Documente Academic
Documente Profesional
Documente Cultură
A. EEPROM
A. HAI
3. Which one of the following models is not suitable for accommodating any change?
A. WATERFALL MODEL
A. 8 BITS
5. What is Software?
A. A COMP. APPLICATION
A. CRITICAL LEVEL
7. If an integer needs four bytes of storage, then maximum value of an unsigned integer
is
A. 2^n-1 -1
8.Which among following is Volatile ?
a. RAM
9.Which of the following is the correct order of evaluation for the below expression?
q = (a - b) + c * d / e % f - g
A. BUS TOPOLOGY
14. Where the result of an arithmetic and logical operation are stored ?
A. In Accumulator
18. _______ refers to the structure or format of the data, meaning the order in which
they are presented.
A. SYNTAX
B. Integer
C. Float
D. enum
A. FLOAT
22. Which of these software engineering activities are not a part of software
processes?
a. Software dependance
b. Software development
c. Software validation
d. Software specification
A. SOFTWARE DEPENDENCE
A. Register select
B. Chip select
C. Both of above
D. None of above
A. BOTH
24.In a ______ connection, two and only two devices are connected by a dedicated link.
A)multipoint
B)point-to-point
A. POINT TO POINT
B. goto
C. go back
D. return
A. RETURN
29.An exception condition in a computer system caused by an event external to the CPU is
known as?
A) Interrupt
B) Halt
C) Wait
D) Process
A. INTERRUPT
A. 1024 / 1025
37. Which of these does not affect different types of software as a whole?
a) Heterogeneity
b) Flexibility
c) Business and social change
d) Security
A. FLEXIBILITY
38. The process-to-process delivery of the entire message is the responsibility of the
_______ layer.
A.
A)Network
B)Transport
C)Application
D)Physical
TRANSPORT LAYER
39. I/O processor has direct access to ?
A. Main Memory
B. Secondary Memory
C. Flash Memory
D. ROM
A. MAIN MEMORY
40. The fundamental notions of software engineering does not account for?
a. Software processes
b. Software Security
c. Software reuse
d. Software Validation
SOFTWARE VALIDATION
44. The address mapping is done, when the program is initially loaded is called ?
A) dynamic relocation
B) relocation
C) static relocation
D) dynamic as well as static relocation
A. STATIC RELOCATION
B)logical
C)physical
none of
D)the
above
LOGICAL
A. BOTH B AND C
49.A PHP script should start with ___ and end with ___:
a) < php >
b) < ? php ?>
c) <? ?>
d) <?php ?>
A. C OR D
51. The unit which decodes and translates each instruction and generates the necessary enable
signals for ALU and other units is called
A) arithmetic unit
B) logical unit
C) control unit
D) CPU
CONTROL UNIT
58.A Relation is a
elicitation
b) design
c) analysis
d) documentation
A. DESIGN
60. Which among following is an important data transfer technique?
A. CAD
B. CAM
C. DMA
D. MMA
A. DMA
61. The seven-layer _____ model provides guidelines for the development
of universally compatible networking protocols.
A. OSI
A. ALL
A. RELATION
65. Which of the following must be installed on your computer so as to run PHP script?
i) Adobe Dreamweaver
ii) PHP
iii) Apache
iv) IIS
A. PHP, APACHE, IIS
66. Which one of the following is a requirement that fits in a developer’s module?
a) Availability
b) Testability
c) Usability
d) Flexibility
A. TESTABILITY
70. The TCP/IP _______ layer is equivalent to the combined session, presentation, and
application layers of the OSI model
A)user
B)network
A. USER
A. HIT RATIO
A. 2,3, 4
A. MEMORY SPACE
A)fixed or unfixed
B)guided or unguided
C)determinate or indeterminate
D)metallic or nonmetallic
76. FAST stands for
a. Facilitated Application Software Technique.
b. Functional Application Software Technique.
c. Facilitated Application Specification Technique.
d. None of the above.
A. CANDIDATE KEY
78. How many classification schemes have been developed for NFRs?
a) Two
b) Three
c) Four
d) Five
A. FIVE.
LIGHT
80. Which devices among following are usually designed on the complex electromechanical
principle ?
A. Printing devices
B. Input devices
C. Storage devices
D. Peripheral devices
A. INPUT DEVICES
81. Which of the following php statement/statements will store 111 in variable num?
i) int $num = 111;
ii) int mum = 111;
iii) $num = 111;
iv) 111 = $num;
A. ONLY 3
a) Availability
b) Testability
c) Usability
d) Flexibility
B. TESTABILITY
84._________ read the data by reflecting pulses of laser beams on the surface ?
A. Magnetic disk
B. Optical disk
C. Floppy disk
D. ROM
OPTICAL DISK
EQUAL TO
88. Choose the incorrect statement with respect to Non-Functional Requirement (NFR).
a) Product-oriented Approach – Focus on system (or software) quality
b) Process-oriented Approach – Focus on how NFRs can be used in the design process
c) Quantitative Approach – Find measurable scales for the functionality attributes
d) Qualitative Approach – Study various relationships between quality goals
A. 5
COAXIAL
91. If CPU and I/O interface share a common bus than transfer of data between two
units is known as ?
A. Asynchronous
B. Clock dependent
C. Synchronous
D. Decoder independent
SYNCHRONUS
A. DOMAIN
94. The open source movement has meant that there is a huge reusable code base available at
a) free of cost
b) low cost
c) high cost
d) short period of time
A. LOW OF COST
95. All the operations in a digital system are synchronized by a clock that is generated by ?
A. Clock
B. Clock generator
C. Pulse
D. Pulse generator
A. PULSE GENERATOR
96. Which of the following PHP statements will output Hello World on the screen?
(i) echo (“Hello World”);
(ii) print (“Hello World”);
(iii) printf (“Hello World”);
(iv) sprintf (“Hello World”);
A. 1, 2 ,3
97. Radio waves are _________.
omnidirectional
A)
unidirectional
B)
bidirectional
C)
none of the
D)
above
OMNIDIRECTIONAL
A. 1234
A. STRTOUPPER
105. A burst error means that two or more bits in the data unit have changed.
A. BURST
106. Which of the following is a generic structure that is extended to create a more specific
subsystem or application?
a) Software reuse
b) Object-oriented programming language
c) Framework
d) None of the mentioned
A. FRAMEWORK
a. Hard disk
b. Floppy disk
c. CPU chip
d. Memory chip
CPU CHIP
108.Which of the following registers is used to keep track of address of the memory location where
the next instruction is located?
A. Memory Address Register
C. Instruction Register
D. Program Counter
E. None of the above
generator
B)
redundancy
C)
none of the
D)
above
GENERATOR
112.Which one of the following functions can be used to concatenate array elements to form a single delimited
string?
a) explode()
b) implode()
c) concat()
d) concatenate()
A. IMPLODE
113.The IEEE 802.3 Standard defines _________ CSMA/CD as the access method for
first- generation 10-Mbps Ethernet
A)1-persistent
B)p-persistent
C)non-persistent
A. A
116. Which one of the following functions finds the last occurrence of a string, returning its
numerical position?
a) strlastpos()
b) strpos()
c) strlast()
d) strrpos()
A. STRRPOS
a. microprocessor
b. memory
c. peripheral equipment
d. all of above
ALL
118. Which framework class include standards and classes that support component
communication and information exchange?
a) System infrastructure frameworks
b) Middleware integration frameworks
c) Enterprise application frameworks
d) MVC
A. MIDDLEWARE INTEGRATION FRAMEWORKS
119. Which one of the following regular expression matches any string containing zero or one p?
a) p+
b) p*
c) P?
d) p#
A. P?
a. data transfer
b. logic operation
c. arithmetic operation
d. all of above
122. The ----------------------- is the physical path over which a message travels.
A. MEDIUM
A. 0
124.Frequency of failure and network recovery time after a failure are measures of
the _______ of a network.
A) Performance B) Reliability C) Security D) Feasibility
A. RELIABILITY
125.“An ordering system may be adapted to cope with a centralized ordering process in one
company and a distributed process in another.” Which category the example belongs to?
a) Process specialization
b) Platform specialization
c) Environment specialization
d) Functional specialization
A. A
a. instruction execution
b. instruction prefetch
c. instruction decoding
d. instruction manipulation
INSTRUCTION PREFETCH
B)10Base2
C)10Base-T
D)10Base-F
131.What are generic application systems that may be designed to support a particular
business type, activity, or sometimes a complete enterprise?
a) COTS-solution systems
b) COTS-integrated systems
c) ERP systems
d) Both COTS-solution and COTS-integrated systems
A. A
132.A stack is
c. a set of memory locations in R/WM reserved for storing information temporarily during the
execution of computer
A. C
133.What will be the output of the following PHP code?
< ?php
$fruits = array ("mango", "apple", "pear", "peach");
$fruits = array_flip($fruits);
echo ($fruits[0]);
?>
B)100
C)1000
D)10,000
a) Avg
b) Sum
c) With
d) Min
A. WITH
a. a 16-bit register in the microprocessor that indicate the beginning of the stack memory.
A. A
139.In the Ethernet frame, the _______ field contains error detection information
A)CRC
B)preamble
C)address
142. The branch logic that provides decision making capabilities in the control unit is known as
a. controlled transfer
b. conditional transfer
c. unconditional transfer
d. none of above
A. UNCONDITIONAL TRANSFER
A)
8
B)
32
C)
D)64
1. 32 BITS
a. internal
b. external
c. hardware
d. software
A. SOFTWARE
147. Which in-built function will add a value to the end of an array?
a) array_unshift()
b) into_array()
c) inend_array()
d) array_push()
A. D
B)B
C)C
d. None of above
A. B
a. ALU
b. Primary Storage
c. Control unit
d. All of above
A)65,534
B)16,777,216
C)256
158. Find the number of addresses in a block of classless addresses if one of the addresses is
12.2.2.7/30.
A)2
B)4
C)8
a. controlled transfer
b. conditional transfer
c. unconditional transfer
d. none of above
A. UNCONDITIONAL TRANSFER
166. The updated MySQL extension released with PHP 5 is typically referred to as
a) MySQL
b) mysql
c) mysqli
d) mysqly
A. C
B)12.2.2.112
C)12.2.2.127
A)/9
B)/8
C)/16
- FOR B
b. direct
c. indirect
d. register
172.Which one of the following lines need to be uncommented or added in the php.ini file so as to enable
mysqli extension?
a) extension=php_mysqli.dll
b) extension=mysql.dll
c) extension=php_mysqli.dl
d) extension=mysqli.dl
A. A
173.Pipeline implement
a. instruction execution
b. instruction prefetch
c. instruction decoding
d. instruction manipulation
INSTRUCTION PREFETCH
175.Which of the following is not used in measuring the size of the software
a) KLOC
b) Function Points
c) Size of module
A. SIZE OF MODULE
B)255.255.242.0
C)255.255.0.0
177.Which method returns the error code generated from the execution of the last MySQL function?
a) errno()
b) errnumber()
c) errorno()
d) errornumber()
A. ERRNO
178.Behavioral testing is
a) White box testing
b) Black box testing
c) Grey box testing
A. A
181.Which of the following code is used in present day computing was developed by IBM
corporation?
a. ASCII
b. Hollerith Code
c. Baudot Code
d. EBCDIC Code
A. EBCDIC CODE
A)/20
B)/28
C)/18
184.When a subroutine is called, the address of the instruction following the CALL instructions
stored in/on the
a. stack pointer
b. accumulator
c. program counter
d. stack
A. STACK
A. LEFT TO RIGHT
A. BASE
188.Which method or property can only be accessed from within the enclosing class? Even subclasses
have no access.
a) public
b) friendly
c) private
d) protected
A. PRIVATE
a. symbolic microinstruction
b. binary microinstruction
c. symbolic microprogram
d. binary microprogram
A. BINARY MICROPROGRAM
A)dotted decimal
B)hexadecimal colon
C)decimal
A)error checking
B)error correction
C)datagram acknowledgment
198. A logical description of some portion of database that is required by a user to perform task is
called as
A. USER VIEW
201. A ________ view shows the system hardware and how software components are
distributed across the processors in the system.
a) physical
b) logical
c) process
A. PHYSICAL
203. Which of the following view shows that the system is composed of interacting processes at
run time?
205.Which of the following directive determines the maximum amount of time that a PHP script
will spend attempting to parse input before registering a fatal error?
a) max_take_time
b) max_intake_time
c) max_input_time
d) max_parse_time
A. MAX_INPUT_TIME
206. In IPv4, what is the value of the total length field in bytes if the header is 28 bytes and
the data field is 400 bytes?
A)428
B)407
C)107
D)427
A. 20 FILES
A. B
211.In IPv4, what is the length of the data field given an HLEN value of 12 and total length
value
39,988
A)
40,012
B)
40,048
C)
39,952
D)
A. 39988
214. To validate an e-mail address, which flag is to be passed to the function filter_var()?
A. FILTER_VALIDATE_EMAIL
B. FILTER_VALIDATE_MAIL
C. VALIDATE_EMAIL
D. VALIDATE_MAIL
A. FILTER_VALIDATE_EMAIL
215. In IPv4, if the fragment offset has a value of 100, it means that _______.
A)the datagram has not been fragmented
217.How many address lines are needed to address each memory locations in a 2048 x 4
memory chip?
a. 10
b. 11
c. 8
d. 12
A. 11
218. A lock that allows concurrent transactions to access different rows of the same table is known
as a
_________________
a) Database-level lock
b) Table-level lock
c) Page-level lock
d) Row-level lock
A. ROW LEVEL LOCK
219.Which one of the following keyword is used in conjunction with an Exception object?
a) throws
b) exception
c) throw
d) final
B. THROW
220.A computer program that converts an entire program into machine language at one time is
called a/an
a. Interpreter
b. CPU
c. Compiler
d. Simulator
A. INTERPRETER
221.In IPv4, what is needed to determine the number of the last byte of a fragment?
A)Identification number
B)Offset number
C)Total length
222. Which of the following pattern is the basis of interaction management in many web-based
systems?
a) architecture
b) repository pattern
c) model-view-controller
d) different operating system
A. MODEL VIEW CONTROLLER
224.Which one of the following is the very first task executed by a session enabled page?
a) Delete the previous session
b) Start a new session
c) Check whether a valid session exists
d) Handle the session
A. C
A. REPOSITORY PATTERN
226. A type of query that is placed within a WHERE or HAVING clause of another query is called
a) Master query
b) Sub query
c) Super query
d) Multi-query
A. SUB QUERY
A. 64 K
229.Which view in architectural design shows the key abstractions in the system as objects or
object classes?
a) physical
b) development
c) logical
d) process
A. LOGICAL
232. The ________ protocol is the transmission mechanism used by the TCP/IP suite.
ARP
A)
B)IP
C)RARP
IP
233.The ALU and control unit of most of the microcomputers are combined and manufacture
on a single silicon chip. What is it called?
a. monochip
b. microprocessor A. MICROPROCESSOR
c. ALU
d. control unit
B)a connectionless
C)both a and b
UNRELIABLE, CONNECTIONLESS
A. C.
240.Which of the following data types are preceded by an "at" sign (@) in Perl?
A - Scalar B - Array C - Hashes D - All of the above.
A. ARRAY
241.The IPv4 header field formerly known as the service type field is now called the _______
field
A)IETF
B)checksum
C)differentiated services
242. Which of these following sensors is a useful as part of a burglar alarm system for
commercial buildings?
A. MOTION SENSOR, ULTRASONIC SENSOR
243.Which of the following statement restarts the loop block without evaluating the
conditional again?
A - next
B - last
C - continue
D - redo
NEXT
244.Which of the following is not real-time architectural patterns that are commonly used?
a) Asynchronous communication
b) Observe and React
c) Environmental Control
d) Process Pipeline
A. ASYNCHRONOUS COMMUNICATION
B)domain name
A. EXTERNAL
249.In PERL which of the following operator checks if the value of two operands are equal or not,
if yes then condition becomes true?
A - < B - >= C - <= D - <=>
A. <=
a linear list
A)
an
B)inverted-
tree
a three-
C)dimensional
None of the
D)choices are
correct
253.In PERL which of the following operator returns true if the left argument is stringwise less
than the right argument?
A - lt B - gt C - le D – ge
A. LE
B)dots
C)colons
259.ALU is
A. ARITHMETIC LOGICAL UNIT
260.DNS can use the services of ________ using the well-known port 53.
A)UDP
B)TCP
C)either a or b
TCP OR UDP
262.What is Perl?
A. PROGRAMMING LANGUAGE
263.Which of the following is an example of a controller for a car braking system?
a) Observe and React
b) Process Pipeline
c) Environmental Control
A. BREAK PEDALS
A. STACK
A)terminal network
B)telephone network
C)telecommunication network
TERMINAL NETWORK
266. BCD is
A. BINARY CODED DECIMAL
267.What data structure would you mostly likely see in a non recursive implementation of
a recursive algorithm?
a. LinkList
b. Stack
c. Queue
d. Tree
A. STACK
B)general-purpose
C)both a and b
272.Control systems may make use of the Environmental Control pattern, which is a general
control pattern that includes _________processes.
a) sensor
b) actuator
c) pipeline
d) both sensor and actuator
A. SENSOR AND ACQUATOR
273.When a user logs into a local time-sharing system, it is called ________ login
A)local
B)remote
C)temporary
A. LOCAL
274.A key that consists of more than one attribute to uniquely identify rows in a table is called
A. COMPOSITE KEY
277.________ can be associated with a separate processor or core, so that the processing steps
can be carried out in parallel.
B)remote
C)temporary
REMOTE LOGIN
281.Which of the following examples is/are models of application architectures?
a) a means of assessing components for reuse
b) a design checklist
c) a vocabulary for talking about types of applications
d) All of the mentioned
A. ALL OF THE ABOVE
283.NVT uses two sets of characters, one for _____and one for __________.
A)sending; receiving
B)request; reply
C)data; control
285.The DBMS acts as an interface between what two components of an enterprise-class database
system?
[A]. Database application and the database
288.The _______ is software residing on the remote system that allows the remote system to
receive characters from a TELNET server.
A)terminal driver
B)pseudoterminal driver
C)TELNET client
PSEUDOTERMINAL DRIVER
290. During transfer of data between the processor and memory we use ______ .
a) Cache
b) TLB
C) Buffers
d) Registers
A. REGISTERS
291.All the operations in a transaction need to be completed before the database changes are
made ________.
B)TELNET client
C)TELNET server
A. B
A)TELNET
B)SMTP
C)TFTP
298.Systems that involve interaction with a shared database can be considered as.
a) software-based
b) transaction-based
c) server-based
d) client-based
A. TRANSACTION BASED
300.With respect to the following “for” loops in C, choose the correct statement
int i=0;
for (i < 10; i = 0 ; i++) // (i) TRUE
for (i++ ; i = 0) // (ii)
for (i = 0; i++ ; i < 10) // (iii)
for (i = 0; i<10 ; i ++) // (iv)
for (i++; i = 0 ; i < 10) // (v)
for (i=1; i <=10 ; i = 10) ;// (vi)
302. What translates a natural or an artificial language into another representation of that
language and, for programming languages also execute the resulting code?
303. ........... table store information about database or about the system.
A) SQL
B) Nested
C) System
D) None of these
A. SYSTEM
304.FTP uses the services of ________.
A)UDP
B)IP
C)TCP
306. In FTP, the well-known port ____ is used for the control connection and the well-
known port ________ for the data connection
A)21; 22
B)21; 20
C)20; 21
21 20
A. CACHE
309.
#include <stdio.h>
int main()
{
int i = 10;
printf("%d", (++i)++);
return 0;
}
What is the output of the above program?
310. ............defines the structure of a relation which consists of a fixed set of attribute-domain pairs.
A) Instance
B) Schema
C) Program
D) Super Key
A. SCHEMA
313.When the sender and the receiver of an email are on the same system, we need
only ___________.
A)one UA
B)two UAs
A) Select
B) Group-by
C) Having
D) Order by
A. HAVING
318. When the sender and the receiver of an email are on different systems, we
need only _____________.
A)one MTA
B)two UAs
A. B
A. TIMING SIGNALS
321.When the sender is connected to the mail server via a LAN or a WAN,
we need ______________
A)two MTA
2 UA’S nd 2 mta’s
323.What will be the data type of the result of the following operation in C?
(float)a * (int)b / (long)c * (double)d
a) int
b) long
c) float
d) double
A. DOUBLE
324. Which is the first step in the software development life cycle?
a) Analysis
b) Design
c) Problem/Opportunity Identification
d) Development and Documentation
A. C
A. C
B)header; body
C)envelop; body
A. VIRTUAL MEMORY
A. AN ALGORITHM
A. schema
B. application program
C. data definition language
D. code
A. SCHEMA
335.The formal protocol that defines the MTA client and server in the
Internet is called ___________.
A)SMTP
B)SNMP
C)TELNET
SMTP
339.In the Analysis phase, the development of the ____________ occurs, which is a clear
statement of the goals and objectives of the project.
a) documentation
b) flowchart
c) program specification
d) design
A. PROGRAM SPECIFICATION
340.The candidate key is that you choose to identify each row uniquely is called ......
A) Alternate Key
B) Primary Key
C) Foreign Key
D) None of the above
A. PRIMARY KEY
B)half-duplex
C)full-duplex
D)automatic
SIMPLEX
What is the output for the following C Program?
int main()
{
int x = 5, y = 2, z=3;
z = (++y) ? y == 1 && x : x++ + y--;
printf("%d", z);
return 0;
}
A. NUMERICAL DATA
345.Actual programming of software code is done during the ____________ step in the SDLC.
A. Maintenance and Evaluation
B. Design
C. Analysis
D. Development and Documentation
A. D
B)multipoint
C)primary
D)secondary
A. POINT TO POINT
A. OPERATION CODES
A) NODUPLICATE
B) ELIMINATE
C) DISTINCT
D) None of these
A. DISTINCT
B)ITU-T
C)ANSI
D)ISO
EIA
A. NORMALIZATION
354.Can we use a function as a parameter of another function in C? [ Eg: void get(int func()) ]
358. Multiprocessor uses large caches but limited process that shares ___ ?
A. Control Bus
B. Memory Bus
C. Multiple memory bus
D. Single memory bus
359.
What is the output for the following C Program?
#include <stdio.h>
int main()
{
printf("%d", main);
return 0;
}
B)NCP
C)UNIX
D)ACM
.
What is the output of this C code?
#include <stdio.h>
int main()
{
int i = 0;
do
{
i++;
if (i == 2)
continue;
printf("Hai ");
B)half-duplex
C)full-duplex
366. The importance of software design can be summarized in a single word which is: ____.
a) Efficiency
b) Accuracy
c) Quality
d) Complexity
A. QUALITY
368.In C, array sizes are optional during array declaration by using ______ keyword.
a) auto
b) static
c) extern
d) register
A. EXTERN
370. The _______ layer is the layer closest to the transmission medium.
A. physical
B. data link
C. network
D. transport
A. PHYSICAL
EFFECTIVE ADDRESS
372.Layer 2 lies between the physical layer and the _______ layer.
A)Network
B)Data link
C)Transport
374. The language that requires a user to specify the data to be retrieved without specifying
exactly how to get it is
A. Procedural DML
B. Non-Procedural DML
C. Procedural DDL
D. Non-Procedural DDL
A. D
377.____ processor has to check continuously till device becomes ready for
transferring the data
A. DMA
B. Interrupt-initiated I/O
C. IOP
D. DCP
A. C
381.The Unified Modeling Language (UML) has become an effective standard for software
modelling. How many different notations does it have?
a) Three
b) Four
c) Six
d) Nine
A. 9
382. In the OSI model, encryption and decryption are functions of the ________ layer
A)transport
B)session
C)presentation
D)application
A. PRESENTATION
383.The way a particular application views the data from the database that the application uses is a
A. module
B. relational model
C. schema
D. subschema
A. SUB SCHEMA
A. CACHE MEMORY
385.What is the output for the following C code?
#include <stdio.h>
int main()
{
register int i = 5;
int *p = &i;
*p = 6;
printf("%d %d ", i, *p);
}
386. Which model in system modelling depicts the dynamic behaviour of the system?
a) Context Model
b) Behavioral Model
c) Data Model
d) Object Model
A. BEHAVIORAL MODEL
387.To deliver a message to the correct application program running on a host, the
_______ address must be consulted.
a) IP
b) MAC
c) Port
d) None of the mentioned
A. C
389.In C, register keyword forces the compiler to place the variable in machine register
a) true
b) false
c) Depends on the standard
d) None of the mentioned
FALSE
390. A number system that uses only two digits, 0 and 1 is known as ?
A. BINARY SYSTEM
391.
What is the output for the following C Program?
#include<stdio.h>
int main()
{
typedef static int *i;
int j;
i a = &j;
printf("%d", *a);
return 0;
}
392.______________, express the number of entities to which another entity can be associated via
a relationship set.
A Logical Cardinality
B None of these
C Mapping Cardinality
D Messaging Cardinality
MAPPING CARDINALITY
A) User
R
B) network
395.Which model in system modelling depicts the static nature of the system?
a) Behavioral Model
b) Context Model
c) Data Model
d) Structural Model
A. STRUCTURAL MODEL
397.The _________ is a person having central control over data and programs accessing that data.
398.Which of the following diagram is not supported by UML considering Data-driven
modelling?
a) Activity
b) Data Flow Diagram (DFD)
c) State Chart
d) Component
DATA FLOW DIAGRAM
B) bidirectional
C) unidirectional
D) horn
A. UNIDIRECTIONAL
A. true
B. false
A. TRUE
A)Coaxial
B)Fiber-optic
C)Twisted-pair
407.Every time attribute A appears, it is matched with the same value of attribute B, but not the
same value of attribute C. Therefore, it is true that:
A. A → B.
B. A → C.
C. A → (B,C).
D. (B,C) → A.
A. A
408.______________ is the property which allows to produce different executable for different
platforms in C
409.In which of the following status flags required for data transfer are present?
A. Interface Circuit
B. Parallel Line
C. Device Circuit
D. None of Above
410. ______ allows us to infer that different members of classes have some common
characteristics.
a) Realization
b) Aggregation
c) Generalization
d) dependency
A. GENERALISATION
B) Fiber-optic
C) Twisted-pair
A. FIBER OPTIC
413._____ & ______ diagrams of UML represent Interaction modeling.
a) Use Case, Sequence
b) Class, Object
c) Activity, State Chart
414. Which interrupt establishes a priority over the various sources to determine which
request should be entertained first ?
A. Polling
B. Daisy chaining
C. Priority interrupt
D. All of above
A. PRIORITY INTERRUPT
415.C Preprocessor feature that supply line numbers and filenames to compiler is called as
__________
A. Selective inclusion
B. macro substitution
C. Concatenation
D. Line control
A. LINE CONTROL
416.Which of the following is the preferred way to recover a database after a transaction in progress
terminates abnormally?
A. Rollback
B. Rollforward
D. Reprocess transactions
A. ROLLBACK
417.Which level of Entity Relationship Diagram (ERD) models all entities and relationships?
a) Level 1
b) Level 2
c) Level 3
A. LEVEL 2
#include <heaferfile.h> are _______ files and #include “headerfile.h” are ________ files
419.Which technique is used that identifies the highest priority resource by means of
software ?
A. Daisy chaining
B. Polling
C. Priority
D. Chaining
POLLING
420.________ uses four twisted-pair cables that connect each station to a common hub.
A) 10Base
5
B) 10Base2
C) 10Base-T
D) 10Base-F
10BASE T
B. To ensure data integrity when updates occur to the database in a single-user environment
C. To ensure data integrity while reading data occurs to the database in a multiuser environment
To ensure data integrity while reading data occurs to the database in a single-user
D.
environment
A. A
423.Which method is used to establish priority by serially connecting all devices that
request an interrupt ?
a) Vectored-interrupting
b) Daisy chain
c) Priority
d) Polling
A. DAISY CHAIN
424.In Ethernet addressing, if the least significant bit of the first byte is 0, the address is
_________.
unicas
A) t
B) multicast
C) broadcast
UNICAST
425. ___________ classes are used to create the interface that the user sees and interacts with
as the software is used.
A. C
428.When an entity instance must be a member of only one subtype, it is which of the following?
A. Disjoint with total specialization
B. Disjoint with partial specialization
C. Overlap with total specialization
D. Overlap with partial specialization
A. A
A. C
) 25
5
B) 15
C) 0
A. 0
431.What is meaning of DMAC ?
DIRECT MEMORY ACCESS CONTROLLER
Subtypes at the higher lever in the hierarchy inherit attributes only from their immediate
C.
subtype.
A. B
434. The model in which the requirements are implemented by its category is ______.
a. Evolutionary Development Model
b. Waterfall Model
c. Prototyping
d. Iterative Enhancement Model
B)16,777,216
C)256
437.What type of join is needed when you wish to include rows that do not have matching
values?
a) Equi-join
b) Natural join
c) Outer join
d) All of the Mentioned
A. OUTER JOIN
438. What will happen if you create a file stdio.h and use #include “stdio.h” in C?
a) The predefined library file will be selected
b) The user-defined library file will be selected
c) Both the files will be included
d) The compiler won’t accept the program
A. B
439.If every requirement can be checked by a cost-effective process, then the SRS is:
verifiable
traceable
modifiable
complete
A. VERIFIABLE
440.The number of addresses assigned to an organization in classless addressing _______.
A)can be any number
C)must be a power of 2
B)/8
C)/16
16
a) Equi-join
b) Natural join
c) Outer join
d) Cartesian join
A. EQUI- JOIN
445.Which is used for this and known as high speed buffer exist with almost each
process ?
A. Primary
B. Secondary
C. Cache
D. RAM
A. CACHE
447.In IPv4, what is the length of the data field given an HLEN value of 12 and total
length value of 40,000?
A)39,988
B)40,012
C)40,048
D)39,952
39952
448.In which condition only one process holds a resource at a given time ?
A. Circular queue
B. Hold and Wait
C. Mutual exclusion
D. Non preemption
A. MUTUAL EXCLUSION
449. The New modules, that are need to be replaced or modified, and they are also
designed against requirement specifications set in the previous stage is ______ .
a. Acceptance testing
b. System Testing
c. Delivery
d. Design
A. DESIGN
Which of the following column properties would be used to specify that cells in a column must be
immediately filled with a monetary value of $10,000?
A. Null status
B. Data type
C. Default value
D. Data constraints
A. DEFAULT VALUE
451.Which of the following C statement, does not initialize ptr to null. (assuming variable declaration
of a as int a=0;)
a) int *ptr = &a;
b) int *ptr = &a – &a;
c) int *ptr = a – a;
d) All of the mentioned
A. A
452.In which condition one process holds the allocated resources and other waits for it ?
A. Non preemption
B. Mutual exclusion
C. Hold and wait
D. All of above
453.The term ________ means that IP provides no error checking or tracking. IP assumes the
unreliability of the underlying layers and does its best to get a transmission through to its
destination, but with no guarantees.
A)reliable delivery
B)connection-oriented delivery
C)best-effort delivery
464.In IPv4, which field or bit value unambiguously identifies the datagram as fragment?
A)Do not fragment bit ? 0
B)More Fragment bit ? 0
465.Which of the following query would display names of all the students whose honours subject is
English, or honours subject is Spanish and percentage of marks more than 80?
Answer : A
If requirements are easily understandable and defined then which model is best
suited?
a. Spiral model
b. Waterfall model
c. Prototyping model
d. None of the above
A. WATERFALL MODEL
467.What is returned by MOD(1000,30)?
468.In the Internet, the domain name space (tree) is divided into _______ different sections.
A)three
B)two
C)four
Which of the following is the correct syntax to send an array as a parameter to function in C
472.Which query will perform a natural join between the HONOURS_SUBJECT table and the
LOCATIONS table?
a. data transfer
b. logic operation
c. arithmetic operation
d. all of above
DNS can use the services of ________ using the well-known port 53.
A)UDP
B)TCP
C)either a or b
A. C
479._______ refers to two characteristics: when data should be sent and how fast it can be sent.
Semantics
A)
B)Syntax
C)Timing
480.The access time of memory is ............... the time required for performing any single
CPU operation.
A) Longer than
B) Shorter than
C) Negligible than
D) Same as
. LONGER THAN
483.What is the size of *ptr in a 32-bit machine, (assuming C initialization as int *ptr = 10;)?
a) 1
b) 2
c) 4
d) 8
A. 4
485.Memory address refers to the successive memory words and the machine is called
as ............
A) word addressable
B) byte addressable
C) bit addressable
A. WORD ADDRESSABLE
489. Which document is created by system analyst after the requirements are collected
from various stakeholders?
a. Software requirement specification
b. Software requirement validation
c. Feasibility study
d. Requirement Gathering
B) house pipeline
C) both a and b
D) a gas line
A. B
494. Which organization has authority over interstate and international commerce in the
communications field?
a) ITU-T
b) IEEE
c) FCC
d) ISOC
A. FCC
495. If every requirement stated in the Software Requirement Specification (SRS) has
only one interpretation, SRS is said to be correct _____ .
a. Unambiguous
b. Consistent
c. Verifiable
d. None of the above
A. UNAMBIGUOUS
496.The output of an AND gate with three inputs, A, B, and C, is HIGH when ________.
A. A = 1, B = 1, C = 0
B. A = 0, B = 0, C = 0
C. A = 1, B = 1, C = 1
D. A = 1, B = 0, C = 1
A. C
A. a criteria
B. a relation
C. a tuple
D. an attribute
A. TUPPLE
499. _______ are special-interest groups that quickly test, evaluate, and standardize
new technologies
A)Forums
B)Regulatory agencies
C)Standards organizations
D)All of the above
FORUMS
500.If a signal passing through a gate is inhibited by sending a LOW into one of the inputs, and the
output is HIGH, the gate is a(n):
A. AND
B. NAND
C. NOR
D. OR
A. NAND
501.Which of the following products was an early implementation of the relational model developed
by E.F. Codd of IBM?
A. IDMS
B. DB2
C. dBase-II
D. R:base
A. DB2
503._______ defines how a particular pattern to be interpreted, and what action is to be taken
based on that interpretation.
A. SEMANTICS
504.Comment on the output of this C code?
#include
int main()
{
char *str = "This" //Line 1
char *ptr = "Program\n"; //Line 2
str = ptr; //Line 3
printf("%s, %s\n", str, ptr); //Line 4
}
a) Memory holding “this” is cleared at line 3
b) Memory holding “this” loses its reference at line 3
c) You cannot assign pointer like in Line 3
d) Output will be This, Program
A. B
A. MICROSOFT ACCESS
506. Which of the following logical operations is represented by the + sign in Boolean algebra?
A. Inversion
B. AND
C. OR
D. Complementation
A. OR
509.The syntax for constant pointer to address (i.e., fixed pointer address) in C is:
a) const <type> * <name>
b) <type> * const <name>
c) <type> const * <name>
d) Both (a) and (c)
A. B
A. X = AB
B. X = ABC
C. X = A + B + C
D. X = AB + C
A. X=ABC
B. Microsoft's Access
C. IBM's DB2
A. ORACLE CORPORATION
513.What does the small bubble on the output of the NAND gate logic symbol mean?
A. open collector output
B. tristate
A. OUTPUT IS INVERTED
A. B
518. What are the pin numbers of the outputs of the gates in a 7432 IC?
A. 3, 6, 10, and 13
B. 1, 4, 10, and 13
C. 3, 6, 8, and 11
D. 1, 4, 8, and 11
A. C
A. 3
521.How many inputs of a four-input AND gate must be HIGH in order for the output of the
logic gate to go HIGH?
A. any one of the inputs
A. ALL 4 INPUTS
525.How many input combinations would a truth table have for a six-input AND gate?
A. 32
B. 48
C. 64
D. 128
A. 64
527.
What is the output of this C code?
#include <stdio.h>
int main()
{
int i = 0, j = 1;
int *a[] = {&i, &j};
printf("%d", (*a)[0]);
return 0;
}
530. A one-to-four line demultiplexer is to be implemented using a memory. How many bits must
each word have ?
A. 4 * 4 = 16 BITS
B. NOR gate
C. AND gate
D. OR gate
A. OR GATE
A. m/2
B. m-1
C. m
D. m+1
A. M
535. Which of the following statement(s) about stack data structure is/are NOT
correct?
a) Stack data structure can be implemented using linked list
b) New node can only be added at the top of the stack
c) Stack is the FIFO data structure
d) The last node at the bottom of the stack has a NULL link
A. C
After the completion of all operation, the no of element present on stack are
a) 1
b) 2
c) 3
d) 4
A. 1
540.The digital multiplexer is basically a combination logic circuit to perform the operation
A. AND-AND
B. OR-OR
C. AND-OR
D.OR-AND
A. AND – OR
545.Which of the following operation take worst case linear time in the array implementation
of stack?
a) Push
b) Pop
c) IsEmpty
d) None
A. NONE
A. POSTFIX EXPRESSIION
A. A 10101.001
548.In Ruby Arrays can be used to store multiple values in one single variable.
A. TRUE
549.Each element in an array has an index and the starting index is index 1.
a) True
b) False
A. FALSE
A. .IRREVERSE METHOD
554. If the elements “A”, “B”, “C” and “D” are placed in a stack and are deleted
one at a time, in what order will they be removed?
a) ABCD
b) DCBA
c) DCAB
d) ABDC
A. DCBA
A. 1011
557.A linear list of elements in which deletion can be done from one end (front)
and insertion can take place only at the other end (rear) is known as a ?
a) Queue
b) Stack
c) Tree
d) Linked list
A. QUEUE
558. The data structure required for Breadth First Traversal on a graph is?
a) Stack
b) Array
c) Queue
d) Tree
A. QUEUE
561.Let the following circular queue can accommodate maximum six elements
with the following data
front = 2 rear = 4
queue = _______; L, M, N, ___, ___
What will happen after ADD O operation takes place?
a) front = 2 rear = 5
queue = ______; L, M, N, O, ___
b) front = 3 rear = 5
queue = L, M, N, O, ___
c) front = 3 rear = 4
queue = ______; L, M, N, O, ___
d) front = 2 rear = 4
queue = L, M, N, O, ___
A. A
563.What would be the output if we try to execute following segment of C code (assuming
the following input “Have a nice day”)?
printf(“%s\n”, argv[argc]);
564.A queue is a ?
a) FIFO (First In First Out) list
b) LIFO (Last In First Out) list.
c) Ordered array
d) Linear tree
A. FIFO
566. Is it Possible to find two algebric expressions that specify same function
A. YES
A. B
569. What will be the output of the following?
"Ruby".reverse.upcase
b) RUBY
b) ybuR
c) YBUR
d) YBUr
A. C.
A. transition table
B. state table
C. flow table
D. excitation table
A. EXCITATION TABLE
573.A data structure in which elements can be inserted or deleted at/from both the
ends but not in the middle is?
a) Queue
b) Circular queue
c) Dequeue
d) Priority queue
A. C – DEQUEUE
A. FALSE
577.A normal queue, if implemented using an array of size MAX_SIZE, gets full
when
1. Two variables will be represented by
579.What will be the output of the following my $txt = 'I am learning Perl';my ($match) = $txt
=~ /\s(.*)\s/;
a. am learning
b. I am learning Perl
c. learning
d. am
e. none A. AM LEARNING
580.A linear collection of data elements where the linear node is given by means of pointer
is called?
a) Linked list
b) Node list
c) Primitive list
d) None
A. LINKED LIST
583.
What is the output of this C code?
#include <stdio.h>
struct p
{
int x;
char y;
};
int main()
{
struct p p1[] = {1, 92, 3, 94, 5, 96};
struct p *ptr1 = p1;
int x = (sizeof(p1) / 3);
if (x == sizeof(int) + sizeof(char))
printf("%d\n", ptr1->x);
else
printf("falsen");
}
584.In linked list each node contain minimum of two fields. One field is data field to store the
data second field is?
c) Pointer to character
b) Pointer to integer
c) Pointer to node
d) Node
A. POINTER TO NODE
585.A variant of linked list in which last node of the list points to the first node of the list is?
a) Singly linked list
b) Doubly linked list
c) Circular linked list
d) Multiply linked list
A. CIRCULAR LINKED LIST
586. Which of the following are incorrect syntax for pointer to structure in C?
(Assuming struct temp{int b;}*my_struct;)
a) *my_struct.b = 10;
b) (*my_struct).b = 10;
c) my_struct->b = 10;
d) Both (a) and (b)
A. A
591.
For the following C function call which option is not possible?
func(&s.a); //where s is a variable of type struct and a is the member of the struct.
592.A variant of the linked list in which none of the node contains NULL pointer
is?
a) Singly linked list
b) Doubly linked list
c) Circular linked list
d) None
A. CIRCULAR LINKED LIST
593.
1. One that is not type of flipflop is
One that is not type of flipflop is
594.
1. Flip-flops can be constructed with two
595.
What is the output of this C code?
#include <stdio.h>
struct p
{
int x;
int y;
};
int main()
{
struct p p1[] = {1, 92, 3, 94, 5, 96};
struct p *ptr1 = p1;
int x = (sizeof(p1) / 5);
if (x == 3)
printf("%d %d\n", ptr1->x, (ptr1 + x - 1)->x);
else
printf("false\n");
}
I AM LEARNING
602. The post order traversal of binary tree is DEBFCA. Find out the pre order
traversal.
A. ABFCDE
B. ADBFEC
C. ABDECF
D. ABDCEF
A. C
TRAVERSAL
604.In MySQL Which “text type” has the maximum number of bytes?
605.
1. To perform product of maxterms Boolean function must be brought into
A. AND terms
B. OR terms
C. NOT terms
D. NAND terms
A. OR TERMS
A. NOT gates
B. OR gates
C. AND gates
D. XOR gates
A. OR GATES
616.Every node N in a binary tree T except the root has a unique parent called
the ......... of N.
A. Antecedents
B. Predecessor
C. Forerunner
D. Precursor
A. PREDECESSOR
617.In MySQL what is the default format for “Date” data type?
A) B)
3 2
C) D)
1 6
623.In MySQL what is the default format for “Datetime” data type?
A) B)
3 5
C) D)
7 9
A. 60
[B]. XY + YZ
[C]. X + YZ
[D]. XZ + Y
633.In MySQL what is the default format for “Time” data type?
A. Discovering
B. Finding
C. Searching
D. Mining
A. SEARCHING
635.Which of the following boolean expressions is not logically equivalent to all of the rest ?
(a) wxy' + wz' + wxyz + wy'z
(b) w(x + y' + z')
(c) w + x + y' + z'
(d) wx + wy' + wz'
A. C
A. MERGE SORT
A. TREE SORT
641.In MySQL, Is it necessary to insert the value in each column of the table?
Selection sort first finds the .......... element in the list and put it in the first
position.
A. Middle element
B. Largest element
C. Last element
D. Smallest element
A. SMALLEST ELEMENT
644.A combinational logic circuit which generates a particular binary word or number is
645.Which statement can be used for modifying the definition for an existing table?
647. In which of the following adder circuits, the carry look ripple delay is eliminated ?
649.A full-adder is a logic circuit which can add two single order bits plus a carry in from a previous
adder. Its incomplete truth table is given in the table below. The missing entry in the outputs for SUM
and CARRY out are
Input Outputs
A A B Cin Sum CarryOUT
0 0 0 0 0 0
0 0 0 1 1 0
0 0 1 0 1 0
0 0 1 1 0 1
1 1 0 0 1 0
1 1 0 1 0 1
1 1 1 0 0 1
1 1 1 1 ? ?
656. Which of the following sorting algorithm is of divide and conquer type?
A. Bubble sort
B. Insertion sort
C. Quick sort
D. Merge sort
A. QUICK SORT
655.Which statement is used to select columns and rows from the table?
Which of the following equations would accurately describe a four-input OR gate when A =
1, B = 1, C = 0, and D = 0?
659.If thenumber of record to be sorted large and the key is long, then ......
sorting can be efficient.
661.In the following query “*” stands for SELECT * FROM person;
What is the name of a digital circuit that produces several repetitive digital waveforms?
665.
Which Clause is used to select a particular row from the set of row in an existing table?
667.The logic gate that will have HIGH or "1" at its output when any one (or more) of its inputs is
HIGH is a(n):
668.
Which Clause is used to sort the stored data in alphabetical order?
669.
Binary search algorithm cannot be applied to ...
Which Clause is used to select a particular table in Mysql?
671.
Which of the following gates is described by the expression ?
673.
Which command is used to show all tables that are stored in a database?
675.
How is a J-K flip-flop made to toggle?
676.
............ is the method used by card sorter.
677.
Which statement is used for updating existing information in the table?
679.
Dijkstra algorithm is also called the ...................... shortest path problem.
680.
How many flip-flops are required to produce a divide-by-128 device?
681.
Which of the following is correct for a gated D flip-flop?
683.
..................... solves the problem of finding the shortest path from a point in a
graph to a destination.
684.
................. is a most generalized single source shortest path algorithm to find
the shortest path in a graph even with negative weights.
685.
A correct output is achieved from a master-slave J-K flip-flop only if its inputs are stable
while the:
691.On a positive edge-triggered S-R flip-flop, the outputs reflect the input condition when
________.
692...........
may take place only when there is some minimum amount(or) no
space left in free storage list.
693.A linear list in which the pointer points only to the successive node is ......
695.If an active-HIGH S-R latch has a 0 on the S input and a 1 on the R input and then the R input
goes to 0, the latch will be ________.
A. C
703.In a linked list the .......... field contains the address of next element in the
list.
A. Link field
B. Next element field
C. Start field
D. Info field
A. LINK FIELD
704.Which one of the following PHP function is used to determine a file’s last access time?
a) fileltime()
b) filectime()
c) fileatime()
d) filetime()
A. FILEATIME()
B. Two fields
C. Four fields
D. Five fields
A. TWO FIELDS
709.Which one of the following function is capable of reading a file into a string variable?
a) file_contents()
b) file_get_contents()
c) file_content()
d) file_get_content()
A. FILE_GET_CONTENTS
A. edge-triggered
B. toggle triggered
C. clock triggered
D. noise triggered
A. EDGE TRIGGERED
713.A gated S-R latch and its associated waveforms are shown below. What, if anything, is wrong
and what could be causing the problem?
A. The output is always low; the circuit is defective.
B. The Q output should be the complement of the output; the S and R terminals are reversed.
A. A
714. An active-HIGH input S-R latch has a 1 on the S input and a 0 on the R input. What state is the
latch in?
A.
B.
C.
D.
A. 1, 0
715......................
of binary search tree starts by visiting the current node, then its
left child and then its right child.
A) Preorder traversal
B) In-order traversal
C) Linear traversal
D) Post-order traversal
A. PREORDER TRAVERSAL
716.Which one of the following function is capable of reading a specific number of characters
from a file?
a) fgets()
b) fget()
c) fileget()
d) filegets()
A. FGETS ()
C. A is true, R is false
D. A is false, R is true
A. TRUE, FALSE
719.A binary search tree whose left subtree and right subtree differ in hight by at
most 1 unit is called ……
A) AVL tree
B) Red-black tree
C) Lemma tree
D) None of the above
A. AVL TREE
720.4 bit 2's complement representation of a decimal number is 1000. The number is
A. -8
B) False, True
C) True, True
D) False, False
A. TRUE TRUE
723.Which of the following data structure can't store the non-homogeneous data
elements?
A) Arrays
B) Records
C) Pointers
D) Stacks
A. ARRAYS
724.
What is the output for the following C program?
union u
{
struct p
{
unsigned char x : 2;
unsigned int y : 2;
};
int x;
};
int main()
{
union u u;
u.p.x = 2;
printf("%d\n", u.p.x);
}
725.The digital multiplexer is basically a combination logic circuit to perform the operation
A. AND-AND
B. OR-OR
C. AND-OR
D.OR-AND
A. AND OR
726. A 4 : 1 multiplexer requires __________ data select line.
A. 1
B. 2
C. 3
D. 4
A. 2
727.A ....... is a data structure that organizes data similar to a line in the
supermarket, where the first one in line is the first one out.
A) Queue linked list
B) Stacks linked list
C) Both of them
D) Neither of them
A. QUEUE LINKED LIST
728.
What is the output of this C code?
#include <stdio.h>
int main()
{
char buf[12];
stderr = stdin;
fscanf(stderr, "%s", buf);
printf("%s\n", buf);
}
731.It is desired to display the digit 7 using a seven segment display. The LEDs to be turned on are
732.Identify the data structure which allows deletions at both ends of the list but
insertion at only one end.
A) Input restricted dequeue
B) Output restricted qequeue
C) Priority queues
D) Stack
A. INPUT RESTRICTED DEQUEUE
733.Which of the following function can be used to terminate the main function from another function
safely in C?
a) return(expr);
b) exit(expr);
c) abort();
d) Both b and c
A. EXIT
735.fputs function in C, writes a string to a file that only ends with a newline.
a) true
b) false
c) Depends on the standard
d) Depends on the compiler
A. FALSE
A) Dequeue
B) Priority
C) Tree
D) Graph
A. TREE
A. ALWAYS
740.An 8 bit data is to be entered into a parallel in register. The number of clock pulses required is
[A]. 8
[B]. 4
[C]. 2
[D]. 1
A. 1
741.A directed graph is ………………. if there is a path from each vertex to every
other vertex in the digraph.
A) Weakly connected
B) Strongly Connected
C) Tightly Connected
D) Linearly Connected
A. STRONGLY CONNECTED
742. Which pre-defined C function returns a pointer to the last occurrence of a character in a string?
a) strchr(s, c);
b) strrchr(s, c);
c) strlchr(s, c);
d) strfchr(s, c);
A. B
745.In
the …………….. traversal we process all of a vertex’s descendants before
we move to an adjacent vertex.
746. A16 X 216 __________ .
747.StateTrue of False.
i) Network is a graph that has weights or costs associated with it.
ii) An undirected graph which contains no cycles is called a forest.
iii) A graph is said to be complete if there is no edge between every pair of
vertices.
749.Which is true about isaplpha(c), where c is an int that can be represented as an unsigned
char or EOF.isalpha(c) returns?
A. C
751.A XOR gate has inputs A and B and output Y. Then the output equation is
752.In C, the ungetc function can be used only with getc function
754. In general, the binary search method needs no more than …………….
comparisons.
A) [log2n]-1
B) [logn]+1
C) [log2n]
D) [log2n]+1
A. D
756.A ……….. is a graph that has weights of costs associated with its edges.
A) Network
B) Weighted graph
C) Both A and B
D) None A and B
A. BOTH A AND B
759.A + (B . C) =
760.How many characters for pushback is guaranteed per file while using the following C function
ungetc(c, fp);761.
761. A graph is a collection of nodes, called ………. And line segments called
arcs or ……….. that connect pair of nodes
A) vertices, edges
B) edges, vertices
C) vertices, paths
D) graph node, edges
A. VERTICES, EDGES
763.The inputs to a 3 bit binary adder are 1112 and 1102. The output will be
The K-map for a Boolean function is shown in figure. The number of essential prime implicants
for this function is
A. 4
A) True, True
B) False, True
C) False, False
D) True, False
A. TRUE TRUE
769.The modulus of counter in the given figure is
A. 1
B. 2
C. 3
D. 4
A. 3
define s to be
A. A
775.In
……………, search start at the beginning of the list and check every
element in the list.
A. LINEAR SEARCH
A. 22 bytes
B. 14 bytes
C. 18 bytes
D. 10 bytes
B. 18 BYTES
781.Statetrue or false.
i) The degree of root node is always zero.
ii) Nodes that are not root and not leaf are called as internal nodes.
A) True, True
B) True, False
C) False, True
D) False, FalsSE
A. C, FALSE TRUE
782.Which one of the following function in PHP outputs the contents of a string variable to the specified
resource?
a) filewrite()
b) fwrite()
c) filewrites()
d) fwrites()
A. FWRITE()
783.Any node is the path from the root to the node is called
A) Successor node
B) Ancestor node
C) Internal node
D) None of the above
A. ANCESTOR NODE
A. 5
787.Two 2's complement number having sign bits X and Y are added and the sign bit of the result is
Z. then, the occurrence of overflow is indicated by the Boolean function.
A. XYZ
B. XYZ
C. X YZ + XY Z
D. XY + YZ + ZX
A. C
788.
State true of false.
i) A node is a parent if it has successor nodes.
ii) A node is child node if out degree is one.
) True, True
B) True, False
C) False, True
D) False, False
A. TRUE, FALSE
790.To check whether a file was uploaded, you look in the ___ superglobal array.
a) $_FILES
b) $_DOCS
c) $_DOCUMENTS
d) $_FOLDERS
A. FILES
792.Inheritance is the means by which one or more classes can be derived from a/an ___ class.
a) base
b) abstract
c) null
d) predefined
A. BASE
793.In a 3 input NOR gate, the number of states in which output is 1 equals
794. Which of the following are the operations applicable an primitive data
structures?
A. create
B. destroy
C. update
A. AL OF THE ABOVE
795.Which of the following statements can be used to set the time zone in individual PHP scripts?
a) date_set_timezone(‘Europe/London’);
b) date_default_timezone_set(‘Europe/London’);
c) date_set_default_timezone(‘Europe/London’);
d) date_default_timezone(‘Europe/London’);
A. B
799. Which one of the following functions can be used to compress a string in PHP?
a) zip_compress()
b) zip()
c) compress()
d) gzcompress()
A. Gzcompress()
800.Which one of the following function reads a directory into an Array in PHP?
a) scandir()
b) readdir()
c) scandirectory()
d) readdirectory()
A. SCANDIR()
A. ANY POSITION
802. Which one of the following function returns the port number of a specified service in PHP?
a) getportname()
b) getservername()
c) getserverbyname()
d) getservbyname()
A. GETSERVERBYNAME()
803.A list which displays the relationship of adjacency between elements is said
to be
A) linear
B) non linear
C) linked list
D) trees
LINEAR