Beruflich Dokumente
Kultur Dokumente
TECHWRINGER
Duration: 20 MINS. Marks : 70 Niral ID: Name: College Name:
Rules:
1. Q.1 25 are normal questions and carry 2 marks each. For each wrong answer 1 mark will be deducted. 2. Q.26 30 are star questions and carry 4 marks each. No negative markings if these questions are wrongly answered. 3. Shade the most appropriate option(s) clearly in the answer sheet provided. 4. If extra options are shaded, the answer will be considered to be wrong. 5. For questions with no options, write down the question number followed by the right answer on the reverse of the answer sheet.
1. What is the maximum file size in NTFS file system? (a) 4 TB (b) 8 TB (c) 16 TB
(d) 32 TB
2. For a database relation R(a,b,c,d) where the domains of a, b, c and d include only atomic values, only the following functional dependencies and those that can be inferred from them hole A -> c B -> d The relation is in (a) first normal form but not in second normal form (b) second normal form but not in second normal form (c) third normal form (d)none of the above
3. By what mechanism does the global.asa file permit you to run code when your application
and session start or finish in ASP? (a) Global parameters (b) Scope settings
(c) Cookies
(d) Events
4. Which of the following gates is known as coincidence detecter? (a) AND gate (b) OR gate (c) NOT gate
5. System programs such as compiler are designed so that they are (a) Re-enterable (b) non-reusable (c) serially usable
(d) recursive
6. A data dictionary is a special file that contains (a) The names of all fields in all files (b) the data types of all fields in all files (c) The width of all fields in all files (d) all of these
7. Which of the following is NOT true of deadlock prevention and deadlock avoidance
schemes? (a) In deadlock prevention, the request for resources is always granted if the resulting state is safe (b) In deadlock avoidance, the request for resources is always granted if the resulting sate is safe (c) Deadlock avoidance is less restrictive than deadlock prevention (d) Deadlock avoidance requires knowledge of resource requirements a priority 8. Given the functional dependencies X -> W; X -> Y; Y -> Z and Z -> PQ Which of the following does not hold good? (a) X-> Z (b)W -> Z (c) X -> WY (d)None of the above 9. The amount of uncertainty in a system of symbol is called (a) Bandwidth (b) Entropy (c) Loss
(d) Quantum
10. What is the name of network architecture that was developed by IBM (a) SNA (b) DECNET (c) XNS (d) Novell 11. Let R=(A,B,C,D,E,F) be a relation scheme with the following dependencies : C->F, E->A, EC->D, A->B Which of the following is a key for R? (a) CD (b) EC (c) AE (d) AC
12. Which one is not part of the web services?
(a) XML
(b) HTTP
(c) DHCP
13. How many digits of the DNIC (Data Network Identification Network) identify
(a) simplex
(b)half-duplex
(c)full-duplex
15. The metadata is created by the (a) DML compiler (c) DDL interpreter
16. What function in VBScript can be used to determine whether an object exits?
18. The five items: A, B, C, D and E are pushed in a stack, one after the other starting from A.
The stack is popped four times and each element is inserted in a queue. Then two elements are deleted from the queue and pushed back on the stack. Now one item is popped from the stack. The popped item is (a) B (b) C (c) D (d) E 19. In a binary max heap containing n numbers, the smallest element can be found in time (a) O (n) (b) O (logn) (c) O (loglogn) (d) O (1) 20. What is the file extension for a Web service? (a).asm (b).wss
21. What is the expansion of WCF?
(c).axs
(d).dws
22. What is the output of printf(hello world+printf(world)); 23. A process executes the following code for(i=0; i<n ; i++) fork(); The total number of child processes created is (a) n (b) 2n - 1
(c) 2n
(d) 2n+1 -1
24. Functional dependencies are a generalization of (a) Key dependencies (b) relation dependencies
(d) none
25. How many 3-to-8 line decoders with an enable input are needed to construct a 6-to-64 line decoder without using any other logic gates ? (a) 7 (b) 8 (c) 9 (d) 10
26. *In a paged memory, the page hit ratio is 0.35. The time required to access a page in
secondary memory is equal to 100 ns. The time required to access a page in primary memory is 10 ns. The average time required to access a page is (a) 3.0 ns (b) 68.0 ns (c) 68.5 ns (d)78.5 ns 27. The decimal equivalent of the hexadecimal number E5 is ________
28. *In a token ring network the transmission speed is 107 bps and the propagation speed is 200
meters/s . The 1 bit delay in this network is equivalent to how many meters of cable? (a) 500 (b) 200 (c) 20 (d) 50
29. *Consider the schema R=(S, T, U , V) and the dependencies S->T, T-> U, U-> V and V-> S .
Let R= (R1 and R2) be a decomposition such that R1R2= . The decomposition is (a) not in 2NF (b) in 2NF but not in 3NF (c) in 3NF but not in 2NF (d) in both 2NF and 3NF
30. *Consider the following c function:
int f(int n){ static int r=0; if(n<=0) return 1; if(n>3) { r=n; return f(n-2) +2; } return f(n-1) + r; } What is the value of f(5) (a) 5 (b) 7
(c) 9
(d) 18