0% found this document useful (0 votes)
86 views400 pages

Comprehensive

Comprehensive exam questions Vellore study well please open doc now hh kk gg jn ffvjjj tf jn ty hv jj jjhvs hhsj jjj jjs GC jj hshj ksknsnnns kksbsbbkhjj jksjsbbk kjsbb
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
86 views400 pages

Comprehensive

Comprehensive exam questions Vellore study well please open doc now hh kk gg jn ffvjjj tf jn ty hv jj jjhvs hhsj jjj jjs GC jj hshj ksknsnnns kksbsbbkhjj jksjsbbk kjsbb
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 400

Computer Science and business systems

Comprehensive Examination - 2022


“Workers should receive orders from only one manager” , this 1.
principle is termed as Unity of command
2.
Unity of direction
3.
Unity of group
4.
Unity of management

“The Hawthorne Experiments” are related to 1.


Scientific Management
2.
Administrative Management
3.
Human Relations School
4.
Bureaucratic Organization

“Managers have long realised that there is no one best way 1.


to do things”. This statement is suitable for which Systems Theory
management approach?
2.
Contingency Theory
3.
Organizational Humanism
4.
Management Science

“g(n) is an upper bound for f(n) that is not asymptotically 1.


tight”, statement holds true for Big oh
2.
Big theta
3.
Big omega
4.
Amortized

1
“Functional foremanship” is related to 1.
Scientific Management
2.
Administrative Management
3.
Human Relations School
4.
Bureaucratic Organization

“Fayol’s principles” are related to 1.


Scientific Management
2.
Administrative Management
3.
Human Relations School
4.
Bureaucratic Organization

X.25 standards covers how many layers? 1.


Two
2.
Three
3.
Seven
4.
Six

Working set model for page replacement is based on the 1.


assumption of ____________ Modularity of references
2.
Working Set Size
3.
Locality of references
4.
Random access

2
Within an organisation, leadership influence will be 1.
dependent upon the type of ________ that the leader can knowledge
exercise over the followers.
2.
power
3.
delegation
4.
friendship

Why, according to stakeholder theory, is it in companies' best 1.


interests to pay attention to their If firms only act in their own self-interest,
employees may feel exploited.
stakeholders?
2.
If firms only act in their own self-interest,
the government might put more regulation
on them.
3.
If firms only act in their own self-interest,
customers might not like the image that the
company portrays.
4.
If firms only act in their own self-interest
and inflict harm on stakeholders, then
society might

withdraw its support

Why is it necessary for all employees to sign the Confidentiality and Security 1.
Agreement each year? To check if you still work there.
2.
No reason, they just like
paperwork.
3.
To remind everyone of what
their responsibilities are.
4.
Will be used for moving to a
higher position.

3
Why is autocratic leadership considered negative? 1.
people are uninformed,
insecure and afraid of
the leader
2.
leader is extra friendly
3.
too much confusion arises
4.
it is very participative

Who suggested a system of cards? 1.


Henry Metcalfe
2.
Henry Robinson Towne
3.
Peter Drucker
4.
Robert Owen

Who published the famous book "The Cost of Manufacture and 1.


Administration of Workshop: Public and private"? Henry Metcalfe
2.
Henry Robinson Towne
3.
Peter Drucker
4.
Robert Owen

Who presented the paper “Engineer as an Economist”? 1.


F W Taylor
2.
Henry Robinson Towne
3.
Peter Drucker
4.
Robert Owen

4
Who plays an important role in the success of products and services and in 1.
increasing the marketing share of the firm in business? Functional level Managers
2.
Corporate level Managers
3.
Business level Managers
4.
All of the above

Who is the father of scientific management? 1.


F W Taylor
2.
Henry Fayol
3.
Peter Drucker
4.
None of these

Who is the father of Personnel Management? 1.


F W Taylor
2.
Henry Fayol
3.
Peter Drucker
4.
Robert Owen

Who is the father of modern management? 1.


F W Taylor
2.
Henry Fayol
3.
Peter Drucker
4.
None of these

5
Who developed the force-field analysis theory? 1.
Carl Rogers
2.
B.F.Skinner
3.
Kurt Lewin
4.
James Johnson

Who believed that workers performance was influenced by the total environment? 1.
F W Taylor
2.
Henry Fayol
3.
Peter Drucker
4.
Robert Owen

Who are the organisational stakeholders? 1.


Government
2.
Employees
3.
Customers
4.
All the other
answers are
correct.

White Box techniques are also classified as_________________? 1.


Design based
testing
2.
Structural testing
3.
Error guessing
technique
4.
None of the
mentioned

6
While selecting a string w such that w belongs to L, where L is a regular language, and 1.
w=mno. Which of the following parts cannot be an empty string? m
2.
n
3.
o
4.
no

While applying Pumping lemma over a regular language, we consider a string w that 1.
belong to L and separate it into _________ components. 3
2.
4
3.
2
4.
5

Which type of software can be used to merge data of two files in one file ? 1.
System software
2.
Networking
software
3.
Documenting
software
4.
Utility Software

Which type of attack requires multiple handler on various system? 1.


Man in the
Middle Attack
2.
DoS
3.
DDoS
4.
Backdoor
Attack

7
Which transmission media has the highest transmission speed in the network. 1.
Coaxial cable
2.
Twisted pair cable
3.
Optical fibre cable
4.
Electrical cable

Which term refers to a systematic assessment of a company's activities in terms of social 1.


managerial
impact?
appraisal
2.
social audit
3.
social
responsibility
metric
4.
ethics audit

which technique was introduced because a single job could not keep both the 1.
Time-sharing
CPU and the I/O devices busy?

2.
SPOOLing

3.
Preemptive
scheduling

4.
Multiprogramming

Which sublayer of the data link layer performs data link 1.


functions that depend upon the type of medium? logical link control sublayer
2.
media access control sublayer
3.
network interface control sublayer
4.
none of the mentioned

8
Which style of leadership focuses on goals, standards, and 1.
organization? task leadership
2.
social leadership
3.
semantic leadership
4.
transformational leadership

Which statement is CORRECT 1.


The internal data model represents the
data’s physical storage details
2.
To communicate with the business user,
mainly, the logical data model is used
3.
The logical data model is
implementation-independent
4.
A database state contains the description
of the database data and is stored in the
catalogue

Which server translates the alphanumeric name 1.


into numeric addresses? Network server
2.
Protocols
3.
DNS
4.
System server

Which process model deals with understanding of the problem 1.


domain and architecture framework and developing the project Agile Process Model
plan with identification of risks?
2.
Iterative Process Model
3.
Incremental Process Model
4.
Spiral Model

9
Which process model deals with review of project and a 1.
decision is made whether to continue with a further loop or not Agile Process Model
in the planning phase?
2.
Waterfall Process Model
3.
Incremental Process Model
4.
Spiral Model

Which principle of general management advocates that 1.


“Employee turnover should be minimized to maintain Stability of personnel
organizational efficiency.”?
2.
Remuneration of employees
3.
Equity
4.
Esprit de Corps

Which organisation structure is generally followed by big steel 1.


plants? Line organisation
2.
Line and staff organisation
3.
Functional organisation
4.
All the other answers are correct

Which option is incorrect. Monitors can contain 1.


multiple (user) procedures.
2.
only a single user procedure.
3.
only one procedure will be
active in the monitor at any one
time.
4.
multiple procedures can share
variables.

10
Which one of these scenarios are ethical issues? 1.
(i) and (ii)
(i) A company is thinking of employing a robot that will make
most of the workforce redundant 2.
(ii) Someone creates an AI (i) and (iii)

(iii) A judge decides to give someone a prison sentence 3.


(ii) and (iii)
(iv) Someone hacks a computer
4.
(iii) and (iv)

Which one of the following would be classified as sensitive 1.


personal data? Address
2.
Religion
3.
CCTV Video
4.
Name

Which one of the following regular expressions over {0,1} 1.


denotes the set of all strings not containing 100 as a 0*(10+1)*
substring?
2.
0*(11*0)*
3.
0*1010*
4.
0*1*01

Which one of the following regular expressions over {0,1} 1.


denotes the set of all strings not containing 100 as a 0*(11*0)*
substring?
2.
0*1010*
3.
0*(10+1)*
4.
0*1*01

11
Which one of the following languages over the alphabet {a,b} 1.
is described by the regular expression: The set of all strings containing the substring
(a+b)*a(a+b)*a(a+b)*? aa.
2.
The set of all strings containing at most two a’s.
3.
The set of all strings containing at least two a’s.
4.
The set of all strings that begin and end with
either a or b.

Which one of the following is not a ‘hygiene factor’ of 1.


Herzberg’s Two Factor theory ? Interpersonal relations
2.
Working conditions
3.
Responsibility
4.
Job security

Which one of the following is not a transmission medium. 1.


Coaxial cable
2.
Telephone Lines
3.
Modems
4.
Microwave systems

Which one of the following is not a responsibility of the 1.


government? Enacting the pollution laws.
2.
Establishment of norms for the industrial
undertakings.
3.
Providing after sales service.
4.
None of the other answers is correct.

12
Which one of the following is correct? 1.
A relationship can have one or more
attributes directly linked to it
2.
All relationships attributes may be
attached to one of the participating
entities
3.
All relationships may be converted to 1:1
relationships
4.
All relationships may be converted to
binary relationships

Which one of the following is an element of motivation 1.


according to Vroom’s Vector Valence Involvement
theory ? 2.
Equity
3.
Instrumentality
4.
Existence

Which one of the following is an application of Stack Data 1.


Structure? Managing function calls
2.
The stock span problem
3.
Arithmetic expression evaluation
4.
All of these

Which one of the following is a synchronization tool? 1.


Thread
2.
Pipe
3.
Semaphore
4.
Socket

13
Which one of the following describes the leadership style 1.
in which the leader generally gives facilitative style
the group complete freedom to make decisions and 2.
complete the work in whatever way it sees delegative style
fit? 3.
democratic style
4.
laissez-faire style

Which one of the following describes the leadership style 1.


in which a leader tends to centralize authoritarian style
authority, dictate work methods, make unilateral decisions, 2.
and limit employee participation? autocratic style
3.
democratic style
4.
laissez-faire style

Which one of the following communication lines is best 1.


suitable for interactive process applications. Narrow band channel
2.
Half-duplex
3.
Full-duplex
4.
Simplex

Which one of the below is not a file 1.

infecting virus? Cavity Virus


2.
Prepending Virus
3.
Appending Virus
4.
Stealth Virus

14
Which of these statements concerning Weber’s concept of 1.
Bureaucracy is not correct? It is based on rules and procedures
rather than personal preference and
judgment.
2.
It is still a relevant concept in today’s
organization.
3.
It has acquired a negative reputation for
inefficiency and rigidity.
4.
It rejects rational approaches to
managing organizations

Which of these is an application of linked lists? 1.


To implement file systems
2.
For separate chaining in hash-tables
3.
To implement non-binary trees
4.
All of these

Which of these expresses the specific number of entity 1.


occurrences associated with one occurrence of the related Degree of relationship
entity?
2.
Connectivity of relationship
3.
Cardinality of relationship
4.
None of these

Which of the two features match each other 1.


Inheritance and Encapsulation
2.

Encapsulation and Polymorphism


3.

Encapsulation and Abstraction


4.
Abstraction and Polymorphism

15
Which of the three pillars of digital privacy does not apply? 1.
Information privacy
2.
Individual privacy
3.
Communication privacy
4.
Family privacy

Which of the statement is true regarding 1.


the dequeue operation? Element are deleted at both end
2.
any element beside the last one
3.
Designing of the operation is simple
4.
All of these

Which of the statement is false as part of 1.


asymptotic notation? Discuss about rate of growth of the function
2.
Asymptotically weakly bound based on the function
3.
Functions that are dependent are non-negative
4.
Bigoh notation speaks on defined constant

Which of the following ways should 1.


organizations use to protect personal Security clearances and access restrictions on a "need-to-know"
information? basis are examples of organizational measures.
2.
Technological measures, for example, the use of passwords and
encryption.
3.
Physical measures, for example, shredding documents and
locking desk drawers.
4.
All of the these

16
Which of the following true about FILE *fp 1.
FILE is a keyword in C for representing files and fp is a variable of
FILE type.
2.
FILE is a stream
3.
FILE is a buffered stream
4.
FILE is a structure and fp is a pointer to the structure of FILE type

Which of the following technique is used 1.


for fragment? a technique used in best-effort delivery systems to avoid endlessly
looping packets
2.
a technique used by protocols in which a lower level protocol
accepts a message from a higher level protocol and places it in
the data portion of the low level frame
3.
one of the pieces that results when an IP gateway divides an IP
datagram into smaller pieces for transmission across a network
that cannot handle the original datagram size
4.
Compaction technique

Which of the following TCP/IP protocol is 1.


used for transferring electronic mail FTP
messages from one machine to another?
2.
SNMP
3.
SMTP
4.
RPC

Which of the following statements are 1.


true? I only
I. Shortest remaining time first scheduling 2.
may cause starvation
I and III only
II. Preemptive scheduling may cause
3.
starvation
II and III only
III. Round robin is better than
4.
FCFS in terms of response time I II and III only

17
Which of the following statements about 1.
the Privacy Data Breach Incident is A Privacy incident is a theft of an asset
correct?
2.
A privacy event occurs when personal information is lost in any
way. Both suspected and confirmed occurrences involving PII that
provide a reasonable risk of harm are covered by this term.
3.
A Privacy Incident is one that may not cause serious injury or
harm to the individual and/or involves a few numbers of affected
individuals
4.
A Privacy incident is an attack on an asset

Which of the following statements about 1.


leadership is false? Leadership does not necessarily take place within a
hierarchical structure of an organisation
2.
Not every leader is a manager
3.
When people operate as leaders their role is always clearly
established and defined.
4.
All the other answers are correct.

Which of the following statement(s) is/are 1.


correct? Only S1
S1: When Bjarne stroustrup designed 2.
C++, there is no such concept of Only S2
exception handling.
3.
S2: Exception handling is a new feature Neither S1 nor S2
added to ANSI C++; not available in
earlier compilers. 4.
Both S1 and S2

Which of the following statement is true? 1.


DFA is more powerful than
NFA
2.
NFA and DFA have equal
power
3.
NFA is more powerful than
DFA
4.

18
All options are true

Which of the following standard algorithms is not a Greedy algorithm? 1.


Dijkstra's shortest path
algorithm
2.
Prim's algorithm
3.
Kruskal algorithm
4.
Bellmen Ford Shortest path
algorithm

Which of the following risk is the failure of a purchased component to perform 1.Product risk 2.Project risk
as expected? 3.Process risk 4.Program risk

Which of the following represents the rights inherent in a managerial position 1.


to give orders Power
and expect them to be obeyed ? 2.
Authority
3.
Influence
4.
Responsibility

Which of the following regular expression identity is true? 1.


r(*) =r*
2.
(r * s*)*= (r+s) *
3.
(r+s) *=r*+s*
4.
r*s*=r*+s*

Which of the following regular expression denotes a language comprising of 1.


all possible strings over {a,b} of length n where n is a multiple of 3? ((a+b) (a+b) (a+b))*
2.
(aaa+ab+a)+(bbb+bb+a)
3.
(aaa+bbb)*
4.
(a+b+aa+bb+aba+bba)*

19
Which of the following regular expression denotes a language comprising of 1.
all possible strings over {a,b} of length n where n is a multiple of 3? (a+b+aa+bb+aba+bba)*
2.
(aaa+bbb)*
3.
((a+b) (a+b) (a+b))*
4.
(aaa+ab+a)+(bbb+bb+a)

Which of the following properties is associated with a queue? 1.


First In Last Out
2.
First In First Out
3.
Last In First Out
4.
None

Which of the following properties are necessary for an Algorithm? 1.


Definiteness
2.
Correctness
3.
Effectiveness
4.
A and C

Which of the following pair is correctly matched ? 1.


A
A. F.W. Taylor – Human Relations Approach
2.
B. Henry Fayol – Universality of Management
B
C. Elton Mayo – Psychological Approach
3.
D. M. Parker Follet – Scientific Management C
4.
D

20
Which of the following options are correct for the given 1.
question? (i) only
The usage of “virtual” keyword before the member function is 2.
to achieve…………
(ii) and (iv) only
(i). Inheritance
3.
(ii). Compile time Polymorphism (ii) and (iii) only
(iii). Runtime Polymorphism 4.
(iv). Static binding (iii) only

Which of the following operation take worst-case linear time in 1.


the array implementation of the stack? Push
2.
Pop
3.
IsEmpty
4.
None

Which of the following one can relate to the statement: If x 1.


items are put into y containers, with x>y, then at least one Pumping Lemma
container must contain more than one item.
2.
Pigeon Hole Principle
3.
Counting principle
4.
None

Which of the following must you do if a laptop holding client 1.


account information is stolen? Log the breach immediately with the DPO
2.
Notify the individuals concerned if their rights
or freedoms are at risk
3.
Notify your manager
4.
Notify the regulators

21
Which of the following keys in a table can uniquely identify a 1.
row in a table? Candidate key
2.
Alternate key
3.
Primary key
4.
All of these

Which of the following is/are White box technique ? 1.


Statement Testing
2.
Decision Testing
3.
Condition Coverage
4.
All of the mentioned

Which of the following is/are not shared by the threads of 1.


the same process? (a), (b) and (e)
Program counter (b) Logical Address space (c) Stack (d) 2.
Registers (e) Virtual Address space (f) File descriptor (a), (c) and (f)
table (g) Message queue (h) Code
3.
(a), (c) and (h)
4.
(a), (c) and (d)

Which of the following is TRUE? 1.


Every finite subset of a non-regular set is
regular
2.
Every subset of a regular set is regular
3.
Infinite union of finite sets is regular
4.
The union of two non-regular sets is not
regular

22
Which of the following is true 1.
P is a subset of NP
2.
NP is a subset of P
3.
P and NP are equal
4.
NP is a subset of NP-hard

Which of the following is true of a divisional structure? 1.


It is also known as chain of
command.
2.
It is also called a U-form (unitary)
structure.
3.
It is a centralized structural form.
4.

It is used to promote flexibility and

change .

Which of the following is true of effective information sharing in an 1.


organization? Information should be shared
vertically, but not
horizontally.
2.
Vertical linkages are designed
primarily for coordination
and collaboration.
3.
The structure should fit the
information requirements of
the organization.
4.
It is not possible to give people a
lot of information.

23
Which of the following is the most accurate description of an access 1.
control method that allows the data owner to develop and manage MACs (Mandatory Access Control)
access control?
2.
RBACs (Role-Based Access Control)
3.
LBACs (List Based Access Control)
4.
DACs (Discretionary Access Control)

Which of the following is referred as part of restricted data structure? 1.


Stack
2.
Queue
3.
Linked list
4.
All of these

Which of the following is odd one out? 1.


Evaluating a postfix expression
2.
Matching Balancing Parentheses
3.
Luggage checking in airports
4.
Depth first search of graphs

Which of the following is NOT a valid access control mechanism? 1.


DAC (Discretionary Access Control)
list.
2.
SAC (Subjective Access Control) list.
3.
MAC (Mandatory Access Control)
list.
4.
RBAC (Role-Based Access Control)
list.

24
Which of the following is NOT a key concept associated with scientific 1.
management? One best way
2.
Formalization
3.
Time-and-motion studies.
4.
Systematic selection

Which of the following is not a good way to protect one's privacy? 1.


Use privacy-focused SE
2.
Use private Browser-window
3.
Disable cookies
4.
Uninstall Antivirus

Which of the following is element of the database? 1.


Constraints and schema
2.
Relationships
3.
Data
4.
All of these

Which of the following is an example of the implementation of an 1.


access control policy for a bank teller? Rule-based policy
2.
Identity-based policy
3.
User-based policy
4.
Role-based policy

Which of the following is an ethical behaviour? 1.


Giving less remuneration to the
employees.
2.
Selling inferior goods.
3.

25
Honest behaviour with the
customer.
4.Polluting the environment.

Which of the following is a vulnerability in a network environment 1.


with discretionary access controls? SYN flood
2.
Impersonation
3.
Denial of service
4.
Birthday attack

Which of the following is a project scheduling method that can be 1.EPM 2.CPM 3.CMM 4.NONE OF THE
applied to software development? ABOVE

Which of the following is a MAC (Mandatory Access Control) 1.


feature? Uses levels of security to classify users
and data.
2.
Allows owners of documents to determine
who has access to specific documents.
3.
Uses access control lists that specify a list
of authorized users.
4.
Uses access control lists that specify a list
of unauthorized users.

Which of the following is a leadership trait? 1.


Dominance
2.
energy
3.
cognitive ability
4.
All the other answers are correct

26
Which of the following does not require additional temporary 1.
space? Stack
2.
Queue
3.
Linked list
4.
All of these

Which of the following condition is used to transmit two packets 1.


over a medium at the same time? Contention
2.
Collision
3.
Synchronous
4.
Asynchronous

Which of the following claims about DAC (Discretionary Access 1.


Control) is correct? Files that don't have an owner CANNOT be
modified.
2.
The administrator of the system is the
owner of each object.
3.
The operating system is the owner of each
object.
4.
Each object has an owner, which has full
control over the object.

1.
Which of the following are objectives of an
information systems security program Threats, vulnerabilities, and
risks
2.
Security, information value,
and threats
3.
Integrity, confidentiality, and
availability
4.

27
Authenticity, vulnerabilities,
and costs

Which of the following are components of a database except? 1.


User data
2.
Metadata
3.
Reports
4.
Indexes

Which of the following application generally use a stack? 1.


Parenthesis balancing program
2.
Syntax analyzer in compiler
3.
Keeping track of local variables at run time
4.
All of the above

Which of the below statement(s) is/are true? 1.


(i). By using pure virtual function, it is possible to achieve a pointer to base Both (i) and (ii)
class points to refer derived class objects. 2.
(ii). By using pure virtual function, it is possible to achieve a pointer to Neither (i) nor (ii)
derived class points to refer base class objects.
3.
only (i)
4.
only (ii)

Which of the below is used for designing real time 1.

networking capabilities? Packet Tracer


2.
WireShark
3.
Network Simulator 2
4.
TinyOS

28
Which of the below is not a business continuity disaster? 1.
Flooding
2.
Covid19
3.
Earth Quake
4.
Tsunami

Which of the below is an inline device? 1.


Switch
2.
Router
3.
VPN
4.
Host

Which of the below is a network sniffer tool? 1.


Packet Tracer
2.

WireShark
3.
Network Simulator 2
4.
TinyOS

Which of the following would LEAST likely be a source of ethical guidance? 1.


holy books
2.
laws
3.
tests
4.
friends

29
Which of the following term is the practice of hiding data in graphic, audio, or 1.
Masking
other text file?
2.
Steganography

3.
Cryptography

4.
None of the choices

Which of the following statement(s) is/are NOT true? 1.


(i). Virtual function help to achieve a pointer to base class points to refer (i) and (iv) only
base class objects only. 2.
(ii). Virtual function help to achieve a pointer to base class points to refer (i), (ii) and (iv) only
derived class objects.
3.
(iii). Virtual function has no role in supporting a pointer to achieve (i), (iii) and (iv) only
polymorphism.
4.
(iv). Virtual functions are not member functions of a class. (ii) only

1.
Which of the following relations is correct, when
comparing the best-case complexity? insertion<merge<selec
tion
2.
merge
<insertion<selection
3.

insertion<selection<m
erge
4.
none of the above

30
Which of the following principles of management was not given by Fayol? 1.
Unity of direction
2.
Subordination of individual
interest to common interest
3.
Stability of tenure
4.
Standardisation

Which of the following is true of a functional structure? 1.


It reacts quickly to environmental
changes.
2.
It has a strong horizontal coordination.
3.
It often results in hierarchy overload.
4.
It cannot work in small organizations.

Which of the following is the encryption/decryption key 1.


E-Signature
known only to the party or parties that exchange secret
2.
messages? Digital Signature

3.
Private key

4.
Security token

Which of the following is NOT one of the triple bottom line 1.


factors of corporate social responsibility? society
2.
environment
3.
economy
4.
culture

31
Which of the following is NOT a topic included in the social 1.
responsibility audit focus? open communication
2.
treatment of employees
3.
leadership
4.
management structure

Which of the following is an advantage of a 1.

peer-to-peer network? Files and folders cannot be centrally


backed up
2.
Does not need an expensive server as
individual workstations are used to
access files
3.
The server is expensive to purchase
4.
Network security can be carried out
centrally

Which of the following is an advantage of a 1.

client-server network? If one computer fails it will not disrupt


the network
2.
There is little or no security
3.
Users can access shared data which is
centrally controlled
4.
If any part of the network fails, a lot of
disruption can occur

32
Which of the following firms has NOT been exposed for 1.
ethical abuses and corrupt conduct? Satyam Computers
2.
Lehman Brothers
3.
Enron
4.
General Electric(GE)

Which of following linked list has the feature of its 1.


elimination of the need for a pointer to a node's Singly
predecessor to delete the node?
2.
Doubly
3.
Circular
4.
All of these

Which of the given option is correct? 1.


a. a is an integer array, b is an array of pointers,
#include<stdio.h>
c is an array of pointers
main(){
2.
int a[4]={1,2,3,4}; a. a is an integer array, b is an array of pointers,
c is a pointer to an array
int *b[4];
3.
int *(c[4]);
a. a is an array of pointers, b is a pointer to an
printf("%d %d %d",a,b,c); array, c is an array of pointers

} 4.
a. a is an array of pointers, b is a pointer to an
array, c is a pointer to an array

Which network protocol is often used for 1.


TCP
gaming?
2.
FTP
3.
UDP
4.
HTTP

33
Which network topology is the most common way of setting up a 1.
Ring
network?
2.
Bus
3.
Star
4.
Mesh

Which model can be selected if a user is involved in all the phases of SDLC? 1.
Waterfall Model
2.
Prototyping Model
3.
RAD Model
4.
Build AND Fix Model

Which method is meant for coordinating access to resources with respect to the 1.MAC
available IP addresses? 2.
ACL
3.
DAC
4.
None of the choices

WHICH LAYER IS RESPONSIBLE FOR PROCESS TO PROCESS DELIVERY? 1.


NETWORK LAYER
2.
TRANSPORT LAYER
3.
SESSION LAYER
4.
DATA LINK LAYER

Which key skill was not mentioned by Kanter as needed by managers of 1.


innovative organisations? Coping
2.
Political
3.
Communicating
4.
Leading a team

34
Which is/are the application(s) of stack 1.
Function calls
2.
Large number Arithmetic
3.
Evaluation of arithmetic
expressions
4.
All of these

Which is used for predicting virus? 1.


Firewall
2.
CWE
3.
IPS
4.
Exposures

Which is the most optimal scheduling algorithm? 1.


FCFS-First Come First
Served
2.
Shortest Job First
3.
Round Robin
4.
None of the Mentioned

Which is the most efferent phone directory search? 1.


Binary search tree
2.
Balanced BST
3.
Trie
4.
Linked List

35
which is the fastest storage unit in a usual memory hierarchy? 1.
cache
2.
main memory
3.
hard disk memory
4.
register

Which is not the application of queue? 1.


Printing jobs
2.
Process waiting
3.
Function nesting
4.
Network packet forwarding

Which is not one of Fayol’s principles? 1.


Authority and responsibility
2.
Globalization
3.
Unity of direction
4.
Unity of command

Which is first loaded into the BUS by the 1.


Data
data transfer initiator?
2.
Address
3.
Control Information
4.
Address, Control Information

36
Which is a true statement. 1.
Breadth-first search is the shortest path algorithm
that works on un-weighted graphs
2.
Depth first search is the shortest path algorithm that
works on un-weighted graphs
3.
Both of the above are true
4.
None of the above are true

Which HR practice would most likely be improved 1.


through a firm's efforts at corporate social benefits
responsibility?
2.
recruitment
3.
compensation
4.
succession planning

Which directory implementation is used in most 1.


Operating System? Single level directory structure
2.
Two level directory structure
3.
Tree directory structure
4.
Acyclic directory structure

Which database level is closest to the users? 1.


Internal
2.
Physical
3.
Conceptual
4.
External

37
Which data structure is used for implementing 1.
recursion? Queue

2.
Stack
3.
Arrays
4.
List

Which data structure is needed to convert infix notation 1.


to postfix notation? Branch
2.
Queue
3.
Tree
4.
Stack

Which data model is independent of both hardware and 1.


DBMS? External
2.
Internal
3.
Conceptual
4.
All of these

Which approach recognises that there is no optimal organisational design? 1.


Flexible
2.
Virtual
3.
Contingency
4.
Boundaryless

38
Which among the following is equivalent to the given regular expression? ab*+b 1.
(ab)*+b
2.
a((b)*+b)
3.
(a(b)*)+b
4.
((a*b)b*)*

Which access control type has a central authority that determines what objects 1.
people have access to depending on their role or organizational security policy? Mandatory Access Control
2.
Discretionary Access
Control
3.
Non-Discretionary Access
Control
4.
Rule-based Access control

Which term refers to the discipline that deals with what is good and bad or right 1.
and wrong? morals and traditions
2.
social responsibility
3.
ethics
4.
cultural norms

Which of the following statements regarding inline functions is correct? 1.


It speeds up execution.
2.
It slows down execution.
3.
It increases the code size.
4.
It increases the code size
and length.

39
Which of the following is the correct representation of pure virtual 1.
function? class base { public:
virtual void
display=0;};
2.
class base {public:
virtual void
display!=0;};
3.
class base {public: virtual
void display () = 0 ;};
4.
class base {public: virtual
void display () > 0 ;};

Which of the following is suitable to be considered as an object? 1.


Name
2.
Email
3.
Transaction
4.
Quantity

Which of the following concept of oops allows complier to inset 1.


arguments in a function call if it is not specified? Call by value
2.

Default arguments
3.
Call by reference
4.
Call by pointer

Which access control model can be suited for bank teller 1.


Discretionary
application? 2.
Mandatory
3.
Role-based
4.
Rule-based

40
When class B is inherited from class A, what is the order in which the 1.
destructors are called? Class A first Class B next
2.
Class B first Class A next
3.
Class B's only as it is the
child class
4.
Class A's only as it is the
parent class

When we concatenate two languages L1 and L2 recognized by machine M1 and M2 we 1.


obtain a machine with final state same as that of __________________ M2
2.
M1
3.
M1 and M2
4.
M1 or M2

When we concatenate two languages L1 and L2 recognized by machine M1 and M2 we 1.


obtain a machine with final state same as that of __________________ M1 or M2
2.
M1
3.
M1 and M2
4.
M2

When there is more than one final state in the reduced FA, then its regular expression 1.
will contain _________ operator surely dot
2.
star
3.
binary+
4.
unary+

41
When there is more than one final state in the reduced FA, then its regular expression 1.
will contain _________ operator surely unary +
2.
dot
3.
binary +
4.
star

When there is complete DFA with Five states out of which two are final states if F is 1.
modified such that it recognizes complement of the original language then there will be at 2
least _________final states.
2.
3
3.
7
4.
5

When there are infinite distinguishable strings then there cannot be a ------------- 1.
automata
2.
finite automata

3.
regular expression

4.
both finite automata
and regular
expression

When there are infinite distinguishable strings then there cannot be a ------------- 1.
finite automata
2.
automata
3.
regular expression

4.
both finite automata
and regular
expression

42
When the project deals with developing a well understood application, then the model is 1.
called as Waterfall Model
2.
Spiral Model
3.
COCOMO Model
4.
Agile Model

When the entries in the segment tables of two different processes point to the same 1.
physical address then ____________ the segments are
invalid
2.
the processes get
blocked
3.
the address space
is invalid
4.
the segments are
shared

When the computer processor does not get a data item it requires in the cache, then the 1.
problem is known as Cache miss
2.
Cache hit
3.
File caches
4.
Name cache

When FA M is given which recognizes language L and reverse of L is found by using M 1.


then there can be ___________Final states Two
2.
Three
3.
Only one
4.
Any number

43
When employee satisfaction is measured, employees seemed to be more satisfied 1.
under a(n) laissez-faire;
participative
________ leadership style than under a(n) ________ one.
2.
supportive;
laissez-faire
3.
democratic;
directive
4.
democratic;
autocratic

When determining the most appropriate form of leadership, which of the following 1.
should be The manager.
considered? 2.
The work
environment.
3.
The group.
4.
All the other options
are correct.

When determining the most appropriate form of leadership, which of the following 1.
should be The manager.
considered? 2.
The work
environment.
3.
The group
4.
All the other answers
are correct.

When designing apps, a software company considers data protection issues. So, what 1.
should we call this strategy? Data protection by
default
2.
Legitimate data
protection
3.
Data protection by
design
4.

44
Organisational data
protection

When a state in a FA has self loop its regular expression will have ------------- 1.
dot
2.
star
3.
binary+
4.
unary+

When a state in a FA has self loop its regular expression will have ------------- 1.
dot
2.
binary+
3.
unary +
4.
star

When a program tries to access a page that is mapped in address space but not loaded 1.
in physical memory, then segmentation fault
occurs
2.
fatal error occurs
3.
page fault occurs
4.
no error occurs

What would be the asymptotic time complexity to insert an element at the second 1.
position in the linked list? O(1)
2.
O(n)
3.
O(n^2)
4.
None

45
What will be the value of top, if there is a size of stack STACK_SIZE is 5 1.
5
2.
6
3.
4
4.
none

What will be the output? 1.


apple
#include<stdio.h>
2.
#include<string.h>
Error
main(){
3.
char arr1[5]={'a','p','p','l','e'}; a
char arr2[5]; 4.
0
arr2=arr1;
printf("%s",arr2);
}

What will be the output? 1.


ab
#include<stdio.h>
2.
main(){
.cd
char arr[]="ab.cd.ef";
3.
printf("%s",strrchr(arr,'.')); .cd.ef
} 4.
.ef

46
What will be the output? 1.
200
#include<stdio.h>
2.
int value=100;
100
void myFunction(int parameter)
3.
{ 100 200
printf("%d",parameter); 4.
200 100
}
main(){
int value=200;
myFunction(value);
}

What will be the output 1.


1
#include<stdio.h>
2.
void myFunction()
0
{
3.
return 1; Error
} 4.
None of these
main(){
printf("%d", myFunction());
}

What will be the output 1.


a. 123
#include<stdio.h>
2.
main(){
a. 233
int arr[4]={0,1,2,3};
3.
int one,two,three; a. 223
one=++arr[1]; 4.
a. 0 1 26
two=arr[one]+1;
three=arr[one+1];
printf("%d %d %d",one,two,three);
}

47
What will be the output 1.
5
#include<stdio.h>
2.
main(){
1
float a[]={1.23,2.34,3.45,4.56,5.67};
3.
printf("%d",sizeof(a)/sizeof(a[-1])); Error
} 4.
0

What will be the output 1.


100 101
#include<stdio.h>
2.
int myFunction1(int parameter)
101 101
{
3.
return parameter; 100 100
} 4.
101 100
int myFunction2(int *parameter)
{
return *parameter++;
}
main(){
int value=100;
printf("%d %d", myFunction1(value), myFunction2(&value));
}

What will be the output 1.


Allis
#include <stdio.h>
2.
char* cut(char *parameter) {
Well!
parameter+=5;
3.
return parameter; AllisWell!
} 4.
Error
main() {
printf("%s",cut("AllisWell!"));
}

48
What will be the output of the given program? 1.
100
#include<stdio.h>
2.
int myFunction(int parameter)
101
{
3.
return parameter++; 99
} 4.
Error
main(){
int value1=100;
int value2=myFunction(value1);
printf("%d",--value2);
}

What will be the output of the given code 1.


Error
#include<stdio.h>
2.
void myFunction(int parameter)
1
{
3.
printf("%d ",parameter); 2
} 4.
11
main(){
int value1=1;
myFunction(value1);
static int value2;
if (value2<value1)
{
value2++;
main();
}
}

49
What will be the output of the below code 1.
100 100
#include<stdio.h>
2.
int myFunction(int *parameter)
101 101
{
3.
101 100
return ++*parameter; 4.
100 101
}
main(){
int value=100;
printf("%d ",value);
myFunction(&value);
printf("%d",value);
}

What will be printed? 1.


1
2.
#include<stdio.h>
2
int myFunction()
3.
{ 12
return 1; 4.
21
return 2;
}
main(){
printf("%d", myFunction());
}

What will be printed? 1.


Invalid function definition
#include<stdio.h>
2.
main(){
myFunction() should be
int myFunction() defined outside main
method
{
3.
return 1;
1
}
4.
printf("%d", myFunction()); 0

50
What will be printed? 1.
ab
#include<stdio.h>
2.
main(){
.cd
char arr[]="ab.cd.ef";
3.
printf("%s",strchr(arr,'.')); .cd.ef
} 4.
.ef

What will be printed 1.


a. apple
#include<stdio.h>
2.
main(){
a
char arr[5]="apple";
3.
printf("%c",0[arr]); 97

} 4.
Error

What type of teams are composed of workers from different functional 1.


departments of the organization that meet to solve an important organizational Line teams.
problem?
2.
Cross-functional teams.
3.
Staff teams.
4.
Multi-dimensional teams.

What type of computer chips are volatile? 1.


RAM chips
2.
ROM chips
3.
CDROM
4.
FLASH MEMORY

51
What type of encryption is capable of encrypting a fixed-length plaintext block into 1.

a 128-bit cipher text block at the same time? Block


2.
Symmetric

3.
Hash
4.
None of the choices

What type of encryption encrypts the plain text byte by byte or bit by bit? 1.
Block

2.
Hash

3.
Stream

4.
Elliptic

What terms are applied by sociologists to two contrasting pictures of 1.


organizations: competing individuals and groups or people acting with common contingent, functional
interests?
2.
pooled, reciprocal
3.
pluralist, unitary
4.
co-operative,
conflictual

What should you do with someone's personal data once you've 1.


finished using it? Pass it on to someone else
2.
Throw it out.
3.
Give it back to the owner.
4.
Securely delete or destroy it.

What should a project manager do or follow to ensure clear 1.Scope verification 2.Completing a
boundaries for project completion? scope statement 3.scope definition
4.Risk management plan

52
What oracle backup and recovery file contains user and system? 1.
Datafile
2.
Control file
3.
Online ReDo file
4.
Redolog file

What is {1,2}* intersection {2,3}* 1.


{12,2}*
2.
{23,2}*
3.
{2}*
4.
{12,23}*

What is the value of the postfix expression 6 3 2 4 + - * 1.


Something between -15 and -100

2.
Something between -5 and -15
3.
Something between 5 and -5
4.
Something between 5 and 15

1.
What is the status of array after the first
iteration of selection sort for the given array of 5,7,10,12,2,8
2.
elements:5,7,10,12,2,8
2,5,10,12,7,8
3.
2,7,10,12,5,8
4.
5,7,10,2,8,12

53
What is the result of the following operation? 1.
X
Top (Push (S, X))
2.
Null
3.
S
4.
None

What is the real disadvantage of a linear list of directory entries? 1.size of the linear list in memory
2.linear search to find a file
3.it is not reliable
4.all of the mentioned

What is the real disadvantage of a linear list of directory entries? 1.


size of the linear list in memory
2.
linear search to find a file
3.
it is not reliable
4.
all of the mentioned

What is the postfix form of the following prefix * + a b – c d 1.


ab+cd–*

2.
abc+*–

3.
ab+*cd–

4.
ab+*cd–

54
What is the name of the process in which an employee informs 1.
another responsible employee Whistleblowing
in the company about potentially unethical behavior? 2.
Purging and releasing
3.
Identification
4.
Information transfer

1.
What is the level of recursion if the input
array is { 4, 8, 32, 58,98,129,201 } and key 5
2.
is 8?
2
3.
3
4.
4

What is the difference is graph traversal and tree: 1.


There can be a loop in the graph
2.
DFS and BFS are the same
3.
There can’t be a loop in the graph
4.
DFS and BFD are different

What is the current industry for the measure of Software 1.Iterations to Successful Build
Quality? 2.Number of Bugs Fixed
3.Number of Defects per KLOC
4.None in the list

What is the function of HTTP? 1.


webserver and browser activity
according to command
2.
Mark-up language
3.
Forming authority of the page
4.
Tag files and create effects

55
1.
What is the complexity of quick sort
algorithm, if the array to be sorted is already O(n2)
2.
in sorted order?
O(nlogn)
3.
Constant
4.
O(n)

What is split horizon? 1.


Information about a route should not be sent
back in the direction from which the original
update came.
2.
It splits the traffic when you have a large bus
(horizon) physical network.
3.
It holds the regular updates from
broadcasting to a downed link.
4.
It prevents regular update messages from
reinstating a route that has gone down.

What is Cyclomatic complexity ? 1.


Black box testing
2.
White box testing
3.
Yellow box testing
4.
Green box testing

What is Address Binding? 1.


going to an address in memory
2.
locating an address with the help of another
address
3.
binding two addresses together to form a
new address in a different memory space
4.

56
a mapping from one address space to
another

What is a network? 1.
A group of 1 or more devices that
communicate
2.A groupof 2 or more devices that
communicate 3.
When 2 or more computers are in
the same building
4.
A group of 3 or more devices that
communicate

What is a Network Protocol 1.


Formal standards and policies
comprised of memes
2.
Formal standards and policies
3.
Formal standards and policies
comprised of rules, procedures and
formats
4.
None of the above

What is a disadvantage of a star network? 1.


It is cheap
2.
It uses one cable
3.
It is expensive
4.
It has a terminator

57
What happens to a task force after it finishes its assignment? 1.
It is integrated with the organisation.
2.
It is disbanded.
3.
It continues after accomplishment.
4.
None of the other answers is correct.

What does DPIA expand as? 1.


Data Privacy Impact Assessment
2.
Data Protection Impact Assessment
3.
Data Privacy Identification Assessment
4.
Data Protection Identification Assessment

What does biometrics have to do with access control? 1.


Authorization
2.
Authentication
3.
Confirmation
4.
Certification

1.
What are the mid values in each level of
recursion in the binary search for the input 58, 129, 201
2.
array { 4, 8, 58,98,129,201 } and key 201?
98, 129, 201
3.
98,201
4.
58,129,201

58
What are all candidate keys, other than the primary keys called? 1.
Partial keys
2.
Alternate keys
3.
Superkey keys
4.
None of these

What Access Control paradigm was created to deal primarily 1.


with computer system information flow? Lattice-Based
2.
Integrity Based
3.
Flow-Based
4.
Area Based

What is another way to describe a parent-child 1.


relationship? Has-A
2.
Is-A
3.
Does-A
4.
Gets-A

Virtual memory technique facilitates sharing of memory among 1.


processes
2.
threads
3.
instructions
4.
programs

59
Unity of command means: 1.
Parity of authority and responsibility
2.
The flow of command from superior to a
subordinate
3.
Parity in controlling
4.
None of the above

Unit testing is done by__________________? 1.


Users
2.
Developers
3.
Customers
4.
None of the mentioned

Triple Bottom Line reporting refers to: 1.


using a low, medium, and high estimates for
profitability forecasts.
2.
measuring the impact of the firm on
stockholders, customers, and employees
3.
measuring the social, environmental, and
financial performance of the firm.
4.
measuring the impact of local, state, and federal
governments on the firm.

60
Transfer time is ... 1.
the time is taken to locate the disk arm to a specified
track where the data is to be read or write.

2.
the time is taken by the desired sector of disk to rotate
into a position so that it can access the read/write
heads.

3.
the time to transfer the data.

4.
the time taken to complete the execution.

Traits or skills on which leaders differ from 1.


non-leaders include: Honesty and integrity
2.
Self-confidence
3.
Drive and desire to lead
4.
All the other options are correct

Trait theory ignores ________. 1.


the physical traits of leaders.
2.
the aspects of honesty and integrity.
3.
the interactions of leaders and their group
members as well as situational factors.
4.
the fact that leaders should be able to create
visions and solve problems.

Total number of levels in DFD 1.


1
2.
2
3.
3
4.
4

61
Total Development in programmer months of Utility 1.
programs TDEV=2.5xPM pow 0.38
2.
TDEV=2.5xPM pow0.35
3.
TDEV=2.5xPM pow0.32
4.
None of the above

Total Development in programmer months of Systems 1.


programs TDEV=2.5xPM pow 0.38
2.
TDEV=2.5xPM pow0.35
3.
TDEV=2.5xPM pow0.32
4.
None of the above

Total bits for a direct-mapped cache with data of 16 1.


KB and blocks of 4-word, assuming a 32-bit address 143K
are
2.
144K
3.
145K
4.
147K

To read and write from a file we are using the standard C++ library 1.
Fstream
called
2.
stream
3.
filestream
4.
None

62
To make a process as Zombie, which process needs to delay (sleep()) its 1.
execution? The parent process or the child process? parent to
sleep for
a while,
child
normal
execution
2.
child to
sleep for
a while,
parent
normal
execution
3.
parent
and child
both
normal
execution
4.
parent
and child
both to
sleep for
a while

To help the operating system estimate LRU, many processors provide a 1.


Use bit
2.
Reference bit
3.
Fault bit
4.
Both a and b

To create a dynamic record which is better? 1.


Stack
2.
Queue
3.
Linked list
4.
All of these

63
To avoid the race condition, the number of processes that may be 1.
simultaneously inside their critical section is 8
2.
1
3.
16
4.
0

Time Oriented Diagram 1.


class Diagram
2.
UseCase Diagram
3.
Object Diagram
4.
Sequence Diagram

Through this principle of management, Henri Fayol guides the managers to exhibit 1.
exemplary behaviour and advises that they should not fall into the temptation of Remuneration of
misusing their powers for personal benefit at the cost of the general interest of the employees
organization. Which principle of management is being described in the above
2.
statement?
Centralization and
decentralization
3.
Subordination of
individual interest to
general interest
4.
Equity

Threat to confidentiality is ..... 1.


DDoS
2.
Malware
3.
Virus
4.
DoS

64
Thomas Tharakan expects his employees to "check their brains at the door." He does 1.
all the thinking, makes all the decisions, and issues commands to his subordinates. autocratic
Thomas uses the ________style of leadership.
2.
authoritarian
3.
democratic
4.
laissez-faire

This technique of scientific management helps in the development of the concept of 1.


the assembly line, which is widely used in automobile companies these days as well. Motion study
Identify the technique.
2.
Standardization and
simplification of work
3.
Method study
4.
Time study

This code would work but is bad practice because 1.


The object attribute is changed by a
method
2.
The object attribute is being changed
directly through mainline code
(outside of the class/object itself)
3.
There is no object being created
4.
The principle of encapsulation has
been ignored

There exists a language L. We define a string w such that w 1.


belongs to L and w=pqr and |w| >=n for some constant integer n
n.What can be the maximum length of the substring pq i.e.
2.
|pq|<=?
|p|
3.
|q|
4.
|w|n

65
There are two abilities that you must have to properly 1.
understand ethics. The first is the ……………………. and the ability to discern; concentration
second ability is ………………………….
2.
ability to visualize; devotion
3.
ability to distinguish; dedication
4.
ability to judge; dedication

There are ____ type’s specializations. They are full 1.


1
specialization and partial specialization
2.
2
3.
3
4.
4

Theodore New-Comb’s balance theory is related to 1.


Leadership
2.
Group formation
3.
Selection
4.
Retirement

The word ______ refers to the portion of a _______ that carries 1.


a transmission. line; channel
2.
channel; link
3.
link; channel
4.
line; link

66
The way the work activities and the departments are organised 1.
is called chain of command.
2.
span of control.
3.
unity of direction.
4.
esprit de corps.

The view that sees profit maximization as the main objective is 1.


known as: Shareholder theory
2.
Principal-agent problem
3.
Stakeholder theory
4.
Corporation theory

The VFS (virtual file system) activates file system-specific 1.


operations to handle local requests according to their _____ size
2.
commands
3.
timings
4.
file system types

The Unix system call to get the size of a page is _________. 1.


pagesize()

2.
getpagesize()
3.
pagesizeof()
4.
sizeof()

67
The University of Michigan studies used the 1.
two dimensions of ________ and ________ to employee oriented; production oriented
study behavioural characteristics of leaders. 2.
consideration; initiating structure
3.
task; people
4.
decision-making; employee development

1.
The universal Turing machine U
consists of 1 input tape
2.
2 input tape
3.
3 input tape
4.
4 input tape

The underlying technology on which the 1.Project 2.Product 3.Business 4.None in the list
system is built is superseded by new
technology is the __________ type of risk

The two major benefits are improvement in 1.


performance and minimization of cost to True
process the system
2.
False
3. 4.

The transformational leadership style 1.


encourages group members to transform themselves
into better people.
2.
strives to change the group members' opinions by
showing them a better way to think.
3.
changes opinions and attitudes without changing
behaviours.
4.
encourages and inspires group members to go above
and beyond selfish interests and do what is best for
the common good of the group.

68
The total number of states required to 1.
automate the given regular expression 4
(aa)*(bb)*
2.
3
3.
5
4.
7

1.
contiguous
The three major methods of allocating disk
space that are in wide use are _____________
2.
linked

3.
indexed

4.
all of the mentioned

The technology is used to analyze and monitor 1.


network and information flow traffic_________ Cloud access security brokers (CASBs)
2.
Managed detection and response (MDR)
3.
Network Security Firewall
4.
Network traffic analysis (NTA)

The technique of storing the previously 1.


calculated values is called? Saving value property
2.
Storing value property
3.
Memoization
4.
Mapping

69
The syntax for catching all exceptions in a 1.
program is …………. catch-all(…) { }
2.
catchall(…){ }
3.
catch(…) { }
4.
catch(.){ }

he sum of the degrees of all vertices in an undirected graph 1.


2V
2.
E+1
3.
V+1
4.
2E

The subtraction of hit rate (1-hit rate) is known as 1.


Hit time
2.
Miss penalty
3.
Miss rate
4.
Cache

The structure or format of data is called ___________ 1.


Syntax
2.
Semantics
3.
Struct
4.
Formatting

70
The stress which is negative in nature and causes mental and physical problems is 1.
known as Eustress
2.
Distress
3.
Negative stress
4.
Permanent stress

The stress that exists for weeks, months, or even years is called 1.
Chronic stress
2.
Acute stress
3.
Negative stress
4.
Permanent stress

The software cost estimation is done in stages as 1.


Basic COCOMO
2.
Intermediate
COCOMO

3.
A and B
4.
None of the above

The single and multi-variable estimation models at different stages of estimation is 1.


performed by Halstead
2.
FP
3.
COCOMO
4.
None of the above

71
The set of all strings over the alphabet {p,q} (including epsilon} is denoted by 1.
(q+p)*
2.
(q+p)^+
3.
p^+q^+
4.
p*q*

The set of all strings over the alphabet {a,b} (including epsilon} is denoted by 1.
(a+b)^+
2.
a^+b^+
3.
a*b*
4.
(a+b)*

The semi-detached software is 1.


Development of the
GUI
2.
Database module
3.
Networking Module
4.
None of the above

The Scalar principle of organisation implies 1.


All authority must be vested to one
person
2.
Manager should directly
supervise only a limited
number of subordinates
3.
Line of authority must be
clearly defined
4.
A subordinate should have
only one supervisor

72
The result of evaluating the prefix expression */b+-dacd, where a=3, 1.
b=6, c=1, d=5 is 0
2.
5
3.
10
4.
15

The recognizing capabilities of NDFSM and DFSM 1.


must be same
2.
may be different
3.
must be different
4.
none of the answers given

The purpose of cache memory in a computer is to 1.


ensure fast booting
2.
reduce load on CPU registers
3.
replace static memory
4.
speed up memory cycle time

The project plan sets out 1. the resources available to the


project 2.
the work breakdown
3.
a schedule for the work
4.
all the above

73
The process-related to process control, file management, device 1.
management, Editors
information about system and communication that is requested by any
higher
2.
level language can be performed by __________ Compilers

3.
System Call

4.
Caching

The process of planning starts with clearly laying down 1.


of_______________________. Policies
2.
Procedures
3.
Goals and Objectives
4.
All of the Above

The process of perceiving the causes of behavior and outcomes is 1.


termed as Perception
2.
Stereotype
3.
Attribution
4.
Personality

The process of accessing data stored in a serial access memory is 1.


similar to manipulating data on a ________ Heap
2.
Binary Tree
3.
Array
4.
Stack

74
The process model that represents a way of thinking that allows 1.
businesses and team members to quickly innovate and respond to the Waterfall Model
dynamic demands of an Organization is
2.
Incremental Model
3.
RAD Model
4.
Agile Model

he process by which an individual gives meaning to the environment is called 1.


Perception
2.
Stereotype
3.
Attribution
4.
Personality

The primary or first component of DFD is known as 1.


Process
2.
Data
3.
Square
4.
Entity

The postfix form of A*B+C/D is? 1.


*AB/CD+
2.
AB*CD/+
3.
A*BC+/D
4.
ABCD+/*

75
The postfix form of A*B+C/D is 1.
*AB/CD+

2.
AB*CD/+

3.
A*BC+/D

4.
ABCD+/*

The policy for memory hierarchies: L1 data are never found in an L2 cache, 1.
refers to Write buffer
2.
Multilevel exclusion
3.
Write-through
4.
Multilevel inclusion

The pager is concerned with the 1.


individual page of a process

2.
entire process
3.
entire thread
4.
first page of a process

The page table contains 1.


base address of each page in
physical memory
2.
page offset
3.
page size
4.
displacement

76
The page replacement algorithm that suffers highly from Belady's anamoly is 1.
Least Recently Used
2.
Most Frequently Used
3.
First In First Out
4.
Least Frequently Used

The output of the requirement analysis and the requirement specification is 1.


used as the input for writing ____________ User Acceptance Test Cases
2.
User Rejection Test Cases

3.
Product Rejection Test Cases
4.
Product Acceptance Test
Cases

The output of the below program will be 1.


a. Be Positive
#include
2.
#include
a. Positive Be
main(){
3.
char Be[16]="Positive"; a. Positive Positive Be
char Positive[16]="Be "; 4.
a. Be Be Positive
printf("%s", strcpy(Positive, strcat(Positive,Be)));
}

The operation for adding an entry to a stack is traditionally called : 1.


add
2.
append
3.
insert
4.
push

77
The objective of this technique of scientific management is to reduce a given line or a 1.
product to fixed type sizes and characteristics. Name the technique. Method study
2.
Differential piece wage
system
3.
Standardization and
simplification of work
4.
Functional
foremanship

The number of states in DFA is --------than the number of states in NFA for the same 1.
Language. greater equal
2.
less
3.
Greater
4.
equal

The number of states in a machine M recognizing L1UL2 will be 1.


__________________ where n is the number of states in M1 and m is the number of m+n
states in M2 .
2.
m-n
3.
m+n+1
4.
n-m

The number of comparisons required in the Linear search algorithm, if 1.


the search element is not present in the array, n+1
2.
n
3.

(n+
1)/
2
4.
n-1

78
The number of auxiliary memory required for a Push Down Machine (PDM) to behave 1.
like a Finite State Machine (FSM) is 1
2.
4
3.
0
4.
2

The necessity of cost-benefit analysis in PM is to have a systemic approach to identify 1.


the pluses and minuses of various paths through a project True
2.
False
3. 4.

The model in which environmental, social, and economic responsibilities are satisfied 1.
corporate social
concurrently is known as ________. responsibility
2.
global activism
3.
giving back to the
planet
4.
restoration and
revivification

The MMU is a 1.
Hardwar
e
2.
Software
3.
Malware
4.
None of
the given
choices

79
1.
4
The minimum number of transitions to pass to reach the final state as per the
following regular expression is: {0,1}*{1000} 2.
3
3.
5
4.
7

The minimum number of colors needed to color a graph having n (>3) vertices 1.
and 2 edges is 1
2.
2
3.
3
4.
4

The minimum length for strings in the regular expression ( ba* + aab* )* 1.
is_________ 2
2.
0
3.
1
4.
infinite

The minimum standards of ethical behaviour in a firm are based on ________, 1.


while higher corporate policies;
human resources
standards are established by ________.
2.
co-workers; mission
statements
3.
organizational culture;
laws
4.
laws; corporate
leadership

80
1.
The maximum distance between two nodes present in
the stack is 1 in the implementation of DFS. True
2.
(length/edge= 1)
False
3. 4.

1.
The maximum distance between two nodes present in
the queue is 1 in the implementation of BFS. True
2.
(length/edge= 1)
False
3. 4.

The matrix structure is the correct structure when three conditions are met. 1.
Which of the following is one of these three conditions? Pressure exists to share
scarce resources
across product lines.
2.
Technical quality is not
very important.
3.
The environmental
domain of the
organization is
simple.
4.
The environmental
domain of the
organization is
certain and stable.

The management of business activities that is conducted in more than one 1.


country is called: domestic management.
2.
altruistic management.
3.
comparative management.
4.
international management.

81
1.
Program counter
The logical file system maintains structures consisting of information about a
file...
2.
file control block

3.
Process control block

4.
file pointer

The lexical analysis for a modern language such as Java needs the power of 1.
which one of the following machine models in a necessary and sufficient Finite state automata
sense?
2.
Non-deterministic pushdown
automata
3.
Deterministic pushdown
automata
4.
Turing machine

The Lattice-Based Access Control paradigm was created primarily to address 1.


_____. Affinity
2.
Availability
3.
Confidentiality
4.
Integrity

The language defined by S-->SS is 1.


2l
2.
2l +1
3.
2l-1
4.
Null/Ɛ

82
The Knapsack problem where the objective function is to minimize the profit is __ 1.
Greedy
2.
Dynamic 0 / 1
3.
Backtracking
4.
Branch & Bound
0/1

The intersection of CFL and regular language 1.


Is always
regular and
context free
2.
Is always
regular

3.
Need not be
regular

4.
IS always
context free

The interactive transmission of data within a time sharing system may be best suited to 1.
simplex lines
2.
half-duplex lines
3.
full duplex lines
4.
diplex-lines

The instruct Kernel to do various operations of the calling program and 1.Shell 2.
exchange data Editors
3.
between the Kernel at the program
System Calls
4.
Commands

83
The initial array elements are 1,7,5,2 after which the following operation are performed 1.
enqueue(6), enqueue(8), dequeue, dequeue, enqueue(9), enqueue(0). what are the final 1,7,5,2,9,0
elements of the array?
2.
1,7,5,2,6,8
3.
5,2,6,8,9,0
4.
5,2,9,0,6,8

The implied, enforced, or felt obligation of managers, acting in their official capacities, to 1.
human
serve or protect the interests of groups other than themselves is known as ________.
resource
ethics
2.
environmen
tal morality
3.
corporate social
responsibility
4.
business-centre
d morality

The idea of developing an initial implementation, getting the user feedback, and evolving it 1.
through various versions until an acceptable system is made is Agile Process
Model
2.
Waterfall
Process Model
3.
Incremental
Process Model
4.
RAD Process
Model

The group development stage described as "Deforming and Mourning" is 1.


Storming
2.
Norming
3.
Performing
4.
Adjourning

84
The garbage can model is related to 1.
Leadership
2.
Learning
3.
Decision
making
4.
Recruitment

The fundamental activity of a process arranged in a linear order of software development 1.


paradigm is Spiral model
2.
Big Bang model
3.
V-model
4.
Waterfall model

The following graph, which is not a topological ordering of the following graph 1.
123456
2.
132456
3.
324165
4.
324156

The following is not a type of organisation structure. 1.


Line
organis
ation
2.
Staff
organisation
3.
Matrix
organisation
4.
Flexible
organisation

85
The five items: A, B, C, D and E are pushed in the stack, one after the other starting from A. 1.
The stack is popped into four items and each element is inserted in a queue. Then two A
elements are deleted from the queue and pushed back on the stack. Now one item is
2.
popped from the stack. The popped item is.
B
3.
C
4.
D

The file-position pointer is ___ value that specifies the location in the file as 1.
Interger
a number of bytes from the file's starting location
2.
Float
3.
Null
4.
None

the file system allows the same system call interface (the API) to be used for different types 1.
of file systems. NTFS

2.
EXT2

3.
VFS(virtual file
system)

4.
DOS

The extent to which a leader lets followers make decisions themselves rather than making 1.
the Laissez-faire
decisions for them are focused on by _______________ leadership styles. and general
2.
Participative
and
autocratic
3.

86
Employee-ori
ented and
job-centred
4.
Laissez-faire
and close

The execution when it finds the solution otherwise starts the problem from the top 1.
Backtracking
2.
Divide and
conquer
3.
Branch and
Bound
4.
Dynamic
programming

The Epsilon-Closure of any state q will contain the state ______________ irrespective of q. 1.
Epsilon
2.
q
3.
Final state

4.
p

The entity that has a primary key is 1.


weak entity
2.
Full Entity
3.
Complete Entity
4.
Strong Entity

87
The encryption methodology is used in . 1.
IDS
2.
Firewall
3.
Host
4.
VPN

The employees should be rewarded for their suggestions which results in a 1.


substantial reduction in the cost. Which principle of management advocates this? Science, not the rule of
thumb
2.
Co-operation, not
individualism
3.
Harmony, not discord
4.
Science, not art

The element of role identity which describes how others believe one should 1.
behave in a given situation. Role perception
2.
Role expectation
3.
Role identification
4.
Role description

The element of role identity which describes how an individual is expected to 1.


behave according to his own perception in the group is called Role perception
2.
Role expectation
3.
Role identification
4.
Role description

88
The divisional structure has a special feature of __________________. 1.
flexibility.
2.
reliabilty.
3.
both flexibility and
reliability.
4.
change.

The Directors’ responsibilities are unlikely to include. 1.


a fiduciary duty
2.
a duty to keep proper
accounting records
3.
a duty to propose
high dividends for
shareholders
4.
A. a duty of care

The device used to identify fast-spreading threats is ... 1.


IDS
2.
IPS
3.
Firewall
4.
VPN

The device used to block unauthorized access to your 1.

network is ... IDS


2.
Firewall
3.
IPS
4.
VPN

89
The device used for providing secured remote access is ... 1.
IDS
2.
IPS
3.
Firewall
4.
VPN

The decision-making in an organic structure is generally 1.


decentralised.
2.
centralised.
3.
formalised.
4.
None of the other
answers is correct.

he DBMS language component which can be embedded in a program is 1.


The data definition
language(DDL)
2.
The data manipulation
language (DML)
3.
The database
administrator (DBA)
4.
A query language

The data transmission on the asynchronous BUS is also referred as 1.

___________ Bulk transmission


2.
Same time
transmission
3.
Switch mode
transmission
4.
Hand-Shake
transmission.

90
The data structure required to check whether an expression contains balanced 1.
parenthesis is Stack

2.
Queue
3.
Tree
4.
Array

The Cost benefit analysis evaluates the following benefits 1.


Direct costs
2.
Intangible costs
3.
Opportunity costs
4.
None of the above

The control takes place after the action is called as 1.


Feed Forward
Control
2.
Concurrent Control
3.
Feedback Control
4.
Control measure

The Contingency theory focuses on 1.


Situational variables
2.
Interrelationships
3.
Groups and human
behavior
4.
Economic needs of
workers

91
The connected graph with n vertices and n edges consists of at least m different 1.
spanning trees, what is the largest integer m? 1
2.
2
3.
3
4.
6

The concept of ________ has evolved from the traditional view of corporate social 1.
social scaffolding
responsibility.
2.
planetary
progressivism
3.
work-life balance
4.
corporate
sustainability

The COCOMO model depends of time factors 1.


True
2.
False
3. 4.

The cache term is now applied when a buffering is employed for reusing commonly 1.
occurring items, for example File caches
2.
Name cache
3.
Flash memory
4.
Both a and b

The basic limitation of FSM is that 1.


all of the comments are true
2.
it cannot remember arbitrary large
amounts of information
3.
it sometimes fails to recognize
grammars that are regular

92
4.
it sometimes recognized grammars
that are not regular

The attribute composed of multiple components, each with an 1.


independent existence is called Composite attribute
2.
Simple attribute
3.
Single valued attribute
4.
Derived attribute

The attribute age can be a 1.


Single Valued
2.
Multi Valued
3.
Derived
4.
Composite

The assumptions about the future in which the planning is implemented 1.


are termed as Boundaries
2.
Premises
3.
Limits
4.
Hypothesis

The assignment of individual duties and responsibilities is most 1.


appropriately described in which of the following documents? Security policy
2.
Enforcement guidelines
3.
Acceptable use policy
4.
Program manual

93
The algorithm which chooses the page that has not been used for the 1.
longest period of time is _________. First in first out algorithm
2.
Least recently used algorithm
3.
Additional reference bit algorithm
4.
Counting based page replacement
algorithm

The aim of this process is to develop low-quality software solutions that 1.


exceed or meet user expectations within time frame is development life True
cycle.
2.
False
3. 4.

The advantage of pure virtual function than normal virtual function is 1.


………………. It reduces the program code
size in terms of number of
lines
2.
It reduces the memory space
3.
the compiler easily finds
syntax error in a program
4.
the time complexity is linear

The address of a page table in memory is stored in 1.


stack pointer
2.
page table base register
3.
page register
4.
program counter

94
The address generated by the CPU is referred to as ____________ 1.
Physical address
2.
Logical address
3.
Neither physical nor logical
4.
Network Address

he actual count of elements associated with the connectivity is 1.


called __________ of the relationship connectivity. Cardinality
2.
Entity type
3.
Entity set
4.
None of these

The access mode of Magnetc Disk is 1.


Sequential access
2.
Random access
3.
Associative access
4.
SemiRandom access

The ability to temporarily halt the CPU and use this time to send 1.
information on buses is called
Direct memory access

2.
Vectoring
the
interrupt

3.
System Interrupt
4.
Cycle stealing

95
The ___________ must design and program the overlay 1.
structure. programmer
2.
system architect
3.
system designer
4.
system analyst

The __________ model defines the stored data structures in 1.


terms of the database model used. Physical level
2.
Conceptual level
3.
External level
4.
None of these

1.
participative
The ________ style of leadership describes a leader who tends
to involve employees in 2.
autocratic
decision making, delegate authority, encourage participation in
deciding work methods and 3.
democratic
goals, and uses feedback as an opportunity for coaching
employees. 4.
laissez-faire

The _______ theory states a manager’s choice of organizational 1.


structures and control systems depends on the characteristics of Mechanistic
the external environment.
2.
Management science
3.
Organic
4.
Contingency

96
The ______ technique expands the bandwidth of a signal by 1.
replacing each data bit with n bits. DSSS
2.
FHSS
3.
FDM
4.
TDM

The "means" of leadership involve 1.


getting results through others.
2.
the ability to build cohesive,
goal-oriented teams.
3.
the process of influencing an
organized group toward
accomplishing its goals
4.
the process of forcibly making others
comply..

The Simple Security Condition requires that a subject 1.

S can read an object O only Is > Io


2.
if _____and any DAC permits
LO ≤ LS
3.
L0≤ LS
4.
Is ≤ Io

The number of subordinates a superior can effectively handle is called 1.


Organising people
2.
Span of control
3.
Direction
4.
Coordination

97
The easiest form of offline password hash attack which can be 1.
Hybrid
used for capturing insecure passwords is? 2.
Dictionary
3.
Brute-force
4.

Man-in-the-mid
dle

The -------------- access control model in which users are not given 1.
Discretionary
much freedom to decide who can access their files and is 2.
Mandatory
recognized for its structure and use of security labels?
3.
Role-based
4.
Nondiscretiona
ry

That an enterprise must behave as a good citizen is an example of its responsibility 1.


towards: owners.
2.
workers.
3.
consumers.
4.
community.

Thackeray Manufacturing recently developed a code of ethics. Which of the following 1.


topics is business
conduct
most likely covered in the document?
2.
fair competition
3.
HR issues
4.
All the other
answers are
correct

98
Testing the end to end functionality of the system as a whole is defined as 1.
_______________ Unit Testing
2.
Functional Testing
3.
Stress Testing
4.
Load Testing

Templates ___ some common errors found in code that makes heavy use 1.
Reject
of function-like macros
2.
Allow
3.
Discard
4.
None

Template uses ___ keyword? 1.


class
2.
typename
3.
both class &
typename
4.
function

Template creates___ versions of a function at run time 1.


Similar
2.
Different
3.
None
4.
Both
similar and
different

99
1.
Template classes and functions ____ the code duplication of different
Allow
data types and thus makes the development easier and faster.
2.
Eliminate
3.
Permit
4.
None

TCP/IP MODEL DOES NOT HAVE ______ LAYER BUT OSI MODEL HAVE THIS LAYER. 1.
SESSION
LAYER
2.
PRESENTATI
ON LAYER
3.
APPLICATION
LAYER
4.
Both Session
and
Presentation
layer

Tangible premises in planning doesn’t include 1.


capital
investment
2.
Unit of
production
3.
Cost per unit
4.
Goodwill

100
Synchronous and Asynchronous data transfer classification is based on 1.

______________ Time at
which data
transfer
happens
2.
Type of data
transfer
occurs
3.
Type of
devices
connected to
them
4.
None of the
mentioned
options

Suppose the following disk request sequence (track numbers) for a disk with 100 tracks is 1.
given: 45, 20, 90, 10, 50, 60, 80, 25, 70. Assume that the initial position of the R/W head is on 8
track 50. The additional distance that will be traversed by the R/W head when the Shortest
2.
Seek Time First (SSTF) algorithm is used compared to the SCAN (Elevator) algorithm
9
(assuming that SCAN algorithm moves towards 100 when it starts execution) is _________
tracks 3.
10
4.
11

Suppose that a system has a paging system with 8 entries in a page table. Given that there 1.
are three processes of equal sizes, creating 8 valid entries in their page tables. What would 24
be the total number of frames allocated to these three processes under the condition that 2
2.
pages are shared by the three processes?
20
3.
18
4.
30

101
Suppose a disk has 201 cylinders, numbered from 0 to 200. At some time the disk arm is at 1.
cylinder 100, and there is a queue of disk access requests for cylinders 30, 85, 90, 100, 105, 1
110, 135 and 145. If Shortest-Seek Time First (SSTF) is being used for scheduling the disk
2.
access, the request for cylinder 90 is serviced after servicing ____________ number of
2
requests.
3.
3
4.
4

Supervision of employees is greatly enhanced by having a small span of control, but it is 1.


expensive.
2.
time-consumin
g.
3.
resource-cons
uming.
4.
complex.

Stress that usually lasts for short time and may be due to work pressure, meeting deadlines 1.
pressure or minor accident, or any related matters is called Chronic
stress
2.
Acute stress
3.
Negative
stress
4.
Permanent
stress

1.
State true or false. True,
False
i) Unix, support multiple user processes but only support one thread per
2.
process.
True,
A java run time environment is an example of a system of one process with True
multiple threads. 3.
False,
True
4.

102
False,
False

SP 800 series standard are defined by.... 1.


NIST
2.
COBIT
3.
COSO
4.
ISO

Sort out the following virus based on their severity: 1.

Resident virus, non-resident virus, boot sector virus, and Resident virus,
macro virus non-resident virus, boot
sector virus, and macro
virus
2.
Boot sector virus,
resident virus,
non-resident virus and
macro virus
3.
Boot sector virus,
non-resident virus,
resident virus and
macro virus
4.
Boot sector virus,
non-resident virus,
macro virus and
resident virus

Social responsibility is ______________. 1.


the same as legal
responsibility.
2.
broader than legal
responsibility.
3.
narrower than legal
responsibility.

103
4.
None of the other answers
is correct.

Significant percentage of the spent time in moving data in two levels in the 1.
memory hierarchy, then the memory-hierarchy is said to Mixed
2.
Write stall
3.
Averaging
4.
Thrash

Select the output of the following 1.


a. Same
#include<stdio.h>
2.
main(){
a. Not Same
char arr1[5]="apple";
3.
char arr2[5]="apple"; a. Error
if (arr1==arr2) 4.
a. None of these
printf("Same");
else
printf("Not Same");
}

Seek Time is -------- 1.


the time taken to locate the disk
arm to a specified track where
the data is to be read or write.
2.
the time taken by the desired
sector of disk to rotate into a
position so that it can access
the read/write heads
3.
the time to transfer the data.
4.
the time is taken to complete
the execution.

104
SDLC stands for 1.
Software Development Life
Cycle
2.
System Development Life cycle
3.
Software Design Life Cycle
4.
System Design Life Cycle

Scientific Management is related to 1.


Elton Mayo
2.
Henry Fayol
3.
F W Taylor
4.
Max Weber

Scalar chain is a 1.
Leadership chain
2.
Authority chain
3.
Decision making chain
4.
Control chain

Sanjana works as a production supervisor, and she believes one of her 1.


subordinates is drinking during his lunch break. Sanjana’s employer does not corporate code of ethics
have a specific rule regarding the subordinate's behaviour. Which of the
2.
following would most likely assist Sanjana with her problem in this situation?
corporate vision statement
3.
corporate code of conduct
4.
labour legislation

105
RTM stands for ____________ 1.
Repeated Trade Matrix
2.
Redundant Trace Module
3.
Robust Test Mechanism
4.
Requirement traceability matrix

Routing is performed by ________ in OSI 1.


architecture network layer
2.
data link layer
3.
transport layer
4.
session layer

Rotational Latency is --- 1.


the time is taken to locate the disk arm to a specified track
where the data is to be read or write.

2.
B. the time taken by the desired sector of disk to rotate
into a position so that it can access the read/write heads.

3.
the time to transfer the data.

4.
the time is taken to complete the execution.

Reverse polish notation is used by 1.


Stack
2.
Queue
3.
Linked list
4.
All of these

106
Return type of is_open() function is 1.
int
___
2.
bool
3.
float
4.
char *

Resource allocation graph can be used 1.


to avoid deadlock for 'n' processes Yes
2.
No
3. 4.

Requirement of two pointer is not 1.


mandatory in Stack
2.
Queue
3.
Linked list
4.
All of these

Relationship set in ER diagram 1.


Divided Rectangle
2.
Non Divided Rectangle
3.
Line
4.
Diamond

Relations produced by ER model will always 1.


be in 1 NF
2.
2 NF
3.
3 NF
4.
4 NF

107
Relation between two different function with 1.
two constant are applicable in F(n)=O(g(n))
2.
F(n)=θ(g(n))
3.
F(n)=Ώ(g(n))
4.
All of them

Related to Fibonacci sequence, which of the 1.


following is more appropriate. Integer sequence
2.
Irrational number
3.
Both are true
4.
None is correct

Regular expressions that do not contain the star operator can represent 1.
only finite languages True
2.
False
3.
Can't determined
4.
Neither True and Nor False

Regular Expression recognizes --------grammars 1.


type-1
2.
type-2
3.
type-3
4.
type-0

108
Recursion fails due to fixed size 1.
Linked list
2.
Queue
3.
Stack
4.
All of these

Random access memories are useful in applications where 1.


Data consists of numbers
2.
Short access time is required
3.
Each stored word is processed
differently
4.
Data naturally needs to flow in and
out in serial form

Queues serve a major role in 1.


Simulation of recursion
2.
Simulation of arbitrary linked list
3.
Simulation of limited resource
allocation
4.
All of these

Program always deals with ____________ 1.


logical address
2.
absolute address
3.
physical address
4.
relative address

109
Prims algorithm is based on 1.
Divide and conquer method
2.
Dynamic programming
3.
Greedy method
4.
Branch and bound

Plan-driven process is a process where all the activities are planned first 1.
and the progress is measured against the plan is Agile Process Model
2.
Waterfall Process Model
3.
Prototyping Process Model
4.
RAD Process Model

Pharming is an attack which referred to 1.


Collecting social data from
victim device
2.
Installing any software or
app in victim device
3.
Attacking victim device
4.
Attacking victim social
network

Persons who can influence others and who possess managerial 1.


authority are termed entrepreneurs
________. 2.
leaders
3.
managers
4.
visionaries

110
Periodically adding, changing and deleting file records is called as File? 1.
Updating
2.
Upgrading
3.
Reconstructing
4.
Renewing

Parallel computing means doing several tasks simultaneously thus improving the 1.
performance of the _____. Data system
2.
Computer system
3.
Memory
4.
Vector system

Page fault occurs when the referenced page is 1.


not in main memory
2.
not in secondary
memory
3.
not in tertiary memory
4.
not in shared memory

overflow condition was raised by the stack, which of the condition holds false 1.
maximum limit
exceeds
2.
top of the stack is
reached
3.
limited stack size
4.
none of these

111
Output will be 1.
100 100
#include<stdio.h>
2.
int myFunction(int parameter)
100 200
{
3.
return parameter; Error
} 4.
Warning during
main(){
compilation
int value=100;
printf("%d %d", myFunction(value), myFunction(value+100));
}

Output will be 1.
1
#include<stdio.h>
2.
#include<string.h>
-1
main(){
3.
char Be[16]="Positive "; 0
char Positive[16]="Positive "; 4.
Error
printf("%d",strcmp(Be,Positive) ); }

Output of the given code will be 1.


1
#include<stdio.h>
2.
#include<string.h>
-1
main(){
3.
char Be[16]="Positive "; 0
char Positive[16]="positive "; 4.
Error
printf("%d",strcmp(Be,Positive) ); }

112
Output of the following code will be 1.
11
#include<stdio.h>
2.
int myFunction()
12
{
3.
return 1; 22
} 4.
Error
int myFunction(int a)
{
return 2;
}
main(){
printf("%d %d", myFunction(), myFunction(1));
}

Operating System maintains the page table for 1.


each process
2.
each thread
3.
each instruction
4.
each address

Open mail relays are 1.


Mail user agent
2.
Mail transfer agent
3.
Mail delivers agent
4.
Internet mail
extension

113
Only one external reference is required for 1.
Linear linked
list
2.
Circular linked
list
3.
Double ended
list
4.
None of these

Nusrat sees her role as someone who provides direction and resources for her team then 1.
gets autocratic
out of their way and lets them do their work however they think best. Nusrat uses the 2.
________ participative
style of leadership. 3.
democratic
4.
laissez-faire

Non-type template parameters provide the ability to pass what type of data at 1.
int
compile time
2.
float
3.
constant
expression
4.
none of the
mentioned

Non-type parameters are mainly used for specifying _____ values or any 1.
max and
other constant value for a particular instance of a template.
min
2.
max or min
3.
min
4.
max

114
Nesting of try block is ………….. 1.
syntax error
2.
possible in
C++
3.
logical error
4.
both (a) and (c)

Nesting of catch block is …………… 1.


syntax error
2.
possible in C++
3.
logical error
4.
None of the
above

Negative cash flow is one of the classification when desired rate of return is minimum by 1.
actual rate of return True
2.
False
3. 4.

Narrow span of control results into 1.


Tall
structure
2.
Flat
structure
3.
Mechanistic
structure
4.
All the
above

115
N Ach, N Aff and N Pow are related 1.
McClelland’s
Learned Needs
2.
ERG theory
3.
Justice
Theory
4.
Equity theory

Multivalued attribute Example 1.


Student Name
2.
Student
address
3.
Student Phone
number
4.
Student Id
number

Minnesota Multi-phasic Personality Inventory (MMPI) is used to assess 1.


Attitude
2.
Personality
3.
Work engagement
4.
Wellbeing

Memory management technique in which system stores and retrieves data from secondary 1.
storage for use in main memory is called fragmentation
2.
paging
3.
mapping
4.
spooling

116
Memory Address locations are specified using which data representation? 1.
Sign-magnitude
2.
one`s complement
3.
Unsigned
4.
two`s complement

McKinsky’s 7S framework doesn’t include: 1.


System
2.
Shared value
3.
Share holders
4.
Staff

MBTI is used to measure 1.


Attitude
2.
Behaviour
3.
Personality
4.
Response

Max Weber belongs to which school of Management thought? 1.


Scientific
2.
Administrative
3.
Bureaucratic
4.
Human relations

117
Match the following: 1.
i-a ii-b iii-c
i. Breadth-first search a. Heap
2.
ii. Depth-first search b. Stack
i-c ii-b iii-a
iii. Sorting c. Queue
3.
i-c ii-a iii-b
4.
i-a ii-b iii-c

Match the following elements of organisation with their characteristics 1.


A) 1. Strategic apex ----- A. Decentralised and professional bureaucracy B) 2. 1-B, 2-C, 3-D, 4-E,
Techno - structure ------ B. Centralised and Simple structure C) 3. Middle line ------ C. 5-A
Dominant standardisation and machine bureaucracy D) 4. Support staff ------ D. Autonomy
2.
and Divisional structure E) 5. Operating core ------- E. Mutual adjustments and machine
1-C, 2-B, 3-E, 4-D,
bureaucracy
5-A
3.
1-E, 2-C, 3-B, 4-A,
5-D
4.
1-B, 2-A, 3-E, 4-C,
5-D

Management as a process refers to __________ 1.


Group of
managers
2.
Functions of
management
3.
Subject of
management
4.
All of these

118
Management as a Noun refers to __________ 1.
Group of
managers
2.
Functions of
management
3.
Subject of
management
4.
All of these

Magnetic tape is a 1.
serial access
medium
2.
Random access
medium
3.
A parallel access
medium
4.
NONE

LSD stands for ________________ 1.


Lean Software
Development
2.
Live Software
Development
3.
Less Software
Data
4.
Least Software
Data loss

119
Lower and upper limits are present in which chart ? 1.
Run chart
2.
Bar chart
3.
Control chart
4.
None of the
mentioned

Logical memory is broken into blocks of the same size called ________ 1.
frames
2.
pages
3.
backing store
4.
registers

Linked list uses 1.


Random memory
allocation
2.
Static memory
allocation
3.
Fixed memory
allocation
4.
Dynamic
memory
allocation

Like normal parameters, we can specify _____arguments to templates. 1.


Default
2.
Function
3.
Class
4.
None

120
Let w be a string and separated by three variable m, n, and o as per pumping lemma for 1.
regular language. What does these variables represent? string

2.
string count

3.
string and string
count

4.
none

Let the initial value of count be 5. What will be the final value of count if the instructions 1.
are executed in the following order: 50
S1;T1;S2;T2;S3;T3. 2.
25
Process P0:
3.
{
10
S1: register1=count;
4.
S2: register1=register1 - 5 0
S3: count=register1
}
Process P1:
{
T1: register2=count;
T2: register2=register2 X 5
T3: count=register2
}

121
Let the initial value of count be 10. What will be the final value of count if the 1.
instructions are executed in the following order: 50
S1;T1;S2;T2;S3;T3. 2.
Process P0: 20
{ 3.

S1: register1=count;
10

S2: register1=register1 - 5 4.
1
S3: count=register1
}
Process P1:
{
T1: register2=count;
T2: register2=register2 X 5
T3: count=register2
}

Let int arr[4]={0,1,2,3}. Which of the following are valid operations? 1.


a. I and II
I. arr++
2.
II. ++arr
a. III
III. arr+4
3.
IV. arr*4 a. IV
4.
a. All

Legitimate power is based on the subordinate's perception that the leader has a right to 1.
exercise role or position
within the
influence because of the leader’s
organisation.
2.
expertise and
knowledge.
3.
personal
characteristics
and personality.
4.
ability to punish
or reward.

122
Left linear grammars are ...... of CFG 1.
Power set
2.
Sub set
3.
Super set
4.
Nullable

Lean philosophy regards everything not adding value to the customer as __________ 1.
Unnecessary
2.
Waste
3.
Useful
4.
Necessary

Lean Development follows the principle of ______________ 1.


Decide as late as
possible
2.
Deliver as late as
possible
3.
Decide as early
as possible
4.
Not building
integrity

Leadership is the process whose important ingredient is the _____________ exercised by 1.


the friendship
leaders on the group members. 2.
loyalty
3.
trust
4.
influence

123
Leadership has a lot of characteristics, and a leader must not maintain this trait in his 1.
co-existence
behaviour:
2.
taking
responsibility
3.
avoiding
responsibility
4.
All the other
answers are
correct

Leaders that focus on the individuality and personality needs of their employees and 1.
job-centred
emphasize building good interpersonal relationships are:
2.
laissez-faire
3.
employee-oriente
d
4.
task-oriented

Leaders that focus on production and the job’s technical aspects are: 1.
job-centred
2.
laissez-faire
3.
general
4.
autocratic

Lakshan sends an encrypted message to Ruhan but it is intercepted by Tanish. Tanish 1.


Confidentiality
cannot read it but forwards it on to Ruhan from an anonymous address she controls. Which

precept of the CIA Triad would have been violated? 2.


Integrity

3.
Availability

4.
Authentication

124
Keerthana solicits input from her subordinates before making decisions that will affect 1.
them. autocratic
She often praises them for good work and gently offers suggestions to improve their 2.
participative
performance. Keerthana uses the ________ style of leadership.
3.
democratic
4.
supportive

Kalam Enterprises recently fired two employees who were caught stealing tools 1.
from the What behaviour is
expected of Kalam
firm's warehouse. As a result, the CEO of Kalam wants to strengthen the firm's
employees?
ethical culture
2.
and prevent future violations by redesigning the firm's ethics program. Which of
What is the opinion of
the following
stakeholders
questions is the LEAST relevant when developing Kalam's new ethics regarding Kalam's
program? ethics?
3.
How are ethical
situations
communicated and
resolved at Kalam?
4.
What is the process for
Kalam establishing
a corporate giving
program?

Josephus problem is a best example of 1.


Singly linked list
2.
Doubly linked list
3.
Circular linked list
4.
All of these

125
It is through ______________ that group members can be inspired, motivated, 1.
and guided to be fellowship
successful and productive. 2.
sportsmanship
3.
coercion
4.
leadership

It is possible to use more than one generic data type in a class 1.


.
template, and each generic data type is separated by the ___.
2.
, (Comma)
3.
;
4.
""

It is often difficult to estimate size at an early stage in a project when only a 1.


specification is available True
2.
False
3. 4.

it is necessary for a programming language that it must support 1.


encapsulation,
all these_____ features completely to become a pure
inheritance, and
Object-Oriented Language.
polymorphism
2.
encapsulation and
polymorphism
3.
Inheritance, and
polymorphism
4.
Encapsulation and
inheritance

126
is a placeholder name which will be determined when the class is 1.

instantiated. Ttype
2.
type
3.
Type
4.
None

Internal premises in planning doesn’t include 1.


Money
2.
Materials
3.
Machines
4.
Competitors strategy

Interaction Diagram 1.
class + Object
2.
state + Activity
3.
component + Deployment
4.
Sequence + collaboration

int main(){fork();fork();fork();fork();exit(0);printf(“hello”);}How many “hello” 1.


messages will be printed if the following program is executed? 16
2.
8
3.
4
4.
0

127
Institute of Electrical and Electronics Engineers (IEEE) is the 1.

largest international professional group. What are the standards Computing,


communication, electrical
developed by this organization?
engineering, and
electronics
2.
Communication, electrical
engineering, and
electronics
3.
Electrical engineering and
electronics
4.
Electrical engineering and
computing

1.
Information security is the protection of data.
Information will be protected mainly based on Its sensitivity to the
company
2.
Its confidentiality
3.
Its value
4.
All the above

Independent testers are _____________ and identify different defects at the 1.


same time. Isolated
2.
Biased
3.
Unbiased
4.
Modular

128
In working with his employees, Rahman involves them in decision making 1.
and encourages them to participate in deciding their work methods and autocratic
goals. Rahman’s leadership style can best be described as ________.
2.
laissez-faire
3.
democratic
4.
participative

In which cache organization, index field is not required during block 1.


identification Direct mapping
2.
set associative
3.
2-way associative
4.
fully associative

In which attack, text messages (other than email) are 1.

used for hacking personal information? Phishing


2.
Moshing
3.
Vishing
4.
Smishing

In which attack, phone calls are used for hacking 1.

personal information? Phishing


2.
Moshing
3.
Vishing
4.
Smishing

In which attack, email is used for hacking personal 1.

information? Phishing
2.
Moshing
3.
Vishing
4.
Smishing

129
In this type of culture the behaviour of individuals are shaped by tradition, 1.
loyalty, personal commitment, extensive socialization and self-management Clan
2.
Market
3.
Entrepreneurial
4.
Bureaucratic

In this type of topology data travels only in one direction 1.


Bus
2.
Ring
3.
Star
4.
Mesh

In the segment table the segment base contains the ____________ 1.


starting logical address of
the process
2.
starting physical address
of the segment in the
memory
3.
segment offset
4.
segment length

In the linked list, each node contains a minimum of two fields. One field is the data 1.
field to store the data second field is? Pointer to character
2.
Pointer to integer
3.
Pointer to node
4.
Node

130
In the graph traversing, Stack is useful for which searching algorithm? 1.
Depth first search
2.
Breadth first search
3.
In-order search
4.
Pre-order search

In the below function “factorial”, all automatic variables are stored in 1.


Array
#include <stdio.h>
2.
int factorial(int i) {
Register
if(i <= 1) {
3.
return 1; Stack
} 4.
Queue
return i * factorial(i - 1);
}
main() {
printf("%d",factorial(5));
}

In synchronous TDM, for n signal sources of the same data rate, each frame 1.
contains _______ slots. n+1
2.
n-1
3.
0 to n
4.
n

In segmentation technique, each address is specified by ____________ 1.


an offset and value
2.
a value and segment
number
3.
a key and value
4.
a segment number and
offset

131
In regular language pumping lemma, w= mn^io belongs to L then i ranges from? 1.
i>=0
2.
i<=0
3.
i>=1
4.
i<0

In Mintzberg’s management roles, the role that evaluate the performance of 1.


managers in different functions is called Liaison
2.
Figurehead
3.
Monitor
4.
Disseminator

In Mintzberg’s management roles, the role that describes ethical guidelines and the 1.
principles of behavior employees are to follow in their dealings with customers and Liaison
suppliers is
2.
Figurehead
3.
Monitor
4.
Disseminator

In Mintzberg’s management roles, the role that coordinates between different 1.


departments and establish alliances between different organizations, is termed as Liaison
2.
Figurehead
3.
Monitor
4.
Disseminator

132
In memory management , a technique called as paging, physical 1.
memory is broken into fixed-sized blocks called ___________. Pages
2.
Frames
3.
Blocks
4.
Segments

In interactive environments such as time-sharing systems, 1.


the primary requirement is to provide reasonably good Shortest Remaining Time Next
response time and in general, to share system resources (SRTN) Scheduling
equitably. In such situations, the scheduling algorithm that 2.
is most popularly applied is ________. Priority Based Preemptive
Scheduling
3.
Round Robin Scheduling
4.
None of the above

In India, whose law governs data privacy and information 1.


technology? Banking Regulation Act 1949
2.
IT Act 2000
3.
Indian Penal Code
4.
IT (amendment) Act 2008

In hospitals, the following type of departmentalisation is common - 1.


By function
2.
By committee
3.
By geographical region
4.
All of the above

133
In his speech the previous day, the new CEO had discussed his 1.
experience in the industry and his education. Haripriya thought that trait
the new CEO would do a great job given these characteristics,
2.
coupled with his good oratory skills and the fact that he just looked
behavioural
like a CEO. Haripriya realized that she had been judging the new
CEO in a manner consistent with the ________ theories of 3.
leadership. contingency
4.
situational

In FIFO page replacement algorithm, when a page must be replaced 1.


oldest page is chosen
2.
newest page is chosen
3.
random page is chosen
4.
first page is chosen

In expectancy theory, the belief that effort will lead to performance is 1.


termed as Expectancy
2.
Instrumentality
3.
Valence
4.
Values

In contiguous allocation _____________ 1.each file must occupy a set of


contiguous blocks on the disk
2.each file is a linked list of disk blocks
3.all the pointers to scattered blocks are
placed together in one location 4.none
of the mentioned

In CIA Triad, CIA refers to .... 1.


Confidentiality, Integrity and
Authentication
2.
Confidentiality, Integrity and
Availability
3.
Confidentiality, Integrity and
Accessibility
4.

134
Confidentiality, Integrity and
Authorization

In Big Five Personality dimensions, a person’s range of interest in 1.


new things. Open people are creative, curious, and artistically Conscientiousness
sensitive, as opposed to being closed-minded is called as
2.
Extraversion–Introversion
3.
Agreeableness
4.
Openness to Experience

In Big Five Personality dimensions, the hardworking, diligent, organized, dependable, and 1.
persistent behavior of a person is termed as Conscientiousn
ess
2.
Extraversion
–Introversio
n
3.
Agreeableness
4.
Emotional
Stability

In an optical fiber, the inner core is _________ the cladding. 1.


less dense
than
2.
denser than
3.
the same
density as
4.
another name
for

135
In an inverted page table scheme 1.
One page table
is used in a
system

2.
One page table
for each
process is used
in a system

3.
One page table
for each file is
used in a
system
4.
One page table
for each
program is
used in a
system

In ABC University, there are several ‘Departments’ including Computer 1.


Participation of
Science, Information Technology, Mechanical, Civil, Finance and department in
Maintenance. Some departments have students and some are not. If student

department and student are entity sets in this university database and 2.
Participation of
they are linked through a relationship named DS, which among the
department in
following is a partial participation? DS
3.
Participation of
student in
department
4.
Participation of
student in DS

136
In a time sharing scheduling algorithm which of the data structure is used? 1.
Stack
2.
Queue
3.
Linked list
4.
Circular queue

In a stack, the command to access an nth element from the top of the stack s will be 1.
S[Top –n]
2.
S[Top +n]
3.
S[top-n-1]
4.
None of the
option

In a Segmentation scheme, given the logical address (4, 50) and the corresponding base 1.
address in the segment table as 5000, what is the physical address mapped to the given 0050
logical address?
2.
4050
3.
5050
4.
4000

In a reactive approach, the bulk of the test design work begins __________ 1.
Before any
software is
made
2.
After some
modules are
completed
3.
After every
module, testing
is done
4.
After the
software has
been produced

137
In a Paging scheme with page sizes of 1K, given the logical address (2, 35) and the 1.
corresponding frame number in the page table as 4, what is the physical address mapped to 5131
the given logical address?
2.
2030
3.
2083
4.
4131

In a Page replacement algorithm, which of the following type of page is the best page to 1.
replace. not recently
used but
modified
2.
recently used
but clean
3.
neither recently
used nor
modified
4.
recently used
and modified

In a circular queue, the value of r will be 1.


r=r+1
2.
r=(r+1)%[queue_
size-1]
3.
r=(r+1)%queue_s
ize
4.
r=(r-1)%queue_si
ze

In ___________ each component at lower hierarchy is tested individually and then the 1.
components that rely upon these components are tested. Top down testing
2.
Unit testing
3.
Bottom up
4.

138
Load testing

In _______ transmission, the channel capacity is shared by both communicating devices at 1.


all times. simplex
2.
half-duplex
3.
full-duplex
4.
half-simplex

In MAC Tuples ,Process can read object when: Object MAC range (lr, hr); 1.

process MAC label pl pl ⅀ (lr, hr)


2.
pl U (lr, hr)
3.
pl ∈ (lr, hr)
4.
pl dom hr

Imposing a total ordering of all resource types, and ensuring process requests 1.
resources in an increasing order of enumeration voilates the _______________ Mut
condition for deadlock ual
excl
usi
on
2.
Hol
d
and
Wai
t
3.
Circ
ular
Wai
t
4.
No
Pre
em
ptio
n

139
If there is a unique LMD , the grammar is 1.
ambiguous
2.
un ambiguous
3.
LLG
4.
RLG

If there is a complete DFA M1 recognizing a language L1 and has m states out of which 1.
two are final states then the machine M recognizing L1 complement will have m
_____________ final states.
2.
m+2

3.
2

4.
m-2

If the stringent regulations on the operational procedures exist, the project is considered as 1.
Semi -detached True
2.
False
3. 4.

If the data transfers are done asynchronously, which of the data structure is possible? 1.
Stack
2.
Queue
3.
Linked list
4.
All of these

140
If the characters 'D' 'C' 'B' 'A' are placed in a queue (in that order), and then removed one at 1.
a time, in what order will they be removed? DCAB
2.
ABCD
3.
ABDC
4.
DCBA

R is a regular language and M is a finite language then L U 1.


M must be regular language True
2.
False
3.
Can't determined
4.
Neither True and Nor False

If M1 machine recognizing L with n states, then M2 1.


recognizing L* constructed Using Thompson construction n-1
will have ------------- states.
2.
n+2

3.
n+1
4.
n

If L1 and L2 are languages such that L2, L1L2, and L2L1 1.


are all regular, then L1 must be regular. True
2.
False
3.
Can't determined
4.
Neither True and Nor False

141
If L1 and L2 are CFL and R a regular set, one of the 1.
languages below is not necessarily a CFL. which one? L1nL2
2.
L1nR

3.
L1L2

4.
L1UL2

If an item is referenced once, then it again be referenced 1.


soon; given statement is stated by Temporary locality
2.
Spatial locality
3.
Temporal locality
4.
Spectral Locality

1.
If a selection sort algorithm in the worst
case is taking 20sec for processing an 256
2.
array of size 32. Which of the following is
512
close to the maximum input size that can
3.
be solved in 5 minutes?
1024
4.
128

If a problem can be broken into subproblems that are 1.


reused several times Overlapping subproblems
2.
Optimal substructure
3.
Memoization
4.
Greedy

142
Identity and Access Management (IdAM) 1.

is for ... Storing multiple passwords


2.
Protecting multiple data
3.
Providing Data Leakage Prevention
4.
Providing Data Leakage in cloud

Identify which one feature explains Indian Ethos. 1.


Belief in Ego Assertion.
2.
Spirit of Sacrifice and Self Control
3.
Emphasis on Individual Achievement
4.
Your Status defines your Character

Identify the organisational risk from the following 1.Software components which should be reused
contain defects which limit their functionality
2.Required training for staff is not available
3.Customers fail to understand the impact of
requirements changes 4.None in the list

Identify the model which is not coming under the four 1.


Discretionary
categories of access control models? 2.
Mandatory
3.
Role-based
4.
Delegated

Human Relations School is related to 1.


Elton Mayo
2.
Henry Fayol
3.
F W Taylor
4.
Max Weber

143
How often should your data be backed up? 1.
In accordance with your
organization’s backup policy
2.
Once a fortnight.
3.
Once a month.
4.
Once a week.

How many “SCOPE”s are printed?, how many “SCOPE”s are printed by 1.
only child processes? 5,2
int main() 2.
5,3
{
3.
if(fork() || fork())
5,4
fork();
4.
printf("SCOPE"); 5,1
}

How many “SCOPE”s are printed?, how many “SCOPE”s are printed by 1.
only child processes? 5,2
int main() 2.
5,3
{
3.
if(fork() && fork())
5,4
fork();
4.
printf("SCOPE"); 5,1
}
Answer is 4,3 according to me

144
How many “hello” messages will be printed if the following program is 1.
executed? 2
int main() 2.
3
{
3.
pid_t p;
1
fork();
4.
if (p >0) 4
{
fork();
fork();
}
if (p==0)
{
fork();
fork();
exit(0);
}
printf(“hello”);
}

145
How many “hello” messages will be printed if the following program is 1.
executed? 1
int main() 2.
3
{
3.
pid_t p;
0
fork();
4.
if (p >0) 4
{
fork();
fork();
exit(0);
}
if (p==0)
{
fork();
fork();
exit(0);
}
printf(“hello”);
}

How many undirected graphs (not necessarily connected) can be constructed 1.


out of a given set V = {v1, v2, ... vn} of n vertices? n(n-1)/2
2.
2^n
3.
2n!
4.
2^(n(n-1)/2)

How many principles of the Data Protection Act are there? 1.


8
2.
5
3.
6
4.
7

146
How many minimum no of stack is required for the runtime executable script 1.
1
2.
2
3.
3
4.
4

How many address lines are needed to address each memory locations in a 1.
2048 x 4 memory chip? 10
2.
12
3.
11
4.
8

How many rounds are there in DES? 1.


15
2.
8
3.
64
4.
16

How does your personal computer (end device/host) 1.


recognize its IP address and the Gateway IP address to use A. DNS (Domain
for transmitting packets to remote hosts without any manual Name System)
2.
configuration when you connect it to the internet?
A. ARP (Address
Resolution
Protocol)
3.
A. DHCP (Dynamic
Host
Configuration
Protocol)
4.
A. FTP (File transfer
protocol)

147
Hospitals, banks, and supermarkets are all linked using which 1.
WAN
network type?
2.
LAN
3.
BUS
4.
WiFi

Hofstede’s framework is regarding 1.


Personality
2.
Culture
3.
Perception
4.
Stereotype

Hit-rate of the processor is the memory fraction, found in 1.


DRAM
2.
SRAM
3.
Magnetic disk
4.
Cache

Hiding internal data from the outside world and accessing it 1.


inheritance
only through publicly exposed methods is known as data
2.
polymorphism

3.
abstraction

4.
encapsulation

148
Harsha Electronics has used several methods to create an ethical culture that 1.
both asking job candidates
ethical questions
employees and customers appreciate. What is the most effective way for the firm
to sustain its 2.
implementing an ethics
ethical culture?
audit regularly
3.
publishing the firm's
code of ethics
periodically
4.
ensuring that new
employees receive
ethics training

Hardware, Personnel ,Facility are not the factors of Cost 1.


True
2.
False
3. 4.

Hardware unavailability risk is the _________ type of risk 1.Project 2.Product


3.Business 4.None in the
list

Hardware solution to the critical section problem using test&set 1.


Implements
while (true) {
mutual
while ( TestAndSet (&lock )); /* do nothing exclusion and
progress
// critical section
2.
lock = FALSE;
Implements
// remainder section only mutual
exclusion
}
3.
Implements
progress and
bounded
waiting.
4.
Implements
mutual
exclusion and
bounded
waiting.

149
Hardware solution to the critical section problem using swap: 1.
Implements
while(true)
mutual
{key = TRUE; exclusion and
progress
while(key==TRUE)
2.
Swap(&lock,&key);
Implements
//critical sectionlock = FALSE; only mutual
exclusion
//remainder section}
3.
Implements
progress and
bounded
waiting.
4.
Implements
mutual
exclusion and
bounded
waiting.

Guess the output. 1.


Be
#include<stdio.h>
2.
#include<string.h>
Positive
main(){
3.
char Be[16]="Positive "; Positive Be
char Positive[16]="Be "; 4.
Be Positive
strcat(Be,Positive);

printf("%s",Be ); }

Guess the output 1.


100
#include<stdio.h>
2.
main(){
200
int value=100;
3.
myFunction(value); 100 200
} 4.
Error
void myFunction(int parameter)
{
parameter=200;
printf("%d", parameter);
}

150
Guess the output 1.
200
#include<stdio.h>
2.
main(){
100
int a=100;
3.
int b=200; a. Address of variable a
int c[1][2][3]={&a}; 4.
a. Address of variable b
c[1][1][1]=&b;
printf("%d",c[1][1][1]);
}

Guess the output of the following 1.


Error
#include
2.
main(){
4
typedef char arr[4];
3.
arr arr1[4]; 44
printf("%d",sizeof(arr1)); 4.
16
}

Guess the output of the below code 1.


100 100
#include<stdio.h>
2.
int myFunction1(int parameter)
101 100
{
3.
return parameter; 100 101
} 4.
101 101
int myFunction2(int *parameter)
{
return ++*parameter;
}
main(){
int value=100;
printf("%d %d", myFunction1(value), myFunction2(&value));
}

151
Greetwell Technologies wants to gain the confidence of employees and 1.
customers by developing placing the code of
ethics on the firm's
a strong ethical culture. Which of the following methods would be the best way
intranet
for the firm's HR
2.
department to accomplish this goal?
posting the code of
ethics in the breakroom
3.
providing ethics training
to employees
4.
having employees sign
ethics contracts

Given grammar G as follows: 1.


regular and context-free
G { S --> aB |
B --> Sb }
2.
This grammar is
not regular and not
context-free

3.
regular, but not context-free
4.
context-free, but not regular

Given five memory partitions of 200Kb, 500Kb, 200Kb, 300Kb, 600Kb (in 1.
order), which algorithm would be able to successfully place the following Best Fit
processes of 212 Kb, 417 Kb, 112 Kb, and 126 Kb?
2.
Worst Fit
3.
First Fit
4.
All the given
choices.

152
Given five memory partitions of 100Kb, 500Kb, 200Kb, 300Kb, 600Kb (in 1.
order), which algorithm would be able to successfully place the following Best Fit
processes of 212 Kb, 417 Kb, 112 Kb, and 426 Kb?
2.
Worst Fit
3.
First Fit
4.
All the given
choices.

Given an arbitrary non-deterministic finite automaton (NFA). with N states, the 1.


maximum number of states in an equivalent minimized DFA is at least. 2N

2.
N!

3.
2^N
4.
N^2

Generic functions perform ____ operation for all the versions of a 1.


A. Different
function except the data type differs
2.
A. Same
3.
A. Similar
4.
A. None

Frustration-Regression is related to 1.
Maslow’s Hierarchy
2.
ERG theory
3.
Justice Theory
4.
Equity theory

153
Frames from one LAN can be transmitted to another LAN via the device 1.
Router
2.
Bridge
3.
Repeater
4.
Modem

Frames from one LAN can be transmitted to another LAN via the device 1.
Router
2.
Bridge
3.
Repeater
4.
Modem

For every pair of regular expressions r and s, the languages denoted by r(sr)* and 1.
(rs)*r are the same. True
2.
False
3.
Can't determined
4.
Neither True and Nor
False

For every ....grammar there is equivalent grammar for the same language which is 1.
..... ambiguous grammar,
un ambiguous
grammar
2.
un ambiguous
grammar, ambiguous
grammar
3.
ambiguous grammar,
ambiguous grammar
4.

154
un ambiguous
grammar, un
ambiguous grammar

For declaring function templates, __ arguments in template 1.


all
declaration must be generic (class T).
2.
Any one
3.
One
4.
none

For declaring class templates, ___ of the arguments in template 1.


Some
declaration may be non-generic ordinary data types.
2.
all
3.
None of the
argument
4.
One

For any two functions g(n) and f(n), f(n) = Q(g(n)) iff 1.
f(n) = O(g(n)) and f(n) =
W(g(n))
2.
f(n) > O(g(n)) and f(n) =
W(g(n))
3.
f(n) = O(g(n)) and f(n)
=>W(g(n))
4.
None of these

155
Finite automata recognizes --------grammars 1.
type-3
2.
type-1
3.
type-2
4.
type-0

Finite automata --------------- memory 1.


Infinite

2.
No auxiliary memory

3.
Finite

4.
auxiliary memory

Find the shortest path from the root to a given node v. Which algorithm 1.
would one use to find this shortest path? DFS
2.
BFS
3.
Either BFS or DFS
4.
The statement is incomplete

Find the correct syntax of throw statement: 1.


throw (exception);
2.
throw exception;
3.
throw;
4.
All of the above

156
Find the correct statement(s) 1.
(i). A try block can throw an exception using “throw” only (i)

(ii). A catch block always catch and handle the exception and never ever 2.
throws the exception. only (i) and (iii)
(iii). A catch also sometimes throws the exception using “throw” 3.
only (ii) and (iii)
4.
(i), (ii) and (iii)

Find out the true statement(s) from the following: 1.


(i). Virtual constructors are not at all possible. (i) and (ii) only

(ii). It is possible to have virtual destructor without virtual constructors. 2.


(i) only
(iii). Both virtual constructors and virtual destructors are not possible in C++.
3.
(iv). Only Virtual constructors are allowed; but not virtual destructors.
(iii) only
4.
(iv) only

Find out the incorrect statement(s). 1.


(i) and (ii) only
(i). There are only predefined exception handling mechanism available in
C++ 2.
(ii). User-defined exception handling is possible in C++ (i) only

(iii). Both (i) and (ii) is possible in C++ 3.


(iii) only
4.
None of the above

Find out the incorrect statement(s) 1.


(ii) and (iii) only
(i). pure virtual functions should be defined in derived class.
2.
(ii). virtual function concept can be implemented even without inheritance.
(i) and (iii) only
(iii). the keyword “virtual” prevents compile-time binding
3.
(iii) only
4.
(ii) only

157
F.W. Taylor has done the following studies for improving the production 1.
process: Time Study, Fatigue Study and
Fatal Study.
2.
Time Study, Motion Study and
Fatal Study.
3.
Time Study, Motion Study and
Fatigue Study.
4.
Time Study, Motivation Study
and Fatigue Study.

Exhaustive testing is__________________? 1.


always possible
2.
practically possible
3.
impractical but possible
4.
impractical and impossible

Executives and managers at ABC Enterprises actively encourage a 1.


strong ethical culture at increased employee interest in
development programs
the firm. Which of the following would be the most likely result of the
firm's actions? 2.
frequent use of human resource
information systems
3.
changes in corporate
communication methods
4.
improvements in organizational
performance

Exceptions are…….. 1.
Syntax error
2.
Logic error
3.
Compile time error
4.

158
Run time error

Exception handling is the correlation between ………………… 1.


try and catch block
2.
retry and recatch block
3.
both (a) and (b)
4.
Neither (a) nor (b)

Example for Associative type of memory 1.


Main Memory
2.
Cache Memory
3.
Magnetic
4.
Optical

Every weak entity set can b 1.


Using generalization
2.
Adding appropriate attributes
3.
Using aggregation
4.
None of the above

Every context free language is context sensitive language 1.


True
2.
False
3.
nothing
4.
True and False

159
Event based modelling in UML 1.
Activity Diagram
2.
State Diagram
3.
Class Diagram
4.
Object Diagram

Evaluate the following prefix expression * - + 4 3 5 / + 2 4 3 1.


8
2.
4
3.
1
4.
None

Evaluate the following postfix expression 1 4 1 8 6 / 3 + + 5 / + 1.


2
2.
8
3.
3
4.
None

Ethics training should ________. 1.


start at the bottom and move
upward through all organizational
levels.
2.
focus only on the employees who
deal with the public on a
day-to-day basis.
3.
begin at the top and continue
through all levels of the
organization.
4.
start with mid-level management
and move laterally through the
organization.

160
Esprit de corps refers to 1.
Team work and cooperation
2.
A Single Boss
3.
Flexibility
4.
None of these

Environmental protection can best be done by the efforts of 1.


____________. business people.
2.
the scientists.
3.
the government.
4.
all the people.

Ensuring processes request resources only if all resources are 1.


available in the system, violates the _______________ condition Mutual exclusion
of deadlock
2.
Hold and Wait
3.
Circular Wait
4.
No Preemption

End-to-end connectivity is provided from host-to-host in: 1.


Network layer
2.
Session layer
3.
Transport layer
4.
Datalink layer

161
Empty stack top pointer indicates to 1.
Last memory location
2.
Set to 1
3.
Set to -1
4.
Beginning of memory location

Effort is mostly used to estimate______________ 1.


Project resource costs
2.
Project duration
3.
Remaining calendar time
4.
Contingencies

Effort Adjustment Factor is the product of effort multipliers of all 1.


the_________attributes 11
2.
12
3.
14
4.
15

Effective access time is directly proportional to ____________ 1.


page read/write time
2.
hit ratio
3.
memory access time
4.
page-fault rate

162
Early research on leadership traits ________. 1.
sought to prove that charisma was
an essential trait of leadership
2.
focused on behavioural traits
rather than physical traits of a
leader
3.
found consistent and unique traits
that would apply to all effective
leaders
4.
focused on characteristics that
might differentiate leaders from
non-leaders

EA stands for______. 1.
Effective add
2.
Effective absolute
3.
Effective address
4.
End address

Dynamic growing stack finds the 1.


solution with the help of Array implementation
2.
Pointer implementation
3.
Linked list implementation
4.
All of these

During the ______ design phase of 1.


database design, the properties of conceptual
data is given importance, rather than
2.
its storage details
logical
3.
physical
4.
actual

163
DSDM stands for _____________ 1.
Dynamic systems development method
2.
Dynamic solutions development method
3.
Database systems development method
4.
Database solutions development method

Draw up plans to avoid or minimise 1.Risk identification 2.Risk analysis 3.Risk planning 4.Risk monitoring
the effects of the risk is called
____________

Double Diamond representation in 1.


ER diagram weak Entity Set
2.
Total Participation
3.
Strong Entity Set
4.
Complete Entity Set

Does an algorithm solve the all-pair 1.


shortest path problem? Floyd’s algorithm
2.
Prim’s algorithm
3.
Dijkstra’s algorithm
4.
Warshall’s algorithm

Do vertices dominate over vertex 6 1.


in the given graph? 1,2,4,5
2.
0,1,2,4,7
3.
1,3,4,5,7
4.
0,1,2,3,4,5

164
Disk scheduling policies results in 1.
minimum amount of head FCFS
movement.

2.
Circular SCAN

3.
Elevator

4.

CSCAN

Disk Response Time is... 1.the average of time spent by a request waiting to perform its I/O
operation. 2.the time taken to locate the disk arm to a specified track
where the data is to be read or write. 3.the time taken by the desired
sector of disk to rotate into a position so that it can access the
read/write heads. 4.the time taken to complete the execution.

Dialogue control and Token management are responsibility of which OSI Layer 1.
session layer
2.
network layer
3.
transport layer
4.
data link layer

Design techniques which one is used to finding all the pairs of shortest distances in a 1.
graph? Backtracking
2.
Greedy
3.
Dynamic
programming
4.
Divide and Conquer

165
Departmentalization is a process in which 1.
Tasks are grouped
into jobs
2.
Jobs are grouped
into effective work
groups
3.
Work groups are
grouped into
identifiable segments
4.
All the other answers
are correct

Definition of a language L with alphabet {a} is given as following. L= { a^nk | k > 0, and 1.
n is a positive integer constant} What is the minimum number of states needed in a 2^n+1
DFA to recognize L

2.
n+1

3.
k+1
4.
2^k+1

Decision table technique is sometimes also referred to as a ________ table. 1.


Cause-effect
2.
Redundant
3.
Extreme
4.
Isolated

Databases overall structure is maintained in a file called 1.


Redolog File
2.
Data file
3.
Control file
4.
All

166
Data on someone's racial or ethnic heritage, political, philosophical, or religious beliefs, 1.
union affiliation, and health or sex life and sexual orientation, either directly or indirectly. Direct personal data
What kind of personal information is this?
2.
Indirect personal data
3.
Pseudonymized data
4.
Special category
personal data

CPU fetches the instruction from memory according to the value of ____________ 1.
program counter
2.
status register
3.
instruction register
4.
program status word

Correct relationship 1.
O(log n) < O(n) < O(
n* log n) < O(2^n ) <
O(n^2 )
2.
O(n) < O(log n) < O(
n* log n) < O(2^n ) <
O(n^2 )
3.
O(n) < O(log n) < O(
n* log n) < O(n^2 ) <
O(2^n )
4.
O(log n) < O(n) < O(
n* log n) < O(n^2 ) <
O(2^n )

Control that monitors ongoing employee activities during their progress, to ensure they 1.
are consistent with quality standards, is called as Feed Forward
Control
2.
Concurrent
Control
3.
Feedback Control

167
4.
Control measure

Control that attempts to identify and prevent deviations before they occur 1.
is called as Feed Forward Control
2.
Concurrent Control
3.
Feedback Control
4.
Control measure

Contingency theories of leadership are based on the belief that: 1.


there is no single style of
leadership appropriate to
all situations.
2.
there is a single style of
leadership appropriate to
all managers.
3.
there is a single style of
leadership appropriate to
all situations.
4.
None of the other answers is
correct.

Contemporary organizations are redesigning their ethics programs to 1.


facilitate a broader, embraces chaos and forges
new paradigms.
more consistent process that ________.
2.
incorporates the analysis of
outcomes and continual
improvement .
3.
uses outcome analysis to
focus on short-term
goals.
4.
relies on expediency and
situational management.

168
Consider the regular language L = (111 + 11111)*. The minimum number 1.
of states in any DFA accepting the language is 3
2.
5
3.
8
4.
9

Consider the followings right-linear grammar G = (N,T,P,S) N={S} 1.


a*b*
P{ S-->aS|aA
A-->bA|b}
2.
T={a,b}
aa*bb*
Which of the following regular expression denotes L(G)?
3.
a(ab)*b

4.
(a+b)*

Consider the following languageL={a^nb^n| n>=1} L is 1.


regular
2.
CFL but not regular
3.
type 0 language but not type 1

4.
CSL but not CFL

Consider the following language L={a^nb^mc^pd^q | n,m, p,q>=1} L is 1.


CFL but not regular
2.
CSL but not CFL

3.
type 0 language but not type 1

4.
regular

169
1.
Consider the following DFA. How many states
5
does the DFA has after minimization? 2.
4
3.
3
4.
2

Consider the following statement: 1.


virtual void show() = 0; Virtual function

It is called as ……. 2.
Pure virtual function
3.
Syntax Error
4.
Only variable can be equated to
Zero; not functions- So it is not
supported by C++.

Consider that a page is 1KB in size and a process is 9485 bytes in length. 1.
What would be the number of valid entries in the corresponding page 8
table?
2.
10
3.
9
4.
11

Consider pumping lemma of regular language, here w= pqr and q refers to the middle 1.
part and |q|>0.What do we call the process of repeating q 0 or more times before Pumping
checking that they still belong to the language L or not?
2.
Generating
3.
Creating
4.
Producing

170
Consider an operating system capable of loading and executing a single sequential 1.
user process at a time. The disk head scheduling algorithm used is First Come First 50%
Served (FCFS). If FCFS is replaced by Shortest Seek Time First (SSTF), claimed by
2.
the vendor to give 50% better benchmark results, what is the expected improvement in
40%
the I/O performance of user programs?
3.
25%
4.
0%

CONCERT and CONDUCTOR are entity sets with attributes as follows; 1.


CONDUCTS(coid,
CONCERT(coid, location, time, date), CONDUCTOR(soloid, fname, lname, phone).
soloid)
CONDUCTS is a one-to-many relationship from CONDUCTOR to CONCERT.
2.
While reducing the ERD to schemas, what would be the schema for CONDUCTS? CONDUCTS(coid,
location, time, date,
soloid, fname, lname,
phone)
3.
CONDUCTS(soloid,
coid)
4.
None of the above

Components of attitude doesn’t include 1.


Cognitive
Component
2.
Behavioral
component
3.
Affective component
4.
Personality
Component

Comparison of two results and to make sure its accuracy is a process of 1.


Waterfall model
2.
Big Bang model
3.
V-model
4.
Spiral model

171
Company (cid, name, department). Here, the ‘name’ is a --------------------------- and 1.
‘Company’ is a ---------------------- Relation, Attribute
2.
Attribute, Relation
3.
Tuple, Relation
4.
Tuple, Attribute

Compaction is ______ 1.
a technique for
overcoming internal
fragmentation
2.
a paging technique
3.
a technique for
overcoming external
fragmentation
4.
a technique for
overcoming fatal
error

Communication between a computer and a keyboard involves ______________ 1.


transmission. Automatic
2.
Half-duplex
3.
Full-duplex
4.
Simplex

Communication between a computer and a keyboard involves 1.


______________ transmission Automatic
2.
Half-Duplex
3.
Full-Duplex
4.
Simplex

172
Class contains.................... 1.
Members
2.
data types
3.
variables
4.
all of them

Choose the software quality activites from the below 1.Prepares an SQA plan for a project 2.Records any
noncompliance and reports to senior management
3.Participates in the development of the project's
software process description 4.All the options

Choose the purpose of reviews from the below 1.Serve as a filter for the software process 2.Uncover
errors that can then be removed 3.Catch large classes of
errors that escape the originator more than other
practitioners 4.All the options

Choose an internal software quality from given 1.


below: scalability
2.
usability
3.
reusability
4.
reliability

Charles Babbage was a professor of __________ 1.


subject Computer Science
2.
Mathematics
3.
Management
4.
None of these

173
Change control procedures are developed by 1.
organizations to ensure that ________ All changes are authorized, tested, and recorded.
2.
Changes are controlled by the Policy Control Board
(PCB).
3.
All changes are requested, scheduled, and completed on
time.
4.
Management is advised of changes made to systems.

Centralisation 1.
Increasing the importance of subordinate role
2.
Decreasing the importance of subordinate role
3.
Both are correct
4.
None

Build a new product will cost 55,000 with expected 1.


sales of 55,000 per unit (unit price = 4) 1,65,750
2.
1,68,750
3.
1,78,750
4.
1,75,750

Boehm divided the historical project data into 1.


following types of projects Application
2.
Utility programs
3.
A and B
4.
None of the above

174
Blocks to be placed at the upper level of the 1.
hierarchy scheme used, is from direct memory to Set definitive
2.
Block associative
3.
Fully associative
4.
Set associative

Because it is difficult to find one single person with 1.


all the needed qualities, Taylor suggested the Standardization and simplification of work
appointment of a specialist through this technique of
2.
scientific management. Identify the technique.
Method study
3.
Functional foremanship
4.
Motion study

baa*c denotes the set 1.


{b^na^mc^p|n,m,p>=1}
2.
{ba^nc|n>=0}
3.
{ba^nc|n>=1}
4.
{w|w is a string of a,b,c}

Authority always flows from 1.


Superior to subordinate
2.
Subordinate to superior
3.
Both Superior to subordinate and
Subordinate to superior
4.
None of the other answers is
correct

175
Attributes, relations and map entities in oracle is represented by 1.
Conceptual schema
2.
Physical schema
3.
Logical schema
4.
All of above

Attack against availability is .... 1.


Trojan Horse
2.
Malware
3.
VIRUS
4.
DoS

Assuming that memory is byte-addressable, if a frame size is 2KB, what is 1.


the number of bits required to represent the page offset? 12
2.
10
3.
9
4.
11

Assume that a process has 3 user threads assigned to one kernel 1.


thread. Thread 1 is blocked, Tread2 is running and thread 3 is ready. Running
What will be the state of the process?
2.
Ready
3.
Terminated
4.
Blocked

176
Assume page size as 2KB and a process is 72750 bytes in length. What is 1.
the size of the internal fragment? 878
2.
1078
3.
978
4.
1178

Assume we have an object called Employee. Which of the 1.


following best represent this object's identity? Name
2.
Staff ID
3.
Date of Birth
4.
Address

Assess the likelihood and consequences of these risk is called 1.Risk identification 2.Risk
______________ analysis 3.Risk planning 4.Risk
monitoring

Assertion (A): The virtual function supports dynamic-binding 1.


A is correct; R is the correct
Reason (R): The inheritance concept helps in achieving it. explanation for A
2.
A and R are correct; But R
is not the actual reason for
A
3.
A is incorrect; R is correct
4.
Both A and R are incorrect

As a professional, what should be your primary source 1.


of ethical guidance in the workplace? corporate HR policies
2.
corporate code of ethics
3.
corporate mission statement
4.
corporate procedures

177
Arunima, an HR manager, has been given the task of 1.
strengthening the ethical culture at her e-mailing ethics codes to all employees
firm. Which of the following activities would be most 2.
beneficial? posting ethics code posters in the hallways
3.
writing a memo about ethics to top executives
4.
discussing ethics during performance
appraisals

Arrange the 32-bit number 0x0A0B0C0D in big endian 1.


order starting from address 1000h 1000h-0D, 1001h-0C, 1002h-0B, 1003–0A
2.
1000h-0A, 1001h-0B, 1002h-0C, 1003-0D
3.
1000h-0B, 1001h-0A, 1002h-0D, 1003h-0C
4.
1000h–0C, 1001h-0B, 1002h-0D, 1003h-0A

ARP (Address Resolution Protocol) is.... 1.


a TCP/IP protocol used to dynamically bind a high
level IP Address to a low-level physical hardware
address
2.
a TCP/IP high level protocol for transferring files
from one machine to another
3.
a protocol used to monitor computers
4.
a protocol that handles error and control messages

Analysis the probabilty and effects for the risk "The size 1.High and Serious 2.Moderate and Serious
of the software is underestimated" 3.Moderate and Tolerable 4.High and Tolerable

Analysis the probabilty and effects for the risk 1.High and Serious 2.Moderate and Serious
"HighCatastrophicKey staff are ill at critical times in the 3.Moderate and Tolerable 4.High and Tolerable
project"

178
An over-generalized, oversimplified, and 1.
self-perpetuating belief about people’s personal Perception
characteristics is known as
2.
Stereotype
3.
Attribution
4.
Personality

An organisation establishes relationships among 1.


People, work, and resources
2.
Customer, work, and resources
3.
People, work, and management
4.
Customer, work, and management

An industry having low growth rate ,but possess high 1.


relative market share. In BCG matrix, its placed in: Stars
2.
Question Marks
3.
Cash cows
4.
Dogs

An individuals’ ability to cooperate with other members 1.


of the organization and work effectively in teams is Technical skills
called as
2.
Human skills
3.
Conceptual skills
4.
Employee skills

179
An implied understanding of mutual contributions between a person and his or 1.
her organization, which is not a written document, is called as Psychological contract
2.
Legal contract
3.
Illegal contact
4.
Unwritten contract

An example for external premises in planning is 1.


Money
2.
Materials
3.
Machines
4.
Competitors strategy

An evaluative statements that is either favorable or unfavorable about objects, 1.


people, or events is called Attitude
2.
Stereotype
3.
Attribution
4.
Personality

An acyclic graph, what is the maximum number of edge. 1.


n
2.
n+1
3.
2n-1
4.
n-1

180
Amount of data utilized by the stack, which of the content holds 1.
not a fixed size
2.
the amount of the data
fluctuates
3.
depends on stack's lifetime
4.
all of these

Among the Mintzberg’s management roles, figurehead comes under 1.


Interpersonal roles
2.
Informational roles
3.
Decision roles
4.
Leader roles

All of the following are elements of planning EXCEPT: 1.


Developing Plans
2.
Monitoring Performance
3.
Establishing Strategies
4.
Coordinate Activities

After a study of the work processes on a project, a quality audit team reports 1.Quality control 2.Quality
to the project manager that irrelevant quality standards were being used by planning 3.Checking
the project, which might lead to rework. What was the objective of the project adherence to processes
manager in initiating this study? 4.None in the list

Administrative Management is related to 1.


Elton Mayo
2.
Henry Fayol
3.
F W Taylor
4.
Max Weber

181
Aditi has a reputation of being fair, helpful, and understanding. She even 1.
helped her consideration
subordinate overcome a personal crisis. Which one of the following 2.
dimensions of leadership is initiating structure
Aditi displaying here? 3.
employee orientation
4.
task orientation

Activity Bar charts show schedule against ______________ 1.


task dependencies
2.
calendar time
3.
critical bar chart
4.
defining milestones

According to this principle of general management, “an organization should safeguard 1.


against abuse of managerial power, but at the same time, a manager should have the Discipline
necessary authority to carry out his responsibility.” Name the principle of management
2.
described in the given statement.
Authority and
responsibility
3.
Unity of command
4.
Unity of direction

According to the University of Iowa behavioural studies, group members' satisfaction 1.


levels higher under a
supportive leader
were generally ________. in the long run.
2.
improved when
the leader was
production
oriented
3.
maintained when
the leader was
directive in the
short run

182
4.
higher under a
democratic leader
than under an
autocratic one

According to the Ohio State studies, the ________ dimension of leader behaviour is 1.
defined as relationship
management
the extent to which a leader has job relationships characterized by mutual trust and
respect for 2.
consideration
group members' ideas and feelings.
3.
people orientation
4.
integrity

According to the Ohio State studies, ________ refers to the extent to which a leader is 1.
likely people orientation
to define and shape his or her role and the roles of group members in the search for 2.
goal production
orientation
attainment.
3.
initiating structure
4.
consideration

According to Henri Fayol, if this principle of general management is violated, “authority 1.


is undermined, discipline is in jeopardy, order disturbed, and stability threatened.” Authority and
Identify the principle. responsibility
2.
Discipline
3.
Unity of command
4.
Equity

183
According to Burns and Stalker, which of the following is a feature of organic 1.
organisations? Emphasis on
vertical
communication
channels
2.

Prestige drawn
from personal
contribution
3.
Stress on
obedience to
superiors and
loyalty to the
organisation
4.
Knowledge
requirement
based on job

According to research, what characteristic is most frequently shared by firms that 1.


receive encouraging
employees to
high rankings for corporate social responsibility?
participate in civic
activities
2.
requiring
managers to
understand ethics
laws
3.
promoting
integrity through
ethics training
4.
linking
compensation to
ethical behaviours

184
Access is determined by rules in Rule-Based Access Control (RuBAC). What type of 1.
access control would such restrictions fall under? Discretionary Access
Control (DAC)
2.
Mandatory Access
control (MAC)
3.
Non-Discretionary
Access Control
(NDAC)
4.
Lattice-based Access
control

Ability of an individual to analyze complex situations and to rationally process and 1.


interpret available information is called Technical skills
2.
Human skills
3.
Conceptual skills
4.
Employee skills

ABC Airways uses software to manage reservation of its passengers. After a year of its use, 1.
the database administrator decided to add few attributes with the passenger table. If he is Physical data
able to change the structure of passenger table without adjusting its front-end, how do we call independence
such independence?
2.
Logical data
independence
3.
External data
independence
4.
View data
independence

A mistake in software code or configuration that provides an 1.

attacker with indirect access to a system or network is called as... Vulnerabilit


y
2.
Virus
3.

185
Trojan
Horse
4.
Exposures

A visual drawing of the reporting relationships within an organization is called a(n): 1.


work
specialization
chart.
2.
unity of
command
chart.
3.
organization
chart.
4.
division of
labour chart.

A view of database that appears to an application program is known as _______ 1.


Virtual table
2.
Schema
3.
Subschema
4.
None of the
above

A variable that derive Ɛ is called . 1.


Ɛ
2.
@
3.
*
4.
Nullable

186
A stable set of characteristics and tendencies that determine commonalities and differences 1.
in people’s behavior is called Attitude
2.
Stereotype
3.
Attribution
4.
Personality

A software process is a set of related activities that gives outcome to the ____________of 1.
the software Production
2.
Engineeing
3.
Sales
4.
None of the
above

A rule of thumb is if you can find another company which can do a non-core activity better 1.
and faster, ________________. you should
keep
produ
cing.
2.
you should
comp
ete
with
the
comp
any.
3.
you should
outsource.
4.
you should
increase your
efficiency.

187
A reporting relationship in which an employee receives orders from, and reports to, only one 1.
supervisor is known as: Line of
authority
2.
Unity of
direction
3.
Unity of
command
4.
Responsibility

A relationship between the instances of a single entity type is called ___________ 1.


Recursive
relationship
2.
Ternary
relationship
3.
Binary
relationship
4.
None of these

A pure virtual function implicitly means 1.


do-everything
function
2.
do-nothing function
3.
do-something
function
4.
None of the above.

188
A process of verifying the validity of a claimed identity of a 1.
Identification
person is called? 2.
Authentication
3.
Authorization
4.
Accountability

A process is thrashing if 1.
it is spending more time
paging than executing
2.
it is spending less time
paging than executing
3.
page fault occurs
4.
swapping cannot take
place

1.
A problem is said to be decidable if it is a
recursively
enumerable
2.
recursive
3.
context-sensiti
ve
4.
None of the
choices.

189
A period of "testing-out" the leaders in group development stages 1.
Storming
2.
Norming
3.
Performing
4.
Adjourning

A mistake in the software code that provides an attacker with 1.

direct access to a system or network is called as.... Vulnerability


2.
Virus
3.
Trojan Horse
4.
Backdoor Attack

A memory buffer used to accommodate a speed differential is called 1.


____________ stack pointer
2.
cache
3.
accumulator
4.
disk buffer

a logical disk component that manages a disk's internal operations as it relates to a 1.


computer and is abstract to a human user..... disk management

2.
scheduler
3.
memory management
4.
file management system

190
A leader uses _____________ when giving the individual or group the authority 1.
and responsibility to decide. consultatiom
2.
laissez-faire
3.
joint decision
4.
delegation

A language that can generate the new data types is known as ___ 1.

languages as they can handle the new data types Overloaded


2.
Encapsulated
3.
Reprehensible
4.
Extensible

A group of experts are taking decision in this through consensus 1.


Interacting groups
2.
Delphi Methods
3.
Nominal groups
4.
Participative decision making

A function template can have __template argument. 1.


1
2.
2
3.
A. More than one
4.
0

191
a file system with data stored on a server. The data is accessed and 1.
processed as if it was stored on the local client machine. distributed file system
2.
stand-alone machine
3.
Internet file system
4.
EXT2 FS

A dollar value is not used to measure all costs and benefits 1.


True
2.
False
3. 4.

A department can be created by 1.


function
2.
product
3.
process
4.
All the other answers are correct

A DBMS query language is designed to 1.


Specify the structure of a database
2.
Support end users who use
english-like commands
3.
Support in the development of
complex applications software
4.
All of the above

A dataStore in DFD represents 1.


Sequential File
2.
Disk Store
3.
Repository of Data
4.
a Random Access Memory

192
A data dictionary is a special file that contains 1.
The Data type of all fields in all files
2.
The name of all fields in all files
3.
The data type of all fields in all files
4.
All of the above

A cost benefit analysis involves measurable metrics such as 1.


Revenue earned or costs

2.
Quality or costs
3.
Benefits or costs
4.
None of the above

A contingency model of leadership is the path-goal theory. This 1.


suggests that subordinates path-goal relationships are
clarified.
will see leadership behaviour as a motivating influence if:
2.
their effective performance will
satisfy their needs.
3.
the necessary direction,
guidance, training, and
support is provided.
4.
all the other options are correct.

A complete graph can have 1.


n^2 spanning trees
2.
n^(n-2) spanning trees
3.
n^(n+2) spanning trees
4.
n^(n+2) spanning trees

193
A company is running with a peer-to-peer network of 30 1.Discretionary 2.
Mandatory
computers. The policy is such that all system users are 3.
Role-based
responsible for their own security and they can set file
4.
and folder privileges on their own. Which of the following Nondiscretionary

access control model best suits the configuration at this

company?

A clustered system ____. 1.


Gathers together
multiple CPUs to
accomplish
computational work
2.
Is an operating
system that
provides file sharing
across a network
3.
Is used when rigid
time requirements
are present
4.
Can only operate
one application at a
time

194
A bus is one possible local area network topology. One advantage of 1.

a bus network is the failure of one


node does not affect
the rest of the
network
2.
the performance of
the network is
unaffected by the
number of users
3.
failure of the main
bus cable will only
affect a few users
4.
it has the fastest
performance of any
network topology

A Block can be placed in a restricted set of places in the cache 1.


Direct mapping
2.
set associative
3.
fully associative
4.
Indirect associative

A better measurement of performance of memory-hierarchy is the 1.


Average memory access
time
2.
Average memory hit rate
3.
Average memory miss
rate
4.
Write stall

195
A ____________ of an issue consists of weighing and balancing all of the 1.
competing demands on a firm by each of those who have a claim on it. stakeholder
analysis
2.
board of directors’
analysis
3.
corporation analysis
4.
management analysis

A ____________ leader avoids power and leaves the group entirely to itself. 1.
socialistic
2.
democratic
3.
autocratic
4.
laissez-faire

A _______ is a data communication system within a building, plant, or campus, or 1.


between nearby buildings. MAN
2.
LAN
3.
WAN
4.
None of the above

A high-level document which defines the management plan in 1.


Guidelines
detail for how security should be practiced throughout the 2.
Policies
organization is called?
3.
Procedures
4.
Standards

196
______is concerned with the safety of a person's personal information while 1.
accessing the Internet on any computer or mobile device. Digital agony
2.
Digital privacy
3.
Digital secrecy
4.
Digital protection

________is not a proper metric of a program's size 1.


LOC
2.
KLOC
3.
KDSI
4.
None of the above

___________model provide ideas about historical projects 1.


Waterfall

2.
Spiral
3.
COCOMO
4.
Incremental

_____________used node as activity and links as precedence 1.on-arrow approach


2.precedence networks
3.Timeline chart 4.None of the
above

_________________ provides a framework for effective delivery of 1.


technology, forms the basis for management, and also provides the context Prototyping Model
for work products, milestones, quality measures, and change management
2.
Linear Sequential Model
3.
Process
4.
Cost estimation

197
_______________ ensure there is always an up-to-date system that can be 1.
demonstrated to the client. Domain Object Modelling
2.
Individual Class (Code)
Ownership
3.
Visibility of progress and results
4.
Regular Builds

_____________ is triggered by modifications, migration or retirement of 1.


existing software. Regression Testing
2.
Unit Testing
3.
Maintenance testing
4.
Integration Testing

_____________ is the system call that the parent has to invoke in order 1.
to avoid creating zombie processes? wait()
2.
Sleep()
3.
exec()
4.
execvp()

_____________ is a lack of access control policy. 1.


Bug
2.
Threat
3.
Vulnerability
4.
Attack

198
_____________ consists of exploring and explaining the domain of the 1.
problem to be solved. Feature Teams
2.
Inspections
3.
Domain Object Modelling
4.
Configuration Management

____________ is the technique by which a partially loaded program can be 1.


executed. Cache memory
2.
Virtual memory
3.
Associative memory
4.
Shared memory

___________ is very useful in situations when data have to be stored and then 1.
retrieved in reverse order. Stack
2.
Queue
3.List 4.
Linked List

___________ is the system call that has to be invoked by the child to 1.


replace the memory image of the child? wait()
2.
sleep()
3.
exec()
4.
exit()

___________ is a model that illustrates how testing activities integrate with 1.


software development phases. Waterfall Model
2.
V-Model
3.
Spiral Model
4.
Iterative Model

199
___________ communication modes support two-way traffic but in only one 1.
direction at a time? simplex
2.
half duplex
3.
three-quarters duplex
4.
all of the above

__________ is the responsible for carrying out the instructions and procedures 1.Project manager 2.Project
necessary for performing software configuration management tasks are leader 3.Programmer 4.None
documented in the software configuration management plan. from the list

__________ is the process of using a function for more 1.


Inheritance
than one purpose. It allows the use of different internal
2.
structures of the object by keeping the same external
interface.
Polymorphism
3.
Abstraction
4.
Encapsulation

__________ is the process of using a function for more 1.


Inheritance
than one purpose. It allows the use of different internal
2.
structures of the object by keeping the same external
Polymorphism
interface.
3.
Abstraction
4.
Encapsulation

__________ is the minimum number of steps that can execute for the given 1.
parameters Average case
2.
Worst case
3.
Time complexity
4.
Best case

200
__________ is the average number of steps that can be executed for the given 1.
parameters Average case
2.
Worst case1
3.
Time complexity
4.
Best case

__________ in the code are signs of bad code designs and 1.


should be avoided. Repetitions
2.
Modularity
3.
Functions
4.
Documentation

__________ cable consists of inner copper core and a 1.


second conducting outer sheath Coaxial cable
2.
Twisted Pair
3.
Optical fibre cable
4.
shielded Twisted Pair

__________ begins at the root and follows a path down to 1.


the specified file. Relative path name
2.
Absolute path name
3.
Standalone name
4.
All of the above

201
_________ utilization is the use of available bandwidth to 1.
achieve specific goals. Amplitude
2.
Frequency
3.
Bandwidth
4.
None of the above

_________ memory management scheme will produce 1.


least fragment Best Fit
2.
Worst Fit
3.
First Fit
4.
None of the given choices

_________ is the maximum number of steps that can 1.


execute for the given parameters Average case
2.
Worst case
3.
Time complexity
4.
Best case

_________ is not the operation that can be performed on 1.


queue. Insertion
2.
Deletion
3.
Retrieval
4.
Traversal

202
_________ are used for cellular phone, satellite, and 1.
wireless LAN communications. Radio waves
2.
Infrared waves
3.
Microwaves
4.
None of the above

_________ affect schedule or resources 1.Project risks 2.Project people 3.Task


dependencies 4.None in the list

________ cable consists of two insulated copper wires 1.


twisted together. Coaxial
2.
Fiber-optic
3.
Twisted-pair
4.
none of the above

________ are used for short-range communications such as those between a PC and a 1.
peripheral device. Radio waves
2.
Infrared waves
3.
Microwaves
4.
none of the above

_______ is the singleness of purpose that makes possible the creation of one plan of 1.
action to guide managers in resource allocations. Unity of direction
2.
Unity of command
3.
Unity of
resources
4.
Unity of
authority

203
_______ is designed to be used in wireless applications in which stations must be able to 1.
share the medium without interception by an eavesdropper and without being subject to Multiplexing
jamming from a malicious intruder.
2.
Spread spectrum
3.
Modulation
4.
None of the
above.

_______ diagrams are important part of object modeling methodology 1.


application
2.
data
3.
class
4.
level

______ can be applied when the bandwidth of a link (in hertz) is greater than the 1.
combined bandwidths of the signals to be transmitted. TDM
2.
FDM
3.
Both TDM or
FDM
4.
Neither TDM or
FDM

______ cables are composed of a glass or plastic inner core surrounded by cladding,all 1.
encased in an outside jacket. Coaxial
2.
Fiber-optic
3.
Twisted-pair
4.
none of the above

204
_____ is the concept in which a process is copied into main memory from the secondary 1.
memory according to the requirement. Paging
2.
Demand paging
3.
Segmentation
4.
Swapping

____ provide member functions for repositioning the file-position pointer. 1.


istream
2.
ostream
3.
istream and
ostream
4.
None

____ is designed to use the high bandwidth capability of fiber-optic cable. 1.


WDM
2.
FDM
3.
TDM
4.
None of the above

____ function can create versions of the add function for adding the int, 1.

float or double type values. Sum()


2.
Add()
3.
Total()
4.
all

205
____ data type represents the file stream generally, 1.
Fstream
and has the capabilities of both ofstream and ifstream
2.
which means it can create files, write information to stream
files, and read information from files. 3.
filestream
4.
None

Which of the following statements is false? 1.


The halting problem for Turing
machine is undecidable.
2.
Determining whether a
context-free grammar is
ambiguous is undecidable.
3.
Given two arbitrary context-free
grammars, G1 and G2 , it is

undecidable with L(G1) =

L(G2)
4.

Given two regular grammars G1

and G2 , it is undecidable
whether

L(G1) = L(G2)

206
1.
Which one of the following is decidable?
Given a string M,
a string s, and
an integer k,
M accepts s
with k steps
2.
Equivalence of
two given
Turing
machines
3.
Language
accepted by a
given DFA is
nonempty
4.
Language
generated by
a CFG is
nonempty

n n 1.
The language { 0 2 1 / n ≥ 0 } over the alphabet { 0, Not recursive
1, 2} is 2.
is recursive and is a deterministic
CFL
3.
is a regular language
4.
is not a deterministic CFL but a
CFL.

207
1.
It is undecidable, whether
an arbitrary TM has 15 states
2.
an arbitrary TM halts after 10
steps
3.
an arbitrary TM ever prints a
specific letter
4.
an arbitrary TM accepts a
string w in 5 steps

1) Which of these statements is TRUE about a LAN? 1.


a. A LAN connects computers in
a small area such as an office
2.
a. A modem is needed to connect
a computer to a LAN
3.
a. A LAN consists of only one
computer
4.
a. Internet is a LAN

Which one of the following protocols is used for the 1.

noisy channel? Simplest protocol

2.
Half duplex

3.
Selective repeat ARQ
4.
Hybrid

208
Which of the following is not a primitive root of 17? 1.
7
2.
10
3.
14
4.
4

Which error detection method uses one's complement 1.

arithmetic? Simple parity check


2.
Checksum
3.
Two-dimensional parity check

4.
CRC

Which error detection method involves polynomials? 1.


CRC

2.
Simple parity check
3.
Two-dimensional parity check

4.
Checksum

209
What is the minimum hamming distance of this coding scheme d 1.

(01101,10011)? 1
2.
2
3.
3
4.
4

What is the efficiency of the Go back N ARQ protocol? 1.


N = N / (2a
+ 2a)

2.
N = N / (1 +
2a)

3.
N = N * (2a
+ 2a)

4.
N = N * (1
+ 2a)

The term that refers to a set of procedures used to restrict the amount of data 1.

that the sender can send before waiting for acknowledgment is Error
control

2.
Flow
control

3.
Delay

4.

210
Byte
stuffing

The hamming distance between the words 101101101 and 110110010 is 1.


4

2.
5
3.
6
4.
7

The ________ method provides a one-time session key for two parties. 1.
Diffie-Hell
man
2.
RSA
3.
DES
4.
AES

Protocols in which the sender waits for a positive acknowledgment before 1.

advancing to the next data item are often called ARQ


2.
PPR

3.
ARS
4.
PRS

211
Parity bits are used for which of the following purposes? 1.
Encryption
of data

2.
To transmit
faster
3.
To detect
errors
4.
To identify
the user

In the _________Protocol, if no acknowledgment for a frame has arrived, we 1.

resend all outstanding frames. Stop-and-W


ait

2.
Simplest

3.
Go-Back-N
ARQ

4.
Selective-R
epeat ARQ

212
In the _________ Protocol, the sender sends one frame, stops until it receives 1.

confirmation from the receiver, and then sends the next frame. Stop-and-W
ait
2.
Simplest
3.
Go-Back-N
ARQ
4.
Selective-R
epeat ARQ

In the _________ Protocol, the sender sends its frames one after another with 1.

no regard to the receiver. Stop-and-W


ait
2.
Simplest
3.
Go-Back-N
ARQ

4.
Selective-R
epeat ARQ

In the _________ protocol we avoid unnecessary transmission by sending 1.

only frames that are corrupted. Stop-and-W


ait ARQ

2.
Go-Back-N
ARQ
3.
Selective-Re
peat ARQ

213
4.
None of the
above

In stop and wait flow control, for n data packets sent, how many 1.

acknowledgments are needed? n-1

2.
n

3.
2n

4.
n+1

In stop and wait automatic repeat request, acknowledgment number is 1.

announced in the sequence of Next frame


2.
Previous
frame

3.
Zeros

4.
Last frame

214
In Selective Repeat ARQ, if 4 is the number of bits for the sequence number, 1.

then the maximum size of the send window must be _____. 15

2.
16
3.
31
4.
8

In Selective Repeat ARQ, if 4 is the number of bits for the sequence number, 1.

then the maximum size of the receive window must be _____. 15

2.
16

3.
31

4.
8

In Go-Back-N ARQ, if frames 5, 6, and 7 are received successfully, the 1.

receiver may send an ACK _________ to the sender. 5

2.
6

3.
7
4.
8

215
In Go-Back-N ARQ, if 10 is the number of bits for the sequence number, 1.

then the maximum size of the receive window must be _____. 15

2.
16

3.
31
4.
1

In CRC if the data unit is 100110111 and the divisor is 1111 then what is 1.

dividend at the receiver? 1001110011


01
2.
1001101110
01

3.
100111001

4.
1001110011
10

If the sender of a statement cannot successfully dispute its authorship, this 1.

ability is called ____________. Authenticati


on
2.
Non-repudia
tion
3.
Confidential
ity
4.
Integrity

216
If the information is protected from unauthorized change which of the 1.

following holds good. Availability


2.
Authenticity
3.
Non-repudia
tion
4.
Integrity

Error control in the data link layer is based on 1.


Automatic
repeat
request

2.
Manually
repeat
request

3.
Situation
based

4.
Terminated
request

217
CRC stands for 1.
Cyclic
Redundancy
Check

2.
Code
Repeat
Check
3.
Code
Redundancy
Check
4.
Cyclic
Repeat
Check

Caesar Cipher is also referred to as _________ 1.


Shift Cipher
2.
Row
transpositio
n cipher
3.
One – pad
4.
None of the
choices

Bob receives a message digitally signed by Alice. Bob wants to verify the 1.

signature, he requires? Alice’s


Public key
2.
Bob’s
Public Key
3.

218
Alice’s
Private Key
4.
Bob’s
Private Key

An error detecting code is which code is the remainder resulting from 1.

dividing the bits to be checked by a predetermined binary number, is known Cyclic


as redundancy
check
2.
Checksum

3.
Error
detecting
code
4.
Hamming
code

______________ attacks involve modification of the contents of the 1.

message. Passive
2.
Active
3.
Both
Passive and
Active
4.
None of the
given
choices

219
_____________ is a technique of decoding messages from a non-readable 1.

form back to readable format without knowing how they were initially Cryptograph
converted from readable format to non-readable format. y
2.
Encryption
3.
Decryption
4.
Cryptanalysi
s

___________ is referred to the process of analysing information systems 1.

using mathematical formulas to understand the hidden aspects of the system. Cryptograph
y
2.
Cryptanalysi
s
3.
Cryptology
4.
None of the
choices

___________ is the relationship between the message and signature in case 1.

of Digital Signature. Many to


One
2.
One to
Many
3.
Many to
Many
4.
One to One

220
The term that is used to set standards to enable intercommunication among 1.

equipment from a variety of manufactures is called a. project


802
2.
a. project
8802
3.
a. project
208
4.
a. project
2088

IEEE standard was adopted by 1.


ISO
2.
ANSI
3.
OSI
4.
IEEE

Which of the following symmetric block cipher supports multiple key 1.


DES
sizes?
2.
AES
3.
Double DES
4.
Triple DES

Which of the following ensures that data received was sent by the 1.

specified sender? Confidentiality


2.
Authenticity
3.
Non-repudiation
4.

221
None of the
choices

Which of the following encryption has the capability for computing 1.

over encrypted data without access to the secret key? Homomorphic


Encryption
2.
RSA
3.
Elliptic Curve
cryptography
4.
None of the
choices

To construct cipher text, __________________ technique reorders 1.

plaintext characters. Substitution


2.
Transposition
3.
neither (a) nor (b)
4.
both (a) and (b)

The science and art of converting messages to make them secure and 1.

resistant to attacks is known as _________________. Cryptography


2.
Cryptanalysis
3.
Cryptology
4.
None of the
choices

222
DES will fall under the category of ___________ 1.
Electronic Cipher
Book
2.
Electronic Code
Book
3.
Complex block
cipher
4.
None of the
choices

A ________ is used to verify the integrity of a message. 1.


Message digest
2.
Decryption
algorithm
3.
Digital envelope
4.
None of the
above

In IDEA, the key size is ____________ 1.


128 bytes
2.
128 bits
3.
256 bytes
4.
256 bits

223
Which of these is a disadvantage of a Bus network? 1.
Expensive
2.
Needs extra
hardware
3.
Slow
4.
To connect
devices to each
other

_________ is a communications protocol standard 1.

for transmitting small amounts of digital Radio System


information using conventional FM Sound 2.
Broadcast techniques Radio Data System
3.
Radio Broadcast Data System
4.
Broadcast Data System

Which of the following statement/statements is/are 1.

TRUE, with respect to vectored interrupts? In vectored interrupt, device identifies


itself to the processor by sending the
starting address of the service routine.
2.
Code sent by the vectored interrupt are
upto 32 bits
3.
In vectored interrupt starting address
sent by the device to identify itself is
referred as “service location”
4.
All the mentioned options

224
Which of the following statement/statements is/are 1.

FALSE with respect to Centralized BUS In centralized BUS arbitration, the


arbitration? processor takes into account the
various parameters and assigns the
BUS to that device
2.
Centralized Bus arbitration involves
both Processor and DMA controller for
its processing.
3.
Centralized Bus arbitration is similar to
Priority interrupt circuit.
4.
None of the mentioned options.

Which of the following statement is CORRECT, 1.

when the process request for DMA operation. The process, which has requested for
DMA is temporarily suspended.
2.
The process, which has requested for
DMA continues execution.
3.
Another process, gets executed.
4.
The process, which has requested for
DMA is temporarily suspended and
another process start executing.

Which of the following RAID levels gives the 1.


RAID 10
striping at the Block level and double distributed
2.
parity for address both speed and fault tolerance
RAID 2
issue.
3.
RAID 6
4.
RAID 5

225
Which of the following is TRUE, with respect to 1.

RAID 5, Distributed Parity


2.
Minimum number of Disks required is
3
3.
High hardware cost for implementation
4.
All the mentioned options

Which of the following is TRUE, w. r. t, 1.

“difference between DMA and Interrupt mode of DMA involves the processor for the
I/ O data transfer”? I/O transfer
2.
The rate of data transfer is moderate in
DMA
3.
The amount of data transfer is less in
DMA
4.
None of the mentioned options.

Which of the following is not under the category 1.


SISD
of Flynn’s classification
2.
MIMD
3.
SIMD
4.
None of the mentioned options

Which of the following has the highest data rate? 1.


RAID 1
2.
RAID 3
3.
RAID 4
4.
RAID 5

226
The significance of I/O mapped I/O with memory 1.

mapped I/O is I/O mapped I/O is faster than memory


mapped I/O in terms of data transfer.
2.
I/O mapped I/O devices have large
buffer space.
3.
I/O mapped I/O devices need to deal
with only fewer address lines at the
time of communication.
4.
All the mentioned options.

The mechanism in which I/O device is accessed by 1.

continuous monitoring its status using status flag is Program – controlled I/O
2.
referred as ___________________________
Memory mapped I/O
3.
I/ O mapped I/O
4.
Interrupt driven I/O

The _________________ is used to overcome the 1.

contention over the BUS possession and usage. Multiple BUS structure
2.
Single BUS Structure
3.
BUS Optimizers
4.
BUS arbitrator

State the number of registers present in DMA 1.


1
controller
2.
2
3.
3
4.
No registers

227
Overall speed of transfer in RAID level 4 is 1.
Low
2.
Very low
3.
High
4.
None of the mentioned options

Once DMA transfer is completed, it is notified to the 1.

CPU through ____________ signal Acknowledgement signal


2.
Interrupt Signal
3.
Program status word
4.
None of the mentioned options.

In bus arbitration, the controller which initiates data 1.

communication on the BUS at any time is called Bus Arbitrator


2.
Bus Master
3.
Processor
4.
Controller

How interrupt latency can be reduced? 1.


Amount of information saved
automatically by the processor when
an interrupt request should be kept to
a minimum.
2.
By means of shadow registers
3.
Processor with small number of
registers, hardware unit is used to
save the information automatically,
once the processor accepts the
interrupt request.
4.

228
All the mentioned options.

During DMA transfer, the signals and addresses are 1.

issued by the _______________ unit DMA controllers


2.
Device drivers
3.
CPU
4.
The program itself

DMA transfer is initiated by ________________ of 1.

the following Processor


2.
The process being executed
3.
I/O devices
4.
Operating System

Decomposing the instruction execution into 1.


UMA
sub-tasks, each sub-tasks were executed in exclusive
2.
unit, all such units operate concurrently, and the
DMA
defined technique is referred as _____________
3.
Pipelining
4.
Vector Processing

_____________ is the efficient method to implement 1.

multiple interrupt handling. Polling Method


2.
Vectored interrupts
3.
Interrupt nesting
4.
None of the mentioned options

229
Which of the following statement is TRUE, with respect 1.

to “difference between subroutines and interrupt-service During subroutine execution, the


enabled”? changes in status information
and content registers are
anticipated
2.
During subroutine execution, the
changes in status information
and content registers are
unanticipated
3.
During interrupt service
enabling, the changes in status
information and content registers
are anticipated.
4.
None of the mentioned options

Which of following statement/statements is /are TRUE, 1.

w. r. t DMA Controller? The DMA controller can


perform operations on two
different disks simultaneous, if
the appropriate details are
known.
2.
The DMA controller is directly
connected to the system bus to
provide faster access.
3.
When the R/W bit of the status
register of the DMA controller is
set to 1, then Read operation is
performed.
4.
All the mentioned options.

230
The control circuit which is responsible for the DMA 1.

transfer is known as _________ DMA controller


2.
DMA interface
3.
Data Controller
4.
CPU control unit.

MIMD classified computers are known as 1.


UMA
______________, if the processor has high degree of
2.
interactions among themselves.
NUMA
3.
Dynamic Memory accessing
4.
Random Memory Accessing

I/O device is connected to the interconnection network 1.

by using a device interface, the interface includes Data


_________________________registers accessed by the 2.
Status
processor.
3.
Control
4.
Data, Status and Control

High-speed of I/O data transfer is possible by using 1.

_______________ mechanism Interrupt driven I/O


2.
Program – controlled I/O
3.
DMA
4.
Memory mapped I/O

231
Worst-case complexity is mostly used in algorithm 1.

designs instead of remaining complexity cases. Because Worst-case complexity measure


of is simple and easy.
2.
Worst-case complexity has better
understanding parameters.
3.
Best-case for almost any
algorithm is trivial and
determination of Average case
complexity requires more
parameters.
4.
None

Which of the following is an undecidable problem? 1.


Euler’s circuit problem
2.
Halting problem
3.
Traveling sales man problem
4.
Knapsack problem

Which of the following way is best to represent the 1.

algorithms English literature step by step


2.
Flowchart
3.
Pseudocode
4.
None

232
Which of the following statement is the 1.

correct reason for analyzing algorithms? To choose the best algorithm for a particular
task
2.
To study and improve the algorithm
performance from existing algorithms
3.
Both
4.
None

Which of the following statement is 1.

correct for Recursion Structure or code representation is complex.


2.
Used First in First out principle.
3.
Required more memory space to hold
intermediate results on the system stacks.
4.
Took less time than iterative method.

Which of the following is not NP-Hard 1.

problem Hamiltonian Cycle Problem


2.
Travelling Salesman Problem
3.
Euler’s circuit problem
4.
All the above

Which of the following is not criteria for 1.

algorithms Alertness
2.
Definiteness
3.
Finiteness
4.
Effectiveness

233
Which of the following is compulsory 1.

criteria for algorithms Easiness


2.
Simple
3.
Activeness
4.
Finiteness

What is the primary usage of asymptotic 1.

analysis? Measure the efficiency of algorithms that don’t


depend on machine-specific constants.
2.
Used to judge an algorithm whether is it
suitable to a particular system or not
3.
Used to find the minimum specification of
hardware to execute the algorithm
4.
None

Use of Omega notation (Ω) notation? 1.


To specify the least or minimum amount of
resources that needed over all inputs of size
2.
To specify Best case complexity
3.
To Specify Worst case complexity
4.
Both A and B

Undecidable problems mean: 1.


Problems that polynomial algorithms can solve
2.
Problems that deterministic polynomial
algorithms can solve
3.
Problems that non-deterministic polynomial
algorithms can solve
4.

234
Problems that any algorithm cannot solve

The algorithms whose time complexity is 1.

O(n2) belong to NP-Hard


2.
NP-Complete
3.
P
4.
None

Space complexity is measured using the 1.

word. Which of the following statement is Word is a collection of bits stored in computer
correct for term word. memory. Its size is a 4 to 64 bits
2.
Word is a collection variable used in an
algorithm, which is a sum of each variable type
memory occupied memory.
3.
Word is a count of statements used in the
algorithm
4.
Word is the total algorithm size.

SAT or B-SAT is an example for 1.


NP-Hard
2.
NP-Complete
3.
P
4.
None

235
P class problem means: 1.
Problems that can be solvable in
polynomial time
2.
Tractable problems.
3.
whose time complexity is O(N^c)
where N is input size and C is
constant
4.
All

One problem which is known to be NP-Complete and 1.

from that problem give Transformation to some other NP-Hard


2.
problem in NP, then that NP problem becomes:
NP-Complete
3.
P
4.
None

NP-complete problems mean: 1.


Problems in NP
2.
Problems in P
3.
Problems in NP and NP-Hard
4.
Problems in P and NP

NP class of decision problem can be: 1.


Solved by non-deterministic
polynomial algorithms
2.
Solved by deterministic
polynomial algorithms
3.
Solved by polynomial algorithms
4.
None

236
In recursion, which data structure were used 1.
Hash table
2.
Stack
3.
Queue
4.
Dictionary

In Algorithm time complexity analysis which of the 1.

following is correct? Only compile time is considered.


2.
Only Execution Time is
considered.
3.
Both Compile execution time is
considered.
4.
None

In algorithm analysis, Constant time means? 1.


Algorithm terminates after a
specified time.
2.
Algorithm automatically produces
output in a specified constant time.
3.
Algorithm checks whether it can
be completed in a given time or
not.
4.
Algorithm requires the same fixed
number of steps (regardless of)
independent of the input size.

237
If every problem in NP can be polynomial-time 1.

reducible to a problem "A," and "A" is not in NP, then NP-Hard


"A" is called: 2.
NP-Complete
3.
P
4.
None

If every problem in NP can be polynomial-time 1.

reducible to a problem "A," and "A" is also in NP, NP-Hard


2.
then "A" is called:
NP-Complete
3.
P
4.
None

Consider two Algorithm’s A and B, with 1.

time-complexities 100 n + 1 and n2 + n + 1, Algorithm-A takes almost ten times


respectively. Which of the following statements is longer than Algorithm-B.
2.
correct.
Algorithm-A is better than
Algorithm-B.
3.
For smaller input, Algorithm-B is
best, and for bigger input,
Algorithm-A is best
4.
For smaller input, Algorithm-A is
best, and for bigger input,
Algorithm-B is best

Class NP problems are: 1.


verifiable in polynomial time
2.
Solvable in polynomial time
3.
Not Solvable in Non polynomial
time
4.

238
None

Analysis of an Algorithms means 1.


Determine the amount of space to
store on the hard disk
2.
Determine the amount of duration to
execute or RUN
3.
Determining the amount of
electrical power to complete the
algorithm task.
4.
Determining the required number of
instructions and storage memory
required for an algorithm.

In a full binary tree if there are L leaves, then total 1.


number of nodes N are? a) N = 2*L

2.
b) N = L + 1

3.
c) N = L – 1

4.
d) N = 2*L – 1

Which of the following Recursive Algorithms 1.

analysis method is not suitable for all cases. Substitution Method


2.
Recurrence Tree Method
3.
Master Method
4.
None

239
Which operator connects the structure name to 1.
.
its member name?
2.
->

3.
-
4.
*

Which of the following are themselves a 1.

collection of different data types? string


2.
int
3.
structures
4.
char

Prior to use a pointer variable 1.


It should be declared
2.
It should be initialized
3.
It should be either declared or
initialized
4.
It should be declared and
initialized

C structure are also called as 1.


Primary datatype
2.
User-defined datatype
3.
Built-in datatype
4.
Default datatype

240
What is the average case time complexity for 1.
finding the height of the binary tree? a) h = O(loglogn)

2.
b) h = O(nlogn)

3.
c) h = O(n)

4.
d) h = O(log n)

What is a full binary tree? 1.


a) Each node has exactly
zero or two children

2.
b) Each node has exactly
two children

3.
c) All the leaves are at the
same level

4.
d) Each node has exactly
one or two children

241
What is a complete binary tree? 1.
a) Each node has exactly
zero or two children

2.
b) A binary tree, which is
completely filled, with the
possible exception of the
bottom level, which is filled
from right to left

3.
c) A binary tree, which is
completely filled, with the
possible exception of the
bottom level, which is filled
from left to right

4.
d) A tree In which all nodes
have degree 2

The number of edges from the node to the deepest 1.


leaf is called _________ of the tree. a) Height

2.
b) Depth

3.
c) Length

4.
d) Width

242
Product 1.
alter table vendor add
(productid varchar2(10), productname varchar2(10), constraint vendorid not
product_price number,manufacturing_date date, null;
vendorId varchar2(10))
Vendor 2.
(vendorId varchar2(10), vendorname varchar2(10), alter table vendor modify
location varchar2(10)) constraint vendorid not
null;
The sql query to establish not null constraint on the
vendorid column in the vendor table is
3.
alter table vendor modify
vendorid varchar2(10) not
null;

4.
alter table vendor add
constraint vendor_nn not
null;

Some addresses in the address space of the processor are 1.

assigned to I/O locations, which are implemented as a bit I/O registers


storage circuits organized in the form of registers, and this 2.
type of arrangement is called __________________ I/O address space
3.
Memory mapped I/O
4.
I/O mapped I/O

Telnet transfer data in 1.


Encrypted format
2.
Secure channel
3.
Simple plain text
4.
Privileged mode

243
Present-day electronic mail systems are based on 1.
Store and forward model
2.Saveand retrieve model 3.
Forward and retrieve model
4.
Save and pop model

Did FTP link to which protocol stack? 1.Network layer 2.


TCP/IP layer
3.
Presentation layer
4.Application layer

Worldwide Web is a collection of 1.


Web ID
2.
Web page
3.
Web browser
4.
Web URLs

Which of the following is an advantage of SNMP? 1.


No security risk
2.
Detailed messages
3.
High bandwidth
4.
Support proprietary protocol

244
Which is false about FTP? 1.
Transfer files and
folders back and
forth
2.
Builds and
maintains a
website
3.
Securely
transferring files
4.
uploads or
downloads files

These are the idempotent method in the stateless protocol 1.


PUT
2.
CONNECT
3.
POST
4.EXIT

The patch is a request method used for 1.


Check server
function
2.
Web browser
function
3.
Partial modification
4.
Create a tunnel to
a server

245
Numerous IT organizations collect and gather information in 1.
SNMP
hierarchical structure also manage and monitor files with the
help of which protocol? 2.
Telnet
3.
FTP
4.
SMTP

Multiple web resources create common theme forms 1.


Website
2.
Webserver
3.
Web page
4.
Web browser

In the Internet stack, the protocol data unit (PDU) for the 1.
Segment
application layer is
2.
Datagram
3.
Message
4.
Frame

For the client-server model, it uses a separate connection for 1.


controlling the data is File transfer
protocol
2.Dynamic host
control protocol 3.
Secure shell
protocol
4.
IETF

246
An alert to a remotely located host from one application 1.
Inform
through agents of management protocol is
2.
Get
3.
Trap
4.
Set

A web page cannot be viewed on the world wide web if 1.


Type URL of the
page
2.
Select the
hyperlink
3.
Type HTTP
4.
Follow resource
link

Which detects user activity on the internet and sends the data 1.
Malware
to a third party in the background?
2.
Adware
3.
Spyware
4.
Security treat

Integrates business firewall capabilities with an intrusion 1.Packet-filtering


prevention system (IPS) and application control using a firewall 2.
multi-layered approach known as Stateful Inspection firewall
3.
Application-level firewall
4.
Next-Generation firewall

247
Encryption is a form of security. Encryption, on the other 1.
Hubs
hand, offers nothing to keep hackers and other digital
pests distant. We'll need? to achieve this objective. 2.
Bridge
3.
Routers
4.
Firewalls

This theories talk about Freudian approach that discusses the id, 1.
superego, and ego. Trait Personality Theories
2.
Psychodynamic
Personality Theories
3.
Humanistic Personality
Theories
4.
Self efficacy theories

Participative management 1.
a) Empower employees

2.
a) Collective decision making

3.
Both empower employees and
collective decision making
4.
Neither empower employees
nor collective decision making

In his book, Capitalism and Freedom, Milton Friedman argues 1.


doing well while doing
that ________.
good is an essential
corporate mantra
2.
socially responsible
behaviour adds to the
corporation's bottom line
3.
corporations are
responsible for the
environment, society,
and profits

248
4.
the only social
responsibility of
business is to increase
profits

Ethics training should be part of a ________. 1.


reactive strategy
2.
contextual strategy
3.
defensive strategy
4.
proactive strategy

y 2 = x 3 − 5x + 1 defined over E17. If P = (3, 9) what is – P? 1.


(3, 9)
2.
(3, 4)
3.
(3, 8)
4.
none of the above

Which variant of DES is also called Encrypt-Decrypt-Encrypt 1.


mode? Double DES
2.
Triple DES with two
keys
3.
Triple DES with three
keys
4.
None of the given
choices

249
The plain text “come home tomorrow” will be transformed into 1.
which of the following if it uses Rail-fence technique. cmhmtmrooeoeoorw
2.
cmtmhmrooreoeowo
3.
cmhmtmeoeoroorwo
4.
None of the given
choices

The Diffie-Hellman key exchange is vulnerable to which of the 1.


Meet-in-the-middle attack
following attacks?
2.
Man-in-the-middle attack

3.
Phishing attack

4.
Snooping

The term _____ means the redesign of a vertical organization along its 1.
vertical
horizontal workflows and processes.
linkage
2.
vertical
network
grouping
3.
innovation
4.
reengineering

Terminology that defines the extent to which activities within an organisation 1.


Departmentali
are to be subdivided
sation
2.
Divisional
structure
3.
Work
specialisation

250
4.
Formalisation

In work specialisation, efficiency is generated through________________. 1.


a variety of
tasks.
2.
repetitive
tasks.
3.
training.
4.
guidance of
managers.

In an organic structure, formalisation is 1.


high.
2.
low.
3.
moderate.
4.
absent.

A(n) _____ is a group that is made up of organizationally or geographically 1.


vertical
dispersed members who are linked primarily through advanced information
linkage
and communications technologies.
2.
functional
department
3.
organisational
committee
4.
virtual team

A small span of control decreases employee autonomy through 1.


tight
supervision.
2.
loose
supervision.
3.

251
biased
supervision.
4.
lack of
supervision.

_____ means people are organized according to what the organization 1.


Functional
produces.
grouping
2.
Divisional
grouping
3.
Multi-focused
grouping
4.
Horizontal
grouping

“The entire organization should be moving towards a common objective in a 1.


Unity of
common direction” this principle is termed as
command
2.
Unity of
direction
3.
Unity of
group
4.
Unity of
management

“Keyboard Interrupt is an example for ……………. 1.


Synchrono
us
exception
2.
Asynchrono
us
exception
3.
Both (a) and
(b)
4.

252
Neither (a)
nor (b)

“Array Index out of range” is an example for ……………. 1.


Synchrono
us
exception
2.
Asynchrono
us
exception
3.
Both (a)
and (b)
4.
Neither (a)
nor (b)

Which one of the following is not a step in planning? 1.


Establishing objectives
2.
Developing premises
3.
Determining alternative courses
4.
Identifying needs of employees

Which of the following is the fundamental assumption about 1.


Caused behaviour
human behaviour ?
2.
Goal oriented behaviour
3.
Motivated behaviour
4.
All of the above

253
Which of the following is not right about the formal 1.
Deliberately planned &
organization
created by management
2.
Stable & predictable
3.
Violation of rules may lead
to penalties
4.
Managers are chosen

Which of the following is correct about ‘Grapevine’ ? 1.


It tends to exist when
members of formal group
know one- another well
2.
It is the result of social
forces at work place.
3.
It is more common in times of
high organisational excitement.
4.
All the above

Which of the following is an objective of time study? 1.


To determine the number of
workers to be employed
2.
To formulate suitable incentive
schemes
3.
To calculate the labor costs
4.
All of the above

1.
O(2n)
2.θ(2n)
3.
Which of the following holds true for the relation? Ώ(2n)
4.
None of these

254
Which of the following does NOT describe a problem with 1.
Productivity increases may not
scientific management?
be reflected in workers’ pay
2.
It is better suited to complex
jobs.
3.
Improvement is not necessarily
maintainable.
4.
It is better suited to simple jobs.

Virtual functions work because of ……………………… 1.


Virtual pointer correctly
points to Virtual table
2.
Virtual Pointer does not
point to virtual table
3.
There is no concept of
Virtual table and virtual
pointer working
mechanism.
4.
Both (b) and (c)

This stress is positive stress which motivates a person 1.


Chronic stress
2.
Acute stress
3.
Eustress
4.
Distress

The theorist who advocated standard methodology for doing a 1.


Fayol
task and suggested that workers were motivated by pay
according to output (piecework) is 2.
Taylor
3.
Mintzberg
4.

255
Mayo

The technique of differential piece rate system was 1.


Discriminate between efficient and
developed by Taylor to
inefficient workers
2.
Reward the efficient worker
3.
Motivate the inefficient workers to
perform better
4.
All of the above

The managerial function of organizing is_____________ 1.


to review and adjust the plan in
light of changing conditions
2.
to establish a program for the
accomplishment of objectives
3.
to create a structure of function
and duties to be performed by a
group of people
4.
to get things done through and
with the help of people

The keyword virtual can be used for……………. 1.


data members (or) variables
2.
Member functions
3.
classes
4.
Both (b) and (c)

256
The Hawthorne Studies doesn’t include 1.
The illumination studies
2.
The Relay Assembly Test Room
Studies
3.
The mass interviewing Program
4.
The time and motion study

The behavioral science approaches add which of the 1.


The study of people who satisfy social
following emphases to management?
needs at work and how informal, as
well as a formal organization affects
behavior
2.
The scientific study of human
behaviour and developing behavioural
techniques
3.
Both A and B
4.
None of the above

The attributions that emphasize some aspect of the 1.


Dispositional Attributions
individual, such as ability or skill, to explain behavior is
termed as 2.
Situational Attributions
3.
Event Attributions
4.
Skill Attributions

The application of this principle of management leads to 1.


Discipline
higher production and better work for the same effort.
Identify the related principle of general management. 2.
Equity
3.
Division of work
4.
Unity of command

257
Planning function of management is performed 1.
Top Management
by________________________.
2.
Middle Management
3.
Lower Management
4.
All of the above

MBO is 1.
Management By Options
2.
Management By Operations
3.
Management By Objectives
4.
Management By Orders

Management as a discipline refers to __________ 1.


Group of managers
2.
Functions of management
3.
Subject of management
4.
All of these

In Mintzberg’s management roles, the role that communicate to 1.


Liaison
employees the organization’s vision and purpose is called
2.
Figurehead
3.
Monitor
4.
Disseminator

258
In expectancy theory, value of rewards is termed as 1.
Expectancy
2.
Instrumentality
3.
Valence
4.
Values

In expectancy theory, the belief that performance leads to rewards 1.


Expectancy
is termed as
2.
Instrumentality
3.
Valence
4.
Values

In Big Five Personality dimensions, the degree to which a person 1.


is sociable, gregarious, and assertive versus reserved, quiet and Conscientiousness
timid is called as 2.
Extraversion–Introver
sion
3.
Agreeableness
4.
Emotional Stability

In Big Five Personality dimensions, the degree of working well with 1.


others by sharing trust, warmth, and cooperativeness is called as Conscientiousness
2.
Extraversion–Introver
sion
3.
Agreeableness
4.
Emotional Stability

259
In Big Five Personality dimensions, the ability a person displays in 1.
Conscientiousness
handling stress by remaining calm, focused, and self-confident, as
opposed to insecure, anxious, and depressed is known as 2.
Extraversion–Introversion
3.
Agreeableness
4.
Emotional Stability

In a try-catch block, if exception is not caught in try block, the 1.


control must go to ……………….. catch block
2.
same try block again
3.
immediate line of
code or normal
immediate block
4.
throw block

Highest level of Maslow’s Hierarchy is 1.


Security
2.
Physiological
3.
Esteem
4.
Self- Actualization

Group development stages in the order are 1.


Forming, Performing,
Storming, Norming,
Adjourning
2.
Forming, Norming,
Storming, Performing,
Adjourning
3.
Forming, Norming,
Performing, Storming,
Adjourning
4.

260
Forming, Storming,
Norming, Performing,
Adjourning

Find the incorrect statement(s) from the following: 1.


(i) only
(i). A virtual function is allowed to be a static member
2.
(ii). Virtual keyword decides the dynamic binding
(ii) only
3.
All are incorrect
4.
All are correct

Find the correct statement(s) below: 1.


There should be one catch block
for one try block.
2.
There may be multiple catch block for
single try block.
3.
There may be a catch block
without even a single try block.
4.
All are correct

Find the correct order in Exception Handling: 1.


Hit – Throw - Catch – Handle
2.
Hit-catch-Throw-Handle
3.
Handle-Throw-Catch-Hit
4.
Hit-Catch-Handle-Throw

261
Fibonnaci sequence complexity can only be identified 1.
Iterative method
by?
2.
Recursive method
3.
Master theorem
4.
All of them

Exception handling means ……. 1.


clearing runtime errors
2.
managing runtime errors
3.
clearing logic errors
4.
managing logic errors

Documents that outline how goals are to be 1.


Plans
accomplished are called
2.
Goals
3.
Strategies
4.
Ideas

By comparing ______ with standards, the manager can 1.


Risk
know whether the goals are achieved or not.
2.
Ideas
3.
Actual performance
4.
Costs

262
Attributions that emphasize the environment’s effect on 1.
Dispositional Attributions
behavior is called
2.
Situational Attributions
3.
Event Attributions
4.
Skill Attributions

An example for intangible premises in planning is 1.


capital investment
2.
Unit of production
3.
Cost per unit
4.
Goodwill

A persons’ knowledge and ability to make effective use 1.


of any process or technique constitutes Technical skills
2.
Human skills
3.
Conceptual skills
4.
Employee skills

A persons’ knowledge and ability to make effective use 1.


Technical skills
of any process or technique constitutes
2.
Human skills
3.
Conceptual skills
4.
Employee skills

263
Find the correct statement(s) below: 1.
There should be one catch block
for one try block.
2.
There may be multiple catch block for
single try block.
3.
There may be a catch block
without even a single try block.
4.
All are correct

Find the correct order in Exception Handling: 1.


Hit – Throw - Catch – Handle
2.
Hit-catch-Throw-Handle
3.
Handle-Throw-Catch-Hit
4.
Hit-Catch-Handle-Throw

Fibonnaci sequence complexity can only be identified 1.


Iterative method
by?
2.
Recursive method
3.
Master theorem
4.
All of them

Exception handling means ……. 1.


clearing runtime errors
2.
managing runtime errors
3.
clearing logic errors
4.
managing logic errors

264
Documents that outline how goals are to be 1.
Plans
accomplished are called
2.
Goals
3.
Strategies
4.
Ideas

By comparing ______ with standards, the manager can 1.


Risk
know whether the goals are achieved or not.
2.
Ideas
3.
Actual performance
4.
Costs

Attributions that emphasize the environment’s effect on 1.


Dispositional Attributions
behavior is called
2.
Situational Attributions
3.
Event Attributions
4.
Skill Attributions

An example for intangible premises in planning is 1.


capital investment
2.
Unit of production
3.
Cost per unit
4.
Goodwill

265
A persons’ knowledge and ability to make effective use 1.
of any process or technique constitutes Technical skills
2.
Human skills
3.
Conceptual skills
4.
Employee skills

A persons’ knowledge and ability to make effective use 1.


Technical skills2.
of any process or technique constitutes
Human skills
3.
Conceptual skills
4.
Employee skills

A base class that contain pure virtual function is said be 1.


virtual child class
2.
abstract base class
3.
super base class
4.
None of the above

PDA can recognise 1.


any grammar
2.
only CFG
3.
only regular grammar
4.
any unambiguous
grammar

266
Network congestion occurs........ 1.
in case of traffic
overloading
2.
when a system
terminates
3.
when connection between
two nodes terminates
4.
when connection between
three nodes terminates

FORTRAN is a 1.
regular language
2.
context free language
3.
context sensitive language

4.
None of the above

.......................is the protocol suite for the current Internet. 1.


TCP/IP
2.
NCP
3.
UNIX
4.
ACM

Which organization has authority over interstate and international 1.ITU-T 2.


IEEE
commerce in the communications field
3.
FCC
4.
ISOC

267
Which of the following ISO standards is typically used as a 1.
IEEE
framework for network communications?
2.
802.1X
3.
Ethernet
4.
OSI/RM

Which one of the following model induces administrative overload in a 1.


huge environment? Rule based access control
2.
Directory based access
control
3.
Lattice based access
control
4.
ID based access control

Which one of the following model enables frequent changes to data 1.


permissions? Rule-based
2.
List-based
3.
Role-based
4.
Ticket based

Which access control model is defined based on a specific profile for 1.


every user? Lattice based access control
2.
Directory based access
control
3.
Rule based access control
4.
ID based access control

268
Tractable problems mean 1.
Problems that cannot be solved in
polynomial time
2.
Problems that can be solved in polynomial
time
3.
Problems that can be solved in constant
time
4.
Problems that can be solved in
non-polynomial time

Intractable problems means 1.


Problems that cannot be solved in
polynomial time
2.
Problems that can be solved in polynomial
time
3.
Problems that can be solved in constant
time
4.
Problems that can be solved in
non-polynomial time

Which of the following would lead you to 1.


believe that a given system is an SMP-type Each processor is assigned a specific task
system? 2.
There is a boss–worker relationship
between the processors
3.
Each processor performs all tasks within
the operating system
4.
None of the above

269
Which of the following statements is false? 1.
Mobile devices must be concerned with
power consumption.
2.
Mobile devices can provide features that
are unavailable on desktop or laptop
computers.
3.
The difference in storage capacity between
a mobile device and a laptop is shrinking.
4.
Mobile devices usually have fewer processing cores
than a standard desktop computer.

Which of the following statements concerning 1.


open-source operating systems is true? Solaris is open source
2.
Source code is freely available
3.
They are always more secure than
commercial, closed systems
4.
All open-source operating systems share
the same set of goals

Which of the following operating systems is 1.


not open source? Windows
2.
BSD UNIX
3.
Linux
4.
PCLinuxOS

270
Which of the following is a property of 1.
peer-to-peer systems? Clients and servers are not distinguished
from one another
2.
Separate machines act as either the client
or the server but not both.
3.
They do not offer any advantages over
traditional client-server systems
4.
They suffer from the server acting as the
bottleneck in performance

Which of the following file systems is 1.


supported by the windows OS? NTFS
2.
FAT32
3.
exFAT
4.
All of the these

What statement concerning privileged 1.


instructions is considered false? They may cause harm to the system
2.
They can only be executed in kernel mode.
3.
They cannot be attempted from user mode.
4.
They are used to manage interrupts

What is Scheduling? 1.
Allowing a job to use the processor
2.
Making proper use of Processor
3.
None of the mentioned
4.
All of the mentioned

271
What are some other terms for kernel-mode? 1.
Supervisor mode
2.
System mode
3.
Privileged mode
4.
All of the above

Two important design issues for cache memory are 1.


____. Speed and volatility
2.
Size and replacement policy
3.
Power consumption and reusability
4.
Size and access privileges

The two separate modes of operating in a system are 1.


Supervisor mode and system
mode
2.
Kernel mode and privileged mode
3.
Physical mode and logical mode
4.
User mode and kernel mode

The portion of the process scheduler in an operating 1.


system that dispatches processes is concerned with Assigning ready processes to CPU
2.
Assigning ready processes to the
waiting queue
3.
Assigning running processes to
blocked queue
4.
All of the mentioned

272
The most common secondary storage device is ____. 1.
Random-access memory
2.
Solid-state disks
3.
Tape drives
4.
Magnetic disk

In what way is an operating system like a 1.


government? It seldom functions correctly
2.
It creates an environment within
which other programs can do
useful work.
3.
It performs the most useful
functions by itself.
4.
It is always concerned primarily
with the individual's needs

Embedded computers typically run on a ____ 1.


operating system Real-time
2.
Windows XP
3.
Network
4.
Clustered

Bluetooth and 802.11 devices use wireless 1.


technology to communicate over several feet, in Local-area network
essence creating a ____. 2.
Wide-area network
3.
Small-area network
4.
Metropolitan-area network

273
A(n) ________ is the unit of work in a system. 1.
Process
2.
Operating System
3.
Timer
4.
Mode bit

A _____ provides a file-system interface that allows 1.


clients to create and modify files Compute-server system
2.
File-server system
3.
Wireless network
4.
Network computer

A ____ is a custom build of the Linux operating system 1.


LiveCD
2.
Installation
3.
Distribution
4.
VMWare Player

A ____ can be used to prevent a user program from never 1.


returning control to the operating system Portal
2.
Program Counter
3.
Firewall 2
4.
Timer

274
__________ is a set of software frameworks that provide 1.
additional services to application developers. System programs
2.
Virtualization
3.
Cloud computing
4.
Middleware

____ operating systems are designed primarily to maximize 1.


resource utilization. PC
2.
Handheld computer
3.
Mainframe
4.
Network

In length instruction some programs wants a complex 1.


RISC
instruction set containing more instruction, more addressing
modes and greater address rang, as in case of 2.
CISC
3.
Both
4.
None

------------------------is not a good practice in order to 1.


Enabling account lockout
enhance the security offered by password controls
2.
authentication?
Enforcing a reasonable
password policy
3.
Using password verification
tools and password cracking
tools against your own
password database file
4.
Allowing users to reuse the
same password

275
Match the items of List-II with the items of List-I and indicate the code of correct 1.
matching. (iv)
(ii)
List-I List-II (iii)
(i)
(Model of Organisational (Employee
2.
Behaviour) Orientation)
(iv)
(iii)
(i) Responsible
(i)
(a) Autocratic behaviour
(ii)
(ii) Security and 3.
(b) Custodial benefits (i)
(iv)
(iii) Job (iii)
(b) Custodial performance (ii)

(d) Collegial (iv) Obedience 4.


(iv)
Answer of (a) (b) (c) (d) in List-ll (i)
(ii)
(iii)

1. To control access by an active entity such as individual or process to an 1.


object encompasses designing: Access Rules
2.
Access Matrix
3.
Identification controls
4.
Access terminal

1. Rule-Based Access Control access is defined based on rules. Such rules 1.


would fit within what type of access control? Discretionary Access Control (DAC)
2.
Mandatory Access control (MAC)
3.
Non-Discretionary Access Control
(NDAC)
4.
Lattice-based Access control

276
1. In which of the following access control model, a central authority will 1.
determine what objects the subjects have access to and the access control is Mandatory Access Control
based on role or on the organizational security policy?
2.
Discretionary Access Control
3.
Non-Discretionary Access Control
4.
Rule-based Access
control

In which access control model, there are sets of elements which have greatest lower bound of 1.
values and the least upper bound of values? Mandatory model
2.
Discretionary model
3.
Lattice model
4.
Rule model

1. If a user admitting an identity to a system regularly in the form of a log-on ID, then what 1.
type of act it is? Authentication
2.
Identification
3.
Authorization
4.
Confidentiality

1. ----------- is the type of discretionary access control (DAC) model which is based on an 1.
individual's identity. Identity-based Access
control
2.
Rule-based Access
control
3.
Non-Discretionary
Access Control
4.
Lattice-based Access
control

277
Which of the following security services provided by Kerberos? 1.
Availability and
nonrepudiation
2.
Confidentiality and
authentication
3.
Confidentiality and
integrity
4.
Availability and
authorization

Which of the following is considered as foremost parameter to decide the quality of a biometric 1.
device? Accuracy
2.
Acceptability
3.
Enrollment time
4.
Invasiveness

Stronger security can be provided by means of incorporating one of the following. What it is? 1.
Password and a PIN
2.
One-time password
3.
Pass phrase and a
smart card
4.
Fingerprint

One of the following cannot be considered as an example of a deterrent access control? 1.


Encryption
2.
Auditing
3.
Awareness training
4.
Antivirus software

278
Mention True or false. 1.
True
In role-based access control, every user takes one or more roles, and based on the roles, each user
is allowed to access the system resources. 2.
False
3. 4.

Mention True or false. 1.


True
Authorization deals with deciding who the user is, and the authentication deals with restricting
what operations or data the user can access. 2.
False
3. 4.

-------------- form of biometric device is least accepted for authentication purpose. 1.


Iris scan
2.
Retina scan
3.
Fingerprint
4.
Facial geometry

Initially what step has to be carried out to define access control? 1.


Accountabilit
y logging

2.
ACL
verification
3.
Subject
authorization
4.
Subject
identification

279
15. An authentication factor which is physiological or behavioural characteristic unique to a subject is 1.
called? Account ID

2.
Biometric
factor
3.
Token
4.
IQ

Let us assume that an organization is using discretionary access control model for security. Then 1.
it is vulnerable to one of the following attack. What it is? SYN flood
2.
Impersonation
3.
Denial of
service
4.
Birthday attack

15. Which one of the following access controls defined based on the use of labels? 1.
Discretionary
2.
Mandatory
3.
Role-based
4.
Nondiscretio
nary

1. In order to authenticate the users requesting to access the resources, One of the following 1.
technologies meant which can be used for fingerprint scanning, iris scanning and retina scanning Micrometrics
2.
Macrometrics
3.
Biometrics
4.
MicroBiometric
s

280
1.
Which return type cannot return any value to the calling function?
int
2.
float
3.
void
4.
double

1.
Which operator cannot be used with floating point numbers?
+
2.
-
3.
%
4.
*

1.
Which of the following is the conversion character associated with
short integer? %c
2.
%h
3.
%e
4.
%f

1.
Which of the following is a valid variable name?
Initial.Na
me
2.
A+B
3.
$amt
4.
Floats

281
1.
What will be output for printf(“%c”, 65);
65
2.
A
3.
10
4.
a

1.
To find a raised to power of b , the function we would use is
a^b
2.
a**c
3.
pow(b,A.
4.
pow(a,B.

1.
To check the equality of two variables a and b , in C language
if (a=b)
2.
if (a
equalto(b))
3.
if (a==b)
4.
if((a,b)=0)

282
1.
The declaration unsigned u indicates:
u is a
character
2.
u is an
unsigned
integer
3.
u is unsigned
character
4.
u is unsigned
long integer

1.
How many times “Hi” will be printed.
1
{ 2.
2
int x=0; 3.
infinite
printf(“Hi”);
4.
findarea(x); 0

1.
Given a= 00110010 (50) . Write C statements to determine
whether bit 1 in the above pattern is ON/OFF.(least significant a & 0x03
2.
bit is bit 0)
a|0x03
3.
a & 0x02
4.
a | 0x02

283
1.
For using clrscr() function, the standard library file to be
included conio.h
2.
stdio.h
3.
math.h
4.
stdstream.h

1.
Which operator retrieves the lvalue of a variable?
&
2.
*
3.
–>
4.
#

1.
Which operator produces the one’s complement of the given
binary value? Logical
AND
2.
Bitwise
AND
3.
Logical OR
4.
Bitwise NOT

284
1.
Which operator is used to dereference a pointer?
&
2.
*
3.
–>
4.
~

1.
Which operator has the lowest precedence?
Sizeof
2.
Unary
3.
Assignment
4.
Comma

1.
Which of the following is not a character constant?
‘A’
2.
“A”
3.
‘’
4.
‘*’

285
1.
Which of the following are true statements
Only statement (I) is
I. goto can be used in for loop to come out of the loop correct
II. continue takes you to beginning of the loop 2.

III. continue can be used in switch statement Only statement (II) is


correct
IV. break can be used in switch statement
3.
Both statements II &
III are’ correct
4.
only IV is correct

1.
When two strings are equal strcmp(stg1,stg2) returns
-1
2.
0
3.
1
4.
true

1.
What is ascii value for 0 and 9
30, 39
2.
31, 40
3.
31,39
4.
56, 64
48-57

286
1.
To read a character and echo the character on to screen
, with out the need to press enter key, appropriate getchecho()
2.
function is
getch()
3.
getchar()
4.
getcharecho()

1.
The operator which compares two values is
Assignment
2.
Relational
3.
Unary
4.
Equality

1.
Ternary operator operates on how many operands?
1
2.
2
3.
3
4.
4

1.
Structure declaration and definition and are placed
above void main(). Which one of the following its required by all
statements are NOT true. functions
2.
Its global declaration
3.
Space available
4.

287
They are global
declaration and
available to all

1.
Memory is allocated for a function when the function
is declared
2.
defined
3.
called
4.
returned

1.
Identify the erroneous expression.
X=y=2, 4;
2.
res = ++a * 5;
3.
res = /4;
4.
res = a++ –b *2

1.
Following code converts c to
to upper case
char c =’A’
2.
c=c+’a’-65 to lower case
3.
to a number
4.
to character c

288
1.
Conversion specifier for string in scanf statement
are %d
2.
%f
3.
%c
4.%s
%s

1.
ASCII value for a , z are
66 ,91
2.
65,90
3.
97, 122
4.
96, 121

1.
ASCII value for A , Z are
66 ,91
2.
65,90
3.
97 , 122
4.
96 121

1.
*(&num) is equivalent to writing
&num
2.
*num
3.
num
4.
0

289
Which of the following is the address operator? 1.
@
2.
#
3.
&
4.
%

In the template <class T> declaration, what is T stands 1.


a generic data type
for
2.
an arbitrary class
3.
a class defined earlier
4.
none of the above

There’s a notion of _______ and _______. A subject is 1.

allowed to temporarily reduce her level or set of Maximum security level,


compartments from (L, C) → (L ‘ , C’ ) Current security level
2.
Current security level, Audit
security level
3.
Temporary security level ,
Current security level
4.
Audit security level, Maximum
security level

290
The implements Multi–Lateral security by adding 1.

compartments Biba’s model


2.
Integrity Policies
3.
Bell–LaPadula model
4.
Low Water Mark

The model does not give users power to alter access 1.

control in the system manifested in a principle called Bell–LaPadula model


tranquility 2.
Biba model
3.
Low Water Mark model
4.
Ring model

The Bell–LaPadula model 1.

leverages mandatory _____ Access control


2.
Kernel control
3.
System control
4.
Privacy control

The _______ requires that a 1.Simple


Security Condition 2.
subject S can read an object O Complex security condition
only if S dom O and any 3.
DAC permits it (“read *-Property
down”) 4.
Multi lateral security

291
Lipners model combines 1.

_____ and _____ models Biba model , Bell–LaPadula model


2.
Low Water Mark model , Biba Model
3.
Low Water Mark model, Ring Policy model
4.
Ring Policy model, Bell–LaPadula model

In MAC Tuples ,Process can 1.

write object when: Object pl ⅀ (lr, hr)


MAC range (lr, hr); process 2.
MAC label pl pl U (lr, hr)
3.
pl ∈ (lr, hr)
4.
pl dom hr

In clark Wilson model IVPs 1.Unconstrained data items 2.


must ensure that all the Constrained data items
_______ are in valid state 3.
when the IVP is run Transforamtion data items
4.
Integrity verification data items

In clark Wilson model a 1.


Active
proper_______ log files to be
2.
maintained
Data
3.
Audit
4.
Internal

292
In Biba Model A subjects 1.

can only read an object o if Is > Io


2.
LO > LS
3.
Is ≤ Io
4.
LO > LS

In _____ , each subject S and 1.

object O is assigned an Biba’s model


integrity level in I 2.
Bell–LaPadula
3.
Low Water Mark
4.
Integrity Policies

If there is an information path 1.

from O 1∈ O to O n+1∈ O, i(O n) > i(O)


then enforcement of the 2.
low-water-mark policy i(O n-1) ≠i(O 1)
requires that _____ for all i>n 3.
i(O n-1) ≥(O 1)
4.
i(O n+1) ≤i(O 1)

If (s,o,a) ∈ b and access is in 1.

alter mode, then fC(s) ≤ fO(o) Simple Security (ss)-Property


; also, if subject s has access 2.
to object o in alter mode, then Discretionary Simple (ds)-Property
fO(o’) ≤ fO(o) for all objects 3.
o’ accessed by s in observe ∗-Property (star property)
mode 4.
Discretionary Security (ds)-Property

293
Access permissions defined through an access _____ and _____. 1.
Control matrix,
Security levels
2.
Control level,
Access level
3.
Control matrix,
Access level
4.
Security ,
Permission

Access must be permitted by the access control matrix: if (s,o,a) ∈ b, 1.

then a ∈ Mso Simple Security


(ss)-Property
2.
Discretionary
Security
(ds)-Property
3.
Security Property
(sp)
4.
Discretionary
Simple
(ds)-Property

A system has _____ when subjects or objects levels and 1.

compartments do not change in a way that violates a given security Weak Tranquility
policy. 2.
Tranquility
3.
Normal Operation
4.
Unclassified level

294
_____means that when a system is in use, subjects and objects levels 1.

and compartments do not change Weak Tranquility


2.
Tranquility
3.
Normal Operation
4.
Unclassified Level

________ means ensuring timely and reliable access to and the use of 1.

information. Integrity
2.
Availability
3.
Confidentiality
4.
Threat intelligence

________ includes activities to protect the usability, reliability, 1.

integrity and safety of the network Disaster security


2.
Information
security
3.
Network security
4.
Application security

________ includes activities to protect the usability, reliability, 1.

integrity and safety of the network Disaster security


2.
Information
security
3.
Network security
4.
Application security

295
Which operator is used to insert the data into file? 1.
>>
2.
<<
3.
<
4.
none

Use of Big oh notation (O) notation? 1.


To Specify Worst
case complexity
2.
To specify Best case
complexity
3.
To specify average
case complexity
4.
None

Which of the following are parts of any organisation given by 1.


Operating core
Mintzberg?
2.
Strategic apex
3.
Middle line
4.
All of the above

______ is a set of autonomous units, each typically 1.


Divisional structure
machine bureaucracies, coordinated by a central
headquarters. 2.
Professional bureaucracy
3.
Adhocracy
4.
None of the above.

296
Which of the following is not true of the span of control? 1.
The average span of control
affects the number of
managers.
2.
Geographical separation of
staff influences the span
that can be coped with.
3.
High spans of control are
found in supervision of
line production.

4.
The technical content of jobs
has little effect on the
required span of control of
supervisors.

Which one of the following statements most accurately 1.


Ethical issues can be resolved if
describes the nature of an ethical issue in business?
you do what you think is right.
2.
Ethical issues can be resolved by
following the guidance of religious
beliefs.
3.
Ethical issues are difficult
because all the choices may
do some harm.
4.
Ethical issues are difficult because
the results of a decision are hard to
predict.

Which of the following statements is false about the 1.


Consideration is
behavioural theories of leadership?
people-oriented
2.
Production-orientation has little
concern for people
3.
High initiating structure
leaders do not set deadlines
.

297
4.
Employee-centred leader
behaviour focuses on
people.

There are several practical steps that managers can take to 1.


Publishing a statement of ethical
improve the level of socially responsible behaviour in their
policy in a booklet for staff.
company. Which of the following is the least likely to work?
2.
Creating a system of ethical
reporting which is widely
accessible on their website.
3.
Leading by example.
4.
Creating ethical structures.

The number of persons which can be effectively supervised 1.


six
by a single executive or departmental head should be
limited to _______ in an average firm. 2.
ten
3.
fourteen
4.
twenty

The managerial grid used the behavioural dimensions 1.


"Concern for integrity"
"concern for people" and ________
2.
"Concern for profit"
3.
"Concern for environment"
4.
"Concern for production"

The following phrase is used to describe a leader: 1.


relies on control strategies
2.
challenges the status quo
3.
uses traditional influence
4.

298
acts with established culture

The following is not a principle of organisation. 1.


Principle of exception
2.
Principle of balance
3.
Principle of complexity
4.
Principle of co-ordination

Responsibility always flows from 1.


Superior to subordinate
2.
Subordinate to superior
3.
Both from the superior to the
subordinate, and from the
subordinate to the superior
4.
None of the answers is correct

Leadership which enlists the help of subordinates 1.


Situational
as a group to solve problems is:
2.
Laissez-faire
3.
participative
4.
employee-oriented

In a line organisation, the business activities are 1.Accounts, Production, Sales


2.
divided into following three types.
Production, Quality, Sales
3.
Production, Quality, Maintenance
4.
Production, Maintenance, Sales

299
_______________ builds trust among individuals 1.
and in business relationships, which validates and Ethical conduct
promotes confidence in business relationships. 2.
Social responsibility
3.
Ethical responsibility
4.
Business ethics

____ dependent on template parameter? 1.


base class
2.
abstract class
3.
method
4.
None of the mentioned

300
What is the output of this program? 1.
5.5Â Hello World
#include < iostream > 2.
5.5
#include < string >
3.

using namespace std; Hello World


template < typename T >
4.

void print_mydata(T output)


none of the mentioned
{

cout << output << endl;

int main()

double d = 5.5;

string s("Hello World");

print_mydata( d );

print_mydata( s );

return 0;

Non-type template allows how many legal 1.


1
parameters?
2.
2
3.
3
4.
4

301
Is overloading of the function templates allowed in 1.
Yes
C++?
2.
No
3.
May Be
4.
Can't Say

The query to add a unique constraint using alter 1.

table command on name column in the proctor alter table proctor constraint
table is proctor_name_uk unique(name);
proctor(id number,name
2.
varchar2(10),numberofstudents number,
address varchar2(10)); alter table proctor add constraint
proctor_name_uk unique;

3.
alter table proctor add constraint
proctor_name_uk unique(name);

4.
alter table proctor add
proctor_name_uk unique(name);

302
The query to add a check constraint using alter 1.

table command on numberofstudents column in alter table proctor add


the proctor table such that the number of proctor_numberofstudents_ck
students is between 1 and 20 is check(numberofstudents>=1 and
proctor(id number,name numberofstudents<=20);
varchar2(10),numberofstudents number,
2.
address varchar2(10));
alter table proctor add constraint
proctor_numberofstudents_ck
check(numberofstudents>=1 and
numberofstudents<=20);

3.
alter table proctor add
proctor_numberofstudents_ck
check(numberofstudents>1 and
numberofstudents<20);

4.
alter proctor add constraint
proctor_numberofstudents_ck
check(numberofstudents>=1 and
numberofstudents<=20);

Select transitive dependency from the 1.


x-->y then wy-->z
following
2.
X--> YZ then X-->Y , X--> Z

3.
X-->Y , Y-->Z then X-->Z

4.
X-->Y then XZ--> YZ

303
Select the query to add not null constraint on 1.

the numberofstudents column in the proctor alter table add constraint


table proctor_numberofstudent_nn not
proctor(id number,name null;
varchar2(10),numberofstudents number,
2.
address varchar2(10));
alter table proctor add constraint
proctor_numberofstudent_nn not
null;

3.
alter table proctor modify
numberofstudents number
constraint
proctor_numberofstudents_nn not
null;

4.
alter table proctor modify
numberofstudents constraint
proctor_numberofstudents_nn not
null;

Select the query that establishes the foreign 1.

key constraint between the given two tables . alter table student add constraint
Here proctor id is a foreign key in the student foreign key references
table proctor(proctorid);
student(regno number, name varchar2(10),
2.
address varchar2(10), proctorid number);
proctor(proctorid number, proctorname alter table student add constraint
varchar2(10)) student_proctorid_fr foreign key
references proctor(proctorid);

3.
alter table student add constraint
student_proctorid_fr foreign
key(proctorid) references
student(proctorid);

4.

304
alter table student add constraint
student_proctorid_fr foreign
key(proctorid) references
proctor(proctorid);

Identify the normal for the given relational 1.

schema employee relation is in first normal


form
employee (id, name, projectid,
projectname, projectlocation) . 2.

An employee can work on multiple employee relation is in third normal


projects. form

3.
employee relation is in second
normal form

4.
None of the options are true

Foreign keys can be established 1.


only at the column level
2.
only at the table level
3.
Either at the table level or at the column level
4.
All the given options are wrong

305
For any relation R(pqrs) the set of FD's are F= 1.

{pq-->r, q-->s}. If pq is the key for the relation R is in third normal form
then
2.
R is in second normal form

3.
R is in Boyce Codd normal form

4.
none of the options are true

For a relation R(ABC) with functional 1.

dependencies f={A-->B, B-->C,C-->A) is in second normal form


2.
third normal form

3.
Boyce Codd normal form

4.
All the options are correct

F+ for the set of functional dependencies F = 1.

{A-->B,B-->C} is {A-->A,B-->B,C-->C,A-->B,
B-->C,A-->C }

2.
{A-->B, B-->C,AB-->C }

3.
{A-->A,B-->B,C-->C
B-->C,A-->C }

4.
{A-->A,B-->B,C-->C}

306
Consider the following schemas 1.

Product
alter table vendor add constraint
(productid varchar2(10), productname
vendor_location_ck
varchar2(10), product_price
number,manufacturing_date date, vendorId check(location in ('US','UK'));
varchar2(10)) 2.

Vendor alter table vendor add constraint


vendor_location_ck
(vendorId varchar2(10), vendorname
varchar2(10), location varchar2(10)) check(location = 'US' or location
='UK');
The SQL query to establish check constraint
on the location column on location column in
3.
the vendor table such that location accepts
Both the given SQL queries are
only US or UK is
correct

4.
Only one of the given SQL query is
correct

Consider the following schemas 1.

Product alter table product add constraint


foreign key(vendorId)
(productid varchar2(10), productname
varchar2(10), product_price references vendor(vendorId);
number,manufacturing_date date, vendorId 2.
varchar2(10)) alter table product add constraint
product_vendorid_fr
Vendor
foreign key references
(vendorId varchar2(10) ,vendorname
vendor(vendorId);
varchar2(10) ,location varchar2(10))
The SQL query to establish vendorid as the
3.
foreign key in the product table is alter table vendor add constraint
product_vendorid_fr

307
foreign key(vendorId) references
vendor(vendorId);

4.
alter table product add constraint
product_vendorid_fr
foreign key(vendorId) references
vendor(vendorId);

Consider the following schemas 1.

Product alter table product add constraint


price default 100;
(productid varchar2(10) ,productname
varchar2(10), product_price
2.
number,manufacturing_date date, vendorId
varchar2(10)) alter table product modify
product_price number default 100;
Vendor
3.
(vendorId varchar2(10) ,vendorname alter table vendor add price default
varchar2(10) ,location varchar2(10)) 100;
The SQL query to establish default price as
100 in the product_price column in the 4.
product table is alter table product add constraint
price default 100;

A-->A according to rule of 1.


Reflexivity

2.
Transitivity

3.
Union

4.
Decomposition

308
A table is in second normal form if 1.
It is in first normal form and has no
partial key dependencies
2.
It is not having multivalued
attributes

3.
It’s partial composite key
functionally determines an
attribute

4.
None of the given options are true

A relation R(ABC) has all attributes to be prime 1.


BCNF
attributes. The highest normal form satisfied by R
2.
is
Third Normal Form
3.
Fourth Normal Form
4.
None of the given options are true

A relation R which is having a non-prime attribute 1.

transitively dependent on the key is not in Boyce Codd normal form

2.
Third normal Form

3.
Fourth Normal Form

4.
Any of the given Normal Forms

309
1.
Which of the following problem is
undecidable? Membership problem for
CFL
2.
Membership problem for
regular sets
3.
Membership problem for
CSL
4.
Membership problem for
type 0 languages

1.
Recursive languages are
A proper super set of CFL
2.
Always recognized by
PDA
3.
Are also called type 0
languages
4.
Always recognized by
FSA

1.
Recursive enumerable languages are not
closed under Union
2.
Homomorphism
3.
Complementation
4.
Concatenation

310
1.
The statement “ A Turing machine cannot
solve halting problem” is True
2.
False
3.
Still an open problem
4.
Cannot say

1.
Every non-deterministic TM can be simulated
by a deterministic TM True
2.
False
3.
Some times
4.
None of the choices.

1.
Context-sensitive languages can be
recognized by Deterministic PDA
2.
Non-deterministic PDA
3.
Linear bounded automaton
4.
Finite state automaton

1.
A multi-head TM can be simulated by a single
head TM True
2.
False
3.
Some times
4.

311
None of the choices.

To determine whether the stream object is currently 1.


is_open
associated with a file ___ member function is used
2.
Buf
3.
String
4.
None of the above

void main() 1.
5
{
2.
struct books{
6
float st1;
3.
char st2[6]; 8
}*ptr;
4.
printf("%d",sizeof(ptr)); 10
}

which of the following is the correct way of 1.

declaring a float pointer variable: float ptr;


2.
float **ptr;
3.
*float ptr;
4.
float *ptr;

What is the size of a C structure? 1.


C structure is always 128
bytes.
2.
Size of C structure is the total
bytes of all elements of
structure.
3.
Size of C structure is the size
of largest element.
4.

312
Size of C structure is the size
of smallest element.

What is actually passed if you pass a structure 1.

variable to a function? Copy of structure variable


2.
Reference of structure variable
3.
Starting address of structure
variable
4.
Ending address of structure
variable

void main() 1.

{ 20
printf(“%d %d”, sizeof(int *), sizeof(int **)); 2.
} 02
3.
2 2(if 16 bit)
4.
24
—none match since–
5. Compiler gives = 8,8(64 bit)

void main() 1.

{ 444
int i=3, *f, **g; 2.
f=&I; 000
g=&f; 3.
printf(“%d %d %d”, *f, **g, *(*g)); 333
} 4.
433

313
void main() 1.

{ 2
int a[]={1, 2, 3,4}, *p; 2.
1
p=a;
++*p; 3.
3
printf(“%d”, *p);
4.
}
4

void main() 1.

{ 20, 20
int *pt, q=20; 2.
pt=&q; 20, 21
*pt+=1; 3.
printf(“%d,%d”,*pt,q) 21, 20
} 4.
21, 21

void main() 1.

{ 255
char st1=”qwty”; 2.
char st2[]=”qwty”; 244
3.
printf(“%d %d %d”, 8 5 5 (if it is char* st1)
sizeof(st1),sizeof(s2t),sizeof(“qwty”)) 4.
} 245

void main() 1.
4..2
{
2.
char fast, *faster, *fastest;
2..2
printf(“%d..%d”, sizeof(faster),sizeof(fastest))
3.
} 4..4
4.
2..4

314
void main() 1.

{ PT P
char *pt=NULL; 2.
char *p=0; Nullvlauept P
3.
if(pt) PT Nullvlauep
printf(“PT”); 4.
else Nullvlauept Nullvlauep

printf(“Nullvlauept”);
if(p)
printf(“P”);
else

printf(“Nullvlauep”);
}

void main() 1.

{ World
char *pt; 2.
pt=”World”; Some address will be
printf(“%cn”, *&*pt); printed
} 3.
Wn
4.
W

void main() 1.

{ Hello
char *f=”Hello”; 2.
printf(f) H
} 3.
Hello followed by garbage
value
4.
Garbage value

315
void main() 1.

{ 1 1
char *f; 2.
printf(“%d %d”, sizeof(*f),sizeof(f)) 1 2
} 3.
21
4.

2 2

void main() 1.
5
{
2.
struct books{
6
int pages;
3.
char str[4]; 7
}b;
4.
printf("%d",sizeof(b)); 8
}

void main() 1.

{ Garbage value
struct paint{ 2.
int type; DIFFERENT
int color; 3.
}p1, p2; Compiler error
p1.type=1; 4.
p1.color=5; SAME
if(sizeof(p1)==sizeof(p2))
{
printf("SAME");
}
else
{
printf("DIFFERENT");
}
return 0;
}

316
void main() 1.

{ ACERIBM
2.
struct laptop
IBM ACER
{
3.
int cost;
char brand[10]; ACER IBM
}; 4.

struct laptop L1={5000,"ACER"}; IBMACER


struct laptop L2={6000,"IBM"};
printf("Name=%s",strcat(L1.brand,L2.brand));
}

void main() 1.

{ 00
sturct tree 2.
{ 10 0
3.
int q,w;
}; 0 10
struct tree t1={10}; 4.

printf(“%d”, t1.w); 10 10
printf(“%d”, t1.q);
}

void main() 1.

{ YELLOW RED
sturct ship 2.
{ RED YELLOW
3.
char paint[10];
}b1,b2; YELLOW YELLOW
strcpy(b1.paint,”RED”); 4.

printf(“%s”, b1.paint); RED RED


b2=b1;

strcpy(b2.paint,”YELLOW”);
printf(“%s”, b1.paint);
}

317
void main() 1.

{ boat2=0
sturct bus 2.
{ boat2=-1
int sz; 3.
char type[10]; boat2=20
}b1,b2; 4.
b1.sz=20; boat2=some garbage value
b2=b1;
printf(“b2=%d”, b2.sz);
}

The address operator & 1.

cannot act on R-values and Arithmetic expressions


2.
Local variables
3.
Global variables
4.
Member of a structure

The statement 1.

int **a; is illegal


2.
is legal but meaningless
3.
pointer to pointer variable
4.
pointer variable

Select the valid statement 1.

about C structure. Structure elements are stored on random free


memory locations
2.
Structure elements are stored in register memory
locations
3.
Structure elements are stored in contiguous
memory locations
4.

318
Structure elements are stored in detached memory
locations

function(){ 1.
int i=1, s=1; O(n)
while(S<=n)
2.
{ i++;
O(n^2)
s=s+i;
printf(“hello”) 3.
} O(√n)
}
4.
O(nlogn)
What is the time complexity of the given
function()?

Function(){ 1.
int I,j,k; O(n* (Log2 n)2)
for(i=n/2;i<=n;i++)
2.
for(j=1;j<=n;j=2*j)
O(n* (Log2 n))
for(k=1;k<=n;k=k*2)
printf(“Hello”); 3.
} O(n2* (Log2 n))
What is the time complexity of the
4.
given function()?
O(n3)

Comment on the following 1.

pointer declaration. ptr and p, both are pointers to integer.


int *ptr, p; 2.
ptr is a pointer to integer, p is not.
3.
ptr is pointer to integer, p may or may not be.
4.
ptr and p both are not pointers to integer.

Choose the correct statement 1.

about C structure. Structure members cannot be initialized at the time


of declaration
2.
Structure elements can be initialized at the time of
declaration.
3.
Only integer members of structure can be
initialized at the time of declaration
4.

319
Only float members of structure can be initialized at
the time of declaration

struct node 1.

{ An array, each element of which is a pointer to a


int i; structure of type node
float j; 2.
}; A structure of 2 fields, each field being a pointer to
struct node *s[10]; an array of 10
3.
A structure of 3 fields: an integer, a float, and an
array of 10 elements
4.
An array, each element of which is a structure of
type node

You have a class A network address 10.0.0.0 with 40 subnets, 1.


but are required to add 60 255.240.0.0
new subnets very soon. You would like to still allow for the
largest possible number of 2.
host IDs per subnet. Which subnet mask should you assign? 255.248.0.0
3.
255.252.0.0
4.
255.254.0.0

Which of the transport layer protocols is connectionless? 1.


UDP
2.
TCP
3.
FTP
4.
Nvt

Which of the following uses network address translation? 1.


Routers
2.
Network adapter drivers
3.
Hubs
4.
Windows 95

320
Which of the following pieces of information can be found in the 1.
IP header? Source address of the IP packet
2.
Destination address for the IP packet
3.
Sequence number of the IP packet
4.
Both Source address of the IP packet and
Destination address for the IP packet
only
–more proper ans–
IP version, source IP address,
destination IP address, time-to-live

Which layer of the OSI reference model has service point 1.


addressing session layer
Select one: 2.
physical layer
3.
transport layer
4.
data link layer

WHICH LAYER LINKS THE NETWORK SUPPORT LAYERS 1.


AND USER SUPPORT LAYERS? SESSION LAYER
2.
DATA LINK LAYER
3.
TRANSPORT LAYER
4.
NETWORK LAYER

WHICH ADDRESS IDENTIFIES A PROCESS ON A HOST? 1.


PHYSICAL ADDRESS
2.
LOGICAL ADDRESS
3.
PORT ADDRESS
4.
SPECIFIC ADDRESS

321
What is the default subnet mask for a class C network? 1.
127.0.0.1
2.
255.0.0.0
3.
255.255.0.0
4.
255.255.255.0

We also don't want our undeliverable packets to hop around 1.


forever. What feature/flag limits the life of an IP packet on the Time to Live counter
network?
2.
Subnet Mask
3.
Header Checksum
4.
Wackamole field

The standard suit of protocols used by the Internet, Intranets, 1.


extranets and some other networks. Protocol
2.
TCP/IP
3.
Open system
4.
Internet work processor

THE 4 BYTE IP ADDRESS CONSISTS OF.... 1.


NETWORK ADDRESS
2.
HOST ADDRESS
3.
BOTH NETWORK
ADDRESS and HOST
ADDRESS
4.
MAC ADDRESS

322
TCP/IP ................. layer corresponds to the OSI models to three layers. 1.
Application
2.
Presentation
3.
Session
4.
Transport

State the following statement is true or false. 1.


(i) In class B addresses a total of more than 1 billion addresses can be True, False
formed. 2.
(ii)Class E addresses are reserved for future or experimental use. True, True
3.
False, True
4.
False, False

Propagation time of data packets is calculated using 1.


Select one: transmission time + delay
2.
queuing time + processing delay
3.
distance/propagation speed
4.
message size/bandwidth

Leaky bucket algorithm works in 1.


Transport layer
2.
Network layer
3.
Data link layer
4.
Physical layer

If there are N routers from source to destination, total end to end delay in 1.
sending packet N
P (L->number of bits in the packet R-> transmission rate)
2.
(N*L)/R
3.
(2N*L)/R
4.
L/R

323
ICMP IS PRIMARILY USED FOR..... 1.
ERROR AND DIAGNOSTIC
FUNCTIONS
2.
ADDRESSING
3.
FORWARDING
4.
REVERSING

How many bits internet address is assigned to each host on a TCP/IP 1.


internet which is 16 bits
used in all information exchange with the host? 2.
32 bits
3.
48 bits
4.
64 bits

End-to-end connectivity is provided from host-to-host in: 1.


Network layer
2.
Session layer
3.
Transport layer
4.
. Data link layer

A SUBSET OF A NETWORK THAT INCLUDES ALL THE ROUTERS BUT 1.


CONTAINS NO LOOPS IS CALLED.... SPANNING TREE
2.
SPIDER STRUCTURE
3.
SPIDER TREE
4.
ACYCLIC TREE

................... address use 8 bits for the <network> and 24 bits for the 1.
<host> portion of the IP address. Class A
2.
Class B
3.
Class C
4.

324
Class D

............. addresses are reserved for multicasting. 1.


Class B
2.
Class C
3.
Class D
4.
Class E

1.
Which of the following algorithm shows
better best-case complexity? Quick sort
2.
Insertion sort
3.
Merge sort
4.
Selection sort

1.
What is the minimum complexity to perform
sorting on an array of n elements? O(n logn)
2.
O(n)
3.
O(n+logn)
4.
O(logn)

325
1.
Which of the following is not a limitation of
the binary search algorithms? must use a sorted array
2.
requirement of the sorted
array is expensive when a
lot of insertion and
deletions are needed
3.
there must be a
mechanism to access the
middle element directly
4.
the binary search
algorithm is not efficient
when the data elements
are more than 1500

1.
The condition signals the binary search is
unsuccessful is, END<BEG+2
2.
END>BEG
3.
END<BEG
4.
END=BEG

1.
Assume that the available memory space is
very less. Which of the following sorting Bubble sort
2.
algorithm is not suitable for performing
Insertion sort
the sorting of a large amount of data
3.
elements.
Merge sort
4.
Selection sort

326
1.
Selection sort is suitable when,
If even number of
elements are there in the
list
2.
If odd number of elements
are there in the list
3.
If number of elements in
the list is small
4.
If nymber of elements in
the list is large

1.
The algorithm which works based on
Bubble sort
the intervals between the elements of 2.
the array is, Insertion sort
3.
Shell sort
4.
Selection sort

1.
1. A minimum state DFA accepting the
15
language L={w/w belongs {0,1}*} number 2.
of 0s and 1s in w are divisible by 3 and 5, 9

respectively} has 3.
7
4.
8

The clark Wilson model addressess _______ 1.DataIntegrity 2.Data Privacy 3.


requirments for commercial applications Confidentiality
4.Threat Intelligence

327
Which of the following attacks would compromise 1.

the integrity of system information? Denial-of-service


2.
Smurf
3.
SQL Injection
4.
Fraggle

In clark Wilson model CDIs can only be 1.

manipulated by_______ Integrity procedure


2.
Transforamtion procedure
3.
Unconstrained data procedure
4.
Integrity verfication procedure

Consider the following schemas 1.

Product a. alter table vendor add constraint


vendor_vendorid_pr primary key
(productid varchar2(10), productname varchar2(10), (vendorid);
product_price number, manufacturing_date date,
2.
vendorId varchar2(10))
a. alter table vendor add
Vendor constraint primary key (vendorid);
(vendorId varchar2(10), vendorname varchar2(10),
location varchar2(10)) 3.

The SQL query to establish vendorid as the primary a. alter table vendor add
key in the vendor table is constraint vendor_vendorid_pr
primary key ;

4.
a. alter table vendor constraint
vendor_vendorid_pr primary key
(vendorid);

328
The clause to set the foreign key field to null in the 1.
On Delete Cascade
child table on deletion of the corresponding parent key
2.
in the parent table is
On Delete Restrict
3.
On Delete Update
4.
On Delete Set Null

The clause to automatically delete the entire rows 1.


On Delete Set Null
in the child table on deletion of the Parent key in
2.
the parent table is
On Delete Cascade
3.
On Delete Update
4.
All the given options are wrong

F = {AB-->C,C-->A} , A closure is 1.
CA
2.
C
3.
A
4.
ABC

Which if the functional dependencies is not true in 1.

a real world scenario registrationnumber --> name

2.
pincode --> district

3.
personname-->city
4.
country-->capital

329
The relational schema in fourth normal form 1.

should not have Multi Valued Dependencies

2.
Transitive Dependencies

3.
Partial Key Dependencies

4.
Should not have any of the given
dependencies

A Foreign Key 1.
should always be a primary key in
the Parent Table

2.
should always be a unique key in
the Parent Table

3.
can be either a primary key or a unique
key in the Parent Table
4.
All the given options are wrong

__________ mode of addressing is a form of implied addressing: 1.Stack 2.


Array
3.
Queue
4.
Binary

330
1.
Definition of a language L with alphabet {a} is
given as following. L= { a^nk | k > 0, and n is a k+1
2.
positive integer constant} What is the
n+1
minimum number of states needed in a DFA to
3.
recognize L?
2^n+1
4.
2^k+1

1.
Which of the following relations is correct, when
comparing the worst-case complexity? insertion=quick
<selection
2.
quick
=insertion=selec
tion
3.insertion<selec

tion<quick
4.
none of the
above

1.
Which is more suitable (DFS or BFS) if the solution is
far from the starting node? DFS
2.
BFS
3. 4.

1.
Which is more suitable (DFS or BFS) if the solution is
closer to the starting node? DFS
2.
BFS
3. 4.

331
1.
What is the status of the array after the first iteration
of quick sort for the given array of 5,7,10,12,2,8
2.
elements:5,7,10,12,2,8
2,5,10,12,7,8
3.
2,7,10,12,5,8
4.
5,7,10,2,8,12

1.
What is the status of an array after the first iteration of
5,7,10,12,2,8
bubble sort for the given array of 2.
elements:5,7,10,12,2,8 2,5,10,12,7,8
3.
2,7,10,12,5,8
4.
5,7,10,2,8,12

1.
Quick sort algorithms are not following the divide and
conquer type of algorithm strategy? True
2.
False
3. 4.

1.
Merge sort algorithms are following the divide and
conquer type of algorithm strategy? True
2.
False
3. 4.

332
1.
What is the status of the array after the first iteration
of insertion sort for the given array of 5,7,10,12,2,8
2.
elements:5,7,10,12,2,8
2,5,10,12,7,8
3.
2,7,10,12,5,8
4.
5,7,10,2,8,12

1.
Insertion sort algorithms are following the divide
and conquer type of algorithm strategy? True
2.
False
3. 4.

1.
Finite automata recognizes --------grammars
Type-1
2.
Type-2
3.
Type-3
4.
Type-0

1.
1. The lexical analysis for a modern language
such as Java needs The power of which one A. Finite state
of the following machine models in a automata
2.
necessary and sufficient sense?
B. Deterministic
pushdown
automata
3.
C.
Non-deterministi
c pushdown
automata

333
4.
D. Turing
machine

1.
When FA M is given which recognizes language
2
L and reverse of L is found by using M then 2.
there can be ___________Final states 3
3.
only one
4.
any number

1.
The number of states in minimum DFA
4
corresponding to the language (00+10)*100 2.
is 3
3.
6
4.
5

1.
Minimal dfa where number of 0’s are divisible
5
by 2 and number of 1’s divisible by 3 2.
6
3.
8
4.
10

1.
Consider the regular language L = (111 +
3
11111)*. The minimum number of states in 2.
any DFA accepting the language is 5
3.
8
4.
9

334
1.
When there are infinite distinguishable strings
then there cannot be a ------------- automata
2.
finite automata
3.
regular
expression
4.
both finite
automata and
regular
expression

_______ means preserving the authorized restriction on the access 1.

and disclosure, including means for protecting personal privacy and Availability
proprietary information. 2.
Integrity
3.
Confidentiality
4.
Threat intelligence

You fail to back up your files and then drop your laptop breaking it 1.
Confidentiality
into many small pieces. You have just failed to address which aspect
of the CIA Triad? 2.
Integrity

3.
Availability

4.
Authentication

335
Assume that you are having account in xyz bank with the e- 1.

banking facility. During your online transaction, you have tried to Confidentiality
carry out multiple transactions where the bank web server denies 2.
your request to carry out the transaction. Identify the missing Authenticity
element of the Information security provided to the system 3.
Availability
4.
integrity

Which of the following policy includes both end-users and 1.

management on how should they respond to security Technical security


policies
2.
Administrative
security policies
3.
Control policies
4.
None of the
mentioned

Which of the following policy that an organization has to check 1.

how the availability of data is made online 24/7? Contingency Planning


Policy
2.Backup Policy 3.
Retention Policy
4.
Data Classification
Policy

One of my workstations has gone down and my entire network has 1.


Bus
gone down. Which topology am I using?
2.
Star
3.
Ring
4.
Mesh

336
1) Which of the following networks is LEAST likely to be a 1.
The Internet
WAN? 2.
A school network
3.
A network of
bank cash
dispensers
4.
Intranet

1) Which of the following is NOT a network protocol? 1.


UDP
2.
TCP
3.
LAN
4.
SMTP

1) Which type of network needs 'terminators' to function 1.


Bus
correctly?
2.
Star
3.
Ring
4.
Tree

1) What type of network is this? 1.


Ring
2.
Bus
3.
star
4.
mesh

1) What is the fastest type of network connection? 1.


Ethernet
2.
Mobile data
3.Fiber optics 4.
WiFi

337
1) What is Metropolitan Area Network? 1.
Interconnection of
several local area
networks by bridging
with a backbone line
2.
Interconnection of
several local area
networks without
bridging with a
backbone line
3.Interconnection of
several wireless local
area networks by
bridging with a
backbone line 4.
Interconnection of
several wireless local
area networks by
bridging with a coaxial
cable

What is an advantage of a LAN? 1.


a. You can save
money by sharing
peripherals like
printers.
2.
It is limited to a small
area.
3.
a. Can cover near
infinite
geographical
distance.
4.
a. Expensive to set
up.

338
1) What type of network is this? 1.
Ring
2.
Bus
3.
Star
4.
Mesh

1. Which of the following is not a member of the class? 1.


Static function
2.
Friend function
3.
Const function
4.
Virtual function

1.
1. Consider the finite automation in the following
figure. What is the set of reachable states for the {q0, q1,
input string 0011? q2}
2.
{q0, q1}
3.
{q0, q1,
q2, q3}
4.
{q3}

339
1.
The statement “ computable functions can be identified
with a class of partial recursive functions” is from Rice
theorem
2.
Church-
Turing
thesis
3.
Parikh
mapping
theorem
4.
Pumping
lemma

1.
Post systems is equivalent to
Turing
machine
2.
Lambda
calculus
3.
Godel
incompletene
ss theorem
4.
All the
choices

340
1. Medium term schedulers reduce the degree of multiprogramming by 1.
________ Interrupt
2.
Swapping
3.
Terminating
4.
Thread

1. Single inheritance, Multiple inheritance, and Aggregation 1.

comes under _______ Modularity


2.
Typing
3.
Hierarchy
4.
None of the mentioned

1.
1. Which of the following statements is false?
A
A. If a language is regular it can always be 2.
B
accepted by a finite state automaton
3.
B. The union of two regular languages is C

regular 4.
D
C. The intersection of regular languages is
regular
D. The power of NFA is more than the power
of a DFA

1.
1. Which of the following is the transition function of
a NFA? Q x ∑ --> Q
2.
Q x ∑ --> 2^Q
3.
Q x ∑ --> 2^Q-1
4.

341
Qx∑U
{epsilon}-->
2^Q

1.
What is the minimum number of states in
10
deterministic finite automata (DFA) for string 2.
starting with ba2 and ending with ‘a’ over 9

alphabet {a, b}? 3.


8
4.
6

1.
1. The password to the admins
account=”administrator”. The total number of 14 states
2.
states required to make a password-pass
13 states
system using DFA would be __________
3.
12 states
4.
A password
pass system
cannot be
created
using DFA

1.
1. The number of states required by a Finite State
Machine, to simulate the behaviour of a 2^(mn)
2.
computer with a memory capable of storing 'm'
2^m2^n
words, each of length 'n' bits is?
3.
m+n
4.
2mn

342
1.
1. The number of states in a minimal deterministic
3
finite automaton corresponding to the language 2.
L = {a^n | n=4 } is: 4
3.
5
4.
6

1.
1. The language acceptance of a DFA is given as:
{w ϵ ∑^* |
δ^*(q0,w) ϵ F}
2.
{w ϵ ∑ | δ^*(q0,w)
ϵ F}
3.
{w ϵ ∑^* | δ(q0,w)
ϵ F}
4.
{w ϵ ∑ | δ(q0,w) ϵ
F}

1.
1. The difference between number of states with
1
regular expression (a + b) and (a + b) * is: 2.
2
3.
3
4.
0

1.
1. Let w be any string of length n in {a, b}*.
n+3
Consider ‘L’ be the set of all strings ending with 2.
at least n a’s. What is the minimum number of n+1

states in non deterministic finite automata that 3.


n
accept ‘L’?
4.
2n

343
1.
1. Let N be an NFA with n states. Let k be the
number of states of a minimal DFA which is K ≥ 2n
equivalent to N. Which one of the following is 2.

necessarily true? K≥n


3.
K ≤ n2
4.
K ≤ 2n

1.
1. Given an arbitrary non-deterministic finite
automaton (NFA) with N states, the maximum N2
number of states in an equivalent minimized 2.

DFA is at least 2^N


3.
2N
4.
N!

1.
1. Given an arbitrary non-deterministic finite
automaton (NFA) with N states, the maximum N^2
2.
number of states in an equivalent minimized
2^N
DFA is at least.
3.
N!
4.
2N

1.
For a machine to surpass all the letters of
3
alphabet excluding vowels, how many 2.
number of states in DFA would be required? 2
3.
22
4.
27

344
1.
1. For a DFA accepting binary numbers whose
decimal equivalent is divisible by 4, what 0
2.
are all the possible remainders?
0,2
3.
0,2,4
4.
0,1,2,3

1.
1. Finite state machine are not able to
recognize Palindromes because: Finite automata
cannot
deterministically find
the midpoint
2.
Finite automata
cannot remember
arbitarily large amount
of data
3.
Even if the mid point is
known, it cannot find
whether the second
half matches the first
4.
All of the mentioned

1.
1. Definition of a language L with alphabet {a}
is given as following. L= {a^(nk) | k > 0, and k+1
2.
n is a positive integer constant} What is the
n+1
minimum number of states needed in a DFA
3.
to recognize L?
2^(n+1)
4.
2^(k+1)

345
1.
1. Consider the language L given by the
3
regular expression (a + b) *b(a +b) over the 2.
alphabet {a, b}. The smallest number of 4

states needed in a deterministic finite-state 3.


5
automaton (DFA) accepting L is ______:
4.
6

1.
1. Consider the following moves:
A
δ(A,1) = B, 2.
C
δ(A,0) = A 3.
B
δ(B,(0,1))= C
4.
δ(C,0) = A (Initial state =A) Invalid String
Applying the string= 011001, the
automata will be in which of the states?

1.
1. Basic limitation of FSM is that it
A. cannot remember
arbitrary large amount
of information
2.
B. sometimes fails to
recognize grammars
that are regular
3.
C. sometimes
recognizes grammars
are not regular
4.
D. None of these

346
.....means persons authorized have access to receive 1.

or use information, documents Confidentiality


2.
Integrity
3.
Authentication
4.
Availability

.....is concerned with the prevention of improper or 1.

unauthorized modification of information Confidentiality


2.
Integrity
3.
Authentication
4.
Availability

........... is the machine to recognize the context sensitive languages 1.


FA
2.
NFA
3.
Moore machine
4.
LBA

.... used to ensures the security 1.


AppSec
of telecommunications
2.
confidentiality and integrity
ComSec
3.
IdAM
4.
VPN

... virus is unable to scan but the 1.

anti-virus Cavity Virus


2.
Prepending Virus
3.
Appending Virus
4.

347
Stealth Virus

1.
. Which of the following is /are the i, ii, iii and iv only
functions of the operating system? 2.
ii, iii, iv and v only
i) Sharing hardware among users.
ii) Allowing users to share 3.
data among themselves. i, iii, iv and v only
iii) Recovering from errors. 4.
iv) Preventing users from interfering All i, ii, iii, iv and v
with one another.
v) Scheduling resources among
users.

1.
. State True or False. i-True, ii-False
2.
i-True, ii-True
i) In spooling high-speed device
like a disk is interposed between 3.
a running program and low-speed i-False, ii-True
device in Input/output. 4.
i-False, ii-True
ii) By using spooling for example
instead of writing directly to a
printer, outputs are written to
the disk.

------is a global 1.
WWW
communications hub that
connects data from all across the 2.
HTTP
world.
3.
FTTP
4.
HTML

348
---- a context free grammar to generate 1.
expression with balanced parenthesis. S-->(S)| Ɛ
2.
S-->(S)
3.
S-->S| Ɛ
4.
S-->S

(i). Virtual function overloading is not a 1.


syntax error. Only (i)
(ii). Virtual function overloading might not 2.
achieve polymorphism concept Only (ii)
Which of the above statement(s) are true? 3.
Both (i) and (ii)
4.
Neither (i) nor (ii)

(a+b)(cd)*(a+b) denotes the following set 1.


{a(cd)^nb|n>=1}
2.
{a(cd)^n>=1}U{b(cd)^n|n>=1}
3.
{a(cd)^na|n>=0}U{a(cd)^nb|n>=0}U{b(cd)^na|n>=0}U{b(cd)^nb|n>
=0}
4.
{ac^nd^nb|n>=1}

Which statement is NOT 1.

CORRECT? In a database approach, the maintenance of data and


metadata is easier
2.
In a database approach, applications do not have their
own files, but all applications access the same version of
the data by interfacing with the DBMS
3.
In a database approach, there is typically less storage
needed compared to the file approach
4.
In a database approach, the data definitions or metadata
are stored in the applications accessing the data.

349
Which of the following is correct 1.
about class and structure? A class can have member functions while a structure cannot.
2.
class data members are public by default while that of the
structure are private.
3.
Pointer to structure or classes cannot be declared.
4.
class data members are private by default while that of a
structure are public by default

Which of the following adopts a top-down approach? 1.


Object-Oriented Programming
2.
Procedural Programming
3.
Pure - Object-Oriented Programming
4.
none

What happens if the base and the derived class contain a 1.


definition of a function with the same prototype? The compiler reports an error on
compilation.
2.

The only base class function will get


called irrespective of the object
3.

Only derived class function will get called


irrespective of the object.
4.
The base class object will call the base
class function and the derived class
object will call the derived class function.

350
What does overriding a method mean? 1.
Changing the number and/or type of
parameters of a method
. 2.
Changing the return type of a method.
3.
Writing a method in the child class that
has the same header as a method in the
parent
4.
Implementing an abstract method.

In a mechanistic structure, there is______________. 1.


high formalisation.
2.
low formalisation.
3.
no formalisation.
4.
cross-functional formalisation.

In ________, we combine signals from different sources to fit into 1.


a larger bandwidth. line coding
2.
block coding
3.
spread spectrum
4.
none of the above

If an organisation is getting a new network they will 1.

need to think about existing systems to integrate. Less maintenance


Which of the below would NOT be a reason for this 2.
a. More often networks are not
developed from scratch but
need to fit in with existing
systems
3.
It must support any peripherals
already in use, e.g. bar code
readers, printers, etc
4.

351
They will want the system to fit in
with existing pcs to save money
where possible

If (s,o,a) ∈ b and access is in observe mode, then fS(s) 1.

≥ fO(o). Simple Security (ss)-Property


2.
Discretionary Security
(ds)-Property
3.
Security Property (sp)
4.
Discretionary Simple
(ds)-Property

How many classes can be defined in a single program 1.


Only 1
2.
Only 100
3.
Only 999
4.
As many as you want

Create a rectangle object with a width of 5 and a height of 1.


12. Rectangle r = new Rectangle(5,10)
2.
Rectangle r = new Rectangle(5,12)

3.
Student r = new Student(5,12)
4.
Student r = new Rectangle(5,12)

An _________ is an instance or of a copy of a class. 1.


Class

2.
Object
3.
Attribute
4.

352
none

A software object's behavior is exposed through ___. 1.


methods
2.
encapsulation
3.
abstraction
4.
inheritance

A Lecturer is an Employee." This statement can best describe which 1.


object orientation concept? Polymorphism
2.
Inheritance
3.
Encapsulation
4.
Generalization

A collection of methods with no implementation is called an ___. 1.


block code
2.
comment
3.
interface
4.
blueprint

___________ is responsible for gathering and recording the requirements, 1.


agreements, and decisions made in every workshop. Executive Sponsor
2.
Visionary
3.
Scribe
4.
Project Manager

353
_____ solution requires reasoning built on knowledge and experience 1.
Algorithmic Solution
2.
Heuristic Solution
3.
Random Solution
4.
None of these

When a class becomes a friend of another class they are additionally 1.


getting access to:Private
2.
Protected
3.
Public
4.
None of the above

What does the word virtual do when placed in front of a member 1.


function in C++? Forces derived classes to
define the function to
compile.
2.
Allows derived classes, not
required, to define the
function.
3.
Do not place the function in
the text segment if it is not
called.
4.
None of the above.

1.
Assume that all the elements of the array, which is to be
sorted is not known before. But, the array should always Insertion
be maintained as sorted array. Which of the following
2.
algorithm is suitable in this situation?
Extraction
3.
Selection
4.
Distribution

354
RAD Software process model stands for _____ . 1.
Rapid Application
Development.
2.
Relative Application
Development
3.
Rapid Application Design
4.
Recent Application
Development.

Which among the following is false, for a member function of a class 1.


All member functions must
be defined
2.
Member functions can be
defined inside or outside the
class body
3.

Member functions need not


be declared inside the class
definition
4.
Member functions can be
made friend to another
class using the friend
keyword

The following undirected graph: 1.


3
2.
4
3.
5
4.
The number of minimum-weight spanning trees of the graph is 2
___________.

355
Where an object of a class gets stored? 1.
Heap
2.
Stack
3.
Disk
4.
File

The function of MUA in email is 1.


Formats
message
2.
Listing mails
3.
Exchanges
message
4.
Formats
message

The dynamic update occurs when 1.


Server boots
2.
New
browser
installed
3.
Windows
client
created
4.
DHCP
server
renews

356
Determines the protocol which dynamically updating name server 1.
records RFC 2136
2.
RFC 2316
3.
RFC 2613
4.
RFC 2163

Which of the following is a root level label in the domain name 1.


system? stc
2.
museum
3.
bizz
4.
ong

Active directory is mainly supported by 1.


Dynamic
DNS
2.
DNS
3.
DHCP
4.
Domain
server

A Client Echoes a character but only after a full line in which telnet 1.
mode? Server
2.
Command
3.
Character
4.
Default

357
Hardware Devices like a router, switch, camera and other IoT 1.
based devices remotely manage command-line interface File transfer
communication using protocol
2.
Routing
protocol
3.
Wired LAN
4.Telnet
Protocol

If you face an issue in establishing a web page in any browser and 1.


that issue cannot even be resolved by switching over pages then the DNS cache
reason for it is not cleared
2.
DNS not
updated
3.
DNS host is
slow
4.
DNS
controllers in
trouble

Which one of the following is not the process of 1.

Deadlock Recovery? Killing a process


2.
Rollback to the
previous state
3.
Selecting a
Victim
4.
Delaying the
process

358
1.

To make a process as an orphan, which process parent to sleep


needs to delay (sleep()) its execution? The parent for a while, child
process or the child process? terminates
2.
child to sleep for
a while, parent
terminates
3.
parent and child
both normal
execution
4.
parent and child
both to sleep for
a while

1.

Ensuring that processes release the resources if Mutual exclusion


2.
they are not able to acquire the resources
Hold and Wait
requested violates ______________condition for 3.
deadlock Circular Wait
4.
No Preemption

1.

A system has two processes and three identical Yes


2.
resources. Each process needs a maximum of two
No
resources to complete. Is deadlock inevitable? 3. 4.

1.

_________ memory management scheme will Best Fit


2.
produce largest fragment
Worst Fit
3.
First Fit
4.
None of the
given choices

359
#include<stdio.h> 1.

#include<math.h> 16 16
void power(int parameter) 2.
{ 16
printf("%d", parameter*parameter); 3.
} 2
main(){ 4.
int value=4; Error
printf("%d ", (int)(pow(value,2)));
power(value);
}

"A Student object has some attributes such as name, 1.

ID, telephone number, CGPA, and email Encapsulation


address. This information is bound to that 2.
particular Student object. Some of this Inheritance
information can be accessed while some might 3.
be restricted." This statement refers to which
object-oriented concept?
Polymorphism
4.
Specialization

In DFD the symbol used to refer the external entity 1. Rectangle


Rectangle
2.
Ellipse
3.
Diamond
4.
Circle

Overview of the software systems is given by 1.Component Diagram 2.


Deployment Diagram
3.
Package Diagram
4.
Class Diagram

360
DFD stands for 1.
d Data Flow Diagram

2.
Dependent Flow diagram
3.
Decomposition Flow
Diagram
4.
Decision Flow Diagram

1. A DFD is normally levelled 1.

as it is a good idea in design


2.
it is easier to read and understand a
number of smaller DFDs than one large
DFD
3.
it is recommended by many experts
4.it is easy to do it

The weak entity set can be 1.

converted to the strong entity Generalisation


set by 2.
Aggregation
3.
Composition
4.
Adding appropriate attributes

Not a Component of DFD 1.


Attributes
2.
Entities
3.
Process
4.
Data Flow

361
The process in DFD is 1.

represented as Data Flow


2.
Data Store
3.
External Entity
4.
Bubble Symbol

Name, Age, Date of Birth ,Mail 1.

id are examples of Entities


2.
Attributes
3.
Relationship
4.
Descriptors

Ellipse in ER diagram represents 1.


Attributes
2.
Entities
3.
Weak Set
4.
Strong Set

How many views of software 1.

can a UML diagram be 3


represented 2.
4
3.
5
4.
6

362
ER diagram follows 1.
Left-Right Strategy
2.
Right-Left Strategy
3.
Top Down Approach
4.
Bottom up Approach

Context Diagram is also known 1.

as Level 2 DFD
2.
Level 1 DFD
3.
Level 3 DFD
4.
Level 0 DFD

the intersection of a CFL and regular 1.


language need not be regular
2.
need not be context free
3.
is always regular
4.
is always CFL

Syntax of any high level language is defined with 1.


CFG
2.
CNF
3.
GNF
4.
log n

363
PDA can recognise 1.
any grammar
2.
only CFG
3.
only regular grammar
4.
any unambiguous
grammar

Left linear grammars are ....... of CFG 1.


subset
2.
super set
3.
power set
4.
null

L={anbncn/n=1,2,3.....}is an example of a language that is 1.


Context free
2.
not context free
3.
not context free but
whose complement is CF
4.
context free but whose
complement is CF

L=0 1.
L is regular but not 0
2.
L is context free but not
regular
3.
L is not context free
4.
null

364
if r and s are two regular expressions then expression r+s is 1.
also............. Regular expression
2.
Regular Laguage
3.
Regular set
4.
c and b

if G is CFG and w is a string of length l in L(G), how long is a 1.


derivation of w in G, if G is Chomsky normal form? 2l
2.
2l +1
3.
2l-1
4.
l

if a grammar has different LMD or RMD, then it is.......... 1.


ambiguous grammar, un
ambiguous grammar
2.
un ambiguous grammar,
ambiguous grammar
3.
ambiguous grammar,
ambiguous grammar
4.
ambiguous grammar

if a grammar has different LMD or RMD, then it is.......... 1.


ambiguous grammar, un
ambiguous grammar
2.
un ambiguous grammar,
ambiguous grammar
3.
ambiguous grammar,
ambiguous grammar

365
4.
ambiguous grammar

Every language defined by a FA is a ......Language 1.


Regular
2.
irregular
3.
Regular set
4.
c and b

Every context free language is context sensitive 1.


language True
2.
False
3.
nothing
4.

True and False

Elimination of null productions results in simplified 1.


grammar with no unit productions and useless True
symbol 2.
False
3.
nothing
4.
True and False

366
Elimination of null productions results in simplified 1.
grammar with no unit productions and useless True
symbol 2.
False
3.
nothing
4.
True and False

Context free languages are described by 1.


type---------grammars Type 1
2.
Type 2
3.
Type 3

4.
Type 4

CFG's are........... of CSG 1.


subset
2.
super set
3.
power set
4.
null

Applying pumping lemma we can show that all 1.


languages are not regular True
2.
False
3.
0*
4.
c and a

367
All grammars are expressed in ----- form 1.
4 tuple
2.
5 tuple
3.
CFG
4.
Context free

Aliasing in the context free programming languages 1.


refer to Multiple variables having the same
memory location
2.
Multiple variables having the same
memory value
3.
Multiple variables having the same
memory identifier
4.
null

A non terminal is useless if it is 1.


Not derive any terminals
2.
derive terminal
3.
derive Non terminal
4.
a and c

A context free grammar is ambiguous if 1.


the grammar contains useless
non-terminals
2.
it produces more than one parse tree
for the same sentence
3.
some production has two
non-terminals side by side on the
right-hand side

368
4.
None of the above

......languages are used define the lexical structure of the 1.


programming language Regular expression
2.
Regular Laguage
3.
Regular set
4.
C and B

.------------ language are the subset of context free languages. 1.


regular grammar
2.
regular
3.
CNF
4.
GNF

.------------ language are the subset of context free languages. 1.


regular grammar
2.
regular
3.
CNF
4.
GNF

1.has atleast one b


Any string of terminal that can be generated by the following CFG 2.should end in a 'a'
3.has no
4.context free but whose
S-->XY, X-->ax/bx/a, Y-->ya/yb/a
complement is CF
–Correct–
Has atleast 2 a’s

369
MSD stand for 1.
Most significant digit
2.
Many significant digit
3.
Both a and b
4.
None of these

In the base–register addressing the register reference 1.Implicit 2.


Explicit
may be :
3.
Both
4.
None

How many types of unconditional jumps used in program 1.


1
control are follows
2.
2
3.
3
4.
4

Which operation is used to shift the content of an operand to one or 1.


more bits to provide necessary variation: Logical and bit manipulation
2.
Shift manipulation
3.
Circular manipulation
4.
None of these

20.The final addressing mode that we consider is : 1.


Immediate addressing
2.
Direct addressing
3.
Register addressing
4.
Stack addressing

370
Which system was used extensively by early mini computers: 1.
Decimal number
2.
Octal number
3.
Hexadecimal number
4.
Binary number

Which part is not physically indicated in the register: 1.


Binary
2.
Decimal
3.
Octal
4.
None of these

In the case of a right arithmetic shift the sign bit values are shifted to the : 1.
Left
2.
Right
3.
Up
4.
Down

of a number from another can be accomplished by adding the 1.


complement of the subtrahend to the minuend: Subtraction
2.
Multiply
3.
Divide
4.
All of these

371
Which carry is similar to rotate without carry operations: 1.
Rotate carry
2.
Rotate through carry
3.
Both
4.
None

Counting in hex, each digit can be increment from : 1.


0 to F
2.
0 TO H
3.
0 TO G
4.
O TO J

How many types of addition in the 2’s complement system: 1.


3
2.
4
3.
5
4.
6

Which number are used extensively in microprocessor work: 1.


Octal
2.
Hexadecimal
3.
Both
4.
None of these

In which addressing the operand is actually present in instruction: 1.


Immediate addressing
2.Direct addressing
3.
Register addressing
4.
None of the above

372
Which types of register holds a single vector containing at least two read ports 1.
and one write ports: Data system
2.
Data base
3.
Memory
4.
Vector register

In program control the instruction is set for the statement in a: 1.


Parallel
2.
Sequence
3.
Both
4.None

19.In which mode the main memory location holds the 1.


EA of the operand: Immediate addressing
2.
Direct addressing
3.
Register addressing
4.
Indirect addressing

A binary number with 4 bits is called a ____ 1.


Bit
2.
Bytes
3.Nibble

4.None of these

In any system, there is an ordered set of symbols also known as 1.


: Digital
2.
Digit
3.
Both
4.
None of these

373
Which algorithm is used to find GCD of two integers: 1.
Multiplication algorithm
2.
Division algorithm
3.
Addition Algorithm
4.
Simple algorithm
–According to google–
Euclidean Algorithm

Which are unconditional jumps used in program control are 1.


follows: Short jump
2.
Near jump
3.
Far jump
4.
All of these

Which operation use one operand or unary operations: 1.


Arithmetic
2.
Logical
3.
Both
4.
None

Which is used to speed-up the processing: 1.


Pipeline
2.
Vector processing
3.
Both
4.
None

374
21.Which is a method of decomposing a sequential 1.
process into sub operations: Pipeline
2.
CISC
3.
RISC
4.
Database

decompositions R1(AC),R2(AB) with the function 1.


Lossless
dependency FThe ={C->A,A->B} is
2.
Lossy
3.
Neither Lossless or Lossy
4.
All the given options are wrong

Non additive join property on a relation R holds if 1.


the natural join of all
decompositions of R != R

2.
the natural join of all
decompositions of R = R

3.
the decomposition is lossy

4.
None of the given options are correct

375
A prime attribute is an attribute that is part of a 1.
A Primary Key
2.
A Candidate Key

3.
A Composite Key

4.
All the give options
are correct

A multivalued dependency X multi determines y is trivial if 1.


Y is a subset of X

2.
X is a subset of Y

3.
X Union Y equals R

4.
Y is a subset of X
and X Union Y
equals R

A Foreign Key Column 1.


cannot hold null values
2.can hold null or duplicate
values
3.
cannot hold
duplicate values

4.
All the given options are
wrong

376
When 2 or more bits in a data unit has been changed during the 1.

transmission, the error is called Random error


2.
Burst error

3.
Inverted error

4.
None of the mentioned

What is the minimum hamming distance of this coding scheme d 1.

(00000, 10011)? 1
2.
2
3.
3

4.
4

To guarantee the detection of up to S errors in all cases, the 1.

minimum hamming distance in a block code must be S

2.
S+1

3.
S-1

4.
0

377
To detect or correct errors, we send extra bits with data is known 1.

as Redundancy

2.
Correction

3.
Detection

4.
Authentication

The stop and wait protocol uses the link of 1.


Modulation

2.
Full duplex
3.
Half duplex

4.
De modulation

In Go-Back-N ARQ, if 4 is the number of bits for the sequence 1.

number, then the maximum size of the send window must be 15


_____.
2.
16
3.
31

4.
1

378
In a cyclic code, generator polynomial is actually the 1.
Multiplier
2.
Divisor

3.
Polynomial

4.
Quotient

Which of the following is not an advantage 1.


of trees? a) Hierarchical structure

2.
b) Faster search

3.
c) Router algorithms

4.
d) Undo/Redo operations in a notepad

The number of edges from the root to the 1.

node is called __________ of the tree. Height


2.
Depth
3.
Length
4.
Width

379
In a full binary tree if number of internal 1.
nodes is I, then number of nodes N are? a) N = 2*I

2.
b) N = I + 1

3.
c) N = I – 1

4.
d) N = 2*I + 1

In a full binary tree if number of internal 1.


nodes is I, then number of leaves L are? a) L = 2*I

2.
b) L = I + 1

3.
c) L = I – 1

4.
d) L = 2*I – 1

. Which of the following is incorrect with 1.


respect to binary trees? a) Let T be a binary tree. For every k ≥ 0,
there are no more than 2k nodes in level k

2.
b) Let T be a binary tree with λ levels. Then T
has no more than 2λ – 1 nodes

3.
c) Let T be a binary tree with N nodes. Then
the number of levels is at least ceil(log (N +
1))

4.

380
d) Let T be a binary tree with N nodes. Then
the number of levels is at least floor(log (N +
1))

In addressing modes instruction has 1. 1


primarily how many components 2. 2
3. 3
4. 4

Select is referred to as a ________ operator


1. Binary
2. Unary
3. Ternary
4. All of the above

__________ combines all rows from two tables, 1. Intersect


excluding duplicate rows 2. Difference
3. Union
4. None of the above

381
Which of the following statements is not correct?

1. Relational algebra is a set of


operations on relational databases
that allow retrieval of data
2. The data in relational tables are of
limited value unless the data can
be manipulated to generate useful
information
3. Relational algebra defines the
theoretical way of manipulating
table contents using relational
operators
4. Relational algebra is not the basis
for implementing and optimizing
queries in the query processing
and optimization modules

The ___ operator provides a not 1.difference


functionality 2. intersection
3. projection
4. none of the above

382
Which of the following statements is 1. An outer join only returns
correct? matched records from the
tables that are being joined
2. In an inner join, the matched
pairs would be retained, and
any unmatched values in
the other table would be left
null
3. An equijoin, links tables on
the basis of a non-equally
condition that compares
specified columns of each
table
4. The operation of eliminating
columns in a table is called
a project operation

A _____ is a tree data structure that corresponds to a 1. Entree


relational algebra expression 2. Query Tree
3. Sub tree
4. None of the above

383
Which of the following statement is 1. Relational algebra is a formal
not correct? declarative query language
2.Relational algebra is procedural
in nature.
3.Queries in relational algebra are
composed using a collection of
operators
4.The relational algebra
operations can be of arbitrary
complexity

A _________ is a variable that holds a 1.relvar


relation. 2.table
3.database
4.none of the above

___ operates on pairs of relations and is, 1.

therefore, called binary operations

2.

3. Cartesian Product

4.

384
Which of the following statement is 1. By using intersection, multiple queries
can be put together and their output
correct? merged

2. Grouping facilitates the combination of


values based on a common reference

3. The result of projection is the rows


common to the rows produced by the
individual queries.

4. Restrict returns rows after combining


two tables.

1. Dynamic Query Optimization


____ takes place at execution time

2.

3.

4.

385
Which of the following statement is 1. Automatic query optimization means
the DBMS finds the most
not correct? cost-effective access path without
user intervention.

2. Manual query optimization requires,


that the optimization be selected and
scheduled by the end user or
programmer.

3. A statistically based query


optimization algorithm uses statistical
information about the database.

4. A role-based query optimization


algorithm is based on a set of
user-defined rules to determine the
best query access strategy.
5.

A ____ uses sophisticated algorithms 1.

based on statistics about the objects


being accessed to determine the best
2.Cost Based Optimizer
approach to execute a query

3.

4.

386
Which of the following statement is 1. Query optimization algorithm cannot
be evaluated on the basis of its
correct? operation mode or the timing of its
optimization

2. The optimizer process organises the


concurrent execution of SQL requests

3. Query optimization is the central


activity during the parsing phase in
query processing

4. Most SQL performance optimization


techniques are not DBMS-specific and
therefore are easily portable

__ consists of selecting a strategy from a list of 1. Global Query Optimization


candidates that is closest to optimal

2.

3.

4.

387
Which of the following statement is not correct? 1. A drawback of cost-based optimization
is the cost of optimization itself

2. Generation of expressions is only part


of the query-optimization process since
each operation in the expression can be
implemented with different algorithms.

3. The commutavity and associativity of


join operations are important for join
reordering in query optimization

4. Query optimization cannot be


performed by treating materialized
views just like regular relations

Complex queries may have subexpressions 1. Multiquery Optimization

repeated in different parts of the query, which can be


similarly exploited to reduce query evaluation cost.
Such optimization is known as ____ 2.

3.

4.

388
In ____, a query is optimized without being 1.

provided specific values for its parameters.

2. Parametric Query Optimization.

3.

4.

The activity of choosing an efficient execution 1.

strategy for processing a query is known as

2.

3.

4. Query Optimization

389
__ is based on constraints specified on the database 1.

schema to reduce the search space

2.

3. Semantic query optimization

4.

___ ensures that the data moves from one 1.

consistent state to another; this activity includes


the synchronization of local and remote
transactions as well as transactions across 2.Transaction Management
multiple distributed segments.

3.

4.

390
Which of the following is correct? 1.

2. a transaction is a logical unit of work that must be


either entirely completed or aborted; intermediate
states are acceptable.

3.

4.

1.

Durability
Ensures that once the changes are commited, they cannot be undone 2.
or lost, even in the event of a system failure

3.

4.

391
1.

A —-- statement is reached, in which case all changes are aborted 2.Rollback
and the database must be restored to its previous consistent state.

3.

4.

1. Serializability ensures that the schedule for the


Which of the following statement concurrent execution of the transactions yields
is not correct? consistent results

2.

3.

4.

392
Information residing in__________ does not 1. Volatile storage
usually survive system crashes.

2.

3.

4.

1.

Which of the following statements is not


correct? 2.A transaction is committed , after the final
statement has been executed

3.

4.

1.

The DBMS component that ensures atomicity


and durability is
2.

3. Recovery manager

4.

393
In a DBMS transaction subsystem, _____ is 1.buffer manager
responsible for the efficient transfer of data
between disk storage and main memory

2.

3.

4.

1.

Which of the following statements is correct?

2.

3.

4. It is the responsibility of both the DBMS and the


application developers to ensure consistency.

394
1.

Context-sensitive languages (CSLs) are (i) and (iii) only


closed under
2.
i) Union ii) intersection iii) complementation (ii) and (iv) only
iv) concatenation
3.
(i), (ii) and (iii) only
4.
(i), (ii) , (iii) and (iv)

1. L1 is recursive, L2 is recursively
enumerable
Let L1’ be a recursive language and let L2’ be 2. L1 is recursively enumerable and
a recursively enumerable language which is
not recursive. Which one of the following is
TRUE? L2 is recursive

3. L1 is recursive, L2 is not
recursively enumerable
4. L1 and L2 are recursively
enumerable
1.
Recursively enumerable
The complement of the universal language Lu’ 2.
is Not recursively enumerable
3.
Recursively enumerable but not
recursive
4.
Recursive

395
1.
Recursively enumerable
2.
The complement of the diagonal language L’ is
Not recursively enumerable
3.
Recursively enumerable but not
recursive
4.
Recursive

1.

The following grammar G=(N, T, P, S),


Type 3
where N=(S, A, B, C, D, E), T ={a,b,c} 2.

P= {S→ABCD, BCD → DE, D→aD, Type 2 but not of type 3


D→a, E→bE} is of 3.
Type 1 but not of type 2
4.
Type 0 but not of type 1

1. L and L' are recursive


Let L and L’ be a language and its 2.L is recursively enumerable but not
complement. Which one of the
following possibilities will not recursive L' is not recursively
enumerable.
3.L and L' are not recursively

enumerable
4.L and L' are not recursively

enumerable but not recursive.

396
1.

The encoding of the Turing machine 1110101001001001100101000101001


with transitions 1000100010010010111
δ(q1,0) = (q2, 1, R) 2.
δ(q2, 0) (q3,0, R)
11101010010010011001010010100
δ(q3, B)= (q2,1,L)
11000100010010010111
is 3.

hold? 1110101001001001100101000101001
100010001001010111
4.
1110101001001001100101000101001
10010010010010111
1.

Let L1 be a regular language and L2 a


L1∩L2 is a DCFL
deterministic CFL, L3 is recursively
enumerable but not recursive. Which 2.
one of the following statements is
FALSE? L3∩L1 is recursive
3.

L1U L2 is context-free
4.

L1∩L2∩L3 is recursively
enumerable

1.

Which one of the following is the L is undecidable


strongest correct statement about a 2.
finite language L over a finite alphabet
Σ?
L is recursive
3.
L is a CSL
4.
L is a regular set

397
Let Σ be a finite alphabet. For a set A ⊆Σ*, 1.
define For all A ⸦ Σ*, if A is regular, then
cycle A = {yx | xy ∈ A}, so is cycle A.
2.
permute A = {y | there exists x ∈ A, for
every a ∈ Σ, na(x) = na(y)} For all A ⸦ Σ *, if A is regular,
For example, if Σ = {a, b, c} and A =
then so is permute A.
{aaabc), then 3.

cycle A = {aaabc, aabca, abcaa, bcaaa,


For all A ⸦ Σ *, if A is
caaab}, context-free, then so is cycle A.
permute A = {aaabc, aabca, abcaa, bcaaa, 4.
caaab, aabac, abaca, bacaa,acaab, caaba,
abaac, bacaa , aacab, acaba, cabaa, abaac, For all A ⸦ Σ *, if A is
baaca , aacab, acaba, cabaa, baaac, aaacb, context-free, then so is permute A.
aacba, acbaa, cbaaa}.
Which of the following propositions is true?

Consider the following statements: 1.


I only
I) Recursive languages are closed 2.
under complementation I and II
II) Recursive enumerable languages are 3.
closed under union I and III
III) Recursive enumerable languages 4.
are closed under complementation
II and III

Which of the above statements are


TRUE?

398
1.

Consider a language L for which there NP hard


exists a Turing machine (TM), T, that 2.
accepts every word in L and either
rejects or loops for every word that is
NP complete
not in L. The language is 3.
Recursive
4.
Recursively enumerable

1.L1U L2 is a CSL
Consider the languages
L₁= {a^n.b^m.c^m / n, m≥1} and L₂=
2.L1 ∩ L2 is a CFL
{a^n.b^n.c^m / n,m ≥1 } Which one of
the following statements is TRUE?
3.L1 and L1 are CSL

4.L1 ∩ L2 is a CSL

1.

A context-free language L = {wwR / DPDA


w∈{a,c}* can be accepted by 2.
NPDA
3.
DFA
4.
NFA

1.

Which of the following languages over {a,b,c} is


R
{ wbw / w ∈{a, c}* }
deterministic PDA?
2.
R
{ ww / w ∈{a, b, c}* }
3.
n n n
{a b c / n≥1}
4.

399
{ w / w is a palindrome over
{a, b, c} }

1.

Which of the following languages over {a,b,c} is


R
{ wbw / w ∈{a, c}* }
deterministic PDA?
2.
R
{ ww / w ∈{a, b, c}* }
3.
n n n
{a b c / n≥1}
4.
{ w / w is a palindrome over
{a, b, c} }

400

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy