Sunteți pe pagina 1din 7

1'-------7

Q. No.

Question
Stanflardsand proceduresfor managingchanges ' a^ : ' slving softwareproduct is called? (2)Con'e:e-:' : - "t-3i3-en: .d4) Management Confirmation ' ": (3) Confiquration Management l+) Comea:a: ,s:J to hold conditionalcodes are visibleto usersan: which are partially Registers

r1
T (' ,^{ .\

lpown as : registers (3)Ger:e-= - -: : :: -3: S:e'S .4) FlagS address '(ll pC (Z)Memory
Wtrictrof the following performsmodulationand derr:Jr-,iation? * (2) satellite (1)fiberoptics [O cpe4qL-lj -t/ ?aen

,{1
.\/

lt tt

L_f

A router tr= to a {4Jfonrvardspacket all outgoifgUn$,except llnl< (2)forwards packet to{he nextiiee oLitgoing a ls link outgoing a pack-et tc :: (3)determines rryhich on (4)fonvards oacket alloutqoing links. to a
A feasibility dy is carriedout ren irer

c'lginatgc. :za<e;.

@
6
cJ

areGr. ct^

/-

L^

tic-3 :-= c7=-r- -p o'3,',- ,[,----.--

i\ /
l\

,i

I
,t

f\
i\

Which of the following protocolis not used in the Intemet i'r Gopher (1)Telnet (2)WrRL Buan intranetwe mean 1f ) A LAN of an organization all of connecting branches an c.ca^ za:iorl (2)A Wide Area Network computernetwork A corporate -(3) and using the internetprotocol (4IA networkconnectingall computersof an organization (1) Shadinq

\,H
I

I
10
11

ldnnti-atiasing v e rt h e n e t wo rk . Ho wd o e s t h e t ra n s p or t | a y e r a | | o w t h i s to host to use multipleapptications transmitother data at the sarnetime as the video : transmission? mechanisms. (1)lt uses control error transmissions. protocol formultiple simultaneous only (2)lt usesa connectionless addresses (3)ft usesmultiple 2 Layer source port (4)lt usesmultiple numbers.
ffidParepushedinastack,oneaftertheother.Thestackis popped four times and each element is inserted in a queue. Then two elements are deieted from the queue and pughed back on the stack. Now one item is popped from the stack. The popped item is

(2) Hiddenlineremoval

(3) Circle drawing

N
1

J
12i
.eJ i

Af C c;n not connect to any remote websites, ping its default gateway, or ping a printer {f,at is functioning properly on the local network segment. Which action will verify that the TCP/IPstack is functioning correctly on this PC? prompt. at command /allcommand the host's f) Usethe ipconfig prompt. at command the command (2) Use the ping127 .0.0.1 any failureson the pathto (3) Use the traceroute commandat the commandpromptto identify the gateway. (4) Use FTP to checkfor connectivity remotesites. to

(1)X

(2)Y

(3) w

(4) z

^)\,/

l I

for A nyfuorkthat providesa constantbandwidth the completedurationof a message is a lrdryifer lffcircuit switched (2) packet network. switched network. (4)cellswitched network. network Y3)frameswitched

BookletCode- C

Page2 of 8

'13
I

-/

.r&
\15/ Y

Systemdesignis carriedout (1)as soonas system requirements ::::rmined a.e (2)whenever system a analyst feelsii s -'gent finalsystem specifications =::'ovedby theorganization are 13) after (4)whenever usermanagement -. : should done the fee be Pystem test planis specified whenthefinalspecifications d.a,.,are up (2) duringfeasibility 7i1) study (3)during requiremenls the (4) durinqsvstemstudvstaqe specificat stage :-s

'g
17

t(
\

IY
'r 19

For which of the following practices Aoe appropriate mechanisms tools? and (1)Analyzing need 2) Unambiguous specificationthesolution of the 4) Allof these 13)Validating specification is "PF6cess (i; a program highlevel in language cn disk ::: in execution !9_plqglam
Which of the following page replacernent alg (1) Optimalreplacement (2t -= lA) F|FO (4) Both(1) and (3)

COCOMOmodel is used for: (1) Effortestimation (2) Time est,-:::n (6fco#strnu,,on (4) sizeestimation Dijkeshtra'sbanking algorithm in an cpera (1) Deadlock qvoidance QfDeadloc{'3:cvery (3) Mutualexcusion (4) Contextswitchino

'"p/

(d
22 \ i4

e u PP e s t' a rr u n P rPe l l neq P rocessor w l th 25ns cycl e ti me i s di vi ded i nto 5 pipet ine s ta g 6 w i th l a te n c i e s o f 5,7,3,6 and4 ns. i i pi pel i ne l atch l atencv i s .l ns. w h ar is evnt a | cy is 1 ns, what cycle

'Which of the follo_yingkeyword is used to declare exceptions that can possibly oecur (1) handle thror44s (3, :-=:<ed (4) manaqe {Z) Let R be a relation.Which of the foltowing co (1) R will necessarily havea compcs:=rey if R is in BCNFbut not in 4NF. (2) lf R is in 3NF and if everykey c' = : simple, thenR is in BCNF. (3) lf R is in BCNFand if R has at lea:: :re simple key,then R is not in 4NF. is in 5NF.

(2)contents mbinmemory of (4)a iobin secondarv memorv

time of resulting processor.

23 (

1)8 ns 9ns Programming i computer called is

1 0n s

4 12ns or data

1't Microprogramming ) 3 rSsemb rammtn


:^-3 ^^ =J

s ramming lZ'=,s:: ^^ c'cg

Z+
't //

is to ,frtearch engine a program search .


a ;- -

V'

3 +:: :a33s ,:- sggt'e.i indexterms ,'z *ea pa3esfor .n'3-airon usi ifieci s=a':-:e... The primaryrespon@ yst is to an 14)specify inforrna:3r s)/stem which mee:s -s:- -:-ents of an organization :-: i (2)writeprogramstc -neerspecifications (3) maintain syste= the !)4eet managersof :-,eorqanization 20,47,15,g. g. 4, 40, 30, 12,17 Then the order of these elementsafter second pass of the algorithm is (1)8,9, 15 2a 47 L '2 11 30.40 ,{6 15.20 4T'.4.9,30,40,12,17 3) 15.?0 47 1 3 I 12 30. 40.17 r4 z 8. 9. 15,20.47,12,17,30,40 2lcgn+t)-i (g) to9,n-. -i (4\loq(n)+1

- - .^^- - -

lf one uses straign, *o-*. ascending order:

fl1log(n)

ot Il9 dgelh

thebase two):

Booklet Code- C

Page3 of 8

---------l

A contextdiagram the of ;pf describes context a system

Wh a ti sth e p ri ma ryffi

is a DFD E; :- :;ves an overview the svstem of is not use: ^ :r'awing detailed a DFD 2 r Find otherDNS servers e' FindMAC,48-bitaddresses

(1)Resolve 32-bit addresses lpv4.hardware in


namesto lP addresses

256gray levelsusing i::ioi isaccomhe in p. i"t" f #Jliiil j; a -J.;il,: a pr d rYv'\v'e vvrre'rr'rv vr Dlar is ; :3[ ?ii?-I:g::l-I:,l?:i and a stop biL '-' " |yt" l9 bits) of information,

!""yg::njime,wo

How many address lines are neeffi memorychip?

.." (4)187.25 sec memoryfocationin a 204gxn

G ta -E ttt !!Y atourC Wlt:?_r*e ( r) A clpptngatgortthm identifies

@r 2

(3) Point clipping, clipping, Line Arei ctipping, Curve co:rg ?nd Text clipping examples : are of clipping; Constructors used to are
(Xflnitialize the objects (2) Construct da:a -:-bers the

thoseportion the : ::-'e thatare eitherinside outside of or of specified region are five typesof ctipping atgorithms !?l Ih:r:

An organization 255.255-224.0. which lp_11{r:_""r"tige can ue usedfor this'organization? (1)10.10128.0 10 10 . ig 9 to 2) 1 0 . 1 0 . . : i: c ':0.10.15g.2 28 :c ?g 2 .10.10 J 9 2 .g 5 s e ) 1O.10.':29.i i0 1 0 1 s s . 2 s s 3) 10.10.1a8.0 to 4) 10.10.128.0:o 1C j59 1C
O (]) is a NovellInterface Controller interfaces modem to a a (2),1s used to controla printer ter to a network.

Systemsa"

(1) alf analysts use them

9,:!",

Lv\ tha,,assist systematic a6-i-+ ;^ ^..^r^. in. design systems of

FTP is an acr-nym for

When "onn"" lvhat is usuallyu"",1-1oackno^wledg"-irr"t a"t"-*as-ieceiveo and ffre to requestthe rbtransmission missingdata? of (1)tP (2)UDP (3)a connectionless acknowledgement (4) an upper-layer, cgnnection-oliented

(2) FileTransmission protocol protocol 3) FileTranslation ile Trahsferprotocol Consider " the page size is 4KB, what is tne lpiroiir"t" size of the page tabre? 1) 16 MB On receiving " (,X) Haltsfor a predetermined time (2) Handsover contror addressbus oJ and data bus to the interrupting device (3) Branches to the ISR immedtaiely- off 4) Branches to the ISR after off of thecurrent instruction

(1)FileTransaction protocol

n togn)

(3)O(n)

(4)O(n2toon

;r i
BpokletCode- C Page of 8 4

l\Y

g ffiT M
-44/

K X
U!
49

A7

in By redundancy a file basedsystemwe meanthat (1)unnecessary is stored data in {2f samedatais duplicated manyfiles (3)datais unavailable (4)fileshaveredundant data to are In orderto allowonly one process enterits criticalsection,binarysemaphores initialized to (1)0 (3 )2 k 1 { 4 )3 of Whichof the followingis a commonmethod requirements elicitation? (2)RiskAssessment (1) Transactional Analysis (3)lmplementinq Svstem (4)Observation the C++encourages structuringa softwareas a collectionof componentsthat are
(1) highlycohesive and looselycoupled (3) hiqhlvcohesive and tiqhtlvcoupled (2) not highlycohesivebut looselycoupled (4) not hiqhlvcohesivebut tiohtlvcouoled

Y
5a{

'ly

,,X

x
a
't'

53

I
I

55

(1) 8 ( 3)10 Q \9 Uftt Acgeptancetesting is known as (2) Grevboxtestinq (3)TestAutomation (4) White box testinq lf BetaTestinq 'Which one of the following is not a correct variable type in C++ prograrns? (1) float (2freal (4) double {3) int Which of the following is not a reserve keyword in C++? (1) mutable . (2) default (3) readable, l/Pvolalile " Regarding#define which of the following statementis false? (1) lt is not C++ statement (2) Thisdoesnot require semicolon the end of line a at that declares constant C++ a in .f3i lt is a C++ statement i4; Noneof these To ovedoad a postfix ++ for FUN class, an appropriatefunction header is (1) FUN&FUN ::operator=+iir:t (2) FUN&FUN ::opera1q1++(FtJN&num) (3) FUN&FUN ::operator++i FUN: operator++(FU N&num) i.. -.{4)

Thefunctionof dispatcher is context ffi Switching (2)Switching usermode to (3)Jumping proper to location theuserprogram start in to thatprogram (4)allof these In a Heaptree (4fValues a nodeis greater value leftsubtreeandsmaller in thanevery in thanright tree sub (2)Values a nodeis greater value children it in thanevery in of (3)Bothof above conditions applies (4)None theseconditions applies of Whichscannercan be usedto imagea 3-dimensionalobject? (1)Drum'-"-- "(2)Slide/Film (4)Diqital Microfilm Camera "t3J 4The presentin the binaryrepresentation numberof I's of 15x256+5x16+3 is

4?Anentityappears only one relationship in then it is (2) a 1:N relationship kt) a 1:1relationship (3)a N:1relationship (4) a N:M relationship

;1

:!

i!

v
58,
a' .-o' 'i
i

nl
+

56,

Assume transaction A holds a shared lock R. lf transaction B also requests for a shared lock on R, it will (1) result a deadlock in (2) immediately granted situation be (p) immediately rejected (4) be grantedas soon as it is released be

'Gachememory (1)hasgreater capacity thanRAM (3)is permanent storage

(2) is faster access to thanCPUregisters to thanDRAM l4J faster access

Systems that are built from a functional viewpoint would typically use which of the following methods: (1) structuralmethods methods tZf object-oriented (4) data-oriented methods methods {3) constructive

i,+

1
at
\-,-j-

*'-'' Bboklet Code c

Page5 of 8

lf the root of a binarysearchtree con (1)Leftsubtree (2)Root (3)Right tree sub Dirty bit is used to show the (1) pagewithcorrupted data (2)wrongpagein the memory Dataintegrityis ensuredby (1)gooddataediting

, q9+ ' ,
(4)Anyof these
:a= l -ct cai 3n

(31pagethat is modified after beingloadedintocacheme-:-_, (2) prcpa3a: :=:e :.arges to all dataitems -:
e^:-!

Two mainmeasures forthe efficienc@ (1)Processor memory and (2)Complexity .a=2::r ano
Time and space

G++supports: (1) Multiple inheritance

(4) Dataand space

(2)Pointer func: - : to :
of inexpensive disks

is usedforfault failurein operating system.rt means (1)redundant array independent of disks true? (1)Table notin 2NF is
3) Redundant arrayof isolated disks lf a table has FD A->B and A is not the candidate key. ttre@

(2)Table - r I 'r3s s:-e :edundancv

In the worst case,the numberof comparisons neded to search a singly linked list n, tor a givenelement is (2)nl2 n (3) l og" n-1 i .4, CSSis an acronym for (1)Cascading StyleSheet ffioslume_Style Sheet (rt)Noileof these 3 lmport java.util.*; java.util .$) AXtheclasses the package in
a-

: :ss java.util

4rnor,,e c'thes

The accesstime of a cachememoryis 100ns and estimatedthat 80% of memory requesb are for read and remaining 20o/o forwrite. ?re The hit ratio for read accessonly is 0.9 and write through procedureis used. What is average accesstime of the systemconsidering only memoryread cycles? 200ns 300ns 720ns 800ns Arrays are best data structures (1)for relatively permanent collections data of (2)forthesizeof thestructure thedatain thestructure constantlvlchanqino and are ' @ forbothof (1)& (2)situation ---# 4) for noneof thesesituation points 1)vertical horizontal to
ratio of a monitor is generally defined as the ratio of ffre ing on the convention followed (4) None of these

(21Hoiizontal vertical points to

flrst mechanical computerdesigneO e-nnage was cailed Oy engine @)Abacus (3)Calculator (4\ All of these
peliod of

-removalalgorithmto deal with non polygonaland no


L =:',

an allocation and its subsequent disposal is called (3) longevity (4) dynaniicbifrdinq

ar

(2) Z-buffer algorithm

BookletCode- C

Page6 of 8\

.N
\;

,':15I What informationis containedin (1) port

76r

er of Layer 3 to helP data delivery? address :vice physical number 'rualconnection identifier (3) destination logical address host while the cache has 2c blocl(s.ll tne fne rnain memory of a computer has -- blocks cache uses set associativemapping s:'eme with two blocks per set, then block k of

mapsto the set the mainmemory (1)(k modm )of cache (3)(k mod2c ) of cache

< mod c) of cache < mod 2m ) of cache dencies between the elements of

compound keys comPosedof / /'i1);;"uitnu,t"(2)twoattributes'3.-'::ormoreattrib The accuracy of data refers to nt Correctness (3) Verifiability (2) Consisten: 6)"vatidity dPEg and MPEG . '79 of l{nave to do withcompression gra:- :. andvideo (2) haveto do withWeb pages (4) noneof these (3) the lnternet what is tl'e subnet mask that allows 510 hosts given the lP As network administrator, 80 address172.30.0.0? (4) 255.255.254.0 (2) 255.255.248 (3\ 255.255.252.0 . n\ 255.255.0.0 is techniqueused to 81 bging -(1f increase priority processes :-e waiting longtime for of the :re waiting longiime for (2) decrease priority processes the of :-e currently running (3) increase priority processes of the (4) decrease priority processes arecurrently running the of A criticalsection is a programsegme -: 82 (1)yvhich spec' :: :mountof time shouldrun in a certain {2) whichavoidsdeadlocks (3)wheresharedresources access: are -

x
I

/ / \ \ . , , / h: ^h USt be enClO Se d b , , , a C a '': . : ; e r e n t n

r.rariableS

X
84

83

A n e w te c h n o l o g y w h i c h provi oes tne aoi i i t, i o create an arti fi ci al w orl d anci have p e o p l e i n te ra c t w i th i t i s cal l ed?

('1)Shortest Job First 3) FirstCome FirstServe Onlinetransactionprocessingis used beca,s: ' rt is efficient i :oan handlerancc- :-=-:s \r u lt;programming refersto
' -= .' - c e v e ra l rt.:' Z -1 * -::: - " .-: -l 3 ' C q ra m s ' atthe S = ^' = --' ,i = ' l uaqes

(2)multitasking
4) noneofthese

:'an organization can ce deternrined by : -: -sersandarrivi-: a: .-: --: - -:-:-:s basedon consensus z -':z'zations do - z'-.. ^eedbasedon,:-- :,::- a^::

B o o < re :

Page of 8 7

has the word length equalto @ (2) 32 byle P{-8 bvte (1) 2 bvte Ua) 4 bvte is a subset of ftflVtU (3JSMTP Noneof these (2) SGMT (1) SGMT ilG+; a function.ontalneu within a class is called t+r'A memberfunction (2)

ffiultiplexers ( 1)8:1multiplexer

to canbe eonnected forma

4) 64:1multi ion must be aPPliedin order to

(2)AND 1'']":---1C0001111 (1)XOR0000111111110000 1'1 {41Nonecf :^ese isi on 11i1101010101 1 eloper,which bug to be fix first is calledas
Pri o ri i r : = xabi l i ty -: -' aceab'

The,program counter of ;fsiores the address the ^s:--:: cn thatis curr:-: ' ceingexecuted :: the (2) stores nextinstruc:3^ :: executed to of t'3 ^3:: :struction be e>.e:-:edthe (3) stores address exes-:=l that s c3;ngcurrently instruction the 4) stores naming conventionsin Java accepted @widely (1) objectnamesstartwithan L::e' 313ss (2) classnamesstartwitha lowe' :ase (3) variable namesthatare decla'e:'^alare typeo - -:::'lase 4) noneof the these a transformations re non -commutative? Which of the following graPhical 98 I (2)Linear fci': ,',:: :. 'ctat'c^ fclic,^,'e: scalng :|{Linea, i4) Noneci rnese oY fotlc',vec '3:a::3) scaling 99 100 their own systemsas should not.design in wtanagers organizations systems withother (1)systems haveto interact to 42)Iheydo not have the specialskillsnecessary (31it is nottheirjob bu 4) thev are
l

{
I

\\ ,\

'( .\

: r{

,/\ '

r=\
/)

{--

ll
I

:-_;

Code- C Booklet

S-ar putea să vă placă și