  • Inserting
  • Traversal

Question 57

Question
Arrays are best data structures
Answer
  • for relatively permanent collections of data
  • for the size of the structure and the data in the structure are constantly changing
  • for both of above situation
  • for none of above situation

Question 58

Question
A disk drive has 100 cyclinders, numbered 0 to 99. Disk requests come to the disk driver for cyclinders 12, 26, 24, 4, 42, 8 and 50 in that order. The driver is currently serving a request at cyclinder 24. A seek takes 6 msec per cyclinder move. How much seek time is needed for shortest seek time first (SSTF) algorithm ?
Answer
  • 0.984 sec
  • 0.396 sec
  • 0.738 sec
  • 0.42 sec

Question 59

Question
<SCRIPT> … </SCRIPT> tag can be placed within
Answer
  • head
  • body
  • both head and body
  • none of the above

Question 60

Question
Which of the following is NOT an example of a client-side operation in web page rendering?
Answer
  • A database lookup for a customer name.
  • A format check for a phone number field input.
  • The detection of which web browser is being used.
  • Writing a cookie.
  • An alert popup.

Question 61

Question
Which of the following is valid declaration for array? 1. char [] startsWith []; 2. int [] Score; 3. char [8] dist; 4. School students[]; 5. School students[5];
Answer
  • 1, 2, 4
  • 2, 4, 5
  • 2, 3, 4
  • All are correct.

Question 62

Question
In this Below which of the following statement is suitable to start the thread? class ABC implements Runnable { Public static void main(String args[]) { /**** Some Code is Missing Here *****/ } public void run() {} }
Answer
  • Thread t = new Thread(ABC);
  • Thread t = new Thread(ABC); t.start();
  • ABC run = new ABC(); Thread t = new Thread(run); t.start();
  • Thread t = new Thread(); t.run();

Question 63

Question
Which of the following sentences is FALSE:
Answer
  • In a magnetic disk, a sector is a group of clusters
  • In a magnetic disk, a cluster is a group of sectors
  • In a magnetic disk, the same magnetic head reads and writes the data
  • A magnetic disk is slower than a SSD

Question 64

Question
Select the INCORRECT sentence:
Answer
  • RAM contents are lost in the event of a power failure
  • RAM memory stores both programs and data
  • Cache memory is faster than standard RAM memory
  • RAM memory and ROM memory are interchangeable, as they can do the same functions
  • CMOS memory has a low power consumption

Question 65

Question
Which Of the following are true regarding Java.lang.ArrayList ?
Answer
  • Elements in the ArrayList is Ordered.
  • Collections are gaurentee to Immutable
  • Elements in Collections are unique.
  • Elements in the Collections are acessed using Unique value

Question 66

Question
public class A implements Runnable { public static void main(String args[]) { //Some Code is missig here } public void run() {} } From the below which of the following statement is suitable to replace that code missig Comment?
Answer
  • Thread x = new Thread(A);
  • Thread x = new Thread(A); x.start();
  • A run = new A(); Thread t = new Thread(run); x.start();
  • Thread x = new Thread(); x.run();

Question 67

Question
What will be the content of array variable table after executing the following code? for(int i = 0; i < 3; i + +) for(int j = 0; j < 3; j + +) if(j = i) table[i][j] =1; else table[i][j] = 0;
Answer
  • 0 0 0 0 0 0 0 0 0.
  • 1 0 0 1 1 0 1 1 1.
  • 1 0 0 0 1 0 0 0 1.
  • 0 0 1 0 1 0 1 0 0.

Question 68

Question
What is Expected Output Of the Following Program Class A{ public static void main(String args[]){ int i = l, j = 6; while (j--) { i++; } System.out.println("x = " + x +" y = " + y); } }
Answer
  • i = 6 j = 0
  • i = 7 j = 0
  • i = 6 j = -1
  • Compile Error

Question 69

Question
Match the following : (a) Disk scheduling 1. Round-robin (b) Batch processing 2. SCAN (c) Time sharing 3. LIFO (d) Interrupt processing 4. FIFO
Answer
  • (a) (b) (c) (d) 3 4 2 1
  • (a) (b) (c) (d) 4 3 2 1
  • (a) (b) (c) (d) 2 4 1 3
  • (a) (b) (c) (d) 1 4 3 2

Question 70

Question
consider the 3 processes, P1, P2 and P3 shown in the table Process Arrival time Time unit required P1 0 5 P2 1 7 P3 3 4 The completion order of the 3 processes under the policies FCFS and RRS (round robin scheduling with CPU quantum of 2 time units) are
Answer
  • FCFS: P1, P2, P3 RR2: P1, P2, P3
  • FCFS: P1, P3, P2 RR2: P1, P3, P2
  • FCFS: P1, P2, P3 RR2: P1, P3, P2
  • FCFS: P1, P3, P2 RR2: P1, P2, P3

Question 71

Question
Consider the virtual page reference string 1, 2, 3, 2, 4, 1, 3, 2, 4, 1 On a demand paged virtual memory system running on a computer system that main memory size of 3 pages frames which are initially empty. Let LRU, FIFO and OPTIMAL denote the number of page faults under the corresponding page replacements policy. Then
Answer
  • OPTIMAL < LRU < FIFO
  • OPTIMAL < FIFO < LRU
  • OPTIMAL = LRU
  • OPTIMAL = FIFO

Question 72

Question
In the architecture of a database system external level is the
Answer
  • physical level.
  • logical level.
  • conceptual level
  • view level.

Question 73

Question
The sum of products expansion for the function F(x, y, z) = (x + y)z’ is given as
Answer
  • x’y’z + xyz’ + x’yz’
  • xyz + xyz’ + xy’z’
  • xy’z’ + x’y’z’ + xyz’
  • xyz’ + xy’z’ + x’yz’

Question 74

Question
The property / properties of a database is / are :
Answer
  • It is an integrated collection of logically related records
  • It consolidates separate files into a common pool of data records.
  • Data stored in a database is independent of the application programs using it.
  • All of the above

Question 75

Question
Which one of the following statements is false?
Answer
  • The data dictionary is normally maintained by the database administrator.
  • Data elements in the database can be modified by changing the data dictionary.
  • The data dictionary contains the name and description of each data element.
  • The data dictionary is a tool used exclusively by the database administrator.

Question 76

Question
Transaction processing is associated with everything below except
Answer
  • producing detail, summary, or exception reports
  • recording a business activity.
  • confirming an action or triggering a response.
  • maintaining data.

Question 77

Question
SET concept is used in :
Answer
  • Network Model
  • Hierarchical Model
  • Relational Model
  • None of these

Question 78

Question
The file organization that provides very fast access to any arbitrary record of a file is
Answer
  • Ordered file
  • Unordered file
  • Hashed file
  • B-tree

Question 79

Question
Which of the following operation is used if we are interested in only certain columns of a table?
Answer
  • PROJECTION
  • SELECTION
  • UNION
  • JOIN

Question 80

Question
Using Relational Algebra the query that finds customers, who have a balance of over 1000 is
Answer
  • PCustomer_name(s balance >1000(Deposit))
  • s Customer_name(Pbalance >1000(Deposit))
  • PCustomer_name(s balance >1000(Borrow))
  • s Customer_name(Pbalance >1000(Borrow))

Question 81

Question
Consider the join of a relation R with relation S. If R has m tuples and S has n tuples,then the maximum size of join is:
Answer
  • mn
  • m+n
  • (m+n)/2
  • 2(m+n)

Question 82

Question
What is Manifest.xml in android?
Answer
  • It has information about layout in an application
  • It has the information about activities in an application
  • It has all the information about an application
  • None of the above

Question 83

Question
What is the life cycle of broadcast receivers in android?
Answer
  • send intent()
  • onRecieve()
  • implicitBroadcast()
  • sendBroadcast(), sendOrderBroadcast(), and sendStickyBroadcast().

Question 84

Question
Which of the following method is suitable when you need to send larger form submissions?
Answer
  • Get
  • Post
  • Both Get and Post
  • There is no direct way for larger form. You need to store them in a file and retrieve

Question 85

Question
Is it mandatory to call onCreate() and onStart() in android?
Answer
  • No, we can write the program without writing onCreate() and onStart()
  • Yes, we should call onCreate() and onStart() to write the program
  • At least we need to call onCreate() once
  • None of the above

Question 86

Question
The difference between include() and require() in PHP
Answer
  • are different how they handle failure
  • both are same in every aspects
  • is include() produced a Fatal Error while require results in a Warning
  • none of above

Question 87

Question
Which of the following is not true?
Answer
  • PHP can be used to develop web applications.
  • PHP makes a website dynamic.
  • PHP applications can not be compiled.
  • PHP can not be embedded into html.

Question 88

Question
Any type of modification on the parameter inside the function will reflect in actual variable value can be related to
Answer
  • call by value
  • call by reference
  • both of above
  • none of above

Question 89

Question
Which of the following is NOT a valid deadlock prevention scheme?
Answer
  • Release all resources before requesting a new resource
  • Number the resources uniquely and never request a lower numbered resource than the last one requested
  • Never request a resource after releasing any resource
  • Request and all required resources be allocated before execution.

Question 90

Question
UML meaning is
Answer
  • Unique modeling language
  • Unified modeling language
  • Unified modern language
  • Unified master language

Question 91

Question
In Python, What is the output when following code is executed ? str1="helloworld" str1[ : : -1]
Answer
  • dlrowolleh
  • hello
  • world
  • helloworld

Question 92

Question
In python, What will be the output? t=(1,2,4,3) t[1:3]
Answer
  • (1, 2)
  • (1, 2, 4)
  • (2, 4)
  • (2, 4, 3)

Question 93

Question
Which of the following is a Python tuple?
Answer
  • [1, 2, 3]
  • (1, 2, 3)
  • {1, 2, 3}
  • { }

Question 94

Question
Which of the following are unary operators in C? 1. ! 2. sizeof 3. ~ 4. &&
Answer
  • 1, 2
  • 1, 3
  • 2, 4
  • 1, 2, 3

Question 95

Question
Which bitwise operator is suitable for turning on a particular bit in a number?
Answer
  • && operator
  • & operator
  • || operator
  • | operator

Question 96

Question
What will be the output of the program? #include<stdio.h> int main() { printf("%d %d\n", 32<<1, 32<<0); printf("%d %d\n", 32<<-1, 32<<-0); printf("%d %d\n", 32>>1, 32>>0); printf("%d %d\n", 32>>-1, 32>>-0); return 0; }
Answer
  • Garbage values
  • 64 32 0 32 16 32 0 32
  • All zeros
  • 8 0 0 0 32 0 0 16

Question 97

Question
Which one is not a nickname of a version of Android ?
Answer
  • Cupcake
  • Gingerbread
  • Honeycomb
  • Muffin

Question 98

Question
In Unix/Linux, Which command is used to print a file
Answer
  • print
  • ptr
  • lpr
  • pg
  • None of the above

Question 99

Question
Which of the following commands is used to update access and modification times of a file?
Answer
  • grep
  • wc
  • touch
  • cat
  • None of the above

Question 100

Question
What is the minimum number of two-input NAND gates used to perform the function of two input OR gate ?
Answer
  • One
  • Two
  • Three
  • Four

Question 101

Question
The decimal equivalent of hex number 1A53 is
Answer
  • 6793
  • 6739
  • 6973
  • 6379

Question 102

Question
How many Flip-Flops are required for mod–16 counter?
Answer
  • 5
  • 6
  • 3
  • 4

Question 103

Question
The 2’s complement of the number 1101101 is
Answer
  • 0101110
  • 0111110
  • 0110010
  • 0010011

Question 104

Question
When simplified with Boolean Algebra (x + y)(x + z) simplifies to
Answer
  • x
  • x + x(y + z)
  • x(1 + yz)
  • x + yz

Question 105

Question
A 4-bit synchronous counter uses flip-flops with propagation delay times of 15 ns each. The maximum possible time required for change of state will be
Answer
  • 15 ns
  • 30 ns
  • 45 ns
  • 60 ns

Question 106

Question
1’s complement representation of decimal number of -17 by using 8 bit representation is
Answer
  • 1110 1110
  • 1101 1101
  • 1100 1100
  • 0001 0001

Question 107

Question
Which command is used to extract specific columns from the file?
Answer
  • cat
  • cut
  • grep
  • find
  • None of the above

Question 108

Question
Grant and revoke are ....... statements.
Answer
  • DDL
  • TCL
  • DCL
  • DML

Question 109

Question
How many lines the truth table for a four-input NOR gate would contain to cover all possible input combinations ?
Answer
  • 4
  • 8
  • 12
  • 16

Question 110

Question
Match the following A.Plasma paneL i) Polarizer B.DVST ii) Zinc sulfide C.LCD iii) Dielectric mesh D.Thin film electroluminescent iv) Neon gas
Answer
  • A-ii, B-iv, C-i, D-iii
  • A-ii, B-iii, C-iv, D-i
  • A-iv, B-iii, C-i, D-ii
  • A-i ,B-iv, C-ii, D-iii

Question 111

Question
What type of join is needed when you wish to include rows that do not have matching values?
Answer
  • Equi-join
  • Natural join
  • Outer join
  • All the above

Question 112

Question
If an object is rotated through an angle A in clockwise direction, the rotation matrix R= ...............
Answer
  • cos A sin A -sin A cos A
  • cos A -sin A sin A cos A
  • sin A cos A cos A sin A
  • None

Question 113

Question
Forming products of transformation matrices is often referred as
Answer
  • Concatenation
  • Composition
  • both a&b
  • None of above

Question 114

Question
In a risk-based approach the risks identified may be used to: i. Determine the test technique to be employed ii. Determine the extent of testing to be carried out iii. Prioritize testing in an attempt to find critical defects as early as possible. iv. Determine the cost of the project
Answer
  • ii is True; i, iii, iv and v are False
  • i,ii,iii are true and iv is false
  • ii and iii are True; i, iv are False
  • ii, iii and iv are True; i is false

Question 115

Question
Which of the following is not a part of the Test Implementation and Execution Phase?
Answer
  • Creating test suites from the test cases
  • Executing test cases either manually or by using test execution tools
  • Comparing actual results
  • Designing the Tests

Question 116

Question
What can static analysis NOT find?
Answer
  • The use of a variable before it has been defined.
  • Unreachable (“dead”) code.
  • Memory leaks.
  • Array bound violations.

Question 117

Question
Which plan describes how the skills and experience of the project team members will be developed ?
Answer
  • HR Plan
  • Manager Plan
  • Team Plan
  • Staff Development Plan

Question 118

Question
Alpha and Beta Testing are forms of _______ .
Answer
  • Acceptance testing
  • Integration testing
  • System Testing
  • Unit testing

Question 119

Question
Which is the most important feature of spiral model?
Answer
  • Quality management
  • Risk management
  • Performance management
  • Efficiency management

Question 120

Question
Key to represent relationship between tables is called
Answer
  • primary key
  • secondary key
  • foreign key
  • none of the above

Question 121

Question
Which method executes only once
Answer
  • start() method
  • init() method
  • stop() method
  • destroy() method

Question 122

Question
__________ generate interrupt signal to microprocessor and receive acknowledge
Answer
  • priority resolver
  • control logic
  • interrupt request register
  • interrupt register

Question 123

Question
In 8086 the overflow flag is set when _____________.
Answer
  • the sum is more than 16 bits.
  • signed numbers go out of their range after an arithmetic operation.
  • carry and sign flags are set.
  • subtraction

Question 124

Question
Address line for TRAP is?
Answer
  • 0023H
  • 0024H
  • 0033H
  • 0099H

Question 125

Question
The instruction, MOV AX, 1234H is an example of
Answer
  • register addressing mode
  • direct addressing mode
  • immediate addressing mode
  • based indexed addressing mode

Question 126

Question
In which order, Processor status word of 8085 microprocessor has five flags ?
Answer
  • S, Z, AC, P, CY
  • S, OV, AC, P, CY
  • S, Z, OV, P, CY
  • S, Z, AC, P, OV

Question 127

Question
In Java, Runnable is
Answer
  • Class
  • Method
  • Variable
  • Interface

Question 128

Question
Consider the following statements: In 8085 microprocessor, data-bus and address bus are multiplexed in order to I) Increase the speed of microprocessor. II) Reduce the number of pins. III) Connect more peripheral chips. Which of these statements is/are correct?
Answer
  • (I) only
  • (II) only
  • (II) & (III)
  • (I),(II) & (III)

Question 129

Question
colspan can be added to only what tag?
Answer
  • <table>
  • <tr>
  • <td>
  • All the above

Question 130

Question
Which class cannot be subclassed (or extended) in java?
Answer
  • abstract class
  • parent class
  • Final class
  • None of above

Question 131

Question
A technology called ____ makes it possible for one person's computer to directly access the contents of another person's hard disk.
Answer
  • P2P
  • URL
  • HTML
  • DTD

Question 132

Question
The main reason for using encryption on the Internet is:
Answer
  • To speed up the communication
  • To prevent people other than the recipients from reading the message
  • To guarantee that the message reached its intended target..
  • All of the above

Question 133

Question
The Internet allows strangers to group together to gain bulk price discounts normally available to large companies; this is defined as:
Answer
  • Customer-to-customer transaction
  • Business-to-business transaction
  • Price bidding
  • Buying cartel

Question 134

Question
How can you open a link in a new browser window?
Answer
  • <a href="url" new>
  • <a href="url" target="new">
  • <a href="url" target="_blank">
  • <a href="url" target="_new">

Question 135

Question
What method is used to specify a container's layout in JSP?
Answer
  • setLayout()
  • setContainerLayout()
  • ContainerLayout()
  • setConLayout().

Question 136

Question
What value does readLine() return when it has reached the end of a file in JSP?
Answer
  • Last character in the file
  • Null
  • True.
  • False

Question 137

Question
In JSP, a Canvas object provides access to a Graphics object via one of its method called:
Answer
  • getCanvas()
  • getGraphics()
  • paint()
  • accessGraphics()

Question 138

Question
The following web page is loaded into a web server: <html> <head><title>JavaScript question</title></head> <body> <script language="JavaScript"> book = new Array(1,2,3,4,5,6,7,8); document.write(book[1]); book[10]=10; document.write(book[10]); </script> </body> </html> Once the above web page is loaded what will its body contain?
Answer
  • 2 10
  • 1 10
  • 210
  • 110

Question 139

Question
Consider the following script: <html> <head><title>JavaScript</title></head> <body> <script language="JavaScript"> document.write((125/5)%12); </script> </body> </html> What would be the output of the above script?
Answer
  • 0
  • 1
  • 2.083
  • 25%12

Question 140

Question
Consider the following entries in a Cascading Style Sheet (CSS) file. P {colour: blue; background-colour: white; border-colour: red; border-left: solid} BODY {colour: black; border-colour: green} What is the colour of text in a paragraph of an HTML document that uses the above style sheet?
Answer
  • green
  • blue
  • black
  • White.

Question 141

Question
Matlab stands for
Answer
  • Mathematics Lab
  • Matrix Laboratory
  • Mathematical Laboratory
  • None of the Above

Question 142

Question
Look at this series: 664, 332, 340, 170, ____, 89, ... What number should fill the blank?
Answer
  • 85
  • 97
  • 109
  • 178

Question 143

Question
Which of the following is not a pair tag?
Answer
  • <p>
  • <u>
  • <i>
  • <img>

Question 144

Question
CALANDER is coded in a code as CLANAEDR. Find the code for CIRCULAR under the same rule.
Answer
  • LACANDER
  • CRIUCALR
  • CLANADER
  • None of these

Question 145

Question
In one's complement representation 1111 1111 represents
Answer
  • +0
  • -0
  • +1
  • -1

Question 146

Question
Using Demorgan's theorem we can convert AND-OR circuit to
Answer
  • OR-AND
  • NOR-NOR
  • NAND-NAND
  • NAND-NOR

Question 147

Question
The number of interrupt lines in 8085 is
Answer
  • 2
  • 3
  • 4
  • 5

Question 148

Question
Ability to learn how to do tasks based on the data given for training or initial experience
Answer
  • Self Organization
  • Adaptive Learning
  • Fault tolerance
  • Robustness

Question 149

Question
Which of the following propositions is tautology?
Answer
  • (p v q)→q
  • p v (q→p)
  • p v (p→q)
  • Both (b) & (c)

Question 150

Question
Which actions can be triggered by a button click in Android ? (check all that apply)
Answer
  • change appearance of other views of the same activity
  • start a different activity
  • change appearance of the button
Show full summary Hide full summary

Similar

BMSC335 Lecture 3 Week 1
Maddie McIntyre
Peptic Ulcer
Miar Abdelhamid
Immunology
El Prs
Insurance Quiz
crabbette
To Kill A Mockingbird GCSE English
naomisargent
French Grammar- Irregular Verbs
thornamelia
Structure of the League of Nations
saskiamitchell.19
GCSE Maths Symbols, Equations & Formulae
livvy_hurrell
Britain and World War 2
Sarah Egan
Functionalist Theory of Crime
A M
Macbeth Quotes To Learn
Sophie Brokenshire