You are on page 1of 10

Timing: 1 hour Total Question: 45

1.All of the following are examples of real security and privacy risks except: A. Hackers. B. Spam. C. Viruses. D. Identity theft. Ans : B 2. The ability to recover and read deleted or damaged files from a criminals computer is an example of a law enforcement specialty called: A. Robotics. B. Simulation. C. Computer forensics. D. Animation. Ans : C 3. The name for the way that computers manipulate data into information is called: A. programming. B. processing. C. storing. D. organizing. Ans : B

OS and cso(6 questions to be selected) 4. The use of hardware in memory management is through segment relocation and protection is a. to perform address translation to reduce size of the memory b. to perform address translation to reduce execution time overhead c. both (a) and (b) d. none of the above Ans: (c)

5. Memory refreshing may be done a. by the CPU that contains a special regress counter, only b. by an external refresh controller, only c. either by the CPU or by an external refresh controller d. none of the above Ans: (c) 6. Which of the following Operating system does not implement multitasking truly: A. Windows 98 B. Windows NT C. Windows XP D. MS DOS Ans: D 7. Which of the following Operating systems do you choose to implement a Client-Server network A. Windows 98 B. Windows 2000 C. Windows 95 D. MS DOS Ans: B 8. The CPU and memory are located on the: A. expansion board. B. motherboard. C. storage device. D. output device. Ans: B 9. The commonly used UNIX commands like date, Is, cat, etc. are stored in a. /dev directory b. /bin and /usr/bin directories c. /unix directory d. /tmp directory Ans: b Dbms(3 question:) 10. A primary key if combined with a foreign key creates: A. Parent child relationship between the tables that connect them. B. Many to many relationship between the tables that connect them. C. Network model between the tables that connect them. D. None of these. Ans: A 11. Managers salary details are hidden from the employee.This is: A. conceptual level data hiding. B. physical level data hiding. C. external level data hiding. D. none of these.

Ans: C 12. A fuctional dependency of the form x->y is trivial if A. y c x B. y c x C. x c y D. x c y and y c x Ans: A CN(3 questions) 13. In which communication poll/select method is used to determine control of the line? A. peer to peer B. peer to primary C. primary to peer D. primary to secondary Ans: D 14. Adaptive or dynamic directory used in packet routing changes A. within each user session B. with each user session C. at system generation time only D. none of these Ans: A 15. Which company develops the TCP/IP protocol for networking: A.IBM B.DEC C.NOVELL D.DARPA Ans: D

TOC(3 questions to be selected) 16. Context free grammer is not closed under A. product B. union C. complementation D. kleen star Ans: C 17. If L1 and L2 are context free language and R a regular set,then which one of the language below is not necessarily a context free language: A. L1 L2 B. L1 U L2 C. L1 R D. L1 U L2 Ans: B

18. CFG can be recognized by A. push-down automata B. 2-way linear bounded automata C. finite state automata D. none of these Ans:D Compiler(3 quest) 19. Assembler is a program that A. places programs into memory and prepares them for execution. B. automtes the translation of assembly language into machine language. C. accepts a program written in high level language and produces an object program. D. appears to execute a resource as if it were machine language. Ans: B 20. In analyzing the compilation of PL/I program the description resolving symbolic address(labels) and generating machine language is associated with A. assembly and output B. code generation C. storage assignment D. syntax analysis Ans: A 21.The segment base is specified using the register named is: A. ORG instructions B. TITLE instructions C. ASSUME instructions D. SEGMENT instructions Ans: A Software Engg(3 questions to e selected) 22. Which of the following is a tool in design phase? A. Abstraction. B. Refinement. C. Information hiding. D. None of these. Ans: D 23. Design phase includes A. Data, architecture and procedural designs only B. Architectural, procedural and interface designs only C. Data, architectural, interface and procedural designs D. All of these Ans: C

24. Assertions are conditions which are true at the point of execution A. always B. sometimes C. many times D. no times Ans: A

WT(3 questions to be selected) 25. Correct HTML tag for the largest heading is A. <head> B. <h6> C. <heading> D. <h1> Ans: D 26. How can you make an email link? A. <mail href+xxx@y.com> B. <mail>xxx@y.com<.mail> C. <a href=xxx@y.com> D. <a href=xxx@y.com> Ans: D 27. The attribute, which define the relationship between current document and HREFed URL is: A. REL B. URL C. REV D. all of these Ans: B General 28. Name of first Super computer of India: A. Param Padma B. ASCI White C. ASCI Red D. IBM cluster 29. Increasing the RAM of a computer typically improves performance because A. Virtual memory increases B. Larger RAMs are faster C. Fewer page faults occur D. Fewer segmentation faults occur Ans: C Programming:: 30. void main() { int const * p=5;

printf("%d",++(*p)); } What is the output? A. 6 B. 5 C. Compiler error D. Run time error Ans : C 31. main() { printf("\nab"); printf("\bsi"); printf("\rha"); } What is the output? A. has B. hasaiaab C. hai D. aas Ans : C 32. Minimum number of queues needed to implement the priority queue? A. one B. two C. three D. zero Ans : B 33. What are the notations used in Evaluation of Arithmetic Expressions using prefix and postfix forms? A. Reverse Polish notations B. Polish C. both D. none Ans : C 34. a full binary tree with a non-leaf nodes contains: A. log2n nodes B. n+1 nodes C. 2n nodes D. 2n+1 nodes Ans: D 35. Which is the parameter that is added to every non-static member function when it is called? A. this pointer B. far pointer C. near pointer D. all Ans: A

36. void main() { int i=7; printf("%d",i++*i++); } What is the output? A. 56 B. 65 C. 5 6 D. 6 5 Ans: A

37. The recurrence relation T(1)=2 T(n)=3T(n/4)+n Has the solution T(n) equal to A. O(n) B. O(log n) C. O(n ^3/4) D. none of these Ans: A 38. Running time of NFA to DFA conversation including the case where NFA has e-trasition is A. O(n^3) B. O((n^2)*(3^2) ) C. O((n^3)*(2^n)) D. O((n^2)*(2^n)) Ans: C 39. Algorithm which solves the all-pair shortest path problem is A. Dijkstras algorithm B. Floyds algorithm C. Prims algorithm D. Warshalls algorithm Ans: B 40. Which of the following is correct? A. 3-Sat p CNF-Sat B. At tha language level, 3-Satisfiable p CNF C. both A. and B. D. None of these Ans: C 41. int i =1,j =10; do { if(i++> --j) { continue; } } while (i <5);

System.out.println(i = +i+ and j = +j); What is the result? A. i = 6 and j = 5 B. i = 5 and j = 5 C. i = 6 and j = 5 D. i = 5 and j = 6 Ans: D 42. What is the output of the following StringBuffer sb1 = new StringBuffer("Unique"); StringBuffer sb2= new StringBuffer("Unique"); String ss1 = "Unique"; System.out.println(sb1==sb2); System.out.println(sb1.equals(sb2)); System.out.println(sb1.equals(ss1)); System.out.println("Poddar".substring(3)); A. false false false dar B. false true false Poddar C. Compile time Error D. true true false dar Ans: A 43.Which one does not have a valueOf(String) method A.Integer B. Boolean C.Character D. Long Ans: C 44.What will be the output Consider a directory structure like this (NT or 95) C:\JAVA\12345.msg --FILE import java.io.*; public class IO { public static void main(String args[]) { File f1 = new File("\\12345.msg"); System.out.println(f1.getPath()); System.out.println(f1.getParent()); System.out.println(f1.isAbsolute()); System.out.println(f1.getName()); System.out.println(f1.exists()); System.out.println(f1.isFile());

} } A. \12345.msg \ true 12345.msg true true B. \12345.msg \ true \12345.msg false false C. 12345.msg \ true 12345.msg false false D. \12345.msg \ true 12345.msg false false Ans: D 45. What is the output public static void main(String args[]){ Frame f = new Frame("Visual"); f.setSize(300,300); f.setVisible(true); Point p = f.getLocation(); System.out.println("x is " + p.x); System.out.println("y is " + p.y); } A. x is 300 y is 300 B . x is 0 y is 0 C. x is 0 y is 300 D. x is 300 Y is 0 Ans:B Because postion is always relative to parent container and in this case Frame f is the topemost container

You might also like