Sie sind auf Seite 1von 7

1.

when a subroutine is called, the address of the instruction following the CALL instructions stored
in/on the stack

2. An instruction used to set the carry flag in a computer can be classified as logical

3. In a microprocessor system the RST instruction will cause an interrupt only if interupt has been
enabled by an EI instruction

4. Table that list inputs for required change of state is called excitation state

5. In positive logic,

a. high=1,low=0 b. low=1,high=0 c. only highs are present d. only lows are present

6. The techniques which move the program blocks to or from the physical memory is called as paging

7. A set of physical addresses is know as memory space

8. flip flops can be constructed with to NAND gates

9. x=1010100 and y=1000011 using 2’s complement x-y is ___

a.10111 b. 101101 c. 10011 d.10001

10. At start of lamp handball game, ball is placed at ___

a. top b. left c. bottom d. right

11. The virtual memory basically stores the next segment of data to be executed on the disks

12. Subtracted also have output to check if one has been

a. complement b. borrowed c. shifted d. primed

13. 9’s complement of 546700 is _____

a. 453299 b.453399 c. 543399 d. 543299

14. Convert binary 111111110010 to hexadecimal

a. EE2 16 B. FF2 16 C. 2FE 16 D.FD2 16

15. Assembly language use alphabetic codes in place of binary numbers used in memory language

16. which of the following is possible operation performed by this sequence initiation of interrupt
service

17.

18. Simplified expression of half adder carry is ____

a. C=XY+X b. C=Y+X c. C=XY+Y d. C=XY

19. Interrupts form an important part of ____ system.


20. Simplest registers only consists of flip fop

21. ____ keeps 2 sets of vertices : S the set of vertices whose shortest parts from the source half already
been determined and B-S the remaining vertices.

a. Kruskl’s algorithm b. Prim’s algorithm c. dijkstri algorithm d. bellnan ford algorithm

22.

23. Each data item in a record may be a group item composed of sub items ; those items which are in
decomposable are called _____.

a. elementary items b. atoms c. scalars d. all of the above

24. Prim’s algorithm follows linear search.

25. In which linked List nodes in the form of ring?

a. singly linked list b. doubly linked list c. circular linked list d. linked stack

26. Which of the following is not a method of the thread class?

a. public void exit() b. public void run() c. public void start() d. public final int getPriority()

27. Which among the following pairs of operations is supported by an array ADT.

a. store and retrive b. insert and delete c. copy and delete d. append and copy

28. match the following

1. bubbled sort a. O(n)

2. shell sort b. O(n^2)

3. selection sort c. O(n log n)

Options… 1) 1-a 2-b 3-c

2) 1-b 2-c 3-a

3) 1-a 2-c 3-b

4) 1-b 2-a 3-c

29. A binary tree whose every node has either 0 or 2 children is called binary search tree

30. Run time polymorphism can be achieved by

a. accessing virtual function through the pointer of base class b. by accessing virtual function through
the object c .both a and b

31. In a graph if e=[u,v] then u and v are called ____

a. n points of e b. adjacent c . neighbours d .all of the above.


32.

33. Which of the following is not an application of stack _____

a. evaluation of police notation

b. tower of hanoi

c. stack machine

d. none

34. pop is the term used to delete an element from the stack

35. consider the following tree with 9 nodes , root=14, children(14) =2,11 , children(2) = 1,3 ,
children(11) = 10,30 , children(3) = 7, children(10) = 40 . how many decends does the root have?

a. 2 b.4 c.8 d.9

36. A tree having any number of nodes is___.

37. Answer of following postfix expression : 2,3,10+*8,2/-

a. 20 b. 22 c.23 d. 25

38. what is the output of this program?

#include<iosream>

Using namespace std;

Int main()

Int arr[]= {4,5,6,7};

Int*p = (arr+1);

Cout<<*p;

Return 0;

a. 4 b.5 c. 6 d. 7

39. who is considered as the creator of java james gosling

40. What is the value of ‘number’ after the following code fragment execution

Int number=0;

Int number2 =12;


While(number<number2)

Number= number+1;

a. 5 b. 12 c. 21 d. 13

41. A____ is an explicit numeric, character , string or Boolean value not represented by an identifier

a. comments b. literals c. delimiters d. identifiers

42. problems occurs if we don’t implement proper locking strategy

a. dirty reads b. phantom reads c. lost updates d. unrepeatable reads

43. the name of the transaction file shall be provided by the operator and the file that contains the
editor transactions ready for the execution shall be called opt.exe

44. If transactions t1 gets an explicit lock on the file Fc in exclusive mode then it has an implicit lock in
exclusive mode on all the record belonging that file.

45. conservative 2PL is the deadlock free lock .

46. Which of the following indicates the maximum number of entities that can be involved in a
relationship ____

a. minimum cardinality b. maximum cardinality c. ERD d. greater entity count

47. Which forms simplifies and ensures that there is a minimal data aggregates and repetitive groups

a. 1NF b. 2NF c. 3NF d. all of the mentioned

48. A table can be logically connected to another table by defining a common attribute

49. We indicate roles in ER diagrams by labeling the lines that connect diamond to rectangle

50. Functional dependencies are the types of constraints that are based on key.

51. When transaction ti request a data item currently held by tj . ti is allowed to wait only if it has a time
stamp larger than that of tj , otherwise tj is rolled back . This is ______

a. weight-die b. weight-wound c. wound- weight d. weight


52. String literals is a sequence of 0 or more characters enclosed by single quotes.

53. A primary key is combined with a foreign key creates parent-child relationship between the
tables that connect them.
54. An attribute in relation is a foreign key if the primary key from one relation is used as an attribute
in that relation.
55. If an transaction is performed in a database and committed the changes are taken to the previous
state of transaction by rollback

56. The situation where the lock weights only for a specified amount of time for another lock to be
released is lock timeout

57. isolation means that data used during the execution of a transaction cannot be used by a second
transaction until the first one is completed.

58. A transaction is delimited by statements of the form begin transaction and end transaction

59. A line of PL/SQL text contains groups of characters known as lexical units

60. Isolation of the transactions is ensured by concurrency control

61. dining philosophers problem is a classic synchronization problem that involves the allocation of
limited resources amongst a group of processes in a dead lock free and starvation free manner.

62.

63. Which of the following network devices or systems translates data from one format to another.

a. hub b. DHCP Server c. GATEWAY d. NIC

64. The data on a DVD is held in the form of small pits and bumps on the disk.

65. program counter holds the address of the next instruction to be executed .

66. Which Router command allows you to give the entire contents of all access list show access-lists

67. Page table level that says if page has being modified is know as dirty

68. What is the maximum number of IP addresses that can be assigned to host on a local submit that
uses the 255.255.255.224 submit mask?

a. 60 b. 30 c. 15 d. 14

69. First come First serve is non-preemptive scheduling

70. The synchronous modems are more costly than the asynchronous modems because they contain
clock recovery circuits
71. Which of the following devices takes data send from one network device and forwards it to all
devices on the network regardless of the intended recipient.

a. DNS server b. SWTICH c. HUB d. GATEWAY

72. Which of the following field on the TCP header tells how many bits may be send starting at the bit
acknowleged?
a. TCP header length b. window size c. acknowledgement number d. urgent pointer
73. what is route poisoning?

74. The operating system creates virtual computers from the physical computer .

75. system calls provides an interface between the process and the operating system.

76. Which of the following is a scheduling algorithm that allows a process to move up and down
between queues ?

a. round robin scheduling b. FCFS scheduling c. multi level feedback queue scheduling d.
shortest job first scheduling

77. Sometimes the over head of keeping track of a hole might be larger than the hole itself

78. You have 10 users plugged into a hub running 10mbps half duplex .There is a server connected to
them switch running 10 mbps half duplex as well . How much bandwidth does each host have to the
server ?

a. 100kbps b. 10mbps c. 1 mbps d. 2 mbps

79. CPU fetches the instruction from memory according to the value of program counter

80. Interrupt latency should be ______ for real time operating systems.

a. minimal b. maximum c. zero d. none of the above


81. prototyping techniques include the use of very high level languages , database programming and
prototype construction from reusable components .

82. component based approach is an industrialized approach to software development

83. The measure of the average length of words and sentences in documents is termed as fox index

84. In top down testing start with high level system and integrate from the top down replacing individual
components stubs where appropriate.

85. evolutionary prototype acknowledges that we don’t understand all the requirements and build only
those that are well understood.

86. system testing involves executing the system with test cases that are derived from the specification
on the real data to be processed by the system.

87. architectural models show the system and its relationship with other systems.

88. Inheritance is the property of object oriented systems that allows objects to be built from other
objects

89. The SRS is set to be consistent if and only if every requirement started there is verifable
90. software should not make wasteful use of system resources is termed as efficiency

91. functional requirements describe system services or functions.

92. view point are responsible for producing or consuming data

93. objects classes are rectangles with the name at the top attribute in the middle section and
operations In the bottom section.

94. project risk affect schedule or resources.

95.____ are expressed in a mathematical notation with precisely defined vocabulary , syntax and
semantics.

96. Which of the following property does not correspond to a good software requirements
specifications?

a. a verifiable b. complete c. ambiguous d. traceable

97. prototyping is an important techniques of coding

98. The context diagram is also know as LEVEL-0 DFD

99. which one of the following is not a step of requirement engineering?

a. elicitation b. design c. analysis d. documentation

100. COMPOSITION model shows how entities are composed of other entities