Sie sind auf Seite 1von 3

1. Shortest propagation delay is generated by Ans.: ECL (Emitter Control Logic) 2. In Unix, kernel is used during while Ans.

:*Reading a file *Pressed key *Resource allocation 3. Find out the post fix of the given pre fix expression *+pq-rs Ans.: pq+rs-* 4. The topology used in Campus Area Network(CAN) is Ans.: FDDI ring. 5. Wi-Fi standard is Ans.: 802.11a 6. A Destructor takes how many arguments. Ans.: Zero arguments. 7. Use of Digital Differential Analyzer(DDA) Algorithm in computer graphics. Ans.: DDA is a Line drawing and scan conversion algorithm 8. What is a tree. Ans.: A graph 'G' with n-1 edges is a tree. A tree is generally connected, cycle free. 9. 2-D arrays are also called as Ans.: Matrix/Table arrays. 10. What is the use of sniffer. Ans.: Sniffer monitors data travel on a network. 11. The objects that are shared by application in Windows. Ans.: COM (Component Object Model) 12. What is the difference between Random scan and Raster scan. Ans.: Random scan draws a picture one line at a time. Raster scan draws a picture on screen at a time.(Draws whole picture at a time) 13. Essential hazards generally occur in. Ans.: Toggle circuit and Asynchronous circuit 14. Work of Session layer. Ans.: Name Recognition, dialog control, synchronization, security. 15. Congestion controller in networking is Ans.: Network Layer 16. Problems in computer security is mostly caused by Ans.: Ever increasing DOS attacks. 17. TTL token pole circuit is used for Ans.: Voltage regulation 18. What are Network support layers Ans.: Physical layer Data link layer Network layer

Transport layer 19. What are User support layers. Ans.: Session layer Presentation layer Session layer 20. Logical Link Control(LLC) standard is Ans.: 1EEE 802.2 21. Type 0 grammar also called as Ans.: Unrestricted grammar 22. Verification and validation are components of Ans.: Software Quality Assurance. 23. Application of function point analysis Ans.: It is used to estimate and measure size of software. 24. Activity diagrams are used to Ans.: Express relation between systems and sub-system. 25. GSM (Global System for Mobile Communication) supports Ans.: TDMA (Time Division Multiplex Access). 26. Extract and Load data process in data warehousing is done by Ans.: Load Manager 27. Line code is used to. Ans.: Convert digital data into digital signal 28. Expand FURPS Ans.: F-Functionality U-Usability R-Reliability P-Performance S-Support ability 29. Asynchronous Transfer MODE (ATM) has how many bytes. Ans.: 53 bytes Note: Header of ATM is 5 bytes. Also called as cell relay. 30. Serial to parallel processing is done by Ans.: De-multiplexer. 1. What is the difference between specialization and generalization. Specialization is a top-down process. Generalization is a bottom-up process. 2. Who is an identifying owner. The entity type on which weak entity type depends is called as an identifying ow ner. 3. What are the rules of a completeness constraint. Super type, sub type. 4. An embedded printer provides An inserted index.

5. Analysis of large database to retrieve information is called as OLAP (Online Analytical Processing) 6.. The end of a sql command is denoted by Semicolon(;) 7. A function that has no partial functional dependencies is in which normal for m. 3NF 8. Highest noise margin is offered by TTL (Transistor-transistor logic) 9. Parallel to serial processing is done by Multiplexer 10. ANSI X.12 belongs to which standard. EDI 11. Link analysis operation in data mining makes use of Association discovery technique 12. Bluetooth uses which transmission media. Radio links. 13. What is meant by downflow in data warehouse It is the process of archiving and backup of data in warehouse. 14. Which synchronizes critical resources to prevent deadlock. Semaphores. 15. The memory allocation schema subjected to external fragmentation is Segmentation. 16. Top down parsers are called as predictive parsers because The next lower level of the parse tree is predicted. 17. Which level is called as "Managed" in capability maturity model Level 2 Note: Level Level Level Level Level 1: 2: 3: 4: 5: Initial Managed Defined Quantitatively managed Optimizing

18. What is an external error. An error whose cause cannot be identified anywhere within the software system. 19. The term "Black" in Black box testing denotes that The design is hidden. 20. CASE tool and RAD tools are used during System analysis stage of System Development Life cycle. http://www.netugc.com/

Das könnte Ihnen auch gefallen