Comprehensive
Comprehensive
1
“Functional foremanship” is related to 1.
Scientific Management
2.
Administrative Management
3.
Human Relations School
4.
Bureaucratic Organization
2
Within an organisation, leadership influence will be 1.
dependent upon the type of ________ that the leader can knowledge
exercise over the followers.
2.
power
3.
delegation
4.
friendship
Why is it necessary for all employees to sign the Confidentiality and Security 1.
Agreement each year? To check if you still work there.
2.
No reason, they just like
paperwork.
3.
To remind everyone of what
their responsibilities are.
4.
Will be used for moving to a
higher position.
3
Why is autocratic leadership considered negative? 1.
people are uninformed,
insecure and afraid of
the leader
2.
leader is extra friendly
3.
too much confusion arises
4.
it is very participative
4
Who plays an important role in the success of products and services and in 1.
increasing the marketing share of the firm in business? Functional level Managers
2.
Corporate level Managers
3.
Business level Managers
4.
All of the above
5
Who developed the force-field analysis theory? 1.
Carl Rogers
2.
B.F.Skinner
3.
Kurt Lewin
4.
James Johnson
Who believed that workers performance was influenced by the total environment? 1.
F W Taylor
2.
Henry Fayol
3.
Peter Drucker
4.
Robert Owen
6
While selecting a string w such that w belongs to L, where L is a regular language, and 1.
w=mno. Which of the following parts cannot be an empty string? m
2.
n
3.
o
4.
no
While applying Pumping lemma over a regular language, we consider a string w that 1.
belong to L and separate it into _________ components. 3
2.
4
3.
2
4.
5
Which type of software can be used to merge data of two files in one file ? 1.
System software
2.
Networking
software
3.
Documenting
software
4.
Utility Software
7
Which transmission media has the highest transmission speed in the network. 1.
Coaxial cable
2.
Twisted pair cable
3.
Optical fibre cable
4.
Electrical cable
which technique was introduced because a single job could not keep both the 1.
Time-sharing
CPU and the I/O devices busy?
2.
SPOOLing
3.
Preemptive
scheduling
4.
Multiprogramming
8
Which style of leadership focuses on goals, standards, and 1.
organization? task leadership
2.
social leadership
3.
semantic leadership
4.
transformational leadership
9
Which process model deals with review of project and a 1.
decision is made whether to continue with a further loop or not Agile Process Model
in the planning phase?
2.
Waterfall Process Model
3.
Incremental Process Model
4.
Spiral Model
10
Which one of these scenarios are ethical issues? 1.
(i) and (ii)
(i) A company is thinking of employing a robot that will make
most of the workforce redundant 2.
(ii) Someone creates an AI (i) and (iii)
11
Which one of the following languages over the alphabet {a,b} 1.
is described by the regular expression: The set of all strings containing the substring
(a+b)*a(a+b)*a(a+b)*? aa.
2.
The set of all strings containing at most two a’s.
3.
The set of all strings containing at least two a’s.
4.
The set of all strings that begin and end with
either a or b.
12
Which one of the following is correct? 1.
A relationship can have one or more
attributes directly linked to it
2.
All relationships attributes may be
attached to one of the participating
entities
3.
All relationships may be converted to 1:1
relationships
4.
All relationships may be converted to
binary relationships
13
Which one of the following describes the leadership style 1.
in which the leader generally gives facilitative style
the group complete freedom to make decisions and 2.
complete the work in whatever way it sees delegative style
fit? 3.
democratic style
4.
laissez-faire style
14
Which of these statements concerning Weber’s concept of 1.
Bureaucracy is not correct? It is based on rules and procedures
rather than personal preference and
judgment.
2.
It is still a relevant concept in today’s
organization.
3.
It has acquired a negative reputation for
inefficiency and rigidity.
4.
It rejects rational approaches to
managing organizations
15
Which of the three pillars of digital privacy does not apply? 1.
Information privacy
2.
Individual privacy
3.
Communication privacy
4.
Family privacy
16
Which of the following true about FILE *fp 1.
FILE is a keyword in C for representing files and fp is a variable of
FILE type.
2.
FILE is a stream
3.
FILE is a buffered stream
4.
FILE is a structure and fp is a pointer to the structure of FILE type
17
Which of the following statements about 1.
the Privacy Data Breach Incident is A Privacy incident is a theft of an asset
correct?
2.
A privacy event occurs when personal information is lost in any
way. Both suspected and confirmed occurrences involving PII that
provide a reasonable risk of harm are covered by this term.
3.
A Privacy Incident is one that may not cause serious injury or
harm to the individual and/or involves a few numbers of affected
individuals
4.
A Privacy incident is an attack on an asset
18
All options are true
Which of the following risk is the failure of a purchased component to perform 1.Product risk 2.Project risk
as expected? 3.Process risk 4.Program risk
19
Which of the following regular expression denotes a language comprising of 1.
all possible strings over {a,b} of length n where n is a multiple of 3? (a+b+aa+bb+aba+bba)*
2.
(aaa+bbb)*
3.
((a+b) (a+b) (a+b))*
4.
(aaa+ab+a)+(bbb+bb+a)
20
Which of the following options are correct for the given 1.
question? (i) only
The usage of “virtual” keyword before the member function is 2.
to achieve…………
(ii) and (iv) only
(i). Inheritance
3.
(ii). Compile time Polymorphism (ii) and (iii) only
(iii). Runtime Polymorphism 4.
(iv). Static binding (iii) only
21
Which of the following keys in a table can uniquely identify a 1.
row in a table? Candidate key
2.
Alternate key
3.
Primary key
4.
All of these
22
Which of the following is true 1.
P is a subset of NP
2.
NP is a subset of P
3.
P and NP are equal
4.
NP is a subset of NP-hard
change .
23
Which of the following is the most accurate description of an access 1.
control method that allows the data owner to develop and manage MACs (Mandatory Access Control)
access control?
2.
RBACs (Role-Based Access Control)
3.
LBACs (List Based Access Control)
4.
DACs (Discretionary Access Control)
24
Which of the following is NOT a key concept associated with scientific 1.
management? One best way
2.
Formalization
3.
Time-and-motion studies.
4.
Systematic selection
25
Honest behaviour with the
customer.
4.Polluting the environment.
Which of the following is a project scheduling method that can be 1.EPM 2.CPM 3.CMM 4.NONE OF THE
applied to software development? ABOVE
26
Which of the following does not require additional temporary 1.
space? Stack
2.
Queue
3.
Linked list
4.
All of these
1.
Which of the following are objectives of an
information systems security program Threats, vulnerabilities, and
risks
2.
Security, information value,
and threats
3.
Integrity, confidentiality, and
availability
4.
27
Authenticity, vulnerabilities,
and costs
28
Which of the below is not a business continuity disaster? 1.
Flooding
2.
Covid19
3.
Earth Quake
4.
Tsunami
WireShark
3.
Network Simulator 2
4.
TinyOS
29
Which of the following term is the practice of hiding data in graphic, audio, or 1.
Masking
other text file?
2.
Steganography
3.
Cryptography
4.
None of the choices
1.
Which of the following relations is correct, when
comparing the best-case complexity? insertion<merge<selec
tion
2.
merge
<insertion<selection
3.
insertion<selection<m
erge
4.
none of the above
30
Which of the following principles of management was not given by Fayol? 1.
Unity of direction
2.
Subordination of individual
interest to common interest
3.
Stability of tenure
4.
Standardisation
3.
Private key
4.
Security token
31
Which of the following is NOT a topic included in the social 1.
responsibility audit focus? open communication
2.
treatment of employees
3.
leadership
4.
management structure
32
Which of the following firms has NOT been exposed for 1.
ethical abuses and corrupt conduct? Satyam Computers
2.
Lehman Brothers
3.
Enron
4.
General Electric(GE)
} 4.
a. a is an array of pointers, b is a pointer to an
array, c is a pointer to an array
33
Which network topology is the most common way of setting up a 1.
Ring
network?
2.
Bus
3.
Star
4.
Mesh
Which model can be selected if a user is involved in all the phases of SDLC? 1.
Waterfall Model
2.
Prototyping Model
3.
RAD Model
4.
Build AND Fix Model
Which method is meant for coordinating access to resources with respect to the 1.MAC
available IP addresses? 2.
ACL
3.
DAC
4.
None of the choices
34
Which is/are the application(s) of stack 1.
Function calls
2.
Large number Arithmetic
3.
Evaluation of arithmetic
expressions
4.
All of these
35
which is the fastest storage unit in a usual memory hierarchy? 1.
cache
2.
main memory
3.
hard disk memory
4.
register
36
Which is a true statement. 1.
Breadth-first search is the shortest path algorithm
that works on un-weighted graphs
2.
Depth first search is the shortest path algorithm that
works on un-weighted graphs
3.
Both of the above are true
4.
None of the above are true
37
Which data structure is used for implementing 1.
recursion? Queue
2.
Stack
3.
Arrays
4.
List
38
Which among the following is equivalent to the given regular expression? ab*+b 1.
(ab)*+b
2.
a((b)*+b)
3.
(a(b)*)+b
4.
((a*b)b*)*
Which access control type has a central authority that determines what objects 1.
people have access to depending on their role or organizational security policy? Mandatory Access Control
2.
Discretionary Access
Control
3.
Non-Discretionary Access
Control
4.
Rule-based Access control
Which term refers to the discipline that deals with what is good and bad or right 1.
and wrong? morals and traditions
2.
social responsibility
3.
ethics
4.
cultural norms
39
Which of the following is the correct representation of pure virtual 1.
function? class base { public:
virtual void
display=0;};
2.
class base {public:
virtual void
display!=0;};
3.
class base {public: virtual
void display () = 0 ;};
4.
class base {public: virtual
void display () > 0 ;};
Default arguments
3.
Call by reference
4.
Call by pointer
40
When class B is inherited from class A, what is the order in which the 1.
destructors are called? Class A first Class B next
2.
Class B first Class A next
3.
Class B's only as it is the
child class
4.
Class A's only as it is the
parent class
When there is more than one final state in the reduced FA, then its regular expression 1.
will contain _________ operator surely dot
2.
star
3.
binary+
4.
unary+
41
When there is more than one final state in the reduced FA, then its regular expression 1.
will contain _________ operator surely unary +
2.
dot
3.
binary +
4.
star
When there is complete DFA with Five states out of which two are final states if F is 1.
modified such that it recognizes complement of the original language then there will be at 2
least _________final states.
2.
3
3.
7
4.
5
When there are infinite distinguishable strings then there cannot be a ------------- 1.
automata
2.
finite automata
3.
regular expression
4.
both finite automata
and regular
expression
When there are infinite distinguishable strings then there cannot be a ------------- 1.
finite automata
2.
automata
3.
regular expression
4.
both finite automata
and regular
expression
42
When the project deals with developing a well understood application, then the model is 1.
called as Waterfall Model
2.
Spiral Model
3.
COCOMO Model
4.
Agile Model
When the entries in the segment tables of two different processes point to the same 1.
physical address then ____________ the segments are
invalid
2.
the processes get
blocked
3.
the address space
is invalid
4.
the segments are
shared
When the computer processor does not get a data item it requires in the cache, then the 1.
problem is known as Cache miss
2.
Cache hit
3.
File caches
4.
Name cache
43
When employee satisfaction is measured, employees seemed to be more satisfied 1.
under a(n) laissez-faire;
participative
________ leadership style than under a(n) ________ one.
2.
supportive;
laissez-faire
3.
democratic;
directive
4.
democratic;
autocratic
When determining the most appropriate form of leadership, which of the following 1.
should be The manager.
considered? 2.
The work
environment.
3.
The group.
4.
All the other options
are correct.
When determining the most appropriate form of leadership, which of the following 1.
should be The manager.
considered? 2.
The work
environment.
3.
The group
4.
All the other answers
are correct.
When designing apps, a software company considers data protection issues. So, what 1.
should we call this strategy? Data protection by
default
2.
Legitimate data
protection
3.
Data protection by
design
4.
44
Organisational data
protection
When a state in a FA has self loop its regular expression will have ------------- 1.
dot
2.
star
3.
binary+
4.
unary+
When a state in a FA has self loop its regular expression will have ------------- 1.
dot
2.
binary+
3.
unary +
4.
star
When a program tries to access a page that is mapped in address space but not loaded 1.
in physical memory, then segmentation fault
occurs
2.
fatal error occurs
3.
page fault occurs
4.
no error occurs
What would be the asymptotic time complexity to insert an element at the second 1.
position in the linked list? O(1)
2.
O(n)
3.
O(n^2)
4.
None
45
What will be the value of top, if there is a size of stack STACK_SIZE is 5 1.
5
2.
6
3.
4
4.
none
46
What will be the output? 1.
200
#include<stdio.h>
2.
int value=100;
100
void myFunction(int parameter)
3.
{ 100 200
printf("%d",parameter); 4.
200 100
}
main(){
int value=200;
myFunction(value);
}
47
What will be the output 1.
5
#include<stdio.h>
2.
main(){
1
float a[]={1.23,2.34,3.45,4.56,5.67};
3.
printf("%d",sizeof(a)/sizeof(a[-1])); Error
} 4.
0
48
What will be the output of the given program? 1.
100
#include<stdio.h>
2.
int myFunction(int parameter)
101
{
3.
return parameter++; 99
} 4.
Error
main(){
int value1=100;
int value2=myFunction(value1);
printf("%d",--value2);
}
49
What will be the output of the below code 1.
100 100
#include<stdio.h>
2.
int myFunction(int *parameter)
101 101
{
3.
101 100
return ++*parameter; 4.
100 101
}
main(){
int value=100;
printf("%d ",value);
myFunction(&value);
printf("%d",value);
}
50
What will be printed? 1.
ab
#include<stdio.h>
2.
main(){
.cd
char arr[]="ab.cd.ef";
3.
printf("%s",strchr(arr,'.')); .cd.ef
} 4.
.ef
} 4.
Error
51
What type of encryption is capable of encrypting a fixed-length plaintext block into 1.
3.
Hash
4.
None of the choices
What type of encryption encrypts the plain text byte by byte or bit by bit? 1.
Block
2.
Hash
3.
Stream
4.
Elliptic
What should a project manager do or follow to ensure clear 1.Scope verification 2.Completing a
boundaries for project completion? scope statement 3.scope definition
4.Risk management plan
52
What oracle backup and recovery file contains user and system? 1.
Datafile
2.
Control file
3.
Online ReDo file
4.
Redolog file
2.
Something between -5 and -15
3.
Something between 5 and -5
4.
Something between 5 and 15
1.
What is the status of array after the first
iteration of selection sort for the given array of 5,7,10,12,2,8
2.
elements:5,7,10,12,2,8
2,5,10,12,7,8
3.
2,7,10,12,5,8
4.
5,7,10,2,8,12
53
What is the result of the following operation? 1.
X
Top (Push (S, X))
2.
Null
3.
S
4.
None
What is the real disadvantage of a linear list of directory entries? 1.size of the linear list in memory
2.linear search to find a file
3.it is not reliable
4.all of the mentioned
2.
abc+*–
3.
ab+*cd–
4.
ab+*cd–
54
What is the name of the process in which an employee informs 1.
another responsible employee Whistleblowing
in the company about potentially unethical behavior? 2.
Purging and releasing
3.
Identification
4.
Information transfer
1.
What is the level of recursion if the input
array is { 4, 8, 32, 58,98,129,201 } and key 5
2.
is 8?
2
3.
3
4.
4
What is the current industry for the measure of Software 1.Iterations to Successful Build
Quality? 2.Number of Bugs Fixed
3.Number of Defects per KLOC
4.None in the list
55
1.
What is the complexity of quick sort
algorithm, if the array to be sorted is already O(n2)
2.
in sorted order?
O(nlogn)
3.
Constant
4.
O(n)
56
a mapping from one address space to
another
What is a network? 1.
A group of 1 or more devices that
communicate
2.A groupof 2 or more devices that
communicate 3.
When 2 or more computers are in
the same building
4.
A group of 3 or more devices that
communicate
57
What happens to a task force after it finishes its assignment? 1.
It is integrated with the organisation.
2.
It is disbanded.
3.
It continues after accomplishment.
4.
None of the other answers is correct.
1.
What are the mid values in each level of
recursion in the binary search for the input 58, 129, 201
2.
array { 4, 8, 58,98,129,201 } and key 201?
98, 129, 201
3.
98,201
4.
58,129,201
58
What are all candidate keys, other than the primary keys called? 1.
Partial keys
2.
Alternate keys
3.
Superkey keys
4.
None of these
59
Unity of command means: 1.
Parity of authority and responsibility
2.
The flow of command from superior to a
subordinate
3.
Parity in controlling
4.
None of the above
60
Transfer time is ... 1.
the time is taken to locate the disk arm to a specified
track where the data is to be read or write.
2.
the time is taken by the desired sector of disk to rotate
into a position so that it can access the read/write
heads.
3.
the time to transfer the data.
4.
the time taken to complete the execution.
61
Total Development in programmer months of Utility 1.
programs TDEV=2.5xPM pow 0.38
2.
TDEV=2.5xPM pow0.35
3.
TDEV=2.5xPM pow0.32
4.
None of the above
To read and write from a file we are using the standard C++ library 1.
Fstream
called
2.
stream
3.
filestream
4.
None
62
To make a process as Zombie, which process needs to delay (sleep()) its 1.
execution? The parent process or the child process? parent to
sleep for
a while,
child
normal
execution
2.
child to
sleep for
a while,
parent
normal
execution
3.
parent
and child
both
normal
execution
4.
parent
and child
both to
sleep for
a while
63
To avoid the race condition, the number of processes that may be 1.
simultaneously inside their critical section is 8
2.
1
3.
16
4.
0
Through this principle of management, Henri Fayol guides the managers to exhibit 1.
exemplary behaviour and advises that they should not fall into the temptation of Remuneration of
misusing their powers for personal benefit at the cost of the general interest of the employees
organization. Which principle of management is being described in the above
2.
statement?
Centralization and
decentralization
3.
Subordination of
individual interest to
general interest
4.
Equity
64
Thomas Tharakan expects his employees to "check their brains at the door." He does 1.
all the thinking, makes all the decisions, and issues commands to his subordinates. autocratic
Thomas uses the ________style of leadership.
2.
authoritarian
3.
democratic
4.
laissez-faire
65
There are two abilities that you must have to properly 1.
understand ethics. The first is the ……………………. and the ability to discern; concentration
second ability is ………………………….
2.
ability to visualize; devotion
3.
ability to distinguish; dedication
4.
ability to judge; dedication
66
The way the work activities and the departments are organised 1.
is called chain of command.
2.
span of control.
3.
unity of direction.
4.
esprit de corps.
2.
getpagesize()
3.
pagesizeof()
4.
sizeof()
67
The University of Michigan studies used the 1.
two dimensions of ________ and ________ to employee oriented; production oriented
study behavioural characteristics of leaders. 2.
consideration; initiating structure
3.
task; people
4.
decision-making; employee development
1.
The universal Turing machine U
consists of 1 input tape
2.
2 input tape
3.
3 input tape
4.
4 input tape
The underlying technology on which the 1.Project 2.Product 3.Business 4.None in the list
system is built is superseded by new
technology is the __________ type of risk
68
The total number of states required to 1.
automate the given regular expression 4
(aa)*(bb)*
2.
3
3.
5
4.
7
1.
contiguous
The three major methods of allocating disk
space that are in wide use are _____________
2.
linked
3.
indexed
4.
all of the mentioned
69
The syntax for catching all exceptions in a 1.
program is …………. catch-all(…) { }
2.
catchall(…){ }
3.
catch(…) { }
4.
catch(.){ }
70
The stress which is negative in nature and causes mental and physical problems is 1.
known as Eustress
2.
Distress
3.
Negative stress
4.
Permanent stress
The stress that exists for weeks, months, or even years is called 1.
Chronic stress
2.
Acute stress
3.
Negative stress
4.
Permanent stress
3.
A and B
4.
None of the above
71
The set of all strings over the alphabet {p,q} (including epsilon} is denoted by 1.
(q+p)*
2.
(q+p)^+
3.
p^+q^+
4.
p*q*
The set of all strings over the alphabet {a,b} (including epsilon} is denoted by 1.
(a+b)^+
2.
a^+b^+
3.
a*b*
4.
(a+b)*
72
The result of evaluating the prefix expression */b+-dacd, where a=3, 1.
b=6, c=1, d=5 is 0
2.
5
3.
10
4.
15
73
The process-related to process control, file management, device 1.
management, Editors
information about system and communication that is requested by any
higher
2.
level language can be performed by __________ Compilers
3.
System Call
4.
Caching
74
The process model that represents a way of thinking that allows 1.
businesses and team members to quickly innovate and respond to the Waterfall Model
dynamic demands of an Organization is
2.
Incremental Model
3.
RAD Model
4.
Agile Model
75
The postfix form of A*B+C/D is 1.
*AB/CD+
2.
AB*CD/+
3.
A*BC+/D
4.
ABCD+/*
The policy for memory hierarchies: L1 data are never found in an L2 cache, 1.
refers to Write buffer
2.
Multilevel exclusion
3.
Write-through
4.
Multilevel inclusion
2.
entire process
3.
entire thread
4.
first page of a process
76
The page replacement algorithm that suffers highly from Belady's anamoly is 1.
Least Recently Used
2.
Most Frequently Used
3.
First In First Out
4.
Least Frequently Used
3.
Product Rejection Test Cases
4.
Product Acceptance Test
Cases
77
The objective of this technique of scientific management is to reduce a given line or a 1.
product to fixed type sizes and characteristics. Name the technique. Method study
2.
Differential piece wage
system
3.
Standardization and
simplification of work
4.
Functional
foremanship
The number of states in DFA is --------than the number of states in NFA for the same 1.
Language. greater equal
2.
less
3.
Greater
4.
equal
(n+
1)/
2
4.
n-1
78
The number of auxiliary memory required for a Push Down Machine (PDM) to behave 1.
like a Finite State Machine (FSM) is 1
2.
4
3.
0
4.
2
The model in which environmental, social, and economic responsibilities are satisfied 1.
corporate social
concurrently is known as ________. responsibility
2.
global activism
3.
giving back to the
planet
4.
restoration and
revivification
The MMU is a 1.
Hardwar
e
2.
Software
3.
Malware
4.
None of
the given
choices
79
1.
4
The minimum number of transitions to pass to reach the final state as per the
following regular expression is: {0,1}*{1000} 2.
3
3.
5
4.
7
The minimum number of colors needed to color a graph having n (>3) vertices 1.
and 2 edges is 1
2.
2
3.
3
4.
4
The minimum length for strings in the regular expression ( ba* + aab* )* 1.
is_________ 2
2.
0
3.
1
4.
infinite
80
1.
The maximum distance between two nodes present in
the stack is 1 in the implementation of DFS. True
2.
(length/edge= 1)
False
3. 4.
1.
The maximum distance between two nodes present in
the queue is 1 in the implementation of BFS. True
2.
(length/edge= 1)
False
3. 4.
The matrix structure is the correct structure when three conditions are met. 1.
Which of the following is one of these three conditions? Pressure exists to share
scarce resources
across product lines.
2.
Technical quality is not
very important.
3.
The environmental
domain of the
organization is
simple.
4.
The environmental
domain of the
organization is
certain and stable.
81
1.
Program counter
The logical file system maintains structures consisting of information about a
file...
2.
file control block
3.
Process control block
4.
file pointer
The lexical analysis for a modern language such as Java needs the power of 1.
which one of the following machine models in a necessary and sufficient Finite state automata
sense?
2.
Non-deterministic pushdown
automata
3.
Deterministic pushdown
automata
4.
Turing machine
82
The Knapsack problem where the objective function is to minimize the profit is __ 1.
Greedy
2.
Dynamic 0 / 1
3.
Backtracking
4.
Branch & Bound
0/1
3.
Need not be
regular
4.
IS always
context free
The interactive transmission of data within a time sharing system may be best suited to 1.
simplex lines
2.
half-duplex lines
3.
full duplex lines
4.
diplex-lines
The instruct Kernel to do various operations of the calling program and 1.Shell 2.
exchange data Editors
3.
between the Kernel at the program
System Calls
4.
Commands
83
The initial array elements are 1,7,5,2 after which the following operation are performed 1.
enqueue(6), enqueue(8), dequeue, dequeue, enqueue(9), enqueue(0). what are the final 1,7,5,2,9,0
elements of the array?
2.
1,7,5,2,6,8
3.
5,2,6,8,9,0
4.
5,2,9,0,6,8
The implied, enforced, or felt obligation of managers, acting in their official capacities, to 1.
human
serve or protect the interests of groups other than themselves is known as ________.
resource
ethics
2.
environmen
tal morality
3.
corporate social
responsibility
4.
business-centre
d morality
The idea of developing an initial implementation, getting the user feedback, and evolving it 1.
through various versions until an acceptable system is made is Agile Process
Model
2.
Waterfall
Process Model
3.
Incremental
Process Model
4.
RAD Process
Model
84
The garbage can model is related to 1.
Leadership
2.
Learning
3.
Decision
making
4.
Recruitment
The following graph, which is not a topological ordering of the following graph 1.
123456
2.
132456
3.
324165
4.
324156
85
The five items: A, B, C, D and E are pushed in the stack, one after the other starting from A. 1.
The stack is popped into four items and each element is inserted in a queue. Then two A
elements are deleted from the queue and pushed back on the stack. Now one item is
2.
popped from the stack. The popped item is.
B
3.
C
4.
D
The file-position pointer is ___ value that specifies the location in the file as 1.
Interger
a number of bytes from the file's starting location
2.
Float
3.
Null
4.
None
the file system allows the same system call interface (the API) to be used for different types 1.
of file systems. NTFS
2.
EXT2
3.
VFS(virtual file
system)
4.
DOS
The extent to which a leader lets followers make decisions themselves rather than making 1.
the Laissez-faire
decisions for them are focused on by _______________ leadership styles. and general
2.
Participative
and
autocratic
3.
86
Employee-ori
ented and
job-centred
4.
Laissez-faire
and close
The execution when it finds the solution otherwise starts the problem from the top 1.
Backtracking
2.
Divide and
conquer
3.
Branch and
Bound
4.
Dynamic
programming
The Epsilon-Closure of any state q will contain the state ______________ irrespective of q. 1.
Epsilon
2.
q
3.
Final state
4.
p
87
The encryption methodology is used in . 1.
IDS
2.
Firewall
3.
Host
4.
VPN
The element of role identity which describes how others believe one should 1.
behave in a given situation. Role perception
2.
Role expectation
3.
Role identification
4.
Role description
88
The divisional structure has a special feature of __________________. 1.
flexibility.
2.
reliabilty.
3.
both flexibility and
reliability.
4.
change.
89
The device used for providing secured remote access is ... 1.
IDS
2.
IPS
3.
Firewall
4.
VPN
90
The data structure required to check whether an expression contains balanced 1.
parenthesis is Stack
2.
Queue
3.
Tree
4.
Array
91
The connected graph with n vertices and n edges consists of at least m different 1.
spanning trees, what is the largest integer m? 1
2.
2
3.
3
4.
6
The concept of ________ has evolved from the traditional view of corporate social 1.
social scaffolding
responsibility.
2.
planetary
progressivism
3.
work-life balance
4.
corporate
sustainability
The cache term is now applied when a buffering is employed for reusing commonly 1.
occurring items, for example File caches
2.
Name cache
3.
Flash memory
4.
Both a and b
92
4.
it sometimes recognized grammars
that are not regular
93
The algorithm which chooses the page that has not been used for the 1.
longest period of time is _________. First in first out algorithm
2.
Least recently used algorithm
3.
Additional reference bit algorithm
4.
Counting based page replacement
algorithm
94
The address generated by the CPU is referred to as ____________ 1.
Physical address
2.
Logical address
3.
Neither physical nor logical
4.
Network Address
The ability to temporarily halt the CPU and use this time to send 1.
information on buses is called
Direct memory access
2.
Vectoring
the
interrupt
3.
System Interrupt
4.
Cycle stealing
95
The ___________ must design and program the overlay 1.
structure. programmer
2.
system architect
3.
system designer
4.
system analyst
1.
participative
The ________ style of leadership describes a leader who tends
to involve employees in 2.
autocratic
decision making, delegate authority, encourage participation in
deciding work methods and 3.
democratic
goals, and uses feedback as an opportunity for coaching
employees. 4.
laissez-faire
96
The ______ technique expands the bandwidth of a signal by 1.
replacing each data bit with n bits. DSSS
2.
FHSS
3.
FDM
4.
TDM
97
The easiest form of offline password hash attack which can be 1.
Hybrid
used for capturing insecure passwords is? 2.
Dictionary
3.
Brute-force
4.
Man-in-the-mid
dle
The -------------- access control model in which users are not given 1.
Discretionary
much freedom to decide who can access their files and is 2.
Mandatory
recognized for its structure and use of security labels?
3.
Role-based
4.
Nondiscretiona
ry
98
Testing the end to end functionality of the system as a whole is defined as 1.
_______________ Unit Testing
2.
Functional Testing
3.
Stress Testing
4.
Load Testing
Templates ___ some common errors found in code that makes heavy use 1.
Reject
of function-like macros
2.
Allow
3.
Discard
4.
None
99
1.
Template classes and functions ____ the code duplication of different
Allow
data types and thus makes the development easier and faster.
2.
Eliminate
3.
Permit
4.
None
TCP/IP MODEL DOES NOT HAVE ______ LAYER BUT OSI MODEL HAVE THIS LAYER. 1.
SESSION
LAYER
2.
PRESENTATI
ON LAYER
3.
APPLICATION
LAYER
4.
Both Session
and
Presentation
layer
100
Synchronous and Asynchronous data transfer classification is based on 1.
______________ Time at
which data
transfer
happens
2.
Type of data
transfer
occurs
3.
Type of
devices
connected to
them
4.
None of the
mentioned
options
Suppose the following disk request sequence (track numbers) for a disk with 100 tracks is 1.
given: 45, 20, 90, 10, 50, 60, 80, 25, 70. Assume that the initial position of the R/W head is on 8
track 50. The additional distance that will be traversed by the R/W head when the Shortest
2.
Seek Time First (SSTF) algorithm is used compared to the SCAN (Elevator) algorithm
9
(assuming that SCAN algorithm moves towards 100 when it starts execution) is _________
tracks 3.
10
4.
11
Suppose that a system has a paging system with 8 entries in a page table. Given that there 1.
are three processes of equal sizes, creating 8 valid entries in their page tables. What would 24
be the total number of frames allocated to these three processes under the condition that 2
2.
pages are shared by the three processes?
20
3.
18
4.
30
101
Suppose a disk has 201 cylinders, numbered from 0 to 200. At some time the disk arm is at 1.
cylinder 100, and there is a queue of disk access requests for cylinders 30, 85, 90, 100, 105, 1
110, 135 and 145. If Shortest-Seek Time First (SSTF) is being used for scheduling the disk
2.
access, the request for cylinder 90 is serviced after servicing ____________ number of
2
requests.
3.
3
4.
4
Stress that usually lasts for short time and may be due to work pressure, meeting deadlines 1.
pressure or minor accident, or any related matters is called Chronic
stress
2.
Acute stress
3.
Negative
stress
4.
Permanent
stress
1.
State true or false. True,
False
i) Unix, support multiple user processes but only support one thread per
2.
process.
True,
A java run time environment is an example of a system of one process with True
multiple threads. 3.
False,
True
4.
102
False,
False
Resident virus, non-resident virus, boot sector virus, and Resident virus,
macro virus non-resident virus, boot
sector virus, and macro
virus
2.
Boot sector virus,
resident virus,
non-resident virus and
macro virus
3.
Boot sector virus,
non-resident virus,
resident virus and
macro virus
4.
Boot sector virus,
non-resident virus,
macro virus and
resident virus
103
4.
None of the other answers
is correct.
Significant percentage of the spent time in moving data in two levels in the 1.
memory hierarchy, then the memory-hierarchy is said to Mixed
2.
Write stall
3.
Averaging
4.
Thrash
104
SDLC stands for 1.
Software Development Life
Cycle
2.
System Development Life cycle
3.
Software Design Life Cycle
4.
System Design Life Cycle
Scalar chain is a 1.
Leadership chain
2.
Authority chain
3.
Decision making chain
4.
Control chain
105
RTM stands for ____________ 1.
Repeated Trade Matrix
2.
Redundant Trace Module
3.
Robust Test Mechanism
4.
Requirement traceability matrix
2.
B. the time taken by the desired sector of disk to rotate
into a position so that it can access the read/write heads.
3.
the time to transfer the data.
4.
the time is taken to complete the execution.
106
Return type of is_open() function is 1.
int
___
2.
bool
3.
float
4.
char *
107
Relation between two different function with 1.
two constant are applicable in F(n)=O(g(n))
2.
F(n)=θ(g(n))
3.
F(n)=Ώ(g(n))
4.
All of them
Regular expressions that do not contain the star operator can represent 1.
only finite languages True
2.
False
3.
Can't determined
4.
Neither True and Nor False
108
Recursion fails due to fixed size 1.
Linked list
2.
Queue
3.
Stack
4.
All of these
109
Prims algorithm is based on 1.
Divide and conquer method
2.
Dynamic programming
3.
Greedy method
4.
Branch and bound
Plan-driven process is a process where all the activities are planned first 1.
and the progress is measured against the plan is Agile Process Model
2.
Waterfall Process Model
3.
Prototyping Process Model
4.
RAD Process Model
110
Periodically adding, changing and deleting file records is called as File? 1.
Updating
2.
Upgrading
3.
Reconstructing
4.
Renewing
Parallel computing means doing several tasks simultaneously thus improving the 1.
performance of the _____. Data system
2.
Computer system
3.
Memory
4.
Vector system
overflow condition was raised by the stack, which of the condition holds false 1.
maximum limit
exceeds
2.
top of the stack is
reached
3.
limited stack size
4.
none of these
111
Output will be 1.
100 100
#include<stdio.h>
2.
int myFunction(int parameter)
100 200
{
3.
return parameter; Error
} 4.
Warning during
main(){
compilation
int value=100;
printf("%d %d", myFunction(value), myFunction(value+100));
}
Output will be 1.
1
#include<stdio.h>
2.
#include<string.h>
-1
main(){
3.
char Be[16]="Positive "; 0
char Positive[16]="Positive "; 4.
Error
printf("%d",strcmp(Be,Positive) ); }
112
Output of the following code will be 1.
11
#include<stdio.h>
2.
int myFunction()
12
{
3.
return 1; 22
} 4.
Error
int myFunction(int a)
{
return 2;
}
main(){
printf("%d %d", myFunction(), myFunction(1));
}
113
Only one external reference is required for 1.
Linear linked
list
2.
Circular linked
list
3.
Double ended
list
4.
None of these
Nusrat sees her role as someone who provides direction and resources for her team then 1.
gets autocratic
out of their way and lets them do their work however they think best. Nusrat uses the 2.
________ participative
style of leadership. 3.
democratic
4.
laissez-faire
Non-type template parameters provide the ability to pass what type of data at 1.
int
compile time
2.
float
3.
constant
expression
4.
none of the
mentioned
Non-type parameters are mainly used for specifying _____ values or any 1.
max and
other constant value for a particular instance of a template.
min
2.
max or min
3.
min
4.
max
114
Nesting of try block is ………….. 1.
syntax error
2.
possible in
C++
3.
logical error
4.
both (a) and (c)
Negative cash flow is one of the classification when desired rate of return is minimum by 1.
actual rate of return True
2.
False
3. 4.
115
N Ach, N Aff and N Pow are related 1.
McClelland’s
Learned Needs
2.
ERG theory
3.
Justice
Theory
4.
Equity theory
Memory management technique in which system stores and retrieves data from secondary 1.
storage for use in main memory is called fragmentation
2.
paging
3.
mapping
4.
spooling
116
Memory Address locations are specified using which data representation? 1.
Sign-magnitude
2.
one`s complement
3.
Unsigned
4.
two`s complement
117
Match the following: 1.
i-a ii-b iii-c
i. Breadth-first search a. Heap
2.
ii. Depth-first search b. Stack
i-c ii-b iii-a
iii. Sorting c. Queue
3.
i-c ii-a iii-b
4.
i-a ii-b iii-c
118
Management as a Noun refers to __________ 1.
Group of
managers
2.
Functions of
management
3.
Subject of
management
4.
All of these
Magnetic tape is a 1.
serial access
medium
2.
Random access
medium
3.
A parallel access
medium
4.
NONE
119
Lower and upper limits are present in which chart ? 1.
Run chart
2.
Bar chart
3.
Control chart
4.
None of the
mentioned
Logical memory is broken into blocks of the same size called ________ 1.
frames
2.
pages
3.
backing store
4.
registers
120
Let w be a string and separated by three variable m, n, and o as per pumping lemma for 1.
regular language. What does these variables represent? string
2.
string count
3.
string and string
count
4.
none
Let the initial value of count be 5. What will be the final value of count if the instructions 1.
are executed in the following order: 50
S1;T1;S2;T2;S3;T3. 2.
25
Process P0:
3.
{
10
S1: register1=count;
4.
S2: register1=register1 - 5 0
S3: count=register1
}
Process P1:
{
T1: register2=count;
T2: register2=register2 X 5
T3: count=register2
}
121
Let the initial value of count be 10. What will be the final value of count if the 1.
instructions are executed in the following order: 50
S1;T1;S2;T2;S3;T3. 2.
Process P0: 20
{ 3.
S1: register1=count;
10
S2: register1=register1 - 5 4.
1
S3: count=register1
}
Process P1:
{
T1: register2=count;
T2: register2=register2 X 5
T3: count=register2
}
Legitimate power is based on the subordinate's perception that the leader has a right to 1.
exercise role or position
within the
influence because of the leader’s
organisation.
2.
expertise and
knowledge.
3.
personal
characteristics
and personality.
4.
ability to punish
or reward.
122
Left linear grammars are ...... of CFG 1.
Power set
2.
Sub set
3.
Super set
4.
Nullable
Lean philosophy regards everything not adding value to the customer as __________ 1.
Unnecessary
2.
Waste
3.
Useful
4.
Necessary
123
Leadership has a lot of characteristics, and a leader must not maintain this trait in his 1.
co-existence
behaviour:
2.
taking
responsibility
3.
avoiding
responsibility
4.
All the other
answers are
correct
Leaders that focus on the individuality and personality needs of their employees and 1.
job-centred
emphasize building good interpersonal relationships are:
2.
laissez-faire
3.
employee-oriente
d
4.
task-oriented
Leaders that focus on production and the job’s technical aspects are: 1.
job-centred
2.
laissez-faire
3.
general
4.
autocratic
3.
Availability
4.
Authentication
124
Keerthana solicits input from her subordinates before making decisions that will affect 1.
them. autocratic
She often praises them for good work and gently offers suggestions to improve their 2.
participative
performance. Keerthana uses the ________ style of leadership.
3.
democratic
4.
supportive
Kalam Enterprises recently fired two employees who were caught stealing tools 1.
from the What behaviour is
expected of Kalam
firm's warehouse. As a result, the CEO of Kalam wants to strengthen the firm's
employees?
ethical culture
2.
and prevent future violations by redesigning the firm's ethics program. Which of
What is the opinion of
the following
stakeholders
questions is the LEAST relevant when developing Kalam's new ethics regarding Kalam's
program? ethics?
3.
How are ethical
situations
communicated and
resolved at Kalam?
4.
What is the process for
Kalam establishing
a corporate giving
program?
125
It is through ______________ that group members can be inspired, motivated, 1.
and guided to be fellowship
successful and productive. 2.
sportsmanship
3.
coercion
4.
leadership
126
is a placeholder name which will be determined when the class is 1.
instantiated. Ttype
2.
type
3.
Type
4.
None
Interaction Diagram 1.
class + Object
2.
state + Activity
3.
component + Deployment
4.
Sequence + collaboration
127
Institute of Electrical and Electronics Engineers (IEEE) is the 1.
1.
Information security is the protection of data.
Information will be protected mainly based on Its sensitivity to the
company
2.
Its confidentiality
3.
Its value
4.
All the above
128
In working with his employees, Rahman involves them in decision making 1.
and encourages them to participate in deciding their work methods and autocratic
goals. Rahman’s leadership style can best be described as ________.
2.
laissez-faire
3.
democratic
4.
participative
information? Phishing
2.
Moshing
3.
Vishing
4.
Smishing
129
In this type of culture the behaviour of individuals are shaped by tradition, 1.
loyalty, personal commitment, extensive socialization and self-management Clan
2.
Market
3.
Entrepreneurial
4.
Bureaucratic
In the linked list, each node contains a minimum of two fields. One field is the data 1.
field to store the data second field is? Pointer to character
2.
Pointer to integer
3.
Pointer to node
4.
Node
130
In the graph traversing, Stack is useful for which searching algorithm? 1.
Depth first search
2.
Breadth first search
3.
In-order search
4.
Pre-order search
In synchronous TDM, for n signal sources of the same data rate, each frame 1.
contains _______ slots. n+1
2.
n-1
3.
0 to n
4.
n
131
In regular language pumping lemma, w= mn^io belongs to L then i ranges from? 1.
i>=0
2.
i<=0
3.
i>=1
4.
i<0
In Mintzberg’s management roles, the role that describes ethical guidelines and the 1.
principles of behavior employees are to follow in their dealings with customers and Liaison
suppliers is
2.
Figurehead
3.
Monitor
4.
Disseminator
132
In memory management , a technique called as paging, physical 1.
memory is broken into fixed-sized blocks called ___________. Pages
2.
Frames
3.
Blocks
4.
Segments
133
In his speech the previous day, the new CEO had discussed his 1.
experience in the industry and his education. Haripriya thought that trait
the new CEO would do a great job given these characteristics,
2.
coupled with his good oratory skills and the fact that he just looked
behavioural
like a CEO. Haripriya realized that she had been judging the new
CEO in a manner consistent with the ________ theories of 3.
leadership. contingency
4.
situational
134
Confidentiality, Integrity and
Authorization
In Big Five Personality dimensions, the hardworking, diligent, organized, dependable, and 1.
persistent behavior of a person is termed as Conscientiousn
ess
2.
Extraversion
–Introversio
n
3.
Agreeableness
4.
Emotional
Stability
135
In an inverted page table scheme 1.
One page table
is used in a
system
2.
One page table
for each
process is used
in a system
3.
One page table
for each file is
used in a
system
4.
One page table
for each
program is
used in a
system
department and student are entity sets in this university database and 2.
Participation of
they are linked through a relationship named DS, which among the
department in
following is a partial participation? DS
3.
Participation of
student in
department
4.
Participation of
student in DS
136
In a time sharing scheduling algorithm which of the data structure is used? 1.
Stack
2.
Queue
3.
Linked list
4.
Circular queue
In a stack, the command to access an nth element from the top of the stack s will be 1.
S[Top –n]
2.
S[Top +n]
3.
S[top-n-1]
4.
None of the
option
In a Segmentation scheme, given the logical address (4, 50) and the corresponding base 1.
address in the segment table as 5000, what is the physical address mapped to the given 0050
logical address?
2.
4050
3.
5050
4.
4000
In a reactive approach, the bulk of the test design work begins __________ 1.
Before any
software is
made
2.
After some
modules are
completed
3.
After every
module, testing
is done
4.
After the
software has
been produced
137
In a Paging scheme with page sizes of 1K, given the logical address (2, 35) and the 1.
corresponding frame number in the page table as 4, what is the physical address mapped to 5131
the given logical address?
2.
2030
3.
2083
4.
4131
In a Page replacement algorithm, which of the following type of page is the best page to 1.
replace. not recently
used but
modified
2.
recently used
but clean
3.
neither recently
used nor
modified
4.
recently used
and modified
In ___________ each component at lower hierarchy is tested individually and then the 1.
components that rely upon these components are tested. Top down testing
2.
Unit testing
3.
Bottom up
4.
138
Load testing
In MAC Tuples ,Process can read object when: Object MAC range (lr, hr); 1.
Imposing a total ordering of all resource types, and ensuring process requests 1.
resources in an increasing order of enumeration voilates the _______________ Mut
condition for deadlock ual
excl
usi
on
2.
Hol
d
and
Wai
t
3.
Circ
ular
Wai
t
4.
No
Pre
em
ptio
n
139
If there is a unique LMD , the grammar is 1.
ambiguous
2.
un ambiguous
3.
LLG
4.
RLG
If there is a complete DFA M1 recognizing a language L1 and has m states out of which 1.
two are final states then the machine M recognizing L1 complement will have m
_____________ final states.
2.
m+2
3.
2
4.
m-2
If the stringent regulations on the operational procedures exist, the project is considered as 1.
Semi -detached True
2.
False
3. 4.
If the data transfers are done asynchronously, which of the data structure is possible? 1.
Stack
2.
Queue
3.
Linked list
4.
All of these
140
If the characters 'D' 'C' 'B' 'A' are placed in a queue (in that order), and then removed one at 1.
a time, in what order will they be removed? DCAB
2.
ABCD
3.
ABDC
4.
DCBA
3.
n+1
4.
n
141
If L1 and L2 are CFL and R a regular set, one of the 1.
languages below is not necessarily a CFL. which one? L1nL2
2.
L1nR
3.
L1L2
4.
L1UL2
1.
If a selection sort algorithm in the worst
case is taking 20sec for processing an 256
2.
array of size 32. Which of the following is
512
close to the maximum input size that can
3.
be solved in 5 minutes?
1024
4.
128
142
Identity and Access Management (IdAM) 1.
Identify the organisational risk from the following 1.Software components which should be reused
contain defects which limit their functionality
2.Required training for staff is not available
3.Customers fail to understand the impact of
requirements changes 4.None in the list
143
How often should your data be backed up? 1.
In accordance with your
organization’s backup policy
2.
Once a fortnight.
3.
Once a month.
4.
Once a week.
How many “SCOPE”s are printed?, how many “SCOPE”s are printed by 1.
only child processes? 5,2
int main() 2.
5,3
{
3.
if(fork() || fork())
5,4
fork();
4.
printf("SCOPE"); 5,1
}
How many “SCOPE”s are printed?, how many “SCOPE”s are printed by 1.
only child processes? 5,2
int main() 2.
5,3
{
3.
if(fork() && fork())
5,4
fork();
4.
printf("SCOPE"); 5,1
}
Answer is 4,3 according to me
144
How many “hello” messages will be printed if the following program is 1.
executed? 2
int main() 2.
3
{
3.
pid_t p;
1
fork();
4.
if (p >0) 4
{
fork();
fork();
}
if (p==0)
{
fork();
fork();
exit(0);
}
printf(“hello”);
}
145
How many “hello” messages will be printed if the following program is 1.
executed? 1
int main() 2.
3
{
3.
pid_t p;
0
fork();
4.
if (p >0) 4
{
fork();
fork();
exit(0);
}
if (p==0)
{
fork();
fork();
exit(0);
}
printf(“hello”);
}
146
How many minimum no of stack is required for the runtime executable script 1.
1
2.
2
3.
3
4.
4
How many address lines are needed to address each memory locations in a 1.
2048 x 4 memory chip? 10
2.
12
3.
11
4.
8
147
Hospitals, banks, and supermarkets are all linked using which 1.
WAN
network type?
2.
LAN
3.
BUS
4.
WiFi
3.
abstraction
4.
encapsulation
148
Harsha Electronics has used several methods to create an ethical culture that 1.
both asking job candidates
ethical questions
employees and customers appreciate. What is the most effective way for the firm
to sustain its 2.
implementing an ethics
ethical culture?
audit regularly
3.
publishing the firm's
code of ethics
periodically
4.
ensuring that new
employees receive
ethics training
149
Hardware solution to the critical section problem using swap: 1.
Implements
while(true)
mutual
{key = TRUE; exclusion and
progress
while(key==TRUE)
2.
Swap(&lock,&key);
Implements
//critical sectionlock = FALSE; only mutual
exclusion
//remainder section}
3.
Implements
progress and
bounded
waiting.
4.
Implements
mutual
exclusion and
bounded
waiting.
printf("%s",Be ); }
150
Guess the output 1.
200
#include<stdio.h>
2.
main(){
100
int a=100;
3.
int b=200; a. Address of variable a
int c[1][2][3]={&a}; 4.
a. Address of variable b
c[1][1][1]=&b;
printf("%d",c[1][1][1]);
}
151
Greetwell Technologies wants to gain the confidence of employees and 1.
customers by developing placing the code of
ethics on the firm's
a strong ethical culture. Which of the following methods would be the best way
intranet
for the firm's HR
2.
department to accomplish this goal?
posting the code of
ethics in the breakroom
3.
providing ethics training
to employees
4.
having employees sign
ethics contracts
3.
regular, but not context-free
4.
context-free, but not regular
Given five memory partitions of 200Kb, 500Kb, 200Kb, 300Kb, 600Kb (in 1.
order), which algorithm would be able to successfully place the following Best Fit
processes of 212 Kb, 417 Kb, 112 Kb, and 126 Kb?
2.
Worst Fit
3.
First Fit
4.
All the given
choices.
152
Given five memory partitions of 100Kb, 500Kb, 200Kb, 300Kb, 600Kb (in 1.
order), which algorithm would be able to successfully place the following Best Fit
processes of 212 Kb, 417 Kb, 112 Kb, and 426 Kb?
2.
Worst Fit
3.
First Fit
4.
All the given
choices.
2.
N!
3.
2^N
4.
N^2
Frustration-Regression is related to 1.
Maslow’s Hierarchy
2.
ERG theory
3.
Justice Theory
4.
Equity theory
153
Frames from one LAN can be transmitted to another LAN via the device 1.
Router
2.
Bridge
3.
Repeater
4.
Modem
Frames from one LAN can be transmitted to another LAN via the device 1.
Router
2.
Bridge
3.
Repeater
4.
Modem
For every pair of regular expressions r and s, the languages denoted by r(sr)* and 1.
(rs)*r are the same. True
2.
False
3.
Can't determined
4.
Neither True and Nor
False
For every ....grammar there is equivalent grammar for the same language which is 1.
..... ambiguous grammar,
un ambiguous
grammar
2.
un ambiguous
grammar, ambiguous
grammar
3.
ambiguous grammar,
ambiguous grammar
4.
154
un ambiguous
grammar, un
ambiguous grammar
For any two functions g(n) and f(n), f(n) = Q(g(n)) iff 1.
f(n) = O(g(n)) and f(n) =
W(g(n))
2.
f(n) > O(g(n)) and f(n) =
W(g(n))
3.
f(n) = O(g(n)) and f(n)
=>W(g(n))
4.
None of these
155
Finite automata recognizes --------grammars 1.
type-3
2.
type-1
3.
type-2
4.
type-0
2.
No auxiliary memory
3.
Finite
4.
auxiliary memory
Find the shortest path from the root to a given node v. Which algorithm 1.
would one use to find this shortest path? DFS
2.
BFS
3.
Either BFS or DFS
4.
The statement is incomplete
156
Find the correct statement(s) 1.
(i). A try block can throw an exception using “throw” only (i)
(ii). A catch block always catch and handle the exception and never ever 2.
throws the exception. only (i) and (iii)
(iii). A catch also sometimes throws the exception using “throw” 3.
only (ii) and (iii)
4.
(i), (ii) and (iii)
157
F.W. Taylor has done the following studies for improving the production 1.
process: Time Study, Fatigue Study and
Fatal Study.
2.
Time Study, Motion Study and
Fatal Study.
3.
Time Study, Motion Study and
Fatigue Study.
4.
Time Study, Motivation Study
and Fatigue Study.
Exceptions are…….. 1.
Syntax error
2.
Logic error
3.
Compile time error
4.
158
Run time error
159
Event based modelling in UML 1.
Activity Diagram
2.
State Diagram
3.
Class Diagram
4.
Object Diagram
160
Esprit de corps refers to 1.
Team work and cooperation
2.
A Single Boss
3.
Flexibility
4.
None of these
161
Empty stack top pointer indicates to 1.
Last memory location
2.
Set to 1
3.
Set to -1
4.
Beginning of memory location
162
Early research on leadership traits ________. 1.
sought to prove that charisma was
an essential trait of leadership
2.
focused on behavioural traits
rather than physical traits of a
leader
3.
found consistent and unique traits
that would apply to all effective
leaders
4.
focused on characteristics that
might differentiate leaders from
non-leaders
EA stands for______. 1.
Effective add
2.
Effective absolute
3.
Effective address
4.
End address
163
DSDM stands for _____________ 1.
Dynamic systems development method
2.
Dynamic solutions development method
3.
Database systems development method
4.
Database solutions development method
Draw up plans to avoid or minimise 1.Risk identification 2.Risk analysis 3.Risk planning 4.Risk monitoring
the effects of the risk is called
____________
164
Disk scheduling policies results in 1.
minimum amount of head FCFS
movement.
2.
Circular SCAN
3.
Elevator
4.
CSCAN
Disk Response Time is... 1.the average of time spent by a request waiting to perform its I/O
operation. 2.the time taken to locate the disk arm to a specified track
where the data is to be read or write. 3.the time taken by the desired
sector of disk to rotate into a position so that it can access the
read/write heads. 4.the time taken to complete the execution.
Dialogue control and Token management are responsibility of which OSI Layer 1.
session layer
2.
network layer
3.
transport layer
4.
data link layer
Design techniques which one is used to finding all the pairs of shortest distances in a 1.
graph? Backtracking
2.
Greedy
3.
Dynamic
programming
4.
Divide and Conquer
165
Departmentalization is a process in which 1.
Tasks are grouped
into jobs
2.
Jobs are grouped
into effective work
groups
3.
Work groups are
grouped into
identifiable segments
4.
All the other answers
are correct
Definition of a language L with alphabet {a} is given as following. L= { a^nk | k > 0, and 1.
n is a positive integer constant} What is the minimum number of states needed in a 2^n+1
DFA to recognize L
2.
n+1
3.
k+1
4.
2^k+1
166
Data on someone's racial or ethnic heritage, political, philosophical, or religious beliefs, 1.
union affiliation, and health or sex life and sexual orientation, either directly or indirectly. Direct personal data
What kind of personal information is this?
2.
Indirect personal data
3.
Pseudonymized data
4.
Special category
personal data
CPU fetches the instruction from memory according to the value of ____________ 1.
program counter
2.
status register
3.
instruction register
4.
program status word
Correct relationship 1.
O(log n) < O(n) < O(
n* log n) < O(2^n ) <
O(n^2 )
2.
O(n) < O(log n) < O(
n* log n) < O(2^n ) <
O(n^2 )
3.
O(n) < O(log n) < O(
n* log n) < O(n^2 ) <
O(2^n )
4.
O(log n) < O(n) < O(
n* log n) < O(n^2 ) <
O(2^n )
Control that monitors ongoing employee activities during their progress, to ensure they 1.
are consistent with quality standards, is called as Feed Forward
Control
2.
Concurrent
Control
3.
Feedback Control
167
4.
Control measure
Control that attempts to identify and prevent deviations before they occur 1.
is called as Feed Forward Control
2.
Concurrent Control
3.
Feedback Control
4.
Control measure
168
Consider the regular language L = (111 + 11111)*. The minimum number 1.
of states in any DFA accepting the language is 3
2.
5
3.
8
4.
9
4.
(a+b)*
4.
CSL but not CFL
3.
type 0 language but not type 1
4.
regular
169
1.
Consider the following DFA. How many states
5
does the DFA has after minimization? 2.
4
3.
3
4.
2
It is called as ……. 2.
Pure virtual function
3.
Syntax Error
4.
Only variable can be equated to
Zero; not functions- So it is not
supported by C++.
Consider that a page is 1KB in size and a process is 9485 bytes in length. 1.
What would be the number of valid entries in the corresponding page 8
table?
2.
10
3.
9
4.
11
Consider pumping lemma of regular language, here w= pqr and q refers to the middle 1.
part and |q|>0.What do we call the process of repeating q 0 or more times before Pumping
checking that they still belong to the language L or not?
2.
Generating
3.
Creating
4.
Producing
170
Consider an operating system capable of loading and executing a single sequential 1.
user process at a time. The disk head scheduling algorithm used is First Come First 50%
Served (FCFS). If FCFS is replaced by Shortest Seek Time First (SSTF), claimed by
2.
the vendor to give 50% better benchmark results, what is the expected improvement in
40%
the I/O performance of user programs?
3.
25%
4.
0%
171
Company (cid, name, department). Here, the ‘name’ is a --------------------------- and 1.
‘Company’ is a ---------------------- Relation, Attribute
2.
Attribute, Relation
3.
Tuple, Relation
4.
Tuple, Attribute
Compaction is ______ 1.
a technique for
overcoming internal
fragmentation
2.
a paging technique
3.
a technique for
overcoming external
fragmentation
4.
a technique for
overcoming fatal
error
172
Class contains.................... 1.
Members
2.
data types
3.
variables
4.
all of them
Choose the software quality activites from the below 1.Prepares an SQA plan for a project 2.Records any
noncompliance and reports to senior management
3.Participates in the development of the project's
software process description 4.All the options
Choose the purpose of reviews from the below 1.Serve as a filter for the software process 2.Uncover
errors that can then be removed 3.Catch large classes of
errors that escape the originator more than other
practitioners 4.All the options
173
Change control procedures are developed by 1.
organizations to ensure that ________ All changes are authorized, tested, and recorded.
2.
Changes are controlled by the Policy Control Board
(PCB).
3.
All changes are requested, scheduled, and completed on
time.
4.
Management is advised of changes made to systems.
Centralisation 1.
Increasing the importance of subordinate role
2.
Decreasing the importance of subordinate role
3.
Both are correct
4.
None
174
Blocks to be placed at the upper level of the 1.
hierarchy scheme used, is from direct memory to Set definitive
2.
Block associative
3.
Fully associative
4.
Set associative
175
Attributes, relations and map entities in oracle is represented by 1.
Conceptual schema
2.
Physical schema
3.
Logical schema
4.
All of above
176
Assume page size as 2KB and a process is 72750 bytes in length. What is 1.
the size of the internal fragment? 878
2.
1078
3.
978
4.
1178
Assess the likelihood and consequences of these risk is called 1.Risk identification 2.Risk
______________ analysis 3.Risk planning 4.Risk
monitoring
177
Arunima, an HR manager, has been given the task of 1.
strengthening the ethical culture at her e-mailing ethics codes to all employees
firm. Which of the following activities would be most 2.
beneficial? posting ethics code posters in the hallways
3.
writing a memo about ethics to top executives
4.
discussing ethics during performance
appraisals
Analysis the probabilty and effects for the risk "The size 1.High and Serious 2.Moderate and Serious
of the software is underestimated" 3.Moderate and Tolerable 4.High and Tolerable
Analysis the probabilty and effects for the risk 1.High and Serious 2.Moderate and Serious
"HighCatastrophicKey staff are ill at critical times in the 3.Moderate and Tolerable 4.High and Tolerable
project"
178
An over-generalized, oversimplified, and 1.
self-perpetuating belief about people’s personal Perception
characteristics is known as
2.
Stereotype
3.
Attribution
4.
Personality
179
An implied understanding of mutual contributions between a person and his or 1.
her organization, which is not a written document, is called as Psychological contract
2.
Legal contract
3.
Illegal contact
4.
Unwritten contract
180
Amount of data utilized by the stack, which of the content holds 1.
not a fixed size
2.
the amount of the data
fluctuates
3.
depends on stack's lifetime
4.
all of these
After a study of the work processes on a project, a quality audit team reports 1.Quality control 2.Quality
to the project manager that irrelevant quality standards were being used by planning 3.Checking
the project, which might lead to rework. What was the objective of the project adherence to processes
manager in initiating this study? 4.None in the list
181
Aditi has a reputation of being fair, helpful, and understanding. She even 1.
helped her consideration
subordinate overcome a personal crisis. Which one of the following 2.
dimensions of leadership is initiating structure
Aditi displaying here? 3.
employee orientation
4.
task orientation
182
4.
higher under a
democratic leader
than under an
autocratic one
According to the Ohio State studies, the ________ dimension of leader behaviour is 1.
defined as relationship
management
the extent to which a leader has job relationships characterized by mutual trust and
respect for 2.
consideration
group members' ideas and feelings.
3.
people orientation
4.
integrity
According to the Ohio State studies, ________ refers to the extent to which a leader is 1.
likely people orientation
to define and shape his or her role and the roles of group members in the search for 2.
goal production
orientation
attainment.
3.
initiating structure
4.
consideration
183
According to Burns and Stalker, which of the following is a feature of organic 1.
organisations? Emphasis on
vertical
communication
channels
2.
Prestige drawn
from personal
contribution
3.
Stress on
obedience to
superiors and
loyalty to the
organisation
4.
Knowledge
requirement
based on job
184
Access is determined by rules in Rule-Based Access Control (RuBAC). What type of 1.
access control would such restrictions fall under? Discretionary Access
Control (DAC)
2.
Mandatory Access
control (MAC)
3.
Non-Discretionary
Access Control
(NDAC)
4.
Lattice-based Access
control
ABC Airways uses software to manage reservation of its passengers. After a year of its use, 1.
the database administrator decided to add few attributes with the passenger table. If he is Physical data
able to change the structure of passenger table without adjusting its front-end, how do we call independence
such independence?
2.
Logical data
independence
3.
External data
independence
4.
View data
independence
185
Trojan
Horse
4.
Exposures
186
A stable set of characteristics and tendencies that determine commonalities and differences 1.
in people’s behavior is called Attitude
2.
Stereotype
3.
Attribution
4.
Personality
A software process is a set of related activities that gives outcome to the ____________of 1.
the software Production
2.
Engineeing
3.
Sales
4.
None of the
above
A rule of thumb is if you can find another company which can do a non-core activity better 1.
and faster, ________________. you should
keep
produ
cing.
2.
you should
comp
ete
with
the
comp
any.
3.
you should
outsource.
4.
you should
increase your
efficiency.
187
A reporting relationship in which an employee receives orders from, and reports to, only one 1.
supervisor is known as: Line of
authority
2.
Unity of
direction
3.
Unity of
command
4.
Responsibility
188
A process of verifying the validity of a claimed identity of a 1.
Identification
person is called? 2.
Authentication
3.
Authorization
4.
Accountability
A process is thrashing if 1.
it is spending more time
paging than executing
2.
it is spending less time
paging than executing
3.
page fault occurs
4.
swapping cannot take
place
1.
A problem is said to be decidable if it is a
recursively
enumerable
2.
recursive
3.
context-sensiti
ve
4.
None of the
choices.
189
A period of "testing-out" the leaders in group development stages 1.
Storming
2.
Norming
3.
Performing
4.
Adjourning
2.
scheduler
3.
memory management
4.
file management system
190
A leader uses _____________ when giving the individual or group the authority 1.
and responsibility to decide. consultatiom
2.
laissez-faire
3.
joint decision
4.
delegation
A language that can generate the new data types is known as ___ 1.
191
a file system with data stored on a server. The data is accessed and 1.
processed as if it was stored on the local client machine. distributed file system
2.
stand-alone machine
3.
Internet file system
4.
EXT2 FS
192
A data dictionary is a special file that contains 1.
The Data type of all fields in all files
2.
The name of all fields in all files
3.
The data type of all fields in all files
4.
All of the above
2.
Quality or costs
3.
Benefits or costs
4.
None of the above
193
A company is running with a peer-to-peer network of 30 1.Discretionary 2.
Mandatory
computers. The policy is such that all system users are 3.
Role-based
responsible for their own security and they can set file
4.
and folder privileges on their own. Which of the following Nondiscretionary
company?
194
A bus is one possible local area network topology. One advantage of 1.
195
A ____________ of an issue consists of weighing and balancing all of the 1.
competing demands on a firm by each of those who have a claim on it. stakeholder
analysis
2.
board of directors’
analysis
3.
corporation analysis
4.
management analysis
A ____________ leader avoids power and leaves the group entirely to itself. 1.
socialistic
2.
democratic
3.
autocratic
4.
laissez-faire
196
______is concerned with the safety of a person's personal information while 1.
accessing the Internet on any computer or mobile device. Digital agony
2.
Digital privacy
3.
Digital secrecy
4.
Digital protection
2.
Spiral
3.
COCOMO
4.
Incremental
197
_______________ ensure there is always an up-to-date system that can be 1.
demonstrated to the client. Domain Object Modelling
2.
Individual Class (Code)
Ownership
3.
Visibility of progress and results
4.
Regular Builds
_____________ is the system call that the parent has to invoke in order 1.
to avoid creating zombie processes? wait()
2.
Sleep()
3.
exec()
4.
execvp()
198
_____________ consists of exploring and explaining the domain of the 1.
problem to be solved. Feature Teams
2.
Inspections
3.
Domain Object Modelling
4.
Configuration Management
___________ is very useful in situations when data have to be stored and then 1.
retrieved in reverse order. Stack
2.
Queue
3.List 4.
Linked List
199
___________ communication modes support two-way traffic but in only one 1.
direction at a time? simplex
2.
half duplex
3.
three-quarters duplex
4.
all of the above
__________ is the responsible for carrying out the instructions and procedures 1.Project manager 2.Project
necessary for performing software configuration management tasks are leader 3.Programmer 4.None
documented in the software configuration management plan. from the list
__________ is the minimum number of steps that can execute for the given 1.
parameters Average case
2.
Worst case
3.
Time complexity
4.
Best case
200
__________ is the average number of steps that can be executed for the given 1.
parameters Average case
2.
Worst case1
3.
Time complexity
4.
Best case
201
_________ utilization is the use of available bandwidth to 1.
achieve specific goals. Amplitude
2.
Frequency
3.
Bandwidth
4.
None of the above
202
_________ are used for cellular phone, satellite, and 1.
wireless LAN communications. Radio waves
2.
Infrared waves
3.
Microwaves
4.
None of the above
________ are used for short-range communications such as those between a PC and a 1.
peripheral device. Radio waves
2.
Infrared waves
3.
Microwaves
4.
none of the above
_______ is the singleness of purpose that makes possible the creation of one plan of 1.
action to guide managers in resource allocations. Unity of direction
2.
Unity of command
3.
Unity of
resources
4.
Unity of
authority
203
_______ is designed to be used in wireless applications in which stations must be able to 1.
share the medium without interception by an eavesdropper and without being subject to Multiplexing
jamming from a malicious intruder.
2.
Spread spectrum
3.
Modulation
4.
None of the
above.
______ can be applied when the bandwidth of a link (in hertz) is greater than the 1.
combined bandwidths of the signals to be transmitted. TDM
2.
FDM
3.
Both TDM or
FDM
4.
Neither TDM or
FDM
______ cables are composed of a glass or plastic inner core surrounded by cladding,all 1.
encased in an outside jacket. Coaxial
2.
Fiber-optic
3.
Twisted-pair
4.
none of the above
204
_____ is the concept in which a process is copied into main memory from the secondary 1.
memory according to the requirement. Paging
2.
Demand paging
3.
Segmentation
4.
Swapping
____ function can create versions of the add function for adding the int, 1.
205
____ data type represents the file stream generally, 1.
Fstream
and has the capabilities of both ofstream and ifstream
2.
which means it can create files, write information to stream
files, and read information from files. 3.
filestream
4.
None
L(G2)
4.
and G2 , it is undecidable
whether
L(G1) = L(G2)
206
1.
Which one of the following is decidable?
Given a string M,
a string s, and
an integer k,
M accepts s
with k steps
2.
Equivalence of
two given
Turing
machines
3.
Language
accepted by a
given DFA is
nonempty
4.
Language
generated by
a CFG is
nonempty
n n 1.
The language { 0 2 1 / n ≥ 0 } over the alphabet { 0, Not recursive
1, 2} is 2.
is recursive and is a deterministic
CFL
3.
is a regular language
4.
is not a deterministic CFL but a
CFL.
207
1.
It is undecidable, whether
an arbitrary TM has 15 states
2.
an arbitrary TM halts after 10
steps
3.
an arbitrary TM ever prints a
specific letter
4.
an arbitrary TM accepts a
string w in 5 steps
2.
Half duplex
3.
Selective repeat ARQ
4.
Hybrid
208
Which of the following is not a primitive root of 17? 1.
7
2.
10
3.
14
4.
4
4.
CRC
2.
Simple parity check
3.
Two-dimensional parity check
4.
Checksum
209
What is the minimum hamming distance of this coding scheme d 1.
(01101,10011)? 1
2.
2
3.
3
4.
4
2.
N = N / (1 +
2a)
3.
N = N * (2a
+ 2a)
4.
N = N * (1
+ 2a)
The term that refers to a set of procedures used to restrict the amount of data 1.
that the sender can send before waiting for acknowledgment is Error
control
2.
Flow
control
3.
Delay
4.
210
Byte
stuffing
2.
5
3.
6
4.
7
The ________ method provides a one-time session key for two parties. 1.
Diffie-Hell
man
2.
RSA
3.
DES
4.
AES
3.
ARS
4.
PRS
211
Parity bits are used for which of the following purposes? 1.
Encryption
of data
2.
To transmit
faster
3.
To detect
errors
4.
To identify
the user
2.
Simplest
3.
Go-Back-N
ARQ
4.
Selective-R
epeat ARQ
212
In the _________ Protocol, the sender sends one frame, stops until it receives 1.
confirmation from the receiver, and then sends the next frame. Stop-and-W
ait
2.
Simplest
3.
Go-Back-N
ARQ
4.
Selective-R
epeat ARQ
In the _________ Protocol, the sender sends its frames one after another with 1.
4.
Selective-R
epeat ARQ
2.
Go-Back-N
ARQ
3.
Selective-Re
peat ARQ
213
4.
None of the
above
In stop and wait flow control, for n data packets sent, how many 1.
2.
n
3.
2n
4.
n+1
3.
Zeros
4.
Last frame
214
In Selective Repeat ARQ, if 4 is the number of bits for the sequence number, 1.
2.
16
3.
31
4.
8
In Selective Repeat ARQ, if 4 is the number of bits for the sequence number, 1.
2.
16
3.
31
4.
8
2.
6
3.
7
4.
8
215
In Go-Back-N ARQ, if 10 is the number of bits for the sequence number, 1.
2.
16
3.
31
4.
1
In CRC if the data unit is 100110111 and the divisor is 1111 then what is 1.
3.
100111001
4.
1001110011
10
216
If the information is protected from unauthorized change which of the 1.
2.
Manually
repeat
request
3.
Situation
based
4.
Terminated
request
217
CRC stands for 1.
Cyclic
Redundancy
Check
2.
Code
Repeat
Check
3.
Code
Redundancy
Check
4.
Cyclic
Repeat
Check
Bob receives a message digitally signed by Alice. Bob wants to verify the 1.
218
Alice’s
Private Key
4.
Bob’s
Private Key
3.
Error
detecting
code
4.
Hamming
code
message. Passive
2.
Active
3.
Both
Passive and
Active
4.
None of the
given
choices
219
_____________ is a technique of decoding messages from a non-readable 1.
form back to readable format without knowing how they were initially Cryptograph
converted from readable format to non-readable format. y
2.
Encryption
3.
Decryption
4.
Cryptanalysi
s
using mathematical formulas to understand the hidden aspects of the system. Cryptograph
y
2.
Cryptanalysi
s
3.
Cryptology
4.
None of the
choices
220
The term that is used to set standards to enable intercommunication among 1.
Which of the following ensures that data received was sent by the 1.
221
None of the
choices
The science and art of converting messages to make them secure and 1.
222
DES will fall under the category of ___________ 1.
Electronic Cipher
Book
2.
Electronic Code
Book
3.
Complex block
cipher
4.
None of the
choices
223
Which of these is a disadvantage of a Bus network? 1.
Expensive
2.
Needs extra
hardware
3.
Slow
4.
To connect
devices to each
other
224
Which of the following statement/statements is/are 1.
when the process request for DMA operation. The process, which has requested for
DMA is temporarily suspended.
2.
The process, which has requested for
DMA continues execution.
3.
Another process, gets executed.
4.
The process, which has requested for
DMA is temporarily suspended and
another process start executing.
225
Which of the following is TRUE, with respect to 1.
“difference between DMA and Interrupt mode of DMA involves the processor for the
I/ O data transfer”? I/O transfer
2.
The rate of data transfer is moderate in
DMA
3.
The amount of data transfer is less in
DMA
4.
None of the mentioned options.
226
The significance of I/O mapped I/O with memory 1.
continuous monitoring its status using status flag is Program – controlled I/O
2.
referred as ___________________________
Memory mapped I/O
3.
I/ O mapped I/O
4.
Interrupt driven I/O
contention over the BUS possession and usage. Multiple BUS structure
2.
Single BUS Structure
3.
BUS Optimizers
4.
BUS arbitrator
227
Overall speed of transfer in RAID level 4 is 1.
Low
2.
Very low
3.
High
4.
None of the mentioned options
228
All the mentioned options.
229
Which of the following statement is TRUE, with respect 1.
230
The control circuit which is responsible for the DMA 1.
231
Worst-case complexity is mostly used in algorithm 1.
232
Which of the following statement is the 1.
correct reason for analyzing algorithms? To choose the best algorithm for a particular
task
2.
To study and improve the algorithm
performance from existing algorithms
3.
Both
4.
None
algorithms Alertness
2.
Definiteness
3.
Finiteness
4.
Effectiveness
233
Which of the following is compulsory 1.
234
Problems that any algorithm cannot solve
word. Which of the following statement is Word is a collection of bits stored in computer
correct for term word. memory. Its size is a 4 to 64 bits
2.
Word is a collection variable used in an
algorithm, which is a sum of each variable type
memory occupied memory.
3.
Word is a count of statements used in the
algorithm
4.
Word is the total algorithm size.
235
P class problem means: 1.
Problems that can be solvable in
polynomial time
2.
Tractable problems.
3.
whose time complexity is O(N^c)
where N is input size and C is
constant
4.
All
236
In recursion, which data structure were used 1.
Hash table
2.
Stack
3.
Queue
4.
Dictionary
237
If every problem in NP can be polynomial-time 1.
238
None
2.
b) N = L + 1
3.
c) N = L – 1
4.
d) N = 2*L – 1
239
Which operator connects the structure name to 1.
.
its member name?
2.
->
3.
-
4.
*
240
What is the average case time complexity for 1.
finding the height of the binary tree? a) h = O(loglogn)
2.
b) h = O(nlogn)
3.
c) h = O(n)
4.
d) h = O(log n)
2.
b) Each node has exactly
two children
3.
c) All the leaves are at the
same level
4.
d) Each node has exactly
one or two children
241
What is a complete binary tree? 1.
a) Each node has exactly
zero or two children
2.
b) A binary tree, which is
completely filled, with the
possible exception of the
bottom level, which is filled
from right to left
3.
c) A binary tree, which is
completely filled, with the
possible exception of the
bottom level, which is filled
from left to right
4.
d) A tree In which all nodes
have degree 2
2.
b) Depth
3.
c) Length
4.
d) Width
242
Product 1.
alter table vendor add
(productid varchar2(10), productname varchar2(10), constraint vendorid not
product_price number,manufacturing_date date, null;
vendorId varchar2(10))
Vendor 2.
(vendorId varchar2(10), vendorname varchar2(10), alter table vendor modify
location varchar2(10)) constraint vendorid not
null;
The sql query to establish not null constraint on the
vendorid column in the vendor table is
3.
alter table vendor modify
vendorid varchar2(10) not
null;
4.
alter table vendor add
constraint vendor_nn not
null;
243
Present-day electronic mail systems are based on 1.
Store and forward model
2.Saveand retrieve model 3.
Forward and retrieve model
4.
Save and pop model
244
Which is false about FTP? 1.
Transfer files and
folders back and
forth
2.
Builds and
maintains a
website
3.
Securely
transferring files
4.
uploads or
downloads files
245
Numerous IT organizations collect and gather information in 1.
SNMP
hierarchical structure also manage and monitor files with the
help of which protocol? 2.
Telnet
3.
FTP
4.
SMTP
In the Internet stack, the protocol data unit (PDU) for the 1.
Segment
application layer is
2.
Datagram
3.
Message
4.
Frame
246
An alert to a remotely located host from one application 1.
Inform
through agents of management protocol is
2.
Get
3.
Trap
4.
Set
Which detects user activity on the internet and sends the data 1.
Malware
to a third party in the background?
2.
Adware
3.
Spyware
4.
Security treat
247
Encryption is a form of security. Encryption, on the other 1.
Hubs
hand, offers nothing to keep hackers and other digital
pests distant. We'll need? to achieve this objective. 2.
Bridge
3.
Routers
4.
Firewalls
This theories talk about Freudian approach that discusses the id, 1.
superego, and ego. Trait Personality Theories
2.
Psychodynamic
Personality Theories
3.
Humanistic Personality
Theories
4.
Self efficacy theories
Participative management 1.
a) Empower employees
2.
a) Collective decision making
3.
Both empower employees and
collective decision making
4.
Neither empower employees
nor collective decision making
248
4.
the only social
responsibility of
business is to increase
profits
249
The plain text “come home tomorrow” will be transformed into 1.
which of the following if it uses Rail-fence technique. cmhmtmrooeoeoorw
2.
cmtmhmrooreoeowo
3.
cmhmtmeoeoroorwo
4.
None of the given
choices
3.
Phishing attack
4.
Snooping
The term _____ means the redesign of a vertical organization along its 1.
vertical
horizontal workflows and processes.
linkage
2.
vertical
network
grouping
3.
innovation
4.
reengineering
250
4.
Formalisation
251
biased
supervision.
4.
lack of
supervision.
252
Neither (a)
nor (b)
253
Which of the following is not right about the formal 1.
Deliberately planned &
organization
created by management
2.
Stable & predictable
3.
Violation of rules may lead
to penalties
4.
Managers are chosen
1.
O(2n)
2.θ(2n)
3.
Which of the following holds true for the relation? Ώ(2n)
4.
None of these
254
Which of the following does NOT describe a problem with 1.
Productivity increases may not
scientific management?
be reflected in workers’ pay
2.
It is better suited to complex
jobs.
3.
Improvement is not necessarily
maintainable.
4.
It is better suited to simple jobs.
255
Mayo
256
The Hawthorne Studies doesn’t include 1.
The illumination studies
2.
The Relay Assembly Test Room
Studies
3.
The mass interviewing Program
4.
The time and motion study
257
Planning function of management is performed 1.
Top Management
by________________________.
2.
Middle Management
3.
Lower Management
4.
All of the above
MBO is 1.
Management By Options
2.
Management By Operations
3.
Management By Objectives
4.
Management By Orders
258
In expectancy theory, value of rewards is termed as 1.
Expectancy
2.
Instrumentality
3.
Valence
4.
Values
259
In Big Five Personality dimensions, the ability a person displays in 1.
Conscientiousness
handling stress by remaining calm, focused, and self-confident, as
opposed to insecure, anxious, and depressed is known as 2.
Extraversion–Introversion
3.
Agreeableness
4.
Emotional Stability
260
Forming, Storming,
Norming, Performing,
Adjourning
261
Fibonnaci sequence complexity can only be identified 1.
Iterative method
by?
2.
Recursive method
3.
Master theorem
4.
All of them
262
Attributions that emphasize the environment’s effect on 1.
Dispositional Attributions
behavior is called
2.
Situational Attributions
3.
Event Attributions
4.
Skill Attributions
263
Find the correct statement(s) below: 1.
There should be one catch block
for one try block.
2.
There may be multiple catch block for
single try block.
3.
There may be a catch block
without even a single try block.
4.
All are correct
264
Documents that outline how goals are to be 1.
Plans
accomplished are called
2.
Goals
3.
Strategies
4.
Ideas
265
A persons’ knowledge and ability to make effective use 1.
of any process or technique constitutes Technical skills
2.
Human skills
3.
Conceptual skills
4.
Employee skills
266
Network congestion occurs........ 1.
in case of traffic
overloading
2.
when a system
terminates
3.
when connection between
two nodes terminates
4.
when connection between
three nodes terminates
FORTRAN is a 1.
regular language
2.
context free language
3.
context sensitive language
4.
None of the above
267
Which of the following ISO standards is typically used as a 1.
IEEE
framework for network communications?
2.
802.1X
3.
Ethernet
4.
OSI/RM
268
Tractable problems mean 1.
Problems that cannot be solved in
polynomial time
2.
Problems that can be solved in polynomial
time
3.
Problems that can be solved in constant
time
4.
Problems that can be solved in
non-polynomial time
269
Which of the following statements is false? 1.
Mobile devices must be concerned with
power consumption.
2.
Mobile devices can provide features that
are unavailable on desktop or laptop
computers.
3.
The difference in storage capacity between
a mobile device and a laptop is shrinking.
4.
Mobile devices usually have fewer processing cores
than a standard desktop computer.
270
Which of the following is a property of 1.
peer-to-peer systems? Clients and servers are not distinguished
from one another
2.
Separate machines act as either the client
or the server but not both.
3.
They do not offer any advantages over
traditional client-server systems
4.
They suffer from the server acting as the
bottleneck in performance
What is Scheduling? 1.
Allowing a job to use the processor
2.
Making proper use of Processor
3.
None of the mentioned
4.
All of the mentioned
271
What are some other terms for kernel-mode? 1.
Supervisor mode
2.
System mode
3.
Privileged mode
4.
All of the above
272
The most common secondary storage device is ____. 1.
Random-access memory
2.
Solid-state disks
3.
Tape drives
4.
Magnetic disk
273
A(n) ________ is the unit of work in a system. 1.
Process
2.
Operating System
3.
Timer
4.
Mode bit
274
__________ is a set of software frameworks that provide 1.
additional services to application developers. System programs
2.
Virtualization
3.
Cloud computing
4.
Middleware
275
Match the items of List-II with the items of List-I and indicate the code of correct 1.
matching. (iv)
(ii)
List-I List-II (iii)
(i)
(Model of Organisational (Employee
2.
Behaviour) Orientation)
(iv)
(iii)
(i) Responsible
(i)
(a) Autocratic behaviour
(ii)
(ii) Security and 3.
(b) Custodial benefits (i)
(iv)
(iii) Job (iii)
(b) Custodial performance (ii)
276
1. In which of the following access control model, a central authority will 1.
determine what objects the subjects have access to and the access control is Mandatory Access Control
based on role or on the organizational security policy?
2.
Discretionary Access Control
3.
Non-Discretionary Access Control
4.
Rule-based Access
control
In which access control model, there are sets of elements which have greatest lower bound of 1.
values and the least upper bound of values? Mandatory model
2.
Discretionary model
3.
Lattice model
4.
Rule model
1. If a user admitting an identity to a system regularly in the form of a log-on ID, then what 1.
type of act it is? Authentication
2.
Identification
3.
Authorization
4.
Confidentiality
1. ----------- is the type of discretionary access control (DAC) model which is based on an 1.
individual's identity. Identity-based Access
control
2.
Rule-based Access
control
3.
Non-Discretionary
Access Control
4.
Lattice-based Access
control
277
Which of the following security services provided by Kerberos? 1.
Availability and
nonrepudiation
2.
Confidentiality and
authentication
3.
Confidentiality and
integrity
4.
Availability and
authorization
Which of the following is considered as foremost parameter to decide the quality of a biometric 1.
device? Accuracy
2.
Acceptability
3.
Enrollment time
4.
Invasiveness
Stronger security can be provided by means of incorporating one of the following. What it is? 1.
Password and a PIN
2.
One-time password
3.
Pass phrase and a
smart card
4.
Fingerprint
278
Mention True or false. 1.
True
In role-based access control, every user takes one or more roles, and based on the roles, each user
is allowed to access the system resources. 2.
False
3. 4.
2.
ACL
verification
3.
Subject
authorization
4.
Subject
identification
279
15. An authentication factor which is physiological or behavioural characteristic unique to a subject is 1.
called? Account ID
2.
Biometric
factor
3.
Token
4.
IQ
Let us assume that an organization is using discretionary access control model for security. Then 1.
it is vulnerable to one of the following attack. What it is? SYN flood
2.
Impersonation
3.
Denial of
service
4.
Birthday attack
15. Which one of the following access controls defined based on the use of labels? 1.
Discretionary
2.
Mandatory
3.
Role-based
4.
Nondiscretio
nary
1. In order to authenticate the users requesting to access the resources, One of the following 1.
technologies meant which can be used for fingerprint scanning, iris scanning and retina scanning Micrometrics
2.
Macrometrics
3.
Biometrics
4.
MicroBiometric
s
280
1.
Which return type cannot return any value to the calling function?
int
2.
float
3.
void
4.
double
1.
Which operator cannot be used with floating point numbers?
+
2.
-
3.
%
4.
*
1.
Which of the following is the conversion character associated with
short integer? %c
2.
%h
3.
%e
4.
%f
1.
Which of the following is a valid variable name?
Initial.Na
me
2.
A+B
3.
$amt
4.
Floats
281
1.
What will be output for printf(“%c”, 65);
65
2.
A
3.
10
4.
a
1.
To find a raised to power of b , the function we would use is
a^b
2.
a**c
3.
pow(b,A.
4.
pow(a,B.
1.
To check the equality of two variables a and b , in C language
if (a=b)
2.
if (a
equalto(b))
3.
if (a==b)
4.
if((a,b)=0)
282
1.
The declaration unsigned u indicates:
u is a
character
2.
u is an
unsigned
integer
3.
u is unsigned
character
4.
u is unsigned
long integer
1.
How many times “Hi” will be printed.
1
{ 2.
2
int x=0; 3.
infinite
printf(“Hi”);
4.
findarea(x); 0
1.
Given a= 00110010 (50) . Write C statements to determine
whether bit 1 in the above pattern is ON/OFF.(least significant a & 0x03
2.
bit is bit 0)
a|0x03
3.
a & 0x02
4.
a | 0x02
283
1.
For using clrscr() function, the standard library file to be
included conio.h
2.
stdio.h
3.
math.h
4.
stdstream.h
1.
Which operator retrieves the lvalue of a variable?
&
2.
*
3.
–>
4.
#
1.
Which operator produces the one’s complement of the given
binary value? Logical
AND
2.
Bitwise
AND
3.
Logical OR
4.
Bitwise NOT
284
1.
Which operator is used to dereference a pointer?
&
2.
*
3.
–>
4.
~
1.
Which operator has the lowest precedence?
Sizeof
2.
Unary
3.
Assignment
4.
Comma
1.
Which of the following is not a character constant?
‘A’
2.
“A”
3.
‘’
4.
‘*’
285
1.
Which of the following are true statements
Only statement (I) is
I. goto can be used in for loop to come out of the loop correct
II. continue takes you to beginning of the loop 2.
1.
When two strings are equal strcmp(stg1,stg2) returns
-1
2.
0
3.
1
4.
true
1.
What is ascii value for 0 and 9
30, 39
2.
31, 40
3.
31,39
4.
56, 64
48-57
286
1.
To read a character and echo the character on to screen
, with out the need to press enter key, appropriate getchecho()
2.
function is
getch()
3.
getchar()
4.
getcharecho()
1.
The operator which compares two values is
Assignment
2.
Relational
3.
Unary
4.
Equality
1.
Ternary operator operates on how many operands?
1
2.
2
3.
3
4.
4
1.
Structure declaration and definition and are placed
above void main(). Which one of the following its required by all
statements are NOT true. functions
2.
Its global declaration
3.
Space available
4.
287
They are global
declaration and
available to all
1.
Memory is allocated for a function when the function
is declared
2.
defined
3.
called
4.
returned
1.
Identify the erroneous expression.
X=y=2, 4;
2.
res = ++a * 5;
3.
res = /4;
4.
res = a++ –b *2
1.
Following code converts c to
to upper case
char c =’A’
2.
c=c+’a’-65 to lower case
3.
to a number
4.
to character c
288
1.
Conversion specifier for string in scanf statement
are %d
2.
%f
3.
%c
4.%s
%s
1.
ASCII value for a , z are
66 ,91
2.
65,90
3.
97, 122
4.
96, 121
1.
ASCII value for A , Z are
66 ,91
2.
65,90
3.
97 , 122
4.
96 121
1.
*(&num) is equivalent to writing
&num
2.
*num
3.
num
4.
0
289
Which of the following is the address operator? 1.
@
2.
#
3.
&
4.
%
290
The implements Multi–Lateral security by adding 1.
291
Lipners model combines 1.
292
In Biba Model A subjects 1.
293
Access permissions defined through an access _____ and _____. 1.
Control matrix,
Security levels
2.
Control level,
Access level
3.
Control matrix,
Access level
4.
Security ,
Permission
compartments do not change in a way that violates a given security Weak Tranquility
policy. 2.
Tranquility
3.
Normal Operation
4.
Unclassified level
294
_____means that when a system is in use, subjects and objects levels 1.
________ means ensuring timely and reliable access to and the use of 1.
information. Integrity
2.
Availability
3.
Confidentiality
4.
Threat intelligence
295
Which operator is used to insert the data into file? 1.
>>
2.
<<
3.
<
4.
none
296
Which of the following is not true of the span of control? 1.
The average span of control
affects the number of
managers.
2.
Geographical separation of
staff influences the span
that can be coped with.
3.
High spans of control are
found in supervision of
line production.
4.
The technical content of jobs
has little effect on the
required span of control of
supervisors.
297
4.
Employee-centred leader
behaviour focuses on
people.
298
acts with established culture
299
_______________ builds trust among individuals 1.
and in business relationships, which validates and Ethical conduct
promotes confidence in business relationships. 2.
Social responsibility
3.
Ethical responsibility
4.
Business ethics
300
What is the output of this program? 1.
5.5Â Hello World
#include < iostream > 2.
5.5
#include < string >
3.
int main()
double d = 5.5;
print_mydata( d );
print_mydata( s );
return 0;
301
Is overloading of the function templates allowed in 1.
Yes
C++?
2.
No
3.
May Be
4.
Can't Say
table command on name column in the proctor alter table proctor constraint
table is proctor_name_uk unique(name);
proctor(id number,name
2.
varchar2(10),numberofstudents number,
address varchar2(10)); alter table proctor add constraint
proctor_name_uk unique;
3.
alter table proctor add constraint
proctor_name_uk unique(name);
4.
alter table proctor add
proctor_name_uk unique(name);
302
The query to add a check constraint using alter 1.
3.
alter table proctor add
proctor_numberofstudents_ck
check(numberofstudents>1 and
numberofstudents<20);
4.
alter proctor add constraint
proctor_numberofstudents_ck
check(numberofstudents>=1 and
numberofstudents<=20);
3.
X-->Y , Y-->Z then X-->Z
4.
X-->Y then XZ--> YZ
303
Select the query to add not null constraint on 1.
3.
alter table proctor modify
numberofstudents number
constraint
proctor_numberofstudents_nn not
null;
4.
alter table proctor modify
numberofstudents constraint
proctor_numberofstudents_nn not
null;
key constraint between the given two tables . alter table student add constraint
Here proctor id is a foreign key in the student foreign key references
table proctor(proctorid);
student(regno number, name varchar2(10),
2.
address varchar2(10), proctorid number);
proctor(proctorid number, proctorname alter table student add constraint
varchar2(10)) student_proctorid_fr foreign key
references proctor(proctorid);
3.
alter table student add constraint
student_proctorid_fr foreign
key(proctorid) references
student(proctorid);
4.
304
alter table student add constraint
student_proctorid_fr foreign
key(proctorid) references
proctor(proctorid);
3.
employee relation is in second
normal form
4.
None of the options are true
305
For any relation R(pqrs) the set of FD's are F= 1.
{pq-->r, q-->s}. If pq is the key for the relation R is in third normal form
then
2.
R is in second normal form
3.
R is in Boyce Codd normal form
4.
none of the options are true
3.
Boyce Codd normal form
4.
All the options are correct
{A-->B,B-->C} is {A-->A,B-->B,C-->C,A-->B,
B-->C,A-->C }
2.
{A-->B, B-->C,AB-->C }
3.
{A-->A,B-->B,C-->C
B-->C,A-->C }
4.
{A-->A,B-->B,C-->C}
306
Consider the following schemas 1.
Product
alter table vendor add constraint
(productid varchar2(10), productname
vendor_location_ck
varchar2(10), product_price
number,manufacturing_date date, vendorId check(location in ('US','UK'));
varchar2(10)) 2.
4.
Only one of the given SQL query is
correct
307
foreign key(vendorId) references
vendor(vendorId);
4.
alter table product add constraint
product_vendorid_fr
foreign key(vendorId) references
vendor(vendorId);
2.
Transitivity
3.
Union
4.
Decomposition
308
A table is in second normal form if 1.
It is in first normal form and has no
partial key dependencies
2.
It is not having multivalued
attributes
3.
It’s partial composite key
functionally determines an
attribute
4.
None of the given options are true
2.
Third normal Form
3.
Fourth Normal Form
4.
Any of the given Normal Forms
309
1.
Which of the following problem is
undecidable? Membership problem for
CFL
2.
Membership problem for
regular sets
3.
Membership problem for
CSL
4.
Membership problem for
type 0 languages
1.
Recursive languages are
A proper super set of CFL
2.
Always recognized by
PDA
3.
Are also called type 0
languages
4.
Always recognized by
FSA
1.
Recursive enumerable languages are not
closed under Union
2.
Homomorphism
3.
Complementation
4.
Concatenation
310
1.
The statement “ A Turing machine cannot
solve halting problem” is True
2.
False
3.
Still an open problem
4.
Cannot say
1.
Every non-deterministic TM can be simulated
by a deterministic TM True
2.
False
3.
Some times
4.
None of the choices.
1.
Context-sensitive languages can be
recognized by Deterministic PDA
2.
Non-deterministic PDA
3.
Linear bounded automaton
4.
Finite state automaton
1.
A multi-head TM can be simulated by a single
head TM True
2.
False
3.
Some times
4.
311
None of the choices.
void main() 1.
5
{
2.
struct books{
6
float st1;
3.
char st2[6]; 8
}*ptr;
4.
printf("%d",sizeof(ptr)); 10
}
312
Size of C structure is the size
of smallest element.
void main() 1.
{ 20
printf(“%d %d”, sizeof(int *), sizeof(int **)); 2.
} 02
3.
2 2(if 16 bit)
4.
24
—none match since–
5. Compiler gives = 8,8(64 bit)
void main() 1.
{ 444
int i=3, *f, **g; 2.
f=&I; 000
g=&f; 3.
printf(“%d %d %d”, *f, **g, *(*g)); 333
} 4.
433
313
void main() 1.
{ 2
int a[]={1, 2, 3,4}, *p; 2.
1
p=a;
++*p; 3.
3
printf(“%d”, *p);
4.
}
4
void main() 1.
{ 20, 20
int *pt, q=20; 2.
pt=&q; 20, 21
*pt+=1; 3.
printf(“%d,%d”,*pt,q) 21, 20
} 4.
21, 21
void main() 1.
{ 255
char st1=”qwty”; 2.
char st2[]=”qwty”; 244
3.
printf(“%d %d %d”, 8 5 5 (if it is char* st1)
sizeof(st1),sizeof(s2t),sizeof(“qwty”)) 4.
} 245
void main() 1.
4..2
{
2.
char fast, *faster, *fastest;
2..2
printf(“%d..%d”, sizeof(faster),sizeof(fastest))
3.
} 4..4
4.
2..4
314
void main() 1.
{ PT P
char *pt=NULL; 2.
char *p=0; Nullvlauept P
3.
if(pt) PT Nullvlauep
printf(“PT”); 4.
else Nullvlauept Nullvlauep
printf(“Nullvlauept”);
if(p)
printf(“P”);
else
printf(“Nullvlauep”);
}
void main() 1.
{ World
char *pt; 2.
pt=”World”; Some address will be
printf(“%cn”, *&*pt); printed
} 3.
Wn
4.
W
void main() 1.
{ Hello
char *f=”Hello”; 2.
printf(f) H
} 3.
Hello followed by garbage
value
4.
Garbage value
315
void main() 1.
{ 1 1
char *f; 2.
printf(“%d %d”, sizeof(*f),sizeof(f)) 1 2
} 3.
21
4.
2 2
void main() 1.
5
{
2.
struct books{
6
int pages;
3.
char str[4]; 7
}b;
4.
printf("%d",sizeof(b)); 8
}
void main() 1.
{ Garbage value
struct paint{ 2.
int type; DIFFERENT
int color; 3.
}p1, p2; Compiler error
p1.type=1; 4.
p1.color=5; SAME
if(sizeof(p1)==sizeof(p2))
{
printf("SAME");
}
else
{
printf("DIFFERENT");
}
return 0;
}
316
void main() 1.
{ ACERIBM
2.
struct laptop
IBM ACER
{
3.
int cost;
char brand[10]; ACER IBM
}; 4.
void main() 1.
{ 00
sturct tree 2.
{ 10 0
3.
int q,w;
}; 0 10
struct tree t1={10}; 4.
printf(“%d”, t1.w); 10 10
printf(“%d”, t1.q);
}
void main() 1.
{ YELLOW RED
sturct ship 2.
{ RED YELLOW
3.
char paint[10];
}b1,b2; YELLOW YELLOW
strcpy(b1.paint,”RED”); 4.
strcpy(b2.paint,”YELLOW”);
printf(“%s”, b1.paint);
}
317
void main() 1.
{ boat2=0
sturct bus 2.
{ boat2=-1
int sz; 3.
char type[10]; boat2=20
}b1,b2; 4.
b1.sz=20; boat2=some garbage value
b2=b1;
printf(“b2=%d”, b2.sz);
}
The statement 1.
318
Structure elements are stored in detached memory
locations
function(){ 1.
int i=1, s=1; O(n)
while(S<=n)
2.
{ i++;
O(n^2)
s=s+i;
printf(“hello”) 3.
} O(√n)
}
4.
O(nlogn)
What is the time complexity of the given
function()?
Function(){ 1.
int I,j,k; O(n* (Log2 n)2)
for(i=n/2;i<=n;i++)
2.
for(j=1;j<=n;j=2*j)
O(n* (Log2 n))
for(k=1;k<=n;k=k*2)
printf(“Hello”); 3.
} O(n2* (Log2 n))
What is the time complexity of the
4.
given function()?
O(n3)
319
Only float members of structure can be initialized at
the time of declaration
struct node 1.
320
Which of the following pieces of information can be found in the 1.
IP header? Source address of the IP packet
2.
Destination address for the IP packet
3.
Sequence number of the IP packet
4.
Both Source address of the IP packet and
Destination address for the IP packet
only
–more proper ans–
IP version, source IP address,
destination IP address, time-to-live
321
What is the default subnet mask for a class C network? 1.
127.0.0.1
2.
255.0.0.0
3.
255.255.0.0
4.
255.255.255.0
322
TCP/IP ................. layer corresponds to the OSI models to three layers. 1.
Application
2.
Presentation
3.
Session
4.
Transport
If there are N routers from source to destination, total end to end delay in 1.
sending packet N
P (L->number of bits in the packet R-> transmission rate)
2.
(N*L)/R
3.
(2N*L)/R
4.
L/R
323
ICMP IS PRIMARILY USED FOR..... 1.
ERROR AND DIAGNOSTIC
FUNCTIONS
2.
ADDRESSING
3.
FORWARDING
4.
REVERSING
................... address use 8 bits for the <network> and 24 bits for the 1.
<host> portion of the IP address. Class A
2.
Class B
3.
Class C
4.
324
Class D
1.
Which of the following algorithm shows
better best-case complexity? Quick sort
2.
Insertion sort
3.
Merge sort
4.
Selection sort
1.
What is the minimum complexity to perform
sorting on an array of n elements? O(n logn)
2.
O(n)
3.
O(n+logn)
4.
O(logn)
325
1.
Which of the following is not a limitation of
the binary search algorithms? must use a sorted array
2.
requirement of the sorted
array is expensive when a
lot of insertion and
deletions are needed
3.
there must be a
mechanism to access the
middle element directly
4.
the binary search
algorithm is not efficient
when the data elements
are more than 1500
1.
The condition signals the binary search is
unsuccessful is, END<BEG+2
2.
END>BEG
3.
END<BEG
4.
END=BEG
1.
Assume that the available memory space is
very less. Which of the following sorting Bubble sort
2.
algorithm is not suitable for performing
Insertion sort
the sorting of a large amount of data
3.
elements.
Merge sort
4.
Selection sort
326
1.
Selection sort is suitable when,
If even number of
elements are there in the
list
2.
If odd number of elements
are there in the list
3.
If number of elements in
the list is small
4.
If nymber of elements in
the list is large
1.
The algorithm which works based on
Bubble sort
the intervals between the elements of 2.
the array is, Insertion sort
3.
Shell sort
4.
Selection sort
1.
1. A minimum state DFA accepting the
15
language L={w/w belongs {0,1}*} number 2.
of 0s and 1s in w are divisible by 3 and 5, 9
respectively} has 3.
7
4.
8
327
Which of the following attacks would compromise 1.
The SQL query to establish vendorid as the primary a. alter table vendor add
key in the vendor table is constraint vendor_vendorid_pr
primary key ;
4.
a. alter table vendor constraint
vendor_vendorid_pr primary key
(vendorid);
328
The clause to set the foreign key field to null in the 1.
On Delete Cascade
child table on deletion of the corresponding parent key
2.
in the parent table is
On Delete Restrict
3.
On Delete Update
4.
On Delete Set Null
F = {AB-->C,C-->A} , A closure is 1.
CA
2.
C
3.
A
4.
ABC
2.
pincode --> district
3.
personname-->city
4.
country-->capital
329
The relational schema in fourth normal form 1.
2.
Transitive Dependencies
3.
Partial Key Dependencies
4.
Should not have any of the given
dependencies
A Foreign Key 1.
should always be a primary key in
the Parent Table
2.
should always be a unique key in
the Parent Table
3.
can be either a primary key or a unique
key in the Parent Table
4.
All the given options are wrong
330
1.
Definition of a language L with alphabet {a} is
given as following. L= { a^nk | k > 0, and n is a k+1
2.
positive integer constant} What is the
n+1
minimum number of states needed in a DFA to
3.
recognize L?
2^n+1
4.
2^k+1
1.
Which of the following relations is correct, when
comparing the worst-case complexity? insertion=quick
<selection
2.
quick
=insertion=selec
tion
3.insertion<selec
tion<quick
4.
none of the
above
1.
Which is more suitable (DFS or BFS) if the solution is
far from the starting node? DFS
2.
BFS
3. 4.
1.
Which is more suitable (DFS or BFS) if the solution is
closer to the starting node? DFS
2.
BFS
3. 4.
331
1.
What is the status of the array after the first iteration
of quick sort for the given array of 5,7,10,12,2,8
2.
elements:5,7,10,12,2,8
2,5,10,12,7,8
3.
2,7,10,12,5,8
4.
5,7,10,2,8,12
1.
What is the status of an array after the first iteration of
5,7,10,12,2,8
bubble sort for the given array of 2.
elements:5,7,10,12,2,8 2,5,10,12,7,8
3.
2,7,10,12,5,8
4.
5,7,10,2,8,12
1.
Quick sort algorithms are not following the divide and
conquer type of algorithm strategy? True
2.
False
3. 4.
1.
Merge sort algorithms are following the divide and
conquer type of algorithm strategy? True
2.
False
3. 4.
332
1.
What is the status of the array after the first iteration
of insertion sort for the given array of 5,7,10,12,2,8
2.
elements:5,7,10,12,2,8
2,5,10,12,7,8
3.
2,7,10,12,5,8
4.
5,7,10,2,8,12
1.
Insertion sort algorithms are following the divide
and conquer type of algorithm strategy? True
2.
False
3. 4.
1.
Finite automata recognizes --------grammars
Type-1
2.
Type-2
3.
Type-3
4.
Type-0
1.
1. The lexical analysis for a modern language
such as Java needs The power of which one A. Finite state
of the following machine models in a automata
2.
necessary and sufficient sense?
B. Deterministic
pushdown
automata
3.
C.
Non-deterministi
c pushdown
automata
333
4.
D. Turing
machine
1.
When FA M is given which recognizes language
2
L and reverse of L is found by using M then 2.
there can be ___________Final states 3
3.
only one
4.
any number
1.
The number of states in minimum DFA
4
corresponding to the language (00+10)*100 2.
is 3
3.
6
4.
5
1.
Minimal dfa where number of 0’s are divisible
5
by 2 and number of 1’s divisible by 3 2.
6
3.
8
4.
10
1.
Consider the regular language L = (111 +
3
11111)*. The minimum number of states in 2.
any DFA accepting the language is 5
3.
8
4.
9
334
1.
When there are infinite distinguishable strings
then there cannot be a ------------- automata
2.
finite automata
3.
regular
expression
4.
both finite
automata and
regular
expression
and disclosure, including means for protecting personal privacy and Availability
proprietary information. 2.
Integrity
3.
Confidentiality
4.
Threat intelligence
You fail to back up your files and then drop your laptop breaking it 1.
Confidentiality
into many small pieces. You have just failed to address which aspect
of the CIA Triad? 2.
Integrity
3.
Availability
4.
Authentication
335
Assume that you are having account in xyz bank with the e- 1.
banking facility. During your online transaction, you have tried to Confidentiality
carry out multiple transactions where the bank web server denies 2.
your request to carry out the transaction. Identify the missing Authenticity
element of the Information security provided to the system 3.
Availability
4.
integrity
336
1) Which of the following networks is LEAST likely to be a 1.
The Internet
WAN? 2.
A school network
3.
A network of
bank cash
dispensers
4.
Intranet
337
1) What is Metropolitan Area Network? 1.
Interconnection of
several local area
networks by bridging
with a backbone line
2.
Interconnection of
several local area
networks without
bridging with a
backbone line
3.Interconnection of
several wireless local
area networks by
bridging with a
backbone line 4.
Interconnection of
several wireless local
area networks by
bridging with a coaxial
cable
338
1) What type of network is this? 1.
Ring
2.
Bus
3.
Star
4.
Mesh
1.
1. Consider the finite automation in the following
figure. What is the set of reachable states for the {q0, q1,
input string 0011? q2}
2.
{q0, q1}
3.
{q0, q1,
q2, q3}
4.
{q3}
339
1.
The statement “ computable functions can be identified
with a class of partial recursive functions” is from Rice
theorem
2.
Church-
Turing
thesis
3.
Parikh
mapping
theorem
4.
Pumping
lemma
1.
Post systems is equivalent to
Turing
machine
2.
Lambda
calculus
3.
Godel
incompletene
ss theorem
4.
All the
choices
340
1. Medium term schedulers reduce the degree of multiprogramming by 1.
________ Interrupt
2.
Swapping
3.
Terminating
4.
Thread
1.
1. Which of the following statements is false?
A
A. If a language is regular it can always be 2.
B
accepted by a finite state automaton
3.
B. The union of two regular languages is C
regular 4.
D
C. The intersection of regular languages is
regular
D. The power of NFA is more than the power
of a DFA
1.
1. Which of the following is the transition function of
a NFA? Q x ∑ --> Q
2.
Q x ∑ --> 2^Q
3.
Q x ∑ --> 2^Q-1
4.
341
Qx∑U
{epsilon}-->
2^Q
1.
What is the minimum number of states in
10
deterministic finite automata (DFA) for string 2.
starting with ba2 and ending with ‘a’ over 9
1.
1. The password to the admins
account=”administrator”. The total number of 14 states
2.
states required to make a password-pass
13 states
system using DFA would be __________
3.
12 states
4.
A password
pass system
cannot be
created
using DFA
1.
1. The number of states required by a Finite State
Machine, to simulate the behaviour of a 2^(mn)
2.
computer with a memory capable of storing 'm'
2^m2^n
words, each of length 'n' bits is?
3.
m+n
4.
2mn
342
1.
1. The number of states in a minimal deterministic
3
finite automaton corresponding to the language 2.
L = {a^n | n=4 } is: 4
3.
5
4.
6
1.
1. The language acceptance of a DFA is given as:
{w ϵ ∑^* |
δ^*(q0,w) ϵ F}
2.
{w ϵ ∑ | δ^*(q0,w)
ϵ F}
3.
{w ϵ ∑^* | δ(q0,w)
ϵ F}
4.
{w ϵ ∑ | δ(q0,w) ϵ
F}
1.
1. The difference between number of states with
1
regular expression (a + b) and (a + b) * is: 2.
2
3.
3
4.
0
1.
1. Let w be any string of length n in {a, b}*.
n+3
Consider ‘L’ be the set of all strings ending with 2.
at least n a’s. What is the minimum number of n+1
343
1.
1. Let N be an NFA with n states. Let k be the
number of states of a minimal DFA which is K ≥ 2n
equivalent to N. Which one of the following is 2.
1.
1. Given an arbitrary non-deterministic finite
automaton (NFA) with N states, the maximum N2
number of states in an equivalent minimized 2.
1.
1. Given an arbitrary non-deterministic finite
automaton (NFA) with N states, the maximum N^2
2.
number of states in an equivalent minimized
2^N
DFA is at least.
3.
N!
4.
2N
1.
For a machine to surpass all the letters of
3
alphabet excluding vowels, how many 2.
number of states in DFA would be required? 2
3.
22
4.
27
344
1.
1. For a DFA accepting binary numbers whose
decimal equivalent is divisible by 4, what 0
2.
are all the possible remainders?
0,2
3.
0,2,4
4.
0,1,2,3
1.
1. Finite state machine are not able to
recognize Palindromes because: Finite automata
cannot
deterministically find
the midpoint
2.
Finite automata
cannot remember
arbitarily large amount
of data
3.
Even if the mid point is
known, it cannot find
whether the second
half matches the first
4.
All of the mentioned
1.
1. Definition of a language L with alphabet {a}
is given as following. L= {a^(nk) | k > 0, and k+1
2.
n is a positive integer constant} What is the
n+1
minimum number of states needed in a DFA
3.
to recognize L?
2^(n+1)
4.
2^(k+1)
345
1.
1. Consider the language L given by the
3
regular expression (a + b) *b(a +b) over the 2.
alphabet {a, b}. The smallest number of 4
1.
1. Consider the following moves:
A
δ(A,1) = B, 2.
C
δ(A,0) = A 3.
B
δ(B,(0,1))= C
4.
δ(C,0) = A (Initial state =A) Invalid String
Applying the string= 011001, the
automata will be in which of the states?
1.
1. Basic limitation of FSM is that it
A. cannot remember
arbitrary large amount
of information
2.
B. sometimes fails to
recognize grammars
that are regular
3.
C. sometimes
recognizes grammars
are not regular
4.
D. None of these
346
.....means persons authorized have access to receive 1.
347
Stealth Virus
1.
. Which of the following is /are the i, ii, iii and iv only
functions of the operating system? 2.
ii, iii, iv and v only
i) Sharing hardware among users.
ii) Allowing users to share 3.
data among themselves. i, iii, iv and v only
iii) Recovering from errors. 4.
iv) Preventing users from interfering All i, ii, iii, iv and v
with one another.
v) Scheduling resources among
users.
1.
. State True or False. i-True, ii-False
2.
i-True, ii-True
i) In spooling high-speed device
like a disk is interposed between 3.
a running program and low-speed i-False, ii-True
device in Input/output. 4.
i-False, ii-True
ii) By using spooling for example
instead of writing directly to a
printer, outputs are written to
the disk.
------is a global 1.
WWW
communications hub that
connects data from all across the 2.
HTTP
world.
3.
FTTP
4.
HTML
348
---- a context free grammar to generate 1.
expression with balanced parenthesis. S-->(S)| Ɛ
2.
S-->(S)
3.
S-->S| Ɛ
4.
S-->S
349
Which of the following is correct 1.
about class and structure? A class can have member functions while a structure cannot.
2.
class data members are public by default while that of the
structure are private.
3.
Pointer to structure or classes cannot be declared.
4.
class data members are private by default while that of a
structure are public by default
350
What does overriding a method mean? 1.
Changing the number and/or type of
parameters of a method
. 2.
Changing the return type of a method.
3.
Writing a method in the child class that
has the same header as a method in the
parent
4.
Implementing an abstract method.
351
They will want the system to fit in
with existing pcs to save money
where possible
3.
Student r = new Student(5,12)
4.
Student r = new Rectangle(5,12)
2.
Object
3.
Attribute
4.
352
none
353
_____ solution requires reasoning built on knowledge and experience 1.
Algorithmic Solution
2.
Heuristic Solution
3.
Random Solution
4.
None of these
1.
Assume that all the elements of the array, which is to be
sorted is not known before. But, the array should always Insertion
be maintained as sorted array. Which of the following
2.
algorithm is suitable in this situation?
Extraction
3.
Selection
4.
Distribution
354
RAD Software process model stands for _____ . 1.
Rapid Application
Development.
2.
Relative Application
Development
3.
Rapid Application Design
4.
Recent Application
Development.
355
Where an object of a class gets stored? 1.
Heap
2.
Stack
3.
Disk
4.
File
356
Determines the protocol which dynamically updating name server 1.
records RFC 2136
2.
RFC 2316
3.
RFC 2613
4.
RFC 2163
A Client Echoes a character but only after a full line in which telnet 1.
mode? Server
2.
Command
3.
Character
4.
Default
357
Hardware Devices like a router, switch, camera and other IoT 1.
based devices remotely manage command-line interface File transfer
communication using protocol
2.
Routing
protocol
3.
Wired LAN
4.Telnet
Protocol
358
1.
1.
1.
1.
359
#include<stdio.h> 1.
#include<math.h> 16 16
void power(int parameter) 2.
{ 16
printf("%d", parameter*parameter); 3.
} 2
main(){ 4.
int value=4; Error
printf("%d ", (int)(pow(value,2)));
power(value);
}
360
DFD stands for 1.
d Data Flow Diagram
2.
Dependent Flow diagram
3.
Decomposition Flow
Diagram
4.
Decision Flow Diagram
361
The process in DFD is 1.
362
ER diagram follows 1.
Left-Right Strategy
2.
Right-Left Strategy
3.
Top Down Approach
4.
Bottom up Approach
as Level 2 DFD
2.
Level 1 DFD
3.
Level 3 DFD
4.
Level 0 DFD
363
PDA can recognise 1.
any grammar
2.
only CFG
3.
only regular grammar
4.
any unambiguous
grammar
L=0 1.
L is regular but not 0
2.
L is context free but not
regular
3.
L is not context free
4.
null
364
if r and s are two regular expressions then expression r+s is 1.
also............. Regular expression
2.
Regular Laguage
3.
Regular set
4.
c and b
365
4.
ambiguous grammar
366
Elimination of null productions results in simplified 1.
grammar with no unit productions and useless True
symbol 2.
False
3.
nothing
4.
True and False
4.
Type 4
367
All grammars are expressed in ----- form 1.
4 tuple
2.
5 tuple
3.
CFG
4.
Context free
368
4.
None of the above
369
MSD stand for 1.
Most significant digit
2.
Many significant digit
3.
Both a and b
4.
None of these
370
Which system was used extensively by early mini computers: 1.
Decimal number
2.
Octal number
3.
Hexadecimal number
4.
Binary number
In the case of a right arithmetic shift the sign bit values are shifted to the : 1.
Left
2.
Right
3.
Up
4.
Down
371
Which carry is similar to rotate without carry operations: 1.
Rotate carry
2.
Rotate through carry
3.
Both
4.
None
372
Which types of register holds a single vector containing at least two read ports 1.
and one write ports: Data system
2.
Data base
3.
Memory
4.
Vector register
4.None of these
373
Which algorithm is used to find GCD of two integers: 1.
Multiplication algorithm
2.
Division algorithm
3.
Addition Algorithm
4.
Simple algorithm
–According to google–
Euclidean Algorithm
374
21.Which is a method of decomposing a sequential 1.
process into sub operations: Pipeline
2.
CISC
3.
RISC
4.
Database
2.
the natural join of all
decompositions of R = R
3.
the decomposition is lossy
4.
None of the given options are correct
375
A prime attribute is an attribute that is part of a 1.
A Primary Key
2.
A Candidate Key
3.
A Composite Key
4.
All the give options
are correct
2.
X is a subset of Y
3.
X Union Y equals R
4.
Y is a subset of X
and X Union Y
equals R
4.
All the given options are
wrong
376
When 2 or more bits in a data unit has been changed during the 1.
3.
Inverted error
4.
None of the mentioned
(00000, 10011)? 1
2.
2
3.
3
4.
4
2.
S+1
3.
S-1
4.
0
377
To detect or correct errors, we send extra bits with data is known 1.
as Redundancy
2.
Correction
3.
Detection
4.
Authentication
2.
Full duplex
3.
Half duplex
4.
De modulation
4.
1
378
In a cyclic code, generator polynomial is actually the 1.
Multiplier
2.
Divisor
3.
Polynomial
4.
Quotient
2.
b) Faster search
3.
c) Router algorithms
4.
d) Undo/Redo operations in a notepad
379
In a full binary tree if number of internal 1.
nodes is I, then number of nodes N are? a) N = 2*I
2.
b) N = I + 1
3.
c) N = I – 1
4.
d) N = 2*I + 1
2.
b) L = I + 1
3.
c) L = I – 1
4.
d) L = 2*I – 1
2.
b) Let T be a binary tree with λ levels. Then T
has no more than 2λ – 1 nodes
3.
c) Let T be a binary tree with N nodes. Then
the number of levels is at least ceil(log (N +
1))
4.
380
d) Let T be a binary tree with N nodes. Then
the number of levels is at least floor(log (N +
1))
381
Which of the following statements is not correct?
382
Which of the following statements is 1. An outer join only returns
correct? matched records from the
tables that are being joined
2. In an inner join, the matched
pairs would be retained, and
any unmatched values in
the other table would be left
null
3. An equijoin, links tables on
the basis of a non-equally
condition that compares
specified columns of each
table
4. The operation of eliminating
columns in a table is called
a project operation
383
Which of the following statement is 1. Relational algebra is a formal
not correct? declarative query language
2.Relational algebra is procedural
in nature.
3.Queries in relational algebra are
composed using a collection of
operators
4.The relational algebra
operations can be of arbitrary
complexity
2.
3. Cartesian Product
4.
384
Which of the following statement is 1. By using intersection, multiple queries
can be put together and their output
correct? merged
2.
3.
4.
385
Which of the following statement is 1. Automatic query optimization means
the DBMS finds the most
not correct? cost-effective access path without
user intervention.
3.
4.
386
Which of the following statement is 1. Query optimization algorithm cannot
be evaluated on the basis of its
correct? operation mode or the timing of its
optimization
2.
3.
4.
387
Which of the following statement is not correct? 1. A drawback of cost-based optimization
is the cost of optimization itself
3.
4.
388
In ____, a query is optimized without being 1.
3.
4.
2.
3.
4. Query Optimization
389
__ is based on constraints specified on the database 1.
2.
4.
3.
4.
390
Which of the following is correct? 1.
3.
4.
1.
Durability
Ensures that once the changes are commited, they cannot be undone 2.
or lost, even in the event of a system failure
3.
4.
391
1.
A —-- statement is reached, in which case all changes are aborted 2.Rollback
and the database must be restored to its previous consistent state.
3.
4.
2.
3.
4.
392
Information residing in__________ does not 1. Volatile storage
usually survive system crashes.
2.
3.
4.
1.
3.
4.
1.
3. Recovery manager
4.
393
In a DBMS transaction subsystem, _____ is 1.buffer manager
responsible for the efficient transfer of data
between disk storage and main memory
2.
3.
4.
1.
2.
3.
394
1.
1. L1 is recursive, L2 is recursively
enumerable
Let L1’ be a recursive language and let L2’ be 2. L1 is recursively enumerable and
a recursively enumerable language which is
not recursive. Which one of the following is
TRUE? L2 is recursive
3. L1 is recursive, L2 is not
recursively enumerable
4. L1 and L2 are recursively
enumerable
1.
Recursively enumerable
The complement of the universal language Lu’ 2.
is Not recursively enumerable
3.
Recursively enumerable but not
recursive
4.
Recursive
395
1.
Recursively enumerable
2.
The complement of the diagonal language L’ is
Not recursively enumerable
3.
Recursively enumerable but not
recursive
4.
Recursive
1.
enumerable
4.L and L' are not recursively
396
1.
hold? 1110101001001001100101000101001
100010001001010111
4.
1110101001001001100101000101001
10010010010010111
1.
L1U L2 is context-free
4.
L1∩L2∩L3 is recursively
enumerable
1.
397
Let Σ be a finite alphabet. For a set A ⊆Σ*, 1.
define For all A ⸦ Σ*, if A is regular, then
cycle A = {yx | xy ∈ A}, so is cycle A.
2.
permute A = {y | there exists x ∈ A, for
every a ∈ Σ, na(x) = na(y)} For all A ⸦ Σ *, if A is regular,
For example, if Σ = {a, b, c} and A =
then so is permute A.
{aaabc), then 3.
398
1.
1.L1U L2 is a CSL
Consider the languages
L₁= {a^n.b^m.c^m / n, m≥1} and L₂=
2.L1 ∩ L2 is a CFL
{a^n.b^n.c^m / n,m ≥1 } Which one of
the following statements is TRUE?
3.L1 and L1 are CSL
4.L1 ∩ L2 is a CSL
1.
1.
399
{ w / w is a palindrome over
{a, b, c} }
1.
400