Advance2020 B.A/B.Sc/B.Com/Code No: ABC-393 2 Apr,2021 boomtecho2@gmail.comLeave a comment 1. Which of these not an advantage of optical Fibers ? Greater immunity to tapping Less signal attenuation Immue to electromagnetic interference Easy installation and maintenance 2. The Minterm expension of f(P,Q,R)=PQ+QR’+PR’ is : m0 + m1 + m3 + m5 m2 + m4 + m6 + m7 m2 + m43 + m4 + m5 m0 + m41+ m6 + m7 3. Which of the following comments about array and pointer is/are not true? Array is a constant pointer Both are exactly same All of these Pointer is an one Dimensional array and dynamic array 4. If the attribute of one composite key is dependent on the attribute of another composite key,then it would be in one of the following relations: 1NF 2NF BCNF 3NF 5. A binary tree in which , if all its levels except possible the last have the maximum number of nodes and all the nodes at the last level appears as for left as possible is know as : threaded tree complete binary tree full binary tree AVL Tree 6. When many users accesses mainframes, this approach is called as : Dedicated resources Word processors Resource allocation Interface 7. Dual mode of Operating System has : 1-Mode 4-Mode 3-Mode 2-Mode 8. How many undirected graphs (not necessarily connected) can be constructed out of a given set V={V1,V2,………Vn} of n vertices? 2n(n-1)/2 n! 2n n(n-1)/ 9. Match the following: List -I List-II (a)Expert System (i)Pragmatics (b)Planning (ii) Resolution (c) Prolog (iii) Means-end-analysis (d) Natural Language (iv) Explanation facility (iii), (iv) , (i) ,(ii) (iv), (iii) , (ii) ,(i) (i), (ii) , (iii) ,(iv) (iii), (iv) , (ii) ,(i) 10. Which of the following is example of private IP Address , which is not used in Internet ? 172.16.12.5 22.82.84 11.55.88.5 11.88.77 11. Which of the following is an application of stack data structure ? The Stack span problem All of these Arithmetic expression evaluation Managing function call 12. What is the meaning of Bandwidth in Network ? Connected computers in the network Class of IP used in Network None of these A Transmission capacity of a communication Channels 13. We use malloc ()and calloc() for : Dynamic memory allocation None of these Both dynamic and static memory allocation Static memory allocation 14. A Small network making up the internet and also having a small number of computer with in ,it is called: Domain Host Adress Sub domain 15. Match of the following List-I List-II (i) OLAP (a) Regression (ii)OLTP (b) Data Warehouse (iii) Decision Tree (c) RDBMS (iv)Neural Network (d) Classification (c) , (b) (a) (d) (b) , (c) (a) (d) (c) , (b) (d) (a) (b) , (c) (d) (a) 16. AM and FM are examples of ……. Analog to Analog Digital to Analog Digital to digital Analog to Digital 17. What kind of mechanism is to be taken into account for converting a weak entity set into a strong entity set in entity relationship diagram? Aggregation Generalization Specialization Adding suitable attribute 18. The Simplified SOP (Sum Of Product) form of the boolean expression (P+Q’+R’).(p+Q’+R).(P+Q+R’)is : (P + Q’.R’) (P.Q+R) (P’.Q+R) (P’.Q + R’) 19. The Region Against which an object is clipped is called a ….. Enclosing rectangle Clip square Boundary Clip window 20. For a data Entry project for office who have never used computers before (user interface and user friendliness are extremely important ),one will use: Waterfall Prototyping Spiral Model Component Model 21. In propositional logic p↔q is equivalent to (where ~ denotes NOT): ~ (P ˅ Q) → ~ (Q ˅ P) ~ (P ˅ Q) ˄ ~ (Q ˅ P (P ˅ Q) ˄ (Q ˅ P) (~ P ˅ Q) ˄ (~ Q ˅ P) 22. What is firewall in computer Network? A System designed to prevent unauthorized access A web Browsing Software An Operating System of computer network The Physical Boundary of network 23. Which of the following is syntactically correct? for(); for (;); for(;;); for(,); 24. What is the default maximum packets size for 16 MB token ring network? 1101 bytes 4202 bytes 2202 bytes 576 bytes 25. A Leased special high-speed connection from the local telephone carrier for business user that transmit at 1.544 mbps is know as ………carrier . T4 T3 T1 T2 26. A file is downloaded in a home computer using a 56 kbps modem connected to an internet service provider .if thw downloaded of file completes in 2 minutes, what is the maximum size of data downloaded? 112 M bits 672 M bits 6.72M bits 67.20 M bits 27. Moving process from main memory to disk is called: Termination Interruption Catching Swapping 28. IEEE 802.15 standard for : Personal Area Network Wireless Regional area Network Wireless LAN (Wifi) Broadband wireless 29. Which file holds the command to execute automatically when the OS starts? autoexec. bat any batch file Command. com config.sys 30. In Artificial Intelligence (AI), What is present in the planning graph ? Heuristic estimates Variable Literals Sequence of levels 31. If A and B Are Two Fuzzy sets with membership functions : μa(χ) ={0.2,0.5.,0.6,0.1,0.9} μb (χ)= {0.1,0.5,0.2,0.7,0.8} then the value of μa ∩ μb will be {0.2,0.5,0.6,0.7,0.9 {0.2,0.5,0.2,0.1,0.8} {0.1,0.5, 0.6 , 0.1 ,0.8} {0.1 , 0.5 ,0.2, 0.1, 0.8} 32. The main Objective of System Modification is : to use the latest software tools to use the latest hardware to meet the user’s new/changed needs none of these 33. If human voice is required to be digitized ,what will be the bit rate at 16 bits per sample? 256 kbps 128 kbps 512 kbps 64 kbps 34. When Determining the efficiency of algorithm , the time factor is measured by : Counting the kilobytes of algorithm Counting the number of statements Counting microseconds Counting the number of key operations 35. Two Main measures for the efficiency of an algorithm are : Processor and Memory Data And Space Time and Place Complexity and Capacity 36. Generalization is a ____process. Bottom up Both A and B Top-Down None of these 37. the IEEE single precision and double precision format to represent floating point numbers, has a length of ……..and …..respectively. 32 bits and 64 bits 8 bits and 16 bits 64 bits and 128 bits 16 bits and 32 bits 38. Cluster Computer System are normally linked via: PAN TAN LAN WAN 39. ………is used to create and destroy tables,indexes and other forms of structures. Data definition language Data manipulation language Transaction Control Language Data Control language 40. Multi processor system gives a : Tightly coupled system Small System Loosely Coupled system Both A and B 41. What is feedback ? Method of input none of these method of output measurement Data storage method 42. Length of string ‘Correct’ is : 7 6 8 Implementation 43. Reliability of software is directly dependent on : Quality of the design User requirement Number of error present Software engineering experience 44. SRS Means : None of these System Requirement specification Software Requirement solution Software Requirement specification 45. Which of the following topologies consists of multiple CPUs connected by a single communication line running the length of the network ? Bus Tree Star Ring 46. A data structure in which linear sequence in maintained by pointers is know as : stack Linklist pointer based data structure Array 47. Which of the following is true about linked list implementation of stack ? None of these In push operation, if new nodes are inserted at the beginning of linked list, then in pop operation, nodes must be removed from end. In push operation, if new nodes are inserted at the end, then in pop operation, nodes must be removed from the beginning. Both of these 48. Multiprocessor System have advantage of : Expensive hardware Increased throughput Both A and B Operating System 49. Which of the following register is as per IANA ? port 1024 to 49151 port 255 to 1024 Port 1 to 255 port 1028 to 68536 50. When Computer boots,which program starts first ? Operating System Basic System Computer System Metaphor System 51. Which of the following is not a software process model? Timeboxing Iterative Prototyping Glassboxing 52. A function call mechanism that passes arguments to a function by passing a copy of the values of the arguments is ………. Call by value Call by name Call by result Call by Reference 53. Logical Extension of multi programming Operating System is : Both A and B Multitasking Single-Programming Time Sharing 54. Memory protection is normally done by the : Operating System Compiler Processor and the as associated hardware User program 55. A triangular slip connected with 50 triangles connects …….vertices 49 50 48 52 56. How Many Stack are needed to implement a queue? Consider the situation where no other data structure like arrays ,liked list is available to you : 4 1 3 2 57. Which function is used to hold the screen at run time Getchar() CLrscr() Getch() Free() 58. In the Hungarian method for solving assignment problem, an optional assignment requires that the maximum number of lines that can be drawn through squares with zero opportunity cost be equal to the number of : Rows + Columns-1 Rows + Columns Rows + Columns+1 Rows or Columns 59. Suppose only one multiplexer and one inverter are allowed to be used to implement any Boolean function of n variables. What is the maximum size of the multiplexer ? 2n+1 line to 1line 2n line to 1 line 2n−2 line to 1line 2n−1 line to 1line 60. Which command allow you to view your file 24 lines at a time ? Pg Cat none of these More 61. In SQL, which command is used to make a permanent change in issuing statement since the beginning of a transaction ? COMMIT SAVE PACK ZIP 62. Dijkstra’s Banker’s Algorithm is used for: Deadlock Recovery Deadlock Detection Deadlock prevention Deadlock Avoidance 63. Which of the following substitution technique have the relationship between a character in the plaintext and a character in the ciphertext as one -to-many? Polyalphabetic Transpositional None of these Monoalphabetic 64. What is best method of go for the game playing problem? Heuristic search Stratified search Random Search Optimal search 65. Perception of size by human eye depends upon : Other Factors Visual angle Visual Acuity Visual Field 66. Consider the following schedules involving two transactions : S1 : r1(x); r1(y); r2(x); r2(y); w2(y);w1(x) S2 : r1(x);r2(x);r2(y);w2(y); r1(y);w1(x) S1 is not conflict serializable and S2 is conflict serializable. Both S1 and S2 are conflict serializable Both S1 and S2 are not conflict serializable. S1 is conflict serializable and S2 is not conflict serializable. 67. During Execution how many interrupts are made per block ? Four One Three Two 68. Which of the following addressing modes are suitable for program relocation at run time ? i Absolute Addressing ii Based Addressing iii Relative Addressing iv Indirect Addressing (i) and (iv) (i),(ii) and (iii) (ii) and (iii) (i) and (iv) 69. Consider the declaration: char street[10] =”abcdefghi” Choose the correct remarks: & street + 1 and street +1 have the same values & street is meaningless & street and street will have diferent values None of these 70. Scheduling of threads are done by : Output Input Memory Operating System 71. On a Monochromatic monitor,the frame is known as …………. Display file Bitmap Refresh Buffer Pixmap 72. Which of the following protocol is used in E-mail server? Antivirus Software SMTP relay setting Access Control All of these 73. A Sender is employing public key cryptography to send a secret message to a receiver. Which one of the following statements is True ? Sender Encrypts using receiver’s public key Sender encrypts using his own public key Receiver decrypts using sender’s public key Receiver decrypts using his own public key 74. Suppose each set is represented as a linked list with elements in arbitrary order. which of the operations among union, intersection , membership, cardinality with be the slowest ? Union only Union, Intersection Membership, Cardinality Intersection membership 75. Write an Example for non-emissive display: LED Plasma Panel Gas discharge tube LCD 76. The Complexity of Binary Search Algorithm is : O(n) O(log n) O(n log n) O(n^2) 77. Which of the following is not a loosy compression technique? FFT Arithmetic Coding JPEG MPEG 78. In 3G network, W-CDMA is also known as UMTS . The Minimum specturm allocation required for W-CDMA is ….. 2 MHz 5 KHz 20 MHz 5 MHz 79. Which of the following statement is/are True for an Undirected graph? P : Number of odd degrees of all vertices is even Q: Sum of degrees of all vertices is even Both A and B P only Q only Neither P nor Q 80. The …………..memory style is known as an Error correction Code (ECC) Organization , Which employs parity bits . RAID Level 3 RAID Level 4 RAID Level 1 RAID Level 2 81. Which of the following string algorithms can be used sort a random linked list with minimum time complexity? Insertion sort Heap sort Quick sort Merge sort 82. Which one of the following is an application of Queue Data Structure? When data is transferred asynchronously (data not necessarily received at same rate as sent) between two processes When a resource is shared among multiple consumers Load Balancing All of above 83. Controlling Access to a network by analyzing the incoming and outgoing packets is called: Data Filtering IP Filtering Packet Filtering Firewall Filtering 84. Which of the following are used to generate a message digest by the network security protocols? P : RSA Q : SHA-1 R : DES S : MDS Q and S only Q and R only R and S only P and R only 85. What are the following sequence of steps taken in designing a fuzzy logic machine ? Rule evaluation -> Defuzzification -> Fuzzification Rule evaluation -> Fuzzification-> Defuzzification Fuzzification-> Rule Evaluation->Defuzzification Fuzzification->Defuzzification-> Rules evaluation 86. Structured English is used : Data Flow in DFD How DFD’s are used in data processing Processes in a DFD in a reasonably recise manner How programs are to be written? 87. If user A wants to send an encrypted message to uses B. The plaintext of A is encrypted with the …… Private key of user A public key of user B Private key of user B Public key of user A 88. When a process is accessing shared modifiable data,the process is said to be in : Context switching Multitasking Deadlock Critical section 89. If x=5 , y=2 then x^y equals…………..(Where ^ is a bitwise XOR operator) 11001000 10000010 10100000 00000111 90. What is the return type of malloc() or calloc()? int* pointer of allocated memory type void* void** 91. Consider the fractional knapsack instance n=4,(p1,p2,p3,p4)=(10,10,12,18),(w1,w2,w3,w4)=(2,4,6,9) and M=15. The maximum profit is given by (Assume p and w denotes profit and weight of objects respectively) 40 30 38 32 92. the Data block of a very large file in the UNIX file system are allocated using: Indexed Allocation Linked allocation An extension of indexed allocation Contiguous allocation 93. What is the value of x=4+2%-8? -6 6 4 none of these 94. What is the use of Ping Command ? To test a printer quality to test a bug in a application To Test a hard disk fault To test a device on the network is reachable 95. Which of the following device is used to connect two systems , especially if the system use different protocols? HUB Bridge Repeater Gateway 96. Which of the following specifies the action required to correct defects in the current design of the database? 3NF 1NF 2NF Normal Form 97. A Sender is employing public key cryptography to send a secret message to a receiver. Which one of the following statements is True ? Receiver decrypts using sender’s public key Sender encrypts using his own public key Sender Encrypts using receiver’s public key Receiver decrypts using his own public key 98. Find the false statement In Modern Cryptography, symmetric key algorithms use same key both for Encryption and Decryption. The AES (Advanced Encryption Standard) cryptosystem allows variable key lengths of size 56 bits and 124 bits. The symmetric cipher DES (Data Encryption Standard) was widely used in the industry for security product. Public key algorithms use two different keys for Encryption and Decryption 99. Which language necessarily need heap allocation in the runtime environment ? Those that support recursion Those that use dynamic scoping Those that use global variables Those that allow dynamic data structures 100. The Maximum Speed of LAN (Local Area Network) is: Upto 5 Gbps Upto 10 Gbps Upto 15 Gbps Upto 3 Gbps Loading … Question 1 of 100