Professional Documents
Culture Documents
Question
Phase defination is covered in
Which is a black box testing method?
A Metrics used to measure the charestric of documentation and code
is called
A Non Functional Testing is called
1) Testing fault 2) Software fault 3) Design fault 4) Documentation
Fault
9
10
11
12
13
14
15
Answer A
CMM 1
Equvivance partitioning
Answer B
CMM 2
Fault injection
Answer C
CMM 0
Code Coverage
Answer D
All of Above
None of above
Correct Answer
B
A
LOC
Test Metric
Product Metric
Process Metric
Perfomance Testing
2 is a valid reason; 1,3,4 &
are not
Component testing should
be performed by
development
Management report
Is unlikely to be completed
on schedule
Alpha Testing
All of them are valid
reasons for failure
Component testing does
not involve regression
testing
Final test report
Is likely to be liked by the
users
Equal to 0.9
At least 1/0.81
60%
30%
70%
Driver
Stub
5000
4333
4667
933.45
142.50.
230.25
Capture requirements
Capture design
specification
Is likely to be fault-free
D
D
C
C
Sr.
16
Question
Code review is for
Answer B
State Transition Testing
ability of system to
support users
Test Methedology
perfoming LCSAJ testing
Yes
Answer C
Dynamic Testing
The poit at which system
break down
Test Metric
Defect calculation
May be yes
Answer D
none of the above.
QTP is
Metric based technique is for
Is it possible to have a software product with "Zero defect"?
Answer A
Static testing
ability of system to run
without failure
Testing tool
estimating testing effort
No
17
18
19
20
21
Unit Testing
Integration Testing
22
23
24
25
26
27
28
29
Correct Answer
C
A
D
A
System Testing
correct errors
update errors
Agile Method
Waterfall model
Test methods
Silktest
BugZilla
Hardening testing
Alpha Testing
Waterfall Method
V- Model
Test Bed Creation
Selenium
Qtp
System Testing
stress testing
B
C
D
D
A
B
B
30
COTS is
None of above
31
COTS example is
33
34
35
36
37
38
39
40
COTS is for
Which testing devides input domain into class for testcase?
Types of review
Group Activity can be seen in
The person who records the procedding of review meeting is
SRS is an artifact of
Nonfunctional requirement is
Evaluting Software during various phases of SDLC is called
D
C
C
B
A
A
D
B
41
Less iteration
42
43
Low cost
44
45
46
47
Waterfall model
User Get Idea about
system
productivity
Architectural design
IBM
Abstraction
Mcafee
Expertise team
lcontromonitoring an
Portability
Equvivance Testing
Technical
Technical
Moderator
Code Phase
maintainability
Validation
Not applied to real time
system
Prototype Model
Flash
understanding of
functional domain
Reusablility
White Box Testing
WalkThrough
WalkThrough
Author
Design Phase
usability
Testing
Error detection at later
stage
Spiral Model
32
Autocad
Understanding of testing
tools
Reliablility
Black Box Testing
Inspection
Inspection
Recorder
Analysis phase
Reliability
Varification
48
All of above
Fast Development
All of above
efficiency
data design
Microsoft
Information Hiding
reliability
Interface design
Motorola
refinement
D
D
A
D
n*(n-1)/2
nlog(n)nlog(n)
n*(n+1)/2n*(n+1)/2
Sr.
Answer B
Answer C
Answer D
49
Question
Answer A
if 99% code is written in C and 1% code is written in assembly
lenguage then increse in execution time compare to 1% code written 10%
in assembly language is
20%
5%
50
Data Element
Behaviour element
51
52
cardinality
Flow base element
modality
Class base element
directionality
Scenario base element
A
C
53
Specification design
54
Show relationship
between data
55
45%
100%
90%
50%
56
30%
70%
10%
20%
57
Method
Tools
Manufacturing
Process
58
Analysis,planning,design,co
de,test
59
Evolutionary model is
iterative in nature
all of above
60
complex project
61
62
63
64
65
66
67
68
69
Sometimes
communication,risk
communication,planning,m management, design,
odelling,construction,depl code, test
oyment
accommodate changes
not produce throw away
easily
Correct Answer
small project
all of above
Traceablity Matrix
Test Metric
All of above
Regresssion testing
Adhoc Testing
perfomance testing
Many Times
Always
None
Identification of faults
Storage
Development
Processing
D
B
Reverse engineering
Output
Inheritance
Aggregation
Object
Class
Input
Output
Storage
Processing
TRUE
FALSE
A
Are thoroughly tested
before delivery to the
customer
Have measurable
specification for process
outputs
Sr.
Question
70
71
72
73
74
75
Answer A
Answer B
Definition, development,
Analysis, design, testing
support
Dependence matrix
SRS
Business and marketing
Scope, constraints, market
concerns
Input
Output
Answer C
Inheritance
Aggregation
Object
Class
Level 1
Level 2
Level 3
Level 4
Q and R
P and S
Q and S
all of above
76
77
An index is clustered, if
78
79
81
82
83
84
80
85
86
87
88
89
90
91
92
Software functions
Process activities
Inheritance
Control coupling
Cyclomatic complexity
abstraction
Content coupling
Function count
Software design
Testing
ISO 9000
ISO 9003
Customer Myths
Management Myths
RAD
content coupling
Answer D
Programming, debugging,
What, how, where
maintenance
Cause-effect graph
Chart
Technology, finance, time, Technical prowess of the
resources
developers
Storage
Processing
Correct Answer
B
A
C
B
Data coupling
Project schedule
None of above
None of above
Program length
B
B
A
ISO9002
ISO 9001
Practitioner Myths
all of above
Prototype
SpiralModel
None of above
stamp coupling
messsage coupling
control coupling
Spiral Model
Prototype Model
all of above
step-wise refinement
modularity
flow charting
loop invariants
Cyclomatic number
Hamiltonian circuit
Eulerian cycle
Stress testing
Unit testing
Beta testing
Mutation testing
Sr.
Question
Answer A
93
user requirement
Error correction
Adaptive maintenance
Establishing scope
Perfective maintenance
Adaptation
Corrective maintenance
Answer D
software engineers
experience
Enhancement
None of above
Adaptive maintenance
Corrective maintenance
Perfective maintenance
Preventative maintenance
Size measurement
Design recovery
Cost measurement
Analysis Modelling
Requirement Gathering
Formulation
Highly Coheshive
Comprehenshive
Loosly coupled
All of above
Content
maintainability
links
Nevigation
94
95
Answer B
Answer C
Correct Answer
B
B
C
101
Forms
cookies
browser
links
102
Reusable
Organized
Repeatable
Ad hoc
103
user requirement
104
105
Yes
OO software
No
Application Software
Can't Say
System Software
software engineers
experience
May be yes
None of above
SRS
input
output
Software Metric
COCOMO
All of Above
200 man-hours
300 LOC
30 FP
None of above
200 man-hours
300 LOC
40 person-month
None of above
version control
naming convention
(programming)
software archival
agreements
all of above
Project's scheudle
Project's planning
None of above
ISO 9000
Riskevent/Probability of
occurance
ISO 9001
Risk event x Probability of
Occurrence
ISO 31000
None of above
Constant (3.0)
None of above
114
Risk mitigation
Risk monitoring
Risk reduction
None of above
Risk reduction
the problem of designing
test data to execute the
controlled
Risk retention
116
Risk mitigation
Risk monitoring
we can always design test the problem of designing
data to execute the
test data to execute the
controlled statement
controlled
106
107
108
109
110
111
B
B
A
Sr.
Question
Answer A
Answer B
Answer C
Answer D
Correct Answer
2^ 48 test cases
None of above
None of above
perfective
adaptive
corrective
none of above
perfective
adaptive
corrective
none of above
121
None of above
122
By Analyst
By programmer
By Software Engineer
The tests will always given He will find the bug for all
repeatable results
runs of the program
Random testing is
Random testing always
Random testing will always
insufficient as the bug may
generates equal value of x None of above
find the bug
never detected
and y
125
Suresh and Ramesh design test cases for a fragment of code. Suresh Ramesh's testing is much
runs 100 test cases but Ramesh runs 200 test cases
better
126
Mohit writes test data which will exercise each edge of the flow
graph for his program
Sr.
Question
Consider the above modules Ca and Cb where a and b are the sizes.
127
Then
128 Variation in debugging : coding ability has been reported to be
129
Answer A
Answer B
Answer C
Answer D
E (a + b) > Ea + Eb
E (a + b) < Ea +Eb
E (a + b) > =Ea + Eb
01:10
01:02
01:05
01:20
`1:10:100
01:03:10
01:02:05
Correct Answer
Ea < Eb
Ea > Eb
Ea = Eb
131
Data abstraction
modularity
concurrency
data hiding
134
Process
135
Architectue
None of above
Size
Efficiency
Month
1-C , 2-A , 3-D, 4-B
B
A
C
D
Software is flexible
Productivity
Productivity
Person
1-B , 2-C , 3-D, 4-A
Software is not
manufactured
Reliability
quality
Person - Months
1-C , 2-A , 3-B, 4-D
13
145
Robustness
Method
Security
0.9
None of above
Sr.
Question
Answer B
Answer C
Answer D
146
48
40
36
147
All of above
148
Random testing
All of above
149
Technical
Management
Both A and B
None of above
150
all of above
rightleer=rightleer
leTerab..z
rightleer=leer
leTerab..z
rightleer=leerleer
leTerab..z
rightright=leerleer
leTerab..z
rightleer=rightleer
leTerab..z
listlist+digitdigit
digit0123
synthesized
inherited
syntax
parsed
scanning
parsing
stack
analysis
left-to-right
top-down
right-to-left
Bottom-up
3
4
5
7
8
Answer A
Correct Answer
macro preprocessor
rational preprocessors
language extensions
File inclusion
10
hypothetical machine
code
pass code
backtracking
forwarding
backpatching
looping
parsing rule
operator precedence
semantic actions
token
lexeme
regular expression
semantic analyzer
lexical analyzer
code generator
parser
11
12
13
14
C
A
15
parsing,semantic analysis
regular expression,context
scanning,lexical analysis
free grammar
code generator,code
optimization
16
enhanced writability
enhanced portability
enhanced security
enhanced readability
Sr.
17
18
19
20
21
22
Question
const pi=3.1416, pi in lexical analysis is called _______
Which error will not be identified by lexical analyzer?
Which is the prefix of the string ahmedabad?
Which is the substring of string gujarat?
Which is the subsequence of the string gujarat?
What can not be described by regular expressions?
Answer A
lexeme
fi (a==f(x))
ahmedabad
gjrt
gjrt
balanced constructs
Answer B
identifier
a=(b
med
jar
rjg
nested constructs
Answer C
pattern
a=b c
bad
gja
jug
repeating strings
23
misspelling an identifier
operator applied to
incompatible operand
24
25
26
phrase level
canonical derivation
rightmost derivation
panic mode
left derivation
leftmost derivation
error production
derived derivation
top down derivation
global correction
constant derivation
bottom-up derivation
B
A
B
context free
context sensitive
ambiguous
regular
infinite loop
panic mode
recovery mode
execution mode
27
28
Answer D
symbol
all of the above
abad
rag
rgu
all of the above
Correct Answer
A
A
A
B
A
B
29
30
nonterminal
terminal
casesensitive character
both B and C
hard to read
handle
handle pruning
handle
viable suffixes
viable prefixes
suffixes
number of sets
left factoring
right recursion
31
32
33
34
35
number of symbols of
lookahead
left most derivative
36
right-to-left scanning
37
38
synchronizing token
left-to-right scanning
right side of the
production
number of symbols on
stack
left recursion
right most derivation in
reverse
Nonterminal
terminal
inherited
directed graph
parse tree
syntax tree
number of iterations
39
static allocation
heap allocation
stack allocation
40
pointer reference
dangling reference
null reference
deallocated reference
41
bottom up parser
predictive parser
10
Sr.
Question
Answer A
42
YACC builds up
43
44
45
46
Answer B
Answer C
Answer D
Correct Answer
None of these
syntax tree
all of these
lexeme,pattern
pattern,lexeme
pattern,token
token,lexeme
both A and B
47
predictive parser
Both a and b
Canonical LR parsing
48
LR(1)
LALR(1)
LL(1)
operator precedence
49
LL
LR
both a and b
neither a nor b
Expansion,control stacks
Activation,control stacks
None of these
memory leaks,dangling
references
starvation,memory leaks
starvation,heap allocation
B
B
50
51
52
starvation,dangling
references
53
Runtime
Peephole
Algorithmic
logical
54
Dead code
Hibernating code
static code
dynamic code
55
56
>,<
kernel item
<,>
nonkernel item
>,=
itemset
<,=
initial item
A
D
nonterminal,value
value,storage location
storage location,value
terminal,storage location
value
name
global
environment
control
local
weakly typed
\"[a-zA-Z0-9]\"
static type
\"[a-zA-Z]\"
C
A
make y.tab.c
strongly typed
\"[^"\n]*["\n]
make y.tab.c and link to
lex library
57
58
59
60
61
62
63
64
11
Sr.
65
66
Question
Answer A
What will be the output of the code optimizer, if the following input
is given?
id1:=id2+id3*60
temp1:=inttoreal(60),temp2:=id3*temp1,temp3:=id2*temp2,id1:=te
mp3
What will be the output if we remove the left recursion?
exprtermexpr'
exprexpr+termterm
expr'+termexpr'
Answer B
Answer C
Answer D
Correct Answer
temp1:=id3*60
id1:=id2+id3*60.0
temp1:=id3*60
id1:=id2+temp1
exprexpr'
expr'term+expr
exprtermexpr'
expr'+termexpr'
exprtermexpr' expr'
67
numdigit(.digit+)?(E(+)?digit+)?
numdigit+(.digit+)?(E(+numdigit+(.digit+)?(E(+numdigit+(.digit+)?(E(+)?d )?digit+)?
)?digit+)
igit+)?
68
value
position
sata
69
value
function definition
70
data constraints
heap constraints
stack constraints
addressing constraints
71
all of these
72
73
(a,((a,a),(a,a)))
(a,(a,a),(a,a)))
(a,((a,a,(a,a)))
(a,((a,a,a,a)))
74
address
D
B
75
76
not ambiguous
ambiguous
77
LALR(1)
operator precedence
SLR(1)
undefined
ab
aabb
abab
all of these
{a}
{}
{b}
{a,b}
{$,a,b}
{}
{a,b}
{}
6 a's
3 a's
4 a's
8 a's
78
79
80
A ->
81
aa
82
12
Sr.
83
84
Question
out of following what is the most concerned part for compiler
design ?
what does the lexical analyzer do in case of following input ? =
1.25
Answer A
Answer B
Answer C
Answer D
Correct Answer
logical operations
stack implementation
ease of operations
DO is a keyword
DO is not a keyword
lexical error
recovery
85
to push scanned
what is the purposr of function ungetc if used with lexical analyzer
characters back in the
?
input stream
to push lookahead
characters back in the
input stream
86
how can we specify pattern of zero or more a's in lexical analysis ? a-a
[a-a]
a+
a*
87
what does the following rule specify if we write (rs)t = r(st) where
r and s are regular expressions.
concatenation is
associative
88
(r0)*
r+0
89
90
91
92
what regular expression lexical analyzer will use to strip out white
newline ws
spaces ?
94
95
96
97
number of alphabets in
lexeme
each buffer half holds a
sentinel character at the
end
-> delim
opVonal_fracVon
(.digits)
I={EE'+.T}
opVonal_fracVon
(.digits) +
I={EE'+T}
opVonal_fracVon
(.digits) *
I={EE'.+T}
opVonal_fracVon
(.digits) ?
I={EE'+T.}
SLR(1)
ambiguous
right recursive
decorating
analyzing
traversing
directed graph
syntax tree
parse tree
What type of grammar is this? S-> L=R S-> R L-> *R L ->id R->
not SLR(1)
L
The process of compuVng the aTribute values at the nodes is
called ______ the
evaluating
parse tree.
What identifies the common subexpression in the expression?
93
order of regular
expression is not
important
(r)*
13
Sr.
98
99
Question
The flow control in a program corresponds to _____ traversal of
the activation tree
Answer A
Answer B
Answer C
Answer D
active
breadth first
top down
depth first
all of these
as a pattern index
as an array of values
bat
ball
bracket
egrep -n -e '[ps]'
egrep -n -e '[^p-s]'
egrep -n -e '[p-s]'
nondeterminism in
transition diagram
determinism in transition
diagram
all of these
FOLLOW set
shift-reduce conflict
reduce-shift conflict
nonrecursive call
Which methods can be used to compute the attributes of different translation interleaved
symbols in syntax directed definition?
with parsing
state
what is the iniVal set of items in case of LR(1) items for the
following augmented grammer ?
S' -> S
108
S->CC
C->Cc | d
109 Which type of three address code requires lesser space?
1. L.in := T.type
1. L.in := T.type
2. T.type := integer
2. T.type := integer
3. T.type := real
3. T.type := real
4. L1.in := L.in
4. L1.in := L.in
addtype(id.entry, L.in)
5. addtype(id.entry, L.in)
5. addtype(id.entry, L.in)
1. T.type := L.in
1. T.type := integer
2. T.type := integer
2. T.type := real
3. T.type := real
3. L.in:=T.type
4. L1.in := L.in
4. L1.in := L.in
addtype(id.entry, L.in)
addtype(id.entry, L.in)
5. addtype(id.entry, L.in) 5. addtype(id.entry, L.in)
Correct Answer
I0:S' S,$ S CC, $ C I0:S' S,$ S CC, $ C I0:S' S,$ S CC, $ C I0:S' S,$ S CC, $ C
cC, c C d, d
cC, cd C d, cd
cC, C C d, d
cC, C C d, C
Quadruples
Indirect triples
Triples
none of these
14
Sr.
Question
Answer A
Answer B
Answer C
Answer D
Correct Answer
ETR
ETR
Raddop
T{print(addop.lexeme)}R1 Raddop T R1
ETR
Raddop
{print(addop.lexeme)} T
R1
ETR
Raddop T R1
{print(addop.lexeme)}
X.x
Z.z
Y.y
A.a
A called activation
outlives the caller
both of these
none of these
S -> iEtSS'
S'-> eS
E-> b
S-> iEtS'
S'-> eS |
E-> b
S -> iEtSS'
S' ->S |
E ->b
S -> iEtSS'
S'-> eS |
E-> b
S-> Aab
A->cA'adA'
S-> Aab
A->bdA'A'
A'->cA'adA'
superset of predictive
parsers
all of these
No drawback
No tool available to
generate parser
lbl x y LT
LT x y lbl
none of these
118 f:=g is related to which issue of the code optimization in compiler? common subexpression
copy propagation
Loop optimization
common subexpression
code motion
copy propagation
Loop optimization
while(limit-2>=i)
while (i>limit-2)
t=limit-2 while(i<=t)
for(i=0;i<=limit-2;i++)
counter,registers and
variables
create
functions,stack,program
counter,interrupt,function
counter
s
fork
system
process
interrupt array
interrupt routine
interrupt vector
recognize all
programming language
construct
difficult to understand
117
1
2
3
lbl LT x y
most general
nonbacktracking shift
reduce parsing
too much work to
construct LR parser by
hand
interrupt address
15
Sr.
4
5
6
7
8
9
10
11
12
13
Question
Answer A
What term is used to indicate that if one process is using shared
deadlock
variable or file , the other processes will be excluded from doing
the same thing.
The part of the program, where the shared memory is accessed is
shared heap
called _____________
Which criteria constitutes a good scheduling policy?
Turnaround
Answer B
Answer C
Answer D
mutual exclusion
mutual awareness
mutual denial
shared region
crtitical section
response time
throughput
all of these
process starvation
premature leaving
process observation
thread
executable program
processs
tasks,threads
processes,threads
jobs,user programs
jobs,tasks
stack
program counter
data section
heap
array
heap
vector
stack
running,ready,waiting
running,terminated,waitin waiting,running,ready
g
ready,waiting,running
accumulators
index registers
stack pointers
all of these
memory management
information
cPU registers
process state
accounting information
process priority
page tables
vector
pointer to first process
control block
linked list
pointer to final process
control block
tree
pointer to first and final
process control block
array
CPU
thread
preemptive scheduling
too many process
switches
assembly program
17
18
19
process
20
process scheduler
21
process scheduler
14
15
16
Correct Answer
16
Sr.
22
Question
short time scheduler is _________
Answer A
slow
Answer B
inefficient
Answer C
fast
Answer D
improper
23
interrupt processes
24
25
batch system
context switch
process switch
memory switch
task switch
ps
execute
process
ls
root
parent
init
login
process pointer
process tag
process identifier
process table
cooperating
CPU sharing
memory sharing
I/O sharing
26
27
28
29
30
31
Correct Answer
C
32
shared memory,vactor
passing
33
page memory
shared memory
segmented memory
37
intermediate amount of
data
sending process is
In which case send() call of message passing is considered blocking blocked until the message
send?
is received by receiving
process
shared memory segment can be removed with the help of which
shmget()
system call?
A system has one network address and it has ____ port
undefined
38
sockets
39
allows a state of an
allows a state of an
object to be written to an object to be written to a
array
vector
34
35
36
message passing
sending process is
blocked until the
communication is
established
sending process is
blocked until the shared
memory is defined
shmat()
shmctl()
shmcreate()
many
one
Java's remote method
invocation
allows a state of an
object to be written to a
byte stream
none
all of these
allows a state of an
object to be written to a
file
17
Sr.
Question
40
41
42
43
44
45
46
47
48
49
50
51
52
53
Answer A
time consuming and
resource intensive
Answer B
time consuming and
resource starvation
Answer C
time sharing and
deadlock
Answer D
time consuming and
memory starvation
kernel threads
user threads
message threads
memory threads
Correct Answer
B
A
overhead of starting
Operating system
overhead of creating
kernel threads
economy
all of these
throughput time
average time
wait time
all of these
interactive
time sharing
batch system
both A and B
none of these
maximize
average
none of these
process table
process identifier
time sharing
batch system
both of these
none of these
preemptive scheduling
none of these
starvation
preemptive scheduling
maximum output
nonpreemptive scheduling
sceduling
54
55
unavailable I/O
unavailable memory
56
time limits,memory
requirements,the number
of open files, the average
of I/O burst to average CPU
burst
time limits,memory
time limits,memory
time limits,memory
requirements,the number
requirements, the average requirements,the previous
of processes in ready
of I/O burst to average CPU priority, the average of I/O
queue, the average of I/O
burst
burst to average CPU burst
burst to average CPU burst
57
10 to 20 milliseconds
10 to 100 milliseconds
1 to 10 milliseconds
10 to 50 milliseconds
n-1
(n-1)xq
nxq
nonpreemptive
preemptive
both of these
none of these
58
59
unavailable CPU
18
Sr.
60
61
Question
preemptive kernel is suitable for which kind of process?
Which type of semaphores are known as mutex locks?
62
63
64
65
Answer A
multiuser
counting
resources a process will
request and use during
lifetime
Answer B
interactive
infinite
Answer C
batch
binary
Answer D
real time
none of these
printer
both of these
none of these
2,3
1,2,3,4
1,2,4
300000 120940
300041 110999
300940 120000
compile
run
execution
all of these
all of these
resident operating
sytem,compiler
Correct Answer
D
C
66
If the processs can be moved during its execution from one memory
segment to another , binding must be delayed until ____ time.
67
68
69
What is worst fit strategy to select a free hole from the set of
available holes in case of dynamic storage allocation problem?
70
first fit and best fit strategies of memory allocation suffer from ____
external fragmentation
internal fragmentation
both of these
none of these
71
internal fragmentation
both of these
none of these
72
external fragmentation
internal fragmentation
paging
none of these
73
internal,entire
external, last
internal,0
external,0
74
4300
4353
4302
4355
75
76
implement identity
dependent access
19
Sr.
77
78
79
Question
Answer A
Answer B
Which command can be used in Linux to set priority in priority based
grep
egrep
scheduling?
indefinite blockage of low nonpreemptive scheduling
aging is the solution to which problem?
priority process in priority in First come first served
scheduling
scheduling
When a process creates a new process which two possibilities exist
in terms of execution? 1. parent continues to execute concurrently
1 and 3
1 and 2
with children 2. The parent waits until some or all of its children have
terminated. 3. The parent exits so children gets memory for execution
80
81
82
83
84
When fork() is used to create a child process, what is the pid for the random number greater
child process?
than 0
Which resources are deallocated by operating system when a
physical and virtual
process terminates?
memory
In which case parerent may terminate the execution of one of its
children? 1. The child has exceeded its usage of some of the
resources that it has been allocated. 2. The task assigned to the child 1,2,3
is no longer required. 3. The parent is exiting and the operating
system does not allow a child to continue if its parent terminates.
Answer C
Answer D
nice
cal
preemptive scheduling in
shortest job first
nonpreemptive scheduling
in shortest job first
2 and 3
1,2 and 3
1 and 3
1 and 2
1,2 and 3
open files
I/O buffers
all of these
1,2
2,3
1,3
loader
object module
none of these
A and B
none of these
85
assembler
86
87
shared memory is
detached
88
Correct Answer
20
Sr.
Question
89
90
91
92
93
94
95
96
In First come First serve scheduling policy, the burst time for
processes A,B,C is 24,3,3. burst time in milliseconds. If the processes
arrive in orser B,C,A - the average waiting time
The four processes A,B,C,D has burst time 6,8,7,3. burst time in
milliseconds. The average waiting time in case of simple shortest job
first scheduling algorithm is ____
The four processes A,B,C,D has burst time 8,4,9,5 and arrival time
0,1,2,3. burst time and arrival time in milliseconds. The average
waiting time in case of preemptive shortest job first scheduling
algorithm is ____
The four processes A,B,C,D has burst time 8,4,9,5 and arrival time
0,1,2,3. burst time and arrival time in milliseconds. The average
waiting time in case of nopreemptive shortest job first scheduling
algorithm is ____
The five processes A,B,C,D,E has burst time 10,1,2,1,5 and priority
3,1,4,5,2 respectively. burst time in milliseconds. The average waiting
time in case of priority scheduling algorithm is ____
If three processes A,B,C arrive at time 0 and length of the CPU burst
in milliseconds is 24,3,3 respectively and if the time quantum is of 4
milliseconds then average waiting time in round robin scheduling is
_____.
If time quantum is too large, round robin scheduling degenerates to
which scheduling policy?
Answer A
When a process switches
from running to waiting
state
Answer B
When a process switches
from running to ready
state
Answer C
24 milliseconds
27 milliseconds
10 milliseconds
17 milliseconds
6 milliseconds
7 milliseconds
5 milliseconds
4 milliseconds
6.5 milliseconds
7 milliseconds
6 milliseconds
4 milliseconds
6.5 milliseconds
7 milliseconds
7.75 milliseconds
6 milliseconds
6.9 milliseconds
8.2 milliseconds
7.75 milliseconds
6.3 milliseconds
10 milliseconds
7.4 milliseconds
6.2 milliseconds
5.66 milliseconds
priority
design a protocol that the design a protocol that the design a protocol that the design a protocol that the
process can use to
process can use to access process can use to access process can use to access
cooperate
kernel thread
shared memory
CPU
97
98
Answer D
Correct Answer
32 hours
28 hours
24 hours
10%
9%
0.10%
0%
in = out
in + 1 =out
Reflexive
Symmetric
All of these
Transitive
21
Sr.
Question
Answer A
If domain and co-domain
are same
L+ = L*L
Answer B
If the range and codomain are same
L+ = L L*
Answer C
If the range and domain
are same
L+ = L*L*
Answer D
NFA
NFA
In which machine all of the moves for an alphabet must be specified? Finite Automata
Tape
9
10
11
Accepting State
Starting State
12
13
14
Terminal Symbols
L1 L2
(1 + 01)* (0 + )
16
Context Sensitive
Grammar
Non Terminal Symbols
L1 L2
a(a*ba*b)*a*
17
18
15
19
20
Correct Answer
None of these
All of these
None of these
Stack
Tree
Unrestricted Grammar
All of these
None of these
None of these
None of these
A
B
Transition Function
Regular Grammar
CNF
Alphabet
L1.L2
Language
L1*
B
D
(0 +10) *
(0 +11) *
None of these
(a)*(b+a)(b)
(aa + bb)*
(a + b)*aa (a + b)*
None of these
M is NFA
M is DFA
None of these
Queue
Context Sensitive
Grammar
2 is odd or -3 is not
negative
2 is even or -3 is not
negative
21
22
Which of the following are the aspects of the high level languages?
Ease of understanding
Naturalness
portability
All of Above
23
QXQ
QXQ
QA
Q X q0
22
Sr.
32
Question
Answer A
In an NFA, M = (Q,,,q0, A) transiVon funcVon is a funcVon which
QXQ
maps
In an NFA, M = (Q,,,q0, A) transiVon funcVon is a funcVon which
QXQ
maps
Any language is accepted
By Kleens theorem we prove that
by FA
For two FAs M1 = (Q1,,1,q1, A1) M = M2 = (Q2,,2,q2, A2)
Only A1 is accepting State
accepting languages L1 and L2 If we find L1 L2 then
For two FAs M1 = (Q1,,1,q1, A1) M = M2 = (Q2,,2,q2, A2)
Only A1 is accepting State
accepting languages L1 and L2 If we find L1. L2 then
For two FAs M1 = (Q1,,1,q1, A1) M = M2 = (Q2,,2,q2, A2)
q1 is starting State
accepting languages L1 and L2 If we find L1.L2 then
If f(x) = cos(x) and g(x) = x3 , then (f O g)(x) is
(cos(x))3
P q is logically equivalent to (here ~ is Negation Sign)
~q p
Let the classes of Languages accepted by finite state machines be L1
and the class of Languages represented by regular expressions be L2 L1 is subset of L2
then,
Tautology is
Always True
33
* of Finite Automata is
Transition Function
34
35
SS+S|S*S|a
Compile Free Grammar
PUSH
PEEP
39
Always False
Extended Transition
Function
S aSa |
Content Free Grammar
40
24
24
25
26
27
28
29
30
31
36
37
38
Answer B
Answer C
Answer D
Q X Q2
Q X 2Q
Q X * Q
Q X Q2
Q X 2Q
Q X * Q
Correct Answer
B
D
B
A
D
D
L2 is subset of L1
L1 = L2
L1 L2 =
Partially True
None of these
None of these
S aS |
Context Free Grammar
None of these
None of these
A
C
POP
None of these
FA
NFA
NFA -
Turing Machine
Null String
None of these
Decidable
Un-decidable
None of these
41
True
False
None of these
42
If P = NP then
None of these
43
NP Hard Problem
NP Complete Problem
P Problem
None of these
44
Subset construction
Kleens Theorem
Minimization Algorithm
Cooks Theorem
45
46
Context Free
(a+b)* = a*b*
Recursive
(a+b)* = (a*b*)*
Not a Regular
None of these
D
C
47
(1+0)*0 represents
None of these
48
49
50
Context Sensitive
(a+b)* = (a+b)(a+b)*
Binary number that are
multiples of 2(two).
Prefix Expression
(ab)n
Union
Postfix Expression
ab(a+b)*
Concatenation
Infix Expression
(a+b)*(ab)n
Kleens Closure
None of these
a nbn
All of Above
B
D
A
23
Sr.
51
52
53
54
55
56
57
58
59
60
61
Question
Answer A
Depend on present state
The output of a moore machine is
and present input
In a Context Sensitive Grammar, no. of Grammar symbols on the left Grammar Symbols on right
side of a Production cant be greater than the no. of
side
2 or more productions
A given grammar is called ambiguous if
have same non terminal
on the left hand side
Let L be a language recognizable by a Finite Automata, then reverse
Regular Language
of the language is a
The logic of Pumping Lemma is a good example of
The no. of Auxiliary memory required for a Push Down Automata to
behave as a Finite Automata is
A Push Down Automata behaves like a Turing Machine when no. of
Auxiliary memory it has is
Context Free Grammar is not closed under
For two regular languages L1 = (a+b)*b and L2 = b(a+b)*, then L1
L2 is given by
If L is a language recognizable by a Finite Automata then subset of
the Language is
Which of the following is not accepted by any deterministic Push
Down Automata?
Answer C
Depend only on present
input
Non Terminals on right
Terminals on the right side
side
A derivation tree has more Brackets are not present
than on associated
in the grammar
sentence
Context Sensitive
Context Free Language
Language
Divide & Conquer
Recursion
Technique
Answer D
Answer B
Depend only on the
present state
Correct Answer
All of these
All of these
Concatenation
Union
Complementation
Kleens
(a+b)*ab
ab(a+b)*
a(a+b)*b
b(a+b)*a
Regular Language
Context Sensitive
Language
Recursively Enumerable
Language
None of these
62
63
A Grammar that produces more than one Parse tree for same
sentence is
Ambiguous
Unambiguous
Regular
None of these
64
a*b*
(a+b)*
(ab)+
(a+b*)
65
Without rewinding
capability and bidirectional
tape movement
66
FA cant deterministically
fix the mid-point
Without rewinding
capability and
unidirectional tape
movement
FA cant remember
arbitrary large amount of
information
Both A and B
None of these
360
240
720
xyx
xyxyx
Undecidable
Interpretive
Non-determinstic
67
68
69
None of these
24
Sr.
70
71
72
Question
Can a DFA simulate NFA?
Regular Expression (a+b) denotes the set
Regular Expression (a+b)(a+b) denotes the set
Which of the following regular expression denotes zero or more
instances of a or b?
Answer A
No
{a}
{a,b,ab,aa}
Answer B
Yes
{, a,b}
{a,b,ba,bb}
Answer C
Sometimes
{a,b}
{a,b}
Answer D
Depends on NFA
{ab}
{aa,ab,ba,bb}
a+b
(ab)*
(a+b)*
a* +b
74
generative,cognitive
generative,acceptor
acceptor,cognitive
cognitive, generative
75
73
76
77
78
Correct Answer
A
C
D
Union
Concatenation
Kleens Closure
All of these
N states
N + 1 States
N + 2 States
N -1 States
G has no cycles
G is a Spanning Tree
None of these
79
Any Grammar
Any Unambiguous
Grammar
80
None of these
81
Match all items in Group 1 with correct options from those given in
Group 2. Group 1 :: P. Regular expression Q. Pushdown automata R.
Dataflow analysis S. Register allocation Group 2 :: 1. Syntax analysis
2. Code generation 3. Lexical analysis 4. Code optimization
(1 + 01)* (0 + )
(0 +10) *
(11 +010) *
None of these
Lexical
(ab)*a
Regular Grammar
Multi-Tape TM
Type 0
Regular Grammar
Equivalent States
FA
Syntax
(a + b)*aa (a + b)*
CNF
Multi-Head TM
Type 1
Unambiguous Grammar
Unreachable State
NFA
Semantic
a*(a+b)*
Not a Regular Grammar
Universal TM
Type 2
Ambiguous Grammar
Finite States
NFA -
Code Generator
None of these
None of these
All of these
Type 3
None of these
None of these
None of these
None of these
None of These
82
83
84
85
86
87
88
89
90
Find a regular expression for strings of 0's and 1's which have no
pairs of consecutive 0's.
Which phase detects and ignores the comments?
The set of strings over {a, b} that contain the substring aa.
The Left Linear Grammar is
Modification of Simple Turing Machine(TM) can be done by
Regular Grammar is
Dangling else is a phenomenon related to
For minimization of Finite Automata we find
Any Regular Expression is easily converted to
91
92
(11+101)(1+0)* represents
93
94
95
n 2 states
2n states
n 3 states
A
B
A
D
D
C
C
B
A
B
25
Sr.
96
Question
Recursively Enumerable Grammar falls in
97
98
99
100
Answer A
Type 0
Answer B
Type 1
Eliminate not reachable
Eliminate Null Production
Variables
May go to halt-non final
May go to infinite loop
state
Always recognizable by
A proper subset of CFLs
PDA.
Recursively Enumerable
Regular Language
Language
101
Answer C
Type 2
Answer D
Type 3
Correct Answer
A
D
All of these
All of these
None of these
Finiteness
Regularity
None of these
Any unambiguous
Grammar
Any Grammar
Graph Coloring
None of these
None of these
Depends on DFA
105
Syntax Checking
Recognition of Tokens
106
True
107
Stored program
computers
False
Interpretive
implementation of
programming language
108
Contradiction
Contra-positive
Recurrence
109
False
True
Partially true
110
Zero Transition on an
alphabet
One Transition on an
alphabet
111
112
(00+11+01+10)* represents
For the language (00)*(11)* drawing/designing ____ is easier.
Strings ending in 10
Universal TM
113
Which of the following is not true with respect to regular expression? (a+b)* = (b+a)*
(ab)* = a*b*
(ab+ba)* = (ba+ab)*
(a+b)+ = (a+b)(a+b)*
114
Shift operation
Reduce Operation
Both A and B
None of these
Variables
Start Symbol
Terminal Symbol
117
FA
118
onto
surjective
119
Starting with 0
Ending in 0
Computability
All of these
Principle of Mathematical
Induction
Depends upon NFA
C
None of these
Contains substring 00
26
Sr.
Question
Total no. of substrings of the letter TOC (without considering NULL)
120
equal to
1
The depth of a complete binary tree is given by
Which of the following sorting algorithm is of divide-and-conquer
2
type?
The time factor when determining the efficiency of algorithm is
3
measured by
Answer A
Answer B
Answer C
Answer D
Dn = n log2n
Dn = n log2n+1
Dn = log2n
Dn = log2n+1
Bubble sort
Insertion sort
Quick sort
All of above
Counting microseconds
O(n)
O(log n)
O(n2)
f (n) + g (n)
f (n) x g (n )
A1
A2
A3
A4
log n
n2
nn
log n
nn
n2
Dijkstra's algorithm
Floyd's algorithm
Prim's algorithm
Warshall's algorithm
O(m)
O(n)
O(m + n)
O(log(m) + log(n))
Dynamic programming
Backtracking
Greedy method
log(n)
n/2
log(n/2)-1
7
8
9
10
11
12
13
14
15
16
The running time of an algorithm is given by T(n) = T(n -1) + T(n -2) T(n -3), if n > 3 n, otherwise.
Which of the following algorithms solves the all-pair shortest path
problem?
For merging two sorted lists of sizes m and n into a sorted list of size
m + n, we require comparisons of
Which of the following algorithm design technique is used in the
quick sort algorithm?
The correct matching for the following pairs is (A) 0/1 Knapsack (B)
Quick sort (C) Minimum weight (D) Connected Components (1)
Greedy (2) Depth-first search (3) Dynamic programming (4)
Divide and conquer
In the worst case, the number of comparisons needed to search a
single linked list of length n for a given element is
For the bubble sort algorithm, what is the time complexity of the
best/worst case? (assume that the computation stops as soon as no
more swaps in one pass)
Correct Answer
B
D
A
C
17
Every non-leaf node must Every non-leaf node must Every non-leaf node can
have M subtrees
have M keys
have at most M subtrees
18
O(n2)
O(n2 log(n) )
O(n log(n) )
O(2 log(n) )
27
Sr.
Answer C
Answer D
n*(n-1)/2
n -1
3n
n3
3
Halting Problem
best case: O(n log(n) )
worst case: O(n2)
Parallel Edges
24
Dynamic Programming
Backtracking Method
Greedy Method
25
26
27
Binomial Co-efficient
2
All of Above
best case: O(n2) worst
case: O(n2log(n) )
Cut Vertex
Divide and Conquer
Method.
None of above
Forest
Fractional Knapsack
Problem
A
A
23
Question
Answer A
Answer B
The number of edges in a Minimum Spanning Tree of a connected
n log(n)
n!
Graph G with n vertices is
Time Complexity of Tower of Hanoi Problem (Recursive) with n disks
n2
2n
is
Total Degree of a Triangle is
6
4
Travelling Salesman Problem is
NP Problem
P Problem
For the Quick sort algorithm, what is the time complexity of the
best case: O(log(n)) worst best case: O(n2) worst
best/worst case?
case: O(n2)
case: O(n log(n))
A Bi-connected Graph Certainly does not contain any
Cycle
Path
28
Greedy Method
NP Problem is
Polynomial Problem
19
20
21
22
22
29
30
31
32
33
34
35
36
C
D
B
C
A
D
Dynamic Programming
All of Above
x <y
x >y
x=y
log(n)
n log(n)
2n
nlog(n)
log(n)
n*n
O(n)
Stack
O(log(n))
Queue
O(1)
Hash Table
O(nlog(n))
None of these
A
B
37
38
Greedy Method
Backtracking
To find Minimum
Spanning Tree
Dynamic Programming
39
n2
n 2log(n)
40
n2
42
43
44
45
41
Correct Answer
To find a Cycle
Branch & Bound
n log(n)
n3
n 2log(n)
n log(n)
n3
Insertion sort
Selection Sort
Quick Sort
Merge Sort
O(2n)
O(n2)
O(n3)
O(2n)
9 edges
10 edges
11 edges
11 vertices
O(log(n))2
From left to right.
O(n)
From right to left.
O(n2)
Completely.
O(nlog(n))
None of these
D
A
28
Sr.
46
47
48
49
50
51
52
53
Question
The height of heap tree of N data is
A sorted array in ascending order is
Which of the following algorithm do not have a time complexity of
O(n2)
Consider the Array: 26, 35, 11, 49, 54, 30, 80. How array will look like
after 2 (two) iterations of Bubble Sort?
In a Selection Sort of n elements, how many times is the swap
function called in the complete execution of the algorithm?
Which of the following sorts have a O(n log(n)) Worst case
performance?
An hash table with chaining as a collision resolution technique
degenerates to a
Consider the following statements. I. An algorithm is a no. of steps to
be performed to solve a problem. II. To a given problem there may be
more than one algoritm.
Answer A
O(N)
MAX Heap
Answer B
O(N log(N))
MAX Heap
Answer C
O(log(N) )
Not a Heap Tree
Answer D
O(2N)
None of these
Bubble Sort
Shell Sort
Radix Sort
Quick Sort
None of these
n-1
n log(n)
n2
Insertion Sort
Quick Sort
Heap Sort
None of these
Stack
Queue
Linked List
Tree
Only I is correct
Only II is correct
None of these
None of these
None of these
None of these
None of these
None of these
O(n2 )
O(Cn), where C is a
constant
54
55
No. of Primitive
56
f(n) = (g(n) ) is
57
f(n) = (g(n) ) is
58
f(n) = O (g(n) ) is
59
60
O(n log(n))
O( log(n) )
61
O(n2)
O(n3)
O(n2 log(n) )
62
63
64
65
66
67
Correct Answer
B
None of these
2n -1
n-1
2n+1
Stack
Heap
Queue
Adjacency Matrix
Adjacency List
Incidence Matrix
None of these
O( |V| )
O( |E| )
O( |V| |E| )
O( |V|2 )
Vertex Cover
SAT(Satisfiable)
K-Colouring
All of these
29
Sr.
68
Question
Graphs are represented using
69
70
71
72
73
74
75
76
77
78
79
80
Answer B
Adjacency linked list
Underflow of registers
usage
O (log n)
Answer C
Adjacency Graph
O (n log n)
Answer D
Adjacency Queue
Underflow of run-time
stack
O (n2)
Stacks
Linked Lists
Strings
Binary Search
Linear Search
Tree Search
Hashing
2n
(2n-1)/2
2e
e 2 /2
Bubble Sort
Selection Sort
Quick Sort
Merge Sort
Ascending order
Descending order
Bitomic sequence
No specific order
merge sort
heap sort
None of these
bubble sort
f(n) x g(n)
Max ( f(n),g(n))
Min (f(n),g(n))
f(n) + g(n)
O(n2) time
O( log n ) time
O(n)
O(e2)
O(n2)
O(n)
O(m+n)
O(log(m) + log(n ))
n3
nn
Answer A
Adjacency tree
Overflow of run-time
stack
O (n)
Hash Tables
83
For merging two sorted lists of size m and n into a sorted size of m+n,
O(m)
we require comparisons of
The running time T(n) is given as T(n) = c + T(n-1) , if n >1 = d , if n<=1
n2
The order of the algorithm is
Which of the following shows the correct relationship?
O(nlog(n) ) < O(n)
84
85
The way a card game player arranges his cards as he picks them up
one by one , is an example of
Bubble Sort
86
87
88
Array
Uses a queue
89
Linked List
Uses a stack
Polynomial Time
algorithms are not exist,
hence can not be
discovered
81
82
Correct Answer
B
A
A
Insertion Sort
Merge Sort
None of these
Multilinked Structure
Searches a tree
A
B
No Polynomial Time
algorithm is discovered
yet
None of Above
30
Sr.
90
Question
If P(n) = n2 then what is correct?
Answer A
P(n) = n3
91
An algorithm
Is a finite set of
instructions
92
93
94
Answer B
P(n) = n4
Answer D
All of the above
Correct Answer
Aggregate Method
Answer C
P(n) = n2
Zero or more quantities
Any well defined
are externally supplied
computational procedure and at least one quantity
is produced.
Accounting Method
Potential Method
All of these
Divide
Recursion
Iteration
Conquer
g(n) = (n)
g(n) = O(n2)
g(n) = O(n3)
g(n) = (f(n))
Objective function
Selection function
All of these
Exponentiation
Binary Search
Backtracking
None of these
A
B
96
97
Merge Sort
98
99
Dynamic Programming
Greedy Method
Feasible solution
Finding Minimum
Spanning
Greedy Method
Dynamic Progamming
n(n-1)/2
n2
n 2 log(n)
n+1
In-order traversal
Preorder traversal
None of these
O (n3)
O (n)
O (n2 log n)
O (n2)
(1 )
(n )
(log(n) )
(nlog(n) )
Selection Sort
Bubble Sort
Quick Sort
Merge Sort
In-order Traversal
Objective function
Merge Sort
Greedy Method
Greedy Method
BFS
Feasible solution
Exponentiation
Dynamic Programming
Divide & Conquer
DFS
Selection Function
Minimum Spanning Tree
Backtracking
Dynamic Programming
None of These
All of these
Binary Search
None of these
None of these
A
D
B
B
C
NP
Both A and B
None of these
Union
Unsorted Array
Substitution Method
Intersection
Linear Linked List
Recursive Tree Method
Concatenation
Sorted Array
Master Method
Kleenes
Hash Table
All of these
A
C
C
Sparse Matrix
Dense Graph
Sparse Graph
None of these
95
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
31
Sr.
Question
Applying Prims algorithm to find Minimum Spanning Tree is more
117
suitable for
118 Algorithm analysis is useful for finding
Answer A
Answer B
Answer C
Answer D
Sparse Matrix
Dense Graph
Sparse Graph
None of these
Space Complexity
Time Complexity
Correctness
All of these
None of these
None of these
119
There must be
there should be the direct
Which of the following is not the required condition for binary search
mechanism to delete or
access to the middle
The list must be sorted
algorithm?
insert elements in the list element in any sublist
120
121
122
Gaming
123
127
Correct Answer
Graph
Priority Queue
Probabilistic
Brute-Force
Exponential Time
Linear Time
Logarithmic Time
2n, n!
n!, nlog(n)
n!, log(n)
Lower Bound
Upper Bound
log(m)
m*n
Satisfying constraints
Finiteness
Always optimal
Effectiveness
None of these
None of these
m+n
n2
Not a solution
Unambiguousness
C supports bit-wise
operators
None of these
None of these
A
D
- (hyphen)
_ (underscore)
& (ampersand)
| (pipe)
It is definition
It is function declaration
it is declaration
It is error
A
A
B
C
B
A
A
A
A
B
A
5
6
7
8
9
10
11
12
13
14
15
'1'
32 bits
long int
%ld
bits
!=
sizeof
??
short int
0 to 128
4
"1"
64 bits
long float
%li
bytes
!
!
$$
unsigned short int
0 to 255
8
1
128 bits
long double
Both A and B
words
&&
~
##
unsigned char
-128 to +127
16
32
Sr.
16
17
18
Question
Which of the following is not a valid floating point constant?
Which of the following character constant is used for bell?
Which of the following is not a valid variable name in C?
Answer A
-4.5
'\f'
max1
19
Answer B
78
'\r'
max$
Answer C
3.15
'\a'
max_1
Answer D
All are valid
None of the above
max_high
Correct Answer
B
C
B
extern
static
volatile
10
error
do-while
do-while
bit-fields
, (comma)
Object based
0 or 1
0
()
getche()
break
Both A and B
#
assigning pointer to same
type
*int a;
void
B
C
C
D
A
A
A
C
B
A
C
C
B
int a*;
auto
B
C
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
int pointer a;
int
ASCII value of A
while
while
union
. (dot)
Object oriented
1
45
. (dot)
getch()
continue
while(1) { }
Null ('\0') character
adding an integer to
pointer
int *a;
none
local
auto
static
20
37
38
local
register
static
global
39
40
A
A
depends on input
bit-fields
41
End of main()
structure
Allocating memory at run
time
group of variables of same
types
Both A and B
ampersand (&)
dot (.)
arrow (->)
Logical
Character array
declaring a function
return type
a group of variables
*x
Relational
Ends with NULL
defining a function
name of function
a variable
%x
Bit-wise
Stored as ASCII values
calling a function
parameters
same as structure
&x
Arithmetic
All of the above
All of the above
All of the above
None of the above
!x
A
D
B
D
A
C
42
43
44
45
46
47
48
49
A structure in C is
Which of the following operator is used to access structure member
if pointer to structure is used?
The && is ................ Operator.
What is true regarding C string?
Writing a prototype of a function is same as
The function header includes
An union in C is
Which of the following represents the address of variable x?
33
Sr.
Question
Answer A
If x is declared as an integer pointer, which of the following
x = &a;
incorrect?
Assume that p1 and p2 are structure variables of same type, which of
p1 = p2
the following is valid operation?
Answer B
Answer C
Answer D
Correct Answer
x = NULL;
x = 0;
x = 3456;
p1 = = p2
p1 != p2
52
global
static global
Both A and B
53
global
static
register
Both A and B
str + "Hello";
50
51
54
55
str = "Hello";
strcpy(str, "Hello");
56
57
It is pointer to pointer
58
%u
59
60
left-justified
main
61
62
Which one of the following C statement differs from others in effect? x++
x += 1
63
Which of the following operation is not valid for float data type?
%=
64
65
66
67
address of another
variable
It can store address of an
integer variable
Both A and B
Both A and C
%o
%x
%h
centre-justified
int
default case must be
present
User defined
register
A
A
x = +1
x=x+1
&&
<=
*=
/*-+=
+-*/=
*/+-=
false
always evaluated
false
always evaluated
right-justified
auto
use any variable with
All cases must have break
switch
68
69
Both A and B
70
nested structure
recursive structure
self-referential structure
71
nested structure
recursive structure
self-referential structure
34
Sr.
72
Question
Which function is used to deallocate the memory?
Consider following C statements int *p; p = (???) malloc(100); The
??? Is replaced with which of the following?
malloc() allocates memory in terms of .
How many bytes are used by near pointer in DOS?
How many bytes are used by far pointer in DOS?
If p is an pointer to integer, which of the following increments the
value of variable pointed by p?
Consider the following C statements. int y=50; const int x=y++;
printf("%d\n", x); What is output?
Consider the following C statements. int y=50; const int x=++y;
printf("%d\n", x); What is output?
Answer A
delete()
Answer B
remove()
Answer C
deallocate()
Answer D
free()
int
int *
int **
int &
words
2
2
bits
4
4
bytes
8
8
double words
16
16
C
A
B
(++*ptr)
(*ptr++)
Both A and B
50
51
error
50
51
error
80
-1
Error
81
-1
Error
82
0123456789
10
Error
83
0123456789
10
0000000000
Hello
Fine
Compile error
HelloFine
max(x, max(y,z));
max(max(x,y),z);
max(max(x,y),max(y,z));
exch(x,y);
exch(&x,&y);
exch();
exch(5,y);
Hello
Hello World
Hello World
Hello World
printf("\n");
printf("\\n");
printf("\n\");
printf("/n");
reserve word
library function
18
73
74
75
76
77
78
79
84
85
86
87
88
89
90
91
92
93
94
95
local variable
All the elements are of
same type
static variable
Array name is an address
of first element
Correct Answer
D
35
Sr.
Question
Which of the following declaration is true for "array of 5 pointers to
96
char"
When an array is passed as argument to function, what is actually
97
passed?
How many bytes are occupied in memory by following string? char
98
str[]="Computer";
99
if for a scanf("%s",str); input is "Hello World", the str stores
100 How can we declare generic pointer in C?
Answer A
Answer B
Answer C
Answer D
char **ptr[5];
char *ptr[5];
char (*ptr)[5];
10
11
Hello
Not possible
Hello World
generic *ptr;
World
NULL *ptr;
NULL
void *ptr;
A
D
101
dangling pointer
dealign pointer
null pointer
nomemory pointer
#define
const
enum
102
104
105
1234
24
135
12345
1234
135
13
12345
64
128
256
argument control
argument count
argument counter
Operating system
dependent
None of the above
x = *p + 1;
*p = *p + 1;
(*p)++;
counts from 0 to 9
file
if x is 6, (y = = 4) is not
evaluated
if x is 6, (y = = 4) is not
evaluated
program
if x is 4, (y = = 4) is
evaluated
if x is 4, (y = = 4) is not
evaluated
function
Both (x > 5) and (y = = 4 )
are evaluated always
Both parts of && are
always evaluated
108
x = y, y = 10
y = 10, x = y
x = 10, y = x
109
It is a variable
111
112
113
114
115
Defining a function
argument as register
block
110
Correct Answer
D
C
36
Sr.
116
117
118
119
120
121
122
Question
What the following code performs?
int count = 0;
for(i=0;i<10;i++)
if(!(a[i]%2)) count++;
Assume that p and q are pointers to integers, what will the value of p
-q?
Consider the following C statements. int a[10], *p; p = a; The
expression p+3 points to ....... Element.
Consider the following C statements.
int a[10];
int *p;
p = a;
The last statement p = a; is same as
Consider the following C structure.
struct {
int r_no;
char name[20];
} s;
Which of the following is true?
Consider the following C structure.
struct std {
int r_no;
char name[20];
} s;
What is output of sizeof(struct std) if integer is of 32-bits?
Answer A
Answer B
Answer C
Answer D
counts from 0 to 9
Another pointer
An integer
Can't say
a[0]
a[3]
a[6]
a[9]
p = a[0];
p = &a;
p = &a[0];
20
22
24
26
12
16
p = p + 2*2;
p = p + 2*4;
p = p + 2 * sizeof(int);
length of a string
number of character in
string
17
49
25
Invalid
17
49
25
Invalid
run time
during compilation
before compilation
123
Correct Answer
37
Sr.
128
129
130
131
132
133
Question
Consider the following C statements.
for(i=0;i<3;i++) {
printf("%d",i);
break;
printf("%d",i);
}
What would be the output of above?
Consider the following C statements.
for(i=0;i<5;i++) {
if(i = = 3)
continue;
printf("%d",i);
}
What would be the output of above?
How many bytes are allocated to variable of following union?
union data {
int x;
float y;
double z;
};
Consider the following C statements.
for(i=0;i<5;i++) {
if(i = 3)
continue;
printf("%d",i);
}
What would be the output of above?
Consider the following C statements. int a[5], sum = 0;
for(i=0;i<5;i++) {
if(!(a[i]%2))
continue;
sum += a[i];
}
Which of the following causes "unreachable statements" error in C?
136
Answer A
Answer B
Answer C
Answer D
Correct Answer
012
001122
Error
012
0124
01234
0124
01234
No output
Error
unconditional break
unconditional continue
unconditional return in
middle of function body
2 and 2
2 and 2.5
0xFFF8
0xFFFF
0x0000
Error
38
Sr.
Question
Consider the following C code?
union data {
int x;
char s[2];
137 } u;
u.s[0] = 5; u.s[1] = 3;
printf("%d %d %d",u.x);
What would be the output?
Answer A
Answer B
Answer C
Answer D
53
35
573
Error
10
20
30
Error
10,11,12
10,11,11
11,11,12
11,11,11
689
081
089
FFFF
FFFB
FFFE
Error
-1
Error
Correct Answer
39
Sr.
Question
Consider the following C statements. enum month
144 {JAN=5,FEB,MAR=8,APR,MAY}; printf("%d %d %d",++FEB,MAR,APR);
What would be the output?
Consider the following C statements.
enum
COLOR {RED, BLACK, GREEN, BLUE};
145
enum COLOR c;
Which of the following is incorrect?
void fun(int n) {
printf("%d", n);
n = - 1;
146 if(n > 0)
fun(n);
}
What would be output of above function when called as fun(5)?
What would be output of following C code?
int x = 10;
void main()
{
int x = 20;
147
{
int x = 30;
printf("%d ",x);
}
printf("%d ",x);
} hat would be output of following C code?
W
int x = 10;
void main()
{
int x = 20;
{
int x = 30;
148
printf("%d ",x);
}
f();
printf("%d ",x);
}
void f() {
printf("%d", x);
Answer A
Answer B
Answer C
Answer D
Correct Answer
689
081
089
Error
c = BLACK;
c = 2;
c = (enum COLOR)2;
54321
12345
543210
10 20
20 30
30 20
Error
10 20 30
30 10 20
30 20 10
Error
40
Sr.
Question
What would be output of following C program?
void main()
{
int i;
for(i=0;i<5;i++) fun();
149 }
void fun() {
static int x = 10;
printf("%d ",x);
x += 2;
}
What would be output of following C program?
int y = 3;
void main()
{
int i;
for(i=0;i<5;i++) fun();
150 }
void fun() {
int y = 5;
static int x = 10;
printf("%d ",x);
x += y;
}
Answer A
Answer B
Answer C
Answer D
10 10 10 10 10
10 12 14 16 18
10 11 12 13 14
Error
10 10 10 10 10
10 13 16 19 22
10 15 20 25 30
Error
Both A and B
an array
Both A and B
A
B
2
3
5
6
7
8
9
10
11
12
13
Correct Answer
Array
Linked list
left-root-right
Stack
Tree
left-right-root
Linked list
Graph
root-left-right
D
B
C
Linear
Binary
Hashing
inorder
inorder
Tree
Stack
preorder
preorder
Linked list
Queue
postorder
postorder
Stack
Both A and B
B
C
A
A
Stack
Queue
Both A and B
41
Sr.
15
16
17
Question
Which of the following data structure allows operations at both the
ends?
A simple queue uses ............. order.
Insertion operation occurs at .............. end in a queue.
Deletion operation occurs at ............ end in a queue.
18
Which of the following points to element to be deleted next in stack? front pointer
rear pointer
top pointer
19
overflow
underflow
Both A and B
20
overflow
underflow
Both A and B
21
Linear
Binary
Hashing
22
23
Root
24
More complex
25
26
Leaf
Not processed directly by user dened data types in
C are examples are nonmachine instructions
primitive
Computed address
Linked address
Computed address
Linked address
Sequential address
Sequential address
C
B
27
Run, dynamic
Compile, dynamic
Compile, sequential
28
Both A and B
29
30
31
32
33
Root node
Root node
Array
only one pointer
infix expressions
processed by machine
directly
Leaf node
Leaf node
Linked list
two pointers
prefix expressions
Intermediate node
Intermediate node
Both A and B
no pointers
postfix expressions
B
A
C
B
D
34
infix
prefix
postfix
35
can be NULL
Both A and B
36
queue
dqueue
stack
37
38
39
C
A
B
simple queue
dqueue
circular queue
14
40
41
Answer A
Answer B
Answer C
Answer D
Stack
Queue
Both A and B
FIFO
front
front
LIFO
rear
rear
LILO
top
top
A
B
A
Run, compile
Correct Answer
42
Sr.
42
43
Question
If singly linked list allows insertion at the end and deletion at the
start, it implements .................... data structure.
If singly linked list allows insertion and deletion only at start, it
implements .................... data structure.
Answer A
Answer B
Answer C
Answer D
queue
stack
dqueue
circular queue
queue
stack
dqueue
circular queue
B
B
44
45
root node
Correct Answer
46
acyclic graph
directed graph
47
48
linear search
push
Binary search
pop
Array
Tree
Graph
50
linear search
Binary search
hash search
51
Which of the following list points to previous and next node both?
Circular list
Search
Insertion
Deletion
stack
List
Tree
49
53
Which of the following binary tree operation does not change the
tree?
Which of the following data structure is hierarchical?
54
55
56
57
58
59
60
52
61
62
Queue
Difference
of heights of
Difference of heights of
Difference of heights of
left
and
right
subtrees is <=
left and right subtrees is 0 left and right subtrees is 1
1
Largest of all
smallest of all
Any value
Non leaf nodes have 2-3
Length of path from root
It is height balanced tree
offsprings
to each leaf is same
Largest of all
smallest of all
Any value
dqueue
circular queue
priority queue
Array
Binary tree
Both A and B
Simple binary tree
Complete binary tree
AVL tree
stack
Changing value of an
element
Changing value of an
element
row-major
Array
stack
Infix expression
63
64
65
66
67
68
In a priority queue, two elements with same priority are processed in Random manner
Can't say
None of the above
None of the above
2-3 tree
B
C
A
B
queue
list
tree
Reading an element
Deleting an element
column-major
stack
queue
Postfix expression
Both A and B
tree
linked list
Prefix expression
Implementation
dependent
Any of A and B
queue
None of the above
All of the above
A
C
B
B
FCFS manner
43
Sr.
Question
Answer A
Answer B
69
Recursion
Parameter passing
70
Linear
71
Answer D
Binary
Answer C
Evaluating postfix
expression
Hash
Inorder
Preorder
Correct Answer
postorder
72
Deletion operation is
faster
73
Circular list
queue
list
tree
queue
dqueue
74
75
76
77
insertion restricted
dqueue
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
D
C
A
B
Random
Random
Root node
Root node
Middle node
Middle node
Leaf node
Leaf node
C
A
Both A and B
15
23
35
Both A and B
Traversal
44
Sr.
94
95
96
97
98
99
Question
Answer A
Answer B
Which of the following property is used by binary search but ignored
Maximum value of the list Median of the list
by linear search?
Which is most suitable data structure to maintain the ready-queue in
Array
Linked list
process management?
result in infinite loop if not
Which of the following is true for recursion?
Uses stack
handled properly
Printing Fibonacci
Which of the following is not suitable for recursion?
Reversing a given string
numbers
If function calls itself, it is an example of ............... recursion.
direct
indirect
Empty left link to point to Empty right link to point to
Inorder threaded binary tree uses
inorder predecessor
inorder successor
100
To delete a node from a binary search tree having both the subtrees find inorder successor of
non-empty needs to
the node to be deleted
101
Answer C
Answer D
Correct Answer
Tree
Graph
tail
Both A and B
Both A and B
Both A and B
zero matrix
Tree traversals
D
A
near-zero matrix
finding inorder
predecessor
sparse matrix
1's complement
2's complement
No-complement
10's complement
Postorder
BFS
DFS
105
k/2
h(k)
log k
Stack
Linear queue
Circular queue
< 2N -1
= 2N -1
> 2N-1
102
106
107
108
109
110
111
112
113
114
115
m(m+1)
m(m+2)
m2
2004
2008
2016
2020
2m bytes
2m+1 bytes
2(2m+1) bytes
2m2 bytes
4004
4008
4012
4016
a+i
a+i*2
a+i*4
a + i * sizeof(data type)
2010
2012
2014
2016
2010
2012
2014
2016
top = N - 1
top = 0
45
Sr.
116
117
118
119
Question
If a stack is implemented using array A[0..N-1], the initial value of top
of the stack pointer is
If a linear queue is implemented using array A[1..N], the initial values
of front and rear pointers are
If a linear queue is implemented using array A[1..N], which of the
condition represents queue is full?
If a linear queue is implemented using array A[1..N] and if front and
rear pointers are pointing at same location within queue, how many
elements queue can have?
Answer A
Answer B
Answer C
Answer D
Correct Answer
top = 0
top = 1
top = -1
front = rear = -1
front = rear = 0
front = rear = 1
rear = N
front = rear = N
front = N
120
N+1
results in overflow
121
N+1
rear + 1 = front
124
125
126
15
Binary tree
31
Strict binary tree
63
Complete binary tree
127
All of the above
B
C
127
In which of the following tree, every node has exactly two childs?
Binary tree
Both A and B
128
RPTR = NULL
122
If in a binary tree LPTR and RPTR denotes pointers to left and pointer
129 to right subtrees respectively, which of the following condition for
LPTR = NULL
given node determines whether it is leaf node or not?
130
Which of the following determines that the binary tree has only one LPRT and RPTR of root
node?
node are NULL
131
Linked representation
Array representation
Both A and B
132
30
31
32
2i
2i+1
2i
2i+1
2i
2i+1
133
134
135
136
46
Sr.
Question
If a binary tree is stored in array,the right child of node at position 5
is at
Which of the following is valid sequence in an array representing 3ary max-heap?
A binary search tree is build by inserting numbers in following
sequence. 10 1 3 5 15 12 16 What is the maximum height of a leaf
from root node?
A binary search tree is build by inserting numbers in following
sequence. 7 5 1 8 3 6 0 9 4 2 What would be the inorder traversal of
resulting tree?
Assume that array A[1..N] is used to implement double stack. Two
stacks grow from opposite side and top1 and top2 are the top
pointers for them. Which of the following is "stack full condition"?
Answer A
Answer B
Answer C
Answer D
10
11
135689
963185
936851
956831
0246813579
9753102468
0123456789
top1+top2 = N
top1 = top2 -1
bc/a+de*-
ab+cd-/e*
ab+de*c/
Assume that the following are the sequence resulted using the
143 inorder and preorder traversal of a binary tree. Inorder: 5 7 10 13 15
17 Preorder: 10 5 7 15 13 17 What is correct postorder sequence?
7 5 13 17 15 10
7 5 13 10 15 17
5 7 13 17 15 10
144
145
*+ab/c-dg
{25,12,16,13,10,8,14}
*a+bc/-dg
{25,14,13,16,10,8,12}
-*a/+bcdg
{25,14,16,13,10,8,12}
D
C
146
Assume that first is a pointer to singly linked list having more than 2
2 nodes, what is the effect of following operation? first = first->next;
Inserts a node
No effect
Inorder
preorder
postorder
level order
Node is found
Either of A or B
Mesh
Ring
Star
Bus
137
138
139
140
141
142
Correct Answer
C
100 Hz to 5MHz
100 Hz to 500MHz
None of these
45
90
68
180
Network Layer
Transport Layer
Physical Layer
47
Sr.
Question
Answer A
Port number is
Process Number
Answer B
Computer's Physical
Address
Switch
9
10
11
Segmentation is done at
Congestion Control is done at
Manchester Code is
Transport Layer
Physical layer
Non-return to zero code
12
The bandwidth
requirement is different
13
Error checking
Repeater
Allow user to login one
machine from distant
machine
Network Layer
Data link Layer
polar code
clocking is derived from
data in synchronous
transmission
collision avoidance
14
Bits
Segments
15
16
17
Coaxial Cable
18
Answer C
Answer D
Equivalent to IP Address
None of these
Minimum Transmission
Unit
Router
Maximum Transmission
Unit
Bridge
Correct Answer
A
D
B
Physical layer
Transport Layer
bipolar code
A
D
D
clock synchronization
Frames
Packets
No of pulse transmitted
per unit time
All of these
Microwave transmission
Buffer memory
Interfaces
Modems
19
20
checksum
CRC
two-dimetional parity
check
21
nonzero
zero
22
23
24
25
ALOHA
26
Pure ALOHA
27
28
Error correction
Balanced Multipoint
Ring Network
Error generation
Full Duplex
Star Network
both A and B
Multipoint Link
Mesh Network
D
B
B
None of these
both A and B
None of these
Baseband
CSMA/CD
Broadband
both A and C
BLAST
SDLC
ZMODEM
HDLC
48
Sr.
Question
29
what is a MAC?
Answer A
It is Network layer address
of the NIC that cannot be
modified
Answer B
It is Network layer address
of the NIC that can be
modified
Answer C
It is Data-Link layer
address of the NIC that
cannot be modified
Answer D
It is Data-Link layer
address of the NIC that can
be modified
Correct Answer
A
In the sliding window protocol, if the window size is 63, what is the
range of sequence number?
The Hamming distance between 001111 and 010011 is
What addressing information is shipped with every network
interface card?
0 to 64
0 to 63
1 to 64
1 to 63
IP Address
MAC Address
ARP Address
All of these
33
34
II
35
36
30
31
32
I and II
None of these
After packets
After Data
Before packets
Before Data
37
38
Ethernet
Token Ring
Token Bus
39
40
RIP is based on
41
42
43
OSPF is based on
BGP is based on
44
Create LSA's
45
Hop-to-Hope delivery
46
47
48
49
DTE/DCE Interface
Dijkstra's algorithm
All of these
A
D
Station-to-Station delivery
Tansmission Control
Protocol (TCP)
Add more memory to
router
All of these
Fiber
UDP
Coaxial Cable
STP
Coaxial Cable
CAT4 UTP
Fiber cable
CAT5 UTP
Implement summarization
49
Sr.
Question
Answer A
Answer B
inserting 0 in user data
stream to differentiate it
with a flag
Answer C
50
51
255.255.240.0
255.255.192.0
255.255.252.0
class A
class C
class D
class B
1-2-3-4-5-6
1-2-4-5-3-6
1-3-4-5-6-2
1-2-5-4-3-6
In NVRAM
In RAM
On TFTP Server
54
55
56
57
Let in IPv4 datagram, total length is 461 bytes and length of data is
433 bytes, so determine the header size in bytes
28
27
58
IP has
52
53
59
60
61
In ROM
Because it can not
Beacause it allows remote automatically provide
configuration
Information to
management info base
Segments can be placed
Can issue the NOT READY
back into their correct
indicator
sequence at destination
32
224
Congection control
mechanism
Both A and B
None of these
8192
65536
32768
16384
5 msec
7 msec
1.056 sec
None of these
Retransmission
Persistence
63
The primary functions of the ARP that resides in Internet hosts and
routers is
64
Congestion at Routers
66
67
68
All of these
62
65
Correct Answer
Source IP address is
The router uses
changed at each router to destination IP address to
identify the sending router consult its routing table
Answer D
Keep alive
All of these
Destination IP address is
changed at each router to
reflect the next hop
To translate IP addresses
to LAN addresses
Overflow of buffer at
receiver
Duplication of Datagrams
B
A
254
126
510
16372
1 and 2 Only
2 and 3 Only
1 and 3 Only
1, 2 and 3
Authentication
Authentication
Integrity
Integrity
Non-repudiation
Non-repudiation
Privacy
All of these
D
D
50
Sr.
Question
Answer A
Which of the following is one of the most important tasks to perform
FTP Server
when hardening a DNS Server?
Simplify the storage of
What is the primary purpose of the FTP server?
files
Answer B
DNS Server
NNTP Server
71
UDP port 21
TCP port 21
UDP port 69
72
Checksum
sequence number
packet number
source address
73
What is the maximum size of the data that application layer can pass
Any Size
on to the TCP layer below?
216 byte
1500 byte
74
75
76
Simplex
SPX
Half-Duplex
UDP
Full Duplex
ICMP
All of these
TCP
B
B
X3 + X +1
X2 + X +1
X4 + X +1
X4 + X +1
69
70
77
Answer C
Answer D
Correct Answer
78
Start and Stop bits are used in the serial communication for
Error detection
Error correction
Synchronization
79
Piggybacking is a method of
Backtracking
Forwarding
80
16
81
82
83
84
85
86
89
90
91
87
88
92
Frame-1
Frame-2
Frame-0
None of these
Go-back-N
Selective repeat
Both A and B
Time To Live
Time To Learn
Time To Leave
a perticular network
A perticular computer
A perticular person
Input
Reset
Radio
Time To Link
The perticular location of a
computer
CheckBox
<td align="left">
<td ralign="left">
<tdleft>
D
B
A
B
D
B
A
A
A
51
Sr.
93
94
Question
In HTML, Which of the following attributes of text control allow to
limit the maximum character?
Answer A
Answer B
Answer C
Answer D
Maxlength
Size
Length
None of these
<BODY>
<INPUT>
<VALUE>
<SELECT>
<h1>
SUBMIT
Unformatted tag
<CAPTION>
<heading>
ON SUBMIT
Empty tag
<DATA>
<h6>
ACTION
Format tag
<GROUP>
<head>
METHOD
None of these
<TABLE>
A
A
B
D
REV
URL
REL
None of these
HTML Extension
One
HMT Extension
Three
TMH Extension
Two
None of these
Four
A
B
95
96
97
98
Correct Answer
102
Which of the following will display the line with more thickness?
cannot be determine
both B and C
103
104
Internet chat
Web browsing
Ping
105
One of the header fields in an IP datagram is the (TTL) field. Which of It can be used to prioritize It can be used to reduce
the following statements best explains the need for this field ?
packets
delays
106
In the slow start phase of TCP congesting control algorithm, the size
of the congestion window
Increases linearly
Increases quadratically
107
108
an intersection table.
109
a normalized definition
table.
SOAP
SGML
SQL
ADO
32 bits
128 bytes
64 bits
128 bits
Static
Dynamic
PAT
100 kbps
1 Mbps
2 Mbps
10 Mbps
TCP
ARP
ICMP
BootP
Increases exponentially
52
Sr.
Question
Which class of IP address has the most host addresses available by
115
default?
Answer A
Answer B
Answer C
Answer D
Correct Answer
Both A and B
116
A network with more than A network with more than A network with only one
one exit point
one exit and entry point
entry and no exit point.
117
118
So application developers
To create a layered model
So different networks
can change only one layer's
larger than the DoD model
could communicate.
protocols at a time.
119
TCP
ICMP
ARP
BootP
1 and 3
2 and 4
1, 3 and 4
1225
1280
50
99
30000 bps
60000 bps
75000 bps
3000 bps
12
16
10 microsecond
0.1 microsecond
1 microsecond
0.001 micosecond
240
250
300
TTF
FFT
FTT
120
121
122
123
124
125
State True (T) and false (F) of the following (respectively). 1. Hub is
126 multi-port repeater 2. Bridge has filtering capability 3. The bridge
changes the MAC address
TTT
127
43
50
90
128
129
P2 equals to P1
P2 is larger than P1
P2 is smaller than P1
53
Sr.
Question
Answer A
Answer B
Answer C
Answer D
0.06521
0.3
None of these
3%
10%
5%
15
16
7.1sec
12.5sec
None of these
SR Protocol
Stop-n-wait protocol
None of these
67%
50%
None of these
1000
5000
100000
10000
329.14 second
329.14 ms
330 second
330 ms
Fradment offset
Source IP address
Destination IP address
ping
Tracert
A Only
A and B Both
10 subnet-10 hosts
1 subnet-254 hosts
1 subnet-1 hosts
None of these
Byte
word
Correct Answer
54
Sr.
145
146
147
148
Question
Answer A
Answer B
Answer C
Answer D
Broadcast, Unicast
Unicast, broadcast
Broadcast, broadcast
Unicast, unicast
22,64
20,60
28,56
30,60
255.255.0.0
255.255.64.0
255.255.128.0
255.255.252.0
94
416
464
512
None of these
500m of cable
200 m of cable
20m of cable
50m of cable
2n
2n-1
2n-1
2n-2
12.0.0.1
168.172.19.39
172.15.14.36
192.168.24.43
Gateway DP
Proxy ARP
Application
Host-to-Host
Internet
Network Access
NAT Fast
NAT Static
NAT Overload
Overloading Static
socket
bind
listen
connect
40
27
None of these
1 GHz to 10 GHz
spreading
dispersion
traversal
None of these
Correct Answer
55
Sr.
Question
Answer A
Answer B
Answer C
Answer D
802.11
802.16
802.3
802.5
infrastructure mode
Mix mode
adhoc mode
None of these
microwave range
One-way handshaking
visible light
Two-way handshaking
A and B Both
Three-way handshaking
None of these
None of these
5000 bytes
4000 bytes
1000 bytes
6000 bytes
keepalive Timer
Time-wait Timer
Stowatch timer
None of these
Stream Control
Transmission Protocol
Special Control
Transmission Protocol
Safety Control
Transmission Protocol
bit-oriented protocol
byte-oriented protocol
None of these
bit-oriented protocol
byte-oriented protocol
None of these
bit-oriented protocol
byte-oriented protocol
None of these
Super Control
Transmission Protocol
message-oriented
protocol
message-oriented
protocol
message-oriented
protocol
intradomain routing
autonomous routing
interdomain routing
None of these
intradomain routing
autonomous routing
interdomain routing
None of these
TCP
BGP
creating multicast
backbone
TCP
techniques to handle
dynamic documents
image compression
techniques
Delay
time limit
encapsulation
RIP
RIP
OSPF
OSPF
Both B and C
None of these
D
A
None of these
IP
techniques to handle
multimedia documents
image handling
image editing techniques
techniques
Jitter
gap
left field
timer field
tunneling
tunning
None of these
None of these
None of these
None of these
hop limit
mixing
A
D
A
50
2000
40
BOOTP
techniques to handle
static documents
90
Correct Answer
56
Sr.
Question
Answer A
Answer B
Answer C
Answer D
1 kbps
4 kBps
4 kbps
7 kbps
8kbps
16 kBps
32 kBps
448 kbps
HELO
MAIL FROM
RCPT TO
None of these
187 What is the port number for Domain Name System service DNS?
53
54
61
60
188
20
25
23
24
189
What is the port number for (File Transfer Protocol - Data) FTP?
20
21
22
35
20
25
23
24
161
149
144
143
10
datagram switching
7
circuit switching
9
frame switching
8
none of the above
B
A
source
destination
local
none of these
process-to-process
communication
host-to-host
communication
connection-oriented
delivery
190
191
192
193
194
flow control
transport address
network address
file type
data structure
199
access commands
DATA
ACK
the connection is
terminated
path
protocol
CGI
Java stand-alone
programs
202
Correct Answer
C
D
C
D
C
A
C
B
C
57
Sr.
Question
216
217
Answer A
Answer B
Answer C
UDP
IP
TCP
persistent
nonpersistent
persistent and
nonpersistent
URL
status code
GET
POST
COPY
HEAD
POST
COPY
a static
an active
a passive
POP3; IMAP4
IMAP4; POP3
SMTP; POP3
80176 bps
38821 bps
Gain of 80 dB
Answer D
Correct Answer
C
A
A
a dynamic
None of the choices are
correct
32681 bps
81056 bps
Loss of 80 dB
Gain of 20 dB
Loss of 20 dB
0.75 micrometer
7500 pm
400 m
Data insufficient
Loss of 7 dB
Gain of 7 dB
Loss of 5 dB
Gain of 5 dB
600
800
876
1200
0.5
0.625
0.75
58
Sr.
218
219
220
221
222
223
224
225
Question
Answer A
Answer B
Answer C
Answer D
C2 assumes C1 is on
same network, but C1
assumes C2 is on a
different network
C1 assumes C2 is on
same network, but C2
assumes C1 is on a
different network
225.255.255.0
255.255.255.128
255.255.255.192
255.255.255.224
physical
AAL1
ATM
AAL2
Application adaptation
AAL5
None of these
None of these
B
C
VDSL
ADSL
SDSL
None of these
twisted-pair cable
coaxial cable
fiber-optic cable
None of these
connectionless
virtual
connection-oriented
None of these
Flow
Error
Congestion
None of these
data
control
None of these
226
227
228
must be a power of 4
must be a multiple of
must be a power of 2
256
must be evenly divisible
must belong to one of
by the number of
the A, B, or C classes
addresses
2.4.6.16
2.4.6.64
12.2.2.32
12.2.2.64
be a power of 2
be a multiple of 128
be divisible by 128
/9
/8
/16
classless
classless
/20
/19
/20
Correct Answer
C
C
A
B
B
D
59
Sr.
Answer A
Answer B
Answer C
Answer D
Correct Answer
next-hop
network-specific
host-specific
default
classful addressing
classless addressin
reduce
increase
routing processor
switching fabrics
error checking
error correction
offset number
total length
is 20 to 60 bytes long
is 20 bytes long
last two cells; last three
cells
235
236
237
238
241
242
243
244
245
Question
datagram
None of these
acknowledgmen
the first byte of the
None of the choices are
datagram is byte 800
correct
both offset number and None of the choices are
the total length
correct
is 60 bytes long
is 80 bytes long
None of the choices are
last cell; last two cells
correct
None of the choices are
LIS
correct
C
D
C
C
A
C
LAN
the destination IP
address in the datagram
header
0x000000000000
0.0.0.0
variable
class dependent
If a host needs to synchronize its clock with another host, it sends timestamp-request
a
message
249 Multicast link state routing uses the which kind of tree approach. source-based
group-shared
250 MOSPF is a
data-driven protocol
command-driven
protocol
1, 1
1, n
n, 1
LAS
247
routers
source-quench message
destination hosts
router-advertisement
message
routers or destination
hosts
n, n
C
B
A
A
60
Sr.
Question
Answer A
Answer B
Answer C
Answer D
Correct Answer
1, 1
1, n
n, 1
n, n
1, 1
1, n
n, 1
n, n
16 bits
32 bits
64 bits
128 bits
multistream services
multihoming service
multistream and
multihoming services
host
network
client
B
B
257
UDP process
TCP Process
SCTP process
258
UDP process
TCP Process
SCTP process
259
UDP process
TCP Process
SCTP process
260
more
less
same
Internet Explorer
HTML
Web Browser
None of thse
<UL>
12 characters
<OT>
18 characters
<OL>
22 characters
None of these
24 characters
C
D
B
A
D
A
264
Both A and B
None of these
265
Both A and B
None of these
1.544
1.544
44.736
44.736
2.048
2.048
155.52
155.52
A
B
HELO
STOP
QUIT
NOOP
None of these
266
267
61
Sr.
Question
Answer A
Answer B
Answer C
Answer D
only S1
Only S2
Both S1 and S2
None of these
Router
Repeater
Switch
Gateway
S1 true, S2 false
S1 false, S2 true
274
Connects multiple
segments
Segments by MAC
addresses
S1 true, S2 false
S1 false, S2 true
276
2 bit
3 bit
8 bit
9 bit
277
None of these
278
1 microsecond
8 microsecond
1 milisecond
8 milisecond
2.50%
7.40%
8.70%
2000 KM
3000 KM
4000 KM
150 kbps
200 kbps
250 kbps
4 km
2.7 km
4.8 km
Correct Answer
62
Sr.
Question
Answer A
Answer B
Answer C
Answer D
10 microsecond
11 microsecond
None of these
40000
5000
None of these
0.4 second
1 second
None of these
116 ms
21 ms
29 ms
10 RTT
8 RTT
14 RTT
TTF
TFF
TTT
FTF
15
30
105
225
A 4 Mbps token ring has token holding time value of 10msec. What is
40000
the longest frame (in bytes) that can be sent on this ring?
Let TCP operates over a 10Gbps link. If TCP uses the full bandwidth
285 continuously, how long would it take the sequence numbers to
4 ms
wraparound completely?
if TCP RTT is currently 20 ms and ACK comes in after 30 ms then what
286 is the timeout period for the next transmission? Use alpha=0.9 and
84 ms
Beta=2.
Assume a TCP implementation over a 10Gbps link with one way delay
of 80ms. If TCP receiver window is 2MB and TCP send 1kB packet then
11 RTT
287
how many RTTS does it take until slow start opens the congestion
window to 2MB? Assume no congestion and no packet lost.
State true (T) and false (F) of the following Persistent connection is
288 default in HTTP 1.1 HTTP supports proxy servers HTTP uses well
known port 23
There are 15 users communicationg to each other. How many pairs
289 of the keys are required to authenticate the communication is
symmetric key is used?
290
The initial 8 bits of the IP packets are 01000010, Then what will be
the version of IP version
An IP pcaket has arrived with the first few hexadecimal digits as
292 below, then how many hops this packet can travels?
45000028000100000102
293 Kerberos is a
If transmitted bit sequence is 111000111000 the which of the
294
following is a example of burst error
291
Correct Answer
Configured to allow
Restrict the use of specific Limits the speed in which
Physically protects the
certain ports to access the
transmission of data is
network from catching fire application software on
VPN
the network
carried out
IP version 4
IP version 6
Both
None of these
Only 1 Hop
Only 2 Hop
Only 3 Hop
None of these
Authentication protocol
Security protocol
Integrity protocol
None of these
111100111000
111000111100
111010111000
111111111000
Xreference
295
XHTML
XL Link
Xpath
296
DOM is a
Coding style
Document model , a
specification
SAX
Either A or B
None of these
63
Sr.
Question
Answer A
298
XML Schema divides data types into two main categories they are
Simplex, Complex
Answer B
Machine dependent,
machine Independent
Answer C
Answer D
Standard, custom
String, Number
Schema
DTD
XSLT stylesheet
Both A and B
SOAP
RemoteXML
XML-RPC
None of these
AND
NOR
ease of avoiding problems
due to hazards
DTL
12 to 99 gates
Serial to parallel
conversion
NOT
lower hardware
requirement
TTL
100 to 10000 gates
XOR
MOS
More than 10000 gates
A
D
All of these.
None of above.
None of these
faster operation
RTL
1 to 11 gates
Parallel to serial
conversion
Combinational logic
circuit.
Very large scale
integration
Correct Answer
D
adding 1 to 1's
complement
calculating 1's
complement and inverting
Most significant bit
1234
ABCD
1001
DEFH
Overflow
Carry
Parity
Sign value
8-bits
16-bits
23-bits
64-bits
B
B
B
12
13
14
The values that exceed the specified range can not be correctly
represented and are considered
In ANSI/IEEE Standard 754 ' Mantissa ' is represented by _________
bits
BCD to 7-Segment decoder has
The decimal 8 is represented as _________ using Gray Code.
A NAND gate's output is LOW if
15
16
17
18
19
20
21
22
10
11
A
C
D
A
D
B
A
B
64
Sr.
23
24
25
Question
An example of SOP expression is
Half-Adder Logic circuit contains _____ XOR Gates
Using multiplexer as parallel to serial converter requires
___________ connected to the
26
A demultiplexer has
27
Answer A
A + B(C + D)
1
A parallel to serial
converter circuit
one input and several
outputs
Answer B
A'B + AC' + AB'C
2
Answer C
(A' + B + C)(A + B' + C)
4
Answer D
both (a) nad (b)
6
A counter circuit
Correct Answer
B
A
A
A
AND
OR
NOT
XOR
29
30
31
32
AND
NOT
1
Gray code
NOT
Generic Array Logic
7
excess 3-code
XOR
Generic Analysis Logic
8
BCD code
C
A
C
D
33
OR
General Array Logic
2
ASCII code
Emitter complementary
logic
JK Flip flop
D Flip flop
T Flip flop
A+BC
571
B+A
572
AB+BC
-571
B+AC
-572
D
B
Offset value
to encode data
to decode data
28
35
36
37
34
38
39
which of the following rules states that if one input of an AND gate is
A +1 =1
always 1, the output is
A +A =A
A.A = A
A.1= A
40
A = A'
AA = A
A+1=1
A+0=A
41
42
86
1101
87
1011
88
0101
89
1100
A
C
2-bit
7-bit
16-bit
16-bit
less expensive
not sensitive to
electrostatic discharge
faster
4-to-2
4-to-4
8-to-1
8-to-4
an exclusive-Or
AB+C = A+BC
A(B+C) = B(A+C)
AB=BA
A+B=B+A
43
44
45
46
47
65
Sr.
48
49
50
51
52
Question
(A+B).(A+C) = ___________
A.(B + C) = A.B + A.C is the expression of _________________
A.(B.C) = (A.B).C is an expression of __________
A non-standard POS is converted into a standard POS by using the
rule _____
Answer A
B+C
Demorgan's Law
Demorgan's Law
Answer B
A+BC
Commutative Law
Distributive Law
Answer C
AB+C
Distributive Law
Commutative Law
Answer D
AC+B
Associative Law
Associative Law
Correct Answer
A+A(bar) = 1
AA(bar) =0
1+A=1
A+B = B+A
a 2-cell group of 1s
a 8-cell group of 1s
a 4-cell group of 1s
a 4-cell group of 0s
12
16
B
C
D
12
16
55
56
57
The 3-variable Karnaugh Map (K-Map) has _______ cells for min or
max terms
The 4-variable Karnaugh Map (K-Map) has _______ cells for min or
max terms
On a Karnaugh map, grouping the 0s produces
Which gate is best used as a basic comparator?
A particular Full Adder has
a POS expression
NOR
exclusive-OR
a SOP expression
OR
3 inputs and 3 output
AND-OR logic
AND
2 inputs and 2 output
A
C
A
58
59
+7 to -8
+8 to -7
+9 to -8
-9 to +8
E^2CMOS
TTL
CMOS+
61
62
63
64
65
One
AND, OR
4
EX-OR&AND
Carry
Two
NAND, NOR
8
EX-OR&OR
Remainder
Three
NAND, XOR
16
EX-OR&NOT
Sum
Four
NOT, XOR
12
None of this
None of this
B
B
A
A
C
66
For getting an output from an XNOR gate, its both inputs must be
high
low
67
68
69
x NAND X
1
100
x NOR x
0
111
x NAND 1
x NOR 1
001
110
D
C
D
B70B
111
B709
1111
48F6
1001
48F5
110
C
C
Undefined
One
Zero
10 (binary)
voltage
current
watt
TTL
CMOS 5 Series
unit loads
Power dissipation of all
circuits increases with
time.
53
54
60
70
71
72
73
74
75
66
Sr.
Question
A logic circuit with an output X = A(Bar)BC+AB(Bar) consists of
________.
To implement the expression AB(bar)CD+ ABC(bar)D+ ABCD (bar), it
takes one OR gate and
Determine the values of A, B, C, and D that make the sum term
A(bar) + B+C(bar)+D equal to zero.
Answer A
two AND gates, two OR
gates, two inverters
three AND gates and three
inverters
Answer B
Answer C
three AND gates, two OR two AND gates, one OR
gates, one inverter
gate, two inverters
three AND gates and four
three AND gates
inverters
Answer D
two AND gates, one OR
gate
one AND gate
A = 1, B = 0, C = 0, D = 0
A = 1, B = 0, C = 1, D = 0
A = 0, B = 1, C = 0, D = 0
A = 1, B = 0, C = 1, D = 1
79
A.B.C
A+(B.C )Bar
A(Bar).B(Bar).C(Bar)
A.B(Bar)+C
80
81
Adjacent 1s detector circuit will have active low output for the input
1101
1010
0110
1011
2nd
3rd
4th
2-to-8 encoder
(1100)2
4-to-16 encoder
(0011)2
451
76
77
78
82
83
84
85
86
87
BCD-to-Decimal
(1001)2
C
B
351
251
151
10100
11000
10010
None
a) AB+CD
D(C+A) (C+D)(C+D)+(A+B)
4 half-adders, 12 fulladders
16 half-adders, 0 fulladders
DTL
TTL
HTL
(A+B)+C=A(B+C)
A.(B+C)=(A.B)+(A.C)
A+B=B+A
A+A=A
X+Y
X.Y
(X.Y)
XY+XY
24.582
2.4582
24582
0.24582
89
Which of the following logic families has the highest noise immunity? RTL
91
92
No output will be
activated
Decimal-to-BCD Priority
(0101)2
88
90
Correct Answer
AD+AB
93
94
95
F (A,B,C) = Pi M(0,3,5,6)
F(A,B,C) = Summation
m(0,3,5,6)
F(A,B,C) = Summation
m(0,3,5,6)
F(A,B,C) = Summation
m(1,2,4,7)
67
Sr.
Answer A
Answer B
Answer C
Answer D
A > B = 1, A < B = 0, A < B = A > B = 0, A < B = 1, A = B = A > B = 0, A < B = 1, A = B = A > B = 1, A < B = 0, A = B =
1
0
1
0
98
Question
The binary numbers A = 1100 and B = 1001 are applied to the inputs
of a comparator. What are
Two 2-input, 4-bit multiplexers 74X157 can be connected to
implement a ____multiplexer.
What will be the decimal equivalent of 111011.10
48.625
59.487
99
D6C1
DC61
100
1
(132)8
There is a control signal
6
7
8
9
CD-ROM is a
Actual execution of instructions in a computer takes place in
Which of the following is used as a primary storage device
Information retrieval is faster from
The communication line between the CPU, memory and peripherals
is called a
The main three component of a digital computer system are
Which register is responsible for computation in any computer
system ?
Semiconductor memory
ALU
Magnetic tape
Floppy disk
Memory register
Storage unit
PROM
Magnetic tape
D
A
B
C
Bus
line
media
none of these
A
C
13
14
Resgister Transfer
Language
15
16
17
Accumulator
is easier to implement
using hard-wired control
logic
18
19
96
97
2
3
10
11
12
4-input, 8-bit
Correct Answer
2-input, 4-bit
48.487
59.625
D6C5
none
(5A)16
There is an execution
All above
There is a fetch
cycle stealing
Bus grant
bit stealing
Virtual memory
Main memory
Secondary memory
greater speed
4-input, 16-bit
2-input, 8-bit
Memory CPU IO
CU ALU Registers
Special Register
C Register
B Register
Accumulator
Assembly Language
Programming
Register Transistor
Language
PC points to the last
instruction that was
executed
Stack Pointer
B
Register Translation
Language
Register Transformation
Language
Program Counter
all of above
Direct
indirect
base index
Immediate
68
Sr.
20
21
22
Question
The access method used for magnetic tape is_________
Which is an important data transfer technique ?
Which disk read the data by reflecting pulses of laser beams on the
surface ?
Answer A
Direct
CPU
Answer B
Random
DMA
Answer C
Sequential
CAD
Answer D
None of the above
None of these
Correct Answer
C
B
Magnetic disk
Soft disk
Floppy disk
Optical disk
Universal asynchronous
receiver/transmitter
United asynchronous
receiver/transmitter
Universal automatic
receiver/transmitter
23
Universal
asynchronization
receiver/transmitter
24
Programmed I/O
DMA
Handshaking
Strobe
25
Direct memory
accumulator controller
DCP
IOP
Both a & b
None
Primary
RAM
Cache
None of these
Pop
CALL
MOV
PUSH
Uni-directional
is Not Important.
immediate
0-address
Memory register
instruction
Execution cycle
Reduced Instruction Set
Computer
Bi-directional
is Important
direct
Binary
Memory regular
instruction
Register cycle
Register Instruction Set
Computer
Non-directional
is bidirectional
register
1-address
Memory reference
instruction
Fetch cycle
Register Interrupt Set
Computer
Interrupt cycle
Reduced Interrupt Set
Computer
ALP
Machine language
OPCODE
Higher language
29
30
31
32
33
34
35
26
27
28
B
D
37
Postfix notation
Outfix notation
Infix notation
38
Expressions can be evaluated with the help of which data structure ? Stack
Queue
Register
Accumulator
39
Instruction
Microoperation
Pseudoinstruction
Minioperation
40
-128 to +128
-128 to +127
-127 to +128
-127 to +127
2 processors
2 operands
3 processors
1 operands
4 processors
3 operands
Overflow
Zero result
Negative result
Array processor
Von Neumann
36
Prefix notation
42
43
44
45
41
69
Sr.
46
Question
Which of the following units can be used to measure the speed of a
computer ?
Answer A
Answer B
Answer C
Answer D
SYPS
BIPS
BAUD
FLOPS
47
48
49
Pointers Records
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
Correct Answer
Arrays
Records
Offset value
Same Optimum
Different
Optimum
Medium
Isolated I/O
Memory-mapped I/O
Both a & b
None of these
Synchronous
Asynchronous
Clock dependent
Decoder independent
Interrupt-initiated I/O
DMA
IOP
DCP
An IRQ Conflict
An IRQ Crash
An IRQ Collision
An IRQ Blockage
Counter register
AL or AX
1 argument
Flag register
The concatenation of DX
and AX
AL or AX
1 argument
Base register
The concatenation of ES
and AX
CL or CX
3 arguments
Desination register
The concatenation of DS
and BX
DL or DX
No arguments
source
pointer
index
counter
AX
BX
CX
DX
4 GB
8 GB
8 GB
CALL instruction
POP instruction
Jump instruction
RET instruction
Literal
Immediate
Variable
Indirect
Label
Direct
Starting point
Register
C
A
AX register
66
Indirect
Immediate
67
Indirect
Direct
Illegal
32 K
16 K
8K
24 K
Zero
Fakeinstructions
Sign
Extrainstruction
Overflow
Noninstruction
Positive
Pseudoinstructions
68
69
70
70
Sr.
71
72
73
74
75
76
77
78
79
80
81
82
Question
Increment operation is incorporated with which instruction ?
Following cannot be part of an instruction
The fastest memory available on earth is
The instruction used to shift right the accumulator content by one bit
through the carry flag bit is
The only interrupt that is edge triggered is
Which is the non-maskale interrupt ?
A typical application of MIMD is
SIMD can be used for
The advantage of single bus over multibus is the
The addressing mode used in the instruction PUSH B is
The addressing mode used in the instruction ADD X, Y is
When a very large number is divided by very small number so that
the quotient is larger than the
Answer A
IZS
Lable
RAM
Answer B
ISZ
Opcode
Cache
Answer C
ICR
Comment
ROM
Answer D
CIR
Data
Register
Correct Answer
RLC
RAL
RRC
RAR
INTR
TRAP
railway reservation
railway reservation
Low cost
Direct
Absolute
TRAP
RST 7.5
weather forecasting
parallel processing
Parallel operation
Register
Immediate
RST 7.5
INTR
matrix multiplication
matrix multiplication
High operating speed
Register Indirect
Indirect
RST 5.5
RST 6.5
all of above
all of above
All of the above
Immediate
Indexed
A
C
An illegal instruction
data bus,accumulator
accumulator,memory
C
B
B
A
A
C
83
accumulator,accumulator
84
General Registers
Instruction Pointer
85
1 pass
2 pass
3 pass
4 pass
86
1 pass
2 pass
3 pass
4 pass
Vector Processing
Parallel Execution
Pipelining
Parallel Processing
CIL
ICL
ISZ
SIZ
Prefix notation
Infix notation
Postfix notation
Outfix notation
Memory Compaction
Memory interleaving
87
88
89
90
interrupting source
branch address is assigned supplies the branch
to a fixed location in
information to the
memory
processor through
interrrupt vector
CLR A
ORA A
91
92
93
Instructions taking
Which of the following is the typical characteristic of RISC machine ?
multiple cycles
94
Highly pipelined
SUB A
MOV A, 00h
Instructions interpreted by
None of above
microprogramme
is useful when very small useally referes to the
control unit of a
programs to be run
microprocessor
D
A
71
Sr.
Question
Which of the following instruction may be used to save the
95
accumulator value onto the stack ?
96
Von Neumann architecture is
A computer uses 8 digit mantissaand 2 digit exponent. If a=0.052 and
97
b=28E + 11 then b+a-b will
The most relevant addressing mode to write position independent
98
code is
The seek time of a disk is 30 ms. It rotates at the rate of 30 rotations
99
per second. Each track has a
The number of instructions needed to add 'n' numbers and store the
100
result in memory using only
Answer A
Answer B
Answer C
Answer D
Correct Answer
PUSH PSW
PUSH A
PUSH SP
POP PSW
SISD
SIMD
MIMD
MISD
overflow error
underflow errror
5.28E + 11
Direct mode
Indirect mode
Relative mode
Indexed mode
47 ms
50 ms
60 ms
62 ms
n-1
n+1
independent of 'n'