Anda di halaman 1dari 16

MODEL QUESTION PAPER - 1

Time:75 Minutes

1. One of the major difference between a combinational logic circuit such as a decoder and
a storage circuit such as an RS latch is that

A) The storage circuit requires a different class of gates


B) The storage circuit requires a clock input.
C) The storage circuit uses feedback
D) The storage circuit has no propagation delay

2.

3.

4.
5.

6.

7.

8.

9.

10. The amount of ROM needed to implement a 4 bit multiplier is


(A)64bits
(B)128bits
(C)1Kbits
(D) 2 Kbits

11. How many 32K x 1 RAM chips are needed to provide a memory capacity of 256K-bytes?
A) 8
B) 32
C) 64
D) 128
12.

13.

14.

15.

16.

17.

18.

19.

20.
21) Consider a 32 bit microprocessor with a 16 bit external data bus,driven by 8 Mhz input
clock. Assume that microprocessor has a bus cycle whose minimum duration equals to
four input clock cycle. What is the maximum data transfer rate for this micro processor.
A. 8x10 6bytes /sec
B. 4x10 6 bytes/sec
C. 16x 10 6 bytes/sec
D. 10x 10 6 bytes/sec

22. In an 8085 microprocessor system with memory mapped I/O

A. I/O devices have 16 bit addresses


B. I/O devices are accessed using IN and OUT instructions
C. There can be a maximum of 256 input devices and 256 output devices
D. Arithmetic and logic operations can be directly performed with the I/O data

23.

24. In an 8085 microprocessor, the instruction CMP B has been executed while the content of
the accumulator is less than that of register B. As a result,
A. Carry flag will be set but Zero flag will be reset
B. Carry flag will be reset but Zero flag will be set
C. Both Carry flag and Zero flag will be reset
D. Both Carry flag and Zero flag will be set

25.

26.

27.
28.

29.

30. Template classes that have already been written to perform common class tasks are called
A. container classes
B. receptacle classes
C. repository classes
D. alembic classes

31. The data type created by the data abstraction process is called
A. class
B. structure
C. abstract data type
D. User-defined data type
E.
32.

33.

34.

35. In SQL, relations can contain null values, and comparisons with null values are treated as
unknown. Suppose all comparisons with a null value are treated as false. Which of the following
pairs is not equivalent?
A. x = 5, not (not (x = 5)
B. x = 5, x > 4 and x < 6, where x is an integer
C. x < 5, not(x = 5)
D. None of the above

36. A primary key is combined with a foreign key creates

37. A functional dependency of the form x > y is trival if

38. The DBMS language component which can be embedded in a program is

39.

40.

41.

42.
43.

44. Four icons used in building Data Flow Diagram are

45. Main diference between program testing and system testing is

46. Studying in detail the information needs of users and any information system presently used

47. A collection of mathematical models and analytical techniques. The best fit will be

48. Which is not a software life cycle model?


A. Spiral Model
B. Waterfall Model
C. Prototyping Model
D. Capability maturity Model
49.

50.

51.

52.

53.

54. The information about an array that is used in a programme will be stored in

55. The average successful search time taken by binary search on a sorted array of 10 items is

A. 2.6
B. 2.7
C. 2.8
D. 2.9
56.

57. Which of the following algorithms solves the all-pair shortest path problem?

58. What is the time complexity of Bellman-Ford single-source shortest path algorithm on a
complete graph of n vertices?

59. If the number of leaves in a strictly binary tree is an odd number, then what can you say with
full conviction about total number of nodes in a tree?

(A) It is an odd number.


(B) It is an even number.
(C ) It cannot be equal to the number of leaves.
(D ) It is always greater than twice the number of leaves.

60. The complexity of linear search algorithm of an array of n elements is:

A. O log (n)
B. O (n)
C. O nlog (n)
D. O nXn)
61.

62. If every string of a language can be determined whether it is legal or illegal in finite time, the
language is called

63. Finite state machine can recognize

64. If nL can be recognized by a multitape TM with time complexity f, then L can be recognized
by a one-tape machine with time complexity DSD

65. If f : N--> N. If L can be recoognized by a TM T, so that T(n) f (n) for all but finitely many
n, then ( Time (f) means Time ( max ( f, 2n +2))).
66.

67. Regular expression for the language L = { w {0, 1}* | w has no pair of consecutive zeros} is

A. (1 + 010)*
B. (01 + 10)*
C. (1 + 010)* (0 + )
D. (1 + 01)* (0 + )

68. Recursively enumerable languages are not closed under

A. Union
B. Homomorphism
C. Complementation
D. Concatenation

69. The language accepted by the nondeterministic pushdown automaton

A. L(abb*a)
B. {a} U L(abb*a)
C. L(ab*a)
D. {a} U L(ab*a)

70. Which of the following permanent database that has an entry for each terminal symbol ?

A. Literal table
B. Identifier table
C. Terminal table
D. Source table

71.

72.
73.

74.

75.

76.

77.

78. A system program that set-up an executable program in main memory ready for execution is

A. Assembler
B. Linker
C. Loader
D. Text editor

79. Software that measures, monitors, analyzes and controls real world events is called

A. System software
B. Real Time software
C. Scientific software
D. Business software
80. If E be a shifting operation applied to a function f, such that E(f) = f (x + ), then

81. Which of the following transport layer protocolss is used to support electronic mail?

(A) SMTP
(B) IP
(C) TCP
(D) UDP

82. In the IPv4 addressing format, the number of networks allowed under Class C addresses is

(A) 2^14
(B) 2^7
(C) 2^21
(D) 2^24

83. The address resolution protocol (ARP) is used for:

(A) Finding the IP address from the DNS


(B) Finding the IP address of the default gateway
(C) Finding the IP address that corresponds to a MAC address
(D) Finding the MAC address that corresponds to an IP address

84. In the slow start phase of the TCP congestion control algorithm, the size of the congestion
window

(A) does not increase


(B) increases linearly
(C) increases quadratically
(D) increases exponentially

85. There are n stations in a slotted LAN. Each station attempts to transmit with a probability p
in each time slot. What is the probability that ONLY one station transmits in a given time slot?

(A) (1-p)^(n-1)
(B) np(1-p)^(n-1)
(C) p(1-p)^(n-1)
(D) 1-(1-p)^(n-1)

86. Which statement(s) about IPv4 and IPv6 addresses are true?
1. An IPv6 address is 32 bits long, represented in hexidecimal.
2. An IPv6 address is 128 bits long, represented in decimal.
3. An IPv4 address is 32 bits long, represented in decimal.
4. An IPv6 address is 128 bits long, represented in hexidecimal.

A. 1 and 3 only
B. 2 only
C. 3 and 4
D. 2 and 4

87. A networking system has an n layers. Application generated message of length M bytes. At
each of the layer, a h-byte header is added, what fraction of the network bandwidth is filled with
headers ?

88. The station-to-hub distance in which of the following is 2000 meters ?

A. 100 Base-TX
B. 100 Base-FX
C. 100 Base-T4
D. 100 Base-T1

89. In the network HTTP resources are located by


A. uniform resource identifier
B. unique resource locator
C. unique resource identifier
D. none of the above

90. The right to use a domain name is delegated by domain name registers which are
accredited by

A) internet architecture board


B) internet society
C) internet research task force
D) internet corporation for assigned names and numbers

91. <DT> tag is designed to fit a single line of our web page but <DD> tag will accept a
A. Line of text
B. Full paragraph
C. Word
D. Request
92. What is one advantage that HTML5 APIs offer for modern Web design?
A. They enable users to view Flash content on mobile devices.
B. They enable developers to create apps without coding skills
C. They enable older browsers to display any multimedia content
D. They enable users to view multimedia without plug-ins

93. XSL is

94.

95.

96.

97.

98.
99.

100.

Anda mungkin juga menyukai