Sie sind auf Seite 1von 10

1. Which of the following is the protocol data unit (PDU)for the application layer in the Internet stack?

A. Datagram
B. Frame
C. Segment
D. Message

Ans. D.

2. Which of the following protocols provides a connection-oriented reliable service for sending messages?
A. IP
B. All of the mentioned
C. UDP
D. TCP

Ans: D.

3. Given : Edge weighted graph , Starting vertex A as a source.

If we use Dijkstra’s single –source shortest path algorithm, in what order do the nodes get included into the set of
vertices for which the shortest path distances are finalized?

A. A, B, C, F, E, D
B. A, B, C, D, E, F
C. A , B, C, F, D, E
D. A , B, E, C, F, D

Ans 3. C

4. A program P reads 500 integers in the range [0,100]representing the scores of 500 students . It then prints the
frequency of each score above 50. What would be the best way for P to store the frequencies?
A. An array of 500 numbers
B. An array of 50 numbers
C. A dynamically allocated array of 550 numbers
D. An array of 100 numbers

Ans. B
5. If optimal page replacement technique is used , then what will be the difference between the hits of memory
with 4 and 3 frames respectively?(Assume initially frames are empty)
Given page reference string: 7,6,5,4,7,6,8,7,6,5,4,8
A. 2
B. 1
C. 3
D. 0

ANS:- B

6. Consider a system having ‘n’ resources of the same type. These resource are shared by 3 processes A,B and
C which have peak demands of 3,4 and 6 respectively. For what value of ‘n’ deadlock will not occur?
A. 10
B. 13
C. 9
D. 7

Ans. B

7. Determine the number of page faults when reference to page occur in the order – 1,2,3,4,1,2,5,1,2,3,4,5. Assume
page frame size is 3 and at present main memory has no page and system is using LRU algorithms.
A. 11
B. 8
C. 10
D. 9

Ans:- A

8. A process executes the following code

For (i= 0; I < 15; i++) fork();

The total number of child processes created is

A. 32876
B. 32767
C. 30
D. 28534

Ans. B

9. Translation look aside buffer(TLB) is used by a paging schema. The main memory access takes 50ns and a
TLB access takes 10ns. What is the effective access time (in ns) if the TLB hit ratio 90% and there is no page
fault?
A. 84 ns
B. 78 ns
C. 54 ns
D. 65 ns
Ans. D

10. Consider following given algorithm and identify the task performed by this.

1.

bstree (*tree)

while ((tree-> left !=nu 11) && (tree -> right ! = nu11))

if (tree -> left < tree - > root)

7. bstree (tree-> left);

8. else

9. return(1);

10. if (tree->right >tree-> root)

11. bstree(tree -> right );

12. else

13. return(1)

14. }

15. return (0);

16. }

A. Prim’s algoritm

B. Tests whether a Binary Tree is a Binary search Tree

C. None of the mentioned options

D. Bubble sort

Ans:- B

11. Suppose you have two sorted arrays , S1, and S2. The idea is to get a single array that merges the value of S1 and
S2, but final merged data should also be sorted. The algorithm first takes the left most elements from S1 and S2,
compares and writes the least of them into a third array. This step continues until one of the arrays S1 or S2 is
exhausted. After which , the remaining elements from the unexhausted array is written to the third array.

If this algorithm takes a time complexity of O(n), then what is ‘n’?

A. Length of S1
B. Length of S2
C. The maximum of the length of S1 or S2
D. None of the mentioned options

Ans:- C

12. Consider an algorithm that tries to sort an array S[11]by comparing the elements of the array. Following are the steps
involved:
I) Compare S[1]and S[11]
II) If S[1] <S[11], then sort S[1.. 5] by Step I
III) Sort S[7 .. 11]
IV) Merge S[1.. 6] and S[7 .. 11] into another array.
What is the time complexity of the above algorithm?

A. O(n)
B. O(log n)
C. O(n logn)
D. O(n2)

Ans;- C

13. In an IPv4 packet , the value of the total length field is 0×0028 and the value of HLEN is 5. The number of bytes of
data is being carried by this packet is:
A. 40
B. 18
C. 58
D. 20

Ans: A

14. Which of the following is true about Terminal?


A. It is a device that gives power supply to a computer.
B. It is an input / output device.
C. It is the last instruction is a program.
D. It is a point at what data enters or leaves the computer.

Ans: D

15. What of the following conditions should be satisfied by G(x) to detect the odd number of bits in error?

(G(x) is the generator polynomial used for CRC checking)

A. G(x)does not divide 1+xk, for any k not exceeding the frame length
B. G(x)contains more than two terms
C. 1+x is a factor of G(x)
D. G(x) has an odd number of terms.

Ans: C.

16. Which of the following might be the issue if a protocol specifies that should be sent at 100 Mbps?
A. Semantics
B. Timing
C. Syntax
D. It is usual, no issue

Ans: B

17. What is the use of spanning tree algorithm for bridge-routing?


A. To avoid loops in the routing paths
B. For fault tolerance
C. To minimize the collisions
D. To calculate the shortest path routing between LANs

Answer:- A

18. The transmission speed is 107 bps and the propagation speed is 200 meters/ ʯ sec in a token ring network. The 1-
bit delay in this network is equivalent to:
A. 200 meters of cable
B. 50 meters of cable
C. 500 meters of cable
D. 20 meters of cable

Ans: D

19. In Microsoft Windows Operating System, the size of the virtual address space varies for each hardware platform.
A. FALSE
B. Question too ambiguous
C. Depends
D. TRUE

Ans: D

20. Which of the following are considered as Microsoft Live ids?


A. Hotmail.com
B. Outlook.com
C. Live.com
D. All of these

Ans: D

21. Which of the following is the latest released version of windows Phone Operating System:
A. Windows Phone 7.5
B. Windows Phone 8
C. Windows Phone 8.1
D. Windows Phone 8.2
Ans: C

22. In the example “Microsoft.com”. , which of the following statement is right?


A. “Microsoft.com.” represents the second level domain D
B. “.com” represents the Top Level Domain
C. All of these
D. “.” represents the root domain

Ans: C

23. Which of the following products of Microsoft is used as a database server?


A. Microsoft Exchange Server
B. Microsoft Access Server
C. Microsoft SQL Server
D. Microsoft Database Server

Ans: C

24. Which of the following modules gives control of the CPU to a process selected by the short-term scheduler?
A. None of the mentioned options
B. Dispatcher
C. Scheduler
D. Interrupt handler

Ans: B

25. Which among the following scheduling policy is most suitable for a time- shared operating system?
A. First – Come –First-Serve
B. Elevator
C. Shortest-job First
D. Round- Robin

Answer :- D .

26. To backup the Active Directory database, you need to have all the AD services in a stopped state.
A. False
B. True

Ans: B

27. __________ in AD DS represent the physical structure , or topology, of your network.


A. None of these
B. Links
C. Sites
D. DNS

Ans: C

28. A definition of every type of object in the Active Directory is stored in the:
A. Database
B. Schema
C. OU
D. All of these

Ans: D

29. Which is the snap-in that you can use to administer the replication of directory data among all sites in an Active
Directory Domain Services (AD DS) forest?
A. Active Directory Trusts and Services
B. Active Directory Site and Services
C. Active Directory Replication Manager
D. Any of these

Ans: B

30. With appropriate permissions, you can create groups in which of the following locations?
A. Root Domain in the forest
B. In any OU
C. All of these
D. Local or any other domain in the forest

Ans: C

31. In Active Directory ,-------------------------is a general purpose container that can be used to group most other classes
together for administrative purposes.
A. Domain
B. Forest
C. Organizational Units
D. Tree

Ans: C

32. GC in a Active Directory stands for:


A. Global Catalog
B. Garbage collection
C. Group collection
D. None of these

Ans: A
33. A------------------------- is a domain controller that stores thes writable directory partitions, as well as a partial, read-
only copy of all other domain directory partitions in the forest.
A. Primary Domain Controller
B. Global Catalog
C. Read only Domain Controller
D. Domain Naming Master

Ans: B

34. What is the name of the snap-in that can be used to manage trusts in Active Directory?
A. Active Directory Trust Management Tool
B. Active directory Trust Editor
C. Any of these
D. Active Directory Domain and Trusts

Ans: D

35. All partitions of an Active Directory is stored in a file called:


A. Active Director y. db
B. None of these
C. ad. edb
D. Ntds.dit

Ans: D

36. The full path of an object in Active Directory is defined by:


A. Display name
B. Commonname
C. Distinguished name
D. FullPath

Ans: C

37. RPC stands for:


A. Remote Process Client
B. Remote Procedure Call
C. Remote Process Call
D. Remote Process Computer

Ans: B

38. All Active Directory trusts between domains within a forest are transitive, two- way trusts.
A. False
B. True

Ans: B
39. Which of the following are Forest –Wide Operations Master Roles?
A. Domain Naming Master
B. RID Master
C. PDC Emulator Master
D. Schema Master

Ans: Both A,D

40. Which of the following are examples of components of a logical structure of Active Directory?
A. Organizational Units
B. All of these
C. Domain Trees
D. Domains

Ans: B

41. Which of the following best describes the DHCP lease process?
A. Discover, Request, Offer, Accept
B. Request, Discover, Offer, Accept
C. Request, Accept, Acknowledge, save
D. Discover, Offer, Request, Acknowledge

Ans: D

42. Organizational Units can further contain more organizational Units


A. False
B. True

Ans: B

43. The first domain that is installed in the Active Directory Forest is referred as:
A. Key Domain
B. Forest Domain
C. Primary Domain
D. Root Domain

Ans :D

44. Smallest scope to which Group Policy setting can be assigned is:
A. None of these
B. Forest
C. Domains
D. Organizational Units
Ans: D

45. Microsoft’s implementation of a Directory Service is called:


A. Microsoft Directory Server
B. Microsoft Active Directory
C. Microsoft Domain Services
D. None of these

Ans: B

Das könnte Ihnen auch gefallen