Monday, April 27, 2015

1.Time sharing provides

1. Disk management

2.File System management

3.concurrent execution

4.all of the above


2. A process execution of the following code for(i=0;i

1.n

2.2n-1

3.2n

4.2n-1-1

3.The performance of Round Robin algorithm depends heavily on

1.size of the process

2.The i/o bursts of the process

3.The CPU burst of the process

4.The size of the time quantum

4.Match the following :

OLAP (A) Regression

OLTP (B) Data Warehouse

Decision Tree (C) RDBMS

Neural Network (D) Classification

(i) (ii) (iii) (iV)

(A) (B) (C) (A) (D)

(b) (B) (C) (D) (A)

(c) (C) (B) (A) (D)

(d) (C) (B) (D) (A)

1.a

2.b

3.c

4.d

5.In win32, which function is used to create windows application ?

1.winAPP

2.winAPI

3.WinMain

4.Winvoid

6.the GSM network is divided into the following three major systems:

1.55,BSS,055

2.BSS,BSC,MSC

3.CELL,BSC,OSS

4.SS,CELL,MSC

7.the document standards for EDI were first developed by large business house during the 1970s and are now under the control of the following standard organization :

1.ISO

2.ANSI

3.ITU-T

4.IEEE

8. a typical digital telephone channel in TDM circuits is allocated a speed of :

1.4 kbms

2.8 kbms

3.64 kbps

4.1.544 Mbps

9. Which of the following is not a WAN technology:

1.X.25

2.Frame Relay

3.ATM

4.None of the above

The coupling between different modules of a software is categorized as follows:

(I) Content coupling

(II) Common coupling

(III) Control coupling

(IV) Stamp coupling

(V) Data coupling

Coupling between modules can be ranked in the order of strongest (least desirable) to weakest (Most desirable)

as follows:

1.I,II,III ,IV ,V

2.V,IV,III,II,I

3.I,III.V.II.IV

4.IV,II,V,III,!

The proof of the proposition

“Every simple graph with at least two vectors has two vertices of equal degree” is based on

1.Inclusion-Exclusion principle

2.Pigeonhole principle

3.Elementory counting technique

4.None of the above

Which statement is true

1.The modal of deterministic finite machine includes the model of non-deterministic finite state

2.The modal of non-deterministic finite state machine includes the model of deterministic finite state as

3.Non-deterministic finite state machines are not more powerful than deterministic

4.None of the above

Algorithm to find optimal spanning tree is

1.Kruskal's algorithm

2.DEPTH-FIRST search

3.BREADTH-FIRST Search

4.none of the above

Which of the following is a good reason to use linked lists in a program?

1.To make execution faster

2.To access any element randomly

3.To allocate space dynamically whenever needed

4.To make deletion of elements easier

Which of the following operations is performed more efficiently by doubly linked list than by linear linked list?

1.Deleting a node whose location is given

2.Searching an unsorted list for a given item

3.Inserting a node after the node with a given location

4.Traversing the list to process each node

The rules which govern the formation of valid lexical units in the source program are

1.Syntax rules

2.Semantic rules

3.Lexical rules

4.Syntehesis phase

Consider the following statement about kernel level thread and user level thread. Which one of the following is false?

1.Context switch time is longer for kernal level threads than for user level threads

2.User level threads do not need any hardware suppprt

3.Related kernal level thread can be scheduled on different processors in multiprocessor system

4.Blocking one kernal level thread blocks all related thread

Fuzzy Set theory defines fuzzy operators. Choose the fuzzy operators from the following.

1.AND

2.OR

3.NOT

4.All of the above

There are also other operators, more linguistic in nature, called __________ that can be applied to fuzzy set theory.

1.Hedges

2.Lingual variable

3.Fuzz variable

4.None of the mentioned

What’s the difference between servlets and applets?

(1) Servlets executes on Servers, where as Applets executes on Browser

(2) Servlets have no GUI, where as an Applet has GUI

(3) Servlets creates static web pages, where as Applets creates dynamic web pages

(4) Servlets can handle only a single request, where as Applet can handle multiple requests

AppletViewer tool is available in which of the folder of JDK

There are also other operators, more linguistic in nature, called __________ that can be applied to fuzzy set theory.

1.Bin

2.Lib

3.Source

4.Class

Which is the method that starts the applet?

1.Main()

2.Destroy()

3.Init

4.Reprint

Which of the following concepts means adding new concepts to a program as it runs ?

1.Data hiding

2.Dynamic loading

3.Dynamic typing

4.dynamic binding

Match the following with respect to programming languages :

List -1 List - II

(A) Structured Language (i) JAVA

(B) Non-structured Language (ii) BASIC

(C) Object Oriented Language (iii) PASCAL

(D) Interpreted Language (iv) FORTRAN

Language Codes : A B C D

1.iii iv i ii

2.iv iii ii i

3.ii iv i iii

4.ii iii iv i

Important advantage of using new and delete operators in C++ is

1.Allocation of memory

2.Frees the memory previously allocated

3.Initialization of memory easily

4.allocation of memory and frees the memory previously allocated

Which LAN standard has the highest data rate?

1.10Base3

2.10Base-T

3.Twisted pair Token Ring

4.FDDI

Which of the following IP Network addresses is a reserved address?

1.127.0.0.0

2.130.58.0.0

3.197.65.10.0

4.4.0.0.0

When installing an Ethernet 10BASE-T network, what type of cable is used?

1.Fiber optic

2.Coaxial caple

3.Twisted pair

4.Wireless

The key requirement/s for a routing function in packet-switching networks is/are:

1.Efficiency

2.Correctness, Simplicity and fairness

3.Optimality, Robustness and stability

4.All of the above

In alternate routing scheme (circuit-switched networks), the responsibility to select the appropriate route for each call rests on the:

1.End station

2.Routing station or switch at mid point

3.Originating switch

4.End station and the originating switch

The length of a Hamiltonian path (if exists) in a connected graph of n vertices is

1.n

2.n - 1

3.n + 1

4.n / 2

A graph with n vertices and n – 1 edges that is not a tree, is

1.Euler

2.A circuit

3.Disconnected

4.Connected

The midpoint circle drawing algorithm also uses the __of the circle to generate?

1.two-way symmetry

2.four-way symmetry

3.eight-way symmetry

4.both (a) & (b)

Consider the following two statements:

P: Every regular grammar is LL(1)

Q: Every regular set has a LR(1) grammar

Which of the following is TRUE?

1.Both P and Q are true

2.P is true and Q is false

3.P is false and Q is true

4.Both P and Q are false

What is the appropriate pairing of items in the two columns listing various activities encountered in a software life cycle?

(P) Requirements capture (1) Module development and integration

(Q) Design (2) Domain analysis

(R) Implementation (3) Structural and behavioural modeling

(S) Maintenance (4) Performance tuning

1.P-3,Q-2,R-4,S-1

2.P-2,Q-3,R-1,S-4

3.P-3,Q-2,R-1,S-4

4.P-2,Q-3,r-4,s-1


No comments:

Post a Comment