Professional Documents
Culture Documents
A. Datagram
B. Frame
C. Segment
D. Message
Ans. D.
2. Which of the following protocols provides a connection-oriented reliable service for sending messages?
A. IP
B. All of the mentioned
C. UDP
D. TCP
Ans: D.
If we use Dijkstra’s single –source shortest path algorithm, in what order do the nodes get included into the set of
vertices for which the shortest path distances are finalized?
A. A, B, C, F, E, D
B. A, B, C, D, E, F
C. A , B, C, F, D, E
D. A , B, E, C, F, D
Ans 3. C
4. A program P reads 500 integers in the range [0,100]representing the scores of 500 students . It then prints the
frequency of each score above 50. What would be the best way for P to store the frequencies?
A. An array of 500 numbers
B. An array of 50 numbers
C. A dynamically allocated array of 550 numbers
D. An array of 100 numbers
Ans. B
5. If optimal page replacement technique is used , then what will be the difference between the hits of memory
with 4 and 3 frames respectively?(Assume initially frames are empty)
Given page reference string: 7,6,5,4,7,6,8,7,6,5,4,8
A. 2
B. 1
C. 3
D. 0
ANS:- B
6. Consider a system having ‘n’ resources of the same type. These resource are shared by 3 processes A,B and
C which have peak demands of 3,4 and 6 respectively. For what value of ‘n’ deadlock will not occur?
A. 10
B. 13
C. 9
D. 7
Ans. B
7. Determine the number of page faults when reference to page occur in the order – 1,2,3,4,1,2,5,1,2,3,4,5. Assume
page frame size is 3 and at present main memory has no page and system is using LRU algorithms.
A. 11
B. 8
C. 10
D. 9
Ans:- A
A. 32876
B. 32767
C. 30
D. 28534
Ans. B
9. Translation look aside buffer(TLB) is used by a paging schema. The main memory access takes 50ns and a
TLB access takes 10ns. What is the effective access time (in ns) if the TLB hit ratio 90% and there is no page
fault?
A. 84 ns
B. 78 ns
C. 54 ns
D. 65 ns
Ans. D
10. Consider following given algorithm and identify the task performed by this.
1.
bstree (*tree)
while ((tree-> left !=nu 11) && (tree -> right ! = nu11))
8. else
9. return(1);
12. else
13. return(1)
14. }
16. }
A. Prim’s algoritm
D. Bubble sort
Ans:- B
11. Suppose you have two sorted arrays , S1, and S2. The idea is to get a single array that merges the value of S1 and
S2, but final merged data should also be sorted. The algorithm first takes the left most elements from S1 and S2,
compares and writes the least of them into a third array. This step continues until one of the arrays S1 or S2 is
exhausted. After which , the remaining elements from the unexhausted array is written to the third array.
A. Length of S1
B. Length of S2
C. The maximum of the length of S1 or S2
D. None of the mentioned options
Ans:- C
12. Consider an algorithm that tries to sort an array S[11]by comparing the elements of the array. Following are the steps
involved:
I) Compare S[1]and S[11]
II) If S[1] <S[11], then sort S[1.. 5] by Step I
III) Sort S[7 .. 11]
IV) Merge S[1.. 6] and S[7 .. 11] into another array.
What is the time complexity of the above algorithm?
A. O(n)
B. O(log n)
C. O(n logn)
D. O(n2)
Ans;- C
13. In an IPv4 packet , the value of the total length field is 0×0028 and the value of HLEN is 5. The number of bytes of
data is being carried by this packet is:
A. 40
B. 18
C. 58
D. 20
Ans: A
Ans: D
15. What of the following conditions should be satisfied by G(x) to detect the odd number of bits in error?
A. G(x)does not divide 1+xk, for any k not exceeding the frame length
B. G(x)contains more than two terms
C. 1+x is a factor of G(x)
D. G(x) has an odd number of terms.
Ans: C.
16. Which of the following might be the issue if a protocol specifies that should be sent at 100 Mbps?
A. Semantics
B. Timing
C. Syntax
D. It is usual, no issue
Ans: B
Answer:- A
18. The transmission speed is 107 bps and the propagation speed is 200 meters/ ʯ sec in a token ring network. The 1-
bit delay in this network is equivalent to:
A. 200 meters of cable
B. 50 meters of cable
C. 500 meters of cable
D. 20 meters of cable
Ans: D
19. In Microsoft Windows Operating System, the size of the virtual address space varies for each hardware platform.
A. FALSE
B. Question too ambiguous
C. Depends
D. TRUE
Ans: D
Ans: D
21. Which of the following is the latest released version of windows Phone Operating System:
A. Windows Phone 7.5
B. Windows Phone 8
C. Windows Phone 8.1
D. Windows Phone 8.2
Ans: C
Ans: C
Ans: C
24. Which of the following modules gives control of the CPU to a process selected by the short-term scheduler?
A. None of the mentioned options
B. Dispatcher
C. Scheduler
D. Interrupt handler
Ans: B
25. Which among the following scheduling policy is most suitable for a time- shared operating system?
A. First – Come –First-Serve
B. Elevator
C. Shortest-job First
D. Round- Robin
Answer :- D .
26. To backup the Active Directory database, you need to have all the AD services in a stopped state.
A. False
B. True
Ans: B
Ans: C
28. A definition of every type of object in the Active Directory is stored in the:
A. Database
B. Schema
C. OU
D. All of these
Ans: D
29. Which is the snap-in that you can use to administer the replication of directory data among all sites in an Active
Directory Domain Services (AD DS) forest?
A. Active Directory Trusts and Services
B. Active Directory Site and Services
C. Active Directory Replication Manager
D. Any of these
Ans: B
30. With appropriate permissions, you can create groups in which of the following locations?
A. Root Domain in the forest
B. In any OU
C. All of these
D. Local or any other domain in the forest
Ans: C
31. In Active Directory ,-------------------------is a general purpose container that can be used to group most other classes
together for administrative purposes.
A. Domain
B. Forest
C. Organizational Units
D. Tree
Ans: C
Ans: A
33. A------------------------- is a domain controller that stores thes writable directory partitions, as well as a partial, read-
only copy of all other domain directory partitions in the forest.
A. Primary Domain Controller
B. Global Catalog
C. Read only Domain Controller
D. Domain Naming Master
Ans: B
34. What is the name of the snap-in that can be used to manage trusts in Active Directory?
A. Active Directory Trust Management Tool
B. Active directory Trust Editor
C. Any of these
D. Active Directory Domain and Trusts
Ans: D
Ans: D
Ans: C
Ans: B
38. All Active Directory trusts between domains within a forest are transitive, two- way trusts.
A. False
B. True
Ans: B
39. Which of the following are Forest –Wide Operations Master Roles?
A. Domain Naming Master
B. RID Master
C. PDC Emulator Master
D. Schema Master
40. Which of the following are examples of components of a logical structure of Active Directory?
A. Organizational Units
B. All of these
C. Domain Trees
D. Domains
Ans: B
41. Which of the following best describes the DHCP lease process?
A. Discover, Request, Offer, Accept
B. Request, Discover, Offer, Accept
C. Request, Accept, Acknowledge, save
D. Discover, Offer, Request, Acknowledge
Ans: D
Ans: B
43. The first domain that is installed in the Active Directory Forest is referred as:
A. Key Domain
B. Forest Domain
C. Primary Domain
D. Root Domain
Ans :D
44. Smallest scope to which Group Policy setting can be assigned is:
A. None of these
B. Forest
C. Domains
D. Organizational Units
Ans: D
Ans: B