Documente Academic
Documente Profesional
Documente Cultură
The OOPs concept in C++, exposing only necessary information to users or clients is known
as
Abstraction Encapsulation
Data hiding Hiding complexity
2. Which of the following is an abstract data type?
Class Int
String Double
3) Hiding the complexity is known as
Abstraction Encapsulation
Data hiding Composition
4) For Cat and Animal class, correct way of inheritance is
class Cat: public Animal class Animal: public Cat
Both are correct way None is correct way
5) If you want to write multiple functions in a class with same name, then what C++ feature will
you use?
Function overriding Encapsulation
Function overloading None
6) In a class, encapsulating an object of another class is called
Composition Inheritance
Encapsulation None
7) Correct way of creating an object of a class called Car is
Car obj;
Car *obj = new Car();
Only B
A & B both
8) In C++ programming, cout is a/an
Function Operator
Object macro
9) Which is Abstract Data Type in C++
Class Int
Float array
10) When you create an object of a derived class in C++
Derived class constructor is called first then the base class constructor
Base class constructor is called first then derived class constructor
base class constructor will not be called
none of the above
11) The class in C++ which act only as a base class and object of it cannot be created is
parent class super class
abstract class none of the above
12) Data members and member functions of a class in C++ program are by default
protected
public
private
None
13) Which operator is used to allocate an object dynamically of a class in C++?
Scope resolution operator
Conditional operator
New operator
Membership access
14) Which is used to define the member function of a class externally?
: ::
# None
15) In C++, an object cannot be created for
An interface
An Abstract class
A singleton class
A & B A, B & C
16) By default functions available in C++ language are
Constructor Destructor
Copy constructor Assignment operator
All
17) Compile time polymorphism in C++ language are
Operator overloading
Function overloading
Function overriding
B Only
A&B
19) Following keyword is used before a function in a base class to be overridden in derived class
in C++
override
virtual
void
none
23) Number of virtual table created for a base and a derived class is
0 1
2 3
27.When a method in a subclass has the same name and type signatures as a method in the
superclass, then the method in the subclass _____ the method in the super class.
Overloads Friendships
Inherits Overrides
32. The GSM network is divided into the following three major systems :
a.SS, BSS, OSS
b.BSS, BSC, MSC
c.CELL, BSC, OSS
d.SS, CELL, MSC
33. The Mobile Application Protocol (MAP) typically runs on top of which protocol ?
a.SNMP (Simple Network Management Protocol)
b.SMTP (Simple Mail Transfer Protocol)
c.SS7 (Signalling System 7)
d.HTTP (Hyper Text Transfer Protocol)
34. If a packet arrive with an M-bit value is '1' and a fragmentation offset value '0', then it is
______ fragment.
a.First
b.Middle
c.Last
d.All of the above
36. Coaxial cables are categorized by Radio Government rating are adapted for specialized
functions. Category RG-59 with impedance 75O used for
a.Cable TV
b.Ethernet
c.Thin Ethernet
d.Thick Ethernet
39. The technique of temporarily delaying outgoing acknowledgements so that they can be
hooked onto the next outgoing data frame is known as
a.Bit stuffing
b.Piggy backing
c.Pipelining
d.Broadcasting
42. Match the following with respect to the Mobile Computing Architecture.
a. Downlink control 1. 100 Mbps
b. Radio communication data rate 2. Residency latency (RL)
c. The average duration
of user’s stay in cell 3. Sending data from a BS to MD
d. FDDI bandwidth 4. 2-Mbps
a.2 1 4 3
b.3 4 2 1
c.4 1 2 1
d.4 3 1 2
43. When data and acknowledgement are sent in the same frame, this is called as
a.Piggy packing
b.Piggy backing
c.Back packing
d.Good packing
45. Which of the following is widely used inside the telephone system for long-haul data traffic?
a.ISDN
b.ATM
c.Frame Relay
d.ISTN
48. Which layer of OSI reference model is responsible for decomposition of messages and
generation of sequence numbers to 'ensure correct re-composition from end to end of the
network?'
a.Physical
b.Data-link
c.Transport
d.Application
49. The start and stop bits are used in serial communication for
a.error detection
b.error correction
c.synchronization
d.slowing down the communication
50___________ is a type of transmission impairment in which the SIgnal looses strength due to
The resistance of the transmission medium.
a.Attenuation
b.Distortion
c.Noise
d.Decible
55. For n devices in a network, ____ , number of duplex-mode links are required, for a mesh
topology.
a.n(n + 1)
b.n(n - 1)
c.n(n + 1) /2
d.n(n - 1)/2
60. In substitution, a character in the plaintext is always changed to the same character in the
ciphertext, regardless of its position in the text
a.polyalphabetic
b.mono alphabetic
c.transpositional
d.multialphabetic
61. Which of the following protocols is an application layer protocol that establishes, manages
and terminates multimedia sessions?
a.Session Maintenance Protocol
b.Real - time Streaming Protocol
c.Real - time Transport Control Protocol
d.Session Initiation Protocol
62. Match the following port numbers with their uses :
(a) 23 (i) World wide web
(b) 25 (ii) Remote Login
(c) 80 (iii) USENET news
(d) 119 (iv) Email
a.(iv) (i) (ii) (iii)
b.(ii) (i) (iv) (iii)
c.(ii) (iv) (iii) (i)
d.(ii) (iv) (i) (iii)
63. Which of the following is not associated with the session layer ?
a.Dialog control
b.Token management
c.Semantics of the information transmitted
d.Synchronization
64. What is the size of the 'total length' field in IPv4 datagram ?
a.4 bits
b.8 bits
c.16 bits
d.32 bits
66. The process of dividing an analog signal into a string of discrete outputs, each of constant
amplitude, is called :
a.Strobing
b.Amplification
c.Conditioning
d.Quantization
67. Which transmission technique guarantees that data packets will be received by the receiver in
the same order in which they were sent by the sender?
a.Broadcasting
b.Unicasting
c.Packet switching
d.Circuit switching
68. Which of the following control fields in TCP header is used to specify whether the sender has
no more data to transmit?
a.FIN
b.RST
c.SYN
d.PSH
69. Match the following cryptographic algorithms with their design issues:
List-I List-II
a. DES i. Message Digest
b. AES ii. Public Key
c. RSA iii. 56-bit key
d. SHA-1 iv. 128-bit key
Codes:
a b c d
a.ii i iv iii
b.iii i iv ii
c.iii iv ii i
d.iv i ii iii
70. Which layers of the OSI reference model are host-to-host layers ?
a.Transport, Session, Presentation, Application
b.Network, Transport, Session, Presentation
c.Data-link, Network, Transport, Session
d.Physical, Data-link, Network, Transport
71. In a fully connected mesh network with 10 computers, total ______ number of cables are
required and ____ number of ports are required for each device.
a.40,9
b.45,10
c.45,9
d.50,10
72. In TCP/IP reference model, the job of ____ layer is to permit hosts to inject packets into any
network and travel them independently to the destination.
a.Physical
b.Host to network
c.Application
d.None of the above
73. Optical fiber uses reflection to guide light through a channel, in which angle of incedence is
_______ the critical angle.
a.equal to
b.less than
c.greater than
d.less than or equal to
74. Which of the following services is not provided by wireless access point in 802.11 WLAN?
a.Association
b.Disassociation
c.Error Correction
d.Integration
81.Which of the following is the most widely used alphanumeric code for computer input and
output? A. Gray B. ASCII C. Parity D.EBCDIC
82. How many 3-line-to-8-line decoders are required for a 1-of-32 decoder?
A. 1
B. 2
C. 4
D. 8
83. Which of the figures shown below represents the exclusive-NOR gate?
A. a
B. b
C. c
D. d
84. How many data select lines are required for selecting eight inputs?
A. 1
B. 2
C. 3
D. 4
85. The output of an AND gate with three inputs, A, B, and C, is HIGH when ________.
A
A = 1, B = 1, C = 0
.
B
A = 0, B = 0, C = 0
.
C
A = 1, B = 1, C = 1
.
D
A = 1, B = 0, C = 1
.
86. If a 3-input NOR gate has eight input possibilities, how many of those possibilities will
result in a HIGH output?
A
1
.
B
2
.
C
7
.
D
8
.
87. Which of the following logical operations is represented by the + sign in Boolean
algebra?
A
inversion
.
B
AND
.
C OR
.
D
complementation
.
88. Output will be a LOW for any case when one or more inputs are zero for a(n):
A
OR gate
.
B
NOT gate
.
C
AND gate
.
D
NOR gate
.
91. Use Boolean algebra to find the most simplified SOP expression
for F = ABD + CD + ACD + ABC + ABCD.
A
F = ABD + ABC + CD
.
B
F = CD + AD
.
C
F = BC + AB
.
D
F = AC + AD
.
92. Which of the following combinations cannot be combined into K-map groups?
A
corners in the same row
.
B
corners in the same column
.
C
diagonal
.
D
overlapping combinations
.
95. Minimize the following problems using a four variable Karnaugh map.
Z = f(A,B) = A + AB
21. Z = f(A,B) = +A + B
22. Z = f(A,B,C) = + B + AB + AC
a.8421 code ,
b.hexadecimal,
c.gray,
d.otcal
97. Which is the correct order of sequence for representing the input values in K-map?
A. Comparator
B. Multiplexer
C. Demultiplexer
D. parity generator
B. B
C. C
D. D
100. Which statement below best describes a Karnaugh map?
A. A Karnaugh map can be used to replace Boolean rules.
B. The Karnaugh map eliminates the need for using NAND and NOR gates.