Professional Documents
Culture Documents
Which one of the following regular expressions is NOT equivalent to the regular expression (a+b+c) *
(A) (a*+b*+c*)* (B) (a*b*c*)*
(C) ((ab)*+c*) * (D) (a*b*+c*)*
Answer: C
2. The relation R defined on the set A={1,2,3,4} by {(1,1),(2,2),(3,3),(4,4)} is
(A) Reflexive (B) Symmetric
(C) Transitive (D) All of the above
Answer: D
3. Suppose that P(x,y) means x is parent of y and M(x) means x is male. If (v,w) equals
M(v)xyP(x,y) P(x,v) (yv) P(y,w))
What is the meaning of expression F(v,w)?
(A) v is brother of w (B) v is nephew of w
(C) v is an uncle of w (D) v is grandfather of w
Answer: C
4. Context Sensitive Grammar can be recognized by a
(A) Finite state machine (B) Push down automata
(C) Deterministic PDM (D) Linearly bounded memory machine
Answer: D
5. The Boolean function xy+xy+xy
(A) x+y (B) x+y
(C) x+y (D) x+y
Answer: C
6. A register organized to allow moving left or right operations is called a
(A) Shift register (B) Counter
(C) Loader (D) Adder
Answer: A
7. De Morgans theorem states that NAND gate is equivalent to a bubbled ............. gate.
(A) AND (B) XAND
(C) XOR (D) OR
Answer: D
8. Standard TTL has a multiple emitter input transistor and a .............. output.
(A) Totem-pole (B) Register
(C) Bipolar (D) Transistor
Answer: A
9. What is the 2s complement of 24 in a 16-bit microcomputer?
(A) 1111 1111 1110 0111 (B) 1111 1111 1110 1000
(C) 0000 0000 0001 1000 (D) 1000 1000 0001 1000
Answer: B
10. Which of the following logic families has the highest noise immunity?
(A) TTL (B) DTL
(C) RTL (D) HTL
Answer: D
31. Which among the following set is the software that connects two disparate applications allowing them to communicate with each other and to
exchange data?
(A) Intranet middleware (B) Software bridge
(C) Software server (D) Software agent
Answer: A
32. Which of the following is NOT a property of bitmap graphics?
(A) Fast hardware exists to move blocks of pixels efficiently
(B) Realistic lighting and shading can be done
(C) All line segments can be displayed as straight
(D) Polygons can be filled with solid colors and textures
Answer: B
33. Which of the following characteristics of a programming language is best specified using a context-free grammar?
(A) Identifier length (B) Maximum level of nesting
(C) Operator precedence (D) type compatibility
Answer: C
34. Which of the following comes closest to being a perfectly secure encryption scheme?
(A) The Caesar Cipher, a substitution cipher
(B) DES (Data Encryption Standard), a symmetric-key algorithm
(C) Enigma, a transposition cipher
(D) One-time pad
Answer: B
35. Which of the following is a Parameter passing method in C?
(A) Call by value (B) Call by result
(C) Call by value-result (D) Call by name
Answer: A
36. Prolog programs are
(A) facts and knowledge bases (B) horn clauses
(C) A set of functions (D) None of the above
Answer: B
37. Kerberos is:
(A) an operating system
(B) A networking file system protocol
(C) an encrypted file system
(D) a system that supports authentication in distributed systems
Answer: D
38. ACL stands for:
(A) Automatic Control Language (B) Access Control List
(C) Associate Cache Level (D) Amortized Circular Lists
Answer: B
39. A one-time password is
(A) one that changes every time it is used.
(B) one that is assigned once and not changed at all.
(C) one that can be used only at a particular time of the day
(D) one that is assigned for all session that starts at a particular time
Answer: A
40. A hostile applet is:
(A) a downloadable applet that can cause harm on a clients system
(B) an applet that resides on a system infected with a virus
(C) a downloadable applet that attaches itself to an existing applet.
(D) an applet generated by another applet
Answer: A
1. The Page Rank algorithm is used by
61. Data entry can be performed with all of the following except
(A) OCR (B) OMR
(C) DDR (D) MICR
Answer: C
62. The principle of locality of reference justifies the use of
(A) Interrupts (B) Polling
(C) Status checking (D) Cache memory
Answer: D
63. EPROM consists of
(A) UJTs (B) Bipolar transistors
(C) MOSFETs (D) Diodes
Answer: B
64. The term P in semaphore means
(A) Wait (B) Signal
(C) Both (A) and (B) (D) None of the above
Answer: A
65. Probability of page fault is
(A) Nearly equal to 1 (B) Equal to zero
(C) Between 0 and 1 (D) None of the above
Answer: C
66. Which of the following is not a characteristic for Testability?
(A) Operability (B) Observability
(C) Simplicity (D) Robustness
Answer: D
67. Cyclomatic Complexity method comes under ............ testing method.
(A) White box (B) Black box
(C) Yellow box (D) Red box
Answer: A
68. In prototyping, the following are used
(A) Screen generators (B) Input generator
(C) Application generators (D) All of the above
Answer: D
69. In data flow diagrams, an originator or receiver of the data is usually designated by
(A) a circle (B) an arrow
(C) a square box (D) a rectangle
Answer: C
70. A structure chart is
(A) Error control diagram
(B) Data flow diagram
(C) A hierarchical partitioning of the program
(D) None of the above
Answer: B
81. A subset of data in a data warehouse in the form of summary data, related to a particular department or business function: