You are on page 1of 22

bsc

4su
cce
ss.c
om

IT OFFICER MCQs
1.

Which of the following is a functionally complete gate?
1) AND
2) OR
3) NAND
4) NOT

5) None of these

2.

The XYZ bank Gujarat branch has all Cisco routers connect­ed in the network. The network
administrator Robert had re­placed one of the routers with a non­Cisco router. He then
configured PPP encapsulation on a Cisco router to enable communication between them.
Now, he wants to set HDLC back as the default protocol on the Cisco router. Which of the
following combinations will he use?
I. Interface serial [module_0/1] port_l and encapsulation hdlc.
II. Interface type [slot_2] port_l and encapsulation PPP.
III. Interface type [slot_2] port_l and encapsulation ppp and ppp pap sent-username jack
password system
1) III
2) II
3) I
4) I and II
5) None of these

3.

FDDI is
1) Ring Network
4) Bus based Network

4.

5.

2) Star Network
5) None of these

3) Mesh Network

Time sharing
1) Round Robin scheduling
3) First come First served
5) None of these

2) Priority scheduling
4) Non preemptive scheduling

Banker’s Algorithm is used as
1) Deadlock occurrence method
3) Deadlock detection method
5) None of these

2) Deadlock avoidence method
4) Deadlock recovery method

6.

Which of the following communications lines is best suited to interactive processing applications?
1) narrow band channel
2) simplex lines
3) full duplex lines
4) mixed band channels
5) None of these

7.

Which of the logic family has the lowest power delay product
1) ECL
2) TTL
3) IIL
4) MOS

8.

What is the output of the following C program main
()
{
int i = 32, j = 0 × 20, k, l, m;
K = i / j;
l = i & j;
m = k ^ l;
print f(“%d%d%d%d”, i, j, k, l, m);
1) 32 32 32 32 0
2) 0 0 0 0 0
4) 32 0 32 0 32
5) None of these

5) None of these

3) 32 32 32 32 32

Downloaded From: http://bsc4success.com

A design description of an object can take
1) A protocol description
2) An implementation description
3) Both 1) and 2)
4) Either 1) or 2)
5) None of these

bsc
4su
cce
ss.c
om

9.

10. Applet
1) It is an application that run inside a rectangular region on the web page
2) It can display animation, sound, games and general utilities
3) Its application is calculator and search engine
4) all of the above
5) None of these
11.

When you drop a ............. corresponding indexes are also dropped.
1) Column
2) Sequence
3) View
4) Table

5) None of these

12. What error are you likely to get when you run the following program?
main ( )
{
struct emp;
{
char name [20];
float sal;
}
struct emp e[10];
int i;
for(i = 0; i < =9; i++)
scanf(“%s%f”,e[i].name & e[i].sal));
}
1) Suspicious pointer conversion
2) floating Point formats not linked
3) Cannot use scanf () structures
4) Strings cannot be nested inside structures
5) None of these
13. The Bankers algorithm is used
1) To prevent deadlock in operating systems
2) To detect deadlock in operating systems
3) To rectify a deadlock state
4) All of the above
5) None of these

14. The following sequence of operations is performed one a stack
PUSH (10), PUSH (20).POP, PUSH (10), PUSH (20), POP, POP, POP PUSH (20), POP
The sequence of values popped out is
1) 20, 10, 20, 10, 20
2) 20, 20, 10, 10, 20
3) 10, 20, 20, 10, 20
4) 20, 20, 10, 20, 20
5) None of these
15. For a 25 MHz processor, what is the time taken by the instruction which needs 3 clock cycles.
1) 120 nano secs
2) 120 micro secs
3) 75 nano secs
4) 75 micro secs
5) None of these

Downloaded From: http://bsc4success.com

The range of the numbers that can be stored in 8 bits. Which of the following is not an operating system call for process management? 1) CREATE 2) DELETE 3) FORK/JOIN 4) PCB 5) None of these 17.. Choose the most appropriate definition of plane graph 1) A graph drawn in a plane in such a way that any pair of edges meet only at their end vertices 2) A graph drawn in a plane in such a way that if the vertex set of graph can be partitioned into two non-empty disjoint subsets X and Y in such a way that each edge of G has one end in X and one end in Y 3) A simple graph which is iso­morphic to a Hamiltonian graph 4) All of the above 5) None of these 23. is 1) –128 to + 128 2) –128 to 127 3) –127 to +128 4) –127 to + 127 5) None of these 22.. What is the output of the following ‘C’ program? main () { extern. y)= x + y 4) All of the above 5) None of these Downloaded From: http://bsc4success. int a. Boolean algebra 1) An algebraic system defined by Boolean lattice is known as a boolean algebra 2) For boolean lagebra (x + y)= x.a)’ } int a = 20 1) 0 2) 20 3) Error 4) Garbage value 5) None of these 20. An array can be passed in a function in C language through1) ‘Call by value’ only 2) ‘Call by reference’ only 3) Both ‘call by value’ and ‘call by reference’ 4) Tuple 5) None of these 19.bsc 4su cce ss. 1) 4 2)16 3) 24 4) 64 5) None of these 21...com ....c om 16. ER diagram is example of which data Model ? 1) Generic Data Model 2) Semantic Data Model 3) Relational Data Model 4) Special Data Model 5) None of these 18. y 3) For boolean algebra (x .. printf(“\n%d”.. if negative number are stored in 2’s complement form.bytes of data.. Fragment Free Switches check ..

s and that the page to be replaced is dirty 60% of the time. Which of the following statements is wrong? 1) no left recursive grammar can be LL1) Downloaded From: http://bsc4success. Memory access time is 1.. The main advantages of CMOS as compared to TTL 1) lower consumption and better noise margins 2) lower power consumption with low fan-out 3) higher speed operation with low power consumption 4) higher power consumption with high fan-out 5) None of these 29.. Packets are related to which layer 1) Data link layer 2) Physical layer 4) Presentation layer 5) None of these 3) Network layer 27.. A demand paging system with page table held in registers.. Which TTL sub-family has maximum speed 1) Standard TTL 2) Schottky-clamped TTL 4) Low power TTL 5) None of these 3) High speed TTL 32. What is the approximate page fault rate to meet this access time requirement? 1) 0. the compiler replaces the function call with the corresponding function code.01% 5) None of these 26.c om 24 25.. Rohan has an e-card that he uses to access different parts of his company’s R&D offices. Which of the following might be output as result of using a CASE tool? 1) Programmable Code 2) Flowcharts and data flow diagrams 3) Prototypes and Cost/benefit analysis 4) All of the above 5) None of these 31.s. Assume we want an effective access time 23. 1) Memory allocation function 2) Member function 3) Inline function 4) Default function 5) None of these bsc 4su cce ss...5% 4) 0. Feedback queue 1) are very easy to implement 2) dispatch tasks according to execution characteristics 3) are used to favour real-time tasks 4) require manual interven­tion to implement properly 5) None of these 28... That is.1% 2) 1.. takes 5 ms to service a page fault.. if empty page is available or if the page is to replaced is not dirty. What type of card is he using? 1) Credit card 2) Purchase card 3) Smart card 4) Contact card 5) None of these 30..com . is a function that is expanded in line when it is invoked.0% 3) 2. It takes 15 ms if the replaced page is dirty.

. Which of the following is most general phase-structured grammer? 1) Regular 2) Context-sensitive 3) Context-free 4) All of the above 5) None of these 36. Handshaking is 1) synchronous type 4) All of these 2) asynchronous 5) None of these 40... The correct hierarchical relationship among context-free. The . 2) This algorithm finds the boolean path matrix P of the graph G 3) Both 1) and 2) 4) Either 1) or 2) 5) None of these 35.com .. Warshall’s algorithm 1) A directed graph G with M nodes is maintained in memory by its adjacency matrix A.c om 2) no LL 1) grammar can be ambiguous 3) every LR1) grammar is an LL1) grammar 4) every grammar can be converted into LR1) 5) None of these 33. right-linear. 1) Attribute 2) Instance 4) Operations 5) None of these 3) Classification 34. Which of the following fields in a student file can be used as a Primary Key? 1) Class 2) Social Security Number 3) GPA 4) Major 5) None of these 38.... of its class.. device provides a digital interface for connecting routers and digital circuits ? 1) Channel service unit 2) Modem 3) Adapter 4) Router 5) None of these 39. Each object is said to be ... The translator which performs macro-expansions is called 1) Macro Interpreter 2) Macro Pre-Processor 3) Macro Table 4) All of the above 5) None of these Downloaded From: http://bsc4success...bsc 4su cce ss.. The class of context-free languages is not closed under 1) union 2) concatenation 4) intersection 5) None of these 3) sequential 3) repeated concatenation 41. The process of macro-expanion is completely segregated from the process of assembly program... and context-sensitive language is given by 1) context-free < right-linear < context-sensitive 2) context-free < context-sensitive < right-linear 3) context-sensitive < right-linear < context-free 4) right-linear < context free < context-sensitive 5) None of these 37.

(b. (3. b)} be a relation from A to B. a). 2)]} 2) R–1 = {(2. 3}. l). 2.com . printf(“\n%d%d%d”. (b. (1. l)} 4) All of the above 5) None of these 48. (a. (3. production rule 2) Declaration. 3).c om 42. a)} 3) R1 = {(b. (2. b). 1) Garbage Values 2) 2 3 3 4) 0 0 0 5) None of these 43. RISC processor have 1) Relatively few instruction and addressing modes 2) All operations done within the register and CPU 3) Single cycle instruction execution 4) All of these 5) None of these 45.3}. (a. a[3]. What is the output of the following C program? main () { int a[5] = {2. translation rules. B = {a.a[2]. non-terminal symbol.a[4]). Which one is not logical 1) ORI 2) ORA 3) XRA 3) 3 2 2 4) OVI 5) None of these 44. (b. b). b). (l.bsc 4su cce ss. C programs 4) All of the above 5) None of these 49. (a. How many bit can accomodate instruction register 1) 8 bit 2) 16 bit 3) 32 bit 4) 4 bit 5) None of these 47. Which of the following are Yacc source program parts? 1) Terminal symbol. Back tracking problem is seen in 1) predirective parser 2) LR parsar 3) recursive-descent parsar Downloaded From: http://bsc4success. The inverse relation R is 1) R–1 = {(a. b} and R= {(1. A loading scheme in which loading and linking of external and references are postponed until execution time 1) Direct linking loader 2) Dynamic loading 3) Dynamic linking 4) Relocating loader 5) None of these 50. l). Yacc source program has 3 parts. (l. Let A = {l. l). 2). a). TCP means 1) transmission content protocol 3) transmission control protocol 5) None of these 2) transfer control protocol 4) all of the above 46. a). user routines 3) Declaration. 3). Translation rules.

..com . 4) All of the above 5) None of these 3) Ken Thompson 59. b. 1) VLAN1 and VLAN2 2) Cisco 2950 and Cisco 1900 3) ISL and 802. both providing basic trunking. Which of the following is the correct simplification of Boolean expression A`BC + AC? 1) BC+AC 2) BC+C 3) BC 4) A`C 5) None of these 53. Goal of a relational database design 1) To generate a set of relation schemes that allow us to store information without unnecessary redundancy 2) Allows us to retrieve information easily 3) Schemes that are in appropriate normal form 4) All of the above 5) None of these 57.... Scope of macro definition 1) cannot be beyond the file in which it is defined 2) may be part of a file 3) is in the entire program 4) a... Which of the following language differ the case of alphabets? 1) FORTRAN 2) BASIC 4) All of the above 5) All of the above 3) C 56.......1Q 4) Client and Transparent 5) None of these 55... Firewall have 1) two routers for packet filtering 2) application gateway...6 4) All of the above 5) None of these 3) Support on all platform 58......... On what platform is multithreading supported? 1) IDL5... and . Cisco switches supports two different trunking protocols .c om 51...4) All of the above 5) None of these bsc 4su cce ss... Which of the following is used with databases? 1) Data mining 2) EDI 4) All of the above 5) None of these 3) Credit cards Downloaded From: http://bsc4success. The first version of UNIX was written by 1) Dennis Ritchie 2) Andrew S.5 2) IDL 5. it is used in application layer 3) both 1 and 2 4) All of the above 5) None of these 52.. d 5) None of these 54...

com ..) 4) Tilde (~) 5) None of these 69. To modify existing row of the table.. ... Match the following: List-I (i) TTL (ii) ECL (iii) MOS (iv) CMOS Codes: (i) (ii) (iii) 1) a b c 2) b a d 3) c d a 4) d a c 5) None of these 4)... The receive equalizer reduces delay distortions using a 1) tapped delay time 2) descramber 4) All of the above 5) None of these 3) difference engine 66... Which of the following do you think is used to separate the base classes in a base class list? 1) Comma (. Recently which operating system launched its Hindi version? 1) MINIX 2) LINUX 3) DOS 4) All of these 5) None of these 65.c om 61. 1) RIP 2) OSPF 3) IGRP 4) EIGRP 5) None of these 64....) 2) Colon (:) 3) Semi-colon (. Which operator has highest priority 1) ( ) 2) [ ] 3)  5) None of these bsc 4su cce ss.. is an Interior Gateway Protocol that manage the exchange of routing of table information.. Bit is related to which layer 1) physical layer 4) transport layer 3) network layer 2) data link layer 5) None of these 67..60.. Spatial locality refers to the problem that once a location is referenced 1) a nearby location will be referenced soon 2) it will not be referenced again. n stage ripple counter can count up to 1) 2n 2) 2n – l 3) n 4) 2n–1 5) None of these 68. statement is used. The. 3) it will be referenced again 4) All of the above 5) None of these Downloaded From: http://bsc4success... 1) ALTER 2) MODIFY 3) UPDATE 4) All of the above 5) None of these 63.... List-II (a) Unipolar (b) PMOS connected in a complementary fashion (c) 5 volts (d) High Speed (v) d c b b 62..

both having same number of nodes... What is the minimum number of wires needed to send data over a serial communication link layer ? 1) 1 2) 2 3) 4 4) 6 5) 7 bsc 4su cce ss. uses the Diffusing Update Algorithm to update the routing table.. Which of the following statement is not True? 1) We use views to restrict data access 2) We use views to make complex queries difficult 3) We use views to allow data independence 4) All of the above 5) None of these 75. The base difference between broad band and baseband is 1) availability 2) capacity 3) transmission 4) reliability 5) None of these 76. When two numbers of n digits each are added and the sum occupies n + 1 digits.com ... To discard all pending data changes 1) COMMIT 2) ROLLBACK 4) LOCK 5) None of these 3) SAVEPOINT 72.. 1) RIP 2) OSPF 3) IGRP 4) EIGR 5) None of these 79.c om 71. (ii) and (iii) 4) (i) and (iii) 5) None of these 77. the situation is called 1) Overflow 2) Underflow 3) Normal condition 4) All of the above 5) None of these 73. Whick of the following statements are true about doubly linked list? (i) It may be either linear or circular (ii) it must contain a header node (iii) it will occupy same memory space as that of linear linked list. A computer system having 64 K memory will have its last address as 1) 65536 2) 64000 3) 65535 4) 65530 5) none of the above Downloaded From: http://bsc4success... 1) only (i) 2) (ii) and (iii) 3) (i). An assembler is a 1) Program 2) Person who assembles the parts 3) Symbol 4) language 5) None of these 74..70. Which one is false 1) shift registers operate in serial fashion one bit at a time 2) parallel processing techniques are economically feasible 3) register with parallel load operate with all the bits of the word simultaneously 4) all of the above are true 5) None of these 78 .

Reusability. Usability. Testability 3) Portability. A pilot can fly three types of planes and a plane can be piloted by any qualified pilot.80. DES 1) Data Encryption standard was widely adopted by the industry for use in security products 2) It is no longer secure in its original form.000 Downloaded From: http://bsc4success. Which of the following commands can be used to get information about all users who are currently logged into the system? 1) which 2) who 3) who am i 4) All of the above 5) None of these 87. Flexibility. In­teroperability 4) All of the above 5) None of these 85. Reliability.c om 81. but in a modified form it is still useful 3) Plain text is encrypted in blocks of 64 bits 4) All of the above 5) None of these 89.char*j) is 1) call by value 2) call by reference 4) invalid function definition 5) None of these 3) both 1) and 2) bsc 4su cce ss. McCall proposed which of the following quality factors? 1) Correctness. The smallest element of an array’s index is called its 1) Smallest bound 2) Lower bound 4) Higher bound 5) None of these 3) First bound 83. How many transistor is LSI 1) more than 100 4) more than 10 2) more than 1000 5) None of these 3) more than 10. Integrity. The pilotplane type relationship is 1) N : 3 2) 3 : N 3) 1 : 3 4) 3 : 1 5) None of these 88. Which of the following is Network Security aspect? 1) Patch management 2) Firewalls 3) Intrusion Detection System (IDS) 4) All of the above 5) None of these 82. A communications device that combines transmissions from several I/O devices into one line is a: 1) concentrator 2) modifier 3) multiplexer 4) full-duplex line 5) None of these 86. Efficiency 2) Maintainability. Which of the following file name extension suggests that the file is Backup copy of an other file? 1) TXT 2) COM 3) BAS 4) BAK 5) None of these 84. Function definition void check (int i.com .

90. 4) Debit card can be issued to PMRY beneficiaries. Downloaded From: http://bsc4success. the techniques associated with object oriented Analysis can be coupled with an information engineering approach.c om List-II (a) Strobe Control Method (b) Booth Algorithm (c) Flip-flop (d) Cache (i) (ii) 1) a b 2) d c 3) c a 4) c d 5) None of these (iii) c b d a (iv) d a b b 91. The network administrator Paul requires configuring a primary rate interface for the XYZ bank Hyderabad branch. 93. 2) These cards facility are not extended to cash and loan account. if (a = 0) printf (“a is zero”). At the business or enterprise level. What is the output of given C fragment program. 5) None of the above. Which of the following is not a type of graph? 1) Euler 2) Hamiltonian 3) Tree 4) Path 5) None of these 95. This technique is often called 1) Requirement Analysis 2) Domain Analysis 3) Entity Analysis 4) Relationship Analysis 5) None of these 92. Match the following: List-I (i) State Table (ii) Locality of Reference (iii) Asynchronous Data Transfer (iv) 2S Complement Multiplication Codes: (i) (ii) (iii) (v) bsc 4su cce ss. A video editing system for Linux 1) DVDL 2) LIVES 4) LVS 5 ) None of these 3) VSL 96. Which is the correct statement regarding debit/smart card ? 1) Banks are generally extending this facility to saving account with liquidity features.com . He needs to specify the switch type for ISDN while configuring PRI. Which command will he use? 1) isdn switch-type basic-ni 2) isdn switch basic-ni 3) isdn switch-type pri-4ess 4) isdn switch pri-4ess 5) None of these 94. 3) Both 1) and 2).

Which of the following performs modulation and demodulation? 1) Fiber optic 2) satellite 4) modem 5) none of the above 3) coaxial cable 103. VSAT means 1) Very Small Amplitude Transmission 2) Very Small Apertual Terminal 3) Very Small Apertual Transmission 4) Very Small Amplitude Terminal 5) None of these 104.com . such as memory and disk drives. Which of the following is not characteristic of a relational database model? 1) Tables 2) treelike structure 3) complex logical relationship 4) records 5) None of these 99. 1) a is zero 2) prints nothing 3) a is not zero 4) Garbage value 5) None of these 97. Speed of optical fiber depends on 1) number of photon 2) dispersion 4) All of these 5) None of these 3) attenuation Downloaded From: http://bsc4success. A system program that separately compiles modules of a program into a form suitable for execution is 1) Assembler 2) Linking loader 3) Cross compiler 4) Load and go 5) None of these 98.c om else printf (“a is not zero”). In fiber optics index angle is 1) less than cladding angle 2) greater than cladding angle 3) equal to the cladding angle 4) All of the above 5) None of these 105. Which of the following software tool is a parser generator? 1) Lex 2) Yacc 3) Both 1 and 2 4) Either 1) or 2) 5) None of these 101. You are writing classes that will bypass the operating system which directly access several system resources.bsc 4su cce ss. Which language is probably the best? 1) C++ 2) Cobol 3) Java 4) Small talk 5) None of these 102. concept of developing a compiler for a language by using subsets of the same language 1) Bootstrap 2) Lex 3) Yacc 4) Analyzer 5) None of these 100.

In a synchronous modem. the digital-to-analog converter transmits signal to the 1) equalizer 2) modulator 3) demodulator 4) terminal 5) none of the above 108. The function of a database is 1) to check all input data 2) to check all spelling 3) to collect and organize input data 4) to output data 5) None of these 109..... Which kind of lock includes a keypad that can be used to control access into areas ? 1) Cipher 2) Warded 3) Device 4) Tumbler 5) Typelock 113....106. The .... Which gate is known as Universal gate? 1) NOT gate 2) AND gate 4) XOR gate 5) None of these 3) NAND gate 114.... A relation schema is said to be in .... How many NAND gates are needed to perform the logic function X.com . When both inputs are different.Y? Downloaded From: http://bsc4success. 1) Unnormalized 2) First Normal 3) Boyce Codd 4) All of these 5) None of these 112. Railway reservation is example of 1) On line system 2) Off line system 4) time sharing 5) None of these 3) batch processing 111.. UNIX operating syste based on 1) Language structure 4) Time sharing 2) Kernel approach 5) None of these 116.c om 107.. Context switching changes the process mode from 1) user to kernel mode 2) kernel to user mode 3) kernel mode to the k process 4) both 1 and 2 5) None of these 115. form if the values in the domain of each attribute of the relation are atomic. Type checking is normally done during 1) Lexical analysis 2) Syntax Analysis 4) Code optimization 5) None of these 3) Virtual machine 3) Syntax directed translation 117. command enables you to switch from the user mode to privileged mode... 1) enable 2) disable 3) config 4) switch 5) None of these 110. then output is high in 1) NAND GATE 2) NOR GATE 4) EX-OR Gate 5) None of these 3) OR Gate bsc 4su cce ss...

. Which directory implementation is used in most Operating System ? 1) Single level directory structure 2) Two level directory structure 3) Tree directory structure 4) Acyclic directory structure 5) None of these 121. 1) hostname 2) name 3) banner 4) router 5) None of these 123. the ray is refracted. Which of them is not a valid DBMS Data Model ? 1) Relational 2) Hierarchical 3) Complex 4) All of the above 5) None of these 3) a business form 4) Network 5) None of these Downloaded From: http://bsc4success. When ray passes through fused silica to air. focus on the 1) Process 2) Project 3) Product 4) All of these 5) None of these 124. Which of the following printers cannot print graphics? 1) Ink-jet 2) Daisywheel 3) Laser 4) Dot-matrix 5) None of these 122.. Wait and notify used in 1) A synchronous method 2) Synchronous method 3) Sequential method 4) Parallel method 5) None of these 119.... The.. The model for a record management system might be 1) handwritten list 2) a Rolodex Card file 4) All of the above 5) None of these 127.. HTTP means 1) Hypertext transfer protocol 2) Hypertext transmission protocol 3) Hypertension transfer protocol 4) All of the above 5) None of these 120.c om 118... then light trapped by 1) refraction 2) reflection 3) total internal reflection 4) All of the above 5) None of these 125...1) 1 2) 2 3) 3 4) 4 5) None of these bsc 4su cce ss. Which one is input device 1) DVD 2) Trackball 3) Digitizers 126.. Software quality metrics like productivity metrics. command enables you to change the name for the router.com .

. 8085 memory is 1) 1 M byte 2) 64 Kbte 3) 64 K bit 3) High data density 4) 64 byte 5) None of these 142. 10 symbols and 10 numerals 1) 5 2) 6 3) 7 4) 46 5) None of these 134. In K-map.. the adjacent squares represent minterms that differ by 1) One variable 2) Two variable 3) Three variable 4) All of these 5) None of these 132. Data transfer rate of a double density floppy disk is about 1) 5K bits/sec 2) 50K bits/sec 4) 5000K bits/sec 5) None of these 3) 500K bits/sec 133. How many bits are required to encode all 26 letters.... Which of the following operator is used to access the value of structure pointer? 1)  2) & 3) * 4) . Raid configuration of disks are used to provide 1) Fault tolerance 2) High speed 4) All of the above 5) None of these 141.. One can display all columns of data in a table by following the SELECT keyword with 1) + 2) * 3) – 4) ? 5) None of these 140. If initialization is a part of declaration of a structure... it is called 1) Stealing 2) Intrusion 3) Virus 4) All of these 5) None of these 138. 1) Statements 2) Messages 3) Control 4) All of these 5) None of these 131..com ...bsc 4su cce ss.. The .. Link encryption Downloaded From: http://bsc4success.... 1) Waterfall 2) Incremental 3) Spiral 4) All of these 5) None of these 137. Which of the following consists of an array of gates which can be used to patch an error in a ROM or alter the meaning of instruction 1) RAM 2) EAPROM 3) PLA 4) PSW 5) None of these 129... Actions are performed in an object oriented systems by sending .. 5) None of these 135. 1) line console 2) line vty 3) enable password 4) enable secret 5) None of these 130.c om 128... When a cracker attempts to misuse or steal data from a system. model remains operative until the software is retired. then the storage class can be 1) automatic 2) register 3) static 4) anything 5) None of these 136.... comand enables you to set encrypted passwords for the privileged mode.. Which of the following does not allow multiple users or devices to share one communication line? 1) double-plexer 2) multiplexer 3) concentrator 4) controller 5) None of these 139. The .... to an object.

.. Fiber optics frequency have 1) 105 to 107 4) 1014 to 1015 2) 106 to 109 5) None of these 3) 109 to 1011 146. Subnet Mask of class A is 1) 255. Seeta has an e-card that she uses to purchase office supplies for the company she works for.bsc 4su cce ss. What type of smart card is she using? 1) Credit card 2) Purchase card 3) Smart card 4) Contact card 5) None of these 148..0. changing and delecting file records is called file 1) Updating 2) Upgrading 3) Restructuring 4) History file 5) None of these 150.0.0. Periodically adding. What is hamming distance code for correcting? 1) 2d + l 2) d + 1 3) 2d + 3 4) d + 3 5) None of these 151...0.0.0. 1) Primary key.. Primary key 4) Transaction key. Which one is related to modulator and demodulator 1) multiplexer 2) decoder 4) modem 5) None of these 3) encoder 147.. Foreign key 5) None of these Downloaded From: http://bsc4success..com . Foreign key 2) Composite key.0 4) 224.0. Integrity rule 1 is concerned with ... Primary key 3) Foreign key...... and integrity rule 2 is concerned with . The relational model includes two general integrity rules.0 2) 192. What is the name of the printer which print all the As in a line before all the B’s? 1) Thermal printer 2) Electrostatic printer 3) Line printer 4) Ink-jet printer 5) None of these 145.c om 1) is more secure than end to end encryption 2) is less secure than end to end encryption 3) cannot be used in public network 4) is used only to debug 5) None of these 143. HDLC is 1) Bit oriented 4) All of the above 2) Code transparent 5) None of these 3) Code dependent 144.1 152.0.0 5) None of these 3) 255.. Stack is sometimes called a 1) Push down list 4) Pop up array 2) Pushdown array 5) None of these 3) Pop down list 149.

In comparison with static RAM memory. printf (“% d”. Which routing protocol will you implement for the ABC bank 1) OSPF 2) RIP 3) IGRP 4) EIGRP 5) None of these 157.153. the dynamic RAM memory has 1) lower bit density and higher power consumption 2) higher bit density and higher power consumption 3) lower bit density and lower power consumption 4) higher bit density and lower power consumption 5) None of these 155. The ABC bank needs to decide on a routing protocol for its large enterprise networks. x). Which of the following operators can be overloaded in C++? 1) Scope resolution operator 2) Size of operator 3) Conditional operator 4) Arithmetic operator 5) None of these 158. An interactive computer system 1) It provides on line communication between user and system 2) user gives instruction to the operating system or to a program directly. x = (y* = 2) + (z = a = y). and receives an immediate response 3) both 1) and 2) 4) None of these Downloaded From: http://bsc4success.c om 5) None of these 154. The bank has a mixed vendor environment and may need to replace any of its existing routers. Which of the following is an advantage to using fibre optics data transmission ? 1) resistance to data theft 2) fast data transmission rate 3) low noise level 4) all of these 5) None of these 160.com . z. Which is the output of the following program fragment in C? int x. It needs to follow the bank policy and requires an open standard routing protocol. A multiplexer with a 4 bit data select input is a 1) 4 : 1 multiplexer 2) 2 : 1 multiplexer 4) 8 : 1 multiplexer 5) None of these 3) 16 : 1 multiplexer 159. V. 1) 7 2) 8 3) Garbage value 4) Error bsc 4su cce ss. y =2. a .24 1) It is similar to multiplexer 2) It is similar to Modem 3) It is similar to Demultiplexer 4) All of the above 5) None of these 156.

c om 162. Consider a machine with 64 MB physical memory and a 32 bit virtual address space. Which of the following is different from the group? 1) Private 2) Protected 3) Public 4) Friend 5) None of these bsc 4su cce ss.... Each item in a linked list is called 1) Element 2) Information 3) Data 4) Node 5) None of these 167. Which of the following gates would output 0 if inputs are equal. The access time of magnetic bubble memory is approximately 1) 30 ns 2) 30 ms 3) 30 ms 4) 0......3 sec 5) None of these 170. metric specifies the amount of data that can travel over the network segment.. Which of the following sorting method is stable? 1) Straight insertion sort 2) Binary insertion sort 3) Shell sort 4) Heap sort 5) None of these 163. None of the processes involved in this circular wait are making progress. is the situation in which a process is waiting on another process.. what is the approximate size of the page table? 1) 16 MB 2) 8 MB 3) 2 MB 4) 24 MB 5) None of these 169.5) None of these 161... Length of the walk of a graph is 1) The number of vertices in walk W 2) The number of edges in walk W 3) Total number of edges in a graph 4) Total number of vertices in a graph 5) None of these 166.. 1) Hops 2) Load 3) Delay 4) Bandwidth 5) None of these 165. .. Which of the following is not a page replacement algorithm? 1) LIFO 2) FIFO 3) LRU 4) Optimal 5) None of these Downloaded From: http://bsc4success.. which is also waiting on another process. 1) NAND 2) NOR 3) EX-OR 4) OR 5) None of these 171. The . 1) Deadlock 2) Starvation 3) Dormant 4) All of the above 5)None of these 168. which is waiting on the first process. If the page size is 4 KB. Which of the following C++ statement is correct? 1) int*p = new int 2) int new = *p 3) int*new = *p 4) int*p = int new 5) None of these 164....com .

bsc 4su cce ss...com . transport.. Which command will the administrator Robert uses to print the messages or the console part: 1) terminal monitor 2) terminal print 3) console print 4) console monitor 5) None of these 180. the bit coding scheme used to represent a byte is typically 1) EBCDIC 2) ASCII 3) SNA 4) Hexadecimal 5) None of these 182. which has no predecessor is 1) Spanning tree 2) Rooted tree 4) All of the above 5) None of these 3) Weighted tree 176. transport layer 2) physical layer. What is the alternative name for a diskette? 1) Winchester disk 2) flexible disk 4) floppy disk 5) None of these 3) hard disk 175. physical layer 4) all of the above 5) None of these 173. if J = K.. In a JK flip-flop. Memory protection is normally done by 1) the processor and the associated hardware Downloaded From: http://bsc4success. metric measures traffic over the network. transport layer 3) network. An unnormalized relation contains values 1) Atomic 2) Non-atomic 4) All of the above 5) None of these 3) Classified 183. The. 1) Hops 2) Load 3) Delay 4) Bandwidth 178.. Parsing can be 1) Top-down 2) Bottom up 3) Both 1) and 2) 4) Either 1) or 2) 5) None of these 174. In data transmission. In C++ a function contained in a class is called 1) Member function 2) an operator 4) a method 5) None of these 3) a class function 181. Subnet is related to which layer 1) data link layer.. the resulting flip-flop is referred to as a 1) D flip-flop 2) T flip-flop 4) All of the above 5) None of these 5) None of these 3) S-R flip-flop 179.c om 172. The XYZ bank has all Cisco routers connected in the network. A tree having a main node. A host connects to a router through telnet connection.. If an entity appears in not more than 5 relationships then it is a : 1) 1 : 1 relationship 2) 1 : 5 relationship 4) 5 : 5 relationship 5) None of these 3) 5 : 1 relationship 177.. Network layer.. Network layer.

Which of the following TCP/ IP protocol is used for remote terminal connection services? 1) TELNET 2) FTP 3) RARP 4) UDP 5) None of these Downloaded From: http://bsc4success. then error be catch by at 1) Compiler time 2) Intrepreter 3) Debugging 4) Run time 5) None of these 186. Gopher is 1) Gopher was text only global set of linked menus and files 2) Gopher is a browser 3) Both 1 and 2 4) Either 1) or 2) 5) None of these 189. What is the min number of two input NAND gates used to perform the function of two input OR gate? 1) 1 2) 2 3) 3 4) 4 5) None of these 187. The intersection of L1 and L2 is given by 1) (a+b)*ab 2) ab(a+b)* 3) a(a+b)*b 4) b(a+b)*a 5) None of these 192.2) the operating system 3) the compiler 4) the user program 5) None of these bsc 4su cce ss. When any positive integer is divided by zero.com . An audit trail 1) is used to make back-up copies 2) is the recorded history of operations performed on a file 3) can be used to restore lost information 4) none of the above 5) None of these 188. 1) Robustness 2) Flexibility 3) Convergence 4) Optimal Route 5) None of these 194. Port number of HTTP is 1) 25 2) 80 4) 123 5) None of these 3) 125 191. OR. OR 2) NOR 4) AND.c om 184. Which of the following is not functionally a complete set? 1) AND. The sum of weights in self complement BCD code is 1) 8 2) 9 3) 10 4) 16 5) None of these 190. NOT 5) None of these 3) NAND 193. Consider two regular languages L1= (a + b) *a and L2 = b(a + b)*. Most significant bit is 1) S 2) CY 3) Z 4) P 5) None of these 185. Thedesign goal refers to the ability of the routers to agree on optimal routes.

1 43. 4 95. 2 75. 3 60. 1) Response 2) Waiting 3) CPU 4) Process 5) None of these 200. 1 52.. 2 79. 4 37. 3 62. 1 18.. 3 90. 2 19.. 1 27. 2 10. 3 56. 4 16. 1 65. 2 51.com . 1 74. 2 69. 4 41. 2 17. 4 93. 3 39. 1 78. Which of the following calls never returns an error 1) getpid 2) fork 3) ioctl 4) open 5) None of these 199 . 1 64.. 2 22. 3 66. 3 85.. 2 72.. 3 53. 1 8. 2 38.. 3 84. 3 29. 2 44. 1 68. 4 30. 4 82. Port number of SMTP is 1) 25 2) 80 3) 123 4) 243 5) None of these ANSWERS 1. 1 20. 1 9.. 3 54. 2 2. 3 63. 3 14. 3 34. 2 91. 3 59. 4 49. 3 55. 2 42. 4 21... 3 50. 4 45. 4 47. 2 7. 1 92. 1 13. 4 83. Smart card 1) has an integrated with micro processor chip embedded in it so it could perform calculation and maintain records 2) has built for protection against fraudulent operations 3) can either be recharge or exchangeable 4) All of the above 5) None of these 198.. 3 3. 2 94. 2 Downloaded From: http://bsc4success. time is expressed as turnaround time less actual execution time. 2 26. 1 57.. 4 88. 3 11.. 4 61. 3 31. 1 73.. 4 15. 2 32..bsc 4su cce ss. Software design is 1) Process 2) Model 3) Both 1) and 2) 4) Either 1) or 2) 5) None of these 197.c om 195. 4 25. 2 80. 1 77. 4 48. 4 58. 2 40. 4 35. 4 86. 2 87. 3 67. 3 6. 1 71. 4 89. 1 81. 3 12. 1 33. 3 23. 2 76. 3 4.. 2 36. Which of the following TCP/ IP protocol is used for transferring electronic mail messages from one machine to another? 1) FTP 2) SNMP 3) SMTP 4) RPC 5) None of these 196. 4 5. 1 70. 4 24.. 2 46. 4 28.

3 193. 2 103. 1 153. 2 126. 1 189. 4 196. 1 136. 3 140. 1 188. 1 168. 4 162. 3 132. 1 172. 3 125. 2 102.97. 2 187. 2 142. 3 137. 3 178. 1 127. 1 114. 3 200. 1 184. 4 123. 3 165. 1 199. 4 159. 1 bsc 4su cce ss. 4 119. 2 116. 1 161. 2 147. 4 130. 4 171. 1 145. 2 150. 3 149. 1 110. 1 139. 3 129. 4 134. 4 169. 2 180. 3 118. 4 98. 2 122. 1 143. 1 185. 2 195. 1 176. 1 99. 2 100. 2 181. 1 167. 2 120. 3 121. 2 108. 3 174. 1 197. 2 160. 4 166. 3 141. 1 154. 1 148. 4 111. 3 198. 1 124. 3 191. 4 179. 2 183.c om 96. 2 192. 2 158. 3 173. 2 170. 4 131. 2 152. 2 105. 2 144. 1 109. 1 156. 3 Downloaded From: http://bsc4success. 4 128. 1 104. 2 138. 1 157. 3 133. 4 107. 1 117. 2 186. 3 175. 2 106. 1 112. 4 151. 2 135. 4 190. 3 101. 3 163. 1 155. 4 164. 2 194. 1 115. 2 146. 1 177. 2 182.com . 3 113.