1.n
2.2n-1
3.2n
4.2n-1-1
3.The performance of Round Robin algorithm depends heavily on
1.size of the process
2.The i/o bursts of the process
3.The CPU burst of the process
4.The size of the time quantum
4.Match the following :
OLAP (A) Regression
OLTP (B) Data Warehouse
Decision Tree (C) RDBMS
Neural Network (D) Classification
(i) (ii) (iii) (iV)
(A) (B) (C) (A) (D)
(b) (B) (C) (D) (A)
(c) (C) (B) (A) (D)
(d) (C) (B) (D) (A)
1.a
2.b
3.c
4.d
5.In win32, which function is used to create windows application ?
1.winAPP
2.winAPI
3.WinMain
4.Winvoid
6.the GSM network is divided into the following three major systems:
1.55,BSS,055
2.BSS,BSC,MSC
3.CELL,BSC,OSS
4.SS,CELL,MSC
7.the document standards for EDI were first developed by large business house during the 1970s and are now under the control of the following standard organization :
1.ISO
2.ANSI
3.ITU-T
4.IEEE
8. a typical digital telephone channel in TDM circuits is allocated a speed of :
1.4 kbms
2.8 kbms
3.64 kbps
4.1.544 Mbps
9. Which of the following is not a WAN technology:
1.X.25
2.Frame Relay
3.ATM
4.None of the above
The coupling between different modules of a software is categorized as follows:
(I) Content coupling
(II) Common coupling
(III) Control coupling
(IV) Stamp coupling
(V) Data coupling
Coupling between modules can be ranked in the order of strongest (least desirable) to weakest (Most desirable)
as follows:
1.I,II,III ,IV ,V
2.V,IV,III,II,I
3.I,III.V.II.IV
4.IV,II,V,III,!
The proof of the proposition
“Every simple graph with at least two vectors has two vertices of equal degree” is based on
1.Inclusion-Exclusion principle
2.Pigeonhole principle
3.Elementory counting technique
4.None of the above
Which statement is true
1.The modal of deterministic finite machine includes the model of non-deterministic finite state
2.The modal of non-deterministic finite state machine includes the model of deterministic finite state as
3.Non-deterministic finite state machines are not more powerful than deterministic
4.None of the above
Algorithm to find optimal spanning tree is
1.Kruskal's algorithm
2.DEPTH-FIRST search
3.BREADTH-FIRST Search
4.none of the above
Which of the following is a good reason to use linked lists in a program?
1.To make execution faster
2.To access any element randomly
3.To allocate space dynamically whenever needed
4.To make deletion of elements easier
Which of the following operations is performed more efficiently by doubly linked list than by linear linked list?
1.Deleting a node whose location is given
2.Searching an unsorted list for a given item
3.Inserting a node after the node with a given location
4.Traversing the list to process each node
The rules which govern the formation of valid lexical units in the source program are
1.Syntax rules
2.Semantic rules
3.Lexical rules
4.Syntehesis phase
Consider the following statement about kernel level thread and user level thread. Which one of the following is false?
1.Context switch time is longer for kernal level threads than for user level threads
2.User level threads do not need any hardware suppprt
3.Related kernal level thread can be scheduled on different processors in multiprocessor system
4.Blocking one kernal level thread blocks all related thread
Fuzzy Set theory defines fuzzy operators. Choose the fuzzy operators from the following.
1.AND
2.OR
3.NOT
4.All of the above
There are also other operators, more linguistic in nature, called __________ that can be applied to fuzzy set theory.
1.Hedges
2.Lingual variable
3.Fuzz variable
4.None of the mentioned
What’s the difference between servlets and applets?
(1) Servlets executes on Servers, where as Applets executes on Browser
(2) Servlets have no GUI, where as an Applet has GUI
(3) Servlets creates static web pages, where as Applets creates dynamic web pages
(4) Servlets can handle only a single request, where as Applet can handle multiple requests
AppletViewer tool is available in which of the folder of JDK
There are also other operators, more linguistic in nature, called __________ that can be applied to fuzzy set theory.
1.Bin
2.Lib
3.Source
4.Class
Which is the method that starts the applet?
1.Main()
2.Destroy()
3.Init
4.Reprint
Which of the following concepts means adding new concepts to a program as it runs ?
1.Data hiding
2.Dynamic loading
3.Dynamic typing
4.dynamic binding
Match the following with respect to programming languages :
List -1 List - II
(A) Structured Language (i) JAVA
(B) Non-structured Language (ii) BASIC
(C) Object Oriented Language (iii) PASCAL
(D) Interpreted Language (iv) FORTRAN
Language Codes : A B C D
1.iii iv i ii
2.iv iii ii i
3.ii iv i iii
4.ii iii iv i
Important advantage of using new and delete operators in C++ is
1.Allocation of memory
2.Frees the memory previously allocated
3.Initialization of memory easily
4.allocation of memory and frees the memory previously allocated
Which LAN standard has the highest data rate?
1.10Base3
2.10Base-T
3.Twisted pair Token Ring
4.FDDI
Which of the following IP Network addresses is a reserved address?
1.127.0.0.0
2.130.58.0.0
3.197.65.10.0
4.4.0.0.0
When installing an Ethernet 10BASE-T network, what type of cable is used?
1.Fiber optic
2.Coaxial caple
3.Twisted pair
4.Wireless
The key requirement/s for a routing function in packet-switching networks is/are:
1.Efficiency
2.Correctness, Simplicity and fairness
3.Optimality, Robustness and stability
4.All of the above
In alternate routing scheme (circuit-switched networks), the responsibility to select the appropriate route for each call rests on the:
1.End station
2.Routing station or switch at mid point
3.Originating switch
4.End station and the originating switch
The length of a Hamiltonian path (if exists) in a connected graph of n vertices is
1.n
2.n - 1
3.n + 1
4.n / 2
A graph with n vertices and n – 1 edges that is not a tree, is
1.Euler
2.A circuit
3.Disconnected
4.Connected
The midpoint circle drawing algorithm also uses the __of the circle to generate?
1.two-way symmetry
2.four-way symmetry
3.eight-way symmetry
4.both (a) & (b)
Consider the following two statements:
P: Every regular grammar is LL(1)
Q: Every regular set has a LR(1) grammar
Which of the following is TRUE?
1.Both P and Q are true
2.P is true and Q is false
3.P is false and Q is true
4.Both P and Q are false
What is the appropriate pairing of items in the two columns listing various activities encountered in a software life cycle?
(P) Requirements capture (1) Module development and integration
(Q) Design (2) Domain analysis
(R) Implementation (3) Structural and behavioural modeling
(S) Maintenance (4) Performance tuning
1.P-3,Q-2,R-4,S-1
2.P-2,Q-3,R-1,S-4
3.P-3,Q-2,R-1,S-4
4.P-2,Q-3,r-4,s-1
No comments:
Post a Comment