1 Given references to the following pages by a program 0,1,4,2,0,2,6,5,1,2,3,2,1,2,6,2,1,3,6,2 Number of page faults will occur, if the program has 3 page frames available to it and uses. What is optimal replacement? a) 7 b) 9 c) 11 d) 13 e) 15 Ans: b 2 The graph K (3, 4) is complete bipartite graph has a) b) c) d) e) 3 edges 4 edges 8 edges 10 edges 12 edges
Ans e
3. The database schema is written in a) HLL b) DML c) DDL d) DCL e) None of these Ans C)
4. What is average waiting time in FCFS of given process p1, p2, p3, p4 if execution time 5, 10, 8, 3 and turnaround time are 5, 15, 23, 26 a) 10
6. In a circular linked list a) Components are all linked together in some sequential manner b) There is no beginning and no end c) Components are arranged hierarchically d) Forward and backward transversal within the list is permitted e) None of the above Ans b 7. The statement in SQL which allows to change the definition of a table is
a) Alter b) Update c) Create d) Select e) None of these Ans a )Alter
b) 2t c) t
(h-1)
( h-1)
d) 2t
(h+1)
10. which of the following can be sequence of nodes examined in a binary search tree while searching for key 98? a) 100, 50, 75, 60, 98 b) 100, 120, 90, 95, 98 c) 200, 70, 100, 95, 98 d) 75, 150, 90, 80, 98 e) None of these Ans c
11. What protocol is used between E- mail servers? a) FTP b) SMTP c) SNMP d) POP3 e) None of these
example of a) Bubble sort b) Selection sort c) Insertion sort d) Merge sort e) None of above Ans c
13. Which phase is not available in software life cycle? a) Coding b) Testing c) Design d) Abstraction e) Maintenance Ans- d)
14. Which type of error detection uses binary divasion? a) Parity check b) Longitudinal Redundancy checking ( LRC) c) Checksum checking d) Cyclic Redundancy Checking (CRC) e) None of the above Ans d 15. Basis path testing is a) both Black and white box b) White box testing method c) Black box testing method
Ans: c
18. The process known as ----------- is used by large retailers to study trends. a) Data mining b) Data selection c) POS d) Data conversion e) None of the above Ans a
19 . Accessing records from a file directly without searching from the beginning of the file is (a) Time sharing (b) Random (c) Direct access (d) Access time (e) None of above Ans: (c)
20. Bankers algorithm for resource allocation deals with (a) Dead look preventation (b) Dead look avoidance (c) Dead look recovery
22. In TCP/IP protocol check sum field contains ------------ bit value that use for --------------. a) 32 bit, dead lock avoidance b) 48 bit , error detection c) 16 bit, error detection d) 16 bit dead lock avoidance e) None of these. Ans c
23. Granting an outside organisation access to Internet web pages is often implemented using a (an) (a) Extranet (b) Intranet (c) Internet (d) Hacker (e) None of these ANS: (a)
24. The advantage of packet switching over message switching a) The first packet of multipacket message can be forwarded before the second one has fully arrived b) reduce delay and improving throughput c) not required advance setup d) All of the above e) None of the above
25. The Third generation computers were based upon (a) transistors (b) ICs (c) valves (d) chips (e) none of the above Ans : b 26. Generalization is _________ process. a) Top-down b) Bottom-up c) Both(a) and (b) d) vertical process e) None of the above Ans:- b)
27 Spooling is most beneficial in a multiprogramming environment where: a) Most jobs are CPU-bound b) Most jobs are I/O bound c) Jobs are evenly divided as I/O- bound and CPU- bound d) There is limited primary memory and need for secondary memory e) None of the above Ans c
*28. A Flip-flop can store a) one bit of data b) Two bits of data c) Three bits of data d) Any number of bits of data e) All of above Ans: a)
34. Object oriented programming relies on three basic concepts: a) data abstraction, inheritance, and array b) data abstraction, inheritance and polymorphism c) I/O , Inheritance and polymorphism
43 Slotted ALOHA
a ) Divide time into discrete intervals b) Require global time synchronization c) Used for data transfer d) All of above e) None of above Ans a
44. What type of technology allows you to use your finger, eye, or voice print to secure your information resources? A) B) C) D) E) Haptics Caves Biometrics RFID None of the above
Ans: c) Biometrics 45. A _____ can be used as a connecting device between two internetworks that use different models. A) B) C) D) E) repeater bridge router gateway hub
Ans: d) gateway 46. IP address classified into five classes A, B, C, D, E. what is address range of class B? a) 0.0.0.0 b) 128.1.0.1 c) 244.0.0.0 d) 192.0.1.1 to 126.255.255.255 to 191.255.255.255 to 239.255.255.255 to 223. 255.255.255
49. which of the following TCP/IP protocol is used for remote terminal connection service ? a) Telnet b) RARP c) FTP d) None of the above Ans a 50. RSA algorithm a) Support Encryption and digital signature b) Encrypt the checksum c) Support Source authentication