Sie sind auf Seite 1von 4

NIRAL 2012

DEPARTMENT OF IST, DIVISION OF M.C.A ANNA UNIVERSITY, CHENNAI

TECHWRINGER
Duration: 20 MINS. Marks : 70 Niral ID: Name: College Name:

Rules:
1. Q.1 25 are normal questions and carry 2 marks each. For each wrong answer 1 mark will be deducted. 2. Q.26 30 are star questions and carry 4 marks each. No negative markings if these questions are wrongly answered. 3. Shade the most appropriate option(s) clearly in the answer sheet provided. 4. If extra options are shaded, the answer will be considered to be wrong. 5. For questions with no options, write down the question number followed by the right answer on the reverse of the answer sheet.

1. What is the maximum file size in NTFS file system? (a) 4 TB (b) 8 TB (c) 16 TB

(d) 32 TB

2. For a database relation R(a,b,c,d) where the domains of a, b, c and d include only atomic values, only the following functional dependencies and those that can be inferred from them hole A -> c B -> d The relation is in (a) first normal form but not in second normal form (b) second normal form but not in second normal form (c) third normal form (d)none of the above
3. By what mechanism does the global.asa file permit you to run code when your application

and session start or finish in ASP? (a) Global parameters (b) Scope settings

(c) Cookies

(d) Events

4. Which of the following gates is known as coincidence detecter? (a) AND gate (b) OR gate (c) NOT gate

(d) NAND gate

5. System programs such as compiler are designed so that they are (a) Re-enterable (b) non-reusable (c) serially usable

(d) recursive

6. A data dictionary is a special file that contains (a) The names of all fields in all files (b) the data types of all fields in all files (c) The width of all fields in all files (d) all of these
7. Which of the following is NOT true of deadlock prevention and deadlock avoidance

schemes? (a) In deadlock prevention, the request for resources is always granted if the resulting state is safe (b) In deadlock avoidance, the request for resources is always granted if the resulting sate is safe (c) Deadlock avoidance is less restrictive than deadlock prevention (d) Deadlock avoidance requires knowledge of resource requirements a priority 8. Given the functional dependencies X -> W; X -> Y; Y -> Z and Z -> PQ Which of the following does not hold good? (a) X-> Z (b)W -> Z (c) X -> WY (d)None of the above 9. The amount of uncertainty in a system of symbol is called (a) Bandwidth (b) Entropy (c) Loss

(d) Quantum

10. What is the name of network architecture that was developed by IBM (a) SNA (b) DECNET (c) XNS (d) Novell 11. Let R=(A,B,C,D,E,F) be a relation scheme with the following dependencies : C->F, E->A, EC->D, A->B Which of the following is a key for R? (a) CD (b) EC (c) AE (d) AC
12. Which one is not part of the web services?

(a) XML

(b) HTTP

(c) DHCP

(d) SOAP the

13. How many digits of the DNIC (Data Network Identification Network) identify

country? (a) First two

(b) first three

(c) first four

(d) first five

14. In a broad sense, railway track is an example of

(a) simplex

(b)half-duplex

(c)full-duplex

(d)all of the above

15. The metadata is created by the (a) DML compiler (c) DDL interpreter

(b) DML pre-processor (d) Query interpreter

16. What function in VBScript can be used to determine whether an object exits?

(a) IsObject(objectname) (c) IsNull(objectlocation)

(b) Object(nameofobject) (d) None of the above

17. Error detection at the data link level is achieved by?

(a) bit stuffing (c).Hamming codes

(b)cyclic redundancy codes (d)equalization

18. The five items: A, B, C, D and E are pushed in a stack, one after the other starting from A.

The stack is popped four times and each element is inserted in a queue. Then two elements are deleted from the queue and pushed back on the stack. Now one item is popped from the stack. The popped item is (a) B (b) C (c) D (d) E 19. In a binary max heap containing n numbers, the smallest element can be found in time (a) O (n) (b) O (logn) (c) O (loglogn) (d) O (1) 20. What is the file extension for a Web service? (a).asm (b).wss
21. What is the expansion of WCF?

(c).axs

(d).dws

(a)Web Configuration File (c)Web Control Features

(b)Windows Communication Foundation (d)None of the above

22. What is the output of printf(hello world+printf(world)); 23. A process executes the following code for(i=0; i<n ; i++) fork(); The total number of child processes created is (a) n (b) 2n - 1

(c) 2n

(d) 2n+1 -1

24. Functional dependencies are a generalization of (a) Key dependencies (b) relation dependencies

(c) Database dependencies

(d) none

25. How many 3-to-8 line decoders with an enable input are needed to construct a 6-to-64 line decoder without using any other logic gates ? (a) 7 (b) 8 (c) 9 (d) 10
26. *In a paged memory, the page hit ratio is 0.35. The time required to access a page in

secondary memory is equal to 100 ns. The time required to access a page in primary memory is 10 ns. The average time required to access a page is (a) 3.0 ns (b) 68.0 ns (c) 68.5 ns (d)78.5 ns 27. The decimal equivalent of the hexadecimal number E5 is ________
28. *In a token ring network the transmission speed is 107 bps and the propagation speed is 200

meters/s . The 1 bit delay in this network is equivalent to how many meters of cable? (a) 500 (b) 200 (c) 20 (d) 50
29. *Consider the schema R=(S, T, U , V) and the dependencies S->T, T-> U, U-> V and V-> S .

Let R= (R1 and R2) be a decomposition such that R1R2= . The decomposition is (a) not in 2NF (b) in 2NF but not in 3NF (c) in 3NF but not in 2NF (d) in both 2NF and 3NF
30. *Consider the following c function:

int f(int n){ static int r=0; if(n<=0) return 1; if(n>3) { r=n; return f(n-2) +2; } return f(n-1) + r; } What is the value of f(5) (a) 5 (b) 7

(c) 9

(d) 18

Das könnte Ihnen auch gefallen