1.
Infrared signals can be used for short range communication in
a closed area using propagation.
(A) ground (B) sky
(C) line of sight (D) space
(A) ground (B) sky
(C) line of sight (D) space
Ans.: C.) Line
of Sight
Question from
Mobile Computing
Very easy
2. A bridge has access to address in the same network.
(A) Physical (B) Network
(C) Datalink (D) Application
2. A bridge has access to address in the same network.
(A) Physical (B) Network
(C) Datalink (D) Application
Ans.: A.)
Physical Layer
Data
Communication and networks
3. The bit rate
of a signal is 3000 bps. If each signal unit carries 6 bits, the baud rate of
the signal is .
(A) 500 baud/sec
(B) 1000 baud/sec
(C) 3000 baud/sec
(D) 18000 baud/sec
(A) 500 baud/sec
(B) 1000 baud/sec
(C) 3000 baud/sec
(D) 18000 baud/sec
Ans.: A.) 500
baud/sec.
Very easy
Tip: Baud
rate=Bit rate/N
So 3000/6=500
4. Match the
following:
List-I List - II
a. Physical layer i Allow resources to network access
b. Datalink layer ii Move packets from one destination to other
c. Network layer iii. Process to process message delivery
d. Transport layer iv. Transmission of bit stream
e. Application Layer v. Formation of frames
Codes:
a b c d e
(A) iv v ii iii i
(B) v iv i ii iii
(C) i iii ii v iv
(D) i ii iv iii v
List-I List - II
a. Physical layer i Allow resources to network access
b. Datalink layer ii Move packets from one destination to other
c. Network layer iii. Process to process message delivery
d. Transport layer iv. Transmission of bit stream
e. Application Layer v. Formation of frames
Codes:
a b c d e
(A) iv v ii iii i
(B) v iv i ii iii
(C) i iii ii v iv
(D) i ii iv iii v
Ans.: A.)
Data communication and network question
Data communication and network question
Very easy
OSI model
question
5. A shift
reduce parser suffers from
(A) shift reduce conflict only
(B) reduce reduce conflict only
(C) both shift reduce conflict and reduce reduce conflict
(D) shift handle and reduce handle conflicts
(A) shift reduce conflict only
(B) reduce reduce conflict only
(C) both shift reduce conflict and reduce reduce conflict
(D) shift handle and reduce handle conflicts
Ans.:C.)
6. Which one of
the following is not a risk management technique for managing the risk due to
unrealistic schedules and budgets ?
(A) Detailed multi source cost and schedule estimation.
(B) Design cost
(C) Incremental development
(D) Information hiding
(A) Detailed multi source cost and schedule estimation.
(B) Design cost
(C) Incremental development
(D) Information hiding
Ans.:D.)
Very simple,
because Information hiding is a OOPS concept.
7. ________of a
system is the structure or structures of the system which comprise software
elements, the externally visible properties of these elements and the
relationship amongst them.
(A) Software construction
(B) Software evolution
(C) Software architecture
(D) Software reuse
(A) Software construction
(B) Software evolution
(C) Software architecture
(D) Software reuse
Ans.: C.)
Easy one once
again.
Tip: Key word
in the question is externally visible.
Software
Engineering question
8. Regression
testing is primarily related to
(A) Functional testing
(B) Development testing
(C) Data flow testing
(D) Maintenance testing
(A) Functional testing
(B) Development testing
(C) Data flow testing
(D) Maintenance testing
Software
Testing question
Ans.: D.)
9. . Match the following with
respect to the mobile computing technologies :
List-I List-II
a. GPRS i. An integrated digital radio standard
b. GSM ii. 3G wireless/Mobile technology
c. UMTS iii.Nine different schemes for modulation and error correction
d. EDGE iv. An emerging wireless service that offers g mobile data
Codes :
a b c d
(A) iii iv ii i
(B) iv i ii iii
(c) ii iii iv i
(d) ii i iv iii
List-I List-II
a. GPRS i. An integrated digital radio standard
b. GSM ii. 3G wireless/Mobile technology
c. UMTS iii.Nine different schemes for modulation and error correction
d. EDGE iv. An emerging wireless service that offers g mobile data
Codes :
a b c d
(A) iii iv ii i
(B) iv i ii iii
(c) ii iii iv i
(d) ii i iv iii
Ans.: B.)
10. A software agent is defined as
I. A software developed for accomplishing a given task.
II. A computer program which is capable of acting on behalf of the user in order to accomplish a given computational task.
III. An open source software for accomplishing a given task.
(A) I
(B) II
(C) III
(D) All of the above
I. A software developed for accomplishing a given task.
II. A computer program which is capable of acting on behalf of the user in order to accomplish a given computational task.
III. An open source software for accomplishing a given task.
(A) I
(B) II
(C) III
(D) All of the above
Ans.: B)
11. SET, an open encryption and security specification model that is designed for protecting credit card transactions on the internet, stands for
(A) Secure Electronic Transaction
(B) Secular Enterprise for Transaction
(C) Security Electronic Transmission
(D) Secured Electronic Termination
Ans.: A.)
12. Match the following
List -I List - II
a. Multilevel feedback queue i. Time-slicing
b. FCFS ii. Criteria to move processes between queues
c. Shortest process next iii. Batch processing
d. Round robin scheduling iv. Exponential smoothening
Codes
a b c d
(A) i iii ii iv
(B) iv iii ii i
(C) iii i iv ii
(D) ii iii iv i
List -I List - II
a. Multilevel feedback queue i. Time-slicing
b. FCFS ii. Criteria to move processes between queues
c. Shortest process next iii. Batch processing
d. Round robin scheduling iv. Exponential smoothening
Codes
a b c d
(A) i iii ii iv
(B) iv iii ii i
(C) iii i iv ii
(D) ii iii iv i
Ans.: D)
13. Match the following
List -1 List - II
a. Contiguous allocation i. This scheme supports very large file sizes.
b. Linked allocation ii. This allocation technique supports only sequential files.
c. Indexed allocation iii. Number of disks required to access file is minimal.
d. Multi- level indexed iv. This technique suffers from maximum wastage of space in storing pointers.
Codes:
a b c d
(A) iii iv ii i
(B) iii ii iv i
(C) i ii iv iii
(D) i iv ii iii
List -1 List - II
a. Contiguous allocation i. This scheme supports very large file sizes.
b. Linked allocation ii. This allocation technique supports only sequential files.
c. Indexed allocation iii. Number of disks required to access file is minimal.
d. Multi- level indexed iv. This technique suffers from maximum wastage of space in storing pointers.
Codes:
a b c d
(A) iii iv ii i
(B) iii ii iv i
(C) i ii iv iii
(D) i iv ii iii
Ans.: A)
14. Mergesort makes two recursive calls. Which
statement is true after these two recursive calls finish, but before the merge
step ?
(A) The array elements form a heap.
(B) Elements in each half of the array are sorted amongst themselves.
(C) Elements in the first half of the array are less than or equal to elements in second half of the array.
(D) All of the above
(A) The array elements form a heap.
(B) Elements in each half of the array are sorted amongst themselves.
(C) Elements in the first half of the array are less than or equal to elements in second half of the array.
(D) All of the above
Ans.: B)
15. Match the following :
List -1 List - II
a. Automatic storage class i. Scope of the variable is global.
b. Register storage class ii. Value of the variable persists between different function calls.
c. Static storage class iii. Value stored in memory and local to the block in which the variable is defined.
d. External storage class iv. Value stored in CPU registers.
Codes :
a b c d
(A) iii iv i ii
(B) iii iv ii i
(C) iv iii ii i
(D) iv iii i ii
List -1 List - II
a. Automatic storage class i. Scope of the variable is global.
b. Register storage class ii. Value of the variable persists between different function calls.
c. Static storage class iii. Value stored in memory and local to the block in which the variable is defined.
d. External storage class iv. Value stored in CPU registers.
Codes :
a b c d
(A) iii iv i ii
(B) iii iv ii i
(C) iv iii ii i
(D) iv iii i ii
Ans.: B)
16. When we pass an array as an argument to a
function, what actually gets passed ?
(A) Address of the array
(B) Values of the elements of the array
(C) Base address of the array
(D) Number of elements of the array
(A) Address of the array
(B) Values of the elements of the array
(C) Base address of the array
(D) Number of elements of the array
Ans.: C)
17. An
algorithm is made up of 2 modules M1 and M2. If time
complexity of modules M1 and M2 are h(n) and g(n) respectively, the time
complexity of the algorithm is
(A) min (h(n), g(n))
(B) max (h(n), g(n))
(C) h(n) + g(n)
(D) h(n)*g(n)
(A) min (h(n), g(n))
(B) max (h(n), g(n))
(C) h(n) + g(n)
(D) h(n)*g(n)
Ans.: B.)
18. . Which
of the following is the correct value returned to the operating system upon the
successful completion of a program ?
(A) 0
(B) 1
(C) -1
(D) Program do not return a value.
(A) 0
(B) 1
(C) -1
(D) Program do not return a value.
Ans.: A)
19. Manager's salary details are hidden from the
employee. This is called as
(A) Conceptual level data hiding
(B) Physical level data hiding
(C) External level data hiding
(D) Local level data hiding
(A) Conceptual level data hiding
(B) Physical level data hiding
(C) External level data hiding
(D) Local level data hiding
Ans.: C)
20. Match the following :
List-I List- II
a. DDL i. LOCK TABLE
b. DML ii. COMMIT
c. TCL iii. Natural Difference
d. BINARY Operation iv. REVOKE
Codes:
a b C d
(A) ii i iii iv
(B) i ii iv iii
(C) iii ii i iv
(D) iv i ii iii
List-I List- II
a. DDL i. LOCK TABLE
b. DML ii. COMMIT
c. TCL iii. Natural Difference
d. BINARY Operation iv. REVOKE
Codes:
a b C d
(A) ii i iii iv
(B) i ii iv iii
(C) iii ii i iv
(D) iv i ii iii
Ans.: B)
21. KPA in CMM stands for
(A) Key Process Area
(B) Key Product Area
(C) Key Principal Area
(D) Key Performance Area
Ans.: A.)
22. A clustering index is
created when
(A) primary key is declared and ordered
(B) no key ordered
(C) foreign key ordered
(D) there is no key and no order
(A) primary key is declared and ordered
(B) no key ordered
(C) foreign key ordered
(D) there is no key and no order
Ans.: A.)
23. While (87) printf("computer"); The
above C statement will
(A) print "computer" 87 times
(B) print "computer" 0 times
(C) print "computer" 1 times
(D) print "computer" infinite times
(A) print "computer" 87 times
(B) print "computer" 0 times
(C) print "computer" 1 times
(D) print "computer" infinite times
Ans.: D)
No comments:
Post a Comment