Sunteți pe pagina 1din 154

1. Which among following can be considered as most advanced ROM ?

A. EEPROM

2. What will be printed after execution of the following program code?


void main()
{
printf("\\nab");
printf("\\bsi");
printf("\\rha");
}

A. HAI

3. Which one of the following models is not suitable for accommodating any change?
A. WATERFALL MODEL

4. One byte equals to how many bits ?

A. 8 BITS

5. What is Software?
A. A COMP. APPLICATION

6. Which of the following is not a level of data abstraction?

A. CRITICAL LEVEL

7. If an integer needs four bytes of storage, then maximum value of an unsigned integer
is
A. 2^n-1 -1
8.Which among following is Volatile ?
a. RAM

9.Which of the following is the correct order of evaluation for the below expression?
q = (a - b) + c * d / e % f - g

10. Which topology requires a multi point connection?

A. BUS TOPOLOGY

11. Disadvantages of File systems to store data is:


 Data redundancy and inconsistency.
 Integrity Problems.
 Security Problems.
 Difficulty in accessing data.
 Data isolation.

12. Which of these does not account for software failure?


A. Increasing Supply

13. In an Entity-Relationship Diagram Rectangles represents


A. ENTITY SETS

14. Where the result of an arithmetic and logical operation are stored ?

A. In Accumulator

15.What are attributes of good software?


A. ALL
16. How many times "Programming in C" is get printed?
#include<stdio.h>
int main()
{
int x;
for(x=0; x<10; );
{
if(x < 5)
continue;
else
break;
printf("Programming in C");
x++;
}
return 0;
}
A. 0

17.A television broadcast is an example of _______ transmission.


A. SIMPLEX

18. _______ refers to the structure or format of the data, meaning the order in which
they are presented.
A. SYNTAX

19.Which of the following is not a Storage Manager Component?


A. LOGICAL MANAGER

20.Why we need to have secondary storage ?


A. TO MOVE DATA BETWEEN RAM AND CPU

21.Which of the following cannot be checked in a switch-case statement?


A.
A. Character

B. Integer

C. Float

D. enum
A. FLOAT
22. Which of these software engineering activities are not a part of software
processes?
a. Software dependance
b. Software development
c. Software validation
d. Software specification

A. SOFTWARE DEPENDENCE

23.Which determines the address of I/O interface ?

A. Register select
B. Chip select
C. Both of above
D. None of above

A. BOTH

24.In a ______ connection, two and only two devices are connected by a dedicated link.

A)multipoint

B)point-to-point

C)(a) and (b)

D)none of the above

A. POINT TO POINT

25. Which of these is incorrect?

Data Manipulation Language enables users to:


27.The keyword used to transfer control from a function back to the calling function is
A. switch

B. goto

C. go back

D. return

A. RETURN

28. Which of the following is not a Schema?


A. CRITICAL

29.An exception condition in a computer system caused by an event external to the CPU is
known as?
A) Interrupt

B) Halt

C) Wait

D) Process
A. INTERRUPT

31. A _______ is a data communication system within a building, plant, or campus, or


between nearby buildings.
A. LAN
32. How many times will “Hello World” be printed for the following code?
int main()
{
int i = 1024;
for (; i; i >>= 1)
printf("Hello World");
return 0;
}

A. 1024 / 1025

33. Which of the following is Database Language?


A. DDL, DML, QUERY LANGUAGE

34. What does PHP stand for?


A. PERSONAL HOME PAGE / PREPROCESSSOR

35. A ________ is a set of rules that governs data communication.


A. PROTOCOL

36. Whenever CPU detects an interrupt, what it do with current state ?


A. SAVES CURRENT STATE

37. Which of these does not affect different types of software as a whole?
a) Heterogeneity
b) Flexibility
c) Business and social change
d) Security

A. FLEXIBILITY

38. The process-to-process delivery of the entire message is the responsibility of the
_______ layer.
A.
A)Network

B)Transport

C)Application

D)Physical

TRANSPORT LAYER
39. I/O processor has direct access to ?
A. Main Memory
B. Secondary Memory
C. Flash Memory
D. ROM

A. MAIN MEMORY

40. The fundamental notions of software engineering does not account for?
a. Software processes
b. Software Security
c. Software reuse
d. Software Validation
SOFTWARE VALIDATION

41. Which of the following in not a function of DBA?


NETWORK MAINTAINENCE

42. Who is the father of PHP?


RASMUS LERDORF
43. PHP files have a default file extension of ( HYPERTEXT PREPROCESSOR )
a) .html
b) .xml
c) .php
d) .ph
A. .PHP

44. The address mapping is done, when the program is initially loaded is called ?
A) dynamic relocation
B) relocation
C) static relocation
D) dynamic as well as static relocation

A. STATIC RELOCATION

45. Which of the following is a Data Model?


A. ALL
46. When a host on network A sends a message to a host on network B, which address
does the router look at?
A)
Port

B)logical

C)physical

none of
D)the
above

LOGICAL

47. Which of these is not true?

48. What is the major advantage of using Incremental Model?


a) Customer can respond to each increment
b) Easier to test and debug
c) It is used when there is a need to get a product to the market early
d) Both b & c

A. BOTH B AND C

49.A PHP script should start with ___ and end with ___:
a) < php >
b) < ? php ?>
c) <? ?>
d) <?php ?>
A. C OR D

50. IPv6 has _______ -bit addresses.


A. 128 BIT

51. The unit which decodes and translates each instruction and generates the necessary enable
signals for ALU and other units is called
A) arithmetic unit
B) logical unit
C) control unit
D) CPU

CONTROL UNIT

52. Which of the following represents a relationship among a set of values.


A. A ROW

53. The spiral model was originally proposed by


a) IBM
b) Barry Boehm
c) Pressman
d) Royce
A. BARRY BOEHM

54. ________ provides full transport layer services to applications.


A)TCP
55. A microprogram is sequencer perform the operation ?
A) read
B) write
C) read and write
D) read and execute

A. READ AND EXECUTE

56. Column header is referred as


A. ATTRIBUTES

57. Which of the looping statements is/are supported by PHP?


i) for loop
ii) while loop
iii) do-while loop
iv) foreach loop
a) i) and ii)
b) i), ii) and iii)
c) All of the mentioned
d) None of the mentioned
A. ALL

58.A Relation is a

59. Which one of the following is not a step of requirement engineering?

elicitation
b) design
c) analysis
d) documentation

A. DESIGN
60. Which among following is an important data transfer technique?
A. CAD
B. CAM
C. DMA
D. MMA
A. DMA

61. The seven-layer _____ model provides guidelines for the development
of universally compatible networking protocols.

A. OSI

62. Which of the following is/are a PHP code editor?


i) Notepad
ii) Notepad++
iii) Adobe Dreamweaver
iv) PDT
a) Only iv)
b) All of the mentioned.
c) i), ii) and iii)
d) Only iii)

A. ALL

63.In mathematical term, Table is referred as

A. RELATION

64.RISC stands for ?


A. Reduced Instruction Set Computer.

65. Which of the following must be installed on your computer so as to run PHP script?
i) Adobe Dreamweaver
ii) PHP
iii) Apache
iv) IIS
A. PHP, APACHE, IIS
66. Which one of the following is a requirement that fits in a developer’s module?
a) Availability
b) Testability
c) Usability
d) Flexibility

A. TESTABILITY

67. The ____ address uniquely defines a host on the Internet.


A. IP ADDRESS

68. _______ allow us to identify uniquely a tuple in the relation.


A. SUPERKEY

69. What are the four dimensions of Dependability?

70. The TCP/IP _______ layer is equivalent to the combined session, presentation, and
application layers of the OSI model
A)user

B)network

C)both (a) and (b)

D)neither (a) nor (b)

A. USER

71. Which version of PHP introduced Try/catch Exception?


a)PHP 4
b)PHP 5
c)PHP 5.3
d)PHP 6
A. PHP 5
72. The performance of the cache memory is measured in terms of ?
(A) bit ratio (B) nor ratio
(C) no ratio (D) hit ratio

A. HIT RATIO

73. We can use ___ to comment a single line?


i) /?
ii) //
iii) #
iv) /* */

A. 2,3, 4

74. A set of physical addresses is also known as ?


E. Disk Space
F. Address Space
G. Memory Space
H. Locations

A. MEMORY SPACE

75. Transmission media are usually categorized as _______.

A)fixed or unfixed

B)guided or unguided

C)determinate or indeterminate

D)metallic or nonmetallic
76. FAST stands for
a. Facilitated Application Software Technique.
b. Functional Application Software Technique.
c. Facilitated Application Specification Technique.
d. None of the above.

A. FACILITATED APPLICATION SPECIFICATION TECHNIQUE

77. Minimal Superkeys are called

A. CANDIDATE KEY

78. How many classification schemes have been developed for NFRs?
a) Two
b) Three
c) Four
d) Five

A. FIVE.

79. In fiber optics, the signal is _______ waves.


light
A)
radio
B)
infrared
C)
very low-
D)
frequency

LIGHT

80. Which devices among following are usually designed on the complex electromechanical
principle ?

A. Printing devices
B. Input devices
C. Storage devices
D. Peripheral devices
A. INPUT DEVICES
81. Which of the following php statement/statements will store 111 in variable num?
i) int $num = 111;
ii) int mum = 111;
iii) $num = 111;
iv) 111 = $num;
A. ONLY 3

82. Which of the following is not Modification of the Database


A. SORTING

83.Which one of the following is a requirement that fits in a developer’s module?

a) Availability
b) Testability
c) Usability
d) Flexibility
B. TESTABILITY

84._________ read the data by reflecting pulses of laser beams on the surface ?
A. Magnetic disk
B. Optical disk
C. Floppy disk
D. ROM

OPTICAL DISK

85. Which of following variables can be assigned a value to it?


(i) $3hello
(ii) $_hello
(iii) $this
(iv) $This
a) All of the mentioned
b) Only ii)
c) ii), iii) and iv)
d) ii) and iv)
A. D

86. Which of the following is Relation-algebra Operation


A. ALL – SELECT, UNION, RENAME
87. When the angle of incidence is _______ the critical angle, the light beam
bends along the interface
more than
A)
less
B)
than
equal
C)
to
none
D)
of the
above

EQUAL TO

88. Choose the incorrect statement with respect to Non-Functional Requirement (NFR).
a) Product-oriented Approach – Focus on system (or software) quality
b) Process-oriented Approach – Focus on how NFRs can be used in the design process
c) Quantitative Approach – Find measurable scales for the functionality attributes
d) Qualitative Approach – Study various relationships between quality goals

A. QUANTITATIVE APPROACH- FIND MEASURABLE …

89. If $a = 12 what will be returned when ($a == 12) ? 5 : 1 is executed?


a) 12
b) 1
c) Error
d) 5

A. 5

90. __________ consists of a central conductor and a shield.


A) Coaxial
Fiber-
B)
optic
Twisted-
C)
pair
none of
D)
the
above

COAXIAL
91. If CPU and I/O interface share a common bus than transfer of data between two
units is known as ?
A. Asynchronous
B. Clock dependent
C. Synchronous
D. Decoder independent
SYNCHRONUS

92. Which of the following in not Outer join?


A. LEFT, RIGHT. FULL … ALL

93.Set of premitted values of each attribute is called


a) Domain
b) Relation
c) Set
d) Schema

A. DOMAIN

94. The open source movement has meant that there is a huge reusable code base available at
a) free of cost
b) low cost
c) high cost
d) short period of time
A. LOW OF COST

95. All the operations in a digital system are synchronized by a clock that is generated by ?
A. Clock
B. Clock generator
C. Pulse
D. Pulse generator

A. PULSE GENERATOR

96. Which of the following PHP statements will output Hello World on the screen?
(i) echo (“Hello World”);
(ii) print (“Hello World”);
(iii) printf (“Hello World”);
(iv) sprintf (“Hello World”);
A. 1, 2 ,3
97. Radio waves are _________.
omnidirectional
A)
unidirectional
B)
bidirectional
C)
none of the
D)
above

OMNIDIRECTIONAL

98. n cyclic redundancy checking, the divisor is _______ the CRC.

A)The same size as

B)one bit less than

C)one bit more than

D)none of the above


A. ONE BIT MORE THAN

99. What will be the output of the following PHP code?


< ?php
$score = 1234;
$scoreboard = (array) $score;
echo $scoreboard[0];
?>
a) 1
b) Error
c) 1234
d) 2

A. 1234

100. Which of the following in true regarding Null Value?


NULL<>0

101.COTS stands for


A. COMMERCIAL OFF THE SHELF

102. Asynchronous means ?

103. Logical design of database is called


A. DATABASE SCHEMA
104. Which one of the following functions will convert a string to all uppercase?
a) strtoupper()
b) uppercase()
c) str_uppercase()
d) struppercase()

A. STRTOUPPER

105. A burst error means that two or more bits in the data unit have changed.
A. BURST

106. Which of the following is a generic structure that is extended to create a more specific
subsystem or application?
a) Software reuse
b) Object-oriented programming language
c) Framework
d) None of the mentioned

A. FRAMEWORK

107.Where does a computer add and compare data?

a. Hard disk

b. Floppy disk

c. CPU chip

d. Memory chip

CPU CHIP

108.Which of the following registers is used to keep track of address of the memory location where
the next instruction is located?
A. Memory Address Register

B. Memory Data Register

C. Instruction Register

D. Program Counter
E. None of the above

PROGRAM COUNTER/ PROGRAM REGISTER

109. The divisor in a cyclic code is normally called the _________.


degree

generator
B)
redundancy
C)
none of the
D)
above
GENERATOR

110.Snapshot of the data in the database at a given instant of time is called


INSTANCE, SNAPSHOT, SCHEMA … ALL

111. Consider the example and categorize it accordingly, “A pattern-matching system


developed as part of a text-processing system may be reused in a database management
system”.
a) Application system reuse
b) Component reuse
c) Object and function reuse
d) None of the mentioned
A. COMPONENT REUSE

112.Which one of the following functions can be used to concatenate array elements to form a single delimited
string?
a) explode()
b) implode()
c) concat()
d) concatenate()
A. IMPLODE

113.The IEEE 802.3 Standard defines _________ CSMA/CD as the access method for
first- generation 10-Mbps Ethernet
A)1-persistent

B)p-persistent

C)non-persistent

D)none of the above

A. A

114.Which of the following is not an advantage of software reuse?


a) lower costs
b) faster software development
c) high effectiveness C.
d) lower risks

115. Which of the following is not Unary operation?


A. UNION

116. Which one of the following functions finds the last occurrence of a string, returning its
numerical position?
a) strlastpos()
b) strpos()
c) strlast()
d) strrpos()
A. STRRPOS

117.A complete microcomputer system consists of

a. microprocessor

b. memory

c. peripheral equipment

d. all of above
ALL

118. Which framework class include standards and classes that support component
communication and information exchange?
a) System infrastructure frameworks
b) Middleware integration frameworks
c) Enterprise application frameworks
d) MVC
A. MIDDLEWARE INTEGRATION FRAMEWORKS

119. Which one of the following regular expression matches any string containing zero or one p?
a) p+
b) p*
c) P?
d) p#
A. P?

120. CPU does not perform the operation

a. data transfer

b. logic operation

c. arithmetic operation

d. all of above

ALL OF THE ABOVE

121.Which of the following is not binary operation?


A) Join
B) Semi-Join
C) Assignment
D) Project
A. PROJECT

122. The ----------------------- is the physical path over which a message travels.
A. MEDIUM

123.PHP’s numerically indexed array begin with position __.


a) 1
b) 2
c) 0
d) -1

A. 0

124.Frequency of failure and network recovery time after a failure are measures of
the _______ of a network.
A) Performance B) Reliability C) Security D) Feasibility
A. RELIABILITY

125.“An ordering system may be adapted to cope with a centralized ordering process in one
company and a distributed process in another.” Which category the example belongs to?
a) Process specialization
b) Platform specialization
c) Environment specialization
d) Functional specialization
A. A

126. Pipelining strategy is called implement

a. instruction execution

b. instruction prefetch

c. instruction decoding

d. instruction manipulation

INSTRUCTION PREFETCH

127. Which of the following is correct regarding Aggregate functions?


TAKES LIST OF VALUES AND RETURNS A SINGLE VALUE AS A RESULT

128. Which of the functions is used to sort an array in descending order?


A. RSORT()

129. A command to remove a relation from an SQL database


A. DROP TABLE

130. _________ uses thick coaxial cable.


A)10Base5

B)10Base2

C)10Base-T

D)10Base-F

131.What are generic application systems that may be designed to support a particular
business type, activity, or sometimes a complete enterprise?
a) COTS-solution systems
b) COTS-integrated systems
c) ERP systems
d) Both COTS-solution and COTS-integrated systems

A. A

132.A stack is

a. an 8-bit register in the microprocessor

b. a 16-bit register in the microprocessor

c. a set of memory locations in R/WM reserved for storing information temporarily during the
execution of computer

d. a 16-bit memory address stored in the program counter

A. C
133.What will be the output of the following PHP code?
< ?php
$fruits = array ("mango", "apple", "pear", "peach");
$fruits = array_flip($fruits);
echo ($fruits[0]);
?>

134. ERP stands for


ENTERPRISE RESOURCE PLANNING

135.Fast Ethernet has a data rate of ________Mbps.


A)10

B)100

C)1000

D)10,000

136.which of the following is not an Aggregate function?

a) Avg
b) Sum
c) With
d) Min
A. WITH

137.A stack pointer is

a. a 16-bit register in the microprocessor that indicate the beginning of the stack memory.

b. a register that decodes and executes 16-bit arithmetic expression.

c. The first memory location where a subroutine address is stored.

d. a register in which flag bits are stored

A. A

138. What are the various Testing Levels?


A. 4

139.In the Ethernet frame, the _______ field contains error detection information

A)CRC

B)preamble

C)address

D)none of the above

140.The attribute that can be divided into other attributes is called


A. COMPOSITE ATTRIBUTE

141.What will be the output of the following php code?


< ?php
$states = array("karnataka" => array ( "population" => "11,35,000", "captial" => "Bangalore"),
"Tamil Nadu" => array( "population" => "17,90,000", "captial" => "Chennai") );
echo $states["karnataka"]["population"];
?>
b) karnataka 11,35,000
b) 11,35,000
c) population 11,35,000
d) karnataka population
A. B

142. The branch logic that provides decision making capabilities in the control unit is known as

a. controlled transfer

b. conditional transfer

c. unconditional transfer

d. none of above

A. UNCONDITIONAL TRANSFER

143.In an Entity-Relationship Diagram “Ellipses” represents


A. ATTRIBUTES
144.An IPv4 address consists of _______ bits.
4

A)

8
B)

32
C)

D)64

1. 32 BITS

145.White Box techniques are also classified as


a) Design based testing
b) Structural testing
c) Error guessing technique
STRUCTURAL TESTING

146. Interrupts which are initiated by an instruction are

a. internal

b. external

c. hardware

d. software

A. SOFTWARE

147. Which in-built function will add a value to the end of an array?
a) array_unshift()
b) into_array()
c) inend_array()
d) array_push()

A. D

148.Identify the class of the following IPv4 address: 191.1.2.3.


A)A

B)B

C)C

D)none of the above

149.What is Cyclomatic complexity?


a) Black box testing
b) White box testing
c) Yellow box testing
d) Green box testing

A. WHITE BOX TESTING

150. What is ACID properties of Transactions?


A. ATOMICITY, CONSISTENCY, ISOLATION, DURABILITY

151.What will be the output of the following PHP code?


< ?php
$fruits = array ("apple", "orange", array ("pear", "mango"),
"banana");
echo (count($fruits, 1));
?>
a)3
b)4
c)5
d)6
A. 6

152.A time sharing system imply

a. more than one processor in the system

b. more than one program in memory

c. more than one memory in the system

d. None of above

A. MORE THAN 1 PROG. IN THE MEMORY


153.If every non-key attribute is functionally dependent on the primary key, the relation will be in
A. THIRD NORMAL FORM

154. Which of the following term describes testing?


a) Finding broken code
b) Evaluating deliverable to find errors
c) A stage of all projects
d) None of the mentioned

A. B

155.Processors of all computers, whether micro, mini or mainframe must have

a. ALU

b. Primary Storage

c. Control unit

d. All of above

a. ALL OF THE ABOVE

156.Which function returns an array consisting of associative key/value pairs?


a) count()
b) array_count()
c) array_count_values()
d) count_values()
A. C

157.The number of addresses in a class A block is _______.

A)65,534

B)16,777,216

C)256

D)none of the above

158. Find the number of addresses in a block of classless addresses if one of the addresses is
12.2.2.7/30.

A)2

B)4
C)8

D)none of the above

159.Database locking concept is used to solve the problem of


A. LOST UPDATE, UNCOMMITED DEPENDENCIES, INCONSISTENT DATA – ALL OF
THE ABOVE

160.Acceptance testing is also known as


a) Grey box testing
b) White box testing
c) Alpha Testing
d) Beta testing
A. BETA TESTING

7. Unit testing is done by


a) Users
b) Developers
c) Customers

161.What is the control unit's function in the CPU?

a. controlled transfer

b. conditional transfer

c. unconditional transfer

d. none of above

A. UNCONDITIONAL TRANSFER

162. The filesize() function returns the file size in ___.


a) bits
b) bytes
c) kilobytes
d) gigabytes
A. BYTES

163.Data Manipulation Language (DML) is not to

A. CREATE INFORMATION TABLE IN THE DATABASE


164.What is meant by a dedicated computer?
A. Which is used by one person only.
B. Which is assigned one and only one task.
C. Which uses one kind of software.
D. Which is meant for application software.
E. None of these
A. B

165.SPICE stands for


A. SOFTWARE PROCESS IMPROVEMENT AND CAPABILITY DETERMINATION

166. The updated MySQL extension released with PHP 5 is typically referred to as
a) MySQL
b) mysql
c) mysqli
d) mysqly
A. C

167.What is the last address of a block of classless addresses if one of the


addresses is 12.2.2.127/28?
A)12.2.2.16

B)12.2.2.112

C)12.2.2.127

D)none of the above

168.Which of the following in true regarding Referential Integrity?


A. FOREIGN KEY VALUE MUST MATCH A PRIMARY KEY VALUE IN AN ASSOCIATED TABLE

169.What is the default mask for class A in CIDR notation?

A)/9

B)/8

C)/16
- FOR B

D)none of the above

170. The most common addressing techniques employed by a CPU is


a. immediate

b. direct

c. indirect

d. register

e. all of the above

A. ALL OF THE ABOVE

171.Unit testing is done by


a) Users
b) Developers
c) Customers
A. DEVELOPERS

172.Which one of the following lines need to be uncommented or added in the php.ini file so as to enable
mysqli extension?
a) extension=php_mysqli.dll
b) extension=mysql.dll
c) extension=php_mysqli.dl
d) extension=mysqli.dl

A. A

173.Pipeline implement

a. instruction execution

b. instruction prefetch

c. instruction decoding

d. instruction manipulation

INSTRUCTION PREFETCH

174. Which of the following option is use to retrieval of data?


A. QUERY

175.Which of the following is not used in measuring the size of the software
a) KLOC
b) Function Points
c) Size of module
A. SIZE OF MODULE

176.In a block, the prefix length is /24; what is the mask?


A)255.255.255.0

B)255.255.242.0

C)255.255.0.0

D)none of the above

177.Which method returns the error code generated from the execution of the last MySQL function?
a) errno()
b) errnumber()
c) errorno()
d) errornumber()
A. ERRNO

178.Behavioral testing is
a) White box testing
b) Black box testing
c) Grey box testing

A. BLACK BOX TESTING

179.Which one of the following statements is used to create a table?


a) CREATE TABLE table_name (column_name column_type);
b) CREATE table_name (column_type column_name);
c) CREATE table_name (column_name column_type);
d) CREATE TABLE table_name (column_type column_name);

A. A

180.Which of the following is an unary operation?



A. GENERALIZED SELECTION

181.Which of the following code is used in present day computing was developed by IBM
corporation?

a. ASCII

b. Hollerith Code
c. Baudot Code

d. EBCDIC Code
A. EBCDIC CODE

182.In a block, the mask is 255.255.192.0; what is the prefix length?

A)/20

B)/28

C)/18

D)none of the above

183._____ refers to the physical or logical arrangement of a network.


A. TOPOLOGY

184.When a subroutine is called, the address of the instruction following the CALL instructions
stored in/on the

a. stack pointer

b. accumulator

c. program counter

d. stack

A. STACK

185.In precedence of set operators, the expression is evaluated from:



a) Left to left
b) Left to right
c) Right to left
d) From user specification

A. LEFT TO RIGHT

186. Beta testing is done at


a) User’s end
b) Developer’s end
A. USERS END
187.Inheritance is the means by which one or more classes can be derived from a/an ___ class.
a) base
b) abstract
c) null
d) predefined

A. BASE

188.Which method or property can only be accessed from within the enclosing class? Even subclasses
have no access.
a) public
b) friendly
c) private
d) protected

A. PRIVATE

189. A relation that has no partial dependencies is in which normal form



A. SECOND FORM

190. A microprogram written as string of 0's and 1's is a

a. symbolic microinstruction

b. binary microinstruction

c. symbolic microprogram

d. binary microprogram

A. BINARY MICROPROGRAM

191. Which of the following is non-functional testing?

192. To make addresses more readable, IPv6 specifies ____________notation.

A)dotted decimal

B)hexadecimal colon

C)decimal

D)None of the choices are correct


193. The UML was designed for describing _________.
a) object-oriented systems
b) architectural design
c) SRS
d) Both object-oriented systems and Architectural design
A. D

194. What is the default port number of HTTP’s?


A. 443

196.A functional dependency between two or more non-key attributes is called


(a) Partial functional dependency
(b) Partial nonkey dependency
(c) Transitive dependency
(d) Partial transitive dependency
(e) Non transitive dependency.
A. C TRANSITIVE DEPENDENCIES

197.A best-effort delivery service such as IPv4 includes _______.

A)error checking

B)error correction

C)datagram acknowledgment

D)none of the above

198. A logical description of some portion of database that is required by a user to perform task is
called as
A. USER VIEW

199.Memory access in RISC architecture is limited to instructions

a. CALL and RET


b. PUSH and POP

c. STA and LDA

d. MOV and JMP

A. STA AND LDA

200. Which function is used to determine whether a file was uploaded?

201. A ________ view shows the system hardware and how software components are
distributed across the processors in the system.
a) physical
b) logical
c) process
A. PHYSICAL

202. In IPv4 header, an HLEN value of decimal 10 means _______.


A)there are 10 bytes of options

B)there are 40 bytes of options

C)there are 10 bytes in the header

D)there are 40 bytes in the header

203. Which of the following view shows that the system is composed of interacting processes at
run time?

204. ______________ is a classical approach to database design?



A. TOP DOWN APPROACH

205.Which of the following directive determines the maximum amount of time that a PHP script
will spend attempting to parse input before registering a fatal error?
a) max_take_time
b) max_intake_time
c) max_input_time
d) max_parse_time
A. MAX_INPUT_TIME

206. In IPv4, what is the value of the total length field in bytes if the header is 28 bytes and
the data field is 400 bytes?
A)428

B)407

C)107

D)427

207.A collection of 8 bits is called


A. BYTE

208.What is the default value of the directive max_file_limit?


a) 10 files
b) 15 files
c) 20 files
d) 25 files

A. 20 FILES

209._____________ refers to the correctness and completeness of the data in a database?



A. DATA INTEGRITY

210. The ascending order or a data Hierarchy is


A. bit->byte->record->field->file->database
B. bit->byte->field->record->file->database
C. byte->bit->field->record->file->database
D. byte->bit->field->file->record->database

A. B

211.In IPv4, what is the length of the data field given an HLEN value of 12 and total length
value
39,988

A)

40,012
B)
40,048
C)

39,952
D)

A. 39988

212.Which of the following is an architectural conflict?


a) Using large-grain components improves performance but reduces maintainability
b) Introducing redundant data improves availability but makes security more difficult
c) Localizing safety-related features usually means more communication so degraded performance
d) All of the mentioned

A. D.. ALL OF THE ABOVE

213.Which of the following is not included in Architectural design decisions?


a) type of application
b) distribution of the system
c) architectural styles
d) testing the system
A. TESTING THE SYSTEM

214. To validate an e-mail address, which flag is to be passed to the function filter_var()?

 A. FILTER_VALIDATE_EMAIL

 B. FILTER_VALIDATE_MAIL

 C. VALIDATE_EMAIL

 D. VALIDATE_MAIL

A. FILTER_VALIDATE_EMAIL

215. In IPv4, if the fragment offset has a value of 100, it means that _______.
A)the datagram has not been fragmented

B)the datagram is 100 bytes in size

C)the first byte of the datagram is byte 100

D)the first byte of the datagram is byte 800


216.A table that displays data redundancies yields ____________ anomalies

(a) Update (b) Insertion (c) Deletion
(d) All of the above (e) None of the above.

A. ALL OF THE ABOVE

217.How many address lines are needed to address each memory locations in a 2048 x 4
memory chip?
a. 10
b. 11
c. 8
d. 12
A. 11

218. A lock that allows concurrent transactions to access different rows of the same table is known
as a
 _________________
a) Database-level lock
b) Table-level lock
c) Page-level lock
d) Row-level lock
A. ROW LEVEL LOCK

219.Which one of the following keyword is used in conjunction with an Exception object?
a) throws
b) exception
c) throw
d) final

B. THROW

220.A computer program that converts an entire program into machine language at one time is
called a/an

a. Interpreter

b. CPU

c. Compiler

d. Simulator
A. INTERPRETER
221.In IPv4, what is needed to determine the number of the last byte of a fragment?
A)Identification number

B)Offset number

C)Total length

D)(b) and (c)

222. Which of the following pattern is the basis of interaction management in many web-based
systems?
a) architecture
b) repository pattern
c) model-view-controller
d) different operating system
A. MODEL VIEW CONTROLLER

223.In immediate addressing the operand is placed


a. in the CPU register
b. after OP code in the instruction
c. in memory
d. in stack
A. AFTER OP CODE IN THE INSTRUCTION

224.Which one of the following is the very first task executed by a session enabled page?
a) Delete the previous session
b) Start a new session
c) Check whether a valid session exists
d) Handle the session

A. C

225.What describes how a set of interacting components can share data?


a) model-view-controller
b) architecture pattern
c) repository pattern
d) None of the mentioned

A. REPOSITORY PATTERN

226. A type of query that is placed within a WHERE or HAVING clause of another query is called

a) Master query
b) Sub query
c) Super query
d) Multi-query
A. SUB QUERY

227.The IPv4 header size _______.

A)is 20 to 60 bytes long

B)is always 20 bytes long

C)is always 60 bytes long

D)depends on the MTU

228.Microprocessor 8085 can address location upto


a. 32K
b. 128K
c. 64K
d. 1M

A. 64 K

229.Which view in architectural design shows the key abstractions in the system as objects or
object classes?
a) physical
b) development
c) logical
d) process
A. LOGICAL

230. A transaction completes its execution is said to be


a) Committed
b) Aborted
c) Rolled back
d) Failed A. COMMITTED 

231.In mail($param2, $param2, $param3, $param4), the $param2 contains:
a. The message
b. The recipient
c. The header
d. The subject
A. SUBJECT

232. The ________ protocol is the transmission mechanism used by the TCP/IP suite.
ARP
A)

B)IP

C)RARP

D)none of the above

IP

233.The ALU and control unit of most of the microcomputers are combined and manufacture
on a single silicon chip. What is it called?
a. monochip
b. microprocessor A. MICROPROCESSOR
c. ALU
d. control unit

234. An attribute that is not part of any candidate key is known as


A. NON PRIME ATTRIBUTE

235.IP is _________ datagram protocol


A)an unreliable

B)a connectionless

C)both a and b

D)none of the above

UNRELIABLE, CONNECTIONLESS

236.In perl, which sigil is used for a hash?


237.Which of the following is a type of Architectural Model?

238. When the RET instruction at the end of subroutine is executed,


a. the information where the stack is iniatialized is transferred to the stack pointer
b. the memory address of the RET instruction is transferred to the program counter
c. two data bytes stored in the top two locations of the stack are transferred to the program counter
d. two data bytes stored in the top two locations of the stack are transferred to the stack pointer

A. C.

239.Which of the follow is not the degree of relationship?

240.Which of the following data types are preceded by an "at" sign (@) in Perl?
A - Scalar B - Array C - Hashes D - All of the above.
A. ARRAY

241.The IPv4 header field formerly known as the service type field is now called the _______
field
A)IETF

B)checksum

C)differentiated services

D)none of the above

242. Which of these following sensors is a useful as part of a burglar alarm system for
commercial buildings?
A. MOTION SENSOR, ULTRASONIC SENSOR

243.Which of the following statement restarts the loop block without evaluating the
conditional again?

A - next

B - last

C - continue
D - redo

NEXT

244.Which of the following is not real-time architectural patterns that are commonly used?
a) Asynchronous communication
b) Observe and React
c) Environmental Control
d) Process Pipeline

A. ASYNCHRONOUS COMMUNICATION

245.The degree of the relationship is


246.To have a hierarchical name space, a ______________ was designed


A)domain space

B)domain name

C)domain name space

D)none of the above

247.A microprogram is sequencer perform the operation


a. read
b. write
c. execute
d. read and write
e. read and execute
A. READ AND EXECUTE

248.Interrupts which are initiated by an I/O drive are


a. internal
b. external
c. software
d. all of above

A. EXTERNAL
249.In PERL which of the following operator checks if the value of two operands are equal or not,
if yes then condition becomes true?
A - < B - >= C - <= D - <=>

A. <=

250. In the DNS, the names are defined in ___________ structure.

a linear list
A)

an
B)inverted-
tree

a three-
C)dimensional

None of the
D)choices are
correct

251.Every attribute has some predefined value scope that is called


A. ATTRIBUTE DOMAIN

252.A monitoring system examines its environment through:________

253.In PERL which of the following operator returns true if the left argument is stringwise less
than the right argument?
A - lt B - gt C - le D – ge
A. LE

254. Which of the following is applicable on software radio?

255.CD-ROM stands for


A. COMPACT DISK READ ONLY MEMORY
256.A full domain name is a sequence of labels separated by ________.
A)semicolons

B)dots

C)colons

D)none of the above


A. DOTS

257.Which of the following operator decreases integer value by one?


A. BOTH BOOLEAN AND CHARACTER

258. An example of a system that may use a process pipeline is a high-speed


a) data distributing system
b) data acquisition system
c) data collector system
d) none of the mentioned

A. DATA ACQUISITION SYSTEM

259.ALU is
A. ARITHMETIC LOGICAL UNIT

260.DNS can use the services of ________ using the well-known port 53.
A)UDP

B)TCP

C)either a or b

D)none of the above

TCP OR UDP

Comprehensive Question Prev


261. VGA is

A. VIDEO GRAPHIC ARRAYS

262.What is Perl?
A. PROGRAMMING LANGUAGE
263.Which of the following is an example of a controller for a car braking system?
a) Observe and React
b) Process Pipeline
c) Environmental Control
A. BREAK PEDALS

264.The data structure required to check whether an expression contains balanced


parenthesis is?
a) Stack
b) Queue
c) Array
d) Tree

A. STACK

265.TELNET is an abbreviation for ____________.

A)terminal network

B)telephone network

C)telecommunication network

D)none of the above

TERMINAL NETWORK

266. BCD is
A. BINARY CODED DECIMAL

267.What data structure would you mostly likely see in a non recursive implementation of
a recursive algorithm?
a. LinkList
b. Stack
c. Queue
d. Tree

A. STACK

268.TELNET is a ________ client-server application program.


A)specific-purpose

B)general-purpose

C)both a and b

D)none of the above

269.Which of the following is used in perl?

270. ETL stands for


a) Data Extraction Transformation & Loading
b) Data Execution Transformation & Loading
c) Extraction Transformation & Loading
d) Execution Transformation & Loading
A. DATA EXTRACTION TRANSFORMATION, LOADING

271.ASCII stands for


A. American Standard Code for Information Interchange

272.Control systems may make use of the Environmental Control pattern, which is a general
control pattern that includes _________processes.
a) sensor
b) actuator
c) pipeline
d) both sensor and actuator
A. SENSOR AND ACQUATOR

273.When a user logs into a local time-sharing system, it is called ________ login
A)local

B)remote

C)temporary

D)none of the above

A. LOCAL

274.A key that consists of more than one attribute to uniquely identify rows in a table is called
A. COMPOSITE KEY

275.Which of the following datatypes are valid in Ruby?


a) Numbers
b) Boolean
c) String
d) All of the mentioned
A. ALL OF THE ABOVE

276.In an Entity-Relationship diagram “Double Rectangles” represents


A. WEAK ENTITY SETS

277.________ can be associated with a separate processor or core, so that the processing steps
can be carried out in parallel.

278.EEPROM stand for


A. electrically erasable programmable read-only memory

279.Which statement is correct for the given C program?


int i;
int main()
{
if (i);
else
printf("Ëlse");
return 0;
}
(a) if block is executed.
(b) else block is executed.
(c) It is unpredictable as i is not initialized.
(d) Error: misplaced else
A. ELSE BLOCK IS EXECUTED

280.When a user wants to access an application program or utility located on a remote


machine, he or she performs ___________ login
A)local

B)remote

C)temporary

D)none of the above

REMOTE LOGIN
281.Which of the following examples is/are models of application architectures?
a) a means of assessing components for reuse
b) a design checklist
c) a vocabulary for talking about types of applications
d) All of the mentioned
A. ALL OF THE ABOVE

282. What is the output for the following C program?


#include<stdio.h>
int main()
{
int i = 0;
for (printf("1 "); i < 2 && printf("2 "); ++i && printf("3 "))
{
printf("$ ");
}
return 0;
}

283.NVT uses two sets of characters, one for _____and one for __________.

A)sending; receiving

B)request; reply

C)data; control

D)none of the above

A. DATA AND CONTROL

284.The smallest entity of memory is called as _______ .


a) Cell
b) Block
c) Instance
d) Unit
A. CELL

285.The DBMS acts as an interface between what two components of an enterprise-class database
system?
[A]. Database application and the database

[B]. Data and the database

[C]. The user and the database application


[D]. Database application and SQL

286. Which of the following type describes application architectures?


a) Transaction processing applications
b) Language processing systems
c) Client management systems
d) Transaction processing applications and Language processing systems
e) All of the mentioned
A. TRANSACTION PROCESSING APPLICATIONS (D)

287.Because it contains a description of its own structure, a database is considered to be ________


A. described
B. metadata compatible
C. self-describing
D. an application program
A. SELF DESCRIBING

288.The _______ is software residing on the remote system that allows the remote system to
receive characters from a TELNET server.
A)terminal driver

B)pseudoterminal driver

C)TELNET client

D)none of the above

PSEUDOTERMINAL DRIVER

289.What is the output for the following C Program?


#include <stdio.h>
int main()
{
int i = 3;
switch(i)
{
printf("Three ");
case 1: printf("One");
break;
case 2: printf("Two");
break;
defau1t: printf("Invalid Input");
}
return 0;
}

290. During transfer of data between the processor and memory we use ______ .
a) Cache
b) TLB
C) Buffers
d) Registers
A. REGISTERS

291.All the operations in a transaction need to be completed before the database changes are
made ________.

292.The _______ translates local characters into NVT form.


A)terminal driver

B)TELNET client

C)TELNET server

D)none of the abov


TELNET CLIENT

293.The ______ format is usually used to store data .


a) BCD
b) Decimal
c) Hecadecimal
d) Octa
A. BCD
294.What is the output for the following C Program?
#include<stdio.h>
int main()
{
int x = 10;
if (x == 5);
x -= 5;
if (x == 10)
x++;
else
x += 3;
printf("x = %d", x);
return 0;
}

295.An Enterprise Resource Planning application is an example of a(n) ________

A. single-user database application

B. multiuser database application

C. e-commerce database application

D. data mining database application

A. B

296.In a relational schema, each tuple is divided into fields called


A. Relations
B. Domains
C. Queries
D. All of the above
E. None of the above
A. DOMAINS

297._______ is the standard mechanism provided by TCP/IP for copying


a file from one host to another.

A)TELNET

B)SMTP

C)TFTP

D)none of the above

NONE OF THE ABOVE

298.Systems that involve interaction with a shared database can be considered as.
a) software-based
b) transaction-based
c) server-based
d) client-based
A. TRANSACTION BASED

299.A source program is usually in _______ .


a) Assembly language
b) Machine level language
c) High-level language
d) Natural language

A. C. HIGH LEVEL LANGUAGE

300.With respect to the following “for” loops in C, choose the correct statement
int i=0;
for (i < 10; i = 0 ; i++) // (i) TRUE
for (i++ ; i = 0) // (ii)
for (i = 0; i++ ; i < 10) // (iii)
for (i = 0; i<10 ; i ++) // (iv)
for (i++; i = 0 ; i < 10) // (v)
for (i=1; i <=10 ; i = 10) ;// (vi)

301.Which memory device is generally made of semi-conductors ?


a) RAM
b) Hard-disk
c) Floppy disk
d) Cd disk
A. RAM

302. What translates a natural or an artificial language into another representation of that
language and, for programming languages also execute the resulting code?

303. ........... table store information about database or about the system.
A) SQL
B) Nested
C) System
D) None of these
A. SYSTEM
304.FTP uses the services of ________.
A)UDP

B)IP

C)TCP

D)none of the above


TCP

305.What is the output for the given C Program?


#include <stdio.h>
int main()
{
int a, b = 2, c = 2;
a = b == c;
printf("%d", a);
return 0;
}

306. In FTP, the well-known port ____ is used for the control connection and the well-
known port ________ for the data connection
A)21; 22

B)21; 20

C)20; 21

D)none of the above

21 20

307.The small extremely fast, RAM’s are called as _______ .


a) Cache
b) Heaps
c) Accumulators
d) Stacks

A. CACHE

308.Which of the following is/are commonly used architectural pattern(s)?


a) Model-View-Controller
b) Layered Architecture
c) Client–server
d) All of the mentioned
A. ALL OF THE ABOVE

309.
#include <stdio.h>
int main()
{
int i = 10;
printf("%d", (++i)++);
return 0;
}
What is the output of the above program?

310. ............defines the structure of a relation which consists of a fixed set of attribute-domain pairs.

A) Instance
B) Schema
C) Program
D) Super Key
A. SCHEMA

311.The ALU makes use of _______ to store the intermediate results .


a) Accumulators
b) Registers
c) Heap
d) Stack
A. ACCUMULATORS

312. A language-processing systems may translate an XML data description into

313.When the sender and the receiver of an email are on the same system, we need
only ___________.
A)one UA

B)two UAs

C)one UA and one MTA

D)none of the above


2 UA’S

314............. clause is an additional filter that is applied to the result.

A) Select
B) Group-by
C) Having
D) Order by
A. HAVING

315.In C, Relational operators cannot be used on

316.Transaction processing systems may be organized as_________ architecture with system


components responsible for input, processing, and output.
a) Repository
b) Client–server
c) Model-View-Controller
d) Pipe and Filter
A. PIPE AND FILTER

317.Which type conversion is NOT accepted in C?’


a) From char to int
b) From float to char pointer
c) From negative int to char
d) From double to char
A. B

318. When the sender and the receiver of an email are on different systems, we
need only _____________.
A)one MTA

B)two UAs

C)two UAs and one pair of MTAs


D)none of the above

2 UA’S AND 1 MTA’S

319.A logical schema


A) is the entire database
B) is a standard way of organizing information into accessible parts.
C) Describes how data is actually stored on disk.
D) All of the above

A. B

320.The control unit controls other units by generating ____ .


a) Control signals
b) Timing signals
c) Transfer signals
d) Command Signals

A. TIMING SIGNALS

321.When the sender is connected to the mail server via a LAN or a WAN,
we need ______________

A)two MTA

B)two UAs and two pairs of MTAs

C)two UAs and a pair of MTAs

D)none of the above

2 UA’S nd 2 mta’s

322. ______ bus structure is usually used to connect I/O devices .


a) Single bus
b) Multiple bus
c) Star bus
d) Rambus
A. SINGLE BUS

323.What will be the data type of the result of the following operation in C?
(float)a * (int)b / (long)c * (double)d
a) int
b) long
c) float
d) double
A. DOUBLE

324. Which is the first step in the software development life cycle?
a) Analysis
b) Design
c) Problem/Opportunity Identification
d) Development and Documentation
A. C

325.An advantage of the database management approach is


A. data is dependent on programs
B. data redundancy increases
C. data is integrated and can be accessed by multiple programs
D. none of the above

A. C

What is the output of this C code?


#include <stdio.h>
int main()
{
if (~0 == 1)
printf("yes\n");
else
printf("no\n");
}
327.To reduce the memory access time we generally make use of ______ .
a) Heaps
b) Higher capacity RAM’s
c) SDRAM’s
d) Cache’s
A. CACHE’S

328.The collection of information stored in a database at a particular moment is called as ......


A. schema
B. instance of the database
C. data domain
D. independence
A. B INSTANCE

329.The message contains the ________ and the __________.


A)header; envelop

B)header; body

C)envelop; body

D)none of the above


HEADER AND BODY

330.Which tool is use for structured designing?


a) Program flowchart
b) Structure chart
c) Data-flow diagram
d) Module
A. STRUCTURED CHART

331.______ is generally used to increase the apparent size of physical memory .


a) Secondary memory
b) Virtual memory
c) Hard-disk
d) Disks

A. VIRTUAL MEMORY

332.A step by step instruction used to solve a problem is known as


a) Sequential structure
b) A List
c) A plan
d) An Algorithm

A. AN ALGORITHM

333.Write the output for following C code?


#include <stdio.h>
void main()
{
int k = 8;
int x = 0 == 1 && k++;
printf("%d%d\n", x, k);
}

334. A ......... is used to define overall design of the database

A. schema
B. application program
C. data definition language
D. code
A. SCHEMA

335.The formal protocol that defines the MTA client and server in the
Internet is called ___________.
A)SMTP

B)SNMP

C)TELNET

D)none of the above

SMTP

336.What is meaning of PCB ?


A. PROCESS CONTROL BLOCK

337.An unauthorized user is a network _______ issue.


A. SECURITY ISSUE
What is the output for the following C Program?
#include <stdio.h>
void main()
{
unsigned int x = -5;
printf("%d", x);
}

339.In the Analysis phase, the development of the ____________ occurs, which is a clear
statement of the goals and objectives of the project.
a) documentation
b) flowchart
c) program specification
d) design

A. PROGRAM SPECIFICATION

340.The candidate key is that you choose to identify each row uniquely is called ......

A) Alternate Key
B) Primary Key
C) Foreign Key
D) None of the above

A. PRIMARY KEY

341.Communication between a computer and a keyboard involves _____________


Transmission
A)simplex

B)half-duplex

C)full-duplex

D)automatic
SIMPLEX
What is the output for the following C Program?
int main()
{

int x = 5, y = 2, z=3;
z = (++y) ? y == 1 && x : x++ + y--;
printf("%d", z);
return 0;
}

343........... is used to determine whether of a table contains duplicate rows.


A) Unique predicate
B) Like Predicate
C) Null predicate
D) In predicate
UNIQUE PREDICATE

344.Arithmetic instruction are used to perform operation on ?


A. Non Numerical data
B. Numerical data
C. Both of above
D. None of above

A. NUMERICAL DATA

345.Actual programming of software code is done during the ____________ step in the SDLC.
A. Maintenance and Evaluation
B. Design
C. Analysis
D. Development and Documentation

A. DEVELOPMENT AND DOCUMENTATION

346.Who designs and implement database structures____________.


a) Programmers
b) Project managers
c) Technical writers
d) Database administrators

A. D

347.Which of the following is the syntax for declaring a function in C?

348.A _______ connection provides a dedicated link between two devices.


A)point-to-point

B)multipoint

C)primary

D)secondary

A. POINT TO POINT

349.What Mnemonic represents ?


A. Strings
B. Physical Address
C. Operation Address
D. Operation codes

A. OPERATION CODES

350. To eliminate duplicate rows .............. is used

A) NODUPLICATE
B) ELIMINATE
C) DISTINCT
D) None of these

A. DISTINCT

351.____________ is the process of translating a task into a series of commands that a


computer will use to perform that task.
A. Project design
B. Installation
C. Systems analysis
D. Programming
A. PROGRAMMING

352.Which agency developed standards for physical connection interfaces


and electronic signaling specifications?
A)EIA

B)ITU-T

C)ANSI

D)ISO

EIA

353................... is the process of organizing data into related tables.


A) Normalization
B) Generalization
C) Specialization
D) None of the above

A. NORMALIZATION

354.Can we use a function as a parameter of another function in C? [ Eg: void get(int func()) ]

355.What is full form of LED ?


LIGHT EMITTING DIODE

356.Debugging is: _______________.


a) creating program code.
b) finding and correcting errors in the program code.
c) identifying the task to be computerized.
d) creating the algorithm.
A.B
357.A .......... Does not have a distinguishing attribute if its own and mostly are dependent entities,
which are part of some another entity.
A) Weak entity
B) Strong entity
C) Non attributes entity
D) Dependent entity
A . WEAK ENTITY

358. Multiprocessor uses large caches but limited process that shares ___ ?
A. Control Bus
B. Memory Bus
C. Multiple memory bus
D. Single memory bus

SINGLE MEMORY BUS

359.
What is the output for the following C Program?
#include <stdio.h>
int main()
{
printf("%d", main);
return 0;
}

360._______ is the protocol suite for the current Internet


A)TCP/IP

B)NCP

C)UNIX

D)ACM
.
What is the output of this C code?
#include <stdio.h>
int main()
{
int i = 0;
do
{
i++;
if (i == 2)
continue;
printf("Hai ");

} while (i < 2);


printf("%d\n", i);
}

In Design phase, which is the primary area of concern_____________?


a) Architecture
b) Data
c) Interface
d) All of the mentioned
A. ALL

363............ is the complex search criteria in the where clause.


A) Sub string
B) Drop Table
C) Predict
D) Predicate
A. PREDICATE

364.Data flow between two devices can occur in a _______ way.


A)simplex

B)half-duplex

C)full-duplex

D)all of the above

365.Three bit binary numbers can be represented by ?


A. Binary number
B. Decimal number
C. Hexadecimal number
D. Octal number

366. The importance of software design can be summarized in a single word which is: ____.
a) Efficiency
b) Accuracy
c) Quality
d) Complexity

A. QUALITY

367................. is preferred method for enforcing data integrity


A) Constraints
B) Stored procedure
C) Triggers
D) Cursors
A. CONSTRAINTS

368.In C, array sizes are optional during array declaration by using ______ keyword.
a) auto
b) static
c) extern
d) register
A. EXTERN

369.In stack organization the insertion operation is known as ?


A. Pop
B. Push
C. Down
D. Upper

370. The _______ layer is the layer closest to the transmission medium.
A. physical
B. data link
C. network
D. transport

A. PHYSICAL

371.EA stands for ?


A. Effective address
B. Effective absolute
C. Effective add
D. End address

EFFECTIVE ADDRESS

372.Layer 2 lies between the physical layer and the _______ layer.
A)Network

B)Data link

C)Transport

D)None of the above

373.What is the output for the following C Program?


#include <stdio.h>
int main()
{
static int i=5;
if (--i){
printf("%d ",i);
main();
}
}

374. The language that requires a user to specify the data to be retrieved without specifying
exactly how to get it is

A. Procedural DML
B. Non-Procedural DML
C. Procedural DDL
D. Non-Procedural DDL

A. NON PROCEDURAL DDL

375.Cohesion is a qualitative indication of the degree to which a module__________.


a) can be written more compactly.
b) focuses on just one thing.
c) is able to complete its function in a timely manner.
d) is connected to other modules and the outside world.

A. FOCUSSES ON JUST ONE THING

376.Coupling is a qualitative indication of the degree to which a module___________.


a) can be written more compactly.
b) focuses on just one thing.
c) is able to complete its function in a timely manner.
d) is connected to other modules and the outside world.

A. D

377.____ processor has to check continuously till device becomes ready for
transferring the data
A. DMA
B. Interrupt-initiated I/O
C. IOP
D. DCP

378. What is the output for the following C Program?


#include <stdio.h>
static int x = 1;
void main()
{
int x = 2;
{
x = 3;
}
printf("%d", x);
}

379.Which of the following is an application layer service?


a) Network virtual terminal
b) File transfer, access, and management
c) Mail service
d) All of the mentioned

A. ALL OF THE ABOVE

380.Which two files are used during operation of the DBMS?


A. query language and utilities

B. data manipulation language and query language

C. data dictionary and transaction log

D. data dictionary and query language

E. None of the above

A. C
381.The Unified Modeling Language (UML) has become an effective standard for software
modelling. How many different notations does it have?
a) Three
b) Four
c) Six
d) Nine

A. 9

382. In the OSI model, encryption and decryption are functions of the ________ layer
A)transport

B)session

C)presentation

D)application

A. PRESENTATION

383.The way a particular application views the data from the database that the application uses is a
A. module

B. relational model

C. schema

D. subschema

E. None of the above

A. SUB SCHEMA

384.Which memory is assembled between main memory and CPU ?


A. Primary Memory
B. Secondary Memory
C. Registers
D. Cache Memory

A. CACHE MEMORY
385.What is the output for the following C code?
#include <stdio.h>
int main()
{
register int i = 5;
int *p = &i;
*p = 6;
printf("%d %d ", i, *p);
}

386. Which model in system modelling depicts the dynamic behaviour of the system?
a) Context Model
b) Behavioral Model
c) Data Model
d) Object Model
A. BEHAVIORAL MODEL

387.To deliver a message to the correct application program running on a host, the
_______ address must be consulted.
a) IP
b) MAC
c) Port
d) None of the mentioned

A. C

388......... data type can store unstructured data


A. RAW
B. CHAR
C. NUMERIC
D. VARCHAR
A. RAW

389.In C, register keyword forces the compiler to place the variable in machine register
a) true
b) false
c) Depends on the standard
d) None of the mentioned

FALSE
390. A number system that uses only two digits, 0 and 1 is known as ?
A. BINARY SYSTEM

391.
What is the output for the following C Program?
#include<stdio.h>
int main()
{
typedef static int *i;
int j;
i a = &j;
printf("%d", *a);
return 0;
}

392.______________, express the number of entities to which another entity can be associated via
a relationship set.

A Logical Cardinality

B None of these

C Mapping Cardinality
D Messaging Cardinality
MAPPING CARDINALITY

393.Which system has a base or radix of 10 ?


A. DECIMAL
394.The session, presentation, and application layers are the ____ support layers.

A) User
R

B) network

C) both (a) and (b)

D) neither (a) nor (b)


A. USER

395.Which model in system modelling depicts the static nature of the system?
a) Behavioral Model
b) Context Model
c) Data Model
d) Structural Model

A. STRUCTURAL MODEL

396.Which of the following primarily uses guided media?


A) cellular telephone system
B) local telephone system
C) satellite communications
D) radio broadcasting

A. LOCAL TELEPHONE SYSTEM

397.The _________ is a person having central control over data and programs accessing that data.
398.Which of the following diagram is not supported by UML considering Data-driven
modelling?
a) Activity
b) Data Flow Diagram (DFD)
c) State Chart
d) Component
DATA FLOW DIAGRAM

402.A parabolic dish antenna is a(n) _______ antenna.


A) omnidirectiona
l

B) bidirectional

C) unidirectional

D) horn

A. UNIDIRECTIONAL

403.____________ is critical part of DB and stores temporary data.

404.UMA stands for ?


A. Unit memory access
B. Uniform memory access
C. Unit memory array
D. Unit metadata access

405.C preprocessors can have compiler specific features

 A. true

 B. false

 C. Depends on the standard


 D. Depends on the platform

A. TRUE

406_______ cable is used for voice and data communications.

A)Coaxial

B)Fiber-optic

C)Twisted-pair

D)none of the above


TWISTED PAIR

407.Every time attribute A appears, it is matched with the same value of attribute B, but not the
same value of attribute C. Therefore, it is true that:
A. A → B.

B. A → C.

C. A → (B,C).

D. (B,C) → A.

A. A

408.______________ is the property which allows to produce different executable for different
platforms in C

409.In which of the following status flags required for data transfer are present?
A. Interface Circuit
B. Parallel Line
C. Device Circuit
D. None of Above

410. ______ allows us to infer that different members of classes have some common
characteristics.
a) Realization
b) Aggregation
c) Generalization
d) dependency
A. GENERALISATION

411.Locking may cause which of the following problems?


A. Erroneous updates
B. Deadlock
C. Versioning
D. All of the above
A. DEADLOCK

412.______ cables carry data signals in the form of light.


Coaxia
A) l

B) Fiber-optic

C) Twisted-pair

D) none of the above

A. FIBER OPTIC
413._____ & ______ diagrams of UML represent Interaction modeling.
a) Use Case, Sequence
b) Class, Object
c) Activity, State Chart

A. USE CASE, SEQUENCE

414. Which interrupt establishes a priority over the various sources to determine which
request should be entertained first ?
A. Polling
B. Daisy chaining
C. Priority interrupt
D. All of above

A. PRIORITY INTERRUPT

415.C Preprocessor feature that supply line numbers and filenames to compiler is called as
__________

 A. Selective inclusion

 B. macro substitution

 C. Concatenation

 D. Line control
A. LINE CONTROL

416.Which of the following is the preferred way to recover a database after a transaction in progress
terminates abnormally?
A. Rollback

B. Rollforward

C. Switch to duplicate database

D. Reprocess transactions
A. ROLLBACK

417.Which level of Entity Relationship Diagram (ERD) models all entities and relationships?
a) Level 1
b) Level 2
c) Level 3
A. LEVEL 2

#include <heaferfile.h> are _______ files and #include “headerfile.h” are ________ files

419.Which technique is used that identifies the highest priority resource by means of
software ?
A. Daisy chaining
B. Polling
C. Priority
D. Chaining

POLLING

420.________ uses four twisted-pair cables that connect each station to a common hub.
A) 10Base
5

B) 10Base2

C) 10Base-T

D) 10Base-F

10BASE T

421.C preprocessor is a program

422.Concurrency control is important for which of the following reasons?


A. To ensure data integrity when updates occur to the database in a multiuser environment

B. To ensure data integrity when updates occur to the database in a single-user environment

C. To ensure data integrity while reading data occurs to the database in a multiuser environment

To ensure data integrity while reading data occurs to the database in a single-user
D.
environment

A. A

423.Which method is used to establish priority by serially connecting all devices that
request an interrupt ?
a) Vectored-interrupting
b) Daisy chain
c) Priority
d) Polling

A. DAISY CHAIN

424.In Ethernet addressing, if the least significant bit of the first byte is 0, the address is
_________.
unicas
A) t

B) multicast

C) broadcast

D) none of the above

UNICAST

425. ___________ classes are used to create the interface that the user sees and interacts with
as the software is used.

426. What is meaning of "VAD" ?


A. VOICE ACTIVITY DETECTION

427.In C, #pragma exit is primarily used for?


a) Checking memory leaks after exitting the program
b) Informing Operating System that program has terminated
c) Running a function at exitting the program
d) No such preprocessor exist

A. C

428.When an entity instance must be a member of only one subtype, it is which of the following?
A. Disjoint with total specialization
B. Disjoint with partial specialization
C. Overlap with total specialization
D. Overlap with partial specialization
A. A

429.Which of the following statement is incorrect regarding the Class-responsibility-


collaborator (CRC) modeling?
a) All use-case scenarios (and corresponding use-case diagrams) are organized into categories in
CRC modelling
b) The review leader reads the use-case deliberately.
c) Only developers in the review (of the CRC model) are given a subset of the CRC model index
cards

A. C

430. What is the result of ANDing 0 and 15?

) 25
5

B) 15

C) 0

D) none of the above

A. 0
431.What is meaning of DMAC ?
DIRECT MEMORY ACCESS CONTROLLER

432.A supertype/subtype hierarchy has which of the following features?


Subtypes at the lower lever in the hierarchy inherit attributes only from their immediate
A.
supertype.

B. Attributes are assigned at the highest logical level.

Subtypes at the higher lever in the hierarchy inherit attributes only from their immediate
C.
subtype.

D. Attributes are assigned at the lowest logical level.

A. B

433.Which one is not a C pre-processor?

434. The model in which the requirements are implemented by its category is ______.
a. Evolutionary Development Model
b. Waterfall Model
c. Prototyping
d. Iterative Enhancement Model

A. EVOLUTIONARY DEVELOPMENT MODEL


435. The number of addresses in a class C block is _______.
A)65,534

B)16,777,216

C)256

D)none of the above


256

436.What is meaning of IOP ?


A. Input output processor
B. Input output product
C. Input output producer
D. Input output processing

437.What type of join is needed when you wish to include rows that do not have matching
values?
a) Equi-join
b) Natural join
c) Outer join
d) All of the Mentioned
A. OUTER JOIN

438. What will happen if you create a file stdio.h and use #include “stdio.h” in C?
a) The predefined library file will be selected
b) The user-defined library file will be selected
c) Both the files will be included
d) The compiler won’t accept the program
A. B

439.If every requirement can be checked by a cost-effective process, then the SRS is:

verifiable
traceable
modifiable
complete
A. VERIFIABLE
440.The number of addresses assigned to an organization in classless addressing _______.
A)can be any number

B)must be a multiple of 256

C)must be a power of 2

D)none of the above

441.What is the output of this C code?


#include <stdio.h>
#define print(m, n) m ## n
void myfunc();
int main()
{
myfunc();
}
void myfunc()
{
printf("%d\n", print(1, 2));
}

What is the default mask for class B in CIDR notation?


A)/9

B)/8

C)/16

D)none of the above

16

443.The software design paradigm is a part of software development and it includes:


a. Design, Maintenance, Programming
b. Coding, Testing, Integration
c. Requirement gathering, Software design, Programming
d. None of the above

A. DESIGN MAINTAINENCE AND PROGRAMMING

444.The following SQL is which type of join: SELECT CUSTOMER_T. CUSTOMER_ID,


ORDER_T. CUSTOMER_ID, NAME, ORDER_ID FROM CUSTOMER_T,ORDER_T
WHERE CUSTOMER_T. CUSTOMER_ID = ORDER_T. CUSTOMER_ID

a) Equi-join
b) Natural join
c) Outer join
d) Cartesian join

A. EQUI- JOIN

445.Which is used for this and known as high speed buffer exist with almost each
process ?
A. Primary
B. Secondary
C. Cache
D. RAM
A. CACHE

446.__________ is the indirection operator in C.


A. UNARY OPERATOR … *

447.In IPv4, what is the length of the data field given an HLEN value of 12 and total
length value of 40,000?

A)39,988

B)40,012

C)40,048

D)39,952

39952
448.In which condition only one process holds a resource at a given time ?
A. Circular queue
B. Hold and Wait
C. Mutual exclusion
D. Non preemption

A. MUTUAL EXCLUSION

449. The New modules, that are need to be replaced or modified, and they are also
designed against requirement specifications set in the previous stage is ______ .
a. Acceptance testing
b. System Testing
c. Delivery
d. Design

A. DESIGN

Which of the following column properties would be used to specify that cells in a column must be
immediately filled with a monetary value of $10,000?

A. Null status

B. Data type

C. Default value

D. Data constraints

A. DEFAULT VALUE

451.Which of the following C statement, does not initialize ptr to null. (assuming variable declaration
of a as int a=0;)
a) int *ptr = &a;
b) int *ptr = &a – &a;
c) int *ptr = a – a;
d) All of the mentioned
A. A

452.In which condition one process holds the allocated resources and other waits for it ?
A. Non preemption
B. Mutual exclusion
C. Hold and wait
D. All of above

A. HOLD AND WAIT

453.The term ________ means that IP provides no error checking or tracking. IP assumes the
unreliability of the underlying layers and does its best to get a transmission through to its
destination, but with no guarantees.
A)reliable delivery

B)connection-oriented delivery

C)best-effort delivery

D)none of the above

BEST EFFORT DELIVERY

Choose the correct option according to the given statement.


Statement 1: Software is a physical rather than a logical system element.
Statement 2: Computer software is the product that software engineers design and
build.
Statement 3: Software is a logical rather than a physical system element.
Statement 4: Software is a set of application programs that are built by software
engineers.
A) Statement 1 and 2 are correct.
B) Only Statement 2 and 3 are correct.
C) Statement 2 and 3 and 4 are correct.
D) All statements are correct
A. C

463.What is the output of this C code?


#include
void f1(int*);
int main()
{
int i = 10;
foo((&i)++);
}
void f1(int *p)
{
printf("%d\n", *p);
}

464.In IPv4, which field or bit value unambiguously identifies the datagram as fragment?
A)Do not fragment bit ? 0
B)More Fragment bit ? 0

C)Fragment offset = 1000

D)none of the above

FRAGMENT OFFSET = 1000

465.Which of the following query would display names of all the students whose honours subject is
English, or honours subject is Spanish and percentage of marks more than 80?

A - select first_name, last name from students where (honours_subject = “English” or


honours_subject = “Spanish” ) and percentage_of_marks > 80;

B - select first_name, last name from students where honours_subject = “English” or


honours_subject = “Spanish” and percentage_of_marks > 80;

C - select first_name, last name from students where (honours_subject = “English” or


honours_subject = “Spanish” and percentage_of_marks > 80);

D - select first_name, last name from students where (honours_subject = “English”) or


honours_subject = “Spanish” and percentage_of_marks > 80;

Answer : A

If requirements are easily understandable and defined then which model is best
suited?
a. Spiral model
b. Waterfall model
c. Prototyping model
d. None of the above
A. WATERFALL MODEL
467.What is returned by MOD(1000,30)?

468.In the Internet, the domain name space (tree) is divided into _______ different sections.
A)three

B)two

C)four

D)none of the above


3

469.PC Program Counter is also called ...................


A. INSTRUCTION POINTER

Which of the following is the correct syntax to send an array as a parameter to function in C

471.CASE Tool stands for___________.


Computer-Aided Software Engineering

472.Which query will perform a natural join between the HONOURS_SUBJECT table and the
LOCATIONS table?

473.CPU does not perform the operation ..................

a. data transfer

b. logic operation

c. arithmetic operation

d. all of above

A. ALL OF THE ABOVE

DNS can use the services of ________ using the well-known port 53.
A)UDP
B)TCP

C)either a or b

D)none of the above


EITHER A OR B

475.What is the output of this C code?


#include <stdio.h>
int main()
{
double *ptr = (double *)100;
ptr = ptr + 2;
printf("%u", ptr);
}

476. Software is defined as ____.

477.Which of the following is true about a group function?

A. The MIN function can be used only with numeric data.


B. The MAX function can be used only with date values.
C. The AVG function can be used only with numeric data.
D. The SUM function canít be part of a nested function.

A. C

478.Which of the following operand can be applied to pointers p and q in C?


(Assuming initialization as int *a = (int *)2; int *b = (int *)3;)
a) a + b
b) a – b
c) a * b
d) a / b
A. A-B

479._______ refers to two characteristics: when data should be sent and how fast it can be sent.
Semantics
A)
B)Syntax

C)Timing

D)none of the above


TIMING

480.The access time of memory is ............... the time required for performing any single
CPU operation.
A) Longer than
B) Shorter than
C) Negligible than
D) Same as
. LONGER THAN

481. What is the meaning of requirement elicitation in software engineering?

5. Which of following logical operation can be applied to pointers?


(Assuming initialization int *a = 2; int *b = 3;)
a) a | b
b) a ^ b
c) a & b
d) None of the mentioned
A. NONE

482. Communication between a computer and a keyboard involves ______________


transmission.
A. SIMPLEX

483.What is the size of *ptr in a 32-bit machine, (assuming C initialization as int *ptr = 10;)?
a) 1
b) 2
c) 4
d) 8

A. 4

484.The database schema is written in


A. HLL
B. DML
C. DDL
D. DCL
A. DDL

485.Memory address refers to the successive memory words and the machine is called
as ............
A) word addressable

B) byte addressable

C) bit addressable

D) Terra byte addressable

A. WORD ADDRESSABLE

487.Grant and revoke are ....... statements


DCL COMMANDS

489. Which document is created by system analyst after the requirements are collected
from various stakeholders?
a. Software requirement specification
b. Software requirement validation
c. Feasibility study
d. Requirement Gathering

SOFTWARE REQUIREMENT SPECIFICATION


490. This was the first network.
A. ARPANET

491........... keyword is used to find the number of values in a column.


492.What is the output of this C code?


#include <stdio.h>
void main()
{
char *s= "hello";
char *p = s + 2;
printf("%c\t%c", *p, s[1]);
}

493.A pipeline is like ....................


A) an automobile assembly line

B) house pipeline

C) both a and b

D) a gas line
A. B

494. Which organization has authority over interstate and international commerce in the
communications field?
a) ITU-T
b) IEEE
c) FCC
d) ISOC

A. FCC

495. If every requirement stated in the Software Requirement Specification (SRS) has
only one interpretation, SRS is said to be correct _____ .
a. Unambiguous
b. Consistent
c. Verifiable
d. None of the above

A. UNAMBIGUOUS

496.The output of an AND gate with three inputs, A, B, and C, is HIGH when ________.
A. A = 1, B = 1, C = 0

B. A = 0, B = 0, C = 0

C. A = 1, B = 1, C = 1

D. A = 1, B = 0, C = 1

A. C

497.What is the output of this C code?


#include <stdio.h>
int main()
{
void *p;
int a[4] = {1, 2, 3, 4};
p = &a[3];
int *ptr = &a[2];
int n = (int*)p - ptr;
printf("%d\n", n);
}

A relational database developer refers to a record as 


A. a criteria
B. a relation
C. a tuple
D. an attribute
A. TUPPLE

499. _______ are special-interest groups that quickly test, evaluate, and standardize
new technologies
A)Forums

B)Regulatory agencies

C)Standards organizations
D)All of the above
FORUMS

500.If a signal passing through a gate is inhibited by sending a LOW into one of the inputs, and the
output is HIGH, the gate is a(n):
A. AND

B. NAND

C. NOR

D. OR

A. NAND

501.Which of the following products was an early implementation of the relational model developed
by E.F. Codd of IBM?
A. IDMS

B. DB2

C. dBase-II

D. R:base

A. DB2

502.What is the output of this C code?


#include <stdio.h>
int main()
{
int a[4] = {1, 2, 3, 4};
int b[4] = {1, 2, 3, 4};
int n = &b[3] - &a[2];
printf("%d\n", n);
}

503._______ defines how a particular pattern to be interpreted, and what action is to be taken
based on that interpretation.
A. SEMANTICS
504.Comment on the output of this C code?
#include
int main()
{
char *str = "This" //Line 1
char *ptr = "Program\n"; //Line 2
str = ptr; //Line 3
printf("%s, %s\n", str, ptr); //Line 4
}
a) Memory holding “this” is cleared at line 3
b) Memory holding “this” loses its reference at line 3
c) You cannot assign pointer like in Line 3
d) Output will be This, Program
A. B

505.A DBMS that combines a DBMS and an application generator is ________ .

A) Microsoft's SQL Server B) Microsoft's Access

C) IBM's DB2 D) Oracle Corporation's Oracle

A. MICROSOFT ACCESS

506. Which of the following logical operations is represented by the + sign in Boolean algebra?

A. Inversion

B. AND

C. OR

D. Complementation

A. OR

507.The output of a NOR gate is HIGH if ________.


A. all inputs are HIGH
B. any input is HIGH
C. any input is LOW
D. all inputs are LOW
A. ALL
INPUTS
ARE
LOW

508.Which of the following is not considered to be a basic element of an enterprise-class database


system?
A. Users
B. Database applications
C. DBMS
D. COBOL programs
A. COBOL PROGRAMS

509.The syntax for constant pointer to address (i.e., fixed pointer address) in C is:
a) const <type> * <name>
b) <type> * const <name>
c) <type> const * <name>
d) Both (a) and (c)
A. B

510. The Boolean expression for a 3-input AND gate is ________.

A. X = AB

B. X = ABC

C. X = A + B + C

D. X = AB + C

A. X=ABC

511.How will you declare and assign a function pointer in C?:


(Assuming the function to be assigned is “int multi(int, int);”)
a) int (*fn_ptr)(int, int) = multi;
b) int *fn_ptr(int, int) = multi;
c) int *fn_ptr(int, int) = &multi;
d) Both (b) & (c)
A. A

512.The DBMS that is most difficult to use is ________ .


A. Microsoft's SQL Server

B. Microsoft's Access

C. IBM's DB2

D. Oracle Corporation's Oracle

A. ORACLE CORPORATION

513.What does the small bubble on the output of the NAND gate logic symbol mean?
A. open collector output

B. tristate

C The output is inverted.

D. none of the above

A. OUTPUT IS INVERTED

Comment on the output of this C code?


#include <stdio.h>
int main()
{
int a = 10;
int **c -= &&a;
}

515. Stack follows the strategy of........


A. LIFO
B. FIFO
C. LRU
D. RANDOM
A. LIFO

516.Comment on the following C statement:


int (*a)[5];

517.What happens when you push a new node onto a stack?


A) the new node is placed at the front of the linked list.
B) the new node is placed at the back of the linked list.
C) the new node is placed at the middle of the linked list.
D) No Changes happens

A. B

518. What are the pin numbers of the outputs of the gates in a 7432 IC?

A. 3, 6, 10, and 13

B. 1, 4, 10, and 13

C. 3, 6, 8, and 11

D. 1, 4, 8, and 11

A. C

519.Comment on the 2 arrays regarding P and Q in C:


int *a1[5];
int *(a2[5]);
P. Array of pointers
Q. Pointer to an array
520.Consider the usual implementation of parentheses balancing program using stack.
What is the maximum number of parentheses that will appear on stack at any instance of
time during the analysis of ( ( ) ( ( ) ) ( ( ) ) )?
a) 1
b) 2
c) 3
d) 4

A. 3

521.How many inputs of a four-input AND gate must be HIGH in order for the output of the
logic gate to go HIGH?
A. any one of the inputs

B. any two of the inputs

C. any three of the inputs

D. all four inputs

A. ALL 4 INPUTS

522.Which of the following is not possible statically in C?


a) Jagged Array
b) Rectangular Array
c) Cuboidal Array
d) Multidimensional Array
A. JAGGED ARRAY

523.The data structure required to check whether an expression contains


balanced parenthesis is?
a) Stack
b) Queue
c) Array
d) Tree
A. STACK

524.The output of an exclusive-OR gate is HIGH if ________.


A. all inputs are LOW

B. all inputs are HIGH

C. the inputs are unequal

D. none of the above

A. INPUTS ARE UNEQUAL

525.How many input combinations would a truth table have for a six-input AND gate?
A. 32

B. 48

C. 64

D. 128

A. 64

526. The prefix form of A*B+C/D is?

527.
What is the output of this C code?
#include <stdio.h>
int main()
{
int i = 0, j = 1;
int *a[] = {&i, &j};
printf("%d", (*a)[0]);
return 0;
}

528.What will any variable evaluate to if it is of Boolean data type?


529.Which data structure is needed to convert infix notation to postfix notation?
a) Branch
b) Tree
c) Queue
d) Stack
A. STACK

530. A one-to-four line demultiplexer is to be implemented using a memory. How many bits must
each word have ?
A. 4 * 4 = 16 BITS

531.A positive AND gate is also a negative


A. NAND gate

B. NOR gate

C. AND gate

D. OR gate

A. OR GATE

532.Which of the following is/are generated from char pointer in C?


a) char *string = “Hello.”;
b) char *string;
scanf(“%s”, string);
c) char string[] = “Hello.”;
d) Both (a) and (c).
A. A

533. What is the result of the following operation


Top (Push (S, X))
A. X
532. How many full adders are required to construct an m-bit parallel adder ?

A. m/2

B. m-1

C. m

D. m+1

E. None of the above

A. M

535. Which of the following statement(s) about stack data structure is/are NOT
correct?
a) Stack data structure can be implemented using linked list
b) New node can only be added at the top of the stack
c) Stack is the FIFO data structure
d) The last node at the bottom of the stack has a NULL link

A. C

536.Which of the following C declaration(s) is/are invalid?

537.Ruby is a case-sensitive language.


YES. TRUE

Consider the following operation performed on a stack of size 5.


Push(1);
Pop();
Push(2);
Push(3);
Pop();
Push(4);
Pop();
Pop();
Push(5);

After the completion of all operation, the no of element present on stack are
a) 1
b) 2
c) 3
d) 4

A. 1

539.Parallel adders are

540.The digital multiplexer is basically a combination logic circuit to perform the operation
A. AND-AND

B. OR-OR

C. AND-OR

D.OR-AND

A. AND – OR

541.What is the output of the given code?


my_string=Ruby puts(my_string)
. A. ERROR

542. Which of the following is not an inherent application of stack?


a) Reversing a string
b) Evaluation of postfix expression
c) Implementation of recursion
d) Job scheduling
A. JOB SCEDULING

543.Which of the following is not a valid datatype?


544.What is the octal equivalent of the binary number:
10111101
A. 275

545.Which of the following operation take worst case linear time in the array implementation
of stack?
a) Push
b) Pop
c) IsEmpty
d) None

A. NONE

546.The type of expression in which operator succeeds its operands is?


a) Infix Expression
b) pre fix Expression
c) postfix Expression
d) None

A. POSTFIX EXPRESSIION

547.The binary code of (21.125)10 is


(a) 10101.001
(b) 10100.001
(c) 10101.010
(d) 10100.111.

A. A 10101.001

548.In Ruby Arrays can be used to store multiple values in one single variable.
A. TRUE

549.Each element in an array has an index and the starting index is index 1.
a) True
b) False
A. FALSE

550. Which of the following application generally use a stack?


a) Parenthesis balancing program
b) Syntax analyzer in compiler
c) Keeping track of local variables at run time
d) All of the above

ALL OF THE ABOVE

551.A NAND gate is called a universal logic element because


A. ANY LOGIC FUNCTION CAN BE REALISED BY NAND GATES ALONE

552. One operation that is not given by magnitude comparator

553.Which of the following is the valid string method in Ruby?


a) The .length method
b) The .upcase method
c) The .downcase method
d) The .irreverse method

A. .IRREVERSE METHOD

554. If the elements “A”, “B”, “C” and “D” are placed in a stack and are deleted
one at a time, in what order will they be removed?
a) ABCD
b) DCBA
c) DCAB
d) ABDC
A. DCBA

555.What is the output of the following?


"Iam learning ruby language".length
a) 26
b) 23
c) 20
d) 18
A. 26

556. Adding 1001 and 0010 gives output of


A. 1011
B. 1111
C. 0
D. 1010

A. 1011

557.A linear list of elements in which deletion can be done from one end (front)
and insertion can take place only at the other end (rear) is known as a ?
a) Queue
b) Stack
c) Tree
d) Linked list
A. QUEUE

558. The data structure required for Breadth First Traversal on a graph is?
a) Stack
b) Array
c) Queue
d) Tree

A. QUEUE

560.Which of the following syntax is correct for command-line arguments in C?


a) int main(int var, char *varg[])
b) int main(char *argv[], int argc)
c) int main()
{
int argv, char *argc[];
}
d) Both (a) and (b)
A. A

561.Let the following circular queue can accommodate maximum six elements
with the following data

front = 2 rear = 4
queue = _______; L, M, N, ___, ___
What will happen after ADD O operation takes place?
a) front = 2 rear = 5
queue = ______; L, M, N, O, ___
b) front = 3 rear = 5
queue = L, M, N, O, ___
c) front = 3 rear = 4
queue = ______; L, M, N, O, ___
d) front = 2 rear = 4
queue = L, M, N, O, ___

A. A

562. A Boolean function may be transformed into


LOGICAL DIAGRAM

563.What would be the output if we try to execute following segment of C code (assuming
the following input “Have a nice day”)?
printf(“%s\n”, argv[argc]);

564.A queue is a ?
a) FIFO (First In First Out) list
b) LIFO (Last In First Out) list.
c) Ordered array
d) Linear tree

A. FIFO

565.Use of function pointers in C is

566. Is it Possible to find two algebric expressions that specify same function
A. YES

567.Using 10's complement 72532- 3250 is

568.Which of the following C expression is true for the following?


ptr is array with 3 elements of pointer to function returning pointer of int
a) int **ptr[3]();
b) int *(*ptr[3])();
c) int (*(*ptr[3])());
d) None of the mentioned

A. B
569. What will be the output of the following?
"Ruby".reverse.upcase
b) RUBY
b) ybuR
c) YBUR
d) YBUr

A. C.

571. Table that is not a part of asynchronous analysis procedure

A. transition table
B. state table
C. flow table
D. excitation table

A. EXCITATION TABLE

572.In linked list implementation of a queue, where does a new element be


inserted?
a) At the head of link list
b) At the tail of the link list
c) At the centre position in the link list
d) None

A. TAIL OF THE LINK LIST

573.A data structure in which elements can be inserted or deleted at/from both the
ends but not in the middle is?
a) Queue
b) Circular queue
c) Dequeue
d) Priority queue

A. C – DEQUEUE

1. Shift registers are used for

575.What will be the output of the following


my $txt = 'I am learning Perl'; $txt =~ /(\w+)$/;
A. PERL

576.State the following declaration is valid in C?


int* ((*x)())[2];
a) true
b) false
c) Undefined behaviour
d) Depends on the standard

A. FALSE

577.A normal queue, if implemented using an array of size MAX_SIZE, gets full
when
1. Two variables will be represented by

579.What will be the output of the following my $txt = 'I am learning Perl';my ($match) = $txt
=~ /\s(.*)\s/;
a. am learning
b. I am learning Perl
c. learning
d. am
e. none A. AM LEARNING

580.A linear collection of data elements where the linear node is given by means of pointer
is called?
a) Linked list
b) Node list
c) Primitive list
d) None

A. LINKED LIST

581.1. Adjacent squares represents a


1. A circuit that converts n inputs to 2^n outputs is called

583.
What is the output of this C code?
#include <stdio.h>
struct p
{
int x;
char y;
};
int main()
{
struct p p1[] = {1, 92, 3, 94, 5, 96};
struct p *ptr1 = p1;
int x = (sizeof(p1) / 3);
if (x == sizeof(int) + sizeof(char))
printf("%d\n", ptr1->x);
else
printf("falsen");
}

584.In linked list each node contain minimum of two fields. One field is data field to store the
data second field is?
c) Pointer to character
b) Pointer to integer
c) Pointer to node
d) Node

A. POINTER TO NODE

585.A variant of linked list in which last node of the list points to the first node of the list is?
a) Singly linked list
b) Doubly linked list
c) Circular linked list
d) Multiply linked list
A. CIRCULAR LINKED LIST

586. Which of the following are incorrect syntax for pointer to structure in C?
(Assuming struct temp{int b;}*my_struct;)
a) *my_struct.b = 10;
b) (*my_struct).b = 10;
c) my_struct->b = 10;
d) Both (a) and (b)

A. A

587.Encoders are made by three

588.BCD to seven segment is a

589.Which of the following structure declaration doesn’t require pass-by-reference in C?

590. In doubly linked lists, traversal can be performed?


a) Only in forward direction
b) Only in reverse direction
c) In both directions
d) None
A. IN BOTH DIRECTIONS

591.
For the following C function call which option is not possible?
func(&s.a); //where s is a variable of type struct and a is the member of the struct.

592.A variant of the linked list in which none of the node contains NULL pointer
is?
a) Singly linked list
b) Doubly linked list
c) Circular linked list
d) None
A. CIRCULAR LINKED LIST

593.
1. One that is not type of flipflop is
One that is not type of flipflop is

594.
1. Flip-flops can be constructed with two

595.
What is the output of this C code?
#include <stdio.h>
struct p
{
int x;
int y;
};
int main()
{
struct p p1[] = {1, 92, 3, 94, 5, 96};
struct p *ptr1 = p1;
int x = (sizeof(p1) / 5);
if (x == 3)
printf("%d %d\n", ptr1->x, (ptr1 + x - 1)->x);
else
printf("false\n");
}

596.In circular linked list, insertion of node requires modification of?


a) One pointer
b) Two pointer
c) Three pointer
d) None
A. 2 POINTER

597.What is the output of this C code?


#include <stdio.h>
typedef struct p *q;
struct p
{
int x;
char y;
q ptr;
};
int main()
{
struct p p = {1, 2, &p};
printf("%d\n", p.ptr->ptr->x);
return 0;
}

1. RS flip-flops are also called

599.Linked lists are not suitable to for the implementation of?


a) Insertion sort
b) Radix sort
c) Polynomial manipulation
d) Binary search
A. BINARY SEARCH

600.Decimal digit in BCD can be represented by


601.What is the output in PERL
my $txt = 'I am learning Perl';$txt =~ /(.*)\s/;

I AM LEARNING

602. The post order traversal of binary tree is DEBFCA. Find out the pre order
traversal.
A. ABFCDE
B. ADBFEC
C. ABDECF
D. ABDCEF

A. C

603.The operation of processing each element in the list is known as ......


- Sorting
- Merging
- Inserting
- Traversal

TRAVERSAL

604.In MySQL Which “text type” has the maximum number of bytes?

605.
1. To perform product of maxterms Boolean function must be brought into

A. AND terms
B. OR terms
C. NOT terms
D. NAND terms

A. OR TERMS

606. Other name for directed graph is ..........


A. Direct graph
B. Digraph
C. Dir-graph
D. Digraph
B. A. D DIGRAPH

607.Which of the following is not possible?

608. X+Y=Z represents operation that is

609.In Binary trees nodes with no successor are called ......


A. End nodes
B. Terminal nodes
C. Final nodes
D. Last nodes
A. TERMINAL NODES

610. Which of the following is FALSE about typedef?


a) typedef follow scope rules
b) typedef defined substitutes can be redefined again. (Eg: typedef char a; typedef int a;)
c) You cannot typedef a typedef with other term.
d) All of the mentioned
A. B

611.In design procedure input output values are assigned with

612. Output of AND gates in SOP is connected to

A. NOT gates
B. OR gates
C. AND gates
D. XOR gates

A. OR GATES

613.In MySQlWhich Numeric Data type has the largest range?

A connected graph T without any cycles is called ........


A. A tree graph
B. Free tree
C. A tree d
D. All of the abovE
A. ALL OF THE ABOVE

615.Mod-6 and mod-12 counters are most commonly used in:

616.Every node N in a binary tree T except the root has a unique parent called
the ......... of N.
A. Antecedents
B. Predecessor
C. Forerunner
D. Precursor
A. PREDECESSOR

617.In MySQL what is the default format for “Date” data type?

What is the output of this C code?


#include <stdio.h>
union
{
int x;
char y;
}p;
int main()
{
p.x = 10;
printf("%d\n", sizeof(p));
}
Compile time error
Depends on the compiler
sizeof(int) + sizeof(char)
sizeof(int) . A

619.Sequential representation of binary tree uses ........

620.How many illegitimate states has synchronous mod-6 counter ?

A) B)

3 2

C) D)

1 6

View Answer Flag as Incorrect

621 The clock signals are used in sequential logic circuits to


A. to tell the time of the day
B. to tell how much time has elapsed since the system was turned on
C. to carry serial data signals
D. to synchronize events in various parts of a system
A. D
622. In a graph if e=[u,v], Then u and v are called ........
A. u is adjacent to v but v is not adjacent to u.
B. e begins at u and ends at v
C. u is node and v is an edge.
D. both u and v are edges.
A. B

623.In MySQL what is the default format for “Datetime” data type?

624.TREE[1]=NULL indicates tree is ........

625.To build a mod-19 counter the number of flip-flops required is

A) B)

3 5

C) D)

7 9

626. What is the output of this C code?


#include <stdio.h>
union p
{
int x;
char y;
};
int main()
{
union p p, b;
p.y = 60;
b.x = 12;
printf("%d\n", p.y);
}

Compile time error


Depends on the compiler
60
Undefined behaviour

A. 60

627.Which indicates pre-order traversal?

1) Left sub-tree, Right sub-tree and root

2) Right sub-tree, Left sub-tree and root

3) Root, Left sub-tree, Right sub-tree

4) Right sub-tree, root, Left sub-tree

628.Which among the following C function is odd one out?

629.The main difference between JK and RS flip-flop is that


[A]. JK flip-flop is faster than SR flip-flop

[B]. JK flip-flop has a feed back path

[C]. JK flip-flop accepts both inputs 1

[D]. JK flip-flop does not require external clock


In MySQlWhat is the default format for “Timestamp” data type?

631.A terminal node in a binary tree is called ............


A. Root
B. Leaf
C. Child
D. Branch
A. LEAF

632.Simplified form of the boolean expression (X + Y + XY) (X + Z) is


[A]. X + Y + Z

[B]. XY + YZ

[C]. X + YZ

[D]. XZ + Y

633.In MySQL what is the default format for “Time” data type?

Finding the location of a given item in a collection of items is called ......

A. Discovering
B. Finding
C. Searching
D. Mining
A. SEARCHING

635.Which of the following boolean expressions is not logically equivalent to all of the rest ?
(a) wxy' + wz' + wxyz + wy'z
(b) w(x + y' + z')
(c) w + x + y' + z'
(d) wx + wy' + wz'
A. C

636.Which of the following is an external sorting?


A. Insertion Sort
B. Bubble Sort
C. Merge Sort
D. Tree Sort

A. MERGE SORT

637.Is “Datetime” and “Timestamp” are same data type in MySQL?

1. Which of the following statements is true ?

639.Which of the following is an internal sorting?


A. Tape Sort
B. 2-way Merge Sort
C. Merge Sort
D. Tree Sort

A. TREE SORT

640.The function of a multiplexer is

641.In MySQL, Is it necessary to insert the value in each column of the table?

Selection sort first finds the .......... element in the list and put it in the first
position.
A. Middle element
B. Largest element
C. Last element
D. Smallest element
A. SMALLEST ELEMENT

643.In the following query, what does “person_id” stands for?


CREATE TABLE person (person_ id SMALLINT UNSIGNED,
fname VARCHAR(20), lname VARCHAR(20) ,
CONSTRAINT pk_person PRIMARY KEY (person_id));

644.A combinational logic circuit which generates a particular binary word or number is
645.Which statement can be used for modifying the definition for an existing table?

Quick sort is also known as ........


A. merge sort
B. tree sort
C. shell sort
D. partition and exchange sort
A. D

647. In which of the following adder circuits, the carry look ripple delay is eliminated ?

648.A tree sort is also known as ......... sort.


A. quick
B. shell
C. heap
D. selection
A. HEAP SORT

649.A full-adder is a logic circuit which can add two single order bits plus a carry in from a previous
adder. Its incomplete truth table is given in the table below. The missing entry in the outputs for SUM
and CARRY out are

Input Outputs
A A B Cin Sum CarryOUT
0 0 0 0 0 0
0 0 0 1 1 0
0 0 1 0 1 0
0 0 1 1 0 1
1 1 0 0 1 0
1 1 0 1 0 1
1 1 1 0 0 1
1 1 1 1 ? ?

Which feature is used for automatic increment of the column?

651.What is the default value of column?

652.The characteristic equation of D flip-flop is:

653........... sorting is good to use when alphabetizing large list of names.


A. Merge
B. Heap
C. Radix
D. Bubble
A. RADIX SORTING

656. Which of the following sorting algorithm is of divide and conquer type?
A. Bubble sort
B. Insertion sort
C. Quick sort
D. Merge sort
A. QUICK SORT
655.Which statement is used to select columns and rows from the table?

656.If four 4 input multiplexers drive a 4 input multiplexer, we get a:

657.In the following query “person” stands for


SELECT person_id, fname, lname, Birth_date FROM person;

Which of the following equations would accurately describe a four-input OR gate when A =
1, B = 1, C = 0, and D = 0?

659.If thenumber of record to be sorted large and the key is long, then ......
sorting can be efficient.

660.The worst case occur in linear search algorithm when .......

661.In the following query “*” stands for SELECT * FROM person;

What is the name of a digital circuit that produces several repetitive digital waveforms?

663.Which of the following is not a limitation of binary search algorithm?

664.The basic types of programmable arrays are made up of ________.

665.
Which Clause is used to select a particular row from the set of row in an existing table?

The Average case occurs in linear search algorithm ..........

667.The logic gate that will have HIGH or "1" at its output when any one (or more) of its inputs is
HIGH is a(n):

668.
Which Clause is used to sort the stored data in alphabetical order?
669.
Binary search algorithm cannot be applied to ...
Which Clause is used to select a particular table in Mysql?

671.
Which of the following gates is described by the expression ?

672.Complexity of linear search algorithm is .........

673.
Which command is used to show all tables that are stored in a database?

What is the Boolean expression for a four-input OR gate?

675.
How is a J-K flip-flop made to toggle?

676.
............ is the method used by card sorter.
677.
Which statement is used for updating existing information in the table?

Which statement is used to delete an existing row from the table?

679.
Dijkstra algorithm is also called the ...................... shortest path problem.
680.
How many flip-flops are required to produce a divide-by-128 device?

681.
Which of the following is correct for a gated D flip-flop?

In MySQL “INSERT” is same as “UPDATE” ?

683.
..................... solves the problem of finding the shortest path from a point in a
graph to a destination.
684.
................. is a most generalized single source shortest path algorithm to find
the shortest path in a graph even with negative weights.
685.
A correct output is achieved from a master-slave J-K flip-flop only if its inputs are stable
while the:

Which clause is used to rename the existing table?


687.
The toggle condition in a master-slave J-K flip-flop means that Q and will switch to their
________ state(s) at the ________.

688.In......................, a directed graph G is acylic if and only if a DFS of G


yields no back edge.
689.Which of the following functions are not performed by “ALTER” clause?

Which command is used to remove existing tables or database?

691.On a positive edge-triggered S-R flip-flop, the outputs reflect the input condition when
________.

692...........
may take place only when there is some minimum amount(or) no
space left in free storage list.

693.A linear list in which the pointer points only to the successive node is ......

Is duplicate entry of primary key is allowed in SQL?

695.If an active-HIGH S-R latch has a 0 on the S input and a 1 on the R input and then the R input
goes to 0, the latch will be ________.

696.Which Key is used to link two tables in Mysql?

697........... refers to a linear collection of data items.

The symbols on this flip-flop device indicate ________.


699.
With four J-K flip-flops wired as an asynchronous counter, the first output change of divider #4
indicates a count of how many input clock pulses?

700.For a C program, the input is taken using


a) scanf
b) Files
c) Command-line
d) All of the mentioned

A. ALL OF THE ABOVE

701.Left LINK is the pointer pointing to the ...

702. Edge-triggered flip-flops must have:

A. very fast response times.

B. at least two inputs to handle rising and falling edges.

C. a pulse transition detector.

D. active-LOW inputs and complemented outputs.

A. C

703.In a linked list the .......... field contains the address of next element in the
list.
A. Link field
B. Next element field
C. Start field
D. Info field
A. LINK FIELD

704.Which one of the following PHP function is used to determine a file’s last access time?
a) fileltime()
b) filectime()
c) fileatime()
d) filetime()

A. FILEATIME()

705.In C, Escape sequences are prefixed with

706.What is one disadvantage of an S-R flip-flop?

A. It has no enable input.

B. It has an invalid state.

C. It has no clock input.

D. It has only a single output.

IT HAS AN INVALID STATE

707.The dummy header in linked list contain .....


A. first record of the actual data

B. last record of the actual data

C. pointer to the last record of the actual data

D. middle record of the actual data


A. A

708.Eachnode in a linked list must contain at least .....


A. Three fields

B. Two fields
C. Four fields

D. Five fields
A. TWO FIELDS

709.Which one of the following function is capable of reading a file into a string variable?
a) file_contents()
b) file_get_contents()
c) file_content()
d) file_get_content()

A. FILE_GET_CONTENTS

710. If an input is activated by a signal transition, it is ________.

A. edge-triggered

B. toggle triggered

C. clock triggered

D. noise triggered

A. EDGE TRIGGERED

711.In linked lists there are no NULL links in


A. single linked list

B. linear doubly linked list

C. circular linked list

D. linked list A. CIRCULAR LINKED LIST

712.What is the use of sprintf function in C?

713.A gated S-R latch and its associated waveforms are shown below. What, if anything, is wrong
and what could be causing the problem?
A. The output is always low; the circuit is defective.

B. The Q output should be the complement of the output; the S and R terminals are reversed.

C. The Q should be following the R input; the R input is defective.

D. There is nothing wrong with the circuit.

A. A

714. An active-HIGH input S-R latch has a 1 on the S input and a 0 on the R input. What state is the
latch in?

A.

B.

C.

D.

A. 1, 0

715......................
of binary search tree starts by visiting the current node, then its
left child and then its right child.
A) Preorder traversal
B) In-order traversal
C) Linear traversal
D) Post-order traversal
A. PREORDER TRAVERSAL

716.Which one of the following function is capable of reading a specific number of characters
from a file?
a) fgets()
b) fget()
c) fileget()
d) filegets()

A. FGETS ()

717.In C, FILE is of type ______


a) int type
b) char * type
c) struct type
d) None of the mentioned
A. STRUCT TYPE

718. Assertion (A): A demultiplexer can be used as a decoder.


Reason (R): A demultiplexer can be built by using AND gates only.

A. Both A and R are correct and R is correct explanation of A

B. Both A and R are correct but R is not correct explanation of A

C. A is true, R is false

D. A is false, R is true

A. TRUE, FALSE

719.A binary search tree whose left subtree and right subtree differ in hight by at
most 1 unit is called ……
A) AVL tree
B) Red-black tree
C) Lemma tree
D) None of the above
A. AVL TREE

720.4 bit 2's complement representation of a decimal number is 1000. The number is
A. -8

721.Which of the following is true about the characteristics of abstract data


types?
i) It exports a type.
ii) It exports a set of operations
A) True, False

B) False, True

C) True, True

D) False, False

A. TRUE TRUE

722. Which of the following mode argument is used to truncate a file in C?


a) a
b) f
c) w
d) t
A.W

723.Which of the following data structure can't store the non-homogeneous data
elements?
A) Arrays

B) Records
C) Pointers

D) Stacks

A. ARRAYS

724.
What is the output for the following C program?
union u
{
struct p
{
unsigned char x : 2;
unsigned int y : 2;
};
int x;
};
int main()
{
union u u;
u.p.x = 2;
printf("%d\n", u.p.x);
}

725.The digital multiplexer is basically a combination logic circuit to perform the operation
A. AND-AND

B. OR-OR

C. AND-OR

D.OR-AND

A. AND OR
726. A 4 : 1 multiplexer requires __________ data select line.

A. 1

B. 2
C. 3

D. 4

A. 2

727.A ....... is a data structure that organizes data similar to a line in the
supermarket, where the first one in line is the first one out.
A) Queue linked list
B) Stacks linked list
C) Both of them
D) Neither of them
A. QUEUE LINKED LIST

728.
What is the output of this C code?
#include <stdio.h>
int main()
{
char buf[12];
stderr = stdin;
fscanf(stderr, "%s", buf);
printf("%s\n", buf);
}

729.What happens when we use the following C statement


fprintf(stderr, “error: could not open file”);
a) The diagnostic output is directly displayed in the output.
b) The diagnostic output is pipelined to the output file.
c) The line which caused error is compiled again.
d) The program is immediately aborted
A. A

730.Which of the following is non-liner data structure?


A) Stacks
B) List
C) Strings
D) Trees
A. TREES

731.It is desired to display the digit 7 using a seven segment display. The LEDs to be turned on are

732.Identify the data structure which allows deletions at both ends of the list but
insertion at only one end.
A) Input restricted dequeue
B) Output restricted qequeue
C) Priority queues
D) Stack
A. INPUT RESTRICTED DEQUEUE

733.Which of the following function can be used to terminate the main function from another function
safely in C?
a) return(expr);
b) exit(expr);
c) abort();
d) Both b and c

A. EXIT

734. 1001012 is equal to decimal number

735.fputs function in C, writes a string to a file that only ends with a newline.
a) true
b) false
c) Depends on the standard
d) Depends on the compiler

A. FALSE

736.Which of the following data structure is linear type?

737.A Karnaugh map with 4 variables has

738. To represent hierarchical relationship between elements, Which data


structure is suitable?

A) Dequeue

B) Priority

C) Tree

D) Graph
A. TREE

739.strcat function in C adds null character


a) Only if there is space
b) Always
c) Depends on the standard
d) Depends on the compiler

A. ALWAYS

740.An 8 bit data is to be entered into a parallel in register. The number of clock pulses required is
[A]. 8

[B]. 4
[C]. 2

[D]. 1

A. 1

741.A directed graph is ………………. if there is a path from each vertex to every
other vertex in the digraph.
A) Weakly connected
B) Strongly Connected
C) Tightly Connected
D) Linearly Connected
A. STRONGLY CONNECTED

742. Which pre-defined C function returns a pointer to the last occurrence of a character in a string?
a) strchr(s, c);
b) strrchr(s, c);
c) strlchr(s, c);
d) strfchr(s, c);
A. B

743.A universal shift register can shift

744.The following C expression can be substituted for.


if (isalpha(c) && isdigit(c))

745.In
the …………….. traversal we process all of a vertex’s descendants before
we move to an adjacent vertex.
746. A16 X 216 __________ .

747.StateTrue of False.
i) Network is a graph that has weights or costs associated with it.
ii) An undirected graph which contains no cycles is called a forest.
iii) A graph is said to be complete if there is no edge between every pair of
vertices.

748.For the binary number 11101000, the equivalent hexadecimal number is

749.Which is true about isaplpha(c), where c is an int that can be represented as an unsigned
char or EOF.isalpha(c) returns?

750. Match the following.


a) Completeness i) How long does it take to find a solution
b) Time Complexity ii) How much memory need to perform the search.
c) Space Complexity iii) Is the strategy guaranteed to find the solution when
there in one.
A) a-iii, b-ii, c-i

B) a-i, b-ii, c-iii

C) a-iii, b-i, c-ii

D) a-i, b-iii, c-ii

A. C
751.A XOR gate has inputs A and B and output Y. Then the output equation is

752.In C, the ungetc function can be used only with getc function

753.A full subtractor has a total of

754. In general, the binary search method needs no more than …………….
comparisons.
A) [log2n]-1

B) [logn]+1

C) [log2n]

D) [log2n]+1
A. D

755.The C statement, void * malloc(size_t n) returns

756.A ……….. is a graph that has weights of costs associated with its edges.
A) Network
B) Weighted graph
C) Both A and B
D) None A and B
A. BOTH A AND B

757.The function ____ obtains block of memory dynamically

127416 - 3A716 = __________ .

759.A + (B . C) =

760.How many characters for pushback is guaranteed per file while using the following C function
ungetc(c, fp);761.
761. A graph is a collection of nodes, called ………. And line segments called
arcs or ……….. that connect pair of nodes
A) vertices, edges
B) edges, vertices
C) vertices, paths
D) graph node, edges
A. VERTICES, EDGES

. ………… is not the operation that can be performed on queue.


A) Insertion
B) Deletion
C) Retrieval
D) Traversal
B) A. TRAVERSAL

763.The inputs to a 3 bit binary adder are 1112 and 1102. The output will be

764.In C, Memory allocation using malloc() is done in?


765.Which among the following is never possible in C when members are different in a structure and
union?
//Let P be a structure
//Let Q be a union
a. sizeof(P) is greater than sizeof(Q)
b. sizeof(P) is less than sizeof(Q)
c. sizeof(P) is equal to sizeof(Q)
d. None of the mentioned
A. NONE OF THE ABOVE

The K-map for a Boolean function is shown in figure. The number of essential prime implicants
for this function is

A. 4

767.Which of the following statement is true?


i) Using singly linked lists and circular list, it is not possible to traverse the list
backwards.
ii) To find the predecessor, it is required to traverse the list from the first node in
case of singly linked list.
A) i-only
B) ii-only
C) Both i and ii
D) None of both
A. BOTH 1 AND 2

768. State True or False.


i) An undirected graph which contains no cycles is called forest.
ii) A graph is said to be complete if there is an edge between every pair of
vertices.

A) True, True
B) False, True
C) False, False
D) True, False
A. TRUE TRUE
769.The modulus of counter in the given figure is

A. 1

B. 2

C. 3

D. 4

A. 3

770.Which of the following cannot be used inside sizeof in C?


a. pointers
b. functions
c. macro definition
d. None of the mentioned
b. A. NONE

771.State True or False.


ii) Binary search is used for searching in a sorted array.
iii) The time complexity of binary search is O(logn).
A) True, False
B) False, True
C) False, False
D) True, True
TRUE TRUE
772.Which of the following is not a characteristic of a flip flop?

773.The following C declarations


struct node
{
int i;
float j;
};
struct node *s[10] ;

define s to be

A. An array, each element of which is a pointer to a structure of type node


B. A structure of 2 fields, each field being a pointer to an array of 10 elements
C. A structure of 3 fields: an integer, a float, and an array of 10 elements
D. An array, each element of which is a structure of type node

A. A

The decimal equivalent of the hexadecimal number (3 E 8)16 is


A. 1000

775.In
……………, search start at the beginning of the list and check every
element in the list.

A. LINEAR SEARCH

776.The number of tokens in the following C statement.


printf("i = %d, &i = %x", i, &i);
is
A=3
B=26
C=10
D=21
A. 10
777.Which of the following is not the type of queue?
) Ordinary queue
B) Single ended queue
C) Circular queue
D) Priority queue

A. SINGLE ENDED QUEUE

778. The Boolean expression Y = (A + B + AB) C then Y will be equal 779.


Consider the following C declaration
struct {
short s [5]
union {
float y;
long z;
}u;
} t;
Assume that objects of the type short, float and long occupy 2 bytes, 4 bytes and 8 bytes,
respectively. The memory requirement for variable t, ignoring alignment
considerations, is

A. 22 bytes
B. 14 bytes
C. 18 bytes
D. 10 bytes

B. 18 BYTES

780.How many JK flip-flops are needed to make a 4-bit shift register?

781.Statetrue or false.
i) The degree of root node is always zero.
ii) Nodes that are not root and not leaf are called as internal nodes.

A) True, True
B) True, False
C) False, True
D) False, FalsSE
A. C, FALSE TRUE

782.Which one of the following function in PHP outputs the contents of a string variable to the specified
resource?
a) filewrite()
b) fwrite()
c) filewrites()
d) fwrites()

A. FWRITE()

783.Any node is the path from the root to the node is called
A) Successor node
B) Ancestor node
C) Internal node
D) None of the above

A. ANCESTOR NODE

784.How many items are available in the $_FILES array?


a) 2
b) 3
c) 4
d) 5

A. 5

785.The radix of a hexadecimal system is


A. 16
786.When you’re uploading files you need to set the enctype of the form to __
a) text
b) text/file
c) multipart/form-data
d) multimedia/form-data
A. C _.

787.Two 2's complement number having sign bits X and Y are added and the sign bit of the result is
Z. then, the occurrence of overflow is indicated by the Boolean function.
A. XYZ

B. XYZ

C. X YZ + XY Z

D. XY + YZ + ZX

A. C

788.
State true of false.
i) A node is a parent if it has successor nodes.
ii) A node is child node if out degree is one.
) True, True
B) True, False
C) False, True
D) False, False

A. TRUE, FALSE

789..…………………. Is a directed tree in which outdegree of each node is less


than or equal to two.
A) Unary tree
B) Binary tree
C) Trinary tree
D) Both B and C
A. BINARY TREE

790.To check whether a file was uploaded, you look in the ___ superglobal array.
a) $_FILES
b) $_DOCS
c) $_DOCUMENTS
d) $_FOLDERS

A. FILES

791.If A = 0101, then A' is


A. 1010

792.Inheritance is the means by which one or more classes can be derived from a/an ___ class.
a) base
b) abstract
c) null
d) predefined
A. BASE

793.In a 3 input NOR gate, the number of states in which output is 1 equals

794. Which of the following are the operations applicable an primitive data
structures?
A. create

B. destroy
C. update

D. all of the above

A. AL OF THE ABOVE

795.Which of the following statements can be used to set the time zone in individual PHP scripts?
a) date_set_timezone(‘Europe/London’);
b) date_default_timezone_set(‘Europe/London’);
c) date_set_default_timezone(‘Europe/London’);
d) date_default_timezone(‘Europe/London’);

A. B

796.The use of pointers to refer elements of a data structure in which elements


are logically adjacent is ....
A. LINKED ALLOCATION

797.The 2's complement representation of - 17 is

799. Which one of the following functions can be used to compress a string in PHP?
a) zip_compress()
b) zip()
c) compress()
d) gzcompress()

A. Gzcompress()

800.Which one of the following function reads a directory into an Array in PHP?
a) scandir()
b) readdir()
c) scandirectory()
d) readdirectory()
A. SCANDIR()

801.Ina priority queue, insertion and deletion takes place at ..................


A) front, rear end
B) only at rear end
C) only at front end
D) any position

A. ANY POSITION

802. Which one of the following function returns the port number of a specified service in PHP?
a) getportname()
b) getservername()
c) getserverbyname()
d) getservbyname()
A. GETSERVERBYNAME()

803.A list which displays the relationship of adjacency between elements is said
to be
A) linear

B) non linear

C) linked list

D) trees
LINEAR

S-ar putea să vă placă și