Professional Documents
Culture Documents
Part-B 2016 - 17
Part-B 2016 - 17
Which of the following devices translates hostnames into IP addresses? DNS Server Hub DHCP Firewall
8
Server
Bit at position zero is usually referred to Local Bit Least Most Least Significant
9 Significant Bit significant Byte
(LSB) Bit (MSB)
10 Object is ____ abstraction Object Logical Real Hypothetical
Intrinsic semiconductors are those which Are available Are made of Have more Have zero
locally the electrons energy gaps
semiconductor than holes
11 material in its
purest from
12 A synchronous satellite orbits the earth once in 24 hours 12 hours 6 hours 1 hour
13 A byte consists of 1 bit 4 bits 8 bits 16 bits
14 The X-OR and X-NOR gates can have how many inputs? 2 1 4 Any number
What will be the result of following expression in JavaScript? 8 undefined 71 521
5+2+”1”
15
What is the programming style of the object oriented conceptual model? Invariant Algorithms Classes and Goals, often
relationships objects expressed in a
20
predicate
calculus
What is an exception? Problem Problem Problem in Problem in IDE
arising during arising during syntax
21
compile time runtime
Which term is used to describe communication where a piece of Unicast Broadcast Multicast None of these
22 information is sent from one or more points to a set of other points?
23 Which of the following is a transport layer protocol? DNS HTTP TCP ARP
When the primary winding of a transformer is connected to a dc supply It will draw Primary Core losses Primary winding
small current leakage are increased may burn out
24
reactance is
increased
In C programming language, which of the following operator has the Unary + * >= ==
25
highest precedence?
26 A 16-square K-map eliminates 2 variables 3 variables 4 variables 8 variables
Nickel-Cadmium batteries are preferred than Lead-Acid batteries in these can be their discharge they deliver All of these
military applications because easily charged rate is higher large amount
27 and of power
discharged
Which is not a part of refrigerator? Compressor Thermostat Door Lamp Bucholz relay
33
switch switch
A transistor may be used as a switching device or as a variable fixed resistor rectifier tuning device
34
resistor
Which transmission media has the highest transmission speed in a Coaxial cable Twisted pair Optical fiber Electrical cable
35
network? cable
____ is concerned with realizing a software design using an object-oriented Object Object Object Object oriented
36 programming language. oriented oriented oriented programming
analysis methods design
For a beam of light traveling through media of two different densities, if the Reflection Refraction Incidence Criticism
37 angle of incidence is greater than the critical angle, _____ occurs.
38 Which of the following has S.I unit as Hertz? Charge Force Frequency Power
Push pull amplifier circuits is used as Power Audio RF None of these
39
amplifier amplifier Amplifier
Which of the following command in DOS is not an external command? format copy debug None of these
40
Bank's ATM facility is an example of LAN WAN Mixed Multipurpose
41
networking networking
Digital Voltmeter (DVM) are measuring instruments that convert Analog Digital voltage Both option- None of these
voltage into into analog 1 & option-2
42
digital readout signal
Noise Factor (F) and Noise Figure (NF) are related as NF = 10 log10 F = 10 log10 NF = 10 (F) F = 10 (NF)
43
(F) (NF)
44 Which of the following data model describes how the data is actually Internal model External model Logical None of these
stored? model
45 The number of address lines and data lines of 8086 are 16 and 20 16 and 16 8 and 16 20 and 16
In an analog data acquisition system, the output signal is captured using CRO Plotter Recorder Voltmeter
46
47 The pattern of printed lines on most products are called Price OCR Scanner Bar codes
The SQL command _____ is used to withdraw privileges on specific user REMOVE REVOKE ROLE GRANT
48
accounts.
49 NMI stands for nonmaskable nonmultiple nonmovable nonmemorable
50 Bus, ring and star topologies are mostly used in LAN MAN WAN Internetwork
The most important feature of CMOS family of ICs is High speed Small size Low power Low input
51 consumption impedance
What is the purpose of back up protection? To increase To increase the To leave no To guard against
52 the speed reach blind spot failure of
primary
Direction of rotation of motor is determined by Faraday’s law Lenz’s law Coulomb’s Fleming’s left-
53
law hand rule
54 The number of cells in a 6-variable K-map is 6 12 36 64
55 Sound waves do not travel through Solids Liquids Gases Vacuum
In Calorimetric method large amount of the RF power is measured by heat vapour AF power None of these
56
converting into
57 Finding the location of the element with a given value is Traversal Search Sort None of these
A Database Management System (DBMS) is Collection of Collection of Collection of All of these
programs to data describing interrelated
access data one particular data
58 enterprise
59 A 32 bit microprocessor has the word length equal to 2 bytes 1 byte 4 bytes 8 bytes
Which failure includes the case of deadlock or resource unavailability? Transaction System Crash Disk Failure None of these
60
failure
The highest decimal number that can be represented with 10 binary digits, 512 1023 1024 256
61
is
What are the advantages of arrays? Easier to store Used to Convenient All of these
elements of implement way to
same data type other data represent
62 structures like matrices as a
stack and 2D array
queue
A program written in machine language is easy to runs more both option- None of these
understand slowly than a 1 and option-
and modify program 2
63 written in high
level language
Which multiplexing technique transmits digital signals? TDM FDM WDM Both TDM and
64
FDM
A latch is commonly used to interface input interface interface interface DMA
65 devices output devices memory
The current drawn by the armature of DC motor is directly proportional to Torque Speed The voltage Cannot be
across the determined
66
terminals
Which of the following frequency range represent audible frequency range Below 20 Hz 20 Hz - 20 kHz Above 20 All of these
67
of human? kHz
Which among the following can restrict class members to get inherited? Private Protected Public All three
68
69 The Instruction pointer (IP) is _____ bits in length. 4 16 8 32
Viruses, Trojan horses and worms are Able to harm Unable to User- Harmless
computer detect if friendly applications
70
system present on applications resident on
computer computer
What is the main purpose of a communications system? To have a For To provide None of these
frequency modulation an
assignment acceptable
replica of
71 the
information
at the
destination
When determining the efficiency of algorithm the time factor is measured Counting Counting the Counting the Counting the
by microseconds number of key number of kilobytes of
72
operations statements algorithm
73 ASCII code is a 5-bit code 7-bit code 8-bit code 10-bit code
____ is a portion in a communications system, which processes the Encoder Modulation Transmitter Multiplexer
74 information so that it becomes suitable to the characteristic of the
transmission medium.
What is the function of an operating system? Manages Takes care of Manages the All of these
computer's scheduling flow of data
75 resources very jobs for and
efficiently execution instructions
The ability of the receiver to select the wanted signals among the various Sensitivity Selectivity Stability None of these
76
incoming signals is termed as
77
What is the relation in degrees of the electric and magnetic fields in an 180o 90o 270o 45o
electromagnetic wave?
78 The D-flip-flop has ______ inputs. 1 2 3 4
The Central Processing Unit (CPU) in a computer consists of Input, output Control unit, Control unit, None of these
and processing primary arithmetic
storage and logic unit
79 secondary and registers
storage
The gain stability of an amplifier circuit can be improved by using positive negative both positive None of these
feedback feedback and negative
80 feed back
Which of the following is not type of class? Abstract Class Final Class Start Class String Class
81
In data-flow diagram, ____ shows the direction of data flow and their name rounded rectangles circles arrows
82 describing the data flowing along that path. rectangle
86 Commonly used refrigerant in commercial ice plant is CO2 Freon 12 Air Ammonia
Which of the following methods is used to shield a dynamometer type Meter Meter is Neutral wire Meter is earthed
wattmeter against stray fields? components housed in a connection
are made of soft iron case is provided
87 non-magnetic
materials
Which of the following can be represented with a multivalued attribute? Age Skill Birthplace None of these
91
Compiler can diagnose Grammatical Logical errors Grammatical None of these
errors only only and logical
92
errors
The operation of processing each element in the list is known as Sorting Merging Inserting Traversal
93
Abstraction can apply to Control and Only data Only control Classes
94
data
95 Static RAM chips consists essentially of Flip-flops Capacitors Diodes None of these
96 The example of output device is CRT display 7-segment Printer All of these
K-map is an abstract form of ______ diagram organized as a matrix of Block Venn Triangle Cycle
97
squares.
Linked lists are not suitable for the implementation of Insertion sort Radix sort Polynomial Binary search
98 manipulatio
n
Which aggregate function gives the arithmetic mean for the specific COUNT AVG MIN SUM
99
column?
____ is a measure of the intensity of sound in comparison to another sound Phon Decibel Pascal Watts
100
intensity.