Advance2020 B.A/B.Sc/B.Com/Code No: ABC-393

1. Which of these not an advantage of optical Fibers ?

 
 
 
 

2. The Minterm expension of f(P,Q,R)=PQ+QR’+PR’ is :

 
 
 
 

3. Which of the following comments about array and pointer is/are not true?

 
 
 
 

4. If the attribute of one composite key is dependent on the attribute of another composite key,then it would be in one of the following relations:

 
 
 
 

5. A binary tree in which , if all its levels except possible the last have the maximum number of nodes and all the nodes at the last level appears as for left as possible is know as :

 
 
 
 

6. When many users accesses mainframes, this approach is called as :

 
 
 
 

7. Dual mode of Operating System has :

 
 
 
 

8. How many undirected graphs (not necessarily connected) can be constructed out of a given set V={V1,V2,………Vn} of n vertices?

 
 
 
 

9. Match the following:

List -I                                                                List-II

(a)Expert System                                             (i)Pragmatics

(b)Planning                                                        (ii) Resolution

(c) Prolog                                                            (iii) Means-end-analysis

(d) Natural Language                                        (iv) Explanation facility

 
 
 
 

10. Which  of the following is example of private IP Address , which is not used in Internet ?

 
 
 
 

11. Which of the following is an application of stack data structure ?

 
 
 
 

12. What is the meaning of Bandwidth in Network ?

 
 
 
 

13. We use malloc ()and calloc() for :

 
 
 
 

14. A Small network making up the internet and also having a small number of computer with in ,it is called:

 
 
 
 

15. Match of the following

List-I                                               List-II

(i) OLAP                                                    (a) Regression

(ii)OLTP                                                    (b) Data Warehouse

(iii) Decision Tree                                   (c) RDBMS

(iv)Neural Network                                  (d) Classification

 
 
 
 

16. AM and FM are examples of …….

 
 
 
 

17. What kind of mechanism is to be taken into account for converting a weak entity set into a strong entity set in entity relationship diagram?

 
 
 
 

18. The Simplified SOP (Sum Of Product) form of the boolean expression (P+Q’+R’).(p+Q’+R).(P+Q+R’)is :

 
 
 
 

19. The Region Against which an object is clipped is called a …..

 
 
 
 

20. For a data Entry project for office who have never used computers before (user interface and user friendliness are extremely important ),one will use:

 
 
 
 

21. In propositional logic p↔q is equivalent to (where ~ denotes NOT):

 
 
 
 

22. What is firewall in computer Network?

 
 
 
 

23. Which of the following is syntactically correct?

 
 
 
 

24. What is the default maximum packets size for 16 MB token ring network?

 
 
 
 

25. A Leased special high-speed connection from the local telephone carrier for business user that transmit at 1.544 mbps is know as ………carrier .

 
 
 
 

26. A file is downloaded in a home computer using a 56 kbps modem connected to an internet service provider .if thw downloaded of file completes in 2 minutes, what is the maximum size of data downloaded?

 
 
 
 

27. Moving process from main memory to disk is called:

 
 
 
 

28. IEEE 802.15 standard for :

 
 
 
 

29. Which file holds the command to execute automatically when the OS starts?

 
 
 
 

30. In Artificial Intelligence (AI), What is present in the planning graph ?

 
 
 
 

31. If A and B Are  Two Fuzzy  sets with membership functions :

μa(χ) ={0.2,0.5.,0.6,0.1,0.9}

μb (χ)= {0.1,0.5,0.2,0.7,0.8}

then the value of μa ∩ μb  will be

 
 
 
 

32. The main Objective of System Modification is :

 
 
 
 

33. If human voice is required to be digitized ,what will be the bit rate at 16 bits per sample?

 
 
 
 

34. When Determining the efficiency of algorithm , the time factor is measured by :

 
 
 
 

35. Two Main measures for the efficiency of an algorithm are :

 
 
 
 

36. Generalization is a ____process.

 
 
 
 

37. the IEEE single precision and double precision format to represent floating point numbers, has a length of ……..and …..respectively.

 
 
 
 

38. Cluster Computer  System are normally linked via:

 
 
 
 

39. ………is used to create and destroy tables,indexes and other forms of structures.

 
 
 
 

40. Multi processor system gives a :

 
 
 
 

41. What is feedback ?

 
 
 
 

42. Length of string ‘Correct’ is :

 
 
 
 

43. Reliability of software is directly dependent on :

 
 
 
 

44. SRS Means :

 
 
 
 

45. Which of the following topologies consists of multiple CPUs connected by a single communication line running the length of the network ?

 
 
 
 

46. A data structure in which linear sequence in maintained by pointers is know as :

 
 
 
 

47. Which of the following is true about linked list implementation of stack ?

 
 
 
 

48. Multiprocessor System have advantage of :

 
 
 
 

49. Which of the following register is as per IANA ?

 
 
 
 

50. When Computer boots,which program starts first ?

 
 
 
 

51. Which of the following is not a software process model?

 
 
 
 

52. A function call mechanism that passes arguments to a function by passing a copy of the values of the arguments is ……….

 
 
 
 

53. Logical Extension of multi programming Operating System is :

 
 
 
 

54. Memory protection is normally done by the :

 
 
 
 

55. A triangular slip connected with 50 triangles connects …….vertices

 
 
 
 

56. How Many Stack are needed to implement a queue? Consider the situation where no other data structure like arrays ,liked list is available to you :

 
 
 
 

57. Which function is used to hold the screen at run time

 
 
 
 

58. In the Hungarian method for solving assignment problem, an optional assignment requires that the maximum number of lines that can be drawn through squares with zero opportunity cost be equal to the number of :

 
 
 
 

59. Suppose only one multiplexer and one inverter are allowed to be used to implement any Boolean function of n variables. What is the maximum size of the multiplexer ?

 
 
 
 

60. Which command allow you to view your file 24 lines at a time ?

 
 
 
 

61. In SQL, which command is used to make a permanent change in issuing statement since the beginning of a transaction ?

 
 
 
 

62. Dijkstra’s Banker’s Algorithm is used for:

 
 
 
 

63. Which of the following substitution technique have the relationship between a character in the plaintext and a  character in the ciphertext as one -to-many?

 
 
 
 

64. What is best method of go for the game playing problem?

 
 
 
 

65. Perception of size  by human eye depends upon :

 
 
 
 

66. Consider the following schedules involving two transactions :

S1 : r1(x); r1(y); r2(x); r2(y); w2(y);w1(x)

S2 : r1(x);r2(x);r2(y);w2(y); r1(y);w1(x)

 
 
 
 

67. During Execution how many interrupts are made per block ?

 
 
 
 

68. Which of the following addressing modes are suitable for program relocation at run time ?

i      Absolute Addressing

ii    Based Addressing

iii   Relative Addressing

iv   Indirect Addressing

 
 
 
 

69. Consider the declaration:
char street[10] =”abcdefghi”

Choose the correct remarks:

 
 
 
 

70. Scheduling of threads are done by :

 
 
 
 

71. On a Monochromatic monitor,the frame is known as ………….

 
 
 
 

72. Which of the following protocol is used in E-mail server?

 
 
 
 

73. A Sender is employing public key cryptography to send a secret message to a receiver. Which one of the following statements is True ?

 
 
 
 

74. Suppose each set is represented as a linked list with elements in arbitrary order. which of the operations among union, intersection , membership, cardinality with be the slowest ?

 
 
 
 

75. Write an Example for non-emissive display:

 
 
 
 

76. The Complexity of Binary Search Algorithm is :

 
 
 
 

77. Which of the following is not a loosy compression technique?

 
 
 
 

78. In 3G network, W-CDMA is also known as UMTS . The Minimum specturm allocation required for W-CDMA is …..

 
 
 
 

79. Which of the following statement is/are True for an Undirected graph?

P : Number of odd degrees of all vertices is even

Q: Sum of degrees of all vertices is even

 
 
 
 

80. The …………..memory style is known as an Error correction Code (ECC) Organization , Which employs parity bits .

 
 
 
 

81. Which of the following string algorithms can be used sort a random linked list with minimum time complexity?

 
 
 
 

82. Which one of the following is an application of Queue Data Structure?

 
 
 
 

83. Controlling Access to a network by analyzing the incoming and outgoing packets is called:

 
 
 
 

84. Which of the following are used to generate a message digest by the  network security protocols?

P : RSA

Q : SHA-1

R : DES

S : MDS

 
 
 
 

85. What are the following sequence of steps taken in designing a fuzzy logic machine ?

 
 
 
 

86. Structured English is used :

 
 
 
 

87. If user A wants to send an encrypted message to uses B. The plaintext of A is encrypted with the ……

 
 
 
 

88. When a process is accessing shared modifiable data,the process is said to be in :

 
 
 
 

89. If x=5 , y=2 then x^y equals…………..(Where ^ is a bitwise XOR operator)

 
 
 
 

90. What is the return type of  malloc() or calloc()?

 
 
 
 

91. Consider the fractional knapsack instance n=4,(p1,p2,p3,p4)=(10,10,12,18),(w1,w2,w3,w4)=(2,4,6,9) and M=15. The maximum profit is given by (Assume p and w denotes profit and weight of objects respectively)

 
 
 
 

92. the Data block of a very large file in the UNIX file system are allocated using:

 
 
 
 

93. What is the value of x=4+2%-8?

 
 
 
 

94. What is the use of Ping Command ?

 
 
 
 

95. Which of the following device is used to connect two systems , especially if the system use different protocols?

 
 
 
 

96. Which of the following specifies the action required to correct defects in the current design of the database?

 
 
 
 

97. A Sender is employing public key cryptography to send a secret message to a receiver. Which one of the following statements is True ?

 
 
 
 

98. Find the false statement

 
 
 
 

99. Which language necessarily need heap allocation in the runtime environment ?

 
 
 
 

100. The Maximum Speed of LAN (Local Area Network) is:

 
 
 
 

Question 1 of 100

Leave a Reply

Your email address will not be published. Required fields are marked *