Professional Documents
Culture Documents
Time:75 Minutes
1. One of the major difference between a combinational logic circuit such as a decoder and
a storage circuit such as an RS latch is that
2.
3.
4.
5.
6.
7.
8.
9.
11. How many 32K x 1 RAM chips are needed to provide a memory capacity of 256K-bytes?
A) 8
B) 32
C) 64
D) 128
12.
13.
14.
15.
16.
17.
18.
19.
20.
21) Consider a 32 bit microprocessor with a 16 bit external data bus,driven by 8 Mhz input
clock. Assume that microprocessor has a bus cycle whose minimum duration equals to
four input clock cycle. What is the maximum data transfer rate for this micro processor.
A. 8x10 6bytes /sec
B. 4x10 6 bytes/sec
C. 16x 10 6 bytes/sec
D. 10x 10 6 bytes/sec
23.
24. In an 8085 microprocessor, the instruction CMP B has been executed while the content of
the accumulator is less than that of register B. As a result,
A. Carry flag will be set but Zero flag will be reset
B. Carry flag will be reset but Zero flag will be set
C. Both Carry flag and Zero flag will be reset
D. Both Carry flag and Zero flag will be set
25.
26.
27.
28.
29.
30. Template classes that have already been written to perform common class tasks are called
A. container classes
B. receptacle classes
C. repository classes
D. alembic classes
31. The data type created by the data abstraction process is called
A. class
B. structure
C. abstract data type
D. User-defined data type
E.
32.
33.
34.
35. In SQL, relations can contain null values, and comparisons with null values are treated as
unknown. Suppose all comparisons with a null value are treated as false. Which of the following
pairs is not equivalent?
A. x = 5, not (not (x = 5)
B. x = 5, x > 4 and x < 6, where x is an integer
C. x < 5, not(x = 5)
D. None of the above
39.
40.
41.
42.
43.
46. Studying in detail the information needs of users and any information system presently used
47. A collection of mathematical models and analytical techniques. The best fit will be
50.
51.
52.
53.
54. The information about an array that is used in a programme will be stored in
55. The average successful search time taken by binary search on a sorted array of 10 items is
A. 2.6
B. 2.7
C. 2.8
D. 2.9
56.
57. Which of the following algorithms solves the all-pair shortest path problem?
58. What is the time complexity of Bellman-Ford single-source shortest path algorithm on a
complete graph of n vertices?
59. If the number of leaves in a strictly binary tree is an odd number, then what can you say with
full conviction about total number of nodes in a tree?
A. O log (n)
B. O (n)
C. O nlog (n)
D. O nXn)
61.
62. If every string of a language can be determined whether it is legal or illegal in finite time, the
language is called
64. If nL can be recognized by a multitape TM with time complexity f, then L can be recognized
by a one-tape machine with time complexity DSD
65. If f : N--> N. If L can be recoognized by a TM T, so that T(n) f (n) for all but finitely many
n, then ( Time (f) means Time ( max ( f, 2n +2))).
66.
67. Regular expression for the language L = { w {0, 1}* | w has no pair of consecutive zeros} is
A. (1 + 010)*
B. (01 + 10)*
C. (1 + 010)* (0 + )
D. (1 + 01)* (0 + )
A. Union
B. Homomorphism
C. Complementation
D. Concatenation
A. L(abb*a)
B. {a} U L(abb*a)
C. L(ab*a)
D. {a} U L(ab*a)
70. Which of the following permanent database that has an entry for each terminal symbol ?
A. Literal table
B. Identifier table
C. Terminal table
D. Source table
71.
72.
73.
74.
75.
76.
77.
78. A system program that set-up an executable program in main memory ready for execution is
A. Assembler
B. Linker
C. Loader
D. Text editor
79. Software that measures, monitors, analyzes and controls real world events is called
A. System software
B. Real Time software
C. Scientific software
D. Business software
80. If E be a shifting operation applied to a function f, such that E(f) = f (x + ), then
81. Which of the following transport layer protocolss is used to support electronic mail?
(A) SMTP
(B) IP
(C) TCP
(D) UDP
82. In the IPv4 addressing format, the number of networks allowed under Class C addresses is
(A) 2^14
(B) 2^7
(C) 2^21
(D) 2^24
84. In the slow start phase of the TCP congestion control algorithm, the size of the congestion
window
85. There are n stations in a slotted LAN. Each station attempts to transmit with a probability p
in each time slot. What is the probability that ONLY one station transmits in a given time slot?
(A) (1-p)^(n-1)
(B) np(1-p)^(n-1)
(C) p(1-p)^(n-1)
(D) 1-(1-p)^(n-1)
86. Which statement(s) about IPv4 and IPv6 addresses are true?
1. An IPv6 address is 32 bits long, represented in hexidecimal.
2. An IPv6 address is 128 bits long, represented in decimal.
3. An IPv4 address is 32 bits long, represented in decimal.
4. An IPv6 address is 128 bits long, represented in hexidecimal.
A. 1 and 3 only
B. 2 only
C. 3 and 4
D. 2 and 4
87. A networking system has an n layers. Application generated message of length M bytes. At
each of the layer, a h-byte header is added, what fraction of the network bandwidth is filled with
headers ?
A. 100 Base-TX
B. 100 Base-FX
C. 100 Base-T4
D. 100 Base-T1
90. The right to use a domain name is delegated by domain name registers which are
accredited by
91. <DT> tag is designed to fit a single line of our web page but <DD> tag will accept a
A. Line of text
B. Full paragraph
C. Word
D. Request
92. What is one advantage that HTML5 APIs offer for modern Web design?
A. They enable users to view Flash content on mobile devices.
B. They enable developers to create apps without coding skills
C. They enable older browsers to display any multimedia content
D. They enable users to view multimedia without plug-ins
93. XSL is
94.
95.
96.
97.
98.
99.
100.