22
bsc4success.com Downloaded From: http://bsc4success.com IT OFFICER MCQs 1. Which of the following is a functionally complete gate? 1) AND 2) OR 3) NAND 4) NOT 5) None of these 2. The XYZ bank Gujarat branch has all Cisco routers connected in the network. The network administrator Robert had replaced one of the routers with a nonCisco router. He then configured PPP encapsulation on a Cisco router to enable communication between them. Now, he wants to set HDLC back as the default protocol on the Cisco router. Which of the following combinations will he use? I. Interface serial [module_0/1] port_l and encapsulation hdlc. II. Interface type [slot_2] port_l and encapsulation PPP. III. Interface type [slot_2] port_l and encapsulation ppp and ppp pap sent-username jack password system 1) III 2) II 3) I 4) I and II 5) None of these 3. FDDI is 1) Ring Network 2) Star Network 3) Mesh Network 4) Bus based Network 5) None of these 4. Time sharing 1) Round Robin scheduling 2) Priority scheduling 3) First come First served 4) Non preemptive scheduling 5) None of these 5. Banker’s Algorithm is used as 1) Deadlock occurrence method 2) Deadlock avoidence method 3) Deadlock detection method 4) Deadlock recovery method 5) None of these 6. Which of the following communications lines is best suited to interactive processing applications? 1) narrow band channel 2) simplex lines 3) full duplex lines 4) mixed band channels 5) None of these 7. Which of the logic family has the lowest power delay product 1) ECL 2) TTL 3) IIL 4) MOS 5) None of these 8. What is the output of the following C program main () { int i = 32, j = 0 × 20, k, l, m; K = i / j; l = i & j; m = k ^ l; print f(“%d%d%d%d”, i, j, k, l, m); 1) 32 32 32 32 0 2) 0 0 0 0 0 3) 32 32 32 32 32 4) 32 0 32 0 32 5) None of these

IT OFFICER MCQs m - bsc4success.com OFFICER MCQs 1. Which of the ... Which of the following is not an operating system call for process management? 1) CREATE 2 ... All operations done

  • Upload
    lamanh

  • View
    219

  • Download
    2

Embed Size (px)

Citation preview

bsc4

succe

ss.co

m

Downloaded From: http://bsc4success.com

IT OFFICER MCQs

1. Which of the following is a functionally complete gate?1) AND 2) OR 3) NAND 4) NOT 5) None of these

2. The XYZ bank Gujarat branch has all Cisco routers connect­ed in the network. The networkadministrator Robert had re­placed one of the routers with a non­Cisco router. He thenconfigured PPP encapsulation on a Cisco router to enable communication between them.Now, he wants to set HDLC back as the default protocol on the Cisco router. Which of thefollowing combinations will he use?I. Interface serial [module_0/1] port_l and encapsulation hdlc.II. Interface type [slot_2] port_l and encapsulation PPP.III. Interface type [slot_2] port_l and encapsulation ppp and ppp pap sent-username jack

password system1) III 2) II 3) I 4) I and II 5) None of these

3. FDDI is1) Ring Network 2) Star Network 3) Mesh Network4) Bus based Network 5) None of these

4. Time sharing1) Round Robin scheduling 2) Priority scheduling3) First come First served 4) Non preemptive scheduling5) None of these

5. Banker’s Algorithm is used as1) Deadlock occurrence method 2) Deadlock avoidence method3) Deadlock detection method 4) Deadlock recovery method5) None of these

6. Which of the following communications lines is best suited to interactive processing applications?1) narrow band channel 2) simplex lines 3) full duplex lines4) mixed band channels 5) None of these

7. Which of the logic family has the lowest power delay product1) ECL 2) TTL 3) IIL 4) MOS 5) None of these

8. What is the output of the following C program main(){int i = 32, j = 0 × 20, k, l, m;K = i / j;l = i & j;m = k ^ l;print f(“%d%d%d%d”, i, j, k, l, m);1) 32 32 32 32 0 2) 0 0 0 0 0 3) 32 32 32 32 324) 32 0 32 0 32 5) None of these

bsc4

succe

ss.co

m

Downloaded From: http://bsc4success.com

9. A design description of an object can take1) A protocol description 2) An implementation description3) Both 1) and 2) 4) Either 1) or 2)5) None of these

10. Applet1) It is an application that run inside a rectangular region on the web page2) It can display animation, sound, games and general utilities3) Its application is calculator and search engine4) all of the above5) None of these

11. When you drop a ............. corresponding indexes are also dropped.1) Column 2) Sequence 3) View 4) Table 5) None of these

12. What error are you likely to get when you run the following program?main ( ){struct emp;{char name [20];float sal;}struct emp e[10];int i;for(i = 0; i < =9; i++)scanf(“%s%f”,e[i].name & e[i].sal));}1) Suspicious pointer conversion 2) floating Point formats not linked3) Cannot use scanf () structures 4) Strings cannot be nested inside structures5) None of these

13. The Bankers algorithm is used1) To prevent deadlock in operating systems2) To detect deadlock in operating systems3) To rectify a deadlock state4) All of the above5) None of these

14. The following sequence of operations is performed one a stackPUSH (10), PUSH (20).POP, PUSH (10), PUSH (20), POP, POP, POP PUSH (20), POPThe sequence of values popped out is1) 20, 10, 20, 10, 20 2) 20, 20, 10, 10, 20 3) 10, 20, 20, 10, 204) 20, 20, 10, 20, 20 5) None of these

15. For a 25 MHz processor, what is the time taken by the instruction which needs 3 clock cycles.1) 120 nano secs 2) 120 micro secs 3) 75 nano secs4) 75 micro secs 5) None of these

bsc4

succe

ss.co

m

Downloaded From: http://bsc4success.com

16. Which of the following is not an operating system call for process management?1) CREATE 2) DELETE 3) FORK/JOIN4) PCB 5) None of these

17. ER diagram is example of which data Model ?1) Generic Data Model 2) Semantic Data Model3) Relational Data Model 4) Special Data Model5) None of these

18. An array can be passed in a function in C language through-1) ‘Call by value’ only2) ‘Call by reference’ only3) Both ‘call by value’ and ‘call by reference’4) Tuple5) None of these

19. What is the output of the following ‘C’ program?main (){extern, int a;printf(“\n%d”,a)’}int a = 201) 0 2) 20 3) Error 4) Garbage value 5) None of these

20. Fragment Free Switches check ............bytes of data.1) 4 2)16 3) 24 4) 64 5) None of these

21. The range of the numbers that can be stored in 8 bits, if negative number are stored in 2’scomplement form, is1) –128 to + 128 2) –128 to 127 3) –127 to +1284) –127 to + 127 5) None of these

22. Choose the most appropriate definition of plane graph1) A graph drawn in a plane in such a way that any pair of edges meet only at their end vertices2) A graph drawn in a plane in such a way that if the vertex set of graph can be partitioned into

two non-empty disjoint subsets X and Y in such a way that each edge of G has one end inX and one end in Y

3) A simple graph which is iso­morphic to a Hamiltonian graph4) All of the above5) None of these

23. Boolean algebra1) An algebraic system defined by Boolean lattice is known as a boolean algebra2) For boolean lagebra (x + y)= x. y3) For boolean algebra (x . y)= x + y4) All of the above5) None of these

bsc4

succe

ss.co

m

Downloaded From: http://bsc4success.com

24 ............ is a function that is expanded in line when it is invoked. That is, the compiler replacesthe function call with the corresponding function code.1) Memory allocation function 2) Member function3) Inline function 4) Default function5) None of these

25. A demand paging system with page table held in registers, takes 5 ms to service a page fault,if empty page is available or if the page is to replaced is not dirty. It takes 15 ms if the replacedpage is dirty. Memory access time is 1,s. Assume we want an effective access time 23,sand that the page to be replaced is dirty 60% of the time. What is the approximate page faultrate to meet this access time requirement?1) 0.1% 2) 1.0% 3) 2.5% 4) 0.01% 5) None of these

26. Packets are related to which layer1) Data link layer 2) Physical layer 3) Network layer4) Presentation layer 5) None of these

27. Feedback queue1) are very easy to implement2) dispatch tasks according to execution characteristics3) are used to favour real-time tasks4) require manual interven­tion to implement properly5) None of these

28. The main advantages of CMOS as compared to TTL1) lower consumption and better noise margins2) lower power consumption with low fan-out3) higher speed operation with low power consumption4) higher power consumption with high fan-out5) None of these

29. Rohan has an e-card that he uses to access different parts of his company’s R&D offices.What type of card is he using?1) Credit card 2) Purchase card 3) Smart card4) Contact card 5) None of these

30. Which of the following might be output as result of using a CASE tool?1) Programmable Code2) Flowcharts and data flow diagrams3) Prototypes and Cost/benefit analysis4) All of the above5) None of these

31. Which TTL sub-family has maximum speed1) Standard TTL 2) Schottky-clamped TTL 3) High speed TTL4) Low power TTL 5) None of these

32. Which of the following statements is wrong?1) no left recursive grammar can be LL1)

bsc4

succe

ss.co

m

Downloaded From: http://bsc4success.com

2) no LL 1) grammar can be ambiguous3) every LR1) grammar is an LL1) grammar4) every grammar can be converted into LR1)5) None of these

33. Each object is said to be ........ of its class.1) Attribute 2) Instance 3) Classification4) Operations 5) None of these

34. Warshall’s algorithm1) A directed graph G with M nodes is maintained in memory by its adjacency matrix A.2) This algorithm finds the boolean path matrix P of the graph G3) Both 1) and 2)4) Either 1) or 2)5) None of these

35. Which of the following is most general phase-structured grammer?1) Regular 2) Context-sensitive 3) Context-free4) All of the above 5) None of these

36. The correct hierarchical relationship among context-free, right-linear, and context-sensitivelanguage is given by1) context-free < right-linear < context-sensitive2) context-free < context-sensitive < right-linear3) context-sensitive < right-linear < context-free4) right-linear < context free < context-sensitive5) None of these

37. Which of the following fields in a student file can be used as a Primary Key?1) Class 2) Social Security Number 3) GPA4) Major 5) None of these

38. The ......... device provides a digital interface for connecting routers and digital circuits ?1) Channel service unit 2) Modem 3) Adapter4) Router 5) None of these

39. Handshaking is1) synchronous type 2) asynchronous 3) sequential4) All of these 5) None of these

40. The class of context-free languages is not closed under1) union 2) concatenation 3) repeated concatenation4) intersection 5) None of these

41. The process of macro-expanion is completely segregated from the process of assembly program.The translator which performs macro-expansions is called1) Macro Interpreter 2) Macro Pre-Processor 3) Macro Table4) All of the above 5) None of these

bsc4

succe

ss.co

m

Downloaded From: http://bsc4success.com

42. What is the output of the following C program?main (){int a[5] = {2,3};printf(“\n%d%d%d”,a[2], a[3],a[4]);1) Garbage Values 2) 2 3 3 3) 3 2 24) 0 0 0 5) None of these

43. Which one is not logical1) ORI 2) ORA 3) XRA 4) OVI 5) None of these

44. RISC processor have1) Relatively few instruction and addressing modes2) All operations done within the register and CPU3) Single cycle instruction execution4) All of these5) None of these

45. TCP means1) transmission content protocol 2) transfer control protocol3) transmission control protocol 4) all of the above5) None of these

46. How many bit can accomodate instruction register1) 8 bit 2) 16 bit 3) 32 bit 4) 4 bit 5) None of these

47. Let A = {l, 2, 3}, B = {a, b} and R= {(1, a), (1, b), (3, a), (2, b)} be a relation from A to B.The inverse relation R is1) R–1 = {(a, l), (b, l), (a, 3), (b, 2)]}2) R–1 = {(2, b), (3, a), (l, b), (l, a)}3) R1 = {(b, 2), (a, 3), (b, l), (a, l)}4) All of the above5) None of these

48. Yacc source program has 3 parts. Which of the following are Yacc source program parts?1) Terminal symbol, non-terminal symbol, production rule2) Declaration, translation rules, user routines3) Declaration, Translation rules, C programs4) All of the above5) None of these

49. A loading scheme in which loading and linking of external and references are postponed untilexecution time1) Direct linking loader 2) Dynamic loading 3) Dynamic linking4) Relocating loader 5) None of these

50. Back tracking problem is seen in1) predirective parser 2) LR parsar 3) recursive-descent parsar

bsc4

succe

ss.co

m

Downloaded From: http://bsc4success.com

4) All of the above 5) None of these

51. Firewall have1) two routers for packet filtering2) application gateway, it is used in application layer3) both 1 and 24) All of the above5) None of these

52. Which of the following is the correct simplification of Boolean expression A`BC + AC?1) BC+AC 2) BC+C 3) BC4) A`C 5) None of these

53. Scope of macro definition1) cannot be beyond the file in which it is defined2) may be part of a file3) is in the entire program4) a, b, d5) None of these

54. Cisco switches supports two different trunking protocols ................... and ................. bothproviding basic trunking.1) VLAN1 and VLAN2 2) Cisco 2950 and Cisco 19003) ISL and 802.1Q 4) Client and Transparent5) None of these

55. Which of the following language differ the case of alphabets?1) FORTRAN 2) BASIC 3) C4) All of the above 5) All of the above

56. Goal of a relational database design1) To generate a set of relation schemes that allow us to store information without unnecessary

redundancy2) Allows us to retrieve information easily3) Schemes that are in appropriate normal form4) All of the above5) None of these

57. On what platform is multithreading supported?1) IDL5.5 2) IDL 5.6 3) Support on all platform4) All of the above 5) None of these

58. The first version of UNIX was written by1) Dennis Ritchie 2) Andrew S. 3) Ken Thompson4) All of the above 5) None of these

59. Which of the following is used with databases?1) Data mining 2) EDI 3) Credit cards4) All of the above 5) None of these

bsc4

succe

ss.co

m

Downloaded From: http://bsc4success.com

60. Which operator has highest priority1) ( ) 2) [ ] 3) 4). 5) None of these

61. Match the following:List-I List-II(i) TTL (a) Unipolar(ii) ECL (b) PMOS connected in a complementary fashion(iii) MOS (c) 5 volts(iv) CMOS (d) High SpeedCodes:

(i) (ii) (iii) (v)1) a b c d2) b a d c3) c d a b4) d a c b5) None of these

62. To modify existing row of the table, .......... statement is used.1) ALTER 2) MODIFY 3) UPDATE 4) All of the above 5) None of these

63. The............. is an Interior Gateway Protocol that manage the exchange of routing of tableinformation.1) RIP 2) OSPF 3) IGRP 4) EIGRP 5) None of these

64. Recently which operating system launched its Hindi version?1) MINIX 2) LINUX 3) DOS 4) All of these 5) None of these

65. The receive equalizer reduces delay distortions using a 1) tapped delay time 2) descramber 3) difference engine4) All of the above 5) None of these

66. Bit is related to which layer1) physical layer 2) data link layer 3) network layer4) transport layer 5) None of these

67. n stage ripple counter can count up to1) 2n 2) 2n – l 3) n 4) 2n–1 5) None of these

68. Which of the following do you think is used to separate the base classes in a base class list?1) Comma (,) 2) Colon (:) 3) Semi-colon (;)4) Tilde (~) 5) None of these

69. Spatial locality refers to the problem that once a location is referenced1) a nearby location will be referenced soon2) it will not be referenced again.3) it will be referenced again4) All of the above5) None of these

bsc4

succe

ss.co

m

Downloaded From: http://bsc4success.com

70. What is the minimum number of wires needed to send data over a serial communication linklayer ?1) 1 2) 2 3) 4 4) 6 5) 7

71. To discard all pending data changes1) COMMIT 2) ROLLBACK 3) SAVEPOINT4) LOCK 5) None of these

72. When two numbers of n digits each are added and the sum occupies n + 1 digits, the situationis called1) Overflow 2) Underflow 3) Normal condition4) All of the above 5) None of these

73. An assembler is a1) Program2) Person who assembles the parts3) Symbol4) language5) None of these

74. Which of the following statement is not True?1) We use views to restrict data access2) We use views to make complex queries difficult3) We use views to allow data independence4) All of the above5) None of these

75. The base difference between broad band and baseband is1) availability 2) capacity 3) transmission 4) reliability 5) None of these

76. Whick of the following statements are true about doubly linked list?(i) It may be either linear or circular(ii) it must contain a header node(iii) it will occupy same memory space as that of linear linked list, both having same number of

nodes.1) only (i) 2) (ii) and (iii) 3) (i), (ii) and (iii)4) (i) and (iii) 5) None of these

77. Which one is false1) shift registers operate in serial fashion one bit at a time2) parallel processing techniques are economically feasible3) register with parallel load operate with all the bits of the word simultaneously4) all of the above are true5) None of these

78 .......... uses the Diffusing Update Algorithm to update the routing table.1) RIP 2) OSPF 3) IGRP 4) EIGR 5) None of these

79. A computer system having 64 K memory will have its last address as1) 65536 2) 64000 3) 65535 4) 65530 5) none of the above

bsc4

succe

ss.co

m

Downloaded From: http://bsc4success.com

80. Function definition void check (int i,char*j) is1) call by value 2) call by reference 3) both 1) and 2)4) invalid function definition 5) None of these

81. Which of the following is Network Security aspect?1) Patch management2) Firewalls3) Intrusion Detection System (IDS)4) All of the above5) None of these

82. The smallest element of an array’s index is called its1) Smallest bound 2) Lower bound 3) First bound4) Higher bound 5) None of these

83. Which of the following file name extension suggests that the file is Backup copy of an otherfile?1) TXT 2) COM 3) BAS4) BAK 5) None of these

84. McCall proposed which of the following quality factors?1) Correctness, Reliability, Usability, Integrity, Efficiency2) Maintainability, Flexibility, Testability3) Portability, Reusability, In­teroperability4) All of the above5) None of these

85. A communications device that combines transmissions from several I/O devices into oneline is a:1) concentrator 2) modifier 3) multiplexer 4) full-duplex line 5) None of these

86. Which of the following commands can be used to get information about all users who arecurrently logged into the system?1) which 2) who 3) who am i 4) All of the above 5) None of these

87. A pilot can fly three types of planes and a plane can be piloted by any qualified pilot. The pilot-plane type relationship is1) N : 3 2) 3 : N 3) 1 : 3 4) 3 : 1 5) None of these

88. DES1) Data Encryption standard was widely adopted by the industry for use in security products2) It is no longer secure in its original form, but in a modified form it is still useful3) Plain text is encrypted in blocks of 64 bits4) All of the above5) None of these

89. How many transistor is LSI1) more than 100 2) more than 1000 3) more than 10,0004) more than 10 5) None of these

bsc4

succe

ss.co

m

Downloaded From: http://bsc4success.com

90. Match the following: List-I List-II(i) State Table (a) Strobe Control Method(ii) Locality of Reference (b) Booth Algorithm(iii) Asynchronous Data Transfer (c) Flip-flop(iv) 2S Complement Multiplication (d) CacheCodes:

(i) (ii) (iii) (v)

(i) (ii) (iii) (iv)1) a b c d2) d c b a3) c a d b4) c d a b5) None of these

91. At the business or enterprise level, the techniques associated with object oriented Analysis canbe coupled with an information engineering approach. This technique is often called1) Requirement Analysis2) Domain Analysis3) Entity Analysis4) Relationship Analysis5) None of these

92. Which is the correct statement regarding debit/smart card ?1) Banks are generally extending this facility to saving account with liquidity features.2) These cards facility are not extended to cash and loan account.3) Both 1) and 2).4) Debit card can be issued to PMRY beneficiaries.5) None of the above.

93. The network administrator Paul requires configuring a primary rate interface for the XYZ bankHyderabad branch. He needs to specify the switch type for ISDN while configuring PRI.Which command will he use?1) isdn switch-type basic-ni2) isdn switch basic-ni3) isdn switch-type pri-4ess4) isdn switch pri-4ess5) None of these

94. Which of the following is not a type of graph?1) Euler 2) Hamiltonian 3) Tree 4) Path 5) None of these

95. A video editing system for Linux1) DVDL 2) LIVES 3) VSL 4) LVS 5 ) None of these

96. What is the output of given C fragment program.if (a = 0)printf (“a is zero”);

bsc4

succe

ss.co

m

Downloaded From: http://bsc4success.com

elseprintf (“a is not zero”);1) a is zero2) prints nothing3) a is not zero4) Garbage value5) None of these

97. A system program that separately compiles modules of a program into a form suitable forexecution is1) Assembler 2) Linking loader 3) Cross compiler4) Load and go 5) None of these

98. Which of the following is not characteristic of a relational database model?1) Tables 2) treelike structure 3) complex logical relationship4) records 5) None of these

99. concept of developing a compiler for a language by using subsets of the same language1) Bootstrap 2) Lex 3) Yacc 4) Analyzer 5) None of these

100. Which of the following software tool is a parser generator?1) Lex 2) Yacc 3) Both 1 and 2 4) Either 1) or 2) 5) None of these

101. You are writing classes that will bypass the operating system which directly access severalsystem resources, such as memory and disk drives. Which language is probably the best?1) C++ 2) Cobol 3) Java 4) Small talk 5) None of these

102. Which of the following performs modulation and demodulation?1) Fiber optic 2) satellite 3) coaxial cable4) modem 5) none of the above

103. VSAT means1) Very Small Amplitude Transmission2) Very Small Apertual Terminal3) Very Small Apertual Transmission4) Very Small Amplitude Terminal5) None of these

104. In fiber optics index angle is1) less than cladding angle2) greater than cladding angle3) equal to the cladding angle4) All of the above5) None of these

105. Speed of optical fiber depends on1) number of photon 2) dispersion 3) attenuation4) All of these 5) None of these

bsc4

succe

ss.co

m

Downloaded From: http://bsc4success.com

106. When both inputs are different, then output is high in1) NAND GATE 2) NOR GATE 3) OR Gate4) EX-OR Gate 5) None of these

107. In a synchronous modem, the digital-to-analog converter transmits signal to the1) equalizer 2) modulator 3) demodulator4) terminal 5) none of the above

108. The function of a database is1) to check all input data2) to check all spelling3) to collect and organize input data4) to output data5) None of these

109. The ............ command enables you to switch from the user mode to privileged mode.1) enable 2) disable 3) config 4) switch 5) None of these

110. Railway reservation is example of1) On line system 2) Off line system 3) batch processing4) time sharing 5) None of these

111. A relation schema is said to be in ............ form if the values in the domain of each attribute ofthe relation are atomic.1) Unnormalized 2) First Normal 3) Boyce Codd4) All of these 5) None of these

112. Which kind of lock includes a keypad that can be used to control access into areas ?1) Cipher 2) Warded 3) Device 4) Tumbler 5) Typelock

113. Which gate is known as Universal gate?1) NOT gate 2) AND gate 3) NAND gate4) XOR gate 5) None of these

114. Context switching changes the process mode from1) user to kernel mode2) kernel to user mode3) kernel mode to the k process4) both 1 and 25) None of these

115. UNIX operating syste based on1) Language structure 2) Kernel approach 3) Virtual machine4) Time sharing 5) None of these

116. Type checking is normally done during1) Lexical analysis 2) Syntax Analysis 3) Syntax directed translation4) Code optimization 5) None of these

117. How many NAND gates are needed to perform the logic function X.Y?

bsc4

succe

ss.co

m

Downloaded From: http://bsc4success.com

1) 1 2) 2 3) 3 4) 4 5) None of these

118. Wait and notify used in1) A synchronous method2) Synchronous method3) Sequential method4) Parallel method5) None of these

119. HTTP means1) Hypertext transfer protocol2) Hypertext transmission protocol3) Hypertension transfer protocol4) All of the above5) None of these

120. Which directory implementation is used in most Operating System ?1) Single level directory structure2) Two level directory structure3) Tree directory structure4) Acyclic directory structure5) None of these

121. Which of the following printers cannot print graphics?1) Ink-jet2) Daisywheel3) Laser4) Dot-matrix5) None of these

122. The............. command enables you to change the name for the router.1) hostname 2) name 3) banner 4) router 5) None of these

123. Software quality metrics like productivity metrics, focus on the1) Process 2) Project 3) Product 4) All of these 5) None of these

124. When ray passes through fused silica to air, the ray is refracted, then light trapped by1) refraction 2) reflection 3) total internal reflection4) All of the above 5) None of these

125. Which one is input device1) DVD 2) Trackball 3) Digitizers 4) All of the above 5) None of these

126. The model for a record management system might be1) handwritten list 2) a Rolodex Card file 3) a business form4) All of the above 5) None of these

127. Which of them is not a valid DBMS Data Model ?1) Relational 2) Hierarchical 3) Complex 4) Network 5) None of these

bsc4

succe

ss.co

m

Downloaded From: http://bsc4success.com

128. Which of the following consists of an array of gates which can be used to patch an error in aROM or alter the meaning of instruction1) RAM 2) EAPROM 3) PLA 4) PSW 5) None of these

129. The ........ comand enables you to set encrypted passwords for the privileged mode.1) line console 2) line vty 3) enable password4) enable secret 5) None of these

130. Actions are performed in an object oriented systems by sending ....... to an object.1) Statements 2) Messages 3) Control 4) All of these 5) None of these

131. In K-map, the adjacent squares represent minterms that differ by1) One variable 2) Two variable 3) Three variable4) All of these 5) None of these

132. Data transfer rate of a double density floppy disk is about1) 5K bits/sec 2) 50K bits/sec 3) 500K bits/sec4) 5000K bits/sec 5) None of these

133. How many bits are required to encode all 26 letters, 10 symbols and 10 numerals1) 5 2) 6 3) 7 4) 46 5) None of these

134. Which of the following operator is used to access the value of structure pointer?1) 2) & 3) * 4) . 5) None of these

135. If initialization is a part of declaration of a structure, then the storage class can be1) automatic 2) register 3) static 4) anything 5) None of these

136. The ................ model remains operative until the software is retired.1) Waterfall 2) Incremental 3) Spiral 4) All of these 5) None of these

137. When a cracker attempts to misuse or steal data from a system, it is called1) Stealing 2) Intrusion 3) Virus 4) All of these 5) None of these

138. Which of the following does not allow multiple users or devices to share one communicationline?1) double-plexer 2) multiplexer 3) concentrator 4) controller 5) None of these

139. One can display all columns of data in a table by following the SELECT keyword with1) + 2) * 3) – 4) ? 5) None of these

140. Raid configuration of disks are used to provide1) Fault tolerance 2) High speed 3) High data density4) All of the above 5) None of these

141. 8085 memory is1) 1 M byte 2) 64 Kbte 3) 64 K bit 4) 64 byte 5) None of these

142. Link encryption

bsc4

succe

ss.co

m

Downloaded From: http://bsc4success.com

1) is more secure than end to end encryption2) is less secure than end to end encryption3) cannot be used in public network4) is used only to debug5) None of these

143. HDLC is1) Bit oriented 2) Code transparent 3) Code dependent4) All of the above 5) None of these

144. What is the name of the printer which print all the As in a line before all the B’s?1) Thermal printer 2) Electrostatic printer 3) Line printer4) Ink-jet printer 5) None of these

145. Fiber optics frequency have1) 105 to 107 2) 106 to 109 3) 109 to 1011

4) 1014 to 1015 5) None of these

146. Which one is related to modulator and demodulator1) multiplexer 2) decoder 3) encoder4) modem 5) None of these

147. Seeta has an e-card that she uses to purchase office supplies for the company she works for.What type of smart card is she using?1) Credit card 2) Purchase card 3) Smart card4) Contact card 5) None of these

148. Stack is sometimes called a1) Push down list 2) Pushdown array 3) Pop down list4) Pop up array 5) None of these

149. Periodically adding, changing and delecting file records is called file1) Updating 2) Upgrading 3) Restructuring4) History file 5) None of these

150. What is hamming distance code for correcting?1) 2d + l 2) d + 1 3) 2d + 3 4) d + 3 5) None of these

151. Subnet Mask of class A is1) 255.0.0.0 2) 192.0.0.0 3) 255.0.0.1 4) 224.0.0.0 5) None of these

152. The relational model includes two general integrity rules. Integrity rule 1 is concerned with......... and integrity rule 2 is concerned with .........1) Primary key, Foreign key2) Composite key, Primary key3) Foreign key, Primary key4) Transaction key, Foreign key5) None of these

bsc4

succe

ss.co

m

Downloaded From: http://bsc4success.com

153. Which is the output of the following program fragment in C?int x, y =2, z, a ;x = (y* = 2) + (z = a = y);printf (“% d”, x);1) 7 2) 8 3) Garbage value 4) Error 5) None of these

154. In comparison with static RAM memory, the dynamic RAM memory has1) lower bit density and higher power consumption2) higher bit density and higher power consumption3) lower bit density and lower power consumption4) higher bit density and lower power consumption5) None of these

155. V.241) It is similar to multiplexer2) It is similar to Modem3) It is similar to Demultiplexer4) All of the above5) None of these

156. The ABC bank needs to decide on a routing protocol for its large enterprise networks. Thebank has a mixed vendor environment and may need to replace any of its existing routers. Itneeds to follow the bank policy and requires an open standard routing protocol. Which routingprotocol will you implement for the ABC bank1) OSPF 2) RIP 3) IGRP 4) EIGRP 5) None of these

157. Which of the following operators can be overloaded in C++?1) Scope resolution operator2) Size of operator3) Conditional operator4) Arithmetic operator5) None of these

158. A multiplexer with a 4 bit data select input is a1) 4 : 1 multiplexer 2) 2 : 1 multiplexer 3) 16 : 1 multiplexer4) 8 : 1 multiplexer 5) None of these

159. Which of the following is an advantage to using fibre optics data transmission ?1) resistance to data theft2) fast data transmission rate3) low noise level4) all of these5) None of these

160. An interactive computer system1) It provides on line communication between user and system2) user gives instruction to the operating system or to a program directly, and receives an

immediate response3) both 1) and 2)4) None of these

bsc4

succe

ss.co

m

Downloaded From: http://bsc4success.com

5) None of these

161. Which of the following is different from the group?1) Private 2) Protected 3) Public 4) Friend 5) None of these

162. Which of the following sorting method is stable?1) Straight insertion sort2) Binary insertion sort3) Shell sort4) Heap sort5) None of these

163. Which of the following C++ statement is correct?1) int*p = new int2) int new = *p3) int*new = *p4) int*p = int new5) None of these

164. The ....... metric specifies the amount of data that can travel over the network segment.1) Hops 2) Load 3) Delay 4) Bandwidth 5) None of these

165. Length of the walk of a graph is1) The number of vertices in walk W2) The number of edges in walk W3) Total number of edges in a graph4) Total number of vertices in a graph5) None of these

166. Each item in a linked list is called1) Element 2) Information 3) Data 4) Node 5) None of these

167. ............. is the situation in which a process is waiting on another process, which is also waitingon another process, which is waiting on the first process. None of the processes involved inthis circular wait are making progress.1) Deadlock 2) Starvation 3) Dormant 4) All of the above 5)None of these

168. Consider a machine with 64 MB physical memory and a 32 bit virtual address space. If thepage size is 4 KB, what is the approximate size of the page table?1) 16 MB 2) 8 MB 3) 2 MB 4) 24 MB 5) None of these

169. The access time of magnetic bubble memory is approximately1) 30 ns 2) 30 ms 3) 30 ms 4) 0.3 sec 5) None of these

170. Which of the following gates would output 0 if inputs are equal.1) NAND 2) NOR 3) EX-OR 4) OR 5) None of these

171. Which of the following is not a page replacement algorithm?1) LIFO 2) FIFO 3) LRU 4) Optimal 5) None of these

bsc4

succe

ss.co

m

Downloaded From: http://bsc4success.com

172. Subnet is related to which layer1) data link layer, Network layer, transport layer2) physical layer, Network layer, transport layer3) network, transport, physical layer4) all of the above5) None of these

173. Parsing can be1) Top-down 2) Bottom up 3) Both 1) and 2) 4) Either 1) or 2) 5) None of these

174. What is the alternative name for a diskette?1) Winchester disk 2) flexible disk 3) hard disk4) floppy disk 5) None of these

175. A tree having a main node, which has no predecessor is1) Spanning tree 2) Rooted tree 3) Weighted tree4) All of the above 5) None of these

176. If an entity appears in not more than 5 relationships then it is a :1) 1 : 1 relationship 2) 1 : 5 relationship 3) 5 : 1 relationship4) 5 : 5 relationship 5) None of these

177. The.......... metric measures traffic over the network.1) Hops 2) Load 3) Delay 4) Bandwidth 5) None of these

178. In a JK flip-flop, if J = K, the resulting flip-flop is referred to as a1) D flip-flop 2) T flip-flop 3) S-R flip-flop4) All of the above 5) None of these

179. The XYZ bank has all Cisco routers connected in the network. A host connects to a routerthrough telnet connection. Which command will the administrator Robert uses to print themessages or the console part:1) terminal monitor 2) terminal print 3) console print4) console monitor 5) None of these

180. In C++ a function contained in a class is called1) Member function 2) an operator 3) a class function4) a method 5) None of these

181. In data transmission, the bit coding scheme used to represent a byte is typically1) EBCDIC 2) ASCII 3) SNA4) Hexadecimal 5) None of these

182. An unnormalized relation contains values1) Atomic 2) Non-atomic 3) Classified4) All of the above 5) None of these

183. Memory protection is normally done by1) the processor and the associated hardware

bsc4

succe

ss.co

m

Downloaded From: http://bsc4success.com

2) the operating system3) the compiler4) the user program5) None of these

184. Most significant bit is1) S 2) CY 3) Z 4) P 5) None of these

185. When any positive integer is divided by zero, then error be catch by at1) Compiler time 2) Intrepreter 3) Debugging 4) Run time 5) None of these

186. What is the min number of two input NAND gates used to perform the function of two inputOR gate?1) 1 2) 2 3) 3 4) 4 5) None of these

187. An audit trail1) is used to make back-up copies2) is the recorded history of operations performed on a file3) can be used to restore lost information4) none of the above5) None of these

188. Gopher is1) Gopher was text only global set of linked menus and files2) Gopher is a browser3) Both 1 and 24) Either 1) or 2)5) None of these

189. The sum of weights in self complement BCD code is1) 8 2) 9 3) 10 4) 16 5) None of these

190. Port number of HTTP is1) 25 2) 80 3) 125 4) 123 5) None of these

191. Consider two regular languages L1= (a + b) *a and L2 = b(a + b)*. The intersection of L1 andL2 is given by1) (a+b)*ab 2) ab(a+b)* 3) a(a+b)*b 4) b(a+b)*a 5) None of these

192. Which of the following is not functionally a complete set?1) AND, OR 2) NOR 3) NAND4) AND, OR, NOT 5) None of these

193. Thedesign goal refers to the ability of the routers to agree on optimal routes.1) Robustness 2) Flexibility 3) Convergence4) Optimal Route 5) None of these

194. Which of the following TCP/ IP protocol is used for remote terminal connection services?1) TELNET 2) FTP 3) RARP 4) UDP 5) None of these

bsc4

succe

ss.co

m

Downloaded From: http://bsc4success.com

195. Which of the following TCP/ IP protocol is used for transferring electronic mail messages fromone machine to another?1) FTP 2) SNMP 3) SMTP 4) RPC 5) None of these

196. Software design is1) Process 2) Model 3) Both 1) and 2) 4) Either 1) or 2) 5) None of these

197. Smart card1) has an integrated with micro processor chip embedded in it so it could perform calculation

and maintain records2) has built for protection against fraudulent operations3) can either be recharge or exchangeable4) All of the above5) None of these

198. Which of the following calls never returns an error1) getpid 2) fork 3) ioctl 4) open 5) None of these

199 .................. time is expressed as turnaround time less actual execution time.1) Response 2) Waiting 3) CPU 4) Process 5) None of these

200. Port number of SMTP is1) 25 2) 80 3) 123 4) 243 5) None of these

ANSWERS

1. 3 2. 2 3. 1 4. 1 5. 26. 3 7. 3 8. 1 9. 3 10. 411. 4 12. 2 13. 1 14. 2 15. 116. 4 17. 2 18. 3 19. 4 20. 421. 2 22. 1 23. 4 24. 3 25. 426. 3 27. 2 28. 1 29. 3 30. 431. 2 32. 4 33. 2 34. 3 35. 236. 4 37. 2 38. 1 39. 2 40. 441. 2 42. 4 43. 4 44. 4 45. 346. 2 47. 1 48. 3 49. 3 50. 351. 3 52. 1 53. 4 54. 3 55. 356. 4 57. 3 58. 3 59. 1 60. 161. 3 62. 3 63. 1 64. 2 65. 166. 1 67. 2 68. 1 69. 1 70. 271. 2 72. 1 73. 1 74. 2 75. 276. 1 77. 4 78. 4 79. 3 80. 381. 4 82. 2 83. 4 84. 4 85. 386. 2 87. 1 88. 4 89. 2 90. 491. 2 92. 3 93. 3 94. 4 95. 2

bsc4

succe

ss.co

m

Downloaded From: http://bsc4success.com

96. 3 97. 2 98. 2 99. 1 100. 2101. 2 102. 4 103. 2 104. 1 105. 1106. 4 107. 1 108. 3 109. 1 110. 1111. 2 112. 1 113. 3 114. 4 115. 2116. 3 117. 2 118. 4 119. 1 120. 3121. 2 122. 1 123. 4 124. 3 125. 4126. 4 127. 3 128. 3 129. 4 130. 2131. 1 132. 3 133. 2 134. 1 135. 3136. 3 137. 2 138. 1 139. 2 140. 1141. 2 142. 2 143. 1 144. 3 145. 2146. 4 147. 2 148. 1 149. 1 150. 1151. 1 152. 1 153. 2 154. 4 155. 2156. 1 157. 4 158. 3 159. 4 160. 3161. 4 162. 1 163. 1 164. 4 165. 2166. 4 167. 1 168. 3 169. 3 170. 3171. 1 172. 1 173. 3 174. 4 175. 2176. 2 177. 2 178. 2 179. 1 180. 1181. 2 182. 2 183. 1 184. 1 185. 4186. 3 187. 2 188. 3 189. 2 190. 2191. 4 192. 1 193. 3 194. 1 195. 3196. 3 197. 4 198. 1 199. 2 200. 1