You are on page 1of 4

STUDY ENGINEERS [GATE | PSU | JE | SEMESTER] www.studyengineers.

com
BRANCH: COMPUTER SCIENCE DATA STRUCTURE USING C:-
TIME: 1 hour
MARKS: 100 39. b
O/S:- 40. a
41. b
1. a 42. c
2. d 43. d
3. d 44. d
4. d 45. d
5. a 46. a
6. b 47. b
7. c 48. c
8. b
9. d C LANGUAGE:-
10. d
49. c
11. d
50. c
12. b
51. b
13. c
52. c
14. c
53. b
C.O.A:- 54. d
55. c
15. a 56. a
16. c 57. a
17. b 58. b
18. c 59. a
19. d 60. b
20. b 61. d
21. c 62. a
22. a 63. b
23. d
24. b DE:-
25. c
64. a
26. a
65. a
27. d
66. a
28. b
The DeMorgan’s law states that (AB)’ =
DATA BASE MANAGEMENT SYSTEM:- A’ + B’ & (A + B)’ = A’ * B’, as per the
Dual Property.
29. c 67. B
30. d (A’B + CD’)’ = (A’B)'(CD’)’ (By
31. b DeMorgan’s Theorem) = (A” + B’)(C’ +
32. a D”) (By DeMorgan’s Theorem) = (A +
33. b B’)(C’ + D).
34. b 68. b
35. d (A + B)(A + C) = AA + AC + AB + BC = A +
36. a AC + AB + BC (By Commutative
37. b Property) = A(1 + C + B) + BC = A + BC
38. d (1 + B + C =1 By 1’s Property).

1st Floor, Balkishun Complex, Near Rajeev Nagar Over bridge, Patna-24, 9931160839, 9319327527
STUDY ENGINEERS [GATE | PSU | JE | SEMESTER] www.studyengineers.com

69. a compiler gives error whereas C


The logical sum of two or more logical compiler runs successfully.
product terms, is called SOP (i.e. sum of 77. d
product). The logical product of two or In C++ whenever a function without
more logical sum terms, is called POS argument is declared it is equivalent to
(i.e. product of sums). function with void arguments i.e. func()
70. : a == func(void) whereas in C a function
A product term containing all K without argument is equivalent to
variables of the function in either func(…) i.e. it can take any number of
complemented or uncomplemented arguments so func(2) call is also valid in
form is called a minterm. A sum term C but not valid in C++. Hence it gives
containing all K variables of the function error in C++ whereas no error in C.
in either complemented or 78. c
uncomplemented form is called a References are introduced in C++. They
maxterm. are not present in C.
71. b
A + B = A.1 + B.1 = A(B + B’) + B(A + A’) IWT:-
= AB + AB’ + BA +BA’ = AB + AB’ + A’B = 79. b
AB + AB’ + A’B. Botnet is a network of compromised
72. : a devices used by the attacker without the
Maxterm is the sum of terms of the owner’s knowledge to perform
corresponding Minterm with its literal unethical activities such as spamming.
complemented. The attacker usually uses the least
73. c secure devices to create the botnet.
Minterm is given by 2n. So, 23 = 8 80. d
minterms are required. In a DoS attack, the attacker won’t let
C++:- the victims access the network by using
a certain method that ensures that an
74. c essential network resource is
In C++ all the functions should be unavailable to the victim. In
declared before it is called otherwise the vulnerability attack, the attacker
C++ compiler will give an error but in exploits any obvious vulnerable entity
case of C the compiler just gives a in the network to deny the victim access
warning and the program can be into the network. In bandwidth flooding,
executed. the attacker floods the victim with a
75. d huge flow of packets and uses up all the
new is a keyword in C++, therefore, we bandwidth. In connection flooding, the
cannot declare a variable with name attacker floods the victim network with
new but as there is no such keyword a huge number of connections, so that,
new in C, therefore, the program is no other machine can connect to it.
compiled and executed successfully in C. 81. c
76. d In Vulnerability attack, the attacker
main() function in C++ must return int exploits the vulnerable control points of
otherwise the C++ compiler gives the the network to deny access to the
error whereas C does not forces such victims. In Bandwidth flooding, the
things on main() function. Thereas attacker intentionally uses up all the
when we aremaking void main(){} bandwidth by flooding the victim with a
function in this program the C++ deluge of packets and makes sure that
1st Floor, Balkishun Complex, Near Rajeev Nagar Over bridge, Patna-24, 9931160839, 9319327527
STUDY ENGINEERS [GATE | PSU | JE | SEMESTER] www.studyengineers.com

the victim can’t use any bandwidth. In telephone channel. Internet can be
UDP flooding, too many UDP packets are provided through a high-speed
sent by the attacker to the victim at downstream channel in a residential
random ports. telephone line.
82. b 90. c
In Bandwidth flooding, the attacker DSL stands for Digital Subscriber Line
floods the victim machine with a deluge and ISP stands for Internet Service
of packets to make sure that no Provider. In a Digital Subscriber Line
bandwidth is available. The victim then system, the same company which
cannot utilize the complete bandwidth provides phone connection is also an
to perform its operation. ISP. The internet is provided through
83. b the pre-installed telephone lines.
The function of packet sniffers is to just 91. : c
silently receive the packets flowing in Hybrid fiber-coaxial (HFC) is a
the channel. If they inject any packets telecommunications industry term for a
into the channel, they might alert the broadband network that combines
other users about the intrusion. optical fiber and coaxial cable. It has
84. d been popularly used since the early
Switches make sure that the packet is 1990s. It is stronger than the optical
sent to the intended receiver and no one fiber cables and faster than the co-axial
else, thus preventing Sniffers to perform cables.
their function. Intelligent switches are 92. :a
hence used preferably for the network. AON stands for Active optical networks
85. a which are essentially switched
UDP is more vulnerable to attacks, so Ethernets. Each user has his/her own
firewalls are often configured to block dedicated optical fiber line connecting
suspicious UDP traffic. to the ISP in an AON.
86. b 93. d
Since there is no other packet to be Home Internet Access is provided by
transmitted, there is no need for a DSL, FTTP, and Cable. FTTP provides the
queue. Therefore, the delay caused due fastest speeds followed by the cable
to the queuing would be none i.e. 0. connections and then the DSLs. FTTP is
87. a popularly used in modern connections.
Telnet is an application layer protocol 94. d: Because DSL is made of twisted wire
that provides access to the command- copper pair, the gauge of twisted pair
line interface on a remote host. Telnet line i.e. the protection and electrical
stands for teletype network. interference would affect the
88. a transmission rate in DSL. Unlike DSL,
Telnet provides access to the command- FTTP is not really affected by these
line interface on a remote computer. factors.
One can login to the computer from the 95. : b
command-line interface. Explanation: The seven layers in ISO OSI
reference model is Application,
DCN:- Presentation, Session, Transport,
89. c Network, Data link and Physical layer.
A low-speed downstream channel is not OSI stands for Open System
a constituent of a residential telephone Interconnect and it is a generalized
line. But it might be just a two-way model.
1st Floor, Balkishun Complex, Near Rajeev Nagar Over bridge, Patna-24, 9931160839, 9319327527
STUDY ENGINEERS [GATE | PSU | JE | SEMESTER] www.studyengineers.com

96. a
Not only application layer, but
presentation layer, session layer and
transport layer are also implemented in
the end system. The layers below are
implemented outside the end system,
for example, the network layer is
implemented on the routers and the
physical layer is implemented for the
medium.
97. a
Application, Presentation, Session and
Transport layer are implemented in the
end system. The transport layer handles
the process to process delivery of the
packet through ports.
98. d
In OSI reference model, the fifth layer is
Session layer. Session layer provides the
mechanism for opening, closing and
managing a session between end-user
application processes. In TCP/IP
protocol stack, the functions of the
session layer are handled by the
transport layer itself and thus the
session layer is missing from the TCP/IP
model.
99. b
In OSI reference model, when data
packet moves from lower layers to
higher layer, headers get removed.
Whereas when the data packet moves
from higher layer to lower layers,
headers are added. These headers
contain the essential control
information for the protocols used on
the specific layer
100. a
One layer may use the information from
another layer, for example timestamp
value. The information is contained in
the header inserted by the previous
layer. The headers are added as the
packet moves from higher layers to the
lower layers..

1st Floor, Balkishun Complex, Near Rajeev Nagar Over bridge, Patna-24, 9931160839, 9319327527

You might also like