10. The scientist who discovered that the earth revolves round the sun
Copernicus.
11. ECG is an instrument used in the study of
Heart.
12. Ecology is the branch of science which deals with
Balance of Nature
13. The district in which the central root research institute is situated.
Thiruvananthapuram
14. Rainbow is caused due to
Refraction and dispersion .
15. What is the full form of LPG?
Liquified Petroleum Gas.
16. Leaves are green due to the presence of
Chlorophyll.
LD CLERK (WAYANAD)
L D Clerk (Kollam)-1998
2. The first Operating System used in Microprocessor based system was : CP/M
4. A byte addressable computer has memory capacity of 4096 KB and can perform 64
operations. An instruction involving 3 memory operands and one operator needs :
72 bits
6. The addressing mode used in the stack related instruction PUSH B is : Register indirect
8. An assembler that runs on one machine, but generating code for another machine is called :
Cross assembler
9. A computer with a 32 bit wide data bus implements its memory using 8 K x 8 static RAM
chips. The smallest memory that this computer can have is : 32 KB
10. To construct a binary Mod-N counter, the number of flip-flops needs is : Log2N
11. The total number of possible ordered trees using 3 nodes A,B,C is : 12
14. The execution time of a recursive algorithm is given as ; T(n)=c+T(n-1), if n>1 =d, if n≤1.
The order of the algorithm is : n
15. Assuming 2 sorted lists of sizes ‘S1 ’ and ‘S2’, the worst case number of comparisons
needed by the merge sort algorithm is : S1+S2 -1
16. If an M x N matrix is stored in column major form, the index calculation required to
access the (i, j)th entry is : M .(j-1)+i
17. Four different algorithms L1, L2, L3 and L4 with orders of log(n), log{log(n)}, n log(n)
and n/log(n) respectively have been proposed to solve a specified problem.
18. The principle of locality of reference is cited to justify the usage of : Cache memory
19. On a particular system, using Quick sort, if it takes 100 msec to sort 1000 records, time
taken to sort 100 records will be : 6.7msec
20. In traversing a tree using Breadth First Search, the data structure used is : Queue
22. The part of a program which accesses a shared resource and which should be executed
indivisibly is called : Critical section
23. In a database design, if every non-key attribute is functionally dependent on the primary
key, then the relation will be in : Third normal form
24. An attribute of one table matching the primary key of another table is known as : Foreign
Key
25. Given the functional dependencies X →Y; Y→Z; X →W and Z →AB, which of the
following does not hold good : W → Z
27. In SQL databases, the memory area used for internal processing is called : Cursor
28. The number of relationships in which an entity can appear in an E-R diagram is called its :
Cardinality
29. The process of analyzing, archived data to obtain tactical and strategic information is
often called : Data mining
30. If a relation is in Boyce-Codd normal form, then it is also in : 3rd Normal form
32. In an OS, the process of buffering data intended for a peripheral device, onto a disk area,
for later bulk transfer is known as : Spooling
33. Kernel in Operating System is : A set of primitive functions upon which OS functions are
built.
34. Which of the following scheduling policy is most suited for a time sharing OS : Round
Robin
35. For real time OS, which of the following is the most suitable scheduling scheme :
Preemptive
36. In a paged memory, access times of primary and secondary memories are 10ns and 100ns
respectively. If the average access time is 23.5 nsec, hit ratio is : .85
37. The size of the virtual memory depends on the size of : Address bus
38. Three processes A, B, C have peak time demands of 3, 4, 6 resource units respectively of
a particular type. What is the minimum number of resources to be provided
39. A computer has 8 MB in main memory, 128 KB cache with block size of 4KB. If direct
mapping scheme is used, how many different main memory blocks can map into
40. The technique that allows only one user to work with a file at a particular time is called :
Locking
42. MS-DOS makes use of a hardware ROM containing device drivers called : BIOS
43. In UNIX, which of the following system calls transform an executable binary file into a
process : Exec
47. Unix and MS-DOS file system differ in the following feature : Mounted file systems
49. In UNIX ‘link’ refers to : New directory entry pointing to an existing file
50. For implementing recursion in a programming language, its compiler uses the following
data structure extensively : Stack
51. In a hypothetical language, assume that all arithmetic operators have equal precedence
and associate to the left. The expression 6x3-2-1x2 evaluates to : 18
55. In JAVA , after execution of the following statements, the values of x, m, and n will be :
int x, m, n;
m=10;
n=15;
x=++m +n++; : x=26, m=11,n=16
byte x=64, y;
y=(byte)(x<<2);
system.out.println(y); : 0
58. Which of the following typecasts result in loss of information : float to int
59. JAVA toolkit package containing classes that implement platform independent GUI is :
AWT
61. A program Graph has ‘start’ and ‘end’ nodes. The total number of paths from start to end
is equivalent to the -----------set of test data required to test the software
: minimum
62. In a Program Graph, ‘X’ is an if-then-else node. If the number of paths from start node to
X is ‘p’ number of paths from if part to end node is ‘q’ and from else part
to end node is ’r’, the total number of possible paths through X is : P(q+r)
63. The quality of a software which causes it to continue to operate despite application of
invalid input is called : Robustness
64. A program P calls 2 subprograms P1 and P2. If P1 can fail 50% of the times and P2, 40%
of the times, P can fail -----------of the times : 70%
65. Consider a Program Graph (PG) with statements as nodes and control as edges. Which of
the following is not true for any PG : Always acyclic
66. In program design, if the number of conditions in a decision table is ‘n’, the maximum
number of rules(columns) possible is : 2n
67. In Data Flow Diagrams(DFD), the procedure of expanding a process in the DFD into a set
of equivalent smaller processes is called : levelling
69. In Object Oriented Software Design, which of the following is not true : An object can
belong to 2 classes
72. In C, puts (arg V[0]; prints the : File name of executable code file
76. The mode of communication in which transmission can be bidirectional. But in only one
direction at a time is called : Half Duplex
77. Error detection at the data link layer is achieved using : CRC codes
78. In Serial communication, start and stop bits are used for : Synchronization
81. In a computer network, functions of dialog management and synchronization are taken
care of in the : Session’s layer
82. Which of the following topologies has the highest reliability : Mesh
85. The topmost layer in the ISO model that needs to be implemented in an intermediate node
is the -----------layer : Network
87. Data rate of a ring network is 20Mbps and signal propagates at 200m/µsec. The number of
bits that can be placed on the channel of length 200km is : 20000bits
88. The frequency range over which coaxial cables are typically used is : 106 to 108 Hz
89. In internet, the well known port 21 refers to the application : FTP
90. The maximum data rate possible through a noise free 4 kHz binary channel is : 8000 bps
91. The transparency provided in a distributed system where users cannot tell how many
copies of a resource exist is termed as : Replication transparency
92. Which of the following configurations can be said to be tightly coupled : Shared memory
multiprocessors
94. Assume there are 4 file servers each with a 0.95 chance of being up at any instant.
Probability of at least one being available is : 1-(.05)4
95. Which of the following category of classification of multiple computer systems is not
generally used in practice : MISD
96. In a distributed system, to ensure that concurrent transactions do not interfere with each
other, the transactions must have the following specific property :
Serializability
99. Which of the following denotes a network management protocol in an internet : SNMP
Disclaimer : E & OE
The informations furnished here is based on various media like Newspaper, Radio, Television
& web. Make sure that the answers are correct.
Posted by Faisal qblpindia at 5:51 AM 0 comments
SUNDAY, JUNE 7, 2009
Google Founded in 1998 by Stanford Ph.D. students Larry Page and Sergey Brin.
Toner
<!--[if !supportEmptyParas]-->
Malware
<!--[if !supportEmptyParas]-->
Thermal
BIS
<!--[if !supportEmptyParas]-->
Xerox
<!--[endif]-->
<!--[if !supportEmptyParas]-->
<!--[if !supportEmptyParas]-->
Race condition
<!--[if !supportEmptyParas]-->
8. A 56k modem can transfer data at up to bits per second over the phone line.
56000
<!--[if !supportEmptyParas]-->
<!--[if !supportEmptyParas]-->
ANSI
<!--[endif]-->
10. ________Is a signaling method that handles a relatively wide range of frequencies.
<!--[if !supportEmptyParas]-->
Broadband
25
<!--[if !supportEmptyParas]-->
Firewall
<!--[if !supportEmptyParas]-->
<!--[if !supportEmptyParas]-->
15. Which among the following utilities can detect a bad sector?
<!--[if !supportEmptyParas]-->
<!--[if !supportEmptyParas]-->
Twisted pair
<!--[if !supportEmptyParas]-->
17. A head crash is said to occur when the read-write head of a hard disk drive:
<!--[if !supportEmptyParas]-->
80
<!--[if !supportEmptyParas]-->
<!--[if !supportEmptyParas]-->
Slides
<!--[if !supportEmptyParas]-->
BIOS
<!--[if !supportEmptyParas]-->
<!--[if !supportEmptyParas]-->
OLE
<!--[if !supportEmptyParas]-->
<!--[if !supportEmptyParas]-->
Vista
<!--[if !supportEmptyParas]-->
Boot loader
<!--[if !supportEmptyParas]-->
8259
<!--[if !supportEmptyParas]-->
<!--[if !supportEmptyParas]-->
TV tuner
Fire Wire
<!--[if !supportEmptyParas]-->
28 'Windows protection error' messages may result from:
<!--[if !supportEmptyParas]-->
<!--[if !supportEmptyParas]-->
<!--[if !supportEmptyParas]-->
<!--[if !supportEmptyParas]-->
<!--[if !supportEmptyParas]-->
Spamming
<!--[if !supportEmptyParas]-->
<!--[if !supportEmptyParas]-->
<!--[if !supportEmptyParas]-->
Clusters
<!--[if !supportEmptyParas]-->
34 The utility which can be used to clean the windows registry is:
<!--[if !supportEmptyParas]-->
regedit
<!--[if !supportEmptyParas]-->
36. Ultra Wide SCSI had a throughput of: (A) 10 MB/s
40 MB/s
<!--[if !supportEmptyParas]-->
<!--[if !supportEmptyParas]-->
<!--[if !supportEmptyParas]-->
<!--[if !supportEmptyParas]-->
POP3
<!--[if !supportEmptyParas]-->
Audio codec
<!--[if !supportEmptyParas]-->
Network authentication
<!--[if !supportEmptyParas]-->
AMD
QNX
<!--[if !supportEmptyParas]-->
China
<!--[if !supportEmptyParas]-->
<!--[if !supportEmptyParas]-->
<!--[if !supportEmptyParas]-->
DHCP
<!--[if !supportEmptyParas]-->
<!--[if !supportEmptyParas]-->
48. is the brand name for 64-bit Intel microprocessors with IA-64 architecture.
Itanium
<!--[if !supportEmptyParas]-->
IETF
Hot swapping
Minister for Education and Culture M A Baby announced Malayalam Film awards
for 08
-----------------------------------------------------------------------------------
Best Film : ‘ Oru Pennum Randanum ‘
Best Director : Adoor Gopalakrishnan
Best script writer : Adoor Gopalakrishnan
Best Actor : Lal ( for his role as a policeman in 'Thalapavu' )
Best Actress : Priyanka (for her role in 'Vilapangalkapuram' )
Best second film: Bhomi Malayalam directed by T V Chandran
Second best actress : Praveena
Second best actor: Anoop Menon
Best story wrtiter: Aryadan Shoukath, Vilapangalkappuram
Best article on cinema : Vadakkan Pattu Cinimakal by P S Radhakrishanan
Best playback singer (Femala):Manjari ,Vilapangalkappuram
Best playback singer (Male): Shankar Mahadevan ( Madampi )
Best music director: M Jayachandran ( Madampi )
Best lyricist : ONV Kurup , Gulmohar
Best child artist: Nivedha Thomas ( Veruthe Oru Bharya )
Best polpular film: Innathe Chintha Vishayam