You are on page 1of 9

1 ) What was originally called the "imitation game" by its creator?

[A] The Turing Test


[B] LISP
[C] The Logic Theorist
[D] Cy bernet ics
Ans: A
2) In analy zing the compilation of PL/I program, the term "Lex ical analysis" is associated with
A.recognition of basic syntactic constructs through reductions.
B.recognition of basic elements and creation of uniform sy mbols
C.creation of more optional matrix.
D.use of macro processor to produce more optimal assembly code
Answer: B
3) Which is a permanent database in the general model of compiler?
A. Literal Table
B. Identifier Table
C. Terminal Table
D. Source code
E. None of the abov e
Answer: C
4) MSI stands for
[A] Medium Scale Integrated Circuits
[B] Medium Sy stem Integrated Circuits
[C] Medium Scale Intelligent Circuit
Ans: A
5) The main difference between JK and RS flip -flop is that?
[A] JK flip-flop does not need a clock pulse
[B] there is feedback in JK flip-flop
[C] JK flip-flop accepts both inputs as 1
[D] JK flip-flop is acronym of junction cathode multivibrator
Ans: C
6) Where does the DNS reply go to in a single HTTP redirect?
a. Browser
b. Client
c. Serv er
d. DNS Serv er
Ans: A
7 ) In MS-Access to Refresh the contents of a Lookup field (Lookup field: A field, used on a form or
report in an Access database, that either displays a list of v alues retrieved from a table or query, or
stores a static set of v alues.) list box or combo box
[A] F4 or ALT+DOWN ARROW [B] DOWN ARROW [C] PAGE DOWN [D] F9
Ans: D
8) Which of the following derivation a top-down parser use while parsing an input string? The input is
assumed to be scanned in left to right order ?
[A] Leftmost derivation
[B] Leftmost derivation traced out in rev erse [C] Rightmost derivation
[D] Rightmost derivation traced out in reverse
Ans: A
9) Routine is not loaded until it is called. All routines are kept on disk in a relocatable load format. The
main program is loaded into memory & is ex ecuted. This ty pe of loading is called... ?
[A] Static loading [B] Dy namic loading [C] Dy namic linking [D] Ov erlays
Ans:C
10) Which logic family dissipates the minimum power?
A.DTL
B.TTL
C.ECL
D.CMOS
E.None of the abov e
Ans:D
11) If y ou will be displaying or printing y our document on another computer, y ou’ll want to make sure
and select the _____________ option under the ‘Save’ tab.
A) Embed Fonts
B) Embed True Ty pe Fonts
C) Sav e True Ty pe Fonts
D) Sav e Fonts
Ans: B
12) The technology whereby part of the program is stored on disk and is brought into memory for
ex ecution as needed is called
(a) memory allocation
(b) v irtual storage
(c) interrupts
(d) prioritized memory
Ans:B

13) Which one is a v alid declaration of a boolean?


a) boolean b1 = 1 ;
b) boolean b2 = ‘false’;
c) boolean b3 = false;
d) boolean b4 = ‘true’
Answer: C

14) Weak AI is
a) the embodiment of human intellectual capabilities within a computer
b) a set of computer programs that produce output that would be considered to reflect intelligence if it
were generated by humans
c) the study of mental faculties using mental models implemented on a computer.
d) All of the mentioned
Answer: C
15) For each attribute of a relation, there is a set of permitted values, called the ________ of that
attribute.
a) Domain
b) Relation
c) Set
d) Schema
Answer: A
16) Which approach to speech recognition avoids the problem caused by the differences in the way words
are pronounced according to context?
a) continuous speech recognition
b) connected word recognition
c) isolated word recognition
d) speaker-dependent recognition
Answer: C
17 ) What is a Y -Connector? '
(a) A'Y -Shaped splitter cable that divides a source input into two output signals.
(b) A Y -Shaped splitter connector that div ides a source input into two output signals.
(c) A Y -Shaped splitter card that divides'a source input into two output signal s.
(d) None of the abov e
Answer: B
1 8) To av oid the race condition, the number of processes that may be simultaneously inside their critical
section is
[A] 8 [B] 1 [C] 1 6 [D] 0
Ans: B.

19) What will be the output of the following PHP code ?


1 .<?php
2.if (!print“hi”)
3. if (print“hello”)
4.print“hi”;
5.?>
a) hi
b) hihellohi
c) hihi
d) no output
Ans: A

20) In a sy nchronous modem, the receive equalizer is known as


a. adaptive equalizer.
b. impairment equalizer.
c. statistical equalizer.
d. compromise equalizer.
Answer: A
21 ) Which table is a permanent database that has an entry for each terminal symbol.
A. Terminal table
B. Literal table
C. Identifier table
D. Reductions
E. None of the abov e
Answer: A
22) A datum that indicates some important state in the content of input or output is
A)Sequence
B)Sentinel
C)SIO
D)Sibling
E)None of the abov e
Answer: B

23) The first digital computer built with IC chips was known as
e. IBM 8080
f. Apple – 1
g. IBM Sy stem / 360
h. V AX-1 0
Answer: g
24) After 3 calls of the c function bug() below, the values of i and j will be:
int j = 1 ;
bug()
{ Static int i = 0; int j = 0;
i++; j++;
return (i) ; }
(A) i=0, j=0 (B) i=3, j=3
(C) i=3, j=0 (D) i=3, j=1
Answer: D
25) The total number of comparisons in a bubble sort is ....
a) O(n logn)
b) O(2n)
c) O(n2)
d) O(n)
Ans: C

26) For a function of two v ariable, how many test cases will be generated by robustness testing?
A)9
B)1 3
C)25
D)42
Ans: B

27 ) The term gigabyte refers to


a. 1 024 bytes
b. 1 024 kilobytes
c. 1 024 megabytes
d. 1 024 gigabyte
Answer: c

28) A monitor’s …… is the distance between the holes in the mask behind the screen. This helps
determine how sharp the dots appear.
a) Refresh rate
b) Dot pitch
c) Resolution
d) Color depth
Answer: b

29) Time during which a job is processed by the computer is


a) Delay time
b) Real time
c) Ex ecution time
d) Down time
Answer: Ex ecution time

30) How can y ou access the font size tool on form atting toolbar?
A) Ctrl + S
B) Ctrl + Shift + S
C) Ctrl + P
D) Ctrl + Shift + P
Answer: D
31 ) If h is any hashing function and is used to hash n key s in to a table of size m, where n<=m, the
ex pected number of collisions inv olving a particular key x is :
a) Less than 1
b) Less than n
c) Less than m
d) Less than n/2
Answer: A
32) Processors of all computers, whether micro, mini or mainframe must have
a. ALU
b. Primary Storage
c. Control unit
d. All of abov e
Answer: D
33) The concept of logarithm is defined indirectly b y the definition of ……………
A .Ex ponential
B. Floor Function
C. Ceiling function
D. Monotonically increasing function
Answer: A
34) Which of the following statements is wrong ?
A. memory allocation is the time required for a gate to change its state
B. Noise immunity is the amount of noise which can be applied to the input of a gate without causing
the gate to change state
C. Fan-in of a gate is alway s equal to fan-out of the same gate
D. Operating speed is the max imum frequency at which digital data can be appli ed to a gat
Answer: C
35) To locate a data items for storage is
(a) Field
(b) Feed
(c) Database
(d) Fetch
Answer: D
36) A default catch block catches
A. all thrown objects
B. no thrown objects
C. any thrown object that has not been caught by an earlier catch blo ck
D. all thrown objects that have been caught by an earlier catch block
Answer: C
37 ) Batch processing is appropriate if
a. large computer system is av ailable
b. only a small computer system is av ailable
c. only a few transactions are involved
d. none of the abov e
Answer: D
38) What is auto negotiation?
a) a procedure by which two connected devices choose common transmission parameters
b) a security algorithm
c) a routing algorithm
d) none of the mentioned
Answer: A
39) The famous Moore’s Law predicts __________
a. Ex ponential Decrease in number of Transistors in Integrated Circuit.
b. Ex ponential Decrease of Transistor Size in Integrated Circuit
c. Ex ponential Increase in Transistor Switching in Integrated Circuit
d. Ex ponential Increase in number of Transistors in I ntegrated Circuit.
Answer: D
40) The command “gdb sanfoundy”
a) will start debugging for the file “sanfoundry” if the file is compiled with -g option with GCC
b) will create executable for debugging
c) will prov ide all errors present in the file “sanfoundry”
d) none of the mentioned
Answer: A

41 ) In which addressing mode, the effective address of the operand is generated by adding a constant
v alue to the contents of register?
a)absolute mode
b)indirect mode
c)immediate mode
d)index mode
Answer: d
42) Number of possible post ordered trees with 3 nodes A,B,C is
A.1 6
B.1 2
C.6
D.1 4
Answer: C
43) What are the different ty pes of real data type in C ?
A.float, double
B.short int, double, long int
C.float, double, long double
D.double, long int, float
Answer: C
44) Find the power dissipation in a circuit to whom v oltage applied is 24 and current passing is .25 ohm
a)3
b)6
c)8
d) 4
Answer: B
45) Which of the following has the least technichal knowledge
a) User
b)Programmer
c)consol operator
d)sy stem analyst
Answer: a
46) Which command will be used to display file and directory names only, without size, date, and time
information?
A: DIR/W
B. DIR A:
C. DIR/B
D. DIR/S
Answer : C
47 ) A standalone program that has been modified to work on a LAN by including concurrency controls
such as file and record locking is an ex ample of____ ?
a. Groupware
b. LAN ignorant software
c. LAN aware software
d. LAN intrinsic software
Answer: d
48) Default reasoning is another ty pe of
a) Monotonic reasoning
b) Analogical reasoning
c) Bitonic reasoning
d) Non-monotonic reasoning

Answer: D
49) Each of data files has a _____ that describe the way the data is stored in the file.
A.File structure
B.Records
C.Fields
D.Database...
E.None of the abov e
Ans:A

50) The processing, which normally consists of a small computer with o ne or more peripheral devices,
connected v ia a high-speed line to the large control computer is known as
a)On-line processing
b)Remote-terminal processing
c)Batch mode processing
d)Intelligent terminal Processing...
e)None of the abov e
Ans:D

51 ) Speech recognition:

a)will nev er be used in industrial controls


b)is already widely used in industrial controls
c)will be used in more applications as the technology matures. ...
d)All of the abov e
e)None of the abov e
Ans:c

52) Which technique enables the designer to mold and shape, rather than construct on object using a
series of lines?
a)Solid modeling
b)Wire-frame modeling
c)Surface modeling...
d)FEM (Finite Element Modeling)
e)None of the abov e
Ans:a

53) How can y ou recreate the PTR record in y our Windows 2000 DNS serv er fr om y ou Windows 2000
client?

a)Run ipconfig /registerdns from the client


b)Run ipconfig all /registerdns from the DNS serv er
C)Start the DNS Dy namic service on y our client computer ...
d)Create a host file with the #DY NAMIC command on the client computer
E)none of abov e
Ans:A

54) A _____ is an outline of a process that keeps develop successful information sy stems
A.Sy stem Dev elopment Life Cy cle
B.CASE tool
C.Phased Conv ersion
D.Success Factors...
E.none of the abov e
Ans:A
55) The primary tool used in structured design is a:
A.structure chart
B.data-flow diagram
C.program flowchart
D.module...
E.None of the abov e
Ans:A
56) To arriv e at a form which is suitable for implementation in some programming language is the
purpose of
a) Structured Analysis (SA)
b) Structured Design (SD)
c) Detailed Design (DD)
d) None of the mentioned...
Ans: B
57 ) Which of the following actions an operator precedence parser may take to recover from an error ?
A)Insert symbols onto the stack
B)Delete sy mbols from the stack
C)Insert or delete symbols from the input
D)All of the abov e...
Ans:D
58) The step-by-step instructions that solve a problem are called _____.
A.An algorithm
B.A list
C.A plan...
D.A sequential structure
E.None of the abov e
Ans:A

59) A self-relocating program is one whichcannot be made to ex ecute in any area of storage other than the
one designated for it at the time of its coding or translation.
B. consists of a program and relevant information for its relocation.
C. can itself performs the relocation of its address-sensitive portions....
D. All of the abov e
E. None of the abov e
Ans:C
60) Programming a robot by physically moving it through the trajectory y ou want it to follow is called:

A.contact sensing control


B. continuous-path control
C. robot v ision control...
D. pick-and-place control
E. None of the abov e
Ans:B

61 ) The probability that a single bit will be in error on a ty pical public telephone line using 4800 bps
modem is 1 0 to the power -3. If no error detection mechanism is used, the residual error rate for a
communication line using 9-bit frames is approximately equal to
A.0.003
B.0.009
C.0.991
D.0.999...
E.None of the abov e
Ans: B
62) Which of the following protocol is used for transferring electronic mail messages from one machine to
another?
A. FTP
B. SNMP
C. SMTP
D. RPC...
Ans: C
63) An anticipated result from multiprogramming operations is:
A.reduced computer idle time
B.the handling of more jobs
C.better scheduling of work
D.All of the abov e...
E.None of the abov e
Ans:D
64) A table on the many side of a o ne to many or many to many relationship must:
a) Be in Second Normal Form (2NF)
b) Be in Third Normal Form (3NF)
c) Hav e a single attribute key
d) Hav e a composite key ...
Answer:d
65) Critical path of the PERT chart is:
a)path which takes the longest time to c omplete the project
b)the shortest path
c)both of the above
d)path which takes the shortest time to complete the project...
e)None of the abov e
Ans:A
66) Surgeons can perform delicate operations by manipulating devices through computers instead of
manually . This technology is known as:
A. robotics.
B. computer forensics.
C. simulation.
D. forecasting....
Ans: A

67 )

You might also like