Upload
lamanh
View
219
Download
2
Embed Size (px)
Citation preview
bsc4
succe
ss.co
m
Downloaded From: http://bsc4success.com
IT OFFICER MCQs
1. Which of the following is a functionally complete gate?1) AND 2) OR 3) NAND 4) NOT 5) None of these
2. The XYZ bank Gujarat branch has all Cisco routers connected in the network. The networkadministrator Robert had replaced one of the routers with a nonCisco router. He thenconfigured PPP encapsulation on a Cisco router to enable communication between them.Now, he wants to set HDLC back as the default protocol on the Cisco router. Which of thefollowing combinations will he use?I. Interface serial [module_0/1] port_l and encapsulation hdlc.II. Interface type [slot_2] port_l and encapsulation PPP.III. Interface type [slot_2] port_l and encapsulation ppp and ppp pap sent-username jack
password system1) III 2) II 3) I 4) I and II 5) None of these
3. FDDI is1) Ring Network 2) Star Network 3) Mesh Network4) Bus based Network 5) None of these
4. Time sharing1) Round Robin scheduling 2) Priority scheduling3) First come First served 4) Non preemptive scheduling5) None of these
5. Banker’s Algorithm is used as1) Deadlock occurrence method 2) Deadlock avoidence method3) Deadlock detection method 4) Deadlock recovery method5) None of these
6. Which of the following communications lines is best suited to interactive processing applications?1) narrow band channel 2) simplex lines 3) full duplex lines4) mixed band channels 5) None of these
7. Which of the logic family has the lowest power delay product1) ECL 2) TTL 3) IIL 4) MOS 5) None of these
8. What is the output of the following C program main(){int i = 32, j = 0 × 20, k, l, m;K = i / j;l = i & j;m = k ^ l;print f(“%d%d%d%d”, i, j, k, l, m);1) 32 32 32 32 0 2) 0 0 0 0 0 3) 32 32 32 32 324) 32 0 32 0 32 5) None of these
bsc4
succe
ss.co
m
Downloaded From: http://bsc4success.com
9. A design description of an object can take1) A protocol description 2) An implementation description3) Both 1) and 2) 4) Either 1) or 2)5) None of these
10. Applet1) It is an application that run inside a rectangular region on the web page2) It can display animation, sound, games and general utilities3) Its application is calculator and search engine4) all of the above5) None of these
11. When you drop a ............. corresponding indexes are also dropped.1) Column 2) Sequence 3) View 4) Table 5) None of these
12. What error are you likely to get when you run the following program?main ( ){struct emp;{char name [20];float sal;}struct emp e[10];int i;for(i = 0; i < =9; i++)scanf(“%s%f”,e[i].name & e[i].sal));}1) Suspicious pointer conversion 2) floating Point formats not linked3) Cannot use scanf () structures 4) Strings cannot be nested inside structures5) None of these
13. The Bankers algorithm is used1) To prevent deadlock in operating systems2) To detect deadlock in operating systems3) To rectify a deadlock state4) All of the above5) None of these
14. The following sequence of operations is performed one a stackPUSH (10), PUSH (20).POP, PUSH (10), PUSH (20), POP, POP, POP PUSH (20), POPThe sequence of values popped out is1) 20, 10, 20, 10, 20 2) 20, 20, 10, 10, 20 3) 10, 20, 20, 10, 204) 20, 20, 10, 20, 20 5) None of these
15. For a 25 MHz processor, what is the time taken by the instruction which needs 3 clock cycles.1) 120 nano secs 2) 120 micro secs 3) 75 nano secs4) 75 micro secs 5) None of these
bsc4
succe
ss.co
m
Downloaded From: http://bsc4success.com
16. Which of the following is not an operating system call for process management?1) CREATE 2) DELETE 3) FORK/JOIN4) PCB 5) None of these
17. ER diagram is example of which data Model ?1) Generic Data Model 2) Semantic Data Model3) Relational Data Model 4) Special Data Model5) None of these
18. An array can be passed in a function in C language through-1) ‘Call by value’ only2) ‘Call by reference’ only3) Both ‘call by value’ and ‘call by reference’4) Tuple5) None of these
19. What is the output of the following ‘C’ program?main (){extern, int a;printf(“\n%d”,a)’}int a = 201) 0 2) 20 3) Error 4) Garbage value 5) None of these
20. Fragment Free Switches check ............bytes of data.1) 4 2)16 3) 24 4) 64 5) None of these
21. The range of the numbers that can be stored in 8 bits, if negative number are stored in 2’scomplement form, is1) –128 to + 128 2) –128 to 127 3) –127 to +1284) –127 to + 127 5) None of these
22. Choose the most appropriate definition of plane graph1) A graph drawn in a plane in such a way that any pair of edges meet only at their end vertices2) A graph drawn in a plane in such a way that if the vertex set of graph can be partitioned into
two non-empty disjoint subsets X and Y in such a way that each edge of G has one end inX and one end in Y
3) A simple graph which is isomorphic to a Hamiltonian graph4) All of the above5) None of these
23. Boolean algebra1) An algebraic system defined by Boolean lattice is known as a boolean algebra2) For boolean lagebra (x + y)= x. y3) For boolean algebra (x . y)= x + y4) All of the above5) None of these
bsc4
succe
ss.co
m
Downloaded From: http://bsc4success.com
24 ............ is a function that is expanded in line when it is invoked. That is, the compiler replacesthe function call with the corresponding function code.1) Memory allocation function 2) Member function3) Inline function 4) Default function5) None of these
25. A demand paging system with page table held in registers, takes 5 ms to service a page fault,if empty page is available or if the page is to replaced is not dirty. It takes 15 ms if the replacedpage is dirty. Memory access time is 1,s. Assume we want an effective access time 23,sand that the page to be replaced is dirty 60% of the time. What is the approximate page faultrate to meet this access time requirement?1) 0.1% 2) 1.0% 3) 2.5% 4) 0.01% 5) None of these
26. Packets are related to which layer1) Data link layer 2) Physical layer 3) Network layer4) Presentation layer 5) None of these
27. Feedback queue1) are very easy to implement2) dispatch tasks according to execution characteristics3) are used to favour real-time tasks4) require manual intervention to implement properly5) None of these
28. The main advantages of CMOS as compared to TTL1) lower consumption and better noise margins2) lower power consumption with low fan-out3) higher speed operation with low power consumption4) higher power consumption with high fan-out5) None of these
29. Rohan has an e-card that he uses to access different parts of his company’s R&D offices.What type of card is he using?1) Credit card 2) Purchase card 3) Smart card4) Contact card 5) None of these
30. Which of the following might be output as result of using a CASE tool?1) Programmable Code2) Flowcharts and data flow diagrams3) Prototypes and Cost/benefit analysis4) All of the above5) None of these
31. Which TTL sub-family has maximum speed1) Standard TTL 2) Schottky-clamped TTL 3) High speed TTL4) Low power TTL 5) None of these
32. Which of the following statements is wrong?1) no left recursive grammar can be LL1)
bsc4
succe
ss.co
m
Downloaded From: http://bsc4success.com
2) no LL 1) grammar can be ambiguous3) every LR1) grammar is an LL1) grammar4) every grammar can be converted into LR1)5) None of these
33. Each object is said to be ........ of its class.1) Attribute 2) Instance 3) Classification4) Operations 5) None of these
34. Warshall’s algorithm1) A directed graph G with M nodes is maintained in memory by its adjacency matrix A.2) This algorithm finds the boolean path matrix P of the graph G3) Both 1) and 2)4) Either 1) or 2)5) None of these
35. Which of the following is most general phase-structured grammer?1) Regular 2) Context-sensitive 3) Context-free4) All of the above 5) None of these
36. The correct hierarchical relationship among context-free, right-linear, and context-sensitivelanguage is given by1) context-free < right-linear < context-sensitive2) context-free < context-sensitive < right-linear3) context-sensitive < right-linear < context-free4) right-linear < context free < context-sensitive5) None of these
37. Which of the following fields in a student file can be used as a Primary Key?1) Class 2) Social Security Number 3) GPA4) Major 5) None of these
38. The ......... device provides a digital interface for connecting routers and digital circuits ?1) Channel service unit 2) Modem 3) Adapter4) Router 5) None of these
39. Handshaking is1) synchronous type 2) asynchronous 3) sequential4) All of these 5) None of these
40. The class of context-free languages is not closed under1) union 2) concatenation 3) repeated concatenation4) intersection 5) None of these
41. The process of macro-expanion is completely segregated from the process of assembly program.The translator which performs macro-expansions is called1) Macro Interpreter 2) Macro Pre-Processor 3) Macro Table4) All of the above 5) None of these
bsc4
succe
ss.co
m
Downloaded From: http://bsc4success.com
42. What is the output of the following C program?main (){int a[5] = {2,3};printf(“\n%d%d%d”,a[2], a[3],a[4]);1) Garbage Values 2) 2 3 3 3) 3 2 24) 0 0 0 5) None of these
43. Which one is not logical1) ORI 2) ORA 3) XRA 4) OVI 5) None of these
44. RISC processor have1) Relatively few instruction and addressing modes2) All operations done within the register and CPU3) Single cycle instruction execution4) All of these5) None of these
45. TCP means1) transmission content protocol 2) transfer control protocol3) transmission control protocol 4) all of the above5) None of these
46. How many bit can accomodate instruction register1) 8 bit 2) 16 bit 3) 32 bit 4) 4 bit 5) None of these
47. Let A = {l, 2, 3}, B = {a, b} and R= {(1, a), (1, b), (3, a), (2, b)} be a relation from A to B.The inverse relation R is1) R–1 = {(a, l), (b, l), (a, 3), (b, 2)]}2) R–1 = {(2, b), (3, a), (l, b), (l, a)}3) R1 = {(b, 2), (a, 3), (b, l), (a, l)}4) All of the above5) None of these
48. Yacc source program has 3 parts. Which of the following are Yacc source program parts?1) Terminal symbol, non-terminal symbol, production rule2) Declaration, translation rules, user routines3) Declaration, Translation rules, C programs4) All of the above5) None of these
49. A loading scheme in which loading and linking of external and references are postponed untilexecution time1) Direct linking loader 2) Dynamic loading 3) Dynamic linking4) Relocating loader 5) None of these
50. Back tracking problem is seen in1) predirective parser 2) LR parsar 3) recursive-descent parsar
bsc4
succe
ss.co
m
Downloaded From: http://bsc4success.com
4) All of the above 5) None of these
51. Firewall have1) two routers for packet filtering2) application gateway, it is used in application layer3) both 1 and 24) All of the above5) None of these
52. Which of the following is the correct simplification of Boolean expression A`BC + AC?1) BC+AC 2) BC+C 3) BC4) A`C 5) None of these
53. Scope of macro definition1) cannot be beyond the file in which it is defined2) may be part of a file3) is in the entire program4) a, b, d5) None of these
54. Cisco switches supports two different trunking protocols ................... and ................. bothproviding basic trunking.1) VLAN1 and VLAN2 2) Cisco 2950 and Cisco 19003) ISL and 802.1Q 4) Client and Transparent5) None of these
55. Which of the following language differ the case of alphabets?1) FORTRAN 2) BASIC 3) C4) All of the above 5) All of the above
56. Goal of a relational database design1) To generate a set of relation schemes that allow us to store information without unnecessary
redundancy2) Allows us to retrieve information easily3) Schemes that are in appropriate normal form4) All of the above5) None of these
57. On what platform is multithreading supported?1) IDL5.5 2) IDL 5.6 3) Support on all platform4) All of the above 5) None of these
58. The first version of UNIX was written by1) Dennis Ritchie 2) Andrew S. 3) Ken Thompson4) All of the above 5) None of these
59. Which of the following is used with databases?1) Data mining 2) EDI 3) Credit cards4) All of the above 5) None of these
bsc4
succe
ss.co
m
Downloaded From: http://bsc4success.com
60. Which operator has highest priority1) ( ) 2) [ ] 3) 4). 5) None of these
61. Match the following:List-I List-II(i) TTL (a) Unipolar(ii) ECL (b) PMOS connected in a complementary fashion(iii) MOS (c) 5 volts(iv) CMOS (d) High SpeedCodes:
(i) (ii) (iii) (v)1) a b c d2) b a d c3) c d a b4) d a c b5) None of these
62. To modify existing row of the table, .......... statement is used.1) ALTER 2) MODIFY 3) UPDATE 4) All of the above 5) None of these
63. The............. is an Interior Gateway Protocol that manage the exchange of routing of tableinformation.1) RIP 2) OSPF 3) IGRP 4) EIGRP 5) None of these
64. Recently which operating system launched its Hindi version?1) MINIX 2) LINUX 3) DOS 4) All of these 5) None of these
65. The receive equalizer reduces delay distortions using a 1) tapped delay time 2) descramber 3) difference engine4) All of the above 5) None of these
66. Bit is related to which layer1) physical layer 2) data link layer 3) network layer4) transport layer 5) None of these
67. n stage ripple counter can count up to1) 2n 2) 2n – l 3) n 4) 2n–1 5) None of these
68. Which of the following do you think is used to separate the base classes in a base class list?1) Comma (,) 2) Colon (:) 3) Semi-colon (;)4) Tilde (~) 5) None of these
69. Spatial locality refers to the problem that once a location is referenced1) a nearby location will be referenced soon2) it will not be referenced again.3) it will be referenced again4) All of the above5) None of these
bsc4
succe
ss.co
m
Downloaded From: http://bsc4success.com
70. What is the minimum number of wires needed to send data over a serial communication linklayer ?1) 1 2) 2 3) 4 4) 6 5) 7
71. To discard all pending data changes1) COMMIT 2) ROLLBACK 3) SAVEPOINT4) LOCK 5) None of these
72. When two numbers of n digits each are added and the sum occupies n + 1 digits, the situationis called1) Overflow 2) Underflow 3) Normal condition4) All of the above 5) None of these
73. An assembler is a1) Program2) Person who assembles the parts3) Symbol4) language5) None of these
74. Which of the following statement is not True?1) We use views to restrict data access2) We use views to make complex queries difficult3) We use views to allow data independence4) All of the above5) None of these
75. The base difference between broad band and baseband is1) availability 2) capacity 3) transmission 4) reliability 5) None of these
76. Whick of the following statements are true about doubly linked list?(i) It may be either linear or circular(ii) it must contain a header node(iii) it will occupy same memory space as that of linear linked list, both having same number of
nodes.1) only (i) 2) (ii) and (iii) 3) (i), (ii) and (iii)4) (i) and (iii) 5) None of these
77. Which one is false1) shift registers operate in serial fashion one bit at a time2) parallel processing techniques are economically feasible3) register with parallel load operate with all the bits of the word simultaneously4) all of the above are true5) None of these
78 .......... uses the Diffusing Update Algorithm to update the routing table.1) RIP 2) OSPF 3) IGRP 4) EIGR 5) None of these
79. A computer system having 64 K memory will have its last address as1) 65536 2) 64000 3) 65535 4) 65530 5) none of the above
bsc4
succe
ss.co
m
Downloaded From: http://bsc4success.com
80. Function definition void check (int i,char*j) is1) call by value 2) call by reference 3) both 1) and 2)4) invalid function definition 5) None of these
81. Which of the following is Network Security aspect?1) Patch management2) Firewalls3) Intrusion Detection System (IDS)4) All of the above5) None of these
82. The smallest element of an array’s index is called its1) Smallest bound 2) Lower bound 3) First bound4) Higher bound 5) None of these
83. Which of the following file name extension suggests that the file is Backup copy of an otherfile?1) TXT 2) COM 3) BAS4) BAK 5) None of these
84. McCall proposed which of the following quality factors?1) Correctness, Reliability, Usability, Integrity, Efficiency2) Maintainability, Flexibility, Testability3) Portability, Reusability, Interoperability4) All of the above5) None of these
85. A communications device that combines transmissions from several I/O devices into oneline is a:1) concentrator 2) modifier 3) multiplexer 4) full-duplex line 5) None of these
86. Which of the following commands can be used to get information about all users who arecurrently logged into the system?1) which 2) who 3) who am i 4) All of the above 5) None of these
87. A pilot can fly three types of planes and a plane can be piloted by any qualified pilot. The pilot-plane type relationship is1) N : 3 2) 3 : N 3) 1 : 3 4) 3 : 1 5) None of these
88. DES1) Data Encryption standard was widely adopted by the industry for use in security products2) It is no longer secure in its original form, but in a modified form it is still useful3) Plain text is encrypted in blocks of 64 bits4) All of the above5) None of these
89. How many transistor is LSI1) more than 100 2) more than 1000 3) more than 10,0004) more than 10 5) None of these
bsc4
succe
ss.co
m
Downloaded From: http://bsc4success.com
90. Match the following: List-I List-II(i) State Table (a) Strobe Control Method(ii) Locality of Reference (b) Booth Algorithm(iii) Asynchronous Data Transfer (c) Flip-flop(iv) 2S Complement Multiplication (d) CacheCodes:
(i) (ii) (iii) (v)
(i) (ii) (iii) (iv)1) a b c d2) d c b a3) c a d b4) c d a b5) None of these
91. At the business or enterprise level, the techniques associated with object oriented Analysis canbe coupled with an information engineering approach. This technique is often called1) Requirement Analysis2) Domain Analysis3) Entity Analysis4) Relationship Analysis5) None of these
92. Which is the correct statement regarding debit/smart card ?1) Banks are generally extending this facility to saving account with liquidity features.2) These cards facility are not extended to cash and loan account.3) Both 1) and 2).4) Debit card can be issued to PMRY beneficiaries.5) None of the above.
93. The network administrator Paul requires configuring a primary rate interface for the XYZ bankHyderabad branch. He needs to specify the switch type for ISDN while configuring PRI.Which command will he use?1) isdn switch-type basic-ni2) isdn switch basic-ni3) isdn switch-type pri-4ess4) isdn switch pri-4ess5) None of these
94. Which of the following is not a type of graph?1) Euler 2) Hamiltonian 3) Tree 4) Path 5) None of these
95. A video editing system for Linux1) DVDL 2) LIVES 3) VSL 4) LVS 5 ) None of these
96. What is the output of given C fragment program.if (a = 0)printf (“a is zero”);
bsc4
succe
ss.co
m
Downloaded From: http://bsc4success.com
elseprintf (“a is not zero”);1) a is zero2) prints nothing3) a is not zero4) Garbage value5) None of these
97. A system program that separately compiles modules of a program into a form suitable forexecution is1) Assembler 2) Linking loader 3) Cross compiler4) Load and go 5) None of these
98. Which of the following is not characteristic of a relational database model?1) Tables 2) treelike structure 3) complex logical relationship4) records 5) None of these
99. concept of developing a compiler for a language by using subsets of the same language1) Bootstrap 2) Lex 3) Yacc 4) Analyzer 5) None of these
100. Which of the following software tool is a parser generator?1) Lex 2) Yacc 3) Both 1 and 2 4) Either 1) or 2) 5) None of these
101. You are writing classes that will bypass the operating system which directly access severalsystem resources, such as memory and disk drives. Which language is probably the best?1) C++ 2) Cobol 3) Java 4) Small talk 5) None of these
102. Which of the following performs modulation and demodulation?1) Fiber optic 2) satellite 3) coaxial cable4) modem 5) none of the above
103. VSAT means1) Very Small Amplitude Transmission2) Very Small Apertual Terminal3) Very Small Apertual Transmission4) Very Small Amplitude Terminal5) None of these
104. In fiber optics index angle is1) less than cladding angle2) greater than cladding angle3) equal to the cladding angle4) All of the above5) None of these
105. Speed of optical fiber depends on1) number of photon 2) dispersion 3) attenuation4) All of these 5) None of these
bsc4
succe
ss.co
m
Downloaded From: http://bsc4success.com
106. When both inputs are different, then output is high in1) NAND GATE 2) NOR GATE 3) OR Gate4) EX-OR Gate 5) None of these
107. In a synchronous modem, the digital-to-analog converter transmits signal to the1) equalizer 2) modulator 3) demodulator4) terminal 5) none of the above
108. The function of a database is1) to check all input data2) to check all spelling3) to collect and organize input data4) to output data5) None of these
109. The ............ command enables you to switch from the user mode to privileged mode.1) enable 2) disable 3) config 4) switch 5) None of these
110. Railway reservation is example of1) On line system 2) Off line system 3) batch processing4) time sharing 5) None of these
111. A relation schema is said to be in ............ form if the values in the domain of each attribute ofthe relation are atomic.1) Unnormalized 2) First Normal 3) Boyce Codd4) All of these 5) None of these
112. Which kind of lock includes a keypad that can be used to control access into areas ?1) Cipher 2) Warded 3) Device 4) Tumbler 5) Typelock
113. Which gate is known as Universal gate?1) NOT gate 2) AND gate 3) NAND gate4) XOR gate 5) None of these
114. Context switching changes the process mode from1) user to kernel mode2) kernel to user mode3) kernel mode to the k process4) both 1 and 25) None of these
115. UNIX operating syste based on1) Language structure 2) Kernel approach 3) Virtual machine4) Time sharing 5) None of these
116. Type checking is normally done during1) Lexical analysis 2) Syntax Analysis 3) Syntax directed translation4) Code optimization 5) None of these
117. How many NAND gates are needed to perform the logic function X.Y?
bsc4
succe
ss.co
m
Downloaded From: http://bsc4success.com
1) 1 2) 2 3) 3 4) 4 5) None of these
118. Wait and notify used in1) A synchronous method2) Synchronous method3) Sequential method4) Parallel method5) None of these
119. HTTP means1) Hypertext transfer protocol2) Hypertext transmission protocol3) Hypertension transfer protocol4) All of the above5) None of these
120. Which directory implementation is used in most Operating System ?1) Single level directory structure2) Two level directory structure3) Tree directory structure4) Acyclic directory structure5) None of these
121. Which of the following printers cannot print graphics?1) Ink-jet2) Daisywheel3) Laser4) Dot-matrix5) None of these
122. The............. command enables you to change the name for the router.1) hostname 2) name 3) banner 4) router 5) None of these
123. Software quality metrics like productivity metrics, focus on the1) Process 2) Project 3) Product 4) All of these 5) None of these
124. When ray passes through fused silica to air, the ray is refracted, then light trapped by1) refraction 2) reflection 3) total internal reflection4) All of the above 5) None of these
125. Which one is input device1) DVD 2) Trackball 3) Digitizers 4) All of the above 5) None of these
126. The model for a record management system might be1) handwritten list 2) a Rolodex Card file 3) a business form4) All of the above 5) None of these
127. Which of them is not a valid DBMS Data Model ?1) Relational 2) Hierarchical 3) Complex 4) Network 5) None of these
bsc4
succe
ss.co
m
Downloaded From: http://bsc4success.com
128. Which of the following consists of an array of gates which can be used to patch an error in aROM or alter the meaning of instruction1) RAM 2) EAPROM 3) PLA 4) PSW 5) None of these
129. The ........ comand enables you to set encrypted passwords for the privileged mode.1) line console 2) line vty 3) enable password4) enable secret 5) None of these
130. Actions are performed in an object oriented systems by sending ....... to an object.1) Statements 2) Messages 3) Control 4) All of these 5) None of these
131. In K-map, the adjacent squares represent minterms that differ by1) One variable 2) Two variable 3) Three variable4) All of these 5) None of these
132. Data transfer rate of a double density floppy disk is about1) 5K bits/sec 2) 50K bits/sec 3) 500K bits/sec4) 5000K bits/sec 5) None of these
133. How many bits are required to encode all 26 letters, 10 symbols and 10 numerals1) 5 2) 6 3) 7 4) 46 5) None of these
134. Which of the following operator is used to access the value of structure pointer?1) 2) & 3) * 4) . 5) None of these
135. If initialization is a part of declaration of a structure, then the storage class can be1) automatic 2) register 3) static 4) anything 5) None of these
136. The ................ model remains operative until the software is retired.1) Waterfall 2) Incremental 3) Spiral 4) All of these 5) None of these
137. When a cracker attempts to misuse or steal data from a system, it is called1) Stealing 2) Intrusion 3) Virus 4) All of these 5) None of these
138. Which of the following does not allow multiple users or devices to share one communicationline?1) double-plexer 2) multiplexer 3) concentrator 4) controller 5) None of these
139. One can display all columns of data in a table by following the SELECT keyword with1) + 2) * 3) – 4) ? 5) None of these
140. Raid configuration of disks are used to provide1) Fault tolerance 2) High speed 3) High data density4) All of the above 5) None of these
141. 8085 memory is1) 1 M byte 2) 64 Kbte 3) 64 K bit 4) 64 byte 5) None of these
142. Link encryption
bsc4
succe
ss.co
m
Downloaded From: http://bsc4success.com
1) is more secure than end to end encryption2) is less secure than end to end encryption3) cannot be used in public network4) is used only to debug5) None of these
143. HDLC is1) Bit oriented 2) Code transparent 3) Code dependent4) All of the above 5) None of these
144. What is the name of the printer which print all the As in a line before all the B’s?1) Thermal printer 2) Electrostatic printer 3) Line printer4) Ink-jet printer 5) None of these
145. Fiber optics frequency have1) 105 to 107 2) 106 to 109 3) 109 to 1011
4) 1014 to 1015 5) None of these
146. Which one is related to modulator and demodulator1) multiplexer 2) decoder 3) encoder4) modem 5) None of these
147. Seeta has an e-card that she uses to purchase office supplies for the company she works for.What type of smart card is she using?1) Credit card 2) Purchase card 3) Smart card4) Contact card 5) None of these
148. Stack is sometimes called a1) Push down list 2) Pushdown array 3) Pop down list4) Pop up array 5) None of these
149. Periodically adding, changing and delecting file records is called file1) Updating 2) Upgrading 3) Restructuring4) History file 5) None of these
150. What is hamming distance code for correcting?1) 2d + l 2) d + 1 3) 2d + 3 4) d + 3 5) None of these
151. Subnet Mask of class A is1) 255.0.0.0 2) 192.0.0.0 3) 255.0.0.1 4) 224.0.0.0 5) None of these
152. The relational model includes two general integrity rules. Integrity rule 1 is concerned with......... and integrity rule 2 is concerned with .........1) Primary key, Foreign key2) Composite key, Primary key3) Foreign key, Primary key4) Transaction key, Foreign key5) None of these
bsc4
succe
ss.co
m
Downloaded From: http://bsc4success.com
153. Which is the output of the following program fragment in C?int x, y =2, z, a ;x = (y* = 2) + (z = a = y);printf (“% d”, x);1) 7 2) 8 3) Garbage value 4) Error 5) None of these
154. In comparison with static RAM memory, the dynamic RAM memory has1) lower bit density and higher power consumption2) higher bit density and higher power consumption3) lower bit density and lower power consumption4) higher bit density and lower power consumption5) None of these
155. V.241) It is similar to multiplexer2) It is similar to Modem3) It is similar to Demultiplexer4) All of the above5) None of these
156. The ABC bank needs to decide on a routing protocol for its large enterprise networks. Thebank has a mixed vendor environment and may need to replace any of its existing routers. Itneeds to follow the bank policy and requires an open standard routing protocol. Which routingprotocol will you implement for the ABC bank1) OSPF 2) RIP 3) IGRP 4) EIGRP 5) None of these
157. Which of the following operators can be overloaded in C++?1) Scope resolution operator2) Size of operator3) Conditional operator4) Arithmetic operator5) None of these
158. A multiplexer with a 4 bit data select input is a1) 4 : 1 multiplexer 2) 2 : 1 multiplexer 3) 16 : 1 multiplexer4) 8 : 1 multiplexer 5) None of these
159. Which of the following is an advantage to using fibre optics data transmission ?1) resistance to data theft2) fast data transmission rate3) low noise level4) all of these5) None of these
160. An interactive computer system1) It provides on line communication between user and system2) user gives instruction to the operating system or to a program directly, and receives an
immediate response3) both 1) and 2)4) None of these
bsc4
succe
ss.co
m
Downloaded From: http://bsc4success.com
5) None of these
161. Which of the following is different from the group?1) Private 2) Protected 3) Public 4) Friend 5) None of these
162. Which of the following sorting method is stable?1) Straight insertion sort2) Binary insertion sort3) Shell sort4) Heap sort5) None of these
163. Which of the following C++ statement is correct?1) int*p = new int2) int new = *p3) int*new = *p4) int*p = int new5) None of these
164. The ....... metric specifies the amount of data that can travel over the network segment.1) Hops 2) Load 3) Delay 4) Bandwidth 5) None of these
165. Length of the walk of a graph is1) The number of vertices in walk W2) The number of edges in walk W3) Total number of edges in a graph4) Total number of vertices in a graph5) None of these
166. Each item in a linked list is called1) Element 2) Information 3) Data 4) Node 5) None of these
167. ............. is the situation in which a process is waiting on another process, which is also waitingon another process, which is waiting on the first process. None of the processes involved inthis circular wait are making progress.1) Deadlock 2) Starvation 3) Dormant 4) All of the above 5)None of these
168. Consider a machine with 64 MB physical memory and a 32 bit virtual address space. If thepage size is 4 KB, what is the approximate size of the page table?1) 16 MB 2) 8 MB 3) 2 MB 4) 24 MB 5) None of these
169. The access time of magnetic bubble memory is approximately1) 30 ns 2) 30 ms 3) 30 ms 4) 0.3 sec 5) None of these
170. Which of the following gates would output 0 if inputs are equal.1) NAND 2) NOR 3) EX-OR 4) OR 5) None of these
171. Which of the following is not a page replacement algorithm?1) LIFO 2) FIFO 3) LRU 4) Optimal 5) None of these
bsc4
succe
ss.co
m
Downloaded From: http://bsc4success.com
172. Subnet is related to which layer1) data link layer, Network layer, transport layer2) physical layer, Network layer, transport layer3) network, transport, physical layer4) all of the above5) None of these
173. Parsing can be1) Top-down 2) Bottom up 3) Both 1) and 2) 4) Either 1) or 2) 5) None of these
174. What is the alternative name for a diskette?1) Winchester disk 2) flexible disk 3) hard disk4) floppy disk 5) None of these
175. A tree having a main node, which has no predecessor is1) Spanning tree 2) Rooted tree 3) Weighted tree4) All of the above 5) None of these
176. If an entity appears in not more than 5 relationships then it is a :1) 1 : 1 relationship 2) 1 : 5 relationship 3) 5 : 1 relationship4) 5 : 5 relationship 5) None of these
177. The.......... metric measures traffic over the network.1) Hops 2) Load 3) Delay 4) Bandwidth 5) None of these
178. In a JK flip-flop, if J = K, the resulting flip-flop is referred to as a1) D flip-flop 2) T flip-flop 3) S-R flip-flop4) All of the above 5) None of these
179. The XYZ bank has all Cisco routers connected in the network. A host connects to a routerthrough telnet connection. Which command will the administrator Robert uses to print themessages or the console part:1) terminal monitor 2) terminal print 3) console print4) console monitor 5) None of these
180. In C++ a function contained in a class is called1) Member function 2) an operator 3) a class function4) a method 5) None of these
181. In data transmission, the bit coding scheme used to represent a byte is typically1) EBCDIC 2) ASCII 3) SNA4) Hexadecimal 5) None of these
182. An unnormalized relation contains values1) Atomic 2) Non-atomic 3) Classified4) All of the above 5) None of these
183. Memory protection is normally done by1) the processor and the associated hardware
bsc4
succe
ss.co
m
Downloaded From: http://bsc4success.com
2) the operating system3) the compiler4) the user program5) None of these
184. Most significant bit is1) S 2) CY 3) Z 4) P 5) None of these
185. When any positive integer is divided by zero, then error be catch by at1) Compiler time 2) Intrepreter 3) Debugging 4) Run time 5) None of these
186. What is the min number of two input NAND gates used to perform the function of two inputOR gate?1) 1 2) 2 3) 3 4) 4 5) None of these
187. An audit trail1) is used to make back-up copies2) is the recorded history of operations performed on a file3) can be used to restore lost information4) none of the above5) None of these
188. Gopher is1) Gopher was text only global set of linked menus and files2) Gopher is a browser3) Both 1 and 24) Either 1) or 2)5) None of these
189. The sum of weights in self complement BCD code is1) 8 2) 9 3) 10 4) 16 5) None of these
190. Port number of HTTP is1) 25 2) 80 3) 125 4) 123 5) None of these
191. Consider two regular languages L1= (a + b) *a and L2 = b(a + b)*. The intersection of L1 andL2 is given by1) (a+b)*ab 2) ab(a+b)* 3) a(a+b)*b 4) b(a+b)*a 5) None of these
192. Which of the following is not functionally a complete set?1) AND, OR 2) NOR 3) NAND4) AND, OR, NOT 5) None of these
193. Thedesign goal refers to the ability of the routers to agree on optimal routes.1) Robustness 2) Flexibility 3) Convergence4) Optimal Route 5) None of these
194. Which of the following TCP/ IP protocol is used for remote terminal connection services?1) TELNET 2) FTP 3) RARP 4) UDP 5) None of these
bsc4
succe
ss.co
m
Downloaded From: http://bsc4success.com
195. Which of the following TCP/ IP protocol is used for transferring electronic mail messages fromone machine to another?1) FTP 2) SNMP 3) SMTP 4) RPC 5) None of these
196. Software design is1) Process 2) Model 3) Both 1) and 2) 4) Either 1) or 2) 5) None of these
197. Smart card1) has an integrated with micro processor chip embedded in it so it could perform calculation
and maintain records2) has built for protection against fraudulent operations3) can either be recharge or exchangeable4) All of the above5) None of these
198. Which of the following calls never returns an error1) getpid 2) fork 3) ioctl 4) open 5) None of these
199 .................. time is expressed as turnaround time less actual execution time.1) Response 2) Waiting 3) CPU 4) Process 5) None of these
200. Port number of SMTP is1) 25 2) 80 3) 123 4) 243 5) None of these
ANSWERS
1. 3 2. 2 3. 1 4. 1 5. 26. 3 7. 3 8. 1 9. 3 10. 411. 4 12. 2 13. 1 14. 2 15. 116. 4 17. 2 18. 3 19. 4 20. 421. 2 22. 1 23. 4 24. 3 25. 426. 3 27. 2 28. 1 29. 3 30. 431. 2 32. 4 33. 2 34. 3 35. 236. 4 37. 2 38. 1 39. 2 40. 441. 2 42. 4 43. 4 44. 4 45. 346. 2 47. 1 48. 3 49. 3 50. 351. 3 52. 1 53. 4 54. 3 55. 356. 4 57. 3 58. 3 59. 1 60. 161. 3 62. 3 63. 1 64. 2 65. 166. 1 67. 2 68. 1 69. 1 70. 271. 2 72. 1 73. 1 74. 2 75. 276. 1 77. 4 78. 4 79. 3 80. 381. 4 82. 2 83. 4 84. 4 85. 386. 2 87. 1 88. 4 89. 2 90. 491. 2 92. 3 93. 3 94. 4 95. 2
bsc4
succe
ss.co
m
Downloaded From: http://bsc4success.com
96. 3 97. 2 98. 2 99. 1 100. 2101. 2 102. 4 103. 2 104. 1 105. 1106. 4 107. 1 108. 3 109. 1 110. 1111. 2 112. 1 113. 3 114. 4 115. 2116. 3 117. 2 118. 4 119. 1 120. 3121. 2 122. 1 123. 4 124. 3 125. 4126. 4 127. 3 128. 3 129. 4 130. 2131. 1 132. 3 133. 2 134. 1 135. 3136. 3 137. 2 138. 1 139. 2 140. 1141. 2 142. 2 143. 1 144. 3 145. 2146. 4 147. 2 148. 1 149. 1 150. 1151. 1 152. 1 153. 2 154. 4 155. 2156. 1 157. 4 158. 3 159. 4 160. 3161. 4 162. 1 163. 1 164. 4 165. 2166. 4 167. 1 168. 3 169. 3 170. 3171. 1 172. 1 173. 3 174. 4 175. 2176. 2 177. 2 178. 2 179. 1 180. 1181. 2 182. 2 183. 1 184. 1 185. 4186. 3 187. 2 188. 3 189. 2 190. 2191. 4 192. 1 193. 3 194. 1 195. 3196. 3 197. 4 198. 1 199. 2 200. 1