Sunteți pe pagina 1din 16

1.

The OOPs concept in C++, exposing only necessary information to users or clients is known
as
Abstraction Encapsulation
Data hiding Hiding complexity
2. Which of the following is an abstract data type?
Class Int
String Double
3) Hiding the complexity is known as
Abstraction Encapsulation
Data hiding Composition
4) For Cat and Animal class, correct way of inheritance is
class Cat: public Animal class Animal: public Cat
Both are correct way None is correct way
5) If you want to write multiple functions in a class with same name, then what C++ feature will
you use?
Function overriding Encapsulation
Function overloading None
6) In a class, encapsulating an object of another class is called
Composition Inheritance
Encapsulation None
7) Correct way of creating an object of a class called Car is
Car obj;
Car *obj = new Car();
Only B
A & B both
8) In C++ programming, cout is a/an
Function Operator
Object macro
9) Which is Abstract Data Type in C++
Class Int
Float array
10) When you create an object of a derived class in C++
Derived class constructor is called first then the base class constructor
Base class constructor is called first then derived class constructor
base class constructor will not be called
none of the above
11) The class in C++ which act only as a base class and object of it cannot be created is
parent class super class
abstract class none of the above
12) Data members and member functions of a class in C++ program are by default
protected
public
private
None
13) Which operator is used to allocate an object dynamically of a class in C++?
Scope resolution operator
Conditional operator
New operator
Membership access
14) Which is used to define the member function of a class externally?
: ::
# None
15) In C++, an object cannot be created for
An interface
An Abstract class
A singleton class
A & B A, B & C
16) By default functions available in C++ language are
Constructor Destructor
Copy constructor Assignment operator
All
17) Compile time polymorphism in C++ language are
Operator overloading
Function overloading
Function overriding
B Only
A&B

18) C++ abstract class can contain


Pure virtual function
Non-virtual function
Only pure virtual function
Both pure virtual and non-virtual function

19) Following keyword is used before a function in a base class to be overridden in derived class
in C++
override
virtual
void
none

20) Which of the following cannot be overloaded in C++?


Increment operator
Constructor
Destructor
New and delete operator

21) Which is the correct declaration of pure virtual function in C++


virtual void func = 0;
virtual void func() = 0;
virtual void func(){0};
void func() = 0;
22) In a class, pure virtual functions in C++ is used
To create an interface
To make a class abstract
To force derived class to implement the pure virtual function
All the above

23) Number of virtual table created for a base and a derived class is
0 1
2 3

24) Constant function in C++ can be declared as


void display()
void display() const
const void display()
void const display()

25.Which of the following cannot be passed to a function in C++?


Constant Structure
Array Header file

26.Which of the following storage classes have global visibility in C++?


Register Static
Auto Extern

27.When a method in a subclass has the same name and type signatures as a method in the
superclass, then the method in the subclass _____ the method in the super class.
Overloads Friendships
Inherits Overrides

28.Which of the following is not a member of class?


Static function Friend function
Const function Virtual function

29.C++ can be said to be as C language with


Structures
Functions
Classes
Global data
30._________ allows to create classes which are derived from other classes, so that they
automatically include some of its "parent's" members, plus its own members.
Overloading
Inheritance
Polymorphism
Encapsulation

31.Important advantage of using new and delete operators in C++ is


Allocation of memory
Frees the memory previously allocated
Allocation of memory and frees the memory previously allocated
Initialization of memory easily

32.C++ actually supports the following two complete dynamic systems?


One defined by C++ and the other not defined by C
One defined by C and one specific to C++
Both are specific to C++
Both of them are improvements of C

32. The GSM network is divided into the following three major systems :
a.SS, BSS, OSS
b.BSS, BSC, MSC
c.CELL, BSC, OSS
d.SS, CELL, MSC

33. The Mobile Application Protocol (MAP) typically runs on top of which protocol ?
a.SNMP (Simple Network Management Protocol)
b.SMTP (Simple Mail Transfer Protocol)
c.SS7 (Signalling System 7)
d.HTTP (Hyper Text Transfer Protocol)

34. If a packet arrive with an M-bit value is '1' and a fragmentation offset value '0', then it is
______ fragment.
a.First
b.Middle
c.Last
d.All of the above

35. The design issue of Datalink Layer in OSI Reference Model is


a.Framing
b.Representation of bits
c.Synchronization of bits
d.Connection control

36. Coaxial cables are categorized by Radio Government rating are adapted for specialized
functions. Category RG-59 with impedance 75O used for
a.Cable TV
b.Ethernet
c.Thin Ethernet
d.Thick Ethernet

37.Data Encryption Techniques are particularly used for _______.


a.protecting data in Data Communication System
b.reduce Storage Space Requirement
c.enhances Data Integrity
d.decreases Data Integrity

38. An example of a layer that is absent in broadcast networks is:


a.Physical layer
b.Presentation layer
c.Network layer
d.Application layer

39. The technique of temporarily delaying outgoing acknowledgements so that they can be
hooked onto the next outgoing data frame is known as
a.Bit stuffing
b.Piggy backing
c.Pipelining
d.Broadcasting

40.Match the following :


List – I List – II
a. Application layer 1. TCP
b. Transport layer 2. HDLC
c. Network layer 3. HTTP
d. Data link layer 4. BGP
a.2 1 4 3
b.3 4 1 2
c.3 1 4 2
d.2 4 1 3

41.In classful addressing, an IP address 123.23.156.4 belongs to ______ class format.


a.A
b.B
c.C
d.D

42. Match the following with respect to the Mobile Computing Architecture.
a. Downlink control 1. 100 Mbps
b. Radio communication data rate 2. Residency latency (RL)
c. The average duration
of user’s stay in cell 3. Sending data from a BS to MD
d. FDDI bandwidth 4. 2-Mbps
a.2 1 4 3
b.3 4 2 1
c.4 1 2 1
d.4 3 1 2

43. When data and acknowledgement are sent in the same frame, this is called as
a.Piggy packing
b.Piggy backing
c.Back packing
d.Good packing

44. Encryption and Decryption is the responsibility of ___ Layer.


a.Physical
b.Network
c.Application
d.Datalink

45. Which of the following is widely used inside the telephone system for long-haul data traffic?
a.ISDN
b.ATM
c.Frame Relay
d.ISTN

46. Find the false statement:


a.In modern Cryptography, symmetric key algorithms use same key both for Encryption and
Decryption
b.The symmetric cipher DES (Data Encryption Standard) was widely used in the industry for
security product
c.The AES (Advanced Encryption Standard ) cryptosystem allows variable key lengths of size
56 bits and 124 bits
d.Pubiic key algorithms use two different keys for Encryption and Decryption

47. In IPV 4, the IP address 200.200.200.200 belongs to


a.Class A
b.Class B
c.Class C
d.Class D

48. Which layer of OSI reference model is responsible for decomposition of messages and
generation of sequence numbers to 'ensure correct re-composition from end to end of the
network?'
a.Physical
b.Data-link
c.Transport
d.Application

49. The start and stop bits are used in serial communication for
a.error detection
b.error correction
c.synchronization
d.slowing down the communication
50___________ is a type of transmission impairment in which the SIgnal looses strength due to
The resistance of the transmission medium.
a.Attenuation
b.Distortion
c.Noise
d.Decible

51. Match the following :


List - I List - II
a. Call control protocol i. Interface between Base Transceiver Station (BTS) and Base
Station Controller (BSC)
b. A-bis ii. Spread spectrum
c. BSMAP iii. Connection management
d. CDMA iv. Works between Mobile Switching Centre (MSC) and Base
Station Subsystem (BSS)
a.iii iv i ii
b.iii i iv ii
c.i ii iii iv
d.iv iii ii i

52. In a classful addressing, first four bits in Class A IP address is


a.1010
b.1100
c.1011
d.1110

53. Consider the following S1 and S2 :


S1 : A hard handover is one in which the channel in the source cell is retained and used for a
while in parallel with the channel in the target cell.
S2 : A soft handover is one in which the channel in the source cell is retained and only then the
channel in the target cell is engaged.
a.S1 is true and S2 is not true
b.S1 is not true and S2 is true
c.Both S1 and S2 are true
d.Both S1 and S2 are not true

54.Which of the following algorithms is not a broadcast routing algorithm?


a.Flooding
b.Multi-destination routing
c.Reverse path forwarding
d.All of the above

55. For n devices in a network, ____ , number of duplex-mode links are required, for a mesh
topology.
a.n(n + 1)
b.n(n - 1)
c.n(n + 1) /2
d.n(n - 1)/2

56.Which of the following is not a field in TCP header ?


a.Sequence number
b.Fragment offSet
c.Checksum
d.Window size

57._________________ is a bit-oriented protocol for communication over point-to-point and


multi-point links .
a.Stop-and-wait
b.HDLC
c.Sliding window
d.Go-back-N

58. Which one of the following is true for asymmetric-key cryptography?


a.Private key is kept by the receiver and public key is announced to the public
b.Public key is kept by the receiver and private key is announced to the public
c.Both private key and public key are kept by the receiver
d.Both private key and public key are announced to the public

59. A Trojan horse is


a.A program that performs a legitimate function that is known to an operating system or its user
and also has a hidden component that can be used for nefarious purposes like attacks on message
security or impersonation
b.A piece of code that can attach itself to other programs in the system and spread to other
systems when programs are copied or transferred
c.A program that spreads to other computer systems by exploiting security holes like weaknesses
in facilities for creation of remote processes
d.All of the above

60. In substitution, a character in the plaintext is always changed to the same character in the
ciphertext, regardless of its position in the text
a.polyalphabetic
b.mono alphabetic
c.transpositional
d.multialphabetic

61. Which of the following protocols is an application layer protocol that establishes, manages
and terminates multimedia sessions?
a.Session Maintenance Protocol
b.Real - time Streaming Protocol
c.Real - time Transport Control Protocol
d.Session Initiation Protocol
62. Match the following port numbers with their uses :
(a) 23 (i) World wide web
(b) 25 (ii) Remote Login
(c) 80 (iii) USENET news
(d) 119 (iv) Email
a.(iv) (i) (ii) (iii)
b.(ii) (i) (iv) (iii)
c.(ii) (iv) (iii) (i)
d.(ii) (iv) (i) (iii)

63. Which of the following is not associated with the session layer ?
a.Dialog control
b.Token management
c.Semantics of the information transmitted
d.Synchronization

64. What is the size of the 'total length' field in IPv4 datagram ?
a.4 bits
b.8 bits
c.16 bits
d.32 bits

65. Which of the following is/are restriction(s) in classless addressing ?


a.The number of addresses needs to be a power of 2
b.The mask needs to be included in the address to define the block
c.The starting address must be divisible by the number of addresses in the block
d.All of the above

66. The process of dividing an analog signal into a string of discrete outputs, each of constant
amplitude, is called :
a.Strobing
b.Amplification
c.Conditioning
d.Quantization

67. Which transmission technique guarantees that data packets will be received by the receiver in
the same order in which they were sent by the sender?
a.Broadcasting
b.Unicasting
c.Packet switching
d.Circuit switching

68. Which of the following control fields in TCP header is used to specify whether the sender has
no more data to transmit?
a.FIN
b.RST
c.SYN
d.PSH

69. Match the following cryptographic algorithms with their design issues:
List-I List-II
a. DES i. Message Digest
b. AES ii. Public Key
c. RSA iii. 56-bit key
d. SHA-1 iv. 128-bit key
Codes:
a b c d
a.ii i iv iii
b.iii i iv ii
c.iii iv ii i
d.iv i ii iii

70. Which layers of the OSI reference model are host-to-host layers ?
a.Transport, Session, Presentation, Application
b.Network, Transport, Session, Presentation
c.Data-link, Network, Transport, Session
d.Physical, Data-link, Network, Transport

71. In a fully connected mesh network with 10 computers, total ______ number of cables are
required and ____ number of ports are required for each device.
a.40,9
b.45,10
c.45,9
d.50,10

72. In TCP/IP reference model, the job of ____ layer is to permit hosts to inject packets into any
network and travel them independently to the destination.
a.Physical
b.Host to network
c.Application
d.None of the above

73. Optical fiber uses reflection to guide light through a channel, in which angle of incedence is
_______ the critical angle.
a.equal to
b.less than
c.greater than
d.less than or equal to

74. Which of the following services is not provided by wireless access point in 802.11 WLAN?
a.Association
b.Disassociation
c.Error Correction
d.Integration

75. In a classful addressing, the IP addresses with 0 (zero) as network number:


a.refers to the current network
b.refers to broadcast on the local network
c.refers to broadcast on a distant network
d.refers to loopback testing

76.Convert hexadecimal value 16 to decimal.

A. 2210 B.1610 C.1010 D. 2010

77.Convert the following decimal number to 8-bit binary. 187

A. 101110112 B.110111012 C.101111012 D.101111002

78.Convert binary 111111110010 to hexadecimal.

A.EE216 B.FF216 C.2FE16 D.FD216

79.Convert the following binary number to decimal. 010112

A. 11 B.35 C.15 D.10

80.Convert the binary number 1001.00102 to decimal.

A. 90.125 B.9.125 C.125 D. 12.5

81.Which of the following is the most widely used alphanumeric code for computer input and
output? A. Gray B. ASCII C. Parity D.EBCDIC

82. How many 3-line-to-8-line decoders are required for a 1-of-32 decoder?
A. 1
B. 2
C. 4
D. 8
83. Which of the figures shown below represents the exclusive-NOR gate?

A. a
B. b
C. c
D. d
84. How many data select lines are required for selecting eight inputs?
A. 1
B. 2
C. 3
D. 4
85. The output of an AND gate with three inputs, A, B, and C, is HIGH when ________.
A
A = 1, B = 1, C = 0
.
B
A = 0, B = 0, C = 0
.
C
A = 1, B = 1, C = 1
.
D
A = 1, B = 0, C = 1
.
86. If a 3-input NOR gate has eight input possibilities, how many of those possibilities will
result in a HIGH output?
A
1
.
B
2
.
C
7
.
D
8
.
87. Which of the following logical operations is represented by the + sign in Boolean
algebra?
A
inversion
.
B
AND
.
C OR
.
D
complementation
.

88. Output will be a LOW for any case when one or more inputs are zero for a(n):
A
OR gate
.
B
NOT gate
.
C
AND gate
.
D
NOR gate
.

89. Which of the following expressions is in the sum-of-products (SOP) form?


A
(A + B)(C + D)
.
B
(A)B(CD)
.
C
AB(CD)
.
D
AB + CD
.
90. The systematic reduction of logic circuits is accomplished by:
A
using Boolean algebra
.
B
symbolic reduction
.
C
TTL logic
.
D
using a truth table
.

91. Use Boolean algebra to find the most simplified SOP expression
for F = ABD + CD + ACD + ABC + ABCD.
A
F = ABD + ABC + CD
.

B
F = CD + AD
.

C
F = BC + AB
.

D
F = AC + AD
.
92. Which of the following combinations cannot be combined into K-map groups?

A
corners in the same row
.

B
corners in the same column
.

C
diagonal
.

D
overlapping combinations
.

93.There are ______ cells in a 4-variable K-map.


a) 12
b) 16
c) 18
d) None of the Mentioned

94. A Karnaugh map (K-map) is an abstract form of ____________ diagram organized as a


matrix of squares.
a) Venn Diagram
b) Cycle Diagram
c) Block diagram
d) Triangular Diagram

95. Minimize the following problems using a four variable Karnaugh map.

Z = f(A,B) = A + AB

21. Z = f(A,B) = +A + B
22. Z = f(A,B,C) = + B + AB + AC

23. Z = f(A,B,C) = B+B + BC + A

96. The code used for labeling the cells of a K-map is

a.8421 code ,

b.hexadecimal,

c.gray,

d.otcal

97. Which is the correct order of sequence for representing the input values in K-map?

a. (00, 01, 10, 11)


b. (00, 10, 01, 11)
c. (00, 01, 11, 10)
d. (00, 10, 11, 01)

98.The device shown here is most likely a ________.

A. Comparator

B. Multiplexer

C. Demultiplexer

D. parity generator

99. Which of the K-maps given below represents the expression X = AC + BC + B?


A. A

B. B

C. C

D. D
100. Which statement below best describes a Karnaugh map?
A. A Karnaugh map can be used to replace Boolean rules.

B. The Karnaugh map eliminates the need for using NAND and NOR gates.

C. Variable complements can be eliminated by using Karnaugh maps.

D. Karnaugh maps provide a visual approach to simplifying Boolean expressions.

S-ar putea să vă placă și