Nielit MCQ Question Bank
Nielit MCQ Question Bank
1)Fidelity
Syn:Faithfulness,Loyalty,Adherence
2)Irreverence:
Syn:Insult,Disrespect,Humiliations
3)Vindicate
Syn:Justify,Prove,Reassert
4)Ravage
Syn:Demolish,Ruin,Havoc
5)Abrogate
Syn:Prohibit,Repeal,Revoke,Annul,Abolish
6)Infructuous
Syn:Fruitless,Unsuccessful,Unprofitable
7)Benevolence
Syn:Kind,Generous,Virtue,Philanthropy
8)Occult
Syn:Mystical,Secret,Clandestine,Supernatural
9)Prudent
Syn:Wise,Astute,Clever,Cautious,Rational
10)Amicable
Syn:Friendly,Cordial,Congenial
11)Successive
Syn:Continously,Consecutive,Incessant
12)Delineate
Syn:Explain,Describe,Portray
13)Garnish
Syn:Decorate,Adorn,Embellish
14)Menace
Syn:Threat,Harm,Danger,Peril
15)Panacea
Syn:Cure all,remedy for all ills or diseases,elixir
16)Propitiate
Syn:Calm,Soothe,Placate,Appease
17)Ceremonial
Syn:Formal,Ritual,Custom,Stately
18)Derogatory
Syn:Disparaging,Belittling,Scornful
19)Nomadic
Syn:Vagrant,Wandering,Strolling
20)Restive
Syn:Restless,Impatience,Fidgety
21)Erroneously
Syn:By mistake,wrongly,incorrect,inaccurate
22)Capitulate
Syn:surrender,give in,acquiesce
23)Estranged
Syn:Separated,Apart,Alienated,Remove
24)Itinerant
Syn:Travelling from place to place,Excursional,Ambulatory
25)Surmount
Syn:Conquer,Triumph,Vanquish,Overcome
26)Ostentation
Syn:Pomp,Showiness,Boast,Flamboyance
27)Torpid
Syn:Mentally or physically inactive,listless,apathetic,tardy
28)Transparent
Syn:Lucid,Apparent,Clear,Translucent
29)Convict
Syn:Criminal,Condemned,captive,prisoner
30)Gnome
Syn:a small ugly person,bogle,dwarf
31)Jeopardise
Syn:Endanger,Risk,Imperil
32)Premonition
Syn:Forewarning,ALert,Alarm,Caveat
33)Elude
Syn:Evade,Abstain,Escape,Move away
34)Haughty
Syn:Conceited,Pretentious,Arrogant,Proud
35)Demented
Syn:Idiotic,Mad,Insane
36)Flutter
Syn:Float,Rapidity,Flicker,Quiver
37)Dilate
Syn:Extend,Expand,Widen,Enlarge
38)Obsession
Syn:Preoccupation,Deliberate,Craze,Fad
39)Legitimate
Syn:Legal,lawful,fair & reasonable
40)Exemplary
Syn:Excellent,Commendable,Ideal,Admirable
41)Capricious
Syn:Whimsical,Rapturous,Vagarious
42)Dexerity
Syn:Skillful,Knack,Adroitness,Proficiency
43)Assertive
Syn:Domineering,Affirmative,Bold,Blusterer
44)Knavish
Syn:Unscrupulous,Deceitful,Fraudulent
45)Laconic
Syn:Concise,Brief,Short,Brusque
46)Apprehend
Syn:Arrest,Hold,Catch,Seize
47)Conceal
Syn:Hide,Camouflage,Cover
48)Exhort
Syn:Impel,Push,Prompt,Incite,Encourage
49)Repartee
Syn:Response,Pleasant conversation,retort,banter
50)Poach
Syn:Hunt,smuggle,plunder,illegal practice of treepassing
51)Solitary
Syn:Single,Lonely,Aloof,Monk,Unsociable
52)Meagre
Syn:Inadequate,scant,little,slight
53)Candid
Syn:frank,truthful,straightforward,honest,blunt
54)Decay
Syn:Decompose,rot,deteriorate,fester
55)Lurid
Syn:Shocking,Gruesome,Exaggerated,Horrifying
56)Pognosis
Syn:Forecast,prediction,foretelling,prophet
57)Espionage
Syn:Spying,Surveillance,Undercover
58)Bliss
Syn:Happiness,Joy,Ecstasy,Euphoria
59)Enigma
Syn:Puzzle,Riddle,Conundrum
60)Concurrence
Syn:Agreement,Accord,Unanimity
61)Infirm
Syn:Weak,frail,feeble,lean
62)Cordial
Syn:Friendly,Congenial,Amicable
63)Sole
Syn:One and Only,Alone,Aloof,Solitary,Singular
64)Onus
Syn:Responsibility,burden,load,obligation
65)Vital
Syn:Necessary,Imperative,Important,Crucial,Essential
66)Dissuade
Syn:hinder,deter,divert,discourage
67)Condone
Syn:Forgive,Excuse,Overlook
68)Anguish
Syn:Agony,pain,soreness,distress
69)Thrive
Syn:Flourish,bloom,prosper
70)Brisk
Syn:quick,vigorous,active,energetic
71)Diligent
Syn:Hardworking,Industrious,Assiduous
72)Compassionate
Syn:Sympathetic,pitful,merciful,benignant
73)Blunder
Syn:Mistake,error,fault,blooperR
74)Coarse
Syn:Rough,Rude,Boorish,Dirty
75)Tribulation
Syn:Suffering,pain,adversity,unhapiness
76)Allure
Syn:entice,lure,attract,tempt
77)Perish
Syn:decay,die,decline,expire
78)Collate
Syn:Collect & combine,assemble,gather
79)Rampart
Syn:parapet,barricade,barrier
80)Mania
Syn:Madness,mental illness,insanity,dementics
81)Preamble
Syn:Introduction,beginning,preface,prelude
82)Economical
Syn:Parsimonious,thrifty,frugal
83)Baffle
Syn:Puzzle,Perplex,Astound,Dazzle
84)Apex
Syn:Top,zenith,highest point
85)Insolent
Syn:Disrespectful,Audacious,Impudent
86)Innocuous
Syn:Harmless,Banal,Innoxious,Inoffensive
87)Ingenuous
Syn:Innocent,honest,trustful
88)Accomplish
Syn:Achieve,attain,succeed in doing,carry out
89)Superficial
Syn:Shallow,frivolous,without depth
90)Pertinent
Syn:Relevant or applicable to a particular matter,Right,Proper
91)Indebtedness
Syn:Debt,Loan,Liability
92)Unveiled
Syn:Uncovered,Exposed,Revealed
93)Promulgate
Syn:Declare,Announce,Anunciate
94)Exempt
Syn:Free from obligation or liability,Absolved,Excluded,Liberate
95) Dismantle
Syn:Demolish,Take to pieces,Wreck
96)Consensus
Syn:General Agreement,Accord,Harmony
97)Contention
Syn:Heated Disagreement,Dissent,Strife
98)Incipient
Syn:Beginning,Initial,Inchoate
99)Reiterated
Syn:Say something again or number of times,Repeat,Retell
100)Percipience
Syn:The quality of having sensitive insight or understanding,judgement
101)Credentials
Syn:Certificates,Endorsement
102)Conciliatory
Syn:Compromising,Irenic
103)Elusive
Syn:Tricky,Baffling,Subtle
104)Sagacity
Syn:the quality of being sagacious,Acumen,Sapience
REASONING SOME IMPORTANT TYPES OF QUESTIONS:
1)In the following question, select the related word from the given
alternatives.
Car : Road : : Ship : ?
a)Water
b)Air
c)Road
d)Both Air and Water
2)In the following question, select the related letters from the given
alternatives.
GLOW : FJNU : : PTEL : ?
a)ORFN
b)ORDJ
c)ORJD
d)OPNJ
3)In the following question, select the related number from the given
alternatives.
5 : 124 : : 6 : ?
a)215
b)216
c)217
d)220
4)In the following question, select the odd word pair from the given
alternatives.
a)Error : Accurate
b)Careless : Casual
c)Strength : Lethargy
d)Gloomy : Cheerful
5)In the following question, select the odd letters from the given alternatives.
a)FUGT
b)KPLO
c)DWEV
d)CWDX
6)In the following question, select the odd number pair from the alternatives.
a)11 – 120
b)17 – 290
c)21 – 442
d)12 – 145
7)Arrange the given words in the sequence in which they occur in the
dictionary.
1)Pragmatic
2)Protect
3)Postel
4)Postal
5)Pebble
a)43521
b)54312
c)34512
d)43521
8)A series is given with one term missing. Select the correct alternative from
the given ones that will complete the series.
Q, P, O, N, ?
a)M
b)L
c)O
d)J
9)In the following question, select the missing number from the given series.
6, 9, 15, 24, 39, 63, ?
a)97
b)115
c)102
d)124
10)P and Q are brothers. P is the father of S. R is the only son of Q and is
married to U. How is U related to S?
a)Sister-in-law
b)Mother-in-law
c)Sister
d)Mother
11)Nine years later, age of B will be equal to the present age of A. Sum of A’S
age 3 years later and B’s age 4 years ago is 76. If C is half of the present age of
B, then what will be C’s age (in years) after 10 years?
a)32
b)36
c)27
d)31
12)In the following question, from the given alternative words, select the
word which cannot be formed using the letters of the given word.
a)Biner
b)None
c)Bane
d)Hinge
14)In the following question, correct the equation by interchanging two signs.
4×3–6÷2+7=8
a)- and +
b)× and –
c)÷ and ×
d)× and +
16)In the following question, select the related word from the given
alternatives.
Goiter : Iodine : : Anemia : ?
a)Vitamin D
b)Iron
c)Vitamin E
d)Calcium
17)In the following question, select the related letter from the given
alternatives.
DE : O : : AF : ?
a)H
b)K
c)J
d)I
18)In the following question, select the related number from the given
alternatives.
56 : 41 : : 94 : ?
a)49
b)53
c)60
d)89
19)In the following question, select the odd word from the given alternatives.
a)Beneath
b)On top
c)Huge
d)Above
20)In the following question, select the odd letters from the given
alternatives.
a)MN
b)NM
c)OL
d)ET
21)In the following question, select the odd number from the given
alternatives.
a)253
b)473
c)143
d)633
22)Arrange the given words in the sequence in which they occur in the
dictionary.
1.Flinching
2.Flintlock
3.Flinpites
4.Flintlocks
5.Flinchers
a)15243
b)51243
c)51324
d)51342
23)In the following question, which one set of letters when sequentially
placed at the gaps in the given letter series shall complete it?
_ yzaa _ y _ xy _ aazy _
a)xxzzx
b)xxaza
c)xzxzx
d)aazzx
24)In the following question, select the missing number from the given series.
19, 38, ?, 228, 684, 1368
a)108
b)113
c)114
d)138
27)In the following question, from the given alternative words, select the
word which can be formed using the letters of the given word.
CAPITULATE
a)CAPABLE
b)LUPIN
c)PITTY
d)TALE
29)In the following question, correct the equation by interchanging two signs.
6+8÷4–4=8
a)÷and=
b)÷ and +
c)÷ and –
d)+ and –
1)In some types of networks, a special packet called the token is used to
guarantee access to the network media which of the following network can’t
use this method?
a)ARCnet
b)FDDI
c)ATM
d)Token Ring
3)The network that you support includes 14 separate offices nation wide
connected via a T-1 lines. What kind of network do you have?
a)Campus Area Network
b)LAN
c)MAN
d)WAN
4)You have been asked to wire a conference room with six computers for a
demonstration tomorrow. It need be done as quickly and with the lowest
possible expense. What network topology is best suited to this situation?
a)Star
b)Ring
c)Mesh
d)Bus
6)In the Ethernet network. What method is used to access the media?
a)Demand priority
b)CSMA/CD
c)Polling
d)CSMA/CA
10)If through an error in manufacturing, two network cards were created with
the same MAC address, which layer of the OSI model would discover the
problem?
a)Topological
b)Application
c)Data link
d)Physical
14)To prevent signal alternation, what is he max number of repeaters that can
be placed on one 10 Base 5 or 10 Base 2 network?
a)Four
b)Five
c)Three
d)Any number
17)How many digit of the network user address are known as the DNIC (Data
Network Identification Code)?
a)First Three
b)First Four
c)First Five
d)First Seven
18)Four bits are used for packet sequence numbering in a sliding window
protocol used in a computer network. What is the maximum window size?
a)4
b)8
c)15
d)16
19)Which of the following TCP/IP protocol is used for file transfer with
minimal capability and minimal overhead?
a)RARP
b)FTP
c)TFTP
d)TELNET
21)ALOHA
a)is used for channel allocation problem
b)is use of data transfer
c)is buffering
d)all of the above
30)RIP is
a)Protocol used for transmission of IP data grams across a serial line
b)Resource information protocol
c)Protocol used to exchange information between the routers
d)None of these
38)A string of 50 1’s is replaced by a maker a 1 and the number 50. This refer
to
a)Run-length encoding
b)Morse code
c)Differential encoding
d)LZW encoding
45)A GO-BACK-N-ARQ uses a window of size 15. HOW many bits are needed to
define the sequence number?
a)15
b)4
c)16
d)5
50)The value of the total length field in an IP datagram is 36, and the value of
the header length is 5. How many bytes of data is the packet carrying?
a)16
b)36
c)20
d)5
51)If the fragment offset has a value of 100, it means that …………………..
a)The datagram has not been fragmented
b)The datagram is 100 bytes in size
c)The first byte of the datagram is byte 100
d)The first byte of the diagram is byte 800
58)On a full duplex data link, the most widely used error recovery technique
is
a)Backward Error Correction (BEC)
b)Forward Error Correction (FEC)
c)Automatic Repeat Request (ARQ)
d)None of these
64)Which of the following OSI level is more closely related to the physical
communication facilities
a)Application
b)Network
c)Data Link
d)Physical
70)Slotted ALOHA
a)Divide time into discrete intervals
b)Require global time synchronization
c)both a and b
d)none of above
71)ALOHA
a)is use of data transfer
b)is buffering
c)is used for channel allocation problem
d)all of the above
74)Synchronous Protocols
a)allows faster transmission than asynchronous protocols do
b)transmit characters one at a time
c)are generally used by personal computers
d)none of the above
80)Which of the following TCP/IP protocol is used for the file transfer with
minimal capability and minimal overhead?
a)FTP
b)TFTP
c)RARP
d)TELNET
81)What is the default maximum packet size for 16MB Token Ring Network?
a)576 bytes
b)2202 bytes
c)4202 bytes
d)1101 bytes
85)What are the most commonly used transmission speeds in BPS used in data
communication?
a)9600
b)1200
c)2400
d)300
88)To prevent silly window syndrome created by a sender that is sending data
at a very slow rate______can be used.
a)Clark’s solution
b)Nagle’s algorithm
c)Both(a) and(b)
d)Delayed acknowledgement
90)Start and stop bits do not contain an information, but are used in serial
communication for
a)error detection
b)error correction
c)synchronization
d)none of above
4)A grammar that is both left and right recursive for a non terminal is
a)Ambiguous
b)Unambiguous
c)Information is not sufficient to decide
d)None of these
5)Let L1 and L2 are regular sets defined over alphabet ∑*. Mark the false
statement
a)L1 U L2 is regular
b) L1 ∩ L2 is not regular
c) ∑*-L1 is regular
d) L1* is regular
7)The regular expression for “Binary numbers that are multiples of two” is
a)(0|1)*.1
b)(0|1)*.0
c)(1|0)*.1
d)(1|0)*.00
11)If the regular set A is represented by A = ((01)*1*0) and the regular set b is
represented by B = (01 + 1)*, which of the following is true ?
a)A ⊂ B
b)B ⊂ A
c)A = B
d)A and B are incomparable
13)Let R1 and R2 regular sets defined over the alphabet Z then which of the
following is true?
a)R1 ∪ R2 is regular
b)Z* - R1 is regular
c)R1 * is not regular
d)Both (A) and (B)
16)The DFA accepting all string containing number of 0’s divisible by 3 and
number of 1’s divisible by 5 contains:
a)Total 5 states, 1 final state
b)Total of 5 states, 2 final states
c)8 states in total, 2 final states
d)A total of 15states, 1 final state
18)Which of the following represents the set of all string over {0,1} beginning
with 00?
i. 00(0 + 1)*
ii. 00*(0 + 1)*
a)(i) only
b)(ii) only
c)(i) and (ii) both
d) None of these
20)Suppose L1 = {10, 1} and L2 = {011, 11}. How many distrinct elements are
there in L =L1L2
a)4
b)3
c)2
d)None of the above
24)Given an arbitrary DFA with 2N states, what will be the number of states of
the corresponding NFA?
a)N * N
b)2N
c)2N
d)N!
27)If L1is context free language and L2is a regular language which of the
following is /are false?
a)L1 – L2 is not context free
b)L1 ∩ 𝐿2 is context free
c)∼ L2 is context free
d)L1∩ 𝐿2 is regular
3)The process where the same entity member of more than one subclass of
the specialization is known as
a)Disjoint
b)Overlapping
c)Mapping
d)Snapshot
4)Conceptual schema is transformed from high level data model into the
implementation data model. This step is called
a)Data model mapping
b)Conceptual schema
c)Functional mapping
d)Conceptual operation
5)’Singleton’ is
a)a set with only one element
b)a set with a ton of element
c)a single value
d)a key attribute of an entity type
11)All aggregate function except ……… ignores null values in their input
collection
a)Sum
b)Count
c)AVG
d)MAX
12)QBE is based on
a)TRC
b)DRC
c)Both
d)None of these
13)Unsafe query means
a)Query that has 0 result
b)Query that has consistent result
c)Query that has infinite result
d)Query that return result
15)Find the names of all the employees who earned more than every
employee of SBI
Works(empname,compname,salary)
t1 ← Max salary (𝝈compname=”SBI” (works))
a)𝜋empname (𝜎salary > max salary (works))
b)𝜋 empname(𝜎salary > t1 (works))
c)𝜋 empname(𝜎salary < t1 (works))
d)𝜋 empname(𝜎salary < max salary (t1 * works))
17)Which of the following views could you query to obtain the number of
extents allocated to the EMP table?
a)DBA_SEGMENTS
b)DBA_DATA_FILES
c)DBA_FREE_SPACE
d)None of the above
18)Which trigger type would be fired during instance startup?
a)User event
b)SQL statement
c)Database event
d)Instance event
20)What is the first step you should take when transporting a tablespace?
a)Make the tablespace read-only
b)Export the metadata from the source
c)Copy the data files to the target system
d)None of the above
21)Which of the following hints would you use in an INSERT INTO SELECT
command to perform a direct-load insert?
a)CACHE
b)DIRECT
c)APPEND
d)NOCACHE
22)Which are the three parameters that should be specified in the init.ora file
before starting the instance?
a)DB_NAME
b)DB_BLOCK_SIZE
c)CONTROL_FILES
d)ALL OF ABOVE
23)Which is the script that is used to set up the PL/SQL environment for the
database?
a)catadt.sql
b)catproc.sql
c)catalog.sql
d)None of the above
24)Which of the following files contains service names and full connect
descriptors when the network is configured for local naming?
a)names.ora
b)config.ora
c)sqlnet.ora
d)tnsnames.ora
27)’Ontology’ is similar to
a)physical scheme
b)logical scheme
c)conceptual scheme
d)sub scheme
33)A B tree used as an index for a large database table has four levels including
the root node. If a new key is inserted in this index,then,the maximum number
of nodes that could be newly created in the process are
a)5
b)4
c)3
d)2
34)With respect to the B+ tree index method, select the true statements
a)Records are physically stored in primary key order.
b)B+ trees use a hashing algorthim.
c)The index tree may become unbalanced as a result of updates.
d)None of the above
42)Atomicity is managed by
a)Transaction management component
b)Recovery management component
c)Concurrency control component
d)None of these
43)Isolation is managed by
a)Transaction management component
b)Recovery management component
c)Concurrency control component
d)None of these
44)Blind write is
a)Readingdata item without reading
b)Writing without reading data items
c)Both (A) and (B)
d) None of these
46)Which OEM tool would you use to create the logical object in which
rollback segment are stored?
a)Data Manager
b)Schema Manager
c)Storage Manager
d)Instance Manager
48)You are creating an indexon the EMPNO column in the EMPLOYEE table.
Which statement will you use?
a)CREATE INDEX emp_empno_idx ON employee.empno;
b)CREATE INDEX emp_empno_id FOR employee.empno;
c)CREATE INDEX emp_empno_idx ON employee (empno);
d)None of these
49)You are using a procedure that queries customer information. Where is the
data processed?
a)Table
b)Data files
c)Memory structure
d)Rollback segment
50)You are running a production database and cannot risk any data loss. In
which mode should your database be?
a)REDOLOG
b)ARCHIVELOG
c)PRODUCTION
d)NOARCHIVELOG
52)Which auditing option can be used to verify that backups are performed at
the scheduled times?
a)SYSTEM
B)execute
C)A L T E R / M A N A G E TABLESPACE
d)None of the above
53)Which is the data dictionary view that you can query to check the progress
of backup?
a)V$BACKUP_STATUS
b)V$SESSION_BACKUP
c)V$BACKUP_PROGRESS
d)V$SESSION_LONGOPS
61)In B tree file organization the highest number of item can be placed in leaf
node is
a)n/2
b)(n-1)/2
c)n-1
d)n
62)Though index speedup the searching we don’t keep search key value for
every record because
a)Every search key value adds up additional CPU time
b)Each search key requires additional storage space
c)Both (A) and (B) true
d) None of these
63)In sequential file organization if a record is not fit in free space then the
record is placed in
a)Last block
b)First block
c)Overflowblock
d)None of these
65)In B+ tree index file if there are K search keys and each leaf node contain n
records then number of nodes to be accessed
a)log2 nk
b)logn k
c)log[k] n
d)log[n/2] k
66)If one block access require 30ms.to access 100 – blocks index
requires………..ms
a)180ms
b)200ms
c)50ms
d)210
67)A B+ tree of order n index file each leaf node must contain
a)[n-1] values
b)[n(n-1)/2] values
c)[n/2] values
d)[(n-1)/2] values
69)If we are accessing a block in 100 block index using binary search how
many block read is required to access the data in 100 block.
a)7
b)6
c)100
d)10
ENGINEERING MATHEMATICS
1)An equivalence relation is a relation which is
a)Reflexive and symmetric
b)Symmertic and Transitive
c)Reflexive,Symmetric and transitive
d)None of the above
8)How many edges are possible in a forest with n vertices and k tree?
a)n – k + 1
b)n – k – 1
c)n –k
d)Insufficient data
16)A …….. graph is a directed graph with the property that no edge connects a
vertex to itself, and between any two vertices there is at most one edge:
a)complete or round-robin
b)single-elimination
c)tournament
d)none of the above
17)A ……. Tournament graph is a tournament graph with the property that
between two distinct vertices there is exactly one edge.
a)Complete or round-robin
b)Single-elimination
c)Tournament
d)None of the above
18)How many maximium edges excluding self loops, does a simple undirected
graph of eight vertices have?
a)7
b)8
c)28
d)14
19)How many edges does a complete tournament graph with n vertices have?
a)(n – 1) n/2
b)(n – 1)
c)n
d)None of the above
22)If A ∪ 𝑩 = 𝑨 ∩ 𝑩 𝒊𝒇:
a)A = ∅
b)B = ∅
c)A = B
d)A ⊂ 𝐵
24)R = {(1, 1), (1, 2), (1, 3), (2, 2), (2, 3)} on {1, 2, 3} is:
a)equivalent
b)transitive only
c)reflexive only
d)symmetric only.
25)R is a relation in the natural numbers defined by x + 2y = 10. The domain of
R is:
a){2, 4, 6}
b)(1, 3, 5, 7}
c){2, 4, 6, 8}
d)None of the above
29)If f(x) =x/x+1 and g(x) = 1/x -1 then (fog) (x) is equal to:
a)x
b)1/x
c)x + 1
d)1/x+1
38)If A = {2, 3, 4, 5}, B = {3, 4, 5} and c = {2,5}, then the null set is:
a)A – B
b)B – C
c)B ∩ 𝐶
d)(B ∪ 𝐶) − 𝐴
42)A ∪ 𝑨 = 𝑨 𝒊𝒔 𝒄𝒂𝒍𝒍𝒆𝒅:
a)Identity law
b)Demorgan’s law
c)Idempotent law
d)Complement law
46)A semi-group is
i)Closed
ii)Commutative
iii)Associative
a)(i) and (ii) only
b)(i) and (iii) only
c)(ii) and (iii) only
d)all are correct
47)What is the cardinality of a multiset having letters “MI SSI SSI PPI”?
a)4
b)11
c)3
d)6
4)A list is ordered from smallest to largest when a sort, is called. Which sort
would take the longest time to excute?
a)HeapSort
b)ShortBubble
c)QuickSort
d)SelectionSort
5) A list is ordered from smallest to largest when a sort, is called. Which sort
would take the shortest time to excute?
a)HeapSort
b)ShortBubble
c)QuickSort
d)SelectionSort
7)What is the maximum total number of nodes in a tree that has N levels?
Note that the root is level (zero)
a)22N
b)2N + 1 – 1
c)2N – 1
d)2N + 1
8)How many ancestors does a node in the Nth level (root level = 0) of a binary
search tree have?
a)N
b)N + 1
c)2N
d)2N + 1
9)How many different binary tres can be made from three nodes that contain
the key values 1, 2 and 3?
a)30
b)20
c)10
d)5
11)Which of the following data structure may give overflow error, even
though the current number of element in it is less than its size?
a)simple queue
b)circular queue
c)stack
d)none of these
12)What can be said about the array representation of a circular queue when
it contains only one element?
a)front = rear = NULL
b)front = rear + 1
c)front = rear – 1
d)front = rear ≠ 𝑁𝑈𝐿𝐿
36)If there are n element in the heap, what is the time complexity of inserting
a new element in the heap in worst case?
a)Θ (logN)
b)Θ (N)
c)Θ (Nlog N)
d)Θ (N2)
37)If a binary search tree traversed in order than number of the nodes will
printed in
a)ascending order
b)descending order
c)random order
d)none of these
38)In binary search tree which traversal is used for getting ascending order
values:
a)inorder
b)postorder
c)preorder
d)none of these
40)The ……….. sort algorithms works by comprising adjacent array that are out
of order.
a)alphabetic
b)bubble
c)compare
d)list
48)Given 2 sorted list of suzes ‘m’ and ‘n’ respectively. Number of comparisons
need in the worst case by the merge sort algorithm will be
a)m * n
b)max (m, n)
c)min (m, n)
d)m + n - 1
49)A circuit in a connected graph which includes every vertex of the graph is
known as:
a)Hamiltonian
b)Euler
c)Planar
d)Clique
54)In Tower of Hanoi problem with 3 needle and 6 disks, how many total no.
of moves to solve this problem?
a)63
b)49
c)21
d)58
58)An advantages of changed hash table over the open addressing scheme is
a)worst case complexity of search operation is less
b)space used is less
c)deletion easier
d)none of the above
2)Minimum number of two input NAND gates used to perform the function of
two input OR gate is,
a)1
b)2
c)3
d)4
5)The number of input words in a truth table always equals ………., where n is
the number of input bits.
a)10n
b)2n
c)4n
d)None of the above
6)The ……… gate has two or more input signals. All inputs must be high to get a
high output.
a)OR
b)NAND
c)AND
d)NOR
7)In boolean algebra, the overbar stands for the Not operation, the plus sign
stands for the ………. Operation.
a)And
b)OR
c)NAND
d)NOR
8)In boolean algebra, the times sign stands for the ……… operation
a)AND
b)OR
c)NAND
d)NOR
9)The ALU carries out arithmetic and logic operations. It processes ………
number rather than decimal numbers.
a)decimal
b)hexadecimal
c)binary
d)All of the above
11)A binary adder is a logic circuit that can add ………. binary numbers at a
time.
a)Hundreds
b)Thousands
c)One
d)Two
12)The leading bit stands for the ………. And the remaining bits for the …………..,
is known as signed binary numbers.
a)sign, remainder
b)sign, magnitude
c)value, sign
d)variable, value
13)How many full and half-adders are required to add 16-bit numbers?
a)8 half-adders, 8 full-adders
b)1 half-adders, 15 full-adders
c)16 half-adders, no full-adders
d)none of these
18)A 4 bit synchronous counter uses flip-flops with propagation delay time of
25 ns each. The maximum possible time required for change of state will be.
a)25ns
b)50ns
c)75ns
d)100ns
19)Every flip flop is defined by
a)characteristics expression
b)excitation table
c)both
d)none of these
23)The number of two input NAND gates required to produce the two input
OR function is
a)1
b)2
c)3
d)4
25)If one instruction executed in 4nsec, what is the throughtput of the system
a)150 MIPS
b)200 MIPS
c)250 MIPS
d)None of the above
36)For a cache capacity of 32 KB, how many lines does the cache holds for line
length of 128 bytes
a)1024
b)512
c)256
d)None of these
40)Regarding interrupts,
a)In a hardware action, the CPU syores the interrupt vector in one of the
program-visible registers
b)The interrupt vector is used to index into a table to reterive the interrupt
handler’s address
c)The hardware actions upon a trap and interrupt are different
d)Both (A) and (B)
46)During DMA transfer,DMA controller takes over the buses to manage the
transfer
a)directly from CPU to memory
b)directly from memory to CPU
c)indirectly between the I/O device and memory
d)directly between the I/O device and memory
51)To prevent signals from colliding on the bus, …………. prioritize access to
memory by I/O channels and processors.
a)a register
b)interrupts
c)the processor scheduler
d)a controller
54)In caching system, the memory reference made in any short time interval
tend to use only a small fraction of the total memory is called ……………
a)checker boarding
b)locality principle
c)memory interleaving
d)none of these
55)The register which holds the address of the location to or from which data
are to be transferred is known as
a)index register
b)instruction register
c)memory address register
d)memory data register
68)Given below are some statements associated with the registers of a CPU.
Identify the false statement.
a)The program counter holds the memory address of the instruction in
execution.
b)Only opcode is transferred to the control unit.
c)An instruction in the instruction register consists of the opcode and the
operand
d)None of these
69)Given below are some statements associated with cache memory. Identify
the correct statement.
a)The level 1 cache always faster than the level 2 cache.
b)The level 2 cache is used to mitigate the dynamic slowdown every time a Level
1 cache miss occurs.
c)Level 2 cache comes as on board only.
d)None of these
77)The following are four statements regarding what a CPU with only a set of
32 bit registers can perform.
1.Hold and operate on 32 bit integers
2.Hold and operate on 16 bit integers
3.Hold and operate on 64 bit floating point arithmetic
4.Hold and operate on 16 bit UNICODE characters
Which of the following is true about such a CPU?
a)all are true
b)1, 2 and 3 only
c)1, 2 and 4 only
d)1, 3 and 4 only
78)Register is a
a)set of capacitor used to register input instruction in a digital computer
b)set of paper tapes and cards put in a file
c)temporary storage unit within the CPU having dedicated or general purpose
use
d)part of the auxiliary memory
2)…………. Restricts access to shared variable to only one thread at any given
time.
a)asynchronisation
b)serialization
c)protection
d)mutual exclusion
4)operating system can divide main memory into portions called …………… so
that one process cannot overwrite another’s memory, either inadvertently or
maliciously.
a)sections
b)partitions
c)modules
d)regions
8)Overlay is
a)a part of an operating system
b)a specific memory allocation
c)a single contiguous memory that was used in the olden days for running large
programs by swapping
d)none of the above
10)The page replacement policy that sometimes leads to more page faults
when the size of the memory is increased is
a)FIFO
b)LRU
c)no such policy exists
d)none of the above
11)Fragmentation is
a)dividing the secondary memory into equal sized fragments
b)dividing the main memory into equal-size fragments
c)fragments of memory words used in a page
d)fragments of memory words unused in a page
12)Critical region is
a)a part of the operating system which is not allowed to be accessed by any
process
b)a set of instruction that access common shared resources which exclude one
another in time
c)the portion of the main memory which can be accessed only by one process at
a time
d)none of these
13)Kernal is
a)considered as the critical part of the operating system
b)the software which monitors the operating system
c)the set of primitive functions upon which the reset of operating system
function are built up.
d)none of these
14)Supervisior call
a)is a call made by the supervisior of the system
b)is a call with contro functions
c)are privileged calls that are used to perform resource management functions,
which are controlled by the operating system
d)none of the above
19)The first-fit, best-fit and the wrost-fit algorithm can be used for
a)contiguous allocation of memory
b)linked allocation of memory
c)indexed allocation of memory
d)all of the above
23)Thrashing
a)reduces page I/O
b)decreases the degree of multiprogramming
c)implies excessive page I/O
d)improves the system performance
29)Process Control Block (PCB) of all running process reside in which of the
following?
a)RAM
b)Harddisk
c)Cache
d)None of these
35)Round-robin scheduling
a)allows interactive tasks quicker access to the processor
b)is quite complex to implement
c)gives each task the same chance at the processor
d)allows processor-bound tasks more time in the processor
39)Which of the following policy often gives long average waiting time?
a)SJF
b)round robin
c)FCFS
d)all of the above
41)Swapping is performed by
a)long term scheduler
b)mid term scheduler
c)short term scheduler
d)dispatcher
43)If a system contains CPU bound processes then which of the following
scheduling algorithm produces maximum efficiency of the CPU:
a)FIFO
b)round robin
c)SJF
d)priority
44)The time interval between the time of submission of a process to the time
of completion of a process is known as which of the following?
a)waiting time
b)response time
c)turn around time
d)none of these
45)The data block of very large file in the Unix file system are allocated using
a)contiguous allocation
b)linked allocation
c)indexed allocation
d)an extension of indexed allocation
50)In Round Robin CPU scheduling, as the time quantum is increased, the
average turn around time
a)increases
b)decreases
c)remains constant
d)varies irregularly
56)A memory page contain a heavily used variable that was initialized very
early and is in constant use in a removed, wgen the page replacement
algorithm used is
a)LRU
b)FIFO
c)LFU
d)None of these
61)The optimal page replacement algorithm will select the page that
a)has not been used for the longest time in the past
b)will not be used for longest time in the future
c)has been used least number of times
d)has been most number of times
62)A memory page containing a heavily used variable that was initialized very
early and in constant used is removed when
a)LRU page replacement algorithm is used
b)FIFO page replacement algorithm is used
c)LFU page replacement algorithm is used
d)none of these